| name |
Verizon UniCERT v5.5.1 |
TCOS Passport Version 2.0 Release 1/ SLE66CLX800PE |
| category |
Key Management Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme |
MY |
DE |
| status |
active |
archived |
| not_valid_after |
26.05.2026 |
01.09.2019 |
| not_valid_before |
26.05.2021 |
06.02.2008 |
| cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C120-CERTIFICATE-v1.pdf |
|
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C120-CR-V1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20080514_0447a.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Verizon%20UniCERT%205.5.1%20Security%20Target%20v0.8.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20080514_0447b.pdf |
| manufacturer |
Verizon Australia Pty Ltd |
T-Systems Enterprise Services GmbH |
| manufacturer_web |
|
https://www.t-systems.de/ |
| security_level |
EAL2+, ALC_FLR.2 |
EAL4+, AVA_VLA.4, AVA_MSU.3, ADV_IMP.2, ALC_DVS.2 |
| dgst |
e6d0ea8c4152fe4f |
ecbb3b039153ebc0 |
| heuristics/cert_id |
ISCB-5-RPT-C120-CR-v1 |
BSI-DSZ-CC-0447-2008 |
| heuristics/cert_lab |
[] |
BSI |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ALC_FLR.2, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 |
ADV_LLD.1, ALC_LCD.1, ALC_TAT.1, ADV_FSP.2, ALC_DVS.2, ADV_IMP.2, AGD_ADM.1, ATE_IND.2, AVA_VLA.4, ADV_RCR.1, ATE_DPT.1, AVA_SOF.1, ADV_HLD.2, AGD_USR.1, ATE_COV.2, ATE_FUN.1, AVA_MSU.3, ADV_SPM.1 |
| heuristics/extracted_versions |
5.5.1 |
2.0 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0528-2008 |
| heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0399-2007, BSI-DSZ-CC-0446-2007 |
| heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-0528-2008, BSI-DSZ-CC-0568-2008 |
| heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0399-2007, BSI-DSZ-CC-0446-2007, BSI-DSZ-CC-0223-2003, BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0169-2002, BSI-DSZ-CC-0410-2007, BSI-DSZ-CC-0404-2007 |
| heuristics/scheme_data |
- cert_no: 2021-002-C120
- certification_date: 26.05.2021
- developer: Teron Labs Pty Ltd Verizon Australia Pty Ltd
- enhanced:
- assurance_level: EAL2+ ALC_FLR.2
- category: Key Management System
- cert_id: C120
- certification_date: 26.05.2021
- developer: Teron Labs Unit 3, 10 Geils Court, Deakin, ACT 2601, Australia
- expiration_date: 26.05.2026
- mutual_recognition: CCRA
- product: Verizon UniCERT v5.5.1
- report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C120/ISCB-5-RPT-C120-CR-V1.pdf
- scope: The TOE is a software product which provides all the (PKI-specific) functionality needed to implement a Public Key Infrastructure (PKI) system. The primary function of a PKI system is to issue and manage digital certificates that allow other IT systems to verify the identity of the holder. The TOE provides all the functionality needed to implement a PKI system, essentially a system that provides certificate registration, PKI management, a Certification Authority, and certificate lifecycle management functions. The TOE implements standard digital signature methods to allow the content of certificates and CRLs to be verifiable and to prevent forgery and tampering, protect the integrity of data (including certificates and CRLs) when at rest and when in transit between components of the TOE, allows TLS/SSL authentication of itself to the Enterprise Server to ensure that the Enterprise Server only accepts certificates published by a legitimate TOE and protect the integrity of messages transmitted between components of the TOE.
- status: Valid
- target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C120/Verizon_UniCERT_551_Security_Target_v08_2.pdf
- type: Key Management System
- expiration_date: 26.05.2026
- level: EAL2+ ALC_FLR.2
- product: Verizon UniCERT v5.5.1
- recognition: CCRA
- url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/certified-products-and-systems-5/submission-view/91
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0399-2007 |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0399-2007, BSI-DSZ-CC-0322-2005 |
| heuristics/protection_profiles |
{} |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
{} |
| pdf_data/cert_filename |
ISCB-5-CERT-C120-CERTIFICATE-v1.pdf |
|
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
- /CreationDate: D:20210602024355Z00'00'
- /Creator: Word
- /ModDate: D:20210602024355Z00'00'
- /Producer: macOS Version 10.15.7 (Build 19H524) Quartz PDFContext
- pdf_file_size_bytes: 185266
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
| pdf_data/report_filename |
ISCB-5-RPT-C120-CR-V1.pdf |
20080514_0447a.pdf |
| pdf_data/report_frontpage |
|
- DE:
- cert_id: BSI-DSZ-CC-0447-2008
- cert_item: TCOS Passport Version 2.0 Release 1/ SLE66CLX800PE
- cert_lab: BSI
- developer: T-Systems Enterprise Services GmbH SSC Testfactory & Security Certification Report V1.0 ZS-01-01-F-326 V4.1 BSI - Bundesamt für Sicherheit in der Informationstechnik, Postfach 20 03 63, D-53133 Bonn Phone +49 (0)228 9582-0, Fax +49 (0)228 9582-5477, Infoline +49 (0)228 9582-111
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
| pdf_data/report_keywords/cc_cert_id |
- MY:
- ISCB-5-RPT-C120-CR-V1: 47
|
- DE:
- BSI-DSZ-CC-0399-2007: 2
- BSI-DSZ-CC-0446-2007: 3
- BSI-DSZ-CC-0447: 2
- BSI-DSZ-CC-0447-2008: 20
- BSI-DSZ-CC-399-2007: 1
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP-0002-2001: 2
- BSI-PP-0026: 4
|
| pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 4: 10
- EAL 4 augmented: 3
- EAL 7: 1
- EAL1: 5
- EAL2: 3
- EAL3: 4
- EAL4: 6
- EAL5: 6
- EAL5+: 1
- EAL6: 3
- EAL7: 4
|
| pdf_data/report_keywords/cc_sar |
|
- ACM:
- ACM_AUT: 2
- ACM_AUT.1: 1
- ACM_CAP: 2
- ACM_CAP.4: 1
- ACM_SCP: 2
- ACM_SCP.2: 1
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 1
- ADO_IGS: 2
- ADO_IGS.1: 1
- ADV:
- ADV_FSP: 2
- ADV_HLD: 2
- ADV_IMP: 2
- ADV_IMP.2: 5
- ADV_INT: 2
- ADV_LLD: 2
- ADV_RCR: 2
- ADV_SPM: 2
- AGD:
- ALC:
- ALC_DVS: 2
- ALC_DVS.2: 6
- ALC_FLR: 2
- ALC_LCD: 1
- ALC_LCD.1: 1
- ALC_TAT: 2
- ALC_TAT.1: 1
- APE:
- APE_DES: 1
- APE_ENV: 1
- APE_INT: 1
- APE_OBJ: 1
- APE_REQ: 1
- APE_SRE: 1
- ASE:
- ASE_DES: 1
- ASE_ENV: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_PPC: 1
- ASE_REQ: 1
- ASE_SRE: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 2
- ATE_DPT: 2
- ATE_FUN: 3
- ATE_IND: 3
- AVA:
- AVA_CCA: 2
- AVA_MSU: 2
- AVA_MSU.3: 5
- AVA_SOF: 3
- AVA_VLA: 4
- AVA_VLA.2: 1
- AVA_VLA.3: 1
- AVA_VLA.4: 6
|
| pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 2
- FAU_GEN.2: 1
- FAU_SAR.1: 3
- FAU_SAR.2: 1
- FAU_SAR.3: 2
- FAU_STG.1: 1
- FCO:
- FCS:
- FCS_CKM.1: 2
- FCS_CKM.2: 2
- FCS_CKM.3: 1
- FCS_COP: 4
- FDP:
- FDP_ACC.1: 16
- FDP_ACF.1: 16
- FDP_DAU.2: 1
- FDP_IFC.1: 2
- FDP_IFF.1: 2
- FDP_ITT.1: 2
- FDP_ITT.3: 1
- FIA:
- FIA_ATD.1: 2
- FIA_SOS.1: 2
- FIA_UAU.2: 1
- FIA_UID.2: 1
- FIA_USB.1: 4
- FMT:
- FMT_MSA.1: 1
- FMT_MSA.3: 2
- FMT_MTD.1: 1
- FMT_SAE.1: 1
- FMT_SMF.1: 9
- FMT_SMR.1: 2
- FPT:
|
|
| pdf_data/report_keywords/cc_claims |
- A:
- A.ACCOUNTABILITY: 1
- A.AUDIT_REVIEW: 1
- A.AUTH_DATA_DISPOSAL: 1
- A.COMMS_PROTECTION: 1
- A.COMPETENT: 1
- A.HSM: 1
- A.PHYSICAL_PROTECTION: 1
- A.ROLE_SEPARATION: 1
- A.SECURE_INSTALL: 1
- A.TIME_SOURCE: 1
- A.TRUSTED_USERS: 1
|
|
| pdf_data/report_keywords/vendor |
|
- Infineon:
- Infineon: 7
- Infineon Technologies AG: 1
- Philips:
|
| pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 3
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- ISO:
- ISO/IEC 18045: 2
- ISO/IEC15408: 2
- PKCS:
- X509:
|
- BSI:
- AIS 25: 1
- AIS 26: 1
- AIS 31: 1
- AIS 32: 1
- AIS 34: 3
- AIS 36: 2
- AIS 38: 1
- ICAO:
- ISO:
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- / m1582-e12, SLE66CLX360PE / m1587-e12, SLE66CLX360PEM / m1588-e12, SLE66CLX360PES / m1589-e12 (confidential document) [14] Certification Report for Infineon Smart Card IC (Security Controller) SLE66CLX800PE : 1
- Certification Report BSI-DSZ-CC-0447-2008 1/SLE66CLX800PE, Version 1.1.2, 19.12.2007, T-Systems (confidential document) [16] Administrator’s Guide for TCOS Passport Version 2.0 Release 1, Version 1.01, 05.12.2007: 1
- Control Version 2.0 Release 1, Evaluation Body for IT- Security of TÜV Informationstechnik GmbH (confidential document) [8] Machine Readable Travel Document with „ICAO Application", Extended Access Control, BSI-PP-0026: 1
|
| pdf_data/report_metadata |
- /CreationDate: D:20210602023203Z00'00'
- /Creator: Word
- /ModDate: D:20210602023203Z00'00'
- /Producer: macOS Version 10.15.7 (Build 19H524) Quartz PDFContext
- pdf_file_size_bytes: 1144678
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 47
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Company: BSI, Postfach 200363, 53133 Bonn
- /CreationDate: D:20080206105243+01'00'
- /Creator: Acrobat PDFMaker 8.1 für Word
- /Keywords: "Common Criteria, Certification, Zertifizierung, MRTD, ICAO, EAC, ePass"
- /ModDate: D:20080213130335+01'00'
- /Producer: Acrobat Distiller 8.1.0 (Windows)
- /SourceModified: D:20080206093200
- /Subject: TCOS Passport Version 2.0 Release 1
- /Title: Certification Report BSI-DSZ-CC-0447-2008
- pdf_file_size_bytes: 255026
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 40
|
| pdf_data/st_filename |
Verizon UniCERT 5.5.1 Security Target v0.8.pdf |
20080514_0447b.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0399-2007: 1
- BSI-DSZ-CC-447: 1
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP-0002: 1
- BSI-PP-0017: 1
- BSI-PP-0026: 2
|
| pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 24
- EAL 4 augmented: 1
- EAL 5: 1
- EAL4: 11
- EAL4 augmented: 1
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 3
- ASE:
- ASE_CCL: 2
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT: 2
- ASE_INT.1: 1
- ASE_OBJ: 2
- ASE_OBJ.2: 1
- ASE_REQ: 2
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ACM:
- ACM_AUT.1: 2
- ACM_CAP.4: 2
- ACM_SCP: 1
- ACM_SCP.2: 1
- ADO:
- ADO_DEL.2: 2
- ADO_GEL: 1
- ADO_IGS: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP: 4
- ADV_FSP.1: 2
- ADV_FSP.2: 1
- ADV_HLD: 4
- ADV_HLD.2: 2
- ADV_IMP: 2
- ADV_IMP.1: 1
- ADV_IMP.2: 9
- ADV_LLD: 2
- ADV_LLD.1: 3
- ADV_RCR: 2
- ADV_RCR.1: 2
- ADV_SPM: 1
- ADV_SPM.1: 4
- AGD:
- AGD_ADM: 1
- AGD_ADM.1: 3
- AGD_USR: 1
- AGD_USR.1: 3
- ALC:
- ALC_DVS: 2
- ALC_DVS.2: 8
- ALC_LCD: 1
- ALC_LCD.1: 1
- ALC_TAT: 1
- ALC_TAT.1: 3
- ATE:
- ATE_COV: 1
- ATE_COV.2: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_MSU: 1
- AVA_MSU.3: 6
- AVA_SOF: 1
- AVA_SOF.1: 1
- AVA_VLA: 1
- AVA_VLA.4: 6
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 7
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 4
- FAU_GEN.2.1: 1
- FAU_SAR.1: 6
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 3
- FAU_SAR.2.1: 1
- FAU_SAR.3: 3
- FAU_SAR.3.1: 1
- FAU_STG: 1
- FAU_STG.1: 4
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_UID.1: 1
- FCO:
- FCO_NRO.1: 1
- FCO_NRO.2: 5
- FCO_NRO.2.2: 1
- FCO_NRO.2.3: 1
- FCS:
- FCS_CKM: 4
- FCS_CKM.1: 12
- FCS_CKM.1.1: 1
- FCS_CKM.2: 5
- FCS_CKM.3: 4
- FCS_CKM.3.1: 1
- FCS_CKM.4: 12
- FCS_CKM.4.1: 1
- FCS_COP: 10
- FCS_COP.1: 9
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 8
- FDP_ACC.1.1: 1
- FDP_ACF.1: 5
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_DAU.1: 1
- FDP_DAU.2: 4
- FDP_DAU.2.2: 1
- FDP_IFC.1: 8
- FDP_IFC.1.1: 1
- FDP_IFF.1: 5
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC.1: 8
- FDP_ITC.2: 8
- FDP_ITT.1: 5
- FDP_ITT.1.1: 1
- FDP_ITT.3: 4
- FDP_ITT.3.1: 1
- FDP_ITT.3.2: 1
- FDP_RIP.1: 6
- FDP_RIP.1.1: 1
- FIA:
- FIA_ATD: 1
- FIA_ATD.1: 4
- FIA_ATD.1.1: 1
- FIA_SOS: 1
- FIA_SOS.1: 5
- FIA_SOS.1.1: 1
- FIA_UAU: 1
- FIA_UAU.1: 1
- FIA_UAU.2: 3
- FIA_UAU.2.1: 1
- FIA_UID: 1
- FIA_UID.1: 5
- FIA_UID.2: 3
- FIA_UID.2.1: 1
- FIA_USB.1: 3
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 3
- FMT_MOF.1.1: 1
- FMT_MSA: 1
- FMT_MSA.1: 5
- FMT_MSA.1.1: 1
- FMT_MSA.3: 5
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 1
- FMT_MTD.1: 3
- FMT_MTD.1.1: 1
- FMT_SAE.1: 3
- FMT_SAE.1.1: 1
- FMT_SAE.1.2: 1
- FMT_SMF: 1
- FMT_SMF.1: 6
- FMT_SMF.1.1: 2
- FMT_SMR: 1
- FMT_SMR.1: 8
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_ITT: 4
- FPT_ITT.1: 4
- FPT_STM.1: 4
- FTP:
- FTP_TRP.1: 5
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_SAS: 4
- FAU_SAS.1: 12
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 62
- FCS_CKM.1: 47
- FCS_CKM.2: 10
- FCS_CKM.4: 53
- FCS_COP: 118
- FCS_COP.1: 27
- FCS_RND: 22
- FCS_RND.1: 9
- FCS_RND.1.1: 1
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 23
- FDP_ACC.1.1: 1
- FDP_ACF: 2
- FDP_ACF.1: 15
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 2
- FDP_DAU: 7
- FDP_DAU.1: 4
- FDP_IFC.1: 8
- FDP_ITC.1: 27
- FDP_ITC.2: 28
- FDP_UCT: 16
- FDP_UCT.1: 5
- FDP_UIT: 16
- FDP_UIT.1: 5
- FIA:
- FIA_AFL: 3
- FIA_AFL.1: 8
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_API: 24
- FIA_API.1: 8
- FIA_API.1.1: 1
- FIA_UAU: 72
- FIA_UAU.1: 12
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 9
- FIA_UAU.5: 7
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 2
- FIA_UAU.6: 8
- FIA_UID: 1
- FIA_UID.1: 15
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_LIM: 4
- FMT_LIM.1: 19
- FMT_LIM.1.1: 2
- FMT_LIM.2: 17
- FMT_LIM.2.1: 2
- FMT_MDT.3: 1
- FMT_MSA.1: 1
- FMT_MSA.2: 37
- FMT_MSA.3: 2
- FMT_MTD: 73
- FMT_MTD.1: 10
- FMT_MTD.3: 10
- FMT_MTD.3.1: 1
- FMT_SMF.1: 26
- FMT_SMF.1.1: 1
- FMT_SMR.1: 28
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_AMT.1: 1
- FPT_FLS: 1
- FPT_FLS.1: 11
- FPT_FLS.1.1: 1
- FPT_PHP: 1
- FPT_PHP.3: 10
- FPT_PHP.3.1: 1
- FPT_RVM: 1
- FPT_RVM.1: 10
- FPT_RVM.1.1: 1
- FPT_SEP: 1
- FPT_SEP.1: 10
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_TST: 2
- FPT_TST.1: 9
- FPT_TST.1.1: 2
- FPT_TST.1.2: 1
- FPT_TST.1.3: 2
- FTP:
- FTP_ITC.1: 9
- FTP_TRP.1: 8
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.ACCOUNTABILITY: 2
- A.AUDIT_REVIEW: 2
- A.AUTH_DATA_DISPOSAL: 2
- A.COMMS_PROTECTION: 2
- A.COMPETENT_USERS: 2
- A.HSM: 2
- A.PHYSICAL_PROTECTION: 2
- A.ROLE_SEPARATION: 2
- A.SECURE_INSTALL: 2
- A.TIME_SOURCE: 2
- A.TRUSTED_USERS: 2
- O:
- O.AUDIT: 6
- O.CRYPTOGRAPHY: 8
- O.EVIDENCE_OF_ORIGIN: 3
- O.PASSPHRASE: 7
- O.PROTECTED_AUDIT: 5
- O.PROTECTED_CONFIG: 9
- O.PROTECT_DATA: 7
- O.PROTECT_MESSAGE: 3
- OE:
- OE.ACCOUNTABILITY: 3
- OE.AUDIT_REVIEW: 3
- OE.AUTH_DATA_DISPOSAL: 4
- OE.COMMS_PROTECTION: 4
- OE.COMPETENT_USERS: 5
- OE.HSM: 5
- OE.PHYSICAL_PROTECTION: 7
- OE.ROLE_SEPARATION: 5
- OE.SECURE_INSTALL: 6
- OE.TIME_SOURCE: 2
- OE.TIME_STAMP: 2
- OE.TRUSTED_USERS: 5
- T:
- T.AUDIT_LOSS: 2
- T.DATA_COMPROMISE: 2
- T.MESSAGE_COMPROMISE: 2
- T.REPUDIATE: 2
- T.UNAUTH_CHANGE: 2
- T.USER_ERROR: 2
|
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/eval_facility |
|
- TSystems:
- T-Systems International: 2
|
| pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- 3DES:
- 3-DES: 1
- 3DES: 9
- Triple-DES: 1
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 3
- Physical Tampering: 5
- Physical tampering: 1
- fault injection: 1
- malfunction: 5
- physical tampering: 2
- SCA:
- DPA: 1
- physical probing: 3
- other:
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.COM: 15
- EF.DG1: 33
- EF.DG13: 4
- EF.DG14: 8
- EF.DG15: 1
- EF.DG16: 33
- EF.DG2: 13
- EF.DG3: 19
- EF.DG4: 16
- EF.DG5: 11
- EF.SOD: 9
|
| pdf_data/st_keywords/standard_id |
- ISO:
- PKCS:
- PKCS #11: 1
- PKCS #7: 1
- PKCS#11: 12
- PKCS#12: 6
- PKCS#7: 3
- PKCS11: 9
- PKCS12: 2
- PKCS7: 1
- RFC:
- X509:
|
- BSI:
- AIS 31: 1
- AIS31: 7
- AIS36: 2
- CC:
- CCMB-2005-08-001: 1
- CCMB-2005-08-002: 1
- CCMB-2005-08-003: 1
- CCMB-2005-08-004: 1
- FIPS:
- FIPS 180-2106: 1
- FIPS 180-2124: 1
- FIPS 180-214: 1
- FIPS 180-2142: 1
- FIPS 46-3: 3
- FIPS PUB 180-2: 1
- FIPS PUB 46-3: 1
- FIPS180: 2
- FIPS46: 2
- ICAO:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816-4: 1
- RFC:
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
|
| pdf_data/st_metadata |
- /CreationDate: D:20210520100128Z00'00'
- /Creator: Word
- /ModDate: D:20210520100128Z00'00'
- /Producer: macOS Version 10.15.7 (Build 19H524) Quartz PDFContext
- pdf_file_size_bytes: 1221595
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 105
|
- /Author: Markus Blick
- /CreationDate: D:20071218102147
- /Creator: FreePDF XP 3.01 - http://shbox.de
- /ModDate: D:20071218102147
- /Producer: AFPL Ghostscript 8.51
- /Title: ASE TCOS Passport 2.0 IFX
- pdf_file_size_bytes: 739784
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 127
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
True |
False |
| state/cert/download_ok |
True |
False |
| state/cert/extract_ok |
True |
False |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |