| name |
Trend Micro TippingPoint Security Management System (SMS) v6.2.0 |
PEACOS Electronic Passport with EAC on P5CD080 V0B, version 1.2 |
| category |
Network and Network-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme |
MY |
FR |
| status |
active |
archived |
| not_valid_after |
03.05.2029 |
01.09.2019 |
| not_valid_before |
03.05.2024 |
01.07.2011 |
| cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C133-CERTIFICATE-V1.pdf |
|
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C133-CR-v1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2011-21en.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Trend%20Micro%20SMS%206.2.0%20ST-v1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2011-21en.pdf |
| manufacturer |
Trend Micro Incorporated. |
Gep S.p.A., NXP Semiconductors Germany GmbH, and Istituto Poligrafico e Zecca dello Stato |
| manufacturer_web |
https://www.trendmicro.com |
https://www.gepitalia.it |
| security_level |
EAL2 |
EAL4+, ALC_DVS.2, AVA_VAN.5 |
| dgst |
633dc7480c953157 |
15b819b02760f743 |
| heuristics/cert_id |
ISCB-5-RPT-C133-CR-v1 |
ANSSI-CC-2011/21 |
| heuristics/cert_lab |
[] |
SERMA |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ALC_DEL.1, ATE_FUN.1, ASE_INT.1, ALC_CMS.2, AGD_OPE.1, ATE_COV.1, ASE_CCL.1, ADV_ARC.1, AVA_VAN.2, ASE_SPD.1, ATE_IND.2, ASE_ECD.1, ADV_TDS.1, ADV_FSP.2, AGD_PRE.1, ALC_CMC.2, ASE_TSS.1, ASE_REQ.2, ASE_OBJ.2 |
ALC_DEL.1, ATE_FUN.1, ALC_CMS.4, AVA_VAN.5, ASE_INT.1, ADV_FSP.4, ADV_TDS.3, AGD_OPE.1, ASE_CCL.1, ADV_ARC.1, ATE_COV.2, AVA_MSU.3, ASE_SPD.1, ATE_IND.2, ALC_CMC.4, ALC_TAT.1, ATE_DPT.1, AVA_VLA.4, ASE_ECD.1, AGD_PRE.1, ASE_TSS.1, ADV_IMP.1, ALC_DVS.2, ASE_REQ.2, ALC_LCD.1, ASE_OBJ.2 |
| heuristics/extracted_versions |
6.2.0 |
1.2 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0680-2010 |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0680-2010, BSI-DSZ-CC-0404-2007, BSI-DSZ-CC-0410-2007 |
| heuristics/scheme_data |
- cert_no: 2024-003-C133
- certification_date: 03.05.2024
- developer: Trend Micro Incorporated.
- enhanced:
- assurance_level: EAL2
- category: Network and Network-Related Devices and Systems
- cert_id: C133
- certification_date: 03.05.2024
- developer: 11305 Alterra ParkwayAustin, TX 78758Phone: +1 (817) 569-8900Toll-free: (888) 762-8736https://www.trendmicro.com/en_za/contact.html
- expiration_date: 03.05.2029
- mutual_recognition: CCRA
- product: Trend Micro TippingPoint Security Management System (SMS) v6.2.0
- report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C133/ISCB-5-RPT-C133-CR-v1.pdf
- scope: The TOE provides centralized control for managing large-scale deployments of the following TippingPoint products: TippingPoint NX Series Next-Generation Intrusion Prevention System (IPS)—uses a combination of technologies, including deep packet inspection, threat reputation, and advanced malware analysis, on a flow-by-flow basis to detect and prevent attacks on the network. TippingPoint Threat Protection System (TPS)—a network security platform that offers comprehensive threat protection, shielding network vulnerabilities, blocking exploits, and defending against known and zero-day attacks. The TOE also provides capabilities for communicating threat data with TippingPoint Deep Discovery (DD) devices. TippingPoint DD is a threat protection platform providing capabilities to detect, analyze and respond to network-based attacks.
- status: Valid
- target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C133/Trend_Micro_SMS_6.2.0_ST-v1.0.pdf
- type: Network and Network-Related Devices and Systems
- expiration_date: 03.05.2029
- level: EAL2
- product: Trend Micro TippingPoint Security Management System (SMS) v6.2.0
- recognition: CCRA
- url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/certified-products-and-systems-5/submission-view/171
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0680-2010, BSI-DSZ-CC-0410-2007 |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0680-2010, BSI-DSZ-CC-0410-2007 |
| heuristics/protection_profiles |
{} |
627a214702fd03e7 |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0026_ma1b.pdf |
| pdf_data/cert_filename |
ISCB-5-CERT-C133-CERTIFICATE-V1.pdf |
|
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename |
ISCB-5-RPT-C133-CR-v1.pdf |
ANSSI-CC_2011-21en.pdf |
| pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 4 augmented ALC_DVS.2, AVA_VAN.5
- cc_version: Common Criteria version 3.1 revision 3
- cert_id: ANSSI-CC-2011/21
- cert_item: PEACOS Electronic Passport with EAC on P5CD080 V0B
- cert_item_version: /version PEACOS_NXP80_1_2 / Version 1.2
- cert_lab: Serma Technologies 30 avenue Gustave Eiffel, 33608 Pessac, France Phone: +33 (0)5 57 26 08 75, email : [email protected]
- developer: Gep S.p.A 90 Corso Salvatore D’Amato, 80022 Arzano, Italy NXP Semiconductors Germany GmbH Box 54 02 40, D-22502 Hamburg, Germany Sponsor Istituto Poligrafico e Zecca dello Stato S.p.A 1027 Via Salaria , 00198 Roma, Italy
- match_rules: ['Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developers(.+)Evaluation facility(.+)Recognition arrangements']
- ref_protection_profiles: PP EAC], version 1.2 Machine Readable Travel Document with “ICAO Application”, Extended Access Control
|
| pdf_data/report_keywords/cc_cert_id |
- MY:
- ISCB-5-RPT-C133-CR-V1: 33
- ISCB-5-RPT-C133-CR-v1: 2
|
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP-0002-2001: 1
- BSI-PP-0026-2006-MA-01: 1
|
| pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 2
- EAL 4 augmented: 2
- EAL 5: 1
- EAL 7: 1
- EAL4: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
| pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
- AVA_MSU.3: 1
- AVA_VAN: 3
- AVA_VAN.5: 1
- AVA_VLA.4: 1
|
| pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 1
- FAU_GEN.1.1: 1
- FAU_SAR.1: 1
- FAU_SAR.3: 1
- FIA:
- FIA_AFL.1: 1
- FIA_SOS.1: 1
- FIA_UAU.5: 1
- FIA_UAU.7: 1
- FMT:
- FMT_MOF.1: 3
- FMT_MOF.1.1: 3
- FMT_MTD.1: 6
- FMT_MTD.1.1: 3
- FMT_SMF.1: 1
- FMT_SMF.1.1: 2
- FMT_SMR.1: 1
- FPT:
- FTA:
- FTA_MCS.1: 1
- FTA_SSL.1: 1
- FTA_TAB.1: 1
- FTP:
|
|
| pdf_data/report_keywords/cc_claims |
|
|
| pdf_data/report_keywords/vendor |
|
- Gemalto:
- NXP:
- NXP: 11
- NXP Semiconductors: 2
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- ISO:
- ISO/IEC 18045: 2
- ISO/IEC15408: 2
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- ICAO:
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
- /CreationDate: D:20240510051519Z00'00'
- /Creator: Word
- /ModDate: D:20240510051519Z00'00'
- /Producer: macOS Version 11.7.10 (Build 20G1427) Quartz PDFContext
- /Title: ISCB-5-RPT-C133-CR-v1
- pdf_file_size_bytes: 1537825
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 35
|
- /Author:
- /CreationDate: D:20110701114139+02'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20110701114139+02'00'
- /Producer: Acrobat Distiller 8.0.0 (Windows)
- /Title:
- pdf_file_size_bytes: 110255
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 15
|
| pdf_data/st_filename |
Trend Micro SMS 6.2.0 ST-v1.0.pdf |
ANSSI-CC-cible_2011-21en.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0410-2007: 1
- BSI-DSZ-CC-0680: 1
- BSI-DSZ-CC-0680-2010: 2
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP-0002-2001: 1
- BSI-PP-0026: 3
|
| pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 1
- EAL 4 augmented: 1
- EAL 4+: 1
- EAL4: 8
- EAL4+: 2
- EAL5: 1
- EAL5 augmented: 1
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 11
- ADV_FSP.2: 12
- ADV_TDS.1: 12
- AGD:
- AGD_OPE.1: 11
- AGD_PRE.1: 7
- ALC:
- ALC_CMC.2: 9
- ALC_CMS.2: 7
- ALC_DEL.1: 6
- ASE:
- ASE_CCL.1: 15
- ASE_ECD.1: 11
- ASE_INT.1: 13
- ASE_OBJ.2: 11
- ASE_REQ.2: 14
- ASE_SPD.1: 8
- ASE_TSS.1: 6
- ATE:
- ATE_COV.1: 5
- ATE_FUN.1: 9
- ATE_IND.2: 8
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 4
- ADV_FSP: 1
- ADV_FSP.4: 3
- ADV_IMP: 1
- ADV_IMP.1: 3
- ADV_TDS: 1
- ADV_TDS.3: 3
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 3
- AGD_PRE: 2
- AGD_PRE.1: 3
- ALC:
- ALC_CMC: 1
- ALC_CMC.4: 2
- ALC_CMS: 1
- ALC_CMS.4: 2
- ALC_DEL: 2
- ALC_DEL.1: 2
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 8
- ALC_LCD: 1
- ALC_LCD.1: 2
- ALC_TAT: 1
- ALC_TAT.1: 2
- APE:
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 2
- ATE_DPT.1: 2
- ATE_FUN.1: 2
- ATE_IND.2: 1
- AVA:
- AVA_VAN: 1
- AVA_VAN.3: 2
- AVA_VAN.5: 8
- AVA_VLA.4: 1
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 4
- FAU_GEN.1: 11
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_SAR: 6
- FAU_SAR.1: 11
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 5
- FAU_SAR.2.1: 1
- FAU_SAR.3: 6
- FAU_SAR.3.1: 1
- FAU_STG: 2
- FAU_STG.1: 5
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FCS:
- FCS_COP.1: 2
- FCS_COP.1.1: 1
- FIA:
- FIA_AFL: 2
- FIA_AFL.1: 6
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD: 2
- FIA_ATD.1: 6
- FIA_ATD.1.1: 1
- FIA_SOS: 2
- FIA_SOS.1: 7
- FIA_SOS.1.1: 1
- FIA_UAU: 8
- FIA_UAU.1: 4
- FIA_UAU.2: 12
- FIA_UAU.2.1: 1
- FIA_UAU.5: 6
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 6
- FIA_UAU.6.1: 1
- FIA_UAU.7: 6
- FIA_UAU.7.1: 1
- FIA_UID: 1
- FIA_UID.1: 7
- FIA_UID.2: 10
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF.1: 12
- FMT_MOF.1.1: 3
- FMT_MTD.1: 17
- FMT_MTD.1.1: 6
- FMT_SMF: 1
- FMT_SMF.1: 10
- FMT_SMF.1.1: 1
- FMT_SMR: 1
- FMT_SMR.1: 9
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_ITT: 2
- FPT_ITT.1: 6
- FPT_ITT.1.1: 1
- FPT_STM: 3
- FPT_STM.1: 8
- FPT_STM.1.1: 1
- FTA:
- FTA_MCS: 2
- FTA_MCS.1: 6
- FTA_MCS.1.1: 1
- FTA_MCS.1.2: 1
- FTA_SSL: 6
- FTA_SSL.1: 6
- FTA_SSL.1.1: 1
- FTA_SSL.1.2: 1
- FTA_SSL.3: 7
- FTA_SSL.3.1: 1
- FTA_SSL.4: 6
- FTA_SSL.4.1: 1
- FTA_TAB: 2
- FTA_TAB.1: 6
- FTA_TAB.1.1: 1
- FTA_TAH: 2
- FTA_TAH.1: 6
- FTA_TAH.1.1: 1
- FTA_TAH.1.2: 1
- FTA_TAH.1.3: 1
- FTP:
- FTP_ITC: 1
- FTP_ITC.1: 7
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 2
- FTP_TRP.1: 6
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_GEN: 1
- FAU_SAS: 7
- FAU_SAS.1: 10
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 45
- FCS_CKM.1: 19
- FCS_CKM.2: 6
- FCS_CKM.4: 28
- FCS_COP: 56
- FCS_COP.1: 12
- FCS_RND: 17
- FCS_RND.1: 5
- FCS_RND.1.1: 1
- FDP:
- FDP_ACC.1: 19
- FDP_ACC.1.1: 1
- FDP_ACF: 1
- FDP_ACF.1: 15
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 2
- FDP_IFC.1: 4
- FDP_ITC.1: 10
- FDP_ITC.2: 10
- FDP_UCT: 9
- FDP_UCT.1: 3
- FDP_UIT: 8
- FDP_UIT.1: 4
- FIA:
- FIA_AFL.1: 12
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_API: 15
- FIA_API.1: 4
- FIA_API.1.1: 1
- FIA_SOS.2: 1
- FIA_UAU: 34
- FIA_UAU.1: 17
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 3
- FIA_UAU.5: 4
- FIA_UAU.6: 3
- FIA_UID.1: 19
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_LIM: 9
- FMT_LIM.1: 21
- FMT_LIM.1.1: 2
- FMT_LIM.2: 20
- FMT_LIM.2.1: 2
- FMT_MSA.1: 1
- FMT_MSA.3: 3
- FMT_MTD: 82
- FMT_MTD.1: 14
- FMT_MTD.3: 11
- FMT_MTD.3.1: 1
- FMT_SMF.1: 30
- FMT_SMF.1.1: 1
- FMT_SMR.1: 32
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS: 1
- FPT_FLS.1: 9
- FPT_FLS.1.1: 1
- FPT_PHP.3: 11
- FPT_PHP.3.1: 1
- FPT_TST: 1
- FPT_TST.1: 11
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC.1: 5
- FTP_TRP.1: 4
|
| pdf_data/st_keywords/cc_claims |
- A:
- O:
- O.AUDIT: 6
- O.AUDIT_REVIEW: 3
- O.I_AND_A: 8
- O.LOGIN_BANNER: 3
- O.LOGIN_HISTORY: 5
- O.PASSWORD_CONTROLS: 3
- O.PROTECTED: 1
- O.PROTECTED_COMMS: 4
- O.SECURITY_MANAGEMENT: 3
- O.SESSION_LIMITS: 5
- O.SESSION_SECURITY: 3
- O.STORAGE: 5
- O.THROTTLE: 3
- OE:
- OE.PERSONNEL: 2
- OE.PHYSICAL: 2
- T:
- T.BRUTE_FORCE: 3
- T.INAPPRORIATE_USE: 2
- T.INTEGRITY_COMPROMISE: 3
- T.NETWORK_COMPROMISE: 2
- T.NO_ACCOUNTABILITY: 3
- T.UNAUTHORIZED_ACCESS: 2
- T.UNAUTHORIZED_ACTIVITY: 3
|
|
| pdf_data/st_keywords/vendor |
|
- NXP:
- NXP: 10
- NXP Semiconductors: 3
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
- SSH:
- TLS:
- TLS:
- TLS: 12
- TLS 1.2: 1
- TLS v1.0: 2
- TLS v1.1: 2
- TLS v1.2: 3
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 2
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
- TLS_RSA_WITH_AES_128_CBC_SHA: 2
- TLS_RSA_WITH_AES_128_CBC_SHA256: 2
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 3
- Physical Tampering: 5
- Physical tampering: 1
- fault injection: 1
- malfunction: 6
- physical tampering: 2
- SCA:
- DPA: 3
- SPA: 2
- physical probing: 2
- timing attacks: 1
- other:
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.COM: 7
- EF.DG1: 24
- EF.DG13: 3
- EF.DG14: 15
- EF.DG16: 20
- EF.DG2: 10
- EF.DG3: 14
- EF.DG4: 14
- EF.DG5: 7
- EF.SOD: 10
|
| pdf_data/st_keywords/standard_id |
|
- BSI:
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- FIPS:
- FIPS 180-2: 1
- FIPS 46-3: 1
- FIPS PUB 180-2: 1
- FIPS PUB 46-3: 1
- ICAO:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 15408: 2
- ISO/IEC 7816: 2
- ISO/IEC 7816-4: 1
- PKCS:
- PKCS #3: 1
- PKCS#1: 2
- PKCS#3: 1
- RFC:
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
- ConfidentialDocument:
- Report BSI-DSZ-CC-0680 NXP P5CD080V0B Secure Smart Card Controller, Version 1.39, 29 October 2010, (confidential document) [R4] BSI: Protection Profile conformant to Smartcard IC Platform Protection Profile, Version 1.0: 1
- family, NXP Semiconductors, Version 1.8, Document umber: 129918, February 15th, 2010 (confidential document) [R24] IETF Network Working Group: Request For Comments 3447, Public-Key Cryptography Standard: 1
|
| pdf_data/st_metadata |
- /Author: Apted, Tony J. [RA]
- /CreationDate: D:20240403093836+08'00'
- /Creator: Microsoft® Word for Microsoft 365
- /ModDate: D:20240403093836+08'00'
- /Producer: Microsoft® Word for Microsoft 365
- /Subject: Third Party Protected Information
- /Title: Trend Micro SMS
- pdf_file_size_bytes: 852877
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 45
|
- /CreationDate: D:20110713100039+02'00'
- /Keywords:
- /ModDate: D:20110713100039+02'00'
- /Producer: GPL Ghostscript 9.0
- pdf_file_size_bytes: 764822
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 97
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
True |
False |
| state/cert/download_ok |
True |
False |
| state/cert/extract_ok |
False |
False |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |