| name |
AssetCentral 4.0.0 consist of AssetXplorer (v5.0) and AssetCentral Server (v4.0) |
IBM Tivoli Identity Manager, Version 4.6 |
| category |
Other Devices and Systems |
Access Control Devices and Systems |
| scheme |
MY |
DE |
| status |
archived |
archived |
| not_valid_after |
01.09.2019 |
01.09.2019 |
| not_valid_before |
16.01.2012 |
16.02.2006 |
| cert_link |
None |
None |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C023-CR-v1a.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0237a.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Authentic%20Venture%20EAL1%20Security%20Target%20(AssetCentral)%20v1.1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0237b.pdf |
| manufacturer |
Authentic Venture Sdn Bhd |
IBM Corporation |
| manufacturer_web |
https://www.ventures.com.my |
https://www.ibm.com |
| security_level |
EAL1 |
EAL3+, ALC_FLR.1 |
| dgst |
b7e122dade348c21 |
b0285edc4599a27b |
| heuristics/cert_id |
ISCB-5-RPT-C023-CR-v1a |
BSI-DSZ-CC-0237-2006 |
| heuristics/cert_lab |
[] |
BSI |
| heuristics/cpe_matches |
{} |
cpe:2.3:a:ibm:tivoli_identity_manager:4.6:*:*:*:*:*:*:* |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
CVE-2006-6607 |
| heuristics/direct_transitive_cves |
{} |
CVE-2009-2583, CVE-2014-0961 |
| heuristics/indirect_transitive_cves |
{} |
CVE-2009-2583, CVE-2014-0961 |
| heuristics/extracted_sars |
ASE_CCL.1, AGD_PRE.1, ALC_CMC.1, AGD_OPE.1, ATE_IND.1, ASE_INT.1, ASE_ECD.1, ASE_OBJ.1, ASE_REQ.1, ALC_CMS.1, ASE_TSS.1, AVA_VAN.1, ADV_FSP.1 |
ATE_FUN.1, ADV_RCR.1, ASE_INT.1, ASE_ENV.1, ATE_IND.2, ATE_DPT.1, AGD_USR.1, ALC_FLR.1, ASE_REQ.1, ASE_SRE.1, AVA_VLA.1, ADV_HLD.2, ATE_COV.2, ASE_PPC.1, ALC_DVS.1, ASE_DES.1, AVA_MSU.1, AGD_ADM.1, AVA_SOF.1, ASE_OBJ.1, ASE_TSS.1, ADV_FSP.1 |
| heuristics/extracted_versions |
4.0.0, 5.0, 4.0 |
4.6 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0556-2009 |
| heuristics/report_references/directly_referencing |
{} |
{} |
| heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-0556-2009 |
| heuristics/report_references/indirectly_referencing |
{} |
{} |
| heuristics/scheme_data |
- cert_no: 2012-001-C023
- certification_date: 16.01.2012
- developer: Authentic Venture Sdn Bhd
- enhanced:
- assurance_level: EAL1
- category: Other Devices and Systems
- cert_id: C023
- certification_date: 16.01.2012
- developer: Khairun Nisa Aziz Block U, UPM-MTDC,Incubation Center One,University Putra Malaysia,43400 Serdang,Selangor MALAYSIA URL: http://www.ventures.com.myEmail: [email protected]:+ 603 8941 2739Fax:+ 603 8941 8651
- expiration_date: 16.01.2017
- mutual_recognition: CCRA
- product: AssetCentral 4.0.0 consist of AssetXplorer (v5.0) and AssetCentral Server (v4.0)
- report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C023/ISCB-5-RPT-C023-CR-v1a.pdf
- scope: AssetCentral 4.0.0 is an automated asset management system. It automates the protection of managed systems against unauthorized software or hardware installations and removal, and having unlicensed software-related vulnerabilities. It allows users to monitor compliance throughout an organisation for their IT asset. AssetCentral comprises a server component and agents, known as AssetXplorer agents, which are deployed on computers throughout the enterprise. AssetXplorer agents send information about each computer to AssetCentral Server. AssetCentral Server consolidates all the information and allows administrators and custom-role users to view them through a web interface. AssetXplorer is part of the TOE. The security features within the scope of the evaluation includes: Auditing – provides auditing capabilities. Identification and Authentication – provides identification and authentication of human users of the TOE. It also provides identification of AssetXplorer that are installed in managed devices. Security Management - provides security management through the use of the Web Administration Interface. Through the enforcement of the AssetCentral Access Control Policy, the ability to manage various security attributes is controlled. User Data Protection - provides its own access control between subjects and objects covered by the AssetCentral Access Control Policy. Secure Communications - able to protect the user data from disclosure and modification when the scanned data is sent from AssetXplorer to AssetCentral Server.
- status: Archive
- target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C023/Authentic%20Venture%20EAL1%20Security%20Target%20(AssetCentral)%20v1.1.pdf
- type: Automated asset management system
- expiration_date: 16.01.2017
- level: EAL1
- product: AssetCentral 4.0.0 consist of AssetXplorer (v5.0) and AssetCentral Server (v4.0)
- recognition: CCRA
- url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/154
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
{} |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
{} |
| pdf_data/cert_filename |
None |
None |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename |
ISCB-5-RPT-C023-CR-v1a.pdf |
0237a.pdf |
| pdf_data/report_frontpage |
|
- DE:
- cert_id: BSI-DSZ-CC-0237-2006
- cert_item: IBM Tivoli Identity Manager Version 4.6
- cert_lab: BSI
- developer: IBM Corporation Certification Report BSI-DSZ-CC-0237-2006 ZS-01-01-F-329 V3.21 BSI - Bundesamt für Sicherheit in der Informationstechnik, Postfach 20 03 63, D-53133 Bonn Phone +49 228 9582-0, Fax +49 228 9582-455, Infoline +49 228 9582-111
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
| pdf_data/report_keywords/cc_cert_id |
- MY:
- ISCB-5-RPT-C023-CR-v1a: 29
|
- DE:
- BSI-DSZ-CC-0237: 1
- BSI-DSZ-CC-0237-2006: 25
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP- 0024-2006: 1
- BSI-PP-0024-2006: 3
|
| pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 4: 1
- EAL 7: 1
- EAL1: 5
- EAL2: 3
- EAL3: 9
- EAL3 augmented: 3
- EAL4: 5
- EAL5: 6
- EAL6: 3
- EAL7: 4
|
| pdf_data/report_keywords/cc_sar |
|
- ACM:
- ACM_AUT: 2
- ACM_CAP: 2
- ACM_CAP.3: 1
- ACM_SCP: 2
- ACM_SCP.1: 1
- ADO:
- ADO_DEL: 2
- ADO_DEL.1: 1
- ADO_IGS: 2
- ADO_IGS.1: 1
- ADV:
- ADV_FSP: 2
- ADV_FSP.1: 1
- ADV_HLD: 2
- ADV_HLD.2: 1
- ADV_IMP: 2
- ADV_INT: 2
- ADV_LLD: 2
- ADV_RCR: 2
- ADV_RCR.1: 1
- ADV_SPM: 2
- AGD:
- AGD_ADM: 2
- AGD_ADM.1: 1
- AGD_USR: 2
- AGD_USR.1: 1
- ALC:
- ALC_DVS: 2
- ALC_DVS.1: 1
- ALC_FLR: 2
- ALC_FLR.1: 6
- ALC_LCD: 1
- ALC_TAT: 2
- ASE:
- ASE_DES.1: 1
- ASE_ENV.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_PPC.1: 1
- ASE_REQ.1: 1
- ASE_SRE.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 2
- ATE_COV.2: 1
- ATE_DPT: 2
- ATE_DPT.1: 1
- ATE_FUN: 2
- ATE_FUN.1: 1
- ATE_IND: 2
- ATE_IND.2: 1
- AVA:
- AVA_CCA: 2
- AVA_MSU: 2
- AVA_MSU.1: 1
- AVA_SOF: 4
- AVA_SOF.1: 1
- AVA_VLA: 4
- AVA_VLA.1: 1
- AVA_VLA.2: 1
- AVA_VLA.3: 1
- AVA_VLA.4: 1
|
| pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 1
- FAU_GEN.2: 1
- FAU_SAR.1: 1
- FAU_SAR.2: 1
- FDP:
- FDP_ACC.1: 1
- FDP_ACF.1: 1
- FIA:
- FIA_ATD.1: 1
- FIA_UAU.2: 1
- FIA_UID.2: 1
- FMT:
- FMT_MOF.1: 1
- FMT_MSA.1: 1
- FMT_MSA.3: 1
- FMT_SMF.1: 1
- FMT_SMR.1: 1
- FPT:
|
- FAU:
- FAU_GEN.1: 1
- FAU_GEN.2: 1
- FAU_SAR.1: 1
- FAU_SAR.2: 1
- FAU_STG.1: 1
- FDP:
- FDP_ACC.1: 1
- FDP_ACC.2: 1
- FDP_ACF.1: 2
- FDP_ETC.2: 1
- FIA:
- FIA_AFL.1: 1
- FIA_ATD.1: 2
- FIA_SOS.1: 1
- FIA_UAU.1: 1
- FIA_UAU.2: 1
- FIA_UID.1: 1
- FIA_UID.2: 1
- FIA_USB.1: 1
- FMT:
- FMT_MSA.1: 1
- FMT_MSA.3: 2
- FMT_SMF.1: 1
- FMT_SMR.1: 1
- FPT:
- FPT_ITT.1: 1
- FPT_RVM.1: 1
- FPT_SEP.1: 1
- FPT_STM.1: 1
- FPT_TDC.1: 2
- FTP:
|
| pdf_data/report_keywords/cc_claims |
|
- A:
- A.ADMIN: 1
- A.AGENT: 1
- A.DIRECTORY: 1
- A.PHYS_PROT: 1
- A.RDBMS: 1
- A.SERVER: 1
- A.USER: 1
- T:
- T.BYPASS: 1
- T.COM_ATT: 1
- T.UNAUTHORIZED: 1
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- ISO:
- ISO/IEC 18045: 2
- ISO/IEC15408: 2
|
- BSI:
- AIS 32: 1
- AIS 34: 1
- AIS33: 1
- ISO:
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- 8] Evaluation Technical Report, Version 2.0, atsec security information GmbH, 01 February 2006, (confidential document) [9] Identity Management Protection Profile (IMPP), Version Number 1.17, 12 January 2006, IBM: 1
|
| pdf_data/report_metadata |
|
- /Author: Bundesamt für Sicherheit in der Informationstechik
- /Company: BSI, Postfach 200363, 53133 Bonn
- /CreationDate: D:20060222121425+01'00'
- /Creator: Acrobat PDFMaker 7.0.5 für Word
- /Keywords: Certification Report IBM Tivoli Identity Manager, BSI-DSZ-CC-0237-2006
- /ModDate: D:20060303105807+01'00'
- /Producer: Acrobat Distiller 7.0.5 (Windows)
- /SourceModified: D:20060222111410
- /Title: Certification Report BSI-DSZ-CC-0237-2006
- pdf_file_size_bytes: 1085801
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 48
|
| pdf_data/st_filename |
Authentic Venture EAL1 Security Target (AssetCentral) v1.1.pdf |
0237b.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
|
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.1: 2
- ALC_CMS.1: 2
- ASE:
- ASE_CCL: 2
- ASE_CCL.1: 2
- ASE_ECD.1: 2
- ASE_INT: 2
- ASE_INT.1: 2
- ASE_OBJ: 2
- ASE_OBJ.1: 2
- ASE_REQ: 2
- ASE_REQ.1: 2
- ASE_TSS: 2
- ASE_TSS.1: 2
- ATE:
- AVA:
|
- ACM:
- ACM_CAP.3: 1
- ACM_SCP.1: 1
- ADO:
- ADO_DEL.1: 1
- ADO_IGS.1: 1
- ADV:
- ADV_FSP.1: 1
- ADV_HLD.2: 1
- ADV_RCR.1: 1
- AGD:
- AGD_ADM.1: 1
- AGD_USR.1: 1
- ALC:
- ALC_DVS.1: 1
- ALC_FLR.1: 6
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_MSU.1: 1
- AVA_SOF.1: 1
- AVA_VLA.1: 1
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 8
- FAU_GEN.1.1: 3
- FAU_GEN.1.2: 1
- FAU_GEN.2: 4
- FAU_GEN.2.1: 1
- FAU_SAR.1: 7
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 3
- FAU_SAR.2.1: 1
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 10
- FDP_ACF.1: 5
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FDP_IFF: 2
- FIA:
- FIA_ATD.1: 5
- FIA_ATD.1.1: 1
- FIA_UAU: 1
- FIA_UAU.1: 1
- FIA_UAU.2: 3
- FIA_UAU.2.1: 1
- FIA_UID: 1
- FIA_UID.1: 6
- FIA_UID.2: 5
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF.1: 5
- FMT_MOF.1.1: 1
- FMT_MSA.1: 7
- FMT_MSA.1.1: 1
- FMT_MSA.3: 7
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF.1: 10
- FMT_SMF.1.1: 1
- FMT_SMR.1: 10
- FMT_SMR.1.1: 1
- FPT:
- FPT_ITT.1: 3
- FPT_ITT.1.1: 1
- FPT_STM.1: 2
- FTP:
|
- FAU:
- FAU_GEN.1: 11
- FAU_GEN.1.1: 3
- FAU_GEN.1.2: 1
- FAU_GEN.2: 7
- FAU_GEN.2.1: 1
- FAU_SAR.1: 8
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 6
- FAU_SAR.2.1: 1
- FAU_SAR.3: 1
- FAU_STG.1: 6
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FDP:
- FDP_ACC.1: 13
- FDP_ACC.1.1: 1
- FDP_ACC.2: 9
- FDP_ACC.2.1: 1
- FDP_ACC.2.2: 1
- FDP_ACF.1: 18
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_ETC.2: 7
- FDP_ETC.2.1: 1
- FDP_ETC.2.2: 1
- FDP_ETC.2.3: 1
- FDP_ETC.2.4: 1
- FIA:
- FIA_AFL.1: 8
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 15
- FIA_ATD.1.1: 2
- FIA_SOS.1: 8
- FIA_SOS.1.1: 1
- FIA_SOS.2: 1
- FIA_UAU.1: 11
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UAU.2: 8
- FIA_UAU.2.1: 1
- FIA_UID.1: 13
- FIA_UID.1.1: 2
- FIA_UID.1.2: 2
- FIA_UID.2: 8
- FIA_UID.2.1: 1
- FIA_USB.1: 9
- FIA_USB.1.1: 1
- FMT:
- FMT_MSA.1: 12
- FMT_MSA.1.1: 1
- FMT_MSA.3: 18
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_SMF.1: 9
- FMT_SMF.1.1: 1
- FMT_SMR.1: 10
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_ITT.1: 6
- FPT_ITT.1.1: 1
- FPT_RVM.1: 8
- FPT_RVM.1.1: 1
- FPT_SEP.1: 6
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_STM.1: 7
- FPT_STM.1.1: 1
- FPT_TDC.1: 15
- FPT_TDC.1.1: 2
- FPT_TDC.1.2: 2
- FTP:
- FTP_ITC.1: 6
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
| pdf_data/st_keywords/cc_claims |
- OE:
- OE.ADMIN: 1
- OE.COMMUNICATION: 2
- OE.INSTALL: 1
- OE.LOCAL: 1
- OE.NETWORK: 1
- OE.PATCH: 1
- OE.PHYSICAL: 1
- OE.TIMESTAMP: 1
|
- A:
- A.ADMIN: 3
- A.AGENT: 4
- A.CONFIGURATION: 2
- A.DIRECTORY: 3
- A.GLOBAL_SECURITY: 1
- A.PHYS_PROT: 3
- A.RDBMS: 3
- A.SERVER: 3
- A.USER: 3
- O:
- O.ACI: 13
- O.AUDIT: 11
- O.FEED: 5
- O.PROVISION: 10
- OE:
- OE.ADMIN: 4
- OE.AGENT: 4
- OE.AUDIT: 5
- OE.COM_PROT: 6
- OE.DB_PROT: 9
- OE.DIR_PROT: 7
- OE.ENFORCEMENT: 5
- OE.FEED: 3
- OE.MANAGED: 5
- OE.REPOSITORY: 1
- OE.SERVER: 4
- OE.USER: 3
- T:
- T.BYPASS: 5
- T.UNAUTHORIZED: 4
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
|
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
|
| pdf_data/st_metadata |
- /Author: Nunni Zainal Abidin (stratsec)
- /CreationDate: D:20111125105310+08'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20111125105310+08'00'
- /Producer: Microsoft® Word 2010
- /Subject: Security Target
- /Title: AssetCentral
- pdf_file_size_bytes: 564770
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 27
|
- /Author: David Ochel
- /CreationDate: D:20060208115639-08'00'
- /Creator: Acrobat PDFMaker 5.0 for Word
- /ModDate: D:20060208120112-08'00'
- /Producer: Acrobat Distiller 5.0.5 (Windows)
- /Title: IBM Tivoli Identity Manager 4.6 - Security Target
- pdf_file_size_bytes: 1637328
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 87
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
False |
| state/cert/download_ok |
False |
False |
| state/cert/extract_ok |
False |
False |
| state/cert/pdf_hash |
Equal |
Equal |
| state/cert/txt_hash |
Equal |
Equal |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |