name |
Citrix MetaFrame Presentation Server 4.0 |
D-TRUST Web-Dienst TSE-CSP, Version 1.1.1 |
category |
Access Control Devices and Systems |
Network and Network-Related Devices and Systems |
scheme |
UK |
DE |
status |
archived |
active |
not_valid_after |
05.03.2013 |
10.11.2026 |
not_valid_before |
01.08.2005 |
10.11.2021 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1139V3c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP219.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1139V3a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/LFS_T488_Citrix_ST_V10.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1139V3b_pdf.pdf |
manufacturer |
Citrix Systems, Inc. |
D-Trust GmbH |
manufacturer_web |
https://www.citrix.com |
https://d-trust.net |
security_level |
EAL2 |
EAL2+, ALC_CMS.3, ALC_LCD.1 |
dgst |
7da57a5dc5ab73a9 |
b5426b97da50f817 |
heuristics/cert_id |
CRP219 |
BSI-DSZ-CC-1139-V3-2021 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_RCR.1, ADV_FSP.1, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, ADV_SPM.1, ATE_COV.1, AGD_ADM.1, ADV_HLD.1, AVA_SOF.1, ALC_FLR.2 |
ALC_LCD.1, ALC_CMS.3, ADV_ARC.1, ATE_IND.2 |
heuristics/extracted_versions |
4.0 |
1.1.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
e8114f6ce9b122e1, cf58c5e8b3897d68, f2b0e950a638963c |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0113b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0112b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0111b_pdf.pdf |
pdf_data/cert_filename |
|
1139V3c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1139-V3-2021: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0111-2019: 1
- BSI-CC-PP-0112-2020: 1
- BSI-CC-PP-0113-2020: 1
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 2
- EAL 2 augmented: 1
|
pdf_data/cert_keywords/cc_sar |
|
- ALC:
- ALC_CMS.3: 1
- ALC_FLR: 1
- ALC_LCD.1: 1
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20211202074202+01'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, CSP-Light"
- /ModDate: D:20211202074950+01'00'
- /Producer: LibreOffice 6.3
- /Subject: Certificate D-TRUST Web-Dienst TSE-CSP
- /Title: Certification Report BSI-DSZ-CC-1139-V3-2021
- pdf_file_size_bytes: 242317
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
CRP219.pdf |
1139V3a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 2 augmented by ALC_CMS.3 and ALC_LCD.1
- cc_version: PP conformant Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-1139-V3-2021
- cert_item: D-TRUST Web-Dienst TSE-CSP, Version 1.3.1
- cert_lab: BSI
- developer: D-Trust GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Protection Profile Cryptographic Service Provider Light (CSPL) Version 1.0, 12 November 2019, BSI-CC-PP- 0111-2019, Common Criteria Protection Profile Configuration Cryptographic Service Provider Light – Time Stamp Service and Audit (PPC-CSPLight-TS-Au) Version 1.0, 26 February 2020, BSI-CC-PP-0112-2020, Common Criteria Protection Profile Configuration Cryptographic Service Provider Light - Time Stamp Service and Audit – Clustering (PPC-CSPLight-TS-Au-Cl), Version 1.0, 26 February 2020, BSI-CC-PP-0113-2020
|
pdf_data/report_keywords/cc_cert_id |
- UK:
- CERTIFICATION REPORT No. P219: 1
|
- DE:
- BSI-DSZ-CC-1139-V2-: 1
- BSI-DSZ-CC-1139-V2-2021: 2
- BSI-DSZ-CC-1139-V3-2021: 13
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0111-2019: 1
- BSI-CC-PP-0111-2019: 2
- BSI-CC-PP-0112-2020: 3
- BSI-CC-PP-0113-2020: 3
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL2: 4
- EAL2 augmented: 3
|
- EAL:
- EAL 1: 1
- EAL 2: 6
- EAL 2 augmented: 3
- EAL 2+: 1
- EAL 4: 1
|
pdf_data/report_keywords/cc_sar |
|
- ALC:
- ALC_CMS.3: 4
- ALC_FLR: 3
- ALC_LCD.1: 4
- ATE:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
- FTP:
- FTP_ITC.1: 1
- FTP_ITC.2: 1
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 3
- TÜViT: 1
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7148: 1
- BSI TR-02102: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCIMB-2004-01-001: 1
- CCIMB-2004-01-002: 1
- CCIMB-2004-01-003: 1
- CCIMB-2004-01-004: 1
|
- BSI:
- AIS 19: 1
- AIS 20: 1
- AIS 32: 1
- AIS41: 1
- AIS46: 1
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- REPORT SUMMARY (ETR SUMMARY), TÜV Informationstechnik GmbH – Evaluation Body for IT Security, (confidential document) [8] Base-PP: Protection Profile Cryptographic Service Provider Light (CSPL) Version 1.0, 12: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
|
pdf_data/report_metadata |
- /Author: racook
- /CreationDate: D:20050906112345Z
- /Creator: LFS T488 CITRIX_V40_CertRep_P219_10 - Microsoft Word
- /ModDate: D:20131119172038Z
- /Producer: Acrobat PDFWriter 5.0 for Windows NT
- /Title: LFS T488 CITRIX_V40_CertRep_P219_10.doc
- pdf_file_size_bytes: 1021419
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
|
pdf_data/st_filename |
LFS_T488_Citrix_ST_V10.pdf |
1139V3b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0111-2019: 1
- BSI-CC-PP-0105: 1
- BSI-CC-PP-0105-V2-2020: 1
- BSI-CC-PP-0111: 1
- BSI-CC-PP-0112-: 1
- BSI-CC-PP-0112-2020: 2
- BSI-CC-PP-0113-2020: 3
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL2: 8
- EAL2 augmented: 2
- EAL2+: 1
|
- EAL:
- EAL 2: 2
- EAL 2 augmented: 2
- EAL2+: 1
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ADO:
- ADO_DEL.1: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP.1: 2
- ADV_HLD.1: 2
- ADV_RCR.1: 2
- ADV_SPM.1: 2
- AGD:
- AGD_ADM.1: 2
- AGD_USR.1: 2
- ALC:
- ATE:
- ATE_COV.1: 2
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
- AVA_SOF.1: 2
- AVA_VLA.1: 3
|
- ADV:
- ALC:
- ALC_CMS.3: 4
- ALC_LCD.1: 2
- ATE:
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 11
- FCS_CKM.1.1: 1
- FCS_CKM.2: 9
- FCS_CKM.2.1: 2
- FCS_CKM.4: 16
- FCS_CKM.4.1: 2
- FCS_COP.1: 21
- FCS_COP.1.1: 3
- FDP:
- FDP_ACC.1: 23
- FDP_ACF.1: 16
- FDP_IFC.1: 3
- FDP_ITT.1: 17
- FDP_ITT.1.1: 2
- FDP_RIP.1: 6
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 5
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 12
- FIA_ATD.1.1: 1
- FIA_UAU: 1
- FIA_UAU.2: 11
- FIA_UAU.2.1: 2
- FIA_UID.1: 1
- FIA_UID.2: 10
- FIA_UID.2.1: 2
- FMT:
- FMT_MOF.1: 14
- FMT_MOF.1.1: 2
- FMT_MSA.1: 11
- FMT_MSA.1.1: 1
- FMT_MSA.2: 12
- FMT_MSA.2.1: 1
- FMT_MSA.3: 9
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF: 1
- FMT_SMF.1: 16
- FMT_SMF.1.1: 1
- FMT_SMR.1: 21
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_AMT.1: 6
- FPT_AMT.1.1: 1
- FPT_ITT.1: 15
- FPT_ITT.1.1: 2
- FPT_RVM.1: 12
- FPT_RVM.1.1: 1
- FPT_SEP.1: 2
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_TST.1: 6
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 1
- FTP_ITC.1: 1
- FTP_ITC.2: 9
- FTP_ITC.2.1: 1
- FTP_ITC.2.2: 1
- FTP_ITC.2.3: 1
|
- FAU:
- FAU_GEN: 4
- FAU_GEN.1: 10
- FAU_GEN.1.1: 11
- FAU_GEN.1.2: 2
- FAU_STG.1: 3
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 3
- FAU_STG.3.1: 5
- FCS:
- FCS_CKM: 65
- FCS_CKM.1: 29
- FCS_CKM.2: 14
- FCS_CKM.4: 39
- FCS_CKM.4.1: 1
- FCS_CKM.5: 14
- FCS_CKM.5.1: 1
- FCS_COP: 123
- FCS_COP.1: 32
- FCS_RNG: 2
- FCS_RNG.1: 9
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC: 12
- FDP_ACC.1: 30
- FDP_ACF: 9
- FDP_ACF.1: 17
- FDP_DAU: 12
- FDP_DAU.1: 3
- FDP_DAU.2: 12
- FDP_ETC: 3
- FDP_ETC.1: 2
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_ETC.2: 6
- FDP_ETC.2.1: 1
- FDP_ETC.2.2: 1
- FDP_ETC.2.3: 1
- FDP_ETC.2.4: 1
- FDP_IFC.1: 23
- FDP_ITC: 12
- FDP_ITC.1: 18
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 32
- FDP_RIP: 3
- FDP_RIP.1: 1
- FDP_UCT: 1
- FDP_UIT: 1
- FIA:
- FIA_AFL.1: 4
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_API: 10
- FIA_API.1: 9
- FIA_ATD.1: 4
- FIA_ATD.1.1: 1
- FIA_UAU.1: 4
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 1
- FIA_UAU.5: 2
- FIA_UAU.5.1: 14
- FIA_UAU.5.2: 2
- FIA_UAU.6: 3
- FIA_UAU.6.1: 1
- FIA_UID.1: 11
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 2
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF: 6
- FMT_MOF.1: 9
- FMT_MOF.1.1: 7
- FMT_MSA: 7
- FMT_MSA.1: 10
- FMT_MSA.2: 4
- FMT_MSA.2.1: 1
- FMT_MSA.3: 5
- FMT_MSA.4: 7
- FMT_MTD: 23
- FMT_MTD.1: 28
- FMT_MTD.3: 18
- FMT_MTD.3.1: 1
- FMT_SAE.1: 5
- FMT_SAE.1.1: 1
- FMT_SAE.1.2: 1
- FMT_SMF: 2
- FMT_SMF.1: 11
- FMT_SMF.1.1: 1
- FMT_SMR: 9
- FMT_SMR.1: 20
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_ESA: 12
- FPT_ESA.1: 15
- FPT_ESA.1.1: 1
- FPT_ESA.1.2: 1
- FPT_ESA.1.3: 1
- FPT_ESA.1.4: 1
- FPT_FLS.1: 4
- FPT_FLS.1.1: 1
- FPT_ISA: 15
- FPT_ISA.1: 18
- FPT_ISA.1.1: 1
- FPT_ISA.1.2: 1
- FPT_ISA.1.3: 1
- FPT_ISA.1.4: 1
- FPT_ISA.1.5: 1
- FPT_STM.1: 12
- FPT_STM.1.1: 4
- FPT_TCT: 13
- FPT_TCT.1: 7
- FPT_TDC: 9
- FPT_TDC.1: 20
- FPT_TIT: 18
- FPT_TIT.1: 13
- FPT_TIT.1.1: 2
- FPT_TIT.1.2: 1
- FPT_TST.1: 5
- FPT_TST.1.1: 2
- FPT_TST.1.2: 2
- FPT_TST.1.3: 3
- FTP:
- FTP_ITC.1: 14
- FTP_ITC.1.1: 3
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 3
|
pdf_data/st_keywords/cc_claims |
- A:
- A.APP_: 1
- A.APP_CONFIG: 1
- A.PUBLISHED_: 1
- A.SMARTCARD: 1
- A.THIRD_PARTY_: 1
- A.TRUSTADMIN: 1
- A.USER_: 1
- OE:
- OE.CERTIFICATES: 3
- OE.CLIENT_: 1
- OE.CLIENT_PHYSICAL: 1
- OE.CLIENT_TPSW: 3
- OE.IPSEC: 8
- OE.LIMIT_AUT: 1
- OE.LIMIT_AUTH: 2
- OE.MALWARE_: 1
- OE.MALWARE_PROT: 1
- OE.MALWARE_PROTECT: 2
- OE.MEMORY: 4
- OE.OS_CONFIG: 2
- OE.OS_CONFIG_: 2
- OE.OS_CONFIG_CLIENT: 2
- OE.OS_CONFIG_SERVER: 2
- OE.PASSWORD: 1
- OE.PASSWORD_: 1
- OE.PASSWORD_SETUP: 1
- OE.SECURE_: 1
- OE.SECURE_EN: 1
- OE.SECURE_ENCRYPTION: 2
- OE.SERVER_: 1
- OE.SERVER_PHYSICAL: 2
- OE.SERVER_TH: 1
- OE.SERVER_THIRD_: 1
- OE.SERVER_THIRD_PARTY_SW: 1
- OE.SESSION_K: 1
- OE.SESSION_KEYS: 3
- OE.TRUSTED_: 1
- OE.TRUSTED_OPS: 2
- OSP:
- OT:
- OT.APPS_: 1
- OT.APPS_AVAIL: 2
- OT.AUTHENTIC_: 4
- OT.AUTHENTIC_CLIENT: 1
- OT.AUTHENTIC_SERVER: 1
- OT.CONF: 3
- OT.CONF_: 1
- OT.CONF_CLIENT: 2
- OT.CUTPASTE: 1
- OT.CUT_PASTE: 2
- OT.DRIVES: 3
- OT.GATE_ALLO: 1
- OT.GATE_ALLOW: 2
- OT.INTEG: 3
- OT.INTEG_: 1
- OT.INTEG_CLIENT: 2
- OT.SECURE_ENC: 1
- OT.SECURE_ENCRYP: 1
- OT.SECURE_ENCRYPTION: 2
- T:
- T.AUTHENTIC: 4
- T.AVAIL: 4
- T.MISDIRECT: 2
- T.MOD_CONF: 4
- T.MOD_HW_CLIENT: 1
- T.MOD_HW_SERVER: 1
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- AES:
- AES: 25
- AES-: 4
- AES-128: 8
- AES-256: 8
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-256: 4
- SHA-384: 2
- SHA-512: 2
- SHA256: 2
- SHA384: 1
|
pdf_data/st_keywords/crypto_scheme |
|
- KA:
- Key Agreement: 2
- Key agreement: 2
- MAC:
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- SCA:
- physical probing: 1
- side channel: 2
|
pdf_data/st_keywords/technical_report_id |
|
- BSI:
- BSI TR-03110: 1
- BSI TR-03151: 3
- BSI TR-03153: 2
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
- IBM:
- SE: 3
- Secure Execution: 1
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140: 3
- FIPS 140-1: 1
- FIPS 140-2: 3
- FIPS 186-2: 1
- FIPS140: 10
- FIPS140-1: 2
- FIPS140-2: 2
- RFC:
- RFC 2246: 3
- RFC 2412: 1
- RFC 2451: 1
|
- BSI:
- AIS 20: 1
- AIS 31: 1
- AIS20: 2
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- FIPS 140-2: 3
- FIPS 180-4: 1
- FIPS 186-4: 1
- FIPS PUB 180-4: 6
- FIPS PUB 186-4: 14
- FIPS PUB 197: 3
- FIPS197: 10
- ICAO:
- ISO:
- ISO/IEC 10116: 4
- ISO/IEC 14888-: 4
- ISO/IEC 14888-2: 6
- ISO/IEC 18033-: 1
- ISO/IEC 18033-3: 4
- ISO/IEC 27001: 2
- ISO/IEC 9797-2: 3
- ISO/IEC18033-3: 1
- PKCS:
- PKCS #1: 6
- PKCS#1: 9
- PKCS#5: 2
- PKCS5: 1
- RFC:
- RFC2104: 9
- RFC5639: 12
- RFC6954: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- The TOE comprises the sample deployment as described below. All other configurations are out of scope of the evaluation. The deployment uses the Secure Gateway to provide TLS encryption between a TLS-: 1
- out of scope: 2
- the TOE. Note: The Windows operating system provides the function that authenticates users. This is out of scope of the TOE, so there are no mechanisms requiring assessment. Version 1.0 Page 35 of 56 July 2005: 1
|
|
pdf_data/st_metadata |
- /CreationDate: 9:9 7/25/2005
- /Creator: Windows NT 4.0
- /Producer: GNU Ghostscript 7.05
- /Title: Untitled Document
- pdf_file_size_bytes: 328607
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 56
|
- /Author: X00010763
- /CreationDate: D:20211015113933+02'00'
- /ModDate: D:20211015113933+02'00'
- /Producer: Microsoft: Print To PDF
- /Title: Microsoft Word - DTRUST_CSPLight_ST_V1.3.7.docx
- pdf_file_size_bytes: 1787801
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 83
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |