name |
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.1.2.2) (ANSSI-CC-2024/09)
|
Produit IAS Classic v5.2.1 with MOC Server v3.1 on MultiApp V5.1 Version 5.2.1.A.C et 5.2.1.A.O ( ANSSI-CC-2023/42 )
|
category |
Trusted Computing
|
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
not_valid_before |
2024-04-17
|
2023-09-29
|
not_valid_after |
2029-04-17
|
2028-09-29
|
scheme |
FR
|
FR
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2024_09en%201.1.2.2.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-2023_42en.pdf
|
status |
active
|
active
|
manufacturer |
Nuvoton Technology
|
THALES DIS FRANCE SA
|
manufacturer_web |
None
|
https://www.thalesgroup.com/en/europe/france
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2024_09fr%201.1.2.2.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_42fr.pdf
|
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2024_09fr%201.1.2.2.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2023_42fr.pdf
|
protection_profiles |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile PC Client Specific Trusted Platform Module Specification Family 2.0; Level 0; Revi...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/anssi-profil-pp-2021_02en.pdf', 'pp_ids': None}) |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 5: Extension for device with key gene...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0072b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Version...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 3: Device with key import', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0075b_pdf.pdf', 'pp_ids': frozenset({'PP_SSCD_PART3_V1.0.2'})}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 6: Extension for device with key impo...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0076b_pdf.pdf', 'pp_ids': None}) |
maintenance_updates |
|
frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2024, 4, 4), 'maintenance_title': 'ANSSI-CC-2023/42-M01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_42-M01fr.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_42-M01en.pdf'}) |
state/cert/convert_garbage |
False
|
False
|
state/cert/convert_ok |
True
|
True
|
state/cert/download_ok |
True
|
True
|
state/cert/extract_ok |
True
|
True
|
state/cert/pdf_hash |
7a05c89163746bb540cdb1b0cb903f62bd18082ee28855c3a06e96fd1bdb4b89
|
134cd5850c5bd12fdc4d6af64bfa49c02e4c213faa8bc1e0e95144922b6e0e60
|
state/cert/txt_hash |
d7c9f79837ada4d8dd63eeccfde881bdeaf331ffcd42d8efa1240d531ef8456a
|
352da0876daf793f1f8dd7f0351178fcd331ec9adc07c6ed9e34c72ac70d30b5
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
cb72e6e5bff9be8bbc70833848556ed0ad8db6b178b54e7bde23ebc6f50ccb5b
|
2603639438e480309c7af78cb36473da23607fd53db924bf5127909d5739d7fc
|
state/report/txt_hash |
a736f15814ec38c261122c5970fda781754792d91e5936c8dc1954b98f399c6a
|
1c3fc4c531b5ee7ff9546a68e54f3f750dbf77aa2ad871bf1195ba09d03e56f8
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
8c175ad164e2dd33a5f5903eb25be543a2d1b4fff17d64a581daf228a65a3bb7
|
a266b1213a256ffc5091b8392717ae267836aed6a5edcd15221b708bd91afa4d
|
state/st/txt_hash |
5728ee8cb3fa210a3ebf7ac66678f5e52c3359a01b9c367dd207d3efbcbde93e
|
14aee5a78fff1c35a4f6d618ff79ce5abdc73e9f83c986a85f4e6baefdfe892a
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
ANSSI-CC-2024/09
|
ANSSI-CC-2023/42
|
heuristics/cert_lab |
None
|
None
|
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_versions |
1.59, 2.0, 1.1.2.2 |
5.2.1, 5.1, 3.1 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references/directly_referenced_by |
None
|
None
|
heuristics/report_references/directly_referencing |
None
|
ANSSI-CC-2023/01, ANSSI-CC-2023/31 |
heuristics/report_references/indirectly_referenced_by |
None
|
None
|
heuristics/report_references/indirectly_referencing |
None
|
ANSSI-CC-2023/01, ANSSI-CC-2023/31 |
heuristics/scheme_data/cert_id |
ANSSI-CC-2024/09
|
ANSSI-CC-2023/42
|
heuristics/scheme_data/description |
Le produit évalué est « NPCT7xx TPM2.0 rev 1.59, configuration version 1.1.2.2 » développé par NUVOTON TECHNOLOGY CORPORATION.
Ce produit est un TPM (Trusted Platform Module). Il est destiné à garantir l’intégrité matérielle et logicielle des plateformes de confiance (serveurs, ordinateurs, etc.) conformément aux spécifications fonctionnelles TPM2.0.
|
Le produit évalué est l’application « IAS Classic v5.2.1 with MOC Server v3.1 on MultiApp V5.1, Versions 5.2.1.A.C et 5.2.1.A.O » développée par THALES DIS FRANCE SAS et embarquée sur le microcontrôleur AQUARIUS_BA_09 fabriqué par THALES DIS.
Ce produit est destiné à être utilisé comme dispositif sécurisé de création de signature (SSCD).
|
heuristics/scheme_data/developer |
NUVOTON TECHNOLOGY CORPORATION
|
THALES DIS
|
heuristics/scheme_data/enhanced |
- cert_id:
ANSSI-CC-2024/09
- certification_date:
17/04/2024
- expiration_date:
17/04/2029
- category:
Micro-circuits
- cc_version:
Critères Communs version 3.1r5
- developer:
NUVOTON TECHNOLOGY CORPORATION
- sponsor:
NUVOTON TECHNOLOGY CORPORATION
- evaluation_facility:
SERMA SAFETY & SECURITY
- level:
EAL4+
- protection_profile:
Protection Profile PC Client Specific TPM
PP PCCS TPM F2.0 L0 r1.59 V1.3, certifié ANSSI-CC-PP-2021/02 le 30 novembre 2021
- mutual_recognition:
CCRA
SOG-IS
- augmented:
ALC_FLR.1, AVA_VAN.4, ALC_DVS.2
- report_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2024_09fr%201.1.2.2.pdf
- target_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2024_09en%201.1.2.2.pdf
- cert_link:
https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2024_09fr%201.1.2.2.pdf
|
- cert_id:
ANSSI-CC-2023/42
- certification_date:
22/09/2023
- expiration_date:
22/09/2028
- category:
Cartes à puce
- cc_version:
Critères Communs version 3.1r5
- developer:
THALES DIS
- sponsor:
THALES DIS
- evaluation_facility:
CEA - LETI
- level:
EAL5+
- protection_profile:
Protection profiles for secure signature creation device :
Part 2: Device with key generation, v2.01, BSI-CC-PP-0059-2009-MA-02
Part 3: Device with key import, v1.0.2, BSI-CC-PP-0075-2012-MA-01
Part 4: Extension for device with key generation and trusted channel to certificate generation application, v1.0.1, BSI-CC-PP-0071-2012-MA-01
Part5: Extension for device with key generation and trusted communication with signature-creation application, v1.0.1, BSI-CC-PP-0072-2012-MA-01
Part 6: Extension for device with key import and trusted channel to signature creation application, v1.0.4, BSI-CC-PP-0076-2013-MA-01
- mutual_recognition:
CCRA
SOG-IS
- augmented:
ALC_DVS.2, AVA_VAN.5
- cert_link:
https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2023_42fr.pdf
|
heuristics/scheme_data/enhanced/augmented |
ALC_FLR.1, AVA_VAN.4, ALC_DVS.2
|
ALC_DVS.2, AVA_VAN.5
|
heuristics/scheme_data/enhanced/category |
Micro-circuits
|
Cartes à puce
|
heuristics/scheme_data/enhanced/cc_version |
Critères Communs version 3.1r5
|
Critères Communs version 3.1r5
|
heuristics/scheme_data/enhanced/cert_id |
ANSSI-CC-2024/09
|
ANSSI-CC-2023/42
|
heuristics/scheme_data/enhanced/cert_link |
https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2024_09fr%201.1.2.2.pdf
|
https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2023_42fr.pdf
|
heuristics/scheme_data/enhanced/certification_date |
17/04/2024
|
22/09/2023
|
heuristics/scheme_data/enhanced/developer |
NUVOTON TECHNOLOGY CORPORATION
|
THALES DIS
|
heuristics/scheme_data/enhanced/evaluation_facility |
SERMA SAFETY & SECURITY
|
CEA - LETI
|
heuristics/scheme_data/enhanced/expiration_date |
17/04/2029
|
22/09/2028
|
heuristics/scheme_data/enhanced/level |
EAL4+
|
EAL5+
|
heuristics/scheme_data/enhanced/mutual_recognition |
CCRA
SOG-IS
|
CCRA
SOG-IS
|
heuristics/scheme_data/enhanced/protection_profile |
Protection Profile PC Client Specific TPM
PP PCCS TPM F2.0 L0 r1.59 V1.3, certifié ANSSI-CC-PP-2021/02 le 30 novembre 2021
|
Protection profiles for secure signature creation device :
Part 2: Device with key generation, v2.01, BSI-CC-PP-0059-2009-MA-02
Part 3: Device with key import, v1.0.2, BSI-CC-PP-0075-2012-MA-01
Part 4: Extension for device with key generation and trusted channel to certificate generation application, v1.0.1, BSI-CC-PP-0071-2012-MA-01
Part5: Extension for device with key generation and trusted communication with signature-creation application, v1.0.1, BSI-CC-PP-0072-2012-MA-01
Part 6: Extension for device with key import and trusted channel to signature creation application, v1.0.4, BSI-CC-PP-0076-2013-MA-01
|
heuristics/scheme_data/enhanced/sponsor |
NUVOTON TECHNOLOGY CORPORATION
|
THALES DIS
|
heuristics/scheme_data/expiration_date |
17 Avril 2029
|
22 Septembre 2028
|
heuristics/scheme_data/level |
EAL4+
|
EAL5+
|
heuristics/scheme_data/product |
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.1.2.2)
|
IAS Classic v5.2.1 with MOC Server v3.1 on MultiApp V5.1 (Versions 5.2.1.A.C et 5.2.1.A.O)
|
heuristics/scheme_data/sponsor |
NUVOTON TECHNOLOGY CORPORATION
|
THALES DIS
|
heuristics/scheme_data/url |
https://cyber.gouv.fr/produits-certifies/npct7xx-tpm20-rev-159-configuration-version-1122
|
https://cyber.gouv.fr/produits-certifies/ias-classic-v521-moc-server-v31-multiapp-v51-versions-521ac-et-521ao
|
heuristics/st_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
Certificat-CC-2024_09fr 1.1.2.2.pdf
|
Certificat-CC-2023_42fr.pdf
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/cc_cert_id/FR |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0059-2009-MA-02:
1
- BSI-CC-PP-0075-2012-MA-01:
1
- BSI-CC-PP-0071-2012-MA-01:
1
- BSI-CC-PP-0072-2012-MA-01:
1
- BSI-CC-PP-0076-2013-MA-01:
1
|
pdf_data/cert_keywords/cc_sar/ALC |
- ALC_FLR.1: 2
- ALC_DVS.2:
1
|
|
pdf_data/cert_keywords/cc_sar/ALC/ALC_DVS.2 |
1
|
1
|
pdf_data/cert_keywords/cc_sar/AVA |
|
|
pdf_data/cert_keywords/cc_security_level/EAL |
|
|
pdf_data/cert_keywords/cc_security_level/EAL/EAL2 |
1
|
1
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_metadata//CreationDate |
D:20240424095859+02'00'
|
D:20230929173949+02'00'
|
pdf_data/cert_metadata//Creator |
Acrobat PDFMaker 23 pour Word
|
Acrobat PDFMaker 23 pour Word
|
pdf_data/cert_metadata//Keywords |
|
|
pdf_data/cert_metadata//ModDate |
D:20240424100717+02'00'
|
D:20230929174206+02'00'
|
pdf_data/cert_metadata//Producer |
Adobe PDF Library 23.1.175
|
Adobe PDF Library 23.1.175
|
pdf_data/cert_metadata/pdf_file_size_bytes |
149443
|
158885
|
pdf_data/cert_metadata/pdf_hyperlinks |
|
|
pdf_data/cert_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/cert_metadata/pdf_number_of_pages |
2
|
2
|
pdf_data/report_filename |
ANSSI-CC-2024_09fr 1.1.2.2.pdf
|
ANSSI-CC-2023_42fr.pdf
|
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id/FR |
|
- ANSSI-CC-2023/42:
2
- ANSSI-CC-2023/31:
3
- ANSSI-CC-2023/01:
2
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0059-2009-MA-02:
2
- BSI-CC-PP-0075-2012-MA-01:
2
- BSI-CC-PP-0071-2012-MA-01:
2
- BSI-CC-PP-0072-2012-MA-01:
2
- BSI-CC-PP-0076-2013-MA-01:
2
- other:
- PP-SSCD-Part2:
2
- PP-SSCD-Part3:
2
- PP-SSCD-Part4:
2
- PP-SSCD-Part5:
2
- PP-SSCD-:
1
- PP-SSCD-Part6:
1
|
pdf_data/report_keywords/cc_sar |
- ALC:
- ALC_FLR.1:
2
- ALC_DVS.2:
1
- ALC_FLR:
1
- AVA:
|
|
pdf_data/report_keywords/cc_sar/ALC |
- ALC_FLR.1: 2
- ALC_DVS.2:
1
- ALC_FLR:
1
|
|
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 |
1
|
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR |
1
|
1
|
pdf_data/report_keywords/cc_sar/AVA |
|
|
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN |
1
|
1
|
pdf_data/report_keywords/cc_security_level/EAL |
|
|
pdf_data/report_keywords/cc_security_level/EAL/EAL2 |
2
|
2
|
pdf_data/report_keywords/cc_security_level/EAL/EAL7 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/ITSEC |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/eval_facility/CESTI/CESTI |
1
|
3
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
|
- CC:
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata//CreationDate |
D:20240424100001+02'00'
|
D:20230929174115+02'00'
|
pdf_data/report_metadata//Creator |
Acrobat PDFMaker 23 pour Word
|
Acrobat PDFMaker 23 pour Word
|
pdf_data/report_metadata//Keywords |
|
|
pdf_data/report_metadata//ModDate |
D:20240424100716+02'00'
|
D:20230929174205+02'00'
|
pdf_data/report_metadata//Producer |
Adobe PDF Library 23.1.175
|
Adobe PDF Library 23.1.175
|
pdf_data/report_metadata/pdf_file_size_bytes |
337932
|
540883
|
pdf_data/report_metadata/pdf_hyperlinks |
mailto:[email protected], http://www.ssi.gouv.fr/, http://www.commoncriteriaportal.org/, http://www.sogis.eu/ |
mailto:[email protected], http://www.ssi.gouv.fr/, http://www.commoncriteriaportal.org/, http://www.sogis.eu/ |
pdf_data/report_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/report_metadata/pdf_number_of_pages |
12
|
16
|
pdf_data/st_filename |
ANSSI-cible-CC-2024_09en 1.1.2.2.pdf
|
ANSSI-cible-2023_42en.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC |
24
|
2
|
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDH |
|
|
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA |
2
|
1
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_claims |
|
- O:
- O.SID:
1
- O.CIPHER:
1
- O.KEY-MNGT:
1
- O.REALLOCATION:
1
- O.GLOBAL_ARRAYS_INTEG:
1
- O.GLOBAL_ARRAYS_CONFID:
1
- O.ARRAY_VIEWS_CONFID:
1
- O.PIN-MNGT:
1
- O.OPERATE:
1
- O.ALARM:
1
- O.OBJ-DELETION:
1
- O.SCP:
3
- O.SECURE_LOAD_ACODE:
2
- O.SECURE_AC_ACTIVATION:
2
- O.CONFID-OS-UPDATE:
2
- O.FIREWALL:
1
- O.NATIVE:
1
- O.RNG:
1
- O.LOAD:
1
- O.INSTALL:
1
- O.DELETION:
1
- O.TRANSACTION:
1
- O.RESOURCES:
1
- O.CARD-MANAGEMENT:
1
- O.TOE_IDENTIFICATION:
1
- A:
- A.C:
5
- A.O:
5
- A.CGA:
3
- A.SCA:
3
- A.CSP:
3
- A.CAP_FILE:
4
- A.VERIFICATION:
4
- OE:
- OE.HID_VAD:
3
- OE.VERIFICATION:
7
- OE.CAP_FILE:
5
- OE.CODE-EVIDENCE:
5
- OE.SCP:
2
- OE.CARD-MANAGEMENT:
1
- OE.PERSONALISATION:
2
- OE.TERMINAL:
2
- OE.PROT_LOGICAL_DATA:
1
- OE.USER_OBLIGATIONS:
1
|
pdf_data/st_keywords/cc_claims/O |
|
- O.SID:
1
- O.CIPHER:
1
- O.KEY-MNGT:
1
- O.REALLOCATION:
1
- O.GLOBAL_ARRAYS_INTEG:
1
- O.GLOBAL_ARRAYS_CONFID:
1
- O.ARRAY_VIEWS_CONFID:
1
- O.PIN-MNGT:
1
- O.OPERATE:
1
- O.ALARM:
1
- O.OBJ-DELETION:
1
- O.SCP:
3
- O.SECURE_LOAD_ACODE:
2
- O.SECURE_AC_ACTIVATION:
2
- O.CONFID-OS-UPDATE:
2
- O.FIREWALL:
1
- O.NATIVE:
1
- O.RNG:
1
- O.LOAD:
1
- O.INSTALL:
1
- O.DELETION:
1
- O.TRANSACTION:
1
- O.RESOURCES:
1
- O.CARD-MANAGEMENT:
1
- O.TOE_IDENTIFICATION:
1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0059-2009-MA-02:
1
- BSI-CC-PP-0075-2012-MA-01:
1
- BSI-CC-PP-0071-2012-MA-01:
1
- BSI-CC-PP-0072-2012-MA-01:
1
- BSI-CC-PP-0076-2013-MA-01:
1
- BSI-CC-PP-0099-V2-2020:
1
- other:
- PP-SSCD-KG:
37
- PP-SSCD-KI:
28
- PP-SSCD:
4
|
pdf_data/st_keywords/cc_sar/ALC |
- ALC_FLR.1: 3
- ALC_DVS.2:
4
- ALC_DVS.1: 1
|
|
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 |
4
|
3
|
pdf_data/st_keywords/cc_sar/AVA |
|
|
pdf_data/st_keywords/cc_security_level/EAL |
- EAL 4:
1
- EAL4:
2
- EAL 4 augmented:
1
- EAL4 augmented:
1
|
- EAL5+:
1
- EAL 5+:
1
- EAL5:
3
- EAL5 augmented:
1
|
pdf_data/st_keywords/cc_sfr |
- FCO:
- FCS:
- FCS_RNG.1:
4
- FCS_RNG.1.1:
1
- FCS_RNG.1.2:
1
- FCS_CKM:
12
- FCS_CKM.2:
4
- FCS_COP.1:
11
- FCS_CKM.4:
14
- FCS_CKM.1:
12
- FCS_CKM.4.1:
1
- FCS_COP:
21
- FDP:
- FDP_ACC.1:
35
- FDP_IFC.1:
20
- FDP_RIP.1:
3
- FDP_RIP.1.1:
1
- FDP_ITC.1:
11
- FDP_ITC.2:
13
- FDP_ITT.1:
3
- FDP_ITT.1.1:
1
- FDP_ACC:
21
- FDP_ACF.1:
35
- FDP_ACC.2:
2
- FDP_ACF:
23
- FDP_UIT:
9
- FDP_UIT.1:
4
- FDP_SDI.1:
3
- FDP_SDI.1.1:
1
- FDP_ETC:
6
- FDP_ETC.2:
4
- FDP_ITC:
6
- FDP_UCT:
7
- FDP_UCT.1:
2
- FDP_ETC.1:
2
- FIA:
- FIA_UID.1:
7
- FIA_SOS.2:
3
- FIA_SOS.2.1:
1
- FIA_SOS.2.2:
1
- FIA_AFL:
12
- FIA_UAU.1:
7
- FIA_AFL.1:
8
- FIA_UID.1.1:
1
- FIA_UID.1.2:
1
- FIA_UAU.1.1:
1
- FIA_UAU.1.2:
1
- FIA_UAU.5:
3
- FIA_UAU.5.1:
1
- FIA_UAU.5.2:
1
- FIA_UAU.6:
3
- FIA_UAU.6.1:
1
- FIA_USB.1:
3
- FIA_ATD.1:
1
- FIA_USB.1.1:
1
- FIA_USB.1.2:
1
- FIA_USB.1.3:
1
- FIA_SOS.1:
1
- FMT:
- FMT_SMR.1:
21
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_SMF.1:
13
- FMT_SMF.1.1:
1
- FMT_MSA.2:
4
- FMT_MSA.1:
15
- FMT_MSA.2.1:
1
- FMT_MSA:
51
- FMT_MSA.4:
3
- FMT_MTD:
6
- FMT_MTD.1:
2
- FMT_MSA.3:
22
- FMT_MOF:
3
- FMT_MOF.1:
1
- FPT:
- FPT_STM.1:
2
- FPT_STM.1.1:
1
- FPT_TST.1:
5
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FPT_FLS:
7
- FPT_FLS.1:
2
- FPT_PHP.3:
3
- FPT_PHP.3.1:
1
- FPT_ITT.1:
3
- FPT_ITT.1.1:
1
- FPT_TDC.1:
1
- FTP:
- FTP_ITC.1:
5
- FTP_TRP.1:
5
- FTP_ITC:
3
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
|
- FAU:
- FCO:
- FCS:
- FCS_CKM:
59
- FCS_CKM.4:
12
- FCS_COP:
35
- FCS_COP.1:
6
- FCS_CKM.1.1:
2
- FCS_CKM.1:
10
- FCS_CKM.4.1:
2
- FCS_COP.1.1:
2
- FCS_CKM.2:
3
- FCS_CKM.3:
1
- FCS_RNG.1:
2
- FCS_RNG:
1
- FDP:
- FDP_DAU:
11
- FDP_UIT:
10
- FDP_ITC.1:
9
- FDP_ITC.2:
8
- FDP_ACC:
55
- FDP_ACF.1:
9
- FDP_ACC.1.1:
4
- FDP_ACF:
43
- FDP_ACC.1:
27
- FDP_ACF.1.1:
4
- FDP_ACF.1.2:
4
- FDP_ACF.1.3:
4
- FDP_ACF.1.4:
4
- FDP_DAU.1:
1
- FDP_DAU.2.1:
1
- FDP_DAU.2.2:
1
- FDP_ITC:
11
- FDP_ITC.1.1:
1
- FDP_ITC.1.2:
1
- FDP_RIP.1:
17
- FDP_RIP.1.1:
1
- FDP_SDI:
22
- FDP_SDI.1:
2
- FDP_SDI.2:
4
- FDP_UCT:
11
- FDP_UCT.1:
1
- FDP_UIT.1:
2
- FDP_AFC:
1
- FDP_IFC.1:
9
- FDP_IFC:
2
- FDP_IFF:
2
- FDP_RIP:
6
- FIA:
- FIA_API:
5
- FIA_AFL:
20
- FIA_API.1:
14
- FIA_API.1.1:
2
- FIA_UAU.1:
8
- FIA_UID.1:
14
- FIA_AFL.1:
4
- FIA_UAU:
28
- FIA_UAU.1.1:
1
- FIA_UAU.1.2:
1
- FIA_UID:
25
- FIA_ATD:
2
- FIA_USB:
1
- FMT:
- FMT_MSA.3:
15
- FMT_MOF.1:
9
- FMT_SMR.1:
36
- FMT_SMF.1:
27
- FMT_MOF.1.1:
1
- FMT_MSA:
80
- FMT_MSA.1:
10
- FMT_MSA.2:
9
- FMT_MSA.2.1:
1
- FMT_MSA.4:
3
- FMT_MTD:
25
- FMT_MTD.1:
3
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_SMR:
7
- FMT_SMF:
6
- FMT_LIM:
2
- FPR:
- FPT:
- FPT_EMS:
5
- FPT_EMS.1:
14
- FPT_EMS.1.1:
4
- FPT_EMS.1.2:
3
- FPT_TST.1:
14
- FPT_FLS.1:
13
- FPT_FLS.1.1:
1
- FPT_TST:
2
- FPT_PHP.1:
8
- FPT_PHP.1.1:
1
- FPT_PHP.1.2:
1
- FPT_PHP.3:
11
- FPT_PHP.3.1:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FPT_FLS:
6
- FPT_RCV:
2
- FTP:
- FTP_ITC:
42
- FTP_ITC.1:
16
- FTP_TRP.1:
4
- FTP_TRP:
1
|
pdf_data/st_keywords/cc_sfr/FCO |
|
|
pdf_data/st_keywords/cc_sfr/FCO/FCO_NRO |
6
|
1
|
pdf_data/st_keywords/cc_sfr/FCS |
- FCS_RNG.1:
4
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FCS_CKM:
12
- FCS_CKM.2:
4
- FCS_COP.1:
11
- FCS_CKM.4:
14
- FCS_CKM.1:
12
- FCS_CKM.4.1:
1
- FCS_COP:
21
|
- FCS_CKM:
59
- FCS_CKM.4:
12
- FCS_COP:
35
- FCS_COP.1:
6
- FCS_CKM.1.1: 2
- FCS_CKM.1:
10
- FCS_CKM.4.1:
2
- FCS_COP.1.1: 2
- FCS_CKM.2:
3
- FCS_CKM.3: 1
- FCS_RNG.1:
2
- FCS_RNG: 1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM |
12
|
59
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 |
12
|
10
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 |
4
|
3
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 |
14
|
12
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP |
21
|
35
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 |
11
|
6
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1 |
4
|
2
|
pdf_data/st_keywords/cc_sfr/FDP |
- FDP_ACC.1:
35
- FDP_IFC.1:
20
- FDP_RIP.1:
3
- FDP_RIP.1.1:
1
- FDP_ITC.1:
11
- FDP_ITC.2:
13
- FDP_ITT.1: 3
- FDP_ITT.1.1: 1
- FDP_ACC:
21
- FDP_ACF.1:
35
- FDP_ACC.2: 2
- FDP_ACF:
23
- FDP_UIT:
9
- FDP_UIT.1:
4
- FDP_SDI.1:
3
- FDP_SDI.1.1: 1
- FDP_ETC: 6
- FDP_ETC.2: 4
- FDP_ITC:
6
- FDP_UCT:
7
- FDP_UCT.1:
2
- FDP_ETC.1: 2
|
- FDP_DAU: 11
- FDP_UIT:
10
- FDP_ITC.1:
9
- FDP_ITC.2:
8
- FDP_ACC:
55
- FDP_ACF.1:
9
- FDP_ACC.1.1: 4
- FDP_ACF:
43
- FDP_ACC.1:
27
- FDP_ACF.1.1: 4
- FDP_ACF.1.2: 4
- FDP_ACF.1.3: 4
- FDP_ACF.1.4: 4
- FDP_DAU.1: 1
- FDP_DAU.2.1: 1
- FDP_DAU.2.2: 1
- FDP_ITC:
11
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_RIP.1:
17
- FDP_RIP.1.1:
1
- FDP_SDI: 22
- FDP_SDI.1:
2
- FDP_SDI.2: 4
- FDP_UCT:
11
- FDP_UCT.1:
1
- FDP_UIT.1:
2
- FDP_AFC: 1
- FDP_IFC.1:
9
- FDP_IFC: 2
- FDP_IFF: 2
- FDP_RIP: 6
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC |
21
|
55
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 |
35
|
27
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF |
23
|
43
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 |
35
|
9
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 |
20
|
9
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC |
6
|
11
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 |
11
|
9
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 |
13
|
8
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 |
3
|
17
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.1 |
3
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_UCT |
7
|
11
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_UCT.1 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT |
9
|
10
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT.1 |
4
|
2
|
pdf_data/st_keywords/cc_sfr/FIA |
- FIA_UID.1:
7
- FIA_SOS.2: 3
- FIA_SOS.2.1: 1
- FIA_SOS.2.2: 1
- FIA_AFL:
12
- FIA_UAU.1:
7
- FIA_AFL.1:
8
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_UAU.1.1:
1
- FIA_UAU.1.2:
1
- FIA_UAU.5: 3
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 3
- FIA_UAU.6.1: 1
- FIA_USB.1: 3
- FIA_ATD.1: 1
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FIA_SOS.1: 1
|
- FIA_API: 5
- FIA_AFL:
20
- FIA_API.1: 14
- FIA_API.1.1: 2
- FIA_UAU.1:
8
- FIA_UID.1:
14
- FIA_AFL.1:
4
- FIA_UAU: 28
- FIA_UAU.1.1:
1
- FIA_UAU.1.2:
1
- FIA_UID: 25
- FIA_ATD: 2
- FIA_USB: 1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL |
12
|
20
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1 |
8
|
4
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 |
7
|
8
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 |
7
|
14
|
pdf_data/st_keywords/cc_sfr/FMT |
- FMT_SMR.1:
21
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_SMF.1:
13
- FMT_SMF.1.1:
1
- FMT_MSA.2:
4
- FMT_MSA.1:
15
- FMT_MSA.2.1:
1
- FMT_MSA:
51
- FMT_MSA.4:
3
- FMT_MTD:
6
- FMT_MTD.1:
2
- FMT_MSA.3:
22
- FMT_MOF: 3
- FMT_MOF.1:
1
|
- FMT_MSA.3:
15
- FMT_MOF.1:
9
- FMT_SMR.1:
36
- FMT_SMF.1:
27
- FMT_MOF.1.1: 1
- FMT_MSA:
80
- FMT_MSA.1:
10
- FMT_MSA.2:
9
- FMT_MSA.2.1:
1
- FMT_MSA.4:
3
- FMT_MTD:
25
- FMT_MTD.1:
3
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_SMR: 7
- FMT_SMF: 6
- FMT_LIM: 2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MOF.1 |
1
|
9
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA |
51
|
80
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 |
15
|
10
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.2 |
4
|
9
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.2.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 |
22
|
15
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.4 |
3
|
3
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD |
6
|
25
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 |
2
|
3
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
13
|
27
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
21
|
36
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT |
- FPT_STM.1: 2
- FPT_STM.1.1: 1
- FPT_TST.1:
5
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FPT_FLS:
7
- FPT_FLS.1:
2
- FPT_PHP.3:
3
- FPT_PHP.3.1:
1
- FPT_ITT.1: 3
- FPT_ITT.1.1: 1
- FPT_TDC.1: 1
|
- FPT_EMS: 5
- FPT_EMS.1: 14
- FPT_EMS.1.1: 4
- FPT_EMS.1.2: 3
- FPT_TST.1:
14
- FPT_FLS.1:
13
- FPT_FLS.1.1: 1
- FPT_TST: 2
- FPT_PHP.1: 8
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3:
11
- FPT_PHP.3.1:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FPT_FLS:
6
- FPT_RCV: 2
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS |
7
|
6
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 |
2
|
13
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 |
3
|
11
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 |
5
|
14
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.3 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FTP |
- FTP_ITC.1:
5
- FTP_TRP.1:
5
- FTP_ITC:
3
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
- FTP_ITC:
42
- FTP_ITC.1:
16
- FTP_TRP.1:
4
- FTP_TRP: 1
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC |
3
|
42
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 |
5
|
16
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_TRP.1 |
5
|
4
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- out of scope:
1
- by authorized users. The functionalities of IAS Classic 5.2.1 other than the ones from SSCD are out of scope of the TOE perimeter. For BioPIN (MOC Server v3.1.1 application) provides biometry recognition with:
1
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256:
2
- P-384:
3
- NIST P-384:
1
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/randomness/RNG |
|
|
pdf_data/st_keywords/randomness/RNG/RNG |
17
|
3
|
pdf_data/st_keywords/side_channel_analysis/FI |
- Physical Tampering: 2
- physical tampering:
2
- malfunction: 2
- Malfunction: 2
|
- physical tampering:
4
- DFA: 1
- fault induction: 1
- fault injection: 1
|
pdf_data/st_keywords/side_channel_analysis/FI/physical tampering |
2
|
4
|
pdf_data/st_keywords/side_channel_analysis/SCA |
|
- SPA:
1
- DPA:
1
- timing attacks:
1
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS140-2:
2
- FIPS 186-3:
4
- FIPS 140-2:
3
- FIPS 180-4:
1
- FIPS 198-1:
2
- FIPS186-4:
2
- FIPS180-4:
1
- FIPS PUB 186-4:
1
- FIPS198-1:
1
- FIPS 197:
2
- FIPS 180-1:
1
- PKCS:
- BSI:
- RFC:
- ISO:
- ISO/IEC 15408:
2
- ISO/IEC 14888-3:
1
- ISO/IEC 9797-2:
1
- ISO/IEC 18033-3:
1
- ISO/IEC 15946-1:
1
- ISO/IEC 10116:2006:
1
- CC:
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
|
- FIPS:
- PKCS:
- ICAO:
- CC:
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2012-04-003:
1
- CCMB-2017-04-004:
1
|
pdf_data/st_keywords/standard_id/CC |
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003: 1
|
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2012-04-003: 1
- CCMB-2017-04-004: 1
|
pdf_data/st_keywords/standard_id/CC/CCMB-2017-04-001 |
1
|
1
|
pdf_data/st_keywords/standard_id/CC/CCMB-2017-04-002 |
1
|
1
|
pdf_data/st_keywords/standard_id/FIPS |
- FIPS140-2:
2
- FIPS 186-3:
4
- FIPS 140-2:
3
- FIPS 180-4:
1
- FIPS 198-1:
2
- FIPS186-4:
2
- FIPS180-4:
1
- FIPS PUB 186-4:
1
- FIPS198-1:
1
- FIPS 197:
2
- FIPS 180-1:
1
|
|
pdf_data/st_keywords/standard_id/PKCS |
|
|
pdf_data/st_keywords/standard_id/PKCS/PKCS#1 |
1
|
2
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES:
9
- AES-:
1
- AES-256:
2
- constructions:
|
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES |
- AES:
9
- AES-: 1
- AES-256: 2
|
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES |
9
|
6
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata |
- pdf_file_size_bytes:
2833410
- pdf_is_encrypted:
False
- pdf_number_of_pages:
90
- /Author:
Karsten Grans
- /CreationDate:
D:20240314170130+02'00'
- /Creator:
Microsoft® Word 2016
- /ModDate:
D:20240314170130+02'00'
- /Producer:
Microsoft® Word 2016
- /Subject: Security Target
- /Title:
Developer Document
- pdf_hyperlinks:
https://www.trustedcomputinggroup.org/home, file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23FDP_UCT_1_FW, file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23sfr_FMT_MSA_2_States, file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23sfr_FPT_FLS_1_States, file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23sfr_FDP_ACF_1_States, http://www.rsa.com/
|
- pdf_file_size_bytes:
2282348
- pdf_is_encrypted:
False
- pdf_number_of_pages:
69
- /Title:
IAS Classic v5.2 on MultiApp V5.1- Security Target
- /Author:
Emmanuel BACHIMON
- /Creator:
Microsoft® Word 2016
- /CreationDate:
D:20230504155302+02'00'
- /ModDate:
D:20230504155302+02'00'
- /Producer:
Microsoft® Word 2016
- pdf_hyperlinks:
|
pdf_data/st_metadata//Author |
Karsten Grans
|
Emmanuel BACHIMON
|
pdf_data/st_metadata//CreationDate |
D:20240314170130+02'00'
|
D:20230504155302+02'00'
|
pdf_data/st_metadata//Creator |
Microsoft® Word 2016
|
Microsoft® Word 2016
|
pdf_data/st_metadata//ModDate |
D:20240314170130+02'00'
|
D:20230504155302+02'00'
|
pdf_data/st_metadata//Producer |
Microsoft® Word 2016
|
Microsoft® Word 2016
|
pdf_data/st_metadata//Title |
Developer Document
|
IAS Classic v5.2 on MultiApp V5.1- Security Target
|
pdf_data/st_metadata/pdf_file_size_bytes |
2833410
|
2282348
|
pdf_data/st_metadata/pdf_hyperlinks |
https://www.trustedcomputinggroup.org/home, file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23FDP_UCT_1_FW, file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23sfr_FMT_MSA_2_States, file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23sfr_FPT_FLS_1_States, file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23sfr_FDP_ACF_1_States, http://www.rsa.com/ |
|
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
90
|
69
|
dgst |
aac4c61aee502a1e
|
5f61ebf23c6ad99d
|