| name |
Log Radar v3.2.15 with modules Console, Collector and Archiver |
IMELO-Secure, Version 1.1 |
| category |
Detection Devices and Systems |
Other Devices and Systems |
| scheme |
MY |
DE |
| status |
archived |
active |
| not_valid_after |
01.09.2019 |
14.04.2027 |
| not_valid_before |
13.02.2013 |
14.12.2022 |
| cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1013V2c_pdf.pdf |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C010-CR-v1a.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1013V2a_pdf.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/LogRadar_ST-Document_v1-0R.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1013V2b_pdf.pdf |
| manufacturer |
TecForte Sdn Bhd |
SSI Schäfer Plastics GmbH |
| manufacturer_web |
https://www.tecforte.com |
https://ssi-plastic.com |
| security_level |
EAL2 |
ASE_OBJ.2, EAL1+, ASE_REQ.2, ASE_SPD.1 |
| dgst |
5e01e4eeaa77cb17 |
3da0a90c7bb5a9cd |
| heuristics/cert_id |
ISCB-5-RPT-C010-CR-v1a |
BSI-DSZ-CC-1013-V2-2022 |
| heuristics/cert_lab |
[] |
BSI |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 |
ASE_CCL.1, ALC_CMC.1, AVA_VAN.1, ASE_OBJ.2, ASE_SPD.1, AGD_OPE.1, ATE_IND.1, ASE_INT.1, ALC_DEL.1, ASE_TSS.1, ASE_REQ.2, ADV_FSP.1 |
| heuristics/extracted_versions |
3.2.15 |
1.1 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-1013-2017 |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1013-2017 |
| heuristics/scheme_data |
- cert_no: 2013-002-C010
- certification_date: 13.02.2013
- developer: TecForte Sdn Bhd
- enhanced:
- assurance_level: EAL2
- category: Detection Devices and Systems
- cert_id: C010
- certification_date: 13.02.2013
- developer: Leong Wei Khuan Level 27, Quill 7,Jalan Stesen Sentral 5,Kuala Lumpur Sentral,50470 Kuala Lumpur,MALAYSIA. URL: http://www.tecforte.comEmail: [email protected]: +603 2776 6936Fax: +603 2776 6999
- expiration_date: 13.02.2018
- mutual_recognition: CCRA
- product: Log Radar v3.2.15 with modules Console, Collector and Archiver
- report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C010/ISCB-5-RPT-C010-CR-v1a.pdf
- scope: The Target of Evaluation (TOE) is Log Radar v3.2.15 with modules Console, Collector and Archiver; commonly referred as LogRadar. LogRadar is an automated software system used on enterprise data networks to centralise the storage and interpretation of logs, or events, generated by other devices or applications. Its key aims are to collect, normalise process and manage such information (logs) from a real time context. The modules included in the scope of the security evaluation and certification are: Console - acts as the interfacing point between user and TOE, Collector - its core function is to collect streams of data as and when they occur and process these device specific logs into a common and normalised form, and Archiver - functions as a backup daemon. In the context of the evaluation, the TOE is expected to provide the following major security features: Identification and authentication – the TOE provides user identification and authentication independent from the operating system on which it operates on. Security audit – the TOE records each individual user session and tracks each action within the session. Granular access control – the TOE allows users access permission within the application to be dynamically and granularly assigned via users and group memberships. Password management – the TOE provides a full password management function including the management of password policy rules as well as password expiry settings. Sessions management – the TOE maintain session management and restricts a single login for only a single valid session. Socket layer – the TOE runs on Secure Socket Layer (SSL) to protect its data when travelling thru the network. Import and export of configuration data – the TOE runs on Secure Socket Layer (SSL) to protect its data when travelling thru the network. Automated archive – the TOE provides a mechanism where the auto archival of aggregated reports, rawlogs and syslogs will be automatically hashed with MD-5 checksum, archived with AES encryption and stored at predetermined times. Real time syslog collection – the TOE provides the ability for authorised users to dynamically configure the TOE to listen to syslog streams from network devices, servers and/or any other supported applications.
- status: Archive
- target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C010/LogRadar_ST-Document_v1-0R.pdf
- type: Automated software system used on enterprise data networks to centralise the storage and interpretation of logs, or events, generated by other devices or applications.
- expiration_date: 13.02.2018
- level: EAL2
- product: Log Radar v3.2.15 with modules Console, Collector and Archiver
- recognition: CCRA
- url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/80
|
- category: Other products
- cert_id: BSI-DSZ-CC-1013-V2-2022
- certification_date: 14.12.2022
- enhanced:
- applicant: SSI Schäfer Plastics GmbH Kalkofen 6 58638 Iserlohn
- assurance_level: EAL1,ASE_SPD.1,ASE_REQ.2,ASE_OBJ.2
- cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1013V2c_pdf.pdf?__blob=publicationFile&v=3
- certification_date: 14.12.2022
- description: The TOE is referred to as IMELO-Secure 1.0. It is a waste bin identification system developed by Institut für Entsorgung und Umwelttechnik GmbH. The TOE is evaluated and certified conform to the PP „Protection Profile Waste Bin Identification System (WBIS-PP), Version 1.04“. Waste bin identification systems (WBIS) in the sense of this document are systems, which allow to identify waste bins by an ID-tag (e.g. an electronic chip which is referred to as transponder) in order to determine how often a specific waste bin has been cleared. Note that this type of system does not identify the waste directly but the waste bin, which contains the waste for disposal.
- entries: [frozendict({'id': 'BSI-DSZ-CC-1013-V2-2022', 'description': 'Environment.'}), frozendict({'id': 'BSI-DSZ-CC.1013-2017', 'description': 'Security Target'})]
- evaluation_facility: TÜV Informationstechnik GmbH
- expiration_date: 13.12.2027
- product: IMELO-Secure, Version 1.1
- protection_profile: Protection Profile Waste Bin Identification Systems (WBIS-PP), Version 1.04, 27 May 2004, BSI-PP-0010-2004
- target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1013V2b_pdf.pdf?__blob=publicationFile&v=3
- product: IMELO-Secure, Version 1.1
- url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Sonstiges/1013_1013V2.html
- vendor: SSI Schäfer Plastics GmbH
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
{} |
f1e8c937d15e713a |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/WBIS-PPv1-04.pdf |
| pdf_data/cert_filename |
|
1013V2c_pdf.pdf |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1013-V2-2022: 1
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
- ASE:
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Keywords: "Common Criteria, Certification, Zertifizierung, WBIS, Imelo, Müllbehälter-Identifikationsystem"
- /Subject: Common Criteria, Certification, Zertifizierung, WBIS, Imelo, Müllbehälter-Identifikationsystem
- /Title: Zertifikat BSI-DSZ-CC-1013-V2-2022
- pdf_file_size_bytes: 457534
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
| pdf_data/report_filename |
ISCB-5-RPT-C010-CR-v1a.pdf |
1013V2a_pdf.pdf |
| pdf_data/report_frontpage |
|
- DE:
- cert_id: BSI-DSZ-CC-1013-V2-2022
- cert_item: IMELO-Secure, Version 1.1
- cert_lab: BSI
- developer: SSI Schäfer Plastics GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) zu (.+?) der (.*)']
|
| pdf_data/report_keywords/cc_cert_id |
- MY:
- ISCB-5-RPT-C010-CR-v1a: 31
|
- DE:
- BSI-DSZ-CC-1013-: 1
- BSI-DSZ-CC-1013-2017: 2
- BSI-DSZ-CC-1013-V2-2022: 11
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP- 0010-2004: 1
- BSI-PP-0010-2004: 2
|
| pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 5
- EAL 2: 1
- EAL 4: 1
- EAL1+: 1
|
| pdf_data/report_keywords/cc_sar |
|
- ALC:
- ASE:
- ASE_OBJ.2: 4
- ASE_REQ.2: 4
- ASE_SPD.1: 4
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 3
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- ISO:
- ISO/IEC 18045: 2
- ISO/IEC15408: 2
|
- BSI:
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
- /Author: Norhazimah Abdul Malek
- /Category: PUBLIC
- /Caveat: FINAL
- /Classification: PUBLIC
- /Company: CyberSecurity Malaysia
- /CreationDate: D:20130218150743+08'00'
- /Creator: Acrobat PDFMaker 10.1 for Word
- /Developer: TecForte Sdn Bhd
- /Document Type: REPORT
- /Identifier: ISCB-5-RPT-C010-CR-v1a
- /Index: ISCB_TMP_011
- /Keywords: Log Radar v3.2.15
- /ModDate: D:20130218150748+08'00'
- /Phase: External
- /Producer: Adobe PDF Library 10.0
- /Released: 13 February 2013
- /ST: LogRadar Security Target
- /ST Version: v1.0R
- /SourceModified: D:20130218070717
- /Sponsor: TecForte Sdn Bhd
- /Subject: Log Radar v3.2.15 with modules Console, Collector and Archiver
- /TOE: Log Radar
- /TOE Name: LogRadar
- /TOE Version: v3.2.15
- /Title: C010 Certification Report
- /Version: v1a
- pdf_file_size_bytes: 476755
- pdf_hyperlinks: mailto:[email protected], http://www.cybersecurity.my/mycc
- pdf_is_encrypted: True
- pdf_number_of_pages: 31
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Keywords: "Common Criteria, Certification, Zertifizierung, WBIS, Imelo, Müllbehälter-Identifikationsystem"
- /Subject: Common Criteria, Certification, Zertifizierung, WBIS, Imelo, Müllbehälter-Identifikationsystem
- /Title: Zertifizierungsreport BSI-DSZ-CC-1013-V2-2022
- pdf_file_size_bytes: 758234
- pdf_hyperlinks: https://www.bsi.bund.de/AIS, https://www.commoncriteriaportal.org/, https://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.sogis.eu/
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
| pdf_data/st_filename |
LogRadar_ST-Document_v1-0R.pdf |
1013V2b_pdf.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP-0010-: 1
- BSI-PP-0010-2004: 1
|
| pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL1: 1
- EAL1 augmented: 1
- EAL1+: 8
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMS: 1
- ASE:
- ASE_CCL.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 2
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 3
- FAU_GEN.1: 1
- FAU_GEN.2: 7
- FAU_GEN.2.1: 1
- FAU_GEN.3: 15
- FAU_GEN.3.1: 1
- FAU_GEN.3.2: 1
- FAU_SAR: 2
- FAU_SAR.1: 12
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 9
- FAU_SAR.2.1: 1
- FCS:
- FCS_COP.1: 23
- FCS_COP.1.1: 2
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 14
- FDP_ACC.2: 8
- FDP_ACC.2.1: 1
- FDP_ACC.2.2: 1
- FDP_ACF: 2
- FDP_ACF.1: 10
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC: 2
- FDP_IFC.1: 9
- FDP_IFC.1.1: 1
- FDP_IFC.2: 1
- FDP_IFF: 2
- FDP_IFF.1: 9
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC: 1
- FIA:
- FIA_AFL: 2
- FIA_AFL.1: 8
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_SOS: 1
- FIA_SOS.1: 8
- FIA_UAU: 1
- FIA_UAU.1: 5
- FIA_UAU.2: 8
- FIA_UAU.2.1: 1
- FIA_UID: 1
- FIA_UID.1: 11
- FIA_UID.2: 7
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF: 1
- FMT_MOF.1: 11
- FMT_MOF.1.1: 2
- FMT_MSA: 3
- FMT_MSA.1: 10
- FMT_MSA.1.1: 1
- FMT_MSA.3: 13
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_REV: 2
- FMT_REV.1: 6
- FMT_REV.1.1: 1
- FMT_REV.1.2: 1
- FMT_SAE: 1
- FMT_SAE.1: 6
- FMT_SAE.1.1: 1
- FMT_SAE.1.2: 1
- FMT_SMF: 2
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR: 1
- FMT_SMR.1: 20
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 1
- FMT_SMT: 1
- FPT:
- FPT_ETC: 4
- FPT_ETC.2: 8
- FPT_ETC.2.1: 1
- FPT_ETC.2.2: 1
- FPT_ETC.2.3: 1
- FPT_ETC.2.4: 2
- FPT_FMT: 1
- FPT_ITC: 2
- FPT_ITC.2: 8
- FPT_ITC.2.1: 1
- FPT_ITC.2.2: 1
- FPT_ITC.2.3: 1
- FPT_ITC.2.4: 1
- FPT_ITC.2.5: 2
- FPT_STM.1: 7
- FPT_TDC: 1
- FRU:
- FRU_RSA: 1
- FRU_RSA.1: 8
- FRU_RSA.1.1: 1
- FRU_SRA.1: 1
- FTA:
- FTA_SSL: 1
- FTA_SSL.3: 9
- FTA_SSL.3.1: 1
- FTP:
- FTP_TRP: 1
- FTP_TRP.1: 10
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FDP:
- FDP_DAU: 6
- FDP_DAU.1: 6
- FDP_DAU.1.1: 5
- FDP_DAU.1.2: 5
- FDP_ITT: 5
- FDP_ITT.1: 1
- FDP_ITT.5: 16
- FDP_ITT.5.1: 6
- FDP_SDI: 3
- FDP_SDI.1: 9
- FDP_SDI.1.1: 5
- FPT:
- FRU:
- FRU_FLT.1: 6
- FRU_FLT.1.1: 5
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.DIRECT: 2
- A.INTEGR: 3
- A.LOCATE: 3
- A.MANAGE: 2
- A.NOEVIL: 3
- A.NOTRST: 2
- A.PROTCT: 2
- A.REM_OPER: 1
- A.TIME: 6
- O:
- O.ACCESS: 19
- O.AUDITS: 7
- O.EADMIN: 12
- O.EXPORT: 10
- O.IDAUTH: 29
- O.INTEGR: 6
- O.PROTCT: 9
- O.SECRMT: 2
- O.TMSTMP: 2
- OE:
- OE.INSTAL: 4
- OE.INSTALL: 1
- OE.INTEGR: 5
- OE.OFLOWS: 5
- OE.PERSON: 7
- OE.PHYCAL: 7
- OE.TMSTMP: 6
- T:
- T.COMINT: 3
- T.DLOSS: 5
- T.IMPCON: 3
- T.INFLUX: 3
- T.INSECUSE: 3
- T.INTEGR: 3
- T.LOSSOF: 3
- T.NOHALT: 3
- T.PRIVIL: 3
- T.UNATHDVCE: 2
|
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
|
- CC:
- CCMB-20012-09-001: 1
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 3
- CCMB-2012-09-003: 3
- CCMB-2012-09-004: 1
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
|
| pdf_data/st_metadata |
- /Author: WKhuan
- /Company:
- /CreationDate: D:20130115175724+08'00'
- /Creator: Acrobat PDFMaker 10.1 for Word
- /ModDate: D:20130115175735+08'00'
- /Producer: Adobe PDF Library 10.0
- /SourceModified: D:20130115013704
- pdf_file_size_bytes: 614209
- pdf_hyperlinks: mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 69
|
- /Author: Hartmut Möllmann;[email protected];Matthias Spielmann;Ulrich Schurkus
- /Keywords: CC-Dokumentation
- /Subject: Sicherheitsvorgaben
- /Title: Sicherheitsvorgabe für das Behälter Identifikationssystem „IMELO-Secure“ Version 1.0
- pdf_file_size_bytes: 747264
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 35
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
True |
| state/cert/download_ok |
False |
True |
| state/cert/extract_ok |
False |
True |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |