name |
Actional Security Gateway Version 3.1.2.5 |
- Kanguru Defender Elite 200 with Kanguru Defender Manager Elite 200, Firmware Version 02.03.10, KDME200 v2.0.0.0-2/3/6,- Kanguru Defender 2000 with Kanguru Defender Manager 2000, Firmware Version 02.03.10, KDM2000 v1.2.1.8-2/3/6,- Universal Kanguru Local Administrator, Version 3.2.0.3 and- Kanguru Remote Management Console, Version 5.0.2.6 |
category |
Other Devices and Systems |
Data Protection |
scheme |
US |
DE |
status |
archived |
archived |
not_valid_after |
06.09.2012 |
08.11.2019 |
not_valid_before |
11.01.2005 |
07.11.2014 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid4039-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid4039-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772b_pdf.pdf |
manufacturer |
Actional Corporation |
Kanguru Solutions |
manufacturer_web |
https://www.actional.com/ |
https://www.kanguru.com |
security_level |
EAL2+, ALC_FLR.2, ADV_SPM.1, AVA_MSU.1 |
ALC_FLR.1, EAL2+ |
dgst |
50f373be08b76375 |
eda06ca3c208ebd0 |
heuristics/cert_id |
CCEVS-VR-0089-2005 |
BSI-DSZ-CC-0772-2014 |
heuristics/cert_lab |
US |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
AGD_USR.1, ADV_FSP.1, ADV_RCR.1, ALC_FLR.2, ATE_FUN.1, ADV_HLD.1, AVA_VLA.1, ATE_COV.1, ADV_SPM.1, AVA_SOF.1, AGD_ADM.1, ATE_IND.2, AVA_MSU.1 |
ALC_CMC.2, APE_REQ.2, ASE_INT.1, APE_INT.1, ATE_FUN.1, ATE_DPT.4, ADV_SPM.1, ATE_COV.1, ADV_TDS.1, ALC_FLR.1, ASE_TSS.1, ADV_IMP.2, APE_SPD.1, APE_ECD.1, ADV_FSP.2, AGD_PRE.1, ASE_CCL.1, ALC_DVS.2, ATE_IND.2, ADV_INT.3, ASE_SPD.1, ASE_OBJ.2, ASE_REQ.2, ADV_ARC.1, ALC_CMS.2, ALC_LCD.2, ALC_DEL.1, APE_OBJ.2, AGD_OPE.1, APE_CCL.1, ASE_ECD.1, ALC_TAT.3, AVA_VAN.2 |
heuristics/extracted_versions |
3.1.2.5 |
5.0.2.6, 1.2.1.8, 02.03.10, 2.0.0.0, 3.2.0.3 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- category: Network Management, Secure Messaging
- certification_date: 11.01.2005
- evaluation_facility: Leidos Common Criteria Testing Laboratory
- expiration_date:
- id: CCEVS-VR-VID4039
- product: Actional Security Gateway Version 3.1.2.5
- scheme: US
- url: https://www.niap-ccevs.org/product/4039
- vendor: Actional Corporation
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
st_vid4039-vr.pdf |
0772a_pdf.pdf |
pdf_data/report_frontpage |
- DE:
- US:
- cert_id: CCEVS-VR-05-0089
- cert_item: Actional Corporation XML Web Services Management and XML Firewall Security Solution Actional Security Gateway
- cert_lab: US NIAP
|
- DE:
- cert_id: BSI-DSZ-CC-0772-2014
- cert_item: Kanguru Defender Elite 200 Kanguru Defender 2000 Universal Kanguru Local Administrator, v3.2.0.3 Kanguru Remote Management Console, v5.0.2.6
- cert_lab: BSI
- developer: Kanguru Solutions
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- US:
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 2: 9
- EAL 4: 1
- EAL2: 4
- EAL2 augmented: 1
- EAL3: 2
|
- EAL:
- EAL 1: 7
- EAL 2: 8
- EAL 2 augmented: 3
- EAL 3: 4
- EAL 4: 7
- EAL 5: 6
- EAL 6: 3
- EAL 7: 4
- EAL2: 2
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ACM:
- ADO:
- ADO_IGS.1: 2
- ADO_VLA.1: 1
- ADV:
- ALC:
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 1
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 1
- ALC_DEL: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 1
- ALC_FLR: 3
- ALC_FLR.1: 5
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 1
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ALC_TAT.2: 1
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 2
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 1
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 1
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 2
- FAU_STG.1: 2
- FDP:
- FDP_ACF.1: 2
- FDP_IFF.1: 2
- FIA:
- FIA_AFL.1: 2
- FIA_USB.1: 2
- FMT:
- FMT_MOF.1: 2
- FMT_MSA.1: 1
- FMT_MSA.3: 4
- FMT_SMF.1: 2
|
- FCS:
- FCS_CKM.1: 1
- FCS_COP.1: 1
- FCS_RNG.1: 1
- FDP:
- FDP_ACC.1: 2
- FDP_ACF.1: 2
- FIA:
- FIA_SOS.1: 1
- FIA_UAU.2: 4
- FIA_UAU.6: 1
- FIA_UID.2: 4
- FMT:
- FMT_MTD: 2
- FMT_SMF: 2
- FMT_SMF.1: 1
|
pdf_data/report_keywords/cc_claims |
- A:
- A.DBPROT: 1
- A.GENPUR: 1
- A.LOCATE: 1
- A.MANAGE: 1
- A.NOEVIL: 1
- A.NOTRST: 1
- A.PROTCT: 1
- A.PUBLIC: 1
- A.SECSTR: 1
- A.TIME: 1
- T:
- T.ATKPOT: 1
- T.AUDFUL: 1
- T.BRUTEF: 1
- T.COMINT: 1
- T.FACCNT: 1
- T.GOTHRU: 1
- T.IMPCON: 1
- T.LOSSOF: 1
- T.MASQUE: 1
- T.NOAUTH: 1
- T.NOHALT: 1
- T.NOVALD: 1
- T.REMATK: 1
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7138: 2
- BSI 7148: 1
- BSI TR-02102: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- ISO:
- PKCS:
- PKCS #11: 1
- PKCS #12: 1
- PKCS #7: 1
- X509:
|
- BSI:
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 17065: 2
- ISO/IEC 18045: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- KRMC Administrator's User Manual, Version 5.0.2, 2013-11-01 [14] Configuration lists for the TOE (confidential documents): a) Configuration list for TOE executables, 2014-09-17 b) Configuration list from Phison: 1
- Report, Version 8, 2014-10-07, Final Evaluation Technical Report, atsec information security GmbH, (confidential document) [9] Evaluated Product User Guide, Version 1.20, 2014-10-02 [10] Kanguru Defender Elite 200 User: 1
|
pdf_data/report_metadata |
- /Author: Robin Medlock and Julie Evans
- /CreationDate: D:20050204113025-05'00'
- /Creator: Acrobat PDFMaker 5.0 for Word
- /ModDate: D:20050204113837-05'00'
- /Producer: Acrobat Distiller 5.0.5 (Windows)
- /Title: Validation Report for Actional Security Gateway
- pdf_file_size_bytes: 530463
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 32
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20141121083051+01'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, encrypted USB storage device, Kanguru Defender"
- /ModDate: D:20141121113713+01'00'
- /Producer: LibreOffice 4.2
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0772-2014
- pdf_file_size_bytes: 1643286
- pdf_hyperlinks: https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung
- pdf_is_encrypted: False
- pdf_number_of_pages: 42
|
pdf_data/st_filename |
st_vid4039-st.pdf |
0772b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP- 0025: 13
- BSI-PP-0025: 6
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 2: 5
- EAL 2 augmented: 3
- EAL2: 2
- EAL2 augmented: 2
|
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ADO:
- ADO_DEL.1: 8
- ADO_IGS: 2
- ADO_IGS.1: 8
- ADO_VLA: 1
- ADV:
- ADV_FSP.1: 11
- ADV_HLD.1: 14
- ADV_RCR.1: 6
- ADV_SPM.1: 6
- AGD:
- AGD_ADM: 1
- AGD_ADM.1: 14
- AGD_USR: 1
- AGD_USR.1: 12
- ALC:
- ATE:
- ATE_COV.1: 7
- ATE_FUN.1: 12
- ATE_IND.1: 1
- ATE_IND.2: 9
- AVA:
- AVA_MSU.1: 15
- AVA_SOF.1: 9
- AVA_VLA.1: 11
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_SPM.1: 2
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.1: 5
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 9
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR.1: 8
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.3: 9
- FAU_SAR.3.1: 1
- FAU_STG: 1
- FAU_STG.1: 8
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FCS:
- FCS_CKM.1: 15
- FCS_CKM.1.1: 4
- FCS_CKM.4: 9
- FCS_CKM.4.1: 1
- FCS_COP.1: 17
- FCS_COP.1.1: 8
- FDP:
- FDP_ACC.1: 11
- FDP_ACC.1.1: 1
- FDP_ACF: 1
- FDP_ACF.1: 8
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 11
- FDP_IFC.1.1: 1
- FDP_IFF: 1
- FDP_IFF.1: 9
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_IFF.1.6: 1
- FDP_ITC.1: 2
- FIA:
- FIA_AFL: 1
- FIA_AFL.1: 9
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_ATD.1: 8
- FIA_ATD.1.1: 1
- FIA_UAU.1: 2
- FIA_UAU.2: 12
- FIA_UAU.2.1: 1
- FIA_UID.1: 3
- FIA_UID.2: 11
- FIA_UID.2.1: 1
- FIA_USB: 1
- FIA_USB.1: 16
- FMT:
- FMT_MOF: 2
- FMT_MOF.1: 13
- FMT_MOF.1.1: 1
- FMT_MSA: 4
- FMT_MSA.1: 14
- FMT_MSA.1.1: 2
- FMT_MSA.2: 12
- FMT_MSA.2.1: 1
- FMT_MSA.3: 14
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MTD: 1
- FMT_MTD.1: 10
- FMT_MTD.1.1: 1
- FMT_SMF: 1
- FMT_SMF.1: 9
- FMT_SMF.1.1: 1
- FMT_SMR.1: 15
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_RVM.1: 9
- FPT_RVM.1.1: 1
- FPT_STM.1: 10
- FPT_STM.1.1: 1
|
- FAU:
- FCS:
- FCS_CKM.1: 9
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 9
- FCS_CKM.4.1: 1
- FCS_COP.1: 9
- FCS_COP.1.1: 1
- FCS_RNG: 2
- FCS_RNG.1: 15
- FCS_RNG.1.1: 3
- FCS_RNG.1.2: 3
- FDP:
- FDP_ACC.1: 14
- FDP_ACC.1.1: 1
- FDP_ACF.1: 13
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 1
- FDP_ITC.1: 2
- FDP_ITC.2: 2
- FIA:
- FIA_SOS.1: 8
- FIA_SOS.1.1: 1
- FIA_UAU.1: 7
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.2: 9
- FIA_UAU.2.1: 1
- FIA_UAU.6: 8
- FIA_UAU.6.1: 1
- FIA_UID.1: 2
- FIA_UID.2: 10
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA.1: 8
- FMT_MSA.1.1: 1
- FMT_MSA.3: 1
- FMT_MTD: 12
- FMT_MTD.1: 3
- FMT_MTD.1.1: 2
- FMT_SMF: 20
- FMT_SMF.1: 6
- FMT_SMF.1.1: 2
- FMT_SMR.1: 12
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 9
- FPT_FLS.1.1: 1
- FPT_PHP.1: 8
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_RCV.4: 8
- FPT_RCV.4.1: 2
|
pdf_data/st_keywords/cc_claims |
- A:
- A.DBPROT: 4
- A.GENPUR: 4
- A.LOCATE: 3
- A.MANAGE: 4
- A.NOEVIL: 3
- A.NOTRST: 4
- A.PROTCT: 4
- A.PUBLIC: 3
- A.SECSTR: 3
- A.TIME: 4
- O:
- O.ACCESS: 6
- O.AUDITS: 5
- O.COMM: 8
- O.CREDEN: 4
- O.CRYKEY: 5
- O.CRYPTSD: 7
- O.CRYPTSTD: 1
- O.DBPROT: 5
- O.EADMIN: 6
- O.IDAUTH: 14
- O.INSTAL: 6
- O.MSGVAL: 4
- O.NOCONF: 7
- O.PERSON: 7
- O.PHYCAL: 6
- O.REMATK: 3
- O.SANITZ: 6
- O.SECFUN: 6
- O.SECSTR: 2
- O.SELPRO: 8
- O.SUPPOR: 8
- O.TIME: 2
- T:
- T.ATKPOT: 3
- T.AUDFUL: 4
- T.BRUTEF: 4
- T.COMINT: 4
- T.FACCNT: 3
- T.GOTHRU: 4
- T.IMPCON: 3
- T.LOSSOF: 3
- T.MASQUE: 3
- T.NOAUTH: 4
- T.NOHALT: 4
- T.NOVALD: 3
- T.REMATK: 4
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- PKCS:
- PKCS #11: 1
- PKCS #12: 1
- PKCS #7: 2
- PKCS#7: 1
- X509:
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- 3: ASG v3.1 Functions Note that the physical hardware and operating system of the appliance are out of scope of this evaluation. Actional Security Gateways can also sit behind a commercial load balancer for: 1
- out of scope: 1
|
- OutOfScope:
- 11 1.5.4.3 Out of scope : 1
- 11 1.5.4.3 Out of scope ........................................................................................... 12 1.5: 1
- Out of scope: 2
- from the KRMC to the device. Commands are queued at the KRMC until polled form the device. 1.5.4.3 Out of scope The TOE supports additional features that are not part of the scope: ● Antivirus solution ●: 1
|
pdf_data/st_metadata |
- /Author: Adam O'Brien
- /CreationDate: D:20050131130832-05'00'
- /Creator: Acrobat PDFMaker 5.0 for Word
- /ModDate: D:20050131133854-05'00'
- /Producer: Acrobat Distiller 5.0.5 (Windows)
- /Title: Westbridge Technology, Inc
- pdf_file_size_bytes: 2274880
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 75
|
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |