name |
X-Ware IoT Platform SC |
Infineon Technologies AG OPTIGA™ Trusted Platform Module SLB9672_2.0 v16 and SLB9673_2.0 v26, version v16.10.16488.00, v16.12.16858.00 and v26.10.16688.00 |
category |
Operating Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
NO |
DE |
status |
archived |
archived |
not_valid_after |
28.09.2023 |
15.12.2024 |
not_valid_before |
28.09.2018 |
29.04.2022 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SERTIT-113_Certificate.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1178V3c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SERTIT-113%20CR%20v1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1178V3a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[ST]%20X-Ware%20IoT%20Platform%20SC%20Security%20Target%20V2.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1178V3b_pdf.pdf |
manufacturer |
Express Logic |
Infineon Technologies AG |
manufacturer_web |
https://rtos.com |
https://www.infineon.com/ |
security_level |
ALC_FLR.1, EAL4+ |
ALC_FLR.1, EAL4+, AVA_VAN.4 |
dgst |
f612b297b72f9fe2 |
ddf70c472ce25d9c |
heuristics/cert_id |
SERTIT-113 |
BSI-DSZ-CC-1178-V3-2022 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_DVS.1, ATE_IND.2, ALC_TAT.1, ALC_LCD.1, ADV_FSP.4, ATE_DPT.1, ASE_CCL.1, ADV_TDS.3, AGD_OPE.1, ASE_SPD.1, ALC_FLR.1, ASE_OBJ.2, ATE_COV.2, AVA_VAN.3, ADV_ARC.1, ATE_FUN.1, ADV_IMP.1, ASE_INT.1, ASE_TSS.1, ALC_CMC.4, ASE_REQ.2, ALC_DEL.1, AGD_PRE.1, ALC_CMS.4, ASE_ECD.1 |
ALC_DVS.1, ATE_IND.2, ALC_TAT.1, ALC_LCD.1, ADV_FSP.4, AVA_VAN.4, ATE_DPT.1, ASE_CCL.1, ADV_TDS.3, AGD_OPE.1, ASE_SPD.1, ALC_FLR.1, ASE_OBJ.2, ATE_COV.2, ADV_ARC.1, ATE_FUN.1, ADV_IMP.1, ASE_INT.1, ASE_TSS.1, ALC_CMC.4, ASE_REQ.2, ALC_DEL.1, AGD_PRE.1, ALC_CMS.4, ASE_ECD.1 |
heuristics/extracted_versions |
- |
16.12.16858.00, 16.10.16488.00, 26.10.16688.00, 2.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-1178-V4-2023 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-1178-V2-2022 |
heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-1178-V4-2023, BSI-DSZ-CC-1245-2024 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1178-V2-2022, BSI-DSZ-CC-1113-2021, BSI-DSZ-CC-1178-2021 |
heuristics/scheme_data |
- category: Operating Systems
- certification_date: 28.09.2018
- developer: Express Logic
- enhanced:
- category: Operating Systems
- cert_id: SERTIT-113
- certification_date: 28.09.2018
- description: The TOE is an Industrial Grade solution for deeply embedded IoT devices based on proprietary, non-open source, ThreadX RTOS, NetX Duo IPv4/IPv6 TCP/IP stack with NetX Secure TLS 1.2 and MQTT support.
- developer: Express Logic
- documents: frozendict({'cert': [frozendict({'href': 'https://sertit.no/getfile.php/135355-1607953929/SERTIT/Sertifikater/2018/113/SERTIT-113_Certificate.pdf'})], 'target': [frozendict({'href': 'https://sertit.no/getfile.php/135358-1607953931/SERTIT/Sertifikater/2018/113/%5BST%5D%20X-Ware%20IoT%20Platform%20SC%20Security%20Target%20V2.0.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/135352-1607953925/SERTIT/Sertifikater/2018/113/SERTIT-113%20CR%20v1.0.pdf'})]})
- evaluation_facility: Brightsight B.V.
- expiration_date: 28.09.2023
- level: EAL 4, ALC_FLR.1
- mutual_recognition: CCRA, SOG-IS
- product: Version 5.11
- sponsor: Express Logic
- product: X-Ware IoT Platform SC
- url: https://sertit.no/certified-products/product-archive/x-ware-iot-platform-sc
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
edccaca44d27fedc |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/anssi-profil-pp-2021_02en.pdf |
pdf_data/cert_filename |
SERTIT-113_Certificate.pdf |
1178V3c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- NO:
- SERTIT-113: 1
- SERTIT-115: 1
|
- DE:
- BSI-DSZ-CC-1178-V3-2022: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL4: 1
- EAL4 augmented: 1
|
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL 4 augmented: 1
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
- Infineon:
- Infineon Technologies AG: 2
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- pdf_file_size_bytes: 753377
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20220509113027+02'00'
- /Creator: Writer
- /Keywords: Common Criteria, Certification, Zertifizierung, TPM
- /ModDate: D:20220509113131+02'00'
- /Producer: LibreOffice 6.3
- /Subject: Common Criteria Certification
- /Title: Certificate BSI-DSZ-CC-1178-V3-2022
- pdf_file_size_bytes: 241479
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
SERTIT-113 CR v1.0.pdf |
1178V3a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ALC_FLR.1 and AVA_VAN.4
- cc_version: PP conformant Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-1178-V3-2022
- cert_item: Infineon Technologies AG OPTIGA™ Trusted Platform Module SLB9672_2.0 v16 and SLB9673_2.0 v26, version v16.10.16488.00, v16.12.16858.00 and v26.10.16688.00
- cert_lab: BSI
- developer: Infineon Technologies AG
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Protection Profile PC Client Specific TPM, TPM Library specification Family “2.0”, Level 0 Revision 1.59, Version: 1.3, Date: 2021-09-29, ANSSI-CC- PP-2021/02
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1178-V2-2022: 3
- BSI-DSZ-CC-1178-V3-2022: 19
- FR:
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- ANSSI:
- ANSSI-CC-PP-: 1
- ANSSI-CC-PP-2021/02: 2
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 4: 2
- EAL 4+: 20
- EAL1: 1
- EAL4: 1
- EAL4 augmented: 1
- EAL7: 1
|
- EAL:
- EAL 1: 1
- EAL 2: 2
- EAL 2+: 1
- EAL 4: 5
- EAL 4 augmented: 3
- EAL 5+: 1
- EAL 6: 1
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR: 1
- ALC_FLR.1: 6
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR: 3
- ALC_FLR.1: 5
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ATE:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Infineon:
- Infineon: 5
- Infineon Technologies: 1
- Infineon Technologies AG: 17
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 4
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-256: 15
- SHA-384: 13
- SHA-512: 1
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
- SCA:
- side channel: 1
- timing attacks: 1
|
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7148: 1
- BSI TR-02102: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- FIPS:
- FIPS1804: 1
- FIPS197: 1
- FIPS1981: 1
- ISO:
- RFC:
|
- BSI:
- AIS 20: 3
- AIS 25: 1
- AIS 26: 1
- AIS 31: 2
- AIS 32: 1
- AIS 34: 2
- AIS 35: 1
- AIS 36: 1
- AIS 38: 1
- AIS20: 1
- AIS26: 1
- FIPS:
- FIPS PUB 186-4: 1
- FIPS PUB 186-5: 1
- FIPS180-4: 9
- FIPS186-4: 11
- FIPS186-5: 1
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- RFC:
- RFC 3447: 1
- RFC 8391: 1
- RFC3447: 16
- RFC8391: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- Standards Compliance Verification (CSCV); Version 1, July 19, 2021, TÜV Informationstechnik GmbH, (confidential document) 24 / 33 BSI-DSZ-CC-1178-V3-2022 Certification Report C. Excerpts from the Criteria For the: 1
- Version 2, April 06, 2022, ”Evaluation Technical Report Summary”, TÜV Informationstechnik GmbH, (confidential document) 7 specifically • AIS 20, Version 3, Funktionalitätsklassen und Evaluationsmethodologie für: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
|
pdf_data/report_metadata |
- /AAPL:Keywords: []
- /CreationDate: D:20180928171651Z00'00'
- /Creator: Word
- /Keywords:
- /ModDate: D:20180928171651Z00'00'
- /Producer: macOS Version 10.14 (Build 18A391) Quartz PDFContext
- /Title: Microsoft Word - SERTIT-113 CR v1.0.docx
- pdf_file_size_bytes: 902237
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 18
|
|
pdf_data/st_filename |
[ST] X-Ware IoT Platform SC Security Target V2.0.pdf |
1178V3b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL4: 2
- EAL4 augmented: 1
|
- EAL:
- EAL4: 2
- EAL4 augmented: 1
|
pdf_data/st_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_FLR.1: 3
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL: 2
- ASE_CCL.1: 1
- ASE_ECD: 2
- ASE_ECD.1: 1
- ASE_INT: 2
- ASE_INT.1: 1
- ASE_OBJ: 2
- ASE_OBJ.2: 1
- ASE_REQ: 2
- ASE_REQ.2: 1
- ASE_SPD: 2
- ASE_SPD.1: 1
- ASE_TSS: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FDP:
- FDP_RIP.1: 6
- FDP_RIP.1.1: 1
- FPT:
- FPT_RPL.1: 6
- FPT_RPL.1.1: 1
- FPT_RPL.1.2: 1
- FPT_TEE.1: 6
- FPT_TEE.1.1: 1
- FPT_TEE.1.2: 1
- FTP:
- FTP_ITC.1: 6
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
- FCO:
- FCS:
- FCS_CKM: 37
- FCS_CKM.1: 20
- FCS_CKM.2: 8
- FCS_CKM.4: 22
- FCS_CKM.4.1: 1
- FCS_COP: 47
- FCS_COP.1: 19
- FCS_RNG: 1
- FCS_RNG.1: 11
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC: 28
- FDP_ACC.1: 4
- FDP_ACF: 30
- FDP_ACF.1: 8
- FDP_ETC: 7
- FDP_IFC.1: 2
- FDP_ITC: 7
- FDP_ITC.1: 11
- FDP_ITC.2: 11
- FDP_ITT.1: 1
- FDP_RIP.1: 3
- FDP_SDI.1: 3
- FDP_UCT: 7
- FDP_UIT: 9
- FDP_UIT.1: 2
- FIA:
- FIA_AFL: 12
- FIA_MSA: 1
- FIA_SOS.2: 3
- FIA_UAU.1: 3
- FIA_UAU.5: 3
- FIA_UAU.6: 3
- FIA_UID.1: 4
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 3
- FMT:
- FMT_MOF: 3
- FMT_MSA: 65
- FMT_MSA.1: 1
- FMT_MSA.2: 4
- FMT_MSA.2.1: 1
- FMT_MSA.3: 2
- FMT_MTD: 6
- FMT_SMF.1: 3
- FMT_SMR.1: 4
- FPT:
- FPT_FLS: 7
- FPT_FLS.1: 1
- FPT_ITT.1: 3
- FPT_PHP.3: 4
- FPT_PHP.3.1: 1
- FPT_STM.1: 3
- FPT_TST.1: 6
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 3
- FTP_ITC.1: 1
- FTP_TRP.1: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- O:
- O.CRYPTO_TEST: 3
- O.MQTTTLS: 5
- O.SECRETS_CLEARING: 3
- O.TLS: 5
- OE:
- OE.INTEGRATOR_SECRETS: 2
- OE.TRUSTED_INTEGRATOR: 1
- OE.TRUSTED_PLATFORM: 2
- OE.UNDERLYING_CRYPTO: 1
- T:
|
|
pdf_data/st_keywords/vendor |
|
- Infineon:
- Infineon: 7
- Infineon Technologies: 6
- Infineon Technologies AG: 18
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- NIST:
- NIST P-256: 1
- NIST P-384: 1
- P-256: 1
- P-384: 1
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- SCA:
- side channel: 2
- timing attacks: 2
|
- FI:
- SCA:
- DPA: 1
- SPA: 1
- physical probing: 2
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 180-4: 1
- FIPS 197: 1
- FIPS 198-1: 1
- FIPS1804: 3
- FIPS197: 3
- FIPS1981: 3
- PKCS:
- RFC:
- RFC 3447: 1
- RFC 4279: 1
- RFC 4346: 1
- RFC 5246: 1
- RFC 5280: 1
- RFC 5652: 1
- RFC 5746: 1
- RFC 6066: 1
- RFC 8017: 1
- RFC3447: 3
- RFC4279: 1
- RFC4346: 3
- RFC5246: 3
- RFC5280: 1
- RFC5652: 1
- RFC5746: 1
- RFC6066: 1
- RFC8017: 1
- X509:
|
- BSI:
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 1
- FIPS:
- FIPS 180-4: 3
- FIPS PUB 140-2: 3
- FIPS PUB 180-4: 2
- FIPS PUB 186-4: 1
- ISO:
- ISO/IEC 10116:2006: 2
- ISO/IEC 10118-3: 1
- ISO/IEC 14888-3: 1
- ISO/IEC 15946-1: 1
- ISO/IEC 9797-2: 3
- NIST:
- NIST SP 800-90A: 2
- SP 800-133: 1
- SP 800-90A: 3
- PKCS:
- RFC:
- RFC 2104: 1
- RFC 3447: 1
- RFC3447: 35
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- out of scope: 1
- parts are within the evaluation scope and the gray parts are outside of the evaluated scope. The out of scope logical parts compromise the integrator application and device driver software to abstract the: 1
|
|
pdf_data/st_metadata |
- /Author: Yuping Tan
- /CreationDate: D:20180824153125+02'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20180824153125+02'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 374642
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 15
|
- /Author: Jürgen Noller
- /CreationDate: D:20220405082522+02'00'
- /Creator: Microsoft® Word 2016
- /Keywords: Infineon, CCS, Security Target, EAL4+, moderate, SLB967x, SLB9670, SPI, Trusted Computing, TPM 2.0, Trusted Platform Module
- /ModDate: D:20220405082522+02'00'
- /Producer: Microsoft® Word 2016
- /Subject: Security Target SLB9670_2.0
- /Title: CC EAL4+ moderate Certification Security Target
- pdf_file_size_bytes: 1270426
- pdf_hyperlinks: http://www.rsa.com/, mailto:[email protected];[email protected]?subject=Document%20question%20, http://www.bsi.bund.de/, http://www.infineon.com/
- pdf_is_encrypted: False
- pdf_number_of_pages: 63
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |