name |
OPPO Find X5 Pro, including ColorOS 12.1, and Qualcomm Snapdragon® 8 Gen 1 Mobile Platform |
ZEMO VML-GK2, V.3.1.0 FW-Version 3.1.0, HW-Version 2.0.0 |
category |
Mobility |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
SE |
DE |
status |
active |
archived |
not_valid_after |
31.03.2027 |
28.06.2023 |
not_valid_before |
31.03.2022 |
28.06.2018 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Signed-CCRA-Certificate%20OPPO%20Find%20X5%20Pro.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0623V2c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20-%20OPPO%20Find%20X5%20Pro.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0623V2a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/OPPO%20Find%20X5%20Pro%20on%20ColorOS%2012.1%20Security%20Target.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0623V2b_pdf.pdf |
manufacturer |
Guangdong OPPO Mobile Telecommunications Corp., Ltd |
ZEMO GmbH |
manufacturer_web |
https://www.oppo.com/en/ |
https://zemo.de |
security_level |
{} |
EAL3+, AVA_VAN.5, ADV_TDS.3, ADV_IMP.1, ALC_TAT.1, ADV_FSP.4 |
dgst |
95ee9573a6851af4 |
05e617901b9f2ac8 |
heuristics/cert_id |
CSEC2021007 |
BSI-DSZ-CC-0623-V2-2018 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
AGD_OPE.1, ASE_SPD.1, ADV_FSP.1, ASE_REQ.1, ASE_OBJ.1, AVA_VAN.1, ASE_ECD.1, ASE_CCL.1, AGD_PRE.1, ALC_CMS.1, ALC_TSU_EXT.1, ALC_CMC.1, ASE_INT.1, ASE_TSS.1, ATE_IND.1 |
ADV_IMP.1, AGD_OPE.1, ALC_CMS.3, ATE_COV.2, AVA_VAN.5, ALC_DEL.1, ADV_ARC.1, ALC_CMC.3, ATE_DPT.1, ADV_FSP.4, ALC_DVS.1, ALC_TAT.1, ATE_IND.2, AGD_PRE.1, ADV_TDS.3, ALC_LCD.1, ATE_FUN.1 |
heuristics/extracted_versions |
12.1 |
3.1.0, 2.0.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
c40ae795865a0dba, c88af12926be2779, 83014eb399a802f3, 731bdcc989507942 |
854be21fba7a106c |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_wlan_cli_ep_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_BT_V1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PKG_TLS_V1.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_MDF_V3.2.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0052b_pdf.pdf |
pdf_data/cert_filename |
Signed-CCRA-Certificate OPPO Find X5 Pro.pdf |
0623V2c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0623-V2-2018: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 3: 1
- EAL 3 augmented: 1
- EAL 4: 1
|
pdf_data/cert_keywords/cc_sar |
- ALC:
- ALC_FLR: 1
- ALC_TSU_EXT.1: 1
- ASE:
|
- ADV:
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- ALC:
- AVA:
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20220404080932+02'00'
- /Creator: RICOH MP C4504ex
- /ModDate: D:20220404083958+02'00'
- /Producer: RICOH MP C4504ex
- pdf_file_size_bytes: 1623099
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20180702105442+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, Mobile Card Terminal, MobCT"
- /ModDate: D:20180710144522+02'00'
- /Producer: LibreOffice 5.2
- /Subject: ZEMO VML-GK2, FW-Version 3.1.0, HW-Version 2.0.0, ZEMO GmbH
- /Title: Certification Report BSI-DSZ-CC-0623-V2-2018
- pdf_file_size_bytes: 900741
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
Certification Report - OPPO Find X5 Pro.pdf |
0623V2a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 3 augmented by ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ALC_TAT.1, and AVA_VAN.5
- cc_version: PP conformant Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-0623-V2-2018
- cert_item: ZEMO VML-GK2, FW-Version 3.1.0, HW-Version 2.0.0
- cert_lab: BSI
- developer: ZEMO GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Common Criteria Protection Profile Mobile Card Terminal for the German Healthcare System (MobCT), Version 1.4, BSI-CC-PP-0052-2015, 19 January 2015
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0623-V2-2018: 14
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0052-2015: 1
- BSI-CC-PP-0052-2015: 3
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 3
- EAL 1 augmented: 1
|
- EAL:
- EAL 1: 1
- EAL 2: 3
- EAL 3: 4
- EAL 3 augmented: 3
- EAL 4: 4
- EAL 5+: 1
- EAL 6: 1
- EAL3+: 2
|
pdf_data/report_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ALC_TSU_EXT.1: 4
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 4
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ADV:
- ADV_FSP.4: 4
- ADV_IMP.1: 4
- ADV_TDS.3: 4
- ALC:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.CONFIG: 1
- A.NOTIFY: 1
- A.NO_TOE_BYPASS: 1
- A.PRECAUTION: 1
- A.PROPER_USER: 1
- A.TRUSTED_ADMIN: 1
- T:
- T.MALICIOUS_APP: 1
- T.NETWORK_ATTACK: 1
- T.NETWORK_EAVESDROP: 1
- T.PERSISTENT_PRESENCE: 1
- T.PHYSICAL_ACCESS: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED: 1
- T.UNDETECTED_ACTIONS: 1
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7148: 1
- BSI TR-02102: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- FIPS:
- ISO:
- X509:
|
- BSI:
- FIPS:
- FIPS 180-4: 2
- FIPS 197: 1
- FIPS PUB 180-4: 1
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- NIST:
- PKCS:
- X509:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- OutOfScope:
- access to its storage media. Note: Defending against device re-use after physical compromise is out of scope for this Protection Profile. T.MALICIOUS_APP (MDFPP) Applications loaded onto the Mobile Device may: 1
- out of scope: 1
|
- ConfidentialDocument:
- 19 January 2015 [9] Configuration list for the TOE, 18.04.2018, Konfigurationsliste (confidential document) [10] Guidance documentation for the TOE, Version 1.1.4, 18.04.2018, Bedienungsanleitung: 1
- Report, Version 1.0 10.06.2018, Evaluation Technical Report – Summary, datenschutz cert GmbH, (confidential document) [8] Common Criteria Protection Profile Mobile Card Terminal for the German Healthcare System: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
|
pdf_data/report_metadata |
- /Author: Jerry Johansson
- /CreationDate: D:20220329111443+02'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20220331141336+02'00'
- /Producer: Microsoft® Word 2016
- /Subject: 21FMV6272-30:1
- /Title: Certification Report - OPPO Find X5 Pro
- pdf_file_size_bytes: 504386
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 18
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20180705154336+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, Mobile Card Terminal, MobCT"
- /ModDate: D:20180710142720+02'00'
- /Producer: LibreOffice 5.2
- /Subject: ZEMO VML-GK2, FW-Version 3.1.0, HW-Version 2.0.0, ZEMO GmbH
- /Title: Certification Report BSI-DSZ-CC-0623-V2-2018
- pdf_file_size_bytes: 1240729
- pdf_hyperlinks: http://www.commoncriteriaportal.org/, http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/AIS, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, http://www.sogisportal.eu/, https://www.bsi.bund.de/, https://zemo.de/vmlgk-downloads/
- pdf_is_encrypted: False
- pdf_number_of_pages: 26
|
pdf_data/st_filename |
OPPO Find X5 Pro on ColorOS 12.1 Security Target.pdf |
0623V2b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0032: 1
- BSI-CC-PP-0052: 2
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 1: 2
- EAL 1 augmented: 1
|
- EAL:
- EAL 3: 4
- EAL 3 augmented: 3
- EAL3+: 2
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 10
- AGD_PRE: 1
- AGD_PRE.1: 6
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 4
- ALC_CMS: 1
- ALC_CMS.1: 5
- ALC_TSU_EXT: 3
- ALC_TSU_EXT.1: 8
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 5
- ADV_IMP.1: 5
- ADV_TDS.3: 5
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 5
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 7
- FAU_GEN.1: 6
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_STG: 2
- FAU_STG.1: 4
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.4: 4
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM: 22
- FCS_CKM.1: 9
- FCS_CKM.1.1: 1
- FCS_CKM.2: 5
- FCS_CKM_EXT: 7
- FCS_CKM_EXT.1: 5
- FCS_CKM_EXT.1.1: 1
- FCS_CKM_EXT.1.2: 1
- FCS_CKM_EXT.1.3: 1
- FCS_CKM_EXT.2: 5
- FCS_CKM_EXT.2.1: 1
- FCS_CKM_EXT.3: 6
- FCS_CKM_EXT.3.1: 1
- FCS_CKM_EXT.3.2: 1
- FCS_CKM_EXT.4: 7
- FCS_CKM_EXT.4.1: 2
- FCS_CKM_EXT.4.2: 1
- FCS_CKM_EXT.5: 5
- FCS_CKM_EXT.5.1: 1
- FCS_CKM_EXT.5.2: 1
- FCS_CKM_EXT.6: 5
- FCS_CKM_EXT.6.1: 1
- FCS_CKM_EXT.8: 7
- FCS_CKM_EXT.8.1: 1
- FCS_COP: 41
- FCS_COP.1: 7
- FCS_RBG_EXT: 1
- FCS_RBG_EXT.1: 13
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FCS_RBG_EXT.1.3: 1
- FCS_SMF_EXT.1: 1
- FCS_SRV_EXT: 1
- FCS_SRV_EXT.1: 5
- FCS_SRV_EXT.1.1: 1
- FCS_STG_EXT: 3
- FCS_STG_EXT.1: 5
- FCS_STG_EXT.1.1: 1
- FCS_STG_EXT.1.2: 1
- FCS_STG_EXT.1.3: 1
- FCS_STG_EXT.1.4: 1
- FCS_STG_EXT.1.5: 1
- FCS_STG_EXT.2: 7
- FCS_STG_EXT.2.1: 2
- FCS_STG_EXT.2.2: 1
- FCS_STG_EXT.3: 5
- FCS_STG_EXT.3.1: 1
- FCS_STG_EXT.3.2: 1
- FCS_TLSC_EXT: 12
- FCS_TLSC_EXT.1: 11
- FCS_TLSC_EXT.1.1: 2
- FCS_TLSC_EXT.1.2: 2
- FCS_TLSC_EXT.1.3: 2
- FCS_TLSC_EXT.2: 4
- FCS_TLSC_EXT.2.1: 1
- FCS_TLSC_EXT.4: 3
- FCS_TLSC_EXT.4.1: 1
- FCS_TLSC_EXT.5: 3
- FCS_TLSC_EXT.5.1: 1
- FCS_TLS_EXT: 1
- FCS_TLS_EXT.1: 3
- FCS_TLS_EXT.1.1: 1
- FDP:
- FDP_ACF_EXT: 2
- FDP_ACF_EXT.1: 3
- FDP_ACF_EXT.1.1: 1
- FDP_ACF_EXT.1.2: 1
- FDP_ACF_EXT.2: 3
- FDP_ACF_EXT.2.1: 1
- FDP_DAR_EXT: 2
- FDP_DAR_EXT.1: 5
- FDP_DAR_EXT.1.1: 1
- FDP_DAR_EXT.1.2: 1
- FDP_DAR_EXT.2: 5
- FDP_DAR_EXT.2.1: 1
- FDP_DAR_EXT.2.2: 1
- FDP_DAR_EXT.2.3: 1
- FDP_DAR_EXT.2.4: 1
- FDP_IFC_EXT: 1
- FDP_IFC_EXT.1: 6
- FDP_IFC_EXT.1.1: 1
- FDP_PBA_EXT: 3
- FDP_PBA_EXT.1: 1
- FDP_PBA_EXT.1.1: 1
- FDP_STG_EXT: 1
- FDP_STG_EXT.1: 5
- FDP_STG_EXT.1.1: 1
- FDP_UPC_EXT: 4
- FDP_UPC_EXT.1: 2
- FIA:
- FIA_AFL_EXT: 1
- FIA_AFL_EXT.1: 4
- FIA_AFL_EXT.1.1: 1
- FIA_AFL_EXT.1.2: 1
- FIA_AFL_EXT.1.3: 1
- FIA_AFL_EXT.1.4: 1
- FIA_AFL_EXT.1.5: 1
- FIA_AFL_EXT.1.6: 1
- FIA_BLT_EXT: 6
- FIA_BLT_EXT.1: 5
- FIA_BLT_EXT.1.1: 1
- FIA_BLT_EXT.2: 5
- FIA_BLT_EXT.2.1: 1
- FIA_BLT_EXT.3: 3
- FIA_BLT_EXT.3.1: 1
- FIA_BLT_EXT.4: 5
- FIA_BLT_EXT.4.1: 1
- FIA_BLT_EXT.4.2: 1
- FIA_BLT_EXT.6: 5
- FIA_BLT_EXT.6.1: 1
- FIA_BLT_EXT.7: 5
- FIA_BLT_EXT.7.1: 1
- FIA_BMG_EXT: 8
- FIA_BMG_EXT.1: 5
- FIA_PAE_EXT: 1
- FIA_PAE_EXT.1: 5
- FIA_PAE_EXT.1.1: 1
- FIA_PMG_EXT: 1
- FIA_PMG_EXT.1: 8
- FIA_PMG_EXT.1.1: 1
- FIA_TRT_EXT: 1
- FIA_TRT_EXT.1: 5
- FIA_TRT_EXT.1.1: 1
- FIA_UAU: 3
- FIA_UAU.5: 4
- FIA_UAU.5.1: 3
- FIA_UAU.5.2: 1
- FIA_UAU.6: 2
- FIA_UAU.6.1: 1
- FIA_UAU.6.2: 1
- FIA_UAU.7: 4
- FIA_UAU.7.1: 1
- FIA_UAU_EXT: 2
- FIA_UAU_EXT.1: 5
- FIA_UAU_EXT.1.1: 1
- FIA_UAU_EXT.2: 3
- FIA_UAU_EXT.2.1: 4
- FIA_UAU_EXT.2.2: 1
- FMT:
- FMT_MOF_EXT: 1
- FMT_MOF_EXT.1: 6
- FMT_MOF_EXT.1.1: 1
- FMT_MOF_EXT.1.2: 1
- FMT_SMF_EXT: 10
- FMT_SMF_EXT.1: 8
- FMT_SMF_EXT.1.1: 1
- FMT_SMF_EXT.2: 3
- FMT_SMF_EXT.2.1: 1
- FPT:
- FPT_AEX_EXT: 4
- FPT_AEX_EXT.1: 5
- FPT_AEX_EXT.1.1: 1
- FPT_AEX_EXT.1.2: 1
- FPT_AEX_EXT.2: 5
- FPT_AEX_EXT.2.1: 1
- FPT_AEX_EXT.3: 5
- FPT_AEX_EXT.3.1: 1
- FPT_AEX_EXT.4: 3
- FPT_AEX_EXT.4.1: 1
- FPT_AEX_EXT.4.2: 1
- FPT_JTA_EXT: 1
- FPT_JTA_EXT.1: 5
- FPT_JTA_EXT.1.1: 1
- FPT_KST_EXT: 3
- FPT_KST_EXT.1: 5
- FPT_KST_EXT.1.1: 1
- FPT_KST_EXT.2: 5
- FPT_KST_EXT.2.1: 1
- FPT_KST_EXT.3: 5
- FPT_KST_EXT.3.1: 1
- FPT_NOT_EXT: 1
- FPT_NOT_EXT.1: 5
- FPT_NOT_EXT.1.1: 1
- FPT_STM: 1
- FPT_STM.1: 4
- FPT_STM.1.1: 1
- FPT_TST_EXT: 13
- FPT_TST_EXT.1: 9
- FPT_TST_EXT.1.1: 1
- FPT_TST_EXT.2: 1
- FPT_TUD_EXT: 3
- FPT_TUD_EXT.1: 6
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FPT_TUD_EXT.2: 3
- FPT_TUD_EXT.2.1: 1
- FPT_TUD_EXT.2.2: 1
- FPT_TUD_EXT.2.3: 1
- FPT_TUD_EXT.3: 3
- FPT_TUD_EXT.3.1: 1
- FTA:
- FTA_SSL_EXT: 1
- FTA_SSL_EXT.1: 5
- FTA_SSL_EXT.1.1: 1
- FTA_SSL_EXT.1.2: 1
- FTA_SSL_EXT.1.3: 1
- FTA_WSE_EXT: 1
- FTA_WSE_EXT.1: 4
- FTA_WSE_EXT.1.1: 1
- FTP:
- FTP_BLT_EXT: 12
- FTP_BLT_EXT.1: 5
- FTP_BLT_EXT.1.1: 1
- FTP_BLT_EXT.1.2: 1
- FTP_BLT_EXT.2: 5
- FTP_BLT_EXT.2.1: 1
- FTP_BLT_EXT.3: 3
- FTP_ITC_EXT: 7
- FTP_ITC_EXT.1: 5
- FTP_ITC_EXT.1.1: 1
- FTP_ITC_EXT.1.2: 1
- FTP_ITC_EXT.1.3: 1
|
- FCS:
- FCS_CKM.1: 23
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 22
- FCS_CKM.4.1: 1
- FCS_COP: 31
- FCS_COP.1: 6
- FDP:
- FDP_ACC.1: 30
- FDP_ACC.1.1: 1
- FDP_ACF.1: 26
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 5
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 6
- FDP_IFC: 35
- FDP_IFC.1: 10
- FDP_IFF: 37
- FDP_IFF.1: 19
- FDP_ITC.1: 21
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 9
- FDP_RIP: 15
- FDP_RIP.1: 2
- FDP_SDI.1: 1
- FDP_SDI.2: 9
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_SVR: 2
- FDP_SVR.1: 12
- FDP_SVR.1.1: 5
- FDP_SVR.1.2: 3
- FDP_SVR.1.3: 3
- FIA:
- FIA_AFL.1: 10
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 1
- FIA_SOS.1: 8
- FIA_SOS.1.1: 1
- FIA_UAU.1: 15
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.5: 11
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.7: 10
- FIA_UAU.7.1: 2
- FIA_UID.1: 19
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MSA.1: 12
- FMT_MSA.1.1: 1
- FMT_MSA.3: 24
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 11
- FMT_MTD.1.1: 1
- FMT_MTD.3: 8
- FMT_MTD.3.1: 1
- FMT_SMF.1: 14
- FMT_SMF.1.1: 1
- FMT_SMR.1: 20
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_PHP.1: 7
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_STM.1: 12
- FPT_STM.1.1: 1
- FPT_TST.1: 7
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTA:
- FTA_SSL.3: 10
- FTA_SSL.3.1: 2
- FTA_SSL.4: 10
- FTA_SSL.4.1: 1
- FTP:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.CONFIG: 1
- A.NOTIFY: 1
- A.NO_TOE_BYPASS: 1
- A.PRECAUTION: 1
- A.PROPER_USER: 1
- A.TRUSTED_ADMIN: 1
- O:
- O.AUTH: 1
- O.AUTH_COMM: 1
- O.CONFIG: 1
- O.CRYPTOGRAPHIC_FUNCTIONS: 1
- O.INTEGRITY: 1
- O.PRIVACY: 1
- O.PROTECTED_COMMS: 1
- O.STORAGE: 1
- O.SYSTEM_MONITORING: 1
- O.TOE_ADMINISTRATION: 1
- O.TSF_SELF_TEST: 1
- O.WIRELESS_ACCESS_POINT_CONNECTION: 1
- OE:
- OE.CONFIG: 1
- OE.DATA_PROPER_USER: 1
- OE.NOTIFY: 1
- OE.NO_TOE_BYPASS: 1
- OE.PRECAUTION: 1
- OE.TRUSTED_ADMIN: 1
- T:
- T.EAVESDROP: 1
- T.FLAWAPP: 2
- T.MALICIOUS_APP: 1
- T.NETWORK: 1
- T.NETWORK_ATTACK: 1
- T.NETWORK_EAVESDROP: 1
- T.PERSISTENT: 2
- T.PERSISTENT_PRESENCE: 1
- T.PHYSICAL: 2
- T.PHYSICAL_ACCESS: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED: 1
- T.UNDETECTED_ACTIONS: 1
|
- A:
- A.ADMIN: 3
- A.CARDS: 4
- A.DMS: 3
- A.ENVIRONMENT: 3
- A.MEDIC: 3
- A.PHYSICAL: 3
- O:
- O.AUTH_STATE: 8
- O.DMS_CONNECT: 1
- O.DMS_CONNECTION: 4
- O.LOG_CARDS: 3
- O.LOG_DATA: 5
- O.MANAGEMENT: 8
- O.PIN: 6
- O.PROTECTION: 8
- O.RESIDUAL: 6
- O.SEALING: 3
- O.SELFTESTS: 5
- O.TIME: 5
- O.TRANSFER: 3
- OE:
- OE.ADMIN: 9
- OE.CARDS: 7
- OE.DEVELOPER: 1
- OE.DMS: 4
- OE.ENVIRONMENT: 6
- OE.MEDIC: 9
- OE.PHYSICAL: 5
- OSP:
- OSP.DMS_CONN: 1
- OSP.DMS_CONNE: 1
- OSP.DMS_CONNECTION: 1
- OSP.EMERGENC: 1
- OSP.EMERGENCY_: 1
- OSP.EMERGENCY_DATA: 1
- OSP.LOG_CARD: 1
- OSP.LOG_CARDS: 1
- OSP.LOG_DATA: 3
- OSP.SEALING: 3
- OSP.SELFTESTS: 3
- OSP.TIME: 3
- OSP.TRANSFER: 3
- T:
- T.ACCESS: 3
- T.ADMIN_PIN: 3
- T.AUTH_STATE: 3
- T.DATA: 3
- T.FIRMWARE: 3
- T.MAN_HW: 3
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 28
- AES-: 1
- AES-128: 1
- AES-256: 16
- constructions:
- MAC:
- HMAC: 5
- HMAC-SHA-256: 6
- HMAC-SHA-384: 4
- HMAC-SHA-512: 4
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-256: 10
- SHA-384: 5
- SHA-512: 2
- SHA384: 1
- SHA512: 2
- scrypt:
|
|
pdf_data/st_keywords/crypto_scheme |
- KEX:
- Key Exchange: 1
- Key exchange: 3
- MAC:
|
|
pdf_data/st_keywords/crypto_protocol |
- IPsec:
- TLS:
- DTLS:
- SSL:
- TLS:
- TLS: 63
- TLS 1.0: 1
- TLS 1.1: 2
- TLS 1.2: 2
- VPN:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 8
- P-384: 8
- secp256r1: 4
- secp384r1: 4
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 3
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 3
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 3
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 3
- TLS_RSA_WITH_AES_128_GCM_SHA256: 2
- TLS_RSA_WITH_AES_256_CBC_SHA: 2
- TLS_RSA_WITH_AES_256_GCM_SHA384: 3
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140-2: 1
- FIPS 180-4: 4
- FIPS 186-4: 3
- FIPS 197: 4
- FIPS 198-1: 3
- FIPS PUB 186-4: 4
- FIPS PUB 197: 2
- FIPS186-4: 1
- FIPS198-1: 1
- NIST:
- NIST SP 800-38A: 1
- NIST SP 800-38C: 1
- NIST SP 800-38D: 1
- NIST SP 800-38E: 1
- NIST SP 800-38F: 1
- NIST SP 800-57: 1
- SP 186-4: 1
- SP 800-108: 2
- SP 800-38E: 1
- SP 800-90A: 1
- RFC:
- RFC 2246: 1
- RFC 2818: 2
- RFC 3394: 2
- RFC 4346: 2
- RFC 5216: 1
- RFC 5246: 4
- RFC 5280: 3
- RFC 5288: 5
- RFC 5289: 12
- RFC 5746: 2
- RFC 6125: 1
- RFC 6960: 1
- X509:
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
- com:
- com.coloros.ocs.opencapabilityservice: 1
- java:
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- access to its storage media. Note: Defending against device re-use after physical compromise is out of scope for this Protection Profile. T.MALICIOUS_APP (MDFPP32) Applications loaded onto the Mobile Device: 1
- out of scope: 1
|
- OutOfScope:
- done by an authorised card that is out of scope of this ST: 1
- out of scope: 1
- the TOE • Signature generation for emergency data1 on the eHC (done by an authorised card that is out of scope of this ST) 1.4.6 Physical Protection of the TOE The TOE cannot counter physical attacks concerning: 1
|
pdf_data/st_metadata |
|
- /CreationDate: D:20180604110207+02'00'
- /Creator: Writer
- /Producer: LibreOffice 5.4
- /Subject: ZEMO VML-GK2 CC 3.1-Evaluierung
- /Title: ZEMO VML-GK2 ORS.1/OPB.1 Security Target
- pdf_file_size_bytes: 2621577
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 76
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |