name |
Juniper Networks M/T/J series Routers |
Renesas HD65256D version 01 smartcard integrated circuit |
category |
Network and Network-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
UK |
DE |
status |
archived |
archived |
not_valid_after |
05.03.2013 |
01.09.2019 |
not_valid_before |
01.04.2007 |
08.03.2007 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP237.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0350a.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/JUNOS%208%201R1%20ST%20v1%200.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0350b.pdf |
manufacturer |
Juniper Networks, Inc. |
Renesas Technology Corporation |
manufacturer_web |
https://www.juniper.net/ |
https://am.renesas.com/ |
security_level |
EAL3+, ALC_FLR.3 |
ADV_IMP.2, AVA_VLA.4, AVA_MSU.3, EAL4+, ALC_DVS.2 |
dgst |
449de5c1b966be87 |
6b5578ec176b7a52 |
heuristics/cert_id |
CRP237 |
BSI-DSZ-CC-0350-2007 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
CVE-2023-22407, CVE-2024-39528, CVE-2022-22215, CVE-2013-4689, CVE-2024-39555, CVE-2023-28975, CVE-2022-22242, CVE-2023-36840, CVE-2022-22244, CVE-2014-3818, CVE-2024-30380, CVE-2019-0036, CVE-2024-39549, CVE-2022-22208, CVE-2021-31372, CVE-2022-22214, CVE-2024-39511, CVE-2023-28962, CVE-2024-39514, CVE-2023-36841, CVE-2024-39558, CVE-2013-6618, CVE-2023-44182, CVE-2023-28979, CVE-2022-22241, CVE-2014-0613, CVE-2023-44184, CVE-2023-44175, CVE-2022-22243, CVE-2013-4686, CVE-2014-0615, CVE-2023-44186, CVE-2023-22406, CVE-2023-36839, CVE-2022-22224, CVE-2022-22238, CVE-2014-2712, CVE-2023-28964, CVE-2023-44177, CVE-2024-39556, CVE-2022-22181, CVE-2022-22162, CVE-2022-22163, CVE-2023-28963, CVE-2004-0230, CVE-2023-36842, CVE-2023-44194, CVE-2004-0468, CVE-2022-22220, CVE-2023-44201, CVE-2023-44197, CVE-2014-0616, CVE-2013-6014, CVE-2024-21594, CVE-2024-39517, CVE-2024-21591, CVE-2022-22156, CVE-2013-7313, CVE-2023-4481, CVE-2013-6170, CVE-2021-31362, CVE-2022-22197, CVE-2022-22245, CVE-2022-22173, CVE-2023-44178, CVE-2024-30397, CVE-2022-22246, CVE-2023-22395, CVE-2023-36843, CVE-2023-44185, CVE-2014-2714, CVE-2023-22391, CVE-2023-44176 |
{} |
heuristics/extracted_sars |
ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_MSU.1, ATE_IND.2, AGD_ADM.1, AVA_VLA.1, ALC_FLR.3, ATE_DPT.1, AVA_SOF.1 |
ASE_ENV.1, ADV_RCR.1, ASE_INT.1, ADV_HLD.2, AGD_USR.1, ALC_DVS.2, ASE_REQ.1, ASE_PPC.1, ASE_DES.1, ADV_FSP.2, AVA_SOF.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, AGD_ADM.1, ALC_LCD.1, ATE_FUN.1, ADV_IMP.2, ATE_DPT.1, AVA_VLA.4, ASE_SRE.1, ASE_OBJ.1, ATE_IND.2, ADV_LLD.1, ADV_SPM.1, AVA_MSU.3 |
heuristics/extracted_versions |
- |
01 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
CRP248 |
BSI-DSZ-CC-0434-2007, BSI-DSZ-CC-0490-2008 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0353-2006 |
heuristics/report_references/indirectly_referenced_by |
CRP248, CRP258 |
BSI-DSZ-CC-0529-2010, BSI-DSZ-CC-0434-2007, BSI-DSZ-CC-0490-2008 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0353-2006, BSI-DSZ-CC-0329-2006 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
CRP237.pdf |
0350a.pdf |
pdf_data/report_frontpage |
|
- DE:
- cert_id: BSI-DSZ-CC-0350-2007
- cert_item: Renesas HD65256D version 01 smartcard integrated circuit
- cert_lab: BSI
- developer: Renesas Technology Corp
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0350: 3
- BSI-DSZ-CC-0350-2007: 21
- BSI-DSZ-CC-0353-2006: 2
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL3: 1
- EAL3 augmented: 1
|
- EAL:
- EAL 1: 1
- EAL 4: 2
- EAL 4 augmented: 1
- EAL 7: 1
- EAL1: 5
- EAL2: 3
- EAL3: 4
- EAL4: 10
- EAL4 augmented: 1
- EAL4+: 2
- EAL5: 6
- EAL6: 3
- EAL7: 4
|
pdf_data/report_keywords/cc_sar |
|
- ACM:
- ACM_AUT: 2
- ACM_AUT.1: 2
- ACM_CAP: 2
- ACM_CAP.4: 2
- ACM_SCP: 2
- ACM_SCP.2: 2
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 2
- ADO_IGS: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP: 2
- ADV_FSP.2: 1
- ADV_HLD: 2
- ADV_HLD.2: 1
- ADV_IMP: 2
- ADV_IMP.2: 5
- ADV_INT: 2
- ADV_LLD: 2
- ADV_LLD.1: 1
- ADV_RCR: 2
- ADV_RCR.1: 1
- ADV_SPM: 2
- ADV_SPM.1: 1
- AGD:
- AGD_ADM: 2
- AGD_ADM.1: 1
- AGD_USR: 2
- AGD_USR.1: 1
- ALC:
- ALC_DVS: 2
- ALC_DVS.2: 6
- ALC_FLR: 2
- ALC_LCD: 1
- ALC_LCD.1: 2
- ALC_TAT: 2
- ALC_TAT.1: 2
- ASE:
- ASE_DES.1: 1
- ASE_ENV.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_PPC.1: 1
- ASE_REQ.1: 1
- ASE_SRE.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 2
- ATE_COV.2: 1
- ATE_DPT: 2
- ATE_DPT.1: 1
- ATE_FUN: 2
- ATE_FUN.1: 1
- ATE_IND: 2
- ATE_IND.2: 1
- AVA:
- AVA_CCA: 2
- AVA_MSU: 2
- AVA_MSU.3: 5
- AVA_SOF: 3
- AVA_SOF.1: 1
- AVA_VLA: 3
- AVA_VLA.2: 1
- AVA_VLA.3: 1
- AVA_VLA.4: 6
|
pdf_data/report_keywords/cc_sfr |
|
- FAU:
- FCS:
- FCS_COP.1: 1
- FCS_RND.1: 1
- FDP:
- FDP_ACC.1: 2
- FDP_ACF.1: 2
- FDP_IFC.1: 1
- FDP_ITT.1: 1
- FMT:
- FMT_LIM.1: 1
- FMT_LIM.2: 1
- FPT:
- FPT_FLS.1: 1
- FPT_ITT.1: 1
- FPT_PHP.3: 1
- FPT_SEP.1: 1
- FRU:
|
pdf_data/report_keywords/cc_claims |
- A:
- A.CRYPTO: 1
- A.EAUTH: 1
- A.LOCATE: 1
- A.NOEVIL: 1
- A.TIME: 1
|
|
pdf_data/report_keywords/vendor |
|
- Infineon:
- Infineon Technologies AG: 1
- Philips:
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 1
- physical tampering: 1
- SCA:
- Physical Probing: 1
- physical probing: 1
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCIMB-2005-08-001: 1
- CCIMB-2005-08-002: 1
- CCIMB-2005-08-003: 1
|
- BSI:
- AIS 25: 1
- AIS 26: 1
- AIS 31: 1
- AIS 34: 1
- ISO:
- ISO/IEC 15408:2005: 3
- ISO/IEC15408: 2005: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- 1.00, Renesas Technology Corp., 7 June 2006, (confidential document) [13] Option List for Mask EEPROM Write (for HD6525D [AE56D]), Revision 1.10R, Renesas Technology: 1
- 9, 2006, (confidential document) B-17 Certification Report BSI-DSZ-CC-0350-2007 This page is intentionally left blank. B-18: 1
- BSI-DSZ-CC-0350, Revision 4.0, 23 August 2006, HD65256D version 01, Renesas Technology Corp. (confidential document) [7] Security Target BSI-DSZ-CC-0350, Revsion 2.0, 23 February, 2007, HD65256D version 01, Renesas: 1
- May 9, 2006, (confidential document) [14] Option List for Mask ROM Data (for HD6525D [AE56D]), Revision 1.0R, Renesas Technology Corp: 1
- Secure Microcomputer AE-5 Series HD65256D (AE56D), Renesas Technology Corp., 10 August, 2006, (confidential document) [11] HD65256D User Guidance Manual – Information for software developers using the HD65256D in: 1
- applications, Revision 1.10, Renesas Technology Corp., 20 July, 2006, (confidential document) [12] KURA Chip User Guidance Manual for Chip User - Information for users of the security chip: 1
- public document) [8] Evaluation Technical Report, 1.0, 29 January 2007 HD65256D version 01 (confidential document) [9] Smartcard IC Platform Protection Profile, version 1.0, July, 2001, BSI registration ID: 1
|
pdf_data/report_metadata |
- /Author: leithe
- /CreationDate: D:20070503115940Z
- /Creator: PScript5.dll Version 5.2
- /ModDate: D:20070514111611+01'00'
- /Producer: GPL Ghostscript 8.15
- /Title: Microsoft Word - LFS T532 CR 10.doc
- pdf_file_size_bytes: 654197
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 22
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Company: BSI, Postfach 200363, 53133 Bonn
- /CreationDate: D:20070309104506+01'00'
- /Creator: Acrobat PDFMaker 7.0.7 für Word
- /Keywords: "Common Criteria, Certification, Zertifizierung, Renesas"
- /ModDate: D:20070315140405+01'00'
- /Producer: Acrobat Distiller 7.0.5 (Windows)
- /SourceModified: D:20070309090100
- /Subject: Certification Report 0350-2007
- /Title: Certification Report BSI-DSZ-CC-0350-2007
- pdf_file_size_bytes: 284920
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 40
|
pdf_data/st_filename |
JUNOS 8 1R1 ST v1 0.pdf |
0350b.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP- 0002: 4
- BSI-PP-0002: 82
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 3: 1
- EAL 3 augmented: 1
- EAL3: 7
- EAL3 augmented: 5
|
- EAL:
- EAL4: 6
- EAL4 augmented: 2
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_CAP.3: 3
- ACM_SCP.1: 3
- ADO:
- ADO_DEL.1: 3
- ADO_IGS.1: 4
- ADV:
- ADV_FSP.1: 3
- ADV_HLD.2: 2
- ADV_RCR.1: 2
- AGD:
- AGD_ADM.1: 3
- AGD_USR.1: 2
- ALC:
- ALC_DVS.1: 2
- ALC_FLR.3: 10
- ATE:
- ATE_COV.2: 2
- ATE_DPT.1: 2
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
- AVA_MSU.1: 2
- AVA_SOF.1: 2
- AVA_VLA.1: 3
|
- ACM:
- ACM_AUT: 1
- ACM_CAP: 1
- ACM_SCP: 1
- ADO:
- ADV:
- ADV_FSP: 2
- ADV_HLD: 1
- ADV_IMP: 1
- ADV_IMP.2: 2
- ADV_LLD: 1
- ADV_RCR: 1
- ADV_SPM: 1
- ADV_SPM.1: 4
- AGD:
- ALC:
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_LCD: 1
- ALC_TAT: 1
- AVA:
- AVA_MSU: 1
- AVA_MSU.3: 2
- AVA_SOF: 6
- AVA_VLA: 1
- AVA_VLA.4: 1
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_ARP.1: 7
- FAU_ARP.1.1: 1
- FAU_GEN.1: 10
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 7
- FAU_GEN.2.1: 1
- FAU_SAA.1: 7
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 1
- FAU_SAR.1: 7
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_STG.1: 7
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FDP:
- FDP_IFC.1: 7
- FDP_IFC.1.1: 1
- FDP_IFF.1: 11
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_IFF.1.6: 1
- FDP_ROL.1: 7
- FDP_ROL.1.1: 1
- FDP_ROL.1.2: 1
- FIA:
- FIA_AFL.1: 1
- FIA_ATD.1: 8
- FIA_ATD.1.1: 1
- FIA_SOS.1: 9
- FIA_SOS.1.1: 1
- FIA_UAU.1: 2
- FIA_UAU.2: 9
- FIA_UAU.2.1: 1
- FIA_UAU.5: 10
- FIA_UAU.5.1: 2
- FIA_UAU.5.2: 2
- FIA_UID.1: 1
- FIA_UID.2: 9
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF: 16
- FMT_MOF.1: 2
- FMT_MSA.3: 10
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 41
- FMT_MTD.1: 6
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR.1: 13
- FMT_SMR.1.1: 1
- FPT:
- FPT_RVM.1: 7
- FPT_RVM.1.1: 1
- FPT_SEP.1: 7
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_STM.1: 8
- FPT_STM.1.1: 1
- FTA:
- FTA_TSE.1: 7
- FTA_TSE.1.1: 1
- FTP:
|
- FAU:
- FAU_GEN.1: 1
- FAU_SAS.1: 9
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM.1: 11
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 11
- FCS_CKM.4.1: 1
- FCS_COP.1: 19
- FCS_COP.1.1: 2
- FCS_RND: 1
- FCS_RND.1: 9
- FCS_RND.1.1: 1
- FDP:
- FDP_ACC.1: 29
- FDP_ACC.1.1: 3
- FDP_ACF.1: 27
- FDP_ACF.1.1: 4
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_IFC.1: 17
- FDP_IFC.1.1: 1
- FDP_IFF.1: 1
- FDP_ITC.1: 12
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITT.1: 10
- FDP_ITT.1.1: 1
- FDP_SDI.1: 1
- FMT:
- FMT_LIM: 1
- FMT_LIM.1: 10
- FMT_LIM.1.1: 1
- FMT_LIM.2: 10
- FMT_LIM.2.1: 1
- FMT_MSA.1: 2
- FMT_MSA.2: 14
- FMT_MSA.2.1: 1
- FMT_MSA.3: 9
- FMT_SMR.1: 1
- FPT:
- FPT_AMT.1: 1
- FPT_FLS.1: 31
- FPT_FLS.1.1: 1
- FPT_ITT.1: 9
- FPT_ITT.1.1: 1
- FPT_PHP.3: 12
- FPT_PHP.3.1: 1
- FPT_SEP.1: 12
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FRU:
- FRU_FLT.1: 1
- FRU_FLT.2: 15
|
pdf_data/st_keywords/cc_claims |
- A:
- A.CRYPTO: 4
- A.EAUTH: 2
- A.LOCATE: 4
- A.NOEVIL: 3
- A.TIME: 4
- O:
- O.ACCESS: 16
- O.AMANAGE: 18
- O.AUDIT: 17
- O.EADMIN: 9
- O.EAL: 6
- O.FLOW: 12
- O.MANAGE: 1
- O.PROTECT: 19
- O.ROLBAK: 4
- OE:
- OE.ADMIN: 3
- OE.CRYPTO: 4
- OE.EAUTH: 4
- OE.PHYSICAL: 3
- OE.TIME: 4
- T:
- T.CONFLOSS: 5
- T.MANDAT: 4
- T.NOAUDIT: 2
- T.OPS: 7
- T.PRIVIL: 7
- T.ROUTE: 10
- T.THREAT: 4
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 2
- Malfunction: 15
- malfunction: 5
- physical tampering: 1
- SCA:
- DPA: 2
- Leak-Inherent: 16
- Physical Probing: 2
- Physical probing: 1
- physical probing: 4
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- BSI:
- AIS 20: 1
- AIS 31: 1
- AIS20: 1
- AIS31: 7
- FIPS:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- accidental or deliberate corruption via use of digitally signed binaries. 2.4.1.3 Summary of items out of scope of the TOE There are no security functionality claims relating to the following items: • All: 1
- out of scope: 2
- prior to any exchange. This covers all services used to exchange information, including telnet (out of scope), SSH, SSL, and FTP 1 . Authentication services can be handled either internally (user selected: 1
|
|
pdf_data/st_metadata |
- /Author: CESG
- /CreationDate: D:20070420105539Z
- /Creator: PScript5.dll Version 5.2
- /ModDate: D:20120106151752Z
- /Producer: GPL Ghostscript 8.15
- /Subject: Security Target for Juniper Networks M/T/J Series Families of Service Routers running JUNOS 8.1R1
- /Title: JUNOS 8.1R1 ST v1_0.doc
- pdf_file_size_bytes: 231235
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 41
|
- /CreationDate: D:20070301165612+09'00'
- /Creator: クセロPDF v1.12 Rev0480
- /ModDate: D:20070315150947+01'00'
- /Producer: Xelo PDF Library
- pdf_file_size_bytes: 1057451
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 67
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |