name |
BlackBerry® Enterprise Server Version 5.0.0 |
Qualcomm Secure Processing Unit SPU230 in SDM855 SoC with MCP version spss.a1.1.2_00100 |
category |
Other Devices and Systems |
Other Devices and Systems |
scheme |
CA |
DE |
status |
archived |
active |
not_valid_after |
28.09.2015 |
03.03.2028 |
not_valid_before |
12.03.2010 |
03.03.2023 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1045V2c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/blackberry-smart-v50-cert-eng.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1045V2a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/blackberry-smart-v50-sec-eng.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1045V2b_pdf.pdf |
manufacturer |
Research In Motion Limited |
Qualcomm Technologies Inc. |
manufacturer_web |
https://www.rim.com/ |
https://www.qualcomm.com |
security_level |
EAL4+, ALC_FLR.1 |
ALC_DVS.2, EAL4+, AVA_VAN.5 |
dgst |
1999de0c48802e38 |
ac18c15a88b4b1bd |
heuristics/cert_id |
383-4-100 |
BSI-DSZ-CC-1045-V2-2023 |
heuristics/cert_lab |
CANADA |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ALC_TAT.1, ASE_TSS.1, ASE_SPD.1, ATE_DPT.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 |
ALC_TAT.1, ALC_CMS.4, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ALC_DVS.2, ALC_CMC.4 |
heuristics/extracted_versions |
5.0.0 |
1.1.2 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-1045-2019 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1045-2019 |
heuristics/scheme_data |
|
- category: System on a chip (SOC)
- cert_id: BSI-DSZ-CC-1045-V2-2023
- certification_date: 03.03.2023
- enhanced:
- applicant: Qualcomm Technologies Inc. 5775 Morehouse drive San Diego, CA 92121 USA
- assurance_level: EAL4+; ALC_DVS.2, AVA_VAN.5
- cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1045V2c_pdf.pdf?__blob=publicationFile&v=2
- certification_date: 03.03.2023
- description: The TOE is the “Qualcomm Secure Processor Unit SPU230 embedded in the SDM855 host SoC combined with a DDR in a PoP (Package on Package) configuration and its corresponding Software and associated documentation. The hardware is a hard macro (sub-unit of a System-on-Chip which is already synthesized, placed and routed, delivered as GDS file) and the special packaging. The TOE is integrated into the SDM855 SoC by the SoC integrator (Qualcomm). The firmware and software comprise the operating system of the Secure Processor Unit and the software API providing cryptographic services to SPU applications. The SPU applications can be developed by the SPU application developer using the software API. The TOE can be used for multiple applications that require a high level of security. Examples are as follows: User authentication and password storage, Content protection, Payment, Subscriber Identity Module (SIM), Storage and management of digital identities, Secure key storage, Root of trust, Storage of sensitive user data.
- entries: [frozendict({'id': 'BSI-DSZ-CC-1045-V2-2023 (Ausstellungsdatum / Certification Date 03.03.2023, gültig bis / valid until 02.03.2028) Zertifizierungsreport / Certification Report Sicherheitsvorgaben / Security Target Zertifikat / Certificate', 'description': 'has been extended by additional cryptographic functions.'}), frozendict({'id': 'BSI', 'description': 'Certificate'})]
- evaluation_facility: T-Systems International GmbH atsec information security GmbH
- expiration_date: 02.03.2028
- product: Qualcomm Secure Processing Unit SPU230 in SDM855 SoC with MCP version spss.a1.1.2_00100
- protection_profile: Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014
- report_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1045V2a_pdf.pdf?__blob=publicationFile&v=2
- target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1045V2b_pdf.pdf?__blob=publicationFile&v=2
- product: Qualcomm Secure Processing Unit SPU230 in SDM855 SoC with MCP version spss.a1.1.2_00100
- url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/System_on_a_Chip_SOC/1045.html
- vendor: Qualcomm Technologies Inc.
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
cf0f01bcd7be3e9c |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf |
pdf_data/cert_filename |
|
1045V2c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1045-V2-2023: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL 4 augmented: 1
- EAL 5: 1
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Subject: Qualcomm Secure Processing Unit SPU230 in SDM855 SoC with MCP version spss.a1.1.2_00100
- /Title: Certification Report BSI-DSZ-CC-1045-V2-2023
- pdf_file_size_bytes: 289421
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
blackberry-smart-v50-cert-eng.pdf |
1045V2a_pdf.pdf |
pdf_data/report_frontpage |
- DE:
- CA:
- cert_id: 383-4-100-CR
- cert_lab: CANADA
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by AVA_VAN.5 and ALC_DVS.2
- cc_version: PP conformant plus product specific extensions Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-1045-V2-2023
- cert_item: Qualcomm Secure Processing Unit SPU230 in SDM855 SoC with MCP version spss.a1.1.2_00100
- cert_lab: BSI
- developer: Qualcomm Technologies Inc
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014
- CA:
|
pdf_data/report_keywords/cc_cert_id |
- CA:
- 383-4-100: 1
- 383-4-100-CR: 1
|
- DE:
- BSI-DSZ-CC-1045-2019: 3
- BSI-DSZ-CC-1045-V2-2023: 17
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 4: 4
- EAL 4 augmented: 1
- EAL 4+: 3
|
- EAL:
- EAL 1: 1
- EAL 2: 3
- EAL 4: 5
- EAL 4 augmented: 3
- EAL 5: 4
- EAL 5+: 1
- EAL 6: 1
|
pdf_data/report_keywords/cc_sar |
|
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.2: 5
- ALC_FLR: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ATE:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
- FCS:
- FDP:
- FDP_SDP_EXP.1: 1
- FDP_SDP_EXP.2: 1
- FTA:
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- DeutscheTelekom:
- Deutsche Telekom Security: 3
- atsec:
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
- MAC:
- CMAC: 2
- HMAC: 1
- HMAC-SHA-384: 1
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-256: 6
- SHA-384: 2
- SHA-512: 2
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
- NIST:
- NIST P-192: 2
- NIST P-224: 2
- NIST P-256: 2
- NIST P-384: 2
- NIST P-521: 2
- P-192: 2
- P-224: 2
- P-256: 2
- P-384: 2
- P-521: 2
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- SCA:
- Side-channel: 1
- physical probing: 1
- other:
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7148: 1
- BSI TR-02102: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- BSI:
- AIS 20: 1
- AIS 25: 2
- AIS 26: 3
- AIS 31: 3
- AIS 32: 1
- AIS 34: 2
- AIS 35: 2
- AIS 36: 1
- AIS 37: 1
- AIS 38: 1
- FIPS:
- FIPS 180-4: 2
- FIPS 186-4: 3
- FIPS 197: 5
- FIPS 198-1: 1
- FIPS186-4: 2
- FIPS198-1: 1
- FIPS46-3: 1
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- PKCS:
- RFC:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- 04th April 2019 (confidential document) [16] Configuration list for the TOE: Configuration List for the hardware platform, Qualcomm: 1
- Application Programming Interface API, Qualcomm Technologies Inc., Rev. 4.6, August 26th, 2020 (confidential document) [12] Guidance documentation for the TOE: Secure Processor Unit (SPU) Anti-Replay Island (ARI: 1
- Configuration list for the TOE: rom_v2_binaries.txt, 23.10.2018 (confidential document) [20] Configuration list for the TOE: Configuration list of the documentation for the hardware: 1
- Inc., version 3,1; 11th April 2019 (SPU_3_1_config_list.txt (confidential document) [17] Configuration list for the TOE: Configuration list including the functional and verification: 1
- Qualcomm Technologies Inc., Rev. AC, May 6th, 2021 (confidential document) [14] Configuration list for the TOE: Configuration List user guidance: 1
- Revision J, Date: 14.01.2022, Qualcomm SPU230 Core Security Target, Qualcomm Technologies, Inc., (confidential document) [7] Evaluation Technical Report, Version 2.1, Date: 26.01.2023, Evaluation Technical Report -: 1
- TOE_SW_Test_config_list_CC2_PHASE2.txt(confidential document) [23] Configuration list for the TOE: MCP Software configuration list: config_list_spu_100.txt: 1
- Unit SPU230 in SDM855 SoC with MCP version spss.a1.1.2_00100, Deutsche Telekom Security GmbH (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
- for SM8150, Qualcomm Technologies Inc., Revision B, November, 2018 (confidential document) [13] Guidance documentation for the TOE: Qualcomm Secure Processing Unit, Enablement, 80-PF777-965: 1
- list of the documentation for the software development process: ALC_CMC_Doc_config_list-5.2.pdf (confidential document) [25] Configuration list for the TOE: Site Security Documentation Configuration List: 1
- of the hardware plat-form: TOE_HW_test_config_list.txt (confidential document) [18] Configuration list for the TOE: pbl_v2_config_list.txt, 22.03.2019 (confidential document: 1
- process TOE_SW_HW_process_config_list-10.1.pdf (confidential document) [21] Configuration list for the TOE: Configuration list software specifications: 1
- txt (confidential document) 25 / 29 Certification Report BSI-DSZ-CC-1045-V2-2023 C. Excerpts from the Criteria For the: 1
- txt (confidential document) [22] Configuration list for the TOE: Configuration list functional and verification tests of: 1
- v13.pdf, 09th December 2021 (confidential document) [15] Configuration list for the TOE: Configuration List hardware spec, TOE_HW_spec_config_list-4.0: 1
|
pdf_data/report_metadata |
- /AM_ACPP_Date: [dd month yyyy]
- /AM_ACPP_Doc#: [AM_AMCPP_Doc#]
- /AM_ACPP_Title: Assurance Continuity Program Plan (ACPP)
- /AM_ACPP_Version: [AM_AMCPP_Version]
- /AM_IAR_Date: [dd month yyyy]
- /AM_IAR_Doc#: [AM_IAR_Doc#]
- /AM_IAR_Title: Assurance Maintenace Impact Analysis Report
- /AM_IAR_Version: [AM_IAR_Version]
- /AM_ST Date: [dd month yyyy]
- /AM_ST Title: [AM_ST Title]
- /AM_ST Version: [AM_ST Version]
- /AM_TOE: [AM_TOE]
- /AM_TOE Short: [AM_TOE Short]
- /AM_TOE Version: [AM_TOE Version]
- /Author: sjackson
- /CC Version: 3.1R3
- /CC date: July 2009
- /CEM Version: 3.1R3
- /CEM date: July 2009
- /CR_Date: 24 February 2010
- /CR_Version: 0.3
- /Client City: Waterloo
- /Client Country: Canada
- /Client Full Name: Research In Motion Limited
- /Client Postal Code: N2L 3W8
- /Client Short Name: RIM
- /Client State: Ontario
- /Client Street: 295 Phillip Street
- /Comments: PCR Template Version 0.1-EWA-C (for CC 3.1)
- /Company:
- /CreationDate: D:20101014092443-04'00'
- /Creator: Acrobat PDFMaker 9.1 for Word
- /Developer Long Name: Research In Motion Limited
- /Developer Short Name: RIM
- /EAL Level: 4+
- /EAL Level Base: 4
- /EAL Long: EAL 4 Augmented
- /EAL Short: EAL 4+
- /ETPlan_Doc#: 1603-000-D003
- /ETPlan_Title: Evaluation Test Plan
- /ETPlan_Version: 0.3
- /ETPlan_date: 24 February 2010
- /ETProcRes_Date: 24 February 2010
- /ETProcRes_Doc#: 1603-000-D005
- /ETProcRes_Title: Evaluation Test Results
- /ETProcRes_Version: 0.3
- /ETProc_Date: 24 Februrary 2010
- /ETProc_Doc#: 1603-000-D004
- /ETProc_Title: Evaluation Test Procedures
- /ETProc_Version: 0.3
- /ETReport_Date: 24 February 2010
- /ETReport_Doc#: 1603-000-D002
- /ETReport_Title: Evaluation Technical Report
- /ETReport_TitleShort: ETR
- /ETReport_Version: 0.5
- /EWP_Date: 15 July 2008
- /EWP_Doc#: 1603-000-D001
- /EWP_Title: Evaluation Work Plan
- /EWP_Version: 1.1
- /Eval number: 383-4-100
- /Eval_End_Date: [dd month yyyy (date on certificate)]
- /Eval_Start_Date: 18 July 2008
- /Keywords:
- /LeadEvaluator: S. Jackson
- /LeadEvaluatorInitials: SJ
- /Manager:
- /ModDate: D:20101014092605-04'00'
- /Producer: Acrobat Distiller 9.2.0 (Windows)
- /ProjectManager: M. Gauvreau
- /ProjectManagerInitials: MG
- /ProjectNumber: 1603
- /ST_Date: 11 February 2010
- /ST_Title: Security Target BlackBerry® Smartphone Version 5.0
- /ST_Version: 4.0
- /SVC_Date: 1 December 2008
- /SVC_Doc#: 1603-000-D007
- /SVC_Title: Site Visit Checklist
- /SVC_Version: 0.1
- /SVR_Date: 30 March 2009
- /SVR_Doc#: 1603-000-D006
- /SVR_Title: Site Visit Report
- /SVR_Version: 0.3
- /SV_City: Waterloo
- /Security Classification: EWA-Canada & RIM Proprietary
- /SourceModified: D:20101014132425
- /Sponsor: Research In Motion Limited
- /Sponsor City: Waterloo
- /Sponsor Country: Canada
- /Sponsor Postal Code: N2L 3W8
- /Sponsor State: Ontario
- /Sponsor Street: 295 Phillip Street
- /Subject:
- /TOE: BlackBerry® Smartphone
- /TOE Line1: [TOE Line1 - enter later for PCR or web page]
- /TOE Line2: [TOE Line2 - enter later for PCR or web page]
- /TOE Line3: [TOE Line3 - enter later for PCR or web page]
- /TOE Line4: [TOE Line4 - enter later for PCR or web page]
- /TOE Line5: [TOE Line5 - enter later for PCR or web page]
- /TOE Short: BlackBerry® Smartphone
- /TOE Short with version: BlackBerry® Smartphone
- /TOE Short-NoTM: BlackBerry Smartphone
- /TOE Version: 5.0
- /TOE with version: BlackBerry® Smartphone Version 5.0
- /TOE-NoTM: BlackBerry Smartphone
- /Title: EAL X+ Evaluation of [Developer Long Name]
- /_AdHocReviewCycleID: 500818796
- /_AuthorEmail: [email protected]
- /_AuthorEmailDisplayName: Reade, Rick A.
- /_EmailSubject: RIM CPL post update ... rick
- /_ReviewingToolsShownOnce:
- pdf_file_size_bytes: 94281
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 15
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Keywords: "BSI, SOG-IS, IT-security, SoC, integrated secure element, PP0084, Qualcomm, secure processing unit, secure subsystem, SDM855, SoC, SPU230"
- /Subject: BSI, SOG-IS, IT-security, SoC, integrated secure element, PP0084, Qualcomm, secure processing unit, secure subsystem, SDM855, SoC, SPU230
- /Title: Certification Report BSI-DSZ-CC-1045-V2-2023
- pdf_file_size_bytes: 641231
- pdf_hyperlinks: http://www.commoncriteriaportal.org/cc/, https://www.sogis.eu/, https://www.bsi.bund.de/AIS, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 29
|
pdf_data/st_filename |
blackberry-smart-v50-sec-eng.pdf |
1045V2b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 4: 6
- EAL 4 augmented: 2
|
- EAL:
- EAL4: 1
- EAL4 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 6
- ADV_FSP.1: 3
- ADV_FSP.2: 3
- ADV_FSP.4: 5
- ADV_IMP.1: 5
- ADV_TDS.1: 2
- ADV_TDS.3: 6
- AGD:
- AGD_OPE.1: 6
- AGD_PRE.1: 6
- ALC:
- ALC_CMC.4: 4
- ALC_CMS.1: 1
- ALC_CMS.4: 3
- ALC_DEL.1: 4
- ALC_DVS.1: 5
- ALC_FLR.1: 8
- ALC_LCD.1: 5
- ALC_TAT.1: 5
- ASE:
- ASE_CCL.1: 4
- ASE_ECD.1: 6
- ASE_INT.1: 5
- ASE_OBJ.2: 6
- ASE_REQ.1: 1
- ASE_REQ.2: 3
- ASE_SPD.1: 5
- ASE_TSS.1: 4
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 4
- ATE_DPT.1: 3
- ATE_DPT.2: 1
- ATE_FUN.1: 7
- ATE_IND.2: 3
- AVA:
|
- ALC:
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 19
- FCS_CKM.1.1: 2
- FCS_CKM.2: 4
- FCS_CKM.4: 16
- FCS_CKM.4.1: 1
- FCS_COP.1: 20
- FCS_COP.1.1: 1
- FCS_VAL_EXP.1: 12
- FCS_VAL_EXP.1.1: 2
- FDP:
- FDP_ACC.1: 38
- FDP_ACC.1.1: 3
- FDP_ACF.1: 27
- FDP_ACF.1.1: 3
- FDP_ACF.1.2: 3
- FDP_ACF.1.3: 3
- FDP_ACF.1.4: 5
- FDP_ETC.2: 7
- FDP_ETC.2.1: 2
- FDP_ETC.2.2: 1
- FDP_ETC.2.3: 1
- FDP_ETC.2.4: 3
- FDP_IFC.1: 91
- FDP_IFC.1.1: 9
- FDP_IFF: 1
- FDP_IFF.1: 79
- FDP_IFF.1.1: 9
- FDP_IFF.1.2: 8
- FDP_IFF.1.3: 16
- FDP_IFF.1.4: 16
- FDP_IFF.1.5: 8
- FDP_ITC.1: 6
- FDP_ITC.2: 11
- FDP_ITC.2.1: 2
- FDP_ITC.2.2: 1
- FDP_ITC.2.3: 1
- FDP_ITC.2.4: 1
- FDP_ITC.2.5: 3
- FDP_SDP_EXP.1: 14
- FDP_SDP_EXP.1.1: 2
- FDP_SDP_EXP.2: 13
- FDP_SDP_EXP.2.1: 2
- FIA:
- FIA_AFL.1: 7
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_SOS.1: 7
- FIA_SOS.1.1: 1
- FIA_UAU.1: 18
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 1
- FIA_UAU.7: 5
- FIA_UAU.7.1: 1
- FIA_UID.1: 9
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MOF.1: 2
- FMT_MOF.1.1: 3
- FMT_MSA.1: 48
- FMT_MSA.1.1: 4
- FMT_MSA.2: 14
- FMT_MSA.2.1: 1
- FMT_MSA.3: 61
- FMT_MSA.3.1: 6
- FMT_MSA.3.2: 6
- FMT_SAE.1: 7
- FMT_SAE.1.1: 1
- FMT_SAE.1.2: 1
- FMT_SMF.1: 19
- FMT_SMF.1.1: 1
- FMT_SMR.1: 24
- FMT_SMR.1.1: 1
- FPT:
- FPT_ITT.1.1: 1
- FPT_STM.1: 8
- FPT_STM.1.1: 1
- FPT_TDC.1: 9
- FPT_TDC.1.1: 3
- FPT_TDC.1.2: 3
- FTA:
- FTA_SSL.1: 11
- FTA_SSL.1.1: 1
- FTA_SSL.1.2: 1
- FTA_SSL.2: 6
- FTA_SSL.2.1: 1
- FTA_SSL.2.2: 1
- FTA_SSL_EXP.4: 15
- FTA_SSL_EXP.4.1: 2
- FTA_SSL_EXP.4.2: 2
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC.1: 8
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 2
|
- FAU:
- FAU_GEN: 1
- FAU_SAS.1: 4
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM: 62
- FCS_CKM.1: 16
- FCS_CKM.2: 3
- FCS_CKM.4: 16
- FCS_COP: 49
- FCS_COP.1: 12
- FCS_ITC.1: 13
- FCS_ITC.2: 13
- FCS_RNG.1: 3
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FDP:
- FDP_ACC: 4
- FDP_ACC.1: 2
- FDP_ACC.2: 3
- FDP_ACC.2.1: 1
- FDP_ACC.2.2: 1
- FDP_ACF: 3
- FDP_ACF.1: 4
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_ICT.1: 1
- FDP_IFC.1: 5
- FDP_IFC.1.1: 2
- FDP_IFF.1: 1
- FDP_ITC.1: 8
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITT.1: 3
- FDP_ITT.1.1: 1
- FDP_RIP: 10
- FDP_RIP.1: 2
- FDP_SDA: 3
- FDP_SDA.1: 12
- FDP_SDA.1.1: 2
- FDP_SDC.1: 11
- FDP_SDC.1.1: 2
- FDP_SDI: 2
- FDP_SDI.2: 18
- FDP_SDI.2.1: 3
- FDP_SDI.2.2: 3
- FDP_SDR: 3
- FDP_SDR.1: 12
- FDP_SDR.1.1: 2
- FMT:
- FMT_CMT: 2
- FMT_CMT.1: 35
- FMT_CMT.1.1: 7
- FMT_LIM.1: 5
- FMT_LIM.1.1: 1
- FMT_LIM.2: 5
- FMT_LIM.2.1: 1
- FMT_MSA: 5
- FMT_MSA.1: 2
- FMT_MSA.3: 7
- FMT_SMR.1: 1
- FPT:
- FPT_FLS.1: 5
- FPT_FLS.1.1: 1
- FPT_ITT.1: 3
- FPT_ITT.1.1: 1
- FPT_PHP.3: 3
- FPT_PHP.3.1: 1
- FRU:
- FRU_FLT.2: 4
- FRU_FLT.2.1: 1
|
pdf_data/st_keywords/cc_claims |
|
- O:
- O.AES: 3
- O.CMAC: 4
- O.ECDH: 4
- O.ECDSA: 4
- O.HMAC: 4
- O.KDF: 4
- O.RND: 1
- O.RSA_ENC: 4
- O.RSA_SIGN: 4
- O.SHA: 3
- O.TDES: 3
- T:
- T.AUTH-APPLI-DATA: 3
- T.AUTH-TSF-DATA: 3
- T.CONFID-APPLI-: 1
- T.CONFID-APPLI-DATA: 4
- T.CONFID-TSF-CODE: 3
- T.CONFID-TSF-DATA: 4
- T.INTEG-: 1
- T.INTEG-APPLI-: 1
- T.INTEG-APPLI-CODE: 2
- T.INTEG-APPLI-DATA: 5
- T.INTEG-TSF-CODE: 3
- T.INTEG-TSF-DATA: 3
- T.RBP-APPLI-DATA: 3
- T.RBP-TSF-DATA: 3
- T.RND: 1
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 13
- AES-: 1
- AES-256: 8
- RC:
- DES:
- constructions:
|
- AES_competition:
- DES:
- 3DES:
- TDEA: 1
- TDES: 25
- Triple-DES: 3
- constructions:
- MAC:
- CMAC: 16
- HMAC: 25
- HMAC-SHA-384: 1
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-256: 15
- SHA-384: 8
- SHA-512: 8
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- NIST:
- NIST P-192: 5
- NIST P-224: 2
- NIST P-256: 2
- NIST P-384: 2
- NIST P-521: 2
- P-192: 13
- P-224: 16
- P-256: 12
- P-384: 14
- P-521: 16
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 4
- Malfunction: 3
- fault injection: 2
- malfunction: 3
- SCA:
- Leak-Inherent: 3
- Physical Probing: 2
- Side-channel: 1
- physical probing: 4
- side channel: 4
- side channels: 1
- side-channel: 2
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140-2: 13
- FIPS 186-2: 8
- FIPS 197: 1
- FIPS 46-3: 1
- PKCS:
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- FIPS 180-4: 3
- FIPS 186-4: 4
- FIPS 197: 5
- FIPS 198-1: 2
- FIPS PUB 180-4: 4
- FIPS PUB 186-4: 5
- FIPS PUB 197: 3
- FIPS PUB 198-1: 3
- FIPS186-4: 2
- FIPS198-1: 1
- FIPS46-3: 1
- NIST:
- NIST SP 800-108: 3
- NIST SP 800-38A: 3
- NIST SP 800-38B: 2
- NIST SP 800-38C: 1
- NIST SP 800-56A: 1
- NIST SP 800-67: 1
- NIST SP 800-90A: 1
- PKCS:
- RFC:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
- /Author: QTI
- /Keywords: integrated secure element, PP0084, Qualcomm, secure processing unit, secure subsystem, SDM855, SoC, SPU230
- /Subject: 80-NU430-6 Rev.H
- /Title: Qualcomm® Secure Processing Unit SPU230 Core Security Target Lite
- pdf_file_size_bytes: 824155
- pdf_hyperlinks: mailto:[email protected], https://createpoint.qti.qualcomm.com/
- pdf_is_encrypted: False
- pdf_number_of_pages: 61
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |