Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Vertiv Secure KVM Models SC845DP, SC945DP, SC945XP, SCM145DP, SCM185DP, SC885DP, SC985DP, SCM185 v33303-C6C6
383-4-457
IDeal Pass v2.3-i JC with Privacy Protection (BAC Configuration)
NSCIB-CC-196231-CR
name Vertiv Secure KVM Models SC845DP, SC945DP, SC945XP, SCM145DP, SCM185DP, SC885DP, SC985DP, SCM185 v33303-C6C6 IDeal Pass v2.3-i JC with Privacy Protection (BAC Configuration)
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme CA NL
not_valid_after 01.03.2024 19.11.2023
not_valid_before 01.03.2019 19.11.2018
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-457%20CT%20v1.2e%20original%20signed.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Signed%20certificate%20CC-18-196231.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-457%20CR%20v1.2e.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20NSCIB-CC-196231-CR.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Vertiv%20Secure%20KVM%20Models%20SC845DP,%20SC945DP,%20SC945XP,%20SCM145DP,%20SCM185DP,%20SC885DP,%20SC985DP,%20SCM185%20v33303-C6C6%20ST%20Rev%20G.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[ST-BAC-Lite]%202018_2000037746%20-%20Security%20Target%20Lite%20IDeal%20Pass%20v2.3-i%20JC%20(BAC%20Configuration)%20(v1.0,%202018-09-07).pdf
manufacturer Vertiv Idemia
manufacturer_web https://www.vertivco.com https://www.idemia.com
security_level {} ADV_TDS.4, ALC_CMS.5, ATE_DPT.3, ADV_INT.2, ADV_FSP.5, EAL4+, ALC_DVS.2, ALC_TAT.2
dgst 48d7332bd74cbf92 ce867531085e33f8
heuristics/cert_id 383-4-457 NSCIB-CC-196231-CR
heuristics/cert_lab []
heuristics/extracted_sars ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, AGD_PRE.1 ALC_CMS.5, AVA_VAN.5, ADV_TDS.4, ATE_DPT.3, ALC_DVS.2, ADV_ARC.1, ADV_FSP.5, ADV_INT.2, ALC_TAT.2, ADV_SPM.1
heuristics/extracted_versions - 2.3
heuristics/report_references/directly_referencing {} ANSSI-CC-2018/27, NSCIB-CC-195748-CR
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0782-2012, ANSSI-CC-2016/66, NSCIB-CC-195748-CR, BSI-DSZ-CC-0782-V3-2017, BSI-DSZ-CC-0782-V4-2018, ANSSI-CC-2017/59, ANSSI-CC-2018/27, BSI-DSZ-CC-0782-V2-2015
heuristics/st_references/directly_referencing {} ANSSI-CC-2018/27
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0782-V4-2018, ANSSI-CC-2018/27
heuristics/protection_profiles da2e45c9b3fbb700 60455fc9564e2545
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_pss_v3.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0055b.pdf
pdf_data/cert_filename 383-4-457 CT v1.2e original signed.pdf Signed certificate CC-18-196231.pdf
pdf_data/cert_keywords/cc_cert_id
  • CA:
    • 383-4-457: 1
  • NL:
    • CC-18-196231: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
    • EAL7: 1
pdf_data/cert_keywords/cc_sar
  • ADV:
    • ADV_FSP.5: 1
    • ADV_INT.2: 1
    • ADV_TDS.4: 1
  • ALC:
    • ALC_CMS.5: 1
    • ALC_DVS.2: 1
    • ALC_TAT.2: 1
  • ATE:
    • ATE_DPT.3: 1
pdf_data/cert_keywords/cc_claims
  • O:
    • O.M: 1
pdf_data/cert_keywords/eval_facility
  • EWA:
    • EWA-Canada: 1
  • BrightSight:
    • Brightsight: 1
pdf_data/cert_keywords/standard_id
  • ICAO:
    • ICAO: 1
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • /Author: Clark, Cory P.
  • /Company: CSEC
  • /CreationDate: D:20190311113153-04'00'
  • /Creator: Acrobat PDFMaker 17 for Word
  • /ModDate: D:20190311113156-04'00'
  • /Producer: Adobe PDF Library 15.0
  • /SourceModified: D:20190311153140
  • pdf_file_size_bytes: 204348
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20181119163400+01'00'
  • /Creator: BHC364e
  • /ModDate: D:20181119163400+01'00'
  • /Producer: KONICA MINOLTA bizhub C364e
  • /Title: BHC364e-20181119163400
  • pdf_file_size_bytes: 202344
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename 383-4-457 CR v1.2e.pdf Certification Report NSCIB-CC-196231-CR.pdf
pdf_data/report_frontpage
  • NL:
  • CA:
  • NL:
    • cert_id: NSCIB-CC-196231-CR
    • cert_item: IDeal Pass v2.3-i JC with Privacy Protection (BAC Configuration
    • cert_lab: Brightsight
    • developer: IDEMIA
  • CA:
pdf_data/report_keywords/cc_cert_id
  • CA:
    • 383-4-457: 1
  • FR:
    • ANSSI-CC-2018/27: 1
  • NL:
    • CC-19-180045: 1
    • CC-195748: 2
    • NSCIB-CC-196231-CR: 12
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0055: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 1
    • EAL 4 augmented: 1
    • EAL4: 2
    • EAL4 augmented: 1
    • EAL4+: 2
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.5: 2
    • ADV_INT.2: 2
    • ADV_TDS.4: 2
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMS.5: 2
    • ALC_DVS.2: 2
    • ALC_TAT.2: 2
  • ATE:
    • ATE_DPT.3: 2
  • AVA:
    • AVA_VAN.5: 2
pdf_data/report_keywords/vendor
  • Idemia:
    • IDEMIA: 6
  • Infineon:
    • Infineon: 3
pdf_data/report_keywords/eval_facility
  • EWA:
    • EWA-Canada: 1
  • BrightSight:
    • Brightsight: 2
  • CESTI:
    • CESTI: 1
pdf_data/report_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DH: 3
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-2: 1
pdf_data/report_keywords/crypto_library
  • Infineon:
    • v1.02.013: 4
pdf_data/report_keywords/vulnerability
  • ROCA:
    • ROCA: 2
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • fault injection: 1
  • SCA:
    • side channel: 1
  • other:
    • JIL: 2
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 17025:2005: 1
  • ICAO:
    • ICAO: 6
  • ISO:
    • ISO/IEC 18013: 2
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • of the TOE hardware depending on the used hardware platform. For the TOE the MIFARE application is out of scope, but this poses no security risk to the TOE. 2.5 Documentation The following documentation is: 1
    • out of scope: 1
pdf_data/report_metadata
  • /Author: Clark, Cory P.
  • /Comments: v1.2
  • /Company: CSEC
  • /CreationDate: D:20190311114034-04'00'
  • /Creator: Acrobat PDFMaker 17 for Word
  • /ModDate: D:20190311114044-04'00'
  • /Producer: Adobe PDF Library 15.0
  • /SourceModified: D:20190311154013
  • /Title: 383-4-XXX CR v0.1
  • pdf_file_size_bytes: 240980
  • pdf_hyperlinks: mailto:[email protected]
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 17
  • /Author: p646
  • /CreationDate: D:20181120153406+01'00'
  • /Creator: PDFCreator Version 1.2.0
  • /Keywords:
  • /ModDate: D:20181120153406+01'00'
  • /Producer: GPL Ghostscript 9.0
  • /Subject:
  • /Title: Certification Report NSCIB-CC-196231-CR
  • pdf_file_size_bytes: 630780
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 13
pdf_data/st_filename Vertiv Secure KVM Models SC845DP, SC945DP, SC945XP, SCM145DP, SCM185DP, SC885DP, SC985DP, SCM185 v33303-C6C6 ST Rev G.pdf [ST-BAC-Lite] 2018_2000037746 - Security Target Lite IDeal Pass v2.3-i JC (BAC Configuration) (v1.0, 2018-09-07).pdf
pdf_data/st_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2018/27: 2
  • NL:
    • CC-1: 6
    • CC-2: 3
    • CC-3: 3
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0055-2009: 1
    • BSI-CC-PP-0056-V2-2012-MA-02: 1
    • BSI-PP-0035: 1
    • BSI-PP-0055: 1
    • BSI-PP-0056: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 6
    • EAL4 augmented: 2
    • EAL5: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 2
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.5: 4
    • ADV_INT.2: 4
    • ADV_SPM.1: 1
    • ADV_TDS.4: 4
  • AGD:
    • AGD_OPE: 10
    • AGD_PRE: 9
  • ALC:
    • ALC_CMS.5: 4
    • ALC_DVS.2: 5
    • ALC_TAT.2: 4
  • ATE:
    • ATE_DPT.3: 4
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 3
    • FAU_GEN.1.1: 2
    • FAU_GEN.1.2: 2
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 18
    • FDP_ACC.1.1: 1
    • FDP_ACF: 1
    • FDP_ACF.1: 16
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 79
    • FDP_IFC.1.1: 2
    • FDP_IFF: 2
    • FDP_IFF.1: 86
    • FDP_IFF.1.1: 2
    • FDP_IFF.1.2: 3
    • FDP_IFF.1.3: 3
    • FDP_IFF.1.4: 2
    • FDP_IFF.1.5: 13
    • FDP_RIP: 1
    • FDP_RIP.1: 11
    • FDP_RIP.1.1: 6
  • FIA:
    • FIA_UAU.1: 1
    • FIA_UAU.2: 3
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 3
    • FIA_UID.2: 5
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF: 1
    • FMT_MOF.1: 6
    • FMT_MOF.1.1: 2
    • FMT_MSA: 1
    • FMT_MSA.3: 12
    • FMT_SMF.1: 9
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 6
    • FMT_SMR.1.1: 1
  • FPT:
    • FPT_FLS: 1
    • FPT_FLS.1: 14
    • FPT_FLS.1.1: 1
    • FPT_PHP: 1
    • FPT_PHP.1: 9
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 20
    • FPT_PHP.3.1: 1
    • FPT_TST: 1
    • FPT_TST.1: 16
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_ATH_EXT: 1
    • FTA_ATH_EXT.1: 11
    • FTA_ATH_EXT.1.1: 2
    • FTA_CIN_EXT: 6
    • FTA_CIN_EXT.1: 9
    • FTA_CIN_EXT.1.1: 2
    • FTA_SSL.4: 1
    • FTA_TAB.1: 1
  • FAU:
    • FAU_GEN: 1
    • FAU_SAS: 7
    • FAU_SAS.1: 11
    • FAU_SAS.1.1: 2
  • FCS:
    • FCS_CKM: 1
    • FCS_CKM.1: 30
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 22
    • FCS_CKM.4.1: 1
    • FCS_COP: 51
    • FCS_COP.1: 9
    • FCS_RND: 9
    • FCS_RND.1: 13
    • FCS_RND.1.1: 2
  • FDP:
    • FDP_ACC.1: 18
    • FDP_ACC.1.1: 1
    • FDP_ACF: 1
    • FDP_ACF.1: 13
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 4
    • FDP_ITC: 2
    • FDP_ITC.1: 12
    • FDP_ITC.2: 12
    • FDP_UCT.1: 11
    • FDP_UCT.1.1: 1
    • FDP_UIT: 1
    • FDP_UIT.1: 10
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_AFL.1: 8
    • FIA_AFL.1.1: 3
    • FIA_AFL.1.2: 3
    • FIA_API: 16
    • FIA_API.1: 5
    • FIA_API.1.1: 1
    • FIA_SOS.2: 1
    • FIA_UAU: 6
    • FIA_UAU.1: 10
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.4: 16
    • FIA_UAU.4.1: 1
    • FIA_UAU.5: 10
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 4
    • FIA_UAU.6: 12
    • FIA_UAU.6.1: 1
    • FIA_UID.1: 12
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_LIM: 8
    • FMT_LIM.1: 18
    • FMT_LIM.1.1: 3
    • FMT_LIM.2: 19
    • FMT_LIM.2.1: 4
    • FMT_MSA.1: 1
    • FMT_MSA.2: 1
    • FMT_MSA.3: 3
    • FMT_MTD: 35
    • FMT_MTD.1: 5
    • FMT_SMF.1: 18
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 19
    • FMT_SMR.1.1: 3
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_EMS.1: 1
    • FPT_EMS.1.1: 1
    • FPT_EMS.1.2: 1
    • FPT_FLS.1: 10
    • FPT_FLS.1.1: 1
    • FPT_PHP.3: 10
    • FPT_PHP.3.1: 1
    • FPT_RVM.1: 1
    • FPT_SEP.1: 1
    • FPT_TST.1: 9
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 2
  • FTP:
    • FTP_ITC.1: 5
    • FTP_TRP.1: 5
pdf_data/st_keywords/cc_claims
  • A:
    • A.NO_SPECIAL_ANALOG_CAPABILITIE: 1
    • A.NO_SPECIAL_ANALOG_CAPABILITIES: 1
    • A.NO_TEMPEST: 3
    • A.PHYSICAL: 3
    • A.TRUSTED_ADMIN: 2
    • A.TRUSTED_CONFIG: 3
  • O:
    • O.ANTI_TAMPERING: 7
    • O.ANTI_TAMPERING_BACKUP_FAIL_T: 1
    • O.ANTI_TAMPERING_BACKUP_FAIL_TR: 1
    • O.ANTI_TAMPERING_BACKUP_FAIL_TRIGG: 2
    • O.ANTI_TAMPERING_BACKUP_FAIL_TRIGGE: 1
    • O.ANTI_TAMPERING_BACKUP_FAIL_TRIGGER: 2
    • O.ANTI_TAMPERING_BACKUP_POWER: 7
    • O.ANTI_TAMPERING_INDICATION: 7
    • O.ANTI_TAMPERING_PERMANENTLY_: 2
    • O.ANTI_TAMPERING_PERMANENTLY_DISA: 2
    • O.ANTI_TAMPERING_PERMANENTLY_DISAB: 1
    • O.ANTI_TAMPERING_PERMANENTLY_DISABLE_TOE: 3
    • O.AUTHORIZED_SWITCHING: 6
    • O.COMPUTER_INTERFACE_ISOLATION: 12
    • O.COMPUTER_INTERFACE_ISOLATION_: 1
    • O.COMPUTER_INTERFACE_ISOLATION_TO: 1
    • O.COMPUTER_INTERFACE_ISOLATION_TOE: 2
    • O.COMPUTER_INTERFACE_ISOLATION_TOE_UNPOWERED: 4
    • O.COMPUTER_TO_AUDIO_ISOLATION: 7
    • O.CONTINUOUS_INDICATION: 7
    • O.DISABLE_UNAUTHORIZED_ENDPOIN: 2
    • O.DISABLE_UNAUTHORIZED_ENDPOINTS: 5
    • O.DISABLE_UNAUTHORIZED_PERIPHER: 2
    • O.DISABLE_UNAUTHORIZED_PERIPHERAL: 5
    • O.DISPLAYPORT_AUX_FILTERING: 4
    • O.KEYBOARD_AND_MOUSE_TIED: 7
    • O.KEYBOARD_MOUSE_EMULATED: 7
    • O.KEYBOARD_MOUSE_UNIDIRECTION: 1
    • O.KEYBOARD_MOUSE_UNIDIRECTIONA: 1
    • O.KEYBOARD_MOUSE_UNIDIRECTIONAL: 5
    • O.NO_AMBIGUOUS_CONTROL: 7
    • O.NO_ANALOG_AUDIO_INPUT: 8
    • O.NO_CONNECTED_COMPUTER_CONT: 2
    • O.NO_CONNECTED_COMPUTER_CONTRO: 1
    • O.NO_CONNECTED_COMPUTER_CONTROL: 4
    • O.NO_DOCKING_PROTOCOLS: 7
    • O.NO_OTHER_EXTERNAL_INTERFACES: 10
    • O.NO_TOE_ACCESS: 8
    • O.NO_USER_DATA_RETENTION: 9
    • O.PERIPHERAL_PORTS_ISOLATION: 12
    • O.PURGE_TOE: 3
    • O.PURGE_TOE_KB_DATA_WHILE_SWI: 1
    • O.PURGE_TOE_KB_DATA_WHILE_SWIT: 1
    • O.PURGE_TOE_KB_DATA_WHILE_SWITCHI: 1
    • O.SELF_TEST: 9
    • O.SELF_TEST_FAIL_INDICATION: 7
    • O.SELF_TEST_FAIL_TOE_DISABLE: 9
    • O.TAMPER_EVIDENT_LABEL: 9
    • O.UNIDIRECTIONAL_AUDIO_OUT: 7
    • O.UNIDIRECTIONAL_VIDEO: 7
    • O.UNIDIRERCTIONAL_EDID: 7
    • O.USER_AUTHENTICATION_ADMIN: 7
    • O.USER_AUTHENTICATION_ISOLATION: 7
    • O.USER_AUTHENTICATION_RESET: 11
    • O.USER_AUTHENTICATION_TERMINAT: 1
    • O.USER_AUTHENTICATION_TERMINATI: 1
    • O.USER_AUTHENTICATION_TERMINATION: 3
    • O.USER_DATA_ISOLATION: 9
  • OE:
    • OE.PHYSICAL: 4
    • OE.TRUSTED_ADMIN: 6
  • T:
    • T.AUDIO_REVERSED: 1
    • T.AUTHORIZED_BUT_UNT: 1
    • T.AUTHORIZED_BUT_UNTRUSTED_DEVICES: 1
    • T.DATA_LEAK: 3
    • T.FAILED: 1
    • T.LOGICAL_TAMPER: 3
    • T.MICROPHONE_USE: 1
    • T.PHYSICAL_TAMPER: 2
    • T.REPLACEMENT: 3
    • T.RESIDUAL_LEAK: 3
    • T.SIGNAL_LEAK: 2
    • T.UNAUTHORIZED_DEVIC: 1
    • T.UNAUTHORIZED_DEVICES: 2
    • T.UNINTENDED_SWITCHI: 1
    • T.UNINTENDED_SWITCHING: 1
  • A:
    • A.MRTD_: 1
  • OE:
    • OE.AA_MRTD: 6
    • OE.MRTD_: 2
pdf_data/st_keywords/vendor
  • Idemia:
    • IDEMIA: 16
  • Infineon:
    • Infineon: 22
pdf_data/st_keywords/eval_facility
  • EWA:
    • EWA: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 11
      • AES-: 1
      • AES-128: 1
  • DES:
    • 3DES:
      • 3DES: 7
      • Triple-DES: 13
    • DES:
      • DES: 4
  • constructions:
    • MAC:
      • CMAC: 4
      • KMAC: 1
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DH: 10
  • ECC:
    • ECC:
      • ECC: 1
    • ECDSA:
      • ECDSA: 12
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 3
      • SHA1: 1
    • SHA2:
      • SHA-2: 2
      • SHA-224: 2
      • SHA-256: 1
      • SHA-384: 2
      • SHA-512: 1
      • SHA224: 1
      • SHA256: 1
      • SHA384: 1
      • SHA512: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 24
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 16
  • PGP:
    • PGP: 1
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
pdf_data/st_keywords/crypto_library
  • Infineon:
    • v1.02.013: 8
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Physical tampering: 1
    • physical tampering: 13
  • FI:
    • Malfunction: 3
    • Physical Tampering: 5
    • Physical tampering: 1
    • fault injection: 1
    • malfunction: 7
    • physical tampering: 1
  • SCA:
    • DPA: 2
    • SPA: 1
    • physical probing: 4
    • timing attacks: 1
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/device_model
  • STM:
    • STM32:
      • STM32F070C6T6: 4
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.COM: 9
    • EF.DG1: 27
    • EF.DG13: 4
    • EF.DG14: 3
    • EF.DG15: 8
    • EF.DG16: 27
    • EF.DG2: 10
    • EF.DG3: 7
    • EF.DG4: 6
    • EF.DG5: 8
    • EF.SOD: 9
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • BSI:
    • AIS31: 4
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS 180-4: 2
    • FIPS 46-3: 2
    • FIPS PUB 197: 1
    • FIPS46: 1
  • ICAO:
    • ICAO: 20
  • ISO:
    • ISO/IEC 14443: 6
    • ISO/IEC 18013: 6
    • ISO/IEC 7816-2: 1
    • ISO/IEC 7816-4: 1
    • ISO/IEC15946-2: 1
  • RFC:
    • RFC 5639: 1
    • RFC-5639: 1
    • RFC3369: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • of the TOE hardware depending on the used hardware platform. For the TOE the MIFARE application is out of scope, but this poses no risk to the TOE security. Figure 1: TOE 1.4.2 TOE usage and security features: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: tmacarthur
  • /CreationDate: D:20190301094140-05'00'
  • /Creator: PDFCreator Version 1.1.0
  • /Keywords:
  • /ModDate: D:20190301094140-05'00'
  • /Producer: GPL Ghostscript 9.0
  • /Subject:
  • /Title: Vertiv Secure KVM Models SC845DP, SC945DP, SC945XP, SCM145DP, SCM185DP, SC885DP, SC985DP, SCM185 v33303-C6C6 ST HDC15954 Rev G
  • pdf_file_size_bytes: 1194501
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 112
  • /Author: IDEMIA
  • /CreationDate: D:20180907132327+02'00'
  • /Creator: Microsoft® Word 2016
  • /Keywords: NSCIB-CC-196231, ASE Lite, ICAO, ePassport, BAC
  • /ModDate: D:20180907132327+02'00'
  • /Producer: Microsoft® Word 2016
  • /Subject: ASE Lite 2018_2000037746, v1.0, 2018-09-07
  • /Title: Security Target Lite IDeal Pass v2.3-i JC with Privacy Protection (BAC Configuration)
  • pdf_file_size_bytes: 1486764
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 102
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different