Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Lockswitch Bluetooth Access Control System
ISCB-5-RPT-C081-CR-v1
Cisco Aggregation Services Router (ASR) 1000 Series running IOS XE version 2.4.2t
CCEVS-VR-10361-2011
name Lockswitch Bluetooth Access Control System Cisco Aggregation Services Router (ASR) 1000 Series running IOS XE version 2.4.2t
category Access Control Devices and Systems Boundary Protection Devices and Systems
scheme MY US
not_valid_after 24.08.2022 01.11.2014
not_valid_before 24.08.2017 27.06.2011
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C081-CR-v1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10361-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Lockswitch%20Bluetooth%20Access%20Control%20System%20Security%20Target%20v1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10361-st.pdf
manufacturer Lockswitch Sdn Bhd Cisco Systems, Inc.
manufacturer_web https://www.lockswitch.io https://www.cisco.com
security_level EAL2 EAL4+, ALC_FLR.2
dgst 322cbfb5eac5b3b9 4faedf83e4faff5c
heuristics/cert_id ISCB-5-RPT-C081-CR-v1 CCEVS-VR-10361-2011
heuristics/cert_lab [] US
heuristics/cpe_matches {} cpe:2.3:o:cisco:ios_xe:2.4.2:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2023-20056, CVE-2017-6739, CVE-2015-6282, CVE-2016-6415, CVE-2012-4623, CVE-2017-6738, CVE-2017-6742, CVE-2013-6981, CVE-2023-20097, CVE-2018-0188, CVE-2017-6741, CVE-2011-3282, CVE-2021-1616, CVE-2020-3444, CVE-2018-0194, CVE-2013-6692, CVE-2013-5472, CVE-2011-3274, CVE-2021-1382, CVE-2018-0184, CVE-2021-1625, CVE-2013-5475, CVE-2018-0182, CVE-2012-0381, CVE-2018-0190, CVE-2017-12228, CVE-2018-0185, CVE-2012-0384, CVE-2019-16009, CVE-2016-1409, CVE-2018-0195, CVE-2018-0193, CVE-2018-0189, CVE-2023-20076, CVE-2014-3409, CVE-2013-0149, CVE-2021-1384, CVE-2023-44487, CVE-2017-6737, CVE-2021-34729, CVE-2016-6393, CVE-2018-0186, CVE-2017-6740, CVE-2018-0183, CVE-2017-6743, CVE-2012-0386, CVE-2014-2146, CVE-2024-20271, CVE-2014-3354, CVE-2015-0685, CVE-2011-3272, CVE-2020-3516, CVE-2012-0382, CVE-2017-6736
heuristics/extracted_sars ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 ADV_INT.1, ADV_TDS.3, AVA_VAN.3, ATE_FUN.1, ALC_CMC.4, ADV_IMP.2, AGD_PRE.1, ATE_IND.2, ATE_DPT.1, AGD_USR.1, ALC_LCD.1, ALC_FLR.2, ATE_COV.3, ALC_DVS.1, ALC_TAT.1, ALC_CSC.4, AGD_OPE.1, ALC_CMS.4, ALC_DEL.1, ADV_FSP.4, ADV_ARC.1
heuristics/extracted_versions - 2.4.2
heuristics/scheme_data
  • api_url: https://www.niap-ccevs.org/api/project/product/pcl_products/10361/
  • categories: ['Firewall', ' Router', ' Virtual Private Network']
  • category: Firewall
  • certification_date: 27.06.2011
  • evaluation_facility: Leidos Common Criteria Testing Laboratory
  • expiration_date: 01.11.2014
  • id: CCEVS-VR-VID10361
  • product: Cisco Aggregation Services Router (ASR) 1000 Series running IOS XE version 2.4.2t
  • scheme: US
  • url: https://www.niap-ccevs.org/products/10361
  • vendor: Cisco Systems, Inc.
pdf_data/report_filename ISCB-5-RPT-C081-CR-v1.pdf st_vid10361-vr.pdf
pdf_data/report_frontpage
  • US:
  • US:
    • cert_id: CCEVS-VR-10361-2011
    • cert_item: Cisco Systems, Inc, 170 West Tasman Dr., San Jose, CA 95134 Aggregation Services Router (ASR) 1000 Series
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • MY:
    • ISCB-5-RPT-C081-CR-v1: 30
  • US:
    • CCEVS-VR-10361-2011: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 9
  • EAL:
    • EAL 4: 9
    • EAL 4 augmented: 2
    • EAL4: 2
    • EAL4 augmented: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 5
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 1
  • FDP:
    • FDP_ACC.1: 2
  • FIA:
    • FIA_ATD: 2
    • FIA_UID.2: 1
  • FMT:
    • FMT_MSA.1: 1
    • FMT_MTD: 2
    • FMT_SMF.1: 1
  • FPT:
    • FPT_PHP.2: 1
  • FTA:
    • FTA_SSL.2: 1
  • FTP:
    • FTP_TRP.1: 1
  • FCS:
    • FCS_CKM.1: 2
    • FCS_CKM.4: 1
    • FCS_COP.1: 4
  • FPT:
    • FPT_FLS: 1
pdf_data/report_keywords/vendor
  • Cisco:
    • Cisco: 103
    • Cisco Systems: 2
    • Cisco Systems, Inc: 2
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
pdf_data/report_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 3
  • MAC:
    • MAC: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 3
  • SSH:
    • SSHv2: 11
  • VPN:
    • VPN: 14
pdf_data/report_keywords/randomness
  • PRNG:
    • PRNG: 2
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • physical tampering: 3
  • SCA:
    • SPA: 14
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 18045: 2
    • ISO/IEC15408: 2
  • FIPS:
    • FIPS 140-2: 2
  • NIST:
    • SP 800-56: 2
pdf_data/report_metadata
  • /Author: Tammy Compton
  • /CreationDate: D:20110706125258
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20110706125258
  • /Producer: Microsoft® Office Word 2007
  • /Title: Validation Report for N7K
  • pdf_file_size_bytes: 315972
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 21
pdf_data/st_filename Lockswitch Bluetooth Access Control System Security Target v1.0.pdf st_vid10361-st.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 8
  • EAL:
    • EAL4: 4
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
  • ASE:
    • ASE_CCL.1: 4
    • ASE_ECD.1: 1
    • ASE_INT.1: 4
    • ASE_OBJ.2: 4
    • ASE_REQ.2: 7
    • ASE_SPD.1: 4
    • ASE_TSS.1: 4
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 19
    • ADV_FSP.4: 3
    • ADV_IMP.1: 3
    • ADV_IMP.2: 2
    • ADV_INT.1: 1
    • ADV_TDS.3: 11
  • AGD:
    • AGD_OPE.1: 10
    • AGD_PRE.1: 8
    • AGD_USR.1: 2
  • ALC:
    • ALC_CMC.4: 6
    • ALC_CMS.4: 5
    • ALC_CSC.4: 1
    • ALC_DEL.1: 5
    • ALC_DVS.1: 6
    • ALC_FLR.2: 9
    • ALC_LCD.1: 6
    • ALC_TAT.1: 5
  • ATE:
    • ATE_COV.2: 4
    • ATE_COV.3: 3
    • ATE_DPT: 1
    • ATE_DPT.1: 7
    • ATE_FUN.1: 5
    • ATE_IND.2: 5
  • AVA:
    • AVA_VAN.3: 12
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 6
    • FAU_SAR.1: 4
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
  • FDP:
    • FDP_ACC.1: 13
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 11
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 2
    • FDP_IFF: 2
  • FIA:
    • FIA_ATD: 11
    • FIA_UAU.1: 3
    • FIA_UAU.2: 6
    • FIA_UAU.2.1: 2
    • FIA_UID.1: 4
    • FIA_UID.2: 6
    • FIA_UID.2.1: 2
  • FMT:
    • FMT_MOF.1: 8
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 7
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 8
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD: 13
    • FMT_SMF.1: 13
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 21
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_PHP.1: 1
    • FPT_PHP.2: 5
    • FPT_PHP.2.1: 1
    • FPT_PHP.2.2: 1
    • FPT_PHP.2.3: 1
    • FPT_STM.1: 1
    • FPT_TRP.1: 1
  • FTA:
    • FTA_SSL.2: 6
    • FTA_SSL.2.1: 1
    • FTA_SSL.2.2: 1
  • FTP:
    • FTP_TRP.1: 4
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_ARP: 4
    • FAU_ARP.1: 9
    • FAU_ARP.1.1: 1
    • FAU_ARP_ACK.1: 1
    • FAU_GEN: 5
    • FAU_GEN.1: 16
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 9
    • FAU_GEN.2.1: 1
    • FAU_SAA: 5
    • FAU_SAA.1: 8
    • FAU_SAA.1.1: 1
    • FAU_SAA.1.2: 1
    • FAU_SAR: 1
    • FAU_SAR.1: 14
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 9
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 10
    • FAU_SAR.3.1: 1
    • FAU_SEL: 3
    • FAU_SEL.1: 8
    • FAU_SEL.1.1: 1
    • FAU_STG: 3
    • FAU_STG.1: 9
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 2
    • FAU_STG.3: 8
    • FAU_STG.3.1: 1
    • FAU_UAU.1: 1
    • FAU_UID.2: 1
  • FCS:
    • FCS_CKM.1: 45
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 13
    • FCS_CKM.2.1: 1
    • FCS_CKM.4: 31
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 57
    • FCS_COP.1.1: 5
  • FDP:
    • FDP_ACC.1: 4
    • FDP_ACF.1: 1
    • FDP_IFC: 1
    • FDP_IFC.1: 51
    • FDP_IFC.1.1: 3
    • FDP_IFF: 1
    • FDP_IFF.1: 41
    • FDP_IFF.1.1: 3
    • FDP_IFF.1.2: 4
    • FDP_IFF.1.3: 3
    • FDP_IFF.1.4: 3
    • FDP_IFF.1.5: 3
    • FDP_IFF.1.6: 3
    • FDP_ITC.1: 6
    • FDP_ITC.2: 6
    • FDP_RIP.2: 12
    • FDP_RIP.2.1: 1
  • FIA:
    • FIA_AFL: 2
    • FIA_AFL.1: 9
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 3
    • FIA_ATD.1: 17
    • FIA_ATD.1.1: 2
    • FIA_UAU.1: 12
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.2: 13
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 3
    • FIA_UID.2: 13
    • FIA_UID.2.1: 1
    • FIA_USB.1: 12
  • FMT:
    • FMT_MOF.1: 76
    • FMT_MOF.1.1: 8
    • FMT_MSA: 1
    • FMT_MSA.1: 28
    • FMT_MSA.1.1: 3
    • FMT_MSA.2: 3
    • FMT_MSA.3: 29
    • FMT_MSA.3.1: 3
    • FMT_MSA.3.2: 3
    • FMT_MTD.1: 48
    • FMT_MTD.1.1: 4
    • FMT_MTD.2: 28
    • FMT_MTD.2.1: 3
    • FMT_MTD.2.2: 3
    • FMT_REV.1: 10
    • FMT_REV.1.1: 1
    • FMT_REV.1.2: 1
    • FMT_SMF.1: 32
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 18
    • FMT_SMR.2: 34
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_FLS.1: 9
    • FPT_FLS.1.1: 1
    • FPT_ITA.1: 9
    • FPT_ITA.1.1: 1
    • FPT_ITC.1: 9
    • FPT_ITC.1.1: 1
    • FPT_ITI.1: 9
    • FPT_ITI.1.1: 1
    • FPT_ITI.1.2: 1
    • FPT_RCV.1: 10
    • FPT_RCV.1.1: 1
    • FPT_RCV.2: 9
    • FPT_RCV.2.1: 1
    • FPT_RCV.2.2: 1
    • FPT_RPL.1: 11
    • FPT_RPL.1.1: 1
    • FPT_RPL.1.2: 1
    • FPT_RSA.1: 1
    • FPT_STM.1: 15
    • FPT_STM.1.1: 1
    • FPT_TDC.1: 6
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TRP: 1
    • FPT_TST: 1
    • FPT_TST.1: 26
    • FPT_TST.1.1: 2
    • FPT_TST.1.2: 2
    • FPT_TST.1.3: 2
  • FRU:
    • FRU_RSA.1: 28
    • FRU_RSA.1.1: 2
  • FTA:
    • FTA_SSL: 2
    • FTA_SSL.1: 11
    • FTA_SSL.1.1: 2
    • FTA_SSL.1.2: 2
    • FTA_SSL.2: 8
    • FTA_SSL.2.1: 1
    • FTA_SSL.2.2: 1
    • FTA_SSL.3: 10
    • FTA_SSL.3.1: 1
    • FTA_TAB.1: 9
    • FTA_TAB.1.1: 1
    • FTA_TSE.1: 7
    • FTA_TSE.1.1: 3
  • FTP:
    • FTP_ITC: 1
    • FTP_ITC.1: 41
    • FTP_ITC.1.1: 4
    • FTP_ITC.1.2: 4
    • FTP_ITC.1.3: 5
    • FTP_TRP.1: 37
    • FTP_TRP.1.1: 5
    • FTP_TRP.1.2: 5
    • FTP_TRP.1.3: 6
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 2
    • A.PHYSICAL: 3
    • A.PLATFORM: 3
    • A.TIMESTAMP: 3
    • A.USER: 3
  • O:
    • O.ACCESS: 5
    • O.CONFIG: 4
    • O.MANAGE: 4
    • O.NOAUTH: 4
    • O.TOECOM: 4
    • O.USER: 5
  • OE:
    • OE.ADMIN: 3
    • OE.PHYSICAL: 2
    • OE.PLATFORM: 3
    • OE.TIMESTAMP: 2
    • OE.USER: 3
  • T:
    • T.CONFIG: 3
    • T.MANAGEMENT: 3
    • T.TOECOM: 2
    • T.UNAUTHORISED_A: 1
    • T.UNAUTHORISED_AC: 1
  • A:
    • A.AVAILABILI: 1
    • A.AVAILABILITY: 2
    • A.NO_GENER: 1
    • A.NO_GENERAL_PURPOSE: 2
    • A.NO_TOE_BY: 1
    • A.NO_TOE_BYPASS: 2
    • A.PHYSICAL: 3
  • O:
    • O.ADMIN_ROLE: 6
    • O.AUDIT_GENER: 1
    • O.AUDIT_GENERAT: 1
    • O.AUDIT_GENERATION: 4
    • O.AUDIT_PROTEC: 1
    • O.AUDIT_PROTECT: 1
    • O.AUDIT_PROTECTION: 3
    • O.AUDIT_REVIE: 1
    • O.AUDIT_REVIEW: 4
    • O.CHANGE_MAN: 2
    • O.CHANGE_MANA: 1
    • O.CHANGE_MANAGEMENT: 4
    • O.CORRECT_: 6
    • O.CORRECT_TSF_OPERATION: 1
    • O.CRYPTOGRAPH: 4
    • O.CRYPTOGRAPHIC: 1
    • O.CRYPTOGRAPHIC_: 2
    • O.CRYPTOGRAPHIC_FUNCTIONS: 4
    • O.CRYPTOGRAPHY: 1
    • O.CRYPTOGRAPHY_: 2
    • O.CRYPTOGRAPHY_VALIDATED: 1
    • O.DISPLAY_BAN: 2
    • O.DISPLAY_BANNE: 1
    • O.DISPLAY_BANNER: 4
    • O.DOCUMENT_KEY_LEAKAGE: 1
    • O.FUNCTIONAL_TESTING: 1
    • O.HA: 5
    • O.INTEGRITY: 5
    • O.MAINT_MODE: 6
    • O.MANAGE: 6
    • O.MANAGE_INFO: 1
    • O.MANAGE_INFOR: 1
    • O.MEDIATE: 7
    • O.MEDIATE_INFO: 2
    • O.MEDIATE_INFOR: 1
    • O.MEDIATE_INFORMATION_FLOW: 2
    • O.PEER_AUTHEN: 1
    • O.PEER_AUTHENTI: 1
    • O.PEER_AUTHENTICATION: 4
    • O.PEER_AUTHENTICTION: 2
    • O.PROTECT_IN_T: 1
    • O.PROTECT_IN_TR: 1
    • O.PROTECT_IN_TRANSIT: 3
    • O.PROTOCOLS: 5
    • O.REPLAY_DETE: 1
    • O.REPLAY_DETECT: 1
    • O.REPLAY_DETECTION: 5
    • O.RESIDUAL_INF: 6
    • O.RESIDUAL_INFO: 1
    • O.RESIDUAL_INFORMATION: 8
    • O.RESOURCE_SH: 1
    • O.RESOURCE_SHA: 1
    • O.RESOURCE_SHARING: 3
    • O.ROBUST_ADMI: 2
    • O.ROBUST_ADMIN_: 1
    • O.ROBUST_ADMIN_GUIDANCE: 2
    • O.ROBUST_TOE_: 4
    • O.ROBUST_TOE_AC: 1
    • O.ROBUST_TOE_ACCESS: 8
    • O.SELF_PROTECT: 3
    • O.SELF_PROTECTIO: 1
    • O.SELF_PROTECTION: 5
    • O.SOUND_DESIG: 2
    • O.SOUND_DESIGN: 6
    • O.SOUND_IMPLE: 1
    • O.SOUND_IMPLEM: 1
    • O.SOUND_IMPLEMENTATION: 3
    • O.THOROUGH_: 1
    • O.THOROUGH_FU: 2
    • O.THOROUGH_FUNCTIONAL_: 2
    • O.THOROUGH_FUNCTIONAL_TESTING: 2
    • O.TIME_STAMPS: 4
    • O.TRUSTED_PAT: 4
    • O.TRUSTED_PATH: 7
    • O.USER_GUIDAN: 2
    • O.USER_GUIDANCE: 6
    • O.VULNERABILIT: 4
    • O.VULNERABILITY: 1
    • O.VULNERABILITY_ANALYSIS_TEST: 7
  • OE:
    • OE.AVAILABILITY: 2
    • OE.CRYPTANALYTIC: 4
    • OE.NO_GENERAL_PURPO: 1
    • OE.NO_GENERAL_PURPOSE: 1
    • OE.NO_TOE_BYPASS: 2
    • OE.PHYSICAL: 2
  • T:
    • T.ADDRESS_M: 1
    • T.ADDRESS_MASQUERADE: 2
    • T.ADMIN_ERR: 1
    • T.ADMIN_ERROR: 3
    • T.ADMIN_ROG: 1
    • T.ADMIN_ROGUE: 3
    • T.AUDIT_: 1
    • T.AUDIT_COMPROMISE: 2
    • T.CRYPTO_: 1
    • T.CRYPTO_COMPROMISE: 3
    • T.EAVESDROP: 3
    • T.FLAWED_DE: 1
    • T.FLAWED_DESIGN: 2
    • T.FLAWED_IM: 1
    • T.FLAWED_IMPLEMENTATION: 2
    • T.MALICIOUS_: 1
    • T.MALICIOUS_TSF_: 2
    • T.MASQUERA: 1
    • T.MASQUERADE: 2
    • T.NORECOVER: 1
    • T.NORECOVERY: 3
    • T.POOR_TEST: 3
    • T.REPLAY: 3
    • T.RESIDUAL_D: 1
    • T.RESIDUAL_DATA: 2
    • T.RESOURCE_: 1
    • T.RESOURCE_EXHAUSTION: 2
    • T.SPOOFING: 3
    • T.UNATTENDE: 1
    • T.UNATTENDED_SESSION: 2
    • T.UNAUTHORI: 2
    • T.UNAUTHORIZED_ACCESS: 2
    • T.UNAUTHORIZED_PEER: 2
    • T.UNIDENTIFI: 1
    • T.UNIDENTIFIED_ACTIONS: 2
    • T.UNKNOWN_: 1
    • T.UNKNOWN_STATE: 2
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 2
  • STMicroelectronics:
    • STM: 2
  • Cisco:
    • Cisco: 141
    • Cisco Systems, Inc: 2
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 14
  • DES:
    • 3DES:
      • TDEA: 3
      • TDES: 3
  • constructions:
    • MAC:
      • HMAC: 2
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DH: 9
      • Diffie-Hellman: 4
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 9
    • SHA2:
      • SHA-256: 3
      • SHA-384: 3
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key agreement: 1
  • KEX:
    • Key Exchange: 13
  • MAC:
    • MAC: 4
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 5
    • TLS:
      • TLS: 1
  • IKE:
    • IKE: 19
    • IKEv1: 8
  • IPsec:
    • IPsec: 11
  • SSH:
    • SSH: 2
    • SSHv2: 44
  • TLS:
    • TLS:
      • TLS: 3
  • VPN:
    • VPN: 91
pdf_data/st_keywords/randomness
  • PRNG:
    • PRNG: 8
  • RNG:
    • RNG: 10
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • CCM:
    • CCM: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 4
  • SCA:
    • SPA: 13
pdf_data/st_keywords/tee_name
  • other:
    • Trusty: 1
  • IBM:
    • SE: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • FIPS:
    • FIPS 140: 2
    • FIPS 140-2: 38
    • FIPS 180-2: 1
    • FIPS PUB 140-2: 5
  • NIST:
    • NIST SP 800-56: 2
    • NIST SP 800-57: 3
    • SP 800-56: 2
  • PKCS:
    • PKCS#1: 2
    • PKCS#12: 1
    • PKCS#7: 2
  • RFC:
    • RFC 2404: 1
    • RFC 2406: 5
    • RFC 2409: 7
    • RFC 2560: 1
    • RFC 3280: 1
    • RFC 3457: 4
    • RFC 3547: 3
    • RFC 792: 1
    • RFC2409: 2
  • X509:
    • X.509: 3
pdf_data/st_metadata
  • /Author: Ahmad Zuraimi Mohamad
  • /CreationDate: D:20170801091650+08'00'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20170801091650+08'00'
  • /Producer: Microsoft® Word 2016
  • /Subject: SECURITY TARGET
  • /Title: Lockswitch Bluetooth Access Control System
  • pdf_file_size_bytes: 923668
  • pdf_hyperlinks: http://www.commonriteriaportal.org/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 40
  • /Author: Cisco
  • /CreationDate: D:20110706125434
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20110706125434
  • /Producer: Microsoft® Office Word 2007
  • pdf_file_size_bytes: 1521286
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 133
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different