Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
HP TippingPoint Intrusion Prevention Systems, comprising the S7500NX, S7100NX, S6200NX, S5200NX, S2600NX, S1400N, and S660N model appliances running TippingPoint Operating System v3.7.2
ISCB-5-RPT-C055-CR-v1
Microcontrôleur ORION_CB_03
ANSSI-CC-2017/41
name HP TippingPoint Intrusion Prevention Systems, comprising the S7500NX, S7100NX, S6200NX, S5200NX, S2600NX, S1400N, and S660N model appliances running TippingPoint Operating System v3.7.2 Microcontrôleur ORION_CB_03
category Network and Network-Related Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme MY FR
status archived active
not_valid_after 18.03.2020 07.06.2027
not_valid_before 18.03.2015 26.07.2017
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2017_41-s05.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C055-CR-v1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2017_41fr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/TippingPointST%201-0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2017_41-cible.pdf
manufacturer HP TippingPoint INVIA Secure Semiconductor
manufacturer_web https://www.hp.com/ https://www.invia.fr
security_level ALC_FLR.2, EAL3+ EAL5+, AVA_VAN.5, ALC_DVS.2
dgst 2cfde4db66d5e375 34afdb93cf8d78bd
heuristics/cert_id ISCB-5-RPT-C055-CR-v1 ANSSI-CC-2017/41
heuristics/cert_lab [] CEA
heuristics/extracted_sars ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ATE_DPT.1, ASE_ECD.1, AVA_VAN.2, ADV_FSP.3, ALC_LCD.1, ALC_FLR.2, ASE_SPD.1, ATE_COV.2, ALC_CMC.3, ADV_TDS.2, ALC_DVS.1, ALC_CMS.3, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ATE_DPT.3, AVA_VAN.5, ASE_INT.1, ALC_CMC.4, ASE_REQ.2, ADV_INT.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, ADV_IMP.1, ADV_TDS.4, ALC_LCD.1, ALC_DVS.2, ASE_SPD.1, ATE_COV.2, ALC_CMS.5, AGD_OPE.1, ADV_FSP.5, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1, ALC_TAT.2
heuristics/extracted_versions 3.7.2 -
heuristics/report_references/directly_referenced_by {} ANSSI-CC-2022/51
heuristics/report_references/indirectly_referenced_by {} ANSSI-CC-2022/51
heuristics/scheme_data
  • cert_no: 2015-001-C055
  • certification_date: 18.03.2015
  • developer: Trend Micro TippingPoint
  • enhanced:
    • assurance_level: EAL3+ALC_FLR.2
    • category: Network and Network-Related Devices and Systems
    • cert_id: C055
    • certification_date: 18.03.2015
    • developer: Freddy MercadoGlobal Compliance EngineerTrend Micro - TippingPointTel: +1 512 432-2947Cell: +1 512 632-6308VoIP: +1 512 319-5317Email: [email protected] Tandem Blvd.Austin, TX 78728 – USA URL:http://www.trendmicro.com/
    • expiration_date: 18.03.2020
    • mutual_recognition: CCRA
    • product: Trend Micro TippingPoint Intrusion Prevention Systems v3.7.2
    • report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C055/ISCB-5-RPT-C055-CR-v1.pdf
    • scope: The TOE is a hardware and software appliance that contains all the functions needed for intrusion prevention, including Internet Protocol (IP) defragmentation, TCP flow reassembly, statistical analysis, traffic shaping, flow blocking, flow state tracking and application-layer parsing of network protocols. The primary function of the TOE is to protect networks from intrusion attempts by scanning network traffic, detecting intrusion attempts, and reacting to detected intrusion attempts according to the filters and action sets with which the device is configured. The scope of evaluation covers major security features as follows: Security Audit: The TOE is able to generate auditable events for the basic level of audit. Identification and authentication: The TOE identifies and authenticates all administrative users of the TOE before granting them access to the TOE. Intrusion Detection and Prevention: The TOE collects network traffic and subjects it to statistical and signature-based analysis, depending on configured IPS filters. Traffic Management: The TOE can be configured to operate as a firewall, blocking or permitting network traffic based on protocol or IP address and port. Security Management: The TOE provides the security management functions to enable the administrative users to manage user accounts, audit data and audit configurations, security configuration data, traffic management filters, and IDS data collection, analysis, and reaction. TSF Protection: The TOE includes its own time source for providing reliable time stamps that are used in audit records and stored IDS data. Trusted Path: The TOE provides a trusted path for remote administrative users of the TOE to communicate with the TOE. The trusted path is implemented over the network management port using HTTPS for access to the LSM and SSHv2 for access to the CLI.
    • status: Archive
    • target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C055/TippingPointST%201-0.pdf
    • type: Hardware-based intrusion prevention systems
  • expiration_date: 18.03.2020
  • level: EAL3+ALC_FLR.2
  • product: Trend Micro TippingPoint Intrusion Prevention Systems v3.7.2
  • recognition: CCRA
  • url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/120
heuristics/st_references/directly_referenced_by {} ANSSI-CC-2022/51
heuristics/st_references/indirectly_referenced_by {} ANSSI-CC-2022/51
heuristics/protection_profiles {} cf0f01bcd7be3e9c
maintenance_updates


protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf
pdf_data/cert_filename certificat-anssi-cc-2017_41-s05.pdf
pdf_data/cert_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2017/41-S05: 2
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
    • EAL5: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
pdf_data/cert_keywords/vendor
pdf_data/cert_keywords/eval_facility
  • CEA-LETI:
    • CEA-LETI: 2
pdf_data/cert_keywords/symmetric_crypto
pdf_data/cert_keywords/asymmetric_crypto
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
pdf_data/cert_keywords/crypto_scheme
pdf_data/cert_keywords/crypto_protocol
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
pdf_data/cert_keywords/ecc_curve
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
pdf_data/cert_keywords/technical_report_id
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
pdf_data/cert_metadata
  • /Author: mflament
  • /CreationDate: D:20220613140249+02'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20220613140249+02'00'
  • /Producer: Acrobat Distiller 21.0 (Windows)
  • /Title: Microsoft Word - Certificat ANSSI-CC-2017_41-S05
  • pdf_file_size_bytes: 1553065
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename ISCB-5-RPT-C055-CR-v1.pdf anssi-cc-2017_41fr.pdf
pdf_data/report_frontpage
  • FR:
  • FR:
    • cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
    • cc_version: Critères Communs version 3.1 révision 4
    • cert_id: ANSSI-CC-2017/41
    • cert_item: Microcontrôleur ORION_CB_03
    • cert_item_version: Révision matériel C
    • cert_lab: CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France
    • developer: INVIA Secure Semiconductor Meyreuil Arteparc – Bât D, route de la côte d’Azur, 13590 Meyreuil, France Commanditaire INVIA Secure Semiconductor Meyreuil Arteparc – Bât D, route de la côte d’Azur, 13590 Meyreuil, France
    • match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur\\(s\\)(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
    • ref_protection_profiles: Security IC Platform Protection Profile with Augmentation Packages, version 1.0, certifié BSI-CC-PP-0084-2014 le 19 février 2014 avec conformité à “Package 1: Loader dedicated for usage in Secured Environment only
pdf_data/report_keywords/cc_cert_id
  • MY:
    • ISCB-5-RPT-C055-CR-v1: 28
  • FR:
    • ANSSI-CC-2017/41: 15
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 1
    • BSI-PP-0084-2014: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 1
    • EAL3: 8
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 5: 3
    • EAL 7: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 6
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 2
    • ALC_FLR: 1
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 3
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_SEL.1.1: 1
    • FAU_STG.2.1: 1
    • FAU_STG.2.2: 1
    • FAU_STG.2.3: 1
    • FAU_STG.4.1: 1
  • FMT:
    • FMT_MTD.1.1: 2
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1.1: 1
  • FTP:
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/report_keywords/vendor
  • Gemalto:
    • Gemalto: 1
pdf_data/report_keywords/eval_facility
  • CEA-LETI:
    • CEA - LETI: 1
  • CESTI:
    • CESTI: 2
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 1
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 3
    • SSHv2: 4
  • TLS:
    • SSL:
      • SSL: 1
pdf_data/report_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 1
  • ISO:
    • ISO/IEC 18045: 2
    • ISO/IEC15408: 2
  • BSI:
    • AIS 31: 1
    • AIS31: 1
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
pdf_data/report_metadata
  • /Author: ISCB Department
  • /CreationDate: D:20150318142844+08'00'
  • /Creator: Microsoft® Word 2013
  • /Keywords: HP TippingPoint Intrusion Prevention System
  • /ModDate: D:20150318142844+08'00'
  • /Producer: Microsoft® Word 2013
  • /Subject: HP TippingPoint Intrusion Prevention Systems, comprising the S7500NX, S7100NX, S6200NX, S5200NX, S2600NX, S1400N, and S660N model appliances running TippingPoint Operating System v3.7.2
  • /Title: C055 Certification Report
  • pdf_file_size_bytes: 733406
  • pdf_hyperlinks: mailto:[email protected], http://www.commoncriteriaportal.org/, http://www.cybersecurity.my/mycc
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 29
  • /Author: Christian Benardeau
  • /CreationDate: D:20170801175442+02'00'
  • /Creator: Microsoft® Word 2010
  • /Keywords: ANSSI-CC-CER-F-07.024
  • /ModDate: D:20201104161309+01'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: Microcontrôleur ORION_CB_03
  • /Title: ANSSI-CC-2017/41
  • pdf_file_size_bytes: 797558
  • pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 14
pdf_data/st_filename TippingPointST 1-0.pdf anssi-cc-2017_41-cible.pdf
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 25
    • BSI-PP-0084: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 3: 5
    • EAL 3 augmented: 4
    • EAL3: 1
  • EAL:
    • EAL4: 1
    • EAL4 augmented: 1
    • EAL5: 8
    • EAL5 augmented: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 10
    • ADV_FSP: 1
    • ADV_FSP.3: 12
    • ADV_TDS: 1
    • ADV_TDS.2: 13
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 10
    • AGD_PRE: 1
    • AGD_PRE.1: 6
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.3: 13
    • ALC_CMS: 1
    • ALC_CMS.3: 6
    • ALC_DEL: 1
    • ALC_DEL.1: 5
    • ALC_DVS: 1
    • ALC_DVS.1: 5
    • ALC_FLR: 1
    • ALC_FLR.2: 18
    • ALC_LCD: 1
    • ALC_LCD.1: 6
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 14
    • ASE_ECD: 1
    • ASE_ECD.1: 10
    • ASE_INT: 1
    • ASE_INT.1: 12
    • ASE_OBJ: 1
    • ASE_OBJ.2: 10
    • ASE_REQ: 1
    • ASE_REQ.2: 13
    • ASE_SPD: 1
    • ASE_SPD.1: 7
    • ASE_TSS: 1
    • ASE_TSS.1: 5
  • ATE:
    • ATE_COV: 1
    • ATE_COV.2: 5
    • ATE_DPT: 1
    • ATE_DPT.1: 5
    • ATE_FUN: 1
    • ATE_FUN.1: 8
    • ATE_IND: 1
    • ATE_IND.2: 7
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.2: 7
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 2
    • ADV_FSP.4: 1
    • ADV_FSP.5: 2
    • ADV_IMP.1: 2
    • ADV_INT.2: 2
    • ADV_TDS.3: 1
    • ADV_TDS.4: 2
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.5: 2
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 9
    • ALC_LCD.1: 1
    • ALC_TAT.2: 2
  • APE:
    • APE_ECD: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_DPT.3: 2
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 11
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 13
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR: 5
    • FAU_SAR.1: 12
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 6
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 6
    • FAU_SAR.3.1: 1
    • FAU_SEL: 2
    • FAU_SEL.1: 6
    • FAU_SEL.1.1: 1
    • FAU_STG: 2
    • FAU_STG.1: 2
    • FAU_STG.2: 9
    • FAU_STG.2.1: 1
    • FAU_STG.2.2: 1
    • FAU_STG.2.3: 1
    • FAU_STG.4: 7
    • FAU_STG.4.1: 1
  • FDP:
    • FDP_IFC: 2
    • FDP_IFC.1: 8
    • FDP_IFC.1.1: 1
    • FDP_IFF: 2
    • FDP_IFF.1: 12
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 2
    • FDP_IFF.1.5: 1
  • FIA:
    • FIA_AFL: 2
    • FIA_AFL.1: 7
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD: 3
    • FIA_ATD.1: 7
    • FIA_ATD.1.1: 1
    • FIA_SOS: 2
    • FIA_SOS.1: 8
    • FIA_SOS.1.1: 1
    • FIA_UAU: 2
    • FIA_UAU.1: 1
    • FIA_UAU.2: 12
    • FIA_UAU.2.1: 1
    • FIA_UID: 1
    • FIA_UID.1: 3
    • FIA_UID.2: 10
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF: 2
    • FMT_MOF.1: 7
    • FMT_MOF.1.1: 1
    • FMT_MSA.3: 2
    • FMT_MTD: 1
    • FMT_MTD.1: 14
    • FMT_MTD.1.1: 6
    • FMT_SMF: 2
    • FMT_SMF.1: 7
    • FMT_SMF.1.1: 1
    • FMT_SMR: 2
    • FMT_SMR.1: 12
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM: 3
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
  • FTP:
    • FTP_TRP: 2
    • FTP_TRP.1: 7
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 1
    • FAU_SAS: 7
    • FAU_SAS.1: 12
    • FAU_SAS.1.1: 2
  • FCS:
    • FCS_RNG: 11
    • FCS_RNG.1: 9
    • FCS_RNG.1.1: 1
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC: 11
    • FDP_ACC.1: 18
    • FDP_ACC.1.1: 1
    • FDP_ACF: 14
    • FDP_ACF.1: 15
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 21
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 3
    • FDP_ITC.1: 1
    • FDP_ITT.1: 18
    • FDP_ITT.1.1: 1
    • FDP_SDC: 5
    • FDP_SDC.1: 12
    • FDP_SDC.1.1: 2
    • FDP_SDI: 19
    • FDP_SDI.1: 3
    • FDP_SDI.2: 7
    • FDP_UIT.1: 9
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_API: 5
    • FIA_API.1: 11
    • FIA_API.1.1: 2
  • FMT:
    • FMT_LIM: 22
    • FMT_LIM.1: 27
    • FMT_LIM.1.1: 2
    • FMT_LIM.2: 31
    • FMT_LIM.2.1: 2
    • FMT_MSA.1: 10
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 14
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 9
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 6
  • FPT:
    • FPT_FLS.1: 19
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 16
    • FPT_ITT.1.1: 1
    • FPT_PHP.3: 19
    • FPT_PHP.3.1: 1
  • FRU:
    • FRU_FLT.1: 1
    • FRU_FLT.2: 16
    • FRU_FLT.2.1: 1
  • FTP:
    • FTP_ITC.1: 2
    • FTP_TRP.1: 11
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 3
    • A.MANAGE: 3
    • A.NOEVIL: 2
    • A.PROTECT: 2
  • O:
    • O.ACCESS: 4
    • O.ADMIN: 4
    • O.ANALYZER: 6
    • O.AUDIT: 4
    • O.INTEGRITY: 3
    • O.RESPONSE: 7
    • O.REVIEW: 6
    • O.SENSOR: 7
    • O.STORAGE: 4
    • O.TRAFFIC: 3
  • OE:
    • OE.CONFID: 2
    • OE.INSTALL: 2
    • OE.PERSONNEL: 2
    • OE.PHYSICAL: 2
  • T:
    • T.ACCIDENT: 2
    • T.ACCOUNT: 2
    • T.COMPROMISE: 3
    • T.CONFIG: 2
    • T.INFLUX: 3
    • T.LOSSOF: 2
    • T.MALICE: 3
    • T.MISUSE: 3
    • T.PRIVILEGE: 3
  • O:
    • O.RND: 6
  • OE:
    • OE.TOE: 1
  • T:
    • T.RND: 5
pdf_data/st_keywords/vendor
  • Gemalto:
    • Gemalto: 1
  • Infineon:
    • Infineon Technologies: 1
  • Philips:
    • Philips: 1
pdf_data/st_keywords/eval_facility
  • Leidos:
    • Leidos: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
    • RC:
      • RC2: 2
      • RC4: 2
  • DES:
    • 3DES:
      • 3DES: 2
    • DES:
      • DES: 2
  • miscellaneous:
    • Blowfish:
      • Blowfish: 1
  • AES_competition:
    • AES:
      • AES: 3
  • DES:
    • 3DES:
      • TDES: 2
    • DES:
      • DES: 1
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DSA:
      • DSA: 2
  • ECC:
    • ECC:
      • ECC: 1
    • ECDH:
      • ECDH: 3
    • ECDSA:
      • ECDSA: 3
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 3
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 9
    • SSHv2: 7
  • TLS:
    • SSL:
      • SSL: 5
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 11
    • RNG: 8
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 2
  • FI:
    • Malfunction: 22
    • malfunction: 10
    • physical tampering: 2
  • SCA:
    • Leak-Inherent: 17
    • Physical Probing: 5
    • Physical probing: 1
    • physical probing: 6
    • side channel: 2
    • timing attacks: 1
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 2
  • X509:
    • X.509: 1
  • BSI:
    • AIS31: 1
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
  • FIPS:
    • FIPS140-2: 1
  • ISO:
    • ISO/IEC 7816-3: 1
pdf_data/st_metadata
  • /Author:
  • /CreationDate: D:20150318142909+08'00'
  • /Creator:
  • /Keywords:
  • /ModDate: D:20150318142917+08'00'
  • /Producer: Foxit Reader PDF Printer Version 7.0.1.831
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 1322388
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 58
  • /Author: Alain Pomet
  • /CreationDate: D:20201116134244+01'00'
  • /Creator: Microsoft® Word 2013
  • /ModDate: D:20201116134244+01'00'
  • /Producer: Microsoft® Word 2013
  • /Title: Security Target
  • pdf_file_size_bytes: 1616979
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 75
state/cert/convert_ok False True
state/cert/download_ok False True
state/cert/extract_ok False True
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different