name |
HiCommand Suite Common Component Version: 05-51-01 |
STARCOS 3.7 COS GKV C2 |
category |
Access Control Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
DE |
status |
archived |
archived |
not_valid_after |
07.10.2013 |
21.11.2024 |
not_valid_before |
30.05.2007 |
21.11.2019 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0976V3c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0096_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0976V3a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0096_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0976V3b_pdf.pdf |
manufacturer |
Hitachi, Ltd. |
G+D Mobile Security GmbH |
manufacturer_web |
https://www.hitachi.com/ |
https://www.gi-de.com/de/de/mobile-security/ |
security_level |
EAL2+, ALC_FLR.1 |
EAL4+, ALC_DVS.1, ATE_DPT.2, AVA_VAN.5 |
dgst |
1a3d494b8e6e9a5d |
744d4ed202fc8a80 |
heuristics/cert_id |
JISEC-CC-CRP-C0096 |
BSI-DSZ-CC-0976-V3-2019 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_RCR.1, ADV_FSP.1, ALC_FLR.1, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, ATE_COV.1, ADV_HLD.1, AVA_SOF.1 |
ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ALC_TAT.1, ASE_TSS.1, ASE_SPD.1, ATE_DPT.2, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
01, 05, 51 |
3.7 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-1243-2024, BSI-DSZ-CC-0976-V4-2021 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0976-V2-2018, BSI-DSZ-CC-1110-V2-2019 |
heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-1243-2024, BSI-DSZ-CC-0976-V4-2021 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0976-2015, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0945-V3-2018, BSI-DSZ-CC-0879-2014, BSI-DSZ-CC-0945-V2-2018, BSI-DSZ-CC-1110-2019, BSI-DSZ-CC-0976-V2-2018, BSI-DSZ-CC-0945-2017, BSI-DSZ-CC-1110-V2-2019, BSI-DSZ-CC-0782-V2-2015, BSI-DSZ-CC-0891-V2-2016, BSI-DSZ-CC-0916-2015 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0096
- certification_date: 01.05.2007
- claim: EAL2+ ALC_FLR.1
- enhanced:
- assurance_level: EAL2+ALC_FLR.1
- cc_version: 2.3
- cert_link: https://www.ipa.go.jp/en/security/c0096_eimg.pdf
- description: PRODUCT DESCRIPTION TOE is a module that provides some kinds of storage management software that manage a plural of storage devices that are connected through SAN with common functions. Storage management software is such as HiCommand Device Manager, HiCommand Replication Monitor and HiCommand Tiered Storage Manager. HiCommand Suite is the general term for these software and TOE. TOE is provided customers as built-in module included in each software package. TOE has the following security functions. - Identification/authentication - Privilege information management (Privilege information is attached to each user's information and it decides each user's role for storage management software.) - Warning banner
- evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
- product: HiCommand Suite Common Component
- product_type: IT Product (Foundational Module Software)
- report_link: https://www.ipa.go.jp/en/security/c0096_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0096_est.pdf
- toe_version: 05-51-01
- vendor: Hitachi, Ltd.
- expiration_date: 01.10.2013
- revalidations: [frozendict({'date': '2007-12', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0096_it6106_01.html'})]
- supplier: Hitachi, Ltd.
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0096_it6106.html
- toe_japan_name: HiCommand Suite Common Component 05-51-01
- toe_overseas_link: None
- toe_overseas_name: HiCommand Suite Common Component 05-70-01
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-1110-V2-2019 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1110-V2-2019 |
heuristics/protection_profiles |
{} |
af9c3335f79dec6f |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0082V4b_pdf.pdf |
pdf_data/cert_filename |
|
0976V3c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0976-V3-2019: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL 4 augmented: 1
- EAL 5: 1
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20191128152454+01'00'
- /Creator: Writer
- /Keywords: Common Criteria, Certification, Zertifizierung, PP-0082-V4, G+D, STARCOS 3.7, eHealth
- /ModDate: D:20191128152705+01'00'
- /Producer: LibreOffice 6.2
- /Subject: STARCOS 3.7 COS GKV C2
- /Title: Certificate BSI-DSZ-CC-0976-V3-2019
- pdf_file_size_bytes: 294740
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
c0096_erpt.pdf |
0976V3a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ALC_DVS.2, ATE_DPT.2 and AVA_VAN.5
- cc_version: PP conformant Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-0976-V3-2019
- cert_item: STARCOS 3.7 COS GKV C2
- cert_lab: BSI
- developer: Giesecke+Devrient Mobile Security GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Card Operating System Generation 2 (PP COS G2), Version 2.1, 10 July 2019, BSI-CC-PP-0082-V4- 2019
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0096-01: 1
- Certification No. C0096: 1
|
- DE:
- BSI-DSZ-CC-0976-V2-2018: 3
- BSI-DSZ-CC-0976-V3-2019: 25
- BSI-DSZ-CC-1110-: 1
- BSI-DSZ-CC-1110-V2-2019: 7
- BSI-DSZ-CC-S-0095-2018: 2
- BSI-DSZ-CC-S-0132-2019: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0082-V4-: 1
- BSI-CC-PP-0082-V4-2019: 3
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 2: 2
- EAL 2+: 1
- EAL 4: 5
- EAL 4 augmented: 3
- EAL 5: 4
- EAL 5+: 1
- EAL 6: 1
- EAL5+: 1
- EAL6: 1
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 5
- ALC_FLR: 2
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ATE:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
- FCS:
- FCS_CKM: 4
- FCS_COP: 25
- FCS_RNG: 3
- FCS_RNG.1: 1
- FIA:
- FPT:
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ADMINISTRATORS: 1
- A.NETWORKS: 1
- A.PASSWORD: 1
- A.PHYSICAL: 1
- A.SECURE_CHANNEL: 1
- A.TOKEN: 1
- T:
- T.ILLEGAL_ACCESS: 1
- T.UNAUTHORISED_: 1
|
|
pdf_data/report_keywords/vendor |
|
- GD:
- Giesecke & Devrient: 2
- Giesecke+Devrient: 28
- Infineon:
- Infineon: 11
- Infineon Technologies AG: 7
|
pdf_data/report_keywords/eval_facility |
|
- SRC:
- SRC Security Research & Consulting: 3
- TUV:
- TÜV Informationstechnik: 1
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- fault injection: 1
- malfunction: 1
- physical tampering: 1
- SCA:
- DPA: 1
- SPA: 1
- side channel: 1
- other:
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7148: 1
- BSI TR-03116-1: 1
- BSI TR-03143: 5
- BSI TR-03144: 11
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2005-08-001: 2
- CCMB-2005-08-002: 2
- CCMB-2005-08-003: 2
- CCMB-2005-08-004: 2
- ISO:
- ISO/IEC 15408:2005: 1
- ISO/IEC 18045:2005: 2
|
- BSI:
- AIS 1: 1
- AIS 14: 1
- AIS 19: 1
- AIS 20: 5
- AIS 23: 1
- AIS 25: 4
- AIS 26: 4
- AIS 31: 4
- AIS 32: 1
- AIS 34: 4
- AIS 35: 2
- AIS 36: 5
- AIS 37: 2
- AIS 38: 1
- AIS 46: 2
- FIPS:
- FIPS PUB 180-4: 1
- FIPS PUB 186-4: 1
- FIPS PUB 197: 1
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18031:2005: 1
- ISO/IEC 18045: 4
- RFC:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- 000021h, 000022h H13, Revision 2.9, 13 May 2019, Infineon Technologies AG, BSI-DSZ-CC-1110-V2-2019 (confidential document) Security Target Lite of the underlying hardware platform, Security Target IFX_CCI_000003h, 000005h: 1
- 1.5, 14 November 2019, Giesecke+Devrient Mobile Security GmbH (confidential document) [11] Guidance Documentation STARCOS 3.7 – Main Document, Version 1.4, 23 August 2019: 1
- STARCOS 3.7 COS GKV C2, Version 1.4, 12 September 2019, Giesecke+Devrient Mobile Security GmbH (confidential document) [7] Security Target Lite BSI-DSZ-CC-0976-V3-2019, Security Target Lite STARCOS 3.7 COS GKV C2: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
- for STARCOS 3.7 COS GKV C2, Version 2.6, 14 November 2019, SRC Security Research & Consulting GmbH (confidential document) [10] Configuration List BSI-DSZ-CC-0976-V3-2019, Configuration List STARCOS 3.7 COS GKV C2: 1
- procedure BSI-DSZ-CC-1110-V2-2019, Version 2, 14 June 2019, TÜV Informationstechnik GmbH (confidential document) [21] Einführung der Gesundheitskarte, Spezifikation des Card Operating System (COS), Elektrische: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20081212094836+09'00'
- /ModDate: D:20081212094836+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 107748
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20191128150108+01'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, PP-0082-V4, G+D, STARCOS 3.7, eHealth"
- /ModDate: D:20191206094925+01'00'
- /Producer: LibreOffice 6.2
- /Subject: STARCOS 3.7 COS GKV C2
- /Title: Certification Report BSI-DSZ-CC-0976-V3-2019
- pdf_file_size_bytes: 900693
- pdf_hyperlinks: http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/AIS, http://www.sogisportal.eu/, http://www.commoncriteriaportal.org/, https://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 38
|
pdf_data/st_filename |
c0096_est.pdf |
0976V3b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1110-V2-2019: 2
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0082-V3: 1
- BSI-CC-PP- 0084-2014: 9
- BSI-CC-PP- 15: 1
- BSI-CC-PP-0035-2007: 1
- BSI-CC-PP-0082-: 1
- BSI-CC-PP-0082-V3: 21
- BSI-CC-PP-0082-V4: 3
- BSI-CC-PP-0084-: 4
- BSI-CC-PP-0084-2007: 1
- BSI-CC-PP-0084-2014: 53
- BSI-PP-0084-: 2
- BSI-PP-0084-2014: 8
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL2: 6
- EAL2 augmented: 4
|
- EAL:
- EAL 4: 2
- EAL 6: 2
- EAL4: 14
- EAL4 augmented: 4
- EAL6: 1
- EAL6+: 1
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ADO:
- ADO_DEL.1: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP.1: 2
- ADV_HLD.1: 2
- ADV_RCR.1: 2
- AGD:
- AGD_ADM.1: 2
- AGD_USR.1: 2
- ALC:
- ATE:
- ATE_COV.1: 2
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
- AVA_SOF.1: 2
- AVA_VLA.1: 2
|
- ADV:
- ADV_ARC: 2
- ADV_ARC.1: 9
- ADV_FSP: 2
- ADV_FSP.4: 6
- ADV_IMP: 2
- ADV_IMP.1: 6
- ADV_TDS.3: 3
- AGD:
- AGD_OPE: 2
- AGD_OPE.1: 6
- AGD_PRE: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC: 2
- ALC_CMC.4: 1
- ALC_CMS: 2
- ALC_CMS.4: 1
- ALC_DEL: 2
- ALC_DEL.1: 1
- ALC_DVS: 2
- ALC_DVS.2: 12
- ALC_FLR.1: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD: 2
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 2
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 11
- ATE_FUN.1: 6
- ATE_IND.2: 5
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 16
- FDP_ACC.1.1: 1
- FDP_ACF: 1
- FDP_ACF.1: 12
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 1
- FIA:
- FIA_AFL: 1
- FIA_AFL.1: 9
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 11
- FIA_ATD.1.1: 1
- FIA_SOS: 1
- FIA_SOS.1: 12
- FIA_SOS.1.1: 1
- FIA_TAB: 5
- FIA_TAB.1: 7
- FIA_UAU.1: 14
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID: 1
- FIA_UID.1: 12
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB: 1
- FIA_USB.1: 9
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 1
- FMT_MSA: 2
- FMT_MSA.1: 12
- FMT_MSA.1.1: 1
- FMT_MSA.3: 10
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 1
- FMT_MTD.1: 12
- FMT_MTD.1.1: 1
- FMT_SMF: 1
- FMT_SMF.1: 10
- FMT_SMF.1.1: 1
- FMT_SMR: 1
- FMT_SMR.1: 16
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_ITC.1: 5
- FPT_ITC.1.1: 1
- FPT_RVM: 1
- FPT_RVM.1: 15
- FPT_RVM.1.1: 1
- FPT_SEP: 1
- FPT_SEP.1: 11
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FTA:
- FTA_TAB: 1
- FTA_TAB.1: 3
- FTA_TAB.1.1: 2
|
- FAU:
- FCS:
- FCS_CKM: 67
- FCS_CKM.1: 31
- FCS_CKM.2: 8
- FCS_CKM.4: 49
- FCS_CKM.4.1: 1
- FCS_COP: 144
- FCS_COP.1: 21
- FCS_COP.1.1: 1
- FCS_RNG: 32
- FCS_RNG.1: 20
- FCS_RNG.1.1: 3
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC: 114
- FDP_ACC.1: 41
- FDP_ACF: 93
- FDP_ACF.1: 35
- FDP_IFC: 7
- FDP_IFC.1: 17
- FDP_ITC.1: 27
- FDP_ITC.2: 27
- FDP_ITT: 7
- FDP_ITT.1: 4
- FDP_RIP: 9
- FDP_RIP.1: 12
- FDP_RIP.1.1: 1
- FDP_SDC: 8
- FDP_SDC.1: 4
- FDP_SDI: 7
- FDP_SDI.1: 1
- FDP_SDI.2: 11
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UCT: 7
- FDP_UCT.1: 1
- FDP_UIT: 8
- FDP_UIT.1: 2
- FIA:
- FIA_AFL: 22
- FIA_AFL.1: 4
- FIA_API: 1
- FIA_API.1: 14
- FIA_API.1.1: 1
- FIA_ATD: 10
- FIA_ATD.1: 14
- FIA_ATD.1.1: 1
- FIA_SOS.1: 8
- FIA_SOS.1.1: 1
- FIA_UAU: 40
- FIA_UAU.1: 20
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 12
- FIA_UAU.4.1: 1
- FIA_UAU.5: 17
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 11
- FIA_UAU.6.1: 1
- FIA_UID: 14
- FIA_UID.1: 19
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB: 13
- FIA_USB.1: 23
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_LIM: 15
- FMT_LIM.1: 4
- FMT_LIM.2: 2
- FMT_MSA: 60
- FMT_MSA.1: 6
- FMT_MSA.3: 33
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 38
- FMT_MTD.1: 4
- FMT_SMF.1: 51
- FMT_SMF.1.1: 1
- FMT_SMR: 9
- FMT_SMR.1: 38
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FMT_SRM: 1
- FPT:
- FPT_EMS: 10
- FPT_EMS.1: 15
- FPT_EMS.1.1: 1
- FPT_EMS.1.2: 1
- FPT_FLS: 7
- FPT_FLS.1: 16
- FPT_FLS.1.1: 1
- FPT_ITE: 11
- FPT_ITE.1: 11
- FPT_ITE.1.1: 1
- FPT_ITE.1.2: 1
- FPT_ITE.2: 13
- FPT_ITE.2.1: 5
- FPT_ITE.2.2: 1
- FPT_ITT: 7
- FPT_ITT.1: 4
- FPT_PHP: 7
- FPT_PHP.3: 5
- FPT_TDC.1: 10
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST: 2
- FPT_TST.1: 11
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FRU:
- FTP:
- FTP_ITC: 22
- FTP_ITC.1: 12
- FTP_ITE: 1
- FTP_TRP.1: 5
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMINISTRATORS: 3
- A.ADMINISTROTORS: 1
- A.NETWORKS: 3
- A.PASSWORD: 3
- A.PHYSICAL: 4
- A.SECURE_CHANNEL: 3
- A.TOKEN: 4
- O:
- O.BANNER: 6
- O.MGMT: 7
- O.PASSWORD: 7
- OE:
- OE.BANNER: 7
- OE.SECURE_CHAN: 1
- OE.SECURE_CHANNEL: 6
- T:
- T.ILLEGAL_ACCESS: 4
- T.UNAUTHORISED_ACCESS: 3
|
- O:
- O.AES: 6
- O.PACE_CHIP: 2
- O.RND: 7
- T:
|
pdf_data/st_keywords/vendor |
- Microsoft:
- Microsoft: 6
- Microsoft Corporation: 1
|
- GD:
- Infineon:
- Infineon: 2
- Infineon Technologies AG: 2
- NXP:
- STMicroelectronics:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-256: 11
- SHA-384: 6
- SHA-512: 4
|
pdf_data/st_keywords/crypto_scheme |
|
- KA:
- Key Agreement: 1
- Key agreement: 1
- MAC:
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- Brainpool:
- brainpoolP256r1: 4
- brainpoolP384r1: 4
- brainpoolP512r1: 4
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- Malfunction: 16
- malfunction: 1
- physical tampering: 3
- SCA:
- DPA: 1
- Leak-Inherent: 14
- Physical Probing: 2
- SPA: 1
- side channel: 1
- other:
- Bleichenbacher attack: 1
- JIL: 3
|
pdf_data/st_keywords/technical_report_id |
|
- BSI:
- BSI TR-03111: 3
- BSI TR-03143: 2
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- BSI:
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- CCMB-2017-05-001: 1
- FIPS:
- FIPS 180-4: 1
- FIPS 197: 3
- FIPS PUB 180-4: 1
- FIPS PUB 197: 1
- ISO:
- NIST:
- PKCS:
- RFC:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: Hitachi, Ltd.
- /CreationDate: D:20081205141328
- /Creator: PrimoPDF http://www.primopdf.com/
- /ModDate: D:20081205141328
- /Producer: PrimoPDF
- /Subject: HSCC-ST
- /Title: HiCommand Suite Common Component ST
- pdf_file_size_bytes: 381919
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 54
|
- /Author: Giesecke+Devrient Mobile Security GmbH
- /CreationDate: D:20191202161357+01'00'
- /Creator: Microsoft® Word 2010
- /Keywords: Version 1.4/12.09.2019
- /ModDate: D:20191202161357+01'00'
- /Producer: Microsoft® Word 2010
- /Subject: Security Target STARCOS 3.7 COS GKV C2
- /Title: G+D MS Security Target to BSI-PP-0082-V4
- pdf_file_size_bytes: 2514997
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 148
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |