name |
Junos OS 20.2R1-S1 for QFX5120-48T, QFX5120-48Y, QFX5120-32C, QFX5210-64C, EX4650-48Y and QFX5200-48Y |
Digital Tachograph - Vehicle Unit SE5000-8 Version C |
category |
Network and Network-Related Devices and Systems |
Other Devices and Systems |
scheme |
AU |
DE |
status |
active |
archived |
not_valid_after |
15.02.2026 |
17.02.2025 |
not_valid_before |
15.02.2021 |
17.02.2020 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/EFT-T017%20Cert%202021_135%20OS.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1071V3c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/T0017-Certification_Report_V1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1071V3a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Juniper%20QFX5120,%20QFX5200,%20QFX5210,%20EX4650%20Junos%2020.2R1%20ST%20v1.3.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1071V3b_pdf.pdf |
manufacturer |
Juniper Networks, Inc. |
Stoneridge Electronics AB |
manufacturer_web |
https://www.juniper.net/ |
https://www.stoneridge.com |
security_level |
{} |
EAL4+, ATE_DPT.2, AVA_VAN.5 |
dgst |
07bffc2fb1a2fbc4 |
e45747115b016559 |
heuristics/cert_id |
Certificate Number: 2021/135 |
BSI-DSZ-CC-1071-V3-2020 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 |
ALC_DVS.1, ALC_TAT.1, ATE_DPT.2, ALC_CMS.4, ATE_FUN.1, AVA_VAN.5, ADV_FSP.4, ALC_DEL.1, ALC_LCD.1, ADV_ARC.1, ADV_TDS.3, ADV_IMP.1, AGD_OPE.1, ALC_CMC.4, AGD_PRE.1 |
heuristics/extracted_versions |
20.2 |
8 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-1071-V4-2020 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0879-V4-2020, BSI-DSZ-CC-1071-V2-2019 |
heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-1071-V4-2020, BSI-DSZ-CC-1071-V6-2023, BSI-DSZ-CC-1071-V5-2021, BSI-DSZ-CC-1071-V7-2023 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0879-V3-2018, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0879-2014, BSI-DSZ-CC-0879-V4-2020, BSI-DSZ-CC-1071-V2-2019, BSI-DSZ-CC-0879-V2-2015, BSI-DSZ-CC-1071-2019 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0879-V4-2020 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0879-V4-2020 |
heuristics/protection_profiles |
{} |
40651f75a5887085 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0094b_pdf.pdf |
pdf_data/cert_filename |
EFT-T017 Cert 2021_135 OS.pdf |
1071V3c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1071-V3-2020: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL 4 augmented: 1
- EAL 5: 1
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20210217171814+10'00'
- /Creator: ACA75941.dpe.protected.mil.au
- /ModDate: D:20210217171814+10'00'
- /Producer: KONICA MINOLTA bizhub C308
- /Title: SACA75941.d21021717171
- pdf_file_size_bytes: 108210
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20200226113734+01'00'
- /Creator: Writer
- /Keywords: Common Criteria, Certification, Zertifizierung, digital tachograph, vehicle unit, Stoneridge
- /ModDate: D:20200226113909+01'00'
- /Producer: LibreOffice 6.2
- /Subject: SE5000-8
- /Title: Certificate BSI-DSZ-CC-1071-V3-2020
- pdf_file_size_bytes: 896671
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
T0017-Certification_Report_V1.0.pdf |
1071V3a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ATE_DPT.2 and AVA_VAN.5
- cc_version: PP conformant Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-1071-V3-2020
- cert_item: Digital Tachograph - Vehicle Unit SE5000-8 Version C
- cert_lab: BSI
- developer: Stoneridge Electronics AB
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Digital Tachograph - Vehicle Unit (VU PP) Version 1.0, 9 May 2017, BSI-CC-PP-0094-2017
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0879-V4-2020: 1
- BSI-DSZ-CC-1071-V2-: 1
- BSI-DSZ-CC-1071-V2-2019: 2
- BSI-DSZ-CC-1071-V3-2020: 14
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0094-2017: 1
- BSI-CC-PP-0094-2017: 2
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 2: 2
- EAL 2+: 1
- EAL 4: 5
- EAL 4 augmented: 3
- EAL 5: 4
- EAL 5+: 1
- EAL 6: 1
- EAL4: 1
- EAL4+: 1
|
pdf_data/report_keywords/cc_sar |
|
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR: 3
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ATE:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- TSystems:
- T-Systems International: 3
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- BSI:
- AIS 20: 2
- AIS 25: 2
- AIS 26: 2
- AIS 31: 1
- AIS 32: 2
- AIS 34: 3
- AIS 35: 2
- AIS 36: 2
- AIS 38: 1
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- 11] Configuration list SE5000, 1609_005-900590, Rev 12, Stoneridge Electronics AB, Date 2020-02-12 (confidential document) [12] Control Manual SE5000-8 Smart Tachograph, Version 9000-103766P_01 03, Stoneridge Electronics: 1
- Revision 06, Date: 2020-02-12, SE5000-8 Security Target vehicle unit, Stoneridge Electronics AB (confidential document) [7] Evaluation Technical Report, Version 3.02, Date: 17.02.2020, Evaluation Technical Report –: 1
- Version C Stoneridge Electronics AB, T-Systems International GmbH Prüfstelle für IT- Sicherheit (confidential document) [8] Digital Tachograph - Vehicle Unit (VU PP) Version 1.0, 9 May 2017, BSI-CC-PP- 0094-2017 [9: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
|
pdf_data/report_metadata |
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20200226112032+01'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, digital tachograph, vehicle unit, Stoneridge"
- /ModDate: D:20200226113705+01'00'
- /Producer: LibreOffice 6.2
- /Subject: SE5000-8
- /Title: Certification Report BSI-DSZ-CC-1071-V3-2020
- pdf_file_size_bytes: 1330045
- pdf_hyperlinks: http://www.commoncriteriaportal.org/cc/, https://www.sogis.eu/, https://www.bsi.bund.de/AIS, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
pdf_data/st_filename |
Juniper QFX5120, QFX5200, QFX5210, EX4650 Junos 20.2R1 ST v1.3.pdf |
1071V3b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0879-V4-2020: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL4: 12
- EAL4 augmented: 3
- EAL6: 1
- EAL6 augmented: 1
- EAL6+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 2
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 2
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ASE:
- ASE_CCL: 2
- ASE_ECD: 2
- ASE_INT: 2
- ASE_OBJ: 3
- ASE_REQ: 2
- ASE_SPD: 4
- ASE_TSS: 2
- ATE:
- ATE_DPT.1: 1
- ATE_DPT.2: 6
- ATE_FUN.1: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 2
- FAU_GEN.1: 10
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 5
- FAU_GEN.2.1: 1
- FAU_STG: 1
- FAU_STG.1: 4
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG_EXT: 2
- FAU_STG_EXT.1: 5
- FAU_STG_EXT.1.1: 1
- FAU_STG_EXT.1.2: 1
- FAU_STG_EXT.1.3: 1
- FCS:
- FCS_CKM: 2
- FCS_CKM.1: 17
- FCS_CKM.1.1: 1
- FCS_CKM.2: 10
- FCS_CKM.2.1: 1
- FCS_CKM.4: 11
- FCS_CKM.4.1: 1
- FCS_COP: 28
- FCS_COP.1: 6
- FCS_NTP_EXT.1.4: 1
- FCS_RBG_EXT: 2
- FCS_RBG_EXT.1: 7
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 1
- FCS_SSHC_EXT.1.5: 1
- FCS_SSHS_EXT: 1
- FCS_SSHS_EXT.1: 6
- FCS_SSHS_EXT.1.1: 1
- FCS_SSHS_EXT.1.2: 1
- FCS_SSHS_EXT.1.3: 1
- FCS_SSHS_EXT.1.4: 1
- FCS_SSHS_EXT.1.5: 2
- FCS_SSHS_EXT.1.6: 1
- FCS_SSHS_EXT.1.7: 1
- FCS_SSHS_EXT.1.8: 1
- FCS_TLSC_EXT.1.1: 2
- FIA:
- FIA_AFL: 2
- FIA_AFL.1: 9
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_PMG_EXT: 2
- FIA_PMG_EXT.1: 5
- FIA_PMG_EXT.1.1: 1
- FIA_UAU: 2
- FIA_UAU.7: 5
- FIA_UAU.7.1: 1
- FIA_UAU_EXT: 2
- FIA_UAU_EXT.2: 5
- FIA_UAU_EXT.2.1: 1
- FIA_UIA_EXT: 2
- FIA_UIA_EXT.1: 11
- FIA_UIA_EXT.1.1: 1
- FIA_UIA_EXT.1.2: 1
- FIA_UID.1: 3
- FMT:
- FMT_MOF: 19
- FMT_MOF.1: 3
- FMT_MTD: 14
- FMT_MTD.1: 2
- FMT_SMF: 2
- FMT_SMF.1: 13
- FMT_SMF.1.1: 1
- FMT_SMR: 2
- FMT_SMR.1: 5
- FMT_SMR.2: 12
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT: 2
- FPT_APW_EXT.1: 6
- FPT_APW_EXT.1.1: 1
- FPT_APW_EXT.1.2: 1
- FPT_SKP_EXT: 2
- FPT_SKP_EXT.1: 5
- FPT_SKP_EXT.1.1: 1
- FPT_STM: 3
- FPT_STM.1: 3
- FPT_STM_EXT: 2
- FPT_STM_EXT.1: 2
- FPT_STM_EXT.1.1: 1
- FPT_STM_EXT.1.2: 1
- FPT_TST_EXT: 2
- FPT_TST_EXT.1: 6
- FPT_TST_EXT.1.1: 1
- FPT_TUD_EXT: 2
- FPT_TUD_EXT.1: 7
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FTA:
- FTA_SSL: 2
- FTA_SSL.3: 8
- FTA_SSL.4: 6
- FTA_SSL_EXT: 2
- FTA_SSL_EXT.1: 7
- FTA_SSL_EXT.1.1: 1
- FTA_TAB: 2
- FTA_TAB.1: 9
- FTP:
- FTP_ITC: 2
- FTP_ITC.1: 22
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_ITC.2: 6
- FTP_TRP: 8
- FTP_TRP.1: 3
- FTP_TUD.1: 1
|
- FAU:
- FAU_GEN.1: 12
- FAU_GEN.1.1: 17
- FAU_GEN.1.2: 4
- FAU_SAR.1: 6
- FAU_SAR.1.1: 4
- FAU_SAR.1.2: 4
- FAU_STG.1: 11
- FAU_STG.1.1: 4
- FAU_STG.1.2: 4
- FAU_STG.3: 1
- FAU_STG.4: 6
- FAU_STG.4.1: 3
- FCO:
- FCO_NRO.1: 6
- FCO_NRO.1.1: 4
- FCO_NRO.1.2: 3
- FCO_NRO.1.3: 4
- FCS:
- FCS_CKM.1: 41
- FCS_CKM.1.1: 11
- FCS_CKM.2: 18
- FCS_CKM.2.1: 11
- FCS_CKM.4: 43
- FCS_CKM.4.1: 5
- FCS_COP.1: 39
- FCS_COP.1.1: 42
- FCS_RNG: 1
- FCS_RNG.1: 8
- FCS_RNG.1.1: 3
- FCS_RNG.1.2: 3
- FDP:
- FDP_ACC.1: 63
- FDP_ACC.1.1: 45
- FDP_ACF.1: 47
- FDP_ACF.1.1: 49
- FDP_ACF.1.2: 41
- FDP_ACF.1.3: 34
- FDP_ACF.1.4: 17
- FDP_ETC.2: 8
- FDP_ETC.2.1: 4
- FDP_ETC.2.2: 4
- FDP_ETC.2.3: 4
- FDP_ETC.2.4: 4
- FDP_IFC.1: 10
- FDP_ITC.1: 26
- FDP_ITC.1.1: 4
- FDP_ITC.1.2: 4
- FDP_ITC.1.3: 4
- FDP_ITC.2: 34
- FDP_ITC.2.1: 5
- FDP_ITC.2.2: 5
- FDP_ITC.2.3: 5
- FDP_ITC.2.4: 3
- FDP_ITC.2.5: 7
- FDP_ITT.1: 8
- FDP_ITT.1.1: 2
- FDP_RIP: 1
- FDP_RIP.1: 9
- FDP_RIP.1.1: 4
- FDP_SDI.2: 14
- FDP_SDI.2.1: 6
- FDP_SDI.2.2: 5
- FIA:
- FIA_AFL.1: 31
- FIA_AFL.1.1: 12
- FIA_AFL.1.2: 17
- FIA_ATD.1: 20
- FIA_ATD.1.1: 10
- FIA_UAU.1: 23
- FIA_UAU.1.1: 6
- FIA_UAU.1.2: 6
- FIA_UAU.2: 15
- FIA_UAU.2.1: 5
- FIA_UAU.2.2: 1
- FIA_UAU.3: 5
- FIA_UAU.3.1: 6
- FIA_UAU.3.2: 6
- FIA_UAU.5: 6
- FIA_UAU.5.1: 3
- FIA_UAU.5.2: 3
- FIA_UAU.6: 6
- FIA_UAU.6.1: 4
- FIA_UID.1: 13
- FIA_UID.2: 15
- FIA_UID.2.1: 4
- FMT:
- FMT_FMA.3.1: 1
- FMT_MOF.1: 30
- FMT_MOF.1.1: 22
- FMT_MSA.1: 21
- FMT_MSA.1.1: 3
- FMT_MSA.3: 43
- FMT_MSA.3.1: 31
- FMT_MSA.3.2: 32
- FMT_MTD.1: 9
- FMT_MTD.1.1: 3
- FMT_SMF.1: 26
- FMT_SMF.1.1: 6
- FMT_SMR.1: 42
- FMT_SMR.1.1: 6
- FMT_SMR.1.2: 5
- FPT:
- FPT_FLS.1: 5
- FPT_FLS.1.1: 8
- FPT_ITC.1: 3
- FPT_PHP.1: 1
- FPT_PHP.2: 6
- FPT_PHP.2.1: 3
- FPT_PHP.2.2: 3
- FPT_PHP.2.3: 6
- FPT_PHP.3: 6
- FPT_PHP.3.1: 5
- FPT_STM.1: 11
- FPT_STM.1.1: 3
- FPT_TDC.1: 16
- FPT_TDC.1.1: 7
- FPT_TDC.1.2: 7
- FPT_TST.1: 7
- FPT_TST.1.1: 9
- FPT_TST.1.2: 4
- FPT_TST.1.3: 4
- FTP:
- FTP_FLS.1.1: 1
- FTP_ITC.1: 22
- FTP_ITC.1.1: 10
- FTP_ITC.1.2: 8
- FTP_ITC.1.3: 8
- FTP_TRP.1: 2
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN_CREDENTIALS_SECURE: 1
- A.LIMITED_FUNCTIONALITY: 1
- A.NO_THRU_TRAFFIC_PROTECTION: 1
- A.PHYSICAL_PROTECTION: 1
- A.REGULAR_UPDATES: 1
- A.RESIDUAL_INFORMATION: 1
- A.TRUSTED_ADMINSTRATOR: 1
- OE:
- OE.ADMIN_CREDENTIALS_SECURE: 1
- OE.NO_GENERAL_PURPOSE: 1
- OE.NO_THRU_TRAFFIC_PROTECTION: 1
- OE.PHYSICAL: 1
- OE.RESIDUAL_INFORMATION: 1
- OE.TRUSTED_ADMIN: 1
- OE.UPDATES: 1
- T:
- T.PASSWORD_CRACKING: 1
- T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
- T.SECURITY_FUNCTIONALITY_FAILURE: 1
- T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
- T.UNDETECTED_ACTIVITY: 1
- T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
- T.UPDATE_COMPROMISE: 1
- T.WEAK_AUTHENTICATION_ENDPOINTS: 1
- T.WEAK_CRYPTOGRAPHY: 1
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC: 1
- HMAC-SHA-256: 3
- HMAC-SHA-512: 2
|
- AES_competition:
- DES:
- 3DES:
- TDEA: 1
- TDES: 3
- Triple-DES: 1
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 3
- SHA-384: 4
- SHA-512: 2
|
- SHA:
- SHA1:
- SHA2:
- SHA-160: 1
- SHA-2: 17
- SHA-256: 3
- SHA-384: 3
- SHA-512: 3
|
pdf_data/st_keywords/crypto_scheme |
- KEX:
- Key Exchange: 3
- Key exchange: 1
- MAC:
|
|
pdf_data/st_keywords/crypto_protocol |
- SSH:
- TLS:
- SSL:
- TLS:
- TLS: 7
- TLS1.1: 1
- TLS1.2: 1
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 8
- P-384: 6
- P-521: 6
|
- Brainpool:
- brainpoolP256r1: 1
- brainpoolP384r1: 1
- brainpoolP512r1: 1
- NIST:
- NIST P-256: 2
- NIST P-384: 2
- NIST P-521: 2
- P-256: 2
- P-384: 2
- P-521: 2
- secp256r1: 1
- secp384r1: 1
- secp521r1: 1
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Physical tampering: 1
- fault injection: 3
- malfunction: 1
- physical tampering: 9
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2012-09-004: 1
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- FIPS 180-4: 3
- FIPS 186-4: 2
- FIPS 197: 2
- FIPS 198-1: 3
- FIPS PUB 186-4: 6
- ISO:
- ISO/IEC 14888-3: 1
- ISO/IEC 18031:2011: 2
- ISO/IEC 9796-2: 1
- PKCS:
- RFC:
- RFC 3526: 2
- RFC 4251: 2
- RFC 4252: 1
- RFC 4253: 3
- RFC 4254: 1
- RFC 5656: 1
- RFC 6668: 1
- RFC3526: 1
- RFC5656: 1
- X509:
|
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 1
- ISO:
- ISO/IEC 10116: 2
- ISO/IEC 16844-3: 1
- ISO/IEC 9796-2: 1
- ISO/IEC 9797-1: 1
- ISO/IEC 9798-3: 1
- RFC:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- It first provides a descriptive overview of the TOE and then summarises the items which are out of scope of the TOE. 1.5.1 Overview 5. The Target of Evaluation (TOE) is Juniper Networks, Inc. Junos OS 20: 1
- out of scope: 1
|
|
pdf_data/st_metadata |
|
- /Author: Ellingsson, Tomas
- /CreationDate: D:20200213145625+01'00'
- /Creator: Microsoft® Word 2013
- /Keywords: Smart Tachograph, SE5000-8, Vehicle Unit, Recording equipment
- /ModDate: D:20200213145625+01'00'
- /Producer: Microsoft® Word 2013
- /Subject: SE5000-8 Security Target
- /Title: SE5000-8 Security Target Lite Vehicle unit
- pdf_file_size_bytes: 2686337
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 115
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |