| name |
isco Intersight Virtual Appliance 1.0.9 with IMM Fabric 4.3 UCS X-Series Servers and UCS C-Series Servers |
Trend Micro TippingPoint Security Management System (SMS) v6.2.0 |
| category |
Network and Network-Related Devices and Systems |
Network and Network-Related Devices and Systems |
| scheme |
NL |
MY |
| status |
active |
active |
| not_valid_after |
16.03.2030 |
03.05.2029 |
| not_valid_before |
16.03.2025 |
03.05.2024 |
| cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2400020-01-Cert.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C133-CERTIFICATE-V1.pdf |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2400020-01-CR.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C133-CR-v1.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2400020-01-ST_v0.12.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Trend%20Micro%20SMS%206.2.0%20ST-v1.0.pdf |
| manufacturer |
Cisco Systems, Inc. |
Trend Micro Incorporated. |
| manufacturer_web |
https://www.cisco.com |
https://www.trendmicro.com |
| security_level |
EAL2+, ALC_FLR.2 |
EAL2 |
| dgst |
fddbb5001d53e108 |
633dc7480c953157 |
| heuristics/cert_id |
NSCIB-CC-2400020-01-CR |
ISCB-5-RPT-C133-CR-v1 |
| heuristics/cert_lab |
|
[] |
| heuristics/cpe_matches |
cpe:2.3:a:cisco:intersight_virtual_appliance:1.0.9-302:*:*:*:*:*:*:*, cpe:2.3:a:cisco:intersight_virtual_appliance:1.0.9-150:*:*:*:*:*:*:*, cpe:2.3:a:cisco:intersight_virtual_appliance:1.0.9-148:*:*:*:*:*:*:*, cpe:2.3:a:cisco:intersight_virtual_appliance:1.0.9-292:*:*:*:*:*:*:*, cpe:2.3:a:cisco:intersight_virtual_appliance:1.0.9-230:*:*:*:*:*:*:*, cpe:2.3:a:cisco:intersight_virtual_appliance:1.0.9-343:*:*:*:*:*:*:*, cpe:2.3:a:cisco:intersight_virtual_appliance:1.0.9-342:*:*:*:*:*:*:* |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
CVE-2021-34748, CVE-2021-1618, CVE-2021-44228, CVE-2021-1617 |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ADV_FSP.2, AGD_PRE.1, ATE_FUN.1, ATE_COV.1, ALC_FLR.2, ATE_IND.2, ALC_CMC.2, AGD_OPE.1, ALC_CMS.2, AVA_VAN.2, ALC_DEL.1, ADV_TDS.1, ADV_ARC.1 |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 |
| heuristics/extracted_versions |
1.0.9, 4.3 |
6.2.0 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
{} |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
{} |
| heuristics/scheme_data |
|
- cert_no: 2024-003-C133
- certification_date: 03.05.2024
- developer: Trend Micro Incorporated.
- enhanced:
- assurance_level: EAL2
- category: Network and Network-Related Devices and Systems
- cert_id: C133
- certification_date: 03.05.2024
- developer: 11305 Alterra ParkwayAustin, TX 78758Phone: +1 (817) 569-8900Toll-free: (888) 762-8736https://www.trendmicro.com/en_za/contact.html
- expiration_date: 03.05.2029
- mutual_recognition: CCRA
- product: Trend Micro TippingPoint Security Management System (SMS) v6.2.0
- report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C133/ISCB-5-RPT-C133-CR-v1.pdf
- scope: The TOE provides centralized control for managing large-scale deployments of the following TippingPoint products: TippingPoint NX Series Next-Generation Intrusion Prevention System (IPS)—uses a combination of technologies, including deep packet inspection, threat reputation, and advanced malware analysis, on a flow-by-flow basis to detect and prevent attacks on the network. TippingPoint Threat Protection System (TPS)—a network security platform that offers comprehensive threat protection, shielding network vulnerabilities, blocking exploits, and defending against known and zero-day attacks. The TOE also provides capabilities for communicating threat data with TippingPoint Deep Discovery (DD) devices. TippingPoint DD is a threat protection platform providing capabilities to detect, analyze and respond to network-based attacks.
- status: Valid
- target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C133/Trend_Micro_SMS_6.2.0_ST-v1.0.pdf
- type: Network and Network-Related Devices and Systems
- expiration_date: 03.05.2029
- level: EAL2
- product: Trend Micro TippingPoint Security Management System (SMS) v6.2.0
- recognition: CCRA
- url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/certified-products-and-systems-5/submission-view/171
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
{} |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
{} |
| pdf_data/cert_filename |
NSCIB-CC-2400020-01-Cert.pdf |
ISCB-5-CERT-C133-CERTIFICATE-V1.pdf |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
- NL:
- NSCIB-2400020-01: 1
- NSCIB-CC-2400020-01: 1
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
- EAL:
- EAL2: 2
- EAL2 augmented: 1
- EAL4: 1
|
|
| pdf_data/cert_keywords/cc_sar |
- ALC:
- ALC_FLR.2: 1
- ALC_FLR.3: 1
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
- Cisco:
- Cisco: 1
- Cisco Systems, Inc: 1
|
|
| pdf_data/cert_keywords/eval_facility |
- BrightSight:
- SGS:
- SGS: 1
- SGS Brightsight: 1
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
- ISO:
- ISO/IEC 15408-1: 2
- ISO/IEC 18045: 4
- ISO/IEC 18045:2008: 1
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
- /Author: Gebruiker
- /CreationDate: D:20250329203611+00'00'
- /Creator: Microsoft® Word 2021
- /ModDate: D:20250329203611+00'00'
- /Producer: Microsoft® Word 2021
- /Title: NSCIB Certificate
- pdf_file_size_bytes: 87201
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /CreationDate: D:20240506114507+08'00'
- /Creator: TOSHIBA e-STUDIO3525AC
- /ModDate: D:20240510121415+08'00'
- /Producer: SECnvtToPDF V1.0
- pdf_file_size_bytes: 815976
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
| pdf_data/report_filename |
NSCIB-CC-2400020-01-CR.pdf |
ISCB-5-RPT-C133-CR-v1.pdf |
| pdf_data/report_frontpage |
- NL:
- cert_id: NSCIB-CC-2400020-01-CR
- cert_item: Cisco Intersight Virtual Appliance 1.0.9 with IMM Fabric 4.3 UCS X-Series Servers and UCS C-Series Servers
- cert_lab: SGS Brightsight B.V.
- developer: Cisco Systems, Inc
|
|
| pdf_data/report_keywords/cc_cert_id |
- NL:
- NSCIB-2400020-01: 1
- NSCIB-CC-2400020-01-CR: 12
|
- MY:
- ISCB-5-RPT-C133-CR-V1: 33
- ISCB-5-RPT-C133-CR-v1: 2
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 2 augmented: 1
- EAL2: 1
- EAL2 augmented: 1
- EAL2+: 2
- EAL4: 1
|
|
| pdf_data/report_keywords/cc_sar |
|
|
| pdf_data/report_keywords/cc_sfr |
|
- FAU:
- FAU_GEN.1: 1
- FAU_GEN.1.1: 1
- FAU_SAR.1: 1
- FAU_SAR.3: 1
- FIA:
- FIA_AFL.1: 1
- FIA_SOS.1: 1
- FIA_UAU.5: 1
- FIA_UAU.7: 1
- FMT:
- FMT_MOF.1: 3
- FMT_MOF.1.1: 3
- FMT_MTD.1: 6
- FMT_MTD.1.1: 3
- FMT_SMF.1: 1
- FMT_SMF.1.1: 2
- FMT_SMR.1: 1
- FPT:
- FTA:
- FTA_MCS.1: 1
- FTA_SSL.1: 1
- FTA_TAB.1: 1
- FTP:
|
| pdf_data/report_keywords/cc_claims |
|
|
| pdf_data/report_keywords/vendor |
- Cisco:
- Cisco: 26
- Cisco Systems, Inc: 3
|
|
| pdf_data/report_keywords/eval_facility |
- BrightSight:
- SGS:
- SGS: 2
- SGS Brightsight: 2
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
|
- ISO:
- ISO/IEC 18045: 2
- ISO/IEC15408: 2
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
|
- /CreationDate: D:20240510051519Z00'00'
- /Creator: Word
- /ModDate: D:20240510051519Z00'00'
- /Producer: macOS Version 11.7.10 (Build 20G1427) Quartz PDFContext
- /Title: ISCB-5-RPT-C133-CR-v1
- pdf_file_size_bytes: 1537825
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 35
|
| pdf_data/st_filename |
NSCIB-CC-2400020-01-ST_v0.12.pdf |
Trend Micro SMS 6.2.0 ST-v1.0.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
|
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 2
- ADV_FSP.2: 2
- ADV_TDS.1: 2
- AGD:
- AGD_OPE.1: 4
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.2: 2
- ALC_CMS.2: 2
- ALC_DEL.1: 1
- ALC_FLR.2: 5
- ATE:
- ATE_COV.1: 2
- ATE_FUN.1: 2
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 11
- ADV_FSP.2: 12
- ADV_TDS.1: 12
- AGD:
- AGD_OPE.1: 11
- AGD_PRE.1: 7
- ALC:
- ALC_CMC.2: 9
- ALC_CMS.2: 7
- ALC_DEL.1: 6
- ASE:
- ASE_CCL.1: 15
- ASE_ECD.1: 11
- ASE_INT.1: 13
- ASE_OBJ.2: 11
- ASE_REQ.2: 14
- ASE_SPD.1: 8
- ASE_TSS.1: 6
- ATE:
- ATE_COV.1: 5
- ATE_FUN.1: 9
- ATE_IND.2: 8
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 9
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR.1: 8
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.3: 5
- FAU_SAR.3.1: 1
- FAU_STG.1: 7
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.4: 5
- FAU_STG.4.1: 1
- FDP:
- FDP_ACC.1: 4
- FDP_ACC.2: 7
- FDP_ACC.2.1: 1
- FDP_ACC.2.2: 1
- FDP_ACF.1: 9
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 11
- FDP_IFC.1.1: 1
- FDP_IFF.1: 12
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FIA:
- FIA_ATD.1: 6
- FIA_ATD.1.1: 4
- FIA_SOS.1: 6
- FIA_SOS.1.1: 1
- FIA_UAU.2: 6
- FIA_UAU.2.1: 1
- FIA_UAU.5: 6
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UID.1: 1
- FIA_UID.2: 8
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF.1: 6
- FMT_MOF.1.1: 1
- FMT_MSA.1: 15
- FMT_MSA.1.1: 2
- FMT_MSA.3: 15
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MTD.1: 11
- FMT_MTD.1.1: 2
- FMT_SMF: 2
- FMT_SMF.1: 14
- FMT_SMF.1.1: 1
- FMT_SMR.1: 21
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 6
- FPT_FLS.1.1: 1
- FPT_ITT.2: 6
- FPT_ITT.2.1: 1
- FPT_ITT.2.2: 1
- FPT_RCV.2: 6
- FPT_RCV.2.1: 1
- FPT_RCV.2.2: 1
- FPT_STM.1: 9
- FPT_STM.1.1: 3
- FTP:
- FTP_TRP.1: 7
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_GEN: 4
- FAU_GEN.1: 11
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_SAR: 6
- FAU_SAR.1: 11
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 5
- FAU_SAR.2.1: 1
- FAU_SAR.3: 6
- FAU_SAR.3.1: 1
- FAU_STG: 2
- FAU_STG.1: 5
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FCS:
- FCS_COP.1: 2
- FCS_COP.1.1: 1
- FIA:
- FIA_AFL: 2
- FIA_AFL.1: 6
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD: 2
- FIA_ATD.1: 6
- FIA_ATD.1.1: 1
- FIA_SOS: 2
- FIA_SOS.1: 7
- FIA_SOS.1.1: 1
- FIA_UAU: 8
- FIA_UAU.1: 4
- FIA_UAU.2: 12
- FIA_UAU.2.1: 1
- FIA_UAU.5: 6
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 6
- FIA_UAU.6.1: 1
- FIA_UAU.7: 6
- FIA_UAU.7.1: 1
- FIA_UID: 1
- FIA_UID.1: 7
- FIA_UID.2: 10
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF.1: 12
- FMT_MOF.1.1: 3
- FMT_MTD.1: 17
- FMT_MTD.1.1: 6
- FMT_SMF: 1
- FMT_SMF.1: 10
- FMT_SMF.1.1: 1
- FMT_SMR: 1
- FMT_SMR.1: 9
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_ITT: 2
- FPT_ITT.1: 6
- FPT_ITT.1.1: 1
- FPT_STM: 3
- FPT_STM.1: 8
- FPT_STM.1.1: 1
- FTA:
- FTA_MCS: 2
- FTA_MCS.1: 6
- FTA_MCS.1.1: 1
- FTA_MCS.1.2: 1
- FTA_SSL: 6
- FTA_SSL.1: 6
- FTA_SSL.1.1: 1
- FTA_SSL.1.2: 1
- FTA_SSL.3: 7
- FTA_SSL.3.1: 1
- FTA_SSL.4: 6
- FTA_SSL.4.1: 1
- FTA_TAB: 2
- FTA_TAB.1: 6
- FTA_TAB.1.1: 1
- FTA_TAH: 2
- FTA_TAH.1: 6
- FTA_TAH.1.1: 1
- FTA_TAH.1.2: 1
- FTA_TAH.1.3: 1
- FTP:
- FTP_ITC: 1
- FTP_ITC.1: 7
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 2
- FTP_TRP.1: 6
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN: 3
- A.BOUNDARY: 3
- A.PHYSICAL: 3
- A.POWER: 3
- A.REDUNDANT_NET: 3
- A.REMOTE_SERVERS: 2
- O:
- O.ACCOUN: 6
- O.ADMIN: 7
- O.AUDREC: 9
- O.ENCRYP: 4
- O.IDAUTH: 12
- O.SECFUN: 21
- O.VLANSEC: 5
- OE:
- OE: 2
- OE.ADMIN: 3
- OE.BOUNDARY: 2
- OE.PHYSICAL: 3
- OE.POWER: 2
- OE.REDUNDANT_NET: 3
- OE.REMOTE_SERVERS: 2
- T:
- T.ACCOUNTABILITY: 4
- T.ATTACK_ANOTHER: 2
- T.CONFIGURE_NO: 3
- T.NOAUTH: 3
- T.NORMAL_USE: 3
- T.SNIFF: 4
|
- A:
- O:
- O.AUDIT: 6
- O.AUDIT_REVIEW: 3
- O.I_AND_A: 8
- O.LOGIN_BANNER: 3
- O.LOGIN_HISTORY: 5
- O.PASSWORD_CONTROLS: 3
- O.PROTECTED: 1
- O.PROTECTED_COMMS: 4
- O.SECURITY_MANAGEMENT: 3
- O.SESSION_LIMITS: 5
- O.SESSION_SECURITY: 3
- O.STORAGE: 5
- O.THROTTLE: 3
- OE:
- OE.PERSONNEL: 2
- OE.PHYSICAL: 2
- T:
- T.BRUTE_FORCE: 3
- T.INAPPRORIATE_USE: 2
- T.INTEGRITY_COMPROMISE: 3
- T.NETWORK_COMPROMISE: 2
- T.NO_ACCOUNTABILITY: 3
- T.UNAUTHORIZED_ACCESS: 2
- T.UNAUTHORIZED_ACTIVITY: 3
|
| pdf_data/st_keywords/vendor |
- Cisco:
- Cisco: 67
- Cisco Systems, Inc: 10
- Microsoft:
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
- SSH:
- TLS:
- TLS:
- TLS: 6
- TLS1.2: 3
- TLSv1.2: 1
- TLSv1.3: 4
|
- SSH:
- TLS:
- TLS:
- TLS: 12
- TLS 1.2: 1
- TLS v1.0: 2
- TLS v1.1: 2
- TLS v1.2: 3
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 2
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
- TLS_RSA_WITH_AES_128_CBC_SHA: 2
- TLS_RSA_WITH_AES_128_CBC_SHA256: 2
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
|
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
|
| pdf_data/st_metadata |
|
- /Author: Apted, Tony J. [RA]
- /CreationDate: D:20240403093836+08'00'
- /Creator: Microsoft® Word for Microsoft 365
- /ModDate: D:20240403093836+08'00'
- /Producer: Microsoft® Word for Microsoft 365
- /Subject: Third Party Protected Information
- /Title: Trend Micro SMS
- pdf_file_size_bytes: 852877
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 45
|
| state/cert/convert_garbage |
False |
None |
| state/cert/convert_ok |
True |
True |
| state/cert/download_ok |
True |
True |
| state/cert/extract_ok |
True |
True |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
False |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
False |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |