name |
Check Point Software Blades R7x |
Morpho_HC_Germany_G2_COS V1 |
category |
Boundary Protection Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
US |
DE |
status |
archived |
archived |
not_valid_after |
31.12.2014 |
28.10.2021 |
not_valid_before |
26.11.2012 |
28.10.2016 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10387-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0938a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10387-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0938b_pdf.pdf |
manufacturer |
Check Point Software Technologies Ltd. |
Morpho Cards GmbH |
manufacturer_web |
https://www.checkpoint.com/ |
https://www.morpho.com/e-documents |
security_level |
EAL4+, ALC_FLR.3 |
EAL4+, ATE_DPT.2, ALC_DVS.2, AVA_VAN.5 |
dgst |
2abffef5c9de3bae |
7950b51171b0f96d |
heuristics/cert_id |
CCEVS-VR-10387-2012 |
BSI-DSZ-CC-0938-2016 |
heuristics/cert_lab |
US |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 |
ASE_INT.1, ASE_APD.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ATE_DPT.2, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, APE_REQ.2, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_TDS.3, ASE_REQ.2, ADV_INT.3, APE_INT.1, APE_SPD.1, ADV_FSP.4, ATE_IND.2, APE_OBJ.2, ASE_CCL.1, ADV_SPM.1 |
heuristics/extracted_versions |
- |
- |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0782-V2-2015 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0782-V2-2015, BSI-DSZ-CC-0782-2012 |
heuristics/scheme_data |
- category: Firewall, Virtual Private Network, Wireless Monitoring
- certification_date: 26.11.2012
- evaluation_facility: Leidos Common Criteria Testing Laboratory
- expiration_date: 26.11.2014
- id: CCEVS-VR-VID10387
- product: Check Point Software Blades R7x
- scheme: US
- url: https://www.niap-ccevs.org/product/10387
- vendor: Check Point Software Technologies Ltd
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0782-V2-2015 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0782-V2-2015 |
heuristics/protection_profiles |
f0acae5742fb48a1, 168a407fba56140a, 44cdd911811b36d2 |
ecc28509c30de1a5 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_fw_tf_br_v1.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_ids_sys_br_v1.7.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_FW_AL_BR_V1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0082V2b_pdf.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
st_vid10387-vr.pdf |
0938a_pdf.pdf |
pdf_data/report_frontpage |
- DE:
- US:
- cert_id: CCEVS-VR-10387-2012
- cert_item: Check Point Software Blades R7x
- cert_lab: US NIAP
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by AVA_VAN.5, ATE_DPT.2 and ALC_DVS.2
- cc_version: PP conformant Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-0938-2016
- cert_item: Morpho_HC_Germany_G2_COS V1
- cert_lab: BSI
- developer: Morpho Cards GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Card Operating System Generation 2 (PP COS G2), Version 1.9, 18 November 2014, BSI-CC-PP-0082-V2-2014
- US:
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0782-V2-2015: 8
- BSI-DSZ-CC-0938-2016: 30
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0082-V2-2014: 4
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 4: 2
- EAL4: 4
|
- EAL:
- EAL 1: 7
- EAL 2: 4
- EAL 3: 4
- EAL 4: 13
- EAL 4 augmented: 3
- EAL 5: 10
- EAL 5+: 1
- EAL 6: 4
- EAL 7: 4
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.3: 4
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 2
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 2
- ALC_CMS.5: 1
- ALC_DEL: 1
- ALC_DEL.1: 2
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 7
- ALC_FLR: 3
- ALC_FLR.1: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 2
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 2
- ALC_TAT.2: 1
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 6
- ATE_DPT.3: 1
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 6
|
pdf_data/report_keywords/cc_sfr |
|
- FCS:
- FCS_CKM: 2
- FCS_COP: 20
- FCS_RNG: 3
- FPT:
|
pdf_data/report_keywords/cc_claims |
- A:
- A.LOCATE: 1
- A.NOEVIL: 1
- A.SINGEN: 1
- T:
- T.ASPOOF: 1
- T.AUDFUL: 1
- T.AUMACC: 1
- T.COMDIS: 1
- T.COMINT: 1
- T.FACCNT: 1
- T.FALACT: 1
- T.FALASC: 1
- T.FALREC: 1
- T.FAULT: 1
- T.IMPCON: 1
- T.INADVE: 1
- T.INFLUX: 1
- T.LOSSOF: 1
- T.MEDIAT: 1
- T.MISACT: 1
- T.MISUSE: 1
- T.NACCESS: 1
- T.NMODIFY: 1
- T.NOAUTH: 1
- T.NOHALT: 1
- T.OLDINF: 1
- T.PRIVIL: 1
- T.PROCOM: 1
- T.REPEAT: 1
- T.REPLAY: 1
- T.SELPRO: 1
- T.TUSAGE: 1
|
|
pdf_data/report_keywords/vendor |
|
- Infineon:
- Infineon: 8
- Infineon Technologies AG: 7
- Morpho:
|
pdf_data/report_keywords/eval_facility |
|
- SRC:
- SRC Security Research & Consulting: 3
- TUV:
- TÜV Informationstechnik: 1
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- fault injection: 1
- malfunction: 1
- SCA:
- DPA: 1
- Template attack: 1
- side channel: 1
- other:
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7148: 1
- BSI TR-03116-1: 1
- BSI TR-03143: 4
- BSI TR-03144: 14
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- FIPS:
- FIPS 140-2: 2
- FIPS 197: 1
- FIPS PUB 140-1: 1
|
- BSI:
- AIS 1: 1
- AIS 14: 1
- AIS 19: 1
- AIS 20: 2
- AIS 23: 1
- AIS 25: 2
- AIS 26: 3
- AIS 31: 2
- AIS 32: 1
- AIS 34: 2
- AIS 35: 1
- AIS 36: 4
- AIS 38: 1
- AIS31: 1
- FIPS:
- FIPS PUB 180-4: 1
- FIPS PUB 186-4: 1
- FIPS PUB 197: 1
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- PKCS:
- RFC:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- 1.11, 01.09.2016, Morpho Cards GmbH (confidential document) [11] Guidance Documentation Morpho_HC_Germany_G2_COS V1 - OS Preparation Guidance, Version 1.13: 1
- Security Target Morpho_HC_Germany_G2_COS V1, Version 1.09, 30.08.2016, Morpho Cards GmbH (confidential document) [7] Security Target Lite BSI-DSZ-CC-0938-2016, Security Target Lite Morpho_HC_Germany_G2_COS V1: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
- for Morpho_HC_Germany_G2_COS V1, Version 2.0, 02.09.2016, SRC Security Research & Consulting GmbH (confidential document) [10] Configuration List BSI-DSZ-CC-0938-2016, Configuration List Morpho_HC_Germany_G2_COS V1: 1
- procedure BSI-DSZ-CC-0782-V2-2015, Version 7, 21 October 2015, TÜV Informationstechnik GmbH (confidential document) [18] Einführung der Gesundheitskarte, Spezifikation des Card Operating System (COS), Elektrische: 1
|
pdf_data/report_metadata |
- /Author: NIAP CCEVS
- /CreationDate: D:20121130103410
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20121130103410
- /Producer: Microsoft® Office Word 2007
- /Title: VID 10375 VR
- pdf_file_size_bytes: 401523
- pdf_hyperlinks: http://www.niap-ccevs.org/
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20161124164918+01'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, eHC G2, PP-0082, Morpho"
- /ModDate: D:20161220121910+01'00'
- /Producer: LibreOffice 4.2
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0938-2016
- pdf_file_size_bytes: 1388001
- pdf_hyperlinks: https://www.bsi.bund.de/AIS, http://www.sogisportal.eu/, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 50
|
pdf_data/st_filename |
st_vid10387-st.pdf |
0938b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0782-V2-2015: 2
- BSI-DSZ-CC-0938: 2
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0084-2014: 1
- BSI-CC-PP-0035: 1
- BSI-CC-PP-0035-: 1
- BSI-CC-PP-0035-2007: 9
- BSI-CC-PP-0059: 1
- BSI-CC-PP-0071: 1
- BSI-CC-PP-0072: 1
- BSI-CC-PP-0075: 1
- BSI-CC-PP-0082-V2: 1
- BSI-CC-PP-0084-2014: 1
- BSI-PP-0035: 3
- BSI-PP-0035-: 1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 4: 2
- EAL4: 10
|
- EAL:
- EAL 4: 1
- EAL 4 augmented: 1
- EAL 5: 1
- EAL 5 augmented: 1
- EAL4: 11
- EAL4 augmented: 5
- EAL4+: 1
- EAL5: 1
- EAL5 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 7
- ADV_FSP.1: 1
- ADV_FSP.2: 3
- ADV_FSP.4: 6
- ADV_IMP.1: 5
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 8
- AGD:
- AGD_OPE.1: 6
- AGD_PRE.1: 6
- ALC:
- ALC_CMC.4: 2
- ALC_CMS.4: 2
- ALC_DEL.1: 2
- ALC_DVS.1: 4
- ALC_FLR.2: 1
- ALC_FLR.3: 9
- ALC_LCD.1: 4
- ALC_TAT.1: 4
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_COV.2: 4
- ATE_DPT.1: 2
- ATE_FUN.1: 8
- ATE_IND.2: 2
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 16
- ADV_FSP: 1
- ADV_FSP.1: 3
- ADV_FSP.2: 2
- ADV_FSP.4: 20
- ADV_IMP: 1
- ADV_IMP.1: 11
- ADV_TDS: 1
- ADV_TDS.1: 2
- ADV_TDS.3: 24
- AGD:
- AGD_OPE: 2
- AGD_OPE.1: 15
- AGD_PRE: 1
- AGD_PRE.1: 11
- ALC:
- ALC_CMC: 1
- ALC_CMC.4: 16
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.4: 7
- ALC_DEL: 1
- ALC_DEL.1: 6
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 20
- ALC_LCD: 1
- ALC_LCD.1: 9
- ALC_TAT: 1
- ALC_TAT.1: 10
- ASE:
- ASE_APD.1: 1
- ASE_CCL: 1
- ASE_CCL.1: 15
- ASE_ECD: 1
- ASE_ECD.1: 14
- ASE_INT: 1
- ASE_INT.1: 17
- ASE_OBJ: 1
- ASE_OBJ.2: 13
- ASE_REQ: 1
- ASE_REQ.1: 2
- ASE_REQ.2: 15
- ASE_SPD: 1
- ASE_SPD.1: 8
- ASE_TSS: 1
- ASE_TSS.1: 6
- ATE:
- ATE_COV: 1
- ATE_COV.1: 2
- ATE_COV.2: 8
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 18
- ATE_FUN: 1
- ATE_FUN.1: 14
- ATE_IND: 1
- ATE_IND.2: 7
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 29
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 1
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_SAR.1: 11
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 7
- FAU_SAR.2.1: 1
- FAU_SAR.3: 9
- FAU_SAR.3.1: 1
- FAU_SEL.1: 8
- FAU_SEL.1.1: 1
- FAU_STG.1: 4
- FAU_STG.2: 16
- FAU_STG.2.1: 1
- FAU_STG.2.2: 2
- FAU_STG.2.3: 1
- FAU_STG.3: 7
- FAU_STG.3.1: 1
- FAU_STG.4: 13
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM: 3
- FCS_CKM.1: 27
- FCS_CKM.1.1: 2
- FCS_CKM.2: 20
- FCS_CKM.2.1: 2
- FCS_CKM.4: 15
- FCS_CKM.4.1: 1
- FCS_COP: 1
- FCS_COP.1: 70
- FCS_COP.1.1: 8
- FDP:
- FDP_ACC.1: 2
- FDP_IFC: 4
- FDP_IFC.1: 44
- FDP_IFC.1.1: 6
- FDP_IFF: 10
- FDP_IFF.1: 51
- FDP_IFF.1.1: 6
- FDP_IFF.1.2: 6
- FDP_IFF.1.3: 6
- FDP_IFF.1.4: 4
- FDP_IFF.1.5: 3
- FDP_IFF.1.6: 2
- FDP_ITC.1: 3
- FDP_ITC.2: 3
- FDP_RIP: 2
- FDP_RIP.1: 4
- FDP_RIP.2: 10
- FDP_RIP.2.1: 1
- FDP_UCT.1: 10
- FDP_UCT.1.1: 1
- FDP_UIT.1: 8
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL.1: 6
- FIA_ATD.1: 15
- FIA_ATD.1.1: 3
- FIA_SOS.1: 1
- FIA_UAU.1: 15
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 1
- FIA_UAU.4: 8
- FIA_UAU.4.1: 1
- FIA_UAU.5: 24
- FIA_UAU.5.1: 2
- FIA_UAU.5.2: 2
- FIA_UID: 1
- FIA_UID.1: 5
- FIA_UID.2: 16
- FIA_UID.2.1: 1
- FIA_USB: 2
- FIA_USB.1: 14
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF: 1
- FMT_MOF.1: 22
- FMT_MOF.1.1: 1
- FMT_MSA: 8
- FMT_MSA.1: 23
- FMT_MSA.1.1: 3
- FMT_MSA.3: 17
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 1
- FMT_MTD.1: 19
- FMT_MTD.1.1: 1
- FMT_MTD.2: 2
- FMT_SMF.1: 17
- FMT_SMF.1.1: 1
- FMT_SMR.1: 29
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 2
- FPT:
- FPT_FLS.1: 9
- FPT_FLS.1.1: 1
- FPT_ITA.1: 1
- FPT_ITC.1: 1
- FPT_ITI.1: 1
- FPT_ITT.1: 10
- FPT_ITT.1.1: 1
- FPT_RVM: 1
- FPT_SEP: 1
- FPT_STM.1: 12
- FPT_STM.1.1: 4
- FPT_TRC.1: 9
- FPT_TRC.1.1: 1
- FPT_TRC.1.2: 1
- FPT_TST.1: 9
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FRU:
- FRU_FLT.2: 9
- FRU_FLT.2.1: 1
- FTP:
- FTP_ITC: 1
- FTP_ITC.1: 14
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 12
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_SAS: 11
- FAU_SAS.1: 4
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM: 63
- FCS_CKM.1: 18
- FCS_CKM.2: 4
- FCS_CKM.4: 39
- FCS_CKM.4.1: 1
- FCS_COP: 129
- FCS_COP.1: 16
- FCS_RNG: 10
- FCS_RNG.1: 16
- FCS_RNG.1.1: 4
- FCS_RNG.1.2: 3
- FDP:
- FDP_ACC: 71
- FDP_ACC.1: 20
- FDP_ACF: 59
- FDP_ACF.1: 32
- FDP_IFC: 12
- FDP_IFC.1: 7
- FDP_IFF.1: 2
- FDP_ITC.1: 14
- FDP_ITC.2: 14
- FDP_ITT: 10
- FDP_ITT.1: 2
- FDP_RIP.1: 10
- FDP_RIP.1.1: 1
- FDP_SDI.1: 1
- FDP_SDI.2: 9
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FIA:
- FIA_AFL: 16
- FIA_AFL.1: 4
- FIA_API: 2
- FIA_API.1: 9
- FIA_API.1.1: 2
- FIA_ATD.1: 9
- FIA_ATD.1.1: 1
- FIA_SOS.1: 7
- FIA_SOS.1.1: 1
- FIA_UAU.1: 11
- FIA_UAU.1.1: 3
- FIA_UAU.1.2: 1
- FIA_UAU.4: 8
- FIA_UAU.4.1: 1
- FIA_UAU.5: 8
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 8
- FIA_UAU.6.1: 1
- FIA_UID.1: 11
- FIA_UID.1.1: 3
- FIA_UID.1.2: 1
- FIA_USB.1: 9
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_LIM: 20
- FMT_LIM.1: 10
- FMT_LIM.1.1: 1
- FMT_LIM.2: 9
- FMT_LIM.2.1: 1
- FMT_MSA: 46
- FMT_MSA.1: 7
- FMT_MSA.3: 19
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 28
- FMT_MTD.1: 3
- FMT_SMF.1: 23
- FMT_SMF.1.1: 1
- FMT_SMR.1: 26
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS: 3
- FPT_EMS.1: 10
- FPT_EMS.1.1: 2
- FPT_EMS.1.2: 2
- FPT_FLS: 9
- FPT_FLS.1: 16
- FPT_FLS.1.1: 1
- FPT_ITE: 6
- FPT_ITE.1: 10
- FPT_ITE.1.1: 2
- FPT_ITE.1.2: 2
- FPT_ITE.2: 13
- FPT_ITE.2.1: 4
- FPT_ITE.2.2: 2
- FPT_ITT: 10
- FPT_ITT.1: 2
- FPT_PHP: 10
- FPT_PHP.3: 3
- FPT_TDC.1: 8
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST.1: 11
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FPT_TST.2: 1
- FRU:
- FTP:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ACCESS: 1
- A.LOCATE: 4
- A.NOEVIL: 3
- A.PHYSEC: 2
- A.SINGEN: 6
- D:
- D.INFO: 10
- D.PACKET: 9
- D.PACKETS: 1
- O:
- O.ACCESS: 3
- O.ACCOUN: 7
- O.AUDITS: 3
- O.AUDREC: 11
- O.CREDEN: 1
- O.DAC: 1
- O.EADMIN: 4
- O.EAL: 2
- O.ENCRYP: 9
- O.EXPORT: 2
- O.FAULT: 7
- O.GENPUR: 1
- O.GUIDANCE: 1
- O.IDANLZ: 10
- O.IDAUTH: 19
- O.IDSCAN: 1
- O.IDSENS: 8
- O.INTEGR: 8
- O.LIMEXT: 8
- O.MEDIAT: 10
- O.MEDIATE: 1
- O.OFLOWS: 9
- O.PROTCT: 10
- O.RESPON: 8
- O.SECFUN: 13
- O.SECSTA: 8
- O.SELPRO: 8
- O.SINUSE: 5
- O.VPN: 9
- OE:
- OE.AUDIT_PROTECTION: 1
- OE.AUDIT_SORT: 1
- OE.CREDEN: 3
- OE.IDAUTH: 9
- OE.INSTAL: 2
- OE.PERSON: 2
- OE.PHYCAL: 2
- OE.SINGEN: 8
- OE.TIME: 1
- OE.VPN: 8
- T:
- T.ASPOOF: 1
- T.AUDACC: 1
- T.AUDFUL: 1
- T.COMDIS: 1
- T.COMINT: 3
- T.FACCNT: 1
- T.FALACT: 3
- T.FALASC: 3
- T.FALREC: 1
- T.FAULT: 3
- T.IMPCON: 1
- T.INADVE: 3
- T.INFLUX: 3
- T.LOSSOF: 3
- T.LOWEXP: 3
- T.MEDIAT: 4
- T.MISACT: 1
- T.MISUSE: 1
- T.NACCESS: 4
- T.NMODIFY: 1
- T.NOAUTH: 5
- T.NOHALT: 1
- T.OLDINF: 1
- T.PRIVIL: 3
- T.PROCOM: 3
- T.REPEAT: 1
- T.REPLAY: 3
- T.SCNCFG: 1
- T.SCNMLC: 1
- T.SCNVUL: 1
- T.SELPRO: 3
- T.TUSAGE: 3
|
|
pdf_data/st_keywords/vendor |
|
- Infineon:
- Infineon: 5
- Infineon Technologies AG: 8
- Morpho:
- NXP:
- STMicroelectronics:
|
pdf_data/st_keywords/eval_facility |
|
- SRC:
- SRC Security Research & Consulting: 1
- TrustedLabs:
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-2: 4
- SHA-256: 13
- SHA-384: 5
- SHA-512: 4
- SHA2: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IKE:
- IPsec:
- SSH:
- TLS:
- SSL:
- TLS:
- TLS: 32
- TLS v1.0: 1
- TLSv1.0: 10
- VPN:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- Brainpool:
- brainpoolP256r1: 1
- brainpoolP384r1: 1
- brainpoolP512r1: 1
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_RSA_WITH_3DES_EDE_CBC_SHA: 1
- TLS_RSA_WITH_AES_128_CBC_SHA: 1
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- Malfunction: 20
- malfunction: 2
- physical tampering: 1
- SCA:
- DPA: 2
- Leak-Inherent: 19
- Physical Probing: 2
- SPA: 2
- physical probing: 1
- side channel: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- FIPS:
- FIPS 140-2: 10
- FIPS 180-3: 1
- FIPS 197: 3
- FIPS PUB 140-1: 1
- FIPS PUB 140-2: 9
- FIPS PUB 180-3: 2
- FIPS PUB 197: 3
- FIPS PUB 198: 3
- FIPS PUB 46-3: 4
- FIPS140: 1
- FIPS180-3: 1
- FIPS197: 1
- FIPS198: 1
- FIPS46-3: 1
- NIST:
- NIST SP 800-67: 2
- NIST SP 800-90: 3
- SP 800-67: 3
- SP 800-90: 5
- PKCS:
- PKCS #1: 1
- PKCS#1: 3
- PKCS#12: 1
- RFC:
- RFC 0854: 1
- RFC 0959: 1
- RFC 1305: 1
- RFC 1334: 1
- RFC 1777: 2
- RFC 1778: 1
- RFC 1994: 1
- RFC 2104: 3
- RFC 2246: 3
- RFC 2284: 1
- RFC 2401: 1
- RFC 2404: 3
- RFC 2406: 4
- RFC 2409: 5
- RFC 2616: 1
- RFC 2631: 3
- RFC 2661: 1
- RFC 2716: 1
- RFC 2821: 1
- RFC 2865: 1
- RFC 3193: 1
- RFC 3526: 4
- RFC 3947: 1
- RFC 3948: 1
- RFC 5114: 4
- RFC 792: 1
- RFC0854: 1
- RFC0959: 2
- RFC1305: 2
- RFC1334: 2
- RFC1777: 1
- RFC1778: 1
- RFC1994: 1
- RFC2104: 1
- RFC2246: 3
- RFC2284: 1
- RFC2401: 2
- RFC2404: 1
- RFC2406: 1
- RFC2409: 2
- RFC2616: 1
- RFC2631: 1
- RFC2661: 2
- RFC2716: 2
- RFC2821: 2
- RFC2865: 1
- RFC3193: 2
- RFC3526: 1
- RFC3947: 2
- RFC3948: 2
- RFC5114: 1
|
- CC:
- CCMB-2012-09-001: 3
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- CCMB-2012-09-004: 2
- FIPS:
- FIPS 180-4: 1
- FIPS 197: 2
- ISO:
- ISO/IEC 7816: 4
- ISO/IEC 7816-3: 2
- ISO/IEC 9797-1: 1
- NIST:
- NIST SP 800-38B: 1
- NIST SP 800-67: 2
- RFC:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- out of scope: 1
- statements of SPD, security objectives and security requirements of the optional packages are out of scope. 4.5.1 TOE type consistency The TOE type is smart card without the application named as a whole: 1
|
pdf_data/st_metadata |
- /Author: Nir Naaman
- /Classification: NoClassification
- /ClassificationDisplay: [No Classification] 3rd party or non-work related
- /ClassificationEntries: 1
- /Classification_1: XXZreXVmd3RXZVBjf2p2ZW5tSmiViG85JnSLg4qHOyyVISYkIICLnUSCjZNLMSgnUihEXw==
- /Company: Check Point Software Technologies Ltd.
- /CreationDate: D:20121127171748+02'00'
- /Creator: Acrobat PDFMaker 7.0.5 for Word
- /Keywords: Information flow control, firewall, proxy server, traffic filter, remote access, VPN, SSL VPN, IPSec, IPS, intrusion detection
- /ModDate: D:20121127171854+02'00'
- /OS: Check Point SecurePlatform
- /Producer: Acrobat Distiller 7.0.5 (Windows)
- /Revision: 1.2
- /Subject: Security Target
- /TOE: Check Point Software Blades R7x
- /Title: Software Blades
- /cp_sk: sk77840
- /cp_version: R7x
- /documentDate: 11/8/2012
- /longDate: November 8, 2012
- /lqminfo: 4
- /lqmsess: 1e390c24-5a22-474b-a7d8-73e646d7bb31
- /smartconsole_version: R71
- pdf_file_size_bytes: 1383207
- pdf_hyperlinks: http://www.checkpoint.com/3rd_party_copyright.html, http://www.checkpoint.com/copyright.html
- pdf_is_encrypted: False
- pdf_number_of_pages: 173
|
- /Author: Thomas HOFFMANN, Agnes DILLER, Sebastian BOND
- /CreationDate: D:20161206164752+01'00'
- /Creator: Microsoft® Word 2010
- /Keywords: Security Target Morpho MORPHO_HC_GERMANY_G2_COS COS
- /ModDate: D:20161206164752+01'00'
- /Producer: Microsoft® Word 2010
- /Subject: SECURITY TARGET LITE MORPHO_HC_GERMANY_G2_COS V1
- /Title: SECURITY TARGET LITE MORPHO_HC_GERMANY_G2_COS V1
- pdf_file_size_bytes: 1471239
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 185
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |