| name |
d'COMPASS version 2.0.0 |
S3CS9AB 32-Bit RISC Microcontroller for Smart Cards, Revision 0 with specific IC Dedicated Software |
| category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme |
MY |
DE |
| status |
archived |
archived |
| not_valid_after |
24.12.2019 |
01.09.2019 |
| not_valid_before |
24.12.2014 |
04.12.2013 |
| cert_link |
None |
None |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C056-CR-v1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0882a_pdf.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/d'COMPASS%20Security%20Target%20v1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0882b_pdf.pdf |
| manufacturer |
TriAset Sdn Bhd |
Samsung Electronics Co., Ltd. |
| manufacturer_web |
https://triaset.com/ |
https://www.samsung.com |
| security_level |
EAL2 |
EAL5+, AVA_VAN.5, ALC_DVS.2 |
| dgst |
2437da21a2df0903 |
db89c868db0d272f |
| heuristics/cert_id |
ISCB-5-RPT-C056-CR-v1 |
BSI-DSZ-CC-0882-2013 |
| heuristics/cert_lab |
[] |
BSI |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 |
ALC_FLR.3, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ATE_DPT.3, AVA_VAN.5, ASE_INT.1, ALC_CMC.4, APE_ECD.1, ASE_REQ.2, ADV_INT.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, APE_OBJ.2, ADV_IMP.1, ADV_TDS.4, ALC_LCD.1, ALC_DVS.2, ASE_SPD.1, APE_INT.1, ATE_COV.2, APE_REQ.2, ALC_CMS.5, APE_CCL.1, AGD_OPE.1, APE_SPD.1, ADV_FSP.5, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1, ADV_SPM.1, ALC_TAT.2 |
| heuristics/extracted_versions |
2.0.0 |
0, 32 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0882-V2-2019 |
| heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0801-2012 |
| heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-0882-V2-2019 |
| heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0547-2009, BSI-DSZ-CC-0801-2012, BSI-DSZ-CC-0720-2011, BSI-DSZ-CC-0719-2011, BSI-DSZ-CC-0639-2010 |
| heuristics/scheme_data |
- cert_no: 2014-004-C056
- certification_date: 24.12.2014
- developer: TriAset Sdn Bhd
- enhanced:
- assurance_level: EAL2
- category: Other Devices and Systems
- cert_id: C056
- certification_date: 24.12.2014
- developer: Elaine TanCorporate Service ManagerTriAset Sdn BhdUnit 23-5, 5th Floor Block E1 Jalan PJU 1/42Dataran Prima 47301 Petaling Jaya, Selangor, Malaysia URL: http://triaset.com/Email: [email protected]: +603 7880 9562Fax: +603 7880 9563
- expiration_date: 24.12.2019
- mutual_recognition: CCRA
- product: d'COMPASS version 2.0.0
- report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C056/ISCB-5-RPT-C056-CR-v1.pdf
- scope: d'COMPASS v2.0.0 is an online Treasury Management System that caters for managing and operating treasury, financial asset investment and financial risks. It is a web application that is developed entirely from Java-based technologies which is installed into a Java EE-compliant application server and accessible via a web browser and it also provides a complete solution from back to the front office fund management operation. Following are the major security functions provided by the TOE: Access control - the TOE manages access control within each organisation based on user Ids, user roles and access control lists. Each ACL maps users and roles to the operations that they are permitted to perform on the object. Identification and Authentication - the TOE requires that each user is successfully identified (user IDs) and authenticated (password) before any interaction with protected resources is permitted. Security Management - the TOE provides functions that allow management of the TOE and its security functions. The TOE restricts access to the management functions based on the role of the user. Security Communication - the TOE is able to protect the user data from disclosure and modification using SSL as a secure communication between users’ browser and the TOE.
- status: Archive
- target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C056/d'COMPASS%20Security%20Target%20v1.0.pdf
- type: Online Treasury Management System that caters for managing and operating treasury, financial asset investment and financial risks.
- expiration_date: 24.12.2019
- level: EAL2
- product: d'COMPASS version 2.0.0
- recognition: CCRA
- url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/146
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
{} |
f6d23054061d72ba |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf |
| pdf_data/cert_filename |
None |
None |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename |
ISCB-5-RPT-C056-CR-v1.pdf |
0882a_pdf.pdf |
| pdf_data/report_frontpage |
|
- DE:
- cert_id: BSI-DSZ-CC-0882-2013
- cert_item: S3CS9AB 32-Bit RISC Microcontroller for Smart Cards, Revision 0 with specific IC Dedicated Software
- cert_lab: BSI
- developer: Samsung Electronics
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
| pdf_data/report_keywords/cc_cert_id |
- MY:
- ISCB-5-RPT-C056-CR-v1: 25
|
- DE:
- BSI-DSZ-CC-0801-2012: 3
- BSI-DSZ-CC-0882: 1
- BSI-DSZ-CC-0882-2013: 22
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 4: 2
- EAL 5: 7
- EAL 5 augmented: 3
- EAL1: 7
- EAL2: 3
- EAL3: 4
- EAL4: 7
- EAL5: 7
- EAL5+: 1
- EAL6: 4
- EAL7: 4
- ITSEC:
|
| pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 2
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 2
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 2
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 2
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 2
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 3
- ALC_DEL: 1
- ALC_DEL.1: 2
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 7
- ALC_FLR: 1
- ALC_FLR.1: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 2
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ALC_TAT.2: 3
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 2
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 6
|
| pdf_data/report_keywords/cc_sfr |
- FCS:
- FDP:
- FDP_ACC.1: 1
- FDP_ACF.1: 1
- FIA:
- FIA_UAU.2: 1
- FIA_UID.2: 1
- FMT:
- FMT_MSA.1: 1
- FMT_MTD: 2
- FMT_SMF.1: 1
- FMT_SMR.1: 2
- FTP:
|
|
| pdf_data/report_keywords/cc_claims |
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 2
- TÜViT: 2
|
| pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- TDEA: 1
- TDES: 2
- Triple-DES: 2
- DES:
- constructions:
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- physical tampering: 1
- SCA:
- DPA: 2
- SPA: 1
- physical probing: 1
- side-channel: 1
- other:
|
| pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI TR-02102: 1
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
|
- BSI:
- AIS 25: 2
- AIS 26: 2
- AIS 31: 3
- AIS 32: 1
- AIS 34: 2
- AIS 35: 2
- AIS 36: 3
- AIS 38: 1
- AIS 46: 1
- AIS31: 3
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- 2013-11-27, TÜViT (confidential document) [11] Project < Kansa > Life Cycle Definition (Class ALC_CMC.4/CMS.5), Version 1.4, 2013-10-21: 1
- Electronics (confidential document) [12] S3CS9AB 32-Bit CMOS Microcontroller for Smart Card User’s manual, Version 1.00, April 2013: 1
- Report Summary (ETR Summary), BSI-DSZ-CC-0882, S3CS9AB Revision 0, Version 3, 2013-11-27, TÜViT (confidential document) [10] ETR for composite evaluation according to AIS 36 for the Product S3CS9AB Revision 0, Version: 1
- Software (Project Kansa), BSI-DSZ-CC-0882-2013, Version 1.9, 2013-10-21, Samsung Electronics (confidential document) [7] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007 [8: 1
|
| pdf_data/report_metadata |
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20140205100058+01'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, S3CS9AB 32-Bit RISC Microcontroller for Smart Cards, Revision 0 with specific IC Dedicated Software, Samsung Electronics"
- /ModDate: D:20140206085959+01'00'
- /Producer: LibreOffice 3.6
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0882-2013
- pdf_file_size_bytes: 996795
- pdf_hyperlinks: https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung
- pdf_is_encrypted: False
- pdf_number_of_pages: 38
|
| pdf_data/st_filename |
d'COMPASS Security Target v1.0.pdf |
0882b_pdf.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 1
- EAL 4 augmented: 1
- EAL 5: 2
- EAL 5 augmented: 2
- EAL5: 6
- EAL5 augmented: 1
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ASE:
- ASE_CCL.1: 4
- ASE_ECD.1: 1
- ASE_INT.1: 4
- ASE_OBJ.2: 4
- ASE_REQ.2: 4
- ASE_SPD.1: 4
- ASE_TSS.1: 4
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 7
- ADV_ARV: 1
- ADV_FSP: 2
- ADV_FSP.2: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 3
- ADV_IMP: 1
- ADV_IMP.1: 2
- ADV_INT.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_VAN: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 2
- AGD_PRE: 1
- AGD_PRE.1: 2
- ALC:
- ALC_CMC: 1
- ALC_CMC.4: 1
- ALC_CMS: 2
- ALC_CMS.4: 1
- ALC_CMS.5: 3
- ALC_DEL: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 8
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 1
- ATE_COV.2: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 3
- FCS_CKM.4: 3
- FCS_COP.1: 6
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 12
- FDP_ACC.1.1: 1
- FDP_ACF.1: 7
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FDP_IFF: 2
- FDP_ITC.1: 2
- FDP_ITC.2: 2
- FIA:
- FIA_UAU.1: 1
- FIA_UAU.2: 6
- FIA_UAU.2.1: 1
- FIA_UID.1: 4
- FIA_UID.2: 7
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA.1: 6
- FMT_MSA.1.1: 1
- FMT_MTD: 14
- FMT_SMF.1: 15
- FMT_SMF.1.1: 1
- FMT_SMR.1: 14
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FTP:
- FTP_TRP.1: 6
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_GEN: 2
- FAU_GEN.1: 1
- FAU_SAS: 8
- FAU_SAS.1: 12
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM.1: 6
- FCS_CKM.4: 4
- FCS_COP: 8
- FCS_COP.1: 9
- FCS_RNG: 6
- FCS_RNG.1: 15
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 13
- FDP_ACC.1.1: 1
- FDP_ACF: 2
- FDP_ACF.1: 9
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC: 1
- FDP_IFC.1: 18
- FDP_IFC.1.1: 1
- FDP_IFF.1: 3
- FDP_ITC.1: 4
- FDP_ITC.2: 4
- FDP_ITT: 1
- FDP_ITT.1: 17
- FDP_ITT.1.1: 1
- FDP_SDI.1: 1
- FMT:
- FMT_LIM: 8
- FMT_LIM.1: 24
- FMT_LIM.1.1: 2
- FMT_LIM.2: 28
- FMT_LIM.2.1: 2
- FMT_MSA: 2
- FMT_MSA.1: 9
- FMT_MSA.1.1: 1
- FMT_MSA.3: 10
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF: 1
- FMT_SMF.1: 6
- FMT_SMF.1.1: 1
- FMT_SMR.1: 6
- FPT:
- FPT_FLS: 1
- FPT_FLS.1: 21
- FPT_FLS.1.1: 1
- FPT_ITT: 1
- FPT_ITT.1: 15
- FPT_ITT.1.1: 1
- FPT_PHP: 3
- FPT_PHP.3: 20
- FPT_PHP.3.1: 1
- FRU:
- FRU_FLT: 1
- FRU_FLT.1: 1
- FRU_FLT.2: 17
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN: 3
- A.ENVIRONMENT: 2
- A.PASSWORD: 3
- A.PATCH: 2
- A.PHYSICAL: 3
- A.SSL_CONFIG: 2
- O:
- O.ACCESS: 5
- O.COMM: 4
- O.MANAGE: 4
- O.PASSWORD_DAT: 1
- O.PASSWORD_DATA: 3
- O.USER: 5
- OE:
- OE.ADMIN: 2
- OE.AUTHDATA: 3
- OE.ENVIRONMENT: 2
- OE.PATCH: 2
- OE.PHYSICAL: 2
- OE.SSL_CONFIG: 3
- T:
- T.EAVESDROP: 3
- T.MANAGEMENT: 2
- T.PASSWORD_DATA: 3
- T.UNAUTHORISED_A: 1
- T.UNAUTHORISED_AC: 1
|
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 6
- TDEA: 1
- Triple-DES: 2
- DES:
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 24
- malfunction: 11
- physical tampering: 2
- SCA:
- DPA: 3
- Leak-Inherent: 21
- Physical Probing: 4
- Physical probing: 2
- SPA: 2
- physical probing: 9
- side-channel: 3
- timing attacks: 1
- other:
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
|
- BSI:
- AIS 31: 2
- AIS31: 1
- BSI-AIS31: 3
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- CCMB-2012-09-004: 3
- FIPS:
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
|
| pdf_data/st_metadata |
- /Author:
- /CreationDate: D:20150205003146+08'00'
- /Creator:
- /Keywords:
- /ModDate: D:20150205003255+08'00'
- /Producer: Foxit Reader PDF Printer Version 7.0.1.831
- /Subject:
- /Title:
- pdf_file_size_bytes: 748344
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 28
|
- /Author: KyungSuk YI
- /Baustein: SLE66C82P/SLE66C42P
- /BausteinVersion: a15
- /Classification: Public
- /Company: Samsung Electronics
- /CreationDate: D:20131021190305+09'00'
- /Creator: Word용 Acrobat PDFMaker 10.1
- /Datum: 23-10-2003
- /Dokument: Security Target
- /EEPROM: 8 kBytes
- /Jahr: 2003
- /ModDate: D:20140206090253+01'00'
- /PP_Augmentations: Smartcard Integrated Circuit Platform Augmentations V0.98
- /PP_Date: July 2001
- /PP_Short: BSI-PP-0002; Version 1.0, July 2001
- /PP_Version: 1.0
- /Producer: Adobe PDF Library 10.0
- /Protection Profile: Smartcard IC Platform Protection Profile
- /ROM: 64 kBytes
- /SourceModified: D:20131021100233
- /Technologie: 0,22 µm
- /Title: Security Target
- /Version: 1.2
- /XRAM: 2 kBytes
- /m-Nummer: m1474/m1495
- pdf_file_size_bytes: 1315207
- pdf_hyperlinks: http://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 57
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
False |
| state/cert/download_ok |
False |
False |
| state/cert/extract_ok |
False |
False |
| state/cert/pdf_hash |
Equal |
Equal |
| state/cert/txt_hash |
Equal |
Equal |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |