name |
Thinklogical TLX320 Matrix Switch |
SECORA™ ID v2.01 (SLJ38Gxymm1ap) |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
NO |
NL |
status |
archived |
active |
not_valid_after |
22.09.2021 |
20.12.2029 |
not_valid_before |
22.09.2016 |
20.12.2024 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2400062-01-Cert.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20160922%20Sertit-076%20CR%20v1.0%20Certification%20Report%20TLX320.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2400062-01-CR.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ThinklogicalSecurityTarget_1_3_TLX320.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2400062-01-ST_1.1.pdf |
manufacturer |
Thinklogical |
Infineon Technologies AG |
manufacturer_web |
https://www.thinklogical.com/ |
https://www.infineon.com/ |
security_level |
EAL4 |
EAL6+, ALC_FLR.1 |
dgst |
a67b05a18bbe6cfc |
e2c862ad74a05e1e |
heuristics/cert_id |
SERTIT-076 |
NSCIB-CC-2400062-01-CR |
heuristics/cert_lab |
[] |
|
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ATE_DPT.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ALC_TAT.2, ADV_TDS.4, ASE_REQ.2, ASE_CCL.1, ADV_SPM.1 |
heuristics/extracted_versions |
- |
2.01 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-1169-V4-2024 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1169-V4-2024, BSI-DSZ-CC-1169-V3-2024, BSI-DSZ-CC-1169-V2-2022 |
heuristics/scheme_data |
- category: Other Devices and Systems
- certification_date: 22.09.2016
- developer: Thinklogical
- enhanced:
- category: Other Devices and Systems
- cert_id: SERTIT-076
- certification_date: 22.09.2016
- description: The TOE provides remote connections from a set of shared computers to a set of shared peripherals. The switching capability of the TOE is used to connect ports on a particular computer to a particular peripheral set. The corresponding electronic signal from a computer port is transformed into an optical signal by the Velocity extender, transmitted through an optical fiber, switched by the TOE to another optical fiber, and then transformed back to an electronic form by the Velocity extender. The resulting signal is used by the shared peripherals. The TOE provides a capability to dynamically change the switching configuration to connect a particular computer to a particular peripheral set. The TOE enforces secure separation of information flows corresponding to different switched connections. The corresponding Data Separation Security Policy is the main security feature of the TOE.
- developer: Thinklogical
- documents: frozendict({'cert': [frozendict({'href': 'https://sertit.no/getfile.php/135040-1607952626/SERTIT/Sertifikater/2016/76/20160922%20Sertit-076%20C%20v1.0.pdf'})], 'target': [frozendict({'href': 'https://sertit.no/getfile.php/135043-1607952629/SERTIT/Sertifikater/2016/76/ThinklogicalSecurityTarget_1_3_TLX320.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/135046-1607952632/SERTIT/Sertifikater/2016/76/20160922%20Sertit-076%20CR%20v1.0%20Certification%20Report%20TLX320.pdf'})]})
- evaluation_facility: Norconsult AS
- level: EAL 4
- mutual_recognition: CCRA, SOG-IS
- product: TLX320 Matrix Switch Chassis (TLX-MSC-000320 Rev A), TLX48 / TLX320 Matrix Switch Data Input and Output Card, 16 Ports, SFP+, Multi-Mode (TLX-MSD-M00016 Rev A), Single Mode (TLX-MSDS00016 Rev A), Velocity Matrix Switch 320 Data Input Retimer Card, 16 Ports, SFP+, Multi-Mode (VXM-D00T16 Rev A), Single Mode (VXM-D0ST16 Rev A)
- product: Thinklogical TLX320 Matrix Switch
- url: https://sertit.no/certified-products/product-archive/thinklogical-tlx320-matrix-switch
|
|
heuristics/st_references/directly_referenced_by |
{} |
NSCIB-CC-2400063-01-CR |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-1169-V4-2024 |
heuristics/st_references/indirectly_referenced_by |
{} |
NSCIB-CC-2400063-01-CR |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1169-V4-2024 |
heuristics/protection_profiles |
{} |
7f886b64878b68c1 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0099V2b_pdf.pdf |
pdf_data/cert_filename |
|
NSCIB-CC-2400062-01-Cert.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- NL:
- NSCIB-2400062-01: 1
- NSCIB-CC-2400062-01: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL2: 1
- EAL6: 1
- EAL6 augmented: 1
- EAL7: 1
|
pdf_data/cert_keywords/cc_sar |
|
- ALC:
- ALC_FLR: 1
- ALC_FLR.1: 1
- ALC_FLR.3: 1
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
- Infineon:
- Infineon Technologies AG: 1
|
pdf_data/cert_keywords/eval_facility |
|
- BrightSight:
- SGS:
- SGS: 1
- SGS Brightsight: 1
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408-1: 2
- ISO/IEC 18045: 4
- ISO/IEC 18045:2008: 1
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author: Gebruiker
- /CreationDate: D:20241224155355+00'00'
- /Creator: Microsoft® Word 2021
- /ModDate: D:20241224155355+00'00'
- /Producer: Microsoft® Word 2021
- /Title: NSCIB Certificate
- pdf_file_size_bytes: 177857
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
20160922 Sertit-076 CR v1.0 Certification Report TLX320.pdf |
NSCIB-CC-2400062-01-CR.pdf |
pdf_data/report_frontpage |
|
- NL:
- cert_id: NSCIB-CC-2400062-01-CR
- cert_item: SECORA™ ID v2.01 (SLJ38Gxymm1ap
- cert_lab: SGS Brightsight B.V.
- developer: Infineon Technologies AG
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1169-V4-2024: 2
- NL:
- NSCIB-2400062-01: 1
- NSCIB-CC-2400062-01-CR: 12
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 4: 19
- EAL1: 1
- EAL7: 1
|
- EAL:
- EAL4: 1
- EAL6: 2
- EAL6 augmented: 2
- EAL6+: 3
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
|
pdf_data/report_keywords/cc_sfr |
- FDP:
- FDP_ETC.1: 1
- FDP_IFC.1: 1
- FDP_IFF.1: 1
- FDP_ITC.1: 1
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.EMISSIO: 1
- A.MANAGE: 1
- A.NOEVIL: 1
- A.PHYSICAL: 1
- A.SCENARIO: 1
- O:
- OE:
- OE.EMISSIO: 1
- OE.MANAGE: 1
- OE.NOEVIL: 1
- OE.PHYSICAL: 1
- OE.SCENARIO: 1
- T:
- T.ATTACK: 1
- T.INSTALL: 1
- T.RESIDUAL: 1
- T.STATE: 1
|
|
pdf_data/report_keywords/vendor |
|
- Infineon:
- Infineon Technologies AG: 5
|
pdf_data/report_keywords/eval_facility |
|
- BrightSight:
- SGS:
- SGS: 2
- SGS Brightsight: 2
- TUV:
- TÜV Informationstechnik: 2
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-2: 1
- SHA224: 1
- SHA256: 3
- SHA384: 2
- SHA512: 2
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- SCA:
- Side channel: 1
- side-channel: 1
- other:
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- ISO:
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /AAPL:Keywords: ['ugradert']
- /Author: Rage, Arne Høye
- /CreationDate: D:20160922162516Z00'00'
- /Creator: Microsoft Word
- /Keywords: ugradert
- /ModDate: D:20160922162516Z00'00'
- /Producer: Mac OS X 10.11.6 Quartz PDFContext
- /Title: tittel
- pdf_file_size_bytes: 875983
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 17
|
|
pdf_data/st_filename |
ThinklogicalSecurityTarget_1_3_TLX320.pdf |
NSCIB-CC-2400062-01-ST_1.1.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1169-V4-2024: 2
- NL:
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0090-2016: 1
- BSI-PP-0084-2014: 1
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 6: 1
- EAL 6 augmented: 1
- EAL 6+: 2
- EAL6: 1
- EAL6 augmented: 1
- EAL6+: 2
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 2
- ADV_FSP.4: 2
- ADV_IMP.1: 2
- ADV_TDS.3: 2
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.4: 2
- ALC_CMS.4: 2
- ALC_DEL.1: 2
- ALC_DVS.1: 2
- ALC_LCD.1: 2
- ALC_TAT.1: 2
- ATE:
- ATE_COV.2: 2
- ATE_DPT.2: 2
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 5
- ADV_FSP.1: 3
- ADV_FSP.2: 2
- ADV_FSP.4: 2
- ADV_FSP.5: 7
- ADV_IMP.1: 8
- ADV_INT.2: 1
- ADV_SPM.1: 7
- ADV_TDS.1: 2
- ADV_TDS.2: 1
- ADV_TDS.3: 9
- ADV_TDS.4: 1
- AGD:
- AGD_OPE.1: 5
- AGD_PRE.1: 5
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.1: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 2
- ALC_FLR.1: 3
- ALC_LCD.1: 3
- ALC_TAT.1: 2
- ALC_TAT.2: 3
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 4
- ASE_INT.1: 5
- ASE_OBJ.2: 3
- ASE_REQ.1: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 3
- ATE_DPT.1: 2
- ATE_FUN.1: 7
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FDP:
- FDP_ETC.1: 7
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_IFC.1: 7
- FDP_IFC.1.1: 1
- FDP_IFF.1: 7
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC.1: 7
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FMT:
|
- FAU:
- FAU_ARP.1: 12
- FAU_ARP.1.1: 1
- FAU_SAA.1: 2
- FCO:
- FCS:
- FCS_CKM: 6
- FCS_CKM.1: 9
- FCS_CKM.1.1: 1
- FCS_CKM.4: 9
- FCS_CKM.4.1: 1
- FCS_COP: 19
- FCS_COP.1: 14
- FCS_RNG: 7
- FCS_RNG.1: 19
- FDP:
- FDP_ACC: 28
- FDP_ACC.1: 11
- FDP_ACC.2: 11
- FDP_ACF: 24
- FDP_ACF.1: 26
- FDP_IFC: 32
- FDP_IFC.1: 11
- FDP_IFC.2: 2
- FDP_IFF: 29
- FDP_IFF.1: 17
- FDP_IFF.1.2: 1
- FDP_IFF.1.4: 1
- FDP_ITC: 15
- FDP_ITC.1: 1
- FDP_ITC.2: 11
- FDP_ITT.1: 1
- FDP_RIP: 47
- FDP_RIP.1: 9
- FDP_ROL: 15
- FDP_ROL.1: 4
- FDP_SDC.1: 2
- FDP_SDI: 6
- FDP_SDI.2: 4
- FDP_UIT: 9
- FDP_UIT.1: 2
- FIA:
- FIA_ATD: 5
- FIA_ATD.1: 1
- FIA_UAU: 23
- FIA_UAU.1: 4
- FIA_UAU.4: 1
- FIA_UID: 30
- FIA_UID.1: 11
- FIA_UID.2: 1
- FIA_USB: 5
- FIA_USB.1: 3
- FMT:
- FMT_MSA: 110
- FMT_MSA.1: 17
- FMT_MSA.2: 1
- FMT_MSA.3: 25
- FMT_MSA.3.1: 1
- FMT_MTD: 10
- FMT_MTD.1: 1
- FMT_MTD.3: 1
- FMT_SMF: 37
- FMT_SMF.1: 22
- FMT_SMF.1.1: 1
- FMT_SMR: 37
- FMT_SMR.1: 23
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNO.1: 6
- FPR_UNO.1.1: 1
- FPT:
- FPT_FLS: 28
- FPT_FLS.1: 15
- FPT_FLS.1.1: 1
- FPT_ITT.1: 1
- FPT_PHP.3: 9
- FPT_PHP.3.1: 1
- FPT_RCV: 6
- FPT_RCV.3: 4
- FPT_TDC.1: 6
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST.1: 8
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FPT_TST.2: 1
- FRU:
- FTP:
- FTP_ITC: 12
- FTP_ITC.1: 5
- FTP_TRP.1: 2
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ACCESS: 1
- A.EMISSION: 2
- A.MANAGE: 2
- A.NOEVIL: 2
- A.PHYSICAL: 2
- A.SCENARIO: 2
- O:
- O.CONF: 7
- O.CONNECT: 3
- O.CRYPTOGRAPHY: 1
- OE:
- OE.EMISSION: 2
- OE.INSTAL: 1
- OE.MANAGE: 4
- OE.NOEVIL: 2
- OE.PHYSICAL: 2
- OE.SCENARIO: 2
- T:
- T.ATTACK: 3
- T.COMINT: 1
- T.INSTALL: 3
- T.RESIDUAL: 3
- T.STATE: 3
|
- A:
- A.CAP_FILE: 3
- A.DELETION: 1
- A.IFU_OS_UPDATE_EVIDENCE: 4
- A.VERIFICATION: 3
- D:
- D.API_DATA: 3
- D.APP_CODE: 7
- D.APP_C_DATA: 6
- D.APP_I_DATA: 7
- D.APP_KEY: 1
- D.APP_KEYS: 4
- D.CM_DATA: 4
- D.CRYPTO: 4
- D.IFU_ADDITIONAL_CODE: 18
- D.JCS_CODE: 6
- D.JCS_DATA: 9
- D.JCS_KEYS: 1
- D.PIN: 6
- D.SEC_DATA: 7
- O:
- O.AES: 1
- O.ALARM: 13
- O.APPLET: 16
- O.ARRAY_VIEWS_CONFID: 6
- O.ARRAY_VIEWS_INTEG: 5
- O.CARD-: 1
- O.CARD-MANAGEMENT: 47
- O.CIPHER: 8
- O.CODE_CAP_FILE: 12
- O.CODE_PKG: 2
- O.COMMUNICATION: 19
- O.DELETION: 7
- O.FIREWALL: 19
- O.GLOBAL_ARRAYS_CONFID: 7
- O.GLOBAL_ARRAYS_INTEG: 7
- O.IFU_CONFID_ADDITIONAL_CODE: 9
- O.IFU_SECURE_AC_ACTIVATION: 7
- O.IFU_SECURE_LOAD_ACODE: 20
- O.IFU_TOE_IDENTIFICATION: 10
- O.INSTALL: 10
- O.JAVAOBJECT: 42
- O.KEY-MNGT: 7
- O.LOAD: 15
- O.NATIVE: 9
- O.OBJ-DELETION: 6
- O.OPERATE: 17
- O.PIN-MNGT: 8
- O.REALLOCATION: 7
- O.RECOVERY: 1
- O.RESOURCES: 8
- O.RNG: 9
- O.SAND_BOX: 15
- O.SCP: 40
- O.SID: 15
- O.TDES: 1
- O.TRANSACTION: 8
- O.VERIFICATION: 1
- OE:
- OE.CAP_FILE: 5
- OE.CARD-MANAGEMENT: 1
- OE.CODE-: 1
- OE.CODE-EVIDENCE: 11
- OE.IFU_OS_UPDATE_EVIDENCE: 4
- OE.IFU_SECURE_ACODE_MANAGEM: 1
- OE.IFU_SECURE_ACODE_MANAGEMENT: 4
- OE.SCP: 3
- OE.VERIFICATION: 25
- OP:
- OP.ARRAY_AASTORE: 3
- OP.ARRAY_ACCESS: 4
- OP.ARRAY_LENGTH: 3
- OP.ARRAY_T_ALOAD: 2
- OP.ARRAY_T_ASTORE: 3
- OP.ARRAY_T_LOAD: 1
- OP.CREATE: 6
- OP.DELETE_APPLET: 4
- OP.DELETE_CAP_FILE: 3
- OP.DELETE_CAP_FILE_APPLET: 3
- OP.INSTANCE_FIELD: 3
- OP.INVK_INTERFACE: 7
- OP.INVK_VIRTUAL: 6
- OP.JAVA: 6
- OP.PUT: 4
- OP.PUTFIELD: 1
- OP.PUTSTATIC: 1
- OP.SAND_BOX_ACCESS: 1
- OP.SAND_BOX_ACCESS_SFR: 1
- OP.THROW: 5
- OP.TYPE_ACCESS: 5
- OSP:
- OSP.SAND_BOX: 2
- OSP.VERIFICATION: 3
- R:
- T:
- T.COMMUNICATION: 4
- T.CONFID-APPLI-DATA: 6
- T.CONFID-JCS-CODE: 4
- T.CONFID-JCS-DATA: 6
- T.CONFID_IFU: 6
- T.DELETION: 4
- T.EXE-CODE: 6
- T.INSTALL: 4
- T.INTEG-APPLI-: 5
- T.INTEG-APPLI-CODE: 6
- T.INTEG-APPLI-DATA: 7
- T.INTEG-JCS-: 1
- T.INTEG-JCS-CODE: 4
- T.INTEG-JCS-DATA: 5
- T.INTEG_IFU: 7
- T.LIFE_CYCLE: 4
- T.NATIVE: 3
- T.OBJ-DELETION: 3
- T.PHYSICAL: 4
- T.RESOURCES: 5
- T.RNG: 5
- T.SAND_BOX: 5
- T.SID: 9
- T.UNAUTHORIZED_CA: 1
- T.UNAUTHORIZED_CARD_MNGT: 3
- T.UNAUTHORIZED_IFU: 5
|
pdf_data/st_keywords/vendor |
|
- Infineon:
- Infineon: 7
- Infineon Technologies: 6
- Infineon Technologies AG: 4
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-2: 1
- SHA-224: 1
- SHA-256: 1
- SHA224: 7
- SHA256: 11
- SHA384: 8
- SHA512: 2
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- malfunction: 2
- physical tampering: 3
- SCA:
- DPA: 1
- physical probing: 2
- side channel: 2
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- BSI:
- FIPS:
- FIPS 180-4: 2
- FIPS 186-4: 4
- FIPS 197: 6
- FIPS PUB 198-1: 3
- ICAO:
- ISO:
- ISO/IEC 9797: 2
- ISO/IEC 9797-1: 7
- NIST:
- NIST SP 800-38A: 1
- NIST SP 800-38B: 1
- NIST SP 800-67: 1
- PKCS:
- RFC:
- SCP:
- SCP 02: 1
- SCP 03: 1
- SCP02: 3
- SCP03: 3
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
- ALG:
- EC:
- ALG_EC_SVDP_DH_PLAIN: 1
- ALG_EC_SVDP_DH_PLAIN_XY: 1
- misc:
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: MICHELE ROBERTS
- /CreationDate: D:20160922164335+00'00'
- /Creator: Microsoft Word
- /ModDate: D:20160922164335+00'00'
- /Title:
- pdf_file_size_bytes: 487151
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 22
|
- /Author: Kalaiselvam Suruddaiyan;Infineon Technologies AG
- /CreationDate: D:20241219111131+01'00'
- /Creator: Microsoft® Word for Microsoft 365
- /Keywords: Infineon
- /MSIP_Label_a15a25aa-e944-415d-b7a7-40f6b9180b6b_ActionId: e0f13a61-3a8e-4be9-ba91-693349c4ba23
- /MSIP_Label_a15a25aa-e944-415d-b7a7-40f6b9180b6b_ContentBits: 0
- /MSIP_Label_a15a25aa-e944-415d-b7a7-40f6b9180b6b_Enabled: true
- /MSIP_Label_a15a25aa-e944-415d-b7a7-40f6b9180b6b_Method: Standard
- /MSIP_Label_a15a25aa-e944-415d-b7a7-40f6b9180b6b_Name: a15a25aa-e944-415d-b7a7-40f6b9180b6b
- /MSIP_Label_a15a25aa-e944-415d-b7a7-40f6b9180b6b_SetDate: 2023-05-03T10:08:12Z
- /MSIP_Label_a15a25aa-e944-415d-b7a7-40f6b9180b6b_SiteId: eeb8d0e8-3544-41d3-aac6-934c309faf5a
- /ModDate: D:20241219111131+01'00'
- /Producer: Microsoft® Word for Microsoft 365
- /Title: SECORA™ ID SLJ38G v2.01 Security Target
- pdf_file_size_bytes: 2218254
- pdf_hyperlinks: http://www.infineon.com/, mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 109
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |