name |
DbProtect AppRadar 2009.1 R2 |
MorphoSmart Optic 301 Version 1.0 |
category |
Other Devices and Systems |
Biometric Systems and Devices |
scheme |
US |
DE |
status |
archived |
archived |
not_valid_after |
01.11.2014 |
01.09.2019 |
not_valid_before |
04.06.2012 |
31.01.2013 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10258-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0790a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10258-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0790b_pdf.pdf |
manufacturer |
Application Security, Inc. |
Safran Morpho |
manufacturer_web |
https://www.appsecinc.com/ |
https://morpho.com |
security_level |
EAL2+, ALC_FLR.2 |
ADV_TDS.1, ASE_REQ.2, ALC_DEL.1, ASE_ECD.1, ATE_FUN.1, ALC_FLR.1, AGD_OPE.1, ASE_TSS.1, ATE_COV.1, ADV_FSP.2, ASE_INT.1, ATE_IND.2, ALC_CMS.2, ASE_CCL.1, AGD_PRE.1, ALC_CMC.2, ASE_SPD.1, ASE_OBJ.2, ADV_ARC.1 |
dgst |
e79b0851426ecf19 |
a9925b1140bde436 |
heuristics/cert_id |
CCEVS-VR-VID-10258-2011 |
BSI-DSZ-CC-0790-2013 |
heuristics/cert_lab |
US |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ALC_CMC.2, ALC_DEL.1, ATE_IND.2, ATE_COV.1, AVA_VAN.2, ADV_ARC.1, AGD_OPE.1, ADV_FSP.2, ALC_FLR.2, AGD_PRE.1 |
ALC_LCD.2, ASE_INT.1, ALC_DVS.2, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, APE_ECD.1, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, ALC_TAT.3, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, APE_REQ.2, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_IMP.2, ASE_REQ.2, ATE_DPT.4, ADV_INT.3, APE_INT.1, APE_SPD.1, ALC_CMC.2, ATE_IND.2, APE_OBJ.2, ASE_CCL.1, ADV_SPM.1 |
heuristics/extracted_versions |
2009.1 |
1.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
CCEVS-VR-VID-10256-2012 |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
CCEVS-VR-VID-10256-2012 |
{} |
heuristics/scheme_data |
- category: Miscellaneous
- certification_date: 04.06.2012
- evaluation_facility: Leidos Common Criteria Testing Laboratory
- expiration_date: 01.11.2014
- id: CCEVS-VR-VID10258
- product: DbProtect AppRadar 2009.1 R2
- scheme: US
- url: https://www.niap-ccevs.org/product/10258
- vendor: Application Security, Inc.
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
b02ed76d2545326a |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0062b_pdf.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
st_vid10258-vr.pdf |
0790a_pdf.pdf |
pdf_data/report_frontpage |
- DE:
- US:
- cert_id: CCEVS-VR-VID10258-2011
- cert_item: DbProtect AppRadar 2009.1 R2
- cert_lab: US NIAP
|
- DE:
- cert_id: BSI-DSZ-CC-0790-2013
- cert_item: MorphoSmart Optic 301, Version 1.0
- cert_lab: BSI
- developer: Safran Morpho
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- US:
|
pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10256-2012: 1
- CCEVS-VR-VID10258-2011: 1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 2: 5
- EAL 2 augmented: 4
- EAL 4: 1
|
- EAL:
- EAL 4: 2
- EAL1: 7
- EAL2: 3
- EAL3: 4
- EAL4: 6
- EAL5: 6
- EAL6: 3
- EAL7: 4
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR: 1
- ALC_FLR.2: 4
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 5
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 5
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 5
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 5
- AGD_PRE: 1
- AGD_PRE.1: 5
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 5
- ALC_CMC.3: 1
- ALC_CMC.4: 1
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 5
- ALC_CMS.3: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 1
- ALC_DEL: 1
- ALC_DEL.1: 5
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 1
- ALC_FLR: 1
- ALC_FLR.1: 5
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 1
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ALC_TAT.2: 1
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 5
- ASE_ECD: 1
- ASE_ECD.1: 5
- ASE_INT: 1
- ASE_INT.1: 5
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 5
- ASE_REQ.1: 1
- ASE_REQ.2: 5
- ASE_SPD: 1
- ASE_SPD.1: 5
- ASE_TSS: 1
- ASE_TSS.1: 5
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 5
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 1
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 5
- ATE_FUN.2: 1
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 5
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 1
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 4
- TÜViT: 2
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- 19 September 2012, MorphoSmart Optic 301 – Life Cycle Support (ALC) (chapter 2.1), Safran Morpho (confidential document) [13] MSO 301– GUIDES, Version 12, 18 September 2012, Safran Morpho [14] MorphoSmart Programmer’s: 1
- 8] Evaluation Technical Report, Version 6, 21 January 2013, TÜV Informationstechnik GmbH, (confidential document) [9] Fingerprint Spoof Detection Evaluation Guidance (FSDEG), Version 2.1, 18 December 2009: 1
- Target, Version 8, 12 September 2012, MorphoSmart Optic 301 Security Target, Safran Morpho (confidential document) [7] Fingerprint Spoof Detection Protection Profile based on Organisational Security Policies: 1
- OutOfScope:
- out of scope: 1
- relevant events and protection of residual and security relevant data. Biometric verification is out of scope of the certification. The Security Target [6] is the basis for this certification. It is based on: 1
|
pdf_data/report_metadata |
- /Author: Anthony Apted
- /CreationDate: D:20120705124449
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20120705124449
- /Producer: Microsoft® Office Word 2007
- /Subject: Validation Report
- /Title: AppDetective Pro
- pdf_file_size_bytes: 407792
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 24
|
- /Author: Federal Office for Information Security
- /CreationDate: D:20130306111458+01'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, Fingerprint Spoof Detection, Fingerprint, Biometrics, Fingerprint Fake Detection"
- /ModDate: D:20130306154334+01'00'
- /Producer: OpenOffice.org 3.2
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0790-2013
- pdf_file_size_bytes: 880965
- pdf_hyperlinks: https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 34
|
pdf_data/st_filename |
st_vid10258-st.pdf |
0790b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 2: 2
- EAL 2 augmented: 2
- EAL2: 6
- EAL2 augmented: 2
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 13
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 18
- ADV_TDS: 1
- ADV_TDS.1: 17
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 15
- AGD_PRE: 1
- AGD_PRE.1: 11
- ALC:
- ALC_CMC: 1
- ALC_CMC.2: 9
- ALC_CMS: 1
- ALC_CMS.2: 7
- ALC_DEL: 1
- ALC_DEL.1: 6
- ALC_FLR: 1
- ALC_FLR.2: 19
- ATE:
- ATE_COV: 1
- ATE_COV.1: 8
- ATE_FUN: 1
- ATE_FUN.1: 12
- ATE_IND: 1
- ATE_IND.2: 8
- AVA:
|
- ADV:
- ADV_ARC.1: 2
- ADV_FSP.1: 2
- ADV_FSP.2: 7
- ADV_TDS.1: 5
- AGD:
- AGD_OPE.1: 4
- AGD_PRE.1: 4
- ALC:
- ALC_CMC.2: 2
- ALC_CMS.2: 2
- ALC_DEL.1: 2
- ALC_FLR.1: 6
- ASE:
- ASE_CCL.1: 2
- ASE_ECD.1: 5
- ASE_INT.1: 3
- ASE_OBJ.2: 3
- ASE_REQ.1: 2
- ASE_REQ.2: 3
- ASE_SPD.1: 2
- ASE_TSS.1: 2
- ATE:
- ATE_COV.1: 5
- ATE_FUN.1: 5
- ATE_IND.2: 2
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 3
- FAU_GEN.1: 6
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR: 3
- FAU_SAR.1: 5
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FDP:
- FMT:
- FMT_MTD: 3
- FMT_MTD.1: 7
- FMT_MTD.1.1: 1
- FMT_SMF: 3
- FMT_SMF.1: 8
- FMT_SMF.1.1: 1
- FMT_SMR.1: 1
- FPT:
|
- FAU:
- FAU_GEN: 4
- FAU_GEN.1: 4
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FDP:
- FDP_RIP: 3
- FDP_RIP.2: 4
- FDP_RIP.2.1: 1
- FMT:
- FMT_MTD: 3
- FMT_MTD.1: 1
- FMT_MTD.3: 7
- FMT_MTD.3.1: 1
- FMT_SMF: 1
- FMT_SMF.1: 6
- FMT_SMF.1.1: 1
- FPT:
- FPT_SPOD: 6
- FPT_SPOD.1: 14
- FPT_SPOD.1.1: 3
- FPT_SPOD.1.2: 3
- FPT_SPOD.1.3: 3
- FPT_SPOD.1.4: 3
- FPT_STM.1: 2
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ACCESS: 3
- A.DYNMIC: 2
- A.LOCATE: 3
- A.MANAGE: 2
- A.NOEVIL: 3
- A.NOTRST: 2
- A.PROTCT: 3
- O:
- O.AUDIT: 4
- O.AUDIT_REVIEW: 3
- O.MANAGE: 3
- O.MONITOR: 4
- OE:
- OE.CREDEN: 2
- OE.IDENT_AUTHEN: 2
- OE.INSTAL: 2
- OE.INTROP: 2
- OE.PERSON: 2
- OE.PHYCAL: 2
- OE.PROTCT: 3
- OE.ROLES: 3
- OE.TIME: 3
- T:
- T.COMM: 3
- T.IMPCON: 2
- T.INADVE: 3
- T.MISACT: 2
- T.MISUSE: 3
- T.PRIVIL: 2
- T.PROTECT: 3
|
- A:
- O:
- O.AUDIT: 7
- O.MANAGEMENT: 7
- O.RESIDUAL: 5
- O.SPOOF_DETECTION: 5
- OE:
- OE.ADMINISTRATION: 9
- OE.BIO: 2
- OE.PHYSICAL: 7
- OE.PLATFORM: 14
- OSP:
- OSP.AUDIT: 4
- OSP.MANAGEMENT: 4
- OSP.RESIDUAL: 4
- OSP.SPOOF_DETECTION: 5
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- and the fingerprint if genuine. Please be aware that the mechanism for biometric matching is out of scope of the certification. The MSO Demonstrator Application is a software which enables using the MSO: 1
- of the TOE but do not realize any part of the fake finger detection functionality and are therefore out of scope of the certified security functionality. The storage of the generated log, i.e., the Audit log, is: 1
- out of scope: 2
|
pdf_data/st_metadata |
- /Author: SAIC CCTL
- /CreationDate: D:20120705124409
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20120705124409
- /Producer: Microsoft® Office Word 2007
- /Subject: Security Target
- /Title: AppRadar V3.1 Security Target
- pdf_file_size_bytes: 584005
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 36
|
- /Author: Safran Morpho
- /CreationDate: D:20130121143511
- /Creator: Microsoft® Office Word 2007
- /Keywords: MSO 301, Common Criteria, CC, Securtiy Target, ST, ST-lite
- /ModDate: D:20130121144124+01'00'
- /Producer: Microsoft® Office Word 2007
- /Subject: ST-lite
- /Title: MSO FFD Public Security Target
- pdf_file_size_bytes: 476138
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 30
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |