Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Smart TV Security Solution V8.0 for Samsung Knox
KECS-CISS-1291-2024
IBM Tivoli Directory Server version 6.1
BSI-DSZ-CC-0428-2008
name Smart TV Security Solution V8.0 for Samsung Knox IBM Tivoli Directory Server version 6.1
category Other Devices and Systems Key Management Systems
scheme KR DE
status active archived
not_valid_after 23.02.2029 01.09.2019
not_valid_before 23.02.2024 22.04.2008
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/KECS-CISS-1291-2024_CR_EN.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0428a.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/KECS-CISS-1291-2024_ST_EN.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0428b.pdf
manufacturer Samsung Electronics Co., Ltd. IBM Informationssysteme Deutschland GmbH
manufacturer_web https://www.samsung.com https://www.ibm.com/de/
security_level EAL1 EAL4+, ALC_FLR.1
dgst d60796c5d09c77ed 1d46d5a8d694c0f5
heuristics/cert_id KECS-CISS-1291-2024 BSI-DSZ-CC-0428-2008
heuristics/cert_lab [] BSI
heuristics/cpe_matches {} cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.39:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.55:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.30:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.20:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.67:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.21:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.43:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.10:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.26:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.32:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.52:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.65:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.60:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.28:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.13:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.64:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.22:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.17:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.45:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.4:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.73:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.9:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.12:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.59:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.2:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.38:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.7:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.69:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.37:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.14:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.11:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.33:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.53:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.34:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.35:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.49:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.63:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.8:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.72:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.6:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.19:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.31:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.66:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.44:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.18:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.25:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.61:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.48:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.40:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.3:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.27:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.62:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.46:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.36:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.15:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.41:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.58:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.70:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.47:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.56:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.1:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.23:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.51:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.57:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.42:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.71:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.54:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.68:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.29:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.74:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.24:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.5:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.0:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.50:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2015-1977, CVE-2015-1978, CVE-2014-6100, CVE-2008-2943, CVE-2011-1820, CVE-2015-0138, CVE-2015-1974, CVE-2011-1206, CVE-2010-4217, CVE-2012-0726, CVE-2015-1976, CVE-2012-2191, CVE-2015-2019, CVE-2015-1959, CVE-2015-1975, CVE-2015-1972, CVE-2012-2203, CVE-2012-0743
heuristics/extracted_sars ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 ADV_RCR.1, AVA_VLA.2, ADV_HLD.2, AGD_USR.1, AVA_SOF.1, ADV_FSP.2, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ALC_TAT.1, AVA_MSU.2, AGD_ADM.1, ALC_LCD.1, ATE_FUN.1, ATE_DPT.1, AGD_SPM.1, ALC_DVS.1, ATE_IND.2, ADV_LLD.1, ADV_SPM.1
heuristics/extracted_versions 8.0 6.1
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0283-2006
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0283-2006
heuristics/scheme_data
  • category: Smart TV Security Solution
  • cert_id: KECS-CISS-1291-2024
  • certification_date: 23.02.2024
  • enhanced:
  • level: EAL1
  • product: Smart TV Security Solution V8.0 for Samsung Knox
  • product_link: https://itscc.kr/certprod/view.do?product_id=1291&product_class=1
  • vendor: Samsung Electronics Co,. Ltd
pdf_data/report_filename KECS-CISS-1291-2024_CR_EN.pdf 0428a.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cert_id: BSI-DSZ-CC-0428-2008
    • cert_item: IBM Tivoli Directory Server 6.1
    • cert_lab: BSI
    • developer: IBM Corporation
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
pdf_data/report_keywords/cc_cert_id
  • KR:
    • KECS-CISS-1291-2024: 1
  • DE:
    • BSI-DSZ-CC-0283-2006: 4
    • BSI-DSZ-CC-0428: 1
    • BSI-DSZ-CC-0428-2008: 21
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL1: 6
  • EAL:
    • EAL 1: 1
    • EAL 4: 5
    • EAL 4 augmented: 4
    • EAL 7: 1
    • EAL1: 5
    • EAL2: 3
    • EAL3: 4
    • EAL4: 7
    • EAL4 augmented: 1
    • EAL5: 6
    • EAL6: 3
    • EAL7: 4
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 3
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 3
  • ALC:
    • ALC_CMC.1: 2
    • ALC_CMS.1: 2
  • ASE:
    • ASE_CCL.1: 2
    • ASE_ECD.1: 3
    • ASE_INT.1: 3
    • ASE_OBJ.1: 2
    • ASE_REQ.1: 2
    • ASE_TSS.1: 3
  • ATE:
    • ATE_IND.1: 3
  • AVA:
    • AVA_VAN.1: 4
  • ACM:
    • ACM_AUT: 2
    • ACM_CAP: 2
    • ACM_SCP: 2
  • ADO:
    • ADO_DEL: 2
    • ADO_IGS: 2
  • ADV:
    • ADV_FSP: 2
    • ADV_HLD: 2
    • ADV_IMP: 2
    • ADV_INT: 2
    • ADV_LLD: 2
    • ADV_RCR: 2
    • ADV_SPM: 2
  • AGD:
    • AGD_ADM: 2
    • AGD_USR: 2
  • ALC:
    • ALC_DVS: 2
    • ALC_FLR: 2
    • ALC_FLR.1: 5
    • ALC_LCD: 1
    • ALC_TAT: 2
  • APE:
    • APE_DES: 1
    • APE_ENV: 1
    • APE_INT: 1
    • APE_OBJ: 1
    • APE_REQ: 1
    • APE_SRE: 1
  • ASE:
    • ASE_DES: 1
    • ASE_ENV: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_PPC: 1
    • ASE_REQ: 1
    • ASE_SRE: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 2
    • ATE_DPT: 2
    • ATE_FUN: 2
    • ATE_IND: 2
  • AVA:
    • AVA_CCA: 2
    • AVA_MSU: 2
    • AVA_SOF: 3
    • AVA_VLA: 4
    • AVA_VLA.3: 1
    • AVA_VLA.4: 1
pdf_data/report_keywords/cc_sfr
  • FIA:
    • FIA_SOS.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMIN: 2
    • A.COMM: 2
    • A.COOP: 2
    • A.ENCRYPT: 1
    • A.PHYSICAL: 2
    • A.ROUTE: 2
    • A.TIME: 2
    • A.TOEENV: 2
pdf_data/report_keywords/vendor
  • Samsung:
    • Samsung: 44
  • Microsoft:
    • Microsoft: 3
pdf_data/report_keywords/eval_facility
  • KSEL:
    • KSEL: 3
  • atsec:
    • atsec: 3
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 2
  • TLS:
    • SSL:
      • SSL: 1
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 5
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI 7149: 1
pdf_data/report_keywords/tee_name
  • ARM:
    • ARM TrustZone: 2
  • IBM:
    • SE: 49
  • other:
    • TEE: 9
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 1
  • SCP:
    • SCP 03: 2
  • BSI:
    • AIS 34: 1
  • ISO:
    • ISO/IEC 15408:2005: 2
  • RFC:
    • RFC 1777: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • 7] Evaluation Technical Report, Version 3, 2008-04-15, atsec information security GmbH (confidential document) 13.1 User Guidance Documents [8] IBM Tivoli Directory Server Version 6.1, Administration Guide: 1
pdf_data/report_metadata
  • /Author: Administrator
  • /CreationDate: D:20240223140743+09'00'
  • /Creator: Microsoft® Word 2019
  • /ModDate: D:20240223140743+09'00'
  • /Producer: Microsoft® Word 2019
  • pdf_file_size_bytes: 335018
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 27
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20080423130110+02'00'
  • /Creator: Writer
  • /Keywords: "IBM Tivoli Firectory Server 6.1, IBM Corporation, Common Criteria, BSI-DSZ-CC-0428-2008"
  • /ModDate: D:20080617144541+02'00'
  • /Producer: StarOffice 8
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0428-2008
  • pdf_file_size_bytes: 412325
  • pdf_hyperlinks: http://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 42
pdf_data/st_filename KECS-CISS-1291-2024_ST_EN.pdf 0428b.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL1: 4
  • EAL:
    • EAL 4: 9
    • EAL 4 augmented: 3
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 14
  • AGD:
    • AGD_OPE.1: 13
    • AGD_PRE.1: 9
  • ALC:
    • ALC_CMC.1: 5
    • ALC_CMS.1: 7
  • ASE:
    • ASE_CCL.1: 15
    • ASE_ECD.1: 13
    • ASE_INT.1: 15
    • ASE_OBJ.1: 5
    • ASE_REQ.1: 13
    • ASE_TSS.1: 6
  • ATE:
    • ATE_IND.1: 6
  • AVA:
    • AVA_VAN.1: 7
  • ACM:
    • ACM_AUT.1: 2
    • ACM_CAP.4: 1
    • ACM_SCP.2: 2
  • ADO:
    • ADO_DEL.2: 2
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP.2: 2
    • ADV_HLD.2: 1
    • ADV_IMP.1: 2
    • ADV_LLD.1: 1
    • ADV_RCR.1: 2
    • ADV_SPM.1: 1
  • AGD:
    • AGD_ADM.1: 1
    • AGD_SPM.1: 1
    • AGD_USR.1: 2
  • ALC:
    • ALC_DVS.1: 2
    • ALC_FLR.1: 10
    • ALC_LCD.1: 2
    • ALC_TAT.1: 1
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.1: 1
    • ATE_FUN.1: 2
    • ATE_IND.2: 1
  • AVA:
    • AVA_MSU.1: 1
    • AVA_MSU.2: 1
    • AVA_SOF.1: 1
    • AVA_VLA.1: 1
    • AVA_VLA.2: 1
pdf_data/st_keywords/cc_sfr
  • FDP:
    • FDP_ACC.1: 7
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 6
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 7
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 5
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
  • FIA:
    • FIA_UID.1: 3
  • FMT:
    • FMT_MOF.1: 4
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 6
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 10
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 7
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 11
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_TEE.1: 4
    • FPT_TEE.1.1: 1
    • FPT_TEE.1.2: 1
  • FTP:
    • FTP_ITC.1: 4
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FAU:
    • FAU_GEN.1: 17
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 12
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 12
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 10
    • FAU_SAR.2.1: 1
    • FAU_STG.1: 8
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
  • FCS:
    • FCS_CKM.1: 3
    • FCS_CKM.4: 3
    • FCS_COP: 28
    • FCS_COP.1.1: 2
  • FDP:
    • FDP_ACC.1: 3
    • FDP_ACC.2: 13
    • FDP_ACC.2.1: 1
    • FDP_ACC.2.2: 1
    • FDP_ACF.1: 16
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 2
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
  • FIA:
    • FIA_AFL: 23
    • FIA_AFL.1: 1
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_ATD.1: 11
    • FIA_ATD.1.1: 1
    • FIA_SOS: 26
    • FIA_SOS.1: 2
    • FIA_SOS.1.1: 2
    • FIA_UAU.1: 18
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID.1: 13
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MOF: 25
    • FMT_MOF.1: 1
    • FMT_MOF.1.1: 2
    • FMT_MSA.1: 17
    • FMT_MSA.1.1: 1
    • FMT_MSA.2: 14
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 10
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 10
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 16
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 20
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_RVM.1: 10
    • FPT_RVM.1.1: 1
    • FPT_STM.1: 17
    • FPT_STM.1.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 2
    • A.COMM: 2
    • A.COOP: 3
    • A.ENCRYPT: 3
    • A.PHYSICAL: 3
    • A.ROUTE: 2
    • A.TIME: 3
    • A.TOEENV: 3
  • O:
    • O.ACCOUNT: 6
    • O.AUTHENTICATE: 7
    • O.AUTHORIZE: 7
    • O.BYPASS: 4
  • OE:
    • OE.BACKUP: 4
    • OE.COMMUNICATION: 8
    • OE.DATABASE: 7
    • OE.ENCRYPT: 6
    • OE.ENVMANAGE: 6
    • OE.MANAGE: 9
    • OE.PHYSICAL: 8
    • OE.ROUTE: 4
    • OE.SOPHISTICATED: 6
    • OE.TIME: 8
  • T:
    • T.ACCESS: 2
    • T.ACCOUNT: 3
    • T.BYPASS: 2
    • T.ENTRY: 3
pdf_data/st_keywords/vendor
  • Samsung:
    • Samsung: 31
  • Microsoft:
    • Microsoft: 2
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES256: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 1
      • SHA256: 1
  • MD:
    • MD5:
      • MD5: 10
  • SHA:
    • SHA1:
      • SHA-1: 10
    • SHA2:
      • SHA-224: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 1
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 2
  • TLS:
    • SSL:
      • SSL: 7
    • TLS:
      • TLS: 9
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 5
pdf_data/st_keywords/tee_name
  • ARM:
    • ARM TrustZone: 2
  • IBM:
    • SE: 93
  • other:
    • TEE: 9
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • SCP:
    • SCP 03: 3
  • CC:
    • CCMB-2005-08-001: 1
    • CCMB-2005-08-002: 1
    • CCMB-2005-08-004: 1
  • FIPS:
    • FIPS 140-2: 1
    • FIPS 180-2: 1
    • FIPS 186-2: 1
    • FIPS140-2: 2
    • FIPS180-2: 2
    • FIPS186-2: 2
  • RFC:
    • RFC 1274: 1
    • RFC 1777: 3
    • RFC 1778: 1
    • RFC 1779: 1
    • RFC 1823: 1
    • RFC 2052: 1
    • RFC 2219: 1
    • RFC 2222: 1
    • RFC 2247: 1
    • RFC 2251: 2
    • RFC 2252: 1
    • RFC 2253: 1
    • RFC 2254: 1
    • RFC 2255: 1
    • RFC 2256: 1
    • RFC 2596: 1
    • RFC 2696: 1
    • RFC 2829: 1
    • RFC 2830: 1
    • RFC 2831: 2
    • RFC 2849: 1
    • RFC 2891: 1
    • RFC1274: 1
    • RFC1777: 1
    • RFC1778: 1
    • RFC1779: 1
    • RFC1823: 1
    • RFC2052: 1
    • RFC2219: 1
    • RFC2222: 1
    • RFC2247: 1
    • RFC2251: 1
    • RFC2252: 1
    • RFC2253: 1
    • RFC2254: 1
    • RFC2255: 1
    • RFC2256: 1
    • RFC2596: 1
    • RFC2696: 1
    • RFC2829: 1
    • RFC2830: 1
    • RFC2831: 2
    • RFC2849: 1
    • RFC2891: 1
pdf_data/st_metadata
  • /CreationDate: D:20240223141717+09'00'
  • /Creator: Microsoft® Word LTSC
  • /ModDate: D:20240223141717+09'00'
  • /Producer: Microsoft® Word LTSC
  • pdf_file_size_bytes: 444472
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 46
  • /Author: Staffan Persson, Scott Chapman
  • /CreationDate: D:20080423153803Z
  • /Creator: Microsoft® Office Word 2007
  • /Keywords: IBM Tivoli Directory Server, Security Target
  • /ModDate: D:20080617144724+02'00'
  • /Producer: Microsoft® Office Word 2007
  • /Subject: IBM Tivoli Directory Server
  • /Title: IBM Tivoli Directory Server 6.1 Security Target
  • pdf_file_size_bytes: 913356
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 73
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different