name |
Huawei Reliable Telecomm Operating System version 207.3.5.SPC100.B004 |
Feitian FT-JCOS v1.0/0.106.13 running on Infineon M7892 B11 |
category |
Operating Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
ES |
NO |
status |
active |
archived |
not_valid_after |
01.02.2027 |
27.06.2021 |
not_valid_before |
01.02.2022 |
27.06.2016 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-19-Certificate.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-19-INF-3679.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20160627_SERTIT-079_CR_1.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-19-ST.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[08250][FTJCOS][ST][V1.0.11]FTJCOS_Security_Target.pdf |
manufacturer |
Huawei Technologies Co., Ltd. |
Feitian Technologies Co., Ltd. |
manufacturer_web |
https://www.huawei.com |
https://www.ftsafe.com |
security_level |
EAL4, ALC_FLR.3 |
EAL4+, ALC_DVS.2, AVA_VAN.5 |
dgst |
0cc9d8f07bee3b56 |
4fdb0afc0bbabfb8 |
heuristics/cert_id |
2019-19-INF-3679 |
SERTIT-079 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 |
AVA_COMP.1, ASE_INT.1, ASE_COMP.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ADV_COMP.1, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ALC_TAT.2, ADV_TDS.4, ASE_REQ.2, ATE_COMP.1, ALC_COMP.1, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
207.3.5 |
1.0, 0.106.13 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- category: Operating systems
- certification_date: 01.02.2022
- enhanced:
- manufacturer: Huawei Technologies Co., Ltd.
- product: Huawei Reliable Telecomm Operating System version 207.3.5.SPC100.B004
- product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/778-huawei-reliable-telecomm-operating-system-version-207-3-5-spc100-b004
|
- category: ICs, Smart Cards and Smart Card-Related Devices and Systems
- certification_date: 27.06.2016
- developer: Feitian Technologies Co., Ltd.
- enhanced:
- category: ICs, Smart Cards and Smart Card-Related Devices and Systems
- cert_id: SERTIT-079
- certification_date: 27.06.2016
- description: The TOE is a Java Card Platform compliant with Java Card Specification v.2.2.2 and GlobalPlatformSpecification v.2.1.1. The TOE allows post-issuance downloading of applications that have been previously verified by an off-card trusted IT component. It constitutes a secure generic platform that supports multi-application runtime environment and provides facilities for secure loading and interoperability between different applications. The TOE does not implement JCRMI and does not include any software on the application layer.
- developer: Feitian Technologies Co., Ltd.
- documents: frozendict({'cert': [frozendict({'href': 'https://sertit.no/getfile.php/135064-1607952717/SERTIT/Sertifikater/2016/79/20160627_SERTIT-079_Certificate.pdf'})], 'target': [frozendict({'href': 'https://sertit.no/getfile.php/135061-1607952711/SERTIT/Sertifikater/2016/79/%5B08250%5D%5BFTJCOS%5D%5BST%5D%5BV1.0.11%5DFTJCOS_Security_Target.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/135058-1607952708/SERTIT/Sertifikater/2016/79/20160627_SERTIT-079_CR_1.pdf'})]})
- evaluation_facility: Brightsight B.V.
- level: EAL 4, ALC_DVS.2, AVA_VAN.5
- mutual_recognition: CCRA, SOG-IS
- product: Feitian FT-JCOS v1.0/0.106.13 running on Infineon M7892 B11
- product: FT-JCOS
- url: https://sertit.no/certified-products/product-archive/ft-jcos
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0782-2012 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0758-2012, BSI-DSZ-CC-0782-2012 |
heuristics/protection_profiles |
70cdc8b0cf910af7 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0067b_pdf.pdf |
{} |
pdf_data/cert_filename |
2019-19-Certificate.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP- 0067: 1
- BSI-CC-PP-0067: 1
|
|
pdf_data/cert_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL4: 1
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
- Huawei:
- Huawei: 2
- Huawei Technologies Co: 2
|
|
pdf_data/cert_keywords/eval_facility |
- DEKRA:
- DEKRA Testing and Certification: 1
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author:
- /CreationDate:
- /Creator:
- /Keywords:
- /ModDate:
- /Producer:
- /Subject:
- /Title:
- /Trapped:
- pdf_file_size_bytes: 912672
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
|
pdf_data/report_filename |
2019-19-INF-3679.pdf |
20160627_SERTIT-079_CR_1.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 2: 1
- EAL 4: 2
- EAL2: 1
- EAL4: 8
- EAL4+: 1
- ITSEC:
|
- EAL:
- EAL 4+: 12
- EAL1: 1
- EAL2: 1
- EAL4: 2
- EAL7: 1
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_IMP.1: 1
- AGD:
- ALC:
- ALC_CMC.4: 1
- ALC_DEL.1: 1
- ALC_FLR: 3
- ALC_FLR.3: 6
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_INT.1: 1
- ASE_REQ.2: 1
- ATE:
- ATE_COV.2: 1
- ATE_FUN.1: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_COMP.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_COMP.1: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 4
- ALC_FLR: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_COMP.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COMP.1: 1
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND: 1
- ATE_IND.2: 1
- AVA:
- AVA_COMP.1: 1
- AVA_VAN.5: 3
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 1
- FAU_GEN.2: 1
- FAU_SAR.1: 1
- FAU_SAR.2: 1
- FAU_SEL.1: 1
- FAU_STG.1: 1
- FAU_STG.3: 1
- FAU_STG.4: 1
- FCS:
- FCS_CKM.1: 4
- FCS_CKM.2: 1
- FCS_CKM.4: 1
- FCS_COP.1: 1
- FCS_RNG: 1
- FCS_RNG.1: 1
- FDP:
- FDP_ACC.1: 2
- FDP_ACF.1: 2
- FDP_IFC.2: 1
- FDP_IFF.1: 1
- FDP_ITC.2: 1
- FDP_RIP.2: 1
- FDP_RIP.3: 2
- FIA:
- FIA_AFL.1: 1
- FIA_ATD.1: 2
- FIA_SOS.1: 1
- FIA_UAU.1: 1
- FIA_UAU.5: 1
- FIA_UAU.7: 1
- FIA_UID.1: 1
- FIA_USB.2: 2
- FMT:
- FMT_MSA.1: 2
- FMT_MSA.3: 3
- FMT_MSA.4: 1
- FMT_MTD.1: 12
- FMT_REV.1: 2
- FMT_SMF.1: 1
- FMT_SMR.1: 1
- FPT:
- FPT_STM.1: 1
- FPT_TDC.1: 1
- FTA:
- FTA_SSL.1: 1
- FTA_SSL.2: 1
- FTP:
|
- FAU:
- FCO:
- FCS:
- FCS_CKM.1: 1
- FCS_CKM.2: 1
- FCS_CKM.3: 1
- FCS_CKM.4: 1
- FCS_COP.1: 1
- FCS_RNG.1: 3
- FDP:
- FDP_ACC: 3
- FDP_ACF: 3
- FDP_IFC: 2
- FDP_IFF: 2
- FDP_ITC: 1
- FDP_RIP: 8
- FDP_ROL: 1
- FDP_SDI.2: 1
- FDP_UIT: 1
- FIA:
- FMT:
- FMT_MSA: 11
- FMT_MTD: 2
- FMT_SMF: 3
- FMT_SMF.1: 1
- FMT_SMR: 4
- FMT_SMR.1: 1
- FPR:
- FPT:
- FPT_FLS: 3
- FPT_FLS.1: 1
- FPT_RCV: 3
- FPT_TDC.1: 1
- FTP:
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
- Huawei:
- Huawei: 21
- Huawei Technologies Co: 3
|
- Feitian:
- Feitian: 2
- Feitian Technologies Co: 2
- Infineon:
|
pdf_data/report_keywords/eval_facility |
- DEKRA:
- DEKRA Testing and Certification: 5
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 15408: 4
- ISO/IEC 7816: 2
- SCP:
|
pdf_data/report_keywords/javacard_version |
|
- GlobalPlatform:
- JavaCard:
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
- /Author: Arne
- /CreationDate: D:20160821174342+02'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20160821174443+02'00'
- /Producer: Acrobat Distiller 9.5.5 (Windows)
- /Title: Microsoft Word - SERTIT-079 CR 1.0
- pdf_file_size_bytes: 1626992
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
pdf_data/st_filename |
2019-19-ST.pdf |
[08250][FTJCOS][ST][V1.0.11]FTJCOS_Security_Target.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0782-: 1
- BSI-DSZ-CC-0782-2012: 1
- BSI-DSZ-CC-0782-2012-MA-01: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 1
- EAL 4 augmented: 1
- EAL4: 5
- EAL4+: 1
- EAL5: 1
- EAL5 augmented: 1
- EAL6: 1
- EAL6 augmented: 1
- EAL6+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.3: 4
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 7
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 6
- ADV_FSP.1: 4
- ADV_FSP.2: 2
- ADV_FSP.4: 2
- ADV_FSP.5: 7
- ADV_IMP.1: 9
- ADV_INT.2: 1
- ADV_TDS.1: 2
- ADV_TDS.2: 1
- ADV_TDS.3: 10
- ADV_TDS.4: 1
- AGD:
- AGD_OPE.1: 10
- AGD_PRE.1: 6
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.1: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 2
- ALC_DVS.2: 7
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ALC_TAT.2: 2
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 4
- ASE_INT.1: 5
- ASE_OBJ.2: 3
- ASE_REQ.1: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 3
- ATE_DPT.1: 2
- ATE_FUN.1: 6
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 11
- FAU_GEN.1.1: 3
- FAU_GEN.2: 8
- FAU_GEN.2.1: 1
- FAU_SAR.1: 7
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 5
- FAU_SAR.2.1: 1
- FAU_SEL.1: 9
- FAU_SEL.1.1: 1
- FAU_STG.1: 9
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 7
- FAU_STG.3.1: 1
- FAU_STG.4: 8
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM.1: 38
- FCS_CKM.1.1: 4
- FCS_CKM.2: 12
- FCS_CKM.2.1: 1
- FCS_CKM.4: 13
- FCS_CKM.4.1: 1
- FCS_COP.1: 22
- FCS_COP.1.1: 1
- FCS_RNG: 3
- FCS_RNG.1: 16
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC.1: 23
- FDP_ACC.1.1: 2
- FDP_ACF.1: 18
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 1
- FDP_IFC.1: 5
- FDP_IFC.2: 8
- FDP_IFC.2.1: 1
- FDP_IFC.2.2: 1
- FDP_IFF.1: 11
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 6
- FDP_IFF.1.5: 1
- FDP_ITC: 1
- FDP_ITC.1: 3
- FDP_ITC.2: 12
- FDP_ITC.2.1: 2
- FDP_ITC.2.2: 1
- FDP_ITC.2.3: 1
- FDP_ITC.2.4: 1
- FDP_ITC.2.5: 1
- FDP_RIP: 1
- FDP_RIP.2: 17
- FDP_RIP.2.1: 1
- FDP_RIP.3: 20
- FDP_RIP.3.1: 2
- FIA:
- FIA_AFL.1: 8
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 15
- FIA_ATD.1.1: 2
- FIA_SOS.1: 7
- FIA_SOS.1.1: 1
- FIA_UAU.1: 12
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.5: 7
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.7: 6
- FIA_UAU.7.1: 1
- FIA_UID.1: 12
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 5
- FIA_USB.2: 13
- FIA_USB.2.1: 2
- FIA_USB.2.2: 2
- FIA_USB.2.3: 2
- FIA_USB.2.4: 2
- FMT:
- FMT_MSA.1: 16
- FMT_MSA.1.1: 2
- FMT_MSA.3: 20
- FMT_MSA.3.1: 3
- FMT_MSA.3.2: 3
- FMT_MSA.4: 6
- FMT_MSA.4.1: 1
- FMT_MTD.1: 81
- FMT_MTD.1.1: 12
- FMT_REV.1: 13
- FMT_REV.1.1: 2
- FMT_REV.1.2: 2
- FMT_SMF.1: 21
- FMT_SMF.1.1: 1
- FMT_SMR.1: 26
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM.1: 7
- FPT_STM.1.1: 1
- FPT_TDC.1: 9
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FTA:
- FTA_SSL.1: 6
- FTA_SSL.1.1: 1
- FTA_SSL.1.2: 1
- FTA_SSL.2: 6
- FTA_SSL.2.1: 1
- FTA_SSL.2.2: 1
- FTP:
- FTP_ITC.1: 9
- FTP_ITC.1.1: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 1
|
- FAU:
- FAU_ARP.1: 24
- FAU_ARP.1.1: 2
- FAU_SAA.1: 3
- FCO:
- FCS:
- FCS_CKM: 3
- FCS_CKM.1: 10
- FCS_CKM.2: 8
- FCS_CKM.2.1: 1
- FCS_CKM.3: 6
- FCS_CKM.3.1: 1
- FCS_CKM.4: 8
- FCS_CKM.4.1: 1
- FCS_COP: 13
- FCS_COP.1: 25
- FCS_RNG: 6
- FCS_RNG.1: 12
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC: 29
- FDP_ACC.1: 13
- FDP_ACC.2: 5
- FDP_ACF: 31
- FDP_ACF.1: 18
- FDP_IFC: 22
- FDP_IFC.1: 13
- FDP_IFC.2: 2
- FDP_IFF: 18
- FDP_IFF.1: 17
- FDP_ITC: 10
- FDP_ITC.2: 9
- FDP_ITT.1: 1
- FDP_RIP: 117
- FDP_RIP.1: 10
- FDP_ROL: 15
- FDP_ROL.1: 4
- FDP_SDI.1: 1
- FDP_SDI.2: 13
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UIT: 5
- FDP_UIT.1: 2
- FIA:
- FIA_ATD: 8
- FIA_ATD.1: 2
- FIA_UID: 19
- FIA_UID.1: 11
- FIA_UID.2: 1
- FIA_USB: 6
- FIA_USB.1: 3
- FMT:
- FMT_MSA: 105
- FMT_MSA.1: 9
- FMT_MSA.2: 2
- FMT_MSA.3: 19
- FMT_MTD: 20
- FMT_MTD.1: 2
- FMT_MTD.3: 1
- FMT_SMF: 29
- FMT_SMF.1: 20
- FMT_SMF.1.1: 1
- FMT_SMR: 43
- FMT_SMR.1: 28
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNO.1: 13
- FPR_UNO.1.1: 2
- FPT:
- FPT_FLS: 31
- FPT_FLS.1: 16
- FPT_FLS.1.1: 2
- FPT_ITT.1: 1
- FPT_PHP.3: 1
- FPT_RCV: 23
- FPT_RCV.3: 13
- FPT_RCV.4: 2
- FPT_TDC.1: 8
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 2
- FPT_TST.1: 1
- FRU:
- FTP:
- FTP_ITC: 6
- FTP_ITC.1: 4
- FTP_TRP.1: 2
|
pdf_data/st_keywords/cc_claims |
- A:
- A.AUTHUSER: 4
- A.CONNECT: 4
- A.DETECT: 4
- A.MANAGE: 6
- A.PEER: 6
- A.PHYSICAL: 3
- A.TRAINEDUSER: 4
- O:
- O.AUDITING: 15
- O.CRYPTO: 14
- O.DISCRETIONARY: 10
- O.MANAGE: 23
- O.NETWORK: 12
- O.ROLE: 16
- O.SUBJECT: 11
- O.TRUSTED_CHANNEL: 5
- OE:
- OE.ADMIN: 5
- OE.INFO_PROTECT: 7
- OE.INSTALL: 4
- OE.MAINTENANCE: 3
- OE.PHYSICAL: 3
- OE.RECOVER: 4
- OE.REMOTE: 4
- OE.TRUSTED: 5
- T:
- T.ACCESS: 18
- T.IA: 6
- T.RESTRICT: 2
- T.ROLE: 6
|
- A:
- A.APPLET: 6
- A.DELETION: 1
- A.VERIFICATION: 6
- D:
- D.API_DATA: 3
- D.APP_CODE: 7
- D.APP_C_DATA: 3
- D.APP_I_DATA: 5
- D.CM_APDU: 1
- D.CRYPTO: 6
- D.JCS_CODE: 3
- D.JCS_DATA: 5
- D.JCS_KEYS: 3
- D.PIN: 6
- D.SEC_ATTRIBUTES: 2
- D.SEC_DATA: 8
- O:
- O.ALARM: 22
- O.APPLET: 19
- O.CARD-: 7
- O.CARD-MANAGEMENT: 32
- O.CIPHER: 16
- O.CODE_PKG: 16
- O.COMMUNICATION: 11
- O.DELETION: 15
- O.FIREWALL: 43
- O.GLOBAL: 2
- O.GLOBAL_ARRAYS_CONFID: 18
- O.GLOBAL_ARRAYS_INTEG: 9
- O.IC_SUPPORT: 17
- O.INSTALL: 16
- O.JAVAOBJECT: 38
- O.KEY-: 3
- O.KEY-MNGT: 23
- O.LOAD: 17
- O.NATIVE: 14
- O.OBJ-DELETION: 8
- O.OPERATE: 35
- O.OS: 1
- O.OS_SUPPORT: 23
- O.PACKAGE: 2
- O.PIN-: 1
- O.PIN-MNGT: 22
- O.REALLOCATION: 17
- O.RECOVERY: 23
- O.REMOTE: 1
- O.RESOURCES: 23
- O.RND: 14
- O.SID: 32
- O.TRANSACTION: 19
- OE:
- OE.APPLET: 9
- OE.CARD-MANAGEMENT: 2
- OE.CODE-: 5
- OE.CODE-EVIDENCE: 16
- OE.SCP: 6
- OE.VERIFICATION: 37
- OP:
- OP.ARRAY_ACCESS: 4
- OP.CREATE: 7
- OP.DELETE_APPLET: 4
- OP.DELETE_PCKG: 3
- OP.DELETE_PCKG_APPLET: 3
- OP.GP: 3
- OP.INSTANCE_FIELD: 4
- OP.INVK_INTERFACE: 7
- OP.INVK_VIRTUAL: 6
- OP.JAVA: 5
- OP.LOAD_PCKG: 1
- OP.PUT: 6
- OP.THROW: 5
- OP.TYPE_ACCESS: 5
- OSP:
- R:
- T:
- T.COMMUNICATION: 5
- T.CONFID-: 2
- T.CONFID-APPLI-: 2
- T.CONFID-APPLI-DATA: 17
- T.CONFID-JCS-CODE: 7
- T.CONFID-JCS-DATA: 9
- T.DELETION: 5
- T.EXE-: 1
- T.EXE-CODE: 8
- T.FAULT: 5
- T.INSTALL: 6
- T.INTEG-: 6
- T.INTEG-APPLI-: 4
- T.INTEG-APPLI-CODE: 12
- T.INTEG-APPLI-DATA: 18
- T.INTEG-JCS-: 1
- T.INTEG-JCS-CODE: 7
- T.INTEG-JCS-DATA: 12
- T.LEAKAGE: 5
- T.NATIVE: 6
- T.OBJ-DELETION: 4
- T.PHYSICAL: 8
- T.RESOURCES: 9
- T.RND: 5
- T.SID: 19
|
pdf_data/st_keywords/vendor |
- Huawei:
- Huawei: 22
- Huawei Technologies Co: 7
|
- Feitian:
- Feitian: 1
- Feitian Technologies Co: 105
- Infineon:
- Infineon: 10
- Infineon Technologies AG: 1
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
- AES_competition:
- DES:
- 3DES:
- TDEA: 1
- TDES: 7
- Triple-DES: 1
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-2: 2
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
|
- MD:
- SHA:
- SHA1:
- SHA2:
- SHA-2: 2
- SHA-224: 1
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- SSH:
- TLS:
- TLS:
- TLS: 20
- TLS 1.2: 1
- TLSv1.0: 1
- TLSv1.1: 1
- TLSv1.2: 2
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 1
- P-384: 1
- P-521: 1
- curve P-256: 1
- curve P-384: 1
- curve P-521: 1
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_DSS_WITH_AES_128_CBC_SHA: 1
- TLS_DHE_DSS_WITH_AES_128_CBC_SHA256: 1
- TLS_DHE_DSS_WITH_AES_128_GCM_SHA256: 1
- TLS_DHE_DSS_WITH_AES_256_CBC_SHA: 1
- TLS_DHE_DSS_WITH_AES_256_CBC_SHA256: 1
- TLS_DHE_DSS_WITH_AES_256_GCM_SHA384: 1
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 1
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_RSA_WITH_AES_256_CBC_SHA256: 1
- TLS_RSA_WITH_AES_256_GCM_SHA384: 1
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 3
- malfunction: 4
- physical tampering: 1
- SCA:
- DPA: 3
- Leak-Inherent: 2
- SPA: 1
- physical probing: 3
- timing attacks: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- BSI:
- FIPS:
- FIPS PUB 186-3: 8
- FIPS PUB 186-4: 6
- RFC:
- RFC 4252: 4
- RFC 4253: 5
- RFC 5246: 4
- RFC 768: 1
- RFC 791: 1
- RFC 792: 1
- RFC 793: 1
- RFC4252: 5
- RFC4253: 9
- RFC5246: 5
- RFC5656: 1
- RFC6668: 1
- X509:
|
- BSI:
- FIPS:
- FIPS 186-3: 3
- FIPS PUB 140-2: 1
- FIPS PUB 180-4: 1
- FIPS PUB 197: 1
- FIPS140: 2
- FIPS180-4: 2
- FIPS197: 5
- ICAO:
- RFC:
- SCP:
|
pdf_data/st_keywords/javacard_version |
|
- GlobalPlatform:
- JavaCard:
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
- javacard:
- javacardx:
- javacardx.crypto: 2
- javacardx.security: 1
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- DAC mechanism but may be supplemented by further restrictions. These additional restrictions are out of scope for this evaluation. Examples of objects which are accessible to users that cannot be used to store: 1
- PAT) for simple as well as more complex protocols. This mechanism is out of scope for the evaluation: 1
- as Port Address Translation (PAT) for simple as well as more complex protocols. This mechanism is out of scope for the evaluation. Furthermore, packet mangling support is provided with IPTables which is also: 1
- out of scope: 3
|
- OutOfScope:
- Software development environment. Phase 2 covers the Secure IC Development of Infineon and is out of scope of the TOE evaluation as that is part of the IC platform evaluation. In Phase 3, the Chip: 1
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.RECOVERY and O.OS_SUPPORT are: 1
- out of scope: 2
|
pdf_data/st_metadata |
|
- /CreationDate: D:20160304175418+08'00'
- /Creator: LaTeX with hyperref package
- /Producer: MiKTeX-xdvipdfmx (0.7.8)
- pdf_file_size_bytes: 1236795
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 100
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
False |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |