Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Database Engine of Microsoft SQL Server 2005 SP2, Enterprise Edition (English) Version 9.00.3068.00
BSI-DSZ-CC-0366-2008
Plateforme Java Card MultiApp Essential v1.0, en configuration ouverte, sur le composant Infineon M7793 A12 ou G12
ANSSI-CC-2015/73
name Database Engine of Microsoft SQL Server 2005 SP2, Enterprise Edition (English) Version 9.00.3068.00 Plateforme Java Card MultiApp Essential v1.0, en configuration ouverte, sur le composant Infineon M7793 A12 ou G12
category Databases ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme DE FR
not_valid_after 01.09.2019 05.01.2021
not_valid_before 24.10.2008 05.01.2016
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0366a.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015-73.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0366b.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible2015-73lite.pdf
manufacturer Microsoft Corporation Gemalto - Infineon Technologies AG
manufacturer_web https://www.microsoft.com https://www.gemalto.com/
security_level EAL4+, ALC_FLR.2 EAL5+, ALC_DVS.2, AVA_VAN.5
dgst e3e8d64b1e2d40d5 37f694d2de25cb63
heuristics/cert_id BSI-DSZ-CC-0366-2008 ANSSI-CC-2015/73
heuristics/cert_lab BSI SERMA
heuristics/extracted_sars ADV_RCR.1, AVA_VLA.2, ADV_HLD.2, AGD_USR.1, AVA_SOF.1, ADV_FSP.2, ADV_IMP.1, ATE_COV.2, ALC_TAT.1, AVA_MSU.2, AGD_ADM.1, ALC_LCD.1, ATE_FUN.1, ATE_DPT.1, ALC_FLR.2, ALC_DVS.1, ATE_IND.2, ADV_LLD.1, ADV_SPM.1 ALC_DVS.2, AVA_VAN.5
heuristics/extracted_versions 9.00.3068.00 1.0
heuristics/report_references/directly_referenced_by {} ANSSI-CC-2016/23, ANSSI-CC-2016/06
heuristics/report_references/directly_referencing CCEVS-VR-0131-2005 BSI-DSZ-CC-0926-2014
heuristics/report_references/indirectly_referenced_by {} ANSSI-CC-2016/24, ANSSI-CC-2016/23, ANSSI-CC-2016/06
heuristics/report_references/indirectly_referencing CCEVS-VR-0131-2005 BSI-DSZ-CC-0757-2011, BSI-DSZ-CC-0926-2014, BSI-DSZ-CC-0907-2013
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0926-2014
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0926-2014
heuristics/protection_profiles 7d1054ebab3d212f 9399bd94f9925b16
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_DBMS_BR_V1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-profil_PP-2010-03en.pdf
pdf_data/report_filename 0366a.pdf ANSSI-CC-2015-73.pdf
pdf_data/report_frontpage
  • FR:
  • DE:
    • cert_id: BSI-DSZ-CC-0366-2008
    • cert_item: Database Engine of Microsoft SQL Server 2005 SP2, Enterprise Edition (English) Version 9.00.3068.00
    • cert_lab: BSI
    • developer: Microsoft Corporation
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
  • FR:
    • cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
    • cc_version: Critères Communs version 3.1 révision 4
    • cert_id: ANSSI-CC-2015/73
    • cert_item: Plateforme Java Card MultiApp Essential v1.0, en configuration ouverte, sur le composant Infineon M7793 A12 ou G12
    • cert_item_version: Version 1.0
    • cert_lab: Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
    • developer: Gemalto 6 rue de la Verrerie, 92190 Meudon Cedex, France Infineon Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92190 Meudon Cedex, France
    • match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
    • ref_protection_profiles: Java Card System Protection Profile – Open Configuration [PP-JCS Open Configuration], version 3.0
  • DE:
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0366: 1
    • BSI-DSZ-CC-0366-2008: 18
  • US:
    • CCEVS-VR-05-0131: 1
  • DE:
    • BSI-DSZ-CC-0926-2014: 1
  • FR:
    • ANSSI-CC-2015/73: 21
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 4: 7
    • EAL 4 augmented: 4
    • EAL 7: 1
    • EAL1: 5
    • EAL2: 3
    • EAL3: 4
    • EAL4: 6
    • EAL5: 6
    • EAL6: 3
    • EAL7: 4
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 5: 3
    • EAL 7: 1
    • EAL2: 2
    • EAL5: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ACM:
    • ACM_AUT: 2
    • ACM_CAP: 2
    • ACM_SCP: 2
  • ADO:
    • ADO_DEL: 2
    • ADO_IGS: 2
  • ADV:
    • ADV_FSP: 2
    • ADV_HLD: 2
    • ADV_IMP: 2
    • ADV_INT: 2
    • ADV_LLD: 2
    • ADV_RCR: 2
    • ADV_SPM: 2
  • AGD:
    • AGD_ADM: 2
    • AGD_USR: 2
  • ALC:
    • ALC_DVS: 2
    • ALC_FLR: 2
    • ALC_FLR.2: 5
    • ALC_LCD: 1
    • ALC_TAT: 2
  • APE:
    • APE_DES: 1
    • APE_ENV: 1
    • APE_INT: 1
    • APE_OBJ: 1
    • APE_REQ: 1
    • APE_SRE: 1
  • ASE:
    • ASE_DES: 1
    • ASE_ENV: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_PPC: 1
    • ASE_REQ: 1
    • ASE_SRE: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 2
    • ATE_DPT: 2
    • ATE_FUN: 2
    • ATE_IND: 2
  • AVA:
    • AVA_CCA: 2
    • AVA_MSU: 2
    • AVA_SOF: 3
    • AVA_VLA: 3
    • AVA_VLA.2: 1
    • AVA_VLA.3: 1
    • AVA_VLA.4: 1
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 2
    • AGD_PRE: 2
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 3
    • ALC_FLR: 2
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 5
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 23
    • Microsoft Corporation: 11
  • Gemalto:
    • Gemalto: 3
  • Infineon:
    • Infineon: 25
    • Infineon Technologies: 1
pdf_data/report_keywords/eval_facility
  • TUV:
    • TÜV Informationstechnik: 2
  • Serma:
    • SERMA: 1
    • Serma Technologies: 1
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 5
pdf_data/report_keywords/crypto_protocol
  • PACE:
    • PACE: 1
pdf_data/report_keywords/crypto_library
  • Infineon:
    • v1.02.013: 3
pdf_data/report_keywords/side_channel_analysis
  • other:
    • JIL: 1
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI 7149: 1
pdf_data/report_keywords/tee_name
  • IBM:
    • SE: 1
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 32: 1
    • AIS 34: 1
    • AIS1: 1
    • AIS11: 1
    • AIS14: 1
    • AIS19: 1
    • AIS23: 1
  • ISO:
    • ISO/IEC 15408:2005: 2
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Server 2005, Enterprise Edition (English), Version 9.00.3068.00, Size: 360573 bytes, 2008-07-23 (confidential documents) [9] U.S. Government Protection Profile for Database Management Systems in Basic Robustness: 1
    • of Microsoft SQL Server 2005, Enterprise Edition (English) Version 9.00.3068.00, ITSEF: TÜVIT (confidential document) [8] Configuration Management Microsoft SQL Server 2005 Database, Engine Common Criteria Evaluation: 1
pdf_data/report_metadata
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20081113135858+01'00'
  • /Creator: Writer
  • /Keywords: "BSI-DSZ-CC-0366-2008, Common Criteria, Certification, Zertifizierung, One Microsoft Way, Redmond, WA 98052-6399, USA, Database Engine of Microsoft SQL Server 2005, Enterprise Edition (English) Version 9.00.3068.00"
  • /ModDate: D:20081117153915+01'00'
  • /Producer: StarOffice 8
  • /Subject: Common Criteria, Certification
  • /Title: Certification Report BSI-DSZ-CC-0366-2008
  • pdf_file_size_bytes: 676834
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 36
  • /Author: Jonathan Gimenez
  • /CreationDate: D:20160106150825+01'00'
  • /Creator: Microsoft® Word 2010
  • /Keywords: ANSSI-CC-CER-F-07.017
  • /ModDate: D:20160106150825+01'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: Plateforme Java Card MultiApp Essential v1.0, en configuration ouverte, sur le composant Infineon M7793 A12 ou G12
  • /Title: ANSSI-CC-2015/73
  • pdf_file_size_bytes: 794770
  • pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 20
pdf_data/st_filename 0366b.pdf cible2015-73lite.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-366: 1
  • DE:
    • BSI-DSZ-CC-0926-2014: 1
  • FR:
    • ANSSI-CC-PP-2010/03-M01: 1
  • NL:
    • CC-1: 2
    • CC-2: 3
    • CC-3: 3
pdf_data/st_keywords/cc_protection_profile_id
  • ANSSI:
    • ANSSI-CC-PP-2010/03-M01: 1
  • BSI:
    • BSI-CC-PP-0059-2009-MA-01: 1
    • BSI-CC-PP-0071: 1
    • BSI-CC-PP-0072: 1
    • BSI-CC-PP-0075: 1
    • BSI-CC-PP-0076: 1
    • BSI-PP-0035: 1
  • other:
    • PP-SSCD-P2: 1
    • PP-SSCD-P3: 1
    • PP-SSCD-P4: 1
    • PP-SSCD-P5: 1
    • PP-SSCD-P6: 1
    • PP-SSCD-T2: 1
    • PP-SSCD-T3: 1
    • PP-SSCD-T4: 1
    • PP-SSCD-T5: 1
    • PP-SSCD-T6: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 4: 9
    • EAL 4 augmented: 7
    • EAL1: 1
    • EAL4: 3
    • EAL4 augmented: 3
    • EAL4+: 1
  • EAL:
    • EAL 5+: 1
    • EAL5: 2
    • EAL5 augmented: 2
    • EAL5+: 1
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_AUT.1: 1
    • ACM_CAP.4: 1
    • ACM_SCP.2: 1
  • ADO:
    • ADO_DEL.2: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP.2: 2
    • ADV_HLD.2: 2
    • ADV_IMP.1: 2
    • ADV_LLD.1: 2
    • ADV_RCR.1: 2
    • ADV_SPM.1: 1
  • AGD:
    • AGD_ADM.1: 2
    • AGD_USR.1: 1
  • ALC:
    • ALC_DVS.1: 1
    • ALC_FLR.2: 16
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.1: 1
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_MSU.2: 2
    • AVA_SOF.1: 2
    • AVA_VLA.2: 6
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_TDS: 1
  • ALC:
    • ALC_DVS.2: 2
  • AVA:
    • AVA_VAN.5: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 12
    • FAU_GEN.1: 4
    • FAU_GEN.2: 2
    • FAU_GEN_EXP.2: 10
    • FAU_GEN_EXP.2.1: 1
    • FAU_SEL: 9
    • FAU_SEL.1: 2
    • FAU_STG.1: 1
    • FAU_STG.4: 1
    • FAU_STG_EXP.4: 8
    • FAU_STG_EXP.4.1: 3
  • FCS:
    • FCS_COP.1: 1
  • FDP:
    • FDP_ACC.1: 12
    • FDP_ACC.1.1: 1
    • FDP_ACC.2: 1
    • FDP_ACF: 10
    • FDP_ACF.1: 7
    • FDP_ACF.1.3: 1
    • FDP_IFC.1: 1
    • FDP_RIP.1: 3
    • FDP_RIP.2: 11
    • FDP_RIP.2.1: 1
  • FIA:
    • FIA_ATD.1: 10
    • FIA_ATD.1.1: 2
    • FIA_UAU.1: 1
    • FIA_UAU.2: 9
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 10
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UID.1: 10
    • FIA_UID.2: 11
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF.1: 8
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 9
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 4
    • FMT_MSA.3.2: 1
    • FMT_MSA_EXP.3: 10
    • FMT_MSA_EXP.3.1: 1
    • FMT_MTD.1: 8
    • FMT_MTD.1.1: 1
    • FMT_REV.1: 17
    • FMT_REV.1.1: 2
    • FMT_REV.1.2: 4
    • FMT_SMF.1: 11
    • FMT_SMF.1.1: 2
    • FMT_SMR.1: 16
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_RVM.1: 1
    • FPT_SEP: 1
    • FPT_SEP.1: 4
    • FPT_SEP_EXP.1: 11
    • FPT_SEP_EXP.1.1: 1
    • FPT_SEP_EXP.1.2: 1
    • FPT_STM.1: 2
    • FPT_TRC.1: 1
    • FPT_TRC.1.1: 1
    • FPT_TRC.1.2: 1
    • FPT_TRC_EXP.1: 11
    • FPT_TRC_EXP.1.1: 1
  • FTA:
    • FTA_MCS.1: 9
    • FTA_MCS.1.1: 1
    • FTA_MCS.1.2: 2
    • FTA_TAH.1: 1
    • FTA_TAH_EXP.1: 10
    • FTA_TAH_EXP.1.1: 1
    • FTA_TAH_EXP.1.2: 1
    • FTA_TSE.1: 9
    • FTA_TSE.1.1: 2
  • FAU:
    • FAU_ARP.1: 5
    • FAU_ARP.1.1: 1
  • FCO:
    • FCO_NRO: 2
    • FCO_NRO.2: 3
  • FCS:
    • FCS_CKM.1: 6
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.2.1: 1
    • FCS_CKM.3: 2
    • FCS_CKM.3.1: 1
    • FCS_CKM.4: 2
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 10
    • FCS_COP.1.1: 1
    • FCS_RND: 7
    • FCS_RND.1: 7
    • FCS_RND.1.1: 2
  • FDP:
    • FDP_ACC: 14
    • FDP_ACC.1: 1
    • FDP_ACC.2: 6
    • FDP_ACF: 16
    • FDP_ACF.1: 13
    • FDP_IFC: 4
    • FDP_IFC.1: 1
    • FDP_IFC.2: 2
    • FDP_IFF: 4
    • FDP_IFF.1: 10
    • FDP_ITC: 4
    • FDP_ITC.2: 5
    • FDP_RIP: 17
    • FDP_RIP.1: 8
    • FDP_ROL: 6
    • FDP_ROL.1: 2
    • FDP_SDI.2: 2
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UIT: 2
    • FDP_UIT.1: 2
  • FIA:
    • FIA_ATD: 3
    • FIA_ATD.1: 1
    • FIA_SOS.2: 1
    • FIA_UAI.1: 1
    • FIA_UAU: 2
    • FIA_UAU.1: 1
    • FIA_UID: 4
    • FIA_UID.1: 2
    • FIA_UID.2: 1
    • FIA_USB: 2
    • FIA_USB.1: 3
  • FMT:
    • FMT_MSA: 21
    • FMT_MSA.1: 5
    • FMT_MSA.2: 1
    • FMT_MSA.3: 10
    • FMT_MTD: 3
    • FMT_MTD.1: 2
    • FMT_MTD.3: 1
    • FMT_SMF: 6
    • FMT_SMF.1: 3
    • FMT_SMR: 9
    • FMT_SMR.1: 8
  • FPR:
    • FPR_UNO: 2
    • FPR_UNO.1: 3
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_FLS: 10
    • FPT_FLS.1: 5
    • FPT_ITT: 2
    • FPT_ITT.1: 1
    • FPT_PHP: 2
    • FPT_PHP.3: 1
    • FPT_RCV: 4
    • FPT_RCV.3: 4
    • FPT_RCV.4: 1
    • FPT_TDC.1: 2
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TST: 2
    • FPT_TST.1: 3
  • FTP:
    • FTP_ITC: 2
    • FTP_ITC.1: 3
pdf_data/st_keywords/cc_claims
  • A:
    • A.COMM: 5
    • A.NO_EVIL: 3
    • A.NO_GENERAL_PURPOSE: 3
    • A.OS_PP_VALIDATED: 5
    • A.PHYSICAL: 3
  • O:
    • O.ACCESS_HISTORY: 5
    • O.ADMIN_GUIDANCE: 8
    • O.ADMIN_ROLE: 5
    • O.AUDIT_GENERATION: 4
    • O.CONFIGURATION_IDENTIFICAT: 2
    • O.CONFIGURATION_IDENTIFICATI: 2
    • O.CONFIGURATION_IDENTIFICATIO: 1
    • O.CONFIGURATION_IDENTIFICATION: 3
    • O.DOCUMENTED_DESIGN: 6
    • O.INTERNAL_TOE_DOMAINS: 5
    • O.MANAGE: 5
    • O.MEDIATE: 5
    • O.PARTIAL_FUNCTIONAL_T: 2
    • O.PARTIAL_FUNCTIONAL_TEST: 4
    • O.PARTIAL_SELF_PROTECTI: 2
    • O.PARTIAL_SELF_PROTECTION: 3
    • O.RESIDUAL_INFORMATION: 7
    • O.TOE_ACCESS: 7
    • O.VULNERABILITY_ANALSIS: 1
    • O.VULNERABILITY_ANALY: 1
    • O.VULNERABILITY_ANALYSI: 3
    • O.VULNERABILITY_ANALYSIS: 3
  • OE:
    • OE.COMM: 6
    • OE.NO_EVIL: 4
    • OE.NO_GENERAL_: 2
    • OE.NO_GENERAL_PURPOSE: 1
    • OE.OS_PP_VALIDATED: 5
    • OE.PHYSICAL: 3
  • R:
    • R.COMM: 3
    • R.EVL: 4
  • T:
    • T.ACCIDENTAL_ADMIN_ERR: 1
    • T.ACCIDENTAL_ADMIN_ERROR: 1
    • T.MASQUERADE: 3
    • T.POOR_DESIGN: 3
    • T.POOR_IMPLEMENTATIO: 1
    • T.POOR_IMPLEMENTATION: 2
    • T.POOR_TEST: 3
    • T.RESIDUAL_DATA: 4
    • T.TSF_COMPROMISE: 3
    • T.UNAUTHORIZED_ACCESS: 2
    • T.UNAUTHORIZED_ACCSS: 1
    • T.UNIDENTIFIED_ACTIONS: 3
  • A:
    • A.APPLET: 4
    • A.DELETION: 5
    • A.VERIFICATION: 4
  • D:
    • D.API_DATA: 3
    • D.APP_CODE: 6
    • D.APP_C_DATA: 3
    • D.APP_I_DATA: 4
    • D.CRYPTO: 5
    • D.JCS_CODE: 3
    • D.JCS_DATA: 5
    • D.PIN: 4
    • D.SEC_DATA: 7
  • O:
    • O.ALARM: 11
    • O.APPLET: 28
    • O.CARD-MANAGEMENT: 2
    • O.CARD_MANAGEMENT: 14
    • O.CIPHER: 5
    • O.CODE_PCKG: 16
    • O.CODE_PKG: 7
    • O.DELETION: 4
    • O.FIREWALL: 11
    • O.GLOBAL_ARRAYS_CONFID: 5
    • O.GLOBAL_ARRAYS_INTEG: 4
    • O.INSTALL: 7
    • O.JAVAOBJECT: 56
    • O.KEY-MNGT: 5
    • O.KEY_MNGT: 1
    • O.LOAD: 5
    • O.NATIVE: 7
    • O.OBJ-DELETION: 3
    • O.OPERATE: 14
    • O.PIN-: 1
    • O.PIN-MNGT: 4
    • O.REALLOCATION: 4
    • O.RESOURCES: 5
    • O.RND: 7
    • O.SCP: 21
    • O.SID: 9
    • O.TRANSACTION: 5
  • OE:
    • OE.APPLET: 3
    • OE.APPS-VALIDATION: 1
    • OE.CODE-EVIDENCE: 10
    • OE.VERIFICATION: 25
  • OP:
    • OP.ARRAY_ACCESS: 6
    • OP.CREATE: 10
    • OP.DELETE_APPLET: 6
    • OP.DELETE_PCKG: 4
    • OP.DELETE_PCKG_APPLET: 4
    • OP.INSTANCE_FIELD: 6
    • OP.INVK_INTERFACE: 10
    • OP.INVK_VIRTUAL: 8
    • OP.JAVA: 8
    • OP.PUT: 7
    • OP.THROW: 7
    • OP.TYPE_ACCESS: 7
  • OSP:
    • OSP.RND: 3
    • OSP.RNG: 1
    • OSP.VERIFICATION: 4
  • R:
    • R.JAVA: 9
  • T:
    • T.CONFID-APPLI-DATA: 4
    • T.CONFID-JCS-CODE: 4
    • T.CONFID-JCS-DATA: 4
    • T.DELETION: 3
    • T.EXE-CODE: 8
    • T.INSTALL: 4
    • T.INTEG-APPLI-CODE: 7
    • T.INTEG-APPLI-DATA: 8
    • T.INTEG-JCS-CODE: 3
    • T.INTEG-JCS-DATA: 4
    • T.NATIVE: 4
    • T.OBJ-DELETION: 4
    • T.PHYSICAL: 4
    • T.RESOURCES: 3
    • T.SID: 8
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 104
    • Microsoft Corporation: 2
  • Gemalto:
    • Gemalto: 502
  • Infineon:
    • Infineon: 5
pdf_data/st_keywords/eval_facility
  • Serma:
    • Serma Technologies: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 14
  • DES:
    • 3DES:
      • 3DES: 1
      • TDEA: 1
      • TDES: 7
    • DES:
      • DES: 14
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
  • FF:
    • DH:
      • DH: 1
      • Diffie-Hellman: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
  • SHA:
    • SHA1:
      • SHA-1: 3
      • SHA1: 1
    • SHA2:
      • SHA-224: 3
      • SHA-256: 3
      • SHA224: 2
      • SHA256: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 7
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 7
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 10
    • RNG: 5
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • ECB:
    • ECB: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 3
    • fault induction: 2
    • malfunction: 2
    • physical tampering: 1
  • SCA:
    • DPA: 1
    • Leak-Inherent: 3
    • physical probing: 2
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 16
pdf_data/st_keywords/standard_id
  • CC:
    • CCIMB-2005-08-002: 1
    • CCIMB-2005-08-003: 1
    • CCIMB-2005-08-004: 1
  • BSI:
    • AIS31: 1
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • FIPS:
    • FIPS180-2: 1
    • FIPS197: 3
  • PKCS:
    • PKCS#1: 8
    • PKCS#3: 1
    • PKCS#5: 3
  • SCP:
    • SCP01: 3
    • SCP02: 3
    • SCP03: 3
pdf_data/st_keywords/javacard_version
  • JavaCard:
    • Java Card 2.2.2: 3
    • Java Card 3.0.4: 7
    • JavaCard 3.0: 1
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 7
pdf_data/st_keywords/javacard_packages
  • javacard:
    • javacard.framework: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: Roger French, Microsoft Corporation
  • /CreationDate: D:20080909105655+02'00'
  • /Creator: Acrobat PDFMaker 6.0 for Word
  • /Keywords: CC, ST, Common Criteria, SQL, Security Target
  • /ModDate: D:20081117154129+01'00'
  • /Producer: Acrobat Distiller 6.0.1 (Windows)
  • /SourceModified: D:20080729064854
  • /Subject: Security Target
  • /Title: Microsoft SQL Server 2005 Database Engine Common Criteria Evaluation
  • pdf_file_size_bytes: 1046402
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 90
  • /Author: Antoine de Lavernette
  • /CreationDate: D:20151126145415+01'00'
  • /Creator: Microsoft® Word 2013
  • /Keywords: Security Target, CC
  • /ModDate: D:20151126145415+01'00'
  • /Producer: Microsoft® Word 2013
  • /Subject: Security Target
  • /Title: eTravel v1.0 Security Target MAÏA3
  • pdf_file_size_bytes: 1708746
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 80
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different