name |
Lexmark MS822 and MS826 Single-Function Printers with firmware version MSTGW.052.025 with Lexmark Secure Element (P/N 57X0185) |
Cybertrust UniCERT v5.2.1 |
category |
Multi-Function Devices |
Products for Digital Signatures |
scheme |
CA |
AU |
status |
archived |
archived |
not_valid_after |
24.01.2024 |
13.07.2017 |
not_valid_before |
24.01.2019 |
25.10.2006 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-472%20CT%20v1.1e%20-%20original%20signed.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-472%20CR%201.0e.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/EFAT028_Certification_Report_V1.0.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Lexmark%20SFP%20MSTGW%20Security%20Target%2014.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Cybertrust_UniCERT_5.2.1_ST.pdf |
manufacturer |
Lexmark International, Inc. |
Cybertrust |
manufacturer_web |
https://www.lexmark.com/ |
https://www.cybertrust.com/ |
security_level |
{} |
EAL4+, ALC_FLR.2 |
dgst |
4f3bb38002e116ad |
6780328fff5788c0 |
heuristics/cert_id |
383-4-472 |
Certificate Number: 2006/39 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
cpe:2.3:h:lexmark:ms826:-:*:*:*:*:*:*:*, cpe:2.3:o:lexmark:ms822_firmware:-:*:*:*:*:*:*:*, cpe:2.3:o:lexmark:ms826_firmware:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:ms822:-:*:*:*:*:*:*:* |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
CVE-2021-44738, CVE-2023-23560, CVE-2021-44734, CVE-2022-29850, CVE-2021-44737, CVE-2021-44735, CVE-2023-22960 |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 |
ASE_ENV.1, ADV_RCR.1, AVA_VLA.2, AGD_AGD.1, ASE_INT.1, ADV_HLD.2, AGD_USR.1, ASE_REQ.1, ASE_PPC.1, ASE_DES.1, ADV_FSP.2, AVA_SOF.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, AVA_MSU.2, AGD_ADM.1, ALC_LCD.1, ATE_FUN.1, ATE_DPT.1, ALC_FLR.2, ALC_DVS.1, ASE_SRE.1, ASE_OBJ.1, ATE_IND.2, ADV_LLD.1, ADV_SPM.1 |
heuristics/extracted_versions |
052.025 |
5.2.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
b2cfec7a92fa2940 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/c0553_pp.pdf |
{} |
pdf_data/cert_filename |
383-4-472 CT v1.1e - original signed.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20190122115136-04'00'
- /Creator: Adobe Illustrator CC 22.0 (Windows)
- /ModDate: D:20190131142030-05'00'
- /Producer: Adobe PDF library 15.00
- /Title: cyber-centre-product-evaluation-certificate-e-bg
- pdf_file_size_bytes: 1848820
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
383-4-472 CR 1.0e.pdf |
EFAT028_Certification_Report_V1.0.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
- AU:
- Certificate Number: 2006/39: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- FIPS:
- FIPS 180-4: 1
- FIPS 186-4: 1
- FIPS 197: 1
- FIPS 198-1: 1
- ISO:
- NIST:
- SP 800-131A: 1
- SP 800-90A: 1
|
- CC:
- CCIMB-99-031: 1
- CCIMB-99-032: 1
- CCIMB-99-033: 1
- PKCS:
- PKCS#11: 3
- PKCS#12: 2
- PKCS#7: 1
- X509:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: Shannon, Keith R.
- /CreationDate: D:20190129134557-05'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20190129134557-05'00'
- /Producer: Microsoft® Word 2016
- /Title: 383-4-XXX CR v0.1
- pdf_file_size_bytes: 387757
- pdf_hyperlinks: mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 18
|
- /CreationDate: D:20061222014212+11'00'
- /Creator: AdobePS5.dll Version 5.2
- /ModDate: D:20061222014212+11'00'
- /Producer: Acrobat Distiller 5.0.5 (Windows)
- /Title: Microsoft Word - EFAT028 Certification Report V1.0.doc
- pdf_file_size_bytes: 184977
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 25
|
pdf_data/st_filename |
Lexmark SFP MSTGW Security Target 14.pdf |
Cybertrust_UniCERT_5.2.1_ST.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 6
- EAL 4 augmented: 1
- EAL 4+: 1
- EAL4: 8
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ACM:
- ACM_AUT: 1
- ACM_AUT.1: 10
- ACM_CAP: 1
- ACM_CAP.4: 18
- ACM_SCP: 1
- ACM_SCP.2: 6
- ADO:
- ADO_DEL: 1
- ADO_DEL.2: 9
- ADO_IGS.1: 8
- ADV:
- ADV_FSP.2: 9
- ADV_HLD: 1
- ADV_HLD.2: 12
- ADV_IMP.1: 6
- ADV_LLD: 1
- ADV_LLD.1: 13
- ADV_RCR: 1
- ADV_RCR.1: 4
- ADV_SPM: 1
- ADV_SPM.1: 10
- AGD:
- AGD_ADM: 1
- AGD_ADM.1: 15
- AGD_AGD.1: 1
- AGD_USR: 1
- AGD_USR.1: 13
- ALC:
- ALC_DVS.1: 7
- ALC_FLR: 2
- ALC_FLR.2: 19
- ALC_LCD.1: 8
- ALC_TAT.1: 9
- ASE:
- ASE_DES.1: 2
- ASE_ENV.1: 2
- ASE_INT.1: 2
- ASE_OBJ.1: 2
- ASE_PPC.1: 2
- ASE_REQ.1: 2
- ASE_SRE.1: 2
- ASE_TSS.1: 2
- ATE:
- ATE_COV.2: 7
- ATE_DPT.1: 6
- ATE_FUN.1: 11
- ATE_IND.2: 7
- AVA:
- AVA_MSU: 1
- AVA_MSU.2: 9
- AVA_SOF.1: 6
- AVA_VLA: 1
- AVA_VLA.2: 10
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_ARP.1: 1
- FAU_GEN: 9
- FAU_GEN.1: 10
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 5
- FAU_GEN.2.1: 1
- FAU_SAR.1: 6
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 5
- FAU_SAR.2.1: 1
- FAU_STG.1: 7
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 5
- FAU_STG.4.1: 1
- FAU_STG_EXT: 3
- FAU_STG_EXT.1: 7
- FAU_STG_EXT.1.1: 2
- FCS:
- FCS_CKM.1: 18
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 10
- FCS_CKM.4.1: 1
- FCS_CKM_EXT: 3
- FCS_CKM_EXT.4: 16
- FCS_CKM_EXT.4.1: 1
- FCS_COP.1: 41
- FCS_COP.1.1: 4
- FCS_RBG_EXT: 2
- FCS_RBG_EXT.1: 15
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 2
- FCS_SSH_EXT.1: 3
- FCS_TLS_EXT.1: 3
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 8
- FDP_ACC.1.1: 1
- FDP_ACF.1: 9
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_DSK_EXT.1: 2
- FDP_DSK_EXT.1.2: 1
- FDP_IFC.1: 1
- FDP_ITC.1: 3
- FDP_ITC.2: 3
- FDP_RIP.1: 5
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 5
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 6
- FIA_ATD.1.1: 1
- FIA_PMG: 4
- FIA_PMG_EXT: 2
- FIA_PMG_EXT.1: 5
- FIA_PMG_EXT.1.1: 1
- FIA_PSK_EXT: 2
- FIA_PSK_EXT.1: 10
- FIA_PSK_EXT.1.1: 2
- FIA_PSK_EXT.1.2: 3
- FIA_PSK_EXT.1.3: 2
- FIA_UAU.1: 9
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 5
- FIA_UAU.7.1: 1
- FIA_UID.1: 11
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 5
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 5
- FMT_MOF.1.1: 1
- FMT_MSA.1: 7
- FMT_MSA.1.1: 1
- FMT_MSA.3: 7
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 5
- FMT_MTD.1.1: 1
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR.1: 13
- FMT_SMR.1.1: 1
- FPT:
- FPT_SKP_EXT: 2
- FPT_SKP_EXT.1: 8
- FPT_SKP_EXT.1.1: 2
- FPT_STM.1: 7
- FPT_STM.1.1: 1
- FPT_TST_EXT: 2
- FPT_TST_EXT.1: 8
- FPT_TST_EXT.1.1: 2
- FPT_TUD_EXT: 2
- FPT_TUD_EXT.1: 8
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 3
- FTA:
- FTA_SSL.1: 1
- FTA_SSL.3: 4
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 11
- FTP_ITC.1.1: 2
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 12
- FTP_TRP.1.1: 3
- FTP_TRP.1.2: 2
- FTP_TRP.1.3: 2
|
- FAU:
- FAU_GEN.1: 14
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 9
- FAU_GEN.2.1: 1
- FAU_SAR.1: 9
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 7
- FAU_SAR.2.1: 1
- FAU_SAR.3: 8
- FAU_SAR.3.1: 1
- FAU_STG.1: 7
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FCO:
- FCO_NRO.2: 9
- FCO_NRO.2.1: 1
- FCO_NRO.2.2: 1
- FCO_NRO.2.3: 1
- FCS:
- FCS_CKM: 7
- FCS_CKM.1: 22
- FCS_CKM.1.1: 1
- FCS_CKM.2: 9
- FCS_CKM.2.1: 2
- FCS_CKM.3: 12
- FCS_CKM.3.1: 1
- FCS_CKM.4: 28
- FCS_CKM.4.1: 1
- FCS_COP: 90
- FCS_COP.1: 10
- FCS_COP.1.1: 2
- FDP:
- FDP_ACC.1: 30
- FDP_ACC.1.1: 1
- FDP_ACF.1: 23
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_DAU: 24
- FDP_DAU.2: 16
- FDP_DAU.2.1: 1
- FDP_DAU.2.2: 1
- FDP_IFC.1: 23
- FDP_IFC.1.1: 1
- FDP_IFF.1: 21
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_IFF.1.6: 1
- FDP_ITC.1: 16
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITT.1: 12
- FDP_ITT.1.1: 1
- FDP_ITT.3: 12
- FDP_ITT.3.1: 1
- FDP_RIP.1: 6
- FDP_RIP.1.1: 1
- FIA:
- FIA_ATD.1: 9
- FIA_ATD.1.1: 1
- FIA_SOS.1: 13
- FIA_SOS.1.1: 1
- FIA_UAU: 45
- FIA_UAU.1: 11
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.2: 2
- FIA_UID: 47
- FIA_UID.1: 32
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_UID.2: 2
- FIA_USB.1: 11
- FIA_USB.1.1: 1
- FMT:
- FMT_MOF.1: 19
- FMT_MOF.1.1: 1
- FMT_MSA: 1
- FMT_MSA.1: 17
- FMT_MSA.1.1: 1
- FMT_MSA.2: 32
- FMT_MSA.2.1: 1
- FMT_MSA.3: 12
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 18
- FMT_MTD.1.1: 1
- FMT_MTD.2: 6
- FMT_MTD.2.1: 1
- FMT_MTD.2.2: 1
- FMT_REV.1: 11
- FMT_REV.1.1: 1
- FMT_REV.1.2: 1
- FMT_SAE: 1
- FMT_SAE.1: 12
- FMT_SAE.1.1: 1
- FMT_SAE.1.2: 1
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR.1: 27
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_ITC: 10
- FPT_ITC.1: 1
- FPT_ITI.1: 12
- FPT_ITI.1.1: 1
- FPT_ITI.1.2: 1
- FPT_ITT: 10
- FPT_ITT.1: 12
- FPT_ITT.1.1: 1
- FPT_PHP.1: 2
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_SAE: 1
- FPT_SSP: 2
- FPT_SSP.1: 5
- FPT_SSP.1.1: 1
- FPT_STM.1: 5
- FTP:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.NETWORK: 2
- A.PHYSICAL: 2
- A.TRAINED_USERS: 2
- A.TRUSTED_ADMIN: 2
- D:
- O:
- O.ACCESS: 1
- O.ACCESS_: 1
- O.ACCESS_CONTROL: 10
- O.ADMIN_ROLES: 9
- O.AUDIT: 12
- O.COMMS_PROTECTION: 14
- O.PURGE_DATA: 6
- O.TSF_SELF_TEST: 4
- O.UPDATE_VERIFICATION: 5
- O.USER_AUTHORIZATION: 11
- OE:
- OE.ADMIN_TRAINING: 2
- OE.ADMIN_TRUST: 2
- OE.NETWORK_PROTECTION: 2
- OE.PHYSICAL_PROTECTION: 2
- OE.USER_TRAINING: 2
- OSP:
- T:
- T.NET_COMPROMISE: 1
- T.NET_COMRPOMISE: 1
- T.TSF_COMPROMISE: 2
- T.TSF_FAILURE: 2
- T.UNAUTHORIZED_ACCESS: 2
- T.UNAUTHORIZED_UPDATE: 2
|
|
pdf_data/st_keywords/vendor |
|
- Cisco:
- Microsoft:
- Oberthur:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 8
- SHA-384: 5
- SHA-512: 1
- SHA256: 3
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IKE:
- IKE: 9
- IKEv1: 11
- IKEv2: 8
- IPsec:
- SSH:
- TLS:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 2
- malfunction: 5
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS PUB 180-3: 1
- FIPS PUB 186-4: 1
- FIPS PUB 197: 1
- FIPS PUB 198-1: 1
- ISO:
- NIST:
- NIST SP 800-38A: 1
- NIST SP 800-56B: 1
- NIST SP 800-90A: 3
- RFC:
- RFC 3164: 1
- RFC 3602: 6
- RFC 4106: 2
- RFC 4109: 2
- RFC 4301: 2
- RFC 4303: 2
- RFC 4304: 2
- RFC 4868: 2
- RFC 5282: 1
- RFC2409: 1
|
- FIPS:
- FIPS 180: 1
- FIPS 186: 1
- FIPS 46-3: 1
- ISO:
- PKCS:
- PKCS #11: 1
- PKCS #7: 1
- PKCS 1: 1
- PKCS#11: 4
- PKCS#12: 5
- PKCS#7: 3
- PKCS11: 4
- PKCS12: 3
- PKCS7: 3
- RFC:
- RFC 13: 1
- RFC1321: 6
- RFC3280: 1
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
- java:
- java.dll: 1
- java.exe: 1
- java.js: 4
- java.policy: 1
- java.security: 1
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- The assessment of the algorithmic strength used by these functions is out of scope of the evaluation, being assessed by the National Authority: 1
- are cryptographic in nature and therefore the assessment of their algorithmic strength is out of scope of the evaluation, being assessed by the National Authority. However one mechanism does require a: 1
- out of scope: 4
- protocol handlers: Web Handler, email Handler, SCEP Handler, and CMP Handler (the CMP Handler is out of scope of the evaluation.) · Web RA Operator (WebRAO) The relationship between these components is shown: 1
- the CMP Handler is out of scope of the evaluation: 1
- to cryptographic SFRs). The assessment of the algorithmic strength used by these functions is out of scope of the evaluation, being assessed by the National Authority. However one mechanism does require a: 1
- users who have no role in the PKI, but have certificates issued by the PKI. Their activities are out of scope of the evaluation. 9.3 Information Flow Control Policy This ST contains one information flow: 1
|
pdf_data/st_metadata |
|
- /CreationDate: D:20061222014648+11'00'
- /Creator: AdobePS5.dll Version 5.2
- /ModDate: D:20061222014648+11'00'
- /Producer: Acrobat Distiller 5.0.5 (Windows)
- /Title: Microsoft Word - Baltimore UniCERT 5 Security Target v5.0ab2.doc
- pdf_file_size_bytes: 1406278
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 266
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |