name |
Symfoware Server Enterprise extended Edtion 4.0 |
MICARDO Tachograph Version 1.0 R1.0 |
category |
Databases |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
DE |
status |
archived |
archived |
not_valid_after |
10.12.2010 |
01.09.2019 |
not_valid_before |
26.11.2003 |
06.09.2006 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0003.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0358a.pdf |
st_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0358b.pdf |
manufacturer |
Fujitsu Limited |
Sagem Orga GmbH |
manufacturer_web |
https://www.fujitsu.com/ |
https://www.sagem-orga.com/ |
security_level |
EAL4 |
ADV_IMP.2, ADO_IGS.2, AVA_VLA.4, EAL4+, ALC_DVS.2 |
dgst |
505e2adba5d4a6cf |
21079eac275d9b22 |
heuristics/cert_id |
JISEC-CC-CRP-C0003 |
BSI-DSZ-CC-0358-2006 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
{} |
ASE_ENV.1, ADV_RCR.1, ASE_INT.1, ADV_HLD.2, AGD_USR.1, ALC_DVS.2, ASE_REQ.1, ASE_PPC.1, ASE_DES.1, ADV_FSP.2, AVA_SOF.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, AVA_MSU.2, ATE_DPT.2, AGD_ADM.1, ALC_LCD.1, ATE_FUN.1, ADV_IMP.2, AVA_VLA.4, ASE_SRE.1, ASE_OBJ.1, ATE_IND.2, ADV_LLD.1, ADV_SPM.1 |
heuristics/extracted_versions |
4.0 |
1.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0661-2011 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0368-2006 |
heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-0661-2011 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0296-2006, BSI-DSZ-CC-0368-2006, BSI-DSZ-CC-0293-2005 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0133
- certification_date: 01.11.2007
- claim: EAL1
- enhanced:
- assurance_level: EAL1
- cc_version: 2.3
- description: PRODUCT DESCRIPTION The TOE enables users to manage operations to execute jobs based on predefined daily schedule on distributed servers on enterprise internal networks. The TOE also enables users to manage those operations in a secure manner although systems are becoming diverse and getting complex. The TOE defines “Job execution based on predefined daily schedule” process and its related resources as protected resources. The TOE provides following security functions to prohibit unauthorized access to the protected resources. - "Extended user authentication function" to identify and authenticate users. - "Access control function" to restrict user operations to authorized users - "Audit log output function" to verify user operations - "Password protection function" to protect passwords from being sniffed sent over enterprise internal networks
- evaluation_facility: Japan Electronics and Information Technology Industries Association, Information Technology Security Center (JEITA ITSC)
- product: Systemwalker Operation Manager Enterprise Edition
- product_type: IT Product (Operation and maintenance supporting software)
- toe_version: V13.2.0 (Linux for Itanium)
- vendor: Fujitsu Limited
- expiration_date: 01.10.2013
- supplier: Fujitsu Limited
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0133_it7150.html
- toe_japan_name: Systemwalker Operation Manager Enterprise Edition V13.2.0 (Linux for Itanium)
- toe_overseas_link: None
- toe_overseas_name: -----
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0003.pdf |
0358a.pdf |
pdf_data/report_frontpage |
|
- DE:
- cert_id: BSI-DSZ-CC-0358-2006
- cert_item: MICARDO Tachograph Version 1.0 R1.0
- cert_lab: BSI
- developer: Sagem Orga GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0358-2006: 25
- BSI-DSZ-CC-0368: 1
- BSI-DSZ-CC-0368-: 1
- BSI-DSZ-CC-0368-2006: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP-0002: 1
- BSI-PP-0002-: 1
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 4: 2
- EAL 4 augmented: 1
- EAL 7: 1
- EAL1: 5
- EAL2: 3
- EAL3: 4
- EAL4: 14
- EAL4 augmented: 3
- EAL4+: 2
- EAL5: 6
- EAL5+: 1
- EAL6: 3
- EAL7: 4
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ACM:
- ACM_AUT: 2
- ACM_AUT.1: 2
- ACM_CAP: 2
- ACM_CAP.4: 2
- ACM_SCP: 2
- ACM_SCP.2: 2
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 2
- ADO_IGS: 2
- ADO_IGS.2: 6
- ADV:
- ADV_FSP: 2
- ADV_FSP.2: 1
- ADV_HLD: 2
- ADV_HLD.2: 1
- ADV_IMP: 2
- ADV_IMP.2: 5
- ADV_INT: 2
- ADV_LLD: 2
- ADV_LLD.1: 1
- ADV_RCR: 2
- ADV_RCR.1: 1
- ADV_SPM: 2
- ADV_SPM.1: 1
- AGD:
- AGD_ADM: 2
- AGD_ADM.1: 1
- AGD_USR: 2
- AGD_USR.1: 1
- ALC:
- ALC_DVS: 2
- ALC_DVS.1: 2
- ALC_FLR: 2
- ALC_LCD: 1
- ALC_LCD.1: 2
- ALC_TAT: 2
- ALC_TAT.1: 2
- ASE:
- ASE_DES.1: 1
- ASE_ENV.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_PPC.1: 1
- ASE_REQ.1: 1
- ASE_SRE.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 2
- ATE_COV.2: 1
- ATE_DPT: 2
- ATE_DPT.2: 5
- ATE_FUN: 2
- ATE_FUN.1: 1
- ATE_IND: 2
- ATE_IND.2: 1
- AVA:
- AVA_CCA: 2
- AVA_MSU: 2
- AVA_MSU.2: 1
- AVA_SOF: 3
- AVA_SOF.1: 1
- AVA_VLA: 3
- AVA_VLA.2: 1
- AVA_VLA.3: 1
- AVA_VLA.4: 6
|
pdf_data/report_keywords/cc_sfr |
|
- FAU:
- FCO:
- FCS:
- FDP:
- FDP_ACC: 2
- FDP_ACF: 2
- FDP_DAU: 1
- FDP_ETC: 2
- FDP_ITC: 1
- FDP_RIP: 1
- FDP_SDI: 1
- FIA:
- FIA_AFL: 2
- FIA_ATD: 1
- FIA_UAU: 3
- FIA_UID: 1
- FIA_USB: 1
- FMT:
- FMT_MOF.1: 1
- FMT_MSA.1: 1
- FMT_MSA.2: 1
- FMT_MSA.3: 1
- FMT_MTD.1: 1
- FMT_SMF.1: 1
- FMT_SMR.1: 1
- FPR:
- FPT:
- FPT_FLS: 1
- FPT_PHP: 1
- FPT_SEP: 1
- FPT_TDC: 1
- FPT_TST: 1
- FTP:
|
pdf_data/report_keywords/cc_claims |
|
- A:
- A.DEV_ORG: 1
- A.DLV_AUDIT: 1
- A.DLV_PROTECT: 1
- A.DLV_RESP: 1
- A.PERS: 3
- A.USE_DIAG: 1
- A.USE_PROD: 1
- A.USE_TEST: 1
- T:
- T.CLON: 1
- T.DIS_DEL: 1
- T.DIS_INFO: 1
- T.DIS_TEST_ES: 1
- T.MOD: 1
- T.MOD_EXE: 1
- T.MOD_LOAD: 1
- T.MOD_SHARE: 1
- T.MOD_SOFT: 1
- T.T_CMD: 1
- T.T_DEL: 1
- T.T_ES: 1
- T.T_TOOLS: 1
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- SRC:
- SRC Security Research & Consulting: 5
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- DFA: 2
- fault injection: 1
- SCA:
- DPA: 2
- SPA: 2
- Side channel: 1
- physical probing: 1
- timing attacks: 2
- other:
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- BSI:
- AIS 25: 2
- AIS 26: 2
- AIS 32: 1
- AIS 34: 3
- AIS 36: 6
- ISO:
- ISO/IEC 10373: 2
- ISO/IEC 15408:2005: 3
- ISO/IEC 7810: 2
- ISO/IEC 7816: 6
- ISO/IEC 7816-3: 4
- ISO/IEC15408: 2005: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- Report (ETR); Version: 1.1; Date: 02.08.2006; Product: MICARDO Tachograph Version 1.0 R1.0 (confidential document) [12] Smart Card IC Platform Protection Profile, Version 1.0, July 2001, registered at the German: 1
- Security Target - MICARDO Tachograph Version 1.0 R1.0, Version V1.00, Sagem ORGA GmbH, 12.06.2006 (confidential document) [7] BSI-DSZ-0358-2006, Security Target - MICARDO Tachograph Version 1.0 R1.0, Version V1.00, Sagem: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20040526154221+09'00'
- /ModDate: D:20040526154221+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 12495
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Company: BSI, Postfach 200363, 53133 Bonn
- /CreationDate: D:20060918072449+02'00'
- /Creator: DEMO MVPDFRoleMapFix
- /Keywords: Common Criteria, Certification, Zertifizierung
- /ModDate: D:20060918082946+02'00'
- /Producer: Acrobat Distiller 7.0.5 (Windows)
- /SourceModified: D:20060918052406
- /Title: Certification Report BSI-DSZ-CC-0358-2006
- pdf_file_size_bytes: 350664
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 50
|
pdf_data/st_filename |
|
0358b.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0293: 1
- BSI-DSZ-CC-0358: 1
- BSI-DSZ-CC-0368: 3
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP-0002: 4
- BSI-PP-0002-2001: 1
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 5
- EAL 4 augmented: 4
- EAL4: 20
- EAL4 augmented: 5
- ITSEC:
- ITSEC E3 high: 6
- ITSEC E3.32: 1
|
pdf_data/st_keywords/cc_sar |
|
- ACM:
- ACM_AUT: 1
- ACM_AUT.1: 1
- ACM_CAP: 1
- ACM_CAP.4: 1
- ACM_SCP: 1
- ACM_SCP.2: 1
- ADO:
- ADO_DEL: 1
- ADO_DEL.2: 1
- ADO_IGS: 1
- ADO_IGS.1: 1
- ADO_IGS.2: 13
- ADV:
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_HLD: 1
- ADV_HLD.2: 3
- ADV_IMP: 1
- ADV_IMP.1: 2
- ADV_IMP.2: 12
- ADV_LLD: 1
- ADV_LLD.1: 4
- ADV_RCR: 2
- ADV_RCR.1: 2
- ADV_SPM: 1
- ADV_SPM.1: 5
- AGD:
- AGD_ADM: 3
- AGD_ADM.1: 1
- AGD_USR: 1
- AGD_USR.1: 2
- ALC:
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_LCD: 1
- ALC_LCD.1: 1
- ALC_TAT: 1
- ALC_TAT.1: 2
- ATE:
- ATE_COV: 1
- ATE_COV.2: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 12
- ATE_FUN: 1
- ATE_FUN.1: 2
- ATE_IND: 1
- ATE_IND.2: 1
- AVA:
- AVA_MSU: 1
- AVA_MSU.2: 2
- AVA_SOF: 1
- AVA_SOF.1: 6
- AVA_VLA: 2
- AVA_VLA.2: 1
- AVA_VLA.4: 15
|
pdf_data/st_keywords/cc_sfr |
|
- FAU:
- FAU_GEN.1: 5
- FAU_SAA: 12
- FAU_SAA.1: 3
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 1
- FCO:
- FCO_NRO: 5
- FCO_NRO.1: 4
- FCO_NRO.1.1: 1
- FCO_NRO.1.2: 1
- FCO_NRO.1.3: 1
- FCS:
- FCS_CKM: 92
- FCS_CKM.1: 6
- FCS_CKM.1.1: 1
- FCS_CKM.2: 6
- FCS_CKM.2.1: 1
- FCS_CKM.3: 7
- FCS_CKM.3.1: 1
- FCS_CKM.4: 10
- FCS_CKM.4.1: 1
- FCS_COP: 29
- FCS_COP.1: 8
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC: 31
- FDP_ACC.1: 9
- FDP_ACC.2: 6
- FDP_ACC.2.1: 1
- FDP_ACC.2.2: 1
- FDP_ACF: 21
- FDP_ACF.1: 11
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 4
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_DAU: 5
- FDP_DAU.1: 3
- FDP_DAU.1.1: 1
- FDP_DAU.1.2: 1
- FDP_ETC: 10
- FDP_ETC.1: 3
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_ETC.2: 5
- FDP_ETC.2.1: 1
- FDP_ETC.2.2: 1
- FDP_ETC.2.3: 1
- FDP_ETC.2.4: 1
- FDP_IFC.1: 5
- FDP_ITC: 34
- FDP_ITC.1: 8
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 4
- FDP_RIP: 5
- FDP_RIP.1: 2
- FDP_RIP.1.1: 1
- FDP_SDI: 6
- FDP_SDI.1: 2
- FDP_SDI.2: 3
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FIA:
- FIA_AFL: 9
- FIA_AFL.1: 6
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD: 9
- FIA_ATD.1: 3
- FIA_ATD.1.1: 1
- FIA_UAU: 24
- FIA_UAU.1: 6
- FIA_UAU.1.1: 3
- FIA_UAU.1.2: 1
- FIA_UAU.3: 3
- FIA_UAU.3.1: 1
- FIA_UAU.3.2: 1
- FIA_UAU.4: 2
- FIA_UAU.4.1: 1
- FIA_UID: 11
- FIA_UID.1: 6
- FIA_UID.1.1: 2
- FIA_UID.1.2: 1
- FIA_USB: 7
- FIA_USB.1: 4
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF: 1
- FMT_MOF.1: 2
- FMT_MOF.1.1: 1
- FMT_MSA: 1
- FMT_MSA.1: 4
- FMT_MSA.1.1: 1
- FMT_MSA.2: 7
- FMT_MSA.2.1: 1
- FMT_MSA.3: 4
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 1
- FMT_MTD.1: 2
- FMT_MTD.1.1: 1
- FMT_SMF: 1
- FMT_SMF.1: 3
- FMT_SMF.1.1: 1
- FMT_SMR: 1
- FMT_SMR.1: 7
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNO: 14
- FPR_UNO.1: 4
- FPR_UNO.1.1: 1
- FPT:
- FPT_AMT.1: 5
- FPT_FLS: 13
- FPT_FLS.1: 2
- FPT_FLS.1.1: 1
- FPT_PHP: 13
- FPT_PHP.3: 2
- FPT_PHP.3.1: 1
- FPT_SEP: 13
- FPT_SEP.1: 3
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_TDC: 5
- FPT_TDC.1: 3
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST: 16
- FPT_TST.1: 4
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 5
- FTP_ITC.1: 4
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
pdf_data/st_keywords/cc_claims |
|
- A:
- O:
- O.DEV_DIS_ES: 1
- O.DLV_DATA: 1
- O.FLAW: 1
- O.INIT_ACS: 1
- O.MOD_: 1
- O.OPE-: 1
- O.PERS: 2
- O.SAMPLE_ACS: 1
- O.TAMPER_ES: 1
- T:
- T.DIS_TEST_ES: 1
- T.MOD: 1
- T.MOD_EXE: 2
- T.MOD_LOAD: 2
- T.MOD_SHARE: 2
- T.T_CMD: 2
- T.T_ES: 3
- T.T_TOOLS: 1
|
pdf_data/st_keywords/vendor |
|
- GD:
- Gemplus:
- Infineon:
- Infineon: 1
- Infineon Technologies AG: 1
- Oberthur:
- Philips:
- Sagem:
|
pdf_data/st_keywords/eval_facility |
|
- SRC:
- SRC Security Research & Consulting: 1
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 10
- physical tampering: 1
- SCA:
- DPA: 4
- SPA: 4
- Timing attacks: 1
- side channel: 6
- timing attacks: 2
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- BSI:
- CC:
- CCIMB-2004-01-001: 1
- CCIMB-2004-01-002: 1
- CCIMB-2004-01-003: 1
- CCIMB-2004-01-004: 1
- ISO:
- ISO/IEC 10373: 2
- ISO/IEC 7810: 2
- ISO/IEC 7816: 2
- ISO/IEC 7816-: 1
- ISO/IEC 7816-4: 3
- ISO/IEC 7816-8: 1
- ISO/IEC 7816-9: 1
- ISO/IEC 9796-2: 2
- ISO/IEC 9798-3: 3
- PKCS:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
- /Author: Dr. Susanne Pingel
- /Comments: OdsDok V2.00n
- /Company: ORGA-Kartensysteme GmbH
- /CreationDate: D:20060629132546+02'00'
- /Creator: Acrobat PDFMaker 7.0.7 für Word
- /ModDate: D:20060629132650+02'00'
- /OdsAcceptance: not applicable
- /OdsApproval: not applicable
- /OdsAuthor: Dr. Susanne Pingel
- /OdsCompany: Sagem ORGA GmbH
- /OdsCompanyCity: Paderborn
- /OdsConfidentiality:
- /OdsDocCatCombined: CSL (ST-Lite)
- /OdsDocCatLong: ST-Lite
- /OdsDocID: 3Tachograph.CSL.0003
- /OdsDocPool: 3.000000
- /OdsNumber: 0003
- /OdsPPTCombined: Tachograph (Tachograph-Fahrtenschreiber für LKW)
- /OdsReviewProto: not applicable
- /OdsTitel: MICARDO Tachograph Version 1.0 R1.0
- /OdsVerDate: 21.06.2006
- /OdsVerID: V1.00
- /Producer: Acrobat Distiller 7.0.5 (Windows)
- /Subject: Security Target
- /Title: MICARDO Tachograph Version 1.0 R1.0
- pdf_file_size_bytes: 482701
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 139
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
True |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
False |
True |
state/st/download_ok |
False |
True |
state/st/extract_ok |
False |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |