name |
Huawei UNC V001R001C20SPC200 with Patch V100R001C20SPH230 |
Infineon Smart Card IC (Security Controller), SLE66CLX800PE / m1581-e12, SLE66CLX800PEM / m1580-e12, SLE66CLX800PES / m1582-e12, SLE66CLX360PE / 1587 e12, SLE66CLX360PEM / m1588-e12, SLE66CLX360PES /m1589-e12, SLE66CLX800PE /m1599-e12 all with RSA 2048 V 1.5 and ECC V 1.1 and specific Dedicated Software |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
ES |
DE |
status |
active |
archived |
not_valid_after |
21.09.2028 |
01.09.2019 |
not_valid_before |
21.06.2023 |
15.05.2008 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-07_Certificado.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-07-INF-4068.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0430a.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-07_ST.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0430b.pdf |
manufacturer |
Huawei Technologies Co., Ltd. |
Infineon Technologies AG |
manufacturer_web |
https://www.huawei.com |
https://www.infineon.com/ |
security_level |
EAL4+, ALC_FLR.1 |
EAL5+, AVA_MSU.3, ALC_DVS.2, AVA_VLA.4 |
dgst |
0e8a25a9fbdc32c5 |
cea47aef389775a7 |
heuristics/cert_id |
2019-7-INF-4068 |
BSI-DSZ-CC-0430-2008 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ATE_COV.2, ALC_FLR.1, ALC_TAT.1, ASE_INT.1, ALC_CMC.4, ATE_FUN.1, ALC_DEL.1, AGD_OPE.1, ADV_ARC.1, ADV_IMP.1, ASE_CCL.1, AVA_VAN.3, ASE_REQ.2 |
ALC_LCD.2, AGD_USR.1, ALC_DVS.2, AVA_SOF.1, ATE_COV.2, ATE_DPT.2, AGD_ADM.1, ADV_INT.1, ADV_RCR.2, ATE_FUN.1, ADV_IMP.2, ALC_TAT.2, ADV_HLD.3, AVA_VLA.4, ADV_SPM.3, ATE_IND.2, ADV_LLD.1, ADV_FSP.3, AVA_CCA.1, AVA_MSU.3 |
heuristics/extracted_versions |
- |
1.5, 1.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0399-2007 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0169-2002, BSI-DSZ-CC-0399-2007, BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0223-2003 |
heuristics/scheme_data |
- category: Others
- certification_date: 21.06.2023
- enhanced:
- category: Others
- cc_version: Common Criteria 3.1 release 5
- cert_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1852
- certification_date: 21.06.2023
- description: The TOE is server service software that is deployed on CloudOS, which serves as a united network controller (UNC). UNC authenticates mobile subscribers onto the network system and tracks active and idle subscribers on the network system. UNC pages mobile subscribers when it is triggered by new data arriving for an idle subscriber at the assigned Serving GW (gateway). When a subscriber attaches to an eNodeB, the eNodeB select a UNC. UNC in turn selects the Serving GW and the PDN GW that will handle bearer packets of the subscriber. There are procedures to relocate a subscriber to a new UNC (and potentially a new Serving GW), when an active or idle subscriber moves to a new area outside of the current UNC control.
- evaluation_facility: DEKRA Testing and Certification S.A.U.
- level: EAL4 + ALC_FLR.1
- manufacturer: Huawei Technologies Co., Ltd.
- report_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1853
- status: Certified
- target_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1851
- type: Product
- manufacturer: Huawei Technologies Co., Ltd.
- product: Huawei UNC V001R001C20SPC200 with Patch V100R001C20SPH230
- product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/995-huawei-unc-v001r001c20spc200-with-patch-v100r001c20sph230
|
|
heuristics/st_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0523-2008 |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0322-2005 |
heuristics/st_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-0523-2008, BSI-DSZ-CC-0630-2010 |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0322-2005 |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
- maintenance_date: 19.09.2008
- maintenance_report_link: https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0430_ma1.pdf
- maintenance_st_link: None
- maintenance_title: Infineon Smart Card IC (Security Controller) SLE66CLX800PE / m1581-e12, SLE66CLX800PEM / m1580-e12, SLE66CLX800PES / m1582-e12, SLE66CLX360PE / m1587-e12, SLE66CLX360PEM / m1588-e12, SLE66CLX360PES / m1589-e12, SLE66CX800PE / m1599-e12 all with RSA 2048 V1.5 and ECC V1.1 and specific Dedicated Software
- maintenance_date: 29.01.2009
- maintenance_report_link: https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0430_ma2.pdf
- maintenance_st_link: None
- maintenance_title: Infineon Smart Card IC (Security Controller) SLE66CLX800PE / m1581-e12, SLE66CLX800PEM / m1580-e12, SLE66CLX800PES / m1582-e12, SLE66CLX360PE / m1587-e12, SLE66CLX360PEM / m1588-e12, SLE66CLX360PES / m1589-e12, SLE66CX800PE / m1599-e12 all with RSA 2048 V1.5 and ECC V1.1 and specific Dedicated Software
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
2019-07_Certificado.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL4: 1
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
- Huawei:
- Huawei: 2
- Huawei Technologies Co: 2
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author:
- /CreationDate:
- /Creator:
- /Keywords:
- /ModDate:
- /Producer:
- /Subject:
- /Title:
- /Trapped:
- pdf_file_size_bytes: 934591
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
|
pdf_data/report_filename |
2019-07-INF-4068.pdf |
0430a.pdf |
pdf_data/report_frontpage |
|
- DE:
- cert_id: BSI-DSZ-CC-0430-2008
- cert_item: Infineon Smart Card IC (Security Controller) SLE66CLX800PE / m1581-e12, SLE66CLX800PEM / m1580-e12, SLE66CLX800PES / m1582-e12, SLE66CLX360PE / m1587-e12, SLE66CLX360PEM / m1588-e12, SLE66CLX360PES / m1589-e12, SLE66CX800PE / m1599-e12 all with RSA 2048 V1.5 and ECC V1.1 and specific Dedicated Software
- cert_lab: BSI
- developer: Infineon Technologies AG Certification Report V1.0 ZS-01-01-F-326 V4.0
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0322-2005: 1
- BSI-DSZ-CC-0399-2007: 3
- BSI-DSZ-CC-0430-2007: 2
- BSI-DSZ-CC-0430-2008: 23
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 2: 1
- EAL 4: 2
- EAL2: 1
- EAL4: 8
- ITSEC:
|
- EAL:
- EAL 1: 1
- EAL 4: 7
- EAL 5: 4
- EAL 5 augmented: 3
- EAL 7: 1
- EAL1: 5
- EAL2: 3
- EAL3: 4
- EAL4: 5
- EAL5: 6
- EAL5+: 1
- EAL6: 3
- EAL7: 4
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_IMP.1: 1
- AGD:
- ALC:
- ALC_CMC.4: 1
- ALC_DEL.1: 1
- ALC_FLR: 3
- ALC_FLR.1: 9
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_INT.1: 1
- ASE_REQ.2: 1
- ATE:
- ATE_COV.2: 1
- ATE_FUN.1: 1
- AVA:
|
- ACM:
- ACM_AUT: 2
- ACM_AUT.1: 1
- ACM_CAP: 2
- ACM_CAP.4: 1
- ACM_SCP: 2
- ACM_SCP.3: 1
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 1
- ADO_IGS: 2
- ADO_IGS.1: 1
- ADV:
- ADV_FSP: 2
- ADV_HLD: 2
- ADV_IMP: 2
- ADV_INT: 2
- ADV_LLD: 2
- ADV_RCR: 2
- ADV_SPM: 2
- AGD:
- ALC:
- ALC_DVS: 2
- ALC_DVS.2: 6
- ALC_FLR: 2
- ALC_LCD: 1
- ALC_LCD.2: 1
- ALC_TAT: 2
- ALC_TAT.2: 1
- APE:
- APE_DES: 1
- APE_ENV: 1
- APE_INT: 1
- APE_OBJ: 1
- APE_REQ: 1
- APE_SRE: 1
- ASE:
- ASE_DES: 1
- ASE_ENV: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_PPC: 1
- ASE_REQ: 1
- ASE_SRE: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 2
- ATE_DPT: 2
- ATE_FUN: 2
- ATE_IND: 2
- AVA:
- AVA_CCA: 2
- AVA_MSU: 2
- AVA_MSU.3: 5
- AVA_SOF: 3
- AVA_VLA: 4
- AVA_VLA.2: 1
- AVA_VLA.3: 1
- AVA_VLA.4: 6
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 1
- FAU_SAR.1: 1
- FAU_STG.1: 1
- FDP:
- FIA:
- FIA_ATD.1: 1
- FIA_UAU.4: 1
- FIA_UID.2: 1
- FMT:
- FMT_MOF.1: 1
- FMT_MSA.3: 1
- FMT_SMF.1: 1
- FTA:
- FTP:
|
- FCS:
- FCS_CKM.1: 3
- FCS_CKM.4: 1
- FDP:
- FDP_ITC.1: 3
- FDP_ITC.2: 3
- FMT:
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
- Huawei:
- Huawei: 20
- Huawei Technologies Co: 3
- Microsoft:
|
- Infineon:
- Infineon: 13
- Infineon Technologies: 3
- Infineon Technologies AG: 41
- Philips:
|
pdf_data/report_keywords/eval_facility |
- DEKRA:
- DEKRA Testing and Certification: 4
|
- TUV:
- TÜV Informationstechnik: 2
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- SCA:
- DPA: 1
- physical probing: 1
- side channel: 2
- other:
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- BSI:
- AIS 25: 3
- AIS 26: 2
- AIS 31: 4
- AIS 34: 3
- AIS 36: 2
- FIPS:
- ISO:
- ISO/IEC 14443: 4
- ISO/IEC 15408:2005: 3
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- confidential document, Ver. 09.97, September 1997, Infineon Technologies AG [40] Application Note, SLE66CxxxP, UART: 1
- confidential document, Ver. 10.03, December 2003, Infineon Technologies AG B-23 Certification Report: 1
- 05.04 (PDF+SW), confidential document, Ver. 05.04, May 2004, Infineon Technologies AG [38] Application Note, SLE66CxxxPE, Using the: 1
- 35] Application Note, SLE66CxxxP/PE, Testing the RNG, confidential document, Ver. 11.04, November 2004, Infineon Technologies AG [36] Application Note, SLE66CxxxP/PE, Using: 1
- DDES – EC2, confidential document, Ver. 07.05, July 2005, Infineon Technologies AG [31] Application Note, SLE66CxxxP, Using MicroSlim: 1
- Decryption, confidential document, Ver. 11.04, November 2004, Infineon Technologies AG [33] Application Note, SLE66CxxxPE, MMU Memory: 1
- Issues (PDF), confidential document, Ver. 01.02, January 2001, Infineon Technologies AG B-22 BSI-DSZ-CC-0430-2008 Certification Report: 1
- Nr. 19", published February 5th , 2008, page 376 [29] Application Note, SLE66CxxxP, DDES – EC2, confidential document, Ver. 02.04, February 2004, Infineon Technologies AG [30] Complementary Application Note: 1
- SLE66CLX800PE / m1599-e12 all with RSA2048 V1.5 and ECC V1.1 and specific Dedicated Software (confidential document) [8] ETR for composite evaluation, according to AIS 36, Version 1, 07. March 2008, for the Product: 1
- SLE66CLX800PE / m1599-e12 all with RSA2048 V1.5 and ECC V1.1 and specific Dedicated Software (confidential document) [9] Smart card IC Platform Protection Profile, Version 1.0, July 2001, BSI registration ID: 1
- Unit, confidential document, Ver. 12.04, December 2004, Infineon Technologies AG [34] Application Note, SLE66CxxxP, MMU: 1
- a.t. FIPS140 (PDF+SW), confidential document, Ver. 2.04, February 2004, Infineon Technologies AG [37] Application Note, SLE66CxxxPE, Security: 1
- cLib), confidential document, Ver. 05.05, May 2005, Infineon Technologies AG [32] Application Note, SLE66CxxxP/PE, Memory: 1
- shield, confidential document, Ver. 12.04, December 2004, Infineon Technologies AG [39] Application Note, DES – software version: 1
|
pdf_data/report_metadata |
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Company: BSI, Postfach 200363, 53133 Bonn
- /CreationDate: D:20080519085918+02'00'
- /Creator: Acrobat PDFMaker 8.1 für Word
- /Keywords: "Common Criteria, Certification, Zertifizierung, Infineon Smart Card IC (Security Controller)"
- /ModDate: D:20080519093426+02'00'
- /Producer: Acrobat Distiller 8.1.0 (Windows)
- /SourceModified: D:20080519065700
- /Subject: Certification Report
- /Title: Certification Report BSI-DSZ-CC-0430-2008
- pdf_file_size_bytes: 362347
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 46
|
pdf_data/st_filename |
2019-07_ST.pdf |
0430b.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0266-2005: 1
- BSI-DSZ-CC-0322-2005: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 5: 4
- EAL 5 augmented: 4
- EAL5: 5
- EAL5 augmented: 2
- EAL5+: 2
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_FLR: 1
- ALC_FLR.1: 2
- ALC_LCD: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
- ACM:
- ACM_AUT.1: 2
- ACM_CAP.4: 1
- ACM_SCP: 3
- ACM_SCP.2: 1
- ACM_SCP.3: 5
- ADO:
- ADO_DEL.2: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 5
- ADV_HLD.3: 3
- ADV_IMP.2: 3
- ADV_INT.1: 3
- ADV_LLD.1: 3
- ADV_RCR.2: 3
- ADV_SPM.1: 3
- ADV_SPM.3: 2
- AGD:
- AGD_ADM.1: 2
- AGD_USR.1: 2
- ALC:
- ALC_DVS.2: 4
- ALC_LCD.2: 1
- ALC_TAT.2: 2
- ATE:
- ATE_COV.2: 2
- ATE_DPT.2: 1
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
- AVA_CCA.1: 2
- AVA_MSU.3: 3
- AVA_SOF: 4
- AVA_SOF.1: 2
- AVA_VLA.4: 4
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 8
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 5
- FAU_GEN.2.1: 1
- FAU_SAR.1: 6
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.3: 4
- FAU_SAR.3.1: 1
- FAU_STG.1: 7
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 4
- FAU_STG.3.1: 1
- FDP:
- FDP_ACC.1: 9
- FDP_ACC.1.1: 1
- FDP_ACF.1: 7
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 1
- FIA:
- FIA_AFL.1: 6
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 5
- FIA_ATD.1.1: 1
- FIA_SOS.1: 5
- FIA_SOS.1.1: 1
- FIA_UAU.2: 6
- FIA_UAU.2.1: 1
- FIA_UAU.4: 4
- FIA_UAU.4.1: 1
- FIA_UID.1: 4
- FIA_UID.2: 6
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF.1: 5
- FMT_MOF.1.1: 1
- FMT_MSA.1: 4
- FMT_MSA.1.1: 1
- FMT_MSA.3: 7
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SAE.1: 3
- FMT_SAE.1.1: 1
- FMT_SAE.1.2: 1
- FMT_SMF.1: 7
- FMT_SMF.1.1: 2
- FMT_SMR.1: 13
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FTA:
- FTA_MCS: 10
- FTA_MCS.1.1: 2
- FTA_MCS.1.2: 2
- FTA_SSL.3: 5
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 5
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 5
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FCS:
- FCS_CKM.1: 49
- FCS_CKM.1.1: 5
- FCS_CKM.2: 7
- FCS_CKM.4: 30
- FCS_CKM.4.1: 3
- FCS_COP.1: 45
- FCS_COP.1.1: 4
- FCS_RND: 2
- FCS_RND.1: 4
- FCS_RND.1.1: 1
- FDP:
- FDP_ACC.1: 25
- FDP_ACC.1.1: 1
- FDP_ACF.1: 15
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_CKM.2: 1
- FDP_IFC.1: 14
- FDP_ITC.1: 24
- FDP_ITC.1.1: 3
- FDP_ITC.1.2: 3
- FDP_ITC.1.3: 3
- FDP_ITC.2: 23
- FDP_ITC.2.1: 3
- FDP_ITC.2.2: 3
- FDP_ITC.2.3: 3
- FDP_ITC.2.4: 3
- FDP_ITC.2.5: 3
- FDP_ITT.1: 3
- FDP_SDI.1: 17
- FDP_SDI.1.1: 1
- FDP_SDI.2: 15
- FDP_SDI.2.2: 1
- FMT:
- FMT_LIM.1: 4
- FMT_LIM.2: 4
- FMT_MSA.1: 15
- FMT_MSA.1.1: 1
- FMT_MSA.2: 32
- FMT_MSA.2.1: 3
- FMT_MSA.3: 16
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF.1: 9
- FMT_SMF.1.1: 1
- FMT_SMR.1: 9
- FPT:
- FPT_AMT.1: 4
- FPT_FLS.1: 6
- FPT_ITT.1: 3
- FPT_PHP.3: 7
- FPT_SEP.1: 6
- FPT_TDC.1: 3
- FPT_TST: 2
- FPT_TST.1: 11
- FPT_TST.2: 26
- FPT_TST.2.1: 2
- FRU:
- FTP:
- FTP_ITC.1: 3
- FTP_TRP.1: 3
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN_CREDENTIALS_SECU: 1
- A.ADMIN_CREDENTIALS_SECURE: 2
- A.COMPONENTS_RUNNING: 3
- A.ENVIRONMENT_ACL: 3
- A.LIMITED_FUNCTIONALITY: 3
- A.NETWORK_SEGREGATION: 3
- A.PHYSICAL_PROTECTION: 3
- A.RESIDUAL_INFORMATION: 3
- A.TIME: 3
- A.TRUSTED_ADMINISTRATOR: 3
- O:
- O.AUDIT: 5
- O.COMMUNICA: 1
- O.COMMUNICATI: 1
- O.COMMUNICATION: 5
- O.IDAUTH: 8
- OE:
- OE.ADMIN_CRE: 1
- OE.ADMIN_CREDENTI: 2
- OE.ADMIN_CREDENTIALS_SEC: 2
- OE.COMPONEN: 1
- OE.COMPONENTS_RU: 1
- OE.COMPONENTS_RUNNING: 1
- OE.ENVIRONM: 1
- OE.ENVIRONMENT_AC: 1
- OE.ENVIRONMENT_ACL: 1
- OE.LIMITED_FU: 1
- OE.LIMITED_FUNCTIO: 1
- OE.LIMITED_FUNCTIONALITY: 1
- OE.NETWORK_: 1
- OE.NETWORK_SEGRE: 1
- OE.NETWORK_SEGREGATION: 1
- OE.NETWOR_SEGREG: 1
- OE.NETWOR_SEGREGATION: 1
- OE.PHYSICAL: 4
- OE.RESIDUAL_I: 1
- OE.RESIDUAL_INFOR: 3
- OE.RESIDUAL_INFORMATION: 3
- OE.TIME: 7
- OE.TRUSTED_A: 1
- OE.TRUSTED_ADMIN: 4
- OSP:
- T:
- T.UNAUTHORIZED_: 2
- T.UNAUTHORIZED_ADMINISTR: 1
- T.UNTRUSTED_COMMUNICATI: 2
- T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
- T.WEAK_AUTHENTICATION_E: 2
- T.WEAK_AUTHENTICATION_ENDPOINTS: 1
- T.WEAK_CRYPTOGRAPHY: 3
|
|
pdf_data/st_keywords/vendor |
- Huawei:
- Huawei: 23
- Huawei Technologies Co: 3
- Microsoft:
|
- Infineon:
- Infineon: 2
- Infineon Technologies AG: 8
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 4
- Malfunction: 15
- malfunction: 3
- SCA:
- DPA: 6
- Leak-Inherent: 11
- Physical Probing: 2
- SPA: 4
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- BSI:
- CC:
- CCMB-2005-08-001: 1
- CCMB-2005-08-002: 1
- CCMB-2005-08-003: 2
- FIPS:
- ISO:
- ISO/IEC 7816: 6
- ISO/IEC 7816-3: 1
- ISO/IEC 9796-1: 3
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- key length below 1024 bit are out of scope of the evaluation: 1
- length below 1024 bit are out of scope of the evaluation) • Signature creation and verification according to ECDSA standard and key: 1
- out of scope: 2
- single DES is out of scope of the evaluation: 1
- smart card applications • Data encryption according to single-DES and 3DES standard (single DES is out of scope of the evaluation) • Data encryption according to RSA standard with 512 to 2048 bits key length: 1
|
pdf_data/st_metadata |
|
- /Author: Hans-Ulrich Buchmüller
- /CreationDate: D:20080603104802Z
- /Creator: SLE66CLX800PEx+360PEx_SecurityTarget_Libs_05.doc - Microsoft Word
- /Keywords: Design Steps e12, RSA, EC, ECC, libraries, Elliptic Curve, Security Target, contactless, Security Controller, public, document, resistance to attackers with high attack potential, Infineon Technologies AG
- /ModDate: D:20080604083339+02'00'
- /Producer: Acrobat PDFWriter 5.0 for Windows NT
- /Subject: CC EAL5+ Certification Security Target
- /Title: Security Target SLE66CLX800-360PEx e12
- pdf_file_size_bytes: 429102
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 60
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |