Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
VMware Workspace ONE Unified Endpoint Management Version 1907
CCEVS-VR-VID-11026-2020
Infineon Security Controller M7892 Design Steps D11 and G12, with specific IC dedicated firmware and optional software
BSI-DSZ-CC-0891-V3-2018
name VMware Workspace ONE Unified Endpoint Management Version 1907 Infineon Security Controller M7892 Design Steps D11 and G12, with specific IC dedicated firmware and optional software
category Mobility ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme US DE
not_valid_after 25.03.2022 09.01.2023
not_valid_before 25.03.2020 09.01.2018
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11026-ci.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0891V3c_pdf.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11026-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0891V3a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11026-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0891V3b_pdf.pdf
manufacturer VMware Inc. Infineon Technologies AG
manufacturer_web https://www.vmware.com https://www.infineon.com/
security_level {} ALC_FLR.1, EAL6+
dgst 36ff4ffc0144df16 3baaf5793775bb55
heuristics/cert_id CCEVS-VR-VID-11026-2020 BSI-DSZ-CC-0891-V3-2018
heuristics/cert_lab US BSI
heuristics/extracted_sars ASE_TSS.1, ASE_ECD.1, AGD_OPE.1, AVA_VAN.1, ALC_CMC.1, AGD_PRE.1, ASE_REQ.1, ASE_OBJ.1, ALC_CMS.1, ADV_FSP.1, ATE_IND.1, ASE_CCL.1, ASE_INT.1 ATE_DPT.3, ASE_OBJ.2, ADV_ARC.1, AVA_VAN.5, ATE_IND.2, ALC_LCD.1, ALC_CMC.5, ASE_TSS.1, ADV_INT.3, ADV_FSP.5, ADV_TDS.5, ADV_SPM.1, ALC_DVS.2, ADV_IMP.2, ASE_ECD.1, ATE_COV.3, AGD_OPE.1, ATE_FUN.2, ALC_FLR.1, ASE_INT.1, ALC_CMS.5, ASE_SPD.1, ASE_REQ.2, ALC_TAT.3, AGD_PRE.1, ALC_DEL.1, ASE_CCL.1
heuristics/extracted_versions 1907 -
heuristics/report_references/directly_referenced_by {} BSI-DSZ-CC-1034-2019, ANSSI-CC-2019/09, BSI-DSZ-CC-1033-2019, BSI-DSZ-CC-0891-V4-2019, JISEC-CC-CRP-C0648-01-2019, BSI-DSZ-CC-1036-2019, 2017-17-INF-3169, 2017-18-INF-3170, BSI-DSZ-CC-0869-V2-2019, BSI-DSZ-CC-1055-2018, 2017-19-INF-3171, JISEC-CC-CRP-C0649-01-2019
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0891-V2-2016
heuristics/report_references/indirectly_referenced_by {} ANSSI-CC-2020/43-R01, ANSSI-CC-2020/49, BSI-DSZ-CC-1117-2019, BSI-DSZ-CC-1220-2024, 2017-18-INF-3170, BSI-DSZ-CC-1148-V3-2023, BSI-DSZ-CC-1055-2018, ANSSI-CC-2020/42, ANSSI-CC-2020/33, 2021-44-INF-4142, ANSSI-CC-2020/43, NSCIB-CC-146301-CR2, ANSSI-CC-2020/45-R01, BSI-DSZ-CC-1033-V2-2021, 2017-17-INF-3169, 2018-20-INF-4155, BSI-DSZ-CC-1221-2024, BSI-DSZ-CC-1034-2019, BSI-DSZ-CC-0891-V6-2021, ANSSI-CC-2019/09, BSI-DSZ-CC-1033-2019, BSI-DSZ-CC-0891-V7-2024, BSI-DSZ-CC-1112-V2-2021, ANSSI-CC-2020/45, BSI-DSZ-CC-1148-2020, BSI-DSZ-CC-1036-2019, NSCIB-CC-0112113-CR, BSI-DSZ-CC-0869-V2-2019, BSI-DSZ-CC-1147-2020, BSI-DSZ-CC-1147-V3-2023, BSI-DSZ-CC-1147-V2-2023, BSI-DSZ-CC-1219-2024, BSI-DSZ-CC-1112-2020, ANSSI-CC-2020/44-R01, 2021-43-INF-4154, BSI-DSZ-CC-0891-V4-2019, JISEC-CC-CRP-C0648-01-2019, ANSSI-CC-2020/49-R01, ANSSI-CC-2020/44, BSI-DSZ-CC-1211-2023, BSI-DSZ-CC-1034-V2-2021, ANSSI-CC-2020/42-R01, 2017-19-INF-3171, BSI-DSZ-CC-1148-V2-2023, BSI-DSZ-CC-0891-V5-2021, JISEC-CC-CRP-C0649-01-2019
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0891-V2-2016, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0782-2012
heuristics/st_references/directly_referenced_by {} BSI-DSZ-CC-1034-2019, ANSSI-CC-2019/09, BSI-DSZ-CC-1033-2019, BSI-DSZ-CC-0891-V4-2019, BSI-DSZ-CC-1036-2019, 2017-17-INF-3169, 2017-18-INF-3170, BSI-DSZ-CC-0869-V2-2019, 2017-19-INF-3171
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0891-V2-2016
heuristics/st_references/indirectly_referenced_by {} ANSSI-CC-2020/49, 2017-18-INF-3170, ANSSI-CC-2020/42, ANSSI-CC-2020/43, NSCIB-CC-146301-CR2, BSI-DSZ-CC-1033-V2-2021, 2017-17-INF-3169, BSI-DSZ-CC-1034-2019, ANSSI-CC-2019/09, BSI-DSZ-CC-1033-2019, BSI-DSZ-CC-1112-V2-2021, ANSSI-CC-2020/45, BSI-DSZ-CC-1036-2019, NSCIB-CC-0112113-CR, BSI-DSZ-CC-0869-V2-2019, BSI-DSZ-CC-1112-2020, BSI-DSZ-CC-0891-V4-2019, ANSSI-CC-2020/44, BSI-DSZ-CC-1034-V2-2021, 2017-19-INF-3171, BSI-DSZ-CC-1105-2020
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0891-V2-2016
heuristics/protection_profiles 3592dc410b86374c, 36b1d4890baaa7f4 cf0f01bcd7be3e9c
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_mdm_agent_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_mdm_v4.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf
pdf_data/cert_filename st_vid11026-ci.pdf 0891V3c_pdf.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11026-2020: 1
  • DE:
    • BSI-DSZ-CC-0891-V3-2018: 1
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 5: 1
    • EAL 6: 1
    • EAL 6 augmented: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.1: 1
pdf_data/cert_keywords/vendor
  • Infineon:
    • Infineon: 1
    • Infineon Technologies AG: 1
pdf_data/cert_keywords/eval_facility
  • BoozAllenHamilton:
    • Booz Allen Hamilton: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • /CreationDate: D:20200330120335-04'00'
  • /ModDate: D:20200330120335-04'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 182487
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20180129152008+01'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, SmartCard, Protection Profile, Infineon, Security IC"
  • /ModDate: D:20180129154227+01'00'
  • /Producer: LibreOffice 5.2
  • /Subject: Infineon Security Controller M7892 Design Steps D11 and G12, with specific IC dedicated firmware and optional software from Infineon Technologies AG
  • /Title: Certificate BSI-DSZ-CC-0891-V3-2018
  • pdf_file_size_bytes: 443569
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename st_vid11026-vr.pdf 0891V3a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • US:
    • cert_id: CCEVS-VR-VID11026-2020
    • cert_item: VMware Workspace ONE Unified Endpoint Management Version 1907
    • cert_lab: US NIAP
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 6 augmented by ALC_FLR.1
    • cc_version: PP conformant plus product specific extensions Common Criteria Part 2 extended
    • cert_id: BSI-DSZ-CC-0891-V3-2018
    • cert_item: Infineon Security Controller M7892 Design Steps D11 and G12, with specific IC dedicated firmware and optional software
    • cert_lab: BSI
    • developer: Infineon Technologies AG
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11026-2020: 1
  • DE:
    • BSI-DSZ-CC-0891-V2-2016: 3
    • BSI-DSZ-CC-0891-V3-2018: 21
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-: 1
    • BSI-CC-PP-0084-2014: 3
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 2
    • EAL 2+: 1
    • EAL 4: 1
    • EAL 5: 4
    • EAL 5+: 1
    • EAL 6: 5
    • EAL 6 augmented: 3
    • EAL6: 3
    • EAL6 augmented: 3
    • EAL6+: 3
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_CMC.5: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 1
    • ALC_FLR: 3
    • ALC_FLR.1: 5
    • ALC_LCD.1: 1
    • ALC_TAT.3: 1
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_COP.1: 2
  • FPT:
    • FPT_ITT.1: 1
  • FTP:
    • FTP_ITC.1: 1
    • FTP_TRP.1: 2
pdf_data/report_keywords/cc_claims
  • T:
    • T.BACKUP: 1
    • T.MALICIOUS_APPS: 1
    • T.NETWORK_ATTACK: 1
    • T.NETWORK_EAVESDROP: 1
    • T.PHYSICAL_ACCESS: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 2
  • Samsung:
    • Samsung: 4
  • GD:
    • G&D: 1
    • Giesecke & Devrient: 1
  • Infineon:
    • Infineon: 11
    • Infineon Technologies: 1
    • Infineon Technologies AG: 20
pdf_data/report_keywords/eval_facility
  • BoozAllenHamilton:
    • Booz Allen Hamilton: 3
  • TUV:
    • TÜV Informationstechnik: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 5
  • DES:
    • 3DES:
      • 3DES: 1
      • Triple-DES: 2
    • DES:
      • DES: 4
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 2
  • FF:
    • DH:
      • Diffie-Hellman: 1
  • ECC:
    • ECC:
      • ECC: 5
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 1
  • RSA:
    • RSA-2048: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-512: 2
  • SHA:
    • SHA2:
      • SHA-2: 9
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 7
  • VPN:
    • VPN: 1
pdf_data/report_keywords/randomness
  • PRNG:
    • DRBG: 1
  • PRNG:
    • PRNG: 1
  • RNG:
    • RNG: 1
  • TRNG:
    • TRNG: 2
pdf_data/report_keywords/ecc_curve
  • NIST:
    • P-521: 2
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 3
pdf_data/report_keywords/side_channel_analysis
  • SCA:
    • side channel: 1
  • FI:
    • DFA: 3
    • physical tampering: 1
  • SCA:
    • DPA: 3
    • SPA: 3
  • other:
    • JIL: 4
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
    • BSI TR-02102: 1
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 1: 1
    • AIS 14: 1
    • AIS 19: 1
    • AIS 20: 1
    • AIS 23: 1
    • AIS 25: 2
    • AIS 26: 2
    • AIS 31: 2
    • AIS 32: 1
    • AIS 34: 2
    • AIS 35: 2
    • AIS 36: 3
    • AIS 37: 1
    • AIS 38: 1
    • AIS 46: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • addition to the MDM Server. Otherwise, the MDM Agent is provided by the mobile device vendor and is out of scope of this PP; however, MDMs are required to indicate the mobile platforms supported by the MDM Server: 1
    • out of scope: 1
  • ConfidentialDocument:
    • Common Criteria EAL6 augmented / EAL6+ M7892 Design Steps D11 and G12”, Infineon Technologies AG (confidential document) 7 specifically • AIS 1, Version 14, Durchführung der Ortsbesichtigung in der Entwicklungsumgebung: 1
    • Library RSA - EC - SHA-2 – Toolbox – SCL”, Version 2.0, 2017-10-30, Infineon Technologies AG (confidential document) [12] M7892 Security Guidelines, 2017-06-28, Infineon Technologies AG [13] M7892 SOLID FLASH: 1
    • Version 1, 2017-11-29, “Evaluation Technical Report (ETR Summary)”, TÜV Informationstechnik GmbH (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
    • “Evaluation Technical Report for Conmposite Evaluation (ETR Comp)”, TÜV Informationstechnik GmbH (confidential document) [11] Configuration list for the TOE, “Configuration Management Scope for Common Criteria with: 1
pdf_data/report_metadata
  • /CreationDate: D:20200330105118-04'00'
  • /ModDate: D:20200330105118-04'00'
  • pdf_file_size_bytes: 822407
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 27
pdf_data/st_filename st_vid11026-st.pdf 0891V3b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0891-V2-2016: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 4
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 6: 1
    • EAL 6 augmented: 1
    • EAL4+: 1
    • EAL6: 8
    • EAL6 augmented: 5
    • EAL6+: 6
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 8
  • AGD:
    • AGD_OPE.1: 11
    • AGD_PRE.1: 3
  • ALC:
    • ALC_CMC.1: 5
    • ALC_CMS.1: 6
  • ASE:
    • ASE_CCL.1: 15
    • ASE_ECD.1: 11
    • ASE_INT.1: 13
    • ASE_OBJ.1: 5
    • ASE_REQ.1: 11
    • ASE_TSS.1: 6
  • ATE:
    • ATE_IND.1: 6
  • AVA:
    • AVA_VAN.1: 7
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.4: 4
    • ADV_FSP.5: 3
    • ADV_IMP: 1
    • ADV_IMP.1: 2
    • ADV_IMP.2: 2
    • ADV_INT.3: 1
    • ADV_SPM: 2
    • ADV_SPM.1: 6
    • ADV_TDS.5: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.4: 3
    • ALC_CMC.5: 3
    • ALC_CMS: 2
    • ALC_CMS.4: 2
    • ALC_CMS.5: 3
    • ALC_DEL.1: 1
    • ALC_DVS.2: 3
    • ALC_FLR.1: 11
    • ALC_LCD.1: 1
    • ALC_TAT.3: 1
  • ASE:
    • ASE_CCL: 2
    • ASE_CCL.1: 1
    • ASE_ECD: 2
    • ASE_ECD.1: 1
    • ASE_INT: 2
    • ASE_INT.1: 1
    • ASE_OBJ: 2
    • ASE_OBJ.2: 1
    • ASE_REQ: 2
    • ASE_REQ.2: 1
    • ASE_SPD: 2
    • ASE_SPD.1: 1
    • ASE_TSS: 2
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.2: 3
    • ATE_COV.3: 4
    • ATE_DPT.3: 1
    • ATE_FUN.2: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 4
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_ALT_EXT: 14
    • FAU_ALT_EXT.1: 8
    • FAU_ALT_EXT.1.1: 1
    • FAU_ALT_EXT.2: 7
    • FAU_ALT_EXT.2.1: 1
    • FAU_GEN.1: 20
    • FAU_GEN.1.1: 4
    • FAU_GEN.1.2: 3
    • FAU_NET_EXT.1: 6
    • FAU_NET_EXT.1.1: 1
    • FAU_SAR.1: 7
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SEL.1: 7
    • FAU_SEL.1.1: 1
    • FAU_STG_EXT.1: 6
    • FAU_STG_EXT.1.1: 1
  • FCO:
    • FCO_CPC_EXT.1: 9
    • FCO_CPC_EXT.1.1: 1
    • FCO_CPC_EXT.1.2: 1
    • FCO_CPC_EXT.1.3: 1
  • FCS:
    • FCS_CKM.1: 7
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 6
    • FCS_CKM.2.1: 1
    • FCS_CKM_EXT.4: 6
    • FCS_CKM_EXT.4.1: 1
    • FCS_CKM_EXT.4.2: 1
    • FCS_COP.1: 26
    • FCS_COP.1.1: 4
    • FCS_RBG_EXT.1: 7
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
    • FCS_STG_EXT.1: 13
    • FCS_STG_EXT.1.1: 2
  • FIA:
    • FIA_ENR_EXT: 17
    • FIA_ENR_EXT.1: 5
    • FIA_ENR_EXT.2: 8
    • FIA_ENR_EXT.2.1: 1
    • FIA_UAU.1: 6
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
  • FMT:
    • FMT_MOF.1: 21
    • FMT_MOF.1.1: 3
    • FMT_POL_EXT.1: 6
    • FMT_POL_EXT.1.1: 1
    • FMT_POL_EXT.2: 8
    • FMT_POL_EXT.2.1: 1
    • FMT_POL_EXT.2.2: 1
    • FMT_SMF.1: 46
    • FMT_SMF.1.1: 5
    • FMT_SMF_EXT.4: 9
    • FMT_SMF_EXT.4.1: 1
    • FMT_SMF_EXT.4.2: 1
    • FMT_SMR.1: 15
    • FMT_SMR.1.1: 3
    • FMT_SMR.1.2: 2
    • FMT_UNR_EXT.1: 6
    • FMT_UNR_EXT.1.1: 2
  • FPT:
    • FPT_API_EXT.1: 6
    • FPT_API_EXT.1.1: 1
    • FPT_ITT.1: 13
    • FPT_ITT.1.1: 1
    • FPT_LIB_EXT.1: 6
    • FPT_LIB_EXT.1.1: 1
    • FPT_TST_EXT.1: 8
    • FPT_TST_EXT.1.1: 1
    • FPT_TST_EXT.1.2: 1
    • FPT_TUD_EXT.1: 8
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
  • FTA:
    • FTA_TAB.1: 8
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_ITC.1: 8
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_ITC_EXT.1: 6
    • FTP_ITC_EXT.1.1: 1
    • FTP_TRP.1: 20
    • FTP_TRP.1.1: 2
    • FTP_TRP.1.2: 2
    • FTP_TRP.1.3: 2
  • FAU:
    • FAU_GEN: 1
    • FAU_SAS: 4
    • FAU_SAS.1: 10
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_CKM: 66
    • FCS_CKM.1: 31
    • FCS_CKM.2: 4
    • FCS_CKM.4: 31
    • FCS_COP: 78
    • FCS_COP.1: 23
    • FCS_RNG: 7
    • FCS_RNG.1: 13
    • FCS_RNG.1.1: 1
    • FCS_RNG.1.2: 1
  • FDP:
    • FDP_ACC: 17
    • FDP_ACC.1: 27
    • FDP_ACC.1.1: 1
    • FDP_ACF: 17
    • FDP_ACF.1: 25
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 16
    • FDP_ITC.1: 26
    • FDP_ITC.2: 26
    • FDP_ITT.1: 18
    • FDP_SDC: 2
    • FDP_SDC.1: 9
    • FDP_SDC.1.1: 1
    • FDP_SDI.1: 15
    • FDP_SDI.1.1: 1
    • FDP_SDI.2: 11
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
  • FIA:
    • FIA_API: 2
    • FIA_API.1: 11
    • FIA_API.1.1: 1
  • FMT:
    • FMT_CKM.4: 1
    • FMT_LIM: 27
    • FMT_LIM.1: 9
    • FMT_LIM.2: 8
    • FMT_MSA.1: 18
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 24
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 15
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 5
  • FPT:
    • FPT_FLS.1: 18
    • FPT_ITT: 3
    • FPT_ITT.1: 14
    • FPT_LIM: 2
    • FPT_LIM.1: 2
    • FPT_PHP.3: 24
    • FPT_TST: 5
    • FPT_TST.1: 11
    • FPT_TST.2: 33
    • FPT_TST.2.1: 2
  • FRU:
    • FRU_FLT.2: 6
pdf_data/st_keywords/cc_claims
  • A:
    • A.COMPONENTS_RUNNING: 1
    • A.CONNECTIVITY: 1
    • A.MDM_SERVER_PLATFORM: 1
    • A.MOBILE_DEVICE_PLATFORM: 1
    • A.PROPER_ADMIN: 1
    • A.PROPER_USER: 1
  • O:
    • O.ACCOUNTABILITY: 1
    • O.APPLY_POLICY: 1
    • O.DATA_PROTECTION_TRANSIT: 1
    • O.INTEGRITY: 1
    • O.MANAGEMENT: 1
    • O.QUALITY: 1
    • O.STORAGE: 1
  • OE:
    • OE.COMPONENTS_RUNNING: 1
    • OE.IT_ENTERPRISE: 1
    • OE.MOBILE_DEVICE_PLATFORM: 1
    • OE.TIMESTAMP: 1
    • OE.WIRELESS_NETWORK: 1
  • T:
    • T.BACKUP: 1
    • T.MALICIOUS_APPS: 1
    • T.NETWORK_ATTACK: 1
    • T.NETWORK_EAVESDROP: 1
    • T.PHYSICAL: 1
    • T.PHYSICAL_ACCESS: 1
  • O:
    • O.AES: 11
    • O.RND: 3
    • O.SHA: 5
    • O.TDES: 10
  • T:
    • T.RND: 1
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 8
  • Samsung:
    • Samsung: 4
  • Infineon:
    • Infineon: 13
    • Infineon Technologies: 4
    • Infineon Technologies AG: 22
pdf_data/st_keywords/eval_facility
  • BoozAllenHamilton:
    • Booz Allen Hamilton: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 4
  • constructions:
    • MAC:
      • HMAC: 6
      • HMAC-SHA-256: 1
      • HMAC-SHA-384: 2
  • AES_competition:
    • AES:
      • AES: 69
  • DES:
    • 3DES:
      • TDES: 41
      • Triple-DES: 4
    • DES:
      • DES: 26
  • constructions:
    • MAC:
      • HMAC: 5
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 4
    • ECDH:
      • ECDH: 4
    • ECDSA:
      • ECDSA: 17
  • FF:
    • DH:
      • DH: 2
    • DSA:
      • DSA: 2
  • ECC:
    • ECC:
      • ECC: 25
    • ECDH:
      • ECDH: 8
    • ECDSA:
      • ECDSA: 26
  • FF:
    • DH:
      • Diffie-Hellman: 10
    • DSA:
      • DSA: 1
  • RSA:
    • RSA-2048: 1
    • RSA2048: 2
    • RSA4096: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 6
      • SHA-384: 5
      • SHA-512: 13
  • SHA:
    • SHA2:
      • SHA-2: 63
      • SHA-256: 4
      • SHA-512: 3
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 2
    • Key agreement: 2
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 49
      • TLS v1.2: 7
  • VPN:
    • VPN: 10
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 7
  • RNG:
    • RBG: 5
  • PRNG:
    • PRNG: 6
  • RNG:
    • RND: 4
    • RNG: 9
  • TRNG:
    • DTRNG: 1
    • TRNG: 11
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 4
  • GCM:
    • GCM: 5
  • CBC:
    • CBC: 16
  • CFB:
    • CFB: 12
  • CTR:
    • CTR: 11
  • ECB:
    • ECB: 17
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 12
    • P-384: 12
    • P-521: 10
  • NIST:
    • B-233: 3
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 4
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 4
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 4
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 4
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 4
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 4
    • TLS_RSA_WITH_AES_256_CBC_SHA256: 4
pdf_data/st_keywords/crypto_library
  • BoringSSL:
    • BoringSSL: 10
  • OpenSSL:
    • OpenSSL: 11
  • Generic:
    • Crypto Library v2.02.010: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 9
    • Malfunction: 8
    • fault induction: 1
  • SCA:
    • DPA: 13
    • Leak-Inherent: 10
    • Physical Probing: 2
    • SPA: 7
    • physical probing: 1
    • side channel: 9
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-02102: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS 140-2: 1
    • FIPS PUB 140-2: 1
    • FIPS PUB 180-4: 5
    • FIPS PUB 186-4: 10
    • FIPS PUB 197: 4
    • FIPS PUB 198-1: 1
  • NIST:
    • NIST SP 800-38A: 3
    • NIST SP 800-38D: 4
    • NIST SP 800-57: 2
    • NIST SP 800-90A: 2
  • RFC:
    • RFC 2560: 4
    • RFC 5246: 8
    • RFC 5280: 6
    • RFC 5289: 20
    • RFC 8017: 3
  • X509:
    • X.509: 6
  • BSI:
    • AIS31: 8
    • AIS32: 6
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS 197: 4
    • FIPS PUB 180-4: 2
    • FIPS PUB 186-4: 2
    • FIPS PUB 197: 2
    • FIPS PUB 800-38: 1
  • ISO:
    • ISO/IEC 10118: 2
    • ISO/IEC 11770-3: 3
    • ISO/IEC 14888-3: 3
    • ISO/IEC 18033: 2
    • ISO/IEC 18092: 4
    • ISO/IEC 9797-1: 2
    • ISO/IEC 9798-2: 1
  • NIST:
    • SP 800-38A: 7
    • SP 800-67: 4
  • PKCS:
    • PKCS#1: 1
  • RFC:
    • RFC 3447: 1
    • RFC 5639: 2
pdf_data/st_keywords/javacard_packages
  • com:
    • com.android: 1
    • com.crashlytics.sdk: 1
    • com.google: 1
    • com.mixpanel: 1
    • com.squareup.picasso: 1
  • java:
    • java.security: 1
  • org:
    • org.apache: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • addition to the MDM Server. Otherwise, the MDM Agent is provided by the mobile device vendor and is out of scope of this PP; however, MDMs are required to indicate the mobile platforms supported by the MDM Server: 1
    • out of scope: 1
  • OutOfScope:
    • SFRs related to the TOE authentication are regarded as not applicable, due to the fact that it is out of scope of the intended use- case and the authentication functionality is no longer available. 1 Bundesamt: 1
    • SFRs related to the TOE authentication are regarded as not applicable, due to the fact that it is out of scope of the intended use-case and the authentication functionality is no longer available. The PP [12: 1
    • out of scope: 3
    • related to the TOE authentication is regarded as not applicable, due to the fact that it is out of scope of the intended use-case and the authentication functionality is no longer available. The following: 1
pdf_data/st_metadata
  • /Author: Dr. Oleg Rudakov
  • /CreationDate: D:20171215122240+01'00'
  • /Creator: Microsoft® Word 2010
  • /Keywords: Infineon, security certification, Smartcard, common criteria, high-security microcontroller
  • /ModDate: D:20171215122240+01'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: BSI-DSZ-CC-0891-V3 Product Security Certification
  • /Title: M7892 D11 and G12 Security Target Lite
  • pdf_file_size_bytes: 1807037
  • pdf_hyperlinks: https://www.bsi.bund.de/, http://www.bsi.bund.de/, http://www.infineon.com/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 115
state/cert/convert_garbage True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different