| name |
Hitachi Device Manager Software, Hitachi Tiered Storage Manager Software 8.0.1-02 |
ACOS-IDv2.0 SSCD (A) CL-TC-Comm (v2.0 SSCD (A)) |
| category |
Access Control Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme |
JP |
FR |
| status |
archived |
active |
| not_valid_after |
13.02.2022 |
07.06.2027 |
| not_valid_before |
13.02.2017 |
07.06.2022 |
| cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0536_eimg.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-cc-2022_20.pdf |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0536_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2022_20fr.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0536_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2022_20en.pdf |
| manufacturer |
Hitachi, Ltd. |
Austria Card plastikkarten und Ausweissysteme Gmbh |
| manufacturer_web |
https://www.hitachi.com/ |
https://www.austriacard.at/ |
| security_level |
EAL2+, ALC_FLR.1 |
EAL4+, ATE_DPT.2, ALC_TAT.2, ALC_CMS.5, AVA_VAN.5, ALC_DVS.2, ALC_FLR.1 |
| dgst |
bd28ac0feda9039e |
61a79deadb29fbcd |
| heuristics/cert_id |
JISEC-CC-CRP-C0536 |
ANSSI-CC-2022/20 |
| heuristics/cert_lab |
[] |
[] |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ALC_FLR.1, ADV_TDS.1, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 |
ADV_TDS.3, ASE_COMP.1, ALC_DVS.2, ATE_DPT.2, AGD_PRE.1, ALC_CMS.5, ADV_FUN.1, AVA_VAN.5, AGD_OPE.1, ALC_FLR.1, ADV_ARC.1, ADV_FSP.4, ALC_TAT.2, ADV_IMP.1 |
| heuristics/extracted_versions |
8.0.1 |
2.0 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2022/65 |
| heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2022/08, BSI-DSZ-CC-1110-V4-2021, ANSSI-CC-2022/07 |
| heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2022/65 |
| heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1110-V4-2021, BSI-DSZ-CC-0891-V2-2016, BSI-DSZ-CC-0945-V3-2018, BSI-DSZ-CC-1110-2019, BSI-DSZ-CC-1110-V3-2020, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0945-2017, ANSSI-CC-2022/07, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0945-V2-2018, BSI-DSZ-CC-1110-V2-2019, ANSSI-CC-2022/08 |
| heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0536
- certification_date: 01.02.2017
- claim: EAL2+ALC_FLR.1
- enhanced:
- assurance_level: EAL2 Augmented with ALC_FLR.1
- cc_version: 3.1 Release4
- cert_link: https://www.ipa.go.jp/en/security/c0536_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is Hitachi Device Manager software and Hitachi Tiered Storage Manager software. The TOE has functionality to manage the input or modification of information that expresses a storage system configuration (abbreviated hereafter to storage resource information). TOE security functionality The TOE provides the following security functionality: - Identification/authentication functionality(The TOE also makes it possible to use external authentication functionality provided by external authentication servers, and to use functionality for linking with external authentication groups.) - Access control functionality for storage resource information and for warning banner information - Warning banner functionality
- evaluation_facility: Mizuho Information & Research Institute, Inc. Information Security Evaluation Office
- product: Hitachi Device Manager Software, Hitachi Tiered Storage Manager Software
- product_type: Access Control Device and Systems
- report_link: https://www.ipa.go.jp/en/security/c0536_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0536_est.pdf
- toe_version: 8.0.1-02
- vendor: Hitachi, Ltd.
- expiration_date: 01.03.2022
- supplier: Hitachi, Ltd.
- toe_japan_name: Hitachi Device Manager Software, Hitachi Tiered Storage Manager Software8.0.1-02
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0536_it5576.html
- toe_overseas_name: Hitachi Device Manager Software, Hitachi Tiered Storage Manager Software8.0.1-02
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-1110-V4-2021 |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1110-V4-2021 |
| heuristics/protection_profiles |
{} |
1f7ea2e05de5b88b, 4a814d0e3c9f9082, d918b28fd7bb5d79, d9553e7194783182, 27abdb9c6ab375a7 |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0072b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0071b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0075b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0076b_pdf.pdf |
| pdf_data/cert_filename |
c0536_eimg.pdf |
certificat-cc-2022_20.pdf |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0072-2012: 1
- BSI-CC-PP- 0076-2013: 1
- BSI-CC-PP-0059-2009-MA-01: 1
- BSI-CC-PP-0075-2012: 1
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
- ALC:
- ALC_CMS.5: 1
- ALC_DVS.2: 1
- ALC_FLR.1: 1
- ALC_TAT.2: 1
- ATE:
- AVA:
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
- /CreationDate: D:20170911161211+09'00'
- /Creator: Word 用 Acrobat PDFMaker 11
- /ModDate: D:20170911161350+09'00'
- /Producer: Adobe PDF Library 11.0
- /Title:
- pdf_file_size_bytes: 453124
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 1
|
- /Author: mflament
- /CreationDate: D:20220613141106+02'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20220613141106+02'00'
- /Producer: Acrobat Distiller 21.0 (Windows)
- /Title: Microsoft Word - certificat-CC-2022_20
- pdf_file_size_bytes: 1554648
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
| pdf_data/report_filename |
c0536_erpt.pdf |
anssi-cc-2022_20fr.pdf |
| pdf_data/report_frontpage |
|
|
| pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0536-01: 1
- Certification No. C0536: 1
|
- DE:
- BSI-DSZ-CC-1110-V4-2021: 1
- FR:
- ANSSI-CC-2022/07: 1
- ANSSI-CC-2022/08: 2
- ANSSI-CC-2022/20: 2
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0059-2009-MA-01: 2
- BSI-CC-PP-0071-2012: 2
- BSI-CC-PP-0072-2012: 2
- BSI-CC-PP-0075-2012: 2
- BSI-CC-PP-0076-2013: 2
- BSI-PP-0084-2014: 1
- other:
- PP-SSCD-: 1
- PP-SSCD-Part2: 2
- PP-SSCD-Part3: 2
- PP-SSCD-Part4: 2
- PP-SSCD-Part5: 1
- PP-SSCD-Part6: 2
|
| pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL2: 4
- EAL2 augmented: 2
|
|
| pdf_data/report_keywords/cc_sar |
|
- ALC:
- ALC_CMS.5: 1
- ALC_DVS.2: 1
- ALC_FLR: 1
- ALC_FLR.1: 1
- ALC_TAT.2: 1
- ATE:
- AVA:
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
- A:
- A.ADMINISTRATORS: 1
- A.CLIENTS: 1
- A.NETWORKS: 1
- A.PASSWORD: 1
- A.PHYSICAL: 2
- A.SECURE_CHANNEL: 1
- A.SRV_MGMT: 1
- T:
- T.ILLEGAL_ACCESS: 1
- T.UNAUTHORISED_ACCESS: 1
|
|
| pdf_data/report_keywords/vendor |
|
- Infineon:
- Infineon: 1
- Infineon Technologies AG: 1
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- CCMB-2012-09-004: 2
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
- /CreationDate: D:20171211090255+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20171211090339+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 207872
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 34
|
- /Author: mflament
- /CreationDate: D:20220613140948+02'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20220613140948+02'00'
- /Producer: Acrobat Distiller 21.0 (Windows)
- /Title: Microsoft Word - ANSSI-CC-2022_20fr
- pdf_file_size_bytes: 307737
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 16
|
| pdf_data/st_filename |
c0536_est.pdf |
anssi-cible-cc-2022_20en.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1110-V4-2021: 2
- BSI-DSZ-CC-S-0153: 1
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0059-2009-MA-01: 1
- BSI-CC-PP- 0084-2014: 1
- BSI-CC-PP-0055-2009: 1
- BSI-CC-PP-0056-V2-2012: 1
- BSI-CC-PP-0059-2009-MA-01: 2
- BSI-CC-PP-0068: 3
- BSI-CC-PP-0068-V2-2011-MA-01: 1
- BSI-CC-PP-0071: 2
- BSI-CC-PP-0072: 2
- BSI-CC-PP-0075: 3
- BSI-CC-PP-0076: 2
- BSI-CC-PP-0084-2014: 2
|
| pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL2: 8
- EAL2 augmented: 3
|
- EAL:
- EAL 6+: 1
- EAL4: 16
- EAL4 augmented: 3
- EAL4+: 1
- EAL6: 2
- EAL6 augmented: 2
- EAL6+: 1
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.1: 7
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 7
- ADV_FSP.4: 3
- ADV_FUN.1: 3
- ADV_IMP.1: 6
- ADV_TDS.3: 6
- AGD:
- AGD_OPE.1: 2
- AGD_PRE: 1
- AGD_PRE.1: 2
- ALC:
- ALC_CMS.5: 7
- ALC_DVS.2: 7
- ALC_FLR.1: 8
- ALC_TAT.2: 7
- ASE:
- ASE_CCL: 2
- ASE_COMP.1: 1
- ASE_ECD: 2
- ASE_INT: 2
- ASE_REQ: 2
- ASE_SPD: 3
- ASE_TSS: 2
- ATE:
- ATE_DPT.1: 1
- ATE_DPT.2: 8
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 13
- FDP_ACC.1.1: 1
- FDP_ACF: 1
- FDP_ACF.1: 10
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FIA:
- FIA_AFL: 1
- FIA_AFL.1: 6
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD: 1
- FIA_ATD.1: 7
- FIA_ATD.1.1: 1
- FIA_SOS: 1
- FIA_SOS.1: 7
- FIA_SOS.1.1: 1
- FIA_UAU: 2
- FIA_UAU.1: 8
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID.1: 9
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 6
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA: 2
- FMT_MSA.1: 9
- FMT_MSA.1.1: 1
- FMT_MSA.3: 8
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 1
- FMT_MTD.1: 9
- FMT_MTD.1.1: 1
- FMT_SMF: 1
- FMT_SMF.1: 11
- FMT_SMF.1.1: 1
- FMT_SMR: 1
- FMT_SMR.1: 12
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FTA:
- FTA_TAB: 1
- FTA_TAB.1: 7
- FTA_TAB.1.1: 1
|
- FAU:
- FCS:
- FCS_CKM: 55
- FCS_CKM.1: 14
- FCS_CKM.2: 7
- FCS_CKM.4: 29
- FCS_CKM.4.1: 1
- FCS_COP: 62
- FCS_COP.1: 12
- FCS_ITC: 1
- FCS_RNG.1: 1
- FDP:
- FDP_ACC: 59
- FDP_ACC.1: 36
- FDP_ACF: 44
- FDP_ACF.1: 31
- FDP_AFC: 1
- FDP_DAU: 9
- FDP_DAU.1: 2
- FDP_DAU.2: 2
- FDP_IFC.1: 21
- FDP_ITC: 11
- FDP_ITC.1: 19
- FDP_ITC.2: 10
- FDP_ITT.1: 2
- FDP_RIP.1: 6
- FDP_RIP.1.1: 1
- FDP_SDI: 19
- FDP_SDI.1: 3
- FDP_SDI.2: 5
- FDP_UCT: 9
- FDP_UCT.1: 3
- FDP_UIT: 6
- FDP_UIT.1: 3
- FIA:
- FIA_AFL: 15
- FIA_AFL.1: 5
- FIA_AFL.1.1: 2
- FIA_API: 4
- FIA_API.1: 11
- FIA_API.1.1: 3
- FIA_UAU.1: 17
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID.1: 20
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_LIM.1: 1
- FMT_LIM.2: 1
- FMT_MOF.1: 7
- FMT_MOF.1.1: 1
- FMT_MSA: 72
- FMT_MSA.1: 14
- FMT_MSA.2: 6
- FMT_MSA.2.1: 1
- FMT_MSA.3: 21
- FMT_MSA.4: 2
- FMT_MTD: 14
- FMT_MTD.1: 3
- FMT_SMF.1: 32
- FMT_SMF.1.1: 1
- FMT_SMR.1: 36
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS: 31
- FPT_EMS.1: 11
- FPT_EMS.1.1: 2
- FPT_EMS.1.2: 2
- FPT_FLS: 1
- FPT_FLS.1: 13
- FPT_FLS.1.1: 1
- FPT_ITT.1: 1
- FPT_PHP.1: 9
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 16
- FPT_PHP.3.1: 2
- FPT_TST: 1
- FPT_TST.1: 12
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FPT_TST.2: 1
- FRU:
- FTP:
- FTP_ICT: 3
- FTP_ITC: 51
- FTP_ITC.1: 16
- FTP_TRP.1: 4
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.ADMINISTRATORS: 4
- A.CLIENTS: 3
- A.NETWORKS: 3
- A.PASSWORD: 4
- A.PHYSICAL: 4
- A.SECURE_CHANNEL: 3
- A.SRV_MGMT: 4
- O:
- O.BANNER: 6
- O.MGMT: 9
- O.PASSWORD: 7
- T:
- T.ILLEGAL_ACCESS: 4
- T.UNAUTHORISED_ACCESS: 3
|
- A:
- A.CGA: 4
- A.CSP: 4
- A.SCA: 4
- OE:
- OE.HID_VAD: 12
- OE.HI_VAD: 1
- T:
|
| pdf_data/st_keywords/vendor |
- Microsoft:
- Microsoft: 3
- Microsoft Corporation: 4
|
- Infineon:
- Infineon: 12
- Infineon Technologies AG: 1
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 4
- TDES: 6
- Triple-DES: 1
- DES:
- constructions:
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
- NIST:
- NIST P-256: 1
- NIST P-384: 1
- NIST P-521: 1
- P-256: 1
- P-384: 1
- P-521: 1
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- Malfunction: 2
- fault injection: 1
- malfunction: 3
- physical tampering: 6
- SCA:
- DPA: 1
- Leak-Inherent: 2
- SPA: 1
- physical probing: 1
- timing attacks: 1
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- FIPS:
- FIPS 186-4: 1
- FIPS 197: 1
- FIPS PUB 180-4: 3
- FIPS PUB 186-4: 1
- ICAO:
- ISO:
- ISO/IEC 10116:2006: 1
- ISO/IEC 15408: 2
- ISO/IEC 18013: 2
- ISO/IEC 7816-3: 1
- ISO/IEC 7816-4: 1
- ISO/IEC 7816-8: 1
- ISO/IEC 7816-9: 1
- ISO/IEC14443: 2
- ISO/IEC7816-3: 1
- PKCS:
- RFC:
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- antenna and card body / booklet are irrelevant for the secure operation of the TOE and therefore out of scope. 2.3.6 TOE Components The TOE consists of the following components: Category Definition Secure Chip: 1
- out of scope: 1
|
| pdf_data/st_metadata |
- /CreationDate: D:20171130192201+09'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20171130192201+09'00'
- /Producer: Microsoft® Word 2016
- pdf_file_size_bytes: 1103262
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 64
|
- /Author: Austria Card Ges.m.b.H. - Thomas Aichinger
- /CreationDate: D:20220511135157+02'00'
- /Creator: Microsoft® Word 2013
- /ModDate: D:20220511135157+02'00'
- /Producer: Microsoft® Word 2013
- /Subject: ACOS-IDv2.0 SSCD
- /Title: Security Target
- pdf_file_size_bytes: 3190425
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 94
|
| state/cert/convert_garbage |
None |
False |
| state/cert/convert_ok |
True |
True |
| state/cert/download_ok |
True |
True |
| state/cert/extract_ok |
True |
True |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
False |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
False |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |