name |
HiRDB / Single Server Version 7 07-03 |
Sony Xperia™ X and Sony Xperia™ X Performance |
category |
Databases |
Mobility |
scheme |
JP |
SE |
status |
archived |
archived |
not_valid_after |
07.10.2013 |
07.12.2021 |
not_valid_before |
22.11.2006 |
07.12.2016 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ccra%20cert%20sony%20x.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0065_ecvr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20Sony%20X.pdf |
st_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Sony-CC-SecurityTarget_v1.2(348227)_TMP.pdf |
manufacturer |
Hitachi, Ltd. |
Sony Mobile Communications Inc. |
manufacturer_web |
https://www.hitachi.com/ |
https://www.sonymobile.com/se/ |
security_level |
EAL1 |
EAL1 |
dgst |
6b0ce7e3167a63fb |
69e48d085b8d8069 |
heuristics/cert_id |
JISEC-CC-CRP-C0065 |
CSEC2010003 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
{} |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, ALC_TSU_EXT.1, AGD_PRE.1 |
heuristics/extracted_versions |
7, 07, 03 |
- |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0098
- certification_date:
- claim: EAL1
- enhanced:
- assurance_level: EAL1
- description: PRODUCT DESCRIPTION This TOE(HiRDB / Single Server Version 8) is a software product for Relational Database Management System(RDBMS). The TOE acts as a database server and provides access to the information stored in the database. Users generally access to the information stored in the database by requests for SQL execution at HiRDB server from HiRDB clients. The TOE provides functions that work for various and efficient data manipulation to meet the needs of users. And it also provides security functions that restrict access to user data to authorized users. Security functions of the TOE include the following. - Audit - Discretionary Access Control - Identification and Authentication - Security Management
- evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
- product: HiRDB / Single Server Version 8
- product_type: IT Product (Data Base Management System)
- toe_version: 08-01
- vendor: Hitachi, Ltd.
- expiration_date: 01.10.2013
- supplier: Hitachi, Ltd.
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0098_it7133.html
- toe_japan_name: HiRDB / Single Server Version 8 08-01
- toe_overseas_link: None
- toe_overseas_name: -----
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
b43e1d04965c0a49 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_md_v2.0.pdf |
pdf_data/cert_filename |
|
ccra cert sony x.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /CreationDate: D:20170403155121+02'00'
- /ModDate: D:20230313140935+01'00'
- pdf_file_size_bytes: 261750
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
c0065_ecvr.pdf |
Certification Report Sony X.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- Certification No. C0065: 1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ALC_TSU_EXT.1: 3
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
- CVE:
- CVE-2016-0839: 1
- CVE-2016-0841: 1
- CVE-2016-2428: 1
- CVE-2016-2429: 1
- CVE-2016-2463: 1
- CVE-2016-2464: 1
- CVE-2016-2506: 1
- CVE-2016-2507: 1
- CVE-2016-2508: 1
- CVE-2016-3741: 1
- CVE-2016-3742: 1
- CVE-2016-3743: 1
- CVE-2016-3820: 1
- CVE-2016-3821: 1
- CVE-2016-3822: 1
- CVE-2016-3840: 1
- CVE-2016-3861: 1
- CVE-2016-3862: 1
- CVE-2016-3863: 1
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- FIPS:
- ISO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- OutOfScope:
- expected to return to its user. Note: Defending against device re-use after physical compromise is out of scope for this protection profile. T.FLAWAPP: Malicious or Flawed Application Swedish Certification Body: 1
- out of scope: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20061122204438+09'00'
- /ModDate: D:20061122204438+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 20053
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Ansvarigt Område/enhet: CSEC
- /Author: Imre Juhász
- /C-datum: 2008
- /CSECID:
- /Category:
- /Comments:
- /Company:
- /ContentTypeId: 0x010100F76CA16D2B00D340871F443D8708C84D010072C770E6C96E7A4EA94967F9D5C0E603
- /CreationDate: D:20170403103416+02'00'
- /Creator: Acrobat PDFMaker 11 för Word
- /Current Version:
- /DDocBinder: Scheme (CB)
- /DDocCabinet: QMS
- /DDocID: 2005-03-05-64D6-T9YR
- /DDocLastModDate: 2006-03-16 10:56:39
- /DDocLibrary: https://haddock.fmv.se/domdoc/CSECLib.nsf
- /DDocRevision: 3,7
- /DDocTitle: 035 CB General Document - Template
- /Datum, skapat: -
- /Deluppdragsbenämning:
- /Dokument Status: Aktiv
- /Dokumentansvarig: Imre Juhász
- /Dokumentansvarigs enhet: KC Ledsyst
- /Dokumentbeteckning:
- /Dokumentdatum: 2017-04-03
- /Dokumenttitel: Certification Report Sony Xperia X and Sony Xperia X Performance
- /Dokumenttyp: CB
- /FMV_beteckning: 16FMV2071-76:1
- /Fastställarens roll: Certifier
- /Fastställt av: Imre Juhász
- /Fastställt av1: Imre Juhász
- /Giltigt från: -
- /Infoklass: HEMLIG/
- /Informationsklass:
- /Keywords:
- /Klassificeringsnr: 25 550
- /MallVersion: 7.0
- /ModDate: D:20170403124210+02'00'
- /Paragraf:
- /Platina: 1
- /Producer: Adobe PDF Library 11.0
- /Referens ID: CSEC-37-1156
- /Sekr. gäller tom.: -
- /SourceModified: D:20170403083341
- /Stämpel: 1
- /Subject: 16FMV2071-76:1
- /Title: Certification Report Sony Xperia X and Sony Xperia X Performance
- /Uncontrolled: 0.000000
- /Uppdragsbenämning:
- /Utgåva: 2.0
- /_dlc_DocId: CSEC-37-1156
- /_dlc_DocIdItemGuid: 671c079c-346d-423e-ac5c-f1312a8a09be
- /_dlc_DocIdUrl: http://sp.fmv.se/sites/CSEC/_layouts/15/DocIdRedir.aspx?ID=CSEC-37-1156, CSEC-37-1156
- pdf_file_size_bytes: 145099
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 18
|
pdf_data/st_filename |
|
Sony-CC-SecurityTarget_v1.2(348227)_TMP.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ALC_TSU_EXT: 1
- ALC_TSU_EXT.1: 3
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 3
- ASE_TSS.1: 1
- ATE:
- AVA:
|
pdf_data/st_keywords/cc_sfr |
|
- FCS:
- FCS_CKM: 2
- FCS_CKM.1: 14
- FCS_CKM.1.1: 2
- FCS_CKM.2: 1
- FCS_CKM.2.1: 6
- FCS_CKM_EXT.1: 3
- FCS_CKM_EXT.1.1: 2
- FCS_CKM_EXT.1.2: 1
- FCS_CKM_EXT.1.3: 1
- FCS_CKM_EXT.1.4: 2
- FCS_CKM_EXT.2: 3
- FCS_CKM_EXT.2.1: 1
- FCS_CKM_EXT.3: 4
- FCS_CKM_EXT.3.1: 1
- FCS_CKM_EXT.3.2: 1
- FCS_CKM_EXT.4: 3
- FCS_CKM_EXT.4.1: 2
- FCS_CKM_EXT.4.2: 1
- FCS_CKM_EXT.5: 3
- FCS_CKM_EXT.5.1: 1
- FCS_CKM_EXT.5.2: 1
- FCS_CKM_EXT.6: 3
- FCS_CKM_EXT.6.1: 1
- FCS_CKM_EXT.7: 3
- FCS_CKM_EXT.7.1: 1
- FCS_COP: 1
- FCS_COP.1: 34
- FCS_COP.1.1: 5
- FCS_RBG: 1
- FCS_RBG_EXT.1: 12
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FCS_RBG_EXT.1.3: 1
- FCS_SRV: 1
- FCS_SRV_EXT.1: 4
- FCS_SRV_EXT.1.1: 1
- FCS_STG: 1
- FCS_STG_EXT.1: 3
- FCS_STG_EXT.1.1: 1
- FCS_STG_EXT.1.2: 1
- FCS_STG_EXT.1.3: 1
- FCS_STG_EXT.1.4: 1
- FCS_STG_EXT.1.5: 1
- FCS_TLSC: 1
- FCS_TLSC_EXT.1: 3
- FCS_TLSC_EXT.1.1: 2
- FCS_TLSC_EXT.1.2: 1
- FCS_TLSC_EXT.1.3: 1
- FCS_TLSC_EXT.1.4: 1
- FCS_TLSC_EXT.1.5: 1
- FCS_TLSC_EXT.2: 5
- FCS_TLSC_EXT.2.1: 1
- FCS_TLSC_EXT.2.2: 1
- FCS_TLSC_EXT.2.3: 1
- FCS_TLSC_EXT.2.4: 1
- FCS_TLSC_EXT.2.5: 1
- FDP:
- FDP_ACF: 2
- FDP_ACF_EXT.1: 3
- FDP_ACF_EXT.1.1: 1
- FDP_ACF_EXT.1.2: 1
- FDP_DAR: 2
- FDP_DAR_EXT.1: 3
- FDP_DAR_EXT.1.1: 1
- FDP_DAR_EXT.1.2: 1
- FDP_IFC: 2
- FDP_IFC_EXT.1: 4
- FDP_IFC_EXT.1.1: 1
- FDP_STG: 2
- FDP_STG_EXT.1: 3
- FDP_STG_EXT.1.1: 1
- FDP_UPC: 2
- FDP_UPC_EXT.1: 3
- FDP_UPC_EXT.1.1: 1
- FDP_UPC_EXT.1.2: 1
- FIA:
- FIA_AFL: 2
- FIA_AFL_EXT.1: 4
- FIA_AFL_EXT.1.1: 1
- FIA_AFL_EXT.1.2: 1
- FIA_AFL_EXT.1.3: 1
- FIA_BLT: 2
- FIA_BLT_EXT.1: 3
- FIA_BLT_EXT.1.1: 1
- FIA_PAE: 2
- FIA_PAE_EXT.1: 4
- FIA_PMG: 2
- FIA_PMG_EXT.1: 3
- FIA_PMG_EXT.1.1: 1
- FIA_TRT: 2
- FIA_TRT_EXT.1: 3
- FIA_TRT_EXT.1.1: 1
- FIA_UAU: 2
- FIA_UAU.7: 2
- FIA_UAU.7.1: 1
- FIA_UAU_EXT.1: 3
- FIA_UAU_EXT.1.1: 1
- FIA_UAU_EXT.2: 4
- FIA_UAU_EXT.2.1: 1
- FIA_UAU_EXT.2.2: 1
- FIA_UAU_EXT.3: 3
- FIA_UAU_EXT.3.1: 1
- FMT:
- FMT_MOF: 2
- FMT_MOF_EXT.1: 3
- FMT_MOF_EXT.1.1: 3
- FMT_MOF_EXT.1.2: 3
- FMT_SMF: 2
- FMT_SMF_EXT.1: 14
- FMT_SMF_EXT.1.1: 2
- FMT_SMF_EXT.2: 3
- FMT_SMF_EXT.2.1: 1
- FPT:
- FPT_AEX: 2
- FPT_AEX_EXT.1: 3
- FPT_AEX_EXT.1.1: 1
- FPT_AEX_EXT.1.2: 1
- FPT_AEX_EXT.2: 3
- FPT_AEX_EXT.2.1: 1
- FPT_AEX_EXT.3: 3
- FPT_AEX_EXT.3.1: 1
- FPT_AEX_EXT.4: 3
- FPT_AEX_EXT.4.1: 1
- FPT_AEX_EXT.4.2: 1
- FPT_KST: 2
- FPT_KST_EXT.1: 3
- FPT_KST_EXT.1.1: 1
- FPT_KST_EXT.2: 3
- FPT_KST_EXT.2.1: 1
- FPT_KST_EXT.3: 3
- FPT_KST_EXT.3.1: 1
- FPT_NOT: 1
- FPT_NOT_EXT.1: 3
- FPT_NOT_EXT.1.1: 1
- FPT_STM: 2
- FPT_STM.1: 2
- FPT_STM.1.1: 1
- FPT_TST: 2
- FPT_TST_EXT.1: 3
- FPT_TST_EXT.1.1: 1
- FPT_TST_EXT.2: 3
- FPT_TST_EXT.2.1: 1
- FPT_TUD: 2
- FPT_TUD_EXT.1: 3
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FPT_TUD_EXT.2: 3
- FPT_TUD_EXT.2.1: 1
- FPT_TUD_EXT.2.2: 1
- FPT_TUD_EXT.2.3: 1
- FPT_TUD_EXT.2.4: 1
- FPT_TUD_EXT.2.6: 1
- FTA:
- FTA_SSL: 2
- FTA_SSL_EXT.1: 3
- FTA_SSL_EXT.1.1: 1
- FTA_SSL_EXT.1.2: 1
- FTA_SSL_EXT.1.3: 1
- FTA_TAB.1: 2
- FTA_TAB.1.1: 1
- FTA_WSE: 2
- FTA_WSE_EXT.1: 3
- FTA_WSE_EXT.1.1: 1
- FTP:
- FTP_ITC: 2
- FTP_ITC_EXT.1: 3
- FTP_ITC_EXT.1.1: 1
- FTP_ITC_EXT.1.2: 1
- FTP_ITC_EXT.1.3: 1
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.CONFIG: 1
- A.NOTIFY: 1
- A.PRECAUTION: 1
- O:
- O.AUTH: 1
- O.COMMS: 1
- O.CONFIG: 1
- O.INTEGRITY: 1
- O.STORAGE: 1
- OE:
- OE.CONFIG: 1
- OE.NOTIFY: 1
- OE.PRECAUTION: 1
- T:
- T.EAVESDROP: 1
- T.FLAWAPP: 2
- T.NETWORK: 1
- T.PERSISTENT: 2
- T.PHYSICAL: 3
|
pdf_data/st_keywords/vendor |
|
- Broadcom:
- Microsoft:
- Qualcomm:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- AES:
- AES: 27
- AES-: 1
- AES-256: 1
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-2: 1
- SHA-224: 1
- SHA-256: 8
- SHA-384: 2
- SHA-512: 2
- SHA256: 2
- SHA384: 1
- SHA512: 1
- scrypt:
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
- IKE:
- IPsec:
- TLS:
- TLS:
- TLS: 25
- TLS 1.0: 2
- TLS 1.1: 2
- TLS 1.2: 4
- TLS v1.0: 1
- VPN:
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
- CBC:
- CCM:
- CTR:
- ECB:
- GCM:
- XTS:
|
pdf_data/st_keywords/ecc_curve |
|
- NIST:
- NIST P-224: 1
- P-224: 1
- P-256: 10
- P-384: 10
- P-521: 10
- secp256r1: 3
- secp384r1: 3
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 2
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 2
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 2
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 2
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 2
- TLS_RSA_WITH_AES_128_CBC_SHA: 4
- TLS_RSA_WITH_AES_256_CBC_SHA: 4
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
- ARM:
- ARM TrustZone: 1
- TrustZone: 1
- IBM:
- other:
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- CC:
- FIPS:
- FIPS 104-2: 1
- FIPS 140-2: 6
- FIPS 180-4: 3
- FIPS 186-2: 1
- FIPS 186-4: 5
- FIPS 197: 5
- FIPS 198-1: 3
- FIPS PUB 186-4: 8
- FIPS PUB 197: 4
- NIST:
- NIST SP 800-108: 1
- NIST SP 800-132: 2
- NIST SP 800-38A: 2
- NIST SP 800-38C: 2
- NIST SP 800-38D: 2
- NIST SP 800-38E: 2
- NIST SP 800-38F: 4
- NIST SP 800-57: 2
- SP 800-38: 4
- SP 800-56A: 2
- SP 800-90A: 1
- RFC:
- RFC 2818: 2
- RFC 4346: 2
- RFC 4492: 8
- RFC 5246: 14
- RFC 5280: 4
- RFC 5289: 4
- RFC 5759: 2
- RFC 6125: 2
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
- com:
- com.android.voicemail.permission: 1
- java:
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- These services, including some specific Xperia in Business services, such as Xperia Care, are out of scope of the TOE. 1 Much of the information provided in this section originates from the Android Security: 1
- expected to return to its user. Note: Defending against device re-use after physical compromise is out of scope for this protection profile. T.FLAWAPP Malicious or Flawed Application Applications loaded onto the: 1
- out of scope: 2
|
pdf_data/st_metadata |
|
- /AAPL:Keywords: []
- /Author: Rasma
- /CreationDate: D:20170127123826Z
- /Creator: Word
- /Keywords:
- /ModDate: D:20170403152705+02'00'
- /Producer: Mac OS X 10.12.2 Quartz PDFContext
- /Subject:
- /Title: Sony-CC-SecurityTarget_v1.2
- pdf_file_size_bytes: 1236228
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 61
|
state/cert/convert_garbage |
False |
True |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
False |
True |
state/st/download_ok |
False |
True |
state/st/extract_ok |
False |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |