name |
VMware Horizon Client 8 2209 (Horizon 8.7) |
Plateforme J-Safe, en configuration fermée, version 2.11.0, sur le composant SB23YR80B |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
US |
FR |
status |
active |
archived |
not_valid_after |
16.07.2025 |
15.05.2020 |
not_valid_before |
16.06.2023 |
15.05.2015 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11357-ci.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11357-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_16.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11357-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_16_Cible.pdf |
manufacturer |
VMware Inc. |
Incard Division / ST Microelectronics |
manufacturer_web |
https://www.vmware.com |
|
security_level |
{} |
EAL5+, ALC_DVS.2, AVA_VAN.5 |
dgst |
f1964b5a4049378f |
bb81f40b202b203a |
heuristics/cert_id |
CCEVS-VR-VID-11357-2023 |
ANSSI-CC-2015/16 |
heuristics/cert_lab |
US |
SERMA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ALC_TSU_EXT.1, AGD_PRE.1 |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.4, ALC_TAT.2, ASE_REQ.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
8.7 |
2.11.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2015/17 |
heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2012/68 |
heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2015/17 |
heuristics/report_references/indirectly_referencing |
{} |
ANSSI-CC-2009/26, ANSSI-CC-2010/01, ANSSI-CC-2009/05, ANSSI-CC-2009/51, ANSSI-CC-2009/06, ANSSI-CC-2012/68, ANSSI-CC-2009/50, ANSSI-CC-2010/02, ANSSI-CC-2009/62, ANSSI-CC-2009/28 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
ANSSI-CC-2012/68 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
ANSSI-CC-2012/68 |
heuristics/protection_profiles |
90c116e62a19bc4d, c40ae795865a0dba |
090c1a53c73889d8 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_APP_V1.4.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PKG_TLS_V1.1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-profil_PP-2010-07en.pdf |
pdf_data/cert_filename |
st_vid11357-ci.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID11357-2023: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20230623125255-04'00'
- /ModDate: D:20230623125255-04'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 181892
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
st_vid11357-vr.pdf |
ANSSI-CC-2015_16.pdf |
pdf_data/report_frontpage |
- FR:
- US:
- cert_id: CCEVS-VR-VID11357-2023
- cert_item: for VMware Horizon Client 8 2209 (Horizon 8.7
- cert_lab: US NIAP
|
- FR:
- cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 3
- cert_id: ANSSI-CC-2015/16
- cert_item: Plateforme J-Safe, en configuration fermée, version 2.11.0, sur le composant SB23YR80B
- cert_item_version: Version 2.11.0
- cert_lab: Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
- developer: STMicroelectronics S.r.l. – Incard Division Z.I Marcianise Sud, 81025 Marcianise, Italie STMicroelectronics 29 Boulevard Romain Rolland, 75669 Paris Cedex 14, France Commanditaire STMicroelectronics S.r.l. – Incard Division Z.I Marcianise Sud, 81025 Marcianise, Italie
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: PP JCS] Java Card protection profile – closed configuration, version 3.0
- US:
|
pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID11357-2023: 1
|
- FR:
- ANSSI-CC-2012/68: 2
- ANSSI-CC-2012/68-S02: 1
- ANSSI-CC-2015/16: 16
- ANSSI-CC-PP-2010/07-M01: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- ANSSI:
- ANSSI-CC-PP-: 1
- ANSSI-CC-PP-2010/07-M01: 1
- BSI:
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 1
- EAL4: 2
- EAL6: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ATE:
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_FLR.1: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- T:
- T.NETWORK_ATTACK: 1
- T.NETWORK_EAVESDROP: 1
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
- /Author: Administrateur
- /CreationDate: D:20150522134001+02'00'
- /Creator: Microsoft® Word 2010
- /Keywords: ANSSI-CC-CER-F-07.016
- /ModDate: D:20150522134001+02'00'
- /Producer: Microsoft® Word 2010
- /Subject: Plateforme J-Safe, en configuration fermée, version 2.11.0, sur le composant SB23YR80B
- /Title: ANSSI-CC-2015/16
- pdf_file_size_bytes: 579179
- pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 15
|
pdf_data/st_filename |
st_vid11357-st.pdf |
ANSSI-CC-2015_16_Cible.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0055: 2
- BSI-PP- 0035: 2
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL4+: 1
- EAL5: 12
- EAL5 augmented: 2
- EAL5+: 3
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ALC_TSU_EXT.1: 2
- ASE:
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 7
- ADV_FSP.1: 4
- ADV_FSP.2: 2
- ADV_FSP.4: 1
- ADV_FSP.5: 9
- ADV_IMP.1: 10
- ADV_INT.2: 2
- ADV_TDS.1: 2
- ADV_TDS.3: 4
- ADV_TDS.4: 9
- AGD:
- AGD_OPE.1: 7
- AGD_PRE.1: 7
- ALC:
- ALC_CMC.4: 2
- ALC_CMS.1: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 3
- ALC_DVS.2: 9
- ALC_LCD.1: 4
- ALC_TAT.1: 2
- ALC_TAT.2: 4
- ASE:
- ASE_CCL: 2
- ASE_CCL.1: 2
- ASE_ECD: 2
- ASE_ECD.1: 5
- ASE_INT.1: 6
- ASE_OBJ: 2
- ASE_OBJ.2: 4
- ASE_REQ: 2
- ASE_REQ.1: 2
- ASE_REQ.2: 3
- ASE_SPD: 2
- ASE_SPD.1: 3
- ASE_TSS: 2
- ASE_TSS.1: 2
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 4
- ATE_DPT.1: 1
- ATE_DPT.3: 2
- ATE_FUN.1: 7
- ATE_IND.2: 1
- AVA:
- AVA_VAN.4: 1
- AVA_VAN.5: 9
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM: 13
- FCS_CKM.1: 2
- FCS_CKM.2: 7
- FCS_CKM.2.1: 1
- FCS_CKM_EXT.1: 6
- FCS_CKM_EXT.1.1: 1
- FCS_COP: 28
- FCS_COP.1: 4
- FCS_RBG_EXT.1: 7
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.2: 8
- FCS_RBG_EXT.2.1: 1
- FCS_RBG_EXT.2.2: 1
- FCS_STO_EXT.1: 8
- FCS_STO_EXT.1.1: 1
- FCS_TLSC_EXT.1: 7
- FCS_TLSC_EXT.1.1: 1
- FCS_TLSC_EXT.1.2: 1
- FCS_TLSC_EXT.1.3: 1
- FCS_TLSC_EXT.2: 7
- FCS_TLSC_EXT.2.1: 1
- FCS_TLSC_EXT.3: 7
- FCS_TLSC_EXT.3.1: 1
- FCS_TLSC_EXT.5: 7
- FCS_TLSC_EXT.5.1: 1
- FCS_TLSS_EXT.1.1: 1
- FCS_TLS_EXT.1: 6
- FCS_TLS_EXT.1.1: 1
- FDP:
- FDP_DAR_EXT.1: 6
- FDP_DAR_EXT.1.1: 1
- FDP_DEC_EXT.1: 6
- FDP_DEC_EXT.1.1: 1
- FDP_DEC_EXT.1.2: 1
- FDP_NET_EXT.1: 6
- FDP_NET_EXT.1.1: 1
- FMT:
- FMT_CFG_EXT.1: 6
- FMT_CFG_EXT.1.1: 1
- FMT_CFG_EXT.1.2: 1
- FMT_MEC_EXT.1: 6
- FMT_MEC_EXT.1.1: 1
- FMT_SMF.1: 5
- FMT_SMF.1.1: 1
- FPR:
- FPR_ANO_EXT.1: 6
- FPR_ANO_EXT.1.1: 1
- FPT:
- FPT_AEX_EXT.1: 6
- FPT_AEX_EXT.1.1: 1
- FPT_AEX_EXT.1.2: 1
- FPT_AEX_EXT.1.3: 1
- FPT_AEX_EXT.1.4: 1
- FPT_AEX_EXT.1.5: 1
- FPT_API_EXT.1: 6
- FPT_API_EXT.1.1: 1
- FPT_IDV_EXT: 1
- FPT_IDV_EXT.1: 5
- FPT_IDV_EXT.1.1: 1
- FPT_LIB_EXT.1: 6
- FPT_LIB_EXT.1.1: 1
- FPT_TUD_EXT.1: 6
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FPT_TUD_EXT.1.4: 1
- FPT_TUD_EXT.1.5: 1
- FPT_TUD_EXT.2: 6
- FPT_TUD_EXT.2.1: 1
- FPT_TUD_EXT.2.2: 2
- FPT_TUD_EXT.2.3: 1
- FTP:
- FTP_DIT_EXT.1: 7
- FTP_DIT_EXT.1.1: 1
|
- FAU:
- FAU_ARP: 5
- FAU_ARP.1: 3
- FAU_SAA.1: 2
- FAU_SAS.1: 2
- FCS:
- FCS_CKM: 3
- FCS_CKM.1: 4
- FCS_CKM.2: 2
- FCS_CKM.3: 2
- FCS_CKM.4: 2
- FCS_COP: 9
- FCS_COP.1: 4
- FCS_RNG: 2
- FCS_RNG.1: 7
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FDP:
- FDP_ACC: 8
- FDP_ACC.2: 1
- FDP_ACF: 7
- FDP_ACF.1: 4
- FDP_IFC: 3
- FDP_IFC.1: 7
- FDP_IFF: 3
- FDP_IFF.1: 5
- FDP_ITT.1: 4
- FDP_RIP: 36
- FDP_RIP.1: 3
- FDP_ROL: 12
- FDP_ROL.1: 3
- FDP_SDI.2: 2
- FIA:
- FIA_ATD: 2
- FIA_UID: 1
- FIA_USB: 2
- FMT:
- FMT_LIM: 5
- FMT_LIM.1: 13
- FMT_LIM.1.1: 1
- FMT_LIM.2: 12
- FMT_LIM.2.1: 1
- FMT_MSA: 14
- FMT_MSA.1: 2
- FMT_MSA.2: 2
- FMT_MSA.3: 4
- FMT_MTD: 6
- FMT_SMF.1: 6
- FMT_SMR: 1
- FMT_SMR.1: 3
- FPR:
- FPT:
- FPT_FLS: 17
- FPT_FLS.1: 5
- FPT_ITT.1: 2
- FPT_PHP.3: 2
- FPT_TDC.1: 1
- FPT_TST.1: 2
- FRU:
|
pdf_data/st_keywords/cc_claims |
- O:
- T:
- T.NETWORK_ATTACK: 1
- T.NETWORK_EAVESDROP: 1
|
- A:
- A.NO-DELETION: 5
- A.NO-INSTALL: 5
- A.VERIFICATION: 4
- A.XXX: 1
- D:
- D.API_DATA: 3
- D.APP_CODE: 6
- D.APP_C_DATA: 3
- D.APP_I_DATA: 4
- D.CRYPTO: 6
- D.EMBEDDED_SW_CODE: 4
- D.EMBEDDED_SW_DATA: 4
- D.GP_CODE: 3
- D.GP_SENSITIVE_DATA: 3
- D.JCS_CODE: 4
- D.JCS_DATA: 6
- D.PIN: 9
- D.SEC_DATA: 5
- O:
- O.ALARM: 21
- O.APPLET: 1
- O.CIPHER: 40
- O.FIREWALL: 26
- O.GLOBAL_ARRAYS_CONFID: 15
- O.GLOBAL_ARRAYS_INTEG: 8
- O.GP_REGISTRY: 10
- O.JAVA: 3
- O.JAVAOB: 2
- O.JAVAOBJECT: 20
- O.KEY-MNGT: 15
- O.KEY_MNGT: 1
- O.LIFE_CYCLE: 12
- O.NATIVE: 12
- O.OBJ-DEL: 1
- O.OBJ-DELETION: 6
- O.OPERATE: 34
- O.PIN-MNGT: 13
- O.REALLOCATION: 9
- O.RESOURCES: 9
- O.RND: 1
- O.ROLES: 7
- O.SCP: 65
- O.SID: 25
- O.SIDE_CHANNEL: 10
- O.TRANSACTION: 16
- OE:
- OE.CARD-MANAGEMENT: 12
- OE.CARD_MANAGEMENT: 16
- OE.MANAGEMENT_OF_SECRETS: 3
- OE.NO-DELETION: 6
- OE.NO-INSTALL: 5
- OE.SCP: 3
- OE.VERIFICATION: 32
- OP:
- OP.ARRAY_ACCESS: 4
- OP.CARD_LOCK: 4
- OP.CARD_TERMINATE: 4
- OP.CREATE: 7
- OP.GET_CARD_LIFE_CYCLE_: 1
- OP.GET_CARD_LIFE_CYCLE_STATE: 2
- OP.INSTANCE_FIELD: 4
- OP.INVK_INTERFACE: 7
- OP.INVK_VIRTUAL: 6
- OP.JAVA: 5
- OP.MANAGE_APP_LIFE_CYC: 1
- OP.MANAGE_APP_LIFE_CYCLE_STATE: 3
- OP.PUT: 6
- OP.THROW: 5
- OP.TYPE_ACCESS: 5
- OSP:
- OSP.CARD_ADMINISTRATION_DISABLED: 5
- OSP.MANAGEMENT_OF_SECRETS: 6
- OSP.ROLES: 5
- OSP.VERIFICATION: 5
- R:
- T:
- T.CONFID-APPLI-DATA: 17
- T.CONFID-JCS-CODE: 6
- T.CONFID-JCS-DATA: 11
- T.EXE-CODE: 9
- T.INTEG-: 1
- T.INTEG-APPLI-CODE: 10
- T.INTEG-APPLI-DATA: 21
- T.INTEG-JCS-CODE: 6
- T.INTEG-JCS-DATA: 10
- T.LEAKAGE: 1
- T.LIFE_CYCLE: 7
- T.NATIVE: 4
- T.OBJ-DELETION: 4
- T.PHYSICAL: 9
- T.RESOURCES: 7
- T.SID: 16
|
pdf_data/st_keywords/vendor |
|
- STMicroelectronics:
- STM: 15
- STMicroelectronics: 8
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
- AES_competition:
- DES:
- 3DES:
- 3-DES: 2
- Triple-DES: 1
- TripleDES: 1
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-256: 2
- SHA-384: 1
- SHA-512: 2
- SHA224: 2
- SHA256: 2
- SHA384: 2
- SHA512: 2
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- PGP:
- TLS:
- TLS:
- TLS: 105
- TLS 1.1: 1
- TLS 1.2: 2
- VPN:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-384: 5
- curve P-384: 1
- secp384r1: 2
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 1
- Physical tampering: 2
- fault injection: 2
- malfunction: 2
- physical tampering: 1
- SCA:
- DPA: 3
- Leak-Inherent: 1
- SPA: 1
- physical probing: 4
- side channel: 1
- timing attacks: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS PUB 180-4: 1
- FIPS PUB 186-4: 4
- FIPS PUB 198-1: 1
- NIST:
- NIST SP 800-38D: 2
- NIST SP 800-56A: 1
- NIST SP 800-57: 1
- NIST SP 800-90A: 1
- SP 800-57: 1
- RFC:
- RFC 2818: 2
- RFC 5246: 2
- RFC 5280: 5
- RFC 5289: 2
- RFC 6125: 1
- RFC 8603: 2
- X509:
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- PKCS:
- PKCS#1: 1
- PKCS1: 1
- PKCS3: 1
- SCP:
|
pdf_data/st_keywords/javacard_version |
|
- GlobalPlatform:
- JavaCard:
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
- java:
- java.io: 18
- java.lang: 5
- java.lang.ref: 1
- java.lang.reflect: 4
- java.layout: 1
- java.math: 1
- java.net: 5
- java.nio: 3
- java.nio.charset: 2
- java.security: 6
- java.security.cert: 7
- java.security.spec: 1
- java.text: 1
- java.util: 14
- java.util.concurrent: 7
- java.util.concurrent.atomic: 1
- java.util.logging: 1
- java.util.zip: 2
- org:
- org.json: 1
- org.webrtc: 31
- org.xmlpull.v1: 3
|
- java:
- javacard:
- javacard.framework: 4
- javacard.framework.applet: 1
- javacard.security: 23
- javacard.security.interface: 4
- javacardx:
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
- and is out of the scope of current evaluation. Any other application being loaded pre-issuance is out of scope of current evaluation. 4.1.2.1 Java Card Platform The Java technology, embedded on the TOE: 1
- interface for the secure management of applications on the smart card. The Card Manager is out of scope of current evaluation and its administrative interface is permanently disabled before TOE delivery: 1
- of the TOE to the parties responsible of the following usage phases. Application development is out of scope of current evaluation. TOE Construction phase includes: Product Development Product: 1
- out of scope: 4
|
pdf_data/st_metadata |
|
- /Author: Luca Di Cosmo
- /CreationDate: D:20150402161829+02'00'
- /Creator: Microsoft® Word 2013
- /ModDate: D:20150522134244+02'00'
- /Producer: Microsoft® Word 2013
- /Title: J-Safe_SB23YR80B_Security_Target
- pdf_file_size_bytes: 1236830
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 90
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |