name |
PhenoStor® Kartenlesegerät GRE100010 |
Red Hat Enterprise Linux Ver. 5.3 on Dell 11G Family Servers |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
Operating Systems |
scheme |
DE |
US |
status |
archived |
archived |
not_valid_after |
01.09.2019 |
15.01.2015 |
not_valid_before |
09.03.2007 |
23.12.2009 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0373a.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10338-vr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0373b.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10338-st.pdf |
manufacturer |
Bayer Innovation GmbH |
Dell, Inc. |
manufacturer_web |
https://www.bayer-innovation.com/ |
https://www.dell.com |
security_level |
EAL3 |
EAL4+, ALC_FLR.3 |
dgst |
8813a6c03f1bba58 |
7600914e4a2387a5 |
heuristics/cert_id |
BSI-DSZ-CC-0373-2007 |
CCEVS-VR-VID-10338-2009 |
heuristics/cert_lab |
BSI |
US |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_ENV.1, ADV_RCR.1, ASE_INT.1, ADV_HLD.2, AGD_USR.1, ALC_DVS.2, ASE_REQ.1, ASE_PPC.1, ASE_DES.1, AVA_SOF.1, ATE_COV.2, ASE_TSS.1, AGD_ADM.1, ATE_FUN.1, ATE_DPT.1, AVA_VLA.4, ADV_FSP.1, ASE_SRE.1, ASE_OBJ.1, ATE_IND.2, ADV_SPM.1, AVA_MSU.3 |
AGD_OPE.1, ADV_ARC.1, ALC_FLR.3 |
heuristics/extracted_versions |
- |
5.3 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
ANSSI-CC-2005/41 |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
ANSSI-CC-2003/18, ANSSI-CC-2005/39, ANSSI-CC-2005/41 |
{} |
heuristics/scheme_data |
|
- category: Operating System
- certification_date: 23.12.2009
- evaluation_facility: atsec information security corporation
- expiration_date: 25.02.2015
- id: CCEVS-VR-VID10338
- product: Red Hat Enterprise Linux Ver. 5.3 on Dell 11G Family Servers
- scheme: US
- url: https://www.niap-ccevs.org/product/10338
- vendor: Dell Technologies, Inc
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
540269ad0d7bcfe0 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_OS_CA_V1.d.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
0373a.pdf |
st_vid10338-vr.pdf |
pdf_data/report_frontpage |
- DE:
- cert_id: BSI-DSZ-CC-0373-2007
- cert_item: PhenoStor® Card Reader GRE100010
- cert_lab: BSI
- developer: Bayer Innovation GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- US:
|
- DE:
- US:
- cert_id: CCEVS-VR-VID10338-2009
- cert_item: Dell 11th Generation PowerEdge Servers running Red Hat Enterprise Linux 5.3
- cert_lab: US NIAP
|
pdf_data/report_keywords/cc_cert_id |
- AU:
- Certification Report 2005/41: 2
- DE:
- FR:
- Certification Report 2005/41: 2
|
- US:
- CCEVS-VR-VID10338-2009: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 3: 3
- EAL 4: 1
- EAL 7: 1
- EAL1: 5
- EAL2: 3
- EAL3: 6
- EAL4: 5
- EAL5: 7
- EAL5 augmented: 1
- EAL6: 3
- EAL7: 4
|
- EAL:
- EAL 4: 3
- EAL 4 augmented: 2
- EAL4: 2
- EAL4 augmented: 1
|
pdf_data/report_keywords/cc_sar |
- ACM:
- ACM_AUT: 2
- ACM_CAP: 2
- ACM_CAP.3: 1
- ACM_SCP: 2
- ACM_SCP.1: 1
- ADO:
- ADO_DEL: 2
- ADO_DEL.1: 1
- ADO_IGS: 2
- ADO_IGS.1: 4
- ADV:
- ADV_FSP: 2
- ADV_FSP.1: 1
- ADV_HLD: 2
- ADV_HLD.2: 1
- ADV_IMP: 2
- ADV_INT: 2
- ADV_LLD: 2
- ADV_RCR: 2
- ADV_RCR.1: 1
- ADV_SPM: 2
- AGD:
- AGD_ADM: 2
- AGD_ADM.1: 4
- AGD_USR: 2
- AGD_USR.1: 4
- ALC:
- ALC_DVS: 2
- ALC_DVS.1: 1
- ALC_DVS.2: 1
- ALC_FLR: 2
- ALC_LCD: 1
- ALC_TAT: 2
- ASE:
- ASE_DES.1: 1
- ASE_ENV.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_PPC.1: 1
- ASE_REQ.1: 1
- ASE_SRE.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 2
- ATE_COV.2: 1
- ATE_DPT: 2
- ATE_DPT.1: 1
- ATE_FUN: 2
- ATE_FUN.1: 1
- ATE_IND: 2
- ATE_IND.2: 1
- AVA:
- AVA_CCA: 2
- AVA_MSU: 2
- AVA_MSU.1: 1
- AVA_MSU.3: 1
- AVA_SOF: 3
- AVA_SOF.1: 1
- AVA_VLA: 3
- AVA_VLA.1: 1
- AVA_VLA.2: 1
- AVA_VLA.3: 1
- AVA_VLA.4: 2
|
|
pdf_data/report_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 2
- FCS_CKM.4: 2
- FCS_COP.1: 2
- FCS_RND.1: 1
- FDP:
- FDP_ACC.2: 1
- FDP_ACF.1: 1
- FDP_ETC.2: 1
- FDP_ITC.1: 1
- FDP_ITC.2: 1
- FDP_RIP.1: 1
- FDP_SDI.2: 1
- FDP_UCT.1: 2
- FDP_UIT.1: 2
- FIA:
- FIA_UAU.1: 1
- FIA_UID.1: 1
- FMT:
- FMT_MSA.1: 1
- FMT_MSA.2: 1
- FMT_MTD.1: 1
- FMT_SMF.1: 1
- FMT_SMR.1: 1
- FPT:
- FPT_FLS.1: 1
- FPT_PHP.3: 1
- FPT_SEP.1: 1
- FPT_TST.1: 1
- FTP:
|
- FPT:
- FPT_RVM: 1
- FPT_RVM.1: 1
- FPT_SEP: 1
- FPT_SEP.1: 1
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
- Infineon:
- Infineon Technologies AG: 1
- Philips:
- STMicroelectronics:
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- Report, Version 1.2, 18.12.2006, Evaluation Technical Report BSI-CC-DSZ-0373, T-Systems GEI GmbH (confidential document) [9] Smartcard IC Platform Protection Profile, Version 1.0, July 2001, BSI registration ID: 1
- Version 1.8, 30.10.2006 , Security Target PhenoStor® Card Reader GRE100010, Bayer Innovation GmbH (confidential document) [7] Security Target BSI-DSZ-0373-2007, Version 1.1, 08.03.2007 , Security Target Lite PhenoStor®: 1
|
|
pdf_data/report_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Company: BSI, Postfach 200363, 53133 Bonn
- /CreationDate: D:20070320111017+01'00'
- /Creator: Acrobat PDFMaker 7.0.7 für Word
- /Keywords: Common Criteria, Certification, Zertifizierung, Bayer Innovation GmbH, PhenoStor® Card Reader GRE100010
- /ModDate: D:20070326135055+02'00'
- /Producer: Acrobat Distiller 7.0.5 (Windows)
- /SourceModified: D:20070320100956
- /Title: Certification Report BSI-DSZ-CC-0373-2007
- pdf_file_size_bytes: 326817
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 40
|
- /Author: Don Phillips
- /CreationDate: D:20100129130318
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20100129130318
- /Producer: Microsoft® Office Word 2007
- /Title: Validators Report
- pdf_file_size_bytes: 365994
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 18
|
pdf_data/st_filename |
0373b.pdf |
st_vid10338-st.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-PP- 0002-2001: 3
- BSI-PP-0002-2001: 10
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 3: 3
- EAL 5+: 1
- EAL3: 14
- EAL5: 1
- EAL5 augmented: 1
- EAL5+: 5
|
- EAL:
- EAL3: 1
- EAL4: 6
- EAL4 augmented: 2
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_CAP.3: 3
- ACM_SCP.1: 3
- ADO:
- ADO_DEL.1: 3
- ADO_IGS.1: 3
- ADV:
- ADV_FSP.1: 3
- ADV_HLD.2: 3
- ADV_RCR.1: 3
- ADV_SPM: 2
- ADV_SPM.1: 4
- AGD:
- AGD_ADM.1: 3
- AGD_USR.1: 3
- ALC:
- ALC_DVS.1: 3
- ALC_DVS.2: 1
- ATE:
- ATE_COV.2: 3
- ATE_DPT.1: 3
- ATE_FUN.1: 3
- ATE_IND.2: 3
- AVA:
- AVA_MSU.1: 3
- AVA_MSU.3: 1
- AVA_SOF.1: 3
- AVA_VLA.1: 3
- AVA_VLA.4: 1
|
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM: 87
- FCS_CKM.1: 16
- FCS_CKM.2: 2
- FCS_CKM.4: 17
- FCS_COP: 83
- FCS_COP.1: 18
- FCS_RND: 8
- FCS_RND.1: 13
- FCS_RND.1.1: 1
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 14
- FDP_ACC.2: 14
- FDP_ACC.2.1: 1
- FDP_ACC.2.2: 1
- FDP_ACF: 1
- FDP_ACF.1: 9
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_ETC: 1
- FDP_ETC.2: 6
- FDP_ETC.2.1: 1
- FDP_ETC.2.2: 1
- FDP_ETC.2.3: 1
- FDP_ETC.2.4: 1
- FDP_IFC.1: 7
- FDP_ITC: 2
- FDP_ITC.1: 27
- FDP_ITC.1.1: 2
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 2
- FDP_ITC.2: 3
- FDP_ITC.2.1: 1
- FDP_ITC.2.2: 1
- FDP_ITC.2.3: 1
- FDP_ITC.2.4: 1
- FDP_ITC.2.5: 1
- FDP_RIP: 1
- FDP_RIP.1: 8
- FDP_RIP.1.1: 1
- FDP_SDI: 1
- FDP_SDI.2: 7
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UCT: 17
- FDP_UCT.1: 3
- FDP_UIT: 26
- FDP_UIT.1: 8
- FIA:
- FIA_UAU: 1
- FIA_UAU.1: 7
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID: 1
- FIA_UID.1: 10
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MSA: 1
- FMT_MSA.1: 10
- FMT_MSA.1.1: 1
- FMT_MSA.2: 38
- FMT_MSA.2.1: 1
- FMT_MSA.3: 4
- FMT_MTD: 14
- FMT_MTD.1: 3
- FMT_SMF: 1
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR: 1
- FMT_SMR.1: 11
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_AMT.1: 1
- FPT_FLS: 1
- FPT_FLS.1: 16
- FPT_FLS.1.1: 1
- FPT_PHP: 1
- FPT_PHP.3: 9
- FPT_PHP.3.1: 1
- FPT_SEP: 1
- FPT_SEP.1: 10
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_TST: 1
- FPT_TST.1: 11
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 19
- FTP_ITC.1: 12
- FTP_TRP.1: 3
|
- FAU:
- FAU_GEN.1: 10
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 7
- FAU_GEN.2.1: 1
- FAU_SAR.1: 10
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 10
- FAU_SAR.2.1: 1
- FAU_SAR.3: 9
- FAU_SAR.3.1: 1
- FAU_SEL.1: 10
- FAU_SEL.1.1: 1
- FAU_STG.1: 9
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 9
- FAU_STG.3.1: 1
- FAU_STG.4: 9
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM.1: 20
- FCS_CKM.1.1: 3
- FCS_CKM.2: 22
- FCS_CKM.2.1: 4
- FCS_CKM.4: 4
- FCS_COP.1: 19
- FCS_COP.1.1: 3
- FDP:
- FDP_ACC.1: 29
- FDP_ACC.1.1: 2
- FDP_ACF.1: 21
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_ETC: 1
- FDP_ETC.1: 7
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_ETC.2: 9
- FDP_ETC.2.1: 1
- FDP_ETC.2.2: 1
- FDP_ETC.2.3: 1
- FDP_ETC.2.4: 1
- FDP_IFC.1: 13
- FDP_IFC.1.1: 1
- FDP_IFC.2: 1
- FDP_IFF.1: 4
- FDP_IFF.2: 7
- FDP_IFF.2.1: 1
- FDP_IFF.2.2: 1
- FDP_IFF.2.3: 1
- FDP_IFF.2.4: 1
- FDP_IFF.2.5: 1
- FDP_IFF.2.6: 1
- FDP_ITC.1: 10
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 9
- FDP_ITC.2.1: 1
- FDP_ITC.2.2: 1
- FDP_ITC.2.3: 1
- FDP_ITC.2.4: 1
- FDP_ITC.2.5: 1
- FDP_RIP.2: 12
- FDP_RIP.2.1: 1
- FDP_UCT.1: 9
- FDP_UCT.1.1: 1
- FDP_UIT.1: 9
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_ATD.1: 12
- FIA_ATD.1.1: 1
- FIA_SOS.1: 9
- FIA_SOS.1.1: 1
- FIA_UAU.1: 1
- FIA_UAU.2: 12
- FIA_UAU.2.1: 1
- FIA_UAU.7: 9
- FIA_UAU.7.1: 1
- FIA_UID: 1
- FIA_UID.1: 5
- FIA_UID.2: 13
- FIA_UID.2.1: 1
- FIA_USB.1: 20
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA.1: 36
- FMT_MSA.1.1: 6
- FMT_MSA.2: 13
- FMT_MSA.2.1: 1
- FMT_MSA.3: 30
- FMT_MSA.3.1: 4
- FMT_MSA.3.2: 3
- FMT_MTD.1: 60
- FMT_MTD.1.1: 6
- FMT_MTD.3: 10
- FMT_MTD.3.1: 1
- FMT_REV.1: 21
- FMT_REV.1.1: 2
- FMT_REV.1.2: 2
- FMT_SMF: 1
- FMT_SMF.1: 26
- FMT_SMF.1.1: 1
- FMT_SMR.1: 14
- FMT_SMR.2: 19
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_AMT.1: 2
- FPT_FLS.1: 8
- FPT_FLS.1.1: 1
- FPT_RCV.1: 9
- FPT_RCV.1.1: 1
- FPT_RCV.4: 8
- FPT_RCV.4.1: 1
- FPT_RVM.1: 1
- FPT_SEP.1: 1
- FPT_STM.1: 9
- FPT_STM.1.1: 1
- FPT_TDC.1: 9
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TEE.1: 10
- FPT_TEE.1.1: 1
- FPT_TEE.1.2: 1
- FPT_TST.1: 8
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTA:
- FTA_LSA.1: 8
- FTA_LSA.1.1: 1
- FTA_TSE.1: 8
- FTA_TSE.1.1: 1
- FTP:
- FTP_ITC.1: 14
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 3
|
pdf_data/st_keywords/cc_claims |
- A:
- A.USE_DIAG: 3
- A.USE_SYS: 3
|
- A:
- A.ACCESS: 2
- A.ASSET: 2
- A.CLEARANCE: 2
- A.CONNECT: 6
- A.COOP: 2
- A.LOCATE: 2
- A.MANAGE: 4
- A.NET_COMP: 3
- A.NO_EVIL_ADMIN: 3
- A.OWNER: 2
- A.PEER: 2
- A.PROTECT: 4
- A.SENSITIVITY: 2
- A.UTRAIN: 2
- A.UTRUST: 2
- O:
- O.AUDITING: 17
- O.AUTHORIZATION: 15
- O.COMPROT: 20
- O.DISCRETIONARY_ACCESS: 12
- O.DUTY: 5
- O.ENFORCEMENT: 7
- O.HIERARCHICAL: 5
- O.MANAGE: 28
- O.MANDATORY_ACCESS: 16
- O.RESIDUAL_INFO: 7
- O.ROLE: 16
- OE:
- OE.ADMIN: 5
- OE.CREDEN: 3
- OE.INFO_PROTECT: 11
- OE.INSTALL: 7
- OE.MAINTENANCE: 4
- OE.PHYSICAL: 5
- OE.PROTECT: 6
- OE.RECOVER: 5
- OE.SERIAL_LOGIN: 3
- OE.SOFTWARE_IN: 4
- T:
- T.ACCESS: 3
- T.COMPROT: 2
- T.OPERATE: 2
- T.ROLEDEV: 4
- T.UAUSER: 3
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- DES:
- 3DES:
- 3DES: 31
- Triple-DES: 18
- TripleDES: 4
|
- AES_competition:
- DES:
- constructions:
- miscellaneous:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_RSA_WITH_AES_256_CBC_SHA: 1
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- SCA:
- physical probing: 3
- side channel: 1
- side-channel: 4
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- CC:
- CCIMB-2006-09-001: 1
- CCIMB-2006-09-003: 1
- CCIMB-2006-09-004: 1
- FIPS:
- PKCS:
- RFC:
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- end devices over the interface unit (the IU – Interface Unit – and the peripheral devices are out of scope of the evaluation) using cryptographically protected external communication interfaces. All the: 1
- out of scope: 2
- the IU – Interface Unit – and the peripheral devices are out of scope of the evaluation: 1
- the TOE security functional requirements is SOF-medium. The strength of cryptographic algorithms is out of scope of the CC evaluation [5]. This chapter contains the descriptions of all derived functional: 1
|
- OutOfScope:
- out of scope: 1
- outside of the TOE, such as the hypervisor’s enforcement of separation between guest VMs, is out of scope for this Security Target. 1.5.3.3 TOE Environment Several TOE systems may be interlinked in a: 1
|
pdf_data/st_metadata |
- /Author: escrypt GmbH - Embedded Security
- /CreationDate: D:20070308174144+01'00'
- /Creator: pdfFactory www.context-gmbh.de
- /ModDate: D:20070326135153+02'00'
- /Producer: pdfFactory 2.44 (Windows XP Professional German)
- /Title: Security Target Lite, PhenoStor GRE100010 Card Reader
- pdf_file_size_bytes: 494120
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 99
|
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |