name |
BooleBox On Premises V 4.2 |
ID-One Cosmo V7.0-a SmartCard in configuration Standard and Basic |
category |
Data Protection |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
IT |
FR |
status |
active |
archived |
not_valid_after |
23.04.2025 |
01.09.2019 |
not_valid_before |
23.04.2020 |
19.11.2009 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/rc_boolebox_42_v1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc_2009-46en.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_boolebox_42_v1.5.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-cible_2009-46en.pdf |
manufacturer |
Boole Server S.r.l. |
Oberthur Card System / Philips (NXP) |
manufacturer_web |
https://www.booleserver.com/ |
https://www.oberthur.com/ |
security_level |
EAL2+, ALC_FLR.2 |
EAL5+ |
dgst |
efccd1dfa8e8195d |
abbcee2f14a12b5e |
heuristics/cert_id |
OCSI/CERT/IMQ/06/2018/RC |
ANSSI-CC-2009/46 |
heuristics/cert_lab |
[] |
THALES |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
AVA_VLA.4, AVA_VAN.5, ALC_DVS.2, ADV_IMP.2, AVA_MSU.3 |
heuristics/extracted_versions |
4.2 |
7.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
rc_boolebox_42_v1.0.pdf |
anssi-cc_2009-46en.pdf |
pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 5 augmented ADV_IMP.2, ALC_DVS.2, AVA_VAN.5
- cc_version: Common Criteria version 3.1
- cert_id: ANSSI-CC-2009/46
- cert_item: ID-One Cosmo V7.0-a SmartCard in configuration Standard and Basic JavaCard platform embedded on Atmel Secure Microcontroller Solutions components AT90SC 28872RCU Rev G and Rev E, 28848RCU Rev G and Rev E and embedded with cryptographic library version 00.03.11.05 ToolBox from Atmel Secure Microcontroller Solutions
- cert_item_version: JavaCard Platform version for any configuration: 7.0-a Optional Code r1.0 High Secure version for each configuration: 071771, 071781 Optional Code CodopAuth r1.0 version for each configuration: 071631, 071641 ToolBox version for any configuration: 00.03.11.05
- cert_lab: THALES - CEACI (T3S – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France Phone: +33 (0)5 62 88 28 01 or 18, email : [email protected]
- developer: Oberthur Technologies1 50 quai Michelet 92300 Levallois-Perret, France ATMEL Secure Microcontroller Solutions1 Maxwell Building - Scottish Enterprise technology Park East Kilbride, G75 0QR - Ecosse, Royaume-Uni Sponsor Oberthur Technologies 50 quai Michelet, 92300 Levallois-Perret, France
- match_rules: ['Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developer\\(s\\)(.+)Evaluation facility(.+)Recognition arrangements']
- ref_protection_profiles: PP/0304] Java Card System - Standard 2.1.1 Configuration Protection Profile – version 1.0b, August 2003 certified by ANSSI
|
pdf_data/report_keywords/cc_cert_id |
- IT:
- OCSI/CERT/IMQ/06/2018/RC: 27
|
- DE:
- BSI-DSZ-CC-0421-: 1
- BSI-DSZ-CC-0421-2008-MA-02: 1
- FR:
- ANSSI-CC-2009/46: 18
- DCSSI-2009/11: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 1
- EAL 5: 4
- EAL 5 augmented: 2
- EAL 7: 1
- EAL4: 1
- EAL5: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR: 1
- ALC_FLR.2: 7
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADO:
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_IMP.2: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
- AVA_MSU.3: 2
- AVA_VAN: 1
- AVA_VAN.5: 1
- AVA_VLA.4: 2
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Oberthur:
- Oberthur: 2
- Oberthur Technologies: 19
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- ISO:
|
- CC:
- CCMB-2006-09-001: 1
- CCMB-2007-09-002: 1
- CCMB-2007-09-003: 1
- CCMB-2007-09-004: 1
- SCP:
- SCP01: 1
- SCP02: 1
- SCP03: 1
|
pdf_data/report_keywords/javacard_version |
|
- GlobalPlatform:
- JavaCard:
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: OCSI
- /CreationDate: D:20200422093535+00'00'
- /Creator: Microsoft Word
- /ModDate: D:20200423165945+00'00'
- /Producer: Modified using InfoCert Dike
- /Subject: ---
- /Title: Rapporto di Certificazione del prodotto “BooleBox On Premises V Ѐ⸂”
- pdf_file_size_bytes: 623576
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 27
|
- /CreationDate: D:20100204113104+01'00'
- /Keywords:
- /ModDate: D:20100204113104+01'00'
- /Producer: Acrobat Distiller 8.0.0 (Windows)
- pdf_file_size_bytes: 244131
- pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 17
|
pdf_data/st_filename |
st_boolebox_42_v1.5.pdf |
anssi-cc-cible_2009-46en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0421-2008: 1
- BSI-DSZ-CC-0421-2008-MA-01: 1
- BSI-DSZ-CC-0421-2008-MA-02: 1
- FR:
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 2 augmented: 1
- EAL2: 1
- EAL2+: 3
|
- EAL:
- EAL5: 3
- EAL5 augmented: 3
- EAL5+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 7
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 9
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_SAR.1: 9
- FAU_SAR.1.1: 2
- FAU_SAR.1.2: 2
- FAU_SAR.2: 6
- FAU_SAR.2.1: 1
- FAU_SAR.3: 7
- FAU_SAR.3.1: 1
- FDP:
- FDP_ACC.1: 26
- FDP_ACC.1.1: 3
- FDP_ACF: 1
- FDP_ACF.1: 15
- FDP_ACF.1.1: 3
- FDP_ACF.1.2: 3
- FDP_ACF.1.3: 3
- FDP_ACF.1.4: 3
- FDP_ETC.1: 7
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_ETC.2: 6
- FDP_ETC.2.1: 1
- FDP_ETC.2.2: 1
- FDP_ETC.2.3: 1
- FDP_ETC.2.4: 1
- FDP_IFC: 1
- FDP_IFC.1: 22
- FDP_IFC.1.1: 1
- FDP_IFF: 1
- FDP_IFF.1: 10
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC.1: 7
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 7
- FDP_ITC.2.1: 1
- FDP_ITC.2.2: 1
- FDP_ITC.2.3: 1
- FDP_ITC.2.4: 1
- FDP_ITC.2.5: 1
- FDP_UCT.1: 7
- FDP_UCT.1.1: 1
- FDP_UIT.1: 5
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL.1: 6
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 6
- FIA_ATD.1.1: 1
- FIA_SOS.1: 9
- FIA_SOS.1.1: 1
- FIA_UAU.1: 1
- FIA_UAU.2: 8
- FIA_UAU.2.1: 1
- FIA_UAU.5: 8
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UID.1: 5
- FIA_UID.2: 11
- FIA_UID.2.1: 1
- FIA_XXX.1: 1
- FIA_XXX.1.1: 2
- FMT:
- FMT_MOF.1: 8
- FMT_MOF.1.1: 1
- FMT_MSA.1: 15
- FMT_MSA.1.1: 3
- FMT_MSA.3: 18
- FMT_MSA.3.1: 3
- FMT_MSA.3.2: 3
- FMT_MTD.1: 8
- FMT_MTD.1.1: 1
- FMT_SMF: 1
- FMT_SMF.1: 14
- FMT_SMF.1.1: 2
- FMT_SMR.1: 15
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_PSE.1: 7
- FPR_PSE.1.1: 1
- FPR_PSE.1.2: 1
- FPR_PSE.1.3: 1
- FPR_UNO.1: 7
- FPR_UNO.1.1: 1
- FPT:
- FPT_STM.1: 2
- FPT_TDC: 1
- FPT_TDC.1: 8
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TEE: 2
- FPT_TEE.1: 7
- FPT_TEE.1.1: 1
- FPT_TEE.1.2: 1
- FTP:
- FTP_ITC.1: 3
- FTP_TRP.1: 3
|
- FAU:
- FAU_ARP: 2
- FAU_ARP.1: 4
- FAU_GEN: 1
- FAU_GEN.1: 2
- FAU_SAA: 1
- FAU_SAA.1: 2
- FAU_SAR: 1
- FAU_SAR.1: 2
- FCO:
- FCS:
- FCS_CKM: 5
- FCS_CKM.1: 3
- FCS_CKM.2: 1
- FCS_CKM.2.1: 1
- FCS_CKM.3: 1
- FCS_CKM.3.1: 1
- FCS_CKM.4: 2
- FCS_CKM.4.1: 1
- FCS_COP: 7
- FCS_COP.1: 7
- FCS_COP.1.1: 1
- FCS_RND: 1
- FCS_RNG: 4
- FCS_RNG.1: 7
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FDP:
- FDP_ACC: 5
- FDP_ACC.2: 9
- FDP_ACF: 4
- FDP_ACF.1: 18
- FDP_IFC: 2
- FDP_IFC.1: 1
- FDP_IFC.2: 2
- FDP_IFF: 2
- FDP_IFF.1: 10
- FDP_ITC: 2
- FDP_ITC.1: 3
- FDP_ITC.2: 5
- FDP_RIP: 9
- FDP_RIP.1: 10
- FDP_ROL: 1
- FDP_ROL.1: 2
- FDP_SDI.1: 1
- FDP_SDI.1.1: 1
- FDP_SDI.2: 1
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UCT: 1
- FDP_UCT.1: 1
- FDP_UIT: 1
- FDP_UIT.1: 2
- FIA:
- FIA_AFL: 4
- FIA_AFL.1: 8
- FIA_ATD: 2
- FIA_ATD.1: 3
- FIA_UAU: 6
- FIA_UAU.1: 4
- FIA_UAU.4: 2
- FIA_UAU.7: 2
- FIA_UID: 4
- FIA_UID.1: 6
- FIA_UID.2: 1
- FIA_USB.1: 2
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF: 2
- FMT_MOF.1: 2
- FMT_MSA: 11
- FMT_MSA.1: 6
- FMT_MSA.2: 1
- FMT_MSA.3: 8
- FMT_MTD: 3
- FMT_MTD.1: 3
- FMT_MTD.2: 2
- FMT_MTD.3: 1
- FMT_MTD.3.1: 1
- FMT_SMF: 4
- FMT_SMF.1: 4
- FMT_SMR: 6
- FMT_SMR.1: 9
- FMT_SMR.2: 6
- FPR:
- FPR_UNO: 4
- FPR_UNO.1: 5
- FPR_UNO.1.1: 1
- FPT:
- FPT_FLS: 5
- FPT_FLS.1: 5
- FPT_PHP: 3
- FPT_PHP.2: 3
- FPT_PHP.3: 2
- FPT_RCV: 3
- FPT_RCV.3: 8
- FPT_RCV.4: 1
- FPT_TDC: 1
- FPT_TDC.1: 3
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST: 2
- FPT_TST.1: 6
- FRU:
- FRU_FLT: 1
- FRU_FLT.1: 1
- FRU_RSA: 1
- FRU_RSA.1: 1
- FTP:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ALIGNEDBACKUPS: 2
- A.ASSUMPTION: 1
- A.CERTIFICATE: 3
- A.DBMS_ACCESS: 3
- A.DOC_ACCESS: 2
- A.OS_ACCESS: 2
- A.OS_RESTRICT: 3
- A.SECCOMM: 3
- A.STORAGE_ACCESS: 3
- A.TIME: 3
- A.TOE_EVALUATED: 2
- A.TRAINING: 2
- A.TRUST: 3
- A.UPDATE: 2
- O:
- O.ACCESS: 13
- O.ANTI_BRUTE: 9
- O.AUDIT: 7
- O.AUDIT_PROT: 4
- O.CONFIDENTIAL: 3
- O.CONFIG: 7
- O.CRYPTO: 10
- O.IDENTIFY: 15
- O.INTEGRITY: 5
- O.MANAGE: 7
- O.OTP: 5
- O.PRIVACY: 4
- O.STRONG_PERSONALKEY: 6
- O.USER: 6
- OE:
- OE.ALIGNEDBACKUP: 6
- OE.AUDIT: 5
- OE.AUDIT_PROTECT: 1
- OE.BACKUP: 1
- OE.CERTIFICATE: 4
- OE.CONTINUITY: 3
- OE.CRYPTO: 8
- OE.DB: 3
- OE.DOC: 4
- OE.IDENTIFY: 6
- OE.INTEGRITY: 4
- OE.LOG_STORE: 4
- OE.PERSONALKEY: 4
- OE.PHYSICAL_ACCESS: 6
- OE.SO: 8
- OE.STAFF: 18
- OE.STORAGE: 3
- OE.TIME: 8
- T:
- T.CONFIDENTIALITY: 2
- T.CONFIG: 3
- T.CRASH: 1
- T.EXHAUST: 3
- T.INSTALL: 2
- T.INTEGRITY: 3
- T.INTERCEPT: 2
- T.INTERR: 2
- T.KEY_ACCESS: 2
- T.KEY_GUESS: 3
- T.LOSSOF: 3
- T.MASQUERADE: 3
- T.NOTRACE: 2
- T.PRIVACY: 2
- T.PRIVIL: 1
- T.REPLAY: 3
- T.SCREEN: 3
- T.THREAT: 1
|
- A:
- A.APPLET: 1
- A.NATIVE: 1
- A.VERIFICATION: 1
- D:
- D.API_DATA: 3
- D.APPLILIFECYC: 1
- D.APP_CODE: 5
- D.APP_C_DATA: 3
- D.APP_I_DATA: 3
- D.ARRAY: 3
- D.AUDITLOG: 1
- D.CONFIG: 2
- D.CRYPTO: 4
- D.GLPIN: 1
- D.JCS_CODE: 3
- D.JCS_DATA: 5
- D.KEY: 2
- D.LOADFILE: 1
- D.NB_REMAINTRYGLB: 1
- D.PIN: 6
- D.SEC_DATA: 7
- D.SENSITIVE_DATA: 1
- O:
- O.ALARM: 1
- O.APPLET: 16
- O.CARD-MANAGEMENT: 3
- O.CIPHER: 1
- O.CODE_PCKG: 8
- O.CODE_PKG: 6
- O.DELETION: 1
- O.FIREWALL: 1
- O.INSTALL: 1
- O.JAVAOBJEC: 4
- O.JAVAOBJECT: 31
- O.KEY-MNGT: 1
- O.LOAD: 3
- O.NATIVE: 1
- O.OBJ-DELETION: 1
- O.OPERATE: 1
- O.PIN-MNGT: 1
- O.REALLOCATION: 1
- O.RESOURCES: 1
- O.SCP: 3
- O.SECURE_COMPARE: 1
- O.SHRD_VAR_CONFID: 1
- O.SHRD_VAR_INTEG: 1
- O.SID: 1
- O.TRANSACTION: 1
- OE:
- OE.APPLET: 1
- OE.NATIVE: 1
- OE.VERIFICATION: 1
- OP:
- OP.ARRAY_ACCESS: 3
- OP.CREATE: 5
- OP.DELETE_APPLET: 3
- OP.DELETE_PCKG: 2
- OP.DELETE_PCKG_APPLET: 2
- OP.INSTANCE_FIELD: 2
- OP.INVK_INTERFACE: 4
- OP.INVK_VIRTUAL: 3
- OP.JAVA: 4
- OP.PUT: 4
- OP.RECEIVE: 1
- OP.SEND: 1
- OP.THROW: 3
- OP.TYPE_ACCESS: 3
- OSP:
- R:
- T:
- T.CONFID-APPLI-DATA: 1
- T.CONFID-JCS-CODE: 1
- T.CONFID-JCS-DATA: 1
- T.CONFIGURATION: 2
- T.CONF_DATA_APPLET: 2
- T.DELETION: 1
- T.EXE-CODE: 2
- T.INSTALL: 1
- T.INTEG-APPLI-CODE: 4
- T.INTEG-APPLI-DATA: 4
- T.INTEG-APPLICODE: 1
- T.INTEG-APPLIDATA: 1
- T.INTEG-JCS-CODE: 1
- T.INTEG-JCS-DATA: 1
- T.NATIVE: 1
- T.OBJ-DELETION: 1
- T.PHYSICAL: 1
- T.RESSOURCES: 1
- T.SID: 2
|
pdf_data/st_keywords/vendor |
|
- Oberthur:
- OBERTHUR: 2
- Oberthur: 1
- Oberthur Technologies: 194
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 7
- AES-256: 10
- AES256: 2
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 1
- SHA-256: 3
- SHA-384: 2
- SHA-512: 2
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
- AtmelToolbox:
- ATMEL Toolbox 00.03.11.05: 2
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- fault injection: 1
- malfunction: 2
- physical tampering: 4
- SCA:
- DPA: 1
- SPA: 1
- physical probing: 2
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 1
- FIPS:
- ISO:
|
- FIPS:
- FIPS 186-2: 1
- FIPS PUB 180-2: 2
- FIPS PUB 186-2: 1
- FIPS PUB 197: 1
- FIPS PUB 46-3: 5
- FIPS PUB 81: 4
- PKCS:
|
pdf_data/st_keywords/javacard_version |
|
- GlobalPlatform:
- JavaCard:
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
- java:
- javacard:
- javacard.framework: 3
- javacard.security: 1
- javacardx:
- javacardx.framework.util: 1
|
pdf_data/st_keywords/certification_process |
- ConfidentialDocument:
- activities (through Print Screen system functionalities and video grabbing software) while viewing confidential documents. See Table 18: file sharing permissions configurable in a sharing template [142] Guest (G) Guest: 1
- activities (through Print Screen system functionalities and video grabbing software) while viewing confidential documents. The Windows OS is indispensable on the END USER side in order to use this security function. [22: 1
- and editable only in their BooleBox storage. [25] Watermark With BooleBox users can protect their confidential documents and the intellectual property of their shared files through an indelible watermark displaying key: 1
- confidential information through e-mail in total security. With BooleBox it is possible to attach confidential documents to e-mails with the assurance that no one can intercept since the email message itself is: 1
|
|
pdf_data/st_metadata |
- /Author: Boole Server S.r.l.
- /CreationDate: D:20200507102310Z00'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20200507102310Z00'00'
- /Producer: Mac OS X 10.13.6 Quartz PDFContext
- /Title: BooleBox on Premises v4.2 Security Target v1.5
- pdf_file_size_bytes: 2607031
- pdf_hyperlinks: http://www.commoncriteriaportal.org/cc
- pdf_is_encrypted: False
- pdf_number_of_pages: 85
|
- /CreationDate: D:20091125162947+01'00'
- /Keywords:
- /ModDate: D:20091125162947+01'00'
- /Producer: AFPL Ghostscript 8.50
- pdf_file_size_bytes: 683422
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 95
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |