Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Microsoft SQL Server 2012 Database Engine Enterprise Edition x64 (English), Version:11.0.2100.60
JISEC-CC-CRP-C0371
LinqUs USIM 128k platform on SC33F640E
ANSSI-CC-2011/17
name Microsoft SQL Server 2012 Database Engine Enterprise Edition x64 (English), Version:11.0.2100.60 LinqUs USIM 128k platform on SC33F640E
category Databases ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme JP FR
not_valid_after 12.10.2017 01.09.2019
not_valid_before 06.09.2012 17.06.2011
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0371_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2011-17en.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0371_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2011-17en.pdf
manufacturer Microsoft Corporation Gemalto / STMicroelectronics
manufacturer_web https://www.microsoft.com https://www.gemalto.com/
security_level EAL2 ALC_DVS.2, EAL4+, AVA_VAN.5
dgst bccee9cca27bae56 5884a58a1f9470ba
heuristics/cert_id JISEC-CC-CRP-C0371 ANSSI-CC-2011/17
heuristics/cert_lab [] THALES
heuristics/extracted_sars {} ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ADV_FSP.4, ASE_CCL.1
heuristics/extracted_versions 11.0.2100.60 -
heuristics/report_references/directly_referenced_by {} ANSSI-CC-2011/77
heuristics/report_references/directly_referencing {} ANSSI-CC-2011/07
heuristics/report_references/indirectly_referenced_by {} ANSSI-CC-2013/27, ANSSI-CC-2014/83, ANSSI-CC-2014/96, ANSSI-CC-2013/18, ANSSI-CC-2012/11, ANSSI-CC-2013/07, ANSSI-CC-2014/56, ANSSI-CC-2013/57, ANSSI-CC-2013/28, ANSSI-CC-2012/49, ANSSI-CC-2012/48, ANSSI-CC-2014/82, ANSSI-CC-2013/56, ANSSI-CC-2011/77, ANSSI-CC-2013/19
heuristics/report_references/indirectly_referencing {} ANSSI-CC-2010/50, ANSSI-CC-2010/49, ANSSI-CC-2011/07
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0371
  • certification_date: 01.09.2012
  • claim: EAL2
  • enhanced:
    • assurance_level: EAL2
    • cert_link: https://www.ipa.go.jp/en/security/c0371_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is the database engine of SQL Server 2012. SQL Server is a Database Management System (DBMS). The TOE has been developed as the core module of the DBMS to store and manage data in a secure way. TOE security functions This TOE provides the following security functionality: - The Access Control function of the TOE controls the access of users to user and metadata stored in the TOE. - The Security Audit function of the TOE produces log files about all security relevant events. - The Security Management function allows authorized administrators to manage the behavior of the security functionality of the TOE. - The Identification and Authentication function of the TOE is able to identify and authenticate users.
    • evaluation_facility: TワV Informationstechnik GmbH, Evaluation Body for IT-Security
    • product: Microsoft SQL Server 2012 Database Engine Enterprise Edition x64 (English)
    • product_type: Database Management System (DBMS)
    • report_link: https://www.ipa.go.jp/en/security/c0371_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0371_est.pdf
    • toe_version: 11.0.2100.60
    • vendor: Microsoft Corporation
  • expiration_date: 01.10.2017
  • supplier: Microsoft Corporation
  • toe_japan_name: -----
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0371_it1383.html
  • toe_overseas_name: Microsoft SQL Server 2012 Database Engine Enterprise Edition x64 (English) 11.0.2100.60
heuristics/protection_profiles {} 85bef5b6f16c4d33
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-cible_PP-2010-03en.pdf
pdf_data/report_filename c0371_erpt.pdf ANSSI-CC_2011-17en.pdf
pdf_data/report_frontpage
  • FR:
  • FR:
    • cc_security_level: EAL 4 augmented ALC_DVS.2, AVA_VAN.5
    • cc_version: Common Criteria version 3.1 revision 3
    • cert_id: ANSSI-CC-2011/17
    • cert_item: LinqUs USIM 128k platform on SC33F640E
    • cert_item_version: / version T1017287 / Release A TOE reference / version S1092122/ Release A
    • cert_lab: THALES - CEACI (T3S – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France Phone: +33 (0)5 62 88 28 01 or 18, email : [email protected]
    • developer: Gemalto La Vigie, Av du Jujubier, ZI Athelia IV, 13705 La Ciotat Cedex, France STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, B.P. 2, 13106 Rousset, France Sponsor Gemalto La Vigie, Av du Jujubier, ZI Athelia IV, 13705 La Ciotat Cedex, France
    • match_rules: ['Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developers(.+)Evaluation facility(.+)Recognition arrangements']
    • ref_protection_profiles: PP JCS-O], version 2.6 Java Card System Protection Profile - Open Configuration
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0371-01: 1
    • Certification No. C0371: 1
  • FR:
    • ANSSI-CC-2011/07: 3
    • ANSSI-CC-2011/17: 20
    • ANSSI-CC-PP-2010/03: 1
pdf_data/report_keywords/cc_protection_profile_id
  • ANSSI:
    • ANSSI-CC-PP-2010/03: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 6
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 4: 2
    • EAL 4 augmented: 2
    • EAL 5: 1
    • EAL 7: 1
    • EAL4: 2
    • EAL5: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 High: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 5
    • AGD_PRE: 3
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 2
    • ALC_FLR: 2
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 3
    • AVA_VAN.5: 2
pdf_data/report_keywords/cc_claims
  • A:
    • A.NO_EVIL: 1
    • A.NO_GENERAL_: 1
    • A.PHYSICAL: 1
  • T:
    • T.MASQUERADE: 1
    • T.TSF_COMPROMISE: 1
    • T.UNAUTHORIZED_: 1
    • T.UNIDENTIFIED_: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 17
    • Microsoft Corporation: 7
  • Gemalto:
    • Gemalto: 5
  • STMicroelectronics:
    • STMicroelectronics: 2
pdf_data/report_keywords/eval_facility
  • TUV:
    • TÜV Informationstechnik: 3
  • Thales:
    • THALES - CEACI: 1
pdf_data/report_keywords/crypto_library
  • Neslib:
    • NesLib v3.0: 1
pdf_data/report_keywords/cplc_data
  • ICFab:
    • IC Fabricator: 1
  • ICType:
    • ICType: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 2
    • CCMB-2009-07-002: 2
    • CCMB-2009-07-003: 2
    • CCMB-2009-07-004: 2
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
pdf_data/report_metadata
  • /CreationDate: D:20130527154721+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20130527154854+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 225890
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 29
  • /Author:
  • /CreationDate: D:20110617111049+02'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20110617111049+02'00'
  • /Producer: Acrobat Distiller 8.0.0 (Windows)
  • /Title:
  • pdf_file_size_bytes: 276008
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 19
pdf_data/st_filename c0371_est.pdf ANSSI-CC-cible_2011-17en.pdf
pdf_data/st_keywords/cc_cert_id
  • NL:
    • CC-1: 1
    • CC-2: 3
    • CC-3: 2
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-2007-0035: 2
  • other:
    • PP-SSCD: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 4
    • EAL2: 84
  • EAL:
    • EAL4: 7
    • EAL4 augmented: 2
    • EAL4+: 1
    • EAL5: 1
    • EAL5 augmented: 1
pdf_data/st_keywords/cc_sar
  • AGD:
    • AGD_ADD: 3
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 6
    • ADV_FSP.1: 4
    • ADV_FSP.2: 2
    • ADV_FSP.4: 9
    • ADV_IMP.1: 5
    • ADV_TDS.1: 2
    • ADV_TDS.2: 1
    • ADV_TDS.3: 9
  • AGD:
    • AGD_OPE.1: 10
    • AGD_PRE.1: 6
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.1: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 2
    • ALC_DVS.2: 8
    • ALC_LCD.1: 3
    • ALC_TAT.1: 3
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 4
    • ASE_INT.1: 5
    • ASE_OBJ.2: 3
    • ASE_REQ.1: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 2
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 3
    • ATE_DPT.1: 2
    • ATE_FUN.1: 6
  • AVA:
    • AVA_VAN.5: 8
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 6
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_SEL.1: 6
    • FAU_SEL.1.1: 1
    • FAU_STG: 3
    • FAU_STG.1: 2
    • FAU_STG.3: 1
    • FAU_STG.4: 1
    • FAU_STG_EXP: 2
    • FAU_STG_EXP.5: 14
    • FAU_STG_EXP.5.1: 2
  • FDP:
    • FDP_ACC.1: 9
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 6
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 1
  • FIA:
    • FIA_ATD.1: 9
    • FIA_ATD.1.1: 1
    • FIA_UAU.2: 7
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 7
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UID.1: 8
    • FIA_UID.2: 10
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF.1: 6
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 6
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 9
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 7
    • FMT_MTD.1.1: 1
    • FMT_REV.1: 14
    • FMT_REV.1.1: 2
    • FMT_REV.1.2: 2
    • FMT_SMF.1: 7
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 13
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 1
  • FAU:
    • FAU_ARP.1: 17
    • FAU_ARP.1.1: 1
    • FAU_SAA.1: 3
    • FAU_SAS.1: 1
  • FCO:
    • FCO_NRO: 6
    • FCO_NRO.2: 5
  • FCS:
    • FCS_CKM: 79
    • FCS_CKM.1: 23
    • FCS_CKM.2: 7
    • FCS_CKM.3: 4
    • FCS_CKM.4: 45
    • FCS_CKM.4.1: 1
    • FCS_COP: 61
    • FCS_COP.1: 15
    • FCS_RND: 2
    • FCS_RND.1: 9
    • FCS_RND.1.1: 2
    • FCS_RNG.1: 2
  • FDP:
    • FDP_ACC: 34
    • FDP_ACC.1: 13
    • FDP_ACC.2: 8
    • FDP_ACF: 29
    • FDP_ACF.1: 20
    • FDP_IFC: 31
    • FDP_IFC.1: 18
    • FDP_IFC.2: 2
    • FDP_IFF: 25
    • FDP_IFF.1: 22
    • FDP_ITC: 12
    • FDP_ITC.1: 19
    • FDP_ITC.2: 28
    • FDP_ITT.1: 1
    • FDP_RIP: 118
    • FDP_RIP.1: 10
    • FDP_ROL: 13
    • FDP_ROL.1: 6
    • FDP_SDI.2: 8
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UIT: 6
    • FDP_UIT.1: 2
  • FIA:
    • FIA_ATD: 9
    • FIA_ATD.1: 3
    • FIA_UID: 16
    • FIA_UID.1: 10
    • FIA_UID.2: 1
    • FIA_USB: 8
    • FIA_USB.1: 4
  • FMT:
    • FMT_LIM: 1
    • FMT_LIM.1: 2
    • FMT_LIM.2: 1
    • FMT_MSA: 123
    • FMT_MSA.1: 13
    • FMT_MSA.2: 2
    • FMT_MSA.3: 21
    • FMT_MTD: 20
    • FMT_MTD.1: 3
    • FMT_MTD.3: 1
    • FMT_REV: 8
    • FMT_REV.1: 4
    • FMT_SMF: 37
    • FMT_SMF.1: 22
    • FMT_SMF.1.1: 1
    • FMT_SMR: 47
    • FMT_SMR.1: 38
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO: 5
    • FPR_UNO.1: 11
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_FLS: 41
    • FPT_FLS.1: 18
    • FPT_FLS.1.1: 2
    • FPT_ITT: 5
    • FPT_ITT.1: 3
    • FPT_PHP.3: 1
    • FPT_RCV: 22
    • FPT_RCV.3: 12
    • FPT_RCV.4: 2
    • FPT_TDC.1: 9
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TST.1: 1
    • FPT_UNO.1: 1
  • FRU:
    • FRU_FLT.2: 1
  • FTP:
    • FTP_ITC: 8
    • FTP_ITC.1: 5
    • FTP_TRP.1: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.NO_EVIL: 3
    • A.NO_GENERAL_PURPOSE: 3
    • A.PHYSICAL: 3
  • O:
    • O.ADMIN_ROLE: 5
    • O.AUDIT_GENERATION: 6
    • O.MANAGE: 7
    • O.MEDIATE: 4
  • OE:
    • OE.NO_EVIL: 4
    • OE.NO_GENERAL_: 3
    • OE.NO_GENERAL_PURPOSE: 1
    • OE.PHYSICAL: 4
  • T:
    • T.MASQUERADE: 3
    • T.TSF_COMPROMISE: 3
    • T.UNAUTHORIZED_: 1
    • T.UNAUTHORIZED_ACCESS: 2
    • T.UNIDENTIFIED_ACTIONS: 3
  • A:
    • A.APPLET: 5
    • A.APPS-PROVIDER: 5
    • A.CONTROLLING-: 2
    • A.CONTROLLING-AUTHORITY: 3
    • A.DELETION: 5
    • A.MOBILE-OPERATOR: 5
    • A.OTA-ADMIN: 5
    • A.VERIFICATION: 4
    • A.VERIFICATION-: 2
    • A.VERIFICATION-AUTHORITY: 3
  • D:
    • D.API_DATA: 3
    • D.APP_CODE: 7
    • D.APP_C_DATA: 3
    • D.APP_I_DATA: 4
    • D.CRYPTO: 4
    • D.JCS_CODE: 3
    • D.JCS_DATA: 5
    • D.PIN: 4
    • D.SEC_DATA: 7
  • O:
    • O.ALARM: 22
    • O.APPLET: 21
    • O.APPLI-: 1
    • O.APPLI-AUTH: 8
    • O.CIPHER: 23
    • O.CODE_PKG: 14
    • O.DELETION: 14
    • O.FIREWALL: 51
    • O.GLOBAL_ARRAYS_CONFID: 19
    • O.GLOBAL_ARRAYS_INTEG: 10
    • O.INSTALL: 15
    • O.JAVAOBJECT: 40
    • O.KEY-MNGT: 36
    • O.LOAD: 17
    • O.NATIVE: 14
    • O.OBJ-DELETION: 9
    • O.OPERATE: 35
    • O.PIN-: 8
    • O.PIN-MNGT: 13
    • O.REALLOCATION: 17
    • O.REMOTE: 17
    • O.REMOTE_MTHD: 6
    • O.REMOTE_OBJ: 10
    • O.RESOURCES: 25
    • O.RMI_SERVICE: 12
    • O.RND: 10
    • O.ROR: 5
    • O.SCP: 49
    • O.SID: 38
    • O.TRANSACTION: 17
  • OE:
    • OE.APPLET: 8
    • OE.APPS-PROVIDER: 7
    • OE.BASIC-APPS-: 6
    • OE.BASIC-APPS-VALIDATION: 25
    • OE.CARD-MANAGEMENT: 29
    • OE.CONTROLLING-: 2
    • OE.CONTROLLING-AUTHORITY: 5
    • OE.KEY-ESCROW: 5
    • OE.MOBILE-OPERATOR: 7
    • OE.OTA-ADMIN: 5
    • OE.SCP: 3
    • OE.TRUSTED-APPS-: 1
    • OE.TRUSTED-APPS-DEVELOPER: 5
    • OE.TRUSTED-APPS-PRE-: 1
    • OE.TRUSTED-APPS-PRE-ISSUANCE: 5
    • OE.VERIFICATION: 33
    • OE.VERIFICATION-: 2
    • OE.VERIFICATION-AUTHORITY: 5
  • OP:
    • OP.ARRAY_ACCESS: 4
    • OP.CREATE: 7
    • OP.DELETE_APPLET: 4
    • OP.DELETE_PCKG: 3
    • OP.DELETE_PCKG_APPLET: 3
    • OP.GET_ROR: 3
    • OP.INSTANCE_FIELD: 4
    • OP.INVK_INTERFACE: 7
    • OP.INVK_VIRTUAL: 6
    • OP.INVOKE: 3
    • OP.JAVA: 5
    • OP.PUT: 6
    • OP.RET_RORD: 3
    • OP.THROW: 5
    • OP.TYPE_ACCESS: 5
  • OSP:
    • OSP.BASIC-: 1
    • OSP.BASIC-APPS-VALIDATION: 4
    • OSP.KEY-ESCROW: 5
    • OSP.RNG: 5
    • OSP.TRUSTED-APPS-DEVELOPER: 4
    • OSP.TRUSTED-APPS-PRE-ISSUANCE: 4
    • OSP.VERIFICATION: 5
  • R:
    • R.JAVA: 11
  • T:
    • T.CONFID-: 1
    • T.CONFID-APPLI-DATA: 17
    • T.CONFID-JCS-: 11
    • T.CONFID-JCS-CODE: 3
    • T.CONFID-JCS-DATA: 5
    • T.DELETION: 5
    • T.EXE-CODE: 12
    • T.EXE-CODE-: 1
    • T.EXE-CODE-REMOTE: 3
    • T.INSTALL: 7
    • T.INTEG-: 5
    • T.INTEG-APPLI-: 11
    • T.INTEG-APPLI-CODE: 6
    • T.INTEG-APPLI-DATA: 14
    • T.INTEG-JCS-: 8
    • T.INTEG-JCS-CODE: 6
    • T.INTEG-JCS-DATA: 4
    • T.NATIVE: 7
    • T.OBJ-: 1
    • T.OBJ-DELETION: 3
    • T.PHYSICAL: 5
    • T.RESOURCES: 8
    • T.SID: 18
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 54
    • Microsoft Corporation: 2
  • Gemalto:
    • Gemalto: 17
  • STMicroelectronics:
    • STMicroelectronics: 3
pdf_data/st_keywords/eval_facility
  • TrustedLabs:
    • Trusted Labs: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 8
  • DES:
    • 3DES:
      • TDES: 5
    • DES:
      • DES: 16
  • constructions:
    • MAC:
      • CMAC: 1
      • HMAC: 7
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
  • MD:
    • MD5:
      • MD5: 1
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-2: 3
      • SHA-224: 1
      • SHA-256: 2
      • SHA-384: 2
      • SHA2: 2
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key agreement: 1
  • MAC:
    • MAC: 15
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 10
    • RNG: 8
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 8
  • ECB:
    • ECB: 4
pdf_data/st_keywords/crypto_engine
  • NesCrypt:
    • Nescrypt: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • fault induction: 2
    • malfunction: 3
    • physical tampering: 3
  • SCA:
    • DPA: 1
    • physical probing: 1
  • other:
    • JIL: 2
pdf_data/st_keywords/standard_id
  • CC:
    • CCIMB-2009-07-001: 1
    • CCIMB-2009-07-002: 1
    • CCIMB-2009-07-003: 1
    • CCIMB-2009-07-004: 1
  • FIPS:
    • FIPS 140-2: 1
    • FIPS 180-2: 2
    • FIPS 197: 1
    • FIPS 46-3: 1
    • FIPS PUB 197: 2
    • FIPS PUB 46-3: 3
    • FIPS PUB 81: 4
  • ISO:
    • ISO/IEC 9796-2: 1
  • PKCS:
    • PKCS #1: 5
    • PKCS #5: 1
    • PKCS#1: 1
    • PKCS#5: 1
  • RFC:
    • RFC2085: 1
    • RFC2104: 1
pdf_data/st_keywords/javacard_version
  • GlobalPlatform:
    • Global Platform 2.2.2: 1
  • JavaCard:
    • Java Card 2.2.2: 2
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 5
pdf_data/st_keywords/javacard_packages
  • java:
    • java.rmi: 2
  • javacard:
    • javacard.framework: 2
    • javacard.framework.service: 1
    • javacard.security: 2
  • javacardx:
    • javacardx.crypto: 10
    • javacardx.rmi: 1
    • javacardx.security: 9
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
    • out of scope: 2
    • parameters for cryptographic operations, the use of these other values are not advised; and clearly out of scope of the TOE. See [USR] for details. JCS.EraseResidualData The security function ensures that: 1
pdf_data/st_metadata
  • /CreationDate: D:20110629163413+02'00'
  • /Keywords:
  • /ModDate: D:20110629163413+02'00'
  • /Producer: Microsoft® Office Word 2007
  • pdf_file_size_bytes: 1871995
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 133
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different