name |
Citrix MetaFrame Presentation Server 4.0 |
IAS Classic V4.4.2 with MOC Server 1.1 on MultiApp V4.1 |
category |
Access Control Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
UK |
FR |
status |
archived |
archived |
not_valid_after |
05.03.2013 |
26.11.2023 |
not_valid_before |
01.08.2005 |
26.11.2018 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP219.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018_53fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/LFS_T488_Citrix_ST_V10.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2018_53en.pdf |
manufacturer |
Citrix Systems, Inc. |
Gemalto / Samsung |
manufacturer_web |
https://www.citrix.com |
https://www.gemalto.com/ |
security_level |
EAL2 |
EAL5+, ALC_DVS.2, AVA_VAN.5 |
dgst |
7da57a5dc5ab73a9 |
c8760078857e71eb |
heuristics/cert_id |
CRP219 |
ANSSI-CC-2018/53 |
heuristics/cert_lab |
[] |
SERMA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_RCR.1, ADV_FSP.1, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, ADV_SPM.1, ATE_COV.1, AGD_ADM.1, ADV_HLD.1, AVA_SOF.1, ALC_FLR.2 |
ALC_DVS.2, AVA_VAN.5 |
heuristics/extracted_versions |
4.0 |
4.1, 1.1, 4.4.2 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2017/24, ANSSI-CC-2018/32 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
ANSSI-CC-2017/07, ANSSI-CC-2017/24, ANSSI-CC-2015/66, ANSSI-CC-2018/32, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0782-2012, ANSSI-CC-2017/76, ANSSI-CC-2016/59, ANSSI-CC-2017/54, BSI-DSZ-CC-0891-V2-2016 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
ANSSI-CC-2016/59 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
ANSSI-CC-2016/59 |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
CRP219.pdf |
anssi-cc-2018_53fr.pdf |
pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 5
- cert_id: ANSSI-CC-2018/53
- cert_item: IAS Classic V4.4.2 with MOC Server 1.1 on MultiApp V4.1
- cert_item_version: Version de l’application IAS : 4.4.2.A Version de l’application MOCA Server : 1.1.1A Version de la plateforme JavaCard MultiApp : 4.1
- cert_lab: Serma Safety & Security 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
- developer: Gemalto 6, rue de la Verrerie, 92197 Meudon cedex, France Samsung Electronics Co. 17 Floor, B-Tower, DSR building, Samsungjeonja-ro 1-1, Hwaseong-si, Gyenonggi-do 445-330 South Korea Commanditaire Gemalto 6, rue de la Verrerie, 92197 Meudon cedex, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: Protection profiles for secure signature creation device : Part 2: Device with key generation, v2.0.1, BSI-CC-PP-0059-2009-MA-01 ; Part 3: Device with key import, v1.0.2, BSI-CC-PP-0075-2012 ; Part 4: Extension for device with key generation and trusted communication with certificate generation application, v1.0.1, BSI-CC-PP-0071-2012 ; Part 5: Extension for device with key generation and trusted communication with signature creation application, v1.0.1, BSI-CC-PP-0072-2012 ; Part 6: Extension for device with key import and trusted communication with signature creation application, v1.0.4, BSI-CC-PP-0076-2013
|
pdf_data/report_keywords/cc_cert_id |
- UK:
- CERTIFICATION REPORT No. P219: 1
|
- FR:
- ANSSI-CC-2017/24: 2
- ANSSI-CC-2018/32: 1
- ANSSI-CC-2018/53: 17
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0059-2009-MA-01: 2
- BSI-CC-PP-0071-: 1
- BSI-CC-PP-0071-2012: 1
- BSI-CC-PP-0072-: 1
- BSI-CC-PP-0072-2012: 1
- BSI-CC-PP-0075-: 1
- BSI-CC-PP-0075-2012: 1
- BSI-CC-PP-0076-2013: 2
- BSI-PP-0084-2014: 1
- other:
- PP-SSCD-: 5
- PP-SSCD-Part2: 1
- PP-SSCD-Part3: 1
- PP-SSCD-Part4: 1
- PP-SSCD-Part5: 1
- PP-SSCD-Part6: 1
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL2: 4
- EAL2 augmented: 3
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 1
- EAL2: 2
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- AGD_OPE: 2
- AGD_PRE: 2
- AGD_PRE_OPE: 2
- AGD_USE: 1
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
- FTP:
- FTP_ITC.1: 1
- FTP_ITC.2: 1
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- Serma:
- SERMA: 1
- Serma Safety & Security: 1
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCIMB-2004-01-001: 1
- CCIMB-2004-01-002: 1
- CCIMB-2004-01-003: 1
- CCIMB-2004-01-004: 1
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- SCP:
- SCP01: 1
- SCP02: 1
- SCP03: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: racook
- /CreationDate: D:20050906112345Z
- /Creator: LFS T488 CITRIX_V40_CertRep_P219_10 - Microsoft Word
- /ModDate: D:20131119172038Z
- /Producer: Acrobat PDFWriter 5.0 for Windows NT
- /Title: LFS T488 CITRIX_V40_CertRep_P219_10.doc
- pdf_file_size_bytes: 1021419
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
- /Category: Référence, Version
- /Comments: Gemalto
- /Company: SGDSN/ANSSI
- /CreationDate: D:20181128164041+01'00'
- /Creator: Acrobat PDFMaker 11 pour Word
- /Keywords: ANSSI-CC-CER-F-07.28.1
- /ModDate: D:20181128164236+01'00'
- /Producer: Adobe PDF Library 11.0
- /SourceModified: D:20181128154037
- /Subject:
- /Title:
- pdf_file_size_bytes: 205266
- pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 16
|
pdf_data/st_filename |
LFS_T488_Citrix_ST_V10.pdf |
anssi-cible-cc-2018_53en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0059-2009-MA-02: 1
- BSI-CC-PP-0071-2012-MA-01: 1
- BSI-CC-PP-0072-2012-MA-01: 1
- BSI-CC-PP-0075-2012-MA-01: 1
- BSI-CC-PP-0076-2013-MA-01: 1
- BSI-CC-PP-0084-2014: 1
- other:
- PP-SSCD: 4
- PP-SSCD-: 1
- PP-SSCD-KG: 41
- PP-SSCD-KI: 30
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL2: 8
- EAL2 augmented: 2
- EAL2+: 1
|
- EAL:
- EAL 5+: 1
- EAL5: 5
- EAL5 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ADO:
- ADO_DEL.1: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP.1: 2
- ADV_HLD.1: 2
- ADV_RCR.1: 2
- ADV_SPM.1: 2
- AGD:
- AGD_ADM.1: 2
- AGD_USR.1: 2
- ALC:
- ATE:
- ATE_COV.1: 2
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
- AVA_SOF.1: 2
- AVA_VLA.1: 3
|
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 11
- FCS_CKM.1.1: 1
- FCS_CKM.2: 9
- FCS_CKM.2.1: 2
- FCS_CKM.4: 16
- FCS_CKM.4.1: 2
- FCS_COP.1: 21
- FCS_COP.1.1: 3
- FDP:
- FDP_ACC.1: 23
- FDP_ACF.1: 16
- FDP_IFC.1: 3
- FDP_ITT.1: 17
- FDP_ITT.1.1: 2
- FDP_RIP.1: 6
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 5
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 12
- FIA_ATD.1.1: 1
- FIA_UAU: 1
- FIA_UAU.2: 11
- FIA_UAU.2.1: 2
- FIA_UID.1: 1
- FIA_UID.2: 10
- FIA_UID.2.1: 2
- FMT:
- FMT_MOF.1: 14
- FMT_MOF.1.1: 2
- FMT_MSA.1: 11
- FMT_MSA.1.1: 1
- FMT_MSA.2: 12
- FMT_MSA.2.1: 1
- FMT_MSA.3: 9
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF: 1
- FMT_SMF.1: 16
- FMT_SMF.1.1: 1
- FMT_SMR.1: 21
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_AMT.1: 6
- FPT_AMT.1.1: 1
- FPT_ITT.1: 15
- FPT_ITT.1.1: 2
- FPT_RVM.1: 12
- FPT_RVM.1.1: 1
- FPT_SEP.1: 2
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_TST.1: 6
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 1
- FTP_ITC.1: 1
- FTP_ITC.2: 9
- FTP_ITC.2.1: 1
- FTP_ITC.2.2: 1
- FTP_ITC.2.3: 1
|
- FCS:
- FCS_CKM: 43
- FCS_CKM.1: 15
- FCS_CKM.1.1: 2
- FCS_CKM.2: 4
- FCS_CKM.4: 13
- FCS_CKM.4.1: 2
- FCS_COP: 22
- FCS_COP.1: 8
- FCS_COP.1.1: 2
- FDP:
- FDP_ACC: 40
- FDP_ACC.1: 28
- FDP_ACC.1.1: 4
- FDP_ACF: 27
- FDP_ACF.1: 11
- FDP_ACF.1.1: 4
- FDP_ACF.1.2: 4
- FDP_ACF.1.3: 4
- FDP_ACF.1.4: 4
- FDP_AFC: 1
- FDP_DAU: 8
- FDP_DAU.1: 1
- FDP_DAU.2: 1
- FDP_DAU.2.1: 1
- FDP_DAU.2.2: 1
- FDP_ETC.1: 1
- FDP_IFC.1: 18
- FDP_ITC: 9
- FDP_ITC.1: 9
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 8
- FDP_RIP: 1
- FDP_RIP.1: 7
- FDP_RIP.1.1: 1
- FDP_SDI: 15
- FDP_SDI.1: 2
- FDP_SDI.2: 2
- FDP_SDI.2.1: 2
- FDP_SDI.2.2: 2
- FDP_UCT: 8
- FDP_UCT.1: 1
- FDP_UCT.1.1: 1
- FDP_UIT: 8
- FDP_UIT.1: 1
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL: 14
- FIA_AFL.1: 1
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_API: 5
- FIA_API.1: 13
- FIA_API.1.1: 2
- FIA_UAU: 17
- FIA_UAU.1: 8
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UID: 17
- FIA_UID.1: 11
- FIA_UID.1.1: 2
- FIA_UID.1.2: 2
- FMT:
- FMT_MOF.1: 8
- FMT_MOF.1.1: 1
- FMT_MSA: 56
- FMT_MSA.1: 7
- FMT_MSA.1.1: 3
- FMT_MSA.2: 8
- FMT_MSA.2.1: 1
- FMT_MSA.3: 12
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MSA.4: 3
- FMT_MSA.4.1: 2
- FMT_MTD: 14
- FMT_MTD.1: 1
- FMT_MTD.1.1: 2
- FMT_SMF.1: 25
- FMT_SMF.1.1: 1
- FMT_SMR.1: 35
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS: 5
- FPT_EMS.1: 12
- FPT_EMS.1.1: 4
- FPT_EMS.1.2: 3
- FPT_FLS.1: 8
- FPT_FLS.1.1: 1
- FPT_PHP.1: 7
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 8
- FPT_PHP.3.1: 1
- FPT_TST: 2
- FPT_TST.1: 11
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ICT: 2
- FTP_ITC: 32
- FTP_ITC.1: 5
- FTP_ITC.1.1: 4
- FTP_ITC.1.2: 4
- FTP_ITC.1.3: 4
- FTP_TRP.1: 5
|
pdf_data/st_keywords/cc_claims |
- A:
- A.APP_: 1
- A.APP_CONFIG: 1
- A.PUBLISHED_: 1
- A.SMARTCARD: 1
- A.THIRD_PARTY_: 1
- A.TRUSTADMIN: 1
- A.USER_: 1
- OE:
- OE.CERTIFICATES: 3
- OE.CLIENT_: 1
- OE.CLIENT_PHYSICAL: 1
- OE.CLIENT_TPSW: 3
- OE.IPSEC: 8
- OE.LIMIT_AUT: 1
- OE.LIMIT_AUTH: 2
- OE.MALWARE_: 1
- OE.MALWARE_PROT: 1
- OE.MALWARE_PROTECT: 2
- OE.MEMORY: 4
- OE.OS_CONFIG: 2
- OE.OS_CONFIG_: 2
- OE.OS_CONFIG_CLIENT: 2
- OE.OS_CONFIG_SERVER: 2
- OE.PASSWORD: 1
- OE.PASSWORD_: 1
- OE.PASSWORD_SETUP: 1
- OE.SECURE_: 1
- OE.SECURE_EN: 1
- OE.SECURE_ENCRYPTION: 2
- OE.SERVER_: 1
- OE.SERVER_PHYSICAL: 2
- OE.SERVER_TH: 1
- OE.SERVER_THIRD_: 1
- OE.SERVER_THIRD_PARTY_SW: 1
- OE.SESSION_K: 1
- OE.SESSION_KEYS: 3
- OE.TRUSTED_: 1
- OE.TRUSTED_OPS: 2
- OSP:
- OT:
- OT.APPS_: 1
- OT.APPS_AVAIL: 2
- OT.AUTHENTIC_: 4
- OT.AUTHENTIC_CLIENT: 1
- OT.AUTHENTIC_SERVER: 1
- OT.CONF: 3
- OT.CONF_: 1
- OT.CONF_CLIENT: 2
- OT.CUTPASTE: 1
- OT.CUT_PASTE: 2
- OT.DRIVES: 3
- OT.GATE_ALLO: 1
- OT.GATE_ALLOW: 2
- OT.INTEG: 3
- OT.INTEG_: 1
- OT.INTEG_CLIENT: 2
- OT.SECURE_ENC: 1
- OT.SECURE_ENCRYP: 1
- OT.SECURE_ENCRYPTION: 2
- T:
- T.AUTHENTIC: 4
- T.AVAIL: 4
- T.MISDIRECT: 2
- T.MOD_CONF: 4
- T.MOD_HW_CLIENT: 1
- T.MOD_HW_SERVER: 1
|
- A:
- A.APPLET: 2
- A.CGA: 3
- A.CSP: 4
- A.SCA: 3
- A.VERIFICATION: 2
- OE:
- OE.APPLET: 1
- OE.CODE-EVIDENCE: 1
- OE.HID_VAD: 1
- OE.HI_VAD: 2
- OE.VERIFICATION: 4
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- Malfunction: 1
- fault injection: 1
- physical tampering: 4
- SCA:
- DPA: 1
- Leak-Inherent: 1
- SPA: 1
- timing attacks: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140: 3
- FIPS 140-1: 1
- FIPS 140-2: 3
- FIPS 186-2: 1
- FIPS140: 10
- FIPS140-1: 2
- FIPS140-2: 2
- RFC:
- RFC 2246: 3
- RFC 2412: 1
- RFC 2451: 1
|
- CC:
- CCMB-2012-04-003: 1
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-004: 1
- FIPS:
- PKCS:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- The TOE comprises the sample deployment as described below. All other configurations are out of scope of the evaluation. The deployment uses the Secure Gateway to provide TLS encryption between a TLS-: 1
- out of scope: 2
- the TOE. Note: The Windows operating system provides the function that authenticates users. This is out of scope of the TOE, so there are no mechanisms requiring assessment. Version 1.0 Page 35 of 56 July 2005: 1
|
- OutOfScope:
- by authorized users. The functionalities of IAS Classic V4.4.2 other than the ones from SSCD are out of scope of the TOE perimeter. 27/03/2018 Rev : 1.1p Page : 10 / 59 Gemalto Public Gemalto Private : 1
- out of scope: 1
|
pdf_data/st_metadata |
- /CreationDate: 9:9 7/25/2005
- /Creator: Windows NT 4.0
- /Producer: GNU Ghostscript 7.05
- /Title: Untitled Document
- pdf_file_size_bytes: 328607
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 56
|
- /Author: D1418852
- /CreationDate: D:20180327133533+02'00'
- /Creator: Microsoft® Word 2013
- /Keywords: 27-03-2018
- /ModDate: D:20180327133533+02'00'
- /Producer: Microsoft® Word 2013
- /Subject: 1.1p
- /Title: MultiApp V4.1: IAS EN Core & Extensions Security Target Lite
- pdf_file_size_bytes: 1418736
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 59
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |