| name |
CENTAGATE v3.010-build13 |
Google Pixel Devices on Android 14 |
| category |
Other Devices and Systems |
Mobility |
| scheme |
MY |
US |
| status |
archived |
active |
| not_valid_after |
06.06.2022 |
27.03.2026 |
| not_valid_before |
06.06.2017 |
27.03.2024 |
| cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11419-ci.pdf |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C072-CR-v1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11419-vr.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2017-05-08-CTG-ST-3.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11419-st.pdf |
| manufacturer |
SecureMetric Technology Sdn Bhd |
Google LLC |
| manufacturer_web |
https://www.securemetric.com/ |
https://www.google.com |
| security_level |
EAL4+, ALC_FLR.2 |
{} |
| dgst |
4149b933ed4230dd |
d822fb20999bc557 |
| heuristics/cert_id |
ISCB-3-RPT-C072-CR-v1 |
CCEVS-VR-VID-11419-2024 |
| heuristics/cert_lab |
[] |
US |
| heuristics/cpe_matches |
{} |
cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:* |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
CVE-2024-31312, CVE-2014-9968, CVE-2015-9053, CVE-2025-48536, CVE-2023-21357, CVE-2024-40657, CVE-2014-9962, CVE-2024-43084, CVE-2023-40098, CVE-2023-40114, CVE-2025-48546, CVE-2017-8233, CVE-2024-23705, CVE-2023-40080, CVE-2024-43093, CVE-2024-31331, CVE-2016-5871, CVE-2024-49736, CVE-2024-31326, CVE-2017-8257, CVE-2024-43096, CVE-2024-31313, CVE-2025-48554, CVE-2025-48540, CVE-2015-9036, CVE-2025-48591, CVE-2017-9684, CVE-2025-48622, CVE-2024-31332, CVE-2014-9973, CVE-2015-9043, CVE-2025-32349, CVE-2024-40660, CVE-2025-22418, CVE-2015-9029, CVE-2017-7366, CVE-2016-10239, CVE-2025-22427, CVE-2024-0026, CVE-2025-48593, CVE-2025-32350, CVE-2017-7371, CVE-2016-10386, CVE-2024-40654, CVE-2024-0018, CVE-2023-40076, CVE-2017-8261, CVE-2015-9031, CVE-2025-48558, CVE-2025-48533, CVE-2015-8596, CVE-2024-0020, CVE-2023-40089, CVE-2025-32327, CVE-2016-10332, CVE-2016-10381, CVE-2023-40094, CVE-2016-10388, CVE-2025-32326, CVE-2017-8263, CVE-2016-5347, CVE-2025-20980, CVE-2024-49749, CVE-2023-40079, CVE-2024-34737, CVE-2015-8995, CVE-2015-9046, CVE-2016-10383, CVE-2025-48631, CVE-2014-9977, CVE-2025-26438, CVE-2015-9041, CVE-2025-48576, CVE-2017-8260, CVE-2025-26428, CVE-2025-48527, CVE-2024-43771, CVE-2023-35657, CVE-2024-31339, CVE-2014-9974, CVE-2017-7365, CVE-2025-21024, CVE-2023-21350, CVE-2015-9050, CVE-2014-9972, CVE-2015-8998, CVE-2025-48633, CVE-2015-9027, CVE-2025-22435, CVE-2015-8996, CVE-2025-22428, CVE-2016-10334, CVE-2025-48548, CVE-2024-34719, CVE-2023-40093, CVE-2023-40073, CVE-2014-9960, CVE-2024-49744, CVE-2025-48552, CVE-2025-48543, CVE-2017-8242, CVE-2015-0574, CVE-2023-21373, CVE-2024-0047, CVE-2024-23707, CVE-2014-9936, CVE-2024-0048, CVE-2015-9072, CVE-2023-40100, CVE-2016-10336, CVE-2025-26462, CVE-2024-43081, CVE-2025-32329, CVE-2024-34730, CVE-2014-9935, CVE-2015-9023, CVE-2024-40655, CVE-2015-9026, CVE-2017-8241, CVE-2024-43090, CVE-2015-8593, CVE-2023-45773, CVE-2025-48541, CVE-2025-48628, CVE-2025-32347, CVE-2025-26444, CVE-2024-34741, CVE-2015-9063, CVE-2023-45776, CVE-2024-40656, CVE-2014-9411, CVE-2024-49738, CVE-2016-10340, CVE-2023-21374, CVE-2017-8234, CVE-2024-0033, CVE-2024-31317, CVE-2017-7372, CVE-2023-40109, CVE-2016-10342, CVE-2015-9038, CVE-2025-48615, CVE-2017-9685, CVE-2025-48562, CVE-2025-48563, CVE-2025-48525, CVE-2014-9965, CVE-2024-31327, CVE-2017-0865, CVE-2024-0021, CVE-2024-31316, CVE-2024-0053, CVE-2023-40081, CVE-2017-7364, CVE-2025-26458, CVE-2024-31323, CVE-2023-40111, CVE-2024-0016, CVE-2025-48594, CVE-2023-21366, CVE-2024-34727, CVE-2015-8592, CVE-2015-9047, CVE-2025-48632, CVE-2025-48626, CVE-2016-5858, CVE-2015-9032, CVE-2017-8265, CVE-2024-49737, CVE-2024-40659, CVE-2025-22423, CVE-2014-9975, CVE-2025-26445, CVE-2017-8255, CVE-2016-5859, CVE-2015-9037, CVE-2024-23704, CVE-2017-6421, CVE-2015-9062, CVE-2024-0044, CVE-2017-8256, CVE-2025-48620, CVE-2015-9044, CVE-2015-9020, CVE-2025-0089, CVE-2016-10338, CVE-2025-22425, CVE-2016-10389, CVE-2014-9981, CVE-2025-26449, CVE-2025-32312, CVE-2014-9979, CVE-2016-5864, CVE-2024-43765, CVE-2025-48542, CVE-2024-49720, CVE-2024-0037, CVE-2025-48583, CVE-2024-43095, CVE-2015-9049, CVE-2023-40091, CVE-2024-0031, CVE-2025-48580, CVE-2023-40096, CVE-2024-49734, CVE-2015-9025, CVE-2024-40653, CVE-2015-9048, CVE-2025-48529, CVE-2025-22415, CVE-2024-49733, CVE-2025-22421, CVE-2015-9039, CVE-2025-48573, CVE-2024-0052, CVE-2015-8594, CVE-2024-34736, CVE-2025-48537, CVE-2015-9021, CVE-2025-26456, CVE-2016-10347, CVE-2023-21360, CVE-2016-10392, CVE-2025-26452, CVE-2025-26421, CVE-2024-43080, CVE-2015-8999, CVE-2025-48526, CVE-2017-8236, CVE-2024-34731, CVE-2025-48597, CVE-2023-21353, CVE-2017-8272, CVE-2025-48522, CVE-2025-26429, CVE-2017-8235, CVE-2017-9682, CVE-2015-9042, CVE-2017-8243, CVE-2023-40103, CVE-2024-31314, CVE-2024-31318, CVE-2014-9963, CVE-2014-9978, CVE-2008-7298, CVE-2014-9961, CVE-2024-23706, CVE-2024-49745, CVE-2017-8262, CVE-2023-21364, CVE-2025-26442, CVE-2017-7368, CVE-2023-45777, CVE-2015-9028, CVE-2025-48544, CVE-2025-32323, CVE-2016-5863, CVE-2017-9680, CVE-2024-34720, CVE-2023-40105, CVE-2025-32325, CVE-2011-0419, CVE-2025-48621, CVE-2024-0014, CVE-2023-21354, CVE-2016-10387, CVE-2014-9966, CVE-2016-10384, CVE-2025-48590, CVE-2025-22434, CVE-2014-9971, CVE-2025-48538, CVE-2025-32321, CVE-2025-48560, CVE-2025-48553, CVE-2016-10341, CVE-2015-9034, CVE-2024-0041, CVE-2024-43763, CVE-2015-9003, CVE-2025-48575, CVE-2024-0032, CVE-2023-40083, CVE-2025-26420, CVE-2024-0025, CVE-2025-22431, CVE-2016-5855, CVE-2017-8266, CVE-2017-7373, CVE-2025-20979, CVE-2024-31319, CVE-2017-0864, CVE-2017-0843, CVE-2025-48627, CVE-2024-43089, CVE-2015-9001, CVE-2015-9060, CVE-2023-21355, CVE-2015-9030, CVE-2023-40108, CVE-2025-48524, CVE-2023-40115, CVE-2015-9051, CVE-2025-48612, CVE-2024-40672, CVE-2024-43764, CVE-2024-31325, CVE-2024-0027, CVE-2025-26453, CVE-2024-43767, CVE-2024-43770, CVE-2024-0023, CVE-2025-48535, CVE-2025-26423, CVE-2024-40676, CVE-2014-9980, CVE-2024-43088, CVE-2015-9068, CVE-2017-0862, CVE-2015-9067, CVE-2016-5860, CVE-2025-48639, CVE-2024-49724, CVE-2015-9065, CVE-2025-48549, CVE-2025-48588, CVE-2015-9061, CVE-2017-8268, CVE-2024-49747, CVE-2016-10385, CVE-2017-7369, CVE-2025-22417, CVE-2024-0017, CVE-2025-32328, CVE-2025-26443, CVE-2023-21352, CVE-2016-10337, CVE-2025-26439, CVE-2025-26426, CVE-2025-48551, CVE-2024-43085, CVE-2016-5854, CVE-2015-9040, CVE-2015-9055, CVE-2025-48545, CVE-2024-43768, CVE-2025-48555, CVE-2023-40084, CVE-2024-31322, CVE-2023-40095, CVE-2023-40110, CVE-2025-32330, CVE-2017-8253, CVE-2024-43083, CVE-2017-8237, CVE-2015-9045, CVE-2023-21351, CVE-2025-48603, CVE-2024-40658, CVE-2024-43097, CVE-2016-10346, CVE-2025-26455, CVE-2025-26427, CVE-2023-21359, CVE-2025-48604, CVE-2024-23712, CVE-2025-22422, CVE-2025-26425, CVE-2024-0022, CVE-2025-48599, CVE-2024-34734, CVE-2017-7367, CVE-2025-22438, CVE-2025-22432, CVE-2024-31310, CVE-2017-8270, CVE-2025-22419, CVE-2017-9678, CVE-2025-48566, CVE-2023-40132, CVE-2024-0050, CVE-2024-34742, CVE-2020-13843, CVE-2024-43086, CVE-2016-5853, CVE-2017-8238, CVE-2024-23710, CVE-2024-34721, CVE-2024-49730, CVE-2024-0019, CVE-2025-22433, CVE-2025-48565, CVE-2025-22442, CVE-2024-0051, CVE-2024-0046, CVE-2024-43091, CVE-2024-0035, CVE-2025-22439, CVE-2025-48523, CVE-2017-8254, CVE-2025-48534, CVE-2014-9969, CVE-2015-9064, CVE-2016-5861, CVE-2024-49714, CVE-2023-21356, CVE-2015-0576, CVE-2025-48614, CVE-2024-40650, CVE-2024-34743, CVE-2015-9052, CVE-2023-40087, CVE-2024-40673, CVE-2024-0040, CVE-2025-48589, CVE-2024-23717, CVE-2025-26436, CVE-2017-8240, CVE-2025-22414, CVE-2025-0076, CVE-2015-9071, CVE-2025-0087, CVE-2024-34739, CVE-2017-9679, CVE-2015-1529, CVE-2015-9033, CVE-2023-21361, CVE-2016-5872, CVE-2015-8595, CVE-2025-26416, CVE-2025-48601, CVE-2015-9035, CVE-2024-0024, CVE-2024-40661, CVE-2024-23709, CVE-2025-26431, CVE-2025-26454, CVE-2024-49748, CVE-2025-26463, CVE-2024-31315, CVE-2024-31311, CVE-2024-40652, CVE-2025-48596, CVE-2024-0030, CVE-2024-43769, CVE-2023-40088, CVE-2016-10333, CVE-2017-7370, CVE-2025-48561, CVE-2025-48550, CVE-2024-23708, CVE-2024-34740, CVE-2025-26441, CVE-2023-40075, CVE-2024-40675, CVE-2016-10343, CVE-2024-49728, CVE-2017-0863, CVE-2016-10380, CVE-2024-0049, CVE-2023-40106, CVE-2024-40674, CVE-2025-32322, CVE-2015-9073, CVE-2016-10344, CVE-2024-34723, CVE-2014-9964, CVE-2025-48531, CVE-2024-40677, CVE-2024-43087, CVE-2014-9937, CVE-2017-8267, CVE-2025-48564, CVE-2015-0575, CVE-2016-10390, CVE-2024-0036, CVE-2025-26440, CVE-2015-9024, CVE-2023-40082, CVE-2016-10382, CVE-2014-9976, CVE-2025-22441, CVE-2025-26450, CVE-2016-10339, CVE-2023-40090, CVE-2025-48547, CVE-2025-48618, CVE-2025-22420, CVE-2024-0038, CVE-2025-26448, CVE-2024-0045, CVE-2025-22429, CVE-2014-9967, CVE-2024-40662, CVE-2023-40077, CVE-2024-31324, CVE-2024-43762, CVE-2025-26419, CVE-2025-48572, CVE-2024-0043, CVE-2015-8997, CVE-2015-9002, CVE-2023-45775, CVE-2016-10335, CVE-2023-40107, CVE-2016-10391, CVE-2024-49742, CVE-2019-20606, CVE-2025-48629, CVE-2024-23713, CVE-2023-40078, CVE-2023-45781, CVE-2024-40664, CVE-2015-9054, CVE-2023-21358, CVE-2015-9069, CVE-2024-0039, CVE-2015-9000, CVE-2023-40092, CVE-2015-9022, CVE-2025-22416, CVE-2023-45774, CVE-2024-34722, CVE-2016-5862, CVE-2015-9070, CVE-2016-5867, CVE-2017-8239, CVE-2025-32333, CVE-2025-48559, CVE-2015-9066, CVE-2024-34738 |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ADV_TDS.3, AVA_VAN.3, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ASE_INT.1, ALC_CMC.4, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ATE_DPT.1, ASE_ECD.1, ALC_LCD.1, ALC_FLR.2, ASE_SPD.1, ATE_COV.2, ALC_DVS.1, ALC_TAT.1, AGD_OPE.1, ALC_CMS.4, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1, ADV_FSP.4, ALC_FRL.2 |
AGD_PRE.1, ALC_CMC.1, AVA_VAN.1, AGD_OPE.1, ATE_IND.1, ALC_CMS.1, ALC_TSU_EXT.1, ADV_FSP.1 |
| heuristics/extracted_versions |
3.010 |
14 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
{} |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
{} |
| heuristics/scheme_data |
- cert_no: 2017-003-C072
- certification_date: 06.06.2017
- developer: SecureMetric Technology Sdn. Bhd.
- enhanced:
- assurance_level: EAL4+ ALC_FLR.2
- category: Other Devices and Systems
- cert_id: C072
- certification_date: 06.06.2017
- developer: Nickson YauSecureMetric Technology Sdn Bhd2-2, Incubator 2,Technology Park Malaysia,Lebuh Sg. Besi - Puchong, Bukit Jalil57000, Kuala Lumpur, Malaysia Email: [email protected]: 012 301 6966
- expiration_date: 06.06.2022
- mutual_recognition: CCRA
- product: CENTAGATE v3.010-build13
- report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C072/ISCB-5-RPT-C072-CR-v1.pdf
- scope: CENTAGATE is an enterprise class authentication solution built on JEE technology, that enforce secure authentication for protected resources such as internal web applications. It operates through web interfaces and has the functionality that enables three-factor of authentications and risk-based scoring engine through accessibility of single sign-on (SSO). It consists of Web Application Server and Mobile Applications that supports Android and iOS platform. The following security functions are implemented by the TOE: Security Token Provision; Mobile Protection; Mobile PKI; Hybrid Risk Scoring Engine (Rule-based and Case-based); Cryptographic Module; Key Management System; Authentication Module; Web Administration Module; and Mobile Management Module
- status: Archive
- target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C072/2017-05-08-CTG-ST-3.0.pdf
- type: Other devices and systems
- expiration_date: 06.06.2022
- level: EAL4+ ALC_FLR.2
- product: CENTAGATE v3.010-build13
- recognition: CCRA
- url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/143
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
{} |
51729b94f0ac139f, 29ba341b00e9bd10, 36b1d4890baaa7f4, 593b939921a117e0, 83014eb399a802f3, c40ae795865a0dba |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_mdm_agent_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_WLANC_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_BT_V1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_MDF_V3.3.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD-BIO-v1.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PKG_TLS_V1.1.pdf |
| pdf_data/cert_filename |
|
st_vid11419-ci.pdf |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
- US:
- CCEVS-VR-VID11419-2024: 1
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
- /CreationDate: D:20240329114002-04'00'
- /ModDate: D:20240329114002-04'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 189538
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
| pdf_data/report_filename |
ISCB-5-RPT-C072-CR-v1.pdf |
st_vid11419-vr.pdf |
| pdf_data/report_frontpage |
|
- US:
- cert_id: CCEVS-VR-VID11419-2024
- cert_item: Google Pixel Devices on Android 14
- cert_lab: US NIAP
|
| pdf_data/report_keywords/cc_cert_id |
- MY:
- ISCB-3-RPT-C072-CR-v1: 28
|
- US:
- CCEVS-VR-VID11419-2024: 1
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL4: 5
- EAL4 augmented: 1
- EAL4+: 4
|
|
| pdf_data/report_keywords/cc_sar |
|
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- ISO:
- ISO/IEC 18045: 2
- ISO/IEC15408: 2
|
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
- OutOfScope:
- OTP Hardware token, where this is out of the evaluation. SMS service to register the device is also out of scope. 18 Potential consumers of the TOE are advised that some functions and services may not have been: 1
- out of scope: 1
|
|
| pdf_data/report_metadata |
- /Author: ISCB Department
- /CreationDate: D:20170720054033+00'00'
- /Creator: Microsoft Word
- /Keywords: MyCB_TMP_002
- /ModDate: D:20170720054033+00'00'
- /Subject: CENTAGATE v3.0.10-build13
- /Title: C072 Certification Report
- pdf_file_size_bytes: 649341
- pdf_hyperlinks: mailto:[email protected], http://www.cybersecurity.my/mycc
- pdf_is_encrypted: False
- pdf_number_of_pages: 29
|
|
| pdf_data/st_filename |
2017-05-08-CTG-ST-3.0.pdf |
st_vid11419-st.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 4: 1
- EAL 4 augmented: 1
- EAL4: 3
- EAL4 augmented: 1
|
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.2: 2
- ALC_FRL.2: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 10
- AGD_PRE: 1
- AGD_PRE.1: 6
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 4
- ALC_CMS: 1
- ALC_CMS.1: 5
- ALC_TSU_EXT: 1
- ALC_TSU_EXT.1: 8
- ATE:
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_ARP: 3
- FAU_ARP.1: 5
- FAU_ARP.1.1: 1
- FAU_GEN: 2
- FAU_GEN.1: 10
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 1
- FAU_GEN.2: 4
- FAU_GEN.2.1: 1
- FAU_SAA: 1
- FAU_SAA.1: 8
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 1
- FAU_SAA.2: 6
- FAU_SAA.2.1: 1
- FAU_SAA.2.2: 1
- FAU_SAA.2.3: 1
- FAU_SAR: 2
- FAU_SAR.1: 5
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 3
- FAU_SAR.2.1: 1
- FCS:
- FCS_CKM.1: 13
- FCS_CKM.1.1: 1
- FCS_CKM.2: 10
- FCS_CKM.2.1: 1
- FCS_CKM.4: 13
- FCS_CKM.4.1: 1
- FCS_COP.1: 11
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 12
- FDP_ACC.1.1: 1
- FDP_ACF.1: 12
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 1
- FDP_ITC.1: 3
- FDP_ITC.2: 3
- FIA:
- FIA_AFL.1: 6
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 7
- FIA_ATD.1.1: 1
- FIA_UAU.1: 8
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.2: 3
- FIA_UAU.2.1: 1
- FIA_UAU.5: 9
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 7
- FIA_UAU.6.1: 1
- FIA_UID.1: 13
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_UID.2: 7
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA.1: 5
- FMT_MSA.1.1: 1
- FMT_MSA.3: 5
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF.1: 5
- FMT_SMF.1.1: 1
- FMT_SMR.1: 12
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FTA:
|
- FAU:
- FAU_ALT_EXT.2: 3
- FAU_ALT_EXT.2.1: 1
- FAU_ALT_EXT.2.2: 1
- FAU_GEN: 3
- FAU_GEN.1: 11
- FAU_GEN.1.1: 3
- FAU_GEN.1.2: 1
- FAU_SAR.1: 1
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SEL.1: 2
- FAU_SEL.1.1: 1
- FAU_STG.1: 2
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.4: 1
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM: 9
- FCS_CKM.1: 9
- FCS_CKM.1.1: 1
- FCS_CKM.2: 4
- FCS_CKM_EXT.1: 3
- FCS_CKM_EXT.1.1: 1
- FCS_CKM_EXT.1.2: 1
- FCS_CKM_EXT.1.3: 1
- FCS_CKM_EXT.2: 11
- FCS_CKM_EXT.2.1: 1
- FCS_CKM_EXT.3: 11
- FCS_CKM_EXT.3.1: 1
- FCS_CKM_EXT.3.2: 1
- FCS_CKM_EXT.4: 5
- FCS_CKM_EXT.4.1: 2
- FCS_CKM_EXT.4.2: 1
- FCS_CKM_EXT.5: 2
- FCS_CKM_EXT.5.1: 1
- FCS_CKM_EXT.5.2: 1
- FCS_CKM_EXT.6: 3
- FCS_CKM_EXT.6.1: 1
- FCS_CKM_EXT.8: 4
- FCS_CKM_EXT.8.1: 1
- FCS_COP: 66
- FCS_COP.1: 7
- FCS_RBG_EXT.1: 15
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FCS_RBG_EXT.1.3: 1
- FCS_SRV_EXT.1: 3
- FCS_SRV_EXT.1.1: 1
- FCS_SRV_EXT.2: 2
- FCS_SRV_EXT.2.1: 1
- FCS_STC_EXT.1.2: 1
- FCS_STG_EXT: 1
- FCS_STG_EXT.1: 5
- FCS_STG_EXT.1.1: 1
- FCS_STG_EXT.1.2: 1
- FCS_STG_EXT.1.3: 1
- FCS_STG_EXT.1.4: 1
- FCS_STG_EXT.1.5: 1
- FCS_STG_EXT.2: 6
- FCS_STG_EXT.2.1: 2
- FCS_STG_EXT.2.2: 1
- FCS_STG_EXT.3: 2
- FCS_STG_EXT.3.1: 1
- FCS_STG_EXT.3.2: 1
- FCS_STG_EXT.4: 2
- FCS_STG_EXT.4.1: 1
- FCS_TLSC_EXT: 7
- FCS_TLSC_EXT.1: 9
- FCS_TLSC_EXT.1.1: 1
- FCS_TLSC_EXT.1.2: 1
- FCS_TLSC_EXT.1.3: 1
- FCS_TLSC_EXT.2: 3
- FCS_TLSC_EXT.2.1: 1
- FCS_TLSC_EXT.4: 2
- FCS_TLSC_EXT.4.1: 1
- FCS_TLSC_EXT.5: 2
- FCS_TLSC_EXT.5.1: 1
- FCS_TLS_EXT.1: 2
- FCS_TLS_EXT.1.1: 1
- FCS_WPA_EXT.1: 3
- FCS_WPA_EXT.1.1: 1
- FDP:
- FDP_ACC.1: 3
- FDP_ACF_EXT.1: 3
- FDP_ACF_EXT.1.1: 1
- FDP_ACF_EXT.1.2: 2
- FDP_ACF_EXT.2: 2
- FDP_ACF_EXT.2.1: 1
- FDP_DAR_EXT.1: 3
- FDP_DAR_EXT.1.1: 1
- FDP_DAR_EXT.1.2: 1
- FDP_DAR_EXT.2: 4
- FDP_DAR_EXT.2.1: 1
- FDP_DAR_EXT.2.2: 1
- FDP_DAR_EXT.2.3: 1
- FDP_DAR_EXT.2.4: 1
- FDP_IFC_EXT.1: 3
- FDP_IFC_EXT.1.1: 1
- FDP_STG_EXT.1: 2
- FDP_STG_EXT.1.1: 1
- FDP_UPC_EXT: 4
- FDP_UPC_EXT.1: 5
- FIA:
- FIA_AFL_EXT.1: 2
- FIA_AFL_EXT.1.1: 1
- FIA_AFL_EXT.1.2: 1
- FIA_AFL_EXT.1.3: 1
- FIA_AFL_EXT.1.4: 1
- FIA_AFL_EXT.1.5: 1
- FIA_AFL_EXT.1.6: 1
- FIA_BLT_EXT.1: 3
- FIA_BLT_EXT.1.1: 1
- FIA_BLT_EXT.2: 3
- FIA_BLT_EXT.2.1: 1
- FIA_BLT_EXT.3: 3
- FIA_BLT_EXT.3.1: 1
- FIA_BLT_EXT.4: 3
- FIA_BLT_EXT.4.1: 1
- FIA_BLT_EXT.4.2: 1
- FIA_BLT_EXT.6: 2
- FIA_BLT_EXT.6.1: 1
- FIA_BLT_EXT.7: 3
- FIA_BLT_EXT.7.1: 1
- FIA_BMG_EXT: 1
- FIA_ENR_EXT.2: 3
- FIA_ENR_EXT.2.1: 1
- FIA_MBE_EXT.1: 2
- FIA_MBE_EXT.1.1: 1
- FIA_MBE_EXT.2: 2
- FIA_MBE_EXT.2.1: 1
- FIA_MBV_EXT: 4
- FIA_MBV_EXT.1: 7
- FIA_MBV_EXT.2: 2
- FIA_MBV_EXT.2.1: 1
- FIA_PAE_EXT.1: 3
- FIA_PAE_EXT.1.1: 1
- FIA_PMG_EXT.1: 5
- FIA_PMG_EXT.1.1: 1
- FIA_TRT_EXT.1: 3
- FIA_TRT_EXT.1.1: 1
- FIA_UAU: 2
- FIA_UAU.5: 2
- FIA_UAU.5.1: 3
- FIA_UAU.5.2: 1
- FIA_UAU.6: 2
- FIA_UAU.7: 1
- FIA_UAU.7.1: 1
- FIA_UAU_EXT.1: 3
- FIA_UAU_EXT.1.1: 1
- FIA_UAU_EXT.2: 3
- FIA_UAU_EXT.2.1: 3
- FIA_UAU_EXT.2.2: 1
- FMT:
- FMT_MOF_EXT.1: 4
- FMT_MOF_EXT.1.1: 1
- FMT_MOF_EXT.1.2: 1
- FMT_POL_EXT.2: 3
- FMT_POL_EXT.2.1: 1
- FMT_POL_EXT.2.2: 1
- FMT_SMF: 2
- FMT_SMF.1: 3
- FMT_SMF.1.1: 1
- FMT_SMF_EXT: 2
- FMT_SMF_EXT.1: 2
- FMT_SMF_EXT.2: 2
- FMT_SMF_EXT.2.1: 1
- FMT_SMF_EXT.3: 2
- FMT_SMF_EXT.3.1: 1
- FMT_SMF_EXT.4: 3
- FMT_SMF_EXT.4.1: 1
- FMT_SMF_EXT.4.2: 1
- FMT_UNR_EXT.1: 2
- FMT_UNR_EXT.1.1: 2
- FPT:
- FPT_AEX_EXT.1: 3
- FPT_AEX_EXT.1.1: 1
- FPT_AEX_EXT.1.2: 1
- FPT_AEX_EXT.2: 2
- FPT_AEX_EXT.2.1: 1
- FPT_AEX_EXT.3: 3
- FPT_AEX_EXT.3.1: 1
- FPT_AEX_EXT.4: 2
- FPT_AEX_EXT.4.1: 1
- FPT_AEX_EXT.4.2: 1
- FPT_AEX_EXT.5: 2
- FPT_AEX_EXT.5.1: 1
- FPT_AEX_EXT.5.2: 1
- FPT_BBD_EXT.1: 2
- FPT_BBD_EXT.1.1: 1
- FPT_BDP_EXT.1: 2
- FPT_BDP_EXT.1.1: 1
- FPT_BDP_EXT.1.2: 1
- FPT_JTA_EXT.1: 2
- FPT_JTA_EXT.1.1: 1
- FPT_KST_EXT.1: 4
- FPT_KST_EXT.1.1: 1
- FPT_KST_EXT.2: 3
- FPT_KST_EXT.2.1: 1
- FPT_KST_EXT.3: 3
- FPT_KST_EXT.3.1: 1
- FPT_NOT_EXT.1: 2
- FPT_NOT_EXT.1.1: 1
- FPT_PBT_EXT.1: 2
- FPT_PBT_EXT.1.1: 1
- FPT_STM.1: 2
- FPT_STM.1.1: 1
- FPT_TST_EXT: 8
- FPT_TST_EXT.1: 3
- FPT_TST_EXT.1.1: 1
- FPT_TST_EXT.2: 2
- FPT_TST_EXT.3: 2
- FPT_TUD_EXT.1: 3
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FPT_TUD_EXT.2: 2
- FPT_TUD_EXT.2.1: 1
- FPT_TUD_EXT.2.2: 1
- FPT_TUD_EXT.2.3: 1
- FPT_TUD_EXT.3: 2
- FPT_TUD_EXT.3.1: 1
- FPT_TUD_EXT.5: 1
- FPT_TUD_EXT.6: 2
- FPT_TUD_EXT.6.1: 1
- FTA:
- FTA_SSL_EXT.1: 3
- FTA_SSL_EXT.1.1: 1
- FTA_SSL_EXT.1.2: 1
- FTA_SSL_EXT.1.3: 1
- FTA_TAB.1: 1
- FTA_TAB.1.1: 1
- FTA_WSE_EXT.1: 3
- FTA_WSE_EXT.1.1: 1
- FTP:
- FTP_BLT_EXT: 6
- FTP_BLT_EXT.1: 3
- FTP_BLT_EXT.1.1: 1
- FTP_BLT_EXT.1.2: 1
- FTP_BLT_EXT.2: 2
- FTP_BLT_EXT.2.1: 1
- FTP_BLT_EXT.3: 2
- FTP_ITC: 2
- FTP_ITC.1: 3
- FTP_ITC_EXT.1: 5
- FTP_ITC_EXT.1.1: 3
- FTP_ITC_EXT.1.2: 2
- FTP_ITC_EXT.1.3: 2
- FTP_TRP.1: 1
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.COMPENT_ADMIN: 1
- A.COMPENT_ADMINSTRATORS: 1
- A.FIREWALL: 2
- A.MAIL_SERVER: 2
- A.MALICIOUS_CODE: 1
- A.NO_EVIL: 2
- A.OPERATING_SYSTEM: 1
- A.PORT_PROTECT: 2
- A.TIME_STAMP: 2
- D:
- O:
- O.ALERT: 6
- O.AUDIT: 7
- O.AUTH_MECH: 8
- O.MOBILE_SENSITVE: 2
- O.MOBILE_SENSITVE_: 1
- O.MOBILE_SENSITVE_PROTECTION: 5
- O.TRAFFIC_PROTECTION: 23
- O.USER_ACC: 1
- O.USER_ACC_CONTROL: 19
- OE:
- OE.COMPENT_: 1
- OE.COMPENT_ADMINSTRATORS: 1
- OE.FIREWALL: 2
- OE.MAIL_SERVER: 2
- OE.MALICIOUS_CODE_N: 1
- OE.MALICIOUS_CODE_NOT_SIGN: 1
- OE.NO_EVIL: 2
- OE.OPERATING_SYSTEM: 1
- OE.PHYSICAL_PROTECTION: 1
- OE.PORT_PROTECT: 2
- OE.TIME_STAMP: 2
- T:
- T.CUMMUNICATION: 1
- T.CUMMUNICATION_ATTACK: 1
- T.DATA_ACCESS: 2
- T.MOBILE: 1
- T.MOBILE_ATTACK: 1
- T.USER_ACC_CONTROL: 1
- T.WEB_ATTACK: 2
|
- OE:
- OE.CONFIG: 1
- OE.DATA_PROPER_ADMIN: 1
- OE.DATA_PROPER_USER: 2
- OE.IT_ENTERPRISE: 1
- OE.MOBILE_DEVICE_PLATFORM: 1
- OE.NOTIFY: 1
- OE.NO_TOE_BYPASS: 1
- OE.PRECAUTION: 1
- OE.TRUSTED_ADMIN: 1
- OE.WIRELESS_NETWORK: 1
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- AES:
- AES: 34
- AES-128: 1
- AES-256: 17
- constructions:
- MAC:
- HMAC: 7
- HMAC-SHA-256: 4
- HMAC-SHA-384: 2
- HMAC-SHA-512: 2
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-256: 13
- SHA-384: 4
- SHA-512: 2
- SHA256: 1
- scrypt:
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
- IPsec:
- TLS:
- TLS:
- TLS: 74
- TLS 1.1: 1
- TLS 1.2: 2
- VPN:
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
- NIST:
- P-256: 8
- P-384: 8
- P-521: 4
- secp256r1: 2
- secp384r1: 2
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
- TLS_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_RSA_WITH_AES_256_GCM_SHA384: 2
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
|
- FIPS:
- FIPS 180-4: 15
- FIPS 186-4: 18
- FIPS 197: 16
- FIPS 198-1: 15
- FIPS PUB 186-4: 4
- FIPS PUB 197: 2
- NIST:
- NIST SP 800-38A: 1
- NIST SP 800-38C: 1
- NIST SP 800-38D: 1
- NIST SP 800-38E: 1
- NIST SP 800-38F: 1
- NIST SP 800-57: 1
- SP 800-108: 10
- SP 800-38A: 4
- SP 800-38C: 1
- SP 800-38D: 3
- SP 800-38E: 4
- SP 800-56A: 1
- SP 800-90A: 6
- RFC:
- RFC 2818: 2
- RFC 3394: 2
- RFC 4346: 1
- RFC 5216: 1
- RFC 5246: 3
- RFC 5280: 4
- RFC 5288: 3
- RFC 5289: 8
- RFC 5746: 1
- RFC 6125: 1
- RFC 6960: 1
- X509:
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
- OutOfScope:
- Out of Scope: 1
- issuer certificate validity, certificate status, and the certificate owner Mobile audio pass (Out of Scope) TOE will generate challenge and PKI certificate will be used to sign the challenge. The signature: 1
- out of scope: 5
- procedure. Table 21: Authentication Components Authentication Method of authentication PKI token (out of scope) The user prompted to select the valid certificate from the list, and then TOE will verify the: 1
- serial number / fingerprint that stored in the DB. Hardware CR OTP (out of scope) User needs to have CR OTP token to use this feature. User will request for a challenge from the: 1
- then be sent back to the TOE by the mobile application and verified for its validity. FIDO (out of scope) User need to plugged in the token then click on the button of the token to submit the validation: 1
- token. This is out of the scope of the evaluation. Also, using SMS to register the device is also out of scope of evaluation. SecureMetric Technology Sdn Bhd 2016 Page 17 of 76 For QR code registration: 1
- which will then be used by the user to generate the OTP. Hardware OTP (out of scope) User needs to have OTP token to use this feature. User will generate an OTP from the OTP token and: 1
|
|
| pdf_data/st_metadata |
- /Author: Rajiv;Biau
- /CreationDate: D:20170523024954+00'00'
- /Creator: Microsoft Word
- /Keywords: ST
- /ModDate: D:20170720134505+08'00'
- /Title: Centagat Security Target
- pdf_file_size_bytes: 1592329
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 76
|
- /Author: Brian Wood
- /CreationDate: D:20240327114501-04'00'
- /Creator: Microsoft® Word for Microsoft 365
- /Keywords: Common Criteria, MDF
- /ModDate: D:20240327114501-04'00'
- /Producer: Microsoft® Word for Microsoft 365
- /Title: Google Pixel Devices on Android 14 Security Target
- pdf_file_size_bytes: 1442337
- pdf_hyperlinks: https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=13389, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=14486, https://source.android.com/docs/compatibility/14/android-14-cdd#7310_biometric_sensors, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35547, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=37254, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=12015, https://developer.android.com/reference/android/app/admin/SecurityLog#constants_1, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=12149, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=11217, https://source.android.com/docs/security/features/biometric/measure#biometric-classes, https://source.android.com/devices/architecture/kernel/modular-kernels#core-kernel-requirements, https://support.google.com/nexus/answer/4457705, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35533, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=12209, http://www.wi-fi.org/certification, https://android-developers.googleblog.com/, https://globalplatform.org/, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=9904, https://developer.android.com/reference/javax/net/ssl/SSLSocket, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=37255, mailto:[email protected], https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=11839, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=37317, https://developer.android.com/reference/android/security/keystore/KeyGenParameterSpec.Builder#setUnlockedDeviceRequired(boolean), https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35052, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=12177, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=10351, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=17273, https://developer.android.com/reference/android/R.attr#protectionLevel, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35538, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=32875, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=10317, https://developer.android.com/reference/android/app/admin/SecurityLog.SecurityEvent, https://developer.android.com/reference/android/security/keystore/KeyGenParameterSpec.Builder#setUserAuthenticationRequired(boolean), https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=8370, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35120, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35548, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=34777, https://source.android.com/setup/contribute/report-bugs, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=37012, http://developer.android.com/reference/android/bluetooth/package-summary.html, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35561, https://source.android.com/docs/security/bulletin, https://m.google.com/, http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.ddi0487a.f/index.html, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=14485, https://developer.android.com/reference/javax/net/ssl/HttpsURLConnection, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=12016, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=21229, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=14487, https://developer.android.com/reference/packages, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=37266
- pdf_is_encrypted: False
- pdf_number_of_pages: 99
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
True |
| state/cert/download_ok |
False |
True |
| state/cert/extract_ok |
False |
True |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |