Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
CEITEC ePassport Module, CTC21001, v1.0 (supporting EAC)
SERTIT-080
Microsoft Windows Server 2008 Hyper-V Role with HotFix KB950050
BSI-DSZ-CC-0570-2009
name CEITEC ePassport Module, CTC21001, v1.0 (supporting EAC) Microsoft Windows Server 2008 Hyper-V Role with HotFix KB950050
category ICs, Smart Cards and Smart Card-Related Devices and Systems Operating Systems
scheme NO DE
not_valid_after 17.01.2022 01.09.2019
not_valid_before 17.01.2017 24.07.2009
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20170117%20S-080%20CR%20Ceitec%20EAC.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0570a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[STlite-EAC]%20CEITECSA%205.410.052%20-%20ST-Lite%20ePassport%20Module%20EAC%202.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0570b_pdf.pdf
manufacturer CEITEC S.A. Microsoft Corporation
manufacturer_web https://www.ceitec-sa.com https://www.microsoft.com
security_level EAL4+, ALC_DVS.2, AVA_VAN.5 EAL4+, ALC_FLR.3
dgst 8856518b423e12c4 4f57d0ebb73a69ed
heuristics/cert_id SERTIT-080 BSI-DSZ-CC-0570-2009
heuristics/cert_lab [] BSI
heuristics/direct_transitive_cves {} CVE-2008-4036, CVE-2017-0175, CVE-2018-0968, CVE-2018-0971, CVE-2010-3227, CVE-2018-0960, CVE-2017-11831, CVE-2024-29056, CVE-2009-2493, CVE-2009-0568, CVE-2018-0973, CVE-2018-0970, CVE-2010-0719, CVE-2018-0887, CVE-2008-4269, CVE-2009-0078, CVE-2009-1216, CVE-2018-0975, CVE-2018-0972, CVE-2009-2526, CVE-2011-1229, CVE-2009-0231, CVE-2008-3013, CVE-2010-4669, CVE-2009-1536, CVE-2009-0094, CVE-2008-2250, CVE-2009-3103, CVE-2008-4268, CVE-2009-0083, CVE-2009-0082, CVE-2009-0093, CVE-2009-0233, CVE-2009-0086, CVE-2009-0230, CVE-2010-0025, CVE-2008-1084, CVE-2010-0024, CVE-2008-1441, CVE-2008-4038, CVE-2008-2252, CVE-2009-0320, CVE-2018-8641, CVE-2010-4398, CVE-2007-6753, CVE-2008-2251, CVE-2009-0081, CVE-2012-1194, CVE-2018-0974, CVE-2018-0969, CVE-2009-0080, CVE-2017-11852, CVE-2009-0234, CVE-2009-2532, CVE-2010-4562, CVE-2009-0085
heuristics/indirect_transitive_cves {} CVE-2008-4036, CVE-2017-0175, CVE-2018-0968, CVE-2018-0971, CVE-2010-3227, CVE-2018-0960, CVE-2017-11831, CVE-2024-29056, CVE-2009-2493, CVE-2009-0568, CVE-2018-0973, CVE-2018-0970, CVE-2010-0719, CVE-2018-0887, CVE-2008-4269, CVE-2009-0078, CVE-2009-1216, CVE-2018-0975, CVE-2018-0972, CVE-2009-2526, CVE-2011-1229, CVE-2009-0231, CVE-2008-3013, CVE-2010-4669, CVE-2009-1536, CVE-2009-0094, CVE-2008-2250, CVE-2009-3103, CVE-2008-4268, CVE-2009-0083, CVE-2009-0082, CVE-2009-0093, CVE-2009-0233, CVE-2009-0086, CVE-2009-0230, CVE-2010-0025, CVE-2008-1084, CVE-2010-0024, CVE-2008-1441, CVE-2008-4038, CVE-2008-2252, CVE-2009-0320, CVE-2018-8641, CVE-2010-4398, CVE-2007-6753, CVE-2008-2251, CVE-2009-0081, CVE-2012-1194, CVE-2018-0974, CVE-2018-0969, CVE-2009-0080, CVE-2017-11852, CVE-2009-0234, CVE-2009-2532, CVE-2010-4562, CVE-2009-0085
heuristics/extracted_sars ASE_INT.1, ALC_DVS.2, ADV_FSP.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ATE_IND.2, ASE_CCL.1 ASE_INT.1, ALC_CMC.4, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ATE_DPT.2, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, APE_REQ.2, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_TDS.3, ASE_REQ.2, ALC_DVS.1, ADV_INT.3, APE_INT.1, APE_SPD.1, ADV_FSP.4, ATE_IND.2, APE_OBJ.2, ASE_CCL.1, ADV_SPM.1
heuristics/extracted_versions 1.0 2008
heuristics/report_references/directly_referenced_by {} BSI-DSZ-CC-0755-2012
heuristics/report_references/indirectly_referenced_by {} BSI-DSZ-CC-0755-2012
heuristics/scheme_data
  • category: ICs, Smart Cards and Smart Card-Related Devices and Systems
  • certification_date: 17.01.2017
  • developer: CEITEC S.A.
  • enhanced:
    • category: ICs, Smart Cards and Smart Card-Related Devices and Systems
    • cert_id: SERTIT-080
    • certification_date: 17.01.2017
    • description: The TOE is an electronic module for machine readable travel documents (MRTDs) based on the requirements of the International Civil Aviation Organization, as defined in ICAO Doc 9303. The TOE is developed and produced by CEITEC and delivered to the passport manufacturer as micro modules. The TOE contains at the physical level: Integrated circuit chip; IC Software; data necessary to enable the MRTD personalization; the associated guidance documentation. The TOE also provides the security functions: integrity and confidentiality of personal data; access control, identification and authentication; protection against abuse of functionality, information leakage, physical tampering, malfunctions.
    • developer: CEITEC S.A.
    • documents: frozendict({'cert': [frozendict({'href': 'https://sertit.no/getfile.php/135163-1607953148/SERTIT/Sertifikater/2017/80/20170117%20Sertit-080%20C.pdf'})], 'target': [frozendict({'href': 'https://sertit.no/getfile.php/135166-1607953151/SERTIT/Sertifikater/2017/80/%5BSTlite-EAC%5D%20CEITECSA%205.410.052%20-%20ST-Lite%20ePassport%20Module%20EAC%202.0.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/135160-1607953146/SERTIT/Sertifikater/2017/80/20170117%20S-080%20CR%20Ceitec%20EAC.pdf'})]})
    • evaluation_facility: Brightsight B.V.
    • level: EAL 4, ALC_DVS.2, AVA_VAN.5
    • mutual_recognition: CCRA, SOG-IS
    • product: 1.0
    • protection_profile: BSI-CC-PP-0056, "Machine Readable Travel Document with 'ICAO Application', Extended Access Control"
    • sponsor: CEITEC S.A.
  • product: CEITEC ePassport Module CTC21001
  • url: https://sertit.no/certified-products/product-archive/ceitec-epassport-module-ctc21001
heuristics/protection_profiles a33327d40f253f46 {}
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056_V2b_pdf.pdf {}
pdf_data/report_filename 20170117 S-080 CR Ceitec EAC.pdf 0570a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cert_id: BSI-DSZ-CC-0570-2009
    • cert_item: Microsoft Windows Server 2008 Hyper-V Role with HotFix KB950050
    • cert_lab: BSI
    • developer: Microsoft Corporation
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
pdf_data/report_keywords/cc_cert_id
  • NO:
    • SERTIT-080: 19
  • DE:
    • BSI-DSZ-CC-0570-2009: 18
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0056: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 4: 2
    • EAL 4+: 19
    • EAL1: 1
    • EAL4: 1
    • EAL7: 1
  • EAL:
    • EAL 1: 1
    • EAL 4: 5
    • EAL 4 augmented: 3
    • EAL 7: 1
    • EAL1: 6
    • EAL2: 3
    • EAL3: 4
    • EAL4: 4
    • EAL5: 6
    • EAL6: 3
    • EAL7: 4
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 2
    • ALC_FLR: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 4
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 2
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 2
    • ALC_CMS.5: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 2
    • ALC_DVS: 1
    • ALC_DVS.1: 2
    • ALC_DVS.2: 1
    • ALC_FLR: 1
    • ALC_FLR.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 6
    • ALC_LCD.1: 2
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 2
    • ALC_TAT.2: 1
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 1
    • ATE_DPT.4: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 1
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_SAS.1: 4
  • FCS:
    • FCS_CKM.1: 1
    • FCS_CKM.4: 1
    • FCS_COP: 4
    • FCS_RND.1: 4
  • FDP:
    • FDP_ACC.1: 1
    • FDP_ACF.1: 1
    • FDP_UCT.1: 1
    • FDP_UIT.1: 1
  • FIA:
    • FIA_API.1: 4
    • FIA_UAU.1: 1
    • FIA_UAU.4: 1
    • FIA_UAU.5: 1
    • FIA_UAU.6: 1
    • FIA_UID.1: 1
  • FMT:
    • FMT_LIM.1: 4
    • FMT_LIM.2: 4
    • FMT_MTD: 8
    • FMT_MTD.3: 1
    • FMT_SMF.1: 1
    • FMT_SMR.1: 1
  • FPT:
    • FPT_FLS.1: 1
    • FPT_PHP.3: 1
    • FPT_TST.1: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 25
    • Microsoft Corporation: 7
pdf_data/report_keywords/eval_facility
  • BrightSight:
    • Brightsight: 1
  • atsec:
    • atsec: 3
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • physical tampering: 1
  • other:
    • JIL: 1
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI 7149: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • ICAO:
    • ICAO: 4
  • ISO:
    • ISO/IEC 15408: 2
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Final Evaluation Technical Report Microsoft Hyper-V Server 2008, atsec information security GmbH, (confidential document) [8] Configuration lists for the TOE (confidential documents): ● Configuration List – Hyper-V RTM: 1
pdf_data/report_metadata
  • /AAPL:Keywords: ['ugradert']
  • /Author: Kjaertan
  • /CreationDate: D:20170118113117Z00'00'
  • /Creator: Microsoft® Word 2010
  • /Keywords: ugradert
  • /ModDate: D:20170118113117Z00'00'
  • /Producer: Mac OS X 10.12.2 Quartz PDFContext
  • /Title: tittel
  • pdf_file_size_bytes: 650258
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 20
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20090731095448+02'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, Microsoft, Hyper-V, Server 2008, Virtualization, Operating System"
  • /ModDate: D:20090803083941+02'00'
  • /Producer: StarOffice 9
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0570-2009
  • pdf_file_size_bytes: 734094
  • pdf_hyperlinks: http://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 38
pdf_data/st_filename [STlite-EAC] CEITECSA 5.410.052 - ST-Lite ePassport Module EAC 2.0.pdf 0570b_pdf.pdf
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0056: 7
    • BSI-PP-0056: 1
    • BSI-PP-CC-0056: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 8
    • EAL4 augmented: 2
  • EAL:
    • EAL 4: 4
    • EAL 4 augmented: 1
    • EAL4: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.2: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_DVS.2: 5
  • APE:
    • APE_SRE: 1
  • AVA:
    • AVA_VAN.5: 5
  • ADV:
    • ADV_ARC: 2
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.3: 5
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.2: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_SAS: 6
    • FAU_SAS.1: 11
    • FAU_SAS.1.1: 2
  • FCS:
    • FCS_CKM.1: 26
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 22
    • FCS_CKM.4.1: 1
    • FCS_COP: 36
    • FCS_COP.1: 7
    • FCS_RND: 7
    • FCS_RND.1: 11
    • FCS_RND.1.1: 2
  • FDP:
    • FDP_ACC.1: 20
    • FDP_ACC.1.1: 1
    • FDP_ACF: 1
    • FDP_ACF.1: 13
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 4
    • FDP_ITC: 1
    • FDP_ITC.1: 10
    • FDP_ITC.2: 10
    • FDP_UCT.1: 8
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 7
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_API: 6
    • FIA_API.1: 10
    • FIA_API.1.1: 2
    • FIA_SOS.2: 1
    • FIA_UAU.1: 9
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.4: 8
    • FIA_UAU.4.1: 1
    • FIA_UAU.5: 9
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 10
    • FIA_UAU.6.1: 1
    • FIA_UID.1: 15
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_LIM: 7
    • FMT_LIM.1: 21
    • FMT_LIM.1.1: 2
    • FMT_LIM.2: 18
    • FMT_LIM.2.1: 2
    • FMT_MSA.1: 1
    • FMT_MSA.3: 3
    • FMT_MTD: 46
    • FMT_MTD.1: 11
    • FMT_MTD.3: 4
    • FMT_MTD.3.1: 1
    • FMT_SMF.1: 34
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 38
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 9
    • FPT_FLS.1.1: 1
    • FPT_PHP.3: 10
    • FPT_PHP.3.1: 1
    • FPT_TST: 1
    • FPT_TST.1: 9
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC.1: 5
    • FTP_TRP.1: 5
  • FAU:
    • FAU_GEN.1: 15
    • FAU_GEN.1.1: 6
    • FAU_GEN.1.2: 6
    • FAU_GEN.2: 12
    • FAU_GEN.2.1: 6
    • FAU_SAR.1: 6
    • FAU_SAR.1.1: 4
    • FAU_SAR.1.2: 4
    • FAU_SAR.2: 5
    • FAU_SAR.2.1: 3
    • FAU_STG.1: 6
    • FAU_STG.1.1: 3
    • FAU_STG.1.2: 3
    • FAU_STG.3: 5
    • FAU_STG.3.1: 3
    • FAU_STG.4: 6
    • FAU_STG.4.1: 4
  • FDP:
    • FDP_ACC.1: 19
    • FDP_ACC.1.1: 6
    • FDP_ACF.1: 17
    • FDP_ACF.1.1: 6
    • FDP_ACF.1.2: 6
    • FDP_ACF.1.3: 6
    • FDP_ACF.1.4: 6
    • FDP_IFC.1: 2
    • FDP_RIP.1: 6
    • FDP_RIP.1.1: 3
  • FIA:
    • FIA_AFL.1: 5
    • FIA_AFL.1.1: 4
    • FIA_AFL.1.2: 4
    • FIA_ATD.1: 14
    • FIA_ATD.1.1: 7
    • FIA_SOS.1: 5
    • FIA_SOS.1.1: 4
    • FIA_UAU.1: 4
    • FIA_UAU.1.1: 4
    • FIA_UAU.1.2: 3
    • FIA_UAU.2: 1
    • FIA_UAU.7: 5
    • FIA_UAU.7.1: 4
    • FIA_UID.1: 8
    • FIA_UID.1.1: 4
    • FIA_UID.1.2: 4
    • FIA_UID.2: 6
    • FIA_UID.2.1: 3
    • FIA_USB.1: 13
    • FIA_USB.1.1: 6
    • FIA_USB.1.2: 6
    • FIA_USB.1.3: 6
  • FMT:
    • FMT_MSA.1: 10
    • FMT_MSA.1.1: 3
    • FMT_MSA.2: 6
    • FMT_MSA.2.1: 3
    • FMT_MSA.3: 15
    • FMT_MSA.3.1: 4
    • FMT_MSA.3.2: 4
    • FMT_MTD.1: 36
    • FMT_MTD.1.1: 24
    • FMT_REV.1: 7
    • FMT_REV.1.1: 3
    • FMT_REV.1.2: 4
    • FMT_SMF.1: 9
    • FMT_SMF.1.1: 6
    • FMT_SMR.1: 10
    • FMT_SMR.1.1: 3
    • FMT_SMR.1.2: 3
  • FPT:
    • FPT_STM.1: 8
    • FPT_STM.1.1: 3
  • FRU:
    • FRU_RSA.1: 6
    • FRU_RSA.1.1: 3
  • FTP:
    • FTP_STM.1: 1
pdf_data/st_keywords/cc_claims
  • OE:
    • OE.BAC-PP: 2
    • OE.BAC_PP: 1
    • OE.MRTD_: 2
  • A:
    • A.ADMIN: 2
    • A.CLEAN_ROOT: 2
    • A.CORRECT_HARDWARE: 3
    • A.DEFINED_INSTALL: 2
    • A.MEMORY_MANAGEMENT: 2
    • A.MEMORY_MANGEMENT: 1
    • A.PARTITION_CONNECT: 2
    • A.PHYSICAL: 3
    • A.REMOTE_ADMIN: 2
    • A.REMOTE_IT_PRODUCTS: 2
    • A.SUBJECT_ALLOCATION: 1
  • O:
    • O.AUDIT_GENERATION: 15
    • O.AUTHORIZED_SUBJECT: 12
    • O.INIT_SECURE_STATE: 7
    • O.MANAGE: 20
    • O.PARTITION_ACCESS: 11
    • O.PARTITION_ISOLATION: 4
    • O.PRESERVE_PART_PRIV: 5
    • O.RESIDUAL_INFORMATION: 6
    • O.RESOURCE_ALLOCATION: 6
  • OE:
    • OE.HW_MECHANISMS: 4
    • OE.HW_SIDE_EFFECTS: 1
    • OE.MEMORY_MANAGEMENT: 2
    • OE.NETWORK: 3
    • OE.PARTITION_USER: 2
    • OE.PHYSICAL: 4
    • OE.REMOTE_ADMIN: 3
    • OE.REMOTE_IT_PRODUCT: 8
    • OE.SUBJECT_ALLOCATION: 4
    • OE.TRUSTED_INDIVIDUAL: 4
    • OE.TRUSTED_INDIVIDUALS: 1
    • OE.TRUSTED_ROOT: 4
  • T:
    • T.CONFIGURATION_CHANGE: 3
    • T.DENIAL_OF_SERVICE: 3
    • T.PARTITION_COMPROMISE: 3
    • T.UNAUTHORIZED_ACCESS: 3
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 112
    • Microsoft Corporation: 3
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • DES:
    • 3DES:
      • 3DES: 1
      • Triple-DES: 2
    • DES:
      • DES: 2
  • AES_competition:
    • HPC:
      • HPC: 1
    • RC:
      • RC4: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 1
  • FF:
    • DH:
      • Diffie-Hellman: 5
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 4
  • MAC:
    • MAC: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 3
    • Physical Tampering: 7
    • Physical tampering: 1
    • fault injection: 1
    • malfunction: 6
    • physical tampering: 5
  • SCA:
    • DPA: 3
    • SPA: 2
    • physical probing: 3
    • timing attacks: 1
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.COM: 10
    • EF.DG1: 20
    • EF.DG13: 2
    • EF.DG14: 7
    • EF.DG16: 17
    • EF.DG2: 7
    • EF.DG3: 20
    • EF.DG4: 18
    • EF.DG5: 5
    • EF.SOD: 10
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 180-2: 1
    • FIPS 180-411: 1
  • ICAO:
    • ICAO: 9
  • PKCS:
    • PKCS#3: 2
    • PKCS#34: 1
  • CC:
    • CCMB-2007-09-001: 1
    • CCMB-2007-09-004: 1
  • RFC:
    • RFC 3720: 1
pdf_data/st_metadata
  • /Author: Marcos Kordyas Dossa
  • /CreationDate: D:20161212160233-02'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20161212160233-02'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 1330959
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 71
  • /Author: Microsoft
  • /CreationDate: D:20090723152525Z
  • /Creator: Microsoft® Word 2010 (Technical Preview)
  • /Keywords: Microsoft, Windows Server 2008, Hyper-V, Security Target, Commcon Criteria Evauatin
  • /ModDate: D:20090803090123+02'00'
  • /Producer: PDF-XChange Viewer [Version: 2.0 (Build 41.5) (Mar 30 2009; 19:53:50)]
  • /Subject: Microsoft Windows Server 2008 Hyper-V Security Target
  • /Title: Microsoft Windows Server 2008 Hyper-V Security Target
  • pdf_file_size_bytes: 1098933
  • pdf_hyperlinks: http://creativecommons.org/licenses/by-nd-nc/1.0/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 93
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different