| name |
MMA10G-IPX Series v3.3 |
Sm@rtCafe Expert Version 5.0 |
| category |
Network and Network-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme |
US |
DE |
| status |
archived |
archived |
| not_valid_after |
10.02.2025 |
01.09.2019 |
| not_valid_before |
10.02.2023 |
17.12.2009 |
| cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11277-ci.pdf |
|
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11277-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0537a_pdf.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11277-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0537b_pdf.pdf |
| manufacturer |
Evertz Microsystems |
G+D Mobile Security GmbH |
| manufacturer_web |
https://www.evertz.com/ |
https://www.gi-de.com/de/de/mobile-security/ |
| security_level |
{} |
EAL4+ |
| dgst |
2c24d4ace2634190 |
b7f131020fc0cf4f |
| heuristics/cert_id |
CCEVS-VR-VID-11277-2023 |
BSI-DSZ-CC-0537-2009 |
| heuristics/cert_lab |
US |
BSI |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ASE_CCL.1, AGD_PRE.1, ALC_CMC.1, ASE_SPD.1, AGD_OPE.1, ATE_IND.1, ASE_INT.1, ASE_ECD.1, ASE_OBJ.1, ASE_REQ.1, ALC_CMS.1, ASE_TSS.1, AVA_VAN.1, ADV_FSP.1 |
ADV_LLD.1, ALC_LCD.1, ALC_TAT.1, ADV_FSP.2, ALC_DVS.2, ADV_IMP.2, AGD_ADM.1, ATE_IND.2, AVA_VLA.4, ADV_RCR.1, ATE_DPT.1, AVA_SOF.1, ADV_HLD.2, AGD_USR.1, ATE_COV.2, ATE_FUN.1, AVA_MSU.3, ADV_SPM.1 |
| heuristics/extracted_versions |
3.3 |
5.0 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0410-2007, BSI-DSZ-CC-0404-2007, BSI-DSZ-CC-0411-2007 |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0410-2007, BSI-DSZ-CC-0404-2007, BSI-DSZ-CC-0411-2007 |
| heuristics/scheme_data |
- api_url: https://www.niap-ccevs.org/api/project/product/pcl_products/11277/
- categories: ['Network Device']
- category: Network Device
- certification_date: 10.02.2023
- evaluation_facility: Acumen Security
- expiration_date: 10.02.2025
- id: CCEVS-VR-VID11277
- product: MMA10G-IPX Series v3.3
- scheme: US
- url: https://www.niap-ccevs.org/products/11277
- vendor: Evertz Microsystems
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0410-2007, BSI-DSZ-CC-0404-2007, BSI-DSZ-CC-0411-2007 |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0410-2007, BSI-DSZ-CC-0404-2007, BSI-DSZ-CC-0411-2007 |
| heuristics/protection_profiles |
89f2a255423f4a20 |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.2E.pdf |
{} |
| pdf_data/cert_filename |
st_vid11277-ci.pdf |
|
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID11277-2023: 1
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
- /CreationDate: D:20230213154258-05'00'
- /ModDate: D:20230213154258-05'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 179835
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
| pdf_data/report_filename |
st_vid11277-vr.pdf |
0537a_pdf.pdf |
| pdf_data/report_frontpage |
- DE:
- US:
- cert_id: CCEVS-VR-VID11277-2023
- cert_item: for the MMA10G-IPX Series, Version 3.3
- cert_lab: US NIAP
|
- DE:
- cert_id: BSI-DSZ-CC-0537-2009
- cert_item: Sm@rtCafe Expert Version 5.0
- cert_lab: BSI
- developer: Giesecke & Devrient GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- US:
|
| pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID11277-2023: 1
|
- DE:
- BSI-DSZ-CC-0404: 1
- BSI-DSZ-CC-0404-2007: 3
- BSI-DSZ-CC-0410: 1
- BSI-DSZ-CC-0410-2007: 3
- BSI-DSZ-CC-0411: 1
- BSI-DSZ-CC-0411-2007: 3
- BSI-DSZ-CC-0537: 3
- BSI-DSZ-CC-0537-2009: 19
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 4: 9
- EAL 4 augmented: 3
- EAL 7: 1
- EAL1: 5
- EAL2: 3
- EAL3: 4
- EAL4: 7
- EAL5: 6
- EAL5+: 1
- EAL6: 3
- EAL7: 4
|
| pdf_data/report_keywords/cc_sar |
|
- ACM:
- ACM_AUT: 2
- ACM_AUT.1: 1
- ACM_CAP: 2
- ACM_CAP.4: 1
- ACM_SCP: 2
- ACM_SCP.2: 1
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 1
- ADO_IGS: 2
- ADO_IGS.1: 1
- ADV:
- ADV_FSP: 2
- ADV_HLD: 2
- ADV_IMP: 2
- ADV_IMP.2: 5
- ADV_INT: 2
- ADV_LLD: 2
- ADV_RCR: 2
- ADV_SPM: 2
- AGD:
- ALC:
- ALC_DVS: 2
- ALC_DVS.1: 1
- ALC_FLR: 2
- ALC_LCD: 1
- ALC_LCD.1: 1
- ALC_TAT: 2
- ALC_TAT.1: 1
- APE:
- APE_DES: 1
- APE_ENV: 1
- APE_INT: 1
- APE_OBJ: 1
- APE_REQ: 1
- APE_SRE: 1
- ASE:
- ASE_DES: 1
- ASE_ENV: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_PPC: 1
- ASE_REQ: 1
- ASE_SRE: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 2
- ATE_DPT: 2
- ATE_FUN: 4
- ATE_IND: 4
- AVA:
- AVA_CCA: 2
- AVA_MSU: 2
- AVA_SOF: 3
- AVA_VLA: 5
- AVA_VLA.2: 1
- AVA_VLA.3: 1
- AVA_VLA.4: 6
|
| pdf_data/report_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 2
- FCS_CKM.2: 2
- FCS_COP: 4
- FCS_RBG_EXT.1: 1
- FCS_TLSC_EXT.1: 6
- FCS_TLSS_EXT.1: 8
- FCS_TLSS_EXT.2: 8
|
|
| pdf_data/report_keywords/cc_claims |
- A:
- A.ADMIN_CREDENTIALS_SECURE: 1
- A.COMPONENTS_RUNNING: 1
- A.LIMITED_FUNCTIONALITY: 1
- A.NO_THRU_TRAFFIC_PROTECTION: 1
- A.PHYSICAL_PROTECTION: 1
- A.REGULAR_UPDATES: 1
- A.RESIDUAL_INFORMATION: 1
- A.TRUSTED_ADMINISTRATOR: 1
- T:
- T.PASSWORD_CRACKING: 1
- T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
- T.SECURITY_FUNCTIONALITY_FAILURE: 1
- T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
- T.UNDETECTED_ACTIVITY: 1
- T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
- T.UPDATE_COMPROMISE: 1
- T.WEAK_AUTHENTICATION_ENDPOINTS: 1
- T.WEAK_CRYPTOGRAPHY: 1
|
- OE:
- OE.APPLET: 1
- OE.NATIVE: 1
- OE.VERIFICATION: 1
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 2
|
| pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- FIPS:
- ISO:
- ISO/IEC 18031:2011: 1
- ISO/IEC 9796-2: 1
- NIST:
- RFC:
|
- BSI:
- AIS 20: 3
- AIS 25: 2
- AIS 26: 2
- AIS 32: 1
- AIS 34: 3
- AIS 35: 2
- AIS 36: 2
- AIS 37: 1
- AIS20: 1
- AIS36: 3
- ISO:
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- 7] Evaluation Technical Report, Version 2, Date: 2009-10-14, BSI-DSZ-CC-0537, TUVIT (confidential document) [8] Configuration list for the TOE, Version 1.4, Date: 2009-08-27, Giesecke & Devrient: 1
- Version 3.0, Status 27.08.2009, Security Target SmartCafe Expert V5.0, Giesecke & Devrient (confidential document) 8 specifically • AIS 20, Version 1, 2 December 1999, Funktionalitätsklassen und: 1
- OutOfScope:
- are tested through Module Tests. As the initialisation and the personalisation process are out of scope of this evaluation, the TOE was always tested in its usage phase. 16 / 36 BSI-DSZ-CC-0537-2009: 1
- contained in one or more Java packages. Note, that applets are not part of the TOE and therefore out of scope. The hardware platform was always the NXP P5CD144V0B. ● an emulator which is required for test: 1
- out of scope: 3
- the Smart Card at the initialisation site. The initialisation and the personalisation process are out of scope of this evaluation. 13 / 36 Certification Report BSI-DSZ-CC-0537-2009 The hardware product can be: 1
|
| pdf_data/report_metadata |
- /Author: ppatin
- /CreationDate: D:20230213144140-05'00'
- /Creator: Microsoft® Word for Microsoft 365
- /ModDate: D:20230213144140-05'00'
- /Producer: Microsoft® Word for Microsoft 365
- pdf_file_size_bytes: 428583
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 28
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20100111131526+01'00'
- /Creator: Writer
- /Keywords: Sm@rtCafe ExpertVersion 5.0, Giesecke & Devrient GmbH, Java Card, Common Criteria, Certification, Zertifzierung
- /ModDate: D:20100111135143+01'00'
- /Producer: StarOffice 9
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0537-2009
- pdf_file_size_bytes: 1096697
- pdf_hyperlinks: http://de.wikipedia.org/wiki/Electrically_Erasable_Programmable_Read_Only_Memory, http://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 36
|
| pdf_data/st_filename |
st_vid11277-st.pdf |
0537b_pdf.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0404: 1
- BSI-DSZ-CC-0404-2007: 2
- BSI-DSZ-CC-0410-2007: 2
- BSI-DSZ-CC-0411-2007: 2
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP-0002: 1
- BSI-PP-0026: 3
|
| pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 2
- EAL 4 augmented: 1
- EAL 5: 3
- EAL 5 augmented: 1
- EAL4: 8
- EAL4 augmented: 2
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.1: 2
- ALC_CMS.1: 2
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ACM:
- ACM_AUT: 2
- ACM_AUT.1: 11
- ACM_CAP: 2
- ACM_CAP.3: 3
- ACM_CAP.4: 22
- ACM_SCP: 3
- ACM_SCP.2: 8
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 10
- ADO_IGS: 1
- ADO_IGS.1: 10
- ADV:
- ADV_FSP: 2
- ADV_FSP.1: 10
- ADV_FSP.2: 20
- ADV_HLD: 2
- ADV_HLD.1: 2
- ADV_HLD.2: 22
- ADV_IMP: 1
- ADV_IMP.1: 3
- ADV_IMP.2: 22
- ADV_LLD: 2
- ADV_LLD.1: 21
- ADV_RCR: 2
- ADV_RCR.1: 15
- ADV_SPM: 2
- ADV_SPM.1: 31
- AGD:
- AGD_ADM: 2
- AGD_ADM.1: 26
- AGD_USR: 2
- AGD_USR.1: 19
- ALC:
- ALC_DVS: 2
- ALC_DVS.1: 11
- ALC_DVS.2: 1
- ALC_LCD: 2
- ALC_LCD.1: 9
- ALC_TAT: 2
- ALC_TAT.1: 13
- ATE:
- ATE_COV: 2
- ATE_COV.2: 8
- ATE_DPT: 2
- ATE_DPT.1: 6
- ATE_FUN: 2
- ATE_FUN.1: 17
- ATE_IND: 1
- ATE_IND.2: 9
- AVA:
- AVA_MSU: 2
- AVA_MSU.2: 15
- AVA_MSU.3: 1
- AVA_SOF: 2
- AVA_SOF.1: 9
- AVA_VLA: 1
- AVA_VLA.2: 1
- AVA_VLA.3: 1
- AVA_VLA.4: 28
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 4
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 3
- FAU_GEN.2.1: 1
- FAU_STG_EXT.1: 5
- FAU_STG_EXT.1.1: 1
- FAU_STG_EXT.1.2: 1
- FAU_STG_EXT.1.3: 1
- FCS:
- FCS_CKM.1: 6
- FCS_CKM.1.1: 1
- FCS_CKM.2: 6
- FCS_CKM.2.1: 1
- FCS_CKM.4: 5
- FCS_CKM.4.1: 1
- FCS_COP: 20
- FCS_COP.1: 4
- FCS_NTP_EXT.1.4: 1
- FCS_RBG_EXT.1: 5
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FCS_TLSC_EXT.1: 14
- FCS_TLSC_EXT.1.1: 1
- FCS_TLSC_EXT.1.2: 1
- FCS_TLSC_EXT.1.3: 1
- FCS_TLSC_EXT.1.4: 1
- FCS_TLSC_EXT.2: 1
- FCS_TLSC_EXT.2.3: 1
- FCS_TLSS_EXT.1: 11
- FCS_TLSS_EXT.1.1: 1
- FCS_TLSS_EXT.1.2: 1
- FCS_TLSS_EXT.1.3: 1
- FCS_TLSS_EXT.1.4: 1
- FCS_TLSS_EXT.2: 17
- FCS_TLSS_EXT.2.1: 1
- FCS_TLSS_EXT.2.2: 1
- FCS_TLSS_EXT.2.3: 1
- FIA:
- FIA_AFL.1: 7
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_PMG_EXT.1: 4
- FIA_PMG_EXT.1.1: 1
- FIA_UAU.7: 3
- FIA_UAU.7.1: 2
- FIA_UAU_EXT.1: 1
- FIA_UAU_EXT.2: 3
- FIA_UAU_EXT.2.1: 1
- FIA_UIA_EXT.1: 5
- FIA_UIA_EXT.1.1: 1
- FIA_UIA_EXT.1.2: 1
- FMT:
- FMT_MOF: 8
- FMT_MOF.1: 2
- FMT_MTD: 8
- FMT_MTD.1: 2
- FMT_SMF.1: 4
- FMT_SMF.1.1: 1
- FMT_SMR.2: 3
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT.1: 3
- FPT_APW_EXT.1.1: 1
- FPT_APW_EXT.1.2: 1
- FPT_SKP_EXT.1: 4
- FPT_SKP_EXT.1.1: 1
- FPT_STM.1: 1
- FPT_STM_EXT.1: 5
- FPT_STM_EXT.1.1: 1
- FPT_STM_EXT.1.2: 1
- FPT_TST_EXT.1: 4
- FPT_TST_EXT.1.1: 1
- FPT_TUD_EXT.1: 4
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FTA:
- FTA_SSL.3: 3
- FTA_SSL.3.1: 1
- FTA_SSL.4: 4
- FTA_SSL.4.1: 1
- FTA_SSL_EXT.1: 4
- FTA_SSL_EXT.1.1: 1
- FTA_TAB.1: 6
- FTA_TAB.1.1: 1
- FTP:
- FTP_APW_EXT.1: 1
- FTP_ITC.1: 6
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 4
- FTP_TRP.1: 3
|
- FAU:
- FAU_ARP: 7
- FAU_ARP.1: 11
- FAU_SAA.1: 3
- FCO:
- FCS:
- FCS_CKM.1: 15
- FCS_CKM.1.1: 2
- FCS_CKM.2: 6
- FCS_CKM.2.1: 2
- FCS_CKM.3: 5
- FCS_CKM.3.1: 2
- FCS_CKM.4: 13
- FCS_CKM.4.1: 2
- FCS_COP.1: 16
- FCS_COP.1.1: 4
- FCS_RND: 7
- FCS_RND.1: 14
- FCS_RND.1.1: 6
- FDP:
- FDP_ACC: 20
- FDP_ACC.1: 22
- FDP_ACC.2: 19
- FDP_ACF: 15
- FDP_ACF.1: 51
- FDP_IFC: 23
- FDP_IFC.1: 28
- FDP_IFC.2: 11
- FDP_IFF: 13
- FDP_IFF.1: 50
- FDP_IFF.2: 10
- FDP_IFF.2.7: 1
- FDP_ITC.1: 4
- FDP_ITC.2: 25
- FDP_ITT.1: 3
- FDP_RIP: 43
- FDP_RIP.1: 34
- FDP_ROL: 4
- FDP_ROL.1: 15
- FDP_ROL.1.1: 2
- FDP_SDI.2: 6
- FDP_SDI.2.1: 2
- FDP_SDI.2.2: 2
- FDP_UIT: 1
- FDP_UIT.1: 6
- FIA:
- FIA_ATD: 3
- FIA_ATD.1: 7
- FIA_SOS.2: 1
- FIA_UID: 13
- FIA_UID.1: 25
- FIA_UID.2: 4
- FIA_USB.1: 7
- FIA_USB.1.1: 3
- FIA_USB.1.2: 3
- FIA_USB.1.3: 3
- FMT:
- FMT_LIM: 6
- FMT_LIM.1: 20
- FMT_LIM.1.1: 3
- FMT_LIM.2: 13
- FMT_LIM.2.1: 2
- FMT_MSA: 49
- FMT_MSA.1: 41
- FMT_MSA.2: 16
- FMT_MSA.3: 45
- FMT_MTD: 3
- FMT_MTD.1: 8
- FMT_MTD.3: 5
- FMT_MTD.3.1: 2
- FMT_REV: 1
- FMT_REV.1: 8
- FMT_SMF.1: 28
- FMT_SMR: 34
- FMT_SMR.1: 63
- FPR:
- FPR_UNO.1: 7
- FPR_UNO.1.1: 2
- FPT:
- FPT_AMT: 4
- FPT_AMT.1: 11
- FPT_FLS: 14
- FPT_FLS.1: 27
- FPT_ITT.1: 3
- FPT_PHP: 3
- FPT_PHP.3: 10
- FPT_RCV: 9
- FPT_RCV.3: 34
- FPT_RCV.4: 7
- FPT_RND.1: 1
- FPT_RVM: 3
- FPT_RVM.1: 15
- FPT_RVM.1.1: 2
- FPT_SEP: 3
- FPT_SEP.1: 13
- FPT_SEP.1.1: 2
- FPT_SEP.1.2: 2
- FPT_TDC.1: 6
- FPT_TDC.1.1: 2
- FPT_TDC.1.2: 3
- FPT_TST: 1
- FPT_TST.1: 11
- FPT_TST.1.1: 2
- FPT_TST.1.2: 3
- FPT_TST.1.3: 2
- FRU:
- FRU_FLT: 3
- FRU_FLT.1: 6
- FRU_FLT.2: 5
- FRU_RSA: 2
- FRU_RSA.1: 8
- FTP:
- FTP_ITC: 3
- FTP_ITC.1: 11
- FTP_TRP.1: 2
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN_CREDENTIALS_SECURE: 1
- A.COMPONENTS_RUNNING: 1
- A.LIMITED_FUNCTIONALITY: 1
- A.NO_THRU_TRAFFIC_PROTECTION: 1
- A.PHYSICAL_PROTECTION: 1
- A.REGULAR_UPDATES: 1
- A.RESIDUAL_INFORMATION: 1
- A.TRUSTED_ADMINISTRATOR: 1
- OE:
- OE.ADMIN_CREDENTIALS_SECURE: 1
- OE.COMPONENTS_RUNNING: 1
- OE.NO_GENERAL_PURPOSE: 1
- OE.NO_THRU_TRAFFIC_PROTECTION: 1
- OE.PHYSICAL: 1
- OE.RESIDUAL_INFORMATION: 1
- OE.TRUSTED_ADMN: 1
- OE.UPDATES: 1
- T:
- T.PASSWORD_CRACKING: 1
- T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
- T.SECURITY_FUNCTIONALITY_FAILURE: 1
- T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
- T.UNDETECTED_ACTIVITY: 1
- T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
- T.UPDATE_COMPROMISE: 1
- T.WEAK_AUTHENTICATION_ENDPOINTS: 1
- T.WEAK_CRYPTOGRAPHY: 1
|
- A:
- A.APPLET: 5
- A.NATIVE: 9
- A.VERIFICA: 1
- A.VERIFICATION: 5
- D:
- D.API_DATA: 3
- D.APP_: 1
- D.APP_CODE: 7
- D.APP_C_DATA: 3
- D.APP_I_DATA: 5
- D.CRYPTO: 6
- D.JCS_: 1
- D.JCS_CODE: 3
- D.JCS_DATA: 4
- D.PIN: 6
- D.SEC_DATA: 7
- O:
- O.ALARM: 11
- O.APPLET: 29
- O.CARD-: 7
- O.CARD-MANAGEMENT: 7
- O.CARD_MANAGEMENT: 7
- O.CHECK_INIT: 6
- O.CIPHER: 11
- O.CODE_PCKG: 8
- O.CODE_PKG: 7
- O.DELETION: 7
- O.FIREWALL: 15
- O.INSTALL: 13
- O.JAVAOBJECT: 24
- O.KEY-MNGT: 8
- O.KEY_MNGT: 1
- O.LOA: 1
- O.LOAD: 8
- O.NATIVE: 10
- O.OBJ-DELETION: 4
- O.OPERATE: 13
- O.PACKAGE: 6
- O.PIN-: 2
- O.PIN-MNGT: 8
- O.REALLO: 1
- O.REALLOCATIO: 1
- O.REALLOCATION: 6
- O.REMOTE: 7
- O.REMOTE_MTHD: 5
- O.REMOTE_OBJ: 8
- O.REMOTE_OBJECT: 1
- O.RESOURCES: 9
- O.RMI_SERVICE: 13
- O.RND: 11
- O.ROR: 5
- O.SCP: 53
- O.SHRD_VAR: 1
- O.SHRD_VAR_CO: 2
- O.SHRD_VAR_CONF: 1
- O.SHRD_VAR_CONFID: 5
- O.SHRD_VAR_IN: 1
- O.SHRD_VAR_INTEG: 5
- O.SID: 14
- O.SIDE_CHANNEL: 9
- O.TRANSACTION: 8
- O.XYZ: 1
- OE:
- OE.APPLET: 9
- OE.NATIVE: 9
- OE.VERIFICAT: 1
- OE.VERIFICATION: 22
- OE.XYZ: 1
- OP:
- OP.APPLET_DELETION: 5
- OP.APPLET_INSTALLATION: 5
- OP.BYTECODE: 1
- OP.CREATE: 3
- OP.DELETE_APPLET: 3
- OP.DELETE_PCKG: 2
- OP.DELETE_PCKG_APPLET: 2
- OP.GET_ROR: 2
- OP.INVK_INTERFACE: 1
- OP.INVOKE: 2
- OP.JAVA: 2
- OP.PACKAGE_DELETION: 5
- OP.PACKAGE_LOADING: 5
- OP.PUT: 5
- OP.RECEIVE: 1
- OP.RET_RORD: 3
- OP.SEND: 1
- OSP:
- R:
- T:
- T.A: 1
- T.CHIP: 4
- T.CONF: 1
- T.CONFID-: 2
- T.CONFID-APPLI-DATA: 3
- T.CONFID-JCS-: 1
- T.CONFID-JCS-CODE: 3
- T.CONFID-JCS-DATA: 3
- T.DELETION: 5
- T.EXE-: 5
- T.EXE-CODE: 7
- T.EXE-CODE-REMOTE: 3
- T.INSTALL: 5
- T.INTEG: 1
- T.INTEG-: 4
- T.INTEG-APPLI-: 2
- T.INTEG-APPLI-CODE: 8
- T.INTEG-APPLI-DATA: 8
- T.INTEG-JCS-: 4
- T.INTEG-JCS-CODE: 3
- T.INTEG-JCS-DATA: 3
- T.LEAKAGE: 7
- T.NATIV: 1
- T.NATIVE: 4
- T.OBJ-: 1
- T.OBJ-DELETION: 3
- T.PHYSI: 1
- T.PHYSICAL: 7
- T.RESOURC: 1
- T.RESOURCES: 3
- T.RND: 11
- T.SID: 14
|
| pdf_data/st_keywords/vendor |
|
- GD:
- NXP:
- NXP: 14
- NXP Semiconductors: 3
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC: 5
- HMAC-SHA-256: 5
- HMAC-SHA-384: 2
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 10
- SHA-384: 1
- SHA256: 4
|
|
| pdf_data/st_keywords/crypto_scheme |
- KA:
- Key Agreement: 1
- Key agreement: 1
- MAC:
|
|
| pdf_data/st_keywords/crypto_protocol |
- IPsec:
- SSH:
- TLS:
- DTLS:
- SSL:
- SSL: 2
- SSL 2.0: 2
- SSL 3.0: 2
- TLS:
- TLS: 67
- TLS 1.0: 2
- TLS 1.1: 2
- TLS 1.2: 2
- TLS v1.2: 1
- TLSv1.1: 1
- TLSv1.2: 7
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 6
- P-384: 6
- P-521: 4
- secp256r1: 3
- secp384r1: 3
- secp521r1: 3
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 9
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 9
- TLS_RSA_WITH_AES_128_CBC_SHA: 9
- TLS_RSA_WITH_AES_128_CBC_SHA256: 9
- TLS_RSA_WITH_AES_256_CBC_SHA: 9
- TLS_RSA_WITH_AES_256_CBC_SHA256: 7
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 2
- Malfunction: 6
- malfunction: 2
- physical tampering: 1
- SCA:
- DPA: 3
- Leak-Inherent: 6
- SPA: 2
- physical probing: 1
- side channel: 1
- side-channel: 1
- timing attack: 1
- timing attacks: 1
- other:
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
- FIPS:
- ISO:
- ISO/IEC 18031:2011: 4
- ISO/IEC 9796-2: 2
- NIST:
- NIST SP 800-56A: 1
- NIST SP 800-90: 1
- PKCS:
- RFC:
- RFC 2818: 2
- RFC 2986: 1
- RFC 3447: 2
- RFC 5077: 1
- RFC 5246: 3
- RFC 5280: 6
- RFC 5424: 2
- RFC 5425: 2
- RFC 6125: 2
- X509:
|
- BSI:
- AIS 20: 2
- AIS 31: 1
- AIS20: 3
- AIS31: 2
- CC:
- CCIMB-2005-08-001: 1
- CCIMB-2005-08-002: 1
- CCIMB-2005-08-003: 1
- CCMB-2005-08-004: 1
- FIPS:
- FIPS PUB 197: 1
- FIPS PUB 46-3: 1
- ICAO:
- ISO:
- ISO/IEC 7816-3: 1
- ISO/IEC 7816-5: 1
- PKCS:
- RFC:
|
| pdf_data/st_keywords/javacard_version |
|
- GlobalPlatform:
- JavaCard:
- Java Card 2.2: 1
- Java Card 2.2.2: 3
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
- java:
- javacard:
- javacard.framework: 5
- javacard.framework.applet: 1
- javacard.framework.service: 1
- javacard.security: 2
- javacardx:
- javacardx.crypto: 2
- javacardx.rmi: 1
- javacardx.security: 1
|
| pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this ST, though. 8.1.1.14 T.PHYSICAL Covered by O.SCP.IC. Physical protections rely on the SCP: 1
- out of scope: 2
- the Smart Card at the initialisation site. The initialisation and the personalisation process are out of scope of this evaluation. The TOE’s delivery scope beside the initialisation file and the mask keys: 1
|
| pdf_data/st_metadata |
- /Author: Jenn Lobb
- /CreationDate: D:20230206145642-05'00'
- /Creator: Microsoft® Word for Microsoft 365
- /ModDate: D:20230206145642-05'00'
- /Producer: Microsoft® Word for Microsoft 365
- pdf_file_size_bytes: 841220
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 51
|
- /Author: G&D/CSRD22
- /Comments: Open
- /Company: GuD
- /CreationDate: D:20091027093026+01'00'
- /Creator: Acrobat PDFMaker 7.0 für Word
- /Keywords: Version 1.0 / Status 27.10.2009, Java Card, Standard 2.2 configuration, SUN Java Card System PP, Global Platform 2.1.1 Card Implementation, NXP P5CD040/080/144
- /ModDate: D:20091027105141+01'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /SourceModified: D:20091027082407
- /Subject: Security Target Lite SmartCafe Expert V5.0
- /Title: Security Target Lite SmartCafe Expert V5.0
- pdf_file_size_bytes: 2381740
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 178
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
True |
False |
| state/cert/download_ok |
True |
False |
| state/cert/extract_ok |
True |
False |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |