This page was not yet optimized for use on mobile
devices.
PKI Secure Kernel Protection Profile 1.1
Web information
| Status | archived |
|---|---|
| Valid from | 01.04.2002 |
| Valid until | 05.03.2013 |
| Scheme | 🇬🇧 UK |
| Category | Key Management Systems |
| Security level | EAL4 |
Certification report
Extracted keywords
File metadata
| Title | Microsoft Word - Empty Document.doc |
|---|---|
| Author | Bhavin |
| Creation date | D:20130306113848Z00'00' |
| Modification date | D:20130306113848Z00'00' |
| Pages | 1 |
| Creator | PScript5.dll Version 5.2.2 |
| Producer | GPL Ghostscript 9.06 |
Protection Profile
Extracted keywords
Symmetric Algorithms
HMACSchemes
MACRandomness
RNGSecurity level
EAL4, EAL6, EAL5, EAL7, EAL4 augmentedSecurity Assurance Requirements (SAR)
ACM_AUT.2, ACM_CAP.4, ACM_SCP.3, ACM_AUT, ACM_CAP, ACM_SCP, ACM_CAP.3, ACM_SCP.1, ADO_DEL.2, ADO_IGS.1, ADO_DEL, ADO_IGS, ADV_FSP.3, ADV_HLD.3, ADV_IMP.3, ADV_INT.3, ADV_LLD.1, ADV_RCR.2, ADV_SPM.2, ADV_INT, ADV_FSP, ADV_HLD, ADV_IMP, ADV_RCR, ADV_LLD, ADV_SPM, ADV_SPM.1, ADV_INT.1, ADV_HLD.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.1, ADV_IMP.1, ADV_IMP.2, ADV_FSP.2, AGD_ADM.1, AGD_USR.1, AGD_ADM, AGD_USR, ALC_DVS.2, ALC_FLR.3, ALC_LCD.3, ALC_TAT.2, ALC_DVS, ALC_FLR, ALC_LCD, ALC_TAT, ALC_DVS.1, ALC_FLR.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.3, ATE_FUN.2, ATE_IND.2, ATE_COV, ATE_DPT, ATE_IND, ATE_FUN, ATE_COV.1, ATE_DPT.2, ATE_FUN.1, ATE_IND.1, AVA_CCA.1, AVA_MSU.2, AVA_SOF.1, AVA_VLA.2, AVA_CCA, AVA_MSU, AVA_SOF, AVA_VLA, AVA_VLA.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_SAR.1, FAU_SAR.3, FAU_SEL.1, FAU_STG.2, FAU_STG.4, FAU_GEN, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SAR, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.3.1, FAU_SEL, FAU_SEL.1.1, FAU_STG, FAU_STG.2.1, FAU_STG.2.2, FAU_STG.2.3, FAU_STG.4.1, FAU_STG.3, FAU_STG.1, FCO_NRO.2, FCO_NRO, FCO_NRO.2.1, FCO_NRO.2.2, FCO_NRO.2.3, FCO_NRO.1, FCS_CKM.1, FCS_CKM.2, FCS_CKM.3, FCS_CKM.4, FCS_COP.1, FCS_CKM, FCS_CKM.1.1, FCS_CKM.2.1, FCS_CKM.3.1, FCS_CKM.4.1, FCS_COP, FCS_COP.1.1, FDP_ACC.2, FDP_ACF.1, FDP_DAU.2, FDP_ETC.1, FDP_ETC.2, FDP_IFC.1, FDP_IFF.1, FDP_IFF.3, FDP_ITC.1, FDP_ITC.2, FDP_ITT.2, FDP_RIP.2, FDP_SDI.2, FDP_UIT.1, FDP_UIT.3, FDP_ACC, FDP_ACF, FDP_SDI, FDP_ACC.2.1, FDP_ACC.2.2, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_DAU, FDP_DAU.2.1, FDP_DAU.2.2, FDP_ETC, FDP_ETC.1.1, FDP_ETC.1.2, FDP_ETC.2.1, FDP_ETC.2.2, FDP_ETC.2.3, FDP_ETC.2.4, FDP_IFC, FDP_IFF, FDP_IFC.1.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_IFF.1.6, FDP_IFF.3.1, FDP_ITC, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_ITC.2.1, FDP_ITC.2.2, FDP_ITC.2.3, FDP_ITC.2.4, FDP_ITC.2.5, FDP_ITT, FDP_UCT, FDP_UIT, FDP_ITT.2.1, FDP_ITT.2.2, FDP_RIP, FDP_RIP.2.1, FDP_SDI.2.1, FDP_SDI.2.2, FDP_UIT.1.1, FDP_UIT.1.2, FDP_UIT.3.1, FDP_ACC.1, FDP_SDI.1, FDP_DAU.1, FDP_ITT.1, FIA_AFL.1, FIA_ATD.1, FIA_SOS.1, FIA_SOS.2, FIA_UAU.2, FIA_UAU.6, FIA_UAU.7, FIA_UID.2, FIA_USB.1, FIA_AFL, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD, FIA_ATD.1.1, FIA_SOS, FIA_SOS.1.1, FIA_SOS.2.1, FIA_SOS.2.2, FIA_UAU, FIA_UAU.2.1, FIA_UAU.6.1, FIA_UAU.7.1, FIA_UID, FIA_UID.2.1, FIA_USB, FIA_USB.1.1, FIA_UID.1, FIA_UAU.1, FMT_MOF.1, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_MTD.1, FMT_MTD.2, FMT_MTD.3, FMT_REV.1, FMT_SAE.1, FMT_SMR.2, FMT_MOF, FMT_MOF.1.1, FMT_MSA, FMT_MSA.1.1, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD, FMT_MTD.1.1, FMT_MTD.2.1, FMT_MTD.2.2, FMT_MTD.3.1, FMT_REV, FMT_REV.1.1, FMT_REV.1.2, FMT_SAE, FMT_SAE.1.1, FMT_SAE.1.2, FMT_SMR, FMT_SMR.2.1, FMT_SMR.2.2, FMT_SMR.2.3, FMT_SMR.1, FPT_AMT.1, FPT_FLS.1, FPT_ITI.1, FPT_ITT.1, FPT_RCV.1, FPT_RCV.4, FPT_RVM.1, FPT_SEP.3, FPT_SSP.2, FPT_STM.1, FPT_TDC.1, FPT_TRC.1, FPT_TST.1, FPT_AMT, FPT_AMT.1.1, FPT_FLS, FPT_FLS.1.1, FPT_ITI, FPT_ITI.1.1, FPT_ITI.1.2, FPT_ITT, FPT_ITT.1.1, FPT_RCV, FPT_RCV.1.1, FPT_RCV.4.1, FPT_RVM, FPT_SEP, FPT_RVM.1.1, FPT_SEP.3.1, FPT_SEP.3.2, FPT_SEP.3.3, FPT_SSP, FPT_SSP.2.1, FPT_SSP.2.2, FPT_STM, FPT_STM.1.1, FPT_TDC, FPT_TDC.1.1, FPT_TDC.1.2, FPT_TRC, FPT_TRC.1.1, FPT_TRC.1.2, FPT_TST, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_SEP.2, FPT_SEP.1, FRU_PRS.2, FRU_RSA.2, FRU_PRS, FRU_PRS.2.1, FRU_PRS.2.2, FRU_RSA, FRU_RSA.2.1, FRU_RSA.2.2, FTA_MCS.2, FTA_SSL.1, FTA_SSL.2, FTA_SSL.3, FTA_TAB.1, FTA_TAH.1, FTA_TSE.1, FTA_MCS, FTA_MCS.1, FTA_MCS.2.1, FTA_MCS.2.2, FTA_SSL, FTA_SSL.1.1, FTA_SSL.1.2, FTA_SSL.2.1, FTA_SSL.2.2, FTA_SSL.3.1, FTA_TAB, FTA_TAB.1.1, FTA_TAH, FTA_TAH.1.1, FTA_TAH.1.2, FTA_TAH.1.3, FTA_TSE, FTA_TSE.1.1, FTP_ITC.1, FTP_TRP.1, FTP_ITC, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3Side-channel analysis
Physical tampering, physical tampering, malfunction, reverse engineeringStandards
FIPS 140-2, FIPS 140File metadata
| Title | The PKI Secure Kernel Protection Profile |
|---|---|
| Subject | A Protection Profile for PKI's |
| Keywords | digital signature, PKI, Protection Profile, Common Criteria |
| Author | PKI PP working group |
| Creation date | D:20020404184700 |
| Pages | 293 |
| Creator | LaTeX |
| Producer | pdfeTeX-0.13d |
References
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Updates Feed
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile was first processed.
Raw data
{
"_id": "6e69d65d60f25c99",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "6e69d65d60f25c99",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "PKISKPP v1.1.pdf",
"pp_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ACM": {
"ACM_AUT": 2,
"ACM_AUT.2": 15,
"ACM_CAP": 2,
"ACM_CAP.3": 4,
"ACM_CAP.4": 25,
"ACM_SCP": 2,
"ACM_SCP.1": 2,
"ACM_SCP.3": 11
},
"ADO": {
"ADO_DEL": 2,
"ADO_DEL.2": 12,
"ADO_IGS": 2,
"ADO_IGS.1": 11
},
"ADV": {
"ADV_FSP": 2,
"ADV_FSP.1": 12,
"ADV_FSP.2": 2,
"ADV_FSP.3": 28,
"ADV_HLD": 2,
"ADV_HLD.1": 3,
"ADV_HLD.2": 5,
"ADV_HLD.3": 21,
"ADV_IMP": 2,
"ADV_IMP.1": 4,
"ADV_IMP.2": 4,
"ADV_IMP.3": 18,
"ADV_INT": 3,
"ADV_INT.1": 4,
"ADV_INT.3": 21,
"ADV_LLD": 2,
"ADV_LLD.1": 29,
"ADV_RCR": 4,
"ADV_RCR.1": 6,
"ADV_RCR.2": 14,
"ADV_SPM": 3,
"ADV_SPM.1": 9,
"ADV_SPM.2": 18
},
"AGD": {
"AGD_ADM": 2,
"AGD_ADM.1": 40,
"AGD_USR": 2,
"AGD_USR.1": 29
},
"ALC": {
"ALC_DVS": 2,
"ALC_DVS.1": 3,
"ALC_DVS.2": 11,
"ALC_FLR": 2,
"ALC_FLR.1": 2,
"ALC_FLR.3": 17,
"ALC_LCD": 2,
"ALC_LCD.1": 2,
"ALC_LCD.3": 16,
"ALC_TAT": 2,
"ALC_TAT.1": 3,
"ALC_TAT.2": 13
},
"ATE": {
"ATE_COV": 3,
"ATE_COV.1": 2,
"ATE_COV.2": 10,
"ATE_DPT": 3,
"ATE_DPT.2": 2,
"ATE_DPT.3": 9,
"ATE_FUN": 3,
"ATE_FUN.1": 6,
"ATE_FUN.2": 17,
"ATE_IND": 3,
"ATE_IND.1": 2,
"ATE_IND.2": 10
},
"AVA": {
"AVA_CCA": 2,
"AVA_CCA.1": 16,
"AVA_MSU": 2,
"AVA_MSU.2": 14,
"AVA_SOF": 2,
"AVA_SOF.1": 10,
"AVA_VLA": 2,
"AVA_VLA.1": 3,
"AVA_VLA.2": 11
}
},
"cc_security_level": {
"EAL": {
"EAL4": 30,
"EAL4 augmented": 16,
"EAL5": 6,
"EAL6": 4,
"EAL7": 3
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 2,
"FAU_GEN.1": 17,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 2,
"FAU_GEN.2": 8,
"FAU_GEN.2.1": 1,
"FAU_SAR": 2,
"FAU_SAR.1": 10,
"FAU_SAR.1.1": 2,
"FAU_SAR.1.2": 1,
"FAU_SAR.3": 7,
"FAU_SAR.3.1": 3,
"FAU_SEL": 2,
"FAU_SEL.1": 8,
"FAU_SEL.1.1": 3,
"FAU_STG": 2,
"FAU_STG.1": 2,
"FAU_STG.2": 10,
"FAU_STG.2.1": 1,
"FAU_STG.2.2": 1,
"FAU_STG.2.3": 3,
"FAU_STG.3": 2,
"FAU_STG.4": 8,
"FAU_STG.4.1": 1
},
"FCO": {
"FCO_NRO": 2,
"FCO_NRO.1": 2,
"FCO_NRO.2": 10,
"FCO_NRO.2.1": 1,
"FCO_NRO.2.2": 2,
"FCO_NRO.2.3": 3
},
"FCS": {
"FCS_CKM": 2,
"FCS_CKM.1": 17,
"FCS_CKM.1.1": 2,
"FCS_CKM.2": 11,
"FCS_CKM.2.1": 2,
"FCS_CKM.3": 9,
"FCS_CKM.3.1": 2,
"FCS_CKM.4": 17,
"FCS_CKM.4.1": 2,
"FCS_COP": 2,
"FCS_COP.1": 11,
"FCS_COP.1.1": 2
},
"FDP": {
"FDP_ACC": 5,
"FDP_ACC.1": 24,
"FDP_ACC.2": 17,
"FDP_ACC.2.1": 1,
"FDP_ACC.2.2": 1,
"FDP_ACF": 3,
"FDP_ACF.1": 22,
"FDP_ACF.1.1": 2,
"FDP_ACF.1.2": 2,
"FDP_ACF.1.3": 2,
"FDP_ACF.1.4": 2,
"FDP_DAU": 2,
"FDP_DAU.1": 2,
"FDP_DAU.2": 8,
"FDP_DAU.2.1": 2,
"FDP_DAU.2.2": 2,
"FDP_ETC": 3,
"FDP_ETC.1": 10,
"FDP_ETC.1.1": 2,
"FDP_ETC.1.2": 1,
"FDP_ETC.2": 14,
"FDP_ETC.2.1": 2,
"FDP_ETC.2.2": 1,
"FDP_ETC.2.3": 1,
"FDP_ETC.2.4": 2,
"FDP_IFC": 4,
"FDP_IFC.1": 33,
"FDP_IFC.1.1": 1,
"FDP_IFF": 3,
"FDP_IFF.1": 14,
"FDP_IFF.1.1": 2,
"FDP_IFF.1.2": 2,
"FDP_IFF.1.3": 2,
"FDP_IFF.1.4": 2,
"FDP_IFF.1.5": 2,
"FDP_IFF.1.6": 2,
"FDP_IFF.3": 7,
"FDP_IFF.3.1": 2,
"FDP_ITC": 3,
"FDP_ITC.1": 18,
"FDP_ITC.1.1": 2,
"FDP_ITC.1.2": 1,
"FDP_ITC.1.3": 2,
"FDP_ITC.2": 11,
"FDP_ITC.2.1": 2,
"FDP_ITC.2.2": 1,
"FDP_ITC.2.3": 1,
"FDP_ITC.2.4": 1,
"FDP_ITC.2.5": 2,
"FDP_ITT": 3,
"FDP_ITT.1": 3,
"FDP_ITT.2": 8,
"FDP_ITT.2.1": 3,
"FDP_ITT.2.2": 2,
"FDP_RIP": 2,
"FDP_RIP.2": 6,
"FDP_RIP.2.1": 1,
"FDP_SDI": 4,
"FDP_SDI.1": 6,
"FDP_SDI.2": 7,
"FDP_SDI.2.1": 2,
"FDP_SDI.2.2": 2,
"FDP_UCT": 1,
"FDP_UIT": 3,
"FDP_UIT.1": 13,
"FDP_UIT.1.1": 3,
"FDP_UIT.1.2": 2,
"FDP_UIT.3": 8,
"FDP_UIT.3.1": 2
},
"FIA": {
"FIA_AFL": 2,
"FIA_AFL.1": 8,
"FIA_AFL.1.1": 2,
"FIA_AFL.1.2": 2,
"FIA_ATD": 2,
"FIA_ATD.1": 10,
"FIA_ATD.1.1": 2,
"FIA_SOS": 2,
"FIA_SOS.1": 7,
"FIA_SOS.1.1": 1,
"FIA_SOS.2": 7,
"FIA_SOS.2.1": 2,
"FIA_SOS.2.2": 2,
"FIA_UAU": 2,
"FIA_UAU.1": 5,
"FIA_UAU.2": 15,
"FIA_UAU.2.1": 1,
"FIA_UAU.6": 7,
"FIA_UAU.6.1": 2,
"FIA_UAU.7": 6,
"FIA_UAU.7.1": 2,
"FIA_UID": 2,
"FIA_UID.1": 11,
"FIA_UID.2": 14,
"FIA_UID.2.1": 1,
"FIA_USB": 2,
"FIA_USB.1": 10,
"FIA_USB.1.1": 1
},
"FMT": {
"FMT_MOF": 2,
"FMT_MOF.1": 20,
"FMT_MOF.1.1": 3,
"FMT_MSA": 2,
"FMT_MSA.1": 22,
"FMT_MSA.1.1": 3,
"FMT_MSA.2": 19,
"FMT_MSA.2.1": 1,
"FMT_MSA.3": 18,
"FMT_MSA.3.1": 3,
"FMT_MSA.3.2": 2,
"FMT_MTD": 2,
"FMT_MTD.1": 24,
"FMT_MTD.1.1": 3,
"FMT_MTD.2": 11,
"FMT_MTD.2.1": 2,
"FMT_MTD.2.2": 2,
"FMT_MTD.3": 9,
"FMT_MTD.3.1": 1,
"FMT_REV": 2,
"FMT_REV.1": 8,
"FMT_REV.1.1": 3,
"FMT_REV.1.2": 2,
"FMT_SAE": 2,
"FMT_SAE.1": 9,
"FMT_SAE.1.1": 2,
"FMT_SAE.1.2": 2,
"FMT_SMR": 2,
"FMT_SMR.1": 15,
"FMT_SMR.2": 19,
"FMT_SMR.2.1": 1,
"FMT_SMR.2.2": 1,
"FMT_SMR.2.3": 1
},
"FPT": {
"FPT_AMT": 2,
"FPT_AMT.1": 10,
"FPT_AMT.1.1": 1,
"FPT_FLS": 2,
"FPT_FLS.1": 8,
"FPT_FLS.1.1": 2,
"FPT_ITI": 2,
"FPT_ITI.1": 10,
"FPT_ITI.1.1": 2,
"FPT_ITI.1.2": 2,
"FPT_ITT": 2,
"FPT_ITT.1": 10,
"FPT_ITT.1.1": 2,
"FPT_RCV": 2,
"FPT_RCV.1": 11,
"FPT_RCV.1.1": 1,
"FPT_RCV.4": 9,
"FPT_RCV.4.1": 2,
"FPT_RVM": 2,
"FPT_RVM.1": 5,
"FPT_RVM.1.1": 1,
"FPT_SEP": 3,
"FPT_SEP.1": 3,
"FPT_SEP.2": 3,
"FPT_SEP.3": 5,
"FPT_SEP.3.1": 1,
"FPT_SEP.3.2": 1,
"FPT_SEP.3.3": 1,
"FPT_SSP": 2,
"FPT_SSP.2": 7,
"FPT_SSP.2.1": 1,
"FPT_SSP.2.2": 1,
"FPT_STM": 2,
"FPT_STM.1": 14,
"FPT_STM.1.1": 1,
"FPT_TDC": 2,
"FPT_TDC.1": 8,
"FPT_TDC.1.1": 2,
"FPT_TDC.1.2": 2,
"FPT_TRC": 2,
"FPT_TRC.1": 7,
"FPT_TRC.1.1": 1,
"FPT_TRC.1.2": 2,
"FPT_TST": 3,
"FPT_TST.1": 15,
"FPT_TST.1.1": 3,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FRU": {
"FRU_PRS": 2,
"FRU_PRS.2": 7,
"FRU_PRS.2.1": 1,
"FRU_PRS.2.2": 1,
"FRU_RSA": 2,
"FRU_RSA.2": 7,
"FRU_RSA.2.1": 3,
"FRU_RSA.2.2": 3
},
"FTA": {
"FTA_MCS": 2,
"FTA_MCS.1": 1,
"FTA_MCS.2": 10,
"FTA_MCS.2.1": 2,
"FTA_MCS.2.2": 2,
"FTA_SSL": 2,
"FTA_SSL.1": 8,
"FTA_SSL.1.1": 2,
"FTA_SSL.1.2": 2,
"FTA_SSL.2": 8,
"FTA_SSL.2.1": 1,
"FTA_SSL.2.2": 2,
"FTA_SSL.3": 7,
"FTA_SSL.3.1": 2,
"FTA_TAB": 2,
"FTA_TAB.1": 8,
"FTA_TAB.1.1": 1,
"FTA_TAH": 2,
"FTA_TAH.1": 5,
"FTA_TAH.1.1": 2,
"FTA_TAH.1.2": 2,
"FTA_TAH.1.3": 1,
"FTA_TSE": 2,
"FTA_TSE.1": 10,
"FTA_TSE.1.1": 2
},
"FTP": {
"FTP_ITC": 2,
"FTP_ITC.1": 15,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 2,
"FTP_ITC.1.3": 2,
"FTP_TRP": 2,
"FTP_TRP.1": 13,
"FTP_TRP.1.1": 2,
"FTP_TRP.1.2": 2,
"FTP_TRP.1.3": 3
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 5
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 13
}
},
"side_channel_analysis": {
"FI": {
"Physical tampering": 6,
"malfunction": 7,
"physical tampering": 14
},
"other": {
"reverse engineering": 1
}
},
"standard_id": {
"FIPS": {
"FIPS 140": 1,
"FIPS 140-2": 4
}
},
"symmetric_crypto": {
"constructions": {
"MAC": {
"HMAC": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"pp_metadata": {
"/Author": "PKI PP working group",
"/CreationDate": "D:20020404184700",
"/Creator": "LaTeX",
"/Keywords": "digital signature, PKI, Protection Profile, Common Criteria",
"/Producer": "pdfeTeX-0.13d",
"/Subject": "A Protection Profile for PKI\u0027s",
"/Title": "The PKI Secure Kernel Protection Profile",
"pdf_file_size_bytes": 1953703,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 293
},
"report_filename": "Empty Document.pdf",
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bhavin",
"/CreationDate": "D:20130306113848Z00\u002700\u0027",
"/Creator": "PScript5.dll Version 5.2.2",
"/ModDate": "D:20130306113848Z00\u002700\u0027",
"/Producer": "GPL Ghostscript 9.06",
"/Title": "Microsoft Word - Empty Document.doc",
"pdf_file_size_bytes": 3479,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 1
}
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "0144f5726e6401781c6fd0bebb0de9fee1a2ca030d2eac2bcd9c9e60a1e70848",
"txt_hash": "cd81e8c2019aa7ef21b41785def4d08f46ee996eb64be4c77cc28df867d799f2"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "354736a67ad8712f0f9f1d16a20236495ed00af0334cc4fe8c37e1b6cc32815e",
"txt_hash": "ef6cbd2161eaea7943ce8693b9824d23d1793ffb1c0fca05b600d3899b44c977"
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "Key Management Systems",
"is_collaborative": false,
"maintenances": [],
"name": "PKI Secure Kernel Protection Profile 1.1",
"not_valid_after": "2013-03-05",
"not_valid_before": "2002-04-01",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PKISKPP v1.1.pdf",
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/Empty Document.pdf",
"scheme": "UK",
"security_level": {
"_type": "Set",
"elements": [
"EAL4"
]
},
"status": "archived",
"version": "1.1"
}
}