Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Thinklogical TLX320 Matrix Switch
SERTIT-076
cv act ePasslet/BAC v1.8
BSI-DSZ-CC-0798-2012
name Thinklogical TLX320 Matrix Switch cv act ePasslet/BAC v1.8
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme NO DE
not_valid_after 22.09.2021 01.09.2019
not_valid_before 22.09.2016 10.09.2012
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20160922%20Sertit-076%20CR%20v1.0%20Certification%20Report%20TLX320.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0798a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ThinklogicalSecurityTarget_1_3_TLX320.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0798b_pdf.pdf
manufacturer Thinklogical cv cryptovision GmbH
manufacturer_web https://www.thinklogical.com/ https://www.cryptovision.com
security_level EAL4 EAL4+, ALC_DVS.2
dgst a67b05a18bbe6cfc 1ecc1605bb86601a
heuristics/cert_id SERTIT-076 BSI-DSZ-CC-0798-2012
heuristics/cert_lab [] BSI
heuristics/extracted_sars ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ATE_DPT.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 ALC_LCD.2, ASE_INT.1, ALC_DVS.2, ASE_ECD.1, APE_ECD.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ADV_FSP.6, ALC_TAT.3, ALC_FLR.3, ATE_FUN.2, AGD_OPE.1, AGD_PRE.1, ATE_IND.3, APE_REQ.2, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_IMP.2, ALC_CMC.5, ASE_TSS.2, ASE_REQ.2, ATE_DPT.4, ADV_INT.3, APE_INT.1, APE_SPD.1, APE_OBJ.2, ASE_CCL.1, ADV_TDS.6, ATE_COV.3, ADV_SPM.1
heuristics/extracted_versions - 1.8
heuristics/report_references/directly_referenced_by {} BSI-DSZ-CC-0797-2012, BSI-DSZ-CC-0799-2012, BSI-DSZ-CC-0804-2012
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0710-2010, BSI-DSZ-CC-0709-2010, BSI-DSZ-CC-0797-2012, BSI-DSZ-CC-0633-2010, BSI-DSZ-CC-0675-2011, BSI-DSZ-CC-0730-2011, BSI-DSZ-CC-0674-2011, BSI-DSZ-CC-0804-2012, BSI-DSZ-CC-0555-2009, BSI-DSZ-CC-0404-2007, BSI-DSZ-CC-0799-2012, BSI-DSZ-CC-0410-2007
heuristics/report_references/indirectly_referenced_by {} BSI-DSZ-CC-0797-2012, BSI-DSZ-CC-0798-2012, BSI-DSZ-CC-0799-2012, BSI-DSZ-CC-0804-2012
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0710-2010, BSI-DSZ-CC-0439-2008, BSI-DSZ-CC-0709-2010, BSI-DSZ-CC-0797-2012, BSI-DSZ-CC-0633-2010, BSI-DSZ-CC-0675-2011, BSI-DSZ-CC-0609-2010, BSI-DSZ-CC-0730-2011, BSI-DSZ-CC-0608-2010, BSI-DSZ-CC-0798-2012, BSI-DSZ-CC-0674-2011, BSI-DSZ-CC-0417-2008, BSI-DSZ-CC-0804-2012, BSI-DSZ-CC-0555-2009, BSI-DSZ-CC-0404-2007, BSI-DSZ-CC-0799-2012, BSI-DSZ-CC-0410-2007
heuristics/scheme_data
  • category: Other Devices and Systems
  • certification_date: 22.09.2016
  • developer: Thinklogical
  • enhanced:
    • category: Other Devices and Systems
    • cert_id: SERTIT-076
    • certification_date: 22.09.2016
    • description: The TOE provides remote connections from a set of shared computers to a set of shared peripherals. The switching capability of the TOE is used to connect ports on a particular computer to a particular peripheral set. The corresponding electronic signal from a computer port is transformed into an optical signal by the Velocity extender, transmitted through an optical fiber, switched by the TOE to another optical fiber, and then transformed back to an electronic form by the Velocity extender. The resulting signal is used by the shared peripherals. The TOE provides a capability to dynamically change the switching configuration to connect a particular computer to a particular peripheral set. The TOE enforces secure separation of information flows corresponding to different switched connections. The corresponding Data Separation Security Policy is the main security feature of the TOE.
    • developer: Thinklogical
    • documents: frozendict({'cert': [frozendict({'href': 'https://sertit.no/getfile.php/135040-1607952626/SERTIT/Sertifikater/2016/76/20160922%20Sertit-076%20C%20v1.0.pdf'})], 'target': [frozendict({'href': 'https://sertit.no/getfile.php/135043-1607952629/SERTIT/Sertifikater/2016/76/ThinklogicalSecurityTarget_1_3_TLX320.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/135046-1607952632/SERTIT/Sertifikater/2016/76/20160922%20Sertit-076%20CR%20v1.0%20Certification%20Report%20TLX320.pdf'})]})
    • evaluation_facility: Norconsult AS
    • level: EAL 4
    • mutual_recognition: CCRA, SOG-IS
    • product: TLX320 Matrix Switch Chassis (TLX-MSC-000320 Rev A), TLX48 / TLX320 Matrix Switch Data Input and Output Card, 16 Ports, SFP+, Multi-Mode (TLX-MSD-M00016 Rev A), Single Mode (TLX-MSDS00016 Rev A), Velocity Matrix Switch 320 Data Input Retimer Card, 16 Ports, SFP+, Multi-Mode (VXM-D00T16 Rev A), Single Mode (VXM-D0ST16 Rev A)
  • product: Thinklogical TLX320 Matrix Switch
  • url: https://sertit.no/certified-products/product-archive/thinklogical-tlx320-matrix-switch
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0710-2010, BSI-DSZ-CC-0709-2010, BSI-DSZ-CC-0633-2010, BSI-DSZ-CC-0675-2011, BSI-DSZ-CC-0730-2011, BSI-DSZ-CC-0555-2009, BSI-DSZ-CC-0404-2007, BSI-DSZ-CC-0674-2011, BSI-DSZ-CC-0410-2007
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0710-2010, BSI-DSZ-CC-0709-2010, BSI-DSZ-CC-0633-2010, BSI-DSZ-CC-0675-2011, BSI-DSZ-CC-0730-2011, BSI-DSZ-CC-0555-2009, BSI-DSZ-CC-0404-2007, BSI-DSZ-CC-0674-2011, BSI-DSZ-CC-0410-2007
heuristics/protection_profiles {} 60455fc9564e2545
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0055b.pdf
pdf_data/report_filename 20160922 Sertit-076 CR v1.0 Certification Report TLX320.pdf 0798a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cert_id: BSI-DSZ-CC-0798-2012
    • cert_item: cv act ePasslet/BAC v1.8
    • cert_lab: BSI
    • developer: cv cryptovision GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
pdf_data/report_keywords/cc_cert_id
  • NO:
    • SERTIT-076: 16
  • DE:
    • BSI-DSZ-CC-0404: 1
    • BSI-DSZ-CC-0404-2007: 4
    • BSI-DSZ-CC-0410: 1
    • BSI-DSZ-CC-0410-2007: 2
    • BSI-DSZ-CC-0410-2010: 2
    • BSI-DSZ-CC-0555: 1
    • BSI-DSZ-CC-0555-2009: 3
    • BSI-DSZ-CC-0633: 1
    • BSI-DSZ-CC-0633-2010: 3
    • BSI-DSZ-CC-0674: 1
    • BSI-DSZ-CC-0674-2011: 5
    • BSI-DSZ-CC-0675: 1
    • BSI-DSZ-CC-0675-2011: 4
    • BSI-DSZ-CC-0709: 1
    • BSI-DSZ-CC-0709-2010: 4
    • BSI-DSZ-CC-0710: 1
    • BSI-DSZ-CC-0710-2010: 4
    • BSI-DSZ-CC-0730: 1
    • BSI-DSZ-CC-0730-2011: 5
    • BSI-DSZ-CC-0797-2012: 4
    • BSI-DSZ-CC-0798-2012: 26
    • BSI-DSZ-CC-0799-2012: 2
    • BSI-DSZ-CC-0804-2012: 3
  • NL:
    • CC-0555-2009: 1
    • CC-0633-2010: 1
    • CC-0675-2011: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0055-2009: 5
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 4: 19
    • EAL1: 1
    • EAL7: 1
  • EAL:
    • EAL 4: 7
    • EAL 4 augmented: 3
    • EAL 5: 3
    • EAL1: 7
    • EAL2: 3
    • EAL3: 4
    • EAL4: 7
    • EAL5: 7
    • EAL5+: 1
    • EAL6: 4
    • EAL7: 4
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 1
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 2
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 2
    • ALC_CMS.5: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 2
    • ALC_DVS: 1
    • ALC_DVS.1: 2
    • ALC_DVS.2: 6
    • ALC_FLR: 1
    • ALC_FLR.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 2
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 2
    • ALC_TAT.2: 1
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 1
    • ATE_DPT.4: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 1
pdf_data/report_keywords/cc_sfr
  • FDP:
    • FDP_ETC.1: 1
    • FDP_IFC.1: 1
    • FDP_IFF.1: 1
    • FDP_ITC.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.EMISSIO: 1
    • A.MANAGE: 1
    • A.NOEVIL: 1
    • A.PHYSICAL: 1
    • A.SCENARIO: 1
  • O:
    • O.CONF: 1
    • O.CONNECT: 1
  • OE:
    • OE.EMISSIO: 1
    • OE.MANAGE: 1
    • OE.NOEVIL: 1
    • OE.PHYSICAL: 1
    • OE.SCENARIO: 1
  • T:
    • T.ATTACK: 1
    • T.INSTALL: 1
    • T.RESIDUAL: 1
    • T.STATE: 1
  • OE:
    • OE.MRTD_: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 3
  • NXP:
    • NXP: 27
    • NXP Semiconductors: 15
pdf_data/report_keywords/eval_facility
  • Norconsult:
    • Norconsult AS: 1
  • BrightSight:
    • Brightsight: 3
  • TUV:
    • TÜV Informationstechnik: 3
    • TÜViT: 3
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • 3DES:
      • Triple-DES: 2
    • DES:
      • DES: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
      • SHA1: 1
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 3
pdf_data/report_keywords/crypto_protocol
  • PACE:
    • PACE: 3
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 1
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 2
pdf_data/report_keywords/side_channel_analysis
  • other:
    • JIL: 4
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 27: 1
    • BSI 7125: 2
    • BSI 7148: 1
pdf_data/report_keywords/os_name
  • JCOP:
    • JCOP 2: 8
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • ISO:
    • ISO/IEC 15408: 4
  • BSI:
    • AIS 20: 2
    • AIS 25: 2
    • AIS 26: 2
    • AIS 31: 2
    • AIS 32: 1
    • AIS 34: 3
    • AIS 35: 2
    • AIS 36: 2
    • AIS 38: 2
    • AIS36: 4
  • FIPS:
    • FIPS PUB 180-4: 1
    • FIPS PUB 46-3: 1
  • ICAO:
    • ICAO: 11
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Report, cv act ePasslet/BACv1 v1.8, Version 7, Date 22.08.2012, TÜV Informationstechnik GmbH (confidential document) [9] Certification Report - BSI-DSZ-CC-0404-2007 for NXP Secure Smart Card Controller P5CD040V0B: 1
  • OutOfScope:
    • out of scope: 1
    • variants of this composite TOE provide MIFARE functionality; please note that this functionality is out of scope of the TOE’s security functionality. The MRTD in context of this security target contains (i: 1
pdf_data/report_metadata
  • /AAPL:Keywords: ['ugradert']
  • /Author: Rage, Arne Høye
  • /CreationDate: D:20160922162516Z00'00'
  • /Creator: Microsoft Word
  • /Keywords: ugradert
  • /ModDate: D:20160922162516Z00'00'
  • /Producer: Mac OS X 10.11.6 Quartz PDFContext
  • /Title: tittel
  • pdf_file_size_bytes: 875983
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 17
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20121009140144+02'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, BSI-DSZ-CC-0798-2012, cv act ePasslet/BAC v1.8, cv cryptovision GmbH"
  • /ModDate: D:20121026093136+02'00'
  • /Producer: LibreOffice 3.5
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0798-2012
  • pdf_file_size_bytes: 1046730
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 42
pdf_data/st_filename ThinklogicalSecurityTarget_1_3_TLX320.pdf 0798b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0404-2007: 2
    • BSI-DSZ-CC-0410-2007: 1
    • BSI-DSZ-CC-0410-2010: 1
    • BSI-DSZ-CC-0555-2009: 2
    • BSI-DSZ-CC-0633-2010: 2
    • BSI-DSZ-CC-0674-2011: 2
    • BSI-DSZ-CC-0675-2011: 2
    • BSI-DSZ-CC-0709-2010: 2
    • BSI-DSZ-CC-0710-2010: 2
    • BSI-DSZ-CC-0730-2011: 2
    • BSI-DSZ-CC-0798: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP0055: 3
    • BSI-PP-0002-2001: 1
    • BSI-PP-0035-2007: 1
    • BSI-PP-0055: 1
    • BSI-PP-0056: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 4: 1
    • EAL4: 7
  • EAL:
    • EAL 4+: 1
    • EAL 5+: 2
    • EAL4: 7
    • EAL4 augmented: 1
    • EAL4+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.4: 2
    • ADV_IMP.1: 2
    • ADV_TDS.3: 2
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.4: 2
    • ALC_CMS.4: 2
    • ALC_DEL.1: 2
    • ALC_DVS.1: 2
    • ALC_LCD.1: 2
    • ALC_TAT.1: 2
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.2: 2
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_VAN.3: 2
  • ADV:
    • ADV_ARC.1: 2
  • ALC:
    • ALC_DVS: 1
    • ALC_DVS.2: 4
pdf_data/st_keywords/cc_sfr
  • FDP:
    • FDP_ETC.1: 7
    • FDP_ETC.1.1: 1
    • FDP_ETC.1.2: 1
    • FDP_IFC.1: 7
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 7
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_ITC.1: 7
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
  • FMT:
    • FMT_MSA.3: 3
  • FAU:
    • FAU_ARP: 1
    • FAU_GEN: 1
    • FAU_SAA.1: 1
    • FAU_SAS: 7
    • FAU_SAS.1: 13
    • FAU_SAS.1.1: 2
  • FCS:
    • FCS_CKM: 3
    • FCS_CKM.1: 28
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 3
    • FCS_CKM.3: 1
    • FCS_CKM.4: 23
    • FCS_CKM.4.1: 4
    • FCS_COP: 52
    • FCS_COP.1: 19
    • FCS_LIM: 1
    • FCS_RND: 7
    • FCS_RND.1: 15
    • FCS_RND.1.1: 3
    • FCS_RNG.1: 1
  • FDP:
    • FDP_ACC: 5
    • FDP_ACC.1: 18
    • FDP_ACC.1.1: 3
    • FDP_ACF: 6
    • FDP_ACF.1: 11
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 4
    • FDP_ACF.1.3: 3
    • FDP_ACF.1.4: 4
    • FDP_ETC.1: 1
    • FDP_IFC: 2
    • FDP_IFC.1: 4
    • FDP_IFF: 1
    • FDP_ITC: 2
    • FDP_ITC.1: 11
    • FDP_ITC.2: 10
    • FDP_ITT: 1
    • FDP_RIP.1: 1
    • FDP_ROL: 1
    • FDP_SDI.2: 1
    • FDP_UCT: 2
    • FDP_UCT.1: 11
    • FDP_UCT.1.1: 3
    • FDP_UIT: 3
    • FDP_UIT.1: 10
    • FDP_UIT.1.1: 3
    • FDP_UIT.1.2: 2
  • FIA:
    • FIA_AFL: 3
    • FIA_AFL.1: 8
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_ATD: 1
    • FIA_SOS.2: 1
    • FIA_UAU: 8
    • FIA_UAU.1: 11
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UAU.4: 15
    • FIA_UAU.4.1: 2
    • FIA_UAU.5: 9
    • FIA_UAU.5.1: 4
    • FIA_UAU.5.2: 6
    • FIA_UAU.6: 12
    • FIA_UAU.6.1: 2
    • FIA_UID: 3
    • FIA_UID.1: 12
    • FIA_UID.1.1: 2
    • FIA_UID.1.2: 1
    • FIA_USB.1: 1
  • FMT:
    • FMT_LIM: 12
    • FMT_LIM.1: 26
    • FMT_LIM.1.1: 6
    • FMT_LIM.2: 23
    • FMT_LIM.2.1: 7
    • FMT_MSA: 6
    • FMT_MSA.1: 1
    • FMT_MSA.3: 3
    • FMT_MTD: 30
    • FMT_MTD.1: 15
    • FMT_MTD.3: 1
    • FMT_SMF: 1
    • FMT_SMF.1: 22
    • FMT_SMF.1.1: 2
    • FMT_SMR: 5
    • FMT_SMR.1: 21
    • FMT_SMR.1.1: 4
    • FMT_SMR.1.2: 4
  • FPR:
    • FPR_UNO.1: 1
  • FPT:
    • FPT_FLS: 3
    • FPT_FLS.1: 11
    • FPT_FLS.1.1: 3
    • FPT_ITT: 1
    • FPT_PHP: 1
    • FPT_PHP.1: 1
    • FPT_PHP.3: 13
    • FPT_PHP.3.1: 2
    • FPT_RCV: 2
    • FPT_RVM.1: 1
    • FPT_SEP.1: 1
    • FPT_TDC.1: 1
    • FPT_TST.1: 12
    • FPT_TST.1.1: 2
    • FPT_TST.1.2: 2
    • FPT_TST.1.3: 2
  • FRU:
    • FRU_FLT: 1
  • FTP:
    • FTP_ITC: 1
    • FTP_ITC.1: 5
    • FTP_TRP.1: 5
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 1
    • A.EMISSION: 2
    • A.MANAGE: 2
    • A.NOEVIL: 2
    • A.PHYSICAL: 2
    • A.SCENARIO: 2
  • O:
    • O.CONF: 7
    • O.CONNECT: 3
    • O.CRYPTOGRAPHY: 1
  • OE:
    • OE.EMISSION: 2
    • OE.INSTAL: 1
    • OE.MANAGE: 4
    • OE.NOEVIL: 2
    • OE.PHYSICAL: 2
    • OE.SCENARIO: 2
  • T:
    • T.ATTACK: 3
    • T.COMINT: 1
    • T.INSTALL: 3
    • T.RESIDUAL: 3
    • T.STATE: 3
  • A:
    • A.USE_DIAG: 1
  • O:
    • O.ALARM: 1
    • O.CARD-MANAGEMENT: 1
    • O.CIPHER: 1
    • O.FAULT_PROTECT: 1
    • O.FIREWALL: 1
    • O.IDENTIFICATION: 1
    • O.KEY-MNGT: 1
    • O.MF_FW: 1
    • O.OPERATE: 1
    • O.OS_DECEIVE: 1
    • O.PHYSICAL: 1
    • O.PIN-MNGT: 1
    • O.PROTECT_DATA: 1
    • O.REALLOCATION: 1
    • O.RESOURCES: 1
    • O.RND: 1
    • O.SCP: 3
    • O.SHRD_VAR_CONFID: 1
    • O.SHRD_VAR_INTEG: 1
    • O.SID: 1
    • O.SIDE_CHANNEL: 1
    • O.TRANSACTION: 1
  • OE:
    • OE.MRTD_: 1
  • T:
    • T.ACCESS_DATA: 1
    • T.CONFID-JCSCODE: 1
    • T.CONFID-JCSDATA: 1
    • T.CONFIDAPPLI-DATA: 1
    • T.EXE-CODE: 2
    • T.FAULT: 1
    • T.INTEG-APPLICODE: 1
    • T.INTEG-APPLIDATA: 1
    • T.INTEG-JCSCODE: 1
    • T.INTEG-JCSDATA: 1
    • T.LEAKAGE: 1
    • T.OS_DECEIVE: 1
    • T.OS_OPERATE: 1
    • T.PHYSICAL: 1
    • T.RESOURCES: 1
    • T.RND: 1
    • T.SID: 2
pdf_data/st_keywords/vendor
  • NXP:
    • NXP: 24
    • NXP Semiconductors: 8
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 8
      • AES-: 1
  • DES:
    • 3DES:
      • TDES: 1
      • Triple-DES: 19
    • DES:
      • DES: 7
    • Lucifer:
      • Lucifer: 1
  • constructions:
    • MAC:
      • CMAC: 2
      • KMAC: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 1
  • RIPEMD:
    • RIPEMD-160: 1
  • SHA:
    • SHA1:
      • SHA-1: 5
    • SHA2:
      • SHA-224: 2
      • SHA-256: 1
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key exchange: 1
  • MAC:
    • MAC: 9
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 1
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 3
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 4
    • Physical Tampering: 5
    • Physical tampering: 1
    • fault injection: 1
    • malfunction: 7
    • physical tampering: 1
  • SCA:
    • DPA: 2
    • SPA: 1
    • physical probing: 5
    • timing attacks: 1
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/os_name
  • JCOP:
    • JCOP 2: 3
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.COM: 12
    • EF.DG1: 32
    • EF.DG13: 3
    • EF.DG14: 3
    • EF.DG15: 1
    • EF.DG16: 32
    • EF.DG2: 9
    • EF.DG3: 9
    • EF.DG4: 8
    • EF.DG5: 8
    • EF.SOD: 13
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS 20: 2
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 2
  • FIPS:
    • FIPS 180-2: 2
    • FIPS 197: 1
    • FIPS 46-3: 5
    • FIPS PUB 46-3: 1
    • FIPS180-2: 1
    • FIPS197: 1
    • FIPS46-3: 3
  • ICAO:
    • ICAO: 10
  • ISO:
    • ISO/IEC 7816-2: 1
    • ISO/IEC 7816-4: 1
  • PKCS:
    • PKCS#15: 3
  • RFC:
    • RFC3369: 1
  • X509:
    • X.509: 1
pdf_data/st_keywords/javacard_packages
  • com:
    • com.cryptovision: 5
    • com.cryptovision.applet: 2
    • com.cryptovision.eid: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • 1 No correspondence Out of scope No contradiction to this ST T.EXE-CODE.2 No correspondence Out of scope No contradiction to this ST T.RESOURCES No correspondence Out of scope No contradiction to this ST: 1
    • JCOP AID management) No contradiction to this ST FIA_USB.1 No correspondence Out of scope (JCOP applet manage- ment: 1
    • JCOP LF state handling) No contradiction to this ST FMT_SMF.1 No correspondence Out of scope (JCOP applet handling: 1
    • JCOP access control mechanisms) No contradiction to this ST FDP_ACF.1/CMGR No correspondence Out of scope (JCOP access control mechanisms: 1
    • JCOP access control mechanisms) No contradiction to this ST FDP_ETC.1 No correspondence Out of scope (JCOP data control mech- anisms: 1
    • JCOP data control mech- anisms) No contradiction to this ST FDP_IFC.1/JCVM No correspondence Out of scope (refers to Virtual Ma- chine) No contradiction to this ST FDP_IFC.1/SCP No correspondence No: 1
    • JCOP firewall mecha- nism) No contradiction to this ST FDP_ACF.1/FIREWALL No correspondence Out of scope (JCOP access control mechanisms) No contradiction to this ST FDP_ACF.1/CMGR No correspondence Out: 1
    • JCOP firewall mecha- nism) No contradiction to this ST FMT_MSA.2/JCRE No correspondence Out of scope (JCOP object handling: 1
    • JCOP firewall mecha- nism) No contradiction to this ST FMT_MSA.3/CMGR No correspondence Out of scope (JCOP firewall mecha- nism: 1
    • JCOP firewall mecha- nism) No contradiction to this ST FMT_MSA.3/SCP No correspondence Out of scope (JCOP firewall mecha- nism) No contradiction to this ST FMT_MTD.1/JCRE FMT_MTD.1, FMT_MTD.1/INI_ENA: 1
    • JCOP memory manage- ment) No contradiction to this ST FDP_ACC.2/FIREWALL No correspondence Out of scope (JCOP firewall mecha- nism: 1
    • JCOP object handling) No contradiction to this ST FMT_MSA.3/FIREWALL No correspondence Out of scope (JCOP firewall mecha- nism) No contradiction to this ST FMT_MSA.3/CMGR No correspondence Out of: 1
    • JCOP specific roles) No contradiction to this ST FMT_SMR.1/CMGR No correspondence Out of scope (JCOP specific roles: 1
    • LC state before Applet instan- tiation No contradiction to this ST FDP_ACC.1/SCP No correspondence Out of scope (JCOP memory manage- ment) No contradiction to this ST FDP_ACC.2/FIREWALL No correspondence Out of: 1
    • LC state before Applet instan- tiation No contradiction to this ST FIA_UID.2/AID No correspondence Out of scope (JCOP AID management) No contradiction to this ST FIA_USB.1 No correspondence Out of scope (JCOP: 1
    • No contradiction to this ST FIA: Identification and Authentication FIA_AFL.1/PIN No correspondence Out of scope (no PINs used within ap- plet) No contradiction to this ST FIA_AFL.1/CMGR No correspondence Out of: 1
    • No contradiction to this ST T.SID.1 No correspondence Out of scope No contradiction to this ST T.SID.2 No correspondence Out of scope No contradiction to this ST T: 1
    • No correspondence Out of scope No contradiction to this ST O.OPERATE No correspondence Out of scope No contradiction to this ST O.RESOURCES No correspondence Out of scope cv act ePasslet/BAC: 1
    • No correspondence Out of scope No contradiction to this ST O.SCP.RECOVERY No correspondence Out of scope No contradiction to this ST O.SCP.SUPPORT No correspondence Out of scope No contradiction to this: 1
    • O.CIPHER No correspondence Out of scope No contradiction to this ST O.PIN-MNGT No correspondence Out of scope No contradiction to this ST O.KEY-MNGT No correspondence Out of scope No contradiction to this ST O: 1
    • O.PHYSICAL OT.Prot_Phys-Tamper O.IDENTIFICATION OT.Identification O.RND No correspondence Out of scope No contradiction to this ST O.SID No correspondence Out of scope No contradiction to this ST O: 1
    • O.SCP.IC No correspondence Out of scope No contradiction to this ST Table 4: Relevant platform objectives and their correspondence 2.2.4: 1
    • O.SHRD_VAR_CONFID No correspondence Out of scope No contradiction to this ST O.SHRD_VAR_INTEG No correspondence Out of scope No contradiction to: 1
    • Out of scope: 65
    • Out of scope (JCOP internal) No contradiction to this ST Table 3: Relevant platform SFRs and their: 1
    • Platform SFR Correspondence in this ST References/Remarks FDP_ROL.1/FIREWALL No correspondence Out of scope (refers to Virtual Ma- chine) No contradiction to this ST FDP_SDI.2 No correspondence Out of scope: 1
    • Relevant Platform SFR Correspondence in this ST References/Remarks FMT_MSA.1/CMGR No correspondence Out of scope (JCOP firewall mecha- nism) No contradiction to this ST FMT_MSA.2/JCRE No correspondence Out of: 1
    • ST O.ALARM No correspondence Out of scope No contradiction to this ST O.TRANSACTION No correspondence Out of scope No contradiction to this: 1
    • ST References/Remarks T.LEAKAGE T.Information_Leakage T.FAULT T.Malfunction T.RND No correspondence Out of scope No contradiction to this ST T.PHYSICAL T.Phys-Tamper T.CONFID-JCSCODE No correspondence Out of: 1
    • ST T.INTEG-JCSCODE No correspondence Out of scope No contradiction to this ST T.INTEG-APPLIDATA T.Forgery T.INTEG-JCSDATA No correspondence Out of: 1
    • The platform SFR leads to the fulfill- ment of these SFR of this ST. FMT_MTD.3 No correspondence Out of scope (JCOP LF state handling) No contradiction to this ST FMT_SMF.1 No correspondence Out of scope (JCOP: 1
    • The requirement in this ST is equiva- lent to parts of the platform ST. FCS_CKM.2 No correspondence Out of scope (managed within JCOP) No contradiction to this ST FCS_CKM.3 No correspondence Out of scope (managed: 1
    • data control mech- anisms) No contradiction to this ST FDP_ITT.1/SCP No correspondence Out of scope (platform internal data transfer) No contradiction to this ST FDP_RIP.1 FCS_CKM.4 Relied on for key: 1
    • equivalent. No contradiction to the ST. FRU: Resource Utilisation FRU_FLT.2/SCP No correspondence Out of scope (JCOP internal) No contradiction to this ST FTP: Trusted Path/Channels FTP_ITC.1/CMGR No: 1
    • for detecting security violations complement JCOP mechanisms FPT_ITT.1/SCP No correspondence Out of scope (platform internal data transfer) cv act ePasslet/BAC Security Target 18 of 75 Relevant Platform: 1
    • handling) No contradiction to this ST FMT_SMR.1/JCRE No correspondence Out of scope (JCOP specific roles) No contradiction to this ST FMT_SMR.1/CMGR No correspondence Out of scope: 1
    • in this ST References/Remarks No contradiction to this ST FPT_PHP.1 No correspondence Out of scope (hardware mechanism) No contradiction to this ST FPT_PHP.3/SCP FPT_PHP.3 The SFRs are identical: 1
    • in this ST References/Remarks No contradiction to this ST O.FIREWALL No correspondence Out of scope No contradiction to this ST O.REALLOCATION No correspondence Out of scope No contradiction to this: 1
    • in this ST References/Remarks T.ACCESS_DATA T.Eavesdropping T.OS_OPERATE No correspondence Out of scope No contradiction to this ST T.OS_DECEIVE No correspondence Out of scope No contradiction to this ST: 1
    • is refinement of the platform SFR. No contradictions to this ST. FMT_MSA.1/JCRE No correspondence Out of scope (JCOP firewall mecha- nism) No contradiction to this ST cv act ePasslet/BAC Security Target 17 of: 1
    • managed within JCOP) No contradiction to this ST FCS_CKM.3 No correspondence Out of scope (managed within JCOP: 1
    • no PINs used within ap- plet) No contradiction to this ST FIA_AFL.1/CMGR No correspondence Out of scope (refers to card manager: 1
    • out of scope: 1
    • refers to Virtual Ma- chine) No contradiction to this ST FDP_ITC.1 No correspondence Out of scope (JCOP data control mech- anisms: 1
    • refers to Virtual Ma- chine) No contradiction to this ST FDP_SDI.2 No correspondence Out of scope (JCOP internal data integ- rity protection: 1
    • refers to card manager) No contradiction to this ST FIA_ATD.1/AID No correspondence Out of scope (JCOP AID management) No contradiction to this ST FIA_UAU.1 No correspondence Refers to LC state: 1
    • scope (JCOP access control mechanisms) No contradiction to this ST FDP_ACF.1/SCP No correspondence Out of scope (JCOP access control mechanisms) No contradiction to this ST FDP_ETC.1 No correspondence Out of: 1
    • specific roles) No contradiction to this ST FPR: Privacy FPR_UNO.1 No correspondence Out of scope (JCOP package separa- tion) No contradiction to this ST FPT: Protection of the TSF FPT_EMSEC.1: 1
    • to this ST FDP_IFF.1/JCVM No correspondence Out of scope (refers to Virtual Ma- chine) No contradiction to this ST FDP_ITC.1 No correspondence Out of scope: 1
    • to this ST T.CONFIDAPPLI-DATA T.Information_Leakage T.CONFID-JCSDATA No correspondence Out of scope No contradiction to this ST T.INTEG-APPLICODE No correspondence Out of scope No contradiction to: 1
    • variants of this composite TOE provide MIFARE functionality; please note that this functionality is out of scope of the TOE’s security functionality claimed by this Security Target. 1.3.3 TOE usage and security: 1
pdf_data/st_metadata
  • /Author: MICHELE ROBERTS
  • /CreationDate: D:20160922164335+00'00'
  • /Creator: Microsoft Word
  • /ModDate: D:20160922164335+00'00'
  • /Title:
  • pdf_file_size_bytes: 487151
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 22
  • /Author: cryptovision GmbH
  • /CreationDate: D:20120816153349+02'00'
  • /Creator: Microsoft® Office Word 2007
  • /Keywords: ePasslet Suite, ICAO LDS, Basic Access Control
  • /ModDate: D:20121019160104+02'00'
  • /Producer: Microsoft® Office Word 2007
  • /Subject: Common Criteria Certification BSI-DSZ-CC-0798
  • /Title: Security Target - cv act ePasslet/BAC v1.8
  • pdf_file_size_bytes: 1730732
  • pdf_hyperlinks: file:///C:/tzeggel/Desktop/glossar.htm%23aes
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 75
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different