name |
A10 Thunder TPS 14045 |
ID-ONE Cosmo V9 Essential version 3 (Cosmo V9) |
category |
Network and Network-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
NO |
NL |
status |
archived |
archived |
not_valid_after |
02.07.2023 |
14.12.2023 |
not_valid_before |
02.07.2018 |
14.12.2018 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20180702%20S107%20C.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Signed%20certificate%20CC-18-200833.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20180702%20SERTIT-107%20CR%20A10NetworksThunderTPS%20-%201.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[CR]%20NSCIB-CC-200833-CR.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST_A10_Networks_Thunder_TPS%20_v.1.5_06_26_2018.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[ST-Lite]%20FQR%20110%208959%20Ed%203.0%20-%20ID%20One%20Cosmo%20V9%20Essential%20Public%20Security%20Target.pdf |
manufacturer |
A10 Networks, Inc. |
Idemia |
manufacturer_web |
https://a10networks.com |
https://www.idemia.com |
security_level |
ALC_FLR.1, EAL2+ |
AVA_VAN.5, ALC_DVS.2, EAL5+ |
dgst |
7a015286ff72ce30 |
3f27923299d501ca |
heuristics/cert_id |
SERTIT-107 |
NSCIB-CC-200833-CR |
heuristics/cert_lab |
[] |
|
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, ASE_SPD.1, ASE_CCL.1, ADV_TDS.1, AVA_VAN.2, ASE_REQ.2, ASE_OBJ.2, ASE_TSS.1, AGD_PRE.1, ASE_ECD.1, ALC_DEL.1, ADV_FSP.2, ATE_FUN.1, AGD_OPE.1, ATE_COV.1, ALC_CMS.2, ALC_FLR.1, ADV_ARC.1, ALC_CMC.2, ATE_IND.2 |
ASE_INT.1, ASE_SPD.1, ASE_CCL.1, ALC_CMC.4, ALC_LCD.1, ATE_COV.2, ADV_FSP.5, ASE_REQ.2, ASE_OBJ.2, ASE_TSS.1, AGD_PRE.1, AVA_VAN.5, ALC_CMS.5, ATE_FUN.1, ADV_IMP.1, ATE_DPT.3, AGD_OPE.1, ADV_TDS.4, ASE_ECD.1, ALC_DEL.1, ALC_DVS.2, ALC_TAT.2, ALC_FLR.1, ADV_ARC.1 |
heuristics/extracted_versions |
14045 |
3 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
NSCIB-CC-200716-CR2 |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
NSCIB-CC-200716-CR2 |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- category: Network and Network-Related Devices and Systems
- certification_date: 02.07.2018
- developer: A10 Networks, Inc.
- enhanced:
- category: Network and Network-Related Devices and Systems
- cert_id: SERTIT-107
- certification_date: 02.07.2018
- description: A10 Thunder TPS product line of Threat Protection Systems provides high-performance, network-wide protection against distributed denial of service (DDoS) attacks, and enables service availability against a variety of volumetric, protocol, resource and other sophisticated application attacks. The Thunder TPS product line is built upon our Advanced Core Operating System (ACOS) platform, with A10's Symmetric Scalable Multi-Core Processing (SSMP) software architecture that delivers high performance and leverages a shared memory architecture to provide efficient tracking of network flows, as well as accurate DDoS protection enforcement for service providers, Web site operators and enterprises. A10 Thunder TPS devices protect critical services in highly efficient hardware form factors, which enables your data center resources to be used productively. The combination of high performance in a small form factor results in lower OPEX through significantly lower power usage, reduced rack space and lowered cooling requirements.
- developer: A10 Networks, Inc.
- documents: frozendict({'cert': [frozendict({'href': 'https://sertit.no/getfile.php/135310-1607953774/SERTIT/Sertifikater/2018/107/20180702%20S107%20C.pdf'})], 'target': [frozendict({'href': 'https://sertit.no/getfile.php/135307-1607953771/SERTIT/Sertifikater/2018/107/ST_A10_Networks_Thunder_TPS%20_v.1.5_06_26_2018.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/135304-1607953768/SERTIT/Sertifikater/2018/107/20180702%20SERTIT-107%20CR%20A10NetworksThunderTPS%20-%201.0.pdf'})]})
- evaluation_facility: Advanced Data Security
- expiration_date: 02.07.2023
- level: EAL 2, ALC_FLR.1
- mutual_recognition: CCRA
- product: HW: 14045-TPS, FW: 3.2.2-P5
- product: A10 Networks Thunder TPS 14045
- url: https://sertit.no/certified-products/product-archive/a10-networks-thunder-tps-14045
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0945-V2-2018 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0945-V2-2018 |
heuristics/protection_profiles |
{} |
9399bd94f9925b16 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-profil_PP-2010-03en.pdf |
pdf_data/cert_filename |
20180702 S107 C.pdf |
Signed certificate CC-18-200833.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
- ADS:
- Advanced Data Security: 1
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- pdf_file_size_bytes: 741235
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /CreationDate: D:20181214152613+01'00'
- /Creator: BHC364e
- /ModDate: D:20181214142726+01'00'
- /Producer: KONICA MINOLTA bizhub C364e
- /Title: BHC364e-20181214152613
- pdf_file_size_bytes: 198723
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
20180702 SERTIT-107 CR A10NetworksThunderTPS - 1.0.pdf |
[CR] NSCIB-CC-200833-CR.pdf |
pdf_data/report_frontpage |
|
- NL:
- cert_id: NSCIB-CC-200833-CR
- cert_item: ID-ONE Cosmo V9 Essential version 3 (Cosmo V9
- cert_lab: Brightsight
- developer: Idemia
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 2: 18
- EAL 2 augmented: 16
- EAL1: 1
- EAL2: 1
- EAL7: 1
|
- EAL:
- EAL 5: 1
- EAL 5 augmented: 1
- EAL 6: 1
- EAL 6 augmented: 1
- EAL4: 1
- EAL5: 2
- EAL5 augmented: 1
- EAL5+: 2
- EAL6: 1
- EAL6 augmented: 1
- EAL6+: 1
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR: 1
- ALC_FLR.1: 18
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 2
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ALC:
- ALC_DVS.2: 2
- ALC_FLR.1: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.PHYSICAL_SECURITY: 1
- A.SECURITY_MAINTENANCE: 1
- A.TRUSTED_ADMIN: 1
|
|
pdf_data/report_keywords/vendor |
|
- Idemia:
- Infineon:
- Infineon Technologies AG: 1
- Oberthur:
|
pdf_data/report_keywords/eval_facility |
- ADS:
- Advanced Data Security: 1
|
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-384: 2
- SHA-512: 2
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20180704203905Z00'00'
- /Creator: Word
- /ModDate: D:20180704203905Z00'00'
- /Producer: Mac OS X 10.13.5 Quartz PDFContext
- /Title: Microsoft Word - 20180702 SERTIT-107 CR A10NetworksThunderTPS - 1.0.docx
- pdf_file_size_bytes: 1016648
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 15
|
|
pdf_data/st_filename |
ST_A10_Networks_Thunder_TPS _v.1.5_06_26_2018.pdf |
[ST-Lite] FQR 110 8959 Ed 3.0 - ID One Cosmo V9 Essential Public Security Target.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0945-V2-2018: 2
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- ANSSI:
- ANSSI-CC-PP-2010/03_M01: 1
- BSI:
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL2: 5
- EAL2 augmented: 5
|
- EAL:
- EAL4+: 2
- EAL5: 5
- EAL5 augmented: 1
- EAL5+: 5
- EAL6: 1
- EAL6 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.1: 6
- ASE:
- ASE_CCL: 2
- ASE_CCL.1: 1
- ASE_ECD: 2
- ASE_ECD.1: 1
- ASE_INT: 2
- ASE_INT.1: 1
- ASE_OBJ: 2
- ASE_OBJ.2: 1
- ASE_REQ: 2
- ASE_REQ.2: 1
- ASE_SPD: 2
- ASE_SPD.1: 1
- ASE_TSS: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 6
- ADV_FSP.1: 3
- ADV_FSP.2: 2
- ADV_FSP.4: 2
- ADV_FSP.5: 8
- ADV_IMP.1: 9
- ADV_TDS.1: 2
- ADV_TDS.3: 4
- ADV_TDS.4: 8
- AGD:
- AGD_OPE: 2
- AGD_OPE.1: 8
- AGD_PRE: 6
- AGD_PRE.1: 6
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.1: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.1: 2
- ALC_DVS.2: 12
- ALC_LCD.1: 3
- ALC_TAT.1: 2
- ALC_TAT.2: 3
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 4
- ASE_INT.1: 5
- ASE_OBJ.2: 3
- ASE_REQ.1: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 3
- ATE_DPT.1: 2
- ATE_DPT.3: 1
- ATE_FUN.1: 6
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 10
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR.1: 6
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FDP:
- FDP_ACC.1: 13
- FDP_ACC.1.1: 1
- FDP_ACF.1: 9
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 5
- FDP_IFC.2: 8
- FDP_IFC.2.1: 1
- FDP_IFC.2.2: 1
- FDP_IFF.1: 8
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FIA:
- FIA_ATD.1: 7
- FIA_ATD.1.1: 1
- FIA_UAU.1: 8
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID.1: 6
- FIA_UID.2: 11
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF.1: 9
- FMT_MOF.1.1: 1
- FMT_MSA.1: 10
- FMT_MSA.1.1: 1
- FMT_MSA.3: 13
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF.1: 10
- FMT_SMF.1.1: 1
- FMT_SMR.1: 14
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM.1: 9
- FPT_STM.1.1: 1
- FPT_TST.1: 5
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
|
- FAU:
- FAU_ARP.1: 21
- FAU_ARP.1.1: 1
- FAU_GEN: 1
- FAU_GEN.1: 2
- FAU_SAA.1: 3
- FAU_STG.2: 11
- FAU_STG.2.1: 1
- FAU_STG.2.2: 1
- FAU_STG.2.3: 1
- FCO:
- FCS:
- FCS_CKM: 28
- FCS_CKM.1: 25
- FCS_CKM.1.1: 1
- FCS_CKM.2: 14
- FCS_CKM.2.1: 1
- FCS_CKM.3: 12
- FCS_CKM.3.1: 1
- FCS_CKM.4: 24
- FCS_CKM.4.1: 1
- FCS_COP: 34
- FCS_COP.1: 18
- FCS_COP.1.1: 1
- FCS_RNG: 11
- FCS_RNG.1: 5
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FDP:
- FDP_ACC: 84
- FDP_ACC.1: 24
- FDP_ACC.2: 13
- FDP_ACF: 69
- FDP_ACF.1: 34
- FDP_IFC: 31
- FDP_IFC.1: 21
- FDP_IFC.2: 2
- FDP_IFF: 25
- FDP_IFF.1: 16
- FDP_ITC: 31
- FDP_ITC.1: 10
- FDP_ITC.2: 16
- FDP_RIP: 131
- FDP_RIP.1: 10
- FDP_ROL: 17
- FDP_ROL.1: 8
- FDP_SDI: 8
- FDP_SDI.2: 10
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UCT: 13
- FDP_UCT.1: 1
- FDP_UIT: 21
- FDP_UIT.1: 4
- FIA:
- FIA_AFL: 42
- FIA_AFL.1: 8
- FIA_ATD: 11
- FIA_ATD.1: 2
- FIA_UAU: 68
- FIA_UAU.1: 11
- FIA_UAU.4: 2
- FIA_UAU.7: 2
- FIA_UID: 35
- FIA_UID.1: 16
- FIA_UID.2: 1
- FIA_USB: 10
- FIA_USB.1: 3
- FMT:
- FMT_MOF: 12
- FMT_MOF.1: 1
- FMT_MSA: 229
- FMT_MSA.1: 20
- FMT_MSA.2: 5
- FMT_MSA.3: 27
- FMT_MTD: 41
- FMT_MTD.1: 4
- FMT_MTD.2: 2
- FMT_MTD.3: 1
- FMT_SMF: 70
- FMT_SMF.1: 31
- FMT_SMF.1.1: 1
- FMT_SMR: 68
- FMT_SMR.1: 57
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FMT_SMR.2: 6
- FPR:
- FPR_UNO: 21
- FPR_UNO.1: 13
- FPR_UNO.1.1: 1
- FPT:
- FPT_FLS: 52
- FPT_FLS.1: 21
- FPT_FLS.1.1: 2
- FPT_PHP: 9
- FPT_PHP.3: 1
- FPT_RCV: 30
- FPT_RCV.3: 7
- FPT_RCV.4: 1
- FPT_TDC: 8
- FPT_TDC.1: 12
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST: 1
- FPT_TST.1: 14
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FRU:
- FTP:
- FTP_ITC: 17
- FTP_ITC.1: 7
- FTP_TRP.1: 4
|
pdf_data/st_keywords/cc_claims |
- A:
- A.PHYSICAL_SECURITY: 2
- A.SECURITY_MAINTENANCE: 1
- A.TRUSTED_ADMIN: 2
- O:
- O.ACCESS: 7
- O.AUDIT: 9
- O.DATA_PROTECTION: 8
- O.ID_AUTH: 7
- O.INTEGRITY: 7
- O.MANAGEMENT: 8
- O.SELF_TEST: 6
- OE:
- OE.PHYSICAL_SECURITY: 4
- OE.SECURITY_MAINTENANCE: 3
- OE.TIME_STAMP: 3
- OE.TRUSTED_ADMIN: 7
|
- A:
- A.APPLET: 5
- A.DELETION: 3
- A.VERIFICATION: 5
- D:
- D.API_DATA: 3
- D.APP_CODE: 6
- D.APP_C_DATA: 4
- D.APP_I_DATA: 4
- D.ARRAY: 6
- D.CONFIG: 5
- D.CRYPTO: 5
- D.JCS_CODE: 3
- D.JCS_DATA: 5
- D.JCS_KEYS: 8
- D.NB_REMAINTRYGLB: 1
- D.PIN: 7
- D.SEC_DATA: 7
- D.SENSITIVE_DATA: 6
- O:
- O.ALARM: 23
- O.APPLET: 16
- O.CARD-: 1
- O.CARD_MANAGEMENT: 66
- O.CIPHER: 18
- O.CODE_PKG: 22
- O.DELETION: 15
- O.FIREWALL: 64
- O.GLOBAL_ARRAYS_CONFID: 19
- O.GLOBAL_ARRAYS_INTEG: 10
- O.INSTALL: 18
- O.JAVAOBJECT: 49
- O.KEY-MNGT: 27
- O.LOAD: 16
- O.NATIVE: 15
- O.OBJ-DELETION: 8
- O.OPERATE: 39
- O.PATCH_LOADING: 25
- O.PIN-: 7
- O.PIN-MNGT: 17
- O.REALLOCATION: 17
- O.RESIDENT_APPLICATION: 24
- O.RESOURCES: 23
- O.SCP: 59
- O.SECURE_COMPARE: 10
- O.SID: 33
- O.TRANSACTION: 19
- OE:
- OE.APPLET: 8
- OE.CARD-MANAGEMENT: 1
- OE.CARD_MANAGEMENT: 3
- OE.CODE-: 3
- OE.CODE-EVIDENCE: 18
- OE.NATIVE: 1
- OE.SCP: 12
- OE.VERIFICATION: 38
- OP:
- OP.ARRAY_ACCESS: 9
- OP.CREATE: 7
- OP.DELETE_APPLET: 4
- OP.DELETE_PCKG: 3
- OP.DELETE_PCKG_APPLET: 3
- OP.FLOW: 3
- OP.IMPORT_KEY: 2
- OP.INSTANCE_FIELD: 6
- OP.INVK_INTERFACE: 7
- OP.INVK_VIRTUAL: 6
- OP.JAVA: 5
- OP.LOCAL_STACK_ACCESS: 3
- OP.OPERAND_STACK_ACCESS: 3
- OP.PUT: 6
- OP.STATIC_FIELD: 3
- OP.THROW: 5
- OP.TYPE_ACCESS: 5
- OSP:
- R:
- T:
- T.CONFID-APPLI-DATA: 17
- T.CONFID-JCS-: 8
- T.CONFID-JCS-CODE: 4
- T.CONFID-JCS-DATA: 5
- T.CONFIGURATION: 5
- T.CONF_DATA_APPLET: 5
- T.DELETION: 6
- T.EXE-CODE: 9
- T.INSTALL: 6
- T.INTEG-: 2
- T.INTEG-APPLI-: 12
- T.INTEG-APPLI-CODE: 9
- T.INTEG-APPLI-DATA: 15
- T.INTEG-JCS-: 7
- T.INTEG-JCS-CODE: 6
- T.INTEG-JCS-DATA: 5
- T.NATIVE: 6
- T.OBJ-DELETION: 4
- T.PATCH_LOADING: 5
- T.PHYSICAL: 4
- T.RESOURCES: 8
- T.SID: 18
|
pdf_data/st_keywords/vendor |
|
- Idemia:
- Infineon:
- Infineon: 1
- Infineon Technologies AG: 1
- Morpho:
- Oberthur:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-2: 1
- SHA-224: 3
- SHA-256: 6
- SHA-384: 4
- SHA-512: 3
- SHA256: 4
|
pdf_data/st_keywords/crypto_scheme |
|
- KA:
- Key Agreement: 3
- Key agreement: 1
- MAC:
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- fault injection: 1
- malfunction: 2
- physical tampering: 2
- SCA:
- DPA: 2
- SPA: 1
- physical probing: 4
- timing attack: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- BSI:
- FIPS:
- FIPS 140-2: 1
- FIPS 198: 1
- FIPS PUB 180-3: 2
- FIPS PUB 186-3: 1
- FIPS PUB 197: 5
- FIPS PUB 46-3: 3
- FIPS PUB 81: 6
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816: 2
- ISO/IEC 7816-6: 1
- ISO/IEC 9796-1: 2
- ISO/IEC 9797: 8
- ISO/IEC 9797-1: 1
- NIST:
- PKCS:
- SCP:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
- com:
- com.oberthurcs.javacard: 3
- com.oberthurcs.javacard.sac: 1
- com.oberthurcs.javacard.sac.sac: 1
- javacard:
- javacard.framework: 4
- javacard.sac: 1
- javacard.sac.sac: 1
- javacard.security: 3
- javacardx:
- javacardx.crypto: 2
- javacardx.framework.util: 1
- javacardx.security: 1
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
- out of scope: 1
|
pdf_data/st_metadata |
- /Author: Admin
- /CreationDate: D:20180626212631-07'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20180626212631-07'00'
- /Producer: GPL Ghostscript 8.64
- /Title: Microsoft Word - ST_A10_Networks_Thunder_TPS _v.1.5_06_26_2018.docx
- pdf_file_size_bytes: 891333
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 39
|
|
state/cert/convert_garbage |
True |
True |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |