Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Java Card Mokard Safe 2.2 V2.4.0
BSI-DSZ-CC-0251-2005
Green Hills Software INTEGRITY-178B Separation Kernel, comprising: INTEGRITY-178B Real Time Operating System (RTOS), version IN-ICR750-0101-GH01_Rel running on Compact PCI card, version CPN 944-2021-021 with PowerPC, version 750CXe
CCEVS-VR-10119-2008
name Java Card Mokard Safe 2.2 V2.4.0 Green Hills Software INTEGRITY-178B Separation Kernel, comprising: INTEGRITY-178B Real Time Operating System (RTOS), version IN-ICR750-0101-GH01_Rel running on Compact PCI card, version CPN 944-2021-021 with PowerPC, version 750CXe
category ICs, Smart Cards and Smart Card-Related Devices and Systems Operating Systems
scheme DE US
not_valid_after 01.09.2019 20.07.2012
not_valid_before 11.11.2005 01.09.2008
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0251a.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10119-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0251b.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10119-st.pdf
manufacturer ST Incard S.R.L. Green Hills Software, Inc.
manufacturer_web https://www.incard.it/ https://www.ghs.com/
security_level AVA_VLA.3, EAL4+, ADV_IMP.2 EAL6+
dgst 643e82f312663824 b5cd888a6f1f1a60
heuristics/cert_id BSI-DSZ-CC-0251-2005 CCEVS-VR-10119-2008
heuristics/cert_lab BSI US
heuristics/extracted_sars ASE_ENV.1, ADV_RCR.1, ASE_INT.1, ADV_HLD.2, AGD_USR.1, ASE_REQ.1, ASE_PPC.1, ASE_DES.1, ADV_FSP.2, AVA_SOF.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, AVA_MSU.2, AGD_ADM.1, ALC_LCD.1, ATE_FUN.1, ADV_IMP.2, ATE_DPT.1, AVA_VLA.3, ALC_DVS.1, ASE_SRE.1, ASE_OBJ.1, ATE_IND.2, ADV_LLD.1, ADV_SPM.1 ALC_LCD.2, ADV_INI_EXP.1, AGD_USR.1, ADV_IMP_EXP.3, ALC_DVS.2, ADV_RCR.3, ADV_ARC_EXP.1, AVA_SOF.1, AVA_CCA_EXP.2, ATE_FUN.2, ALC_TAT.3, ALC_FLR.3, ADV_CTD_EXP.1, ADV_LTD_EXP.1, ATE_IND.3, AGD_ADM_EXP.1, ADV_INT_EXP.3, ATE_DPT.3, AVA_VLA_EXP.4, ADV_LLD_EXP.2, ADV_SPM.3, ADV_HLD_EXP.4, ATE_COV.3, AVA_MSU.3, ADV_FSP_EXP.4
heuristics/extracted_versions 2.2, 2.4.0 021, 2021, 944, 0101
heuristics/scheme_data
  • category: Operating System
  • certification_date: 01.09.2008
  • evaluation_facility: Leidos Common Criteria Testing Laboratory
  • expiration_date:
  • id: CCEVS-VR-VID10119
  • product: Green Hills Software INTEGRITY-178B Separation Kernel, comprising: INTEGRITY-178B Real Time Operating System (RTOS), version IN-ICR750-0101-GH01_Rel running on Compact PCI card, version CPN 944-2021-021 with PowerPC, version 750CXe
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10119
  • vendor: Green Hills Software, Inc.
maintenance_updates
  • maintenance_date: 31.07.2009
  • maintenance_report_link: https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10119-add1.pdf
  • maintenance_st_link: None
  • maintenance_title: Green Hills Software INTEGRITY-178B Separation Kernel, comprising: INTEGRITY-178B Real Time Operating System (RTOS), version IN-ISP448-0100-SK_LMFWPCD2_Rel running on JSF PCD System Processor CCA, version 437140-007 with PowerPC, version 7448
pdf_data/report_filename 0251a.pdf st_vid10119-vr.pdf
pdf_data/report_frontpage
  • DE:
    • cert_id: BSI-DSZ-CC-0251-2005
    • cert_item: Java Card Mokard Safe 2.2 V2.4.0
    • cert_lab: BSI
    • developer: ST-Incard S.r.l
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
  • US:
  • DE:
  • US:
    • cert_id: CCEVS-VR-10119-2008
    • cert_item: Green Hills Software INTEGRITY-178B Separation Kernel
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0251-2005: 21
  • US:
    • CCEVS-VR-10119-2008: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 4: 1
    • EAL 7: 1
    • EAL1: 5
    • EAL2: 3
    • EAL3: 4
    • EAL4: 12
    • EAL4 augmented: 3
    • EAL4+: 1
    • EAL5: 6
    • EAL6: 3
    • EAL7: 4
  • EAL:
    • EAL 1: 1
    • EAL 4: 2
pdf_data/report_keywords/cc_sar
  • ACM:
    • ACM_AUT: 2
    • ACM_AUT.1: 1
    • ACM_CAP: 2
    • ACM_CAP.4: 1
    • ACM_SCP: 2
    • ACM_SCP.2: 1
  • ADO:
    • ADO_DEL: 2
    • ADO_DEL.2: 1
    • ADO_IGS: 2
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP: 2
    • ADV_FSP.2: 1
    • ADV_HLD: 2
    • ADV_HLD.2: 1
    • ADV_IMP: 2
    • ADV_IMP.2: 6
    • ADV_INT: 2
    • ADV_LLD: 2
    • ADV_LLD.1: 1
    • ADV_RCR: 2
    • ADV_RCR.1: 1
    • ADV_SPM: 2
    • ADV_SPM.1: 1
  • AGD:
    • AGD_ADM: 2
    • AGD_ADM.1: 4
    • AGD_USR: 2
    • AGD_USR.1: 4
  • ALC:
    • ALC_DVS: 2
    • ALC_DVS.1: 1
    • ALC_FLR: 2
    • ALC_LCD: 1
    • ALC_LCD.1: 1
    • ALC_TAT: 2
    • ALC_TAT.1: 1
  • ASE:
    • ASE_DES.1: 1
    • ASE_ENV.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_PPC.1: 1
    • ASE_REQ.1: 1
    • ASE_SRE.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV: 2
    • ATE_COV.2: 1
    • ATE_DPT: 2
    • ATE_DPT.1: 1
    • ATE_FUN: 2
    • ATE_FUN.1: 1
    • ATE_IND: 2
    • ATE_IND.2: 1
  • AVA:
    • AVA_CCA: 2
    • AVA_MSU: 2
    • AVA_MSU.2: 1
    • AVA_SOF: 4
    • AVA_SOF.1: 1
    • AVA_VLA: 4
    • AVA_VLA.2: 1
    • AVA_VLA.3: 7
    • AVA_VLA.4: 1
  • ACM:
    • ACM_AUT.2: 1
    • ACM_CAP.5: 1
    • ACM_SCP.3: 1
  • ADO:
    • ADO_DEL_EXP.2: 1
    • ADO_IGS.1: 2
  • ADV:
    • ADV_ARC_EXP.1: 1
    • ADV_CTD_EXP.1: 1
    • ADV_FSP_EXP.4: 1
    • ADV_HLD_EXP.4: 1
    • ADV_IMP_EXP.3: 1
    • ADV_INI_EXP.1: 1
    • ADV_INT_EXP.3: 1
    • ADV_LLD_EXP.2: 1
    • ADV_LTD_EXP.1: 1
    • ADV_RCR.3: 1
    • ADV_SPM.3: 1
  • AGD:
    • AGD_ADM_EXP.1: 1
    • AGD_USR.1: 1
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.2: 1
    • ALC_TAT.3: 1
  • AMA:
    • AMA_AMP_EXP.1: 1
  • ATE:
    • ATE_COV.3: 1
    • ATE_DPT.3: 1
    • ATE_FUN.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_CCA_EXP.2: 1
    • AVA_MSU.3: 1
    • AVA_SOF.1: 1
    • AVA_VLA_EXP.4: 2
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_ARP.1: 1
  • FCO:
    • FCO_NRO.2: 1
  • FCS:
    • FCS_CKM.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.3: 1
    • FCS_CKM.4: 1
    • FCS_COP.1: 1
  • FDP:
    • FDP_ACC.2: 3
    • FDP_ACF.1: 3
    • FDP_IFC.1: 2
    • FDP_IFC.2: 1
    • FDP_IFF.1: 3
    • FDP_ITC.2: 1
    • FDP_RIP.1: 4
    • FDP_ROL.1: 1
    • FDP_SDI.2: 1
    • FDP_UIT.1: 1
  • FIA:
    • FIA_ATD.1: 1
    • FIA_UID.1: 1
    • FIA_UID.2: 1
    • FIA_USB.1: 1
  • FMT:
    • FMT_MSA.1: 4
    • FMT_MSA.2: 1
    • FMT_MSA.3: 4
    • FMT_MTD.1: 1
    • FMT_MTD.3: 1
    • FMT_REV.1: 1
    • FMT_SMF.1: 4
    • FMT_SMR.1: 5
  • FPR:
    • FPR_UNO.1: 1
  • FPT:
    • FPT_FLS.1: 4
    • FPT_RCV.3: 1
    • FPT_RVM.1: 1
    • FPT_SEP.1: 1
    • FPT_TDC.1: 1
    • FPT_TST.1: 1
  • FRU:
    • FRU_RSA.1: 1
  • FTP:
    • FTP_ITC.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.APPLET: 2
    • A.NATIVE: 2
    • A.VERIFICATION: 2
  • OSP:
    • OSP.VERIFICATION: 2
  • T:
    • T.CONFID-APPLI-DATA: 1
    • T.CONFID-JCS-CODE: 1
    • T.CONFID-JCS-DATA: 1
    • T.DELETION: 1
    • T.EXE-CODE: 2
    • T.EXE-CODE-REMOTE: 1
    • T.INSTALL: 1
    • T.INTEG-APPLI-: 1
    • T.INTEG-APPLI-CODE: 1
    • T.INTEG-APPLI-DATA: 2
    • T.INTEG-JCS-CODE: 1
    • T.INTEG-JCS-DATA: 1
    • T.NATIVE: 1
    • T.OBJ-DELETION: 1
    • T.PHYSICAL: 1
    • T.RESOURCES: 1
    • T.SID: 2
  • A:
    • A.COVERT_CHANNELS: 1
    • A.PHYSICAL: 1
    • A.SUBJECT_ALLOCATION: 1
    • A.TRUSTED_FLOWS: 1
    • A.TRUSTED_INDIVIDUAL: 1
  • T:
    • T.ADMIN_ERROR: 1
    • T.ALTERED_DELIVERY: 1
    • T.CONFIGURATION_CHANGE: 1
    • T.CONFIGURATION_INTEGRITY: 1
    • T.COVERT_CHANNEL_EXPLOIT: 1
    • T.DENIAL_OF_SERVICE: 1
    • T.INCORRECT_CONFIG: 1
    • T.INCORRECT_LOAD: 1
    • T.INSECURE_STATE: 1
    • T.LEAST_PRIVILEGE: 1
    • T.POOR_DESIGN: 1
    • T.POOR_IMPLEMENTATION: 1
    • T.POOR_TEST: 1
    • T.TSF_COMPROMISE: 1
    • T.UNAUTHORIZED_ACCESS: 1
pdf_data/report_keywords/vendor
  • Samsung:
    • Samsung: 2
pdf_data/report_keywords/eval_facility
  • TUV:
    • TÜV Informationstechnik: 4
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • fault injection: 1
    • malfunction: 1
    • physical tampering: 1
  • SCA:
    • side channel: 1
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI 7149: 1
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 32: 1
    • AIS 34: 2
  • ISO:
    • ISO/IEC 15408:1999: 1
  • ISO:
    • ISO/IEC 15408-2: 4
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Mokard Safe 2.2, ASE-Security Target, BSI-DSZ-0251-2005, Version B- 0, Draft-11, Date 14.10.2005, (confidential document) [7] Mokard Safe 2.2, The User and Administrator Guidance AGD_USR.1 – AGD_ADM.1, Version A-0: 1
    • Report [8] Evaluation Technical Report, BSI-DSZ-CC-0251-2005, Version 2, Date: 09.11.2005, (confidential document) [9] Protection Profile PP/0305, JavaCard System Standard 2.2 Configuration Protection Profile [10: 1
pdf_data/report_metadata
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /Company: BSI
  • /CreationDate: D:20051219141321+01'00'
  • /Creator: Acrobat PDFMaker 7.0.5 für Word
  • /ModDate: D:20051219142354+01'00'
  • /Producer: Acrobat Distiller 7.0.5 (Windows)
  • /SourceModified: D:20051219131312
  • /Subject: BSI-DSZ-CC-0251-2005
  • /Title: Certification Report
  • pdf_file_size_bytes: 714197
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 40
  • /Author:
  • /CreationDate: D:20080916094423-04'00'
  • /Creator: Acrobat PDFMaker 7.0 for Word
  • /ModDate: D:20080916094434-04'00'
  • /Producer: Acrobat Distiller 7.0 (Windows)
  • /SourceModified: D:20080916134407
  • /Title: National Information Assurance Partnership
  • pdf_file_size_bytes: 130448
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 19
pdf_data/st_filename 0251b.pdf st_vid10119-st.pdf
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-000: 1
    • BSI-PP-0002: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 4: 5
    • EAL 4 augmented: 3
    • EAL4: 9
    • EAL4 augmented: 2
  • EAL:
    • EAL6+: 2
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_AUT.1: 4
    • ACM_CAP.4: 3
    • ACM_SCP.2: 4
  • ADO:
    • ADO_DEL.2: 4
    • ADO_IGS.1: 4
  • ADV:
    • ADV_FSP.1: 1
    • ADV_FSP.2: 5
    • ADV_HLD.2: 6
    • ADV_IMP.1: 2
    • ADV_IMP.2: 11
    • ADV_LLD.1: 7
    • ADV_RCR.1: 4
    • ADV_SPM.1: 15
  • AGD:
    • AGD_ADM.1: 8
    • AGD_USR.1: 6
  • ALC:
    • ALC_DVS.1: 4
    • ALC_LCD: 1
    • ALC_LCD.1: 3
    • ALC_TAT.1: 5
  • ATE:
    • ATE_COV.2: 3
    • ATE_DPT.1: 2
    • ATE_FUN.1: 3
    • ATE_IND.2: 3
  • AVA:
    • AVA_MSU.2: 4
    • AVA_SOF.1: 5
    • AVA_VLA: 1
    • AVA_VLA.2: 3
    • AVA_VLA.3: 10
  • ACM:
    • ACM_AUT: 1
    • ACM_AUT.2: 12
    • ACM_CAP: 1
    • ACM_CAP.5: 28
    • ACM_CAP.5.4: 1
    • ACM_SCP: 1
    • ACM_SCP.3: 6
  • ADO:
    • ADO_DEL_EXP: 1
    • ADO_DEL_EXP.2: 18
    • ADO_IGS: 1
    • ADO_IGS.1: 7
  • ADV:
    • ADV_ARC_EXP: 1
    • ADV_ARC_EXP.1: 10
    • ADV_CTD_EXP: 1
    • ADV_CTD_EXP.1: 13
    • ADV_FSP_EXP: 1
    • ADV_FSP_EXP.4: 14
    • ADV_HLD: 2
    • ADV_HLD_EXP: 1
    • ADV_HLD_EXP.4: 12
    • ADV_IMP_EXP: 1
    • ADV_IMP_EXP.3: 8
    • ADV_INI_EXP: 1
    • ADV_INI_EXP.1: 40
    • ADV_INT_EXP: 1
    • ADV_INT_EXP.3: 37
    • ADV_LLD: 2
    • ADV_LLD_EXP: 1
    • ADV_LLD_EXP.2: 12
    • ADV_LTD_EXP: 1
    • ADV_LTD_EXP.1: 11
    • ADV_RCR: 1
    • ADV_RCR.3: 10
    • ADV_SPM: 1
    • ADV_SPM.3: 12
  • AGD:
    • AGD_ADM_EXP: 1
    • AGD_ADM_EXP.1: 19
    • AGD_USR: 1
    • AGD_USR.1: 11
  • ALC:
    • ALC_DVS: 1
    • ALC_DVS.2: 9
    • ALC_FLR: 1
    • ALC_FLR.3: 18
    • ALC_LCD: 1
    • ALC_LCD.2: 12
    • ALC_TAT: 1
    • ALC_TAT.3: 11
  • AMA:
    • AMA_AMP_EXP: 1
    • AMA_AMP_EXP.1: 15
  • ATE:
    • ATE_COV: 1
    • ATE_COV.3: 8
    • ATE_DPT: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 5
    • ATE_FUN: 1
    • ATE_FUN.2: 12
    • ATE_IND: 1
    • ATE_IND.3: 9
  • AVA:
    • AVA_CCA_EXP: 1
    • AVA_CCA_EXP.2: 13
    • AVA_MSU: 1
    • AVA_MSU.3: 15
    • AVA_SOF: 1
    • AVA_SOF.1: 9
    • AVA_VLA_EXP: 1
    • AVA_VLA_EXP.4: 15
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_ARP: 3
    • FAU_ARP.1: 8
    • FAU_SAA.1: 4
  • FCO:
    • FCO_NRO: 1
    • FCO_NRO.2: 6
  • FCS:
    • FCS_CKM.1: 14
    • FCS_CKM.2: 9
    • FCS_CKM.3: 7
    • FCS_CKM.4: 12
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 8
  • FDP:
    • FDP_ACC: 21
    • FDP_ACC.1: 17
    • FDP_ACC.2: 12
    • FDP_ACF: 12
    • FDP_ACF.1: 33
    • FDP_IFC: 20
    • FDP_IFC.1: 25
    • FDP_IFC.2: 7
    • FDP_IFF: 11
    • FDP_IFF.1: 30
    • FDP_IFF.2: 8
    • FDP_IFF.2.7: 1
    • FDP_ITC.1: 4
    • FDP_ITC.2: 12
    • FDP_RIP: 2
    • FDP_RIP.1: 28
    • FDP_ROL: 1
    • FDP_ROL.1: 14
    • FDP_SDI.2: 9
    • FDP_UIT: 1
    • FDP_UIT.1: 4
  • FIA:
    • FIA_ATD: 2
    • FIA_ATD.1: 6
    • FIA_UID: 9
    • FIA_UID.1: 19
    • FIA_UID.2: 3
    • FIA_USB.1: 6
    • FIA_USB.1.1: 1
  • FMT:
    • FMT_MSA: 39
    • FMT_MSA.1: 31
    • FMT_MSA.2: 11
    • FMT_MSA.3: 28
    • FMT_MTD: 2
    • FMT_MTD.1: 7
    • FMT_MTD.3: 5
    • FMT_MTD.3.1: 1
    • FMT_REV: 1
    • FMT_REV.1: 5
    • FMT_SMF: 7
    • FMT_SMF.1: 32
    • FMT_SMR: 25
    • FMT_SMR.1: 48
  • FPR:
    • FPR_UNO.1: 7
  • FPT:
    • FPT_AMT: 3
    • FPT_AMT.1: 5
    • FPT_FLS: 10
    • FPT_FLS.1: 18
    • FPT_PHP: 1
    • FPT_PHP.3: 3
    • FPT_RCV: 3
    • FPT_RCV.3: 17
    • FPT_RCV.4: 4
    • FPT_RVM: 2
    • FPT_RVM.1: 9
    • FPT_RVM.1.1: 1
    • FPT_SEP: 2
    • FPT_SEP.1: 10
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
    • FPT_TDC.1: 5
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TST.1: 7
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FRU:
    • FRU_FLT: 2
    • FRU_FLT.1: 3
    • FRU_RSA: 2
    • FRU_RSA.1: 6
  • FTP:
    • FTP_ITC: 3
    • FTP_ITC.1: 8
    • FTP_TRP.1: 2
  • FAU:
    • FAU_ARP: 2
    • FAU_ARP.1: 5
    • FAU_ARP.1.1: 1
    • FAU_GEN: 3
    • FAU_GEN.1: 8
    • FAU_SAR_EXP: 2
    • FAU_SAR_EXP.1: 4
    • FAU_SAR_EXP.1.1: 1
    • FAU_SAR_EXP.1.2: 1
    • FAU_SEL.1: 1
    • FAU_SEL_EXP: 2
    • FAU_SEL_EXP.1: 3
    • FAU_SEL_EXP.1.1: 1
  • FDP:
    • FDP_ATD_EXP.1: 1
    • FDP_IFC: 2
    • FDP_IFC.2: 4
    • FDP_IFC.2.1: 1
    • FDP_IFC.2.2: 1
    • FDP_IFF: 4
    • FDP_IFF.1: 13
    • FDP_IFF.3: 5
    • FDP_IFF.3.1: 1
    • FDP_RIP: 2
    • FDP_RIP.2: 4
    • FDP_RIP.2.1: 1
  • FIA:
    • FIA_ATD_EXP.1: 8
    • FIA_ATD_EXP.1.1: 3
    • FIA_USB_EXP.1: 10
    • FIA_USB_EXP.1.1: 3
    • FIA_USB_EXP.1.2: 3
    • FIA_USB_EXP.1.3: 3
  • FMT:
    • FMT_MCD_EXP: 2
    • FMT_MCD_EXP.1: 4
    • FMT_MCD_EXP.1.1: 1
    • FMT_MOF.1: 24
    • FMT_MOF.1.1: 7
    • FMT_MSA.3: 1
    • FMT_MSA_EXP: 4
    • FMT_MSA_EXP.1: 4
    • FMT_MSA_EXP.1.1: 1
    • FMT_MSA_EXP.1.2: 1
    • FMT_MSA_EXP.3: 4
    • FMT_MSA_EXP.3.1: 1
    • FMT_MTD: 2
    • FMT_MTD.1: 8
    • FMT_MTD.1.1: 2
    • FMT_MTD.3: 5
    • FMT_MTD.3.1: 1
    • FMT_SMF: 2
    • FMT_SMF.1: 7
    • FMT_SMF.1.1: 1
  • FPT:
    • FPT_AMT: 2
    • FPT_AMT.1: 8
    • FPT_AMT.1.1: 3
    • FPT_CFG_EXP: 3
    • FPT_CFG_EXP.1: 5
    • FPT_CFG_EXP.1.1: 2
    • FPT_CFG_EXP.1.2: 2
    • FPT_CFG_EXP.1.3: 2
    • FPT_CFG_EXP.1.4: 1
    • FPT_ESS_EXP: 2
    • FPT_ESS_EXP.1: 5
    • FPT_ESS_EXP.1.1: 1
    • FPT_ESS_EXP.1.2: 1
    • FPT_ESS_EXP.1.3: 1
    • FPT_FLS: 2
    • FPT_FLS.1: 7
    • FPT_FLS.1.1: 1
    • FPT_HLT_EXP: 2
    • FPT_HLT_EXP.1: 4
    • FPT_HLT_EXP.1.1: 1
    • FPT_HLT_EXP.1.2: 1
    • FPT_MTN_EXP: 4
    • FPT_MTN_EXP.1: 5
    • FPT_MTN_EXP.1.1: 1
    • FPT_MTN_EXP.1.2: 1
    • FPT_MTN_EXP.1.3: 1
    • FPT_MTN_EXP.2: 4
    • FPT_MTN_EXP.2.1: 1
    • FPT_PLP_EXP: 3
    • FPT_PLP_EXP.1: 4
    • FPT_PLP_EXP.1.1: 1
    • FPT_RCV: 2
    • FPT_RCV.4: 5
    • FPT_RCV.4.1: 1
    • FPT_RCV_EXP: 2
    • FPT_RCV_EXP.2: 5
    • FPT_RCV_EXP.2.1: 1
    • FPT_RCV_EXP.2.2: 1
    • FPT_RCV_EXP.2.3: 1
    • FPT_RCV_EXP.2.4: 1
    • FPT_RCV_EXP.2.5: 1
    • FPT_RST_EXP: 2
    • FPT_RST_EXP.1: 4
    • FPT_RST_EXP.1.1: 1
    • FPT_RST_EXP.1.2: 1
    • FPT_RVM: 2
    • FPT_RVM.1: 4
    • FPT_RVM.1.1: 1
    • FPT_SEP: 2
    • FPT_SEP.3: 4
    • FPT_SEP.3.1: 1
    • FPT_SEP.3.2: 1
    • FPT_SEP.3.3: 1
    • FPT_STM: 2
    • FPT_STM.1: 5
    • FPT_STM.1.1: 1
    • FPT_TST: 1
    • FPT_TST.1: 2
    • FPT_TST_EXP: 2
    • FPT_TST_EXP.1: 5
    • FPT_TST_EXP.1.1: 1
    • FPT_TST_EXP.1.2: 1
    • FPT_TST_EXP.1.3: 1
    • FPT_TST_EXP.1.4: 1
  • FRU:
    • FRU_PRU_EXP: 2
    • FRU_PRU_EXP.1: 3
    • FRU_PRU_EXP.1.1: 1
    • FRU_RSA: 2
    • FRU_RSA.2: 4
    • FRU_RSA.2.1: 1
    • FRU_RSA.2.2: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.APPLET: 4
    • A.NATIVE: 6
    • A.VERIFICATION: 3
  • D:
    • D.API_DATA: 3
    • D.APP_CODE: 8
    • D.APP_C_DATA: 3
    • D.APP_I_DATA: 4
    • D.CRYPTO: 4
    • D.JCS_CODE: 3
    • D.JCS_DATA: 5
    • D.PIN: 6
    • D.SEC_DATA: 7
  • O:
    • O.ALARM: 5
    • O.APPLET: 31
    • O.CIPHER: 7
    • O.CODE_PCKG: 8
    • O.CODE_PKG: 6
    • O.DELETION: 5
    • O.FIREWALL: 11
    • O.INSTALL: 8
    • O.JAVAOBJECT: 38
    • O.KEY-MNGT: 5
    • O.LOAD: 6
    • O.NATIVE: 7
    • O.OBJ-DELETION: 5
    • O.OPERATE: 9
    • O.PACKAGE: 9
    • O.PIN-: 1
    • O.PIN-MNGT: 5
    • O.REALLOCATION: 5
    • O.REMOTE: 4
    • O.REMOTE_MTHD: 6
    • O.REMOTE_OBJ: 9
    • O.REMOTE_OBJECT: 1
    • O.RESOURCES: 6
    • O.RMI_SERVICE: 12
    • O.ROR: 5
    • O.SHRD_VAR_CONFID: 5
    • O.SHRD_VAR_INTEG: 6
    • O.SID: 8
    • O.TODO: 1
    • O.TRANSACTION: 5
  • OE:
    • OE.APPLET: 6
    • OE.CARD-MANAGEMENT: 3
    • OE.NATIVE: 4
    • OE.SCP: 18
    • OE.VERIFICATION: 11
  • OP:
    • OP.ARRAY_ACCESS: 3
    • OP.AUTHENTICATION: 2
    • OP.BYTECODE: 1
    • OP.CARD_CONTENT_MGT: 2
    • OP.CREATE: 6
    • OP.DELETE_APPLET: 4
    • OP.DELETE_PCKG: 3
    • OP.DELETE_PCKG_APPLET: 3
    • OP.GET_ROR: 2
    • OP.INSTALL: 1
    • OP.INSTANCE_FIELD: 1
    • OP.INVK_INTERFACE: 4
    • OP.INVK_VIRTUAL: 3
    • OP.INVOKE: 2
    • OP.JAVA: 4
    • OP.LOAD: 1
    • OP.PUT: 4
    • OP.RECEIVE: 2
    • OP.RET_RORD: 2
    • OP.SEND: 2
    • OP.THROW: 3
    • OP.TYPE_ACCESS: 3
  • OSP:
    • OSP.VERIFICATION: 2
  • R:
    • R.CM: 1
    • R.GP: 2
    • R.JAVA: 19
  • T:
    • T.CONFID-APPLI-DATA: 3
    • T.CONFID-JCS-CODE: 3
    • T.CONFID-JCS-DATA: 3
    • T.DELETION: 4
    • T.EXE-CODE: 7
    • T.EXE-CODE-REMOTE: 3
    • T.INSTALL: 4
    • T.INTEG-APPLI-CODE: 6
    • T.INTEG-APPLI-DATA: 7
    • T.INTEG-JCS-CODE: 3
    • T.INTEG-JCS-DATA: 2
    • T.NATIVE: 3
    • T.OBJ-DELETION: 3
    • T.PHYSICAL: 3
    • T.RESOURCES: 3
    • T.SID: 7
  • A:
    • A.COVERT_CHANNELS: 1
    • A.PHYSICAL: 1
    • A.SUBJECT_ALLOCATION: 1
    • A.TRUSTED_FLOWS: 1
    • A.TRUSTED_INDIVIDUAL: 1
  • O:
    • O.ACCESS: 1
    • O.ADMIN_GUIDANCE: 1
    • O.AUDIT_GENERATION: 1
    • O.AUTHORIZED_SUBJECT: 1
    • O.BOUNDED_EXECUTION: 1
    • O.CHANGE_MANAGEMENT: 1
    • O.CONFIGURATION_CHANGE: 1
    • O.CORRECT_CONFIG: 1
    • O.CORRECT_INIT: 1
    • O.CORRECT_LOAD: 1
    • O.CORRECT_TSF_OPERATION: 1
    • O.COVERT_CHANNEL_ANALYSIS: 1
    • O.CRYPTOGRAPHY: 1
    • O.FUNCTIONAL_TESTING: 1
    • O.INIT_SECURE_STATE: 1
    • O.INSTALL_GUIDANCE: 1
    • O.INTERNAL_LEAST_PRIVILEGE: 1
    • O.MANAGE: 1
    • O.RATINGS_MAINTENANCE: 1
    • O.RECOVERY_SECURE_STATE: 1
    • O.REFERENCE_MONITOR: 1
    • O.RESIDUAL_INFORMATION: 1
    • O.RESOURCE_ALLOCATION: 1
    • O.SECURE_STATE: 1
    • O.SOUND_DESIGN: 1
    • O.SOUND_IMPLEMENTATION: 1
    • O.SUBJECT_ISOLATION: 1
    • O.TRANSITION: 1
    • O.TRUSTED_DELIVERY: 1
    • O.TSF_INTEGRITY: 1
    • O.USER_GUIDANCE: 1
    • O.VULNERABILITY_ANALYSIS_TEST: 1
  • OE:
    • OE.COVERT_CHANNELS: 1
    • OE.PHYSICAL: 1
    • OE.SUBJECT_ALLOCATION: 1
    • OE.TRUSTED_FLOWS: 1
    • OE.TRUSTED_INDIVIDUAL: 1
  • T:
    • T.ADMIN_ERROR: 1
    • T.ALTERED_DELIVERY: 1
    • T.CONFIGURATION_CHANGE: 1
    • T.CONFIGURATION_INTEGRITY: 1
    • T.COVERT_CHANNEL_EXPLOIT: 1
    • T.DENIAL_OF_SERVICE: 1
    • T.INCORRECT_CONFIG: 1
    • T.INCORRECT_LOAD: 1
    • T.INSECURE_STATE: 1
    • T.LEAST_PRIVILEGE: 1
    • T.POOR_DESIGN: 1
    • T.POOR_IMPLEMENTATION: 1
    • T.POOR_TEST: 1
    • T.TSF_COMPROMISE: 1
    • T.UNAUTHORIZED_ACCESS: 1
pdf_data/st_keywords/vendor
  • Samsung:
    • Samsung: 3
pdf_data/st_keywords/eval_facility
  • TUV:
    • TUV Informationstechnik: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 5
  • DES:
    • 3DES:
      • 3-DES: 1
    • DES:
      • DES: 9
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 3
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 5
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 2
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 3
  • ECB:
    • ECB: 3
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Physical tampering: 1
    • malfunction: 2
    • physical tampering: 1
  • SCA:
    • physical probing: 1
pdf_data/st_keywords/cplc_data
  • ICVersion:
    • IC. Version: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCIMB-99-031: 1
    • CCIMB-99-032: 1
    • CCIMB-99-033: 1
  • FIPS:
    • FIPS 197: 1
    • FIPS PUB 46-3: 1
  • PKCS:
    • PKCS#1: 2
  • SCP:
    • SCP 02: 2
    • SCP02: 1
  • CC:
    • CCMB-2005-08-002: 1
    • CCMB-2005-08-003: 1
  • FIPS:
    • FIPS PUB 186-2: 1
    • FIPS PUB 186-23: 1
    • FIPS PUB 186-3: 2
    • FIPS PUB 198: 1
pdf_data/st_keywords/javacard_version
  • JavaCard:
    • Java Card 2.1.1: 3
    • Java Card 2.1.2: 1
    • Java Card 2.2: 128
    • Java Card 2.2.1: 2
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 3
pdf_data/st_keywords/javacard_packages
  • java:
    • java.rmi: 2
  • javacard:
    • javacard.framework: 4
    • javacard.framework.appletclass: 1
    • javacard.framework.service: 1
    • javacard.security: 14
  • javacardx:
    • javacardx.crypto: 3
    • javacardx.rmi: 1
    • javacardx.security: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this PP, though. ASE – Security Target Java Card 2.2 on Mokard Safe Issued: 10/11/2005: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: NDiiorio
  • /CreationDate: D:20051110164319
  • /Creator: Mokard Safe 2.2 ASE Security Target Lite.doc (Sola lettura) - Microsoft Word
  • /Producer: Acrobat PDFWriter 4.05 per Windows NT
  • /Title: Mokard Safe 2.2 ASE Security Target Lite.doc
  • pdf_file_size_bytes: 2702319
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 133
  • /Author: SAIC CCTL IA Team
  • /Company: Green Hills Software, Inc.
  • /CreationDate: D:20080702095952-04'00'
  • /Creator: Acrobat PDFMaker 7.0 for Word
  • /Manager: Julie Taylor
  • /ModDate: D:20080702100156-04'00'
  • /Producer: Acrobat Distiller 7.0 (Windows)
  • /SourceModified: D:20080530140402
  • /Subject: Security Target
  • /Title: Green Hills Software INTEGRITY-178B Partitioning Kernel Security Target
  • pdf_file_size_bytes: 612709
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 67
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different