name |
Java Card Mokard Safe 2.2 V2.4.0 |
Bivio 6110-NC and 6120-NC |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
Network and Network-Related Devices and Systems |
scheme |
DE |
US |
status |
archived |
archived |
not_valid_after |
01.09.2019 |
28.08.2019 |
not_valid_before |
11.11.2005 |
28.08.2017 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10847-ci.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0251a.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10847-vr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0251b.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10847-st.pdf |
manufacturer |
ST Incard S.R.L. |
Bivio Networks, Inc. |
manufacturer_web |
https://www.incard.it/ |
|
security_level |
AVA_VLA.3, EAL4+, ADV_IMP.2 |
{} |
dgst |
643e82f312663824 |
876a9d8fb591e52c |
heuristics/cert_id |
BSI-DSZ-CC-0251-2005 |
CCEVS-VR-VID-10847-2017 |
heuristics/cert_lab |
BSI |
US |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_ENV.1, ADV_RCR.1, ASE_INT.1, ADV_HLD.2, AGD_USR.1, ASE_REQ.1, ASE_PPC.1, ASE_DES.1, ADV_FSP.2, AVA_SOF.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, AVA_MSU.2, AGD_ADM.1, ALC_LCD.1, ATE_FUN.1, ADV_IMP.2, ATE_DPT.1, AVA_VLA.3, ALC_DVS.1, ASE_SRE.1, ASE_OBJ.1, ATE_IND.2, ADV_LLD.1, ADV_SPM.1 |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 |
heuristics/extracted_versions |
2.2, 2.4.0 |
6110, 6120 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
- category: Network Device
- certification_date: 28.08.2017
- evaluation_facility: UL Verification Services Inc. (Formerly InfoGard)
- expiration_date: 28.08.2019
- id: CCEVS-VR-VID10847
- product: Bivio 6110-NC and 6120-NC
- scheme: US
- url: https://www.niap-ccevs.org/product/10847
- vendor: Bivio Networks, Inc.
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
c7cf611c6bb1e4b0 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V1.0.pdf |
pdf_data/cert_filename |
|
st_vid10847-ci.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- US:
- CCEVS-VR-VID10847-2017: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
- UL:
- UL Verification Services: 1
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /CreationDate: D:20170829154422-04'00'
- /ModDate: D:20170829154422-04'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 177705
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
0251a.pdf |
st_vid10847-vr.pdf |
pdf_data/report_frontpage |
- DE:
- cert_id: BSI-DSZ-CC-0251-2005
- cert_item: Java Card Mokard Safe 2.2 V2.4.0
- cert_lab: BSI
- developer: ST-Incard S.r.l
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- US:
|
- DE:
- US:
- cert_id: CCEVS-VR-VID10847-2017
- cert_item: Bivio Networks, Inc. Bivio 6110-NC and Bivio 6120-NC
- cert_lab: US NIAP
|
pdf_data/report_keywords/cc_cert_id |
|
- US:
- CCEVS-VR-VID10847-2017: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 4: 1
- EAL 7: 1
- EAL1: 5
- EAL2: 3
- EAL3: 4
- EAL4: 12
- EAL4 augmented: 3
- EAL4+: 1
- EAL5: 6
- EAL6: 3
- EAL7: 4
|
|
pdf_data/report_keywords/cc_sar |
- ACM:
- ACM_AUT: 2
- ACM_AUT.1: 1
- ACM_CAP: 2
- ACM_CAP.4: 1
- ACM_SCP: 2
- ACM_SCP.2: 1
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 1
- ADO_IGS: 2
- ADO_IGS.1: 1
- ADV:
- ADV_FSP: 2
- ADV_FSP.2: 1
- ADV_HLD: 2
- ADV_HLD.2: 1
- ADV_IMP: 2
- ADV_IMP.2: 6
- ADV_INT: 2
- ADV_LLD: 2
- ADV_LLD.1: 1
- ADV_RCR: 2
- ADV_RCR.1: 1
- ADV_SPM: 2
- ADV_SPM.1: 1
- AGD:
- AGD_ADM: 2
- AGD_ADM.1: 4
- AGD_USR: 2
- AGD_USR.1: 4
- ALC:
- ALC_DVS: 2
- ALC_DVS.1: 1
- ALC_FLR: 2
- ALC_LCD: 1
- ALC_LCD.1: 1
- ALC_TAT: 2
- ALC_TAT.1: 1
- ASE:
- ASE_DES.1: 1
- ASE_ENV.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_PPC.1: 1
- ASE_REQ.1: 1
- ASE_SRE.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 2
- ATE_COV.2: 1
- ATE_DPT: 2
- ATE_DPT.1: 1
- ATE_FUN: 2
- ATE_FUN.1: 1
- ATE_IND: 2
- ATE_IND.2: 1
- AVA:
- AVA_CCA: 2
- AVA_MSU: 2
- AVA_MSU.2: 1
- AVA_SOF: 4
- AVA_SOF.1: 1
- AVA_VLA: 4
- AVA_VLA.2: 1
- AVA_VLA.3: 7
- AVA_VLA.4: 1
|
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FCO:
- FCS:
- FCS_CKM.1: 1
- FCS_CKM.2: 1
- FCS_CKM.3: 1
- FCS_CKM.4: 1
- FCS_COP.1: 1
- FDP:
- FDP_ACC.2: 3
- FDP_ACF.1: 3
- FDP_IFC.1: 2
- FDP_IFC.2: 1
- FDP_IFF.1: 3
- FDP_ITC.2: 1
- FDP_RIP.1: 4
- FDP_ROL.1: 1
- FDP_SDI.2: 1
- FDP_UIT.1: 1
- FIA:
- FIA_ATD.1: 1
- FIA_UID.1: 1
- FIA_UID.2: 1
- FIA_USB.1: 1
- FMT:
- FMT_MSA.1: 4
- FMT_MSA.2: 1
- FMT_MSA.3: 4
- FMT_MTD.1: 1
- FMT_MTD.3: 1
- FMT_REV.1: 1
- FMT_SMF.1: 4
- FMT_SMR.1: 5
- FPR:
- FPT:
- FPT_FLS.1: 4
- FPT_RCV.3: 1
- FPT_RVM.1: 1
- FPT_SEP.1: 1
- FPT_TDC.1: 1
- FPT_TST.1: 1
- FRU:
- FTP:
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.APPLET: 2
- A.NATIVE: 2
- A.VERIFICATION: 2
- OSP:
- T:
- T.CONFID-APPLI-DATA: 1
- T.CONFID-JCS-CODE: 1
- T.CONFID-JCS-DATA: 1
- T.DELETION: 1
- T.EXE-CODE: 2
- T.EXE-CODE-REMOTE: 1
- T.INSTALL: 1
- T.INTEG-APPLI-: 1
- T.INTEG-APPLI-CODE: 1
- T.INTEG-APPLI-DATA: 2
- T.INTEG-JCS-CODE: 1
- T.INTEG-JCS-DATA: 1
- T.NATIVE: 1
- T.OBJ-DELETION: 1
- T.PHYSICAL: 1
- T.RESOURCES: 1
- T.SID: 2
|
- A:
- A.ADMIN_CREDENTIALS_SECURE: 1
- A.LIMITED_FUNCTIONALITY: 1
- A.NO_THRU_TRAFFIC_PROTECTION: 1
- A.PHYSICAL_PROTECTION: 1
- A.REGULAR_UPDATES: 1
- A.TRUSTED_ADMINISTRATOR: 1
- T:
- T.PASSWORD_CRACKING: 1
- T.SECURITY_FUNCTIONALITY_: 2
- T.UNAUTHORIZED_ADMINIST: 1
- T.UNDETECTED_ACTIVITY: 1
- T.UNTRUSTED_COMMUNICAT: 1
- T.UPDATE_COMPROMISE: 1
- T.WEAK_AUTHENTICATION_E: 1
- T.WEAK_CRYPTOGRAPHY: 1
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
- TUV:
- TÜV Informationstechnik: 4
|
- UL:
- UL Verification Services: 3
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
- TLS:
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_RSA_WITH_AES_128_CBC_SHA: 1
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
- FI:
- fault injection: 1
- malfunction: 1
- physical tampering: 1
- SCA:
|
|
pdf_data/report_keywords/technical_report_id |
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- RFC:
- RFC 3268: 1
- RFC 5289: 1
- RFC 5424: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- Mokard Safe 2.2, ASE-Security Target, BSI-DSZ-0251-2005, Version B- 0, Draft-11, Date 14.10.2005, (confidential document) [7] Mokard Safe 2.2, The User and Administrator Guidance AGD_USR.1 – AGD_ADM.1, Version A-0: 1
- Report [8] Evaluation Technical Report, BSI-DSZ-CC-0251-2005, Version 2, Date: 09.11.2005, (confidential document) [9] Protection Profile PP/0305, JavaCard System Standard 2.2 Configuration Protection Profile [10: 1
|
- OutOfScope:
- Bivio 6110 device can be used to run a variety of applications for processing network data. It is out of scope for this certification to include these applications for evaluation. It is left to the customer to: 1
- and 6120-NC devices can be used to run a variety of applications for processing network data. It is out of scope for this certification process to include all those applications for evaluation, so a standard: 1
- out of scope: 2
|
pdf_data/report_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Company: BSI
- /CreationDate: D:20051219141321+01'00'
- /Creator: Acrobat PDFMaker 7.0.5 für Word
- /ModDate: D:20051219142354+01'00'
- /Producer: Acrobat Distiller 7.0.5 (Windows)
- /SourceModified: D:20051219131312
- /Subject: BSI-DSZ-CC-0251-2005
- /Title: Certification Report
- pdf_file_size_bytes: 714197
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 40
|
- /Author: Steve Wilson
- /Company: InfoGard Laboratories
- /CreationDate: D:20170829153647-04'00'
- /Creator: Acrobat PDFMaker 11 for Word
- /Keywords:
- /ModDate: D:20170829153650-04'00'
- /Producer: Adobe PDF Library 11.0
- /SourceModified: D:20170829193622
- /Subject:
- /Title: D
- pdf_file_size_bytes: 323443
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 17
|
pdf_data/st_filename |
0251b.pdf |
st_vid10847-st.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-PP-000: 1
- BSI-PP-0002: 1
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 4: 5
- EAL 4 augmented: 3
- EAL4: 9
- EAL4 augmented: 2
|
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_AUT.1: 4
- ACM_CAP.4: 3
- ACM_SCP.2: 4
- ADO:
- ADO_DEL.2: 4
- ADO_IGS.1: 4
- ADV:
- ADV_FSP.1: 1
- ADV_FSP.2: 5
- ADV_HLD.2: 6
- ADV_IMP.1: 2
- ADV_IMP.2: 11
- ADV_LLD.1: 7
- ADV_RCR.1: 4
- ADV_SPM.1: 15
- AGD:
- AGD_ADM.1: 8
- AGD_USR.1: 6
- ALC:
- ALC_DVS.1: 4
- ALC_LCD: 1
- ALC_LCD.1: 3
- ALC_TAT.1: 5
- ATE:
- ATE_COV.2: 3
- ATE_DPT.1: 2
- ATE_FUN.1: 3
- ATE_IND.2: 3
- AVA:
- AVA_MSU.2: 4
- AVA_SOF.1: 5
- AVA_VLA: 1
- AVA_VLA.2: 3
- AVA_VLA.3: 10
|
- ADV:
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.1: 3
- ALC_CMS.1: 3
- ASE:
- ASE_CCL.1: 7
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_ARP: 3
- FAU_ARP.1: 8
- FAU_SAA.1: 4
- FCO:
- FCS:
- FCS_CKM.1: 14
- FCS_CKM.2: 9
- FCS_CKM.3: 7
- FCS_CKM.4: 12
- FCS_CKM.4.1: 1
- FCS_COP.1: 8
- FDP:
- FDP_ACC: 21
- FDP_ACC.1: 17
- FDP_ACC.2: 12
- FDP_ACF: 12
- FDP_ACF.1: 33
- FDP_IFC: 20
- FDP_IFC.1: 25
- FDP_IFC.2: 7
- FDP_IFF: 11
- FDP_IFF.1: 30
- FDP_IFF.2: 8
- FDP_IFF.2.7: 1
- FDP_ITC.1: 4
- FDP_ITC.2: 12
- FDP_RIP: 2
- FDP_RIP.1: 28
- FDP_ROL: 1
- FDP_ROL.1: 14
- FDP_SDI.2: 9
- FDP_UIT: 1
- FDP_UIT.1: 4
- FIA:
- FIA_ATD: 2
- FIA_ATD.1: 6
- FIA_UID: 9
- FIA_UID.1: 19
- FIA_UID.2: 3
- FIA_USB.1: 6
- FIA_USB.1.1: 1
- FMT:
- FMT_MSA: 39
- FMT_MSA.1: 31
- FMT_MSA.2: 11
- FMT_MSA.3: 28
- FMT_MTD: 2
- FMT_MTD.1: 7
- FMT_MTD.3: 5
- FMT_MTD.3.1: 1
- FMT_REV: 1
- FMT_REV.1: 5
- FMT_SMF: 7
- FMT_SMF.1: 32
- FMT_SMR: 25
- FMT_SMR.1: 48
- FPR:
- FPT:
- FPT_AMT: 3
- FPT_AMT.1: 5
- FPT_FLS: 10
- FPT_FLS.1: 18
- FPT_PHP: 1
- FPT_PHP.3: 3
- FPT_RCV: 3
- FPT_RCV.3: 17
- FPT_RCV.4: 4
- FPT_RVM: 2
- FPT_RVM.1: 9
- FPT_RVM.1.1: 1
- FPT_SEP: 2
- FPT_SEP.1: 10
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_TDC.1: 5
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST.1: 7
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FRU:
- FRU_FLT: 2
- FRU_FLT.1: 3
- FRU_RSA: 2
- FRU_RSA.1: 6
- FTP:
- FTP_ITC: 3
- FTP_ITC.1: 8
- FTP_TRP.1: 2
|
- FAU:
- FAU_GEN.1: 4
- FAU_GEN.1.1: 3
- FAU_GEN.2: 4
- FAU_GEN.2.1: 1
- FAU_STG.1: 4
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG_EXT.1: 4
- FAU_STG_EXT.1.1: 1
- FAU_STG_EXT.1.2: 4
- FAU_STG_EXT.1.3: 12
- FAU_STG_EXT.2: 5
- FAU_STG_EXT.3: 4
- FAU_STG_EXT.3.1: 1
- FCS:
- FCS_CKM.1: 7
- FCS_CKM.1.1: 5
- FCS_CKM.2: 6
- FCS_CKM.2.1: 3
- FCS_CKM.4: 4
- FCS_CKM.4.1: 1
- FCS_COP: 2
- FCS_COP.1: 22
- FCS_COP.1.1: 12
- FCS_RBG_EXT: 1
- FCS_RBG_EXT.1: 4
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 3
- FCS_SSHC_EXT.1: 3
- FCS_SSHC_EXT.1.1: 2
- FCS_SSHC_EXT.1.2: 3
- FCS_SSHC_EXT.1.3: 2
- FCS_SSHC_EXT.1.4: 2
- FCS_SSHC_EXT.1.5: 5
- FCS_SSHC_EXT.1.6: 2
- FCS_SSHC_EXT.1.7: 2
- FCS_SSHC_EXT.1.8: 4
- FCS_SSHC_EXT.1.9: 3
- FCS_SSHS_EXT.1: 3
- FCS_SSHS_EXT.1.1: 1
- FCS_SSHS_EXT.1.2: 2
- FCS_SSHS_EXT.1.3: 2
- FCS_SSHS_EXT.1.4: 2
- FCS_SSHS_EXT.1.5: 3
- FCS_SSHS_EXT.1.6: 2
- FCS_SSHS_EXT.1.7: 2
- FCS_SSHS_EXT.1.8: 2
- FCS_TLSC_EXT.1: 1
- FCS_TLSC_EXT.2: 1
- FCS_TLSS_EXT.1: 4
- FCS_TLSS_EXT.1.1: 4
- FCS_TLSS_EXT.1.2: 2
- FCS_TLSS_EXT.1.3: 2
- FCS_TLSS_EXT.2.3: 1
- FIA:
- FIA_PMG_EXT.1: 3
- FIA_PMG_EXT.1.1: 2
- FIA_UAU.1: 1
- FIA_UAU.1.1: 1
- FIA_UAU.7: 3
- FIA_UAU.7.1: 2
- FIA_UAU_EXT.2: 3
- FIA_UAU_EXT.2.1: 2
- FIA_UIA_EXT.1: 8
- FIA_UIA_EXT.1.1: 1
- FIA_UIA_EXT.1.2: 1
- FMT:
- FMT_MOF: 5
- FMT_MOF.1: 26
- FMT_MOF.1.1: 13
- FMT_MTD: 4
- FMT_MTD.1: 7
- FMT_MTD.1.1: 1
- FMT_SMF.1: 8
- FMT_SMF.1.1: 1
- FMT_SMR.2: 3
- FMT_SMR.2.1: 2
- FMT_SMR.2.2: 2
- FMT_SMR.2.3: 3
- FPT:
- FPT_APW_EXT.1: 5
- FPT_APW_EXT.1.1: 1
- FPT_APW_EXT.1.2: 1
- FPT_SKP_EXT.1: 4
- FPT_SKP_EXT.1.1: 1
- FPT_STM.1: 4
- FPT_STM.1.1: 1
- FPT_TST_EXT: 1
- FPT_TST_EXT.1: 4
- FPT_TST_EXT.1.1: 3
- FPT_TST_EXT.2: 2
- FPT_TUD_EXT.1: 6
- FPT_TUD_EXT.1.1: 3
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 6
- FPT_TUD_EXT.2: 2
- FPT_TUD_EXT.2.2: 2
- FTA:
- FTA_SSL.3: 6
- FTA_SSL.3.1: 1
- FTA_SSL.4: 6
- FTA_SSL.4.1: 1
- FTA_SSL_EXT.1: 4
- FTA_SSL_EXT.1.1: 1
- FTA_TAB.1: 9
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC.1: 7
- FTP_ITC.1.1: 3
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 2
- FTP_TRP.1: 7
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.APPLET: 4
- A.NATIVE: 6
- A.VERIFICATION: 3
- D:
- D.API_DATA: 3
- D.APP_CODE: 8
- D.APP_C_DATA: 3
- D.APP_I_DATA: 4
- D.CRYPTO: 4
- D.JCS_CODE: 3
- D.JCS_DATA: 5
- D.PIN: 6
- D.SEC_DATA: 7
- O:
- O.ALARM: 5
- O.APPLET: 31
- O.CIPHER: 7
- O.CODE_PCKG: 8
- O.CODE_PKG: 6
- O.DELETION: 5
- O.FIREWALL: 11
- O.INSTALL: 8
- O.JAVAOBJECT: 38
- O.KEY-MNGT: 5
- O.LOAD: 6
- O.NATIVE: 7
- O.OBJ-DELETION: 5
- O.OPERATE: 9
- O.PACKAGE: 9
- O.PIN-: 1
- O.PIN-MNGT: 5
- O.REALLOCATION: 5
- O.REMOTE: 4
- O.REMOTE_MTHD: 6
- O.REMOTE_OBJ: 9
- O.REMOTE_OBJECT: 1
- O.RESOURCES: 6
- O.RMI_SERVICE: 12
- O.ROR: 5
- O.SHRD_VAR_CONFID: 5
- O.SHRD_VAR_INTEG: 6
- O.SID: 8
- O.TODO: 1
- O.TRANSACTION: 5
- OE:
- OE.APPLET: 6
- OE.CARD-MANAGEMENT: 3
- OE.NATIVE: 4
- OE.SCP: 18
- OE.VERIFICATION: 11
- OP:
- OP.ARRAY_ACCESS: 3
- OP.AUTHENTICATION: 2
- OP.BYTECODE: 1
- OP.CARD_CONTENT_MGT: 2
- OP.CREATE: 6
- OP.DELETE_APPLET: 4
- OP.DELETE_PCKG: 3
- OP.DELETE_PCKG_APPLET: 3
- OP.GET_ROR: 2
- OP.INSTALL: 1
- OP.INSTANCE_FIELD: 1
- OP.INVK_INTERFACE: 4
- OP.INVK_VIRTUAL: 3
- OP.INVOKE: 2
- OP.JAVA: 4
- OP.LOAD: 1
- OP.PUT: 4
- OP.RECEIVE: 2
- OP.RET_RORD: 2
- OP.SEND: 2
- OP.THROW: 3
- OP.TYPE_ACCESS: 3
- OSP:
- R:
- R.CM: 1
- R.GP: 2
- R.JAVA: 19
- T:
- T.CONFID-APPLI-DATA: 3
- T.CONFID-JCS-CODE: 3
- T.CONFID-JCS-DATA: 3
- T.DELETION: 4
- T.EXE-CODE: 7
- T.EXE-CODE-REMOTE: 3
- T.INSTALL: 4
- T.INTEG-APPLI-CODE: 6
- T.INTEG-APPLI-DATA: 7
- T.INTEG-JCS-CODE: 3
- T.INTEG-JCS-DATA: 2
- T.NATIVE: 3
- T.OBJ-DELETION: 3
- T.PHYSICAL: 3
- T.RESOURCES: 3
- T.SID: 7
|
- A:
- A.ADMIN_CREDENTIALS_SECURE: 1
- A.LIMITED_FUNCTIONALITY: 1
- A.NO_THRU_TRAFFIC_PROTECTION: 1
- A.PHYSICAL_PROTECTION: 1
- A.REGULAR_UPDATES: 1
- A.TRUSTED_ADMINISTRATOR: 1
- OE:
- OE.ADMIN_CREDENTIALS_SECURE: 1
- OE.NO_GENERAL_PURPOSE: 1
- OE.NO_THRU_TRAFFIC_PROTECTION: 1
- OE.PHYSICAL: 1
- OE.TRUSTED_ADMIN: 1
- OE.UPDATES: 1
- T:
- T.PASSWORD_CRACKING: 1
- T.SECURITY_FUNCTIONALITY: 2
- T.UNAUTHORIZED_ADMINIST: 1
- T.UNDETECTED_ACTIVITY: 1
- T.UNTRUSTED_COMMUNICA: 1
- T.UPDATE_COMPROMISE: 1
- T.WEAK_AUTHENTICATION_E: 1
- T.WEAK_CRYPTOGRAPHY: 1
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
- TUV:
- TUV Informationstechnik: 1
|
- UL:
- UL Verification Services: 1
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- AES:
- AES: 14
- AES-128: 2
- AES-256: 2
- AES256: 1
- CAST:
- RC:
- DES:
- constructions:
- MAC:
- HMAC: 12
- HMAC-SHA-256: 2
- HMAC-SHA-384: 2
- HMAC-SHA-512: 2
- miscellaneous:
|
pdf_data/st_keywords/asymmetric_crypto |
|
- ECC:
- FF:
- DH:
- DH: 3
- DHE: 2
- Diffie-Hellman: 7
- DSA:
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- MD:
- RIPEMD:
- SHA:
- SHA1:
- SHA2:
- SHA-2: 1
- SHA-224: 1
- SHA-256: 8
- SHA-384: 6
- SHA-512: 5
- SHA512: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
- IPsec:
- SSH:
- TLS:
- SSL:
- SSL: 3
- SSL 2.0: 1
- SSL 3.0: 1
- SSLv3.0: 1
- TLS:
- TLS: 62
- TLS 1.0: 1
- TLS 1.1: 1
- TLS 1.2: 1
- TLS v1.0: 1
- TLSv1.2: 9
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- NIST:
- NIST P-256: 1
- P-256: 13
- P-384: 4
- P-521: 8
- secp256r1: 3
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
- TLS_NULL_WITH_NULL_NULL: 1
- TLS_RSA_WITH_AES_128_CBC_SHA: 5
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Physical tampering: 1
- malfunction: 2
- physical tampering: 1
- SCA:
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCIMB-99-031: 1
- CCIMB-99-032: 1
- CCIMB-99-033: 1
- FIPS:
- FIPS 197: 1
- FIPS PUB 46-3: 1
- PKCS:
- SCP:
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- FIPS:
- FIPS 140-2: 2
- FIPS 186-4: 4
- FIPS PUB 186-4: 5
- ISO:
- ISO/IEC 10118: 2
- ISO/IEC 14888-3: 1
- ISO/IEC 18031:2011: 3
- ISO/IEC 9796-2: 1
- ISO/IEC 9797-: 1
- NIST:
- NIST SP 800-131A: 2
- NIST SP 800-56B: 1
- NIST SP 800-90A: 1
- NIST SP 800-90B: 1
- SP 800-131A: 1
- SP 800-56A: 1
- SP 800-56B: 1
- PKCS:
- RFC:
- RFC 2986: 2
- RFC 3268: 3
- RFC 4251: 2
- RFC 4253: 8
- RFC 5246: 4
- RFC 5280: 5
- RFC 5289: 3
- RFC 5647: 8
- RFC 6668: 2
- RFC2104: 1
- RFC4251: 1
- RFC4868: 1
- X509:
|
pdf_data/st_keywords/javacard_version |
- JavaCard:
- Java Card 2.1.1: 3
- Java Card 2.1.2: 1
- Java Card 2.2: 128
- Java Card 2.2.1: 2
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
- java:
- javacard:
- javacard.framework: 4
- javacard.framework.appletclass: 1
- javacard.framework.service: 1
- javacard.security: 14
- javacardx:
- javacardx.crypto: 3
- javacardx.rmi: 1
- javacardx.security: 1
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this PP, though. ASE – Security Target Java Card 2.2 on Mokard Safe Issued: 10/11/2005: 1
- out of scope: 1
|
- OutOfScope:
- indicated as “REQUIRED” but not listed in the later elements of this component are implemented is out of scope of the assurance activity for this requirement. Assurance Activity TSS The evaluator shall check to: 1
- indicated as “REQUIRED” but not listed in the later elements of this component are implemented is out of scope of the assurance activity for this requirement. FCS_SSHS_EXT.1.2 The TSF shall ensure that the SSH: 1
- out of scope: 3
- processing network data. There are many such applications, both commercial and open source. It is out of scope for this certification process to include all these applications for evaluation, so a standard: 1
|
pdf_data/st_metadata |
- /Author: NDiiorio
- /CreationDate: D:20051110164319
- /Creator: Mokard Safe 2.2 ASE Security Target Lite.doc (Sola lettura) - Microsoft Word
- /Producer: Acrobat PDFWriter 4.05 per Windows NT
- /Title: Mokard Safe 2.2 ASE Security Target Lite.doc
- pdf_file_size_bytes: 2702319
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 133
|
|
state/cert/convert_garbage |
False |
True |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |