name |
McAfee Enterprise Mobility Management 12.0 |
Gemalto ECC CPU card - CPU e-purse application on GCX5.1 (MPH098) platform on NXP P5CD081V1A Version 1.0 |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
CA |
FR |
status |
archived |
archived |
not_valid_after |
04.09.2019 |
01.09.2019 |
not_valid_before |
04.09.2014 |
13.04.2011 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-275%20CT%20v1.0e.docx |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-275%20CR%20v1.0e.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2011-05en.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-275%20ST%20v1.16.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2011-05en.pdf |
manufacturer |
McAfee, Inc. |
Gemalto / NXP Semiconductors |
manufacturer_web |
https://www.mcafee.com/ |
https://www.gemalto.com/ |
security_level |
EAL2+, ALC_FLR.2 |
EAL4+, ALC_DVS.2, AVA_VAN.5 |
dgst |
b193f130f541449d |
1c639f9d703d2d91 |
heuristics/cert_id |
383-4-275 |
ANSSI-CC-2011/05 |
heuristics/cert_lab |
CANADA |
CEA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ALC_CMC.2, ATE_IND.2, ALC_DEL.1, ATE_COV.1, ADV_ARC.1, AVA_VAN.2, AGD_OPE.1, ADV_FSP.2, ALC_FLR.2, AGD_PRE.1 |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_TAT.1, ASE_SPD.1, AVA_VAN.5, ADV_COMP.1, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_TSS.2, ASE_REQ.2, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
12.0 |
5.1, 1.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0555-2009 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0555-2009 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0555-2009 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0555-2009 |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
383-4-275 CT v1.0e.docx |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
383-4-275 CR v1.0e.pdf |
ANSSI-CC_2011-05en.pdf |
pdf_data/report_frontpage |
- FR:
- CA:
- cert_id: 383-4-275-CR
- cert_lab: CANADA
|
- FR:
- cc_security_level: EAL 4 augmented ALC_DVS.2, AVA_VAN.5
- cc_version: Common Criteria version 3.1 revision 3
- cert_id: ANSSI-CC-2011/05
- cert_item: Gemalto ECC CPU card on GCX5.1 (MPH098) platform on NXP P5CD081V1A
- cert_item_version: CPU e-purse on GCX5.1 MPH098 Version 1.0
- cert_lab: CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France Phone: +33 (0)4 38 78 37 78, email : [email protected]
- developer: Gemalto SA 6 rue de la Verrerie, 92197 Meudon, France NXP Semiconductors GmbH Stresemannallee 101, D-22502 Hamburg, Germany Sponsor Gemalto SA 6 rue de la Verrerie, 92197 Meudon, France
- match_rules: ['Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developer\\(s\\)(.+)Evaluation facility(.+)Recognition arrangements']
- ref_protection_profiles: None
- CA:
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 2 augmented: 1
- EAL 2+: 3
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 2
- EAL 4 augmented: 2
- EAL 5: 1
- EAL 7: 1
- EAL4: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 1
- ALC_LCD: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Gemalto:
- NXP:
- NXP: 24
- NXP Semiconductors: 2
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- OutOfScope:
- - The NXP P5CD081 IC The Other applications1 on the card are written in java language and are out of scope of the TOE. 1.2.4. Life cycle The product’s life cycle is organised as follow: 1 Applications: 1
- out of scope: 1
|
pdf_data/report_metadata |
- /Author: cpclark
- /CR date: 04 September 2014
- /CR version: 1.0
- /Certificate date: 04 September 2014
- /Company: CSEC-CSTC
- /Conformance Claim: EAL 2 augmented
- /CreationDate: D:20140922130520-04'00'
- /Creator: Acrobat PDFMaker 10.0 for Word
- /Developer name: McAfee, Inc.
- /Document number: 383-4-275-CR
- /ETR title, version, date: Evaluation Technical Report for EAL 2+ Common Criteria Evaluation of McAfee, Inc. McAfee Enterprise Mobility Management 12.0, Version 0.3, 15 August 2014
- /Evaluation completion date: 15 August 2014
- /ModDate: D:20140922130523-04'00'
- /Producer: Adobe PDF Library 10.0
- /ST Title: Security Target: McAfee Enterprise Mobility Management 12.0, v1.16, 20 July 2014
- /SourceModified: D:20140903182940
- /TOE name and version: McAfee Enterprise Mobility Management 12.0
- /TOE short name: McAfee EMM v12.0
- /Title: 383-4-XXX CR vxe
- /_DocHome: -1616610741
- pdf_file_size_bytes: 289620
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 15
|
- /CreationDate: D:20110629162959+02'00'
- /Keywords:
- /ModDate: D:20110629162959+02'00'
- /Producer: Acrobat Distiller 8.1.0 (Windows)
- pdf_file_size_bytes: 278826
- pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 18
|
pdf_data/st_filename |
383-4-275 ST v1.16.pdf |
ANSSI-CC-cible_2011-05en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0555: 1
- BSI-DSZ-CC-0555-: 1
- BSI-DSZ-CC-0555-2009: 4
- NL:
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL4: 4
- EAL4 augmented: 3
- EAL4+: 2
- EAL5: 1
- EAL5 augmented: 1
- EAL5+: 2
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.2: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.2: 1
- ALC_CMS: 1
- ALC_CMS.2: 1
- ALC_DEL: 1
- ALC_DEL.1: 1
- ALC_FLR: 1
- ALC_FLR.2: 3
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_IND: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 8
- ADV_COMP.1: 2
- ADV_FSP.1: 5
- ADV_FSP.2: 4
- ADV_FSP.4: 11
- ADV_IMP: 1
- ADV_IMP.1: 5
- ADV_TDS.1: 3
- ADV_TDS.2: 1
- ADV_TDS.3: 11
- AGD:
- AGD_OPE.1: 8
- AGD_PRE.1: 6
- ALC:
- ALC_CMC.4: 2
- ALC_CMS.1: 2
- ALC_CMS.4: 1
- ALC_DEL.1: 2
- ALC_DVS.1: 1
- ALC_DVS.2: 7
- ALC_LCD.1: 5
- ALC_TAT.1: 5
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 4
- ASE_INT.1: 5
- ASE_OBJ.2: 3
- ASE_REQ.1: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 2
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV.1: 4
- ATE_COV.2: 4
- ATE_DPT.1: 2
- ATE_FUN.1: 8
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 10
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 7
- FAU_GEN.2.1: 1
- FDP:
- FDP_ACC.1: 10
- FDP_ACC.1.1: 1
- FDP_ACF.1: 8
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FIA:
- FIA_ATD.1: 8
- FIA_ATD.1.1: 1
- FIA_UAU.1: 10
- FIA_UAU.1.1: 3
- FIA_UAU.1.2: 1
- FIA_UID.1: 12
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MSA.1: 1
- FMT_MSA.3: 8
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 10
- FMT_MTD.1.1: 1
- FMT_SMF.1: 10
- FMT_SMF.1.1: 1
- FMT_SMR.1: 9
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
|
- FAU:
- FAU_ARP.1: 10
- FAU_ARP.1.1: 2
- FAU_GEN: 1
- FAU_GEN.1: 10
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 2
- FAU_SAA: 1
- FAU_SAA.1: 13
- FAU_SAA.1.1: 3
- FAU_SAA.1.2: 1
- FAU_SAR: 1
- FAU_SAR.1: 3
- FAU_SAR.1.1: 2
- FAU_SAR.1.2: 2
- FAU_SAS.1: 1
- FAU_STG: 1
- FAU_STG.1: 10
- FAU_STG.1.1: 2
- FAU_STG.1.2: 2
- FCO:
- FCO_NRO: 6
- FCO_NRO.1: 3
- FCO_NRO.2: 2
- FCO_NRO.2.2: 3
- FCO_NRO.2.3: 3
- FCS:
- FCS_CKM: 11
- FCS_CKM.1: 11
- FCS_CKM.1.1: 1
- FCS_CKM.2: 5
- FCS_CKM.2.1: 1
- FCS_CKM.3: 5
- FCS_CKM.3.1: 2
- FCS_CKM.4: 18
- FCS_CKM.4.1: 2
- FCS_COP: 11
- FCS_COP.1: 17
- FCS_COP.1.1: 2
- FDP:
- FDP_ACC: 31
- FDP_ACC.1: 27
- FDP_ACC.1.1: 1
- FDP_ACC.2: 9
- FDP_ACC.2.2: 1
- FDP_ACF: 11
- FDP_ACF.1: 33
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC: 12
- FDP_IFC.1: 20
- FDP_IFC.1.1: 1
- FDP_IFC.2: 3
- FDP_IFCC: 1
- FDP_IFF: 5
- FDP_IFF.1: 14
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC: 6
- FDP_ITC.1: 8
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 4
- FDP_ITT.1: 1
- FDP_RIP: 10
- FDP_RIP.1: 3
- FDP_RIP.1.1: 1
- FDP_ROL: 8
- FDP_ROL.1: 4
- FDP_ROL.1.1: 1
- FDP_ROL.1.2: 1
- FDP_SDI.1: 2
- FDP_SDI.2: 5
- FDP_SDI.2.2: 2
- FDP_UCT: 1
- FDP_UCT.1: 5
- FDP_UCT.1.1: 2
- FDP_UIT.1: 8
- FDP_UIT.1.1: 2
- FDP_UIT.1.2: 2
- FDP_UTC.1: 1
- FIA:
- FIA_ATD: 5
- FIA_ATD.1: 4
- FIA_ATD.1.1: 1
- FIA_SOS: 1
- FIA_SOS.2: 6
- FIA_SOS.2.1: 2
- FIA_SOS.2.2: 2
- FIA_UAU: 23
- FIA_UAU.1: 4
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.3: 2
- FIA_UAU.3.1: 2
- FIA_UAU.3.2: 2
- FIA_UAU.4: 2
- FIA_UAU.4.1: 1
- FIA_UAU.6: 2
- FIA_UAU.6.1: 1
- FIA_UID: 4
- FIA_UID.1: 21
- FIA_UID.2: 1
- FIA_USB: 4
- FIA_USB.1: 4
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_LIM.1: 2
- FMT_LIM.2: 2
- FMT_MOF.1: 5
- FMT_MSA: 38
- FMT_MSA.1: 13
- FMT_MSA.1.1: 2
- FMT_MSA.2: 1
- FMT_MSA.2.1: 1
- FMT_MSA.3: 17
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MTD: 1
- FMT_MTD.1: 5
- FMT_MTD.1.1: 2
- FMT_SMF: 4
- FMT_SMF.1: 14
- FMT_SMF.1.1: 1
- FMT_SMR: 1
- FMT_SMR.1: 27
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FPR:
- FPR_UNO: 1
- FPR_UNO.1: 8
- FPR_UNO.1.1: 2
- FPT:
- FPT_FLS: 1
- FPT_FLS.1: 9
- FPT_FLS.1.1: 2
- FPT_ITC: 1
- FPT_ITC.1: 4
- FPT_ITC.1.1: 2
- FPT_ITI: 1
- FPT_ITI.1: 8
- FPT_ITI.1.1: 2
- FPT_ITI.1.2: 2
- FPT_ITT.1: 1
- FPT_PHP: 2
- FPT_PHP.1: 2
- FPT_PHP.2: 4
- FPT_PHP.2.2: 2
- FPT_PHP.2.3: 2
- FPT_PHP.3: 11
- FPT_PHP.3.1: 2
- FPT_RCV.4: 7
- FPT_RCV.4.1: 2
- FPT_RPL: 1
- FPT_RPL.1: 5
- FPT_RPL.1.1: 2
- FPT_RPL.1.2: 2
- FPT_STM.1: 5
- FPT_TDC: 3
- FPT_TDC.1: 3
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST: 1
- FPT_TST.1: 7
- FPT_TST.1.1: 2
- FPT_TST.1.2: 2
- FPT_TST.1.3: 2
- FRU:
- FTP:
- FTP_ITC.1: 9
- FTP_TRP.1: 9
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ACCESS: 3
- A.DATABASE: 3
- A.DYNMIC: 3
- A.LOCATE: 3
- A.MANAGE: 3
- A.NOEVIL: 3
- A.PKI: 3
- A.PROTCT: 3
- O:
- O.ACCESS: 14
- O.AUDITS: 4
- O.EADMIN: 6
- O.IDAUTH: 19
- O.INTEGRITY: 6
- O.MOBILE_POLICY: 3
- OE:
- OE.AUDIT_REVIEW: 2
- OE.CREDEN: 3
- OE.CRYPTO: 4
- OE.DATABASE: 4
- OE.INSTALL: 5
- OE.INTEROP: 3
- OE.MOBILE_ACCESS: 2
- OE.PERSON: 8
- OE.PHYCAL: 6
- OE.PKI: 3
- OE.PROTECT: 5
- OE.STORAGE: 4
- OE.TIME: 4
- T:
- T.COMDIS: 3
- T.COMINT: 3
- T.IMPCON: 3
- T.LOSSOF: 3
- T.MOBILE_POLICY: 3
- T.NOHALT: 3
- T.PRIVIL: 3
|
- A:
- A.PHYSICAL: 4
- A.PROTECTION_AFTER_TOE_DE: 1
- A.PROTECTION_AFTER_TOE_DELIVERY: 3
- D:
- D.COUNTERS: 6
- D.EM: 13
- D.EP_CODE: 5
- D.EP_IVDATA: 3
- D.EP_IV_DATA: 1
- D.EP_STATE: 5
- D.KEYS: 9
- D.LOG_DATA: 4
- O:
- O.AUTH: 9
- O.CONFID_DATA: 1
- O.CONF_DATA: 8
- O.EM: 6
- O.HW_AES: 1
- O.INTEG_DATA: 6
- O.JAVAOBJECT: 10
- O.MEM_ACCE: 1
- O.OPERATE: 13
- O.RECORD: 5
- O.REPLAY: 7
- O.RND: 1
- O.SFR_ACCES: 1
- O.TAMPER: 11
- OE:
- OE.DEBIT_BEFORE_CREDIT: 3
- OE.PHYSICAL: 3
- OE.PROTECTION_AFTER_TOE_DELIVERY: 3
- OE.PURSE_BEHAVIOR: 3
- OE.SECRET_MNGT: 3
- OP:
- OP.ARRAY_ACCESS: 2
- OP.CREATE: 4
- OP.INSTANCE_FIELD: 1
- OP.INVK_INTERFACE: 4
- OP.INVK_VIRTUAL: 2
- OP.JAVA: 3
- OP.PUT: 3
- OP.THROW: 2
- OP.TYPE_ACCESS: 2
- OSP:
- OSP.DEBIT_BEFORE_CREDIT: 3
- OSP.PURSE_BEHAVIOR: 4
- OSP.SECRET_MNGT: 4
- R:
- T:
- T.COUNTERFEITING: 2
- T.COUNTERFEITING_AUTH: 2
- T.COUNTERFEITING_AUTOLOAD: 6
- T.COUNTERFEITING_CREDIT: 2
- T.COUNTERFEITING_DEBIT: 6
- T.COUNTERFEITING_UPDATE: 4
- T.DISCLOSURE_KEYS: 9
- T.INTEG: 3
- T.INTEG_: 1
- T.INTEG_CODE: 5
- T.INTEG_COUNTERS: 5
- T.INTEG_EM: 5
- T.INTEG_EP_IVDATA: 2
- T.INTEG_EP_STATE: 5
- T.INTEG_IVDATA: 2
- T.INTEG_KEYS: 4
- T.INTEG_LOG_DATA: 4
- T.REPLAY: 2
- T.REPLAY_AUTOLOAD: 4
- T.REPLAY_CREDIT: 3
- T.REPLAY_DEBIT: 4
- T.REPLAY_UPDATE: 3
- T.RND: 1
|
pdf_data/st_keywords/vendor |
|
- Gemalto:
- NXP:
- NXP: 18
- NXP Semiconductors: 2
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 4
- Physical tampering: 1
- malfunction: 3
- physical tampering: 13
- SCA:
- Leak-Inherent: 5
- Physical Probing: 2
- physical probing: 4
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- FIPS:
- FIPS PUB 197: 2
- FIPS PUB 46-3: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- of policies for managed mobile devices. 1.6.2 McAfee EMM Portal The McAfee Client Application (out of scope) connects to the EMM Portal to request the policy for the device. The McAfee EMM Portal (EMM Portal: 1
- out of scope: 1
|
- OutOfScope:
- Crypto libs) written in native language, • The IC NXP P5CD081 The elements out of scope of the TOE are: • Other application(s: 1
- libraries itself) (Crypto libs) written in native language, • The IC NXP P5CD081 The elements out of scope of the TOE are: • Other application(s) written in java language 2.3.2 Logical scope of the TOE The: 1
- out of scope: 1
|
pdf_data/st_metadata |
- /Author: Primasec
- /CreationDate: D:20140924094632-04'00'
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20140924094632-04'00'
- /Producer: Microsoft® Office Word 2007
- /Subject: Enterprise Mobility Management 12.0
- /Title: Security Target
- pdf_file_size_bytes: 1436557
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 40
|
- /CreationDate: D:20110629163023+02'00'
- /Keywords:
- /ModDate: D:20110629163023+02'00'
- /Producer: Acrobat Distiller 7.0.5 (Windows)
- pdf_file_size_bytes: 510681
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 103
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |