name |
Adtran’s FSP 3000R7 Network Element r22.2.2 |
MICARDO V3.5 R1.0 eHC V1.0 (QES komplettierbar) |
category |
Network and Network-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
US |
DE |
status |
active |
archived |
not_valid_after |
28.03.2026 |
01.09.2019 |
not_valid_before |
28.03.2024 |
08.03.2010 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11418-ci.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11418-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0604a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11418-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0604b_pdf.pdf |
manufacturer |
Adtran Networks North America, Inc |
Sagem Orga GmbH |
manufacturer_web |
https://www.adtran.com/en |
https://www.sagem-orga.com/ |
security_level |
{} |
EAL4+ |
dgst |
a3a5b27b2863594a |
0c87a9e24784c5ba |
heuristics/cert_id |
CCEVS-VR-VID-11418-2024 |
BSI-DSZ-CC-0604-2010 |
heuristics/cert_lab |
US |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
AGD_OPE.1, ASE_SPD.1, ADV_FSP.1, ASE_REQ.1, ASE_OBJ.1, AVA_VAN.1, ASE_ECD.1, ASE_CCL.1, AGD_PRE.1, ALC_CMS.1, ALC_CMC.1, ASE_INT.1, ASE_TSS.1, ATE_IND.1 |
ADV_FSP.2, AGD_ADM.1, ATE_COV.2, AVA_VLA.4, ADV_IMP.2, ALC_DVS.1, ALC_TAT.1, AGD_USR.1, ATE_IND.2, AVA_SOF.1, ADV_SPM.1, AVA_MSU.3, ATE_DPT.2, ALC_LCD.1, ATE_FUN.1, ADV_RCR.1, ADV_LLD.1, ADV_HLD.2 |
heuristics/extracted_versions |
22.2.2 |
1.0, 3.5 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0410-2007, BSI-DSZ-CC-0417-2008, BSI-DSZ-CC-0602-2009 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0411-2007, BSI-DSZ-CC-0602-2009, BSI-DSZ-CC-0391-2009, BSI-DSZ-CC-0404-2007, BSI-DSZ-CC-0410-2007, BSI-DSZ-CC-0417-2008 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0410-2007, BSI-DSZ-CC-0417-2008 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0410-2007, BSI-DSZ-CC-0417-2008 |
heuristics/protection_profiles |
89f2a255423f4a20 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.2E.pdf |
{} |
pdf_data/cert_filename |
st_vid11418-ci.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID11418-2024: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20240401105622-04'00'
- /ModDate: D:20240401105622-04'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 188225
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
st_vid11418-vr.pdf |
0604a_pdf.pdf |
pdf_data/report_frontpage |
- DE:
- US:
- cert_id: CCEVS-VR-VID11418-2024
- cert_item: for the Adtran’s FSP 3000R7 Network Element r22.2.2
- cert_lab: US NIAP
|
- DE:
- cert_id: BSI-DSZ-CC-0604-2010
- cert_item: MICARDO V3.5 R1.0 eHC V1.0 (QES komplettierbar
- cert_lab: BSI
- developer: Sagem Orga GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- US:
|
pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID11418-2024: 1
|
- DE:
- BSI-DSZ-CC-0410: 1
- BSI-DSZ-CC-0410-2007: 2
- BSI-DSZ-CC-0410-2007-MA-01: 1
- BSI-DSZ-CC-0417: 1
- BSI-DSZ-CC-0417-: 1
- BSI-DSZ-CC-0417-2008: 1
- BSI-DSZ-CC-0417-2008-MA-01: 1
- BSI-DSZ-CC-0602-2009: 3
- BSI-DSZ-CC-0604-2010: 20
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP-0020-V2-2007-MA-02: 1
- BSI-PP-0020-V2-2007-MA02: 1
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 4: 7
- EAL 4 augmented: 2
- EAL 5: 2
- EAL 5 augmented: 2
- EAL 7: 1
- EAL1: 5
- EAL2: 3
- EAL3: 4
- EAL4: 9
- EAL4 augmented: 1
- EAL5: 6
- EAL5+: 1
- EAL6: 3
- EAL7: 4
|
pdf_data/report_keywords/cc_sar |
|
- ACM:
- ACM_AUT: 2
- ACM_AUT.1: 1
- ACM_CAP: 2
- ACM_CAP.4: 1
- ACM_SCP: 2
- ACM_SCP.2: 1
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 1
- ADO_IGS: 2
- ADO_IGS.1: 1
- ADV:
- ADV_FSP: 2
- ADV_HLD: 2
- ADV_IMP: 2
- ADV_IMP.2: 5
- ADV_INT: 2
- ADV_LLD: 2
- ADV_RCR: 2
- ADV_SPM: 2
- AGD:
- ALC:
- ALC_DVS: 2
- ALC_DVS.1: 1
- ALC_FLR: 2
- ALC_LCD: 1
- ALC_LCD.1: 1
- ALC_TAT: 2
- ALC_TAT.1: 1
- APE:
- APE_DES: 1
- APE_ENV: 1
- APE_INT: 1
- APE_OBJ: 1
- APE_REQ: 1
- APE_SRE: 1
- ASE:
- ASE_DES: 1
- ASE_ENV: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_PPC: 1
- ASE_REQ: 1
- ASE_SRE: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 2
- ATE_DPT: 2
- ATE_DPT.2: 5
- ATE_FUN: 2
- ATE_IND: 2
- AVA:
- AVA_CCA: 2
- AVA_MSU: 2
- AVA_MSU.3: 5
- AVA_SOF: 3
- AVA_VLA: 3
- AVA_VLA.2: 1
- AVA_VLA.3: 1
- AVA_VLA.4: 6
|
pdf_data/report_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 1
- FCS_CKM.2: 1
- FCS_COP: 4
- FCS_RBG_EXT.1: 1
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- NXP:
- NXP: 7
- NXP Semiconductors: 3
- Sagem:
|
pdf_data/report_keywords/eval_facility |
|
- BrightSight:
- SRC:
- SRC Security Research & Consulting: 2
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- Fault Injection: 1
- SCA:
- DPA: 1
- SPA: 1
- physical probing: 1
- other:
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
- BSI TR-03116: 2
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- FIPS:
- FIPS 186-4: 1
- FIPS PUB 186-4: 1
- RFC:
- X509:
|
- BSI:
- AIS 1: 1
- AIS 14: 1
- AIS 19: 1
- AIS 25: 3
- AIS 26: 3
- AIS 32: 1
- AIS 34: 4
- AIS 35: 2
- AIS 36: 4
- AIS 37: 1
- AIS 38: 1
- AIS20: 1
- FIPS:
- FIPS 180-2: 1
- FIPS PUB 46-3: 1
- ISO:
- PKCS:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- OutOfScope:
- out of scope: 1
- the TOE’s management of the OTH or WDM Network. Therefore, interface E7 to these components is out of scope for the NDcPP and the present evaluation. This interface and components are included for: 1
|
- ConfidentialDocument:
- Sagem Orga GmbH (confidential document) [8] Configuration List, MICARDO V3.5 R1.0 eHC V1.0 (QES komplettierbar), Version X1.00.5, 09.12: 1
- Sagem ORGA GmbH (confidential document) [9] Security Target Lite – MICARDO V3.5 R1.0 eHC V1.0 (QES komplettierbar), Version V1.00, Sagem: 1
- Secure Smart Card Controller, Version 1.2, 23.06.2009, T-Systems GEI GmbH, BSI-DSZ-CC-0410-2007 (confidential documents) [12] User Guidance, MICARDO V3.5 R1.0 eHC V1.0 (QES komplettierbar), Version V1.01, 26.01.2010: 1
- – MICARDO V3.5 R1.0 eHC V1.0 (QES komplettierbar), Version X1.00.9, Sagem ORGA GmbH, 02.11.2009 (confidential document) [7] Evaluation Technical Report (ETR), Version: 1.2, 16.12.2009, MICARDO V3.5 R1.0 eHC V1.0 (QES: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20240401074457-04'00'
- /Creator: Microsoft® Word for Microsoft 365
- /ModDate: D:20240401104547-04'00'
- /Producer: Microsoft® Word for Microsoft 365
- pdf_file_size_bytes: 534467
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 22
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20100330082113+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, Sagem Orga GmbH, electronic Health Card, MICARDO V3.5 R1.0 eHC V1.0 (QES komplettierbar)"
- /ModDate: D:20100330132020+02'00'
- /Producer: OpenOffice.org 3.1
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0604-2010
- pdf_file_size_bytes: 420720
- pdf_hyperlinks: http://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 38
|
pdf_data/st_filename |
st_vid11418-st.pdf |
0604b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0410-2007: 1
- BSI-DSZ-CC-0417-2008: 1
- BSI-DSZ-CC-0602: 1
- BSI-DSZ-CC-0604: 1
- BSI-DSZ-CC-673: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP-0002: 1
- BSI-PP-0006-2002: 1
- BSI-PP-0020-V2-2007-MA2: 1
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 3
- EAL 4 augmented: 2
- EAL 4+: 2
- EAL 5: 2
- EAL 5 augmented: 2
- EAL4: 1
- EAL4 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 13
- AGD_PRE.1: 4
- ALC:
- ALC_CMC.1: 6
- ALC_CMS.1: 7
- ASE:
- ASE_CCL.1: 16
- ASE_ECD.1: 12
- ASE_INT.1: 14
- ASE_OBJ.1: 6
- ASE_REQ.1: 12
- ASE_SPD: 2
- ASE_SPD.1: 7
- ASE_TSS.1: 7
- ATE:
- AVA:
|
- ACM:
- ACM_AUT: 1
- ACM_AUT.1: 1
- ACM_CAP: 1
- ACM_CAP.4: 1
- ACM_SCP: 1
- ACM_SCP.2: 1
- ADO:
- ADO_DEL: 1
- ADO_DEL.2: 1
- ADO_IGS: 1
- ADO_IGS.1: 1
- ADV:
- ADV_FSP: 1
- ADV_FSP.2: 1
- ADV_HLD: 1
- ADV_HLD.2: 1
- ADV_IMP: 1
- ADV_IMP.2: 5
- ADV_LLD: 1
- ADV_LLD.1: 1
- ADV_RCR: 1
- ADV_RCR.1: 1
- ADV_SPM: 1
- ADV_SPM.1: 4
- AGD:
- AGD_ADM: 1
- AGD_ADM.1: 1
- AGD_USR: 1
- AGD_USR.1: 1
- ALC:
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_LCD: 1
- ALC_LCD.1: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ATE:
- ATE_COV: 1
- ATE_COV.2: 1
- ATE_DPT: 1
- ATE_DPT.2: 5
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_IND: 1
- ATE_IND.2: 1
- AVA:
- AVA_MSU: 1
- AVA_MSU.3: 5
- AVA_SOF: 1
- AVA_SOF.1: 6
- AVA_VLA: 1
- AVA_VLA.4: 6
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 6
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 2
- FAU_GEN.2: 3
- FAU_GEN.2.1: 1
- FAU_STG: 1
- FAU_STG_EXT.1: 5
- FAU_STG_EXT.1.1: 1
- FAU_STG_EXT.1.2: 1
- FAU_STG_EXT.1.3: 1
- FCS:
- FCS_CKM.1: 8
- FCS_CKM.1.1: 2
- FCS_CKM.2: 9
- FCS_CKM.2.1: 1
- FCS_CKM.4: 6
- FCS_CKM.4.1: 1
- FCS_COP: 29
- FCS_COP.1: 4
- FCS_NTP_EXT.1: 7
- FCS_NTP_EXT.1.1: 1
- FCS_NTP_EXT.1.2: 2
- FCS_NTP_EXT.1.3: 1
- FCS_NTP_EXT.1.4: 2
- FCS_RBG_EXT.1: 7
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FCS_SSHC_EXT.1: 1
- FCS_SSHS_EXT.1: 10
- FCS_SSHS_EXT.1.1: 1
- FCS_SSHS_EXT.1.3: 1
- FCS_SSHS_EXT.1.4: 1
- FCS_SSHS_EXT.1.5: 1
- FCS_SSHS_EXT.1.6: 1
- FCS_SSHS_EXT.1.7: 1
- FCS_SSHS_EXT.1.8: 1
- FCS_TLSC_EXT: 2
- FCS_TLSC_EXT.1: 8
- FCS_TLSC_EXT.1.1: 1
- FCS_TLSC_EXT.1.2: 1
- FCS_TLSC_EXT.1.3: 1
- FCS_TLSC_EXT.1.4: 1
- FCS_TLSC_EXT.2.1: 1
- FCS_TLSC_EXT.2.3: 1
- FCS_TLSS_EXT.1: 10
- FCS_TLSS_EXT.1.1: 1
- FCS_TLSS_EXT.1.2: 1
- FCS_TLSS_EXT.1.3: 2
- FCS_TLSS_EXT.1.4: 4
- FCS_TLSS_EXT.2: 7
- FCS_TLSS_EXT.2.1: 1
- FCS_TLSS_EXT.2.2: 1
- FCS_TLSS_EXT.2.3: 1
- FIA:
- FIA_AFL.1: 11
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_PMG_EXT.1: 9
- FIA_PMG_EXT.1.1: 1
- FIA_UAU.7: 5
- FIA_UAU.7.1: 1
- FIA_UAU_EXT.2: 5
- FIA_UAU_EXT.2.1: 1
- FIA_UIA_EXT.1: 5
- FIA_UIA_EXT.1.1: 1
- FIA_UIA_EXT.1.2: 1
- FMT:
- FMT_MOF: 5
- FMT_MOF.1: 1
- FMT_MTD: 11
- FMT_MTD.1: 2
- FMT_SMF.1: 8
- FMT_SMR.2: 6
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT.1: 6
- FPT_APW_EXT.1.1: 1
- FPT_APW_EXT.1.2: 1
- FPT_ITT.1: 1
- FPT_SKP_EXT.1: 6
- FPT_SKP_EXT.1.1: 1
- FPT_STM_EXT.1: 6
- FPT_STM_EXT.1.1: 1
- FPT_STM_EXT.1.2: 2
- FPT_TST_EXT.1: 6
- FPT_TST_EXT.1.1: 1
- FPT_TUD_EXT.1: 6
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FPT_TUD_EXT.2: 6
- FPT_TUD_EXT.2.1: 1
- FPT_TUD_EXT.2.2: 1
- FPT_TUD_EXT.2.3: 1
- FPT_TUD_EXT.2.4: 1
- FTA:
- FTA_SSL.3: 5
- FTA_SSL.3.1: 1
- FTA_SSL.4: 5
- FTA_SSL.4.1: 1
- FTA_SSL_EXT.1: 5
- FTA_SSL_EXT.1.1: 1
- FTA_TAB.1: 6
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC.1: 9
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 7
- FTP_TRP.1: 3
|
- FCS:
- FCS_CKM: 7
- FCS_CKM.1: 12
- FCS_CKM.1.1: 2
- FCS_CKM.2: 4
- FCS_CKM.2.1: 1
- FCS_CKM.3: 2
- FCS_CKM.3.1: 1
- FCS_CKM.4: 11
- FCS_CKM.4.1: 2
- FCS_COP: 15
- FCS_COP.1: 16
- FCS_COP.1.1: 3
- FCS_RND: 1
- FCS_RND.1: 2
- FCS_RND.1.1: 1
- FDP:
- FDP_ACC: 14
- FDP_ACC.1: 23
- FDP_ACC.1.1: 2
- FDP_ACC.2: 2
- FDP_ACC.2.1: 1
- FDP_ACC.2.2: 2
- FDP_ACF: 13
- FDP_ACF.1: 41
- FDP_ACF.1.1: 3
- FDP_ACF.1.2: 4
- FDP_ACF.1.3: 4
- FDP_ACF.1.4: 4
- FDP_ETC: 2
- FDP_ETC.1: 3
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_IFC.1: 10
- FDP_ITC: 2
- FDP_ITC.1: 12
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 4
- FDP_RIP: 2
- FDP_RIP.1: 4
- FDP_RIP.1.1: 2
- FDP_SDI: 6
- FDP_SDI.1: 2
- FDP_SDI.2: 10
- FDP_SDI.2.1: 2
- FDP_SDI.2.2: 2
- FDP_UCT: 1
- FDP_UCT.1: 2
- FDP_UCT.1.1: 1
- FDP_UIT: 8
- FDP_UIT.1: 14
- FDP_UIT.1.1: 5
- FDP_UIT.1.2: 5
- FIA:
- FIA_AFL: 4
- FIA_AFL.1: 7
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 3
- FIA_ATD: 2
- FIA_ATD.1: 4
- FIA_ATD.1.1: 2
- FIA_UAU: 2
- FIA_UAU.1: 6
- FIA_UAU.1.1: 3
- FIA_UAU.1.2: 4
- FIA_UAU.4: 2
- FIA_UAU.4.1: 1
- FIA_UID: 2
- FIA_UID.1: 9
- FIA_UID.1.1: 2
- FIA_UID.1.2: 4
- FMT:
- FMT_LIM: 1
- FMT_LIM.1: 5
- FMT_LIM.1.1: 1
- FMT_LIM.2: 5
- FMT_LIM.2.1: 1
- FMT_MOF: 1
- FMT_MOF.1: 2
- FMT_MOF.1.1: 1
- FMT_MSA: 8
- FMT_MSA.1: 10
- FMT_MSA.1.1: 2
- FMT_MSA.2: 11
- FMT_MSA.2.1: 1
- FMT_MSA.3: 6
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 2
- FMT_MTD: 7
- FMT_MTD.1: 9
- FMT_MTD.1.1: 2
- FMT_SMF: 2
- FMT_SMF.1: 10
- FMT_SMF.1.1: 2
- FMT_SMR: 3
- FMT_SMR.1: 11
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 4
- FPT:
- FPT_AMT: 1
- FPT_AMT.1: 5
- FPT_AMT.1.1: 1
- FPT_FLS: 2
- FPT_FLS.1: 6
- FPT_FLS.1.1: 2
- FPT_PHP: 2
- FPT_PHP.1: 2
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 2
- FPT_PHP.3: 4
- FPT_PHP.3.1: 2
- FPT_RVM: 1
- FPT_RVM.1: 2
- FPT_RVM.1.1: 1
- FPT_SEP: 1
- FPT_SEP.1: 2
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 2
- FPT_TST: 2
- FPT_TST.1: 8
- FPT_TST.1.1: 4
- FPT_TST.1.2: 4
- FPT_TST.1.3: 4
- FTP:
- FTP_ITC: 10
- FTP_ITC.1: 31
- FTP_ITC.1.1: 4
- FTP_ITC.1.2: 5
- FTP_ITC.1.3: 5
- FTP_TRP: 6
- FTP_TRP.1: 16
- FTP_TRP.1.1: 2
- FTP_TRP.1.2: 2
- FTP_TRP.1.3: 2
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN_CREDENTIALS_SECURE: 1
- A.LIMITED_FUNCTION: 1
- A.NO_THRU_TRAFFIC_PROTECTION: 1
- A.PHYSICAL_PROTECTION: 1
- A.REGULAR_UPDATES: 1
- A.RESIDUAL_INFORMATION: 1
- A.TRUSTED_ADMINISTRATOR: 1
- OE:
- OE.ADMIN_CREDENTIALS_SECURE: 1
- OE.NO_GENERAL_PURPOSE: 1
- OE.NO_THRU_TRAFFIC_PROTECTION: 1
- OE.PHYSICAL: 1
- OE.RESIDUAL_INFORMATION: 1
- OE.TRUSTED_ADMIN: 1
- OE.UPDATES: 1
- T:
- T.PASSWORD_CRACKING: 1
- T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
- T.SECURITY_FUNCTIONALITY_FAILURE: 1
- T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
- T.UNDETECTED_ACTIVITY: 1
- T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
- T.UPDATE_COMPROMISE: 1
- T.WEAK_AUTHENTICATION_ENDPOINTS: 1
- T.WEAK_CRYPTOGRAPHY: 1
|
- A:
- A.LEGITIMATE_ACTIVATION: 2
- A.SIG_PERS: 2
- OE:
- OE.CHECK_TRANSPORT_PROTECTION: 1
- OE.HI_VAD: 3
- OE.QESC_CHECK_SSCD: 2
- OE.QESC_CHECK_TRANSPORT_PROTECTION: 2
- OE.QESC_CHECK_USER_LEGITIMACY: 2
- OE.QESC_SECURE_PIN_PUK_HANDLING: 2
- OE.SIG_PERS: 2
- OT:
- OT.QESC_RAD_SECRECY: 1
- OT.QESC_TRSP_PROTECT: 2
- OT.SIG_PERS: 2
- R:
- T:
|
pdf_data/st_keywords/vendor |
|
- Infineon:
- NXP:
- NXP: 11
- NXP Semiconductors: 29
- Philips:
- Sagem:
|
pdf_data/st_keywords/eval_facility |
|
- SRC:
- SRC Security Research & Consulting: 1
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA2:
- SHA-384: 13
- SHA-512: 7
- SHA384: 1
|
- RIPEMD:
- RIPEMD-160: 1
- RIPEMD160: 1
- SHA:
- SHA1:
- SHA2:
- SHA-2: 7
- SHA-224: 1
- SHA-256: 10
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IPsec:
- SSH:
- TLS:
- DTLS:
- SSL:
- SSL: 3
- SSL 2.0: 1
- SSL 3.0: 1
- TLS:
- TLS: 55
- TLS 1.0: 1
- TLS 1.1: 1
- TLS 1.2: 2
- TLS v1.2: 3
- TLSv1.2: 2
- VPN:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 4
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 9
- Fault injection: 1
- malfunction: 2
- physical tampering: 6
- SCA:
- DPA: 10
- SPA: 10
- Timing Attacks: 2
- physical probing: 2
- side channel: 1
|
pdf_data/st_keywords/technical_report_id |
|
- BSI:
- BSI TR-03114: 1
- BSI TR-03115: 1
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-004-001: 1
- CCMB-2017-004-002: 1
- CCMB-2017-004-003: 1
- CCMB-2017-004-004: 1
- FIPS:
- FIPS 140-2: 1
- FIPS 186-4: 3
- FIPS PUB 180-4: 2
- FIPS PUB 186-4: 7
- FIPS PUB 198-1: 1
- ISO:
- ISO/IEC 10116:2017: 1
- ISO/IEC 14888-3: 2
- ISO/IEC 18031:2011: 4
- ISO/IEC 19772:2009: 1
- RFC:
- RFC 2818: 2
- RFC 2986: 2
- RFC 3526: 8
- RFC 3986: 2
- RFC 4253: 1
- RFC 5077: 1
- RFC 5246: 2
- RFC 5280: 6
- RFC 5289: 4
- RFC 5905: 2
- RFC 6125: 1
- X509:
|
- BSI:
- CC:
- CCIMB-2005-08-001: 1
- CCIMB-2005-08-002: 1
- CCIMB-2005-08-003: 1
- CCIMB-2005-08-004: 1
- ISO:
- ISO/IEC 11770-3: 1
- ISO/IEC 15408: 2
- ISO/IEC 7816-2: 1
- ISO/IEC 7816-4: 3
- ISO/IEC 7816-9: 1
- ISO/IEC 9796-2: 3
- ISO/IEC 9798-3: 1
- PKCS:
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- out of scope: 1
- the TOE’s management of the OTH or WDM Network. Therefore, interface E7 to these components is out of scope for the NDcPP and the present evaluation. This interface and components are included for: 1
|
|
pdf_data/st_metadata |
- /Author: McGeady, Megan [USA]
- /CreationDate: D:20240327164610-04'00'
- /Creator: Microsoft® Word for Microsoft 365
- /ModDate: D:20240327164610-04'00'
- /Producer: Microsoft® Word for Microsoft 365
- pdf_file_size_bytes: 1301155
- pdf_hyperlinks: https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0569, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0537, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0631, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0670, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0790, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0638, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0738, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0528, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0792, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0564, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0536, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0572, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0800, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0639, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0527, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0546, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0556, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0632, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0563, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0581, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0591, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0635, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0636, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0555, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0547, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0570, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0571, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0580, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0592
- pdf_is_encrypted: False
- pdf_number_of_pages: 70
|
- /Author: MICARDO, Karsten Klohs
- /BibPath: V:\\Security Team\\Zertifizierungen\\MICARDO_Evaluation\\MICV35_eHC8\\Bibliography\\
- /CreationDate: D:20100104144334+01'00'
- /Creator: Acrobat PDFMaker 8.0 for Word
- /Keywords: Security Target, MICARDO V3.5 R1.0 eHC V1.0 (QES komplettierbar), Common Criteria, Certification
- /ModDate: D:20100330140422+02'00'
- /OdsAcceptance: not applicable
- /OdsApproval: not applicable
- /OdsAuthor: Karsten Klohs
- /OdsCompany: Sagem ORGA GmbH
- /OdsCompanyCity: Paderborn
- /OdsConfidentiality:
- /OdsDocCatCombined: CSL (ST-Lite)
- /OdsDocCatLong: ST-Lite
- /OdsDocID: 3MIC3EVAL.CSL.0005
- /OdsDocPool: 3.000000
- /OdsNumber: 0005
- /OdsPPTCombined: MIC3EVAL (Micardo V3 Evaluierung)
- /OdsReviewProto: not applicable
- /OdsTitel: MICARDO V3.5 R1.0 eHC V1.0 (QES komplettierbar)
- /OdsVerDate: 04.01.2010
- /OdsVerID: V1.00
- /Producer: Acrobat Distiller 8.0.0 (Windows)
- /SourceModified: D:20100104134204
- /Subject: Security Target
- /Title: MICARDO V3.5 R1.0 eHC V1.0 (QES komplettierbar)
- pdf_file_size_bytes: 968586
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 134
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |