name |
Tarantella Enterprise 3 Version 3.40.911 with Tarantella Security Pack, Version 3.41.211 |
Application J-Sign version 1.8.4 sur la plateforme J-Safe version 2.11.0 |
category |
Access Control Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
UK |
FR |
status |
archived |
archived |
not_valid_after |
05.03.2013 |
21.05.2020 |
not_valid_before |
13.05.2005 |
21.05.2015 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP214.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_17.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Tarantella_V2.4.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_17_cible.pdf |
manufacturer |
Tarantella LTD |
Incard Division / ST Microelectronics |
manufacturer_web |
https://www.tarantella.com |
|
security_level |
EAL2 |
EAL4+, AVA_VAN.5 |
dgst |
3db22e4de890393a |
ce97d64b517bf270 |
heuristics/cert_id |
CRP214 |
ANSSI-CC-2015/17 |
heuristics/cert_lab |
[] |
SERMA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_DVS.1, ADV_RCR.1, ADV_FSP.1, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, ATE_COV.1, ADV_HLD.1, AVA_SOF.1 |
ASE_INT.1, ALC_DVS.2, AVA_SOF.1, ASE_ECD.1, ALC_CMC.4, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, AVA_VLA.4, ADV_FSP.4, ATE_IND.2, ASE_CCL.1, AVA_MSU.3 |
heuristics/extracted_versions |
3.40.911, 3.41.211 |
2.11.0, 1.8.4 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2015/16, ANSSI-CC-2012/68 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
ANSSI-CC-2010/01, ANSSI-CC-2009/26, ANSSI-CC-2009/05, ANSSI-CC-2009/51, ANSSI-CC-2009/06, ANSSI-CC-2012/68, ANSSI-CC-2015/16, ANSSI-CC-2009/50, ANSSI-CC-2010/02, ANSSI-CC-2009/62, ANSSI-CC-2009/28 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
ANSSI-CC-2010/02 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
ANSSI-CC-2010/02 |
heuristics/protection_profiles |
{} |
40002c3611fc465f |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0006b.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
CRP214.pdf |
ANSSI-CC-2015_17.pdf |
pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 4 augmenté AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 3
- cert_id: ANSSI-CC-2015/17
- cert_item: Application J-Sign version 1.8.4 sur la plateforme J-Safe version 2.11.0
- cert_item_version: Version 1.8.4
- cert_lab: Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
- developer: STMicroelectronics S.r.l. - Incard Division Z.I Marcianise Sud, 81025 Marcianise, Italie STMicroelectronics 29 Boulevard Romain Rolland, 75669 Paris Cedex 14, France Commanditaire STMicroelectronics S.r.l. – Incard Division Z.I Marcianise Sud, 81025 Marcianise, Italie
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: PP-0006] Protection Profile - Secure Signature Creation Device Type 3, version 1.05
|
pdf_data/report_keywords/cc_cert_id |
- UK:
- CERTIFICATION REPORT No. P214: 1
|
- FR:
- ANSSI-CC-2012/68: 1
- ANSSI-CC-2015/16: 1
- ANSSI-CC-2015/17: 17
- ANSSI-CC-PP-2010/07-M01: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- ANSSI:
- ANSSI-CC-PP-: 1
- ANSSI-CC-PP-2010/07-M01: 1
- BSI:
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 2
- EAL 5: 1
- EAL 7: 1
- EAL4: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 1
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
- FDP:
- FDP_ACC.2: 1
- FDP_ACF.1: 1
- FMT:
- FTP:
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
- Cisco:
- Microsoft:
- Microsoft: 1
- Microsoft Corporation: 1
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCIMB-2004-01-001: 1
- CCIMB-2004-01-002: 1
- CCIMB-2004-01-003: 1
- FIPS:
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- OutOfScope:
- Solaris 8. Users should note that these Application Servers and the communications with them are out of scope of the evaluation. 6. Users login to the Tarantella Server via a web browser and are then presented: 1
- The evaluated configuration is as illustrated in the diagram above although the firewall shown is out of scope. The product can be used in more complex network environments. These network configurations, which: 1
- out of scope: 2
|
|
pdf_data/report_metadata |
- /Author: racook
- /CreationDate: D:20050526142837Z
- /Creator: PScript5.dll Version 5.2
- /ModDate: D:20131204151607Z
- /Producer: Acrobat Distiller 5.0 (Windows)
- /Title: Microsoft Word - LFL_T206_Tarantella_CertRep_10.doc
- pdf_file_size_bytes: 667201
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 28
|
- /Author: Administrateur
- /CreationDate: D:20150522134048+02'00'
- /Creator: Microsoft® Word 2010
- /Keywords: ANSSI-CC-CER-F-07.016
- /ModDate: D:20150522134048+02'00'
- /Producer: Microsoft® Word 2010
- /Subject: Application J-Sign version 1.8.4 sur la plateforme J-Safe version 2.11.0
- /Title: ANSSI-CC-2015/17
- pdf_file_size_bytes: 637015
- pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 16
|
pdf_data/st_filename |
Tarantella_V2.4.pdf |
ANSSI-CC-2015_17_cible.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- FR:
- ANSSI-2010/02-M01: 1
- ANSSI-CC-2010/02: 2
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 4
- EAL 4 augmented: 2
- EAL 4+: 1
- EAL4: 5
- EAL4 augmented: 2
- EAL4+: 3
- EAL5: 1
- EAL5 augmented: 1
- EAL5+: 1
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ADO:
- ADO_DEL.1: 1
- ADO_IGS.1: 1
- ADV:
- ADV_FSP.1: 1
- ADV_HLD.1: 1
- ADV_RCR.1: 1
- AGD:
- AGD_ADM.1: 1
- AGD_USR.1: 1
- ALC:
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_SOF.1: 1
- AVA_VLA.1: 2
|
- ADO:
- ADO_DEL.2: 1
- ADO_IGS.1: 1
- ADV:
- ADV_ARC.1: 3
- ADV_FSP.4: 2
- ADV_IMP.1: 4
- ADV_TDS.3: 2
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 3
- ALC:
- ALC_CMC.4: 3
- ALC_CMS.4: 2
- ALC_DEL.1: 3
- ALC_DVS.1: 3
- ALC_DVS.2: 2
- ALC_LCD.1: 4
- ALC_TAT.1: 3
- ASE:
- ASE_CCL.1: 3
- ASE_ECD.1: 2
- ASE_INT.1: 3
- ASE_OBJ.2: 2
- ASE_REQ.2: 3
- ASE_SPD.1: 2
- ASE_TSS.1: 3
- ATE:
- ATE_COV.2: 3
- ATE_DPT.1: 2
- ATE_FUN.1: 3
- ATE_IND.2: 2
- AVA:
- AVA_MSU.3: 1
- AVA_SOF: 1
- AVA_SOF.1: 1
- AVA_VAN.3: 1
- AVA_VAN.5: 15
- AVA_VLA.4: 2
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 6
- FAU_GEN.1.1: 3
- FAU_GEN.1.2: 2
- FAU_GEN.2: 4
- FAU_GEN.2.1: 2
- FAU_SAR.1: 2
- FAU_SAR.1.1: 2
- FAU_SAR.1.2: 2
- FAU_SAR.2: 4
- FAU_SAR.2.1: 2
- FAU_SAR.3: 3
- FAU_SAR.3.1: 2
- FAU_STG.1: 4
- FAU_STG.1.1: 2
- FAU_STG.1.2: 2
- FCS:
- FCS_COP.1: 3
- FCS_COP.1.1: 2
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 2
- FDP_ACC.2: 6
- FDP_ACC.2.1: 2
- FDP_ACC.2.2: 2
- FDP_ACF.1: 2
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_ITC.1: 3
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_RIP.2: 2
- FDP_RIP.2.1: 4
- FIA:
- FIA_AFL.1: 7
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_UAU.2: 5
- FIA_UAU.2.1: 2
- FIA_UAU.5: 7
- FIA_UAU.5.1: 2
- FIA_UAU.5.2: 2
- FIA_UAU.7: 3
- FIA_UAU.7.1: 2
- FIA_UID.1: 2
- FIA_UID.2: 7
- FIA_UID.2.1: 2
- FMT:
- FMT_MSA.1: 3
- FMT_MSA.1.1: 2
- FMT_MSA.3: 1
- FMT_MTD.1: 3
- FMT_MTD.1.1: 2
- FMT_SMF.1: 1
- FMT_SMF.1.1: 2
- FMT_SMR.1: 6
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FPT:
- FPT_ITC: 3
- FPT_ITC.2: 1
- FPT_ITT.1: 3
- FPT_ITT.1.1: 2
- FPT_ITT.3: 2
- FPT_ITT.3.1: 2
- FPT_ITT.3.2: 2
- FPT_STM.1: 4
- FPT_STM.1.1: 1
- FTP:
|
- FAU:
- FCS:
- FCS_CKM: 4
- FCS_CKM.1: 7
- FCS_CKM.1.1: 7
- FCS_CKM.2: 3
- FCS_CKM.3: 3
- FCS_CKM.4: 9
- FCS_CKM.4.1: 4
- FCS_COP: 10
- FCS_COP.1: 21
- FDP:
- FDP_ACC: 29
- FDP_ACC.1: 9
- FDP_ACC.1.1: 16
- FDP_ACF: 22
- FDP_ACF.1: 23
- FDP_ACF.1.1: 4
- FDP_ACF.1.2: 16
- FDP_ACF.1.3: 4
- FDP_ACF.1.4: 10
- FDP_ETC: 4
- FDP_ETC.1: 3
- FDP_ETC.1.1: 2
- FDP_ETC.1.2: 2
- FDP_ITC: 6
- FDP_ITC.1: 4
- FDP_ITC.1.1: 2
- FDP_ITC.1.2: 2
- FDP_ITC.1.3: 2
- FDP_RIP.1: 5
- FDP_RIP.1.1: 11
- FDP_SDI: 7
- FDP_SDI.2: 6
- FDP_SDI.2.1: 9
- FDP_SDI.2.2: 7
- FDP_UIT: 10
- FDP_UIT.1: 11
- FDP_UIT.1.1: 7
- FDP_UIT.1.2: 7
- FIA:
- FIA_AFL.1: 6
- FIA_AFL.1.1: 22
- FIA_AFL.1.2: 4
- FIA_ATD.1: 5
- FIA_ATD.1.1: 2
- FIA_UAU.1: 7
- FIA_UAU.1.1: 6
- FIA_UAU.1.2: 2
- FIA_UID.1: 8
- FIA_UID.1.1: 5
- FIA_UID.1.2: 2
- FMT:
- FMT_MOF: 1
- FMT_MOF.1: 7
- FMT_MOF.1.1: 2
- FMT_MSA: 10
- FMT_MSA.1: 2
- FMT_MSA.1.1: 4
- FMT_MSA.2: 8
- FMT_MSA.2.1: 2
- FMT_MSA.3: 11
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MTD: 1
- FMT_MTD.1: 5
- FMT_MTD.1.1: 5
- FMT_SMF: 4
- FMT_SMF.1: 23
- FMT_SMF.1.1: 4
- FMT_SMR.1: 9
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FPT:
- FPT_AMT.1: 6
- FPT_AMT.1.1: 4
- FPT_FLS: 1
- FPT_FLS.1: 3
- FPT_FLS.1.1: 8
- FPT_PHP.1: 4
- FPT_PHP.1.1: 7
- FPT_PHP.1.2: 7
- FPT_PHP.3: 4
- FPT_PHP.3.1: 7
- FPT_TRP: 1
- FPT_TST.1: 5
- FPT_TST.1.1: 4
- FPT_TST.1.2: 4
- FPT_TST.1.3: 2
- FTP:
- FTP_ITC: 14
- FTP_ITC.1: 17
- FTP_ITC.1.1: 11
- FTP_ITC.1.2: 8
- FTP_ITC.1.3: 8
- FTP_TRP: 8
- FTP_TRP.1: 12
- FTP_TRP.1.1: 7
- FTP_TRP.1.2: 4
- FTP_TRP.1.3: 4
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN: 2
- A.AUTH: 2
- A.CERTIFICATE: 3
- A.CONFIG: 2
- A.CONNECT: 2
- A.PHYSICAL: 2
- A.USER: 2
- O:
- O.ADMIN: 4
- O.AUDIT: 5
- O.AUTH_SERVER: 4
- O.DAC: 8
- O.SECURE_ENCRYPTION: 4
- O.TPATH: 8
- OE:
- OE.ACCOUNT: 5
- OE.AUDMAN: 3
- OE.AUDREC: 4
- OE.AUTHDATA: 4
- OE.INSTALL: 9
- OE.KEYMGMT: 9
- OE.OSAUTH: 4
- OE.OSCONFIG: 3
- OE.OSKEYS: 10
- OSP:
- T:
- T.CHANNEL: 3
- T.EXCEED: 3
- T.MISDIRECT: 3
- T.UNAUTH: 3
|
- A:
- A.CGA: 5
- A.NO-DELETION: 2
- A.NO-INSTALL: 3
- A.SCA: 3
- A.SGA: 1
- A.VERIFICATION: 3
- O:
- O.ALARM: 5
- O.CIPHER: 4
- O.CSP: 1
- O.FIREWALL: 2
- O.GLOBAL_ARRAYS_INTEG: 1
- O.KEY-MNGT: 4
- O.NATIVE: 2
- O.OBJ-DEL: 2
- O.OPERATE: 1
- O.PIN-MNGT: 1
- O.REALLOCATION: 4
- O.ROLES: 1
- O.SCP: 6
- O.SID: 1
- O.SIDE_CHANNEL: 4
- O.TRANSACTION: 1
- OE:
- OE.CARD_MANAGEMENT: 5
- OE.HI_VAD: 8
- OE.MANAGEMENT_OF_SECRETS: 5
- OE.NO-DELETION: 2
- OE.NO-INSTALL: 1
- OE.VERIFICATION: 7
- OSP:
- OSP.CARD_ADMINISTRATION_DISABLED: 2
- OSP.MANAGEMENT_OF_SECRETS: 3
- OSP.ROLES: 2
- OSP.VERIFICATION: 1
- OT:
- T:
- T.EXE-CODE: 6
- T.INTEG-APPLI-CODE: 2
- T.INTEG-APPLI-DATA: 5
- T.NATIVE: 3
- T.PHYSICAL: 3
- T.TYPE: 1
|
pdf_data/st_keywords/vendor |
|
- STMicroelectronics:
- STM: 1
- STMicroelectronics: 19
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 1
- SHA-256: 6
- SHA-512: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- Physical tampering: 2
- physical tampering: 6
- SCA:
- DPA: 2
- SPA: 2
- timing attacks: 2
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCIMB-2004-01-001: 1
- CCIMB-2004-01-002: 1
- CCIMB-2004-01-003: 1
- FIPS:
- FIPS 140-2: 2
- FIPS140-2: 2
- RFC:
- X509:
|
- CC:
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- FIPS:
- FIPS PUB 113: 1
- FIPS PUB 180-1: 1
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 14443-3: 1
- ISO/IEC 14443-4: 1
- ISO/IEC 14888-3: 1
- ISO/IEC 7816: 12
- ISO/IEC 7816-: 1
- ISO/IEC 9797-1: 1
- PKCS:
- RFC:
|
pdf_data/st_keywords/javacard_version |
|
- GlobalPlatform:
- JavaCard:
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- Note that these application servers and the communications with them (RDP/SSH/X11) are out of scope: 1
- out of scope: 1
- server. (Note that these application servers and the communications with them (RDP/SSH/X11) are out of scope). Evaluation of Tarantella Enterprise 3 Tarantella Enterprise 3 Security Target/Issue 2.4 11 April: 1
|
- OutOfScope:
- This component and its interface is permanently disabled before TOE delivery. The Card Manager is out of scope of current evaluation: 1
- This component and its interface is permanently disabled before TOE delivery. The Card Manager is out of scope of current evaluation) o GP API (This interface is permanently disabled before TOE delivery and it: 1
- This interface is permanently disabled before TOE delivery and it is out of scope of current evaluation: 1
- out of scope: 2
- out of scope of current evaluation) o Javacard 3.0.4 API o Proprietary API o Operating System o The Secured: 1
|
pdf_data/st_metadata |
- /Author: griffinh@griffinh
- /CreationDate: D:20050411140335+00'00'
- /Creator: PScript5.dll Version 5.2
- /ModDate: D:20050411141010
- /Producer: Jaws PDF Creator v2.11.1164
- /Title: Microsoft Word - T206-ST.doc
- pdf_file_size_bytes: 384411
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 42
|
- /Author: saverio donatiello
- /CreationDate: D:20150429154456+02'00'
- /Creator: PDFCreator Version 1.7.3
- /Keywords:
- /ModDate: D:20150429154456+02'00'
- /Producer: GPL Ghostscript 9.10
- /Subject:
- /Title: J-SIGN_SecurtyTarget_Lite
- pdf_file_size_bytes: 1850122
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 95
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |