name |
Symfoware Server Enterprise extended Edtion 4.0 |
KeyOne CA 4.0, KeyOne XRA 4.0, KeyOne VA 4.0 version 4.0.13S2R1 (Release Patches 4.0.13S2R1_B01, 4.0.13S2R1_B02) |
category |
Databases |
Key Management Systems |
scheme |
JP |
ES |
status |
archived |
archived |
not_valid_after |
10.12.2010 |
08.12.2019 |
not_valid_before |
26.11.2003 |
08.12.2014 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0003.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2013-31-INF-1370.pdf |
st_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/KeyOne%204.0%20Security%20Target.pdf |
manufacturer |
Fujitsu Limited |
Safelayer Secure Communications, S.A. |
manufacturer_web |
https://www.fujitsu.com/ |
https://www.safelayer.com/ |
security_level |
EAL4 |
EAL4+, ALC_FLR.2 |
dgst |
505e2adba5d4a6cf |
c7a9379229710eb8 |
heuristics/cert_id |
JISEC-CC-CRP-C0003 |
2013-31-INF-1370 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
{} |
ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ALC_FLR.2, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
4.0 |
4.0, 4.0.13 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0133
- certification_date: 01.11.2007
- claim: EAL1
- enhanced:
- assurance_level: EAL1
- cc_version: 2.3
- description: PRODUCT DESCRIPTION The TOE enables users to manage operations to execute jobs based on predefined daily schedule on distributed servers on enterprise internal networks. The TOE also enables users to manage those operations in a secure manner although systems are becoming diverse and getting complex. The TOE defines “Job execution based on predefined daily schedule” process and its related resources as protected resources. The TOE provides following security functions to prohibit unauthorized access to the protected resources. - "Extended user authentication function" to identify and authenticate users. - "Access control function" to restrict user operations to authorized users - "Audit log output function" to verify user operations - "Password protection function" to protect passwords from being sniffed sent over enterprise internal networks
- evaluation_facility: Japan Electronics and Information Technology Industries Association, Information Technology Security Center (JEITA ITSC)
- product: Systemwalker Operation Manager Enterprise Edition
- product_type: IT Product (Operation and maintenance supporting software)
- toe_version: V13.2.0 (Linux for Itanium)
- vendor: Fujitsu Limited
- expiration_date: 01.10.2013
- supplier: Fujitsu Limited
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0133_it7150.html
- toe_japan_name: Systemwalker Operation Manager Enterprise Edition V13.2.0 (Linux for Itanium)
- toe_overseas_link: None
- toe_overseas_name: -----
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
c582c92b511133b5 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_CIMC_SL3_V1.0.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0003.pdf |
2013-31-INF-1370.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 4: 2
- EAL 4+: 1
- EAL3: 3
- EAL3 augmented: 1
- EAL4: 3
- EAL4+: 6
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 1
- ALC_FLR.2: 11
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
- FAU:
- FAU_GEN.1: 2
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 1
- FAU_GEN.2: 1
- FAU_GEN.2.1: 2
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.3.1: 1
- FAU_SEL.1: 1
- FAU_SEL.1.1: 2
- FAU_STG.1: 2
- FAU_STG.1.1: 2
- FAU_STG.1.2: 1
- FAU_STG.4: 1
- FAU_STG.4.1: 2
- FCO:
- FCO_NRO_CIMC.3: 1
- FCO_NRO_CIMC.3.1: 1
- FCO_NRO_CIMC.3.3: 1
- FCO_NRO_CIMC.4.1: 1
- FCS:
- FCS_CKM.1.1: 1
- FCS_CKM.4.1: 1
- FCS_CKM_CIMC.5: 1
- FCS_CKM_CIMC.5.1: 1
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 1
- FDP_ACC.1.1: 2
- FDP_ACF.1: 4
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_ACF_CIMC.2.1: 1
- FDP_ACF_CIMC.3: 1
- FDP_ACF_CIMC.3.1: 1
- FDP_CIMC_BKP.1.1: 1
- FDP_CIMC_BKP.1.3: 1
- FDP_CIMC_BKP.2: 1
- FDP_CIMC_BKP.2.1: 1
- FDP_CIMC_CER.1.1: 1
- FDP_CIMC_CER.1.3: 1
- FDP_CIMC_CRL.1.1: 1
- FDP_CIMC_CSE.1: 1
- FDP_CIMC_CSE.1.1: 1
- FDP_CIMC_OCSP.1: 1
- FDP_CIMC_OCSP.1.1: 1
- FDP_ETC_CIMC.5: 1
- FDP_ETC_CIMC.5.1: 1
- FDP_ITT.1: 4
- FDP_ITT.1.1: 4
- FDP_SDI_CIMC.3.1: 1
- FDP_UCT.1: 1
- FDP_UCT.1.1: 2
- FIA:
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1.1: 2
- FIA_UAU.1: 2
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UID.1: 2
- FIA_UID.1.1: 2
- FIA_UID.1.2: 1
- FIA_USB.1: 1
- FIA_USB.1.1: 2
- FMT:
- FMT_MOF.1: 1
- FMT_MOF.1.1: 2
- FMT_MOF_CIMC.3.1: 1
- FMT_MOF_CIMC.3.3: 1
- FMT_MOF_CIMC.5: 1
- FMT_MOF_CIMC.5.1: 1
- FMT_MOF_CIMC.5.3: 1
- FMT_MOF_CIMC.6.1: 1
- FMT_MOF_CIMC.6.3: 1
- FMT_MSA.1: 2
- FMT_MSA.1.1: 3
- FMT_MSA.2.1: 1
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 1
- FMT_MTD.1: 2
- FMT_MTD.1.1: 3
- FMT_MTD_CIMC.4: 1
- FMT_MTD_CIMC.4.1: 1
- FMT_MTD_CIMC.5.1: 1
- FMT_MTD_CIMC.7.1: 1
- FMT_SMF: 1
- FMT_SMF.1.1: 3
- FMT_SMR.1.1: 1
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_AMT.1.1: 1
- FPT_CIMC_TSP.1: 1
- FPT_CIMC_TSP.1.1: 1
- FPT_CIMC_TSP.1.3: 1
- FPT_ITC.1: 1
- FPT_ITC.1.1: 2
- FPT_ITT.1: 2
- FPT_ITT.1.1: 6
- FPT_RVM.1: 1
- FPT_RVM.1.1: 1
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_STM.1: 1
- FPT_STM.1.1: 2
- FPT_TST_CIMC.2.1: 1
- FPT_TST_CIMC.2.2: 1
- FPT_TST_CIMC.3.1: 1
- FPT_TST_CIMC.3.2: 1
- FTP:
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Microsoft:
- STMicroelectronics:
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20040526154221+09'00'
- /ModDate: D:20040526154221+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 12495
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/st_filename |
|
KeyOne 4.0 Security Target.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 12
- ADV_FSP.4: 12
- ADV_IMP.1: 9
- ADV_TDS.3: 16
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 21
- AGD_PRE: 1
- AGD_PRE.1: 8
- ALC:
- ALC_CMC.4: 17
- ALC_CMS.4: 8
- ALC_DEL.1: 6
- ALC_DVS.1: 5
- ALC_FLR.2: 17
- ALC_LCD.1: 7
- ALC_TAT.1: 8
- ASE:
- ASE_CCL.1: 14
- ASE_ECD.1: 9
- ASE_INT.1: 10
- ASE_OBJ.2: 10
- ASE_REQ.2: 13
- ASE_SPD.1: 7
- ASE_TSS.1: 4
- ATE:
- ATE_COV.2: 6
- ATE_DPT.1: 6
- ATE_FUN.1: 9
- ATE_IND.2: 6
- AVA:
|
pdf_data/st_keywords/cc_sfr |
|
- FAU:
- FAU_GEN: 2
- FAU_GEN.1: 13
- FAU_GEN.1.1: 7
- FAU_GEN.1.2: 4
- FAU_GEN.2: 7
- FAU_GEN.2.1: 5
- FAU_SAR: 1
- FAU_SAR.1: 2
- FAU_SAR.1.1: 2
- FAU_SAR.1.2: 2
- FAU_SAR.3: 2
- FAU_SAR.3.1: 2
- FAU_SEL: 2
- FAU_SEL.1: 8
- FAU_SEL.1.1: 4
- FAU_STG: 2
- FAU_STG.1: 8
- FAU_STG.1.1: 5
- FAU_STG.1.2: 4
- FAU_STG.4: 8
- FAU_STG.4.1: 5
- FCO:
- FCO_NRO.2: 1
- FCO_NRO_CIMC: 2
- FCO_NRO_CIMC.3: 10
- FCO_NRO_CIMC.3.1: 3
- FCO_NRO_CIMC.3.2: 2
- FCO_NRO_CIMC.3.3: 3
- FCO_NRO_CIMC.4: 7
- FCO_NRO_CIMC.4.1: 3
- FCO_NRO_CIMC.4.2: 4
- FCS:
- FCS_CKM: 1
- FCS_CKM.1: 1
- FCS_CKM.1.1: 2
- FCS_CKM.4: 2
- FCS_CKM.4.1: 2
- FCS_CKM_CIMC: 3
- FCS_CKM_CIMC.5: 8
- FCS_CKM_CIMC.5.1: 3
- FCS_COP: 1
- FCS_COP.1: 1
- FCS_COP.1.1: 2
- FDP:
- FDP_ACC: 6
- FDP_ACC.1: 15
- FDP_ACC.1.1: 5
- FDP_ACF: 3
- FDP_ACF.1: 14
- FDP_ACF.1.1: 4
- FDP_ACF.1.2: 6
- FDP_ACF.1.3: 4
- FDP_ACF.1.4: 5
- FDP_ACF_CIMC: 2
- FDP_ACF_CIMC.2: 9
- FDP_ACF_CIMC.2.1: 3
- FDP_ACF_CIMC.2.2: 3
- FDP_ACF_CIMC.3: 8
- FDP_ACF_CIMC.3.1: 4
- FDP_CIMC_BKP: 2
- FDP_CIMC_BKP.1: 11
- FDP_CIMC_BKP.1.1: 4
- FDP_CIMC_BKP.1.2: 2
- FDP_CIMC_BKP.1.3: 3
- FDP_CIMC_BKP.1.4: 3
- FDP_CIMC_BKP.2: 9
- FDP_CIMC_BKP.2.1: 5
- FDP_CIMC_BKP.2.2: 3
- FDP_CIMC_CER: 2
- FDP_CIMC_CER.1: 9
- FDP_CIMC_CER.1.1: 3
- FDP_CIMC_CER.1.2: 4
- FDP_CIMC_CER.1.3: 5
- FDP_CIMC_CER.1.4: 4
- FDP_CIMC_CRL: 2
- FDP_CIMC_CRL.1: 7
- FDP_CIMC_CRL.1.1: 4
- FDP_CIMC_CSE: 2
- FDP_CIMC_CSE.1: 7
- FDP_CIMC_CSE.1.1: 4
- FDP_CIMC_OCSP: 2
- FDP_CIMC_OCSP.1: 7
- FDP_CIMC_OCSP.1.1: 2
- FDP_ETC: 1
- FDP_ETC_CIMC: 2
- FDP_ETC_CIMC.5: 7
- FDP_ETC_CIMC.5.1: 2
- FDP_IFC.1: 3
- FDP_ITC: 1
- FDP_ITT: 2
- FDP_ITT.1: 14
- FDP_ITT.1.1: 11
- FDP_SDI: 1
- FDP_SDI_CIMC: 2
- FDP_SDI_CIMC.3: 7
- FDP_SDI_CIMC.3.1: 8
- FDP_SDI_CIMC.3.2: 4
- FDP_UCT: 3
- FDP_UCT.1: 8
- FDP_UCT.1.1: 5
- FDP_UIT: 1
- FIA:
- FIA_AFL: 1
- FIA_AFL.1: 1
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_ATD: 2
- FIA_ATD.1: 6
- FIA_ATD.1.1: 5
- FIA_UAU: 2
- FIA_UAU.1: 10
- FIA_UAU.1.1: 5
- FIA_UAU.1.2: 4
- FIA_UID: 2
- FIA_UID.1: 16
- FIA_UID.1.1: 5
- FIA_UID.1.2: 4
- FIA_USB: 2
- FIA_USB.1: 7
- FIA_USB.1.1: 7
- FIA_USB.1.2: 2
- FIA_USB.1.3: 2
- FMT:
- FMT_MOF: 2
- FMT_MOF.1: 18
- FMT_MOF.1.1: 6
- FMT_MOF_CIMC: 2
- FMT_MOF_CIMC.3: 11
- FMT_MOF_CIMC.3.1: 4
- FMT_MOF_CIMC.3.2: 4
- FMT_MOF_CIMC.3.3: 3
- FMT_MOF_CIMC.3.4: 4
- FMT_MOF_CIMC.5: 11
- FMT_MOF_CIMC.5.1: 4
- FMT_MOF_CIMC.5.2: 4
- FMT_MOF_CIMC.5.3: 3
- FMT_MOF_CIMC.6: 6
- FMT_MOF_CIMC.6.1: 3
- FMT_MOF_CIMC.6.2: 2
- FMT_MOF_CIMC.6.3: 3
- FMT_MSA: 2
- FMT_MSA.1: 14
- FMT_MSA.1.1: 8
- FMT_MSA.2: 2
- FMT_MSA.2.1: 2
- FMT_MSA.3: 10
- FMT_MSA.3.1: 5
- FMT_MSA.3.2: 4
- FMT_MTD: 2
- FMT_MTD.1: 10
- FMT_MTD.1.1: 7
- FMT_MTD_CIMC: 2
- FMT_MTD_CIMC.4: 8
- FMT_MTD_CIMC.4.1: 3
- FMT_MTD_CIMC.5: 8
- FMT_MTD_CIMC.5.1: 3
- FMT_MTD_CIMC.7: 7
- FMT_MTD_CIMC.7.1: 3
- FMT_SMF: 3
- FMT_SMF.1: 12
- FMT_SMF.1.1: 6
- FMT_SMR: 2
- FMT_SMR.1: 16
- FMT_SMR.1.1: 3
- FMT_SMR.1.2: 1
- FMT_SMR.2: 1
- FMT_SMR.2.1: 2
- FMT_SMR.2.2: 2
- FMT_SMR.2.3: 2
- FPT:
- FPT_ACC: 2
- FPT_ACC.1: 2
- FPT_ACC.1.1: 1
- FPT_ACC.1.2: 1
- FPT_AMT: 1
- FPT_AMT.1: 1
- FPT_AMT.1.1: 2
- FPT_CIMC_TSP: 2
- FPT_CIMC_TSP.1: 8
- FPT_CIMC_TSP.1.1: 3
- FPT_CIMC_TSP.1.2: 2
- FPT_CIMC_TSP.1.3: 5
- FPT_CIMC_TSP.1.4: 2
- FPT_ITC: 2
- FPT_ITC.1: 6
- FPT_ITC.1.1: 5
- FPT_ITT: 2
- FPT_ITT.1: 9
- FPT_ITT.1.1: 13
- FPT_RVM: 1
- FPT_RVM.1: 4
- FPT_RVM.1.1: 3
- FPT_SEP: 1
- FPT_SEP.1: 1
- FPT_SEP.1.1: 2
- FPT_SEP.1.2: 2
- FPT_STM: 2
- FPT_STM.1: 10
- FPT_STM.1.1: 6
- FPT_TST_CIMC.2: 5
- FPT_TST_CIMC.2.1: 2
- FPT_TST_CIMC.2.2: 2
- FPT_TST_CIMC.3: 2
- FPT_TST_CIMC.3.1: 2
- FPT_TST_CIMC.3.2: 2
- FTP:
- FTP_ITC.1: 3
- FTP_TRP: 1
- FTP_TRP.1: 4
- FTP_TRP.1.1: 2
- FTP_TRP.1.2: 2
- FTP_TRP.1.3: 2
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- FIPS:
- FIPS 140-1: 22
- FIPS 140-2: 12
- FIPS 46-3: 2
- FIPS PUB 180-2: 1
- FIPS PUB 186-2: 2
- FIPS PUB 197: 2
- ICAO:
- ISO:
- PKCS:
- PKCS #1: 1
- PKCS #11: 3
- PKCS #12: 1
- PKCS #7: 4
- PKCS#1: 2
- RFC:
- RFC 2560: 8
- RFC 3039: 2
- RFC 3280: 2
- RFC 3739: 1
- RFC 4210: 1
- RFC 4211: 2
- RFC 4511: 1
- RFC 5280: 1
- RFC 5652: 1
- RFC2560: 2
- RFC3039: 2
- RFC3280: 2
- RFC3739: 2
- RFC4210: 2
- RFC4211: 1
- RFC4511: 2
- RFC5280: 2
- RFC5652: 2
- RFC6960: 1
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
- /Approvers: montse
- /Author: montse
- /Category: CC, Common Criteria, EAL4, Security Target, Certification, KeyOne 4.0
- /Company: Safelayer Secure Communications, S.A.
- /CreationDate: D:20140903145446+02'00'
- /Creator: Acrobat PDFMaker 9.1 for Word
- /Department: Security Target
- /DocumentID: 95A278AC
- /Editors: montse,QUALITY
- /FrontCoverHeading: KeyOne 4.0
- /FrontCoverHeading2:
- /Keywords: CC, Common Criteria, EAL4, Security Target, Certification, KeyOne 4.0
- /Language: EN
- /ModDate: D:20140903145548+02'00'
- /Producer: Adobe PDF Library 9.0
- /ProductFamily: N/A
- /Readers: montse,QUALITY,ALL
- /Reviewers: montse
- /SourceModified: D:20140903124927
- /State: Issued
- /Subject: The Security Target documents the security functional and assurance requirements for the CC EAL4+ Certification of KeyOne 4.0 product
- /Title: KeyOne 4.0 Security Target
- /TranslatedFrom: Original
- /Version: 2.1
- pdf_file_size_bytes: 1144561
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 183
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
True |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
False |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
False |
True |
state/st/download_ok |
False |
True |
state/st/extract_ok |
False |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |