name |
Intel® SOA Expressway v2.7.0.4 and Intel® SOA Expressway v2.7.0.4 for Healthcare |
Virtual Machine of ID Motion V1 G231 mask with AMD 122v1 |
category |
Boundary Protection Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
CA |
FR |
status |
archived |
archived |
not_valid_after |
15.05.2017 |
01.09.2019 |
not_valid_before |
30.09.2011 |
29.03.2013 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/intel-soa-v2704-cert-eng.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2013_11_fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1627_ST-Version_1_9%20(2).pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-cible-2013_11en.pdf |
manufacturer |
Intel Corporation |
Gemalto / Trusted Labs |
manufacturer_web |
https://www.intel.com |
https://www.gemalto.com |
security_level |
EAL4+, ALC_FLR.1 |
EAL7 |
dgst |
ab8096e5557ad548 |
32f420aa3f6ca59c |
heuristics/cert_id |
383-4-121 |
ANSSI-CC-2013/11 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_FLR.1, AGD_OPE.1, ASE_ECD.1, ADV_FSP.4, ATE_DPT.1, ADV_TDS.3, ALC_DEL.1, ALC_CMS.4, ALC_DVS.1, ALC_LCD.1, ADV_ARC.1, ADV_IMP.1, ASE_SPD.1, ASE_INT.1, ASE_OBJ.2, ASE_CCL.1, ASE_REQ.2, ATE_IND.2, ASE_TSS.1, ATE_COV.2, ATE_FUN.1, ALC_CMC.4, AGD_PRE.1, AVA_VAN.3, ALC_TAT.1 |
ALC_DVS.2, ADV_TDS.6, ADV_FSP.6, ADV_INT.3, ATE_FUN.2, ADV_COMP.1, ADV_IMP.2, ALC_CMC.5, ATE_COV.3, ADV_SPM.1, ALC_TAT.3, AVA_VAN.5, ALC_LCD.2, ATE_DPT.4 |
heuristics/extracted_versions |
2.7.0.4 |
- |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2012/85 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0813-2012, BSI-DSZ-CC-0640-2010, ANSSI-CC-2012/85 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0606-2010 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0606-2010 |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
intel-soa-v2704-cert-eng.pdf |
ANSSI-CC-2013_11_fr.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- CA:
- 383-4-121: 1
- 383-4-121-CR: 1
|
- FR:
- ANSSI-CC-2012/85: 5
- ANSSI-CC-2013/11: 18
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 1
- EAL 7: 3
- EAL4: 2
- EAL7: 2
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- FIPS:
- FIPS 140-2: 1
- FIPS 197: 1
- ISO:
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: sjackson
- /CC Version: 3.1R3
- /CC date: July 2009
- /CEM Version: 3.1R3
- /CEM date: July 2009
- /CR_Date: 29 August 2011
- /CR_Version: 0.2
- /Client City: Oakbrook Terrace
- /Client Country: USA
- /Client Full Name: Intel Corporation
- /Client Postal Code: 60181
- /Client Short Name: Intel
- /Client State: Illinois
- /Client Street: 1815 South Meyers Road, Suite 150
- /Comments: PCR Template Version 0.1-EWA-C (for CC 3.1)
- /Company: Microsoft
- /CreationDate: D:20111025093327-04'00'
- /Creator: Acrobat PDFMaker 10.0 for Word
- /Developer Long Name: Intel Corporation
- /Developer Short Name: Intel
- /EAL Level: 4+
- /EAL Level Base: 4
- /EAL Long: EAL 4 Augmented
- /EAL Short: EAL 4+
- /ETPlan_Doc#: 1627-000-D003
- /ETPlan_Title: Evaluation Test Plan
- /ETPlan_Version: X.X
- /ETPlan_date: dd month yyyyy
- /ETProcRes_Date: dd month yyyyy
- /ETProcRes_Doc#: 1627-000-D005
- /ETProcRes_Title: Evaluation Test Results
- /ETProcRes_Version: X.X
- /ETProc_Date: dd month yyyyy
- /ETProc_Doc#: 1627-000-D004
- /ETProc_Title: Evaluation Test Procedures
- /ETProc_Version: X.X
- /ETReport_Date: X August 2011
- /ETReport_Doc#: 1627-000-D002
- /ETReport_Title: Preliminary Evaluation Technical Report
- /ETReport_TitleShort: PETR
- /ETReport_Version: 1.2
- /EWP_Date: 1 April 2011
- /EWP_Doc#: 1627-000-D001
- /EWP_Title: Evaluation Work Plan
- /EWP_Version: 1.1
- /Eval number: 383-4-121
- /Eval_End_Date: [dd month yyyy (date on certificate)]
- /Eval_Start_Date: dd month yyyy
- /Keywords:
- /ModDate: D:20111025093514-04'00'
- /Producer: Acrobat Distiller 10.0.0 (Windows)
- /ProjectNumber: 1627
- /ST_Date: 24 August 2011
- /ST_Title: Intel® SOA Expressway v2.7 Security Target
- /ST_Version: Version 1.8
- /SVR_Date: dd month yyyyy
- /SVR_Doc#: 1627-000-D006
- /SVR_Title: Site Visit Report
- /SVR_Version: X.X
- /SV_City: TBD
- /Security Classification: EWA-Canada & Intel Proprietary
- /SourceModified: D:20111025133130
- /Sponsor: Intel®
- /Sponsor City: tbd
- /Sponsor Country: tbd
- /Sponsor Postal Code: tbd
- /Sponsor State: tbd
- /Sponsor Street: tbd
- /Subject:
- /TOE: SOA Expressway
- /TOE Short: SOAE
- /TOE Short with version: tbd
- /TOE Short-NoTM: SOAE v2.7.0.4
- /TOE Version: tbd
- /TOE with version: Intel® SOA Expressway v2.7.0.4 and SOA Expressway v2.7.0.4 for Healthcare
- /TOE-NoTM: tbd
- /Title: EAL X+ Evaluation of [Developer Long Name]
- pdf_file_size_bytes: 82511
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 13
|
- /Author: torno
- /CreationDate: D:20130304090501+02'00'
- /Creator: PDFCreator Version 0.9.0
- /Keywords:
- /ModDate: D:20130304090501+02'00'
- /Producer: AFPL Ghostscript 8.53
- /Subject:
- /Title: ANSSI-CC-2013_11_fr
- pdf_file_size_bytes: 166636
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 17
|
pdf_data/st_filename |
1627_ST-Version_1_9 (2).pdf |
anssi-cc-cible-2013_11en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0606-2010: 8
- BSI-DSZ-CC-0640-2010: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR: 1
- ALC_FLR.1: 2
- ALC_FLR.2: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_COMP.1: 1
- ADV_FSP.6: 2
- ADV_IMP.2: 2
- ADV_INT.3: 2
- ADV_SPM.1: 2
- ADV_TDS.6: 2
- ALC:
- ALC_CMC.5: 2
- ALC_DVS.2: 2
- ALC_LCD.2: 2
- ALC_TAT.3: 2
- ATE:
- ATE_COV.3: 2
- ATE_DPT.4: 2
- ATE_FUN.2: 2
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_ARP: 1
- FAU_ARP.1: 8
- FAU_ARP.1.1: 1
- FAU_GEN.1: 10
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_SAA.1: 8
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 1
- FAU_SAR.1: 9
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.3: 9
- FAU_SAR.3.1: 1
- FAU_SEL.1: 9
- FAU_SEL.1.1: 1
- FAU_STG.1: 10
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 7
- FAU_STG.3.1: 1
- FAU_STG.4: 10
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM.1: 1
- FCS_CKM.4: 2
- FCS_COP: 1
- FCS_COP.1: 9
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 2
- FDP_ETC.1: 8
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_IFC.1: 17
- FDP_IFC.1.1: 2
- FDP_IFF.1: 19
- FDP_IFF.1.1: 2
- FDP_IFF.1.2: 2
- FDP_IFF.1.3: 2
- FDP_IFF.1.4: 2
- FDP_IFF.1.5: 2
- FDP_ITC.1: 8
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 1
- FDP_RIP.1: 6
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 8
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 2
- FIA_ATD.1: 10
- FIA_ATD.1.1: 2
- FIA_SOS.1: 7
- FIA_SOS.1.1: 1
- FIA_UAU.1: 2
- FIA_UAU.2: 12
- FIA_UAU.2.1: 1
- FIA_UAU.5: 13
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.7: 6
- FIA_UAU.7.1: 1
- FIA_UID.1: 5
- FIA_UID.2: 13
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF: 1
- FMT_MOF.1: 23
- FMT_MOF.1.1: 2
- FMT_MSA.1: 11
- FMT_MSA.1.1: 1
- FMT_MSA.3: 14
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 10
- FMT_MTD.1.1: 1
- FMT_MTD.2: 9
- FMT_MTD.2.1: 1
- FMT_MTD.2.2: 1
- FMT_REV.1: 17
- FMT_REV.1.1: 2
- FMT_REV.1.2: 2
- FMT_SMF.1: 10
- FMT_SMF.1.1: 1
- FMT_SMR.1: 12
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 8
- FPT_FLS.1.1: 1
- FPT_ITT.1: 6
- FPT_ITT.1.1: 1
- FPT_STM.1: 9
- FPT_STM.1.1: 3
- FRU:
- FRU_FLT.2: 7
- FRU_FLT.2.1: 1
- FRU_RSA.1: 10
- FRU_RSA.1.1: 1
- FTA:
- FTA_SSL.3: 7
- FTA_SSL.3.1: 1
|
- FAU:
- FAU_ACC.2: 1
- FAU_ARP: 3
- FAU_ARP.1: 4
- FAU_ARP.1.1: 1
- FAU_GEN.1: 4
- FAU_SAA: 3
- FAU_SAA.1: 5
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 1
- FAU_SAS.1: 1
- FCS:
- FCS_CKM.1: 1
- FCS_COP.1: 2
- FCS_RND.1: 1
- FDP:
- FDP_ACC: 3
- FDP_ACC.1: 4
- FDP_ACC.2: 6
- FDP_ACC.2.1: 2
- FDP_ACC.2.2: 1
- FDP_ACF: 3
- FDP_ACF.1: 9
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_IFC.1: 1
- FDP_ITT.1: 1
- FDP_ROL: 3
- FDP_ROL.1: 3
- FDP_ROL.1.1: 1
- FDP_ROL.1.2: 1
- FDP_SDI.1: 1
- FDP_SDI.2: 1
- FMT:
- FMT_LIM.1: 1
- FMT_LIM.2: 1
- FMT_MSA.1: 1
- FMT_MSA.3: 3
- FMT_SMF.1: 1
- FPT:
- FPT_FLS: 3
- FPT_FLS.1: 8
- FPT_FLS.1.1: 1
- FPT_ITT.1: 1
- FPT_PHP.3: 1
- FPT_RCV: 3
- FPT_RCV.4: 5
- FPT_RCV.4.1: 1
- FPT_TST.2: 1
- FRU:
- FRU_FLT.2: 1
- FRU_RSA: 3
- FRU_RSA.1: 4
- FRU_RSA.1.1: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ACCESS: 3
- A.ASSET: 1
- A.DIRECT: 4
- A.GENPUR: 2
- A.LOWEXP: 4
- A.NOEVIL: 2
- A.NOREMO: 4
- A.PHYSEC: 2
- A.PUBLIC: 4
- A.REMACC: 2
- A.SINGEN: 4
- A.TIME_SOURCE: 3
- O:
- O.ACCOUN: 14
- O.ALARM: 9
- O.AUDIT: 10
- O.AUDREC: 4
- O.CRYPTOGRAPHY: 10
- O.EAL: 3
- O.ENCRYP: 6
- O.IDAUTH: 10
- O.LIMEXT: 4
- O.MEDIAT: 13
- O.ROLE: 7
- O.SECFUN: 11
- O.SECSTA: 5
- O.SELPRO: 8
- O.SINUSE: 6
- O.TOE_AVAILABLE: 11
- OE:
- OE.ACCESS: 2
- OE.ADMTRA: 4
- OE.ASSET: 2
- OE.CONSOLE: 2
- OE.DIRECT: 3
- OE.GENPUR: 3
- OE.GUIDAN: 3
- OE.GUIDANCE: 1
- OE.IDAUTH: 4
- OE.LOWEXP: 3
- OE.NOEVIL: 3
- OE.NOREMO: 3
- OE.PHYSCEC: 1
- OE.PHYSEC: 2
- OE.PUBLIC: 4
- OE.REMACC: 3
- OE.SINGEN: 3
- OE.TIME_SOURCE: 4
- T:
- T.ASPOOF: 4
- T.ATTACK_DATA: 3
- T.ATTACK_POTENTIAL: 5
- T.AUDACC: 2
- T.AUDFUL: 4
- T.AUDIT_UNDETECTED: 3
- T.BAD_ADMIN: 5
- T.BAD_CREDENTIALS: 3
- T.CAPTURE: 5
- T.DENIAL: 3
- T.ENHANCEDEXP: 5
- T.HIJACK: 3
- T.INTERNAL: 5
- T.LOWEXP: 1
- T.MEDIAT: 2
- T.MODIFY_: 1
- T.MODIFY_PROTOCOL: 4
- T.NOAUTH: 3
- T.OLDINF: 4
- T.PROCOM: 2
- T.REMOTE_ATTACK: 5
- T.REPEAT: 2
- T.REPLAY: 4
- T.SELPRO: 2
- T.SERVICE_MISUSE: 5
- T.UNAVAILABLE: 3
- T.USAGE: 4
|
- A:
- A.APPLI_CONT: 1
- A.CIPHER: 1
- A.CLON: 1
- A.DECIPHER: 1
- A.DIS_MEMORY: 1
- A.LOAD: 2
- A.MOD_MEMORY: 1
- A.OPERATE: 1
- A.REMOVE: 1
- A.SECURITY: 2
- A.SIDE: 1
- A.TAMPER_ES: 2
- O:
- O.APPLI_DEV: 3
- O.CIPHER: 1
- O.DECIPHER: 1
- O.DEV_DIS_ES: 4
- O.DLV_DATA: 4
- O.EFECT_REMOVE: 1
- O.EFFECT_LOAD: 3
- O.EFFECT_REMOVE: 3
- O.FLAW: 1
- O.INIT_ACS: 3
- O.LOAD: 2
- O.REMOVE: 1
- O.RESOURCE: 3
- O.RND: 1
- O.ROLLBACK: 2
- O.SAMPLE_ACS: 1
- O.SECURITY: 1
- O.SEGREGATE: 3
- O.SIDE: 3
- O.TAMPER_ES: 5
- OSP:
- OSP.CIPHER: 1
- OSP.CONF-ALU: 1
- T:
- T.APP_CORR: 3
- T.APP_DISC: 3
- T.APP_MOD: 4
- T.APP_READ: 3
- T.APP_REMOVE: 4
- T.DEL_REMOVE: 4
- T.DIS_DATA: 6
- T.DIS_TEST_ES: 2
- T.ERR_REMOVE: 3
- T.LOAD_APP: 4
- T.LOAD_MAN: 2
- T.LOAD_MOD: 2
- T.LOAD_OTHER: 2
- T.MOD: 2
- T.MOD_DATA: 4
- T.MOD_EXE: 4
- T.MOD_LOAD: 2
- T.MOD_SHARE: 2
- T.MOD_TSF: 3
- T.RESOURCES: 2
- T.RND: 1
- T.T_CMD: 4
- T.T_ES: 2
- T.T_TOOLS: 2
|
pdf_data/st_keywords/vendor |
|
- Gemalto:
- Infineon:
- Infineon: 2
- Infineon Technologies: 5
- Thales:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 3
- malfunction: 1
- SCA:
- Leak-Inherent: 3
- Physical Probing: 2
- physical probing: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140-2: 8
- FIPS 197: 2
- FIPS PUB 140-2: 2
- NIST:
- X509:
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- for secure loading and execution of smartcard applications. Note that cryptographic primitives are out of scope. 1.5.4 Smartcard Product Life Cycle The Smartcard product life-cycle is decomposed into seven: 1
- out of scope: 3
- the other subsystems of the MULTOS OS and some following ROMed applications (these elements are out of scope of the TOE): Mel applications and modules ROMed: - MPCOS V3.7 - Pin Server Application (PSA) v1.0: 1
- these elements are out of scope of the TOE): Mel applications and modules ROMed: - MPCOS V3.7 - Pin Server Application (PSA: 1
- to the context in which the security functions take place. Note that cryptographic primitives are out of scope. Table 12 shows how these security functions satisfy the TOE security functional requirements. 7.1: 1
|
pdf_data/st_metadata |
- /AM_ACPP_Date: [dd month yyyy]
- /AM_ACPP_Doc#: [AM_AMCPP_Doc#]
- /AM_ACPP_Title: Assurance Continuity Program Plan (ACPP)
- /AM_ACPP_Version: [AM_AMCPP_Version]
- /AM_IAR_Date: [dd month yyyy]
- /AM_IAR_Doc#: [AM_IAR_Doc#]
- /AM_IAR_Title: Assurance Maintenace Impact Analysis Report
- /AM_IAR_Version: [AM_IAR_Version]
- /AM_ST Date: [dd month yyyy]
- /AM_ST Title: [AM_ST Title]
- /AM_ST Version: [AM_ST Version]
- /AM_TOE: [AM_TOE]
- /AM_TOE Short: [AM_TOE Short]
- /AM_TOE Version: [AM_TOE Version]
- /Author: Mark Gauvreau
- /CC Version: 3.1R3
- /CC date: July 2009
- /CEM Version: 3.1R3
- /CEM date: July 2009
- /CR_Date: [dd month yyyy]
- /CR_Version: [x.x]
- /Client City: Oakbrook Terrace
- /Client Country: U.S.A.
- /Client Full Name: Intel Corporation
- /Client Postal Code: 60181
- /Client Short Name: Intel
- /Client State: Illinois
- /Client Street: 1815 South Meyers Road, Suite 150
- /Comments: CC V3.1 Evaluation Work Plan
Template Version 1_2
- /Company: EWA-Canada
- /CreationDate: D:20111123095733-05'00'
- /Creator: Acrobat PDFMaker 10.0 for Word
- /Developer Long Name: Intel Corporation
- /Developer Short Name: Intel
- /EAL Level: 4+
- /EAL Level Base: 4
- /EAL Long: EAL 4+
- /EAL Short: EAL 4+
- /ETPlan_Doc#: 1627-000-D003
- /ETPlan_Title: Evaluation Test Plan
- /ETPlan_Version: [0.x]
- /ETPlan_date: [dd month yyyy]
- /ETProcRes_Date: [dd month yyyy]
- /ETProcRes_Doc#: 1627-000-D005
- /ETProcRes_Title: Evaluation Test Results
- /ETProcRes_Version: [0.x]
- /ETProc_Date: [dd month yyyy]
- /ETProc_Doc#: 1627-000-D004
- /ETProc_Title: Evaluation Test Procedures
- /ETProc_Version: [0.x]
- /ETReport_Date: [dd month yyyy]
- /ETReport_Doc#: 1627-000-D002
- /ETReport_Title: Evaluation Technical Report
- /ETReport_Version: [0.x]
- /EWP_Date: [dd month yyyy]
- /EWP_Doc#: 1627-000-D001
- /EWP_Title: Evaluation Work Plan
- /EWP_Version: [0.x]
- /Eval number: [TBD]
- /Eval_End_Date: [dd month yyyy (date on certificate)]
- /Eval_Start_Date: [dd month yyyy (registration)]
- /ModDate: D:20111123134717-05'00'
- /Producer: Adobe PDF Library 10.0
- /ProjectNumber: 1627
- /ST_Date: August 30, 2011
- /ST_Doc#: 1627-006
- /ST_Title: Intel® SOA Expressway v2.7.0.4 and Intel® SOA Expressway v2.7.0.4 for Healthcare Security Target
- /ST_Version: 1.9
- /SVR_Date: [dd month yyyy]
- /SVR_Doc#: 1627-000-D006
- /SVR_Title: Site Visit Report
- /SVR_Version: [0.x]
- /SV_City: [site vist city/cities]
- /Security Classification: EWA-Canada & Intel Proprietary
- /SourceModified: D:20111123145656
- /Sponsor: Intel Corporation
- /Sponsor City: Oakbrook Terrace
- /Sponsor Country: U.S.A
- /Sponsor Postal Code: 60181
- /Sponsor State: Illinois
- /Sponsor Street: 1815 South Meyers Road, Suite 150
- /TOE: Intel® SOA Expressway
- /TOE Short: SOAE
- /TOE Short with version: SOAE Version 2.7.0.4
- /TOE Short-NoTM: SOAE
- /TOE Version: Version 2.7.0.4
- /TOE with version: Intel® SOA Expressway Version 2.7.0.4
- /Title: Evaluation Work Plan
- pdf_file_size_bytes: 1040341
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 64
|
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |