This page was not yet optimized for use on mobile
devices.
PP-Module for MDM Agent Version 1.0
Web information
| Status | active |
|---|---|
| Valid from | 25.04.2019 |
| Scheme | 🇺🇸 US |
| Category | Mobility |
| Security level | EAL1 |
Certification report
Extracted keywords
Symmetric Algorithms
DESProtocols
TLS, DTLS, IPsec, VPNClaims
O.COMMS, O.STORAGE, O.CONFIG, O.AUTH, O.INTEGRITY, O.PRIVACY, O.ACCOUNTABILITY, O.APPLY_POLICY, O.DATA_PROTECTION_TRANSIT, T.EAVESDROP, T.NETWORK, T.PHYSICAL, T.FLAWAPP, T.PERSISTENT, T.BACKUP, T.UNAUTHORIZED_ACCESS, T.TSF_CONFIGURATION, T.UNAUTHORIZED_UPDATE, T.USER_DATA_REUSE, T.TSF_FAILURE, A.CONFIG, A.NOTIFY, A.PRECAUTION, A.CONNECTIVITY, A.MOBILE_DEVICE_PLATFORM, A.PROPER_ADMIN, A.PROPER_USER, A.NO_TOE_BYPASS, A.PHYSICAL, A.TRUSTED_CONFIG, OE.CONFIG, OE.NOTIFY, OE.PRECAUTION, OE.DATA_PROPER_ADMIN, OE.DATA_PROPER_USER, OE.IT_ENTERPRISE, OE.WIRELESS_NETWORK, OE.NO_TOE_BYPASS, OE.PHYSICAL, OE.TRUSTED_CONFIGSecurity Assurance Requirements (SAR)
ACE_REQ, ACE_INT.1, ACE_CCL.1, ACE_SPD.1, ACE_OBJ.1, ACE_ECD.1, ACE_REQ.1, ACE_MCO.1, ACE_CCO.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_SAR.1, FAU_SEL.1, FAU_STG.1, FAU_STG.4, FAU_ALT_EXT, FAU_STG_EXT, FCS_CKM.1, FCS_CKM.2, FCS_CKM_EXT.8, FCS_COP.1, FCS_DTLS_EXT.1, FCS_RBG_EXT.1, FCS_RBG_EXT.2, FCS_RBG_EXT.3, FCS_SRV_EXT.1, FCS_SRV_EXT.2, FCS_TLSC_EXT.1, FCS_TLSC_EXT.2, FCS_TLSC_EXT.3, FCS_CKM_EXT.1, FCS_CKM_EXT.2, FCS_CKM_EXT.3, FCS_CKM_EXT.4, FCS_CKM_EXT.5, FCS_CKM_EXT.6, FCS_CKM_EXT.7, FCS_STG_EXT.1, FCS_STG_EXT.2, FCS_STG_EXT.3, FCS_STG_EXT, FDP_BLT_EXT.1, FDP_IFC_EXT.1, FDP_STG_EXT.1, FDP_UPC_EXT.1, FDP_ACF_EXT.2, FDP_ACF_EXT.3, FDP_DAR_EXT.1, FDP_DAR_EXT.2, FDP_PBA_EXT.1, FDP_ACF_EXT.1, FDP_BCK_EXT.1, FIA_BLT_EXT.1, FIA_BLT_EXT.2, FIA_BLT_EXT.3, FIA_BLT_EXT.4, FIA_BLT_EXT.5, FIA_BLT_EXT.6, FIA_UAU_EXT.1, FIA_AFL_EXT.1, FIA_BMG_EXT.1, FIA_BMG_EXT.2, FIA_BMG_EXT.3, FIA_BMG_EXT.4, FIA_BMG_EXT.5, FIA_BMG_EXT.6, FIA_PMG_EXT.1, FIA_TRT_EXT.1, FIA_UAU_EXT.2, FIA_UAU_EXT.4, FIA_UAU.5, FIA_UAU.6, FIA_UAU.7, FIA_ENR_EXT, FMT_MOF_EXT.1, FMT_SMF_EXT.1, FMT_SMF_EXT.2, FMT_SMF_EXT.3, FMT_POL_EXT, FMT_SMF_EXT, FMT_UNR_EXT, FPT_BLT_EXT.1, FPT_KST_EXT.1, FPT_KST_EXT.2, FPT_KST_EXT.3, FPT_JTA_EXT.1, FPT_AEX_EXT.1, FPT_AEX_EXT.2, FPT_AEX_EXT.3, FPT_AEX_EXT.4, FPT_AEX_EXT.5, FPT_AEX_EXT.6, FPT_AEX_EXT.7, FPT_BBD_EXT.1, FPT_NOT_EXT.1, FPT_NOT_EXT.2, FPT_STM.1, FPT_TST_EXT.1, FPT_TST_EXT.2, FPT_TST_EXT.3, FPT_TUD_EXT.1, FPT_TUD_EXT.2, FPT_TUD_EXT, FPT_TUD_EXT.4, FPT_NET_EXT, FTA_TAB.1, FTA_SSL_EXT.1, FTP_BLT_EXT.1, FTP_BLT_EXT.2, FTP_ITC_EXT.1, FTP_TRP.1Evaluation facilities
atsecCertification process
out of scope, access to its storage media. Note: Defending against device re-use after physical compromise is out of scope for this protection profile. T.FLAWAPP Malicious or Flawed Application Applications loaded onto theFile metadata
| Creation date | D:20210128132823-05'00' |
|---|---|
| Modification date | D:20210128132823-05'00' |
| Pages | 19 |
Protection Profile
Extracted keywords
Protocols
TLS, DTLS, VPNRandomness
RBGClaims
O.ACCOUNTABILITY, O.APPLY_POLICY, O.DATA_PROTECTION_TRANSIT, O.STORAGE, O.INTEGRITY, O.CONFIG, O.COMMS, T.BACKUP, T.PHYSICAL, T.MALICIOUS_APPS, T.NETWORK_ATTACK, T.NETWORK_EAVESDROP, T.PHYSICAL_ACCESS, T.FLAWAPP, T.PERSISTENT, T.EAVESDROP, T.NETWORK, A.CONNECTIVITY, A.MOBILE_DEVICE_PLATFORM, A.PROPER_ADMIN, A.PROPER_USER, OE.DATA_PROPER_ADMIN, OE.DATA_PROPER_USER, OE.IT_ENTERPRISE, OE.MOBILE_DEVICE_PLATFORM, OE.WIRELESS_NETWORK, OE.CONFIG, OE.NOTIFY, OE.PRECAUTIONSecurity Functional Requirements (SFR)
FAU_ALT_EXT.2, FAU_GEN.1, FAU_SEL.1, FAU_STG_EXT.3, FAU_ALT_EXT.2.1, FAU_ALT_EXT.2.2, FAU_NET_EXT.1, FAU_GEN.1.1, FAU_SEL.1.1, FAU_GEN.1.2, FAU_STG.1, FAU_ALT_EXT.1, FAU_ALT_EXT, FAU_STG_EXT, FAU_GEN, FAU_STG_EXT.3.1, FCS_TLSC_EXT.1, FCS_TLSC_EXT.2, FCS_TLSS_EXT.1, FCS_TLSS_EXT.2, FCS_STG_EXT.1, FCS_STG_EXT.4, FCS_TLS_EXT, FCS_COP.1, FCS_STG_EXT, FCS_CKM_EXT.1, FCS_CKM.1, FCS_STG_EXT.4.1, FIA_ENR_EXT.2, FIA_ENR_EXT.2.1, FIA_ENR_EXT.1, FIA_ENR_EXT, FMT_POL_EXT.2, FMT_SMF_EXT.4, FMT_UNR_EXT.1, FMT_SMF.1.1, FMT_UNR_EXT.1.1, FMT_POL_EXT.2.1, FMT_SMF_EXT.4.1, FMT_SMF_EXT.2.1, FMT_MOF_EXT.1, FMT_MOF_EXT.1.2, FMT_SMF_EXT.2, FMT_POL_EXT.1, FMT_SMF.1, FMT_POL_EXT, FMT_SMF_EXT, FMT_UNR_EXT, FMT_POL_EXT.2.2, FMT_SMF_EXT.4.2, FMT_UNR_ENT.1.1, FPT_ITT.1, FPT_NET_EXT.1, FPT_TUD_EXT.1, FPT_NET_EXT.1.1, FPT_NET_EXT, FPT_STM.1, FTP_ITC_EXT.1, FTP_TRP.1, FTP_ITC_EXT.1.1, FTP_ITC_EXT.1.3, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3, FTP_ITC.1Standards
ISO/IEC 15408, X.509, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003File metadata
| Creation date | D:20190425161845Z |
|---|---|
| Modification date | D:20190425132505-04'00' |
| Pages | 32 |
| Creator | wkhtmltopdf 0.12.4 |
| Producer | Qt 4.8.7 |
References
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.- Apple iOS 13 on iPhone and Apple iPadOS 13 on iPad Mobile Devices archived
- Apple iOS 15 archived
- Apple iOS 16: iPhones archived
- Apple iOS 17: iPhone active
- Apple iPadOS 15 archived
- Apple iPadOS 16: iPads archived
- Apple iPadOS 17: iPad active
- BlackBerry UEM Server and Android Client v12 active
- BlackBerry Unified Endpoint Management (UEM) Server and Android Client, version 12 archived
- Google Pixel Devices on Android 14 active
- Google Pixel Devices on Android 15 active
- Ivanti Endpoint Manager Mobile (EPMM) System 12 active
- Microsoft Intune active
- MobileIron Platform 11 archived
- Samsung SDS EMM and EMM Agent for Android v2.2.5 archived
- Samsung SDS EMM v2.2.5 archived
- VMware Workspace ONE Unified Endpoint Management Version 1907 archived
- VMware Workspace ONE Unified Endpoint Management Version 2209 archived
Updates Feed
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile was first processed.
Raw data
{
"_id": "36b1d4890baaa7f4",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "36b1d4890baaa7f4",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "mod_mdm_agent_v1.0.pdf",
"pp_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.CONNECTIVITY": 3,
"A.MOBILE_DEVICE_PLATFORM": 3,
"A.PROPER_ADMIN": 3,
"A.PROPER_USER": 2
},
"O": {
"O.ACCOUNTABILITY": 6,
"O.APPLY_POLICY": 19,
"O.COMMS": 1,
"O.CONFIG": 1,
"O.DATA_PROTECTION_TRANSIT": 11,
"O.INTEGRITY": 2,
"O.STORAGE": 6
},
"OE": {
"OE.CONFIG": 1,
"OE.DATA_PROPER_ADMIN": 5,
"OE.DATA_PROPER_USER": 5,
"OE.IT_ENTERPRISE": 7,
"OE.MOBILE_DEVICE_PLATFORM": 5,
"OE.NOTIFY": 1,
"OE.PRECAUTION": 1,
"OE.WIRELESS_NETWORK": 5
},
"T": {
"T.BACKUP": 6,
"T.EAVESDROP": 1,
"T.FLAWAPP": 1,
"T.MALICIOUS_APPS": 4,
"T.NETWORK": 1,
"T.NETWORK_ATTACK": 5,
"T.NETWORK_EAVESDROP": 5,
"T.PERSISTENT": 1,
"T.PHYSICAL": 2,
"T.PHYSICAL_ACCESS": 5
}
},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {},
"cc_sfr": {
"FAU": {
"FAU_ALT_EXT": 2,
"FAU_ALT_EXT.1": 2,
"FAU_ALT_EXT.2": 10,
"FAU_ALT_EXT.2.1": 4,
"FAU_ALT_EXT.2.2": 2,
"FAU_GEN": 6,
"FAU_GEN.1": 7,
"FAU_GEN.1.1": 3,
"FAU_GEN.1.2": 1,
"FAU_NET_EXT.1": 1,
"FAU_SEL.1": 7,
"FAU_SEL.1.1": 1,
"FAU_STG.1": 1,
"FAU_STG_EXT": 2,
"FAU_STG_EXT.3": 10,
"FAU_STG_EXT.3.1": 1
},
"FCS": {
"FCS_CKM.1": 2,
"FCS_CKM_EXT.1": 1,
"FCS_COP.1": 5,
"FCS_STG_EXT": 3,
"FCS_STG_EXT.1": 5,
"FCS_STG_EXT.4": 8,
"FCS_STG_EXT.4.1": 1,
"FCS_TLSC_EXT.1": 6,
"FCS_TLSC_EXT.2": 1,
"FCS_TLSS_EXT.1": 1,
"FCS_TLSS_EXT.2": 1,
"FCS_TLS_EXT": 2
},
"FIA": {
"FIA_ENR_EXT": 2,
"FIA_ENR_EXT.1": 3,
"FIA_ENR_EXT.2": 10,
"FIA_ENR_EXT.2.1": 2
},
"FMT": {
"FMT_MOF_EXT.1": 2,
"FMT_MOF_EXT.1.2": 1,
"FMT_POL_EXT": 2,
"FMT_POL_EXT.1": 2,
"FMT_POL_EXT.2": 11,
"FMT_POL_EXT.2.1": 2,
"FMT_POL_EXT.2.2": 1,
"FMT_SMF.1": 1,
"FMT_SMF.1.1": 5,
"FMT_SMF_EXT": 2,
"FMT_SMF_EXT.2": 1,
"FMT_SMF_EXT.2.1": 1,
"FMT_SMF_EXT.4": 10,
"FMT_SMF_EXT.4.1": 4,
"FMT_SMF_EXT.4.2": 1,
"FMT_UNR_ENT.1.1": 1,
"FMT_UNR_EXT": 2,
"FMT_UNR_EXT.1": 13,
"FMT_UNR_EXT.1.1": 4
},
"FPT": {
"FPT_ITT.1": 6,
"FPT_NET_EXT": 2,
"FPT_NET_EXT.1": 8,
"FPT_NET_EXT.1.1": 3,
"FPT_STM.1": 1,
"FPT_TUD_EXT.1": 1
},
"FTP": {
"FTP_ITC.1": 1,
"FTP_ITC_EXT.1": 9,
"FTP_ITC_EXT.1.1": 2,
"FTP_ITC_EXT.1.3": 1,
"FTP_TRP.1": 5,
"FTP_TRP.1.1": 1,
"FTP_TRP.1.2": 1,
"FTP_TRP.1.3": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"DTLS": {
"DTLS": 7
},
"TLS": {
"TLS": 22
}
},
"VPN": {
"VPN": 2
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RBG": 2
}
},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1
},
"ISO": {
"ISO/IEC 15408": 2
},
"X509": {
"X.509": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"pp_metadata": {
"/CreationDate": "D:20190425161845Z",
"/Creator": "wkhtmltopdf 0.12.4",
"/ModDate": "D:20190425132505-04\u002700\u0027",
"/Producer": "Qt 4.8.7",
"/Title": "",
"pdf_file_size_bytes": 223544,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R5.pdf",
"http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R5.pdf",
"http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R5.pdf"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 32
},
"report_filename": "CFG_MDF-MDM_AGENT- VPNC_V1.0_VR.pdf",
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.CONFIG": 1,
"A.CONNECTIVITY": 1,
"A.MOBILE_DEVICE_PLATFORM": 1,
"A.NOTIFY": 1,
"A.NO_TOE_BYPASS": 1,
"A.PHYSICAL": 1,
"A.PRECAUTION": 1,
"A.PROPER_ADMIN": 1,
"A.PROPER_USER": 1,
"A.TRUSTED_CONFIG": 1
},
"O": {
"O.ACCOUNTABILITY": 1,
"O.APPLY_POLICY": 1,
"O.AUTH": 1,
"O.COMMS": 1,
"O.CONFIG": 1,
"O.DATA_PROTECTION_TRANSIT": 1,
"O.INTEGRITY": 1,
"O.PRIVACY": 1,
"O.STORAGE": 2
},
"OE": {
"OE.CONFIG": 1,
"OE.DATA_PROPER_ADMIN": 1,
"OE.DATA_PROPER_USER": 1,
"OE.IT_ENTERPRISE": 1,
"OE.NOTIFY": 1,
"OE.NO_TOE_BYPASS": 1,
"OE.PHYSICAL": 1,
"OE.PRECAUTION": 1,
"OE.TRUSTED_CONFIG": 1,
"OE.WIRELESS_NETWORK": 1
},
"T": {
"T.BACKUP": 1,
"T.EAVESDROP": 2,
"T.FLAWAPP": 3,
"T.NETWORK": 2,
"T.PERSISTENT": 3,
"T.PHYSICAL": 4,
"T.TSF_CONFIGURATION": 1,
"T.TSF_FAILURE": 1,
"T.UNAUTHORIZED_ACCESS": 1,
"T.UNAUTHORIZED_UPDATE": 1,
"T.USER_DATA_REUSE": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ACE": {
"ACE_CCL.1": 1,
"ACE_CCO.1": 1,
"ACE_ECD.1": 1,
"ACE_INT.1": 1,
"ACE_MCO.1": 1,
"ACE_OBJ.1": 1,
"ACE_REQ": 1,
"ACE_REQ.1": 1,
"ACE_SPD.1": 1
}
},
"cc_security_level": {},
"cc_sfr": {
"FAU": {
"FAU_ALT_EXT": 1,
"FAU_GEN.1": 2,
"FAU_SAR.1": 1,
"FAU_SEL.1": 2,
"FAU_STG.1": 1,
"FAU_STG.4": 1,
"FAU_STG_EXT": 1
},
"FCS": {
"FCS_CKM.1": 1,
"FCS_CKM.2": 3,
"FCS_CKM_EXT.1": 1,
"FCS_CKM_EXT.2": 1,
"FCS_CKM_EXT.3": 1,
"FCS_CKM_EXT.4": 1,
"FCS_CKM_EXT.5": 1,
"FCS_CKM_EXT.6": 1,
"FCS_CKM_EXT.7": 1,
"FCS_CKM_EXT.8": 1,
"FCS_COP.1": 12,
"FCS_DTLS_EXT.1": 1,
"FCS_RBG_EXT.1": 2,
"FCS_RBG_EXT.2": 2,
"FCS_RBG_EXT.3": 2,
"FCS_SRV_EXT.1": 1,
"FCS_SRV_EXT.2": 1,
"FCS_STG_EXT": 1,
"FCS_STG_EXT.1": 1,
"FCS_STG_EXT.2": 1,
"FCS_STG_EXT.3": 1,
"FCS_TLSC_EXT.1": 1,
"FCS_TLSC_EXT.2": 1,
"FCS_TLSC_EXT.3": 1
},
"FDP": {
"FDP_ACF_EXT.1": 2,
"FDP_ACF_EXT.2": 1,
"FDP_ACF_EXT.3": 2,
"FDP_BCK_EXT.1": 1,
"FDP_BLT_EXT.1": 1,
"FDP_DAR_EXT.1": 1,
"FDP_DAR_EXT.2": 1,
"FDP_IFC_EXT.1": 1,
"FDP_PBA_EXT.1": 1,
"FDP_STG_EXT.1": 1,
"FDP_UPC_EXT.1": 1
},
"FIA": {
"FIA_AFL_EXT.1": 1,
"FIA_BLT_EXT.1": 2,
"FIA_BLT_EXT.2": 2,
"FIA_BLT_EXT.3": 2,
"FIA_BLT_EXT.4": 1,
"FIA_BLT_EXT.5": 1,
"FIA_BLT_EXT.6": 1,
"FIA_BMG_EXT.1": 1,
"FIA_BMG_EXT.2": 1,
"FIA_BMG_EXT.3": 1,
"FIA_BMG_EXT.4": 1,
"FIA_BMG_EXT.5": 1,
"FIA_BMG_EXT.6": 1,
"FIA_ENR_EXT": 1,
"FIA_PMG_EXT.1": 1,
"FIA_TRT_EXT.1": 1,
"FIA_UAU.5": 1,
"FIA_UAU.6": 1,
"FIA_UAU.7": 1,
"FIA_UAU_EXT.1": 2,
"FIA_UAU_EXT.2": 1,
"FIA_UAU_EXT.4": 1
},
"FMT": {
"FMT_MOF_EXT.1": 1,
"FMT_POL_EXT": 1,
"FMT_SMF_EXT": 1,
"FMT_SMF_EXT.1": 2,
"FMT_SMF_EXT.2": 1,
"FMT_SMF_EXT.3": 1,
"FMT_UNR_EXT": 1
},
"FPT": {
"FPT_AEX_EXT.1": 1,
"FPT_AEX_EXT.2": 1,
"FPT_AEX_EXT.3": 1,
"FPT_AEX_EXT.4": 1,
"FPT_AEX_EXT.5": 1,
"FPT_AEX_EXT.6": 1,
"FPT_AEX_EXT.7": 1,
"FPT_BBD_EXT.1": 1,
"FPT_BLT_EXT.1": 1,
"FPT_JTA_EXT.1": 1,
"FPT_KST_EXT.1": 1,
"FPT_KST_EXT.2": 1,
"FPT_KST_EXT.3": 1,
"FPT_NET_EXT": 1,
"FPT_NOT_EXT.1": 1,
"FPT_NOT_EXT.2": 1,
"FPT_STM.1": 1,
"FPT_TST_EXT.1": 1,
"FPT_TST_EXT.2": 2,
"FPT_TST_EXT.3": 1,
"FPT_TUD_EXT": 1,
"FPT_TUD_EXT.1": 1,
"FPT_TUD_EXT.2": 1,
"FPT_TUD_EXT.4": 1
},
"FTA": {
"FTA_SSL_EXT.1": 1,
"FTA_TAB.1": 1
},
"FTP": {
"FTP_BLT_EXT.1": 1,
"FTP_BLT_EXT.2": 1,
"FTP_ITC_EXT.1": 2,
"FTP_TRP.1": 1
}
},
"certification_process": {
"OutOfScope": {
"access to its storage media. Note: Defending against device re-use after physical compromise is out of scope for this protection profile. T.FLAWAPP Malicious or Flawed Application Applications loaded onto the": 1,
"out of scope": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IPsec": {
"IPsec": 5
},
"TLS": {
"DTLS": {
"DTLS": 1
},
"TLS": {
"TLS": 1
}
},
"VPN": {
"VPN": 14
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"atsec": {
"atsec": 3
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {
"DES": {
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20210128132823-05\u002700\u0027",
"/ModDate": "D:20210128132823-05\u002700\u0027",
"pdf_file_size_bytes": 507179,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 19
}
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "b0c37de77ed178d873ee1c82b19b2c81e7cee6c0921264dd32b97970cd77c55b",
"txt_hash": "a282117067d3ff504f744823ab7c0e02ae074bb8f60dea3b8864ce98fd29e2d8"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "f34850506359b1c5071e5bcab3ab54402cb61fe4b35daa5ca140bd8db61b3952",
"txt_hash": "746be72818ce83ec0e0669ce807b3c0aa1307a1ea37e5800f798d8a835a1c7ae"
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "Mobility",
"is_collaborative": false,
"maintenances": [],
"name": "PP-Module for MDM Agent Version 1.0",
"not_valid_after": null,
"not_valid_before": "2019-04-25",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_mdm_agent_v1.0.pdf",
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CFG_MDF-MDM_AGENT- VPNC_V1.0_VR.pdf",
"scheme": "US",
"security_level": {
"_type": "Set",
"elements": [
"EAL1"
]
},
"status": "active",
"version": "1.0"
}
}