name |
Java Card Mokard Safe 2.2 V2.4.0 |
Huawei CX600 and PTN 6900 Series Routers running VRP software version V800R021C00SPC100 |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
Network and Network-Related Devices and Systems |
scheme |
DE |
ES |
status |
archived |
active |
not_valid_after |
01.09.2019 |
31.07.2029 |
not_valid_before |
11.11.2005 |
31.07.2024 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2020-49_Certificado.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0251a.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2020-49%20INF-4353.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0251b.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2020-49%20ST.pdf |
manufacturer |
ST Incard S.R.L. |
Huawei Technologies España, SL |
manufacturer_web |
https://www.incard.it/ |
https://www.huawei.com/es/ |
security_level |
AVA_VLA.3, EAL4+, ADV_IMP.2 |
{} |
dgst |
643e82f312663824 |
0ee5a8bce7d2c1b7 |
heuristics/cert_id |
BSI-DSZ-CC-0251-2005 |
2020-49-INF-4353 |
heuristics/cert_lab |
BSI |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_ENV.1, ADV_RCR.1, ASE_INT.1, ADV_HLD.2, AGD_USR.1, ASE_REQ.1, ASE_PPC.1, ASE_DES.1, ADV_FSP.2, AVA_SOF.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, AVA_MSU.2, AGD_ADM.1, ALC_LCD.1, ATE_FUN.1, ADV_IMP.2, ATE_DPT.1, AVA_VLA.3, ALC_DVS.1, ASE_SRE.1, ASE_OBJ.1, ATE_IND.2, ADV_LLD.1, ADV_SPM.1 |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 |
heuristics/extracted_versions |
2.2, 2.4.0 |
6900 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
- category: Routers
- certification_date: 31.07.2024
- enhanced:
- category: Routers
- cc_version: Common Methodology for Information Technology Security Evaluation/Common Criteria for Information Technology Security Evaluation version 3.1 release 5
- cert_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=2026
- certification_date: 31.07.2024
- description: The TOE is CX600&PTN 6900 Series Routers running VRP software comprised of both software and hardware. The software is comprised of Versatile Routing Platform (VRP) software, VRP is a network OS incorporating Huawei's proprietary intellectual properties and capable of supporting various network systems of Huawei. The hardware is comprised of the following: CX600-M2K, CX600-M2K-B, CX600-X8A, CX600-X16A, PTN 6900-M2K, PTN 6900-M2K-B, PTN 6900-2-M8C, PTN 6900-2-M14. The Huawei CX600&PTN 6900 Series Routers running VRP software use the same VRP version. TSF relevant functions depend on software implementation. The physical scope comprises the following hardware appliances and the TOE software: Appliances: CX600-M2K, CX600-M2K-B, CX600-X8A, CX600-X16A, PTN 6900-M2K, PTN 6900-M2K-B, PTN 6900-2-M8C, PTN 6900-2-M14 Software: CX600&PTN 6900 Router V800R021C00SPC100, CX600-M2K-B, CX600-X8A, CX600-X16A, PTN 6900-M2K, PTN 6900-M2K-B, PTN 6900-2-M8C, PTN 6900-2-M14
- evaluation_facility: Applus Laboratories
- level: PP Compliant
- manufacturer: Huawei Technologies España, S.L.
- report_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=2027
- status: Certified
- target_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=2025
- type: Product
- manufacturer: Huawei Technologies España, S.L.
- product: Huawei CX600 and PTN 6900 Series Routers running VRP software version V800R021C00SPC100
- product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/1015-huawei-cx600-and-ptn-6900-series-routers-running-vrp-software-version-v800r021c00spc100
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.1.pdf |
pdf_data/cert_filename |
|
2020-49_Certificado.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
- Huawei:
- Huawei: 2
- Huawei Technologies: 1
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /CreationDate: D:20240718133923+02'00'
- /ModDate: D:20240718133923+02'00'
- /Producer: GPL Ghostscript 9.27
- pdf_file_size_bytes: 898419
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
0251a.pdf |
2020-49 INF-4353.pdf |
pdf_data/report_frontpage |
- DE:
- cert_id: BSI-DSZ-CC-0251-2005
- cert_item: Java Card Mokard Safe 2.2 V2.4.0
- cert_lab: BSI
- developer: ST-Incard S.r.l
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 4: 1
- EAL 7: 1
- EAL1: 5
- EAL2: 3
- EAL3: 4
- EAL4: 12
- EAL4 augmented: 3
- EAL4+: 1
- EAL5: 6
- EAL6: 3
- EAL7: 4
|
- EAL:
- EAL 1: 1
- EAL 2: 1
- EAL 4: 2
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ACM:
- ACM_AUT: 2
- ACM_AUT.1: 1
- ACM_CAP: 2
- ACM_CAP.4: 1
- ACM_SCP: 2
- ACM_SCP.2: 1
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 1
- ADO_IGS: 2
- ADO_IGS.1: 1
- ADV:
- ADV_FSP: 2
- ADV_FSP.2: 1
- ADV_HLD: 2
- ADV_HLD.2: 1
- ADV_IMP: 2
- ADV_IMP.2: 6
- ADV_INT: 2
- ADV_LLD: 2
- ADV_LLD.1: 1
- ADV_RCR: 2
- ADV_RCR.1: 1
- ADV_SPM: 2
- ADV_SPM.1: 1
- AGD:
- AGD_ADM: 2
- AGD_ADM.1: 4
- AGD_USR: 2
- AGD_USR.1: 4
- ALC:
- ALC_DVS: 2
- ALC_DVS.1: 1
- ALC_FLR: 2
- ALC_LCD: 1
- ALC_LCD.1: 1
- ALC_TAT: 2
- ALC_TAT.1: 1
- ASE:
- ASE_DES.1: 1
- ASE_ENV.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_PPC.1: 1
- ASE_REQ.1: 1
- ASE_SRE.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 2
- ATE_COV.2: 1
- ATE_DPT: 2
- ATE_DPT.1: 1
- ATE_FUN: 2
- ATE_FUN.1: 1
- ATE_IND: 2
- ATE_IND.2: 1
- AVA:
- AVA_CCA: 2
- AVA_MSU: 2
- AVA_MSU.2: 1
- AVA_SOF: 4
- AVA_SOF.1: 1
- AVA_VLA: 4
- AVA_VLA.2: 1
- AVA_VLA.3: 7
- AVA_VLA.4: 1
|
- ADV:
- AGD:
- ALC:
- ASE:
- ASE_CCL.1: 1
- ASE_INT.1: 1
- ASE_REQ.2: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FCO:
- FCS:
- FCS_CKM.1: 1
- FCS_CKM.2: 1
- FCS_CKM.3: 1
- FCS_CKM.4: 1
- FCS_COP.1: 1
- FDP:
- FDP_ACC.2: 3
- FDP_ACF.1: 3
- FDP_IFC.1: 2
- FDP_IFC.2: 1
- FDP_IFF.1: 3
- FDP_ITC.2: 1
- FDP_RIP.1: 4
- FDP_ROL.1: 1
- FDP_SDI.2: 1
- FDP_UIT.1: 1
- FIA:
- FIA_ATD.1: 1
- FIA_UID.1: 1
- FIA_UID.2: 1
- FIA_USB.1: 1
- FMT:
- FMT_MSA.1: 4
- FMT_MSA.2: 1
- FMT_MSA.3: 4
- FMT_MTD.1: 1
- FMT_MTD.3: 1
- FMT_REV.1: 1
- FMT_SMF.1: 4
- FMT_SMR.1: 5
- FPR:
- FPT:
- FPT_FLS.1: 4
- FPT_RCV.3: 1
- FPT_RVM.1: 1
- FPT_SEP.1: 1
- FPT_TDC.1: 1
- FPT_TST.1: 1
- FRU:
- FTP:
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.APPLET: 2
- A.NATIVE: 2
- A.VERIFICATION: 2
- OSP:
- T:
- T.CONFID-APPLI-DATA: 1
- T.CONFID-JCS-CODE: 1
- T.CONFID-JCS-DATA: 1
- T.DELETION: 1
- T.EXE-CODE: 2
- T.EXE-CODE-REMOTE: 1
- T.INSTALL: 1
- T.INTEG-APPLI-: 1
- T.INTEG-APPLI-CODE: 1
- T.INTEG-APPLI-DATA: 2
- T.INTEG-JCS-CODE: 1
- T.INTEG-JCS-DATA: 1
- T.NATIVE: 1
- T.OBJ-DELETION: 1
- T.PHYSICAL: 1
- T.RESOURCES: 1
- T.SID: 2
|
|
pdf_data/report_keywords/vendor |
|
- Huawei:
- Huawei: 29
- Huawei Technologies: 3
|
pdf_data/report_keywords/eval_facility |
- TUV:
- TÜV Informationstechnik: 4
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
- FI:
- fault injection: 1
- malfunction: 1
- physical tampering: 1
- SCA:
|
|
pdf_data/report_keywords/technical_report_id |
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- Mokard Safe 2.2, ASE-Security Target, BSI-DSZ-0251-2005, Version B- 0, Draft-11, Date 14.10.2005, (confidential document) [7] Mokard Safe 2.2, The User and Administrator Guidance AGD_USR.1 – AGD_ADM.1, Version A-0: 1
- Report [8] Evaluation Technical Report, BSI-DSZ-CC-0251-2005, Version 2, Date: 09.11.2005, (confidential document) [9] Protection Profile PP/0305, JavaCard System Standard 2.2 Configuration Protection Profile [10: 1
|
|
pdf_data/report_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Company: BSI
- /CreationDate: D:20051219141321+01'00'
- /Creator: Acrobat PDFMaker 7.0.5 für Word
- /ModDate: D:20051219142354+01'00'
- /Producer: Acrobat Distiller 7.0.5 (Windows)
- /SourceModified: D:20051219131312
- /Subject: BSI-DSZ-CC-0251-2005
- /Title: Certification Report
- pdf_file_size_bytes: 714197
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 40
|
|
pdf_data/st_filename |
0251b.pdf |
2020-49 ST.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-PP-000: 1
- BSI-PP-0002: 1
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 4: 5
- EAL 4 augmented: 3
- EAL4: 9
- EAL4 augmented: 2
|
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_AUT.1: 4
- ACM_CAP.4: 3
- ACM_SCP.2: 4
- ADO:
- ADO_DEL.2: 4
- ADO_IGS.1: 4
- ADV:
- ADV_FSP.1: 1
- ADV_FSP.2: 5
- ADV_HLD.2: 6
- ADV_IMP.1: 2
- ADV_IMP.2: 11
- ADV_LLD.1: 7
- ADV_RCR.1: 4
- ADV_SPM.1: 15
- AGD:
- AGD_ADM.1: 8
- AGD_USR.1: 6
- ALC:
- ALC_DVS.1: 4
- ALC_LCD: 1
- ALC_LCD.1: 3
- ALC_TAT.1: 5
- ATE:
- ATE_COV.2: 3
- ATE_DPT.1: 2
- ATE_FUN.1: 3
- ATE_IND.2: 3
- AVA:
- AVA_MSU.2: 4
- AVA_SOF.1: 5
- AVA_VLA: 1
- AVA_VLA.2: 3
- AVA_VLA.3: 10
|
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_ARP: 3
- FAU_ARP.1: 8
- FAU_SAA.1: 4
- FCO:
- FCS:
- FCS_CKM.1: 14
- FCS_CKM.2: 9
- FCS_CKM.3: 7
- FCS_CKM.4: 12
- FCS_CKM.4.1: 1
- FCS_COP.1: 8
- FDP:
- FDP_ACC: 21
- FDP_ACC.1: 17
- FDP_ACC.2: 12
- FDP_ACF: 12
- FDP_ACF.1: 33
- FDP_IFC: 20
- FDP_IFC.1: 25
- FDP_IFC.2: 7
- FDP_IFF: 11
- FDP_IFF.1: 30
- FDP_IFF.2: 8
- FDP_IFF.2.7: 1
- FDP_ITC.1: 4
- FDP_ITC.2: 12
- FDP_RIP: 2
- FDP_RIP.1: 28
- FDP_ROL: 1
- FDP_ROL.1: 14
- FDP_SDI.2: 9
- FDP_UIT: 1
- FDP_UIT.1: 4
- FIA:
- FIA_ATD: 2
- FIA_ATD.1: 6
- FIA_UID: 9
- FIA_UID.1: 19
- FIA_UID.2: 3
- FIA_USB.1: 6
- FIA_USB.1.1: 1
- FMT:
- FMT_MSA: 39
- FMT_MSA.1: 31
- FMT_MSA.2: 11
- FMT_MSA.3: 28
- FMT_MTD: 2
- FMT_MTD.1: 7
- FMT_MTD.3: 5
- FMT_MTD.3.1: 1
- FMT_REV: 1
- FMT_REV.1: 5
- FMT_SMF: 7
- FMT_SMF.1: 32
- FMT_SMR: 25
- FMT_SMR.1: 48
- FPR:
- FPT:
- FPT_AMT: 3
- FPT_AMT.1: 5
- FPT_FLS: 10
- FPT_FLS.1: 18
- FPT_PHP: 1
- FPT_PHP.3: 3
- FPT_RCV: 3
- FPT_RCV.3: 17
- FPT_RCV.4: 4
- FPT_RVM: 2
- FPT_RVM.1: 9
- FPT_RVM.1.1: 1
- FPT_SEP: 2
- FPT_SEP.1: 10
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_TDC.1: 5
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST.1: 7
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FRU:
- FRU_FLT: 2
- FRU_FLT.1: 3
- FRU_RSA: 2
- FRU_RSA.1: 6
- FTP:
- FTP_ITC: 3
- FTP_ITC.1: 8
- FTP_TRP.1: 2
|
- FAU:
- FAU_GEN.1: 10
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 7
- FAU_GEN.2.1: 1
- FAU_STG: 8
- FAU_STG.1: 8
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG_EXT.1: 8
- FAU_STG_EXT.1.1: 1
- FAU_STG_EXT.1.2: 1
- FAU_STG_EXT.1.3: 1
- FCS:
- FCS_CKM.1: 19
- FCS_CKM.1.1: 1
- FCS_CKM.2: 14
- FCS_CKM.2.1: 1
- FCS_CKM.4: 17
- FCS_CKM.4.1: 1
- FCS_COP: 63
- FCS_COP.1: 5
- FCS_RBG_EXT: 7
- FCS_RBG_EXT.1: 7
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FCS_SSHC_EXT.1: 8
- FCS_SSHC_EXT.1.1: 3
- FCS_SSHC_EXT.1.2: 3
- FCS_SSHC_EXT.1.3: 3
- FCS_SSHC_EXT.1.4: 3
- FCS_SSHC_EXT.1.5: 4
- FCS_SSHC_EXT.1.6: 3
- FCS_SSHC_EXT.1.7: 3
- FCS_SSHC_EXT.1.8: 3
- FCS_SSHC_EXT.1.9: 3
- FCS_SSHS_EXT.1: 8
- FCS_SSHS_EXT.1.1: 3
- FCS_SSHS_EXT.1.2: 3
- FCS_SSHS_EXT.1.3: 3
- FCS_SSHS_EXT.1.4: 3
- FCS_SSHS_EXT.1.5: 3
- FCS_SSHS_EXT.1.6: 3
- FCS_SSHS_EXT.1.7: 3
- FCS_SSHS_EXT.1.8: 3
- FCS_TLSC_EXT.1: 8
- FCS_TLSC_EXT.1.1: 3
- FCS_TLSC_EXT.1.2: 3
- FCS_TLSC_EXT.1.3: 3
- FCS_TLSC_EXT.1.4: 3
- FIA:
- FIA_AFL.1: 9
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_PMG_EXT.1: 8
- FIA_PMG_EXT.1.1: 1
- FIA_UAU.1: 1
- FIA_UAU.7: 7
- FIA_UAU.7.1: 1
- FIA_UAU_EXT.2: 8
- FIA_UAU_EXT.2.1: 1
- FIA_UIA_EXT.1: 13
- FIA_UIA_EXT.1.1: 1
- FIA_UIA_EXT.1.2: 1
- FIA_UID.1: 2
- FMT:
- FMT_MOF: 21
- FMT_MOF.1: 3
- FMT_MTD: 12
- FMT_MTD.1: 2
- FMT_SMF.1: 20
- FMT_SMF.1.1: 1
- FMT_SMR.1: 5
- FMT_SMR.2: 7
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT.1: 8
- FPT_APW_EXT.1.1: 1
- FPT_APW_EXT.1.2: 1
- FPT_SKP_EXT.1: 8
- FPT_SKP_EXT.1.1: 1
- FPT_STM.1: 2
- FPT_STM_EXT.1: 8
- FPT_STM_EXT.1.1: 1
- FPT_STM_EXT.1.2: 1
- FPT_TST_EXT.1: 8
- FPT_TST_EXT.1.1: 1
- FPT_TUD_EXT.1: 8
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FTA:
- FTA_SSL.3: 7
- FTA_SSL.3.1: 1
- FTA_SSL.4: 7
- FTA_SSL.4.1: 1
- FTA_SSL_EXT.1: 8
- FTA_SSL_EXT.1.1: 1
- FTA_TAB.1: 10
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC.1: 23
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_ITC.2: 6
- FTP_TRP: 10
- FTP_TRP.1: 3
|
pdf_data/st_keywords/cc_claims |
- A:
- A.APPLET: 4
- A.NATIVE: 6
- A.VERIFICATION: 3
- D:
- D.API_DATA: 3
- D.APP_CODE: 8
- D.APP_C_DATA: 3
- D.APP_I_DATA: 4
- D.CRYPTO: 4
- D.JCS_CODE: 3
- D.JCS_DATA: 5
- D.PIN: 6
- D.SEC_DATA: 7
- O:
- O.ALARM: 5
- O.APPLET: 31
- O.CIPHER: 7
- O.CODE_PCKG: 8
- O.CODE_PKG: 6
- O.DELETION: 5
- O.FIREWALL: 11
- O.INSTALL: 8
- O.JAVAOBJECT: 38
- O.KEY-MNGT: 5
- O.LOAD: 6
- O.NATIVE: 7
- O.OBJ-DELETION: 5
- O.OPERATE: 9
- O.PACKAGE: 9
- O.PIN-: 1
- O.PIN-MNGT: 5
- O.REALLOCATION: 5
- O.REMOTE: 4
- O.REMOTE_MTHD: 6
- O.REMOTE_OBJ: 9
- O.REMOTE_OBJECT: 1
- O.RESOURCES: 6
- O.RMI_SERVICE: 12
- O.ROR: 5
- O.SHRD_VAR_CONFID: 5
- O.SHRD_VAR_INTEG: 6
- O.SID: 8
- O.TODO: 1
- O.TRANSACTION: 5
- OE:
- OE.APPLET: 6
- OE.CARD-MANAGEMENT: 3
- OE.NATIVE: 4
- OE.SCP: 18
- OE.VERIFICATION: 11
- OP:
- OP.ARRAY_ACCESS: 3
- OP.AUTHENTICATION: 2
- OP.BYTECODE: 1
- OP.CARD_CONTENT_MGT: 2
- OP.CREATE: 6
- OP.DELETE_APPLET: 4
- OP.DELETE_PCKG: 3
- OP.DELETE_PCKG_APPLET: 3
- OP.GET_ROR: 2
- OP.INSTALL: 1
- OP.INSTANCE_FIELD: 1
- OP.INVK_INTERFACE: 4
- OP.INVK_VIRTUAL: 3
- OP.INVOKE: 2
- OP.JAVA: 4
- OP.LOAD: 1
- OP.PUT: 4
- OP.RECEIVE: 2
- OP.RET_RORD: 2
- OP.SEND: 2
- OP.THROW: 3
- OP.TYPE_ACCESS: 3
- OSP:
- R:
- R.CM: 1
- R.GP: 2
- R.JAVA: 19
- T:
- T.CONFID-APPLI-DATA: 3
- T.CONFID-JCS-CODE: 3
- T.CONFID-JCS-DATA: 3
- T.DELETION: 4
- T.EXE-CODE: 7
- T.EXE-CODE-REMOTE: 3
- T.INSTALL: 4
- T.INTEG-APPLI-CODE: 6
- T.INTEG-APPLI-DATA: 7
- T.INTEG-JCS-CODE: 3
- T.INTEG-JCS-DATA: 2
- T.NATIVE: 3
- T.OBJ-DELETION: 3
- T.PHYSICAL: 3
- T.RESOURCES: 3
- T.SID: 7
|
- A:
- A.ADMIN_CREDENTIALS_SECURE: 2
- A.LIMITED_FUNCTIONALITY: 2
- A.NO_THRU_TRAFFIC_PROTECTION: 2
- A.PHYSICAL_PROTECTION: 2
- A.REGULAR_UPDATES: 2
- A.RESIDUAL_INFORMATION: 2
- A.TRUSTED_ADMINISTRATOR: 2
- OE:
- OE.ADMIN_CREDENTIALS_SECURE: 3
- OE.NO_GENERAL_PURPOSE: 3
- OE.NO_THRU_TRAFFIC_PROTECTION: 3
- OE.PHYSICAL: 3
- OE.RESIDUAL_INFORMATION: 3
- OE.TRUSTED_ADMIN: 3
- OE.UPDATES: 3
- T:
- T.PASSWORD_CRACKING: 4
- T.SECURITY_FUNCTIONALITY_COMPROMISE: 2
- T.SECURITY_FUNCTIONALITY_FAILURE: 2
- T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 2
- T.UNDETECTED_ACTIVITY: 3
- T.UNTRUSTED_COMMUNICATION_CHANNELS: 4
- T.UPDATE_COMPROMISE: 2
- T.WEAK_AUTHENTICATION_ENDPOINTS: 2
- T.WEAK_CRYPTOGRAPHY: 2
|
pdf_data/st_keywords/vendor |
|
- Huawei:
- Huawei: 88
- Huawei Technologies Co: 1
|
pdf_data/st_keywords/eval_facility |
- TUV:
- TUV Informationstechnik: 1
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- AES:
- AES: 21
- AES128: 4
- AES256: 7
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA2:
- SHA-2: 1
- SHA-256: 9
- SHA-384: 2
- SHA256: 1
- SHA384: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
- PGP:
- SSH:
- TLS:
- SSL:
- TLS:
- TLS: 43
- TLS 1.2: 1
- TLS1.2: 1
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- NIST:
- P-256: 6
- P-384: 6
- P-521: 6
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: 2
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 2
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Physical tampering: 1
- malfunction: 2
- physical tampering: 1
- SCA:
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCIMB-99-031: 1
- CCIMB-99-032: 1
- CCIMB-99-033: 1
- FIPS:
- FIPS 197: 1
- FIPS PUB 46-3: 1
- PKCS:
- SCP:
|
- FIPS:
- FIPS 180-3: 1
- FIPS 186-4: 1
- FIPS PUB 186-4: 11
- ISO:
- ISO/IEC 10118-3: 1
- ISO/IEC 14888-3: 3
- ISO/IEC 18031:2011: 3
- ISO/IEC 9796-2: 3
- ISO/IEC 9797-2: 1
- PKCS:
- RFC:
- RFC 2104: 1
- RFC 4251: 3
- RFC 4252: 1
- RFC 4253: 4
- RFC 4254: 1
- RFC 5246: 3
- RFC 5280: 6
- RFC 5288: 5
- RFC 5647: 2
- RFC 5656: 2
- RFC 6125: 3
- RFC 6668: 1
- X509:
|
pdf_data/st_keywords/javacard_version |
- JavaCard:
- Java Card 2.1.1: 3
- Java Card 2.1.2: 1
- Java Card 2.2: 128
- Java Card 2.2.1: 2
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
- java:
- javacard:
- javacard.framework: 4
- javacard.framework.appletclass: 1
- javacard.framework.service: 1
- javacard.security: 14
- javacardx:
- javacardx.crypto: 3
- javacardx.rmi: 1
- javacardx.security: 1
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this PP, though. ASE – Security Target Java Card 2.2 on Mokard Safe Issued: 10/11/2005: 1
- out of scope: 1
|
|
pdf_data/st_metadata |
- /Author: NDiiorio
- /CreationDate: D:20051110164319
- /Creator: Mokard Safe 2.2 ASE Security Target Lite.doc (Sola lettura) - Microsoft Word
- /Producer: Acrobat PDFWriter 4.05 per Windows NT
- /Title: Mokard Safe 2.2 ASE Security Target Lite.doc
- pdf_file_size_bytes: 2702319
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 133
|
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |