Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
PalmSecure SDK Version 24 Premium
BSI-DSZ-CC-0511-2008
Red Hat Enterprise Linux 9.0 EUS
CCEVS-VR-VID-11379-2024
name PalmSecure SDK Version 24 Premium Red Hat Enterprise Linux 9.0 EUS
category Biometric Systems and Devices Operating Systems
scheme DE US
status archived active
not_valid_after 01.09.2019 09.01.2026
not_valid_before 30.12.2008 09.01.2024
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11379-ci.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0511a.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11379-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0511b.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11379-st.pdf
manufacturer Fujitsu Limited Red Hat, Inc.
manufacturer_web https://www.fujitsu.com/ https://www.redhat.com
security_level EAL2 {}
dgst ca5a5c3b72c34bc3 b4464b45639dc26c
heuristics/cert_id BSI-DSZ-CC-0511-2008 CCEVS-VR-VID-11379-2024
heuristics/cert_lab BSI US
heuristics/cpe_matches {} cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:9.0_ppc64le:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_server:9.0:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.0:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.0:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:9.0_s390x:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:9.0_ppc64le:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:9.0:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:9.0:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_server:9.0:*:*:*:*:*:arm64:*, cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:9.0:*:*:*:*:*:*:*, cpe:2.3:o:redhat:linux:9.0:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.0_ppc64le:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:9.0:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.0:*:*:*:*:*:*:*, cpe:2.3:a:redhat:enterprise_linux_fast_datapath:9.0:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:9.0:*:*:*:*:*:*:*, cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:9.0:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.0_aarch64:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_high_availability:9.0:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_real_time:9.0:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_eus:9.0:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:9.0:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.0_s390x:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:9.0_aarch64:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2023-4004, CVE-2023-4273, CVE-2023-3161, CVE-2022-1462, CVE-2022-25308, CVE-2025-3891, CVE-2023-6693, CVE-2024-0639, CVE-2023-1073, CVE-2023-2203, CVE-2023-38472, CVE-2021-4158, CVE-2022-0987, CVE-2023-4692, CVE-2023-50782, CVE-2022-2963, CVE-2023-6915, CVE-2022-2964, CVE-2023-40745, CVE-2023-3812, CVE-2023-1206, CVE-2023-4091, CVE-2022-1184, CVE-2025-26596, CVE-2024-0646, CVE-2021-35938, CVE-2023-51765, CVE-2022-24805, CVE-2023-38473, CVE-2024-45782, CVE-2023-39417, CVE-2023-3576, CVE-2023-3347, CVE-2022-1355, CVE-2023-38200, CVE-2024-9676, CVE-2022-2601, CVE-2023-40546, CVE-2002-1155, CVE-2022-4283, CVE-2025-1755, CVE-2023-1672, CVE-2023-4813, CVE-2023-43785, CVE-2023-5868, CVE-2023-2454, CVE-2022-1198, CVE-2022-2211, CVE-2023-5217, CVE-2023-28327, CVE-2023-1729, CVE-2025-26595, CVE-2022-2132, CVE-2025-26598, CVE-2023-38470, CVE-2023-2283, CVE-2024-45620, CVE-2022-40982, CVE-2024-45615, CVE-2023-5380, CVE-2022-4132, CVE-2023-42756, CVE-2023-39191, CVE-2023-1380, CVE-2022-2393, CVE-2024-3567, CVE-2024-3056, CVE-2024-6239, CVE-2023-42669, CVE-2000-0017, CVE-2021-3839, CVE-2023-2156, CVE-2023-6622, CVE-2022-1998, CVE-2023-2019, CVE-2023-4155, CVE-2023-3618, CVE-2023-46848, CVE-2022-2989, CVE-2022-3500, CVE-2023-2491, CVE-2023-51764, CVE-2022-1708, CVE-2023-3640, CVE-2023-4010, CVE-2022-2990, CVE-2023-0179, CVE-2024-0562, CVE-2023-40551, CVE-2023-40661, CVE-2024-0409, CVE-2023-6546, CVE-2023-3567, CVE-2022-2625, CVE-2021-3696, CVE-2023-5824, CVE-2023-43789, CVE-2023-3019, CVE-2024-45617, CVE-2024-50074, CVE-2023-5178, CVE-2016-7091, CVE-2023-6606, CVE-2024-0229, CVE-2022-24807, CVE-2024-6237, CVE-2023-2319, CVE-2023-6176, CVE-2023-48795, CVE-2023-4001, CVE-2024-0841, CVE-2025-3155, CVE-2023-3269, CVE-2023-6535, CVE-2023-27561, CVE-2023-6004, CVE-2022-2850, CVE-2023-4387, CVE-2023-6356, CVE-2023-40547, CVE-2023-33952, CVE-2024-0607, CVE-2024-0193, CVE-2023-7216, CVE-2023-32373, CVE-2024-45619, CVE-2023-4147, CVE-2023-3758, CVE-2023-6679, CVE-2023-3961, CVE-2021-4217, CVE-2021-35937, CVE-2022-2509, CVE-2023-39198, CVE-2022-1706, CVE-2022-1652, CVE-2023-2602, CVE-2025-2784, CVE-2022-0168, CVE-2024-0232, CVE-1999-0037, CVE-2023-1981, CVE-2023-0494, CVE-2023-50781, CVE-2023-4535, CVE-2023-6121, CVE-2024-1048, CVE-2025-26597, CVE-2024-6505, CVE-2021-3997, CVE-2023-2680, CVE-2022-25309, CVE-2023-34966, CVE-2022-1263, CVE-2022-2078, CVE-2022-1587, CVE-2023-46847, CVE-2023-40549, CVE-2023-39189, CVE-2024-12086, CVE-2023-0361, CVE-2023-52160, CVE-2022-4743, CVE-2023-5455, CVE-2023-5557, CVE-2025-26600, CVE-1999-0798, CVE-2024-45778, CVE-2024-12087, CVE-2023-6681, CVE-2023-2194, CVE-2001-0690, CVE-2003-0442, CVE-2022-1949, CVE-2023-6536, CVE-2023-32573, CVE-2023-41175, CVE-2023-42753, CVE-2023-5870, CVE-2022-2873, CVE-2022-24806, CVE-2025-0678, CVE-2022-1586, CVE-2023-44488, CVE-2023-4569, CVE-2023-4133, CVE-2024-7006, CVE-2023-1183, CVE-2024-1454, CVE-2023-4527, CVE-2023-3772, CVE-2023-1095, CVE-2023-5633, CVE-2022-34303, CVE-2024-2496, CVE-2023-3750, CVE-2022-2153, CVE-2023-3164, CVE-2022-3821, CVE-2023-34967, CVE-2000-1207, CVE-2022-0934, CVE-2023-1667, CVE-2024-45618, CVE-2023-5157, CVE-2023-5981, CVE-2023-38201, CVE-1999-0297, CVE-2023-52356, CVE-2023-4194, CVE-2023-5215, CVE-2023-4693, CVE-2025-26599, CVE-2024-6387, CVE-2023-43788, CVE-2023-4459, CVE-2023-0664, CVE-2023-46846, CVE-2024-44070, CVE-2023-51767, CVE-2022-24809, CVE-2021-3864, CVE-2023-3301, CVE-2024-1488, CVE-2022-34301, CVE-2023-0778, CVE-2023-40550, CVE-2024-5742, CVE-2023-1513, CVE-2023-5869, CVE-2003-0364, CVE-2023-2513, CVE-2024-45616, CVE-2024-0564, CVE-2023-38559, CVE-2022-3560, CVE-2022-24808, CVE-2024-9341, CVE-2022-1158, CVE-2022-1789, CVE-2003-0464, CVE-2021-3695, CVE-2023-3899, CVE-2023-2731, CVE-2023-5090, CVE-2024-0408, CVE-2023-5367, CVE-2023-5088, CVE-2024-0217, CVE-2023-2953, CVE-1999-0894, CVE-2024-23301, CVE-2024-9675, CVE-2023-5156, CVE-2023-3773, CVE-2024-8443, CVE-2025-26601, CVE-2023-52355, CVE-2023-6531, CVE-2023-38471, CVE-2023-33203, CVE-2023-6240, CVE-2023-38469, CVE-2023-6610, CVE-2023-6710, CVE-2023-5871, CVE-2023-4641, CVE-2024-49394, CVE-2023-42754, CVE-2023-4911, CVE-1999-1288, CVE-2023-3138, CVE-2023-39418, CVE-2022-3715, CVE-2023-40660, CVE-2023-2603, CVE-2023-1289, CVE-2023-33951, CVE-2022-2127, CVE-2023-2700, CVE-2023-39194, CVE-2023-43786, CVE-2022-1016, CVE-2000-0701, CVE-2022-34302, CVE-2024-0914, CVE-2024-0443, CVE-2023-4806, CVE-2020-14394, CVE-2023-32233, CVE-2023-2977, CVE-2023-50387, CVE-2022-3707, CVE-2024-49393, CVE-2023-47038, CVE-2023-1192, CVE-2024-0690, CVE-2023-6683, CVE-2001-0889, CVE-2023-39193, CVE-2023-7250, CVE-2024-12088, CVE-2022-2639, CVE-2024-3049, CVE-2023-2295, CVE-2023-3255, CVE-2022-3424, CVE-2023-7192, CVE-2023-5992, CVE-2023-43787, CVE-2024-0775, CVE-2022-1354, CVE-2025-26594, CVE-2024-0553, CVE-2023-3354, CVE-2023-44487, CVE-2023-2455, CVE-2024-49395, CVE-2023-1652, CVE-2003-0461, CVE-2022-25310, CVE-2023-34968, CVE-2022-4900, CVE-2022-0171, CVE-2022-0480, CVE-2022-4904, CVE-2024-0641, CVE-2022-1852, CVE-2022-1247, CVE-2024-8354, CVE-2023-6918, CVE-2023-3972, CVE-2024-1151, CVE-2025-5914, CVE-2025-26465, CVE-2021-4204, CVE-2007-3103, CVE-2023-6917, CVE-2021-3697, CVE-2022-4285, CVE-2003-0434, CVE-2023-3212
heuristics/extracted_sars ADV_TDS.6, AGD_OPE.1, APE_SPD.1, ASE_ECD.1, ADV_FSP.2, APE_OBJ.2, ALC_TAT.3, APE_CCL.1, ALC_DEL.1, ADV_IMP.2, ALC_CMS.2, ATE_COV.1, ADV_ARC.1, AVA_VAN.2, ASE_SPD.1, ASE_INT.1, ASE_OBJ.2, APE_INT.1, ASE_CCL.1, ASE_REQ.2, APE_ECD.1, APE_REQ.2, ATE_IND.2, ADV_SPM.1, ALC_FLR.3, ASE_TSS.1, ALC_LCD.2, ATE_FUN.1, ALC_DVS.2, AGD_PRE.1, ADV_INT.3, ALC_CMC.2, ATE_DPT.4 ASE_OBJ.2, AGD_OPE.1, ALC_TSU_EXT.1, AGD_PRE.1, ASE_ECD.1, ATE_IND.1, AVA_VAN.1, ASE_CCL.1, ASE_REQ.2, ALC_CMC.1, ADV_FSP.1, ALC_CMS.1, ASE_SPD.1, ASE_INT.1, ASE_TSS.1
heuristics/extracted_versions 24 9.0
heuristics/protection_profiles {} ed9c9d74c3710878, 3d6ad6fde534f6c6, c40ae795865a0dba
maintenance_updates
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_OS_4.3.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pkg_ssh_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PKG_TLS_V1.1.pdf
pdf_data/cert_filename st_vid11379-ci.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11379-2024: 1
pdf_data/cert_keywords/cc_protection_profile_id
pdf_data/cert_keywords/cc_security_level
pdf_data/cert_keywords/cc_sar
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
pdf_data/cert_keywords/vendor
pdf_data/cert_keywords/eval_facility
  • Lightship:
    • Lightship Security: 1
pdf_data/cert_keywords/symmetric_crypto
pdf_data/cert_keywords/asymmetric_crypto
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
pdf_data/cert_keywords/crypto_scheme
pdf_data/cert_keywords/crypto_protocol
  • SSH:
    • SSH: 1
  • TLS:
    • TLS:
      • TLS: 1
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
pdf_data/cert_keywords/ecc_curve
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
pdf_data/cert_keywords/technical_report_id
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
pdf_data/cert_metadata
  • /CreationDate: D:20240111094409-05'00'
  • /ModDate: D:20240111094409-05'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 188451
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename 0511a.pdf st_vid11379-vr.pdf
pdf_data/report_frontpage
  • DE:
    • cert_id: BSI-DSZ-CC-0511-2008
    • cert_item: PalmSecure SDK Version 24 Premium
    • cert_lab: BSI
    • developer: Fujitsu Limited
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
  • US:
  • DE:
  • US:
    • cert_id: CCEVS-VR-VID11379-2024
    • cert_item: for the Red Hat Enterprise Linux 9.0 EUS
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0511-2008: 16
  • US:
    • CCEVS-VR-VID11379-2024: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 3
    • EAL 4: 1
    • EAL 7: 1
    • EAL1: 6
    • EAL2: 4
    • EAL3: 4
    • EAL4: 4
    • EAL5: 6
    • EAL6: 3
    • EAL7: 4
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 1
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 1
    • ALC_FLR: 1
    • ALC_FLR.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 1
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 1
    • ALC_TAT.2: 1
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 1
    • ATE_DPT.4: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 1
pdf_data/report_keywords/cc_claims
  • OE:
    • OE.ADMINISTRATION: 1
    • OE.AUDIT_REACTION: 1
    • OE.AUTHADMIN: 1
    • OE.ENROLMENT: 1
    • OE.ENVIRONMENT: 1
    • OE.FALLBACK: 1
    • OE.PHYSICAL: 1
    • OE.ROLES_AND_ACCESS: 1
  • A:
    • A.PLATFORM: 1
    • A.PROPER_ADMIN: 1
    • A.PROPER_USER: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 7
pdf_data/report_keywords/eval_facility
  • SRC:
    • SRC Security Research & Consulting: 3
  • Lightship:
    • Lightship Security: 5
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES-256: 1
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 4
    • SSHv2: 4
  • TLS:
    • TLS:
      • TLS: 3
      • TLSv1.2: 1
  • VPN:
    • VPN: 1
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 2
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI 7149: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • 8] Evaluation Technical Report, Version 1.1, 24.11.2008, SRC Security Research & Consulting GmbH, (confidential document) [9] Security guide (PalmSecureTM Version 24 Premium), Fujitsu, First edition, September 2008 [10: 1
  • OutOfScope:
    • out of scope: 1
    • tests at the ITSEF excepting such tests which are related to functions or parameters which are out of scope of the evaluation (functions regarding enrolment and identification, parameters regarding threshold: 1
  • OutOfScope:
    • The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile and uses the: 1
    • out of scope: 1
pdf_data/report_metadata
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20090202084856+01'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, PalmSecure SDK Version 24 Premium, Fujitsu Limited"
  • /ModDate: D:20090202150925+01'00'
  • /Producer: StarOffice 8
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0511-2008
  • pdf_file_size_bytes: 922937
  • pdf_hyperlinks: http://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 34
  • /Author: Gugel, Anne T.
  • /CreationDate: D:20240111093533-05'00'
  • /Creator: Microsoft® Word 2019
  • /ModDate: D:20240111093632-05'00'
  • /Producer: Microsoft® Word 2019
  • pdf_file_size_bytes: 426989
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 25
pdf_data/st_filename 0511b.pdf st_vid11379-st.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0511: 2
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0016: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 6
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_IND: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
    • ALC_TSU_EXT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
pdf_data/st_keywords/cc_sfr
  • FDP:
    • FDP_ACC.1: 1
    • FDP_ACF.1: 1
    • FDP_RIP: 2
    • FDP_RIP.1: 1
    • FDP_RIP.2: 7
  • FIA:
    • FIA_ATD.1: 1
    • FIA_UAU: 4
    • FIA_UAU.1: 1
    • FIA_UAU.2: 4
    • FIA_UAU.3: 8
    • FIA_UID: 2
    • FIA_UID.1: 2
    • FIA_UID.2: 5
  • FPT:
    • FPT_RPL: 3
    • FPT_RPL.1: 10
  • FAU:
    • FAU_GEN.1: 4
    • FAU_GEN.1.1: 2
    • FAU_GEN.1.2: 1
  • FCS:
    • FCS_CKM.1: 9
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 7
    • FCS_CKM.2.1: 1
    • FCS_CKM_EXT.4: 6
    • FCS_CKM_EXT.4.1: 1
    • FCS_CKM_EXT.4.2: 1
    • FCS_COP: 31
    • FCS_COP.1: 4
    • FCS_RBG_EXT: 8
    • FCS_RBG_EXT.1: 6
    • FCS_SSHC_EXT.1: 6
    • FCS_SSHC_EXT.1.1: 1
    • FCS_SSHS_EXT.1: 7
    • FCS_SSHS_EXT.1.1: 1
    • FCS_SSHS_EXT.1.3: 1
    • FCS_SSH_EXT.1: 11
    • FCS_SSH_EXT.1.1: 1
    • FCS_SSH_EXT.1.2: 1
    • FCS_SSH_EXT.1.3: 1
    • FCS_SSH_EXT.1.4: 1
    • FCS_SSH_EXT.1.5: 1
    • FCS_SSH_EXT.1.6: 1
    • FCS_SSH_EXT.1.7: 1
    • FCS_SSH_EXT.1.8: 1
    • FCS_STO_EXT.1: 5
    • FCS_STO_EXT.1.1: 1
    • FCS_TLSC_EXT.1: 5
    • FCS_TLSC_EXT.1.1: 1
    • FCS_TLSC_EXT.1.2: 1
    • FCS_TLSC_EXT.1.3: 1
    • FCS_TLSC_EXT.3: 5
    • FCS_TLSC_EXT.3.1: 1
    • FCS_TLSC_EXT.5: 5
    • FCS_TLSC_EXT.5.1: 1
    • FCS_TLSS_EXT.1: 4
    • FCS_TLSS_EXT.1.1: 1
    • FCS_TLS_EXT.1: 6
    • FCS_TLS_EXT.1.1: 1
  • FDP:
    • FDP_ACF_EXT.1: 5
    • FDP_ACF_EXT.1.1: 1
    • FDP_IFC_EXT.1: 1
  • FIA:
    • FIA_AFL.1: 4
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_UAU.5: 4
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
  • FMT:
    • FMT_MOF_EXT.1: 4
    • FMT_MOF_EXT.1.1: 1
    • FMT_SMF_EXT.1: 4
    • FMT_SMF_EXT.1.1: 3
  • FPT:
    • FPT_ACF_EXT.1: 4
    • FPT_ACF_EXT.1.1: 1
    • FPT_ACF_EXT.1.2: 1
    • FPT_ASLR_EXT: 9
    • FPT_ASLR_EXT.1: 3
    • FPT_SBOP_EXT.1: 4
    • FPT_SBOP_EXT.1.1: 1
    • FPT_SRP_EXT.1: 4
    • FPT_SRP_EXT.1.1: 1
    • FPT_TST_EXT.1: 4
    • FPT_TST_EXT.1.1: 1
    • FPT_TUD_EXT.1: 5
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.2: 4
    • FPT_TUD_EXT.2.1: 1
    • FPT_TUD_EXT.2.2: 1
  • FTA:
    • FTA_TAB.1: 4
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_ITC_EXT.1: 6
    • FTP_ITC_EXT.1.1: 1
    • FTP_TRP.1: 4
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMINISTRATION: 4
    • A.AUDIT_REACTION: 4
    • A.AUTHADMIN: 4
    • A.ENROLMENT: 4
    • A.ENVIRONMENT: 4
    • A.FALLBACK: 4
    • A.PHYSICAL: 5
    • A.ROLES_AND_ACCESS: 4
  • O:
    • O.BIO_VERIFCATION: 1
    • O.BIO_VERIFICATION: 9
    • O.NO_REPRODUCE: 8
    • O.RESIDUAL: 5
    • O.RESIDUAL_CAPTURE: 6
  • OE:
    • OE.ADMINISTRATION: 5
    • OE.AUDIT_REACKTION: 1
    • OE.AUDIT_REACTION: 17
    • OE.AUTHADMIN: 9
    • OE.ENROLMENT: 5
    • OE.ENVIRONMENT: 5
    • OE.FALLBACK: 3
    • OE.PHYSICAL: 5
    • OE.ROLES_AND_ACCESS: 9
  • OSP:
    • OSP.FAR: 7
    • OSP.USERLIMIT: 4
  • T:
    • T.BRUTEFORCE: 5
    • T.MODIFY_ASSETS: 7
    • T.REPRODUCE: 5
    • T.RESIDUAL: 9
    • T.ROLES: 8
  • A:
    • A.PLATFORM: 3
    • A.PROPER_: 2
    • A.PROPER_ADMIN: 2
    • A.PROPER_USER: 2
  • O:
    • O.ACCOUNTABILITY: 6
    • O.INTEGRITY: 6
    • O.MANAGEMENT: 6
    • O.PROTECTED_: 7
    • O.PROTECTED_COMMS: 2
    • O.PROTECTED_STORAGE: 1
  • OE:
    • OE.PLATFORM: 3
    • OE.PROPER_ADMIN: 3
    • OE.PROPER_USER: 3
  • T:
    • T.LIMITED_: 2
    • T.LOCAL_: 1
    • T.LOCAL_ATTACK: 1
    • T.NETWORK_: 3
    • T.NETWORK_ATTACK: 5
    • T.NETWORK_EAVESDROP: 2
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
      • AES-256: 2
      • AES256: 1
  • constructions:
    • MAC:
      • HMAC: 3
      • HMAC-SHA-256: 1
      • HMAC-SHA-384: 1
      • HMAC-SHA-512: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 3
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 8
  • FF:
    • DH:
      • Diffie-Hellman: 1
  • RSA:
    • RSA 2048: 6
    • RSA 4096: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 7
      • SHA-384: 5
      • SHA-512: 8
      • SHA256: 7
      • SHA384: 1
      • SHA512: 1
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key agreement: 3
  • KEX:
    • Key Exchange: 1
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 64
    • SSHv2: 5
  • TLS:
    • DTLS:
      • DTLS: 1
    • TLS:
      • TLS: 44
      • TLS 1.1: 1
      • TLS 1.2: 1
      • TLSv1.2: 2
  • VPN:
    • VPN: 1
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 12
  • RNG:
    • RBG: 2
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 3
  • CTR:
    • CTR: 3
  • GCM:
    • GCM: 2
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-384: 10
    • P-521: 12
    • secp384r1: 2
    • secp521r1: 2
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 10
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 180-4: 2
    • FIPS PUB 186-4: 6
    • FIPS PUB 198-1: 1
    • FIPS186-4: 6
  • NIST:
    • NIST SP 800-38A: 3
    • NIST SP 800-38D: 2
    • NIST SP 800-56A: 2
    • NIST SP 800-57: 2
    • NIST SP 800-90A: 2
  • RFC:
    • RFC 4251: 1
    • RFC 4252: 2
    • RFC 4253: 3
    • RFC 4344: 1
    • RFC 5246: 1
    • RFC 5280: 4
    • RFC 5288: 2
    • RFC 5289: 4
    • RFC 5647: 1
    • RFC 5656: 10
    • RFC 6066: 1
    • RFC 6125: 1
    • RFC 6668: 2
    • RFC 8268: 4
    • RFC 8332: 6
  • X509:
    • X.509: 5
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • Biometric Identification is not addressed within this ST. Furthermore the enrolment process is out of scope of this ST and it is assumed that all authorized users have been enrolled. Last but not least a: 1
    • a mechanism for audit review of the TOE audit logs. As mentioned before all auditing aspects are out of scope of the TOE. • Transmission / Storage: The environment cares for a secure communication and storing: 1
    • higher error rates of those systems are only two of them. The biometric identification process is out of scope of this ST. Please see [BEM] or [BPT] for further explanations. 1.5.2 Wording in context of Common: 1
    • out of scope: 5
    • the BIR to a name or some other "real-life" identification of a user is up to the application and out of scope of the TOE. VERSION 1.0 Security Target for PalmSecure 14.September 2008 All Rights Reserved: 1
    • user identity from the TOE. As mentioned before the specific connection to the Portal Service is out of scope of the TOE and depends on the overall application using the PalmSecure Library. • Auditing: The: 1
  • OutOfScope:
    • The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile,and uses the: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: Fujitsu
  • /Company: Fujitsu
  • /CreationDate: D:20090105144849+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 8.1
  • /Keywords: authentication,biometric,identification,verification
  • /ModDate: D:20090105145458+09'00'
  • /Producer: Acrobat Distiller 8.1.0 (Windows)
  • /SourceModified: D:20090105054723
  • /Subject: PalmSecure SDK
  • /Title: Security Target for PalmSecure
  • pdf_file_size_bytes: 707424
  • pdf_hyperlinks: http://www.bsi.bund.de/
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 59
  • /Author: Garrett Nickel
  • /CreationDate: D:20240104152134-08'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /ModDate: D:20240111093302-05'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • /Subject: Red Hat Enterprise Linux 9.0 EUS
  • /Title: Red Hat
  • pdf_file_size_bytes: 513783
  • pdf_hyperlinks: https://www.lightshipsec.com/, mailto:[email protected], https://access.redhat.com/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 50
state/cert/convert_garbage False True
state/cert/convert_ok False True
state/cert/download_ok False True
state/cert/extract_ok False True
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different