Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
IBM Tivoli Access Manager for e-business version 6.1.1 FP4 with IBM Tivoli Federated Identity Manager version 6.2.1 FP2
BSI-DSZ-CC-0636-2012
Virtual Machine of ID Motion V1 G230 mask with AMD 122v1
ANSSI-CC-2013/10
name IBM Tivoli Access Manager for e-business version 6.1.1 FP4 with IBM Tivoli Federated Identity Manager version 6.2.1 FP2 Virtual Machine of ID Motion V1 G230 mask with AMD 122v1
category Access Control Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme DE FR
not_valid_before 22.06.2012 25.03.2013
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0636a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2013_10_fr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0636b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-cible2013_10en.pdf
manufacturer IBM Corporation Gemalto / Trusted Labs
manufacturer_web https://www.ibm.com https://www.gemalto.com
security_level EAL4+, ALC_FLR.3 EAL7
dgst ab61ad860c8f4c38 36c11c9e89af25a3
heuristics/cert_id BSI-DSZ-CC-0636-2012 ANSSI-CC-2013/10
heuristics/cert_lab BSI []
heuristics/cpe_matches cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.7:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.16:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.25:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.22:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.21:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.28:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.13:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.27:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.23:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.5:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.3:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.6:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.29:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.18:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.4:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.20:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.19:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.12:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.2:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.24:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.17:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.9:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.8:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.1:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.26:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.11:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.10:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.15:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.30:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.14:*:*:*:*:*:*:* {}
heuristics/related_cves CVE-2010-4623, CVE-2017-1489, CVE-2010-4120, CVE-2011-0494 {}
heuristics/extracted_sars ASE_INT.1, ALC_CMC.4, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, APE_REQ.2, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_INT.3, APE_INT.1, APE_SPD.1, ADV_FSP.4, ATE_IND.2, APE_OBJ.2, ASE_CCL.1, ADV_SPM.1 ALC_LCD.2, ATE_DPT.4, ADV_INT.3, AVA_VAN.5, ADV_COMP.1, ADV_FSP.6, ALC_DVS.2, ALC_TAT.3, ATE_FUN.2, ADV_IMP.2, ALC_CMC.5, ADV_TDS.6, ATE_COV.3, ADV_SPM.1
heuristics/extracted_versions 6.1.1, 6.2.1 -
heuristics/report_references/directly_referencing {} ANSSI-CC-2012/44
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0640-2010, ANSSI-CC-2012/44, BSI-DSZ-CC-0813-2012
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0606-2010, BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0813-2012
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0606-2010, BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0813-2012
pdf_data/report_filename 0636a_pdf.pdf ANSSI-CC-2013_10_fr.pdf
pdf_data/report_frontpage
  • FR:
  • DE:
    • cert_id: BSI-DSZ-CC-0636-2012
    • cert_item: IBM Tivoli Access Manager for e-Business version 6.1.1 FP4 with IBM Tivoli Federated Identity Manager version 6.2.1 FP2
    • cert_lab: BSI
    • developer: IBM Corporation
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
  • FR:
  • DE:
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0636-2012: 21
  • FR:
    • ANSSI-CC-2012/44: 5
    • ANSSI-CC-2013/10: 18
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 6
    • EAL 4 augmented: 3
    • EAL1: 7
    • EAL2: 3
    • EAL3: 4
    • EAL4: 6
    • EAL5: 6
    • EAL6: 3
    • EAL7: 4
  • ITSEC:
    • ITSEC Evaluation: 1
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 5: 1
    • EAL 7: 3
    • EAL4: 2
    • EAL7: 2
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 2
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 2
    • ALC_CMS.5: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 2
    • ALC_DVS: 1
    • ALC_DVS.1: 2
    • ALC_DVS.2: 1
    • ALC_FLR: 1
    • ALC_FLR.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 6
    • ALC_LCD.1: 2
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 2
    • ALC_TAT.2: 1
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 1
    • ATE_DPT.4: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 1
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_FLR: 2
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 2
pdf_data/report_keywords/vendor
  • Gemalto:
    • Gemalto: 9
  • Infineon:
    • Infineon: 1
pdf_data/report_keywords/eval_facility
  • atsec:
    • atsec: 3
  • TrustedLabs:
    • Trusted Labs: 3
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 2
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 5
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 32: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Version 3, 25th May 2012, Final Evaluation Technical Report, atsec information security GmbH (confidential document) [8] Configuration lists for the TOE (confidential documents) [CIL-FLR] Lists the security flaw: 1
pdf_data/report_metadata
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20120731090521+02'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, Access Control, TAMeb, TFIM, ISO 10181-3, aznAPI, Tivoli Access Manager for e-business Version 6.1.1 FP4 with Tivoli FederatedIdentity Manager 6.2.1 FP2"
  • /ModDate: D:20120731090934+02'00'
  • /Producer: OpenOffice.org 3.2
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0636-2012
  • pdf_file_size_bytes: 1396851
  • pdf_hyperlinks: https://www.bsi.bund.dea/, https://www.bsi.bund.de/zertifizierung
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 38
  • /Author: torno
  • /CreationDate: D:20130325134815+01'00'
  • /Creator: PDFCreator Version 0.9.0
  • /Keywords:
  • /ModDate: D:20130325134815+01'00'
  • /Producer: AFPL Ghostscript 8.53
  • /Subject:
  • /Title: ANSSI-CC-2013_10_fr
  • pdf_file_size_bytes: 167352
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 17
pdf_data/st_filename 0636b_pdf.pdf anssi-cc-cible2013_10en.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0636: 1
  • DE:
    • BSI-DSZ-CC-0606-2010: 4
    • BSI-DSZ-CC-0640-2010: 7
    • BSI-DSZ-CC-0813-2012: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 2
  • EAL:
    • EAL5+: 1
    • EAL7: 4
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.3: 4
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 1
  • ADV:
    • ADV_COMP.1: 1
    • ADV_FSP.6: 2
    • ADV_IMP.2: 2
    • ADV_INT.3: 2
    • ADV_SPM.1: 2
    • ADV_TDS.6: 2
  • ALC:
    • ALC_CMC.5: 2
    • ALC_DVS.2: 2
    • ALC_LCD.2: 2
    • ALC_TAT.3: 2
  • ATE:
    • ATE_COV.3: 2
    • ATE_DPT.4: 2
    • ATE_FUN.2: 2
  • AVA:
    • AVA_VAN.5: 3
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 11
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 5
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 7
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SEL.1: 6
    • FAU_SEL.1.1: 1
    • FAU_STG.1: 6
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 4
    • FAU_STG.3.1: 1
  • FDP:
    • FDP_ACC.1: 4
    • FDP_ACC.2: 16
    • FDP_ACC.2.1: 2
    • FDP_ACC.2.2: 2
    • FDP_ACF.1: 13
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 2
  • FIA:
    • FIA_AFL.1: 5
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 2
    • FIA_ATD.1: 11
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 7
    • FIA_SOS.1.1: 1
    • FIA_UAU: 1
    • FIA_UAU.1: 8
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.2: 25
    • FIA_UAU.2.1: 4
    • FIA_UAU.5: 5
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 5
    • FIA_UAU.6.1: 1
    • FIA_UID.1: 15
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_UID.2: 25
    • FIA_UID.2.1: 4
    • FIA_USB.1: 10
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 12
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 14
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 12
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 11
    • FMT_MTD.1.1: 2
    • FMT_SMF.1: 19
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 10
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 6
    • FPT_STM.1.1: 1
  • FAU:
    • FAU_ACC.2: 1
    • FAU_ARP: 3
    • FAU_ARP.1: 4
    • FAU_ARP.1.1: 1
    • FAU_GEN.1: 4
    • FAU_SAA: 3
    • FAU_SAA.1: 5
    • FAU_SAA.1.1: 1
    • FAU_SAA.1.2: 1
    • FAU_SAS.1: 1
  • FCS:
    • FCS_CKM.1: 1
    • FCS_COP.1: 2
    • FCS_RND.1: 1
  • FDP:
    • FDP_ACC: 3
    • FDP_ACC.1: 4
    • FDP_ACC.2: 6
    • FDP_ACC.2.1: 2
    • FDP_ACC.2.2: 1
    • FDP_ACF: 3
    • FDP_ACF.1: 9
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 1
    • FDP_ITT.1: 1
    • FDP_ROL: 3
    • FDP_ROL.1: 3
    • FDP_ROL.1.1: 1
    • FDP_ROL.1.2: 1
    • FDP_SDI.1: 1
    • FDP_SDI.2: 1
  • FMT:
    • FMT_LIM.1: 1
    • FMT_LIM.2: 1
    • FMT_MSA.1: 1
    • FMT_MSA.3: 3
    • FMT_SMF.1: 1
  • FPT:
    • FPT_FLS: 3
    • FPT_FLS.1: 8
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 1
    • FPT_PHP.3: 1
    • FPT_RCV: 3
    • FPT_RCV.4: 5
    • FPT_RCV.4.1: 1
    • FPT_TST.2: 1
  • FRU:
    • FRU_FLT.2: 1
    • FRU_RSA: 3
    • FRU_RSA.1: 4
    • FRU_RSA.1.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 3
    • A.ADM_PWMAN: 2
    • A.AUDIT_CONFIG: 3
    • A.CLIENT_KEYMAN: 2
    • A.CLIENT_PWMAN: 3
    • A.CRED_PROT: 5
    • A.DIR_PROT: 2
    • A.NOBYPASS: 6
    • A.OS_CONF_MGMT: 2
    • A.PHYS_PROT: 2
    • A.PROTECTED_NET: 3
    • A.PROTOCOL_SEC: 3
    • A.SEC_COM: 3
    • A.SINGLE_APP: 3
  • O:
    • O.ACCESS_DECISION: 16
    • O.ACC_ADM: 8
    • O.AUDITING: 13
    • O.AUTHENT_ADMIN: 11
    • O.AUTHENT_SERVER: 12
    • O.AUTHENT_USER: 8
    • O.AUTHENT_USERS: 1
    • O.AUTHORIZATION: 7
    • O.MANAGE: 11
    • O.PWD_STRENGH: 1
    • O.PWD_STRENGTH: 4
    • O.TIME: 4
  • OE:
    • OE.AUDIT_CONFIG: 3
    • OE.CREDEN: 5
    • OE.DS_ACCESS_CNTRL: 6
    • OE.DS_AUTHENT: 6
    • OE.INSTALL: 8
    • OE.OS_CONFFILE_PROT: 3
    • OE.OS_OPERATE: 6
    • OE.PHYSICAL: 4
    • OE.PROTOCOL_SEC: 3
    • OE.PWD_STRENGTH: 3
    • OE.SEC_COM: 3
    • OE.SEC_INTEGRATE: 3
  • T:
    • T.UAACTION: 2
    • T.UAUSER: 6
  • A:
    • A.APPLI_CONT: 1
    • A.CIPHER: 1
    • A.CLON: 1
    • A.DECIPHER: 1
    • A.DIS_MEMORY: 1
    • A.LOAD: 2
    • A.MOD_MEMORY: 1
    • A.OPERATE: 1
    • A.REMOVE: 1
    • A.SECURITY: 2
    • A.SIDE: 1
    • A.TAMPER_ES: 2
  • O:
    • O.APPLI_DEV: 3
    • O.CIPHER: 1
    • O.DECIPHER: 1
    • O.DEV_DIS_ES: 4
    • O.DLV_DATA: 4
    • O.EFECT_REMOVE: 1
    • O.EFFECT_LOAD: 3
    • O.EFFECT_REMOVE: 3
    • O.FLAW: 1
    • O.INIT_ACS: 3
    • O.LOAD: 2
    • O.REMOVE: 1
    • O.RESOURCE: 3
    • O.RND: 1
    • O.ROLLBACK: 2
    • O.SAMPLE_ACS: 1
    • O.SECURITY: 1
    • O.SEGREGATE: 3
    • O.SIDE: 3
    • O.TAMPER_ES: 5
  • OSP:
    • OSP.CIPHER: 1
    • OSP.CONF-ALU: 1
  • T:
    • T.APP_CORR: 3
    • T.APP_DISC: 3
    • T.APP_MOD: 4
    • T.APP_READ: 3
    • T.APP_REMOVE: 4
    • T.DEL_REMOVE: 4
    • T.DIS_DATA: 6
    • T.DIS_TEST_ES: 2
    • T.ERR_REMOVE: 3
    • T.LOAD_APP: 4
    • T.LOAD_MAN: 2
    • T.LOAD_MOD: 2
    • T.LOAD_OTHER: 2
    • T.MOD: 2
    • T.MOD_DATA: 4
    • T.MOD_EXE: 4
    • T.MOD_LOAD: 2
    • T.MOD_SHARE: 2
    • T.MOD_TSF: 3
    • T.RESOURCES: 2
    • T.RND: 1
    • T.T_CMD: 4
    • T.T_ES: 2
    • T.T_TOOLS: 2
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft Corporation: 1
  • Gemalto:
    • Gemalto: 318
  • Infineon:
    • Infineon: 4
    • Infineon Technologies: 5
  • Thales:
    • Thales: 1
pdf_data/st_keywords/eval_facility
  • atsec:
    • atsec: 85
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 6
      • AES-: 1
  • DES:
    • 3DES:
      • TDEA: 4
    • DES:
      • DES: 3
  • constructions:
    • MAC:
      • HMAC: 1
  • DES:
    • 3DES:
      • 3DES: 2
    • DES:
      • DES: 4
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
    • SHA2:
      • SHA-224: 1
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 2
    • TLS:
      • TLS: 45
      • TLS v1.0: 16
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 1
  • RNG:
    • RND: 2
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_RSA_WITH_AES_128_CBC_SHA: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 3
    • malfunction: 1
  • SCA:
    • Leak-Inherent: 3
    • Physical Probing: 2
    • physical probing: 1
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS 20: 1
    • BSI-AIS20: 1
  • FIPS:
    • FIPS140-2: 1
    • FIPS180-2: 1
    • FIPS186-2: 1
    • FIPS197: 1
    • FIPS46-3: 1
    • FIPS81: 1
  • ISO:
    • ISO/IEC 15408: 2
  • RFC:
    • RFC 2246: 1
    • RFC 2313: 1
    • RFC 3268: 1
    • RFC2246: 1
    • RFC2313: 1
    • RFC3268: 1
  • X509:
    • X.509: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • for secure loading and execution of smartcard applications. Note that cryptographic primitives are out of scope. 1.5.4 Smartcard Product Life Cycle The Smartcard product life-cycle is decomposed into seven: 1
    • out of scope: 3
    • the other subsystems of the MULTOS OS and some following ROMed applications (these elements are out of scope of the TOE): Mel applications and modules ROMed: - MPCOS V3.7 - Pin Server Application (PSA) v1.0: 1
    • these elements are out of scope of the TOE): Mel applications and modules ROMed: - MPCOS V3.7 - Pin Server Application (PSA: 1
    • to the context in which the security functions take place. Note that cryptographic primitives are out of scope. Table 12 shows how these security functions satisfy the TOE security functional requirements. 7.1: 1
pdf_data/st_metadata
  • /Author: Scott Chapman
  • /CreationDate: D:20120516114444-05'00'
  • /Creator: Microsoft® Office Word 2007
  • /Keywords: TAMeb, TFIM
  • /ModDate: D:20120731152053+02'00'
  • /Producer: Microsoft® Office Word 2007
  • /Title: Tivoli Access Manager for e-business Version 6.1.1 FP4 with Tivoli Federated Identity Manager 6.2.1 FP2 Security Target
  • pdf_file_size_bytes: 996333
  • pdf_hyperlinks: http://www.oasis-open.org/committees/download.php/6837/sstc-saml-tech-overview-1.1-cd.pdf
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 83
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different