name |
PalmSecure SDK Version 24 Premium |
Trellix Intrusion Prevention System Sensor and Manager Appliances version 11.1 |
category |
Biometric Systems and Devices |
Network and Network-Related Devices and Systems |
scheme |
DE |
US |
status |
archived |
active |
not_valid_after |
01.09.2019 |
20.05.2026 |
not_valid_before |
30.12.2008 |
20.05.2024 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11417-ci.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0511a.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11417-vr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0511b.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11417-st.pdf |
manufacturer |
Fujitsu Limited |
Trellix |
manufacturer_web |
https://www.fujitsu.com/ |
https://www.trellix.com |
security_level |
EAL2 |
{} |
dgst |
ca5a5c3b72c34bc3 |
cf362acffcd3daeb |
heuristics/cert_id |
BSI-DSZ-CC-0511-2008 |
CCEVS-VR-VID-11417-2024 |
heuristics/cert_lab |
BSI |
US |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_IMP.2, ADV_ARC.1, ASE_TSS.1, ADV_TDS.6, AGD_OPE.1, ALC_CMC.2, ADV_FSP.2, ALC_FLR.3, APE_SPD.1, ASE_REQ.2, ADV_SPM.1, APE_REQ.2, APE_INT.1, AVA_VAN.2, ALC_DVS.2, AGD_PRE.1, ASE_CCL.1, ATE_IND.2, ASE_ECD.1, ADV_INT.3, ALC_DEL.1, APE_CCL.1, ASE_OBJ.2, ALC_CMS.2, ATE_COV.1, ATE_DPT.4, ALC_LCD.2, ASE_INT.1, APE_ECD.1, ALC_TAT.3, ASE_SPD.1, ATE_FUN.1, APE_OBJ.2 |
ALC_CMS.1, ASE_CCL.1, ASE_INT.1, ADV_FSP.1, AGD_PRE.1, AVA_VAN.1, ASE_ECD.1, ASE_SPD.1, ASE_OBJ.1, ATE_IND.1, ASE_REQ.1, ASE_TSS.1, ALC_CMC.1, AGD_OPE.1 |
heuristics/extracted_versions |
24 |
11.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
89f2a255423f4a20, 6448a1802bb874d8 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_IPS_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.2E.pdf |
pdf_data/cert_filename |
|
st_vid11417-ci.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- US:
- CCEVS-VR-VID11417-2024: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /CreationDate: D:20240528122641-04'00'
- /ModDate: D:20240528122641-04'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 187669
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
0511a.pdf |
st_vid11417-vr.pdf |
pdf_data/report_frontpage |
- DE:
- cert_id: BSI-DSZ-CC-0511-2008
- cert_item: PalmSecure SDK Version 24 Premium
- cert_lab: BSI
- developer: Fujitsu Limited
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- US:
|
- DE:
- US:
- cert_id: CCEVS-VR-VID11417-2024
- cert_item: for the Trellix Intrusion Prevention System Sensor and Manager Appliances version 11.1
- cert_lab: US NIAP
|
pdf_data/report_keywords/cc_cert_id |
|
- US:
- CCEVS-VR-VID11417-2024: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 2: 3
- EAL 4: 1
- EAL 7: 1
- EAL1: 6
- EAL2: 4
- EAL3: 4
- EAL4: 4
- EAL5: 6
- EAL6: 3
- EAL7: 4
|
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 1
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 1
- ALC_DEL: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 1
- ALC_FLR: 1
- ALC_FLR.1: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 1
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ALC_TAT.2: 1
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 1
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 1
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- OE:
- OE.ADMINISTRATION: 1
- OE.AUDIT_REACTION: 1
- OE.AUTHADMIN: 1
- OE.ENROLMENT: 1
- OE.ENVIRONMENT: 1
- OE.FALLBACK: 1
- OE.PHYSICAL: 1
- OE.ROLES_AND_ACCESS: 1
|
- A:
- A.ADMIN_CREDENTIALS_SECURE: 1
- A.COMPONENTS_RUNNING: 1
- A.LIMITED_FUNCTIONALITY: 1
- A.NO_THRU_TRAFFIC_PROTECTION: 1
- A.PHYSICAL_PROTECTION: 1
- A.REGULAR_UPDATES: 1
- A.RESIDUAL_INFORMATION: 1
- A.TRUSTED_ADMINISTRATOR: 1
- T:
- T.PASSWORD_CRACKING: 1
- T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
- T.SECURITY_FUNCTIONALITY_FAILURE: 1
- T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
- T.UNDETECTED_ACTIVITY: 1
- T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
- T.UPDATE_COMPROMISE: 1
- T.WEAK_AUTHENTICATION_ENDPOINTS: 1
- T.WEAK_CRYPTOGRAPHY: 1
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
- SRC:
- SRC Security Research & Consulting: 3
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-256: 4
- SHA-384: 6
- SHA-512: 3
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- 8] Evaluation Technical Report, Version 1.1, 24.11.2008, SRC Security Research & Consulting GmbH, (confidential document) [9] Security guide (PalmSecureTM Version 24 Premium), Fujitsu, First edition, September 2008 [10: 1
- OutOfScope:
- out of scope: 1
- tests at the ITSEF excepting such tests which are related to functions or parameters which are out of scope of the evaluation (functions regarding enrolment and identification, parameters regarding threshold: 1
|
- OutOfScope:
- out of scope: 1
- use of a default self-signed certificate for trust establishment with the sensor, such a channel is out of scope for this evaluation. The sensor- Manager channel must be established using CA-signed certificates: 1
|
pdf_data/report_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20090202084856+01'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, PalmSecure SDK Version 24 Premium, Fujitsu Limited"
- /ModDate: D:20090202150925+01'00'
- /Producer: StarOffice 8
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0511-2008
- pdf_file_size_bytes: 922937
- pdf_hyperlinks: http://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 34
|
- /Author: ppatin
- /CreationDate: D:20240528114708-04'00'
- /Creator: Microsoft® Word 2019
- /ModDate: D:20240528114708-04'00'
- /Producer: Microsoft® Word 2019
- pdf_file_size_bytes: 486358
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 34
|
pdf_data/st_filename |
0511b.pdf |
st_vid11417-st.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_IND: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.1: 2
- ALC_CMS.1: 2
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FDP:
- FDP_ACC.1: 1
- FDP_ACF.1: 1
- FDP_RIP: 2
- FDP_RIP.1: 1
- FDP_RIP.2: 7
- FIA:
- FIA_ATD.1: 1
- FIA_UAU: 4
- FIA_UAU.1: 1
- FIA_UAU.2: 4
- FIA_UAU.3: 8
- FIA_UID: 2
- FIA_UID.1: 2
- FIA_UID.2: 5
- FPT:
|
- FAU:
- FAU_GEN: 5
- FAU_GEN.1: 8
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 5
- FAU_GEN.2.1: 1
- FAU_GEN_EXT.1: 4
- FAU_GEN_EXT.1.1: 1
- FAU_STG_EXT.1: 5
- FAU_STG_EXT.1.1: 1
- FAU_STG_EXT.1.2: 1
- FAU_STG_EXT.1.3: 1
- FAU_STG_EXT.4: 5
- FAU_STG_EXT.4.1: 1
- FAU_STG_EXT.5: 5
- FAU_STG_EXT.5.1: 1
- FCO:
- FCO_CPC_EXT.1: 6
- FCO_CPC_EXT.1.1: 1
- FCO_CPC_EXT.1.2: 1
- FCO_CPC_EXT.1.3: 1
- FCS:
- FCS_CKM.1: 5
- FCS_CKM.1.1: 1
- FCS_CKM.2: 5
- FCS_CKM.2.1: 1
- FCS_CKM.4: 6
- FCS_CKM.4.1: 1
- FCS_COP: 22
- FCS_COP.1: 4
- FCS_NTP_EXT.1.4: 1
- FCS_RBG_EXT.1: 5
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FCS_SSHC_EXT.1: 5
- FCS_SSHC_EXT.1.1: 1
- FCS_SSHC_EXT.1.2: 1
- FCS_SSHC_EXT.1.3: 1
- FCS_SSHC_EXT.1.4: 1
- FCS_SSHC_EXT.1.5: 2
- FCS_SSHC_EXT.1.6: 1
- FCS_SSHC_EXT.1.7: 1
- FCS_SSHC_EXT.1.8: 1
- FCS_SSHC_EXT.1.9: 1
- FCS_SSHS_EXT.1: 6
- FCS_SSHS_EXT.1.1: 1
- FCS_SSHS_EXT.1.2: 1
- FCS_SSHS_EXT.1.3: 1
- FCS_SSHS_EXT.1.4: 1
- FCS_SSHS_EXT.1.5: 1
- FCS_SSHS_EXT.1.6: 1
- FCS_SSHS_EXT.1.7: 1
- FCS_SSHS_EXT.1.8: 1
- FCS_TLSC_EXT.1: 6
- FCS_TLSC_EXT.1.1: 1
- FCS_TLSC_EXT.1.2: 1
- FCS_TLSC_EXT.1.3: 1
- FCS_TLSC_EXT.1.4: 1
- FCS_TLSC_EXT.2: 6
- FCS_TLSC_EXT.2.1: 1
- FCS_TLSC_EXT.2.3: 1
- FCS_TLSS_EXT.1: 6
- FCS_TLSS_EXT.1.1: 1
- FCS_TLSS_EXT.1.2: 1
- FCS_TLSS_EXT.1.3: 1
- FCS_TLSS_EXT.1.4: 1
- FCS_TLSS_EXT.2: 6
- FCS_TLSS_EXT.2.1: 1
- FCS_TLSS_EXT.2.2: 1
- FCS_TLSS_EXT.2.3: 1
- FIA:
- FIA_AFL.1: 9
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_PMG_EXT.1: 6
- FIA_PMG_EXT.1.1: 1
- FIA_UAU.7: 4
- FIA_UAU.7.1: 2
- FIA_UAU_EXT.2: 5
- FIA_UAU_EXT.2.1: 1
- FIA_UIA_EXT.1: 5
- FIA_UIA_EXT.1.1: 1
- FIA_UIA_EXT.1.2: 1
- FMT:
- FMT_MOF: 5
- FMT_MOF.1: 1
- FMT_MTD: 5
- FMT_MTD.1: 1
- FMT_SMF: 5
- FMT_SMF.1: 6
- FMT_SMF.1.1: 2
- FMT_SMR.2: 5
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT.1: 4
- FPT_APW_EXT.1.1: 1
- FPT_APW_EXT.1.2: 1
- FPT_ITT.1: 12
- FPT_ITT.1.1: 1
- FPT_SKP_EXT.1: 5
- FPT_SKP_EXT.1.1: 1
- FPT_STM_EXT.1: 6
- FPT_STM_EXT.1.1: 1
- FPT_STM_EXT.1.2: 1
- FPT_TST_EXT.1: 5
- FPT_TST_EXT.1.1: 1
- FPT_TUD_EXT.1: 5
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FTA:
- FTA_SSL.3: 5
- FTA_SSL.3.1: 1
- FTA_SSL.4: 5
- FTA_SSL.4.1: 1
- FTA_SSL_EXT.1: 5
- FTA_SSL_EXT.1.1: 1
- FTA_TAB.1: 6
- FTA_TAB.1.1: 1
- FTP:
- FTP_APW_EXT.1: 1
- FTP_ITC.1: 8
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 6
- FTP_TRP.1: 3
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMINISTRATION: 4
- A.AUDIT_REACTION: 4
- A.AUTHADMIN: 4
- A.ENROLMENT: 4
- A.ENVIRONMENT: 4
- A.FALLBACK: 4
- A.PHYSICAL: 5
- A.ROLES_AND_ACCESS: 4
- O:
- O.BIO_VERIFCATION: 1
- O.BIO_VERIFICATION: 9
- O.NO_REPRODUCE: 8
- O.RESIDUAL: 5
- O.RESIDUAL_CAPTURE: 6
- OE:
- OE.ADMINISTRATION: 5
- OE.AUDIT_REACKTION: 1
- OE.AUDIT_REACTION: 17
- OE.AUTHADMIN: 9
- OE.ENROLMENT: 5
- OE.ENVIRONMENT: 5
- OE.FALLBACK: 3
- OE.PHYSICAL: 5
- OE.ROLES_AND_ACCESS: 9
- OSP:
- OSP.FAR: 7
- OSP.USERLIMIT: 4
- T:
- T.BRUTEFORCE: 5
- T.MODIFY_ASSETS: 7
- T.REPRODUCE: 5
- T.RESIDUAL: 9
- T.ROLES: 8
|
- A:
- A.ADMIN_CREDENTIALS_SECURE: 1
- A.COMPONENTS_RUNNING: 1
- A.LIMITED_FUNCTIONALITY: 1
- A.NO_THRU_TRAFFIC_PROTECTION: 1
- A.PHYSICAL_PROTECTION: 1
- A.REGULAR_UPDATES: 1
- A.RESIDUAL_INFORMATION: 1
- A.TRUSTED_ADMINISTRATOR: 1
- OE:
- OE.ADMIN_CREDENTIALS_SECURE: 1
- OE.COMPONENTS_RUNNING: 1
- OE.NO_GENERAL_PURPOSE: 1
- OE.NO_THRU_TRAFFIC_PROTECTION: 1
- OE.PHYSICAL: 1
- OE.RESIDUAL_INFORMATION: 1
- OE.TRUSTED_ADMN: 1
- OE.UPDATES: 1
- T:
- T.PASSWORD_CRACKING: 1
- T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
- T.SECURITY_FUNCTIONALITY_FAILURE: 1
- T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
- T.UNDETECTED_ACTIVITY: 1
- T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
- T.UPDATE_COMPROMISE: 1
- T.WEAK_AUTHENTICATION_ENDPOINTS: 1
- T.WEAK_CRYPTOGRAPHY: 1
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
- MAC:
- HMAC: 4
- HMAC-SHA-256: 5
- HMAC-SHA-384: 5
- HMAC-SHA-512: 5
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-256: 6
- SHA-384: 4
- SHA-512: 5
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
- IPsec:
- SSH:
- TLS:
- DTLS:
- SSL:
- SSL: 2
- SSL 2.0: 1
- SSL 3.0: 1
- TLS:
- TLS: 87
- TLS 1.0: 1
- TLS 1.1: 1
- TLS 1.2: 2
- TLS1.1: 1
- TLS1.2: 1
- TLSv1.2: 5
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- NIST:
- P-256: 44
- P-384: 10
- secp256r1: 2
- secp384r1: 1
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 7
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 7
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- FIPS:
- FIPS 140-2: 1
- FIPS PUB 186-4: 5
- FIPS186-4: 15
- ISO:
- ISO/IEC 10118-: 1
- ISO/IEC 14888-3: 1
- ISO/IEC 18031:2011: 3
- ISO/IEC 9796-2: 1
- NIST:
- PKCS:
- RFC:
- RFC 2460: 1
- RFC 2463: 1
- RFC 2818: 3
- RFC 2986: 1
- RFC 3986: 1
- RFC 4253: 2
- RFC 5077: 1
- RFC 5246: 3
- RFC 5280: 3
- RFC 6125: 2
- RFC 6960: 1
- RFC 768: 1
- RFC 791: 1
- RFC 792: 1
- RFC 793: 1
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- Biometric Identification is not addressed within this ST. Furthermore the enrolment process is out of scope of this ST and it is assumed that all authorized users have been enrolled. Last but not least a: 1
- a mechanism for audit review of the TOE audit logs. As mentioned before all auditing aspects are out of scope of the TOE. • Transmission / Storage: The environment cares for a secure communication and storing: 1
- higher error rates of those systems are only two of them. The biometric identification process is out of scope of this ST. Please see [BEM] or [BPT] for further explanations. 1.5.2 Wording in context of Common: 1
- out of scope: 5
- the BIR to a name or some other "real-life" identification of a user is up to the application and out of scope of the TOE. VERSION 1.0 Security Target for PalmSecure 14.September 2008 All Rights Reserved: 1
- user identity from the TOE. As mentioned before the specific connection to the Portal Service is out of scope of the TOE and depends on the overall application using the PalmSecure Library. • Auditing: The: 1
|
- OutOfScope:
- out of scope: 1
- use of a default self-signed certificate for trust establishment with the sensor, such a channel is out of scope for this evaluation. The sensor-Manager channel must be established using CA-signed certificates. 1: 1
|
pdf_data/st_metadata |
- /Author: Fujitsu
- /Company: Fujitsu
- /CreationDate: D:20090105144849+09'00'
- /Creator: Word 用 Acrobat PDFMaker 8.1
- /Keywords: authentication,biometric,identification,verification
- /ModDate: D:20090105145458+09'00'
- /Producer: Acrobat Distiller 8.1.0 (Windows)
- /SourceModified: D:20090105054723
- /Subject: PalmSecure SDK
- /Title: Security Target for PalmSecure
- pdf_file_size_bytes: 707424
- pdf_hyperlinks: http://www.bsi.bund.de/
- pdf_is_encrypted: True
- pdf_number_of_pages: 59
|
- /Author: Jenn Lobb
- /CreationDate: D:20240528114459-04'00'
- /Creator: Microsoft® Word 2019
- /ModDate: D:20240528114459-04'00'
- /Producer: Microsoft® Word 2019
- pdf_file_size_bytes: 1144300
- pdf_hyperlinks: https://docs.trellix.com/, mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 77
|
state/cert/convert_garbage |
False |
True |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |