name |
Kaspersky Endpoint Security 10 for Windows with Kaspersky Full Disk Encryption 3.0 version 10.3.0.6294 AES256 |
MULTOS I4C (1-1-1) platform with patch AMD 0029v002 on component SLE66CX322P/m1484a24 |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
ES |
FR |
status |
archived |
archived |
not_valid_after |
24.04.2023 |
01.09.2019 |
not_valid_before |
24.04.2018 |
04.12.2003 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2014-40-CCRA.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2014-40-INF-2261%20v3.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2003_14.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2014-40-ST.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible2003_14.pdf |
manufacturer |
Kaspersky Lab UK Ltd. |
Keycorp Limited / Infineon Technologies AG |
manufacturer_web |
https://www.kaspersky.co.uk/ |
https://www.keycorp.net/ |
security_level |
EAL2+, ALC_FLR.1 |
ADV_IMP.2, EAL4+, ALC_DVS.2, AVA_VLA.4 |
dgst |
f44160f29ebcdda3 |
72ed5b59efbf992c |
heuristics/cert_id |
2014-40-INF-2261 |
ANSSI-CC-2003/14 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
ASE_ENV.1, ADV_RCR.1, ASE_INT.1, ADV_HLD.2, AGD_USR.1, ALC_DVS.2, ASE_REQ.1, ASE_PPC.1, ASE_DES.1, AVA_SOF.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, AGD_ADM.1, ALC_LCD.1, ATE_FUN.1, ADV_IMP.2, ATE_DPT.1, AVA_VLA.4, ADV_FSP.1, ASE_SRE.1, ASE_OBJ.1, ATE_IND.2, ADV_LLD.1, ADV_SPM.1, AVA_MSU.3 |
heuristics/extracted_versions |
10.3.0.6294, 3.0 |
1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0223-2003 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0169-2002, BSI-DSZ-CC-0223-2003 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
2014-40-CCRA.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
- EAL:
- EAL2: 1
- EAL2 augmented: 1
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20180426105026+02'00'
- pdf_file_size_bytes: 841525
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
|
pdf_data/report_filename |
2014-40-INF-2261 v3.pdf |
2003_14.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- FR:
- Rapport de certification 2003/01: 1
- Rapport de certification 2003/14: 18
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 2: 1
- EAL 4: 2
- EAL2: 6
- ITSEC:
|
- EAL:
- EAL 5: 1
- EAL1: 1
- EAL3: 1
- EAL4: 1
- EAL41: 1
- EAL5: 1
- EAL7: 2
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR: 2
- ALC_FLR.1: 5
- ALC_FLR.2: 1
- ASE:
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ACM:
- ACM_AUT: 1
- ACM_AUT.1: 1
- ACM_CAP: 1
- ACM_CAP.4: 1
- ACM_SCP: 1
- ACM_SCP.2: 1
- ADO:
- ADO_DEL: 1
- ADO_DEL.2: 1
- ADO_IGS: 1
- ADO_IGS.1: 1
- ADV:
- ADV_FSP: 1
- ADV_FSP.2: 1
- ADV_HLD: 1
- ADV_HLD.2: 1
- ADV_IMP: 1
- ADV_IMP.2: 3
- ADV_INT: 1
- ADV_LLD: 1
- ADV_LLD.1: 1
- ADV_RCR: 1
- ADV_RCR.1: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- AGD:
- AGD_ADM: 1
- AGD_ADM.1: 1
- AGD_USR: 1
- AGD_USR.1: 1
- ALC:
- ALC_DVS: 1
- ALC_DVS.2: 4
- ALC_FLR: 2
- ALC_LCD.1: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ASE:
- ASE_DES.1: 1
- ASE_ENV.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_PPC.1: 1
- ASE_REQ.1: 1
- ASE_SRE.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 1
- ATE_COV.2: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_IND: 1
- ATE_IND.2: 1
- AVA:
- AVA_CCA: 1
- AVA_MSU: 1
- AVA_MSU.2: 1
- AVA_MSU.3: 1
- AVA_SOF: 1
- AVA_SOF.1: 1
- AVA_VLA: 1
- AVA_VLA.4: 4
|
pdf_data/report_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 2
- FCS_CKM.4: 1
- FCS_COP.1: 4
- FDP:
- FDP_ACC.1: 3
- FDP_ACF.1: 3
- FDP_IFC.1: 1
- FDP_IFF.1: 1
- FIA:
- FIA_UAU.2: 1
- FIA_UID.2: 1
- FMT:
- FMT_MSA.1: 4
- FMT_MSA.3: 4
- FMT_MTD.1: 1
- FMT_SMF.1: 1
- FMT_SMR.1: 1
|
- FAU:
- FAU_ARP.1: 2
- FAU_SAA.1: 2
- FCS:
- FCS_CKM.3: 2
- FCS_CKM.4: 2
- FCS_COP.1: 2
- FDP:
- FDP_ACC.2: 2
- FDP_ACF.1: 2
- FDP_DAU.1: 2
- FDP_ETC.1: 2
- FDP_ITC.1: 2
- FDP_RIP.1: 2
- FDP_ROL.1: 2
- FDP_SDI.2: 2
- FIA:
- FIA_AFL.1: 2
- FIA_ATD.1: 2
- FIA_UAU.1: 2
- FIA_UAU.4: 2
- FIA_UID.1: 2
- FIA_USB.1: 2
- FMT:
- FMT_MOF.1: 2
- FMT_MSA.1: 2
- FMT_MSA.2: 2
- FMT_MSA.3: 2
- FMT_MTD.1: 2
- FMT_MTD.2: 2
- FMT_SMR.1: 2
- FPR:
- FPT:
- FPT_FLS.1: 2
- FPT_PHP.3: 2
- FPT_RCV.4: 2
- FPT_RVM.1: 2
- FPT_SEP.1: 2
- FPT_TDC.1: 2
- FPT_TST.1: 2
- FRU:
|
pdf_data/report_keywords/cc_claims |
|
- O:
- O.APPLI_DEV: 1
- O.CODE_HASH: 1
- O.DLV_AUDIT: 1
- O.DLV_DATA: 1
- O.DLV_PROTECT: 1
- O.DLV_RESP: 1
- O.TEST_OPERATE: 1
- O.USE_DIAG: 1
|
pdf_data/report_keywords/vendor |
|
- Infineon:
- Infineon: 7
- Infineon Technologies AG: 7
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCIMB-99-031: 1
- CCIMB-99-032: 1
- CCIMB-99-033: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
- /Author: Patrick REDON
- /CreationDate: D:20031204162531+01'00'
- /Creator: Acrobat PDFMaker 5.0 pour Word
- /ModDate: D:20031204162711+01'00'
- /Producer: Acrobat Distiller 5.0 (Windows)
- /Subject: Plate-forme MULTOS I4C (1-1-1)
- /Title: Rapport de certification 2003/14
- pdf_file_size_bytes: 867591
- pdf_hyperlinks: mailto:[email protected], mailto:[email protected]
- pdf_is_encrypted: True
- pdf_number_of_pages: 35
|
pdf_data/st_filename |
2014-40-ST.pdf |
cible2003_14.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 2+: 1
- EAL2: 7
- EAL2 augmented: 3
|
- EAL:
- EAL4: 17
- EAL4 augmented: 3
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.1: 8
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_FSP.1: 2
- ADV_HLD: 1
- ADV_HLD.2: 1
- ADV_IMP: 3
- ADV_IMP.1: 2
- ADV_IMP.2: 10
- ADV_LLD: 1
- ADV_LLD.1: 3
- ADV_RCR.1: 2
- AGD:
- AGD_ADM: 1
- AGD_ADM.1: 1
- AGD_USR.1: 2
- ALC:
- ALC_DVS: 2
- ALC_DVS.1: 1
- ALC_DVS.2: 10
- ALC_TAT.1: 2
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 25
- FCS_CKM.2: 2
- FCS_CKM.4: 18
- FCS_CKM.4.1: 1
- FCS_COP.1: 33
- FCS_RNG.1: 1
- FDP:
- FDP_ACC.1: 37
- FDP_ACF.1: 35
- FDP_IFC.1: 13
- FDP_IFC.1.1: 1
- FDP_IFF.1: 8
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC.1: 5
- FDP_ITC.2: 5
- FIA:
- FIA_UAU.2: 8
- FIA_UAU.2.1: 1
- FIA_UID.1: 3
- FIA_UID.2: 8
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA.1: 40
- FMT_MSA.3: 42
- FMT_MTD.1: 16
- FMT_MTD.1.1: 1
- FMT_SMF.1: 7
- FMT_SMF.1.1: 1
- FMT_SMR.1: 24
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
|
- FAU:
- FAU_ARP: 2
- FAU_ARP.1: 11
- FAU_ARP.1.1: 2
- FAU_SAA: 2
- FAU_SAA.1: 15
- FAU_SAA.1.1: 2
- FAU_SAA.1.2: 2
- FCS:
- FCS_CKM: 2
- FCS_CKM.3: 12
- FCS_CKM.3.1: 1
- FCS_CKM.4: 12
- FCS_CKM.4.1: 1
- FCS_COP: 2
- FCS_COP.1: 12
- FCS_COP.1.1: 4
- FDP:
- FDP_ACC: 2
- FDP_ACC.2: 15
- FDP_ACC.2.1: 2
- FDP_ACC.2.2: 1
- FDP_ACF: 2
- FDP_ACF.1: 14
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_DAU: 2
- FDP_DAU.1: 9
- FDP_DAU.1.1: 1
- FDP_DAU.1.2: 1
- FDP_ETC: 2
- FDP_ETC.1: 5
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_ITC: 2
- FDP_ITC.1: 10
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_RIP: 2
- FDP_RIP.1: 8
- FDP_RIP.1.1: 1
- FDP_ROL: 2
- FDP_ROL.1: 4
- FDP_ROL.1.1: 1
- FDP_ROL.1.2: 1
- FDP_SDI: 2
- FDP_SDI.2: 6
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FIA:
- FIA_AFL: 2
- FIA_AFL.1: 8
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD: 2
- FIA_ATD.1: 7
- FIA_ATD.1.1: 1
- FIA_UAU: 2
- FIA_UAU.1: 10
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 7
- FIA_UAU.4.1: 1
- FIA_UID: 2
- FIA_UID.1: 10
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB: 2
- FIA_USB.1: 8
- FIA_USB.1.1: 1
- FMT:
- FMT_MOF: 2
- FMT_MOF.1: 8
- FMT_MOF.1.1: 2
- FMT_MSA: 2
- FMT_MSA.1: 12
- FMT_MSA.1.1: 1
- FMT_MSA.2: 9
- FMT_MSA.2.1: 1
- FMT_MSA.3: 10
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 2
- FMT_MTD.1: 7
- FMT_MTD.1.1: 1
- FMT_MTD.2: 6
- FMT_MTD.2.1: 1
- FMT_MTD.2.2: 1
- FMT_SMR: 2
- FMT_SMR.1: 9
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNO: 3
- FPR_UNO.1: 7
- FPR_UNO.1.1: 1
- FPT:
- FPT_FLS: 2
- FPT_FLS.1: 10
- FPT_FLS.1.1: 1
- FPT_PHP: 2
- FPT_PHP.3: 10
- FPT_PHP.3.1: 1
- FPT_RCV: 2
- FPT_RCV.4: 4
- FPT_RCV.4.1: 1
- FPT_RVM: 2
- FPT_RVM.1: 6
- FPT_RVM.1.1: 1
- FPT_SEP: 2
- FPT_SEP.1: 11
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_TDC: 2
- FPT_TDC.1: 5
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST: 3
- FPT_TST.1: 6
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FRU:
- FRU_RSA: 2
- FRU_RSA.1: 5
- FRU_RSA.1.1: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.AUTHORISED_USER: 4
- A.PROTECT_ACCESS: 4
- A.PROTECT_PASSWD: 4
- A.SECURE_OPER: 4
- A.SECURE_SERVER: 4
- A.TRUST_ADMIN: 4
- O:
- O.ACCESS_: 1
- O.ACCESS_DV: 5
- O.LAUNCH: 5
- O.SECURE_: 2
- O.SECURE_DATA: 7
- O.SECURE_MANAGEMENT: 2
- O.VIRUS: 5
- O.WEBACC: 6
- OE:
- OE.AUTHORISED_USER: 4
- OE.PROTECT_ACCESS: 5
- OE.PROTECT_PASSWD: 3
- OE.SECURE_OPER: 3
- OE.SECURE_SERVER: 6
- OE.TRUST_ADMIN: 3
- T:
- T.ACCESS_CD: 3
- T.ACCESS_DD: 4
- T.ACCESS_KD: 3
- T.KEY_DISCLOSURE: 4
|
- A:
- O:
- O.APPLI_DEV: 4
- O.CLON: 1
- O.CODE_HASH: 2
- O.DEV_DIS_ES: 6
- O.DIS: 1
- O.DIS_: 1
- O.DIS_MEMORY: 1
- O.DLV_DATA: 3
- O.EFFECT_L: 4
- O.EFFECT_R: 3
- O.FLAW: 1
- O.INIT_ACS: 4
- O.LOAD: 4
- O.MOD_: 1
- O.MOD_MEMORY: 1
- O.OPERATE: 1
- O.REMOVE: 4
- O.RESOURCE: 2
- O.RESOURCES: 1
- O.ROLLBACK: 3
- O.SAMPLES_ACS: 1
- O.SAMPLE_ACS: 2
- O.SECURITY: 4
- O.SEGREGATE: 4
- O.SIDE: 4
- O.TAMPER_ES: 11
- T:
- T.APP_COR: 1
- T.APP_CORR: 4
- T.APP_DISC: 9
- T.APP_MOD: 5
- T.APP_REA: 1
- T.APP_READ: 4
- T.APP_REM: 1
- T.APP_REMOVE: 4
- T.CLON: 1
- T.DEL_REM: 1
- T.DEL_REMOVE: 4
- T.DIS_DATA: 5
- T.DIS_DEL: 1
- T.DIS_INFO: 1
- T.DIS_TEST: 1
- T.DIS_TEST_ES: 4
- T.ERR_REM: 1
- T.ERR_REMOVE: 4
- T.LOAD_APP: 6
- T.LOAD_MA: 1
- T.LOAD_MAN: 4
- T.LOAD_MO: 1
- T.LOAD_MOD: 6
- T.LOAD_OT: 1
- T.LOAD_OTHER: 4
- T.MOD: 5
- T.MOD_DAT: 1
- T.MOD_DATA: 3
- T.MOD_DEL: 3
- T.MOD_EXE: 5
- T.MOD_LOA: 1
- T.MOD_LOAD: 4
- T.MOD_SHA: 1
- T.MOD_SHARE: 4
- T.MOD_SOF: 1
- T.MOD_SOFT: 1
- T.MOD_TSF: 5
- T.RESOURC: 1
- T.RESOURCES: 4
- T.T_CMD: 5
- T.T_ES: 5
- T.T_SAMPLE: 1
- T.T_TOOLS: 5
|
pdf_data/st_keywords/vendor |
|
- Infineon:
- Infineon: 2
- Infineon Technologies: 5
- Thales:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Physical tampering: 1
- physical tampering: 1
- SCA:
- DPA: 2
- SPA: 2
- Timing attacks: 1
- side channel: 2
- timing attack: 1
- timing attacks: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 1
- FIPS:
- FIPS 180-4: 1
- FIPS 197: 1
- FIPS 198-1: 1
- FIPS PUB 197: 1
- FIPS PUB 198-1: 1
- NIST:
- NIST SP 800-38A: 1
- NIST SP 800-38E: 1
- NIST SP 800-90A: 2
- SP 800-132: 1
- PKCS:
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- By content categories and types of data. Two above mentioned checks together (this rule type is out of scope of evaluation). Multiple rules can be defined with relative priority, they will be applied based on: 1
- out of scope: 3
- path, application properties, application`s digital signature parameters, application category (out of scope of evalutation), active user. P a g e | 43 This metadata then are compared to active Application: 1
- the one selected in the rule. Content categories are described in User Manual (this rule type is out of scope of evaluation). By type of data. When object is being downloaded from network its source URL is: 1
- this rule type is out of scope of evaluation: 2
|
- OutOfScope:
- Note that cryptographic primitives are out of scope. Table 3 shows how these security functions satisfy the TOE security functional requirements: 1
- out of scope: 1
- strength level of these security functions is “SOF high”. Note that cryptographic primitives are out of scope. Table 3 shows how these security functions satisfy the TOE security functional requirements. 6.1.1: 1
|
pdf_data/st_metadata |
- /Author: test
- /CreationDate: D:20180220122537+03'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20180426102848+02'00'
- /Producer: Microsoft® Word 2016
- pdf_file_size_bytes: 985996
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 47
|
- /Author: Thales Microelectronics & Keycorp MULTOS Team
- /CreationDate: D:20040526124355
- /Creator: Microsoft Word 8.0
- /ModDate: D:20040526124445+11'00'
- /Producer: Acrobat Distiller 4.0 for Windows
- /Subject: Keycorp MULTOS Common Criteria
- /Title: Public Security Target
- pdf_file_size_bytes: 652006
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 85
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
False |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |