name |
FIN.X RTOS SE V4.0 |
EzIdentityTM mSignTM (Android v2.0.0.1 & iOS v2.0.0.1) and EzIdentityTM Authentication Platform v4.0.0.2 |
category |
Operating Systems |
Products for Digital Signatures |
scheme |
IT |
MY |
status |
archived |
archived |
not_valid_after |
25.07.2022 |
01.09.2019 |
not_valid_before |
25.07.2017 |
27.12.2013 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/rc_finx_rtos_se_4_v1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C053-CR-v1a.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/tds_finx_rtos_se_4_lite03.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/EZMCOM%20EzIdentity%20Security%20Target%20v1.1.pdf |
manufacturer |
MBDA Italia S.p.A. |
EZMCOM Inc. |
manufacturer_web |
https://www.mbda-systems.com/ |
https://www.ezmcom.com/ |
security_level |
ALC_FLR.1, EAL4+ |
EAL2 |
dgst |
9cb1663e606ec87b |
80a30e9889a58515 |
heuristics/cert_id |
OCSI/CERT/RES/06/2014/RC |
ISCB-5-RPT-C053-CR-v1a |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_ARC.1, ALC_CMC.4, ADV_FSP.4, ALC_DVS.1, ASE_OBJ.2, ALC_FLR.1, ASE_SPD.1, ATE_IND.2, AGD_PRE.1, AVA_VAN.3, ALC_DEL.1, ATE_FUN.1, ATE_DPT.1, ALC_TAT.1, ATE_COV.2, ALC_CMS.4, ASE_ECD.1, ASE_REQ.2, ALC_LCD.1, ASE_TSS.1, ASE_INT.1, ADV_IMP.1, ASE_CCL.1, ADV_TDS.3, AGD_OPE.1 |
ATE_COV.1, ADV_ARC.1, ALC_CMS.2, ADV_FSP.2, ALC_CMC.2, ASE_OBJ.2, ASE_SPD.1, ATE_IND.2, AGD_PRE.1, ALC_DEL.1, ATE_FUN.1, AVA_VAN.2, ASE_ECD.1, ASE_REQ.2, ASE_TSS.1, ASE_INT.1, ASE_CCL.1, ADV_TDS.1, AGD_OPE.1 |
heuristics/extracted_versions |
4.0 |
4.0.0.2, 2.0.0.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
OCSI/CERT/LEO/08/2021/RC |
{} |
heuristics/report_references/directly_referencing |
OCSI/CERT/RES/03/2012/RC |
{} |
heuristics/report_references/indirectly_referenced_by |
OCSI/CERT/LEO/08/2021/RC |
{} |
heuristics/report_references/indirectly_referencing |
OCSI/CERT/RES/03/2012/RC |
{} |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
rc_finx_rtos_se_4_v1.0.pdf |
ISCB-5-RPT-C053-CR-v1a.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- IT:
- OCSI/CERT/RES/03/2012/RC: 1
- OCSI/CERT/RES/06/2014/RC: 35
|
- MY:
- ISCB-5-RPT-C053-CR-v1a: 41
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 4: 1
- EAL2: 1
- EAL4: 9
- EAL4+: 1
|
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR: 2
- ALC_FLR.1: 5
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_STG.3: 1
- FAU_STG.4: 1
- FCS:
|
- FAU:
- FAU_GEN.1: 1
- FAU_SAR.1: 1
- FCO:
- FCO_NRO.1.1: 1
- FCO_NRO.1.2: 1
- FCO_NRO.1.3: 1
- FCS:
- FCS_CKM: 2
- FCS_CKM.4: 1
- FCS_COP: 5
- FDP:
- FDP_ACC.1: 1
- FDP_ACF.1: 1
- FIA:
- FIA_AFL.1: 1
- FIA_ATD: 2
- FIA_UAU.2: 1
- FIA_UID.2: 1
- FMT:
- FMT_MSA: 2
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 2
- FMT_SMF.1: 1
- FMT_SMR.1: 1
- FPT:
- FTA:
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- ISO:
|
- FIPS:
- FIPS 180-2: 1
- FIPS 180-3: 1
- ISO:
- ISO/IEC 18045: 2
- ISO/IEC15408: 2
- PKCS:
- RFC:
- RFC 2898: 2
- RFC 4226: 2
- RFC 6287: 2
- RFC 6328: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- OutOfScope:
- 11 All of the underlying hardware and the operating systems used by both mSign and EzIdentity are out of scope for this evaluation. 12 Figure 1 identifies the major architectural components that comprise the: 1
- Ref [6]) are out of scope for this evaluation: 1
- by both mSign and EzIdentity as described in Section 1.4.3 of the Security Target (Ref [6]) are out of scope for this evaluation. 23 The assurance gained via evaluation applies specifically to the TOE in the: 1
- out of scope: 2
|
pdf_data/report_metadata |
- /Author: ocsi
- /CreationDate: D:20170727120322+02'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20170727120322+02'00'
- /Producer: Microsoft® Word 2010
- /Title: Rapporto di Certificazione del prodotto “FIN.X RTOS SE V4.0”
- pdf_file_size_bytes: 805511
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 35
|
- /Author: ISCB Department
- /Category: PUBLIC
- /Caveat: FINAL
- /Classification: PUBLIC
- /Company: CyberSecurity Malaysia
- /CreationDate: D:20140106141939+08'00'
- /Creator: Acrobat PDFMaker 10.1 for Word
- /Developer: EZMCOM Inc
- /Document Type: CR
- /Identifier: ISCB-5-RPT-C053-CR-v1a
- /Index: MyCB_TMP_002
- /Keywords: MyCB_TMP_002
- /ModDate: D:20140106142000+08'00'
- /Phase: Release
- /Producer: Adobe PDF Library 10.0
- /Project Code: C053
- /Released: 27 December 2013
- /ST Date: 18 November 2013
- /ST Title: EzIdentity™ mSign™ & EzIdentity™ Authentication Platform Security Target
- /ST Version: v1.1
- /SourceModified: D:20140106061916
- /Sponsor: EZMCOM Inc
- /Subject: EzIdentity™ mSign™ (Android v2.0.0.1 & iOS v2.0.0.1) and EzIdentity™ Authentication Platform v4.0.0.2
- /TOE Name: EzIdentity™ mSign™ and EzIdentity™ Authentication Platform
- /TOE Version: EzIdentity™ mSign™ (Android v2.0.0.1 & iOS v2.0.0.1) and EzIdentity™ Authentication Platform v4.0.02
- /Title: C053 Certification Report
- /Version: v1a
- pdf_file_size_bytes: 398084
- pdf_hyperlinks: mailto:mycc@cybersecurity.my, http://www.commoncriteriaportal.org/, http://www.cybersecurity.my/mycc
- pdf_is_encrypted: True
- pdf_number_of_pages: 42
|
pdf_data/st_filename |
tds_finx_rtos_se_4_lite03.pdf |
EZMCOM EzIdentity Security Target v1.1.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL4: 4
- EAL4 augmented: 2
|
|
pdf_data/st_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ASE:
- ASE_CCL.1: 4
- ASE_ECD.1: 1
- ASE_INT.1: 4
- ASE_OBJ.2: 4
- ASE_REQ.2: 4
- ASE_SPD.1: 4
- ASE_TSS.1: 4
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 13
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_SAR.1: 10
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 7
- FAU_SAR.2.1: 1
- FAU_SAR.3: 8
- FAU_SAR.3.1: 1
- FAU_SEL.1: 7
- FAU_SEL.1.1: 3
- FAU_STG.1: 9
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 8
- FAU_STG.3.1: 1
- FAU_STG.4: 7
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM: 17
- FCS_CKM.1: 64
- FCS_CKM.1.1: 7
- FCS_CKM.2: 16
- FCS_CKM.2.1: 2
- FCS_CKM.4: 5
- FCS_CKM.4.1: 1
- FCS_CKM_EXT: 1
- FCS_CKM_EXT.4: 1
- FCS_CKM_EXT.4.1: 1
- FCS_COP.1: 24
- FCS_COP.1.1: 4
- FCS_COP.1.2: 1
- FCS_RNG_EXT.1: 1
- FDP:
- FDP_ACC.1: 20
- FDP_ACC.1.1: 1
- FDP_ACF.1: 14
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 3
- FDP_ITC.1: 5
- FDP_ITC.2: 5
- FDP_RIP.2: 9
- FDP_RIP.2.1: 1
- FDP_UCT.1: 8
- FDP_UCT.1.1: 2
- FDP_UIT.1: 7
- FDP_UIT.1.1: 2
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL: 1
- FIA_AFL.1: 10
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 2
- FIA_AFL_EXT.1: 3
- FIA_ATD.1: 11
- FIA_ATD.1.1: 1
- FIA_SOS: 1
- FIA_SOS.1: 14
- FIA_SOS.1.1: 3
- FIA_UAU.1: 1
- FIA_UAU.2: 13
- FIA_UAU.2.1: 1
- FIA_UAU.5: 11
- FIA_UAU.5.1: 3
- FIA_UAU.5.2: 3
- FIA_UAU.6: 7
- FIA_UAU.6.1: 1
- FIA_UAU.7: 10
- FIA_UAU.7.1: 1
- FIA_UID: 1
- FIA_UID.1: 2
- FIA_UID.2: 10
- FIA_UID.2.1: 1
- FIA_USB.1: 12
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 17
- FMT_MOF.1.1: 2
- FMT_MSA.1: 13
- FMT_MSA.1.1: 1
- FMT_MSA.2: 8
- FMT_MSA.2.1: 1
- FMT_MSA.3: 12
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 52
- FMT_MTD.1.1: 7
- FMT_REV.1: 25
- FMT_REV.1.1: 2
- FMT_SAE.1: 8
- FMT_SAE.1.1: 1
- FMT_SAE.1.2: 2
- FMT_SMF.1: 19
- FMT_SMF.1.1: 1
- FMT_SMR.1: 25
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 24
- FPT_FLS.1.1: 5
- FPT_STM.1: 9
- FPT_STM.1.1: 1
- FPT_TST.1: 8
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTA:
- FTA_SSL.2: 7
- FTA_SSL.2.1: 1
- FTA_SSL.2.2: 2
- FTA_TAB.1: 8
- FTA_TAB.1.1: 2
- FTA_TAH.1: 8
- FTA_TAH.1.1: 2
- FTA_TAH.1.2: 2
- FTA_TAH.1.3: 1
- FTP:
- FTP_ITC.1: 13
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 2
|
- FAU:
- FAU_GEN.1: 5
- FAU_SAR.1: 4
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FCO:
- FCO_NRO.1: 6
- FCO_NRO.1.1: 1
- FCO_NRO.1.2: 1
- FCO_NRO.1.3: 1
- FCS:
- FCS_CKM: 14
- FCS_CKM.1: 13
- FCS_CKM.2: 4
- FCS_CKM.4: 23
- FCS_CKM.4.1: 1
- FCS_COP: 28
- FCS_COP.1: 5
- FDP:
- FDP_ACC.1: 17
- FDP_ACC.1.1: 1
- FDP_ACF.1: 6
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 5
- FDP_IFF: 2
- FDP_ITC.1: 12
- FDP_ITC.2: 12
- FIA:
- FIA_AFL.1: 7
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD: 8
- FIA_ATD.1.1: 2
- FIA_UAU.1: 4
- FIA_UAU.2: 9
- FIA_UAU.2.1: 1
- FIA_UID.1: 6
- FIA_UID.2: 6
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA: 6
- FMT_MSA.1: 3
- FMT_MSA.1.1: 2
- FMT_MSA.3: 8
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 12
- FMT_MTD.1.1: 2
- FMT_SMF.1: 14
- FMT_SMF.1.1: 1
- FMT_SMR.1: 24
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_ITT.1: 5
- FPT_ITT.1.1: 1
- FPT_STM.1: 2
- FTA:
- FTA_SSL.1: 5
- FTA_SSL.1.1: 1
- FTA_SSL.1.2: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.AUTHUSER: 3
- A.CONNECT: 3
- A.DETECT: 4
- A.MANAGE: 3
- A.PEER_FUNC: 2
- A.PEER_MGT: 2
- A.PHYSICAL: 3
- A.TRAINEDUSER: 3
- O:
- O.ACCESS: 10
- O.ACCESS_HISTORY: 4
- O.AUDIT_GENERATION: 8
- O.AUDIT_PROTECTION: 5
- O.AUDIT_REVIEW: 5
- O.CRYPTO_MEDIA: 7
- O.CRYPTO_NET: 13
- O.DISCRETIONARY_ACCESS: 11
- O.DISCRETIONARY_USER_CONTROL: 7
- O.DISPLAY_BANNER: 3
- O.ENFORCEMENT: 3
- O.MANAGE: 19
- O.PROTECT: 13
- O.RESIDUAL_INFORMATION: 4
- O.RUNTIME: 8
- O.TRUSTED_CHANNEL: 6
- O.USER_AUTHENTICATION: 12
- O.USER_IDENTIFICATION: 5
- OE:
- OE.ADMIN: 1
- OE.INFO_PROTECT: 1
- OE.INSTALL: 1
- OE.MAINTENANCE: 1
- OE.PHYSICAL: 4
- OE.RECOVER: 1
- OE.TRUSTED: 6
- T:
- T.ASSETS_COMPROMISE: 7
- T.AUDIT_COMPROMISE: 4
- T.COMM: 4
- T.MASQUERADE: 3
- T.RESIDUAL_DATA: 2
- T.TSFDATA: 3
- T.TSFFUNC: 4
- T.UNATTENDED_SESSION: 2
- T.UNAUTHORIZED_ACCESS: 7
- T.UNIDENTIFIED_ACTIONS: 2
- T.USER: 5
- T.USERDATA: 3
|
- A:
- A.ADMIN: 2
- A.DATACONTROL: 2
- A.OS: 2
- A.PHYSICAL: 2
- A.TIMESTAMP: 3
- A.UPDATE: 2
- O:
- O.-CONTROL: 1
- O.COMMSEC: 4
- O.CONTROL: 3
- O.CRYPT: 4
- O.KEYPROTECT: 3
- O.MODIFY: 4
- OE:
- OE.ADMIN: 2
- OE.ENVIRONMENT: 3
- OE.INSTALL: 1
- OE.OPSYS: 2
- OE.TIMESTAMP: 2
- OE.UPDATE: 2
- T:
- T.COMINT: 3
- T.MODIFY: 3
- T.TSFDATA: 3
- T.UNAUTHORISED_A: 1
- T.UNAUTHORISED_ACCESS: 2
|
pdf_data/st_keywords/vendor |
|
- Microsoft:
- STMicroelectronics:
- Thales:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-2: 1
- SHA-224: 1
- SHA-256: 1
- SHA-384: 1
- SHA-512: 2
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCIMB-2012-09-003: 1
- CCMB-2012-09-001: 1
- FIPS:
- FIPS 140-2: 1
- FIPS 186-2: 1
- FIPS 186-4: 2
- FIPS PUB 186-2: 4
- FIPS PUB 186-4: 3
- FIPS140: 2
- FIPS186: 1
- FIPS186-2: 8
- FIPS186-3: 1
- FIPS186-4: 9
- RFC:
- RFC 2898: 2
- RFC 4252: 7
- RFC 4253: 6
- RFC 6668: 5
- RFC4253: 4
|
- FIPS:
- FIPS 180-2: 1
- FIPS 180-3: 1
- FIPS 46-3: 1
- FIPS PUB 180-3: 1
- PKCS:
- RFC:
- RFC 2898: 2
- RFC 4226: 2
- RFC 6287: 2
- RFC 6328: 2
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- DAC mechanism but may be supplemented by further restrictions. These additional restrictions are out of scope for this evaluation. Examples of objects which are accessible to users but cannot be used to store: 1
- out of scope: 1
|
- OutOfScope:
- Please note that the RSA encryption and decryption operations performed on the EzIdentity are out of scope for this evaluation. COMMERCIAL-IN-CONFIDENCE 13 of 43 2 Conformance Claim (ASE_CCL.1) The ST and: 1
- out of scope: 1
|
pdf_data/st_metadata |
|
- /Author: Soshinee Govindasamy
- /CreationDate: D:20131121122329+08'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20131121122329+08'00'
- /Producer: Microsoft® Word 2010
- /Title: EzIdentity™ mSign™ & EzIdentity™ Authentication Platform Security Target EAL2 Security Target
- pdf_file_size_bytes: 928180
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 43
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |