name |
Apple IOS VPN Client on iPhone & iPad |
Plate-forme STSAFE-J, en configuration fermée, version 1.1.4, sur le composant ST31H320 A03 |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
US |
FR |
status |
archived |
archived |
not_valid_after |
10.03.2019 |
23.03.2017 |
not_valid_before |
10.03.2016 |
23.03.2017 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10714-ci.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10714-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2017_23fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10714-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI_cible2017_23en.pdf.pdf |
manufacturer |
Apple Inc. |
STMicroelectronics S.r.l et STMicroelectronics |
manufacturer_web |
https://www.apple.com/ |
https://www.st.com/content/st_com/en.html |
security_level |
{} |
EAL5+, ALC_DVS.2, AVA_VAN.5 |
dgst |
560ee31e20e05c00 |
a0ac2d4999a67119 |
heuristics/cert_id |
CCEVS-VR-10714-2016 |
ANSSI-CC-2017/23 |
heuristics/cert_lab |
US |
SERMA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, AGD_PRE.1 |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.4, ALC_TAT.2, ASE_REQ.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
- |
1.1.4 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-1037-2018 |
heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2017/10, ANSSI-CC-2015/59 |
heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-1037-2018 |
heuristics/report_references/indirectly_referencing |
{} |
ANSSI-CC-2017/10, ANSSI-CC-2015/59 |
heuristics/scheme_data |
- category: Virtual Private Network
- certification_date: 10.03.2016
- evaluation_facility: Acumen Security
- expiration_date: 10.03.2018
- id: CCEVS-VR-VID10714
- product: Apple IOS VPN Client on iPhone & iPad
- scheme: US
- url: https://www.niap-ccevs.org/product/10714
- vendor: Apple Inc.
|
|
heuristics/st_references/directly_referenced_by |
{} |
BSI-DSZ-CC-1037-2018 |
heuristics/st_references/directly_referencing |
{} |
ANSSI-CC-2015/59 |
heuristics/st_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-1037-2018 |
heuristics/st_references/indirectly_referencing |
{} |
ANSSI-CC-2015/59 |
heuristics/protection_profiles |
db7434eb64f09c94 |
090c1a53c73889d8 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_vpn_ipsec_client_v1.4.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-profil_PP-2010-07en.pdf |
pdf_data/cert_filename |
st_vid10714-ci.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10714-2016: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20160311100653-05'00'
- /ModDate: D:20160311100653-05'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 176051
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
st_vid10714-vr.pdf |
ANSSI-CC-2017_23fr.pdf |
pdf_data/report_frontpage |
- FR:
- US:
- cert_id: CCEVS-VR-10714-2016
- cert_item: for the Apple iOS 9.2 VPN Client on iPhone and iPad devices using the A7 or A8/A8X processor
- cert_lab: US NIAP
|
- FR:
- cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 4
- cert_id: ANSSI-CC-2017/23
- cert_item: Plate-forme STSAFE-J, en configuration fermée, version 1.1.4, sur le composant ST31H320 A03
- cert_item_version: Version 1.1.4
- cert_lab: Serma Safety & Security 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
- developer: STMicroelectronics S.r.l. Z.I Marcianise Sud, 81025 Marcianise, Italie STMicroelectronics 190 Avenue Celestin COQ 13106 ROUSSET CEDEX, FRANCE Commanditaire STMicroelectronics S.r.l. Z.I Marcianise Sud, 81025 Marcianise, Italie
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: Java Card Protection profile – Closed Configuration Version 3.0, ANSSI-CC-PP-2010/07-M01
- US:
|
pdf_data/report_keywords/cc_cert_id |
|
- FR:
- ANSSI-CC-2015/59: 2
- ANSSI-CC-2015/59-M01: 2
- ANSSI-CC-2015/59-S01: 2
- ANSSI-CC-2017/10: 1
- ANSSI-CC-2017/23: 17
- ANSSI-CC-PP-2010/07-M01: 2
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- ANSSI:
- ANSSI-CC-PP-: 1
- ANSSI-CC-PP-2010/07-M01: 2
- BSI:
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 1
- EAL2: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_TDS: 1
- ADV_TDS.5: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_FLR: 2
- ALC_FLR.1: 1
- ALC_TAT: 1
- ALC_TAT.3: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_FUN.2: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.NO_TOE_BYPASS: 1
- A.PHYSICAL: 1
- A.TRUSTED_CONFIG: 1
- T:
- T.TSF_CONFIGURATION: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
- T.USER_DATA_REUSE: 1
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- Serma:
- Serma Safety & Security: 3
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20160311100401-05'00'
- /ModDate: D:20160311100401-05'00'
- pdf_file_size_bytes: 421877
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 21
|
- /Author:
- /CreationDate:
- /Creator: PDFCreator Version 1.2.1
- /Keywords:
- /ModDate:
- /Producer: GPL Ghostscript 9.02
- /Subject:
- /Title: ANSSI-CC-2017_23fr
- pdf_file_size_bytes: 760248
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 16
|
pdf_data/st_filename |
st_vid10714-st.pdf |
ANSSI_cible2017_23en.pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- FR:
- ANSSI-CC-2015/59: 1
- ANSSI-CC-2015/59-M01: 1
- ANSSI-CC-2015/59-S01: 1
- ANSSI-CC-PP-2010/07-M01: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- ANSSI:
- ANSSI-CC-PP-2010/07-M01: 1
- BSI:
- BSI-CC-PP-0055: 2
- BSI-CC-PP-0084-2014: 1
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL4+: 1
- EAL5: 12
- EAL5 augmented: 2
- EAL5+: 3
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.1: 2
- ALC_CMS.1: 2
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 7
- ADV_FSP.1: 4
- ADV_FSP.2: 2
- ADV_FSP.4: 1
- ADV_FSP.5: 9
- ADV_IMP.1: 10
- ADV_INT.2: 2
- ADV_TDS.1: 2
- ADV_TDS.3: 4
- ADV_TDS.4: 9
- AGD:
- AGD_OPE.1: 7
- AGD_PRE.1: 7
- ALC:
- ALC_CMC.4: 2
- ALC_CMS.1: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 2
- ALC_DVS.1: 3
- ALC_DVS.2: 9
- ALC_LCD.1: 4
- ALC_TAT.1: 2
- ALC_TAT.2: 4
- ASE:
- ASE_CCL: 2
- ASE_CCL.1: 2
- ASE_ECD: 2
- ASE_ECD.1: 5
- ASE_INT.1: 6
- ASE_OBJ: 2
- ASE_OBJ.2: 4
- ASE_REQ: 2
- ASE_REQ.1: 2
- ASE_REQ.2: 3
- ASE_SPD: 2
- ASE_SPD.1: 3
- ASE_TSS: 2
- ASE_TSS.1: 2
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 4
- ATE_DPT.1: 1
- ATE_DPT.3: 2
- ATE_FUN.1: 7
- ATE_IND.2: 1
- AVA:
- AVA_VAN.4: 1
- AVA_VAN.5: 9
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 6
- FCS_CKM.1.1: 2
- FCS_CKM.2: 1
- FCS_CKM_EXT.2: 3
- FCS_CKM_EXT.4: 3
- FCS_CKM_EXT.4.1: 1
- FCS_COP: 1
- FCS_COP.1: 14
- FCS_COP.1.1: 4
- FCS_RBG_EXT: 1
- FCS_RBG_EXT.1: 6
- FDP:
- FMT:
- FPT:
- FPT_TST_EXT: 1
- FPT_TST_EXT.1: 5
- FPT_TST_EXT.1.2: 1
- FPT_TUD_EXT.1: 8
- FTP:
- FTP_ITC.1: 4
- FTP_ITC.1.1: 1
|
- FAU:
- FAU_ARP: 5
- FAU_ARP.1: 3
- FAU_SAA.1: 2
- FAU_SAS.1: 1
- FCS:
- FCS_CKM: 3
- FCS_CKM.1: 4
- FCS_CKM.2: 2
- FCS_CKM.3: 2
- FCS_CKM.4: 2
- FCS_COP: 12
- FCS_COP.1: 4
- FCS_RNG: 6
- FCS_RNG.1: 6
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FDP:
- FDP_ACC: 10
- FDP_ACF: 9
- FDP_ACF.1: 3
- FDP_IFC: 3
- FDP_IFC.1: 7
- FDP_IFF: 3
- FDP_IFF.1: 5
- FDP_ITC: 1
- FDP_ITT.1: 4
- FDP_RIP: 31
- FDP_RIP.1: 3
- FDP_ROL: 10
- FDP_ROL.1: 3
- FDP_SDC: 4
- FDP_SDC.1: 8
- FDP_SDC.1.1: 1
- FDP_SDI: 3
- FDP_SDI.2: 2
- FIA:
- FIA_ATD: 2
- FIA_UID: 3
- FIA_USB: 2
- FMT:
- FMT_LIM: 14
- FMT_LIM.1: 10
- FMT_LIM.1.1: 1
- FMT_LIM.2: 10
- FMT_LIM.2.1: 1
- FMT_MSA: 20
- FMT_MSA.1: 1
- FMT_MSA.2: 2
- FMT_MSA.3: 3
- FMT_MTD: 6
- FMT_SMF: 2
- FMT_SMF.1: 6
- FMT_SMR: 2
- FMT_SMR.1: 3
- FPR:
- FPT:
- FPT_FLS: 9
- FPT_FLS.1: 6
- FPT_ITT.1: 2
- FPT_PHP.3: 2
- FPT_TDC.1: 1
- FPT_TST.1: 2
- FRU:
|
pdf_data/st_keywords/cc_claims |
- O:
- O.RESIDUAL_INFORMATION_CLEARING: 1
- O.TOE_CONFIGURATION: 1
- O.TSF_SELF_TEST: 1
- O.VERIFIABLE_UPDATES: 1
- O.VPN_TUNNEL: 1
- OE:
- OE.NO_TOE_BYPASS: 2
- OE.PHYSICAL: 2
- OE.TRUSTED_CONFIG: 2
- T:
- T.TSF_CONFIGURATION: 2
- T.UNAUTHORIZED_ACCESS: 2
- T.UNAUTHORIZED_UPDATE: 2
- T.USER_DATA_REUSE: 2
|
- A:
- A.NO-DELETION: 5
- A.NO-INSTALL: 5
- A.VERIFICATION: 4
- A.XXX: 1
- D:
- D.API_DATA: 3
- D.APP_CODE: 6
- D.APP_C_DATA: 3
- D.APP_I_DATA: 4
- D.CRYPTO: 6
- D.EMBEDDED_SW_CODE: 4
- D.EMBEDDED_SW_DATA: 4
- D.GP_CODE: 3
- D.GP_SENSITIVE_DATA: 3
- D.JCS_CODE: 4
- D.JCS_DATA: 6
- D.PIN: 9
- D.SEC_DATA: 5
- O:
- O.ALARM: 21
- O.APPLET: 1
- O.CIPHER: 45
- O.FIREWALL: 26
- O.GLOBAL_ARRAYS_CONFID: 10
- O.GLOBAL_ARRAYS_INTEG: 8
- O.GP_REGISTRY: 10
- O.JAVA: 3
- O.JAVAOB: 2
- O.JAVAOBJECT: 20
- O.KEY-MNGT: 11
- O.LIFE_CYCLE: 13
- O.NATIVE: 12
- O.OBJ-DELETION: 8
- O.OPERATE: 33
- O.PIN-MNGT: 16
- O.PIN_MNGT: 1
- O.REALLOCATION: 13
- O.RESOURCES: 9
- O.RND: 1
- O.ROLES: 6
- O.SCP: 70
- O.SID: 25
- O.SIDE_CHANNEL: 10
- O.TRANSACTION: 11
- OE:
- OE.CARD-MANAGEMENT: 12
- OE.CARD_MANAGEMENT: 17
- OE.CODE-: 1
- OE.CODE-EVIDENCE: 17
- OE.MANAGEMENT_OF_SECRETS: 3
- OE.NO-DELETION: 6
- OE.NO-INSTALL: 5
- OE.SCP: 3
- OE.VERIFICATION: 33
- OP:
- OP.ARRAY_ACCESS: 4
- OP.CARD_LOCK: 4
- OP.CARD_TERMINATE: 4
- OP.CREATE: 7
- OP.GET_CARD_LIFE_CYCLE_: 1
- OP.GET_CARD_LIFE_CYCLE_STATE: 2
- OP.INSTANCE_FIELD: 4
- OP.INVK_INTERFACE: 7
- OP.INVK_VIRTUAL: 6
- OP.JAVA: 5
- OP.MANAGE_APP_LIFE_CYC: 1
- OP.MANAGE_APP_LIFE_CYCLE_STATE: 3
- OP.PUT: 6
- OP.THROW: 5
- OP.TYPE_ACCESS: 5
- OSP:
- OSP.CARD_ADMINISTRATION_DISABLED: 5
- OSP.MANAGEMENT_OF_SECRETS: 6
- OSP.ROLES: 5
- OSP.VERIFICATION: 5
- R:
- T:
- T.CONFID-APPLI-DATA: 17
- T.CONFID-JCS-CODE: 6
- T.CONFID-JCS-DATA: 11
- T.EXE-CODE: 9
- T.INTEG-: 1
- T.INTEG-APPLI-CODE: 12
- T.INTEG-APPLI-DATA: 23
- T.INTEG-JCS-CODE: 7
- T.INTEG-JCS-DATA: 11
- T.LEAKAGE: 1
- T.LIFE_CYCLE: 7
- T.NATIVE: 4
- T.OBJ-DELETION: 4
- T.PHYSICAL: 9
- T.RESOURCES: 7
- T.SID: 16
|
pdf_data/st_keywords/vendor |
|
- STMicroelectronics:
- STM: 13
- STMicroelectronics: 6
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
- MAC:
- HMAC: 7
- HMAC-SHA-256: 2
- HMAC-SHA-384: 2
- HMAC-SHA-512: 1
|
- AES_competition:
- DES:
- 3DES:
- 3-DES: 2
- Triple-DES: 1
- TripleDES: 1
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 5
- SHA-384: 4
- SHA-512: 5
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-256: 2
- SHA-512: 2
- SHA224: 2
- SHA256: 2
- SHA384: 3
- SHA512: 2
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IKE:
- IKE: 10
- IKEv1: 1
- IKEv2: 16
- IPsec:
- VPN:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 10
- P-384: 10
- P-521: 6
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 1
- malfunction: 2
- physical tampering: 1
- SCA:
- DPA: 3
- Leak-Inherent: 1
- SPA: 1
- physical probing: 4
- side channel: 1
- timing attacks: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 180-4: 1
- FIPS 186-4: 2
- FIPS PUB 180-4: 1
- FIPS PUB 186-4: 6
- FIPS PUB 197: 1
- FIPS PUB 198-1: 1
- NIST:
- NIST SP 800-38A: 2
- NIST SP 800-38D: 2
- NIST SP 800-56A: 3
- NIST SP 800-56B: 1
- NIST SP 800-57: 1
- SP 800-90: 1
- PKCS:
- RFC:
- RFC 2560: 1
- RFC 3602: 1
- RFC 4106: 1
- RFC 4301: 2
- RFC 4303: 1
- RFC 4945: 1
- RFC 5280: 3
- RFC 5282: 1
- RFC 5759: 1
- RFC 6379: 1
- X509:
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- FIPS:
- PKCS:
- SCP:
|
pdf_data/st_keywords/javacard_version |
|
- GlobalPlatform:
- JavaCard:
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
- java:
- javacard:
- javacard.framework: 4
- javacard.framework.applet: 1
- javacard.security: 23
- javacard.security.interface: 4
- javacardx:
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
- application being loaded pre-issuance is out of scope of current evaluation. 4.1.2.2 Java Card Platform The Java technology, embedded on the TOE: 1
- interface for the secure management of applications on the smart card. The Card Manager is out of scope of current evaluation and its administrative interface is permanently disabled before TOE delivery: 1
- of the TOE to the parties responsible of the following usage phases. Application development is out of scope of current evaluation. TOE Construction phase includes: • Product Development • Product: 1
- out of scope: 4
|
pdf_data/st_metadata |
- /Author: ppatin
- /CreationDate: D:20160923140035-04'00'
- /Creator: Microsoft® Word 2013
- /ModDate: D:20160923140035-04'00'
- /Producer: Microsoft® Word 2013
- pdf_file_size_bytes: 1085628
- pdf_hyperlinks: https://www.niap-ccevs.org/st/st_vid10695-st.pdf
- pdf_is_encrypted: False
- pdf_number_of_pages: 30
|
- /Author: daniela terracciano
- /CreationDate: D:20170127111137+01'00'
- /Creator: PDFCreator 2.0.0.0
- /Keywords:
- /ModDate: D:20170127111137+01'00'
- /Producer: PDFCreator 2.0.0.0
- /Subject:
- /Title: STSafe-J_SecurityTarget_Lite_A
- pdf_file_size_bytes: 692327
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 95
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |