name |
Good Work System |
Infineon Technologies AG OPTIGA™ Trusted Platform Module SLB9672_2.0 v17.10.16488.00 |
category |
Data Protection |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
NO |
DE |
status |
archived |
archived |
not_valid_after |
09.12.2020 |
15.12.2024 |
not_valid_before |
09.12.2015 |
01.10.2021 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1179c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20151209_S-063_CR_v.1.0_GoodWork.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1179a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST%20GW_Release_1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1179b_pdf.pdf |
manufacturer |
Good Technology, Inc. |
Infineon Technologies AG |
manufacturer_web |
https://www.good.com |
https://www.infineon.com/ |
security_level |
ALC_FLR.1, EAL4+ |
ALC_FLR.1, EAL4+, AVA_VAN.4 |
dgst |
118e3aa5f152ce2d |
dbe1b0227b9b51a3 |
heuristics/cert_id |
SERTIT-063 |
BSI-DSZ-CC-1179-2021 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_DVS.1, ATE_FUN.1, ALC_TAT.1, ALC_CMC.4, ALC_LCD.1, ATE_IND.2, ADV_FSP.4, ATE_COV.2, ATE_DPT.1, ADV_IMP.1, ALC_DEL.1, ALC_CMS.4, AGD_PRE.1, AVA_VAN.3, ADV_TDS.3, AGD_OPE.1, ALC_FLR.1, ADV_ARC.1 |
ALC_DVS.1, ATE_IND.2, ALC_TAT.1, ALC_LCD.1, ADV_FSP.4, AVA_VAN.4, ATE_DPT.1, ASE_CCL.1, ADV_TDS.3, AGD_OPE.1, ASE_SPD.1, ALC_FLR.1, ASE_OBJ.2, ATE_COV.2, ADV_ARC.1, ATE_FUN.1, ADV_IMP.1, ASE_INT.1, ASE_TSS.1, ALC_CMC.4, ASE_REQ.2, ALC_DEL.1, AGD_PRE.1, ALC_CMS.4, ASE_ECD.1 |
heuristics/extracted_versions |
- |
17.10.16488.00, 2.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-1179-V2-2022 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-1113-2021 |
heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-1179-V2-2022 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1113-2021 |
heuristics/scheme_data |
- category: Data protection
- certification_date: 09.12.2015
- developer: Good Technology, Inc.
- enhanced:
- category: Data protection
- cert_id: SERTIT-063
- certification_date: 09.12.2015
- description: The Good Work system is an end to end solution for securing and managing email, calendar, contact, presence, instant messaging, secure browsing and other mobile applications. The Good Work system consists of server side and client side components. The server components include the Good Proxy Server, the Good Enterprise Mobility Server (application server), and the Good Control Server (administrative console functions). All servers run on standard Microsoft server platforms. On the client side, the Good Work system includes the Good Work application, Good Access (secure browser) application, and other mobile applications running on iOS and Android devices using the Good Dynamics framework. Good Control: Good Control Server provides dashboard visibility and management of enterprise users, apps, and security policies. Good Proxy: Good Proxy Server provides the secure communications infrastructure between the Good Secure Cloud and application servers within the enterprise firewall. Good Enterprise Mobility Server: Good Enterprise Mobility Server provides the implementation of device facing Good Dynamics server side services invoked by Good client applications using the Good Dynamics Services Framework. This includes a service to provide Presence information for Contacts, a service to provide storage and synchronization of application data, and delivery of Push Notifications, in response to updates detected for user mailboxes. Good Work Client: Good Work Client is a mobile device application suite that provides secure email, calendar, contacts, presence and other mobile applications. Good Connect Client: Good Connect Client is an instant messaging application that integrates with the enterprise desktop Microsoft Lync system. Good Access Client: Good Access Client is a secure web browser application for accessing corporate web-based resources from a mobile device.
- developer: Good Technology, Inc.
- documents: frozendict({'cert': [frozendict({'href': 'https://sertit.no/getfile.php/134959-1607951939/SERTIT/Sertifikater/2015/63/20151209%20Sertit-063%20Certificate.pdf'})], 'target': [frozendict({'href': 'https://sertit.no/getfile.php/134962-1607951944/SERTIT/Sertifikater/2015/63/ST%20GW_Release_1.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/134956-1607951934/SERTIT/Sertifikater/2015/63/20151209_S-063_CR_v.1.0_GoodWork.pdf'})]})
- evaluation_facility: Advanced Data Security
- level: EAL 4, ALC_FLR.1
- mutual_recognition: CCRA
- product: Good Work Client for iOS: 1.5.3.247; Good Work Client for Android: 1.5.3.162; Good Access Client for iOS: 2.4.3.734; Good Access Client for Android: 2.4.3.657; Good Dynamics SDK for iOS: 2.0.4413; Good Dynamics SDK for Android: 2.0.1226; Good Connect Client for iOS: 2.3.10.0.458445.12; Good Connect Client for Android: 2.3.10.0.456604.571; Good Control Server: 2.0.3.11; Good Proxy Server: 2.0.3.7; Good Enterprise Mobility Server: 1.5.35.45
- product: Good Work System
- url: https://sertit.no/certified-products/product-archive/good-work-system
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
dcc6f443e1f31677 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/anssi-cc-pp-2020_01_pp.pdf |
pdf_data/cert_filename |
|
1179c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL 4 augmented: 1
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
- Infineon:
- Infineon Technologies AG: 2
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20211014101753+02'00'
- /Creator: Writer
- /Keywords: Common Criteria, Certification, Zertifizierung, Infineon Technologies AG OPTIGA™ TrustedPlatform Module SLB9672_2.0 v17.10.16488.00, Infineon Technologies AG
- /ModDate: D:20211014101906+02'00'
- /Producer: LibreOffice 6.3
- /Subject: Common Criteria Certification
- /Title: Certificate BSI-DSZ-CC-1179-2021
- pdf_file_size_bytes: 252918
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
20151209_S-063_CR_v.1.0_GoodWork.pdf |
1179a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by AVA_VAN.4 and ALC_FLR.1
- cc_version: PP conformant Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-1179-2021
- cert_item: Infineon Technologies AG OPTIGA™ Trusted Platform Module SLB9672_2.0 v17.10.16488.00
- cert_lab: BSI
- developer: Infineon Technologies AG
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: PC Client Specific TPM, TPM Library specification Family “2.0”, Level 0 Revision 1.38, Version: 1.2, Date: 2019-06-13, ANSSI-CC-PP-2020/01
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1113-2021: 3
- BSI-DSZ-CC-1179-2021: 19
- FR:
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 4: 21
- EAL 4 augmented: 20
- EAL1: 1
- EAL7: 1
|
- EAL:
- EAL 1: 1
- EAL 2: 2
- EAL 2+: 1
- EAL 4: 5
- EAL 4 augmented: 3
- EAL 5+: 1
- EAL 6: 1
|
pdf_data/report_keywords/cc_sar |
|
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR: 3
- ALC_FLR.1: 5
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ATE:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 1
- FAU_GEN.2: 1
- FDP:
- FDP_ACC: 2
- FDP_ACF: 2
- FDP_CDD_EXP.1: 1
- FDP_ITC.2: 1
- FDP_SWA_EXP.1: 1
- FIA:
- FIA_AFL.1: 1
- FIA_ATD.1: 1
- FIA_UAU: 2
- FIA_UID.1: 1
- FIA_USB.1: 1
- FMT:
- FMT_MOF: 2
- FMT_MSA: 4
- FMT_SMF: 2
- FMT_SMR.1: 1
- FPT:
- FPT_ITT_EXP.1: 1
- FPT_STM.1: 1
- FPT_TDC.1: 1
- FTP:
- FTP_ITC_EXP.1: 1
- FTP_TRP_EXP.1: 1
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Cisco:
- GD:
- G&D: 2
- Giesecke & Devrient: 1
- Infineon:
- Infineon: 3
- Infineon Technologies: 1
- Infineon Technologies AG: 15
|
pdf_data/report_keywords/eval_facility |
- ADS:
- Advanced Data Security: 1
|
- TUV:
- TÜV Informationstechnik: 4
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-256: 15
- SHA-384: 13
- SHA-512: 1
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7148: 1
- BSI TR-02102: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- ISO:
|
- BSI:
- AIS 20: 2
- AIS 25: 1
- AIS 26: 1
- AIS 31: 2
- AIS 32: 1
- AIS 34: 2
- AIS 35: 1
- AIS 36: 1
- AIS 38: 1
- AIS20: 1
- AIS26: 1
- FIPS:
- FIPS PUB 186-4: 1
- FIPS PUB 186-5: 1
- FIPS180-4: 9
- FIPS186-4: 11
- FIPS186-5: 1
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- RFC:
- RFC 3447: 1
- RFC 8391: 1
- RFC3447: 16
- RFC8391: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- Standards Compliance Verification (CSCV); Version 1, July 19, 2021, TÜV Informationstechnik GmbH, (confidential document) 23 / 32 Certification Report BSI-DSZ-CC-1179-2021 C. Excerpts from the Criteria For the meaning: 1
- Version 2, Sep 09, 2021, ”Evaluation Technical Report Summary”, TÜV Informationstechnik GmbH, (confidential document) [8] PC Client Specific TPM, TPM Library specification Family “2.0”, Level 0 Revision 1.38: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
|
pdf_data/report_metadata |
- /Author: Arne
- /CreationDate: D:20151211143244+01'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20151211143402+01'00'
- /Producer: Acrobat Distiller 9.5.5 (Windows)
- /Title: Microsoft Word - 20151209_S-063_CR_v.1.0_GoodWork.docx
- pdf_file_size_bytes: 545725
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 18
|
|
pdf_data/st_filename |
ST GW_Release_1.pdf |
1179b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL4: 5
- EAL4 augmented: 2
- EAL4+: 1
|
- EAL:
- EAL4: 2
- EAL4 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.1: 6
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL: 2
- ASE_ECD: 2
- ASE_INT: 2
- ASE_OBJ: 2
- ASE_REQ: 2
- ASE_SPD: 2
- ASE_TSS: 2
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_FLR.1: 3
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL: 2
- ASE_CCL.1: 1
- ASE_ECD: 2
- ASE_ECD.1: 1
- ASE_INT: 2
- ASE_INT.1: 1
- ASE_OBJ: 2
- ASE_OBJ.2: 1
- ASE_REQ: 2
- ASE_REQ.2: 1
- ASE_SPD: 2
- ASE_SPD.1: 1
- ASE_TSS: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 7
- FAU_GEN.1: 11
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 2
- FAU_GEN.2: 9
- FAU_GEN.2.1: 1
- FDP:
- FDP_ACC: 16
- FDP_ACC.1: 13
- FDP_ACF: 16
- FDP_ACF.1: 12
- FDP_CDD_EXP.1: 11
- FDP_CDD_EXP.1.1: 2
- FDP_IFC.1: 2
- FDP_ITC.2: 9
- FDP_ITC.2.1: 1
- FDP_ITC.2.2: 1
- FDP_ITC.2.3: 1
- FDP_ITC.2.4: 1
- FDP_ITC.2.5: 1
- FDP_SWA_EXP.1: 9
- FDP_SWA_EXP.1.1: 2
- FDP_SWA_EXT.1: 2
- FIA:
- FIA_AFL.1: 10
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 12
- FIA_ATD.1.1: 2
- FIA_UAU: 16
- FIA_UAU.1: 7
- FIA_UID.1: 18
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 11
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF: 14
- FMT_MOF.1: 3
- FMT_MSA: 28
- FMT_MSA.1: 6
- FMT_MSA.3: 8
- FMT_SMF: 14
- FMT_SMF.1: 9
- FMT_SMF.1.1: 1
- FMT_SMR.1: 19
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_ITT_EXP.1: 13
- FPT_ITT_EXP.1.1: 2
- FPT_STM.1: 13
- FPT_STM.1.1: 1
- FPT_TDC.1: 11
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FTP:
- FTP_ITC.1: 2
- FTP_ITC_EXP.1: 14
- FTP_ITC_EXP.1.1: 2
- FTP_ITC_EXP.1.2: 2
- FTP_ITC_EXP.1.3: 2
- FTP_TDC.1: 1
- FTP_TRP.1: 1
- FTP_TRP_EXP: 1
- FTP_TRP_EXP.1: 13
- FTP_TRP_EXP.1.1: 2
- FTP_TRP_EXP.1.2: 2
- FTP_TRP_EXP.1.3: 2
|
- FCO:
- FCS:
- FCS_CKM: 37
- FCS_CKM.1: 20
- FCS_CKM.2: 8
- FCS_CKM.4: 22
- FCS_CKM.4.1: 1
- FCS_COP: 47
- FCS_COP.1: 19
- FCS_RNG: 1
- FCS_RNG.1: 11
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC: 28
- FDP_ACC.1: 4
- FDP_ACF: 30
- FDP_ACF.1: 8
- FDP_ETC: 7
- FDP_IFC.1: 2
- FDP_ITC: 7
- FDP_ITC.1: 11
- FDP_ITC.2: 11
- FDP_ITT.1: 1
- FDP_RIP.1: 3
- FDP_SDI.1: 3
- FDP_UCT: 7
- FDP_UIT: 9
- FDP_UIT.1: 2
- FIA:
- FIA_AFL: 12
- FIA_MSA: 1
- FIA_SOS.2: 3
- FIA_UAU.1: 3
- FIA_UAU.5: 3
- FIA_UAU.6: 3
- FIA_UID.1: 4
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 3
- FMT:
- FMT_MOF: 3
- FMT_MSA: 65
- FMT_MSA.1: 1
- FMT_MSA.2: 4
- FMT_MSA.2.1: 1
- FMT_MSA.3: 2
- FMT_MTD: 6
- FMT_SMF.1: 3
- FMT_SMR.1: 4
- FPT:
- FPT_FLS: 7
- FPT_FLS.1: 1
- FPT_ITT.1: 3
- FPT_PHP.3: 4
- FPT_PHP.3.1: 1
- FPT_STM.1: 3
- FPT_TST.1: 6
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 3
- FTP_ITC.1: 1
- FTP_TRP.1: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.INSTALL: 2
- A.LOCATE: 2
- A.MANAGE: 2
- A.NO_EVIL: 2
- O:
- O.ACCESS_INT: 2
- O.ADMIN: 2
- O.AUDIT: 2
- O.AUTHENTICATE_ADMIN: 2
- O.AUTHENTICATE_USER: 2
- O.PROTECT: 2
- O.SECURE_COMMUNICATIONS: 2
|
|
pdf_data/st_keywords/vendor |
|
- Cisco:
- Infineon:
- Infineon: 6
- Infineon Technologies: 6
- Infineon Technologies AG: 15
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- NIST:
- NIST P-256: 1
- NIST P-384: 1
- P-256: 1
- P-384: 1
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- SCA:
- DPA: 1
- SPA: 1
- physical probing: 2
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- BSI:
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 1
- FIPS:
- FIPS 180-4: 3
- FIPS PUB 140-2: 3
- FIPS PUB 180-4: 2
- FIPS PUB 186-4: 1
- ISO:
- ISO/IEC 10116:2006: 2
- ISO/IEC 10118-3: 1
- ISO/IEC 14888-3: 1
- ISO/IEC 15946-1: 1
- ISO/IEC 9797-2: 3
- NIST:
- NIST SP 800-90A: 2
- SP 800-133: 1
- SP 800-90A: 3
- PKCS:
- RFC:
- RFC 2104: 1
- RFC 3447: 1
- RFC3447: 35
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /CreationDate: D:20151111080719-08'00'
- /Creator: Microsoft® Word 2013
- /ModDate: D:20151111080719-08'00'
- /Producer: Microsoft® Word 2013
- pdf_file_size_bytes: 1031033
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 44
|
- /Author: Jürgen Noller
- /CreationDate: D:20211111142934+01'00'
- /Creator: Microsoft® Word 2016
- /Keywords: Infineon, CCS, Security Target, EAL4+, moderate, SLB967x, SLB9670, SPI, Trusted Computing, TPM 2.0, Trusted Platform Module
- /ModDate: D:20211111142934+01'00'
- /Producer: Microsoft® Word 2016
- /Subject: Security Target SLB9670_2.0
- /Title: CC EAL4+ moderate Certification Security Target
- pdf_file_size_bytes: 1255008
- pdf_hyperlinks: http://www.rsa.com/, mailto:[email protected];[email protected]?subject=Document%20question%20, http://www.bsi.bund.de/, http://www.infineon.com/
- pdf_is_encrypted: False
- pdf_number_of_pages: 61
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |