name |
BooleBox On Premises V 4.2 |
Sony Xperia™ X and Sony Xperia™ X Performance |
category |
Data Protection |
Mobility |
scheme |
IT |
SE |
status |
active |
archived |
not_valid_after |
23.04.2025 |
07.12.2021 |
not_valid_before |
23.04.2020 |
07.12.2016 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ccra%20cert%20sony%20x.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/rc_boolebox_42_v1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20Sony%20X.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_boolebox_42_v1.5.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Sony-CC-SecurityTarget_v1.2(348227)_TMP.pdf |
manufacturer |
Boole Server S.r.l. |
Sony Mobile Communications Inc. |
manufacturer_web |
https://www.booleserver.com/ |
https://www.sonymobile.com/se/ |
security_level |
EAL2+, ALC_FLR.2 |
EAL1 |
dgst |
efccd1dfa8e8195d |
69e48d085b8d8069 |
heuristics/cert_id |
OCSI/CERT/IMQ/06/2018/RC |
CSEC2010003 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, ALC_TSU_EXT.1, AGD_PRE.1 |
heuristics/extracted_versions |
4.2 |
- |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
b43e1d04965c0a49 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_md_v2.0.pdf |
pdf_data/cert_filename |
|
ccra cert sony x.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /CreationDate: D:20170403155121+02'00'
- /ModDate: D:20230313140935+01'00'
- pdf_file_size_bytes: 261750
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
rc_boolebox_42_v1.0.pdf |
Certification Report Sony X.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- IT:
- OCSI/CERT/IMQ/06/2018/RC: 27
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR: 1
- ALC_FLR.2: 7
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ALC_TSU_EXT.1: 3
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
- CVE:
- CVE-2016-0839: 1
- CVE-2016-0841: 1
- CVE-2016-2428: 1
- CVE-2016-2429: 1
- CVE-2016-2463: 1
- CVE-2016-2464: 1
- CVE-2016-2506: 1
- CVE-2016-2507: 1
- CVE-2016-2508: 1
- CVE-2016-3741: 1
- CVE-2016-3742: 1
- CVE-2016-3743: 1
- CVE-2016-3820: 1
- CVE-2016-3821: 1
- CVE-2016-3822: 1
- CVE-2016-3840: 1
- CVE-2016-3861: 1
- CVE-2016-3862: 1
- CVE-2016-3863: 1
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- ISO:
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- FIPS:
- ISO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- OutOfScope:
- expected to return to its user. Note: Defending against device re-use after physical compromise is out of scope for this protection profile. T.FLAWAPP: Malicious or Flawed Application Swedish Certification Body: 1
- out of scope: 1
|
pdf_data/report_metadata |
- /Author: OCSI
- /CreationDate: D:20200422093535+00'00'
- /Creator: Microsoft Word
- /ModDate: D:20200423165945+00'00'
- /Producer: Modified using InfoCert Dike
- /Subject: ---
- /Title: Rapporto di Certificazione del prodotto “BooleBox On Premises V Ѐ⸂”
- pdf_file_size_bytes: 623576
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 27
|
- /Ansvarigt Område/enhet: CSEC
- /Author: Imre Juhász
- /C-datum: 2008
- /CSECID:
- /Category:
- /Comments:
- /Company:
- /ContentTypeId: 0x010100F76CA16D2B00D340871F443D8708C84D010072C770E6C96E7A4EA94967F9D5C0E603
- /CreationDate: D:20170403103416+02'00'
- /Creator: Acrobat PDFMaker 11 för Word
- /Current Version:
- /DDocBinder: Scheme (CB)
- /DDocCabinet: QMS
- /DDocID: 2005-03-05-64D6-T9YR
- /DDocLastModDate: 2006-03-16 10:56:39
- /DDocLibrary: https://haddock.fmv.se/domdoc/CSECLib.nsf
- /DDocRevision: 3,7
- /DDocTitle: 035 CB General Document - Template
- /Datum, skapat: -
- /Deluppdragsbenämning:
- /Dokument Status: Aktiv
- /Dokumentansvarig: Imre Juhász
- /Dokumentansvarigs enhet: KC Ledsyst
- /Dokumentbeteckning:
- /Dokumentdatum: 2017-04-03
- /Dokumenttitel: Certification Report Sony Xperia X and Sony Xperia X Performance
- /Dokumenttyp: CB
- /FMV_beteckning: 16FMV2071-76:1
- /Fastställarens roll: Certifier
- /Fastställt av: Imre Juhász
- /Fastställt av1: Imre Juhász
- /Giltigt från: -
- /Infoklass: HEMLIG/
- /Informationsklass:
- /Keywords:
- /Klassificeringsnr: 25 550
- /MallVersion: 7.0
- /ModDate: D:20170403124210+02'00'
- /Paragraf:
- /Platina: 1
- /Producer: Adobe PDF Library 11.0
- /Referens ID: CSEC-37-1156
- /Sekr. gäller tom.: -
- /SourceModified: D:20170403083341
- /Stämpel: 1
- /Subject: 16FMV2071-76:1
- /Title: Certification Report Sony Xperia X and Sony Xperia X Performance
- /Uncontrolled: 0.000000
- /Uppdragsbenämning:
- /Utgåva: 2.0
- /_dlc_DocId: CSEC-37-1156
- /_dlc_DocIdItemGuid: 671c079c-346d-423e-ac5c-f1312a8a09be
- /_dlc_DocIdUrl: http://sp.fmv.se/sites/CSEC/_layouts/15/DocIdRedir.aspx?ID=CSEC-37-1156, CSEC-37-1156
- pdf_file_size_bytes: 145099
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 18
|
pdf_data/st_filename |
st_boolebox_42_v1.5.pdf |
Sony-CC-SecurityTarget_v1.2(348227)_TMP.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 2 augmented: 1
- EAL2: 1
- EAL2+: 3
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 7
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ALC_TSU_EXT: 1
- ALC_TSU_EXT.1: 3
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 3
- ASE_TSS.1: 1
- ATE:
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 9
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_SAR.1: 9
- FAU_SAR.1.1: 2
- FAU_SAR.1.2: 2
- FAU_SAR.2: 6
- FAU_SAR.2.1: 1
- FAU_SAR.3: 7
- FAU_SAR.3.1: 1
- FDP:
- FDP_ACC.1: 26
- FDP_ACC.1.1: 3
- FDP_ACF: 1
- FDP_ACF.1: 15
- FDP_ACF.1.1: 3
- FDP_ACF.1.2: 3
- FDP_ACF.1.3: 3
- FDP_ACF.1.4: 3
- FDP_ETC.1: 7
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_ETC.2: 6
- FDP_ETC.2.1: 1
- FDP_ETC.2.2: 1
- FDP_ETC.2.3: 1
- FDP_ETC.2.4: 1
- FDP_IFC: 1
- FDP_IFC.1: 22
- FDP_IFC.1.1: 1
- FDP_IFF: 1
- FDP_IFF.1: 10
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC.1: 7
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 7
- FDP_ITC.2.1: 1
- FDP_ITC.2.2: 1
- FDP_ITC.2.3: 1
- FDP_ITC.2.4: 1
- FDP_ITC.2.5: 1
- FDP_UCT.1: 7
- FDP_UCT.1.1: 1
- FDP_UIT.1: 5
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL.1: 6
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 6
- FIA_ATD.1.1: 1
- FIA_SOS.1: 9
- FIA_SOS.1.1: 1
- FIA_UAU.1: 1
- FIA_UAU.2: 8
- FIA_UAU.2.1: 1
- FIA_UAU.5: 8
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UID.1: 5
- FIA_UID.2: 11
- FIA_UID.2.1: 1
- FIA_XXX.1: 1
- FIA_XXX.1.1: 2
- FMT:
- FMT_MOF.1: 8
- FMT_MOF.1.1: 1
- FMT_MSA.1: 15
- FMT_MSA.1.1: 3
- FMT_MSA.3: 18
- FMT_MSA.3.1: 3
- FMT_MSA.3.2: 3
- FMT_MTD.1: 8
- FMT_MTD.1.1: 1
- FMT_SMF: 1
- FMT_SMF.1: 14
- FMT_SMF.1.1: 2
- FMT_SMR.1: 15
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_PSE.1: 7
- FPR_PSE.1.1: 1
- FPR_PSE.1.2: 1
- FPR_PSE.1.3: 1
- FPR_UNO.1: 7
- FPR_UNO.1.1: 1
- FPT:
- FPT_STM.1: 2
- FPT_TDC: 1
- FPT_TDC.1: 8
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TEE: 2
- FPT_TEE.1: 7
- FPT_TEE.1.1: 1
- FPT_TEE.1.2: 1
- FTP:
- FTP_ITC.1: 3
- FTP_TRP.1: 3
|
- FCS:
- FCS_CKM: 2
- FCS_CKM.1: 14
- FCS_CKM.1.1: 2
- FCS_CKM.2: 1
- FCS_CKM.2.1: 6
- FCS_CKM_EXT.1: 3
- FCS_CKM_EXT.1.1: 2
- FCS_CKM_EXT.1.2: 1
- FCS_CKM_EXT.1.3: 1
- FCS_CKM_EXT.1.4: 2
- FCS_CKM_EXT.2: 3
- FCS_CKM_EXT.2.1: 1
- FCS_CKM_EXT.3: 4
- FCS_CKM_EXT.3.1: 1
- FCS_CKM_EXT.3.2: 1
- FCS_CKM_EXT.4: 3
- FCS_CKM_EXT.4.1: 2
- FCS_CKM_EXT.4.2: 1
- FCS_CKM_EXT.5: 3
- FCS_CKM_EXT.5.1: 1
- FCS_CKM_EXT.5.2: 1
- FCS_CKM_EXT.6: 3
- FCS_CKM_EXT.6.1: 1
- FCS_CKM_EXT.7: 3
- FCS_CKM_EXT.7.1: 1
- FCS_COP: 1
- FCS_COP.1: 34
- FCS_COP.1.1: 5
- FCS_RBG: 1
- FCS_RBG_EXT.1: 12
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FCS_RBG_EXT.1.3: 1
- FCS_SRV: 1
- FCS_SRV_EXT.1: 4
- FCS_SRV_EXT.1.1: 1
- FCS_STG: 1
- FCS_STG_EXT.1: 3
- FCS_STG_EXT.1.1: 1
- FCS_STG_EXT.1.2: 1
- FCS_STG_EXT.1.3: 1
- FCS_STG_EXT.1.4: 1
- FCS_STG_EXT.1.5: 1
- FCS_TLSC: 1
- FCS_TLSC_EXT.1: 3
- FCS_TLSC_EXT.1.1: 2
- FCS_TLSC_EXT.1.2: 1
- FCS_TLSC_EXT.1.3: 1
- FCS_TLSC_EXT.1.4: 1
- FCS_TLSC_EXT.1.5: 1
- FCS_TLSC_EXT.2: 5
- FCS_TLSC_EXT.2.1: 1
- FCS_TLSC_EXT.2.2: 1
- FCS_TLSC_EXT.2.3: 1
- FCS_TLSC_EXT.2.4: 1
- FCS_TLSC_EXT.2.5: 1
- FDP:
- FDP_ACF: 2
- FDP_ACF_EXT.1: 3
- FDP_ACF_EXT.1.1: 1
- FDP_ACF_EXT.1.2: 1
- FDP_DAR: 2
- FDP_DAR_EXT.1: 3
- FDP_DAR_EXT.1.1: 1
- FDP_DAR_EXT.1.2: 1
- FDP_IFC: 2
- FDP_IFC_EXT.1: 4
- FDP_IFC_EXT.1.1: 1
- FDP_STG: 2
- FDP_STG_EXT.1: 3
- FDP_STG_EXT.1.1: 1
- FDP_UPC: 2
- FDP_UPC_EXT.1: 3
- FDP_UPC_EXT.1.1: 1
- FDP_UPC_EXT.1.2: 1
- FIA:
- FIA_AFL: 2
- FIA_AFL_EXT.1: 4
- FIA_AFL_EXT.1.1: 1
- FIA_AFL_EXT.1.2: 1
- FIA_AFL_EXT.1.3: 1
- FIA_BLT: 2
- FIA_BLT_EXT.1: 3
- FIA_BLT_EXT.1.1: 1
- FIA_PAE: 2
- FIA_PAE_EXT.1: 4
- FIA_PMG: 2
- FIA_PMG_EXT.1: 3
- FIA_PMG_EXT.1.1: 1
- FIA_TRT: 2
- FIA_TRT_EXT.1: 3
- FIA_TRT_EXT.1.1: 1
- FIA_UAU: 2
- FIA_UAU.7: 2
- FIA_UAU.7.1: 1
- FIA_UAU_EXT.1: 3
- FIA_UAU_EXT.1.1: 1
- FIA_UAU_EXT.2: 4
- FIA_UAU_EXT.2.1: 1
- FIA_UAU_EXT.2.2: 1
- FIA_UAU_EXT.3: 3
- FIA_UAU_EXT.3.1: 1
- FMT:
- FMT_MOF: 2
- FMT_MOF_EXT.1: 3
- FMT_MOF_EXT.1.1: 3
- FMT_MOF_EXT.1.2: 3
- FMT_SMF: 2
- FMT_SMF_EXT.1: 14
- FMT_SMF_EXT.1.1: 2
- FMT_SMF_EXT.2: 3
- FMT_SMF_EXT.2.1: 1
- FPT:
- FPT_AEX: 2
- FPT_AEX_EXT.1: 3
- FPT_AEX_EXT.1.1: 1
- FPT_AEX_EXT.1.2: 1
- FPT_AEX_EXT.2: 3
- FPT_AEX_EXT.2.1: 1
- FPT_AEX_EXT.3: 3
- FPT_AEX_EXT.3.1: 1
- FPT_AEX_EXT.4: 3
- FPT_AEX_EXT.4.1: 1
- FPT_AEX_EXT.4.2: 1
- FPT_KST: 2
- FPT_KST_EXT.1: 3
- FPT_KST_EXT.1.1: 1
- FPT_KST_EXT.2: 3
- FPT_KST_EXT.2.1: 1
- FPT_KST_EXT.3: 3
- FPT_KST_EXT.3.1: 1
- FPT_NOT: 1
- FPT_NOT_EXT.1: 3
- FPT_NOT_EXT.1.1: 1
- FPT_STM: 2
- FPT_STM.1: 2
- FPT_STM.1.1: 1
- FPT_TST: 2
- FPT_TST_EXT.1: 3
- FPT_TST_EXT.1.1: 1
- FPT_TST_EXT.2: 3
- FPT_TST_EXT.2.1: 1
- FPT_TUD: 2
- FPT_TUD_EXT.1: 3
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FPT_TUD_EXT.2: 3
- FPT_TUD_EXT.2.1: 1
- FPT_TUD_EXT.2.2: 1
- FPT_TUD_EXT.2.3: 1
- FPT_TUD_EXT.2.4: 1
- FPT_TUD_EXT.2.6: 1
- FTA:
- FTA_SSL: 2
- FTA_SSL_EXT.1: 3
- FTA_SSL_EXT.1.1: 1
- FTA_SSL_EXT.1.2: 1
- FTA_SSL_EXT.1.3: 1
- FTA_TAB.1: 2
- FTA_TAB.1.1: 1
- FTA_WSE: 2
- FTA_WSE_EXT.1: 3
- FTA_WSE_EXT.1.1: 1
- FTP:
- FTP_ITC: 2
- FTP_ITC_EXT.1: 3
- FTP_ITC_EXT.1.1: 1
- FTP_ITC_EXT.1.2: 1
- FTP_ITC_EXT.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ALIGNEDBACKUPS: 2
- A.ASSUMPTION: 1
- A.CERTIFICATE: 3
- A.DBMS_ACCESS: 3
- A.DOC_ACCESS: 2
- A.OS_ACCESS: 2
- A.OS_RESTRICT: 3
- A.SECCOMM: 3
- A.STORAGE_ACCESS: 3
- A.TIME: 3
- A.TOE_EVALUATED: 2
- A.TRAINING: 2
- A.TRUST: 3
- A.UPDATE: 2
- O:
- O.ACCESS: 13
- O.ANTI_BRUTE: 9
- O.AUDIT: 7
- O.AUDIT_PROT: 4
- O.CONFIDENTIAL: 3
- O.CONFIG: 7
- O.CRYPTO: 10
- O.IDENTIFY: 15
- O.INTEGRITY: 5
- O.MANAGE: 7
- O.OTP: 5
- O.PRIVACY: 4
- O.STRONG_PERSONALKEY: 6
- O.USER: 6
- OE:
- OE.ALIGNEDBACKUP: 6
- OE.AUDIT: 5
- OE.AUDIT_PROTECT: 1
- OE.BACKUP: 1
- OE.CERTIFICATE: 4
- OE.CONTINUITY: 3
- OE.CRYPTO: 8
- OE.DB: 3
- OE.DOC: 4
- OE.IDENTIFY: 6
- OE.INTEGRITY: 4
- OE.LOG_STORE: 4
- OE.PERSONALKEY: 4
- OE.PHYSICAL_ACCESS: 6
- OE.SO: 8
- OE.STAFF: 18
- OE.STORAGE: 3
- OE.TIME: 8
- T:
- T.CONFIDENTIALITY: 2
- T.CONFIG: 3
- T.CRASH: 1
- T.EXHAUST: 3
- T.INSTALL: 2
- T.INTEGRITY: 3
- T.INTERCEPT: 2
- T.INTERR: 2
- T.KEY_ACCESS: 2
- T.KEY_GUESS: 3
- T.LOSSOF: 3
- T.MASQUERADE: 3
- T.NOTRACE: 2
- T.PRIVACY: 2
- T.PRIVIL: 1
- T.REPLAY: 3
- T.SCREEN: 3
- T.THREAT: 1
|
- A:
- A.CONFIG: 1
- A.NOTIFY: 1
- A.PRECAUTION: 1
- O:
- O.AUTH: 1
- O.COMMS: 1
- O.CONFIG: 1
- O.INTEGRITY: 1
- O.STORAGE: 1
- OE:
- OE.CONFIG: 1
- OE.NOTIFY: 1
- OE.PRECAUTION: 1
- T:
- T.EAVESDROP: 1
- T.FLAWAPP: 2
- T.NETWORK: 1
- T.PERSISTENT: 2
- T.PHYSICAL: 3
|
pdf_data/st_keywords/vendor |
|
- Broadcom:
- Microsoft:
- Qualcomm:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 7
- AES-256: 10
- AES256: 2
|
- AES_competition:
- AES:
- AES: 27
- AES-: 1
- AES-256: 1
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-2: 1
- SHA-224: 1
- SHA-256: 8
- SHA-384: 2
- SHA-512: 2
- SHA256: 2
- SHA384: 1
- SHA512: 1
- scrypt:
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
- IKE:
- IPsec:
- TLS:
- TLS:
- TLS: 25
- TLS 1.0: 2
- TLS 1.1: 2
- TLS 1.2: 4
- TLS v1.0: 1
- VPN:
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
- CBC:
- CCM:
- CTR:
- ECB:
- GCM:
- XTS:
|
pdf_data/st_keywords/ecc_curve |
|
- NIST:
- NIST P-224: 1
- P-224: 1
- P-256: 10
- P-384: 10
- P-521: 10
- secp256r1: 3
- secp384r1: 3
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 2
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 2
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 2
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 2
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 2
- TLS_RSA_WITH_AES_128_CBC_SHA: 4
- TLS_RSA_WITH_AES_256_CBC_SHA: 4
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
- ARM:
- ARM TrustZone: 1
- TrustZone: 1
- IBM:
- other:
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 1
- FIPS:
- ISO:
|
- CC:
- FIPS:
- FIPS 104-2: 1
- FIPS 140-2: 6
- FIPS 180-4: 3
- FIPS 186-2: 1
- FIPS 186-4: 5
- FIPS 197: 5
- FIPS 198-1: 3
- FIPS PUB 186-4: 8
- FIPS PUB 197: 4
- NIST:
- NIST SP 800-108: 1
- NIST SP 800-132: 2
- NIST SP 800-38A: 2
- NIST SP 800-38C: 2
- NIST SP 800-38D: 2
- NIST SP 800-38E: 2
- NIST SP 800-38F: 4
- NIST SP 800-57: 2
- SP 800-38: 4
- SP 800-56A: 2
- SP 800-90A: 1
- RFC:
- RFC 2818: 2
- RFC 4346: 2
- RFC 4492: 8
- RFC 5246: 14
- RFC 5280: 4
- RFC 5289: 4
- RFC 5759: 2
- RFC 6125: 2
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
- com:
- com.android.voicemail.permission: 1
- java:
|
pdf_data/st_keywords/certification_process |
- ConfidentialDocument:
- activities (through Print Screen system functionalities and video grabbing software) while viewing confidential documents. See Table 18: file sharing permissions configurable in a sharing template [142] Guest (G) Guest: 1
- activities (through Print Screen system functionalities and video grabbing software) while viewing confidential documents. The Windows OS is indispensable on the END USER side in order to use this security function. [22: 1
- and editable only in their BooleBox storage. [25] Watermark With BooleBox users can protect their confidential documents and the intellectual property of their shared files through an indelible watermark displaying key: 1
- confidential information through e-mail in total security. With BooleBox it is possible to attach confidential documents to e-mails with the assurance that no one can intercept since the email message itself is: 1
|
- OutOfScope:
- These services, including some specific Xperia in Business services, such as Xperia Care, are out of scope of the TOE. 1 Much of the information provided in this section originates from the Android Security: 1
- expected to return to its user. Note: Defending against device re-use after physical compromise is out of scope for this protection profile. T.FLAWAPP Malicious or Flawed Application Applications loaded onto the: 1
- out of scope: 2
|
pdf_data/st_metadata |
- /Author: Boole Server S.r.l.
- /CreationDate: D:20200507102310Z00'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20200507102310Z00'00'
- /Producer: Mac OS X 10.13.6 Quartz PDFContext
- /Title: BooleBox on Premises v4.2 Security Target v1.5
- pdf_file_size_bytes: 2607031
- pdf_hyperlinks: http://www.commoncriteriaportal.org/cc
- pdf_is_encrypted: False
- pdf_number_of_pages: 85
|
- /AAPL:Keywords: []
- /Author: Rasma
- /CreationDate: D:20170127123826Z
- /Creator: Word
- /Keywords:
- /ModDate: D:20170403152705+02'00'
- /Producer: Mac OS X 10.12.2 Quartz PDFContext
- /Subject:
- /Title: Sony-CC-SecurityTarget_v1.2
- pdf_file_size_bytes: 1236228
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 61
|
state/cert/convert_garbage |
False |
True |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |