name |
Touch&Sign2048 Version 1.00 |
Huawei FusionSphere 6.5.RC1.T7 |
category |
Products for Digital Signatures |
Operating Systems |
scheme |
DE |
ES |
status |
archived |
active |
not_valid_after |
01.09.2019 |
03.02.2026 |
not_valid_before |
09.04.2008 |
04.02.2021 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2018-58%20CCRA.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20080527_0422a.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2018-58%20INF-3355.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20080527_0422b.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2018-58%20ST.pdf |
manufacturer |
ST Incard S.R.L. |
Huawei Technologies Co. Ltd. |
manufacturer_web |
https://www.incard.it/ |
https://www.huawei.com |
security_level |
AVA_MSU.3, EAL4+, AVA_VLA.4 |
EAL2+, ALC_FLR.2 |
dgst |
90c173d803358cae |
1978c3be06f0e1a7 |
heuristics/cert_id |
BSI-DSZ-CC-0422-2008 |
2018-58-INF-3355 |
heuristics/cert_lab |
BSI |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_RCR.1, ADV_HLD.2, AGD_USR.1, ALC_DVS.2, AVA_SOF.1, ADV_FSP.2, ADV_IMP.1, ATE_COV.2, ALC_TAT.1, AGD_ADM.1, ALC_LCD.1, ATE_FUN.1, ATE_DPT.1, AVA_VLA.4, ATE_IND.2, ADV_LLD.1, ADV_MSU.3, ADV_SPM.1, AVA_MSU.3 |
ASE_TSS.1, ADV_TDS.1, ASE_INT.1, ALC_DEL.1, ALC_CMC.2, ATE_IND.2, ATE_COV.1, AGD_OPE.1, ADV_ARC.1, AVA_VAN.2, ASE_CCL.1, ALC_FLR.2, ASE_REQ.2 |
heuristics/extracted_versions |
1.00 |
6.5 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
ANSSI-CC-2006/18 |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
ANSSI-CC-2006/18 |
{} |
heuristics/scheme_data |
|
- category: Operating systems
- certification_date: 04.02.2021
- enhanced:
- category: Operating systems
- cc_version: Common Criteria 3.1 release 5
- cert_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1084
- certification_date: 04.02.2021
- description: The Target of Evaluation (TOE) Huawei FusionSphere 6.5.RC1.T7 is a cloud operating system (OS) solution. The TOE provides the following key security features: VM Network Separation: The TOE supports virtual switches and virtual networks. VMs can be separated by creating different networks. Administrators can configure network isolation policies. VM isolation: The hypervisor isolates VMs running on the same physical server to prevent data theft and malicious attacks. VM users can only access resources (hardware and software resources and data) that belong to their own VMs. User and Privilege Management: The TOE supports role-based access control, used for the system maintenance personnel to access the virtualization platform and VMs. The table below shows list of roles defined in the TOE and the description of each role. TOE Access: The TOE offers functionality for terminating active sessions automatically after an inactivity period of time. Communications security: The TOE can be remotely accessed using a SSH connection, creating a trusted path between the TOE and the authorized users. Security audit: Operation logs record the security-relevant events performed by users on the system and the result of the operation and is used for tracing and auditing. Access control: Huawei FusionSphere software implements rolebased access control, limiting access to different management functions to different roles as defined in administrator-defined access control associations. Authentication: Operators who access the TOE locally or remotely in order to execute device management functions are identified by individual user names and authenticated by passwords.
- evaluation_facility: DEKRA Testing and Certification S.A.U.
- level: EAL2 + (ALC_FLR.2)
- manufacturer: Huawei Technologies Co., Ltd.
- report_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1083
- status: Certified
- target_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1082
- type: Product
- manufacturer: Huawei Technologies Co., Ltd.
- product: Huawei FusionSphere 6.5.RC1.T7
- product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/399-huawei-fusionsphere-6-5-rc1-t7
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
ANSSI-CC-2006/18 |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
ANSSI-CC-2006/18 |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
|
2018-58 CCRA.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL2: 1
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
- Huawei:
- Huawei: 2
- Huawei Technologies Co: 2
|
pdf_data/cert_keywords/eval_facility |
|
- DEKRA:
- DEKRA Testing and Certification: 1
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author:
- /CreationDate:
- /Creator:
- /Keywords:
- /ModDate:
- /Producer:
- /Subject:
- /Title:
- /Trapped:
- pdf_file_size_bytes: 738373
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
20080527_0422a.pdf |
2018-58 INF-3355.pdf |
pdf_data/report_frontpage |
- DE:
- cert_id: BSI-DSZ-CC-0422-2008
- cert_item: Touch&Sign2048 Version 1.00
- cert_lab: BSI
- developer: ST Incard S.r.l. Certification Report V1.0 ZS-01-01-F-326 V4.1 BSI - Bundesamt für Sicherheit in der Informationstechnik, Postfach 20 03 63, D-53133 Bonn Phone +49 (0)228 9582-0, Fax +49 (0)228 9582-5477, Infoline +49 (0)228 9582-111
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
|
pdf_data/report_keywords/cc_cert_id |
- AU:
- Certification Report 2006/18: 1
- DE:
- FR:
- Certification Report 2006/18: 1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 4: 8
- EAL 4 augmented: 3
- EAL 5+: 2
- EAL 7: 1
- EAL1: 5
- EAL2: 3
- EAL3: 4
- EAL4: 7
- EAL4+: 1
- EAL5: 6
- EAL5+: 1
- EAL6: 3
- EAL7: 4
|
- EAL:
- EAL 1: 1
- EAL 2: 1
- EAL 4: 2
- EAL2: 9
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ACM:
- ACM_AUT: 2
- ACM_CAP: 2
- ACM_SCP: 2
- ADO:
- ADV:
- ADV_FSP: 2
- ADV_HLD: 2
- ADV_IMP: 2
- ADV_INT: 2
- ADV_LLD: 2
- ADV_RCR: 2
- ADV_SPM: 2
- AGD:
- ALC:
- ALC_DVS: 2
- ALC_FLR: 2
- ALC_LCD: 1
- ALC_TAT: 2
- APE:
- APE_DES: 1
- APE_ENV: 1
- APE_INT: 1
- APE_OBJ: 1
- APE_REQ: 1
- APE_SRE: 1
- ASE:
- ASE_DES: 1
- ASE_ENV: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_PPC: 1
- ASE_REQ: 1
- ASE_SRE: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 2
- ATE_DPT: 2
- ATE_FUN: 2
- ATE_IND: 3
- AVA:
- AVA_CCA: 2
- AVA_MSU: 2
- AVA_MSU.3: 5
- AVA_SOF: 3
- AVA_VLA: 4
- AVA_VLA.2: 1
- AVA_VLA.3: 1
- AVA_VLA.4: 6
|
- ADV:
- ADV_ARC.1: 1
- ADV_TDS.1: 1
- AGD:
- ALC:
- ALC_CMC.2: 1
- ALC_DEL.1: 1
- ALC_FLR: 4
- ALC_FLR.2: 6
- ASE:
- ASE_CCL.1: 1
- ASE_INT.1: 1
- ASE_REQ.2: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
- FAU:
- FAU_GEN.1: 1
- FAU_SAR.1: 1
- FAU_STG.1: 1
- FDP:
- FDP_ACC.1: 1
- FDP_IFC: 2
- FDP_IFF: 2
- FDP_RIP.1: 1
- FIA:
- FIA_AFL.1: 1
- FIA_ATD.1: 1
- FIA_UAU.2: 1
- FMT:
- FMT_MOF.1: 1
- FMT_MSA.1: 1
- FMT_SMR.1: 1
- FTA:
- FTP:
|
pdf_data/report_keywords/cc_claims |
- A:
- A.CGA: 1
- A.MANAGE: 1
- A.PERSONALIZATION: 1
- A.SCA: 1
- A.VAD: 1
|
|
pdf_data/report_keywords/vendor |
|
- Huawei:
- Huawei: 21
- Huawei Technologies Co: 3
|
pdf_data/report_keywords/eval_facility |
- Serma:
- TUV:
- TÜV Informationstechnik: 3
|
- DEKRA:
- DEKRA Testing and Certification: 5
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- AIS 20: 1
- AIS 25: 2
- AIS 26: 2
- AIS 31: 3
- AIS 32: 1
- AIS 34: 3
- AIS 35: 2
- AIS 36: 3
- AIS 38: 1
- FIPS:
- FIPS 140-2: 1
- FIPS 180-1: 1
- FIPS 180-2: 1
- FIPS PUB 140-2: 1
- ISO:
- ISO/IEC 15408:2005: 2
- ISO/IEC 7816: 2
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- 2006 and Surveillance Technical Report ST19WR66I, (EAL 5+), ITSEF of SERMA Technologies 25.02.2008 (confidential document) [11] Touch&Sign2048 V1.00 –Configuration List, Version A-1, Date: 2008-01- 18, ST Incard: 1
- BSI-DSZ-0422-2008, Touch&Sign2048 V1.00 - Security Target, Version A-3, Date 2007-03-29, ST Incard (confidential document) [7] Security Target BSI-DSZ-0422-2008, Touch&Sign2048 V1.00 - Security Target, Version A-3, Date: 1
- V1.00, Version 3, Date 2008-03-05, Evaluation Body for IT-Security of TÜV Informationstechnik GmbH (confidential document) B-17 Certification Report BSI-DSZ-CC-0422-2008 B-18 [9] Schutzprofil Secure Signature-Creation: 1
|
|
pdf_data/report_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Company: BSI, Postfach 200363, 53133 Bonn
- /CreationDate: D:20080509075923+02'00'
- /Creator: Acrobat PDFMaker 8.1 für Word
- /Keywords: "BSI-DSZ-CC-0422-2008, Touch&Sign2048 Version 1.00,ST Incard S.r.l.,Smart Card with Digital Signature Application, Common Criteria, Certification, Zertifizierung "
- /ModDate: D:20080516074846+02'00'
- /Producer: Acrobat Distiller 8.1.0 (Windows)
- /SourceModified: D:20080509055908
- /Subject: Touch&Sign
- /Title: Certification Report BSI-DSZ-CC-0422-2008
- pdf_file_size_bytes: 253367
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 38
|
|
pdf_data/st_filename |
20080527_0422b.pdf |
2018-58 ST.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
- AU:
- Certification Report 2006/18: 1
- DE:
- FR:
- Certification Report 2006/18: 1
|
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-PP- 002-2001: 1
- BSI-PP-0006-2002: 2
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 4: 4
- EAL 4 augmented: 2
- EAL 4+: 1
- EAL4: 2
- EAL4 augmented: 1
- EAL4+: 2
- EAL5: 1
- EAL5 augmented: 1
|
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_AUT.1: 1
- ACM_CAP.4: 1
- ACM_SCP.2: 1
- ADO:
- ADO_DEL.2: 1
- ADO_IGS.1: 1
- ADV:
- ADV_FSP.2: 1
- ADV_HLD.2: 1
- ADV_IMP.1: 1
- ADV_LLD.1: 1
- ADV_MSU.3: 1
- ADV_RCR.1: 1
- ADV_SPM.1: 1
- AGD:
- AGD_ADM.1: 1
- AGD_USR.1: 1
- ALC:
- ALC_DVS.1: 1
- ALC_DVS.2: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_MSU.3: 8
- AVA_SOF.1: 2
- AVA_VLA.4: 9
|
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM: 2
- FCS_CKM.1: 1
- FCS_CKM.1.1: 6
- FCS_CKM.2: 3
- FCS_CKM.3: 3
- FCS_CKM.4: 2
- FCS_CKM.4.1: 2
- FCS_COP: 1
- FCS_COP.1: 10
- FDP:
- FDP_ACC.1: 9
- FDP_ACC.1.1: 12
- FDP_ACF.1: 23
- FDP_ACF.1.1: 4
- FDP_ACF.1.2: 13
- FDP_ACF.1.3: 4
- FDP_ACF.1.4: 9
- FDP_ETC.1: 3
- FDP_ETC.1.1: 2
- FDP_ETC.1.2: 2
- FDP_ITC.1: 4
- FDP_ITC.1.1: 2
- FDP_ITC.1.2: 2
- FDP_ITC.1.3: 2
- FDP_RIP.1: 1
- FDP_RIP.1.1: 2
- FDP_SDI.2: 5
- FDP_SDI.2.1: 8
- FDP_SDI.2.2: 8
- FDP_UIT: 2
- FDP_UIT.1: 11
- FDP_UIT.1.1: 7
- FDP_UIT.1.2: 7
- FIA:
- FIA_AFL.1: 1
- FIA_AFL.1.1: 21
- FIA_AFL.1.2: 3
- FIA_ATD.1: 1
- FIA_ATD.1.1: 2
- FIA_UAU.1: 3
- FIA_UAU.1.1: 3
- FIA_UAU.1.2: 2
- FIA_UID.1: 4
- FIA_UID.1.1: 2
- FIA_UID.1.2: 2
- FMT:
- FMT_MOF: 1
- FMT_MOF.1: 1
- FMT_MOF.1.1: 2
- FMT_MSA: 1
- FMT_MSA.1: 1
- FMT_MSA.1.1: 5
- FMT_MSA.2: 1
- FMT_MSA.2.1: 2
- FMT_MSA.3: 1
- FMT_MSA.3.1: 3
- FMT_MSA.3.2: 2
- FMT_MTD: 1
- FMT_MTD.1: 2
- FMT_MTD.1.1: 5
- FMT_SMF.1: 13
- FMT_SMF.1.1: 4
- FMT_SMR.1: 1
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FPT:
- FPT_AMT.1: 1
- FPT_AMT.1.1: 3
- FPT_FLS.1: 1
- FPT_FLS.1.1: 7
- FPT_PHP.1: 1
- FPT_PHP.1.1: 6
- FPT_PHP.1.2: 6
- FPT_PHP.3: 1
- FPT_PHP.3.1: 6
- FPT_TST.1: 1
- FPT_TST.1.1: 3
- FPT_TST.1.2: 4
- FPT_TST.1.3: 2
- FTP:
- FTP_ITC: 4
- FTP_ITC.1: 18
- FTP_ITC.1.1: 10
- FTP_ITC.1.2: 10
- FTP_ITC.1.3: 10
- FTP_TRP: 5
- FTP_TRP.1: 12
- FTP_TRP.1.1: 5
- FTP_TRP.1.2: 5
- FTP_TRP.1.3: 5
|
- FAU:
- FAU_GEN.1: 8
- FAU_GEN.1.2: 1
- FAU_GEN.2: 5
- FAU_SAR.1: 6
- FAU_SAR.1.2: 1
- FAU_SAR.2: 4
- FAU_STG.1: 6
- FAU_STG.1.2: 1
- FAU_STG.3: 4
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 8
- FDP_ACF.1: 6
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC: 12
- FDP_IFC.1: 3
- FDP_IFC.1.1: 2
- FDP_IFF: 10
- FDP_IFF.1: 2
- FDP_IFF.1.1: 2
- FDP_IFF.1.2: 2
- FDP_IFF.1.3: 2
- FDP_IFF.1.4: 2
- FDP_IFF.1.5: 2
- FDP_RIP.1: 5
- FIA:
- FIA_AFL.1: 5
- FIA_AFL.1.2: 1
- FIA_ATD.1: 5
- FIA_SOS.1: 4
- FIA_UAU.2: 5
- FIA_UID.1: 2
- FIA_UID.2: 6
- FMT:
- FMT_MOF.1: 5
- FMT_MSA.1: 7
- FMT_MSA.3: 14
- FMT_MSA.3.2: 1
- FMT_SMF.1: 9
- FMT_SMR.1: 9
- FMT_SMR.1.2: 1
- FPT:
- FTA:
- FTP:
- FTP_TRP.1: 5
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.CGA: 1
- A.MANAGE: 3
- A.PERSONALIZATION: 3
- A.SGA: 1
- A.VAD: 4
- OE:
- OT:
- T:
|
- A:
- A.ADMIN_NOEVIL: 1
- A.ADMIN_NO_EVIL: 2
- A.OS_TRUSTED: 2
- A.PHY_PROPECT: 1
- A.PHY_PROTECT: 2
- A.SEP_PHY_NETWORK: 2
- A.TIME_SRC: 2
- O:
- OE:
- OE.OS_TRUSTED: 2
- OE.PHY_PROTECTION: 2
- OE.SEP_PHY_NETWORK: 2
- OE.TIME_SRC: 2
- OE.TRUST_WORTHY_USER: 2
- T:
- T.HOST_BYPASS: 3
- T.NOAUTH: 3
- T.NOIDENTIFY: 2
- T.VM_BYPASS: 2
- T.VNETWORK_BYPASS: 2
|
pdf_data/st_keywords/vendor |
- STMicroelectronics:
- STM: 1
- STMicroelectronics: 1
|
- Huawei:
- Huawei: 16
- Huawei Technologies Co: 51
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- SCA:
- DPA: 1
- SPA: 1
- timing attacks: 1
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- BSI:
- CC:
- CCIMB-2005-08-001: 1
- CCIMB-2005-08-002: 1
- CCIMB-2005-08-003: 1
- FIPS:
- FIPS PUB 113: 1
- FIPS PUB 140-2: 1
- FIPS PUB 180-1: 1
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 14443-2: 1
- ISO/IEC 14443-3: 1
- ISO/IEC 14443-4: 1
- ISO/IEC 14888-3: 1
- ISO/IEC 15408:2005: 2
- ISO/IEC 7816: 4
- ISO/IEC 7816-: 1
- ISO/IEC 9797-1: 1
- PKCS:
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: ST Incard Srl
- /CreationDate: Wed Dec 22 1999
- /CreationDate--Text: Wed Dec 22 1999
- /Keywords: BSI-DSZ-CC-0422
- /ModDate: D:20080516075017+02'00'
- /Producer: AFPL Ghostscript 7.0
- /Subject: BSI-DSZ-CC-0422
- /Title: Touch&Sign2048 V1.00 - Security Target
- pdf_file_size_bytes: 721164
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 74
|
|
state/cert/convert_garbage |
False |
True |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
False |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |