| name |
Juniper MX240 MX480, MX960, MX2010, MX2020, EX9204, EX9208, EX9214, PTX3000, PTX5000 with JUNOS 14.2R3 |
IDeal Citiz v2.15i on Infineon M7892 B11 embedding ID.me 1.4.8B Application |
| category |
Network and Network-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme |
US |
FR |
| status |
archived |
archived |
| not_valid_after |
28.02.2017 |
09.07.2023 |
| not_valid_before |
28.12.2015 |
09.07.2018 |
| cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10661-ci.pdf |
|
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10661-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018_22fr.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10661-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2018_22en.pdf |
| manufacturer |
HPE Juniper Networking |
Idemia |
| manufacturer_web |
https://www.juniper.net/ |
https://www.idemia.com |
| security_level |
{} |
EAL5+, AVA_VAN.5, ALC_DVS.2 |
| dgst |
92ea4a365faaabfd |
2c0fa55136a3d581 |
| heuristics/cert_id |
CCEVS-VR-VID-10661-2015 |
ANSSI-CC-2018/22 |
| heuristics/cert_lab |
US |
CEA |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ASE_CCL.1, AGD_PRE.1, ALC_CMC.1, ASE_OBJ.2, AGD_OPE.1, ATE_IND.1, ASE_INT.1, ASE_ECD.1, ALC_CMS.1, ASE_TSS.1, AVA_VAN.1, ASE_REQ.2, ADV_FSP.1 |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ATE_DPT.3, AVA_VAN.5, ASE_INT.1, ALC_CMC.4, ASE_REQ.2, ADV_INT.2, AGD_PRE.1, ASE_ECD.1, ADV_IMP.1, ADV_TDS.4, ALC_LCD.1, ALC_DVS.2, ASE_SPD.1, ATE_COV.2, ALC_CMS.5, AGD_OPE.1, ADV_FSP.5, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1, ALC_TAT.2 |
| heuristics/extracted_versions |
14.2 |
2.15, 1.4.8 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2017/59, ANSSI-CC-2016/70 |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0879-V2-2015, ANSSI-CC-2017/59, BSI-DSZ-CC-0782-V2-2015, BSI-DSZ-CC-0879-2014, BSI-DSZ-CC-0782-2012, ANSSI-CC-2016/66, ANSSI-CC-2016/70, ANSSI-CC-2016/67 |
| heuristics/scheme_data |
- api_url: https://www.niap-ccevs.org/api/project/product/pcl_products/10661/
- categories: ['Network Device']
- category: Network Device
- certification_date: 28.12.2015
- evaluation_facility: UL Verification Services
- expiration_date: 28.12.2017
- id: CCEVS-VR-VID10661
- product: Juniper MX240 MX480, MX960, MX2010, MX2020, EX9204, EX9208, EX9214, PTX3000, PTX5000 with JUNOS 14.2R3
- scheme: US
- url: https://www.niap-ccevs.org/products/10661
- vendor: HPE Juniper Networking
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
ANSSI-CC-2017/59 |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
ANSSI-CC-2017/59 |
| heuristics/protection_profiles |
ac9abe3d5c5a31f0 |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_v1.1.pdf |
{} |
| pdf_data/cert_filename |
st_vid10661-ci.pdf |
|
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10661-2015: 1
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
- /CreationDate: D:20151231080423-05'00'
- /ModDate: D:20151231080446-05'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 178899
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
| pdf_data/report_filename |
st_vid10661-vr.pdf |
anssi-cc-2018_22fr.pdf |
| pdf_data/report_frontpage |
- FR:
- US:
- cert_id: CCEVS-VR-VID10661-2015
- cert_item: Juniper Networks, Inc. Juniper Networks Mx Routers, PTX Routers and EX9200 Switches Running Junos OS 14.2R3
- cert_lab: US NIAP
|
- FR:
- cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 5
- cert_id: ANSSI-CC-2018/22
- cert_item: IDeal Citiz v2.15i on Infineon M7892 B11 embedding ID.me 1.4.8B Application
- cert_item_version: OFFICIEL_IDME_1_4_8B_IDealCitiz_SLE78CLFX4000PM_2_1_5_0_R2
- cert_lab: CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France
- developer: Idemia 8 Chaussée Jules César, 95520 Osny, France Infineon Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Idemia 18 Chaussée Jules César, 95520 Osny, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: Protection profiles for secure signature creation device : Part 2: Device with key generation, v2.0.1 ; Part 3: Device with key import, v1.0.2 ; Part 4: Extension for device with key generation and trusted communication with certificate generation application, v1.0.1 ; Part 5: Extension for device with key generation and trusted communication with signature creation application, v1.0.1 ; Part 6: Extension for device with key import and trusted communication with signature creation application, v1.0.4
- US:
|
| pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10661-2015: 1
|
- FR:
- ANSSI-CC-2016/70: 1
- ANSSI-CC-2017/59: 1
- ANSSI-CC-2018/22: 19
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0059-2009-MA-01: 1
- BSI-CC-PP- 0071-2012: 1
- BSI-CC-PP- 0072-2012: 1
- BSI-CC-PP- 0076-2013: 1
- other:
- PP-SSCD-: 6
- PP-SSCD-Part2: 1
- PP-SSCD-Part3: 1
- PP-SSCD-Part5: 1
- PP-SSCD-Part6: 1
|
| pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 1
- EAL2: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
| pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
- A:
- A.NO_GENERAL_PURPOSE: 1
- A.PHYSICAL: 1
- A.TRUSTED_ADMIN: 1
- T:
- T.ADMIN_ERROR: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
- T.UNDETECTED_ACTIONS: 1
- T.USER_DATA_REUSE: 1
|
|
| pdf_data/report_keywords/vendor |
|
- Idemia:
- Infineon:
- Infineon: 24
- Infineon Technologies AG: 1
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
- CVE:
- CVE-2004-0468: 1
- CVE-2006-3529: 1
- CVE-2007-6372: 1
- CVE-2013-4686: 1
- CVE-2013-4687: 1
- CVE-2013-4688: 1
- CVE-2013-6170: 1
- CVE-2013-7313: 1
- CVE-2014-0612: 1
- CVE-2014-0613: 1
- CVE-2014-0614: 1
- CVE-2014-0616: 1
- CVE-2014-0617: 1
- CVE-2014-2713: 1
- CVE-2014-2714: 1
- CVE-2014-3815: 1
- CVE-2014-3817: 1
- CVE-2014-3819: 1
- CVE-2014-3822: 1
- CVE-2014-3825: 1
- CVE-2014-6378: 1
- CVE-2014-6380: 1
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
- OutOfScope:
- SSH). Telnet, File Transfer Protocol (FTP), and Secure Socket Layer (SSL) are out of scope and are not used in the evaluated configuration: 1
- Secure Shell (SSH). Telnet, File Transfer Protocol (FTP), and Secure Socket Layer (SSL) are out of scope and are not used in the evaluated configuration. 7 4.5 Security Management The TOE provides an: 1
- out of scope: 1
|
|
| pdf_data/report_metadata |
|
- /Category: Référence, Version
- /Comments: Idemia
- /Company: SGDSN/ANSSI
- /CreationDate: D:20180713115402+02'00'
- /Creator: Acrobat PDFMaker 11 pour Word
- /Keywords: ANSSI-CC-CER-F-07.026
- /ModDate: D:20180713145243+02'00'
- /Producer: Adobe PDF Library 11.0
- /SourceModified: D:20180713095351
- /Subject:
- /Title:
- pdf_file_size_bytes: 287772
- pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 18
|
| pdf_data/st_filename |
st_vid10661-st.pdf |
anssi-cible-cc-2018_22en.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0782-V2-2015-RA-01: 2
- FR:
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
- ANSSI:
- BSI:
- BSI-CC-PP-0059-2009-MA-01: 1
- BSI-CC-PP-0068-V2-: 1
- BSI-CC-PP-0071-2012: 1
- BSI-CC-PP-0072-2012: 1
- BSI-CC-PP-0075-2012: 1
- BSI-CC-PP-0076-2013: 1
- BSI-PP-0035: 2
- other:
- PP-SSCD: 1
- PP-SSCD2: 23
- PP-SSCD3: 17
- PP-SSCD4: 16
- PP-SSCD5: 20
- PP-SSCD6: 16
|
| pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 5: 1
- EAL 5 augmented: 1
- EAL 5+: 1
- EAL 6+: 1
- EAL4+: 1
- EAL5: 5
- EAL5 augmented: 5
- EAL5+: 3
- EAL6: 1
- EAL6 augmented: 1
- EAL6+: 1
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 6
- ADV_FSP.1: 3
- ADV_FSP.2: 2
- ADV_FSP.4: 1
- ADV_FSP.5: 8
- ADV_IMP.1: 8
- ADV_INT.2: 1
- ADV_TDS.1: 2
- ADV_TDS.3: 3
- ADV_TDS.4: 8
- AGD:
- AGD_ADM: 1
- AGD_OPE: 4
- AGD_OPE.1: 5
- AGD_PRE: 6
- AGD_PRE.1: 5
- AGD_USR: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.1: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 8
- ALC_LCD.1: 3
- ALC_TAT.1: 2
- ALC_TAT.2: 3
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 4
- ASE_INT.1: 5
- ASE_OBJ.2: 3
- ASE_REQ.1: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 3
- ATE_DPT.1: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 6
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 5
- FAU_GEN.1: 7
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 1
- FAU_GEN.2: 5
- FAU_GEN.2.1: 1
- FAU_STG: 1
- FAU_STG.1: 1
- FAU_STG_EXT.1: 11
- FAU_STG_EXT.1.1: 2
- FCS:
- FCS_CKM: 1
- FCS_CKM.1: 19
- FCS_CKM.1.1: 2
- FCS_CKM.2: 1
- FCS_CKM.4: 7
- FCS_CKM_EXT: 1
- FCS_CKM_EXT.4: 20
- FCS_CKM_EXT.4.1: 1
- FCS_COP.1: 47
- FCS_COP.1.1: 4
- FCS_RBG_EXT.1: 15
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 2
- FCS_SSH_EXT.1: 14
- FCS_SSH_EXT.1.1: 2
- FCS_SSH_EXT.1.2: 2
- FCS_SSH_EXT.1.3: 2
- FCS_SSH_EXT.1.4: 2
- FCS_SSH_EXT.1.5: 2
- FCS_SSH_EXT.1.6: 2
- FCS_SSH_EXT.1.7: 2
- FCS_TLS_EXT.1: 2
- FDP:
- FDP_ITC.1: 6
- FDP_ITC.2: 6
- FDP_RIP.2: 5
- FDP_RIP.2.1: 1
- FIA:
- FIA_PMG_EXT.1: 11
- FIA_PMG_EXT.1.1: 2
- FIA_PSK_EXT.1: 1
- FIA_UAU: 1
- FIA_UAU.1: 3
- FIA_UAU.7: 5
- FIA_UAU.7.1: 1
- FIA_UAU_EXT.2: 11
- FIA_UAU_EXT.2.1: 2
- FIA_UIA_EXT.1: 17
- FIA_UIA_EXT.1.1: 2
- FIA_UIA_EXT.1.2: 2
- FIA_UID.1: 5
- FMT:
- FMT_MTD.1: 5
- FMT_MTD.1.1: 1
- FMT_SMF.1: 7
- FMT_SMF.1.1: 1
- FMT_SMR.1: 2
- FMT_SMR.2: 5
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT.1: 9
- FPT_APW_EXT.1.1: 4
- FPT_APW_EXT.1.2: 2
- FPT_SKP_EXT.1: 11
- FPT_SKP_EXT.1.1: 2
- FPT_SSP.1: 1
- FPT_SSP.2: 1
- FPT_STM.1: 7
- FPT_STM.1.1: 1
- FPT_TRP.1: 1
- FPT_TST.1: 1
- FPT_TST_EXT.1: 11
- FPT_TST_EXT.1.1: 2
- FPT_TUD_EXT.1: 11
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 2
- FTA:
- FTA_EXT_SSL.1: 1
- FTA_SSL: 1
- FTA_SSL.3: 5
- FTA_SSL.3.1: 1
- FTA_SSL.4: 4
- FTA_SSL.4.1: 1
- FTA_SSL_EXT.1: 9
- FTA_SSL_EXT.1.1: 3
- FTA_SSL_EXT.4: 1
- FTA_TAB.1: 7
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC.1: 8
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 4
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FCO:
- FCS:
- FCS_CKM: 2
- FCS_CKM.1: 21
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.3: 1
- FCS_CKM.4: 15
- FCS_CKM.4.1: 1
- FCS_COP: 1
- FCS_COP.1: 15
- FCS_COP.1.1: 1
- FCS_RND: 5
- FCS_RND.1: 12
- FCS_RND.1.1: 2
- FDP:
- FDP_ACC: 65
- FDP_ACC.1: 15
- FDP_ACF: 55
- FDP_ACF.1: 20
- FDP_DAU: 11
- FDP_DAU.2: 2
- FDP_IFC: 2
- FDP_IFC.1: 7
- FDP_IFF: 2
- FDP_ITC: 13
- FDP_ITC.1: 5
- FDP_ITC.2: 2
- FDP_RIP: 8
- FDP_RIP.1: 12
- FDP_RIP.1.1: 1
- FDP_ROL: 1
- FDP_SDI: 24
- FDP_SDI.2: 5
- FDP_UCT: 17
- FDP_UCT.1: 1
- FDP_UIT: 12
- FDP_UIT.1: 2
- FIA:
- FIA_AFL.1: 10
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_API: 5
- FIA_API.1: 12
- FIA_API.1.1: 2
- FIA_ATD: 1
- FIA_UAU.1: 23
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID: 2
- FIA_UID.1: 21
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB: 1
- FMT:
- FMT_MOF.1: 12
- FMT_MOF.1.1: 1
- FMT_MSA: 37
- FMT_MSA.1: 4
- FMT_MSA.2: 14
- FMT_MSA.2.1: 1
- FMT_MSA.3: 24
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MSA.4: 16
- FMT_MSA.4.1: 1
- FMT_MTD: 26
- FMT_MTD.1: 2
- FMT_SMF: 2
- FMT_SMF.1: 24
- FMT_SMF.1.1: 1
- FMT_SMR: 3
- FMT_SMR.1: 27
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPT:
- FPT_EMS: 5
- FPT_EMS.1: 15
- FPT_EMS.1.1: 4
- FPT_EMS.1.2: 3
- FPT_FLS: 3
- FPT_FLS.1: 13
- FPT_FLS.1.1: 1
- FPT_PHP: 1
- FPT_PHP.1: 9
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 13
- FPT_PHP.3.1: 1
- FPT_RCV: 3
- FPT_TDC.1: 1
- FPT_TST: 1
- FPT_TST.1: 15
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 65
- FTP_ITC.1: 14
- FTP_TRP.1: 2
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.NO_GENERAL_PURPOSE: 1
- A.PHYSICAL: 1
- A.TRUSTED_ADMIN: 1
- O:
- O.DISPLAY_BANNER: 1
- O.PROTECTED_COMMUNICATIONS: 1
- O.RESIDUAL_INFORMATION_CLEARING: 1
- O.SESSION_LOCK: 1
- O.SYSTEM_MONITORING: 1
- O.TOE_ADMINISTRATION: 1
- O.TSF_SELF_TEST: 1
- O.VERIFIABLE_UPDATES: 1
- OE:
- OE.NO_GENERAL_PURPOSE: 1
- OE.PHYSICAL: 1
- OE.TRUSTED_ADMIN: 1
- T:
- T.ADMIN_ERROR: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
- T.UNDETECTED_ACTIONS: 1
- T.USER_DATA_REUSE: 1
|
- A:
- A.APPLET: 1
- A.CGA: 6
- A.CSP: 9
- A.PRODUCTION: 1
- A.SCA: 5
- A.VERIFICATION: 1
- D:
- O:
- O.ALARM: 1
- O.BIO-MNGT: 1
- O.CARD-MANAGEMENT: 1
- O.CIPHER: 1
- O.DELETION: 1
- O.FIREWALL: 1
- O.GLOBAL_ARRAYS_CONFID: 1
- O.GLOBAL_ARRAYS_INTEG: 1
- O.INSTALL: 1
- O.KEY-MNGT: 1
- O.LOAD: 1
- O.NATIVE: 1
- O.OBJ-DELETION: 1
- O.OPERATE: 1
- O.PIN-MNGT: 1
- O.REALLOCATION: 1
- O.RESOURCES: 1
- O.SCP: 3
- O.SID: 1
- O.TRANSACTION: 1
- OE:
- OE.APPLET: 1
- OE.CODE-EVIDENCE: 1
- OE.HID_VAD: 5
- OE.HI_VAD: 2
- OE.KEY_GENERATION: 1
- OE.PRODUCTION: 1
- OE.QUOTAS: 1
- OE.SECURITY-DOMAINS: 1
- OE.SHARE-CONTROL: 1
- OE.VERIFICATION: 1
- OSP:
- OSP.KEY_GENERATION: 1
- OSP.QUOTAS: 1
- OSP.SECURITY_DOMAINS: 1
- OSP.SHARE-CONTROL: 1
- OSP.VERIFICATION: 1
- T:
- T.APP_DATA_INTEGRITY: 1
- T.CONFID-APPLI-DATA: 1
- T.CONFID-JCS-CODE: 1
- T.CONFID-JCS-DATA: 1
- T.DELETION: 1
- T.EXE-CODE: 2
- T.INSTALL: 1
- T.INTEG-APPLI-CODE: 2
- T.INTEG-APPLI-DATA: 2
- T.INTEG-JCS-CODE: 1
- T.INTEG-JCS-DATA: 1
- T.LIFE_CYCLE: 1
- T.NATIVE: 1
- T.OBJ-DELETION: 1
- T.PHYSICAL: 1
- T.RESOURCES: 1
- T.SID: 2
- T.UNAUTH_ACCESS: 1
- T.UNAUTH_CARD_MNGT: 1
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
- AES_competition:
- DES:
- constructions:
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-2: 5
- SHA-256: 5
- SHA-512: 3
- SHA256: 2
|
- SHA:
- SHA1:
- SHA2:
- SHA-2: 1
- SHA-224: 2
- SHA-256: 7
- SHA-384: 3
- SHA-512: 6
|
| pdf_data/st_keywords/crypto_scheme |
- KEX:
- Key Exchange: 2
- Key exchange: 1
- MAC:
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 6
- P-384: 4
- P-521: 4
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- fault injection: 1
- malfunction: 1
- physical tampering: 7
- SCA:
- DPA: 3
- SPA: 3
- physical probing: 2
- side channel: 1
- timing attacks: 2
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- FIPS:
- FIPS PUB 186-3: 3
- FIPS PUB 197: 1
- FIPS140: 1
- FIPS197: 1
- NIST:
- NIST SP 800-38A: 1
- NIST SP 800-38D: 1
- RFC:
- RFC 4251: 2
- RFC 4252: 1
- RFC 4253: 3
- RFC 4254: 1
- RFC 4741: 1
- RFC 6668: 1
- RFC4251: 1
- RFC4252: 1
- RFC4253: 3
- RFC4254: 1
- RFC5656: 3
- RFC6668: 2
|
- BSI:
- AIS 20: 1
- AIS20: 1
- AIS31: 2
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
- FIPS:
- ICAO:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 15408:2005: 2
- ISO/IEC 7816-4: 1
- ISO/IEC 9797-: 1
- ISO/IEC 9797-1: 2
- NIST:
- PKCS:
- PKCS#1: 3
- PKCS1: 3
- PKCS3: 1
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
- OutOfScope:
- SSH). Telnet, File Transfer Protocol (FTP), Secure Socket Layer (SSL) are out of scope. Security Management (FMT: 1
- i.e. it is not bound to port 80). Although use of this application is out of scope of the evaluation, the daemon supporting the service cannot be disabled: 1
- including Secure Shell (SSH). Telnet, File Transfer Protocol (FTP), Secure Socket Layer (SSL) are out of scope. Security Management (FMT) The TOE provides an Authorized Administrator role that is responsible: 1
- out of scope: 2
- the HTTP traffic arrives (i.e. it is not bound to port 80). Although use of this application is out of scope of the evaluation, the daemon supporting the service cannot be disabled. This service can only: 1
|
- OutOfScope:
- only EC is used to generate keys, the RSA key generation is out of scope of the platform evaluation: 1
- out of scope: 2
- pre- personalization phase. Beside the TOE, the product can include other Java Card applications (out of scope of the TOE). IDealCitiz v2.1.1 Platform enforces separation of the data between the applets and: 1
- v2.1.1 mechanisms FCS_CKM.1 FCS_CKM.1 (only EC is used to generate keys, the RSA key generation is out of scope of the platform evaluation) The requirement in this ST is equiva- lent to parts of the platform ST: 1
|
| pdf_data/st_metadata |
- /Author: Denise Cater
- /CreationDate: D:20151210100045Z
- /Creator: Microsoft® Word 2010
- /ModDate: D:20151228141543-05'00'
- /Producer: Microsoft® Word 2010
- /Subject: Junos OS 13.3R1.8, Junos OS 13.2X50-D19 and Junos OS 13.2X51-D20
- /Title: Security Target
- pdf_file_size_bytes: 1384363
- pdf_hyperlinks: http://www.juniper.net/
- pdf_is_encrypted: False
- pdf_number_of_pages: 64
|
- /CreationDate: D:20171013152111+02'00'
- /Creator: Microsoft® Word 2013
- /ModDate: D:20180713145229+02'00'
- /Producer: Microsoft® Word 2013
- pdf_file_size_bytes: 2578944
- pdf_hyperlinks: file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok134, file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok119, file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok232, file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok152, file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok122, file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok121, file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok149, file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok115, file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok116, file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok131, file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok236, file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok147, file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok141, file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok123, file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok160, file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok114, file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok138, file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok162, file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok136, file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok155, file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok164, file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok170, file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok146, file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok148, file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok124, file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok117, file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok169, file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok128, file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok167, file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok132, file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok157, file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok234, file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok113, file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok130, file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok127, file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok120, file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok154, file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok231, file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok144, file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok135, file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok125, file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok126, file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok233, file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok140, file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok156, file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok137, file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok235
- pdf_is_encrypted: False
- pdf_number_of_pages: 124
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
True |
False |
| state/cert/download_ok |
True |
False |
| state/cert/extract_ok |
True |
False |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |