This page was not yet optimized for use on mobile devices.
Protection Profile for Mobile Device Fundamentals, version 3.0
Web information ?
Status: archivedCertification date: 2016-06-10
Archived date: 2017-07-16
Scheme: 🇺🇸
Category: Mobility
Security level: EAL1
Certification report ?
Extracted keywords
Protocols
TLS, DTLS, VPNClaims
O.COMMS, O.STORAGE, O.CONFIG, O.AUTH, O.INTEGRITY, O.PRIVACY, T.EAVESDROP, T.NETWORK, T.PHYSICAL, T.FLAWAPP, T.PERSISTENT, A.CONFIG, A.NOTIFY, A.PRECAUTION, OE.CONFIG, OE.NOTIFY, OE.PRECAUTIONSecurity Assurance Requirements (SAR)
ADV_FSP.1, AGD_OPE, AGD_PRE, ALC_CMC, ALC_CMS, ATE_IND, AVA_VAN, APE_REQ, APE_CCL.1, APE_ECD.1, APE_INT.1, APE_OBJ.2, APE_REQ.1, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSSSecurity Functional Requirements (SFR)
FAU_GEN, FAU_STG, FAU_SAR, FAU_SEL, FCS_CKM.1, FCS_CKM.2, FCS_CKM_EXT, FCS_COP.1, FCS_RBG_EXT, FCS_SRV_EXT, FCS_STG_EXT, FCS_TLSC_EXT, FCS_CKM_EXT.1, FCS_DTLS_EXT, FCS_TLSC_EXT.1, FCS_RBG_EXT.1, FCS_SRV_EXT.1, FDP_ACF_EXT, FDP_DAR_EXT, FDP_IFC_EXT, FDP_STG_EXT, FDP_UPC_EXT, FDP_ACF_EXT.1, FDP_BCK_EXT.1, FDP_PBA_EXT.1, FDP_BLT_EXT, FIA_AFL_EXT, FIA_BLT_EXT, FIA_PMG_EXT, FIA_TRT_EXT, FIA_UAU, FIA_UAU.6, FIA_UAU_EXT, FIA_BMG_EXT, FIA_BLT_EXT.1, FMT_MOF_EXT, FMT_SMF_EXT, FPT_AEX_EXT, FPT_JTA_EXT, FPT_KST_EXT, FPT_NOT_EXT, FPT_STM, FPT_TST_EXT, FPT_TUD_EXT, FPT_TST_EXT.2, FPT_TUD_EXT.2, FPT_AEX_EXT.1, FPT_AEX_EXT.2, FPT_AEX_EXT.3, FPT_BBD_EXT, FPT_BLT_EXT, FPT_NOT_EXT.1, FTA_SSL_EXT, FTA_TAB, FTP_ITC_EXT, FTP_BLT_EXTEvaluation facilities
Gossamer SecurityFile metadata
Author | McGeady, Megan [USA] |
---|---|
Creation date | D:20170606102913-04'00' |
Modification date | D:20170606102920-04'00' |
Pages | 17 |
Creator | Acrobat PDFMaker 11 for Word |
Producer | Adobe PDF Library 11.0 |
Profile ?
Extracted keywords
Symmetric Algorithms
AES, AES-128, AES-256, AES-, HMAC, HMAC-SHA-384, HMAC-SHA-512, HMAC-SHA-256, CMACAsymmetric Algorithms
ECDH, ECDHE, ECDSA, ECC, DH, DHE, Diffie-Hellman, DSAHash functions
SHA-1, SHA-256, SHA-384, SHA-512, SHA-224, SHA256, SHA384, SHA512, SHA-2, PBKDFSchemes
MAC, Key Exchange, Key Agreement, AEADProtocols
SSH, TLS, TLS 1.2, DTLS, DTLS 1.2, IKE, IPsec, VPNRandomness
DRBG, RNG, RBGElliptic Curves
P-384, P-256, P-521, P-192, secp256r1, secp384r1, secp521r1, Curve25519Block cipher modes
ECB, CBC, CTR, CFB, OFB, GCM, CCM, XEX, XTSTLS cipher suites
TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_NULL_WITH_NULL_NULLVendor
Samsung, Microsoft CorporationClaims
O.COMMS, O.STORAGE, O.CONFIG, O.AUTH, O.INTEGRITY, O.PRIVACY, T.EAVESDROP, T.NETWORK, T.PHYSICAL, T.FLAWAPP, T.PERSISTENT, A.CONFIG, A.NOTIFY, A.PRECAUTION, OE.CONFIG, OE.NOTIFY, OE.PRECAUTIONSecurity Assurance Requirements (SAR)
ADV_FSP, ADV_FSP.1, AGD_OPE, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_CMC, ALC_CMS, ALC_TSU_EXT, ALC_CMC.1, ALC_CMS.1, ALC_TSU_EXT.1, ALC_TSU_EXT.2, ATE_IND, ATE_IND.1, AVA_VAN, AVA_VAN.1, APE_CCL.1, APE_ECD.1, APE_INT.1, APE_OBJ.2, APE_REQ.1, APE_SPD.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.1, ASE_REQ.1, ASE_SPD.1, ASE_TSS.1, ASE_OBJ.2, ASE_REQ.2Security Functional Requirements (SFR)
FAU_GEN.1, FAU_STG.1, FAU_STG.4, FAU_GEN, FAU_STG, FAU_SAR, FAU_SEL, FAU_SAR.1, FAU_SEL.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.4.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SEL.1.1, FCS_TLS_EXT.1, FCS_TLS_EXT.2, FCS_CKM, FCS_COP, FCS_RBG, FCS_SRV, FCS_STG, FCS_TLSC, FCS_DTLS, FCS_CKM.1, FCS_CKM.2, FCS_CKM_EXT.7, FCS_COP.1, FCS_DTLS_EXT.1, FCS_RBG_EXT.1, FCS_RBG_EXT.2, FCS_SRV_EXT.1, FCS_TLSC_EXT.1, FCS_CKM_EXT.1, FCS_CKM_EXT.2, FCS_CKM_EXT.3, FCS_CKM_EXT.4, FCS_CKM_EXT.5, FCS_CKM_EXT.6, FCS_STG_EXT.1, FCS_STG_EXT.2, FCS_STG_EXT.3, FCS_CKM.1.1, FCS_CKM.2.1, FCS_CKM_EXT.1.1, FCS_CKM_EXT.1.2, FCS_CKM_EXT.1.3, FCS_CKM_EXT.1.4, FCS_CKM_EXT.3.2, FCS_RBG_EXT.1.1, FCS_RBG_EXT.1.2, FCS_CKM_EXT.2.1, FCS_CKM_EXT.3.1, FCS_CKM_EXT.4.1, FCS_CKM_EXT.4.2, FCS_CKM_EXT.5.1, FCS_CKM_EXT.5.2, FCS_CKM_EXT.6.1, FCS_COP.1.1, FCS_RBG_EXT.1.3, FCS_SRV_EXT.1.1, FCS_STG_EXT.1.1, FCS_STG_EXT.1.2, FCS_STG_EXT.1.3, FCS_STG_EXT.1.4, FCS_STG_EXT.1.5, FCS_STG_EXT.2.1, FCS_STG_EXT.2.2, FCS_STG_EXT.3.1, FCS_STG_EXT.3.2, FCS_TLSC_EXT.1.1, FCS_TLSC_EXT.1.5, FCS_TLSC_EXT.1.2, FCS_TLSC_EXT.1.3, FCS_TLSC_EXT.1.4, FCS_SRV_EXT.1.2, FCS_RBG_EXT, FCS_DTLS_EXT.1.1, FCS_DTLS_EXT.1.2, FCS_DTLS_EXT.1.3, FCS_CKM_EXT.7.1, FCS_RBG_EXT.1.4, FCS_RBG_EXT.2.1, FCS_TLSC_EXT.1.6, FCS_TLSC_EXT.1.7, FCS_TLSC_EXT.1.8, FDP_ACF_EXT.1.2, FDP_IFC_EXT.1, FDP_UPC_EXT.1, FDP_DAR_EXT.2, FDP_ACF, FDP_DAR, FDP_IFC, FDP_STG, FDP_UPC, FDP_BCK, FDP_PBA, FDP_BLT, FDP_BLT_EXT.1, FDP_STG_EXT.1, FDP_DAR_EXT.1, FDP_PBA_EXT.1, FDP_ACF_EXT.1, FDP_BCK_EXT.1, FDP_DAR_EXT.2.2, FDP_ACF_EXT.1.1, FDP_ACF_EXT.1.4, FDP_DAR_EXT.1.1, FDP_DAR_EXT.1.2, FDP_DAR_EXT.2.1, FDP_DAR_EXT.2.3, FDP_DAR_EXT.2.4, FDP_IFC_EXT.1.1, FDP_IFC_EXT, FDP_STG_EXT.1.1, FDP_UPC_EXT.1.1, FDP_UPC_EXT.1.2, FDP_PBA_EXT.1.1, FDP_ITC_EXT.1, FDP_IFC.1.1, FDP_BCK_EXT.1.1, FDP_ACF_EXT.1.3, FDP_BLT_EXT.1.1, FIA_BLT_EXT.3, FIA_AFL, FIA_BLT, FIA_PMG, FIA_TRT, FIA_UAU, FIA_BMG, FIA_BLT_EXT.1, FIA_BLT_EXT.2, FIA_BLT_EXT.4, FIA_BLT_EXT.5, FIA_UAU_EXT.1, FIA_AFL_EXT.1, FIA_BMG_EXT.1, FIA_BMG_EXT.2, FIA_BMG_EXT.3, FIA_BMG_EXT.4, FIA_BMG_EXT.5, FIA_BMG_EXT.6, FIA_PMG_EXT.1, FIA_TRT_EXT.1, FIA_UAU_EXT.2, FIA_UAU_EXT.4, FIA_UAU.5, FIA_UAU.6, FIA_UAU.7, FIA_UAU.5.1, FIA_AFL_EXT.1.1, FIA_AFL_EXT.1.2, FIA_AFL_EXT.1.3, FIA_AFL_EXT.1.4, FIA_AFL_EXT.1.5, FIA_AFL_EXT.1.6, FIA_BLT_EXT.1.1, FIA_BLT_EXT.2.1, FIA_BLT_EXT.3.1, FIA_BLT_EXT.4.1, FIA_PMG_EXT.1.1, FIA_TRT_EXT.1.1, FIA_UAU.6.1, FIA_UAU.7.1, FIA_UAU_EXT.1.1, FIA_UAU_EXT.2.1, FIA_UAU_EXT.2.2, FIA_AFL.1, FIA_UAU_EXT.4.1, FIA_UAU_EXT.4.2, FIA_BMG_EXT.1.1, FIA_BMG_EXT.1.2, FIA_BLT_EXT.1.2, FIA_BLT_EXT.5.1, FIA_BLT_EXT.5.2, FIA_BMG_EXT.2.1, FIA_BMG_EXT.3.1, FIA_BMG_EXT.4.1, FIA_BMG_EXT.5.1, FIA_BMG_EXT.6.1, FMT_MOF, FMT_SMF, FMT_MOF_EXT.1, FMT_SMF_EXT.1, FMT_SMF_EXT.2, FMT_SMF_EXT.3, FMT_MOF_EXT.1.2, FMT_MOF_EXT.1.1, FMT_SMF_EXT.1.1, FMT_SMF_EXT.2.1, FMT_SMF_EXT, FMT_SMF_EXT.3.1, FPT_NOT_EXT.1, FPT_JTA, FPT_AEX, FPT_KST, FPT_NOT, FPT_STM, FPT_TST, FPT_TUD, FPT_BBD, FPT_BLT, FPT_BLT_EXT.1, FPT_KST_EXT.1, FPT_KST_EXT.2, FPT_KST_EXT.3, FPT_JTA_EXT.1, FPT_AEX_EXT.1, FPT_AEX_EXT.2, FPT_AEX_EXT.3, FPT_AEX_EXT.4, FPT_BBD_EXT.1, FPT_STM.1, FPT_TST_EXT.1, FPT_TST_EXT.2, FPT_TUD_EXT.1, FPT_TUD_EXT.2, FPT_TST_EXT.1.1, FPT_TUD_EXT.2.3, FPT_TUD_EXT.2.5, FPT_TUD_EXT.1.1, FPT_TUD_EXT.1.2, FPT_TUD_EXT.1.3, FPT_NOT_EXT.1.2, FPT_AEX_EXT.1.1, FPT_AEX_EXT.1.2, FPT_AEX_EXT.2.1, FPT_AEX_EXT.3.1, FPT_AEX_EXT.4.1, FPT_AEX_EXT.4.2, FPT_JTA_EXT.1.1, FPT_KST_EXT.1.1, FPT_KST_EXT.2.1, FPT_KST_EXT.3.1, FPT_NOT_EXT.1.1, FPT_STM.1.1, FPT_TST_EXT.2.1, FPT_TUD_EXT.2.1, FPT_TUD_EXT.2.2, FPT_TUD_EXT.2.6, FPT_TUD_EXT.2.4, FPT_TST_EXT.2.2, FPT_AEX_EXT.1.3, FPT_AEX_EXT.1.4, FPT_AEX_EXT.2.2, FPT_AEX_EXT.3.2, FPT_BBD_EXT.1.1, FPT_BLT_EXT.1.1, FPT_NOT_EXT.1.3, FPT_TUD_EXT.2.7, FTA_SSL, FTA_TAB, FTA_TAB.1, FTA_SSL_EXT.1, FTA_SSL_EXT.1.1, FTA_SSL_EXT.1.2, FTA_SSL_EXT.1.3, FTA_TAB.1.1, FTP_ITC_EXT.1, FTP_ITC, FTP_BLT, FTP_BLT_EXT.1, FTP_BLT_EXT.2, FTP_ITC_EXT, FTP_ITC_EXT.1.1, FTP_ITC_EXT.1.2, FTP_ITC_EXT.1.3, FTP_BLT_EXT.1.1, FTP_BLT_EXT.2.1Evaluation facilities
EWA-Canada, Gossamer SecuritySide-channel analysis
malfunctionCertification process
out of scope, access to its storage media. Note: Defending against device re-use after physical compromise is out of scope for this protection profile. T.FLAWAPP Malicious or Flawed Application 3.1.4 Applications loadedStandards
FIPS PUB 186-4, FIPS 186-4, FIPS PUB 197, NIST SP 800-56B, SP 800-56B, SP 800-56A, SP 800-108, NIST SP 800-38A, NIST SP 800-38C, NIST SP 800-38F, NIST SP 800-38D, NIST SP 800-38E, SP 800-38C, NIST SP 800-131A, SP 800-131A, NIST SP 800-132, NIST SP 800-57, SP 800-90A, NIST SP 800-57A, NIST SP 800-56A, SP 800-38A, SP 800-38E, SP 800-38B, SP 800-38F, SP 800-38D, RFC 7748, RFC 2818, RFC 5280, RFC 5246, RFC 4492, RFC 5288, RFC 5289, RFC 6460, RFC 6125, RFC 2560, RFC 5759, RFC 6347, RFC 5746, RFC 2986, RFC 7030, X.509, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004File metadata
Author | Gonski, Lauren W |
---|---|
Creation date | D:20160628090957-04'00' |
Modification date | D:20160628091024-04'00' |
Pages | 209 |
Creator | Acrobat PDFMaker 11 for Word |
Producer | Adobe PDF Library 11.0 |
References ?
- Apple iOS 10.2 on iPhone & iPad Devices archived
- LG Electronics, Inc. G6 Smartphone archived
- Samsung Galaxy Devices with Android 7 archived
Updates ?
-
04.02.2025 The protection profile was first processed.
New Protection Profile
A new Protection Profile with the name Protection Profile for Mobile Device Fundamentals, version 3.0 was processed.
Raw data
{
"_id": "14a859ad7daf14a4",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "14a859ad7daf14a4",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "pp_md_v3.0.pdf",
"pp_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 14
},
"ECDH": {
"ECDH": 8,
"ECDHE": 4
},
"ECDSA": {
"ECDSA": 10
}
},
"FF": {
"DH": {
"DH": 2,
"DHE": 2,
"Diffie-Hellman": 1
},
"DSA": {
"DSA": 2
}
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.CONFIG": 2,
"A.NOTIFY": 2,
"A.PRECAUTION": 2
},
"O": {
"O.AUTH": 7,
"O.COMMS": 6,
"O.CONFIG": 6,
"O.INTEGRITY": 5,
"O.PRIVACY": 4,
"O.STORAGE": 4
},
"OE": {
"OE.CONFIG": 2,
"OE.NOTIFY": 2,
"OE.PRECAUTION": 2
},
"T": {
"T.EAVESDROP": 5,
"T.FLAWAPP": 6,
"T.NETWORK": 5,
"T.PERSISTENT": 6,
"T.PHYSICAL": 6
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP": 2,
"ADV_FSP.1": 10
},
"AGD": {
"AGD_OPE": 4,
"AGD_OPE.1": 11,
"AGD_PRE": 3,
"AGD_PRE.1": 6
},
"ALC": {
"ALC_CMC": 2,
"ALC_CMC.1": 6,
"ALC_CMS": 2,
"ALC_CMS.1": 5,
"ALC_TSU_EXT": 3,
"ALC_TSU_EXT.1": 5,
"ALC_TSU_EXT.2": 1
},
"APE": {
"APE_CCL.1": 1,
"APE_ECD.1": 1,
"APE_INT.1": 1,
"APE_OBJ.2": 1,
"APE_REQ.1": 1,
"APE_SPD.1": 1
},
"ASE": {
"ASE_CCL.1": 2,
"ASE_ECD.1": 2,
"ASE_INT.1": 2,
"ASE_OBJ.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.1": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 2,
"ASE_TSS.1": 2
},
"ATE": {
"ATE_IND": 6,
"ATE_IND.1": 5
},
"AVA": {
"AVA_VAN": 3,
"AVA_VAN.1": 6
}
},
"cc_security_level": {},
"cc_sfr": {
"FAU": {
"FAU_GEN": 2,
"FAU_GEN.1": 5,
"FAU_GEN.1.1": 4,
"FAU_GEN.1.2": 2,
"FAU_SAR": 2,
"FAU_SAR.1": 3,
"FAU_SAR.1.1": 2,
"FAU_SAR.1.2": 2,
"FAU_SEL": 2,
"FAU_SEL.1": 5,
"FAU_SEL.1.1": 2,
"FAU_STG": 2,
"FAU_STG.1": 4,
"FAU_STG.1.1": 1,
"FAU_STG.1.2": 1,
"FAU_STG.4": 4,
"FAU_STG.4.1": 1
},
"FCS": {
"FCS_CKM": 5,
"FCS_CKM.1": 12,
"FCS_CKM.1.1": 12,
"FCS_CKM.2": 8,
"FCS_CKM.2.1": 6,
"FCS_CKM_EXT.1": 4,
"FCS_CKM_EXT.1.1": 6,
"FCS_CKM_EXT.1.2": 1,
"FCS_CKM_EXT.1.3": 1,
"FCS_CKM_EXT.1.4": 5,
"FCS_CKM_EXT.2": 5,
"FCS_CKM_EXT.2.1": 2,
"FCS_CKM_EXT.3": 10,
"FCS_CKM_EXT.3.1": 2,
"FCS_CKM_EXT.3.2": 3,
"FCS_CKM_EXT.4": 5,
"FCS_CKM_EXT.4.1": 3,
"FCS_CKM_EXT.4.2": 1,
"FCS_CKM_EXT.5": 6,
"FCS_CKM_EXT.5.1": 2,
"FCS_CKM_EXT.5.2": 1,
"FCS_CKM_EXT.6": 3,
"FCS_CKM_EXT.6.1": 1,
"FCS_CKM_EXT.7": 3,
"FCS_CKM_EXT.7.1": 1,
"FCS_COP": 3,
"FCS_COP.1": 27,
"FCS_COP.1.1": 16,
"FCS_DTLS": 2,
"FCS_DTLS_EXT.1": 3,
"FCS_DTLS_EXT.1.1": 1,
"FCS_DTLS_EXT.1.2": 1,
"FCS_DTLS_EXT.1.3": 1,
"FCS_RBG": 4,
"FCS_RBG_EXT": 1,
"FCS_RBG_EXT.1": 22,
"FCS_RBG_EXT.1.1": 2,
"FCS_RBG_EXT.1.2": 4,
"FCS_RBG_EXT.1.3": 2,
"FCS_RBG_EXT.1.4": 1,
"FCS_RBG_EXT.2": 3,
"FCS_RBG_EXT.2.1": 1,
"FCS_SRV": 4,
"FCS_SRV_EXT.1": 4,
"FCS_SRV_EXT.1.1": 1,
"FCS_SRV_EXT.1.2": 3,
"FCS_STG": 2,
"FCS_STG_EXT.1": 8,
"FCS_STG_EXT.1.1": 4,
"FCS_STG_EXT.1.2": 1,
"FCS_STG_EXT.1.3": 1,
"FCS_STG_EXT.1.4": 4,
"FCS_STG_EXT.1.5": 2,
"FCS_STG_EXT.2": 15,
"FCS_STG_EXT.2.1": 4,
"FCS_STG_EXT.2.2": 1,
"FCS_STG_EXT.3": 5,
"FCS_STG_EXT.3.1": 1,
"FCS_STG_EXT.3.2": 1,
"FCS_TLSC": 6,
"FCS_TLSC_EXT.1": 12,
"FCS_TLSC_EXT.1.1": 2,
"FCS_TLSC_EXT.1.2": 1,
"FCS_TLSC_EXT.1.3": 1,
"FCS_TLSC_EXT.1.4": 1,
"FCS_TLSC_EXT.1.5": 4,
"FCS_TLSC_EXT.1.6": 1,
"FCS_TLSC_EXT.1.7": 1,
"FCS_TLSC_EXT.1.8": 1,
"FCS_TLS_EXT.1": 2,
"FCS_TLS_EXT.2": 1
},
"FDP": {
"FDP_ACF": 6,
"FDP_ACF_EXT.1": 7,
"FDP_ACF_EXT.1.1": 1,
"FDP_ACF_EXT.1.2": 6,
"FDP_ACF_EXT.1.3": 1,
"FDP_ACF_EXT.1.4": 8,
"FDP_BCK": 2,
"FDP_BCK_EXT.1": 3,
"FDP_BCK_EXT.1.1": 2,
"FDP_BLT": 2,
"FDP_BLT_EXT.1": 3,
"FDP_BLT_EXT.1.1": 1,
"FDP_DAR": 2,
"FDP_DAR_EXT.1": 5,
"FDP_DAR_EXT.1.1": 1,
"FDP_DAR_EXT.1.2": 3,
"FDP_DAR_EXT.2": 7,
"FDP_DAR_EXT.2.1": 1,
"FDP_DAR_EXT.2.2": 2,
"FDP_DAR_EXT.2.3": 1,
"FDP_DAR_EXT.2.4": 1,
"FDP_IFC": 2,
"FDP_IFC.1.1": 1,
"FDP_IFC_EXT": 1,
"FDP_IFC_EXT.1": 7,
"FDP_IFC_EXT.1.1": 2,
"FDP_ITC_EXT.1": 1,
"FDP_PBA": 2,
"FDP_PBA_EXT.1": 4,
"FDP_PBA_EXT.1.1": 3,
"FDP_STG": 2,
"FDP_STG_EXT.1": 4,
"FDP_STG_EXT.1.1": 1,
"FDP_UPC": 2,
"FDP_UPC_EXT.1": 6,
"FDP_UPC_EXT.1.1": 1,
"FDP_UPC_EXT.1.2": 1
},
"FIA": {
"FIA_AFL": 2,
"FIA_AFL.1": 1,
"FIA_AFL_EXT.1": 4,
"FIA_AFL_EXT.1.1": 2,
"FIA_AFL_EXT.1.2": 2,
"FIA_AFL_EXT.1.3": 2,
"FIA_AFL_EXT.1.4": 1,
"FIA_AFL_EXT.1.5": 1,
"FIA_AFL_EXT.1.6": 1,
"FIA_BLT": 4,
"FIA_BLT_EXT.1": 5,
"FIA_BLT_EXT.1.1": 1,
"FIA_BLT_EXT.1.2": 2,
"FIA_BLT_EXT.2": 4,
"FIA_BLT_EXT.2.1": 1,
"FIA_BLT_EXT.3": 5,
"FIA_BLT_EXT.3.1": 1,
"FIA_BLT_EXT.4": 3,
"FIA_BLT_EXT.4.1": 1,
"FIA_BLT_EXT.5": 3,
"FIA_BLT_EXT.5.1": 1,
"FIA_BLT_EXT.5.2": 1,
"FIA_BMG": 4,
"FIA_BMG_EXT.1": 5,
"FIA_BMG_EXT.1.1": 4,
"FIA_BMG_EXT.1.2": 2,
"FIA_BMG_EXT.2": 3,
"FIA_BMG_EXT.2.1": 1,
"FIA_BMG_EXT.3": 3,
"FIA_BMG_EXT.3.1": 1,
"FIA_BMG_EXT.4": 3,
"FIA_BMG_EXT.4.1": 1,
"FIA_BMG_EXT.5": 3,
"FIA_BMG_EXT.5.1": 1,
"FIA_BMG_EXT.6": 3,
"FIA_BMG_EXT.6.1": 1,
"FIA_PMG": 2,
"FIA_PMG_EXT.1": 5,
"FIA_PMG_EXT.1.1": 1,
"FIA_TRT": 2,
"FIA_TRT_EXT.1": 5,
"FIA_TRT_EXT.1.1": 1,
"FIA_UAU": 4,
"FIA_UAU.5": 5,
"FIA_UAU.5.1": 32,
"FIA_UAU.6": 4,
"FIA_UAU.6.1": 2,
"FIA_UAU.7": 4,
"FIA_UAU.7.1": 1,
"FIA_UAU_EXT.1": 5,
"FIA_UAU_EXT.1.1": 1,
"FIA_UAU_EXT.2": 6,
"FIA_UAU_EXT.2.1": 1,
"FIA_UAU_EXT.2.2": 1,
"FIA_UAU_EXT.4": 3,
"FIA_UAU_EXT.4.1": 4,
"FIA_UAU_EXT.4.2": 1
},
"FMT": {
"FMT_MOF": 2,
"FMT_MOF_EXT.1": 4,
"FMT_MOF_EXT.1.1": 11,
"FMT_MOF_EXT.1.2": 21,
"FMT_SMF": 4,
"FMT_SMF_EXT": 1,
"FMT_SMF_EXT.1": 24,
"FMT_SMF_EXT.1.1": 26,
"FMT_SMF_EXT.2": 3,
"FMT_SMF_EXT.2.1": 6,
"FMT_SMF_EXT.3": 3,
"FMT_SMF_EXT.3.1": 1
},
"FPT": {
"FPT_AEX": 4,
"FPT_AEX_EXT.1": 4,
"FPT_AEX_EXT.1.1": 1,
"FPT_AEX_EXT.1.2": 1,
"FPT_AEX_EXT.1.3": 2,
"FPT_AEX_EXT.1.4": 2,
"FPT_AEX_EXT.2": 4,
"FPT_AEX_EXT.2.1": 1,
"FPT_AEX_EXT.2.2": 1,
"FPT_AEX_EXT.3": 4,
"FPT_AEX_EXT.3.1": 1,
"FPT_AEX_EXT.3.2": 2,
"FPT_AEX_EXT.4": 3,
"FPT_AEX_EXT.4.1": 1,
"FPT_AEX_EXT.4.2": 1,
"FPT_BBD": 2,
"FPT_BBD_EXT.1": 3,
"FPT_BBD_EXT.1.1": 3,
"FPT_BLT": 2,
"FPT_BLT_EXT.1": 3,
"FPT_BLT_EXT.1.1": 1,
"FPT_JTA": 3,
"FPT_JTA_EXT.1": 3,
"FPT_JTA_EXT.1.1": 1,
"FPT_KST": 2,
"FPT_KST_EXT.1": 4,
"FPT_KST_EXT.1.1": 1,
"FPT_KST_EXT.2": 3,
"FPT_KST_EXT.2.1": 1,
"FPT_KST_EXT.3": 3,
"FPT_KST_EXT.3.1": 1,
"FPT_NOT": 4,
"FPT_NOT_EXT.1": 6,
"FPT_NOT_EXT.1.1": 1,
"FPT_NOT_EXT.1.2": 2,
"FPT_NOT_EXT.1.3": 1,
"FPT_STM": 2,
"FPT_STM.1": 3,
"FPT_STM.1.1": 1,
"FPT_TST": 4,
"FPT_TST_EXT.1": 4,
"FPT_TST_EXT.1.1": 2,
"FPT_TST_EXT.2": 9,
"FPT_TST_EXT.2.1": 4,
"FPT_TST_EXT.2.2": 2,
"FPT_TUD": 6,
"FPT_TUD_EXT.1": 3,
"FPT_TUD_EXT.1.1": 2,
"FPT_TUD_EXT.1.2": 2,
"FPT_TUD_EXT.1.3": 2,
"FPT_TUD_EXT.2": 7,
"FPT_TUD_EXT.2.1": 1,
"FPT_TUD_EXT.2.2": 1,
"FPT_TUD_EXT.2.3": 5,
"FPT_TUD_EXT.2.4": 1,
"FPT_TUD_EXT.2.5": 9,
"FPT_TUD_EXT.2.6": 3,
"FPT_TUD_EXT.2.7": 1
},
"FTA": {
"FTA_SSL": 2,
"FTA_SSL_EXT.1": 5,
"FTA_SSL_EXT.1.1": 1,
"FTA_SSL_EXT.1.2": 1,
"FTA_SSL_EXT.1.3": 1,
"FTA_TAB": 2,
"FTA_TAB.1": 5,
"FTA_TAB.1.1": 3
},
"FTP": {
"FTP_BLT": 2,
"FTP_BLT_EXT.1": 3,
"FTP_BLT_EXT.1.1": 1,
"FTP_BLT_EXT.2": 2,
"FTP_BLT_EXT.2.1": 2,
"FTP_ITC": 2,
"FTP_ITC_EXT": 4,
"FTP_ITC_EXT.1": 10,
"FTP_ITC_EXT.1.1": 2,
"FTP_ITC_EXT.1.2": 1,
"FTP_ITC_EXT.1.3": 1
}
},
"certification_process": {
"OutOfScope": {
"access to its storage media. Note: Defending against device re-use after physical compromise is out of scope for this protection profile. T.FLAWAPP Malicious or Flawed Application 3.1.4 Applications loaded": 1,
"out of scope": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 5
},
"CCM": {
"CCM": 7
},
"CFB": {
"CFB": 1
},
"CTR": {
"CTR": 1
},
"ECB": {
"ECB": 1
},
"GCM": {
"GCM": 7
},
"OFB": {
"OFB": 1
},
"XEX": {
"XEX": 2
},
"XTS": {
"XTS": 3
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IKE": {
"IKE": 1
},
"IPsec": {
"IPsec": 35
},
"SSH": {
"SSH": 2
},
"TLS": {
"DTLS": {
"DTLS": 14,
"DTLS 1.2": 3
},
"TLS": {
"TLS": 52,
"TLS 1.2": 3
}
},
"VPN": {
"VPN": 75
}
},
"crypto_scheme": {
"AEAD": {
"AEAD": 1
},
"KA": {
"Key Agreement": 3
},
"KEX": {
"Key Exchange": 4
},
"MAC": {
"MAC": 8
}
},
"device_model": {},
"ecc_curve": {
"Curve": {
"Curve25519": 3
},
"NIST": {
"P-192": 2,
"P-256": 16,
"P-384": 12,
"P-521": 12,
"secp256r1": 1,
"secp384r1": 2,
"secp521r1": 1
}
},
"eval_facility": {
"EWA": {
"EWA-Canada": 1
},
"Gossamer": {
"Gossamer Security": 1
}
},
"hash_function": {
"PBKDF": {
"PBKDF": 7
},
"SHA": {
"SHA1": {
"SHA-1": 7
},
"SHA2": {
"SHA-2": 2,
"SHA-224": 1,
"SHA-256": 6,
"SHA-384": 4,
"SHA-512": 3,
"SHA256": 4,
"SHA384": 1,
"SHA512": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 5
},
"RNG": {
"RBG": 46,
"RNG": 5
}
},
"side_channel_analysis": {
"FI": {
"malfunction": 1
}
},
"standard_id": {
"CC": {
"CCMB-2012-09-001": 1,
"CCMB-2012-09-002": 1,
"CCMB-2012-09-003": 1,
"CCMB-2012-09-004": 1
},
"FIPS": {
"FIPS 186-4": 5,
"FIPS PUB 186-4": 6,
"FIPS PUB 197": 2
},
"NIST": {
"NIST SP 800-131A": 1,
"NIST SP 800-132": 4,
"NIST SP 800-38A": 1,
"NIST SP 800-38C": 2,
"NIST SP 800-38D": 1,
"NIST SP 800-38E": 1,
"NIST SP 800-38F": 2,
"NIST SP 800-56A": 1,
"NIST SP 800-56B": 3,
"NIST SP 800-57": 1,
"NIST SP 800-57A": 1,
"SP 800-108": 2,
"SP 800-131A": 2,
"SP 800-38A": 5,
"SP 800-38B": 1,
"SP 800-38C": 2,
"SP 800-38D": 1,
"SP 800-38E": 1,
"SP 800-38F": 1,
"SP 800-56A": 1,
"SP 800-56B": 1,
"SP 800-90A": 4
},
"RFC": {
"RFC 2560": 1,
"RFC 2818": 1,
"RFC 2986": 3,
"RFC 4492": 4,
"RFC 5246": 10,
"RFC 5280": 7,
"RFC 5288": 1,
"RFC 5289": 4,
"RFC 5746": 2,
"RFC 5759": 1,
"RFC 6125": 2,
"RFC 6347": 3,
"RFC 6460": 1,
"RFC 7030": 14,
"RFC 7748": 2
},
"X509": {
"X.509": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 21,
"AES-": 1,
"AES-128": 1,
"AES-256": 1
}
},
"constructions": {
"MAC": {
"CMAC": 1,
"HMAC": 7,
"HMAC-SHA-256": 1,
"HMAC-SHA-384": 1,
"HMAC-SHA-512": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {
"TLS": {
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA": 1,
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA": 1,
"TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA": 1,
"TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256": 1,
"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": 1,
"TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA": 1,
"TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384": 1,
"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384": 1,
"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA": 1,
"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA": 1,
"TLS_NULL_WITH_NULL_NULL": 1,
"TLS_RSA_WITH_AES_128_CBC_SHA": 3,
"TLS_RSA_WITH_AES_128_CBC_SHA256": 1,
"TLS_RSA_WITH_AES_256_CBC_SHA": 1,
"TLS_RSA_WITH_AES_256_GCM_SHA384": 2
}
},
"vendor": {
"Microsoft": {
"Microsoft Corporation": 1
},
"Samsung": {
"Samsung": 1
}
},
"vulnerability": {}
},
"pp_metadata": {
"/Author": "Gonski, Lauren W",
"/Company": ".",
"/CreationDate": "D:20160628090957-04\u002700\u0027",
"/Creator": "Acrobat PDFMaker 11 for Word",
"/ModDate": "D:20160628091024-04\u002700\u0027",
"/Producer": "Adobe PDF Library 11.0",
"/SourceModified": "D:20160628125349",
"pdf_file_size_bytes": 1459872,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.commoncriteriaportal.org/",
"http://projecteuclid.org/download/pdf_1/euclid.ss/1009213286"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 209
},
"report_filename": "pp_md_v3.0-vr.pdf",
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.CONFIG": 1,
"A.NOTIFY": 1,
"A.PRECAUTION": 1
},
"O": {
"O.AUTH": 1,
"O.COMMS": 1,
"O.CONFIG": 1,
"O.INTEGRITY": 1,
"O.PRIVACY": 1,
"O.STORAGE": 1
},
"OE": {
"OE.CONFIG": 1,
"OE.NOTIFY": 1,
"OE.PRECAUTION": 1
},
"T": {
"T.EAVESDROP": 1,
"T.FLAWAPP": 1,
"T.NETWORK": 1,
"T.PERSISTENT": 1,
"T.PHYSICAL": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP.1": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_PRE": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMS": 1
},
"APE": {
"APE_CCL.1": 1,
"APE_ECD.1": 1,
"APE_INT.1": 1,
"APE_OBJ.2": 1,
"APE_REQ": 1,
"APE_REQ.1": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_ECD": 1,
"ASE_INT": 1,
"ASE_OBJ": 1,
"ASE_REQ": 1,
"ASE_SPD": 1,
"ASE_TSS": 1
},
"ATE": {
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 1
}
},
"cc_security_level": {},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1,
"FAU_SAR": 1,
"FAU_SEL": 1,
"FAU_STG": 2
},
"FCS": {
"FCS_CKM.1": 1,
"FCS_CKM.2": 2,
"FCS_CKM_EXT": 7,
"FCS_CKM_EXT.1": 1,
"FCS_COP.1": 5,
"FCS_DTLS_EXT": 1,
"FCS_RBG_EXT": 2,
"FCS_RBG_EXT.1": 1,
"FCS_SRV_EXT": 1,
"FCS_SRV_EXT.1": 1,
"FCS_STG_EXT": 3,
"FCS_TLSC_EXT": 1,
"FCS_TLSC_EXT.1": 2
},
"FDP": {
"FDP_ACF_EXT": 1,
"FDP_ACF_EXT.1": 2,
"FDP_BCK_EXT.1": 1,
"FDP_BLT_EXT": 1,
"FDP_DAR_EXT": 2,
"FDP_IFC_EXT": 1,
"FDP_PBA_EXT.1": 1,
"FDP_STG_EXT": 1,
"FDP_UPC_EXT": 1
},
"FIA": {
"FIA_AFL_EXT": 1,
"FIA_BLT_EXT": 5,
"FIA_BLT_EXT.1": 1,
"FIA_BMG_EXT": 6,
"FIA_PMG_EXT": 1,
"FIA_TRT_EXT": 1,
"FIA_UAU": 2,
"FIA_UAU.6": 2,
"FIA_UAU_EXT": 3
},
"FMT": {
"FMT_MOF_EXT": 1,
"FMT_SMF_EXT": 3
},
"FPT": {
"FPT_AEX_EXT": 4,
"FPT_AEX_EXT.1": 1,
"FPT_AEX_EXT.2": 1,
"FPT_AEX_EXT.3": 1,
"FPT_BBD_EXT": 1,
"FPT_BLT_EXT": 1,
"FPT_JTA_EXT": 1,
"FPT_KST_EXT": 3,
"FPT_NOT_EXT": 1,
"FPT_NOT_EXT.1": 1,
"FPT_STM": 1,
"FPT_TST_EXT": 2,
"FPT_TST_EXT.2": 1,
"FPT_TUD_EXT": 2,
"FPT_TUD_EXT.2": 2
},
"FTA": {
"FTA_SSL_EXT": 1,
"FTA_TAB": 1
},
"FTP": {
"FTP_BLT_EXT": 2,
"FTP_ITC_EXT": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"DTLS": {
"DTLS": 1
},
"TLS": {
"TLS": 3
}
},
"VPN": {
"VPN": 2
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Gossamer": {
"Gossamer Security": 6
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "McGeady, Megan [USA]",
"/Comments": "",
"/Company": "",
"/CreationDate": "D:20170606102913-04\u002700\u0027",
"/Creator": "Acrobat PDFMaker 11 for Word",
"/Keywords": "",
"/ModDate": "D:20170606102920-04\u002700\u0027",
"/Producer": "Adobe PDF Library 11.0",
"/SourceModified": "D:20170531172406",
"/Subject": "",
"/Title": "",
"pdf_file_size_bytes": 213148,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 17
}
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "837414fec5a5a790fd2d2b209e09fd90b58c13c8ddf3b3a796f9234817165156",
"txt_hash": "68d9642c13bc654a39160f29bee342b4d5de3250f04401ff396c0246b729ff64"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "f5af48d6c3c98732e21f1892dfb1050964e8a08eb810c3a8179a534b9e026566",
"txt_hash": "6e35cb2a770fe81534acdb2a83bf891c4e72ff5015cfde9a3a265c4561ce9965"
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "Mobility",
"is_collaborative": false,
"maintenances": [],
"name": "Protection Profile for Mobile Device Fundamentals, version 3.0",
"not_valid_after": "2017-07-16",
"not_valid_before": "2016-06-10",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_md_v3.0.pdf",
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_md_v3.0-vr.pdf",
"scheme": "US",
"security_level": {
"_type": "Set",
"elements": [
"EAL1"
]
},
"status": "archived",
"version": "3.0"
}
}