name |
Microsoft Exchange Server 2003 Enterprise Edition, Version/Build 6.5.7226.0 and Hotfix MS05-021 |
JavaCard Platform GXP3.2-E64PK-CC with GemSAFE V2 Version 1.0 |
category |
Operating Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
DE |
DE |
status |
archived |
archived |
not_valid_after |
01.09.2019 |
01.09.2019 |
not_valid_before |
09.11.2005 |
01.01.2007 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0284a.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0281a.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0284b.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0281b.pdf |
manufacturer |
Microsoft Corporation |
Gemplus S.A. |
manufacturer_web |
https://www.microsoft.com |
https://www.gemalto.com/ |
security_level |
ALC_FLR.3, EAL4+ |
ADV_IMP.2, AVA_MSU.3, EAL4+, AVA_VLA.4 |
dgst |
bbe326d5bfbd5036 |
e4254692c5e06417 |
heuristics/cert_id |
BSI-DSZ-CC-0284-2005 |
BSI-DSZ-CC-0281-2005 |
heuristics/cert_lab |
BSI |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_IMP.1, ASE_REQ.1, ASE_ENV.1, ATE_IND.2, ASE_DES.1, ADV_HLD.2, AVA_SOF.1, AVA_VLA.2, ADV_RCR.1, ADV_LLD.1, ATE_COV.2, ALC_FLR.3, ASE_OBJ.1, AGD_USR.1, AVA_MSU.2, ADV_IGS.1, ADV_SPM.1, ASE_SRE.1, ASE_INT.1, ADV_FSP.2, ASE_TSS.1, AGD_ADM.1, ATE_DPT.1, ALC_DVS.1, ALC_TAT.1, ADV_FUN.1, ALC_LCD.1, ATE_FUN.1, ASE_PPC.1 |
ASE_REQ.1, ASE_ENV.1, ATE_IND.2, ASE_DES.1, ADV_HLD.2, ALC_LCD.1, AVA_SOF.1, ADV_IMP.2, AVA_MSU.3, ADV_RCR.1, ADV_LLD.1, ALC_DVS.2, ATE_COV.2, ASE_OBJ.1, AGD_USR.1, ADV_SPM.1, ASE_SRE.1, ASE_INT.1, ADV_FSP.2, ASE_TSS.1, AGD_ADM.1, ATE_DPT.1, ALC_TAT.1, AVA_VLA.4, ATE_FUN.1, ASE_PPC.1 |
heuristics/extracted_versions |
6.5.7226.0 |
1.0, 3.2 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0315-2005 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0169-2002, BSI-DSZ-CC-0315-2005, BSI-DSZ-CC-0223-2003, BSI-DSZ-CC-0266-2005 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0315-2005 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0315-2005 |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
0284a.pdf |
0281a.pdf |
pdf_data/report_frontpage |
- DE:
- cert_id: BSI-DSZ-CC-0284-2005
- cert_item: Microsoft Exchange Server 2003 Enterprise Edition, Version/Build 6.5.7226.0 and Hotfix MS05-021
- cert_lab: BSI
- developer: Microsoft Corporation
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
- DE:
- cert_id: BSI-DSZ-CC-0281-2005
- cert_item: JavaCard Platform GXP3.2-E64PK-CC with GemSAFE V2 Version 1.0
- cert_lab: BSI
- developer: Gemplus SA
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0281: 2
- BSI-DSZ-CC-0281-2005: 25
- BSI-DSZ-CC-0315: 1
- BSI-DSZ-CC-0315-2005: 3
- NL:
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP-0005-2002: 2
- BSI-PP-0005-2002T: 2
- BSI-PP-0006-2002: 2
- BSI-PP-0006-2002T: 2
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 4: 1
- EAL 7: 1
- EAL1: 5
- EAL2: 3
- EAL3: 4
- EAL4: 9
- EAL4 augmented: 2
- EAL4+: 1
- EAL5: 6
- EAL6: 3
- EAL7: 4
|
- EAL:
- EAL 1: 1
- EAL 4: 1
- EAL 4+: 2
- EAL 7: 1
- EAL1: 5
- EAL2: 3
- EAL3: 4
- EAL4: 13
- EAL4 augmented: 3
- EAL4+: 2
- EAL5: 6
- EAL5+: 2
- EAL6: 3
- EAL7: 4
|
pdf_data/report_keywords/cc_sar |
- ACM:
- ACM_AUT: 2
- ACM_AUT.1: 1
- ACM_CAP: 2
- ACM_CAP.4: 1
- ACM_SCP: 2
- ACM_SCP.2: 1
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 1
- ADO_IGS: 2
- ADO_IGS.1: 1
- ADV:
- ADV_FSP: 2
- ADV_FSP.2: 1
- ADV_HLD: 2
- ADV_HLD.2: 1
- ADV_IMP: 2
- ADV_IMP.1: 1
- ADV_INT: 2
- ADV_LLD: 2
- ADV_LLD.1: 1
- ADV_RCR: 2
- ADV_RCR.1: 1
- ADV_SPM: 2
- ADV_SPM.1: 1
- AGD:
- AGD_ADM: 2
- AGD_ADM.1: 1
- AGD_USR: 2
- AGD_USR.1: 1
- ALC:
- ALC_DVS: 2
- ALC_DVS.1: 1
- ALC_FLR: 2
- ALC_FLR.3: 3
- ALC_LCD: 1
- ALC_LCD.1: 1
- ALC_TAT: 2
- ALC_TAT.1: 1
- ASE:
- ASE_DES.1: 1
- ASE_ENV.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_PPC.1: 1
- ASE_REQ.1: 1
- ASE_SRE.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 2
- ATE_COV.2: 1
- ATE_DPT: 2
- ATE_DPT.1: 1
- ATE_FUN: 2
- ATE_FUN.1: 1
- ATE_IND: 2
- ATE_IND.2: 1
- AVA:
- AVA_CCA: 2
- AVA_MSU: 2
- AVA_MSU.2: 1
- AVA_SOF: 4
- AVA_SOF.1: 1
- AVA_VLA: 4
- AVA_VLA.2: 2
- AVA_VLA.3: 1
- AVA_VLA.4: 1
|
- ACM:
- ACM_AUT: 2
- ACM_AUT.1: 1
- ACM_CAP: 2
- ACM_CAP.4: 1
- ACM_SCP: 2
- ACM_SCP.2: 1
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 1
- ADO_IGS: 2
- ADO_IGS.1: 1
- ADV:
- ADV_FSP: 2
- ADV_FSP.2: 1
- ADV_HLD: 2
- ADV_HLD.2: 1
- ADV_IMP: 2
- ADV_IMP.2: 5
- ADV_INT: 2
- ADV_LLD: 2
- ADV_LLD.1: 1
- ADV_RCR: 2
- ADV_RCR.1: 1
- ADV_SPM: 2
- ADV_SPM.1: 1
- AGD:
- AGD_ADM: 2
- AGD_ADM.1: 1
- AGD_USR: 2
- AGD_USR.1: 1
- ALC:
- ALC_DVS: 2
- ALC_DVS.1: 1
- ALC_FLR: 2
- ALC_LCD: 1
- ALC_LCD.1: 1
- ALC_TAT: 2
- ALC_TAT.1: 1
- ASE:
- ASE_DES.1: 1
- ASE_ENV.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_PPC.1: 1
- ASE_REQ.1: 1
- ASE_SRE.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 2
- ATE_COV.2: 1
- ATE_DPT: 2
- ATE_DPT.1: 1
- ATE_FUN: 2
- ATE_FUN.1: 1
- ATE_IND: 2
- ATE_IND.2: 1
- AVA:
- AVA_CCA: 2
- AVA_MSU: 2
- AVA_MSU.3: 5
- AVA_SOF: 4
- AVA_SOF.1: 1
- AVA_VLA: 4
- AVA_VLA.2: 1
- AVA_VLA.3: 1
- AVA_VLA.4: 6
|
pdf_data/report_keywords/cc_sfr |
- FDP:
- FDP_ACC.1: 2
- FDP_ACF.1: 2
- FDP_IFC.1: 1
- FDP_IFF.1: 1
- FMT:
- FMT_MSA.1: 1
- FMT_MSA.3: 3
- FMT_SMF.1: 1
- FMT_SMR.1: 1
|
- FAU:
- FAU_ARP.1: 1
- FAU_SAA.1: 1
- FCS:
- FCS_CKM.1: 3
- FCS_CKM.2: 1
- FCS_CKM.3: 2
- FCS_CKM.4: 4
- FCS_COP: 3
- FCS_COP.1: 2
- FDP:
- FDP_ACC.1: 8
- FDP_ACF.1: 6
- FDP_ETC: 1
- FDP_ITC.1: 2
- FDP_RIP.1: 2
- FDP_SDI: 2
- FDP_SDI.2: 1
- FDP_UCT: 1
- FDP_UCT.1: 2
- FDP_UIT: 2
- FDP_UIT.1: 1
- FIA:
- FIA_AFL.1: 2
- FIA_ATD.1: 2
- FIA_UAU.1: 3
- FIA_UID.1: 3
- FIA_USB.1: 1
- FMT:
- FMT_MOF.1: 2
- FMT_MSA: 1
- FMT_MSA.1: 3
- FMT_MSA.2: 2
- FMT_MSA.3: 3
- FMT_MTD.1: 2
- FMT_SMF.1: 1
- FMT_SMR.1: 2
- FPT:
- FPT_AMT.1: 1
- FPT_FLS.1: 2
- FPT_PHP.1: 2
- FPT_PHP.3: 2
- FPT_RVM.1: 1
- FPT_SEP.1: 1
- FPT_TDC.1: 1
- FPT_TST.1: 2
- FTP:
- FTP_ITC: 1
- FTP_ITC.1: 4
- FTP_TRP: 1
- FTP_TRP.1: 2
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ACCESS_CONTROL: 2
- A.COM_PROT: 2
- A.CORRECT_HW: 2
- A.INSTALL: 2
- A.MANAGE: 2
- A.NO_EVIL_ADM: 2
- A.PHYS_PROTECT: 2
- T:
- T.AUTH_DAC: 1
- T.DL_MISUSE: 1
- T.OVERFLOW: 1
- T.SPAM: 1
- T.UNAUTHUSE: 1
- T.UNAUTH_DAC: 1
|
- A:
- D:
- D.CODE: 2
- D.DTBS: 3
- D.GP_: 1
- D.GP_KEYS: 3
- D.GP_REGISTRY: 1
- D.ISD_DATA: 1
- D.ISD_KEYS: 3
- D.JAVA_OBJECT: 1
- D.RAD: 1
- D.SCD: 6
- D.SD_DATA: 2
- D.SD_KEYS: 4
- D.SIGNATURE: 3
- D.SIGN_APPLI: 2
- D.SVD: 3
- D.USER_PIN: 1
- D.VAD: 2
|
pdf_data/report_keywords/vendor |
- Microsoft:
- Microsoft: 17
- Microsoft Corporation: 6
|
- Gemplus:
- Gemplus: 19
- Gemplus SA: 5
- Infineon:
- Infineon: 3
- Infineon Technologies AG: 2
|
pdf_data/report_keywords/eval_facility |
- TUV:
- TÜV Informationstechnik: 5
|
- TUV:
- TÜV Informationstechnik: 3
- TÜViT: 1
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 1
- malfunction: 2
- SCA:
- DPA: 1
- Physical Probing: 1
- Side channel: 1
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- BSI:
- AIS 20: 5
- AIS 25: 2
- AIS 26: 3
- AIS 31: 2
- AIS 32: 1
- AIS 34: 2
- AIS 35: 1
- AIS 36: 2
- AIS31: 1
- ISO:
- ISO/IEC 15408:1999: 1
- ISO/IEC 7816: 6
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- Technical Report, BSI-DSZ-CC-0284-2005, Version 1, Datum 2005-09-16, TÜV Informationstechnik GmbH (confidential document) [7] Exchange Server 2003 Administration Guide and Exchange Server 2003 product help (part of the: 1
- OutOfScope:
- disabled in the default configuration of Exchange, such as the IMAP4, POP3, and X.400 protocol, are out of scope of the evaluation, too. B-11 BSI-DSZ-CC-0284-2005 Certification Report 5 Architectural Information: 1
- disabled in the default configuration of Exchange, such as the IMAP4, POP3, and X.400 protocol, are out of scope of the evaluation. The relevant Guidance Documentation is delivered together with the software on: 1
- disabled in the default configuration of Exchange, such as the IMAP4, POP3, and X.400 protocol, are out of scope of the evaluation. The security functionality of the TOE comprises access control for mailboxes and: 1
- of Exchange 2003 the components IMAP4, POP3, and X.400 protocol are disabled and therefore out of scope of the evaluation. The TOE runs on the platform Windows Server 2003 operating system (exact: 1
- out of scope: 4
|
- ConfidentialDocument:
- 0.3, 27.09.2005, Gemplus (confidential document) B-33 BSI-DSZ-CC-0281-2005 Certification Report [26] Master CMP For GemXpresso Pro R3 CC, Version: 1
- 25.01.2005, Gemplus (confidential document [27] Data List (DAL01A10190G), Version A02, 30.09.2004, Gemplus (confidential document) [28] Card: 1
- 36K, Version A24, 15.09.2004, Gemplus (confidential document) [19] Personalization Constraints For GXP3-CC GemSafe V2, Version A03, 20.09.2005, Gemplus: 1
- Configuration Check for GXP3-CC, Version A07, 2.05.05, Gemplus (confidential document) [29] Configuration Items History G148 (CI_History_G148_G146_for_TUVIT.xls), 02.08.2005, Gemplus: 1
- GemSafe V2, Product - GXP3.2-E64PK-CC, SSCD Type 2 (option a) and SSCD Type 3 (option b), Gemplus (confidential document) [7] Security Target BSI-DSZ-CC-0281, Version 1.0, 14.11.2005, ASE - Security Target, TOE - GXP3: 1
- Gemplus [24] Technical Design Specification For T=G protocol, Version A00, 30.08.2005, Gemplus (confidential document) [25] Configuration Management, TOE - GXP3.2-E64PK-CC GemSAFE V2, Product - GXP3.2-E64PK-CC: 1
- Initialization Specification For GemXpresso Pro R3.2 E64 PK CC, Version A13, 20.09.2005, Gemplus (confidential document) [18] Functional Requirements Specification Initialization flow description for GXP3.2-E64PK-CC and: 1
- Report, Version 2, Document ID: 20642118_TÜViT_24.2, 10.11.2005, Evaluation Technical Report (ETR) (confidential document) B-32 Certification Report BSI-DSZ-CC-0281-2005 [9] Security Target BSI-DSZ-CC-0315, Version 1.2: 1
- TOE - GXP3.2- E64PK-CC GemSAFE V2, Product - GXP3.2-E64PK-CC, Version 0.5, 20.09.2005, Gemplus (confidential document) [21] MPCOS Applet 2.0 Reference Manual, Version 1.0, 11.10.2002, Gemplus [22] GemID Reference: 1
- TOE - GXP3.2-E64PK-CC GemSAFE V2, Product - GXP3.2-E64PK-CC, Version 0.3, 09.08.2005, Gemplus (confidential document) [14] Administrator & User Guidance GemSafe V2, TOE - GXP3.2-E64PK-CC GemSAFE V2, Product - GXP3: 1
- Version 0.3, 06.09.2005 Gemplus (confidential document) [15] GemSafe V2 Applet Reference Manual, Version 5, 30.09.2005, Gemplus [16] GemXpresso Pro R3.x: 1
|
pdf_data/report_metadata |
- /Author: Federal Office for Information Security (BSI)
- /Company: BSI, Postfach 200363, 53133 Bonn
- /CreationDate: D:20051220074356+01'00'
- /Creator: Acrobat PDFMaker 7.0.5 für Word
- /ModDate: D:20051220075600+01'00'
- /Producer: Acrobat Distiller 7.0.5 (Windows)
- /SourceModified: D:20051220064348
- /Subject: BSI-DSZ-CC-0284-2005
- /Title: Certification Report
- pdf_file_size_bytes: 399534
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 39
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Company: BSI
- /CreationDate: D:20060105073636+01'00'
- /Creator: Acrobat PDFMaker 7.0.5 für Word
- /ModDate: D:20060105074700+01'00'
- /Producer: Acrobat Distiller 7.0.5 (Windows)
- /SourceModified: D:20060105063616
- /Title: Report BSI-DSZ-CC-0281-2005
- pdf_file_size_bytes: 366912
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 52
|
pdf_data/st_filename |
0284b.pdf |
0281b.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0281: 1
- BSI-DSZ-CC-0315-2005: 3
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP-0004-2002T-: 1
- BSI-PP-0005-2002T-: 1
- BSI-PP-0005-2002T-03-04-2002: 1
- BSI-PP-0006-2002T-: 1
- BSI-PP-0006-2002T-03-04-2002: 1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL4: 10
- EAL4 augmented: 5
|
- EAL:
- EAL 4: 18
- EAL 4 augmented: 1
- EAL4: 13
- EAL4 augmented: 4
- EAL4+: 2
- EAL5: 2
- EAL5 augmented: 2
- EAL5+: 2
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_AUT.1: 2
- ACM_CAP.3: 3
- ACM_SCP.1: 1
- ACM_SCP.2: 2
- ADO:
- ADO_DEL.2: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP.1: 9
- ADV_FSP.2: 2
- ADV_FUN.1: 1
- ADV_HLD.1: 2
- ADV_HLD.2: 3
- ADV_IGS.1: 1
- ADV_IMP.1: 3
- ADV_LLD.1: 4
- ADV_RCR.1: 5
- ADV_SPM.1: 2
- AGD:
- AGD_ADM.1: 3
- AGD_USR.1: 4
- ALC:
- ALC_DVS.1: 3
- ALC_FLR.3: 9
- ALC_LCD.1: 2
- ALC_TAT.1: 3
- ASE:
- ATE:
- ATE_COV.2: 2
- ATE_DPT.1: 1
- ATE_FUN.1: 3
- ATE_IND.2: 2
- AVA:
- AVA_MSU.2: 2
- AVA_SOF.1: 2
- AVA_VLA.2: 3
|
- ACM:
- ACM_AUT.1: 6
- ACM_CAP.3: 1
- ACM_CAP.4: 10
- ACM_SCP.2: 7
- ACM_XXX: 1
- ADO:
- ADO_DEL.2: 10
- ADO_IGS: 1
- ADO_IGS.1: 10
- ADO_IGS.2: 5
- ADO_ISG.1: 2
- ADV:
- ADV_FSP.1: 9
- ADV_FSP.2: 7
- ADV_HLD.1: 1
- ADV_HLD.2: 8
- ADV_IMP: 1
- ADV_IMP.1: 4
- ADV_IMP.2: 19
- ADV_LLD.1: 9
- ADV_RCR.1: 10
- ADV_SPM.1: 9
- AGD:
- AGD_ADM.1: 12
- AGD_USR.1: 9
- ALC:
- ALC_DVS.1: 9
- ALC_DVS.2: 2
- ALC_LCD.1: 8
- ALC_TAT.1: 10
- ATE:
- ATE_COV.2: 7
- ATE_DPT.1: 7
- ATE_FUN.1: 10
- ATE_IND.2: 7
- AVA:
- AVA_MSU.3: 15
- AVA_SOF: 4
- AVA_SOF.1: 10
- AVA_VLA.1: 1
- AVA_VLA.4: 18
|
pdf_data/st_keywords/cc_sfr |
- FDP:
- FDP_ACC.1: 42
- FDP_ACC.1.1: 4
- FDP_ACF.1: 40
- FDP_ACF.1.1: 3
- FDP_ACF.1.2: 3
- FDP_ACF.1.3: 3
- FDP_ACF.1.4: 3
- FDP_IFC.1: 25
- FDP_IFC.1.1: 1
- FDP_IFF.1: 20
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 2
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_IFF.1.6: 1
- FIA:
- FIA_ATD.1: 7
- FIA_ATD.1.1: 1
- FIA_UAU.1: 1
- FIA_UAU.2: 7
- FIA_UAU.2.1: 1
- FIA_UID.1: 5
- FIA_UID.2: 8
- FIA_UID.2.1: 1
- FMT:
- FMT_ACC.1: 1
- FMT_MOF.1: 9
- FMT_MOF.1.1: 1
- FMT_MSA.1: 28
- FMT_MSA.1.1: 3
- FMT_MSA.3: 52
- FMT_MSA.3.1: 3
- FMT_MSA.3.2: 3
- FMT_SMF.1: 21
- FMT_SMF.1.1: 1
- FMT_SMR.1: 34
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FRU:
- FRU_RSA.1: 18
- FRU_RSA.1.1: 2
- FTP:
- FTP_TRP.1: 7
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_ARP.1: 10
- FAU_ARP.1.1: 1
- FAU_GEN: 1
- FAU_GEN.1: 3
- FAU_SAA.1: 12
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 1
- FAU_SAR.1: 1
- FCS:
- FCS_CKM: 29
- FCS_CKM.1: 34
- FCS_CKM.1.1: 3
- FCS_CKM.2: 4
- FCS_CKM.3: 13
- FCS_CKM.3.1: 1
- FCS_CKM.4: 34
- FCS_CKM.4.1: 2
- FCS_COP: 43
- FCS_COP.1: 24
- FCS_COP.1.1: 2
- FDP:
- FDP_ACC: 38
- FDP_ACC.1: 49
- FDP_ACC.1.1: 2
- FDP_ACC.2: 1
- FDP_ACF: 35
- FDP_ACF.1: 54
- FDP_ACF.1.1: 5
- FDP_ACF.1.2: 5
- FDP_ETC: 7
- FDP_ETC.1: 4
- FDP_IFC.1: 4
- FDP_ITC: 18
- FDP_ITC.1: 14
- FDP_RIP: 1
- FDP_RIP.1: 20
- FDP_RIP.1.1: 1
- FDP_SDI: 24
- FDP_SDI.2: 19
- FDP_UCT: 8
- FDP_UCT.1: 18
- FDP_UCT.1.1: 1
- FDP_UIT: 22
- FDP_UIT.1: 14
- FDP_UIT.1.2: 2
- FIA:
- FIA_AFL.1: 21
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 2
- FIA_ATD.1: 22
- FIA_ATD.1.1: 1
- FIA_GEN.1: 1
- FIA_TRP.1: 1
- FIA_UAU.1: 28
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 3
- FIA_UID: 1
- FIA_UID.1: 30
- FIA_UID.1.1: 2
- FIA_UID.1.2: 3
- FIA_USB.1: 10
- FIA_USB.1.1: 1
- FMT:
- FMT_MOF: 1
- FMT_MOF.1: 22
- FMT_MOF.1.1: 1
- FMT_MSA: 19
- FMT_MSA.1: 23
- FMT_MSA.1.1: 3
- FMT_MSA.2: 38
- FMT_MSA.2.1: 1
- FMT_MSA.3: 31
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 3
- FMT_MTD: 1
- FMT_MTD.1: 20
- FMT_MTD.1.1: 1
- FMT_SMF.1: 11
- FMT_SMF.1.1: 1
- FMT_SMR.1: 25
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 2
- FPT:
- FPT_AMT: 1
- FPT_AMT.1: 14
- FPT_FLS: 3
- FPT_FLS.1: 18
- FPT_PHP: 1
- FPT_PHP.1: 18
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 2
- FPT_PHP.3: 19
- FPT_PHP.3.1: 1
- FPT_RVM.1: 8
- FPT_RVM.1.1: 1
- FPT_SEP: 1
- FPT_SEP.1: 10
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_TDC.1: 10
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TRP: 1
- FPT_TST: 3
- FPT_TST.1: 22
- FPT_TST.1.1: 1
- FPT_TST.1.2: 2
- FPT_TST.1.3: 2
- FTP:
- FTP_ITC: 31
- FTP_ITC.1: 29
- FTP_ITC.1.1: 3
- FTP_ITC.1.2: 6
- FTP_ITC.1.3: 8
- FTP_PHP.1: 1
- FTP_PHP.3: 1
- FTP_TRP: 13
- FTP_TRP.1: 22
- FTP_TRP.1.1: 2
- FTP_TRP.1.2: 4
- FTP_TRP.1.3: 4
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ACCESS_CONTROL: 3
- A.COM_PROT: 3
- A.CORRECT_HW: 3
- A.INSTALL: 4
- A.MANAGE: 4
- A.NO_EVIL_ADM: 2
- A.NO_EVIL_ADMIN: 1
- A.PHYS_PROTECT: 4
- O:
- O.CONBLK: 13
- O.DAC: 16
- O.FILTER_EMAIL: 10
- O.QUOTA: 12
- O.RESTDIST: 11
- OE:
- OE.COM_PROT: 5
- OE.DAC: 12
- OE.INSTALL: 3
- OE.PHYSICAL: 3
- OE.PLATFORM_: 1
- OE.PLATFORM_SUPPORT: 4
- T:
- T.AUTH_DAC: 4
- T.DL_MISUSE: 4
- T.OVERFLOW: 4
- T.SPAM: 9
- T.UNAUTHUSE: 3
- T.UNAUTH_DAC: 3
|
- A:
- D:
- D.CODE: 4
- D.DTBS: 7
- D.GP_KEYS: 8
- D.GP_REGISTRY: 12
- D.ISD: 2
- D.ISD_DATA: 11
- D.ISD_KEY: 2
- D.ISD_KEYS: 7
- D.JAVA_OBJECT: 5
- D.RAD: 21
- D.SCD: 22
- D.SD_DATA: 9
- D.SD_KEY: 2
- D.SD_KEYS: 10
- D.SIGNATURE: 5
- D.SIGN_APPLI: 3
- D.SVD: 10
- D.USER_PIN: 7
- D.USER_PIN_: 1
- D.VAD: 5
- OE:
- OT:
- OT.INIT: 2
- OT.SCD_UNIQUE: 2
|
pdf_data/st_keywords/vendor |
- Microsoft:
- Microsoft: 20
- Microsoft Corporation: 2
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- DES:
- 3DES:
- 3-DES: 1
- 3DES: 3
- Triple-DES: 1
- DES:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- Malfunction: 2
- Physical tampering: 2
- malfunction: 3
- physical tampering: 8
- SCA:
- DPA: 1
- Physical Probing: 2
- SPA: 1
- timing attacks: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCIMB-99-031: 1
- CCIMB-99-032: 1
- CCIMB-99-033: 1
- RFC:
- RFC1725: 1
- RFC1730: 1
- RFC821: 11
|
- BSI:
- AIS 32: 1
- AIS20: 2
- AIS31: 2
- AIS32: 1
- AIS36: 2
|
pdf_data/st_keywords/javacard_version |
|
- JavaCard:
- JC2.1.1: 5
- Java Card 2.1.1: 18
- JavaCard 2.1.1: 4
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- disabled in the default configuration of Exchange, such as the IMAP4, POP3, and X.400 protocol, are out of scope of the evaluation. The security functionality of the TOE comprises access control for mailboxes and: 1
- out of scope: 2
- the TOE is Exchange in its default configuration, IMAP4, POP3, and X.400 protocols are disabled and out of scope in the evaluation. Security Target Page 9/64 1. Admin component, which includes the following: 1
|
|
pdf_data/st_metadata |
- /Author: slabihou
- /CreationDate: D:20050713145508+02'00'
- /Creator: pdfFactory Pro www.pdffactory.com
- /Producer: pdfFactory Pro 2.41 (Windows 2000 Professional German)
- /Title: MS_EX_ST_1.9.doc
- pdf_file_size_bytes: 285736
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 64
|
- /Approved by: T. Deffontaine
- /Author: FFORGE
- /CC Version: Common Criteria for Information Technology Security Evaluation Version 2.1 (ISO 15408), August 1999
- /Company: gemplus
- /Confidentiality: PUBLIC
- /CreationDate: D:20051114085719+01'00'
- /Creator: Acrobat PDFMaker 7.0.5 for Word
- /Date of creation: November 14th 2005
- /Date of modification: 3/11/05
- /EAL Augmentation1: AVA_MSU.3 (Misuse - Analysis and testing for insecure states)
- /EAL Augmentation2: AVA_VLA.4 (Vulnerability Analysis - Highly resistant)
- /EAL Augmentation3: <EAL AUGMENTATION 3>
- /EAL x: EAL4
- /HWcertificate: BSI-DSZ-CC-0315-2005.
- /IC: SLE66CX642P
- /ICSTREF: SLE66CX642P/m1485b16 With RSA 2048 V1.30
- /Issued by: F.Forge
- /ModDate: D:20051114085743+01'00'
- /Producer: Acrobat Distiller 7.0.5 (Windows)
- /Product: GXP3.2-E64PK-CC
- /Project code: R10348
- /Project name: GXP3.2-E64PK-CC GemSAFE V2
- /Reference: ST GXP3-CC-GemSafeV2
- /Signature: GemSAFE V2
- /TOE: GXP3.2- E64PK-CC GemSAFE V2
- /TOE version: 1.0
- /Title: <Title>
- /Verified by: V.Frichittavong
- /Version: 1.0
- pdf_file_size_bytes: 1027747
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 126
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |