name |
Thales Operator Terminal Adapter (OTA) |
IFX_CCI_00004Fh, IFX_CCI_000050h, IFX_CCI_000051h, IFX_CCI_000052h, IFX_CCI_000053h, IFX_CCI_000054h, IFX_CCI_000055h, IFX_CCI_000056h, IFX_CCI_000057h, IFX_CCI_000058h, IFX_CCI_00005Ch design step S11 with firmware 80.310.03.0 & 80.310.03.1, optional NRG SW 05.03.4097, optional HSL v3.52.9708, UMSLC lib v01.30.0564, optional SCL v2.15.000 and v2.11.003, optional ACL v3.33.003 and v3.02.000, optional RCL v1.10.007, optional HCL v1.13.002 and guidance |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
NO |
DE |
status |
archived |
active |
not_valid_after |
01.09.2019 |
16.05.2027 |
not_valid_before |
24.03.2010 |
16.05.2022 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1156V3c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20100324_SERTIT-012%20_CR_v1_0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1156V3a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/OTA_Security_Target_ed6_2_2.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1156V3b_pdf.pdf |
manufacturer |
Thales Norway AS |
Infineon Technologies AG |
manufacturer_web |
https://www.thales.no/ |
https://www.infineon.com/ |
security_level |
EAL5+, ALC_FLR.3 |
EAL6+, ALC_FLR.1 |
dgst |
85d4d4eb7fb5338e |
30597f1bc54c13c1 |
heuristics/cert_id |
SERTIT-012 |
BSI-DSZ-CC-1156-V3-2022 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_LCD.2, AGD_USR.1, AVA_SOF.1, ATE_COV.2, AVA_MSU.2, ATE_DPT.2, AGD_ADM.1, ALC_FLR.3, ADV_INT.1, ADV_RCR.2, ATE_FUN.1, ADV_IMP.2, ALC_TAT.2, AVA_VLA.3, ADV_HLD.3, ALC_DVS.1, ADV_SPM.3, ATE_IND.2, ADV_LLD.1, ADV_FSP.3, AVA_CCA.1 |
ASE_INT.1, ALC_DVS.2, ADV_TDS.5, ASE_ECD.1, ASE_TSS.1, ALC_FLR.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.3, ATE_FUN.2, ADV_FSP.5, AGD_OPE.1, AGD_PRE.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ADV_IMP.2, ALC_CMC.5, ASE_REQ.2, ADV_INT.3, ATE_IND.2, ASE_CCL.1, ATE_COV.3, ADV_SPM.1 |
heuristics/extracted_versions |
- |
1.10.007, 80.310.03.1, 2.11.003, 3.52.9708, 01.30.0564, 05.03.4097, 80.310.03.0, 3.33.003, 3.02.000, 2.15.000, 1.13.002 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-1156-V4-2024 |
heuristics/report_references/directly_referencing |
SERTIT-006, SERTIT-003 |
BSI-DSZ-CC-1156-V2-2021 |
heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-1156-V4-2024 |
heuristics/report_references/indirectly_referencing |
SERTIT-006, SERTIT-003 |
BSI-DSZ-CC-1156-V2-2021, BSI-DSZ-CC-1156-2021 |
heuristics/scheme_data |
- category: Other Devices and Systems
- certification_date: 24.03.2010
- developer: Thales Norway AS
- enhanced:
- category: Other Devices and Systems
- cert_id: SERTIT-012
- certification_date: 24.03.2010
- description: Thales Operator Terminal Adapter (OTA) is a part of the Voice Communication System (VCS) used in operation sites. The main purpose of the OTA is to provide the capabilities required to handle all voice presented at the Operator Controller Position (OCP) and to perform required red/black separation of voice and data
- developer: Thales Norway AS
- documents: frozendict({'cert': [frozendict({'href': 'https://sertit.no/getfile.php/134647-1607950011/SERTIT/Sertifikater/2010/12/20100324_SERTIT-012_Certificate.pdf'})], 'target': [frozendict({'href': 'https://sertit.no/getfile.php/134644-1609931839/SERTIT/Sertifikater/2010/12/OTA_Security_Target_ed6_2_2.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/134665-1607950035/SERTIT/Sertifikater/2010/12/20100324_SERTIT-012%20_CR_v1_0.pdf'})], 'maintenance': [frozendict({'href': 'https://sertit.no/getfile.php/134641-1609875883/SERTIT/Sertifikater/2010/12/20100929_Sertit%20012%20_Maintenance%20_Report_v_1_0%20_sign.pdf'}), frozendict({'href': 'https://sertit.no/getfile.php/134635-1607949992/SERTIT/Sertifikater/2010/12/20111107_Sertit%20012_Maintenance_Report_v_2_0_sig.pdf'}), frozendict({'href': 'https://sertit.no/getfile.php/134638-1607949997/SERTIT/Sertifikater/2010/12/20131120_SERTIT-012_Maintenance_Report_v_3_0.pdf'}), frozendict({'href': 'https://sertit.no/getfile.php/134656-1607950025/SERTIT/Sertifikater/2010/12/20140429_Sertit_012_Maintenance_Report_v_4.pdf'}), frozendict({'href': 'https://sertit.no/getfile.php/134659-1607950028/SERTIT/Sertifikater/2010/12/20150701_Sertit_012_Maintenance_Report_v_5_0.pdf'})]})
- evaluation_facility: Secode Norge AS
- level: EAL 5, ALC_FLR.3
- product: Trusted Kernel version 3AQ 24860 AAAA 6.2.1; Firewall definitions file 3AQ 24862 EAAA 6.2.2; Hardware version 3AQ 21564 AAAA ICS5A, -ICS7, -ICS7A and -ICS7B
- sponsor: Thales Norway AS
- product: Thales Operator Terminal Adapter (OTA)
- url: https://sertit.no/certified-products/product-archive/thales-operator-terminal-adapter-ota-1
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
cf0f01bcd7be3e9c |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf |
pdf_data/cert_filename |
|
1156V3c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1156-V3-2022: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 5: 1
- EAL 6: 1
- EAL 6 augmented: 1
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
- Infineon:
- Infineon Technologies AG: 1
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20220523080130+02'00'
- /Creator: Writer
- /ModDate: D:20220523080339+02'00'
- /Producer: LibreOffice 6.3
- /Subject: IFX_CCI_00004Fh, IFX_CCI_000050h, IFX_CCI_000051h, IFX_CCI_000052h, IFX_CCI_000053h, IFX_CCI_000054h, IFX_CCI_000055h, IFX_CCI_000056h, IFX_CCI_000057h, IFX_CCI_000058h, IFX_CCI_00005Ch design step S11 with firmware 80.310.03.0 & 80.310.03.1, optional NRG SW 05.03.4097, optional HSL v3.52.9708, UMSLC lib v01.30.0564, optional SCL v2.15.000 and v2.11.003, optional ACL v3.33.003 and v3.02.000, optional RCL v1.10.007, optional HCL v1.13.002 and guidance
- /Title: Certification Report BSI-DSZ-CC-1156-V3-2022
- pdf_file_size_bytes: 244417
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
20100324_SERTIT-012 _CR_v1_0.pdf |
1156V3a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 6 augmented by ALC_FLR.1
- cc_version: PP conformant Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-1156-V3-2022
- cert_item: IFX_CCI_00004Fh, IFX_CCI_000050h, IFX_CCI_000051h, IFX_CCI_000052h, IFX_CCI_000053h, IFX_CCI_000054h, IFX_CCI_000055h, IFX_CCI_000056h, IFX_CCI_000057h, IFX_CCI_000058h, IFX_CCI_00005Ch design step S11 with firmware 80.310.03.0 & 80.310.03.1, optional NRG SW 05.03.4097, optional HSL v3.52.9708, UMSLC lib v01.30.0564, optional SCL v2.15.000 and v2.11.003, optional ACL v3.33.003 and v3.02.000, optional RCL v1.10.007, optional HCL v1.13.002 and guidance
- cert_lab: BSI
- developer: Infineon Technologies AG
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014
|
pdf_data/report_keywords/cc_cert_id |
- NO:
- SERTIT-003: 4
- SERTIT-006: 1
- SERTIT-012: 22
|
- DE:
- BSI-DSZ-CC-1156-V2-2021: 2
- BSI-DSZ-CC-1156-V3-2022: 23
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0084-: 1
- BSI-CC-PP-0084-2014: 3
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 5: 28
- EAL 5 augmented: 24
- EAL1: 1
- EAL5: 3
- EAL7: 1
|
- EAL:
- EAL 1: 1
- EAL 2: 2
- EAL 2+: 1
- EAL 4: 1
- EAL 5: 4
- EAL 6: 4
- EAL 6 augmented: 3
- EAL5+: 1
- EAL6: 1
|
pdf_data/report_keywords/cc_sar |
- ACM:
- ACM_AUT.1: 1
- ACM_CAP.4: 1
- ACM_SCP.3: 1
- ADO:
- ADO_DEL.2: 1
- ADO_IGS.1: 1
- ADV:
- ADV_FSP.3: 1
- ADV_HLD.3: 1
- ADV_IMP.2: 1
- ADV_INT.1: 1
- ADV_LLD.1: 1
- ADV_RCR.2: 1
- ADV_SPM.3: 1
- AGD:
- AGD_ADM.1: 1
- AGD_USR.1: 1
- ALC:
- ALC_DVS.1: 1
- ALC_FLR.3: 26
- ALC_LCD.2: 1
- ALC_TAT.2: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.2: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_CCA.1: 1
- AVA_MSU.2: 1
- AVA_SOF.1: 1
- AVA_VLA.3: 1
|
- ADV:
- AGD:
- ALC:
- ALC_CMC.5: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 1
- ALC_FLR: 3
- ALC_FLR.1: 5
- ALC_LCD.1: 1
- ALC_TAT.3: 1
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_ARP.1: 3
- FAU_GEN.1: 1
- FAU_SAA.1: 1
- FAU_SAR.1: 1
- FAU_STG.1: 1
- FDP:
- FDP_IFC.2: 2
- FDP_IFF.1: 2
- FDP_IFF.6: 2
- FIA:
- FIA_UAU.1: 1
- FIA_UID.1: 1
- FMT:
- FMT_MOF.1: 1
- FMT_MSA.1: 1
- FMT_MSA.2: 1
- FMT_MSA.3: 1
- FMT_SMR.1: 1
- FPT:
- FPT_AMT.1: 1
- FPT_FLS.1: 1
- FPT_PHP.1: 1
- FPT_SEP.1: 1
- FPT_STM.1: 1
- FTP:
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Infineon:
- Infineon: 3
- Infineon Technologies AG: 22
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 5
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- TDEA: 1
- TDES: 4
- Triple-DES: 2
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 1
- SHA-256: 2
- SHA-384: 1
- SHA-512: 1
|
pdf_data/report_keywords/crypto_scheme |
|
- KA:
- Key Agreement: 1
- Key agreement: 2
- KEX:
- MAC:
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- SCA:
- DPA: 4
- SPA: 4
- physical probing: 1
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7148: 1
- BSI TR-02102: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2005-08-001: 1
- CCMB-2005-08-002: 1
- CCMB-2005-08-003: 1
- CCMB-2005-08-004: 1
|
- BSI:
- AIS 1: 1
- AIS 14: 1
- AIS 19: 1
- AIS 20: 2
- AIS 23: 1
- AIS 25: 1
- AIS 26: 1
- AIS 27: 1
- AIS 31: 2
- AIS 32: 1
- AIS 34: 3
- AIS 35: 2
- AIS 36: 2
- AIS 37: 1
- AIS 38: 1
- AIS 41: 1
- AIS 46: 1
- AIS 47: 1
- AIS20: 5
- AIS31: 4
- FIPS:
- FIPS PUB 186-4: 1
- FIPS180-4: 7
- FIPS186-4: 10
- FIPS197: 3
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- PKCS:
- RFC:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- TÜV Informationstechnik GmbH, (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January: 1
- 2,19 April 2021, Infineon Technologies AG (confidential document) [12] SLC36 32-bit Security Controller – V16 Hardware Reference Manual, Version 5.2, 21. December: 1
- IFX_CCI_000056h, IFX_CCI_000057h, IFX_CCI_000058h, IFX_CCI_00005Ch, S11, Infineon Technologies AG (confidential document) [7] Evaluation Technical Report, Version 3, 9. May 2022, EVALUATION TECHNICAL REPORT SUMMARY (ETR: 1
- Standards Compliance Verification”, Version 2, 25. June 2021, TÜV Informationstechnik GmbH (confidential document) 35 / 39 Certification Report BSI-DSZ-CC-1156-V3-2022 C. Excerpts from the Criteria For the: 1
- TECHNICAL REPORT FOR COMPOSITE EVALUATION (ETR for COMP)”, TÜV Informationstechnik GmbH (confidential document [11] Infineon Technologies AG Chipcard and Security Evaluation Documentation Life Cycle Support: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
- OutOfScope:
- Report Table 2: Deliverables of the TOE Please note that NRGTM functionality and toolbox are out of scope of this evaluation, hence no evaluated TOE guidance documentation applies. However, respective: 1
- out of scope: 1
|
pdf_data/report_metadata |
- /Author: Arne Høye Rage
- /CR issue: 1.0
- /CRNumber: 012
- /Company: SERTIT
- /CreationDate: D:20100506105921+02'00'
- /Creator: Acrobat PDFMaker 9.1 for Word
- /Day Month Year: 24 March 2010
- /Developers name: Thales Norway AS
- /EAL: EAL 5 augmented with ALC_FLR.3
- /ETR date final: 11.12.2010
- /Keywords: ugradert
- /ModDate: D:20100506110002+02'00'
- /Name of EVIT: Secode Norge AS
- /PP name: N/A
- /Prod name and version platform: Thales Operator Terminal Adapter, Trusted Kernel version 3AQ 24860 AAAA 6.2.1, Firewall definitions file 3AQ 24862 EAAA 6.2.2, Hardware version 3AQ 21564 AAAA ICS5A, -ICS7, -ICS7A and -ICS7B.
- /Producer: Adobe PDF Library 9.0
- /Product name: Thales OTA
- /Product version: See inside report
- /SourceModified: D:20100506085912
- /Sponsor name: Thales Norway AS
- /Subject:
- /Title: SERTIT-012
- pdf_file_size_bytes: 966116
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 22
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20220523071607+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, SmartCard, Infineon Technologies AG, PP-0084"
- /ModDate: D:20220523080011+02'00'
- /Producer: LibreOffice 6.3
- /Subject: IFX_CCI_00004Fh, IFX_CCI_000050h, IFX_CCI_000051h, IFX_CCI_000052h, IFX_CCI_000053h, IFX_CCI_000054h, IFX_CCI_000055h, IFX_CCI_000056h, IFX_CCI_000057h, IFX_CCI_000058h, IFX_CCI_00005Ch design step S11 with firmware 80.310.03.0 & 80.310.03.1, optional NRG SW 05.03.4097, optional HSL v3.52.9708, UMSLC lib v01.30.0564, optional SCL v2.15.000 and v2.11.003, optional ACL v3.33.003 and v3.02.000, optional RCL v1.10.007, optional HCL v1.13.002 and guidance
- /Title: Certification Report BSI-DSZ-CC-1156-V3-2022
- pdf_file_size_bytes: 1028934
- pdf_hyperlinks: http://www.commoncriteriaportal.org/cc/, https://www.sogis.eu/, https://www.bsi.bund.de/AIS, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 39
|
pdf_data/st_filename |
OTA_Security_Target_ed6_2_2.pdf |
1156V3b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL5: 6
- EAL5 augmented: 2
|
- EAL:
- EAL 6: 2
- EAL 6 augmented: 2
- EAL5+: 1
- EAL6: 5
- EAL6 augmented: 2
- EAL6+: 2
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_AUT.1: 2
- ACM_CAP.4: 2
- ACM_SCP.3: 2
- ADO:
- ADO_DEL.2: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP.3: 2
- ADV_HLD.3: 2
- ADV_IMP.2: 2
- ADV_INT.1: 2
- ADV_LLD.1: 2
- ADV_RCR.2: 2
- ADV_SPM.1: 5
- ADV_SPM.3: 3
- AGD:
- AGD_ADM.1: 2
- AGD_USR.1: 2
- ALC:
- ALC_DVS.1: 2
- ALC_FLR.3: 7
- ALC_LCD.2: 2
- ALC_TAT.2: 2
- ATE:
- ATE_COV.2: 2
- ATE_DPT.2: 2
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
- AVA_CCA.1: 3
- AVA_MSU.2: 2
- AVA_SOF.1: 2
- AVA_VLA.3: 2
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.4: 2
- ADV_FSP.5: 4
- ADV_IMP: 1
- ADV_IMP.2: 2
- ADV_INT.3: 1
- ADV_SPM.1: 6
- ADV_TDS.5: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.5: 3
- ALC_CMS: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 3
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.2: 1
- ALC_FLR: 1
- ALC_FLR.1: 4
- ALC_LCD.1: 1
- ALC_TAT.3: 1
- ASE:
- ASE_CCL: 4
- ASE_CCL.1: 1
- ASE_ECD: 4
- ASE_ECD.1: 1
- ASE_INT: 14
- ASE_INT.1: 1
- ASE_OBJ: 5
- ASE_OBJ.2: 1
- ASE_REQ: 33
- ASE_REQ.2: 1
- ASE_SPD: 4
- ASE_SPD.1: 1
- ASE_TSS: 5
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 1
- ATE_COV.3: 2
- ATE_DPT.3: 1
- ATE_FUN.2: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_ARP.1: 25
- FAU_ARP.1.1: 3
- FAU_GEN.1: 9
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAA.1: 11
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 1
- FAU_SAR.1: 6
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_STG.1: 5
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FDP:
- FDP_ACC.1: 2
- FDP_IFC.1: 9
- FDP_IFC.2: 17
- FDP_IFC.2.1: 1
- FDP_IFC.2.2: 1
- FDP_IFF.1: 10
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_IFF.1.6: 1
- FDP_IFF.6: 9
- FDP_IFF.6.1: 1
- FIA:
- FIA_UAU.1: 5
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID.1: 6
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MOF.1: 10
- FMT_MOF.1.1: 1
- FMT_MSA.1: 13
- FMT_MSA.1.1: 1
- FMT_MSA.2: 10
- FMT_MSA.2.1: 1
- FMT_MSA.3: 8
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMR.1: 12
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_AMT.1: 10
- FPT_AMT.1.1: 1
- FPT_FLS.1: 8
- FPT_FLS.1.1: 1
- FPT_PHP.1: 7
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_SEP.1: 7
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_STM.1: 8
- FPT_STM.1.1: 1
- FTP:
- FTP_TRP.1: 7
- FTP_TRP.1.1: 2
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_GEN: 1
- FAU_SAS: 4
- FAU_SAS.1: 6
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM: 30
- FCS_CKM.1: 21
- FCS_CKM.2: 3
- FCS_CKM.4: 20
- FCS_COP: 40
- FCS_COP.1: 14
- FCS_RNG: 37
- FCS_RNG.1: 23
- FDP:
- FDP_ACC: 10
- FDP_ACC.1: 18
- FDP_ACC.1.1: 1
- FDP_ACF: 11
- FDP_ACF.1: 15
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 1
- FDP_IFC.1: 8
- FDP_ITC.1: 18
- FDP_ITC.2: 18
- FDP_ITT.1: 4
- FDP_SDC: 2
- FDP_SDC.1: 5
- FDP_SDC.1.1: 1
- FDP_SDI.1: 1
- FDP_SDI.2: 5
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UCT.1: 9
- FDP_UCT.1.1: 1
- FDP_UIT.1: 9
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_API: 2
- FIA_API.1: 7
- FIA_API.1.1: 1
- FIA_UID: 7
- FIA_UID.1: 6
- FIA_UID.2: 3
- FMT:
- FMT_LIM: 16
- FMT_LIM.1: 8
- FMT_LIM.2: 6
- FMT_MSA.1: 8
- FMT_MSA.1.1: 1
- FMT_MSA.3: 11
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 10
- FMT_MTD.1: 1
- FMT_SMF: 8
- FMT_SMF.1: 11
- FMT_SMF.1.1: 1
- FMT_SMR: 8
- FMT_SMR.1: 16
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 6
- FPT_ITT.1: 4
- FPT_PHP.3: 4
- FPT_TST: 5
- FPT_TST.1: 11
- FPT_TST.2: 28
- FPT_TST.2.1: 1
- FRU:
- FTP:
- FTP_ITC.1: 15
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 4
|
pdf_data/st_keywords/cc_claims |
- A:
- A.AUDIT: 2
- A.CLEARANCE: 3
- A.MAN: 2
- A.OTA: 4
- A.PHYSICAL: 3
- A.SELF: 3
- A.TRAINING: 2
- A.USAGE: 3
- A.VCS: 3
- O:
- O.ALARM: 18
- O.CROSS-: 1
- O.CROSS-TALK: 10
- O.FILTER: 7
- O.SEC: 22
- O.SELF: 8
- O.TX: 8
- OE:
- OE.AUDIT: 5
- OE.MAN: 13
- OE.RECORDING: 5
- OE.SELF: 7
- T:
- T.ACOUSTIC: 3
- T.CONN: 3
- T.MISUSE: 2
- T.SEC: 3
- T.TAMPERING: 3
- T.TEMPEST: 3
- T.UNAUTHORISED: 2
- T.WRONG: 3
|
- O:
- O.AES: 2
- O.AES-TDES-MAC: 5
- O.ECC: 5
- O.HASH: 5
- O.RND: 1
- O.RSA: 5
- O.TDES: 2
- T:
|
pdf_data/st_keywords/vendor |
|
- Infineon:
- Infineon: 3
- Infineon Technologies: 7
- Infineon Technologies AG: 13
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- TDEA: 1
- TDES: 16
- Triple-DES: 1
- DES:
- constructions:
- miscellaneous:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- malfunction: 1
- physical tampering: 3
|
- FI:
- SCA:
- DPA: 2
- Leak-Inherent: 5
- Physical Probing: 2
- SPA: 1
- side channel: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2005-08-002: 1
- CCMB-2005-08-003: 1
|
- BSI:
- CC:
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- ICAO:
- ISO:
- ISO/IEC 14443: 6
- ISO/IEC 14443-4: 1
- ISO/IEC 18092: 4
- ISO/IEC 7816-3: 1
- ISO/IEC14443-3: 1
- RFC:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: THALES COMMUNICATIONS AS
- /Comments:
- /Company:
- /CreationDate: D:20100506140650+02'00'
- /Creator: Acrobat PDFMaker 9.1 for Word
- /Keywords: scdok
- /ModDate: D:20100506140705+02'00'
- /Producer: Adobe PDF Library 9.0
- /SourceModified: D:20100506120256
- /Subject: Dokumentmal
- /Title: Opertator Terminal Adapter, Security Target
- pdf_file_size_bytes: 857202
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 49
|
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |