This page was not yet optimized for use on mobile
devices.
Code Integrity
Certificate #3195
Webpage information
Security policy
Symmetric Algorithms
AESHash functions
SHA-1, SHA1, SHA-256, SHA-384, SHA-512, SHA-2, SHA2Protocols
SSLBlock cipher modes
CBC, XTSVendor
Qualcomm, Microsoft, Microsoft CorporationStandards
FIPS 140, FIPS 140-2, FIPS 186-4, FIPS 180-4, FIPS 197, SP 800-38E, PKCS#1File metadata
| Creation date | D:20190807110145-04'00' |
|---|---|
| Modification date | D:20190807110145-04'00' |
| Pages | 28 |
References
Outgoing IncomingHeuristics
No heuristics are available for this certificate.
References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 3195,
"dgst": "fdd25b9aeb3d9e62",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": [
"SHS#4633",
"RSA#3080",
"SHS#4010",
"RSA#2673",
"AES#4897",
"RSA#3081",
"RSA#2668",
"RSA#2669",
"SHS#4009",
"RSA#2674",
"RSA#2672",
"SHS#4011",
"RSA#2675"
]
},
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"3197",
"4551",
"3092"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"3194",
"3091",
"3480"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"4289",
"4290",
"3197",
"3092",
"4300",
"4551",
"4275",
"4288"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"3194",
"3091",
"3480",
"3089"
]
}
},
"module_prunned_references": {
"_type": "Set",
"elements": [
"3194",
"3480",
"3091"
]
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"3197",
"4551",
"3092"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"3194",
"3091",
"3480"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"4289",
"2472",
"2484",
"4290",
"3197",
"3092",
"3099",
"4300",
"4551",
"2471",
"4275",
"4288",
"2549"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"3194",
"3091",
"3480",
"3089"
]
}
},
"policy_prunned_references": {
"_type": "Set",
"elements": [
"3194",
"3480",
"3091"
]
},
"related_cves": null,
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 1
},
"XTS": {
"XTS": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 2
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"fips_cert_id": {
"Cert": {
"# 3081": 1,
"# 3194": 1,
"# 4633": 1,
"#2668": 1,
"#2672": 1,
"#2673": 1,
"#2674": 1,
"#2675": 1,
"#3091": 1,
"#3480": 1,
"#4009": 2,
"#4010": 1,
"#4011": 2,
"#4897": 1
}
},
"fips_certlike": {
"Certlike": {
"AES CBC 128 and 256": 1,
"PKCS#1": 9,
"RSA PKCS#1": 5,
"SHA-1": 7,
"SHA-2": 2,
"SHA-256": 12,
"SHA-384": 5,
"SHA-512": 5,
"SHA-512 #2668": 1,
"SHA-512 #4009": 1,
"SHA1": 2,
"SHA2": 1
}
},
"fips_security_level": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 7,
"SHA1": 2
},
"SHA2": {
"SHA-2": 2,
"SHA-256": 12,
"SHA-384": 5,
"SHA-512": 7,
"SHA2": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140": 4,
"FIPS 140-2": 7,
"FIPS 180-4": 5,
"FIPS 186-4": 5,
"FIPS 197": 1
},
"NIST": {
"SP 800-38E": 1
},
"PKCS": {
"PKCS#1": 7
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 4
}
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 79,
"Microsoft Corporation": 3
},
"Qualcomm": {
"Qualcomm": 4
}
},
"vulnerability": {}
},
"policy_metadata": {
"/CreationDate": "D:20190807110145-04\u002700\u0027",
"/ModDate": "D:20190807110145-04\u002700\u0027",
"pdf_file_size_bytes": 1204401,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.microsoft.com/en-us/howtotell/default.aspx",
"http://creativecommons.org/licenses/by-nd-nc/1.0/",
"https://www.microsoft.com/en-us/windows"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 28
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_json_hash": null,
"policy_pdf_hash": "bfd7030199308eafc01d1bb4ac0b72481cb9301174da5fa2c3a68292961bfbd1",
"policy_txt_hash": "a07623f56a4bbbc9120506c47d06a547e4b07e01625d1337d2eecd4c940bd902"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "When operated in FIPS mode with modules Windows OS Loader validated to FIPS 140-2 under Cert. #3194 or Cert. #3480 operating in FIPS mode or Windows Resume validated to FIPS 140-2 under Cert. #3091 operating in FIPS mode",
"certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertOct2018.pdf",
"date_sunset": null,
"description": "Code Integrity (ci.dll) verifies the integrity of executable files, including kernel mode drivers, critical system components, and user mode cryptographic modules as they are loaded into memory from the disk.",
"embodiment": "Multi-Chip Stand Alone",
"exceptions": [
"Physical Security: N/A",
"Design Assurance: Level 2"
],
"fw_versions": null,
"historical_reason": "Moved to historical list due to dependency on certificate #3091",
"hw_versions": null,
"level": 1,
"mentioned_certs": {
"3091": 1,
"3194": 1,
"3480": 1
},
"module_name": "Code Integrity",
"module_type": "Software",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-2",
"status": "historical",
"sw_versions": "10.0.15063.674 [1], 10.0.15254 [2], 10.0.16299 [3] and 10.0.17134 [4]",
"tested_conf": [
"Surface Hub (x64) running on a Microsoft Surface Hub without PAA [1]",
"Windows 10 Education April 2018 Update (x64) running on a Microsoft Surface Laptop without PAA [4]",
"Windows 10 Education Fall Creators Update (x64) running on a Microsoft Surface Pro without PAA [3]",
"Windows 10 Enterprise April 2018 Update (x64) running on a Microsoft Surface Book 2 without PAA [4]",
"Windows 10 Enterprise April 2018 Update (x64) running on a Microsoft Surface Laptop without PAA [4]",
"Windows 10 Enterprise April 2018 Update (x64) running on a Microsoft Surface Pro LTE without PAA [4]",
"Windows 10 Enterprise April 2018 Update (x64) running on a Microsoft Surface Studio 2 with PAA [4]",
"Windows 10 Enterprise April 2018 Update (x64) running on a Microsoft Surface Studio without PAA [4]",
"Windows 10 Enterprise April 2018 Update (x64) running on an HP Pro x2 612 G2 Detachable PC with LTE without PAA [4]",
"Windows 10 Enterprise Fall Creators Update (x64) running on a Microsoft Surface Book 2 without PAA [3]",
"Windows 10 Enterprise Fall Creators Update (x64) running on a Microsoft Surface Book without PAA [3]",
"Windows 10 Enterprise Fall Creators Update (x64) running on a Microsoft Surface Laptop without PAA [3]",
"Windows 10 Enterprise Fall Creators Update (x64) running on a Microsoft Surface Pro 4 without PAA [3]",
"Windows 10 Enterprise Fall Creators Update (x64) running on a Microsoft Surface Pro without PAA [3]",
"Windows 10 Enterprise Fall Creators Update (x64) running on a Microsoft Surface Studio without PAA [3]",
"Windows 10 Enterprise Fall Creators Update (x64) running on an HP Pro x2 612 G2 Detachable PC with LTE without PAA [3]",
"Windows 10 Home April 2018 Update (x86) running on a Dell Inspiron 660s without PAA [4]",
"Windows 10 Home Fall Creators Update (x86) running on a Dell Inspiron 660s without PAA [3]",
"Windows 10 Mobile Fall Creators Update (ARMv7) running on a Microsoft Lumia 650 [2]",
"Windows 10 Mobile Fall Creators Update (ARMv7) running on a Microsoft Lumia 950 [2]",
"Windows 10 Mobile Fall Creators Update (ARMv7) running on a Microsoft Lumia 950 XL [2]",
"Windows 10 Mobile Fall Creators Update (ARMv7) running on an HP Elite x3 [2]",
"Windows 10 Pro April 2018 Update (x64) running on a Dell Latitude 12 Rugged Tablet without PAA [4]",
"Windows 10 Pro April 2018 Update (x64) running on a Dell Latitude 5290 without PAA [4]",
"Windows 10 Pro April 2018 Update (x64) running on a Microsoft Surface Book 2 without PAA [4]",
"Windows 10 Pro April 2018 Update (x64) running on a Microsoft Surface Go without PAA [4]",
"Windows 10 Pro April 2018 Update (x64) running on a Microsoft Surface Laptop 2 with PAA [4]",
"Windows 10 Pro April 2018 Update (x64) running on a Microsoft Surface Laptop without PAA [4]",
"Windows 10 Pro April 2018 Update (x64) running on a Microsoft Surface Pro 6 with PAA [4] (single-user mode)",
"Windows 10 Pro April 2018 Update (x64) running on a Microsoft Surface Pro LTE without PAA [4]",
"Windows 10 Pro April 2018 Update (x64) running on an HP Slimline Desktop with PAA [4]",
"Windows 10 Pro Fall Creators Update (x64) on Hyper-V on Windows Server 2016 running on a Surface Pro 4 without PAA [3]",
"Windows 10 Pro Fall Creators Update (x64) running on a Dell Latitude 5285 without PAA [3]",
"Windows 10 Pro Fall Creators Update (x64) running on a Dell Latitude 5290 without PAA [3]",
"Windows 10 Pro Fall Creators Update (x64) running on a Dell PowerEdge R630 Server without PAA [3]",
"Windows 10 Pro Fall Creators Update (x64) running on a Dell Precision Tower 5810MT without PAA [3]",
"Windows 10 Pro Fall Creators Update (x64) running on a Microsoft Surface 3 with LTE without PAA [3]",
"Windows 10 Pro Fall Creators Update (x64) running on a Microsoft Surface Laptop without PAA [3]",
"Windows 10 Pro Fall Creators Update (x64) running on a Microsoft Surface Pro 3 without PAA [3]",
"Windows 10 Pro Fall Creators Update (x64) running on a Microsoft Surface Pro without PAA [3]",
"Windows 10 Pro Fall Creators Update (x64) running on a Panasonic Toughbook without PAA [3]",
"Windows 10 Pro Fall Creators Update (x64) running on an HP Compaq Pro 6305 without PAA [3]",
"Windows 10 Pro Fall Creators Update (x64) running on an HP Slimline Desktop with PAA [3]",
"Windows 10 S Fall Creators Update (x64) running on a Microsoft Surface Laptop without PAA [3]",
"Windows Server Core (x64) on Hyper-V on Windows Server 2016 running on a Dell PowerEdge R740 Server without PAA [4]",
"Windows Server Datacenter Core (x64) on Hyper-V on Windows Server running on a Dell Precision Tower 5810MT without PAA [3][4]",
"Windows Server Datacenter Core (x64) running on a Dell PowerEdge R630 Server without PAA [3]",
"Windows Server Datacenter Core (x64) running on a Dell PowerEdge R740 Server without PAA [3][4]",
"Windows Server Datacenter Core (x64) running on a Dell Precision Tower 5810MT without PAA [3]",
"Windows Server Standard Core (x64) on Hyper-V on Windows Server running on a Dell Precision Tower 5810MT without PAA [3][4]",
"Windows Server Standard Core (x64) running on a Dell PowerEdge R630 Server without PAA [3]",
"Windows Server Standard Core (x64) running on a Dell PowerEdge R740 Server without PAA [3][4]",
"Windows Server Standard Core (x64) running on a Dell Precision Tower 5810MT without PAA [3]"
],
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2018-10-15",
"lab": "Leidos Accredited Testing \u0026 Evaluation (AT\u0026E) Lab",
"validation_type": "Initial"
},
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2019-07-15",
"lab": "Leidos Accredited Testing \u0026 Evaluation (AT\u0026E) Lab",
"validation_type": "Update"
},
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2019-08-27",
"lab": "Leidos Accredited Testing \u0026 Evaluation (AT\u0026E) Lab",
"validation_type": "Update"
}
],
"vendor": "Microsoft Corporation",
"vendor_url": "http://www.microsoft.com"
}
}