name |
Sourcefire 3D System Version 5.2.0.1 |
Oberthur ID-ONE Cosmo V7.0.1-a masked on AT90SC 28872RCU Rev G & AT90SC 28848RCU Rev G |
category |
Detection Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
US |
FR |
status |
archived |
archived |
not_valid_after |
21.03.2016 |
01.09.2019 |
not_valid_before |
06.08.2014 |
03.02.2011 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10537-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2011-01fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10537-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2011-01en.pdf |
manufacturer |
Sourcefire Inc. |
Oberthur Technologies / Atmel Secure Products Division |
manufacturer_web |
https://www.sourcefire.com/ |
https://www.oberthur.com/ |
security_level |
{} |
ADV_IMP.2, EAL5+, ALC_DVS.2, AVA_VAN.5 |
dgst |
79f1b9da6ca5a71c |
92b0175ed26d005a |
heuristics/cert_id |
CCEVS-VR-VID-10537-2014 |
ANSSI-CC-2011/01 |
heuristics/cert_lab |
US |
THALES |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, AGD_PRE.1 |
AVA_VLA.4, AVA_VAN.5, ALC_DVS.2, ADV_IMP.2, AVA_MSU.3 |
heuristics/extracted_versions |
5.2.0.1 |
7.0.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2012/10 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0421-2008, ANSSI-CC-2009/46 |
heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2012/10 |
heuristics/report_references/indirectly_referencing |
{} |
ANSSI-CC-2009/11, BSI-DSZ-CC-0421-2008, ANSSI-CC-2009/46 |
heuristics/scheme_data |
- category: Firewall, Wireless Monitoring
- certification_date: 06.08.2014
- evaluation_facility: COACT, Inc. Labs
- expiration_date: 06.08.2016
- id: CCEVS-VR-VID10537
- product: Sourcefire 3D System Version 5.2.0.1
- scheme: US
- url: https://www.niap-ccevs.org/product/10537
- vendor: Sourcefire, Inc.
|
|
heuristics/st_references/directly_referenced_by |
{} |
ANSSI-CC-2012/10 |
heuristics/st_references/directly_referencing |
{} |
ANSSI-CC-2009/11, BSI-DSZ-CC-0421-2008 |
heuristics/st_references/indirectly_referenced_by |
{} |
ANSSI-CC-2012/10 |
heuristics/st_references/indirectly_referencing |
{} |
ANSSI-CC-2009/11, BSI-DSZ-CC-0421-2008 |
heuristics/protection_profiles |
ac9abe3d5c5a31f0 |
8ab4bd8434014a92 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_v1.1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/jcsppc.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
st_vid10537-vr.pdf |
ANSSI-CC_2011-01fr.pdf |
pdf_data/report_frontpage |
- FR:
- US:
- cert_id: CCEVS-VR-VID10537-2014
- cert_item: Sourcefire 3D System Version 5.2.0.1
- cert_lab: US NIAP
|
- FR:
- cc_security_level: EAL5 ALC_DVS.2, ADV_IMP.2, AVA_VAN.5
- cc_version: Critères Communs V3.1
- cert_id: ANSSI-CC-2011/01
- cert_item: Carte à puce ID-ONE Cosmo V7.0.1-a masquée sur composants standard et basic AT90SC 28872RCU Rev G et AT90SC 28848RCU Rev G
- cert_item_version: Version V7.0.1-a
- cert_lab: THALES - CEACI (T3S – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France Tél : +33 (0)5 62 88 28 01 ou 18, mél : [email protected]
- developer: Oberthur Technologies 50 quai Michelet 92300 Levallois-Perret, France Atmel Secure Products Division, Scottish Technology Par, G75 0QR East Kilbride, Scotland Angleterre Commanditaire Oberthur Technologies 50 quai Michelet 92300 Levallois-Perret, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur\\(s\\)(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: PP/0304], version 1.0b PP SUN Java Card™ System Protection Profile Collection, août 2003, certifié par l’ANSSI
- US:
|
pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10537-2014: 1
|
- DE:
- FR:
- ANSSI-CC-2009-46: 2
- ANSSI-CC-2011/01: 22
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 1
- EAL 7: 1
- EAL4: 2
- EAL5: 3
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
- AVA_MSU.3: 1
- AVA_VAN: 3
- AVA_VAN.5: 1
- AVA_VLA.4: 1
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Oberthur:
- Oberthur Technologies: 12
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC-SHA-384: 1
- HMAC-SHA-512: 1
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- FIPS:
- FIPS PUB 140-2: 1
- FIPS PUB 180-3: 1
- FIPS PUB 186-2: 1
- FIPS PUB 197: 1
- FIPS PUB 198-1: 1
- NIST:
|
- BSI:
- CC:
- CCMB-2006-09-001: 1
- CCMB-2007-09-002: 1
- CCMB-2007-09-003: 1
- CCMB-2007-09-004: 1
- SCP:
- SCP01: 1
- SCP02: 1
- SCP03: 1
|
pdf_data/report_keywords/javacard_version |
|
- GlobalPlatform:
- JavaCard:
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: Robert Roland
- /Comments:
- /Company: COACT
- /CreationDate: D:20140807135046-04'00'
- /Creator: Acrobat PDFMaker 10.1 for Word
- /Keywords:
- /ModDate: D:20140807135101-04'00'
- /Producer: Adobe PDF Library 10.0
- /SourceModified: D:20140807175026
- /Subject:
- /Title:
- pdf_file_size_bytes: 136944
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
- /Author: Hubert PUJOL
- /Company: SGDSN/ANSSI
- /CreationDate: D:20110204101925+01'00'
- /Creator: Acrobat PDFMaker 9.0 for Word
- /Keywords: CER/F/07.5
- /ModDate: D:20110204102054+01'00'
- /Producer: Acrobat Distiller 9.0.0 (Windows)
- /SourceModified: D:20110204091849
- /Subject: Nom du produit
- /Title: ANSSI-CC-2010/xx
- pdf_file_size_bytes: 361934
- pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 21
|
pdf_data/st_filename |
st_vid10537-st.pdf |
ANSSI-CC-cible_2011-01en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0421-2008: 1
- BSI-DSZ-CC-0421-2008-MA-02: 1
- FR:
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL5: 3
- EAL5 augmented: 3
- EAL5+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 15
- AGD_PRE: 1
- AGD_PRE.1: 11
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 5
- ALC_CMS: 1
- ALC_CMS.1: 6
- ATE:
- AVA:
|
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 11
- FAU_GEN.1: 6
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 3
- FAU_GEN.2.1: 1
- FAU_STG_EXT: 5
- FAU_STG_EXT.1: 4
- FAU_STG_EXT.1.1: 1
- FCS:
- FCS_CKM: 5
- FCS_CKM.1: 9
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 5
- FCS_CKM_EXT: 5
- FCS_CKM_EXT.4: 8
- FCS_CKM_EXT.4.1: 1
- FCS_COP.1: 33
- FCS_COP.1.1: 4
- FCS_RBG_EXT: 5
- FCS_RBG_EXT.1: 4
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FCS_SSH_EXT: 5
- FCS_SSH_EXT.1: 4
- FCS_SSH_EXT.1.1: 1
- FCS_SSH_EXT.1.2: 1
- FCS_SSH_EXT.1.3: 1
- FCS_SSH_EXT.1.4: 1
- FCS_SSH_EXT.1.5: 1
- FCS_SSH_EXT.1.6: 1
- FCS_SSH_EXT.1.7: 1
- FCS_TLS_EXT: 5
- FCS_TLS_EXT.1: 6
- FCS_TLS_EXT.1.1: 2
- FDP:
- FDP_ITC.1: 5
- FDP_ITC.2: 5
- FDP_RIP: 5
- FDP_RIP.2: 3
- FDP_RIP.2.1: 1
- FIA:
- FIA_PMG_EXT: 5
- FIA_PMG_EXT.1: 4
- FIA_PMG_EXT.1.1: 1
- FIA_UAU: 5
- FIA_UAU.7: 3
- FIA_UAU.7.1: 1
- FIA_UAU_EXT: 5
- FIA_UAU_EXT.2: 4
- FIA_UAU_EXT.2.1: 1
- FIA_UIA_EXT: 4
- FIA_UIA_EXT.1: 7
- FIA_UIA_EXT.1.1: 1
- FIA_UIA_EXT.1.2: 1
- FIA_UID.1: 2
- FIA_UID_EXT: 1
- FMT:
- FMT_MTD: 5
- FMT_MTD.1: 3
- FMT_MTD.1.1: 1
- FMT_SMF: 6
- FMT_SMF.1: 5
- FMT_SMF.1.1: 1
- FMT_SMR: 5
- FMT_SMR.2: 3
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT: 3
- FPT_APW_EXT.1: 4
- FPT_APW_EXT.1.1: 1
- FPT_APW_EXT.1.2: 1
- FPT_AWP_EXT: 2
- FPT_ITT: 5
- FPT_ITT.1: 7
- FPT_ITT.1.1: 1
- FPT_SKP_EXT: 5
- FPT_SKP_EXT.1: 4
- FPT_SKP_EXT.1.1: 1
- FPT_STM: 5
- FPT_STM.1: 4
- FPT_STM.1.1: 1
- FPT_TST_EXT: 5
- FPT_TST_EXT.1: 4
- FPT_TST_EXT.1.1: 1
- FPT_TUD_EXT: 5
- FPT_TUD_EXT.1: 4
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FTA:
- FTA_SSL: 12
- FTA_SSL.3: 3
- FTA_SSL.3.1: 1
- FTA_SSL.4: 4
- FTA_SSL.4.1: 1
- FTA_SSL_EXT: 6
- FTA_SSL_EXT.1: 4
- FTA_SSL_EXT.1.1: 1
- FTA_TAB: 5
- FTA_TAB.1: 4
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC: 5
- FTP_ITC.1: 3
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 6
- FTP_TRP.1: 3
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_ARP: 2
- FAU_ARP.1: 4
- FAU_GEN: 1
- FAU_GEN.1: 2
- FAU_SAA: 1
- FAU_SAA.1: 2
- FAU_SAR: 1
- FAU_SAR.1: 2
- FCO:
- FCS:
- FCS_CKM: 8
- FCS_CKM.1: 5
- FCS_CKM.2: 1
- FCS_CKM.2.1: 1
- FCS_CKM.3: 1
- FCS_CKM.3.1: 1
- FCS_CKM.4: 2
- FCS_CKM.4.1: 1
- FCS_COP: 10
- FCS_COP.1: 9
- FCS_COP.1.1: 1
- FCS_RND: 1
- FCS_RNG: 4
- FCS_RNG.1: 7
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FDP:
- FDP_ACC: 5
- FDP_ACC.2: 9
- FDP_ACF: 4
- FDP_ACF.1: 18
- FDP_IFC: 2
- FDP_IFC.1: 1
- FDP_IFC.2: 2
- FDP_IFF: 2
- FDP_IFF.1: 10
- FDP_ITC: 2
- FDP_ITC.1: 3
- FDP_ITC.2: 5
- FDP_RIP: 9
- FDP_RIP.1: 10
- FDP_ROL: 1
- FDP_ROL.1: 2
- FDP_SDI.1: 1
- FDP_SDI.1.1: 1
- FDP_SDI.2: 1
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UCT: 1
- FDP_UCT.1: 1
- FDP_UIT: 1
- FDP_UIT.1: 2
- FIA:
- FIA_AFL: 4
- FIA_AFL.1: 8
- FIA_ATD: 2
- FIA_ATD.1: 3
- FIA_UAU: 6
- FIA_UAU.1: 4
- FIA_UAU.4: 2
- FIA_UAU.7: 2
- FIA_UID: 4
- FIA_UID.1: 6
- FIA_UID.2: 1
- FIA_USB.1: 2
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF: 2
- FMT_MOF.1: 2
- FMT_MSA: 11
- FMT_MSA.1: 6
- FMT_MSA.2: 1
- FMT_MSA.3: 8
- FMT_MTD: 3
- FMT_MTD.1: 3
- FMT_MTD.2: 2
- FMT_MTD.3: 1
- FMT_MTD.3.1: 1
- FMT_SMF: 4
- FMT_SMF.1: 4
- FMT_SMR: 6
- FMT_SMR.1: 9
- FMT_SMR.2: 6
- FPR:
- FPR_UNO: 4
- FPR_UNO.1: 5
- FPR_UNO.1.1: 1
- FPT:
- FPT_FLS: 5
- FPT_FLS.1: 5
- FPT_PHP: 3
- FPT_PHP.2: 3
- FPT_PHP.3: 2
- FPT_RCV: 3
- FPT_RCV.3: 8
- FPT_RCV.4: 1
- FPT_TDC: 1
- FPT_TDC.1: 3
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST: 2
- FPT_TST.1: 6
- FRU:
- FRU_FLT: 1
- FRU_FLT.1: 1
- FRU_RSA: 1
- FRU_RSA.1: 1
- FTP:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.CONNECTIONS: 4
- A.NO_GENERAL_PURPOSE: 1
- A.PHYSICAL: 1
- A.TRUSTED_ADMIN: 1
- O:
- O.ADDRESS_FILTERING: 5
- O.DISPLAY_BANNER: 1
- O.PORT_FILTERING: 5
- O.PROTECTED_COMMUNICATIONS: 1
- O.RELATED_CONNECTION_FILTERING: 5
- O.RESIDUAL_INFORMATION_CLEARING: 1
- O.SESSION_LOCK: 1
- O.STATEFUL_INSPECTION: 5
- O.SYSTEM_MONITORING: 1
- O.TOE_ADMINISTRATION: 1
- O.TSF_SELF_TEST: 1
- O.VERIFIABLE_UPDATES: 1
- OE:
- T:
- T.ADMIN_ERROR: 1
- T.NETWORK_ACCESS: 3
- T.NETWORK_DISCLOSURE: 2
- T.NETWORK_DOS: 4
- T.NETWORK_MISUSE: 2
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
- T.UNDETECTED_ACTIONS: 1
- T.USER_DATA_REUSE: 1
|
- A:
- A.APPLET: 1
- A.NATIVE: 1
- A.VERIFICATION: 1
- D:
- D.API_DATA: 3
- D.APPLILIFECYC: 1
- D.APP_CODE: 5
- D.APP_C_DATA: 3
- D.APP_I_DATA: 3
- D.ARRAY: 3
- D.AUDITLOG: 1
- D.CONFIG: 2
- D.CRYPTO: 4
- D.GLPIN: 1
- D.JCS_CODE: 3
- D.JCS_DATA: 5
- D.KEY: 2
- D.LOADFILE: 1
- D.NB_REMAINTRYGLB: 1
- D.PIN: 6
- D.SEC_DATA: 7
- D.SENSITIVE_DATA: 1
- O:
- O.ALARM: 1
- O.APPLET: 16
- O.CARD-MANAGEMENT: 3
- O.CIPHER: 1
- O.CODE_PCKG: 8
- O.CODE_PKG: 6
- O.DELETION: 1
- O.FIREWALL: 1
- O.INSTALL: 1
- O.JAVAOBJEC: 4
- O.JAVAOBJECT: 31
- O.KEY-MNGT: 1
- O.LOAD: 3
- O.NATIVE: 1
- O.OBJ-DELETION: 1
- O.OPERATE: 1
- O.PIN-MNGT: 1
- O.REALLOCATION: 1
- O.RESOURCES: 1
- O.SCP: 3
- O.SECURE_COMPARE: 1
- O.SHRD_VAR_CONFID: 1
- O.SHRD_VAR_INTEG: 1
- O.SID: 1
- O.TRANSACTION: 1
- OE:
- OE.APPLET: 1
- OE.NATIVE: 1
- OE.VERIFICATION: 1
- OP:
- OP.ARRAY_ACCESS: 3
- OP.CREATE: 5
- OP.DELETE_APPLET: 3
- OP.DELETE_PCKG: 2
- OP.DELETE_PCKG_APPLET: 2
- OP.INSTANCE_FIELD: 2
- OP.INVK_INTERFACE: 4
- OP.INVK_VIRTUAL: 3
- OP.JAVA: 4
- OP.PUT: 4
- OP.RECEIVE: 1
- OP.SEND: 1
- OP.THROW: 3
- OP.TYPE_ACCESS: 3
- OSP:
- R:
- T:
- T.CONFID-APPLI-DATA: 1
- T.CONFID-JCS-CODE: 1
- T.CONFID-JCS-DATA: 1
- T.CONFIGURATION: 2
- T.CONF_DATA_APPLET: 2
- T.DELETION: 1
- T.EXE-CODE: 2
- T.INSTALL: 1
- T.INTEG-APPLI-CODE: 4
- T.INTEG-APPLI-DATA: 4
- T.INTEG-APPLICODE: 1
- T.INTEG-APPLIDATA: 1
- T.INTEG-JCS-CODE: 1
- T.INTEG-JCS-DATA: 1
- T.NATIVE: 1
- T.OBJ-DELETION: 1
- T.PHYSICAL: 1
- T.RESSOURCES: 1
- T.SID: 2
|
pdf_data/st_keywords/vendor |
|
- Oberthur:
- OBERTHUR: 2
- Oberthur: 1
- Oberthur Technologies: 169
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
- MAC:
- HMAC-SHA-256: 2
- HMAC-SHA-384: 1
- HMAC-SHA-512: 1
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-224: 4
- SHA-256: 2
- SHA-384: 5
- SHA-512: 12
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 1
- SHA-256: 4
- SHA-384: 2
- SHA-512: 2
|
pdf_data/st_keywords/crypto_scheme |
- KA:
- Key Agreement: 1
- Key agreement: 1
|
|
pdf_data/st_keywords/crypto_protocol |
- SSH:
- SSH: 37
- SSHv1: 2
- SSHv2: 19
- TLS:
- VPN:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 2
- TLS_RSA_WITH_AES_128_CBC_SHA: 2
- TLS_RSA_WITH_AES_256_CBC_SHA: 2
|
|
pdf_data/st_keywords/crypto_library |
|
- AtmelToolbox:
- ATMEL Toolbox 00.03.11.05: 2
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- fault injection: 1
- malfunction: 2
- physical tampering: 4
- SCA:
- DPA: 1
- SPA: 1
- physical probing: 2
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140-2: 4
- FIPS 186-2: 1
- FIPS 186-3: 1
- FIPS PUB 140-2: 1
- FIPS PUB 180-3: 1
- FIPS PUB 186-2: 2
- FIPS PUB 186-3: 1
- FIPS PUB 197: 2
- FIPS PUB 198-1: 1
- NIST:
- NIST SP 800-38A: 2
- NIST SP 800-56B: 1
- SP 800-56B: 3
- SP 800-90: 1
- RFC:
- RFC 2246: 2
- RFC 2460: 2
- RFC 2818: 2
- RFC 3513: 2
- RFC 4253: 1
- RFC 4443: 2
- RFC 5735: 2
- RFC 768: 2
- RFC 791: 2
- RFC 792: 2
- RFC 793: 2
- RFC 959: 1
|
- FIPS:
- FIPS 186-2: 1
- FIPS PUB 180-2: 2
- FIPS PUB 186-2: 1
- FIPS PUB 197: 4
- FIPS PUB 46-3: 5
- FIPS PUB 81: 4
- PKCS:
|
pdf_data/st_keywords/javacard_version |
|
- GlobalPlatform:
- JavaCard:
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
- java:
- javacard:
- javacard.framework: 3
- javacard.security: 1
- javacardx:
- javacardx.framework.util: 1
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- NTP Server SMTP Server Audit Server SNMP Server Network Assets Legend TOE Operational Environment Out of Scope … … Sourcefire 3D System Security Target 13 The TOE main subsystems are summarized as followed: •: 1
- Out of Scope: 1
- in the update header to ensure they match. 12 This process requires access to the Internet and is out of scope of the evaluation. Sourcefire 3D System Security Target 61 During the update process, if the Snort: 1
- out of scope: 1
|
|
pdf_data/st_metadata |
|
- /Author: poulen
- /CreationDate: D:20101014181035+02'00
- /Creator: PDFCreator Version 0.8.1
- /ModDate: D:20101014181035+02'00
- /Producer: AFPL Ghostscript 8.50
- /Title: FQR 110 5411 Ed1
- pdf_file_size_bytes: 3090477
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 94
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |