name |
Dispositif de placement sous surveillance électronique PSE/PSEM/DEPAR |
Huawei GaussDB 100 Version V300R001C00B300 Release 3da6647 |
category |
Other Devices and Systems |
Databases |
scheme |
FR |
ES |
status |
archived |
active |
not_valid_after |
01.09.2019 |
03.01.2026 |
not_valid_before |
24.01.2014 |
03.01.2021 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-20_Certificate.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2013-69fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-20-INF-3379.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2013-69en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-20_ST.pdf |
manufacturer |
G4S Monitoring Technologies ltd |
Huawei Technologies Co. Ltd. |
manufacturer_web |
https://www.g4s.com |
https://www.huawei.com |
security_level |
ALC_FLR.3, AVA_VAN.3, ALC_DVS.2, EAL2 |
ALC_FLR.2, EAL2+ |
dgst |
c7d9ff6bfce15390 |
0de1944539deaf11 |
heuristics/cert_id |
ANSSI-CC-2013/69 |
2019-20-INF-3379 |
heuristics/cert_lab |
SERMA |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ATE_COV.1, ASE_OBJ.2, ADV_ARC.1, ATE_IND.2, ASE_TSS.1, ADV_FSP.2, ALC_DVS.2, ADV_TDS.1, ALC_CMC.2, ASE_ECD.1, AVA_VAN.3, ALC_FLR.3, AGD_OPE.1, ALC_CMS.2, ASE_INT.1, ASE_SPD.1, ASE_REQ.2, ATE_FUN.1, AGD_PRE.1, ALC_DEL.1, ASE_CCL.1 |
ATE_COV.1, ASE_OBJ.2, ADV_ARC.1, ATE_IND.2, ALC_FLR.2, ASE_TSS.1, ADV_FSP.2, ADV_TDS.1, ALC_CMC.2, ASE_ECD.1, AVA_VAN.2, AGD_OPE.1, ALC_CMS.2, ASE_INT.1, ASE_SPD.1, ASE_REQ.2, ATE_FUN.1, AGD_PRE.1, ALC_DEL.1, ASE_CCL.1 |
heuristics/extracted_versions |
- |
100 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
- category: Database management systems
- certification_date: 03.01.2021
- enhanced:
- manufacturer: Huawei Technologies Co., Ltd.
- product: Huawei GaussDB 100 Version V300R001C00B300 Release 3da6647
- product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/450-huawei-gaussdb-100-version-v300r001c00b300-release-3da6647
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
c0b2fe8891b23088 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0088V2b_pdf.pdf |
pdf_data/cert_filename |
|
2019-20_Certificate.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL2: 1
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
- Huawei:
- Huawei: 3
- Huawei Technologies Co: 2
|
pdf_data/cert_keywords/eval_facility |
|
- DEKRA:
- DEKRA Testing and Certification: 1
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /CreationDate: D:20201214103144+01'00'
- pdf_file_size_bytes: 734385
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
ANSSI-CC_2013-69fr.pdf |
2019-20-INF-3379.pdf |
pdf_data/report_frontpage |
- FR:
- cc_security_level: EAL 2 augmenté ALC_DVS.1, ALC_FLR.3, AVA_VAN.3
- cc_version: Critères Communs version 3.1 révision 3
- cert_id: ANSSI-CC-2013/69
- cert_item: Dispositif de placement sous surveillance électronique PSE/PSEM/DEPAR
- cert_item_version: Version 10
- cert_lab: Serma Technologies 14 rue Galilée, CS 10055 33615 Pessac Cedex France
- developer: G4S Monitoring Technologies 3 Centurion Court Meridian Business Park Leicester LE19 1TP Royaume Uni Commanditaire G4S Monitoring Technologies 3 Centurion Court Meridian Business Park Leicester LE19 1TP Royaume Uni
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur (.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: Néant
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 2: 2
- EAL 3: 1
- EAL 5: 1
- EAL 7: 1
- EAL4: 2
- ITSEC:
|
- EAL:
- EAL 1: 1
- EAL 2: 1
- EAL 4: 2
- EAL2: 8
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.1: 2
- ALC_FLR: 2
- ALC_FLR.3: 2
- ALC_LCD: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_IND: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 2
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR: 2
- ALC_FLR.2: 8
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
- FAU:
- FAU_GEN.1: 1
- FAU_GEN.2: 1
- FAU_SEL.1: 1
- FDP:
- FDP_ACC.1: 1
- FDP_ACF.1: 1
- FDP_RIP.1: 1
- FIA:
- FIA_ATD.1: 1
- FIA_UAU.1: 1
- FIA_UID.1: 1
- FMT:
- FMT_MOF.1: 1
- FMT_MSA.1: 1
- FMT_MSA.3: 1
- FMT_MTD.1: 1
- FMT_REV.1: 2
- FMT_SMF.1: 1
- FMT_SMR.1: 1
- FPT:
- FTA:
- FTA_MCS.1: 1
- FTA_TSE.1: 1
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Huawei:
- Huawei: 24
- Huawei Technologies Co: 3
|
pdf_data/report_keywords/eval_facility |
- Serma:
- SERMA: 3
- Serma Technologies: 1
|
- DEKRA:
- DEKRA Testing and Certification: 5
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20140205142833+01'00'
- /Creator: Microsoft® Word 2010
- /Keywords: ANSSI-CC-CER-F-07.011
- /ModDate: D:20140217145153+01'00'
- /Producer: Microsoft® Word 2010
- /Subject:
- /Title:
- pdf_file_size_bytes: 589324
- pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 15
|
|
pdf_data/st_filename |
ANSSI-CC-cible_2013-69en.pdf |
2019-20_ST.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.2: 3
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL: 2
- ALC_DEL.1: 1
- ALC_DVS: 2
- ALC_DVS.1: 4
- ALC_FLR.3: 4
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 2
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 14
- FAU_GEN.1: 4
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 2
- FAU_SAR: 6
- FAU_SAR.1: 2
- FAU_SAR.1.1: 2
- FAU_SAR.1.2: 2
- FAU_STG.1: 7
- FAU_STG.4: 5
- FCS:
- FCS_CKM: 2
- FCS_CKM.1: 1
- FCS_CKM.4: 1
- FCS_COP.1: 8
- FCS_COP.1.1: 2
- FDP:
- FDP_ACC: 20
- FDP_ACC.1: 8
- FDP_ACC.2: 2
- FDP_ACC.2.1: 4
- FDP_ACC.2.2: 4
- FDP_ACF: 12
- FDP_ACF.1: 6
- FDP_ACF.1.1: 4
- FDP_ACF.1.2: 4
- FDP_ACF.1.3: 4
- FDP_ACF.1.4: 4
- FDP_ITC.1: 2
- FDP_ITC.2: 2
- FIA:
- FIA_ATD.1: 5
- FIA_ATD.1.1: 1
- FIA_UAU: 12
- FIA_UAU.2: 2
- FIA_UAU.2.1: 4
- FIA_UID: 19
- FIA_UID.1: 6
- FIA_UID.2: 2
- FIA_UID.2.1: 4
- FMT:
- FMT_MOF: 1
- FMT_MOF.1: 3
- FMT_MSA: 28
- FMT_MSA.1: 5
- FMT_MSA.1.1: 4
- FMT_MSA.3: 7
- FMT_MSA.3.2: 3
- FMT_MTD: 12
- FMT_MTD.1: 2
- FMT_MTD.1.1: 4
- FMT_SMF: 20
- FMT_SMF.1: 10
- FMT_SMF.1.1: 4
- FMT_SMR.1: 27
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_ANO.1: 5
- FPR_ANO.1.1: 1
- FPT:
- FPT_ITC.1: 5
- FPT_ITC.1.1: 1
- FPT_ITI.1: 5
- FPT_ITT.1: 7
- FPT_ITT.1.1: 1
- FPT_ITT.3: 5
- FPT_ITT.3.2: 1
- FPT_PHP: 6
- FPT_PHP.2: 7
- FPT_PHP.2.1: 1
- FPT_PHP.2.2: 1
- FPT_PHP.2.3: 1
- FPT_PHP.3: 4
- FPT_RPL.1: 5
- FPT_RPL.1.1: 1
- FPT_RPL.1.2: 1
- FPT_STM: 1
- FPT_STM.1: 9
- FPT_STM.1.1: 2
- FTP:
- FTP_ITI.1.1: 1
- FTP_ITI.1.2: 1
|
- FAU:
- FAU_GEN.1: 11
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 2
- FAU_GEN.2: 9
- FAU_GEN.2.1: 2
- FAU_MTD.1: 2
- FAU_SEL.1: 9
- FAU_SEL.1.1: 2
- FDP:
- FDP_ACC.1: 18
- FDP_ACC.1.1: 2
- FDP_ACF.1: 16
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 2
- FDP_IFC.1: 1
- FDP_RIP.1: 9
- FDP_RIP.1.1: 2
- FIA:
- FIA_ATD.1: 15
- FIA_ATD.1.1: 2
- FIA_UAU.1: 8
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 1
- FIA_UID.1: 14
- FIA_UID.1.1: 2
- FIA_UID.1.2: 1
- FIA_USB.1: 5
- FMT:
- FMT_MOF.1: 9
- FMT_MOF.1.1: 1
- FMT_MSA.1: 10
- FMT_MSA.1.1: 1
- FMT_MSA.3: 10
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 2
- FMT_MTD.1: 8
- FMT_MTD.1.1: 2
- FMT_REV.1: 11
- FMT_REV.1.1: 4
- FMT_REV.1.2: 4
- FMT_SMF.1: 14
- FMT_SMF.1.1: 2
- FMT_SMR.1: 20
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 1
- FPT:
- FPT_ITT.1: 1
- FPT_STM.1: 1
- FPT_TRC.1: 10
- FPT_TRC.1.1: 2
- FPT_TRC.1.2: 2
- FTA:
- FTA_MCS.1: 9
- FTA_MCS.1.1: 1
- FTA_TSE.1: 8
- FTA_TSE.1.1: 2
|
pdf_data/st_keywords/cc_claims |
- OE:
- OE.AP: 13
- OE.CT: 11
- OE.GENERATION_CLES_CRYPTOGRAPHIQUES: 3
- OE.MT: 3
- OE.RC: 3
- OT:
- OT.ADMINISTRATION: 1
- OT.ADMINISTRATION_CENTRALE: 2
- OT.ADMINISTRATION_LOCALE: 3
- OT.COM: 6
- OT.DETECTION_BATTERIE_FAIBLE: 3
- OT.DETECTION_COUPURE_BRACELET: 3
- OT.DETECTION_MODIFICATION_DONNEES: 2
- OT.DETECTION_OUVERTURE: 3
- OT.DETECTION_PANNE: 2
- OT.DETECTION_PERTE_COMMUNICATION_CT: 2
- OT.DETECTION_PERTE_COMMUNICATION_GPS: 3
- OT.DETECTION_PERTE_COMMUNICATION_INTRA: 1
- OT.DETECTION_PERTE_COMMUNICATION_INTRA_TOE: 2
- OT.DETECTION_RETRAIT_BRACELET: 1
- OT.DETECTION_RETRAIT_BRACELET_BRACELET: 1
- OT.FIELD: 2
- OT.INITIALISATION: 3
- OT.PROTECTION_CANAUX_AUXILIAIRES: 2
- OT.PROTECTION_IDENTITE_PLACE: 2
- OT.QUALIFICATION_STANDARD: 3
- OT.RESISTANCE_CLONAGE: 3
- OT.RESISTANCE_EAU: 2
- OT.RESISTANCE_TEMPERATURES: 3
- OT.RESPECT_POLITIQUE_ASSIGNATION: 2
- OT.SUPERVISION_LOCALE: 4
- OT.TEMPS_REFERENCE_FIABLE: 3
- SA:
- SA.EVENEMENTS: 1
- SA.SERVICES: 1
|
- A:
- A.AUTHUSE: 1
- A.AUTHUSER: 1
- A.CONNECT: 3
- A.MANAGE: 4
- A.NO_GENER: 1
- A.NO_GENERAL_PURPOSE: 3
- A.PEER_FUN: 1
- A.PHYSICAL: 4
- A.SUPPORT: 5
- A.TRAINED-: 1
- A.TRAINEDUSER: 1
- O:
- O.ADMIN_RO: 4
- O.ADMIN_ROLE: 7
- O.AUDIT: 2
- O.AUDIT_GE: 2
- O.AUDIT_GENERATION: 3
- O.DISCRETI: 1
- O.DISCRETIO: 2
- O.DISCRETIONARY: 2
- O.DISCRETIONARY_ACCESS: 4
- O.MANAGE: 13
- O.MEDIATE: 9
- O.RESIDUAL: 3
- O.RESIDUAL_: 1
- O.RESIDUAL_INFORMATION: 7
- O.TOE_ACCE: 9
- O.TOE_ACCESS: 10
- OE:
- OE.ADMIN: 10
- OE.INFO: 5
- OE.INFO_PRO: 4
- OE.INFO_PROTECT: 11
- OE.IT_REMOT: 4
- OE.IT_REMOTE: 6
- OE.IT_TRUST: 4
- OE.IT_TRUSTED: 1
- OE.IT_TRUSTED_SYSTEM: 5
- OE.NO_GENE: 3
- OE.NO_GENERAL: 2
- OE.NO_GENERAL_PURPOSE: 3
- OE.PHYSICAL: 8
- OSP:
- T:
- T.ACCESS_T: 2
- T.ACCESS_TSFDATA: 3
- T.ACCESS_TSFFUNC: 1
- T.IA_MASQU: 2
- T.IA_MASQUERADE: 3
- T.IA_USER: 2
- T.RESIDUAL: 1
- T.RESIDUAL_DATA: 3
- T.TSF: 1
- T.TSF_COMP: 1
- T.TSF_COMPROMISE: 1
- T.UNAUTHO: 2
- T.UNAUTHORIZED_ACCESS: 3
|
pdf_data/st_keywords/vendor |
|
- Huawei:
- Huawei: 80
- Huawei Technologies Co: 80
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- malfunction: 1
- physical tampering: 3
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- ISO:
- ISO/IEC 15408-: 3
- ISO/IEC 15408:2009: 1
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- 0SP5 (EulerOS), x86_64 ● EulerOS Server V2.0SP8 (EulerOS), ARM_64 The Software of JDK 8u144 is also out of scope and thus not included in the TOE. The Software of Python v2.7.5 is also out of scope and thus not: 1
- EulerOS), x86_64 ● EulerOS Server V2.0SP8 (EulerOS), ARM_64 The Software of JDK 8u144 is also out of scope and thus not included in the TOE: 1
- IP addresses, and dates. 2.3.3 Non-TOE Hardware And Software The following hardware resources are out of scope and thus not included in the TOE but are necessary for its operation: ● CPU (higher than 4 cores: 1
- at least 25 GB disk) The operating system (OS) (EulerOS Server V2.0SP3 (EulerOS), x86_64) is also out of scope and thus not included in the TOE: 1
- at least 25 GB disk) The operating system (OS) (EulerOS Server V2.0SP3 (EulerOS), x86_64) is also out of scope and thus not included in the TOE. In addition, the TOE can be executed in other supported OSs (that: 1
- in the TOE. The Software of Putty v0.73 is also out of scope and thus not included in the TOE. The Software of UnixODBC-2.3.7 is also out of scope and thus not: 1
- out of scope: 6
|
pdf_data/st_metadata |
- /CreationDate: D:20140114110657Z
- /Creator: Microsoft® Word 2010
- /Keywords: 0.6
- /ModDate: D:20140217145235+01'00'
- /Producer: Microsoft® Word 2010
- /Subject:
- /Title:
- pdf_file_size_bytes: 1532191
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 79
|
|
state/cert/convert_garbage |
False |
True |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
False |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |