This page was not yet optimized for use on mobile devices.
Extended Package for Web Browsers v2.0
Web information ?
Status: activeCertification date: 2015-06-16
Scheme: 🇺🇸
Category: Other Devices and Systems
Security level: EAL1
Certification report ?
Profile ?
Extracted keywords
Protocols
SSL, TLS 1.2, TLSVendor
MicrosoftClaims
O.INTEGRITY, O.MANAGEMENT, O.PROTECTED_STORAGE, O.PROTECTED_COMMS, O.DOMAIN_ISOLATION, O.ADDON_INTEGRITY, T.FLAWED_ADDON, T.NETWORK_ATTACKSecurity Functional Requirements (SFR)
FCS_CKM.1.1, FCS_CKM.2.1, FCS_COP.1.1, FCS_DTLS_EXT.1, FCS_RBG_EXT.2, FCS_TLSC_EXT.1, FCS_STS_EXT.1, FCS_STS_EXT.1.1, FCS_STS_EXT.1.3, FDP_TRK_EXT.1, FDP_COO_EXT.1, FDP_PST_EXT.1, FDP_STR_EXT.1, FDP_ACF_EXT.1.1, FDP_SBX_EXT.1, FDP_SOP_EXT.1, FDP_ACF_EXT.1, FDP_COO_EXT.1.1, FDP_SBX_EXT.1.1, FDP_SOP_EXT.1.1, FDP_SOP_EXT.1.2, FDP_STR_EXT.1.1, FDP_TRK_EXT.1.1, FDP_PST_EXT.1.1, FMT_MOF_EXT.1, FMT_MOF_EXT.1.1, FMT_MOF.1.1, FPT_DNL_EXT.1, FPT_MCD_EXT.1, FPT_INT_EXT.1, FPT_INT_EXT.2, FPT_AON_EXT.1, FPT_AON_EXT.2, FPT_DNL_EXT.1.1, FPT_DNL_EXT.1.2, FPT_MCD_EXT.1.1, FPT_MCD_EXT.1.2, FPT_AON_EXT.1.1, FPT_AON_EXT.2.1, FPT_AON_EXT.2.2, FPT_AON_EXT.2.3, FPT_INT_EXT.1.1, FPT_INT_EXT.2.1Standards
RFC 6454, RFC 6265, RFC 6797, RFC 5246, RFC 2818, X.509References ?
- Apple iOS 11 Safari archived
- Apple iOS 12 Safari archived
- Apple iOS 13 and iPadOS 13: Safari archived
Updates ?
-
04.02.2025 The protection profile was first processed.
New Protection Profile
A new Protection Profile with the name Extended Package for Web Browsers v2.0 was processed.
Raw data
{
"_id": "c5080f741829d2e9",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "c5080f741829d2e9",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "pp_app_webbrowser_ep_v2.0.pdf",
"pp_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"O": {
"O.ADDON_INTEGRITY": 1,
"O.DOMAIN_ISOLATION": 1,
"O.INTEGRITY": 1,
"O.MANAGEMENT": 1,
"O.PROTECTED_COMMS": 1,
"O.PROTECTED_STORAGE": 1
},
"T": {
"T.FLAWED_ADDON": 1,
"T.NETWORK_ATTACK": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {},
"cc_sfr": {
"FCS": {
"FCS_CKM.1.1": 1,
"FCS_CKM.2.1": 1,
"FCS_COP.1.1": 1,
"FCS_DTLS_EXT.1": 1,
"FCS_RBG_EXT.2": 1,
"FCS_STS_EXT.1": 2,
"FCS_STS_EXT.1.1": 1,
"FCS_STS_EXT.1.3": 1,
"FCS_TLSC_EXT.1": 1
},
"FDP": {
"FDP_ACF_EXT.1": 1,
"FDP_ACF_EXT.1.1": 2,
"FDP_COO_EXT.1": 2,
"FDP_COO_EXT.1.1": 1,
"FDP_PST_EXT.1": 2,
"FDP_PST_EXT.1.1": 2,
"FDP_SBX_EXT.1": 2,
"FDP_SBX_EXT.1.1": 1,
"FDP_SOP_EXT.1": 2,
"FDP_SOP_EXT.1.1": 1,
"FDP_SOP_EXT.1.2": 1,
"FDP_STR_EXT.1": 2,
"FDP_STR_EXT.1.1": 1,
"FDP_TRK_EXT.1": 2,
"FDP_TRK_EXT.1.1": 1
},
"FMT": {
"FMT_MOF.1.1": 2,
"FMT_MOF_EXT.1": 3,
"FMT_MOF_EXT.1.1": 1
},
"FPT": {
"FPT_AON_EXT.1": 2,
"FPT_AON_EXT.1.1": 4,
"FPT_AON_EXT.2": 3,
"FPT_AON_EXT.2.1": 2,
"FPT_AON_EXT.2.2": 1,
"FPT_AON_EXT.2.3": 1,
"FPT_DNL_EXT.1": 2,
"FPT_DNL_EXT.1.1": 1,
"FPT_DNL_EXT.1.2": 1,
"FPT_INT_EXT.1": 2,
"FPT_INT_EXT.1.1": 1,
"FPT_INT_EXT.2": 2,
"FPT_INT_EXT.2.1": 1,
"FPT_MCD_EXT.1": 2,
"FPT_MCD_EXT.1.1": 1,
"FPT_MCD_EXT.1.2": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 1
},
"TLS": {
"TLS": 1,
"TLS 1.2": 1
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"RFC": {
"RFC 2818": 1,
"RFC 5246": 1,
"RFC 6265": 2,
"RFC 6454": 2,
"RFC 6797": 1
},
"X509": {
"X.509": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 2
}
},
"vulnerability": {}
},
"pp_metadata": null,
"report_filename": "pp_app_webbrowser_ep_v2.0-vr.docx",
"report_keywords": null,
"report_metadata": null
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": false,
"pdf_hash": "625ede0a66f5115e6199b72a956a31675d0e9cbf5ec534891a05d9825c303cf3",
"txt_hash": "41a9098f3a435a1f6ab73c37844f3884eb44b4a7ecb94b39526c4fcc039e9961"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": true,
"convert_ok": false,
"download_ok": true,
"extract_ok": false,
"pdf_hash": "9c498aca40904675a8a4f4f62ed330d5f106caa9bffd25685dcb2eb4f3ff2cf2",
"txt_hash": null
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "Other Devices and Systems",
"is_collaborative": false,
"maintenances": [],
"name": "Extended Package for Web Browsers v2.0",
"not_valid_after": null,
"not_valid_before": "2015-06-16",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_app_webbrowser_ep_v2.0.pdf",
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_app_webbrowser_ep_v2.0-vr.docx",
"scheme": "US",
"security_level": {
"_type": "Set",
"elements": [
"EAL1"
]
},
"status": "active",
"version": "2.0"
}
}