name |
Apple iPadOS 16: iPads |
Java Card Platform Implementation for Infineon on M7892 G12 (SLJ 52GxxyyyzC) V2.0 |
category |
Mobility |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
US |
DE |
status |
active |
archived |
not_valid_after |
10.10.2025 |
13.06.2024 |
not_valid_before |
10.10.2023 |
13.06.2019 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11350-ci.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0869V2c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11350-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0869V2a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11350-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0869V2b_pdf.pdf |
manufacturer |
Apple Inc. |
Oracle Corporation |
manufacturer_web |
https://www.apple.com/ |
https://www.oracle.com |
security_level |
{} |
ALC_DVS.2, EAL5+, AVA_VAN.5 |
dgst |
3a16464616a6f715 |
179ef93627203d9f |
heuristics/cert_id |
CCEVS-VR-VID-11350-2023 |
BSI-DSZ-CC-0869-V2-2019 |
heuristics/cert_lab |
US |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, ALC_TSU_EXT.1, AGD_PRE.1 |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ALC_TAT.2, ADV_TDS.4, ASE_REQ.2, ASE_CCL.1 |
heuristics/extracted_versions |
16 |
2.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
JISEC-CC-CRP-C0649-01-2019, JISEC-CC-CRP-C0648-01-2019 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0869-2015, BSI-DSZ-CC-0891-V3-2018 |
heuristics/report_references/indirectly_referenced_by |
{} |
JISEC-CC-CRP-C0649-01-2019, JISEC-CC-CRP-C0648-01-2019 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0891-V3-2018, BSI-DSZ-CC-0891-V2-2016, BSI-DSZ-CC-0869-2015 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0891-V3-2018 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0891-V2-2016, BSI-DSZ-CC-0891-V3-2018 |
heuristics/protection_profiles |
29ba341b00e9bd10, c40ae795865a0dba, 51729b94f0ac139f, 36b1d4890baaa7f4, f84bb9133ca2c8db, 83014eb399a802f3, 593b939921a117e0 |
9399bd94f9925b16 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_MDF_V3.3.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_WLANC_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_mdm_agent_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_VPN_CLI_v2.4_PP.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PKG_TLS_V1.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD-BIO-v1.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_BT_V1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-profil_PP-2010-03en.pdf |
pdf_data/cert_filename |
st_vid11350-ci.pdf |
0869V2c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID11350-2023: 1
|
- DE:
- BSI-DSZ-CC-0869-V2-2019: 1
- FR:
- ANSSI-CC-PP-2010/03-M01: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
- ANSSI:
- ANSSI-CC-PP-2010/03-M01: 1
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 5: 2
- EAL 5 augmented: 1
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20231011110850-04'00'
- /ModDate: D:20231011110850-04'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 181856
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20190617091942+02'00'
- /Creator: Writer
- /Keywords: Common Criteria, Certification, Zertifizierung, Java Card Platform
- /ModDate: D:20190617092113+02'00'
- /Producer: LibreOffice 5.2
- /Subject: Java Card Platform Implementation for Infineon on M7892 G12 (SLJ 52GxxyyyzC) V2.0
- /Title: Certificate BSI-DSZ-CC-0869-V2-2019
- pdf_file_size_bytes: 414291
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
st_vid11350-vr.pdf |
0869V2a_pdf.pdf |
pdf_data/report_frontpage |
- DE:
- US:
- cert_id: CCEVS-VR-VID11350-2023
- cert_item: Apple iPadOS 16: iPads
- cert_lab: US NIAP
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 5 augmented by ALC_DVS.2 and AVA_VAN.5
- cc_version: PP conformant including optional package EMG plus product specific extensions Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-0869-V2-2019
- cert_item: Java Card Platform Implementation for Infineon on M7892 G12 (SLJ 52GxxyyyzC) V2.0
- cert_lab: BSI
- developer: Oracle Corporation
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Java Card Protection Profile - Open Configuration, Version 3.0, May 2012, ANSSI-CC-PP-2010/03-M01
- US:
|
pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID11350-2023: 1
|
- DE:
- BSI-DSZ-CC-0869-2015: 3
- BSI-DSZ-CC-0869-V2-: 1
- BSI-DSZ-CC-0869-V2-2019: 18
- BSI-DSZ-CC-0891-V3-2018: 5
- FR:
- ANSSI-CC-PP-2010/03-M01: 4
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- ANSSI:
- ANSSI-CC-PP-2010/03-M01: 4
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 2: 2
- EAL 2+: 1
- EAL 4: 1
- EAL 5: 8
- EAL 5 augmented: 3
- EAL 5+: 1
- EAL 6: 1
- EAL5+: 1
|
pdf_data/report_keywords/cc_sar |
|
- AGD:
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 5
- ALC_FLR: 2
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Infineon:
- Infineon: 28
- Infineon Technologies AG: 5
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 5
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
- AES_competition:
- DES:
- constructions:
- miscellaneous:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- fault injection: 1
- malfunction: 1
- SCA:
- other:
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7148: 1
- BSI TR-02102-1: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- BSI:
- AIS 1: 1
- AIS 20: 3
- AIS 25: 3
- AIS 26: 3
- AIS 31: 3
- AIS 32: 1
- AIS 34: 2
- AIS 35: 2
- AIS 36: 7
- AIS 37: 3
- AIS 38: 1
- AIS 46: 3
- AIS20: 1
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- SCP:
- SCP01: 2
- SCP02: 2
- SCP03: 3
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- Infineon on M7892 G12 (SLJ 52GxxyyyzC) V2.0, Version 4, 27 May 2019, TÜV Informationstechnik GmbH (confidential document) [10] Configuration List for BSI-DSZ-CC-0869-V2-2019: Configuration Management Scope for Java Card: 1
- Infineon on M7892 G12 (SLJ 52GxxyyyzC) V2.0, Version 4, 27 May 2019, TÜV Informationstechnik GmbH (confidential document) [19] Certification Report BSI-DSZ-CC-0891-V3-2018 for Infineon Security Controller M7892 Design: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
- firmware and optional software, Version 1, 29 November 2017, TÜV Informationstechnik GmbH (confidential document) [22] SLx 70 Family Production and Personalization User’s Manual, 1 April 2015, Infineon: 1
- for Infineon on M7892 G12 (SLJ 52GxxyyyzC) V2.0, Version 2.6, 24 May 2019, Oracle Corporation (confidential document) [11] AGD_OPE for Java Card Platform Implementation for Infineon on M7892 G12 (SLJ 52GxxyyyzC) V2.0: 1
- for Infineon on M7892 G12 (SLJ 52GxxyyyzC) V2.0, Version 3.6, 22 May 2019, Oracle Corporation (confidential document) [7] Security Target Lite for BSI-DSZ-CC-0869-V2-2019: Security Target Lite for Java Card Platform: 1
- OutOfScope:
- out of scope: 1
- the TOE, but pre-issuance loading of applets is possible. Native code post-issuance downloading is out of scope. The Security Target [6] is the basis for this certification. The TOE fulfills the requirements of: 1
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename |
st_vid11350-st.pdf |
0869V2b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0782-2012-MA-01: 1
- BSI-DSZ-CC-0891-V3-2018: 2
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0084-2014: 1
- BSI-PP-0017-2005: 1
- BSI-PP-0035: 1
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 5: 1
- EAL 5 augmented: 1
- EAL5: 6
- EAL5 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ALC_TSU_EXT.1: 9
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 6
- ADV_FSP.1: 4
- ADV_FSP.2: 2
- ADV_FSP.4: 2
- ADV_FSP.5: 7
- ADV_IMP.1: 9
- ADV_INT.2: 1
- ADV_TDS.1: 2
- ADV_TDS.2: 1
- ADV_TDS.3: 10
- ADV_TDS.4: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 10
- AGD_PRE: 1
- AGD_PRE.1: 6
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.1: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 2
- ALC_DVS.2: 6
- ALC_LCD.1: 3
- ALC_TAT.1: 2
- ALC_TAT.2: 3
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 4
- ASE_INT.1: 5
- ASE_OBJ.2: 3
- ASE_REQ.1: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 3
- ATE_DPT.1: 2
- ATE_FUN.1: 6
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_ALT_EXT.2: 5
- FAU_ALT_EXT.2.1: 2
- FAU_ALT_EXT.2.2: 2
- FAU_GEN: 14
- FAU_GEN.1: 19
- FAU_GEN.1.1: 4
- FAU_GEN.1.2: 5
- FAU_SAR.1: 5
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SEL.1: 5
- FAU_SEL.1.1: 2
- FAU_STG.1: 4
- FAU_STG.1.1: 2
- FAU_STG.1.2: 2
- FAU_STG.4: 4
- FAU_STG.4.1: 2
- FCS:
- FCS_CKM: 29
- FCS_CKM.1: 11
- FCS_CKM.1.1: 2
- FCS_CKM.2: 9
- FCS_CKM_EXT: 1
- FCS_CKM_EXT.1: 7
- FCS_CKM_EXT.1.1: 1
- FCS_CKM_EXT.1.2: 1
- FCS_CKM_EXT.1.3: 1
- FCS_CKM_EXT.2: 7
- FCS_CKM_EXT.2.1: 1
- FCS_CKM_EXT.3: 11
- FCS_CKM_EXT.3.1: 1
- FCS_CKM_EXT.3.2: 3
- FCS_CKM_EXT.4: 5
- FCS_CKM_EXT.4.1: 2
- FCS_CKM_EXT.4.2: 1
- FCS_CKM_EXT.5: 5
- FCS_CKM_EXT.5.1: 1
- FCS_CKM_EXT.5.2: 1
- FCS_CKM_EXT.6: 5
- FCS_CKM_EXT.6.1: 1
- FCS_CKM_EXT.7: 4
- FCS_CKM_EXT.7.1: 1
- FCS_CKM_EXT.8: 6
- FCS_CKM_EXT.8.1: 1
- FCS_COP: 44
- FCS_COP.1: 12
- FCS_RBG_EXT: 21
- FCS_RBG_EXT.1: 19
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FCS_SRV_EXT.1: 5
- FCS_SRV_EXT.1.1: 1
- FCS_STG_EXT.1: 6
- FCS_STG_EXT.1.1: 1
- FCS_STG_EXT.1.2: 1
- FCS_STG_EXT.1.3: 1
- FCS_STG_EXT.1.4: 1
- FCS_STG_EXT.1.5: 1
- FCS_STG_EXT.2: 8
- FCS_STG_EXT.2.1: 2
- FCS_STG_EXT.2.2: 1
- FCS_STG_EXT.3: 7
- FCS_STG_EXT.3.1: 1
- FCS_STG_EXT.3.2: 1
- FCS_STG_EXT.4: 5
- FCS_STG_EXT.4.1: 1
- FCS_TLSC_EXT: 7
- FCS_TLSC_EXT.1: 10
- FCS_TLSC_EXT.1.1: 2
- FCS_TLSC_EXT.1.2: 2
- FCS_TLSC_EXT.1.3: 2
- FCS_TLSC_EXT.2: 4
- FCS_TLSC_EXT.2.1: 1
- FCS_TLSC_EXT.4: 4
- FCS_TLSC_EXT.4.1: 1
- FCS_TLSC_EXT.5: 4
- FCS_TLSC_EXT.5.1: 1
- FCS_TLSS_EXT.1.1: 1
- FCS_TLS_EXT.1: 4
- FCS_TLS_EXT.1.1: 1
- FCS_WPA_EXT.1: 5
- FCS_WPA_EXT.1.1: 1
- FDP:
- FDP_ACF_EXT.1: 4
- FDP_ACF_EXT.1.1: 2
- FDP_ACF_EXT.1.2: 2
- FDP_ACF_EXT.2: 4
- FDP_ACF_EXT.2.1: 1
- FDP_DAR_EXT.1: 5
- FDP_DAR_EXT.1.1: 1
- FDP_DAR_EXT.1.2: 1
- FDP_DAR_EXT.2: 4
- FDP_DAR_EXT.2.1: 2
- FDP_DAR_EXT.2.2: 3
- FDP_DAR_EXT.2.3: 2
- FDP_DAR_EXT.2.4: 2
- FDP_IFC_EXT.1: 5
- FDP_IFC_EXT.1.1: 1
- FDP_RIP.2: 6
- FDP_RIP.2.1: 1
- FDP_STG_EXT.1: 5
- FDP_STG_EXT.1.1: 1
- FDP_UPC_EXT: 13
- FDP_UPC_EXT.1: 4
- FDP_VPN_EXT.1: 6
- FDP_VPN_EXT.1.1: 1
- FIA:
- FIA_AFL_EXT.1: 4
- FIA_AFL_EXT.1.1: 1
- FIA_AFL_EXT.1.2: 1
- FIA_AFL_EXT.1.3: 1
- FIA_AFL_EXT.1.4: 1
- FIA_AFL_EXT.1.5: 1
- FIA_AFL_EXT.1.6: 1
- FIA_BLT_EXT.1: 5
- FIA_BLT_EXT.1.1: 1
- FIA_BLT_EXT.2: 5
- FIA_BLT_EXT.2.1: 1
- FIA_BLT_EXT.3: 6
- FIA_BLT_EXT.3.1: 1
- FIA_BLT_EXT.4: 5
- FIA_BLT_EXT.4.1: 1
- FIA_BLT_EXT.4.2: 1
- FIA_BLT_EXT.5: 2
- FIA_BLT_EXT.6: 5
- FIA_BLT_EXT.6.1: 3
- FIA_BLT_EXT.7: 5
- FIA_BLT_EXT.7.1: 1
- FIA_ENR_EXT.2: 5
- FIA_ENR_EXT.2.1: 1
- FIA_MBE_EXT.1: 5
- FIA_MBE_EXT.1.1: 1
- FIA_MBE_EXT.2: 5
- FIA_MBE_EXT.2.1: 1
- FIA_MBV_EXT.1: 5
- FIA_MBV_EXT.1.1: 1
- FIA_MBV_EXT.1.2: 1
- FIA_MBV_EXT.2: 5
- FIA_MBV_EXT.2.1: 1
- FIA_PAE_EXT.1: 5
- FIA_PAE_EXT.1.1: 1
- FIA_PMG_EXT.1: 5
- FIA_PMG_EXT.1.1: 1
- FIA_TRT_EXT.1: 6
- FIA_TRT_EXT.1.1: 1
- FIA_UAU: 8
- FIA_UAU.5: 5
- FIA_UAU.5.1: 8
- FIA_UAU.5.2: 1
- FIA_UAU.6: 4
- FIA_UAU.7: 6
- FIA_UAU.7.1: 1
- FIA_UAU_EXT.1: 5
- FIA_UAU_EXT.1.1: 1
- FIA_UAU_EXT.2: 4
- FIA_UAU_EXT.2.1: 1
- FIA_UAU_EXT.2.2: 1
- FMT:
- FMT_MOF_EXT.1: 6
- FMT_MOF_EXT.1.1: 2
- FMT_MOF_EXT.1.2: 2
- FMT_POL_EXT.2: 4
- FMT_POL_EXT.2.1: 2
- FMT_POL_EXT.2.2: 2
- FMT_SMF: 11
- FMT_SMF.1: 15
- FMT_SMF.1.1: 1
- FMT_SMF_EXT: 5
- FMT_SMF_EXT.1: 1
- FMT_SMF_EXT.2: 4
- FMT_SMF_EXT.2.1: 1
- FMT_SMF_EXT.4: 4
- FMT_SMF_EXT.4.1: 2
- FMT_SMF_EXT.4.2: 3
- FMT_UNR_EXT.1: 4
- FMT_UNR_EXT.1.1: 2
- FPT:
- FPT_AEX_EXT.1: 5
- FPT_AEX_EXT.1.1: 1
- FPT_AEX_EXT.1.2: 1
- FPT_AEX_EXT.2: 5
- FPT_AEX_EXT.2.1: 1
- FPT_AEX_EXT.3: 6
- FPT_AEX_EXT.3.1: 1
- FPT_AEX_EXT.4: 4
- FPT_AEX_EXT.4.1: 1
- FPT_AEX_EXT.4.2: 1
- FPT_BDP_EXT.1: 5
- FPT_BDP_EXT.1.1: 1
- FPT_BDP_EXT.1.2: 1
- FPT_JTA_EXT.1: 5
- FPT_JTA_EXT.1.1: 1
- FPT_KST_EXT.1: 5
- FPT_KST_EXT.1.1: 1
- FPT_KST_EXT.2: 5
- FPT_KST_EXT.2.1: 1
- FPT_KST_EXT.3: 5
- FPT_KST_EXT.3.1: 1
- FPT_NOT_EXT.1: 5
- FPT_NOT_EXT.1.1: 1
- FPT_PBT_EXT.1: 5
- FPT_PBT_EXT.1.1: 1
- FPT_STM.1: 6
- FPT_STM.1.1: 1
- FPT_TST_EXT: 22
- FPT_TST_EXT.1: 8
- FPT_TST_EXT.1.1: 1
- FPT_TST_EXT.2: 2
- FPT_TST_EXT.3: 6
- FPT_TST_EXT.3.1: 1
- FPT_TUD_EXT.1: 5
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FPT_TUD_EXT.2: 5
- FPT_TUD_EXT.2.1: 1
- FPT_TUD_EXT.2.2: 1
- FPT_TUD_EXT.2.3: 3
- FPT_TUD_EXT.3: 4
- FPT_TUD_EXT.3.1: 1
- FPT_TUD_EXT.4: 4
- FPT_TUD_EXT.4.1: 3
- FPT_TUD_EXT.5: 4
- FPT_TUD_EXT.5.1: 1
- FPT_TUD_EXT.6: 4
- FPT_TUD_EXT.6.1: 1
- FTA:
- FTA_SSL_EXT.1: 6
- FTA_SSL_EXT.1.1: 1
- FTA_SSL_EXT.1.2: 1
- FTA_SSL_EXT.1.3: 1
- FTA_TAB.1: 5
- FTA_TAB.1.1: 1
- FTA_WSE_EXT.1: 5
- FTA_WSE_EXT.1.1: 1
- FTP:
- FTP_BLT_EXT: 12
- FTP_BLT_EXT.1: 5
- FTP_BLT_EXT.1.1: 1
- FTP_BLT_EXT.1.2: 1
- FTP_BLT_EXT.2: 5
- FTP_BLT_EXT.2.1: 1
- FTP_BLT_EXT.3: 2
- FTP_DIT_EXT.1: 1
- FTP_ITC: 5
- FTP_ITC.1: 4
- FTP_ITC_EXT.1: 15
- FTP_ITC_EXT.1.1: 2
- FTP_ITC_EXT.1.2: 2
- FTP_ITC_EXT.1.3: 2
- FTP_TRP.1: 5
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_ARP.1: 24
- FAU_ARP.1.1: 1
- FAU_SAA.1: 3
- FCO:
- FCS:
- FCS_CKM: 4
- FCS_CKM.1: 25
- FCS_CKM.2: 13
- FCS_CKM.2.1: 1
- FCS_CKM.3: 9
- FCS_CKM.3.1: 1
- FCS_CKM.4: 18
- FCS_CKM.4.1: 1
- FCS_COP: 23
- FCS_COP.1: 56
- FCS_RNG: 4
- FCS_RNG.1: 15
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC: 40
- FDP_ACC.1: 17
- FDP_ACC.2: 5
- FDP_ACF: 38
- FDP_ACF.1: 24
- FDP_IFC: 24
- FDP_IFC.1: 14
- FDP_IFC.2: 2
- FDP_IFF: 18
- FDP_IFF.1: 17
- FDP_ITC: 12
- FDP_ITC.1: 4
- FDP_ITC.2: 13
- FDP_ITT.1: 1
- FDP_RIP: 135
- FDP_RIP.1: 11
- FDP_ROL: 16
- FDP_ROL.1: 5
- FDP_SDI.1: 1
- FDP_SDI.2: 13
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UIT: 6
- FDP_UIT.1: 2
- FIA:
- FIA_ATD: 9
- FIA_ATD.1: 2
- FIA_UID: 22
- FIA_UID.1: 12
- FIA_UID.2: 1
- FIA_USB: 6
- FIA_USB.1: 3
- FMT:
- FMT_MSA: 133
- FMT_MSA.1: 14
- FMT_MSA.2: 2
- FMT_MSA.3: 22
- FMT_MTD: 20
- FMT_MTD.1: 2
- FMT_MTD.3: 1
- FMT_SMF: 41
- FMT_SMF.1: 22
- FMT_SMF.1.1: 1
- FMT_SMR: 43
- FMT_SMR.1: 37
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNO.1: 13
- FPR_UNO.1.1: 1
- FPT:
- FPT_FLS: 36
- FPT_FLS.1: 16
- FPT_FLS.1.1: 2
- FPT_ITT.1: 1
- FPT_PHP.3: 1
- FPT_RCV: 27
- FPT_RCV.3: 13
- FPT_RCV.4: 2
- FPT_TDC.1: 8
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST.1: 1
- FRU:
- FTP:
- FTP_ITC: 8
- FTP_ITC.1: 9
- FTP_TRP.1: 2
|
pdf_data/st_keywords/cc_claims |
- A:
- A.CONFIG: 1
- A.CONNECTIVITY: 1
- A.MOBILE_DEVICE_PLATFORM: 1
- A.NOTIFY: 1
- A.NO_TOE_BYPASS: 1
- A.PHYSICAL: 1
- A.PRECAUTION: 1
- A.PROPER_ADMIN: 1
- A.PROPER_USER: 1
- A.TRUSTED_ADMIN: 1
- A.TRUSTED_CONFIG: 1
- O:
- O.ACCOUNTABILITY: 1
- O.APPLY_POLICY: 1
- O.AUTH: 1
- O.AUTHENTICATION: 1
- O.AUTH_COMM: 1
- O.CONFIG: 1
- O.CRYPTOGRAPHIC_FUNCTIONS: 1
- O.DATA_PROTECTION_TRANSIT: 1
- O.INTEGRITY: 1
- O.KNOWN_STATE: 1
- O.NONDISCLOSURE: 1
- O.PRIVACY: 1
- O.PROTECTED_COMMS: 1
- O.SELF_TEST: 1
- O.STORAGE: 1
- O.SYSTEM_MONITORING: 1
- O.TOE_ADMINISTRATION: 1
- O.WIRELESS_ACCESS_POINT_CONNECTION: 1
- OE:
- OE.CONFIG: 1
- OE.DATA_PROPER_ADMIN: 1
- OE.DATA_PROPER_USER: 1
- OE.IT_ENTERPRISE: 1
- OE.MOBILE_DEVICE_PLATFORM: 1
- OE.NOTIFY: 1
- OE.NO_TOE_BYPASS: 1
- OE.PHYSICAL: 1
- OE.PRECAUTION: 1
- OE.TRUSTED_ADMIN: 1
- OE.TRUSTED_CONFIG: 1
- OE.WIRELESS_NETWORK: 1
- T:
- T.BACKUP: 1
- T.MALICIOUS_APP: 3
- T.NETWORK_ATTACK: 2
- T.NETWORK_EAVESDROP: 2
- T.PERSISTENT: 1
- T.PERSISTENT_PRESENCE: 2
- T.PHYSICAL_ACCESS: 4
- T.TSF_CONFIGURATION: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNDETECTED_ACTIONS: 1
- T.USER_DATA_REUSE: 1
|
- A:
- A.APPLET: 6
- A.DELETION: 1
- A.VERIFICATION: 6
- D:
- D.API_DATA: 3
- D.APP_CODE: 7
- D.APP_C_DATA: 3
- D.APP_I_DATA: 5
- D.CM_APDU: 1
- D.CRYPTO: 6
- D.JCS_CODE: 3
- D.JCS_DATA: 4
- D.JCS_KEYS: 3
- D.PIN: 6
- D.SEC_ATTRIBUTES: 2
- D.SEC_DATA: 8
- O:
- O.AES: 1
- O.ALARM: 21
- O.APPLET: 19
- O.CARD-: 6
- O.CARD-MANAGEMENT: 33
- O.CIPHER: 16
- O.CODE_PKG: 16
- O.COMMUNICATION: 11
- O.DELETION: 15
- O.EXT-: 1
- O.EXT-MEM: 20
- O.EXT_MEM_INSTANCE: 10
- O.FIREWALL: 46
- O.GLOBAL_ARRAYS_C: 1
- O.GLOBAL_ARRAYS_CONFID: 17
- O.GLOBAL_ARRAYS_IN: 1
- O.GLOBAL_ARRAYS_INTEG: 9
- O.IC_SUPPORT: 18
- O.INSTALL: 15
- O.JAVAOBJECT: 41
- O.KEY-: 1
- O.KEY-MNGT: 24
- O.LOAD: 18
- O.NATIVE: 13
- O.OBJ-DELETION: 8
- O.OPERATE: 35
- O.OS: 1
- O.OS_SUPPORT: 23
- O.PACKAGE: 2
- O.PIN-: 1
- O.PIN-MNGT: 22
- O.REALLOCATION: 17
- O.RECOVERY: 24
- O.REMOTE: 1
- O.RESOURCES: 24
- O.RND: 14
- O.SHA: 3
- O.SID: 34
- O.TDES: 2
- O.TRANSACTION: 18
- OE:
- OE.APPLET: 8
- OE.CARD-MANAGEMENT: 2
- OE.CODE-: 4
- OE.CODE-EVIDENCE: 17
- OE.SCP: 6
- OE.VERIFICATION: 38
- OP:
- OP.ARRAY_ACCESS: 4
- OP.CREATE: 7
- OP.CREATE_EXT_MEM_INSTANCE: 3
- OP.DELETE_APPLET: 4
- OP.DELETE_PCKG: 3
- OP.DELETE_PCKG_APPLET: 3
- OP.GP: 3
- OP.INSTANCE_FIELD: 4
- OP.INVK_INTERFACE: 7
- OP.INVK_VIRTUAL: 6
- OP.JAVA: 5
- OP.LOAD_PCKG: 1
- OP.PUT: 6
- OP.READ_EXT_MEM: 3
- OP.THROW: 5
- OP.TYPE_ACCESS: 5
- OP.WRITE_EXT_MEM: 3
- OSP:
- R:
- T:
- T.COMMUNICATION: 5
- T.CONFID-APPLI-: 3
- T.CONFID-APPLI-DATA: 18
- T.CONFID-JCS-: 8
- T.CONFID-JCS-CODE: 6
- T.CONFID-JCS-DATA: 6
- T.DELETION: 5
- T.EXE-: 1
- T.EXE-CODE: 8
- T.FAULT: 6
- T.INSTALL: 6
- T.INTEG-: 11
- T.INTEG-APPLI-: 10
- T.INTEG-APPLI-CODE: 9
- T.INTEG-APPLI-DATA: 19
- T.INTEG-JCS-: 1
- T.INTEG-JCS-CODE: 8
- T.INTEG-JCS-DATA: 6
- T.LEAKAGE: 6
- T.NATIVE: 6
- T.OBJ-DELETION: 4
- T.PHYSICAL: 8
- T.RESOURCES: 10
- T.RND: 6
- T.SID: 20
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 82
- AES-: 3
- AES-128: 4
- AES-256: 8
- DES:
- constructions:
- MAC:
- CBC-MAC: 5
- HMAC: 6
- HMAC-SHA-256: 14
- HMAC-SHA-384: 4
- HMAC-SHA-512: 5
|
- AES_competition:
- DES:
- 3DES:
- TDEA: 1
- TDES: 29
- Triple-DES: 1
- DES:
- constructions:
- miscellaneous:
|
pdf_data/st_keywords/asymmetric_crypto |
- ECC:
- FF:
- DH:
- DH: 13
- Diffie-Hellman: 13
- DSA:
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-256: 7
- SHA-384: 1
- SHA-512: 8
|
- MD:
- RIPEMD:
- RIPEMD-160: 2
- RIPEMD160: 1
- SHA:
- SHA1:
- SHA2:
- SHA-2: 3
- SHA-224: 1
- SHA-256: 3
- SHA-384: 1
- SHA-512: 1
|
pdf_data/st_keywords/crypto_scheme |
|
- KA:
- KA: 2
- Key Agreement: 1
- Key agreement: 2
- KEX:
- MAC:
|
pdf_data/st_keywords/crypto_protocol |
- IKE:
- IPsec:
- SSH:
- TLS:
- DTLS:
- SSL:
- TLS:
- TLS: 100
- TLS 1.1: 3
- TLS 1.2: 3
- TLS v1.1: 1
- VPN:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
- CBC:
- CCM:
- CTR:
- ECB:
- GCM:
- XEX:
- XTS:
|
|
pdf_data/st_keywords/ecc_curve |
- Curve:
- NIST:
- P-256: 29
- P-384: 18
- P-521: 12
- curve P-256: 1
- secp256r1: 2
- secp384r1: 2
- secp521r1: 2
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
- TLS_RSA_WITH_AES_128_CBC_SHA: 2
- TLS_RSA_WITH_AES_128_CBC_SHA256: 2
- TLS_RSA_WITH_AES_256_CBC_SHA256: 2
- TLS_RSA_WITH_AES_256_GCM_SHA384: 2
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 3
- malfunction: 4
- physical tampering: 1
- SCA:
- DPA: 4
- Leak-Inherent: 2
- SPA: 1
- physical probing: 3
- side channel: 1
- timing attacks: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS PUB 186-4: 4
- FIPS PUB 197: 2
- FIPS140-3: 2
- FIPS180-4: 3
- FIPS186-4: 14
- FIPS197: 3
- FIPS198-1: 3
- NIST:
- NIST SP 800-132: 1
- NIST SP 800-38A: 1
- NIST SP 800-38C: 2
- NIST SP 800-38D: 1
- NIST SP 800-38E: 1
- NIST SP 800-38F: 1
- NIST SP 800-57: 2
- SP 800-56C: 1
- PKCS:
- RFC:
- RFC 2818: 1
- RFC 3394: 1
- RFC 3526: 4
- RFC 3602: 1
- RFC 4106: 1
- RFC 4301: 2
- RFC 4303: 1
- RFC 4346: 1
- RFC 4401: 1
- RFC 4945: 1
- RFC 5114: 1
- RFC 5216: 1
- RFC 5246: 8
- RFC 5280: 4
- RFC 5282: 2
- RFC 5288: 2
- RFC 5289: 8
- RFC 5746: 1
- RFC 5869: 1
- RFC 6125: 1
- RFC 6379: 1
- RFC 6960: 1
- RFC 7296: 1
- RFC 7748: 2
- RFC 8247: 1
- RFC 8784: 1
- RFC3394: 2
- RFC3526: 4
- RFC4301: 2
- RFC5280: 2
- RFC5746: 2
- RFC5996: 2
- RFC7748: 2
- RFC8894: 2
- X509:
|
- BSI:
- FIPS:
- FIPS 140-2: 1
- FIPS 180-4: 5
- FIPS 186-4: 8
- FIPS 197: 12
- FIPS PUB 180-4: 1
- FIPS PUB 186-4: 1
- FIPS PUB 197: 1
- FIPS140: 2
- ICAO:
- ISO:
- ISO/IEC 11770-: 2
- ISO/IEC 14443: 2
- ISO/IEC 14888-: 4
- ISO/IEC 18092: 2
- ISO/IEC7816: 2
- ISO/IEC97: 2
- ISO/IEC9797-1: 1
- NIST:
- NIST SP 800-108: 1
- NIST SP 800-38B: 1
- SP 800-38B: 1
- RFC:
- SCP:
- SCP 02: 2
- SCP 03: 3
- SCP01: 2
- SCP02: 12
- SCP03: 12
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
- javacard:
- javacard.framework: 4
- javacard.security: 3
- javacardx:
- javacardx.crypto: 3
- javacardx.external: 1
- javacardx.security: 1
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- access to its storage media. Note: Defending against device re-use after physical compromise is out of scope for this Protection Profile. T.MALICIOUS_APP PP Origin: MDF Applications loaded onto the Mobile: 1
- out of scope: 1
|
- OutOfScope:
- Software development environment. Phase 2 covers the Secure IC Development of Infineon and is out of scope of the TOE evaluation as that is part of the IC platform evaluation. In Phase 3, the Chip: 1
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.RECOVERY and O.OS_SUPPORT are: 1
- by the TOE. There are no pre-issuance applets installed. Native code post-issuance downloading is out of scope. The SCP is a certified hardware platform – the M7892 G12 (SLJ 52GxxyyyzC) with RSA2048 v2.07.003: 1
- out of scope: 3
|
pdf_data/st_metadata |
- /Author: Scott Chapman, Alejandro Masino
- /CreationDate: D:20230926172104-03'00'
- /Creator: Generated by CCTool version 2.9-beta14
- /Keywords: Apple, iPad, iPadOS, mobile device
- /Producer: Apache FOP Version 2.8
- /Subject: the Apple iPad with Apple iPadOS
- /Title: Apple iPadOS 16: iPad Security Target (version 1.1 as of )
- pdf_file_size_bytes: 1518879
- pdf_hyperlinks: https://developer.apple.com/documentation/security/keychain_services, https://lists.apple.com/mailman/listinfo/security-announce/, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0724, https://developer.apple.com/documentation/security/certificate_key_and_trust_services, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=36720, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0689, https://help.apple.com/pdf/security/en_US/apple-platform-security-guide.pdf, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=6904, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0497, https://support.apple.com/HT205583, https://support.apple.com//HT201222, https://developer.apple.com/bug-reporting/profiles-and-logs/?platform=ios, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=36713, https://csrc.nist.gov/pubs/sp/800/132/final, https://www.niap-ccevs.org/Profile/Info.cfm?PPID=425&id=425, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=21229, https://csrc.nist.gov/pubs/sp/800/38/f/final, https://developer.apple.com/news/?id=g9ejcf8y, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=36033, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35474, https://csrc.nist.gov/pubs/fips/198-1/final, http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R5.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R5.pdf, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0703, https://www.niap-ccevs.org/Profile/Info.cfm?PPID=441&id=441, https://support.apple.com/HT204506, http://www.ietf.org/rfc/rfc5746.txt, https://www.apple.com/legal/intellectual-property/trademark/appletmlist.html, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0697, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0674, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=32778, http://www.ietf.org/rfc/rfc3526.txt, https://support.apple.com/en-us/HT204060, https://csrc.nist.gov/pubs/sp/800/38/c/upd1/final, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=36292, https://csrc.nist.gov/pubs/sp/800/90/a/r1/final, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0677, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=1084, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0660, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0499, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=36296, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0588, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0513, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0700, http://www.ietf.org/rfc/rfc5280.txt, https://support.apple.com/guide/deployment/welcome/web, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=6495, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=11217, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=36295, https://www.apple.com/r/store/government/, https://support.apple.com/en-us/HT204091, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=36718, https://developer.apple.com/bug-reporting/profiles-and-logs/?platforms=ios, https://support.apple.com//HT201220, https://support.apple.com/en-us/HT204506, https://www.niap-ccevs.org/MMO/PP/CFG_MDF-BIO-BT-MDMA-VPNC-WLANC_V1.0.pdf, https://csrc.nist.gov/pubs/fips/186-4/final, https://support.apple.com/HT213464, https://www.bluetooth.com/specifications/, https://www.niap-ccevs.org/Profile/Info.cfm?PPID=468&id=468, https://csrc.nist.gov/pubs/fips/197/final, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=33971, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0714, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0685, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35475, https://support.apple.com/guide/ipad/welcome/ipados, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0690, https://developer.apple.com/documentation/devicemanagement, http://www.ietf.org/rfc/rfc4301.txt, https://developer.apple.com/documentation/os/logging?language=objc, http://www.ietf.org/rfc/rfc5996.txt, https://support.apple.com/en-us/HT212773, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0755, https://support.apple.com/guide/disk-utility/dsku19ed921c/21.0/mac/12.0, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0739, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=36293, https://www.niap-ccevs.org/Profile/Info.cfm?PPID=476&id=476, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=36106, https://www.apple.com/retail/business/, https://csrc.nist.gov/pubs/sp/800/56/c/r2/final, https://support.apple.com/en-euro/guide/mac-help/mchl3b6c3720/13.0/mac/13.0, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0640, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0645, https://support.apple.com/guide/profile-manager/welcome/mac, https://csrc.nist.gov/pubs/sp/800/56/b/r1/final, https://support.apple.com/en-us/HT205583, https://support.apple.com/guide/apple-business-manager/welcome/web, https://support.apple.com/en-euro/guide/disk-utility/dsku19ed921c/22.0/mac/13.0, https://support.apple.com/HT204091, https://www.niap-ccevs.org/Profile/Info.cfm?PPID=463&id=463, https://www.niap-ccevs.org/Profile/Info.cfm?PPID=439&id=439, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=30198, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=30719, https://support.apple.com/guide/apple-configurator-2/welcome/mac, http://www.ietf.org/rfc/rfc8894.txt, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=36714, http://www.ietf.org/rfc/rfc3394.txt, https://developer.apple.com/documentation/foundation/file_system/about_apple_file_system, https://csrc.nist.gov/pubs/sp/800/38/e/final, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0753, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0469, https://csrc.nist.gov/pubs/fips/180-4/upd1/final, https://support.apple.com/HT204060, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=30718, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0442, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=36038, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0673, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=36036, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=36716, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0726, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=34541, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=5111, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=36037, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=30716, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0672, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0725, http://www.ietf.org/rfc/rfc7748.txt, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0600, https://support.apple.com/guide/mac-help/set-up-content-caching-on-mac-mchl3b6c3720/12.0/mac/12.0, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0707, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=32659, https://csrc.nist.gov/pubs/sp/800/38/a/final, https://developer.apple.com/documentation/security/1550981-ssl_cipher_suite_values?language=objc, https://csrc.nist.gov/pubs/sp/800/56/a/r3/final, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=36039, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=36719, https://www.apple.com, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=30714, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=30713, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=2940, https://www.niap-ccevs.org/MMO/Product/st_vidnnnnn-agd.pdf, https://www.niap-ccevs.org/MMO/Product/st_vid11350-agd.pdf, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0710, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0647, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=18467, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0667, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=30710, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0671, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=36100, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0650, https://csrc.nist.gov/pubs/fips/140-3/final, https://www.niap-ccevs.org/Profile/Info.cfm?PPID=467&id=467, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=36034, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0662, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=34078, https://support.apple.com/en-us/HT213464, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0711, http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R5.pdf, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0704, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=30720, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=15301, https://csrc.nist.gov/pubs/sp/800/38/d/final, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0770, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=36297
- pdf_is_encrypted: False
- pdf_number_of_pages: 200
|
- /Author: Tyrone Stodart
- /CreationDate: D:20190524111327+01'00'
- /Creator: Microsoft® Word 2016
- /Keywords: Security Target Lite, Java Card, Common Criteria, BSI-DSZ-CC-0869-V2
- /ModDate: D:20190524111327+01'00'
- /Producer: Microsoft® Word 2016
- /Subject: Security Target - Java Card Platform on M7892 G12 V2.0 ST Lite Version 3.6
- /Title: Security Target - Java Card Platform on M7892 G12 V2.0 ST Lite Version 3.6
- pdf_file_size_bytes: 3301783
- pdf_hyperlinks: http://www.iso.org/iso/iso_catalogue/catalogue_tc/catalogue_detail.htm?csnumber=30656
- pdf_is_encrypted: False
- pdf_number_of_pages: 157
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |