name |
Palo Alto Networks PA-500, PA-2000 Series, PA-4000 Series, and PA-5000 Series Next-Generation Firewall with PAN-OS 4.0.12-h2 and User Identification Agent v3.1.2 |
Plate-forme STSafe-J, en configuration fermée, version 1.1.4, sur le composant ST31H320 A03 |
category |
Boundary Protection Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
US |
FR |
status |
archived |
archived |
not_valid_after |
22.04.2015 |
23.03.2022 |
not_valid_before |
11.04.2013 |
23.03.2017 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10392-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2017_10fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10392-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI_cible2017_10en.pdf.pdf |
manufacturer |
Palo Alto Networks, Inc. |
ST INCARD S.r.I |
manufacturer_web |
https://www.paloaltonetworks.com/ |
https://www.incard.it/ |
security_level |
ATE_DPT.3, EAL4+, ALC_FLR.2 |
ALC_DVS.2, EAL5+, AVA_VAN.5 |
dgst |
bdc993babbbfb13c |
ea24eb45efa02e52 |
heuristics/cert_id |
CCEVS-VR-VID-10392-2013 |
ANSSI-CC-2017/10 |
heuristics/cert_lab |
US |
SERMA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_CMC.4, ADV_IMP.1, ATE_COV.2, ALC_TAT.1, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ADV_TDS.4, ALC_FLR.2, ALC_DVS.1, ATE_IND.2 |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ALC_TAT.2, ADV_TDS.4, ASE_REQ.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
3.1.2, 4.0.12 |
1.1.4 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2017/23 |
heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2015/59 |
heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2017/23, BSI-DSZ-CC-1037-2018 |
heuristics/report_references/indirectly_referencing |
{} |
ANSSI-CC-2015/59 |
heuristics/scheme_data |
- category: Firewall
- certification_date: 11.04.2013
- evaluation_facility: Leidos Common Criteria Testing Laboratory
- expiration_date: 11.04.2015
- id: CCEVS-VR-VID10392
- product: Palo Alto Networks PA-500, PA-2000 Series, PA-4000 Series, and PA-5000 Series Next-Generation Firewall with PAN-OS 4.0.12-h2 and User Identification Agent v3.1.2
- scheme: US
- url: https://www.niap-ccevs.org/product/10392
- vendor: Palo Alto Networks, Inc.
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
ANSSI-CC-2015/59 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
ANSSI-CC-2015/59 |
heuristics/protection_profiles |
{} |
090c1a53c73889d8 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-profil_PP-2010-07en.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
st_vid10392-vr.pdf |
ANSSI-CC-2017_10fr.pdf |
pdf_data/report_frontpage |
- FR:
- US:
- cert_id: CCEVS-VR-VID10392-2013
- cert_item: Palo Alto Networks PA-500, PA-2000 Series, PA-4000 Series, and PA-5000 Series Next-Generation Firewall running PAN-OS 4.0.12-h2
- cert_lab: US NIAP
|
- FR:
- cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 4
- cert_id: ANSSI-CC-2017/10
- cert_item: Plate-forme STSafe-J, en configuration fermée, version 1.1.4, sur le composant ST31H320 A03
- cert_item_version: Version 1.1.4
- cert_lab: Serma Safety & Security 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
- developer: STMicroelectronics S.r.l. Incard Division Z.I Marcianise Sud, 81025 Marcianise, Italie STMicroelectronics 29 Boulevard Romain Rolland, 75669 Paris Cedex 14, France Commanditaire STMicroelectronics S.r.l. Incard Division Z.I Marcianise Sud, 81025 Marcianise, Italie
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: Java Card Protection profile – Closed Configuration Version 3.0, ANSSI-CC-PP-2010/07-M01
- US:
|
pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10392-2013: 1
|
- FR:
- ANSSI-CC-2015/59: 2
- ANSSI-CC-2015/59-M01: 2
- ANSSI-CC-2015/59-S01: 2
- ANSSI-CC-2017/10: 17
- ANSSI-CC-PP-2010/07-M01: 2
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- ANSSI:
- ANSSI-CC-PP-: 1
- ANSSI-CC-PP-2010/07-M01: 2
- BSI:
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 4: 3
- EAL 4 augmented: 3
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 1
- EAL2: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.2: 5
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT: 1
- ATE_DPT.3: 4
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_TDS: 1
- ADV_TDS.5: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_FLR: 2
- ALC_FLR.1: 1
- ALC_TAT: 1
- ALC_TAT.3: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_FUN.2: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- Serma:
- Serma Safety & Security: 3
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCIMB-2006-09-001: 1
- CCIMB-2007-09-002: 1
- CCIMB-2007-09-003: 1
- CCIMB-2007-09-004: 1
- FIPS:
- NIST:
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: SAIC
- /CreationDate: D:20130514115641
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20130514115641
- /Producer: Microsoft® Office Word 2007
- /Subject: Validation Report
- /Title: Palo Alto Networks Inc. PA-Series Next Generation Firewall
- pdf_file_size_bytes: 483560
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 28
|
- /Author:
- /CreationDate:
- /Creator: PDFCreator Version 1.2.1
- /Keywords:
- /ModDate:
- /Producer: GPL Ghostscript 9.02
- /Subject:
- /Title: ANSSI-CC-2017_10fr
- pdf_file_size_bytes: 760577
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 16
|
pdf_data/st_filename |
st_vid10392-st.pdf |
ANSSI_cible2017_10en.pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- FR:
- ANSSI-CC-2015/59: 1
- ANSSI-CC-2015/59-M01: 1
- ANSSI-CC-2015/59-S01: 1
- ANSSI-CC-PP-2010/07-M01: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- ANSSI:
- ANSSI-CC-PP-2010/07-M01: 1
- BSI:
- BSI-CC-PP-0055: 2
- BSI-CC-PP-0084-2014: 1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 4: 1
- EAL4: 3
- EAL4 augmented: 3
|
- EAL:
- EAL4+: 1
- EAL5: 12
- EAL5 augmented: 2
- EAL5+: 3
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 10
- ADV_FSP: 1
- ADV_FSP.4: 11
- ADV_FSP.5: 1
- ADV_IMP: 1
- ADV_IMP.1: 7
- ADV_INT.1: 1
- ADV_TDS: 1
- ADV_TDS.3: 15
- ADV_TDS.4: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 10
- AGD_PRE: 1
- AGD_PRE.1: 6
- ALC:
- ALC_CMC: 1
- ALC_CMC.4: 15
- ALC_CMS: 1
- ALC_CMS.4: 6
- ALC_DEL: 1
- ALC_DEL.1: 5
- ALC_DVS: 1
- ALC_DVS.1: 5
- ALC_FLR: 1
- ALC_FLR.2: 16
- ALC_LCD: 1
- ALC_LCD.1: 6
- ALC_TAT: 1
- ALC_TAT.1: 7
- ATE:
- ATE_COV: 1
- ATE_COV.2: 5
- ATE_DPT: 1
- ATE_DPT.3: 9
- ATE_FUN: 1
- ATE_FUN.1: 8
- ATE_IND: 1
- ATE_IND.2: 7
- AVA:
|
- ADV:
- ADV_ARC.1: 7
- ADV_FSP.1: 4
- ADV_FSP.2: 2
- ADV_FSP.4: 1
- ADV_FSP.5: 9
- ADV_IMP.1: 10
- ADV_INT.2: 2
- ADV_TDS.1: 2
- ADV_TDS.3: 4
- ADV_TDS.4: 9
- AGD:
- AGD_OPE.1: 7
- AGD_PRE.1: 7
- ALC:
- ALC_CMC.4: 2
- ALC_CMS.1: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 2
- ALC_DVS.1: 3
- ALC_DVS.2: 9
- ALC_LCD.1: 4
- ALC_TAT.1: 2
- ALC_TAT.2: 4
- ASE:
- ASE_CCL: 2
- ASE_CCL.1: 2
- ASE_ECD: 2
- ASE_ECD.1: 5
- ASE_INT.1: 6
- ASE_OBJ: 2
- ASE_OBJ.2: 4
- ASE_REQ: 2
- ASE_REQ.1: 2
- ASE_REQ.2: 3
- ASE_SPD: 2
- ASE_SPD.1: 3
- ASE_TSS: 2
- ASE_TSS.1: 2
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 4
- ATE_DPT.1: 1
- ATE_DPT.3: 2
- ATE_FUN.1: 7
- ATE_IND.2: 1
- AVA:
- AVA_VAN.4: 1
- AVA_VAN.5: 9
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_ARP: 2
- FAU_ARP.1: 4
- FAU_ARP.1.1: 1
- FAU_GEN: 10
- FAU_GEN.1: 4
- FAU_GEN.2: 1
- FAU_SAA: 7
- FAU_SAA.1: 2
- FAU_SAR: 4
- FAU_SAR.1: 3
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 4
- FAU_SAR.2.1: 1
- FAU_SAR.3: 3
- FAU_SAR.3.1: 1
- FAU_SEL: 5
- FAU_SEL.1: 2
- FAU_STG: 10
- FAU_STG.1: 4
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 4
- FAU_STG.3.1: 1
- FCS:
- FCS_CKM: 2
- FCS_CKM.1: 9
- FCS_CKM.1.1: 2
- FCS_CKM.2: 3
- FCS_CKM.2.1: 1
- FCS_CKM.4: 5
- FCS_CKM.4.1: 1
- FCS_CKM_EXT: 1
- FCS_CKM_EXT.2: 1
- FCS_COP: 1
- FCS_COP.1: 27
- FCS_COP.1.1: 6
- FCS_COP_EXT.1: 1
- FDP:
- FDP_IFC.1: 19
- FDP_IFC.1.1: 3
- FDP_IFF.1: 21
- FDP_IFF.1.1: 3
- FDP_IFF.1.2: 5
- FDP_IFF.1.3: 3
- FDP_IFF.1.4: 3
- FDP_IFF.1.5: 3
- FDP_IFF.1.6: 2
- FDP_ITC.1: 2
- FDP_ITC.2: 2
- FDP_RIP: 1
- FDP_RIP.2: 3
- FDP_RIP.2.1: 1
- FIA:
- FIA_AFL: 1
- FIA_AFL.1: 4
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD: 1
- FIA_ATD.1: 4
- FIA_ATD.1.1: 1
- FIA_UAU: 1
- FIA_UAU.1: 5
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID: 1
- FIA_UID.2: 3
- FIA_UID.2.1: 1
- FIA_USB: 1
- FIA_USB.1: 3
- FIA_USB.1.1: 1
- FMT:
- FMT_MOF.1: 25
- FMT_MOF.1.1: 7
- FMT_MSA: 11
- FMT_MSA.1: 5
- FMT_MSA.3: 11
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 24
- FMT_MTD.1.1: 7
- FMT_MTD.2: 10
- FMT_MTD.2.1: 2
- FMT_MTD.2.2: 2
- FMT_REV: 1
- FMT_REV.1: 3
- FMT_REV.1.1: 1
- FMT_REV.1.2: 1
- FMT_SMR: 1
- FMT_SMR.1: 1
- FMT_SMR.2: 3
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 2
- FPT:
- FPT_FLS: 2
- FPT_FLS.1: 7
- FPT_FLS.1.1: 1
- FPT_ITC: 3
- FPT_ITC.1: 5
- FPT_ITC.1.1: 1
- FPT_ITT: 2
- FPT_ITT.1: 6
- FPT_ITT.1.1: 1
- FPT_RCV: 1
- FPT_RCV.1: 3
- FPT_RCV.1.1: 1
- FPT_RPL: 1
- FPT_RPL.1: 3
- FPT_RPL.1.1: 1
- FPT_RPL.1.2: 1
- FPT_STM: 1
- FPT_STM.1: 6
- FPT_STM.1.1: 1
- FPT_TST.1: 10
- FPT_TST.1.1: 2
- FPT_TST.1.2: 2
- FPT_TST.1.3: 2
- FRU:
- FRU_FLT: 2
- FRU_FLT.1: 6
- FRU_FLT.1.1: 1
- FRU_RSA.1: 11
- FRU_RSA.1.1: 2
- FTA:
- FTA_SSL: 4
- FTA_SSL.1: 1
- FTA_SSL.2: 4
- FTA_SSL.2.1: 1
- FTA_SSL.2.2: 1
- FTA_SSL.3: 5
- FTA_SSL.3.1: 1
- FTA_TAB: 1
- FTA_TAB.1: 4
- FTA_TAB.1.1: 1
- FTA_TSE: 1
- FTA_TSE.1: 3
- FTA_TSE.1.1: 1
- FTP:
- FTP_ITC.1: 8
- FTP_ITC.1.1: 2
- FTP_ITC.1.2: 2
- FTP_ITC.1.3: 2
- FTP_TRP.1: 8
- FTP_TRP.1.1: 2
- FTP_TRP.1.2: 2
- FTP_TRP.1.3: 2
|
- FAU:
- FAU_ARP: 5
- FAU_ARP.1: 3
- FAU_SAA.1: 2
- FAU_SAS.1: 1
- FCS:
- FCS_CKM: 3
- FCS_CKM.1: 4
- FCS_CKM.2: 2
- FCS_CKM.3: 2
- FCS_CKM.4: 2
- FCS_COP: 12
- FCS_COP.1: 4
- FCS_RNG: 6
- FCS_RNG.1: 6
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FDP:
- FDP_ACC: 10
- FDP_ACF: 9
- FDP_ACF.1: 3
- FDP_IFC: 3
- FDP_IFC.1: 7
- FDP_IFF: 3
- FDP_IFF.1: 5
- FDP_ITC: 1
- FDP_ITT.1: 4
- FDP_RIP: 31
- FDP_RIP.1: 3
- FDP_ROL: 10
- FDP_ROL.1: 3
- FDP_SDC: 4
- FDP_SDC.1: 8
- FDP_SDC.1.1: 1
- FDP_SDI: 3
- FDP_SDI.2: 2
- FIA:
- FIA_ATD: 2
- FIA_UID: 3
- FIA_USB: 2
- FMT:
- FMT_LIM: 14
- FMT_LIM.1: 10
- FMT_LIM.1.1: 1
- FMT_LIM.2: 10
- FMT_LIM.2.1: 1
- FMT_MSA: 20
- FMT_MSA.1: 1
- FMT_MSA.2: 2
- FMT_MSA.3: 3
- FMT_MTD: 6
- FMT_SMF: 2
- FMT_SMF.1: 6
- FMT_SMR: 2
- FMT_SMR.1: 3
- FPR:
- FPT:
- FPT_FLS: 9
- FPT_FLS.1: 6
- FPT_ITT.1: 2
- FPT_PHP.3: 2
- FPT_TDC.1: 1
- FPT_TST.1: 2
- FRU:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.NO_GENERAL_PURPOSE: 1
- A.NO_TOE_BYPASS: 1
- A.PHYSICAL: 1
- A.UIA_ONLY: 1
- O:
- O.ADMIN_ROLE: 1
- O.AUDIT_GENERATION: 1
- O.AUDIT_PROTECTION: 1
- O.AUDIT_REVIEW: 1
- O.CHANGE_MANAGEMENT: 1
- O.CORRECT_: 1
- O.CRYPTOGRAPHIC_: 1
- O.CRYPTOGRAPHY_: 1
- O.DISPLAY_BANNER: 1
- O.DOCUMENT_KEY_LEAKAGE: 1
- O.MAINT_MODE: 2
- O.MANAGE: 2
- O.MEDIATE: 4
- O.REPLAY_DETECTION: 1
- O.RESIDUAL_INFORMATION: 1
- O.RESOURCE_SHARING: 1
- O.ROBUST_ADMIN_GUIDANCE: 1
- O.ROBUST_TOE_ACCESS: 1
- O.SELF_PROTECTION: 2
- O.SOUND_IMPLEMENTATION: 1
- O.THOROUGH_FUNCTIONAL_: 1
- O.TIME_STAMPS: 1
- O.TRUSTED_PATH: 1
- O.VULNERABILITY_ANALYSIS_TEST: 1
- OE:
- OE.CRYPTANALYTIC: 1
- OE.NO_GENERAL_PURPOSE: 1
- OE.NO_TOE_BYPASS: 1
- OE.PHYSICAL: 1
- OE.UIA_ONLY: 1
- T:
- T.ADDRESS_MASQUERADE: 1
- T.ADMIN_ERROR: 1
- T.ADMIN_ROGUE: 1
- T.AUDIT_COMPROMISE: 1
- T.CRYPTO_COMPROMISE: 1
- T.FLAWED_DESIGN: 1
- T.FLAWED_IMPLEMENTATION: 1
- T.MALICIOUS_TSF_: 1
- T.MASQUERADE: 1
- T.POOR_TEST: 1
- T.REPLAY: 1
- T.RESIDUAL_DATA: 1
- T.RESOURCE_EXHAUSTION: 1
- T.SPOOFING: 1
- T.UNATTENDED_SESSION: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNIDENTIFIED_ACTIONS: 1
- T.UNKNOWN_STATE: 1
|
- A:
- A.NO-DELETION: 5
- A.NO-INSTALL: 5
- A.VERIFICATION: 4
- A.XXX: 1
- D:
- D.API_DATA: 3
- D.APP_CODE: 6
- D.APP_C_DATA: 3
- D.APP_I_DATA: 4
- D.CRYPTO: 6
- D.EMBEDDED_SW_CODE: 4
- D.EMBEDDED_SW_DATA: 4
- D.GP_CODE: 3
- D.GP_SENSITIVE_DATA: 3
- D.JCS_CODE: 4
- D.JCS_DATA: 6
- D.PIN: 9
- D.SEC_DATA: 5
- O:
- O.ALARM: 21
- O.APPLET: 1
- O.CIPHER: 45
- O.FIREWALL: 26
- O.GLOBAL_ARRAYS_CONFID: 10
- O.GLOBAL_ARRAYS_INTEG: 8
- O.GP_REGISTRY: 10
- O.JAVA: 3
- O.JAVAOB: 2
- O.JAVAOBJECT: 20
- O.KEY-MNGT: 11
- O.LIFE_CYCLE: 13
- O.NATIVE: 12
- O.OBJ-DELETION: 8
- O.OPERATE: 33
- O.PIN-MNGT: 16
- O.PIN_MNGT: 1
- O.REALLOCATION: 13
- O.RESOURCES: 9
- O.RND: 1
- O.ROLES: 6
- O.SCP: 70
- O.SID: 25
- O.SIDE_CHANNEL: 10
- O.TRANSACTION: 11
- OE:
- OE.CARD-MANAGEMENT: 12
- OE.CARD_MANAGEMENT: 17
- OE.CODE-: 1
- OE.CODE-EVIDENCE: 17
- OE.MANAGEMENT_OF_SECRETS: 3
- OE.NO-DELETION: 6
- OE.NO-INSTALL: 5
- OE.SCP: 3
- OE.VERIFICATION: 33
- OP:
- OP.ARRAY_ACCESS: 4
- OP.CARD_LOCK: 4
- OP.CARD_TERMINATE: 4
- OP.CREATE: 7
- OP.GET_CARD_LIFE_CYCLE_: 1
- OP.GET_CARD_LIFE_CYCLE_STATE: 2
- OP.INSTANCE_FIELD: 4
- OP.INVK_INTERFACE: 7
- OP.INVK_VIRTUAL: 6
- OP.JAVA: 5
- OP.MANAGE_APP_LIFE_CYC: 1
- OP.MANAGE_APP_LIFE_CYCLE_STATE: 3
- OP.PUT: 6
- OP.THROW: 5
- OP.TYPE_ACCESS: 5
- OSP:
- OSP.CARD_ADMINISTRATION_DISABLED: 5
- OSP.MANAGEMENT_OF_SECRETS: 6
- OSP.ROLES: 5
- OSP.VERIFICATION: 5
- R:
- T:
- T.CONFID-APPLI-DATA: 17
- T.CONFID-JCS-CODE: 6
- T.CONFID-JCS-DATA: 11
- T.EXE-CODE: 9
- T.INTEG-: 1
- T.INTEG-APPLI-CODE: 12
- T.INTEG-APPLI-DATA: 23
- T.INTEG-JCS-CODE: 7
- T.INTEG-JCS-DATA: 11
- T.LEAKAGE: 1
- T.LIFE_CYCLE: 7
- T.NATIVE: 4
- T.OBJ-DELETION: 4
- T.PHYSICAL: 9
- T.RESOURCES: 7
- T.SID: 16
|
pdf_data/st_keywords/vendor |
|
- STMicroelectronics:
- STM: 13
- STMicroelectronics: 6
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
- AES_competition:
- DES:
- 3DES:
- 3-DES: 2
- Triple-DES: 1
- TripleDES: 1
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-2: 1
- SHA-256: 1
- SHA-384: 2
- SHA-512: 2
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-256: 2
- SHA-512: 2
- SHA224: 2
- SHA256: 2
- SHA384: 3
- SHA512: 2
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IKE:
- IPsec:
- SSH:
- TLS:
- SSL:
- TLS:
- TLS: 3
- TLS 1.2: 1
- TLS v1.0: 3
- TLSv1.0: 1
- VPN:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_RSA_WITH_AES_256_CBC_SHA: 1
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 1
- malfunction: 2
- physical tampering: 1
- SCA:
- DPA: 3
- Leak-Inherent: 1
- SPA: 1
- physical probing: 4
- side channel: 1
- timing attacks: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2007-09-002: 1
- CCMB-2007-09-003: 1
- FIPS:
- FIPS 140-2: 12
- FIPS 180-3: 1
- FIPS PUB 140-2: 7
- FIPS140-2: 1
- NIST:
- RFC:
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- FIPS:
- PKCS:
- SCP:
|
pdf_data/st_keywords/javacard_version |
|
- GlobalPlatform:
- JavaCard:
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
- java:
- javacard:
- javacard.framework: 4
- javacard.framework.applet: 1
- javacard.security: 23
- javacard.security.interface: 4
- javacardx:
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
- application being loaded pre-issuance is out of scope of current evaluation. 4.1.2.2 Java Card Platform The Java technology, embedded on the TOE: 1
- interface for the secure management of applications on the smart card. The Card Manager is out of scope of current evaluation and its administrative interface is permanently disabled before TOE delivery: 1
- of the TOE to the parties responsible of the following usage phases. Application development is out of scope of current evaluation. TOE Construction phase includes: • Product Development • Product: 1
- out of scope: 4
|
pdf_data/st_metadata |
|
- /Author: daniela terracciano
- /CreationDate: D:20170127111137+01'00'
- /Creator: PDFCreator 2.0.0.0
- /Keywords:
- /ModDate: D:20170127111137+01'00'
- /Producer: PDFCreator 2.0.0.0
- /Subject:
- /Title: STSafe-J_SecurityTarget_Lite_A
- pdf_file_size_bytes: 692327
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 95
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |