Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Tripp Lite B002a Secure KVM Switch Series
CCEVS-VR-11062-2020
Java Card Platform Implementation for Infineon on M7892 G12 (SLJ 52GxxyyyzC) V2.0
BSI-DSZ-CC-0869-V2-2019
name Tripp Lite B002a Secure KVM Switch Series Java Card Platform Implementation for Infineon on M7892 G12 (SLJ 52GxxyyyzC) V2.0
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme US DE
not_valid_after 09.07.2022 13.06.2024
not_valid_before 09.07.2020 13.06.2019
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_VID11062-ci.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0869V2c_pdf.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_VID11062-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0869V2a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_VID11062-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0869V2b_pdf.pdf
manufacturer Tripp Lite Oracle Corporation
manufacturer_web https://www.tripplite.com https://www.oracle.com
security_level {} ALC_DVS.2, EAL5+, AVA_VAN.5
dgst 96402fa45cae4c3f 179ef93627203d9f
heuristics/cert_id CCEVS-VR-11062-2020 BSI-DSZ-CC-0869-V2-2019
heuristics/cert_lab US BSI
heuristics/extracted_sars ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, AGD_PRE.1 ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ALC_TAT.2, ADV_TDS.4, ASE_REQ.2, ASE_CCL.1
heuristics/extracted_versions - 2.0
heuristics/report_references/directly_referenced_by {} JISEC-CC-CRP-C0649-01-2019, JISEC-CC-CRP-C0648-01-2019
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0869-2015, BSI-DSZ-CC-0891-V3-2018
heuristics/report_references/indirectly_referenced_by {} JISEC-CC-CRP-C0649-01-2019, JISEC-CC-CRP-C0648-01-2019
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0891-V3-2018, BSI-DSZ-CC-0891-V2-2016, BSI-DSZ-CC-0869-2015
heuristics/scheme_data
  • category: Peripheral Switch
  • certification_date: 09.07.2020
  • evaluation_facility: Leidos Common Criteria Testing Laboratory
  • expiration_date: 09.07.2022
  • id: CCEVS-VR-VID11062
  • product: Tripp Lite B002a Secure KVM Switch Series
  • scheme: US
  • url: https://www.niap-ccevs.org/product/11062
  • vendor: Trippe Manufacturing Company
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0891-V3-2018
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0891-V2-2016, BSI-DSZ-CC-0891-V3-2018
heuristics/protection_profiles da2e45c9b3fbb700 9399bd94f9925b16
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_pss_v3.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-profil_PP-2010-03en.pdf
pdf_data/cert_filename st_VID11062-ci.pdf 0869V2c_pdf.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11062-2020: 1
  • DE:
    • BSI-DSZ-CC-0869-V2-2019: 1
  • FR:
    • ANSSI-CC-PP-2010/03-M01: 1
pdf_data/cert_keywords/cc_protection_profile_id
  • ANSSI:
    • ANSSI-CC-PP-2010/03-M01: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 5: 2
    • EAL 5 augmented: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/vendor
  • Infineon:
    • Infineon: 1
pdf_data/cert_keywords/eval_facility
  • Leidos:
    • Leidos: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • /CreationDate: D:20200715122218-04'00'
  • /ModDate: D:20200715122218-04'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 179835
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20190617091942+02'00'
  • /Creator: Writer
  • /Keywords: Common Criteria, Certification, Zertifizierung, Java Card Platform
  • /ModDate: D:20190617092113+02'00'
  • /Producer: LibreOffice 5.2
  • /Subject: Java Card Platform Implementation for Infineon on M7892 G12 (SLJ 52GxxyyyzC) V2.0
  • /Title: Certificate BSI-DSZ-CC-0869-V2-2019
  • pdf_file_size_bytes: 414291
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename st_VID11062-vr.pdf 0869V2a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • US:
    • cert_id: CCEVS-VR-11062-20209
    • cert_item: for Tripp Lite B002a Secure KVM Switch Series
    • cert_lab: US NIAP
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 5 augmented by ALC_DVS.2 and AVA_VAN.5
    • cc_version: PP conformant including optional package EMG plus product specific extensions Common Criteria Part 2 extended
    • cert_id: BSI-DSZ-CC-0869-V2-2019
    • cert_item: Java Card Platform Implementation for Infineon on M7892 G12 (SLJ 52GxxyyyzC) V2.0
    • cert_lab: BSI
    • developer: Oracle Corporation
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: Java Card Protection Profile - Open Configuration, Version 3.0, May 2012, ANSSI-CC-PP-2010/03-M01
  • US:
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0869-2015: 3
    • BSI-DSZ-CC-0869-V2-: 1
    • BSI-DSZ-CC-0869-V2-2019: 18
    • BSI-DSZ-CC-0891-V3-2018: 5
  • FR:
    • ANSSI-CC-PP-2010/03-M01: 4
pdf_data/report_keywords/cc_protection_profile_id
  • ANSSI:
    • ANSSI-CC-PP-2010/03-M01: 4
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 2
    • EAL 2+: 1
    • EAL 4: 1
    • EAL 5: 8
    • EAL 5 augmented: 3
    • EAL 5+: 1
    • EAL 6: 1
    • EAL5+: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 2
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 5
    • ALC_FLR: 2
    • ALC_LCD.1: 1
    • ALC_TAT.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 4
pdf_data/report_keywords/cc_claims
  • OE:
    • OE.VERIFICATION: 3
pdf_data/report_keywords/vendor
  • Infineon:
    • Infineon: 28
    • Infineon Technologies AG: 5
pdf_data/report_keywords/eval_facility
  • Leidos:
    • Leidos: 7
  • TUV:
    • TÜV Informationstechnik: 5
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 4
  • DES:
    • 3DES:
      • TDES: 3
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • CMAC: 1
  • miscellaneous:
    • SEED:
      • SEED: 2
pdf_data/report_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DH: 6
  • ECC:
    • ECC:
      • ECC: 2
    • ECDH:
      • ECDH: 2
    • ECDSA:
      • ECDSA: 2
  • FF:
    • DH:
      • Diffie-Hellman: 1
pdf_data/report_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 2
  • RIPEMD:
    • RIPEMD: 1
    • RIPEMD160: 1
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-2: 1
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 3
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 4
  • TRNG:
    • TRNG: 3
pdf_data/report_keywords/cipher_mode
  • CCM:
    • CCM: 1
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • fault injection: 1
    • malfunction: 1
  • SCA:
    • side-channel: 1
  • other:
    • JIL: 4
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
    • BSI TR-02102-1: 1
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 1: 1
    • AIS 20: 3
    • AIS 25: 3
    • AIS 26: 3
    • AIS 31: 3
    • AIS 32: 1
    • AIS 34: 2
    • AIS 35: 2
    • AIS 36: 7
    • AIS 37: 3
    • AIS 38: 1
    • AIS 46: 3
    • AIS20: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
  • SCP:
    • SCP01: 2
    • SCP02: 2
    • SCP03: 3
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Infineon on M7892 G12 (SLJ 52GxxyyyzC) V2.0, Version 4, 27 May 2019, TÜV Informationstechnik GmbH (confidential document) [10] Configuration List for BSI-DSZ-CC-0869-V2-2019: Configuration Management Scope for Java Card: 1
    • Infineon on M7892 G12 (SLJ 52GxxyyyzC) V2.0, Version 4, 27 May 2019, TÜV Informationstechnik GmbH (confidential document) [19] Certification Report BSI-DSZ-CC-0891-V3-2018 for Infineon Security Controller M7892 Design: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
    • firmware and optional software, Version 1, 29 November 2017, TÜV Informationstechnik GmbH (confidential document) [22] SLx 70 Family Production and Personalization User’s Manual, 1 April 2015, Infineon: 1
    • for Infineon on M7892 G12 (SLJ 52GxxyyyzC) V2.0, Version 2.6, 24 May 2019, Oracle Corporation (confidential document) [11] AGD_OPE for Java Card Platform Implementation for Infineon on M7892 G12 (SLJ 52GxxyyyzC) V2.0: 1
    • for Infineon on M7892 G12 (SLJ 52GxxyyyzC) V2.0, Version 3.6, 22 May 2019, Oracle Corporation (confidential document) [7] Security Target Lite for BSI-DSZ-CC-0869-V2-2019: Security Target Lite for Java Card Platform: 1
  • OutOfScope:
    • out of scope: 1
    • the TOE, but pre-issuance loading of applets is possible. Native code post-issuance downloading is out of scope. The Security Target [6] is the basis for this certification. The TOE fulfills the requirements of: 1
pdf_data/report_metadata
pdf_data/st_filename st_VID11062-st.pdf 0869V2b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0782-2012-MA-01: 1
    • BSI-DSZ-CC-0891-V3-2018: 2
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 1
    • BSI-PP-0017-2005: 1
    • BSI-PP-0035: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 5: 1
    • EAL 5 augmented: 1
    • EAL5: 6
    • EAL5 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 4
  • ADV:
    • ADV_ARC.1: 6
    • ADV_FSP.1: 4
    • ADV_FSP.2: 2
    • ADV_FSP.4: 2
    • ADV_FSP.5: 7
    • ADV_IMP.1: 9
    • ADV_INT.2: 1
    • ADV_TDS.1: 2
    • ADV_TDS.2: 1
    • ADV_TDS.3: 10
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 10
    • AGD_PRE: 1
    • AGD_PRE.1: 6
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.1: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 2
    • ALC_DVS.2: 6
    • ALC_LCD.1: 3
    • ALC_TAT.1: 2
    • ALC_TAT.2: 3
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 4
    • ASE_INT.1: 5
    • ASE_OBJ.2: 3
    • ASE_REQ.1: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 2
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 3
    • ATE_DPT.1: 2
    • ATE_FUN.1: 6
  • AVA:
    • AVA_VAN.5: 6
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 3
    • FAU_GEN.1.1: 2
    • FAU_GEN.1.2: 2
  • FDP:
    • FDP_ACC.1: 14
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 9
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 49
    • FDP_IFC.1.1: 2
    • FDP_IFF.1: 53
    • FDP_IFF.1.1: 2
    • FDP_IFF.1.2: 2
    • FDP_IFF.1.3: 2
    • FDP_IFF.1.4: 2
    • FDP_IFF.1.5: 2
    • FDP_RIP.1: 14
    • FDP_RIP.1.1: 5
  • FIA:
    • FIA_UAU.1: 1
    • FIA_UAU.2: 5
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 4
    • FIA_UID.2: 4
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF.1: 6
    • FMT_MOF.1.1: 2
    • FMT_MSA.3: 6
    • FMT_SMF.1: 7
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 5
    • FMT_SMR.1.1: 1
  • FPT:
    • FPT_FLS.1: 14
    • FPT_FLS.1.1: 1
    • FPT_PHP.1: 7
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 17
    • FPT_PHP.3.1: 1
    • FPT_TST.1: 18
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_ATH_EXT.1: 9
    • FTA_ATH_EXT.1.1: 2
    • FTA_ATH_EXT.2: 5
    • FTA_ATH_EXT.2.1: 1
    • FTA_CIN_EXT: 1
    • FTA_CIN_EXT.1: 7
    • FTA_CIN_EXT.1.1: 2
    • FTA_SSL.4: 1
    • FTA_TAB.1: 1
  • FAU:
    • FAU_ARP.1: 24
    • FAU_ARP.1.1: 1
    • FAU_SAA.1: 3
  • FCO:
    • FCO_NRO: 6
    • FCO_NRO.2: 6
  • FCS:
    • FCS_CKM: 4
    • FCS_CKM.1: 25
    • FCS_CKM.2: 13
    • FCS_CKM.2.1: 1
    • FCS_CKM.3: 9
    • FCS_CKM.3.1: 1
    • FCS_CKM.4: 18
    • FCS_CKM.4.1: 1
    • FCS_COP: 23
    • FCS_COP.1: 56
    • FCS_RNG: 4
    • FCS_RNG.1: 15
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC: 40
    • FDP_ACC.1: 17
    • FDP_ACC.2: 5
    • FDP_ACF: 38
    • FDP_ACF.1: 24
    • FDP_IFC: 24
    • FDP_IFC.1: 14
    • FDP_IFC.2: 2
    • FDP_IFF: 18
    • FDP_IFF.1: 17
    • FDP_ITC: 12
    • FDP_ITC.1: 4
    • FDP_ITC.2: 13
    • FDP_ITT.1: 1
    • FDP_RIP: 135
    • FDP_RIP.1: 11
    • FDP_ROL: 16
    • FDP_ROL.1: 5
    • FDP_SDI.1: 1
    • FDP_SDI.2: 13
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UIT: 6
    • FDP_UIT.1: 2
  • FIA:
    • FIA_ATD: 9
    • FIA_ATD.1: 2
    • FIA_UID: 22
    • FIA_UID.1: 12
    • FIA_UID.2: 1
    • FIA_USB: 6
    • FIA_USB.1: 3
  • FMT:
    • FMT_MSA: 133
    • FMT_MSA.1: 14
    • FMT_MSA.2: 2
    • FMT_MSA.3: 22
    • FMT_MTD: 20
    • FMT_MTD.1: 2
    • FMT_MTD.3: 1
    • FMT_SMF: 41
    • FMT_SMF.1: 22
    • FMT_SMF.1.1: 1
    • FMT_SMR: 43
    • FMT_SMR.1: 37
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO.1: 13
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_FLS: 36
    • FPT_FLS.1: 16
    • FPT_FLS.1.1: 2
    • FPT_ITT.1: 1
    • FPT_PHP.3: 1
    • FPT_RCV: 27
    • FPT_RCV.3: 13
    • FPT_RCV.4: 2
    • FPT_TDC.1: 8
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TST.1: 1
  • FRU:
    • FRU_FLT.2: 1
  • FTP:
    • FTP_ITC: 8
    • FTP_ITC.1: 9
    • FTP_TRP.1: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.NO_SPECIAL_ANALOG_CAPABILITIES: 2
    • A.NO_TEMPEST: 2
    • A.PHYSICAL: 2
    • A.TRUSTED_ADMIN: 2
    • A.TRUSTED_CONFIG: 2
  • O:
    • O.ANTI_TAMPERING: 6
    • O.ANTI_TAMPERING_BACKUP_FAIL_TRI: 1
    • O.ANTI_TAMPERING_BACKUP_FAIL_TRIG: 1
    • O.ANTI_TAMPERING_BACKUP_FAIL_TRIGGER: 3
    • O.ANTI_TAMPERING_BACKUP_POWER: 5
    • O.ANTI_TAMPERING_INDICATION: 5
    • O.ANTI_TAMPERING_PERMANENTLY_: 1
    • O.ANTI_TAMPERING_PERMANENTLY_DIS: 1
    • O.ANTI_TAMPERING_PERMANENTLY_DISABL: 1
    • O.ANTI_TAMPERING_PERMANENTLY_DISABLE_TOE: 6
    • O.AUTHORIZED_SWITCHING: 5
    • O.COMPUTER_INTERFACE_ISOLATION: 9
    • O.COMPUTER_INTERFACE_ISOLATION_TOE_: 1
    • O.COMPUTER_INTERFACE_ISOLATION_TOE_UNPOWERED: 4
    • O.COMPUTER_INTERFACE_ISOLATION_U: 2
    • O.COMPUTER_TO_AUDIO_ISOLATION: 5
    • O.CONTINUOUS_INDICATION: 5
    • O.DISABLE_UNAUTHORIZED_ENDPOINT: 1
    • O.DISABLE_UNAUTHORIZED_ENDPOINTS: 4
    • O.DISABLE_UNAUTHORIZED_PERIPHER: 1
    • O.DISABLE_UNAUTHORIZED_PERIPHERA: 1
    • O.DISABLE_UNAUTHORIZED_PERIPHERAL: 3
    • O.DISPLAYPORT_AUX_FILTERING: 2
    • O.KEYBOARD_AND_MOUSE_TIED: 5
    • O.KEYBOARD_MOUSE_EMULATED: 5
    • O.KEYBOARD_MOUSE_UNIDIRECTIONAL: 5
    • O.NO_AMBIGUOUS_CONTROL: 5
    • O.NO_ANALOG_AUDIO_INPUT: 6
    • O.NO_CONNECTED_COMPUTER_CONTRO: 2
    • O.NO_CONNECTED_COMPUTER_CONTROL: 3
    • O.NO_DOCKING_PROTOCOLS: 5
    • O.NO_OTHER_EXTERNAL_INTERFACES: 8
    • O.NO_TOE_ACCESS: 5
    • O.NO_USER_DATA_RETENTION: 7
    • O.PERIPHERAL_PORTS_ISOLATION: 10
    • O.PURGE_TOE: 2
    • O.PURGE_TOE_KB_DATA_WHILE_SWITC: 1
    • O.PURGE_TOE_KB_DATA_WHILE_SWITCH: 1
    • O.PURGE_TOE_KB_DATA_WHILE_SWITCHING: 1
    • O.SELF_TEST: 10
    • O.SELF_TEST_FAIL_INDICATION: 5
    • O.SELF_TEST_FAIL_TOE_DISABLE: 9
    • O.TAMPER_EVIDENT_LABEL: 7
    • O.UNIDIRECTIONAL_AUDIO_OUT: 5
    • O.UNIDIRECTIONAL_EDID: 3
    • O.UNIDIRECTIONAL_VIDEO: 7
    • O.UNIDIRERCTIONAL_EDID: 4
    • O.USER_AUTHENTICATION_ADMIN: 5
    • O.USER_AUTHENTICATION_ISOLATION: 4
    • O.USER_AUTHENTICATION_RESET: 9
    • O.USER_AUTHENTICATION_TERMINATION: 1
    • O.USER_DATA_ISOLATION: 7
  • OE:
    • OE.NO_TEMPEST: 1
    • OE.PHYSICAL: 3
    • OE.TRUSTED_ADMIN: 5
  • T:
    • T.AUDIO_REVERSED: 1
    • T.AUTHORIZED_BUT_UNT: 1
    • T.AUTHORIZED_BUT_UNTRUSTED_DEVICES: 1
    • T.DATA_LEAK: 2
    • T.FAILED: 2
    • T.LOGICAL_TAMPER: 2
    • T.MICROPHONE_USE: 1
    • T.PHYSICAL_TAMPER: 2
    • T.REPLACEMENT: 2
    • T.RESIDUAL_LEAK: 2
    • T.SIGNAL_LEAK: 2
    • T.UNAUTHORIZED_DEVICE: 1
    • T.UNAUTHORIZED_DEVICES: 1
    • T.UNINTENDED_SWITCHI: 1
    • T.UNINTENDED_SWITCHING: 1
  • A:
    • A.APPLET: 6
    • A.DELETION: 1
    • A.VERIFICATION: 6
  • D:
    • D.API_DATA: 3
    • D.APP_CODE: 7
    • D.APP_C_DATA: 3
    • D.APP_I_DATA: 5
    • D.CM_APDU: 1
    • D.CRYPTO: 6
    • D.JCS_CODE: 3
    • D.JCS_DATA: 4
    • D.JCS_KEYS: 3
    • D.PIN: 6
    • D.SEC_ATTRIBUTES: 2
    • D.SEC_DATA: 8
  • O:
    • O.AES: 1
    • O.ALARM: 21
    • O.APPLET: 19
    • O.CARD-: 6
    • O.CARD-MANAGEMENT: 33
    • O.CIPHER: 16
    • O.CODE_PKG: 16
    • O.COMMUNICATION: 11
    • O.DELETION: 15
    • O.EXT-: 1
    • O.EXT-MEM: 20
    • O.EXT_MEM_INSTANCE: 10
    • O.FIREWALL: 46
    • O.GLOBAL_ARRAYS_C: 1
    • O.GLOBAL_ARRAYS_CONFID: 17
    • O.GLOBAL_ARRAYS_IN: 1
    • O.GLOBAL_ARRAYS_INTEG: 9
    • O.IC_SUPPORT: 18
    • O.INSTALL: 15
    • O.JAVAOBJECT: 41
    • O.KEY-: 1
    • O.KEY-MNGT: 24
    • O.LOAD: 18
    • O.NATIVE: 13
    • O.OBJ-DELETION: 8
    • O.OPERATE: 35
    • O.OS: 1
    • O.OS_SUPPORT: 23
    • O.PACKAGE: 2
    • O.PIN-: 1
    • O.PIN-MNGT: 22
    • O.REALLOCATION: 17
    • O.RECOVERY: 24
    • O.REMOTE: 1
    • O.RESOURCES: 24
    • O.RND: 14
    • O.SHA: 3
    • O.SID: 34
    • O.TDES: 2
    • O.TRANSACTION: 18
  • OE:
    • OE.APPLET: 8
    • OE.CARD-MANAGEMENT: 2
    • OE.CODE-: 4
    • OE.CODE-EVIDENCE: 17
    • OE.SCP: 6
    • OE.VERIFICATION: 38
  • OP:
    • OP.ARRAY_ACCESS: 4
    • OP.CREATE: 7
    • OP.CREATE_EXT_MEM_INSTANCE: 3
    • OP.DELETE_APPLET: 4
    • OP.DELETE_PCKG: 3
    • OP.DELETE_PCKG_APPLET: 3
    • OP.GP: 3
    • OP.INSTANCE_FIELD: 4
    • OP.INVK_INTERFACE: 7
    • OP.INVK_VIRTUAL: 6
    • OP.JAVA: 5
    • OP.LOAD_PCKG: 1
    • OP.PUT: 6
    • OP.READ_EXT_MEM: 3
    • OP.THROW: 5
    • OP.TYPE_ACCESS: 5
    • OP.WRITE_EXT_MEM: 3
  • OSP:
    • OSP.VERIFICATION: 6
  • R:
    • R.JAVA: 12
  • T:
    • T.COMMUNICATION: 5
    • T.CONFID-APPLI-: 3
    • T.CONFID-APPLI-DATA: 18
    • T.CONFID-JCS-: 8
    • T.CONFID-JCS-CODE: 6
    • T.CONFID-JCS-DATA: 6
    • T.DELETION: 5
    • T.EXE-: 1
    • T.EXE-CODE: 8
    • T.FAULT: 6
    • T.INSTALL: 6
    • T.INTEG-: 11
    • T.INTEG-APPLI-: 10
    • T.INTEG-APPLI-CODE: 9
    • T.INTEG-APPLI-DATA: 19
    • T.INTEG-JCS-: 1
    • T.INTEG-JCS-CODE: 8
    • T.INTEG-JCS-DATA: 6
    • T.LEAKAGE: 6
    • T.NATIVE: 6
    • T.OBJ-DELETION: 4
    • T.PHYSICAL: 8
    • T.RESOURCES: 10
    • T.RND: 6
    • T.SID: 20
pdf_data/st_keywords/vendor
  • Infineon:
    • Infineon: 180
pdf_data/st_keywords/eval_facility
  • Leidos:
    • Leidos: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 28
      • AES-: 1
  • DES:
    • 3DES:
      • TDEA: 1
      • TDES: 29
      • Triple-DES: 1
    • DES:
      • DES: 8
  • constructions:
    • MAC:
      • CMAC: 5
  • miscellaneous:
    • SEED:
      • SEED: 2
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DH: 7
  • ECC:
    • ECC:
      • ECC: 13
    • ECDH:
      • ECDH: 4
    • ECDSA:
      • ECDSA: 6
  • FF:
    • DH:
      • DH: 1
      • Diffie-Hellman: 2
    • DSA:
      • DSA: 1
  • RSA:
    • RSA2048: 1
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 3
  • RIPEMD:
    • RIPEMD-160: 2
    • RIPEMD160: 1
  • SHA:
    • SHA1:
      • SHA-1: 8
    • SHA2:
      • SHA-2: 3
      • SHA-224: 1
      • SHA-256: 3
      • SHA-384: 1
      • SHA-512: 1
pdf_data/st_keywords/crypto_scheme
  • KA:
    • KA: 2
    • Key Agreement: 1
    • Key agreement: 2
  • KEX:
    • Key exchange: 1
  • MAC:
    • MAC: 24
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 2
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 21
    • RNG: 13
  • TRNG:
    • TRNG: 3
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 21
  • CCM:
    • CCM: 1
  • ECB:
    • ECB: 6
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 8
  • FI:
    • Malfunction: 3
    • malfunction: 4
    • physical tampering: 1
  • SCA:
    • DPA: 4
    • Leak-Inherent: 2
    • SPA: 1
    • physical probing: 3
    • side channel: 1
    • timing attacks: 1
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-03111: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • BSI:
    • AIS20: 5
    • AIS36: 2
  • FIPS:
    • FIPS 140-2: 1
    • FIPS 180-4: 5
    • FIPS 186-4: 8
    • FIPS 197: 12
    • FIPS PUB 180-4: 1
    • FIPS PUB 186-4: 1
    • FIPS PUB 197: 1
    • FIPS140: 2
  • ICAO:
    • ICAO: 9
  • ISO:
    • ISO/IEC 11770-: 2
    • ISO/IEC 14443: 2
    • ISO/IEC 14888-: 4
    • ISO/IEC 18092: 2
    • ISO/IEC7816: 2
    • ISO/IEC97: 2
    • ISO/IEC9797-1: 1
  • NIST:
    • NIST SP 800-108: 1
    • NIST SP 800-38B: 1
    • SP 800-38B: 1
  • RFC:
    • RFC 5639: 6
  • SCP:
    • SCP 02: 2
    • SCP 03: 3
    • SCP01: 2
    • SCP02: 12
    • SCP03: 12
pdf_data/st_keywords/javacard_version
  • JavaCard:
    • Java Card 3.0.1: 3
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 5
pdf_data/st_keywords/javacard_packages
  • javacard:
    • javacard.framework: 4
    • javacard.security: 3
  • javacardx:
    • javacardx.crypto: 3
    • javacardx.external: 1
    • javacardx.security: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • Software development environment. Phase 2 covers the Secure IC Development of Infineon and is out of scope of the TOE evaluation as that is part of the IC platform evaluation. In Phase 3, the Chip: 1
    • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.RECOVERY and O.OS_SUPPORT are: 1
    • by the TOE. There are no pre-issuance applets installed. Native code post-issuance downloading is out of scope. The SCP is a certified hardware platform – the M7892 G12 (SLJ 52GxxyyyzC) with RSA2048 v2.07.003: 1
    • out of scope: 3
pdf_data/st_metadata
  • /Author: Tyrone Stodart
  • /CreationDate: D:20190524111327+01'00'
  • /Creator: Microsoft® Word 2016
  • /Keywords: Security Target Lite, Java Card, Common Criteria, BSI-DSZ-CC-0869-V2
  • /ModDate: D:20190524111327+01'00'
  • /Producer: Microsoft® Word 2016
  • /Subject: Security Target - Java Card Platform on M7892 G12 V2.0 ST Lite Version 3.6
  • /Title: Security Target - Java Card Platform on M7892 G12 V2.0 ST Lite Version 3.6
  • pdf_file_size_bytes: 3301783
  • pdf_hyperlinks: http://www.iso.org/iso/iso_catalogue/catalogue_tc/catalogue_detail.htm?csnumber=30656
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 157
state/cert/convert_garbage True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different