name |
TNOR Guard v. 1.1.3 |
ePass V3 TD sur composants P5CD081V1A, en configuration EAC sur SAC via PACE v2 et AA |
category |
Boundary Protection Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
NO |
FR |
status |
active |
archived |
not_valid_after |
12.05.2027 |
01.09.2019 |
not_valid_before |
12.05.2022 |
28.01.2014 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SERTIT-120%20C%20v1.0.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SERTIT-120%20CR%20v1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2014-01fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/TNOR%20Guards%20739_20726_aaaa_sc_ed10-4-public.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2014-01en.pdf |
manufacturer |
Thales Norway AS |
Oberthur Technologies / NXP Semiconductors GmbH |
manufacturer_web |
https://www.thales.no/ |
https://www.oberthur.com/ |
security_level |
EAL4+, AVA_VAN.4, ALC_FLR.3 |
EAL5+, ALC_DVS.2, AVA_VAN.5 |
dgst |
03972af324dcd07f |
c640b454c967f522 |
heuristics/cert_id |
SERTIT-120 |
ANSSI-CC-2014/01 |
heuristics/cert_lab |
[] |
SERMA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, AVA_VAN.4, ASE_CCL.1 |
ALC_DVS.2, ASE_TSS.2, AVA_VAN.5 |
heuristics/extracted_versions |
1.1.3 |
- |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0555-2009, BSI-DSZ-CC-0857-2013 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0555-2009, BSI-DSZ-CC-0857-2013 |
heuristics/scheme_data |
- category: Boundary Protection Devices and Systems
- certification_date: 12.05.2022
- developer: Thales Norway AS
- enhanced:
- category: Boundary Protection Devices and Systems
- cert_id: SERTIT-120
- certification_date: 12.05.2022
- description: TNOR Guard is a technology that provides controlled information flow between networks with different system and application security policies. The TNOR Guard (TOE) is part of the XOmail product family for messaging and information exchange in mission-critical military and civilian networks. The Guard implements high-assurance information flow control for the trusted exchange of information across security domain boundaries. This product is also described in this report as the Target of Evaluation (TOE). The main security feature of the TOE is to mediate a one-way or bidirectional flow between two security domains. The TOE inspects every information object that is requested sent between the security domains, and makes an automated release decision according to configured policy. The TOE covers the following four Guard products: STANAG 4406 Ed 2 Message Guard For connectivity towards the NATO standard Military Message Handling System (MMHS), SMTP Message Guard (E-mail) For connectivity towards standard e-mail systems such as Microsoft Exchange. Supports RFC 6477 for Military Message Handling attributes within the SMTP domain, Chat (XMPP) Guard Instant Messaging service between security domains. XML/SOAP Guard Exchange of XML/SOAP data between security domains.
- developer: Thales Norway AS
- documents: frozendict({'cert': [frozendict({'href': 'https://sertit.no/getfile.php/1311036-1656573547/SERTIT/Sertifikater/2022/120/SERTIT-120%20C%20v1.0.pdf'})], 'target': [frozendict({'href': 'https://sertit.no/getfile.php/1310630-1654589563/SERTIT/Sertifikater/2022/120/TNOR%20Guards%20739_20726_aaaa_sc_ed10-4-public.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/1310627-1654589561/SERTIT/Sertifikater/2022/120/SERTIT-120%20CR%20v1.0.pdf'})]})
- evaluation_facility: System Sikkerhet AS
- expiration_date: 12.05.2027
- level: EAL 4, ALC_FLR.3, AVA_VAN.4
- mutual_recognition: CCRA, SOG-IS
- product: TNOR Guard version 1.1.3
- sponsor: Forsvarsmateriell IKT-kapasiteter
- product: TNOR Guard
- url: https://sertit.no/certified-products/tnor-guard-article2842-1919.html
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0555-2009 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0555-2009 |
heuristics/protection_profiles |
{} |
78bcc246f0f43034 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056b.pdf |
pdf_data/cert_filename |
SERTIT-120 C v1.0.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 4: 2
- EAL 4 augmented: 1
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author: helgerudt
- /CreationDate: D:20220629133919+02'00'
- /Creator: Hewlett-Packard MFP
- /ModDate: D:20220629142649+02'00'
- /Producer: PixEdit AS, PixEdit Version 8.7.4.6
- /Subject: 201676 201334 VEDLEGG01
- pdf_file_size_bytes: 1289183
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
SERTIT-120 CR v1.0.pdf |
ANSSI-CC_2014-01fr.pdf |
pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 4
- cert_id: ANSSI-CC-2014/01
- cert_item: ePass V3 TD sur composants P5CD081V1A, en configuration EAC sur SAC via PACE v2 et AA
- cert_item_version: SAAAAR ROM 079161, SAAAAR Codop 079223
- cert_lab: Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
- developer: Oberthur Technologies 420 rue d'Estienne d'Orves CS 40008 92705 Colombes, France NXP Semiconductors Germany GmbH Box 54 02 40, D-22502 Hamburg, Allemagne Commanditaire Oberthur Technologies 420 rue d'Estienne d'Orves CS 40008 92705 Colombes, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: Machine Readable Travel Document with „ICAO Application”, Extended Access Control with PACE, Version 1.3.2, BSI-CC-PP-0056-V2-2012
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0555-2009: 1
- BSI-DSZ-CC-0857-2013: 1
- FR:
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0056-V2-2012: 1
- BSI-CC-PP-0056-V2-2012: 1
- BSI-CC-PP-0068-V2-2011: 1
- BSI-PP-0035-2007: 1
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 4: 27
- EAL 4 augmented: 24
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 1
- EAL4: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR: 1
- ALC_FLR.3: 26
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- NXP:
- NXP: 1
- NXP Semiconductors: 3
- Oberthur:
- Oberthur Technologies: 15
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- ISO:
- ISO/IEC 15408: 8
- ISO/IEC 17025: 2
- ISO/IEC 18045: 2
- RFC:
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- ICAO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20220518100037+02'00'
- /ModDate: D:20220518100037+02'00'
- pdf_file_size_bytes: 529073
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 22
|
- /CreationDate: D:20140211175812+01'00'
- /Keywords:
- /ModDate: D:20140211175812+01'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 542967
- pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 15
|
pdf_data/st_filename |
TNOR Guards 739_20726_aaaa_sc_ed10-4-public.pdf |
ANSSI-CC-cible_2014-01en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0056-2009: 1
- BSI-CC-PP-0056-V2-2012: 3
- BSI-CC-PP-0068-V2-2011: 3
- BSI-PP-0035: 1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL4: 8
- EAL4 augmented: 5
|
- EAL:
- EAL5: 4
- EAL5 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ALC:
- ASE:
- ASE_CCL: 2
- ASE_ECD: 2
- ASE_INT: 2
- ASE_OBJ: 2
- ASE_REQ: 2
- ASE_SPD: 2
- ASE_TSS: 2
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 2
- ALC_DVS.2: 3
- ALC_FLR: 1
- ALC_LCD: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.3: 1
- AVA_VAN.5: 3
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_ARP: 2
- FAU_ARP.1: 9
- FAU_GEN: 2
- FAU_GEN.1: 13
- FAU_GEN.2: 8
- FAU_GEN.2.1: 1
- FAU_SAA: 1
- FAU_SAA.1: 10
- FAU_SAR: 1
- FAU_SAR.1: 11
- FAU_SAR.2: 8
- FAU_STG: 1
- FAU_STG.1: 12
- FAU_STG.3: 9
- FAU_STG.4: 9
- FCO:
- FCS:
- FCS_CKM.1: 2
- FCS_CKM.4: 1
- FCS_COP: 1
- FCS_COP.1: 10
- FCS_NRO.1: 1
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 9
- FDP_ACC.2: 10
- FDP_ACF: 1
- FDP_ACF.1: 12
- FDP_ETC: 1
- FDP_ETC.2: 13
- FDP_IFC: 19
- FDP_IFC.1: 14
- FDP_IFC.2: 11
- FDP_IFF: 19
- FDP_IFF.1: 16
- FDP_IFF.2: 16
- FDP_IFF.2.2: 1
- FDP_ITC: 1
- FDP_ITC.1: 2
- FDP_ITC.2: 15
- FDP_RIP: 1
- FDP_RIP.1: 1
- FDP_RIP.2: 10
- FDP_UIT: 1
- FDP_UIT.1: 9
- FIA:
- FIA_ATD: 1
- FIA_ATD.1: 9
- FIA_UID: 1
- FIA_UID.1: 7
- FIA_UID.2: 13
- FMT:
- FMT_MOF: 19
- FMT_MOF.1: 5
- FMT_MSA: 1
- FMT_MSA.1: 10
- FMT_MSA.3: 15
- FMT_MTD: 2
- FMT_MTD.1: 12
- FMT_MTD.3: 8
- FMT_MTS: 1
- FMT_REV: 1
- FMT_REV.1: 9
- FMT_SMF: 1
- FMT_SMF.1: 15
- FMT_SMR: 1
- FMT_SMR.1: 9
- FMT_SMR.2: 16
- FMT_TST.1: 1
- FPT:
- FPT_FLS: 1
- FPT_FLS.1: 11
- FPT_RCV: 1
- FPT_RCV.4: 10
- FPT_STM.1: 2
- FPT_TDC: 1
- FPT_TDC.1: 11
- FPT_TST: 1
- FPT_TST.1: 12
- FRU:
- FTP:
- FTP_ITC.1: 4
- FTP_TRP: 1
- FTP_TRP.1: 15
- FTP_TRP.2: 2
|
- FAU:
- FAU_SAS: 3
- FAU_SAS.1: 5
- FAU_SAS.1.1: 2
- FAU_STG.2: 2
- FAU_STG.2.1: 1
- FAU_STG.2.2: 1
- FAU_STG.2.3: 1
- FCS:
- FCS_CKM: 8
- FCS_CKM.1: 3
- FCS_CKM.1.1: 1
- FCS_CKM.4: 4
- FCS_CKM.4.1: 1
- FCS_COP: 11
- FCS_COP.1: 2
- FCS_COP.1.1: 1
- FCS_RND: 3
- FCS_RND.1: 6
- FCS_RND.1.1: 2
- FDP:
- FDP_ACC: 4
- FDP_ACC.1: 2
- FDP_ACC.2: 2
- FDP_ACF: 4
- FDP_ACF.1: 17
- FDP_DAU: 3
- FDP_DAU.1: 2
- FDP_ITC: 6
- FDP_ITC.1: 6
- FDP_RIP: 1
- FDP_RIP.1: 2
- FDP_RIP.1.1: 1
- FDP_UCT: 4
- FDP_UCT.1: 3
- FDP_UIT: 4
- FDP_UIT.1: 5
- FIA:
- FIA_ACC.1.1: 1
- FIA_AFL: 6
- FIA_AFL.1: 5
- FIA_API: 3
- FIA_API.1: 6
- FIA_API.1.1: 2
- FIA_UAU: 24
- FIA_UAU.1: 5
- FIA_UAU.4: 2
- FIA_UAU.4.1: 1
- FIA_UAU.5: 5
- FIA_UAU.6: 3
- FIA_UID: 5
- FIA_UID.1: 5
- FMT:
- FMT_LIM: 4
- FMT_LIM.1: 8
- FMT_LIM.1.1: 2
- FMT_LIM.2: 8
- FMT_LIM.2.1: 2
- FMT_MOF: 5
- FMT_MOF.1: 2
- FMT_MSA: 5
- FMT_MSA.1: 1
- FMT_MSA.3: 2
- FMT_MTD: 26
- FMT_MTD.1: 8
- FMT_MTD.3: 3
- FMT_MTD.3.1: 1
- FMT_SMF: 1
- FMT_SMF.1: 3
- FMT_SMF.1.1: 1
- FMT_SMR: 2
- FMT_SMR.1: 3
- FPT:
- FPT_EMS: 3
- FPT_EMS.1: 5
- FPT_EMS.1.1: 2
- FPT_EMS.1.2: 2
- FPT_FLS.1: 3
- FPT_FLS.1.1: 1
- FPT_PHP.3: 3
- FPT_PHP.3.1: 1
- FPT_TST.1: 3
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
|
pdf_data/st_keywords/cc_claims |
- A:
- A..Z: 1
- A.APPROVED_CRYPTO: 3
- A.APPROVED_PKI: 2
- A.CORRECT_CONFIGURATION: 3
- A.NETWORK_PROTECTED: 2
- A.PHYSICAL_ACCESS_MANAGED: 3
- A.TRUSTED_AND_TRAINED_ADMIN: 2
- A.TRUSTED_LABELLER: 3
- O:
- O.ACCESS: 8
- O.AUDIT: 13
- O.CMD_ACL: 10
- O.CONFIGURATION_CHANGE: 5
- O.CONTROLLED_INFORMATION: 1
- O.CONTROLLED_INFORMATION_FLOW: 5
- O.CORRECT_TSF_OPERATION: 6
- O.INTERNAL_LEAST_PRIVILEG: 1
- O.INTERNAL_LEAST_PRIVILEGE: 9
- O.LABEL_MAPPING: 8
- O.MAC: 5
- O.MGMT_MODE: 6
- O.MINIMAL_PROXY: 10
- O.OBJECT_INTEGRITY: 9
- O.RESIDUAL_INFORMATION: 7
- O.RESOURCE_SHARING: 7
- O.SECURE_STATE: 8
- O.SUBJECT_ISOLATION: 12
- O.TRANSITION: 5
- O.TSF_INTEGRITY: 9
- O.VALID_LABEL: 6
- OE:
- OE.APPROVED_CRYPTO: 7
- OE.APPROVED_PKI: 7
- OE.BORDER_PROTECTION: 12
- OE.CONFIGURATION: 8
- OE.CONTENT_INSPECTION_S: 1
- OE.CONTENT_INSPECTION_SE: 2
- OE.CONTENT_INSPECTION_SERVICE: 6
- OE.DIRECTORY_SERVICE: 6
- OE.MINIMAL_POSTURE: 10
- OE.NETWORK: 10
- OE.PHYSICAL_ACCESS_MANA: 2
- OE.PHYSICAL_ACCESS_MANAG: 1
- OE.PHYSICAL_ACCESS_MANAGED: 6
- OE.PLATFORM: 10
- OE.TIME_SOURCE: 6
- OE.TRUSTED_AND_TRAINED_: 1
- OE.TRUSTED_AND_TRAINED_A: 1
- OE.TRUSTED_AND_TRAINED_ADMIN: 8
- OE.TRUSTED_AND_TRAINED_ADMINS: 1
- OE.TRUSTED_LABELLER: 7
- T:
- T.ADMIN_MASQUERADE: 4
- T.AUDIT_COMPROMISE: 2
- T.COVERT_CHANNEL: 2
- T.DOS: 4
- T.INFORMATION_LEAK: 2
- T.INSECURE_STATE: 4
- T.MALWARE_INJECTION: 2
- T.METADATA_LEAK: 4
- T.NETWORK_ATTACK: 2
- T.OBJECT_TAMPERING: 4
- T.RECONNAISSANCE: 4
- T.RESIDUAL_DATA: 2
- T.TSF_COMPROMISE: 3
- T.UNATTENDED_ADMIN_SESSION: 2
- T.UNAUTHORIZED_ACCESS: 4
- T.UNNOTICED_ATTACK: 2
|
|
pdf_data/st_keywords/vendor |
|
- NXP:
- NXP: 4
- NXP Semiconductors: 5
- Oberthur:
- Oberthur Technologies: 11
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 4
- SHA-256: 4
- SHA-384: 3
- SHA-512: 4
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 3
- Malfunction: 2
- malfunction: 3
- SCA:
- physical probing: 3
- side channels: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.COM: 2
- EF.DG1: 5
- EF.DG14: 2
- EF.DG15: 1
- EF.DG16: 4
- EF.DG2: 3
- EF.DG3: 10
- EF.DG4: 10
- EF.DG5: 2
- EF.SOD: 3
|
pdf_data/st_keywords/standard_id |
- FIPS:
- ISO:
- PKCS:
- PKCS #11: 2
- PKCS#11: 4
- PKCS11: 2
- RFC:
- RFC 5321: 1
- RFC 5322: 1
- RFC 6120: 1
- RFC 6121: 1
- RFC 6477: 1
- RFC 7622: 2
- RFC3507: 2
- RFC5905: 1
- RFC6120: 2
- RFC6121: 1
- X509:
|
- BSI:
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- FIPS:
- FIPS 197: 1
- FIPS 46-3: 3
- FIPS PUB 197: 2
- FIPS PUB 81: 2
- ICAO:
- ISO:
- ISO/IEC 15946-1: 1
- ISO/IEC 15946-2: 1
- ISO/IEC 9796-2: 1
- ISO/IEC 9797: 4
- NIST:
- PKCS:
- RFC:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- and EAP protocols • Standard and biometric PIN management (therefore PIN associated commands are out of scope) • Watermarking feature 2.1.5 Usage and major security features of the TOE A State or Organisation: 1
- out of scope: 1
|
pdf_data/st_metadata |
- /Author: Radical
- /CreationDate: D:20220510093219+02'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20220510093219+02'00'
- /Producer: Microsoft® Word 2016
- /Title: System/Subsystem Specification
- pdf_file_size_bytes: 3028038
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 78
|
- /CreationDate: D:20130710164209+02'00'
- /Creator: PDFCreator Version 0.9.5
- /Keywords:
- /ModDate: D:20140211175713+01'00'
- /Producer: GPL Ghostscript 8.61
- /Subject:
- /Title:
- pdf_file_size_bytes: 621505
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 69
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |