Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Avaya VoIP PBX System based on the Communication Manager 5.1
BSI-DSZ-CC-0540-2009
Plateforme UpTeq NFC 2.0.4_OFM release B sur composant ST33F1ME (S1121881 / Release B), configuration MIFARE activé ou configuration MIFARE désactivé
ANSSI-CC-2014/56
name Avaya VoIP PBX System based on the Communication Manager 5.1 Plateforme UpTeq NFC 2.0.4_OFM release B sur composant ST33F1ME (S1121881 / Release B), configuration MIFARE activé ou configuration MIFARE désactivé
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme DE FR
not_valid_after 01.09.2019 08.11.2019
not_valid_before 27.03.2009 08.11.2014
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0540a.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/rapport%20de%20certification%20anssi-cc-2014_56.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0540b.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI_cible2014_56en.pdf
manufacturer Avaya GmbH & Co. KG Gemalto / STMicroelectronics
manufacturer_web https://www.avaya.com/de/ https://www.gemalto.com/
security_level ASE_SPD.1, ADV_FSP.2, ASE_OBJ.2, ASE_REQ.2, EAL1+ ALC_DVS.2, EAL4+, AVA_VAN.5
dgst 7ffe542d7171483d 933e1822aabee195
heuristics/cert_id BSI-DSZ-CC-0540-2009 ANSSI-CC-2014/56
heuristics/cert_lab BSI THALES
heuristics/extracted_sars ALC_LCD.2, ALC_CMC.1, ASE_INT.1, ALC_DVS.2, ADV_FSP.2, ASE_ECD.1, APE_ECD.1, ASE_TSS.1, ASE_SPD.1, AVA_VAN.1, ALC_DEL.1, ALC_TAT.3, ALC_FLR.3, ATE_FUN.2, AGD_OPE.1, AGD_PRE.1, APE_REQ.2, ATE_IND.1, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_IMP.2, ASE_REQ.2, ATE_DPT.4, ADV_INT.3, APE_INT.1, APE_SPD.1, ALC_CMS.1, APE_OBJ.2, ASE_CCL.1, ADV_TDS.6, ATE_COV.3, ADV_SPM.1 ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ADV_FSP.4, ASE_CCL.1
heuristics/extracted_versions 5.1 2.0.4
heuristics/report_references/directly_referenced_by {} ANSSI-CC-2014/83
heuristics/report_references/directly_referencing {} ANSSI-CC-2013/28, ANSSI-CC-2011/07
heuristics/report_references/indirectly_referenced_by {} ANSSI-CC-2014/83, ANSSI-CC-2014/96
heuristics/report_references/indirectly_referencing {} ANSSI-CC-2010/49, ANSSI-CC-2013/28, ANSSI-CC-2011/17, ANSSI-CC-2012/48, ANSSI-CC-2011/07, ANSSI-CC-2011/77, ANSSI-CC-2010/50
heuristics/protection_profiles {} f6d23054061d72ba
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf
pdf_data/report_filename 0540a.pdf rapport de certification anssi-cc-2014_56.pdf
pdf_data/report_frontpage
  • FR:
  • DE:
    • cert_id: BSI-DSZ-CC-0540-2009
    • cert_item: Avaya VoIP PBX System based on the Communication Manager 5.1
    • cert_lab: BSI
    • developer: Avaya GmbH & Co. KG sponsored by Avaya Inc
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
  • FR:
    • cc_security_level: EAL 4 augmenté ALC_DVS.2, AVA_VAN.5
    • cc_version: Critères Communs version 3.1 révision 3
    • cert_id: ANSSI-CC-2014/56
    • cert_item: Carte UpTeq NFC 2.0.4_OFM release B, configuration MIFARE activé ou MIFARE désactivé, sur composant ST33F1ME (T1020364/release B
    • cert_item_version: Plateforme UpTeq NFC 2.0.4_OFM release B sur composant ST33F1ME (S1121881 / Release B), configuration MIFARE activé ou configuration MIFARE désactivé
    • cert_lab: THALES (TCS – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France
    • developer: Gemalto La Vigie, Av du Jujubier, ZI Athelia IV, 13705 La Ciotat Cedex, France STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, B.P. 2, 13106 Rousset, France Commanditaire Gemalto La Vigie, Av du Jujubier, ZI Athelia IV, 13705 La Ciotat Cedex, France
    • match_rules: ['Référence du rapport de certification(.+)Nom du produit \\(référence/version\\)(.+)Nom de la TOE \\(référence/version\\)(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
    • ref_protection_profiles: PPUSIMB], version 2.0.2, (U)SIM Java Card Platform Protection Profile - Basic configuration
  • DE:
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0540: 1
    • BSI-DSZ-CC-0540-2009: 16
  • FR:
    • ANSSI-CC-2011/07: 4
    • ANSSI-CC-2013/28: 2
    • ANSSI-CC-2014/56: 21
    • ANSSI-CC-PP-2010/04: 1
pdf_data/report_keywords/cc_protection_profile_id
  • ANSSI:
    • ANSSI-CC-PP-2010/04: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 5
    • EAL 1 augmented: 3
    • EAL 4: 1
    • EAL 7: 1
    • EAL1: 6
    • EAL1+: 2
    • EAL2: 3
    • EAL3: 4
    • EAL4: 4
    • EAL5: 6
    • EAL6: 3
    • EAL7: 4
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 4: 2
    • EAL 5: 1
    • EAL 7: 1
    • EAL4: 2
    • EAL5: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 5
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 1
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 1
    • ALC_DEL: 2
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 1
    • ALC_FLR: 1
    • ALC_FLR.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 1
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 1
    • ALC_TAT.2: 1
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 5
    • ASE_REQ.1: 1
    • ASE_REQ.2: 5
    • ASE_SPD: 1
    • ASE_SPD.1: 5
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 1
    • ATE_DPT.4: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 1
    • ATE_IND.1: 2
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 2
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 1
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 3
    • ALC_FLR: 2
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 5
pdf_data/report_keywords/vendor
  • Gemalto:
    • Gemalto: 5
  • Morpho:
    • Morpho: 1
  • STMicroelectronics:
    • STMicroelectronics: 2
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • DES:
    • 3DES:
      • 3DES: 1
    • DES:
      • DES: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 2
pdf_data/report_keywords/crypto_library
  • Neslib:
    • NesLib v3.0: 1
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI 7149: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • 1.0, 2009-03-10, Evaluation Technical Report BSI-DSZ-CC-0540, CSC Deutschland Solutions GmbH, (confidential document) [8] Configuration list for the TOE, Version 1.0, 2009-03-09, Avaya VoIP PBX System Configuration: 1
    • Avaya GmbH & Co KG (confidential document) [9] Guidance CD “Communication Manager 5.0”, Publication Date: January 2008 [10] Guidance CD: 1
  • OutOfScope:
    • TOE but relevant for the operation. Also here, the network devices like switches and routers are out of scope. This holds also valid for the connection to the internet (the SIP trunk) and the required network: 1
    • may implement some security features like IEEE 802.1X network device authentication. They are out of scope. Their existence and their security features can be assumed. The protection zone “Server” contains: 1
    • out of scope: 2
pdf_data/report_metadata
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20090421135047+02'00'
  • /Creator: Writer
  • /Keywords: "Avaya VoIP PBX Systembased on the Communication Manager 5.1, Avaya GmbH & Co. KG, Avaya Inc., BSI-DSZ-CC-0540-2009"
  • /ModDate: D:20090504155601+02'00'
  • /Producer: StarOffice 9
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0540-2009
  • pdf_file_size_bytes: 856495
  • pdf_hyperlinks: http://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 36
  • /Author: nrb
  • /CreationDate: D:20140812161407+02'00'
  • /Creator: Microsoft® Word 2010
  • /Keywords: ANSSI-CC-CER-F-07.010
  • /ModDate: D:20140812161407+02'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: Plateforme UpTeq NFC 2.0.4_OFM release B sur composant ST33F1ME (S1121881 / Release B), configuration MIFARE activé ou configuration MIFARE désactivé
  • /Title: ANSSI-CC-2014/56
  • pdf_file_size_bytes: 617735
  • pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 20
pdf_data/st_filename 0540b.pdf ANSSI_cible2014_56en.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0540: 1
  • NL:
    • CC-1: 1
    • CC-2: 4
    • CC-3: 2
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-2007-0035: 2
  • other:
    • PP-SSCD: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 1 augmented: 1
    • EAL1: 1
    • EAL2: 1
  • EAL:
    • EAL4: 4
    • EAL4 augmented: 2
    • EAL4+: 1
    • EAL5: 1
    • EAL5 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 4
    • ADV_FSP.2: 7
  • AGD:
    • AGD_OPE.1: 5
    • AGD_PRE.1: 5
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 4
    • ASE_REQ.1: 2
    • ASE_REQ.2: 5
    • ASE_SPD.1: 3
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 6
    • ADV_FSP.1: 4
    • ADV_FSP.2: 2
    • ADV_FSP.4: 9
    • ADV_IMP.1: 5
    • ADV_TDS.1: 2
    • ADV_TDS.2: 1
    • ADV_TDS.3: 9
  • AGD:
    • AGD_ADM: 1
    • AGD_OPE.1: 10
    • AGD_PRE.1: 6
    • AGD_USR: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.1: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 2
    • ALC_DVS.2: 9
    • ALC_LCD.1: 3
    • ALC_TAT.1: 3
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 4
    • ASE_INT.1: 5
    • ASE_OBJ.2: 3
    • ASE_REQ.1: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 2
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 3
    • ATE_DPT.1: 2
    • ATE_FUN.1: 6
  • AVA:
    • AVA_VAN.5: 9
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 7
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
  • FDP:
    • FDP_ACC.1: 17
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 8
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_ETC.1: 6
    • FDP_ETC.1.1: 1
    • FDP_ETC.1.2: 1
    • FDP_ETC.2: 6
    • FDP_ETC.2.1: 1
    • FDP_ETC.2.2: 1
    • FDP_ETC.2.3: 1
    • FDP_ETC.2.4: 1
    • FDP_IFC.1: 47
    • FDP_IFC.1.1: 3
    • FDP_IFF.1: 27
    • FDP_IFF.1.1: 3
    • FDP_IFF.1.2: 3
    • FDP_IFF.1.3: 3
    • FDP_IFF.1.4: 3
    • FDP_IFF.1.5: 3
    • FDP_ITC.2: 6
    • FDP_ITC.2.1: 1
    • FDP_ITC.2.2: 1
    • FDP_ITC.2.3: 1
    • FDP_ITC.2.4: 1
    • FDP_ITC.2.5: 1
    • FDP_ITT.1: 1
    • FDP_ITT.2: 6
    • FDP_ITT.2.1: 1
    • FDP_ITT.2.2: 1
    • FDP_RIP.1: 1
    • FDP_RIP.2: 6
    • FDP_RIP.2.1: 1
  • FIA:
    • FIA_UAU.1: 8
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.2: 10
    • FIA_UAU.2.1: 2
    • FIA_UAU.3: 6
    • FIA_UAU.3.1: 1
    • FIA_UAU.3.2: 1
    • FIA_UID.1: 21
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_UID.2: 14
    • FIA_UID.2.1: 2
  • FMT:
    • FMT_MSA.1: 28
    • FMT_MSA.1.1: 3
    • FMT_MSA.3: 35
    • FMT_MSA.3.1: 4
    • FMT_MSA.3.2: 4
    • FMT_MTD.1: 15
    • FMT_MTD.1.1: 3
    • FMT_SMF.1: 50
    • FMT_SMF.1.1: 6
    • FMT_SMR.1: 44
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 2
  • FPT:
    • FPT_STM.1: 2
    • FPT_TDC.1: 9
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
  • FTP:
    • FTP_ITC.1: 14
    • FTP_ITC.1.1: 2
    • FTP_ITC.1.2: 2
    • FTP_ITC.1.3: 2
    • FTP_TRP.1: 1
  • FAU:
    • FAU_ARP.1: 17
    • FAU_ARP.1.1: 1
    • FAU_SAA.1: 3
    • FAU_SAS.1: 1
  • FCO:
    • FCO_NRO: 14
    • FCO_NRO.2: 8
  • FCS:
    • FCS_CKM: 74
    • FCS_CKM.1: 23
    • FCS_CKM.2: 7
    • FCS_CKM.3: 4
    • FCS_CKM.4: 45
    • FCS_CKM.4.1: 1
    • FCS_COP: 58
    • FCS_COP.1: 18
    • FCS_RND: 2
    • FCS_RND.1: 9
    • FCS_RND.1.1: 2
    • FCS_RNG.1: 2
  • FDP:
    • FDP_ACC: 48
    • FDP_ACC.1: 22
    • FDP_ACC.2: 8
    • FDP_ACF: 38
    • FDP_ACF.1: 25
    • FDP_IFC: 46
    • FDP_IFC.1: 26
    • FDP_IFC.2: 4
    • FDP_IFF: 40
    • FDP_IFF.1: 28
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.4: 1
    • FDP_ITC: 20
    • FDP_ITC.1: 19
    • FDP_ITC.2: 33
    • FDP_ITT.1: 1
    • FDP_RIP: 116
    • FDP_RIP.1: 10
    • FDP_ROL: 21
    • FDP_ROL.1: 7
    • FDP_SDI: 6
    • FDP_SDI.1: 1
    • FDP_SDI.2: 8
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UIT: 12
    • FDP_UIT.1: 4
  • FIA:
    • FIA_ATD: 9
    • FIA_ATD.1: 2
    • FIA_UAU: 18
    • FIA_UAU.1: 2
    • FIA_UAU.4: 1
    • FIA_UID: 33
    • FIA_UID.1: 16
    • FIA_UID.2: 1
    • FIA_USB: 8
    • FIA_USB.1: 3
  • FMT:
    • FMT_LIM: 1
    • FMT_LIM.1: 2
    • FMT_LIM.2: 1
    • FMT_MOF: 6
    • FMT_MOF.1: 1
    • FMT_MSA: 174
    • FMT_MSA.1: 18
    • FMT_MSA.2: 2
    • FMT_MSA.3: 27
    • FMT_MSA.3.1: 2
    • FMT_MTD: 26
    • FMT_MTD.1: 3
    • FMT_MTD.3: 1
    • FMT_REV: 8
    • FMT_REV.1: 4
    • FMT_SMF: 68
    • FMT_SMF.1: 30
    • FMT_SMF.1.1: 1
    • FMT_SMR: 75
    • FMT_SMR.1: 48
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO: 5
    • FPR_UNO.1: 11
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_FLS: 61
    • FPT_FLS.1: 8
    • FPT_FLS.1.1: 1
    • FPT_ITT: 12
    • FPT_ITT.1: 3
    • FPT_PHP.3: 1
    • FPT_RCV: 22
    • FPT_RCV.3: 12
    • FPT_RCV.4: 2
    • FPT_TDC.1: 10
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TST.1: 1
    • FPT_UNO: 1
  • FRU:
    • FRU_FLT.2: 1
  • FTP:
    • FTP_ITC: 24
    • FTP_ITC.1: 10
    • FTP_TRP.1: 4
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 4
    • A.AVAILABLE: 3
    • A.DEVICES: 3
    • A.ERRMONITORING: 3
    • A.LOCATION: 3
    • A.PHYSICAL: 4
    • A.SECDEV: 3
    • A.SECNET: 3
    • A.USER: 3
    • A.VPN: 3
  • O:
    • O.AUTHENTICATE: 1
    • O.CONFCLIENT: 1
    • O.DISCLOSE: 1
    • O.LOGEXPORT: 1
    • O.MEDIATION: 1
    • O.RESTRICTION: 1
    • O.SELFPROTECT: 1
  • OE:
    • OE.ADMIN: 14
    • OE.AVAILABLE: 2
    • OE.DEVICES: 3
    • OE.ERRMONITORING: 5
    • OE.LOCATION: 5
    • OE.LOGOUT: 3
    • OE.NETMONITOR: 7
    • OE.OS: 3
    • OE.PHYSICAL: 9
    • OE.SECDEV: 2
    • OE.SECNET: 4
    • OE.USER: 2
    • OE.VPN: 4
  • OSP:
    • OSP.NETMONITOR: 3
    • OSP.OS: 4
  • A:
    • A.APPLET: 5
    • A.APPS-PROVIDER: 4
    • A.CONTROLLING-: 2
    • A.CONTROLLING-AUTHORITY: 2
    • A.DELETION: 2
    • A.KEY-ESCROW: 5
    • A.MOBILE-OPERATOR: 4
    • A.OTA-ADMIN: 4
    • A.PERSONALIZER: 4
    • A.PRODUCTION: 4
    • A.VERIFICATION: 4
    • A.VERIFICATION-: 2
    • A.VERIFICATION-AUTHORITY: 2
  • D:
    • D.API_DATA: 3
    • D.APP_CODE: 8
    • D.APP_C_DATA: 5
    • D.APP_I_DATA: 6
    • D.APSD_KEYS: 3
    • D.CARD_MNGT_DATA: 3
    • D.CASD_KEYS: 3
    • D.CRYPTO: 4
    • D.GP_CODE: 1
    • D.ISD_KEYS: 3
    • D.JCS_CODE: 3
    • D.JCS_DATA: 5
    • D.OPTIONAL_PF_SERVICE: 2
    • D.PIN: 4
    • D.SEC_DATA: 7
    • D.VASD_KEYS: 2
  • O:
    • O.ALARM: 21
    • O.APPLET: 21
    • O.APPLI-: 1
    • O.APPLI-AUTH: 10
    • O.CARD-: 5
    • O.CARD-MANAGEMENT: 49
    • O.CARD_MANAGEMENT: 2
    • O.CIPHER: 25
    • O.CODE_PKG: 14
    • O.COMM_AUTH: 16
    • O.COMM_CONFIDENTIALITY: 13
    • O.COMM_INTEGRITY: 16
    • O.DELETION: 15
    • O.DOMAIN-: 9
    • O.DOMAIN-RIGHTS: 19
    • O.FIREWALL: 52
    • O.GLOBAL_ARRAYS_CONFID: 18
    • O.GLOBAL_ARRAYS_INTEG: 11
    • O.INSTALL: 16
    • O.JAVAOBJECT: 41
    • O.KEY-: 2
    • O.KEY-MNGT: 33
    • O.LOAD: 16
    • O.NATIVE: 13
    • O.OBJ-DELETION: 8
    • O.OPERATE: 36
    • O.PIN-: 7
    • O.PIN-MNGT: 15
    • O.REALLOCATION: 16
    • O.REMOTE: 15
    • O.REMOTE_MTHD: 6
    • O.REMOTE_OBJ: 10
    • O.REMOTE_SERVICE_ACTIVATION: 11
    • O.REMOTE_SERVICE_AUDIT: 11
    • O.RESOURCES: 26
    • O.RMI_SERVICE: 12
    • O.RND: 10
    • O.ROR: 5
    • O.SCP: 28
    • O.SCP-: 3
    • O.SCP-SUPPORT: 19
    • O.SID: 36
    • O.TRANSACTION: 19
  • OE:
    • OE.ACTIVATION-: 1
    • OE.ACTIVATION-KEY-ESCROW: 6
    • OE.AID-MANAGEMENT: 6
    • OE.AP-KEYS: 6
    • OE.APPLET: 9
    • OE.APPS-PROVIDER: 6
    • OE.BASIC-: 4
    • OE.BASIC-APPS-: 6
    • OE.BASIC-APPS-VALIDATION: 16
    • OE.CA-KEYS: 8
    • OE.CARD_MANAGEMENT: 2
    • OE.CONTROLLING-: 1
    • OE.CONTROLLING-AUTHORITY: 5
    • OE.GEMACTIVATE-ADMIN: 4
    • OE.KEY-CHANGE: 7
    • OE.KEY-ESCROW: 7
    • OE.KEY-GENERATION: 4
    • OE.MOBILE-OPERATOR: 6
    • OE.OPERATOR-KEYS: 6
    • OE.OTA-ADMIN: 4
    • OE.OTA-LOADING: 4
    • OE.OTA-SERVERS: 6
    • OE.PERSONALIZER: 4
    • OE.PRODUCTION: 5
    • OE.QUOTAS: 6
    • OE.SCP: 3
    • OE.SECURE-APPS-CERTIFICATION: 4
    • OE.SECURITY-DOMAINS: 4
    • OE.SHARE-CONTROL: 6
    • OE.TRUSTED-APPS-DEVELOPER: 7
    • OE.TRUSTED-APPS-PRE-ISSUANCE: 5
    • OE.VA-KEYS: 7
    • OE.VERIFICATION: 34
    • OE.VERIFICATION-: 1
    • OE.VERIFICATION-AUTHORITY: 3
  • OP:
    • OP.ARRAY_ACCESS: 4
    • OP.CREATE: 7
    • OP.DELETE_APPLET: 4
    • OP.DELETE_PCKG: 3
    • OP.DELETE_PCKG_APPLET: 3
    • OP.GET_ROR: 3
    • OP.INSTANCE_FIELD: 4
    • OP.INVK_INTERFACE: 7
    • OP.INVK_VIRTUAL: 6
    • OP.INVOKE: 3
    • OP.JAVA: 5
    • OP.PUT: 6
    • OP.RET_RORD: 3
    • OP.THROW: 5
    • OP.TYPE_ACCESS: 5
  • OSP:
    • OSP.ACTIVATION-KEY-ESCROW: 5
    • OSP.AID-MANAGEMENT: 4
    • OSP.APSD-KEYS: 4
    • OSP.BASIC-: 1
    • OSP.BASIC-APPS-VALIDATION: 3
    • OSP.CASD-KEYS: 4
    • OSP.KEY-CHANGE: 4
    • OSP.KEY-GENERATION: 4
    • OSP.OPERATOR-KEYS: 4
    • OSP.OTA-LOADING: 4
    • OSP.OTA-SERVERS: 4
    • OSP.QUOTAS: 4
    • OSP.RNG: 5
    • OSP.SECURE-APPS-: 2
    • OSP.SECURE-APPS-CERTIFICATION: 2
    • OSP.SECURITY-DOMAINS: 4
    • OSP.SERVICE: 1
    • OSP.SERVICE_AUDIT: 4
    • OSP.SHARE-CONTROL: 4
    • OSP.TRUSTED-: 1
    • OSP.TRUSTED-APPS-DEVELOPER: 5
    • OSP.TRUSTED-APPS-PRE-: 2
    • OSP.TRUSTED-APPS-PRE-ISSUANCE: 2
    • OSP.VASD-KEYS: 4
    • OSP.VERIFICATION: 5
  • R:
    • R.JAVA: 11
  • T:
    • T.COM_EXPLOIT: 6
    • T.CONFID-APPLI-DATA: 18
    • T.CONFID-JCS-: 9
    • T.CONFID-JCS-CODE: 5
    • T.CONFID-JCS-DATA: 4
    • T.DELETION: 7
    • T.EXE-: 1
    • T.EXE-CODE: 11
    • T.EXE-CODE-REMOTE: 4
    • T.INSTALL: 6
    • T.INTEG-: 10
    • T.INTEG-APPLI-: 7
    • T.INTEG-APPLI-CODE: 9
    • T.INTEG-APPLI-DATA: 16
    • T.INTEG-JCS-CODE: 7
    • T.INTEG-JCS-DATA: 6
    • T.INTEG-USER-DATA: 9
    • T.LIFE_CYCLE: 6
    • T.NATIVE: 7
    • T.OBJ-DELETION: 4
    • T.PHYSICAL: 5
    • T.RESOURCES: 8
    • T.SID: 18
    • T.UNAUTHORIZED_ACCESS: 4
    • T.UNAUTHORIZED_ACCESS_TO_SERVIC: 1
    • T.UNAUTHORIZED_ACCESS_TO_SERVICE: 5
    • T.UNAUTHORIZED_CARD_MNGT: 9
pdf_data/st_keywords/vendor
  • Gemalto:
    • Gemalto: 202
  • Morpho:
    • Morpho: 2
  • STMicroelectronics:
    • STMicroelectronics: 3
pdf_data/st_keywords/eval_facility
  • TrustedLabs:
    • Trusted Labs: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • AES_competition:
    • AES:
      • AES: 8
  • DES:
    • 3DES:
      • TDES: 5
    • DES:
      • DES: 16
  • constructions:
    • MAC:
      • CMAC: 2
      • HMAC: 7
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
  • MD:
    • MD5:
      • MD5: 1
  • SHA:
    • SHA1:
      • SHA-1: 2
    • SHA2:
      • SHA-2: 3
      • SHA-224: 2
      • SHA-256: 3
      • SHA-384: 3
      • SHA2: 2
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key agreement: 1
  • MAC:
    • MAC: 21
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 4
  • VPN:
    • VPN: 14
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 10
    • RNG: 8
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 8
  • ECB:
    • ECB: 4
pdf_data/st_keywords/crypto_engine
  • NesCrypt:
    • Nescrypt: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • fault induction: 2
    • malfunction: 3
    • physical tampering: 4
  • SCA:
    • DPA: 1
    • physical probing: 1
  • other:
    • JIL: 2
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2006-09-001: 2
    • CCMB-2007-09-002: 2
    • CCMB-2007-09-003: 2
  • CC:
    • CCIMB-2009-07-001: 1
    • CCIMB-2009-07-002: 1
    • CCIMB-2009-07-003: 1
    • CCIMB-2009-07-004: 1
  • FIPS:
    • FIPS 140-2: 1
    • FIPS 180-2: 1
    • FIPS 180-3: 1
    • FIPS 197: 1
    • FIPS 46-3: 1
    • FIPS PUB 197: 2
    • FIPS PUB 46-3: 3
    • FIPS PUB 81: 4
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 9796-2: 1
  • PKCS:
    • PKCS #1: 5
    • PKCS #5: 1
    • PKCS#1: 3
    • PKCS#5: 1
  • RFC:
    • RFC2085: 1
    • RFC2104: 1
  • SCP:
    • SCP 01: 1
    • SCP 02: 1
    • SCP 80: 1
    • SCP02: 5
    • SCP80: 8
pdf_data/st_keywords/javacard_version
  • GlobalPlatform:
    • Global Platform 2.2.1: 1
    • Global Platform 2.2.2: 1
  • JavaCard:
    • Java Card 2.2.2: 2
    • Java Card 3.0.1: 1
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 5
pdf_data/st_keywords/javacard_packages
  • java:
    • java.rmi: 2
  • javacard:
    • javacard.framework: 2
    • javacard.framework.service: 1
    • javacard.security: 2
  • javacardx:
    • javacardx.crypto: 10
    • javacardx.rmi: 1
    • javacardx.security: 9
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • TOE but relevant for the operation. Also here, the network devices like switches and routers are out of scope. This holds also valid for the connection to the internet (the SIP trunk) and the required network: 1
    • are held by us. In order to define the logical scope in detail, the following functions are out of scope of the TOE: Boarder protection of all external connections like SIP trunks or remote management: 1
    • may implement some security features like IEEE 802.1X network device authentication. They are out of scope. Their existence and their security features can be assumed. The protection zone “Server” contains: 1
    • out of scope: 3
  • OutOfScope:
    • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Reference D1255596 Release 1.3p (Printed copy not controlled: 1
    • out of scope: 2
    • parameters for cryptographic operations, the use of these other values are not advised; and clearly out of scope of the TOE. See [USR] for details. JCS.EraseResidualData The security function ensures that: 1
pdf_data/st_metadata
  • /Author: Avaya GmbH & Co KG
  • /CreationDate: D:20090309164738Z
  • /Creator: Microsoft® Office Word 2007
  • /Keywords: VoIP, CM 5.1, Communication Manager
  • /ModDate: D:20090407130547+02'00'
  • /Producer: Microsoft® Office Word 2007
  • /Subject: Common Criteria Evaluation
  • /Title: Avaya VoIP PBX System Security Target
  • pdf_file_size_bytes: 773349
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 63
  • /Author: fguerin
  • /CreationDate: D:20140602151611+02'00'
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20140602151611+02'00'
  • /Producer: Microsoft® Office Word 2007
  • /Title: ST Template for UpTeq NFC 2.0.4_OFM
  • pdf_file_size_bytes: 2590947
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 179
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different