name |
IBM AIX 5L for POWER V5.3, Technology level 5300-05-02 with Argus Systems Group PitBull Foundation Suite 5.0 and optional IBM Virtual IO Server (VIOS) Version 1.3
|
IAS Classic v5.0 with MOC Server v3.0 on MultiApp v4.2 Version 5.0.0.A.C, version 3.0.1A
|
category |
Operating Systems
|
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
not_valid_before |
2007-01-16
|
2020-11-09
|
not_valid_after |
2019-09-01
|
2025-11-09
|
scheme |
DE
|
FR
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0396b.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2020_70en.pdf
|
status |
archived
|
active
|
manufacturer |
Innovative Security Systems, Inc.
|
Thales
|
manufacturer_web |
https://www.innovativesecurity.com/
|
None
|
security_level |
ALC_FLR.1, EAL4+ |
EAL5+, AVA_VAN.5 |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0396a.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_70fr.pdf
|
cert_link |
None
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-ANSSI-CC-2020_70.pdf
|
protection_profiles |
|
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 6: Extension for device with key impo...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0076b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 3: Device with key import', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0075b_pdf.pdf', 'pp_ids': frozenset({'PP_SSCD_PART3_V1.0.2'})}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 5: Extension for device with key gene...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0072b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Version...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 4: Extension for device with key gene...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0071b_pdf.pdf', 'pp_ids': None}) |
maintenance_updates |
|
|
state/cert/convert_garbage |
False
|
False
|
state/cert/convert_ok |
False
|
True
|
state/cert/download_ok |
False
|
True
|
state/cert/extract_ok |
False
|
True
|
state/cert/pdf_hash |
None
|
81f0241a22b27bf2b7cafb95052cb6f597d94219592876e644c81d3db5a3d3a0
|
state/cert/txt_hash |
None
|
e724185eca5b3d9978cd1e81413d6df476363ef7e08ef00e0150e9aad9086d3b
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
715d164cbcb9d0971bea3a8fc89fda0c488df24456ca8953463436bb90c2df05
|
d8b808f81402cca7b6187350035c6f3ceec10dfd11520e514a768a2654f3b629
|
state/report/txt_hash |
e672f8fbd89a5a7c70a3d14b837e1f13d54998f5a36a32058ffcd569c720344e
|
e8fd8b545af3f27152a98d8a6f3484c836cb9a5cd62f9714008c6c175ff9f6da
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
f05e3c43e3a8812e91452c03ed331347fd61413d1e7829831d322fdb77ceb913
|
637fd2ad882d71a4c2a35cc3175351eb83cae0e5c51419fdffcf3847c9eda56f
|
state/st/txt_hash |
fd7f9171d7f0067cd6d0b85f01fb0baefce651091496535c34793dd5c9e6948c
|
c77e574c9a5cdcd224aca9c8a258dc8690748fccbb269a4bc539e6255db6b40e
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
BSI-DSZ-CC-0396-2007
|
ANSSI-CC-2020/70
|
heuristics/cert_lab |
BSI |
None
|
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_sars |
ASE_ENV.1, ADV_FSP.2, ALC_TAT.1, ALC_DVS.1, AGD_ADM.1, AVA_MSU.2, ADV_HLD.2, ALC_FLR.1, ASE_OBJ.1, ASE_TSS.1, ATE_COV.2, ALC_LCD.1, ADV_RCR.1, AVA_SOF.1, ATE_FUN.1, ATE_DPT.1, AVA_VLA.2, ATE_IND.2, ASE_PPC.1, ADV_IMP.1, ASE_DES.1, ASE_INT.1, ASE_SRE.1, ASE_REQ.1, ADV_SPM.1, AGD_USR.1, ADV_LLD.1 |
ALC_DVS.2, AVA_VAN.5 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references/directly_referenced_by |
None
|
None
|
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-0303-2006 |
ANSSI-CC-2020/65 |
heuristics/report_references/indirectly_referenced_by |
None
|
None
|
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-0194-2002, BSI-DSZ-CC-0217-2003, BSI-DSZ-CC-0302-2005, BSI-DSZ-CC-0303-2006 |
ANSSI-CC-2020/65 |
heuristics/scheme_data |
None
|
- product:
MultiApp V4.2 ID version 4.2.1
- url:
https://cyber.gouv.fr/produits-certifies/multiapp-v42-id-version-421
- description:
Le produit évalué est « MultiApp V4.2 ID, version 4.2.1 » développé par THALES DIS et INFINEON TECHNOLOGIES AG.
Ce produit est destiné à héberger et exécuter une ou plusieurs applications, dites applets dans la terminologie Java Card. Ces applications peuvent revêtir un caractère sécuritaire différent (selon qu’elles soient « sensibles » ou « basiques ») et peuvent être chargées et instanciées av
- sponsor:
THALES DIS & INFINEON TECHNOLOGIES AG
- developer:
THALES DIS & INFINEON TECHNOLOGIES AG
- cert_id:
2021/41
- level:
EAL5+
- expiration_date:
23 Septembre 2026
- enhanced:
- cert_id:
2021/41
- certification_date:
23/09/2021
- expiration_date:
23/09/2026
- category:
Cartes à puce
- cc_version:
Critères Communs version 3.1r5
- developer:
THALES DIS & INFINEON TECHNOLOGIES AG
- sponsor:
THALES DIS & INFINEON TECHNOLOGIES AG
- evaluation_facility:
SERMA SAFETY & SECURITY
- level:
EAL5+
- protection_profile:
Java Card System – Open Configuration Protection Profil, version 3.0.5
- mutual_recognition:
SOG-IS
CCRA
- augmented:
ALC_DVS.2, AVA_VAN.5
- target_link:
https://cyber.gouv.fr/sites/default/files/2021/10/anssi-cible-cc-2021_41en.pdf
- cert_link:
https://cyber.gouv.fr/sites/default/files/2021/10/certificat-2021_41.pdf
- report_link:
https://cyber.gouv.fr/sites/default/files/2021/10/anssi-cc-2021_41.pdf
|
heuristics/st_references/directly_referenced_by |
None
|
None
|
heuristics/st_references/directly_referencing |
None
|
BSI-DSZ-CC-1079-2018 |
heuristics/st_references/indirectly_referenced_by |
None
|
None
|
heuristics/st_references/indirectly_referencing |
None
|
BSI-DSZ-CC-1079-2018 |
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
None
|
certificat-ANSSI-CC-2020_70.pdf
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords |
None
|
- cc_cert_id:
- cc_protection_profile_id:
- BSI:
- BSI-CC-PP-0059-2009-MA-02:
1
- BSI-CC-PP-0075-2012-MA-01:
1
- BSI-CC-PP-0071-2012-MA-01:
1
- BSI-CC-PP-0072-2012-MA-01:
1
- BSI-CC-PP-0076-2013-MA-01:
1
- cc_security_level:
- cc_sar:
- cc_sfr:
- cc_claims:
- vendor:
- eval_facility:
- symmetric_crypto:
- asymmetric_crypto:
- pq_crypto:
- hash_function:
- crypto_scheme:
- crypto_protocol:
- randomness:
- cipher_mode:
- ecc_curve:
- crypto_engine:
- tls_cipher_suite:
- crypto_library:
- vulnerability:
- side_channel_analysis:
- technical_report_id:
- device_model:
- tee_name:
- os_name:
- cplc_data:
- ic_data_group:
- standard_id:
- javacard_version:
- javacard_api_const:
- javacard_packages:
- certification_process:
|
pdf_data/cert_metadata |
None
|
- pdf_file_size_bytes:
268004
- pdf_is_encrypted:
False
- pdf_number_of_pages:
2
- /Author:
- /CreationDate:
D:20201116103334+01'00'
- /Creator:
PScript5.dll Version 5.2.2
- /ModDate:
D:20201116103334+01'00'
- /Producer:
Acrobat Distiller 11.0 (Windows)
- /Title:
- pdf_hyperlinks:
|
pdf_data/report_filename |
0396a.pdf
|
anssi-cc-2020_70fr.pdf
|
pdf_data/report_frontpage |
- DE:
- match_rules:
(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)
- cert_id:
BSI-DSZ-CC-0396-2007
- cert_item:
AIX 5L for POWER V5.3 with Technology Package 5300-05-02 with Argus Systems Group PitBull Foundation 5.0 and the Virtual IO Server (VIOS) Version 1.3
- developer:
Innovative Security Systems, Inc. sponsored by IBM Corporation
- cert_lab:
BSI
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0396-2007:
25
- BSI-DSZ-CC-0303-2006:
4
- BSI-DSZ-CC-0396:
1
|
- DE:
- BSI-DSZ-CC-1079-2018-MA-01:
1
- FR:
- ANSSI-CC-2020/70:
2
- ANSSI-CC-2020/65:
2
|
pdf_data/report_keywords/cc_cert_id/DE |
- BSI-DSZ-CC-0396-2007:
25
- BSI-DSZ-CC-0303-2006:
4
- BSI-DSZ-CC-0396:
1
|
- BSI-DSZ-CC-1079-2018-MA-01:
1
|
pdf_data/report_keywords/cc_claims |
- T:
- T.UAUSER:
1
- T.UAACCESS:
1
- T.UAACTION:
1
- T.VIOS:
1
- A:
- A.MANAGE:
1
- A.NO_EVIL_ADMIN:
1
- A.COOP:
1
- A.UTRAIN:
1
- A.UTRUST:
1
- A.LOCATE:
1
- A.PROTECT:
1
- A.NET_COMP:
1
- A.PEER:
1
- A.CONNECT:
1
|
|
pdf_data/report_keywords/cc_claims/A |
- A.MANAGE:
1
- A.NO_EVIL_ADMIN:
1
- A.COOP:
1
- A.UTRAIN:
1
- A.UTRUST:
1
- A.LOCATE:
1
- A.PROTECT:
1
- A.NET_COMP:
1
- A.PEER:
1
- A.CONNECT:
1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0059-2009-MA-02:
2
- BSI-CC-PP-0075-2012-MA-01:
2
- BSI-CC-PP-0071-2012-MA-01:
2
- BSI-CC-PP-0072-2012-MA-01:
2
- BSI-CC-PP-0076-2013-MA-01:
2
- BSI-PP-0084-2014:
1
- other:
- PP-SSCD-Part2:
1
- PP-SSCD-Part3:
1
- PP-SSCD-Part4:
1
- PP-SSCD-Part5:
1
- PP-SSCD-:
5
|
pdf_data/report_keywords/cc_sar |
- ACM:
- ACM_AUT.1:
1
- ACM_CAP.4:
1
- ACM_SCP.2:
1
- ACM_AUT:
2
- ACM_CAP:
2
- ACM_SCP:
2
- ADO:
- ADO_DEL.2:
1
- ADO_IGS.1:
1
- ADO_DEL:
2
- ADO_IGS:
2
- ADV:
- ADV_FSP.2:
1
- ADV_HLD.2:
1
- ADV_IMP.1:
1
- ADV_LLD.1:
1
- ADV_RCR.1:
1
- ADV_FSP:
2
- ADV_HLD:
2
- ADV_IMP:
2
- ADV_INT:
2
- ADV_LLD:
2
- ADV_RCR:
2
- ADV_SPM:
2
- AGD:
- AGD_ADM.1:
1
- AGD_USR.1:
1
- AGD_ADM:
2
- AGD_USR:
2
- ALC:
- ALC_FLR.1:
6
- ALC_DVS.1:
1
- ALC_LCD.1:
1
- ALC_TAT.1:
1
- ALC_DVS:
2
- ALC_FLR:
2
- ALC_LCD:
1
- ALC_TAT:
2
- ATE:
- ATE_COV.2:
1
- ATE_DPT.2:
1
- ATE_FUN.1:
1
- ATE_IND.2:
1
- ATE_COV:
2
- ATE_DPT:
2
- ATE_FUN:
2
- ATE_IND:
2
- AVA:
- AVA_VLA.2:
4
- AVA_MSU.2:
1
- AVA_SOF.1:
1
- AVA_CCA:
2
- AVA_MSU:
2
- AVA_SOF:
3
- AVA_VLA:
3
- AVA_VLA.3:
1
- AVA_VLA.4:
1
- ASE:
- ASE_DES.1:
1
- ASE_ENV.1:
1
- ASE_INT.1:
1
- ASE_OBJ.1:
1
- ASE_PPC.1:
1
- ASE_REQ.1:
1
- ASE_SRE.1:
1
- ASE_TSS.1:
1
|
- ADV:
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_INT:
1
- ADV_SPM:
1
- ADV_TDS:
1
- AGD:
- AGD_CPS:
2
- AGD_OPE:
1
- AGD_PRE:
1
- AGD_PRE_OPE:
1
- AGD_USE:
1
- ALC:
- ALC_DVS.2:
3
- ALC_FLR:
2
- ALC_CMC:
1
- ALC_CMS:
1
- ALC_DEL:
1
- ALC_DVS:
1
- ALC_TAT:
1
- ATE:
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
- AVA:
- ASE:
- ASE_CCL:
1
- ASE_ECD:
1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_REQ:
1
- ASE_SPD:
1
- ASE_TSS:
1
|
pdf_data/report_keywords/cc_sar/ADV |
- ADV_FSP.2: 1
- ADV_HLD.2: 1
- ADV_IMP.1: 1
- ADV_LLD.1: 1
- ADV_RCR.1: 1
- ADV_FSP:
2
- ADV_HLD: 2
- ADV_IMP:
2
- ADV_INT:
2
- ADV_LLD: 2
- ADV_RCR: 2
- ADV_SPM:
2
|
- ADV_ARC: 1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_INT:
1
- ADV_SPM:
1
- ADV_TDS: 1
|
pdf_data/report_keywords/cc_sar/ADV/ADV_FSP |
2
|
1
|
pdf_data/report_keywords/cc_sar/ADV/ADV_IMP |
2
|
1
|
pdf_data/report_keywords/cc_sar/ADV/ADV_INT |
2
|
1
|
pdf_data/report_keywords/cc_sar/ADV/ADV_SPM |
2
|
1
|
pdf_data/report_keywords/cc_sar/AGD |
- AGD_ADM.1:
1
- AGD_USR.1:
1
- AGD_ADM:
2
- AGD_USR:
2
|
- AGD_CPS:
2
- AGD_OPE:
1
- AGD_PRE:
1
- AGD_PRE_OPE:
1
- AGD_USE:
1
|
pdf_data/report_keywords/cc_sar/ALC |
- ALC_FLR.1: 6
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ALC_DVS:
2
- ALC_FLR:
2
- ALC_LCD: 1
- ALC_TAT:
2
|
- ALC_DVS.2: 3
- ALC_FLR:
2
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS:
1
- ALC_TAT:
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS |
2
|
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR |
2
|
2
|
pdf_data/report_keywords/cc_sar/ALC/ALC_TAT |
2
|
1
|
pdf_data/report_keywords/cc_sar/ASE |
- ASE_DES.1:
1
- ASE_ENV.1:
1
- ASE_INT.1:
1
- ASE_OBJ.1:
1
- ASE_PPC.1:
1
- ASE_REQ.1:
1
- ASE_SRE.1:
1
- ASE_TSS.1:
1
|
- ASE_CCL:
1
- ASE_ECD:
1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_REQ:
1
- ASE_SPD:
1
- ASE_TSS:
1
|
pdf_data/report_keywords/cc_sar/ATE |
- ATE_COV.2: 1
- ATE_DPT.2: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- ATE_COV:
2
- ATE_DPT:
2
- ATE_FUN:
2
- ATE_IND:
2
|
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
|
pdf_data/report_keywords/cc_sar/ATE/ATE_COV |
2
|
1
|
pdf_data/report_keywords/cc_sar/ATE/ATE_DPT |
2
|
1
|
pdf_data/report_keywords/cc_sar/ATE/ATE_FUN |
2
|
1
|
pdf_data/report_keywords/cc_sar/ATE/ATE_IND |
2
|
1
|
pdf_data/report_keywords/cc_sar/AVA |
- AVA_VLA.2:
4
- AVA_MSU.2:
1
- AVA_SOF.1:
1
- AVA_CCA:
2
- AVA_MSU:
2
- AVA_SOF:
3
- AVA_VLA:
3
- AVA_VLA.3:
1
- AVA_VLA.4:
1
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL4:
11
- EAL 1:
1
- EAL 7:
1
- EAL 4:
1
- EAL1:
5
- EAL3:
4
- EAL5:
6
- EAL7:
4
- EAL2:
3
- EAL6:
3
- EAL4 augmented:
3
|
- EAL:
- EAL 5:
3
- EAL2:
2
- EAL5:
1
- EAL7:
1
- EAL 1:
1
- EAL 3:
1
- EAL 7:
1
- ITSEC:
|
pdf_data/report_keywords/cc_security_level/EAL |
- EAL4: 11
- EAL 1:
1
- EAL 7:
1
- EAL 4: 1
- EAL1: 5
- EAL3: 4
- EAL5:
6
- EAL7:
4
- EAL2:
3
- EAL6: 3
- EAL4 augmented: 3
|
- EAL 5: 3
- EAL2:
2
- EAL5:
1
- EAL7:
1
- EAL 1:
1
- EAL 3: 1
- EAL 7:
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 1 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 7 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL2 |
3
|
2
|
pdf_data/report_keywords/cc_security_level/EAL/EAL5 |
6
|
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL7 |
4
|
1
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_GEN.1:
1
- FAU_GEN.2:
1
- FAU_SAR.1:
1
- FAU_SAR.2:
1
- FAU_SAR.3:
1
- FAU_SEL.1:
1
- FAU_STG.1:
1
- FAU_STG.3:
1
- FAU_STG.4:
1
- FDP:
- FDP_ACC.1:
6
- FDP_ACF.1:
6
- FDP_ETC.1:
1
- FDP_ETC.2:
1
- FDP_IFC.1:
3
- FDP_IFF.2:
3
- FDP_ITC.1:
1
- FDP_ITC.2:
1
- FDP_RIP.2:
1
- FDP_RIP:
1
- FIA:
- FIA_ATD.1:
2
- FIA_SOS.1:
1
- FIA_UAU.2:
1
- FIA_UAU.7:
1
- FIA_UID.2:
2
- FIA_USB.1:
2
- FMT:
- FMT_MSA.1:
6
- FMT_MSA.3:
7
- FMT_MTD.1:
7
- FMT_REV.1:
3
- FMT_SMF.1:
1
- FMT_SMR.1:
2
- FPT:
- FPT_AMT.1:
1
- FPT_RVM.1:
1
- FPT_SEP.1:
1
- FPT_STM.1:
1
- FPT_TDC.1:
1
- FPT_TST.1:
1
- FPT_RVM:
1
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- Technical Report BSI-DSZ-CC-0396, Release 2, 2006-12-21, atsec information security GmbH (confidential document) [8] Labeled Security Protection Profile (LSPP), Issue 1.b, 8 October 1999 User Guidance:
1
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
|
- Serma:
- SERMA:
2
- Serma Safety & Security:
15
- CESTI:
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
- CCMB-2017-04-004:
1
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/technical_report_id |
- BSI:
- BSI 7125:
2
- BSI 7148:
1
- BSI 7149:
1
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor |
|
- Infineon:
- Infineon Technologies AG:
1
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata |
- pdf_file_size_bytes:
348875
- pdf_is_encrypted:
False
- pdf_number_of_pages:
52
- /CreationDate:
D:20070118130925+01'00'
- /Author:
Bundesamt für Sicherheit in der Informationstechnik
- /Creator:
Acrobat PDFMaker 7.0.7 für Word
- /Keywords: Common Criteria, Certification, Zertifizierung; AIX 5L for POWER V5.3,Innovative Security Systems, Inc., IBM Corporation,
- /Producer:
Acrobat Distiller 7.0.5 (Windows)
- /ModDate:
D:20070308085123+01'00'
- /Company: BSI, Postfach 200363, 53133 Bonn
- /SourceModified: D:20070118120750
- /Title:
Certification Report BSI-DSZ-CC-0396-2007
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
155220
- pdf_is_encrypted:
False
- pdf_number_of_pages:
16
- /Author:
- /CreationDate:
D:20210120173222+01'00'
- /Creator:
PScript5.dll Version 5.2.2
- /ModDate:
D:20210120173222+01'00'
- /Producer:
Acrobat Distiller 11.0 (Windows)
- /Title:
- pdf_hyperlinks:
|
pdf_data/report_metadata//Author |
Bundesamt für Sicherheit in der Informationstechnik
|
|
pdf_data/report_metadata//CreationDate |
D:20070118130925+01'00'
|
D:20210120173222+01'00'
|
pdf_data/report_metadata//Creator |
Acrobat PDFMaker 7.0.7 für Word
|
PScript5.dll Version 5.2.2
|
pdf_data/report_metadata//ModDate |
D:20070308085123+01'00'
|
D:20210120173222+01'00'
|
pdf_data/report_metadata//Producer |
Acrobat Distiller 7.0.5 (Windows)
|
Acrobat Distiller 11.0 (Windows)
|
pdf_data/report_metadata//Title |
Certification Report BSI-DSZ-CC-0396-2007
|
|
pdf_data/report_metadata/pdf_file_size_bytes |
348875
|
155220
|
pdf_data/report_metadata/pdf_hyperlinks |
|
|
pdf_data/report_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/report_metadata/pdf_number_of_pages |
52
|
16
|
pdf_data/st_filename |
0396b.pdf
|
anssi-cible-cc-2020_70en.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1079-2018:
1
- BSI-DSZ-CC-1079-2018-MA-01:
1
- NL:
|
pdf_data/st_keywords/cc_claims |
- O:
- O.AUDITING:
23
- O.AUTHORIZATION:
22
- O.DISCRETIONARY_ACCESS:
13
- O.ENFORCEMENT:
17
- O.ERASE:
8
- O.MANAGE:
21
- O.MANDATORY_ACCESS:
13
- O.MANDATORY_INTEGRITY:
10
- O.NETWORK_ACCESS:
13
- O.RESIDUAL_INFORMATION:
11
- O.TCB_ACCESS:
13
- O.STACK:
12
- O.VIOS:
12
- T:
- T.UAACCESS:
7
- T.UAACTION:
5
- T.UAUSER:
7
- T.VIOS:
4
- A:
- A.LOCATE:
4
- A.PROTECT:
6
- A.COOP:
4
- A.MANAGE:
5
- A.NO_EVIL_ADM:
3
- A.UTRAIN:
6
- A.UTRUST:
6
- A.CONNECT:
8
- A.NET_COMP:
6
- A.PEER:
4
- A.CLEARANCE:
3
- A.SENSITIVITY:
3
- OE:
- OE.ADMIN:
7
- OE.CREDEN:
4
- OE.HW_SEP:
9
- OE.INFO_PROTECT:
15
- OE.INSTALL:
14
- OE.MAINTENANCE:
5
- OE.PHYSICAL:
8
- OE.RECOVER:
7
- OE.SERIAL_LOGIN:
5
- OE.SOFTWARE_IN:
5
- OE.PROTECT:
10
- OE.LPAR:
9
|
- O:
- O.SID:
1
- O.CIPHER:
1
- O.KEY-MNGT:
1
- O.REALLOCATION:
1
- O.GLOBAL_ARRAYS_IN:
1
- O.GLOBAL_ARRAYS_C:
1
- O.PIN-MNGT:
1
- O.OPERATE:
1
- O.ALARM:
1
- O.OBJ-DELETION:
1
- O.SCP:
3
- O.FIREWALL:
1
- O.NATIVE:
1
- O.RNG:
1
- O.LOAD:
1
- O.INSTALL:
1
- O.DELETION:
1
- O.TRANSACTION:
1
- O.RESOURCES:
1
- O.CARD-MANAGEMENT:
1
- A:
- A.C:
5
- A.CGA:
2
- A.SCA:
2
- A.CSP:
3
- A.APPLET:
2
- A.VERIFICATION:
2
- OE:
- OE.HI_VAD:
2
- OE.VERIFICATION:
5
- OE.APPLET:
2
- OE.CODE-EVIDENCE:
2
- OE.HID_VAD:
1
|
pdf_data/st_keywords/cc_claims/A |
- A.LOCATE:
4
- A.PROTECT:
6
- A.COOP:
4
- A.MANAGE:
5
- A.NO_EVIL_ADM:
3
- A.UTRAIN:
6
- A.UTRUST:
6
- A.CONNECT:
8
- A.NET_COMP:
6
- A.PEER:
4
- A.CLEARANCE:
3
- A.SENSITIVITY:
3
|
- A.C:
5
- A.CGA:
2
- A.SCA:
2
- A.CSP:
3
- A.APPLET:
2
- A.VERIFICATION:
2
|
pdf_data/st_keywords/cc_claims/O |
- O.AUDITING:
23
- O.AUTHORIZATION:
22
- O.DISCRETIONARY_ACCESS:
13
- O.ENFORCEMENT:
17
- O.ERASE:
8
- O.MANAGE:
21
- O.MANDATORY_ACCESS:
13
- O.MANDATORY_INTEGRITY:
10
- O.NETWORK_ACCESS:
13
- O.RESIDUAL_INFORMATION:
11
- O.TCB_ACCESS:
13
- O.STACK:
12
- O.VIOS:
12
|
- O.SID:
1
- O.CIPHER:
1
- O.KEY-MNGT:
1
- O.REALLOCATION:
1
- O.GLOBAL_ARRAYS_IN:
1
- O.GLOBAL_ARRAYS_C:
1
- O.PIN-MNGT:
1
- O.OPERATE:
1
- O.ALARM:
1
- O.OBJ-DELETION:
1
- O.SCP:
3
- O.FIREWALL:
1
- O.NATIVE:
1
- O.RNG:
1
- O.LOAD:
1
- O.INSTALL:
1
- O.DELETION:
1
- O.TRANSACTION:
1
- O.RESOURCES:
1
- O.CARD-MANAGEMENT:
1
|
pdf_data/st_keywords/cc_claims/OE |
- OE.ADMIN:
7
- OE.CREDEN:
4
- OE.HW_SEP:
9
- OE.INFO_PROTECT:
15
- OE.INSTALL:
14
- OE.MAINTENANCE:
5
- OE.PHYSICAL:
8
- OE.RECOVER:
7
- OE.SERIAL_LOGIN:
5
- OE.SOFTWARE_IN:
5
- OE.PROTECT:
10
- OE.LPAR:
9
|
- OE.HI_VAD:
2
- OE.VERIFICATION:
5
- OE.APPLET:
2
- OE.CODE-EVIDENCE:
2
- OE.HID_VAD:
1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0059-2009-MA-02:
1
- BSI-CC-PP-0075-2012-MA-01:
1
- BSI-CC-PP-0071-2012-MA-01:
1
- BSI-CC-PP-0072-2012-MA-01:
1
- BSI-CC-PP-0076-2013-MA-01:
1
- BSI-CC-PP-0084-2014:
1
- other:
- PP-SSCD-KG:
41
- PP-SSCD-KI:
30
- PP-SSCD:
4
- PP-SSCD-:
1
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_AUT.1:
1
- ACM_CAP.4:
1
- ACM_SCP.2:
2
- ADO:
- ADO_DEL.2:
1
- ADO_IGS.1:
1
- ADV:
- ADV_FSP.2:
1
- ADV_HLD.2:
1
- ADV_IMP.1:
1
- ADV_LLD.1:
1
- ADV_RCR.1:
1
- ADV_SPM.1:
1
- AGD:
- AGD_ADM.1:
1
- AGD_USR.1:
1
- ALC:
- ALC_FLR.1:
8
- ALC_DVS.1:
1
- ALC_LCD.1:
1
- ALC_TAT.1:
1
- ATE:
- ATE_COV.2:
1
- ATE_DPT.1:
1
- ATE_FUN.1:
1
- ATE_IND.2:
1
- AVA:
- AVA_MSU.2:
1
- AVA_SOF.1:
1
- AVA_VLA.2:
1
|
|
pdf_data/st_keywords/cc_sar/ALC |
- ALC_FLR.1:
8
- ALC_DVS.1:
1
- ALC_LCD.1:
1
- ALC_TAT.1:
1
|
|
pdf_data/st_keywords/cc_sar/AVA |
- AVA_MSU.2:
1
- AVA_SOF.1:
1
- AVA_VLA.2:
1
|
|
pdf_data/st_keywords/cc_security_level/EAL |
- EAL4:
7
- EAL3:
3
- EAL 4:
2
- EAL4 augmented:
2
- EAL 4 augmented:
1
|
- EAL 5+:
2
- EAL6:
1
- EAL6+:
1
- EAL5:
3
- EAL6 augmented:
1
- EAL5 augmented:
1
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1:
11
- FAU_GEN.2:
12
- FAU_SAR.1:
10
- FAU_SAR.2:
13
- FAU_SAR.3:
10
- FAU_SEL.1:
10
- FAU_STG.1:
8
- FAU_STG.3:
8
- FAU_STG.4:
8
- FAU_GEN:
3
- FAU_GEN.1.2:
1
- FAU_GEN.2.1:
1
- FAU_SAR.1.1:
1
- FAU_SAR.1.2:
1
- FAU_SAR.2.1:
1
- FAU_SAR.3.1:
1
- FAU_SEL.1.1:
1
- FAU_STG.1.1:
1
- FAU_STG.1.2:
1
- FAU_STG.3.1:
1
- FAU_STG.4.1:
1
- FDP:
- FDP_RIP:
23
- FDP_ACC.1:
78
- FDP_ACF.1:
75
- FDP_ETC.1:
9
- FDP_ETC.2:
11
- FDP_IFC.1:
49
- FDP_IFF.2:
35
- FDP_ITC.1:
9
- FDP_ITC.2:
9
- FDP_RIP.2:
13
- FDP_ACC.1.1:
6
- FDP_ACF.1.1:
6
- FDP_ACF.1.2:
6
- FDP_ACF.1.3:
7
- FDP_ACF.1.4:
6
- FDP_ETC.1.1:
1
- FDP_ETC.1.2:
1
- FDP_ETC.2.1:
1
- FDP_ETC.2.2:
1
- FDP_ETC.2.3:
1
- FDP_ETC.2.4:
1
- FDP_IFC.1.1:
3
- FDP_IFF.2.1:
3
- FDP_IFF.2.2:
6
- FDP_IFF.2.3:
3
- FDP_IFF.2.4:
3
- FDP_IFF.2.5:
3
- FDP_IFF.2.6:
3
- FDP_IFF.2.7:
3
- FDP_ITC.1.1:
1
- FDP_ITC.1.2:
1
- FDP_ITC.1.3:
1
- FDP_ITC.2.1:
1
- FDP_ITC.2.2:
1
- FDP_ITC.2.3:
1
- FDP_ITC.2.4:
1
- FDP_ITC.2.5:
1
- FDP_MSA.3:
1
- FDP_RIP.1:
1
- FDP_IFF.1:
11
- FIA:
- FIA_UID.2:
23
- FIA_ATD.1:
28
- FIA_SOS.1:
13
- FIA_UAU.2:
13
- FIA_UAU.7:
11
- FIA_USB.1:
25
- FIA_UID:
1
- FIA_ATD.1.1:
2
- FIA_UAU.2.1:
1
- FIA_UID.2.1:
2
- FIA_UID.1:
8
- FIA_USB.1.1:
2
- FIA_USB.1.2:
2
- FIA_USB.1.3:
2
- FIA_UAU.1:
3
- FMT:
- FMT_SMR.1:
32
- FMT_MSA.1:
63
- FMT_MSA.3:
71
- FMT_MTD.1:
63
- FMT_REV.1:
28
- FMT_SMF.1:
35
- FMT_MOF.1:
1
- FMT_MSA.1.1:
7
- FMT_MSA.3.1:
8
- FMT_MSA.3.2:
7
- FMT_MTD.1.1:
8
- FMT_REV.1.1:
3
- FMT_REV.1.2:
3
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
2
- FMT_SMR.1.2:
2
- FPT:
- FPT_RVM:
19
- FPT_AMT.1:
9
- FPT_RVM.1:
10
- FPT_SEP.1:
11
- FPT_STM.1:
8
- FPT_TDC.1:
10
- FPT_TST.1:
11
- FPT_AMT.1.1:
1
- FPT_RVM.1.1:
1
- FPT_SEP.1.1:
1
- FPT_SEP.1.2:
1
- FPT_STM.1.1:
1
- FPT_TDC.1.1:
1
- FPT_TDC.1.2:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FTP:
|
- FCS:
- FCS_CKM:
43
- FCS_CKM.4:
12
- FCS_COP:
22
- FCS_CKM.2:
4
- FCS_COP.1:
6
- FCS_CKM.1.1:
2
- FCS_CKM.1:
13
- FCS_CKM.4.1:
2
- FCS_COP.1.1:
2
- FDP:
- FDP_DAU:
8
- FDP_UIT:
7
- FDP_ITC.1:
8
- FDP_ITC.2:
8
- FDP_ACC:
40
- FDP_ACF.1:
10
- FDP_ACC.1.1:
4
- FDP_ACF:
27
- FDP_ACC.1:
27
- FDP_ACF.1.1:
4
- FDP_ACF.1.2:
4
- FDP_ACF.1.3:
4
- FDP_ACF.1.4:
4
- FDP_DAU.1:
1
- FDP_DAU.2.1:
1
- FDP_DAU.2.2:
1
- FDP_ITC:
9
- FDP_IFC.1:
18
- FDP_ITC.1.1:
1
- FDP_ITC.1.2:
1
- FDP_ITC.1.3:
1
- FDP_RIP.1:
6
- FDP_RIP.1.1:
1
- FDP_SDI:
15
- FDP_SDI.1:
2
- FDP_SDI.2.1:
2
- FDP_SDI.2.2:
2
- FDP_UCT:
8
- FDP_UCT.1.1:
1
- FDP_UIT.1.1:
1
- FDP_UIT.1.2:
1
- FDP_AFC:
1
- FDP_RIP:
1
- FIA:
- FIA_API:
5
- FIA_AFL:
14
- FIA_API.1:
12
- FIA_API.1.1:
2
- FIA_UAU.1:
7
- FIA_UID.1:
10
- FIA_AFL.1.1:
2
- FIA_AFL.1.2:
2
- FIA_UAU:
17
- FIA_UAU.1.1:
2
- FIA_UAU.1.2:
2
- FIA_UID:
17
- FIA_UID.1.1:
2
- FIA_UID.1.2:
2
- FMT:
- FMT_MSA.3:
11
- FMT_MOF.1:
7
- FMT_SMR.1:
34
- FMT_SMF.1:
24
- FMT_MOF.1.1:
1
- FMT_MSA:
56
- FMT_MSA.1.1:
3
- FMT_MSA.2:
7
- FMT_MSA.1:
6
- FMT_MSA.2.1:
1
- FMT_MSA.3.1:
2
- FMT_MSA.3.2:
2
- FMT_MSA.4.1:
2
- FMT_MTD:
14
- FMT_MTD.1.1:
2
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_MSA.4:
2
- FPT:
- FPT_EMS:
5
- FPT_EMS.1:
11
- FPT_EMS.1.1:
4
- FPT_EMS.1.2:
3
- FPT_TST.1:
9
- FPT_FLS.1:
7
- FPT_FLS.1.1:
1
- FPT_TST:
2
- FPT_PHP.1:
6
- FPT_PHP.1.1:
1
- FPT_PHP.1.2:
1
- FPT_PHP.3:
7
- FPT_PHP.3.1:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FTP:
- FTP_ITC:
30
- FTP_ITC.1:
4
- FTP_TRP.1:
4
- FTP_ITC.1.1:
4
- FTP_ITC.1.2:
4
- FTP_ITC.1.3:
4
- FTP_ICT:
2
|
pdf_data/st_keywords/cc_sfr/FDP |
- FDP_RIP:
23
- FDP_ACC.1:
78
- FDP_ACF.1:
75
- FDP_ETC.1: 9
- FDP_ETC.2: 11
- FDP_IFC.1:
49
- FDP_IFF.2: 35
- FDP_ITC.1:
9
- FDP_ITC.2:
9
- FDP_RIP.2: 13
- FDP_ACC.1.1:
6
- FDP_ACF.1.1:
6
- FDP_ACF.1.2:
6
- FDP_ACF.1.3:
7
- FDP_ACF.1.4:
6
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_ETC.2.1: 1
- FDP_ETC.2.2: 1
- FDP_ETC.2.3: 1
- FDP_ETC.2.4: 1
- FDP_IFC.1.1: 3
- FDP_IFF.2.1: 3
- FDP_IFF.2.2: 6
- FDP_IFF.2.3: 3
- FDP_IFF.2.4: 3
- FDP_IFF.2.5: 3
- FDP_IFF.2.6: 3
- FDP_IFF.2.7: 3
- FDP_ITC.1.1:
1
- FDP_ITC.1.2:
1
- FDP_ITC.1.3:
1
- FDP_ITC.2.1: 1
- FDP_ITC.2.2: 1
- FDP_ITC.2.3: 1
- FDP_ITC.2.4: 1
- FDP_ITC.2.5: 1
- FDP_MSA.3: 1
- FDP_RIP.1:
1
- FDP_IFF.1: 11
|
- FDP_DAU: 8
- FDP_UIT: 7
- FDP_ITC.1:
8
- FDP_ITC.2:
8
- FDP_ACC: 40
- FDP_ACF.1:
10
- FDP_ACC.1.1:
4
- FDP_ACF: 27
- FDP_ACC.1:
27
- FDP_ACF.1.1:
4
- FDP_ACF.1.2:
4
- FDP_ACF.1.3:
4
- FDP_ACF.1.4:
4
- FDP_DAU.1: 1
- FDP_DAU.2.1: 1
- FDP_DAU.2.2: 1
- FDP_ITC: 9
- FDP_IFC.1:
18
- FDP_ITC.1.1:
1
- FDP_ITC.1.2:
1
- FDP_ITC.1.3:
1
- FDP_RIP.1:
6
- FDP_RIP.1.1: 1
- FDP_SDI: 15
- FDP_SDI.1: 2
- FDP_SDI.2.1: 2
- FDP_SDI.2.2: 2
- FDP_UCT: 8
- FDP_UCT.1.1: 1
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FDP_AFC: 1
- FDP_RIP:
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 |
78
|
27
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1.1 |
6
|
4
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 |
75
|
10
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 |
6
|
4
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 |
6
|
4
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 |
7
|
4
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 |
6
|
4
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 |
49
|
18
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 |
9
|
8
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1.3 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 |
9
|
8
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP |
23
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 |
1
|
6
|
pdf_data/st_keywords/cc_sfr/FIA |
- FIA_UID.2: 23
- FIA_ATD.1: 28
- FIA_SOS.1: 13
- FIA_UAU.2: 13
- FIA_UAU.7: 11
- FIA_USB.1: 25
- FIA_UID:
1
- FIA_ATD.1.1: 2
- FIA_UAU.2.1: 1
- FIA_UID.2.1: 2
- FIA_UID.1:
8
- FIA_USB.1.1: 2
- FIA_USB.1.2: 2
- FIA_USB.1.3: 2
- FIA_UAU.1:
3
|
- FIA_API: 5
- FIA_AFL: 14
- FIA_API.1: 12
- FIA_API.1.1: 2
- FIA_UAU.1:
7
- FIA_UID.1:
10
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_UAU: 17
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UID:
17
- FIA_UID.1.1: 2
- FIA_UID.1.2: 2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 |
3
|
7
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID |
1
|
17
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 |
8
|
10
|
pdf_data/st_keywords/cc_sfr/FMT |
- FMT_SMR.1:
32
- FMT_MSA.1:
63
- FMT_MSA.3:
71
- FMT_MTD.1: 63
- FMT_REV.1: 28
- FMT_SMF.1:
35
- FMT_MOF.1:
1
- FMT_MSA.1.1:
7
- FMT_MSA.3.1:
8
- FMT_MSA.3.2:
7
- FMT_MTD.1.1:
8
- FMT_REV.1.1: 3
- FMT_REV.1.2: 3
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
2
- FMT_SMR.1.2:
2
|
- FMT_MSA.3:
11
- FMT_MOF.1:
7
- FMT_SMR.1:
34
- FMT_SMF.1:
24
- FMT_MOF.1.1: 1
- FMT_MSA: 56
- FMT_MSA.1.1:
3
- FMT_MSA.2: 7
- FMT_MSA.1:
6
- FMT_MSA.2.1: 1
- FMT_MSA.3.1:
2
- FMT_MSA.3.2:
2
- FMT_MSA.4.1: 2
- FMT_MTD: 14
- FMT_MTD.1.1:
2
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_MSA.4: 2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MOF.1 |
1
|
7
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 |
63
|
6
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1.1 |
7
|
3
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 |
71
|
11
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.1 |
8
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.2 |
7
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1.1 |
8
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
35
|
24
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
32
|
34
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.1 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.2 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FPT |
- FPT_RVM: 19
- FPT_AMT.1: 9
- FPT_RVM.1: 10
- FPT_SEP.1: 11
- FPT_STM.1: 8
- FPT_TDC.1: 10
- FPT_TST.1:
11
- FPT_AMT.1.1: 1
- FPT_RVM.1.1: 1
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_STM.1.1: 1
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
|
- FPT_EMS: 5
- FPT_EMS.1: 11
- FPT_EMS.1.1: 4
- FPT_EMS.1.2: 3
- FPT_TST.1:
9
- FPT_FLS.1: 7
- FPT_FLS.1.1: 1
- FPT_TST: 2
- FPT_PHP.1: 6
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 7
- FPT_PHP.3.1: 1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 |
11
|
9
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.3 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FTP |
|
- FTP_ITC: 30
- FTP_ITC.1:
4
- FTP_TRP.1: 4
- FTP_ITC.1.1: 4
- FTP_ITC.1.2: 4
- FTP_ITC.1.3: 4
- FTP_ICT: 2
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 |
1
|
4
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- out of scope:
1
- data by authorized users. The functionalities of IAS Classic 5.0 other than the ones from SSCD are out of scope of the TOE perimeter. For BioPIN (MOC Server v3.0 application) provides biometry recognition with:
1
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_scheme/MAC/MAC |
88
|
3
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- SCA:
- SPA:
1
- DPA:
1
- timing attacks:
1
- FI:
- physical tampering:
4
- DFA:
1
- fault induction:
1
- fault injection:
1
|
pdf_data/st_keywords/side_channel_analysis/FI |
|
- physical tampering:
4
- DFA:
1
- fault induction:
1
- fault injection:
1
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS PUB 189:
1
- FIPS PUB 188:
2
- BSI:
- RFC:
- ISO:
- CC:
- CCIMB-2005-08-001:
1
- CCIMB-2005-08-002:
1
- CCIMB-2005-08-003:
1
- CCIMB-2005-08-004:
1
|
- FIPS:
- PKCS:
- CC:
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2012-04-003:
1
- CCMB-2017-04-004:
1
|
pdf_data/st_keywords/standard_id/CC |
- CCIMB-2005-08-001:
1
- CCIMB-2005-08-002:
1
- CCIMB-2005-08-003:
1
- CCIMB-2005-08-004:
1
|
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2012-04-003:
1
- CCMB-2017-04-004:
1
|
pdf_data/st_keywords/standard_id/FIPS |
- FIPS PUB 189:
1
- FIPS PUB 188:
2
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor |
|
- Infineon:
- Infineon:
9
- Infineon Technologies AG:
2
- Gemalto:
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata |
- pdf_file_size_bytes:
1404682
- pdf_is_encrypted:
False
- pdf_number_of_pages:
125
- /CreationDate:
D:20070306161211Z
- /Author:
atsec
- /Creator:
Microsoft® Office Word 2007
- /Producer:
Microsoft® Office Word 2007
- /ModDate:
D:20070308084600+01'00'
- /Title:
IBM AIX V5.3 w/PitBull Foundation r5.0 and opt VIOS Security Target
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
1479421
- pdf_is_encrypted:
False
- pdf_number_of_pages:
64
- /Title:
MultiApp V4.2: IAS EN Core & Extensions Security Target Lite
- /Author:
D1491739
- /Subject: 1.7p
- /Keywords: 31-08-2020
- /Creator:
Microsoft® Word 2013
- /CreationDate:
D:20200831164824+02'00'
- /ModDate:
D:20200831164824+02'00'
- /Producer:
Microsoft® Word 2013
- pdf_hyperlinks:
|
pdf_data/st_metadata//Author |
atsec
|
D1491739
|
pdf_data/st_metadata//CreationDate |
D:20070306161211Z
|
D:20200831164824+02'00'
|
pdf_data/st_metadata//Creator |
Microsoft® Office Word 2007
|
Microsoft® Word 2013
|
pdf_data/st_metadata//ModDate |
D:20070308084600+01'00'
|
D:20200831164824+02'00'
|
pdf_data/st_metadata//Producer |
Microsoft® Office Word 2007
|
Microsoft® Word 2013
|
pdf_data/st_metadata//Title |
IBM AIX V5.3 w/PitBull Foundation r5.0 and opt VIOS Security Target
|
MultiApp V4.2: IAS EN Core & Extensions Security Target Lite
|
pdf_data/st_metadata/pdf_file_size_bytes |
1404682
|
1479421
|
pdf_data/st_metadata/pdf_hyperlinks |
|
|
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
125
|
64
|
dgst |
059ec6ad2ed1bf9e
|
10726d62cf7a8b30
|