name |
Xerox VersaLink B615X / B605X / B615XL / B605XL with Disk OverwriteController ROM Ver. 1.90.3 |
cv act ePasslet/EACv1 v1.8 |
category |
Multi-Function Devices |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
DE |
status |
active |
archived |
not_valid_after |
05.03.2028 |
01.09.2019 |
not_valid_before |
05.03.2023 |
10.09.2012 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0778_eimg.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0778_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0797a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0778_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0797b_pdf.pdf |
manufacturer |
Xerox Corporation |
cv cryptovision GmbH |
manufacturer_web |
https://www.xerox.com |
https://www.cryptovision.com |
security_level |
{} |
EAL4+, ALC_DVS.2, AVA_VAN.5 |
dgst |
d65d0c0398c8b7f9 |
9e3c19e58e56dc19 |
heuristics/cert_id |
JISEC-CC-CRP-C0778-01-2023 |
BSI-DSZ-CC-0797-2012 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
cpe:2.3:h:xerox:versalink_b615:-:*:*:*:*:*:*:* |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 |
ALC_LCD.2, ASE_INT.1, ALC_DVS.2, ADV_FSP.2, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ATE_FUN.2, ALC_TAT.3, ALC_FLR.3, AGD_OPE.1, AGD_PRE.1, ATE_IND.3, APE_REQ.2, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_TDS.3, ALC_CMC.5, ASE_TSS.2, ASE_REQ.2, ATE_DPT.4, ADV_INT.3, APE_INT.1, APE_SPD.1, APE_OBJ.2, ASE_CCL.1, ATE_COV.3, ADV_SPM.1 |
heuristics/extracted_versions |
1.90.3 |
1.8 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0798-2012, BSI-DSZ-CC-0799-2012, BSI-DSZ-CC-0804-2012 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0710-2010, BSI-DSZ-CC-0709-2010, BSI-DSZ-CC-0633-2010, BSI-DSZ-CC-0675-2011, BSI-DSZ-CC-0730-2011, BSI-DSZ-CC-0798-2012, BSI-DSZ-CC-0674-2011, BSI-DSZ-CC-0804-2012, BSI-DSZ-CC-0555-2009, BSI-DSZ-CC-0404-2007, BSI-DSZ-CC-0799-2012, BSI-DSZ-CC-0410-2007 |
heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-0798-2012, BSI-DSZ-CC-0797-2012, BSI-DSZ-CC-0799-2012, BSI-DSZ-CC-0804-2012 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0710-2010, BSI-DSZ-CC-0439-2008, BSI-DSZ-CC-0709-2010, BSI-DSZ-CC-0797-2012, BSI-DSZ-CC-0633-2010, BSI-DSZ-CC-0675-2011, BSI-DSZ-CC-0609-2010, BSI-DSZ-CC-0730-2011, BSI-DSZ-CC-0608-2010, BSI-DSZ-CC-0798-2012, BSI-DSZ-CC-0674-2011, BSI-DSZ-CC-0417-2008, BSI-DSZ-CC-0804-2012, BSI-DSZ-CC-0555-2009, BSI-DSZ-CC-0404-2007, BSI-DSZ-CC-0799-2012, BSI-DSZ-CC-0410-2007 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0778
- certification_date: 01.03.2023
- claim: PP(Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015)
- enhanced:
- assurance_level: ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_ECD.1, ASE_REQ.1, ASE_TSS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1
- cc_version: 3.1 Release5
- cert_id: JISEC-CC-CRP-C0778
- cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000pyd-att/c0778_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is a Multifunction Device that has the functions such as copy, scan, print, fax. The TOE provides the security functionality required by the protection profile for Multifunction Device, “Protection Profile for Hardcopy Devices 1.0”. TOE security functionality The TOE provides the following security functions: Identification and Authentication Access Control Data Encryption Trusted Communications Security Management Security Auditing Trusted Operation PSTN Fax-Network Separation Overwrite Hard Disk
- evaluation_facility: Information Technology Security Center, Evaluation Department
- product: Xerox VersaLink B615X / B605X / B615XL / B605XL with Disk Overwrite
- product_type: Multifunction Device
- protection_profile: Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 (Certification Identification: JISEC-C0553)
- report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000pyd-att/c0778_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000pyd-att/c0778_est.pdf
- toe_version: Controller ROM Ver. 1.90.3
- vendor: Xerox Corporation
- expiration_date:
- supplier: Xerox Corporation
- toe_japan_name: -----
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0778_it2821.html
- toe_overseas_name: Xerox VersaLink B615X / B605X / B615XL / B605XL with Disk OverwriteController ROM Ver. 1.90.3
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0710-2010, BSI-DSZ-CC-0709-2010, BSI-DSZ-CC-0633-2010, BSI-DSZ-CC-0675-2011, BSI-DSZ-CC-0730-2011, BSI-DSZ-CC-0680-2010, BSI-DSZ-CC-0555-2009, BSI-DSZ-CC-0404-2007, BSI-DSZ-CC-0674-2011 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0710-2010, BSI-DSZ-CC-0709-2010, BSI-DSZ-CC-0633-2010, BSI-DSZ-CC-0675-2011, BSI-DSZ-CC-0730-2011, BSI-DSZ-CC-0680-2010, BSI-DSZ-CC-0555-2009, BSI-DSZ-CC-0404-2007, BSI-DSZ-CC-0674-2011, BSI-DSZ-CC-0410-2007 |
heuristics/protection_profiles |
b2cfec7a92fa2940 |
78bcc246f0f43034 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/c0553_pp.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056b.pdf |
pdf_data/cert_filename |
c0778_eimg.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- JP:
- JISEC-CC-CRP-C0778-01-2023: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 1
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20230317115648+09'00'
- /Creator: Microsoft® Word 2019
- /ModDate: D:20230317115905+09'00'
- /Producer: Microsoft® Word 2019
- pdf_file_size_bytes: 87197
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 2
|
|
pdf_data/report_filename |
c0778_erpt.pdf |
0797a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cert_id: BSI-DSZ-CC-0797-2012
- cert_item: cv act ePasslet/EACv1 v1.8
- cert_lab: BSI
- developer: cv cryptovision GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- JISEC-CC-CRP-C0778-01-2023: 1
|
- DE:
- BSI-DSZ-CC-0404: 1
- BSI-DSZ-CC-0404-2007: 4
- BSI-DSZ-CC-0410: 1
- BSI-DSZ-CC-0410-2007: 2
- BSI-DSZ-CC-0410-2010: 2
- BSI-DSZ-CC-0555: 1
- BSI-DSZ-CC-0555-2009: 3
- BSI-DSZ-CC-0633: 1
- BSI-DSZ-CC-0633-2010: 3
- BSI-DSZ-CC-0674: 1
- BSI-DSZ-CC-0674-2011: 5
- BSI-DSZ-CC-0675: 1
- BSI-DSZ-CC-0675-2011: 4
- BSI-DSZ-CC-0709: 1
- BSI-DSZ-CC-0709-2010: 4
- BSI-DSZ-CC-0710: 1
- BSI-DSZ-CC-0710-2010: 4
- BSI-DSZ-CC-0730: 1
- BSI-DSZ-CC-0730-2011: 5
- BSI-DSZ-CC-0797-2012: 26
- BSI-DSZ-CC-0798-2012: 4
- BSI-DSZ-CC-0799-2012: 2
- BSI-DSZ-CC-0804-2012: 3
- NL:
- CC-0555-2009: 1
- CC-0633-2010: 1
- CC-0675-2011: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 4: 7
- EAL 4 augmented: 3
- EAL 5: 3
- EAL1: 7
- EAL2: 3
- EAL3: 4
- EAL4: 7
- EAL5: 7
- EAL5+: 1
- EAL6: 4
- EAL7: 4
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 2
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 2
- ALC_CMS.5: 1
- ALC_DEL: 1
- ALC_DEL.1: 2
- ALC_DVS: 1
- ALC_DVS.1: 2
- ALC_DVS.2: 6
- ALC_FLR: 1
- ALC_FLR.1: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 2
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 2
- ALC_TAT.2: 1
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 1
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 6
|
pdf_data/report_keywords/cc_sfr |
- FCS:
- FCS_RBG_EXT.1: 1
- FCS_TLS_EXT.1.1: 1
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.NETWORK: 1
- A.PHYSICAL: 1
- A.TRAINED_USERS: 1
- A.TRUSTED_ADMIN: 1
- D:
- T:
- T.NET_COMPROMISE: 1
- T.TSF_COMPROMISE: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
|
|
pdf_data/report_keywords/vendor |
|
- NXP:
- NXP: 27
- NXP Semiconductors: 14
|
pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 4
|
- BrightSight:
- TUV:
- TÜV Informationstechnik: 3
- TÜViT: 3
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC: 1
- HMAC-SHA-256: 1
- HMAC-SHA-384: 1
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 27: 1
- BSI 7125: 2
- BSI 7148: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
|
- BSI:
- AIS 20: 2
- AIS 25: 2
- AIS 26: 2
- AIS 31: 2
- AIS 32: 1
- AIS 34: 3
- AIS 35: 2
- AIS 36: 2
- AIS 38: 2
- AIS36: 4
- FIPS:
- FIPS PUB 180-4: 3
- FIPS PUB 46-3: 1
- ICAO:
- PKCS:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- Report, cv act ePasslet/EACv1 v1.8, Version 7, Date 22.08.2012, TÜV Informationstechnik GmbH (confidential document) [9] Certification Report - BSI-DSZ-CC-0404-2007 for NXP Secure Smart Card Controller P5CD040V0B: 1
- OutOfScope:
- out of scope: 1
- variants of this composite TOE provide MIFARE functionality; please note that this functionality is out of scope of the TOE’s security functionality. The MRTD in context of this security target contains (i: 1
|
pdf_data/report_metadata |
- /Author:
- /CreationDate: D:20230413100050+09'00'
- /Creator: Word 用 Acrobat PDFMaker 17
- /ModDate: D:20230413100139+09'00'
- /Producer: Adobe PDF Library 17.11.238
- /SourceModified: D:20230331013825
- /Title:
- pdf_file_size_bytes: 385268
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 32
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20121009091440+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, BSI-DSZ-CC-0797-2012, cv act ePasslet/EACv1 v1.8, cv cryptovision GmbH"
- /ModDate: D:20121025112838+02'00'
- /Producer: LibreOffice 3.5
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0797-2012
- pdf_file_size_bytes: 1078468
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 42
|
pdf_data/st_filename |
c0778_est.pdf |
0797b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0404-2007: 2
- BSI-DSZ-CC-0410-2010: 1
- BSI-DSZ-CC-0555-2009: 2
- BSI-DSZ-CC-0633-2010: 2
- BSI-DSZ-CC-0674-2011: 2
- BSI-DSZ-CC-0675-2011: 2
- BSI-DSZ-CC-0680-2010: 1
- BSI-DSZ-CC-0709-2010: 2
- BSI-DSZ-CC-0710-2010: 2
- BSI-DSZ-CC-0730-2011: 2
- BSI-DSZ-CC-0797: 1
- BSI-DSZ-CC-0798: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP0056: 3
- BSI-PP-0002-2001: 1
- BSI-PP-0035-2007: 1
- BSI-PP-0055: 1
- BSI-PP-0056: 1
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4+: 1
- EAL 5+: 2
- EAL4: 7
- EAL4 augmented: 1
- EAL4+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 3
- ADV_FSP.2: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- APE:
- ASE:
- AVA:
- AVA_VAN.3: 2
- AVA_VAN.5: 4
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 13
- FAU_GEN.1: 14
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 5
- FAU_GEN.2.1: 1
- FAU_SAR.1: 6
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 4
- FAU_SAR.2.1: 1
- FAU_STG.1: 6
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 5
- FAU_STG.4.1: 1
- FAU_STG_EXT: 2
- FAU_STG_EXT.1: 5
- FAU_STG_EXT.1.1: 2
- FCS:
- FCS_CKM.1: 31
- FCS_CKM.1.1: 2
- FCS_CKM.4: 7
- FCS_CKM.4.1: 1
- FCS_CKM_EXT: 1
- FCS_CKM_EXT.4: 24
- FCS_CKM_EXT.4.1: 2
- FCS_COP.1: 87
- FCS_COP.1.1: 8
- FCS_KDF_EXT.1: 5
- FCS_KYC_EXT: 1
- FCS_KYC_EXT.1: 8
- FCS_KYC_EXT.1.1: 3
- FCS_RBG_EXT: 1
- FCS_RBG_EXT.1: 13
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 2
- FCS_SMC_EXT.1: 5
- FCS_SNI_EXT.1.1: 1
- FCS_SSH_EXT.1: 6
- FCS_TLS_EXT: 1
- FCS_TLS_EXT.1: 16
- FCS_TLS_EXT.1.1: 2
- FDP:
- FDP_ACC.1: 9
- FDP_ACC.1.1: 1
- FDP_ACF.1: 8
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_DSK_EXT: 1
- FDP_DSK_EXT.1: 7
- FDP_DSK_EXT.1.1: 2
- FDP_DSK_EXT.1.2: 2
- FDP_FXS_EXT: 1
- FDP_FXS_EXT.1: 7
- FDP_FXS_EXT.1.1: 2
- FDP_RIP.1: 4
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 4
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD: 1
- FIA_ATD.1: 6
- FIA_ATD.1.1: 1
- FIA_PMG: 3
- FIA_PMG_EXT: 1
- FIA_PMG_EXT.1: 4
- FIA_PMG_EXT.1.1: 1
- FIA_UAU.1: 10
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 4
- FIA_UAU.7.1: 1
- FIA_UID.1: 12
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB: 1
- FIA_USB.1: 4
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 5
- FMT_MOF.1.1: 1
- FMT_MSA: 1
- FMT_MSA.1: 6
- FMT_MSA.1.1: 1
- FMT_MSA.3: 6
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 8
- FMT_MTD.1.1: 1
- FMT_SMF: 2
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR: 1
- FMT_SMR.1: 10
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_KYP_EXT: 1
- FPT_KYP_EXT.1: 7
- FPT_KYP_EXT.1.1: 2
- FPT_SKP_EXT: 1
- FPT_SKP_EXT.1: 6
- FPT_SKP_EXT.1.1: 2
- FPT_STM.1: 7
- FPT_STM.1.1: 1
- FPT_TST_EXT: 1
- FPT_TST_EXT.1: 7
- FPT_TST_EXT.1.1: 2
- FPT_TUD_EXT: 2
- FPT_TUD_EXT.1: 7
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 3
- FTA:
- FTA_SSL.3: 4
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 10
- FTP_ITC.1.1: 3
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 10
- FTP_TRP.1.1: 4
- FTP_TRP.1.2: 2
- FTP_TRP.1.3: 2
|
- FAU:
- FAU_ARP: 1
- FAU_GEN: 1
- FAU_SAA.1: 1
- FAU_SAS: 7
- FAU_SAS.1: 13
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 3
- FCS_CKM.1: 29
- FCS_CKM.1.1: 3
- FCS_CKM.2: 3
- FCS_CKM.3: 1
- FCS_CKM.4: 24
- FCS_CKM.4.1: 3
- FCS_COP: 48
- FCS_COP.1: 15
- FCS_RND: 8
- FCS_RND.1: 12
- FCS_RND.1.1: 3
- FCS_RNG.1: 1
- FDP:
- FDP_ACC: 3
- FDP_ACC.1: 19
- FDP_ACC.1.1: 1
- FDP_ACF: 7
- FDP_ACF.1: 11
- FDP_ACF.1.1: 4
- FDP_ACF.1.2: 6
- FDP_ACF.1.3: 4
- FDP_ACF.1.4: 5
- FDP_ETC.1: 1
- FDP_IFC: 2
- FDP_IFC.1: 4
- FDP_IFF: 1
- FDP_ITC: 1
- FDP_ITC.1: 11
- FDP_ITC.2: 10
- FDP_ITT: 1
- FDP_RIP.1: 1
- FDP_ROL: 1
- FDP_SDI.2: 1
- FDP_UCT: 2
- FDP_UCT.1: 9
- FDP_UCT.1.1: 4
- FDP_UIT: 3
- FDP_UIT.1: 8
- FDP_UIT.1.1: 4
- FDP_UIT.1.2: 5
- FIA:
- FIA_AFL: 2
- FIA_API: 6
- FIA_API.1: 10
- FIA_API.1.1: 3
- FIA_ATD: 1
- FIA_SOS.2: 1
- FIA_UAU: 6
- FIA_UAU.1: 9
- FIA_UAU.1.1: 3
- FIA_UAU.1.2: 3
- FIA_UAU.2: 1
- FIA_UAU.4: 11
- FIA_UAU.4.1: 1
- FIA_UAU.5: 11
- FIA_UAU.5.1: 5
- FIA_UAU.5.2: 5
- FIA_UAU.6: 11
- FIA_UAU.6.1: 1
- FIA_UID: 3
- FIA_UID.1: 13
- FIA_UID.1.1: 3
- FIA_UID.1.2: 3
- FIA_USB.1: 1
- FMT:
- FMT_LIM: 7
- FMT_LIM.1: 29
- FMT_LIM.1.1: 3
- FMT_LIM.2: 26
- FMT_LIM.2.1: 4
- FMT_MSA: 6
- FMT_MSA.1: 1
- FMT_MSA.3: 3
- FMT_MTD: 49
- FMT_MTD.1: 34
- FMT_MTD.3: 9
- FMT_MTD.3.1: 4
- FMT_SMF: 1
- FMT_SMF.1: 33
- FMT_SMF.1.1: 2
- FMT_SMR: 4
- FMT_SMR.1: 32
- FMT_SMR.1.1: 4
- FMT_SMR.1.2: 3
- FPR:
- FPT:
- FPT_FLS: 3
- FPT_FLS.1: 10
- FPT_FLS.1.1: 3
- FPT_ITT: 1
- FPT_PHP: 1
- FPT_PHP.1: 1
- FPT_PHP.3: 12
- FPT_PHP.3.1: 2
- FPT_RCV: 2
- FPT_RVM.1: 1
- FPT_SEP.1: 1
- FPT_TDC.1: 1
- FPT_TST.1: 12
- FPT_TST.1.1: 2
- FPT_TST.1.2: 2
- FPT_TST.1.3: 2
- FRU:
- FTP:
- FTP_ITC: 1
- FTP_ITC.1: 5
- FTP_TRP.1: 5
|
pdf_data/st_keywords/cc_claims |
- A:
- A.NETWORK: 1
- A.PHYSICAL: 1
- A.TRAINED_USERS: 1
- A.TRUSTED_ADMIN: 1
- D:
- O:
- O.ACCESS: 1
- O.ACCESS_CONTROL: 6
- O.ADMIN_ROLES: 4
- O.AUDIT: 9
- O.COMMS: 1
- O.COMMS_PROTECTION: 11
- O.FAX_NET_SEPARATION: 1
- O.IMAGE_OVERWRITE: 1
- O.KEY_MATERIAL: 1
- O.PURGE_DATA: 2
- O.STORAGE_ENCRYPTION: 6
- O.TSF_SELF_TEST: 1
- O.UPDATE: 1
- O.UPDATE_VERIFICATION: 1
- O.USER_AUTHORIZATION: 7
- OE:
- OE.ADMIN_TRAININ: 1
- OE.ADMIN_TRUST: 1
- OE.NETWORK_PROT: 1
- OE.PHYSICAL_PROTE: 1
- OE.USER_TRAINING: 1
- T:
- T.NET_COMPROMISE: 1
- T.TSF_COMPROMISE: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_A: 1
- T.UNAUTHORIZED_U: 1
|
- A:
- O:
- O.ALARM: 1
- O.CARD-MANAGEMENT: 1
- O.CIPHER: 1
- O.FAULT_PROTECT: 1
- O.FIREWALL: 1
- O.IDENTIFICATION: 1
- O.KEY-MNGT: 1
- O.MF_FW: 1
- O.OPERATE: 1
- O.OS_DECEIVE: 1
- O.PHYSICAL: 1
- O.PIN-MNGT: 1
- O.PROTECT_DATA: 1
- O.REALLOCATION: 1
- O.RESOURCES: 1
- O.RND: 1
- O.SCP: 3
- O.SHRD_VAR_CONFID: 1
- O.SHRD_VAR_INTEG: 1
- O.SID: 1
- O.SIDE_CHANNEL: 1
- O.TRANSACTION: 1
- OE:
- OE.BAC-PP: 4
- OE.BAC_PP: 1
- OE.MRTD_: 2
- T:
- T.ACCESS_DATA: 1
- T.CONFID-JCSCODE: 1
- T.CONFID-JCSDATA: 1
- T.CONFIDAPPLI-DATA: 1
- T.EXE-CODE: 2
- T.FAULT: 1
- T.INTEG-APPLICODE: 1
- T.INTEG-APPLIDATA: 1
- T.INTEG-JCSCODE: 1
- T.INTEG-JCSDATA: 1
- T.LEAKAGE: 1
- T.OS_DECEIVE: 1
- T.OS_OPERATE: 1
- T.PHYSICAL: 1
- T.RESOURCES: 1
- T.RND: 1
- T.SID: 2
|
pdf_data/st_keywords/vendor |
|
- NXP:
- NXP: 25
- NXP Semiconductors: 8
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 8
- SHA-384: 4
- SHA-512: 3
- SHA256: 6
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IPsec:
- SSH:
- TLS:
- TLS:
- TLS: 58
- TLS 1.0: 2
- TLS 1.1: 2
- TLS 1.2: 3
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 10
- P-384: 6
- P-521: 6
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 2
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 3
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 3
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 3
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 3
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 3
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 3
- TLS_RSA_WITH_AES_128_CBC_SHA: 3
- TLS_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_RSA_WITH_AES_256_CBC_SHA: 2
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 4
- Physical Tampering: 5
- Physical tampering: 1
- fault injection: 1
- malfunction: 7
- physical tampering: 1
- SCA:
- DPA: 2
- SPA: 1
- physical probing: 5
- timing attacks: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.COM: 15
- EF.DG1: 27
- EF.DG14: 7
- EF.DG16: 28
- EF.DG2: 10
- EF.DG3: 39
- EF.DG4: 38
- EF.DG5: 9
- EF.SOD: 16
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS PUB 180-3: 1
- FIPS PUB 186-4: 7
- FIPS PUB 197: 1
- FIPS PUB 198-1: 1
- ISO:
- ISO/IEC 10116: 4
- ISO/IEC 18031:2011: 3
- ISO/IEC 18033-3: 1
- ISO/IEC 19772: 4
- ISO/IEC18031:2011: 1
- NIST:
- NIST SP 800-38A: 1
- NIST SP 800-38B: 1
- NIST SP 800-38C: 1
- NIST SP 800-38D: 1
- NIST SP 800-90A: 2
- RFC:
- RFC 2246: 2
- RFC 2818: 3
- RFC 4346: 2
- RFC 5246: 2
- X509:
|
- BSI:
- AIS 20: 2
- AIS20: 2
- AIS31: 1
- CC:
- FIPS:
- FIPS 180-29: 1
- FIPS 46-3: 1
- FIPS 46-312: 1
- FIPS PUB 46-3: 1
- FIPS180-2: 1
- FIPS186-2: 1
- FIPS197: 1
- FIPS46-3: 1
- ICAO:
- ISO:
- ISO/IEC 15946-1: 1
- ISO/IEC 15946-2: 1
- ISO/IEC 7816-4: 1
- ISO/IEC 9796-2: 1
- PKCS:
- PKCS#15: 3
- PKCS#3: 2
- PKCS3: 1
- RFC:
- RFC 2631: 1
- RFC3369: 1
- RFC4493: 1
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
- com:
- com.cryptovision: 5
- com.cryptovision.applet: 2
- com.cryptovision.eid: 1
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- 1 No correspondence Out of scope No contradiction to this ST T.EXE-CODE.2 No correspondence Out of scope No contradiction to this ST T.RESOURCES No correspondence Out of scope No contradiction to this ST: 1
- Correspondence in this ST References/Remarks No contradiction to this ST O.MF_FW No correspondence Out of scope No contradiction to this ST O.OPERATE No correspondence Out of scope No contradiction to this ST O: 1
- JCOP AID management) No contradiction to this ST FIA_USB.1 No correspondence Out of scope (JCOP applet manage- ment: 1
- JCOP access control mechanisms) No contradiction to this ST FDP_ACF.1/CMGR No correspondence Out of scope (JCOP access control mechanisms: 1
- JCOP access control mechanisms) No contradiction to this ST FDP_ETC.1 No correspondence Out of scope (JCOP data control mech- anisms: 1
- JCOP data control mech- anisms) No contradiction to this ST FDP_IFC.1/JCVM No correspondence Out of scope (refers to Virtual Ma- chine) No contradiction to this ST FDP_IFC.1/SCP No correspondence No: 1
- JCOP firewall mecha- nism) No contradiction to this ST FDP_ACF.1/FIREWALL No correspondence Out of scope (JCOP access control mechanisms) No contradiction to this ST FDP_ACF.1/CMGR No correspondence Out: 1
- JCOP firewall mecha- nism) No contradiction to this ST FMT_MSA.1/CMGR No correspondence Out of scope (JCOP firewall mecha- nism: 1
- JCOP firewall mecha- nism) No contradiction to this ST FMT_MSA.2/JCRE No correspondence Out of scope (JCOP object handling) No contradiction to this ST FMT_MSA.3/FIREWALL No correspondence Out of: 1
- JCOP firewall mecha- nism) No contradiction to this ST FMT_MSA.3/CMGR No correspondence Out of scope (JCOP firewall mecha- nism) No contradiction to this ST FMT_MSA.3/SCP No correspondence Out of: 1
- JCOP firewall mecha- nism) No contradiction to this ST FMT_MSA.3/SCP No correspondence Out of scope (JCOP firewall mecha- nism: 1
- JCOP firewall mecha- nism) No contradiction to this ST FMT_MTD.1/JCRE No correspondence Out of scope (modyfing list of regis- tered applets’ AID). No contradiction to this ST FMT_MTD.3 No: 1
- JCOP memory manage- ment) No contradiction to this ST FDP_ACC.2/FIREWALL No correspondence Out of scope (JCOP firewall mecha- nism: 1
- JCOP object handling) No contradiction to this ST FMT_MSA.3/FIREWALL No correspondence Out of scope (JCOP firewall mecha- nism: 1
- JCOP specific roles) No contradiction to this ST FMT_SMR.1/CMGR No correspondence Out of scope (JCOP specific roles: 1
- LC state before Applet instan- tiation No contradiction to this ST FDP_ACC.1/SCP No correspondence Out of scope (JCOP memory manage- ment) No contradiction to this ST FDP_ACC.2/FIREWALL No correspondence Out of: 1
- LC state before Applet instan- tiation No contradiction to this ST FIA_UID.2/AID No correspondence Out of scope (JCOP AID management) No contradiction to this ST FIA_USB.1 No correspondence Out of scope (JCOP: 1
- LEAKAGE T.Information_Leakage T.FAULT T.Malfunction T.RND No correspondence Out of scope No contradiction to this ST T.PHYSICAL T.Phys-Tamper T.CONFID-JCSCODE No correspondence Out of: 1
- No contradiction to this ST FDP_ROL.1/FIREWALL No correspondence Out of scope (refers to Virtual Ma- chine) No contradiction to this ST FDP_SDI.2 No correspondence Out of scope: 1
- No contradiction to this ST FIA: Identification and Authentication FIA_AFL.1/PIN No correspondence Out of scope (no PINs used within ap- plet) No contradiction to this ST FIA_AFL.1/CMGR No correspondence Out of: 1
- No contradiction to this ST T.SID.1 No correspondence Out of scope No contradiction to this ST T.SID.2 No correspondence Out of scope No contradiction to this ST T: 1
- No correspondence Out of scope No contradiction to this ST O.FIREWALL No correspondence Out of scope No contradiction to this ST O.REALLOCATION No correspondence Out of scope No contradiction to this: 1
- No correspondence Out of scope No contradiction to this ST O.SCP.RECOVERY No correspondence Out of scope No contradiction to this ST O.SCP.SUPPORT No correspondence Out of scope No contradiction to this: 1
- O.CIPHER No correspondence Out of scope No contradiction to this ST O.PIN-MNGT No correspondence Out of scope No contradiction to this ST O.KEY-MNGT No correspondence Out of scope No contradiction to this ST O: 1
- O.PHYSICAL OT.Prot_Phys-Tamper O.IDENTIFICATION OT.Identification O.RND No correspondence Out of scope No contradiction to this ST O.SID No correspondence Out of scope cv act ePasslet/EACv1 Security: 1
- O.SCP.IC No correspondence Out of scope No contradiction to this ST Table 4: Relevant platform objectives and their correspondence 2.2.4: 1
- O.SHRD_VAR_CONFID No correspondence Out of scope No contradiction to this ST O.SHRD_VAR_INTEG No correspondence Out of scope No contradiction to: 1
- Out of scope: 65
- Out of scope (JCOP LF state handling) No contradiction to this ST FMT_SMF.1 FMT_SMF.1 Fullfillment of the: 1
- Out of scope (JCOP internal) No contradiction to this ST Table 3: Relevant platform SFRs and their: 1
- SFR is used for fulfillment of the SFR of this ST. FMT_SMR.1/JCRE No correspondence Out of scope (JCOP specific roles) No contradiction to this ST FMT_SMR.1/CMGR No correspondence Out of scope: 1
- ST O.ALARM No correspondence Out of scope No contradiction to this ST O.TRANSACTION No correspondence Out of scope No contradiction to this: 1
- ST T.INTEG-JCSCODE No correspondence Out of scope No contradiction to this ST T.INTEG-APPLIDATA T.Forgery T.INTEG-JCSDATA No correspondence Out of: 1
- equivalent. No contradiction to the ST. FRU: Resource Utilisation FRU_FLT.2/SCP No correspondence Out of scope (JCOP internal) No contradiction to this ST FTP: Trusted Path/Channels FTP_ITC.1/CMGR No: 1
- for detecting security violations complement JCOP mechanisms FPT_ITT.1/SCP No correspondence Out of scope (platform internal data transfer) No contradiction to this ST FPT_PHP.1 No correspondence Out of: 1
- in this ST References/Remarks No contradiction to this ST FDP_ITT.1/SCP No correspondence Out of scope (platform internal data transfer) No contradiction to this ST FDP_RIP.1 FCS_CKM.4 Relied on for key: 1
- in this ST References/Remarks T.ACCESS_DATA T.Read_Sensitive_Data T.OS_OPERATE No correspondence Out of scope No contradiction to this ST T.OS_DECEIVE No correspondence Out of scope No contradiction to this ST: 1
- is refinement of the platform SFR. No contradictions to this ST. FMT_MSA.1/JCRE No correspondence Out of scope (JCOP firewall mecha- nism) No contradiction to this ST FMT_MSA.1/CMGR No correspondence Out of: 1
- managed within JCOP) No contradiction to this ST FCS_CKM.3 No correspondence Out of scope (managed within JCOP: 1
- modyfing list of regis- tered applets’ AID). No contradiction to this ST FMT_MTD.3 No correspondence Out of scope (JCOP LF state handling: 1
- no PINs used within ap- plet) No contradiction to this ST FIA_AFL.1/CMGR No correspondence Out of scope (refers to card manager: 1
- out of scope: 1
- platform SFR correspond to the Diffie-Hellman and ECDH keys of this ST. FCS_CKM.2 No correspondence Out of scope (managed within JCOP) No contradiction to this ST FCS_CKM.3 No correspondence Out of scope (managed: 1
- platform internal data transfer) No contradiction to this ST FPT_PHP.1 No correspondence Out of scope (hardware mechanism: 1
- refers to Virtual Ma- chine) No contradiction to this ST FDP_ITC.1 No correspondence Out of scope (JCOP data control mech- anisms: 1
- refers to Virtual Ma- chine) No contradiction to this ST FDP_SDI.2 No correspondence Out of scope (JCOP internal data integ- rity protection: 1
- refers to card manager) No contradiction to this ST FIA_ATD.1/AID No correspondence Out of scope (JCOP AID management) No contradiction to this ST FIA_UAU.1 FIA_UAU.1 The SFR in this ST extends: 1
- scope (JCOP access control mechanisms) No contradiction to this ST FDP_ACF.1/SCP No correspondence Out of scope (JCOP access control mechanisms) No contradiction to this ST FDP_ETC.1 No correspondence Out of: 1
- specific roles) No contradiction to this ST FPR: Privacy FPR_UNO.1 No correspondence Out of scope (JCOP package separa- tion) No contradiction to this ST FPT: Protection of the TSF FPT_EMSEC.1: 1
- to this ST FDP_IFF.1/JCVM No correspondence Out of scope (refers to Virtual Ma- chine) No contradiction to this ST FDP_ITC.1 No correspondence Out of scope: 1
- to this ST T.CONFIDAPPLI-DATA T.Information_Leakage T.CONFID-JCSDATA No correspondence Out of scope No contradiction to this ST T.INTEG-APPLICODE No correspondence Out of scope No contradiction to: 1
- variants of this composite TOE provide MIFARE functionality; please note that this functionality is out of scope of the TOE’s security functionality claimed by this Security Target. 1.3.3 TOE usage and security: 1
|
pdf_data/st_metadata |
|
- /Author: cryptovision GmbH
- /CreationDate: D:20120817105834+02'00'
- /Creator: Microsoft® Office Word 2007
- /Keywords: ePasslet Suite, ICAO LDS, Extended Access Control, TR03110
- /ModDate: D:20121025113858+02'00'
- /Producer: Microsoft® Office Word 2007
- /Subject: Common Criteria Certification BSI-DSZ-CC-0797
- /Title: Security Target - cv act ePasslet/EACv1 v1.8
- pdf_file_size_bytes: 1970928
- pdf_hyperlinks: file:///C:/Dokumente%20und%20Einstellungen/tzeggel/Desktop/glossar.htm%23aes
- pdf_is_encrypted: False
- pdf_number_of_pages: 89
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |