Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

- Kanguru Defender Elite 200 with Kanguru Defender Manager Elite 200, Firmware Version 02.03.10, KDME200 v2.0.0.0-2/3/6,- Kanguru Defender 2000 with Kanguru Defender Manager 2000, Firmware Version 02.03.10, KDM2000 v1.2.1.8-2/3/6,- Universal Kanguru Local Administrator, Version 3.2.0.3 and- Kanguru Remote Management Console, Version 5.0.2.6
BSI-DSZ-CC-0772-2014
EzIdentityTM mSignTM (Android v2.0.0.1 & iOS v2.0.0.1) and EzIdentityTM Authentication Platform v4.0.0.2
ISCB-5-RPT-C053-CR-v1a
name - Kanguru Defender Elite 200 with Kanguru Defender Manager Elite 200, Firmware Version 02.03.10, KDME200 v2.0.0.0-2/3/6,- Kanguru Defender 2000 with Kanguru Defender Manager 2000, Firmware Version 02.03.10, KDM2000 v1.2.1.8-2/3/6,- Universal Kanguru Local Administrator, Version 3.2.0.3 and- Kanguru Remote Management Console, Version 5.0.2.6 EzIdentityTM mSignTM (Android v2.0.0.1 & iOS v2.0.0.1) and EzIdentityTM Authentication Platform v4.0.0.2
category Data Protection Products for Digital Signatures
not_valid_before 2014-11-07 2013-12-27
not_valid_after 2019-11-08 2019-09-01
scheme DE MY
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/EZMCOM%20EzIdentity%20Security%20Target%20v1.1.pdf
manufacturer Kanguru Solutions EZMCOM Inc.
manufacturer_web https://www.kanguru.com https://www.ezmcom.com/
security_level ALC_FLR.1, EAL2+ EAL2
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C053-CR-v1a.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Schutzprofil fur USB-Datentrager, Version 1.4', 'pp_eal': 'EAL2+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0025b.pdf', 'pp_ids': frozenset({'SCHUTZPROFIL_USB-DATENTRAGER_V1.4'})})
maintenance_updates frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2015, 1, 20), 'maintenance_title': 'Kanguru Defender Elite 200 and Kanguru Defender 2000, firmware version 2.05.10', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772_ma1a_pdf.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772_ma1b_pdf.pdf'})
state/report/pdf_hash 16e52e72927a5eee7124e6fde0c186c1d3d113e733e6116f5fdfcc44278c5b57 56ae235210872827b94af81907dcc2e6069a531331fe79b138f7e2806374f770
state/report/txt_hash 8cb2309bdc02367be25c3961b565d25c9f78b2d7cdce20c08213092f4a2eff82 f9b6da6d3ed30a7a1b59c95f30b66250dc569cd2e2b07ef2366d8a4738e9e363
state/st/pdf_hash 077d27d1e2e9eafc65cbb9d302bc66883e2dd06e21ea816741ca25fe7f7dcd7d c4b58c015b176a0a7e01812c2ba212bda9c3209d1542b010c2c5497e410a6d1b
state/st/txt_hash 74714db4c60a8332c3603aaae83a1c8ec3cbea7950400f562332e8ccdcc98147 175f6ebdca3654eff335ed0c127a1dd565df9d90dd285ba6c8dcc65ef3e3f30f
heuristics/cert_id BSI-DSZ-CC-0772-2014 ISCB-5-RPT-C053-CR-v1a
heuristics/cert_lab BSI None
heuristics/extracted_versions 2.0.0.0, 1.2.1.8, 3.2.0.3, 02.03.10, 5.0.2.6 4.0.0.2, 2.0.0.1
heuristics/scheme_data None
  • cert_no: 2013-013-C053
  • developer: EZMCOM Inc.
  • level: EAL2
  • product: EzIdentityTM mSignTM (Android v2.0.0.1 & iOS v2.0.0.1) and EzIdentityTM Authentication Platform v4.0.0.2
  • certification_date: 27-12-2013
  • expiration_date: 27-12-2018
  • recognition: CCRA
  • url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/83
  • enhanced:
    • cert_id: C053
    • product: EzIdentityTM mSignTM (Android v2.0.0.1 & iOS v2.0.0.1) and EzIdentityTM Authentication Platform v4.0.0.2
    • developer: Anupam Ratha2B-23A-3, Block 2B,Plaza Sentral, Jalan Stesen Sentral 5,50470 Kuala Lumpur,MALAYSIA URL: http://www.ezmcom.comEmail: [email protected]: +6012-570-1114
    • category: Products for Digital Signatures
    • type: Software product used for digital signing of data, file, or transaction that includes the client and server components of the EzIdentityTM.Software product used for digital signing of data, file, or transaction that includes the client and server components of the EzIdentityTM.
    • scope: EzIdentity™ mSign™ (Android v2.0.0.1 & iOS v2.0.0.1) and EzIdentity™ Authentication Platform v4.0.0.2 (hereafter referred as mSign and EzIdentity Platform) from EZMCOM Inc. are the Target of Evaluation (TOE) for this Evaluation Assurance Level (EAL) 2 evaluation. The TOE is consists of two components as follows: Client side: EzIdentity™ mSign. mSign is a smartphone based application that provides users with the ability to apply digital signatures to documents and data that the users receive. The application allows for the generation of a digital signature, which can then be used to approve and sign transactions (such as internet banking, funds transfers, etc.). In addition, the application supports the generation of One Time Password (OTP) for software initialisation and challenge response code in order to unblock the blocked user. Server side: EzIdentity™ Authentication Platform. EzIdentity platform supports an organisations deployment of the mSign application by providing a back-end platform to manage and control deployment and configuration. The platform assists in the transfer of transaction data to be signed between third parties and mSign users, provides user and role management, security and management functions and allows organisations to manage and configure all aspects of both the EzIdentity platform and mSign application deployment. The scope of evaluation covers major security functions described as follows: Security Audit - EzIdentity platform generates audit records for security events. The Administrator, Super Operator and Operator who have roles with access to the audit report module are allowed to view the audit trail. Data Protection - User data such as device ID, user PIN and signature data that is stored within mSign application is encrypted with Triple-DES encryption to prevent from data modification and unauthorised access. Identification and Authentication - The TOE, both mSign and EzIdentity platform, enforce user identification and authentication mechanism prior to allow user to any user action or information flow being permitted. mSign user is required to enter user PIN before permitted to perform any actions. On the EzIdentity platform, users such as Administrators, Super Operators, and Operators must be authenticated using correct combination of username and password before permitted to perform any administrative functions. Security Management - EzIdentity platform provides a wide range of security management function for Administrators including TOE configuration, manage mSign client application, managing users, assign the information flow policy, and audit management among other routine maintenance activities. TOE Access - TOE provides session termination based on time limitation set on user inactivity. The TOE also enforce user blocking session if the user have wrongly entered user PIN after certain number of invalid authentication attempts are made. In order to unblock the session, user is required to request Challenge Response Code which will be sent to his or her registered mobile phone or email as defined during user registration process. Cryptographic Operation - Both mSign and EzIdentity platform provide users with functionality to digitally sign files, data and sensitive transaction (such as internet banking transfer) to provide integrity and non-repudiation. It also provides One Time Password (OTP) generation, secure transit of data between TOE components and secure storage of user data on device.
    • assurance_level: EAL2
    • certification_date: 27-12-2013
    • expiration_date: 27-12-2018
    • mutual_recognition: CCRA
    • target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C053/EZMCOM%20EzIdentity%20Security%20Target%20v1.1.pdf
    • report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C053/ISCB-5-RPT-C053-CR-v1a.pdf
    • status: Archive
pdf_data/report_filename 0772a_pdf.pdf ISCB-5-RPT-C053-CR-v1a.pdf
pdf_data/report_frontpage
  • DE:
    • match_rules: (BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)
    • cert_id: BSI-DSZ-CC-0772-2014
    • cert_item: Kanguru Defender Elite 200 Kanguru Defender 2000 Universal Kanguru Local Administrator, v3.2.0.3 Kanguru Remote Management Console, v5.0.2.6
    • developer: Kanguru Solutions
    • cert_lab: BSI
pdf_data/report_keywords/asymmetric_crypto
  • RSA:
    • RSA 2048: 1
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0772-2014: 22
  • MY:
    • ISCB-5-RPT-C053-CR-v1a: 41
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0025-2006: 4
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_FSP.6: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM.1: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_FLR.1: 5
    • ALC_FLR: 3
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 1
    • ALC_CMC.5: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 1
    • ALC_LCD.2: 1
    • ALC_TAT.1: 1
    • ALC_TAT.2: 1
    • ALC_TAT.3: 1
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_TAT: 1
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 1
    • ATE_DPT.4: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 1
    • AVA_VAN: 2
  • APE:
    • APE_INT.1: 1
    • APE_CCL.1: 1
    • APE_SPD.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_ECD.1: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
  • ASE:
    • ASE_INT.1: 1
    • ASE_CCL.1: 1
    • ASE_SPD.1: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_ECD.1: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 8
    • EAL 1: 7
    • EAL 4: 7
    • EAL2: 2
    • EAL 3: 4
    • EAL 5: 6
    • EAL 6: 3
    • EAL 7: 4
    • EAL 2 augmented: 3
  • ITSEC:
    • ITSEC Evaluation: 1
  • EAL:
    • EAL2: 9
pdf_data/report_keywords/cc_security_level/EAL
  • EAL 2: 8
  • EAL 1: 7
  • EAL 4: 7
  • EAL2: 2
  • EAL 3: 4
  • EAL 5: 6
  • EAL 6: 3
  • EAL 7: 4
  • EAL 2 augmented: 3
  • EAL2: 9
pdf_data/report_keywords/cc_security_level/EAL/EAL2 2 9
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_COP.1: 1
    • FCS_CKM.1: 1
    • FCS_RNG.1: 1
  • FDP:
    • FDP_ACC.1: 2
    • FDP_ACF.1: 2
  • FIA:
    • FIA_UID.2: 4
    • FIA_UAU.2: 4
    • FIA_UAU.6: 1
    • FIA_SOS.1: 1
  • FMT:
    • FMT_MTD: 2
    • FMT_SMF: 2
    • FMT_SMF.1: 1
  • FAU:
    • FAU_GEN.1: 1
    • FAU_SAR.1: 1
  • FCO:
    • FCO_NRO.1.1: 1
    • FCO_NRO.1.2: 1
    • FCO_NRO.1.3: 1
  • FCS:
    • FCS_CKM: 2
    • FCS_COP: 5
    • FCS_CKM.4: 1
  • FDP:
    • FDP_ACC.1: 1
    • FDP_ACF.1: 1
  • FIA:
    • FIA_ATD: 2
    • FIA_AFL.1: 1
    • FIA_UAU.2: 1
    • FIA_UID.2: 1
  • FMT:
    • FMT_SMF.1: 1
    • FMT_SMR.1: 1
    • FMT_MSA.3.1: 1
    • FMT_MTD: 2
    • FMT_MSA.3.2: 1
    • FMT_MSA: 2
  • FPT:
    • FPT_ITT.1: 1
  • FTA:
    • FTA_SSL.1: 1
pdf_data/report_keywords/cc_sfr/FCS
  • FCS_COP.1: 1
  • FCS_CKM.1: 1
  • FCS_RNG.1: 1
  • FCS_CKM: 2
  • FCS_COP: 5
  • FCS_CKM.4: 1
pdf_data/report_keywords/cc_sfr/FDP/FDP_ACC.1 2 1
pdf_data/report_keywords/cc_sfr/FDP/FDP_ACF.1 2 1
pdf_data/report_keywords/cc_sfr/FIA
  • FIA_UID.2: 4
  • FIA_UAU.2: 4
  • FIA_UAU.6: 1
  • FIA_SOS.1: 1
  • FIA_ATD: 2
  • FIA_AFL.1: 1
  • FIA_UAU.2: 1
  • FIA_UID.2: 1
pdf_data/report_keywords/cc_sfr/FIA/FIA_UAU.2 4 1
pdf_data/report_keywords/cc_sfr/FIA/FIA_UID.2 4 1
pdf_data/report_keywords/cc_sfr/FMT
  • FMT_MTD: 2
  • FMT_SMF: 2
  • FMT_SMF.1: 1
  • FMT_SMF.1: 1
  • FMT_SMR.1: 1
  • FMT_MSA.3.1: 1
  • FMT_MTD: 2
  • FMT_MSA.3.2: 1
  • FMT_MSA: 2
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Report, Version 8, 2014-10-07, Final Evaluation Technical Report, atsec information security GmbH, (confidential document) [9] Evaluated Product User Guide, Version 1.20, 2014-10-02 [10] Kanguru Defender Elite 200 User: 1
    • KRMC Administrator's User Manual, Version 5.0.2, 2013-11-01 [14] Configuration lists for the TOE (confidential documents): a) Configuration list for TOE executables, 2014-09-17 b) Configuration list from Phison: 1
  • OutOfScope:
    • out of scope: 2
    • Ref [6]) are out of scope for this evaluation: 1
    • 11 All of the underlying hardware and the operating systems used by both mSign and EzIdentity are out of scope for this evaluation. 12 Figure 1 identifies the major architectural components that comprise the: 1
    • by both mSign and EzIdentity as described in Section 1.4.3 of the Security Target (Ref [6]) are out of scope for this evaluation. 23 The assurance gained via evaluation applies specifically to the TOE in the: 1
pdf_data/report_keywords/eval_facility
  • atsec:
    • atsec: 3
pdf_data/report_keywords/hash_function/SHA
  • SHA2:
    • SHA-256: 13
  • SHA1:
    • SHA-1: 4
  • SHA2:
    • SHA-256: 1
pdf_data/report_keywords/hash_function/SHA/SHA2/SHA-256 13 1
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 2
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • physical tampering: 2
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 20: 2
    • AIS 32: 1
  • ISO:
    • ISO/IEC 17065: 2
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
  • FIPS:
    • FIPS 180-3: 1
    • FIPS 180-2: 1
  • PKCS:
    • PKCS#1: 3
    • PKCS#5: 2
  • RFC:
    • RFC 2898: 2
    • RFC 4226: 2
    • RFC 6328: 2
    • RFC 6287: 2
  • ISO:
    • ISO/IEC15408: 2
    • ISO/IEC 18045: 2
pdf_data/report_keywords/standard_id/ISO
  • ISO/IEC 17065: 2
  • ISO/IEC 15408: 2
  • ISO/IEC 18045: 2
  • ISO/IEC15408: 2
  • ISO/IEC 18045: 2
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES-256: 1
      • AES: 4
  • DES:
    • 3DES:
      • Triple-DES: 5
      • TDES: 3
  • constructions:
    • MAC:
      • HMAC: 3
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI TR-02102: 1
    • BSI 7138: 2
    • BSI 7125: 2
    • BSI 7148: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/report_metadata
  • pdf_file_size_bytes: 1643286
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 42
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20141121083051+01'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, encrypted USB storage device, Kanguru Defender"
  • /ModDate: D:20141121113713+01'00'
  • /Producer: LibreOffice 4.2
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0772-2014
  • pdf_hyperlinks: https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/
  • pdf_file_size_bytes: 398084
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 42
  • /Author: ISCB Department
  • /Category: PUBLIC
  • /Caveat: FINAL
  • /Classification: PUBLIC
  • /Company: CyberSecurity Malaysia
  • /CreationDate: D:20140106141939+08'00'
  • /Creator: Acrobat PDFMaker 10.1 for Word
  • /Developer: EZMCOM Inc
  • /Document Type: CR
  • /Identifier: ISCB-5-RPT-C053-CR-v1a
  • /Index: MyCB_TMP_002
  • /Keywords: MyCB_TMP_002
  • /ModDate: D:20140106142000+08'00'
  • /Phase: Release
  • /Producer: Adobe PDF Library 10.0
  • /Project Code: C053
  • /Released: 27 December 2013
  • /ST Date: 18 November 2013
  • /ST Title: EzIdentity™ mSign™ & EzIdentity™ Authentication Platform Security Target
  • /ST Version: v1.1
  • /SourceModified: D:20140106061916
  • /Sponsor: EZMCOM Inc
  • /Subject: EzIdentity™ mSign™ (Android v2.0.0.1 & iOS v2.0.0.1) and EzIdentity™ Authentication Platform v4.0.0.2
  • /TOE Name: EzIdentity™ mSign™ and EzIdentity™ Authentication Platform
  • /TOE Version: EzIdentity™ mSign™ (Android v2.0.0.1 & iOS v2.0.0.1) and EzIdentity™ Authentication Platform v4.0.02
  • /Title: C053 Certification Report
  • /Version: v1a
  • pdf_hyperlinks: http://www.cybersecurity.my/mycc, mailto:[email protected], http://www.commoncriteriaportal.org/
pdf_data/report_metadata//Author Bundesamt für Sicherheit in der Informationstechnik ISCB Department
pdf_data/report_metadata//CreationDate D:20141121083051+01'00' D:20140106141939+08'00'
pdf_data/report_metadata//Creator Writer Acrobat PDFMaker 10.1 for Word
pdf_data/report_metadata//Keywords "Common Criteria, Certification, Zertifizierung, encrypted USB storage device, Kanguru Defender" MyCB_TMP_002
pdf_data/report_metadata//ModDate D:20141121113713+01'00' D:20140106142000+08'00'
pdf_data/report_metadata//Producer LibreOffice 4.2 Adobe PDF Library 10.0
pdf_data/report_metadata//Subject Common Criteria Certification EzIdentity™ mSign™ (Android v2.0.0.1 & iOS v2.0.0.1) and EzIdentity™ Authentication Platform v4.0.0.2
pdf_data/report_metadata//Title Certification Report BSI-DSZ-CC-0772-2014 C053 Certification Report
pdf_data/report_metadata/pdf_file_size_bytes 1643286 398084
pdf_data/report_metadata/pdf_is_encrypted False True
pdf_data/st_filename 0772b_pdf.pdf EZMCOM EzIdentity Security Target v1.1.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0772: 1
pdf_data/st_keywords/cc_claims
  • O:
    • O.CRYPT: 4
    • O.COMMSEC: 4
    • O.MODIFY: 4
    • O.CONTROL: 3
    • O.KEYPROTECT: 3
    • O.-CONTROL: 1
  • T:
    • T.COMINT: 3
    • T.MODIFY: 3
    • T.TSFDATA: 3
    • T.UNAUTHORISED_A: 1
    • T.UNAUTHORISED_ACCESS: 2
  • A:
    • A.ADMIN: 2
    • A.OS: 2
    • A.TIMESTAMP: 3
    • A.DATACONTROL: 2
    • A.UPDATE: 2
    • A.PHYSICAL: 2
  • OE:
    • OE.INSTALL: 1
    • OE.ADMIN: 2
    • OE.OPSYS: 2
    • OE.ENVIRONMENT: 3
    • OE.UPDATE: 2
    • OE.TIMESTAMP: 2
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0025: 6
    • BSI-PP- 0025: 13
pdf_data/st_keywords/cc_sar/ADV
  • ADV_SPM.1: 2
  • ADV_ARC.1: 1
  • ADV_FSP.2: 1
  • ADV_TDS.1: 1
  • ADV_ARC.1: 1
  • ADV_FSP.2: 1
  • ADV_TDS.1: 1
pdf_data/st_keywords/cc_sar/ALC
  • ALC_FLR.1: 5
  • ALC_CMC.2: 1
  • ALC_CMS.2: 1
  • ALC_DEL.1: 1
  • ALC_CMS.2: 1
  • ALC_CMC.2: 1
  • ALC_DEL.1: 1
pdf_data/st_keywords/cc_sar/ASE/ASE_CCL.1 1 4
pdf_data/st_keywords/cc_sar/ASE/ASE_INT.1 1 4
pdf_data/st_keywords/cc_sar/ASE/ASE_OBJ.2 1 4
pdf_data/st_keywords/cc_sar/ASE/ASE_REQ.2 1 4
pdf_data/st_keywords/cc_sar/ASE/ASE_SPD.1 1 4
pdf_data/st_keywords/cc_sar/ASE/ASE_TSS.1 1 4
pdf_data/st_keywords/cc_security_level/EAL/EAL2 4 9
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
  • FCS:
    • FCS_RNG.1: 15
    • FCS_CKM.1: 9
    • FCS_CKM.4: 9
    • FCS_COP.1: 9
    • FCS_RNG: 2
    • FCS_RNG.1.1: 3
    • FCS_RNG.1.2: 3
    • FCS_CKM.1.1: 1
    • FCS_CKM.4.1: 1
    • FCS_COP.1.1: 1
    • FCS_CKM.2: 1
  • FDP:
    • FDP_ACC.1: 14
    • FDP_ACF.1: 13
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_IFC.1: 1
  • FIA:
    • FIA_UAU.1: 7
    • FIA_UAU.6: 8
    • FIA_SOS.1: 8
    • FIA_UAU.2: 9
    • FIA_UID.2: 10
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.6.1: 1
    • FIA_SOS.1.1: 1
    • FIA_UAU.2.1: 1
    • FIA_UID.2.1: 1
    • FIA_UID.1: 2
  • FMT:
    • FMT_MSA.1: 8
    • FMT_MTD: 12
    • FMT_SMF: 20
    • FMT_SMR.1: 12
    • FMT_SMF.1: 6
    • FMT_MTD.1: 3
    • FMT_MSA.1.1: 1
    • FMT_MTD.1.1: 2
    • FMT_SMF.1.1: 2
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_MSA.3: 1
  • FPT:
    • FPT_FLS.1: 9
    • FPT_RCV.4: 8
    • FPT_PHP.1: 8
    • FPT_RCV.4.1: 2
    • FPT_FLS.1.1: 1
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
  • FAU:
    • FAU_GEN.1: 5
    • FAU_SAR.1: 4
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
  • FCO:
    • FCO_NRO.1: 6
    • FCO_NRO.1.1: 1
    • FCO_NRO.1.2: 1
    • FCO_NRO.1.3: 1
  • FCS:
    • FCS_CKM: 14
    • FCS_CKM.4: 23
    • FCS_COP: 28
    • FCS_CKM.2: 4
    • FCS_COP.1: 5
    • FCS_CKM.4.1: 1
    • FCS_CKM.1: 13
  • FDP:
    • FDP_IFF: 2
    • FDP_ACC.1: 17
    • FDP_ACF.1: 6
    • FDP_ITC.1: 12
    • FDP_ITC.2: 12
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 5
  • FIA:
    • FIA_AFL.1: 7
    • FIA_ATD: 8
    • FIA_UID.2: 6
    • FIA_UAU.2: 9
    • FIA_UID.1: 6
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_UAU.1: 4
    • FIA_ATD.1.1: 2
    • FIA_UAU.2.1: 1
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA: 6
    • FMT_MSA.3: 8
    • FMT_MTD: 12
    • FMT_SMF.1: 14
    • FMT_SMR.1: 24
    • FMT_MSA.1.1: 2
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1.1: 2
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_MSA.1: 3
  • FPT:
    • FPT_ITT.1: 5
    • FPT_ITT.1.1: 1
    • FPT_STM.1: 2
  • FTA:
    • FTA_SSL.1: 5
    • FTA_SSL.1.1: 1
    • FTA_SSL.1.2: 1
pdf_data/st_keywords/cc_sfr/FAU
  • FAU_GEN: 1
  • FAU_GEN.1: 5
  • FAU_SAR.1: 4
  • FAU_SAR.1.1: 1
  • FAU_SAR.1.2: 1
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_RNG.1: 15
  • FCS_CKM.1: 9
  • FCS_CKM.4: 9
  • FCS_COP.1: 9
  • FCS_RNG: 2
  • FCS_RNG.1.1: 3
  • FCS_RNG.1.2: 3
  • FCS_CKM.1.1: 1
  • FCS_CKM.4.1: 1
  • FCS_COP.1.1: 1
  • FCS_CKM.2: 1
  • FCS_CKM: 14
  • FCS_CKM.4: 23
  • FCS_COP: 28
  • FCS_CKM.2: 4
  • FCS_COP.1: 5
  • FCS_CKM.4.1: 1
  • FCS_CKM.1: 13
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 9 13
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 1 4
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 9 23
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 9 5
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACC.1: 14
  • FDP_ACF.1: 13
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_ITC.1: 2
  • FDP_ITC.2: 2
  • FDP_IFC.1: 1
  • FDP_IFF: 2
  • FDP_ACC.1: 17
  • FDP_ACF.1: 6
  • FDP_ITC.1: 12
  • FDP_ITC.2: 12
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_IFC.1: 5
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 14 17
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 13 6
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 1 5
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 2 12
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 2 12
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_UAU.1: 7
  • FIA_UAU.6: 8
  • FIA_SOS.1: 8
  • FIA_UAU.2: 9
  • FIA_UID.2: 10
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.6.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.2.1: 1
  • FIA_UID.2.1: 1
  • FIA_UID.1: 2
  • FIA_AFL.1: 7
  • FIA_ATD: 8
  • FIA_UID.2: 6
  • FIA_UAU.2: 9
  • FIA_UID.1: 6
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_UAU.1: 4
  • FIA_ATD.1.1: 2
  • FIA_UAU.2.1: 1
  • FIA_UID.2.1: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 7 4
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 2 6
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.2 10 6
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_MSA.1: 8
  • FMT_MTD: 12
  • FMT_SMF: 20
  • FMT_SMR.1: 12
  • FMT_SMF.1: 6
  • FMT_MTD.1: 3
  • FMT_MSA.1.1: 1
  • FMT_MTD.1.1: 2
  • FMT_SMF.1.1: 2
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_MSA.3: 1
  • FMT_MSA: 6
  • FMT_MSA.3: 8
  • FMT_MTD: 12
  • FMT_SMF.1: 14
  • FMT_SMR.1: 24
  • FMT_MSA.1.1: 2
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_MTD.1.1: 2
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_MSA.1: 3
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 8 3
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1.1 1 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 1 8
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 6 14
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 2 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 12 24
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_FLS.1: 9
  • FPT_RCV.4: 8
  • FPT_PHP.1: 8
  • FPT_RCV.4.1: 2
  • FPT_FLS.1.1: 1
  • FPT_PHP.1.1: 1
  • FPT_PHP.1.2: 1
  • FPT_ITT.1: 5
  • FPT_ITT.1.1: 1
  • FPT_STM.1: 2
pdf_data/st_keywords/certification_process/OutOfScope
  • Out of scope: 2
  • 11 1.5.4.3 Out of scope : 1
  • 11 1.5.4.3 Out of scope ........................................................................................... 12 1.5: 1
  • from the KRMC to the device. Commands are queued at the KRMC until polled form the device. 1.5.4.3 Out of scope The TOE supports additional features that are not part of the scope: ● Antivirus solution ●: 1
  • out of scope: 1
  • Please note that the RSA encryption and decryption operations performed on the EzIdentity are out of scope for this evaluation. COMMERCIAL-IN-CONFIDENCE 13 of 43 2 Conformance Claim (ASE_CCL.1) The ST and: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
pdf_data/st_keywords/eval_facility
  • atsec:
    • atsec: 40
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 1
  • SHA:
    • SHA1:
      • SHA-1: 7
    • SHA2:
      • SHA-256: 4
  • PBKDF:
    • PBKDF2: 2
pdf_data/st_keywords/hash_function/SHA
  • SHA2:
    • SHA-256: 1
  • SHA1:
    • SHA-1: 7
  • SHA2:
    • SHA-256: 4
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-256 1 4
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 14
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 3
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS 20: 1
    • AIS 31: 1
  • FIPS:
    • FIPS 46-3: 1
    • FIPS 180-2: 1
    • FIPS PUB 180-3: 1
    • FIPS 180-3: 1
  • PKCS:
    • PKCS#1: 6
    • PKCS#5: 3
  • RFC:
    • RFC 2898: 2
    • RFC 4226: 2
    • RFC 6328: 2
    • RFC 6287: 2
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
  • DES:
    • 3DES:
      • Triple-DES: 7
      • TDES: 7
  • constructions:
    • MAC:
      • HMAC: 5
pdf_data/st_keywords/vendor
  • STMicroelectronics:
    • STM: 1
  • Thales:
    • Thales: 1
  • Microsoft:
    • Microsoft: 1
pdf_data/st_metadata
  • pdf_file_size_bytes: 704587
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 41
  • /Keywords: Security Target, Common Criteria, USB Storage, Encryption, Protected Storage
  • /Subject:
  • /Title: Kanguru Defender Security Target (version 1.10 as of 2014-10-06)
  • /Creator: Unknown
  • /Author: Andreas Siegert (generated by CCTool version 2.8)
  • /Producer: XEP 4.23
  • /application: CCTool version x.y
  • /Trapped: /False
  • /CreationDate: D:20141006150157Z
  • /ModDate: D:20141006150157Z
  • pdf_hyperlinks: http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R3.pdf
  • pdf_file_size_bytes: 928180
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 43
  • /Title: EzIdentity™ mSign™ & EzIdentity™ Authentication Platform Security Target EAL2 Security Target
  • /Author: Soshinee Govindasamy
  • /Creator: Microsoft® Word 2010
  • /CreationDate: D:20131121122329+08'00'
  • /ModDate: D:20131121122329+08'00'
  • /Producer: Microsoft® Word 2010
  • pdf_hyperlinks:
pdf_data/st_metadata//Author Andreas Siegert (generated by CCTool version 2.8) Soshinee Govindasamy
pdf_data/st_metadata//CreationDate D:20141006150157Z D:20131121122329+08'00'
pdf_data/st_metadata//Creator Unknown Microsoft® Word 2010
pdf_data/st_metadata//ModDate D:20141006150157Z D:20131121122329+08'00'
pdf_data/st_metadata//Producer XEP 4.23 Microsoft® Word 2010
pdf_data/st_metadata//Title Kanguru Defender Security Target (version 1.10 as of 2014-10-06) EzIdentity™ mSign™ & EzIdentity™ Authentication Platform Security Target EAL2 Security Target
pdf_data/st_metadata/pdf_file_size_bytes 704587 928180
pdf_data/st_metadata/pdf_hyperlinks http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R3.pdf
pdf_data/st_metadata/pdf_number_of_pages 41 43
dgst eda06ca3c208ebd0 80a30e9889a58515