| name |
IBM MaaS360 v2.9 Cloud Extender |
Ornet Neuron version 1.2.2 |
| category |
Other Devices and Systems |
Other Devices and Systems |
| scheme |
US |
MY |
| status |
archived |
archived |
| not_valid_after |
14.06.2020 |
26.03.2017 |
| not_valid_before |
14.06.2018 |
26.03.2012 |
| cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10896-ci.pdf |
|
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10896-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C032-CR-v1a.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10896-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ORNET%20EAL1%20Security%20Target%20(ORNET%20Neuron)%20v1.1.pdf |
| manufacturer |
IBM Corporation |
Ornet Solutions Sdn Bhd |
| manufacturer_web |
https://www.ibm.com |
https://www.ornetsol.com |
| security_level |
{} |
EAL1 |
| dgst |
2c0dc37a32bccf79 |
ad39584628fe796c |
| heuristics/cert_id |
CCEVS-VR-10896-2018 |
ISCB-5-RPT-C032-CR-v1a |
| heuristics/cert_lab |
US |
[] |
| heuristics/cpe_matches |
cpe:2.3:a:ibm:maas360:-:*:*:*:*:*:*:* |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
CVE-2020-4353 |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ASE_CCL.1, AGD_PRE.1, AVA_VAN.1, ALC_CMC.1, ASE_SPD.1, AGD_OPE.1, ALC_CMS.2, ATE_IND.1, ASE_INT.1, ASE_ECD.1, ASE_OBJ.1, ASE_REQ.1, ASE_TSS.1, ALC_TSU_EXT.1, ADV_FSP.1 |
ASE_CCL.1, AGD_PRE.1, ALC_CMC.1, AGD_OPE.1, ATE_IND.1, ASE_INT.1, ASE_ECD.1, ASE_OBJ.1, ASE_REQ.1, ALC_CMS.1, ASE_TSS.1, AVA_VAN.1, ADV_FSP.1 |
| heuristics/extracted_versions |
2.9 |
1.2.2 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
{} |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
{} |
| heuristics/scheme_data |
- api_url: https://www.niap-ccevs.org/api/project/product/pcl_products/10896/
- categories: ['Application Software']
- category: Application Software
- certification_date: 14.06.2018
- evaluation_facility: atsec information security corporation
- expiration_date: 14.06.2020
- id: CCEVS-VR-VID10896
- product: IBM MaaS360 v2.9 Cloud Extender
- scheme: US
- url: https://www.niap-ccevs.org/products/10896
- vendor: IBM Corporation
|
- cert_no: 2012-004-C032
- certification_date: 26.03.2012
- developer: Ornet Solutions Sdn Bhd
- enhanced:
- assurance_level: EAL1
- category: Other Devices and Systems
- cert_id: C032
- certification_date: 26.03.2012
- developer: Murugan Kandiah Suite 19, Incubator Wing, 1st Floor,Techno Centre, Kulim Hi-Tech Park,09000 Kulim, Kedah,MALAYSIA URL: http://www.ornetsol.comEmail: [email protected]: +60 (4) 408 0000Fax: +60 (4) 408 0000
- expiration_date: 26.03.2017
- mutual_recognition: CCRA
- product: Ornet Neuron version 1.2.2
- report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C032/ISCB-5-RPT-C032-CR-v1a.pdf
- scope: The Target of Evaluation (TOE), Ornet Neuron version 1.2.2 is a web based application that allows users to monitor the performance of machines used in semiconductor and electronic manufacturing factories. The TOE is software that comprises of: Failure Mode and Effect Analysis (FMEA), a module designed to send and receive failure mode immediately and screened in the spreadsheet. Machine Performance Analyzer (MPA), a module where user used to view reports according to the search selection using the MPA interface. Statistical Process Control (SPC), is intended to help user to do data entry and generate report based on their entry. Tool Life Scheduling (TLS), comes with various maintenance tasks such as preventive maintenance, tasks scheduling, tasks reminder, shutdown planning. There are also other tasks included such as inspection, lubrication, parts change and servicing. Reject Analysis (RA), is a module designed to track and monitor rejects in the production area. User can do data entry and generate reports. The evaluated security functionalities for TOE includes: Access control - The TOE manages access control based on user IDs, user roles and access control lists. Identification and Authentication – The TOE requires that each user is successfully identified (User ID) and authenticated (password) before they are allowed to perform any action on the TOE. Security Management - The TOE provides functions that allow management of the TOE and its security functions.
- status: Archive
- target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C032/ORNET%20EAL1%20Security%20Target%20(ORNET%20Neuron)%20v1.1.pdf
- type: Web based application use to monitor the performance of machines used in semiconductor and electronic manufacturing factories.
- expiration_date: 26.03.2017
- level: EAL1
- product: Ornet Neuron version 1.2.2
- recognition: CCRA
- url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/150
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
1aeebf1c5963b606 |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_app_v1.2.pdf |
{} |
| pdf_data/cert_filename |
st_vid10896-ci.pdf |
|
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10896-2018: 1
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
- /CreationDate: D:20180622120102-04'00'
- /ModDate: D:20180622120102-04'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 182323
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
| pdf_data/report_filename |
st_vid10896-vr.pdf |
ISCB-5-RPT-C032-CR-v1a.pdf |
| pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-10896-2018
- cert_item: IBM MaaS360 v2.91 Cloud Extender
- cert_lab: US NIAP
|
|
| pdf_data/report_keywords/cc_cert_id |
|
- MY:
- ISCB-5-RPT-C032-CR-v1a: 27
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
|
| pdf_data/report_keywords/cc_sar |
|
|
| pdf_data/report_keywords/cc_sfr |
|
- FDP:
- FDP_ACC.1: 1
- FDP_ACF.1: 1
- FIA:
- FIA_UAU.2: 1
- FIA_UID.2: 1
- FMT:
- FMT_MSA: 1
- FMT_MSA.3: 1
- FMT_MSA.3.1: 1
- FMT_MTD: 1
- FMT_SMF.1: 1
- FMT_SMR.1: 1
|
| pdf_data/report_keywords/cc_claims |
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
- SCA:
- side channel: 1
- timing attack: 1
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
|
- ISO:
- ISO/IEC 18045: 2
- ISO/IEC15408: 2
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
|
- /Author: ISCB Department
- /Category: PUBLIC
- /Company: CyberSecurity Malaysia
- /CreationDate: D:20120327120620+08'00'
- /Creator: Acrobat PDFMaker 8.1 for Word
- /Keywords: C032 Ornet Neuron
- /ModDate: D:20120327120635+08'00'
- /Producer: Acrobat Distiller 8.1.0 (Windows)
- /SourceModified: D:20120327040558
- /Subject: Ornet Neuron Version 1.2.2
- /Title: C032 Certification Report
- pdf_file_size_bytes: 338474
- pdf_hyperlinks: mailto:[email protected], http://www.cybersecurity.my/mycc
- pdf_is_encrypted: True
- pdf_number_of_pages: 27
|
| pdf_data/st_filename |
st_vid10896-st.pdf |
ORNET EAL1 Security Target (ORNET Neuron) v1.1.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
|
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 12
- AGD_PRE: 1
- AGD_PRE.1: 8
- ALC:
- ALC_CMC.1: 6
- ALC_CMS.1: 3
- ALC_CMS.2: 4
- ALC_TSU_EXT.1: 10
- ASE:
- ASE_CCL.1: 16
- ASE_ECD.1: 12
- ASE_INT.1: 14
- ASE_OBJ.1: 6
- ASE_REQ.1: 12
- ASE_SPD.1: 9
- ASE_TSS.1: 7
- ATE:
- AVA:
|
- ADV:
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.1: 2
- ALC_CMS.1: 2
- ASE:
- ASE_CCL: 2
- ASE_CCL.1: 2
- ASE_ECD.1: 2
- ASE_INT: 2
- ASE_INT.1: 2
- ASE_OBJ: 2
- ASE_OBJ.1: 2
- ASE_REQ: 2
- ASE_REQ.1: 2
- ASE_TSS: 2
- ASE_TSS.1: 2
- ATE:
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM: 1
- FCS_CKM.1: 12
- FCS_CKM.1.1: 5
- FCS_CKM.2: 6
- FCS_CKM.2.1: 1
- FCS_CKM_EXT.1: 4
- FCS_CKM_EXT.1.1: 1
- FCS_COP.1: 26
- FCS_COP.1.1: 5
- FCS_RBG_EXT.1: 16
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.2: 6
- FCS_RBG_EXT.2.1: 1
- FCS_RBG_EXT.2.2: 1
- FCS_STO_EXT.1: 8
- FCS_STO_EXT.1.1: 1
- FCS_TLSC_EXT: 1
- FCS_TLSC_EXT.1: 19
- FCS_TLSC_EXT.1.1: 1
- FCS_TLSC_EXT.1.2: 2
- FCS_TLSC_EXT.1.3: 2
- FCS_TLSC_EXT.4: 13
- FCS_TLSS_EXT.1: 1
- FCS_TLSS_EXT.1.1: 3
- FDP:
- FDP_DAR_EXT.1: 9
- FDP_DAR_EXT.1.1: 1
- FDP_DEC_EXT.1: 6
- FDP_DEC_EXT.1.1: 1
- FDP_DEC_EXT.1.2: 2
- FDP_NET_EXT.1: 5
- FDP_NET_EXT.1.1: 1
- FMT:
- FMT_CFG_EXT.1: 6
- FMT_CFG_EXT.1.1: 1
- FMT_CFG_EXT.1.2: 1
- FMT_MEC_EXT.1: 8
- FMT_MEC_EXT.1.1: 1
- FMT_SMF.1: 7
- FMT_SMF.1.1: 1
- FPR:
- FPR_ANO_EXT.1: 6
- FPR_ANO_EXT.1.1: 1
- FPT:
- FPT_AEX_EXT.1: 8
- FPT_AEX_EXT.1.1: 1
- FPT_AEX_EXT.1.2: 1
- FPT_AEX_EXT.1.3: 1
- FPT_AEX_EXT.1.4: 1
- FPT_AEX_EXT.1.5: 1
- FPT_API_EXT.1: 5
- FPT_API_EXT.1.1: 2
- FPT_LIB_EXT.1: 9
- FPT_TUD_EXT.1: 6
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FPT_TUD_EXT.1.4: 1
- FPT_TUD_EXT.1.5: 2
- FPT_TUD_EXT.1.6: 1
- FTP:
- FTP_DIT_EXT.1: 12
- FTP_DIT_EXT.1.1: 2
|
- FDP:
- FDP_ACC.1: 10
- FDP_ACC.1.1: 1
- FDP_ACF.1: 5
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FDP_IFF: 2
- FIA:
- FIA_UAU.1: 1
- FIA_UAU.2: 4
- FIA_UAU.2.1: 1
- FIA_UID.1: 4
- FIA_UID.2: 5
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA.1: 6
- FMT_MSA.1.1: 1
- FMT_MSA.3: 7
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 10
- FMT_SMF.1: 13
- FMT_SMF.1.1: 1
- FMT_SMR.1: 12
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.PLATFORM: 1
- A.PROPER_ADMIN: 1
- A.PROPER_USER: 1
- O:
- O.INTEGRITY: 1
- O.MANAGEMENT: 1
- O.PROTECTED_COMMS: 1
- O.PROTECTED_STORAGE: 1
- O.QUALITY: 1
- OE:
- OE.PLATFORM: 1
- OE.PROPER_ADMIN: 1
- OE.PROPER_USER: 1
- T:
- T.LOCAL_ATTACK: 1
- T.NETWORK_ATTACK: 1
- T.NETWORK_EAVESDROP: 1
- T.PHYSICAL_ACCESS: 1
|
- OE:
- OE.ADMIN: 1
- OE.COMMS: 1
- OE.DATABASE: 1
- OE.ENVIRONMENT: 1
- OE.MANAGEMENT: 1
- OE.PHYSICAL: 1
|
| pdf_data/st_keywords/vendor |
- Microsoft:
- Microsoft: 19
- Microsoft Corporation: 1
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 13
- AES-128: 1
- AES-256: 1
- AES256: 1
- RC:
- constructions:
- MAC:
- CBC-MAC: 1
- HMAC: 3
- HMAC-SHA-256: 2
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
- MD:
- SHA:
- SHA1:
- SHA2:
- SHA-256: 17
- SHA-384: 15
- SHA256: 5
- SHA384: 4
- SHA512: 1
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
- PGP:
- TLS:
- SSL:
- TLS:
- TLS: 46
- TLS 1.2: 10
- TLS1.2: 1
- VPN:
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 22
- P-384: 22
- secp256r1: 5
- secp384r1: 5
- secp512r1: 1
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 4
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 4
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 4
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 4
- TLS_RSA_WITH_AES_128_CBC_SHA: 4
- TLS_RSA_WITH_AES_128_CBC_SHA256: 4
- TLS_RSA_WITH_AES_256_CBC_SHA256: 4
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140-2: 1
- FIPS 180-4: 4
- FIPS 186-4: 8
- FIPS 197: 3
- FIPS 198-1: 2
- FIPS PUB 186-4: 11
- NIST:
- NIST SP 800-38A: 1
- NIST SP 800-38D: 1
- NIST SP 800-56A: 1
- NIST SP 800-56B: 1
- NIST SP 800-57: 1
- NIST SP 800-90A: 2
- SP 800-108: 1
- SP 800-135: 1
- SP 800-38D: 2
- SP 800-56B: 2
- SP 800-90A: 1
- PKCS:
- RFC:
- RFC 2818: 4
- RFC 5246: 12
- RFC 5280: 5
- RFC 5289: 16
- RFC 5759: 2
- RFC 6125: 2
- RFC5280: 1
- RFC5759: 1
- X509:
|
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
|
| pdf_data/st_metadata |
- /Author: atsec information security
- /Category:
- /Comments:
- /Company: atsec
- /CreationDate: D:20180529145447Z
- /Creator: Acrobat PDFMaker 15 for Word
- /Keywords: pp_app_v1.2
- /Manager:
- /ModDate: D:20180529095624-05'00'
- /Name: IBM MaaS360 Cloud Extender Security Target
- /Producer: Adobe PDF Library 15.0
- /SourceModified: D:20180529145445
- /Subject:
- /Title: IBM MaaS360 v2.91 Cloud Extender Security Target
- /Version: 1.2.2
- /pp_app_V1.2_date: 22 April, 2016
- /pp_md_date: 10 June, 2016
- pdf_file_size_bytes: 800942
- pdf_hyperlinks: https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=181, https://www.ibm.com/developerworks/community/wikis/home?lang=en#%21/wiki/W0dcb4f3d0760_48cd_9026_a90843b9da06/page/2017%20MaaS360%20Release%20Announcements, https://csrc.nist.gov/Projects/Cryptographic-Algorithm-Validation-Program/Validation/Validation-List/KAS#47, https://csrc.nist.gov/Projects/Cryptographic-Algorithm-Validation-Program/Validation/Validation-List/RSA#1493, https://csrc.nist.gov/Projects/Cryptographic-Algorithm-Validation-Program/Validation/Validation-List/SHS#4311, https://www.niap-ccevs.org/pp/pp_app_v1.2.htm#FCS_COP.1.1(4), https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=311, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=167, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=247, https://csrc.nist.gov/Projects/Cryptographic-Algorithm-Validation-Program/Validation/Validation-List/HMAC#1773, https://csrc.nist.gov/Projects/Cryptographic-Algorithm-Validation-Program/Validation/Validation-List/AES#2832, http://www.lua.org/, http://www.ibm.com/legal/copytrade.shtml, https://csrc.nist.gov/Projects/Cryptographic-Algorithm-Validation-Program/Validation/Validation-List/AES#2853, https://www-03.ibm.com/security/secure-engineering/bulletins.html, https://www.niap-ccevs.org/pp/pp_app_v1.2.htm#abbr_TSS, javascript:toggle('aactID-idp1012880',%20'link-aactID-idp1012880');, https://www.niap-ccevs.org/pp/pp_app_v1.2.htm#FPR_ANO_EXT.1.1, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=176, https://www.niap-ccevs.org/pp/pp_app_v1.2.htm#FCS_COP.1.1(1), https://csrc.nist.gov/Projects/Cryptographic-Algorithm-Validation-Program/Validation/Validation-List/DSA#1387, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=122, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=289, https://csrc.nist.gov/Projects/Cryptographic-Algorithm-Validation-Program/Validation/Validation-List/AES#3903, https://www.niap-ccevs.org/pp/pp_app_v1.2.htm#FCS_TLSC_EXT.4.1, https://csrc.nist.gov/Projects/Cryptographic-Algorithm-Validation-Program/Validation/Validation-List/AES#5369, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=110, https://www.flexerasoftware.com/, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=306, https://www.ibm.com/support/knowledgecenter/en/SS8H2S/com.ibm.mc.doc/ce_source/references/ce_architecture.htm, https://www.niap-ccevs.org/Profile/Info.cfm?PPID=394&id=394, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=274, https://csrc.nist.gov/Projects/Cryptographic-Algorithm-Validation-Program/Validation/Validation-List/RSA#1487, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=178, http://maas360.com/, https://www.niap-ccevs.org/pp/pp_app_v1.2.htm#FCS_CKM.2.1, https://csrc.nist.gov/Projects/Cryptographic-Algorithm-Validation-Program/Validation/Validation-List/RSA#1519, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=250, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=273, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=302, http://maas-central.maas360.com/, https://dotnetzip.codeplex.com/, https://www.niap-ccevs.org/pp/pp_app_v1.2.htm#FCS_CKM_EXT.1.1, https://github.com/mcschroeder/lua-5.2.0-special/blob/master/src/lbitlib.c, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=299, https://csrc.nist.gov/Projects/Cryptographic-Algorithm-Validation-Program/Validation/Validation-List/ECDSA#1416, https://www.niap-ccevs.org/pp/pp_app_v1.2.htm#abbr_PII, http://www.ibm.com/, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=124, https://csrc.nist.gov/Projects/Cryptographic-Algorithm-Validation-Program/Validation/Validation-List/DRBG#489, https://www.niap-ccevs.org/st/st_vid10686-agd.pdf, https://csrc.nist.gov/CSRC/media/Projects/Cryptographic-Module-Validation-Program/documents/fips140-2/FIPS1402IG.pdf, http://www.commoncriteriaportal.org/files/epfiles/st_windows10.pdf, https://csrc.nist.gov/Projects/Cryptographic-Algorithm-Validation-Program/Validation/Validation-List/SHS#2396, https://www.niap-ccevs.org/pp/pp_app_v1.2.htm#FMT_SMF.1.1, https://csrc.nist.gov/Projects/Cryptographic-Algorithm-Validation-Program/Validation/Validation-List/RSA#1494, https://csrc.nist.gov/Projects/Cryptographic-Algorithm-Validation-Program/Validation/Validation-List/HMAC#3557, https://csrc.nist.gov/Projects/Cryptographic-Algorithm-Validation-Program/Validation/Validation-List/AES#2848, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=310, https://csrc.nist.gov/Projects/Cryptographic-Algorithm-Validation-Program/Validation/Validation-List/DRBG#2078, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=301, https://csrc.nist.gov/Projects/Cryptographic-Algorithm-Validation-Program/Validation/Validation-List/SHS#2373, https://csrc.nist.gov/Projects/Cryptographic-Algorithm-Validation-Program/Validation/Validation-List/KDF#30, https://www.niap-ccevs.org/pp/pp_app_v1.2.htm#abbr_API, https://www.ibm.com/support/knowledgecenter/en/SS8H2S/com.ibm.mc.doc/ce_source/concepts/ce_kc_container.htm, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=226, https://www.niap-ccevs.org/Product/CompliantCC.cfm?CCID=2016.1052, https://www.niap-ccevs.org/MMO/GD/Interim%20OS%20Tech%20Decision%20v4.pdf, https://www.niap-ccevs.org/pp/pp_app_v1.2.htm#FPT_API_EXT.1.1, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=220, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=222, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=196, https://csrc.nist.gov/Projects/Cryptographic-Algorithm-Validation-Program/Validation/Validation-List/Component#323, https://csrc.nist.gov/Projects/Cryptographic-Algorithm-Validation-Program/Validation/Validation-List/ECDSA#505, https://www.niap-ccevs.org/pp/pp_app_v1.2.htm#FTP_DIT_EXT.1.1, https://csrc.nist.gov/Projects/Cryptographic-Algorithm-Validation-Program/Validation/Validation-List/Component#1836, https://www-03.ibm.com/security/secure-engineering/report.html, https://csrc.nist.gov/Projects/Cryptographic-Algorithm-Validation-Program/Validation/Validation-List/RSA#2872, https://csrc.nist.gov/Projects/Cryptographic-Algorithm-Validation-Program/Validation/Validation-List/DSA#855, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=244, https://msdn.microsoft.com/en-us/library/bb384887.aspx, https://www.niap-ccevs.org/Profile/Info.cfm?id=400, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=134
- pdf_is_encrypted: False
- pdf_number_of_pages: 61
|
- /Author: Mahendra (stratsec)
- /CreationDate: D:20120223131426+08'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20120223131426+08'00'
- /Producer: Microsoft® Word 2010
- /Subject: Security Target
- /Title: ORNET Neuron
- pdf_file_size_bytes: 498400
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 26
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
True |
False |
| state/cert/download_ok |
True |
False |
| state/cert/extract_ok |
True |
False |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |