name |
HiSilicon MSP V1.0 |
EROAD System |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
Other Devices and Systems |
scheme |
NL |
NO |
status |
active |
archived |
not_valid_after |
20.08.2025 |
25.06.2020 |
not_valid_before |
20.08.2020 |
25.06.2015 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CC-20-0138342.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-0138342-CR.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20150625_SERTIT-059_CR_v10.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/MSP%20V1.0%20on%20Kirin%209000%20Series%20Security%20Target%20V12.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST_EROAD_v1.3_FINAL.pdf |
manufacturer |
HiSilicon |
EROAD |
manufacturer_web |
https://www.hisilicon.com/en/ |
https://www.eroad.com/ |
security_level |
ALC_DVS.2, EAL5+, AVA_VAN.5 |
EAL2+, ALC_FLR.1 |
dgst |
058c4cc41fe321e1 |
69552df11adc055e |
heuristics/cert_id |
NSCIB-CC-0138342-CR |
SERTIT-059 |
heuristics/cert_lab |
|
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ALC_TAT.2, ADV_TDS.4, ASE_REQ.2, ATE_IND.2, ASE_CCL.1 |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
1.0 |
- |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
NSCIB-CC-0351648-CR |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
NSCIB-CC-0351648-CR |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
- category: Other Devices and Systems
- certification_date: 25.06.2015
- developer: EROAD
- enhanced:
- category: Other Devices and Systems
- cert_id: SERTIT-059
- certification_date: 25.06.2015
- description: EROAD is a fully integrated technology, tolling and services provider. EROAD is the first company in the world to implement a GPS/cellular based road charging platform across an entire country. EROAD's advanced technology provides road charging, compliance and commercial services with the same platform to lower overall client and delivery costs. EROAD's goal is to offer flexible and powerful solutions based on our innovative technology platform to assist in the creation of a transport sector that is responsive to the evolving needs of business, government and the wider community. The core element of EROAD's satellite-based solution is the secure Ehubo unit which reliably and accurately measures distance and location using multiple sensors. Data is transmitted via a secure cellular link to a back office facility that supports a wide range of regulatory and value-added applications, allowing clients to manage their vehicles and assets in the same web browser. The EROAD Depot is the secure web services and payment gateway, where customers manage their tax and compliance obligations, oversee their fleets, and access a wide range of EROAD services. It provides a comprehensive and evolving suite of reports that can be viewed, saved, exported and downloaded. Within the Depot, users are assigned - roles' which give them access to different functions and, depending on their role, allow them to create and filter fleets to focus on critical information.
- developer: EROAD
- documents: frozendict({'cert': [frozendict({'href': 'https://sertit.no/getfile.php/134947-1607951850/SERTIT/Sertifikater/2015/59/20150626_Sertit-059_C.pdf'})], 'target': [frozendict({'href': 'https://sertit.no/getfile.php/134944-1607951845/SERTIT/Sertifikater/2015/59/ST_EROAD_v1.3_FINAL.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/134941-1607951842/SERTIT/Sertifikater/2015/59/20150625_SERTIT-059_CR_v10.pdf'})]})
- evaluation_facility: Advanced Data Security
- expiration_date: 25.06.2020
- level: EAL 2, ALC_FLR.1
- mutual_recognition: CCRA
- product: TOE versions of EROAD OBU:Hardware version: 03Firmware version: 1.18.05;TOE versions of EROAD Application:Software version: 11-11-2014-0239
- sponsor: EROAD
- product: EROAD System
- url: https://sertit.no/certified-products/product-archive/eroad-system
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
CC-20-0138342.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
- EAL:
- EAL2: 1
- EAL5: 1
- EAL5 augmented: 1
- EAL7: 1
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20200903132036+01'00'
- /Creator: C458-M
- /ModDate: D:20200903131730+02'00'
- /Producer: KONICA MINOLTA bizhub C458
- /Title: C458-M&S20090313200
- pdf_file_size_bytes: 68752
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
NSCIB-CC-0138342-CR.pdf |
20150625_SERTIT-059_CR_v10.pdf |
pdf_data/report_frontpage |
- NL:
- cert_id: NSCIB-CC-0138342-CR
- cert_item: MSP V1.0
- cert_lab: Brightsight
- developer: HiSilicon
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 5: 1
- EAL 5 augmented: 1
- EAL4: 1
- EAL5: 1
- EAL5 augmented: 1
- EAL5+: 2
|
- EAL:
- EAL 2: 18
- EAL 2 augmented: 18
- EAL 4: 1
- EAL1: 1
- EAL2: 1
- EAL7: 1
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
- FAU:
- FAU_GEN.1: 1
- FAU_GEN.2: 1
- FCS:
- FCS_CKM.1: 1
- FCS_CKM.4: 1
- FCS_COP.1: 1
- FDP:
- FDP_ACC.1: 2
- FDP_ACF.1: 2
- FDP_IFC.1: 1
- FDP_IFF.1: 1
- FIA:
- FIA_ATD.1: 1
- FIA_UAU.1: 1
- FIA_UID.1: 1
- FMT:
- FMT_MOF.1: 1
- FMT_MSA.1: 1
- FMT_MSA.3: 1
- FMT_SMF.1: 1
- FMT_SMR.1: 1
- FPT:
- FPT_ITT_EXP.1: 1
- FPT_PHP.2: 1
- FPT_STM.1: 1
|
pdf_data/report_keywords/cc_claims |
|
- A:
- O:
- O.ACCESS: 1
- O.ADMINISTRATION: 1
- O.AUDIT: 1
- O.CRYPTOGRAPHY: 1
- O.CRYPTO_VALIDATED: 1
- O.ID_AUTH: 1
- O.INTEGRITY: 1
- O.PROTECT: 1
- O.TAMPER_RESISTANCE: 1
- OE:
- OE.PERSON: 1
- OE.PROTECTION: 1
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- ADS:
- Advanced Data Security: 1
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- malfunction: 2
- physical tampering: 1
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- FIPS:
- ISO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- OutOfScope:
- 1 SERTIT-059 CR Issue 1.0 25 June 2015 Page 15 of 16 these underlying environmental components are out of scope insofar as the TOE is concerned. TOE Documentation The supporting guidance documents evaluated in: 1
- out of scope: 1
|
pdf_data/report_metadata |
|
- /Author: Arne
- /CreationDate: D:20150626141410+02'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20150626141544+02'00'
- /Producer: Acrobat Distiller 9.5.5 (Windows)
- /Title: Microsoft Word - 20150625 SERTIT-059 CR v.1.0
- pdf_file_size_bytes: 561714
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 16
|
pdf_data/st_filename |
MSP V1.0 on Kirin 9000 Series Security Target V12.pdf |
ST_EROAD_v1.3_FINAL.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL5: 2
- EAL5 augmented: 1
|
- EAL:
- EAL2: 5
- EAL2 augmented: 5
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 5
- ADV_FSP: 1
- ADV_FSP.1: 4
- ADV_FSP.2: 4
- ADV_FSP.4: 2
- ADV_FSP.5: 4
- ADV_IMP: 1
- ADV_IMP.1: 5
- ADV_INT: 1
- ADV_INT.2: 1
- ADV_TDS: 1
- ADV_TDS.1: 3
- ADV_TDS.3: 4
- ADV_TDS.4: 8
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 5
- AGD_PRE: 1
- AGD_PRE.1: 5
- ALC:
- ALC_CMC: 1
- ALC_CMC.4: 1
- ALC_CMS: 1
- ALC_CMS.5: 2
- ALC_DEL: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.1: 2
- ALC_DVS.2: 4
- ALC_LCD: 1
- ALC_LCD.1: 3
- ALC_TAT: 1
- ALC_TAT.1: 4
- ALC_TAT.2: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 5
- ASE_INT: 1
- ASE_INT.1: 2
- ASE_OBJ: 1
- ASE_OBJ.2: 1
- ASE_REQ: 1
- ASE_REQ.1: 4
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 2
- ASE_TSS: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 3
- ATE_COV.2: 3
- ATE_DPT: 1
- ATE_DPT.3: 1
- ATE_FUN: 1
- ATE_FUN.1: 7
- ATE_IND: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.1: 6
- ASE:
- ASE_CCL: 2
- ASE_CCL.1: 1
- ASE_ECD: 2
- ASE_ECD.1: 1
- ASE_INT: 2
- ASE_INT.1: 1
- ASE_OBJ: 2
- ASE_OBJ.2: 1
- ASE_REQ: 2
- ASE_REQ.2: 1
- ASE_SPD: 2
- ASE_SPD.1: 1
- ASE_TSS: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_SAS: 16
- FAU_SAS.1: 6
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM: 20
- FCS_CKM.1: 9
- FCS_CKM.2: 4
- FCS_CKM.4: 18
- FCS_CKM.4.1: 1
- FCS_COP: 56
- FCS_COP.1: 8
- FCS_RNG: 4
- FCS_RNG.1: 10
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC: 29
- FDP_ACC.1: 7
- FDP_ACF: 26
- FDP_ACF.1: 15
- FDP_DAU: 5
- FDP_DAU.1: 2
- FDP_IFC: 11
- FDP_IFC.1: 3
- FDP_IFC.2: 2
- FDP_IFF: 9
- FDP_IFF.1: 7
- FDP_ITC.1: 10
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 2
- FDP_ITT.1: 4
- FDP_ITT.1.1: 1
- FDP_SDC: 4
- FDP_SDC.1: 11
- FDP_SDC.1.1: 2
- FDP_SDI: 13
- FDP_SDI.2: 4
- FIA:
- FIA_AFL: 6
- FIA_AFL.1: 2
- FIA_UAU.1: 2
- FIA_UID: 4
- FIA_UID.1: 2
- FMT:
- FMT_LIM: 5
- FMT_LIM.1: 15
- FMT_LIM.1.1: 2
- FMT_LIM.2: 13
- FMT_LIM.2.1: 2
- FMT_MSA: 39
- FMT_MSA.1: 8
- FMT_MSA.3: 17
- FMT_SMR.1: 8
- FPT:
- FPT_FLS: 9
- FPT_FLS.1: 6
- FPT_INI: 5
- FPT_INI.1: 11
- FPT_INI.1.1: 2
- FPT_INI.1.2: 2
- FPT_INI.1.3: 2
- FPT_ITT.1: 6
- FPT_ITT.1.1: 1
- FPT_PHP.3: 5
- FPT_PHP.3.1: 1
- FPT_STM: 6
- FPT_STM.1: 1
- FPT_TUD: 5
- FPT_TUD.1: 11
- FRU:
- FRU_FLT.2: 6
- FRU_FLT.2.1: 1
- FTP:
- FTP_FLS: 3
- FTP_ITC.1: 7
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
- FAU:
- FAU_GEN.1: 11
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 7
- FAU_GEN.2.1: 1
- FCS:
- FCS_CKM.1: 13
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 11
- FCS_CKM.4.1: 1
- FCS_COP.1: 12
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 22
- FDP_ACC.1.1: 2
- FDP_ACF.1: 20
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_IFC.1: 12
- FDP_IFC.1.1: 1
- FDP_IFF.1: 8
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC.1: 4
- FDP_ITC.2: 4
- FIA:
- FIA_ATD.1: 8
- FIA_ATD.1.1: 1
- FIA_UAU.1: 9
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID.1: 16
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MOF.1: 11
- FMT_MOF.1.1: 1
- FMT_MSA.1: 9
- FMT_MSA.1.1: 1
- FMT_MSA.3: 15
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR.1: 14
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_ITT_EXP.1: 11
- FPT_ITT_EXP.1.1: 2
- FPT_PHP.2: 8
- FPT_PHP.2.1: 1
- FPT_PHP.2.2: 1
- FPT_PHP.2.3: 1
- FPT_STM.1: 11
- FPT_STM.1.1: 1
|
pdf_data/st_keywords/cc_claims |
- O:
- O.RND: 4
- O.RNG: 1
- O.SA: 45
- OP:
- OP.CALL_API: 3
- OP.CREATE_COUNTER: 2
- OP.EXTRACT_COUNTER: 3
- OP.LOAD: 3
- OP.SSSA_CREATE: 2
- OP.SSSA_DELETE: 2
- OP.SSSA_LOAD: 2
- OP.STEP_COUNTER: 2
- OP.STORE: 3
- SA:
- T:
- T.RAM: 5
- T.RND: 3
- T.SPY: 5
|
- A:
- O:
- O.ACCESS: 7
- O.ADMINISTRATION: 10
- O.AUDIT: 9
- O.CRYPTOGRAPHY: 10
- O.CRYPTO_VALIDATED: 6
- O.ID_AUTH: 5
- O.INTEGRITY: 8
- O.PROTECT: 10
- O.TAMPER_RESISTANCE: 6
- OE:
- OE.PERSON: 9
- OE.PROTECTION: 4
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 10
- AES-256: 4
- AES128: 2
- constructions:
|
- AES_competition:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 10
- fault injection: 1
- malfunction: 4
- physical tampering: 2
- SCA:
- Leak-Inherent: 17
- Physical Probing: 1
- Side-channel: 1
- physical probing: 4
- side-channel: 1
- other:
|
- FI:
- malfunction: 6
- physical tampering: 9
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS PUB 180-4: 1
- FIPS PUB 197: 2
- NIST:
- NIST SP 800-38A: 1
- NIST SP 800-38B: 2
- PKCS:
- SCP:
|
- FIPS:
- FIPS 140-2: 7
- FIPS 186-4: 1
- FIPS PUB 140-2: 1
- FIPS PUB 180-4: 1
- FIPS PUB 197: 2
- FIPS PUB 198: 2
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- out of scope: 2
- private, secure, and not exposed. Therefore, these underlying environmental components are out of scope insofar as the TOE is concerned. Further, EROAD security is stand alone, isolated, self-contained: 1
- protects and secures the OBU Gateway and communications with it, but that environment is out of scope insofar as the TOE is concerned. ESP Server The ESP server and associated protocol (Ebox to Server: 1
|
pdf_data/st_metadata |
- /Author: Huawei Technologies Co.,Ltd.
- /CreationDate: D:20200813194745+08'00'
- /Creator: Microsoft® Word 2013
- /ModDate: D:20200813194745+08'00'
- /Producer: Microsoft® Word 2013
- /Subject: Technical Document
- /Title: MSP V1.0 on Kirin 9000 Series Security Target
- pdf_file_size_bytes: 1393685
- pdf_hyperlinks: http://www.hisilicon.com/cn/, mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 76
|
- /Author: Admin
- /CreationDate: D:20150618214315-07'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20150618214315-07'00'
- /Producer: GPL Ghostscript 8.64
- /Title: Microsoft Word - ST EROAD v1.3 - FINAL.docx
- pdf_file_size_bytes: 1236897
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 42
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |