name |
Bivio 6110-NC and 6120-NC |
Renesas AE45X1-C (HD65145X1)smartcard integrated circuit version 02 |
category |
Network and Network-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
US |
DE |
status |
archived |
archived |
not_valid_after |
28.08.2019 |
01.09.2019 |
not_valid_before |
28.08.2017 |
13.09.2006 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10847-ci.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10847-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0351a.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10847-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0351b.pdf |
manufacturer |
Bivio Networks, Inc. |
Renesas Technology Corporation |
manufacturer_web |
|
https://am.renesas.com/ |
security_level |
{} |
EAL4 |
dgst |
876a9d8fb591e52c |
c9d17408c8fe84e3 |
heuristics/cert_id |
CCEVS-VR-VID-10847-2017 |
BSI-DSZ-CC-0351-2006 |
heuristics/cert_lab |
US |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_CMS.1, ASE_CCL.1, ASE_INT.1, ADV_FSP.1, AGD_PRE.1, AVA_VAN.1, ASE_ECD.1, ASE_SPD.1, ASE_OBJ.1, ATE_IND.1, ASE_REQ.1, ASE_TSS.1, ALC_CMC.1, AGD_OPE.1 |
ASE_OBJ.1, ATE_COV.2, AGD_USR.1, ASE_REQ.1, ASE_TSS.1, ADV_HLD.2, AVA_VLA.2, ATE_DPT.1, ADV_FSP.2, ADV_IMP.1, ALC_DVS.1, ADV_SPM.1, ALC_TAT.1, ASE_DES.1, ASE_ENV.1, ATE_IND.2, ASE_PPC.1, AGD_ADM.1, ASE_SRE.1, ASE_INT.1, ATE_FUN.1, ADV_RCR.1, AVA_MSU.2, ALC_LCD.1, AVA_SOF.1, ADV_LLD.1 |
heuristics/extracted_versions |
6110, 6120 |
02 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
NSCIB-CC-09-10991-CR |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0212-2004 |
heuristics/report_references/indirectly_referenced_by |
{} |
NSCIB-CC-09-10991-CR |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0212-2004 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
NSCIB-CC-09-10991-CR |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
NSCIB-CC-09-10991-CR |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
c7cf611c6bb1e4b0 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V1.0.pdf |
{} |
pdf_data/cert_filename |
st_vid10847-ci.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10847-2017: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
- UL:
- UL Verification Services: 1
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20170829154422-04'00'
- /ModDate: D:20170829154422-04'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 177705
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
st_vid10847-vr.pdf |
0351a.pdf |
pdf_data/report_frontpage |
- DE:
- US:
- cert_id: CCEVS-VR-VID10847-2017
- cert_item: Bivio Networks, Inc. Bivio 6110-NC and Bivio 6120-NC
- cert_lab: US NIAP
|
- DE:
- cert_id: BSI-DSZ-CC-0351-2006
- cert_item: Renesas AE45X1-C (HD65145X1) smartcard integrated circuit version 02
- cert_lab: BSI
- developer: Renesas Technology Corp
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- US:
|
pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10847-2017: 1
|
- DE:
- BSI-DSZ-CC-0212-2004: 2
- BSI-DSZ-CC-0351: 3
- BSI-DSZ-CC-0351-2006: 20
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 4: 1
- EAL 7: 1
- EAL1: 5
- EAL2: 3
- EAL3: 4
- EAL4: 11
- EAL5: 6
- EAL6: 3
- EAL7: 4
|
pdf_data/report_keywords/cc_sar |
|
- ACM:
- ACM_AUT: 2
- ACM_AUT.1: 2
- ACM_CAP: 2
- ACM_CAP.4: 2
- ACM_SCP: 2
- ACM_SCP.2: 2
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 2
- ADO_IGS: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP: 2
- ADV_FSP.2: 1
- ADV_HLD: 2
- ADV_HLD.2: 1
- ADV_IMP: 2
- ADV_IMP.1: 1
- ADV_INT: 2
- ADV_LLD: 2
- ADV_LLD.1: 1
- ADV_RCR: 2
- ADV_RCR.1: 1
- ADV_SPM: 2
- ADV_SPM.1: 1
- AGD:
- AGD_ADM: 2
- AGD_ADM.1: 1
- AGD_USR: 2
- AGD_USR.1: 1
- ALC:
- ALC_DVS: 2
- ALC_DVS.1: 2
- ALC_FLR: 2
- ALC_LCD: 1
- ALC_LCD.1: 2
- ALC_TAT: 2
- ALC_TAT.1: 2
- ASE:
- ASE_DES.1: 1
- ASE_ENV.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_PPC.1: 1
- ASE_REQ.1: 1
- ASE_SRE.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 2
- ATE_COV.2: 1
- ATE_DPT: 2
- ATE_DPT.1: 1
- ATE_FUN: 2
- ATE_FUN.1: 1
- ATE_IND: 2
- ATE_IND.2: 1
- AVA:
- AVA_CCA: 2
- AVA_MSU: 2
- AVA_MSU.2: 1
- AVA_SOF: 3
- AVA_SOF.1: 1
- AVA_VLA: 3
- AVA_VLA.2: 2
- AVA_VLA.3: 1
- AVA_VLA.4: 1
|
pdf_data/report_keywords/cc_sfr |
|
- FAU:
- FCS:
- FCS_COP.1: 1
- FCS_RND.1: 1
- FDP:
- FDP_ACC.1: 2
- FDP_ACF.1: 2
- FDP_IFC.1: 1
- FDP_ITT.1: 1
- FMT:
- FMT_LIM.1: 1
- FMT_LIM.2: 1
- FPT:
- FPT_FLS.1: 1
- FPT_ITT.1: 1
- FPT_PHP.3: 1
- FPT_SEP.1: 1
- FRU:
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ADMIN_CREDENTIALS_SECURE: 1
- A.LIMITED_FUNCTIONALITY: 1
- A.NO_THRU_TRAFFIC_PROTECTION: 1
- A.PHYSICAL_PROTECTION: 1
- A.REGULAR_UPDATES: 1
- A.TRUSTED_ADMINISTRATOR: 1
- T:
- T.PASSWORD_CRACKING: 1
- T.SECURITY_FUNCTIONALITY_: 2
- T.UNAUTHORIZED_ADMINIST: 1
- T.UNDETECTED_ACTIVITY: 1
- T.UNTRUSTED_COMMUNICAT: 1
- T.UPDATE_COMPROMISE: 1
- T.WEAK_AUTHENTICATION_E: 1
- T.WEAK_CRYPTOGRAPHY: 1
|
|
pdf_data/report_keywords/vendor |
|
- Infineon:
- Infineon Technologies AG: 1
- Philips:
|
pdf_data/report_keywords/eval_facility |
- UL:
- UL Verification Services: 3
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
- TLS:
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_RSA_WITH_AES_128_CBC_SHA: 1
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 1
- physical tampering: 1
- SCA:
- Physical Probing: 1
- physical probing: 1
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- RFC:
- RFC 3268: 1
- RFC 5289: 1
- RFC 5424: 1
|
- BSI:
- AIS 25: 1
- AIS 26: 1
- AIS 31: 1
- AIS 34: 1
- FIPS:
- FIPS PUB 140-2: 1
- FIPS PUB 46-3: 1
- ISO:
- ISO/IEC 15408:2005: 3
- ISO/IEC15408: 2005: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- OutOfScope:
- Bivio 6110 device can be used to run a variety of applications for processing network data. It is out of scope for this certification to include these applications for evaluation. It is left to the customer to: 1
- and 6120-NC devices can be used to run a variety of applications for processing network data. It is out of scope for this certification process to include all those applications for evaluation, so a standard: 1
- out of scope: 2
|
- ConfidentialDocument:
- AE45X1-B), HD65145X1 (AE45X1-C) Hardware Manual, Renesas Technology Corp., 11 June,2004, (confidential document) [11] AE45X1 User Guidance Manual Rev. 7.20, Renesas 16-bit Smart Card Microcomputer AE-4 Series: 1
- AE45X1-B), HD65145X1 (AE45X1-C), HD65145X1 (AE45X1-CB)l, Renesas Technology Corp., 18 April, 2004, (confidential document) [12] Renesas Single-Chip Microcomputer AE-4 Series, AE45X1-B/C (HD65145C1), Current Control: 1
- Rev. 1.0, 17 June 2004, (confidential document) [13] Option List for Smart Card Microcomputer (for HD65145X1C [AE45X1C, CB]), (AE45X1C-V1.5R: 1
- Technology Corp, February 6, 2006, (confidential document) [15] Federal Information Processing Standards Publication, Security Requirements for Cryptographic: 1
- Version 9.0, 11 July 2006, AE45X1-C (HD65145X1) Version 02, Renesas Technology Corp. (confidential document) B-16 BSI-DSZ-CC-0351-2006 Certification Report [7] Security Target BSI-DSZ-CC-0351, Version 3.0: 1
- document) [8] Evaluation Technical Report, 1.0, 13 July, 2006, AE45X1-C (HD65145X1) Version 02 (confidential document) [9] Smartcard IC Platform Protection Profile, Version 1.0, July, 2001, BSI registration ID: 1
|
pdf_data/report_metadata |
- /Author: Steve Wilson
- /Company: InfoGard Laboratories
- /CreationDate: D:20170829153647-04'00'
- /Creator: Acrobat PDFMaker 11 for Word
- /Keywords:
- /ModDate: D:20170829153650-04'00'
- /Producer: Adobe PDF Library 11.0
- /SourceModified: D:20170829193622
- /Subject:
- /Title: D
- pdf_file_size_bytes: 323443
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 17
|
- /Author: BSI
- /Company: BSI, Postfach 200363, 53133 Bonn
- /CreationDate: D:20060927102809+02'00'
- /Creator: Acrobat PDFMaker 7.0.7 für Word
- /Keywords: "Common Criteria, Certification, Zertifizierung, Renesas, smartcard"
- /ModDate: D:20060928112506+02'00'
- /Producer: Acrobat Distiller 7.0.5 (Windows)
- /SourceModified: D:20060927082642
- /Subject: Certification Report BSI-DSZ-CC-0351-2006
- /Title: Certification Report BSI-DSZ-CC-0351-2006
- pdf_file_size_bytes: 283987
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 40
|
pdf_data/st_filename |
st_vid10847-st.pdf |
0351b.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP- 0002: 2
- BSI-PP-0002: 72
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.1: 3
- ALC_CMS.1: 3
- ASE:
- ASE_CCL.1: 7
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ADO:
- ADV:
- ADV_FSP: 2
- ADV_HLD: 1
- ADV_IMP: 1
- ADV_LLD: 1
- ADV_RCR: 1
- ADV_SPM: 1
- ADV_SPM.1: 4
- AGD:
- AVA:
- AVA_MSU: 1
- AVA_SOF: 5
- AVA_VLA: 1
- AVA_VLA.2: 1
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 4
- FAU_GEN.1.1: 3
- FAU_GEN.2: 4
- FAU_GEN.2.1: 1
- FAU_STG.1: 4
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG_EXT.1: 4
- FAU_STG_EXT.1.1: 1
- FAU_STG_EXT.1.2: 4
- FAU_STG_EXT.1.3: 12
- FAU_STG_EXT.2: 5
- FAU_STG_EXT.3: 4
- FAU_STG_EXT.3.1: 1
- FCS:
- FCS_CKM.1: 7
- FCS_CKM.1.1: 5
- FCS_CKM.2: 6
- FCS_CKM.2.1: 3
- FCS_CKM.4: 4
- FCS_CKM.4.1: 1
- FCS_COP: 2
- FCS_COP.1: 22
- FCS_COP.1.1: 12
- FCS_RBG_EXT: 1
- FCS_RBG_EXT.1: 4
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 3
- FCS_SSHC_EXT.1: 3
- FCS_SSHC_EXT.1.1: 2
- FCS_SSHC_EXT.1.2: 3
- FCS_SSHC_EXT.1.3: 2
- FCS_SSHC_EXT.1.4: 2
- FCS_SSHC_EXT.1.5: 5
- FCS_SSHC_EXT.1.6: 2
- FCS_SSHC_EXT.1.7: 2
- FCS_SSHC_EXT.1.8: 4
- FCS_SSHC_EXT.1.9: 3
- FCS_SSHS_EXT.1: 3
- FCS_SSHS_EXT.1.1: 1
- FCS_SSHS_EXT.1.2: 2
- FCS_SSHS_EXT.1.3: 2
- FCS_SSHS_EXT.1.4: 2
- FCS_SSHS_EXT.1.5: 3
- FCS_SSHS_EXT.1.6: 2
- FCS_SSHS_EXT.1.7: 2
- FCS_SSHS_EXT.1.8: 2
- FCS_TLSC_EXT.1: 1
- FCS_TLSC_EXT.2: 1
- FCS_TLSS_EXT.1: 4
- FCS_TLSS_EXT.1.1: 4
- FCS_TLSS_EXT.1.2: 2
- FCS_TLSS_EXT.1.3: 2
- FCS_TLSS_EXT.2.3: 1
- FIA:
- FIA_PMG_EXT.1: 3
- FIA_PMG_EXT.1.1: 2
- FIA_UAU.1: 1
- FIA_UAU.1.1: 1
- FIA_UAU.7: 3
- FIA_UAU.7.1: 2
- FIA_UAU_EXT.2: 3
- FIA_UAU_EXT.2.1: 2
- FIA_UIA_EXT.1: 8
- FIA_UIA_EXT.1.1: 1
- FIA_UIA_EXT.1.2: 1
- FMT:
- FMT_MOF: 5
- FMT_MOF.1: 26
- FMT_MOF.1.1: 13
- FMT_MTD: 4
- FMT_MTD.1: 7
- FMT_MTD.1.1: 1
- FMT_SMF.1: 8
- FMT_SMF.1.1: 1
- FMT_SMR.2: 3
- FMT_SMR.2.1: 2
- FMT_SMR.2.2: 2
- FMT_SMR.2.3: 3
- FPT:
- FPT_APW_EXT.1: 5
- FPT_APW_EXT.1.1: 1
- FPT_APW_EXT.1.2: 1
- FPT_SKP_EXT.1: 4
- FPT_SKP_EXT.1.1: 1
- FPT_STM.1: 4
- FPT_STM.1.1: 1
- FPT_TST_EXT: 1
- FPT_TST_EXT.1: 4
- FPT_TST_EXT.1.1: 3
- FPT_TST_EXT.2: 2
- FPT_TUD_EXT.1: 6
- FPT_TUD_EXT.1.1: 3
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 6
- FPT_TUD_EXT.2: 2
- FPT_TUD_EXT.2.2: 2
- FTA:
- FTA_SSL.3: 6
- FTA_SSL.3.1: 1
- FTA_SSL.4: 6
- FTA_SSL.4.1: 1
- FTA_SSL_EXT.1: 4
- FTA_SSL_EXT.1.1: 1
- FTA_TAB.1: 9
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC.1: 7
- FTP_ITC.1.1: 3
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 2
- FTP_TRP.1: 7
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_GEN.1: 1
- FAU_SAS.1: 9
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM.1: 11
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 11
- FCS_CKM.4.1: 1
- FCS_COP: 1
- FCS_COP.1: 19
- FCS_COP.1.1: 2
- FCS_RND: 1
- FCS_RND.1: 9
- FCS_RND.1.1: 1
- FDP:
- FDP_ACC.1: 29
- FDP_ACC.1.1: 3
- FDP_ACF.1: 27
- FDP_ACF.1.1: 4
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_IFC.1: 17
- FDP_IFC.1.1: 1
- FDP_IFF.1: 1
- FDP_ITC.1: 12
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITT.1: 10
- FDP_ITT.1.1: 1
- FDP_SDI.1: 1
- FMT:
- FMT_LIM: 1
- FMT_LIM.1: 10
- FMT_LIM.1.1: 1
- FMT_LIM.2: 10
- FMT_LIM.2.1: 1
- FMT_MSA.1: 2
- FMT_MSA.2: 14
- FMT_MSA.2.1: 1
- FMT_MSA.3: 9
- FMT_SMR.1: 1
- FPT:
- FPT_AMT.1: 1
- FPT_FLS.1: 31
- FPT_FLS.1.1: 1
- FPT_ITT.1: 9
- FPT_ITT.1.1: 1
- FPT_PHP.3: 12
- FPT_PHP.3.1: 1
- FPT_SEP.1: 12
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FRU:
- FRU_FLT.1: 1
- FRU_FLT.2: 16
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN_CREDENTIALS_SECURE: 1
- A.LIMITED_FUNCTIONALITY: 1
- A.NO_THRU_TRAFFIC_PROTECTION: 1
- A.PHYSICAL_PROTECTION: 1
- A.REGULAR_UPDATES: 1
- A.TRUSTED_ADMINISTRATOR: 1
- OE:
- OE.ADMIN_CREDENTIALS_SECURE: 1
- OE.NO_GENERAL_PURPOSE: 1
- OE.NO_THRU_TRAFFIC_PROTECTION: 1
- OE.PHYSICAL: 1
- OE.TRUSTED_ADMIN: 1
- OE.UPDATES: 1
- T:
- T.PASSWORD_CRACKING: 1
- T.SECURITY_FUNCTIONALITY: 2
- T.UNAUTHORIZED_ADMINIST: 1
- T.UNDETECTED_ACTIVITY: 1
- T.UNTRUSTED_COMMUNICA: 1
- T.UPDATE_COMPROMISE: 1
- T.WEAK_AUTHENTICATION_E: 1
- T.WEAK_CRYPTOGRAPHY: 1
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
- UL:
- UL Verification Services: 1
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 14
- AES-128: 2
- AES-256: 2
- AES256: 1
- CAST:
- RC:
- DES:
- constructions:
- MAC:
- HMAC: 12
- HMAC-SHA-256: 2
- HMAC-SHA-384: 2
- HMAC-SHA-512: 2
- miscellaneous:
|
|
pdf_data/st_keywords/asymmetric_crypto |
- ECC:
- FF:
- DH:
- DH: 3
- DHE: 2
- Diffie-Hellman: 7
- DSA:
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- MD:
- RIPEMD:
- SHA:
- SHA1:
- SHA2:
- SHA-2: 1
- SHA-224: 1
- SHA-256: 8
- SHA-384: 6
- SHA-512: 5
- SHA512: 1
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IPsec:
- SSH:
- TLS:
- SSL:
- SSL: 3
- SSL 2.0: 1
- SSL 3.0: 1
- SSLv3.0: 1
- TLS:
- TLS: 62
- TLS 1.0: 1
- TLS 1.1: 1
- TLS 1.2: 1
- TLS v1.0: 1
- TLSv1.2: 9
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- NIST P-256: 1
- P-256: 13
- P-384: 4
- P-521: 8
- secp256r1: 3
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
- TLS_NULL_WITH_NULL_NULL: 1
- TLS_RSA_WITH_AES_128_CBC_SHA: 5
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 2
- Malfunction: 14
- malfunction: 5
- physical tampering: 1
- SCA:
- DPA: 2
- Leak-Inherent: 15
- Physical Probing: 2
- Physical probing: 1
- physical probing: 4
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- FIPS:
- FIPS 140-2: 2
- FIPS 186-4: 4
- FIPS PUB 186-4: 5
- ISO:
- ISO/IEC 10118: 2
- ISO/IEC 14888-3: 1
- ISO/IEC 18031:2011: 3
- ISO/IEC 9796-2: 1
- ISO/IEC 9797-: 1
- NIST:
- NIST SP 800-131A: 2
- NIST SP 800-56B: 1
- NIST SP 800-90A: 1
- NIST SP 800-90B: 1
- SP 800-131A: 1
- SP 800-56A: 1
- SP 800-56B: 1
- PKCS:
- RFC:
- RFC 2986: 2
- RFC 3268: 3
- RFC 4251: 2
- RFC 4253: 8
- RFC 5246: 4
- RFC 5280: 5
- RFC 5289: 3
- RFC 5647: 8
- RFC 6668: 2
- RFC2104: 1
- RFC4251: 1
- RFC4868: 1
- X509:
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- indicated as “REQUIRED” but not listed in the later elements of this component are implemented is out of scope of the assurance activity for this requirement. Assurance Activity TSS The evaluator shall check to: 1
- indicated as “REQUIRED” but not listed in the later elements of this component are implemented is out of scope of the assurance activity for this requirement. FCS_SSHS_EXT.1.2 The TSF shall ensure that the SSH: 1
- out of scope: 3
- processing network data. There are many such applications, both commercial and open source. It is out of scope for this certification process to include all these applications for evaluation, so a standard: 1
|
|
pdf_data/st_metadata |
|
- /CreationDate: D:20060831183520+09'00'
- /Creator: クセロPDF v1.12 Rev0480
- /ModDate: D:20060831184508+09'00'
- /Producer: Xelo PDF Library
- pdf_file_size_bytes: 929922
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 64
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |