This page was not yet optimized for use on mobile
devices.
BooleBox On Premises V 4.2
CSV information
| Status | archived |
|---|---|
| Valid from | 23.04.2020 |
| Valid until | 23.04.2025 |
| Scheme | 🇮🇹 IT |
| Manufacturer | Boole Server S.r.l. |
| Category | Data Protection |
| Security level | EAL2+, ALC_FLR.2 |
Heuristics summary
Certificate ID: OCSI/CERT/IMQ/06/2018/RC
Certificate
certificate could not be downloaded, no link is available.
Certification report
Extracted keywords
Symmetric Algorithms
AES, AES-256Protocols
TLSVendor
MicrosoftSecurity level
EAL2+, EAL4, EAL2Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_FLR, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Certificates
OCSI/CERT/IMQ/06/2018/RCEvaluation facilities
IMQ/LPSStandards
ISO/IEC 15408, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004File metadata
| Title | Rapporto di Certificazione del prodotto “BooleBox On Premises V Ѐ⸂” |
|---|---|
| Subject | --- |
| Author | OCSI |
| Creation date | D:20200422093535+00'00' |
| Modification date | D:20200423165945+00'00' |
| Pages | 27 |
| Creator | Microsoft Word |
| Producer | Modified using InfoCert Dike |
Security target
Extracted keywords
Symmetric Algorithms
AES256, AES, AES-256Asymmetric Algorithms
RSA 2048Hash functions
SHA-256, SHA256Protocols
TLS 1.2Randomness
RNGVendor
MicrosoftSecurity level
EAL 2, EAL2+, EAL2, EAL 2 augmentedClaims
O.AUDIT, O.AUDIT_PROT, O.USER, O.IDENTIFY, O.ANTI_BRUTE, O.ACCESS, O.MANAGE, O.CONFIDENTIAL, O.CRYPTO, O.INTEGRITY, O.CONFIG, O.OTP, O.STRONG_PERSONALKEY, O.PRIVACY, T.THREAT, T.MASQUERADE, T.INTERCEPT, T.CONFIG, T.PRIVIL, T.INTEGRITY, T.CONFIDENTIALITY, T.SCREEN, T.NOTRACE, T.LOSSOF, T.INTERR, T.EXHAUST, T.KEY_ACCESS, T.KEY_GUESS, T.INSTALL, T.REPLAY, T.PRIVACY, T.CRASH, A.ASSUMPTION, A.TRUST, A.TRAINING, A.DBMS_ACCESS, A.OS_ACCESS, A.STORAGE_ACCESS, A.DOC_ACCESS, A.TIME, A.ALIGNEDBACKUPS, A.SECCOMM, A.TOE_EVALUATED, A.OS_RESTRICT, A.UPDATE, A.CERTIFICATE, OE.IDENTIFY, OE.AUDIT_PROTECT, OE.PHYSICAL_ACCESS, OE.DB, OE.SO, OE.STORAGE, OE.DOC, OE.STAFF, OE.TIME, OE.CRYPTO, OE.ALIGNEDBACKUP, OE.CONTINUITY, OE.AUDIT, OE.LOG_STORE, OE.INTEGRITY, OE.CERTIFICATE, OE.PERSONALKEY, OE.BACKUPSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_SAR.1, FAU_SAR.2, FAU_SAR.3, FAU_GEN, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_SAR.3.1, FDP_ACC.1, FDP_ACF.1, FDP_ITC.1, FDP_ITC.2, FDP_ETC.1, FDP_ETC.2, FDP_IFC.1, FDP_IFF.1, FDP_UCT.1, FDP_UIT.1, FDP_ACC.1.1, FDP_ACF, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC, FDP_IFC.1.1, FDP_IFF, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_ITC.2.1, FDP_ITC.2.2, FDP_ITC.2.3, FDP_ITC.2.4, FDP_ITC.2.5, FDP_ETC.1.1, FDP_ETC.1.2, FDP_ETC.2.1, FDP_ETC.2.2, FDP_ETC.2.3, FDP_ETC.2.4, FDP_UCT.1.1, FDP_UIT.1.1, FDP_UIT.1.2, FIA_XXX.1.1, FIA_XXX.1, FIA_AFL.1, FIA_UID.2, FIA_UAU.2, FIA_UAU.5, FIA_ATD.1, FIA_SOS.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UID.2.1, FIA_UAU.2.1, FIA_UAU.5.1, FIA_UAU.5.2, FIA_ATD.1.1, FIA_SOS.1.1, FIA_UID.1, FIA_UAU.1, FMT_MTD.1, FMT_MOF.1, FMT_MSA.1, FMT_MSA.3, FMT_SMF.1, FMT_SMR.1, FMT_MTD.1.1, FMT_MOF.1.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMF, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPR_UNO.1, FPR_PSE.1, FPR_UNO.1.1, FPR_PSE.1.1, FPR_PSE.1.2, FPR_PSE.1.3, FPT_TDC.1, FPT_TEE.1, FPT_STM.1, FPT_TDC, FPT_TDC.1.1, FPT_TDC.1.2, FPT_TEE, FPT_TEE.1.1, FPT_TEE.1.2, FTP_ITC.1, FTP_TRP.1Certification process
confidential information through e-mail in total security. With BooleBox it is possible to attach confidential documents to e-mails with the assurance that no one can intercept since the email message itself is, activities (through Print Screen system functionalities and video grabbing software) while viewing confidential documents. The Windows OS is indispensable on the END USER side in order to use this security function. [22, and editable only in their BooleBox storage. [25] Watermark With BooleBox users can protect their confidential documents and the intellectual property of their shared files through an indelible watermark displaying key, activities (through Print Screen system functionalities and video grabbing software) while viewing confidential documents. See Table 18: file sharing permissions configurable in a sharing template [142] Guest (G) GuestStandards
FIPS 140-2, ISO/IEC 15408, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004File metadata
| Title | BooleBox on Premises v4.2 Security Target v1.5 |
|---|---|
| Author | Boole Server S.r.l. |
| Creation date | D:20200507102310Z00'00' |
| Modification date | D:20200507102310Z00'00' |
| Pages | 85 |
| Creator | Microsoft® Word 2010 |
| Producer | Mac OS X 10.13.6 Quartz PDFContext |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
OCSI/CERT/IMQ/06/2018/RCExtracted SARs
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ALC_FLR.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Data Protection",
"cert_link": null,
"dgst": "efccd1dfa8e8195d",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "OCSI/CERT/IMQ/06/2018/RC",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL2+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"4.2"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Boole Server S.r.l.",
"manufacturer_web": "https://www.booleserver.com/",
"name": "BooleBox On Premises V 4.2",
"not_valid_after": "2025-04-23",
"not_valid_before": "2020-04-23",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "rc_boolebox_42_v1.0.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"IT": {
"OCSI/CERT/IMQ/06/2018/RC": 27
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.2": 1,
"ADV_TDS.1": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.2": 1,
"ALC_CMS.2": 1,
"ALC_DEL.1": 1,
"ALC_FLR": 1,
"ALC_FLR.2": 7
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 7,
"EAL2+": 1,
"EAL4": 4
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"TLS": {
"TLS": 2
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"IMQLPS": {
"IMQ/LPS": 3
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2012-09-001": 1,
"CCMB-2012-09-002": 1,
"CCMB-2012-09-003": 1,
"CCMB-2012-09-004": 1
},
"ISO": {
"ISO/IEC 15408": 6
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 1,
"AES-256": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 7
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "OCSI",
"/CreationDate": "D:20200422093535+00\u002700\u0027",
"/Creator": "Microsoft Word",
"/ModDate": "D:20200423165945+00\u002700\u0027",
"/Producer": "Modified using InfoCert Dike",
"/Subject": "---",
"/Title": "Rapporto di Certificazione del prodotto \u201cBooleBox On Premises V \u0400\u2e02\u201d",
"pdf_file_size_bytes": 623576,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 27
},
"st_filename": "st_boolebox_42_v1.5.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"RSA": {
"RSA 2048": 2
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.ALIGNEDBACKUPS": 2,
"A.ASSUMPTION": 1,
"A.CERTIFICATE": 3,
"A.DBMS_ACCESS": 3,
"A.DOC_ACCESS": 2,
"A.OS_ACCESS": 2,
"A.OS_RESTRICT": 3,
"A.SECCOMM": 3,
"A.STORAGE_ACCESS": 3,
"A.TIME": 3,
"A.TOE_EVALUATED": 2,
"A.TRAINING": 2,
"A.TRUST": 3,
"A.UPDATE": 2
},
"O": {
"O.ACCESS": 13,
"O.ANTI_BRUTE": 9,
"O.AUDIT": 7,
"O.AUDIT_PROT": 4,
"O.CONFIDENTIAL": 3,
"O.CONFIG": 7,
"O.CRYPTO": 10,
"O.IDENTIFY": 15,
"O.INTEGRITY": 5,
"O.MANAGE": 7,
"O.OTP": 5,
"O.PRIVACY": 4,
"O.STRONG_PERSONALKEY": 6,
"O.USER": 6
},
"OE": {
"OE.ALIGNEDBACKUP": 6,
"OE.AUDIT": 5,
"OE.AUDIT_PROTECT": 1,
"OE.BACKUP": 1,
"OE.CERTIFICATE": 4,
"OE.CONTINUITY": 3,
"OE.CRYPTO": 8,
"OE.DB": 3,
"OE.DOC": 4,
"OE.IDENTIFY": 6,
"OE.INTEGRITY": 4,
"OE.LOG_STORE": 4,
"OE.PERSONALKEY": 4,
"OE.PHYSICAL_ACCESS": 6,
"OE.SO": 8,
"OE.STAFF": 18,
"OE.STORAGE": 3,
"OE.TIME": 8
},
"T": {
"T.CONFIDENTIALITY": 2,
"T.CONFIG": 3,
"T.CRASH": 1,
"T.EXHAUST": 3,
"T.INSTALL": 2,
"T.INTEGRITY": 3,
"T.INTERCEPT": 2,
"T.INTERR": 2,
"T.KEY_ACCESS": 2,
"T.KEY_GUESS": 3,
"T.LOSSOF": 3,
"T.MASQUERADE": 3,
"T.NOTRACE": 2,
"T.PRIVACY": 2,
"T.PRIVIL": 1,
"T.REPLAY": 3,
"T.SCREEN": 3,
"T.THREAT": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.2": 1,
"ADV_TDS.1": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.2": 1,
"ALC_CMS.2": 1,
"ALC_DEL.1": 1,
"ALC_FLR.2": 7
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 2 augmented": 1,
"EAL2": 1,
"EAL2+": 3
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1,
"FAU_GEN.1": 9,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 6,
"FAU_GEN.2.1": 1,
"FAU_SAR.1": 9,
"FAU_SAR.1.1": 2,
"FAU_SAR.1.2": 2,
"FAU_SAR.2": 6,
"FAU_SAR.2.1": 1,
"FAU_SAR.3": 7,
"FAU_SAR.3.1": 1
},
"FDP": {
"FDP_ACC.1": 26,
"FDP_ACC.1.1": 3,
"FDP_ACF": 1,
"FDP_ACF.1": 15,
"FDP_ACF.1.1": 3,
"FDP_ACF.1.2": 3,
"FDP_ACF.1.3": 3,
"FDP_ACF.1.4": 3,
"FDP_ETC.1": 7,
"FDP_ETC.1.1": 1,
"FDP_ETC.1.2": 1,
"FDP_ETC.2": 6,
"FDP_ETC.2.1": 1,
"FDP_ETC.2.2": 1,
"FDP_ETC.2.3": 1,
"FDP_ETC.2.4": 1,
"FDP_IFC": 1,
"FDP_IFC.1": 22,
"FDP_IFC.1.1": 1,
"FDP_IFF": 1,
"FDP_IFF.1": 10,
"FDP_IFF.1.1": 1,
"FDP_IFF.1.2": 1,
"FDP_IFF.1.3": 1,
"FDP_IFF.1.4": 1,
"FDP_IFF.1.5": 1,
"FDP_ITC.1": 7,
"FDP_ITC.1.1": 1,
"FDP_ITC.1.2": 1,
"FDP_ITC.1.3": 1,
"FDP_ITC.2": 7,
"FDP_ITC.2.1": 1,
"FDP_ITC.2.2": 1,
"FDP_ITC.2.3": 1,
"FDP_ITC.2.4": 1,
"FDP_ITC.2.5": 1,
"FDP_UCT.1": 7,
"FDP_UCT.1.1": 1,
"FDP_UIT.1": 5,
"FDP_UIT.1.1": 1,
"FDP_UIT.1.2": 1
},
"FIA": {
"FIA_AFL.1": 6,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD.1": 6,
"FIA_ATD.1.1": 1,
"FIA_SOS.1": 9,
"FIA_SOS.1.1": 1,
"FIA_UAU.1": 1,
"FIA_UAU.2": 8,
"FIA_UAU.2.1": 1,
"FIA_UAU.5": 8,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 1,
"FIA_UID.1": 5,
"FIA_UID.2": 11,
"FIA_UID.2.1": 1,
"FIA_XXX.1": 1,
"FIA_XXX.1.1": 2
},
"FMT": {
"FMT_MOF.1": 8,
"FMT_MOF.1.1": 1,
"FMT_MSA.1": 15,
"FMT_MSA.1.1": 3,
"FMT_MSA.3": 18,
"FMT_MSA.3.1": 3,
"FMT_MSA.3.2": 3,
"FMT_MTD.1": 8,
"FMT_MTD.1.1": 1,
"FMT_SMF": 1,
"FMT_SMF.1": 14,
"FMT_SMF.1.1": 2,
"FMT_SMR.1": 15,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPR": {
"FPR_PSE.1": 7,
"FPR_PSE.1.1": 1,
"FPR_PSE.1.2": 1,
"FPR_PSE.1.3": 1,
"FPR_UNO.1": 7,
"FPR_UNO.1.1": 1
},
"FPT": {
"FPT_STM.1": 2,
"FPT_TDC": 1,
"FPT_TDC.1": 8,
"FPT_TDC.1.1": 1,
"FPT_TDC.1.2": 1,
"FPT_TEE": 2,
"FPT_TEE.1": 7,
"FPT_TEE.1.1": 1,
"FPT_TEE.1.2": 1
},
"FTP": {
"FTP_ITC.1": 3,
"FTP_TRP.1": 3
}
},
"certification_process": {
"ConfidentialDocument": {
"activities (through Print Screen system functionalities and video grabbing software) while viewing confidential documents. See Table 18: file sharing permissions configurable in a sharing template [142] Guest (G) Guest": 1,
"activities (through Print Screen system functionalities and video grabbing software) while viewing confidential documents. The Windows OS is indispensable on the END USER side in order to use this security function. [22": 1,
"and editable only in their BooleBox storage. [25] Watermark With BooleBox users can protect their confidential documents and the intellectual property of their shared files through an indelible watermark displaying key": 1,
"confidential information through e-mail in total security. With BooleBox it is possible to attach confidential documents to e-mails with the assurance that no one can intercept since the email message itself is": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"TLS": {
"TLS 1.2": 2
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-256": 6,
"SHA256": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 2
}
},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 2,
"CCMB-2017-04-003": 2,
"CCMB-2017-04-004": 1
},
"FIPS": {
"FIPS 140-2": 1
},
"ISO": {
"ISO/IEC 15408": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 7,
"AES-256": 10,
"AES256": 2
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 10
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Boole Server S.r.l.",
"/CreationDate": "D:20200507102310Z00\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2010",
"/ModDate": "D:20200507102310Z00\u002700\u0027",
"/Producer": "Mac OS X 10.13.6 Quartz PDFContext",
"/Title": "BooleBox on Premises v4.2 Security Target v1.5",
"pdf_file_size_bytes": 2607031,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.commoncriteriaportal.org/cc"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 85
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/rc_boolebox_42_v1.0.pdf",
"scheme": "IT",
"security_level": {
"_type": "Set",
"elements": [
"ALC_FLR.2",
"EAL2+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_boolebox_42_v1.5.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "75aaaa9d66b5e9abefc94b286e2a858414eb817fde4920472d2a76ecb3a3d8e1",
"txt_hash": "320968aa09258539110d420242bff5a1748a5612efc21da4a97498fbdbd0d61c"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "39ac3dc8a0500d59da4b868d53f58beece26e7f3e74924a6c329f5b931d3300c",
"txt_hash": "919f0742304104c77a0e810770c65aaae8eb53295530ec8c9bb38a7aa3144e3c"
}
},
"status": "archived"
}