name |
Java Card Mokard Safe 2.2 V2.4.0 |
CA Directory r8.1 0608 (build 942) |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
Network and Network-Related Devices and Systems |
scheme |
DE |
US |
status |
archived |
archived |
not_valid_after |
01.09.2019 |
06.09.2012 |
not_valid_before |
11.11.2005 |
30.04.2007 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0251a.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid3022-vr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0251b.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid3022-st.pdf |
manufacturer |
ST Incard S.R.L. |
CA Technologies |
manufacturer_web |
https://www.incard.it/ |
https://www.ca.com |
security_level |
AVA_VLA.3, EAL4+, ADV_IMP.2 |
EAL3 |
dgst |
643e82f312663824 |
2be2ede185c90a0b |
heuristics/cert_id |
BSI-DSZ-CC-0251-2005 |
CCEVS-VR-0040-2007 |
heuristics/cert_lab |
BSI |
US |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_ENV.1, ADV_RCR.1, ASE_INT.1, ADV_HLD.2, AGD_USR.1, ASE_REQ.1, ASE_PPC.1, ASE_DES.1, ADV_FSP.2, AVA_SOF.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, AVA_MSU.2, AGD_ADM.1, ALC_LCD.1, ATE_FUN.1, ADV_IMP.2, ATE_DPT.1, AVA_VLA.3, ALC_DVS.1, ASE_SRE.1, ASE_OBJ.1, ATE_IND.2, ADV_LLD.1, ADV_SPM.1 |
ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, AVA_MSU.1, AGD_ADM.1, ATE_IND.2, ATE_DPT.1, AVA_SOF.1 |
heuristics/extracted_versions |
2.2, 2.4.0 |
8.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
- category: Network Access Control
- certification_date: 30.04.2007
- evaluation_facility: CygnaCom Solutions, Inc
- expiration_date:
- id: CCEVS-VR-VID3022
- product: CA Directory r8.1 0608 (build 942)
- scheme: US
- url: https://www.niap-ccevs.org/product/3022
- vendor: CA Technologies
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
0251a.pdf |
st_vid3022-vr.pdf |
pdf_data/report_frontpage |
- DE:
- cert_id: BSI-DSZ-CC-0251-2005
- cert_item: Java Card Mokard Safe 2.2 V2.4.0
- cert_lab: BSI
- developer: ST-Incard S.r.l
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- US:
|
- DE:
- US:
- cert_id: CCEVS-VR-07-0040
- cert_item: CA Directory, r8.1 0608 (build 942) for the Sun Solaris Platform
- cert_lab: US NIAP
|
pdf_data/report_keywords/cc_cert_id |
|
- US:
- CCEVS-VR-06-3022: 23
- CCEVS-VR-07-0040: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 4: 1
- EAL 7: 1
- EAL1: 5
- EAL2: 3
- EAL3: 4
- EAL4: 12
- EAL4 augmented: 3
- EAL4+: 1
- EAL5: 6
- EAL6: 3
- EAL7: 4
|
|
pdf_data/report_keywords/cc_sar |
- ACM:
- ACM_AUT: 2
- ACM_AUT.1: 1
- ACM_CAP: 2
- ACM_CAP.4: 1
- ACM_SCP: 2
- ACM_SCP.2: 1
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 1
- ADO_IGS: 2
- ADO_IGS.1: 1
- ADV:
- ADV_FSP: 2
- ADV_FSP.2: 1
- ADV_HLD: 2
- ADV_HLD.2: 1
- ADV_IMP: 2
- ADV_IMP.2: 6
- ADV_INT: 2
- ADV_LLD: 2
- ADV_LLD.1: 1
- ADV_RCR: 2
- ADV_RCR.1: 1
- ADV_SPM: 2
- ADV_SPM.1: 1
- AGD:
- AGD_ADM: 2
- AGD_ADM.1: 4
- AGD_USR: 2
- AGD_USR.1: 4
- ALC:
- ALC_DVS: 2
- ALC_DVS.1: 1
- ALC_FLR: 2
- ALC_LCD: 1
- ALC_LCD.1: 1
- ALC_TAT: 2
- ALC_TAT.1: 1
- ASE:
- ASE_DES.1: 1
- ASE_ENV.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_PPC.1: 1
- ASE_REQ.1: 1
- ASE_SRE.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 2
- ATE_COV.2: 1
- ATE_DPT: 2
- ATE_DPT.1: 1
- ATE_FUN: 2
- ATE_FUN.1: 1
- ATE_IND: 2
- ATE_IND.2: 1
- AVA:
- AVA_CCA: 2
- AVA_MSU: 2
- AVA_MSU.2: 1
- AVA_SOF: 4
- AVA_SOF.1: 1
- AVA_VLA: 4
- AVA_VLA.2: 1
- AVA_VLA.3: 7
- AVA_VLA.4: 1
|
- ACM:
- ACM_CAP.3: 1
- ACM_SCP.1: 1
- ADO:
- ADO_DEL.1: 2
- ADO_IGS.1: 3
- ADV:
- ADV_FSP.1: 1
- ADV_HLD.2: 1
- ADV_RCR.1: 1
- AGD:
- AGD_ADM.1: 2
- AGD_USR.1: 2
- ALC:
- ATE:
- ATE_COV: 1
- ATE_COV.2: 2
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_IND.2: 3
- AVA:
- AVA_MSU.1: 1
- AVA_SOF.1: 1
- AVA_VLA.1: 2
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FCO:
- FCS:
- FCS_CKM.1: 1
- FCS_CKM.2: 1
- FCS_CKM.3: 1
- FCS_CKM.4: 1
- FCS_COP.1: 1
- FDP:
- FDP_ACC.2: 3
- FDP_ACF.1: 3
- FDP_IFC.1: 2
- FDP_IFC.2: 1
- FDP_IFF.1: 3
- FDP_ITC.2: 1
- FDP_RIP.1: 4
- FDP_ROL.1: 1
- FDP_SDI.2: 1
- FDP_UIT.1: 1
- FIA:
- FIA_ATD.1: 1
- FIA_UID.1: 1
- FIA_UID.2: 1
- FIA_USB.1: 1
- FMT:
- FMT_MSA.1: 4
- FMT_MSA.2: 1
- FMT_MSA.3: 4
- FMT_MTD.1: 1
- FMT_MTD.3: 1
- FMT_REV.1: 1
- FMT_SMF.1: 4
- FMT_SMR.1: 5
- FPR:
- FPT:
- FPT_FLS.1: 4
- FPT_RCV.3: 1
- FPT_RVM.1: 1
- FPT_SEP.1: 1
- FPT_TDC.1: 1
- FPT_TST.1: 1
- FRU:
- FTP:
|
- FAU:
- FAU_SAR.1: 1
- FAU_SEL.1: 1
- FDP:
- FDP_ACC.1: 1
- FDP_ACF.1: 1
- FIA:
- FIA_AFL.1: 3
- FIA_ATD.1: 1
- FIA_SOS.1: 2
- FIA_UAU: 3
- FIA_UAU.1: 1
- FIA_UAU.2: 1
- FIA_UID.1: 1
- FIA_UID.2: 1
- FMT:
- FMT_MSA: 2
- FMT_MTD: 2
- FMT_SMF.1: 1
- FMT_SMR.1: 1
- FPT:
|
pdf_data/report_keywords/cc_claims |
- A:
- A.APPLET: 2
- A.NATIVE: 2
- A.VERIFICATION: 2
- OSP:
- T:
- T.CONFID-APPLI-DATA: 1
- T.CONFID-JCS-CODE: 1
- T.CONFID-JCS-DATA: 1
- T.DELETION: 1
- T.EXE-CODE: 2
- T.EXE-CODE-REMOTE: 1
- T.INSTALL: 1
- T.INTEG-APPLI-: 1
- T.INTEG-APPLI-CODE: 1
- T.INTEG-APPLI-DATA: 2
- T.INTEG-JCS-CODE: 1
- T.INTEG-JCS-DATA: 1
- T.NATIVE: 1
- T.OBJ-DELETION: 1
- T.PHYSICAL: 1
- T.RESOURCES: 1
- T.SID: 2
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
- TUV:
- TÜV Informationstechnik: 4
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
- CVE:
- CVE-2004-0079: 1
- CVE-2005-3653: 1
|
pdf_data/report_keywords/side_channel_analysis |
- FI:
- fault injection: 1
- malfunction: 1
- physical tampering: 1
- SCA:
|
|
pdf_data/report_keywords/technical_report_id |
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- Mokard Safe 2.2, ASE-Security Target, BSI-DSZ-0251-2005, Version B- 0, Draft-11, Date 14.10.2005, (confidential document) [7] Mokard Safe 2.2, The User and Administrator Guidance AGD_USR.1 – AGD_ADM.1, Version A-0: 1
- Report [8] Evaluation Technical Report, BSI-DSZ-CC-0251-2005, Version 2, Date: 09.11.2005, (confidential document) [9] Protection Profile PP/0305, JavaCard System Standard 2.2 Configuration Protection Profile [10: 1
|
- OutOfScope:
- Only - Out of Scope DXconsole DUA/LDUA The system configuration consists of two Sun SPARC Solaris 9 machines. On one: 1
- Out of Scope: 3
- and Software is Out of Scope DXconsole SSLD Ingres db DUA/LDUA Figure 3. TOE’s physical scope by product components used 16 CA: 1
- before use. RPC DSA RPB DSA RPA DSA DXserver DUA/LDUA TOE machine Remote Machine and Software is Out of Scope DXconsole SSLD Ingres db DUA/LDUA RPC DSA RPB DSA RPA DSA DXserver DUA/LDUA TOE machine Remote: 1
- iGateway affects the DXmanager module of eTrust Directory 8.1. DXmanager is not installed and out of scope for the evaluation. Also applies to the HTTP interface which is not an interface to the TOE. •: 1
- in scope) and the SSLD (out of scope) though not depicted: 1
- of the evaluation. Therefore, the cryptographic algorithms performed within the SSLD component are out of scope and not verified by this evaluation. Aspects of the following security functions are controlled : 1
- out of scope: 3
- used for the Developers Testing. The TOE DSA box includes the Ingres db (in scope) and the SSLD (out of scope) though not depicted. RPC DSA RPB DSA RPA DSA TOE DSA DUA/LDUA TOE machine Remote Machine For Test: 1
|
pdf_data/report_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Company: BSI
- /CreationDate: D:20051219141321+01'00'
- /Creator: Acrobat PDFMaker 7.0.5 für Word
- /ModDate: D:20051219142354+01'00'
- /Producer: Acrobat Distiller 7.0.5 (Windows)
- /SourceModified: D:20051219131312
- /Subject: BSI-DSZ-CC-0251-2005
- /Title: Certification Report
- pdf_file_size_bytes: 714197
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 40
|
- /Author: wshanahan
- /CreationDate: D:20070717085537-04'00'
- /Creator: Acrobat PDFMaker 7.0 for Word
- /ModDate: D:20070717085839-04'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /SourceModified: D:20070717125458
- /Title: National Information Assurance Partnership
- pdf_file_size_bytes: 184938
- pdf_hyperlinks: http://www.cygnacom.com/
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
pdf_data/st_filename |
0251b.pdf |
st_vid3022-st.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-PP-000: 1
- BSI-PP-0002: 1
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 4: 5
- EAL 4 augmented: 3
- EAL4: 9
- EAL4 augmented: 2
|
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_AUT.1: 4
- ACM_CAP.4: 3
- ACM_SCP.2: 4
- ADO:
- ADO_DEL.2: 4
- ADO_IGS.1: 4
- ADV:
- ADV_FSP.1: 1
- ADV_FSP.2: 5
- ADV_HLD.2: 6
- ADV_IMP.1: 2
- ADV_IMP.2: 11
- ADV_LLD.1: 7
- ADV_RCR.1: 4
- ADV_SPM.1: 15
- AGD:
- AGD_ADM.1: 8
- AGD_USR.1: 6
- ALC:
- ALC_DVS.1: 4
- ALC_LCD: 1
- ALC_LCD.1: 3
- ALC_TAT.1: 5
- ATE:
- ATE_COV.2: 3
- ATE_DPT.1: 2
- ATE_FUN.1: 3
- ATE_IND.2: 3
- AVA:
- AVA_MSU.2: 4
- AVA_SOF.1: 5
- AVA_VLA: 1
- AVA_VLA.2: 3
- AVA_VLA.3: 10
|
- ACM:
- ACM_CAP.3: 3
- ACM_SCP.1: 3
- ADO:
- ADO_DEL.1: 3
- ADO_IGS.1: 3
- ADV:
- ADV_FSP.1: 3
- ADV_HLD.2: 3
- ADV_RCR.1: 3
- AGD:
- AGD_ADM.1: 3
- AGD_USR.1: 3
- ALC:
- ATE:
- ATE_COV.2: 3
- ATE_DPT.1: 3
- ATE_FUN.1: 3
- ATE_IND.2: 3
- AVA:
- AVA_MSU.1: 3
- AVA_SOF.1: 3
- AVA_VLA.1: 4
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_ARP: 3
- FAU_ARP.1: 8
- FAU_SAA.1: 4
- FCO:
- FCS:
- FCS_CKM.1: 14
- FCS_CKM.2: 9
- FCS_CKM.3: 7
- FCS_CKM.4: 12
- FCS_CKM.4.1: 1
- FCS_COP.1: 8
- FDP:
- FDP_ACC: 21
- FDP_ACC.1: 17
- FDP_ACC.2: 12
- FDP_ACF: 12
- FDP_ACF.1: 33
- FDP_IFC: 20
- FDP_IFC.1: 25
- FDP_IFC.2: 7
- FDP_IFF: 11
- FDP_IFF.1: 30
- FDP_IFF.2: 8
- FDP_IFF.2.7: 1
- FDP_ITC.1: 4
- FDP_ITC.2: 12
- FDP_RIP: 2
- FDP_RIP.1: 28
- FDP_ROL: 1
- FDP_ROL.1: 14
- FDP_SDI.2: 9
- FDP_UIT: 1
- FDP_UIT.1: 4
- FIA:
- FIA_ATD: 2
- FIA_ATD.1: 6
- FIA_UID: 9
- FIA_UID.1: 19
- FIA_UID.2: 3
- FIA_USB.1: 6
- FIA_USB.1.1: 1
- FMT:
- FMT_MSA: 39
- FMT_MSA.1: 31
- FMT_MSA.2: 11
- FMT_MSA.3: 28
- FMT_MTD: 2
- FMT_MTD.1: 7
- FMT_MTD.3: 5
- FMT_MTD.3.1: 1
- FMT_REV: 1
- FMT_REV.1: 5
- FMT_SMF: 7
- FMT_SMF.1: 32
- FMT_SMR: 25
- FMT_SMR.1: 48
- FPR:
- FPT:
- FPT_AMT: 3
- FPT_AMT.1: 5
- FPT_FLS: 10
- FPT_FLS.1: 18
- FPT_PHP: 1
- FPT_PHP.3: 3
- FPT_RCV: 3
- FPT_RCV.3: 17
- FPT_RCV.4: 4
- FPT_RVM: 2
- FPT_RVM.1: 9
- FPT_RVM.1.1: 1
- FPT_SEP: 2
- FPT_SEP.1: 10
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_TDC.1: 5
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST.1: 7
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FRU:
- FRU_FLT: 2
- FRU_FLT.1: 3
- FRU_RSA: 2
- FRU_RSA.1: 6
- FTP:
- FTP_ITC: 3
- FTP_ITC.1: 8
- FTP_TRP.1: 2
|
- FAU:
- FAU_GEN.1: 17
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR.1: 11
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SEL.1: 17
- FAU_SEL.1.1: 1
- FDP:
- FDP_ACC.1: 16
- FDP_ACC.1.1: 1
- FDP_ACF.1: 15
- FDP_ACF.1.1: 4
- FDP_ACF.1.2: 7
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FIA:
- FIA_AFL.1: 16
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 13
- FIA_ATD.1.1: 1
- FIA_SOS.1: 16
- FIA_SOS.1.1: 1
- FIA_UAU: 25
- FIA_UAU.1: 17
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.2: 9
- FIA_UAU.2.1: 1
- FIA_UAU.5: 3
- FIA_UAU.5.1: 1
- FIA_UID.1: 19
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_UID.2: 8
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA: 34
- FMT_MSA.1: 2
- FMT_MSA.3: 2
- FMT_MTD: 45
- FMT_MTD.1: 2
- FMT_SMF.1: 16
- FMT_SMF.1.1: 1
- FMT_SMR.1: 19
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_RVM: 1
- FPT_RVM.1: 5
- FPT_RVM_EXP: 1
- FPT_SEP: 1
- FPT_SEP.1: 5
- FPT_STM.1: 11
- FPT_STM.1.1: 1
- FTP:
- FTP_ITC: 1
- FTP_ITC.1: 3
- FTP_ITC_EXP.1: 2
|
pdf_data/st_keywords/cc_claims |
- A:
- A.APPLET: 4
- A.NATIVE: 6
- A.VERIFICATION: 3
- D:
- D.API_DATA: 3
- D.APP_CODE: 8
- D.APP_C_DATA: 3
- D.APP_I_DATA: 4
- D.CRYPTO: 4
- D.JCS_CODE: 3
- D.JCS_DATA: 5
- D.PIN: 6
- D.SEC_DATA: 7
- O:
- O.ALARM: 5
- O.APPLET: 31
- O.CIPHER: 7
- O.CODE_PCKG: 8
- O.CODE_PKG: 6
- O.DELETION: 5
- O.FIREWALL: 11
- O.INSTALL: 8
- O.JAVAOBJECT: 38
- O.KEY-MNGT: 5
- O.LOAD: 6
- O.NATIVE: 7
- O.OBJ-DELETION: 5
- O.OPERATE: 9
- O.PACKAGE: 9
- O.PIN-: 1
- O.PIN-MNGT: 5
- O.REALLOCATION: 5
- O.REMOTE: 4
- O.REMOTE_MTHD: 6
- O.REMOTE_OBJ: 9
- O.REMOTE_OBJECT: 1
- O.RESOURCES: 6
- O.RMI_SERVICE: 12
- O.ROR: 5
- O.SHRD_VAR_CONFID: 5
- O.SHRD_VAR_INTEG: 6
- O.SID: 8
- O.TODO: 1
- O.TRANSACTION: 5
- OE:
- OE.APPLET: 6
- OE.CARD-MANAGEMENT: 3
- OE.NATIVE: 4
- OE.SCP: 18
- OE.VERIFICATION: 11
- OP:
- OP.ARRAY_ACCESS: 3
- OP.AUTHENTICATION: 2
- OP.BYTECODE: 1
- OP.CARD_CONTENT_MGT: 2
- OP.CREATE: 6
- OP.DELETE_APPLET: 4
- OP.DELETE_PCKG: 3
- OP.DELETE_PCKG_APPLET: 3
- OP.GET_ROR: 2
- OP.INSTALL: 1
- OP.INSTANCE_FIELD: 1
- OP.INVK_INTERFACE: 4
- OP.INVK_VIRTUAL: 3
- OP.INVOKE: 2
- OP.JAVA: 4
- OP.LOAD: 1
- OP.PUT: 4
- OP.RECEIVE: 2
- OP.RET_RORD: 2
- OP.SEND: 2
- OP.THROW: 3
- OP.TYPE_ACCESS: 3
- OSP:
- R:
- R.CM: 1
- R.GP: 2
- R.JAVA: 19
- T:
- T.CONFID-APPLI-DATA: 3
- T.CONFID-JCS-CODE: 3
- T.CONFID-JCS-DATA: 3
- T.DELETION: 4
- T.EXE-CODE: 7
- T.EXE-CODE-REMOTE: 3
- T.INSTALL: 4
- T.INTEG-APPLI-CODE: 6
- T.INTEG-APPLI-DATA: 7
- T.INTEG-JCS-CODE: 3
- T.INTEG-JCS-DATA: 2
- T.NATIVE: 3
- T.OBJ-DELETION: 3
- T.PHYSICAL: 3
- T.RESOURCES: 3
- T.SID: 7
|
- A:
- A.DIRECTORY_SYSTEM: 1
- A.DIRECTORY_SYSTEM_SECURITY_: 1
- A.DIRECTORY_SYSTEM_SECURITY_POLI: 1
- A.DIRECTORY_SYSTEM_SECURITY_POLICY_: 1
- A.INTEROP: 2
- A.NO_EVIL: 2
- A.NO_GENERAL_PURPOSE: 2
- A.PHYSICAL: 3
- A.REMOTE_ADMIN_DUA_: 1
- A.REMOTE_ADMIN_DUA_ENVIRONMENT: 2
- A.USERS: 2
- D:
- O:
- O.AUDIT: 6
- O.MANAGE: 9
- O.MEDIATE: 7
- O.PARTIAL_SELF_: 1
- O.PARTIAL_SELF_PROTECTION: 3
- O.PARTIAL_TRUSTEDCOMM: 6
- O.TOE_ACCESS: 4
- OE:
- OE.AUDIT_ACCESS: 7
- OE.DISTRIBUTED_AUTHENTICA: 1
- OE.DISTRIBUTED_AUTHENTICATION: 4
- OE.PARTIAL_SELF_: 1
- OE.PARTIAL_SELF_PROTECTION: 2
- OE.PARTIAL_TRUSTEDCOMM: 7
- OE.TIME: 6
- T:
- T.MASQUERADE: 4
- T.TSF_COMPROMISE: 6
- T.UNAUTHORIZED_ACCESS: 3
- T.UNIDENTIFIED_ACTIONS: 3
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
- TUV:
- TUV Informationstechnik: 1
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Physical tampering: 1
- malfunction: 2
- physical tampering: 1
- SCA:
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCIMB-99-031: 1
- CCIMB-99-032: 1
- CCIMB-99-033: 1
- FIPS:
- FIPS 197: 1
- FIPS PUB 46-3: 1
- PKCS:
- SCP:
|
|
pdf_data/st_keywords/javacard_version |
- JavaCard:
- Java Card 2.1.1: 3
- Java Card 2.1.2: 1
- Java Card 2.2: 128
- Java Card 2.2.1: 2
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
- java:
- javacard:
- javacard.framework: 4
- javacard.framework.appletclass: 1
- javacard.framework.service: 1
- javacard.security: 14
- javacardx:
- javacardx.crypto: 3
- javacardx.rmi: 1
- javacardx.security: 1
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this PP, though. ASE – Security Target Java Card 2.2 on Mokard Safe Issued: 10/11/2005: 1
- out of scope: 1
|
|
pdf_data/st_metadata |
- /Author: NDiiorio
- /CreationDate: D:20051110164319
- /Creator: Mokard Safe 2.2 ASE Security Target Lite.doc (Sola lettura) - Microsoft Word
- /Producer: Acrobat PDFWriter 4.05 per Windows NT
- /Title: Mokard Safe 2.2 ASE Security Target Lite.doc
- pdf_file_size_bytes: 2702319
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 133
|
- /Author: krogers
- /Company: CygnaCom Solutions, Inc.
- /CreationDate: D:20070717085137-04'00'
- /Creator: Acrobat PDFMaker 7.0 for Word
- /ModDate: D:20070717085341-04'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /SourceModified: D:20070711135902
- /Title: APPENDIX E (CERTIFICATE POLICY TAXONOMY)
- pdf_file_size_bytes: 620673
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 86
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |