| name |
Hitachi AE450 (HD651450) Smartcard Integrated Circuit Version 01 |
Oracle Enterprise Linux Version 5 Update 1 |
| category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
Operating Systems |
| scheme |
DE |
DE |
| status |
archived |
archived |
| not_valid_after |
01.09.2019 |
01.09.2019 |
| not_valid_before |
01.12.2002 |
15.10.2008 |
| cert_link |
None |
None |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0191a.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0481a.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0191b.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0481b.pdf |
| manufacturer |
Hitachi, Ltd. |
Oracle Corporation |
| manufacturer_web |
https://www.hitachi.com/ |
https://www.oracle.com |
| security_level |
EAL4+, AVA_VLA.4, AVA_MSU.3, ADV_IMP.2, ALC_DVS.2 |
EAL4+, ALC_FLR.3 |
| dgst |
07bd75ba3bb6b50c |
f13f26271d047c8f |
| heuristics/cert_id |
BSI-DSZ-CC-0191-2002 |
BSI-DSZ-CC-0481-2008 |
| heuristics/cert_lab |
BSI |
BSI |
| heuristics/cpe_matches |
{} |
cpe:2.3:o:oracle:linux:5:-:*:*:*:*:*:*, cpe:2.3:o:oracle:linux:5:9:*:*:*:*:*:* |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
CVE-2015-3195, CVE-2014-1737, CVE-2016-5387, CVE-2014-6271, CVE-2014-9584, CVE-2016-3710, CVE-2015-0239, CVE-2013-7421, CVE-2014-1738, CVE-2014-0203, CVE-2014-7169, CVE-2015-0235, CVE-2011-2306, CVE-2016-2182, CVE-2014-9644, CVE-2016-5403, CVE-2014-3153, CVE-2016-2178, CVE-2014-3673, CVE-2016-3427, CVE-2016-2177, CVE-2014-3687, CVE-2014-2678 |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ATE_FUN.1, ADV_RCR.1, ASE_INT.1, ADV_LLD.1, ADV_IMP.2, ASE_ENV.1, ATE_IND.2, ATE_DPT.1, AGD_USR.1, ASE_REQ.1, ASE_SRE.1, ALC_LCD.1, ALC_DVS.2, AVA_VLA.4, ADV_HLD.2, ATE_COV.2, AVA_MSU.3, ASE_PPC.1, ASE_DES.1, ALC_TAT.1, ADV_FSP.2, AGD_ADM.1, AVA_SOF.1, ASE_OBJ.1, ASE_TSS.1, ADV_SPM.1 |
AVA_MSU.2, ALC_FLR.3, ATE_FUN.1, ADV_RCR.1, ADV_LLD.1, ATE_IND.2, AVA_VLA.2, ATE_DPT.1, AGD_USR.1, ASE_REQ.1, ADV_IMP.1, ALC_LCD.1, ADV_HLD.2, ATE_COV.2, ALC_DVS.1, ALC_TAT.1, ADV_FSP.2, AGD_ADM.1, AVA_SOF.1, ADV_SPM.1 |
| heuristics/extracted_versions |
01 |
5, 1 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0427-2007 |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0427-2007 |
| heuristics/scheme_data |
|
|
| heuristics/st_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0766-2012, BSI-DSZ-CC-0765-2012 |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-0766-2012, BSI-DSZ-CC-0765-2012 |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
{} |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
{} |
| pdf_data/cert_filename |
None |
None |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename |
0191a.pdf |
0481a.pdf |
| pdf_data/report_frontpage |
- DE:
- cert_id: BSI-DSZ-CC-0191-2002
- cert_item: Hitachi AE450 (HD651450) Smartcard Integrated Circuit Version 01
- cert_lab: BSI
- developer: Hitachi Ltd
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
- DE:
- cert_id: BSI-DSZ-CC-0481-2008
- cert_item: Oracle Enterprise Linux Version 5 Update 1
- cert_lab: BSI
- developer: Oracle Corporation
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
| pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0191: 1
- BSI-DSZ-CC-0191-2002: 22
|
- DE:
- BSI-DSZ-CC-0427-2007: 4
- BSI-DSZ-CC-0481-2008: 19
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 7: 1
- EAL1: 5
- EAL2: 3
- EAL3: 4
- EAL4: 13
- EAL4 augmented: 2
- EAL4+: 1
- EAL5: 6
- EAL6: 3
- EAL7: 4
|
- EAL:
- EAL 1: 1
- EAL 4: 3
- EAL 4 augmented: 2
- EAL 7: 1
- EAL1: 5
- EAL2: 3
- EAL3: 4
- EAL4: 9
- EAL4 augmented: 1
- EAL4+: 2
- EAL5: 6
- EAL6: 3
- EAL7: 4
|
| pdf_data/report_keywords/cc_sar |
- ACM:
- ACM_AUT: 2
- ACM_AUT.1: 2
- ACM_CAP: 2
- ACM_CAP.4: 2
- ACM_SCP: 2
- ACM_SCP.2: 2
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 2
- ADO_IGS: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP: 2
- ADV_FSP.2: 1
- ADV_HLD: 2
- ADV_HLD.2: 1
- ADV_IMP: 2
- ADV_IMP.2: 3
- ADV_INT: 2
- ADV_LLD: 2
- ADV_LLD.1: 1
- ADV_RCR: 2
- ADV_RCR.1: 1
- ADV_SPM: 2
- ADV_SPM.1: 1
- AGD:
- AGD_ADM: 2
- AGD_ADM.1: 1
- AGD_USR: 2
- AGD_USR.1: 1
- ALC:
- ALC_DVS: 2
- ALC_DVS.2: 4
- ALC_FLR: 2
- ALC_LCD: 1
- ALC_LCD.1: 2
- ALC_TAT: 2
- ALC_TAT.1: 2
- ASE:
- ASE_DES.1: 1
- ASE_ENV.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_PPC.1: 1
- ASE_REQ.1: 1
- ASE_SRE.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 2
- ATE_COV.2: 1
- ATE_DPT: 2
- ATE_DPT.1: 1
- ATE_FUN: 2
- ATE_FUN.1: 1
- ATE_IND: 2
- ATE_IND.2: 1
- AVA:
- AVA_CCA: 2
- AVA_MSU: 2
- AVA_MSU.3: 3
- AVA_SOF: 4
- AVA_SOF.1: 1
- AVA_VLA: 4
- AVA_VLA.2: 1
- AVA_VLA.3: 1
- AVA_VLA.4: 4
|
- ACM:
- ACM_AUT: 2
- ACM_CAP: 2
- ACM_SCP: 2
- ADO:
- ADV:
- ADV_FSP: 2
- ADV_HLD: 2
- ADV_IMP: 2
- ADV_INT: 2
- ADV_LLD: 2
- ADV_RCR: 2
- ADV_SPM: 2
- AGD:
- ALC:
- ALC_DVS: 2
- ALC_FLR: 2
- ALC_FLR.3: 5
- ALC_LCD: 1
- ALC_TAT: 2
- APE:
- APE_DES: 1
- APE_ENV: 1
- APE_INT: 1
- APE_OBJ: 1
- APE_REQ: 1
- APE_SRE: 1
- ASE:
- ASE_DES: 1
- ASE_ENV: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_PPC: 1
- ASE_REQ: 1
- ASE_SRE: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 2
- ATE_DPT: 2
- ATE_FUN: 2
- ATE_IND: 2
- AVA:
- AVA_CCA: 2
- AVA_MSU: 2
- AVA_SOF: 3
- AVA_VLA: 3
- AVA_VLA.2: 1
- AVA_VLA.3: 1
- AVA_VLA.4: 1
|
| pdf_data/report_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_COP.1: 1
- FCS_RND.1: 1
- FDP:
- FDP_ACC.1: 2
- FDP_IFC.1: 1
- FDP_ITT.1: 1
- FMT:
- FMT_LIM.1: 1
- FMT_LIM.2: 1
- FPT:
- FPT_FLS.1: 1
- FPT_ITT.1: 1
- FPT_PHP.3: 1
- FPT_SEP.1: 1
- FRU:
|
|
| pdf_data/report_keywords/cc_claims |
|
|
| pdf_data/report_keywords/vendor |
- Infineon:
- Infineon Technologies AG: 1
- Philips:
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
- FI:
- Malfunction: 1
- physical tampering: 1
- SCA:
- DPA: 2
- Physical Probing: 1
- physical probing: 1
|
|
| pdf_data/report_keywords/technical_report_id |
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- BSI:
- AIS 25: 2
- AIS 26: 2
- AIS 31: 3
- AIS 32: 1
- FIPS:
- FIPS PUB 140-2: 1
- FIPS PUB 46-3: 1
- ISO:
|
- BSI:
- AIS 14: 1
- AIS 32: 1
- AIS 34: 2
- AIS19: 1
- ISO:
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- 29 November 2002, for the Product Hitachi Single-Chip Microcontroller AE450 (HD651450) Version 01, (confidential document) [9] Smartcard IC Platform Protection Profile, Version 1.0, July 2001, BSI registration ID: 1
- AE-4 Series, Guidelines for using the AE450 Rev. 1.1, 22 August 2002, Hitachi, Ltd., (confidential document) [12] Hitachi Single-Chip Microcomputer, AE-4 Series, AE460 (HD651460), AE450 (HD651450), Current: 1
- AE450]), V1.3, 22 August 2002, (confidential document) [14] Federal Information Processing Standards Publication, Security Requirements for Cryptographic: 1
- Functions, Rev. 2.2, 11 March 2002, Hitachi, Ltd., (confidential document) [13] Hitachi, Semiconductor Technical Report, Option List for Smart Card Microcomputer (for: 1
- Security Target, Semiconductor & Integrated Circuits Hitachi, Ltd., Version 1.2, 4 October 2002, (confidential document) [7] AE450 (HD651450) Version 01, Smartcard Security Target, (Public version), Semiconductor &: 1
|
- ConfidentialDocument:
- Evaluation Technical Report Oracle Enterprise Linux 5 Update 1, atsec information security GmbH (confidential document) [8] Configuration list for the TOE, 7 July 2008, SVN logs for EL 5.1 x86-64 security evaluation: 1
|
| pdf_data/report_metadata |
- /Author: BSI
- /CreationDate: D:20021220103921
- /Creator: Microsoft Word - 0191a.doc (Kopie)
- /Keywords: Certification Common Criteria AE450
- /ModDate: D:20021220105643+01'00'
- /Producer: Acrobat PDFWriter 4.0 für Windows NT
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0191-2002
- pdf_file_size_bytes: 182421
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 42
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20081106141556+01'00'
- /Creator: Writer
- /Keywords: "Oracle Enterprise LinuxVersion 5 Update 1, Oracle Corporation, BSI-DSZ-CC-0481-2008"
- /ModDate: D:20081107123841+01'00'
- /Producer: StarOffice 8
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0481-2008
- pdf_file_size_bytes: 768415
- pdf_hyperlinks: http://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 38
|
| pdf_data/st_filename |
0191b.pdf |
0481b.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-PP- 0002: 5
- BSI-PP-0002: 75
|
|
| pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL4: 6
- EAL4 augmented: 2
|
- EAL:
- EAL 4: 1
- EAL 4 augmented: 1
- EAL3: 1
- EAL4: 6
- EAL4 augmented: 3
- EAL4+: 1
|
| pdf_data/st_keywords/cc_sar |
- ADO:
- ADV:
- ADV_FSP: 1
- ADV_HLD: 1
- ADV_IMP: 1
- ADV_IMP.2: 2
- ADV_LLD: 1
- ADV_RCR: 1
- ADV_SPM: 1
- ADV_SPM.1: 3
- AGD:
- ALC:
- AVA:
- AVA_MSU: 1
- AVA_MSU.3: 2
- AVA_SOF: 1
- AVA_VLA: 1
- AVA_VLA.4: 2
|
- ACM:
- ACM_AUT.1: 1
- ACM_CAP.4: 1
- ACM_SCP.2: 1
- ADO:
- ADO_DEL.2: 1
- ADO_IGS.1: 1
- ADV:
- ADV_FSP.2: 1
- ADV_HLD.2: 1
- ADV_IMP.1: 1
- ADV_LLD.1: 1
- ADV_RCR.1: 1
- ADV_SPM.1: 6
- AGD:
- AGD_ADM.1: 2
- AGD_USR.1: 1
- ALC:
- ALC_DVS.1: 1
- ALC_FLR.3: 8
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_MSU.2: 1
- AVA_SOF.1: 1
- AVA_VLA.2: 1
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 1
- FAU_SAS.1: 9
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM.1: 8
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 11
- FCS_CKM.4.1: 1
- FCS_COP.1: 15
- FCS_COP.1.1: 2
- FCS_RND: 1
- FCS_RND.1: 8
- FCS_RND.1.1: 1
- FDP:
- FDP_ACC.1: 27
- FDP_ACC.1.1: 1
- FDP_ACF.1: 5
- FDP_IFC.1: 16
- FDP_IFC.1.1: 1
- FDP_IFF.1: 1
- FDP_ITC.1: 12
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITT.1: 9
- FDP_ITT.1.1: 1
- FDP_SDI.1: 1
- FMT:
- FMT_LIM: 1
- FMT_LIM.1: 9
- FMT_LIM.1.1: 1
- FMT_LIM.2: 9
- FMT_LIM.2.1: 1
- FMT_MSA.1: 2
- FMT_MSA.2: 13
- FMT_MSA.2.1: 1
- FMT_MSA.3: 2
- FMT_SMR.1: 1
- FPT:
- FPT_AMT.1: 1
- FPT_FLS.1: 27
- FPT_FLS.1.1: 1
- FPT_ITT.1: 8
- FPT_ITT.1.1: 1
- FPT_PHP.3: 9
- FPT_PHP.3.1: 1
- FPT_SEP.1: 8
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FRU:
- FRU_FLT.1: 1
- FRU_FLT.2: 12
|
- FAU:
- FAU_GEN.1: 11
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 10
- FAU_GEN.2.1: 1
- FAU_SAR.1: 12
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 12
- FAU_SAR.2.1: 1
- FAU_SAR.3: 11
- FAU_SAR.3.1: 1
- FAU_SEL.1: 12
- FAU_SEL.1.1: 1
- FAU_STG.1: 11
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 11
- FAU_STG.3.1: 1
- FAU_STG.4: 11
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM.1: 19
- FCS_CKM.1.1: 3
- FCS_CKM.2: 19
- FCS_CKM.2.1: 4
- FCS_CKM.4: 4
- FCS_COP.1: 19
- FCS_COP.1.1: 3
- FDP:
- FDP_ACC.1: 39
- FDP_ACC.1.1: 3
- FDP_ACF.1: 31
- FDP_ACF.1.1: 3
- FDP_ACF.1.2: 3
- FDP_ACF.1.3: 4
- FDP_ACF.1.4: 3
- FDP_ETC: 1
- FDP_ETC.1: 9
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_ETC.2: 10
- FDP_ETC.2.1: 1
- FDP_ETC.2.2: 1
- FDP_ETC.2.3: 1
- FDP_ETC.2.4: 1
- FDP_IFC.1: 16
- FDP_IFC.1.1: 1
- FDP_IFF.1: 4
- FDP_IFF.2: 10
- FDP_IFF.2.1: 1
- FDP_IFF.2.2: 1
- FDP_IFF.2.3: 1
- FDP_IFF.2.4: 1
- FDP_IFF.2.5: 1
- FDP_IFF.2.6: 1
- FDP_IFF.2.7: 1
- FDP_ITC: 1
- FDP_ITC.1: 11
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 11
- FDP_ITC.2.1: 1
- FDP_ITC.2.2: 1
- FDP_ITC.2.3: 1
- FDP_ITC.2.4: 1
- FDP_ITC.2.5: 2
- FDP_MSA.3: 1
- FDP_RIP.2: 14
- FDP_RIP.2.1: 1
- FDP_UCT.1: 11
- FDP_UCT.1.1: 1
- FDP_UIT.1: 11
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_ATD.1: 17
- FIA_ATD.1.1: 1
- FIA_SOS.1: 14
- FIA_SOS.1.1: 1
- FIA_UAU.1: 1
- FIA_UAU.2: 13
- FIA_UAU.2.1: 1
- FIA_UAU.7: 11
- FIA_UAU.7.1: 1
- FIA_UID: 1
- FIA_UID.1: 5
- FIA_UID.2: 15
- FIA_UID.2.1: 1
- FIA_USB: 1
- FIA_USB.1: 27
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA.1: 40
- FMT_MSA.1.1: 6
- FMT_MSA.2: 16
- FMT_MSA.2.1: 1
- FMT_MSA.3: 38
- FMT_MSA.3.1: 5
- FMT_MSA.3.2: 4
- FMT_MTD.1: 69
- FMT_MTD.1.1: 6
- FMT_MTD.3: 11
- FMT_MTD.3.1: 1
- FMT_REV.1: 29
- FMT_REV.1.1: 2
- FMT_REV.1.2: 2
- FMT_SMF: 2
- FMT_SMF.1: 23
- FMT_SMF.1.1: 1
- FMT_SMR.1: 16
- FMT_SMR.2: 24
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_AMT.1: 10
- FPT_AMT.1.1: 1
- FPT_FLS.1: 10
- FPT_FLS.1.1: 1
- FPT_RCV: 1
- FPT_RCV.1: 10
- FPT_RCV.1.1: 1
- FPT_RCV.4: 9
- FPT_RCV.4.1: 1
- FPT_RVM.1: 14
- FPT_RVM.1.1: 1
- FPT_SEP.1: 18
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_STM.1: 10
- FPT_STM.1.1: 1
- FPT_TDC.1: 12
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST.1: 10
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTA:
- FTA_LSA.1: 10
- FTA_LSA.1.1: 1
- FTA_TSE.1: 10
- FTA_TSE.1.1: 1
- FTP:
- FTP_ITC.1: 16
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 3
|
| pdf_data/st_keywords/cc_claims |
|
- A:
- A.ACCESS: 3
- A.ASSET: 3
- A.CLEARANCE: 3
- A.CONNECT: 7
- A.COOP: 3
- A.LOCATE: 3
- A.MANAGE: 5
- A.NET_COMP: 5
- A.NO_EVIL_ADMIN: 4
- A.OWNER: 3
- A.PEER: 3
- A.PROTECT: 5
- A.SENSITIVITY: 3
- A.UTRAIN: 3
- A.UTRUST: 3
- O:
- O.AUDITING: 19
- O.AUTHORIZATION: 18
- O.COMPROT: 23
- O.DISCRETIONARY_ACCESS: 15
- O.DUTY: 7
- O.ENFORCEMENT: 12
- O.HIERARCHICAL: 7
- O.MANAGE: 33
- O.MANDATORY_ACCESS: 18
- O.RESIDUAL_INFO: 9
- O.RESIDUAL_INFORMATION: 1
- O.ROLE: 21
- OE:
- OE.ADMIN: 7
- OE.CREDEN: 4
- OE.HW_SEP: 8
- OE.INFO_PROTECT: 20
- OE.INSTALL: 12
- OE.MAINTENANCE: 5
- OE.PHYSICAL: 8
- OE.PROTECT: 10
- OE.RECOVER: 8
- OE.SERIAL_LOGIN: 4
- OE.SOFTWARE_IN: 5
- T:
- T.ACCESS: 4
- T.COMPROT: 3
- T.OPERATE: 3
- T.ROLEDEV: 5
- T.UAUSER: 4
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
- miscellaneous:
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_RSA_WITH_AES_128_CBC_SHA: 2
- TLS_RSA_WITH_AES_256_CBC_SHA: 1
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
- FI:
- DFA: 1
- Malfunction: 15
- malfunction: 5
- physical tampering: 1
- SCA:
- DPA: 7
- Leak-Inherent: 14
- Physical Probing: 2
- Physical probing: 1
- physical probing: 4
- other:
|
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
- BSI:
- FIPS:
- ISO:
- ISO/IEC 15408-1: 1
- ISO/IEC 15408-2: 1
- ISO/IEC 15408-3: 1
- ISO/IEC7816-3: 1
|
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- out of scope: 1
- outside of the TOE, such as the hypervisor’s enforcement of separation between guest VMs, is out of scope for this Security Target. 2.4.3 TOE Environment Several TOE systems may be interlinked in a network: 1
|
| pdf_data/st_metadata |
- /Author: Hitachi Ltd.
- /CreationDate: D:20021205112620+09'00'
- /Creator: PScript5.dll Version 5.2
- /ModDate: D:20030107152605+01'00'
- /Producer: Acrobat Distiller 5.0.5 (Windows)
- /Title: Security Target AE450-CC-ST-0002 v1.0
- pdf_file_size_bytes: 334349
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 66
|
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
False |
| state/cert/download_ok |
False |
False |
| state/cert/extract_ok |
False |
False |
| state/cert/pdf_hash |
Equal |
Equal |
| state/cert/txt_hash |
Equal |
Equal |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |