name |
AR-FR24 VERSION M.10 |
Aruba Mobility Controllers and Access Points 6.3.1.5 |
category |
Other Devices and Systems |
Access Control Devices and Systems |
scheme |
JP |
US |
status |
archived |
archived |
not_valid_after |
07.10.2013 |
31.05.2018 |
not_valid_before |
16.11.2007 |
22.10.2014 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10569-ci.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0123_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10569-vr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0123_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10569-st.pdf |
manufacturer |
Sharp Corporation |
Aruba Networks |
manufacturer_web |
https://sharp-world.com/ |
https://www.arubanetworks.com |
security_level |
EAL3+, ADV_SPM.1 |
{} |
dgst |
a62ce002e7469a17 |
a6e7932133b950a9 |
heuristics/cert_id |
JISEC-CC-CRP-C0123 |
CCEVS-VR-VID-10569-2014 |
heuristics/cert_lab |
[] |
US |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, AVA_MSU.1, ATE_DPT.1, AVA_SOF.1, ADV_SPM.1 |
ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, AGD_PRE.1 |
heuristics/extracted_versions |
10 |
6.3.1.5 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0123
- certification_date: 01.11.2007
- claim: EAL3+ ADV_SPM.1
- enhanced:
- assurance_level: EAL3+ADV_SPM.1
- cc_version: 2.3
- cert_link: https://www.ipa.go.jp/en/security/c0123_eimg.pdf
- description: PRODUCT DESCRIPTION The TOE is firmware to enhance security functionality of a Multi-Function Device (hereafter referred to as “MFD”). It is an option that implements security functions and controls the entire MFD when installed instead of the MFD standard firmware. As countermeasures against information leakage that residual image data in the MFD induce, the TOE has such security functions as cryptographic operation and data clear. The cryptographic operation function encrypts the image data of each fax job before spooled to the Flash memory in the MFD. The data clear function overwrites random or fixed values over the storage area that the spooled image data occupy when the MFD finishes or aborts each job of copy, printer, network scanner or fax functions.
- evaluation_facility: Japan Electronics and Information Technology Industries Association, Information Technology Security Center (JEITA ITSC)
- product: AR-FR24
- product_type: IT Product (data protection function in Multi Function Device)
- report_link: https://www.ipa.go.jp/en/security/c0123_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0123_est.pdf
- toe_version: VERSION M.10
- vendor: Sharp Corporation
- expiration_date: 01.10.2013
- supplier: Sharp Corporation
- toe_japan_name: AR-FR24 VERSION M.10
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0123_it7143.html
- toe_overseas_name: AR-FR24 VERSION M.10
|
- category: Wireless LAN
- certification_date: 22.10.2014
- evaluation_facility: Leidos Common Criteria Testing Laboratory
- expiration_date: 31.05.2018
- id: CCEVS-VR-VID10569
- product: Aruba Mobility Controllers and Access Points 6.3.1.5
- scheme: US
- url: https://www.niap-ccevs.org/product/10569
- vendor: Aruba, a Hewlett Packard Enterprise Company
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
85bd097f74f5a51e |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_WLAN_AS_V1.0.pdf |
pdf_data/cert_filename |
|
st_vid10569-ci.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- US:
- CCEVS-VR-VID10569-2014: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /CreationDate: D:20141028161446-04'00'
- /ModDate: D:20141028161548-04'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 178198
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
c0123_erpt.pdf |
st_vid10569-vr.pdf |
pdf_data/report_frontpage |
|
- US:
- cert_id: CCEVS-VR-VID10569-2014
- cert_item: Aruba Mobility Controller and Access Point Series
- cert_lab: US NIAP
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0123-01: 1
- Certification No. C0123: 1
|
- US:
- CCEVS-VR-VID10569-2014: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL3: 3
- EAL3 augmented: 2
|
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ATE:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 3
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
- IKE:
- IPsec:
- SSH:
- TLS:
- VPN:
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2005-08-001: 2
- CCMB-2005-08-002: 2
- CCMB-2005-08-003: 2
- CCMB-2005-08-004: 2
- ISO:
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- X509:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: IPA/JISEC
- /Company: IPA
- /CreationDate: D:20110526173838+09'00'
- /Creator: Word 用 Acrobat PDFMaker 8.1
- /Manager: IPA
- /ModDate: D:20110526173917+09'00'
- /Producer: Acrobat Distiller 8.2.3 (Windows)
- /Title: CRP-e
- pdf_file_size_bytes: 874958
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 24
|
- /Author: Leidos
- /Company: Leidos
- /CreationDate: D:20141028155456-04'00'
- /Creator: Acrobat PDFMaker 10.1 for Word
- /ModDate: D:20141028155507-04'00'
- /Producer: Adobe PDF Library 10.0
- /SourceModified: D:20141028195431
- /Subject: Aruba Mobility Controller and Access Points
- /Title: Validation Report
- /_NewReviewCycle:
- pdf_file_size_bytes: 124398
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
pdf_data/st_filename |
c0123_est.pdf |
st_vid10569-st.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_CAP.3: 4
- ACM_SCP.1: 2
- ADO:
- ADO_DEL.1: 3
- ADO_IGS.1: 4
- ADV:
- ADV_FSP.1: 12
- ADV_HLD.1: 3
- ADV_HLD.2: 2
- ADV_RCR.1: 4
- ADV_SPM.1: 13
- AGD:
- AGD_ADM.1: 9
- AGD_USR.1: 5
- ALC:
- ATE:
- ATE_COV.2: 3
- ATE_DPT.1: 3
- ATE_FUN: 1
- ATE_FUN.1: 4
- ATE_IND.2: 3
- AVA:
- AVA_MSU.1: 3
- AVA_SOF.1: 3
- AVA_VLA.1: 3
|
- ADV:
- AGD:
- AGD_OPE: 2
- AGD_OPE.1: 16
- AGD_PRE: 1
- AGD_PRE.1: 11
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 6
- ALC_CMS: 1
- ALC_CMS.1: 6
- ATE:
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 14
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 8
- FCS_COP.1: 14
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 4
- FDP_IFC.1: 3
- FDP_ITC.1: 2
- FDP_ITC.2: 2
- FDP_RIP.1: 11
- FDP_RIP.1.1: 1
- FIA:
- FIA_SOS.1: 13
- FIA_SOS.1.1: 1
- FIA_UAU.1: 2
- FIA_UAU.2: 17
- FIA_UAU.2.1: 1
- FIA_UAU.7: 13
- FIA_UAU.7.1: 1
- FIA_UID.1: 4
- FIA_UID.2: 12
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF.1: 12
- FMT_MOF.1.1: 1
- FMT_MSA.1: 4
- FMT_MSA.2: 17
- FMT_MSA.2.1: 1
- FMT_MTD.1: 10
- FMT_MTD.1.1: 1
- FMT_SMF.1: 11
- FMT_SMF.1.1: 1
- FMT_SMR.1: 17
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_RVM: 1
- FPT_RVM.1: 16
- FPT_RVM.1.1: 1
- FTP:
|
- FAU:
- FAU_GEN: 6
- FAU_GEN.1: 12
- FAU_GEN.1.1: 3
- FAU_GEN.1.2: 4
- FAU_GEN.2: 5
- FAU_GEN.2.1: 1
- FAU_SAR: 6
- FAU_SAR.1: 6
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 4
- FAU_SAR.2.1: 1
- FAU_SEL: 3
- FAU_SEL.1: 5
- FAU_SEL.1.1: 1
- FAU_STG: 3
- FAU_STG.1: 5
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG_EXT: 9
- FAU_STG_EXT.1: 5
- FAU_STG_EXT.1.1: 1
- FAU_STG_EXT.3: 5
- FAU_STG_EXT.3.1: 1
- FCS:
- FCS_CKM.1: 23
- FCS_CKM.1.1: 2
- FCS_CKM.2: 16
- FCS_CKM.2.1: 2
- FCS_CKM.4: 5
- FCS_CKM_EXT: 5
- FCS_CKM_EXT.4: 8
- FCS_CKM_EXT.4.1: 1
- FCS_COP.1: 49
- FCS_COP.1.1: 5
- FCS_RBG_EXT: 3
- FCS_RBG_EXT.1: 9
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 2
- FCS_SSH_EXT: 6
- FCS_SSH_EXT.1: 7
- FCS_SSH_EXT.1.1: 1
- FCS_SSH_EXT.1.2: 1
- FCS_SSH_EXT.1.3: 1
- FCS_SSH_EXT.1.4: 2
- FCS_SSH_EXT.1.5: 1
- FCS_SSH_EXT.1.6: 1
- FCS_SSH_EXT.1.7: 2
- FCS_SSH_EXT.1.8: 1
- FCS_SSH_EXT.1.9: 1
- FCS_TLS_EXT: 6
- FCS_TLS_EXT.1: 8
- FCS_TLS_EXT.1.1: 1
- FDP:
- FDP_ACC: 2
- FDP_ACC.1: 1
- FDP_ITC.1: 6
- FDP_ITC.2: 6
- FDP_RIP: 3
- FDP_RIP.2: 5
- FDP_RIP.2.1: 1
- FIA:
- FIA_AFL: 3
- FIA_AFL.1: 6
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_PMG_EXT: 5
- FIA_PMG_EXT.1: 4
- FIA_PMG_EXT.1.1: 1
- FIA_PSK_EXT: 3
- FIA_PSK_EXT.1: 6
- FIA_PSK_EXT.1.1: 1
- FIA_PSK_EXT.1.2: 2
- FIA_PSK_EXT.1.3: 2
- FIA_PSK_EXT.1.4: 1
- FIA_UAU: 5
- FIA_UAU.6: 6
- FIA_UAU.6.1: 1
- FIA_UAU.7: 5
- FIA_UAU.7.1: 1
- FIA_UAU_EXT: 4
- FIA_UAU_EXT.5: 5
- FIA_UAU_EXT.5.1: 1
- FIA_UAU_EXT.5.2: 1
- FIA_UIA.1: 1
- FIA_UIA_EXT: 4
- FIA_UIA_EXT.1: 12
- FIA_UIA_EXT.1.1: 1
- FIA_UIA_EXT.1.2: 1
- FIA_UID.1: 2
- FMT:
- FMT_MOF: 3
- FMT_MOF.1: 6
- FMT_MOF.1.1: 1
- FMT_MTD.1: 25
- FMT_MTD.1.1: 3
- FMT_SMF: 3
- FMT_SMF.1: 7
- FMT_SMF.1.1: 1
- FMT_SMR: 4
- FMT_SMR.1: 5
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FMT_SMR.1.3: 1
- FPT:
- FPT_FLS: 4
- FPT_FLS.1: 5
- FPT_FLS.1.1: 1
- FPT_ITT: 3
- FPT_ITT.1: 5
- FPT_ITT.1.1: 1
- FPT_RPL: 4
- FPT_RPL.1: 6
- FPT_RPL.1.1: 1
- FPT_RPL.1.2: 1
- FPT_STM: 4
- FPT_STM.1: 6
- FPT_STM.1.1: 1
- FPT_TST_EXT: 4
- FPT_TST_EXT.1: 5
- FPT_TST_EXT.1.1: 1
- FPT_TST_EXT.1.2: 1
- FPT_TUD_EXT: 4
- FPT_TUD_EXT.1: 6
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FRU:
- FRU_RSA: 3
- FRU_RSA.1: 5
- FRU_RSA.1.1: 1
- FTA:
- FTA_SSL: 8
- FTA_SSL.3: 5
- FTA_SSL.3.1: 1
- FTA_SSL.4: 5
- FTA_SSL.4.1: 1
- FTA_SSL_EXT: 5
- FTA_SSL_EXT.1: 5
- FTA_SSL_EXT.1.1: 1
- FTA_TAB: 3
- FTA_TAB.1: 7
- FTA_TAB.1.1: 1
- FTA_TSE: 3
- FTA_TSE.1: 5
- FTA_TSE.1.1: 1
- FTP:
- FTP_ITC: 5
- FTP_ITC.1: 5
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 5
- FTP_TRP.1: 5
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- O:
- O.REMOVE: 8
- O.RESIDUAL: 6
- OE:
- OE.ERASEALL: 3
- OE.OPERATE: 3
- T:
|
- A:
- A.NO_GENERAL_PURPOSE: 3
- A.NO_TOE_BYPASS: 2
- A.PHYSICAL: 3
- A.TRUSTED_ADMIN: 2
- O:
- O.AUTH_COMM: 5
- O.CRYPTOGRAPHIC_FUNCTIONS: 3
- O.DISPLAY_BANNER: 5
- O.FAIL_SECURE: 3
- O.PROTECTED_COMMUNICATIONS: 5
- O.PROTOCOLS: 3
- O.REPLAY_DETECTION: 5
- O.RESIDUAL_INFORMATION_CLEARI: 1
- O.RESIDUAL_INFORMATION_CLEARING: 2
- O.RESOURCE_AVAILABILITY: 5
- O.ROBUST_TOE_ACCESS: 3
- O.SESSION_LOCK: 5
- O.SYSTEM_MONITORING: 3
- O.TIME_STAMPS: 5
- O.TOE_ADMINISTRATION: 3
- O.TSF_SELF_TEST: 5
- O.VERIFIABLE_UPDATES: 3
- O.WIRELESS_CLIENT_ACCESS: 5
- OE:
- OE.NO_GENERAL_PURPOSE: 2
- OE.NO_TOE_BYPASS: 2
- OE.PHYSICAL: 2
- OE.TRUSTED_ADMIN: 2
- T:
- T.ADMIN_ERROR: 3
- T.RESOURCE_EXHAUSTION: 2
- T.TSF_FAILURE: 3
- T.UNAUTHORIZED_ACCESS: 2
- T.UNAUTHORIZED_UPDATE: 3
- T.UNDETECTED_ACTIONS: 2
- T.USER_DATA_REUSE: 3
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- AES:
- AES: 55
- AES-: 2
- AES256: 1
- DES:
- constructions:
- MAC:
- CMAC: 1
- HMAC: 26
- HMAC-SHA-256: 1
- HMAC-SHA-384: 1
|
pdf_data/st_keywords/asymmetric_crypto |
|
- ECC:
- FF:
- DH:
- DH: 14
- Diffie-Hellman: 14
- RSA:
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-256: 3
- SHA-384: 3
- SHA256: 5
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
- IKE:
- IKE: 20
- IKEv1: 30
- IKEv2: 18
- IPsec:
- SSH:
- TLS:
- TLS:
- TLS: 36
- TLS 1.0: 2
- TLS 1.1: 2
- TLS 1.2: 2
- VPN:
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 2
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 2
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
- TLS_RSA_WITH_AES_128_CBC_SHA: 2
- TLS_RSA_WITH_AES_128_CBC_SHA256: 2
- TLS_RSA_WITH_AES_256_CBC_SHA: 2
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2005-08-001: 1
- CCMB-2005-08-002: 1
- CCMB-2005-08-003: 1
- FIPS:
- ISO:
|
- FIPS:
- FIPS 140: 1
- FIPS 140-2: 9
- FIPS 186-2: 2
- FIPS 186-3: 2
- FIPS PUB 180-3: 1
- FIPS PUB 186-3: 7
- FIPS PUB 197: 4
- FIPS186: 1
- NIST:
- NIST SP 800-38A: 1
- NIST SP 800-38C: 4
- NIST SP 800-38D: 1
- NIST SP 800-56A: 1
- SP 800-38D: 1
- RFC:
- RFC 2246: 2
- RFC 2818: 1
- RFC 3164: 1
- RFC 3394: 2
- RFC 3602: 2
- RFC 4106: 2
- RFC 4109: 2
- RFC 4252: 1
- RFC 4253: 2
- RFC 4303: 3
- RFC 4306: 1
- RFC 4346: 2
- RFC 4868: 3
- RFC 4945: 4
- RFC 5246: 2
- RFC 5280: 4
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: K.Nakagawa
- /Company: Sharp Corporation
- /CreationDate: D:20110524153336+09'00'
- /Creator: Word 用 Acrobat PDFMaker 8.1
- /GTS_PDFXConformance: PDF/X-1a:2001
- /GTS_PDFXVersion: PDF/X-1:2001
- /ModDate: D:20110526172010+09'00'
- /Producer: Acrobat Distiller 8.2.6 (Windows)
- /Subject: AR-FR24
- /Title: Security Target
- /Trapped: /False
- pdf_file_size_bytes: 748188
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 31
|
|
state/cert/convert_garbage |
False |
True |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |