name |
Fonction de filtrage de la suite logicielle IPSFirewall,version 9.1.0.5 |
Sony Xperia™ X and Sony Xperia™ X Performance |
category |
Network and Network-Related Devices and Systems |
Mobility |
scheme |
FR |
SE |
status |
archived |
archived |
not_valid_after |
21.10.2019 |
07.12.2021 |
not_valid_before |
21.10.2014 |
07.12.2016 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ccra%20cert%20sony%20x.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2014_72.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20Sony%20X.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[IN.039]%20NA_ASE_ciblesec_filter_v91.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Sony-CC-SecurityTarget_v1.2(348227)_TMP.pdf |
manufacturer |
Netasq |
Sony Mobile Communications Inc. |
manufacturer_web |
https://www.netasq.com/ |
https://www.sonymobile.com/se/ |
security_level |
EAL4+, ALC_FLR.3 |
EAL1 |
dgst |
0c805fd278f96fef |
69e48d085b8d8069 |
heuristics/cert_id |
ANSSI-CC-2014/72 |
CSEC2010003 |
heuristics/cert_lab |
OPPIDA |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, ALC_TSU_EXT.1, AGD_PRE.1 |
heuristics/extracted_versions |
9.1.0.5 |
- |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
ANSSI-CC-2014/70 |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
ANSSI-CC-2014/70 |
{} |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
b43e1d04965c0a49 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_md_v2.0.pdf |
pdf_data/cert_filename |
|
ccra cert sony x.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /CreationDate: D:20170403155121+02'00'
- /ModDate: D:20230313140935+01'00'
- pdf_file_size_bytes: 261750
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
ANSSI-CC-2014_72.pdf |
Certification Report Sony X.pdf |
pdf_data/report_frontpage |
- FR:
- cc_security_level: EAL 4 augmenté ALC_FLR.3
- cc_version: Critères Communs version 3.1 révision 3
- cert_id: ANSSI-CC-2014/72
- cert_item: Fonction de filtrage de la suite logicielle IPS-Firewall
- cert_item_version: Version 9.1.0.5
- cert_lab: Oppida 4-6 avenue du vieil étang, Bâtiment B 78180 Montigny le Bretonneux France
- developer: NETASQ Parc Scientifique de la Haute borne Parc Horizon, Bâtiment 6, Avenue de l’Horizon 59650 Villeneuve d’Ascq France Commanditaire NETASQ Parc Scientifique de la Haute borne Parc Horizon, Bâtiment 6, Avenue de l’Horizon 59650 Villeneuve d’Ascq France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur (.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: Néant
|
|
pdf_data/report_keywords/cc_cert_id |
- FR:
- ANSSI-CC-2014/70: 1
- ANSSI-CC-2014/72: 18
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 2
- EAL 5: 1
- EAL 7: 1
- EAL3: 1
- EAL4: 2
- ITSEC:
|
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMC.4: 1
- ALC_CMS: 1
- ALC_CMS.4: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_FLR: 2
- ALC_FLR.3: 3
- ALC_LCD: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ALC_TSU_EXT.1: 3
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
- CVE:
- CVE-2016-0839: 1
- CVE-2016-0841: 1
- CVE-2016-2428: 1
- CVE-2016-2429: 1
- CVE-2016-2463: 1
- CVE-2016-2464: 1
- CVE-2016-2506: 1
- CVE-2016-2507: 1
- CVE-2016-2508: 1
- CVE-2016-3741: 1
- CVE-2016-3742: 1
- CVE-2016-3743: 1
- CVE-2016-3820: 1
- CVE-2016-3821: 1
- CVE-2016-3822: 1
- CVE-2016-3840: 1
- CVE-2016-3861: 1
- CVE-2016-3862: 1
- CVE-2016-3863: 1
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- FIPS:
- ISO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- OutOfScope:
- expected to return to its user. Note: Defending against device re-use after physical compromise is out of scope for this protection profile. T.FLAWAPP: Malicious or Flawed Application Swedish Certification Body: 1
- out of scope: 1
|
pdf_data/report_metadata |
- /Author:
- /CreationDate:
- /Creator: PDFCreator Version 1.2.1
- /Keywords:
- /ModDate:
- /Producer: GPL Ghostscript 9.02
- /Subject:
- /Title: ANSSI-CC-2014_72
- pdf_file_size_bytes: 293397
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 17
|
- /Ansvarigt Område/enhet: CSEC
- /Author: Imre Juhász
- /C-datum: 2008
- /CSECID:
- /Category:
- /Comments:
- /Company:
- /ContentTypeId: 0x010100F76CA16D2B00D340871F443D8708C84D010072C770E6C96E7A4EA94967F9D5C0E603
- /CreationDate: D:20170403103416+02'00'
- /Creator: Acrobat PDFMaker 11 för Word
- /Current Version:
- /DDocBinder: Scheme (CB)
- /DDocCabinet: QMS
- /DDocID: 2005-03-05-64D6-T9YR
- /DDocLastModDate: 2006-03-16 10:56:39
- /DDocLibrary: https://haddock.fmv.se/domdoc/CSECLib.nsf
- /DDocRevision: 3,7
- /DDocTitle: 035 CB General Document - Template
- /Datum, skapat: -
- /Deluppdragsbenämning:
- /Dokument Status: Aktiv
- /Dokumentansvarig: Imre Juhász
- /Dokumentansvarigs enhet: KC Ledsyst
- /Dokumentbeteckning:
- /Dokumentdatum: 2017-04-03
- /Dokumenttitel: Certification Report Sony Xperia X and Sony Xperia X Performance
- /Dokumenttyp: CB
- /FMV_beteckning: 16FMV2071-76:1
- /Fastställarens roll: Certifier
- /Fastställt av: Imre Juhász
- /Fastställt av1: Imre Juhász
- /Giltigt från: -
- /Infoklass: HEMLIG/
- /Informationsklass:
- /Keywords:
- /Klassificeringsnr: 25 550
- /MallVersion: 7.0
- /ModDate: D:20170403124210+02'00'
- /Paragraf:
- /Platina: 1
- /Producer: Adobe PDF Library 11.0
- /Referens ID: CSEC-37-1156
- /Sekr. gäller tom.: -
- /SourceModified: D:20170403083341
- /Stämpel: 1
- /Subject: 16FMV2071-76:1
- /Title: Certification Report Sony Xperia X and Sony Xperia X Performance
- /Uncontrolled: 0.000000
- /Uppdragsbenämning:
- /Utgåva: 2.0
- /_dlc_DocId: CSEC-37-1156
- /_dlc_DocIdItemGuid: 671c079c-346d-423e-ac5c-f1312a8a09be
- /_dlc_DocIdUrl: http://sp.fmv.se/sites/CSEC/_layouts/15/DocIdRedir.aspx?ID=CSEC-37-1156, CSEC-37-1156
- pdf_file_size_bytes: 145099
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 18
|
pdf_data/st_filename |
[IN.039] NA_ASE_ciblesec_filter_v91.pdf |
Sony-CC-SecurityTarget_v1.2(348227)_TMP.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
- NL:
- CC-01: 3
- CC-02: 4
- CC-03: 4
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.3: 5
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 4
- ASE_REQ.2.3: 2
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ALC_TSU_EXT: 1
- ALC_TSU_EXT.1: 3
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 3
- ASE_TSS.1: 1
- ATE:
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 7
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 3
- FAU_STG.3: 7
- FAU_STG.3.1: 2
- FDP:
- FDP_IFC.2: 7
- FDP_IFC.2.1: 3
- FDP_IFC.2.2: 2
- FDP_IFF.1: 7
- FDP_IFF.1.1: 2
- FDP_IFF.1.2: 2
- FDP_IFF.1.3: 2
- FDP_IFF.1.4: 2
- FDP_IFF.1.5: 2
- FMT:
- FPT:
|
- FCS:
- FCS_CKM: 2
- FCS_CKM.1: 14
- FCS_CKM.1.1: 2
- FCS_CKM.2: 1
- FCS_CKM.2.1: 6
- FCS_CKM_EXT.1: 3
- FCS_CKM_EXT.1.1: 2
- FCS_CKM_EXT.1.2: 1
- FCS_CKM_EXT.1.3: 1
- FCS_CKM_EXT.1.4: 2
- FCS_CKM_EXT.2: 3
- FCS_CKM_EXT.2.1: 1
- FCS_CKM_EXT.3: 4
- FCS_CKM_EXT.3.1: 1
- FCS_CKM_EXT.3.2: 1
- FCS_CKM_EXT.4: 3
- FCS_CKM_EXT.4.1: 2
- FCS_CKM_EXT.4.2: 1
- FCS_CKM_EXT.5: 3
- FCS_CKM_EXT.5.1: 1
- FCS_CKM_EXT.5.2: 1
- FCS_CKM_EXT.6: 3
- FCS_CKM_EXT.6.1: 1
- FCS_CKM_EXT.7: 3
- FCS_CKM_EXT.7.1: 1
- FCS_COP: 1
- FCS_COP.1: 34
- FCS_COP.1.1: 5
- FCS_RBG: 1
- FCS_RBG_EXT.1: 12
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FCS_RBG_EXT.1.3: 1
- FCS_SRV: 1
- FCS_SRV_EXT.1: 4
- FCS_SRV_EXT.1.1: 1
- FCS_STG: 1
- FCS_STG_EXT.1: 3
- FCS_STG_EXT.1.1: 1
- FCS_STG_EXT.1.2: 1
- FCS_STG_EXT.1.3: 1
- FCS_STG_EXT.1.4: 1
- FCS_STG_EXT.1.5: 1
- FCS_TLSC: 1
- FCS_TLSC_EXT.1: 3
- FCS_TLSC_EXT.1.1: 2
- FCS_TLSC_EXT.1.2: 1
- FCS_TLSC_EXT.1.3: 1
- FCS_TLSC_EXT.1.4: 1
- FCS_TLSC_EXT.1.5: 1
- FCS_TLSC_EXT.2: 5
- FCS_TLSC_EXT.2.1: 1
- FCS_TLSC_EXT.2.2: 1
- FCS_TLSC_EXT.2.3: 1
- FCS_TLSC_EXT.2.4: 1
- FCS_TLSC_EXT.2.5: 1
- FDP:
- FDP_ACF: 2
- FDP_ACF_EXT.1: 3
- FDP_ACF_EXT.1.1: 1
- FDP_ACF_EXT.1.2: 1
- FDP_DAR: 2
- FDP_DAR_EXT.1: 3
- FDP_DAR_EXT.1.1: 1
- FDP_DAR_EXT.1.2: 1
- FDP_IFC: 2
- FDP_IFC_EXT.1: 4
- FDP_IFC_EXT.1.1: 1
- FDP_STG: 2
- FDP_STG_EXT.1: 3
- FDP_STG_EXT.1.1: 1
- FDP_UPC: 2
- FDP_UPC_EXT.1: 3
- FDP_UPC_EXT.1.1: 1
- FDP_UPC_EXT.1.2: 1
- FIA:
- FIA_AFL: 2
- FIA_AFL_EXT.1: 4
- FIA_AFL_EXT.1.1: 1
- FIA_AFL_EXT.1.2: 1
- FIA_AFL_EXT.1.3: 1
- FIA_BLT: 2
- FIA_BLT_EXT.1: 3
- FIA_BLT_EXT.1.1: 1
- FIA_PAE: 2
- FIA_PAE_EXT.1: 4
- FIA_PMG: 2
- FIA_PMG_EXT.1: 3
- FIA_PMG_EXT.1.1: 1
- FIA_TRT: 2
- FIA_TRT_EXT.1: 3
- FIA_TRT_EXT.1.1: 1
- FIA_UAU: 2
- FIA_UAU.7: 2
- FIA_UAU.7.1: 1
- FIA_UAU_EXT.1: 3
- FIA_UAU_EXT.1.1: 1
- FIA_UAU_EXT.2: 4
- FIA_UAU_EXT.2.1: 1
- FIA_UAU_EXT.2.2: 1
- FIA_UAU_EXT.3: 3
- FIA_UAU_EXT.3.1: 1
- FMT:
- FMT_MOF: 2
- FMT_MOF_EXT.1: 3
- FMT_MOF_EXT.1.1: 3
- FMT_MOF_EXT.1.2: 3
- FMT_SMF: 2
- FMT_SMF_EXT.1: 14
- FMT_SMF_EXT.1.1: 2
- FMT_SMF_EXT.2: 3
- FMT_SMF_EXT.2.1: 1
- FPT:
- FPT_AEX: 2
- FPT_AEX_EXT.1: 3
- FPT_AEX_EXT.1.1: 1
- FPT_AEX_EXT.1.2: 1
- FPT_AEX_EXT.2: 3
- FPT_AEX_EXT.2.1: 1
- FPT_AEX_EXT.3: 3
- FPT_AEX_EXT.3.1: 1
- FPT_AEX_EXT.4: 3
- FPT_AEX_EXT.4.1: 1
- FPT_AEX_EXT.4.2: 1
- FPT_KST: 2
- FPT_KST_EXT.1: 3
- FPT_KST_EXT.1.1: 1
- FPT_KST_EXT.2: 3
- FPT_KST_EXT.2.1: 1
- FPT_KST_EXT.3: 3
- FPT_KST_EXT.3.1: 1
- FPT_NOT: 1
- FPT_NOT_EXT.1: 3
- FPT_NOT_EXT.1.1: 1
- FPT_STM: 2
- FPT_STM.1: 2
- FPT_STM.1.1: 1
- FPT_TST: 2
- FPT_TST_EXT.1: 3
- FPT_TST_EXT.1.1: 1
- FPT_TST_EXT.2: 3
- FPT_TST_EXT.2.1: 1
- FPT_TUD: 2
- FPT_TUD_EXT.1: 3
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FPT_TUD_EXT.2: 3
- FPT_TUD_EXT.2.1: 1
- FPT_TUD_EXT.2.2: 1
- FPT_TUD_EXT.2.3: 1
- FPT_TUD_EXT.2.4: 1
- FPT_TUD_EXT.2.6: 1
- FTA:
- FTA_SSL: 2
- FTA_SSL_EXT.1: 3
- FTA_SSL_EXT.1.1: 1
- FTA_SSL_EXT.1.2: 1
- FTA_SSL_EXT.1.3: 1
- FTA_TAB.1: 2
- FTA_TAB.1.1: 1
- FTA_WSE: 2
- FTA_WSE_EXT.1: 3
- FTA_WSE_EXT.1.1: 1
- FTP:
- FTP_ITC: 2
- FTP_ITC_EXT.1: 3
- FTP_ITC_EXT.1.1: 1
- FTP_ITC_EXT.1.2: 1
- FTP_ITC_EXT.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- O:
- O.AUDIT: 4
- O.FILTRAGE: 6
- O.PERTE_AUDIT: 5
- OE:
- OE.BONNE_PF: 2
- OE.COUPURE: 3
- OE.INTEGRE: 2
- OE.JOURNAL: 2
- OE.PERSONNEL: 2
- OE.PROTECT_BOITIERS: 2
- OE.USAGE_STRICT: 2
|
- A:
- A.CONFIG: 1
- A.NOTIFY: 1
- A.PRECAUTION: 1
- O:
- O.AUTH: 1
- O.COMMS: 1
- O.CONFIG: 1
- O.INTEGRITY: 1
- O.STORAGE: 1
- OE:
- OE.CONFIG: 1
- OE.NOTIFY: 1
- OE.PRECAUTION: 1
- T:
- T.EAVESDROP: 1
- T.FLAWAPP: 2
- T.NETWORK: 1
- T.PERSISTENT: 2
- T.PHYSICAL: 3
|
pdf_data/st_keywords/vendor |
|
- Broadcom:
- Microsoft:
- Qualcomm:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- AES:
- AES: 27
- AES-: 1
- AES-256: 1
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-2: 1
- SHA-224: 1
- SHA-256: 8
- SHA-384: 2
- SHA-512: 2
- SHA256: 2
- SHA384: 1
- SHA512: 1
- scrypt:
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
- IKE:
- IPsec:
- TLS:
- TLS:
- TLS: 25
- TLS 1.0: 2
- TLS 1.1: 2
- TLS 1.2: 4
- TLS v1.0: 1
- VPN:
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
- CBC:
- CCM:
- CTR:
- ECB:
- GCM:
- XTS:
|
pdf_data/st_keywords/ecc_curve |
|
- NIST:
- NIST P-224: 1
- P-224: 1
- P-256: 10
- P-384: 10
- P-521: 10
- secp256r1: 3
- secp384r1: 3
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 2
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 2
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 2
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 2
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 2
- TLS_RSA_WITH_AES_128_CBC_SHA: 4
- TLS_RSA_WITH_AES_256_CBC_SHA: 4
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
- ARM:
- ARM TrustZone: 1
- TrustZone: 1
- IBM:
- other:
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- RFC:
- RFC 1349: 1
- RFC 2406: 1
- RFC 2474: 1
- RFC 768: 1
- RFC 792: 1
- RFC 793: 1
|
- CC:
- FIPS:
- FIPS 104-2: 1
- FIPS 140-2: 6
- FIPS 180-4: 3
- FIPS 186-2: 1
- FIPS 186-4: 5
- FIPS 197: 5
- FIPS 198-1: 3
- FIPS PUB 186-4: 8
- FIPS PUB 197: 4
- NIST:
- NIST SP 800-108: 1
- NIST SP 800-132: 2
- NIST SP 800-38A: 2
- NIST SP 800-38C: 2
- NIST SP 800-38D: 2
- NIST SP 800-38E: 2
- NIST SP 800-38F: 4
- NIST SP 800-57: 2
- SP 800-38: 4
- SP 800-56A: 2
- SP 800-90A: 1
- RFC:
- RFC 2818: 2
- RFC 4346: 2
- RFC 4492: 8
- RFC 5246: 14
- RFC 5280: 4
- RFC 5289: 4
- RFC 5759: 2
- RFC 6125: 2
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
- com:
- com.android.voicemail.permission: 1
- java:
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- These services, including some specific Xperia in Business services, such as Xperia Care, are out of scope of the TOE. 1 Much of the information provided in this section originates from the Android Security: 1
- expected to return to its user. Note: Defending against device re-use after physical compromise is out of scope for this protection profile. T.FLAWAPP Malicious or Flawed Application Applications loaded onto the: 1
- out of scope: 2
|
pdf_data/st_metadata |
- /Author: Boris Maréchal
- /CreationDate: D:20140708105454+02'00'
- /Creator: Writer
- /Producer: LibreOffice 3.6
- /Title: Cible de sécurité fonction de filtrage de la suite logicielle IPS-Firewall Version 9.1
- pdf_file_size_bytes: 670051
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 39
|
- /AAPL:Keywords: []
- /Author: Rasma
- /CreationDate: D:20170127123826Z
- /Creator: Word
- /Keywords:
- /ModDate: D:20170403152705+02'00'
- /Producer: Mac OS X 10.12.2 Quartz PDFContext
- /Subject:
- /Title: Sony-CC-SecurityTarget_v1.2
- pdf_file_size_bytes: 1236228
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 61
|
state/cert/convert_garbage |
False |
True |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |