name |
CEITEC ePassport Module, CTC21001, v1.0 (supporting EAC) |
Hewlett-Packard Tru64 UNIX V5.1A |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
Operating Systems |
scheme |
NO |
UK |
status |
archived |
archived |
not_valid_after |
17.01.2022 |
05.03.2013 |
not_valid_before |
17.01.2017 |
01.02.2004 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20170117%20S-080%20CR%20Ceitec%20EAC.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP199.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[STlite-EAC]%20CEITECSA%205.410.052%20-%20ST-Lite%20ePassport%20Module%20EAC%202.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Tru64STIssue1.pdf |
manufacturer |
CEITEC S.A. |
Hewlett-Packard Company |
manufacturer_web |
https://www.ceitec-sa.com |
https://www.hp.com |
security_level |
EAL4+, ALC_DVS.2, AVA_VAN.5 |
EAL1 |
dgst |
8856518b423e12c4 |
d58d29b92347f137 |
heuristics/cert_id |
SERTIT-080 |
CRP199 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
cpe:2.3:o:hp:tru64:5.1b2_pk4:*:*:*:*:*:*:*, cpe:2.3:o:hp:tru64:5.1_pk3_bl17:*:*:*:*:*:*:*, cpe:2.3:o:hp:tru64:5.1b1:*:*:*:*:*:*:*, cpe:2.3:o:hp:tru64:5.1b_pk1:*:*:*:*:*:*:*, cpe:2.3:o:hp:tru64:5.1b_pk2_bl22:*:*:*:*:*:*:*, cpe:2.3:o:hp:tru64:5.1a:*:*:*:*:*:*:*, cpe:2.3:o:hp:tru64:5.1a_pk3_bl3:*:*:*:*:*:*:*, cpe:2.3:o:hp:tru64:5.1a:pk6:*:*:*:*:*:*, cpe:2.3:o:hp:tru64_unix:5.1b:patch_kit3:*:*:*:*:*:*, cpe:2.3:o:hp:tru64:5.1_pk4_bl18:*:*:*:*:*:*:*, cpe:2.3:o:hp:tru64:5.1b2:pk4:*:*:*:*:*:*, cpe:2.3:o:hp:tru64:5.1b:pk1:*:*:*:*:*:*, cpe:2.3:o:hp:tru64:5.1a_pk6:*:*:*:*:*:*:*, cpe:2.3:o:hp:tru64:5.1b3:*:*:*:*:*:*:*, cpe:2.3:o:hp:tru64:5.1af:*:*:*:*:*:*:*, cpe:2.3:o:hp:tru64:5.1:*:*:*:*:*:*:*, cpe:2.3:o:hp:tru64:5.1a_pk1_bl1:*:*:*:*:*:*:*, cpe:2.3:o:hp:tru64:5.1b1_pk4:*:*:*:*:*:*:*, cpe:2.3:o:hp:tru64:5.1b2:*:*:*:*:*:*:*, cpe:2.3:o:hp:tru64:5.1b4:*:*:*:*:*:*:*, cpe:2.3:o:hp:tru64_unix:5.1b:patch_kit2:*:*:*:*:*:*, cpe:2.3:o:hp:tru64:5.1b1_pk3:*:*:*:*:*:*:*, cpe:2.3:o:hp:tru64:5.1a_pk5_bl23:*:*:*:*:*:*:*, cpe:2.3:o:hp:tru64:5.1b:*:*:*:*:*:*:*, cpe:2.3:o:hp:tru64:5.1b_p3k_bl24:*:*:*:*:*:*:*, cpe:2.3:o:hp:tru64:5.1a_pk4_bl21:*:*:*:*:*:*:*, cpe:2.3:o:hp:tru64:5.1a_pk2_bl2:*:*:*:*:*:*:*, cpe:2.3:o:hp:tru64:5.1b1:pk4:*:*:*:*:*:*, cpe:2.3:o:hp:tru64:5.1b1:pk3:*:*:*:*:*:*, cpe:2.3:o:hp:tru64:5.1_pk5_bl19:*:*:*:*:*:*:*, cpe:2.3:o:hp:tru64:5.1_pk6_bl20:*:*:*:*:*:*:*, cpe:2.3:o:hp:tru64_unix:5.1b:patch_kit4:*:*:*:*:*:* |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
CVE-2002-1606, CVE-2002-1605, CVE-2005-2993, CVE-2000-1031, CVE-2002-1609, CVE-2007-2553, CVE-2004-2678, CVE-2002-1612, CVE-2003-0221, CVE-2007-0805, CVE-2002-1604, CVE-2007-6519, CVE-2002-1608, CVE-2002-1610, CVE-2002-1614, CVE-2007-2791, CVE-2006-6418, CVE-2005-3670, CVE-2002-1784, CVE-2004-0657, CVE-2008-4414, CVE-2002-1613, CVE-2002-1607, CVE-2003-1496, CVE-2002-1617, CVE-2002-1611, CVE-2002-1616, CVE-2005-0719, CVE-2002-1615, CVE-2006-5452 |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, ALC_DVS.2, ADV_FSP.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ATE_IND.2, ASE_CCL.1 |
ADV_RCR.1, ADV_FSP.1, AGD_USR.1, ATE_IND.1, AGD_ADM.1 |
heuristics/extracted_versions |
1.0 |
5.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- category: ICs, Smart Cards and Smart Card-Related Devices and Systems
- certification_date: 17.01.2017
- developer: CEITEC S.A.
- enhanced:
- category: ICs, Smart Cards and Smart Card-Related Devices and Systems
- cert_id: SERTIT-080
- certification_date: 17.01.2017
- description: The TOE is an electronic module for machine readable travel documents (MRTDs) based on the requirements of the International Civil Aviation Organization, as defined in ICAO Doc 9303. The TOE is developed and produced by CEITEC and delivered to the passport manufacturer as micro modules. The TOE contains at the physical level: Integrated circuit chip; IC Software; data necessary to enable the MRTD personalization; the associated guidance documentation. The TOE also provides the security functions: integrity and confidentiality of personal data; access control, identification and authentication; protection against abuse of functionality, information leakage, physical tampering, malfunctions.
- developer: CEITEC S.A.
- documents: frozendict({'cert': [frozendict({'href': 'https://sertit.no/getfile.php/135163-1607953148/SERTIT/Sertifikater/2017/80/20170117%20Sertit-080%20C.pdf'})], 'target': [frozendict({'href': 'https://sertit.no/getfile.php/135166-1607953151/SERTIT/Sertifikater/2017/80/%5BSTlite-EAC%5D%20CEITECSA%205.410.052%20-%20ST-Lite%20ePassport%20Module%20EAC%202.0.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/135160-1607953146/SERTIT/Sertifikater/2017/80/20170117%20S-080%20CR%20Ceitec%20EAC.pdf'})]})
- evaluation_facility: Brightsight B.V.
- level: EAL 4, ALC_DVS.2, AVA_VAN.5
- mutual_recognition: CCRA, SOG-IS
- product: 1.0
- protection_profile: BSI-CC-PP-0056, "Machine Readable Travel Document with 'ICAO Application', Extended Access Control"
- sponsor: CEITEC S.A.
- product: CEITEC ePassport Module CTC21001
- url: https://sertit.no/certified-products/product-archive/ceitec-epassport-module-ctc21001
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
a33327d40f253f46 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056_V2b_pdf.pdf |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
20170117 S-080 CR Ceitec EAC.pdf |
CRP199.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
- UK:
- CERTIFICATION REPORT No. P199: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 4: 2
- EAL 4+: 19
- EAL1: 1
- EAL4: 1
- EAL7: 1
|
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 2
- ALC_FLR: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND: 1
- ATE_IND.2: 1
- AVA:
|
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_CKM.1: 1
- FCS_CKM.4: 1
- FCS_COP: 4
- FCS_RND.1: 4
- FDP:
- FDP_ACC.1: 1
- FDP_ACF.1: 1
- FDP_UCT.1: 1
- FDP_UIT.1: 1
- FIA:
- FIA_API.1: 4
- FIA_UAU.1: 1
- FIA_UAU.4: 1
- FIA_UAU.5: 1
- FIA_UAU.6: 1
- FIA_UID.1: 1
- FMT:
- FMT_LIM.1: 4
- FMT_LIM.2: 4
- FMT_MTD: 8
- FMT_MTD.3: 1
- FMT_SMF.1: 1
- FMT_SMR.1: 1
- FPT:
- FPT_FLS.1: 1
- FPT_PHP.3: 1
- FPT_TST.1: 1
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- ICAO:
- ISO:
|
- CC:
- CCIMB-99-031: 1
- CCIMB-99-032: 1
- CCIMB-99-033: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- OutOfScope:
- The local network itself is assumed to be subject to appropriate security procedures but these are out of scope of the TOE. 6. The TOE offers FTP and T elnet services, constrained by the TOE’s user: 1
- out of scope: 2
- respond to requests for Telnet & FTP services. The network, including clients of FTP & Telnet, is out of scope of the evaluation (but is assumed to be constrained by a similar security policy to that of the TOE: 1
|
pdf_data/report_metadata |
- /AAPL:Keywords: ['ugradert']
- /Author: Kjaertan
- /CreationDate: D:20170118113117Z00'00'
- /Creator: Microsoft® Word 2010
- /Keywords: ugradert
- /ModDate: D:20170118113117Z00'00'
- /Producer: Mac OS X 10.12.2 Quartz PDFContext
- /Title: tittel
- pdf_file_size_bytes: 650258
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
- /Author: racook
- /CreationDate: D:20040213085521Z
- /Creator: tru64_cr_1_0 - Microsoft Word
- /ModDate: D:20131204151403Z
- /Producer: Acrobat PDFWriter 5.0 for Windows NT
- /Title: tru64_cr_1_0.doc
- pdf_file_size_bytes: 84416
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 24
|
pdf_data/st_filename |
[STlite-EAC] CEITECSA 5.410.052 - ST-Lite ePassport Module EAC 2.0.pdf |
Tru64STIssue1.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0056: 7
- BSI-PP-0056: 1
- BSI-PP-CC-0056: 1
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL4: 8
- EAL4 augmented: 2
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 2
- ADV_FSP.2: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- APE:
- AVA:
|
- ACM:
- ADO:
- ADV:
- ADV_FSP.1: 1
- ADV_RCR.1: 1
- AGD:
- AGD_ADM.1: 1
- AGD_USR.1: 1
- ATE:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_SAS: 6
- FAU_SAS.1: 11
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM.1: 26
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 22
- FCS_CKM.4.1: 1
- FCS_COP: 36
- FCS_COP.1: 7
- FCS_RND: 7
- FCS_RND.1: 11
- FCS_RND.1.1: 2
- FDP:
- FDP_ACC.1: 20
- FDP_ACC.1.1: 1
- FDP_ACF: 1
- FDP_ACF.1: 13
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 2
- FDP_IFC.1: 4
- FDP_ITC: 1
- FDP_ITC.1: 10
- FDP_ITC.2: 10
- FDP_UCT.1: 8
- FDP_UCT.1.1: 1
- FDP_UIT.1: 7
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_API: 6
- FIA_API.1: 10
- FIA_API.1.1: 2
- FIA_SOS.2: 1
- FIA_UAU.1: 9
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 8
- FIA_UAU.4.1: 1
- FIA_UAU.5: 9
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 10
- FIA_UAU.6.1: 1
- FIA_UID.1: 15
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_LIM: 7
- FMT_LIM.1: 21
- FMT_LIM.1.1: 2
- FMT_LIM.2: 18
- FMT_LIM.2.1: 2
- FMT_MSA.1: 1
- FMT_MSA.3: 3
- FMT_MTD: 46
- FMT_MTD.1: 11
- FMT_MTD.3: 4
- FMT_MTD.3.1: 1
- FMT_SMF.1: 34
- FMT_SMF.1.1: 1
- FMT_SMR.1: 38
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 9
- FPT_FLS.1.1: 1
- FPT_PHP.3: 10
- FPT_PHP.3.1: 1
- FPT_TST: 1
- FPT_TST.1: 9
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC.1: 5
- FTP_TRP.1: 5
|
- FAU:
- FAU_GEN.1: 1
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 1
- FAU_GEN.2: 1
- FAU_GEN.2.1: 2
- FAU_SAR.1: 1
- FAU_SAR.1.1: 2
- FAU_SAR.1.2: 1
- FAU_SAR.2: 1
- FAU_SAR.2.1: 2
- FAU_SAR.3: 2
- FAU_SAR.3.1: 2
- FAU_SEL.1: 2
- FAU_SEL.1.1: 2
- FAU_STG.1: 1
- FAU_STG.1.1: 2
- FAU_STG.1.2: 1
- FAU_STG.3: 2
- FAU_STG.3.1: 2
- FDP:
- FDP_ACC.1: 2
- FDP_ACC.1.1: 2
- FDP_ACF.1: 8
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 3
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_RIP: 3
- FIA:
- FIA_ATD.1: 2
- FIA_ATD.1.1: 3
- FIA_SOS.1: 1
- FIA_SOS.1.1: 3
- FIA_UAU.1: 2
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UAU.7: 1
- FIA_UAU.7.1: 2
- FIA_UID.1: 2
- FIA_UID.1.1: 2
- FIA_UID.1.2: 2
- FMT:
- FMT_MSA.1: 2
- FMT_MSA.1.1: 2
- FMT_MSA.3: 1
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MTD: 14
- FMT_MTD.1: 1
- FMT_REV: 12
- FMT_SMR.1: 2
- FMT_SMR.1.1: 4
- FMT_SMR.1.2: 3
- FPT:
- FPT_AMT.1: 2
- FPT_AMT.1.1: 2
- FPT_RVM.1: 1
- FPT_RVM.1.1: 2
- FPT_SEP.1: 1
- FPT_SEP.1.1: 2
- FPT_SEP.1.2: 1
- FPT_STM.1: 1
- FPT_STM.1.1: 2
|
pdf_data/st_keywords/cc_claims |
- OE:
- OE.BAC-PP: 2
- OE.BAC_PP: 1
- OE.MRTD_: 2
|
- A:
- A.CONNECT: 6
- A.COOP: 1
- A.LOCATE: 1
- A.MANAGE: 1
- A.NETWORK: 6
- A.NO_EVIL_ADM: 1
- A.PEER: 5
- A.PROTECT: 1
- O:
- O.AUDITING: 1
- O.AUTHORIZATION: 1
- O.CREDEN: 1
- O.DISCRETIONARY_ACCESS: 1
- O.ENFORCEMENT: 1
- O.INSTALL: 3
- O.MANAGE: 1
- O.PHYSICAL: 2
- O.RESIDUAL_INFORMATION: 1
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 3
- Physical Tampering: 7
- Physical tampering: 1
- fault injection: 1
- malfunction: 6
- physical tampering: 5
- SCA:
- DPA: 3
- SPA: 2
- physical probing: 3
- timing attacks: 1
- other:
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
- EF:
- EF.COM: 10
- EF.DG1: 20
- EF.DG13: 2
- EF.DG14: 7
- EF.DG16: 17
- EF.DG2: 7
- EF.DG3: 20
- EF.DG4: 18
- EF.DG5: 5
- EF.SOD: 10
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 180-2: 1
- FIPS 180-411: 1
- ICAO:
- PKCS:
|
- CC:
- CCIMB-99-031: 1
- CCIMB-99-032: 1
- CCIMB-99-033: 1
- ISO:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: Marcos Kordyas Dossa
- /CreationDate: D:20161212160233-02'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20161212160233-02'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 1330959
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 71
|
- /Author: racook
- /CreationDate: D:20040218114941
- /Creator: Tru64ST Issue 1.0 - Microsoft Word
- /Producer: Acrobat PDFWriter 5.0 for Windows NT
- /Title: Tru64ST Issue 1.0.rtf
- pdf_file_size_bytes: 158515
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 39
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |