name |
Juniper Networks M/T/J series Routers |
SAMSUNG Microcontroller RISC 32-bits S3FS91J / S3FS91H / S3FS91V / S3FS93I with SWP, Rev. 7 |
category |
Network and Network-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
UK |
FR |
status |
archived |
archived |
not_valid_after |
05.03.2013 |
01.09.2019 |
not_valid_before |
01.04.2007 |
18.03.2010 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP237.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2009-57fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/JUNOS%208%201R1%20ST%20v1%200.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2009-57en.pdf |
manufacturer |
Juniper Networks, Inc. |
Samsung Electronics Co., Ltd. |
manufacturer_web |
https://www.juniper.net/ |
https://www.samsung.com |
security_level |
EAL3+, ALC_FLR.3 |
ALC_DVS.2, EAL5+, AVA_VAN.5 |
dgst |
449de5c1b966be87 |
7387ae4d4fabe818 |
heuristics/cert_id |
CRP237 |
ANSSI-CC-2009/57 |
heuristics/cert_lab |
[] |
CEA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
CVE-2019-0036, CVE-2024-30397, CVE-2014-0616, CVE-2023-44177, CVE-2022-22197, CVE-2022-22245, CVE-2023-36840, CVE-2022-22224, CVE-2022-22215, CVE-2024-39511, CVE-2013-6014, CVE-2024-39514, CVE-2022-22241, CVE-2023-36843, CVE-2024-39558, CVE-2022-22208, CVE-2023-44182, CVE-2013-4686, CVE-2023-44197, CVE-2023-28975, CVE-2014-0615, CVE-2024-39549, CVE-2024-39555, CVE-2014-3818, CVE-2023-28962, CVE-2023-22406, CVE-2024-39517, CVE-2023-22391, CVE-2021-31362, CVE-2024-21591, CVE-2023-44184, CVE-2022-22162, CVE-2023-22395, CVE-2022-22246, CVE-2023-28964, CVE-2013-6170, CVE-2023-36839, CVE-2004-0230, CVE-2023-44186, CVE-2022-22244, CVE-2022-22173, CVE-2023-44201, CVE-2023-44185, CVE-2022-22242, CVE-2013-7313, CVE-2024-39556, CVE-2023-44178, CVE-2022-22238, CVE-2004-0468, CVE-2024-39528, CVE-2014-2712, CVE-2024-21594, CVE-2023-4481, CVE-2014-2714, CVE-2022-22243, CVE-2023-36842, CVE-2023-36841, CVE-2022-22156, CVE-2014-0613, CVE-2022-22214, CVE-2024-30380, CVE-2013-4689, CVE-2023-44176, CVE-2022-22163, CVE-2023-44175, CVE-2023-22407, CVE-2023-28979, CVE-2013-6618, CVE-2023-44194, CVE-2021-31372, CVE-2022-22220, CVE-2023-28963, CVE-2022-22181 |
{} |
heuristics/extracted_sars |
ALC_FLR.3, ATE_IND.2, ALC_DVS.1, ADV_FSP.1, AVA_VLA.1, ATE_COV.2, ATE_FUN.1, AGD_USR.1, ADV_RCR.1, AGD_ADM.1, ADV_HLD.2, AVA_MSU.1, ATE_DPT.1, AVA_SOF.1 |
ADV_ARC.1, AVA_VAN.5, ATE_COV.2, ADV_FSP.5, ASE_TSS.1, AGD_OPE.1, ATE_DPT.3, ADV_IMP.1, ADV_TDS.4, ASE_REQ.2, ALC_DVS.2, AGD_PRE.1, ASE_CCL.1, ATE_IND.2, ASE_ECD.1, ALC_DEL.1, ASE_OBJ.2, ASE_INT.1, ADV_INT.2, ALC_TAT.2, ASE_SPD.1, ATE_FUN.1, ALC_CMS.5, ALC_CMC.4, ALC_LCD.1 |
heuristics/extracted_versions |
- |
32, 7 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
CRP248 |
ANSSI-CC-2011/24, ANSSI-CC-2013/49, NSCIB-CC-11-32973-CR, NSCIB-CC-09-26151-CR |
heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2009/25 |
heuristics/report_references/indirectly_referenced_by |
CRP258, CRP248 |
ANSSI-CC-2016/60, ANSSI-CC-2014/81, ANSSI-CC-2011/24, ANSSI-CC-2013/65, ANSSI-CC-2019/38, NSCIB-CC-09-26151-CR, ANSSI-CC-2013/60, NSCIB-CC-11-32973-CR, ANSSI-CC-2012/06, ANSSI-CC-2012/39, ANSSI-CC-2013/49 |
heuristics/report_references/indirectly_referencing |
{} |
ANSSI-CC-2009/25 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
ANSSI-CC-2011/24, NSCIB-CC-11-32973-CR, NSCIB-CC-09-26151-CR |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
ANSSI-CC-2011/24, NSCIB-CC-11-32973-CR, NSCIB-CC-09-26151-CR |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
f6d23054061d72ba |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
CRP237.pdf |
ANSSI-CC_2009-57fr.pdf |
pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 (R3
- cert_id: ANSSI-CC-2009/25
- cert_item: Microcontrôleurs RISC 32-bits SAMSUNG S3FS91J / S3FS91H / S3FS91V / S3FS93I, avec SWP, Rév. 7
- cert_item_version: Microcontrôleur : S3FS91J/ S3FS91H/ S3FS91V/ S3FS93I - Rév. 7 Librairies logicielles : Test Rom code version 1.0, RSA library version 3.9S, TRNG library version 1.0, Secure Bootloader version 1.0
- cert_lab: CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France Tél : +33 (0)4 38 78 40 87, mél : cesti.leti@cea.fr
- developer: Samsung Electronics Co. Ltd San#24 Nongseo-Ri, Giheung-Eup, Yongin-City, Gyeonggi-Do, 449-711, République de Corée Commanditaire Samsung Electronics Co. Ltd San#24 Nongseo-Ri, Giheung-Eup, Yongin-City, Gyeonggi-Do, 449-711, République de Corée
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur (.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: BSI-PP-0035 Security IC Platform Protection Profile Version 1.0 June 2007
|
pdf_data/report_keywords/cc_cert_id |
|
- FR:
- ANSSI-CC-2009/25: 2
- ANSSI-CC-2009/57: 17
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP-0035: 1
- BSI-PP-0035-2007: 1
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL3: 1
- EAL3 augmented: 1
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 1
- EAL4: 2
- EAL4+: 2
- EAL5: 1
- EAL5+: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ACM:
- ADO:
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 3
- ALC_DVS.2: 1
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.CRYPTO: 1
- A.EAUTH: 1
- A.LOCATE: 1
- A.NOEVIL: 1
- A.TIME: 1
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCIMB-2005-08-001: 1
- CCIMB-2005-08-002: 1
- CCIMB-2005-08-003: 1
|
- BSI:
- CC:
- CCIMB-2009-07-001: 1
- CCIMB-2009-07-002: 1
- CCIMB-2009-07-003: 1
- CCIMB-2009-07-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: leithe
- /CreationDate: D:20070503115940Z
- /Creator: PScript5.dll Version 5.2
- /ModDate: D:20070514111611+01'00'
- /Producer: GPL Ghostscript 8.15
- /Title: Microsoft Word - LFS T532 CR 10.doc
- pdf_file_size_bytes: 654197
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 22
|
- /CreationDate: D:20100611150832+02'00'
- /Keywords:
- /ModDate: D:20100611150832+02'00'
- /Producer: GPL Ghostscript 8.15
- pdf_file_size_bytes: 317215
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 17
|
pdf_data/st_filename |
JUNOS 8 1R1 ST v1 0.pdf |
ANSSI-CC-cible_2009-57en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 3: 1
- EAL 3 augmented: 1
- EAL3: 7
- EAL3 augmented: 5
|
- EAL:
- EAL 4: 1
- EAL 4 augmented: 1
- EAL 5: 2
- EAL 5 augmented: 2
- EAL5: 6
- EAL5 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_CAP.3: 3
- ACM_SCP.1: 3
- ADO:
- ADO_DEL.1: 3
- ADO_IGS.1: 4
- ADV:
- ADV_FSP.1: 3
- ADV_HLD.2: 2
- ADV_RCR.1: 2
- AGD:
- AGD_ADM.1: 3
- AGD_USR.1: 2
- ALC:
- ALC_DVS.1: 2
- ALC_FLR.3: 10
- ATE:
- ATE_COV.2: 2
- ATE_DPT.1: 2
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
- AVA_MSU.1: 2
- AVA_SOF.1: 2
- AVA_VLA.1: 3
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 3
- ADV_FSP: 2
- ADV_FSP.2: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 3
- ADV_IMP: 1
- ADV_IMP.1: 2
- ADV_INT.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 2
- AGD_PRE: 1
- AGD_PRE.1: 2
- ALC:
- ALC_CMC: 1
- ALC_CMC.4: 1
- ALC_CMS: 2
- ALC_CMS.4: 1
- ALC_CMS.5: 3
- ALC_DEL: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 9
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 1
- ATE_COV.2: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_ARP.1: 7
- FAU_ARP.1.1: 1
- FAU_GEN.1: 10
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 7
- FAU_GEN.2.1: 1
- FAU_SAA.1: 7
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 1
- FAU_SAR.1: 7
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_STG.1: 7
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FDP:
- FDP_IFC.1: 7
- FDP_IFC.1.1: 1
- FDP_IFF.1: 11
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_IFF.1.6: 1
- FDP_ROL.1: 7
- FDP_ROL.1.1: 1
- FDP_ROL.1.2: 1
- FIA:
- FIA_AFL.1: 1
- FIA_ATD.1: 8
- FIA_ATD.1.1: 1
- FIA_SOS.1: 9
- FIA_SOS.1.1: 1
- FIA_UAU.1: 2
- FIA_UAU.2: 9
- FIA_UAU.2.1: 1
- FIA_UAU.5: 10
- FIA_UAU.5.1: 2
- FIA_UAU.5.2: 2
- FIA_UID.1: 1
- FIA_UID.2: 9
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF: 16
- FMT_MOF.1: 2
- FMT_MSA.3: 10
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 41
- FMT_MTD.1: 6
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR.1: 13
- FMT_SMR.1.1: 1
- FPT:
- FPT_RVM.1: 7
- FPT_RVM.1.1: 1
- FPT_SEP.1: 7
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_STM.1: 8
- FPT_STM.1.1: 1
- FTA:
- FTA_TSE.1: 7
- FTA_TSE.1.1: 1
- FTP:
|
- FAU:
- FAU_GEN: 2
- FAU_GEN.1: 1
- FAU_SAS: 8
- FAU_SAS.1: 12
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 5
- FCS_CKM.1: 15
- FCS_CKM.2: 2
- FCS_CKM.4: 7
- FCS_COP: 10
- FCS_COP.1: 18
- FCS_RNG: 11
- FCS_RNG.1: 11
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 1
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 13
- FDP_ACC.1.1: 1
- FDP_ACF: 2
- FDP_ACF.1: 9
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC: 1
- FDP_IFC.1: 19
- FDP_IFC.1.1: 1
- FDP_IFF.1: 3
- FDP_ITC.1: 6
- FDP_ITC.2: 6
- FDP_ITT: 1
- FDP_ITT.1: 18
- FDP_ITT.1.1: 1
- FDP_SDI.1: 1
- FMT:
- FMT_LIM: 8
- FMT_LIM.1: 24
- FMT_LIM.1.1: 2
- FMT_LIM.2: 28
- FMT_LIM.2.1: 2
- FMT_MSA: 2
- FMT_MSA.1: 9
- FMT_MSA.1.1: 1
- FMT_MSA.3: 10
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF: 1
- FMT_SMF.1: 6
- FMT_SMF.1.1: 1
- FMT_SMR.1: 6
- FPT:
- FPT_FLS: 1
- FPT_FLS.1: 21
- FPT_FLS.1.1: 1
- FPT_ITT: 1
- FPT_ITT.1: 16
- FPT_ITT.1.1: 1
- FPT_PHP: 3
- FPT_PHP.3: 20
- FPT_PHP.3.1: 1
- FRU:
- FRU_FLT: 1
- FRU_FLT.1: 1
- FRU_FLT.2: 17
|
pdf_data/st_keywords/cc_claims |
- A:
- A.CRYPTO: 4
- A.EAUTH: 2
- A.LOCATE: 4
- A.NOEVIL: 3
- A.TIME: 4
- O:
- O.ACCESS: 16
- O.AMANAGE: 18
- O.AUDIT: 17
- O.EADMIN: 9
- O.EAL: 6
- O.FLOW: 12
- O.MANAGE: 1
- O.PROTECT: 19
- O.ROLBAK: 4
- OE:
- OE.ADMIN: 3
- OE.CRYPTO: 4
- OE.EAUTH: 4
- OE.PHYSICAL: 3
- OE.TIME: 4
- T:
- T.CONFLOSS: 5
- T.MANDAT: 4
- T.NOAUDIT: 2
- T.OPS: 7
- T.PRIVIL: 7
- T.ROUTE: 10
- T.THREAT: 4
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- DES:
- 3DES:
- 3DES: 9
- TDEA: 1
- TDES: 1
- Triple-DES: 1
- DES:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- Malfunction: 25
- malfunction: 11
- physical tampering: 2
- SCA:
- DPA: 6
- Leak-Inherent: 21
- Physical Probing: 4
- Physical probing: 2
- SPA: 4
- physical probing: 9
- side-channel: 3
- timing attacks: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- accidental or deliberate corruption via use of digitally signed binaries. 2.4.1.3 Summary of items out of scope of the TOE There are no security functionality claims relating to the following items: • All: 1
- out of scope: 2
- prior to any exchange. This covers all services used to exchange information, including telnet (out of scope), SSH, SSL, and FTP 1 . Authentication services can be handled either internally (user selected: 1
|
|
pdf_data/st_metadata |
- /Author: CESG
- /CreationDate: D:20070420105539Z
- /Creator: PScript5.dll Version 5.2
- /ModDate: D:20120106151752Z
- /Producer: GPL Ghostscript 8.15
- /Subject: Security Target for Juniper Networks M/T/J Series Families of Service Routers running JUNOS 8.1R1
- /Title: JUNOS 8.1R1 ST v1_0.doc
- pdf_file_size_bytes: 231235
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 41
|
- /Author: KyungSuk YI
- /Baustein: SLE66C82P/SLE66C42P
- /BausteinVersion: a15
- /Classification: Public
- /Comments:
- /Company:
- /CreationDate: D:20100121195454+09'00'
- /Creator: Word용 Acrobat PDFMaker 9.1
- /Datum: 23-10-2003
- /Dokument: Security Target
- /EEPROM: 8 kBytes
- /Jahr: 2003
- /Keywords: Security Target Lite of S3FS91J/S3FS91H/S3FS91V/S3FS93I 32-bits RISC Microcontroller For Smart Card with SWP, CC EAL5+, Samsung Electroncis, SmartCard IC, Common Criteria version 3.1
- /ModDate: D:20100121200033+09'00'
- /PP_Augmentations: Smartcard Integrated Circuit Platform Augmentations V0.98
- /PP_Date: July 2001
- /PP_Short: BSI-PP-0002; Version 1.0, July 2001
- /PP_Version: 1.0
- /Producer: Acrobat Distiller 9.2.0 (Windows)
- /Protection Profile: Smartcard IC Platform Protection Profile
- /ROM: 64 kBytes
- /SourceModified: D:20100121105235
- /Subject:
S3FS91J/S3FS91H/S3FS91V/S3FS93I 32-bits RISC Microcontroller For Smart Card with SWP Common Criteria(version 3.1) EAL5+ Evaluation
- /Technologie: 0,22 µm
- /Title: Security Target Lite of S3FS91J/S3FS91H/S3FS91V/S3FS93I 32-bits RISC Microcontroller For Smart Card with SWP
- /Version: 1.2
- /XRAM: 2 kBytes
- /m-Nummer: m1474/m1495
- pdf_file_size_bytes: 817573
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 62
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |