name |
ZTE Optical Transmission Equipment Series |
Application J-Sign version 1.8.4 sur la plateforme J-Safe version 2.11.0 |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
NO |
FR |
status |
archived |
archived |
not_valid_after |
01.09.2019 |
21.05.2020 |
not_valid_before |
25.02.2013 |
21.05.2015 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SERTIT-042%20CR%20v%201.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_17.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ZTE%20Optical%20Transmission%20Equipment%20Security%20Target%20v1.2.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_17_cible.pdf |
manufacturer |
ZTE Corporation |
Incard Division / ST Microelectronics |
manufacturer_web |
https://wwwen.zte.com.cn/global/index.html |
|
security_level |
EAL2+, ALC_FLR.2 |
AVA_VAN.5, EAL4+ |
dgst |
a041cccd8254ec7a |
ce97d64b517bf270 |
heuristics/cert_id |
SERTIT-042 |
ANSSI-CC-2015/17 |
heuristics/cert_lab |
[] |
SERMA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_ARC.1, ATE_IND.2, AGD_PRE.1, ATE_FUN.1, AGD_OPE.1, ADV_TDS.1, ASE_REQ.2, ASE_ECD.1, AVA_VAN.2, ASE_OBJ.2, ASE_SPD.1, ATE_COV.1, ASE_INT.1, ADV_FSP.2, ASE_TSS.1, ALC_DEL.1, ALC_CMC.2, ALC_CMS.2, ASE_CCL.1, ALC_FLR.2 |
ADV_IMP.1, AVA_VAN.5, ADV_ARC.1, ADV_FSP.4, ATE_IND.2, AGD_PRE.1, ALC_CMC.4, AVA_SOF.1, ALC_LCD.1, AGD_OPE.1, ASE_REQ.2, ASE_ECD.1, AVA_MSU.3, ALC_DVS.2, ATE_COV.2, ASE_SPD.1, ASE_OBJ.2, ADV_TDS.3, ASE_INT.1, ASE_TSS.1, ALC_DEL.1, ATE_DPT.1, ALC_TAT.1, ASE_CCL.1, AVA_VLA.4, ATE_FUN.1, ALC_CMS.4 |
heuristics/extracted_versions |
- |
2.11.0, 1.8.4 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2025/17 |
heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2015/16, ANSSI-CC-2012/68 |
heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2025/17 |
heuristics/report_references/indirectly_referencing |
{} |
ANSSI-CC-2010/02, ANSSI-CC-2009/28, ANSSI-CC-2012/68, ANSSI-CC-2009/05, ANSSI-CC-2009/50, ANSSI-CC-2009/51, ANSSI-CC-2010/01, ANSSI-CC-2009/26, ANSSI-CC-2009/06, ANSSI-CC-2009/62, ANSSI-CC-2015/16 |
heuristics/scheme_data |
- category: Other Devices and Systems
- certification_date: 25.02.2013
- developer: ZTE Corporation
- enhanced:
- category: Other Devices and Systems
- cert_id: SERTIT-042
- certification_date: 25.02.2013
- description: SERTIT-042 C
- developer: ZTE Corporation
- documents: frozendict({'target': [frozendict({'href': 'https://sertit.no/getfile.php/134824-1607951230/SERTIT/Sertifikater/2013/42/ZTE%20Optical%20Transmission%20Equipment%20Security%20Target%20v1.2.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/134821-1607951226/SERTIT/Sertifikater/2013/42/SERTIT-042%20CR%20v%201.0.pdf'})]})
- evaluation_facility: Brightsight B.V.
- level: EAL 2, ALC_FLR.2
- mutual_recognition: CCRA
- product: ZXONE 5800 v1.10, ZXMP S325 v2.10, ZXMP S385 v2.60, ZXMP M720 v1.00, ZXMP M820 v2.51, ZXWM M920 V4.20P01, ZXONE 8300 v1.00, ZXONE 8500 v1.00
- sponsor: ZTE Corporation
- product: ZTE Optical Transmission Equipment Series
- url: https://sertit.no/certified-products/product-archive/zte-optical-transmission-equipment-series
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
ANSSI-CC-2010/02 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
ANSSI-CC-2010/02 |
heuristics/protection_profiles |
{} |
40002c3611fc465f |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0006b.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
SERTIT-042 CR v 1.0.pdf |
ANSSI-CC-2015_17.pdf |
pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 4 augmenté AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 3
- cert_id: ANSSI-CC-2015/17
- cert_item: Application J-Sign version 1.8.4 sur la plateforme J-Safe version 2.11.0
- cert_item_version: Version 1.8.4
- cert_lab: Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
- developer: STMicroelectronics S.r.l. - Incard Division Z.I Marcianise Sud, 81025 Marcianise, Italie STMicroelectronics 29 Boulevard Romain Rolland, 75669 Paris Cedex 14, France Commanditaire STMicroelectronics S.r.l. – Incard Division Z.I Marcianise Sud, 81025 Marcianise, Italie
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: PP-0006] Protection Profile - Secure Signature Creation Device Type 3, version 1.05
|
pdf_data/report_keywords/cc_cert_id |
|
- FR:
- ANSSI-CC-2012/68: 1
- ANSSI-CC-2015/16: 1
- ANSSI-CC-2015/17: 17
- ANSSI-CC-PP-2010/07-M01: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- ANSSI:
- ANSSI-CC-PP-: 1
- ANSSI-CC-PP-2010/07-M01: 1
- BSI:
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 2: 5
- EAL 2 augmented: 2
- EAL 2+: 21
- EAL1: 1
- EAL2: 1
- EAL2+: 2
- EAL7: 1
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 2
- EAL 5: 1
- EAL 7: 1
- EAL4: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 2
- ALC_CMS.2: 2
- ALC_DEL.1: 2
- ALC_FLR.2: 7
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 1
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 1
- FAU_GEN.3: 2
- FAU_SAR.1: 1
- FAU_STG.1: 1
- FAU_STG.4: 1
- FDP:
- FDP_ACC.2: 1
- FDP_ACF.1: 1
- FDP_IFC.1: 1
- FDP_IFF.1: 1
- FIA:
- FIA_AFL.1: 1
- FIA_SOS.1: 1
- FIA_UAU.2: 1
- FIA_UID.2: 1
- FMT:
- FMT_SMF.1: 1
- FMT_SMR.1: 1
- FTA:
- FTA_MCS.1: 1
- FTA_SSL.3: 1
|
|
pdf_data/report_keywords/cc_claims |
- O:
- O.AUDITING: 1
- O.AUTHENTICATE: 1
- O.AUTHORISE: 1
- OE:
- OE.CLIENT_SECURITY: 1
- OE.SERVER_SECURITY: 1
- OE.TIME: 1
- OE.TRUSTED_NETWORKS: 1
- T:
- T.AUTHORISED: 1
- T.CONFIDENTIALITY: 1
- T.INTEGRITY: 1
- T.PHYSICAL_ATTACK: 1
- T.UNAUTHORISED: 1
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- ISO:
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: Kvassnes, Kjartan Jæger
- /CreationDate: D:20130321125808+01'00'
- /Creator: Microsoft® Word 2010
- /Keywords: ugradert
- /ModDate: D:20130321125953+01'00'
- /Producer: Microsoft® Word 2010
- /Title: tittel
- pdf_file_size_bytes: 1423728
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
- /Author: Administrateur
- /CreationDate: D:20150522134048+02'00'
- /Creator: Microsoft® Word 2010
- /Keywords: ANSSI-CC-CER-F-07.016
- /ModDate: D:20150522134048+02'00'
- /Producer: Microsoft® Word 2010
- /Subject: Application J-Sign version 1.8.4 sur la plateforme J-Safe version 2.11.0
- /Title: ANSSI-CC-2015/17
- pdf_file_size_bytes: 637015
- pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 16
|
pdf_data/st_filename |
ZTE Optical Transmission Equipment Security Target v1.2.pdf |
ANSSI-CC-2015_17_cible.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- FR:
- ANSSI-2010/02-M01: 1
- ANSSI-CC-2010/02: 2
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 4
- EAL 4 augmented: 2
- EAL 4+: 1
- EAL4: 5
- EAL4 augmented: 2
- EAL4+: 3
- EAL5: 1
- EAL5 augmented: 1
- EAL5+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 3
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADO:
- ADO_DEL.2: 1
- ADO_IGS.1: 1
- ADV:
- ADV_ARC.1: 3
- ADV_FSP.4: 2
- ADV_IMP.1: 4
- ADV_TDS.3: 2
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 3
- ALC:
- ALC_CMC.4: 3
- ALC_CMS.4: 2
- ALC_DEL.1: 3
- ALC_DVS.1: 3
- ALC_DVS.2: 2
- ALC_LCD.1: 4
- ALC_TAT.1: 3
- ASE:
- ASE_CCL.1: 3
- ASE_ECD.1: 2
- ASE_INT.1: 3
- ASE_OBJ.2: 2
- ASE_REQ.2: 3
- ASE_SPD.1: 2
- ASE_TSS.1: 3
- ATE:
- ATE_COV.2: 3
- ATE_DPT.1: 2
- ATE_FUN.1: 3
- ATE_IND.2: 2
- AVA:
- AVA_MSU.3: 1
- AVA_SOF: 1
- AVA_SOF.1: 1
- AVA_VAN.3: 1
- AVA_VAN.5: 15
- AVA_VLA.4: 2
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 1
- FAU_GEN.3: 8
- FAU_GEN.3.1: 3
- FAU_GEN.3.2: 2
- FAU_SAR.1: 4
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_STG.1: 4
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.4: 4
- FAU_STG.4.1: 1
- FDP:
- FDP_ACC.2: 5
- FDP_ACC.2.1: 1
- FDP_ACC.2.2: 1
- FDP_ACF.1: 4
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 5
- FDP_IFC.1.1: 1
- FDP_IFF.1: 6
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FIA:
- FIA_AFL.1: 8
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_SOS.1: 5
- FIA_SOS.1.1: 1
- FIA_UAU.2: 5
- FIA_UAU.2.1: 1
- FIA_UID: 2
- FIA_UID.2: 9
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA: 2
- FMT_SMF: 1
- FMT_SMF.1: 8
- FMT_SMF.1.1: 1
- FMT_SMR.1: 6
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FTA:
- FTA_MCS.1: 5
- FTA_MCS.1.1: 1
- FTA_MCS.1.2: 1
- FTA_SSL.3: 6
- FTA_SSL.3.1: 1
|
- FAU:
- FCS:
- FCS_CKM: 4
- FCS_CKM.1: 7
- FCS_CKM.1.1: 7
- FCS_CKM.2: 3
- FCS_CKM.3: 3
- FCS_CKM.4: 9
- FCS_CKM.4.1: 4
- FCS_COP: 10
- FCS_COP.1: 21
- FDP:
- FDP_ACC: 29
- FDP_ACC.1: 9
- FDP_ACC.1.1: 16
- FDP_ACF: 22
- FDP_ACF.1: 23
- FDP_ACF.1.1: 4
- FDP_ACF.1.2: 16
- FDP_ACF.1.3: 4
- FDP_ACF.1.4: 10
- FDP_ETC: 4
- FDP_ETC.1: 3
- FDP_ETC.1.1: 2
- FDP_ETC.1.2: 2
- FDP_ITC: 6
- FDP_ITC.1: 4
- FDP_ITC.1.1: 2
- FDP_ITC.1.2: 2
- FDP_ITC.1.3: 2
- FDP_RIP.1: 5
- FDP_RIP.1.1: 11
- FDP_SDI: 7
- FDP_SDI.2: 6
- FDP_SDI.2.1: 9
- FDP_SDI.2.2: 7
- FDP_UIT: 10
- FDP_UIT.1: 11
- FDP_UIT.1.1: 7
- FDP_UIT.1.2: 7
- FIA:
- FIA_AFL.1: 6
- FIA_AFL.1.1: 22
- FIA_AFL.1.2: 4
- FIA_ATD.1: 5
- FIA_ATD.1.1: 2
- FIA_UAU.1: 7
- FIA_UAU.1.1: 6
- FIA_UAU.1.2: 2
- FIA_UID.1: 8
- FIA_UID.1.1: 5
- FIA_UID.1.2: 2
- FMT:
- FMT_MOF: 1
- FMT_MOF.1: 7
- FMT_MOF.1.1: 2
- FMT_MSA: 10
- FMT_MSA.1: 2
- FMT_MSA.1.1: 4
- FMT_MSA.2: 8
- FMT_MSA.2.1: 2
- FMT_MSA.3: 11
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MTD: 1
- FMT_MTD.1: 5
- FMT_MTD.1.1: 5
- FMT_SMF: 4
- FMT_SMF.1: 23
- FMT_SMF.1.1: 4
- FMT_SMR.1: 9
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FPT:
- FPT_AMT.1: 6
- FPT_AMT.1.1: 4
- FPT_FLS: 1
- FPT_FLS.1: 3
- FPT_FLS.1.1: 8
- FPT_PHP.1: 4
- FPT_PHP.1.1: 7
- FPT_PHP.1.2: 7
- FPT_PHP.3: 4
- FPT_PHP.3.1: 7
- FPT_TRP: 1
- FPT_TST.1: 5
- FPT_TST.1.1: 4
- FPT_TST.1.2: 4
- FPT_TST.1.3: 2
- FTP:
- FTP_ITC: 14
- FTP_ITC.1: 17
- FTP_ITC.1.1: 11
- FTP_ITC.1.2: 8
- FTP_ITC.1.3: 8
- FTP_TRP: 8
- FTP_TRP.1: 12
- FTP_TRP.1.1: 7
- FTP_TRP.1.2: 4
- FTP_TRP.1.3: 4
|
pdf_data/st_keywords/cc_claims |
- A:
- O:
- O.ACCESS: 4
- O.AUDITING: 4
- O.AUTHENTICATE: 4
- O.AUTHORISE: 4
- OE:
- OE.CLIENT_SECURITY: 3
- OE.SERVER_SECURITY: 2
- OE.TIME: 3
- OE.TRUSTED_NETWORK: 1
- OE.TRUSTED_NETWORKS: 1
- OSP:
- OSP.FLEXIBLE_MANAGEMENT: 2
- T:
- T.AUTHORISED: 2
- T.CONFIDENTIALITY: 2
- T.INTEGRITY: 2
- T.PHYSICAL_ATTACK: 2
- T.UNAUTHORISED: 2
|
- A:
- A.CGA: 5
- A.NO-DELETION: 2
- A.NO-INSTALL: 3
- A.SCA: 3
- A.SGA: 1
- A.VERIFICATION: 3
- O:
- O.ALARM: 5
- O.CIPHER: 4
- O.CSP: 1
- O.FIREWALL: 2
- O.GLOBAL_ARRAYS_INTEG: 1
- O.KEY-MNGT: 4
- O.NATIVE: 2
- O.OBJ-DEL: 2
- O.OPERATE: 1
- O.PIN-MNGT: 1
- O.REALLOCATION: 4
- O.ROLES: 1
- O.SCP: 6
- O.SID: 1
- O.SIDE_CHANNEL: 4
- O.TRANSACTION: 1
- OE:
- OE.CARD_MANAGEMENT: 5
- OE.HI_VAD: 8
- OE.MANAGEMENT_OF_SECRETS: 5
- OE.NO-DELETION: 2
- OE.NO-INSTALL: 1
- OE.VERIFICATION: 7
- OSP:
- OSP.CARD_ADMINISTRATION_DISABLED: 2
- OSP.MANAGEMENT_OF_SECRETS: 3
- OSP.ROLES: 2
- OSP.VERIFICATION: 1
- OT:
- T:
- T.EXE-CODE: 6
- T.INTEG-APPLI-CODE: 2
- T.INTEG-APPLI-DATA: 5
- T.NATIVE: 3
- T.PHYSICAL: 3
- T.TYPE: 1
|
pdf_data/st_keywords/vendor |
|
- STMicroelectronics:
- STM: 1
- STMicroelectronics: 19
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 1
- SHA-256: 6
- SHA-512: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- Physical tampering: 2
- physical tampering: 6
- SCA:
- DPA: 2
- SPA: 2
- timing attacks: 2
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- CC:
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- FIPS:
- FIPS PUB 113: 1
- FIPS PUB 180-1: 1
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 14443-3: 1
- ISO/IEC 14443-4: 1
- ISO/IEC 14888-3: 1
- ISO/IEC 7816: 12
- ISO/IEC 7816-: 1
- ISO/IEC 9797-1: 1
- PKCS:
- RFC:
|
pdf_data/st_keywords/javacard_version |
|
- GlobalPlatform:
- JavaCard:
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- for ZTE maintenance staff that regularly service the TOE using the systems console, but this is out of scope and not described further in this ST. Operations Operations in the TOE are divided into • Topology: 1
- for ZTE maintenance staff that regularly service the TOE using the systems console, but this is out of scope for this ST. Accounting: The TOE supports flexible logging and auditing of events. General This: 1
- for ZTE maintenance staff that regularly services the TOE using the systems console, but this is out of scope for this ST. Accounting: The EMS supports flexible logging and auditing of security, operation and: 1
- out of scope: 3
|
- OutOfScope:
- This component and its interface is permanently disabled before TOE delivery. The Card Manager is out of scope of current evaluation: 1
- This component and its interface is permanently disabled before TOE delivery. The Card Manager is out of scope of current evaluation) o GP API (This interface is permanently disabled before TOE delivery and it: 1
- This interface is permanently disabled before TOE delivery and it is out of scope of current evaluation: 1
- out of scope: 2
- out of scope of current evaluation) o Javacard 3.0.4 API o Proprietary API o Operating System o The Secured: 1
|
pdf_data/st_metadata |
- /CreationDate: D:20120816120620+02'00'
- /Creator: PDF24 Creator
- /ModDate: D:20120816120620+02'00'
- /Producer: GPL Ghostscript 8.61
- pdf_file_size_bytes: 699350
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 32
|
- /Author: saverio donatiello
- /CreationDate: D:20150429154456+02'00'
- /Creator: PDFCreator Version 1.7.3
- /Keywords:
- /ModDate: D:20150429154456+02'00'
- /Producer: GPL Ghostscript 9.10
- /Subject:
- /Title: J-SIGN_SecurtyTarget_Lite
- pdf_file_size_bytes: 1850122
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 95
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |