name |
IDeal Citiz v2.1 STC Open Platform |
HP StorageWorks P9000 Command View Advanced Edition Software Common Component Version: 7.0.1-00 |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
Access Control Devices and Systems |
scheme |
FR |
JP |
status |
archived |
archived |
not_valid_after |
07.03.2023 |
01.09.2016 |
not_valid_before |
07.03.2018 |
15.08.2011 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018_01fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0305_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible2018_01en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0305_est.pdf |
manufacturer |
Idemia |
Hewlett-Packard Company |
manufacturer_web |
https://www.idemia.com |
https://www.hp.com |
security_level |
EAL5+, ALC_DVS.2, AVA_VAN.5 |
ALC_FLR.1, EAL2+ |
dgst |
c0a9309944259cd3 |
c63773cb15a5150c |
heuristics/cert_id |
ANSSI-CC-2018/01 |
JISEC-CC-CRP-C0305 |
heuristics/cert_lab |
CEA |
[] |
heuristics/cpe_matches |
{} |
cpe:2.3:a:hp:p9000_command_view_advanced_edition_software:-:*:*:*:*:*:*:*, cpe:2.3:h:hp:9000:-:*:*:*:*:*:*:* |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
CVE-2010-4107, CVE-2016-2003 |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
AGD_OPE.1, ATE_COV.2, AVA_VAN.5, ATE_DPT.3, ALC_CMS.5, ASE_ECD.1, ALC_LCD.1, ALC_TAT.2, ASE_TSS.1, ADV_IMP.1, ASE_REQ.2, ALC_DVS.2, ASE_SPD.1, ATE_FUN.1, ADV_ARC.1, ALC_DEL.1, ASE_OBJ.2, ALC_CMC.4, ASE_INT.1, ADV_INT.2, AGD_PRE.1, ADV_FSP.5, ASE_CCL.1, ADV_TDS.4 |
AGD_OPE.1, ATE_COV.1, ALC_FLR.1, ATE_IND.2, ASE_ECD.1, ASE_TSS.1, ADV_TDS.1, ASE_REQ.2, ALC_CMC.2, ASE_SPD.1, ALC_CMS.2, ATE_FUN.1, ADV_ARC.1, ALC_DEL.1, AVA_VAN.2, ASE_OBJ.2, ASE_INT.1, ADV_FSP.2, AGD_PRE.1, ASE_CCL.1 |
heuristics/extracted_versions |
2.1 |
7.0.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
- cert_id: JISEC-CC-CRP-C0305
- certification_date: 01.08.2011
- claim: EAL2+ ALC_FLR.1
- enhanced:
- assurance_level: EAL2 Augmented with ALC_FLR.1
- cc_version: 3.1
- cert_link: https://www.ipa.go.jp/en/security/c0305_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE TOE is a module that provides common functionality for storage management software that manages storage devices connected via a SAN environment. The following are examples of storage management software: HP StorageWorks P9000 Device Manager Software, HP StorageWorks P9000 Replication Manager Software, HP StorageWorks P9000 Tiered Storage Manager Software, and HP StorageWorks P9000 Tuning Manager Software. These products, in combination with TOE, are commonly referred to as HP StorageWorks P9000 Command View Advanced Edition Software. TOE is a foundational module for HP StorageWorks P9000 Command View Advanced Edition Software, and is packaged with all products. TOE security functions TOE provides the following security functionality: - Identification/authentication functionality (External authentication functionality provided by external authentication servers, or the use of linkage functionality for external authentication groups) - Security management functionality (Functionality that manages TOE user account information, and allows the user to set security parameters) - Warning banner functionality
- evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
- product: HP StorageWorks P9000 Command View Advanced Edition Software Common Component
- product_type: Foundational Module Software
- report_link: https://www.ipa.go.jp/en/security/c0305_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0305_est.pdf
- toe_version: 7.0.1-00
- vendor: Hewlett-Packard Company
- expiration_date: 01.09.2016
- supplier: Hewlett-Packard Company
- toe_japan_name: -----
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0305_it0331.html
- toe_overseas_name: HP StorageWorks P9000 Command View Advanced Edition Software Common Component 7.0.1-00
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
85bef5b6f16c4d33 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-cible_PP-2010-03en.pdf |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
anssi-cc-2018_01fr.pdf |
c0305_erpt.pdf |
pdf_data/report_frontpage |
- FR:
- cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 4
- cert_id: ANSSI-CC-2018/01
- cert_item: IDeal Citiz v2.1 STC Open Platform
- cert_item_version: OFFICIEL_IDealCitiz_SCR400L_2_1_0_0_04
- cert_lab: CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France
- developer: IDEMIA (ex SAFRAN I&S) 18 Chaussée Jules César, 95520 Osny, France Starchip SAS ArteParc Bat. E, Route de la Côte d’Azur, 13590 Meyreuil, France Commanditaire IDEMIA 420 rue d’Estienne d’Orves, 92700 Colombes, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: Java Card Protection Profile – Open Configuration Version 3.0, ANSSI-CC-PP-2010/03-M01
|
|
pdf_data/report_keywords/cc_cert_id |
- FR:
- ANSSI-CC-2017/14: 1
- ANSSI-CC-2018/01: 14
- ANSSI-CC-PP-2010/03-M01: 1
|
- JP:
- CRP-C0305-01: 1
- Certification No. C0305: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
- ANSSI:
- ANSSI-CC-PP-: 1
- ANSSI-CC-PP-2010/03-M01: 1
- BSI:
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 1
- EAL2: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
- EAL:
- EAL2: 4
- EAL2 augmented: 1
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
- ALC:
- ALC_FLR.1: 3
- ALC_FLR.2: 1
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
- A:
- A.ADMINISTRATORS: 1
- A.CLIENTS: 1
- A.NETWORKS: 1
- A.PASSWORD: 1
- A.PHYSICAL: 1
- A.SECURE_CHANNEL: 1
- A.SRV_MGMT: 1
- A.VERSION: 1
- T:
- T.ILLEGAL_ACCESS: 2
- T.UNAUTHORISED_ACCESS: 2
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
|
- CC:
- CCMB-2009-07-001: 2
- CCMB-2009-07-002: 2
- CCMB-2009-07-003: 2
- CCMB-2009-07-004: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Category: OFFICIEL_IDealCitiz_SCR400L_2_1_0_0_04
- /Comments: IDEMIA
- /Company: SGDSN/ANSSI
- /CreationDate: D:20180309161642+01'00'
- /Creator: Acrobat PDFMaker 11 pour Word
- /Keywords: ANSSI-CC-CER-F-07.026
- /ModDate: D:20180313143725+01'00'
- /Producer: Adobe PDF Library 11.0
- /SourceModified: D:20180309151637
- /Subject:
- /Title:
- pdf_file_size_bytes: 247017
- pdf_hyperlinks: mailto:[email protected], http://www.ssi.gouv.fr/
- pdf_is_encrypted: False
- pdf_number_of_pages: 13
|
- /Author: IPA/JISEC
- /Company: IPA
- /CreationDate: D:20110927171053+09'00'
- /Creator: Word 用 Acrobat PDFMaker 8.1
- /Manager: IPA
- /ModDate: D:20110928093233+09'00'
- /Producer: Acrobat Distiller 8.3.0 (Windows)
- /Title: CRP-e
- pdf_file_size_bytes: 347111
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 36
|
pdf_data/st_filename |
anssi-cible2018_01en.pdf |
c0305_est.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
- FR:
- ANSSI-CC-2017/14: 2
- ANSSI-CC-PP-2010/03-M01: 1
|
|
pdf_data/st_keywords/cc_protection_profile_id |
- ANSSI:
- ANSSI-CC-PP-2010/03-M01: 1
- BSI:
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL5: 9
- EAL5 augmented: 7
|
- EAL:
- EAL2: 7
- EAL2 augmented: 3
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 5
- ADV_FSP.1: 3
- ADV_FSP.2: 2
- ADV_FSP.4: 1
- ADV_FSP.5: 8
- ADV_IMP.1: 8
- ADV_INT.2: 1
- ADV_TDS.1: 2
- ADV_TDS.3: 3
- ADV_TDS.4: 8
- AGD:
- AGD_OPE: 2
- AGD_OPE.1: 9
- AGD_PRE: 3
- AGD_PRE.1: 5
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.1: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 2
- ALC_DVS.2: 11
- ALC_LCD.1: 3
- ALC_TAT.1: 2
- ALC_TAT.2: 3
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 4
- ASE_INT.1: 5
- ASE_OBJ.2: 3
- ASE_REQ.1: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 3
- ATE_DPT.1: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 6
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.1: 6
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_ARP: 1
- FAU_ARP.1: 21
- FAU_ARP.1.1: 1
- FAU_SAA.1: 3
- FAU_SAS.1: 1
- FCO:
- FCS:
- FCS_CKM: 32
- FCS_CKM.1: 24
- FCS_CKM.1.1: 1
- FCS_CKM.2: 12
- FCS_CKM.2.1: 2
- FCS_CKM.3: 11
- FCS_CKM.3.1: 2
- FCS_CKM.4: 23
- FCS_CKM.4.1: 1
- FCS_COP: 18
- FCS_COP.1: 17
- FCS_COP.1.1: 1
- FCS_RNG.1: 1
- FDP:
- FDP_ACC: 46
- FDP_ACC.1: 14
- FDP_ACC.2: 5
- FDP_ACF: 46
- FDP_ACF.1: 17
- FDP_IFC: 31
- FDP_IFC.1: 13
- FDP_IFC.2: 2
- FDP_IFF: 26
- FDP_IFF.1: 13
- FDP_IFF.1.2: 1
- FDP_ITC: 16
- FDP_ITC.1: 7
- FDP_ITC.2: 12
- FDP_ITT.1: 1
- FDP_RIP: 142
- FDP_RIP.1: 10
- FDP_ROL: 17
- FDP_ROL.1: 2
- FDP_SDC.1: 1
- FDP_SDI: 1
- FDP_SDI.2: 17
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UIT: 9
- FDP_UIT.1: 2
- FIA:
- FIA_ATD: 12
- FIA_ATD.1: 2
- FIA_UID: 23
- FIA_UID.1: 9
- FIA_UID.2: 1
- FIA_USB: 11
- FIA_USB.1: 3
- FMT:
- FMT_LIM.1: 1
- FMT_LIM.2: 1
- FMT_MSA: 146
- FMT_MSA.1: 12
- FMT_MSA.2: 1
- FMT_MSA.3: 16
- FMT_MTD: 28
- FMT_MTD.1: 2
- FMT_MTD.3: 1
- FMT_SMF: 32
- FMT_SMF.1: 23
- FMT_SMF.1.1: 1
- FMT_SMR: 43
- FMT_SMR.1: 34
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNO: 1
- FPR_UNO.1: 17
- FPR_UNO.1.1: 1
- FPT:
- FPT_FLS: 63
- FPT_FLS.1: 22
- FPT_FLS.1.1: 1
- FPT_ITT.1: 1
- FPT_PHP: 15
- FPT_PHP.3: 2
- FPT_RCV: 42
- FPT_RCV.3: 8
- FPT_RCV.4: 1
- FPT_TDC: 1
- FPT_TDC.1: 10
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FRU:
- FTP:
- FTP_ITC: 21
- FTP_ITC.1: 8
- FTP_TRP.1: 2
|
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 15
- FDP_ACC.1.1: 1
- FDP_ACF: 1
- FDP_ACF.1: 12
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FIA:
- FIA_AFL: 1
- FIA_AFL.1: 7
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 10
- FIA_ATD.1.1: 1
- FIA_SOS: 1
- FIA_SOS.1: 8
- FIA_SOS.1.1: 1
- FIA_UAU.1: 11
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID: 1
- FIA_UID.1: 11
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB: 1
- FIA_USB.1: 7
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA: 2
- FMT_MSA.1: 10
- FMT_MSA.1.1: 1
- FMT_MSA.3: 9
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 1
- FMT_MTD.1: 10
- FMT_MTD.1.1: 1
- FMT_SMF: 1
- FMT_SMF.1: 11
- FMT_SMF.1.1: 1
- FMT_SMR: 1
- FMT_SMR.1: 13
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FTA:
- FTA_TAB: 1
- FTA_TAB.1: 8
- FTA_TAB.1.1: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.APPLET: 5
- A.DELETION: 1
- A.PRODUCTION: 5
- A.VERIFICATION: 5
- D:
- D.API_DATA: 4
- D.APP_CODE: 7
- D.APP_C_DATA: 5
- D.APP_I_DATA: 6
- D.BIO: 4
- D.COMMAND: 2
- D.CRYPTO: 4
- D.GP_CODE: 2
- D.ISD_KEYS: 4
- D.JCS_CODE: 3
- D.JCS_DATA: 5
- D.PIN: 4
- D.SD_KEYS: 2
- D.SEC_DATA: 7
- O:
- O.ALARM: 23
- O.APPLET: 16
- O.BIO-: 6
- O.BIO-MNGT: 17
- O.CARD-: 7
- O.CARD-MANAGEMENT: 33
- O.CARD_LC: 4
- O.CIPHER: 20
- O.CODE_PKG: 14
- O.DELETION: 14
- O.FIREWALL: 44
- O.GLOBAL_ARRAYS_: 2
- O.GLOBAL_ARRAYS_CONFID: 12
- O.GLOBAL_ARRAYS_INTEG: 10
- O.INSTALL: 15
- O.JAVAOBJECT: 31
- O.KEY-: 11
- O.KEY-MNGT: 18
- O.LOAD: 17
- O.NATIVE: 14
- O.OBJ-DELETION: 9
- O.OPERATE: 36
- O.PIN-MNGT: 23
- O.REALLOCATION: 18
- O.REMOTE: 1
- O.RESOURCES: 23
- O.RND: 1
- O.SCP: 60
- O.SID: 34
- O.TRANSACTION: 19
- OE:
- OE.APPLET: 10
- OE.CARD-MANAGEMENT: 2
- OE.CODE-: 5
- OE.CODE-EVIDENCE: 15
- OE.KEY_GENERATION: 6
- OE.PRODUCTION: 6
- OE.QUOTAS: 5
- OE.SCP: 3
- OE.SECURITY-DOMAINS: 7
- OE.SHARE-CONTROL: 9
- OE.VERIFICATION: 39
- OP:
- OP.ARRAY_ACCESS: 4
- OP.CREATE: 6
- OP.DELETE_APPLET: 4
- OP.DELETE_PCKG: 3
- OP.DELETE_PCKG_APPLET: 3
- OP.INSTANCE_FIELD: 4
- OP.INVK_INTERFACE: 7
- OP.INVK_VIRTUAL: 6
- OP.JAVA: 5
- OP.PUT: 4
- OP.SET_CARD_STATE: 2
- OP.THROW: 5
- OP.TYPE_ACCESS: 5
- OSP:
- OSP.KEY_GENERATION: 6
- OSP.QUOTAS: 6
- OSP.SECURITY_DOMAINS: 6
- OSP.SHARE-CONTROL: 6
- OSP.VERIFICATION: 5
- R:
- T:
- T.APP_DATA_INTEGRITY: 20
- T.CONFID-: 1
- T.CONFID-APPLI-DATA: 17
- T.CONFID-JCS-: 7
- T.CONFID-JCS-CODE: 4
- T.CONFID-JCS-DATA: 6
- T.DELETION: 5
- T.EXE-: 1
- T.EXE-CODE: 8
- T.EXE-CODE-: 1
- T.INSTALL: 6
- T.INTEG-: 10
- T.INTEG-APPLI-: 11
- T.INTEG-APPLI-CODE: 7
- T.INTEG-APPLI-DATA: 18
- T.INTEG-JCS-: 1
- T.INTEG-JCS-CODE: 5
- T.INTEG-JCS-DATA: 5
- T.LIFE_CYCLE: 5
- T.NATIVE: 6
- T.OBJ-DELETION: 4
- T.PHYSICAL: 4
- T.RESOURCES: 8
- T.RND: 1
- T.SID: 18
- T.UNAUTH_ACCESS: 5
- T.UNAUTH_CARD_MNGT: 5
|
- A:
- A.ADMINISTRATORS: 3
- A.ADMINISTROTORS: 1
- A.CLIENTS: 4
- A.NETWORKS: 3
- A.PASSWORD: 3
- A.PHYSICAL: 4
- A.SECURE_CHANNEL: 3
- A.SRV_MGMT: 3
- A.VERSION: 4
- O:
- O.BANNER: 6
- O.MGMT: 9
- O.PASSWORD: 7
- OE:
- OE.BANNER: 4
- OE.PASSWORD: 4
- OE.SECURE_CHANNEL: 4
- T:
- T.ILLEGAL_ACCESS: 4
- T.UNAUTHORISED_ACCESS: 3
|
pdf_data/st_keywords/vendor |
|
- Microsoft:
- Microsoft: 4
- Microsoft Corporation: 4
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
- MAC:
- CBC-MAC: 2
- CMAC: 4
- HMAC: 2
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-256: 2
- SHA-384: 2
- SHA-512: 2
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 3
- malfunction: 2
- physical tampering: 1
- SCA:
- DPA: 1
- Leak-Inherent: 2
- Physical Probing: 2
- physical probing: 4
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- ICAO:
- ISO:
- ISO/IEC 14443: 4
- ISO/IEC 7816: 2
- ISO/IEC9796: 6
- SCP:
|
|
pdf_data/st_keywords/javacard_version |
- GlobalPlatform:
- JavaCard:
|
|
pdf_data/st_keywords/javacard_api_const |
- ALG:
- EC:
- ALG_EC_SVDP_DH: 1
- ALG_EC_SVDP_DHC: 1
- ALG_EC_SVDP_DHC_KDF: 1
- ALG_EC_SVDP_DHC_PLAIN: 1
- ALG_EC_SVDP_DH_KDF: 1
- ALG_EC_SVDP_DH_PLAIN: 1
- misc:
|
|
pdf_data/st_keywords/javacard_packages |
- com:
- com.morpho.sac: 1
- com.morpho.sm: 1
- javacard:
- javacard.framework: 2
- javacard.security: 6
- javacardx:
- javacardx.biometry: 4
- javacardx.crypto: 1
- javacardx.external: 1
- javacardx.framework: 1
- javacardx.security: 1
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
- out of scope: 1
|
|
pdf_data/st_metadata |
- /CreationDate: D:20171207121815+01'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20180319164206+01'00'
- /Producer: Microsoft® Word 2016
- /Title:
- pdf_file_size_bytes: 1547868
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 108
|
- /Author: Hewlett-Packard Company
- /CreationDate: D:20110926112601
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20110926112601
- /Producer: Microsoft® Office Word 2007
- /Subject: CVAE-ST
- /Title: HP StorageWorks P9000 Command View Advanced Edition Software Common Component Security Target
- pdf_file_size_bytes: 448528
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 57
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |