This page was not yet optimized for use on mobile
devices.
mToken CryptoID
Certificate #4845
Webpage information
Security policy
Symmetric Algorithms
AES, AES-256, AES-128, AES256, AES-, CAST, Triple-DES, TDEA, HMAC, CMACAsymmetric Algorithms
ECDH, ECDSA, DHHash functions
SHA-1, SHA-3Schemes
MAC, Key AgreementProtocols
SSL, VPNRandomness
DRBG, RBGElliptic Curves
P-256, P-521, P-512Block cipher modes
ECB, GCM, CCMTrusted Execution Environments
PSPVendor
MicrosoftSecurity level
Level 3, Level 1Standards
FIPS 140-3, FIPS PUB 140-3, FIPS186-4, FIPS 186-4, FIPS 198-1, FIPS 180-4, FIPS140-3, FIPS PUB 202, SP 800-38A, SP 800-38B, SP 800-38F, SP 800-90A, SP 800-56A, SP 800-90B, PKCS# 11, PKCS 1, PKCS1, ISO/IEC 7816-4, ISO/IEC 19790, ISO/IEC 24759File metadata
| Author | Hawes, David J. (Fed) |
|---|---|
| Creation date | D:20250609095343-04'00' |
| Modification date | D:20250609095343-04'00' |
| Pages | 61 |
| Creator | Microsoft® Word for Microsoft 365 |
| Producer | Microsoft® Word for Microsoft 365 |
Heuristics
No heuristics are available for this certificate.
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 4845,
"dgst": "74f8d4b5c1276fad",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": []
},
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"module_prunned_references": {
"_type": "Set",
"elements": []
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"policy_prunned_references": {
"_type": "Set",
"elements": []
},
"related_cves": null,
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDH": {
"ECDH": 1
},
"ECDSA": {
"ECDSA": 75
}
},
"FF": {
"DH": {
"DH": 1
}
}
},
"certification_process": {},
"cipher_mode": {
"CCM": {
"CCM": 1
},
"ECB": {
"ECB": 2
},
"GCM": {
"GCM": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 1
}
},
"VPN": {
"VPN": 1
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 1
},
"MAC": {
"MAC": 11
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"P-256": 28,
"P-512": 2,
"P-521": 18
}
},
"eval_facility": {},
"fips_cert_id": {},
"fips_certlike": {
"Certlike": {
"- PKCS 1": 2,
"AES 128/192/256": 1,
"AES-128": 3,
"AES-256": 2,
"AES256": 1,
"HMAC-SHA-1": 4,
"PKCS 1": 2,
"PKCS1": 2,
"RSA PKCS1": 2,
"SHA-1": 8,
"SHA-3": 1,
"SHA2- 224": 2,
"SHA2- 256": 2,
"SHA2- 384": 1,
"SHA2- 512": 1,
"SHA2-256": 20,
"SHA2-384": 8,
"SHA2-512": 8
}
},
"fips_security_level": {
"Level": {
"Level 1": 1,
"Level 3": 2
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 8
},
"SHA3": {
"SHA-3": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 22
},
"RNG": {
"RBG": 9
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-3": 6,
"FIPS 180-4": 3,
"FIPS 186-4": 7,
"FIPS 198-1": 3,
"FIPS PUB 140-3": 2,
"FIPS PUB 202": 1,
"FIPS140-3": 1,
"FIPS186-4": 31
},
"ISO": {
"ISO/IEC 19790": 2,
"ISO/IEC 24759": 2,
"ISO/IEC 7816-4": 1
},
"NIST": {
"SP 800-38A": 2,
"SP 800-38B": 1,
"SP 800-38F": 1,
"SP 800-56A": 1,
"SP 800-90A": 3,
"SP 800-90B": 3
},
"PKCS": {
"PKCS 1": 2,
"PKCS# 11": 1,
"PKCS1": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 13,
"AES-": 2,
"AES-128": 3,
"AES-256": 2,
"AES256": 1
},
"CAST": {
"CAST": 34
}
},
"DES": {
"3DES": {
"TDEA": 1,
"Triple-DES": 21
}
},
"constructions": {
"MAC": {
"CMAC": 8,
"HMAC": 15
}
}
},
"tee_name": {
"AMD": {
"PSP": 5
}
},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 4
}
},
"vulnerability": {}
},
"policy_metadata": {
"/Author": "Hawes, David J. (Fed)",
"/CreationDate": "D:20250609095343-04\u002700\u0027",
"/Creator": "Microsoft\u00ae Word for Microsoft 365",
"/MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_ActionId": "2994c836-9a45-4f31-aaff-abcec12da9cb",
"/MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_ContentBits": "1",
"/MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Enabled": "true",
"/MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Method": "Privileged",
"/MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Name": "UNCLASSIFIED",
"/MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_SetDate": "2025-06-09T13:50:09Z",
"/MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_SiteId": "da9cbe40-ec1e-4997-afb3-17d87574571a",
"/ModDate": "D:20250609095343-04\u002700\u0027",
"/Producer": "Microsoft\u00ae Word for Microsoft 365",
"pdf_file_size_bytes": 952125,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 61
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_json_hash": null,
"policy_pdf_hash": "576a43aca7ad304749453c710dc44678d823eb129421dc53a66f662537aa99a0",
"policy_txt_hash": "9ec9b8f1670e56db71e1a35d9a1b15e1843f4e60c2fef5d7a884f3dd66386b73"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "When installed, initialized and configured as specified in Section 11of the Security Policy. When operated in approved mode",
"certificate_pdf_url": null,
"date_sunset": "2029-10-20",
"description": "mToken CryptoID is designed based on a secure smartcard chip that utilizes the in-built mCOS to communicate with Computer device via USB interface in a \"plug and play\" manner. It can realize various Public Key Infrastructure (PKI) applications including digital signature, online authentications, online transactions, software security, etc.",
"embodiment": "Multi-Chip Stand Alone",
"exceptions": [
"Operational environment: N/A",
"Non-invasive security: N/A",
"Mitigation of other attacks: N/A"
],
"fw_versions": null,
"historical_reason": null,
"hw_versions": null,
"level": 3,
"mentioned_certs": {},
"module_name": "mToken CryptoID",
"module_type": "Hardware",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-3",
"status": "active",
"sw_versions": null,
"tested_conf": null,
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2024-10-21",
"lab": "UL Verification Services, Inc.",
"validation_type": "Initial"
}
],
"vendor": "Century Longmai Technology Co. Ltd",
"vendor_url": "http://www.longmai.net/"
}
}