| name |
V3Pro2004 and AhnLab Policy Center 3.0 |
IAS Classic V4.4.2 with MOC Server 1.1 on MultiApp V4.1 |
| category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme |
KR |
FR |
| status |
archived |
archived |
| not_valid_after |
01.06.2019 |
26.11.2023 |
| not_valid_before |
17.09.2007 |
26.11.2018 |
| cert_link |
None |
None |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISIS-73-EN.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018_53fr.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISIS-73-ST-EN.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2018_53en.pdf |
| manufacturer |
AhnLab, Inc. |
Gemalto / Samsung |
| manufacturer_web |
https://www.ahnlab.com/ |
https://www.gemalto.com/ |
| security_level |
EAL4 |
EAL5+, AVA_VAN.5, ALC_DVS.2 |
| dgst |
a8f7a4c49c242ddc |
c8760078857e71eb |
| heuristics/cert_id |
KECS-ISIS-0073-2007 |
ANSSI-CC-2018/53 |
| heuristics/cert_lab |
[] |
SERMA |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ADV_LLD.1, AVA_MSU.2, ALC_LCD.1, ALC_TAT.1, ADV_FSP.2, AGD_ADM.1, ATE_IND.2, ATE_FUN.1, ADV_RCR.1, ATE_DPT.1, AVA_SOF.1, AVA_VLA.2, AGD_USR.1, ATE_COV.2, ADV_HLD.2, ADV_IMP.1, ADV_SPM.1, ALC_DVS.1 |
AVA_VAN.5, ALC_DVS.2 |
| heuristics/extracted_versions |
3.0 |
4.4.2, 4.1, 1.1 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2018/32, ANSSI-CC-2017/24 |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
ANSSI-CC-2017/54, BSI-DSZ-CC-0891-V2-2016, ANSSI-CC-2015/66, ANSSI-CC-2017/76, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0782-2012, ANSSI-CC-2017/07, ANSSI-CC-2016/59, ANSSI-CC-2018/32, ANSSI-CC-2017/24 |
| heuristics/scheme_data |
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
ANSSI-CC-2016/59 |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
ANSSI-CC-2016/59 |
| heuristics/protection_profiles |
{} |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
{} |
| pdf_data/cert_filename |
None |
None |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename |
ISIS-73-EN.pdf |
anssi-cc-2018_53fr.pdf |
| pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 5
- cert_id: ANSSI-CC-2018/53
- cert_item: IAS Classic V4.4.2 with MOC Server 1.1 on MultiApp V4.1
- cert_item_version: Version de l’application IAS : 4.4.2.A Version de l’application MOCA Server : 1.1.1A Version de la plateforme JavaCard MultiApp : 4.1
- cert_lab: Serma Safety & Security 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
- developer: Gemalto 6, rue de la Verrerie, 92197 Meudon cedex, France Samsung Electronics Co. 17 Floor, B-Tower, DSR building, Samsungjeonja-ro 1-1, Hwaseong-si, Gyenonggi-do 445-330 South Korea Commanditaire Gemalto 6, rue de la Verrerie, 92197 Meudon cedex, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: Protection profiles for secure signature creation device : Part 2: Device with key generation, v2.0.1, BSI-CC-PP-0059-2009-MA-01 ; Part 3: Device with key import, v1.0.2, BSI-CC-PP-0075-2012 ; Part 4: Extension for device with key generation and trusted communication with certificate generation application, v1.0.1, BSI-CC-PP-0071-2012 ; Part 5: Extension for device with key generation and trusted communication with signature creation application, v1.0.1, BSI-CC-PP-0072-2012 ; Part 6: Extension for device with key import and trusted communication with signature creation application, v1.0.4, BSI-CC-PP-0076-2013
|
| pdf_data/report_keywords/cc_cert_id |
|
- FR:
- ANSSI-CC-2017/24: 2
- ANSSI-CC-2018/32: 1
- ANSSI-CC-2018/53: 17
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0059-2009-MA-01: 2
- BSI-CC-PP-0071-: 1
- BSI-CC-PP-0071-2012: 1
- BSI-CC-PP-0072-: 1
- BSI-CC-PP-0072-2012: 1
- BSI-CC-PP-0075-: 1
- BSI-CC-PP-0075-2012: 1
- BSI-CC-PP-0076-2013: 2
- BSI-PP-0084-2014: 1
- other:
- PP-SSCD-: 5
- PP-SSCD-Part2: 1
- PP-SSCD-Part3: 1
- PP-SSCD-Part4: 1
- PP-SSCD-Part5: 1
- PP-SSCD-Part6: 1
|
| pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 1
- EAL2: 2
- EAL7: 1
- ITSEC:
|
| pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- AGD_OPE: 2
- AGD_PRE: 2
- AGD_PRE_OPE: 2
- AGD_USE: 1
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
- A:
- A.AVCONFILICT: 1
- A.CERT: 1
- A.GUARD: 1
- A.INTERNALENTITY: 1
- A.NO_EVIL: 1
- A.PHYSICAL: 1
- A.SAFEITENTITY: 1
- A.TIMESTAMP: 1
- O:
- O.ADMIN_ROLE: 1
- O.ALARM: 1
- O.AUDIT: 1
- O.INA: 1
- O.MANAGE: 1
- O.SECURE_UPDATE: 1
- O.SELF_PROTECTION: 1
- O.STRENGTHENOS: 1
- O.TSFDATA_PROTECT: 1
- O.VIRUS: 1
- OE:
- OE.AUDIT_SEARCH: 1
- OE.AUDIT_STORAGE: 1
- OE.AVCONFLICT: 1
- OE.CERT: 1
- OE.DOM_SEPARATION: 1
- OE.GUARD: 1
- OE.INTERNALENTITY: 1
- OE.NO_BYPASS: 1
- OE.NO_EVIL: 1
- OE.PHYSICAL: 1
- OE.RESIDUAL_INFO: 1
- OE.SAFEITENTITY: 1
- OE.TIMESTAMP: 1
- OE.TOE_ACCESS: 1
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
- Serma:
- SERMA: 1
- Serma Safety & Security: 1
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- SCP:
- SCP01: 1
- SCP02: 1
- SCP03: 1
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
- OutOfScope:
- If the administrator does not set the V3 security lock with Policy Agent in passive mode, it is out of scope of the evaluation because it is not enterprise environment, the TOE operating environment: 1
- out of scope: 1
|
|
| pdf_data/report_metadata |
- /Author: KYH
- /CreationDate: D:20071203103449+09'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20071203103449+09'00'
- /Producer: Acrobat Distiller 7.0.5 (Windows)
- /Title: ISIS-73-EN.hwp
- pdf_file_size_bytes: 330437
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 26
|
- /Category: Référence, Version
- /Comments: Gemalto
- /Company: SGDSN/ANSSI
- /CreationDate: D:20181128164041+01'00'
- /Creator: Acrobat PDFMaker 11 pour Word
- /Keywords: ANSSI-CC-CER-F-07.28.1
- /ModDate: D:20181128164236+01'00'
- /Producer: Adobe PDF Library 11.0
- /SourceModified: D:20181128154037
- /Subject:
- /Title:
- pdf_file_size_bytes: 205266
- pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 16
|
| pdf_data/st_filename |
ISIS-73-ST-EN.pdf |
anssi-cible-cc-2018_53en.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0059-2009-MA-02: 1
- BSI-CC-PP-0071-2012-MA-01: 1
- BSI-CC-PP-0072-2012-MA-01: 1
- BSI-CC-PP-0075-2012-MA-01: 1
- BSI-CC-PP-0076-2013-MA-01: 1
- BSI-CC-PP-0084-2014: 1
- other:
- PP-SSCD: 4
- PP-SSCD-: 1
- PP-SSCD-KG: 41
- PP-SSCD-KI: 30
|
| pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 5+: 1
- EAL5: 5
- EAL5 augmented: 1
|
| pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_AUT.1: 2
- ACM_CAP.4: 2
- ACM_SCP.2: 3
- ADO:
- ADO_DEL.2: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP.2: 2
- ADV_HLD.2: 2
- ADV_IMP.1: 2
- ADV_LLD.1: 2
- ADV_RCR.1: 2
- ADV_SPM.1: 2
- AGD:
- AGD_ADM.1: 3
- AGD_USR.1: 2
- ALC:
- ALC_DVS.1: 2
- ALC_LCD.1: 2
- ALC_TAT.1: 2
- ATE:
- ATE_COV.2: 2
- ATE_DPT.1: 3
- ATE_FUN.1: 2
- ATE_IND.2: 3
- AVA:
- AVA_MSU.2: 4
- AVA_SOF.1: 2
- AVA_VLA.2: 3
|
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_APR.1: 2
- FAU_ARP.1: 10
- FAU_ARP.1.1: 1
- FAU_GEN.1: 17
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 9
- FAU_GEN.2.1: 1
- FAU_SAA.1: 13
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 1
- FAU_SAR.1: 20
- FAU_SAR.1.1: 2
- FAU_SAR.1.2: 2
- FAU_SAR.2: 12
- FAU_SAR.2.1: 1
- FAU_SAR.3: 13
- FAU_SAR.3.1: 2
- FAU_SSA.1: 1
- FAU_STG.1: 6
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 11
- FAU_STG.4.1: 1
- FDP:
- FIA:
- FIA_AFL.1: 10
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_SOS.1: 10
- FIA_SOS.1.1: 1
- FIA_UAU.1: 6
- FIA_UAU.2: 16
- FIA_UAU.2.1: 2
- FIA_UAU.6: 14
- FIA_UAU.6.1: 2
- FIA_UID.1: 8
- FIA_UID.2: 18
- FIA_UID.2.1: 2
- FMT:
- FMT_MOF.1: 27
- FMT_MOF.1.1: 1
- FMT_MTD.1: 32
- FMT_MTD.1.1: 1
- FMT_MTD.2: 12
- FMT_MTD.2.1: 1
- FMT_MTD.2.2: 1
- FMT_SMF.1: 31
- FMT_SMF.1.1: 1
- FMT_SMR.1: 27
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_AMT.1: 10
- FPT_AMT.1.1: 1
- FPT_ITI.1: 10
- FPT_ITI.1.1: 1
- FPT_ITI.1.2: 1
- FPT_ITT.1: 16
- FPT_ITT.1.1: 2
- FPT_SSL.3: 1
- FPT_STM.1: 7
- FPT_STM.1.1: 1
- FPT_TST.1: 13
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTA:
- FTA_SSL.1: 5
- FTA_SSL.1.1: 1
- FTA_SSL.1.2: 1
- FTA_SSL.3: 15
- FTA_SSL.3.1: 1
- FTA_SSL.4: 14
- FTA_SSL.4.1: 1
|
- FCS:
- FCS_CKM: 43
- FCS_CKM.1: 15
- FCS_CKM.1.1: 2
- FCS_CKM.2: 4
- FCS_CKM.4: 13
- FCS_CKM.4.1: 2
- FCS_COP: 22
- FCS_COP.1: 8
- FCS_COP.1.1: 2
- FDP:
- FDP_ACC: 40
- FDP_ACC.1: 28
- FDP_ACC.1.1: 4
- FDP_ACF: 27
- FDP_ACF.1: 11
- FDP_ACF.1.1: 4
- FDP_ACF.1.2: 4
- FDP_ACF.1.3: 4
- FDP_ACF.1.4: 4
- FDP_AFC: 1
- FDP_DAU: 8
- FDP_DAU.1: 1
- FDP_DAU.2: 1
- FDP_DAU.2.1: 1
- FDP_DAU.2.2: 1
- FDP_ETC.1: 1
- FDP_IFC.1: 18
- FDP_ITC: 9
- FDP_ITC.1: 9
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 8
- FDP_RIP: 1
- FDP_RIP.1: 7
- FDP_RIP.1.1: 1
- FDP_SDI: 15
- FDP_SDI.1: 2
- FDP_SDI.2: 2
- FDP_SDI.2.1: 2
- FDP_SDI.2.2: 2
- FDP_UCT: 8
- FDP_UCT.1: 1
- FDP_UCT.1.1: 1
- FDP_UIT: 8
- FDP_UIT.1: 1
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL: 14
- FIA_AFL.1: 1
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_API: 5
- FIA_API.1: 13
- FIA_API.1.1: 2
- FIA_UAU: 17
- FIA_UAU.1: 8
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UID: 17
- FIA_UID.1: 11
- FIA_UID.1.1: 2
- FIA_UID.1.2: 2
- FMT:
- FMT_MOF.1: 8
- FMT_MOF.1.1: 1
- FMT_MSA: 56
- FMT_MSA.1: 7
- FMT_MSA.1.1: 3
- FMT_MSA.2: 8
- FMT_MSA.2.1: 1
- FMT_MSA.3: 12
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MSA.4: 3
- FMT_MSA.4.1: 2
- FMT_MTD: 14
- FMT_MTD.1: 1
- FMT_MTD.1.1: 2
- FMT_SMF.1: 25
- FMT_SMF.1.1: 1
- FMT_SMR.1: 35
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS: 5
- FPT_EMS.1: 12
- FPT_EMS.1.1: 4
- FPT_EMS.1.2: 3
- FPT_FLS.1: 8
- FPT_FLS.1.1: 1
- FPT_PHP.1: 7
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 8
- FPT_PHP.3.1: 1
- FPT_TST: 2
- FPT_TST.1: 11
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ICT: 2
- FTP_ITC: 32
- FTP_ITC.1: 5
- FTP_ITC.1.1: 4
- FTP_ITC.1.2: 4
- FTP_ITC.1.3: 4
- FTP_TRP.1: 5
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.AVCONFLICT: 3
- A.CERT: 3
- A.GUARD: 3
- A.INTERNALENTITY: 3
- A.NO_EVIL: 3
- A.PHISICAL: 2
- A.SAFEITENTITY: 3
- A.TIMESTAMP: 3
- O:
- O.ADMIN_ROLE: 5
- O.ALARM: 6
- O.AUDIT: 10
- O.AUIDT: 2
- O.INA: 16
- O.MANAGE: 14
- O.SECURE_UPDATE: 6
- O.SELF_PROTECTION: 5
- O.STRENGTHENOS: 5
- O.TSFDATA_PROTECT: 8
- O.VIRUS: 10
- OE:
- OE.AUDIT_SEARCH: 5
- OE.AUDIT_STORAGE: 7
- OE.AVCONFLICT: 3
- OE.CERT: 3
- OE.DOM_SEPARATION: 5
- OE.GAURD: 1
- OE.GUARD: 2
- OE.INTERNALENTITY: 3
- OE.NO_BYPASS: 5
- OE.NO_EVIL: 3
- OE.PHISICAL: 2
- OE.PHYSICAL: 1
- OE.RESIDUAL_INFO: 2
- OE.SAFEITENTITY: 4
- OE.TIMESTAMP: 7
- OE.TOE_ACCESS: 13
- T:
- T.AUDIT_COMPROMISE: 8
- T.DOWN_INTERFERENCE: 3
- T.MASQUERADE: 5
- T.RESIDUAL_DATA: 3
- T.TRANS_DESTORY: 3
- T.TSF_COMPROMISE: 9
- T.UNATTEND_SESS: 5
- T.UNIDENTIFIED_ACTIONS: 5
- T.VIRUS: 4
|
- A:
- A.APPLET: 2
- A.CGA: 3
- A.CSP: 4
- A.SCA: 3
- A.VERIFICATION: 2
- OE:
- OE.APPLET: 1
- OE.CODE-EVIDENCE: 1
- OE.HID_VAD: 1
- OE.HI_VAD: 2
- OE.VERIFICATION: 4
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- Malfunction: 1
- fault injection: 1
- physical tampering: 4
- SCA:
- DPA: 1
- Leak-Inherent: 1
- SPA: 1
- timing attacks: 1
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
|
- CC:
- CCMB-2012-04-003: 1
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-004: 1
- FIPS:
- PKCS:
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
- OutOfScope:
- 98 APC uses SMS for notification on the situation that authorized administrator is set. This is out of scope because additional contract with a mobile service provider is necessary for this function. APC: 1
- 99 APC creates reports with pre-defined formats and audit records. This function is out of scope since it is independent with generating and storing audit records. AhnLab, Korea 24/109 APC: 1
- files for support of V3+ Neo. Since the operating system of the TOE is Windows XP, This is out of scope. 91 The following functions are out of scope for policy server. Hierarchical Domain Management : 1
- out of scope: 6
- system in case that the system has been registered on the APC. 101 The following functions are out of scope for policy agent. User Information Input 102 An additional feature for the Policy Agent user: 1
- updates itself by the policy server’s command. 2.2.3 Out of Coverage 88 The following functions are out of scope of V3 Run as a Update Server 89 Without APC, V3 runs as an update server for the other V3s. V3 +: 1
|
- OutOfScope:
- by authorized users. The functionalities of IAS Classic V4.4.2 other than the ones from SSCD are out of scope of the TOE perimeter. 27/03/2018 Rev : 1.1p Page : 10 / 59 Gemalto Public Gemalto Private : 1
- out of scope: 1
|
| pdf_data/st_metadata |
- /Author: KYH
- /CreationDate: D:20071203103747+09'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20071203103747+09'00'
- /Producer: Acrobat Distiller 7.0.5 (Windows)
- /Title: Microsoft Word - ISIS-73-ST_EN.doc
- pdf_file_size_bytes: 796288
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 109
|
- /Author: D1418852
- /CreationDate: D:20180327133533+02'00'
- /Creator: Microsoft® Word 2013
- /Keywords: 27-03-2018
- /ModDate: D:20180327133533+02'00'
- /Producer: Microsoft® Word 2013
- /Subject: 1.1p
- /Title: MultiApp V4.1: IAS EN Core & Extensions Security Target Lite
- pdf_file_size_bytes: 1418736
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 59
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
False |
| state/cert/download_ok |
False |
False |
| state/cert/extract_ok |
False |
False |
| state/cert/pdf_hash |
Equal |
Equal |
| state/cert/txt_hash |
Equal |
Equal |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |