name |
Carte VITALE 2 - Application ADELE : Composant SB23ZL48 masqu� par le logiciel SESAM VITALE v1.0.1 avec correctif version 1
|
- Kanguru Defender Elite 200 with Kanguru Defender Manager Elite 200, Firmware Version 02.03.10, KDME200 v2.0.0.0-2/3/6,- Kanguru Defender 2000 with Kanguru Defender Manager 2000, Firmware Version 02.03.10, KDM2000 v1.2.1.8-2/3/6,- Universal Kanguru Local Administrator, Version 3.2.0.3 and- Kanguru Remote Management Console, Version 5.0.2.6
|
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
Data Protection
|
not_valid_before |
2012-06-07
|
2014-11-07
|
not_valid_after |
2019-09-01
|
2019-11-08
|
scheme |
FR
|
DE
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2011-68en.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772b_pdf.pdf
|
status |
archived
|
archived
|
manufacturer |
MORPHO / ST Microelectronics
|
Kanguru Solutions
|
manufacturer_web |
https://www.morpho.com
|
https://www.kanguru.com
|
security_level |
ALC_DVS.2, AVA_VAN.5, EAL4+ |
ALC_FLR.1, EAL2+ |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2011-68fr.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772a_pdf.pdf
|
cert_link |
None
|
None
|
protection_profiles |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile - Secure Signature-Creation Device Type 3, Version 1.05', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0006b.pdf', 'pp_ids': frozenset({'SSCD_TYPE3_V1.05'})}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'PP Embedded Software for Smart Secure Devices Basic and Extended Configurations, Version 1.0', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/anssi-cc_PP-2009-02en.pdf', 'pp_ids': frozenset({'PP_EMBEDDED_SOFTWARE_V1.0'})}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile - Secure Signature-Creation Device Type 2, Version 1.04', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0005b.pdf', 'pp_ids': frozenset({'SSCD_TYPE2_V1.04'})}) |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Schutzprofil fur USB-Datentrager, Version 1.4', 'pp_eal': 'EAL2+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0025b.pdf', 'pp_ids': frozenset({'SCHUTZPROFIL_USB-DATENTRAGER_V1.4'})}) |
maintenance_updates |
|
frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2015, 1, 20), 'maintenance_title': 'Kanguru Defender Elite 200 and Kanguru Defender 2000, firmware version 2.05.10', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772_ma1a_pdf.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772_ma1b_pdf.pdf'}) |
state/cert |
- _type:
sec_certs.sample.cc.CCCertificate.DocumentState
- download_ok:
False
- convert_garbage:
False
- convert_ok:
False
- extract_ok:
False
- pdf_hash:
None
- txt_hash:
None
|
- _type:
sec_certs.sample.cc.CCCertificate.DocumentState
- download_ok:
False
- convert_garbage:
False
- convert_ok:
False
- extract_ok:
False
- pdf_hash:
None
- txt_hash:
None
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
00c92a01e77741223a06c2c6d712bbabd68b59803bef0e8248d9705d307f1824
|
16e52e72927a5eee7124e6fde0c186c1d3d113e733e6116f5fdfcc44278c5b57
|
state/report/txt_hash |
2419b01971150dfaf67cb7baa546bf06d87811c3dd06f05005070f181eb7232c
|
8cb2309bdc02367be25c3961b565d25c9f78b2d7cdce20c08213092f4a2eff82
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
58b7a64efc6ecdfedd1ddacfe753cf97fc34cb4ac31016672fadd711d000d017
|
077d27d1e2e9eafc65cbb9d302bc66883e2dd06e21ea816741ca25fe7f7dcd7d
|
state/st/txt_hash |
c3d640ec3a44f2d19209208c4c4c11b207b7dd7f7ba3065475b65718e0ddce57
|
74714db4c60a8332c3603aaae83a1c8ec3cbea7950400f562332e8ccdcc98147
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
ANSSI-CC-2011/68
|
BSI-DSZ-CC-0772-2014
|
heuristics/cert_lab |
CEA
|
BSI
|
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_versions |
1.0.1 |
2.0.0.0, 1.2.1.8, 3.2.0.3, 02.03.10, 5.0.2.6 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references/directly_referenced_by |
ANSSI-CC-2015/35 |
None
|
heuristics/report_references/directly_referencing |
ANSSI-CC-2010/08 |
None
|
heuristics/report_references/indirectly_referenced_by |
ANSSI-CC-2015/35 |
None
|
heuristics/report_references/indirectly_referencing |
ANSSI-CC-2010/08 |
None
|
heuristics/scheme_data |
- product:
Carte VITALE 2 - Application ADELE
- url:
https://cyber.gouv.fr/produits-certifies/carte-vitale-2-application-adele
- description:
Le produit certifié est la « carte VITALE 2 - Application ADELE : Composant SB23ZL48 masqué par le logiciel SESAM VITALE v1.0.1 avec correctif version 1 » développée par Morpho et STMicroelectronics.
Suivant une règle de nommage interne de Morpho, la version du correctif (1) correspond au dernier digit de la version du système d'exploitation (1.0.1).
La cible d'évaluation (TOE – Targ
- sponsor:
Morpho
- developer:
Morpho et STMicroelectronics
- cert_id:
2011/68
- level:
EAL4+
- enhanced:
- cert_id:
2011/68
- certification_date:
07/06/2012
- category:
Cartes à puce
- cc_version:
Critères Communs version 3.1r3
- developer:
Morpho et STMicroelectronics
- sponsor:
Morpho
- evaluation_facility:
CEA - LETI
- level:
EAL4+
- protection_profile:
[PP ESforSSD] certifié par l'ANSSI, BSI-PP-0005-2002 et BSI-PP-0006-2002
- mutual_recognition:
SOG-IS
CCRA
- augmented:
ALC_DVS.2, AVA_VAN.5
- target_link:
https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2011-68en.pdf
- report_link:
https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2011-68fr.pdf
|
None
|
heuristics/st_references/directly_referenced_by |
None
|
None
|
heuristics/st_references/directly_referencing |
ANSSI-CC-2010/08 |
None
|
heuristics/st_references/indirectly_referenced_by |
None
|
None
|
heuristics/st_references/indirectly_referencing |
ANSSI-CC-2010/08 |
None
|
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
None
|
None
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords |
None
|
None
|
pdf_data/cert_metadata |
None
|
None
|
pdf_data/report_filename |
ANSSI-CC_2011-68fr.pdf
|
0772a_pdf.pdf
|
pdf_data/report_frontpage |
- FR:
- match_rules:
Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité aux profils de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables
- cert_id:
ANSSI-CC-2011/68
- cert_item:
Carte VITALE 2 - Application ADELE : Composant SB23ZL48 masqué par le logiciel SESAM VITALE v1.0.1 avec correctif version 1
- cert_item_version:
- Version système d’exploitation : 1.0.1 - Version du correctif : 1
- ref_protection_profiles:
- [PP ESforSSD] certifié par l’ANSSI Protection Profile Embedded software for Smart Secure Devices Basic and Extended configurations – Basic configuration, version 1.0 - [BSI-PP-0005-2002] : SSCD Type 2, version 1.04 - [BSI-PP-0006-2002] : SSCD Type 3, version 1.05
- cc_version:
Critères Communs version 3.1 révision 3
- cc_security_level:
EAL 4 augmenté ALC_DVS.2, AVA_VAN.5
- developer:
Morpho 18 Chaussée Jules César, 95520 Osny, France STMicroelectronics 29 Boulevard Romain Rolland - 75669 Paris CEDEX 14 Commanditaire Morpho 18 Chaussée Jules César, 95520 Osny, France
- cert_lab:
CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France
|
- DE:
- match_rules:
(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)
- cert_id:
BSI-DSZ-CC-0772-2014
- cert_item:
Kanguru Defender Elite 200 Kanguru Defender 2000 Universal Kanguru Local Administrator, v3.2.0.3 Kanguru Remote Management Console, v5.0.2.6
- developer:
Kanguru Solutions
- cert_lab:
BSI
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id |
- FR:
- ANSSI-CC-2011/68:
21
- ANSSI-CC-2010_08:
3
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-PP-0005-2002:
2
- BSI-PP-0006-2002:
1
- BSI-PP-0035-2007:
2
- BSI-PP- 0005-2002:
1
- BSI-PP- 0006-2002:
1
- BSI-PP- 0035-2007:
1
- ANSSI:
|
|
pdf_data/report_keywords/cc_protection_profile_id/BSI |
- BSI-PP-0005-2002:
2
- BSI-PP-0006-2002:
1
- BSI-PP-0035-2007:
2
- BSI-PP- 0005-2002:
1
- BSI-PP- 0006-2002:
1
- BSI-PP- 0035-2007:
1
|
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_TDS:
1
- AGD:
- ALC:
- ALC_DVS.2:
3
- ALC_FLR:
2
- ALC_CMC:
1
- ALC_CMS:
1
- ALC_DEL:
1
- ALC_DVS:
1
- ALC_TAT:
1
- ATE:
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
- AVA:
- ASE:
- ASE_CCL:
1
- ASE_ECD:
1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_REQ:
1
- ASE_SPD:
1
- ASE_TSS:
1
|
- ADV:
- ADV_ARC.1:
1
- ADV_FSP.1:
1
- ADV_FSP.2:
1
- ADV_FSP.3:
1
- ADV_FSP.4:
1
- ADV_FSP.5:
1
- ADV_FSP.6:
1
- ADV_IMP.1:
1
- ADV_IMP.2:
1
- ADV_INT.1:
1
- ADV_INT.2:
1
- ADV_INT.3:
1
- ADV_SPM.1:
1
- ADV_TDS.1:
1
- ADV_TDS.2:
1
- ADV_TDS.3:
1
- ADV_TDS.4:
1
- ADV_TDS.5:
1
- ADV_TDS.6:
1
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_INT:
1
- ADV_SPM:
1
- ADV_TDS:
1
- AGD:
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- AGD_OPE:
1
- AGD_PRE:
1
- ALC:
- ALC_FLR.1:
5
- ALC_FLR:
3
- ALC_CMC.1:
1
- ALC_CMC.2:
1
- ALC_CMC.3:
1
- ALC_CMC.4:
1
- ALC_CMC.5:
1
- ALC_CMS.1:
1
- ALC_CMS.2:
1
- ALC_CMS.3:
1
- ALC_CMS.4:
1
- ALC_CMS.5:
1
- ALC_DEL.1:
1
- ALC_DVS.1:
1
- ALC_DVS.2:
1
- ALC_FLR.2:
1
- ALC_FLR.3:
1
- ALC_LCD.1:
1
- ALC_LCD.2:
1
- ALC_TAT.1:
1
- ALC_TAT.2:
1
- ALC_TAT.3:
1
- ALC_CMC:
1
- ALC_CMS:
1
- ALC_DEL:
1
- ALC_DVS:
1
- ALC_TAT:
1
- ATE:
- ATE_COV.1:
2
- ATE_COV.2:
1
- ATE_COV.3:
1
- ATE_DPT.1:
1
- ATE_DPT.2:
1
- ATE_DPT.3:
1
- ATE_DPT.4:
1
- ATE_FUN.1:
1
- ATE_FUN.2:
1
- ATE_IND.1:
1
- ATE_IND.2:
1
- ATE_IND.3:
1
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
- AVA:
- AVA_VAN.1:
1
- AVA_VAN.2:
1
- AVA_VAN.3:
1
- AVA_VAN.4:
1
- AVA_VAN.5:
1
- AVA_VAN:
2
- APE:
- APE_INT.1:
1
- APE_CCL.1:
1
- APE_SPD.1:
1
- APE_OBJ.1:
1
- APE_OBJ.2:
1
- APE_ECD.1:
1
- APE_REQ.1:
1
- APE_REQ.2:
1
- ASE:
- ASE_INT.1:
1
- ASE_CCL.1:
1
- ASE_SPD.1:
1
- ASE_OBJ.1:
1
- ASE_OBJ.2:
1
- ASE_ECD.1:
1
- ASE_REQ.1:
1
- ASE_REQ.2:
1
- ASE_TSS.1:
1
- ASE_TSS.2:
1
- ASE_CCL:
1
- ASE_ECD:
1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_SPD:
1
- ASE_TSS:
1
|
pdf_data/report_keywords/cc_sar/ADV |
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_TDS:
1
|
- ADV_ARC.1: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_FSP.6: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM.1: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS:
1
|
pdf_data/report_keywords/cc_sar/ADV/ADV_ARC |
1
|
1
|
pdf_data/report_keywords/cc_sar/ADV/ADV_FSP |
1
|
1
|
pdf_data/report_keywords/cc_sar/ADV/ADV_IMP |
1
|
1
|
pdf_data/report_keywords/cc_sar/ADV/ADV_TDS |
1
|
1
|
pdf_data/report_keywords/cc_sar/AGD |
|
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- AGD_OPE:
1
- AGD_PRE:
1
|
pdf_data/report_keywords/cc_sar/AGD/AGD_OPE |
1
|
1
|
pdf_data/report_keywords/cc_sar/AGD/AGD_PRE |
1
|
1
|
pdf_data/report_keywords/cc_sar/ALC |
- ALC_DVS.2:
3
- ALC_FLR:
2
- ALC_CMC:
1
- ALC_CMS:
1
- ALC_DEL:
1
- ALC_DVS:
1
- ALC_TAT:
1
|
- ALC_FLR.1: 5
- ALC_FLR:
3
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 1
- ALC_CMC.5: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_DVS.2:
1
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 1
- ALC_LCD.2: 1
- ALC_TAT.1: 1
- ALC_TAT.2: 1
- ALC_TAT.3: 1
- ALC_CMC:
1
- ALC_CMS:
1
- ALC_DEL:
1
- ALC_DVS:
1
- ALC_TAT:
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_CMC |
1
|
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_CMS |
1
|
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_DEL |
1
|
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS |
1
|
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 |
3
|
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR |
2
|
3
|
pdf_data/report_keywords/cc_sar/ALC/ALC_TAT |
1
|
1
|
pdf_data/report_keywords/cc_sar/ASE |
- ASE_CCL:
1
- ASE_ECD:
1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_REQ: 1
- ASE_SPD:
1
- ASE_TSS:
1
|
- ASE_INT.1: 1
- ASE_CCL.1: 1
- ASE_SPD.1: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_ECD.1: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ASE_CCL:
1
- ASE_ECD:
1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_SPD:
1
- ASE_TSS:
1
|
pdf_data/report_keywords/cc_sar/ASE/ASE_CCL |
1
|
1
|
pdf_data/report_keywords/cc_sar/ASE/ASE_ECD |
1
|
1
|
pdf_data/report_keywords/cc_sar/ASE/ASE_INT |
1
|
1
|
pdf_data/report_keywords/cc_sar/ASE/ASE_OBJ |
1
|
1
|
pdf_data/report_keywords/cc_sar/ASE/ASE_SPD |
1
|
1
|
pdf_data/report_keywords/cc_sar/ASE/ASE_TSS |
1
|
1
|
pdf_data/report_keywords/cc_sar/ATE |
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
|
- ATE_COV.1: 2
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 1
- ATE_DPT.4: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
|
pdf_data/report_keywords/cc_sar/ATE/ATE_COV |
1
|
1
|
pdf_data/report_keywords/cc_sar/ATE/ATE_DPT |
1
|
1
|
pdf_data/report_keywords/cc_sar/ATE/ATE_FUN |
1
|
1
|
pdf_data/report_keywords/cc_sar/ATE/ATE_IND |
1
|
1
|
pdf_data/report_keywords/cc_sar/AVA |
|
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5:
1
- AVA_VAN:
2
|
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN |
2
|
2
|
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN.5 |
3
|
1
|
pdf_data/report_keywords/cc_security_level/EAL |
- EAL 4:
2
- EAL4: 2
- EAL5: 1
- EAL7: 1
- EAL 1:
1
- EAL 3:
1
- EAL 5:
1
- EAL 7:
1
|
- EAL 2: 8
- EAL 1:
7
- EAL 4:
7
- EAL2: 2
- EAL 3:
4
- EAL 5:
6
- EAL 6: 3
- EAL 7:
4
- EAL 2 augmented: 3
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 1 |
1
|
7
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 3 |
1
|
4
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 4 |
2
|
7
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 |
1
|
6
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 7 |
1
|
4
|
pdf_data/report_keywords/cc_security_level/ITSEC |
|
|
pdf_data/report_keywords/cc_sfr |
|
- FCS:
- FCS_COP.1:
1
- FCS_CKM.1:
1
- FCS_RNG.1:
1
- FDP:
- FDP_ACC.1:
2
- FDP_ACF.1:
2
- FIA:
- FIA_UID.2:
4
- FIA_UAU.2:
4
- FIA_UAU.6:
1
- FIA_SOS.1:
1
- FMT:
- FMT_MTD:
2
- FMT_SMF:
2
- FMT_SMF.1:
1
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- Report, Version 8, 2014-10-07, Final Evaluation Technical Report, atsec information security GmbH, (confidential document) [9] Evaluated Product User Guide, Version 1.20, 2014-10-02 [10] Kanguru Defender Elite 200 User:
1
- KRMC Administrator's User Manual, Version 5.0.2, 2013-11-01 [14] Configuration lists for the TOE (confidential documents): a) Configuration list for TOE executables, 2014-09-17 b) Configuration list from Phison:
1
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
- CESTI:
- CEA-LETI:
- CEA - LETI:
1
- CEA-LETI:
2
|
|
pdf_data/report_keywords/hash_function/SHA/SHA2 |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2009-07-001:
1
- CCMB-2009-07-002:
1
- CCMB-2009-07-003:
1
- CCMB-2009-07-004:
1
|
- BSI:
- ISO:
- ISO/IEC 17065:
2
- ISO/IEC 15408:
2
- ISO/IEC 18045:
2
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI TR-02102:
1
- BSI 7138:
2
- BSI 7125:
2
- BSI 7148:
1
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor |
- STMicroelectronics:
- Morpho:
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata |
- pdf_file_size_bytes:
417135
- pdf_is_encrypted:
False
- pdf_number_of_pages:
20
- /CreationDate:
D:20120607110747+02'00'
- /Creator:
PScript5.dll Version 5.2
- /ModDate:
D:20120618193327+02'00'
- /Producer:
Acrobat Distiller 8.1.0 (Windows)
- /Title:
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
1643286
- pdf_is_encrypted:
False
- pdf_number_of_pages:
42
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate:
D:20141121083051+01'00'
- /Creator:
Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, encrypted USB storage device, Kanguru Defender"
- /ModDate:
D:20141121113713+01'00'
- /Producer:
LibreOffice 4.2
- /Subject: Common Criteria Certification
- /Title:
Certification Report BSI-DSZ-CC-0772-2014
- pdf_hyperlinks:
https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/
|
pdf_data/report_metadata//CreationDate |
D:20120607110747+02'00'
|
D:20141121083051+01'00'
|
pdf_data/report_metadata//Creator |
PScript5.dll Version 5.2
|
Writer
|
pdf_data/report_metadata//ModDate |
D:20120618193327+02'00'
|
D:20141121113713+01'00'
|
pdf_data/report_metadata//Producer |
Acrobat Distiller 8.1.0 (Windows)
|
LibreOffice 4.2
|
pdf_data/report_metadata//Title |
|
Certification Report BSI-DSZ-CC-0772-2014
|
pdf_data/report_metadata/pdf_file_size_bytes |
417135
|
1643286
|
pdf_data/report_metadata/pdf_hyperlinks |
|
https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/ |
pdf_data/report_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/report_metadata/pdf_number_of_pages |
20
|
42
|
pdf_data/st_filename |
ANSSI-CC-cible_2011-68en.pdf
|
0772b_pdf.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_claims |
- O:
- T:
- A:
- OE:
- OE.HI_VAD:
10
- OE.RND:
11
- OE.SVD_AUTH_CGA:
2
- OSP:
- OSP.MANAGEMENT_OF_SECRETS:
1
|
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- ANSSI:
- ANSSI-CC-PP-ESforSSD_Basic:
1
- ANSSI-CC-PP-ESforSSD_Extended:
1
|
- BSI:
- BSI-PP-0025:
6
- BSI-PP- 0025:
13
|
pdf_data/st_keywords/cc_protection_profile_id/BSI |
|
- BSI-PP-0025:
6
- BSI-PP- 0025:
13
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1:
1
- ADV_FSP.2:
1
- ADV_IMP.1:
1
- ADV_TDS.3:
1
- AGD:
- AGD_PRE:
1
- AGD_OPE:
1
- AGD_PRE.1:
1
- AGD_OPE.1:
1
- ALC:
- ALC_DVS.2:
8
- ALC_DVS.1:
1
- AVA:
|
- ADV:
- ADV_SPM.1:
2
- ADV_ARC.1:
1
- ADV_FSP.2:
1
- ADV_TDS.1:
1
- AGD:
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- ALC:
- ALC_FLR.1:
5
- ALC_CMC.2:
1
- ALC_CMS.2:
1
- ALC_DEL.1:
1
- ATE:
- ATE_COV.1:
1
- ATE_FUN.1:
1
- ATE_IND.2:
1
- AVA:
- ASE:
- ASE_INT.1:
1
- ASE_CCL.1:
1
- ASE_SPD.1:
1
- ASE_OBJ.2:
1
- ASE_ECD.1:
1
- ASE_REQ.2:
1
- ASE_TSS.1:
1
|
pdf_data/st_keywords/cc_sar/ADV |
- ADV_ARC.1:
1
- ADV_FSP.2:
1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
|
- ADV_SPM.1: 2
- ADV_ARC.1:
1
- ADV_FSP.2:
1
- ADV_TDS.1: 1
|
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.2 |
1
|
1
|
pdf_data/st_keywords/cc_sar/AGD |
- AGD_PRE: 1
- AGD_OPE: 1
- AGD_PRE.1:
1
- AGD_OPE.1:
1
|
- AGD_OPE.1:
1
- AGD_PRE.1:
1
|
pdf_data/st_keywords/cc_sar/AGD/AGD_OPE.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/AGD/AGD_PRE.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ALC |
- ALC_DVS.2:
8
- ALC_DVS.1:
1
|
- ALC_FLR.1:
5
- ALC_CMC.2:
1
- ALC_CMS.2:
1
- ALC_DEL.1:
1
|
pdf_data/st_keywords/cc_sar/AVA |
|
|
pdf_data/st_keywords/cc_security_level/EAL |
- EAL 4:
1
- EAL5:
1
- EAL4+:
3
- EAL4:
3
- EAL 5+:
1
- EAL 4 augmented:
1
- EAL5 augmented:
1
- EAL4 augmented:
1
|
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_ARP:
4
- FAU_SAA:
4
- FAU_GEN:
1
- FAU_ARP.1:
2
- FAU_SAA.1:
3
- FCS:
- FCS_CKM.1:
3
- FCS_CKM:
9
- FCS_CKM.4:
5
- FCS_COP.1:
9
- FCS_COP:
10
- FCS_CKM.4.1:
1
- FCS_COP.1.1:
1
- FCS_CKM.1.1:
1
- FCS_CKM.2:
1
- FCS_CKM.3:
1
- FDP:
- FDP_ACC:
31
- FDP_ACF:
31
- FDP_ETC:
4
- FDP_ITC:
6
- FDP_RIP.1:
5
- FDP_RIP:
3
- FDP_ROL:
3
- FDP_SDI:
9
- FDP_UCT:
9
- FDP_UIT:
15
- FDP_ACC.1:
14
- FDP_ACF.1:
41
- FDP_ETC.1:
2
- FDP_ITC.1:
8
- FDP_RIP.1.1:
1
- FDP_SDI.2:
7
- FDP_UCT.1:
4
- FDP_UIT.1:
11
- FDP_ROL.1:
3
- FDP_UNO.1:
1
- FDP_ITC.1.1:
1
- FDP_ITC.1.2:
1
- FDP_ITC.1.3:
1
- FIA:
- FIA_AFL.1:
3
- FIA_ATD.1:
3
- FIA_SOS:
3
- FIA_UAU.1:
4
- FIA_UID.1:
8
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
1
- FIA_ATD.1.1:
1
- FIA_UAU.1.1:
2
- FIA_UAU.1.2:
1
- FIA_UID.1.1:
1
- FIA_UID.1.2:
1
- FIA_SOS.2:
3
- FIA_UID:
2
- FMT:
- FMT_MOF.1:
6
- FMT_MOF:
3
- FMT_MSA:
23
- FMT_MSA.2:
3
- FMT_MSA.3:
16
- FMT_MTD:
3
- FMT_SMR.1:
5
- FMT_MOF.1.1:
1
- FMT_MSA.1:
9
- FMT_MSA.2.1:
1
- FMT_MSA.3.1:
1
- FMT_MSA.3.2:
1
- FMT_MTD.1:
5
- FMT_MTD.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_SMR:
2
- FPR:
- FPT:
- FPT_EMS:
2
- FPT_AMT.1:
2
- FPT_EMS.1:
5
- FPT_FLS.1:
5
- FPT_FLS:
3
- FPT_ITC:
3
- FPT_ITI:
3
- FPT_PHP.1:
3
- FPT_PHP.3:
3
- FPT_TST:
3
- FPT_TST.1:
9
- FPT_EMS.1.1:
2
- FPT_EMS.1.2:
2
- FPT_FLS.1.1:
1
- FPT_PHP.1.1:
1
- FPT_PHP.1.2:
1
- FPT_PHP.3.1:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FPT_ITC.1:
2
- FPT_ITI.1:
3
- FTP:
- FTP_ITC:
22
- FTP_TRP:
10
- FTP_ITC.1:
20
- FTP_TRP.1:
6
|
- FAU:
- FCS:
- FCS_RNG.1:
15
- FCS_CKM.1:
9
- FCS_CKM.4:
9
- FCS_COP.1:
9
- FCS_RNG:
2
- FCS_RNG.1.1:
3
- FCS_RNG.1.2:
3
- FCS_CKM.1.1:
1
- FCS_CKM.4.1:
1
- FCS_COP.1.1:
1
- FCS_CKM.2:
1
- FDP:
- FDP_ACC.1:
14
- FDP_ACF.1:
13
- FDP_ACC.1.1:
1
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
1
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
- FDP_ITC.1:
2
- FDP_ITC.2:
2
- FDP_IFC.1:
1
- FIA:
- FIA_UAU.1:
7
- FIA_UAU.6:
8
- FIA_SOS.1:
8
- FIA_UAU.2:
9
- FIA_UID.2:
10
- FIA_UAU.1.1:
1
- FIA_UAU.1.2:
1
- FIA_UAU.6.1:
1
- FIA_SOS.1.1:
1
- FIA_UAU.2.1:
1
- FIA_UID.2.1:
1
- FIA_UID.1:
2
- FMT:
- FMT_MSA.1:
8
- FMT_MTD:
12
- FMT_SMF:
20
- FMT_SMR.1:
12
- FMT_SMF.1:
6
- FMT_MTD.1:
3
- FMT_MSA.1.1:
1
- FMT_MTD.1.1:
2
- FMT_SMF.1.1:
2
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_MSA.3:
1
- FPT:
- FPT_FLS.1:
9
- FPT_RCV.4:
8
- FPT_PHP.1:
8
- FPT_RCV.4.1:
2
- FPT_FLS.1.1:
1
- FPT_PHP.1.1:
1
- FPT_PHP.1.2:
1
|
pdf_data/st_keywords/cc_sfr/FAU |
- FAU_ARP: 4
- FAU_SAA: 4
- FAU_GEN:
1
- FAU_ARP.1: 2
- FAU_SAA.1: 3
|
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FCS |
- FCS_CKM.1:
3
- FCS_CKM: 9
- FCS_CKM.4:
5
- FCS_COP.1:
9
- FCS_COP: 10
- FCS_CKM.4.1:
1
- FCS_COP.1.1:
1
- FCS_CKM.1.1:
1
- FCS_CKM.2:
1
- FCS_CKM.3: 1
|
- FCS_RNG.1: 15
- FCS_CKM.1:
9
- FCS_CKM.4:
9
- FCS_COP.1:
9
- FCS_RNG: 2
- FCS_RNG.1.1: 3
- FCS_RNG.1.2: 3
- FCS_CKM.1.1:
1
- FCS_CKM.4.1:
1
- FCS_COP.1.1:
1
- FCS_CKM.2:
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 |
3
|
9
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 |
5
|
9
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 |
9
|
9
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP |
- FDP_ACC: 31
- FDP_ACF: 31
- FDP_ETC: 4
- FDP_ITC: 6
- FDP_RIP.1: 5
- FDP_RIP: 3
- FDP_ROL: 3
- FDP_SDI: 9
- FDP_UCT: 9
- FDP_UIT: 15
- FDP_ACC.1:
14
- FDP_ACF.1:
41
- FDP_ETC.1: 2
- FDP_ITC.1:
8
- FDP_RIP.1.1: 1
- FDP_SDI.2: 7
- FDP_UCT.1: 4
- FDP_UIT.1: 11
- FDP_ROL.1: 3
- FDP_UNO.1: 1
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
|
- FDP_ACC.1:
14
- FDP_ACF.1:
13
- FDP_ACC.1.1: 1
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_ITC.1:
2
- FDP_ITC.2: 2
- FDP_IFC.1: 1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 |
14
|
14
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 |
41
|
13
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 |
8
|
2
|
pdf_data/st_keywords/cc_sfr/FIA |
- FIA_AFL.1: 3
- FIA_ATD.1: 3
- FIA_SOS: 3
- FIA_UAU.1:
4
- FIA_UID.1:
8
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1.1: 1
- FIA_UAU.1.1:
2
- FIA_UAU.1.2:
1
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_SOS.2: 3
- FIA_UID: 2
|
- FIA_UAU.1:
7
- FIA_UAU.6: 8
- FIA_SOS.1: 8
- FIA_UAU.2: 9
- FIA_UID.2: 10
- FIA_UAU.1.1:
1
- FIA_UAU.1.2:
1
- FIA_UAU.6.1: 1
- FIA_SOS.1.1: 1
- FIA_UAU.2.1: 1
- FIA_UID.2.1: 1
- FIA_UID.1:
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 |
4
|
7
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.1 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 |
8
|
2
|
pdf_data/st_keywords/cc_sfr/FMT |
- FMT_MOF.1: 6
- FMT_MOF: 3
- FMT_MSA: 23
- FMT_MSA.2: 3
- FMT_MSA.3:
16
- FMT_MTD:
3
- FMT_SMR.1:
5
- FMT_MOF.1.1: 1
- FMT_MSA.1:
9
- FMT_MSA.2.1: 1
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1:
5
- FMT_MTD.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_SMR: 2
|
- FMT_MSA.1:
8
- FMT_MTD:
12
- FMT_SMF: 20
- FMT_SMR.1:
12
- FMT_SMF.1: 6
- FMT_MTD.1:
3
- FMT_MSA.1.1: 1
- FMT_MTD.1.1:
2
- FMT_SMF.1.1: 2
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_MSA.3:
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 |
9
|
8
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 |
16
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD |
3
|
12
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 |
5
|
3
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
5
|
12
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT |
- FPT_EMS: 2
- FPT_AMT.1: 2
- FPT_EMS.1: 5
- FPT_FLS.1:
5
- FPT_FLS: 3
- FPT_ITC: 3
- FPT_ITI: 3
- FPT_PHP.1:
3
- FPT_PHP.3: 3
- FPT_TST: 3
- FPT_TST.1: 9
- FPT_EMS.1.1: 2
- FPT_EMS.1.2: 2
- FPT_FLS.1.1:
1
- FPT_PHP.1.1:
1
- FPT_PHP.1.2:
1
- FPT_PHP.3.1: 1
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FPT_ITC.1: 2
- FPT_ITI.1: 3
|
- FPT_FLS.1:
9
- FPT_RCV.4: 8
- FPT_PHP.1:
8
- FPT_RCV.4.1: 2
- FPT_FLS.1.1:
1
- FPT_PHP.1.1:
1
- FPT_PHP.1.2:
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 |
5
|
9
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.1 |
3
|
8
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.1.2 |
1
|
1
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- Out of scope:
2
- 11 1.5.4.3 Out of scope :
1
- 11 1.5.4.3 Out of scope ........................................................................................... 12 1.5:
1
- from the KRMC to the device. Commands are queued at the KRMC until polled form the device. 1.5.4.3 Out of scope The TOE supports additional features that are not part of the scope: ● Antivirus solution ●:
1
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cipher_mode/CBC/CBC |
4
|
1
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function/SHA |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA2 |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-256 |
2
|
1
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness/RNG |
|
|
pdf_data/st_keywords/randomness/RNG/RNG |
3
|
14
|
pdf_data/st_keywords/side_channel_analysis |
- SCA:
- physical probing:
2
- side channel:
1
- SPA:
3
- DPA:
3
- timing attacks:
1
- FI:
- physical tampering:
4
- malfunction:
2
- fault injection:
1
- other:
|
|
pdf_data/st_keywords/side_channel_analysis/FI |
- physical tampering:
4
- malfunction: 2
- fault injection: 1
|
|
pdf_data/st_keywords/side_channel_analysis/FI/physical tampering |
4
|
3
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS PUB 46-3:
1
- FIPS 180-1:
1
- FIPS180-2:
1
- PKCS:
- BSI:
|
|
pdf_data/st_keywords/standard_id/BSI |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor |
- STMicroelectronics:
- Morpho:
- Philips:
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata |
- pdf_file_size_bytes:
1461696
- pdf_is_encrypted:
False
- pdf_number_of_pages:
104
- /Producer:
Microsoft® Office Word 2007
- /Creator:
Microsoft® Office Word 2007
- /CreationDate:
D:20120125094819
- /ModDate:
D:20120125094819
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
704587
- pdf_is_encrypted:
False
- pdf_number_of_pages:
41
- /Keywords: Security Target, Common Criteria, USB Storage, Encryption, Protected Storage
- /Subject:
- /Title: Kanguru Defender Security Target (version 1.10 as of 2014-10-06)
- /Creator:
Unknown
- /Author: Andreas Siegert (generated by CCTool version 2.8)
- /Producer:
XEP 4.23
- /application: CCTool version x.y
- /Trapped: /False
- /CreationDate:
D:20141006150157Z
- /ModDate:
D:20141006150157Z
- pdf_hyperlinks:
http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R3.pdf
|
pdf_data/st_metadata//CreationDate |
D:20120125094819
|
D:20141006150157Z
|
pdf_data/st_metadata//Creator |
Microsoft® Office Word 2007
|
Unknown
|
pdf_data/st_metadata//ModDate |
D:20120125094819
|
D:20141006150157Z
|
pdf_data/st_metadata//Producer |
Microsoft® Office Word 2007
|
XEP 4.23
|
pdf_data/st_metadata/pdf_file_size_bytes |
1461696
|
704587
|
pdf_data/st_metadata/pdf_hyperlinks |
|
http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R3.pdf |
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
104
|
41
|
dgst |
316b14b844c0b4cc
|
eda06ca3c208ebd0
|