| name |
MarkLogic Server Enterprise Edition 6.0-4 |
STARCOS 3.5 ID GCC C2R |
| category |
Databases |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme |
US |
DE |
| status |
archived |
archived |
| not_valid_after |
19.12.2015 |
18.11.2019 |
| not_valid_before |
19.12.2013 |
17.11.2014 |
| cert_link |
None |
None |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10507-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0952a_pdf.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10507-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0952b_pdf.pdf |
| manufacturer |
MarkLogic Corporation |
G+D Mobile Security GmbH |
| manufacturer_web |
https://www.marklogic.com |
https://www.gi-de.com/de/de/mobile-security/ |
| security_level |
ALC_FLR.3, EAL2 |
EAL4+, ATE_DPT.2, AVA_VAN.5, ALC_DVS.2 |
| dgst |
d3a70ffb16de0c0d |
27e724cd297034a1 |
| heuristics/cert_id |
CCEVS-VR-VID-10507-2013 |
BSI-DSZ-CC-0952-2014 |
| heuristics/cert_lab |
US |
BSI |
| heuristics/cpe_matches |
cpe:2.3:a:marklogic:marklogic:6.0-5:*:*:*:*:*:*:*, cpe:2.3:a:marklogic:marklogic:6.0-2:*:*:*:*:*:*:*, cpe:2.3:a:marklogic:marklogic:6.0:*:*:*:*:*:*:* |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ADV_FSP.2, ALC_FLR.3, AGD_PRE.1, ATE_FUN.1, ATE_IND.2, ATE_COV.1, ALC_CMC.2, AGD_OPE.1, ALC_CMS.2, AVA_VAN.2, ALC_DEL.1, ADV_TDS.1, ADV_ARC.1 |
ADV_TDS.3, ALC_FLR.3, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMC.5, AVA_VAN.5, ASE_INT.1, APE_ECD.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.3, ASE_ECD.1, APE_OBJ.2, ALC_TAT.3, ADV_IMP.1, ADV_FSP.4, ALC_DVS.2, ATE_DPT.2, ASE_SPD.1, APE_INT.1, ATE_COV.3, ADV_INT.3, ALC_LCD.2, ASE_TSS.2, ALC_CMS.5, APE_CCL.1, AGD_OPE.1, APE_SPD.1, ALC_DEL.1, ADV_ARC.1, ADV_SPM.1, APE_REQ.2 |
| heuristics/extracted_versions |
6.0 |
3.5 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0952-V2-2016 |
| heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0751-2013, BSI-DSZ-CC-0813-2012 |
| heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-0952-V2-2016 |
| heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0751-2013, BSI-DSZ-CC-0813-2012 |
| heuristics/scheme_data |
- api_url: https://www.niap-ccevs.org/api/project/product/pcl_products/10507/
- categories: ['DBMS']
- category: DBMS
- certification_date: 19.12.2013
- evaluation_facility: Leidos Common Criteria Testing Laboratory
- expiration_date: 19.12.2015
- id: CCEVS-VR-VID10507
- product: MarkLogic Server Enterprise Edition 6.0-4
- scheme: US
- url: https://www.niap-ccevs.org/products/10507
- vendor: MarkLogic Corporation
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0813-2012 |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0813-2012 |
| heuristics/protection_profiles |
{} |
0e62a9ea5e7ca3a7 |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0061b_pdf.pdf |
| pdf_data/cert_filename |
None |
None |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename |
st_vid10507-vr.pdf |
0952a_pdf.pdf |
| pdf_data/report_frontpage |
- DE:
- US:
- cert_id: CCEVS-VR-VID10507-2013
- cert_item: MarkLogic Server Enterprise Edition Version 6.0-4
- cert_lab: US NIAP
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ALC_DVS.2, ATE_DPT.2 and AVA_VAN.5 SOGIS Recognition Agreement
- cc_version: PP conformant Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-0952-2014
- cert_item: STARCOS 3.5 ID GCC C2R
- cert_lab: BSI
- developer: Giesecke & Devrient GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Common Criteria Protection Profile Electronic Identity Card (ID_Card PP), Version 1.03, 16 December 2009, BSI-CC-PP-0061-2009 and in accordance with BSI Technische Richtlinie BSI-TR-03116-2, 2013
- US:
|
| pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10507-2013: 1
|
- DE:
- BSI-DSZ-CC-0751-2013: 4
- BSI-DSZ-CC-0813-2012: 4
- BSI-DSZ-CC-0952-2014: 20
- BSI-DSZ-CC-S-0017-2014: 2
- BSI-DSZ-CC-S-0023-2013: 2
- BSI-DSZ-CC-S-0029-2014: 2
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 2: 5
- EAL 2 augmented: 3
- EAL 4: 1
- EAL2: 1
- EAL2 augmented: 1
|
- EAL:
- EAL 1: 7
- EAL 2: 4
- EAL 3: 4
- EAL 4: 14
- EAL 4 augmented: 3
- EAL 5: 8
- EAL 6: 3
- EAL 7: 4
- EAL5+: 1
- EAL6: 1
- ITSEC:
|
| pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 2
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 2
- ALC_CMS.5: 1
- ALC_DEL: 1
- ALC_DEL.1: 2
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 7
- ALC_FLR: 3
- ALC_FLR.1: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 2
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 2
- ALC_TAT.2: 1
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 6
- ATE_DPT.3: 1
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 6
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
|
|
| pdf_data/report_keywords/vendor |
|
- GD:
- G&D: 2
- Giesecke & Devrient: 19
- Infineon:
- Infineon: 3
- Infineon Technologies: 1
|
| pdf_data/report_keywords/eval_facility |
|
- SRC:
- SRC Security Research & Consulting: 3
- TUV:
- TÜV Informationstechnik: 1
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- fault injection: 1
- physical tampering: 1
- SCA:
- other:
|
| pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7138: 1
- BSI 7148: 1
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
|
- BSI:
- AIS 20: 1
- AIS 25: 2
- AIS 26: 2
- AIS 31: 1
- AIS 32: 1
- AIS 34: 2
- AIS 35: 2
- AIS 36: 4
- ICAO:
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- Evaluation Technical Report (ETR) STARCOS 3.5 ID GCC C2R, SRC Security Research & Consulting GmbH (confidential document) [10] ETR for composite evaluation according to AIS 36 for the Product M7820 A11, Version 3, 02.04: 1
- TÜV Informationstechnik GmbH, Evaluation Body for IT Security (confidential document) [11] STARCOS 3.5 ID GCC C2 Configuration 1, Application Specification, Version 1.0, 14.03.2013: 1
- Version 1.1, 05.11.2014, Konfigurationsliste von STARCOS 3.5 ID GCC C2R, Giesecke & Devrient GmbH (confidential document) 21 / 34 Certification Report BSI-DSZ-CC-0952-2014 This page is intentionally left blank. 22 / 34: 1
- Version 2.7, 05.08.2013, STARCOS 3.5 ID GCC C2R Security Target, Giesecke & Devrient GmbH (confidential document) [7] Common Criteria Protection Profile Electronic Identity Card (ID_Card PP), Version 1.03, 15: 1
|
| pdf_data/report_metadata |
- /Author: Evaluation Team
- /Category: Final ETR Package
- /Comments:
- /Company: Leidos
- /CreationDate: D:20131220180912-05'00'
- /Creator: Acrobat PDFMaker 10.1 for Word
- /Keywords: VR
- /Manager:
- /ModDate: D:20131220180914-05'00'
- /Producer: Adobe PDF Library 10.0
- /SourceModified: D:20131220230421
- /Subject: Validator Report
- /Title: Validation Report for MarkLogic
- /_NewReviewCycle:
- pdf_file_size_bytes: 160030
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20141203132656+01'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, Giesecke & Devrient, G&D, STARCOS, nPA, Personalausweis, Identity Card, ID Card"
- /ModDate: D:20141203133150+01'00'
- /Producer: LibreOffice 4.2
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0952-2014
- pdf_file_size_bytes: 1238020
- pdf_hyperlinks: https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung
- pdf_is_encrypted: False
- pdf_number_of_pages: 34
|
| pdf_data/st_filename |
st_vid10507-st.pdf |
0952b_pdf.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0035: 1
- BSI-CC-PP-0059-2009-MA-01: 2
- BSI-CC-PP-0061: 3
- BSI-PP-0055: 1
- BSI-PP-0056: 2
|
| pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 2: 4
- EAL 2 augmented: 4
- EAL2: 4
- EAL2 augmented: 1
|
- EAL:
- EAL 4: 2
- EAL 5: 2
- EAL4: 13
- EAL4 augmented: 3
- EAL5+: 1
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 12
- ADV_FSP: 1
- ADV_FSP.1: 2
- ADV_FSP.2: 16
- ADV_TDS: 1
- ADV_TDS.1: 13
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 15
- AGD_PRE: 1
- AGD_PRE.1: 11
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 8
- ALC_CMS.1: 1
- ALC_CMS.2: 7
- ALC_DEL: 1
- ALC_DEL.1: 5
- ALC_FLR: 1
- ALC_FLR.3: 24
- ATE:
- ATE_COV: 1
- ATE_COV.1: 8
- ATE_FUN: 1
- ATE_FUN.1: 12
- ATE_IND: 1
- ATE_IND.2: 8
- AVA:
|
- ADV:
- ADV_ARC.1: 4
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 2
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_DVS.1: 1
- ALC_DVS.2: 9
- APE:
- ASE:
- ATE:
- ATE_DPT.1: 2
- ATE_DPT.2: 9
- ATE_FUN.1: 1
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 10
- FAU_GEN.1: 8
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 5
- FAU_GEN.2.1: 1
- FAU_SEL: 3
- FAU_SEL.1: 6
- FAU_SEL.1.1: 1
- FCS:
- FCS_CKM: 4
- FCS_CKM.1: 11
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 8
- FCS_CKM_EXT: 4
- FCS_CKM_EXT.4: 13
- FCS_CKM_EXT.4.1: 1
- FCS_COP.1: 36
- FCS_COP.1.1: 6
- FCS_TLS_EXT: 5
- FCS_TLS_EXT.1: 11
- FCS_TLS_EXT.1.1: 1
- FDP:
- FDP_ACC: 3
- FDP_ACC.1: 9
- FDP_ACC.1.1: 1
- FDP_ACF: 3
- FDP_ACF.1: 6
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 1
- FDP_ITC.1: 7
- FDP_ITC.2: 7
- FDP_RIP: 3
- FDP_RIP.2: 5
- FDP_RIP.2.1: 1
- FIA:
- FIA_APW_EXT: 1
- FIA_ATD: 3
- FIA_ATD.1: 5
- FIA_ATD.1.1: 1
- FIA_PMG_EXT: 4
- FIA_PMG_EXT.1: 9
- FIA_PMG_EXT.1.1: 1
- FIA_SKP_EXT: 1
- FIA_UAU: 3
- FIA_UAU.2: 6
- FIA_UAU.2.1: 1
- FIA_UID: 3
- FIA_UID.1: 3
- FIA_UID.2: 7
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA: 6
- FMT_MSA.1: 5
- FMT_MSA.1.1: 1
- FMT_MSA.3: 7
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 16
- FMT_MTD.1.1: 2
- FMT_REV.1: 17
- FMT_REV.1.1: 2
- FMT_REV.1.2: 2
- FMT_SMF: 3
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR: 3
- FMT_SMR.1: 13
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_APW_EXT: 4
- FPT_APW_EXT.1: 7
- FPT_APW_EXT.1.1: 2
- FPT_APW_EXT.1.2: 2
- FPT_ITT: 3
- FPT_ITT.1: 6
- FPT_ITT.1.1: 1
- FPT_PTD.1: 2
- FPT_PTD_EXT: 1
- FPT_PTD_EXT.1: 1
- FPT_SKP_EXT: 4
- FPT_SKP_EXT.1: 8
- FPT_SKP_EXT.1.1: 2
- FPT_STM.1: 2
- FPT_TRC.1.1: 1
- FPT_TRC.1.2: 1
- FPT_TRC_EXT: 5
- FPT_TRC_EXT.1: 8
- FPT_TRC_EXT.1.1: 2
- FTA:
- FTA_MCS: 3
- FTA_MCS.1: 6
- FTA_MCS.1.1: 1
- FTA_MCS.1.2: 1
- FTA_TAH.1: 1
- FTA_TAH_EXT: 5
- FTA_TAH_EXT.1: 8
- FTA_TAH_EXT.1.1: 2
- FTA_TAH_EXT.1.2: 2
- FTA_TSE: 3
- FTA_TSE.1: 6
- FTA_TSE.1.1: 1
- FTP:
- FTP_TRP.1: 14
- FTP_TRP.1.1: 2
- FTP_TRP.1.2: 2
- FTP_TRP.1.3: 2
|
- FAU:
- FAU_GEN: 1
- FAU_SAS: 5
- FAU_SAS.1: 17
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 52
- FCS_CKM.1: 16
- FCS_CKM.2: 4
- FCS_CKM.4: 20
- FCS_COP: 56
- FCS_COP.1: 11
- FCS_RND: 7
- FCS_RND.1: 12
- FCS_RND.1.1: 2
- FCS_RNG.1: 3
- FDP:
- FDP_ACC: 16
- FDP_ACC.1: 12
- FDP_ACC.1.1: 1
- FDP_ACF: 23
- FDP_ACF.1: 21
- FDP_IFC.1: 5
- FDP_ITC.1: 7
- FDP_ITC.2: 8
- FDP_ITT.1: 1
- FDP_RIP: 4
- FDP_RIP.1: 13
- FDP_SDI: 14
- FDP_SDI.1: 3
- FDP_SDI.2: 7
- FIA:
- FIA_AFL: 32
- FIA_AFL.1: 8
- FIA_API: 20
- FIA_API.1: 4
- FIA_API.1.1: 3
- FIA_SOS.2: 1
- FIA_UAU: 45
- FIA_UAU.1: 10
- FIA_UAU.4: 6
- FIA_UAU.4.1: 1
- FIA_UAU.5: 15
- FIA_UAU.6: 8
- FIA_UIA: 1
- FIA_UID: 25
- FIA_UID.1: 11
- FMT:
- FMT_LIM: 13
- FMT_LIM.1: 16
- FMT_LIM.1.1: 2
- FMT_LIM.2: 15
- FMT_LIM.2.1: 2
- FMT_MOF: 2
- FMT_MOF.1: 1
- FMT_MSA: 14
- FMT_MSA.1: 5
- FMT_MSA.2: 1
- FMT_MSA.3: 8
- FMT_MSA.4: 1
- FMT_MTD: 86
- FMT_MTD.1: 12
- FMT_MTD.1.1: 2
- FMT_MTD.3: 9
- FMT_MTD.3.1: 1
- FMT_SMF: 5
- FMT_SMF.1: 38
- FMT_SMR: 4
- FMT_SMR.1: 31
- FPT:
- FPT_FLS: 3
- FPT_FLS.1: 12
- FPT_FLS.1.1: 1
- FPT_ITT.1: 1
- FPT_PHP: 6
- FPT_PHP.1: 5
- FPT_PHP.3: 14
- FPT_TST: 2
- FPT_TST.1: 15
- FPT_TST.1.3: 1
- FPT_TST.2: 2
- FRU:
- FTP:
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.AUTH: 3
- A.CLIENT: 2
- A.NO_EVIL: 3
- A.NO_GENERAL_PURPOSE: 2
- A.OS_TIME: 3
- A.PHYSICAL: 2
- A.TRUSTED_OS: 3
- O:
- O.ACCESS_HISTORY: 5
- O.AUDIT_GENERATION: 3
- O.MANAGE: 5
- O.MEDIATE: 3
- O.PROTECTED_: 2
- O.PROTECTED_COMMUNIATIONS: 1
- O.PROTECTED_COMMUNICATIONS: 2
- O.RESIDUAL_INFORMATION: 3
- O.TOE_ACCESS: 5
- OE:
- OE.AUTH: 2
- OE.CLIENT: 2
- OE.NO_GENERAL_: 1
- OE.NO_GENERAL_PURPOSE: 1
- OE.PHYSICAL: 2
- OE.PROCESS: 2
- OE.STORAGE: 2
- OE.TIME: 3
- OE.TRUSTED_ADMIN: 2
- T:
- T.TSF_COMPROMISE: 3
- T.UNAUTHORIZED_ACCESS: 2
- T.UNDETECTED_ACTIONS: 2
|
- A:
- O:
- OE:
- OE.CGA_SSCD: 3
- OE.CGA_TC_SVD: 2
- OE.HID_TC_VAD: 1
- OE.HID_VAD: 2
- OE.SCA_TC_DTBS: 1
- T:
|
| pdf_data/st_keywords/vendor |
|
- GD:
- Infineon:
- Infineon: 3
- Infineon Technologies AG: 1
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
- AES_competition:
- DES:
- constructions:
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-2: 2
- SHA-224: 2
- SHA-256: 3
- SHA-384: 1
- SHA-512: 1
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
- SSH:
- TLS:
- TLS:
- TLS: 21
- TLS 1.0: 3
- TLS 1.1: 1
- TLS 1.2: 1
- TLSv1.0: 2
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 4
- P-384: 6
- P-521: 6
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_RSA_WITH_3DES_EDE_CBC_SHA: 3
- TLS_RSA_WITH_AES_128_CBC_SHA: 3
- TLS_RSA_WITH_AES_256_CBC_SHA: 1
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 14
- Physical Tampering: 4
- Physical tampering: 2
- fault injection: 1
- malfunction: 6
- physical tampering: 7
- SCA:
- DPA: 2
- Leak-Inherent: 6
- SPA: 1
- physical probing: 3
- timing attacks: 1
- other:
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140-2: 3
- FIPS 186-3: 2
- FIPS PUB 186-2: 1
- FIPS PUB 186-3: 2
- FIPS PUB 197: 3
- NIST:
- NIST SP 800-38A: 1
- SP 800-38A: 2
- SP 800-56A: 1
- RFC:
- RFC 2246: 2
- RFC 2346: 1
- RFC 2617: 1
- RFC 2818: 3
- RFC 4346: 1
- RFC 5246: 1
|
- BSI:
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- FIPS:
- FIPS 180-2: 1
- FIPS 180-4: 2
- FIPS 197: 4
- FIPS PUB 180-2: 2
- FIPS PUB 180-4: 1
- FIPS180-2: 1
- ICAO:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816-2: 1
- ISO/IEC 7816-4: 1
- PKCS:
- RFC:
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- out of scope: 1
- to the plastic Identity Card is achieved by physical and organisational security measures being out of scope of the current ST. The TOE shall comprise at least a) the circuitry of the contactless chip incl: 1
|
| pdf_data/st_metadata |
- /Author: SAIC CCTL
- /Company: Hewlett-Packard
- /CreationDate: D:20131220180818-05'00'
- /Creator: Acrobat PDFMaker 10.1 for Word
- /EvaluatedRelease: Edition 6.0-4
- /ModDate: D:20131220180842-05'00'
- /Producer: Adobe PDF Library 10.0
- /ProductName: MarkLogic Server Enterprise
- /STDate: June 10, 2013
- /STDateShort: 6/10/2013
- /STVersion: 0.7
- /SourceModified: D:20131220230732
- /Subject: Security Target
- /Title: MarkLogic Corporation Server Enterprise
- /VendorName: MarkLogic Corporation
- /VendorShortName: MarkLogic
- pdf_file_size_bytes: 456312
- pdf_hyperlinks: http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm#1747
- pdf_is_encrypted: False
- pdf_number_of_pages: 54
|
- /Author: stut
- /CreationDate: D:20141103145118+01'00'
- /Creator: Microsoft® Word 2010
- /Keywords: Version 2.9 Status 03.11.2014
- /ModDate: D:20141103145118+01'00'
- /Producer: Microsoft® Word 2010
- /Subject: STARCOS 3.5 ID GCC C2R
- /Title: Security Target Lite
- pdf_file_size_bytes: 2021253
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 132
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
False |
| state/cert/download_ok |
False |
False |
| state/cert/extract_ok |
False |
False |
| state/cert/pdf_hash |
Equal |
Equal |
| state/cert/txt_hash |
Equal |
Equal |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |