name |
McAfee Enterprise Mobility Management 12.0 |
Feitian FT-JCOS v1.0/0.106.13 running on Infineon M7892 B11 |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
CA |
NO |
status |
archived |
archived |
not_valid_after |
04.09.2019 |
27.06.2021 |
not_valid_before |
04.09.2014 |
27.06.2016 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-275%20CT%20v1.0e.docx |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-275%20CR%20v1.0e.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20160627_SERTIT-079_CR_1.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-275%20ST%20v1.16.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[08250][FTJCOS][ST][V1.0.11]FTJCOS_Security_Target.pdf |
manufacturer |
McAfee, Inc. |
Feitian Technologies Co., Ltd. |
manufacturer_web |
https://www.mcafee.com/ |
https://www.ftsafe.com |
security_level |
EAL2+, ALC_FLR.2 |
EAL4+, ALC_DVS.2, AVA_VAN.5 |
dgst |
b193f130f541449d |
4fdb0afc0bbabfb8 |
heuristics/cert_id |
383-4-275 |
SERTIT-079 |
heuristics/cert_lab |
CANADA |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ALC_CMC.2, ATE_IND.2, ALC_DEL.1, ATE_COV.1, ADV_ARC.1, AVA_VAN.2, AGD_OPE.1, ADV_FSP.2, ALC_FLR.2, AGD_PRE.1 |
AVA_COMP.1, ASE_INT.1, ASE_COMP.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ADV_COMP.1, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ALC_TAT.2, ADV_TDS.4, ASE_REQ.2, ATE_COMP.1, ALC_COMP.1, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
12.0 |
1.0, 0.106.13 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
- category: ICs, Smart Cards and Smart Card-Related Devices and Systems
- certification_date: 27.06.2016
- developer: Feitian Technologies Co., Ltd.
- enhanced:
- category: ICs, Smart Cards and Smart Card-Related Devices and Systems
- cert_id: SERTIT-079
- certification_date: 27.06.2016
- description: The TOE is a Java Card Platform compliant with Java Card Specification v.2.2.2 and GlobalPlatformSpecification v.2.1.1. The TOE allows post-issuance downloading of applications that have been previously verified by an off-card trusted IT component. It constitutes a secure generic platform that supports multi-application runtime environment and provides facilities for secure loading and interoperability between different applications. The TOE does not implement JCRMI and does not include any software on the application layer.
- developer: Feitian Technologies Co., Ltd.
- documents: frozendict({'cert': [frozendict({'href': 'https://sertit.no/getfile.php/135064-1607952717/SERTIT/Sertifikater/2016/79/20160627_SERTIT-079_Certificate.pdf'})], 'target': [frozendict({'href': 'https://sertit.no/getfile.php/135061-1607952711/SERTIT/Sertifikater/2016/79/%5B08250%5D%5BFTJCOS%5D%5BST%5D%5BV1.0.11%5DFTJCOS_Security_Target.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/135058-1607952708/SERTIT/Sertifikater/2016/79/20160627_SERTIT-079_CR_1.pdf'})]})
- evaluation_facility: Brightsight B.V.
- level: EAL 4, ALC_DVS.2, AVA_VAN.5
- mutual_recognition: CCRA, SOG-IS
- product: Feitian FT-JCOS v1.0/0.106.13 running on Infineon M7892 B11
- product: FT-JCOS
- url: https://sertit.no/certified-products/product-archive/ft-jcos
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0782-2012 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0758-2012, BSI-DSZ-CC-0782-2012 |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
383-4-275 CT v1.0e.docx |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
383-4-275 CR v1.0e.pdf |
20160627_SERTIT-079_CR_1.pdf |
pdf_data/report_frontpage |
- CA:
- cert_id: 383-4-275-CR
- cert_lab: CANADA
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 2 augmented: 1
- EAL 2+: 3
|
- EAL:
- EAL 4+: 12
- EAL1: 1
- EAL2: 1
- EAL4: 2
- EAL7: 1
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 1
- ADV_COMP.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_COMP.1: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 4
- ALC_FLR: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_COMP.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COMP.1: 1
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND: 1
- ATE_IND.2: 1
- AVA:
- AVA_COMP.1: 1
- AVA_VAN.5: 3
|
pdf_data/report_keywords/cc_sfr |
|
- FAU:
- FCO:
- FCS:
- FCS_CKM.1: 1
- FCS_CKM.2: 1
- FCS_CKM.3: 1
- FCS_CKM.4: 1
- FCS_COP.1: 1
- FCS_RNG.1: 3
- FDP:
- FDP_ACC: 3
- FDP_ACF: 3
- FDP_IFC: 2
- FDP_IFF: 2
- FDP_ITC: 1
- FDP_RIP: 8
- FDP_ROL: 1
- FDP_SDI.2: 1
- FDP_UIT: 1
- FIA:
- FMT:
- FMT_MSA: 11
- FMT_MTD: 2
- FMT_SMF: 3
- FMT_SMF.1: 1
- FMT_SMR: 4
- FMT_SMR.1: 1
- FPR:
- FPT:
- FPT_FLS: 3
- FPT_FLS.1: 1
- FPT_RCV: 3
- FPT_TDC.1: 1
- FTP:
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Feitian:
- Feitian: 2
- Feitian Technologies Co: 2
- Infineon:
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 15408: 4
- ISO/IEC 7816: 2
- SCP:
|
pdf_data/report_keywords/javacard_version |
|
- GlobalPlatform:
- JavaCard:
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: cpclark
- /CR date: 04 September 2014
- /CR version: 1.0
- /Certificate date: 04 September 2014
- /Company: CSEC-CSTC
- /Conformance Claim: EAL 2 augmented
- /CreationDate: D:20140922130520-04'00'
- /Creator: Acrobat PDFMaker 10.0 for Word
- /Developer name: McAfee, Inc.
- /Document number: 383-4-275-CR
- /ETR title, version, date: Evaluation Technical Report for EAL 2+ Common Criteria Evaluation of McAfee, Inc. McAfee Enterprise Mobility Management 12.0, Version 0.3, 15 August 2014
- /Evaluation completion date: 15 August 2014
- /ModDate: D:20140922130523-04'00'
- /Producer: Adobe PDF Library 10.0
- /ST Title: Security Target: McAfee Enterprise Mobility Management 12.0, v1.16, 20 July 2014
- /SourceModified: D:20140903182940
- /TOE name and version: McAfee Enterprise Mobility Management 12.0
- /TOE short name: McAfee EMM v12.0
- /Title: 383-4-XXX CR vxe
- /_DocHome: -1616610741
- pdf_file_size_bytes: 289620
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 15
|
- /Author: Arne
- /CreationDate: D:20160821174342+02'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20160821174443+02'00'
- /Producer: Acrobat Distiller 9.5.5 (Windows)
- /Title: Microsoft Word - SERTIT-079 CR 1.0
- pdf_file_size_bytes: 1626992
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
pdf_data/st_filename |
383-4-275 ST v1.16.pdf |
[08250][FTJCOS][ST][V1.0.11]FTJCOS_Security_Target.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0782-: 1
- BSI-DSZ-CC-0782-2012: 1
- BSI-DSZ-CC-0782-2012-MA-01: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 1
- EAL 4 augmented: 1
- EAL4: 5
- EAL4+: 1
- EAL5: 1
- EAL5 augmented: 1
- EAL6: 1
- EAL6 augmented: 1
- EAL6+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.2: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.2: 1
- ALC_CMS: 1
- ALC_CMS.2: 1
- ALC_DEL: 1
- ALC_DEL.1: 1
- ALC_FLR: 1
- ALC_FLR.2: 3
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_IND: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 6
- ADV_FSP.1: 4
- ADV_FSP.2: 2
- ADV_FSP.4: 2
- ADV_FSP.5: 7
- ADV_IMP.1: 9
- ADV_INT.2: 1
- ADV_TDS.1: 2
- ADV_TDS.2: 1
- ADV_TDS.3: 10
- ADV_TDS.4: 1
- AGD:
- AGD_OPE.1: 10
- AGD_PRE.1: 6
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.1: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 2
- ALC_DVS.2: 7
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ALC_TAT.2: 2
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 4
- ASE_INT.1: 5
- ASE_OBJ.2: 3
- ASE_REQ.1: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 3
- ATE_DPT.1: 2
- ATE_FUN.1: 6
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 10
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 7
- FAU_GEN.2.1: 1
- FDP:
- FDP_ACC.1: 10
- FDP_ACC.1.1: 1
- FDP_ACF.1: 8
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FIA:
- FIA_ATD.1: 8
- FIA_ATD.1.1: 1
- FIA_UAU.1: 10
- FIA_UAU.1.1: 3
- FIA_UAU.1.2: 1
- FIA_UID.1: 12
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MSA.1: 1
- FMT_MSA.3: 8
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 10
- FMT_MTD.1.1: 1
- FMT_SMF.1: 10
- FMT_SMF.1.1: 1
- FMT_SMR.1: 9
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
|
- FAU:
- FAU_ARP.1: 24
- FAU_ARP.1.1: 2
- FAU_SAA.1: 3
- FCO:
- FCS:
- FCS_CKM: 3
- FCS_CKM.1: 10
- FCS_CKM.2: 8
- FCS_CKM.2.1: 1
- FCS_CKM.3: 6
- FCS_CKM.3.1: 1
- FCS_CKM.4: 8
- FCS_CKM.4.1: 1
- FCS_COP: 13
- FCS_COP.1: 25
- FCS_RNG: 6
- FCS_RNG.1: 12
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC: 29
- FDP_ACC.1: 13
- FDP_ACC.2: 5
- FDP_ACF: 31
- FDP_ACF.1: 18
- FDP_IFC: 22
- FDP_IFC.1: 13
- FDP_IFC.2: 2
- FDP_IFF: 18
- FDP_IFF.1: 17
- FDP_ITC: 10
- FDP_ITC.2: 9
- FDP_ITT.1: 1
- FDP_RIP: 117
- FDP_RIP.1: 10
- FDP_ROL: 15
- FDP_ROL.1: 4
- FDP_SDI.1: 1
- FDP_SDI.2: 13
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UIT: 5
- FDP_UIT.1: 2
- FIA:
- FIA_ATD: 8
- FIA_ATD.1: 2
- FIA_UID: 19
- FIA_UID.1: 11
- FIA_UID.2: 1
- FIA_USB: 6
- FIA_USB.1: 3
- FMT:
- FMT_MSA: 105
- FMT_MSA.1: 9
- FMT_MSA.2: 2
- FMT_MSA.3: 19
- FMT_MTD: 20
- FMT_MTD.1: 2
- FMT_MTD.3: 1
- FMT_SMF: 29
- FMT_SMF.1: 20
- FMT_SMF.1.1: 1
- FMT_SMR: 43
- FMT_SMR.1: 28
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNO.1: 13
- FPR_UNO.1.1: 2
- FPT:
- FPT_FLS: 31
- FPT_FLS.1: 16
- FPT_FLS.1.1: 2
- FPT_ITT.1: 1
- FPT_PHP.3: 1
- FPT_RCV: 23
- FPT_RCV.3: 13
- FPT_RCV.4: 2
- FPT_TDC.1: 8
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 2
- FPT_TST.1: 1
- FRU:
- FTP:
- FTP_ITC: 6
- FTP_ITC.1: 4
- FTP_TRP.1: 2
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ACCESS: 3
- A.DATABASE: 3
- A.DYNMIC: 3
- A.LOCATE: 3
- A.MANAGE: 3
- A.NOEVIL: 3
- A.PKI: 3
- A.PROTCT: 3
- O:
- O.ACCESS: 14
- O.AUDITS: 4
- O.EADMIN: 6
- O.IDAUTH: 19
- O.INTEGRITY: 6
- O.MOBILE_POLICY: 3
- OE:
- OE.AUDIT_REVIEW: 2
- OE.CREDEN: 3
- OE.CRYPTO: 4
- OE.DATABASE: 4
- OE.INSTALL: 5
- OE.INTEROP: 3
- OE.MOBILE_ACCESS: 2
- OE.PERSON: 8
- OE.PHYCAL: 6
- OE.PKI: 3
- OE.PROTECT: 5
- OE.STORAGE: 4
- OE.TIME: 4
- T:
- T.COMDIS: 3
- T.COMINT: 3
- T.IMPCON: 3
- T.LOSSOF: 3
- T.MOBILE_POLICY: 3
- T.NOHALT: 3
- T.PRIVIL: 3
|
- A:
- A.APPLET: 6
- A.DELETION: 1
- A.VERIFICATION: 6
- D:
- D.API_DATA: 3
- D.APP_CODE: 7
- D.APP_C_DATA: 3
- D.APP_I_DATA: 5
- D.CM_APDU: 1
- D.CRYPTO: 6
- D.JCS_CODE: 3
- D.JCS_DATA: 5
- D.JCS_KEYS: 3
- D.PIN: 6
- D.SEC_ATTRIBUTES: 2
- D.SEC_DATA: 8
- O:
- O.ALARM: 22
- O.APPLET: 19
- O.CARD-: 7
- O.CARD-MANAGEMENT: 32
- O.CIPHER: 16
- O.CODE_PKG: 16
- O.COMMUNICATION: 11
- O.DELETION: 15
- O.FIREWALL: 43
- O.GLOBAL: 2
- O.GLOBAL_ARRAYS_CONFID: 18
- O.GLOBAL_ARRAYS_INTEG: 9
- O.IC_SUPPORT: 17
- O.INSTALL: 16
- O.JAVAOBJECT: 38
- O.KEY-: 3
- O.KEY-MNGT: 23
- O.LOAD: 17
- O.NATIVE: 14
- O.OBJ-DELETION: 8
- O.OPERATE: 35
- O.OS: 1
- O.OS_SUPPORT: 23
- O.PACKAGE: 2
- O.PIN-: 1
- O.PIN-MNGT: 22
- O.REALLOCATION: 17
- O.RECOVERY: 23
- O.REMOTE: 1
- O.RESOURCES: 23
- O.RND: 14
- O.SID: 32
- O.TRANSACTION: 19
- OE:
- OE.APPLET: 9
- OE.CARD-MANAGEMENT: 2
- OE.CODE-: 5
- OE.CODE-EVIDENCE: 16
- OE.SCP: 6
- OE.VERIFICATION: 37
- OP:
- OP.ARRAY_ACCESS: 4
- OP.CREATE: 7
- OP.DELETE_APPLET: 4
- OP.DELETE_PCKG: 3
- OP.DELETE_PCKG_APPLET: 3
- OP.GP: 3
- OP.INSTANCE_FIELD: 4
- OP.INVK_INTERFACE: 7
- OP.INVK_VIRTUAL: 6
- OP.JAVA: 5
- OP.LOAD_PCKG: 1
- OP.PUT: 6
- OP.THROW: 5
- OP.TYPE_ACCESS: 5
- OSP:
- R:
- T:
- T.COMMUNICATION: 5
- T.CONFID-: 2
- T.CONFID-APPLI-: 2
- T.CONFID-APPLI-DATA: 17
- T.CONFID-JCS-CODE: 7
- T.CONFID-JCS-DATA: 9
- T.DELETION: 5
- T.EXE-: 1
- T.EXE-CODE: 8
- T.FAULT: 5
- T.INSTALL: 6
- T.INTEG-: 6
- T.INTEG-APPLI-: 4
- T.INTEG-APPLI-CODE: 12
- T.INTEG-APPLI-DATA: 18
- T.INTEG-JCS-: 1
- T.INTEG-JCS-CODE: 7
- T.INTEG-JCS-DATA: 12
- T.LEAKAGE: 5
- T.NATIVE: 6
- T.OBJ-DELETION: 4
- T.PHYSICAL: 8
- T.RESOURCES: 9
- T.RND: 5
- T.SID: 19
|
pdf_data/st_keywords/vendor |
|
- Feitian:
- Feitian: 1
- Feitian Technologies Co: 105
- Infineon:
- Infineon: 10
- Infineon Technologies AG: 1
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- TDEA: 1
- TDES: 7
- Triple-DES: 1
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- MD:
- SHA:
- SHA1:
- SHA2:
- SHA-2: 2
- SHA-224: 1
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 3
- malfunction: 4
- physical tampering: 1
- SCA:
- DPA: 3
- Leak-Inherent: 2
- SPA: 1
- physical probing: 3
- timing attacks: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- BSI:
- FIPS:
- FIPS 186-3: 3
- FIPS PUB 140-2: 1
- FIPS PUB 180-4: 1
- FIPS PUB 197: 1
- FIPS140: 2
- FIPS180-4: 2
- FIPS197: 5
- ICAO:
- RFC:
- SCP:
|
pdf_data/st_keywords/javacard_version |
|
- GlobalPlatform:
- JavaCard:
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
- javacard:
- javacardx:
- javacardx.crypto: 2
- javacardx.security: 1
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- of policies for managed mobile devices. 1.6.2 McAfee EMM Portal The McAfee Client Application (out of scope) connects to the EMM Portal to request the policy for the device. The McAfee EMM Portal (EMM Portal: 1
- out of scope: 1
|
- OutOfScope:
- Software development environment. Phase 2 covers the Secure IC Development of Infineon and is out of scope of the TOE evaluation as that is part of the IC platform evaluation. In Phase 3, the Chip: 1
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.RECOVERY and O.OS_SUPPORT are: 1
- out of scope: 2
|
pdf_data/st_metadata |
- /Author: Primasec
- /CreationDate: D:20140924094632-04'00'
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20140924094632-04'00'
- /Producer: Microsoft® Office Word 2007
- /Subject: Enterprise Mobility Management 12.0
- /Title: Security Target
- pdf_file_size_bytes: 1436557
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 40
|
- /CreationDate: D:20160304175418+08'00'
- /Creator: LaTeX with hyperref package
- /Producer: MiKTeX-xdvipdfmx (0.7.8)
- pdf_file_size_bytes: 1236795
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 100
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |