name |
Motorola RFS7000 RF Switch |
Renesas HD65256D1 Version 02 |
category |
Access Control Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
NO |
DE |
status |
archived |
archived |
not_valid_after |
01.09.2019 |
01.09.2019 |
not_valid_before |
09.07.2009 |
24.03.2010 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20090709_SERTIT-010_CR_v1_0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0529a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/MOTOROLA_ST-v1.5.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0529b_pdf.pdf |
manufacturer |
Motorola, Inc. |
Renesas Technology Corporation |
manufacturer_web |
https://www.motorola.com/ |
https://am.renesas.com/ |
security_level |
ALC_FLR.2, EAL4+ |
ALC_DVS.2, AVA_VLA.4, ADV_IMP.2, EAL4+, AVA_MSU.3 |
dgst |
360053f8c7550b7e |
ac37e8c6afcb4efc |
heuristics/cert_id |
SERTIT-010 |
BSI-DSZ-CC-0529-2010 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ATE_COV.2, AGD_USR.1, ADV_HLD.2, AVA_VLA.2, ATE_DPT.1, ADV_FSP.2, ADV_IMP.1, ALC_FLR.2, ALC_DVS.1, ADV_SPM.1, ALC_TAT.1, ATE_IND.2, AGD_ADM.1, ATE_FUN.1, ADV_RCR.1, AVA_MSU.2, ALC_LCD.1, AVA_SOF.1, ADV_LLD.1 |
ADV_IMP.2, AVA_VLA.4, ADV_SPM.1, ALC_TAT.1, ALC_LCD.1, AVA_MSU.3, ALC_DVS.2 |
heuristics/extracted_versions |
- |
02 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0434-2007, BSI-DSZ-CC-0489-2008 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0353-2006, BSI-DSZ-CC-0489-2008, BSI-DSZ-CC-0434-2007, BSI-DSZ-CC-0329-2006, BSI-DSZ-CC-0350-2007 |
heuristics/scheme_data |
- category: Other Devices and Systems
- certification_date: 09.07.2009
- developer: Motorola, Inc.
- enhanced:
- category: Other Devices and Systems
- cert_id: SERTIT-010
- certification_date: 09.07.2009
- description: SERTIT-010 C
- developer: Motorola, Inc.
- documents: frozendict({'target': [frozendict({'href': 'https://sertit.no/getfile.php/135534-1610011059/SERTIT/Sertifikater/2009/10/MOTOROLA_ST-v1.5.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/134620-1607949745/SERTIT/Sertifikater/2009/10/20090709_SERTIT-010_CR_v1_0.pdf'})]})
- evaluation_facility: Aspect Labs
- level: EAL 4, ALC_FLR.2
- mutual_recognition: CCRA, SOG-IS
- product: HW: RFS7000; SW: RFS7000-1.0.0.0-022GR
- protection_profile: US Government Wireless Local Area Network (WLAN) Access System Protection Profile for Basic Robustness Environments, Version 1.0, April 2006
- sponsor: Motorola, Inc.
- product: Motorola RFS7000 RF Switch
- url: https://sertit.no/certified-products/product-archive/motorola-rfs7000-rf-switch
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
a91e9c889e6f3e47 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_wlan_as_br_v1.0.pdf |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
20090709_SERTIT-010_CR_v1_0.pdf |
0529a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cert_id: BSI-DSZ-CC-0529-2010
- cert_item: Renesas HD65256D1 Version 02
- cert_lab: BSI
- developer: Renesas Technology Corp. sponsored by Renesas Technology Europe Ltd
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0434-2007: 4
- BSI-DSZ-CC-0489-2008: 1
- BSI-DSZ-CC-0529: 2
- BSI-DSZ-CC-0529-2010: 18
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 4: 27
- EAL 4 augmented: 23
- EAL1: 1
- EAL7: 1
|
- EAL:
- EAL 1: 1
- EAL 4: 9
- EAL 4 augmented: 3
- EAL 7: 1
- EAL1: 5
- EAL2: 3
- EAL3: 4
- EAL4: 7
- EAL5: 6
- EAL5+: 1
- EAL6: 3
- EAL7: 4
|
pdf_data/report_keywords/cc_sar |
|
- ACM:
- ACM_AUT: 2
- ACM_AUT.1: 1
- ACM_CAP: 2
- ACM_CAP.4: 1
- ACM_SCP: 2
- ACM_SCP.2: 1
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 1
- ADO_IGS: 2
- ADO_IGS.1: 1
- ADV:
- ADV_FSP: 2
- ADV_HLD: 2
- ADV_IMP: 2
- ADV_IMP.2: 5
- ADV_INT: 2
- ADV_LLD: 2
- ADV_RCR: 2
- ADV_SPM: 2
- AGD:
- ALC:
- ALC_DVS: 2
- ALC_DVS.2: 6
- ALC_FLR: 2
- ALC_LCD: 1
- ALC_LCD.1: 1
- ALC_TAT: 2
- ALC_TAT.1: 1
- APE:
- APE_DES: 1
- APE_ENV: 1
- APE_INT: 1
- APE_OBJ: 1
- APE_REQ: 1
- APE_SRE: 1
- ASE:
- ASE_DES: 1
- ASE_ENV: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_PPC: 1
- ASE_REQ: 1
- ASE_SRE: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 2
- ATE_DPT: 2
- ATE_FUN: 2
- ATE_IND: 2
- AVA:
- AVA_CCA: 2
- AVA_MSU: 2
- AVA_MSU.3: 5
- AVA_SOF: 3
- AVA_VLA: 3
- AVA_VLA.2: 1
- AVA_VLA.3: 1
- AVA_VLA.4: 6
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 1
- FAU_GEN.2: 1
- FAU_SEL.1: 1
- FCS:
- FCS_BCM_EXP.1: 1
- FCS_CKM.1: 1
- FCS_CKM.4: 1
- FCS_CKM_EXP.2: 1
- FCS_COP_EXP.1: 1
- FCS_COP_EXP.2: 1
- FDP:
- FDP_PUD_EXP.1: 1
- FDP_RIP.1: 1
- FIA:
- FIA_AFL.1: 1
- FIA_ATD.1: 1
- FIA_UAU.1: 1
- FIA_UAU_EXP.5: 1
- FIA_UID.2: 1
- FIA_USB.1: 2
- FMT:
- FMT_MOF.1: 3
- FMT_MSA.2: 1
- FMT_MTD.1: 2
- FMT_SMF.1: 3
- FMT_SMR.1: 1
- FPT:
- FPT_RVM.1: 1
- FPT_SEP.1: 1
- FPT_STM_EXP.1: 1
- FPT_TST_EXP.1: 1
- FPT_TST_EXP.2: 1
- FTA:
- FTA_SSL.3: 1
- FTA_TAB.1: 1
- FTP:
- FTP_ITC_EXP.1: 1
- FTP_TRP.1: 1
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Infineon:
- Infineon Technologies AG: 1
- Philips:
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
- BSI TR-02102: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2005-08-001: 1
- CCMB-2005-08-002: 1
- CCMB-2005-08-003: 1
- CCMB-2005-08-004: 1
- FIPS:
|
- BSI:
- AIS 25: 3
- AIS 26: 3
- AIS 31: 2
- AIS 32: 1
- AIS 34: 3
- AIS 35: 2
- AIS 38: 1
- AIS31: 1
- AIS37: 1
- ISO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- 02 (HD65256D1), Brightsight (confidential document) [8] Configuration list for the TOE, Version 0.6.6, 22 July 2009, Document Version for the Common: 1
- 5.0, 14 July 2009, HD65256D1 Version 02 Smartcard Security Target, Renesas Technology Corp. (confidential document) [7] Evaluation Technical Report, Version 3.0, 8 February 2010, Evaluation Technical Report AE56D1: 1
- confidential document) [9] Security Target BSI-DSZ-CC-0529, Version 2.0, 14 July 2009, HD65256D1 Version 02 Smartcard: 1
|
pdf_data/report_metadata |
- /Author: ragea
- /CR issue: 1.0
- /CRNumber: 010
- /Company: SERTIT
- /CreationDate: D:20090709131957+02'00'
- /Creator: Acrobat PDFMaker 8.1 for Word
- /Day Month Year: 9 July 2009
- /Developers name: Motorola, Inc.
- /EAL: EAL 4 augmented with ALC_FLR.2
- /ETR date final: 28 May 2009
- /Keywords: ugradert
- /ModDate: D:20090709132004+02'00'
- /Name of EVIT: Aspect Labs, a division of BKP Security, Inc.
- /PP name: US Government Wireless Local Network Access System Protection Profile for Basic Robustness Environments
- /Prod name and version platform: Motorola RFS7000 RF Switch
- /Producer: Adobe PDF Library 8.0
- /Product name: Motorola RFS7000 RF Switch
- /Product version: HW: RFS7000 SW: RFS7000-1.0.0.0-022GR
- /Sponsor name: Motorola, Inc.
- /Title: tittel
- pdf_file_size_bytes: 475259
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 21
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20100413092737+02'00'
- /Creator: Writer
- /Keywords: "Certification, Common Criteria, Renesas HD65256D1 Version 02, Renesas Technology Europe Ltd, Renesas Technology Corp."
- /ModDate: D:20100422145117+02'00'
- /Producer: OpenOffice.org 3.1
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0529-2010
- pdf_file_size_bytes: 370401
- pdf_hyperlinks: http://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 34
|
pdf_data/st_filename |
MOTOROLA_ST-v1.5.pdf |
0529b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP- 0002: 4
- BSI-PP-0002: 82
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL4: 9
- EAL4 augmented: 2
|
- EAL:
- EAL4: 6
- EAL4 augmented: 2
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_AUT.1: 2
- ACM_CAP.1: 1
- ACM_CAP.2: 1
- ACM_CAP.4: 2
- ACM_SCP.1: 1
- ACM_SCP.2: 2
- ADO:
- ADO_DEL.1: 2
- ADO_DEL.2: 2
- ADO_IGS.1: 3
- ADV:
- ADV_FSP.1: 1
- ADV_FSP.2: 2
- ADV_HLD.1: 1
- ADV_HLD.2: 2
- ADV_IMP.1: 2
- ADV_LLD.1: 2
- ADV_RCR.1: 6
- ADV_SPM.1: 3
- AGD:
- AGD_ADM.1: 6
- AGD_USR.1: 3
- ALC:
- ALC_DVS.1: 2
- ALC_FLR.2: 8
- ALC_LCD.1: 2
- ALC_TAT.1: 2
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 2
- ATE_DPT.1: 2
- ATE_FUN.1: 2
- ATE_IND.2: 4
- AVA:
- AVA_MSU.1: 2
- AVA_MSU.2: 2
- AVA_SOF.1: 5
- AVA_VLA.1: 3
- AVA_VLA.2: 2
|
- ACM:
- ACM_AUT: 1
- ACM_CAP: 1
- ACM_SCP: 1
- ADO:
- ADV:
- ADV_FSP: 2
- ADV_HLD: 1
- ADV_IMP: 1
- ADV_IMP.2: 2
- ADV_LLD: 1
- ADV_RCR: 1
- ADV_SPM: 1
- ADV_SPM.1: 4
- AGD:
- ALC:
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_LCD: 1
- ALC_TAT: 1
- AVA:
- AVA_MSU: 1
- AVA_MSU.3: 2
- AVA_SOF: 6
- AVA_VLA: 1
- AVA_VLA.4: 1
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 23
- FAU_GEN.1.1: 4
- FAU_GEN.1.2: 2
- FAU_GEN.2: 10
- FAU_SAR.1: 8
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 5
- FAU_SAR.2.1: 1
- FAU_SAR.3: 5
- FAU_SAR.3.1: 1
- FAU_SEL.1: 7
- FAU_SEL.1.1: 1
- FAU_STG: 1
- FAU_STG.1: 4
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 6
- FAU_STG.3.1: 1
- FCS:
- FCS_BCM_EXP.1: 11
- FCS_BCM_EXP.1.1: 1
- FCS_BCM_EXP.1.2: 1
- FCS_BCM_EXP.1.3: 1
- FCS_CKM: 1
- FCS_CKM.1: 16
- FCS_CKM.2: 5
- FCS_CKM.4: 15
- FCS_CKM_EXP.2: 16
- FCS_CKM_EXP.2.1: 1
- FCS_COP: 2
- FCS_COP.1: 3
- FCS_COP_EXP.1: 16
- FCS_COP_EXP.1.1: 1
- FCS_COP_EXP.2: 23
- FCS_COP_EXP.2.1: 2
- FDP:
- FDP_ACC.1: 1
- FDP_AFC: 1
- FDP_IFC: 1
- FDP_IFC.1: 1
- FDP_PUD: 1
- FDP_PUD_EXP: 2
- FDP_PUD_EXP.1: 8
- FDP_PUD_EXP.1.1: 1
- FDP_PUP_EXP.1: 1
- FDP_RIP.1: 15
- FDP_RIP.1.1: 2
- FIA:
- FIA_AFL.1: 15
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_ATD.1: 15
- FIA_ATD.1.1: 2
- FIA_UAU: 4
- FIA_UAU.1: 16
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.5.1: 1
- FIA_UAU_EXP.5: 14
- FIA_UAU_EXP.5.1: 2
- FIA_UAU_EXP.5.2: 2
- FIA_UID.1: 12
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_UID.2: 11
- FIA_UID.2.1: 1
- FIA_USB.1: 14
- FIA_USB.1.1: 2
- FIA_USB.1.2: 2
- FIA_USB.1.3: 2
- FMT:
- FMT_MOF.1: 29
- FMT_MOF.1.1: 4
- FMT_MSA: 1
- FMT_MSA.1: 1
- FMT_MSA.2: 15
- FMT_MSA.2.1: 1
- FMT_MTD.1: 33
- FMT_MTD.1.1: 5
- FMT_SMF.1: 34
- FMT_SMF.1.1: 5
- FMT_SMR.1: 24
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FPT:
- FPT_RVM.1: 12
- FPT_RVM.1.1: 2
- FPT_SEP.1: 12
- FPT_SEP.1.1: 2
- FPT_SEP.1.2: 2
- FPT_STM: 1
- FPT_STM.1: 10
- FPT_STM.1.1: 1
- FPT_STM_EXP.1: 8
- FPT_STM_EXP.1.1: 1
- FPT_TST.1: 1
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST_EXP.1: 9
- FPT_TST_EXP.1.1: 1
- FPT_TST_EXP.1.2: 1
- FPT_TST_EXP.1.3: 1
- FPT_TST_EXP.2: 8
- FPT_TST_EXP.2.1: 1
- FPT_TST_EXP.2.2: 1
- FTA:
- FTA_SSL.3: 8
- FTA_SSL.3.1: 1
- FTA_TAB.1: 5
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC: 1
- FTP_ITC.1: 3
- FTP_ITC_EXP.1: 17
- FTP_ITC_EXP.1.1: 3
- FTP_ITC_EXP.1.2: 2
- FTP_ITC_EXP.1.3: 2
- FTP_TRP.1: 8
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_GEN.1: 1
- FAU_SAS.1: 9
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM.1: 11
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 11
- FCS_CKM.4.1: 1
- FCS_COP.1: 19
- FCS_COP.1.1: 2
- FCS_RND: 1
- FCS_RND.1: 9
- FCS_RND.1.1: 1
- FDP:
- FDP_ACC.1: 19
- FDP_ACC.1.1: 2
- FDP_ACF.1: 16
- FDP_ACF.1.1: 3
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 17
- FDP_IFC.1.1: 1
- FDP_IFF.1: 1
- FDP_ITC.1: 12
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITT.1: 10
- FDP_ITT.1.1: 1
- FDP_SDI.1: 1
- FMT:
- FMT_LIM: 1
- FMT_LIM.1: 10
- FMT_LIM.1.1: 1
- FMT_LIM.2: 10
- FMT_LIM.2.1: 1
- FMT_MSA.1: 2
- FMT_MSA.2: 14
- FMT_MSA.2.1: 1
- FMT_MSA.3: 6
- FMT_SMR.1: 1
- FPT:
- FPT_AMT.1: 1
- FPT_FLS.1: 30
- FPT_FLS.1.1: 1
- FPT_ITT.1: 9
- FPT_ITT.1.1: 1
- FPT_PHP.3: 12
- FPT_PHP.3.1: 1
- FPT_SEP.1: 11
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FRU:
- FRU_FLT.1: 1
- FRU_FLT.2: 15
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMINISTRATION: 1
- A.NO_EVIL: 1
- A.NO_GENERAL_P: 1
- A.NO_GENERAL_PURPOSE: 1
- A.PHYSICAL: 1
- A.TOE_NO_BYPASS: 1
- O:
- O.ACCESS: 1
- O.ADMIN_GUIDANCE: 6
- O.AUDIT_GENERATION: 4
- O.CONFIGURATION_: 4
- O.CONFIGURATION_IDENTIF: 2
- O.CORRECT_: 3
- O.CORRECT_TSF_OPERATION: 1
- O.CRYPTOGRAPHY: 8
- O.CRYPTOGRAPHY_VAL: 1
- O.CRYPTOGRAPHY_VALID: 2
- O.CRYPTOGRAPHY_VALIDA: 2
- O.CRYPTOGRAPHY_VALIDATED: 1
- O.DISPLAY_BANNER: 4
- O.DOCUMENTED_: 2
- O.DOCUMENTED_DESIG: 1
- O.DOCUMENTED_DESIGN: 3
- O.MANAGE: 10
- O.MEDIATE: 6
- O.PARTIAL_: 1
- O.PARTIAL_FUNCTIONA: 1
- O.PARTIAL_FUNCTIONAL_: 2
- O.PARTIAL_FUNCTIONAL_T: 2
- O.RESIDUAL_: 5
- O.RESIDUAL_INFORMATIO: 1
- O.RESIDUAL_INFORMATION: 4
- O.SELF_PROTECTION: 6
- O.TIME_STAMPS: 4
- O.TOE_ACCESS: 10
- O.VULNERABILITY_: 5
- O.VULNERABILITY_ANALYSI: 3
- O.VULNERABILITY_ANALYSIS: 1
- OE:
- OE.ADMIN: 1
- OE.AUDIT_PROTECTION: 4
- OE.AUDIT_REVIEW: 4
- OE.MANAGE: 8
- OE.NO_EVIL: 7
- OE.NO_GENERAL_PURP: 1
- OE.NO_GENERAL_PURPO: 1
- OE.NO_GENERAL_PURPOS: 1
- OE.NO_GENERAL_PURPOSE: 2
- OE.PHYSICAL: 3
- OE.PROTECT_MGMT_CO: 1
- OE.PROTECT_MGMT_COM: 1
- OE.PROTECT_MGMT_COMM: 1
- OE.PROTECT_MGMT_COMMS: 1
- OE.RESIDUAL_INFORMA: 1
- OE.RESIDUAL_INFORMATI: 3
- OE.RESIDUAL_INFORMATIO: 2
- OE.RESIDUAL_INFORMATION: 1
- OE.SELF_PROTECTION: 6
- OE.TIME_STAMPS: 4
- OE.TOE_ACCESS: 8
- OE.TOE_NO_BYPASS: 7
- T:
- T.ACCIDENTAL_: 1
- T.ACCIDENTAL_ADMIN_: 2
- T.ACCIDENTAL_CRYPTO_COM: 1
- T.MASQUERADE: 2
- T.POOR_DESIGN: 2
- T.POOR_IMPLEMENTATION: 2
- T.POOR_TEST: 2
- T.RESIDUAL_DATA: 2
- T.SIGNAL_DETECT: 1
- T.TSF_COMPROMISE: 2
- T.UNATTENDED_: 1
- T.UNATTENDED_SESSION: 1
- T.UNAUTHORIZED_: 1
- T.UNAUTH_ADMIN_ACCESS: 2
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 2
- Malfunction: 15
- malfunction: 5
- physical tampering: 1
- SCA:
- DPA: 2
- Leak-Inherent: 16
- Physical Probing: 2
- Physical probing: 1
- physical probing: 4
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2005-08-001: 1
- CCMB-2005-08-002: 1
- CCMB-2005-08-003: 1
- FIPS:
- FIPS 140: 1
- FIPS 140-1: 1
- FIPS 140-2: 13
- FIPS PUB 140-2: 1
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- is also a part of TOE. But in the case of the package includes another chip, another chip is out of scope of the TOE. The package type is listed in section 2.1.1. 1.3 ST Overview This document is the ST: 1
- out of scope: 1
|
pdf_data/st_metadata |
- /Author: User
- /CreationDate: D:20090520174815
- /Creator: Pdf995
- /Keywords:
- /ModDate: D:20090520174815
- /Producer: GPL Ghostscript 8.15
- /Subject:
- /Title:
- pdf_file_size_bytes: 546993
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 85
|
- /Author: Renesas Electronics Corporation
- /CreationDate: D:20090714085001+09'00'
- /Creator: クセロPDF v1.14 Rev0495
- /Keywords: HD65256D1, Common Criteria Certification, Security Controller, Security Target, EAL4+
- /ModDate: D:20100422104451+01'00'
- /Producer: Xelo PDF Library
- /Subject: Common Criteria Certification BSI-DSZ-CC-0529-2010
- /Title: HD65256D1 Version 02 Smartcard Security Target -Public Version-
- pdf_file_size_bytes: 953247
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 62
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |