Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

- Kanguru Defender Elite 200 with Kanguru Defender Manager Elite 200, Firmware Version 02.03.10, KDME200 v2.0.0.0-2/3/6,- Kanguru Defender 2000 with Kanguru Defender Manager 2000, Firmware Version 02.03.10, KDM2000 v1.2.1.8-2/3/6,- Universal Kanguru Local Administrator, Version 3.2.0.3 and- Kanguru Remote Management Console, Version 5.0.2.6
BSI-DSZ-CC-0772-2014
Northern Light Video Conferencing System (NLVC) consist of NLVC Client version 6.3.0.0, NLVC Server Webadmin Tool version 7.0.0.1, and NLVC Server version 6.1-0.21
ISCB-5-RPT-C034-CR-v1a
name - Kanguru Defender Elite 200 with Kanguru Defender Manager Elite 200, Firmware Version 02.03.10, KDME200 v2.0.0.0-2/3/6,- Kanguru Defender 2000 with Kanguru Defender Manager 2000, Firmware Version 02.03.10, KDM2000 v1.2.1.8-2/3/6,- Universal Kanguru Local Administrator, Version 3.2.0.3 and- Kanguru Remote Management Console, Version 5.0.2.6 Northern Light Video Conferencing System (NLVC) consist of NLVC Client version 6.3.0.0, NLVC Server Webadmin Tool version 7.0.0.1, and NLVC Server version 6.1-0.21
category Data Protection Other Devices and Systems
not_valid_before 2014-11-07 2012-03-22
not_valid_after 2019-11-08 2017-03-22
scheme DE MY
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/JMCS%20Systems%20EAL2%20Security%20Target%20(Northern%20Light%20Video%20Conferencing)%20v1.2.pdf
manufacturer Kanguru Solutions JMCS Sdn Bhd
manufacturer_web https://www.kanguru.com https://www.nltvc.com
security_level ALC_FLR.1, EAL2+ EAL2
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C034-CR-v1a.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Schutzprofil fur USB-Datentrager, Version 1.4', 'pp_eal': 'EAL2+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0025b.pdf', 'pp_ids': frozenset({'SCHUTZPROFIL_USB-DATENTRAGER_V1.4'})})
maintenance_updates frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2015, 1, 20), 'maintenance_title': 'Kanguru Defender Elite 200 and Kanguru Defender 2000, firmware version 2.05.10', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772_ma1a_pdf.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772_ma1b_pdf.pdf'})
state/report/pdf_hash 16e52e72927a5eee7124e6fde0c186c1d3d113e733e6116f5fdfcc44278c5b57 1fbf09ca7b45347f4f0603d0b3472df75bfae6a2b01fea1bf2e45fa7e270d647
state/report/txt_hash 8cb2309bdc02367be25c3961b565d25c9f78b2d7cdce20c08213092f4a2eff82 2ec3cfcfc975c4bd3865664c68a94a8465d1adadf2e883c53cd4bebf8ba356be
state/st/pdf_hash 077d27d1e2e9eafc65cbb9d302bc66883e2dd06e21ea816741ca25fe7f7dcd7d 9853ec30c8121dcecf48d3c1c1397a0e0031a9eed0b589b553cd87966b5ac4c0
state/st/txt_hash 74714db4c60a8332c3603aaae83a1c8ec3cbea7950400f562332e8ccdcc98147 e155d4d6fa3d13ec44da115d85f113157dcb15c2e7c10b4884180ac019a54148
heuristics/cert_id BSI-DSZ-CC-0772-2014 ISCB-5-RPT-C034-CR-v1a
heuristics/cert_lab BSI None
heuristics/extracted_versions 2.0.0.0, 1.2.1.8, 3.2.0.3, 02.03.10, 5.0.2.6 6.3.0.0, 0.21, 7.0.0.1, 6.1
heuristics/scheme_data None
  • cert_no: 2012-003-C034
  • developer: JMCS Sdn Bhd
  • level: EAL2
  • product: Northern Light Video Conferencing System (NLVC) consist of: - NLVC Client version 6.3.0.0 - NLVC Server Webadmin Tool version 7.0.0.1 - NLVC Server version 6.1-0.21
  • certification_date: 22-03-2012
  • expiration_date: 22-03-2017
  • recognition: CCRA
  • url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/151
  • enhanced:
    • cert_id: C034
    • product: Northern Light Video Conferencing System (NLVC) consist of: - NLVC Client version 6.3.0.0 - NLVC Server Webadmin Tool version 7.0.0.1 - NLVC Server version 6.1-0.21
    • developer: NLTVC Sdn. Bhd. Level 2, Block C, Science@USMNo 10, Persiaran Bukit Jambul,11900 Penang, MALAYSIA. URL: http://www.nltvc.comEmail: [email protected]: +60 (4) 653 3005Fax: +60 (4) 653 3001
    • category: Other Devices and Systems
    • type: Multipoint-to-multipoint video conferencing system.
    • scope: The Target of Evaluation (TOE), Northern Light Video Conferencing System (NLVC), is a multipoint-to-multipoint video conferencing system. It allows conferencing of any desired number of people around the world using existing LAN infrastructure, without affecting current applications. It is software based and uses non-proprietary hardware. The TOE components include: NLVC Client version 6.3.0.0. A user based GUI application that works on the end user's PC or NLVC boardroom codec system. NLVC Server Webadmin Tool version 7.0.0.1. A web based interface use to ease the administration of the TOE (NLVC Server). NLVC Server version 6.1-0.21. The main purpose is to maintain and control conference according to the Real Time Switching (RSW) control criteria used. The evaluated security functionalities for the TOE includes: Identification and Authentication – the TOE requires that each user is successfully identified (User ID) and authenticated (password) before they are allowed to access the functionality of the TOE. Secure communication – the TOE provides a secure SSL session between the client and the server in order to protect the video feeds and command data when transmitted between the client and the server. Security Management – the TOE manages functions to ensure efficient and secure management of the TOE and its security functions. The TOE restricts access to the management functions based on the role of the user. The roles maintained by the TOE are: Chairman, Participant, Observer, and Administrator. Each access control list maps users and roles to the operations that they are permitted to perform on the object. User Data Protection – the TOE manages access control on configuration data and functions based on user role and access control lists.
    • assurance_level: EAL2
    • certification_date: 22-03-2012
    • expiration_date: 22-03-2017
    • mutual_recognition: CCRA
    • target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C034/JMCS%20Systems%20EAL2%20Security%20Target%20(Northern%20Light%20Video%20Conferencing)%20v1.2.pdf
    • report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C034/ISCB-5-RPT-C034-CR-v1a.pdf
    • status: Archive
pdf_data/report_filename 0772a_pdf.pdf ISCB-5-RPT-C034-CR-v1a.pdf
pdf_data/report_frontpage
  • DE:
    • match_rules: (BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)
    • cert_id: BSI-DSZ-CC-0772-2014
    • cert_item: Kanguru Defender Elite 200 Kanguru Defender 2000 Universal Kanguru Local Administrator, v3.2.0.3 Kanguru Remote Management Console, v5.0.2.6
    • developer: Kanguru Solutions
    • cert_lab: BSI
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0772-2014: 22
  • MY:
    • ISCB-5-RPT-C034-CR-v1a: 35
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0025-2006: 4
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_FSP.6: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM.1: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_FLR.1: 5
    • ALC_FLR: 3
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 1
    • ALC_CMC.5: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 1
    • ALC_LCD.2: 1
    • ALC_TAT.1: 1
    • ALC_TAT.2: 1
    • ALC_TAT.3: 1
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_TAT: 1
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 1
    • ATE_DPT.4: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 1
    • AVA_VAN: 2
  • APE:
    • APE_INT.1: 1
    • APE_CCL.1: 1
    • APE_SPD.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_ECD.1: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
  • ASE:
    • ASE_INT.1: 1
    • ASE_CCL.1: 1
    • ASE_SPD.1: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_ECD.1: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 8
    • EAL 1: 7
    • EAL 4: 7
    • EAL2: 2
    • EAL 3: 4
    • EAL 5: 6
    • EAL 6: 3
    • EAL 7: 4
    • EAL 2 augmented: 3
  • ITSEC:
    • ITSEC Evaluation: 1
  • EAL:
    • EAL2: 9
pdf_data/report_keywords/cc_security_level/EAL
  • EAL 2: 8
  • EAL 1: 7
  • EAL 4: 7
  • EAL2: 2
  • EAL 3: 4
  • EAL 5: 6
  • EAL 6: 3
  • EAL 7: 4
  • EAL 2 augmented: 3
  • EAL2: 9
pdf_data/report_keywords/cc_security_level/EAL/EAL2 2 9
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_COP.1: 1
    • FCS_CKM.1: 1
    • FCS_RNG.1: 1
  • FDP:
    • FDP_ACC.1: 2
    • FDP_ACF.1: 2
  • FIA:
    • FIA_UID.2: 4
    • FIA_UAU.2: 4
    • FIA_UAU.6: 1
    • FIA_SOS.1: 1
  • FMT:
    • FMT_MTD: 2
    • FMT_SMF: 2
    • FMT_SMF.1: 1
  • FCS:
    • FCS_COP.1: 1
  • FDP:
    • FDP_ACC.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 1
    • FDP_IFF.1.1: 1
    • FDP_IFF.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_IFF.1.6: 1
    • FDP_ITT.1: 1
  • FIA:
    • FIA_UAU: 2
    • FIA_UID: 2
    • FIA_UAU.2: 2
    • FIA_UID.2: 2
  • FMT:
    • FMT_MOF.1: 1
    • FMT_MSA: 4
    • FMT_MSA.1: 1
    • FMT_MSA.3.1: 2
    • FMT_MSA.3: 2
    • FMT_MTD: 3
    • FMT_SMF.1: 1
    • FMT_SMR.1: 1
  • FPR:
    • FPR_ITT.1: 1
pdf_data/report_keywords/cc_sfr/FCS
  • FCS_COP.1: 1
  • FCS_CKM.1: 1
  • FCS_RNG.1: 1
  • FCS_COP.1: 1
pdf_data/report_keywords/cc_sfr/FDP
  • FDP_ACC.1: 2
  • FDP_ACF.1: 2
  • FDP_ACC.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_IFC.1: 1
  • FDP_IFF.1.1: 1
  • FDP_IFF.1: 1
  • FDP_IFF.1.2: 1
  • FDP_IFF.1.3: 1
  • FDP_IFF.1.4: 1
  • FDP_IFF.1.5: 1
  • FDP_IFF.1.6: 1
  • FDP_ITT.1: 1
pdf_data/report_keywords/cc_sfr/FDP/FDP_ACC.1 2 1
pdf_data/report_keywords/cc_sfr/FDP/FDP_ACF.1 2 1
pdf_data/report_keywords/cc_sfr/FIA
  • FIA_UID.2: 4
  • FIA_UAU.2: 4
  • FIA_UAU.6: 1
  • FIA_SOS.1: 1
  • FIA_UAU: 2
  • FIA_UID: 2
  • FIA_UAU.2: 2
  • FIA_UID.2: 2
pdf_data/report_keywords/cc_sfr/FIA/FIA_UAU.2 4 2
pdf_data/report_keywords/cc_sfr/FIA/FIA_UID.2 4 2
pdf_data/report_keywords/cc_sfr/FMT
  • FMT_MTD: 2
  • FMT_SMF: 2
  • FMT_SMF.1: 1
  • FMT_MOF.1: 1
  • FMT_MSA: 4
  • FMT_MSA.1: 1
  • FMT_MSA.3.1: 2
  • FMT_MSA.3: 2
  • FMT_MTD: 3
  • FMT_SMF.1: 1
  • FMT_SMR.1: 1
pdf_data/report_keywords/cc_sfr/FMT/FMT_MTD 2 3
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Report, Version 8, 2014-10-07, Final Evaluation Technical Report, atsec information security GmbH, (confidential document) [9] Evaluated Product User Guide, Version 1.20, 2014-10-02 [10] Kanguru Defender Elite 200 User: 1
    • KRMC Administrator's User Manual, Version 5.0.2, 2013-11-01 [14] Configuration lists for the TOE (confidential documents): a) Configuration list for TOE executables, 2014-09-17 b) Configuration list from Phison: 1
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 1
  • TLS:
    • SSL:
      • SSL: 9
    • TLS:
      • TLS: 1
  • VPN:
    • VPN: 12
pdf_data/report_keywords/eval_facility
  • atsec:
    • atsec: 3
pdf_data/report_keywords/hash_function/SHA/SHA2
  • SHA-256: 13
  • SHA256: 1
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 2
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • physical tampering: 2
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 20: 2
    • AIS 32: 1
  • ISO:
    • ISO/IEC 17065: 2
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
  • FIPS:
    • FIPS 180-2: 1
  • ISO:
    • ISO/IEC15408: 2
    • ISO/IEC 18045: 2
pdf_data/report_keywords/standard_id/ISO
  • ISO/IEC 17065: 2
  • ISO/IEC 15408: 2
  • ISO/IEC 18045: 2
  • ISO/IEC15408: 2
  • ISO/IEC 18045: 2
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES-256: 1
      • AES: 4
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI TR-02102: 1
    • BSI 7138: 2
    • BSI 7125: 2
    • BSI 7148: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/report_metadata
  • pdf_file_size_bytes: 1643286
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 42
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20141121083051+01'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, encrypted USB storage device, Kanguru Defender"
  • /ModDate: D:20141121113713+01'00'
  • /Producer: LibreOffice 4.2
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0772-2014
  • pdf_hyperlinks: https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/
  • pdf_file_size_bytes: 439358
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 35
  • /Author: ISCB Department
  • /Category: PUBLIC
  • /Company: CyberSecurity Malaysia
  • /CreationDate: D:20120327111223+08'00'
  • /Creator: Acrobat PDFMaker 8.1 for Word
  • /Keywords: C034 Northern Light Video Conferencing (NLVC) System
  • /ModDate: D:20120327111314+08'00'
  • /Producer: Acrobat Distiller 8.1.0 (Windows)
  • /SourceModified: D:20120327031203
  • /Subject: Northern Light Video Conferencing System (NLVC)
  • /Title: C034 Certification Report
  • pdf_hyperlinks: http://www.cybersecurity.my/mycc, mailto:[email protected]
pdf_data/report_metadata//Author Bundesamt für Sicherheit in der Informationstechnik ISCB Department
pdf_data/report_metadata//CreationDate D:20141121083051+01'00' D:20120327111223+08'00'
pdf_data/report_metadata//Creator Writer Acrobat PDFMaker 8.1 for Word
pdf_data/report_metadata//Keywords "Common Criteria, Certification, Zertifizierung, encrypted USB storage device, Kanguru Defender" C034 Northern Light Video Conferencing (NLVC) System
pdf_data/report_metadata//ModDate D:20141121113713+01'00' D:20120327111314+08'00'
pdf_data/report_metadata//Producer LibreOffice 4.2 Acrobat Distiller 8.1.0 (Windows)
pdf_data/report_metadata//Subject Common Criteria Certification Northern Light Video Conferencing System (NLVC)
pdf_data/report_metadata//Title Certification Report BSI-DSZ-CC-0772-2014 C034 Certification Report
pdf_data/report_metadata/pdf_file_size_bytes 1643286 439358
pdf_data/report_metadata/pdf_hyperlinks https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/ http://www.cybersecurity.my/mycc, mailto:[email protected]
pdf_data/report_metadata/pdf_is_encrypted False True
pdf_data/report_metadata/pdf_number_of_pages 42 35
pdf_data/st_filename 0772b_pdf.pdf JMCS Systems EAL2 Security Target (Northern Light Video Conferencing) v1.2.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0772: 1
pdf_data/st_keywords/cc_claims
  • O:
    • O.ACCESS: 4
    • O.USER: 3
    • O.MANAGE: 2
    • O.PASSWORD: 3
    • O.COMMS: 3
  • T:
    • T.ACCESS: 2
    • T.SNIFFING: 2
    • T.MANAGEMENT: 2
    • T.PASSWORD: 2
  • A:
    • A.ENVIRONMENT: 2
    • A.TRUST: 2
    • A.ADMIN: 2
    • A.PHYSICAL: 2
    • A.DATABASE: 2
    • A.MANAGEMENT: 2
    • A.CRYPTO: 2
  • OE:
    • OE.ENVIRONMENT: 2
    • OE.TRUST: 2
    • OE.ADMIN: 2
    • OE.PHYSICAL: 2
    • OE.DATABASE: 2
    • OE.MANAGEMENT: 2
    • OE.CRYPTO: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0025: 6
    • BSI-PP- 0025: 13
pdf_data/st_keywords/cc_sar/ADV
  • ADV_SPM.1: 2
  • ADV_ARC.1: 1
  • ADV_FSP.2: 1
  • ADV_TDS.1: 1
  • ADV_ARC.1: 1
  • ADV_FSP.2: 1
  • ADV_TDS.1: 1
pdf_data/st_keywords/cc_sar/ALC
  • ALC_FLR.1: 5
  • ALC_CMC.2: 1
  • ALC_CMS.2: 1
  • ALC_DEL.1: 1
  • ALC_CMS.2: 1
  • ALC_CMC.2: 1
  • ALC_DEL.1: 1
pdf_data/st_keywords/cc_sar/ASE
  • ASE_INT.1: 1
  • ASE_CCL.1: 1
  • ASE_SPD.1: 1
  • ASE_OBJ.2: 1
  • ASE_ECD.1: 1
  • ASE_REQ.2: 1
  • ASE_TSS.1: 1
  • ASE_INT: 2
  • ASE_CCL: 2
  • ASE_OBJ: 2
  • ASE_REQ: 2
  • ASE_TSS: 2
  • ASE_CCL.1: 1
  • ASE_ECD.1: 1
  • ASE_INT.1: 1
  • ASE_OBJ.2: 1
  • ASE_REQ.2: 1
  • ASE_SPD.1: 1
  • ASE_TSS.1: 1
pdf_data/st_keywords/cc_security_level/EAL/EAL2 4 7
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
  • FCS:
    • FCS_RNG.1: 15
    • FCS_CKM.1: 9
    • FCS_CKM.4: 9
    • FCS_COP.1: 9
    • FCS_RNG: 2
    • FCS_RNG.1.1: 3
    • FCS_RNG.1.2: 3
    • FCS_CKM.1.1: 1
    • FCS_CKM.4.1: 1
    • FCS_COP.1.1: 1
    • FCS_CKM.2: 1
  • FDP:
    • FDP_ACC.1: 14
    • FDP_ACF.1: 13
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_IFC.1: 1
  • FIA:
    • FIA_UAU.1: 7
    • FIA_UAU.6: 8
    • FIA_SOS.1: 8
    • FIA_UAU.2: 9
    • FIA_UID.2: 10
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.6.1: 1
    • FIA_SOS.1.1: 1
    • FIA_UAU.2.1: 1
    • FIA_UID.2.1: 1
    • FIA_UID.1: 2
  • FMT:
    • FMT_MSA.1: 8
    • FMT_MTD: 12
    • FMT_SMF: 20
    • FMT_SMR.1: 12
    • FMT_SMF.1: 6
    • FMT_MTD.1: 3
    • FMT_MSA.1.1: 1
    • FMT_MTD.1.1: 2
    • FMT_SMF.1.1: 2
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_MSA.3: 1
  • FPT:
    • FPT_FLS.1: 9
    • FPT_RCV.4: 8
    • FPT_PHP.1: 8
    • FPT_RCV.4.1: 2
    • FPT_FLS.1.1: 1
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
  • FCS:
    • FCS_COP.1: 4
    • FCS_COP.1.1: 1
    • FCS_CKM.1: 2
    • FCS_CKM.4: 2
    • FCS_COP: 1
  • FDP:
    • FDP_IFC: 2
    • FDP_IFF: 4
    • FDP_ITT: 2
    • FDP_ACC.1: 13
    • FDP_ACF.1: 5
    • FDP_IFC.1: 15
    • FDP_IFF.1: 5
    • FDP_ITT.1: 4
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1.1: 1
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_ITT.1.1: 1
    • FDP_ACC: 1
    • FDP_ACF: 1
  • FIA:
    • FIA_UAU: 10
    • FIA_UID: 13
    • FIA_UAU.1: 2
    • FIA_UAU.2.1: 2
    • FIA_UID.1: 8
    • FIA_UID.2.1: 2
  • FMT:
    • FMT_MOF.1: 3
    • FMT_MSA: 23
    • FMT_MTD: 17
    • FMT_SMF.1: 22
    • FMT_SMR.1: 22
    • FMT_MSA.3: 4
    • FMT_MOF.1.1: 1
    • FMT_MSA.1.1: 2
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MSA.1: 4
    • FMT_MTD.1.1: 3
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_SMR: 2
    • FMT_SMF: 1
  • FPT:
    • FPT_ITT.1: 4
    • FPT_ITT.1.1: 1
    • FPT_ITT: 1
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_RNG.1: 15
  • FCS_CKM.1: 9
  • FCS_CKM.4: 9
  • FCS_COP.1: 9
  • FCS_RNG: 2
  • FCS_RNG.1.1: 3
  • FCS_RNG.1.2: 3
  • FCS_CKM.1.1: 1
  • FCS_CKM.4.1: 1
  • FCS_COP.1.1: 1
  • FCS_CKM.2: 1
  • FCS_COP.1: 4
  • FCS_COP.1.1: 1
  • FCS_CKM.1: 2
  • FCS_CKM.4: 2
  • FCS_COP: 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 9 2
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 9 2
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 9 4
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACC.1: 14
  • FDP_ACF.1: 13
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_ITC.1: 2
  • FDP_ITC.2: 2
  • FDP_IFC.1: 1
  • FDP_IFC: 2
  • FDP_IFF: 4
  • FDP_ITT: 2
  • FDP_ACC.1: 13
  • FDP_ACF.1: 5
  • FDP_IFC.1: 15
  • FDP_IFF.1: 5
  • FDP_ITT.1: 4
  • FDP_ITC.1: 2
  • FDP_ITC.2: 2
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_IFC.1.1: 1
  • FDP_IFF.1.1: 1
  • FDP_IFF.1.2: 1
  • FDP_IFF.1.3: 1
  • FDP_IFF.1.4: 1
  • FDP_IFF.1.5: 1
  • FDP_ITT.1.1: 1
  • FDP_ACC: 1
  • FDP_ACF: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 14 13
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 13 5
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 1 15
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_UAU.1: 7
  • FIA_UAU.6: 8
  • FIA_SOS.1: 8
  • FIA_UAU.2: 9
  • FIA_UID.2: 10
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.6.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.2.1: 1
  • FIA_UID.2.1: 1
  • FIA_UID.1: 2
  • FIA_UAU: 10
  • FIA_UID: 13
  • FIA_UAU.1: 2
  • FIA_UAU.2.1: 2
  • FIA_UID.1: 8
  • FIA_UID.2.1: 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 7 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.2.1 1 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 2 8
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.2.1 1 2
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_MSA.1: 8
  • FMT_MTD: 12
  • FMT_SMF: 20
  • FMT_SMR.1: 12
  • FMT_SMF.1: 6
  • FMT_MTD.1: 3
  • FMT_MSA.1.1: 1
  • FMT_MTD.1.1: 2
  • FMT_SMF.1.1: 2
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_MSA.3: 1
  • FMT_MOF.1: 3
  • FMT_MSA: 23
  • FMT_MTD: 17
  • FMT_SMF.1: 22
  • FMT_SMR.1: 22
  • FMT_MSA.3: 4
  • FMT_MOF.1.1: 1
  • FMT_MSA.1.1: 2
  • FMT_MSA.3.1: 2
  • FMT_MSA.3.2: 2
  • FMT_MSA.1: 4
  • FMT_MTD.1.1: 3
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_SMR: 2
  • FMT_SMF: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 8 4
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1.1 1 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 1 4
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD 12 17
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1.1 2 3
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF 20 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 6 22
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 2 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 12 22
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_FLS.1: 9
  • FPT_RCV.4: 8
  • FPT_PHP.1: 8
  • FPT_RCV.4.1: 2
  • FPT_FLS.1.1: 1
  • FPT_PHP.1.1: 1
  • FPT_PHP.1.2: 1
  • FPT_ITT.1: 4
  • FPT_ITT.1.1: 1
  • FPT_ITT: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • Out of scope: 2
    • 11 1.5.4.3 Out of scope : 1
    • 11 1.5.4.3 Out of scope ........................................................................................... 12 1.5: 1
    • from the KRMC to the device. Commands are queued at the KRMC until polled form the device. 1.5.4.3 Out of scope The TOE supports additional features that are not part of the scope: ● Antivirus solution ●: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 1
  • TLS:
    • SSL:
      • SSL: 7
  • VPN:
    • VPN: 5
pdf_data/st_keywords/eval_facility
  • atsec:
    • atsec: 40
pdf_data/st_keywords/hash_function/SHA/SHA2
  • SHA-256: 1
  • SHA256: 3
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 14
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 3
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS 20: 1
    • AIS 31: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
pdf_data/st_metadata
  • pdf_file_size_bytes: 704587
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 41
  • /Keywords: Security Target, Common Criteria, USB Storage, Encryption, Protected Storage
  • /Subject:
  • /Title: Kanguru Defender Security Target (version 1.10 as of 2014-10-06)
  • /Creator: Unknown
  • /Author: Andreas Siegert (generated by CCTool version 2.8)
  • /Producer: XEP 4.23
  • /application: CCTool version x.y
  • /Trapped: /False
  • /CreationDate: D:20141006150157Z
  • /ModDate: D:20141006150157Z
  • pdf_hyperlinks: http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R3.pdf
  • pdf_file_size_bytes: 336015
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 38
  • /Author: muzamir
  • /CreationDate: D:20120223110837+08'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20120223110837+08'00'
  • /Producer: Acrobat Distiller 10.0.0 (Windows)
  • /Title: Microsoft Word - JMCS Systems EAL2 Security Target (Northern Light Video Conferencing) v1.2.docx
  • pdf_hyperlinks:
pdf_data/st_metadata//Author Andreas Siegert (generated by CCTool version 2.8) muzamir
pdf_data/st_metadata//CreationDate D:20141006150157Z D:20120223110837+08'00'
pdf_data/st_metadata//Creator Unknown PScript5.dll Version 5.2.2
pdf_data/st_metadata//ModDate D:20141006150157Z D:20120223110837+08'00'
pdf_data/st_metadata//Producer XEP 4.23 Acrobat Distiller 10.0.0 (Windows)
pdf_data/st_metadata//Title Kanguru Defender Security Target (version 1.10 as of 2014-10-06) Microsoft Word - JMCS Systems EAL2 Security Target (Northern Light Video Conferencing) v1.2.docx
pdf_data/st_metadata/pdf_file_size_bytes 704587 336015
pdf_data/st_metadata/pdf_hyperlinks http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R3.pdf
pdf_data/st_metadata/pdf_number_of_pages 41 38
dgst eda06ca3c208ebd0 efb467462d13a42a