This page was not yet optimized for use on mobile
devices.
iSTAR Edge Door Controller
Certificate #2309
Webpage information
Security policy
Symmetric Algorithms
AES, HMACAsymmetric Algorithms
ECDSA, ECC, Diffie-Hellman, DH, DSAHash functions
SHA-1, SHA-256, SHA-384, SHA-512, MD5Protocols
TLSRandomness
PRNG, DRBG, RNGElliptic Curves
B-571Block cipher modes
CBC, GCMVendor
MicrosoftSecurity level
Level 2, Level 1Standards
FIPS 140-2, SP 800-56A, NIST SP 800-56AFile metadata
| Title | Non-Proprietary Security Policy |
|---|---|
| Subject | iSTAR Edge Door Controllers |
| Author | Paulo Orbegoso |
| Creation date | D:20141103113005-05'00' |
| Modification date | D:20150106091223-05'00' |
| Pages | 24 |
| Creator | Microsoft® Office Word 2007 |
| Producer | Microsoft® Office Word 2007 |
Heuristics
No heuristics are available for this certificate.
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 2309,
"dgst": "e0b08ad65f5b6f6b",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": [
"HMAC#1797",
"DRBG#506",
"SHS#2400",
"ECDSA#506",
"AES#2856",
"CVL#293",
"CVL#292"
]
},
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"6.1"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"module_prunned_references": {
"_type": "Set",
"elements": []
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"policy_prunned_references": {
"_type": "Set",
"elements": []
},
"related_cves": null,
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 28
},
"ECDSA": {
"ECDSA": 15
}
},
"FF": {
"DH": {
"DH": 1,
"Diffie-Hellman": 3
},
"DSA": {
"DSA": 1
}
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 4
},
"GCM": {
"GCM": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"TLS": {
"TLS": 23
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {
"NIST": {
"B-571": 7
}
},
"eval_facility": {},
"fips_cert_id": {
"Cert": {
"#1797": 1,
"#2400": 1,
"#2856": 1,
"#292": 1,
"#293": 1,
"#506": 3
}
},
"fips_certlike": {
"Certlike": {
"#2400 HMAC": 1,
"#2856 SHA": 1,
"#292 CVL": 1,
"#506 CVL": 1,
"AES 12": 1,
"AES3": 1,
"DRBG 17": 1,
"Diffie-Hellman 20": 1,
"HMAC 15": 2,
"HMAC SHA-1": 3,
"HMAC SHA-256": 1,
"HMAC SHA-384": 1,
"HMAC SHA-512": 1,
"SHA 14": 1,
"SHA-1": 4,
"SHA-256": 3,
"SHA-384": 3,
"SHA-512": 1,
"SHA-512 #1797": 1,
"SHA-512 #2400": 1
}
},
"fips_security_level": {
"Level": {
"Level 1": 1,
"Level 2": 4
}
},
"hash_function": {
"MD": {
"MD5": {
"MD5": 1
}
},
"SHA": {
"SHA1": {
"SHA-1": 4
},
"SHA2": {
"SHA-256": 3,
"SHA-384": 3,
"SHA-512": 3
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 17,
"PRNG": 1
},
"RNG": {
"RNG": 4
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-2": 20
},
"NIST": {
"NIST SP 800-56A": 2,
"SP 800-56A": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 7
}
},
"constructions": {
"MAC": {
"HMAC": 11
}
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 2
}
},
"vulnerability": {}
},
"policy_metadata": {
"/Author": "Paulo Orbegoso",
"/CreationDate": "D:20141103113005-05\u002700\u0027",
"/Creator": "Microsoft\u00ae Office Word 2007",
"/ModDate": "D:20150106091223-05\u002700\u0027",
"/Producer": "Microsoft\u00ae Office Word 2007",
"/Subject": "iSTAR Edge Door Controllers",
"/Title": "Non-Proprietary Security Policy",
"pdf_file_size_bytes": 1039156,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm",
"http://www.swhouse.com/",
"http://www.corsec.com/",
"http://csrc.nist.gov/groups/STM/cmvp"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 24
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_json_hash": null,
"policy_pdf_hash": "4d389edd27f39ae428ba2225bd3ccc6cc715866337de5c0339814037a82319f7",
"policy_txt_hash": "0a4a04e586c1e35a0a04ab5487efc67ef69087e72693b046ba80b14835d04749"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "The tamper evident seals installed as indicated in the Security Policy",
"certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertList0049.pdf",
"date_sunset": null,
"description": "The iSTAR Edge door controller is a powerful IP-edge access control device that provides a strong feature set for securing doors. The iSTAR Edge controls up to four doors. The iSTAR Edge records, encrypts, and stores all granted access events as well as alarm events of any unauthorized entry. The iSTAR Edge can be deployed individually or in clusters. The iSTAR Edge features strong 256-bit AES network encryption between the controller and host, and between controllers within a cluster.",
"embodiment": "Multi-Chip Stand Alone",
"exceptions": null,
"fw_versions": "6.1",
"historical_reason": "Moved to historical list due to sunsetting",
"hw_versions": "ESTAR001, ESTAR001-POE1, ESTAR002, ESTAR002-POE1, ESTAR004 with FIPS Tamper Labels: STAR-FIPS-LBLS",
"level": 2,
"mentioned_certs": {},
"module_name": "iSTAR Edge Door Controller",
"module_type": "Hardware",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-2",
"status": "historical",
"sw_versions": null,
"tested_conf": null,
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2015-01-13",
"lab": "CGI Information Systems \u0026 Management Consultants Inc",
"validation_type": "Initial"
}
],
"vendor": "Software House, a brand of Tyco Security Products",
"vendor_url": "http://www.swhouse.com"
}
}