name |
Microsoft SQL Server 2014 Database Engine Enterprise Edition x64 (English)12.0.2000.8 |
Belkin Secure KVM models F1DN102F-3, F1DN102N-3, F1DN102V-3, F1DN102H-3, F1DN104P-3, F1DN104W-3, F1DN104B-3, F1DN104C-3, F1DN104E-3, F1DN104F-3, F1DN104Q-3, F1DN108C-3, F1DN116C-3, and F1DN108F-3 |
category |
Databases |
Other Devices and Systems |
scheme |
JP |
US |
status |
archived |
archived |
not_valid_after |
01.07.2020 |
31.07.2021 |
not_valid_before |
16.06.2015 |
31.07.2019 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10985-ci.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0475_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10985-vr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0475_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10985-st.pdf |
manufacturer |
Microsoft Corporation |
Belkin International, Inc. |
manufacturer_web |
https://www.microsoft.com |
https://www.belkin.com |
security_level |
EAL2+, ALC_FLR.2 |
{} |
dgst |
c225189611bed8f2 |
e0e32eb81b107ff2 |
heuristics/cert_id |
JISEC-CC-CRP-C0475 |
CCEVS-VR-VID-10985-2019 |
heuristics/cert_lab |
[] |
US |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_CMS.2, ALC_DEL.1, ATE_IND.2, ATE_COV.1, ADV_ARC.1, AVA_VAN.2, ADV_FSP.2, ALC_FLR.2, AGD_PRE.1 |
ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, AGD_PRE.1 |
heuristics/extracted_versions |
12.0.2000.8 |
3 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0475
- certification_date: 01.06.2015
- claim: EAL2+ ALC_FLR.2 PP
- enhanced:
- assurance_level: EAL2 Augmented with ALC_FLR.2
- cc_version: 3.1 Release4
- cert_link: https://www.ipa.go.jp/en/security/c0475_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is the database engine of SQL Server 2014. SQL Server is a Database Management System (DBMS). The TOE has been developed as the core module of the DBMS to store and manage data in a secure way. TOE security functionality This TOE provides the following security functionality: - The Access Control function of the TOE controls the access of users to user data and metadata stored in the TOE. - The Session Handling function of the TOE limits the possibilities of users to establish sessions with the TOE. - The Security Audit function of the TOE produces log files about all security relevant events. - The Security Management function allows authorized administrators to manage the behavior of the security functionality of the TOE. - The Identification and Authentication function of the TOE is able to identify and authenticate users. - The Residual Information Protection function of the TOE overwrites the residual information on the memory that will be used for user sessions.
- evaluation_facility: TÜV Informationstechnik GmbH, Evaluation Body for IT-Security
- product: Microsoft SQL Server 2014 Database Engine Enterprise Edition x64 (English)
- product_type: Database Management System (DBMS)
- protection_profile: U.S. Government Protection Profile for Database Management Systems, Version 1.3
- report_link: https://www.ipa.go.jp/en/security/c0475_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0475_est.pdf
- toe_version: 12.0.2000.8
- vendor: Microsoft Corporation
- expiration_date: 01.07.2020
- supplier: Microsoft Corporation
- toe_japan_name: -----
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0475_it3480.html
- toe_overseas_name: Microsoft SQL Server 2014 Database Engine Enterprise Edition x64 (English)12.0.2000.8
|
- category: Peripheral Switch
- certification_date: 31.07.2019
- evaluation_facility: DXC.technology
- expiration_date: 31.07.2021
- id: CCEVS-VR-VID10985
- product: Belkin Secure KVM models F1DN102F-3, F1DN102N-3, F1DN102V-3, F1DN102H-3, F1DN104P-3, F1DN104W-3, F1DN104B-3, F1DN104C-3, F1DN104E-3, F1DN104F-3, F1DN104Q-3, F1DN108C-3, F1DN116C-3, and F1DN108F-3
- scheme: US
- url: https://www.niap-ccevs.org/product/10985
- vendor: Belkin International, Inc.
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
61018742063aaca9 |
da2e45c9b3fbb700 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_dbms_v1.3.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_pss_v3.0.pdf |
pdf_data/cert_filename |
|
st_vid10985-ci.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- US:
- CCEVS-VR-VID10985-2019: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /CreationDate: D:20190814151428-04'00'
- /ModDate: D:20190814151428-04'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 183414
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
c0475_erpt.pdf |
st_vid10985-vr.pdf |
pdf_data/report_frontpage |
|
- US:
- cert_id: CCEVS-VR-VID10985-2019
- cert_item: Belkin Secure KVM Models F1DN102F-3, F1DN102N-3, F1DN102V-3, F1DN104B-3, F1DN104C-3, F1DN104E-3, F1DN104F-3 F1DN104P-3, F1DN104Q-3, F1DN104W-3 F1DN108C-3, F1DN108F-3, F1DN116C-3
- cert_lab: US NIAP
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0475-01: 1
- Certification No. C0475: 1
|
- US:
- CCEVS-VR-VID10985-2019: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL2: 4
- EAL2 augmented: 3
- EAL2+: 2
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
- FDP:
- FDP_IFF.1: 2
- FDP_IFF.1.5: 1
- FDP_RIP.1.1: 2
- FMT:
|
pdf_data/report_keywords/cc_claims |
- A:
- A.NO_EVIL: 1
- A.NO_GENERAL_: 1
- A.PHYSICAL: 1
- T:
- T.ACCIDENTIAL_ADMIN_ERROR: 1
- T.MASQUERADE: 1
- T.POOR_DESIGN: 1
- T.POOR_IMPLEMENTATION: 1
- T.POOR_TEST: 1
- T.RESIDUAL_DATA: 1
- T.TSF_COMPROMISE: 1
- T.UNAUTHORIZED_: 1
- T.UNIDENTIFIED_: 1
|
- A:
- A.NO_SPECIAL_ANALOG_CAPABILITIES: 1
- A.NO_TEMPEST: 1
- A.PHYSICAL: 1
- A.TRUSTED_ADMIN: 1
- A.TRUSTED_CONFIG: 1
- O:
- O.ANTI_TAMPERING: 1
- O.ANTI_TAMPERING_BACKUP_FAIL: 1
- O.ANTI_TAMPERING_BACKUP_POW: 1
- O.ANTI_TAMPERING_INDICATION: 1
- O.ANTI_TAMPERING_PERMANENTL: 1
- O.AUTHORIZED_SWITCHING: 1
- O.COMPUTER_INTERFACE_ISOLATI: 2
- O.COMPUTER_TO_AUDIO_ISOLATIO: 1
- O.CONTINUOUS_INDICATION: 1
- O.DISABLE_UNAUTHORIZED_ENDP: 1
- O.DISABLE_UNAUTHORIZED_PERIP: 1
- O.DISPLAYPORT_AUX_FILTERING: 1
- O.KEYBOARD_AND_MOUSE_TIED: 1
- O.KEYBOARD_MOUSE_EMULATED: 1
- O.KEYBOARD_MOUSE_UNIDIRECTI: 1
- O.NO_AMBIGUOUS_CONTROL: 1
- O.NO_ANALOG_AUDIO_INPUT: 1
- O.NO_CONNECTED_COMPUTER_CO: 1
- O.NO_DOCKING_PROTOCOLS: 1
- O.NO_OTHER_EXTERNAL_INTERFA: 1
- O.NO_TOE_ACCESS: 1
- O.NO_USER_DATA_RETENTION: 1
- O.PERIPHERAL_PORTS_ISOLATION: 1
- O.PURGE_TOE_KB_DATA_WHILE_S: 1
- O.SELF_TEST: 1
- O.SELF_TEST_FAIL_INDICATION: 1
- O.SELF_TEST_FAIL_TOE_DISABLE: 1
- O.TAMPER_EVIDENT_LABEL: 1
- O.UNIDIRECTIONAL_AUDIO_OUT: 1
- O.UNIDIRECTIONAL_VIDEO: 1
- O.UNIDIRERCTIONAL_EDID: 1
- O.USER_AUTHENTICATION_ADMIN: 1
- O.USER_AUTHENTICATION_ISOLAT: 1
- O.USER_AUTHENTICATION_RESET: 1
- O.USER_AUTHENTICATION_TERMINATION: 1
- O.USER_DATA_ISOLATION: 1
- OE:
- OE.PHYSICAL: 1
- OE.TRUSTED_ADMIN: 1
- T:
- T.AUDIO_REVERSED: 1
- T.AUTHORIZED_BUT_UNTRUSTED_DEVICES: 1
- T.DATA_LEAK: 1
- T.FAILED: 1
- T.LOGICAL_TAMPER: 1
- T.MICROPHONE_USE: 1
- T.PHYSICAL_TAMPER: 1
- T.REPLACEMENT: 1
- T.RESIDUAL_LEAK: 1
- T.SIGNAL_LEAK: 1
- T.UNAUTHORIZED_DEVICES: 1
- T.UNINTENDED_SWITCHING: 1
|
pdf_data/report_keywords/vendor |
- Microsoft:
- Microsoft: 20
- Microsoft Corporation: 7
|
|
pdf_data/report_keywords/eval_facility |
- TUV:
- TÜV Informationstechnik: 4
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- CCMB-2012-09-004: 2
|
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- CCMB-2012-09-004: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20150724094408+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20150724094442+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 233021
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 31
|
|
pdf_data/st_filename |
c0475_est.pdf |
st_vid10985-st.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 2: 3
- EAL 2 augmented: 1
- EAL2: 2
- EAL2 augmented: 2
- EAL2+: 51
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 2
- ADV_FSP.2: 1
- AGD:
- ALC:
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR: 1
- ALC_FLR.2: 4
- ATE:
- ATE_COV.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ATE:
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 10
- FAU_GEN.1: 3
- FAU_GEN.2: 8
- FAU_GEN.2.1: 1
- FAU_SEL: 8
- FAU_SEL.1: 2
- FAU_STG: 3
- FAU_STG.1: 2
- FAU_STG.3: 1
- FAU_STG.4: 1
- FAU_STG_EXP: 2
- FAU_STG_EXP.5: 15
- FAU_STG_EXP.5.1: 2
- FDP:
- FDP_ACC.1: 10
- FDP_ACC.1.1: 1
- FDP_ACF: 8
- FDP_ACF.1: 6
- FDP_IFC.1: 1
- FDP_RIP.1: 6
- FDP_RIP.1.1: 1
- FIA:
- FIA_ATD.1: 10
- FIA_ATD.1.1: 2
- FIA_UAU.2: 8
- FIA_UAU.2.1: 1
- FIA_UAU.5: 8
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UID.1: 11
- FIA_UID.2: 12
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF.1: 6
- FMT_MOF.1.1: 1
- FMT_MSA.1: 6
- FMT_MSA.1.1: 1
- FMT_MSA.3: 8
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 7
- FMT_MTD.1.1: 1
- FMT_REV.1: 16
- FMT_REV.1.1: 2
- FMT_REV.1.2: 2
- FMT_SMF.1: 7
- FMT_SMF.1.1: 1
- FMT_SMR.1: 14
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM.1: 1
- FPT_TRC.1: 6
- FPT_TRC.1.1: 1
- FPT_TRC.1.2: 1
- FTA:
- FTA_MCS.1: 6
- FTA_MCS.1.1: 1
- FTA_MCS.1.2: 1
- FTA_TAH.1: 8
- FTA_TAH.1.1: 1
- FTA_TAH.1.2: 1
- FTA_TAH.1.3: 1
- FTA_TSE.1: 6
- FTA_TSE.1.1: 1
|
- FAU:
- FAU_GEN.1: 3
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 2
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 18
- FDP_ACC.1.1: 1
- FDP_ACF: 1
- FDP_ACF.1: 15
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 79
- FDP_IFC.1.1: 2
- FDP_IFF: 2
- FDP_IFF.1: 87
- FDP_IFF.1.1: 2
- FDP_IFF.1.2: 3
- FDP_IFF.1.3: 3
- FDP_IFF.1.4: 2
- FDP_IFF.1.5: 13
- FDP_RIP: 1
- FDP_RIP.1: 11
- FDP_RIP.1.1: 3
- FIA:
- FIA_UAU.1: 1
- FIA_UAU.2: 3
- FIA_UAU.2.1: 1
- FIA_UID.1: 1
- FIA_UID.2: 4
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF.1: 2
- FMT_MOF.1.1: 1
- FMT_MSA: 1
- FMT_MSA.3: 12
- FMT_SMF.1: 2
- FMT_SMR.1: 1
- FPT:
- FPT_FLS: 1
- FPT_FLS.1: 14
- FPT_FLS.1.1: 1
- FPT_PHP.1: 9
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 20
- FPT_PHP.3.1: 1
- FPT_TST: 1
- FPT_TST.1: 16
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTA:
- FTA_ATH_EXT: 3
- FTA_ATH_EXT.1: 11
- FTA_ATH_EXT.1.1: 2
- FTA_CIN_EXT: 4
- FTA_CIN_EXT.1: 11
- FTA_CIN_EXT.1.1: 2
- FTA_SSL.4: 1
- FTA_TAB.1: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.NO_EVIL: 3
- A.NO_GENERAL_PURPOSE: 3
- A.PHYSICAL: 3
- O:
- O.ACCESS_HISTORY: 5
- O.ADMIN_GUIDANCE: 1
- O.ADMIN_ROLE: 4
- O.AUDIT_: 1
- O.AUDIT_GENERATION: 4
- O.CONFIGURATION_IDENTIFICATION: 1
- O.DOCUMENTED_DESIGN: 1
- O.INTERNAL_TOE_DOMAINS: 1
- O.MANAGE: 6
- O.MEDIATE: 5
- O.PARTIAL_FUNCTIONAL_TEST: 1
- O.PARTIAL_SELF_PROTECTION: 1
- O.RESIDUAL_INFORM: 1
- O.RESIDUAL_INFORMAT: 2
- O.RESIDUAL_INFORMATION: 3
- O.TOE_ACCESS: 7
- O.VULNERABILITY_ANALYSIS: 1
- OE:
- OE.NO_EVIL: 4
- OE.NO_GENERAL_: 2
- OE.NO_GENERAL_PURPOSE: 1
- OE.PHYSICAL: 4
- T:
- T.ACCIDENTIAL_ADMIN_ERROR: 1
- T.MASQUERADE: 3
- T.POOR_DESIGN: 1
- T.POOR_IMPLEMENTATION: 1
- T.POOR_TEST: 1
- T.RESIDUAL_DATA: 3
- T.TSF_COMPROMISE: 3
- T.UNAUTHORIZED_ACCESS: 3
- T.UNIDENTIFIED_ACTIONS: 3
|
- A:
- A.NO_SPECIAL_ANALOG_CAPABILITIES: 2
- A.NO_TEMPEST: 3
- A.PHYSICAL: 3
- A.TRUSTED_ADMIN: 2
- A.TRUSTED_CONFIG: 3
- O:
- O.ANTI_TAMPERING: 8
- O.ANTI_TAMPERING_BACKUP_FAIL_T: 1
- O.ANTI_TAMPERING_BACKUP_FAIL_TR: 1
- O.ANTI_TAMPERING_BACKUP_FAIL_TRIGG: 2
- O.ANTI_TAMPERING_BACKUP_FAIL_TRIGGE: 1
- O.ANTI_TAMPERING_BACKUP_FAIL_TRIGGER: 2
- O.ANTI_TAMPERING_BACKUP_POWER: 7
- O.ANTI_TAMPERING_INDICATION: 7
- O.ANTI_TAMPERING_PERMANENTLY_: 2
- O.ANTI_TAMPERING_PERMANENTLY_DISA: 2
- O.ANTI_TAMPERING_PERMANENTLY_DISAB: 1
- O.ANTI_TAMPERING_PERMANENTLY_DISABLE_TOE: 3
- O.AUTHORIZED_SWITCHING: 7
- O.COMPUTER_INTERFACE_ISOLATION: 11
- O.COMPUTER_INTERFACE_ISOLATION_: 1
- O.COMPUTER_INTERFACE_ISOLATION_TO: 1
- O.COMPUTER_INTERFACE_ISOLATION_TOE: 2
- O.COMPUTER_INTERFACE_ISOLATION_TOE_UNPOWERED: 4
- O.COMPUTER_TO_AUDIO_ISOLATION: 7
- O.CONTINUOUS_INDICATION: 7
- O.DISABLE_UNAUTHORIZED_ENDPOIN: 2
- O.DISABLE_UNAUTHORIZED_ENDPOINTS: 5
- O.DISABLE_UNAUTHORIZED_PERIPHER: 2
- O.DISABLE_UNAUTHORIZED_PERIPHERAL: 5
- O.DISPLAYPORT_AUX_FILTERING: 1
- O.KEYBOARD_AND_MOUSE_TIED: 7
- O.KEYBOARD_MOUSE_EMULATED: 7
- O.KEYBOARD_MOUSE_UNIDIRECTION: 1
- O.KEYBOARD_MOUSE_UNIDIRECTIONA: 1
- O.KEYBOARD_MOUSE_UNIDIRECTIONAL: 5
- O.NO_AMBIGUOUS_CONTROL: 7
- O.NO_ANALOG_AUDIO_INPUT: 8
- O.NO_CONNECTED_COMPUTER_CONT: 2
- O.NO_CONNECTED_COMPUTER_CONTRO: 1
- O.NO_CONNECTED_COMPUTER_CONTROL: 4
- O.NO_DOCKING_PROTOCOLS: 7
- O.NO_OTHER_EXTERNAL_INTERFACES: 10
- O.NO_TOE_ACCESS: 8
- O.NO_USER_DATA_RETENTION: 9
- O.PERIPHERAL_PORTS_ISOLATION: 12
- O.PURGE_TOE: 3
- O.PURGE_TOE_KB_DATA_WHILE_SWI: 1
- O.PURGE_TOE_KB_DATA_WHILE_SWIT: 1
- O.PURGE_TOE_KB_DATA_WHILE_SWITCHI: 2
- O.SELF_TEST: 9
- O.SELF_TEST_FAIL_INDICATION: 7
- O.SELF_TEST_FAIL_TOE_DISABLE: 9
- O.TAMPER_EVIDENT_LABEL: 8
- O.UNIDIRECTIONAL_AUDIO_OUT: 7
- O.UNIDIRECTIONAL_VIDEO: 7
- O.UNIDIRERCTIONAL_EDID: 7
- O.USER_AUTHENTICATION_ADMIN: 2
- O.USER_AUTHENTICATION_ISOLATION: 7
- O.USER_AUTHENTICATION_RESET: 11
- O.USER_AUTHENTICATION_TERMINATION: 1
- O.USER_DATA_ISOLATION: 9
- OE:
- OE.PHYSICAL: 4
- OE.TRUSTED_ADMIN: 6
- T:
- T.AUDIO_REVERSED: 1
- T.AUTHORIZED_BUT_UNT: 1
- T.AUTHORIZED_BUT_UNTRUSTED_DEVICES: 1
- T.DATA_LEAK: 3
- T.FAILED: 2
- T.LOGICAL_TAMPER: 3
- T.MICROPHONE_USE: 1
- T.PHYSICAL_TAMPER: 2
- T.REPLACEMENT: 3
- T.RESIDUAL_LEAK: 3
- T.SIGNAL_LEAK: 2
- T.UNAUTHORIZED_DEVIC: 1
- T.UNAUTHORIZED_DEVICES: 2
- T.UNINTENDED_SWITCHI: 1
- T.UNINTENDED_SWITCHING: 1
|
pdf_data/st_keywords/vendor |
- Microsoft:
- Microsoft: 11
- Microsoft Corporation: 2
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Physical tampering: 1
- physical tampering: 14
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_garbage |
False |
True |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |