Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

IBM AIX 5L for POWER V5.3, Technology level 5300-05-02 with Argus Systems Group PitBull Foundation Suite 5.0 and optional IBM Virtual IO Server (VIOS) Version 1.3
BSI-DSZ-CC-0396-2007
IAS Classic v5.0 with MOC Server v3.0 on MultiApp v4.2 Version 5.0.0.A.C, version 3.0.1A
ANSSI-CC-2020/70
name IBM AIX 5L for POWER V5.3, Technology level 5300-05-02 with Argus Systems Group PitBull Foundation Suite 5.0 and optional IBM Virtual IO Server (VIOS) Version 1.3 IAS Classic v5.0 with MOC Server v3.0 on MultiApp v4.2 Version 5.0.0.A.C, version 3.0.1A
category Operating Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
not_valid_before 2007-01-16 2020-11-09
not_valid_after 2019-09-01 2025-11-09
scheme DE FR
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0396b.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2020_70en.pdf
status archived active
manufacturer Innovative Security Systems, Inc. Thales
manufacturer_web https://www.innovativesecurity.com/ None
security_level ALC_FLR.1, EAL4+ EAL5+, AVA_VAN.5
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0396a.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_70fr.pdf
cert_link None https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-ANSSI-CC-2020_70.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 6: Extension for device with key impo...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0076b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 3: Device with key import', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0075b_pdf.pdf', 'pp_ids': frozenset({'PP_SSCD_PART3_V1.0.2'})}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 5: Extension for device with key gene...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0072b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Version...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 4: Extension for device with key gene...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0071b_pdf.pdf', 'pp_ids': None})
state/cert/convert_ok False True
state/cert/download_ok False True
state/cert/extract_ok False True
state/cert/pdf_hash None 81f0241a22b27bf2b7cafb95052cb6f597d94219592876e644c81d3db5a3d3a0
state/cert/txt_hash None e724185eca5b3d9978cd1e81413d6df476363ef7e08ef00e0150e9aad9086d3b
state/report/pdf_hash 715d164cbcb9d0971bea3a8fc89fda0c488df24456ca8953463436bb90c2df05 d8b808f81402cca7b6187350035c6f3ceec10dfd11520e514a768a2654f3b629
state/report/txt_hash e672f8fbd89a5a7c70a3d14b837e1f13d54998f5a36a32058ffcd569c720344e e8fd8b545af3f27152a98d8a6f3484c836cb9a5cd62f9714008c6c175ff9f6da
state/st/pdf_hash f05e3c43e3a8812e91452c03ed331347fd61413d1e7829831d322fdb77ceb913 637fd2ad882d71a4c2a35cc3175351eb83cae0e5c51419fdffcf3847c9eda56f
state/st/txt_hash fd7f9171d7f0067cd6d0b85f01fb0baefce651091496535c34793dd5c9e6948c c77e574c9a5cdcd224aca9c8a258dc8690748fccbb269a4bc539e6255db6b40e
heuristics/cert_id BSI-DSZ-CC-0396-2007 ANSSI-CC-2020/70
heuristics/cert_lab BSI None
heuristics/extracted_sars ASE_ENV.1, ADV_FSP.2, ALC_TAT.1, ALC_DVS.1, AGD_ADM.1, AVA_MSU.2, ADV_HLD.2, ALC_FLR.1, ASE_OBJ.1, ASE_TSS.1, ATE_COV.2, ALC_LCD.1, ADV_RCR.1, AVA_SOF.1, ATE_FUN.1, ATE_DPT.1, AVA_VLA.2, ATE_IND.2, ASE_PPC.1, ADV_IMP.1, ASE_DES.1, ASE_INT.1, ASE_SRE.1, ASE_REQ.1, ADV_SPM.1, AGD_USR.1, ADV_LLD.1 ALC_DVS.2, AVA_VAN.5
heuristics/report_references/directly_referencing BSI-DSZ-CC-0303-2006 ANSSI-CC-2020/65
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-0194-2002, BSI-DSZ-CC-0217-2003, BSI-DSZ-CC-0302-2005, BSI-DSZ-CC-0303-2006 ANSSI-CC-2020/65
heuristics/scheme_data None
  • product: MultiApp V4.2 ID version 4.2.1
  • url: https://cyber.gouv.fr/produits-certifies/multiapp-v42-id-version-421
  • description: Le produit évalué est « MultiApp V4.2 ID, version 4.2.1 » développé par THALES DIS et INFINEON TECHNOLOGIES AG. Ce produit est destiné à héberger et exécuter une ou plusieurs applications, dites applets dans la terminologie Java Card. Ces applications peuvent revêtir un caractère sécuritaire différent (selon qu’elles soient « sensibles » ou « basiques ») et peuvent être chargées et instanciées av
  • sponsor: THALES DIS & INFINEON TECHNOLOGIES AG
  • developer: THALES DIS & INFINEON TECHNOLOGIES AG
  • cert_id: 2021/41
  • level: EAL5+
  • expiration_date: 23 Septembre 2026
  • enhanced:
    • cert_id: 2021/41
    • certification_date: 23/09/2021
    • expiration_date: 23/09/2026
    • category: Cartes à puce
    • cc_version: Critères Communs version 3.1r5
    • developer: THALES DIS & INFINEON TECHNOLOGIES AG
    • sponsor: THALES DIS & INFINEON TECHNOLOGIES AG
    • evaluation_facility: SERMA SAFETY & SECURITY
    • level: EAL5+
    • protection_profile: Java Card System – Open Configuration Protection Profil, version 3.0.5
    • mutual_recognition: SOG-IS CCRA
    • augmented: ALC_DVS.2, AVA_VAN.5
    • target_link: https://cyber.gouv.fr/sites/default/files/2021/10/anssi-cible-cc-2021_41en.pdf
    • cert_link: https://cyber.gouv.fr/sites/default/files/2021/10/certificat-2021_41.pdf
    • report_link: https://cyber.gouv.fr/sites/default/files/2021/10/anssi-cc-2021_41.pdf
heuristics/st_references/directly_referencing None BSI-DSZ-CC-1079-2018
heuristics/st_references/indirectly_referencing None BSI-DSZ-CC-1079-2018
pdf_data/cert_filename None certificat-ANSSI-CC-2020_70.pdf
pdf_data/cert_keywords None
  • cc_cert_id:
    • FR:
      • ANSSI-CC-2020/70: 2
  • cc_protection_profile_id:
    • BSI:
      • BSI-CC-PP-0059-2009-MA-02: 1
      • BSI-CC-PP-0075-2012-MA-01: 1
      • BSI-CC-PP-0071-2012-MA-01: 1
      • BSI-CC-PP-0072-2012-MA-01: 1
      • BSI-CC-PP-0076-2013-MA-01: 1
  • cc_security_level:
    • EAL:
      • EAL5: 1
      • EAL2: 1
  • cc_sar:
    • ALC:
      • ALC_DVS.2: 1
    • AVA:
      • AVA_VAN.5: 1
  • cc_sfr:
  • cc_claims:
    • A:
      • A.C: 1
  • vendor:
  • eval_facility:
    • Serma:
      • SERMA: 2
  • symmetric_crypto:
  • asymmetric_crypto:
  • pq_crypto:
  • hash_function:
  • crypto_scheme:
  • crypto_protocol:
  • randomness:
  • cipher_mode:
  • ecc_curve:
  • crypto_engine:
  • tls_cipher_suite:
  • crypto_library:
  • vulnerability:
  • side_channel_analysis:
  • technical_report_id:
  • device_model:
  • tee_name:
  • os_name:
  • cplc_data:
  • ic_data_group:
  • standard_id:
  • javacard_version:
  • javacard_api_const:
  • javacard_packages:
  • certification_process:
pdf_data/cert_metadata None
  • pdf_file_size_bytes: 268004
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
  • /Author:
  • /CreationDate: D:20201116103334+01'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20201116103334+01'00'
  • /Producer: Acrobat Distiller 11.0 (Windows)
  • /Title:
  • pdf_hyperlinks:
pdf_data/report_filename 0396a.pdf anssi-cc-2020_70fr.pdf
pdf_data/report_frontpage
  • DE:
    • match_rules: (BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)
    • cert_id: BSI-DSZ-CC-0396-2007
    • cert_item: AIX 5L for POWER V5.3 with Technology Package 5300-05-02 with Argus Systems Group PitBull Foundation 5.0 and the Virtual IO Server (VIOS) Version 1.3
    • developer: Innovative Security Systems, Inc. sponsored by IBM Corporation
    • cert_lab: BSI
  • FR:
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0396-2007: 25
    • BSI-DSZ-CC-0303-2006: 4
    • BSI-DSZ-CC-0396: 1
  • DE:
    • BSI-DSZ-CC-1079-2018-MA-01: 1
  • FR:
    • ANSSI-CC-2020/70: 2
    • ANSSI-CC-2020/65: 2
pdf_data/report_keywords/cc_cert_id/DE
  • BSI-DSZ-CC-0396-2007: 25
  • BSI-DSZ-CC-0303-2006: 4
  • BSI-DSZ-CC-0396: 1
  • BSI-DSZ-CC-1079-2018-MA-01: 1
pdf_data/report_keywords/cc_claims
  • T:
    • T.UAUSER: 1
    • T.UAACCESS: 1
    • T.UAACTION: 1
    • T.VIOS: 1
  • A:
    • A.MANAGE: 1
    • A.NO_EVIL_ADMIN: 1
    • A.COOP: 1
    • A.UTRAIN: 1
    • A.UTRUST: 1
    • A.LOCATE: 1
    • A.PROTECT: 1
    • A.NET_COMP: 1
    • A.PEER: 1
    • A.CONNECT: 1
  • A:
    • A.C: 4
pdf_data/report_keywords/cc_claims/A
  • A.MANAGE: 1
  • A.NO_EVIL_ADMIN: 1
  • A.COOP: 1
  • A.UTRAIN: 1
  • A.UTRUST: 1
  • A.LOCATE: 1
  • A.PROTECT: 1
  • A.NET_COMP: 1
  • A.PEER: 1
  • A.CONNECT: 1
  • A.C: 4
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0059-2009-MA-02: 2
    • BSI-CC-PP-0075-2012-MA-01: 2
    • BSI-CC-PP-0071-2012-MA-01: 2
    • BSI-CC-PP-0072-2012-MA-01: 2
    • BSI-CC-PP-0076-2013-MA-01: 2
    • BSI-PP-0084-2014: 1
  • other:
    • PP-SSCD-Part2: 1
    • PP-SSCD-Part3: 1
    • PP-SSCD-Part4: 1
    • PP-SSCD-Part5: 1
    • PP-SSCD-: 5
pdf_data/report_keywords/cc_sar
  • ACM:
    • ACM_AUT.1: 1
    • ACM_CAP.4: 1
    • ACM_SCP.2: 1
    • ACM_AUT: 2
    • ACM_CAP: 2
    • ACM_SCP: 2
  • ADO:
    • ADO_DEL.2: 1
    • ADO_IGS.1: 1
    • ADO_DEL: 2
    • ADO_IGS: 2
  • ADV:
    • ADV_FSP.2: 1
    • ADV_HLD.2: 1
    • ADV_IMP.1: 1
    • ADV_LLD.1: 1
    • ADV_RCR.1: 1
    • ADV_FSP: 2
    • ADV_HLD: 2
    • ADV_IMP: 2
    • ADV_INT: 2
    • ADV_LLD: 2
    • ADV_RCR: 2
    • ADV_SPM: 2
  • AGD:
    • AGD_ADM.1: 1
    • AGD_USR.1: 1
    • AGD_ADM: 2
    • AGD_USR: 2
  • ALC:
    • ALC_FLR.1: 6
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
    • ALC_DVS: 2
    • ALC_FLR: 2
    • ALC_LCD: 1
    • ALC_TAT: 2
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.2: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
    • ATE_COV: 2
    • ATE_DPT: 2
    • ATE_FUN: 2
    • ATE_IND: 2
  • AVA:
    • AVA_VLA.2: 4
    • AVA_MSU.2: 1
    • AVA_SOF.1: 1
    • AVA_CCA: 2
    • AVA_MSU: 2
    • AVA_SOF: 3
    • AVA_VLA: 3
    • AVA_VLA.3: 1
    • AVA_VLA.4: 1
  • ASE:
    • ASE_DES.1: 1
    • ASE_ENV.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_PPC.1: 1
    • ASE_REQ.1: 1
    • ASE_SRE.1: 1
    • ASE_TSS.1: 1
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_CPS: 2
    • AGD_OPE: 1
    • AGD_PRE: 1
    • AGD_PRE_OPE: 1
    • AGD_USE: 1
  • ALC:
    • ALC_DVS.2: 3
    • ALC_FLR: 2
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_TAT: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN.5: 5
    • AVA_VAN: 2
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
pdf_data/report_keywords/cc_sar/ADV
  • ADV_FSP.2: 1
  • ADV_HLD.2: 1
  • ADV_IMP.1: 1
  • ADV_LLD.1: 1
  • ADV_RCR.1: 1
  • ADV_FSP: 2
  • ADV_HLD: 2
  • ADV_IMP: 2
  • ADV_INT: 2
  • ADV_LLD: 2
  • ADV_RCR: 2
  • ADV_SPM: 2
  • ADV_ARC: 1
  • ADV_FSP: 1
  • ADV_IMP: 1
  • ADV_INT: 1
  • ADV_SPM: 1
  • ADV_TDS: 1
pdf_data/report_keywords/cc_sar/ADV/ADV_FSP 2 1
pdf_data/report_keywords/cc_sar/ADV/ADV_IMP 2 1
pdf_data/report_keywords/cc_sar/ADV/ADV_INT 2 1
pdf_data/report_keywords/cc_sar/ADV/ADV_SPM 2 1
pdf_data/report_keywords/cc_sar/AGD
  • AGD_ADM.1: 1
  • AGD_USR.1: 1
  • AGD_ADM: 2
  • AGD_USR: 2
  • AGD_CPS: 2
  • AGD_OPE: 1
  • AGD_PRE: 1
  • AGD_PRE_OPE: 1
  • AGD_USE: 1
pdf_data/report_keywords/cc_sar/ALC
  • ALC_FLR.1: 6
  • ALC_DVS.1: 1
  • ALC_LCD.1: 1
  • ALC_TAT.1: 1
  • ALC_DVS: 2
  • ALC_FLR: 2
  • ALC_LCD: 1
  • ALC_TAT: 2
  • ALC_DVS.2: 3
  • ALC_FLR: 2
  • ALC_CMC: 1
  • ALC_CMS: 1
  • ALC_DEL: 1
  • ALC_DVS: 1
  • ALC_TAT: 1
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS 2 1
pdf_data/report_keywords/cc_sar/ALC/ALC_TAT 2 1
pdf_data/report_keywords/cc_sar/ASE
  • ASE_DES.1: 1
  • ASE_ENV.1: 1
  • ASE_INT.1: 1
  • ASE_OBJ.1: 1
  • ASE_PPC.1: 1
  • ASE_REQ.1: 1
  • ASE_SRE.1: 1
  • ASE_TSS.1: 1
  • ASE_CCL: 1
  • ASE_ECD: 1
  • ASE_INT: 1
  • ASE_OBJ: 1
  • ASE_REQ: 1
  • ASE_SPD: 1
  • ASE_TSS: 1
pdf_data/report_keywords/cc_sar/ATE
  • ATE_COV.2: 1
  • ATE_DPT.2: 1
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
  • ATE_COV: 2
  • ATE_DPT: 2
  • ATE_FUN: 2
  • ATE_IND: 2
  • ATE_COV: 1
  • ATE_DPT: 1
  • ATE_FUN: 1
  • ATE_IND: 1
pdf_data/report_keywords/cc_sar/ATE/ATE_COV 2 1
pdf_data/report_keywords/cc_sar/ATE/ATE_DPT 2 1
pdf_data/report_keywords/cc_sar/ATE/ATE_FUN 2 1
pdf_data/report_keywords/cc_sar/ATE/ATE_IND 2 1
pdf_data/report_keywords/cc_sar/AVA
  • AVA_VLA.2: 4
  • AVA_MSU.2: 1
  • AVA_SOF.1: 1
  • AVA_CCA: 2
  • AVA_MSU: 2
  • AVA_SOF: 3
  • AVA_VLA: 3
  • AVA_VLA.3: 1
  • AVA_VLA.4: 1
  • AVA_VAN.5: 5
  • AVA_VAN: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL4: 11
    • EAL 1: 1
    • EAL 7: 1
    • EAL 4: 1
    • EAL1: 5
    • EAL3: 4
    • EAL5: 6
    • EAL7: 4
    • EAL2: 3
    • EAL6: 3
    • EAL4 augmented: 3
  • EAL:
    • EAL 5: 3
    • EAL2: 2
    • EAL5: 1
    • EAL7: 1
    • EAL 1: 1
    • EAL 3: 1
    • EAL 7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_security_level/EAL
  • EAL4: 11
  • EAL 1: 1
  • EAL 7: 1
  • EAL 4: 1
  • EAL1: 5
  • EAL3: 4
  • EAL5: 6
  • EAL7: 4
  • EAL2: 3
  • EAL6: 3
  • EAL4 augmented: 3
  • EAL 5: 3
  • EAL2: 2
  • EAL5: 1
  • EAL7: 1
  • EAL 1: 1
  • EAL 3: 1
  • EAL 7: 1
pdf_data/report_keywords/cc_security_level/EAL/EAL2 3 2
pdf_data/report_keywords/cc_security_level/EAL/EAL5 6 1
pdf_data/report_keywords/cc_security_level/EAL/EAL7 4 1
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 1
    • FAU_GEN.2: 1
    • FAU_SAR.1: 1
    • FAU_SAR.2: 1
    • FAU_SAR.3: 1
    • FAU_SEL.1: 1
    • FAU_STG.1: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 1
  • FDP:
    • FDP_ACC.1: 6
    • FDP_ACF.1: 6
    • FDP_ETC.1: 1
    • FDP_ETC.2: 1
    • FDP_IFC.1: 3
    • FDP_IFF.2: 3
    • FDP_ITC.1: 1
    • FDP_ITC.2: 1
    • FDP_RIP.2: 1
    • FDP_RIP: 1
  • FIA:
    • FIA_ATD.1: 2
    • FIA_SOS.1: 1
    • FIA_UAU.2: 1
    • FIA_UAU.7: 1
    • FIA_UID.2: 2
    • FIA_USB.1: 2
  • FMT:
    • FMT_MSA.1: 6
    • FMT_MSA.3: 7
    • FMT_MTD.1: 7
    • FMT_REV.1: 3
    • FMT_SMF.1: 1
    • FMT_SMR.1: 2
  • FPT:
    • FPT_AMT.1: 1
    • FPT_RVM.1: 1
    • FPT_SEP.1: 1
    • FPT_STM.1: 1
    • FPT_TDC.1: 1
    • FPT_TST.1: 1
    • FPT_RVM: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Technical Report BSI-DSZ-CC-0396, Release 2, 2006-12-21, atsec information security GmbH (confidential document) [8] Labeled Security Protection Profile (LSPP), Issue 1.b, 8 October 1999 User Guidance: 1
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 5
pdf_data/report_keywords/eval_facility
  • atsec:
    • atsec: 5
  • Serma:
    • SERMA: 2
    • Serma Safety & Security: 15
  • CESTI:
    • CESTI: 1
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 34: 1
  • ISO:
    • ISO/IEC 15408:2005: 2
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI 7149: 1
pdf_data/report_keywords/vendor
  • Infineon:
    • Infineon Technologies AG: 1
pdf_data/report_metadata
  • pdf_file_size_bytes: 348875
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 52
  • /CreationDate: D:20070118130925+01'00'
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /Creator: Acrobat PDFMaker 7.0.7 für Word
  • /Keywords: Common Criteria, Certification, Zertifizierung; AIX 5L for POWER V5.3,Innovative Security Systems, Inc., IBM Corporation,
  • /Producer: Acrobat Distiller 7.0.5 (Windows)
  • /ModDate: D:20070308085123+01'00'
  • /Company: BSI, Postfach 200363, 53133 Bonn
  • /SourceModified: D:20070118120750
  • /Title: Certification Report BSI-DSZ-CC-0396-2007
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 155220
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 16
  • /Author:
  • /CreationDate: D:20210120173222+01'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20210120173222+01'00'
  • /Producer: Acrobat Distiller 11.0 (Windows)
  • /Title:
  • pdf_hyperlinks:
pdf_data/report_metadata//Author Bundesamt für Sicherheit in der Informationstechnik
pdf_data/report_metadata//CreationDate D:20070118130925+01'00' D:20210120173222+01'00'
pdf_data/report_metadata//Creator Acrobat PDFMaker 7.0.7 für Word PScript5.dll Version 5.2.2
pdf_data/report_metadata//ModDate D:20070308085123+01'00' D:20210120173222+01'00'
pdf_data/report_metadata//Producer Acrobat Distiller 7.0.5 (Windows) Acrobat Distiller 11.0 (Windows)
pdf_data/report_metadata//Title Certification Report BSI-DSZ-CC-0396-2007
pdf_data/report_metadata/pdf_file_size_bytes 348875 155220
pdf_data/report_metadata/pdf_number_of_pages 52 16
pdf_data/st_filename 0396b.pdf anssi-cible-cc-2020_70en.pdf
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 1
    • ECC:
      • ECC: 2
  • FF:
    • DH:
      • Diffie-Hellman: 2
      • DH: 2
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1079-2018: 1
    • BSI-DSZ-CC-1079-2018-MA-01: 1
  • NL:
    • CC-1: 2
    • CC-2: 3
    • CC-3: 3
pdf_data/st_keywords/cc_claims
  • O:
    • O.AUDITING: 23
    • O.AUTHORIZATION: 22
    • O.DISCRETIONARY_ACCESS: 13
    • O.ENFORCEMENT: 17
    • O.ERASE: 8
    • O.MANAGE: 21
    • O.MANDATORY_ACCESS: 13
    • O.MANDATORY_INTEGRITY: 10
    • O.NETWORK_ACCESS: 13
    • O.RESIDUAL_INFORMATION: 11
    • O.TCB_ACCESS: 13
    • O.STACK: 12
    • O.VIOS: 12
  • T:
    • T.UAACCESS: 7
    • T.UAACTION: 5
    • T.UAUSER: 7
    • T.VIOS: 4
  • A:
    • A.LOCATE: 4
    • A.PROTECT: 6
    • A.COOP: 4
    • A.MANAGE: 5
    • A.NO_EVIL_ADM: 3
    • A.UTRAIN: 6
    • A.UTRUST: 6
    • A.CONNECT: 8
    • A.NET_COMP: 6
    • A.PEER: 4
    • A.CLEARANCE: 3
    • A.SENSITIVITY: 3
  • OE:
    • OE.ADMIN: 7
    • OE.CREDEN: 4
    • OE.HW_SEP: 9
    • OE.INFO_PROTECT: 15
    • OE.INSTALL: 14
    • OE.MAINTENANCE: 5
    • OE.PHYSICAL: 8
    • OE.RECOVER: 7
    • OE.SERIAL_LOGIN: 5
    • OE.SOFTWARE_IN: 5
    • OE.PROTECT: 10
    • OE.LPAR: 9
  • O:
    • O.SID: 1
    • O.CIPHER: 1
    • O.KEY-MNGT: 1
    • O.REALLOCATION: 1
    • O.GLOBAL_ARRAYS_IN: 1
    • O.GLOBAL_ARRAYS_C: 1
    • O.PIN-MNGT: 1
    • O.OPERATE: 1
    • O.ALARM: 1
    • O.OBJ-DELETION: 1
    • O.SCP: 3
    • O.FIREWALL: 1
    • O.NATIVE: 1
    • O.RNG: 1
    • O.LOAD: 1
    • O.INSTALL: 1
    • O.DELETION: 1
    • O.TRANSACTION: 1
    • O.RESOURCES: 1
    • O.CARD-MANAGEMENT: 1
  • A:
    • A.C: 5
    • A.CGA: 2
    • A.SCA: 2
    • A.CSP: 3
    • A.APPLET: 2
    • A.VERIFICATION: 2
  • OE:
    • OE.HI_VAD: 2
    • OE.VERIFICATION: 5
    • OE.APPLET: 2
    • OE.CODE-EVIDENCE: 2
    • OE.HID_VAD: 1
pdf_data/st_keywords/cc_claims/A
  • A.LOCATE: 4
  • A.PROTECT: 6
  • A.COOP: 4
  • A.MANAGE: 5
  • A.NO_EVIL_ADM: 3
  • A.UTRAIN: 6
  • A.UTRUST: 6
  • A.CONNECT: 8
  • A.NET_COMP: 6
  • A.PEER: 4
  • A.CLEARANCE: 3
  • A.SENSITIVITY: 3
  • A.C: 5
  • A.CGA: 2
  • A.SCA: 2
  • A.CSP: 3
  • A.APPLET: 2
  • A.VERIFICATION: 2
pdf_data/st_keywords/cc_claims/O
  • O.AUDITING: 23
  • O.AUTHORIZATION: 22
  • O.DISCRETIONARY_ACCESS: 13
  • O.ENFORCEMENT: 17
  • O.ERASE: 8
  • O.MANAGE: 21
  • O.MANDATORY_ACCESS: 13
  • O.MANDATORY_INTEGRITY: 10
  • O.NETWORK_ACCESS: 13
  • O.RESIDUAL_INFORMATION: 11
  • O.TCB_ACCESS: 13
  • O.STACK: 12
  • O.VIOS: 12
  • O.SID: 1
  • O.CIPHER: 1
  • O.KEY-MNGT: 1
  • O.REALLOCATION: 1
  • O.GLOBAL_ARRAYS_IN: 1
  • O.GLOBAL_ARRAYS_C: 1
  • O.PIN-MNGT: 1
  • O.OPERATE: 1
  • O.ALARM: 1
  • O.OBJ-DELETION: 1
  • O.SCP: 3
  • O.FIREWALL: 1
  • O.NATIVE: 1
  • O.RNG: 1
  • O.LOAD: 1
  • O.INSTALL: 1
  • O.DELETION: 1
  • O.TRANSACTION: 1
  • O.RESOURCES: 1
  • O.CARD-MANAGEMENT: 1
pdf_data/st_keywords/cc_claims/OE
  • OE.ADMIN: 7
  • OE.CREDEN: 4
  • OE.HW_SEP: 9
  • OE.INFO_PROTECT: 15
  • OE.INSTALL: 14
  • OE.MAINTENANCE: 5
  • OE.PHYSICAL: 8
  • OE.RECOVER: 7
  • OE.SERIAL_LOGIN: 5
  • OE.SOFTWARE_IN: 5
  • OE.PROTECT: 10
  • OE.LPAR: 9
  • OE.HI_VAD: 2
  • OE.VERIFICATION: 5
  • OE.APPLET: 2
  • OE.CODE-EVIDENCE: 2
  • OE.HID_VAD: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0059-2009-MA-02: 1
    • BSI-CC-PP-0075-2012-MA-01: 1
    • BSI-CC-PP-0071-2012-MA-01: 1
    • BSI-CC-PP-0072-2012-MA-01: 1
    • BSI-CC-PP-0076-2013-MA-01: 1
    • BSI-CC-PP-0084-2014: 1
  • other:
    • PP-SSCD-KG: 41
    • PP-SSCD-KI: 30
    • PP-SSCD: 4
    • PP-SSCD-: 1
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_AUT.1: 1
    • ACM_CAP.4: 1
    • ACM_SCP.2: 2
  • ADO:
    • ADO_DEL.2: 1
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP.2: 1
    • ADV_HLD.2: 1
    • ADV_IMP.1: 1
    • ADV_LLD.1: 1
    • ADV_RCR.1: 1
    • ADV_SPM.1: 1
  • AGD:
    • AGD_ADM.1: 1
    • AGD_USR.1: 1
  • ALC:
    • ALC_FLR.1: 8
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_MSU.2: 1
    • AVA_SOF.1: 1
    • AVA_VLA.2: 1
  • ALC:
    • ALC_DVS.2: 3
  • AVA:
    • AVA_VAN.5: 3
pdf_data/st_keywords/cc_sar/ALC
  • ALC_FLR.1: 8
  • ALC_DVS.1: 1
  • ALC_LCD.1: 1
  • ALC_TAT.1: 1
  • ALC_DVS.2: 3
pdf_data/st_keywords/cc_sar/AVA
  • AVA_MSU.2: 1
  • AVA_SOF.1: 1
  • AVA_VLA.2: 1
  • AVA_VAN.5: 3
pdf_data/st_keywords/cc_security_level/EAL
  • EAL4: 7
  • EAL3: 3
  • EAL 4: 2
  • EAL4 augmented: 2
  • EAL 4 augmented: 1
  • EAL 5+: 2
  • EAL6: 1
  • EAL6+: 1
  • EAL5: 3
  • EAL6 augmented: 1
  • EAL5 augmented: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 11
    • FAU_GEN.2: 12
    • FAU_SAR.1: 10
    • FAU_SAR.2: 13
    • FAU_SAR.3: 10
    • FAU_SEL.1: 10
    • FAU_STG.1: 8
    • FAU_STG.3: 8
    • FAU_STG.4: 8
    • FAU_GEN: 3
    • FAU_GEN.1.2: 1
    • FAU_GEN.2.1: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2.1: 1
    • FAU_SAR.3.1: 1
    • FAU_SEL.1.1: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3.1: 1
    • FAU_STG.4.1: 1
  • FDP:
    • FDP_RIP: 23
    • FDP_ACC.1: 78
    • FDP_ACF.1: 75
    • FDP_ETC.1: 9
    • FDP_ETC.2: 11
    • FDP_IFC.1: 49
    • FDP_IFF.2: 35
    • FDP_ITC.1: 9
    • FDP_ITC.2: 9
    • FDP_RIP.2: 13
    • FDP_ACC.1.1: 6
    • FDP_ACF.1.1: 6
    • FDP_ACF.1.2: 6
    • FDP_ACF.1.3: 7
    • FDP_ACF.1.4: 6
    • FDP_ETC.1.1: 1
    • FDP_ETC.1.2: 1
    • FDP_ETC.2.1: 1
    • FDP_ETC.2.2: 1
    • FDP_ETC.2.3: 1
    • FDP_ETC.2.4: 1
    • FDP_IFC.1.1: 3
    • FDP_IFF.2.1: 3
    • FDP_IFF.2.2: 6
    • FDP_IFF.2.3: 3
    • FDP_IFF.2.4: 3
    • FDP_IFF.2.5: 3
    • FDP_IFF.2.6: 3
    • FDP_IFF.2.7: 3
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITC.2.1: 1
    • FDP_ITC.2.2: 1
    • FDP_ITC.2.3: 1
    • FDP_ITC.2.4: 1
    • FDP_ITC.2.5: 1
    • FDP_MSA.3: 1
    • FDP_RIP.1: 1
    • FDP_IFF.1: 11
  • FIA:
    • FIA_UID.2: 23
    • FIA_ATD.1: 28
    • FIA_SOS.1: 13
    • FIA_UAU.2: 13
    • FIA_UAU.7: 11
    • FIA_USB.1: 25
    • FIA_UID: 1
    • FIA_ATD.1.1: 2
    • FIA_UAU.2.1: 1
    • FIA_UID.2.1: 2
    • FIA_UID.1: 8
    • FIA_USB.1.1: 2
    • FIA_USB.1.2: 2
    • FIA_USB.1.3: 2
    • FIA_UAU.1: 3
  • FMT:
    • FMT_SMR.1: 32
    • FMT_MSA.1: 63
    • FMT_MSA.3: 71
    • FMT_MTD.1: 63
    • FMT_REV.1: 28
    • FMT_SMF.1: 35
    • FMT_MOF.1: 1
    • FMT_MSA.1.1: 7
    • FMT_MSA.3.1: 8
    • FMT_MSA.3.2: 7
    • FMT_MTD.1.1: 8
    • FMT_REV.1.1: 3
    • FMT_REV.1.2: 3
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 2
  • FPT:
    • FPT_RVM: 19
    • FPT_AMT.1: 9
    • FPT_RVM.1: 10
    • FPT_SEP.1: 11
    • FPT_STM.1: 8
    • FPT_TDC.1: 10
    • FPT_TST.1: 11
    • FPT_AMT.1.1: 1
    • FPT_RVM.1.1: 1
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
    • FPT_STM.1.1: 1
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC.1: 1
  • FCS:
    • FCS_CKM: 43
    • FCS_CKM.4: 12
    • FCS_COP: 22
    • FCS_CKM.2: 4
    • FCS_COP.1: 6
    • FCS_CKM.1.1: 2
    • FCS_CKM.1: 13
    • FCS_CKM.4.1: 2
    • FCS_COP.1.1: 2
  • FDP:
    • FDP_DAU: 8
    • FDP_UIT: 7
    • FDP_ITC.1: 8
    • FDP_ITC.2: 8
    • FDP_ACC: 40
    • FDP_ACF.1: 10
    • FDP_ACC.1.1: 4
    • FDP_ACF: 27
    • FDP_ACC.1: 27
    • FDP_ACF.1.1: 4
    • FDP_ACF.1.2: 4
    • FDP_ACF.1.3: 4
    • FDP_ACF.1.4: 4
    • FDP_DAU.1: 1
    • FDP_DAU.2.1: 1
    • FDP_DAU.2.2: 1
    • FDP_ITC: 9
    • FDP_IFC.1: 18
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_RIP.1: 6
    • FDP_RIP.1.1: 1
    • FDP_SDI: 15
    • FDP_SDI.1: 2
    • FDP_SDI.2.1: 2
    • FDP_SDI.2.2: 2
    • FDP_UCT: 8
    • FDP_UCT.1.1: 1
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
    • FDP_AFC: 1
    • FDP_RIP: 1
  • FIA:
    • FIA_API: 5
    • FIA_AFL: 14
    • FIA_API.1: 12
    • FIA_API.1.1: 2
    • FIA_UAU.1: 7
    • FIA_UID.1: 10
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_UAU: 17
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UID: 17
    • FIA_UID.1.1: 2
    • FIA_UID.1.2: 2
  • FMT:
    • FMT_MSA.3: 11
    • FMT_MOF.1: 7
    • FMT_SMR.1: 34
    • FMT_SMF.1: 24
    • FMT_MOF.1.1: 1
    • FMT_MSA: 56
    • FMT_MSA.1.1: 3
    • FMT_MSA.2: 7
    • FMT_MSA.1: 6
    • FMT_MSA.2.1: 1
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MSA.4.1: 2
    • FMT_MTD: 14
    • FMT_MTD.1.1: 2
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_MSA.4: 2
  • FPT:
    • FPT_EMS: 5
    • FPT_EMS.1: 11
    • FPT_EMS.1.1: 4
    • FPT_EMS.1.2: 3
    • FPT_TST.1: 9
    • FPT_FLS.1: 7
    • FPT_FLS.1.1: 1
    • FPT_TST: 2
    • FPT_PHP.1: 6
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 7
    • FPT_PHP.3.1: 1
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 30
    • FTP_ITC.1: 4
    • FTP_TRP.1: 4
    • FTP_ITC.1.1: 4
    • FTP_ITC.1.2: 4
    • FTP_ITC.1.3: 4
    • FTP_ICT: 2
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_RIP: 23
  • FDP_ACC.1: 78
  • FDP_ACF.1: 75
  • FDP_ETC.1: 9
  • FDP_ETC.2: 11
  • FDP_IFC.1: 49
  • FDP_IFF.2: 35
  • FDP_ITC.1: 9
  • FDP_ITC.2: 9
  • FDP_RIP.2: 13
  • FDP_ACC.1.1: 6
  • FDP_ACF.1.1: 6
  • FDP_ACF.1.2: 6
  • FDP_ACF.1.3: 7
  • FDP_ACF.1.4: 6
  • FDP_ETC.1.1: 1
  • FDP_ETC.1.2: 1
  • FDP_ETC.2.1: 1
  • FDP_ETC.2.2: 1
  • FDP_ETC.2.3: 1
  • FDP_ETC.2.4: 1
  • FDP_IFC.1.1: 3
  • FDP_IFF.2.1: 3
  • FDP_IFF.2.2: 6
  • FDP_IFF.2.3: 3
  • FDP_IFF.2.4: 3
  • FDP_IFF.2.5: 3
  • FDP_IFF.2.6: 3
  • FDP_IFF.2.7: 3
  • FDP_ITC.1.1: 1
  • FDP_ITC.1.2: 1
  • FDP_ITC.1.3: 1
  • FDP_ITC.2.1: 1
  • FDP_ITC.2.2: 1
  • FDP_ITC.2.3: 1
  • FDP_ITC.2.4: 1
  • FDP_ITC.2.5: 1
  • FDP_MSA.3: 1
  • FDP_RIP.1: 1
  • FDP_IFF.1: 11
  • FDP_DAU: 8
  • FDP_UIT: 7
  • FDP_ITC.1: 8
  • FDP_ITC.2: 8
  • FDP_ACC: 40
  • FDP_ACF.1: 10
  • FDP_ACC.1.1: 4
  • FDP_ACF: 27
  • FDP_ACC.1: 27
  • FDP_ACF.1.1: 4
  • FDP_ACF.1.2: 4
  • FDP_ACF.1.3: 4
  • FDP_ACF.1.4: 4
  • FDP_DAU.1: 1
  • FDP_DAU.2.1: 1
  • FDP_DAU.2.2: 1
  • FDP_ITC: 9
  • FDP_IFC.1: 18
  • FDP_ITC.1.1: 1
  • FDP_ITC.1.2: 1
  • FDP_ITC.1.3: 1
  • FDP_RIP.1: 6
  • FDP_RIP.1.1: 1
  • FDP_SDI: 15
  • FDP_SDI.1: 2
  • FDP_SDI.2.1: 2
  • FDP_SDI.2.2: 2
  • FDP_UCT: 8
  • FDP_UCT.1.1: 1
  • FDP_UIT.1.1: 1
  • FDP_UIT.1.2: 1
  • FDP_AFC: 1
  • FDP_RIP: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 78 27
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1.1 6 4
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 75 10
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 6 4
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 6 4
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 7 4
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 6 4
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 49 18
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 9 8
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 9 8
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP 23 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 1 6
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_UID.2: 23
  • FIA_ATD.1: 28
  • FIA_SOS.1: 13
  • FIA_UAU.2: 13
  • FIA_UAU.7: 11
  • FIA_USB.1: 25
  • FIA_UID: 1
  • FIA_ATD.1.1: 2
  • FIA_UAU.2.1: 1
  • FIA_UID.2.1: 2
  • FIA_UID.1: 8
  • FIA_USB.1.1: 2
  • FIA_USB.1.2: 2
  • FIA_USB.1.3: 2
  • FIA_UAU.1: 3
  • FIA_API: 5
  • FIA_AFL: 14
  • FIA_API.1: 12
  • FIA_API.1.1: 2
  • FIA_UAU.1: 7
  • FIA_UID.1: 10
  • FIA_AFL.1.1: 2
  • FIA_AFL.1.2: 2
  • FIA_UAU: 17
  • FIA_UAU.1.1: 2
  • FIA_UAU.1.2: 2
  • FIA_UID: 17
  • FIA_UID.1.1: 2
  • FIA_UID.1.2: 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 3 7
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID 1 17
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 8 10
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_SMR.1: 32
  • FMT_MSA.1: 63
  • FMT_MSA.3: 71
  • FMT_MTD.1: 63
  • FMT_REV.1: 28
  • FMT_SMF.1: 35
  • FMT_MOF.1: 1
  • FMT_MSA.1.1: 7
  • FMT_MSA.3.1: 8
  • FMT_MSA.3.2: 7
  • FMT_MTD.1.1: 8
  • FMT_REV.1.1: 3
  • FMT_REV.1.2: 3
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 2
  • FMT_SMR.1.2: 2
  • FMT_MSA.3: 11
  • FMT_MOF.1: 7
  • FMT_SMR.1: 34
  • FMT_SMF.1: 24
  • FMT_MOF.1.1: 1
  • FMT_MSA: 56
  • FMT_MSA.1.1: 3
  • FMT_MSA.2: 7
  • FMT_MSA.1: 6
  • FMT_MSA.2.1: 1
  • FMT_MSA.3.1: 2
  • FMT_MSA.3.2: 2
  • FMT_MSA.4.1: 2
  • FMT_MTD: 14
  • FMT_MTD.1.1: 2
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_MSA.4: 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_MOF.1 1 7
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 63 6
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1.1 7 3
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 71 11
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.1 8 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.2 7 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1.1 8 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 35 24
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 32 34
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.1 2 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.2 2 1
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_RVM: 19
  • FPT_AMT.1: 9
  • FPT_RVM.1: 10
  • FPT_SEP.1: 11
  • FPT_STM.1: 8
  • FPT_TDC.1: 10
  • FPT_TST.1: 11
  • FPT_AMT.1.1: 1
  • FPT_RVM.1.1: 1
  • FPT_SEP.1.1: 1
  • FPT_SEP.1.2: 1
  • FPT_STM.1.1: 1
  • FPT_TDC.1.1: 1
  • FPT_TDC.1.2: 1
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
  • FPT_EMS: 5
  • FPT_EMS.1: 11
  • FPT_EMS.1.1: 4
  • FPT_EMS.1.2: 3
  • FPT_TST.1: 9
  • FPT_FLS.1: 7
  • FPT_FLS.1.1: 1
  • FPT_TST: 2
  • FPT_PHP.1: 6
  • FPT_PHP.1.1: 1
  • FPT_PHP.1.2: 1
  • FPT_PHP.3: 7
  • FPT_PHP.3.1: 1
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 11 9
pdf_data/st_keywords/cc_sfr/FTP
  • FTP_ITC.1: 1
  • FTP_ITC: 30
  • FTP_ITC.1: 4
  • FTP_TRP.1: 4
  • FTP_ITC.1.1: 4
  • FTP_ITC.1.2: 4
  • FTP_ITC.1.3: 4
  • FTP_ICT: 2
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 1 4
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • data by authorized users. The functionalities of IAS Classic 5.0 other than the ones from SSCD are out of scope of the TOE perimeter. For BioPIN (MOC Server v3.0 application) provides biometry recognition with: 1
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 9
pdf_data/st_keywords/crypto_scheme/MAC/MAC 88 3
pdf_data/st_keywords/eval_facility
  • atsec:
    • atsec: 8
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 3
    • RND: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 8
  • SCA:
    • SPA: 1
    • DPA: 1
    • timing attacks: 1
  • FI:
    • physical tampering: 4
    • DFA: 1
    • fault induction: 1
    • fault injection: 1
pdf_data/st_keywords/side_channel_analysis/FI
  • malfunction: 8
  • physical tampering: 4
  • DFA: 1
  • fault induction: 1
  • fault injection: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 189: 1
    • FIPS PUB 188: 2
  • BSI:
    • AIS 32: 3
  • RFC:
    • RFC 1108: 1
  • ISO:
    • ISO/IEC 9945-2: 1
  • CC:
    • CCIMB-2005-08-001: 1
    • CCIMB-2005-08-002: 1
    • CCIMB-2005-08-003: 1
    • CCIMB-2005-08-004: 1
  • FIPS:
    • FIPS197: 2
  • PKCS:
    • PKCS#3: 3
    • PKCS#1: 2
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2012-04-003: 1
    • CCMB-2017-04-004: 1
pdf_data/st_keywords/standard_id/CC
  • CCIMB-2005-08-001: 1
  • CCIMB-2005-08-002: 1
  • CCIMB-2005-08-003: 1
  • CCIMB-2005-08-004: 1
  • CCMB-2017-04-001: 1
  • CCMB-2017-04-002: 1
  • CCMB-2012-04-003: 1
  • CCMB-2017-04-004: 1
pdf_data/st_keywords/standard_id/FIPS
  • FIPS PUB 189: 1
  • FIPS PUB 188: 2
  • FIPS197: 2
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 6
  • DES:
    • DES:
      • DES: 1
    • 3DES:
      • TDES: 4
pdf_data/st_keywords/vendor
  • Infineon:
    • Infineon: 9
    • Infineon Technologies AG: 2
  • Gemalto:
    • Gemalto: 7
pdf_data/st_metadata
  • pdf_file_size_bytes: 1404682
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 125
  • /CreationDate: D:20070306161211Z
  • /Author: atsec
  • /Creator: Microsoft® Office Word 2007
  • /Producer: Microsoft® Office Word 2007
  • /ModDate: D:20070308084600+01'00'
  • /Title: IBM AIX V5.3 w/PitBull Foundation r5.0 and opt VIOS Security Target
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 1479421
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 64
  • /Title: MultiApp V4.2: IAS EN Core & Extensions Security Target Lite
  • /Author: D1491739
  • /Subject: 1.7p
  • /Keywords: 31-08-2020
  • /Creator: Microsoft® Word 2013
  • /CreationDate: D:20200831164824+02'00'
  • /ModDate: D:20200831164824+02'00'
  • /Producer: Microsoft® Word 2013
  • pdf_hyperlinks:
pdf_data/st_metadata//Author atsec D1491739
pdf_data/st_metadata//CreationDate D:20070306161211Z D:20200831164824+02'00'
pdf_data/st_metadata//Creator Microsoft® Office Word 2007 Microsoft® Word 2013
pdf_data/st_metadata//ModDate D:20070308084600+01'00' D:20200831164824+02'00'
pdf_data/st_metadata//Producer Microsoft® Office Word 2007 Microsoft® Word 2013
pdf_data/st_metadata//Title IBM AIX V5.3 w/PitBull Foundation r5.0 and opt VIOS Security Target MultiApp V4.2: IAS EN Core & Extensions Security Target Lite
pdf_data/st_metadata/pdf_file_size_bytes 1404682 1479421
pdf_data/st_metadata/pdf_number_of_pages 125 64
dgst 059ec6ad2ed1bf9e 10726d62cf7a8b30