name |
CommScope Technologies LLC, Ruckus FastIron ICX 7450 Series Router 8.0.70 with IPsec VPN |
Plateforme J-Safe, en configuration fermée, version 2.11.0, sur le composant SB23YR80B |
category |
Network and Network-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
US |
FR |
status |
archived |
archived |
not_valid_after |
08.09.2022 |
15.05.2020 |
not_valid_before |
08.09.2020 |
15.05.2015 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11088-ci.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11088-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_16.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11088-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_16_Cible.pdf |
manufacturer |
Commscope Technologies, LLC |
Incard Division / ST Microelectronics |
manufacturer_web |
https://www.ruckusnetworks.com |
|
security_level |
{} |
EAL5+, ALC_DVS.2, AVA_VAN.5 |
dgst |
2f1e8293845ad386 |
bb81f40b202b203a |
heuristics/cert_id |
CCEVS-VR-VID-11088-2020 |
ANSSI-CC-2015/16 |
heuristics/cert_lab |
US |
SERMA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, AGD_PRE.1 |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.4, ALC_TAT.2, ASE_REQ.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
8.0.70 |
2.11.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2015/17 |
heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2012/68 |
heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2015/17 |
heuristics/report_references/indirectly_referencing |
{} |
ANSSI-CC-2009/26, ANSSI-CC-2010/01, ANSSI-CC-2009/05, ANSSI-CC-2009/51, ANSSI-CC-2009/06, ANSSI-CC-2012/68, ANSSI-CC-2009/50, ANSSI-CC-2010/02, ANSSI-CC-2009/62, ANSSI-CC-2009/28 |
heuristics/scheme_data |
- category: Virtual Private Network
- certification_date: 08.09.2020
- evaluation_facility: Gossamer Security Solutions
- expiration_date: 08.09.2022
- id: CCEVS-VR-VID11088
- product: CommScope Technologies LLC, Ruckus FastIron ICX 7450 Series Router 8.0.70 with IPsec VPN
- scheme: US
- url: https://www.niap-ccevs.org/product/11088
- vendor: Commscope Technologies, LLC
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
ANSSI-CC-2012/68 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
ANSSI-CC-2012/68 |
heuristics/protection_profiles |
fa0610a54305df78 |
090c1a53c73889d8 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_VPNGW_V1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-profil_PP-2010-07en.pdf |
pdf_data/cert_filename |
st_vid11088-ci.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID11088-2020: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20200914102819-04'00'
- /ModDate: D:20200914102819-04'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 181522
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
st_vid11088-vr.pdf |
ANSSI-CC-2015_16.pdf |
pdf_data/report_frontpage |
- FR:
- US:
- cert_id: CCEVS-VR-VID11088-2020
- cert_item: CommScope Technologies LLC, Ruckus FastIron ICX 7450 Series Router 8.0.70 with IPsec VPN
- cert_lab: US NIAP
|
- FR:
- cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 3
- cert_id: ANSSI-CC-2015/16
- cert_item: Plateforme J-Safe, en configuration fermée, version 2.11.0, sur le composant SB23YR80B
- cert_item_version: Version 2.11.0
- cert_lab: Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
- developer: STMicroelectronics S.r.l. – Incard Division Z.I Marcianise Sud, 81025 Marcianise, Italie STMicroelectronics 29 Boulevard Romain Rolland, 75669 Paris Cedex 14, France Commanditaire STMicroelectronics S.r.l. – Incard Division Z.I Marcianise Sud, 81025 Marcianise, Italie
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: PP JCS] Java Card protection profile – closed configuration, version 3.0
- US:
|
pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID11088-2020: 1
|
- FR:
- ANSSI-CC-2012/68: 2
- ANSSI-CC-2012/68-S02: 1
- ANSSI-CC-2015/16: 16
- ANSSI-CC-PP-2010/07-M01: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- ANSSI:
- ANSSI-CC-PP-: 1
- ANSSI-CC-PP-2010/07-M01: 1
- BSI:
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 1
- EAL4: 2
- EAL6: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_FLR.1: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20200914102159-04'00'
- /ModDate: D:20200914102159-04'00'
- pdf_file_size_bytes: 579325
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 16
|
- /Author: Administrateur
- /CreationDate: D:20150522134001+02'00'
- /Creator: Microsoft® Word 2010
- /Keywords: ANSSI-CC-CER-F-07.016
- /ModDate: D:20150522134001+02'00'
- /Producer: Microsoft® Word 2010
- /Subject: Plateforme J-Safe, en configuration fermée, version 2.11.0, sur le composant SB23YR80B
- /Title: ANSSI-CC-2015/16
- pdf_file_size_bytes: 579179
- pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 15
|
pdf_data/st_filename |
st_vid11088-st.pdf |
ANSSI-CC-2015_16_Cible.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0055: 2
- BSI-PP- 0035: 2
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL4+: 1
- EAL5: 12
- EAL5 augmented: 2
- EAL5+: 3
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 10
- AGD_PRE: 1
- AGD_PRE.1: 6
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 4
- ALC_CMS: 1
- ALC_CMS.1: 5
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 7
- ADV_FSP.1: 4
- ADV_FSP.2: 2
- ADV_FSP.4: 1
- ADV_FSP.5: 9
- ADV_IMP.1: 10
- ADV_INT.2: 2
- ADV_TDS.1: 2
- ADV_TDS.3: 4
- ADV_TDS.4: 9
- AGD:
- AGD_OPE.1: 7
- AGD_PRE.1: 7
- ALC:
- ALC_CMC.4: 2
- ALC_CMS.1: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 3
- ALC_DVS.2: 9
- ALC_LCD.1: 4
- ALC_TAT.1: 2
- ALC_TAT.2: 4
- ASE:
- ASE_CCL: 2
- ASE_CCL.1: 2
- ASE_ECD: 2
- ASE_ECD.1: 5
- ASE_INT.1: 6
- ASE_OBJ: 2
- ASE_OBJ.2: 4
- ASE_REQ: 2
- ASE_REQ.1: 2
- ASE_REQ.2: 3
- ASE_SPD: 2
- ASE_SPD.1: 3
- ASE_TSS: 2
- ASE_TSS.1: 2
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 4
- ATE_DPT.1: 1
- ATE_DPT.3: 2
- ATE_FUN.1: 7
- ATE_IND.2: 1
- AVA:
- AVA_VAN.4: 1
- AVA_VAN.5: 9
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 1
- FCS_CKM.2: 1
- FCS_COP: 6
- FCS_RBC_EXT.1: 1
- FCS_RBG_EXT.1: 2
- FDP:
- FIA:
- FIA_AFL.1: 2
- FIA_PMG_EXT.1: 1
- FIA_UIA_EXT.1: 1
- FPT:
- FTA:
- FTP:
|
- FAU:
- FAU_ARP: 5
- FAU_ARP.1: 3
- FAU_SAA.1: 2
- FAU_SAS.1: 2
- FCS:
- FCS_CKM: 3
- FCS_CKM.1: 4
- FCS_CKM.2: 2
- FCS_CKM.3: 2
- FCS_CKM.4: 2
- FCS_COP: 9
- FCS_COP.1: 4
- FCS_RNG: 2
- FCS_RNG.1: 7
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FDP:
- FDP_ACC: 8
- FDP_ACC.2: 1
- FDP_ACF: 7
- FDP_ACF.1: 4
- FDP_IFC: 3
- FDP_IFC.1: 7
- FDP_IFF: 3
- FDP_IFF.1: 5
- FDP_ITT.1: 4
- FDP_RIP: 36
- FDP_RIP.1: 3
- FDP_ROL: 12
- FDP_ROL.1: 3
- FDP_SDI.2: 2
- FIA:
- FIA_ATD: 2
- FIA_UID: 1
- FIA_USB: 2
- FMT:
- FMT_LIM: 5
- FMT_LIM.1: 13
- FMT_LIM.1.1: 1
- FMT_LIM.2: 12
- FMT_LIM.2.1: 1
- FMT_MSA: 14
- FMT_MSA.1: 2
- FMT_MSA.2: 2
- FMT_MSA.3: 4
- FMT_MTD: 6
- FMT_SMF.1: 6
- FMT_SMR: 1
- FMT_SMR.1: 3
- FPR:
- FPT:
- FPT_FLS: 17
- FPT_FLS.1: 5
- FPT_ITT.1: 2
- FPT_PHP.3: 2
- FPT_TDC.1: 1
- FPT_TST.1: 2
- FRU:
|
pdf_data/st_keywords/cc_claims |
- OE:
- OE.ADMIN_CREDENTIALS_SECURE: 1
- OE.CONNECTIONS: 1
- OE.NO_GENERAL_PURPOSE: 1
- OE.NO_THRU_TRAFFIC_PROTECTION: 1
- OE.PHYSICAL: 1
- OE.RESIDUAL_INFORMATION: 1
- OE.TRUSTED_ADMIN: 1
- OE.UPDATES: 1
|
- A:
- A.NO-DELETION: 5
- A.NO-INSTALL: 5
- A.VERIFICATION: 4
- A.XXX: 1
- D:
- D.API_DATA: 3
- D.APP_CODE: 6
- D.APP_C_DATA: 3
- D.APP_I_DATA: 4
- D.CRYPTO: 6
- D.EMBEDDED_SW_CODE: 4
- D.EMBEDDED_SW_DATA: 4
- D.GP_CODE: 3
- D.GP_SENSITIVE_DATA: 3
- D.JCS_CODE: 4
- D.JCS_DATA: 6
- D.PIN: 9
- D.SEC_DATA: 5
- O:
- O.ALARM: 21
- O.APPLET: 1
- O.CIPHER: 40
- O.FIREWALL: 26
- O.GLOBAL_ARRAYS_CONFID: 15
- O.GLOBAL_ARRAYS_INTEG: 8
- O.GP_REGISTRY: 10
- O.JAVA: 3
- O.JAVAOB: 2
- O.JAVAOBJECT: 20
- O.KEY-MNGT: 15
- O.KEY_MNGT: 1
- O.LIFE_CYCLE: 12
- O.NATIVE: 12
- O.OBJ-DEL: 1
- O.OBJ-DELETION: 6
- O.OPERATE: 34
- O.PIN-MNGT: 13
- O.REALLOCATION: 9
- O.RESOURCES: 9
- O.RND: 1
- O.ROLES: 7
- O.SCP: 65
- O.SID: 25
- O.SIDE_CHANNEL: 10
- O.TRANSACTION: 16
- OE:
- OE.CARD-MANAGEMENT: 12
- OE.CARD_MANAGEMENT: 16
- OE.MANAGEMENT_OF_SECRETS: 3
- OE.NO-DELETION: 6
- OE.NO-INSTALL: 5
- OE.SCP: 3
- OE.VERIFICATION: 32
- OP:
- OP.ARRAY_ACCESS: 4
- OP.CARD_LOCK: 4
- OP.CARD_TERMINATE: 4
- OP.CREATE: 7
- OP.GET_CARD_LIFE_CYCLE_: 1
- OP.GET_CARD_LIFE_CYCLE_STATE: 2
- OP.INSTANCE_FIELD: 4
- OP.INVK_INTERFACE: 7
- OP.INVK_VIRTUAL: 6
- OP.JAVA: 5
- OP.MANAGE_APP_LIFE_CYC: 1
- OP.MANAGE_APP_LIFE_CYCLE_STATE: 3
- OP.PUT: 6
- OP.THROW: 5
- OP.TYPE_ACCESS: 5
- OSP:
- OSP.CARD_ADMINISTRATION_DISABLED: 5
- OSP.MANAGEMENT_OF_SECRETS: 6
- OSP.ROLES: 5
- OSP.VERIFICATION: 5
- R:
- T:
- T.CONFID-APPLI-DATA: 17
- T.CONFID-JCS-CODE: 6
- T.CONFID-JCS-DATA: 11
- T.EXE-CODE: 9
- T.INTEG-: 1
- T.INTEG-APPLI-CODE: 10
- T.INTEG-APPLI-DATA: 21
- T.INTEG-JCS-CODE: 6
- T.INTEG-JCS-DATA: 10
- T.LEAKAGE: 1
- T.LIFE_CYCLE: 7
- T.NATIVE: 4
- T.OBJ-DELETION: 4
- T.PHYSICAL: 9
- T.RESOURCES: 7
- T.SID: 16
|
pdf_data/st_keywords/vendor |
|
- STMicroelectronics:
- STM: 15
- STMicroelectronics: 8
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC: 2
- HMAC-SHA-256: 5
- HMAC-SHA-384: 5
|
- AES_competition:
- DES:
- 3DES:
- 3-DES: 2
- Triple-DES: 1
- TripleDES: 1
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-256: 2
- SHA-384: 1
- SHA-512: 2
- SHA224: 2
- SHA256: 2
- SHA384: 2
- SHA512: 2
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IKE:
- IPsec:
- SSH:
- TLS:
- VPN:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 1
- Physical tampering: 2
- fault injection: 2
- malfunction: 2
- physical tampering: 1
- SCA:
- DPA: 3
- Leak-Inherent: 1
- SPA: 1
- physical probing: 4
- side channel: 1
- timing attacks: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140-2: 1
- FIPS PUB 186-4: 9
- ISO:
- ISO/IEC 14888-3: 1
- ISO/IEC 18031:2011: 1
- ISO/IEC 9796-2: 1
- PKCS:
- RFC:
- RFC 1305: 1
- RFC 2460: 2
- RFC 2986: 2
- RFC 3447: 1
- RFC 3526: 4
- RFC 3602: 2
- RFC 4106: 2
- RFC 4301: 2
- RFC 4303: 2
- RFC 4945: 1
- RFC 5280: 3
- RFC 5282: 1
- RFC 5905: 1
- RFC 5996: 2
- RFC 6960: 1
- RFC 768: 2
- RFC 791: 2
- RFC 793: 2
- X509:
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- PKCS:
- PKCS#1: 1
- PKCS1: 1
- PKCS3: 1
- SCP:
|
pdf_data/st_keywords/javacard_version |
|
- GlobalPlatform:
- JavaCard:
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
- java:
- javacard:
- javacard.framework: 4
- javacard.framework.applet: 1
- javacard.security: 23
- javacard.security.interface: 4
- javacardx:
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
- and is out of the scope of current evaluation. Any other application being loaded pre-issuance is out of scope of current evaluation. 4.1.2.1 Java Card Platform The Java technology, embedded on the TOE: 1
- interface for the secure management of applications on the smart card. The Card Manager is out of scope of current evaluation and its administrative interface is permanently disabled before TOE delivery: 1
- of the TOE to the parties responsible of the following usage phases. Application development is out of scope of current evaluation. TOE Construction phase includes: Product Development Product: 1
- out of scope: 4
|
pdf_data/st_metadata |
- /CreationDate: D:20201117132931-05'00'
- /ModDate: D:20201117132931-05'00'
- pdf_file_size_bytes: 1647538
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 38
|
- /Author: Luca Di Cosmo
- /CreationDate: D:20150402161829+02'00'
- /Creator: Microsoft® Word 2013
- /ModDate: D:20150522134244+02'00'
- /Producer: Microsoft® Word 2013
- /Title: J-Safe_SB23YR80B_Security_Target
- pdf_file_size_bytes: 1236830
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 90
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |