name |
Thales e-Security Datacryptor SONET/SDH Release 4.0 with Element Manager and Thales e-Security Datacryptor Gigabit Ethernet Release 4.0 with Element Manager |
Sensor 2185 (KITAS 4.0) Revision 1.2 |
category |
Data Protection |
Other Devices and Systems |
scheme |
US |
DE |
status |
archived |
active |
not_valid_after |
20.07.2012 |
10.02.2028 |
not_valid_before |
07.04.2009 |
10.02.2023 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1131V2c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10189-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1131V2a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10189-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1131V2b_pdf.pdf |
manufacturer |
Thales e-Security, Inc |
Continental Automotive GmbH |
manufacturer_web |
https://www.thalesesec.com/ |
https://www.continental-corporation.com |
security_level |
EAL3 |
AVA_VAN.5, ATE_DPT.2, EAL4+ |
dgst |
2ae410f409210812 |
60c10aab596df368 |
heuristics/cert_id |
CCEVS-VR-VID-10189-2009 |
BSI-DSZ-CC-1131-V2-2023 |
heuristics/cert_lab |
US |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
AVA_MSU.1, AGD_ADM.1, ATE_COV.2, ADV_FSP.1, AVA_VLA.1, ATE_DPT.1, AGD_USR.1, ATE_IND.2, ALC_DVS.1, AVA_SOF.1, ADV_RCR.1, ATE_FUN.1, ADV_HLD.2 |
ADV_IMP.1, AVA_VAN.5, ADV_ARC.1, ADV_FSP.4, ATE_IND.2, AGD_PRE.1, ALC_CMC.4, AGD_OPE.1, ASE_REQ.2, ASE_ECD.1, ASE_OBJ.2, ASE_SPD.1, ATE_COV.2, ADV_TDS.3, ASE_INT.1, ASE_TSS.1, ALC_DEL.1, ALC_DVS.1, ALC_TAT.1, ASE_CCL.1, ATE_DPT.2, ALC_LCD.1, ATE_FUN.1, ALC_CMS.4 |
heuristics/extracted_versions |
4.0 |
1.2, 4.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-1131-2020, ANSSI-CC-2020/24 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
ANSSI-CC-2015/80, ANSSI-CC-2015/36, ANSSI-CC-2016/33, BSI-DSZ-CC-1131-2020, ANSSI-CC-2020/24, ANSSI-CC-2017/73, BSI-DSZ-CC-1070-2018, ANSSI-CC-2017/02, ANSSI-CC-2014/46, BSI-DSZ-CC-1111-2019 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
6c86fb8f2b708f67 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0093b_pdf.pdf |
pdf_data/cert_filename |
|
1131V2c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1131-V2-2023: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL 4 augmented: 1
- EAL 5: 1
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Subject: digital tachograph
- /Title: Certification Report BSI-DSZ-CC-1131-V2-2023
- pdf_file_size_bytes: 290843
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
st_vid10189-vr.pdf |
1131V2a_pdf.pdf |
pdf_data/report_frontpage |
- DE:
- US:
- cert_id: CCEVS-VR-VID10189-2009
- cert_item: Thales e-Security Datacryptor SONET/SDH with Element Manager and Gigabit Ethernet with Element Manager
- cert_lab: US NIAP
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ATE_DPT.2 and AVA_VAN.5
- cc_version: PP conformant Common Criteria Part 2 conformant
- cert_id: BSI-DSZ-CC-1131-V2-2023
- cert_item: Sensor 2185 (KITAS 4.0), Revision 1.2
- cert_lab: BSI
- developer: Continental Automotive GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Digital Tachograph - Motion Sensor (MS PP) Version 1.0, 9 May 2017, BSI-CC-PP-0093-2017
- US:
|
pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10189-2009: 1
|
- DE:
- BSI-DSZ-CC-1131-2020: 3
- BSI-DSZ-CC-1131-V2-2023: 14
- FR:
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0093-2017: 1
- BSI-CC-PP-0093-2017: 3
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 2: 3
- EAL 4: 5
- EAL 4 augmented: 3
- EAL 5: 4
- EAL 5+: 1
- EAL 6: 1
|
pdf_data/report_keywords/cc_sar |
|
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR: 2
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ATE:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- T:
- T.ASSUME_ID_PKI_VER: 1
- T.ATTACK: 1
- T.COMP_MANAGE: 1
- T.MISCONFIG: 1
- T.NO_ACCOUNT: 1
- T.NO_DETECT: 1
- T.SEC_BYPASS_DC: 1
- T.SEC_BYPASS_EM: 1
- T.UNTRUSTED_PATH: 1
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- DeutscheTelekom:
- Deutsche Telekom Security: 3
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2005-08-001: 1
- CCMB-2005-08-002: 1
- CCMB-2005-08-003: 1
- CCMB-2005-08-004: 1
|
- BSI:
- AIS 20: 1
- AIS 25: 2
- AIS 26: 2
- AIS 31: 1
- AIS 32: 1
- AIS 34: 3
- AIS 35: 2
- AIS 36: 2
- AIS 38: 1
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- ASTIAM2 Surv 2021 / ST33G1M2A1, THALES COMMUNICATIONS & SECURITY SAS, Revision 2.0, 2022-03-11(confidential document) [16] Commission Implementing Regulation (EU) 2016/799, 18.03.2016, implementing Regulation (EU) No: 1
- Deutsche Telekom Security GmbH, (confidential document) [8] Digital Tachograph - Motion Sensor (MS PP) Version 1.0, 9 May 2017, BSI-CC-PP- 0093-2017 [9: 1
- TOE, Version 1.42, Date 24.03.2022, Developer_2185R1.BL.0467.ConfigurationListHom, Continental AG (confidential document) [11] Guidance documentation for the TOE, Version 2.3, Date 18.05.2022: 1
- Version 1.30, Date 05.04.2022, Sensor 2185 (KITAS 4.0) Security Target, Continental AG (confidential document) [7] Evaluation Technical Report, Version 2.1, Date 08.02.2023, Evaluation Technical Report: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
|
pdf_data/report_metadata |
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Keywords: "Common Criteria, Certification, Zertifizierung, motion sensor, Continental"
- /Subject: Common Criteria, Certification, Zertifizierung, motion sensor, Continental
- /Title: Certification Report BSI-DSZ-CC-1131-V2-2023
- pdf_file_size_bytes: 571735
- pdf_hyperlinks: https://www.sogis.eu/, http://www.commoncriteriaportal.org/, http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/AIS, https://www.commoncriteriaportal.org/, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 22
|
pdf_data/st_filename |
st_vid10189-st.pdf |
1131V2b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL4: 16
- EAL4 augmented: 5
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_CAP.3: 2
- ACM_SCP.1: 2
- ADO:
- ADO_DEL.1: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP.1: 2
- ADV_HLD.2: 2
- ADV_RCR.1: 2
- AGD:
- AGD_ADM.1: 2
- AGD_USR.1: 2
- ALC:
- ATE:
- ATE_COV.2: 2
- ATE_DPT.1: 2
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
- AVA_MSU.1: 2
- AVA_SOF.1: 2
- AVA_VLA.1: 2
|
- ADV:
- ADV_ARC.1: 3
- ADV_FSP.4: 2
- ADV_IMP.1: 2
- ADV_TDS.3: 3
- AGD:
- AGD_OPE.1: 2
- AGD_PRE: 1
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 9
- ATE_FUN.1: 2
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_ARP.1: 1
- FAU_GEN: 11
- FAU_GEN.1: 3
- FAU_SAR.1: 10
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FCS:
- FCS_CKM.1: 14
- FCS_CKM.1.1: 1
- FCS_CKM.2: 3
- FCS_CKM.4: 15
- FCS_CKM.4.1: 1
- FCS_COP.1: 16
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 3
- FDP_DIG_SIG: 1
- FDP_IFC.1: 18
- FDP_IFC.1.1: 1
- FDP_IFF: 12
- FDP_IFF.1: 7
- FDP_ITC.1: 2
- FDP_ITC.2: 2
- FDP_UCT.1: 10
- FDP_UCT.1.1: 1
- FIA:
- FIA_SOS.1: 12
- FIA_SOS.1.1: 1
- FIA_UAU.2: 12
- FIA_UAU.2.1: 1
- FIA_UID.1: 3
- FMT:
- FMT_MOF.1: 10
- FMT_MOF.1.1: 1
- FMT_MSA.1: 11
- FMT_MSA.1.1: 1
- FMT_MSA.2: 12
- FMT_MSA.2.1: 1
- FMT_MSA.3: 10
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 10
- FMT_MTD.1.1: 1
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR.1: 13
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_ITT.1: 8
- FPT_ITT.1.1: 1
- FPT_RVM: 5
- FPT_RVM.1: 13
- FPT_RVM.1.1: 1
- FPT_RVM_SFT: 2
- FPT_RVM_SFT.1: 10
- FPT_RVM_SFT.1.1: 1
- FPT_SEP: 6
- FPT_SEP.1: 13
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_SEP_SFT.1: 12
- FPT_SEP_SFT.1.1: 1
- FPT_SEP_SFT.1.2: 1
- FPT_STM.1: 11
- FPT_STM.1.1: 1
- FTP:
- FTP_ITC.1: 1
- FTP_TRP.1: 1
|
- FAU:
- FAU_GEN: 2
- FAU_GEN.1: 12
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR: 2
- FAU_SAR.1: 6
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_STG: 2
- FAU_STG.1: 7
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 4
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM: 4
- FCS_CKM.1: 8
- FCS_CKM.4: 26
- FCS_CKM.4.1: 2
- FCS_COP: 4
- FCS_COP.1: 18
- FCS_COP.1.1: 2
- FDP:
- FDP_ACC: 2
- FDP_ACC.1: 24
- FDP_ACC.1.1: 2
- FDP_ACF: 2
- FDP_ACF.1: 14
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_ETC: 2
- FDP_ETC.1: 8
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_ETC.2: 5
- FDP_ETC.2.1: 1
- FDP_ETC.2.2: 1
- FDP_ETC.2.3: 1
- FDP_ETC.2.4: 1
- FDP_IFC.1: 6
- FDP_ITC: 2
- FDP_ITC.1: 21
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 8
- FDP_SDI: 2
- FDP_SDI.1: 1
- FDP_SDI.2: 9
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FIA:
- FIA_AFL: 2
- FIA_AFL.1: 5
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD: 2
- FIA_ATD.1: 5
- FIA_ATD.1.1: 1
- FIA_UAU: 6
- FIA_UAU.1: 6
- FIA_UAU.2: 24
- FIA_UAU.2.1: 2
- FIA_UAU.3: 12
- FIA_UAU.3.1: 1
- FIA_UAU.3.2: 1
- FIA_UID: 2
- FIA_UID.1: 7
- FIA_UID.2: 13
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF.1: 6
- FMT_MSA.3: 6
- FPR:
- FPT:
- FPT_DTC: 4
- FPT_FLS: 2
- FPT_FLS.1: 5
- FPT_FLS.1.1: 1
- FPT_PHP: 2
- FPT_PHP.1: 2
- FPT_PHP.2: 16
- FPT_PHP.2.1: 2
- FPT_PHP.2.2: 4
- FPT_PHP.2.3: 8
- FPT_PHP.3: 19
- FPT_PHP.3.1: 2
- FPT_STM: 2
- FPT_STM.1: 9
- FPT_STM.1.1: 1
- FPT_TDC.1: 18
- FPT_TDC.1.1: 2
- FPT_TDC.1.2: 2
- FPT_TST: 2
- FPT_TST.1: 9
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FRU:
- FRU_PRS: 2
- FRU_PRS.1: 8
- FRU_PRS.1.1: 1
- FRU_PRS.1.2: 1
- FTP:
- FTP_ITC: 2
- FTP_ITC.1: 7
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ENVIRON: 3
- A.NETWORK: 3
- A.NOEVIL: 3
- A.TYPE: 2
- O:
- O.AUDIT_GEN: 7
- O.CONFIDENTIALITY: 3
- O.SECURE_ACCESS: 7
- O.SECURE_COMM: 3
- O.SECURE_KEY: 6
- O.SELF_PROTECT_DC: 1
- O.SELF_PROTECT_EM: 6
- O.SIG_VERIFY: 3
- OE:
- T:
- T.ASSUME_ID_PKI_VER: 3
- T.ATTACK: 3
- T.COMP_MANAGE: 3
- T.MISCONFIG: 3
- T.NO_ACCOUNT: 3
- T.NO_DETECT: 3
- T.SEC_BYPASS_DC: 3
- T.SEC_BYPASS_EM: 3
- T.TYPE: 2
- T.UNTRUSTED_PATH: 3
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
- KA:
- Key Agreement: 3
- Key agreement: 2
- KEX:
- MAC:
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- malfunction: 1
- physical tampering: 19
- other:
- JIL: 1
- reverse engineering: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140-2: 3
- FIPS 180-2: 1
- FIPS 186-2: 2
- FIPS 197: 2
- X509:
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- FIPS PUB 197: 4
- FIPS PUB 46-3: 5
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- The SOF for these mechanism is SOF-Basic. The following functions are cryptographic and thus are out of scope for Strength of Function in this Security Target: • Cryptographic support o FCS_COP.1 –: 1
- out of scope: 1
|
- OutOfScope:
- Out of scope: 4
- by the motion sensor manufacturer; stored in motion sensor at the end of the manufacturing phase Out of scope for this ST Made unavailable when the motion sensor has reached end of life. Motion sensor: 2
- the motion sensor in operational phase AES Generated by the VU during pairing to the motion sensor Out of scope for this ST Made unavailable when the motion sensor is paired to another (or the same) vehicle unit: 1
- the motion sensor in operational phase TDES Generated by the VU during pairing to the motion sensor Out of scope for this ST Made unavailable when the motion sensor is paired to another (or the same) vehicle unit: 1
|
pdf_data/st_metadata |
- /Author: Apex Assurance Group
- /Company: Apex Assurance Group
- /CreationDate: D:20090512080427-04'00'
- /Creator: Acrobat PDFMaker 6.0 for Word
- /ModDate: D:20090512080600-04'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /SourceModified: D:20090512120257
- /Subject: Thales Datacryptor SONET/SDH
- /Title: Security Target for Common Criteria Evaluation
- pdf_file_size_bytes: 966891
- pdf_hyperlinks: http://www.thales-esecurity.com/, http://www.apexassurance.com/
- pdf_is_encrypted: False
- pdf_number_of_pages: 61
|
- /Author: Dr. Marion Grüner, Norbert Köhn, Continental Automotive GmbH
- /Keywords: Digital, Tachograph, Sensor, 2185, Release, 1.20, Motion, Sensor
- /Subject: Security Target Lite Sensor 2185 Rel.1.20
- /Title: Microsoft Word - 2185R1.HOM.0486.SecurityTarget_Lite_1_30
- pdf_file_size_bytes: 1542563
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 60
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |