name |
LEO V2 |
Bivio 6310-NC |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
Network and Network-Related Devices and Systems |
scheme |
FR |
US |
status |
archived |
archived |
not_valid_after |
01.09.2019 |
16.01.2020 |
not_valid_before |
19.07.2012 |
25.04.2018 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10873-ci.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2012-37fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10873-vr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2012-37en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10873-st.pdf |
manufacturer |
Ingenico Healthcare/e-ID |
Bivio Networks, Inc. |
manufacturer_web |
https://www.ingenico.com |
|
security_level |
ADV_FSP.4, ALC_FLR.3, AVA_VAN.3, ALC_TAT.1, ADV_IMP.1, EAL3+, ADV_TDS.3 |
{} |
dgst |
33537b8a859fdc32 |
0637218e3f059ee4 |
heuristics/cert_id |
ANSSI-CC-2012/37 |
CCEVS-VR-VID-10873 |
heuristics/cert_lab |
SERMA |
US |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 |
heuristics/extracted_versions |
- |
6310 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
ANSSI-CC-2016/53 |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
ANSSI-CC-2016/53 |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
- category: Network Device
- certification_date: 25.04.2018
- evaluation_facility: UL Verification Services Inc. (Formerly InfoGard)
- expiration_date: 25.04.2020
- id: CCEVS-VR-VID10873
- product: Bivio 6310-NC
- scheme: US
- url: https://www.niap-ccevs.org/product/10873
- vendor: Bivio Networks, Inc.
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
86afa36bc4e78466 |
c7cf611c6bb1e4b0 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-profil_PP-2012-01en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V1.0.pdf |
pdf_data/cert_filename |
|
st_vid10873-ci.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- US:
- CCEVS-VR-VID10873-2018: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
- UL:
- UL Verification Services: 1
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /CreationDate: D:20180501164814-04'00'
- /ModDate: D:20180501164814-04'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 183308
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
ANSSI-CC_2012-37fr.pdf |
st_vid10873-vr.pdf |
pdf_data/report_frontpage |
- FR:
- cc_security_level: EAL3 Augmenté ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ALC_FLR.3, ALC_TAT.1 et AVA.VAN.3
- cc_version: CC version 3.1 révision 3
- cert_id: ANSSI-CC-2012/37
- cert_item: LEO V2
- cert_item_version: Référence PPD001-003-AXY, Version PK08.12
- cert_lab: SERMA Technologies 30 avenue Gustave Eiffel, 33608 Pessac France
- developer: Ingenico Healthcare/e-ID 25 quai Gallieni, 92158 Suresnes Cedex France Commanditaire Ingenico Healthcare/e-ID 25 quai Gallieni, 92158 Suresnes Cedex France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur (.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: PP LSCIHM], version v1.6 Lecteur sécurisé de carte avec interface homme machine
- US:
|
- FR:
- US:
- cert_id: CCEVS-VR-VID10873_2018
- cert_item: Bivio Networks, Inc. Bivio 6310-NC
- cert_lab: US NIAP
|
pdf_data/report_keywords/cc_cert_id |
- FR:
- ANSSI-CC-2011-31: 1
- ANSSI-CC-2012/37: 14
- ANSSI-CC-PP-2012/01: 1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 3+: 1
- EAL 5: 1
- EAL 7: 1
- EAL3: 2
- EAL4: 2
- ITSEC:
|
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_FSP.4: 2
- ADV_IMP: 1
- ADV_IMP.1: 2
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- ADV_TDS.3: 2
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_FLR: 2
- ALC_FLR.3: 2
- ALC_LCD: 1
- ALC_TAT: 1
- ALC_TAT.1: 2
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
- A:
- A.ADMIN_CREDENTIALS_SECURE: 1
- A.LIMITED_FUNCTIONALITY: 1
- A.NO_THRU_TRAFFIC_PROTECTION: 1
- A.PHYSICAL_PROTECTION: 1
- A.REGULAR_UPDATES: 1
- A.TRUSTED_ADMINISTRATOR: 1
- T:
- T.PASSWORD_CRACKING: 1
- T.SECURITY_FUNCTIONALITY_: 2
- T.UNAUTHORIZED_ADMINIST: 1
- T.UNDETECTED_ACTIVITY: 1
- T.UNTRUSTED_COMMUNICAT: 1
- T.UPDATE_COMPROMISE: 1
- T.WEAK_AUTHENTICATION_E: 1
- T.WEAK_CRYPTOGRAPHY: 1
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- UL:
- UL Verification Services: 3
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
- TLS:
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_RSA_WITH_AES_128_CBC_SHA: 1
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
- CVE:
- CVE-2017-5715: 1
- CVE-2017-5753: 1
- CVE-2017-5754: 1
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- RFC:
- RFC 3268: 1
- RFC 5289: 1
- RFC 5424: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- OutOfScope:
- out of scope: 1
- processing network data. There are many such applications, both commercial and open source. It is out of scope for the certification process to include those applications for evaluation, however a standard: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20120720163953+02'00'
- /Creator: PDFCreator Version 0.9.0
- /Keywords:
- /ModDate: D:20120727112114+02'00'
- /Producer: AFPL Ghostscript 8.53
- /Subject:
- /Title:
- pdf_file_size_bytes: 124103
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 13
|
- /CreationDate: D:20180501164738-04'00'
- /ModDate: D:20180501164738-04'00'
- pdf_file_size_bytes: 756379
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 21
|
pdf_data/st_filename |
ANSSI-CC-cible_2012-37en.pdf |
st_vid10873-st.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL3: 2
- EAL3 augmented: 1
- EAL3+: 19
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 2
- ADV_IMP.1: 2
- ADV_TDS.3: 2
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.3: 3
- ALC_LCD.1: 1
- ALC_TAT.1: 2
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
|
- ADV:
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.1: 3
- ALC_CMS.1: 3
- ASE:
- ASE_CCL.1: 7
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FDP:
- FDP_IFC.1: 2
- FDP_IFC.1.1: 3
- FDP_IFF.1: 2
- FDP_IFF.1.1: 3
- FDP_IFF.1.2: 2
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 3
- FDP_IFF.1.5: 3
- FDP_PHP.1.1: 2
- FDP_PHP.1.2: 2
- FDP_RIP: 1
- FDP_RIP.2: 1
- FDP_RIP.2.1: 3
- FMT:
- FPT:
- FPT_PHP: 1
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FTA:
- FTA_TAB: 1
- FTA_TAB.1.1: 3
|
- FAU:
- FAU_GEN.1: 4
- FAU_GEN.1.1: 3
- FAU_GEN.2: 4
- FAU_GEN.2.1: 1
- FAU_STG.1: 4
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG_EXT.1: 4
- FAU_STG_EXT.1.1: 1
- FAU_STG_EXT.1.2: 4
- FAU_STG_EXT.1.3: 12
- FAU_STG_EXT.2: 5
- FAU_STG_EXT.3: 4
- FAU_STG_EXT.3.1: 1
- FCS:
- FCS_CKM.1: 9
- FCS_CKM.1.1: 5
- FCS_CKM.2: 7
- FCS_CKM.2.1: 4
- FCS_CKM.4: 4
- FCS_CKM.4.1: 1
- FCS_COP: 2
- FCS_COP.1: 22
- FCS_COP.1.1: 12
- FCS_RBG_EXT: 1
- FCS_RBG_EXT.1: 4
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 3
- FCS_SSHC_EXT.1: 3
- FCS_SSHC_EXT.1.1: 2
- FCS_SSHC_EXT.1.2: 3
- FCS_SSHC_EXT.1.3: 2
- FCS_SSHC_EXT.1.4: 2
- FCS_SSHC_EXT.1.5: 5
- FCS_SSHC_EXT.1.6: 2
- FCS_SSHC_EXT.1.7: 2
- FCS_SSHC_EXT.1.8: 4
- FCS_SSHC_EXT.1.9: 3
- FCS_SSHS_EXT.1: 3
- FCS_SSHS_EXT.1.1: 1
- FCS_SSHS_EXT.1.2: 2
- FCS_SSHS_EXT.1.3: 2
- FCS_SSHS_EXT.1.4: 2
- FCS_SSHS_EXT.1.5: 3
- FCS_SSHS_EXT.1.6: 2
- FCS_SSHS_EXT.1.7: 2
- FCS_SSHS_EXT.1.8: 2
- FCS_TLSC_EXT.1: 1
- FCS_TLSC_EXT.2: 1
- FCS_TLSS_EXT: 1
- FCS_TLSS_EXT.1: 4
- FCS_TLSS_EXT.1.1: 4
- FCS_TLSS_EXT.1.2: 2
- FCS_TLSS_EXT.1.3: 2
- FCS_TLSS_EXT.2.3: 1
- FIA:
- FIA_PMG_EXT.1: 3
- FIA_PMG_EXT.1.1: 2
- FIA_UAU.1: 1
- FIA_UAU.1.1: 1
- FIA_UAU.7: 3
- FIA_UAU.7.1: 2
- FIA_UAU_EXT.2: 3
- FIA_UAU_EXT.2.1: 2
- FIA_UIA_EXT.1: 8
- FIA_UIA_EXT.1.1: 1
- FIA_UIA_EXT.1.2: 1
- FMT:
- FMT_MOF: 5
- FMT_MOF.1: 26
- FMT_MOF.1.1: 13
- FMT_MTD: 4
- FMT_MTD.1: 7
- FMT_MTD.1.1: 1
- FMT_SMF.1: 8
- FMT_SMF.1.1: 2
- FMT_SMR.2: 3
- FMT_SMR.2.1: 2
- FMT_SMR.2.2: 2
- FMT_SMR.2.3: 3
- FPT:
- FPT_APW_EXT.1: 5
- FPT_APW_EXT.1.1: 1
- FPT_APW_EXT.1.2: 1
- FPT_SKP_EXT.1: 4
- FPT_SKP_EXT.1.1: 1
- FPT_STM.1: 4
- FPT_STM.1.1: 1
- FPT_TST_EXT: 1
- FPT_TST_EXT.1: 4
- FPT_TST_EXT.1.1: 3
- FPT_TST_EXT.2: 2
- FPT_TUD_EXT.1: 6
- FPT_TUD_EXT.1.1: 3
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 6
- FPT_TUD_EXT.2: 2
- FPT_TUD_EXT.2.2: 2
- FTA:
- FTA_SSL.3: 6
- FTA_SSL.3.1: 1
- FTA_SSL.4: 6
- FTA_SSL.4.1: 1
- FTA_SSL_EXT.1: 4
- FTA_SSL_EXT.1.1: 1
- FTA_TAB.1: 9
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC.1: 7
- FTP_ITC.1.1: 3
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 2
- FTP_TRP.1: 7
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.USER: 5
- A.USER_DIS: 2
- A.USER_KEYPAD: 1
- A.USER_PIN: 2
- A.USER_UNOBSERVED: 2
- A.USER_USAGE: 1
- O:
- O.HARD_EVIDENT: 7
- O.REVEAL: 5
- O.SIGNAL: 3
- OE:
- OE.MANUAL: 3
- OE.PRIVATE: 2
- OP:
- OP.D_CONTROL: 1
- OP.P_ENTRY: 2
- OP.P_VERIFY: 1
- OSP:
- T:
- T.DIS: 1
- T.PIN_DISCLOSE: 1
- T.PIN_DISCLOSEE: 1
- T.PIN_MODIFY: 2
|
- A:
- A.ADMIN_CREDENTIALS_SECURE: 1
- A.LIMITED_FUNCTIONALITY: 1
- A.NO_THRU_TRAFFIC_PROTECTION: 1
- A.PHYSICAL_PROTECTION: 1
- A.REGULAR_UPDATES: 1
- A.TRUSTED_ADMINISTRATOR: 1
- OE:
- OE.ADMIN_CREDENTIALS_SECURE: 1
- OE.NO_GENERAL_PURPOSE: 1
- OE.NO_THRU_TRAFFIC_PROTECTION: 1
- OE.PHYSICAL: 1
- OE.TRUSTED_ADMIN: 1
- OE.UPDATES: 1
- T:
- T.PASSWORD_CRACKING: 1
- T.SECURITY_FUNCTIONALITY: 2
- T.UNAUTHORIZED_ADMINIST: 1
- T.UNDETECTED_ACTIVITY: 1
- T.UNTRUSTED_COMMUNICA: 1
- T.UPDATE_COMPROMISE: 1
- T.WEAK_AUTHENTICATION_E: 1
- T.WEAK_CRYPTOGRAPHY: 1
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
- UL:
- UL Verification Services: 1
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- AES:
- AES: 14
- AES-128: 2
- AES-256: 2
- AES256: 1
- CAST:
- RC:
- DES:
- constructions:
- MAC:
- HMAC: 12
- HMAC-SHA-256: 2
- HMAC-SHA-384: 2
- HMAC-SHA-512: 2
- miscellaneous:
|
pdf_data/st_keywords/asymmetric_crypto |
|
- ECC:
- FF:
- DH:
- DH: 4
- DHE: 2
- Diffie-Hellman: 13
- DSA:
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- MD:
- RIPEMD:
- SHA:
- SHA1:
- SHA2:
- SHA-2: 1
- SHA-224: 1
- SHA-256: 8
- SHA-384: 6
- SHA-512: 5
- SHA512: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
- IPsec:
- SSH:
- TLS:
- SSL:
- SSL: 3
- SSL 2.0: 1
- SSL 3.0: 1
- SSLv3.0: 1
- TLS:
- TLS: 68
- TLS 1.0: 1
- TLS 1.1: 1
- TLS 1.2: 1
- TLS v1.0: 1
- TLSv1.2: 9
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- NIST:
- NIST P-256: 1
- P-256: 13
- P-384: 4
- P-521: 8
- secp256r1: 3
- secp521r1: 1
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
- TLS_NULL_WITH_NULL_NULL: 1
- TLS_RSA_WITH_AES_128_CBC_SHA: 5
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- FIPS:
- FIPS 140-2: 2
- FIPS 186-4: 4
- FIPS PUB 186-4: 5
- ISO:
- ISO/IEC 10118: 2
- ISO/IEC 14888-3: 1
- ISO/IEC 18031:2011: 3
- ISO/IEC 9796-2: 1
- ISO/IEC 9797-: 1
- NIST:
- NIST SP 800-131A: 2
- NIST SP 800-56B: 1
- NIST SP 800-90A: 1
- NIST SP 800-90B: 1
- SP 800-131A: 1
- SP 800-56A: 1
- SP 800-56B: 1
- PKCS:
- RFC:
- RFC 2986: 2
- RFC 3268: 3
- RFC 3526: 4
- RFC 4251: 2
- RFC 4253: 8
- RFC 5246: 4
- RFC 5280: 5
- RFC 5289: 3
- RFC 5647: 8
- RFC 6668: 2
- RFC2104: 1
- RFC4251: 1
- RFC4868: 1
- RFC5280: 1
- RFC5759: 1
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- Workstation. The PC may be a Microsoft Windows, Mac or Linux OS powered. The security of the PC is out of scope of the TOE. As a Personal Identification Number (also known and referred as ‘PIN’) is required for: 1
- entry functionality can be activated from a software application loaded in the PC (not provided and out of scope of this TOE), and used in conjunction with a secure smartcard (not provided and out of scope of: 1
- not provided and out of scope of this TOE: 2
- out of scope: 3
|
- OutOfScope:
- indicated as “REQUIRED” but not listed in the later elements of this component are implemented is out of scope of the assurance activity for this requirement. Assurance Activity TSS The evaluator shall check to: 1
- indicated as “REQUIRED” but not listed in the later elements of this component are implemented is out of scope of the assurance activity for this requirement. FCS_SSHS_EXT.1.2 The TSF shall ensure that the SSH: 1
- out of scope: 3
- processing network data. There are many such applications, both commercial and open source. It is out of scope for this certification process to include all these applications for evaluation, so a standard: 1
|
pdf_data/st_metadata |
|
|
state/cert/convert_garbage |
False |
True |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |