Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Mobile FeliCa OS 3.0 on T6NE1/0115_432B
SERTIT-081
Symantec™ Endpoint Protection Version 11.0
383-4-84
name Mobile FeliCa OS 3.0 on T6NE1/0115_432B Symantec™ Endpoint Protection Version 11.0
category ICs, Smart Cards and Smart Card-Related Devices and Systems Detection Devices and Systems
scheme NO CA
not_valid_after 05.09.2021 29.09.2015
not_valid_before 05.09.2016 25.06.2008
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SERTIT-081%20CR%201.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/sepv110-cert-e.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[STP-T]%20F03T-ASEP01-E01-70.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/sepv110-sec-e.pdf
manufacturer FeliCa Networks, Inc Symantec Corporation
manufacturer_web https://https://www.felicanetworks.co.jp/en/ https://www.symantec.com
security_level EAL4+, AVA_VAN.4, ATE_DPT.2, ALC_DVS.2 EAL2+, ALC_FLR.2, AVA_MSU.1
dgst 6835e0576746ad57 0d1b1dccbbd49d84
heuristics/cert_id SERTIT-081 383-4-84
heuristics/cert_lab [] CANADA
heuristics/cpe_matches {} cpe:2.3:a:symantec:endpoint_protection:11.0.7100:*:*:*:*:*:*:*, cpe:2.3:a:symantec:endpoint_protection:11.0.2:*:*:*:*:*:*:*, cpe:2.3:a:symantec:endpoint_protection:11.0:ru6a:*:*:*:*:*:*, cpe:2.3:a:symantec:endpoint_protection:11.0.1:*:*:*:*:*:*:*, cpe:2.3:a:symantec:endpoint_protection:11.0.4:mp1a:*:*:*:*:*:*, cpe:2.3:a:symantec:endpoint_protection:11.0:ru6mp2:*:*:*:*:*:*, cpe:2.3:a:symantec:endpoint_protection:11.0.7.3:*:*:*:*:*:*:*, cpe:2.3:a:symantec:endpoint_protection:11.0:ru6mp1:*:*:*:*:*:*, cpe:2.3:a:symantec:endpoint_protection:11.0.7.1:*:*:*:*:*:*:*, cpe:2.3:a:symantec:endpoint_protection:11.0.4:mp2:*:*:*:*:*:*, cpe:2.3:a:symantec:endpoint_protection:11.0.7.2:*:*:*:*:*:*:*, cpe:2.3:a:symantec:endpoint_protection:11.0.2:mp2:*:*:*:*:*:*, cpe:2.3:a:symantec:endpoint_protection:11.0:ru5:*:*:*:*:*:*, cpe:2.3:a:symantec:endpoint_protection:11.0.6100:*:*:*:*:*:*:*, cpe:2.3:a:symantec:endpoint_protection:11.0.1:mp1:*:*:*:*:*:*, cpe:2.3:a:symantec:endpoint_protection:11.0.7000:*:*:*:*:*:*:*, cpe:2.3:a:symantec:endpoint_protection:11.0:ru6:*:*:*:*:*:*, cpe:2.3:a:symantec:endpoint_protection:11.0.2:mp1:*:*:*:*:*:*, cpe:2.3:a:symantec:endpoint_protection_manager:11.0:*:*:*:*:*:*:*, cpe:2.3:a:symantec:endpoint_protection:11.0:-:*:*:*:*:*:*, cpe:2.3:a:symantec:endpoint_protection:11.0.3001:*:*:*:*:*:*:*, cpe:2.3:a:symantec:endpoint_protection:11.0.1:mp2:*:*:*:*:*:*, cpe:2.3:a:symantec:endpoint_protection:11.0.6300:*:*:*:*:*:*:*, cpe:2.3:a:symantec:endpoint_protection:11.0.4:*:*:*:*:*:*:*, cpe:2.3:a:symantec:endpoint_protection:11.0.6000:*:*:*:*:*:*:*, cpe:2.3:a:symantec:endpoint_protection:11.0:*:*:*:*:*:*:*, cpe:2.3:a:symantec:endpoint_protection:11.0.7:*:*:*:*:*:*:*, cpe:2.3:a:symantec:endpoint_protection:11.0.6200:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2019-12756, CVE-2014-3439, CVE-2020-5836, CVE-2019-12759, CVE-2011-0550, CVE-2009-1430, CVE-2013-5014, CVE-2017-6331, CVE-2019-12750, CVE-2010-3268, CVE-2014-3437, CVE-2020-5821, CVE-2020-5820, CVE-2014-9229, CVE-2020-5833, CVE-2018-12238, CVE-2009-1432, CVE-2012-1457, CVE-2020-5828, CVE-2013-5009, CVE-2009-1429, CVE-2012-1443, CVE-2020-5837, CVE-2012-1461, CVE-2012-1456, CVE-2019-18372, CVE-2018-5236, CVE-2020-5834, CVE-2016-5311, CVE-2013-5011, CVE-2020-5829, CVE-2018-5237, CVE-2020-5830, CVE-2018-12239, CVE-2014-3434, CVE-2020-5823, CVE-2012-4348, CVE-2020-5831, CVE-2012-1446, CVE-2020-5822, CVE-2010-0108, CVE-2009-1431, CVE-2020-5824, CVE-2012-1459, CVE-2015-8113, CVE-2012-4953, CVE-2011-0551, CVE-2012-0289, CVE-2013-5010, CVE-2014-9227, CVE-2013-5015, CVE-2014-3438, CVE-2019-12758, CVE-2018-18368, CVE-2018-12245, CVE-2014-9228, CVE-2016-9094, CVE-2020-5825, CVE-2012-1421, CVE-2009-1428, CVE-2012-1425, CVE-2019-12757, CVE-2010-0114, CVE-2020-5835, CVE-2020-5826, CVE-2010-0106, CVE-2020-5827, CVE-2016-9093, CVE-2012-1462
heuristics/extracted_sars ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ATE_DPT.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ASE_REQ.2, ADV_FSP.4, ATE_IND.2, AVA_VAN.4, ASE_CCL.1 ADV_RCR.1, ADV_FSP.1, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, ATE_COV.1, AVA_MSU.1, ADV_HLD.1, AVA_SOF.1, ALC_FLR.2
heuristics/extracted_versions 3.0 11.0
heuristics/scheme_data
  • category: ICs, Smart Cards and Smart Card-Related Devices and Systems
  • certification_date: 05.09.2016
  • developer: FeliCa Networks, Inc.
  • enhanced:
    • category: ICs, Smart Cards and Smart Card-Related Devices and Systems
    • cert_id: SERTIT-081
    • certification_date: 05.09.2016
    • description: The TOE is an integrated circuit with an embedded smartcard operating system. The operating system is the FeliCa Networks Mobile FeliCa Operating System and the integrated circuit is the Toshiba CORPORATION chip T6NE1.
    • developer: FeliCa Networks, Inc.
    • documents: frozendict({'target': [frozendict({'href': 'https://sertit.no/getfile.php/135067-1607952737/SERTIT/Sertifikater/2016/81/%5BSTP-T%5D%20F03T-ASEP01-E01-70.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/135070-1607952743/SERTIT/Sertifikater/2016/81/SERTIT-081%20CR%201.0.pdf'})]})
    • evaluation_facility: Brightsight B.V.
    • level: EAL 4, ALC_DVS.2, ATE_DPT.2, AVA_VAN.4
    • mutual_recognition: CCRA, SOG-IS
    • product: Software: Mobile FeliCa OS Version 3.0 0115_432B; Hardware Toshiba T6NE1 4.0
    • sponsor: FeliCa Networks, Inc.
  • product: Mobile FeliCa OS 3.0 on T6NE1/0115_432B
  • url: https://sertit.no/certified-products/product-archive/mobile-felica-os-3-0-on-t6ne1-0115-432b
pdf_data/report_filename SERTIT-081 CR 1.0.pdf sepv110-cert-e.pdf
pdf_data/report_frontpage
  • CA:
  • CA:
    • cert_id: 383-4-84
    • cert_lab: CANADA
pdf_data/report_keywords/cc_cert_id
  • NO:
    • SERTIT-081: 19
  • CA:
    • 383-4-84: 2
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0035: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 4: 3
    • EAL 4 augmented: 1
    • EAL 4+: 18
    • EAL1: 1
    • EAL4: 1
    • EAL7: 1
  • EAL:
    • EAL 2: 5
    • EAL 2 augmented: 2
    • EAL 2+: 2
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 4
    • ALC_FLR: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.2: 4
    • ATE_FUN.1: 1
    • ATE_IND: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.4: 4
  • ALC:
    • ALC_FLR.2: 2
  • AVA:
    • AVA_MSU.1: 2
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_SAS.1: 4
  • FCS:
    • FCS_RNG.1: 3
  • FDP:
    • FDP_ACC.1: 1
    • FDP_ACF.1: 1
    • FDP_IFC.1: 1
    • FDP_ITT.1: 1
    • FDP_SDI.2: 1
  • FIA:
    • FIA_UAU.1: 1
    • FIA_UAU.4: 1
    • FIA_UID.1: 1
  • FMT:
    • FMT_LIM.1: 1
    • FMT_LIM.2: 1
    • FMT_MSA.1: 1
    • FMT_SMF.1: 1
    • FMT_SMR.1: 1
  • FPT:
    • FPT_FLS.1: 1
    • FPT_ITT.1: 1
    • FPT_PHP.3: 1
  • FRU:
    • FRU_FLT.2: 1
  • FTP:
    • FTP_ITC.1: 1
  • FIA:
    • FIA_PLA_EXP.1: 1
  • FPT:
    • FPT_SEP_EXP: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 8
    • Microsoft Corporation: 1
pdf_data/report_keywords/eval_facility
  • BrightSight:
    • Brightsight: 1
  • EWA:
    • EWA-Canada: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 5
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
pdf_data/report_keywords/side_channel_analysis
  • other:
    • JIL: 2
pdf_data/report_keywords/cplc_data
  • ICType:
    • IC Type: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • ISO:
    • ISO/IEC 15408: 4
  • FIPS:
    • FIPS 180-2: 1
pdf_data/report_metadata
  • /AAPL:Keywords: ['ugradert']
  • /Author: Wei Yuan
  • /CreationDate: D:20160905104440Z00'00'
  • /Creator: Microsoft® Word 2010
  • /Keywords: ugradert
  • /ModDate: D:20160905104440Z00'00'
  • /Producer: Mac OS X 10.11.6 Quartz PDFContext
  • /Title: tittel
  • pdf_file_size_bytes: 1388306
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 21
  • /Author: kbraun
  • /CCEF: CCEF name
  • /CR date: dd month yyyy
  • /CR version: x.x
  • /Certificate date: dd month yyyy
  • /Comments: PCR Template Version 1.3
  • /CreationDate: D:20080715121453-04'00'
  • /Creator: Acrobat PDFMaker 6.0 for Word
  • /Developer name: Developer name
  • /Document number: 383-4-xx-CR
  • /ETR title, version, date: ETR title, version, date
  • /Evaluation completion date: dd month yyyy
  • /ModDate: D:20080715134509-04'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /ST Title: ST title
  • /ST date: dd month yyyy
  • /ST version: ST version
  • /SourceModified: D:20080715141427
  • /Sponsor: Sponsor
  • /TOE Version: 5.0
  • /TOE name and version: TOE name and version
  • /TOE short name: TOE short name
  • /Title: EAL X+ Evaluation of [Developer Long Name]
  • /_AdHocReviewCycleID: -1880835950
  • /_AuthorEmail: [email protected]
  • /_AuthorEmailDisplayName: White, Debra E.
  • /_EmailSubject: Partial Post to full post
  • pdf_file_size_bytes: 117831
  • pdf_hyperlinks: http://www.cse-cst.gc.ca/services/common-criteria/trusted-products-e.html, http://www.commoncriteriaportal.org/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 16
pdf_data/st_filename [STP-T] F03T-ASEP01-E01-70.pdf sepv110-sec-e.pdf
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0035: 23
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 7
  • EAL:
    • EAL2: 2
    • EAL2 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 4
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 3
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 1
  • ALC:
    • ALC_DVS.1: 1
    • ALC_DVS.2: 6
  • ATE:
    • ATE_DPT.2: 6
    • ATE_FUN.1: 2
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.4: 6
  • ACM:
    • ACM_CAP.2: 5
  • ADO:
    • ADO_DEL.1: 5
    • ADO_IGS.1: 4
  • ADV:
    • ADV_FSP.1: 4
    • ADV_HLD.1: 4
    • ADV_RCR.1: 5
  • AGD:
    • AGD_ADM.1: 5
    • AGD_USR.1: 4
  • ALC:
    • ALC_FLR.2: 7
  • ATE:
    • ATE_COV.1: 5
    • ATE_FUN.1: 3
    • ATE_IND.2: 4
  • AVA:
    • AVA_MSU.1: 7
    • AVA_SOF: 2
    • AVA_SOF.1: 3
    • AVA_VLA.1: 6
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_SAS: 1
    • FAU_SAS.1: 3
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_RNG: 1
    • FCS_RNG.1: 4
    • FCS_RNG.1.1: 1
    • FCS_RNG.1.2: 1
  • FDP:
    • FDP_ACC.1: 12
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 6
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 8
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 1
    • FDP_ITT.1: 6
    • FDP_ITT.1.1: 1
    • FDP_SDI.2: 4
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
  • FIA:
    • FIA_UAU.1: 4
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.4: 4
    • FIA_UAU.4.1: 1
    • FIA_UID.1: 6
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_LIM.1: 5
    • FMT_LIM.1.1: 1
    • FMT_LIM.2: 5
    • FMT_LIM.2.1: 1
    • FMT_MSA.1: 5
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 3
    • FMT_SMF.1: 4
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 7
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 8
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 6
    • FPT_ITT.1.1: 1
    • FPT_PHP.3: 7
    • FPT_PHP.3.1: 1
  • FRU:
    • FRU_FLT.2: 7
    • FRU_FLT.2.1: 1
  • FTP:
    • FTP_ITC.1: 4
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 17
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 11
    • FAU_GEN.2.1: 1
    • FAU_SAR: 1
    • FAU_SAR.1: 13
    • FAU_SAR.1.1: 2
    • FAU_SAR.1.2: 2
    • FAU_SAR.2: 10
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 11
    • FAU_SAR.3.1: 1
    • FAU_STG: 1
    • FAU_STG.1: 18
    • FAU_STG.1.1: 2
    • FAU_STG.1.2: 2
    • FAU_STG.4: 11
    • FAU_STG.4.1: 1
    • FAU_STG.4.2: 1
  • FCS:
    • FCS_CKM.1: 2
    • FCS_CKM.4: 2
    • FCS_COP.1: 10
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACF: 2
    • FDP_IFF: 2
    • FDP_ITC.1: 2
    • FDP_RIP.1: 4
    • FDP_RIP.1.1: 1
    • FDP_RIP.2: 1
  • FIA:
    • FIA_AFL.1: 6
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_PLA_EXP.1: 6
    • FIA_PLA_EXP.1.1: 1
    • FIA_SOS.1: 5
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 1
    • FIA_UAU.2: 5
    • FIA_UAU.2.1: 1
    • FIA_UAU.6: 6
    • FIA_UAU.6.1: 1
    • FIA_UID.1: 2
    • FIA_UID.2: 6
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF.1: 13
    • FMT_MOF.1.1: 2
    • FMT_MSA.2: 2
    • FMT_MTD.1: 12
    • FMT_MTD.1.1: 5
    • FMT_SMF.1: 14
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 16
    • FMT_SMR.1.1: 1
  • FPT:
    • FPT_ITT.1: 5
    • FPT_ITT.1.1: 1
    • FPT_RIP.2: 1
    • FPT_RVM.1: 5
    • FPT_RVM.1.1: 1
    • FPT_SEP: 2
    • FPT_SEP.1: 5
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
    • FPT_SEP_EXP.1: 12
    • FPT_SEP_EXP.1.1: 1
    • FPT_SEP_EXP.1.2: 1
    • FPT_STM.1: 6
    • FPT_STM.1.1: 1
  • FTA:
    • FTA_SSL.1: 6
    • FTA_SSL.1.1: 1
    • FTA_SSL.1.2: 1
    • FTA_TAB.1: 5
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_SEP.1: 1
pdf_data/st_keywords/cc_claims
  • O:
    • O.AC: 18
    • O.RND: 4
    • O.SC: 13
  • T:
    • T.RND: 3
  • A:
    • A.AUDIT_BACKUP: 1
    • A.NO_EVIL: 3
    • A.PHYSICAL: 1
    • A.SECURE_COMMS: 4
    • A.SECURE_UPDAT: 1
    • A.SECURE_UPDATES: 1
  • O:
    • O.ADMIN_GUIDANCE: 6
    • O.ADMIN_ROLE: 4
    • O.AUDIT_: 1
    • O.AUDIT_GENERATION: 6
    • O.AUDIT_PROTECT: 2
    • O.AUDIT_PROTECTION: 1
    • O.AUDIT_REVIEW: 6
    • O.CONFIGURATION_: 1
    • O.CONFIGURATION_IDENTIFI: 2
    • O.CONFIGURATION_IDENTIFIC: 3
    • O.CONFIGURATION_IDENTIFICATION: 1
    • O.CORRECT_TSF_: 1
    • O.CORRECT_TSF_OPERATIO: 2
    • O.CORRECT_TSF_OPERATION: 6
    • O.CRYPTOGRAPHY: 2
    • O.CRYTOGRAPHY: 1
    • O.DOCUMENTED_: 1
    • O.DOCUMENTED_DESIGN: 7
    • O.MANAGE: 4
    • O.PARTIAL_: 1
    • O.PARTIAL_FUNCTIONAL_TE: 2
    • O.PARTIAL_FUNCTIONAL_TES: 1
    • O.PARTIAL_FUNCTIONAL_TEST: 3
    • O.PARTIAL_FUNCTIONA_TEST: 3
    • O.PARTIAL_SELF_: 1
    • O.PARTIAL_SELF_PROTECTI: 2
    • O.PARTIAL_SELF_PROTECTIO: 3
    • O.PARTIAL_SELF_PROTECTION: 1
    • O.VIRUS: 8
    • O.VULNERABILITY_: 1
    • O.VULNERABILITY_ANALYSIS: 4
  • OE:
    • OE.AUDIT_ALARM: 4
    • OE.AUDIT_BACKUP: 3
    • OE.AUDIT_STORAGE: 5
    • OE.DISPLAY_BANNE: 1
    • OE.DISPLAY_BANNER: 2
    • OE.DOMAIN_: 3
    • OE.DOMAIN_SEPARATION: 3
    • OE.NO_BYPASS: 6
    • OE.NO_EVIL: 3
    • OE.PHYSICAL: 3
    • OE.RESIDUAL_: 2
    • OE.RESIDUAL_INFORMATION: 3
    • OE.SECURE_COMMS: 5
    • OE.SECURE_UPDAT: 1
    • OE.SECURE_UPDATES: 2
    • OE.TIME_STAMPS: 4
    • OE.TOE_ACCESS: 6
  • T:
    • T.ACCIDENTAL_AD: 1
    • T.ACCIDENTAL_ADMIN: 2
    • T.ACCIDENTAL_ADMIN_ERROR: 1
    • T.AUDIT_: 1
    • T.AUDIT_COMPROMISE: 1
    • T.MASQUERADE: 1
    • T.POOR_DESIGN: 3
    • T.POOR_IMPLEMEN: 1
    • T.POOR_IMPLEMENTATION: 1
    • T.POOR_TEST: 3
    • T.RESIDUAL_DATA: 1
    • T.TSF_COMPROMIS: 1
    • T.TSF_COMPROMISE: 3
    • T.UNATTENDED_: 1
    • T.UNATTENDED_SESSION: 1
    • T.UNIDENTIFIED_A: 1
    • T.UNIDENTIFIED_ACTIONS: 3
    • T.VIRUS: 1
    • T._AUDIT_COMPROMISE: 2
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 8
pdf_data/st_keywords/eval_facility
  • EWA:
    • EWA-Canada: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 9
  • DES:
    • DES:
      • DES: 4
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 1
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 7
    • RNG: 4
pdf_data/st_keywords/crypto_library
  • NSS:
    • NSS: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 10
    • malfunction: 3
  • SCA:
    • Leak-Inherent: 10
    • Physical Probing: 2
    • physical probing: 4
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 5
    • FIPS 180-2: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • main processor of mobile phone. The ESE-IF, the CLF chip, the Host controller and the antenna are out of scope of the TOE. All components of the TOE including guidance manuals are listed in the following: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: FeliCa Networks, Inc
  • /ChipVendor: Toshiba
  • /Company: FeliCa Networks, Inc
  • /CreationDate: D:20160708165517+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 11
  • /DocName: Security Target for Mobile FeliCa OS 3.0 on T6NE1
  • /DocNumber: F03T-ASEP01-E01-70
  • /DocVersion: 1.70
  • /IssueDate: June 2016
  • /ModDate: D:20160708171515+09'00'
  • /ModelName: T6NE1
  • /Producer: Adobe PDF Library 11.0
  • /ProductName: Mobile FeliCa OS 3.0 on T6NE1
  • /ProductType: Mobile FeliCa IC Chip
  • /SourceModified: D:20160708065621
  • pdf_file_size_bytes: 365339
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 35
  • /Author: Apex Assurance Group
  • /CreationDate: D:20080602151417Z
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20080702160337-04'00'
  • /Producer: Microsoft® Office Word 2007
  • /Subject: Symantec™ Endpoint Protection Version 11.0
  • /Title: Security Target for Common Criteria Evaluation
  • pdf_file_size_bytes: 913344
  • pdf_hyperlinks: http://www.symantec.com/, http://www.apexassurance.com/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 68
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different