name |
DiamondTEK (DiamondCentral NSC (also sold as CC200) Application S/W Version 2.4.0.5, NSD-Prime F/W Version 2.4.0.3; and NSD (DiamondLink (also sold as CL100), DiamondPak (also sold as CP102, CP104, CP106), Diamond VPN (also sold as CV100); DiamondSAT
|
- Kanguru Defender Elite 200 with Kanguru Defender Manager Elite 200, Firmware Version 02.03.10, KDME200 v2.0.0.0-2/3/6,- Kanguru Defender 2000 with Kanguru Defender Manager 2000, Firmware Version 02.03.10, KDM2000 v1.2.1.8-2/3/6,- Universal Kanguru Local Administrator, Version 3.2.0.3 and- Kanguru Remote Management Console, Version 5.0.2.6
|
category |
Other Devices and Systems
|
Data Protection
|
not_valid_before |
2005-12-01
|
2014-11-07
|
not_valid_after |
2012-09-07
|
2019-11-08
|
scheme |
US
|
DE
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid4043-st.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772b_pdf.pdf
|
status |
archived
|
archived
|
manufacturer |
Cryptek Inc.
|
Kanguru Solutions
|
manufacturer_web |
https://www.cryptek.com
|
https://www.kanguru.com
|
security_level |
EAL4 |
ALC_FLR.1, EAL2+ |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid4043-vr.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772a_pdf.pdf
|
cert_link |
None
|
None
|
protection_profiles |
|
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Schutzprofil fur USB-Datentrager, Version 1.4', 'pp_eal': 'EAL2+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0025b.pdf', 'pp_ids': frozenset({'SCHUTZPROFIL_USB-DATENTRAGER_V1.4'})}) |
maintenance_updates |
|
frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2015, 1, 20), 'maintenance_title': 'Kanguru Defender Elite 200 and Kanguru Defender 2000, firmware version 2.05.10', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772_ma1a_pdf.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772_ma1b_pdf.pdf'}) |
state/cert |
- _type:
sec_certs.sample.cc.CCCertificate.DocumentState
- download_ok:
False
- convert_garbage:
False
- convert_ok:
False
- extract_ok:
False
- pdf_hash:
None
- txt_hash:
None
|
- _type:
sec_certs.sample.cc.CCCertificate.DocumentState
- download_ok:
False
- convert_garbage:
False
- convert_ok:
False
- extract_ok:
False
- pdf_hash:
None
- txt_hash:
None
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
651f06cad3c56531d3525cee83f4a59be7407ad6955e43790e9e1147449c8017
|
16e52e72927a5eee7124e6fde0c186c1d3d113e733e6116f5fdfcc44278c5b57
|
state/report/txt_hash |
5ab3fcfedfa1ed40798b1e1a699b04ca613f4a905fd1a32681dd21a231283287
|
8cb2309bdc02367be25c3961b565d25c9f78b2d7cdce20c08213092f4a2eff82
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
bf672ee4bf454269d0ec06a23799526611aca15ce748c5a10490cfa3e0ef482c
|
077d27d1e2e9eafc65cbb9d302bc66883e2dd06e21ea816741ca25fe7f7dcd7d
|
state/st/txt_hash |
623204b088546f1a24bf23786649f65a73fb205ab3c9d025be830e16210a218a
|
74714db4c60a8332c3603aaae83a1c8ec3cbea7950400f562332e8ccdcc98147
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
CCEVS-VR-0139-2005
|
BSI-DSZ-CC-0772-2014
|
heuristics/cert_lab |
US
|
BSI
|
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_versions |
2.4.0.5, 2.4.0.3 |
2.0.0.0, 1.2.1.8, 3.2.0.3, 02.03.10, 5.0.2.6 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/scheme_data |
- product:
Cryptek, Inc., DiamondTEK (DiamondCentral (NSC Application S/W version 2.4.0.5, NSD-Prime F/W version 2.4.0.3) and NSD (DiamondLink, DiamondPak, DiamondVPN, DiamondSAT, DiamondUTC) F/W version 2.4.0.3) 04, CP106), Diamond VPN (also sold as CV100); DiamondSAT
- id:
CCEVS-VR-VID4043
- url:
https://www.niap-ccevs.org/product/4043
- certification_date:
2005-12-30T00:12:00Z
- expiration_date:
None
- category:
Firewall, Guard, Multiple Domain Solution, Network Management, Sensitive Data Protection, System Access Control, Virtual Private Network, Wireless Monitoring
- vendor:
Cryptek, Inc.
- evaluation_facility:
Leidos Common Criteria Testing Laboratory
- scheme:
US
|
None
|
heuristics/st_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
None
|
None
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords |
None
|
None
|
pdf_data/cert_metadata |
None
|
None
|
pdf_data/report_filename |
st_vid4043-vr.pdf
|
0772a_pdf.pdf
|
pdf_data/report_frontpage |
- US:
- cert_id:
CCEVS-VR-05-0139
- cert_item:
Cryptek, Inc. • Sterling, VA DiamondTEK™ 2.4
- cert_lab:
US NIAP
|
- DE:
- match_rules:
(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)
- cert_id:
BSI-DSZ-CC-0772-2014
- cert_item:
Kanguru Defender Elite 200 Kanguru Defender 2000 Universal Kanguru Local Administrator, v3.2.0.3 Kanguru Remote Management Console, v5.0.2.6
- developer:
Kanguru Solutions
- cert_lab:
BSI
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1:
1
- ADV_FSP.1:
1
- ADV_FSP.2:
1
- ADV_FSP.3:
1
- ADV_FSP.4:
1
- ADV_FSP.5:
1
- ADV_FSP.6:
1
- ADV_IMP.1:
1
- ADV_IMP.2:
1
- ADV_INT.1:
1
- ADV_INT.2:
1
- ADV_INT.3:
1
- ADV_SPM.1:
1
- ADV_TDS.1:
1
- ADV_TDS.2:
1
- ADV_TDS.3:
1
- ADV_TDS.4:
1
- ADV_TDS.5:
1
- ADV_TDS.6:
1
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_INT:
1
- ADV_SPM:
1
- ADV_TDS:
1
- AGD:
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- AGD_OPE:
1
- AGD_PRE:
1
- ALC:
- ALC_FLR.1:
5
- ALC_FLR:
3
- ALC_CMC.1:
1
- ALC_CMC.2:
1
- ALC_CMC.3:
1
- ALC_CMC.4:
1
- ALC_CMC.5:
1
- ALC_CMS.1:
1
- ALC_CMS.2:
1
- ALC_CMS.3:
1
- ALC_CMS.4:
1
- ALC_CMS.5:
1
- ALC_DEL.1:
1
- ALC_DVS.1:
1
- ALC_DVS.2:
1
- ALC_FLR.2:
1
- ALC_FLR.3:
1
- ALC_LCD.1:
1
- ALC_LCD.2:
1
- ALC_TAT.1:
1
- ALC_TAT.2:
1
- ALC_TAT.3:
1
- ALC_CMC:
1
- ALC_CMS:
1
- ALC_DEL:
1
- ALC_DVS:
1
- ALC_TAT:
1
- ATE:
- ATE_COV.1:
2
- ATE_COV.2:
1
- ATE_COV.3:
1
- ATE_DPT.1:
1
- ATE_DPT.2:
1
- ATE_DPT.3:
1
- ATE_DPT.4:
1
- ATE_FUN.1:
1
- ATE_FUN.2:
1
- ATE_IND.1:
1
- ATE_IND.2:
1
- ATE_IND.3:
1
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
- AVA:
- AVA_VAN.1:
1
- AVA_VAN.2:
1
- AVA_VAN.3:
1
- AVA_VAN.4:
1
- AVA_VAN.5:
1
- AVA_VAN:
2
- APE:
- APE_INT.1:
1
- APE_CCL.1:
1
- APE_SPD.1:
1
- APE_OBJ.1:
1
- APE_OBJ.2:
1
- APE_ECD.1:
1
- APE_REQ.1:
1
- APE_REQ.2:
1
- ASE:
- ASE_INT.1:
1
- ASE_CCL.1:
1
- ASE_SPD.1:
1
- ASE_OBJ.1:
1
- ASE_OBJ.2:
1
- ASE_ECD.1:
1
- ASE_REQ.1:
1
- ASE_REQ.2:
1
- ASE_TSS.1:
1
- ASE_TSS.2:
1
- ASE_CCL:
1
- ASE_ECD:
1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_SPD:
1
- ASE_TSS:
1
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 2:
8
- EAL 1:
7
- EAL 4:
7
- EAL2:
2
- EAL 3:
4
- EAL 5:
6
- EAL 6:
3
- EAL 7:
4
- EAL 2 augmented:
3
- ITSEC:
|
pdf_data/report_keywords/cc_security_level/EAL |
|
- EAL 2: 8
- EAL 1: 7
- EAL 4:
7
- EAL2: 2
- EAL 3: 4
- EAL 5: 6
- EAL 6: 3
- EAL 7: 4
- EAL 2 augmented: 3
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 4 |
7
|
7
|
pdf_data/report_keywords/cc_sfr |
|
- FCS:
- FCS_COP.1:
1
- FCS_CKM.1:
1
- FCS_RNG.1:
1
- FDP:
- FDP_ACC.1:
2
- FDP_ACF.1:
2
- FIA:
- FIA_UID.2:
4
- FIA_UAU.2:
4
- FIA_UAU.6:
1
- FIA_SOS.1:
1
- FMT:
- FMT_MTD:
2
- FMT_SMF:
2
- FMT_SMF.1:
1
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- Report, Version 8, 2014-10-07, Final Evaluation Technical Report, atsec information security GmbH, (confidential document) [9] Evaluated Product User Guide, Version 1.20, 2014-10-02 [10] Kanguru Defender Elite 200 User:
1
- KRMC Administrator's User Manual, Version 5.0.2, 2013-11-01 [14] Configuration lists for the TOE (confidential documents): a) Configuration list for TOE executables, 2014-09-17 b) Configuration list from Phison:
1
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
- FIPS:
- RFC:
- CC:
- CCIMB-99-031:
1
- CCIMB-99-032:
1
- CCIMB-99-033:
1
|
- BSI:
- ISO:
- ISO/IEC 17065:
2
- ISO/IEC 15408:
2
- ISO/IEC 18045:
2
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI TR-02102:
1
- BSI 7138:
2
- BSI 7125:
2
- BSI 7148:
1
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata |
- pdf_file_size_bytes:
975147
- pdf_is_encrypted:
False
- pdf_number_of_pages:
37
- /Producer:
Acrobat Distiller 5.0.5 (Windows)
- /Author:
Franklin Haskell and Kathleen Cunningham
- /Creator:
Acrobat PDFMaker 5.0 for Word
- /ModDate:
D:20060130142549-05'00'
- /Title:
Validation Report for Trend Micro VirusWall
- /CreationDate:
D:20060130142016-05'00'
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
1643286
- pdf_is_encrypted:
False
- pdf_number_of_pages:
42
- /Author:
Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate:
D:20141121083051+01'00'
- /Creator:
Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, encrypted USB storage device, Kanguru Defender"
- /ModDate:
D:20141121113713+01'00'
- /Producer:
LibreOffice 4.2
- /Subject: Common Criteria Certification
- /Title:
Certification Report BSI-DSZ-CC-0772-2014
- pdf_hyperlinks:
https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/
|
pdf_data/report_metadata//Author |
Franklin Haskell and Kathleen Cunningham
|
Bundesamt für Sicherheit in der Informationstechnik
|
pdf_data/report_metadata//CreationDate |
D:20060130142016-05'00'
|
D:20141121083051+01'00'
|
pdf_data/report_metadata//Creator |
Acrobat PDFMaker 5.0 for Word
|
Writer
|
pdf_data/report_metadata//ModDate |
D:20060130142549-05'00'
|
D:20141121113713+01'00'
|
pdf_data/report_metadata//Producer |
Acrobat Distiller 5.0.5 (Windows)
|
LibreOffice 4.2
|
pdf_data/report_metadata//Title |
Validation Report for Trend Micro VirusWall
|
Certification Report BSI-DSZ-CC-0772-2014
|
pdf_data/report_metadata/pdf_file_size_bytes |
975147
|
1643286
|
pdf_data/report_metadata/pdf_hyperlinks |
|
https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/ |
pdf_data/report_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/report_metadata/pdf_number_of_pages |
37
|
42
|
pdf_data/st_filename |
st_vid4043-st.pdf
|
0772b_pdf.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP-0025:
6
- BSI-PP- 0025:
13
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_AUT.1:
10
- ACM_CAP.4:
20
- ACM_SCP.2:
7
- ADO:
- ADO_DEL.2:
11
- ADO_IGS.1:
9
- ADV:
- ADV_FSP.2:
8
- ADV_HLD.2:
12
- ADV_IMP.1:
7
- ADV_LLD.1:
15
- ADV_RCR.1:
5
- ADV_SPM.1:
10
- ADV_FSP.1:
2
- ADV_HLD.1:
2
- ADV_FSP:
1
- ADV_HLD:
1
- ADV_LLD:
1
- ADV_IMP:
1
- ADV_RCR:
1
- ADV_SPM:
1
- AGD:
- AGD_ADM.1:
16
- AGD_USR.1:
12
- ALC:
- ALC_DVS.1:
8
- ALC_LCD.1:
8
- ALC_TAT.1:
9
- ATE:
- ATE_COV.2:
6
- ATE_DPT.1:
5
- ATE_FUN.1:
10
- ATE_IND.2:
8
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
- AVA:
- AVA_MSU.2:
14
- AVA_SOF.1:
8
- AVA_VLA.2:
14
|
- ADV:
- ADV_SPM.1:
2
- ADV_ARC.1:
1
- ADV_FSP.2:
1
- ADV_TDS.1:
1
- AGD:
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- ALC:
- ALC_FLR.1:
5
- ALC_CMC.2:
1
- ALC_CMS.2:
1
- ALC_DEL.1:
1
- ATE:
- ATE_COV.1:
1
- ATE_FUN.1:
1
- ATE_IND.2:
1
- AVA:
- ASE:
- ASE_INT.1:
1
- ASE_CCL.1:
1
- ASE_SPD.1:
1
- ASE_OBJ.2:
1
- ASE_ECD.1:
1
- ASE_REQ.2:
1
- ASE_TSS.1:
1
|
pdf_data/st_keywords/cc_sar/ADV |
- ADV_FSP.2:
8
- ADV_HLD.2: 12
- ADV_IMP.1: 7
- ADV_LLD.1: 15
- ADV_RCR.1: 5
- ADV_SPM.1:
10
- ADV_FSP.1: 2
- ADV_HLD.1: 2
- ADV_FSP: 1
- ADV_HLD: 1
- ADV_LLD: 1
- ADV_IMP: 1
- ADV_RCR: 1
- ADV_SPM: 1
|
- ADV_SPM.1:
2
- ADV_ARC.1: 1
- ADV_FSP.2:
1
- ADV_TDS.1: 1
|
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.2 |
8
|
1
|
pdf_data/st_keywords/cc_sar/ADV/ADV_SPM.1 |
10
|
2
|
pdf_data/st_keywords/cc_sar/AGD |
- AGD_ADM.1:
16
- AGD_USR.1:
12
|
- AGD_OPE.1:
1
- AGD_PRE.1:
1
|
pdf_data/st_keywords/cc_sar/ALC |
- ALC_DVS.1:
8
- ALC_LCD.1:
8
- ALC_TAT.1:
9
|
- ALC_FLR.1:
5
- ALC_CMC.2:
1
- ALC_CMS.2:
1
- ALC_DEL.1:
1
|
pdf_data/st_keywords/cc_sar/ATE |
- ATE_COV.2: 6
- ATE_DPT.1: 5
- ATE_FUN.1:
10
- ATE_IND.2:
8
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
|
- ATE_COV.1: 1
- ATE_FUN.1:
1
- ATE_IND.2:
1
|
pdf_data/st_keywords/cc_sar/ATE/ATE_FUN.1 |
10
|
1
|
pdf_data/st_keywords/cc_sar/ATE/ATE_IND.2 |
8
|
1
|
pdf_data/st_keywords/cc_sar/AVA |
- AVA_MSU.2:
14
- AVA_SOF.1:
8
- AVA_VLA.2:
14
|
|
pdf_data/st_keywords/cc_security_level/EAL |
|
|
pdf_data/st_keywords/cc_sfr/FAU |
- FAU_ARP.1:
6
- FAU_GEN.1:
13
- FAU_GEN.2:
6
- FAU_SAA.1:
6
- FAU_SAR.1:
8
- FAU_SAR.2:
6
- FAU_SAR.3:
6
- FAU_SEL.1:
5
- FAU_STG.1:
10
- FAU_STG.3:
12
- FAU_ARP.1.1:
1
- FAU_GEN.1.1:
1
- FAU_GEN.1.2:
1
- FAU_GEN.2.1:
1
- FAU_SAA.1.1:
1
- FAU_SAA.1.2:
1
- FAU_SAR.1.1:
1
- FAU_SAR.1.2:
1
- FAU_SAR.2.1:
1
- FAU_SAR.3.1:
1
- FAU_SEL.1.1:
1
- FAU_STG.1.1:
1
- FAU_STG.1.2:
1
|
|
pdf_data/st_keywords/cc_sfr/FCS |
- FCS_CKM.1:
11
- FCS_CKM.4:
10
- FCS_COP.1:
21
- FCS_CKM.1.1:
1
- FCS_CKM.4.1:
1
- FCS_COP.1.1:
3
- FCS_CKM.2:
1
|
- FCS_RNG.1: 15
- FCS_CKM.1:
9
- FCS_CKM.4:
9
- FCS_COP.1:
9
- FCS_RNG: 2
- FCS_RNG.1.1: 3
- FCS_RNG.1.2: 3
- FCS_CKM.1.1:
1
- FCS_CKM.4.1:
1
- FCS_COP.1.1:
1
- FCS_CKM.2:
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 |
11
|
9
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 |
10
|
9
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 |
21
|
9
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1.1 |
3
|
1
|
pdf_data/st_keywords/cc_sfr/FDP |
- FDP_ACC.1:
8
- FDP_IFC.1:
27
- FDP_IFF.1: 17
- FDP_IFF.2: 8
- FDP_IFC.1.1: 3
- FDP_IFF.1.1: 2
- FDP_IFF.1.2: 2
- FDP_IFF.1.3: 2
- FDP_IFF.1.4: 2
- FDP_IFF.1.5: 2
- FDP_IFF.1.6: 2
- FDP_IFF.2.1: 1
- FDP_IFF.2.2: 1
- FDP_IFF.2.3: 1
- FDP_IFF.2.4: 1
- FDP_IFF.2.5: 1
- FDP_IFF.2.6: 1
- FDP_IFF.2.7: 1
- FDP_ITC.1:
4
|
- FDP_ACC.1:
14
- FDP_ACF.1: 13
- FDP_ACC.1.1: 1
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_ITC.1:
2
- FDP_ITC.2: 2
- FDP_IFC.1:
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 |
8
|
14
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 |
27
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 |
4
|
2
|
pdf_data/st_keywords/cc_sfr/FIA |
- FIA_AFL.1: 7
- FIA_ATD.1: 8
- FIA_UAU.2:
8
- FIA_UID.2:
6
- FIA_USB.1: 6
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1.1: 1
- FIA_UAU.2.1:
1
- FIA_UID.2.1:
1
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FIA_UID.1:
3
- FIA_UAU.1:
1
- FIA_UAU: 1
|
- FIA_UAU.1:
7
- FIA_UAU.6: 8
- FIA_SOS.1: 8
- FIA_UAU.2:
9
- FIA_UID.2:
10
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.6.1: 1
- FIA_SOS.1.1: 1
- FIA_UAU.2.1:
1
- FIA_UID.2.1:
1
- FIA_UID.1:
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 |
1
|
7
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.2 |
8
|
9
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.2.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 |
3
|
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.2 |
6
|
10
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.2.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT |
- FMT_MOF.1: 8
- FMT_MSA.2: 13
- FMT_MSA.1:
22
- FMT_MSA.3:
20
- FMT_MTD.1:
11
- FMT_SMR.1:
14
- FMT_MOF.1.1: 1
- FMT_MSA.1.1:
3
- FMT_MSA.2.1: 1
- FMT_MSA.3.1: 3
- FMT_MSA.3.2: 3
- FMT_MTD.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_SMF:
2
|
- FMT_MSA.1:
8
- FMT_MTD: 12
- FMT_SMF:
20
- FMT_SMR.1:
12
- FMT_SMF.1: 6
- FMT_MTD.1:
3
- FMT_MSA.1.1:
1
- FMT_MTD.1.1:
2
- FMT_SMF.1.1: 2
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_MSA.3:
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 |
22
|
8
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1.1 |
3
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 |
20
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 |
11
|
3
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF |
2
|
20
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
14
|
12
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT |
- FPT_ITT.1:
6
- FPT_RVM.1:
5
- FPT_SEP.1:
7
- FPT_RVM.1.1:
1
- FPT_SEP.1.1:
1
- FPT_SEP.1.2:
1
- FPT_STM.1:
6
- FPT_STM.1.1:
1
|
- FPT_FLS.1:
9
- FPT_RCV.4:
8
- FPT_PHP.1:
8
- FPT_RCV.4.1:
2
- FPT_FLS.1.1:
1
- FPT_PHP.1.1:
1
- FPT_PHP.1.2:
1
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- Out of scope:
2
- 11 1.5.4.3 Out of scope :
1
- 11 1.5.4.3 Out of scope ........................................................................................... 12 1.5:
1
- from the KRMC to the device. Commands are queued at the KRMC until polled form the device. 1.5.4.3 Out of scope The TOE supports additional features that are not part of the scope: ● Antivirus solution ●:
1
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function/SHA |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/side_channel_analysis/FI/physical tampering |
1
|
3
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 188:
1
- FIPS 140-2:
7
- FIPS 46-3:
3
- FIPS 180-1:
2
- RFC:
- RFC 2401:
1
- RFC 2406:
1
- RFC 2409:
1
- ISO:
- ISO/IEC 15408:
2
- ISO/IEC 15408-2:
1
- ISO/IEC 15408-3:
1
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata |
- pdf_file_size_bytes:
1340418
- pdf_is_encrypted:
False
- pdf_number_of_pages:
71
- /Producer:
Acrobat Distiller 5.0.5 (Windows)
- /Author:
James Arnold
- /Creator:
Acrobat PDFMaker 5.0 for Word
- /ModDate:
D:20060130143606-05'00'
- /Title:
DiamondTEK Security Target
- /CreationDate:
D:20060130142756-05'00'
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
704587
- pdf_is_encrypted:
False
- pdf_number_of_pages:
41
- /Keywords: Security Target, Common Criteria, USB Storage, Encryption, Protected Storage
- /Subject:
- /Title:
Kanguru Defender Security Target (version 1.10 as of 2014-10-06)
- /Creator:
Unknown
- /Author:
Andreas Siegert (generated by CCTool version 2.8)
- /Producer:
XEP 4.23
- /application: CCTool version x.y
- /Trapped: /False
- /CreationDate:
D:20141006150157Z
- /ModDate:
D:20141006150157Z
- pdf_hyperlinks:
http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R3.pdf
|
pdf_data/st_metadata//Author |
James Arnold
|
Andreas Siegert (generated by CCTool version 2.8)
|
pdf_data/st_metadata//CreationDate |
D:20060130142756-05'00'
|
D:20141006150157Z
|
pdf_data/st_metadata//Creator |
Acrobat PDFMaker 5.0 for Word
|
Unknown
|
pdf_data/st_metadata//ModDate |
D:20060130143606-05'00'
|
D:20141006150157Z
|
pdf_data/st_metadata//Producer |
Acrobat Distiller 5.0.5 (Windows)
|
XEP 4.23
|
pdf_data/st_metadata//Title |
DiamondTEK Security Target
|
Kanguru Defender Security Target (version 1.10 as of 2014-10-06)
|
pdf_data/st_metadata/pdf_file_size_bytes |
1340418
|
704587
|
pdf_data/st_metadata/pdf_hyperlinks |
|
http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R3.pdf |
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
71
|
41
|
dgst |
eed47d240dc3aeb7
|
eda06ca3c208ebd0
|