name |
Motorola Network Router, S6000 and GGM 8000 with EOS version 16.9 |
Gemalto ECC CPU card - CPU e-purse application on GCX5.1 (MPH098) platform on NXP P5CD081V1A Version 1.0 |
category |
Network and Network-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
US |
FR |
status |
archived |
archived |
not_valid_after |
23.03.2019 |
01.09.2019 |
not_valid_before |
23.03.2017 |
13.04.2011 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10738-ci.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10738-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2011-05en.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10738-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2011-05en.pdf |
manufacturer |
Motorola Solutions, Inc. |
Gemalto / NXP Semiconductors |
manufacturer_web |
https://www.motorolasolutions.com |
https://www.gemalto.com/ |
security_level |
{} |
EAL4+, ALC_DVS.2, AVA_VAN.5 |
dgst |
ff6a1bf1b2337dd8 |
1c639f9d703d2d91 |
heuristics/cert_id |
CCEVS-VR-VID-10738-2017 |
ANSSI-CC-2011/05 |
heuristics/cert_lab |
US |
CEA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_TAT.1, ASE_SPD.1, AVA_VAN.5, ADV_COMP.1, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_TSS.2, ASE_REQ.2, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
16.9 |
5.1, 1.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0555-2009 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0555-2009 |
heuristics/scheme_data |
- category: Network Device
- certification_date: 23.03.2017
- evaluation_facility: UL Verification Services Inc. (Formerly InfoGard)
- expiration_date: 23.03.2019
- id: CCEVS-VR-VID10738
- product: Motorola Network Router, S6000 and GGM 8000 with EOS version 16.9
- scheme: US
- url: https://www.niap-ccevs.org/product/10738
- vendor: Motorola Mobility LLC
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0555-2009 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0555-2009 |
heuristics/protection_profiles |
c7cf611c6bb1e4b0 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V1.0.pdf |
{} |
pdf_data/cert_filename |
st_vid10738-ci.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10738-2017: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
- UL:
- UL Verification Services: 1
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20170324094121-04'00'
- /ModDate: D:20170324094152-04'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 179923
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
st_vid10738-vr.pdf |
ANSSI-CC_2011-05en.pdf |
pdf_data/report_frontpage |
- FR:
- US:
- cert_id: CCEVS-VR-VID10738-2017
- cert_item: Motorola Solutions, Inc. Motorola Network Devices, S6000 and GGM 8000 with EOS version 16.9
- cert_lab: US NIAP
|
- FR:
- cc_security_level: EAL 4 augmented ALC_DVS.2, AVA_VAN.5
- cc_version: Common Criteria version 3.1 revision 3
- cert_id: ANSSI-CC-2011/05
- cert_item: Gemalto ECC CPU card on GCX5.1 (MPH098) platform on NXP P5CD081V1A
- cert_item_version: CPU e-purse on GCX5.1 MPH098 Version 1.0
- cert_lab: CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France Phone: +33 (0)4 38 78 37 78, email : [email protected]
- developer: Gemalto SA 6 rue de la Verrerie, 92197 Meudon, France NXP Semiconductors GmbH Stresemannallee 101, D-22502 Hamburg, Germany Sponsor Gemalto SA 6 rue de la Verrerie, 92197 Meudon, France
- match_rules: ['Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developer\\(s\\)(.+)Evaluation facility(.+)Recognition arrangements']
- ref_protection_profiles: None
- US:
|
pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10738-2017: 1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 2
- EAL 4 augmented: 2
- EAL 5: 1
- EAL 7: 1
- EAL4: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 1
- ALC_LCD: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ADMIN_CREDENTIALS_SEC: 1
- A.LIMITED_FUNCTIONALITY: 1
- A.NO_THRU_TRAFFIC_PROTE: 1
- A.PHYSICAL_PROTECTION: 1
- A.REGULAR_UPDATES: 1
- A.TRUSTED_ADMINISTRATOR: 1
- T:
- T.PASSWORD_CRACKING: 1
- T.SECURITY_FUNCTIONALITY: 2
- T.UNAUTHORIZED_ADMINIST: 1
- T.UNDETECTED_ACTIVITY: 1
- T.UNTRUSTED_COMMUNICA: 1
- T.UPDATE_COMPROMISE: 1
- T.WEAK_AUTHENTICATION_E: 1
- T.WEAK_CRYPTOGRAPHY: 1
|
|
pdf_data/report_keywords/vendor |
|
- Gemalto:
- NXP:
- NXP: 24
- NXP Semiconductors: 2
|
pdf_data/report_keywords/eval_facility |
- UL:
- UL Verification Services: 6
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- FIPS:
- X509:
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- OutOfScope:
- - The NXP P5CD081 IC The Other applications1 on the card are written in java language and are out of scope of the TOE. 1.2.4. Life cycle The product’s life cycle is organised as follow: 1 Applications: 1
- out of scope: 1
|
pdf_data/report_metadata |
- /Author: Steve Wilson
- /Company: InfoGard Laboratories
- /CreationDate: D:20170324091015-04'00'
- /Creator: Acrobat PDFMaker 11 for Word
- /Keywords:
- /ModDate: D:20170324091018-04'00'
- /Producer: Adobe PDF Library 11.0
- /SourceModified: D:20170324131003
- /Subject:
- /Title: D
- pdf_file_size_bytes: 318224
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 18
|
- /CreationDate: D:20110629162959+02'00'
- /Keywords:
- /ModDate: D:20110629162959+02'00'
- /Producer: Acrobat Distiller 8.1.0 (Windows)
- pdf_file_size_bytes: 278826
- pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 18
|
pdf_data/st_filename |
st_vid10738-st.pdf |
ANSSI-CC-cible_2011-05en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0555: 1
- BSI-DSZ-CC-0555-: 1
- BSI-DSZ-CC-0555-2009: 4
- NL:
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL4: 4
- EAL4 augmented: 3
- EAL4+: 2
- EAL5: 1
- EAL5 augmented: 1
- EAL5+: 2
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE: 4
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.1: 3
- ALC_CMS.1: 3
- ASE:
- ASE_CCL.1: 7
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 2
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 8
- ADV_COMP.1: 2
- ADV_FSP.1: 5
- ADV_FSP.2: 4
- ADV_FSP.4: 11
- ADV_IMP: 1
- ADV_IMP.1: 5
- ADV_TDS.1: 3
- ADV_TDS.2: 1
- ADV_TDS.3: 11
- AGD:
- AGD_OPE.1: 8
- AGD_PRE.1: 6
- ALC:
- ALC_CMC.4: 2
- ALC_CMS.1: 2
- ALC_CMS.4: 1
- ALC_DEL.1: 2
- ALC_DVS.1: 1
- ALC_DVS.2: 7
- ALC_LCD.1: 5
- ALC_TAT.1: 5
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 4
- ASE_INT.1: 5
- ASE_OBJ.2: 3
- ASE_REQ.1: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 2
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV.1: 4
- ATE_COV.2: 4
- ATE_DPT.1: 2
- ATE_FUN.1: 8
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 4
- FAU_GEN.1.1: 3
- FAU_GEN.2: 4
- FAU_GEN.2.1: 1
- FAU_STG.1: 4
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG_EXT.1: 4
- FAU_STG_EXT.1.1: 2
- FAU_STG_EXT.1.2: 4
- FAU_STG_EXT.1.3: 10
- FAU_STG_EXT.2: 5
- FCS:
- FCS_CKM.1: 8
- FCS_CKM.1.1: 5
- FCS_CKM.2: 6
- FCS_CKM.2.1: 3
- FCS_CKM.4: 5
- FCS_COP: 1
- FCS_COP.1: 26
- FCS_COP.1.1: 12
- FCS_PMG_EXT.1: 1
- FCS_RBG_EXT.1: 5
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 4
- FCS_SSHS_EXT.1: 4
- FCS_SSHS_EXT.1.1: 1
- FCS_SSHS_EXT.1.2: 1
- FCS_SSHS_EXT.1.3: 1
- FCS_SSHS_EXT.1.4: 1
- FCS_SSHS_EXT.1.5: 2
- FCS_SSHS_EXT.1.6: 1
- FCS_SSHS_EXT.1.7: 1
- FCS_SSHS_EXT.1.8: 1
- FCS_TLSC_EXT.1: 1
- FCS_TLSC_EXT.2: 1
- FIA:
- FIA_PGM_EXT.1: 1
- FIA_PMG_EXT.1: 1
- FIA_PMG_EXT.1.1: 2
- FIA_UAU.1: 1
- FIA_UAU.1.1: 1
- FIA_UAU.7: 3
- FIA_UAU.7.1: 2
- FIA_UAU_EXT.2: 3
- FIA_UAU_EXT.2.1: 2
- FIA_UIA_EXT.1: 8
- FIA_UIA_EXT.1.1: 1
- FIA_UIA_EXT.1.2: 1
- FMT:
- FMT_MOF: 2
- FMT_MOF.1: 28
- FMT_MOF.1.1: 14
- FMT_MTD: 4
- FMT_MTD.1: 7
- FMT_MTD.1.1: 1
- FMT_SMF.1: 7
- FMT_SMF.1.1: 1
- FMT_SMR.2: 4
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 2
- FPT:
- FPT_APW_EXT.1: 4
- FPT_APW_EXT.1.1: 1
- FPT_APW_EXT.1.2: 1
- FPT_SKP_EXT.1: 4
- FPT_SKP_EXT.1.1: 1
- FPT_STM.1: 4
- FPT_STM.1.1: 1
- FPT_TST_EXT: 1
- FPT_TST_EXT.1: 8
- FPT_TST_EXT.1.1: 2
- FPT_TST_EXT.2: 3
- FPT_TUD_EXT.1: 6
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 3
- FPT_TUD_EXT.2: 1
- FPT_TUD_EXT.2.2: 2
- FTA:
- FTA_SSL.3: 6
- FTA_SSL.3.1: 1
- FTA_SSL.4: 6
- FTA_SSL.4.1: 1
- FTA_SSL_EXT.1: 4
- FTA_SSL_EXT.1.1: 1
- FTA_TAB.1: 7
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC.1: 6
- FTP_ITC.1.1: 3
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 2
- FTP_TRP.1: 5
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_ARP.1: 10
- FAU_ARP.1.1: 2
- FAU_GEN: 1
- FAU_GEN.1: 10
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 2
- FAU_SAA: 1
- FAU_SAA.1: 13
- FAU_SAA.1.1: 3
- FAU_SAA.1.2: 1
- FAU_SAR: 1
- FAU_SAR.1: 3
- FAU_SAR.1.1: 2
- FAU_SAR.1.2: 2
- FAU_SAS.1: 1
- FAU_STG: 1
- FAU_STG.1: 10
- FAU_STG.1.1: 2
- FAU_STG.1.2: 2
- FCO:
- FCO_NRO: 6
- FCO_NRO.1: 3
- FCO_NRO.2: 2
- FCO_NRO.2.2: 3
- FCO_NRO.2.3: 3
- FCS:
- FCS_CKM: 11
- FCS_CKM.1: 11
- FCS_CKM.1.1: 1
- FCS_CKM.2: 5
- FCS_CKM.2.1: 1
- FCS_CKM.3: 5
- FCS_CKM.3.1: 2
- FCS_CKM.4: 18
- FCS_CKM.4.1: 2
- FCS_COP: 11
- FCS_COP.1: 17
- FCS_COP.1.1: 2
- FDP:
- FDP_ACC: 31
- FDP_ACC.1: 27
- FDP_ACC.1.1: 1
- FDP_ACC.2: 9
- FDP_ACC.2.2: 1
- FDP_ACF: 11
- FDP_ACF.1: 33
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC: 12
- FDP_IFC.1: 20
- FDP_IFC.1.1: 1
- FDP_IFC.2: 3
- FDP_IFCC: 1
- FDP_IFF: 5
- FDP_IFF.1: 14
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC: 6
- FDP_ITC.1: 8
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 4
- FDP_ITT.1: 1
- FDP_RIP: 10
- FDP_RIP.1: 3
- FDP_RIP.1.1: 1
- FDP_ROL: 8
- FDP_ROL.1: 4
- FDP_ROL.1.1: 1
- FDP_ROL.1.2: 1
- FDP_SDI.1: 2
- FDP_SDI.2: 5
- FDP_SDI.2.2: 2
- FDP_UCT: 1
- FDP_UCT.1: 5
- FDP_UCT.1.1: 2
- FDP_UIT.1: 8
- FDP_UIT.1.1: 2
- FDP_UIT.1.2: 2
- FDP_UTC.1: 1
- FIA:
- FIA_ATD: 5
- FIA_ATD.1: 4
- FIA_ATD.1.1: 1
- FIA_SOS: 1
- FIA_SOS.2: 6
- FIA_SOS.2.1: 2
- FIA_SOS.2.2: 2
- FIA_UAU: 23
- FIA_UAU.1: 4
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.3: 2
- FIA_UAU.3.1: 2
- FIA_UAU.3.2: 2
- FIA_UAU.4: 2
- FIA_UAU.4.1: 1
- FIA_UAU.6: 2
- FIA_UAU.6.1: 1
- FIA_UID: 4
- FIA_UID.1: 21
- FIA_UID.2: 1
- FIA_USB: 4
- FIA_USB.1: 4
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_LIM.1: 2
- FMT_LIM.2: 2
- FMT_MOF.1: 5
- FMT_MSA: 38
- FMT_MSA.1: 13
- FMT_MSA.1.1: 2
- FMT_MSA.2: 1
- FMT_MSA.2.1: 1
- FMT_MSA.3: 17
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MTD: 1
- FMT_MTD.1: 5
- FMT_MTD.1.1: 2
- FMT_SMF: 4
- FMT_SMF.1: 14
- FMT_SMF.1.1: 1
- FMT_SMR: 1
- FMT_SMR.1: 27
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FPR:
- FPR_UNO: 1
- FPR_UNO.1: 8
- FPR_UNO.1.1: 2
- FPT:
- FPT_FLS: 1
- FPT_FLS.1: 9
- FPT_FLS.1.1: 2
- FPT_ITC: 1
- FPT_ITC.1: 4
- FPT_ITC.1.1: 2
- FPT_ITI: 1
- FPT_ITI.1: 8
- FPT_ITI.1.1: 2
- FPT_ITI.1.2: 2
- FPT_ITT.1: 1
- FPT_PHP: 2
- FPT_PHP.1: 2
- FPT_PHP.2: 4
- FPT_PHP.2.2: 2
- FPT_PHP.2.3: 2
- FPT_PHP.3: 11
- FPT_PHP.3.1: 2
- FPT_RCV.4: 7
- FPT_RCV.4.1: 2
- FPT_RPL: 1
- FPT_RPL.1: 5
- FPT_RPL.1.1: 2
- FPT_RPL.1.2: 2
- FPT_STM.1: 5
- FPT_TDC: 3
- FPT_TDC.1: 3
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST: 1
- FPT_TST.1: 7
- FPT_TST.1.1: 2
- FPT_TST.1.2: 2
- FPT_TST.1.3: 2
- FRU:
- FTP:
- FTP_ITC.1: 9
- FTP_TRP.1: 9
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN_CREDENTIALS_SEC: 1
- A.LIMITED_FUNCTIONALITY: 1
- A.NO_THRU_TRAFFIC_PROTE: 1
- A.PHYSICAL_PROTECTION: 1
- A.REGULAR_UPDATES: 1
- A.TRUSTED_ADMINISTRATOR: 1
- OE:
- OE.ADMIN_CREDENTIALS_SECURE: 1
- OE.NO_GENERAL_PURPOSE: 1
- OE.NO_THRU_TRAFFIC_PROTECTION: 1
- OE.PHYSICAL: 1
- OE.TRUSTED_ADMIN: 1
- OE.UPDATES: 1
- T:
- T.PASSWORD_CRACKING: 1
- T.SECURITY_FUNCTIONALITY: 2
- T.UNAUTHORIZED_ADMINIST: 1
- T.UNDETECTED_ACTIVITY: 1
- T.UNTRUSTED_COMMUNICA: 1
- T.UPDATE_COMPROMISE: 1
- T.WEAK_AUTHENTICATION_E: 1
- T.WEAK_CRYPTOGRAPHY: 1
|
- A:
- A.PHYSICAL: 4
- A.PROTECTION_AFTER_TOE_DE: 1
- A.PROTECTION_AFTER_TOE_DELIVERY: 3
- D:
- D.COUNTERS: 6
- D.EM: 13
- D.EP_CODE: 5
- D.EP_IVDATA: 3
- D.EP_IV_DATA: 1
- D.EP_STATE: 5
- D.KEYS: 9
- D.LOG_DATA: 4
- O:
- O.AUTH: 9
- O.CONFID_DATA: 1
- O.CONF_DATA: 8
- O.EM: 6
- O.HW_AES: 1
- O.INTEG_DATA: 6
- O.JAVAOBJECT: 10
- O.MEM_ACCE: 1
- O.OPERATE: 13
- O.RECORD: 5
- O.REPLAY: 7
- O.RND: 1
- O.SFR_ACCES: 1
- O.TAMPER: 11
- OE:
- OE.DEBIT_BEFORE_CREDIT: 3
- OE.PHYSICAL: 3
- OE.PROTECTION_AFTER_TOE_DELIVERY: 3
- OE.PURSE_BEHAVIOR: 3
- OE.SECRET_MNGT: 3
- OP:
- OP.ARRAY_ACCESS: 2
- OP.CREATE: 4
- OP.INSTANCE_FIELD: 1
- OP.INVK_INTERFACE: 4
- OP.INVK_VIRTUAL: 2
- OP.JAVA: 3
- OP.PUT: 3
- OP.THROW: 2
- OP.TYPE_ACCESS: 2
- OSP:
- OSP.DEBIT_BEFORE_CREDIT: 3
- OSP.PURSE_BEHAVIOR: 4
- OSP.SECRET_MNGT: 4
- R:
- T:
- T.COUNTERFEITING: 2
- T.COUNTERFEITING_AUTH: 2
- T.COUNTERFEITING_AUTOLOAD: 6
- T.COUNTERFEITING_CREDIT: 2
- T.COUNTERFEITING_DEBIT: 6
- T.COUNTERFEITING_UPDATE: 4
- T.DISCLOSURE_KEYS: 9
- T.INTEG: 3
- T.INTEG_: 1
- T.INTEG_CODE: 5
- T.INTEG_COUNTERS: 5
- T.INTEG_EM: 5
- T.INTEG_EP_IVDATA: 2
- T.INTEG_EP_STATE: 5
- T.INTEG_IVDATA: 2
- T.INTEG_KEYS: 4
- T.INTEG_LOG_DATA: 4
- T.REPLAY: 2
- T.REPLAY_AUTOLOAD: 4
- T.REPLAY_CREDIT: 3
- T.REPLAY_DEBIT: 4
- T.REPLAY_UPDATE: 3
- T.RND: 1
|
pdf_data/st_keywords/vendor |
|
- Gemalto:
- NXP:
- NXP: 18
- NXP Semiconductors: 2
|
pdf_data/st_keywords/eval_facility |
- UL:
- UL Verification Services: 2
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 10
- AES-: 1
- AES-128: 1
- constructions:
- MAC:
- HMAC: 11
- HMAC-SHA-256: 3
- HMAC-SHA-384: 3
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- MD:
- SHA:
- SHA1:
- SHA2:
- SHA-2: 2
- SHA-224: 1
- SHA-256: 11
- SHA-384: 7
- SHA-512: 1
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IKE:
- IKE: 37
- IKEv1: 51
- IKEv2: 18
- IPsec:
- SSH:
- TLS:
- VPN:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 15
- P-384: 13
- P-521: 8
- curve P-256: 1
- curve P-384: 3
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 4
- Physical tampering: 1
- malfunction: 3
- physical tampering: 13
- SCA:
- Leak-Inherent: 5
- Physical Probing: 2
- physical probing: 4
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- FIPS:
- FIPS 140-2: 10
- FIPS 186-4: 4
- FIPS PUB 186-4: 5
- ISO:
- ISO/IEC 10118: 2
- ISO/IEC 14888-: 1
- ISO/IEC 18031:2011: 3
- ISO/IEC 9796-2: 1
- NIST:
- NIST SP 800-131A: 1
- NIST SP 800-56B: 1
- NIST SP 800-57: 2
- SP 800-131A: 1
- SP 800-56A: 1
- SP 800-56B: 1
- SP 800-90: 2
- PKCS:
- RFC:
- RFC 2409: 1
- RFC 2986: 1
- RFC 3602: 2
- RFC 4109: 1
- RFC 4251: 1
- RFC 4253: 4
- RFC 4301: 4
- RFC 4303: 1
- RFC 4868: 2
- RFC 4945: 1
- RFC 5280: 3
- RFC 5647: 4
- RFC 5759: 1
- RFC 5996: 2
- RFC 6668: 1
- X509:
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- FIPS:
- FIPS PUB 197: 2
- FIPS PUB 46-3: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- indicated as “REQUIRED” but not listed in the later elements of this component are implemented is out of scope of the assurance activity for this requirement. FCS_SSHS_EXT.1.2 The TSF shall ensure that the SSH: 1
- out of scope: 1
|
- OutOfScope:
- Crypto libs) written in native language, • The IC NXP P5CD081 The elements out of scope of the TOE are: • Other application(s: 1
- libraries itself) (Crypto libs) written in native language, • The IC NXP P5CD081 The elements out of scope of the TOE are: • Other application(s) written in java language 2.3.2 Logical scope of the TOE The: 1
- out of scope: 1
|
pdf_data/st_metadata |
- /Author: Bethany Henderson
- /Company: Motorola
- /CreationDate: D:20170324090837-04'00'
- /Creator: Acrobat PDFMaker 11 for Word
- /Date completed: July 28, 2016
- /ModDate: D:20170324090852-04'00'
- /Producer: Adobe PDF Library 11.0
- /Revision: 1.0
- /SourceModified: D:20170323180102
- pdf_file_size_bytes: 907819
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 98
|
- /CreationDate: D:20110629163023+02'00'
- /Keywords:
- /ModDate: D:20110629163023+02'00'
- /Producer: Acrobat Distiller 7.0.5 (Windows)
- pdf_file_size_bytes: 510681
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 103
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |