name |
Sony IC with Operating System for Mobile CXD3715GG/GU-x, version 0701 |
PR/SM for IBM z16 and IBM LinuxONE 4 Systems Driver Level 51C with Bundle Level 19B (D51C/B19B) |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
Other Devices and Systems |
scheme |
UK |
DE |
status |
archived |
active |
not_valid_after |
30.04.2013 |
10.03.2029 |
not_valid_before |
24.01.2006 |
11.03.2024 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1222c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP240.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1222a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST%20Public%20v1.04.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1222b_pdf.pdf |
manufacturer |
Sony Corporation |
IBM Corporation |
manufacturer_web |
https://www.sony.com/ |
https://www.ibm.com |
security_level |
EAL4 |
ALC_TAT.3, AVA_VAN.5, EAL5+, ATE_FUN.2, ALC_FLR.3 |
dgst |
794b142b57afbe13 |
3f9c694a84d34fd9 |
heuristics/cert_id |
CRP240 |
BSI-DSZ-CC-1222-2024 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ATE_IND.2, ALC_DVS.1, ADV_FSP.2, ATE_FUN.1, ADV_SPM.1, ATE_COV.2, AGD_USR.1, ADV_LLD.1, ADV_RCR.1, AGD_ADM.1, ALC_TAT.1, AVA_MSU.2, ADV_HLD.2, AVA_VLA.2, ALC_LCD.1, ATE_DPT.1, AVA_SOF.1, ADV_IMP.1 |
AVA_VAN.5, ADV_ARC.1, ATE_COV.2, ADV_FSP.5, ASE_TSS.1, AGD_OPE.1, ADV_IMP.1, ALC_FLR.3, ATE_DPT.3, ALC_DVS.1, ADV_TDS.4, ASE_REQ.2, ATE_FUN.2, AGD_PRE.1, ATE_IND.2, ASE_CCL.1, ALC_LCD.1, ASE_ECD.1, ALC_DEL.1, ASE_OBJ.2, ASE_INT.1, ADV_INT.2, ASE_SPD.1, ALC_TAT.3, ALC_CMS.5, ALC_CMC.4 |
heuristics/extracted_versions |
0701 |
4 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-1186-2023 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0900-2014, BSI-DSZ-CC-0793-2012, BSI-DSZ-CC-1109-2019, BSI-DSZ-CC-0953-2015, BSI-DSZ-CC-0846-2013, BSI-DSZ-CC-1048-2018, BSI-DSZ-CC-1186-2023, BSI-DSZ-CC-1005-2016, BSI-DSZ-CC-1160-2021, BSI-DSZ-CC-1133-2020, BSI-DSZ-CC-0715-2011 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
|
1222c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL 5: 1
- EAL 5 augmented: 1
|
pdf_data/cert_keywords/cc_sar |
|
- ALC:
- ALC_FLR: 1
- ALC_FLR.3: 1
- ALC_TAT.3: 1
- ATE:
- AVA:
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Keywords: "Common Criteria, Certification, Zertifizierung, PR/SM for IBM z16 and IBM LinuxONE 4 Systems, Driver Level 51C with Bundle Level 19B (D51C/B19B), BSI-DSZ-CC-1222-2024"
- /Subject: Common Criteria, Certification, Zertifizierung, PR/SM for IBM z16 and IBM LinuxONE 4 Systems, Driver Level 51C with Bundle Level 19B (D51C/B19B), BSI-DSZ-CC-1222-2024
- /Title: Certificate BSI-DSZ-CC-1222-2024
- pdf_file_size_bytes: 339351
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
CRP240.pdf |
1222a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 5 augmented by ALC_FLR.3, ALC_TAT.3, ATE_FUN.2, AVA_VAN.5 valid until: 10 March 2029
- cc_version: Product specific Security Target Common Criteria Part 2 conformant
- cert_id: BSI-DSZ-CC-1222-2024
- cert_item: PR/SM for IBM z16 and IBM LinuxONE 4 Systems Driver Level 51C with Bundle Level 19B (D51C/B19B
- cert_lab: BSI
- developer: IBM Corporation
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: None
|
pdf_data/report_keywords/cc_cert_id |
- UK:
- CERTIFICATION REPORT No. P240: 1
|
- DE:
- BSI-DSZ-CC-1186: 1
- BSI-DSZ-CC-1186-2023: 3
- BSI-DSZ-CC-1222-2024: 15
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 2: 3
- EAL 4: 4
- EAL 5: 4
- EAL 5 augmented: 3
- EAL 5+: 1
- EAL 6: 1
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_FSP.5: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- ALC:
- ALC_CMS.5: 1
- ALC_FLR: 3
- ALC_FLR.3: 4
- ALC_TAT.3: 5
- ATE:
- ATE_DPT.3: 1
- ATE_FUN.2: 5
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCIMB-2004-01-001: 1
- CCIMB-2004-01-002: 1
- CCIMB-2004-01-003: 1
- CCIMB-2004-01-004: 1
|
- BSI:
- AIS 32: 1
- AIS 34: 1
- AIS 38: 1
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- OutOfScope:
- by Common Criteria EAL4. However the configuration and personalisation of the TOE by the issuer is out of scope,as is the operation of the transport or payment scheme etc. 14. The contactless and contact: 1
- interfaces. The reader/writer device, host device and any other supporting IT infrastructure are out of scope. The TOE comprises the operating system and IC hardware (Mask ROM, SRAM, EEPROM, Logic circuits and: 1
- out of scope: 2
|
- ConfidentialDocument:
- Report, Version 4, 2024-01-25, Final Evaluation Technical Report, atsec information security GmbH (confidential document) [8] IBM zSystems and LinuxONE Processor Resource/Systems Manager Planning, Version SB10-7178-01: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
- OutOfScope:
- out of scope: 1
- the security test suite FTP06 must be included in the driver regression testing, which however is out of scope for this evaluation The combination of the above ensures that changes to the driver, including: 1
|
pdf_data/report_metadata |
- /Author: CESG
- /CreationDate: D:20060208162208Z
- /Creator: cp240_cr_1.02 - Microsoft Word
- /ModDate: D:20120106121536Z
- /Producer: Acrobat PDFWriter 5.0 for Windows NT
- /Subject: COMMON CRITERIA CERTIFICATION REPORT No. P240 SONY IC Chip with Operating System for Mobile CXD3715GG/GU-x Version 0701 has been evaluated under the terms of the Scheme and complies with the requirements for EAL4 COMMON CRITERIA (ISO 15408) ASSURANCE LEVEL
- /Title: CRP240
- pdf_file_size_bytes: 55971
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 24
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Keywords: "Common Criteria, Certification, Zertifizierung, PR/SM for IBM z16 and IBM LinuxONE 4 Systems, Driver Level 51C with Bundle Level 19B (D51C/B19B), BSI-DSZ-CC-1222-2024"
- /Subject: Common Criteria, Certification, Zertifizierung, PR/SM for IBM z16 and IBM LinuxONE 4 Systems, Driver Level 51C with Bundle Level 19B (D51C/B19B), BSI-DSZ-CC-1222-2024
- /Title: Certification Report BSI-DSZ-CC-1222-2024
- pdf_file_size_bytes: 513278
- pdf_hyperlinks: https://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.sogis.eu/, http://www.commoncriteriaportal.org/, http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/, https://www.bsi.bund.de/AIS, https://www.bsi.bund.de/zertifizierungsreporte
- pdf_is_encrypted: False
- pdf_number_of_pages: 29
|
pdf_data/st_filename |
ST Public v1.04.pdf |
1222b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_AUT.1: 4
- ACM_CAP.3: 1
- ACM_CAP.4: 4
- ACM_SCP.2: 6
- ADO:
- ADO_DEL.2: 4
- ADO_IGS.1: 4
- ADV:
- ADV_FSP.1: 7
- ADV_FSP.2: 4
- ADV_HLD.1: 2
- ADV_HLD.2: 4
- ADV_IMP.1: 5
- ADV_LLD.1: 5
- ADV_RCR.1: 6
- ADV_SPM.1: 9
- AGD:
- AGD_ADM.1: 8
- AGD_USR.1: 6
- ALC:
- ALC_DVS.1: 5
- ALC_LCD.1: 4
- ALC_TAT.1: 5
- ATE:
- ATE_COV.2: 4
- ATE_DPT.1: 3
- ATE_FUN.1: 6
- ATE_IND.2: 4
- AVA:
- AVA_MSU.2: 4
- AVA_SOF.1: 4
- AVA_VLA.2: 6
|
- ADV:
- ADV_ARC.1: 2
- ADV_FSP.5: 2
- ADV_IMP.1: 2
- ADV_INT.2: 2
- ADV_TDS.4: 2
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.4: 2
- ALC_CMS.5: 2
- ALC_DEL.1: 2
- ALC_DVS.1: 2
- ALC_FLR.3: 4
- ALC_LCD.1: 2
- ALC_TAT.3: 4
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 2
- ATE_DPT.3: 2
- ATE_FUN.2: 4
- ATE_IND.2: 2
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 18
- FCS_CKM.1.1: 2
- FCS_CKM.4: 16
- FCS_CKM.4.1: 2
- FCS_COP.1: 32
- FCS_COP.1.1: 2
- FCS_IFC.1: 2
- FCS_RNG: 2
- FCS_RNG.1: 10
- FCS_RNG.1.1: 10
- FDP:
- FDP_ACC.1: 24
- FDP_ACC.1.1: 1
- FDP_ACF.1: 21
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_ETC.1: 9
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_IFC: 1
- FDP_IFC.1: 35
- FDP_IFF.1: 16
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_IFF.1.6: 1
- FDP_ITC.1: 13
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITT.1: 13
- FDP_ITT.1.1: 1
- FDP_SDI.1: 13
- FDP_SDI.1.1: 1
- FDP_UCT.1: 9
- FDP_UCT.1.1: 1
- FDP_UIT.1: 9
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL.1: 10
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_UAU.2: 11
- FIA_UAU.2.1: 1
- FIA_UID.1: 12
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MOF.1: 8
- FMT_MOF.1.1: 1
- FMT_MSA.1: 13
- FMT_MSA.2: 15
- FMT_MSA.2.1: 1
- FMT_MSA.3: 13
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 10
- FMT_MTD.1.1: 1
- FMT_MTD.2: 9
- FMT_MTD.2.1: 1
- FMT_MTD.2.2: 1
- FMT_MTD.3: 9
- FMT_MTD.3.1: 1
- FMT_PUT: 1
- FMT_PUT.1: 18
- FMT_SMF.1: 10
- FMT_SMF.1.1: 1
- FMT_SMR.1: 17
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 30
- FPT_FSL.1: 1
- FPT_ITC.1: 9
- FPT_ITC.1.1: 1
- FPT_ITI.1: 11
- FPT_ITI.1.1: 1
- FPT_ITI.1.2: 1
- FPT_ITT.1: 12
- FPT_ITT.1.1: 1
- FPT_PHP.3: 11
- FPT_PHP.3.1: 1
- FPT_RCV.4: 13
- FPT_RCV.4.1: 1
- FPT_RPL.1: 11
- FPT_RPL.1.1: 1
- FPT_RPL.1.2: 1
- FPT_SEP.1: 11
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_TDC.1: 9
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FRU:
- FRU_FLT.1: 16
- FRU_FLT.1.1: 1
- FTP:
- FTP_ITC: 3
- FTP_ITC.1: 20
- FTP_ITC.1.1: 2
- FTP_ITC.1.2: 3
- FTP_ITC.1.3: 2
- FTP_TRP.1: 2
|
- FAU:
- FAU_GEN.1: 10
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 1
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_SAR.1: 9
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 6
- FAU_SAR.2.1: 1
- FAU_SAR.3: 7
- FAU_SAR.3.1: 1
- FAU_STG.1: 7
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.4: 7
- FAU_STG.4.1: 1
- FDP:
- FDP_ACC: 4
- FDP_ACC.1: 3
- FDP_ACC.1.1: 2
- FDP_ACC.2: 25
- FDP_ACC.2.1: 1
- FDP_ACC.2.2: 1
- FDP_ACF: 43
- FDP_ACF.1: 14
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_IFC.1: 17
- FDP_IFC.1.1: 1
- FDP_IFF.1: 9
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_RIP.2: 8
- FDP_RIP.2.1: 1
- FIA:
- FIA_ATD.1: 10
- FIA_ATD.1.1: 1
- FIA_UID.2: 10
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA: 27
- FMT_MSA.1: 14
- FMT_MSA.3: 13
- FMT_MSA.3.1: 4
- FMT_MSA.3.2: 4
- FMT_MTD.1: 9
- FMT_MTD.1.1: 1
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR.1: 14
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNO.1: 13
- FPR_UNO.1.1: 1
- FPT:
- FPT_ITT.1: 8
- FPT_ITT.1.1: 1
- FPT_STM.1: 9
- FPT_STM.1.1: 1
- FPT_TRC.1: 6
- FPT_TRC.1.1: 1
- FPT_TRC.1.2: 1
- FPT_TST.1: 8
- FPT_TST.1.1: 2
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FRU:
- FRU_RSA.1: 7
- FRU_RSA.1.1: 1
- FTA:
- FTA_TSE.1: 10
- FTA_TSE.1.1: 1
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 7
- malfunction: 18
- SCA:
- DPA: 4
- Physical Probing: 11
- SPA: 2
- physical probing: 8
- other:
- JIL: 2
- reverse engineering: 2
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- BSI:
- CC:
- CCIMB-99-031: 1
- CCIMB-99-032: 1
- CCIMB-99-033: 1
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: katoh
- /CreationDate: D:20130430143756+01'00'
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20130430143756+01'00'
- /Producer: Microsoft® Office Word 2007
- /Subject: 英文
- /Title: CXD3715GG/GU-x Security Target
- pdf_file_size_bytes: 861962
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 126
|
- /Author: Robert Nasser, Clemens Wittinger (generated by CCTool version 2.8.4.73)
- /Keywords: access control, identification, authentication, audit, object reuse, z, LPAR, logical partitioning, isolation, PR/SM, LIC, cross-partition, HMC, SE
- /Subject: PR/SM, Driver Level 51C with Bundle Level 19B for IBM z16 and IBM LinuxONE 4 Systems
- /Title: Security Target for PR/SM for IBM z16 and IBM LinuxONE 4 Systems (D51C/B19B) (version 22.4 as of 2023-08-07)
- pdf_file_size_bytes: 813947
- pdf_hyperlinks: http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R5.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R5.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R5.pdf
- pdf_is_encrypted: False
- pdf_number_of_pages: 61
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |