name |
Alteon version 32.6.3.50 |
TCOS Passport Version 2.0 Release 2/P5CD080V0B Extended Access Control Version 2.0.2.m3 |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
ES |
DE |
status |
active |
archived |
not_valid_after |
03.05.2028 |
01.09.2019 |
not_valid_before |
03.05.2023 |
14.10.2009 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2021-42_Certificado.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2021-42-INF-4015.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0634a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2021-42_ST.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0634b_pdf.pdf |
manufacturer |
Radware, LTD. |
T-Systems Enterprise Services GmbH |
manufacturer_web |
https://www.radware.com/products/alteon/ |
https://www.t-systems.de/ |
security_level |
EAL2 |
EAL4+ |
dgst |
69b82608a6c3aa9c |
69effd70e2121fbd |
heuristics/cert_id |
2021-42-INF-4015 |
BSI-DSZ-CC-0634-2009 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
ATE_COV.2, ADV_RCR.1, ALC_TAT.1, AVA_VLA.4, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_SOF.1, ATE_IND.2, AGD_ADM.1, ADV_LLD.1, ALC_DVS.2, ALC_LCD.1, ADV_IMP.2, ATE_DPT.1, ADV_FSP.2, ADV_SPM.1, AVA_MSU.3 |
heuristics/extracted_versions |
32.6.3.50 |
2.0.2, 2.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0527-2008, BSI-DSZ-CC-0410-2007 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0446-2007, BSI-DSZ-CC-0527-2008, BSI-DSZ-CC-0518-2008, BSI-DSZ-CC-0404-2007, BSI-DSZ-CC-0410-2007 |
heuristics/scheme_data |
- category: Others
- certification_date: 03.05.2023
- enhanced:
- category: Others
- cc_version: Common Criteria 3.1 release 5
- cert_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1741
- certification_date: 03.05.2023
- description: The TOE is the Alteon version 32.6.3.50 series of products, with the TSF covering the core load balancing capabilities together with the SSL Offloading and part of the management capabilities. The TOE, thus, acts as a load balancer which redirects service request in a balanced way to multiple providing servers. As such, from hence forward the TOE may be referred as an ADC or as a load balancer interchangeably. Additionally, the TOE provides the following major security features: security audit, cryptographic support, user data protection, identification and authentication, security management, protection of the TSF, TOE access and trusted path/channel.
- evaluation_facility: Applus Laboratories
- level: EAL2
- manufacturer: RADWARE, LTD.
- report_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1742
- status: Certified
- target_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1740
- type: Product
- manufacturer: RADWARE, LTD.
- product: Alteon version 32.6.3.50
- product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/982-alteon-version-32-6-3-50
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0410-2007 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0410-2007 |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
2021-42_Certificado.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL2: 1
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author:
- /CreationDate:
- /Creator:
- /Keywords:
- /ModDate:
- /Producer:
- /Subject:
- /Title:
- /Trapped:
- pdf_file_size_bytes: 892166
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
|
pdf_data/report_filename |
2021-42-INF-4015.pdf |
0634a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cert_id: BSI-DSZ-CC-0634-2009
- cert_item: TCOS Passport Version 2.0 Release 2 / P5CD080V0B Extended Access Control Version 2.0.2.m3
- cert_lab: BSI
- developer: T-Systems Enterprise Services GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0410-2007: 1
- BSI-DSZ-CC-0527-2008: 3
- BSI-DSZ-CC-0634-2009: 20
- BSI-DSZ-CC-S-0002-2009: 2
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP-0002-2001: 1
- BSI-PP-0026: 4
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 2: 9
- EAL 4: 2
- ITSEC:
|
- EAL:
- EAL 1: 1
- EAL 4: 11
- EAL 4 augmented: 3
- EAL 7: 1
- EAL1: 5
- EAL2: 3
- EAL3: 4
- EAL4: 5
- EAL5: 6
- EAL6: 3
- EAL7: 4
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_TDS.1: 1
- AGD:
- ALC:
- ALC_CMC.2: 1
- ALC_DEL.1: 1
- ALC_FLR: 2
- ASE:
- ASE_CCL.1: 1
- ASE_INT.1: 1
- ASE_REQ.2: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_IND.2: 1
- AVA:
|
- ACM:
- ACM_AUT: 2
- ACM_AUT.1: 1
- ACM_CAP: 2
- ACM_CAP.4: 1
- ACM_SCP: 2
- ACM_SCP.2: 1
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 1
- ADO_IGS: 2
- ADO_IGS.1: 1
- ADV:
- ADV_FSP: 2
- ADV_HLD: 2
- ADV_IMP: 2
- ADV_IMP.2: 5
- ADV_INT: 2
- ADV_LLD: 2
- ADV_RCR: 2
- ADV_SPM: 2
- AGD:
- ALC:
- ALC_DVS: 2
- ALC_DVS.2: 6
- ALC_FLR: 2
- ALC_LCD: 1
- ALC_LCD.1: 1
- ALC_TAT: 2
- ALC_TAT.1: 1
- APE:
- APE_DES: 1
- APE_ENV: 1
- APE_INT: 1
- APE_OBJ: 1
- APE_REQ: 1
- APE_SRE: 1
- ASE:
- ASE_DES: 1
- ASE_ENV: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_PPC: 1
- ASE_REQ: 1
- ASE_SRE: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 2
- ATE_DPT: 2
- ATE_FUN: 4
- ATE_IND: 4
- AVA:
- AVA_CCA: 2
- AVA_MSU: 2
- AVA_MSU.3: 5
- AVA_SOF: 3
- AVA_VLA: 5
- AVA_VLA.2: 1
- AVA_VLA.3: 1
- AVA_VLA.4: 6
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 1
- FAU_STG.1: 1
- FCS:
- FCS_CKM.2: 1
- FCS_HTS.1: 1
- FCS_TLS: 1
- FCS_TLS.2: 1
- FDP:
- FIA:
- FIA_AFL.1: 1
- FIA_UID.2: 1
- FMT:
- FMT_MSA.1: 1
- FMT_SMF.1: 1
- FPT:
- FTA:
- FTP:
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Infineon:
- Infineon Technologies AG: 1
- NXP:
- Philips:
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 3
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
- TLS:
- SSL:
- TLS:
- TLS: 1
- TLS1.2: 1
- TLS1.3: 2
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
- EF:
- EF.DG14: 2
- EF.DG2: 2
- EF.DG3: 6
|
pdf_data/report_keywords/standard_id |
|
- BSI:
- AIS 25: 1
- AIS 26: 1
- AIS 32: 1
- AIS 34: 2
- AIS 36: 2
- AIS 38: 1
- FIPS:
- FIPS 180-2: 1
- FIPS 46-3: 1
- ICAO:
- ISO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- 36 for the Product NXP P5CD080V0B Secure Smart Card Controller, Version 1.2, 23.06.2009, T-Systems (confidential document) [14] Certification Report for NXP Secure Smart Card Controller P5CD080V0B, P5CN080V0B and: 1
- Access Control Version 2.0.2.m3, Evaluation Body for IT-Security of TÜV Informationstechnik GmbH (confidential document) [8] Machine Readable Travel Document with „ICAO Application", Extended Access Control, BSI-PP-0026: 1
- und TCOS Passport Version 2.0 Release 2 / SLE66CLX800PE, Version 0.68, 06.10.2009, T-Systems (confidential document) [16] Administrator’s Guide for TCOS Passport Version 2.0 Release 2-EAC, Version 1.0, 30.06.2008: 1
|
pdf_data/report_metadata |
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20091119105018+01'00'
- /Creator: Writer
- /Keywords: "Common Criteria, CC 2.3, Zertifizierung, MRTD, T-Systems, TCOS, EAC, ePass"
- /ModDate: D:20091119154048+01'00'
- /Producer: StarOffice 9
- /Subject: Common Criteria Certification
- /Title: Certification Report TCOS Passport Version 2.0 Release 2 / P5CD080V0B Extended Access Control Version 2.0.2.m3
- pdf_file_size_bytes: 982474
- pdf_hyperlinks: http://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 36
|
pdf_data/st_filename |
2021-42_ST.pdf |
0634b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0410-2007: 1
- BSI-DSZ-CC-0634: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP-0002: 1
- BSI-PP-0026: 1
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 24
- EAL 4 augmented: 1
- EAL 5: 2
- EAL4: 12
- EAL4 augmented: 2
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 2
- ALC_DEL.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 2
- AVA:
|
- ACM:
- ACM_AUT.1: 2
- ACM_CAP.4: 2
- ACM_SCP: 1
- ACM_SCP.2: 1
- ADO:
- ADO_DEL.2: 2
- ADO_GEL: 1
- ADO_IGS: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP: 4
- ADV_FSP.1: 2
- ADV_FSP.2: 1
- ADV_HLD: 4
- ADV_HLD.2: 2
- ADV_IMP: 2
- ADV_IMP.1: 1
- ADV_IMP.2: 10
- ADV_LLD: 2
- ADV_LLD.1: 3
- ADV_RCR: 2
- ADV_RCR.1: 2
- ADV_SPM: 1
- ADV_SPM.1: 4
- AGD:
- AGD_ADM: 1
- AGD_ADM.1: 3
- AGD_USR: 1
- AGD_USR.1: 3
- ALC:
- ALC_DVS: 2
- ALC_DVS.2: 9
- ALC_LCD: 1
- ALC_LCD.1: 1
- ALC_TAT: 1
- ALC_TAT.1: 3
- ATE:
- ATE_COV: 1
- ATE_COV.2: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_MSU: 1
- AVA_MSU.3: 7
- AVA_SOF: 1
- AVA_SOF.1: 1
- AVA_VLA: 1
- AVA_VLA.4: 7
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 2
- FAU_GEN.1: 9
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_STG: 2
- FAU_STG.1: 7
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 6
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM: 6
- FCS_CKM.1: 6
- FCS_CKM.2: 7
- FCS_CKM.2.1: 1
- FCS_CKM.4: 8
- FCS_CKM.4.1: 1
- FCS_COP: 4
- FCS_HTS: 4
- FCS_HTS.1: 10
- FCS_HTS.1.1: 2
- FCS_HTS.1.2: 2
- FCS_TLS: 20
- FCS_TLS.1: 8
- FCS_TLS.1.1: 3
- FCS_TLS.1.2: 3
- FCS_TLS.1.3: 3
- FCS_TLS.2: 7
- FCS_TLS.2.1: 2
- FCS_TLS.2.2: 2
- FCS_TLS.2.3: 2
- FDP:
- FDP_ACC.1: 1
- FDP_IFC: 1
- FDP_IFC.1: 10
- FDP_IFC.1.1: 1
- FDP_IFF: 1
- FDP_IFF.1: 8
- FDP_IFF.1.1: 2
- FDP_IFF.1.2: 2
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC.1: 2
- FDP_ITC.2: 2
- FIA:
- FIA_AFL: 1
- FIA_AFL.1: 6
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 2
- FIA_UAU: 1
- FIA_UAU.1: 2
- FIA_UAU.2: 9
- FIA_UAU.2.1: 1
- FIA_UID: 1
- FIA_UID.1: 6
- FIA_UID.2: 11
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA: 2
- FMT_MSA.1: 7
- FMT_MSA.1.1: 1
- FMT_MSA.3: 9
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF: 1
- FMT_SMF.1: 11
- FMT_SMF.1.1: 1
- FMT_SMR: 1
- FMT_SMR.1: 5
- FMT_SMR.2: 9
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_STM: 1
- FPT_STM.1: 8
- FPT_STM.1.1: 1
- FTA:
- FTA_SSL: 2
- FTA_SSL.3: 6
- FTA_SSL.3.1: 1
- FTA_SSL.4: 6
- FTA_SSL.4.1: 1
- FTP:
- FTP_ITC: 5
- FTP_ITC.1: 13
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 3
- FTP_TRP.1: 12
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_SAS: 4
- FAU_SAS.1: 13
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 62
- FCS_CKM.1: 47
- FCS_CKM.2: 10
- FCS_CKM.4: 53
- FCS_COP: 119
- FCS_COP.1: 28
- FCS_RND: 23
- FCS_RND.1: 10
- FCS_RND.1.1: 1
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 26
- FDP_ACC.1.1: 1
- FDP_ACF: 2
- FDP_ACF.1: 17
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 2
- FDP_DAU: 7
- FDP_DAU.1: 4
- FDP_IFC.1: 9
- FDP_ITC.1: 27
- FDP_ITC.2: 28
- FDP_ITT.1: 1
- FDP_UCT: 16
- FDP_UCT.1: 5
- FDP_UIT: 16
- FDP_UIT.1: 5
- FIA:
- FIA_AFL: 1
- FIA_AFL.1: 8
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_API: 24
- FIA_API.1: 8
- FIA_API.1.1: 1
- FIA_UAU: 72
- FIA_UAU.1: 12
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 9
- FIA_UAU.5: 7
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 2
- FIA_UAU.6: 8
- FIA_UID: 1
- FIA_UID.1: 15
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_LIM: 4
- FMT_LIM.1: 20
- FMT_LIM.1.1: 2
- FMT_LIM.2: 18
- FMT_LIM.2.1: 2
- FMT_MDT.3: 1
- FMT_MSA.1: 3
- FMT_MSA.2: 37
- FMT_MSA.3: 4
- FMT_MTD: 73
- FMT_MTD.1: 10
- FMT_MTD.3: 10
- FMT_MTD.3.1: 1
- FMT_SMF.1: 27
- FMT_SMF.1.1: 1
- FMT_SMR.1: 28
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_AMT.1: 1
- FPT_FLS: 1
- FPT_FLS.1: 12
- FPT_FLS.1.1: 1
- FPT_ITT.1: 1
- FPT_PHP: 1
- FPT_PHP.3: 11
- FPT_PHP.3.1: 1
- FPT_RVM: 1
- FPT_RVM.1: 10
- FPT_RVM.1.1: 1
- FPT_SEP: 1
- FPT_SEP.1: 14
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_TST: 2
- FPT_TST.1: 9
- FPT_TST.1.1: 2
- FPT_TST.1.2: 1
- FPT_TST.1.3: 2
- FRU:
- FTP:
- FTP_ITC.1: 9
- FTP_TRP.1: 8
|
pdf_data/st_keywords/cc_claims |
- A:
- A.LIMITED_FUNCTIONALITY: 2
- A.MANAGEMENT_SEPARATION: 2
- A.NO_EVIL: 3
- A.PHYSICAL_PROTECTION: 3
- O:
- O.ACCESS: 9
- O.ADMINISTRATION: 7
- O.AUDIT: 11
- O.TRAFFIC_FLOW: 9
- O.TRUSTED_CHANNELS: 8
- OE:
- OE.NO_GENERAL_PURPOSE: 4
- OE.PHYSICAL_SECURITY: 5
- OE.TRUESTED_ADMINS: 1
- OE.TRUSTED_ADMINS: 5
- OSP:
- OSP.ACCOUNTABILITY: 3
- OSP.LOGS: 2
- OSP.ROLES: 3
- OSP.TRUSTED_ADMINISTRATORS: 2
- T:
- T.PASSWORD_CRACKING: 4
- T.UNBALANCED_LOAD: 3
- T.UNDETECTED_ACTIVITIES: 2
- T.WEAK_CRYPTOGRAPHY: 3
- T.WEAK_ENDPOINTS: 2
|
- O:
- O.CONFIG: 1
- O.HW_AES: 1
- O.MEM_ACCESS: 1
- O.MF_FW: 1
- O.RND: 2
- O.SFR_ACCESS: 1
- OT:
- T:
|
pdf_data/st_keywords/vendor |
|
- NXP:
- NXP: 3
- NXP Semiconductors: 1
|
pdf_data/st_keywords/eval_facility |
|
- TSystems:
- T-Systems International: 2
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- SSH:
- TLS:
- SSL:
- SSL: 16
- SSL 2.0: 5
- SSL 3.0: 5
- TLS:
- TLS: 47
- TLS 1.0: 5
- TLS 1.1: 5
- TLS 1.2: 7
- TLS 1.3: 10
- TLS1.2: 1
- TLS1.3: 3
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- secp256r1: 3
- secp384r1: 3
- secp521r1: 3
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: 4
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 4
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 4
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 4
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 4
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 4
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 4
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 4
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 4
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 4
- TLS_RSA_WITH_AES_128_CBC_SHA256: 4
- TLS_RSA_WITH_AES_128_GCM_SHA256: 4
- TLS_RSA_WITH_AES_256_GCM_SHA384: 4
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 7
- Physical Tampering: 5
- Physical tampering: 1
- fault injection: 1
- malfunction: 5
- physical tampering: 2
- SCA:
- DPA: 1
- Leak-Inherent: 4
- Physical Probing: 2
- physical probing: 3
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.COM: 15
- EF.DG1: 33
- EF.DG13: 4
- EF.DG14: 9
- EF.DG15: 1
- EF.DG16: 33
- EF.DG2: 13
- EF.DG3: 20
- EF.DG4: 16
- EF.DG5: 11
- EF.SOD: 9
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- RFC:
- RFC 2818: 2
- RFC 4253: 1
- RFC 5246: 20
- RFC 5288: 16
- RFC 5289: 32
- RFC 8446: 24
- RFC2818: 1
- RFC3164: 4
- RFC5246: 2
- RFC5288: 1
- RFC5289: 1
- RFC5424: 4
- RFC8446: 5
|
- BSI:
- AIS 31: 1
- AIS 36: 1
- AIS31: 7
- AIS36: 4
- CC:
- CCMB-2005-08-001: 1
- CCMB-2005-08-002: 1
- CCMB-2005-08-003: 1
- CCMB-2005-08-004: 1
- FIPS:
- FIPS 180-2106: 1
- FIPS 180-2124: 1
- FIPS 180-214: 1
- FIPS 180-2142: 1
- FIPS 46-3: 3
- FIPS PUB 180-2: 1
- FIPS PUB 46-3: 1
- FIPS180: 2
- FIPS46: 2
- ICAO:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816-4: 1
- RFC:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
- /Author: T-Systems Enterprise Services GmbH
- /CreationDate: D:20090824020002
- /Creator: T-Systems AFPL Ghostscript
- /Keywords: Extended Access Control
- /ModDate: D:20091008153812+02'00'
- /Producer: GPL Ghostscript 8.64
- /Subject: TCOS Passport Version 2.0 Release 2 EAC
- /Title: TCOS Passport Version 2.0 Release 2_EAC P5CD080V0B.doc
- pdf_file_size_bytes: 736363
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 131
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |