name |
TrustWare 3.0 (v3.0.5) |
MorphoSmart Optic 301 Version 1.0 |
category |
Trusted Computing |
Biometric Systems and Devices |
scheme |
NL |
DE |
status |
archived |
archived |
not_valid_after |
11.10.2024 |
01.09.2019 |
not_valid_before |
11.10.2019 |
31.01.2013 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Signed%20certificate%20CC-19-234008.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20NSCIB-CC-234008-CR.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0790a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/TrustWare%203.0%20Security%20Target%20v1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0790b_pdf.pdf |
manufacturer |
Samsung Electronics Co., Ltd. |
Safran Morpho |
manufacturer_web |
https://www.samsung.com |
https://morpho.com |
security_level |
EAL2+, AVA_TEE.2 |
ADV_TDS.1, ASE_REQ.2, ALC_DEL.1, ASE_ECD.1, ATE_FUN.1, ALC_FLR.1, AGD_OPE.1, ASE_TSS.1, ATE_COV.1, ADV_FSP.2, ASE_INT.1, ATE_IND.2, ALC_CMS.2, ASE_CCL.1, AGD_PRE.1, ALC_CMC.2, ASE_SPD.1, ASE_OBJ.2, ADV_ARC.1 |
dgst |
455e10571eb0cf1c |
a9925b1140bde436 |
heuristics/cert_id |
NSCIB-CC-234008-CR |
BSI-DSZ-CC-0790-2013 |
heuristics/cert_lab |
|
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_TEE.2, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
ALC_LCD.2, ASE_INT.1, ALC_DVS.2, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, APE_ECD.1, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, ALC_TAT.3, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, APE_REQ.2, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_IMP.2, ASE_REQ.2, ATE_DPT.4, ADV_INT.3, APE_INT.1, APE_SPD.1, ALC_CMC.2, ATE_IND.2, APE_OBJ.2, ASE_CCL.1, ADV_SPM.1 |
heuristics/extracted_versions |
3.0.5, 3.0 |
1.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
b02ed76d2545326a |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0062b_pdf.pdf |
pdf_data/cert_filename |
Signed certificate CC-19-234008.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
- EAL:
- EAL2: 1
- EAL2 augmented: 1
- EAL4: 1
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20191011155832+01'00'
- /Creator: C458-M&S
- /ModDate: D:20191011155832+01'00'
- /Producer: KONICA MINOLTA bizhub C458
- /Title: C458-M&S19101115580
- pdf_file_size_bytes: 184548
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
Certification Report NSCIB-CC-234008-CR.pdf |
0790a_pdf.pdf |
pdf_data/report_frontpage |
- DE:
- NL:
- cert_id: NSCIB-CC-234008-CR
- cert_item: TrustWare 3.0 (v3.0.5
- cert_lab: Brightsight
- developer: Samsung Electronics Co., Ltd
|
- DE:
- cert_id: BSI-DSZ-CC-0790-2013
- cert_item: MorphoSmart Optic 301, Version 1.0
- cert_lab: BSI
- developer: Safran Morpho
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- NL:
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 2 augmented: 1
- EAL2: 2
- EAL2 augmented: 1
- EAL4: 1
|
- EAL:
- EAL 4: 2
- EAL1: 7
- EAL2: 3
- EAL3: 4
- EAL4: 6
- EAL5: 6
- EAL6: 3
- EAL7: 4
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 5
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 5
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 5
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 5
- AGD_PRE: 1
- AGD_PRE.1: 5
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 5
- ALC_CMC.3: 1
- ALC_CMC.4: 1
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 5
- ALC_CMS.3: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 1
- ALC_DEL: 1
- ALC_DEL.1: 5
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 1
- ALC_FLR: 1
- ALC_FLR.1: 5
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 1
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ALC_TAT.2: 1
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 5
- ASE_ECD: 1
- ASE_ECD.1: 5
- ASE_INT: 1
- ASE_INT.1: 5
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 5
- ASE_REQ.1: 1
- ASE_REQ.2: 5
- ASE_SPD: 1
- ASE_SPD.1: 5
- ASE_TSS: 1
- ASE_TSS.1: 5
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 5
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 1
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 5
- ATE_FUN.2: 1
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 5
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 1
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 4
- TÜViT: 2
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
- MD:
- SHA:
- SHA1:
- SHA2:
- SHA224: 4
- SHA256: 2
- SHA384: 4
- SHA512: 2
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
- CBC:
- CCM:
- CTR:
- ECB:
- GCM:
- XTS:
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
- other:
- JIL: 1
- Reverse engineering: 1
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- FIPS:
- FIPS 180-4: 1
- FIPS 186-4: 2
- FIPS 197: 1
- FIPS 46: 1
- FIPS 81: 1
- PKCS:
- PKCS #3: 1
- PKCS#1: 4
- PKCS5: 1
- RFC:
- RFC 1321: 1
- RFC 2202: 1
- RFC 3610: 1
- RFC 4231: 1
- RFC 7748: 1
- RFC 8032: 1
- RFC1423: 1
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- 19 September 2012, MorphoSmart Optic 301 – Life Cycle Support (ALC) (chapter 2.1), Safran Morpho (confidential document) [13] MSO 301– GUIDES, Version 12, 18 September 2012, Safran Morpho [14] MorphoSmart Programmer’s: 1
- 8] Evaluation Technical Report, Version 6, 21 January 2013, TÜV Informationstechnik GmbH, (confidential document) [9] Fingerprint Spoof Detection Evaluation Guidance (FSDEG), Version 2.1, 18 December 2009: 1
- Target, Version 8, 12 September 2012, MorphoSmart Optic 301 Security Target, Safran Morpho (confidential document) [7] Fingerprint Spoof Detection Protection Profile based on Organisational Security Policies: 1
- OutOfScope:
- out of scope: 1
- relevant events and protection of residual and security relevant data. Biometric verification is out of scope of the certification. The Security Target [6] is the basis for this certification. It is based on: 1
|
pdf_data/report_metadata |
|
- /Author: Federal Office for Information Security
- /CreationDate: D:20130306111458+01'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, Fingerprint Spoof Detection, Fingerprint, Biometrics, Fingerprint Fake Detection"
- /ModDate: D:20130306154334+01'00'
- /Producer: OpenOffice.org 3.2
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0790-2013
- pdf_file_size_bytes: 880965
- pdf_hyperlinks: https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 34
|
pdf_data/st_filename |
TrustWare 3.0 Security Target v1.0.pdf |
0790b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 2 augmented: 1
- EAL2: 3
- EAL2 augmented: 1
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 3
- ADV_FSP.2: 3
- ADV_TDS.1: 3
- AGD:
- AGD_OPE.1: 3
- AGD_PRE.1: 3
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.1: 6
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_TEE: 4
- AVA_TEE.2: 17
- AVA_VAN: 2
- AVA_VAN.2: 4
|
- ADV:
- ADV_ARC.1: 2
- ADV_FSP.1: 2
- ADV_FSP.2: 7
- ADV_TDS.1: 5
- AGD:
- AGD_OPE.1: 4
- AGD_PRE.1: 4
- ALC:
- ALC_CMC.2: 2
- ALC_CMS.2: 2
- ALC_DEL.1: 2
- ALC_FLR.1: 6
- ASE:
- ASE_CCL.1: 2
- ASE_ECD.1: 5
- ASE_INT.1: 3
- ASE_OBJ.2: 3
- ASE_REQ.1: 2
- ASE_REQ.2: 3
- ASE_SPD.1: 2
- ASE_TSS.1: 2
- ATE:
- ATE_COV.1: 5
- ATE_FUN.1: 5
- ATE_IND.2: 2
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_ARP.1: 12
- FAU_ARP.1.1: 1
- FAU_GEN.1: 3
- FAU_SAA.1: 2
- FAU_SAR.1: 9
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_STG.1: 7
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FCS:
- FCS_CKM.1: 11
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 12
- FCS_CKM.4.1: 1
- FCS_COP.1: 21
- FCS_COP.1.1: 1
- FCS_RNG: 3
- FCS_RNG.1: 11
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC: 28
- FDP_ACC.1: 8
- FDP_ACF: 24
- FDP_ACF.1: 11
- FDP_IFC: 17
- FDP_IFC.1: 5
- FDP_IFC.2: 2
- FDP_IFF: 18
- FDP_IFF.1: 7
- FDP_ITC.1: 2
- FDP_ITC.2: 2
- FDP_ITT: 9
- FDP_ITT.1: 2
- FDP_RIP: 8
- FDP_RIP.1: 1
- FDP_ROL: 8
- FDP_ROL.1: 3
- FDP_SDI.2: 17
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FIA:
- FIA_ATD.1: 12
- FIA_ATD.1.1: 1
- FIA_UID.1: 1
- FIA_UID.2: 9
- FIA_UID.2.1: 1
- FIA_USB.1: 10
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA: 47
- FMT_MSA.1: 4
- FMT_MSA.3: 9
- FMT_SMF: 1
- FMT_SMF.1: 18
- FMT_SMF.1.1: 1
- FMT_SMR.1: 18
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 14
- FPT_FLS.1.1: 1
- FPT_INI: 3
- FPT_INI.1: 12
- FPT_INI.1.1: 2
- FPT_INI.1.2: 2
- FPT_INI.1.3: 2
- FPT_ITT: 11
- FPT_ITT.1: 1
- FPT_STM: 1
- FPT_TEE.1: 7
- FPT_TEE.1.1: 1
- FPT_TEE.1.2: 1
|
- FAU:
- FAU_GEN: 4
- FAU_GEN.1: 4
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FDP:
- FDP_RIP: 3
- FDP_RIP.2: 4
- FDP_RIP.2.1: 1
- FMT:
- FMT_MTD: 3
- FMT_MTD.1: 1
- FMT_MTD.3: 7
- FMT_MTD.3.1: 1
- FMT_SMF: 1
- FMT_SMF.1: 6
- FMT_SMF.1.1: 1
- FPT:
- FPT_SPOD: 6
- FPT_SPOD.1: 14
- FPT_SPOD.1.1: 3
- FPT_SPOD.1.2: 3
- FPT_SPOD.1.3: 3
- FPT_SPOD.1.4: 3
- FPT_STM.1: 2
|
pdf_data/st_keywords/cc_claims |
- A:
- A.PROTECTION_AFTER_DELIVERY: 5
- A.ROLLBACK: 5
- A.SECURE_INITIALISATION: 1
- A.SECURE_INITIALIZATION: 4
- A.SECURE_PLATFORM: 6
- A.TA_DEVELOPMENT: 5
- O:
- O.CA_TA_IDENTIFICATION: 8
- O.INITIALIZATION: 22
- O.INSTANCE_TIME: 1
- O.KEYS_USAGE: 16
- O.OPERATION: 24
- O.RNG: 10
- O.RUNTIME_CONFIDENTIALITY: 21
- O.RUNTIME_INTEGRITY: 24
- O.TA_AUTHENTICITY: 15
- O.TA_ISOLATION: 14
- O.TEE_DATA_PROTECTION: 18
- O.TEE_ID: 9
- O.TEE_ISOLATION: 15
- O.TRUSTED_STORAGE: 23
- OE:
- OE.INITALIZATION: 1
- OE.INITIALIZATION: 24
- OE.INSTANCE_TIME: 3
- OE.INTEGRATION_CONFIGURATION: 9
- OE.PROTECTION_AFTER_DELIVERY: 9
- OE.ROLLBACK: 7
- OE.SECRETS: 5
- OE.SECURE_HARDWARE_PLATFORM: 1
- OE.SECURE_PLATFORM: 20
- OE.TA_DEVELOPMENT: 7
- OP:
- OP.EXTRACT_KEY: 4
- OP.LOAD: 3
- OP.STORE: 4
- OP.USE_KEY: 4
- OSP:
- OSP.INTEGRATION_CONFIGURATION: 5
- OSP.SECRETS: 5
- T:
- T.ABUSE_FUNCT: 14
- T.CLONE: 9
- T.FLASH_DUMP: 4
- T.IMPERSONATION: 6
- T.PERTURBATION: 7
- T.RAM: 8
- T.RNG: 5
- T.ROGUE_CODE_EXECUTION: 12
- T.SPY: 6
- T.STORAGE_CORRUPTION: 9
- T.TEE_FIRMWARE_DOWNGRADE: 5
|
- A:
- O:
- O.AUDIT: 7
- O.MANAGEMENT: 7
- O.RESIDUAL: 5
- O.SPOOF_DETECTION: 5
- OE:
- OE.ADMINISTRATION: 9
- OE.BIO: 2
- OE.PHYSICAL: 7
- OE.PLATFORM: 14
- OSP:
- OSP.AUDIT: 4
- OSP.MANAGEMENT: 4
- OSP.RESIDUAL: 4
- OSP.SPOOF_DETECTION: 5
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- MD:
- SHA:
- SHA1:
- SHA2:
- SHA-256: 1
- SHA224: 4
- SHA256: 2
- SHA384: 4
- SHA512: 2
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
- CBC:
- CCM:
- CTR:
- ECB:
- GCM:
- XTS:
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- SCA:
- side-channel: 3
- side-channels: 1
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
- ARM:
- ARM TrustZone: 1
- TrustZone: 5
- other:
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- BSI:
- FIPS:
- FIPS 180-4: 1
- FIPS 186-4: 2
- FIPS 197: 1
- FIPS 46: 1
- FIPS 81: 1
- PKCS:
- PKCS #3: 1
- PKCS#1: 4
- PKCS5: 1
- RFC:
- RFC 1321: 1
- RFC 2202: 1
- RFC 3610: 1
- RFC 4231: 1
- RFC 7748: 1
- RFC 8032: 1
- RFC1423: 1
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- and the fingerprint if genuine. Please be aware that the mechanism for biometric matching is out of scope of the certification. The MSO Demonstrator Application is a software which enables using the MSO: 1
- of the TOE but do not realize any part of the fake finger detection functionality and are therefore out of scope of the certified security functionality. The storage of the generated log, i.e., the Audit log, is: 1
- out of scope: 2
|
pdf_data/st_metadata |
- /Author: brightsight
- /CreationDate: D:20190906104654+02'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20190906104654+02'00'
- /Producer: Microsoft® Word 2016
- pdf_file_size_bytes: 1398540
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 51
|
- /Author: Safran Morpho
- /CreationDate: D:20130121143511
- /Creator: Microsoft® Office Word 2007
- /Keywords: MSO 301, Common Criteria, CC, Securtiy Target, ST, ST-lite
- /ModDate: D:20130121144124+01'00'
- /Producer: Microsoft® Office Word 2007
- /Subject: ST-lite
- /Title: MSO FFD Public Security Target
- pdf_file_size_bytes: 476138
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 30
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |