name |
secunet SBC Container Version 5.2 |
Apollo OS e-Passport Version 1.0 |
category |
Network and Network-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
DE |
JP |
status |
active |
archived |
not_valid_after |
25.06.2029 |
31.07.2014 |
not_valid_before |
26.06.2024 |
27.07.2009 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1089V3c_pdf.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1089V3a_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0229_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1089V3b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0229_est.pdf |
manufacturer |
Secunet Security Networks AG |
SC Square LTD. |
manufacturer_web |
https://www.secunet.com/en/ |
https://www.scsquare.com/ |
security_level |
ASE_TSS.2, ALC_FLR.2, AVA_VAN.5, EAL4+ |
AVA_MSU.3, EAL4+, AVA_VLA.4 |
dgst |
1fbbc802399645af |
2b75001bea02144e |
heuristics/cert_id |
BSI-DSZ-CC-1089-V3-2024 |
JISEC-CC-CRP-C0229 |
heuristics/cert_lab |
BSI |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_TAT.1, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ALC_FLR.2, ASE_TSS.2, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 |
ATE_COV.2, ADV_RCR.1, ALC_TAT.1, AVA_VLA.4, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_SOF.1, ATE_IND.2, AGD_ADM.1, ADV_LLD.1, ALC_DVS.2, ALC_LCD.1, ADV_IMP.2, ATE_DPT.1, ADV_FSP.2, ADV_SPM.1, AVA_MSU.3 |
heuristics/extracted_versions |
5.2 |
1.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-1089-V2-2022 |
BSI-DSZ-CC-0399-2007 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-1089-V2-2022, BSI-DSZ-CC-1089-2020 |
BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0169-2002, BSI-DSZ-CC-0399-2007, BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0223-2003 |
heuristics/scheme_data |
- category: Network and Network related Devices and Systems
- cert_id: BSI-DSZ-CC-1089-V3-2024
- certification_date: 26.06.2024
- enhanced:
- applicant: secunet Security Networks AG Weidenauer Straße 223-225 57076 Siegen
- assurance_level: EAL4+,AVA_VAN.5,ASE_TSS.2,ALC_FLR.2
- cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1089V3c_pdf.pdf?__blob=publicationFile&v=2
- certification_date: 26.06.2024
- description: The secunet SBC Container is a Session Border Controller Container, a Linux systemd-nspawn container which can be deployed on a Linux operating system. The main purpose of the secunet SBC Container is a secure bridging between an SIP caller and the SIP callee. Concretely, the SBC supports a safeguarded initiation of SIP sessions (also called signaling) and bridging of media communication streams such as RTP or SRTP. A Session Border Controller (SBC) is a device which is deployed in Voice-over-IP (VoIP) networks to manage the signaling and media streams of audio and video communication. The used hardware is under full control of the operating system. However, the connected networks have to be separated physically, especially the management network, to allow the secunet SBC to perform the intended operation in a secure manner.
- entries: [frozendict({'id': 'BSI-DSZ-CC-1089-V3-2024 (26.06.2024)', 'description': 'Certificate'}), frozendict({'id': 'BSI-DSZ-CC-1089-V2-2022 (19.05.2022)', 'description': ') networks to manage the signaling and media streams of audio and video communication. The used hardware is under full control of the operating system. However, the connected networks have to be separated physically, especially the management network, to allow the secunet SBC to perform the in-tended operation in a secure manner.'}), frozendict({'id': 'BSI-DSZ-CC-1089-2020 (08.07.2020)', 'description': 'Certificate'})]
- evaluation_facility: SRC Security Research & Consulting GmbH
- expiration_date: 25.06.2029
- product: secunet SBC Container Version 5.2
- report_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1089V3a_pdf.pdf?__blob=publicationFile&v=2
- target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1089V3b_pdf.pdf?__blob=publicationFile&v=2
- product: secunet SBC Container Version 5.2
- url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Netzwerk_und_Kommunikationsprodukte/1089.html
- vendor: secunet Security Networks AG
|
- cert_id: JISEC-CC-CRP-C0229
- certification_date: 01.07.2009
- claim: EAL4+ ADV_IMP.2, ALC_DVS.2 PP
- enhanced:
- assurance_level: EAL4 Augmented with ADV_IMP.2, ALC_DVS.2
- cc_version: 2.3
- cert_link: https://www.ipa.go.jp/en/security/c0229_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The Target of Evaluation (TOE) is the contactless integrated circuit chip of machine readable travel documents (MRTD's chip) programmed according to the Logical Data Structure (LDS) [LDS] and providing the Basic Access Control according to the ICAO technical report [PKI]. The MRTD is viewed as unit of - The physical MRTD as travel document in form of paper, plastic and chip. It presents visual readable data including (but not limited to) personal data of the MRTD holder - the biographical data on the biographical data page of the passport book, - the printed data in the Machine Readable Zone (MRZ) and - The printed portrait. - The logical MRTD as data of the MRTD holder stored according to the Logical Data Structure [LDS] as specified by ICAO on the contactless integrated circuit. It presents contactless readable data including (but not limited to) personal data of the MRTD holder - the digital Machine Readable Zone Data (digital MRZ data, EF.DG1), - the digitized portraits (EF.DG2), - the biometric reference data of finger(s) (EF.DG3) or iris image(s) (EF.DG4) or both - the other data according to LDS (EF.DG5 to EF.DG16) and - the Document security object The physical MRTD is protected by physical security measures (e.g. watermark on paper, security printing), logical (e.g. authentication keys of the MRTD痴 chip) and organisational security measures (e.g. control of materials, personalization procedures) [SSMR]. These security measures include the binding of the MRTD痴 chip to the passport book. The logical MRTD is protected in authenticity and integrity by a digital signature created by the document signer acting for the issuing State or Organization and the security features of the MRTD痴 chip. TOE security functions TOE security function is as follows - SF.Cryptographic Support The cryptographic support for the other Security Functions. - SF.Identification and Authentication The identification and authentication for the TOE user - SF. User Data Protection The user data protection - SF.Security Management The security management of the TOE - SF.Protection (Protection of TSC) This Security Function protects the TSF functionality, TSF data and user data.
- evaluation_facility: TÜV Informationstechnik GmbH, Evaluation Body for IT-Security
- product: Apollo OS e-Passport
- product_type: IT Product (IC chip firmware)
- protection_profile: BSI-PP-0017
- report_link: https://www.ipa.go.jp/en/security/c0229_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0229_est.pdf
- toe_version: 1.0
- vendor: SC Square LTD.
- expiration_date: 01.07.2014
- supplier: SC Square LTD.
- toe_japan_name: Apollo OS e-Passport 1.0
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0229_it8194.html
- toe_overseas_name: Apollo OS e-Passport 1.0
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0399-2007 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0399-2007 |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
1089V3c_pdf.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-1089-V3-2024: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 4: 2
- EAL 4 augmented: 1
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author: Federal Office for Information Security
- /Keywords: "Common Criteria, Certification, Zertifizierung, secunet SBC Container, Version 5.2"
- /Subject: Common Criteria, Certification, Zertifizierung, secunet SBC Container, Version 5.2
- /Title: Certificate BSI-DSZ-CC-1089-V3-2024
- pdf_file_size_bytes: 230700
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
1089V3a_pdf.pdf |
c0229_erpt.pdf |
pdf_data/report_frontpage |
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ASE_TSS.2, ALC_FLR.2 and AVA_VAN.5 valid until: 25 Month 2029 SOGIS Recognition Agreement for components up to EAL 4
- cc_version: Product specific Security Target Common Criteria Part 2 conformant
- cert_id: BSI-DSZ-CC-1089-V3-2024
- cert_item: secunet SBC Container, Version 5.2
- cert_lab: BSI
- developer: secunet Security Networks AG
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: None
|
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-1089-V2-2022: 2
- BSI-DSZ-CC-1089-V3-2024: 13
|
- DE:
- JP:
- CRP-C0229-01: 1
- Certification No. C0229: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 2: 3
- EAL 4: 8
- EAL 4 augmented: 3
- EAL 5: 2
- EAL 5+: 1
- EAL 6: 1
|
- EAL:
- EAL 5: 1
- EAL 5 augmented: 1
- EAL4: 3
- EAL4 augmented: 2
- EAL5+: 1
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ALC:
- AVA:
- AVA_MSU.3: 1
- AVA_VLA.4: 1
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
- A:
- A.INSP_SYS: 1
- A.PERS_AGENT: 1
|
pdf_data/report_keywords/vendor |
|
- Infineon:
- Infineon: 2
- Infineon Technologies AG: 1
|
pdf_data/report_keywords/eval_facility |
- SRC:
- SRC Security Research & Consulting: 3
|
- TUV:
- TÜV Informationstechnik: 2
- TÜViT: 2
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- Fault Injection: 1
- Malfunction: 1
- Physical Tampering: 1
- Physical tampering: 1
- fault injection: 3
- malfunction: 3
- physical tampering: 1
- SCA:
- DPA: 3
- physical probing: 1
- other:
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- AIS 32: 1
- AIS 34: 2
- AIS 38: 1
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
|
- BSI:
- AIS 1: 1
- AIS 14: 1
- AIS 19: 1
- AIS 23: 1
- AIS 31: 1
- AIS 32: 1
- AIS 34: 1
- CC:
- CCMB-2005-08-001: 2
- CCMB-2005-08-002: 2
- CCMB-2005-08-003: 2
- CCMB-2005-08-004: 2
- ICAO:
- ISO:
- ISO/IEC 15408:2005: 1
- ISO/IEC 18045:2005: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- Version 1.4, 25.04.2024, file name: SBC_TAT_CMS, Frafos GmbH (confidential document) [9] Secunet SBC container – User Guidance, Frafos GmbH, 28.05.2024, v3.6, file name: SBC – AGD v3: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
- secunet SBC Container, Version 2.1, Date 31.05.2024, SRC Security Research & Consulting GmbH (confidential document) [8] Configuration list for the TOE as part of Tools and Techniques / Configuration, secunet SBC: 1
|
|
pdf_data/report_metadata |
- /Author: Federal Office for Information Security
- /Keywords: "Common Criteria, Certification, Zertifizierung, secunet SBC Container, Version 5.2"
- /Subject: Common Criteria, Certification, Zertifizierung, secunet SBC Container, Version 5.2
- /Title: Certification Report BSI-DSZ-CC-1089-V3-2024
- pdf_file_size_bytes: 348771
- pdf_hyperlinks: http://www.commoncriteriaportal.org/cc/, https://www.sogis.eu/, https://www.bsi.bund.de/AIS, http://www.commoncriteriaportal.org/, https://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
- /CreationDate: D:20090910140719+09'00'
- /ModDate: D:20090910140719+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 170365
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 27
|
pdf_data/st_filename |
1089V3b_pdf.pdf |
c0229_est.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- NL:
- CC-1: 3
- CC-2: 3
- CC-3: 2
- CC-4: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP-0002-2001: 1
- BSI-PP-0017: 3
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL4: 11
- EAL4 augmented: 1
|
- EAL:
- EAL 4+: 1
- EAL 5+: 1
- EAL4: 9
- EAL4 augmented: 2
- EAL4+: 1
- EAL5: 1
- EAL5 augmented: 1
- EAL5+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 2
- ADV_FSP.4: 2
- ADV_IMP.1: 2
- ADV_TDS: 1
- ADV_TDS.3: 2
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.2: 7
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.2: 6
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 2
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ACM:
- ACM_AUT.1: 1
- ACM_CAP.4: 1
- ADO:
- ADO_DEL: 1
- ADO_DEL.2: 1
- ADO_IGS: 1
- ADO_IGS.1: 1
- ADV:
- ADV_FSP.2: 1
- ADV_HLD.2: 1
- ADV_IMP.2: 8
- ADV_LLD.1: 1
- ADV_RCR.1: 1
- ADV_SPM.1: 3
- AGD:
- AGD_ADM.1: 1
- AGD_USR.1: 1
- ALC:
- ALC_DVS: 1
- ALC_DVS.2: 8
- ALC_LCD.1: 1
- ALC_TAT.1: 2
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_MSU.2: 1
- AVA_MSU.3: 1
- AVA_SOF.1: 1
- AVA_VLA.2: 1
- AVA_VLA.4: 1
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 6
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 1
- FDP_IFC.1: 12
- FDP_IFC.1.1: 1
- FDP_IFF.1: 7
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FIA:
- FIA_AFL.1: 7
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_SOS.1: 4
- FIA_SOS.1.1: 1
- FIA_UAU.1: 9
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID.1: 10
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MOF.1: 6
- FMT_MOF.1.1: 1
- FMT_MSA: 1
- FMT_MSA.1: 7
- FMT_MSA.1.1: 1
- FMT_MSA.3: 8
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 5
- FMT_MTD.1.1: 1
- FMT_SMF: 13
- FMT_SMF.1: 7
- FMT_SMR: 1
- FMT_SMR.1: 16
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM.1: 2
- FPT_TDC.1: 7
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FTA:
- FTA_SSL.3: 7
- FTA_SSL.3.1: 1
|
- FAU:
- FAU_SAS.1: 7
- FAU_SAS.1.1: 4
- FCS:
- FCS_CKM: 22
- FCS_CKM.1: 30
- FCS_CKM.1.1: 1
- FCS_CKM.2: 4
- FCS_CKM.4: 33
- FCS_COP: 46
- FCS_COP.1: 24
- FCS_RND: 8
- FCS_RND.1: 13
- FCS_UIT: 1
- FDP:
- FDP_ACC: 19
- FDP_ACC.1: 25
- FDP_ACC.1.1: 1
- FDP_ACF: 15
- FDP_ACF.1: 34
- FDP_ACF.1.2: 1
- FDP_ACF.1.4: 1
- FDP_DAU: 2
- FDP_DAU.1: 5
- FDP_IFC: 1
- FDP_IFC.1: 9
- FDP_IFF: 1
- FDP_ITC.1: 17
- FDP_ITC.2: 13
- FDP_SDI.1: 1
- FDP_SDI.2: 1
- FDP_UCT: 12
- FDP_UCT.1: 12
- FDP_UIT: 12
- FDP_UIT.1: 13
- FIA:
- FIA_API: 6
- FIA_API.1: 1
- FIA_UAU: 36
- FIA_UAU.1: 6
- FIA_UAU.1.1: 3
- FIA_UAU.1.2: 3
- FIA_UAU.4: 7
- FIA_UAU.5: 4
- FIA_UAU.5.1: 3
- FIA_UAU.5.2: 4
- FIA_UAU.6: 7
- FIA_UCT: 1
- FIA_UID.1: 9
- FIA_UID.1.1: 3
- FIA_UID.1.2: 3
- FMT:
- FMT_LIM.1: 12
- FMT_LIM.1.1: 3
- FMT_LIM.2: 12
- FMT_LIM.2.1: 3
- FMT_MOF.1: 12
- FMT_MOF.1.1: 4
- FMT_MSA.1: 2
- FMT_MSA.2: 22
- FMT_MSA.3: 4
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 22
- FMT_MTD.1: 14
- FMT_SMF.1: 17
- FMT_SMF.1.1: 3
- FMT_SMR.1: 16
- FMT_SMR.1.1: 3
- FMT_SMR.1.2: 3
- FPT:
- FPT_AMT.1: 1
- FPT_FLS.1: 11
- FPT_FLS.1.1: 3
- FPT_PHP.3: 11
- FPT_PHP.3.1: 4
- FPT_RVM.1: 6
- FPT_RVM.1.1: 3
- FPT_SEP.1: 8
- FPT_SEP.1.1: 4
- FPT_SEP.1.2: 4
- FPT_TST: 1
- FPT_TST.1: 11
- FPT_TST.1.1: 3
- FPT_TST.1.2: 3
- FPT_TST.1.3: 4
- FPT_TST.2.1: 1
- FRU:
- FTP:
- FTP_ITC.1: 9
- FTP_TRP.1: 8
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.INSP_SYS: 2
- A.PERS_AGENT: 2
- O:
- OE:
- OE.EXAM_MRTD: 1
- OE.PERSONALIZATION: 2
- OE.PROT_LOGICAL_MRTD: 2
- OT:
- OT.AC_PERS: 4
- OT.DATA_CONF: 3
- OT.PROT_ABUSE_FU: 2
- OT.PROT_ABUSE_FUNC: 1
- OT.PROT_INF_LEAK: 2
- OT.PROT_MALFUNCT: 2
- OT.PROT_PHYS_TAMPER: 1
- T:
- T.ABUSE_FUNC: 1
- T.CHIP_ID: 1
- T.EAVESDROPPING: 1
- T.FORGERY: 1
- T.INFORMATION_LEAKAGE: 1
- T.MALFUNCTION: 1
- T.PHYS_TAMPER: 1
- T.SKIMMING: 1
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 5
- Physical Tampering: 5
- Physical tampering: 1
- fault injection: 1
- malfunction: 6
- physical tampering: 8
- SCA:
- DPA: 1
- Leak-Inherent: 2
- physical probing: 4
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.DG1: 1
- EF.DG16: 1
- EF.DG2: 1
- EF.DG3: 1
- EF.DG4: 1
- EF.DG5: 1
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
|
- BSI:
- CC:
- CCMB-2005-08-001: 1
- CCMB-2005-08-002: 1
- CCMB-2005-08-003: 1
- CCMB-2005-08-004: 1
- FIPS:
- FIPS 180-2: 3
- FIPS 180-212: 1
- FIPS 46-3: 3
- FIPS PUB 46-3: 1
- ICAO:
- ISO:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: SRC
- pdf_file_size_bytes: 914085
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 43
|
- /CreationDate: D:20090812100814Z
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20090812131114+03'00'
- /Producer: Microsoft® Office Word 2007
- pdf_file_size_bytes: 1066290
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 116
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |