name |
Huawei SUN2000HA Software V300R001C00SPC608 |
Infineon Technologies AG Trusted Platform Module SLB9670_1.2 v6.43.0243.00, v6.43.0244.00, v6.43.0245.00 and v6.43.0246.00 |
category |
Other Devices and Systems |
Trusted Computing |
scheme |
ES |
DE |
status |
active |
archived |
not_valid_after |
20.09.2027 |
07.08.2022 |
not_valid_before |
20.09.2022 |
08.08.2017 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-52%20Certificado.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-52%20INF-3892.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0958V2a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-52%20ST.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0958V2b_pdf.pdf |
manufacturer |
Huawei Technologies Co., Ltd. |
Infineon Technologies AG |
manufacturer_web |
https://www.huawei.com |
https://www.infineon.com/ |
security_level |
EAL3+, ALC_FLR.2 |
AVA_VAN.4, EAL4+, ALC_FLR.1 |
dgst |
a74f7bdf3acd72d7 |
390f39bde89b6316 |
heuristics/cert_id |
2019-52-INF-3892 |
BSI-DSZ-CC-0958-V2-2017 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ATE_COV.2, ASE_TSS.1, ASE_INT.1, ATE_FUN.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AVA_VAN.2, ADV_ARC.1, ALC_CMC.3, ASE_CCL.1, ALC_FLR.2, ASE_REQ.2 |
ASE_INT.1, ALC_CMC.4, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ALC_TAT.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ADV_VAN.4, ALC_CMS.4, ATE_FUN.1, APE_REQ.2, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_INT.3, APE_INT.1, APE_SPD.1, ADV_FSP.4, ATE_IND.2, APE_OBJ.2, AVA_VAN.4, ASE_CCL.1, ADV_SPM.1 |
heuristics/extracted_versions |
- |
6.43.0244.00, 6.43.0243.00, 6.43.0246.00, 6.43.0245.00, 1.2 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0958-2015 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0958-2015 |
heuristics/scheme_data |
- category: Others
- certification_date: 20.09.2022
- enhanced:
- category: Others
- cc_version: Common Criteria 3.1 release 5
- cert_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1595
- certification_date: 20.09.2022
- description: The TOE is the software running in the Operating System that is deployed into communication board inside Huawei SUN2000HA inverter, which is the access node of inverter. The TOE is a 'software only'. TOE consists of the software running on the Operating System of the SUN2000HA inverter chassis, but not the hardware. The TOE provides near-end maintenance through: Huawei mobile phone APP connected to the SUN2000HA inverter through the USB-WIFI Adapter stick inserted into the USB terminal. Smartlogger connected to the SUN2000HA inverter through the MBUS or RS485 with Modbus-RTU protocol (in the TOE evaluated configuration is used the RS485 port). The TOE provides the following major security features: Authentication and Authorization: Only authenticated users are allowed to log in to the TOE, query TOE data, and set TOE parameters. Only authorized users are able to execute the previous actions based on their privileges. If a user fails to be authenticated for multiple consecutive times, the user is locked for a period of time to prevent unauthorized access. Auditing: An operation log records the operation that an administrator has performed on the system and the result of the operation and is used for tracing and auditing. Security Management: The TOE provides four different user roles (Common user, Advanced user, Special user and Datalogger user). Also, the TOE provides: user password management, software upgrade, log exports and time settings.
- evaluation_facility: DEKRA Testing and Certification S.A.U.
- level: EAL3 + (ALC_FLR.2)
- manufacturer: Huawei Technologies Co., Ltd.
- report_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1596
- status: Certified
- target_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1594
- type: Product
- manufacturer: Huawei Technologies Co., Ltd.
- product: Huawei SUN2000HA Software V300R001C00SPC608
- product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/872-huawei-sun2000ha-software-v300r001c00spc608
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
1b09df9f54d1b18b |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0030b.pdf |
pdf_data/cert_filename |
2019-52 Certificado.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL3: 1
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
- Huawei:
- Huawei: 3
- Huawei Technologies Co: 2
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author:
- /CreationDate:
- /Creator:
- /Keywords:
- /ModDate:
- /Producer:
- /Subject:
- /Title:
- /Trapped:
- pdf_file_size_bytes: 876880
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
|
pdf_data/report_filename |
2019-52 INF-3892.pdf |
0958V2a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ALC_FLR.1 and AVA_VAN.4
- cc_version: PP conformant plus product specific extensions Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-0958-V2-2017
- cert_item: Infineon Technologies AG Trusted Platform Module SLB9670_1.2 v6.43.0243.00, v6.43.0244.00, v6.43.0245.00 and v6.43.0246.00
- cert_lab: BSI
- developer: Infineon Technologies AG
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Trusted Computing Group Protection Profile, PC Client specific Trusted Platform Module TPM Family 1.2; Level 2, Revision 116, Version 1.3, 14 July 2014, BSI-CC-PP-0030-2008-MA-02
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0958-2015: 3
- BSI-DSZ-CC-0958-V2-2017: 24
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0030-2008-MA-02: 2
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 2: 1
- EAL 4: 2
- EAL2: 1
- EAL3: 8
- EAL4: 1
- ITSEC:
|
- EAL:
- EAL 1: 7
- EAL 2: 4
- EAL 3: 4
- EAL 4: 13
- EAL 4 augmented: 3
- EAL 5: 6
- EAL 6: 3
- EAL 7: 4
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- ALC:
- ALC_CMC.3: 1
- ALC_DEL.1: 1
- ALC_FLR: 3
- ALC_FLR.2: 8
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_INT.1: 1
- ASE_REQ.2: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_FUN.1: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 2
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 2
- ALC_CMS.5: 1
- ALC_DEL: 1
- ALC_DEL.1: 2
- ALC_DVS: 2
- ALC_DVS.1: 2
- ALC_DVS.2: 1
- ALC_FLR: 3
- ALC_FLR.1: 7
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 2
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 2
- ALC_TAT.2: 1
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 1
- ATE_DPT.4: 1
- ATE_FUN: 2
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 2
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 3
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 6
- AVA_VAN.5: 1
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
- Huawei:
- Huawei: 20
- Huawei Technologies Co: 3
|
- GD:
- G&D: 1
- Giesecke & Devrient: 1
- Infineon:
- Infineon: 2
- Infineon Technologies: 10
- Infineon Technologies AG: 21
|
pdf_data/report_keywords/eval_facility |
- DEKRA:
- DEKRA Testing and Certification: 4
|
- TUV:
- TUViT: 1
- TÜV Informationstechnik: 3
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- Fault Injection: 1
- physical tampering: 1
- SCA:
- DPA: 2
- SPA: 1
- side channel: 1
- other:
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7148: 1
- BSI TR-02102: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- BSI:
- AIS 20: 2
- AIS 25: 2
- AIS 26: 2
- AIS 31: 2
- AIS 32: 1
- AIS 38: 1
- AIS20: 2
- AIS26: 1
- AIS31: 1
- FIPS:
- FIPS PUB 180: 1
- FIPS180-4: 6
- FIPS197: 3
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- NIST:
- PKCS:
- RFC:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- Technical Report Summary, TÜV Informationstechnik GmbH – Evaluation Body for IT Security, (confidential document) [8] Trusted Computing Group Protection Profile, PC Client specific Trusted Platform Module TPM: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename |
2019-52 ST.pdf |
0958V2b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0030-2008-MA-02: 1
- BSI-PP-0030-2008-MA-02: 1
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL4: 2
- EAL4 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_FLR: 1
- ALC_FLR.2: 3
- ALC_LCD: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- ADV_VAN.4: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_FLR.1: 3
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 6
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_STG.1: 6
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 4
- FAU_STG.3.1: 1
- FDP:
- FDP_ACC.1: 8
- FDP_ACC.1.1: 1
- FDP_ACF.1: 6
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FIA:
- FIA_AFL.1: 5
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 4
- FIA_ATD.1.1: 1
- FIA_UAU.2: 6
- FIA_UAU.2.1: 1
- FIA_UID.1: 1
- FIA_UID.2: 5
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF.1: 7
- FMT_MOF.1.1: 1
- FMT_MSA.3: 2
- FMT_SMF.1: 7
- FMT_SMF.1.1: 1
- FMT_SMR.1: 7
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
|
- FAU:
- FCO:
- FCS:
- FCS_CKM: 8
- FCS_CKM.1: 9
- FCS_CKM.2: 2
- FCS_CKM.4: 10
- FCS_CKM.4.1: 1
- FCS_COP: 19
- FCS_COP.1: 6
- FCS_RNG: 4
- FCS_RNG.1: 22
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC: 18
- FDP_ACC.1: 9
- FDP_ACF: 25
- FDP_ACF.1: 29
- FDP_ETC.2: 3
- FDP_IFC.1: 1
- FDP_ITC.1: 5
- FDP_ITC.2: 8
- FDP_RIP.1: 2
- FDP_TDC.1: 1
- FDP_UCT: 4
- FDP_UCT.1: 1
- FDP_UIT: 4
- FDP_UIT.1: 1
- FIA:
- FIA_AFL.1: 4
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_UAU.1: 5
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 2
- FIA_UAU.5: 4
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 3
- FIA_UID.1: 5
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 3
- FMT:
- FMT_MSA: 36
- FMT_MSA.1: 7
- FMT_MSA.2: 4
- FMT_MSA.2.1: 1
- FMT_MSA.3: 17
- FMT_MTD: 8
- FMT_MTD.1: 1
- FMT_SMF.1: 4
- FMT_SMF.1.1: 1
- FMT_SMR.1: 8
- FPR:
- FPT:
- FPT_FLS.1: 4
- FPT_FLS.1.1: 1
- FPT_PHP.3: 4
- FPT_PHP.3.1: 1
- FPT_STM.1: 3
- FPT_TDC.1: 3
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST.1: 3
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
- Huawei:
- Huawei: 62
- Huawei Technologies Co: 44
|
- Infineon:
- Infineon Technologies: 5
- Infineon Technologies AG: 12
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
- ECC:
- RSA:
- RSA 2048: 1
- RSA 512: 5
- RSA-2048: 1
- RSA2048: 1
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- SCA:
- DPA: 1
- SPA: 1
- physical probing: 2
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- BSI:
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- CCMB-2012-09-004: 1
- FIPS:
- FIPS 180-1: 1
- FIPS PUB 140-1: 3
- FIPS PUB 180-2: 3
- FIPS PUB 197: 3
- PKCS:
- RFC:
- RFC 2104: 1
- RFC2104: 3
- RFC3447: 4
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
- /Author: Jürgen Noller
- /CreationDate: D:20170721111327+02'00'
- /Creator: Microsoft® Word 2010
- /Keywords: Infineon CCS, Security Target, EAL4+, moderate, SLB9670, SLB9670_1.2, Trusted Computing, TPM 1.2 SPI, SPI, Trusted Platform Module
- /ModDate: D:20170721111327+02'00'
- /Producer: Microsoft® Word 2010
- /Subject: Security Target SLB9670_1.2
- /Title: CC EAL4+ moderate Certification Security Target
- pdf_file_size_bytes: 1204705
- pdf_hyperlinks: http://www.ietf.org/rfc/rfc2104.txt, http://www.infineon.com/, http://www.rsa.com/
- pdf_is_encrypted: False
- pdf_number_of_pages: 67
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
False |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |