name |
Microcontrôleur sécurisé ST33G1M2 révision F, Firmware révisions 9 et A, incluant optionnellement la bibliothèque cryptographique Neslib versions 4.1 et 4.1.1 et la bibliothèque MIFARE4Mobile version 2.1.0
|
- Kanguru Defender Elite 200 with Kanguru Defender Manager Elite 200, Firmware Version 02.03.10, KDME200 v2.0.0.0-2/3/6,- Kanguru Defender 2000 with Kanguru Defender Manager 2000, Firmware Version 02.03.10, KDM2000 v1.2.1.8-2/3/6,- Universal Kanguru Local Administrator, Version 3.2.0.3 and- Kanguru Remote Management Console, Version 5.0.2.6
|
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
Data Protection
|
not_valid_before |
2016-01-08
|
2014-11-07
|
not_valid_after |
2023-12-12
|
2019-11-08
|
scheme |
FR
|
DE
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2015_61%20-%20Cible%20publique.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772b_pdf.pdf
|
status |
archived
|
archived
|
manufacturer |
STMicroelectronics
|
Kanguru Solutions
|
manufacturer_web |
https://www.st.com/
|
https://www.kanguru.com
|
security_level |
EAL5+, AVA_VAN.5, ALC_DVS.2 |
ALC_FLR.1, EAL2+ |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015-61.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772a_pdf.pdf
|
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat%20ANSSI-CC-2015_61-S03.pdf
|
None
|
protection_profiles |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile, Version 1.0', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0035b.pdf', 'pp_ids': frozenset({'PKISKPP', 'SECURITY_IC_V1.0'})}) |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Schutzprofil fur USB-Datentrager, Version 1.4', 'pp_eal': 'EAL2+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0025b.pdf', 'pp_ids': frozenset({'SCHUTZPROFIL_USB-DATENTRAGER_V1.4'})}) |
maintenance_updates |
frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2018, 1, 18), 'maintenance_title': 'Microcontrôleur sécurisé ST33G1M2 révision F, Firmware révisions 9 et A, incluant optionnellement la bibliothèque cryptographique Neslib versions 4.1 e t 4.1.1 et la bibliothèque MIFARE4Mobile 2.1.0', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2015_61-m01fr.pdf', 'maintenance_st_link': None}), frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2016, 3, 17), 'maintenance_title': 'ANSSI-CC-2014/46-M01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2014_46-M01.pdf', 'maintenance_st_link': None}), frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2018, 12, 12), 'maintenance_title': 'Reassessment report: ANSSI-CC-2015/61-S03', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2015_61-s03.pdf', 'maintenance_st_link': None}) |
frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2015, 1, 20), 'maintenance_title': 'Kanguru Defender Elite 200 and Kanguru Defender 2000, firmware version 2.05.10', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772_ma1a_pdf.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772_ma1b_pdf.pdf'}) |
state/cert/convert_garbage |
False
|
False
|
state/cert/convert_ok |
True
|
False
|
state/cert/download_ok |
True
|
False
|
state/cert/extract_ok |
True
|
False
|
state/cert/pdf_hash |
1622eea9a2d68da74cb3388051526cf41ba0f55315e15a9b40b12befebf0946e
|
None
|
state/cert/txt_hash |
bee8f2c7fbee5a6b907ccaddf26678a1c348e871eb9a4b42dbfbe4e36f1fe805
|
None
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
456f510dd79fdc29817c86cc9e3d8af5fa00c8d3306728c2054ccd45f95958f0
|
16e52e72927a5eee7124e6fde0c186c1d3d113e733e6116f5fdfcc44278c5b57
|
state/report/txt_hash |
ae5767ef6445799e20e0ed9b5fb4935cd06f8a502afd04427867e4f7043deb40
|
8cb2309bdc02367be25c3961b565d25c9f78b2d7cdce20c08213092f4a2eff82
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
37f8840ffbb9de2701c80e78ab9354da5ce44e6332db2a6e28e2f69cea33235f
|
077d27d1e2e9eafc65cbb9d302bc66883e2dd06e21ea816741ca25fe7f7dcd7d
|
state/st/txt_hash |
9b1bbad01ab3d50e0a5903b8d32fe359ddf21e49ba490d17e3c11afbd7b62465
|
74714db4c60a8332c3603aaae83a1c8ec3cbea7950400f562332e8ccdcc98147
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
ANSSI-CC-2015/61
|
BSI-DSZ-CC-0772-2014
|
heuristics/cert_lab |
THALES
|
BSI
|
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_versions |
4.1, 2.1.0, 4.1.1 |
2.0.0.0, 1.2.1.8, 3.2.0.3, 02.03.10, 5.0.2.6 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references/directly_referenced_by |
None
|
None
|
heuristics/report_references/directly_referencing |
ANSSI-CC-2015/36 |
None
|
heuristics/report_references/indirectly_referenced_by |
None
|
None
|
heuristics/report_references/indirectly_referencing |
ANSSI-CC-2015/36 |
None
|
heuristics/scheme_data |
- product:
Microcontrôleur sécurisé ST33G1M2 révision F, Firmware révisions 9 et A, incluant optionnellement la bibliothèque cryptographique Neslib versions 4.1 et 4.1.1 et la bibliothèque MIFARE4Mobile ® 2.1.0
- url:
https://cyber.gouv.fr/produits-certifies/microcontroleur-securise-st33g1m2-revision-f-firmware-revisions-9-et-incluant
- description:
Le produit certifé est le « Microcontrôleur sécurisé ST33G1M2 révision F, Firmwarerévisions 9 et A, incluant optionnellement la bibliothèque cryptographique Neslib versions 4.1
et 4.1.1 et la bibliothèque MIFARE4Mobile ® 2.1.0 » développé par STMicroelectronics.
Les produits dérivés du ST33G1M2 inclus dans cette plateforme sont définis par une séried’options matérielles ou logicielles config
- sponsor:
STMicroelectronics
- developer:
STMicroelectronics
- cert_id:
2015/61
- level:
EAL5+
- enhanced:
- cert_id:
2015/61
- certification_date:
08/01/2016
- category:
Micro-circuits
- cc_version:
Critères Communs version 3.1r4
- developer:
STMicroelectronics
- sponsor:
STMicroelectronics
- evaluation_facility:
THALES (TCS - CNES)
- level:
EAL5+
- protection_profile:
BSI_PP_0035-2007
- mutual_recognition:
SOG-IS
CCRA
- augmented:
ALC_DVS.2 et AVA_VAN.5
- target_link:
https://cyber.gouv.fr/sites/default/files/2016/01/2015_61-Cible-publique.pdf
- report_link:
https://cyber.gouv.fr/sites/default/files/2016/01/ANSSI-CC-2015-61.pdf
- cert_link:
https://cyber.gouv.fr/sites/default/files/2016/01/certificat-anssi-cc-2015_61-s03.pdf
|
None
|
heuristics/st_references/directly_referenced_by |
CRP299 |
None
|
heuristics/st_references/directly_referencing |
None
|
None
|
heuristics/st_references/indirectly_referenced_by |
CRP299 |
None
|
heuristics/st_references/indirectly_referencing |
None
|
None
|
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
certificat ANSSI-CC-2015_61-S03.pdf
|
None
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords |
- cc_cert_id:
- cc_protection_profile_id:
- cc_security_level:
- cc_sar:
- cc_sfr:
- cc_claims:
- vendor:
- eval_facility:
- symmetric_crypto:
- asymmetric_crypto:
- pq_crypto:
- hash_function:
- crypto_scheme:
- crypto_protocol:
- randomness:
- cipher_mode:
- ecc_curve:
- crypto_engine:
- tls_cipher_suite:
- crypto_library:
- vulnerability:
- side_channel_analysis:
- technical_report_id:
- device_model:
- tee_name:
- os_name:
- cplc_data:
- ic_data_group:
- standard_id:
- javacard_version:
- javacard_api_const:
- javacard_packages:
- certification_process:
|
None
|
pdf_data/cert_metadata |
- pdf_file_size_bytes:
276065
- pdf_is_encrypted:
False
- pdf_number_of_pages:
2
- /Author:
- /CreationDate:
D:20201222180151+01'00'
- /Creator:
PScript5.dll Version 5.2.2
- /ModDate:
D:20201222180151+01'00'
- /Producer:
Acrobat Distiller 11.0 (Windows)
- /Title:
- pdf_hyperlinks:
|
None
|
pdf_data/report_filename |
ANSSI-CC-2015-61.pdf
|
0772a_pdf.pdf
|
pdf_data/report_frontpage |
- FR:
- match_rules:
Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur (.+)Centre d’évaluation(.+)Accords de reconnaissance applicables
- cert_id:
ANSSI-CC-2015/61
- cert_item:
Microcontrôleur sécurisé ST33G1M2 révision F, Firmware révisions 9 et A, incluant optionnellement la bibliothèque cryptographique Neslib versions 4.1 et 4.1.1 et la bibliothèque MIFARE4Mobile ® 2.1.0
- cert_item_version:
Référence maskset K8H0A, révision interne F, firmware révisions 9 et A
- ref_protection_profiles:
BSI_PP_0035-2007], version v1.0 Security IC Platform Protection Profile
- cc_version:
CC version 3.1 révision 4
- cc_security_level:
EAL5 Augmenté ALC_DVS.2 et AVA_VAN.5
- developer:
STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, 13106 Rousset, France Commanditaire STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, 13106 Rousset, France
- cert_lab:
THALES (TCS – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France
|
- DE:
- match_rules:
(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)
- cert_id:
BSI-DSZ-CC-0772-2014
- cert_item:
Kanguru Defender Elite 200 Kanguru Defender 2000 Universal Kanguru Local Administrator, v3.2.0.3 Kanguru Remote Management Console, v5.0.2.6
- developer:
Kanguru Solutions
- cert_lab:
BSI
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id |
- FR:
- ANSSI-CC-2015/61:
21
- ANSSI-CC-2015/36:
1
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_INT:
1
- ADV_SPM:
1
- ADV_TDS:
1
- AGD:
- ALC:
- ALC_DVS.2:
2
- ALC_FLR:
2
- ALC_CMC:
1
- ALC_CMS:
1
- ALC_DEL:
1
- ALC_DVS:
1
- ALC_TAT:
1
- ATE:
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
- AVA:
- ASE:
- ASE_CCL:
1
- ASE_ECD:
1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_REQ:
1
- ASE_SPD:
1
- ASE_TSS:
1
|
- ADV:
- ADV_ARC.1:
1
- ADV_FSP.1:
1
- ADV_FSP.2:
1
- ADV_FSP.3:
1
- ADV_FSP.4:
1
- ADV_FSP.5:
1
- ADV_FSP.6:
1
- ADV_IMP.1:
1
- ADV_IMP.2:
1
- ADV_INT.1:
1
- ADV_INT.2:
1
- ADV_INT.3:
1
- ADV_SPM.1:
1
- ADV_TDS.1:
1
- ADV_TDS.2:
1
- ADV_TDS.3:
1
- ADV_TDS.4:
1
- ADV_TDS.5:
1
- ADV_TDS.6:
1
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_INT:
1
- ADV_SPM:
1
- ADV_TDS:
1
- AGD:
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- AGD_OPE:
1
- AGD_PRE:
1
- ALC:
- ALC_FLR.1:
5
- ALC_FLR:
3
- ALC_CMC.1:
1
- ALC_CMC.2:
1
- ALC_CMC.3:
1
- ALC_CMC.4:
1
- ALC_CMC.5:
1
- ALC_CMS.1:
1
- ALC_CMS.2:
1
- ALC_CMS.3:
1
- ALC_CMS.4:
1
- ALC_CMS.5:
1
- ALC_DEL.1:
1
- ALC_DVS.1:
1
- ALC_DVS.2:
1
- ALC_FLR.2:
1
- ALC_FLR.3:
1
- ALC_LCD.1:
1
- ALC_LCD.2:
1
- ALC_TAT.1:
1
- ALC_TAT.2:
1
- ALC_TAT.3:
1
- ALC_CMC:
1
- ALC_CMS:
1
- ALC_DEL:
1
- ALC_DVS:
1
- ALC_TAT:
1
- ATE:
- ATE_COV.1:
2
- ATE_COV.2:
1
- ATE_COV.3:
1
- ATE_DPT.1:
1
- ATE_DPT.2:
1
- ATE_DPT.3:
1
- ATE_DPT.4:
1
- ATE_FUN.1:
1
- ATE_FUN.2:
1
- ATE_IND.1:
1
- ATE_IND.2:
1
- ATE_IND.3:
1
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
- AVA:
- AVA_VAN.1:
1
- AVA_VAN.2:
1
- AVA_VAN.3:
1
- AVA_VAN.4:
1
- AVA_VAN.5:
1
- AVA_VAN:
2
- APE:
- APE_INT.1:
1
- APE_CCL.1:
1
- APE_SPD.1:
1
- APE_OBJ.1:
1
- APE_OBJ.2:
1
- APE_ECD.1:
1
- APE_REQ.1:
1
- APE_REQ.2:
1
- ASE:
- ASE_INT.1:
1
- ASE_CCL.1:
1
- ASE_SPD.1:
1
- ASE_OBJ.1:
1
- ASE_OBJ.2:
1
- ASE_ECD.1:
1
- ASE_REQ.1:
1
- ASE_REQ.2:
1
- ASE_TSS.1:
1
- ASE_TSS.2:
1
- ASE_CCL:
1
- ASE_ECD:
1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_SPD:
1
- ASE_TSS:
1
|
pdf_data/report_keywords/cc_sar/ADV |
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_INT:
1
- ADV_SPM:
1
- ADV_TDS:
1
|
- ADV_ARC.1: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_FSP.6: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM.1: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_INT:
1
- ADV_SPM:
1
- ADV_TDS:
1
|
pdf_data/report_keywords/cc_sar/ADV/ADV_ARC |
1
|
1
|
pdf_data/report_keywords/cc_sar/ADV/ADV_FSP |
1
|
1
|
pdf_data/report_keywords/cc_sar/ADV/ADV_IMP |
1
|
1
|
pdf_data/report_keywords/cc_sar/ADV/ADV_INT |
1
|
1
|
pdf_data/report_keywords/cc_sar/ADV/ADV_SPM |
1
|
1
|
pdf_data/report_keywords/cc_sar/ADV/ADV_TDS |
1
|
1
|
pdf_data/report_keywords/cc_sar/AGD |
|
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- AGD_OPE:
1
- AGD_PRE:
1
|
pdf_data/report_keywords/cc_sar/AGD/AGD_OPE |
1
|
1
|
pdf_data/report_keywords/cc_sar/AGD/AGD_PRE |
1
|
1
|
pdf_data/report_keywords/cc_sar/ALC |
- ALC_DVS.2:
2
- ALC_FLR:
2
- ALC_CMC:
1
- ALC_CMS:
1
- ALC_DEL:
1
- ALC_DVS:
1
- ALC_TAT:
1
|
- ALC_FLR.1: 5
- ALC_FLR:
3
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 1
- ALC_CMC.5: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_DVS.2:
1
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 1
- ALC_LCD.2: 1
- ALC_TAT.1: 1
- ALC_TAT.2: 1
- ALC_TAT.3: 1
- ALC_CMC:
1
- ALC_CMS:
1
- ALC_DEL:
1
- ALC_DVS:
1
- ALC_TAT:
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_CMC |
1
|
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_CMS |
1
|
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_DEL |
1
|
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS |
1
|
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 |
2
|
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR |
2
|
3
|
pdf_data/report_keywords/cc_sar/ALC/ALC_TAT |
1
|
1
|
pdf_data/report_keywords/cc_sar/ASE |
- ASE_CCL:
1
- ASE_ECD:
1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_REQ: 1
- ASE_SPD:
1
- ASE_TSS:
1
|
- ASE_INT.1: 1
- ASE_CCL.1: 1
- ASE_SPD.1: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_ECD.1: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ASE_CCL:
1
- ASE_ECD:
1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_SPD:
1
- ASE_TSS:
1
|
pdf_data/report_keywords/cc_sar/ASE/ASE_CCL |
1
|
1
|
pdf_data/report_keywords/cc_sar/ASE/ASE_ECD |
1
|
1
|
pdf_data/report_keywords/cc_sar/ASE/ASE_INT |
1
|
1
|
pdf_data/report_keywords/cc_sar/ASE/ASE_OBJ |
1
|
1
|
pdf_data/report_keywords/cc_sar/ASE/ASE_SPD |
1
|
1
|
pdf_data/report_keywords/cc_sar/ASE/ASE_TSS |
1
|
1
|
pdf_data/report_keywords/cc_sar/ATE |
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
|
- ATE_COV.1: 2
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 1
- ATE_DPT.4: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
|
pdf_data/report_keywords/cc_sar/ATE/ATE_COV |
1
|
1
|
pdf_data/report_keywords/cc_sar/ATE/ATE_DPT |
1
|
1
|
pdf_data/report_keywords/cc_sar/ATE/ATE_FUN |
1
|
1
|
pdf_data/report_keywords/cc_sar/ATE/ATE_IND |
1
|
1
|
pdf_data/report_keywords/cc_sar/AVA |
|
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5:
1
- AVA_VAN:
2
|
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN |
3
|
2
|
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN.5 |
2
|
1
|
pdf_data/report_keywords/cc_security_level/EAL |
- EAL5: 2
- EAL2:
2
- EAL7: 1
- EAL 1:
1
- EAL 3:
1
- EAL 5:
1
- EAL 7:
1
|
- EAL 2: 8
- EAL 1:
7
- EAL 4: 7
- EAL2:
2
- EAL 3:
4
- EAL 5:
6
- EAL 6: 3
- EAL 7:
4
- EAL 2 augmented: 3
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 1 |
1
|
7
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 3 |
1
|
4
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 |
1
|
6
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 7 |
1
|
4
|
pdf_data/report_keywords/cc_security_level/EAL/EAL2 |
2
|
2
|
pdf_data/report_keywords/cc_security_level/ITSEC |
|
|
pdf_data/report_keywords/cc_sfr |
|
- FCS:
- FCS_COP.1:
1
- FCS_CKM.1:
1
- FCS_RNG.1:
1
- FDP:
- FDP_ACC.1:
2
- FDP_ACF.1:
2
- FIA:
- FIA_UID.2:
4
- FIA_UAU.2:
4
- FIA_UAU.6:
1
- FIA_SOS.1:
1
- FMT:
- FMT_MTD:
2
- FMT_SMF:
2
- FMT_SMF.1:
1
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- Report, Version 8, 2014-10-07, Final Evaluation Technical Report, atsec information security GmbH, (confidential document) [9] Evaluated Product User Guide, Version 1.20, 2014-10-02 [10] Kanguru Defender Elite 200 User:
1
- KRMC Administrator's User Manual, Version 5.0.2, 2013-11-01 [14] Configuration lists for the TOE (confidential documents): a) Configuration list for TOE executables, 2014-09-17 b) Configuration list from Phison:
1
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
- Neslib:
- NesLib v4.1:
3
- NesLib 4.1:
2
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- CC:
- CCMB-2012-09-001:
1
- CCMB-2012-09-002:
1
- CCMB-2012-09-003:
1
- CCMB-2012-09-004:
1
|
- BSI:
- ISO:
- ISO/IEC 17065:
2
- ISO/IEC 15408:
2
- ISO/IEC 18045:
2
|
pdf_data/report_keywords/standard_id/BSI |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES |
|
|
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES/AES |
2
|
4
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI TR-02102:
1
- BSI 7138:
2
- BSI 7125:
2
- BSI 7148:
1
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata//Author |
|
Bundesamt für Sicherheit in der Informationstechnik
|
pdf_data/report_metadata//CreationDate |
|
D:20141121083051+01'00'
|
pdf_data/report_metadata//Creator |
PDFCreator Version 1.2.1
|
Writer
|
pdf_data/report_metadata//Keywords |
|
"Common Criteria, Certification, Zertifizierung, encrypted USB storage device, Kanguru Defender"
|
pdf_data/report_metadata//ModDate |
|
D:20141121113713+01'00'
|
pdf_data/report_metadata//Producer |
GPL Ghostscript 9.02
|
LibreOffice 4.2
|
pdf_data/report_metadata//Subject |
|
Common Criteria Certification
|
pdf_data/report_metadata//Title |
ANSSI-CC-2015-61
|
Certification Report BSI-DSZ-CC-0772-2014
|
pdf_data/report_metadata/pdf_file_size_bytes |
1341425
|
1643286
|
pdf_data/report_metadata/pdf_hyperlinks |
|
https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/ |
pdf_data/report_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/report_metadata/pdf_number_of_pages |
20
|
42
|
pdf_data/st_filename |
2015_61 - Cible publique.pdf
|
0772b_pdf.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/cc_protection_profile_id/BSI |
|
- BSI-PP-0025:
6
- BSI-PP- 0025:
13
|
pdf_data/st_keywords/cc_sar |
- ADO:
- ADV:
- ADV_FSP:
4
- ADV_ARC.1:
1
- ADV_FSP.5:
3
- ADV_IMP.1:
1
- ADV_INT.2:
1
- ADV_TDS.4:
1
- ADV_ARC:
2
- ADV_IMP:
1
- AGD:
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- AGD_OPE:
1
- AGD_PRE:
1
- ALC:
- ALC_DVS.2:
4
- ALC_CMC.4:
1
- ALC_CMS.5:
1
- ALC_DEL.1:
1
- ALC_LCD.1:
1
- ALC_TAT.2:
1
- ALC_DVS:
1
- ALC_CMS:
1
- ALC_CMC:
1
- ATE:
- ATE_COV:
3
- ATE_COV.2:
1
- ATE_DPT.3:
1
- ATE_FUN.1:
1
- ATE_IND.2:
1
- AVA:
- ASE:
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
|
- ADV:
- ADV_SPM.1:
2
- ADV_ARC.1:
1
- ADV_FSP.2:
1
- ADV_TDS.1:
1
- AGD:
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- ALC:
- ALC_FLR.1:
5
- ALC_CMC.2:
1
- ALC_CMS.2:
1
- ALC_DEL.1:
1
- ATE:
- ATE_COV.1:
1
- ATE_FUN.1:
1
- ATE_IND.2:
1
- AVA:
- ASE:
- ASE_INT.1:
1
- ASE_CCL.1:
1
- ASE_SPD.1:
1
- ASE_OBJ.2:
1
- ASE_ECD.1:
1
- ASE_REQ.2:
1
- ASE_TSS.1:
1
|
pdf_data/st_keywords/cc_sar/ADV |
- ADV_FSP: 4
- ADV_ARC.1:
1
- ADV_FSP.5: 3
- ADV_IMP.1: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- ADV_ARC: 2
- ADV_IMP: 1
|
- ADV_SPM.1: 2
- ADV_ARC.1:
1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
|
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/AGD |
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- AGD_OPE: 1
- AGD_PRE: 1
|
- AGD_OPE.1:
1
- AGD_PRE.1:
1
|
pdf_data/st_keywords/cc_sar/AGD/AGD_OPE.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/AGD/AGD_PRE.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ALC |
- ALC_DVS.2: 4
- ALC_CMC.4: 1
- ALC_CMS.5: 1
- ALC_DEL.1:
1
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ALC_DVS: 1
- ALC_CMS: 1
- ALC_CMC: 1
|
- ALC_FLR.1: 5
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1:
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_DEL.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE |
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
|
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
|
pdf_data/st_keywords/cc_sar/ATE |
- ATE_COV: 3
- ATE_COV.2: 1
- ATE_DPT.3: 1
- ATE_FUN.1:
1
- ATE_IND.2:
1
|
- ATE_COV.1: 1
- ATE_FUN.1:
1
- ATE_IND.2:
1
|
pdf_data/st_keywords/cc_sar/ATE/ATE_FUN.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ATE/ATE_IND.2 |
1
|
1
|
pdf_data/st_keywords/cc_sar/AVA |
|
|
pdf_data/st_keywords/cc_security_level/EAL |
- EAL5:
17
- EAL 5:
2
- EAL4:
1
- EAL 5 augmented:
2
|
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_RNG.1:
8
- FCS_COP.1:
37
- FCS_CKM.1:
22
- FCS_CKM.4:
14
- FCS_RNG:
1
- FDP:
- FDP_ITT.1:
11
- FDP_IFC.1:
19
- FDP_ACC.2:
13
- FDP_ACF.1:
52
- FDP_ITC.1:
15
- FDP_ACC.1:
46
- FDP_ITC.2:
14
- FDP_ROL.1:
10
- FDP_RIP.1:
10
- FDP_CKM.2:
1
- FDP_SMF.1:
2
- FDP_SMR.1:
1
- FIA:
- FIA_UID.2:
12
- FIA_UAU.2:
10
- FIA_UAU.5:
11
- FIA_UID.1:
2
- FMT:
- FMT_LIM.1:
20
- FMT_LIM.2:
19
- FMT_MSA.3:
51
- FMT_MSA.1:
39
- FMT_SMF.1:
30
- FMT_SMR.1:
23
- FMT_MTD.1:
10
- FMT_LIM:
1
- FMT_MSA.2:
1
- FMT_ITC.1:
1
- FPR:
- FPT:
- FPT_FLS.1:
15
- FPT_PHP.3:
12
- FPT_ITT.1:
10
- FPT_TDC.1:
11
- FPT_RPL.1:
12
- FPT_TRP.1:
8
- FRU:
- FRU_FLT.2:
13
- FRU_RSA.2:
10
- FTP:
- FTP_TRP.1:
6
- FTP_TRP.1.3:
2
- FTP_ITC.1:
1
|
- FAU:
- FCS:
- FCS_RNG.1:
15
- FCS_CKM.1:
9
- FCS_CKM.4:
9
- FCS_COP.1:
9
- FCS_RNG:
2
- FCS_RNG.1.1:
3
- FCS_RNG.1.2:
3
- FCS_CKM.1.1:
1
- FCS_CKM.4.1:
1
- FCS_COP.1.1:
1
- FCS_CKM.2:
1
- FDP:
- FDP_ACC.1:
14
- FDP_ACF.1:
13
- FDP_ACC.1.1:
1
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
1
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
- FDP_ITC.1:
2
- FDP_ITC.2:
2
- FDP_IFC.1:
1
- FIA:
- FIA_UAU.1:
7
- FIA_UAU.6:
8
- FIA_SOS.1:
8
- FIA_UAU.2:
9
- FIA_UID.2:
10
- FIA_UAU.1.1:
1
- FIA_UAU.1.2:
1
- FIA_UAU.6.1:
1
- FIA_SOS.1.1:
1
- FIA_UAU.2.1:
1
- FIA_UID.2.1:
1
- FIA_UID.1:
2
- FMT:
- FMT_MSA.1:
8
- FMT_MTD:
12
- FMT_SMF:
20
- FMT_SMR.1:
12
- FMT_SMF.1:
6
- FMT_MTD.1:
3
- FMT_MSA.1.1:
1
- FMT_MTD.1.1:
2
- FMT_SMF.1.1:
2
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_MSA.3:
1
- FPT:
- FPT_FLS.1:
9
- FPT_RCV.4:
8
- FPT_PHP.1:
8
- FPT_RCV.4.1:
2
- FPT_FLS.1.1:
1
- FPT_PHP.1.1:
1
- FPT_PHP.1.2:
1
|
pdf_data/st_keywords/cc_sfr/FAU |
|
|
pdf_data/st_keywords/cc_sfr/FCS |
- FCS_RNG.1:
8
- FCS_COP.1:
37
- FCS_CKM.1:
22
- FCS_CKM.4:
14
- FCS_RNG:
1
|
- FCS_RNG.1:
15
- FCS_CKM.1:
9
- FCS_CKM.4:
9
- FCS_COP.1:
9
- FCS_RNG:
2
- FCS_RNG.1.1: 3
- FCS_RNG.1.2: 3
- FCS_CKM.1.1: 1
- FCS_CKM.4.1: 1
- FCS_COP.1.1: 1
- FCS_CKM.2: 1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 |
22
|
9
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 |
14
|
9
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 |
37
|
9
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1 |
8
|
15
|
pdf_data/st_keywords/cc_sfr/FDP |
- FDP_ITT.1: 11
- FDP_IFC.1:
19
- FDP_ACC.2: 13
- FDP_ACF.1:
52
- FDP_ITC.1:
15
- FDP_ACC.1:
46
- FDP_ITC.2:
14
- FDP_ROL.1: 10
- FDP_RIP.1: 10
- FDP_CKM.2: 1
- FDP_SMF.1: 2
- FDP_SMR.1: 1
|
- FDP_ACC.1:
14
- FDP_ACF.1:
13
- FDP_ACC.1.1: 1
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_ITC.1:
2
- FDP_ITC.2:
2
- FDP_IFC.1:
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 |
46
|
14
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 |
52
|
13
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 |
19
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 |
15
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 |
14
|
2
|
pdf_data/st_keywords/cc_sfr/FIA |
- FIA_UID.2:
12
- FIA_UAU.2:
10
- FIA_UAU.5: 11
- FIA_UID.1:
2
|
- FIA_UAU.1: 7
- FIA_UAU.6: 8
- FIA_SOS.1: 8
- FIA_UAU.2:
9
- FIA_UID.2:
10
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.6.1: 1
- FIA_SOS.1.1: 1
- FIA_UAU.2.1: 1
- FIA_UID.2.1: 1
- FIA_UID.1:
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.2 |
10
|
9
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.2 |
12
|
10
|
pdf_data/st_keywords/cc_sfr/FMT |
- FMT_LIM.1: 20
- FMT_LIM.2: 19
- FMT_MSA.3:
51
- FMT_MSA.1:
39
- FMT_SMF.1:
30
- FMT_SMR.1:
23
- FMT_MTD.1:
10
- FMT_LIM: 1
- FMT_MSA.2: 1
- FMT_ITC.1: 1
|
- FMT_MSA.1:
8
- FMT_MTD: 12
- FMT_SMF: 20
- FMT_SMR.1:
12
- FMT_SMF.1:
6
- FMT_MTD.1:
3
- FMT_MSA.1.1: 1
- FMT_MTD.1.1: 2
- FMT_SMF.1.1: 2
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FMT_MSA.3:
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 |
39
|
8
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 |
51
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 |
10
|
3
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
30
|
6
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
23
|
12
|
pdf_data/st_keywords/cc_sfr/FPT |
- FPT_FLS.1:
15
- FPT_PHP.3: 12
- FPT_ITT.1: 10
- FPT_TDC.1: 11
- FPT_RPL.1: 12
- FPT_TRP.1: 8
|
- FPT_FLS.1:
9
- FPT_RCV.4: 8
- FPT_PHP.1: 8
- FPT_RCV.4.1: 2
- FPT_FLS.1.1: 1
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 |
15
|
9
|
pdf_data/st_keywords/certification_process/OutOfScope |
- out of scope:
1
- ES) is in User NVM. The ES is not part of the TOE and is out of scope of the evaluation, except Neslib and M4M-DESFire, when they are embedded:
1
- 32 The Security IC Embedded Software (ES) is in User NVM. The ES is not part of the TOE and is out of scope of the evaluation, except Neslib and M4M-DESFire, when they are embedded. 33 The user guidance:
1
|
- Out of scope:
2
- 11 1.5.4.3 Out of scope :
1
- 11 1.5.4.3 Out of scope ........................................................................................... 12 1.5:
1
- from the KRMC to the device. Commands are queued at the KRMC until polled form the device. 1.5.4.3 Out of scope The TOE supports additional features that are not part of the scope: ● Antivirus solution ●:
1
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cipher_mode/CBC/CBC |
6
|
1
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
- Neslib:
- NESLIB 4.1:
1
- NesLib 4.1:
3
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function/SHA |
- SHA1:
- SHA2:
- SHA-224:
6
- SHA-256:
9
- SHA-384:
6
- SHA-512:
5
|
|
pdf_data/st_keywords/hash_function/SHA/SHA2 |
- SHA-224: 6
- SHA-256:
9
- SHA-384: 6
- SHA-512: 5
|
|
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-256 |
9
|
1
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/randomness/RNG |
|
|
pdf_data/st_keywords/randomness/RNG/RNG |
6
|
14
|
pdf_data/st_keywords/side_channel_analysis |
- SCA:
- Leak-Inherent:
12
- Physical Probing:
4
- physical probing:
3
- side channel:
6
- FI:
- physical tampering:
1
- Malfunction:
13
- malfunction:
4
|
|
pdf_data/st_keywords/side_channel_analysis/FI |
- physical tampering:
1
- Malfunction: 13
- malfunction: 4
|
|
pdf_data/st_keywords/side_channel_analysis/FI/physical tampering |
1
|
3
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS PUB 46-3:
3
- FIPS PUB 197:
4
- FIPS PUB 180-4:
5
- FIPS PUB 140-2:
5
- FIPS PUB 198-1:
2
- FIPS 186-3:
2
- NIST:
- NIST SP 800-38B:
2
- NIST SP 800-90A:
5
- PKCS:
- BSI:
- ISO:
- ISO/IEC 7816-3:
1
- ISO/IEC 9797-1:
3
- ISO/IEC 10116:
7
- ISO/IEC 14888:
2
- ISO/IEC 9797:
1
- CC:
- CCMB-2012-09-002:
40
- CCMB-2012-09-003:
2
- CCMB-2012-09-001:
2
|
|
pdf_data/st_keywords/standard_id/BSI |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES:
29
- AES-128:
1
- AES-192:
1
- AES-256:
1
- DES:
- constructions:
- MAC:
- HMAC:
4
- CBC-MAC:
3
- CMAC:
2
|
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES |
- AES:
29
- AES-128: 1
- AES-192: 1
- AES-256: 1
|
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES |
29
|
3
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor |
- NXP:
- Infineon:
- STMicroelectronics:
- Philips:
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata |
- pdf_file_size_bytes:
1068719
- pdf_is_encrypted:
False
- pdf_number_of_pages:
95
- /Author:
Christiane DROULERS
- /CreationDate:
D:20151015144701Z
- /Creator:
FrameMaker 11.0
- /ModDate:
D:20151030175252+01'00'
- /Producer:
Acrobat Elements 10.0.0 (Windows)
- /Title:
SMD_ST33G_V1_2.book
- pdf_hyperlinks:
http://www.st.com
|
- pdf_file_size_bytes:
704587
- pdf_is_encrypted:
False
- pdf_number_of_pages:
41
- /Keywords: Security Target, Common Criteria, USB Storage, Encryption, Protected Storage
- /Subject:
- /Title:
Kanguru Defender Security Target (version 1.10 as of 2014-10-06)
- /Creator:
Unknown
- /Author:
Andreas Siegert (generated by CCTool version 2.8)
- /Producer:
XEP 4.23
- /application: CCTool version x.y
- /Trapped: /False
- /CreationDate:
D:20141006150157Z
- /ModDate:
D:20141006150157Z
- pdf_hyperlinks:
http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R3.pdf
|
pdf_data/st_metadata//Author |
Christiane DROULERS
|
Andreas Siegert (generated by CCTool version 2.8)
|
pdf_data/st_metadata//CreationDate |
D:20151015144701Z
|
D:20141006150157Z
|
pdf_data/st_metadata//Creator |
FrameMaker 11.0
|
Unknown
|
pdf_data/st_metadata//ModDate |
D:20151030175252+01'00'
|
D:20141006150157Z
|
pdf_data/st_metadata//Producer |
Acrobat Elements 10.0.0 (Windows)
|
XEP 4.23
|
pdf_data/st_metadata//Title |
SMD_ST33G_V1_2.book
|
Kanguru Defender Security Target (version 1.10 as of 2014-10-06)
|
pdf_data/st_metadata/pdf_file_size_bytes |
1068719
|
704587
|
pdf_data/st_metadata/pdf_hyperlinks |
http://www.st.com |
http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R3.pdf |
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
95
|
41
|
dgst |
6818c3c773c2a71a
|
eda06ca3c208ebd0
|