| name |
Brocade MLXe and NetIron Family Devices with Multi-Service IronWare R05.9 |
IDMotion V2 Multos Virtual Machine OS Multos V4.5.2, AMD version 0151v001 |
| category |
Network and Network-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme |
US |
FR |
| status |
archived |
archived |
| not_valid_after |
27.01.2018 |
14.12.2023 |
| not_valid_before |
27.01.2016 |
14.12.2018 |
| cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10657-ci.pdf |
|
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10657-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018_50fr.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10657-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2018_50en.pdf |
| manufacturer |
Brocade Communications Systems, Inc. |
Gemalto / Trusted Labs |
| manufacturer_web |
https://www.brocade.com |
https://www.gemalto.com |
| security_level |
{} |
EAL7 |
| dgst |
63e16d3f7824e9e5 |
efb9f87dde709ef7 |
| heuristics/cert_id |
CCEVS-VR-10657-2016 |
ANSSI-CC-2018/50 |
| heuristics/cert_lab |
US |
THALES |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
AGD_PRE.1, ALC_CMC.1, AGD_OPE.1, ATE_IND.1, ALC_CMS.1, AVA_VAN.1, ADV_FSP.1 |
ATE_FUN.2, ADV_CMC.5, ALC_DVS.2, ADV_IMP.2, ALC_CMC.5, AVA_VAN.5, ADV_LCD.2, ADV_TAT.3, ATE_COV.3, ALC_CMS.1, ADV_INT.3, ATE_DPT.4, ALC_TAT.3, ALC_LCD.2, ADV_FSP.6, ADV_SPM.1, ADV_ARC.1, ADV_TDS.6 |
| heuristics/extracted_versions |
05.9 |
4.5.2 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0945-2017, ANSSI-CC-2018/35 |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0945-2017, ANSSI-CC-2018/35 |
| heuristics/scheme_data |
- api_url: https://www.niap-ccevs.org/api/project/product/pcl_products/10657/
- categories: ['Network Device', ' Virtual Private Network']
- category: Network Device
- certification_date: 27.01.2016
- evaluation_facility: Gossamer Security Solutions
- expiration_date: 27.01.2018
- id: CCEVS-VR-VID10657
- product: Brocade MLXe and NetIron Family Devices with Multi-Service IronWare R05.9
- scheme: US
- url: https://www.niap-ccevs.org/products/10657
- vendor: Brocade Communications Systems LLC A Broadcom Inc. Company
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0945-2017 |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0945-2017 |
| heuristics/protection_profiles |
bb67fb1b4f10e7a5, ac9abe3d5c5a31f0 |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_v1.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_vpn_gw_ep_v1.1.pdf |
{} |
| pdf_data/cert_filename |
st_vid10657-ci.pdf |
|
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10657-2016: 1
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
- /CreationDate: D:20160128160155-05'00'
- /ModDate: D:20160128160155-05'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 178997
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
| pdf_data/report_filename |
st_vid10657-vr.pdf |
anssi-cc-2018_50fr.pdf |
| pdf_data/report_frontpage |
- FR:
- US:
- cert_id: CCEVS-VR-10657-2016
- cert_item: Brocade Communication Systems, Inc 130 Holger Way San Jose, CA 95134 Brocade MLXe Family Devices with Multi- Service IronWare R05.9.00
- cert_lab: US NIAP
|
- FR:
- cc_security_level: EAL 7
- cc_version: Critères Communs version 3.1 révision 5
- cert_id: ANSSI-CC-2018/50
- cert_item: IDMotion V2 Multos Virtual Machine
- cert_item_version: OS version Multos V4.5.2 AMD version 0151v001
- cert_lab: THALES (TCS – CNES) 290 allée du Lac, 31670 Labège, France
- developer: Gemalto La Vigie, Avenue du jujubier, ZI Athélia IV, BP 90- 13702 La Ciotat Trusted Labs 6, rue de la Verrerie – CS20001, 92197 Meudon Cedex Infineon Technologies AG Am Campeon 1-12, 85579 Neubiberg Commanditaire Gemalto La Vigie, Avenue du jujubier, ZI Athélia IV, BP 90- 13702 La Ciotat
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: Néant
- US:
|
| pdf_data/report_keywords/cc_cert_id |
|
- DE:
- FR:
- ANSSI-CC-2018/35: 2
- ANSSI-CC-2018/50: 15
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 4
- EAL2: 2
- EAL7: 3
- ITSEC:
|
| pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
|
|
| pdf_data/report_keywords/vendor |
|
- Gemalto:
- Infineon:
- Infineon Technologies AG: 2
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
- /CreationDate: D:20160128131449-05'00'
- /ModDate: D:20160128131449-05'00'
- pdf_file_size_bytes: 415960
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 16
|
- /CreationDate: D:20181219113402+01'00'
- /Creator: Microsoft® Word 2010
- /Keywords: ANSSI-CC-CER-F-07.028
- /ModDate: D:20181219115454+01'00'
- /Producer: Microsoft® Word 2010
- /Subject:
- /Title:
- pdf_file_size_bytes: 749242
- pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 14
|
| pdf_data/st_filename |
st_vid10657-st.pdf |
anssi-cible-cc-2018_50en.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL4: 1
- EAL5: 3
- EAL5+: 1
- EAL7: 6
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 10
- AGD_PRE: 1
- AGD_PRE.1: 6
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 4
- ALC_CMS: 1
- ALC_CMS.1: 5
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_CMC.5: 4
- ADV_FSP.2: 1
- ADV_FSP.6: 3
- ADV_IMP.1: 3
- ADV_IMP.2: 2
- ADV_INT.3: 3
- ADV_LCD.2: 1
- ADV_SPM.1: 5
- ADV_TAT.3: 1
- ADV_TDS.4: 1
- ADV_TDS.6: 3
- ALC:
- ALC_CMC.5: 2
- ALC_CMS.1: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 5
- ALC_LCD.1: 1
- ALC_LCD.2: 5
- ALC_TAT.3: 5
- ATE:
- ATE_COV.1: 1
- ATE_COV.3: 3
- ATE_DPT.4: 3
- ATE_FUN.1: 2
- ATE_FUN.2: 3
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 4
- FAU_GEN.1: 2
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 2
- FAU_GEN.2.1: 1
- FAU_STG_EXT: 3
- FAU_STG_EXT.1: 2
- FAU_STG_EXT.1.1: 1
- FCS:
- FCS_CKM: 2
- FCS_CKM.1: 2
- FCS_CKM.1.1: 1
- FCS_CKM.1.2: 1
- FCS_CKM_EXT: 3
- FCS_CKM_EXT.4: 2
- FCS_CKM_EXT.4.1: 1
- FCS_COP.1: 21
- FCS_RBG_EXT: 3
- FCS_RBG_EXT.1: 4
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FDP:
- FDP_ACC: 2
- FDP_ACC.1: 1
- FDP_RIP: 2
- FDP_RIP.2: 2
- FDP_RIP.2.1: 1
- FIA:
- FIA_AFL: 2
- FIA_AFL.1: 1
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_PMG_EXT: 3
- FIA_PMG_EXT.1: 3
- FIA_PMG_EXT.1.1: 1
- FIA_PSK_EXT: 3
- FIA_PSK_EXT.1: 1
- FIA_PSK_EXT.1.1: 1
- FIA_PSK_EXT.1.2: 1
- FIA_PSK_EXT.1.3: 1
- FIA_PSK_EXT.1.4: 1
- FIA_UAU: 2
- FIA_UAU.7: 2
- FIA_UAU.7.1: 1
- FIA_UAU_EXT: 3
- FIA_UAU_EXT.2: 2
- FIA_UAU_EXT.2.1: 1
- FIA_UIA_EXT: 3
- FIA_UIA_EXT.1: 2
- FIA_UIA_EXT.1.1: 1
- FIA_UIA_EXT.1.2: 1
- FMT:
- FMT_MOF: 2
- FMT_MOF.1: 1
- FMT_MOF.1.1: 1
- FMT_MTD: 2
- FMT_MTD.1: 2
- FMT_MTD.1.1: 1
- FMT_SMF: 2
- FMT_SMF.1: 2
- FMT_SMF.1.1: 1
- FMT_SMR: 2
- FMT_SMR.2: 2
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT: 3
- FPT_APW_EXT.1: 2
- FPT_APW_EXT.1.1: 1
- FPT_APW_EXT.1.2: 1
- FPT_FLS: 2
- FPT_FLS.1: 1
- FPT_FLS.1.1: 1
- FPT_SKP_EXT: 3
- FPT_SKP_EXT.1: 2
- FPT_SKP_EXT.1.1: 1
- FPT_STM: 2
- FPT_STM.1: 2
- FPT_STM.1.1: 1
- FPT_TST_EXT: 3
- FPT_TST_EXT.1: 2
- FPT_TST_EXT.1.1: 1
- FPT_TST_EXT.1.2: 1
- FPT_TUD_EXT: 3
- FPT_TUD_EXT.1: 2
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FTA:
- FTA_SSL: 4
- FTA_SSL.3: 2
- FTA_SSL.3.1: 1
- FTA_SSL.4: 2
- FTA_SSL.4.1: 1
- FTA_SSL_EXT: 3
- FTA_SSL_EXT.1: 2
- FTA_SSL_EXT.1.1: 1
- FTA_TAB: 2
- FTA_TAB.1: 3
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC: 2
- FTP_ITC.1: 2
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 2
- FTP_TRP.1: 2
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_ACC.2: 1
- FAU_ARP: 3
- FAU_ARP.1: 6
- FAU_ARP.1.1: 4
- FAU_GEN.1: 4
- FAU_SAA: 3
- FAU_SAA.1: 10
- FAU_SAA.1.1: 2
- FAU_SAA.1.2: 3
- FAU_SAS.1: 1
- FCS:
- FCS_CKM: 4
- FCS_COP: 5
- FCS_RNG: 4
- FDP:
- FDP_ACC: 5
- FDP_ACC.1: 4
- FDP_ACC.2: 13
- FDP_ACC.2.1: 2
- FDP_ACC.2.2: 1
- FDP_ACF: 4
- FDP_ACF.1: 13
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_IFC.1: 1
- FDP_ITT.1: 1
- FDP_ROL: 3
- FDP_ROL.1: 5
- FDP_ROL.1.1: 1
- FDP_ROL.1.2: 1
- FDP_SDC.1: 1
- FDP_SDI.1: 1
- FDP_SDI.2: 1
- FDP_UCT.1: 1
- FDP_UIT.1: 1
- FIA:
- FMT:
- FMT_LIM: 2
- FMT_LIM.2: 1
- FMT_MSA.1: 3
- FMT_MSA.3: 3
- FMT_SMF.1: 1
- FPT:
- FPT_FLS: 4
- FPT_FLS.1: 12
- FPT_FLS.1.1: 2
- FPT_PHP.3: 1
- FPT_RCV: 3
- FPT_RCV.4: 7
- FPT_RCV.4.1: 1
- FPT_TST.2: 1
- FRU:
- FRU_FLT.2: 1
- FRU_RSA: 3
- FRU_RSA.1: 6
- FRU_RSA.1.1: 1
- FTP:
|
| pdf_data/st_keywords/cc_claims |
- OE:
- OE.CONNECTIONS: 1
- OE.NO_GENERAL_PURPOSE: 1
- OE.PHYSICAL: 1
- OE.TRUSTED_ADMIN: 1
|
- A:
- A.APPLI_CONT: 9
- A.CIPHER: 3
- A.CLON: 3
- A.DECIPHER: 3
- A.DIS_MEMORY: 3
- A.LOAD: 3
- A.MOD_MEMORY: 3
- A.OPERATE: 3
- A.REMOVE: 3
- A.SECURITY: 3
- A.SIDE: 3
- A.TAMPER_ES: 3
- O:
- O.AES: 1
- O.APPLI_DEV: 12
- O.CIPHER: 3
- O.CLON: 2
- O.DECIPHER: 4
- O.DEV_DIS_ES: 13
- O.DIS: 1
- O.DIS_MEMORY: 2
- O.DLV_: 7
- O.DLV_AUDIT: 1
- O.DLV_DATA: 6
- O.EFECT_REMOVE: 1
- O.EFFECT_L: 1
- O.EFFECT_LOAD: 5
- O.EFFECT_R: 1
- O.EFFECT_REMOVE: 3
- O.FLAW: 1
- O.INIT_A: 2
- O.INIT_ACS: 7
- O.LOAD: 8
- O.MOD_MEMORY: 1
- O.OPERATE: 1
- O.REMOVE: 6
- O.RESOURCE: 4
- O.RESOURCES: 1
- O.RND: 1
- O.ROLLBACK: 5
- O.SAMPLES_ACS: 1
- O.SAMPLE_ACS: 4
- O.SECURITY: 5
- O.SEGREGATE: 5
- O.SIDE: 6
- O.TAMPER_ES: 17
- O.TEST_OPERA: 1
- OSP:
- OSP.CIPHER: 3
- OSP.CONF-ALU: 3
- T:
- T.APP_CORR: 6
- T.APP_DISC: 7
- T.APP_MOD: 7
- T.APP_READ: 7
- T.APP_REMOVE: 7
- T.CLON: 2
- T.DEL_REMOVE: 7
- T.DIS: 2
- T.DIS_DATA: 14
- T.DIS_TEST_ES: 5
- T.ERR_REMOVE: 6
- T.LOAD_APP: 8
- T.LOAD_MAN: 5
- T.LOAD_MOD: 5
- T.LOAD_OTHER: 5
- T.MOD: 5
- T.MOD_DATA: 7
- T.MOD_EXE: 10
- T.MOD_LOAD: 7
- T.MOD_SHARE: 8
- T.MOD_TSF: 8
- T.RESOURCES: 5
- T.RND: 2
- T.T_CMD: 10
- T.T_ES: 8
- T.T_TOOLS: 5
|
| pdf_data/st_keywords/vendor |
|
- Gemalto:
- Infineon:
- Infineon: 5
- Infineon Technologies: 2
- Thales:
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 3
- malfunction: 1
- SCA:
- Leak-Inherent: 4
- Physical Probing: 2
- physical probing: 1
- side channel: 1
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS PUB 186-2: 1
- FIPS PUB 186-3: 5
- FIPS PUB 197: 1
- NIST:
- NIST SP 800-38A: 2
- NIST SP 800-38D: 1
- NIST SP 800-90: 1
- RFC:
- RFC 2460: 2
- RFC 2986: 1
- RFC 4106: 2
- RFC 4301: 3
- RFC 4303: 1
- RFC 4945: 1
- RFC 5280: 1
- RFC 5759: 1
- RFC 6379: 2
- RFC 768: 2
- RFC 791: 2
- RFC 793: 2
- X509:
|
- CC:
- CCMB-2006-09-001: 1
- CCMB-2007-09-002: 1
- CCMB-2007-09-003: 1
- CCMB-2007-09-004: 1
- ICAO:
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- out of scope: 2
- the TOE, the product also contain native applications and native modules used by ICAO application (out of scope of the TOE). Mel applications and native modules Native/MEL application: GMF v1.0 The GMF: 1
- to the context in which the security functions take place. Note that cryptographic primitives are out of scope. Table 16 shows how these security functions satisfy the TOE security functional requirements. 8.1: 1
|
| pdf_data/st_metadata |
|
- /CreationDate: D:20181113151704+01'00'
- /Creator: Microsoft® Word 2013
- /Keywords: Security Target, CC, MULTOS, IDMotion, Platform
- /ModDate: D:20181219115510+01'00'
- /Producer: Microsoft® Word 2013
- /Subject:
- /Title:
- pdf_file_size_bytes: 2271251
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 75
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
True |
False |
| state/cert/download_ok |
True |
False |
| state/cert/extract_ok |
True |
False |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |