[{ "_id": { "$oid": "669f80cd566b7c5a180589bd" }, "run_id": { "$oid": "669f8076566b7c5a1805773d" }, "dgst": "1412d1d9e0d553c1", "timestamp": { "$date": "2024-07-23T00:09:57.927Z" }, "type": "new", "diff": { "_type": "sec_certs.sample.cc.CCCertificate", "dgst": "1412d1d9e0d553c1", "status": "active", "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems", "name": "Plateforme Java Card MultiApp V4.2 en configuration ouverte sur le composant IFX_CCI_000010h (Version 4.2.0, Java Card version 3.0.5, GP version 2.3)", "manufacturer": "THALES DIS FRANCE SA", "scheme": "FR", "security_level": { "_type": "set", "_value": [ "AVA_VAN.5", "ALC_DVS.2", "EAL5+" ] }, "not_valid_before": { "_type": "date", "_value": "2021-09-28" }, "not_valid_after": { "_type": "date", "_value": "2025-06-26" }, "report_link": "https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2020_65v2.pdf", "st_link": "https://www.commoncriteriaportal.org/files/epfiles/cible-anssi-cc-2020-65v2.pdf", "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2020-65v2.pdf", "manufacturer_web": "https://www.thalesgroup.com/en/europe/france", "protection_profiles": { "_type": "set", "_value": [ { "_type": "sec_certs.sample.protection_profile.ProtectionProfile", "pp_name": "Java Card Protection Profile - Open Configuration", "pp_eal": null, "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0099b_pdf.pdf", "pp_ids": null } ] }, "maintenance_updates": { "_type": "set", "_value": [] }, "state": { "_type": "sec_certs.sample.cc.CCCertificate.InternalState", "report": { "_type": "sec_certs.sample.cc.CCCertificate.DocumentState", "download_ok": true, "convert_garbage": false, "convert_ok": true, "extract_ok": true, "pdf_hash": "8dd4c4edd973a7e452c641db48c8eb33354f85e05844f701c90561e1c43a694d", "txt_hash": "7483bc89235d6fc41cffa0952905a7fa4ea415e2556190e4f0b0c48e132685ed" }, "st": { "_type": "sec_certs.sample.cc.CCCertificate.DocumentState", "download_ok": true, "convert_garbage": false, "convert_ok": true, "extract_ok": true, "pdf_hash": "9ec9bc244cd2cdfa133da188f67f6302f7086acec87b2c453d19e5b906713150", "txt_hash": "fe1f6fa6f2e466702df203929aa00510b8e554f774195f4ef29eddf064801fdb" }, "cert": { "_type": "sec_certs.sample.cc.CCCertificate.DocumentState", "download_ok": true, "convert_garbage": false, "convert_ok": true, "extract_ok": true, "pdf_hash": "4cd0982b954a019eb3c343c539948aa268bca50a5e1b79de557393146da50220", "txt_hash": "0a56c1990efb616ab129cad19db0ced8506235cb7e0511dfe8713d97d01153c0" } }, "pdf_data": { "_type": "sec_certs.sample.cc.CCCertificate.PdfData", "report_metadata": { "pdf_file_size_bytes": 349522, "pdf_is_encrypted": false, "pdf_number_of_pages": 21, "/Author": "", "/CreationDate": "D:20211004103519+02'00'", "/Creator": "PScript5.dll Version 5.2.2", "/ModDate": "D:20211004103519+02'00'", "/Producer": "Acrobat Distiller 11.0 (Windows)", "/Title": "", "pdf_hyperlinks": { "_type": "set", "_value": [] } }, "st_metadata": { "pdf_file_size_bytes": 2496334, "pdf_is_encrypted": false, "pdf_number_of_pages": 157, "/Title": "MultiApp V4.2: JCS Security Target", "/Author": "D1487827", "/Subject": "1.18", "/Keywords": "04-05-2021", "/Creator": "Microsoft® Word 2013", "/CreationDate": "D:20210505092700+02'00'", "/ModDate": "D:20210505092700+02'00'", "/Producer": "Microsoft® Word 2013", "pdf_hyperlinks": { "_type": "set", "_value": [] } }, "cert_metadata": { "pdf_file_size_bytes": 280367, "pdf_is_encrypted": false, "pdf_number_of_pages": 2, "/Author": "", "/CreationDate": "D:20211004103608+02'00'", "/Creator": "PScript5.dll Version 5.2.2", "/ModDate": "D:20211004103608+02'00'", "/Producer": "Acrobat Distiller 11.0 (Windows)", "/Title": "", "pdf_hyperlinks": { "_type": "set", "_value": [] } }, "report_frontpage": { "FR": {} }, "st_frontpage": null, "cert_frontpage": null, "report_keywords": { "cc_cert_id": { "DE": { "BSI-DSZ-CC-1079-2018-MA-01": 1 }, "FR": { "ANSSI-CC-2020/65v2": 2, "ANSSI-CC-2020/65": 3 } }, "cc_protection_profile_id": { "BSI": { "BSI-CC-PP-0099-2017": 1, "BSI-PP-0099-2017": 1, "BSI-PP-0084-2014": 1 } }, "cc_security_level": { "EAL": { "EAL 5": 3, "EAL2": 2, "EAL7": 1, "EAL 1": 1, "EAL 3": 1, "EAL 7": 1 }, "ITSEC": { "ITSEC E6 Elevé": 1 } }, "cc_sar": { "ADV": { "ADV_ARC": 1, "ADV_FSP": 1, "ADV_IMP": 1, "ADV_INT": 1, "ADV_SPM": 1, "ADV_TDS": 1 }, "AGD": { "AGD_OPE": 2, "AGD_PRE": 2 }, "ALC": { "ALC_DVS.2": 2, "ALC_FLR": 2, "ALC_CMC": 1, "ALC_CMS": 1, "ALC_DEL": 1, "ALC_DVS": 1, "ALC_TAT": 1 }, "ATE": { "ATE_COV": 1, "ATE_DPT": 1, "ATE_FUN": 1, "ATE_IND": 1 }, "AVA": { "AVA_VAN.5": 4, "AVA_VAN": 2 }, "ASE": { "ASE_CCL": 1, "ASE_ECD": 1, "ASE_INT": 1, "ASE_OBJ": 1, "ASE_REQ": 1, "ASE_SPD": 1, "ASE_TSS": 1 } }, "cc_sfr": {}, "cc_claims": {}, "vendor": { "Infineon": { "Infineon Technologies AG": 1 }, "Gemalto": { "Gemalto": 5 }, "Microsoft": { "Microsoft": 1 } }, "eval_facility": { "Serma": { "SERMA": 1 }, "CESTI": { "CESTI": 1 } }, "symmetric_crypto": { "DES": { "DES": { "DES": 1 } } }, "asymmetric_crypto": {}, "pq_crypto": {}, "hash_function": {}, "crypto_scheme": {}, "crypto_protocol": { "PACE": { "PACE": 2 } }, "randomness": {}, "cipher_mode": {}, "ecc_curve": {}, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": {}, "technical_report_id": {}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": { "ICFab": { "IC Fabricator": 1 } }, "ic_data_group": {}, "standard_id": { "BSI": { "AIS31": 1, "AIS 31": 1 }, "CC": { "CCMB-2017-04-001": 1, "CCMB-2017-04-002": 1, "CCMB-2017-04-003": 1 } }, "javacard_version": { "JavaCard": { "Java Card 3.0.5": 3 } }, "javacard_api_const": {}, "javacard_packages": { "java": { "java.lang": 1, "java.io": 1 }, "javacard": { "javacard.framework": 1, "javacard.filesystem": 1, "javacard.util": 1, "javacard.open": 1, "javacard.internal": 1, "javacard.ism": 1, "javacard.securemessaging": 1, "javacard.securemessaging.builde": 1, "javacard.securemessaging.intern": 1, "javacard.security": 1, "javacard.tlv": 1, "javacard.iasclassic": 1, "javacard.icao": 1, "javacard.mspnp": 1, "javacard.conformance": 1, "javacard.gpimage": 1 }, "javacardx": { "javacardx.apdu": 1, "javacardx.crypto": 2, "javacardx.gap": 1, "javacardx.gapplet": 1, "javacardx.biometry": 2, "javacardx.crypto.asymmetric.ecc": 1, "javacardx.crypto.asymmetric.rsa": 1, "javacardx.apdu.util": 1, "javacardx.biometry.biocfg": 1, "javacardx.gdp": 1 }, "org": { "org.globalplatform": 1 }, "com": { "com.gemalto.javacard.filesystem": 1, "com.gemalto.javacard.util": 1, "com.gemalto.javacardx.crypto": 1, "com.gemalto.javacard.open": 1, "com.gemalto.javacardx.gapplet": 1, "com.gemalto.javacard.ism": 1, "com.gemalto.javacard.securemessaging.builde": 1, "com.gemalto.javacard.securemessaging.intern": 1, "com.gemalto.javacard.security": 1, "com.gemalto.javacardx": 1, "com.gemalto.javacardx.biometry": 1, "com.gemalto.javacardx.crypto.asymmetric.rsa": 1, "com.gemalto.javacard.iasclassic": 1, "com.gemalto.moc.server": 1, "com.gemalto.javacard.mspnp": 1, "com.gemalto.javacardx.biometry.biocfg": 1, "com.gemalto.emvapi": 1 } }, "certification_process": {} }, "st_keywords": { "cc_cert_id": { "DE": { "BSI-DSZ-CC-1079-2018": 1, "BSI-DSZ-CC-1079-2018-MA-01": 1 }, "NL": { "CC-1": 2, "CC-2": 3, "CC-3": 3 } }, "cc_protection_profile_id": { "BSI": { "BSI-CC-PP-0084-2014": 1, "BSI-CC-PP-0099-2017": 1, "BSI-CC-PP- 0068-V2-2011-MA-01": 1, "BSI-PP- 0055-2009": 1 } }, "cc_security_level": { "EAL": { "EAL 5+": 1, "EAL6": 1, "EAL6+": 1, "EAL5+": 1, "EAL5": 6, "EAL 6+": 1, "EAL6 augmented": 1, "EAL5 augmented": 2 } }, "cc_sar": { "ADV": { "ADV_ARC.1": 7, "ADV_TDS.1": 2, "ADV_TDS.4": 7, "ADV_IMP.1": 7, "ADV_TDS.3": 4, "ADV_INT.2": 1, "ADV_FSP.5": 4, "ADV_FSP.1": 1, "ADV_FSP.2": 2, "ADV_FSP.4": 2, "ADV_ARC": 1, "ADV_FSP": 1, "ADV_IMP": 1, "ADV_TDS": 1 }, "AGD": { "AGD_PRE": 2, "AGD_OPE": 2, "AGD_OPE.1": 7, "AGD_PRE.1": 6 }, "ALC": { "ALC_DVS.2": 7, "ALC_TAT.1": 2, "ALC_TAT.2": 3, "ALC_CMC.4": 1, "ALC_DVS.1": 2, "ALC_LCD.1": 3, "ALC_DEL.1": 1 }, "ATE": { "ATE_COV.2": 2, "ATE_FUN.1": 6, "ATE_COV.1": 2, "ATE_IND.2": 1, "ATE_DPT.1": 2, "ATE_DPT.3": 1 }, "AVA": { "AVA_VAN.5": 7 } }, "cc_sfr": { "FAU": { "FAU_ARP.1": 16, "FAU_ARP.1.1": 1, "FAU_SAA.1": 2 }, "FCO": { "FCO_NRO": 5, "FCO_NRO.2": 3 }, "FCS": { "FCS_RNG": 18, "FCS_CKM": 46, "FCS_COP": 35, "FCS_RNG.1": 8, "FCS_RNG.1.1": 3, "FCS_RNG.1.2": 3, "FCS_CKM.1": 27, "FCS_CKM.1.1": 3, "FCS_CKM.4": 21, "FCS_CKM.4.1": 2, "FCS_COP.1": 24, "FCS_COP.1.1": 5 }, "FDP": { "FDP_ACF": 30, "FDP_ACC": 35, "FDP_ACC.2": 6, "FDP_ACF.1": 16, "FDP_IFC": 20, "FDP_IFC.1": 12, "FDP_IFF": 13, "FDP_IFF.1": 17, "FDP_RIP": 98, "FDP_RIP.1": 11, "FDP_ROL.1": 5, "FDP_ROL": 14, "FDP_SDI": 6, "FDP_SDI.2": 3, "FDP_ITC": 10, "FDP_ITC.2": 15, "FDP_IFC.2": 2, "FDP_UIT": 5, "FDP_UIT.1": 2, "FDP_ACC.1": 14, "FDP_ITC.1": 10, "FDP_RIP.1.1": 1 }, "FIA": { "FIA_AFL": 21, "FIA_ATD": 7, "FIA_ATD.1": 2, "FIA_UID": 33, "FIA_UID.2": 1, "FIA_USB": 6, "FIA_USB.1": 3, "FIA_UAU": 50, "FIA_UAU.1": 6, "FIA_UID.1": 18, "FIA_UAU.4": 1, "FIA_AFL.1.1": 2, "FIA_AFL.1.2": 2, "FIA_UID.1.1": 2, "FIA_UID.1.2": 2, "FIA_UAU.1.1": 2, "FIA_UAU.1.2": 2, "FIA_UAU.4.1": 1, "FIA_UAU.5.1": 1, "FIA_UAU.5.2": 1, "FIA_UAU.6.1": 1 }, "FMT": { "FMT_LIM": 18, "FMT_LIM.1": 15, "FMT_LIM.2": 14, "FMT_LIM.1.1": 3, "FMT_LIM.2.1": 3, "FMT_MSA": 73, "FMT_MSA.1": 11, "FMT_MSA.2": 2, "FMT_MSA.3": 17, "FMT_SMR": 62, "FMT_SMR.1": 29, "FMT_SMF": 50, "FMT_SMF.1": 19, "FMT_MTD": 31, "FMT_MTD.1": 9, "FMT_MTD.3": 1, "FMT_SMF.1.1": 2, "FMT_SMR.1.1": 2, "FMT_SMR.1.2": 2 }, "FPR": { "FPR_UNO.1": 10, "FPR_UNO.1.1": 1, "FPR_UNO": 5 }, "FPT": { "FPT_EMS": 4, "FPT_TST": 7, "FPT_EMS.1": 12, "FPT_EMS.1.1": 3, "FPT_EMS.1.2": 3, "FPT_FLS": 34, "FPT_FLS.1": 14, "FPT_TDC.1": 7, "FPT_TDC.1.1": 1, "FPT_TDC.1.2": 1, "FPT_RCV": 12, "FPT_RCV.3": 7, "FPT_FLS.1.1": 2, "FPT_TST.1": 13, "FPT_PHP": 5, "FPT_PHP.3": 12, "FPT_RCV.4": 2, "FPT_ITT": 5, "FPT_ITT.1": 1, "FPT_TST.1.1": 1, "FPT_TST.1.2": 1, "FPT_TST.1.3": 1, "FPT_PHP.3.1": 1 }, "FTP": { "FTP_ITC": 14, "FTP_ITC.1": 5, "FTP_ITC.1.1": 1, "FTP_ITC.1.2": 1, "FTP_ITC.1.3": 1, "FTP_TRP.1": 2 } }, "cc_claims": { "D": { "D.APP_CODE": 6, "D.APP_C_DATA": 3, "D.APP_I_DATA": 5, "D.PIN": 4, "D.BIO": 1, "D.API_DATA": 3, "D.CRYPTO": 5, "D.JCS_CODE": 3, "D.JCS_DATA": 5, "D.SEC_DATA": 7 }, "O": { "O.SID": 13, "O.FIREWALL": 12, "O.GLOBAL_ARRAYS_CONFID": 9, "O.GLOBAL_ARRAYS_INTEG": 5, "O.NATIVE": 11, "O.OPERATE": 15, "O.REALLOCATION": 5, "O.RESOURCES": 9, "O.ALARM": 15, "O.CIPHER": 11, "O.RNG": 9, "O.KEY-MNGT": 7, "O.PIN-MNGT": 6, "O.TRANSACTION": 7, "O.BIO-MNGT": 7, "O.OBJ-DELETION": 4, "O.DELETION": 5, "O.LOAD": 10, "O.INSTALL": 8, "O.SCP": 32, "O.CARD-MANAGEMENT": 2, "O.PIN_MNGT": 1, "O.KEY_MNGT": 1, "O.CARD_MANAGEMENT": 17, "O.PIN-": 1, "O.RND": 3, "O.TDES": 1, "O.AES": 1, "O.APPLET": 28, "O.CODE_PKG": 7, "O.JAVAOBJECT": 66, "O.CODE_PCKG": 16, "O.OBJ_DELETION": 3 }, "T": { "T.CONFID-APPLI-DATA": 4, "T.CONFID-JCS-CODE": 4, "T.CONFID-JCS-DATA": 4, "T.INTEG-APPLI-CODE": 7, "T.INTEG-APPLI-DATA": 8, "T.INTEG-JCS-CODE": 3, "T.INTEG-JCS-DATA": 4, "T.SID": 8, "T.EXE-CODE": 8, "T.NATIVE": 4, "T.RESOURCES": 3, "T.DELETION": 3, "T.INSTALL": 4, "T.OBJ-DELETION": 4, "T.PHYSICAL": 4 }, "A": { "A.APPLET": 5, "A.DELETION": 4, "A.VERIFICATION": 4 }, "R": { "R.JAVA": 10 }, "OT": { "OT.X": 1 }, "OP": { "OP.ARRAY_ACCESS": 7, "OP.ARRAY_LENGTH": 3, "OP.ARRAY_AASTORE": 3, "OP.CREATE": 11, "OP.DELETE_APPLET": 6, "OP.DELETE_PCKG": 4, "OP.DELETE_PCKG_APPLET": 4, "OP.INSTANCE_FIELD": 6, "OP.INVK_VIRTUAL": 8, "OP.INVK_INTERFACE": 10, "OP.JAVA": 8, "OP.THROW": 7, "OP.TYPE_ACCESS": 7, "OP.PUT": 8, "OP.PUTFIELD": 1, "OP.PUTSTATIC": 1 }, "OE": { "OE.APPLET": 4, "OE.VERIFICATION": 25, "OE.CODE-EVIDENCE": 10, "OE.CODE_EVIDENCE": 1, "OE.CARD-MANAGEMENT": 1 }, "OSP": { "OSP.VERIFICATION": 4, "OSP.RNG": 1, "OSP.RND": 3 } }, "vendor": { "Infineon": { "Infineon": 15, "Infineon Technologies AG": 2 }, "Gemalto": { "Gemalto": 30 }, "Thales": { "Thales": 1 }, "Microsoft": { "Microsoft": 1 } }, "eval_facility": { "Serma": { "Serma Safety & Security": 1 } }, "symmetric_crypto": { "AES_competition": { "AES": { "AES": 28 } }, "DES": { "DES": { "DES": 20 }, "3DES": { "TDEA": 1, "3DES": 2, "TDES": 15, "Triple-DES": 3 } }, "constructions": { "MAC": { "HMAC": 2, "KMAC": 2, "CMAC": 2 } } }, "asymmetric_crypto": { "ECC": { "ECDH": { "ECDH": 6 }, "ECDSA": { "ECDSA": 3 }, "ECC": { "ECC": 10 } }, "FF": { "DH": { "Diffie-Hellman": 4, "DH": 8 } } }, "pq_crypto": {}, "hash_function": { "SHA": { "SHA1": { "SHA1": 2, "SHA-1": 4 }, "SHA2": { "SHA-224": 4, "SHA224": 3, "SHA256": 1, "SHA384": 1, "SHA512": 1, "SHA-256": 4, "SHA-512": 4, "SHA-384": 2 } } }, "crypto_scheme": { "MAC": { "MAC": 16 }, "KA": { "Key Agreement": 3, "Key agreement": 2 } }, "crypto_protocol": { "PACE": { "PACE": 162 } }, "randomness": { "RNG": { "RNG": 32, "RND": 6 } }, "cipher_mode": { "CBC": { "CBC": 2 } }, "ecc_curve": {}, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": { "SCA": { "Leak-Inherent": 5, "physical probing": 6, "DPA": 2, "SPA": 1, "timing attacks": 1 }, "FI": { "physical tampering": 1, "Physical Tampering": 3, "malfunction": 8, "Malfunction": 9, "fault induction": 2 } }, "technical_report_id": {}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": { "ICFab": { "IC Fabricator": 1 }, "ICType": { "IC Type": 1 } }, "ic_data_group": { "EF": { "EF.DG1": 6, "EF.DG16": 6 } }, "standard_id": { "FIPS": { "FIPS180-2": 1, "FIPS197": 5, "FIPS 140-2": 3, "FIPS 46-3": 1, "FIPS 197": 1 }, "NIST": { "SP 800-67": 1 }, "PKCS": { "PKCS#1": 8, "PKCS#5": 5 }, "BSI": { "AIS31": 4, "AIS 31": 1 }, "ISO": { "ISO/IEC 7816-2": 1 }, "ICAO": { "ICAO": 1 }, "SCP": { "SCP01": 6, "SCP02": 6, "SCP03": 5 }, "CC": { "CCMB-2017-04-001": 1, "CCMB-2017-04-002": 1, "CCMB-2017-04-003": 1, "CCMB-2017-04-004": 1 } }, "javacard_version": { "JavaCard": { "Java Card 2.2.2": 3, "Java Card 3.0.5": 5 } }, "javacard_api_const": { "misc": { "TYPE_ACCESS": 7 } }, "javacard_packages": { "java": { "java.lang": 1 }, "javacard": { "javacard.security": 3, "javacard.framework": 3 }, "javacardx": { "javacardx.biometry": 1, "javacardx.crypto": 2 } }, "certification_process": { "OutOfScope": { "out of scope": 1, "a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are": 1 } } }, "cert_keywords": { "cc_cert_id": { "FR": { "ANSSI-CC-2020/65v2": 2 } }, "cc_protection_profile_id": { "BSI": { "BSI-PP-0099-2": 1 } }, "cc_security_level": { "EAL": { "EAL5": 1, "EAL2": 1 } }, "cc_sar": { "ALC": { "ALC_DVS.2": 1 }, "AVA": { "AVA_VAN.5": 1 } }, "cc_sfr": {}, "cc_claims": {}, "vendor": {}, "eval_facility": { "Serma": { "SERMA": 2 } }, "symmetric_crypto": {}, "asymmetric_crypto": {}, "pq_crypto": {}, "hash_function": {}, "crypto_scheme": {}, "crypto_protocol": {}, "randomness": {}, "cipher_mode": {}, "ecc_curve": {}, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": {}, "technical_report_id": {}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": {}, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": {} }, "report_filename": "anssi-cc-2020_65v2.pdf", "st_filename": "cible-anssi-cc-2020-65v2.pdf", "cert_filename": "certificat-anssi-cc-2020-65v2.pdf" }, "heuristics": { "_type": "sec_certs.sample.cc.CCCertificate.Heuristics", "extracted_versions": { "_type": "set", "_value": [ "4.2", "2.3", "3.0.5", "4.2.0" ] }, "cpe_matches": null, "verified_cpe_matches": null, "related_cves": null, "cert_lab": null, "cert_id": "ANSSI-CC-2020/65v2", "st_references": { "_type": "sec_certs.sample.certificate.References", "directly_referenced_by": null, "indirectly_referenced_by": null, "directly_referencing": { "_type": "set", "_value": [ "BSI-DSZ-CC-1079-2018" ] }, "indirectly_referencing": { "_type": "set", "_value": [ "BSI-DSZ-CC-1079-2018" ] } }, "report_references": { "_type": "sec_certs.sample.certificate.References", "directly_referenced_by": null, "indirectly_referenced_by": null, "directly_referencing": { "_type": "set", "_value": [ "ANSSI-CC-2020/65" ] }, "indirectly_referencing": { "_type": "set", "_value": [ "ANSSI-CC-2020/65" ] } }, "annotated_references": null, "extracted_sars": { "_type": "set", "_value": [ { "_type": "sec_certs.sample.sar.SAR", "family": "ATE_IND", "level": 2 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AGD_PRE", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ATE_COV", "level": 2 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_LCD", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_DVS", "level": 2 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AVA_VAN", "level": 5 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ADV_IMP", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_DEL", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_TAT", "level": 2 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ADV_FSP", "level": 5 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ADV_TDS", "level": 4 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ADV_INT", "level": 2 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ADV_ARC", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_CMC", "level": 4 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ATE_FUN", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AGD_OPE", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ATE_DPT", "level": 3 } ] }, "direct_transitive_cves": null, "indirect_transitive_cves": null, "scheme_data": null }, "_id": "1412d1d9e0d553c1" } }, { "_id": { "$oid": "66ba44469466f606341751d7" }, "run_id": { "$oid": "66ba432a9466f606341743a8" }, "dgst": "1412d1d9e0d553c1", "timestamp": { "$date": "2024-08-12T12:00:07.61Z" }, "type": "change", "diff": { "__update__": { "state": { "__update__": { "report": { "__update__": { "download_ok": false, "convert_ok": false, "extract_ok": false, "pdf_hash": null, "txt_hash": null } } } }, "pdf_data": { "__update__": { "report_metadata": null, "report_frontpage": null, "report_keywords": null, "report_filename": null } }, "heuristics": { "__update__": { "report_references": { "__update__": { "directly_referencing": null, "indirectly_referencing": null } } } } } } }, { "_id": { "$oid": "66c0a10b1c78507fd1060544" }, "run_id": { "$oid": "66c0a0e21c78507fd105fc06" }, "dgst": "1412d1d9e0d553c1", "timestamp": { "$date": "2024-08-17T12:52:18.171Z" }, "type": "change", "diff": { "__update__": { "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_65v2.pdf", "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible-anssi-cc-2020-65v2.pdf", "state": { "__update__": { "report": { "__update__": { "download_ok": true, "convert_ok": true, "extract_ok": true, "pdf_hash": "8dd4c4edd973a7e452c641db48c8eb33354f85e05844f701c90561e1c43a694d", "txt_hash": "7483bc89235d6fc41cffa0952905a7fa4ea415e2556190e4f0b0c48e132685ed" } }, "st": { "__update__": { "download_ok": false, "convert_ok": false, "extract_ok": false, "pdf_hash": null, "txt_hash": null } }, "cert": { "__update__": { "download_ok": false, "convert_ok": false, "extract_ok": false, "pdf_hash": null, "txt_hash": null } } } }, "pdf_data": { "__update__": { "report_metadata": { "pdf_file_size_bytes": 349522, "pdf_is_encrypted": false, "pdf_number_of_pages": 21, "/Author": "", "/CreationDate": "D:20211004103519+02'00'", "/Creator": "PScript5.dll Version 5.2.2", "/ModDate": "D:20211004103519+02'00'", "/Producer": "Acrobat Distiller 11.0 (Windows)", "/Title": "", "pdf_hyperlinks": { "_type": "set", "_value": [] } }, "st_metadata": null, "cert_metadata": null, "report_frontpage": { "FR": {} }, "report_keywords": { "cc_cert_id": { "DE": { "BSI-DSZ-CC-1079-2018-MA-01": 1 }, "FR": { "ANSSI-CC-2020/65v2": 2, "ANSSI-CC-2020/65": 3 } }, "cc_protection_profile_id": { "BSI": { "BSI-CC-PP-0099-2017": 1, "BSI-PP-0099-2017": 1, "BSI-PP-0084-2014": 1 } }, "cc_security_level": { "EAL": { "EAL 5": 3, "EAL2": 2, "EAL7": 1, "EAL 1": 1, "EAL 3": 1, "EAL 7": 1 }, "ITSEC": { "ITSEC E6 Elevé": 1 } }, "cc_sar": { "ADV": { "ADV_ARC": 1, "ADV_FSP": 1, "ADV_IMP": 1, "ADV_INT": 1, "ADV_SPM": 1, "ADV_TDS": 1 }, "AGD": { "AGD_OPE": 2, "AGD_PRE": 2 }, "ALC": { "ALC_DVS.2": 2, "ALC_FLR": 2, "ALC_CMC": 1, "ALC_CMS": 1, "ALC_DEL": 1, "ALC_DVS": 1, "ALC_TAT": 1 }, "ATE": { "ATE_COV": 1, "ATE_DPT": 1, "ATE_FUN": 1, "ATE_IND": 1 }, "AVA": { "AVA_VAN.5": 4, "AVA_VAN": 2 }, "ASE": { "ASE_CCL": 1, "ASE_ECD": 1, "ASE_INT": 1, "ASE_OBJ": 1, "ASE_REQ": 1, "ASE_SPD": 1, "ASE_TSS": 1 } }, "cc_sfr": {}, "cc_claims": {}, "vendor": { "Infineon": { "Infineon Technologies AG": 1 }, "Gemalto": { "Gemalto": 5 }, "Microsoft": { "Microsoft": 1 } }, "eval_facility": { "Serma": { "SERMA": 1 }, "CESTI": { "CESTI": 1 } }, "symmetric_crypto": { "DES": { "DES": { "DES": 1 } } }, "asymmetric_crypto": {}, "pq_crypto": {}, "hash_function": {}, "crypto_scheme": {}, "crypto_protocol": { "PACE": { "PACE": 2 } }, "randomness": {}, "cipher_mode": {}, "ecc_curve": {}, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": {}, "technical_report_id": {}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": { "ICFab": { "IC Fabricator": 1 } }, "ic_data_group": {}, "standard_id": { "BSI": { "AIS31": 1, "AIS 31": 1 }, "CC": { "CCMB-2017-04-001": 1, "CCMB-2017-04-002": 1, "CCMB-2017-04-003": 1 } }, "javacard_version": { "JavaCard": { "Java Card 3.0.5": 3 } }, "javacard_api_const": {}, "javacard_packages": { "java": { "java.lang": 1, "java.io": 1 }, "javacard": { "javacard.framework": 1, "javacard.filesystem": 1, "javacard.util": 1, "javacard.open": 1, "javacard.internal": 1, "javacard.ism": 1, "javacard.securemessaging": 1, "javacard.securemessaging.builde": 1, "javacard.securemessaging.intern": 1, "javacard.security": 1, "javacard.tlv": 1, "javacard.iasclassic": 1, "javacard.icao": 1, "javacard.mspnp": 1, "javacard.conformance": 1, "javacard.gpimage": 1 }, "javacardx": { "javacardx.apdu": 1, "javacardx.crypto": 2, "javacardx.gap": 1, "javacardx.gapplet": 1, "javacardx.biometry": 2, "javacardx.crypto.asymmetric.ecc": 1, "javacardx.crypto.asymmetric.rsa": 1, "javacardx.apdu.util": 1, "javacardx.biometry.biocfg": 1, "javacardx.gdp": 1 }, "org": { "org.globalplatform": 1 }, "com": { "com.gemalto.javacard.filesystem": 1, "com.gemalto.javacard.util": 1, "com.gemalto.javacardx.crypto": 1, "com.gemalto.javacard.open": 1, "com.gemalto.javacardx.gapplet": 1, "com.gemalto.javacard.ism": 1, "com.gemalto.javacard.securemessaging.builde": 1, "com.gemalto.javacard.securemessaging.intern": 1, "com.gemalto.javacard.security": 1, "com.gemalto.javacardx": 1, "com.gemalto.javacardx.biometry": 1, "com.gemalto.javacardx.crypto.asymmetric.rsa": 1, "com.gemalto.javacard.iasclassic": 1, "com.gemalto.moc.server": 1, "com.gemalto.javacard.mspnp": 1, "com.gemalto.javacardx.biometry.biocfg": 1, "com.gemalto.emvapi": 1 } }, "certification_process": {} }, "st_keywords": null, "cert_keywords": null, "report_filename": "anssi-cc-2020_65v2.pdf", "st_filename": null, "cert_filename": null } }, "heuristics": { "__update__": { "st_references": { "__update__": { "directly_referencing": null, "indirectly_referencing": null } }, "extracted_sars": { "__discard__": { "_type": "set", "_value": [ { "_type": "sec_certs.sample.sar.SAR", "family": "ADV_TDS", "level": 4 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ATE_FUN", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AGD_PRE", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ATE_DPT", "level": 3 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_TAT", "level": 2 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_CMC", "level": 4 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AGD_OPE", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ADV_FSP", "level": 5 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ADV_INT", "level": 2 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ADV_IMP", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ATE_IND", "level": 2 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_DEL", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ADV_ARC", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ATE_COV", "level": 2 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_LCD", "level": 1 } ] } } } } } } }, { "_id": { "$oid": "66c7affd2ff8c812f518c128" }, "run_id": { "$oid": "66c7afc82ff8c812f518b966" }, "dgst": "1412d1d9e0d553c1", "timestamp": { "$date": "2024-08-22T18:04:48.021Z" }, "type": "change", "diff": { "__update__": { "state": { "__update__": { "st": { "__update__": { "download_ok": true, "convert_ok": true, "extract_ok": true, "pdf_hash": "9ec9bc244cd2cdfa133da188f67f6302f7086acec87b2c453d19e5b906713150", "txt_hash": "fe1f6fa6f2e466702df203929aa00510b8e554f774195f4ef29eddf064801fdb" } }, "cert": { "__update__": { "download_ok": true, "convert_ok": true, "extract_ok": true, "pdf_hash": "4cd0982b954a019eb3c343c539948aa268bca50a5e1b79de557393146da50220", "txt_hash": "0a56c1990efb616ab129cad19db0ced8506235cb7e0511dfe8713d97d01153c0" } } } }, "pdf_data": { "__update__": { "st_metadata": { "pdf_file_size_bytes": 2496334, "pdf_is_encrypted": false, "pdf_number_of_pages": 157, "/Title": "MultiApp V4.2: JCS Security Target", "/Author": "D1487827", "/Subject": "1.18", "/Keywords": "04-05-2021", "/Creator": "Microsoft® Word 2013", "/CreationDate": "D:20210505092700+02'00'", "/ModDate": "D:20210505092700+02'00'", "/Producer": "Microsoft® Word 2013", "pdf_hyperlinks": { "_type": "set", "_value": [] } }, "cert_metadata": { "pdf_file_size_bytes": 280367, "pdf_is_encrypted": false, "pdf_number_of_pages": 2, "/Author": "", "/CreationDate": "D:20211004103608+02'00'", "/Creator": "PScript5.dll Version 5.2.2", "/ModDate": "D:20211004103608+02'00'", "/Producer": "Acrobat Distiller 11.0 (Windows)", "/Title": "", "pdf_hyperlinks": { "_type": "set", "_value": [] } }, "st_keywords": { "cc_cert_id": { "DE": { "BSI-DSZ-CC-1079-2018": 1, "BSI-DSZ-CC-1079-2018-MA-01": 1 }, "NL": { "CC-1": 2, "CC-2": 3, "CC-3": 3 } }, "cc_protection_profile_id": { "BSI": { "BSI-CC-PP-0084-2014": 1, "BSI-CC-PP-0099-2017": 1, "BSI-CC-PP- 0068-V2-2011-MA-01": 1, "BSI-PP- 0055-2009": 1 } }, "cc_security_level": { "EAL": { "EAL 5+": 1, "EAL6": 1, "EAL6+": 1, "EAL5+": 1, "EAL5": 6, "EAL 6+": 1, "EAL6 augmented": 1, "EAL5 augmented": 2 } }, "cc_sar": { "ADV": { "ADV_ARC.1": 7, "ADV_TDS.1": 2, "ADV_TDS.4": 7, "ADV_IMP.1": 7, "ADV_TDS.3": 4, "ADV_INT.2": 1, "ADV_FSP.5": 4, "ADV_FSP.1": 1, "ADV_FSP.2": 2, "ADV_FSP.4": 2, "ADV_ARC": 1, "ADV_FSP": 1, "ADV_IMP": 1, "ADV_TDS": 1 }, "AGD": { "AGD_PRE": 2, "AGD_OPE": 2, "AGD_OPE.1": 7, "AGD_PRE.1": 6 }, "ALC": { "ALC_DVS.2": 7, "ALC_TAT.1": 2, "ALC_TAT.2": 3, "ALC_CMC.4": 1, "ALC_DVS.1": 2, "ALC_LCD.1": 3, "ALC_DEL.1": 1 }, "ATE": { "ATE_COV.2": 2, "ATE_FUN.1": 6, "ATE_COV.1": 2, "ATE_IND.2": 1, "ATE_DPT.1": 2, "ATE_DPT.3": 1 }, "AVA": { "AVA_VAN.5": 7 } }, "cc_sfr": { "FAU": { "FAU_ARP.1": 16, "FAU_ARP.1.1": 1, "FAU_SAA.1": 2 }, "FCO": { "FCO_NRO": 5, "FCO_NRO.2": 3 }, "FCS": { "FCS_RNG": 18, "FCS_CKM": 46, "FCS_COP": 35, "FCS_RNG.1": 8, "FCS_RNG.1.1": 3, "FCS_RNG.1.2": 3, "FCS_CKM.1": 27, "FCS_CKM.1.1": 3, "FCS_CKM.4": 21, "FCS_CKM.4.1": 2, "FCS_COP.1": 24, "FCS_COP.1.1": 5 }, "FDP": { "FDP_ACF": 30, "FDP_ACC": 35, "FDP_ACC.2": 6, "FDP_ACF.1": 16, "FDP_IFC": 20, "FDP_IFC.1": 12, "FDP_IFF": 13, "FDP_IFF.1": 17, "FDP_RIP": 98, "FDP_RIP.1": 11, "FDP_ROL.1": 5, "FDP_ROL": 14, "FDP_SDI": 6, "FDP_SDI.2": 3, "FDP_ITC": 10, "FDP_ITC.2": 15, "FDP_IFC.2": 2, "FDP_UIT": 5, "FDP_UIT.1": 2, "FDP_ACC.1": 14, "FDP_ITC.1": 10, "FDP_RIP.1.1": 1 }, "FIA": { "FIA_AFL": 21, "FIA_ATD": 7, "FIA_ATD.1": 2, "FIA_UID": 33, "FIA_UID.2": 1, "FIA_USB": 6, "FIA_USB.1": 3, "FIA_UAU": 50, "FIA_UAU.1": 6, "FIA_UID.1": 18, "FIA_UAU.4": 1, "FIA_AFL.1.1": 2, "FIA_AFL.1.2": 2, "FIA_UID.1.1": 2, "FIA_UID.1.2": 2, "FIA_UAU.1.1": 2, "FIA_UAU.1.2": 2, "FIA_UAU.4.1": 1, "FIA_UAU.5.1": 1, "FIA_UAU.5.2": 1, "FIA_UAU.6.1": 1 }, "FMT": { "FMT_LIM": 18, "FMT_LIM.1": 15, "FMT_LIM.2": 14, "FMT_LIM.1.1": 3, "FMT_LIM.2.1": 3, "FMT_MSA": 73, "FMT_MSA.1": 11, "FMT_MSA.2": 2, "FMT_MSA.3": 17, "FMT_SMR": 62, "FMT_SMR.1": 29, "FMT_SMF": 50, "FMT_SMF.1": 19, "FMT_MTD": 31, "FMT_MTD.1": 9, "FMT_MTD.3": 1, "FMT_SMF.1.1": 2, "FMT_SMR.1.1": 2, "FMT_SMR.1.2": 2 }, "FPR": { "FPR_UNO.1": 10, "FPR_UNO.1.1": 1, "FPR_UNO": 5 }, "FPT": { "FPT_EMS": 4, "FPT_TST": 7, "FPT_EMS.1": 12, "FPT_EMS.1.1": 3, "FPT_EMS.1.2": 3, "FPT_FLS": 34, "FPT_FLS.1": 14, "FPT_TDC.1": 7, "FPT_TDC.1.1": 1, "FPT_TDC.1.2": 1, "FPT_RCV": 12, "FPT_RCV.3": 7, "FPT_FLS.1.1": 2, "FPT_TST.1": 13, "FPT_PHP": 5, "FPT_PHP.3": 12, "FPT_RCV.4": 2, "FPT_ITT": 5, "FPT_ITT.1": 1, "FPT_TST.1.1": 1, "FPT_TST.1.2": 1, "FPT_TST.1.3": 1, "FPT_PHP.3.1": 1 }, "FTP": { "FTP_ITC": 14, "FTP_ITC.1": 5, "FTP_ITC.1.1": 1, "FTP_ITC.1.2": 1, "FTP_ITC.1.3": 1, "FTP_TRP.1": 2 } }, "cc_claims": { "D": { "D.APP_CODE": 6, "D.APP_C_DATA": 3, "D.APP_I_DATA": 5, "D.PIN": 4, "D.BIO": 1, "D.API_DATA": 3, "D.CRYPTO": 5, "D.JCS_CODE": 3, "D.JCS_DATA": 5, "D.SEC_DATA": 7 }, "O": { "O.SID": 13, "O.FIREWALL": 12, "O.GLOBAL_ARRAYS_CONFID": 9, "O.GLOBAL_ARRAYS_INTEG": 5, "O.NATIVE": 11, "O.OPERATE": 15, "O.REALLOCATION": 5, "O.RESOURCES": 9, "O.ALARM": 15, "O.CIPHER": 11, "O.RNG": 9, "O.KEY-MNGT": 7, "O.PIN-MNGT": 6, "O.TRANSACTION": 7, "O.BIO-MNGT": 7, "O.OBJ-DELETION": 4, "O.DELETION": 5, "O.LOAD": 10, "O.INSTALL": 8, "O.SCP": 32, "O.CARD-MANAGEMENT": 2, "O.PIN_MNGT": 1, "O.KEY_MNGT": 1, "O.CARD_MANAGEMENT": 17, "O.PIN-": 1, "O.RND": 3, "O.TDES": 1, "O.AES": 1, "O.APPLET": 28, "O.CODE_PKG": 7, "O.JAVAOBJECT": 66, "O.CODE_PCKG": 16, "O.OBJ_DELETION": 3 }, "T": { "T.CONFID-APPLI-DATA": 4, "T.CONFID-JCS-CODE": 4, "T.CONFID-JCS-DATA": 4, "T.INTEG-APPLI-CODE": 7, "T.INTEG-APPLI-DATA": 8, "T.INTEG-JCS-CODE": 3, "T.INTEG-JCS-DATA": 4, "T.SID": 8, "T.EXE-CODE": 8, "T.NATIVE": 4, "T.RESOURCES": 3, "T.DELETION": 3, "T.INSTALL": 4, "T.OBJ-DELETION": 4, "T.PHYSICAL": 4 }, "A": { "A.APPLET": 5, "A.DELETION": 4, "A.VERIFICATION": 4 }, "R": { "R.JAVA": 10 }, "OT": { "OT.X": 1 }, "OP": { "OP.ARRAY_ACCESS": 7, "OP.ARRAY_LENGTH": 3, "OP.ARRAY_AASTORE": 3, "OP.CREATE": 11, "OP.DELETE_APPLET": 6, "OP.DELETE_PCKG": 4, "OP.DELETE_PCKG_APPLET": 4, "OP.INSTANCE_FIELD": 6, "OP.INVK_VIRTUAL": 8, "OP.INVK_INTERFACE": 10, "OP.JAVA": 8, "OP.THROW": 7, "OP.TYPE_ACCESS": 7, "OP.PUT": 8, "OP.PUTFIELD": 1, "OP.PUTSTATIC": 1 }, "OE": { "OE.APPLET": 4, "OE.VERIFICATION": 25, "OE.CODE-EVIDENCE": 10, "OE.CODE_EVIDENCE": 1, "OE.CARD-MANAGEMENT": 1 }, "OSP": { "OSP.VERIFICATION": 4, "OSP.RNG": 1, "OSP.RND": 3 } }, "vendor": { "Infineon": { "Infineon": 15, "Infineon Technologies AG": 2 }, "Gemalto": { "Gemalto": 30 }, "Thales": { "Thales": 1 }, "Microsoft": { "Microsoft": 1 } }, "eval_facility": { "Serma": { "Serma Safety & Security": 1 } }, "symmetric_crypto": { "AES_competition": { "AES": { "AES": 28 } }, "DES": { "DES": { "DES": 20 }, "3DES": { "TDEA": 1, "3DES": 2, "TDES": 15, "Triple-DES": 3 } }, "constructions": { "MAC": { "HMAC": 2, "KMAC": 2, "CMAC": 2 } } }, "asymmetric_crypto": { "ECC": { "ECDH": { "ECDH": 6 }, "ECDSA": { "ECDSA": 3 }, "ECC": { "ECC": 10 } }, "FF": { "DH": { "Diffie-Hellman": 4, "DH": 8 } } }, "pq_crypto": {}, "hash_function": { "SHA": { "SHA1": { "SHA1": 2, "SHA-1": 4 }, "SHA2": { "SHA-224": 4, "SHA224": 3, "SHA256": 1, "SHA384": 1, "SHA512": 1, "SHA-256": 4, "SHA-512": 4, "SHA-384": 2 } } }, "crypto_scheme": { "MAC": { "MAC": 16 }, "KA": { "Key Agreement": 3, "Key agreement": 2 } }, "crypto_protocol": { "PACE": { "PACE": 162 } }, "randomness": { "RNG": { "RNG": 32, "RND": 6 } }, "cipher_mode": { "CBC": { "CBC": 2 } }, "ecc_curve": {}, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": { "SCA": { "Leak-Inherent": 5, "physical probing": 6, "DPA": 2, "SPA": 1, "timing attacks": 1 }, "FI": { "physical tampering": 1, "Physical Tampering": 3, "malfunction": 8, "Malfunction": 9, "fault induction": 2 } }, "technical_report_id": {}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": { "ICFab": { "IC Fabricator": 1 }, "ICType": { "IC Type": 1 } }, "ic_data_group": { "EF": { "EF.DG1": 6, "EF.DG16": 6 } }, "standard_id": { "FIPS": { "FIPS180-2": 1, "FIPS197": 5, "FIPS 140-2": 3, "FIPS 46-3": 1, "FIPS 197": 1 }, "NIST": { "SP 800-67": 1 }, "PKCS": { "PKCS#1": 8, "PKCS#5": 5 }, "BSI": { "AIS31": 4, "AIS 31": 1 }, "ISO": { "ISO/IEC 7816-2": 1 }, "ICAO": { "ICAO": 1 }, "SCP": { "SCP01": 6, "SCP02": 6, "SCP03": 5 }, "CC": { "CCMB-2017-04-001": 1, "CCMB-2017-04-002": 1, "CCMB-2017-04-003": 1, "CCMB-2017-04-004": 1 } }, "javacard_version": { "JavaCard": { "Java Card 2.2.2": 3, "Java Card 3.0.5": 5 } }, "javacard_api_const": { "misc": { "TYPE_ACCESS": 7 } }, "javacard_packages": { "java": { "java.lang": 1 }, "javacard": { "javacard.security": 3, "javacard.framework": 3 }, "javacardx": { "javacardx.biometry": 1, "javacardx.crypto": 2 } }, "certification_process": { "OutOfScope": { "out of scope": 1, "a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are": 1 } } }, "cert_keywords": { "cc_cert_id": { "FR": { "ANSSI-CC-2020/65v2": 2 } }, "cc_protection_profile_id": { "BSI": { "BSI-PP-0099-2": 1 } }, "cc_security_level": { "EAL": { "EAL5": 1, "EAL2": 1 } }, "cc_sar": { "ALC": { "ALC_DVS.2": 1 }, "AVA": { "AVA_VAN.5": 1 } }, "cc_sfr": {}, "cc_claims": {}, "vendor": {}, "eval_facility": { "Serma": { "SERMA": 2 } }, "symmetric_crypto": {}, "asymmetric_crypto": {}, "pq_crypto": {}, "hash_function": {}, "crypto_scheme": {}, "crypto_protocol": {}, "randomness": {}, "cipher_mode": {}, "ecc_curve": {}, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": {}, "technical_report_id": {}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": {}, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": {} }, "st_filename": "cible-anssi-cc-2020-65v2.pdf", "cert_filename": "certificat-anssi-cc-2020-65v2.pdf" } }, "heuristics": { "__update__": { "st_references": { "__update__": { "directly_referencing": { "_type": "set", "_value": [ "BSI-DSZ-CC-1079-2018" ] }, "indirectly_referencing": { "_type": "set", "_value": [ "BSI-DSZ-CC-1079-2018" ] } } }, "report_references": { "__update__": { "directly_referencing": { "_type": "set", "_value": [ "ANSSI-CC-2020/65" ] }, "indirectly_referencing": { "_type": "set", "_value": [ "ANSSI-CC-2020/65" ] } } }, "extracted_sars": { "__add__": { "_type": "set", "_value": [ { "_type": "sec_certs.sample.sar.SAR", "family": "ADV_TDS", "level": 4 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ATE_COV", "level": 2 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ATE_IND", "level": 2 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ADV_FSP", "level": 5 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_CMC", "level": 4 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ATE_DPT", "level": 3 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_DEL", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AGD_OPE", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_TAT", "level": 2 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_LCD", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ATE_FUN", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ADV_INT", "level": 2 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ADV_ARC", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AGD_PRE", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ADV_IMP", "level": 1 } ] } } } } } } }, { "_id": { "$oid": "67113c70700c28def2a97720" }, "run_id": { "$oid": "67113c29700c28def2a97449" }, "dgst": "1412d1d9e0d553c1", "timestamp": { "$date": "2024-10-17T11:26:45.075Z" }, "type": "change", "diff": { "__update__": { "protection_profiles": { "_type": "set", "_value": [ { "_type": "sec_certs.sample.protection_profile.ProtectionProfile", "pp_name": "Java Card Protection Profile - Open Configuration", "pp_eal": "EAL4+", "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0099b_pdf.pdf", "pp_ids": null } ] } } } }, { "_id": { "$oid": "672ffc06fb882d74835eb20a" }, "run_id": { "$oid": "672ffba8fb882d74835eae78" }, "dgst": "1412d1d9e0d553c1", "timestamp": { "$date": "2024-11-09T17:43:21.303Z" }, "type": "change", "diff": { "__update__": { "heuristics": { "__update__": { "scheme_data": { "product": "Plateforme Java Card MultiApp V4.2 en configuration ouverte sur le composant IFX_CCI_000010h (Version 4.2.0, Java Card version 3.0.5, GP version 2.3)", "url": "https://cyber.gouv.fr/produits-certifies/plateforme-java-card-multiapp-v42-en-configuration-ouverte-sur-le-composant-0", "description": "Le produit évalué est la « Plateforme Java Card MultiApp V4.2 en configuration ouverte sur le composant IFX_CCI_000010h, version 4.2.0 », développé par THALES et INFINEON TECHNOLOGIES AG. Ce produit est destiné à héberger et exécuter une ou plusieurs applications, dites applets dans la terminologie Java Card. Ces applications peuvent revêtir un caractère sécuritaire différent (selon qu’elles soie", "sponsor": "THALES et INFINEON TECHNOOGIES AG/ THALES", "developer": "THALES et INFINEON TECHNOOGIES AG/ THALES", "cert_id": "ANSSI-CC-2020/65v2", "level": "EAL5+", "expiration_date": { "_type": "date", "_value": "2025-06-26" }, "enhanced": { "cert_id": "ANSSI-CC-2020/65v2", "certification_date": { "_type": "date", "_value": "2021-09-28" }, "expiration_date": { "_type": "date", "_value": "2025-06-26" }, "category": "Cartes à puce", "cc_version": "Critères Communs version 3.1r5", "developer": "THALES et INFINEON TECHNOOGIES AG/ THALES", "sponsor": "THALES et INFINEON TECHNOOGIES AG/ THALES", "evaluation_facility": "SERMA SAFETY & SECURITY", "level": "EAL5+", "protection_profile": "Java Card System Protection Profile Open Configuration", "mutual_recognition": "SOG-IS CCRA", "augmented": "ALC_DVS.2, AVA_VAN.5", "cert_link": "https://cyber.gouv.fr/sites/default/files/2021/11/certificat-anssi-cc-2020-65v2.pdf", "target_link": "https://cyber.gouv.fr/sites/default/files/2021/11/cible-anssi-cc-2020-65v2.pdf", "report_link": "https://cyber.gouv.fr/sites/default/files/2021/11/anssi-cc-2020_65v2.pdf" } } } } } } }, { "_id": { "$oid": "673f6585a1452c910a80cc44" }, "run_id": { "$oid": "673f6538a1452c910a80b5ad" }, "dgst": "1412d1d9e0d553c1", "timestamp": { "$date": "2024-11-21T11:03:40.77Z" }, "type": "change", "diff": { "__update__": { "heuristics": { "__insert__": { "prev_certificates": [ "ANSSI-CC-2020/65" ], "next_certificates": [] } } } } }, { "_id": { "$oid": "67572cbfe54d5dd1c4cb6ec2" }, "run_id": { "$oid": "67572c76e54d5dd1c4cb688c" }, "dgst": "1412d1d9e0d553c1", "timestamp": { "$date": "2024-12-09T12:00:03.127Z" }, "type": "change", "diff": { "__update__": { "heuristics": { "__update__": { "scheme_data": null } } } } }, { "_id": { "$oid": "676071d3e54d5dd1c4cb771a" }, "run_id": { "$oid": "67607184e54d5dd1c4cb70e4" }, "dgst": "1412d1d9e0d553c1", "timestamp": { "$date": "2024-12-16T12:00:01.445Z" }, "type": "change", "diff": { "__update__": { "heuristics": { "__update__": { "scheme_data": { "product": "Plateforme Java Card MultiApp V4.2 en configuration ouverte sur le composant IFX_CCI_000010h (Version 4.2.0, Java Card version 3.0.5, GP version 2.3)", "url": "https://cyber.gouv.fr/produits-certifies/plateforme-java-card-multiapp-v42-en-configuration-ouverte-sur-le-composant-0", "description": "Le produit évalué est la « Plateforme Java Card MultiApp V4.2 en configuration ouverte sur le composant IFX_CCI_000010h, version 4.2.0 », développé par THALES et INFINEON TECHNOLOGIES AG. Ce produit est destiné à héberger et exécuter une ou plusieurs applications, dites applets dans la terminologie Java Card. Ces applications peuvent revêtir un caractère sécuritaire différent (selon qu’elles soie", "sponsor": "THALES et INFINEON TECHNOOGIES AG/ THALES", "developer": "THALES et INFINEON TECHNOOGIES AG/ THALES", "cert_id": "ANSSI-CC-2020/65v2", "level": "EAL5+", "expiration_date": { "_type": "date", "_value": "2025-06-26" }, "enhanced": { "cert_id": "ANSSI-CC-2020/65v2", "certification_date": { "_type": "date", "_value": "2021-09-28" }, "expiration_date": { "_type": "date", "_value": "2025-06-26" }, "category": "Cartes à puce", "cc_version": "Critères Communs version 3.1r5", "developer": "THALES et INFINEON TECHNOOGIES AG/ THALES", "sponsor": "THALES et INFINEON TECHNOOGIES AG/ THALES", "evaluation_facility": "SERMA SAFETY & SECURITY", "level": "EAL5+", "protection_profile": "Java Card System Protection Profile Open Configuration", "mutual_recognition": "SOG-IS CCRA", "augmented": "ALC_DVS.2, AVA_VAN.5", "cert_link": "https://cyber.gouv.fr/sites/default/files/2021/11/certificat-anssi-cc-2020-65v2.pdf", "target_link": "https://cyber.gouv.fr/sites/default/files/2021/11/cible-anssi-cc-2020-65v2.pdf", "report_link": "https://cyber.gouv.fr/sites/default/files/2021/11/anssi-cc-2020_65v2.pdf" } } } } } } }, { "_id": { "$oid": "677c179be54d5dd1c4cb8008" }, "run_id": { "$oid": "677c1753e54d5dd1c4cb79d9" }, "dgst": "1412d1d9e0d553c1", "timestamp": { "$date": "2025-01-06T12:00:01.435Z" }, "type": "change", "diff": { "__update__": { "heuristics": { "__update__": { "scheme_data": null } } } } }, { "_id": { "$oid": "6797bb104c0fc0deaea59fcf" }, "run_id": { "$oid": "6797bade4c0fc0deaea59b6a" }, "dgst": "1412d1d9e0d553c1", "timestamp": { "$date": "2025-01-27T12:00:00.237Z" }, "type": "change", "diff": { "__update__": { "heuristics": { "__update__": { "scheme_data": { "product": "Plateforme Java Card MultiApp V4.2 en configuration ouverte sur le composant IFX_CCI_000010h (Version 4.2.0, Java Card version 3.0.5, GP version 2.3)", "url": "https://cyber.gouv.fr/produits-certifies/plateforme-java-card-multiapp-v42-en-configuration-ouverte-sur-le-composant-0", "description": "Le produit évalué est la « Plateforme Java Card MultiApp V4.2 en configuration ouverte sur le composant IFX_CCI_000010h, version 4.2.0 », développé par THALES et INFINEON TECHNOLOGIES AG. Ce produit est destiné à héberger et exécuter une ou plusieurs applications, dites applets dans la terminologie Java Card. Ces applications peuvent revêtir un caractère sécuritaire différent (selon qu’elles soie", "sponsor": "THALES et INFINEON TECHNOOGIES AG/ THALES", "developer": "THALES et INFINEON TECHNOOGIES AG/ THALES", "cert_id": "ANSSI-CC-2020/65v2", "level": "EAL5+", "expiration_date": { "_type": "date", "_value": "2025-06-26" }, "enhanced": { "cert_id": "ANSSI-CC-2020/65v2", "certification_date": { "_type": "date", "_value": "2021-09-28" }, "expiration_date": { "_type": "date", "_value": "2025-06-26" }, "category": "Cartes à puce", "cc_version": "Critères Communs version 3.1r5", "developer": "THALES et INFINEON TECHNOOGIES AG/ THALES", "sponsor": "THALES et INFINEON TECHNOOGIES AG/ THALES", "evaluation_facility": "SERMA SAFETY & SECURITY", "level": "EAL5+", "protection_profile": "Java Card System Protection Profile Open Configuration", "mutual_recognition": "SOG-IS CCRA", "augmented": "ALC_DVS.2, AVA_VAN.5", "cert_link": "https://cyber.gouv.fr/sites/default/files/2021/11/certificat-anssi-cc-2020-65v2.pdf", "target_link": "https://cyber.gouv.fr/sites/default/files/2021/11/cible-anssi-cc-2020-65v2.pdf", "report_link": "https://cyber.gouv.fr/sites/default/files/2021/11/anssi-cc-2020_65v2.pdf" } } } } } } }, { "_id": { "$oid": "67a11af6a24f8a02249f33c1" }, "run_id": { "$oid": "67a11a93a24f8a02249f2ef7" }, "dgst": "1412d1d9e0d553c1", "timestamp": { "$date": "2025-02-03T12:00:02.001Z" }, "type": "change", "diff": { "__update__": { "heuristics": { "__update__": { "scheme_data": null } } } } }, { "_id": { "$oid": "67a4087c6161883953270c29" }, "run_id": { "$oid": "67a4080e616188395327018d" }, "dgst": "1412d1d9e0d553c1", "timestamp": { "$date": "2025-02-05T18:04:55.043Z" }, "type": "change", "diff": { "__insert__": { "protection_profile_links": { "_type": "set", "_value": [ "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0099b_pdf.pdf" ] } }, "__update__": { "state": { "__update__": { "report": { "__update__": { "_type": "sec_certs.sample.document_state.DocumentState" } }, "st": { "__update__": { "_type": "sec_certs.sample.document_state.DocumentState" } }, "cert": { "__update__": { "_type": "sec_certs.sample.document_state.DocumentState" } } } }, "heuristics": { "__insert__": { "protection_profiles": { "_type": "set", "_value": [ "94167fd161e87d71" ] }, "eal": "EAL5+" }, "__update__": { "prev_certificates": null, "next_certificates": null, "scheme_data": { "product": "Plateforme Java Card MultiApp V4.2 en configuration ouverte sur le composant IFX_CCI_000010h (Version 4.2.0, Java Card version 3.0.5, GP version 2.3)", "url": "https://cyber.gouv.fr/produits-certifies/plateforme-java-card-multiapp-v42-en-configuration-ouverte-sur-le-composant-0", "description": "Le produit évalué est la « Plateforme Java Card MultiApp V4.2 en configuration ouverte sur le composant IFX_CCI_000010h, version 4.2.0 », développé par THALES et INFINEON TECHNOLOGIES AG. Ce produit est destiné à héberger et exécuter une ou plusieurs applications, dites applets dans la terminologie Java Card. Ces applications peuvent revêtir un caractère sécuritaire différent (selon qu’elles soie", "sponsor": "THALES et INFINEON TECHNOOGIES AG/ THALES", "developer": "THALES et INFINEON TECHNOOGIES AG/ THALES", "cert_id": "ANSSI-CC-2020/65v2", "level": "EAL5+", "expiration_date": { "_type": "date", "_value": "2025-06-26" }, "enhanced": { "cert_id": "ANSSI-CC-2020/65v2", "certification_date": { "_type": "date", "_value": "2021-09-28" }, "expiration_date": { "_type": "date", "_value": "2025-06-26" }, "category": "Cartes à puce", "cc_version": "Critères Communs version 3.1r5", "developer": "THALES et INFINEON TECHNOOGIES AG/ THALES", "sponsor": "THALES et INFINEON TECHNOOGIES AG/ THALES", "evaluation_facility": "SERMA SAFETY & SECURITY", "level": "EAL5+", "protection_profile": "Java Card System Protection Profile Open Configuration", "mutual_recognition": "SOG-IS CCRA", "augmented": "ALC_DVS.2, AVA_VAN.5", "cert_link": "https://cyber.gouv.fr/sites/default/files/2021/11/certificat-anssi-cc-2020-65v2.pdf", "target_link": "https://cyber.gouv.fr/sites/default/files/2021/11/cible-anssi-cc-2020-65v2.pdf", "report_link": "https://cyber.gouv.fr/sites/default/files/2021/11/anssi-cc-2020_65v2.pdf" } } } } }, "__delete__": [ "protection_profiles" ] } }, { "_id": { "$oid": "67aa459ed14b3692bb806ec7" }, "run_id": { "$oid": "67aa4548d14b3692bb806e73" }, "dgst": "1412d1d9e0d553c1", "timestamp": { "$date": "2025-02-10T12:00:00.586Z" }, "type": "change", "diff": { "__update__": { "heuristics": { "__update__": { "scheme_data": null } } } } }, { "_id": { "$oid": "6862e087f3fe2413d92e29d0" }, "run_id": { "$oid": "6862e052f3fe2413d92e29c2" }, "dgst": "1412d1d9e0d553c1", "timestamp": { "$date": "2025-06-30T12:00:00.439Z" }, "type": "change", "diff": { "__update__": { "status": "archived" } } }, { "_id": { "$oid": "669f80cd566b7c5a18057b9c" }, "run_id": { "$oid": "669f8076566b7c5a1805773d" }, "dgst": "3d1b01ce576f605d", "timestamp": { "$date": "2024-07-23T00:09:57.927Z" }, "type": "new", "diff": { "_type": "sec_certs.sample.cc.CCCertificate", "dgst": "3d1b01ce576f605d", "status": "archived", "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems", "name": "Veridos Suite v3.0 – cryptovision ePasslet Suite – Java Card applet configuration providing Machine-Readable Electronic Documents based on BSI TR-03110 for Official Use with BAC option", "manufacturer": "cv cryptovision GmbH", "scheme": "DE", "security_level": { "_type": "set", "_value": [ "ALC_DVS.2", "EAL4+" ] }, "not_valid_before": { "_type": "date", "_value": "2018-12-18" }, "not_valid_after": { "_type": "date", "_value": "2023-12-18" }, "report_link": "https://www.commoncriteriaportal.org/files/epfiles/1091a_pdf.pdf", "st_link": "https://www.commoncriteriaportal.org/files/epfiles/1091b_pdf.pdf", "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1091c_pdf.pdf", "manufacturer_web": "https://www.cryptovision.com", "protection_profiles": { "_type": "set", "_value": [ { "_type": "sec_certs.sample.protection_profile.ProtectionProfile", "pp_name": "Protection Profile for Machine Readable Travel Document with 'ICAO Application', Basic Acce...", "pp_eal": null, "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0055b.pdf", "pp_ids": null } ] }, "maintenance_updates": { "_type": "set", "_value": [] }, "state": { "_type": "sec_certs.sample.cc.CCCertificate.InternalState", "report": { "_type": "sec_certs.sample.cc.CCCertificate.DocumentState", "download_ok": true, "convert_garbage": false, "convert_ok": true, "extract_ok": true, "pdf_hash": "fe165dd9a7399dd5063f6a051bb9fab2de906f3949f9e9bf08df22d6d67818d2", "txt_hash": "c7e083548678887a9dce5c544e217d49628c0e4c5c9aa4db5bc84238cb86bf09" }, "st": { "_type": "sec_certs.sample.cc.CCCertificate.DocumentState", "download_ok": true, "convert_garbage": false, "convert_ok": true, "extract_ok": true, "pdf_hash": "d57ff01507ab99d75e185c1ebde2bcb03553e139ff3b4d7833d34fc2f6ff3acd", "txt_hash": "208569ac4e98fa34ce71c4adebd1c61fed7fcc7ffb1e0bf324fd0f39ec4cc53b" }, "cert": { "_type": "sec_certs.sample.cc.CCCertificate.DocumentState", "download_ok": true, "convert_garbage": false, "convert_ok": true, "extract_ok": true, "pdf_hash": "589838ef5e10753b89f5d8e845950bdf5786142e158f0bf44cdce323bd9bfaf4", "txt_hash": "11f93d790b9a81a71dae294af43527e0e847d8b15487e9c396a708466ec801e5" } }, "pdf_data": { "_type": "sec_certs.sample.cc.CCCertificate.PdfData", "report_metadata": { "pdf_file_size_bytes": 904557, "pdf_is_encrypted": false, "pdf_number_of_pages": 30, "/Author": "Bundesamt für Sicherheit in der Informationstechnik", "/CreationDate": "D:20190109131709+01'00'", "/Creator": "Writer", "/Keywords": "\"Common Criteria, Certification, Zertifizierung, Security IC with MRTD BAC Application, Veridos GmbH, cv cryptovision GmbH\"", "/ModDate": "D:20190109132827+01'00'", "/Producer": "LibreOffice 5.2", "/Subject": "Common Criteria Certification", "/Title": "Certification Report BSI-DSZ-CC-1091-2018", "pdf_hyperlinks": { "_type": "set", "_value": [ "http://www.sogisportal.eu/", "https://www.bsi.bund.de/AIS", "https://www.bsi.bund.de/zertifizierungsreporte", "https://www.bsi.bund.de/", "http://www.commoncriteriaportal.org/cc/", "http://www.commoncriteriaportal.org/", "https://www.bsi.bund.de/zertifizierung" ] } }, "st_metadata": { "pdf_file_size_bytes": 1948229, "pdf_is_encrypted": false, "pdf_number_of_pages": 76, "/Title": "Security Target ePasslet/ePKI-SSCD", "/Author": "bdrisch", "/Keywords": "SSCD, ePasslet Suite, electronic Signature", "/Creator": "Microsoft® Word 2013", "/CreationDate": "D:20181206120214+01'00'", "/ModDate": "D:20181206120214+01'00'", "/Producer": "Microsoft® Word 2013", "pdf_hyperlinks": { "_type": "set", "_value": [ "file:///C:/Dokumente%20und%20Einstellungen/tzeggel/Desktop/glossar.htm%23aes" ] } }, "cert_metadata": { "pdf_file_size_bytes": 408715, "pdf_is_encrypted": false, "pdf_number_of_pages": 1, "/Author": "Bundesamt für Sicherheit in der Informationstechnik", "/CreationDate": "D:20190109132905+01'00'", "/Creator": "Writer", "/Keywords": "Common Criteria, Certification, Zertifizierung, Security IC with MRTD BAC Application, Veridos GmbH, cv cryptovision GmbH", "/ModDate": "D:20190109133015+01'00'", "/Producer": "LibreOffice 5.2", "/Subject": "Common Criteria Certification", "/Title": "Certificate BSI-DSZ-CC-1091-2018", "pdf_hyperlinks": { "_type": "set", "_value": [] } }, "report_frontpage": { "DE": { "match_rules": [ "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)" ], "cert_id": "BSI-DSZ-CC-1091-2018", "cert_item": "Veridos Suite v3.0 – cryptovision ePasslet Suite – Java Card applet configuration providing Machine-Readable Electronic Documents based on BSI TR-03110 for Official Use with BAC option", "developer": "cv cryptovision GmbH sponsored by Veridos GmbH - Identity Solutions by G+D BDR", "cert_lab": "BSI", "ref_protection_profiles": "Machine Readable Travel Document with \"ICAO Application\" Basic Access Control, Version 1.10, 25 March 2009, BSI-CC-PP-0055-2009", "cc_version": "PP conformant plus product specific extensions Common Criteria Part 2 extended", "cc_security_level": "Common Criteria Part 3 conformant EAL 4 augmented by ALC_DVS.2" } }, "st_frontpage": null, "cert_frontpage": null, "report_keywords": { "cc_cert_id": { "DE": { "BSI-DSZ-CC-1091-2018": 18, "BSI-DSZ-CC-1090-2018": 3, "BSI-DSZ-CC-0951-2015-RA-01": 3, "BSI-DSZ-CC-1028-2017-MA-01": 4, "BSI-DSZ-CC-1028-2017": 3, "BSI-DSZ-CC-1028-": 1, "BSI-DSZ-CC-1091": 2, "BSI-DSZ-CC-0951-2015": 1 } }, "cc_protection_profile_id": { "BSI": { "BSI-CC-PP-0055-2009": 4 } }, "cc_security_level": { "EAL": { "EAL 4": 5, "EAL 5": 4, "EAL 2": 2, "EAL 1": 1, "EAL 2+": 1, "EAL5+": 1, "EAL6": 1, "EAL 4 augmented": 3 } }, "cc_sar": { "ADV": { "ADV_FSP": 1 }, "AGD": { "AGD_OPE": 3, "AGD_PRE": 3 }, "ALC": { "ALC_DVS.2": 5, "ALC_FLR": 2, "ALC_CMC.4": 1, "ALC_CMS.5": 1, "ALC_DEL.1": 1, "ALC_LCD.1": 1, "ALC_TAT.2": 1, "ALC_COMP.1": 1 } }, "cc_sfr": { "FCS": { "FCS_COP": 3, "FCS_COP.1": 10, "FCS_CKM.1": 1, "FCS_RND.1": 1, "FCS_RNG.1": 1 }, "FIA": { "FIA_UAU.4": 3 } }, "cc_claims": { "OE": { "OE.APPLET": 1, "OE.VERIFICATION": 1, "OE.CODE_EVIDENCE": 1 } }, "vendor": { "Infineon": { "Infineon": 3, "Infineon Technologies AG": 2 }, "GD": { "G+D": 11, "Giesecke+Devrient": 4 } }, "eval_facility": { "TUV": { "TÜV Informationstechnik": 6, "TÜViT": 2 } }, "symmetric_crypto": { "AES_competition": { "AES": { "AES": 12 } }, "DES": { "DES": { "DES": 8 }, "3DES": { "TDES": 1 } }, "constructions": { "MAC": { "CMAC": 3 } } }, "asymmetric_crypto": { "ECC": { "ECC": { "ECC": 1 } } }, "pq_crypto": {}, "hash_function": { "SHA": { "SHA1": { "SHA-1": 1 }, "SHA2": { "SHA-256": 1, "SHA-2": 2 } } }, "crypto_scheme": { "MAC": { "MAC": 5 } }, "crypto_protocol": { "PACE": { "PACE": 1 }, "PGP": { "PGP": 1 } }, "randomness": { "RNG": { "RNG": 2 } }, "cipher_mode": { "CBC": { "CBC": 4 } }, "ecc_curve": {}, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": { "other": { "JIL": 2 } }, "technical_report_id": { "BSI": { "BSI TR-03110": 9, "BSI 7148": 1 } }, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": { "FIPS": { "FIPS197": 4, "FIPS180-4": 2, "FIPS46-3": 3 }, "BSI": { "AIS 34": 2, "AIS 1": 2, "AIS 14": 1, "AIS 19": 1, "AIS 26": 3, "AIS 36": 5, "AIS 37": 1, "AIS 20": 2, "AIS 32": 1, "AIS 38": 1, "AIS20": 2 }, "ISO": { "ISO/IEC 15408": 4, "ISO/IEC 18045": 4, "ISO/IEC 17065": 2 }, "ICAO": { "ICAO": 13 } }, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": { "ConfidentialDocument": { "being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1, "Technical Report BSI-DSZ-CC-1091, Version 1, 11 December 2018, TÜV Informationstechnik GmbH (confidential document) [8] [PP_BAC] Common Criteria Protection Profile Machine Readable Travel Document with \"ICAO": 1, "List for the TOE BSI-DSZ-CC-1091, 06 December 2018, 1091_MRTD_conflist-SCE.XLSX, cryptovision GmbH (confidential document) [10] Veridos Suite v3.0 – cryptovision ePasslet Suite – Java Card Applet Suite providing": 1 } } }, "st_keywords": { "cc_cert_id": { "DE": { "BSI-DSZ-CC-1091": 1, "BSI-DSZ-CC-1028-2017-MA-01": 3, "BSI-DSZ-CC-0951-2015-RA-01": 3, "BSI-DSZ-CC-1028-2017": 1, "BSI-DSZ-CC-0951-2015": 2 } }, "cc_protection_profile_id": { "BSI": { "BSI-CC-PP0055": 3, "BSI-CC-PP-0056-V2-2012": 1, "BSI-CC-PP- 0068-V2-2011-MA-01": 1, "BSI-CC-PP-0084-": 1, "BSI-PP-0055": 1 } }, "cc_security_level": { "EAL": { "EAL 4+": 1, "EAL 5+": 2, "EAL4": 9, "EAL4 augmented": 2 } }, "cc_sar": { "ADV": { "ADV_ARC.1": 2 }, "AGD": { "AGD_PRE": 5 }, "ALC": { "ALC_DVS.2": 6, "ALC_DVS": 1 }, "ASE": { "ASE_TSS": 2 } }, "cc_sfr": { "FAU": { "FAU_SAS": 7, "FAU_ARP.1": 1, "FAU_GEN": 1, "FAU_SAS.1": 12, "FAU_SAS.1.1": 2 }, "FCO": { "FCO_NRO": 1 }, "FCS": { "FCS_RND": 7, "FCS_CKM.1": 32, "FCS_CKM.2": 3, "FCS_CKM.3": 1, "FCS_CKM.4": 22, "FCS_COP.1": 42, "FCS_COP": 49, "FCS_RNG.1": 2, "FCS_RND.1": 15, "FCS_RND.1.1": 3, "FCS_LIM": 1, "FCS_CKM.1.1": 2, "FCS_CKM.4.1": 4, "FCS_CKM": 3 }, "FDP": { "FDP_ACC": 4, "FDP_ACF": 5, "FDP_IFC": 2, "FDP_IFF": 2, "FDP_RIP": 8, "FDP_ROL": 1, "FDP_SDI.2": 1, "FDP_ITC": 3, "FDP_UIT": 4, "FDP_ITC.1": 10, "FDP_ITC.2": 10, "FDP_ACC.1": 18, "FDP_ACF.1": 11, "FDP_ACC.1.1": 3, "FDP_ACF.1.1": 3, "FDP_ACF.1.2": 4, "FDP_ACF.1.3": 3, "FDP_ACF.1.4": 4, "FDP_UCT.1": 11, "FDP_UIT.1": 9, "FDP_IFC.1": 4, "FDP_UCT.1.1": 3, "FDP_UIT.1.1": 3, "FDP_UIT.1.2": 2, "FDP_UCT": 2 }, "FIA": { "FIA_ATD": 1, "FIA_UID": 3, "FIA_USB": 1, "FIA_SOS.2": 1, "FIA_UAU.5.2": 6, "FIA_UAU.4": 15, "FIA_UAU.6": 12, "FIA_UID.1": 12, "FIA_UID.1.1": 2, "FIA_UID.1.2": 1, "FIA_UAU.1": 10, "FIA_UAU.1.1": 2, "FIA_UAU.1.2": 2, "FIA_UAU.4.1": 2, "FIA_UAU.5": 9, "FIA_UAU.5.1": 4, "FIA_UAU.6.1": 2, "FIA_AFL.1": 8, "FIA_AFL.1.1": 2, "FIA_AFL.1.2": 2, "FIA_UAU": 6, "FIA_AFL": 1 }, "FMT": { "FMT_LIM": 12, "FMT_MSA": 9, "FMT_SMF.1": 22, "FMT_SMR.1": 22, "FMT_MTD": 27, "FMT_SMR": 6, "FMT_SMF": 3, "FMT_LIM.1": 25, "FMT_LIM.2": 22, "FMT_LIM.1.1": 6, "FMT_LIM.2.1": 7, "FMT_MSA.3": 3, "FMT_SMF.1.1": 2, "FMT_SMR.1.1": 4, "FMT_SMR.1.2": 4, "FMT_MTD.1": 14, "FMT_MSA.1": 1 }, "FPR": { "FPR_UNO.1": 1 }, "FPT": { "FPT_FLS.1": 15, "FPT_PHP.3": 15, "FPT_TDC.1": 1, "FPT_TST.1": 12, "FPT_FLS": 4, "FPT_RCV": 1, "FPT_FLS.1.1": 3, "FPT_TST.1.1": 2, "FPT_TST.1.2": 2, "FPT_TST.1.3": 2, "FPT_PHP.3.1": 2, "FPT_RVM.1": 1, "FPT_SEP.1": 1 }, "FTP": { "FTP_ITC": 2, "FTP_ITC.1": 5, "FTP_TRP.1": 5 } }, "cc_claims": { "O": { "O.SID": 1, "O.FIREWALL": 1, "O.GLOBAL_ARRAYS_CONFID": 1, "O.GLOBAL_ARRAYS_INTEG": 1, "O.NATIVE": 1, "O.OPERATE": 1, "O.REALLOCATION": 1, "O.RESOURCES": 1, "O.ALARM": 1, "O.CIPHER": 1, "O.KEY-MNGT": 1, "O.PIN-MNGT": 1, "O.TRANSACTION": 1, "O.OBJ-DELETION": 1, "O.DELETION": 1, "O.LOAD": 1, "O.INSTALL": 1, "O.CARD-MANAGEMENT": 1, "O.SCP": 1 }, "T": { "T.CONFID-APPLI-DATA": 1, "T.CONFID-JCS-CODE": 1, "T.CONFID-JCS-DATA": 1, "T.INTEG-APPLI-CODE": 2, "T.INTEG-APPLI-DATA": 2, "T.INTEG-JCS-CODE": 1, "T.INTEG-JCS-DATA": 1, "T.SID": 2, "T.EXE-CODE": 2, "T.NATIVE": 1, "T.RESOURCES": 1, "T.DELETION": 1, "T.SECURE_DELETION": 1, "T.INSTALL": 1, "T.OBJ-DELETION": 1, "T.PHYSICAL": 1 }, "A": { "A.APPLET": 1, "A.VERIFICATION": 1 }, "OT": { "OT.SCP": 2 }, "OE": { "OE.APPLET": 1, "OE.VERIFICATION": 1, "OE.CODE-EVIDENCE": 1, "OE.MRTD_": 1 } }, "vendor": { "Infineon": { "Infineon": 5, "Infineon Technologies AG": 2 }, "GD": { "Giesecke & Devrient": 1, "G&D": 1, "Giesecke+Devrient": 1 } }, "eval_facility": {}, "symmetric_crypto": { "AES_competition": { "AES": { "AES": 19, "AES-": 1 } }, "DES": { "DES": { "DES": 6 }, "3DES": { "Triple-DES": 14, "TDES": 2 }, "Lucifer": { "Lucifer": 1 } }, "constructions": { "MAC": { "KMAC": 1, "CMAC": 5 } } }, "asymmetric_crypto": { "ECC": { "ECDSA": { "ECDSA": 1 }, "ECC": { "ECC": 2 } }, "FF": { "DH": { "Diffie-Hellman": 1 } } }, "pq_crypto": {}, "hash_function": { "SHA": { "SHA1": { "SHA-1": 6 }, "SHA2": { "SHA-256": 2, "SHA-224": 1, "SHA-2": 2 } }, "JH": { "JH": 1 }, "MD": { "MD5": { "MD5": 1 } }, "RIPEMD": { "RIPEMD-160": 1 } }, "crypto_scheme": { "MAC": { "MAC": 9 }, "KEX": { "Key exchange": 1 } }, "crypto_protocol": { "PACE": { "PACE": 4 } }, "randomness": { "RNG": { "RND": 1, "RNG": 9 } }, "cipher_mode": { "CBC": { "CBC": 5 } }, "ecc_curve": {}, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": { "SCA": { "physical probing": 5, "DPA": 2, "SPA": 1, "timing attacks": 1 }, "FI": { "Physical Tampering": 5, "physical tampering": 1, "Physical tampering": 1, "Malfunction": 3, "malfunction": 8, "fault injection": 1 }, "other": { "reverse engineering": 1 } }, "technical_report_id": { "BSI": { "BSI TR-03110": 1, "BSI 2006": 1 } }, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": { "EF": { "EF.DG1": 32, "EF.DG2": 9, "EF.DG3": 9, "EF.DG4": 8, "EF.DG5": 8, "EF.DG16": 32, "EF.DG13": 3, "EF.DG14": 3, "EF.DG15": 1, "EF.COM": 12, "EF.SOD": 13 } }, "standard_id": { "FIPS": { "FIPS 180-48": 1, "FIPS 46-3": 4, "FIPS46-3": 2, "FIPS 197": 4, "FIPS197": 2, "FIPS 180-2": 1, "FIPS 180-4": 1, "FIPS PUB 46-3": 1, "FIPS180-2": 1, "FIPS180-4": 1, "FIPS186-3": 1, "FIPS PUB 186-4": 1 }, "PKCS": { "PKCS#15": 1, "PKCS#3": 1, "PKCS1": 1 }, "BSI": { "AIS20": 4, "AIS 20": 3, "AIS31": 1 }, "RFC": { "RFC4493": 1, "RFC 5639": 1, "RFC3369": 1 }, "ISO": { "ISO/IEC 7816-2": 1, "ISO/IEC 9796-2": 1, "ISO/IEC 15946": 2, "ISO/IEC 11770": 2, "ISO/IEC 7816-4": 1 }, "ICAO": { "ICAO": 18 }, "X509": { "X.509": 1 }, "CC": { "CCMB-2017-04-001": 2, "CCMB-2017-04-002": 2, "CCMB-2017-04-003": 2, "CCMB-2017-04-004": 2 } }, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": { "OutOfScope": { "Out of scope": 84, "chapter 8.1.1.1 in platform ST) FDP_ACC.2/FIREWALL No correspondence Out of scope (internal Java Card Fire- wall": 1, "internal Java Virtual Machine). No contradiction to this ST. FDP_IFF.1/JCVM No correspondence Out of scope (internal Java Virtual Machine": 1, "internal Java Card Fire- wall). No contradiction to this ST. FMT_MSA.1/JCRE No correspondence Out of scope (internal Java Card Fire- wall": 1, " No contradiction to this ST. FMT_MSA.2/FIREWALL-JCVM No correspondence Out of scope (internal Java Card Fire- wall": 1, "internal Java Card Fire- wall). No contradiction to this ST. FMT_SMF.1 No correspondence Out of scope (internal Java Card Fire- wall": 1, "FCS_CKM.1.1/RSA, FCS_CKM.1.1/ECC, FCS_CKM.1.1/3DES, FCS_CKM.1.1/AES) No crrespondence. Out of scope. The TOE uses the spe- cific Document Basic Access Key Der- ivation Algorithm": 1, "DRG.4) that can be used directly. FDP_RIP.1/ABORT No correspondence. Out of scope (internal Java Card func- tionality": 1, " No contradiction to this ST. FDP_RIP.1/bArray No correspondence. Out of scope (internal Java Card func- tionality": 1, " No contradiction to this ST. FDP_RIP.1/TRANSIENT No correspondence. Out of scope (internal Java Card func- tionality": 1, "chapter 8.1.1.4 in platform ST) FIA_ATD.1/AID No correspondence. Out of scope (internal Java Card func- tionality": 1, "internal Java Card func- tionality). No contradiction to this ST. FIA_USB.1/AID No correspondence Out of scope (internal Java Card func- tionality": 1, "internal Java Card func- tionality). No contradiction to this ST. FMT_MTD.3/JCRE No correspondence Out of scope (internal Java Card func- tionality": 1, " No contradiction to this ST. FMT_SMR.1/Installer No correspondence Out of scope (internal Java Card func- tionality": 1, " No contradiction to this ST. FPT_RCV.3/Installer No correspondence Out of scope (internal Java Card func- tionality": 1, "ADEL) policy on security aspects outside the runtime. FDP_ACC.2/ADEL No correspondence Out of scope (internal Java Card func- tionality": 1, "internal Java Card func- tionality). No contradiction to this ST. FDP_RIP.1/ADEL No correspondence Out of scope (internal Java Card func- tionality": 1, "internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.3/ADEL No correspondence Out of scope (internal Java Card func- tionality": 1, "internal Java Card func- tionality). No contradiction to this ST. FMT_SMR.1/ADEL No correspondence Out of scope (internal Java Card func- tionality": 1, "internal Java Card func- tionality). No contradiction to this ST. FDP_IFC.2/CM No correspondence Out of scope (internal Java Card func- tionality": 1, "internal Java Card func- tionality). No contradiction to this ST. FDP_UIT.1/CM No correspondence Out of scope (internal Java Card func- tionality": 1, "internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.1/CM No correspondence Out of scope (internal Java Card func- tionality": 1, "internal Java Card func- tionality). No contradiction to this ST. FMT_SMF.1/CM No correspondence Out of scope (internal Java Card func- tionality": 1, "internal Java Card func- tionality). No contradiction to this ST. FTP_ITC.1/CM No correspondence Out of scope (internal Java Card func- tionality": 1, "platform ST) Firewall Policy (chapter 8.1.1.1 in platform ST) FDP_ACC.2/FIREWALL No correspondence Out of scope (internal Java Card Fire- wall). The resulting requirements for Veridos Suite v3.0 - cryptovision": 1, "the User Guidance of the TOE. No contradic- tion to this ST. FDP_ACF.1/FIREWALL No correspondence Out of scope (internal Java Card Fire- wall). The resulting requirements for applets are reflected in the User": 1, "of the TOE. No contradic- tion to this ST. FDP_IFC.1/JCVM No correspondence Out of scope (internal Java Virtual Machine). No contradiction to this ST. FDP_IFF.1/JCVM No correspondence Out": 1, "internal Java Virtual Machine). No contradiction to this ST. FDP_RIP.1/OBJECTS No correspondence. Out of scope (internal Java Card Fire- wall). No contradiction to this ST. FMT_MSA.1/JCRE No correspondence Out": 1, "internal Java Card Fire- wall). No contradiction to this ST. FMT_MSA.1/JCVM No correspondence Out of scope (internal Java Card Fire- wall). No contradiction to this ST. FMT_MSA.2/FIREWALL-JCVM No": 1, "Out of scope (internal Java Card Fire- wall). The resulting requirements for applets are reflected in the User": 2, "of the TOE. No contradic- tion to this ST. FMT_MSA.3/FIREWALL No correspondence Out of scope (internal Java Card Fire- wall). The resulting requirements for applets are reflected in the User": 1, "of the TOE. No contradic- tion to this ST. FMT_MSA.3/JCVM No correspondence Out of scope (internal Java Card Fire- wall). No contradiction to this ST. FMT_SMF.1 No correspondence Out of": 1, "internal Java Card Fire- wall). No contradiction to this ST. FMT_SMR.1 No correspondence Out of scope (internal Java Card Fire- wall). No contradiction to this ST. Application Programming Interface": 1, "FCS_CKM.1 (FCS_CKM.1.1/RSA, FCS_CKM.1.1/ECC, FCS_CKM.1.1/3DES, FCS_CKM.1.1/AES) No crrespondence. Out of scope. The TOE uses the spe- cific Document Basic Access Key Der- ivation Algorithm. There are no con-": 1, "to this ST. FCS_CKM.2 No correspondence Out of scope (managed within Java Card OS). No contradiction to this ST. Veridos Suite v3.0 - cryptovision": 1, "15 of 76 Platform SFR Correspondence in this ST References/Remarks FCS_CKM.3 No correspondence Out of scope (managed within Java Card OS). No contradiction to this ST. FCS_CKM.4 FCS_CKM.4 The requirements": 1, "a defined quality met- ric (DRG.4) that can be used directly. FDP_RIP.1/ABORT No correspondence. Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_RIP.1/APDU No correspondence": 1, "Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_RIP.1/bArray No": 1, "Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_RIP.1/KEYS No correspondence": 1, "Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_RIP.1/TRANSIENT No": 1, "Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_ROL.1/FIREWALL No": 1, "complement Java Card OS mechanisms. No contradiction to this ST. FPT_TDC.1 No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FPT_TST.1 FPT_TST.1 Self-testing": 1, "initial start-up. Aid Management (chapter 8.1.1.4 in platform ST) FIA_ATD.1/AID No correspondence. Out of scope (internal Java Card func- tionality). No contradiction to this ST. FIA_UID.2/AID No correspondence": 1, "internal Java Card func- tionality). No contradiction to this ST. FIA_USB.1/AID No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_MTD.1/JCRE No correspondence": 1, "internal Java Card func- tionality). No contradiction to this ST. FMT_MTD.3/JCRE No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. INSTG Security Functional": 1, "which addresses security aspects outside the runtime. FDP_ITC.2/Installer No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_SMR.1/Installer No": 1, "Out of scope (internal Java Card func- tionality). No contradiction to this ST. Veridos Suite v3.0 -": 1, "76 Platform SFR Correspondence in this ST References/Remarks FPT_FLS.1/Installer No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FPT_RCV.3/Installer No": 1, "Out of scope (internal Java Card func- tionality). No contradiction to this ST. ADELG Security Functional": 1, "manager (ADEL) policy on security aspects outside the runtime. FDP_ACC.2/ADEL No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_ACF.1/ADEL No correspondence": 1, "internal Java Card func- tionality). No contradiction to this ST. FDP_RIP.1/ADEL No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.1/ADEL No correspondence": 1, "internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.3/ADEL No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_SMF.1/ADEL No correspondence": 1, "internal Java Card func- tionality). No contradiction to this ST. FMT_SMR.1/ADEL No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FPT_FLS.1/ADEL No correspondence": 1, "that owns the deleted objects by invoking a specific API method. FDP_RIP.1/ODEL No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FPT_FLS.1/ODEL FPT_FLS.1 The": 1, "verified, or that has been modified after bytecode verification. FCO_NRO.2/CM No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_IFC.2/CM No correspondence": 1, "18 of 76 Platform SFR Correspondence in this ST References/Remarks FDP_IFF.1/CM No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_UIT.1/CM No correspondence": 1, "internal Java Card func- tionality). No contradiction to this ST. FIA_UID.1/CM No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.1/CM No correspondence": 1, "internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.3/CM No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_SMF.1/CM No correspondence": 1, "internal Java Card func- tionality). No contradiction to this ST. FMT_SMR.1/CM No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FTP_ITC.1/CM No correspondence": 1, "objectives for the TOE and are covered by SFRs in the platform ST. FTP_ITC.1/CMGR No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. SCPG Security Functional": 1, "objectives. Platform Objective Correspondence in this ST References/Remarks O.SID No correspondence Out of scope. No contradiction to this ST. O.FIREWALL No correspondence Out of scope. No contradiction to this": 1, "19 of 76 Platform Objective Correspondence in this ST References/Remarks O.NATIVE No correspondence Out of scope. No contradiction to this ST. O.OPERATE No correspondence Out of scope. No contradiction to this ST": 1, "O.REALLOCATION No correspondence Out of scope. No contradiction to this ST. O.RESOURCES No correspondence Out of scope. No contradiction to this": 1, "O.ALARM No correspondence Out of scope. No contradiction to this ST. O.CIPHER No correspondence Indirectly relevant for the correct": 1, "no corresponding objectives for the TOE of this ST. No contradictions. O.KEY-MNGT No correspondence Out of scope. No contradiction to this ST. O.PIN-MNGT No correspondence Out of scope. No contradiction to this": 1, "O.TRANSACTION No correspondence Out of scope. No contradiction to this ST. O.OBJ-DELETION No correspondence Out of scope. No contradiction to": 1, "ST. O.DELETION No correspondence Out of scope. No contradiction to this ST. O.LOAD No correspondence Out of scope. No contradiction to this ST. O": 1, "No correspondence Out of scope. No contradiction to this ST. O.CARD-MANAGEMENT No correspondence Out of scope. No contradiction to this ST. OT.SCP.IC OT.Prot_Phys-Tamper The objectives are related. No con-": 1, "The objectives are related. No con- tradiction to this ST. O.SCP.SUPPORT No correspondence Out of scope. No contradiction to this ST. Table 4: Assessment of the platform objectives. 2.3.4 Assessment of": 1, "Platform Threat Correspondence in this ST References/Remarks T.CONFID-APPLI-DATA No correspondence Out of scope. No contradiction to this ST. T.CONFID-JCS-CODE No correspondence Out of scope. No contradiction to": 1, "T.Information_Leakage No contradiction to this ST. T.INTEG-APPLI-CODE No correspondence Out of scope. No contradiction to this ST. T.INTEG-APPLI-CODE.LOAD No correspondence Out of scope. No": 1, "T.INTEG-APPLI-DATA T.Forgery No contradiction to this ST. T.INTEG-APPLI-DATA.LOAD No correspondence Out of scope. No contradiction to this ST. T.INTEG-JCS-CODE No correspondence Out of scope. No contradiction to": 1, "ST. T.INTEG-JCS-DATA No correspondence Out of scope. No contradiction to this ST. T.SID.1 No correspondence Out of scope. No contradiction to this ST": 1, "SID.2 No correspondence Out of scope. No contradiction to this ST. T.EXE-CODE.1 No correspondence Out of scope. No contradiction to this ST. T.EXE-CODE.2 No correspondence Out of scope. No contradiction to this": 1, "T.NATIVE No correspondence Out of scope. No contradiction to this ST. T.RESOURCES No correspondence Out of scope. No contradiction to this": 1, "T.DELETION No correspondence Out of scope. No contradiction to this ST. T.SECURE_DELETION No correspondence Out of scope. No contradiction to": 1, "ST. T.INSTALL No correspondence Out of scope. No contradiction to this ST. T.OBJ-DELETION No correspondence Out of scope. No contradiction to": 1 } } }, "cert_keywords": { "cc_cert_id": { "DE": { "BSI-DSZ-CC-1091-2018": 1 } }, "cc_protection_profile_id": { "BSI": { "BSI-CC-PP-0055-2009": 1 } }, "cc_security_level": { "EAL": { "EAL 4": 1, "EAL 5": 1, "EAL 2": 1, "EAL 4 augmented": 1 } }, "cc_sar": { "ALC": { "ALC_DVS.2": 1 } }, "cc_sfr": {}, "cc_claims": {}, "vendor": { "GD": { "G+D": 1 } }, "eval_facility": {}, "symmetric_crypto": {}, "asymmetric_crypto": {}, "pq_crypto": {}, "hash_function": {}, "crypto_scheme": {}, "crypto_protocol": {}, "randomness": {}, "cipher_mode": {}, "ecc_curve": {}, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": {}, "technical_report_id": { "BSI": { "BSI TR-03110": 1 } }, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": { "ISO": { "ISO/IEC 15408": 2, "ISO/IEC 18045": 2 }, "ICAO": { "ICAO": 1 } }, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": {} }, "report_filename": "1091a_pdf.pdf", "st_filename": "1091b_pdf.pdf", "cert_filename": "1091c_pdf.pdf" }, "heuristics": { "_type": "sec_certs.sample.cc.CCCertificate.Heuristics", "extracted_versions": { "_type": "set", "_value": [ "3.0" ] }, "cpe_matches": null, "verified_cpe_matches": null, "related_cves": null, "cert_lab": [ "BSI" ], "cert_id": "BSI-DSZ-CC-1091-2018", "st_references": { "_type": "sec_certs.sample.certificate.References", "directly_referenced_by": null, "indirectly_referenced_by": null, "directly_referencing": { "_type": "set", "_value": [ "BSI-DSZ-CC-0951-2015", "BSI-DSZ-CC-1028-2017" ] }, "indirectly_referencing": { "_type": "set", "_value": [ "BSI-DSZ-CC-0951-2015", "BSI-DSZ-CC-1028-2017" ] } }, "report_references": { "_type": "sec_certs.sample.certificate.References", "directly_referenced_by": null, "indirectly_referenced_by": null, "directly_referencing": { "_type": "set", "_value": [ "BSI-DSZ-CC-0951-2015", "BSI-DSZ-CC-1028-2017", "BSI-DSZ-CC-1090-2018" ] }, "indirectly_referencing": { "_type": "set", "_value": [ "BSI-DSZ-CC-0782-2012", "BSI-DSZ-CC-1028-2017", "BSI-DSZ-CC-1090-2018", "BSI-DSZ-CC-0891-2015", "BSI-DSZ-CC-0951-2015", "BSI-DSZ-CC-0868-2014" ] } }, "annotated_references": null, "extracted_sars": { "_type": "set", "_value": [ { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_LCD", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_DVS", "level": 2 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_COMP", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_CMS", "level": 5 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_DEL", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_TAT", "level": 2 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_CMC", "level": 4 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ADV_ARC", "level": 1 } ] }, "direct_transitive_cves": null, "indirect_transitive_cves": null, "scheme_data": null }, "_id": "3d1b01ce576f605d" } }, { "_id": { "$oid": "66ba44469466f60634174965" }, "run_id": { "$oid": "66ba432a9466f606341743a8" }, "dgst": "3d1b01ce576f605d", "timestamp": { "$date": "2024-08-12T12:00:07.61Z" }, "type": "change", "diff": { "__update__": { "state": { "__update__": { "report": { "__update__": { "download_ok": false, "convert_ok": false, "extract_ok": false, "pdf_hash": null, "txt_hash": null } } } }, "pdf_data": { "__update__": { "report_metadata": null, "report_frontpage": null, "report_keywords": null, "report_filename": null } }, "heuristics": { "__update__": { "cert_lab": null, "report_references": { "__update__": { "directly_referencing": null, "indirectly_referencing": null } }, "extracted_sars": { "__discard__": { "_type": "set", "_value": [ { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_COMP", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_CMS", "level": 5 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_DEL", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_TAT", "level": 2 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_CMC", "level": 4 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_LCD", "level": 1 } ] } } } } } } }, { "_id": { "$oid": "66c0a10b1c78507fd1060c48" }, "run_id": { "$oid": "66c0a0e21c78507fd105fc06" }, "dgst": "3d1b01ce576f605d", "timestamp": { "$date": "2024-08-17T12:52:18.171Z" }, "type": "change", "diff": { "__update__": { "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1091a_pdf.pdf", "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1091b_pdf.pdf", "state": { "__update__": { "st": { "__update__": { "download_ok": false, "convert_ok": false, "extract_ok": false, "pdf_hash": null, "txt_hash": null } }, "cert": { "__update__": { "download_ok": false, "convert_ok": false, "extract_ok": false, "pdf_hash": null, "txt_hash": null } } } }, "pdf_data": { "__update__": { "st_metadata": null, "cert_metadata": null, "st_keywords": null, "cert_keywords": null, "st_filename": null, "cert_filename": null } }, "heuristics": { "__update__": { "cert_id": null, "st_references": { "__update__": { "directly_referencing": null, "indirectly_referencing": null } }, "extracted_sars": { "__discard__": { "_type": "set", "_value": [ { "_type": "sec_certs.sample.sar.SAR", "family": "ADV_ARC", "level": 1 } ] } } } } } } }, { "_id": { "$oid": "66c7affd2ff8c812f518cc93" }, "run_id": { "$oid": "66c7afc82ff8c812f518b966" }, "dgst": "3d1b01ce576f605d", "timestamp": { "$date": "2024-08-22T18:04:48.021Z" }, "type": "change", "diff": { "__update__": { "state": { "__update__": { "report": { "__update__": { "download_ok": true, "convert_ok": true, "extract_ok": true, "pdf_hash": "fe165dd9a7399dd5063f6a051bb9fab2de906f3949f9e9bf08df22d6d67818d2", "txt_hash": "c7e083548678887a9dce5c544e217d49628c0e4c5c9aa4db5bc84238cb86bf09" } }, "st": { "__update__": { "download_ok": true, "convert_ok": true, "extract_ok": true, "pdf_hash": "d57ff01507ab99d75e185c1ebde2bcb03553e139ff3b4d7833d34fc2f6ff3acd", "txt_hash": "208569ac4e98fa34ce71c4adebd1c61fed7fcc7ffb1e0bf324fd0f39ec4cc53b" } }, "cert": { "__update__": { "download_ok": true, "convert_ok": true, "extract_ok": true, "pdf_hash": "589838ef5e10753b89f5d8e845950bdf5786142e158f0bf44cdce323bd9bfaf4", "txt_hash": "11f93d790b9a81a71dae294af43527e0e847d8b15487e9c396a708466ec801e5" } } } }, "pdf_data": { "__update__": { "report_metadata": { "pdf_file_size_bytes": 904557, "pdf_is_encrypted": false, "pdf_number_of_pages": 30, "/Author": "Bundesamt für Sicherheit in der Informationstechnik", "/CreationDate": "D:20190109131709+01'00'", "/Creator": "Writer", "/Keywords": "\"Common Criteria, Certification, Zertifizierung, Security IC with MRTD BAC Application, Veridos GmbH, cv cryptovision GmbH\"", "/ModDate": "D:20190109132827+01'00'", "/Producer": "LibreOffice 5.2", "/Subject": "Common Criteria Certification", "/Title": "Certification Report BSI-DSZ-CC-1091-2018", "pdf_hyperlinks": { "_type": "set", "_value": [ "https://www.bsi.bund.de/AIS", "https://www.bsi.bund.de/zertifizierung", "http://www.commoncriteriaportal.org/", "https://www.bsi.bund.de/", "http://www.sogisportal.eu/", "https://www.bsi.bund.de/zertifizierungsreporte", "http://www.commoncriteriaportal.org/cc/" ] } }, "st_metadata": { "pdf_file_size_bytes": 1948229, "pdf_is_encrypted": false, "pdf_number_of_pages": 76, "/Title": "Security Target ePasslet/ePKI-SSCD", "/Author": "bdrisch", "/Keywords": "SSCD, ePasslet Suite, electronic Signature", "/Creator": "Microsoft® Word 2013", "/CreationDate": "D:20181206120214+01'00'", "/ModDate": "D:20181206120214+01'00'", "/Producer": "Microsoft® Word 2013", "pdf_hyperlinks": { "_type": "set", "_value": [ "file:///C:/Dokumente%20und%20Einstellungen/tzeggel/Desktop/glossar.htm%23aes" ] } }, "cert_metadata": { "pdf_file_size_bytes": 408715, "pdf_is_encrypted": false, "pdf_number_of_pages": 1, "/Author": "Bundesamt für Sicherheit in der Informationstechnik", "/CreationDate": "D:20190109132905+01'00'", "/Creator": "Writer", "/Keywords": "Common Criteria, Certification, Zertifizierung, Security IC with MRTD BAC Application, Veridos GmbH, cv cryptovision GmbH", "/ModDate": "D:20190109133015+01'00'", "/Producer": "LibreOffice 5.2", "/Subject": "Common Criteria Certification", "/Title": "Certificate BSI-DSZ-CC-1091-2018", "pdf_hyperlinks": { "_type": "set", "_value": [] } }, "report_frontpage": { "DE": { "match_rules": [ "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)" ], "cert_id": "BSI-DSZ-CC-1091-2018", "cert_item": "Veridos Suite v3.0 – cryptovision ePasslet Suite – Java Card applet configuration providing Machine-Readable Electronic Documents based on BSI TR-03110 for Official Use with BAC option", "developer": "cv cryptovision GmbH sponsored by Veridos GmbH - Identity Solutions by G+D BDR", "cert_lab": "BSI", "ref_protection_profiles": "Machine Readable Travel Document with \"ICAO Application\" Basic Access Control, Version 1.10, 25 March 2009, BSI-CC-PP-0055-2009", "cc_version": "PP conformant plus product specific extensions Common Criteria Part 2 extended", "cc_security_level": "Common Criteria Part 3 conformant EAL 4 augmented by ALC_DVS.2" } }, "report_keywords": { "cc_cert_id": { "DE": { "BSI-DSZ-CC-1091-2018": 18, "BSI-DSZ-CC-1090-2018": 3, "BSI-DSZ-CC-0951-2015-RA-01": 3, "BSI-DSZ-CC-1028-2017-MA-01": 4, "BSI-DSZ-CC-1028-2017": 3, "BSI-DSZ-CC-1028-": 1, "BSI-DSZ-CC-1091": 2, "BSI-DSZ-CC-0951-2015": 1 } }, "cc_protection_profile_id": { "BSI": { "BSI-CC-PP-0055-2009": 4 } }, "cc_security_level": { "EAL": { "EAL 4": 5, "EAL 5": 4, "EAL 2": 2, "EAL 1": 1, "EAL 2+": 1, "EAL5+": 1, "EAL6": 1, "EAL 4 augmented": 3 } }, "cc_sar": { "ADV": { "ADV_FSP": 1 }, "AGD": { "AGD_OPE": 3, "AGD_PRE": 3 }, "ALC": { "ALC_DVS.2": 5, "ALC_FLR": 2, "ALC_CMC.4": 1, "ALC_CMS.5": 1, "ALC_DEL.1": 1, "ALC_LCD.1": 1, "ALC_TAT.2": 1, "ALC_COMP.1": 1 } }, "cc_sfr": { "FCS": { "FCS_COP": 3, "FCS_COP.1": 10, "FCS_CKM.1": 1, "FCS_RND.1": 1, "FCS_RNG.1": 1 }, "FIA": { "FIA_UAU.4": 3 } }, "cc_claims": { "OE": { "OE.APPLET": 1, "OE.VERIFICATION": 1, "OE.CODE_EVIDENCE": 1 } }, "vendor": { "Infineon": { "Infineon": 3, "Infineon Technologies AG": 2 }, "GD": { "G+D": 11, "Giesecke+Devrient": 4 } }, "eval_facility": { "TUV": { "TÜV Informationstechnik": 6, "TÜViT": 2 } }, "symmetric_crypto": { "AES_competition": { "AES": { "AES": 12 } }, "DES": { "DES": { "DES": 8 }, "3DES": { "TDES": 1 } }, "constructions": { "MAC": { "CMAC": 3 } } }, "asymmetric_crypto": { "ECC": { "ECC": { "ECC": 1 } } }, "pq_crypto": {}, "hash_function": { "SHA": { "SHA1": { "SHA-1": 1 }, "SHA2": { "SHA-256": 1, "SHA-2": 2 } } }, "crypto_scheme": { "MAC": { "MAC": 5 } }, "crypto_protocol": { "PACE": { "PACE": 1 }, "PGP": { "PGP": 1 } }, "randomness": { "RNG": { "RNG": 2 } }, "cipher_mode": { "CBC": { "CBC": 4 } }, "ecc_curve": {}, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": { "other": { "JIL": 2 } }, "technical_report_id": { "BSI": { "BSI TR-03110": 9, "BSI 7148": 1 } }, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": { "FIPS": { "FIPS197": 4, "FIPS180-4": 2, "FIPS46-3": 3 }, "BSI": { "AIS 34": 2, "AIS 1": 2, "AIS 14": 1, "AIS 19": 1, "AIS 26": 3, "AIS 36": 5, "AIS 37": 1, "AIS 20": 2, "AIS 32": 1, "AIS 38": 1, "AIS20": 2 }, "ISO": { "ISO/IEC 15408": 4, "ISO/IEC 18045": 4, "ISO/IEC 17065": 2 }, "ICAO": { "ICAO": 13 } }, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": { "ConfidentialDocument": { "being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1, "Technical Report BSI-DSZ-CC-1091, Version 1, 11 December 2018, TÜV Informationstechnik GmbH (confidential document) [8] [PP_BAC] Common Criteria Protection Profile Machine Readable Travel Document with \"ICAO": 1, "List for the TOE BSI-DSZ-CC-1091, 06 December 2018, 1091_MRTD_conflist-SCE.XLSX, cryptovision GmbH (confidential document) [10] Veridos Suite v3.0 – cryptovision ePasslet Suite – Java Card Applet Suite providing": 1 } } }, "st_keywords": { "cc_cert_id": { "DE": { "BSI-DSZ-CC-1091": 1, "BSI-DSZ-CC-1028-2017-MA-01": 3, "BSI-DSZ-CC-0951-2015-RA-01": 3, "BSI-DSZ-CC-1028-2017": 1, "BSI-DSZ-CC-0951-2015": 2 } }, "cc_protection_profile_id": { "BSI": { "BSI-CC-PP0055": 3, "BSI-CC-PP-0056-V2-2012": 1, "BSI-CC-PP- 0068-V2-2011-MA-01": 1, "BSI-CC-PP-0084-": 1, "BSI-PP-0055": 1 } }, "cc_security_level": { "EAL": { "EAL 4+": 1, "EAL 5+": 2, "EAL4": 9, "EAL4 augmented": 2 } }, "cc_sar": { "ADV": { "ADV_ARC.1": 2 }, "AGD": { "AGD_PRE": 5 }, "ALC": { "ALC_DVS.2": 6, "ALC_DVS": 1 }, "ASE": { "ASE_TSS": 2 } }, "cc_sfr": { "FAU": { "FAU_SAS": 7, "FAU_ARP.1": 1, "FAU_GEN": 1, "FAU_SAS.1": 12, "FAU_SAS.1.1": 2 }, "FCO": { "FCO_NRO": 1 }, "FCS": { "FCS_RND": 7, "FCS_CKM.1": 32, "FCS_CKM.2": 3, "FCS_CKM.3": 1, "FCS_CKM.4": 22, "FCS_COP.1": 42, "FCS_COP": 49, "FCS_RNG.1": 2, "FCS_RND.1": 15, "FCS_RND.1.1": 3, "FCS_LIM": 1, "FCS_CKM.1.1": 2, "FCS_CKM.4.1": 4, "FCS_CKM": 3 }, "FDP": { "FDP_ACC": 4, "FDP_ACF": 5, "FDP_IFC": 2, "FDP_IFF": 2, "FDP_RIP": 8, "FDP_ROL": 1, "FDP_SDI.2": 1, "FDP_ITC": 3, "FDP_UIT": 4, "FDP_ITC.1": 10, "FDP_ITC.2": 10, "FDP_ACC.1": 18, "FDP_ACF.1": 11, "FDP_ACC.1.1": 3, "FDP_ACF.1.1": 3, "FDP_ACF.1.2": 4, "FDP_ACF.1.3": 3, "FDP_ACF.1.4": 4, "FDP_UCT.1": 11, "FDP_UIT.1": 9, "FDP_IFC.1": 4, "FDP_UCT.1.1": 3, "FDP_UIT.1.1": 3, "FDP_UIT.1.2": 2, "FDP_UCT": 2 }, "FIA": { "FIA_ATD": 1, "FIA_UID": 3, "FIA_USB": 1, "FIA_SOS.2": 1, "FIA_UAU.5.2": 6, "FIA_UAU.4": 15, "FIA_UAU.6": 12, "FIA_UID.1": 12, "FIA_UID.1.1": 2, "FIA_UID.1.2": 1, "FIA_UAU.1": 10, "FIA_UAU.1.1": 2, "FIA_UAU.1.2": 2, "FIA_UAU.4.1": 2, "FIA_UAU.5": 9, "FIA_UAU.5.1": 4, "FIA_UAU.6.1": 2, "FIA_AFL.1": 8, "FIA_AFL.1.1": 2, "FIA_AFL.1.2": 2, "FIA_UAU": 6, "FIA_AFL": 1 }, "FMT": { "FMT_LIM": 12, "FMT_MSA": 9, "FMT_SMF.1": 22, "FMT_SMR.1": 22, "FMT_MTD": 27, "FMT_SMR": 6, "FMT_SMF": 3, "FMT_LIM.1": 25, "FMT_LIM.2": 22, "FMT_LIM.1.1": 6, "FMT_LIM.2.1": 7, "FMT_MSA.3": 3, "FMT_SMF.1.1": 2, "FMT_SMR.1.1": 4, "FMT_SMR.1.2": 4, "FMT_MTD.1": 14, "FMT_MSA.1": 1 }, "FPR": { "FPR_UNO.1": 1 }, "FPT": { "FPT_FLS.1": 15, "FPT_PHP.3": 15, "FPT_TDC.1": 1, "FPT_TST.1": 12, "FPT_FLS": 4, "FPT_RCV": 1, "FPT_FLS.1.1": 3, "FPT_TST.1.1": 2, "FPT_TST.1.2": 2, "FPT_TST.1.3": 2, "FPT_PHP.3.1": 2, "FPT_RVM.1": 1, "FPT_SEP.1": 1 }, "FTP": { "FTP_ITC": 2, "FTP_ITC.1": 5, "FTP_TRP.1": 5 } }, "cc_claims": { "O": { "O.SID": 1, "O.FIREWALL": 1, "O.GLOBAL_ARRAYS_CONFID": 1, "O.GLOBAL_ARRAYS_INTEG": 1, "O.NATIVE": 1, "O.OPERATE": 1, "O.REALLOCATION": 1, "O.RESOURCES": 1, "O.ALARM": 1, "O.CIPHER": 1, "O.KEY-MNGT": 1, "O.PIN-MNGT": 1, "O.TRANSACTION": 1, "O.OBJ-DELETION": 1, "O.DELETION": 1, "O.LOAD": 1, "O.INSTALL": 1, "O.CARD-MANAGEMENT": 1, "O.SCP": 1 }, "T": { "T.CONFID-APPLI-DATA": 1, "T.CONFID-JCS-CODE": 1, "T.CONFID-JCS-DATA": 1, "T.INTEG-APPLI-CODE": 2, "T.INTEG-APPLI-DATA": 2, "T.INTEG-JCS-CODE": 1, "T.INTEG-JCS-DATA": 1, "T.SID": 2, "T.EXE-CODE": 2, "T.NATIVE": 1, "T.RESOURCES": 1, "T.DELETION": 1, "T.SECURE_DELETION": 1, "T.INSTALL": 1, "T.OBJ-DELETION": 1, "T.PHYSICAL": 1 }, "A": { "A.APPLET": 1, "A.VERIFICATION": 1 }, "OT": { "OT.SCP": 2 }, "OE": { "OE.APPLET": 1, "OE.VERIFICATION": 1, "OE.CODE-EVIDENCE": 1, "OE.MRTD_": 1 } }, "vendor": { "Infineon": { "Infineon": 5, "Infineon Technologies AG": 2 }, "GD": { "Giesecke & Devrient": 1, "G&D": 1, "Giesecke+Devrient": 1 } }, "eval_facility": {}, "symmetric_crypto": { "AES_competition": { "AES": { "AES": 19, "AES-": 1 } }, "DES": { "DES": { "DES": 6 }, "3DES": { "Triple-DES": 14, "TDES": 2 }, "Lucifer": { "Lucifer": 1 } }, "constructions": { "MAC": { "KMAC": 1, "CMAC": 5 } } }, "asymmetric_crypto": { "ECC": { "ECDSA": { "ECDSA": 1 }, "ECC": { "ECC": 2 } }, "FF": { "DH": { "Diffie-Hellman": 1 } } }, "pq_crypto": {}, "hash_function": { "SHA": { "SHA1": { "SHA-1": 6 }, "SHA2": { "SHA-256": 2, "SHA-224": 1, "SHA-2": 2 } }, "JH": { "JH": 1 }, "MD": { "MD5": { "MD5": 1 } }, "RIPEMD": { "RIPEMD-160": 1 } }, "crypto_scheme": { "MAC": { "MAC": 9 }, "KEX": { "Key exchange": 1 } }, "crypto_protocol": { "PACE": { "PACE": 4 } }, "randomness": { "RNG": { "RND": 1, "RNG": 9 } }, "cipher_mode": { "CBC": { "CBC": 5 } }, "ecc_curve": {}, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": { "SCA": { "physical probing": 5, "DPA": 2, "SPA": 1, "timing attacks": 1 }, "FI": { "Physical Tampering": 5, "physical tampering": 1, "Physical tampering": 1, "Malfunction": 3, "malfunction": 8, "fault injection": 1 }, "other": { "reverse engineering": 1 } }, "technical_report_id": { "BSI": { "BSI TR-03110": 1, "BSI 2006": 1 } }, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": { "EF": { "EF.DG1": 32, "EF.DG2": 9, "EF.DG3": 9, "EF.DG4": 8, "EF.DG5": 8, "EF.DG16": 32, "EF.DG13": 3, "EF.DG14": 3, "EF.DG15": 1, "EF.COM": 12, "EF.SOD": 13 } }, "standard_id": { "FIPS": { "FIPS 180-48": 1, "FIPS 46-3": 4, "FIPS46-3": 2, "FIPS 197": 4, "FIPS197": 2, "FIPS 180-2": 1, "FIPS 180-4": 1, "FIPS PUB 46-3": 1, "FIPS180-2": 1, "FIPS180-4": 1, "FIPS186-3": 1, "FIPS PUB 186-4": 1 }, "PKCS": { "PKCS#15": 1, "PKCS#3": 1, "PKCS1": 1 }, "BSI": { "AIS20": 4, "AIS 20": 3, "AIS31": 1 }, "RFC": { "RFC4493": 1, "RFC 5639": 1, "RFC3369": 1 }, "ISO": { "ISO/IEC 7816-2": 1, "ISO/IEC 9796-2": 1, "ISO/IEC 15946": 2, "ISO/IEC 11770": 2, "ISO/IEC 7816-4": 1 }, "ICAO": { "ICAO": 18 }, "X509": { "X.509": 1 }, "CC": { "CCMB-2017-04-001": 2, "CCMB-2017-04-002": 2, "CCMB-2017-04-003": 2, "CCMB-2017-04-004": 2 } }, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": { "OutOfScope": { "Out of scope": 84, "chapter 8.1.1.1 in platform ST) FDP_ACC.2/FIREWALL No correspondence Out of scope (internal Java Card Fire- wall": 1, "internal Java Virtual Machine). No contradiction to this ST. FDP_IFF.1/JCVM No correspondence Out of scope (internal Java Virtual Machine": 1, "internal Java Card Fire- wall). No contradiction to this ST. FMT_MSA.1/JCRE No correspondence Out of scope (internal Java Card Fire- wall": 1, " No contradiction to this ST. FMT_MSA.2/FIREWALL-JCVM No correspondence Out of scope (internal Java Card Fire- wall": 1, "internal Java Card Fire- wall). No contradiction to this ST. FMT_SMF.1 No correspondence Out of scope (internal Java Card Fire- wall": 1, "FCS_CKM.1.1/RSA, FCS_CKM.1.1/ECC, FCS_CKM.1.1/3DES, FCS_CKM.1.1/AES) No crrespondence. Out of scope. The TOE uses the spe- cific Document Basic Access Key Der- ivation Algorithm": 1, "DRG.4) that can be used directly. FDP_RIP.1/ABORT No correspondence. Out of scope (internal Java Card func- tionality": 1, " No contradiction to this ST. FDP_RIP.1/bArray No correspondence. Out of scope (internal Java Card func- tionality": 1, " No contradiction to this ST. FDP_RIP.1/TRANSIENT No correspondence. Out of scope (internal Java Card func- tionality": 1, "chapter 8.1.1.4 in platform ST) FIA_ATD.1/AID No correspondence. Out of scope (internal Java Card func- tionality": 1, "internal Java Card func- tionality). No contradiction to this ST. FIA_USB.1/AID No correspondence Out of scope (internal Java Card func- tionality": 1, "internal Java Card func- tionality). No contradiction to this ST. FMT_MTD.3/JCRE No correspondence Out of scope (internal Java Card func- tionality": 1, " No contradiction to this ST. FMT_SMR.1/Installer No correspondence Out of scope (internal Java Card func- tionality": 1, " No contradiction to this ST. FPT_RCV.3/Installer No correspondence Out of scope (internal Java Card func- tionality": 1, "ADEL) policy on security aspects outside the runtime. FDP_ACC.2/ADEL No correspondence Out of scope (internal Java Card func- tionality": 1, "internal Java Card func- tionality). No contradiction to this ST. FDP_RIP.1/ADEL No correspondence Out of scope (internal Java Card func- tionality": 1, "internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.3/ADEL No correspondence Out of scope (internal Java Card func- tionality": 1, "internal Java Card func- tionality). No contradiction to this ST. FMT_SMR.1/ADEL No correspondence Out of scope (internal Java Card func- tionality": 1, "internal Java Card func- tionality). No contradiction to this ST. FDP_IFC.2/CM No correspondence Out of scope (internal Java Card func- tionality": 1, "internal Java Card func- tionality). No contradiction to this ST. FDP_UIT.1/CM No correspondence Out of scope (internal Java Card func- tionality": 1, "internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.1/CM No correspondence Out of scope (internal Java Card func- tionality": 1, "internal Java Card func- tionality). No contradiction to this ST. FMT_SMF.1/CM No correspondence Out of scope (internal Java Card func- tionality": 1, "internal Java Card func- tionality). No contradiction to this ST. FTP_ITC.1/CM No correspondence Out of scope (internal Java Card func- tionality": 1, "platform ST) Firewall Policy (chapter 8.1.1.1 in platform ST) FDP_ACC.2/FIREWALL No correspondence Out of scope (internal Java Card Fire- wall). The resulting requirements for Veridos Suite v3.0 - cryptovision": 1, "the User Guidance of the TOE. No contradic- tion to this ST. FDP_ACF.1/FIREWALL No correspondence Out of scope (internal Java Card Fire- wall). The resulting requirements for applets are reflected in the User": 1, "of the TOE. No contradic- tion to this ST. FDP_IFC.1/JCVM No correspondence Out of scope (internal Java Virtual Machine). No contradiction to this ST. FDP_IFF.1/JCVM No correspondence Out": 1, "internal Java Virtual Machine). No contradiction to this ST. FDP_RIP.1/OBJECTS No correspondence. Out of scope (internal Java Card Fire- wall). No contradiction to this ST. FMT_MSA.1/JCRE No correspondence Out": 1, "internal Java Card Fire- wall). No contradiction to this ST. FMT_MSA.1/JCVM No correspondence Out of scope (internal Java Card Fire- wall). No contradiction to this ST. FMT_MSA.2/FIREWALL-JCVM No": 1, "Out of scope (internal Java Card Fire- wall). The resulting requirements for applets are reflected in the User": 2, "of the TOE. No contradic- tion to this ST. FMT_MSA.3/FIREWALL No correspondence Out of scope (internal Java Card Fire- wall). The resulting requirements for applets are reflected in the User": 1, "of the TOE. No contradic- tion to this ST. FMT_MSA.3/JCVM No correspondence Out of scope (internal Java Card Fire- wall). No contradiction to this ST. FMT_SMF.1 No correspondence Out of": 1, "internal Java Card Fire- wall). No contradiction to this ST. FMT_SMR.1 No correspondence Out of scope (internal Java Card Fire- wall). No contradiction to this ST. Application Programming Interface": 1, "FCS_CKM.1 (FCS_CKM.1.1/RSA, FCS_CKM.1.1/ECC, FCS_CKM.1.1/3DES, FCS_CKM.1.1/AES) No crrespondence. Out of scope. The TOE uses the spe- cific Document Basic Access Key Der- ivation Algorithm. There are no con-": 1, "to this ST. FCS_CKM.2 No correspondence Out of scope (managed within Java Card OS). No contradiction to this ST. Veridos Suite v3.0 - cryptovision": 1, "15 of 76 Platform SFR Correspondence in this ST References/Remarks FCS_CKM.3 No correspondence Out of scope (managed within Java Card OS). No contradiction to this ST. FCS_CKM.4 FCS_CKM.4 The requirements": 1, "a defined quality met- ric (DRG.4) that can be used directly. FDP_RIP.1/ABORT No correspondence. Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_RIP.1/APDU No correspondence": 1, "Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_RIP.1/bArray No": 1, "Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_RIP.1/KEYS No correspondence": 1, "Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_RIP.1/TRANSIENT No": 1, "Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_ROL.1/FIREWALL No": 1, "complement Java Card OS mechanisms. No contradiction to this ST. FPT_TDC.1 No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FPT_TST.1 FPT_TST.1 Self-testing": 1, "initial start-up. Aid Management (chapter 8.1.1.4 in platform ST) FIA_ATD.1/AID No correspondence. Out of scope (internal Java Card func- tionality). No contradiction to this ST. FIA_UID.2/AID No correspondence": 1, "internal Java Card func- tionality). No contradiction to this ST. FIA_USB.1/AID No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_MTD.1/JCRE No correspondence": 1, "internal Java Card func- tionality). No contradiction to this ST. FMT_MTD.3/JCRE No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. INSTG Security Functional": 1, "which addresses security aspects outside the runtime. FDP_ITC.2/Installer No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_SMR.1/Installer No": 1, "Out of scope (internal Java Card func- tionality). No contradiction to this ST. Veridos Suite v3.0 -": 1, "76 Platform SFR Correspondence in this ST References/Remarks FPT_FLS.1/Installer No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FPT_RCV.3/Installer No": 1, "Out of scope (internal Java Card func- tionality). No contradiction to this ST. ADELG Security Functional": 1, "manager (ADEL) policy on security aspects outside the runtime. FDP_ACC.2/ADEL No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_ACF.1/ADEL No correspondence": 1, "internal Java Card func- tionality). No contradiction to this ST. FDP_RIP.1/ADEL No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.1/ADEL No correspondence": 1, "internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.3/ADEL No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_SMF.1/ADEL No correspondence": 1, "internal Java Card func- tionality). No contradiction to this ST. FMT_SMR.1/ADEL No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FPT_FLS.1/ADEL No correspondence": 1, "that owns the deleted objects by invoking a specific API method. FDP_RIP.1/ODEL No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FPT_FLS.1/ODEL FPT_FLS.1 The": 1, "verified, or that has been modified after bytecode verification. FCO_NRO.2/CM No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_IFC.2/CM No correspondence": 1, "18 of 76 Platform SFR Correspondence in this ST References/Remarks FDP_IFF.1/CM No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_UIT.1/CM No correspondence": 1, "internal Java Card func- tionality). No contradiction to this ST. FIA_UID.1/CM No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.1/CM No correspondence": 1, "internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.3/CM No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_SMF.1/CM No correspondence": 1, "internal Java Card func- tionality). No contradiction to this ST. FMT_SMR.1/CM No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FTP_ITC.1/CM No correspondence": 1, "objectives for the TOE and are covered by SFRs in the platform ST. FTP_ITC.1/CMGR No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. SCPG Security Functional": 1, "objectives. Platform Objective Correspondence in this ST References/Remarks O.SID No correspondence Out of scope. No contradiction to this ST. O.FIREWALL No correspondence Out of scope. No contradiction to this": 1, "19 of 76 Platform Objective Correspondence in this ST References/Remarks O.NATIVE No correspondence Out of scope. No contradiction to this ST. O.OPERATE No correspondence Out of scope. No contradiction to this ST": 1, "O.REALLOCATION No correspondence Out of scope. No contradiction to this ST. O.RESOURCES No correspondence Out of scope. No contradiction to this": 1, "O.ALARM No correspondence Out of scope. No contradiction to this ST. O.CIPHER No correspondence Indirectly relevant for the correct": 1, "no corresponding objectives for the TOE of this ST. No contradictions. O.KEY-MNGT No correspondence Out of scope. No contradiction to this ST. O.PIN-MNGT No correspondence Out of scope. No contradiction to this": 1, "O.TRANSACTION No correspondence Out of scope. No contradiction to this ST. O.OBJ-DELETION No correspondence Out of scope. No contradiction to": 1, "ST. O.DELETION No correspondence Out of scope. No contradiction to this ST. O.LOAD No correspondence Out of scope. No contradiction to this ST. O": 1, "No correspondence Out of scope. No contradiction to this ST. O.CARD-MANAGEMENT No correspondence Out of scope. No contradiction to this ST. OT.SCP.IC OT.Prot_Phys-Tamper The objectives are related. No con-": 1, "The objectives are related. No con- tradiction to this ST. O.SCP.SUPPORT No correspondence Out of scope. No contradiction to this ST. Table 4: Assessment of the platform objectives. 2.3.4 Assessment of": 1, "Platform Threat Correspondence in this ST References/Remarks T.CONFID-APPLI-DATA No correspondence Out of scope. No contradiction to this ST. T.CONFID-JCS-CODE No correspondence Out of scope. No contradiction to": 1, "T.Information_Leakage No contradiction to this ST. T.INTEG-APPLI-CODE No correspondence Out of scope. No contradiction to this ST. T.INTEG-APPLI-CODE.LOAD No correspondence Out of scope. No": 1, "T.INTEG-APPLI-DATA T.Forgery No contradiction to this ST. T.INTEG-APPLI-DATA.LOAD No correspondence Out of scope. No contradiction to this ST. T.INTEG-JCS-CODE No correspondence Out of scope. No contradiction to": 1, "ST. T.INTEG-JCS-DATA No correspondence Out of scope. No contradiction to this ST. T.SID.1 No correspondence Out of scope. No contradiction to this ST": 1, "SID.2 No correspondence Out of scope. No contradiction to this ST. T.EXE-CODE.1 No correspondence Out of scope. No contradiction to this ST. T.EXE-CODE.2 No correspondence Out of scope. No contradiction to this": 1, "T.NATIVE No correspondence Out of scope. No contradiction to this ST. T.RESOURCES No correspondence Out of scope. No contradiction to this": 1, "T.DELETION No correspondence Out of scope. No contradiction to this ST. T.SECURE_DELETION No correspondence Out of scope. No contradiction to": 1, "ST. T.INSTALL No correspondence Out of scope. No contradiction to this ST. T.OBJ-DELETION No correspondence Out of scope. No contradiction to": 1 } } }, "cert_keywords": { "cc_cert_id": { "DE": { "BSI-DSZ-CC-1091-2018": 1 } }, "cc_protection_profile_id": { "BSI": { "BSI-CC-PP-0055-2009": 1 } }, "cc_security_level": { "EAL": { "EAL 4": 1, "EAL 5": 1, "EAL 2": 1, "EAL 4 augmented": 1 } }, "cc_sar": { "ALC": { "ALC_DVS.2": 1 } }, "cc_sfr": {}, "cc_claims": {}, "vendor": { "GD": { "G+D": 1 } }, "eval_facility": {}, "symmetric_crypto": {}, "asymmetric_crypto": {}, "pq_crypto": {}, "hash_function": {}, "crypto_scheme": {}, "crypto_protocol": {}, "randomness": {}, "cipher_mode": {}, "ecc_curve": {}, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": {}, "technical_report_id": { "BSI": { "BSI TR-03110": 1 } }, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": { "ISO": { "ISO/IEC 15408": 2, "ISO/IEC 18045": 2 }, "ICAO": { "ICAO": 1 } }, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": {} }, "report_filename": "1091a_pdf.pdf", "st_filename": "1091b_pdf.pdf", "cert_filename": "1091c_pdf.pdf" } }, "heuristics": { "__update__": { "cert_lab": [ "BSI" ], "cert_id": "BSI-DSZ-CC-1091-2018", "st_references": { "__update__": { "directly_referencing": { "_type": "set", "_value": [ "BSI-DSZ-CC-0951-2015", "BSI-DSZ-CC-1028-2017" ] }, "indirectly_referencing": { "_type": "set", "_value": [ "BSI-DSZ-CC-0951-2015", "BSI-DSZ-CC-1028-2017" ] } } }, "report_references": { "__update__": { "directly_referencing": { "_type": "set", "_value": [ "BSI-DSZ-CC-0951-2015", "BSI-DSZ-CC-1028-2017", "BSI-DSZ-CC-1090-2018" ] }, "indirectly_referencing": { "_type": "set", "_value": [ "BSI-DSZ-CC-1028-2017", "BSI-DSZ-CC-0891-2015", "BSI-DSZ-CC-0868-2014", "BSI-DSZ-CC-0782-2012", "BSI-DSZ-CC-0951-2015", "BSI-DSZ-CC-1090-2018" ] } } }, "extracted_sars": { "__add__": { "_type": "set", "_value": [ { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_COMP", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ADV_ARC", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_CMC", "level": 4 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_CMS", "level": 5 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_DEL", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_TAT", "level": 2 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_LCD", "level": 1 } ] } } } } } } }, { "_id": { "$oid": "673f6585a1452c910a80cd0b" }, "run_id": { "$oid": "673f6538a1452c910a80b5ad" }, "dgst": "3d1b01ce576f605d", "timestamp": { "$date": "2024-11-21T11:03:40.77Z" }, "type": "change", "diff": { "__update__": { "heuristics": { "__insert__": { "prev_certificates": [], "next_certificates": [] } } } } }, { "_id": { "$oid": "67a4087c6161883953270b0b" }, "run_id": { "$oid": "67a4080e616188395327018d" }, "dgst": "3d1b01ce576f605d", "timestamp": { "$date": "2025-02-05T18:04:55.043Z" }, "type": "change", "diff": { "__insert__": { "protection_profile_links": { "_type": "set", "_value": [ "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0055b.pdf" ] } }, "__update__": { "state": { "__update__": { "report": { "__update__": { "_type": "sec_certs.sample.document_state.DocumentState" } }, "st": { "__update__": { "_type": "sec_certs.sample.document_state.DocumentState" } }, "cert": { "__update__": { "_type": "sec_certs.sample.document_state.DocumentState" } } } }, "heuristics": { "__insert__": { "protection_profiles": { "_type": "set", "_value": [ "60455fc9564e2545" ] }, "eal": "EAL4+" }, "__update__": { "prev_certificates": null, "next_certificates": null } } }, "__delete__": [ "protection_profiles" ] } }, { "_id": { "$oid": "669f80cd566b7c5a18057e85" }, "run_id": { "$oid": "669f8076566b7c5a1805773d" }, "dgst": "44f677892bb84ce5", "timestamp": { "$date": "2024-07-23T00:09:57.927Z" }, "type": "new", "diff": { "_type": "sec_certs.sample.cc.CCCertificate", "dgst": "44f677892bb84ce5", "status": "archived", "category": "Trusted Computing", "name": "SLB9635TT1.2 / m1566a13 HW a13 / FW 03.17.0008.00", "manufacturer": "Infineon Technologies AG", "scheme": "DE", "security_level": { "_type": "set", "_value": [ "EAL4+" ] }, "not_valid_before": { "_type": "date", "_value": "2009-11-20" }, "not_valid_after": { "_type": "date", "_value": "2019-09-01" }, "report_link": "https://www.commoncriteriaportal.org/files/epfiles/0573a_pdf.pdf", "st_link": "https://www.commoncriteriaportal.org/files/epfiles/0573b_pdf.pdf", "cert_link": null, "manufacturer_web": "https://www.infineon.com/", "protection_profiles": { "_type": "set", "_value": [ { "_type": "sec_certs.sample.protection_profile.ProtectionProfile", "pp_name": "PC Client Specific Trusted Platform Module Family 1.2; Level 2, Version 1.1", "pp_eal": null, "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0030b.pdf", "pp_ids": null } ] }, "maintenance_updates": { "_type": "set", "_value": [] }, "state": { "_type": "sec_certs.sample.cc.CCCertificate.InternalState", "report": { "_type": "sec_certs.sample.cc.CCCertificate.DocumentState", "download_ok": true, "convert_garbage": false, "convert_ok": true, "extract_ok": true, "pdf_hash": "f1840e2ef500d15093d5f552581bb9a972d757c30d157bcf45d7fbc7fdb4a745", "txt_hash": "21533fe78646caab51b211558b4ff6a82a4cf909b0faa1aa5d81b1aa9870d24a" }, "st": { "_type": "sec_certs.sample.cc.CCCertificate.DocumentState", "download_ok": true, "convert_garbage": false, "convert_ok": true, "extract_ok": true, "pdf_hash": "0a81c560fcdbfeee1165bf3c96d64fd3b07518a6bfdf33fb9f58f5cf29bb5779", "txt_hash": "155dd5d49e53d403a117e5cfacab64afd1e150ceeeb4a84b76b6abde67dd1a09" }, "cert": { "_type": "sec_certs.sample.cc.CCCertificate.DocumentState", "download_ok": false, "convert_garbage": false, "convert_ok": false, "extract_ok": false, "pdf_hash": null, "txt_hash": null } }, "pdf_data": { "_type": "sec_certs.sample.cc.CCCertificate.PdfData", "report_metadata": { "pdf_file_size_bytes": 868432, "pdf_is_encrypted": false, "pdf_number_of_pages": 42, "/CreationDate": "D:20091127084232+01'00'", "/Subject": "Common Criteria Certification", "/Author": "Bundesamt für Sicherheit in der Informationstechnik", "/Creator": "Writer", "/Keywords": "\"SLB9635TT1.2 / m1566a13 HW a13 / FW 03.17.0008.00, Infineon Technologies AG, Trusted Platform Module, BSI-PP-0030-2008, Schutzprofil PC Client Specific Trusted Platform Module TPM Family 1.2\"", "/Producer": "StarOffice 9", "/ModDate": "D:20091203114950+01'00'", "/Title": "Certification Report BSI-DSZ-CC-0573-2009", "pdf_hyperlinks": { "_type": "set", "_value": [ "http://www.bsi.bund.de/", "http://www.ietf.org/rfc/rfc2104.txt" ] } }, "st_metadata": { "pdf_file_size_bytes": 226487, "pdf_is_encrypted": true, "pdf_number_of_pages": 63, "/Author": "Infineon Technologies AG", "/CreationDate": "D:20091117160510+01'00'", "/Creator": "PScript5.dll Version 5.2.2", "/Keywords": "\"Security Target, Trusted Platform Module, Trusted Computing, TPM,\r\nTPM 1.2, public, document, moderate attack potential, EAL4+, EAL4 moderate, Infineon Technologies, Common Criteria, Trusted Computing Group Protection Profile BSI-PP-0030-2008\" ", "/ModDate": "D:20091126162310+01'00'", "/Producer": "Acrobat Distiller 6.0 (Windows)", "/Subject": "CC EAL4+ TPM 1.2 Security Target", "/Title": "0573_pdf.pdf", "pdf_hyperlinks": { "_type": "set", "_value": [] } }, "cert_metadata": null, "report_frontpage": { "DE": { "match_rules": [ "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)" ], "cert_id": "BSI-DSZ-CC-0573-2009", "cert_item": "SLB9635TT1.2 / m1566a13 HW a13 / FW 03.17.0008.00", "developer": "Infineon Technologies AG", "cert_lab": "BSI" } }, "st_frontpage": null, "cert_frontpage": null, "report_keywords": { "cc_cert_id": { "DE": { "BSI-DSZ-CC-0573-2009": 20, "BSI-DSZ-CC-0573": 1 } }, "cc_protection_profile_id": { "BSI": { "BSI-PP-0030-2008": 1, "BSI-CC-PP-0030-2008": 3 } }, "cc_security_level": { "EAL": { "EAL 4": 7, "EAL 1": 1, "EAL 7": 1, "EAL4": 8, "EAL5+": 1, "EAL1": 6, "EAL3": 4, "EAL5": 6, "EAL7": 4, "EAL2": 3, "EAL6": 3, "EAL 4 augmented": 2, "EAL4 augmented": 1 } }, "cc_sar": { "ADV": { "ADV_ARC.1": 1, "ADV_FSP.1": 1, "ADV_FSP.2": 1, "ADV_FSP.3": 1, "ADV_FSP.4": 1, "ADV_FSP.5": 1, "ADV_FSP.6": 1, "ADV_IMP.1": 1, "ADV_IMP.2": 1, "ADV_INT.1": 1, "ADV_INT.2": 1, "ADV_INT.3": 1, "ADV_SPM.1": 1, "ADV_TDS.1": 1, "ADV_TDS.2": 1, "ADV_TDS.3": 1, "ADV_TDS.4": 1, "ADV_TDS.5": 1, "ADV_TDS.6": 1, "ADV_ARC": 1, "ADV_FSP": 1, "ADV_IMP": 1, "ADV_INT": 1, "ADV_SPM": 1, "ADV_TDS": 1 }, "AGD": { "AGD_OPE.1": 1, "AGD_PRE.1": 1, "AGD_OPE": 1, "AGD_PRE": 1 }, "ALC": { "ALC_FLR.1": 7, "ALC_SCP": 1, "ALC_CMC.1": 1, "ALC_CMC.2": 1, "ALC_CMC.3": 1, "ALC_CMC.4": 2, "ALC_CMC.5": 1, "ALC_CMS.1": 1, "ALC_CMS.2": 1, "ALC_CMS.3": 1, "ALC_CMS.4": 2, "ALC_CMS.5": 1, "ALC_DEL.1": 2, "ALC_DVS.1": 2, "ALC_DVS.2": 1, "ALC_FLR.2": 1, "ALC_FLR.3": 1, "ALC_LCD.1": 2, "ALC_LCD.2": 1, "ALC_TAT.1": 2, "ALC_TAT.2": 1, "ALC_TAT.3": 1, "ALC_CMC": 1, "ALC_CMS": 1, "ALC_DEL": 1, "ALC_DVS": 1, "ALC_FLR": 1, "ALC_TAT": 1 }, "ATE": { "ATE_FUN": 2, "ATE_IND": 2, "ATE_COV.1": 1, "ATE_COV.2": 1, "ATE_COV.3": 1, "ATE_DPT.1": 1, "ATE_DPT.2": 1, "ATE_DPT.3": 1, "ATE_DPT.4": 1, "ATE_FUN.1": 1, "ATE_FUN.2": 1, "ATE_IND.1": 1, "ATE_IND.2": 1, "ATE_IND.3": 1, "ATE_COV": 1, "ATE_DPT": 1 }, "AVA": { "AVA_VAN.4": 6, "AVA_VAN": 3, "AVA_VAN.1": 1, "AVA_VAN.2": 1, "AVA_VAN.3": 1, "AVA_VAN.5": 1 }, "APE": { "APE_INT.1": 1, "APE_CCL.1": 1, "APE_SPD.1": 1, "APE_OBJ.1": 1, "APE_OBJ.2": 1, "APE_ECD.1": 1, "APE_REQ.1": 1, "APE_REQ.2": 1 }, "ASE": { "ASE_INT.1": 1, "ASE_CCL.1": 1, "ASE_SPD.1": 1, "ASE_OBJ.1": 1, "ASE_OBJ.2": 1, "ASE_ECD.1": 1, "ASE_REQ.1": 1, "ASE_REQ.2": 1, "ASE_TSS.1": 1, "ASE_TSS.2": 1, "ASE_CCL": 1, "ASE_ECD": 1, "ASE_INT": 1, "ASE_OBJ": 1, "ASE_SPD": 1, "ASE_TSS": 1 } }, "cc_sfr": {}, "cc_claims": {}, "vendor": { "Infineon": { "Infineon Technologies AG": 18, "Infineon Technologies": 8, "Infineon": 3 }, "Microsoft": { "Microsoft": 1 } }, "eval_facility": { "TUV": { "TÜV Informationstechnik": 3, "TÜViT": 1 } }, "symmetric_crypto": { "AES_competition": { "AES": { "AES": 5 } }, "DES": { "DES": { "DES": 4 }, "3DES": { "3DES": 3 } }, "constructions": { "MAC": { "HMAC": 4 } } }, "asymmetric_crypto": { "RSA": { "RSA2048": 1 } }, "pq_crypto": {}, "hash_function": { "SHA": { "SHA1": { "SHA-1": 4 } } }, "crypto_scheme": { "MAC": { "MAC": 1 } }, "crypto_protocol": { "PGP": { "PGP": 2 } }, "randomness": { "RNG": { "RNG": 3, "RND": 1 } }, "cipher_mode": { "CBC": { "CBC": 2 }, "CTR": { "CTR": 2 } }, "ecc_curve": {}, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": { "SCA": { "physical probing": 1, "side channel": 1, "DPA": 1 }, "FI": { "DFA": 1 }, "other": { "JIL": 4 } }, "technical_report_id": { "BSI": { "BSI 7125": 2, "BSI 7148": 1, "BSI 7149": 1 } }, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": { "FIPS": { "FIPS PUB 46-3": 1, "FIPS PUB 197": 1, "FIPS PUB 180-2": 1 }, "PKCS": { "PKCS #1": 1 }, "BSI": { "AIS 34": 2, "AIS 20": 1, "AIS 25": 1, "AIS 26": 1, "AIS 31": 1, "AIS 32": 1, "AIS 35": 1, "AIS 36": 1, "AIS 38": 1 } }, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": { "ConfidentialDocument": { "Technical Report, Version 2, November 18, 2009, ETR Summary, TÜV Informationstechnik GmbH (confidential document) [9] Configuration list for the TOE (confidential document): SLB9635TT1.2 / m1566a13": 1, "19] Test Plan TPM 1.2 ROM3 3.17.0008.00, Version 1.2, September 24, 2009, Infineon Technologies AG (confidential document) [20] PKCS #1 v2.0: RSA Cryptography Standard, RSA Laboratories, October 1, 1998 [21] FIPS PUB 46-3": 1 } } }, "st_keywords": { "cc_cert_id": {}, "cc_protection_profile_id": { "BSI": { "BSI-PP-0030-2008": 1 } }, "cc_security_level": { "EAL": { "EAL4": 2, "EAL4 augmented": 1 } }, "cc_sar": { "ADV": { "ADV_VAN.4": 1, "ADV_ARC.1": 1, "ADV_FSP.4": 1, "ADV_IMP.1": 1, "ADV_TDS.3": 1 }, "AGD": { "AGD_OPE.1": 1, "AGD_PRE.1": 1 }, "ALC": { "ALC_DVS": 1, "ALC_FLR.1": 3, "ALC_CMC.4": 1, "ALC_CMS.4": 1, "ALC_DEL.1": 1, "ALC_DVS.1": 1, "ALC_LCD.1": 1, "ALC_TAT.1": 1 }, "ATE": { "ATE_COV.2": 1, "ATE_DPT.2": 1, "ATE_FUN.1": 1, "ATE_IND.2": 1 }, "AVA": { "AVA_VAN.4": 2 }, "ASE": { "ASE_CCL.1": 1, "ASE_ECD.1": 1, "ASE_INT.1": 1, "ASE_OBJ.2": 1, "ASE_REQ.2": 1, "ASE_SPD.1": 1, "ASE_TSS.1": 1 } }, "cc_sfr": { "FAU": { "FAU_GEN.1": 3 }, "FCO": { "FCO_NRO": 4, "FCO_NRO.1": 1 }, "FCS": { "FCS_RNG.1": 9, "FCS_RNG": 3, "FCS_RNG.1.1": 2, "FCS_RNG.1.2": 2, "FCS_CKM": 8, "FCS_CKM.2": 2, "FCS_COP.1": 7, "FCS_CKM.4": 11, "FCS_CKM.1": 10, "FCS_CKM.4.1": 1, "FCS_COP": 22 }, "FDP": { "FDP_ITC.1": 6, "FDP_ITC.2": 9, "FDP_ACF": 25, "FDP_ACC.1": 9, "FDP_ACF.1": 29, "FDP_IFC.1": 1, "FDP_ACC": 18, "FDP_RIP.1": 2, "FDP_ETC.2": 3, "FDP_UCT": 4, "FDP_UIT": 4, "FDP_TDC.1": 1, "FDP_UCT.1": 1, "FDP_UIT.1": 1 }, "FIA": { "FIA_UID.1": 5, "FIA_UID.1.1": 1, "FIA_UID.1.2": 1, "FIA_UAU.1": 5, "FIA_UAU.1.1": 1, "FIA_UAU.1.2": 1, "FIA_UAU.5": 4, "FIA_UAU.5.1": 1, "FIA_UAU.5.2": 1, "FIA_AFL.1": 4, "FIA_AFL.1.1": 1, "FIA_AFL.1.2": 1, "FIA_UAU.4": 2, "FIA_UAU.6": 3, "FIA_USB.1": 3 }, "FMT": { "FMT_SMF.1": 4, "FMT_SMF.1.1": 1, "FMT_MSA.3": 17, "FMT_MSA": 36, "FMT_MSA.1": 7, "FMT_SMR.1": 8, "FMT_MSA.2": 5, "FMT_MTD": 8, "FMT_MTD.1": 1 }, "FPR": { "FPR_UNL.1": 3 }, "FPT": { "FPT_TDC.1": 3, "FPT_TDC.1.1": 1, "FPT_TDC.1.2": 1, "FPT_FLS.1": 4, "FPT_FLS.1.1": 1, "FPT_PHP.3": 4, "FPT_PHP.3.1": 1, "FPT_STM.1": 3, "FPT_TST.1": 3 } }, "cc_claims": {}, "vendor": { "Infineon": { "Infineon Technologies AG": 74, "Infineon": 1, "Infineon Technologies": 1 } }, "eval_facility": {}, "symmetric_crypto": { "AES_competition": { "AES": { "AES": 10 } }, "DES": { "DES": { "DES": 9 }, "3DES": { "Triple-DES": 8, "3DES": 9 } }, "constructions": { "MAC": { "HMAC": 9 } } }, "asymmetric_crypto": { "RSA": { "RSA 2048": 1, "RSA2048": 1, "RSA 512": 5 }, "ECC": { "ECC": { "ECC": 2 } } }, "pq_crypto": {}, "hash_function": { "SHA": { "SHA1": { "SHA-1": 32 } } }, "crypto_scheme": { "MAC": { "MAC": 4 } }, "crypto_protocol": {}, "randomness": { "RNG": { "RNG": 15, "RND": 2 } }, "cipher_mode": { "CBC": { "CBC": 5 }, "CTR": { "CTR": 2 } }, "ecc_curve": {}, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": { "SCA": { "physical probing": 2, "DPA": 2, "SPA": 1 }, "FI": { "DFA": 1 } }, "technical_report_id": {}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": { "FIPS": { "FIPS PUB 140-1": 3, "FIPS PUB 46-3": 3, "FIPS PUB 197": 3, "FIPS PUB 180-2": 3, "FIPS 46-3": 1, "FIPS 180-1": 1 }, "PKCS": { "PKCS#1": 4, "PKCS #1": 1 }, "BSI": { "AIS20": 6, "AIS 20": 1 }, "RFC": { "RFC2104": 3, "RFC 2104": 1 }, "CC": { "CCMB-2006-09-001": 2, "CCMB-2007-09-002": 2, "CCMB-2007-09-003": 2, "CCMB-2007-09-004": 1 } }, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": {} }, "cert_keywords": null, "report_filename": "0573a_pdf.pdf", "st_filename": "0573b_pdf.pdf", "cert_filename": null }, "heuristics": { "_type": "sec_certs.sample.cc.CCCertificate.Heuristics", "extracted_versions": { "_type": "set", "_value": [ "03.17.0008.00", "1.2" ] }, "cpe_matches": null, "verified_cpe_matches": null, "related_cves": null, "cert_lab": [ "BSI" ], "cert_id": "BSI-DSZ-CC-0573-2009", "st_references": { "_type": "sec_certs.sample.certificate.References", "directly_referenced_by": null, "indirectly_referenced_by": null, "directly_referencing": null, "indirectly_referencing": null }, "report_references": { "_type": "sec_certs.sample.certificate.References", "directly_referenced_by": null, "indirectly_referenced_by": null, "directly_referencing": null, "indirectly_referencing": null }, "annotated_references": null, "extracted_sars": { "_type": "set", "_value": [ { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_ECD", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_CMS", "level": 4 }, { "_type": "sec_certs.sample.sar.SAR", "family": "APE_SPD", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ADV_INT", "level": 3 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_CCL", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ATE_IND", "level": 2 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ADV_IMP", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "APE_CCL", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "APE_INT", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AGD_PRE", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AVA_VAN", "level": 4 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_DEL", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_FLR", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_TSS", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_OBJ", "level": 2 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_CMC", "level": 4 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AGD_OPE", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "APE_OBJ", "level": 2 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_TAT", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ADV_VAN", "level": 4 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ADV_ARC", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_SPD", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ATE_DPT", "level": 2 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_INT", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_REQ", "level": 2 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_LCD", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ATE_COV", "level": 2 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ADV_TDS", "level": 3 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ADV_SPM", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_DVS", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "APE_ECD", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "APE_REQ", "level": 2 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ATE_FUN", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ADV_FSP", "level": 4 } ] }, "direct_transitive_cves": null, "indirect_transitive_cves": null, "scheme_data": null }, "_id": "44f677892bb84ce5" } }, { "_id": { "$oid": "66c0a10b1c78507fd105fcf7" }, "run_id": { "$oid": "66c0a0e21c78507fd105fc06" }, "dgst": "44f677892bb84ce5", "timestamp": { "$date": "2024-08-17T12:52:18.171Z" }, "type": "change", "diff": { "__update__": { "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0573a_pdf.pdf", "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0573b_pdf.pdf", "state": { "__update__": { "report": { "__update__": { "download_ok": false, "convert_ok": false, "extract_ok": false, "pdf_hash": null, "txt_hash": null } }, "st": { "__update__": { "download_ok": false, "convert_ok": false, "extract_ok": false, "pdf_hash": null, "txt_hash": null } } } }, "pdf_data": { "__update__": { "report_metadata": null, "st_metadata": null, "report_frontpage": null, "report_keywords": null, "st_keywords": null, "report_filename": null, "st_filename": null } }, "heuristics": { "__update__": { "cert_lab": null, "cert_id": null, "extracted_sars": null } } } } }, { "_id": { "$oid": "66c7affd2ff8c812f518c15c" }, "run_id": { "$oid": "66c7afc82ff8c812f518b966" }, "dgst": "44f677892bb84ce5", "timestamp": { "$date": "2024-08-22T18:04:48.021Z" }, "type": "change", "diff": { "__update__": { "state": { "__update__": { "report": { "__update__": { "download_ok": true, "convert_ok": true, "extract_ok": true, "pdf_hash": "f1840e2ef500d15093d5f552581bb9a972d757c30d157bcf45d7fbc7fdb4a745", "txt_hash": "21533fe78646caab51b211558b4ff6a82a4cf909b0faa1aa5d81b1aa9870d24a" } }, "st": { "__update__": { "download_ok": true, "convert_ok": true, "extract_ok": true, "pdf_hash": "0a81c560fcdbfeee1165bf3c96d64fd3b07518a6bfdf33fb9f58f5cf29bb5779", "txt_hash": "155dd5d49e53d403a117e5cfacab64afd1e150ceeeb4a84b76b6abde67dd1a09" } } } }, "pdf_data": { "__update__": { "report_metadata": { "pdf_file_size_bytes": 868432, "pdf_is_encrypted": false, "pdf_number_of_pages": 42, "/CreationDate": "D:20091127084232+01'00'", "/Subject": "Common Criteria Certification", "/Author": "Bundesamt für Sicherheit in der Informationstechnik", "/Creator": "Writer", "/Keywords": "\"SLB9635TT1.2 / m1566a13 HW a13 / FW 03.17.0008.00, Infineon Technologies AG, Trusted Platform Module, BSI-PP-0030-2008, Schutzprofil PC Client Specific Trusted Platform Module TPM Family 1.2\"", "/Producer": "StarOffice 9", "/ModDate": "D:20091203114950+01'00'", "/Title": "Certification Report BSI-DSZ-CC-0573-2009", "pdf_hyperlinks": { "_type": "set", "_value": [ "http://www.ietf.org/rfc/rfc2104.txt", "http://www.bsi.bund.de/" ] } }, "st_metadata": { "pdf_file_size_bytes": 226487, "pdf_is_encrypted": true, "pdf_number_of_pages": 63, "/Author": "Infineon Technologies AG", "/CreationDate": "D:20091117160510+01'00'", "/Creator": "PScript5.dll Version 5.2.2", "/Keywords": "\"Security Target, Trusted Platform Module, Trusted Computing, TPM,\r\nTPM 1.2, public, document, moderate attack potential, EAL4+, EAL4 moderate, Infineon Technologies, Common Criteria, Trusted Computing Group Protection Profile BSI-PP-0030-2008\" ", "/ModDate": "D:20091126162310+01'00'", "/Producer": "Acrobat Distiller 6.0 (Windows)", "/Subject": "CC EAL4+ TPM 1.2 Security Target", "/Title": "0573_pdf.pdf", "pdf_hyperlinks": { "_type": "set", "_value": [] } }, "report_frontpage": { "DE": { "match_rules": [ "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)" ], "cert_id": "BSI-DSZ-CC-0573-2009", "cert_item": "SLB9635TT1.2 / m1566a13 HW a13 / FW 03.17.0008.00", "developer": "Infineon Technologies AG", "cert_lab": "BSI" } }, "report_keywords": { "cc_cert_id": { "DE": { "BSI-DSZ-CC-0573-2009": 20, "BSI-DSZ-CC-0573": 1 } }, "cc_protection_profile_id": { "BSI": { "BSI-PP-0030-2008": 1, "BSI-CC-PP-0030-2008": 3 } }, "cc_security_level": { "EAL": { "EAL 4": 7, "EAL 1": 1, "EAL 7": 1, "EAL4": 8, "EAL5+": 1, "EAL1": 6, "EAL3": 4, "EAL5": 6, "EAL7": 4, "EAL2": 3, "EAL6": 3, "EAL 4 augmented": 2, "EAL4 augmented": 1 } }, "cc_sar": { "ADV": { "ADV_ARC.1": 1, "ADV_FSP.1": 1, "ADV_FSP.2": 1, "ADV_FSP.3": 1, "ADV_FSP.4": 1, "ADV_FSP.5": 1, "ADV_FSP.6": 1, "ADV_IMP.1": 1, "ADV_IMP.2": 1, "ADV_INT.1": 1, "ADV_INT.2": 1, "ADV_INT.3": 1, "ADV_SPM.1": 1, "ADV_TDS.1": 1, "ADV_TDS.2": 1, "ADV_TDS.3": 1, "ADV_TDS.4": 1, "ADV_TDS.5": 1, "ADV_TDS.6": 1, "ADV_ARC": 1, "ADV_FSP": 1, "ADV_IMP": 1, "ADV_INT": 1, "ADV_SPM": 1, "ADV_TDS": 1 }, "AGD": { "AGD_OPE.1": 1, "AGD_PRE.1": 1, "AGD_OPE": 1, "AGD_PRE": 1 }, "ALC": { "ALC_FLR.1": 7, "ALC_SCP": 1, "ALC_CMC.1": 1, "ALC_CMC.2": 1, "ALC_CMC.3": 1, "ALC_CMC.4": 2, "ALC_CMC.5": 1, "ALC_CMS.1": 1, "ALC_CMS.2": 1, "ALC_CMS.3": 1, "ALC_CMS.4": 2, "ALC_CMS.5": 1, "ALC_DEL.1": 2, "ALC_DVS.1": 2, "ALC_DVS.2": 1, "ALC_FLR.2": 1, "ALC_FLR.3": 1, "ALC_LCD.1": 2, "ALC_LCD.2": 1, "ALC_TAT.1": 2, "ALC_TAT.2": 1, "ALC_TAT.3": 1, "ALC_CMC": 1, "ALC_CMS": 1, "ALC_DEL": 1, "ALC_DVS": 1, "ALC_FLR": 1, "ALC_TAT": 1 }, "ATE": { "ATE_FUN": 2, "ATE_IND": 2, "ATE_COV.1": 1, "ATE_COV.2": 1, "ATE_COV.3": 1, "ATE_DPT.1": 1, "ATE_DPT.2": 1, "ATE_DPT.3": 1, "ATE_DPT.4": 1, "ATE_FUN.1": 1, "ATE_FUN.2": 1, "ATE_IND.1": 1, "ATE_IND.2": 1, "ATE_IND.3": 1, "ATE_COV": 1, "ATE_DPT": 1 }, "AVA": { "AVA_VAN.4": 6, "AVA_VAN": 3, "AVA_VAN.1": 1, "AVA_VAN.2": 1, "AVA_VAN.3": 1, "AVA_VAN.5": 1 }, "APE": { "APE_INT.1": 1, "APE_CCL.1": 1, "APE_SPD.1": 1, "APE_OBJ.1": 1, "APE_OBJ.2": 1, "APE_ECD.1": 1, "APE_REQ.1": 1, "APE_REQ.2": 1 }, "ASE": { "ASE_INT.1": 1, "ASE_CCL.1": 1, "ASE_SPD.1": 1, "ASE_OBJ.1": 1, "ASE_OBJ.2": 1, "ASE_ECD.1": 1, "ASE_REQ.1": 1, "ASE_REQ.2": 1, "ASE_TSS.1": 1, "ASE_TSS.2": 1, "ASE_CCL": 1, "ASE_ECD": 1, "ASE_INT": 1, "ASE_OBJ": 1, "ASE_SPD": 1, "ASE_TSS": 1 } }, "cc_sfr": {}, "cc_claims": {}, "vendor": { "Infineon": { "Infineon Technologies AG": 18, "Infineon Technologies": 8, "Infineon": 3 }, "Microsoft": { "Microsoft": 1 } }, "eval_facility": { "TUV": { "TÜV Informationstechnik": 3, "TÜViT": 1 } }, "symmetric_crypto": { "AES_competition": { "AES": { "AES": 5 } }, "DES": { "DES": { "DES": 4 }, "3DES": { "3DES": 3 } }, "constructions": { "MAC": { "HMAC": 4 } } }, "asymmetric_crypto": { "RSA": { "RSA2048": 1 } }, "pq_crypto": {}, "hash_function": { "SHA": { "SHA1": { "SHA-1": 4 } } }, "crypto_scheme": { "MAC": { "MAC": 1 } }, "crypto_protocol": { "PGP": { "PGP": 2 } }, "randomness": { "RNG": { "RNG": 3, "RND": 1 } }, "cipher_mode": { "CBC": { "CBC": 2 }, "CTR": { "CTR": 2 } }, "ecc_curve": {}, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": { "SCA": { "physical probing": 1, "side channel": 1, "DPA": 1 }, "FI": { "DFA": 1 }, "other": { "JIL": 4 } }, "technical_report_id": { "BSI": { "BSI 7125": 2, "BSI 7148": 1, "BSI 7149": 1 } }, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": { "FIPS": { "FIPS PUB 46-3": 1, "FIPS PUB 197": 1, "FIPS PUB 180-2": 1 }, "PKCS": { "PKCS #1": 1 }, "BSI": { "AIS 34": 2, "AIS 20": 1, "AIS 25": 1, "AIS 26": 1, "AIS 31": 1, "AIS 32": 1, "AIS 35": 1, "AIS 36": 1, "AIS 38": 1 } }, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": { "ConfidentialDocument": { "Technical Report, Version 2, November 18, 2009, ETR Summary, TÜV Informationstechnik GmbH (confidential document) [9] Configuration list for the TOE (confidential document): SLB9635TT1.2 / m1566a13": 1, "19] Test Plan TPM 1.2 ROM3 3.17.0008.00, Version 1.2, September 24, 2009, Infineon Technologies AG (confidential document) [20] PKCS #1 v2.0: RSA Cryptography Standard, RSA Laboratories, October 1, 1998 [21] FIPS PUB 46-3": 1 } } }, "st_keywords": { "cc_cert_id": {}, "cc_protection_profile_id": { "BSI": { "BSI-PP-0030-2008": 1 } }, "cc_security_level": { "EAL": { "EAL4": 2, "EAL4 augmented": 1 } }, "cc_sar": { "ADV": { "ADV_VAN.4": 1, "ADV_ARC.1": 1, "ADV_FSP.4": 1, "ADV_IMP.1": 1, "ADV_TDS.3": 1 }, "AGD": { "AGD_OPE.1": 1, "AGD_PRE.1": 1 }, "ALC": { "ALC_DVS": 1, "ALC_FLR.1": 3, "ALC_CMC.4": 1, "ALC_CMS.4": 1, "ALC_DEL.1": 1, "ALC_DVS.1": 1, "ALC_LCD.1": 1, "ALC_TAT.1": 1 }, "ATE": { "ATE_COV.2": 1, "ATE_DPT.2": 1, "ATE_FUN.1": 1, "ATE_IND.2": 1 }, "AVA": { "AVA_VAN.4": 2 }, "ASE": { "ASE_CCL.1": 1, "ASE_ECD.1": 1, "ASE_INT.1": 1, "ASE_OBJ.2": 1, "ASE_REQ.2": 1, "ASE_SPD.1": 1, "ASE_TSS.1": 1 } }, "cc_sfr": { "FAU": { "FAU_GEN.1": 3 }, "FCO": { "FCO_NRO": 4, "FCO_NRO.1": 1 }, "FCS": { "FCS_RNG.1": 9, "FCS_RNG": 3, "FCS_RNG.1.1": 2, "FCS_RNG.1.2": 2, "FCS_CKM": 8, "FCS_CKM.2": 2, "FCS_COP.1": 7, "FCS_CKM.4": 11, "FCS_CKM.1": 10, "FCS_CKM.4.1": 1, "FCS_COP": 22 }, "FDP": { "FDP_ITC.1": 6, "FDP_ITC.2": 9, "FDP_ACF": 25, "FDP_ACC.1": 9, "FDP_ACF.1": 29, "FDP_IFC.1": 1, "FDP_ACC": 18, "FDP_RIP.1": 2, "FDP_ETC.2": 3, "FDP_UCT": 4, "FDP_UIT": 4, "FDP_TDC.1": 1, "FDP_UCT.1": 1, "FDP_UIT.1": 1 }, "FIA": { "FIA_UID.1": 5, "FIA_UID.1.1": 1, "FIA_UID.1.2": 1, "FIA_UAU.1": 5, "FIA_UAU.1.1": 1, "FIA_UAU.1.2": 1, "FIA_UAU.5": 4, "FIA_UAU.5.1": 1, "FIA_UAU.5.2": 1, "FIA_AFL.1": 4, "FIA_AFL.1.1": 1, "FIA_AFL.1.2": 1, "FIA_UAU.4": 2, "FIA_UAU.6": 3, "FIA_USB.1": 3 }, "FMT": { "FMT_SMF.1": 4, "FMT_SMF.1.1": 1, "FMT_MSA.3": 17, "FMT_MSA": 36, "FMT_MSA.1": 7, "FMT_SMR.1": 8, "FMT_MSA.2": 5, "FMT_MTD": 8, "FMT_MTD.1": 1 }, "FPR": { "FPR_UNL.1": 3 }, "FPT": { "FPT_TDC.1": 3, "FPT_TDC.1.1": 1, "FPT_TDC.1.2": 1, "FPT_FLS.1": 4, "FPT_FLS.1.1": 1, "FPT_PHP.3": 4, "FPT_PHP.3.1": 1, "FPT_STM.1": 3, "FPT_TST.1": 3 } }, "cc_claims": {}, "vendor": { "Infineon": { "Infineon Technologies AG": 74, "Infineon": 1, "Infineon Technologies": 1 } }, "eval_facility": {}, "symmetric_crypto": { "AES_competition": { "AES": { "AES": 10 } }, "DES": { "DES": { "DES": 9 }, "3DES": { "Triple-DES": 8, "3DES": 9 } }, "constructions": { "MAC": { "HMAC": 9 } } }, "asymmetric_crypto": { "RSA": { "RSA 2048": 1, "RSA2048": 1, "RSA 512": 5 }, "ECC": { "ECC": { "ECC": 2 } } }, "pq_crypto": {}, "hash_function": { "SHA": { "SHA1": { "SHA-1": 32 } } }, "crypto_scheme": { "MAC": { "MAC": 4 } }, "crypto_protocol": {}, "randomness": { "RNG": { "RNG": 15, "RND": 2 } }, "cipher_mode": { "CBC": { "CBC": 5 }, "CTR": { "CTR": 2 } }, "ecc_curve": {}, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": { "SCA": { "physical probing": 2, "DPA": 2, "SPA": 1 }, "FI": { "DFA": 1 } }, "technical_report_id": {}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": { "FIPS": { "FIPS PUB 140-1": 3, "FIPS PUB 46-3": 3, "FIPS PUB 197": 3, "FIPS PUB 180-2": 3, "FIPS 46-3": 1, "FIPS 180-1": 1 }, "PKCS": { "PKCS#1": 4, "PKCS #1": 1 }, "BSI": { "AIS20": 6, "AIS 20": 1 }, "RFC": { "RFC2104": 3, "RFC 2104": 1 }, "CC": { "CCMB-2006-09-001": 2, "CCMB-2007-09-002": 2, "CCMB-2007-09-003": 2, "CCMB-2007-09-004": 1 } }, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": {} }, "report_filename": "0573a_pdf.pdf", "st_filename": "0573b_pdf.pdf" } }, "heuristics": { "__update__": { "cert_lab": [ "BSI" ], "cert_id": "BSI-DSZ-CC-0573-2009", "extracted_sars": { "_type": "set", "_value": [ { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_FLR", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "APE_INT", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "APE_REQ", "level": 2 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_DEL", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_TSS", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ATE_FUN", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_REQ", "level": 2 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_CMS", "level": 4 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ADV_INT", "level": 3 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_CCL", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "APE_CCL", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AGD_PRE", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_ECD", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "APE_OBJ", "level": 2 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_DVS", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ATE_IND", "level": 2 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ATE_COV", "level": 2 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_OBJ", "level": 2 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_CMC", "level": 4 }, { "_type": "sec_certs.sample.sar.SAR", "family": "APE_ECD", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AGD_OPE", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ADV_FSP", "level": 4 }, { "_type": "sec_certs.sample.sar.SAR", "family": "APE_SPD", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_LCD", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_INT", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ADV_VAN", "level": 4 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AVA_VAN", "level": 4 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_SPD", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_TAT", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ATE_DPT", "level": 2 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ADV_ARC", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ADV_TDS", "level": 3 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ADV_SPM", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ADV_IMP", "level": 1 } ] } } } } } }, { "_id": { "$oid": "67113c70700c28def2a97a90" }, "run_id": { "$oid": "67113c29700c28def2a97449" }, "dgst": "44f677892bb84ce5", "timestamp": { "$date": "2024-10-17T11:26:45.075Z" }, "type": "change", "diff": { "__update__": { "protection_profiles": { "_type": "set", "_value": [ { "_type": "sec_certs.sample.protection_profile.ProtectionProfile", "pp_name": "PC Client Specific Trusted Platform Module Family 1.2; Level 2, Version 1.1", "pp_eal": "EAL4+", "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0030b.pdf", "pp_ids": { "_type": "frozenset", "_value": [ "BSI-CC-PP-030-2008" ] } } ] } } } }, { "_id": { "$oid": "673f6585a1452c910a80befe" }, "run_id": { "$oid": "673f6538a1452c910a80b5ad" }, "dgst": "44f677892bb84ce5", "timestamp": { "$date": "2024-11-21T11:03:40.77Z" }, "type": "change", "diff": { "__update__": { "heuristics": { "__insert__": { "prev_certificates": [], "next_certificates": [] } } } } }, { "_id": { "$oid": "67a4087c61618839532709bd" }, "run_id": { "$oid": "67a4080e616188395327018d" }, "dgst": "44f677892bb84ce5", "timestamp": { "$date": "2025-02-05T18:04:55.043Z" }, "type": "change", "diff": { "__insert__": { "protection_profile_links": { "_type": "set", "_value": [ "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0030b.pdf" ] } }, "__update__": { "state": { "__update__": { "report": { "__update__": { "_type": "sec_certs.sample.document_state.DocumentState" } }, "st": { "__update__": { "_type": "sec_certs.sample.document_state.DocumentState" } }, "cert": { "__update__": { "_type": "sec_certs.sample.document_state.DocumentState" } } } }, "heuristics": { "__insert__": { "protection_profiles": { "_type": "set", "_value": [ "1b09df9f54d1b18b" ] }, "eal": "EAL4+" }, "__update__": { "prev_certificates": null, "next_certificates": null } } }, "__delete__": [ "protection_profiles" ] } }, { "_id": { "$oid": "669f80cd566b7c5a18058893" }, "run_id": { "$oid": "669f8076566b7c5a1805773d" }, "dgst": "663b9c1bde7447b3", "timestamp": { "$date": "2024-07-23T00:09:57.927Z" }, "type": "new", "diff": { "_type": "sec_certs.sample.cc.CCCertificate", "dgst": "663b9c1bde7447b3", "status": "archived", "category": "Other Devices and Systems", "name": "DataOverwriteSecurity Unit Type H Software Version: 1.01x", "manufacturer": "Ricoh Company, Ltd.", "scheme": "JP", "security_level": { "_type": "set", "_value": [ "EAL3" ] }, "not_valid_before": { "_type": "date", "_value": "2008-02-28" }, "not_valid_after": { "_type": "date", "_value": "2013-10-07" }, "report_link": "https://www.commoncriteriaportal.org/files/epfiles/c0145_erpt.pdf", "st_link": "https://www.commoncriteriaportal.org/files/epfiles/c0145_est.pdf", "cert_link": null, "manufacturer_web": "https://www.ricoh.com/", "protection_profiles": { "_type": "set", "_value": [] }, "maintenance_updates": { "_type": "set", "_value": [] }, "state": { "_type": "sec_certs.sample.cc.CCCertificate.InternalState", "report": { "_type": "sec_certs.sample.cc.CCCertificate.DocumentState", "download_ok": true, "convert_garbage": false, "convert_ok": true, "extract_ok": true, "pdf_hash": "512f1da62ce4f5835e8b31e36524bd134f7742b0faac623e92c9665a584a6ed2", "txt_hash": "aa1315d75f2a52c82a16f6f5a20bd964cee5c4b2fcb48be2dc395da6bc196365" }, "st": { "_type": "sec_certs.sample.cc.CCCertificate.DocumentState", "download_ok": true, "convert_garbage": false, "convert_ok": true, "extract_ok": true, "pdf_hash": "a60c776ddd9b8ec08bb3c118665dabf5b1cd5d51d00a7fa4fec7920f56859557", "txt_hash": "96f8d2f32e1f56eb718a302367ae57ac65331a0c15b64e859cbdf8fc40fc4976" }, "cert": { "_type": "sec_certs.sample.cc.CCCertificate.DocumentState", "download_ok": false, "convert_garbage": false, "convert_ok": false, "extract_ok": false, "pdf_hash": null, "txt_hash": null } }, "pdf_data": { "_type": "sec_certs.sample.cc.CCCertificate.PdfData", "report_metadata": { "pdf_file_size_bytes": 98465, "pdf_is_encrypted": false, "pdf_number_of_pages": 18, "/ModDate": "D:20080911170342+09'00'", "/CreationDate": "D:20080911170342+09'00'", "/Title": "untitled", "/Producer": "Acrobat Distiller 6.0 (Windows)", "pdf_hyperlinks": { "_type": "set", "_value": [] } }, "st_metadata": { "pdf_file_size_bytes": 406573, "pdf_is_encrypted": true, "pdf_number_of_pages": 30, "/CreationDate": "D:20080820185804+09'00'", "/ModDate": "D:20080820185804+09'00'", "/Producer": "Acrobat Distiller 5.0 (Windows)", "pdf_hyperlinks": { "_type": "set", "_value": [] } }, "cert_metadata": null, "report_frontpage": {}, "st_frontpage": null, "cert_frontpage": null, "report_keywords": { "cc_cert_id": { "JP": { "CRP-C0145-01": 1, "Certification No. C0145": 1 } }, "cc_protection_profile_id": {}, "cc_security_level": { "EAL": { "EAL3": 3 } }, "cc_sar": {}, "cc_sfr": {}, "cc_claims": { "A": { "A.MODE": 2 } }, "vendor": {}, "eval_facility": {}, "symmetric_crypto": {}, "asymmetric_crypto": {}, "pq_crypto": {}, "hash_function": {}, "crypto_scheme": {}, "crypto_protocol": {}, "randomness": {}, "cipher_mode": {}, "ecc_curve": {}, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": {}, "technical_report_id": {}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": { "ISO": { "ISO/IEC 15408:2005": 1, "ISO/IEC 18045:2005": 2 }, "CC": { "CCMB-2005-08-001": 2, "CCMB-2005-08-002": 2, "CCMB-2005-08-003": 2, "CCMB-2005-08-004": 2 } }, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": {} }, "st_keywords": { "cc_cert_id": {}, "cc_protection_profile_id": {}, "cc_security_level": { "EAL": { "EAL3": 9 } }, "cc_sar": { "ACM": { "ACM_CAP.3": 2, "ACM_SCP.1": 2 }, "ADO": { "ADO_DEL.1": 2, "ADO_IGS.1": 2 }, "ADV": { "ADV_FSP.1": 2, "ADV_HLD.2": 2, "ADV_RCR.1": 2 }, "AGD": { "AGD_ADM.1": 2, "AGD_USR.1": 2 }, "ALC": { "ALC_DVS.1": 3 }, "ATE": { "ATE_COV.2": 2, "ATE_DPT.1": 1, "ATE_FUN.1": 2, "ATE_IND.2": 2 }, "AVA": { "AVA_MSU.1": 2, "AVA_SOF.1": 1, "AVA_VLA.1": 3 } }, "cc_sfr": { "FDP": { "FDP_SIP.1": 13, "FDP_SIP.1.1": 1, "FDP_RIP.1": 5 }, "FPT": { "FPT_RVM.1": 8, "FPT_RVM.1.1": 1 } }, "cc_claims": { "O": { "O.OVERWRITE": 6 }, "A": { "A": 1, "A.MODE": 6 }, "OE": { "OE.MODE": 6 } }, "vendor": {}, "eval_facility": {}, "symmetric_crypto": {}, "asymmetric_crypto": {}, "pq_crypto": {}, "hash_function": {}, "crypto_scheme": {}, "crypto_protocol": {}, "randomness": {}, "cipher_mode": {}, "ecc_curve": {}, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": {}, "technical_report_id": {}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": { "ISO": { "ISO/IEC 15408:2005": 1 } }, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": { "OutOfScope": { "out of scope": 1, "attack capability is needed for attacks such as bypassing or tampering TSF, but those are out of scope of this evaluation. That is to say, an analysis of apparent vulnerability (AVA_VLA.1) is sufficient": 1 } } }, "cert_keywords": null, "report_filename": "c0145_erpt.pdf", "st_filename": "c0145_est.pdf", "cert_filename": null }, "heuristics": { "_type": "sec_certs.sample.cc.CCCertificate.Heuristics", "extracted_versions": { "_type": "set", "_value": [ "1.01" ] }, "cpe_matches": null, "verified_cpe_matches": null, "related_cves": null, "cert_lab": null, "cert_id": "JISEC-CC-CRP-C0145", "st_references": { "_type": "sec_certs.sample.certificate.References", "directly_referenced_by": null, "indirectly_referenced_by": null, "directly_referencing": null, "indirectly_referencing": null }, "report_references": { "_type": "sec_certs.sample.certificate.References", "directly_referenced_by": null, "indirectly_referenced_by": null, "directly_referencing": null, "indirectly_referencing": null }, "annotated_references": null, "extracted_sars": { "_type": "set", "_value": [ { "_type": "sec_certs.sample.sar.SAR", "family": "ATE_IND", "level": 2 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AVA_VLA", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ADV_RCR", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ATE_COV", "level": 2 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AGD_USR", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ATE_DPT", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AVA_MSU", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_DVS", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ADV_HLD", "level": 2 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AGD_ADM", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ADV_FSP", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ATE_FUN", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AVA_SOF", "level": 1 } ] }, "direct_transitive_cves": null, "indirect_transitive_cves": null, "scheme_data": { "cert_id": "C0078", "supplier": "RICOH COMPANY, LTD.", "toe_overseas_name": "DataOverwriteSecurity\n Unit Type C Software\n V0.04", "claim": "EAL3", "revalidations": [ { "date": "2008-04", "link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0078_it6102_01.html" } ], "certification_date": "2007-01", "toe_overseas_link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0078_it6102.html", "toe_japan_name": "DataOverwriteSecurity Unit Type D Software\n V0.04", "enhanced": { "product": "DataOverwriteSecurity Unit Type C Software", "toe_version": "V0.04", "product_type": "IT Product (software to overwrite data)", "certification_date": "2007-01-24", "cc_version": "2.3", "assurance_level": "EAL3", "vendor": "RICOH COMPANY, LTD.", "evaluation_facility": "Electronic Commerce Security Technology Laboratory Inc. Evaluation Center", "report_link": "https://www.ipa.go.jp/en/security/c0078_erpt.pdf", "cert_link": "https://www.ipa.go.jp/en/security/c0078_eimg.pdf", "target_link": "https://www.ipa.go.jp/en/security/c0078_est.pdf", "description": "PRODUCT DESCRIPTION \n This product, an optional kit of safer use for Multi Function Product, overwrites the specified area on HDD with random data by Multi Function Product." } } }, "_id": "663b9c1bde7447b3" } }, { "_id": { "$oid": "66c0a10b1c78507fd106128d" }, "run_id": { "$oid": "66c0a0e21c78507fd105fc06" }, "dgst": "663b9c1bde7447b3", "timestamp": { "$date": "2024-08-17T12:52:18.171Z" }, "type": "change", "diff": { "__update__": { "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0145_erpt.pdf", "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0145_est.pdf", "state": { "__update__": { "report": { "__update__": { "download_ok": false, "convert_ok": false, "extract_ok": false, "pdf_hash": null, "txt_hash": null } }, "st": { "__update__": { "download_ok": false, "convert_ok": false, "extract_ok": false, "pdf_hash": null, "txt_hash": null } } } }, "pdf_data": { "__update__": { "report_metadata": null, "st_metadata": null, "report_frontpage": null, "report_keywords": null, "st_keywords": null, "report_filename": null, "st_filename": null } }, "heuristics": { "__update__": { "cert_id": null, "extracted_sars": null } } } } }, { "_id": { "$oid": "66c7affd2ff8c812f518c823" }, "run_id": { "$oid": "66c7afc82ff8c812f518b966" }, "dgst": "663b9c1bde7447b3", "timestamp": { "$date": "2024-08-22T18:04:48.021Z" }, "type": "change", "diff": { "__update__": { "state": { "__update__": { "report": { "__update__": { "download_ok": true, "convert_ok": true, "extract_ok": true, "pdf_hash": "512f1da62ce4f5835e8b31e36524bd134f7742b0faac623e92c9665a584a6ed2", "txt_hash": "aa1315d75f2a52c82a16f6f5a20bd964cee5c4b2fcb48be2dc395da6bc196365" } }, "st": { "__update__": { "download_ok": true, "convert_ok": true, "extract_ok": true, "pdf_hash": "a60c776ddd9b8ec08bb3c118665dabf5b1cd5d51d00a7fa4fec7920f56859557", "txt_hash": "96f8d2f32e1f56eb718a302367ae57ac65331a0c15b64e859cbdf8fc40fc4976" } } } }, "pdf_data": { "__update__": { "report_metadata": { "pdf_file_size_bytes": 98465, "pdf_is_encrypted": false, "pdf_number_of_pages": 18, "/ModDate": "D:20080911170342+09'00'", "/CreationDate": "D:20080911170342+09'00'", "/Title": "untitled", "/Producer": "Acrobat Distiller 6.0 (Windows)", "pdf_hyperlinks": { "_type": "set", "_value": [] } }, "st_metadata": { "pdf_file_size_bytes": 406573, "pdf_is_encrypted": true, "pdf_number_of_pages": 30, "/CreationDate": "D:20080820185804+09'00'", "/ModDate": "D:20080820185804+09'00'", "/Producer": "Acrobat Distiller 5.0 (Windows)", "pdf_hyperlinks": { "_type": "set", "_value": [] } }, "report_frontpage": {}, "report_keywords": { "cc_cert_id": { "JP": { "CRP-C0145-01": 1, "Certification No. C0145": 1 } }, "cc_protection_profile_id": {}, "cc_security_level": { "EAL": { "EAL3": 3 } }, "cc_sar": {}, "cc_sfr": {}, "cc_claims": { "A": { "A.MODE": 2 } }, "vendor": {}, "eval_facility": {}, "symmetric_crypto": {}, "asymmetric_crypto": {}, "pq_crypto": {}, "hash_function": {}, "crypto_scheme": {}, "crypto_protocol": {}, "randomness": {}, "cipher_mode": {}, "ecc_curve": {}, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": {}, "technical_report_id": {}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": { "ISO": { "ISO/IEC 15408:2005": 1, "ISO/IEC 18045:2005": 2 }, "CC": { "CCMB-2005-08-001": 2, "CCMB-2005-08-002": 2, "CCMB-2005-08-003": 2, "CCMB-2005-08-004": 2 } }, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": {} }, "st_keywords": { "cc_cert_id": {}, "cc_protection_profile_id": {}, "cc_security_level": { "EAL": { "EAL3": 9 } }, "cc_sar": { "ACM": { "ACM_CAP.3": 2, "ACM_SCP.1": 2 }, "ADO": { "ADO_DEL.1": 2, "ADO_IGS.1": 2 }, "ADV": { "ADV_FSP.1": 2, "ADV_HLD.2": 2, "ADV_RCR.1": 2 }, "AGD": { "AGD_ADM.1": 2, "AGD_USR.1": 2 }, "ALC": { "ALC_DVS.1": 3 }, "ATE": { "ATE_COV.2": 2, "ATE_DPT.1": 1, "ATE_FUN.1": 2, "ATE_IND.2": 2 }, "AVA": { "AVA_MSU.1": 2, "AVA_SOF.1": 1, "AVA_VLA.1": 3 } }, "cc_sfr": { "FDP": { "FDP_SIP.1": 13, "FDP_SIP.1.1": 1, "FDP_RIP.1": 5 }, "FPT": { "FPT_RVM.1": 8, "FPT_RVM.1.1": 1 } }, "cc_claims": { "O": { "O.OVERWRITE": 6 }, "A": { "A": 1, "A.MODE": 6 }, "OE": { "OE.MODE": 6 } }, "vendor": {}, "eval_facility": {}, "symmetric_crypto": {}, "asymmetric_crypto": {}, "pq_crypto": {}, "hash_function": {}, "crypto_scheme": {}, "crypto_protocol": {}, "randomness": {}, "cipher_mode": {}, "ecc_curve": {}, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": {}, "technical_report_id": {}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": { "ISO": { "ISO/IEC 15408:2005": 1 } }, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": { "OutOfScope": { "out of scope": 1, "attack capability is needed for attacks such as bypassing or tampering TSF, but those are out of scope of this evaluation. That is to say, an analysis of apparent vulnerability (AVA_VLA.1) is sufficient": 1 } } }, "report_filename": "c0145_erpt.pdf", "st_filename": "c0145_est.pdf" } }, "heuristics": { "__update__": { "cert_id": "JISEC-CC-CRP-C0145", "extracted_sars": { "_type": "set", "_value": [ { "_type": "sec_certs.sample.sar.SAR", "family": "AVA_VLA", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ADV_FSP", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ATE_IND", "level": 2 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ATE_COV", "level": 2 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ADV_RCR", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AVA_SOF", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AVA_MSU", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AGD_USR", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AGD_ADM", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ATE_DPT", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_DVS", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ADV_HLD", "level": 2 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ATE_FUN", "level": 1 } ] } } } } } }, { "_id": { "$oid": "66fb219957e77cef5531f3d1" }, "run_id": { "$oid": "66fb214d57e77cef5531f166" }, "dgst": "663b9c1bde7447b3", "timestamp": { "$date": "2024-09-30T12:00:02.794Z" }, "type": "change", "diff": { "__update__": { "heuristics": { "__update__": { "scheme_data": null } } } } }, { "_id": { "$oid": "670d60bed746c9e694e38929" }, "run_id": { "$oid": "670d6087d746c9e694e385eb" }, "dgst": "663b9c1bde7447b3", "timestamp": { "$date": "2024-10-14T12:00:00.516Z" }, "type": "change", "diff": { "__update__": { "heuristics": { "__update__": { "scheme_data": { "cert_id": "C0078", "supplier": "RICOH COMPANY, LTD.", "toe_overseas_name": "DataOverwriteSecurity\n Unit Type C Software\n V0.04", "expiration_date": "2013-10", "claim": "EAL3", "revalidations": [ { "date": "2008-04", "link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0078_it6102_01.html" } ], "certification_date": "2007-01", "toe_overseas_link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0078_it6102.html", "toe_japan_name": "DataOverwriteSecurity Unit Type D Software\n V0.04", "enhanced": { "product": "DataOverwriteSecurity Unit Type C Software", "toe_version": "V0.04", "product_type": "IT Product (software to overwrite data)", "certification_date": "2007-01-24", "cc_version": "2.3", "assurance_level": "EAL3", "vendor": "RICOH COMPANY, LTD.", "evaluation_facility": "Electronic Commerce Security Technology Laboratory Inc. Evaluation Center", "report_link": "https://www.ipa.go.jp/en/security/c0078_erpt.pdf", "cert_link": "https://www.ipa.go.jp/en/security/c0078_eimg.pdf", "target_link": "https://www.ipa.go.jp/en/security/c0078_est.pdf", "description": "PRODUCT DESCRIPTION \n This product, an optional kit of safer use for Multi Function Product, overwrites the specified area on HDD with random data by Multi Function Product." } } } } } } }, { "_id": { "$oid": "672ffc06fb882d74835eb73f" }, "run_id": { "$oid": "672ffba8fb882d74835eae78" }, "dgst": "663b9c1bde7447b3", "timestamp": { "$date": "2024-11-09T17:43:21.303Z" }, "type": "change", "diff": { "__update__": { "heuristics": { "__update__": { "scheme_data": { "__update__": { "cert_id": "JISEC-CC-CRP-C0145", "supplier": "RICOH COMPANY, LTD.", "toe_overseas_name": "DataOverwriteSecurity Unit Type H Software 1.01x", "expiration_date": { "_type": "date", "_value": "2013-10-01" }, "revalidations": { "0": { "__update__": { "date": "2009-06", "link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0145_it7169_02.html" } } }, "certification_date": { "_type": "date", "_value": "2008-02-01" }, "toe_overseas_link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0145_it7169.html", "toe_japan_name": "imagio Security Card Type 7 Software 1.01x", "enhanced": { "__update__": { "product": "imagio Security Card Type 7 Software (Japanese name) DataOverwriteSecurity Unit Type H Software (English name)", "toe_version": "1.01x", "report_link": "https://www.ipa.go.jp/en/security/c0145_erpt.pdf", "cert_link": "https://www.ipa.go.jp/en/security/c0145_eimg.pdf", "target_link": "https://www.ipa.go.jp/en/security/c0145_est.pdf", "description": "PRODUCT DESCRIPTION Description of TOE This product, an optional kit of safer use for Multi Function Product, overwrites generated data into the specified area of HDD commanded by Multi Function Product(MFP). This product is available for the following MFPs; Ricoh imagio MP C6000 series Ricoh imagio MP C7500 series Ricoh Aficio MP C6000 series Ricoh Aficio MP C7500 series Savin C6055/C7570 series Lanier LD260c/275c series Lanier MP C6000/C7500 series Gestetner MP C6000/C7500 series Infotec MP C6000/C7500 series NRG MP C6000/C7500 series TOE security functions Same as above." }, "__delete__": [ "certification_date" ] } } } } } } } }, { "_id": { "$oid": "673f6585a1452c910a80b819" }, "run_id": { "$oid": "673f6538a1452c910a80b5ad" }, "dgst": "663b9c1bde7447b3", "timestamp": { "$date": "2024-11-21T11:03:40.77Z" }, "type": "change", "diff": { "__update__": { "heuristics": { "__insert__": { "prev_certificates": [], "next_certificates": [] } } } } }, { "_id": { "$oid": "67a4087c6161883953270993" }, "run_id": { "$oid": "67a4080e616188395327018d" }, "dgst": "663b9c1bde7447b3", "timestamp": { "$date": "2025-02-05T18:04:55.043Z" }, "type": "change", "diff": { "__insert__": { "protection_profile_links": { "_type": "set", "_value": [] } }, "__update__": { "state": { "__update__": { "report": { "__update__": { "_type": "sec_certs.sample.document_state.DocumentState" } }, "st": { "__update__": { "_type": "sec_certs.sample.document_state.DocumentState" } }, "cert": { "__update__": { "_type": "sec_certs.sample.document_state.DocumentState" } } } }, "heuristics": { "__insert__": { "protection_profiles": null, "eal": "EAL3" }, "__update__": { "prev_certificates": null, "next_certificates": null } } }, "__delete__": [ "protection_profiles" ] } }, { "_id": { "$oid": "669f80cd566b7c5a18058cf7" }, "run_id": { "$oid": "669f8076566b7c5a1805773d" }, "dgst": "6ca52f5450bedb2f", "timestamp": { "$date": "2024-07-23T00:09:57.927Z" }, "type": "new", "diff": { "_type": "sec_certs.sample.cc.CCCertificate", "dgst": "6ca52f5450bedb2f", "status": "archived", "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems", "name": "IDentity Card v3.1/BAC", "manufacturer": "ID&Trust Ltd.", "scheme": "IT", "security_level": { "_type": "set", "_value": [ "ALC_DVS.2", "EAL4+" ] }, "not_valid_before": { "_type": "date", "_value": "2015-09-30" }, "not_valid_after": { "_type": "date", "_value": "2020-09-30" }, "report_link": "https://www.commoncriteriaportal.org/files/epfiles/cr_idcard_bac_v1.0_en.pdf", "st_link": "https://www.commoncriteriaportal.org/files/epfiles/st_idcard_bac_v0.11.pdf", "cert_link": null, "manufacturer_web": "https://www.idandtrust.com/", "protection_profiles": { "_type": "set", "_value": [ { "_type": "sec_certs.sample.protection_profile.ProtectionProfile", "pp_name": "Protection Profile for Machine Readable Travel Document with 'ICAO Application', Basic Acce...", "pp_eal": null, "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0055b.pdf", "pp_ids": null } ] }, "maintenance_updates": { "_type": "set", "_value": [] }, "state": { "_type": "sec_certs.sample.cc.CCCertificate.InternalState", "report": { "_type": "sec_certs.sample.cc.CCCertificate.DocumentState", "download_ok": true, "convert_garbage": false, "convert_ok": true, "extract_ok": true, "pdf_hash": "a2fe7f1c2e1be47f06363ecbfab39a87b0d23ca34e7c3aa365df65c14b47bf51", "txt_hash": "d6ac0d7185d4fa38fa98dc98146ddf4b6ea9ea01f39e55e34e7a1154bedade64" }, "st": { "_type": "sec_certs.sample.cc.CCCertificate.DocumentState", "download_ok": true, "convert_garbage": false, "convert_ok": true, "extract_ok": true, "pdf_hash": "2653ed6302e324c0bd7e28d37d670f6a06c261a2efcc3d4a58516987c7cf1bdb", "txt_hash": "70071e2450c0e9406b73cb05b1b478c1c19780f674a5819fd8dd3616810a41d9" }, "cert": { "_type": "sec_certs.sample.cc.CCCertificate.DocumentState", "download_ok": false, "convert_garbage": false, "convert_ok": false, "extract_ok": false, "pdf_hash": null, "txt_hash": null } }, "pdf_data": { "_type": "sec_certs.sample.cc.CCCertificate.PdfData", "report_metadata": { "pdf_file_size_bytes": 714899, "pdf_is_encrypted": false, "pdf_number_of_pages": 24, "/Title": "Certification Report “IDentity Card v3.1/BAC”", "/Author": "OCSI", "/Creator": "Microsoft® Word 2013", "/CreationDate": "D:20151006180910+02'00'", "/ModDate": "D:20151006180910+02'00'", "/Producer": "Microsoft® Word 2013", "pdf_hyperlinks": { "_type": "set", "_value": [] } }, "st_metadata": { "pdf_file_size_bytes": 485029, "pdf_is_encrypted": false, "pdf_number_of_pages": 89, "/Author": "ID&Trust", "/CreationDate": "D:20150908175156+02'00'", "/Creator": "PDF Architect", "/ModDate": "D:20151007083925+02'00'", "/Producer": "PDF Architect", "/Title": "Security Target “IDentity Card v3.1/BAC”", "pdf_hyperlinks": { "_type": "set", "_value": [] } }, "cert_metadata": null, "report_frontpage": {}, "st_frontpage": null, "cert_frontpage": null, "report_keywords": { "cc_cert_id": { "NL": { "NSCIB-CC-13-37760-CR2": 1 }, "IT": { "OCSI/CERT/SYS/05/2015/RC": 24 } }, "cc_protection_profile_id": { "BSI": { "BSI-CC-PP-0055-2009": 3 } }, "cc_security_level": { "EAL": { "EAL5+": 2, "EAL4": 9, "EAL 2": 1, "EAL 4": 2, "EAL5": 3, "EAL5 augmented": 3, "EAL4 augmented": 1 } }, "cc_sar": { "ADV": { "ADV_ARC.1": 1, "ADV_FSP.4": 1, "ADV_IMP.1": 1, "ADV_TDS.3": 1 }, "AGD": { "AGD_OPE.1": 1, "AGD_PRE.1": 1 }, "ALC": { "ALC_FLR": 2, "ALC_DVS.2": 9, "ALC_CMC.4": 1, "ALC_CMS.4": 1, "ALC_DEL.1": 1, "ALC_LCD.1": 1, "ALC_TAT.1": 1 }, "ATE": { "ATE_COV.2": 1, "ATE_DPT.1": 1, "ATE_FUN.1": 1, "ATE_IND.2": 1, "ATE_COMP": 1 }, "AVA": { "AVA_VAN.5": 3, "AVA_VAN.3": 2, "AVA_COMP": 1 }, "ASE": { "ASE_TSS.2": 3, "ASE_CCL.1": 1, "ASE_ECD.1": 1, "ASE_INT.1": 1, "ASE_OBJ.2": 1, "ASE_REQ.2": 1, "ASE_SPD.1": 1, "ASE_TSS.1": 1 } }, "cc_sfr": { "FAU": { "FAU_SAS": 1 }, "FCS": { "FCS_RND": 1 }, "FMT": { "FMT_LIM": 1 } }, "cc_claims": { "O": { "O.J": 1 } }, "vendor": { "NXP": { "NXP": 4 } }, "eval_facility": { "BrightSight": { "Brightsight": 1 } }, "symmetric_crypto": {}, "asymmetric_crypto": {}, "pq_crypto": {}, "hash_function": {}, "crypto_scheme": {}, "crypto_protocol": {}, "randomness": {}, "cipher_mode": {}, "ecc_curve": {}, "crypto_engine": { "SmartMX": { "SmartMX": 1 } }, "tls_cipher_suite": {}, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": { "other": { "JIL": 1 } }, "technical_report_id": { "BSI": { "BSI TR-03105": 2 } }, "device_model": {}, "tee_name": {}, "os_name": { "JCOP": { "JCOP 2": 3 } }, "cplc_data": {}, "ic_data_group": {}, "standard_id": { "ISO": { "ISO/IEC 15408": 2 }, "ICAO": { "ICAO": 6 }, "CC": { "CCMB-2012-09-001": 1, "CCMB-2012-09-002": 1, "CCMB-2012-09-003": 1, "CCMB-2012-09-004": 1 } }, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": {} }, "st_keywords": { "cc_cert_id": { "DE": { "BSI-DSZ-CC-0858": 1, "BSI-DSZ-CC-0750": 1 }, "NL": { "NSCIB-CC-13-13-37760-CR": 1, "NSCIB-CC-13-37760": 2 } }, "cc_protection_profile_id": { "BSI": { "BSI-CC-PP-0055": 2, "BSI-PP-0002-2001": 1, "BSI-PP-0035-2007": 1, "BSI-CC-PP-0056": 1 } }, "cc_security_level": { "EAL": { "EAL4": 9, "EAL5": 1, "EAL 5+": 1, "EAL5+": 2, "EAL 4": 2, "EAL 5": 2, "EAL4 augmented": 3, "EAL5 augmented": 1 } }, "cc_sar": { "ADV": { "ADV_ARC.1": 2 }, "ALC": { "ALC_DVS.2": 8, "ALC_DVS": 1 }, "AVA": { "AVA_VAN.5": 2 }, "ASE": { "ASE_TSS.2": 2 } }, "cc_sfr": { "FAU": { "FAU_SAS": 8, "FAU_ARP.1": 2, "FAU_SAS.1": 12, "FAU_GEN": 1, "FAU_SAS.1.1": 2 }, "FCO": { "FCO_NRO": 1 }, "FCS": { "FCS_RND": 8, "FCS_CKM.1": 29, "FCS_CKM.2": 3, "FCS_CKM.3": 1, "FCS_CKM.4": 22, "FCS_COP.1": 10, "FCS_COP": 51, "FCS_RNG.1": 2, "FCS_RND.1": 17, "FCS_RNG": 2, "FCS_RND.1.1": 2, "FCS_CKM.1.1": 1, "FCS_CKM.4.1": 1, "FCS_CKM": 4 }, "FDP": { "FDP_ACC": 9, "FDP_ACF": 10, "FDP_IFC": 2, "FDP_IFF": 2, "FDP_RIP": 8, "FDP_ROL": 1, "FDP_SDI.2": 1, "FDP_ITC": 3, "FDP_ACC.2": 1, "FDP_UIT": 2, "FDP_ITC.1": 10, "FDP_ITC.2": 10, "FDP_ACC.1": 17, "FDP_ACF.1": 12, "FDP_ACC.1.1": 1, "FDP_ACF.1.1": 1, "FDP_ACF.1.2": 2, "FDP_ACF.1.3": 1, "FDP_ACF.1.4": 2, "FDP_UCT.1": 10, "FDP_UIT.1": 10, "FDP_IFC.1": 4, "FDP_UCT.1.1": 1, "FDP_UIT.1.1": 1, "FDP_UIT.1.2": 1, "FDP_UCT": 1 }, "FIA": { "FIA_ATD": 1, "FIA_UID": 4, "FIA_USB": 1, "FIA_AFL": 3, "FIA_SOS.2": 1, "FIA_UAU.5.2": 4, "FIA_UAU.4": 14, "FIA_UAU.6": 11, "FIA_UID.1": 11, "FIA_UID.1.1": 1, "FIA_UID.1.2": 1, "FIA_UAU.1": 9, "FIA_UAU.1.1": 1, "FIA_UAU.1.2": 1, "FIA_UAU.4.1": 1, "FIA_UAU.5": 9, "FIA_UAU.5.1": 1, "FIA_UAU.6.1": 1, "FIA_AFL.1": 7, "FIA_AFL.1.1": 1, "FIA_AFL.1.2": 1, "FIA_UAU": 10 }, "FMT": { "FMT_LIM": 9, "FMT_MSA": 16, "FMT_SMF.1": 22, "FMT_SMR.1": 22, "FMT_MTD": 33, "FMT_SMR": 5, "FMT_SMF": 5, "FMT_LIM.1": 22, "FMT_LIM.2": 19, "FMT_LIM.1.1": 3, "FMT_LIM.2.1": 4, "FMT_MSA.3": 3, "FMT_SMF.1.1": 1, "FMT_SMR.1.1": 1, "FMT_SMR.1.2": 1, "FMT_MTD.1": 6, "FMT_MSA.1": 1 }, "FPR": { "FPR_UNO.1": 1 }, "FPT": { "FPT_PHP.3": 14, "FPT_FLS.1": 11, "FPT_TDC.1": 1, "FPT_FLS": 6, "FPT_RCV": 1, "FPT_PHP": 3, "FPT_TST.1": 8, "FPT_FLS.1.1": 1, "FPT_TST": 3, "FPT_TST.1.1": 1, "FPT_TST.1.2": 1, "FPT_TST.1.3": 1, "FPT_PHP.3.1": 1, "FPT_RVM.1": 1, "FPT_SEP.1": 1 }, "FRU": { "FRU_FLT": 1 }, "FTP": { "FTP_ITC": 2, "FTP_ITC.1": 5, "FTP_TRP.1": 5 } }, "cc_claims": { "T": { "T.PHYSICAL": 3, "T.RND": 3, "T.CONFID-APPLI-DATA": 3, "T.INTEG-APPLI-DATA": 4, "T.RESOURCES": 3, "T.CONFID-JCS-CODE": 1, "T.CONFID-JCS-DATA": 1, "T.DELETION": 1, "T.EXE-CODE": 2, "T.EXE-CODE-REMOTE": 1, "T.INTEG-APPLI-CODE": 2, "T.INTEG-JCS-CODE": 1, "T.INTEG-JCS-DATA": 1, "T.NATIVE": 1, "T.OBJ-DELETION": 1, "T.SID": 2, "T.SEC_BOX_ORDER": 1, "T.OS_OPERATET": 1 }, "A": { "A.APPLET": 1, "A.VERIFICATION": 1, "A.USE_DIAG": 1, "A.USE_KEYS": 1, "A.PROCESS-": 1 }, "OT": { "OT.IDENTIFICATION": 1, "OT.OPERATE": 1, "OT.CIPHER": 1, "OT.NATIVE": 1, "OT.REMOTE": 1, "OT.OBJ-DELETION": 1, "OT.DELETION": 1, "OT.SEC_BOX_FW": 1, "OT.GLOBAL_ARRAYS_INTEG": 1, "OT.GLOBAL_ARRAYS_CONFID": 1, "OT.REALLOCATION": 1, "OT.RESOURCES": 1, "OT.ALARM": 1, "OT.MF_FW": 1, "OT.LOAD": 1, "OT.SCP": 2, "OT.INSTALL": 1, "OT.CARD-MANAGEMENT": 1, "OT.SCP-RECOVERY": 1, "OT.EXT-MEM": 1, "OT.TRANSACTION": 1, "OT.SID": 1, "OT.FIREWALL": 1, "OT.RND": 1, "OT.KEY-MNGT": 1, "OT.PIN-MNGT": 1, "OT.AC": 2 }, "OE": { "OE.USE_DIAG": 1, "OE.USE_KEYS": 1, "OE.PROCESS_SEC_IC": 1, "OE.APPLET": 1, "OE.VERIFICATION": 1, "OE.MRTD_": 2, "OE.MRTD": 2, "OE.BAC-": 1 }, "OSP": { "OSP.VERIFICATION": 1, "OSP.PROCESS-TOE": 1 } }, "vendor": { "NXP": { "NXP": 18 } }, "eval_facility": { "BrightSight": { "Brightsight": 1 } }, "symmetric_crypto": { "AES_competition": { "AES": { "AES": 5 } }, "DES": { "DES": { "DES": 5 }, "3DES": { "Triple-DES": 12 } } }, "asymmetric_crypto": { "ECC": { "ECDH": { "ECDH": 1 }, "ECDSA": { "ECDSA": 7 } }, "FF": { "DH": { "DH": 1 } } }, "pq_crypto": {}, "hash_function": { "SHA": { "SHA1": { "SHA-1": 6 }, "SHA2": { "SHA-256": 4, "SHA-384": 3, "SHA-512": 3, "SHA-224": 2 } } }, "crypto_scheme": { "MAC": { "MAC": 5 } }, "crypto_protocol": { "PACE": { "PACE": 4 } }, "randomness": { "RNG": { "RND": 5 } }, "cipher_mode": { "CBC": { "CBC": 1 } }, "ecc_curve": {}, "crypto_engine": { "SmartMX": { "SmartMX": 1 } }, "tls_cipher_suite": {}, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": { "SCA": { "physical probing": 3, "DPA": 2, "SPA": 1, "timing attacks": 1 }, "FI": { "physical tampering": 8, "Physical Tampering": 5, "Physical tampering": 1, "Malfunction": 8, "malfunction": 7, "fault injection": 1 }, "other": { "reverse engineering": 1 } }, "technical_report_id": { "BSI": { "BSI TR-3110": 1 } }, "device_model": {}, "tee_name": {}, "os_name": { "JCOP": { "JCOP 2": 8 } }, "cplc_data": {}, "ic_data_group": { "EF": { "EF.DG1": 28, "EF.DG2": 9, "EF.DG3": 9, "EF.DG4": 8, "EF.DG5": 7, "EF.DG16": 27, "EF.DG13": 3, "EF.DG14": 2, "EF.DG15": 1, "EF.COM": 8, "EF.SOD": 8 } }, "standard_id": { "FIPS": { "FIPS 180-2": 2, "FIPS 46-3": 2, "FIPS 197": 1 }, "PKCS": { "PKCS#1": 6 }, "BSI": { "AIS20": 3, "AIS 20": 1 }, "ISO": { "ISO/IEC 18013": 2, "ISO/IEC 7816-4": 3, "ISO/IEC 9796-2": 5 }, "ICAO": { "ICAO": 10 }, "CC": { "CCMB-2012-09-001": 2, "CCMB-2012-09-002": 2, "CCMB-2012-09-003": 2, "CCMB-2012-09-004": 2 } }, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": { "OutOfScope": { "out of scope": 2, "Out of scope": 76, "Platform functionality) No contradiction to this ST FDP_ACF.1/FIREWALL No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST FDP_IFF.1/JCVM No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST FMT_MSA.1/JCRE No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST FMT_MSA.2/FIREWALL_JCVM No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST FMT_MSA.3/JCVM No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST FMT_SMR.1 No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST FCS_CKM.3 No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST FDP_RIP.1/APDU No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST FDP_RIP.1/KEYS No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST FDP_ROL.1/FIREWALL No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST FPR_UNO.1 No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST FIA_ATD.1/AID No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST FIA_USB.1/AID No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST MT_MTD.3/JCRE No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST FMT_SMR.1/Installer No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST FPT_RCV.3/Installer No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST FDP_ACF.1/ADEL No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST FMT_MSA.1/ADEL No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST FMT_SMF.1/ADEL No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST FPT_FLS.1/ADEL No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST FDP_ACC.2.2/JCRMI No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST FDP_RIP.1/ODEL No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST FCO_NRO.2/CM No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST FDP_IFF.1/CM No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST FIA_UID.1/CM No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST FMT_MSA.3/CM No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST FTP_ITC.1/CM No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST FDP_ACF.1/EXT_MEM No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST FMT_MSA.3/EXT_MEM No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST FPT_FLS.1/SCP No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST FDP_ACF.1/SCP No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST FDP_ACC.1/LifeCycle No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST FMT_MSA.1/LifeCycle No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST FIA_AFL.1/PIN No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST FDP_ACF.1/SecureBox No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST FMT_MSA.1/SecureBox No Correspondence Out of scope (Platform functionality": 1, "on this way. Nevertheless, this ST addresses the Basic Access Control only. EAC with PACE is out of scope of this ST and is described in an another ST. 1.3.1 Non-TOE hardware/software/firmware 14 There is": 1, "• OT.EXT-MEM • OT.TRANSACTION • OT.SID • OT.FIREWALL cannot be mapped because these are out of scope. 114 The objectives for the operational environment can be mapped as follows: Table 6 Mapping of": 1, "mapped as follows: Platform SFR Corresponding TOE SFR Remarks FDP_ACC.2/FIREWALL No Correspondence Out of scope (Platform functionality) No contradiction to this ST FDP_ACF.1/FIREWALL No Correspondence Out of": 1, "Platform functionality) No contradiction to this ST FDP_IFC.1/JCVM No Correspondence Out of scope (Platform functionality) No contradiction to this ST FDP_IFF.1/JCVM No Correspondence Out of scope": 1, "functionality) No contradiction to this ST FDP_RIP.1/OBJECTS No Correspondence Out of scope (Platform functionality) No contradiction to this ST FMT_MSA.1/JCRE No Correspondence Out of scope": 1, "functionality) No contradiction to this ST FMT_MSA.1/JCVM No Correspondence Out of scope (Platform functionality) No contradiction to this ST FMT_MSA.2/FIREWALL_JCVM No Correspondence Out": 1, "scope (Platform functionality) No contradiction to this ST FMT_MSA.3/FIREWALL No Correspondence Out of scope (Platform functionality) No contradiction to this ST FMT_MSA.3/JCVM No Correspondence Out of scope": 1, "functionality) No contradiction to this ST FMT_SMF.1 No Correspondence Out of scope (Platform functionality) No contradiction to this ST FMT_SMR.1 No Correspondence Out of scope": 1, "of the Platform since they contain overlapping requirements. FCS_CKM.2 No Correspondence Out of scope (Platform functionality) No contradiction to this ST FCS_CKM.3 No Correspondence Out of scope": 1, "BAC Confidential Page 26 of 89 FCS_COP.1/AUTH, FCS_COP.1/MAC, FDP_RIP.1/ABORT No Correspondence Out of scope (Platform functionality) No contradiction to this ST FDP_RIP.1/APDU No Correspondence Out of scope": 1, "functionality) No contradiction to this ST FDP_RIP.1/bArray No Correspondence Out of scope (Platform functionality) No contradiction to this ST FDP_RIP.1/KEYS No Correspondence Out of scope": 1, "functionality) No contradiction to this ST FDP_RIP.1/TRANSIENT No Correspondence Out of scope (Platform functionality) No contradiction to this ST FDP_ROL.1/FIREWALL No Correspondence Out of": 1, "corresponds to the FPT_PHP.3 of this ST about physical resistance. FDP_SDI.2 No Correspondence Out of scope (Platform functionality) No contradiction to this ST FPR_UNO.1 No Correspondence Out of scope": 1, "1 FPT_FLS.1 FPT_FLS.1 matches to the equivalent SFR of the Platform-ST. FPT_TDC.1 No Correspondence Out of scope (Platform functionality) No contradiction to this ST FIA_ATD.1/AID No Correspondence Out of scope": 1, "functionality) No contradiction to this ST FIA_UID.2/AID No Correspondence Out of scope (Platform functionality) No contradiction to this ST FIA_USB.1/AID No Correspondence Out of scope": 1, "functionality) No contradiction to this ST FMT_MTD.1/JCRE No Correspondence Out of scope (Platform functionality) No contradiction to this ST MT_MTD.3/JCRE No Correspondence Out of scope": 1, "functionality) No contradiction to this ST FDP_ITC.2/Installer No Correspondence Out of scope (Platform functionality) No contradiction to this ST FMT_SMR.1/Installer No Correspondence Out of": 1, "Platform functionality) No contradiction to this ST FPT_FLS.1/Installer No Correspondence Out of scope (Platform functionality) No contradiction to this ST FPT_RCV.3/Installer No Correspondence Out of": 1, "BAC Confidential Page 27 of 89 No contradiction to this ST FDP_ACC.2/ADEL No Correspondence Out of scope (Platform functionality) No contradiction to this ST FDP_ACF.1/ADEL No Correspondence Out of scope": 1, "functionality) No contradiction to this ST FDP_RIP.1/ADEL No Correspondence Out of scope (Platform functionality) No contradiction to this ST FMT_MSA.1/ADEL No Correspondence Out of scope": 1, "functionality) No contradiction to this ST FMT_MSA.3/ADEL No Correspondence Out of scope (Platform functionality) No contradiction to this ST FMT_SMF.1/ADEL No Correspondence Out of scope": 1, "functionality) No contradiction to this ST FMT_SMR.1/ADEL No Correspondence Out of scope (Platform functionality) No contradiction to this ST FPT_FLS.1/ADEL No Correspondence Out of scope": 1, "functionality) No contradiction to this ST FDP_ACC.2/JCRMI No Correspondence Out of scope (Platform functionality) No contradiction to this ST FDP_ACC.2.2/JCRMI No Correspondence Out of": 1, "Platform functionality) No contradiction to this ST FDP_ACF.1/JCRMI No Correspondence Out of scope (Platform functionality) No contradiction to this ST FDP_RIP.1/ODEL No Correspondence Out of scope": 1, "functionality) No contradiction to this ST FPT_FLS.1/ODEL No Correspondence Out of scope (Platform functionality) No contradiction to this ST FCO_NRO.2/CM No Correspondence Out of scope": 1, "functionality) No contradiction to this ST FDP_IFC.2/CM No Correspondence Out of scope (Platform functionality) No contradiction to this ST FDP_IFF.1/CM No Correspondence Out of scope": 1, "functionality) No contradiction to this ST FDP_UIT.1/CM No Correspondence Out of scope (Platform functionality) No contradiction to this ST FIA_UID.1/CM No Correspondence Out of scope": 1, "functionality) No contradiction to this ST FMT_MSA.1/CM No Correspondence Out of scope (Platform functionality) No contradiction to this ST FMT_MSA.3/CM No Correspondence Out of scope": 1, "functionality) No contradiction to this ST FMT_SMF.1/CM No Correspondence Out of scope (Platform functionality) Security Target ID&Trust IDentity-eMRTD BAC Confidential Page 28 of 89 No": 1, "to this ST FMT_SMR.1/CM No Correspondence Out of scope (Platform functionality) No contradiction to this ST FTP_ITC.1/CM No Correspondence Out of scope": 1, "functionality) No contradiction to this ST FDP_ACC.1/EXT_MEM No Correspondence Out of scope (Platform functionality) No contradiction to this ST FDP_ACF.1/EXT_MEM No Correspondence Out of": 1, "Platform functionality) No contradiction to this ST FMT_MSA.1/EXT_MEM No Correspondence Out of scope (Platform functionality) No contradiction to this ST FMT_MSA.3/EXT_MEM No Correspondence Out of": 1, "Platform functionality) No contradiction to this ST FMT_SMF.1/EXT_MEM No Correspondence Out of scope (Platform functionality) No contradiction to this ST FPT_FLS.1/SCP No Correspondence Out of scope": 1, "functionality) No contradiction to this ST FRU_FLT.2/SCP No Correspondence Out of scope (Platform functionality) No contradiction to this ST FPT_PHP.3/SCP FPT_PHP.3 The FPT_PHP.3 of this": 1, "matches the FPT_PHP.3/SCP of the Platform ST. FDP_ACC.1/SCP No Correspondence Out of scope (Platform functionality) No contradiction to this ST FDP_ACF.1/SCP No Correspondence Out of scope": 1, "functionality) No contradiction to this ST FMT_MSA.3/SCP No Correspondence Out of scope (Platform functionality) No contradiction to this ST FDP_ACC.1/LifeCycle No Correspondence Out of": 1, "Platform functionality) No contradiction to this ST FDP_ACF.1/LifeCycle No Correspondence Out of scope (Platform functionality) No contradiction to this ST FMT_MSA.1/LifeCycle No Correspondence Out of": 1, "Platform functionality) No contradiction to this ST FMT_MSA.3/LifeCycle No Correspondence Out of scope (Platform functionality) No contradiction to this ST FIA_AFL.1/PIN No Correspondence Out of scope": 1, "functionality) No contradiction to this ST FTP_ITC.1/LifeCycle No Correspondence Out of scope (Platform functionality) No contradiction to this ST FAU_SAS.1/SCP FAU_SAS.1 FAU_SAS.1 of this ST": 1, "1 FPT_EMSEC.1 matches the FPT_EMSEC.1 of the Platform-ST FDP_ACC.2/SecureBox No Correspondence Out of scope (Platform functionality) No contradiction to this ST FDP_ACF.1/SecureBox No Correspondence Out of": 1, "Platform functionality) No contradiction to this ST FMT_MSA.3/SecureBox No Correspondence Out of scope (Platform functionality) No contradiction to this ST FMT_MSA.1/SecureBox No Correspondence Out of": 1, "Platform functionality) No contradiction to this ST FMT_SMF.1/SecureBox No Correspondence Out of scope (Platform functionality) No contradiction to this ST Table 7 Mapping of Security requirements 2.5.6": 1 } } }, "cert_keywords": null, "report_filename": "cr_idcard_bac_v1.0_en.pdf", "st_filename": "st_idcard_bac_v0.11.pdf", "cert_filename": null }, "heuristics": { "_type": "sec_certs.sample.cc.CCCertificate.Heuristics", "extracted_versions": { "_type": "set", "_value": [ "3.1" ] }, "cpe_matches": null, "verified_cpe_matches": null, "related_cves": null, "cert_lab": null, "cert_id": "OCSI/CERT/SYS/05/2015/RC", "st_references": { "_type": "sec_certs.sample.certificate.References", "directly_referenced_by": null, "indirectly_referenced_by": null, "directly_referencing": null, "indirectly_referencing": null }, "report_references": { "_type": "sec_certs.sample.certificate.References", "directly_referenced_by": { "_type": "set", "_value": [ "OCSI/CERT/SYS/03/2016/RC" ] }, "indirectly_referenced_by": { "_type": "set", "_value": [ "OCSI/CERT/SYS/03/2016/RC", "OCSI/CERT/SYS/05/2016/RC", "OCSI/CERT/CCL/05/2021/RC" ] }, "directly_referencing": { "_type": "set", "_value": [ "NSCIB-CC-13-37760-CR2" ] }, "indirectly_referencing": { "_type": "set", "_value": [ "BSI-DSZ-CC-0707-2012", "BSI-DSZ-CC-0645-2010", "NSCIB-CC-13-37760-CR2", "BSI-DSZ-CC-0750-V2-2014", "NSCIB-CC-13-37762-CR", "BSI-DSZ-CC-0858-2013" ] } }, "annotated_references": null, "extracted_sars": { "_type": "set", "_value": [ { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_ECD", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_DVS", "level": 2 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_CMS", "level": 4 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_CCL", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ATE_IND", "level": 2 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ADV_IMP", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AGD_PRE", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ATE_DPT", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AVA_VAN", "level": 5 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_DEL", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_OBJ", "level": 2 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_CMC", "level": 4 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AGD_OPE", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_TAT", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_TSS", "level": 2 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ADV_ARC", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_SPD", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_INT", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_REQ", "level": 2 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_LCD", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ATE_COV", "level": 2 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ADV_TDS", "level": 3 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ATE_FUN", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ADV_FSP", "level": 4 } ] }, "direct_transitive_cves": null, "indirect_transitive_cves": null, "scheme_data": null }, "_id": "6ca52f5450bedb2f" } }, { "_id": { "$oid": "66ba44469466f606341744e7" }, "run_id": { "$oid": "66ba432a9466f606341743a8" }, "dgst": "6ca52f5450bedb2f", "timestamp": { "$date": "2024-08-12T12:00:07.61Z" }, "type": "change", "diff": { "__update__": { "state": { "__update__": { "report": { "__update__": { "download_ok": false, "convert_ok": false, "extract_ok": false, "pdf_hash": null, "txt_hash": null } } } }, "pdf_data": { "__update__": { "report_metadata": null, "report_frontpage": null, "report_keywords": null, "report_filename": null } }, "heuristics": { "__update__": { "cert_id": null, "report_references": { "__update__": { "directly_referenced_by": null, "indirectly_referenced_by": null, "directly_referencing": null, "indirectly_referencing": null } }, "extracted_sars": { "__discard__": { "_type": "set", "_value": [ { "_type": "sec_certs.sample.sar.SAR", "family": "AGD_PRE", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ADV_TDS", "level": 3 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_INT", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_OBJ", "level": 2 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ATE_COV", "level": 2 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_TAT", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AGD_OPE", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_REQ", "level": 2 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_LCD", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_CMC", "level": 4 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ADV_IMP", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ATE_DPT", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ADV_FSP", "level": 4 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ATE_FUN", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_ECD", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ATE_IND", "level": 2 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_CMS", "level": 4 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_DEL", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_CCL", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_SPD", "level": 1 } ] } } } } } } }, { "_id": { "$oid": "66c0a10b1c78507fd10611e0" }, "run_id": { "$oid": "66c0a0e21c78507fd105fc06" }, "dgst": "6ca52f5450bedb2f", "timestamp": { "$date": "2024-08-17T12:52:18.171Z" }, "type": "change", "diff": { "__update__": { "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cr_idcard_bac_v1.0_en.pdf", "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_idcard_bac_v0.11.pdf", "state": { "__update__": { "st": { "__update__": { "download_ok": false, "convert_ok": false, "extract_ok": false, "pdf_hash": null, "txt_hash": null } } } }, "pdf_data": { "__update__": { "st_metadata": null, "st_keywords": null, "st_filename": null } }, "heuristics": { "__update__": { "extracted_sars": { "__discard__": { "_type": "set", "_value": [ { "_type": "sec_certs.sample.sar.SAR", "family": "ADV_ARC", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AVA_VAN", "level": 5 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_TSS", "level": 2 } ] } } } } } } }, { "_id": { "$oid": "66c7affd2ff8c812f518cd1b" }, "run_id": { "$oid": "66c7afc82ff8c812f518b966" }, "dgst": "6ca52f5450bedb2f", "timestamp": { "$date": "2024-08-22T18:04:48.021Z" }, "type": "change", "diff": { "__update__": { "state": { "__update__": { "report": { "__update__": { "download_ok": true, "convert_ok": true, "extract_ok": true, "pdf_hash": "a2fe7f1c2e1be47f06363ecbfab39a87b0d23ca34e7c3aa365df65c14b47bf51", "txt_hash": "d6ac0d7185d4fa38fa98dc98146ddf4b6ea9ea01f39e55e34e7a1154bedade64" } }, "st": { "__update__": { "download_ok": true, "convert_ok": true, "extract_ok": true, "pdf_hash": "2653ed6302e324c0bd7e28d37d670f6a06c261a2efcc3d4a58516987c7cf1bdb", "txt_hash": "70071e2450c0e9406b73cb05b1b478c1c19780f674a5819fd8dd3616810a41d9" } } } }, "pdf_data": { "__update__": { "report_metadata": { "pdf_file_size_bytes": 714899, "pdf_is_encrypted": false, "pdf_number_of_pages": 24, "/Title": "Certification Report “IDentity Card v3.1/BAC”", "/Author": "OCSI", "/Creator": "Microsoft® Word 2013", "/CreationDate": "D:20151006180910+02'00'", "/ModDate": "D:20151006180910+02'00'", "/Producer": "Microsoft® Word 2013", "pdf_hyperlinks": { "_type": "set", "_value": [] } }, "st_metadata": { "pdf_file_size_bytes": 485029, "pdf_is_encrypted": false, "pdf_number_of_pages": 89, "/Author": "ID&Trust", "/CreationDate": "D:20150908175156+02'00'", "/Creator": "PDF Architect", "/ModDate": "D:20151007083925+02'00'", "/Producer": "PDF Architect", "/Title": "Security Target “IDentity Card v3.1/BAC”", "pdf_hyperlinks": { "_type": "set", "_value": [] } }, "report_frontpage": {}, "report_keywords": { "cc_cert_id": { "NL": { "NSCIB-CC-13-37760-CR2": 1 }, "IT": { "OCSI/CERT/SYS/05/2015/RC": 24 } }, "cc_protection_profile_id": { "BSI": { "BSI-CC-PP-0055-2009": 3 } }, "cc_security_level": { "EAL": { "EAL5+": 2, "EAL4": 9, "EAL 2": 1, "EAL 4": 2, "EAL5": 3, "EAL5 augmented": 3, "EAL4 augmented": 1 } }, "cc_sar": { "ADV": { "ADV_ARC.1": 1, "ADV_FSP.4": 1, "ADV_IMP.1": 1, "ADV_TDS.3": 1 }, "AGD": { "AGD_OPE.1": 1, "AGD_PRE.1": 1 }, "ALC": { "ALC_FLR": 2, "ALC_DVS.2": 9, "ALC_CMC.4": 1, "ALC_CMS.4": 1, "ALC_DEL.1": 1, "ALC_LCD.1": 1, "ALC_TAT.1": 1 }, "ATE": { "ATE_COV.2": 1, "ATE_DPT.1": 1, "ATE_FUN.1": 1, "ATE_IND.2": 1, "ATE_COMP": 1 }, "AVA": { "AVA_VAN.5": 3, "AVA_VAN.3": 2, "AVA_COMP": 1 }, "ASE": { "ASE_TSS.2": 3, "ASE_CCL.1": 1, "ASE_ECD.1": 1, "ASE_INT.1": 1, "ASE_OBJ.2": 1, "ASE_REQ.2": 1, "ASE_SPD.1": 1, "ASE_TSS.1": 1 } }, "cc_sfr": { "FAU": { "FAU_SAS": 1 }, "FCS": { "FCS_RND": 1 }, "FMT": { "FMT_LIM": 1 } }, "cc_claims": { "O": { "O.J": 1 } }, "vendor": { "NXP": { "NXP": 4 } }, "eval_facility": { "BrightSight": { "Brightsight": 1 } }, "symmetric_crypto": {}, "asymmetric_crypto": {}, "pq_crypto": {}, "hash_function": {}, "crypto_scheme": {}, "crypto_protocol": {}, "randomness": {}, "cipher_mode": {}, "ecc_curve": {}, "crypto_engine": { "SmartMX": { "SmartMX": 1 } }, "tls_cipher_suite": {}, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": { "other": { "JIL": 1 } }, "technical_report_id": { "BSI": { "BSI TR-03105": 2 } }, "device_model": {}, "tee_name": {}, "os_name": { "JCOP": { "JCOP 2": 3 } }, "cplc_data": {}, "ic_data_group": {}, "standard_id": { "ISO": { "ISO/IEC 15408": 2 }, "ICAO": { "ICAO": 6 }, "CC": { "CCMB-2012-09-001": 1, "CCMB-2012-09-002": 1, "CCMB-2012-09-003": 1, "CCMB-2012-09-004": 1 } }, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": {} }, "st_keywords": { "cc_cert_id": { "DE": { "BSI-DSZ-CC-0858": 1, "BSI-DSZ-CC-0750": 1 }, "NL": { "NSCIB-CC-13-13-37760-CR": 1, "NSCIB-CC-13-37760": 2 } }, "cc_protection_profile_id": { "BSI": { "BSI-CC-PP-0055": 2, "BSI-PP-0002-2001": 1, "BSI-PP-0035-2007": 1, "BSI-CC-PP-0056": 1 } }, "cc_security_level": { "EAL": { "EAL4": 9, "EAL5": 1, "EAL 5+": 1, "EAL5+": 2, "EAL 4": 2, "EAL 5": 2, "EAL4 augmented": 3, "EAL5 augmented": 1 } }, "cc_sar": { "ADV": { "ADV_ARC.1": 2 }, "ALC": { "ALC_DVS.2": 8, "ALC_DVS": 1 }, "AVA": { "AVA_VAN.5": 2 }, "ASE": { "ASE_TSS.2": 2 } }, "cc_sfr": { "FAU": { "FAU_SAS": 8, "FAU_ARP.1": 2, "FAU_SAS.1": 12, "FAU_GEN": 1, "FAU_SAS.1.1": 2 }, "FCO": { "FCO_NRO": 1 }, "FCS": { "FCS_RND": 8, "FCS_CKM.1": 29, "FCS_CKM.2": 3, "FCS_CKM.3": 1, "FCS_CKM.4": 22, "FCS_COP.1": 10, "FCS_COP": 51, "FCS_RNG.1": 2, "FCS_RND.1": 17, "FCS_RNG": 2, "FCS_RND.1.1": 2, "FCS_CKM.1.1": 1, "FCS_CKM.4.1": 1, "FCS_CKM": 4 }, "FDP": { "FDP_ACC": 9, "FDP_ACF": 10, "FDP_IFC": 2, "FDP_IFF": 2, "FDP_RIP": 8, "FDP_ROL": 1, "FDP_SDI.2": 1, "FDP_ITC": 3, "FDP_ACC.2": 1, "FDP_UIT": 2, "FDP_ITC.1": 10, "FDP_ITC.2": 10, "FDP_ACC.1": 17, "FDP_ACF.1": 12, "FDP_ACC.1.1": 1, "FDP_ACF.1.1": 1, "FDP_ACF.1.2": 2, "FDP_ACF.1.3": 1, "FDP_ACF.1.4": 2, "FDP_UCT.1": 10, "FDP_UIT.1": 10, "FDP_IFC.1": 4, "FDP_UCT.1.1": 1, "FDP_UIT.1.1": 1, "FDP_UIT.1.2": 1, "FDP_UCT": 1 }, "FIA": { "FIA_ATD": 1, "FIA_UID": 4, "FIA_USB": 1, "FIA_AFL": 3, "FIA_SOS.2": 1, "FIA_UAU.5.2": 4, "FIA_UAU.4": 14, "FIA_UAU.6": 11, "FIA_UID.1": 11, "FIA_UID.1.1": 1, "FIA_UID.1.2": 1, "FIA_UAU.1": 9, "FIA_UAU.1.1": 1, "FIA_UAU.1.2": 1, "FIA_UAU.4.1": 1, "FIA_UAU.5": 9, "FIA_UAU.5.1": 1, "FIA_UAU.6.1": 1, "FIA_AFL.1": 7, "FIA_AFL.1.1": 1, "FIA_AFL.1.2": 1, "FIA_UAU": 10 }, "FMT": { "FMT_LIM": 9, "FMT_MSA": 16, "FMT_SMF.1": 22, "FMT_SMR.1": 22, "FMT_MTD": 33, "FMT_SMR": 5, "FMT_SMF": 5, "FMT_LIM.1": 22, "FMT_LIM.2": 19, "FMT_LIM.1.1": 3, "FMT_LIM.2.1": 4, "FMT_MSA.3": 3, "FMT_SMF.1.1": 1, "FMT_SMR.1.1": 1, "FMT_SMR.1.2": 1, "FMT_MTD.1": 6, "FMT_MSA.1": 1 }, "FPR": { "FPR_UNO.1": 1 }, "FPT": { "FPT_PHP.3": 14, "FPT_FLS.1": 11, "FPT_TDC.1": 1, "FPT_FLS": 6, "FPT_RCV": 1, "FPT_PHP": 3, "FPT_TST.1": 8, "FPT_FLS.1.1": 1, "FPT_TST": 3, "FPT_TST.1.1": 1, "FPT_TST.1.2": 1, "FPT_TST.1.3": 1, "FPT_PHP.3.1": 1, "FPT_RVM.1": 1, "FPT_SEP.1": 1 }, "FRU": { "FRU_FLT": 1 }, "FTP": { "FTP_ITC": 2, "FTP_ITC.1": 5, "FTP_TRP.1": 5 } }, "cc_claims": { "T": { "T.PHYSICAL": 3, "T.RND": 3, "T.CONFID-APPLI-DATA": 3, "T.INTEG-APPLI-DATA": 4, "T.RESOURCES": 3, "T.CONFID-JCS-CODE": 1, "T.CONFID-JCS-DATA": 1, "T.DELETION": 1, "T.EXE-CODE": 2, "T.EXE-CODE-REMOTE": 1, "T.INTEG-APPLI-CODE": 2, "T.INTEG-JCS-CODE": 1, "T.INTEG-JCS-DATA": 1, "T.NATIVE": 1, "T.OBJ-DELETION": 1, "T.SID": 2, "T.SEC_BOX_ORDER": 1, "T.OS_OPERATET": 1 }, "A": { "A.APPLET": 1, "A.VERIFICATION": 1, "A.USE_DIAG": 1, "A.USE_KEYS": 1, "A.PROCESS-": 1 }, "OT": { "OT.IDENTIFICATION": 1, "OT.OPERATE": 1, "OT.CIPHER": 1, "OT.NATIVE": 1, "OT.REMOTE": 1, "OT.OBJ-DELETION": 1, "OT.DELETION": 1, "OT.SEC_BOX_FW": 1, "OT.GLOBAL_ARRAYS_INTEG": 1, "OT.GLOBAL_ARRAYS_CONFID": 1, "OT.REALLOCATION": 1, "OT.RESOURCES": 1, "OT.ALARM": 1, "OT.MF_FW": 1, "OT.LOAD": 1, "OT.SCP": 2, "OT.INSTALL": 1, "OT.CARD-MANAGEMENT": 1, "OT.SCP-RECOVERY": 1, "OT.EXT-MEM": 1, "OT.TRANSACTION": 1, "OT.SID": 1, "OT.FIREWALL": 1, "OT.RND": 1, "OT.KEY-MNGT": 1, "OT.PIN-MNGT": 1, "OT.AC": 2 }, "OE": { "OE.USE_DIAG": 1, "OE.USE_KEYS": 1, "OE.PROCESS_SEC_IC": 1, "OE.APPLET": 1, "OE.VERIFICATION": 1, "OE.MRTD_": 2, "OE.MRTD": 2, "OE.BAC-": 1 }, "OSP": { "OSP.VERIFICATION": 1, "OSP.PROCESS-TOE": 1 } }, "vendor": { "NXP": { "NXP": 18 } }, "eval_facility": { "BrightSight": { "Brightsight": 1 } }, "symmetric_crypto": { "AES_competition": { "AES": { "AES": 5 } }, "DES": { "DES": { "DES": 5 }, "3DES": { "Triple-DES": 12 } } }, "asymmetric_crypto": { "ECC": { "ECDH": { "ECDH": 1 }, "ECDSA": { "ECDSA": 7 } }, "FF": { "DH": { "DH": 1 } } }, "pq_crypto": {}, "hash_function": { "SHA": { "SHA1": { "SHA-1": 6 }, "SHA2": { "SHA-256": 4, "SHA-384": 3, "SHA-512": 3, "SHA-224": 2 } } }, "crypto_scheme": { "MAC": { "MAC": 5 } }, "crypto_protocol": { "PACE": { "PACE": 4 } }, "randomness": { "RNG": { "RND": 5 } }, "cipher_mode": { "CBC": { "CBC": 1 } }, "ecc_curve": {}, "crypto_engine": { "SmartMX": { "SmartMX": 1 } }, "tls_cipher_suite": {}, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": { "SCA": { "physical probing": 3, "DPA": 2, "SPA": 1, "timing attacks": 1 }, "FI": { "physical tampering": 8, "Physical Tampering": 5, "Physical tampering": 1, "Malfunction": 8, "malfunction": 7, "fault injection": 1 }, "other": { "reverse engineering": 1 } }, "technical_report_id": { "BSI": { "BSI TR-3110": 1 } }, "device_model": {}, "tee_name": {}, "os_name": { "JCOP": { "JCOP 2": 8 } }, "cplc_data": {}, "ic_data_group": { "EF": { "EF.DG1": 28, "EF.DG2": 9, "EF.DG3": 9, "EF.DG4": 8, "EF.DG5": 7, "EF.DG16": 27, "EF.DG13": 3, "EF.DG14": 2, "EF.DG15": 1, "EF.COM": 8, "EF.SOD": 8 } }, "standard_id": { "FIPS": { "FIPS 180-2": 2, "FIPS 46-3": 2, "FIPS 197": 1 }, "PKCS": { "PKCS#1": 6 }, "BSI": { "AIS20": 3, "AIS 20": 1 }, "ISO": { "ISO/IEC 18013": 2, "ISO/IEC 7816-4": 3, "ISO/IEC 9796-2": 5 }, "ICAO": { "ICAO": 10 }, "CC": { "CCMB-2012-09-001": 2, "CCMB-2012-09-002": 2, "CCMB-2012-09-003": 2, "CCMB-2012-09-004": 2 } }, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": { "OutOfScope": { "out of scope": 2, "Out of scope": 76, "Platform functionality) No contradiction to this ST FDP_ACF.1/FIREWALL No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST FDP_IFF.1/JCVM No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST FMT_MSA.1/JCRE No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST FMT_MSA.2/FIREWALL_JCVM No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST FMT_MSA.3/JCVM No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST FMT_SMR.1 No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST FCS_CKM.3 No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST FDP_RIP.1/APDU No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST FDP_RIP.1/KEYS No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST FDP_ROL.1/FIREWALL No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST FPR_UNO.1 No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST FIA_ATD.1/AID No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST FIA_USB.1/AID No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST MT_MTD.3/JCRE No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST FMT_SMR.1/Installer No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST FPT_RCV.3/Installer No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST FDP_ACF.1/ADEL No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST FMT_MSA.1/ADEL No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST FMT_SMF.1/ADEL No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST FPT_FLS.1/ADEL No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST FDP_ACC.2.2/JCRMI No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST FDP_RIP.1/ODEL No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST FCO_NRO.2/CM No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST FDP_IFF.1/CM No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST FIA_UID.1/CM No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST FMT_MSA.3/CM No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST FTP_ITC.1/CM No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST FDP_ACF.1/EXT_MEM No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST FMT_MSA.3/EXT_MEM No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST FPT_FLS.1/SCP No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST FDP_ACF.1/SCP No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST FDP_ACC.1/LifeCycle No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST FMT_MSA.1/LifeCycle No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST FIA_AFL.1/PIN No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST FDP_ACF.1/SecureBox No Correspondence Out of scope (Platform functionality": 1, "Platform functionality) No contradiction to this ST FMT_MSA.1/SecureBox No Correspondence Out of scope (Platform functionality": 1, "on this way. Nevertheless, this ST addresses the Basic Access Control only. EAC with PACE is out of scope of this ST and is described in an another ST. 1.3.1 Non-TOE hardware/software/firmware 14 There is": 1, "• OT.EXT-MEM • OT.TRANSACTION • OT.SID • OT.FIREWALL cannot be mapped because these are out of scope. 114 The objectives for the operational environment can be mapped as follows: Table 6 Mapping of": 1, "mapped as follows: Platform SFR Corresponding TOE SFR Remarks FDP_ACC.2/FIREWALL No Correspondence Out of scope (Platform functionality) No contradiction to this ST FDP_ACF.1/FIREWALL No Correspondence Out of": 1, "Platform functionality) No contradiction to this ST FDP_IFC.1/JCVM No Correspondence Out of scope (Platform functionality) No contradiction to this ST FDP_IFF.1/JCVM No Correspondence Out of scope": 1, "functionality) No contradiction to this ST FDP_RIP.1/OBJECTS No Correspondence Out of scope (Platform functionality) No contradiction to this ST FMT_MSA.1/JCRE No Correspondence Out of scope": 1, "functionality) No contradiction to this ST FMT_MSA.1/JCVM No Correspondence Out of scope (Platform functionality) No contradiction to this ST FMT_MSA.2/FIREWALL_JCVM No Correspondence Out": 1, "scope (Platform functionality) No contradiction to this ST FMT_MSA.3/FIREWALL No Correspondence Out of scope (Platform functionality) No contradiction to this ST FMT_MSA.3/JCVM No Correspondence Out of scope": 1, "functionality) No contradiction to this ST FMT_SMF.1 No Correspondence Out of scope (Platform functionality) No contradiction to this ST FMT_SMR.1 No Correspondence Out of scope": 1, "of the Platform since they contain overlapping requirements. FCS_CKM.2 No Correspondence Out of scope (Platform functionality) No contradiction to this ST FCS_CKM.3 No Correspondence Out of scope": 1, "BAC Confidential Page 26 of 89 FCS_COP.1/AUTH, FCS_COP.1/MAC, FDP_RIP.1/ABORT No Correspondence Out of scope (Platform functionality) No contradiction to this ST FDP_RIP.1/APDU No Correspondence Out of scope": 1, "functionality) No contradiction to this ST FDP_RIP.1/bArray No Correspondence Out of scope (Platform functionality) No contradiction to this ST FDP_RIP.1/KEYS No Correspondence Out of scope": 1, "functionality) No contradiction to this ST FDP_RIP.1/TRANSIENT No Correspondence Out of scope (Platform functionality) No contradiction to this ST FDP_ROL.1/FIREWALL No Correspondence Out of": 1, "corresponds to the FPT_PHP.3 of this ST about physical resistance. FDP_SDI.2 No Correspondence Out of scope (Platform functionality) No contradiction to this ST FPR_UNO.1 No Correspondence Out of scope": 1, "1 FPT_FLS.1 FPT_FLS.1 matches to the equivalent SFR of the Platform-ST. FPT_TDC.1 No Correspondence Out of scope (Platform functionality) No contradiction to this ST FIA_ATD.1/AID No Correspondence Out of scope": 1, "functionality) No contradiction to this ST FIA_UID.2/AID No Correspondence Out of scope (Platform functionality) No contradiction to this ST FIA_USB.1/AID No Correspondence Out of scope": 1, "functionality) No contradiction to this ST FMT_MTD.1/JCRE No Correspondence Out of scope (Platform functionality) No contradiction to this ST MT_MTD.3/JCRE No Correspondence Out of scope": 1, "functionality) No contradiction to this ST FDP_ITC.2/Installer No Correspondence Out of scope (Platform functionality) No contradiction to this ST FMT_SMR.1/Installer No Correspondence Out of": 1, "Platform functionality) No contradiction to this ST FPT_FLS.1/Installer No Correspondence Out of scope (Platform functionality) No contradiction to this ST FPT_RCV.3/Installer No Correspondence Out of": 1, "BAC Confidential Page 27 of 89 No contradiction to this ST FDP_ACC.2/ADEL No Correspondence Out of scope (Platform functionality) No contradiction to this ST FDP_ACF.1/ADEL No Correspondence Out of scope": 1, "functionality) No contradiction to this ST FDP_RIP.1/ADEL No Correspondence Out of scope (Platform functionality) No contradiction to this ST FMT_MSA.1/ADEL No Correspondence Out of scope": 1, "functionality) No contradiction to this ST FMT_MSA.3/ADEL No Correspondence Out of scope (Platform functionality) No contradiction to this ST FMT_SMF.1/ADEL No Correspondence Out of scope": 1, "functionality) No contradiction to this ST FMT_SMR.1/ADEL No Correspondence Out of scope (Platform functionality) No contradiction to this ST FPT_FLS.1/ADEL No Correspondence Out of scope": 1, "functionality) No contradiction to this ST FDP_ACC.2/JCRMI No Correspondence Out of scope (Platform functionality) No contradiction to this ST FDP_ACC.2.2/JCRMI No Correspondence Out of": 1, "Platform functionality) No contradiction to this ST FDP_ACF.1/JCRMI No Correspondence Out of scope (Platform functionality) No contradiction to this ST FDP_RIP.1/ODEL No Correspondence Out of scope": 1, "functionality) No contradiction to this ST FPT_FLS.1/ODEL No Correspondence Out of scope (Platform functionality) No contradiction to this ST FCO_NRO.2/CM No Correspondence Out of scope": 1, "functionality) No contradiction to this ST FDP_IFC.2/CM No Correspondence Out of scope (Platform functionality) No contradiction to this ST FDP_IFF.1/CM No Correspondence Out of scope": 1, "functionality) No contradiction to this ST FDP_UIT.1/CM No Correspondence Out of scope (Platform functionality) No contradiction to this ST FIA_UID.1/CM No Correspondence Out of scope": 1, "functionality) No contradiction to this ST FMT_MSA.1/CM No Correspondence Out of scope (Platform functionality) No contradiction to this ST FMT_MSA.3/CM No Correspondence Out of scope": 1, "functionality) No contradiction to this ST FMT_SMF.1/CM No Correspondence Out of scope (Platform functionality) Security Target ID&Trust IDentity-eMRTD BAC Confidential Page 28 of 89 No": 1, "to this ST FMT_SMR.1/CM No Correspondence Out of scope (Platform functionality) No contradiction to this ST FTP_ITC.1/CM No Correspondence Out of scope": 1, "functionality) No contradiction to this ST FDP_ACC.1/EXT_MEM No Correspondence Out of scope (Platform functionality) No contradiction to this ST FDP_ACF.1/EXT_MEM No Correspondence Out of": 1, "Platform functionality) No contradiction to this ST FMT_MSA.1/EXT_MEM No Correspondence Out of scope (Platform functionality) No contradiction to this ST FMT_MSA.3/EXT_MEM No Correspondence Out of": 1, "Platform functionality) No contradiction to this ST FMT_SMF.1/EXT_MEM No Correspondence Out of scope (Platform functionality) No contradiction to this ST FPT_FLS.1/SCP No Correspondence Out of scope": 1, "functionality) No contradiction to this ST FRU_FLT.2/SCP No Correspondence Out of scope (Platform functionality) No contradiction to this ST FPT_PHP.3/SCP FPT_PHP.3 The FPT_PHP.3 of this": 1, "matches the FPT_PHP.3/SCP of the Platform ST. FDP_ACC.1/SCP No Correspondence Out of scope (Platform functionality) No contradiction to this ST FDP_ACF.1/SCP No Correspondence Out of scope": 1, "functionality) No contradiction to this ST FMT_MSA.3/SCP No Correspondence Out of scope (Platform functionality) No contradiction to this ST FDP_ACC.1/LifeCycle No Correspondence Out of": 1, "Platform functionality) No contradiction to this ST FDP_ACF.1/LifeCycle No Correspondence Out of scope (Platform functionality) No contradiction to this ST FMT_MSA.1/LifeCycle No Correspondence Out of": 1, "Platform functionality) No contradiction to this ST FMT_MSA.3/LifeCycle No Correspondence Out of scope (Platform functionality) No contradiction to this ST FIA_AFL.1/PIN No Correspondence Out of scope": 1, "functionality) No contradiction to this ST FTP_ITC.1/LifeCycle No Correspondence Out of scope (Platform functionality) No contradiction to this ST FAU_SAS.1/SCP FAU_SAS.1 FAU_SAS.1 of this ST": 1, "1 FPT_EMSEC.1 matches the FPT_EMSEC.1 of the Platform-ST FDP_ACC.2/SecureBox No Correspondence Out of scope (Platform functionality) No contradiction to this ST FDP_ACF.1/SecureBox No Correspondence Out of": 1, "Platform functionality) No contradiction to this ST FMT_MSA.3/SecureBox No Correspondence Out of scope (Platform functionality) No contradiction to this ST FMT_MSA.1/SecureBox No Correspondence Out of": 1, "Platform functionality) No contradiction to this ST FMT_SMF.1/SecureBox No Correspondence Out of scope (Platform functionality) No contradiction to this ST Table 7 Mapping of Security requirements 2.5.6": 1 } } }, "report_filename": "cr_idcard_bac_v1.0_en.pdf", "st_filename": "st_idcard_bac_v0.11.pdf" } }, "heuristics": { "__update__": { "cert_id": "OCSI/CERT/SYS/05/2015/RC", "report_references": { "__update__": { "directly_referenced_by": { "_type": "set", "_value": [ "OCSI/CERT/SYS/03/2016/RC" ] }, "indirectly_referenced_by": { "_type": "set", "_value": [ "OCSI/CERT/SYS/03/2016/RC", "OCSI/CERT/CCL/05/2021/RC", "OCSI/CERT/SYS/05/2016/RC" ] }, "directly_referencing": { "_type": "set", "_value": [ "NSCIB-CC-13-37760-CR2" ] }, "indirectly_referencing": { "_type": "set", "_value": [ "BSI-DSZ-CC-0858-2013", "BSI-DSZ-CC-0645-2010", "BSI-DSZ-CC-0707-2012", "BSI-DSZ-CC-0750-V2-2014", "NSCIB-CC-13-37760-CR2", "NSCIB-CC-13-37762-CR" ] } } }, "extracted_sars": { "__add__": { "_type": "set", "_value": [ { "_type": "sec_certs.sample.sar.SAR", "family": "ATE_IND", "level": 2 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ATE_COV", "level": 2 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_OBJ", "level": 2 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_CMC", "level": 4 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ATE_DPT", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_DEL", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AGD_OPE", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ADV_FSP", "level": 4 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_TSS", "level": 2 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ATE_FUN", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_LCD", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_REQ", "level": 2 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_INT", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_CMS", "level": 4 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_CCL", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_SPD", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_TAT", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ADV_ARC", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AGD_PRE", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ADV_TDS", "level": 3 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AVA_VAN", "level": 5 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_ECD", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ADV_IMP", "level": 1 } ] } } } } } } }, { "_id": { "$oid": "673f6585a1452c910a80c83d" }, "run_id": { "$oid": "673f6538a1452c910a80b5ad" }, "dgst": "6ca52f5450bedb2f", "timestamp": { "$date": "2024-11-21T11:03:40.77Z" }, "type": "change", "diff": { "__update__": { "heuristics": { "__insert__": { "prev_certificates": [], "next_certificates": [] } } } } }, { "_id": { "$oid": "67a4087c6161883953270d69" }, "run_id": { "$oid": "67a4080e616188395327018d" }, "dgst": "6ca52f5450bedb2f", "timestamp": { "$date": "2025-02-05T18:04:55.043Z" }, "type": "change", "diff": { "__insert__": { "protection_profile_links": { "_type": "set", "_value": [ "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0055b.pdf" ] } }, "__update__": { "state": { "__update__": { "report": { "__update__": { "_type": "sec_certs.sample.document_state.DocumentState" } }, "st": { "__update__": { "_type": "sec_certs.sample.document_state.DocumentState" } }, "cert": { "__update__": { "_type": "sec_certs.sample.document_state.DocumentState" } } } }, "heuristics": { "__insert__": { "protection_profiles": { "_type": "set", "_value": [ "60455fc9564e2545" ] }, "eal": "EAL4+" }, "__update__": { "prev_certificates": null, "next_certificates": null } } }, "__delete__": [ "protection_profiles" ] } }, { "_id": { "$oid": "669f80cd566b7c5a1805872a" }, "run_id": { "$oid": "669f8076566b7c5a1805773d" }, "dgst": "7bba408b3c99fd76", "timestamp": { "$date": "2024-07-23T00:09:57.927Z" }, "type": "new", "diff": { "_type": "sec_certs.sample.cc.CCCertificate", "dgst": "7bba408b3c99fd76", "status": "archived", "category": "Boundary Protection Devices and Systems", "name": "Watchguard LiveSecurity System w/Firebox II", "manufacturer": "WatchGuard Technologies, Inc.", "scheme": "US", "security_level": { "_type": "set", "_value": [ "EAL2" ] }, "not_valid_before": { "_type": "date", "_value": "2000-08-01" }, "not_valid_after": { "_type": "date", "_value": "2016-04-05" }, "report_link": "https://www.commoncriteriaportal.org/files/epfiles/TTAP-FER-0015.pdf", "st_link": "https://www.commoncriteriaportal.org/files/epfiles/TTAP-ST-0015.pdf", "cert_link": null, "manufacturer_web": "https://www.watchguard.com", "protection_profiles": { "_type": "set", "_value": [] }, "maintenance_updates": { "_type": "set", "_value": [] }, "state": { "_type": "sec_certs.sample.cc.CCCertificate.InternalState", "report": { "_type": "sec_certs.sample.cc.CCCertificate.DocumentState", "download_ok": true, "convert_garbage": false, "convert_ok": true, "extract_ok": true, "pdf_hash": "a6c878382223c0d3f707da7b8fed3f5a86bcd2c45c5141c991a03c7219454552", "txt_hash": "169e05f0c2a2a902ae6ac8b34ad058f18a95c7ac48a185503127e797ee8506d2" }, "st": { "_type": "sec_certs.sample.cc.CCCertificate.DocumentState", "download_ok": true, "convert_garbage": false, "convert_ok": true, "extract_ok": true, "pdf_hash": "90f8571cb4ca3b572e28f702a5d81fe720f41fe9c354ef8da9d3de5b7cfba527", "txt_hash": "cc31bfbb6e43ab9dbb149fb09e378648293eaf45cecf834f3565c9fd63a10221" }, "cert": { "_type": "sec_certs.sample.cc.CCCertificate.DocumentState", "download_ok": false, "convert_garbage": false, "convert_ok": false, "extract_ok": false, "pdf_hash": null, "txt_hash": null } }, "pdf_data": { "_type": "sec_certs.sample.cc.CCCertificate.PdfData", "report_metadata": { "pdf_file_size_bytes": 275858, "pdf_is_encrypted": false, "pdf_number_of_pages": 39, "/CreationDate": "D:20000901100948", "/Producer": "GNU Ghostscript 5.50", "pdf_hyperlinks": { "_type": "set", "_value": [] } }, "st_metadata": { "pdf_file_size_bytes": 237056, "pdf_is_encrypted": false, "pdf_number_of_pages": 54, "/Creator": "Microsoft Word ", "/CreationDate": "Tuesday, September 05, 2000 10:04:51 AM", "/Title": "WG_ST_Final_final.PDF", "/Author": "Unknown", "/Producer": "Acrobat PDFWriter 3.02 for Windows", "/Keywords": "", "/Subject": "", "pdf_hyperlinks": { "_type": "set", "_value": [] } }, "cert_metadata": null, "report_frontpage": { "US": {} }, "st_frontpage": null, "cert_frontpage": null, "report_keywords": { "cc_cert_id": {}, "cc_protection_profile_id": {}, "cc_security_level": { "EAL": { "EAL 2": 11, "EAL 1": 1, "EAL 4": 1, "EAL4": 1 } }, "cc_sar": { "ACM": { "ACM_CAP.2": 6 }, "ADO": { "ADO_DEL.1": 6, "ADO_IGS.1": 6 }, "ADV": { "ADV_FSP.1": 7, "ADV_HLD.1": 7, "ADV_RCR.1": 6, "ADV_FSP": 2 }, "AGD": { "AGD_ADM.1": 6, "AGD_USR.1": 5 }, "ATE": { "ATE_COV.1": 7, "ATE_FUN.1": 5, "ATE_IND.2": 10, "ATE_IND": 2, "ATE_IND.1": 1, "ATE_FUN": 1 }, "AVA": { "AVA_SOF.1": 8, "AVA_VLA.1": 7, "AVA_VLA": 1 }, "AMA": { "AMA_AMP.1": 1 }, "ASE": { "ASE_DES.1": 5, "ASE_ENV.1": 6, "ASE_INT": 2, "ASE_OBJ.1": 6, "ASE_PPC.1": 6, "ASE_REQ.1": 6, "ASE_SRE.1": 6, "ASE_TSS.1": 6, "ASE_INT.1": 5, "ASE_REQ": 1 } }, "cc_sfr": { "FIA": { "FIA_UAU.1": 1 } }, "cc_claims": {}, "vendor": {}, "eval_facility": {}, "symmetric_crypto": {}, "asymmetric_crypto": {}, "pq_crypto": {}, "hash_function": {}, "crypto_scheme": {}, "crypto_protocol": {}, "randomness": {}, "cipher_mode": {}, "ecc_curve": {}, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": {}, "technical_report_id": {}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": {}, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": {} }, "st_keywords": { "cc_cert_id": {}, "cc_protection_profile_id": {}, "cc_security_level": { "EAL": { "EAL 2": 10 } }, "cc_sar": { "ACM": { "ACM_CAP.2": 14 }, "ADO": { "ADO_DEL.1": 8, "ADO_IGS.1": 8 }, "ADV": { "ADV_FSP.1": 18, "ADV_RCR.1": 8, "ADV_HLD.1": 14 }, "AGD": { "AGD_ADM.1": 16, "AGD_USR.1": 14, "AGD_ADM": 1 }, "ATE": { "ATE_COV.1": 7, "ATE_FUN.1": 13, "ATE_IND.2": 10, "ATE_HLD.1": 1 }, "AVA": { "AVA_SOF.1": 9, "AVA_VLA.1": 9 } }, "cc_sfr": { "FAU": { "FAU_GEN.1": 9, "FAU_SAR.1": 12, "FAU_SAA.1": 7, "FAU_GEN.1.1": 1, "FAU_GEN.1.2": 1, "FAU_SAR.1.1": 1, "FAU_SAR.1.2": 1, "FAU_SAR.3": 12, "FAU_SAR.3.1": 2, "FAU_SAA.1.1": 1, "FAU_SAA.1.2": 1, "FAU_ARP.1": 8, "FAU_ARP.1.1": 1 }, "FDP": { "FDP_IFC.1": 22, "FDP_IFF.1": 27, "FDP_RIP.1": 6, "FDP_IFC.1.1": 2, "FDP_IFF.1.1": 6, "FDP_IFF.1.2": 2, "FDP_IFF.1.3": 2, "FDP_IFF.1.4": 2, "FDP_IFF.1.5": 2, "FDP_IFF.1.6": 2, "FDP_RIP.1.1": 1 }, "FIA": { "FIA_UAU.1": 8, "FIA_UID.1": 2, "FIA_UID.2": 8, "FIA_UAU.1.1": 1, "FIA_UAU.1.2": 1, "FIA_UID.2.1": 1 }, "FMT": { "FMT_STM.1": 1, "FMT_MSA.3": 12, "FMT_MOF.1": 6, "FMT_SMR.1": 17, "FMT_MSA.1": 26, "FMT_MOF.1.1": 1, "FMT_MSA.1.1": 4, "FMT_MSA.3.1": 2, "FMT_MSA.3.2": 2, "FMT_MTD.1": 21, "FMT_MTD.1.1": 4, "FMT_SMR.1.1": 1, "FMT_SMR.1.2": 1, "FMT_MSA.2": 2 }, "FPR": { "FPR_PSE.1": 14, "FPR_PSE.1.1": 2, "FPR_PSE.1.2": 2, "FPR_PSE.1.3": 2 }, "FPT": { "FPT_ITT.1": 6, "FPT_RVM.1": 6, "FPT_SEP.1": 7, "FPT_STM.1": 8, "FPT_STM.1.1": 2, "FPT_ITT.1.1": 1, "FPT_RVM.1.1": 1, "FPT_SEP.1.1": 1, "FPT_SEP.1.2": 1, "FPT_RVM": 1 } }, "cc_claims": { "O": { "O.IDAUTH": 5, "O.IDENTIFY": 4, "O.MEDTF": 9, "O.MEDAPPL": 8, "O.INFPRO": 4, "O.SELPRO": 6, "O.AUDIT": 12, "O.ADMIN": 8, "O.PRIVACY": 6, "O.REVIEW": 1 }, "T": { "T.NOAUTH": 5, "T.ASPOOF": 3, "T.MEDTF": 2, "T.MEDAPPL": 3, "T.OLDINF": 3, "T.AUDACC": 3, "T.NODETECT": 2, "T.SELPRO": 3, "T.PRIVACY": 3, "T.USAGE": 4 }, "A": { "A.LOWEXP": 3, "A.NOEVIL": 3, "A.ONEWAY": 3, "A.NOREM": 3, "A.GENPUR": 3, "A.DIRECT": 3, "A.PHYSEC": 3 }, "OE": { "OE.LOWEXP": 2, "OE.NOEVIL": 2, "OE.ONEWAY": 2, "OE.NOREM": 2, "OE.GENPUR": 2, "OE.DIRECT": 2, "OE.PHYSEC": 2, "OE.GUIDANCE": 3, "OE.ADMTRA": 2 } }, "vendor": { "Microsoft": { "Microsoft": 1 } }, "eval_facility": {}, "symmetric_crypto": { "DES": { "DES": { "DES": 1 } } }, "asymmetric_crypto": {}, "pq_crypto": {}, "hash_function": {}, "crypto_scheme": {}, "crypto_protocol": {}, "randomness": {}, "cipher_mode": {}, "ecc_curve": {}, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": {}, "technical_report_id": {}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": {}, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": {} }, "cert_keywords": null, "report_filename": "TTAP-FER-0015.pdf", "st_filename": "TTAP-ST-0015.pdf", "cert_filename": null }, "heuristics": { "_type": "sec_certs.sample.cc.CCCertificate.Heuristics", "extracted_versions": { "_type": "set", "_value": [ "-" ] }, "cpe_matches": null, "verified_cpe_matches": null, "related_cves": null, "cert_lab": null, "cert_id": null, "st_references": { "_type": "sec_certs.sample.certificate.References", "directly_referenced_by": null, "indirectly_referenced_by": null, "directly_referencing": null, "indirectly_referencing": null }, "report_references": { "_type": "sec_certs.sample.certificate.References", "directly_referenced_by": null, "indirectly_referenced_by": null, "directly_referencing": null, "indirectly_referencing": null }, "annotated_references": null, "extracted_sars": { "_type": "set", "_value": [ { "_type": "sec_certs.sample.sar.SAR", "family": "ADV_RCR", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_DES", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ADV_HLD", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ADV_FSP", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ATE_IND", "level": 2 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ATE_HLD", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_SRE", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AGD_USR", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AGD_ADM", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_TSS", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AVA_VLA", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ATE_COV", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_OBJ", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AVA_SOF", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_INT", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_ENV", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_PPC", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ATE_FUN", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_REQ", "level": 1 } ] }, "direct_transitive_cves": null, "indirect_transitive_cves": null, "scheme_data": null }, "_id": "7bba408b3c99fd76" } }, { "_id": { "$oid": "66ba44469466f606341745fe" }, "run_id": { "$oid": "66ba432a9466f606341743a8" }, "dgst": "7bba408b3c99fd76", "timestamp": { "$date": "2024-08-12T12:00:07.61Z" }, "type": "change", "diff": { "__update__": { "state": { "__update__": { "st": { "__update__": { "download_ok": false, "convert_ok": false, "extract_ok": false, "pdf_hash": null, "txt_hash": null } } } }, "pdf_data": { "__update__": { "st_metadata": null, "st_keywords": null, "st_filename": null } }, "heuristics": { "__update__": { "extracted_sars": { "__discard__": { "_type": "set", "_value": [ { "_type": "sec_certs.sample.sar.SAR", "family": "ATE_HLD", "level": 1 } ] } } } } } } }, { "_id": { "$oid": "66c0a10b1c78507fd105ffe4" }, "run_id": { "$oid": "66c0a0e21c78507fd105fc06" }, "dgst": "7bba408b3c99fd76", "timestamp": { "$date": "2024-08-17T12:52:18.171Z" }, "type": "change", "diff": { "__update__": { "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/TTAP-FER-0015.pdf", "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/TTAP-ST-0015.pdf", "state": { "__update__": { "report": { "__update__": { "download_ok": false, "convert_ok": false, "extract_ok": false, "pdf_hash": null, "txt_hash": null } } } }, "pdf_data": { "__update__": { "report_metadata": null, "report_frontpage": null, "report_keywords": null, "report_filename": null } }, "heuristics": { "__update__": { "extracted_sars": null } } } } }, { "_id": { "$oid": "66c7affd2ff8c812f518bd4d" }, "run_id": { "$oid": "66c7afc82ff8c812f518b966" }, "dgst": "7bba408b3c99fd76", "timestamp": { "$date": "2024-08-22T18:04:48.021Z" }, "type": "change", "diff": { "__update__": { "state": { "__update__": { "report": { "__update__": { "download_ok": true, "convert_ok": true, "extract_ok": true, "pdf_hash": "a6c878382223c0d3f707da7b8fed3f5a86bcd2c45c5141c991a03c7219454552", "txt_hash": "169e05f0c2a2a902ae6ac8b34ad058f18a95c7ac48a185503127e797ee8506d2" } }, "st": { "__update__": { "download_ok": true, "convert_ok": true, "extract_ok": true, "pdf_hash": "90f8571cb4ca3b572e28f702a5d81fe720f41fe9c354ef8da9d3de5b7cfba527", "txt_hash": "cc31bfbb6e43ab9dbb149fb09e378648293eaf45cecf834f3565c9fd63a10221" } } } }, "pdf_data": { "__update__": { "report_metadata": { "pdf_file_size_bytes": 275858, "pdf_is_encrypted": false, "pdf_number_of_pages": 39, "/CreationDate": "D:20000901100948", "/Producer": "GNU Ghostscript 5.50", "pdf_hyperlinks": { "_type": "set", "_value": [] } }, "st_metadata": { "pdf_file_size_bytes": 237056, "pdf_is_encrypted": false, "pdf_number_of_pages": 54, "/Creator": "Microsoft Word ", "/CreationDate": "Tuesday, September 05, 2000 10:04:51 AM", "/Title": "WG_ST_Final_final.PDF", "/Author": "Unknown", "/Producer": "Acrobat PDFWriter 3.02 for Windows", "/Keywords": "", "/Subject": "", "pdf_hyperlinks": { "_type": "set", "_value": [] } }, "report_frontpage": { "US": {} }, "report_keywords": { "cc_cert_id": {}, "cc_protection_profile_id": {}, "cc_security_level": { "EAL": { "EAL 2": 11, "EAL 1": 1, "EAL 4": 1, "EAL4": 1 } }, "cc_sar": { "ACM": { "ACM_CAP.2": 6 }, "ADO": { "ADO_DEL.1": 6, "ADO_IGS.1": 6 }, "ADV": { "ADV_FSP.1": 7, "ADV_HLD.1": 7, "ADV_RCR.1": 6, "ADV_FSP": 2 }, "AGD": { "AGD_ADM.1": 6, "AGD_USR.1": 5 }, "ATE": { "ATE_COV.1": 7, "ATE_FUN.1": 5, "ATE_IND.2": 10, "ATE_IND": 2, "ATE_IND.1": 1, "ATE_FUN": 1 }, "AVA": { "AVA_SOF.1": 8, "AVA_VLA.1": 7, "AVA_VLA": 1 }, "AMA": { "AMA_AMP.1": 1 }, "ASE": { "ASE_DES.1": 5, "ASE_ENV.1": 6, "ASE_INT": 2, "ASE_OBJ.1": 6, "ASE_PPC.1": 6, "ASE_REQ.1": 6, "ASE_SRE.1": 6, "ASE_TSS.1": 6, "ASE_INT.1": 5, "ASE_REQ": 1 } }, "cc_sfr": { "FIA": { "FIA_UAU.1": 1 } }, "cc_claims": {}, "vendor": {}, "eval_facility": {}, "symmetric_crypto": {}, "asymmetric_crypto": {}, "pq_crypto": {}, "hash_function": {}, "crypto_scheme": {}, "crypto_protocol": {}, "randomness": {}, "cipher_mode": {}, "ecc_curve": {}, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": {}, "technical_report_id": {}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": {}, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": {} }, "st_keywords": { "cc_cert_id": {}, "cc_protection_profile_id": {}, "cc_security_level": { "EAL": { "EAL 2": 10 } }, "cc_sar": { "ACM": { "ACM_CAP.2": 14 }, "ADO": { "ADO_DEL.1": 8, "ADO_IGS.1": 8 }, "ADV": { "ADV_FSP.1": 18, "ADV_RCR.1": 8, "ADV_HLD.1": 14 }, "AGD": { "AGD_ADM.1": 16, "AGD_USR.1": 14, "AGD_ADM": 1 }, "ATE": { "ATE_COV.1": 7, "ATE_FUN.1": 13, "ATE_IND.2": 10, "ATE_HLD.1": 1 }, "AVA": { "AVA_SOF.1": 9, "AVA_VLA.1": 9 } }, "cc_sfr": { "FAU": { "FAU_GEN.1": 9, "FAU_SAR.1": 12, "FAU_SAA.1": 7, "FAU_GEN.1.1": 1, "FAU_GEN.1.2": 1, "FAU_SAR.1.1": 1, "FAU_SAR.1.2": 1, "FAU_SAR.3": 12, "FAU_SAR.3.1": 2, "FAU_SAA.1.1": 1, "FAU_SAA.1.2": 1, "FAU_ARP.1": 8, "FAU_ARP.1.1": 1 }, "FDP": { "FDP_IFC.1": 22, "FDP_IFF.1": 27, "FDP_RIP.1": 6, "FDP_IFC.1.1": 2, "FDP_IFF.1.1": 6, "FDP_IFF.1.2": 2, "FDP_IFF.1.3": 2, "FDP_IFF.1.4": 2, "FDP_IFF.1.5": 2, "FDP_IFF.1.6": 2, "FDP_RIP.1.1": 1 }, "FIA": { "FIA_UAU.1": 8, "FIA_UID.1": 2, "FIA_UID.2": 8, "FIA_UAU.1.1": 1, "FIA_UAU.1.2": 1, "FIA_UID.2.1": 1 }, "FMT": { "FMT_STM.1": 1, "FMT_MSA.3": 12, "FMT_MOF.1": 6, "FMT_SMR.1": 17, "FMT_MSA.1": 26, "FMT_MOF.1.1": 1, "FMT_MSA.1.1": 4, "FMT_MSA.3.1": 2, "FMT_MSA.3.2": 2, "FMT_MTD.1": 21, "FMT_MTD.1.1": 4, "FMT_SMR.1.1": 1, "FMT_SMR.1.2": 1, "FMT_MSA.2": 2 }, "FPR": { "FPR_PSE.1": 14, "FPR_PSE.1.1": 2, "FPR_PSE.1.2": 2, "FPR_PSE.1.3": 2 }, "FPT": { "FPT_ITT.1": 6, "FPT_RVM.1": 6, "FPT_SEP.1": 7, "FPT_STM.1": 8, "FPT_STM.1.1": 2, "FPT_ITT.1.1": 1, "FPT_RVM.1.1": 1, "FPT_SEP.1.1": 1, "FPT_SEP.1.2": 1, "FPT_RVM": 1 } }, "cc_claims": { "O": { "O.IDAUTH": 5, "O.IDENTIFY": 4, "O.MEDTF": 9, "O.MEDAPPL": 8, "O.INFPRO": 4, "O.SELPRO": 6, "O.AUDIT": 12, "O.ADMIN": 8, "O.PRIVACY": 6, "O.REVIEW": 1 }, "T": { "T.NOAUTH": 5, "T.ASPOOF": 3, "T.MEDTF": 2, "T.MEDAPPL": 3, "T.OLDINF": 3, "T.AUDACC": 3, "T.NODETECT": 2, "T.SELPRO": 3, "T.PRIVACY": 3, "T.USAGE": 4 }, "A": { "A.LOWEXP": 3, "A.NOEVIL": 3, "A.ONEWAY": 3, "A.NOREM": 3, "A.GENPUR": 3, "A.DIRECT": 3, "A.PHYSEC": 3 }, "OE": { "OE.LOWEXP": 2, "OE.NOEVIL": 2, "OE.ONEWAY": 2, "OE.NOREM": 2, "OE.GENPUR": 2, "OE.DIRECT": 2, "OE.PHYSEC": 2, "OE.GUIDANCE": 3, "OE.ADMTRA": 2 } }, "vendor": { "Microsoft": { "Microsoft": 1 } }, "eval_facility": {}, "symmetric_crypto": { "DES": { "DES": { "DES": 1 } } }, "asymmetric_crypto": {}, "pq_crypto": {}, "hash_function": {}, "crypto_scheme": {}, "crypto_protocol": {}, "randomness": {}, "cipher_mode": {}, "ecc_curve": {}, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": {}, "technical_report_id": {}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": {}, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": {} }, "report_filename": "TTAP-FER-0015.pdf", "st_filename": "TTAP-ST-0015.pdf" } }, "heuristics": { "__update__": { "extracted_sars": { "_type": "set", "_value": [ { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_ENV", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ADV_FSP", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_SRE", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_REQ", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_TSS", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ATE_FUN", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_PPC", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_OBJ", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AVA_SOF", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AGD_ADM", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ATE_COV", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_DES", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ATE_IND", "level": 2 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AGD_USR", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AVA_VLA", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ATE_HLD", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_INT", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ADV_RCR", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ADV_HLD", "level": 1 } ] } } } } } }, { "_id": { "$oid": "673f6585a1452c910a80c506" }, "run_id": { "$oid": "673f6538a1452c910a80b5ad" }, "dgst": "7bba408b3c99fd76", "timestamp": { "$date": "2024-11-21T11:03:40.77Z" }, "type": "change", "diff": { "__update__": { "heuristics": { "__insert__": { "prev_certificates": [], "next_certificates": [] } } } } }, { "_id": { "$oid": "67a4087c6161883953271820" }, "run_id": { "$oid": "67a4080e616188395327018d" }, "dgst": "7bba408b3c99fd76", "timestamp": { "$date": "2025-02-05T18:04:55.043Z" }, "type": "change", "diff": { "__insert__": { "protection_profile_links": { "_type": "set", "_value": [] } }, "__update__": { "state": { "__update__": { "report": { "__update__": { "_type": "sec_certs.sample.document_state.DocumentState" } }, "st": { "__update__": { "_type": "sec_certs.sample.document_state.DocumentState" } }, "cert": { "__update__": { "_type": "sec_certs.sample.document_state.DocumentState" } } } }, "heuristics": { "__insert__": { "protection_profiles": null, "eal": "EAL2" }, "__update__": { "prev_certificates": null, "next_certificates": null } } }, "__delete__": [ "protection_profiles" ] } }, { "_id": { "$oid": "669f80cd566b7c5a180588e7" }, "run_id": { "$oid": "669f8076566b7c5a1805773d" }, "dgst": "90969e38fd9b581f", "timestamp": { "$date": "2024-07-23T00:09:57.927Z" }, "type": "new", "diff": { "_type": "sec_certs.sample.cc.CCCertificate", "dgst": "90969e38fd9b581f", "status": "active", "category": "Network and Network-Related Devices and Systems", "name": "AhnLab MDS, MDS with MTA, and MDS Manager v2.1", "manufacturer": "AhnLab, Inc.", "scheme": "CA", "security_level": { "_type": "set", "_value": [] }, "not_valid_before": { "_type": "date", "_value": "2019-10-29" }, "not_valid_after": { "_type": "date", "_value": "2024-10-29" }, "report_link": "https://www.commoncriteriaportal.org/files/epfiles/383-4-481%20CR%20v1.0.pdf", "st_link": "https://www.commoncriteriaportal.org/files/epfiles/383-4-481%20AhnLab%20MDS%20Security%20Target_1.4.pdf", "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-481%20CT%20no%20sig%20Eng.pdf", "manufacturer_web": "https://www.ahnlab.com/", "protection_profiles": { "_type": "set", "_value": [ { "_type": "sec_certs.sample.protection_profile.ProtectionProfile", "pp_name": "collaborative Protection Profile for Network Devices v2.1", "pp_eal": null, "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.1.pdf", "pp_ids": null } ] }, "maintenance_updates": { "_type": "set", "_value": [ { "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport", "maintenance_date": { "_type": "date", "_value": "2021-02-24" }, "maintenance_title": "Common Criteria Maintenance Report AhnLab MDS, MDS with MTA, and MDS Manager v2.1", "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/481%20LSS%20MR.pdf", "maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/AhnLab%20MDS%20Security%20Target_1.5.pdf" } ] }, "state": { "_type": "sec_certs.sample.cc.CCCertificate.InternalState", "report": { "_type": "sec_certs.sample.cc.CCCertificate.DocumentState", "download_ok": true, "convert_garbage": false, "convert_ok": true, "extract_ok": true, "pdf_hash": "7f1504235e6203001d8a76829161dad2290439c3c12894114ea7f7c9af2e598b", "txt_hash": "b72deb54b7d3a3c7d4e27a30d2b21b02943bd661fb0f55dbcf3cc559d5122f55" }, "st": { "_type": "sec_certs.sample.cc.CCCertificate.DocumentState", "download_ok": true, "convert_garbage": false, "convert_ok": true, "extract_ok": true, "pdf_hash": "8ecc55bb7d90483234c84c1ef8e3aea602013c1585e69406bc137d231dc0f32c", "txt_hash": "c10744f3c323cbe99996cfc8b0920f015b178f0a01a10a499893eb3ad1b88ea2" }, "cert": { "_type": "sec_certs.sample.cc.CCCertificate.DocumentState", "download_ok": true, "convert_garbage": false, "convert_ok": true, "extract_ok": true, "pdf_hash": "8a0e4a3f1fc96a5708a0abfe59a7e3be697280f725215c928a2191988585c544", "txt_hash": "6ab337ad3cabd654b4207f25aede5eaf286ace65eaf13d94a4075eb09f230fb0" } }, "pdf_data": { "_type": "sec_certs.sample.cc.CCCertificate.PdfData", "report_metadata": { "pdf_file_size_bytes": 583504, "pdf_is_encrypted": false, "pdf_number_of_pages": 17, "/ModDate": "D:20191119142133-05'00'", "/Producer": "Foxit PhantomPDF Printer Version 9.6.0.1818", "/Title": "", "/Keywords": "", "/Author": "", "/Creator": "", "/Subject": "", "/CreationDate": "D:20191119142053-05'00'", "pdf_hyperlinks": { "_type": "set", "_value": [ "https://gcdocs.corp.cse-cst.gc.ca/gcdocsdav/nodes/9603919/contact%40cyber.gc.ca" ] } }, "st_metadata": { "pdf_file_size_bytes": 1061933, "pdf_is_encrypted": false, "pdf_number_of_pages": 94, "/Title": "AhnLab", "/Author": "Lachlan Turner", "/Subject": "MDS, MDS with MTA, and MDS Manager v2.1", "/Creator": "Microsoft Word", "/CreationDate": "D:20191021164206+00'00'", "/ModDate": "D:20191021164206+00'00'", "pdf_hyperlinks": { "_type": "set", "_value": [ "https://www.lightshipsec.com/" ] } }, "cert_metadata": { "pdf_file_size_bytes": 1640406, "pdf_is_encrypted": false, "pdf_number_of_pages": 1, "/ModDate": "D:20191104105116-05'00'", "/Producer": "Adobe PDF library 15.00", "/Title": "cyber-centre-product-evaluation-certificate-e-bg", "/Creator": "Adobe Illustrator CC 22.0 (Windows)", "/CreationDate": "D:20190122115136-04'00'", "pdf_hyperlinks": { "_type": "set", "_value": [] } }, "report_frontpage": { "CA": {} }, "st_frontpage": null, "cert_frontpage": null, "report_keywords": { "cc_cert_id": { "CA": { "383-4-481": 1 } }, "cc_protection_profile_id": {}, "cc_security_level": {}, "cc_sar": {}, "cc_sfr": {}, "cc_claims": {}, "vendor": {}, "eval_facility": { "Lightship": { "Lightship Security": 1 } }, "symmetric_crypto": { "constructions": { "MAC": { "HMAC-SHA-256": 1 } } }, "asymmetric_crypto": {}, "pq_crypto": {}, "hash_function": { "SHA": { "SHA1": { "SHA-1": 1 }, "SHA2": { "SHA-256": 1 } } }, "crypto_scheme": {}, "crypto_protocol": {}, "randomness": { "PRNG": { "DRBG": 1 } }, "cipher_mode": {}, "ecc_curve": {}, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": {}, "technical_report_id": {}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": { "ISO": { "ISO/IEC 17025": 2 } }, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": {} }, "st_keywords": { "cc_cert_id": {}, "cc_protection_profile_id": {}, "cc_security_level": {}, "cc_sar": { "ADV": { "ADV_FSP.1": 1 }, "AGD": { "AGD_OPE.1": 1, "AGD_PRE.1": 1, "AGD_OPE": 4 }, "ALC": { "ALC_CMC.1": 1, "ALC_CMS.1": 1 }, "ATE": { "ATE_IND.1": 1 }, "AVA": { "AVA_VAN.1": 1 }, "ASE": { "ASE_CCL.1": 1, "ASE_ECD.1": 1, "ASE_INT.1": 1, "ASE_OBJ.1": 1, "ASE_REQ.1": 1, "ASE_SPD.1": 1, "ASE_TSS.1": 2 } }, "cc_sfr": { "FAU": { "FAU_GEN.1": 8, "FAU_GEN.2": 5, "FAU_STG_EXT.1": 10, "FAU_GEN.1.1": 2, "FAU_GEN.1.2": 1, "FAU_GEN.2.1": 1, "FAU_STG_EXT.1.1": 4, "FAU_STG_EXT.1.2": 2, "FAU_STG_EXT.1.3": 4, "FAU_STG.1": 1, "FAU_STG_EXT": 2, "FAU_STG": 1, "FAU_GEN_EXT": 1, "FAU_GEN_EXT.1": 9, "FAU_GEN": 21, "FAU_GEN_EXT.1.1": 1, "FAU_STG_EXT.2": 5, "FAU_STG_EXT.3": 7, "FAU_STG_EXT.4": 5, "FAU_STG_EXT.2.1": 1, "FAU_STG_EXT.3.1": 1, "FAU_STG_EXT.4.1": 1 }, "FCO": { "FCO_CPC_EXT.1": 10, "FCO_CPC_EXT": 1, "FCO_CPC_EXT.1.1": 3, "FCO_CPC_EXT.1.3": 2, "FCO_CPC_EXT.1.2": 3 }, "FCS": { "FCS_TLSS_EXT.2": 5, "FCS_TLSC_EXT.1.1": 4, "FCS_TLSC": 2, "FCS_CKM.2": 22, "FCS_SSHC_EXT.1.5": 4, "FCS_SSHS_EXT.1.5": 3, "FCS_CKM.1": 15, "FCS_CKM.4": 5, "FCS_COP": 74, "FCS_RBG_EXT.1": 22, "FCS_SSHC_EXT.1": 10, "FCS_SSHS_EXT.1": 10, "FCS_TLSS_EXT.1": 11, "FCS_CKM.1.1": 1, "FCS_CKM.2.1": 1, "FCS_CKM.4.1": 1, "FCS_COP.1": 7, "FCS_RBG_EXT.1.1": 2, "FCS_RBG_EXT.1.2": 4, "FCS_SSHC_EXT.1.1": 2, "FCS_SSHC_EXT.1.2": 2, "FCS_SSHC_EXT.1.3": 2, "FCS_SSHC_EXT.1.4": 2, "FCS_SSHC_EXT.1.6": 2, "FCS_SSHC_EXT.1.7": 2, "FCS_SSHC_EXT.1.8": 2, "FCS_SSHC_EXT.1.9": 2, "FCS_SSHS_EXT.1.1": 2, "FCS_SSHS_EXT.1.2": 2, "FCS_SSHS_EXT.1.3": 2, "FCS_SSHS_EXT.1.4": 2, "FCS_SSHS_EXT.1.6": 2, "FCS_SSHS_EXT.1.7": 2, "FCS_SSHS_EXT.1.8": 2, "FCS_TLSS_EXT.1.1": 5, "FCS_TLSS_EXT.1.2": 2, "FCS_TLSS_EXT.1.3": 2, "FCS_TLSC_EXT.1": 7, "FCS_TLSC_EXT.2": 5, "FCS_RBG_EXT": 1, "FCS_NTP_EXT": 1, "FCS_SSHC_EXT": 1, "FCS_SSHS_EXT": 1, "FCS_TLSC_EXT": 2, "FCS_TLSS_EXT": 3, "FCS_CKM": 6, "FCS_DTLS_EXT.1.1": 1, "FCS_DTLS_EXT.2.1": 1, "FCS_NTP_EXT.1": 6, "FCS_NTP_EXT.1.1": 1, "FCS_NTP_EXT.1.2": 1, "FCS_NTP_EXT.1.3": 1, "FCS_NTP_EXT.1.4": 1, "FCS_TLSC_EXT.1.2": 1, "FCS_TLSC_EXT.1.3": 1, "FCS_TLSC_EXT.1.4": 1, "FCS_TLS_EXT.1.1": 2, "FCS_TLSC_EXT.2.1": 1, "FCS_TLSC_EXT.2.2": 1, "FCS_TLSC_EXT.2.3": 1, "FCS_TLSC_EXT.2.4": 1, "FCS_TLSC_EXT.2.5": 1, "FCS_TLSS_EXT.2.1": 2, "FCS_TLSS_EXT.2.2": 1, "FCS_TLSS_EXT.2.3": 1, "FCS_TLSS_EXT.2.4": 2, "FCS_TLSS_EXT.2.5": 1, "FCS_TLSS_EXT.2.6": 1 }, "FIA": { "FIA_UIA_EXT": 3, "FIA_UAU_EXT": 2, "FIA_AFL.1": 7, "FIA_PMG_EXT.1": 10, "FIA_UIA_EXT.1": 11, "FIA_UAU_EXT.2": 12, "FIA_UAU.7": 6, "FIA_AFL.1.1": 1, "FIA_AFL.1.2": 1, "FIA_PMG_EXT.1.1": 2, "FIA_UIA_EXT.1.1": 2, "FIA_UIA_EXT.1.2": 2, "FIA_UAU_EXT.2.1": 2, "FIA_UAU.7.1": 1, "FIA_PMG_EXT": 1, "FIA_UAU.1": 1 }, "FMT": { "FMT_MOF": 13, "FMT_MTD": 10, "FMT_SMF.1": 12, "FMT_SMR.2": 7, "FMT_MOF.1": 2, "FMT_MTD.1": 2, "FMT_SMF.1.1": 1, "FMT_SMR.2.1": 1, "FMT_SMR.2.2": 1, "FMT_SMR.2.3": 1 }, "FPT": { "FPT_APW_EXT": 2, "FPT_TST_EXT": 2, "FPT_TUD_EXT": 2, "FPT_STM_EXT": 2, "FPT_SKP_EXT.1": 10, "FPT_APW_EXT.1": 10, "FPT_TST_EXT.1": 10, "FPT_TUD_EXT.1": 11, "FPT_STM_EXT.1": 10, "FPT_SKP_EXT.1.1": 2, "FPT_APW_EXT.1.1": 2, "FPT_APW_EXT.1.2": 2, "FPT_TST_EXT.1.1": 3, "FPT_TUD_EXT.1.1": 4, "FPT_TUD_EXT.1.2": 3, "FPT_TUD_EXT.1.3": 8, "FPT_STM_EXT.1.1": 2, "FPT_STM_EXT.1.2": 3, "FPT_ITT.1": 8, "FPT_TUD_EXT.2": 7, "FPT_TST_EXT.2": 7, "FPT_ITT": 7, "FPT_SKP_EXT": 1, "FPT_PTD": 1, "FPT_TST_EXT.2.1": 1, "FPT_TUD_EXT.2.2": 1, "FPT_STM": 2 }, "FTA": { "FTA_SSL_EXT.1": 11, "FTA_SSL.3": 5, "FTA_SSL.4": 5, "FTA_TAB.1": 8, "FTA_SSL_EXT.1.1": 2, "FTA_SSL.3.1": 1, "FTA_SSL.4.1": 1, "FTA_TAB.1.1": 1, "FTA_SSL_EXT": 2, "FTA_SSL": 1 }, "FTP": { "FTP_ITC.1": 16, "FTP_TRP": 8, "FTP_ITC.1.1": 1, "FTP_ITC.1.2": 1, "FTP_ITC.1.3": 1, "FTP_TRP.1": 2, "FTP_TRP.1.2": 1, "FTP_TRP.1.3": 1, "FTP_ITC": 7 } }, "cc_claims": { "T": { "T.UNAUTHORIZED_": 1, "T.WEAK_": 2, "T.UNTRUSTED_": 1, "T.UPDATE_": 1, "T.UNDETECTED_": 1, "T.SECURITY_": 2, "T.PASSWORD_": 1, "T.UNAUTHORIZED_ADMINIS": 1, "T.UNDETECTED_ACTIVITY": 2, "T.PASSWORD_CRACKING": 3, "T.WEAK_CRYPTOGRAPHY": 1, "T.UNTRUSTED_COMMUNICATION_CHANNELS": 2, "T.UNTRUSTED_COMMUNI": 1, "T.WEAK_AUTHENTICATIO": 1, "T.UPDATE_COMPROMISE": 1, "T.SECURITY_FUNCTIONAL": 2 }, "A": { "A.PHYSICAL_": 1, "A.LIMITED_": 1, "A.NO_THRU_": 1, "A.TRUSTED_": 1, "A.REGULAR_": 1, "A.ADMIN_": 1, "A.RESIDUAL_": 1, "A.COMPONENTS_RUNNING": 2 }, "OE": { "OE.PHYSICAL": 1, "OE.NO_GENERAL_": 1, "OE.NO_THRU_": 1, "OE.TRUSTED_ADMIN": 1, "OE.UPDATES": 1, "OE.ADMIN_CREDEN": 1, "OE.RESIDUAL_INFO": 1 } }, "vendor": {}, "eval_facility": {}, "symmetric_crypto": { "AES_competition": { "AES": { "AES": 19, "AES-128": 2, "AES-": 2 } }, "constructions": { "MAC": { "HMAC": 4, "HMAC-SHA-256": 5, "HMAC-SHA-384": 1, "HMAC-SHA-512": 1 } } }, "asymmetric_crypto": { "ECC": { "ECDH": { "ECDHE": 2, "ECDH": 2 }, "ECDSA": { "ECDSA": 1 } }, "FF": { "DH": { "Diffie-Hellman": 16, "DH": 12, "DHE": 2 } } }, "pq_crypto": {}, "hash_function": { "SHA": { "SHA1": { "SHA-1": 4, "SHA1": 1 }, "SHA2": { "SHA-256": 6, "SHA256": 3, "SHA-384": 1, "SHA-512": 1, "SHA384": 1, "SHA512": 1, "SHA2": 1 } } }, "crypto_scheme": { "MAC": { "MAC": 25 }, "KEX": { "Key Exchange": 1 } }, "crypto_protocol": { "SSH": { "SSH": 91 }, "TLS": { "SSL": { "SSL": 7, "SSL 2.0": 3, "SSL 3.0": 3 }, "TLS": { "TLS1.1": 1, "TLS1.2": 1, "TLS": 82, "TLS 1.2": 7, "TLS 1.0": 3, "TLS 1.1": 6, "TLS v1.0": 2 }, "DTLS": { "DTLS": 73, "DTLS 1.2": 9, "DTLS 1.0": 9, "DTLS v1.2": 4, "DTLS v1.0": 4 } }, "IKE": { "IKEv2": 12, "IKEv1": 12, "IKE": 5 }, "IPsec": { "IPsec": 16 } }, "randomness": { "PRNG": { "DRBG": 2 }, "RNG": { "RBG": 3 } }, "cipher_mode": { "CBC": { "CBC": 3 }, "GCM": { "GCM": 4 } }, "ecc_curve": { "NIST": { "curve P-384": 2, "P-384": 2, "secp256r1": 8, "secp384r1": 8, "secp521r1": 8 } }, "crypto_engine": {}, "tls_cipher_suite": { "TLS": { "TLS_RSA_WITH_AES_128_CBC_SHA256": 2 } }, "crypto_library": { "OpenSSL": { "OpenSSL": 1 } }, "vulnerability": {}, "side_channel_analysis": {}, "technical_report_id": {}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": { "FIPS": { "FIPS PUB 186-4": 2 }, "NIST": { "NIST SP 800-57": 2 }, "PKCS": { "PKCS #1": 1 }, "RFC": { "RFC 8017": 1, "RFC 3526": 1, "RFC 2818": 8, "RFC 4253": 8, "RFC 4251": 2, "RFC 5246": 9, "RFC 5280": 7, "RFC 2986": 2, "RFC 6347": 9, "RFC 4347": 9, "RFC 6125": 8, "RFC 4301": 2, "RFC 4303": 1, "RFC 3602": 2, "RFC 4106": 1, "RFC 4109": 1, "RFC 4304": 1, "RFC 4868": 2, "RFC 5996": 2, "RFC 5282": 1, "RFC 4945": 1, "RFC 1305": 1, "RFC 5905": 1, "RFC 5647": 2, "RFC 4346": 4, "RFC 6960": 1, "RFC 5759": 1 }, "ISO": { "ISO/IEC 9796-2": 1, "ISO/IEC 18031:2011": 5 }, "X509": { "X.509": 23 } }, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": { "OutOfScope": { "out of scope": 2, "indicated as “REQUIRED” but not listed in the later elements of this component are implemented is out of scope of the evaluation activity for this requirement. RFC 5647 only applies to the RFC compliant": 2 } } }, "cert_keywords": { "cc_cert_id": { "CA": { "383-4-481": 1 } }, "cc_protection_profile_id": {}, "cc_security_level": {}, "cc_sar": {}, "cc_sfr": {}, "cc_claims": {}, "vendor": {}, "eval_facility": { "Lightship": { "Lightship Security": 1 } }, "symmetric_crypto": {}, "asymmetric_crypto": {}, "pq_crypto": {}, "hash_function": {}, "crypto_scheme": {}, "crypto_protocol": {}, "randomness": {}, "cipher_mode": {}, "ecc_curve": {}, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": {}, "technical_report_id": {}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": {}, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": {} }, "report_filename": "383-4-481 CR v1.0.pdf", "st_filename": "383-4-481 AhnLab MDS Security Target_1.4.pdf", "cert_filename": "383-4-481 CT no sig Eng.pdf" }, "heuristics": { "_type": "sec_certs.sample.cc.CCCertificate.Heuristics", "extracted_versions": { "_type": "set", "_value": [ "2.1" ] }, "cpe_matches": null, "verified_cpe_matches": null, "related_cves": null, "cert_lab": null, "cert_id": "383-4-481", "st_references": { "_type": "sec_certs.sample.certificate.References", "directly_referenced_by": null, "indirectly_referenced_by": null, "directly_referencing": null, "indirectly_referencing": null }, "report_references": { "_type": "sec_certs.sample.certificate.References", "directly_referenced_by": null, "indirectly_referenced_by": null, "directly_referencing": null, "indirectly_referencing": null }, "annotated_references": null, "extracted_sars": { "_type": "set", "_value": [ { "_type": "sec_certs.sample.sar.SAR", "family": "ATE_IND", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_INT", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_ECD", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AGD_PRE", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AVA_VAN", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_OBJ", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_TSS", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ADV_FSP", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_CCL", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_CMC", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_SPD", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AGD_OPE", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_CMS", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_REQ", "level": 1 } ] }, "direct_transitive_cves": null, "indirect_transitive_cves": null, "scheme_data": { "product": "AhnLab MDS, MDS with MTA, and MDS Manager v2.1", "vendor": "AhnLab, Inc.", "level": "CPP_ND_V2.1", "certification_date": "2019-10-29" } }, "_id": "90969e38fd9b581f" } }, { "_id": { "$oid": "66c0a10b1c78507fd1060bbc" }, "run_id": { "$oid": "66c0a0e21c78507fd105fc06" }, "dgst": "90969e38fd9b581f", "timestamp": { "$date": "2024-08-17T12:52:18.171Z" }, "type": "change", "diff": { "__update__": { "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-481%20CR%20v1.0.pdf", "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-481%20AhnLab%20MDS%20Security%20Target_1.4.pdf", "state": { "__update__": { "report": { "__update__": { "download_ok": false, "convert_ok": false, "extract_ok": false, "pdf_hash": null, "txt_hash": null } }, "st": { "__update__": { "download_ok": false, "convert_ok": false, "extract_ok": false, "pdf_hash": null, "txt_hash": null } }, "cert": { "__update__": { "download_ok": false, "convert_ok": false, "extract_ok": false, "pdf_hash": null, "txt_hash": null } } } }, "pdf_data": { "__update__": { "report_metadata": null, "st_metadata": null, "cert_metadata": null, "report_frontpage": null, "report_keywords": null, "st_keywords": null, "cert_keywords": null, "report_filename": null, "st_filename": null, "cert_filename": null } }, "heuristics": { "__update__": { "cert_id": null, "extracted_sars": null } } } } }, { "_id": { "$oid": "66c7affd2ff8c812f518be81" }, "run_id": { "$oid": "66c7afc82ff8c812f518b966" }, "dgst": "90969e38fd9b581f", "timestamp": { "$date": "2024-08-22T18:04:48.021Z" }, "type": "change", "diff": { "__update__": { "state": { "__update__": { "report": { "__update__": { "download_ok": true, "convert_ok": true, "extract_ok": true, "pdf_hash": "7f1504235e6203001d8a76829161dad2290439c3c12894114ea7f7c9af2e598b", "txt_hash": "b72deb54b7d3a3c7d4e27a30d2b21b02943bd661fb0f55dbcf3cc559d5122f55" } }, "st": { "__update__": { "download_ok": true, "convert_ok": true, "extract_ok": true, "pdf_hash": "8ecc55bb7d90483234c84c1ef8e3aea602013c1585e69406bc137d231dc0f32c", "txt_hash": "c10744f3c323cbe99996cfc8b0920f015b178f0a01a10a499893eb3ad1b88ea2" } }, "cert": { "__update__": { "download_ok": true, "convert_ok": true, "extract_ok": true, "pdf_hash": "8a0e4a3f1fc96a5708a0abfe59a7e3be697280f725215c928a2191988585c544", "txt_hash": "6ab337ad3cabd654b4207f25aede5eaf286ace65eaf13d94a4075eb09f230fb0" } } } }, "pdf_data": { "__update__": { "report_metadata": { "pdf_file_size_bytes": 583504, "pdf_is_encrypted": false, "pdf_number_of_pages": 17, "/ModDate": "D:20191119142133-05'00'", "/Producer": "Foxit PhantomPDF Printer Version 9.6.0.1818", "/Title": "", "/Keywords": "", "/Author": "", "/Creator": "", "/Subject": "", "/CreationDate": "D:20191119142053-05'00'", "pdf_hyperlinks": { "_type": "set", "_value": [ "https://gcdocs.corp.cse-cst.gc.ca/gcdocsdav/nodes/9603919/contact%40cyber.gc.ca" ] } }, "st_metadata": { "pdf_file_size_bytes": 1061933, "pdf_is_encrypted": false, "pdf_number_of_pages": 94, "/Title": "AhnLab", "/Author": "Lachlan Turner", "/Subject": "MDS, MDS with MTA, and MDS Manager v2.1", "/Creator": "Microsoft Word", "/CreationDate": "D:20191021164206+00'00'", "/ModDate": "D:20191021164206+00'00'", "pdf_hyperlinks": { "_type": "set", "_value": [ "https://www.lightshipsec.com/" ] } }, "cert_metadata": { "pdf_file_size_bytes": 1640406, "pdf_is_encrypted": false, "pdf_number_of_pages": 1, "/ModDate": "D:20191104105116-05'00'", "/Producer": "Adobe PDF library 15.00", "/Title": "cyber-centre-product-evaluation-certificate-e-bg", "/Creator": "Adobe Illustrator CC 22.0 (Windows)", "/CreationDate": "D:20190122115136-04'00'", "pdf_hyperlinks": { "_type": "set", "_value": [] } }, "report_frontpage": { "CA": {} }, "report_keywords": { "cc_cert_id": { "CA": { "383-4-481": 1 } }, "cc_protection_profile_id": {}, "cc_security_level": {}, "cc_sar": {}, "cc_sfr": {}, "cc_claims": {}, "vendor": {}, "eval_facility": { "Lightship": { "Lightship Security": 1 } }, "symmetric_crypto": { "constructions": { "MAC": { "HMAC-SHA-256": 1 } } }, "asymmetric_crypto": {}, "pq_crypto": {}, "hash_function": { "SHA": { "SHA1": { "SHA-1": 1 }, "SHA2": { "SHA-256": 1 } } }, "crypto_scheme": {}, "crypto_protocol": {}, "randomness": { "PRNG": { "DRBG": 1 } }, "cipher_mode": {}, "ecc_curve": {}, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": {}, "technical_report_id": {}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": { "ISO": { "ISO/IEC 17025": 2 } }, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": {} }, "st_keywords": { "cc_cert_id": {}, "cc_protection_profile_id": {}, "cc_security_level": {}, "cc_sar": { "ADV": { "ADV_FSP.1": 1 }, "AGD": { "AGD_OPE.1": 1, "AGD_PRE.1": 1, "AGD_OPE": 4 }, "ALC": { "ALC_CMC.1": 1, "ALC_CMS.1": 1 }, "ATE": { "ATE_IND.1": 1 }, "AVA": { "AVA_VAN.1": 1 }, "ASE": { "ASE_CCL.1": 1, "ASE_ECD.1": 1, "ASE_INT.1": 1, "ASE_OBJ.1": 1, "ASE_REQ.1": 1, "ASE_SPD.1": 1, "ASE_TSS.1": 2 } }, "cc_sfr": { "FAU": { "FAU_GEN.1": 8, "FAU_GEN.2": 5, "FAU_STG_EXT.1": 10, "FAU_GEN.1.1": 2, "FAU_GEN.1.2": 1, "FAU_GEN.2.1": 1, "FAU_STG_EXT.1.1": 4, "FAU_STG_EXT.1.2": 2, "FAU_STG_EXT.1.3": 4, "FAU_STG.1": 1, "FAU_STG_EXT": 2, "FAU_STG": 1, "FAU_GEN_EXT": 1, "FAU_GEN_EXT.1": 9, "FAU_GEN": 21, "FAU_GEN_EXT.1.1": 1, "FAU_STG_EXT.2": 5, "FAU_STG_EXT.3": 7, "FAU_STG_EXT.4": 5, "FAU_STG_EXT.2.1": 1, "FAU_STG_EXT.3.1": 1, "FAU_STG_EXT.4.1": 1 }, "FCO": { "FCO_CPC_EXT.1": 10, "FCO_CPC_EXT": 1, "FCO_CPC_EXT.1.1": 3, "FCO_CPC_EXT.1.3": 2, "FCO_CPC_EXT.1.2": 3 }, "FCS": { "FCS_TLSS_EXT.2": 5, "FCS_TLSC_EXT.1.1": 4, "FCS_TLSC": 2, "FCS_CKM.2": 22, "FCS_SSHC_EXT.1.5": 4, "FCS_SSHS_EXT.1.5": 3, "FCS_CKM.1": 15, "FCS_CKM.4": 5, "FCS_COP": 74, "FCS_RBG_EXT.1": 22, "FCS_SSHC_EXT.1": 10, "FCS_SSHS_EXT.1": 10, "FCS_TLSS_EXT.1": 11, "FCS_CKM.1.1": 1, "FCS_CKM.2.1": 1, "FCS_CKM.4.1": 1, "FCS_COP.1": 7, "FCS_RBG_EXT.1.1": 2, "FCS_RBG_EXT.1.2": 4, "FCS_SSHC_EXT.1.1": 2, "FCS_SSHC_EXT.1.2": 2, "FCS_SSHC_EXT.1.3": 2, "FCS_SSHC_EXT.1.4": 2, "FCS_SSHC_EXT.1.6": 2, "FCS_SSHC_EXT.1.7": 2, "FCS_SSHC_EXT.1.8": 2, "FCS_SSHC_EXT.1.9": 2, "FCS_SSHS_EXT.1.1": 2, "FCS_SSHS_EXT.1.2": 2, "FCS_SSHS_EXT.1.3": 2, "FCS_SSHS_EXT.1.4": 2, "FCS_SSHS_EXT.1.6": 2, "FCS_SSHS_EXT.1.7": 2, "FCS_SSHS_EXT.1.8": 2, "FCS_TLSS_EXT.1.1": 5, "FCS_TLSS_EXT.1.2": 2, "FCS_TLSS_EXT.1.3": 2, "FCS_TLSC_EXT.1": 7, "FCS_TLSC_EXT.2": 5, "FCS_RBG_EXT": 1, "FCS_NTP_EXT": 1, "FCS_SSHC_EXT": 1, "FCS_SSHS_EXT": 1, "FCS_TLSC_EXT": 2, "FCS_TLSS_EXT": 3, "FCS_CKM": 6, "FCS_DTLS_EXT.1.1": 1, "FCS_DTLS_EXT.2.1": 1, "FCS_NTP_EXT.1": 6, "FCS_NTP_EXT.1.1": 1, "FCS_NTP_EXT.1.2": 1, "FCS_NTP_EXT.1.3": 1, "FCS_NTP_EXT.1.4": 1, "FCS_TLSC_EXT.1.2": 1, "FCS_TLSC_EXT.1.3": 1, "FCS_TLSC_EXT.1.4": 1, "FCS_TLS_EXT.1.1": 2, "FCS_TLSC_EXT.2.1": 1, "FCS_TLSC_EXT.2.2": 1, "FCS_TLSC_EXT.2.3": 1, "FCS_TLSC_EXT.2.4": 1, "FCS_TLSC_EXT.2.5": 1, "FCS_TLSS_EXT.2.1": 2, "FCS_TLSS_EXT.2.2": 1, "FCS_TLSS_EXT.2.3": 1, "FCS_TLSS_EXT.2.4": 2, "FCS_TLSS_EXT.2.5": 1, "FCS_TLSS_EXT.2.6": 1 }, "FIA": { "FIA_UIA_EXT": 3, "FIA_UAU_EXT": 2, "FIA_AFL.1": 7, "FIA_PMG_EXT.1": 10, "FIA_UIA_EXT.1": 11, "FIA_UAU_EXT.2": 12, "FIA_UAU.7": 6, "FIA_AFL.1.1": 1, "FIA_AFL.1.2": 1, "FIA_PMG_EXT.1.1": 2, "FIA_UIA_EXT.1.1": 2, "FIA_UIA_EXT.1.2": 2, "FIA_UAU_EXT.2.1": 2, "FIA_UAU.7.1": 1, "FIA_PMG_EXT": 1, "FIA_UAU.1": 1 }, "FMT": { "FMT_MOF": 13, "FMT_MTD": 10, "FMT_SMF.1": 12, "FMT_SMR.2": 7, "FMT_MOF.1": 2, "FMT_MTD.1": 2, "FMT_SMF.1.1": 1, "FMT_SMR.2.1": 1, "FMT_SMR.2.2": 1, "FMT_SMR.2.3": 1 }, "FPT": { "FPT_APW_EXT": 2, "FPT_TST_EXT": 2, "FPT_TUD_EXT": 2, "FPT_STM_EXT": 2, "FPT_SKP_EXT.1": 10, "FPT_APW_EXT.1": 10, "FPT_TST_EXT.1": 10, "FPT_TUD_EXT.1": 11, "FPT_STM_EXT.1": 10, "FPT_SKP_EXT.1.1": 2, "FPT_APW_EXT.1.1": 2, "FPT_APW_EXT.1.2": 2, "FPT_TST_EXT.1.1": 3, "FPT_TUD_EXT.1.1": 4, "FPT_TUD_EXT.1.2": 3, "FPT_TUD_EXT.1.3": 8, "FPT_STM_EXT.1.1": 2, "FPT_STM_EXT.1.2": 3, "FPT_ITT.1": 8, "FPT_TUD_EXT.2": 7, "FPT_TST_EXT.2": 7, "FPT_ITT": 7, "FPT_SKP_EXT": 1, "FPT_PTD": 1, "FPT_TST_EXT.2.1": 1, "FPT_TUD_EXT.2.2": 1, "FPT_STM": 2 }, "FTA": { "FTA_SSL_EXT.1": 11, "FTA_SSL.3": 5, "FTA_SSL.4": 5, "FTA_TAB.1": 8, "FTA_SSL_EXT.1.1": 2, "FTA_SSL.3.1": 1, "FTA_SSL.4.1": 1, "FTA_TAB.1.1": 1, "FTA_SSL_EXT": 2, "FTA_SSL": 1 }, "FTP": { "FTP_ITC.1": 16, "FTP_TRP": 8, "FTP_ITC.1.1": 1, "FTP_ITC.1.2": 1, "FTP_ITC.1.3": 1, "FTP_TRP.1": 2, "FTP_TRP.1.2": 1, "FTP_TRP.1.3": 1, "FTP_ITC": 7 } }, "cc_claims": { "T": { "T.UNAUTHORIZED_": 1, "T.WEAK_": 2, "T.UNTRUSTED_": 1, "T.UPDATE_": 1, "T.UNDETECTED_": 1, "T.SECURITY_": 2, "T.PASSWORD_": 1, "T.UNAUTHORIZED_ADMINIS": 1, "T.UNDETECTED_ACTIVITY": 2, "T.PASSWORD_CRACKING": 3, "T.WEAK_CRYPTOGRAPHY": 1, "T.UNTRUSTED_COMMUNICATION_CHANNELS": 2, "T.UNTRUSTED_COMMUNI": 1, "T.WEAK_AUTHENTICATIO": 1, "T.UPDATE_COMPROMISE": 1, "T.SECURITY_FUNCTIONAL": 2 }, "A": { "A.PHYSICAL_": 1, "A.LIMITED_": 1, "A.NO_THRU_": 1, "A.TRUSTED_": 1, "A.REGULAR_": 1, "A.ADMIN_": 1, "A.RESIDUAL_": 1, "A.COMPONENTS_RUNNING": 2 }, "OE": { "OE.PHYSICAL": 1, "OE.NO_GENERAL_": 1, "OE.NO_THRU_": 1, "OE.TRUSTED_ADMIN": 1, "OE.UPDATES": 1, "OE.ADMIN_CREDEN": 1, "OE.RESIDUAL_INFO": 1 } }, "vendor": {}, "eval_facility": {}, "symmetric_crypto": { "AES_competition": { "AES": { "AES": 19, "AES-128": 2, "AES-": 2 } }, "constructions": { "MAC": { "HMAC": 4, "HMAC-SHA-256": 5, "HMAC-SHA-384": 1, "HMAC-SHA-512": 1 } } }, "asymmetric_crypto": { "ECC": { "ECDH": { "ECDHE": 2, "ECDH": 2 }, "ECDSA": { "ECDSA": 1 } }, "FF": { "DH": { "Diffie-Hellman": 16, "DH": 12, "DHE": 2 } } }, "pq_crypto": {}, "hash_function": { "SHA": { "SHA1": { "SHA-1": 4, "SHA1": 1 }, "SHA2": { "SHA-256": 6, "SHA256": 3, "SHA-384": 1, "SHA-512": 1, "SHA384": 1, "SHA512": 1, "SHA2": 1 } } }, "crypto_scheme": { "MAC": { "MAC": 25 }, "KEX": { "Key Exchange": 1 } }, "crypto_protocol": { "SSH": { "SSH": 91 }, "TLS": { "SSL": { "SSL": 7, "SSL 2.0": 3, "SSL 3.0": 3 }, "TLS": { "TLS1.1": 1, "TLS1.2": 1, "TLS": 82, "TLS 1.2": 7, "TLS 1.0": 3, "TLS 1.1": 6, "TLS v1.0": 2 }, "DTLS": { "DTLS": 73, "DTLS 1.2": 9, "DTLS 1.0": 9, "DTLS v1.2": 4, "DTLS v1.0": 4 } }, "IKE": { "IKEv2": 12, "IKEv1": 12, "IKE": 5 }, "IPsec": { "IPsec": 16 } }, "randomness": { "PRNG": { "DRBG": 2 }, "RNG": { "RBG": 3 } }, "cipher_mode": { "CBC": { "CBC": 3 }, "GCM": { "GCM": 4 } }, "ecc_curve": { "NIST": { "curve P-384": 2, "P-384": 2, "secp256r1": 8, "secp384r1": 8, "secp521r1": 8 } }, "crypto_engine": {}, "tls_cipher_suite": { "TLS": { "TLS_RSA_WITH_AES_128_CBC_SHA256": 2 } }, "crypto_library": { "OpenSSL": { "OpenSSL": 1 } }, "vulnerability": {}, "side_channel_analysis": {}, "technical_report_id": {}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": { "FIPS": { "FIPS PUB 186-4": 2 }, "NIST": { "NIST SP 800-57": 2 }, "PKCS": { "PKCS #1": 1 }, "RFC": { "RFC 8017": 1, "RFC 3526": 1, "RFC 2818": 8, "RFC 4253": 8, "RFC 4251": 2, "RFC 5246": 9, "RFC 5280": 7, "RFC 2986": 2, "RFC 6347": 9, "RFC 4347": 9, "RFC 6125": 8, "RFC 4301": 2, "RFC 4303": 1, "RFC 3602": 2, "RFC 4106": 1, "RFC 4109": 1, "RFC 4304": 1, "RFC 4868": 2, "RFC 5996": 2, "RFC 5282": 1, "RFC 4945": 1, "RFC 1305": 1, "RFC 5905": 1, "RFC 5647": 2, "RFC 4346": 4, "RFC 6960": 1, "RFC 5759": 1 }, "ISO": { "ISO/IEC 9796-2": 1, "ISO/IEC 18031:2011": 5 }, "X509": { "X.509": 23 } }, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": { "OutOfScope": { "out of scope": 2, "indicated as “REQUIRED” but not listed in the later elements of this component are implemented is out of scope of the evaluation activity for this requirement. RFC 5647 only applies to the RFC compliant": 2 } } }, "cert_keywords": { "cc_cert_id": { "CA": { "383-4-481": 1 } }, "cc_protection_profile_id": {}, "cc_security_level": {}, "cc_sar": {}, "cc_sfr": {}, "cc_claims": {}, "vendor": {}, "eval_facility": { "Lightship": { "Lightship Security": 1 } }, "symmetric_crypto": {}, "asymmetric_crypto": {}, "pq_crypto": {}, "hash_function": {}, "crypto_scheme": {}, "crypto_protocol": {}, "randomness": {}, "cipher_mode": {}, "ecc_curve": {}, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": {}, "technical_report_id": {}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": {}, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": {} }, "report_filename": "383-4-481 CR v1.0.pdf", "st_filename": "383-4-481 AhnLab MDS Security Target_1.4.pdf", "cert_filename": "383-4-481 CT no sig Eng.pdf" } }, "heuristics": { "__update__": { "cert_id": "383-4-481", "extracted_sars": { "_type": "set", "_value": [ { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_CMC", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_CCL", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ADV_FSP", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_OBJ", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_SPD", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AVA_VAN", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_CMS", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AGD_PRE", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_REQ", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AGD_OPE", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_ECD", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ATE_IND", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_TSS", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_INT", "level": 1 } ] } } } } } }, { "_id": { "$oid": "67226511790069c1c6f2330c" }, "run_id": { "$oid": "672264ce790069c1c6f232e2" }, "dgst": "90969e38fd9b581f", "timestamp": { "$date": "2024-10-30T10:56:01.819Z" }, "type": "change", "diff": { "__update__": { "status": "archived", "heuristics": { "__update__": { "scheme_data": null } } } } }, { "_id": { "$oid": "673f6585a1452c910a80ccb4" }, "run_id": { "$oid": "673f6538a1452c910a80b5ad" }, "dgst": "90969e38fd9b581f", "timestamp": { "$date": "2024-11-21T11:03:40.77Z" }, "type": "change", "diff": { "__update__": { "heuristics": { "__insert__": { "prev_certificates": [], "next_certificates": [] } } } } }, { "_id": { "$oid": "67a4087c61618839532705f8" }, "run_id": { "$oid": "67a4080e616188395327018d" }, "dgst": "90969e38fd9b581f", "timestamp": { "$date": "2025-02-05T18:04:55.043Z" }, "type": "change", "diff": { "__insert__": { "protection_profile_links": { "_type": "set", "_value": [ "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.1.pdf" ] } }, "__update__": { "state": { "__update__": { "report": { "__update__": { "_type": "sec_certs.sample.document_state.DocumentState" } }, "st": { "__update__": { "_type": "sec_certs.sample.document_state.DocumentState" } }, "cert": { "__update__": { "_type": "sec_certs.sample.document_state.DocumentState" } } } }, "heuristics": { "__insert__": { "protection_profiles": null, "eal": null }, "__update__": { "prev_certificates": null, "next_certificates": null } } }, "__delete__": [ "protection_profiles" ] } }, { "_id": { "$oid": "669f80cd566b7c5a180581b8" }, "run_id": { "$oid": "669f8076566b7c5a1805773d" }, "dgst": "9628d00ce6f61640", "timestamp": { "$date": "2024-07-23T00:09:57.927Z" }, "type": "new", "diff": { "_type": "sec_certs.sample.cc.CCCertificate", "dgst": "9628d00ce6f61640", "status": "archived", "category": "Network and Network-Related Devices and Systems", "name": "AhnLab MDS, MDS with MTA, and MDS Manager v2.1", "manufacturer": "AhnLab, Inc.", "scheme": "US", "security_level": { "_type": "set", "_value": [] }, "not_valid_before": { "_type": "date", "_value": "2017-05-08" }, "not_valid_after": { "_type": "date", "_value": "2019-05-08" }, "report_link": "https://www.commoncriteriaportal.org/files/epfiles/st_vid10818-vr.pdf", "st_link": "https://www.commoncriteriaportal.org/files/epfiles/st_vid10818-st.pdf", "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10818-ci.pdf", "manufacturer_web": "https://www.ahnlab.com/", "protection_profiles": { "_type": "set", "_value": [ { "_type": "sec_certs.sample.protection_profile.ProtectionProfile", "pp_name": "collaborative Protection Profile for Network Devices v1.0", "pp_eal": null, "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V1.0.pdf", "pp_ids": null } ] }, "maintenance_updates": { "_type": "set", "_value": [ { "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport", "maintenance_date": { "_type": "date", "_value": "2017-06-30" }, "maintenance_title": "Maintenance Update of AhnLab MDS, MDS with MTA, and MDS Manager V2.1 for MDS 4000 and MDS 8000", "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10818-add1.pdf", "maintenance_st_link": null }, { "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport", "maintenance_date": { "_type": "date", "_value": "2019-01-16" }, "maintenance_title": "Maintenance Update of AhnLab MDS, MDS with MTA, and MDS Manager V2.1", "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10818-add4.pdf", "maintenance_st_link": null } ] }, "state": { "_type": "sec_certs.sample.cc.CCCertificate.InternalState", "report": { "_type": "sec_certs.sample.cc.CCCertificate.DocumentState", "download_ok": true, "convert_garbage": false, "convert_ok": true, "extract_ok": true, "pdf_hash": "6900408c92dbd88ced9b2d5caa7089a6ff4911c9d8130f1896734953972eaecb", "txt_hash": "ae82395ac3623adeb01030433a768beacc1cc4510aa964b33b9bb4b3eabb58f1" }, "st": { "_type": "sec_certs.sample.cc.CCCertificate.DocumentState", "download_ok": true, "convert_garbage": false, "convert_ok": true, "extract_ok": true, "pdf_hash": "8cb071786715c1b6a51f512f6106ceb650e28d083a971529d1c04d52d0424cb1", "txt_hash": "a6b17d5491e2f0c12a49d751bf91d5b20b65772b0c804df6a512909b5956afba" }, "cert": { "_type": "sec_certs.sample.cc.CCCertificate.DocumentState", "download_ok": true, "convert_garbage": true, "convert_ok": true, "extract_ok": true, "pdf_hash": "39455bc4e95c015a9e19aa537f6578735f2b9d920b3d31157080f2c772eae0f2", "txt_hash": "f4341e76ec140e33941c937297602a8b0cf1297296a86bda1cefec934d7b4b1d" } }, "pdf_data": { "_type": "sec_certs.sample.cc.CCCertificate.PdfData", "report_metadata": { "pdf_file_size_bytes": 573508, "pdf_is_encrypted": false, "pdf_number_of_pages": 24, "/CreationDate": "D:20170511160200-04'00'", "/ModDate": "D:20170511160200-04'00'", "pdf_hyperlinks": { "_type": "set", "_value": [ "http://www.niap-ccevs.org/" ] } }, "st_metadata": { "pdf_file_size_bytes": 1343585, "pdf_is_encrypted": false, "pdf_number_of_pages": 41, "/CreationDate": "D:20190122142723-05'00'", "/ModDate": "D:20190122142723-05'00'", "pdf_hyperlinks": { "_type": "set", "_value": [] } }, "cert_metadata": { "pdf_file_size_bytes": 176877, "pdf_is_encrypted": false, "pdf_number_of_pages": 1, "/Producer": "iText 2.1.0 (by lowagie.com)", "/ModDate": "D:20170512081917-04'00'", "/CreationDate": "D:20170512081917-04'00'", "pdf_hyperlinks": { "_type": "set", "_value": [] } }, "report_frontpage": { "US": { "cert_id": "CCEVS-VR-VID10818-2017", "cert_item": "for AhnLab MDS, MDS with MTA, and MDS Manager V2.1", "cert_lab": "US NIAP" } }, "st_frontpage": null, "cert_frontpage": null, "report_keywords": { "cc_cert_id": { "US": { "CCEVS-VR-VID10818-2017": 1 } }, "cc_protection_profile_id": {}, "cc_security_level": {}, "cc_sar": { "ADV": { "ADV_FSP.1": 1 }, "AGD": { "AGD_OPE.1": 1, "AGD_PRE.1": 1 }, "ALC": { "ALC_CMC.1": 1, "ALC_CMS.1": 1 }, "ATE": { "ATE_IND.1": 1 }, "AVA": { "AVA_VAN.1": 1 } }, "cc_sfr": { "FAU": { "FAU_STG.1": 4 }, "FCS": { "FCS_SSHS_EXT.1": 4, "FCS_TLSC_EXT.2": 4, "FCS_TLSS_EXT.1": 4, "FCS_CKM.1": 1, "FCS_TLSS_EXT": 1 }, "FMT": { "FMT_SMF.1.1": 1 } }, "cc_claims": {}, "vendor": {}, "eval_facility": { "Leidos": { "Leidos": 8 } }, "symmetric_crypto": {}, "asymmetric_crypto": { "ECC": { "ECDH": { "ECDHE": 1 } }, "FF": { "DH": { "DH": 1 } } }, "pq_crypto": {}, "hash_function": {}, "crypto_scheme": {}, "crypto_protocol": { "SSH": { "SSH": 9 }, "TLS": { "TLS": { "TLS": 8, "TLS v1.1": 1, "TLS v1.2": 1 } }, "IPsec": { "IPsec": 2 } }, "randomness": {}, "cipher_mode": {}, "ecc_curve": { "NIST": { "secp521r1": 1 } }, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": {}, "technical_report_id": {}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": { "RFC": { "RFC5759": 1, "RFC5280": 1 }, "X509": { "X.509": 6 } }, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": {} }, "st_keywords": { "cc_cert_id": {}, "cc_protection_profile_id": {}, "cc_security_level": {}, "cc_sar": { "ADV": { "ADV_FSP.1": 1 }, "AGD": { "AGD_OPE": 1, "AGD_PRE": 1 }, "ALC": { "ALC_CMC.1": 1, "ALC_CMS.1": 1 }, "ATE": { "ATE_IND.1": 1 }, "AVA": { "AVA_VAN.1": 1 }, "ASE": { "ASE_CCL.1": 1, "ASE_ECD.1": 1, "ASE_INT.1": 1, "ASE_OBJ.1": 1, "ASE_REQ.1": 1, "ASE_SPD.1": 1, "ASE_TSS.1": 1 } }, "cc_sfr": { "FAU": { "FAU_GEN": 5, "FAU_STG.1": 4, "FAU_STG_EXT": 3, "FAU_STG": 2, "FAU_GEN.1": 2, "FAU_GEN.1.1": 1, "FAU_GEN.1.2": 1, "FAU_GEN.2": 2, "FAU_GEN.2.1": 1, "FAU_STG.1.1": 2, "FAU_STG_EXT.1": 2, "FAU_STG_EXT.1.1": 1, "FAU_STG_EXT.1.2": 1, "FAU_STG_EXT.1.3": 1 }, "FCS": { "FCS_SSHS_EXT.1": 7, "FCS_TLSC_EXT.2": 5, "FCS_TLSS_EXT.1": 6, "FCS_CKM.1": 3, "FCS_TLSS_EXT": 4, "FCS_RBG_EXT": 2, "FCS_SSHS_EXT": 3, "FCS_TLSC_EXT": 3, "FCS_CKM": 6, "FCS_COP.1": 16, "FCS_CKM.1.1": 1, "FCS_CKM.2": 2, "FCS_CKM.2.1": 1, "FCS_CKM.4": 3, "FCS_COP.1.1": 4, "FCS_RBG_EXT.1": 3, "FCS_RBG_EXT.1.1": 1, "FCS_RBG_EXT.1.2": 1, "FCS_SSHS_EXT.1.1": 1, "FCS_SSHS_EXT.1.2": 1, "FCS_SSHS_EXT.1.3": 1, "FCS_SSHS_EXT.1.4": 1, "FCS_SSHS_EXT.1.5": 1, "FCS_SSHS_EXT.1.6": 1, "FCS_SSHS_EXT.1.7": 1, "FCS_TLSC_EXT.2.1": 1, "FCS_TLSC_EXT.2.2": 1, "FCS_TLSC_EXT.2.3": 1, "FCS_TLSC_EXT.2.4": 1, "FCS_TLSC_EXT.2.5": 1, "FCS_TLSS_EXT.1.1": 1, "FCS_TLSS_EXT.1.3": 1 }, "FDP": { "FDP_ACC.1": 3 }, "FIA": { "FIA_PMG_EXT.1": 4, "FIA_PMG_EXT": 2, "FIA_UIA_EXT": 3, "FIA_UAU_EXT": 3, "FIA_UAU": 2, "FIA_UIA_EXT.1": 3, "FIA_UAU_EXT.2": 3, "FIA_PMG_EXT.1.1": 1, "FIA_UIA_EXT.1.1": 1, "FIA_UIA_EXT.1.2": 1, "FIA_UAU_EXT.2.1": 1, "FIA_UAU.7": 2, "FIA_UAU.7.1": 1 }, "FMT": { "FMT_SMF.1.1": 3, "FMT_MOF.1": 4, "FMT_MTD": 2, "FMT_SMF": 2, "FMT_SMR": 2, "FMT_MTD.1": 3, "FMT_MOF.1.1": 2, "FMT_MTD.1.1": 1, "FMT_SMF.1": 3, "FMT_SMR.2": 2, "FMT_SMR.2.1": 1, "FMT_SMR.2.2": 1, "FMT_SMR.2.3": 1 }, "FPT": { "FPT_APW_EXT": 4, "FPT_SKP_EXT": 3, "FPT_TST_EXT": 3, "FPT_TUD_EXT": 3, "FPT_STM": 2, "FPT_STM.1": 3, "FPT_TUD_EXT.1": 3, "FPT_APW_EXT.1": 2, "FPT_APW_EXT.1.1": 1, "FPT_APW_EXT.1.2": 1, "FPT_SKP_EXT.1": 2, "FPT_SKP_EXT.1.1": 1, "FPT_TST_EXT.1": 2, "FPT_TST_EXT.1.1": 1, "FPT_TUD_EXT.1.1": 1, "FPT_TUD_EXT.1.2": 1, "FPT_TUD_EXT.1.3": 1, "FPT_STM.1.1": 1 }, "FTA": { "FTA_SSL_EXT": 4, "FTA_SSL": 4, "FTA_TAB": 2, "FTA_SSL_EXT.1": 5, "FTA_SSL.3": 3, "FTA_SSL.4": 3, "FTA_TAB.1": 3, "FTA_SSL.3.1": 1, "FTA_SSL.4.1": 1, "FTA_TAB.1.1": 1, "FTA_SSL_EXT.1.1": 1 }, "FTP": { "FTP_ITC": 3, "FTP_TRP": 2, "FTP_ITC.1": 4, "FTP_TRP.1": 3, "FTP_ITC.1.1": 1, "FTP_ITC.1.2": 1, "FTP_ITC.1.3": 1, "FTP_TRP.1.1": 1, "FTP_TRP.1.2": 1, "FTP_TRP.1.3": 1 } }, "cc_claims": { "OE": { "OE.PHYSICAL": 1, "OE.NO_GENERAL_PURPOSE": 1, "OE.NO_THRU_TRAFFIC_PROTECTION": 1, "OE.TRUSTED_ADMIN": 1, "OE.UPDATES": 1, "OE.ADMIN_CREDENTIALS_SECURE": 1 } }, "vendor": {}, "eval_facility": {}, "symmetric_crypto": { "AES_competition": { "AES": { "AES": 14 } }, "constructions": { "MAC": { "HMAC": 5, "HMAC-SHA-256": 2 } } }, "asymmetric_crypto": { "RSA": { "RSA 2048": 2 }, "ECC": { "ECDH": { "ECDHE": 1 } }, "FF": { "DH": { "DH": 2 } } }, "pq_crypto": {}, "hash_function": { "SHA": { "SHA1": { "SHA-1": 3 }, "SHA2": { "SHA-256": 5, "SHA256": 1, "SHA2": 1 } } }, "crypto_scheme": { "MAC": { "MAC": 5 } }, "crypto_protocol": { "SSH": { "SSH": 39 }, "TLS": { "SSL": { "SSL 2.0": 2, "SSL 3.0": 2 }, "TLS": { "TLS": 35, "TLS v1.1": 3, "TLS v1.2": 4, "TLS 1.2": 5, "TLS 1.1": 2, "TLS 1.0": 2 } }, "IPsec": { "IPsec": 4 } }, "randomness": { "PRNG": { "DRBG": 1 }, "RNG": { "RBG": 2 } }, "cipher_mode": { "CBC": { "CBC": 6 } }, "ecc_curve": { "NIST": { "secp521r1": 1 } }, "crypto_engine": {}, "tls_cipher_suite": { "TLS": { "TLS_RSA_WITH_AES_128_CBC_SHA": 4, "TLS_RSA_WITH_AES_256_CBC_SHA": 2 } }, "crypto_library": { "OpenSSL": { "OpenSSL": 8 } }, "vulnerability": {}, "side_channel_analysis": {}, "technical_report_id": {}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": { "FIPS": { "FIPS PUB 186-4": 6 }, "PKCS": { "PKCS #1": 1 }, "RFC": { "RFC5759": 1, "RFC5280": 1, "RFC 2818": 3, "RFC 4253": 2, "RFC 5246": 5, "RFC 3268": 6, "RFC 6125": 2, "RFC 4346": 2, "RFC 5280": 5, "RFC 5759": 2, "RFC 2986": 2, "RFC 4252": 1 }, "ISO": { "ISO/IEC 9796-2": 1, "ISO/IEC 10118-": 1, "ISO/IEC 18031:2011": 4, "ISO/IEC 18031:2011 1218": 1 }, "X509": { "X.509": 16 } }, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": {} }, "cert_keywords": { "cc_cert_id": { "US": { "CCEVS-VR-VID10818-2017": 1 } }, "cc_protection_profile_id": {}, "cc_security_level": {}, "cc_sar": {}, "cc_sfr": {}, "cc_claims": {}, "vendor": {}, "eval_facility": { "Leidos": { "Leidos": 1 } }, "symmetric_crypto": {}, "asymmetric_crypto": {}, "pq_crypto": {}, "hash_function": {}, "crypto_scheme": {}, "crypto_protocol": {}, "randomness": {}, "cipher_mode": {}, "ecc_curve": {}, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": {}, "technical_report_id": {}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": {}, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": {} }, "report_filename": "st_vid10818-vr.pdf", "st_filename": "st_vid10818-st.pdf", "cert_filename": "st_vid10818-ci.pdf" }, "heuristics": { "_type": "sec_certs.sample.cc.CCCertificate.Heuristics", "extracted_versions": { "_type": "set", "_value": [ "2.1" ] }, "cpe_matches": null, "verified_cpe_matches": null, "related_cves": null, "cert_lab": [ "US" ], "cert_id": "CCEVS-VR-VID-10818-2017", "st_references": { "_type": "sec_certs.sample.certificate.References", "directly_referenced_by": null, "indirectly_referenced_by": null, "directly_referencing": null, "indirectly_referencing": null }, "report_references": { "_type": "sec_certs.sample.certificate.References", "directly_referenced_by": null, "indirectly_referenced_by": null, "directly_referencing": null, "indirectly_referencing": null }, "annotated_references": null, "extracted_sars": { "_type": "set", "_value": [ { "_type": "sec_certs.sample.sar.SAR", "family": "ATE_IND", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_INT", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_ECD", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AGD_PRE", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AVA_VAN", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_OBJ", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_TSS", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ADV_FSP", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_CCL", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_CMC", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_SPD", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AGD_OPE", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_CMS", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_REQ", "level": 1 } ] }, "direct_transitive_cves": null, "indirect_transitive_cves": null, "scheme_data": { "product": "AhnLab MDS, MDS with MTA, and MDS Manager v2.1", "id": "CCEVS-VR-VID10818", "url": "https://www.niap-ccevs.org/product/10818", "certification_date": "2017-05-08T00:00:00Z", "expiration_date": "2019-05-08T00:00:00Z", "category": "Network Device", "vendor": "AhnLab", "evaluation_facility": "Leidos Common Criteria Testing Laboratory", "scheme": "US" } }, "_id": "9628d00ce6f61640" } }, { "_id": { "$oid": "66ba44469466f60634174d83" }, "run_id": { "$oid": "66ba432a9466f606341743a8" }, "dgst": "9628d00ce6f61640", "timestamp": { "$date": "2024-08-12T12:00:07.61Z" }, "type": "change", "diff": { "__update__": { "state": { "__update__": { "cert": { "__update__": { "download_ok": false, "convert_garbage": false, "convert_ok": false, "extract_ok": false, "pdf_hash": null, "txt_hash": null } } } }, "pdf_data": { "__update__": { "cert_metadata": null, "cert_keywords": null, "cert_filename": null } } } } }, { "_id": { "$oid": "66c0a10b1c78507fd10608a5" }, "run_id": { "$oid": "66c0a0e21c78507fd105fc06" }, "dgst": "9628d00ce6f61640", "timestamp": { "$date": "2024-08-17T12:52:18.171Z" }, "type": "change", "diff": { "__update__": { "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10818-vr.pdf", "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10818-st.pdf", "state": { "__update__": { "report": { "__update__": { "download_ok": false, "convert_ok": false, "extract_ok": false, "pdf_hash": null, "txt_hash": null } }, "st": { "__update__": { "download_ok": false, "convert_ok": false, "extract_ok": false, "pdf_hash": null, "txt_hash": null } } } }, "pdf_data": { "__update__": { "report_metadata": null, "st_metadata": null, "report_frontpage": null, "report_keywords": null, "st_keywords": null, "report_filename": null, "st_filename": null } }, "heuristics": { "__update__": { "cert_lab": null, "cert_id": null, "extracted_sars": null } } } } }, { "_id": { "$oid": "66c7affd2ff8c812f518ce72" }, "run_id": { "$oid": "66c7afc82ff8c812f518b966" }, "dgst": "9628d00ce6f61640", "timestamp": { "$date": "2024-08-22T18:04:48.021Z" }, "type": "change", "diff": { "__update__": { "state": { "__update__": { "report": { "__update__": { "download_ok": true, "convert_ok": true, "extract_ok": true, "pdf_hash": "6900408c92dbd88ced9b2d5caa7089a6ff4911c9d8130f1896734953972eaecb", "txt_hash": "ae82395ac3623adeb01030433a768beacc1cc4510aa964b33b9bb4b3eabb58f1" } }, "st": { "__update__": { "download_ok": true, "convert_ok": true, "extract_ok": true, "pdf_hash": "8cb071786715c1b6a51f512f6106ceb650e28d083a971529d1c04d52d0424cb1", "txt_hash": "a6b17d5491e2f0c12a49d751bf91d5b20b65772b0c804df6a512909b5956afba" } }, "cert": { "__update__": { "download_ok": true, "convert_garbage": true, "convert_ok": true, "extract_ok": true, "pdf_hash": "39455bc4e95c015a9e19aa537f6578735f2b9d920b3d31157080f2c772eae0f2", "txt_hash": "f4341e76ec140e33941c937297602a8b0cf1297296a86bda1cefec934d7b4b1d" } } } }, "pdf_data": { "__update__": { "report_metadata": { "pdf_file_size_bytes": 573508, "pdf_is_encrypted": false, "pdf_number_of_pages": 24, "/CreationDate": "D:20170511160200-04'00'", "/ModDate": "D:20170511160200-04'00'", "pdf_hyperlinks": { "_type": "set", "_value": [ "http://www.niap-ccevs.org/" ] } }, "st_metadata": { "pdf_file_size_bytes": 1343585, "pdf_is_encrypted": false, "pdf_number_of_pages": 41, "/CreationDate": "D:20190122142723-05'00'", "/ModDate": "D:20190122142723-05'00'", "pdf_hyperlinks": { "_type": "set", "_value": [] } }, "cert_metadata": { "pdf_file_size_bytes": 176877, "pdf_is_encrypted": false, "pdf_number_of_pages": 1, "/Producer": "iText 2.1.0 (by lowagie.com)", "/ModDate": "D:20170512081917-04'00'", "/CreationDate": "D:20170512081917-04'00'", "pdf_hyperlinks": { "_type": "set", "_value": [] } }, "report_frontpage": { "US": { "cert_id": "CCEVS-VR-VID10818-2017", "cert_item": "for AhnLab MDS, MDS with MTA, and MDS Manager V2.1", "cert_lab": "US NIAP" } }, "report_keywords": { "cc_cert_id": { "US": { "CCEVS-VR-VID10818-2017": 1 } }, "cc_protection_profile_id": {}, "cc_security_level": {}, "cc_sar": { "ADV": { "ADV_FSP.1": 1 }, "AGD": { "AGD_OPE.1": 1, "AGD_PRE.1": 1 }, "ALC": { "ALC_CMC.1": 1, "ALC_CMS.1": 1 }, "ATE": { "ATE_IND.1": 1 }, "AVA": { "AVA_VAN.1": 1 } }, "cc_sfr": { "FAU": { "FAU_STG.1": 4 }, "FCS": { "FCS_SSHS_EXT.1": 4, "FCS_TLSC_EXT.2": 4, "FCS_TLSS_EXT.1": 4, "FCS_CKM.1": 1, "FCS_TLSS_EXT": 1 }, "FMT": { "FMT_SMF.1.1": 1 } }, "cc_claims": {}, "vendor": {}, "eval_facility": { "Leidos": { "Leidos": 8 } }, "symmetric_crypto": {}, "asymmetric_crypto": { "ECC": { "ECDH": { "ECDHE": 1 } }, "FF": { "DH": { "DH": 1 } } }, "pq_crypto": {}, "hash_function": {}, "crypto_scheme": {}, "crypto_protocol": { "SSH": { "SSH": 9 }, "TLS": { "TLS": { "TLS": 8, "TLS v1.1": 1, "TLS v1.2": 1 } }, "IPsec": { "IPsec": 2 } }, "randomness": {}, "cipher_mode": {}, "ecc_curve": { "NIST": { "secp521r1": 1 } }, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": {}, "technical_report_id": {}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": { "RFC": { "RFC5759": 1, "RFC5280": 1 }, "X509": { "X.509": 6 } }, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": {} }, "st_keywords": { "cc_cert_id": {}, "cc_protection_profile_id": {}, "cc_security_level": {}, "cc_sar": { "ADV": { "ADV_FSP.1": 1 }, "AGD": { "AGD_OPE": 1, "AGD_PRE": 1 }, "ALC": { "ALC_CMC.1": 1, "ALC_CMS.1": 1 }, "ATE": { "ATE_IND.1": 1 }, "AVA": { "AVA_VAN.1": 1 }, "ASE": { "ASE_CCL.1": 1, "ASE_ECD.1": 1, "ASE_INT.1": 1, "ASE_OBJ.1": 1, "ASE_REQ.1": 1, "ASE_SPD.1": 1, "ASE_TSS.1": 1 } }, "cc_sfr": { "FAU": { "FAU_GEN": 5, "FAU_STG.1": 4, "FAU_STG_EXT": 3, "FAU_STG": 2, "FAU_GEN.1": 2, "FAU_GEN.1.1": 1, "FAU_GEN.1.2": 1, "FAU_GEN.2": 2, "FAU_GEN.2.1": 1, "FAU_STG.1.1": 2, "FAU_STG_EXT.1": 2, "FAU_STG_EXT.1.1": 1, "FAU_STG_EXT.1.2": 1, "FAU_STG_EXT.1.3": 1 }, "FCS": { "FCS_SSHS_EXT.1": 7, "FCS_TLSC_EXT.2": 5, "FCS_TLSS_EXT.1": 6, "FCS_CKM.1": 3, "FCS_TLSS_EXT": 4, "FCS_RBG_EXT": 2, "FCS_SSHS_EXT": 3, "FCS_TLSC_EXT": 3, "FCS_CKM": 6, "FCS_COP.1": 16, "FCS_CKM.1.1": 1, "FCS_CKM.2": 2, "FCS_CKM.2.1": 1, "FCS_CKM.4": 3, "FCS_COP.1.1": 4, "FCS_RBG_EXT.1": 3, "FCS_RBG_EXT.1.1": 1, "FCS_RBG_EXT.1.2": 1, "FCS_SSHS_EXT.1.1": 1, "FCS_SSHS_EXT.1.2": 1, "FCS_SSHS_EXT.1.3": 1, "FCS_SSHS_EXT.1.4": 1, "FCS_SSHS_EXT.1.5": 1, "FCS_SSHS_EXT.1.6": 1, "FCS_SSHS_EXT.1.7": 1, "FCS_TLSC_EXT.2.1": 1, "FCS_TLSC_EXT.2.2": 1, "FCS_TLSC_EXT.2.3": 1, "FCS_TLSC_EXT.2.4": 1, "FCS_TLSC_EXT.2.5": 1, "FCS_TLSS_EXT.1.1": 1, "FCS_TLSS_EXT.1.3": 1 }, "FDP": { "FDP_ACC.1": 3 }, "FIA": { "FIA_PMG_EXT.1": 4, "FIA_PMG_EXT": 2, "FIA_UIA_EXT": 3, "FIA_UAU_EXT": 3, "FIA_UAU": 2, "FIA_UIA_EXT.1": 3, "FIA_UAU_EXT.2": 3, "FIA_PMG_EXT.1.1": 1, "FIA_UIA_EXT.1.1": 1, "FIA_UIA_EXT.1.2": 1, "FIA_UAU_EXT.2.1": 1, "FIA_UAU.7": 2, "FIA_UAU.7.1": 1 }, "FMT": { "FMT_SMF.1.1": 3, "FMT_MOF.1": 4, "FMT_MTD": 2, "FMT_SMF": 2, "FMT_SMR": 2, "FMT_MTD.1": 3, "FMT_MOF.1.1": 2, "FMT_MTD.1.1": 1, "FMT_SMF.1": 3, "FMT_SMR.2": 2, "FMT_SMR.2.1": 1, "FMT_SMR.2.2": 1, "FMT_SMR.2.3": 1 }, "FPT": { "FPT_APW_EXT": 4, "FPT_SKP_EXT": 3, "FPT_TST_EXT": 3, "FPT_TUD_EXT": 3, "FPT_STM": 2, "FPT_STM.1": 3, "FPT_TUD_EXT.1": 3, "FPT_APW_EXT.1": 2, "FPT_APW_EXT.1.1": 1, "FPT_APW_EXT.1.2": 1, "FPT_SKP_EXT.1": 2, "FPT_SKP_EXT.1.1": 1, "FPT_TST_EXT.1": 2, "FPT_TST_EXT.1.1": 1, "FPT_TUD_EXT.1.1": 1, "FPT_TUD_EXT.1.2": 1, "FPT_TUD_EXT.1.3": 1, "FPT_STM.1.1": 1 }, "FTA": { "FTA_SSL_EXT": 4, "FTA_SSL": 4, "FTA_TAB": 2, "FTA_SSL_EXT.1": 5, "FTA_SSL.3": 3, "FTA_SSL.4": 3, "FTA_TAB.1": 3, "FTA_SSL.3.1": 1, "FTA_SSL.4.1": 1, "FTA_TAB.1.1": 1, "FTA_SSL_EXT.1.1": 1 }, "FTP": { "FTP_ITC": 3, "FTP_TRP": 2, "FTP_ITC.1": 4, "FTP_TRP.1": 3, "FTP_ITC.1.1": 1, "FTP_ITC.1.2": 1, "FTP_ITC.1.3": 1, "FTP_TRP.1.1": 1, "FTP_TRP.1.2": 1, "FTP_TRP.1.3": 1 } }, "cc_claims": { "OE": { "OE.PHYSICAL": 1, "OE.NO_GENERAL_PURPOSE": 1, "OE.NO_THRU_TRAFFIC_PROTECTION": 1, "OE.TRUSTED_ADMIN": 1, "OE.UPDATES": 1, "OE.ADMIN_CREDENTIALS_SECURE": 1 } }, "vendor": {}, "eval_facility": {}, "symmetric_crypto": { "AES_competition": { "AES": { "AES": 14 } }, "constructions": { "MAC": { "HMAC": 5, "HMAC-SHA-256": 2 } } }, "asymmetric_crypto": { "RSA": { "RSA 2048": 2 }, "ECC": { "ECDH": { "ECDHE": 1 } }, "FF": { "DH": { "DH": 2 } } }, "pq_crypto": {}, "hash_function": { "SHA": { "SHA1": { "SHA-1": 3 }, "SHA2": { "SHA-256": 5, "SHA256": 1, "SHA2": 1 } } }, "crypto_scheme": { "MAC": { "MAC": 5 } }, "crypto_protocol": { "SSH": { "SSH": 39 }, "TLS": { "SSL": { "SSL 2.0": 2, "SSL 3.0": 2 }, "TLS": { "TLS": 35, "TLS v1.1": 3, "TLS v1.2": 4, "TLS 1.2": 5, "TLS 1.1": 2, "TLS 1.0": 2 } }, "IPsec": { "IPsec": 4 } }, "randomness": { "PRNG": { "DRBG": 1 }, "RNG": { "RBG": 2 } }, "cipher_mode": { "CBC": { "CBC": 6 } }, "ecc_curve": { "NIST": { "secp521r1": 1 } }, "crypto_engine": {}, "tls_cipher_suite": { "TLS": { "TLS_RSA_WITH_AES_128_CBC_SHA": 4, "TLS_RSA_WITH_AES_256_CBC_SHA": 2 } }, "crypto_library": { "OpenSSL": { "OpenSSL": 8 } }, "vulnerability": {}, "side_channel_analysis": {}, "technical_report_id": {}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": { "FIPS": { "FIPS PUB 186-4": 6 }, "PKCS": { "PKCS #1": 1 }, "RFC": { "RFC5759": 1, "RFC5280": 1, "RFC 2818": 3, "RFC 4253": 2, "RFC 5246": 5, "RFC 3268": 6, "RFC 6125": 2, "RFC 4346": 2, "RFC 5280": 5, "RFC 5759": 2, "RFC 2986": 2, "RFC 4252": 1 }, "ISO": { "ISO/IEC 9796-2": 1, "ISO/IEC 10118-": 1, "ISO/IEC 18031:2011": 4, "ISO/IEC 18031:2011 1218": 1 }, "X509": { "X.509": 16 } }, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": {} }, "cert_keywords": { "cc_cert_id": { "US": { "CCEVS-VR-VID10818-2017": 1 } }, "cc_protection_profile_id": {}, "cc_security_level": {}, "cc_sar": {}, "cc_sfr": {}, "cc_claims": {}, "vendor": {}, "eval_facility": { "Leidos": { "Leidos": 1 } }, "symmetric_crypto": {}, "asymmetric_crypto": {}, "pq_crypto": {}, "hash_function": {}, "crypto_scheme": {}, "crypto_protocol": {}, "randomness": {}, "cipher_mode": {}, "ecc_curve": {}, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": {}, "technical_report_id": {}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": {}, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": {} }, "report_filename": "st_vid10818-vr.pdf", "st_filename": "st_vid10818-st.pdf", "cert_filename": "st_vid10818-ci.pdf" } }, "heuristics": { "__update__": { "cert_lab": [ "US" ], "cert_id": "CCEVS-VR-VID-10818-2017", "extracted_sars": { "_type": "set", "_value": [ { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_CMC", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_CCL", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ADV_FSP", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_OBJ", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_SPD", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AVA_VAN", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_CMS", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AGD_PRE", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_REQ", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AGD_OPE", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_ECD", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ATE_IND", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_TSS", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_INT", "level": 1 } ] } } } } } }, { "_id": { "$oid": "67113c70700c28def2a9768b" }, "run_id": { "$oid": "67113c29700c28def2a97449" }, "dgst": "9628d00ce6f61640", "timestamp": { "$date": "2024-10-17T11:26:45.075Z" }, "type": "change", "diff": { "__update__": { "maintenance_updates": { "_type": "set", "_value": [ { "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport", "maintenance_date": { "_type": "date", "_value": "2019-01-16" }, "maintenance_title": "Maintenance Update of AhnLab MDS, MDS with MTA, and MDS Manager V2.1", "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10818-add4.pdf", "maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10818-st.pdf" }, { "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport", "maintenance_date": { "_type": "date", "_value": "2017-06-30" }, "maintenance_title": "Maintenance Update of AhnLab MDS, MDS with MTA, and MDS Manager V2.1 for MDS 4000 and MDS 8000", "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10818-add1.pdf", "maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10818-st.pdf" } ] } } } }, { "_id": { "$oid": "672ffc06fb882d74835eb014" }, "run_id": { "$oid": "672ffba8fb882d74835eae78" }, "dgst": "9628d00ce6f61640", "timestamp": { "$date": "2024-11-09T17:43:21.303Z" }, "type": "change", "diff": { "__update__": { "heuristics": { "__update__": { "scheme_data": { "__update__": { "certification_date": { "_type": "date", "_value": "2017-05-08" }, "expiration_date": { "_type": "date", "_value": "2019-05-08" } } } } } } } }, { "_id": { "$oid": "673f6585a1452c910a80cbae" }, "run_id": { "$oid": "673f6538a1452c910a80b5ad" }, "dgst": "9628d00ce6f61640", "timestamp": { "$date": "2024-11-21T11:03:40.77Z" }, "type": "change", "diff": { "__update__": { "heuristics": { "__insert__": { "prev_certificates": [], "next_certificates": [] } } } } }, { "_id": { "$oid": "67572cbfe54d5dd1c4cb6cfe" }, "run_id": { "$oid": "67572c76e54d5dd1c4cb688c" }, "dgst": "9628d00ce6f61640", "timestamp": { "$date": "2024-12-09T12:00:03.127Z" }, "type": "change", "diff": { "__update__": { "heuristics": { "__update__": { "scheme_data": null } } } } }, { "_id": { "$oid": "676071d3e54d5dd1c4cb7553" }, "run_id": { "$oid": "67607184e54d5dd1c4cb70e4" }, "dgst": "9628d00ce6f61640", "timestamp": { "$date": "2024-12-16T12:00:01.445Z" }, "type": "change", "diff": { "__update__": { "heuristics": { "__update__": { "scheme_data": { "product": "AhnLab MDS, MDS with MTA, and MDS Manager v2.1", "id": "CCEVS-VR-VID10818", "url": "https://www.niap-ccevs.org/product/10818", "certification_date": { "_type": "date", "_value": "2017-05-08" }, "expiration_date": { "_type": "date", "_value": "2019-05-08" }, "category": "Network Device", "vendor": "AhnLab", "evaluation_facility": "Leidos Common Criteria Testing Laboratory", "scheme": "US" } } } } } }, { "_id": { "$oid": "6772ddb1f2031bf1fe70bd81" }, "run_id": { "$oid": "6772dd6df2031bf1fe70bb44" }, "dgst": "9628d00ce6f61640", "timestamp": { "$date": "2024-12-30T12:00:01.588Z" }, "type": "change", "diff": { "__update__": { "heuristics": { "__update__": { "scheme_data": null } } } } }, { "_id": { "$oid": "677c179be54d5dd1c4cb7e45" }, "run_id": { "$oid": "677c1753e54d5dd1c4cb79d9" }, "dgst": "9628d00ce6f61640", "timestamp": { "$date": "2025-01-06T12:00:01.435Z" }, "type": "change", "diff": { "__update__": { "heuristics": { "__update__": { "scheme_data": { "product": "AhnLab MDS, MDS with MTA, and MDS Manager v2.1", "id": "CCEVS-VR-VID10818", "url": "https://www.niap-ccevs.org/product/10818", "certification_date": { "_type": "date", "_value": "2017-05-08" }, "expiration_date": { "_type": "date", "_value": "2019-05-08" }, "category": "Network Device", "vendor": "AhnLab", "evaluation_facility": "Leidos Common Criteria Testing Laboratory", "scheme": "US" } } } } } }, { "_id": { "$oid": "67a4087c6161883953270377" }, "run_id": { "$oid": "67a4080e616188395327018d" }, "dgst": "9628d00ce6f61640", "timestamp": { "$date": "2025-02-05T18:04:55.043Z" }, "type": "change", "diff": { "__insert__": { "protection_profile_links": { "_type": "set", "_value": [ "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V1.0.pdf" ] } }, "__update__": { "state": { "__update__": { "report": { "__update__": { "_type": "sec_certs.sample.document_state.DocumentState" } }, "st": { "__update__": { "_type": "sec_certs.sample.document_state.DocumentState" } }, "cert": { "__update__": { "_type": "sec_certs.sample.document_state.DocumentState" } } } }, "heuristics": { "__insert__": { "protection_profiles": { "_type": "set", "_value": [ "c7cf611c6bb1e4b0" ] }, "eal": null }, "__update__": { "prev_certificates": null, "next_certificates": null, "scheme_data": null } } }, "__delete__": [ "protection_profiles" ] } }, { "_id": { "$oid": "67aa459ed14b3692bb806fa1" }, "run_id": { "$oid": "67aa4548d14b3692bb806e73" }, "dgst": "9628d00ce6f61640", "timestamp": { "$date": "2025-02-10T12:00:00.586Z" }, "type": "change", "diff": { "__update__": { "heuristics": { "__update__": { "scheme_data": { "product": "AhnLab MDS, MDS with MTA, and MDS Manager v2.1", "id": "CCEVS-VR-VID10818", "url": "https://www.niap-ccevs.org/product/10818", "certification_date": { "_type": "date", "_value": "2017-05-08" }, "expiration_date": { "_type": "date", "_value": "2019-05-08" }, "category": "Network Device", "vendor": "AhnLab", "evaluation_facility": "Leidos Common Criteria Testing Laboratory", "scheme": "US" } } } } } }, { "_id": { "$oid": "67eec0677557876db2c02ea1" }, "run_id": { "$oid": "67eebff77557876db2c02cde" }, "dgst": "9628d00ce6f61640", "timestamp": { "$date": "2025-04-03T09:18:42.399Z" }, "type": "change", "diff": { "__update__": { "pdf_data": { "__update__": { "report_keywords": { "__update__": { "crypto_protocol": { "__update__": { "SSH": { "__insert__": { "SSHv2": 2 } } } } } }, "st_keywords": { "__update__": { "crypto_protocol": { "__update__": { "SSH": { "__insert__": { "SSHv2": 7 } } } } } } } } } } }, { "_id": { "$oid": "68223522330129f1379726e6" }, "run_id": { "$oid": "682234eb330129f137972551" }, "dgst": "9628d00ce6f61640", "timestamp": { "$date": "2025-05-12T12:00:01.455Z" }, "type": "change", "diff": { "__update__": { "heuristics": { "__update__": { "scheme_data": null } } } } }, { "_id": { "$oid": "66e84cf5ba28c1f98af473eb" }, "run_id": { "$oid": "66e84cf5ba28c1f98af473e8" }, "dgst": "dba20653348d0d12", "timestamp": { "$date": "2024-09-16T12:00:01.234Z" }, "type": "new", "diff": { "_type": "sec_certs.sample.cc.CCCertificate", "dgst": "dba20653348d0d12", "status": "active", "category": "Network and Network-Related Devices and Systems", "name": "SonicWall Secure Mobile Access (SMA) v12.4", "manufacturer": "SonicWALL, Inc", "scheme": "US", "security_level": { "_type": "set", "_value": [] }, "not_valid_before": { "_type": "date", "_value": "2024-08-14" }, "not_valid_after": { "_type": "date", "_value": "2026-08-14" }, "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11527-vr.pdf", "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11527-st.pdf", "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11527-ci_signed.pdf", "manufacturer_web": "https://www.sonicwall.com/", "protection_profiles": { "_type": "set", "_value": [ { "_type": "sec_certs.sample.protection_profile.ProtectionProfile", "pp_name": "collaborative Protection Profile for Network Devices v2.2e", "pp_eal": null, "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.2E.pdf", "pp_ids": null } ] }, "maintenance_updates": { "_type": "set", "_value": [] }, "state": { "_type": "sec_certs.sample.cc.CCCertificate.InternalState", "report": { "_type": "sec_certs.sample.cc.CCCertificate.DocumentState", "download_ok": false, "convert_garbage": false, "convert_ok": false, "extract_ok": false, "pdf_hash": null, "txt_hash": null }, "st": { "_type": "sec_certs.sample.cc.CCCertificate.DocumentState", "download_ok": false, "convert_garbage": false, "convert_ok": false, "extract_ok": false, "pdf_hash": null, "txt_hash": null }, "cert": { "_type": "sec_certs.sample.cc.CCCertificate.DocumentState", "download_ok": false, "convert_garbage": false, "convert_ok": false, "extract_ok": false, "pdf_hash": null, "txt_hash": null } }, "pdf_data": { "_type": "sec_certs.sample.cc.CCCertificate.PdfData", "report_metadata": null, "st_metadata": null, "cert_metadata": null, "report_frontpage": null, "st_frontpage": null, "cert_frontpage": null, "report_keywords": null, "st_keywords": null, "cert_keywords": null, "report_filename": null, "st_filename": null, "cert_filename": null }, "heuristics": { "_type": "sec_certs.sample.cc.CCCertificate.Heuristics", "extracted_versions": { "_type": "set", "_value": [ "12.4" ] }, "cpe_matches": null, "verified_cpe_matches": null, "related_cves": null, "cert_lab": null, "cert_id": null, "st_references": { "_type": "sec_certs.sample.certificate.References", "directly_referenced_by": null, "indirectly_referenced_by": null, "directly_referencing": null, "indirectly_referencing": null }, "report_references": { "_type": "sec_certs.sample.certificate.References", "directly_referenced_by": null, "indirectly_referenced_by": null, "directly_referencing": null, "indirectly_referencing": null }, "annotated_references": null, "extracted_sars": null, "direct_transitive_cves": null, "indirect_transitive_cves": null, "scheme_data": { "product": "SonicWall Secure Mobile Access (SMA) v12.4", "id": "CCEVS-VR-VID11527-2024", "url": "https://www.niap-ccevs.org/product/11527", "certification_date": "2024-08-14T00:00:00Z", "expiration_date": null, "category": "Network Device", "vendor": "SonicWall, Inc.", "evaluation_facility": "DEKRA Cybersecurity Certification Laboratory", "scheme": "US", "target_link": "https://www.niap-ccevs.org/api/file/get_public_file/?file_id=31324", "report_link": "https://www.niap-ccevs.org/api/file/get_public_file/?file_id=31325", "cert_link": "https://www.niap-ccevs.org/api/file/get_public_file/?file_id=31327" } }, "_id": "dba20653348d0d12" } }, { "_id": { "$oid": "66fb219957e77cef5531f1db" }, "run_id": { "$oid": "66fb214d57e77cef5531f166" }, "dgst": "dba20653348d0d12", "timestamp": { "$date": "2024-09-30T12:00:02.794Z" }, "type": "change", "diff": { "__update__": { "state": { "__update__": { "report": { "__update__": { "download_ok": true, "convert_ok": true, "extract_ok": true, "pdf_hash": "089411731eb98ce7d5db0a412ad0c2454a5879ce69cbf14f4ad8a6835ff51150", "txt_hash": "ed68d88a4f19c0647798f9f3310b65fdd08ede647d1811214b7b27719d008e58" } }, "st": { "__update__": { "download_ok": true, "convert_ok": true, "extract_ok": true, "pdf_hash": "fbc9605c42f92dbaba8fc84b282b8fcea7376b123b0c9a646d59835df7690899", "txt_hash": "ec775d534c9d647b4aff65b2835e9ef67c77f7e843c3fc7b47e2e32f099c2a57" } }, "cert": { "__update__": { "download_ok": true, "convert_garbage": true, "convert_ok": true, "extract_ok": true, "pdf_hash": "85ea73592ba0bef4cac8117e97fdfb1ecb6d73cdf906fb00243a561cc3d87795", "txt_hash": "5d8b4031853238bb052f2555556d0aaae45170f6cff56c3786e13e8e5c227739" } } } }, "pdf_data": { "__update__": { "report_metadata": { "pdf_file_size_bytes": 408641, "pdf_is_encrypted": false, "pdf_number_of_pages": 29, "/Author": "Fathi Nasraoui", "/CreationDate": "D:20240909111159-04'00'", "/Creator": "Microsoft® Word 2019", "/ModDate": "D:20240909112033-04'00'", "/Producer": "Microsoft® Word 2019", "pdf_hyperlinks": { "_type": "set", "_value": [ "https://www.dekra.us/", "https://www.cvedetails.com/vulnerability-search.php", "http://www.niap-ccevs.org/cc-scheme", "https://nvd.nist.gov/vuln" ] } }, "st_metadata": { "pdf_file_size_bytes": 955708, "pdf_is_encrypted": false, "pdf_number_of_pages": 60, "/Producer": "Microsoft® Word for Microsoft 365", "/Creator": "Microsoft® Word for Microsoft 365", "/CreationDate": "D:20240829131311-04'00'", "/ModDate": "D:20240829131311-04'00'", "pdf_hyperlinks": { "_type": "set", "_value": [ "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=37781", "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=37782" ] } }, "cert_metadata": { "pdf_file_size_bytes": 170249, "pdf_is_encrypted": false, "pdf_number_of_pages": 1, "/CreationDate": "D:20240909112659-04'00'", "/ModDate": "D:20240909112659-04'00'", "/Producer": "WeasyPrint 62.3", "/Title": "SonicWall Secure Mobile Access (SMA) v12.4", "pdf_hyperlinks": { "_type": "set", "_value": [] } }, "report_frontpage": { "US": { "cert_id": "CCEVS-VR-VID11527-2024", "cert_item": "SonicWall SMA v12.4", "cert_lab": "US NIAP" } }, "report_keywords": { "cc_cert_id": { "US": { "CCEVS-VR-VID11527-2024": 1 } }, "cc_protection_profile_id": {}, "cc_security_level": {}, "cc_sar": { "ALC": { "ALC_CMC.1": 1, "ALC_CMS.1": 1 } }, "cc_sfr": {}, "cc_claims": {}, "vendor": { "Microsoft": { "Microsoft": 1 }, "Cisco": { "Cisco": 1 } }, "eval_facility": {}, "symmetric_crypto": {}, "asymmetric_crypto": { "ECC": { "ECC": { "ECC": 1 } } }, "pq_crypto": {}, "hash_function": {}, "crypto_scheme": {}, "crypto_protocol": { "SSH": { "SSH": 1 }, "TLS": { "TLS": { "TLS 1.3": 1, "TLSv1.2": 1, "TLS": 7, "TLS 1.2": 2 } }, "VPN": { "VPN": 2 } }, "randomness": { "PRNG": { "PRNG": 1 } }, "cipher_mode": {}, "ecc_curve": {}, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": { "OpenSSL": { "OpenSSL": 2 } }, "vulnerability": {}, "side_channel_analysis": { "SCA": { "side-channel": 1 } }, "technical_report_id": {}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": { "FIPS": { "FIPS 140-2": 1 } }, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": {} }, "st_keywords": { "cc_cert_id": {}, "cc_protection_profile_id": {}, "cc_security_level": {}, "cc_sar": { "ADV": { "ADV_FSP.1": 1 }, "AGD": { "AGD_OPE.1": 2, "AGD_PRE.1": 1 }, "ALC": { "ALC_CMC.1": 1, "ALC_CMS.1": 1 }, "ATE": { "ATE_IND.1": 1 }, "AVA": { "AVA_VAN": 1, "AVA_VAN.1": 3 }, "ASE": { "ASE_CCL.1": 1, "ASE_ECD.1": 1, "ASE_INT.1": 1, "ASE_OBJ.1": 1, "ASE_REQ.1": 1, "ASE_SPD.1": 1, "ASE_TSS.1": 1 } }, "cc_sfr": { "FAU": { "FAU_GEN.1.2": 4, "FAU_STG_EXT.1": 6, "FAU_GEN.1": 7, "FAU_GEN.2": 4, "FAU_GEN.1.1": 1, "FAU_GEN.2.1": 1, "FAU_STG_EXT.1.1": 1, "FAU_STG_EXT.1.2": 1, "FAU_STG_EXT.1.3": 1 }, "FCS": { "FCS_NTP_EXT.1.4": 1, "FCS_TLSC_EXT.2.3": 1, "FCS_TLSS_EXT.1.4": 9, "FCS_SSHS_EXT.1": 3, "FCS_SSHC_EXT.1": 1, "FCS_CKM.1": 8, "FCS_TLSC_EXT.2": 1, "FCS_TLSC_EXT.1.2": 2, "FCS_RBG_EXT.1": 7, "FCS_TLSS_EXT.1": 7, "FCS_TLSS_EXT.2": 6, "FCS_TLSC_EXT.1": 6, "FCS_CKM.2": 6, "FCS_CKM.4": 5, "FCS_COP": 16, "FCS_CKM.1.1": 1, "FCS_CKM.2.1": 3, "FCS_CKM.4.1": 1, "FCS_COP.1": 5, "FCS_RBG_EXT.1.1": 1, "FCS_RBG_EXT.1.2": 1, "FCS_TLSC_EXT.1.1": 1, "FCS_TLSC_EXT.1.3": 1, "FCS_TLSC_EXT.1.4": 1, "FCS_TLSS_EXT.1.1": 1, "FCS_TLSS_EXT.1.2": 1, "FCS_TLSS_EXT.1.3": 3, "FCS_TLSS_EXT.2.1": 1, "FCS_TLSS_EXT.2.2": 1, "FCS_TLSS_EXT.2.3": 1, "FCS_TLSC_EXT": 2 }, "FIA": { "FIA_AFL.1": 11, "FIA_PMG_EXT.1": 11, "FIA_UIA_EXT.1": 6, "FIA_UAU_EXT.2": 6, "FIA_UAU.7": 5, "FIA_AFL.1.1": 1, "FIA_AFL.1.2": 1, "FIA_PMG_EXT.1.1": 1, "FIA_UIA_EXT.1.1": 1, "FIA_UIA_EXT.1.2": 1, "FIA_UAU_EXT.2.1": 1, "FIA_UAU.7.1": 1, "FIA_UAU.1": 1 }, "FMT": { "FMT_SMF.1": 10, "FMT_MOF": 5, "FMT_MTD": 10, "FMT_SMR.2": 4, "FMT_MOF.1": 1, "FMT_MTD.1": 2, "FMT_SMF.1.1": 1, "FMT_SMR.2.1": 1, "FMT_SMR.2.2": 1, "FMT_SMR.2.3": 1, "FMT_SFM.1": 1 }, "FPT": { "FPT_STM_EXT.1.2": 4, "FPT_SKP_EXT.1": 6, "FPT_APW_EXT.1": 5, "FPT_TST_EXT.1": 6, "FPT_STM_EXT.1": 7, "FPT_TUD_EXT.1": 5, "FPT_SKP_EXT.1.1": 1, "FPT_APW_EXT.1.1": 1, "FPT_APW_EXT.1.2": 1, "FPT_TST_EXT.1.1": 1, "FPT_TUD_EXT.1.1": 1, "FPT_TUD_EXT.1.2": 1, "FPT_TUD_EXT.1.3": 2, "FPT_STM_EXT.1.1": 1, "FPT_ITT.1": 1 }, "FTA": { "FTA_SSL_EXT.1": 6, "FTA_SSL.3": 4, "FTA_SSL.4": 5, "FTA_TAB.1": 5, "FTA_SSL_EXT.1.1": 1, "FTA_SSL.3.1": 1, "FTA_SSL.4.1": 1, "FTA_TAB.1.1": 1 }, "FTP": { "FTP_ITC.1": 9, "FTP_TRP": 4, "FTP_ITC.1.1": 2, "FTP_ITC.1.2": 1, "FTP_ITC.1.3": 1, "FTP_TRP.1": 4, "FTP_STM_EXT.1.2": 1 } }, "cc_claims": { "T": { "T.UNAUTHORIZED_ADMINISTRATOR_ACCESS": 1, "T.WEAK_CRYPTOGRAPHY": 1, "T.UNTRUSTED_COMMUNICATION_CHANNELS": 1, "T.WEAK_AUTHENTICATION_ENDPOINTS": 1, "T.UPDATE_COMPROMISE": 1, "T.UNDETECTED_ACTIVITY": 1, "T.SECURITY_FUNCTIONALITY_COMPROMISE": 1, "T.PASSWORD_CRACKING": 1, "T.SECURITY_FUNCTIONALITY_FAILURE": 1 }, "A": { "A.PHYSICAL_PROTECTION": 1, "A.LIMITED_FUNCTIONALITY": 2, "A.NO_THRU_TRAFFIC_PROTECTION": 1, "A.TRUSTED_ADMINISTRATOR": 1, "A.REGULAR_UPDATES": 1, "A.ADMIN_CREDENTIALS_SECURE": 1, "A.RESIDUAL_INFORMATION": 1, "A.VS_TRUSTED_ADMINISTRATOR": 1, "A.VS_REGULAR_UPDATES": 1, "A.VS_ISOLATION": 1, "A.VS_CORRECT_CONFIGURATION": 1, "A.LIMITED": 1 }, "OE": { "OE.PHYSICAL": 1, "OE.NO_GENERAL_PURPOSE": 1, "OE.NO_THRU_TRAFFIC_PROTECTION": 1, "OE.TRUSTED_ADMIN": 1, "OE.UPDATES": 1, "OE.ADMIN_CREDENTIAL_SECURE": 1, "OE.RESIDUAL_INFORMATION": 1, "OE.VM_CONFIGURATION": 1 } }, "vendor": { "Microsoft": { "Microsoft": 1 }, "Cisco": { "Cisco": 1 } }, "eval_facility": { "DEKRA": { "DEKRA Testing and Certification": 1 } }, "symmetric_crypto": { "AES_competition": { "AES": { "AES": 8, "AES-256": 1 } }, "constructions": { "MAC": { "HMAC": 3, "HMAC-SHA-256": 1 } } }, "asymmetric_crypto": { "ECC": { "ECDH": { "ECDHE": 3 }, "ECDSA": { "ECDSA": 5 }, "ECC": { "ECC": 2 } }, "FF": { "DH": { "DH": 1, "Diffie-Hellman": 5, "DHE": 1 } } }, "pq_crypto": {}, "hash_function": { "SHA": { "SHA1": { "SHA-1": 2, "SHA1": 1 }, "SHA2": { "SHA-256": 4, "SHA-384": 2, "SHA256": 3 } } }, "crypto_scheme": { "MAC": { "MAC": 1 }, "KEX": { "Key Exchange": 1 }, "KA": { "Key Agreement": 1 } }, "crypto_protocol": { "SSH": { "SSH": 4 }, "TLS": { "SSL": { "SSL": 2, "SSL 2.0": 1, "SSL 3.0": 1 }, "TLS": { "TLSv1.2": 1, "TLS": 62, "TLS 1.3": 1, "TLS 1.2": 2, "TLS 1.0": 1, "TLS 1.1": 1, "TLS v1.2": 4 }, "DTLS": { "DTLS": 2 } }, "IPsec": { "IPsec": 2 }, "VPN": { "VPN": 13 } }, "randomness": { "TRNG": { "TRNG": 1 }, "PRNG": { "PRNG": 3, "DRBG": 3 }, "RNG": { "RBG": 1 } }, "cipher_mode": { "CBC": { "CBC": 4 }, "GCM": { "GCM": 3 } }, "ecc_curve": { "NIST": { "P-256": 8, "P-384": 10, "secp256r1": 5, "secp384r1": 5 } }, "crypto_engine": {}, "tls_cipher_suite": { "TLS": { "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256": 3, "TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384": 3, "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": 3, "TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384": 3, "TLS_DHE_RSA_WITH_AES_128_CBC_SHA": 1 } }, "crypto_library": { "OpenSSL": { "OpenSSL": 3 } }, "vulnerability": {}, "side_channel_analysis": {}, "technical_report_id": {}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": { "FIPS": { "FIPS 140-2": 2, "FIPS PUB 186-4": 5, "FIPS PUB 140-2": 1, "FIPS186-4": 1, "FIPS 186-4": 1, "FIPS PUB 197": 1, "FIPS 180-4": 1, "FIPS 198": 1 }, "NIST": { "NIST SP 800-90A": 1 }, "PKCS": { "PKCS #1": 1 }, "RFC": { "RFC 5077": 7, "RFC 5246": 4, "RFC 5289": 8, "RFC 6125": 3, "RFC 5280": 3, "RFC 6960": 1, "RFC 2986": 2, "RFC 5424": 1, "RFC 3986": 2 }, "ISO": { "ISO/IEC 9796-2": 1, "ISO/IEC 14888-3": 1, "ISO/IEC 18031:2011": 2 }, "X509": { "X.509": 17 }, "CC": { "CCMB-2017-04-002": 2, "CCMB-2017-04-003": 1 } }, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": {} }, "cert_keywords": { "cc_cert_id": { "US": { "CCEVS-VR-VID11527-2024": 1 } }, "cc_protection_profile_id": {}, "cc_security_level": {}, "cc_sar": {}, "cc_sfr": {}, "cc_claims": {}, "vendor": {}, "eval_facility": {}, "symmetric_crypto": {}, "asymmetric_crypto": {}, "pq_crypto": {}, "hash_function": {}, "crypto_scheme": {}, "crypto_protocol": {}, "randomness": {}, "cipher_mode": {}, "ecc_curve": {}, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": {}, "technical_report_id": {}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": {}, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": {} }, "report_filename": "st_vid11527-vr.pdf", "st_filename": "st_vid11527-st.pdf", "cert_filename": "st_vid11527-ci_signed.pdf" } }, "heuristics": { "__update__": { "cert_lab": [ "US" ], "cert_id": "CCEVS-VR-VID-11527-2024", "extracted_sars": { "_type": "set", "_value": [ { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_SPD", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_CCL", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_ECD", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_INT", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_TSS", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AGD_OPE", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_OBJ", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_REQ", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AGD_PRE", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_CMC", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ADV_FSP", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AVA_VAN", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_CMS", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ATE_IND", "level": 1 } ] } } } } } }, { "_id": { "$oid": "672ffc06fb882d74835eb342" }, "run_id": { "$oid": "672ffba8fb882d74835eae78" }, "dgst": "dba20653348d0d12", "timestamp": { "$date": "2024-11-09T17:43:21.303Z" }, "type": "change", "diff": { "__update__": { "heuristics": { "__update__": { "scheme_data": { "__update__": { "certification_date": { "_type": "date", "_value": "2024-08-14" } } } } } } } }, { "_id": { "$oid": "673f6585a1452c910a80b8d7" }, "run_id": { "$oid": "673f6538a1452c910a80b5ad" }, "dgst": "dba20653348d0d12", "timestamp": { "$date": "2024-11-21T11:03:40.77Z" }, "type": "change", "diff": { "__update__": { "heuristics": { "__insert__": { "prev_certificates": [], "next_certificates": [] } } } } }, { "_id": { "$oid": "67572cbfe54d5dd1c4cb6c6d" }, "run_id": { "$oid": "67572c76e54d5dd1c4cb688c" }, "dgst": "dba20653348d0d12", "timestamp": { "$date": "2024-12-09T12:00:03.127Z" }, "type": "change", "diff": { "__update__": { "heuristics": { "__update__": { "scheme_data": null } } } } }, { "_id": { "$oid": "676071d3e54d5dd1c4cb74c1" }, "run_id": { "$oid": "67607184e54d5dd1c4cb70e4" }, "dgst": "dba20653348d0d12", "timestamp": { "$date": "2024-12-16T12:00:01.445Z" }, "type": "change", "diff": { "__update__": { "heuristics": { "__update__": { "scheme_data": { "product": "SonicWall Secure Mobile Access (SMA) v12.4", "id": "CCEVS-VR-VID11527-2024", "url": "https://www.niap-ccevs.org/product/11527", "certification_date": { "_type": "date", "_value": "2024-08-14" }, "expiration_date": null, "category": "Network Device", "vendor": "SonicWall, Inc.", "evaluation_facility": "DEKRA Cybersecurity Certification Laboratory", "scheme": "US", "target_link": "https://www.niap-ccevs.org/api/file/get_public_file/?file_id=31324", "report_link": "https://www.niap-ccevs.org/api/file/get_public_file/?file_id=31325", "cert_link": "https://www.niap-ccevs.org/api/file/get_public_file/?file_id=31327" } } } } } }, { "_id": { "$oid": "6772ddb1f2031bf1fe70bd33" }, "run_id": { "$oid": "6772dd6df2031bf1fe70bb44" }, "dgst": "dba20653348d0d12", "timestamp": { "$date": "2024-12-30T12:00:01.588Z" }, "type": "change", "diff": { "__update__": { "heuristics": { "__update__": { "scheme_data": null } } } } }, { "_id": { "$oid": "677c179be54d5dd1c4cb7db1" }, "run_id": { "$oid": "677c1753e54d5dd1c4cb79d9" }, "dgst": "dba20653348d0d12", "timestamp": { "$date": "2025-01-06T12:00:01.435Z" }, "type": "change", "diff": { "__update__": { "heuristics": { "__update__": { "scheme_data": { "product": "SonicWall Secure Mobile Access (SMA) v12.4", "id": "CCEVS-VR-VID11527-2024", "url": "https://www.niap-ccevs.org/product/11527", "certification_date": { "_type": "date", "_value": "2024-08-14" }, "expiration_date": null, "category": "Network Device", "vendor": "SonicWall, Inc.", "evaluation_facility": "DEKRA Cybersecurity Certification Laboratory", "scheme": "US", "target_link": "https://www.niap-ccevs.org/api/file/get_public_file/?file_id=31324", "report_link": "https://www.niap-ccevs.org/api/file/get_public_file/?file_id=31325", "cert_link": "https://www.niap-ccevs.org/api/file/get_public_file/?file_id=31327" } } } } } }, { "_id": { "$oid": "67a11af6a24f8a02249f3164" }, "run_id": { "$oid": "67a11a93a24f8a02249f2ef7" }, "dgst": "dba20653348d0d12", "timestamp": { "$date": "2025-02-03T12:00:02.001Z" }, "type": "change", "diff": { "__update__": { "protection_profiles": { "_type": "set", "_value": [ { "_type": "sec_certs.sample.protection_profile.ProtectionProfile", "pp_name": "collaborative Protection Profile for Network Devices Version 2.2e", "pp_eal": null, "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.2E.pdf", "pp_ids": null } ] } } } }, { "_id": { "$oid": "67a4087c6161883953270e17" }, "run_id": { "$oid": "67a4080e616188395327018d" }, "dgst": "dba20653348d0d12", "timestamp": { "$date": "2025-02-05T18:04:55.043Z" }, "type": "change", "diff": { "__insert__": { "protection_profile_links": { "_type": "set", "_value": [ "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.2E.pdf" ] } }, "__update__": { "state": { "__update__": { "report": { "__update__": { "_type": "sec_certs.sample.document_state.DocumentState" } }, "st": { "__update__": { "_type": "sec_certs.sample.document_state.DocumentState" } }, "cert": { "__update__": { "_type": "sec_certs.sample.document_state.DocumentState" } } } }, "heuristics": { "__insert__": { "protection_profiles": { "_type": "set", "_value": [ "c5e4e0af71542101" ] }, "eal": null }, "__update__": { "prev_certificates": null, "next_certificates": null, "scheme_data": null } } }, "__delete__": [ "protection_profiles" ] } }, { "_id": { "$oid": "67aa459ed14b3692bb807614" }, "run_id": { "$oid": "67aa4548d14b3692bb806e73" }, "dgst": "dba20653348d0d12", "timestamp": { "$date": "2025-02-10T12:00:00.586Z" }, "type": "change", "diff": { "__update__": { "heuristics": { "__update__": { "scheme_data": { "product": "SonicWall Secure Mobile Access (SMA) v12.4", "id": "CCEVS-VR-VID11527-2024", "url": "https://www.niap-ccevs.org/product/11527", "certification_date": { "_type": "date", "_value": "2024-08-14" }, "expiration_date": null, "category": "Network Device", "vendor": "SonicWall, Inc.", "evaluation_facility": "DEKRA Cybersecurity Certification Laboratory", "scheme": "US", "target_link": "https://www.niap-ccevs.org/api/file/get_public_file/?file_id=31324", "report_link": "https://www.niap-ccevs.org/api/file/get_public_file/?file_id=31325", "cert_link": "https://www.niap-ccevs.org/api/file/get_public_file/?file_id=31327" } } } } } }, { "_id": { "$oid": "67cf208d7c38a7c9944aabf0" }, "run_id": { "$oid": "67cf20587c38a7c9944aab32" }, "dgst": "dba20653348d0d12", "timestamp": { "$date": "2025-03-10T12:00:02.764Z" }, "type": "change", "diff": { "__update__": { "heuristics": { "__update__": { "protection_profiles": { "_type": "set", "_value": [ "89f2a255423f4a20" ] } } } } } }, { "_id": { "$oid": "68223522330129f137972781" }, "run_id": { "$oid": "682234eb330129f137972551" }, "dgst": "dba20653348d0d12", "timestamp": { "$date": "2025-05-12T12:00:01.455Z" }, "type": "change", "diff": { "__update__": { "heuristics": { "__update__": { "scheme_data": null } } } } }, { "_id": { "$oid": "669f80cd566b7c5a18058ced" }, "run_id": { "$oid": "669f8076566b7c5a1805773d" }, "dgst": "eeff5b346faba43f", "timestamp": { "$date": "2024-07-23T00:09:57.927Z" }, "type": "new", "diff": { "_type": "sec_certs.sample.cc.CCCertificate", "dgst": "eeff5b346faba43f", "status": "archived", "category": "Network and Network-Related Devices and Systems", "name": "SonicWall Secure Mobile Access (SMA) v12.4", "manufacturer": "SonicWALL, Inc", "scheme": "US", "security_level": { "_type": "set", "_value": [] }, "not_valid_before": { "_type": "date", "_value": "2021-09-28" }, "not_valid_after": { "_type": "date", "_value": "2023-09-28" }, "report_link": "https://www.commoncriteriaportal.org/files/epfiles/st-vid11218-vr.pdf", "st_link": "https://www.commoncriteriaportal.org/files/epfiles/st-vid11218-st.pdf", "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st-vid11218-ci.pdf", "manufacturer_web": "https://www.sonicwall.com/", "protection_profiles": { "_type": "set", "_value": [ { "_type": "sec_certs.sample.protection_profile.ProtectionProfile", "pp_name": "collaborative Protection Profile for Network Devices v2.2e", "pp_eal": null, "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.2E.pdf", "pp_ids": null } ] }, "maintenance_updates": { "_type": "set", "_value": [] }, "state": { "_type": "sec_certs.sample.cc.CCCertificate.InternalState", "report": { "_type": "sec_certs.sample.cc.CCCertificate.DocumentState", "download_ok": true, "convert_garbage": false, "convert_ok": true, "extract_ok": true, "pdf_hash": "3ac839d1ef5db4ced5bbf9efbcf8198a6a3dd6ebed3d6dc92ae1dc81aef72a9f", "txt_hash": "d755e77be9c6b423acc65511df48fa0e92a8a1290b373272601bef2ccaef453d" }, "st": { "_type": "sec_certs.sample.cc.CCCertificate.DocumentState", "download_ok": true, "convert_garbage": false, "convert_ok": true, "extract_ok": true, "pdf_hash": "152484a7247105fb4bcdfbb13c6e13a83c03bc737486e802b35b3c0b1296b220", "txt_hash": "b62e7c1f834374fde5c0a8253f1d4724403507673f5a767f00762972f569e255" }, "cert": { "_type": "sec_certs.sample.cc.CCCertificate.DocumentState", "download_ok": true, "convert_garbage": true, "convert_ok": true, "extract_ok": true, "pdf_hash": "ee0900cf79bde6803939a2be5b73daa8aeafcb308537e30d0692edf2a59130b1", "txt_hash": "cb483314f2ca894958c836cdbc56f88415d7ae8695fcf6d6160506af40e6c56b" } }, "pdf_data": { "_type": "sec_certs.sample.cc.CCCertificate.PdfData", "report_metadata": { "pdf_file_size_bytes": 476353, "pdf_is_encrypted": false, "pdf_number_of_pages": 29, "/Title": "Draft VR Template", "/Author": "Paul Bicknell", "/Creator": "Microsoft® Word for Microsoft 365", "/CreationDate": "D:20220118211349-05'00'", "/ModDate": "D:20220118211349-05'00'", "/Producer": "Microsoft® Word for Microsoft 365", "pdf_hyperlinks": { "_type": "set", "_value": [ "http://www.niap-ccevs.org/", "http://www.niap-ccevs.org/cc-scheme", "http://www.cygnacom.com/" ] } }, "st_metadata": { "pdf_file_size_bytes": 942386, "pdf_is_encrypted": false, "pdf_number_of_pages": 53, "/Producer": "Microsoft® Word for Microsoft 365", "/Creator": "Microsoft® Word for Microsoft 365", "/CreationDate": "D:20210930182021-04'00'", "/ModDate": "D:20210930182021-04'00'", "pdf_hyperlinks": { "_type": "set", "_value": [] } }, "cert_metadata": { "pdf_file_size_bytes": 180257, "pdf_is_encrypted": false, "pdf_number_of_pages": 1, "/ModDate": "D:20210930184724-04'00'", "/CreationDate": "D:20210930184724-04'00'", "/Producer": "iText 2.1.0 (by lowagie.com)", "pdf_hyperlinks": { "_type": "set", "_value": [] } }, "report_frontpage": { "US": { "cert_id": "CCEVS-VR-VID11218", "cert_item": "SonicWALL Secure Mobile Access (SMA) v12.4.1", "cert_lab": "US NIAP" } }, "st_frontpage": null, "cert_frontpage": null, "report_keywords": { "cc_cert_id": { "US": { "CCEVS-VR-VID11218": 1 } }, "cc_protection_profile_id": {}, "cc_security_level": { "EAL": { "EAL 1": 5 } }, "cc_sar": {}, "cc_sfr": {}, "cc_claims": {}, "vendor": { "Cisco": { "Cisco": 4 } }, "eval_facility": {}, "symmetric_crypto": {}, "asymmetric_crypto": { "ECC": { "ECC": { "ECC": 1 } } }, "pq_crypto": {}, "hash_function": {}, "crypto_scheme": {}, "crypto_protocol": { "SSH": { "SSH": 2 }, "TLS": { "SSL": { "SSL": 1 }, "TLS": { "TLSv1.2": 1, "TLS": 10, "TLS 1.3": 1, "TLS 1.2": 1, "TLS v1.3": 1 } }, "VPN": { "VPN": 4 } }, "randomness": { "PRNG": { "PRNG": 1 } }, "cipher_mode": {}, "ecc_curve": {}, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": { "OpenSSL": { "OpenSSL": 3 } }, "vulnerability": {}, "side_channel_analysis": {}, "technical_report_id": {}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": { "FIPS": { "FIPS 140-2": 1 }, "X509": { "X.509": 1 } }, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": {} }, "st_keywords": { "cc_cert_id": {}, "cc_protection_profile_id": {}, "cc_security_level": {}, "cc_sar": { "ADV": { "ADV_FSP.1": 1 }, "AGD": { "AGD_OPE.1": 1, "AGD_PRE.1": 1 }, "ALC": { "ALC_CMC.1": 1, "ALC_CMS.1": 1 }, "ATE": { "ATE_IND.1": 1 }, "AVA": { "AVA_VAN": 1, "AVA_VAN.1": 1 }, "ASE": { "ASE_CCL.1": 1, "ASE_ECD.1": 1, "ASE_INT.1": 1, "ASE_OBJ.1": 1, "ASE_REQ.1": 1, "ASE_SPD.1": 1, "ASE_TSS.1": 1 } }, "cc_sfr": { "FAU": { "FAU_GEN.1.2": 2, "FAU_STG_EXT.1": 6, "FAU_GEN.1": 6, "FAU_GEN.2": 4, "FAU_GEN.1.1": 1, "FAU_GEN.2.1": 1, "FAU_STG_EXT.1.1": 1, "FAU_STG_EXT.1.2": 1, "FAU_STG_EXT.1.3": 1 }, "FCS": { "FCS_TLSS_EXT.1.4": 2, "FCS_TLSC_EXT.2.3": 1, "FCS_NTP_EXT.1.4": 1, "FCS_RBG_EXT.1": 7, "FCS_TLSS_EXT.1": 7, "FCS_TLSS_EXT.2": 6, "FCS_TLSC_EXT.1": 6, "FCS_CKM.1": 6, "FCS_CKM.2": 5, "FCS_CKM.4": 6, "FCS_COP": 16, "FCS_CKM.1.1": 1, "FCS_CKM.2.1": 1, "FCS_CKM.4.1": 1, "FCS_COP.1": 5, "FCS_RBG_EXT.1.1": 1, "FCS_RBG_EXT.1.2": 1, "FCS_TLSC_EXT.1.1": 1, "FCS_TLSC_EXT.1.2": 1, "FCS_TLSC_EXT.1.3": 1, "FCS_TLSC_EXT.1.4": 1, "FCS_TLSS_EXT.1.1": 1, "FCS_TLSS_EXT.1.2": 1, "FCS_TLSS_EXT.1.3": 1, "FCS_TLSS_EXT.2.1": 1, "FCS_TLSC_EXT.2.2": 1, "FCS_TLSS_EXT.2.3": 1, "FCS_TLSC_EXT": 1 }, "FIA": { "FIA_AFL.1": 8, "FIA_PMG_EXT.1": 5, "FIA_UIA_EXT.1": 6, "FIA_UAU_EXT.2": 5, "FIA_UAU.7": 5, "FIA_AFL.1.1": 1, "FIA_AFL.1.2": 1, "FIA_PMG_EXT.1.1": 1, "FIA_UIA_EXT.1.1": 1, "FIA_UIA_EXT.1.2": 1, "FIA_UAU_EXT.2.1": 1, "FIA_UAU.7.1": 1 }, "FMT": { "FMT_MOF": 5, "FMT_MTD": 10, "FMT_SMF.1": 6, "FMT_SMR.2": 4, "FMT_MOF.1": 1, "FMT_MTD.1": 2, "FMT_SMF.1.1": 1, "FMT_SMR.2.1": 1, "FMT_SMR.2.2": 1, "FMT_SMR.2.3": 1 }, "FPT": { "FPT_SKP_EXT.1": 6, "FPT_APW_EXT.1": 5, "FPT_TST_EXT.1": 6, "FPT_STM_EXT.1": 6, "FPT_TUD_EXT.1": 5, "FPT_SKP_EXT.1.1": 1, "FPT_APW_EXT.1.1": 1, "FPT_APW_EXT.1.2": 1, "FPT_TST_EXT.1.1": 1, "FPT_TUD_EXT.1.1": 1, "FPT_TUD_EXT.1.2": 1, "FPT_TUD_EXT.1.3": 1, "FPT_STM_EXT.1.1": 1, "FPT_STM_EXT.1.2": 1 }, "FTA": { "FTA_SSL_EXT.1": 6, "FTA_SSL.3": 4, "FTA_SSL.4": 5, "FTA_TAB.1": 5, "FTA_SSL_EXT.1.1": 1, "FTA_SSL.3.1": 1, "FTA_SSL.4.1": 1, "FTA_TAB.1.1": 1 }, "FTP": { "FTP_ITC.1": 7, "FTP_TRP": 4, "FTP_ITC.1.1": 1, "FTP_ITC.1.2": 1, "FTP_ITC.1.3": 1, "FTP_TRP.1": 4 } }, "cc_claims": { "T": { "T.UNAUTHORIZED_ADMINISTRATOR_ACCESS": 1, "T.WEAK_CRYPTOGRAPHY": 1, "T.UNTRUSTED_COMMUNICATION_CHANNELS": 1, "T.WEAK_AUTHENTICATION_ENDPOINTS": 1, "T.UPDATE_COMPROMISE": 1, "T.UNDETECTED_ACTIVITY": 1, "T.SECURITY_FUNCTIONALITY_COMPROMISE": 1, "T.PASSWORD_CRACKING": 1, "T.SECURITY_FUNCTIONALITY_FAILURE": 1 }, "A": { "A.PHYSICAL_PROTECTION": 1, "A.LIMITED_FUNCTIONALITY": 1, "A.NO_THRU_TRAFFIC_PROTECTION": 1, "A.TRUSTED_ADMINISTRATOR": 1, "A.REGULAR_UPDATES": 1, "A.ADMIN_CREDENTIALS_SECURE": 1, "A.RESIDUAL_INFORMATION": 1, "A.VS_TRUSTED_ADMINISTRATOR": 1, "A.VS_REGULAR_UPDATES": 1, "A.VS_ISOLATION": 1, "A.VS_CORRECT_CONFIGURATION": 1 }, "OE": { "OE.PHYSICAL": 1, "OE.NO_GENERAL_PURPOSE": 1, "OE.NO_THRU_TRAFFIC_PROTECTION": 1, "OE.TRUSTED_ADMIN": 1, "OE.UPDATES": 1, "OE.ADMIN_CREDENTIAL_SECURE": 1, "OE.RESIDUAL_INFORMATION": 1, "OE.VM_CONFIGURATION": 1 } }, "vendor": {}, "eval_facility": {}, "symmetric_crypto": { "AES_competition": { "AES": { "AES": 8, "AES-256": 1 } }, "constructions": { "MAC": { "HMAC": 3, "HMAC-SHA-256": 1 } } }, "asymmetric_crypto": { "ECC": { "ECDH": { "ECDHE": 1 }, "ECDSA": { "ECDSA": 4 }, "ECC": { "ECC": 2 } }, "FF": { "DH": { "DH": 1, "Diffie-Hellman": 1 } } }, "pq_crypto": {}, "hash_function": { "SHA": { "SHA1": { "SHA-1": 2, "SHA1": 1 }, "SHA2": { "SHA-256": 4, "SHA-384": 2, "SHA256": 3 } } }, "crypto_scheme": { "KEX": { "Key Exchange": 1 } }, "crypto_protocol": { "SSH": { "SSH": 2 }, "TLS": { "SSL": { "SSL": 2, "SSL 2.0": 1, "SSL 3.0": 1 }, "TLS": { "TLSv1.2": 1, "TLS": 55, "TLS 1.3": 1, "TLS 1.2": 2, "TLS 1.0": 1, "TLS 1.1": 1, "TLS v1.2": 4 }, "DTLS": { "DTLS": 2 } }, "VPN": { "VPN": 13 } }, "randomness": { "TRNG": { "TRNG": 1 }, "PRNG": { "PRNG": 3, "DRBG": 3 }, "RNG": { "RBG": 1 } }, "cipher_mode": { "CBC": { "CBC": 4 }, "GCM": { "GCM": 3 } }, "ecc_curve": { "NIST": { "P-256": 8, "P-384": 10, "secp256r1": 4, "secp384r1": 4 } }, "crypto_engine": {}, "tls_cipher_suite": { "TLS": { "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256": 3, "TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384": 3, "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": 3, "TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384": 3 } }, "crypto_library": { "OpenSSL": { "OpenSSL": 3 } }, "vulnerability": {}, "side_channel_analysis": {}, "technical_report_id": {}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": { "FIPS": { "FIPS 140-2": 2, "FIPS PUB 186-4": 5, "FIPS PUB 140-2": 1, "FIPS186-4": 1, "FIPS 186-4": 1, "FIPS PUB 197": 1, "FIPS 180-4": 1, "FIPS 198": 1 }, "NIST": { "NIST SP 800-90A": 1 }, "PKCS": { "PKCS #1": 1 }, "RFC": { "RFC 5077": 6, "RFC 5246": 4, "RFC 5289": 8, "RFC 6125": 3, "RFC 5280": 3, "RFC 6960": 1, "RFC 2986": 1, "RFC 5424": 1, "RFC 3986": 2 }, "ISO": { "ISO/IEC 9796-2": 1, "ISO/IEC 14888-3": 1, "ISO/IEC 18031:2011": 2 }, "X509": { "X.509": 14 }, "CC": { "CCMB-2017-04-002": 2, "CCMB-2017-04-003": 1 } }, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": {} }, "cert_keywords": { "cc_cert_id": { "US": { "CCEVS-VR-VID11218-2021": 1 } }, "cc_protection_profile_id": {}, "cc_security_level": {}, "cc_sar": {}, "cc_sfr": {}, "cc_claims": {}, "vendor": {}, "eval_facility": {}, "symmetric_crypto": {}, "asymmetric_crypto": {}, "pq_crypto": {}, "hash_function": {}, "crypto_scheme": {}, "crypto_protocol": {}, "randomness": {}, "cipher_mode": {}, "ecc_curve": {}, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": {}, "technical_report_id": {}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": {}, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": {} }, "report_filename": "st-vid11218-vr.pdf", "st_filename": "st-vid11218-st.pdf", "cert_filename": "st-vid11218-ci.pdf" }, "heuristics": { "_type": "sec_certs.sample.cc.CCCertificate.Heuristics", "extracted_versions": { "_type": "set", "_value": [ "12.4" ] }, "cpe_matches": null, "verified_cpe_matches": null, "related_cves": null, "cert_lab": [ "US" ], "cert_id": "CCEVS-VR-VID-11218", "st_references": { "_type": "sec_certs.sample.certificate.References", "directly_referenced_by": null, "indirectly_referenced_by": null, "directly_referencing": null, "indirectly_referencing": null }, "report_references": { "_type": "sec_certs.sample.certificate.References", "directly_referenced_by": null, "indirectly_referenced_by": null, "directly_referencing": null, "indirectly_referencing": null }, "annotated_references": null, "extracted_sars": { "_type": "set", "_value": [ { "_type": "sec_certs.sample.sar.SAR", "family": "ATE_IND", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_INT", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_ECD", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AGD_PRE", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AVA_VAN", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_OBJ", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_TSS", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ADV_FSP", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_CCL", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_CMC", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_SPD", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AGD_OPE", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_CMS", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_REQ", "level": 1 } ] }, "direct_transitive_cves": null, "indirect_transitive_cves": null, "scheme_data": { "product": "SonicWall Secure Mobile Access (SMA) v12.4", "id": "CCEVS-VR-VID11218", "url": "https://www.niap-ccevs.org/product/11218", "certification_date": "2021-09-28T00:00:00Z", "expiration_date": "2023-09-28T00:00:00Z", "category": "Network Device", "vendor": "SonicWall, Inc.", "evaluation_facility": "CygnaCom Solutions, Inc", "scheme": "US" } }, "_id": "eeff5b346faba43f" } }, { "_id": { "$oid": "66ba44469466f60634174f67" }, "run_id": { "$oid": "66ba432a9466f606341743a8" }, "dgst": "eeff5b346faba43f", "timestamp": { "$date": "2024-08-12T12:00:07.61Z" }, "type": "change", "diff": { "__update__": { "state": { "__update__": { "st": { "__update__": { "download_ok": false, "convert_ok": false, "extract_ok": false, "pdf_hash": null, "txt_hash": null } } } }, "pdf_data": { "__update__": { "st_metadata": null, "st_keywords": null, "st_filename": null } }, "heuristics": { "__update__": { "extracted_sars": null } } } } }, { "_id": { "$oid": "66c0a10b1c78507fd1060d3f" }, "run_id": { "$oid": "66c0a0e21c78507fd105fc06" }, "dgst": "eeff5b346faba43f", "timestamp": { "$date": "2024-08-17T12:52:18.171Z" }, "type": "change", "diff": { "__update__": { "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st-vid11218-vr.pdf", "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st-vid11218-st.pdf", "state": { "__update__": { "report": { "__update__": { "download_ok": false, "convert_ok": false, "extract_ok": false, "pdf_hash": null, "txt_hash": null } }, "cert": { "__update__": { "download_ok": false, "convert_garbage": false, "convert_ok": false, "extract_ok": false, "pdf_hash": null, "txt_hash": null } } } }, "pdf_data": { "__update__": { "report_metadata": null, "cert_metadata": null, "report_frontpage": null, "report_keywords": null, "cert_keywords": null, "report_filename": null, "cert_filename": null } }, "heuristics": { "__update__": { "cert_lab": null, "cert_id": null } } } } }, { "_id": { "$oid": "66c7affd2ff8c812f518c103" }, "run_id": { "$oid": "66c7afc82ff8c812f518b966" }, "dgst": "eeff5b346faba43f", "timestamp": { "$date": "2024-08-22T18:04:48.021Z" }, "type": "change", "diff": { "__update__": { "state": { "__update__": { "report": { "__update__": { "download_ok": true, "convert_ok": true, "extract_ok": true, "pdf_hash": "3ac839d1ef5db4ced5bbf9efbcf8198a6a3dd6ebed3d6dc92ae1dc81aef72a9f", "txt_hash": "d755e77be9c6b423acc65511df48fa0e92a8a1290b373272601bef2ccaef453d" } }, "st": { "__update__": { "download_ok": true, "convert_ok": true, "extract_ok": true, "pdf_hash": "152484a7247105fb4bcdfbb13c6e13a83c03bc737486e802b35b3c0b1296b220", "txt_hash": "b62e7c1f834374fde5c0a8253f1d4724403507673f5a767f00762972f569e255" } }, "cert": { "__update__": { "download_ok": true, "convert_garbage": true, "convert_ok": true, "extract_ok": true, "pdf_hash": "ee0900cf79bde6803939a2be5b73daa8aeafcb308537e30d0692edf2a59130b1", "txt_hash": "cb483314f2ca894958c836cdbc56f88415d7ae8695fcf6d6160506af40e6c56b" } } } }, "pdf_data": { "__update__": { "report_metadata": { "pdf_file_size_bytes": 476353, "pdf_is_encrypted": false, "pdf_number_of_pages": 29, "/Title": "Draft VR Template", "/Author": "Paul Bicknell", "/Creator": "Microsoft® Word for Microsoft 365", "/CreationDate": "D:20220118211349-05'00'", "/ModDate": "D:20220118211349-05'00'", "/Producer": "Microsoft® Word for Microsoft 365", "pdf_hyperlinks": { "_type": "set", "_value": [ "http://www.niap-ccevs.org/", "http://www.cygnacom.com/", "http://www.niap-ccevs.org/cc-scheme" ] } }, "st_metadata": { "pdf_file_size_bytes": 942386, "pdf_is_encrypted": false, "pdf_number_of_pages": 53, "/Producer": "Microsoft® Word for Microsoft 365", "/Creator": "Microsoft® Word for Microsoft 365", "/CreationDate": "D:20210930182021-04'00'", "/ModDate": "D:20210930182021-04'00'", "pdf_hyperlinks": { "_type": "set", "_value": [] } }, "cert_metadata": { "pdf_file_size_bytes": 180257, "pdf_is_encrypted": false, "pdf_number_of_pages": 1, "/ModDate": "D:20210930184724-04'00'", "/CreationDate": "D:20210930184724-04'00'", "/Producer": "iText 2.1.0 (by lowagie.com)", "pdf_hyperlinks": { "_type": "set", "_value": [] } }, "report_frontpage": { "US": { "cert_id": "CCEVS-VR-VID11218", "cert_item": "SonicWALL Secure Mobile Access (SMA) v12.4.1", "cert_lab": "US NIAP" } }, "report_keywords": { "cc_cert_id": { "US": { "CCEVS-VR-VID11218": 1 } }, "cc_protection_profile_id": {}, "cc_security_level": { "EAL": { "EAL 1": 5 } }, "cc_sar": {}, "cc_sfr": {}, "cc_claims": {}, "vendor": { "Cisco": { "Cisco": 4 } }, "eval_facility": {}, "symmetric_crypto": {}, "asymmetric_crypto": { "ECC": { "ECC": { "ECC": 1 } } }, "pq_crypto": {}, "hash_function": {}, "crypto_scheme": {}, "crypto_protocol": { "SSH": { "SSH": 2 }, "TLS": { "SSL": { "SSL": 1 }, "TLS": { "TLSv1.2": 1, "TLS": 10, "TLS 1.3": 1, "TLS 1.2": 1, "TLS v1.3": 1 } }, "VPN": { "VPN": 4 } }, "randomness": { "PRNG": { "PRNG": 1 } }, "cipher_mode": {}, "ecc_curve": {}, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": { "OpenSSL": { "OpenSSL": 3 } }, "vulnerability": {}, "side_channel_analysis": {}, "technical_report_id": {}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": { "FIPS": { "FIPS 140-2": 1 }, "X509": { "X.509": 1 } }, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": {} }, "st_keywords": { "cc_cert_id": {}, "cc_protection_profile_id": {}, "cc_security_level": {}, "cc_sar": { "ADV": { "ADV_FSP.1": 1 }, "AGD": { "AGD_OPE.1": 1, "AGD_PRE.1": 1 }, "ALC": { "ALC_CMC.1": 1, "ALC_CMS.1": 1 }, "ATE": { "ATE_IND.1": 1 }, "AVA": { "AVA_VAN": 1, "AVA_VAN.1": 1 }, "ASE": { "ASE_CCL.1": 1, "ASE_ECD.1": 1, "ASE_INT.1": 1, "ASE_OBJ.1": 1, "ASE_REQ.1": 1, "ASE_SPD.1": 1, "ASE_TSS.1": 1 } }, "cc_sfr": { "FAU": { "FAU_GEN.1.2": 2, "FAU_STG_EXT.1": 6, "FAU_GEN.1": 6, "FAU_GEN.2": 4, "FAU_GEN.1.1": 1, "FAU_GEN.2.1": 1, "FAU_STG_EXT.1.1": 1, "FAU_STG_EXT.1.2": 1, "FAU_STG_EXT.1.3": 1 }, "FCS": { "FCS_TLSS_EXT.1.4": 2, "FCS_TLSC_EXT.2.3": 1, "FCS_NTP_EXT.1.4": 1, "FCS_RBG_EXT.1": 7, "FCS_TLSS_EXT.1": 7, "FCS_TLSS_EXT.2": 6, "FCS_TLSC_EXT.1": 6, "FCS_CKM.1": 6, "FCS_CKM.2": 5, "FCS_CKM.4": 6, "FCS_COP": 16, "FCS_CKM.1.1": 1, "FCS_CKM.2.1": 1, "FCS_CKM.4.1": 1, "FCS_COP.1": 5, "FCS_RBG_EXT.1.1": 1, "FCS_RBG_EXT.1.2": 1, "FCS_TLSC_EXT.1.1": 1, "FCS_TLSC_EXT.1.2": 1, "FCS_TLSC_EXT.1.3": 1, "FCS_TLSC_EXT.1.4": 1, "FCS_TLSS_EXT.1.1": 1, "FCS_TLSS_EXT.1.2": 1, "FCS_TLSS_EXT.1.3": 1, "FCS_TLSS_EXT.2.1": 1, "FCS_TLSC_EXT.2.2": 1, "FCS_TLSS_EXT.2.3": 1, "FCS_TLSC_EXT": 1 }, "FIA": { "FIA_AFL.1": 8, "FIA_PMG_EXT.1": 5, "FIA_UIA_EXT.1": 6, "FIA_UAU_EXT.2": 5, "FIA_UAU.7": 5, "FIA_AFL.1.1": 1, "FIA_AFL.1.2": 1, "FIA_PMG_EXT.1.1": 1, "FIA_UIA_EXT.1.1": 1, "FIA_UIA_EXT.1.2": 1, "FIA_UAU_EXT.2.1": 1, "FIA_UAU.7.1": 1 }, "FMT": { "FMT_MOF": 5, "FMT_MTD": 10, "FMT_SMF.1": 6, "FMT_SMR.2": 4, "FMT_MOF.1": 1, "FMT_MTD.1": 2, "FMT_SMF.1.1": 1, "FMT_SMR.2.1": 1, "FMT_SMR.2.2": 1, "FMT_SMR.2.3": 1 }, "FPT": { "FPT_SKP_EXT.1": 6, "FPT_APW_EXT.1": 5, "FPT_TST_EXT.1": 6, "FPT_STM_EXT.1": 6, "FPT_TUD_EXT.1": 5, "FPT_SKP_EXT.1.1": 1, "FPT_APW_EXT.1.1": 1, "FPT_APW_EXT.1.2": 1, "FPT_TST_EXT.1.1": 1, "FPT_TUD_EXT.1.1": 1, "FPT_TUD_EXT.1.2": 1, "FPT_TUD_EXT.1.3": 1, "FPT_STM_EXT.1.1": 1, "FPT_STM_EXT.1.2": 1 }, "FTA": { "FTA_SSL_EXT.1": 6, "FTA_SSL.3": 4, "FTA_SSL.4": 5, "FTA_TAB.1": 5, "FTA_SSL_EXT.1.1": 1, "FTA_SSL.3.1": 1, "FTA_SSL.4.1": 1, "FTA_TAB.1.1": 1 }, "FTP": { "FTP_ITC.1": 7, "FTP_TRP": 4, "FTP_ITC.1.1": 1, "FTP_ITC.1.2": 1, "FTP_ITC.1.3": 1, "FTP_TRP.1": 4 } }, "cc_claims": { "T": { "T.UNAUTHORIZED_ADMINISTRATOR_ACCESS": 1, "T.WEAK_CRYPTOGRAPHY": 1, "T.UNTRUSTED_COMMUNICATION_CHANNELS": 1, "T.WEAK_AUTHENTICATION_ENDPOINTS": 1, "T.UPDATE_COMPROMISE": 1, "T.UNDETECTED_ACTIVITY": 1, "T.SECURITY_FUNCTIONALITY_COMPROMISE": 1, "T.PASSWORD_CRACKING": 1, "T.SECURITY_FUNCTIONALITY_FAILURE": 1 }, "A": { "A.PHYSICAL_PROTECTION": 1, "A.LIMITED_FUNCTIONALITY": 1, "A.NO_THRU_TRAFFIC_PROTECTION": 1, "A.TRUSTED_ADMINISTRATOR": 1, "A.REGULAR_UPDATES": 1, "A.ADMIN_CREDENTIALS_SECURE": 1, "A.RESIDUAL_INFORMATION": 1, "A.VS_TRUSTED_ADMINISTRATOR": 1, "A.VS_REGULAR_UPDATES": 1, "A.VS_ISOLATION": 1, "A.VS_CORRECT_CONFIGURATION": 1 }, "OE": { "OE.PHYSICAL": 1, "OE.NO_GENERAL_PURPOSE": 1, "OE.NO_THRU_TRAFFIC_PROTECTION": 1, "OE.TRUSTED_ADMIN": 1, "OE.UPDATES": 1, "OE.ADMIN_CREDENTIAL_SECURE": 1, "OE.RESIDUAL_INFORMATION": 1, "OE.VM_CONFIGURATION": 1 } }, "vendor": {}, "eval_facility": {}, "symmetric_crypto": { "AES_competition": { "AES": { "AES": 8, "AES-256": 1 } }, "constructions": { "MAC": { "HMAC": 3, "HMAC-SHA-256": 1 } } }, "asymmetric_crypto": { "ECC": { "ECDH": { "ECDHE": 1 }, "ECDSA": { "ECDSA": 4 }, "ECC": { "ECC": 2 } }, "FF": { "DH": { "DH": 1, "Diffie-Hellman": 1 } } }, "pq_crypto": {}, "hash_function": { "SHA": { "SHA1": { "SHA-1": 2, "SHA1": 1 }, "SHA2": { "SHA-256": 4, "SHA-384": 2, "SHA256": 3 } } }, "crypto_scheme": { "KEX": { "Key Exchange": 1 } }, "crypto_protocol": { "SSH": { "SSH": 2 }, "TLS": { "SSL": { "SSL": 2, "SSL 2.0": 1, "SSL 3.0": 1 }, "TLS": { "TLSv1.2": 1, "TLS": 55, "TLS 1.3": 1, "TLS 1.2": 2, "TLS 1.0": 1, "TLS 1.1": 1, "TLS v1.2": 4 }, "DTLS": { "DTLS": 2 } }, "VPN": { "VPN": 13 } }, "randomness": { "TRNG": { "TRNG": 1 }, "PRNG": { "PRNG": 3, "DRBG": 3 }, "RNG": { "RBG": 1 } }, "cipher_mode": { "CBC": { "CBC": 4 }, "GCM": { "GCM": 3 } }, "ecc_curve": { "NIST": { "P-256": 8, "P-384": 10, "secp256r1": 4, "secp384r1": 4 } }, "crypto_engine": {}, "tls_cipher_suite": { "TLS": { "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256": 3, "TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384": 3, "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": 3, "TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384": 3 } }, "crypto_library": { "OpenSSL": { "OpenSSL": 3 } }, "vulnerability": {}, "side_channel_analysis": {}, "technical_report_id": {}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": { "FIPS": { "FIPS 140-2": 2, "FIPS PUB 186-4": 5, "FIPS PUB 140-2": 1, "FIPS186-4": 1, "FIPS 186-4": 1, "FIPS PUB 197": 1, "FIPS 180-4": 1, "FIPS 198": 1 }, "NIST": { "NIST SP 800-90A": 1 }, "PKCS": { "PKCS #1": 1 }, "RFC": { "RFC 5077": 6, "RFC 5246": 4, "RFC 5289": 8, "RFC 6125": 3, "RFC 5280": 3, "RFC 6960": 1, "RFC 2986": 1, "RFC 5424": 1, "RFC 3986": 2 }, "ISO": { "ISO/IEC 9796-2": 1, "ISO/IEC 14888-3": 1, "ISO/IEC 18031:2011": 2 }, "X509": { "X.509": 14 }, "CC": { "CCMB-2017-04-002": 2, "CCMB-2017-04-003": 1 } }, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": {} }, "cert_keywords": { "cc_cert_id": { "US": { "CCEVS-VR-VID11218-2021": 1 } }, "cc_protection_profile_id": {}, "cc_security_level": {}, "cc_sar": {}, "cc_sfr": {}, "cc_claims": {}, "vendor": {}, "eval_facility": {}, "symmetric_crypto": {}, "asymmetric_crypto": {}, "pq_crypto": {}, "hash_function": {}, "crypto_scheme": {}, "crypto_protocol": {}, "randomness": {}, "cipher_mode": {}, "ecc_curve": {}, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": {}, "technical_report_id": {}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": {}, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": {} }, "report_filename": "st-vid11218-vr.pdf", "st_filename": "st-vid11218-st.pdf", "cert_filename": "st-vid11218-ci.pdf" } }, "heuristics": { "__update__": { "cert_lab": [ "US" ], "cert_id": "CCEVS-VR-VID-11218", "extracted_sars": { "_type": "set", "_value": [ { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_CMC", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_CCL", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ADV_FSP", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_OBJ", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_SPD", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AVA_VAN", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_CMS", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AGD_PRE", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_REQ", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AGD_OPE", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_ECD", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ATE_IND", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_TSS", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_INT", "level": 1 } ] } } } } } }, { "_id": { "$oid": "672ffc06fb882d74835eb318" }, "run_id": { "$oid": "672ffba8fb882d74835eae78" }, "dgst": "eeff5b346faba43f", "timestamp": { "$date": "2024-11-09T17:43:21.303Z" }, "type": "change", "diff": { "__update__": { "heuristics": { "__update__": { "scheme_data": { "__update__": { "certification_date": { "_type": "date", "_value": "2021-09-28" }, "expiration_date": { "_type": "date", "_value": "2023-09-28" } } } } } } } }, { "_id": { "$oid": "673f6585a1452c910a80c684" }, "run_id": { "$oid": "673f6538a1452c910a80b5ad" }, "dgst": "eeff5b346faba43f", "timestamp": { "$date": "2024-11-21T11:03:40.77Z" }, "type": "change", "diff": { "__update__": { "heuristics": { "__insert__": { "prev_certificates": [], "next_certificates": [] } } } } }, { "_id": { "$oid": "67572cbfe54d5dd1c4cb6e62" }, "run_id": { "$oid": "67572c76e54d5dd1c4cb688c" }, "dgst": "eeff5b346faba43f", "timestamp": { "$date": "2024-12-09T12:00:03.127Z" }, "type": "change", "diff": { "__update__": { "heuristics": { "__update__": { "scheme_data": null } } } } }, { "_id": { "$oid": "676071d3e54d5dd1c4cb76b9" }, "run_id": { "$oid": "67607184e54d5dd1c4cb70e4" }, "dgst": "eeff5b346faba43f", "timestamp": { "$date": "2024-12-16T12:00:01.445Z" }, "type": "change", "diff": { "__update__": { "heuristics": { "__update__": { "scheme_data": { "product": "SonicWall Secure Mobile Access (SMA) v12.4", "id": "CCEVS-VR-VID11218", "url": "https://www.niap-ccevs.org/product/11218", "certification_date": { "_type": "date", "_value": "2021-09-28" }, "expiration_date": { "_type": "date", "_value": "2023-09-28" }, "category": "Network Device", "vendor": "SonicWall, Inc.", "evaluation_facility": "CygnaCom Solutions, Inc", "scheme": "US" } } } } } }, { "_id": { "$oid": "6772ddb1f2031bf1fe70be42" }, "run_id": { "$oid": "6772dd6df2031bf1fe70bb44" }, "dgst": "eeff5b346faba43f", "timestamp": { "$date": "2024-12-30T12:00:01.588Z" }, "type": "change", "diff": { "__update__": { "heuristics": { "__update__": { "scheme_data": null } } } } }, { "_id": { "$oid": "677c179be54d5dd1c4cb7fa9" }, "run_id": { "$oid": "677c1753e54d5dd1c4cb79d9" }, "dgst": "eeff5b346faba43f", "timestamp": { "$date": "2025-01-06T12:00:01.435Z" }, "type": "change", "diff": { "__update__": { "heuristics": { "__update__": { "scheme_data": { "product": "SonicWall Secure Mobile Access (SMA) v12.4", "id": "CCEVS-VR-VID11218", "url": "https://www.niap-ccevs.org/product/11218", "certification_date": { "_type": "date", "_value": "2021-09-28" }, "expiration_date": { "_type": "date", "_value": "2023-09-28" }, "category": "Network Device", "vendor": "SonicWall, Inc.", "evaluation_facility": "CygnaCom Solutions, Inc", "scheme": "US" } } } } } }, { "_id": { "$oid": "67a11af6a24f8a02249f313f" }, "run_id": { "$oid": "67a11a93a24f8a02249f2ef7" }, "dgst": "eeff5b346faba43f", "timestamp": { "$date": "2025-02-03T12:00:02.001Z" }, "type": "change", "diff": { "__update__": { "protection_profiles": { "_type": "set", "_value": [ { "_type": "sec_certs.sample.protection_profile.ProtectionProfile", "pp_name": "collaborative Protection Profile for Network Devices Version 2.2e", "pp_eal": null, "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.2E.pdf", "pp_ids": null } ] } } } }, { "_id": { "$oid": "67a4087c616188395327199a" }, "run_id": { "$oid": "67a4080e616188395327018d" }, "dgst": "eeff5b346faba43f", "timestamp": { "$date": "2025-02-05T18:04:55.043Z" }, "type": "change", "diff": { "__insert__": { "protection_profile_links": { "_type": "set", "_value": [ "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.2E.pdf" ] } }, "__update__": { "state": { "__update__": { "report": { "__update__": { "_type": "sec_certs.sample.document_state.DocumentState" } }, "st": { "__update__": { "_type": "sec_certs.sample.document_state.DocumentState" } }, "cert": { "__update__": { "_type": "sec_certs.sample.document_state.DocumentState" } } } }, "heuristics": { "__insert__": { "protection_profiles": { "_type": "set", "_value": [ "c5e4e0af71542101" ] }, "eal": null }, "__update__": { "prev_certificates": null, "next_certificates": null, "scheme_data": null } } }, "__delete__": [ "protection_profiles" ] } }, { "_id": { "$oid": "67aa459ed14b3692bb807262" }, "run_id": { "$oid": "67aa4548d14b3692bb806e73" }, "dgst": "eeff5b346faba43f", "timestamp": { "$date": "2025-02-10T12:00:00.586Z" }, "type": "change", "diff": { "__update__": { "heuristics": { "__update__": { "scheme_data": { "product": "SonicWall Secure Mobile Access (SMA) v12.4", "id": "CCEVS-VR-VID11218", "url": "https://www.niap-ccevs.org/product/11218", "certification_date": { "_type": "date", "_value": "2021-09-28" }, "expiration_date": { "_type": "date", "_value": "2023-09-28" }, "category": "Network Device", "vendor": "SonicWall, Inc.", "evaluation_facility": "CygnaCom Solutions, Inc", "scheme": "US" } } } } } }, { "_id": { "$oid": "67cf208d7c38a7c9944aac18" }, "run_id": { "$oid": "67cf20587c38a7c9944aab32" }, "dgst": "eeff5b346faba43f", "timestamp": { "$date": "2025-03-10T12:00:02.764Z" }, "type": "change", "diff": { "__update__": { "heuristics": { "__update__": { "protection_profiles": { "_type": "set", "_value": [ "89f2a255423f4a20" ] } } } } } }, { "_id": { "$oid": "68223522330129f137972a09" }, "run_id": { "$oid": "682234eb330129f137972551" }, "dgst": "eeff5b346faba43f", "timestamp": { "$date": "2025-05-12T12:00:01.455Z" }, "type": "change", "diff": { "__update__": { "heuristics": { "__update__": { "scheme_data": null } } } } }, { "_id": { "$oid": "669f80cd566b7c5a18058866" }, "run_id": { "$oid": "669f8076566b7c5a1805773d" }, "dgst": "f0c22e3e4abad667", "timestamp": { "$date": "2024-07-23T00:09:57.927Z" }, "type": "new", "diff": { "_type": "sec_certs.sample.cc.CCCertificate", "dgst": "f0c22e3e4abad667", "status": "active", "category": "Multi-Function Devices", "name": "KONICA MINOLTA bizhub 4750i/bizhub 4050i with FK-517,DEVELOP ineo 4750i/ineo 4050i with FK-517 G00-19", "manufacturer": "KONICA MINOLTA, INC.", "scheme": "JP", "security_level": { "_type": "set", "_value": [] }, "not_valid_before": { "_type": "date", "_value": "2021-03-10" }, "not_valid_after": { "_type": "date", "_value": "2026-03-10" }, "report_link": "https://www.commoncriteriaportal.org/files/epfiles/c0714_erpt.pdf", "st_link": "https://www.commoncriteriaportal.org/files/epfiles/c0714_est.pdf", "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0714_eimg.pdf", "manufacturer_web": "https://www.konicaminolta.com/index.html", "protection_profiles": { "_type": "set", "_value": [ { "_type": "sec_certs.sample.protection_profile.ProtectionProfile", "pp_name": "Protection Profile for Hardcopy Devices", "pp_eal": null, "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/c0553_pp.pdf", "pp_ids": null } ] }, "maintenance_updates": { "_type": "set", "_value": [] }, "state": { "_type": "sec_certs.sample.cc.CCCertificate.InternalState", "report": { "_type": "sec_certs.sample.cc.CCCertificate.DocumentState", "download_ok": true, "convert_garbage": false, "convert_ok": true, "extract_ok": true, "pdf_hash": "6fbc3b28d1be4672e7e2026d84ff715f8dc4bf7c1c6c4a3c4ad6a75da0764006", "txt_hash": "fd83e127ccb79a51b00892334e29ef092b5c1c56c9c775ee36fcd1113fb2a0ca" }, "st": { "_type": "sec_certs.sample.cc.CCCertificate.DocumentState", "download_ok": true, "convert_garbage": false, "convert_ok": true, "extract_ok": true, "pdf_hash": "ec092f763133271b508c753ab609a4619824da935b9456403766882d8ae57759", "txt_hash": "96d35b228571591e8488fb184c60fae0532be3f536ce66fcb7cb56788f9b12ae" }, "cert": { "_type": "sec_certs.sample.cc.CCCertificate.DocumentState", "download_ok": true, "convert_garbage": false, "convert_ok": true, "extract_ok": true, "pdf_hash": "19d62a345020777ab670df0c64c8bad9cd6b4cf5c1dd1e793000d915d17d2101", "txt_hash": "82a5249dfc924bff9136a22aeff947e64731e76b18b88dcd2e8b1895af47baaf" } }, "pdf_data": { "_type": "sec_certs.sample.cc.CCCertificate.PdfData", "report_metadata": { "pdf_file_size_bytes": 306343, "pdf_is_encrypted": true, "pdf_number_of_pages": 32, "/Author": "", "/CreationDate": "D:20210330163551+09'00'", "/Creator": "Word 用 Acrobat PDFMaker 17", "/ModDate": "D:20210330163645+09'00'", "/Producer": "Adobe PDF Library 15.0", "/SourceModified": "D:20210329032930", "pdf_hyperlinks": { "_type": "set", "_value": [] } }, "st_metadata": { "pdf_file_size_bytes": 1770493, "pdf_is_encrypted": false, "pdf_number_of_pages": 70, "/Producer": "Microsoft® Word for Office 365", "/Creator": "Microsoft® Word for Office 365", "/CreationDate": "D:20210329170602+09'00'", "/ModDate": "D:20210329170602+09'00'", "pdf_hyperlinks": { "_type": "set", "_value": [] } }, "cert_metadata": { "pdf_file_size_bytes": 120527, "pdf_is_encrypted": true, "pdf_number_of_pages": 2, "/CreationDate": "D:20210331142314+09'00'", "/Creator": "Microsoft® Word for Office 365", "/ModDate": "D:20210331181025+09'00'", "/Producer": "Microsoft® Word for Office 365", "pdf_hyperlinks": { "_type": "set", "_value": [] } }, "report_frontpage": {}, "st_frontpage": null, "cert_frontpage": null, "report_keywords": { "cc_cert_id": { "JP": { "JISEC-CC-CRP-C0714-01-2021": 1 } }, "cc_protection_profile_id": {}, "cc_security_level": {}, "cc_sar": { "ADV": { "ADV_FSP.1": 1 }, "AGD": { "AGD_OPE.1": 1, "AGD_PRE.1": 1 }, "ALC": { "ALC_CMC.1": 1, "ALC_CMS.1": 1 }, "ATE": { "ATE_IND.1": 1 }, "AVA": { "AVA_VAN.1": 1 }, "ASE": { "ASE_INT.1": 1, "ASE_CCL.1": 1, "ASE_SPD.1": 1, "ASE_OBJ.1": 1, "ASE_ECD.1": 1, "ASE_REQ.1": 1, "ASE_TSS.1": 1 } }, "cc_sfr": { "FCS": { "FCS_RBG_EXT.1": 1 } }, "cc_claims": { "D": { "D.USER": 3, "D.TSF": 3 }, "T": { "T.UNAUTHORIZED_ACCESS": 1, "T.TSF_COMPROMISE": 1, "T.TSF_FAILURE": 1, "T.UNAUTHORIZED_UPDATE": 1, "T.NET_COMPROMISE": 1 }, "A": { "A.PHYSICAL": 1, "A.NETWORK": 1, "A.TRUSTED_ADMIN": 1, "A.TRAINED_USERS": 1 } }, "vendor": { "Microsoft": { "Microsoft": 2 } }, "eval_facility": { "ECSEC": { "ECSEC Laboratory": 4 } }, "symmetric_crypto": { "AES_competition": { "AES": { "AES": 2 } }, "constructions": { "MAC": { "HMAC": 1, "HMAC-SHA-256": 1, "HMAC-SHA-384": 1, "HMAC-SHA-512": 1 } } }, "asymmetric_crypto": {}, "pq_crypto": {}, "hash_function": { "SHA": { "SHA1": { "SHA-1": 1 }, "SHA2": { "SHA-256": 1, "SHA-384": 1, "SHA-512": 1 } } }, "crypto_scheme": {}, "crypto_protocol": { "IPsec": { "IPsec": 2 } }, "randomness": { "PRNG": { "DRBG": 1 } }, "cipher_mode": { "CBC": { "CBC": 1 }, "CTR": { "CTR": 1 } }, "ecc_curve": {}, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": { "FI": { "malfunction": 1 } }, "technical_report_id": {}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": { "CC": { "CCMB-2017-04-001": 2, "CCMB-2017-04-002": 2, "CCMB-2017-04-003": 2, "CCMB-2017-04-004": 2 } }, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": {} }, "st_keywords": { "cc_cert_id": {}, "cc_protection_profile_id": {}, "cc_security_level": {}, "cc_sar": { "ADV": { "ADV_FSP.1": 1 }, "AGD": { "AGD_OPE.1": 1, "AGD_PRE.1": 1 }, "ALC": { "ALC_CMC.1": 1, "ALC_CMS.1": 1 }, "ATE": { "ATE_IND.1": 1 }, "AVA": { "AVA_VAN.1": 1 }, "ASE": { "ASE_CCL.1": 1, "ASE_ECD.1": 1, "ASE_INT.1": 1, "ASE_OBJ.1": 1, "ASE_REQ.1": 1, "ASE_SPD.1": 1, "ASE_TSS.1": 1 } }, "cc_sfr": { "FAU": { "FAU_STG_EXT": 3, "FAU_CKM_EXT": 2, "FAU_STG_EXT.1": 5, "FAU_GEN": 10, "FAU_GEN.1": 8, "FAU_STG_EXT.1.1": 2, "FAU_GEN.1.1": 1, "FAU_GEN.1.2": 1, "FAU_GEN.2": 3, "FAU_GEN.2.1": 1 }, "FCS": { "FCS_RBG_EXT": 2, "FCS_CKM_EXT": 1, "FCS_CKM_EXT.4": 16, "FCS_CKM.1": 33, "FCS_CKM.4": 6, "FCS_CKM_EXT.4.1": 2, "FCS_COP.1": 55, "FCS_RBG_EXT.1": 17, "FCS_RBG_EXT.1.1": 2, "FCS_RBG_EXT.1.2": 2, "FCS_CKM.2": 2, "FCS_CKM.1.1": 2, "FCS_CKM.4.1": 1, "FCS_COP.1.1": 4, "FCS_TLS_EXT.1": 6, "FCS_SSH_EXT.1": 6, "FCS_SNI_EXT.1.1": 1 }, "FDP": { "FDP_FXS_EXT": 2, "FDP_FXS_EXT.1": 6, "FDP_FXS_EXT.1.1": 2, "FDP_ACF.1": 6, "FDP_ITC.1": 3, "FDP_ITC.2": 3, "FDP_ACC.1": 7, "FDP_ACC.1.1": 1, "FDP_ACF.1.1": 1, "FDP_ACF.1.2": 1, "FDP_ACF.1.3": 1, "FDP_ACF.1.4": 1, "FDP_IFC.1": 1 }, "FIA": { "FIA_PMG_EXT": 2, "FIA_PSK_EXT": 2, "FIA_PSK_EXT.1": 9, "FIA_PMG_EXT.1": 6, "FIA_PMG_EXT.1.1": 2, "FIA_PSK_EXT.1.1": 2, "FIA_PSK_EXT.1.2": 2, "FIA_PSK_EXT.1.3": 2, "FIA_UAU.1": 8, "FIA_UID.1": 10, "FIA_AFL.1": 3, "FIA_AFL.1.1": 1, "FIA_AFL.1.2": 1, "FIA_ATD.1": 5, "FIA_ATD.1.1": 1, "FIA_UAU.1.1": 1, "FIA_UAU.1.2": 1, "FIA_UAU.7": 3, "FIA_UAU.7.1": 1, "FIA_UID.1.1": 1, "FIA_UID.1.2": 1, "FIA_USB.1": 3, "FIA_USB.1.1": 1, "FIA_USB.1.2": 1, "FIA_USB.1.3": 1 }, "FMT": { "FMT_SMF.1": 10, "FMT_SMR.1": 12, "FMT_MSA.3": 5, "FMT_MOF.1": 3, "FMT_MOF.1.1": 1, "FMT_MSA.1": 5, "FMT_MSA.1.1": 1, "FMT_MSA.3.1": 1, "FMT_MSA.3.2": 1, "FMT_MTD.1": 3, "FMT_MTD.1.1": 1, "FMT_SMF.1.1": 1, "FMT_SMR.1.1": 1, "FMT_SMR.1.2": 1 }, "FPT": { "FPT_SKP_EXT": 2, "FPT_TST_EXT": 2, "FPT_TUD_EXT": 2, "FPT_SKP_EXT.1": 6, "FPT_SKP_EXT.1.1": 2, "FPT_TST_EXT.1": 6, "FPT_TST_EXT.1.1": 2, "FPT_TUD_EXT.1": 7, "FPT_TUD_EXT.1.1": 2, "FPT_TUD_EXT.1.2": 2, "FPT_TUD_EXT.1.3": 3, "FPT_STM.1": 6, "FPT_STM.1.1": 1 }, "FTA": { "FTA_SSL.3": 3, "FTA_SSL.3.1": 1 }, "FTP": { "FTP_ITC.1": 9, "FTP_TRP.1": 8, "FTP_ITC.1.1": 2, "FTP_ITC.1.2": 1, "FTP_ITC.1.3": 1, "FTP_TRP.1.1": 3, "FTP_TRP.1.2": 2, "FTP_TRP.1.3": 2 } }, "cc_claims": { "D": { "D.USER": 31, "D.TSF": 3 }, "O": { "O.AUDIT": 5, "O.COMMS_PROTECTION": 11, "O.STORAGE_ENCRYPTION": 4, "O.PURGE_DATA": 2, "O.UPDATE_VERIFICATION": 2, "O.ACCESS_CONTROL": 6, "O.USER_AUTHORIZATION": 7, "O.ADMIN_ROLES": 4, "O.ACCESS": 1, "O.TSF_SELF_TEST": 1, "O.FAX_NET_SEPARATION": 1 }, "T": { "T.UNAUTHORIZED_ACCESS": 1, "T.TSF_COMPROMISE": 1, "T.TSF_FAILURE": 1, "T.UNAUTHORIZED_UPDATE": 1, "T.NET_COMPROMISE": 1 }, "A": { "A.PHYSICAL": 1, "A.NETWORK": 1, "A.TRUSTED_ADMIN": 1, "A.TRAINED_USERS": 1 }, "OE": { "OE.PHYSICAL_PROTECTION": 1, "OE.NETWORK_PROTECTION": 1, "OE.ADMIN_TRUST": 1, "OE.USER_TRAINING": 1, "OE.ADMIN_TRAINING": 1 } }, "vendor": { "Microsoft": { "Microsoft": 3 } }, "eval_facility": {}, "symmetric_crypto": { "AES_competition": { "AES": { "AES": 7, "AES-256": 2 } }, "constructions": { "MAC": { "HMAC": 6, "HMAC-SHA-256": 2, "HMAC-SHA-384": 2, "HMAC-SHA-512": 2 } } }, "asymmetric_crypto": { "RSA": { "RSA-2048": 1, "RSA-3072": 1 }, "ECC": { "ECDSA": { "ECDSA": 1 } }, "FF": { "DH": { "DH": 5, "Diffie-Hellman": 4 }, "DSA": { "DSA": 1 } } }, "pq_crypto": {}, "hash_function": { "SHA": { "SHA1": { "SHA-1": 8 }, "SHA2": { "SHA-256": 15, "SHA-512": 9, "SHA-384": 6 } } }, "crypto_scheme": {}, "crypto_protocol": { "SSH": { "SSH": 3 }, "TLS": { "TLS": { "TLS": 3 } }, "IKE": { "IKEv1": 14, "IKEv2": 3, "IKE": 5 }, "IPsec": { "IPsec": 79 } }, "randomness": { "PRNG": { "DRBG": 7 }, "RNG": { "RBG": 6 } }, "cipher_mode": { "CBC": { "CBC": 3 }, "CTR": { "CTR": 4 } }, "ecc_curve": {}, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": { "FI": { "malfunction": 1 } }, "technical_report_id": {}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": { "FIPS": { "FIPS PUB 197": 3, "FIPS PUB 186-4": 5, "FIPS PUB 198-1": 2, "FIPS PUB 180-3": 2 }, "NIST": { "NIST SP 800-90A": 3, "NIST SP 800-38A": 3 }, "PKCS": { "PKCS #1": 2 }, "RFC": { "RFC 4301": 3, "RFC 4303": 3, "RFC 3602": 7, "RFC 4106": 2, "RFC 4109": 2, "RFC 4304": 3, "RFC 4868": 5, "RFC 5282": 1, "RFC3602": 1, "RFC 2407": 1 }, "ISO": { "ISO/IEC 18031:2011": 3 }, "CC": { "CCMB-2017-04-002": 1, "CCMB-2017-04-003": 1 } }, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": {} }, "cert_keywords": { "cc_cert_id": { "JP": { "JISEC-CC-CRP-C0714-01-2021": 1 } }, "cc_protection_profile_id": {}, "cc_security_level": {}, "cc_sar": {}, "cc_sfr": {}, "cc_claims": {}, "vendor": {}, "eval_facility": { "ECSEC": { "ECSEC Laboratory": 1 } }, "symmetric_crypto": {}, "asymmetric_crypto": {}, "pq_crypto": {}, "hash_function": {}, "crypto_scheme": {}, "crypto_protocol": {}, "randomness": {}, "cipher_mode": {}, "ecc_curve": {}, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": {}, "technical_report_id": {}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": {}, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": {} }, "report_filename": "c0714_erpt.pdf", "st_filename": "c0714_est.pdf", "cert_filename": "c0714_eimg.pdf" }, "heuristics": { "_type": "sec_certs.sample.cc.CCCertificate.Heuristics", "extracted_versions": { "_type": "set", "_value": [ "517", "19" ] }, "cpe_matches": { "_type": "set", "_value": [ "cpe:2.3:h:konicaminolta:bizhub_4750:-:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_4750i:-:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_4050:-:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_4050i:-:*:*:*:*:*:*:*" ] }, "verified_cpe_matches": null, "related_cves": null, "cert_lab": null, "cert_id": "JISEC-CC-CRP-C0714-01-2021", "st_references": { "_type": "sec_certs.sample.certificate.References", "directly_referenced_by": null, "indirectly_referenced_by": null, "directly_referencing": null, "indirectly_referencing": null }, "report_references": { "_type": "sec_certs.sample.certificate.References", "directly_referenced_by": null, "indirectly_referenced_by": null, "directly_referencing": null, "indirectly_referencing": null }, "annotated_references": null, "extracted_sars": { "_type": "set", "_value": [ { "_type": "sec_certs.sample.sar.SAR", "family": "ATE_IND", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_INT", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_ECD", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AGD_PRE", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AVA_VAN", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_OBJ", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_TSS", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ADV_FSP", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_CCL", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_CMC", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_SPD", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AGD_OPE", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_CMS", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_REQ", "level": 1 } ] }, "direct_transitive_cves": null, "indirect_transitive_cves": null, "scheme_data": { "cert_id": "C0714", "supplier": "KONICA MINOLTA, INC.", "toe_overseas_name": "KONICA MINOLTA bizhub 4750i/bizhub 4050i \nwith FK-517,\nDEVELOP ineo 4750i/ineo 4050i with FK-517G00-19", "claim": "PP(Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015)", "certification_date": "2021-03", "toe_overseas_link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0714_it0762.html", "toe_japan_name": "KONICA MINOLTA bizhub 4750i/bizhub 4050i \nwith FK-517,\nDEVELOP ineo 4750i/ineo 4050i with FK-517G00-19", "enhanced": { "product": "KONICA MINOLTA bizhub 4750i/bizhub 4050i with FK-517,\n DEVELOP ineo 4750i/ineo 4050i with FK-517", "toe_version": "G00-19", "product_type": "Multi-Function Printer", "cert_id": "JISEC-C0714", "certification_date": "2021-03-10", "cc_version": "3.1 Release5", "assurance_level": "ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_ECD.1, ASE_REQ.1, ASE_TSS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1", "protection_profile": "Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 (Certification Identification: JISEC-C0553)", "vendor": "KONICA MINOLTA, INC.", "evaluation_facility": "ECSEC Laboratory Inc.\n Evaluation Center", "report_link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000001b34-att/c0714_erpt.pdf", "cert_link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000001b34-att/c0714_eimg.pdf", "target_link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000001b34-att/c0714_est.pdf", "description": "PRODUCT DESCRIPTION \n \n \n Description of TOE \n The TOE is a Multi-Function Printer (MFP) that has the functions, such as Copy, Scan, Print, Fax and Document storage and retrieval functions. The TOE provides the security functions required by the Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 defined as the Protection Profile for MFP. \n \n \n \n TOE Security functions \n The TOE provides the following security functions: \n \n Identification and Authentication function \n Access Control function \n Encryption function \n Trusted Communications function \n Security Management function \n Audit function \n Trusted Operation function \n FAX Separation function" } } }, "_id": "f0c22e3e4abad667" } }, { "_id": { "$oid": "66ba44469466f60634174ed6" }, "run_id": { "$oid": "66ba432a9466f606341743a8" }, "dgst": "f0c22e3e4abad667", "timestamp": { "$date": "2024-08-12T12:00:07.61Z" }, "type": "change", "diff": { "__update__": { "state": { "__update__": { "report": { "__update__": { "download_ok": false, "convert_ok": false, "extract_ok": false, "pdf_hash": null, "txt_hash": null } }, "cert": { "__update__": { "download_ok": false, "convert_ok": false, "extract_ok": false, "pdf_hash": null, "txt_hash": null } } } }, "pdf_data": { "__update__": { "report_metadata": null, "cert_metadata": null, "report_frontpage": null, "report_keywords": null, "cert_keywords": null, "report_filename": null, "cert_filename": null } }, "heuristics": { "__update__": { "cert_id": null } } } } }, { "_id": { "$oid": "66c0a10b1c78507fd106048a" }, "run_id": { "$oid": "66c0a0e21c78507fd105fc06" }, "dgst": "f0c22e3e4abad667", "timestamp": { "$date": "2024-08-17T12:52:18.171Z" }, "type": "change", "diff": { "__update__": { "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0714_erpt.pdf", "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0714_est.pdf", "state": { "__update__": { "st": { "__update__": { "download_ok": false, "convert_ok": false, "extract_ok": false, "pdf_hash": null, "txt_hash": null } } } }, "pdf_data": { "__update__": { "st_metadata": null, "st_keywords": null, "st_filename": null } }, "heuristics": { "__update__": { "extracted_sars": null } } } } }, { "_id": { "$oid": "66c34c4be86d971df595d634" }, "run_id": { "$oid": "66c34c34e86d971df595d508" }, "dgst": "f0c22e3e4abad667", "timestamp": { "$date": "2024-08-19T12:00:09.18Z" }, "type": "change", "diff": { "__update__": { "state": { "__update__": { "report": { "__update__": { "download_ok": true, "convert_ok": true, "extract_ok": true, "pdf_hash": "6fbc3b28d1be4672e7e2026d84ff715f8dc4bf7c1c6c4a3c4ad6a75da0764006", "txt_hash": "fd83e127ccb79a51b00892334e29ef092b5c1c56c9c775ee36fcd1113fb2a0ca" } } } }, "pdf_data": { "__update__": { "report_metadata": { "pdf_file_size_bytes": 306343, "pdf_is_encrypted": true, "pdf_number_of_pages": 32, "/Author": "", "/CreationDate": "D:20210330163551+09'00'", "/Creator": "Word 用 Acrobat PDFMaker 17", "/ModDate": "D:20210330163645+09'00'", "/Producer": "Adobe PDF Library 15.0", "/SourceModified": "D:20210329032930", "pdf_hyperlinks": { "_type": "set", "_value": [] } }, "report_frontpage": {}, "report_keywords": { "cc_cert_id": { "JP": { "JISEC-CC-CRP-C0714-01-2021": 1 } }, "cc_protection_profile_id": {}, "cc_security_level": {}, "cc_sar": { "ADV": { "ADV_FSP.1": 1 }, "AGD": { "AGD_OPE.1": 1, "AGD_PRE.1": 1 }, "ALC": { "ALC_CMC.1": 1, "ALC_CMS.1": 1 }, "ATE": { "ATE_IND.1": 1 }, "AVA": { "AVA_VAN.1": 1 }, "ASE": { "ASE_INT.1": 1, "ASE_CCL.1": 1, "ASE_SPD.1": 1, "ASE_OBJ.1": 1, "ASE_ECD.1": 1, "ASE_REQ.1": 1, "ASE_TSS.1": 1 } }, "cc_sfr": { "FCS": { "FCS_RBG_EXT.1": 1 } }, "cc_claims": { "D": { "D.USER": 3, "D.TSF": 3 }, "T": { "T.UNAUTHORIZED_ACCESS": 1, "T.TSF_COMPROMISE": 1, "T.TSF_FAILURE": 1, "T.UNAUTHORIZED_UPDATE": 1, "T.NET_COMPROMISE": 1 }, "A": { "A.PHYSICAL": 1, "A.NETWORK": 1, "A.TRUSTED_ADMIN": 1, "A.TRAINED_USERS": 1 } }, "vendor": { "Microsoft": { "Microsoft": 2 } }, "eval_facility": { "ECSEC": { "ECSEC Laboratory": 4 } }, "symmetric_crypto": { "AES_competition": { "AES": { "AES": 2 } }, "constructions": { "MAC": { "HMAC": 1, "HMAC-SHA-256": 1, "HMAC-SHA-384": 1, "HMAC-SHA-512": 1 } } }, "asymmetric_crypto": {}, "pq_crypto": {}, "hash_function": { "SHA": { "SHA1": { "SHA-1": 1 }, "SHA2": { "SHA-256": 1, "SHA-384": 1, "SHA-512": 1 } } }, "crypto_scheme": {}, "crypto_protocol": { "IPsec": { "IPsec": 2 } }, "randomness": { "PRNG": { "DRBG": 1 } }, "cipher_mode": { "CBC": { "CBC": 1 }, "CTR": { "CTR": 1 } }, "ecc_curve": {}, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": { "FI": { "malfunction": 1 } }, "technical_report_id": {}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": { "CC": { "CCMB-2017-04-001": 2, "CCMB-2017-04-002": 2, "CCMB-2017-04-003": 2, "CCMB-2017-04-004": 2 } }, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": {} }, "report_filename": "c0714_erpt.pdf" } }, "heuristics": { "__update__": { "cert_id": "JISEC-CC-CRP-C0714-01-2021", "extracted_sars": { "_type": "set", "_value": [ { "_type": "sec_certs.sample.sar.SAR", "family": "AGD_PRE", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ADV_FSP", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_OBJ", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_CMC", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_CCL", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_ECD", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_CMS", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_INT", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AGD_OPE", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_SPD", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ATE_IND", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_REQ", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AVA_VAN", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_TSS", "level": 1 } ] } } } } } }, { "_id": { "$oid": "66c7affd2ff8c812f518ba67" }, "run_id": { "$oid": "66c7afc82ff8c812f518b966" }, "dgst": "f0c22e3e4abad667", "timestamp": { "$date": "2024-08-22T18:04:48.021Z" }, "type": "change", "diff": { "__update__": { "state": { "__update__": { "st": { "__update__": { "download_ok": true, "convert_ok": true, "extract_ok": true, "pdf_hash": "ec092f763133271b508c753ab609a4619824da935b9456403766882d8ae57759", "txt_hash": "96d35b228571591e8488fb184c60fae0532be3f536ce66fcb7cb56788f9b12ae" } }, "cert": { "__update__": { "download_ok": true, "convert_ok": true, "extract_ok": true, "pdf_hash": "19d62a345020777ab670df0c64c8bad9cd6b4cf5c1dd1e793000d915d17d2101", "txt_hash": "82a5249dfc924bff9136a22aeff947e64731e76b18b88dcd2e8b1895af47baaf" } } } }, "pdf_data": { "__update__": { "st_metadata": { "pdf_file_size_bytes": 1770493, "pdf_is_encrypted": false, "pdf_number_of_pages": 70, "/Producer": "Microsoft® Word for Office 365", "/Creator": "Microsoft® Word for Office 365", "/CreationDate": "D:20210329170602+09'00'", "/ModDate": "D:20210329170602+09'00'", "pdf_hyperlinks": { "_type": "set", "_value": [] } }, "cert_metadata": { "pdf_file_size_bytes": 120527, "pdf_is_encrypted": true, "pdf_number_of_pages": 2, "/CreationDate": "D:20210331142314+09'00'", "/Creator": "Microsoft® Word for Office 365", "/ModDate": "D:20210331181025+09'00'", "/Producer": "Microsoft® Word for Office 365", "pdf_hyperlinks": { "_type": "set", "_value": [] } }, "st_keywords": { "cc_cert_id": {}, "cc_protection_profile_id": {}, "cc_security_level": {}, "cc_sar": { "ADV": { "ADV_FSP.1": 1 }, "AGD": { "AGD_OPE.1": 1, "AGD_PRE.1": 1 }, "ALC": { "ALC_CMC.1": 1, "ALC_CMS.1": 1 }, "ATE": { "ATE_IND.1": 1 }, "AVA": { "AVA_VAN.1": 1 }, "ASE": { "ASE_CCL.1": 1, "ASE_ECD.1": 1, "ASE_INT.1": 1, "ASE_OBJ.1": 1, "ASE_REQ.1": 1, "ASE_SPD.1": 1, "ASE_TSS.1": 1 } }, "cc_sfr": { "FAU": { "FAU_STG_EXT": 3, "FAU_CKM_EXT": 2, "FAU_STG_EXT.1": 5, "FAU_GEN": 10, "FAU_GEN.1": 8, "FAU_STG_EXT.1.1": 2, "FAU_GEN.1.1": 1, "FAU_GEN.1.2": 1, "FAU_GEN.2": 3, "FAU_GEN.2.1": 1 }, "FCS": { "FCS_RBG_EXT": 2, "FCS_CKM_EXT": 1, "FCS_CKM_EXT.4": 16, "FCS_CKM.1": 33, "FCS_CKM.4": 6, "FCS_CKM_EXT.4.1": 2, "FCS_COP.1": 55, "FCS_RBG_EXT.1": 17, "FCS_RBG_EXT.1.1": 2, "FCS_RBG_EXT.1.2": 2, "FCS_CKM.2": 2, "FCS_CKM.1.1": 2, "FCS_CKM.4.1": 1, "FCS_COP.1.1": 4, "FCS_TLS_EXT.1": 6, "FCS_SSH_EXT.1": 6, "FCS_SNI_EXT.1.1": 1 }, "FDP": { "FDP_FXS_EXT": 2, "FDP_FXS_EXT.1": 6, "FDP_FXS_EXT.1.1": 2, "FDP_ACF.1": 6, "FDP_ITC.1": 3, "FDP_ITC.2": 3, "FDP_ACC.1": 7, "FDP_ACC.1.1": 1, "FDP_ACF.1.1": 1, "FDP_ACF.1.2": 1, "FDP_ACF.1.3": 1, "FDP_ACF.1.4": 1, "FDP_IFC.1": 1 }, "FIA": { "FIA_PMG_EXT": 2, "FIA_PSK_EXT": 2, "FIA_PSK_EXT.1": 9, "FIA_PMG_EXT.1": 6, "FIA_PMG_EXT.1.1": 2, "FIA_PSK_EXT.1.1": 2, "FIA_PSK_EXT.1.2": 2, "FIA_PSK_EXT.1.3": 2, "FIA_UAU.1": 8, "FIA_UID.1": 10, "FIA_AFL.1": 3, "FIA_AFL.1.1": 1, "FIA_AFL.1.2": 1, "FIA_ATD.1": 5, "FIA_ATD.1.1": 1, "FIA_UAU.1.1": 1, "FIA_UAU.1.2": 1, "FIA_UAU.7": 3, "FIA_UAU.7.1": 1, "FIA_UID.1.1": 1, "FIA_UID.1.2": 1, "FIA_USB.1": 3, "FIA_USB.1.1": 1, "FIA_USB.1.2": 1, "FIA_USB.1.3": 1 }, "FMT": { "FMT_SMF.1": 10, "FMT_SMR.1": 12, "FMT_MSA.3": 5, "FMT_MOF.1": 3, "FMT_MOF.1.1": 1, "FMT_MSA.1": 5, "FMT_MSA.1.1": 1, "FMT_MSA.3.1": 1, "FMT_MSA.3.2": 1, "FMT_MTD.1": 3, "FMT_MTD.1.1": 1, "FMT_SMF.1.1": 1, "FMT_SMR.1.1": 1, "FMT_SMR.1.2": 1 }, "FPT": { "FPT_SKP_EXT": 2, "FPT_TST_EXT": 2, "FPT_TUD_EXT": 2, "FPT_SKP_EXT.1": 6, "FPT_SKP_EXT.1.1": 2, "FPT_TST_EXT.1": 6, "FPT_TST_EXT.1.1": 2, "FPT_TUD_EXT.1": 7, "FPT_TUD_EXT.1.1": 2, "FPT_TUD_EXT.1.2": 2, "FPT_TUD_EXT.1.3": 3, "FPT_STM.1": 6, "FPT_STM.1.1": 1 }, "FTA": { "FTA_SSL.3": 3, "FTA_SSL.3.1": 1 }, "FTP": { "FTP_ITC.1": 9, "FTP_TRP.1": 8, "FTP_ITC.1.1": 2, "FTP_ITC.1.2": 1, "FTP_ITC.1.3": 1, "FTP_TRP.1.1": 3, "FTP_TRP.1.2": 2, "FTP_TRP.1.3": 2 } }, "cc_claims": { "D": { "D.USER": 31, "D.TSF": 3 }, "O": { "O.AUDIT": 5, "O.COMMS_PROTECTION": 11, "O.STORAGE_ENCRYPTION": 4, "O.PURGE_DATA": 2, "O.UPDATE_VERIFICATION": 2, "O.ACCESS_CONTROL": 6, "O.USER_AUTHORIZATION": 7, "O.ADMIN_ROLES": 4, "O.ACCESS": 1, "O.TSF_SELF_TEST": 1, "O.FAX_NET_SEPARATION": 1 }, "T": { "T.UNAUTHORIZED_ACCESS": 1, "T.TSF_COMPROMISE": 1, "T.TSF_FAILURE": 1, "T.UNAUTHORIZED_UPDATE": 1, "T.NET_COMPROMISE": 1 }, "A": { "A.PHYSICAL": 1, "A.NETWORK": 1, "A.TRUSTED_ADMIN": 1, "A.TRAINED_USERS": 1 }, "OE": { "OE.PHYSICAL_PROTECTION": 1, "OE.NETWORK_PROTECTION": 1, "OE.ADMIN_TRUST": 1, "OE.USER_TRAINING": 1, "OE.ADMIN_TRAINING": 1 } }, "vendor": { "Microsoft": { "Microsoft": 3 } }, "eval_facility": {}, "symmetric_crypto": { "AES_competition": { "AES": { "AES": 7, "AES-256": 2 } }, "constructions": { "MAC": { "HMAC": 6, "HMAC-SHA-256": 2, "HMAC-SHA-384": 2, "HMAC-SHA-512": 2 } } }, "asymmetric_crypto": { "RSA": { "RSA-2048": 1, "RSA-3072": 1 }, "ECC": { "ECDSA": { "ECDSA": 1 } }, "FF": { "DH": { "DH": 5, "Diffie-Hellman": 4 }, "DSA": { "DSA": 1 } } }, "pq_crypto": {}, "hash_function": { "SHA": { "SHA1": { "SHA-1": 8 }, "SHA2": { "SHA-256": 15, "SHA-512": 9, "SHA-384": 6 } } }, "crypto_scheme": {}, "crypto_protocol": { "SSH": { "SSH": 3 }, "TLS": { "TLS": { "TLS": 3 } }, "IKE": { "IKEv1": 14, "IKEv2": 3, "IKE": 5 }, "IPsec": { "IPsec": 79 } }, "randomness": { "PRNG": { "DRBG": 7 }, "RNG": { "RBG": 6 } }, "cipher_mode": { "CBC": { "CBC": 3 }, "CTR": { "CTR": 4 } }, "ecc_curve": {}, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": { "FI": { "malfunction": 1 } }, "technical_report_id": {}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": { "FIPS": { "FIPS PUB 197": 3, "FIPS PUB 186-4": 5, "FIPS PUB 198-1": 2, "FIPS PUB 180-3": 2 }, "NIST": { "NIST SP 800-90A": 3, "NIST SP 800-38A": 3 }, "PKCS": { "PKCS #1": 2 }, "RFC": { "RFC 4301": 3, "RFC 4303": 3, "RFC 3602": 7, "RFC 4106": 2, "RFC 4109": 2, "RFC 4304": 3, "RFC 4868": 5, "RFC 5282": 1, "RFC3602": 1, "RFC 2407": 1 }, "ISO": { "ISO/IEC 18031:2011": 3 }, "CC": { "CCMB-2017-04-002": 1, "CCMB-2017-04-003": 1 } }, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": {} }, "cert_keywords": { "cc_cert_id": { "JP": { "JISEC-CC-CRP-C0714-01-2021": 1 } }, "cc_protection_profile_id": {}, "cc_security_level": {}, "cc_sar": {}, "cc_sfr": {}, "cc_claims": {}, "vendor": {}, "eval_facility": { "ECSEC": { "ECSEC Laboratory": 1 } }, "symmetric_crypto": {}, "asymmetric_crypto": {}, "pq_crypto": {}, "hash_function": {}, "crypto_scheme": {}, "crypto_protocol": {}, "randomness": {}, "cipher_mode": {}, "ecc_curve": {}, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": {}, "technical_report_id": {}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": {}, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": {} }, "st_filename": "c0714_est.pdf", "cert_filename": "c0714_eimg.pdf" } } } } }, { "_id": { "$oid": "66fb219957e77cef5531f35f" }, "run_id": { "$oid": "66fb214d57e77cef5531f166" }, "dgst": "f0c22e3e4abad667", "timestamp": { "$date": "2024-09-30T12:00:02.794Z" }, "type": "change", "diff": { "__update__": { "heuristics": { "__update__": { "scheme_data": null } } } } }, { "_id": { "$oid": "670d60bed746c9e694e386a7" }, "run_id": { "$oid": "670d6087d746c9e694e385eb" }, "dgst": "f0c22e3e4abad667", "timestamp": { "$date": "2024-10-14T12:00:00.516Z" }, "type": "change", "diff": { "__update__": { "heuristics": { "__update__": { "scheme_data": { "cert_id": "C0714", "supplier": "KONICA MINOLTA, INC.", "toe_overseas_name": "KONICA MINOLTA bizhub 4750i/bizhub 4050i \nwith FK-517,\nDEVELOP ineo 4750i/ineo 4050i with FK-517G00-19", "expiration_date": null, "claim": "PP(Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015)", "certification_date": "2021-03", "toe_overseas_link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0714_it0762.html", "toe_japan_name": "KONICA MINOLTA bizhub 4750i/bizhub 4050i \nwith FK-517,\nDEVELOP ineo 4750i/ineo 4050i with FK-517G00-19", "enhanced": { "product": "KONICA MINOLTA bizhub 4750i/bizhub 4050i with FK-517,\n DEVELOP ineo 4750i/ineo 4050i with FK-517", "toe_version": "G00-19", "product_type": "Multi-Function Printer", "cert_id": "JISEC-C0714", "certification_date": "2021-03-10", "cc_version": "3.1 Release5", "assurance_level": "ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_ECD.1, ASE_REQ.1, ASE_TSS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1", "protection_profile": "Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 (Certification Identification: JISEC-C0553)", "vendor": "KONICA MINOLTA, INC.", "evaluation_facility": "ECSEC Laboratory Inc.\n Evaluation Center", "report_link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000001b34-att/c0714_erpt.pdf", "cert_link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000001b34-att/c0714_eimg.pdf", "target_link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000001b34-att/c0714_est.pdf", "description": "PRODUCT DESCRIPTION \n \n \n Description of TOE \n The TOE is a Multi-Function Printer (MFP) that has the functions, such as Copy, Scan, Print, Fax and Document storage and retrieval functions. The TOE provides the security functions required by the Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 defined as the Protection Profile for MFP. \n \n \n \n TOE Security functions \n The TOE provides the following security functions: \n \n Identification and Authentication function \n Access Control function \n Encryption function \n Trusted Communications function \n Security Management function \n Audit function \n Trusted Operation function \n FAX Separation function" } } } } } } }, { "_id": { "$oid": "67113c70700c28def2a978ad" }, "run_id": { "$oid": "67113c29700c28def2a97449" }, "dgst": "f0c22e3e4abad667", "timestamp": { "$date": "2024-10-17T11:26:45.075Z" }, "type": "change", "diff": { "__update__": { "protection_profiles": { "_type": "set", "_value": [ { "_type": "sec_certs.sample.protection_profile.ProtectionProfile", "pp_name": "Protection Profile for Hardcopy Devices", "pp_eal": null, "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/c0553_pp.pdf", "pp_ids": { "_type": "frozenset", "_value": [ "PP_HCD_V1.0" ] } } ] } } } }, { "_id": { "$oid": "672ffc06fb882d74835eb232" }, "run_id": { "$oid": "672ffba8fb882d74835eae78" }, "dgst": "f0c22e3e4abad667", "timestamp": { "$date": "2024-11-09T17:43:21.303Z" }, "type": "change", "diff": { "__update__": { "heuristics": { "__update__": { "scheme_data": { "__update__": { "cert_id": "JISEC-CC-CRP-C0714", "toe_overseas_name": "KONICA MINOLTA bizhub 4750i/bizhub 4050i with FK-517, DEVELOP ineo 4750i/ineo 4050i with FK-517G00-19", "certification_date": { "_type": "date", "_value": "2021-03-01" }, "toe_japan_name": "KONICA MINOLTA bizhub 4750i/bizhub 4050i with FK-517, DEVELOP ineo 4750i/ineo 4050i with FK-517G00-19", "enhanced": { "__update__": { "product": "KONICA MINOLTA bizhub 4750i/bizhub 4050i with FK-517, DEVELOP ineo 4750i/ineo 4050i with FK-517", "cert_id": "JISEC-CC-CRP-C0714", "evaluation_facility": "ECSEC Laboratory Inc. Evaluation Center", "description": "PRODUCT DESCRIPTION Description of TOE The TOE is a Multi-Function Printer (MFP) that has the functions, such as Copy, Scan, Print, Fax and Document storage and retrieval functions. The TOE provides the security functions required by the Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 defined as the Protection Profile for MFP. TOE Security functions The TOE provides the following security functions: Identification and Authentication function Access Control function Encryption function Trusted Communications function Security Management function Audit function Trusted Operation function FAX Separation function" }, "__delete__": [ "certification_date" ] } } } } } } } }, { "_id": { "$oid": "673f6585a1452c910a80be12" }, "run_id": { "$oid": "673f6538a1452c910a80b5ad" }, "dgst": "f0c22e3e4abad667", "timestamp": { "$date": "2024-11-21T11:03:40.77Z" }, "type": "change", "diff": { "__update__": { "heuristics": { "__insert__": { "prev_certificates": [], "next_certificates": [] }, "__update__": { "scheme_data": { "__update__": { "toe_overseas_name": "KONICA MINOLTA bizhub 4750i / bizhub 4050i with FK-517, DEVELOP ineo 4750i / ineo 4050i with FK-517G00-19", "toe_japan_name": "KONICA MINOLTA bizhub 4750i / bizhub 4050i with FK-517, DEVELOP ineo 4750i / ineo 4050i with FK-517G00-19" } } } } } } }, { "_id": { "$oid": "674df9f4f2031bf1fe70ba93" }, "run_id": { "$oid": "674df9b4f2031bf1fe70ba63" }, "dgst": "f0c22e3e4abad667", "timestamp": { "$date": "2024-12-02T12:00:00.333Z" }, "type": "change", "diff": { "__update__": { "report_link": "https://www.commoncriteriaportal.org/files/epfiles/c0714_erpt.pdf", "st_link": "https://www.commoncriteriaportal.org/files/epfiles/c0714_est.pdf", "cert_link": null, "manufacturer_web": null, "protection_profiles": { "_type": "set", "_value": [ { "_type": "sec_certs.sample.protection_profile.ProtectionProfile", "pp_name": "PP_HCD_V1.0", "pp_eal": null, "pp_link": null, "pp_ids": null } ] }, "state": { "__update__": { "cert": { "__update__": { "download_ok": false, "convert_ok": false, "extract_ok": false, "pdf_hash": null, "txt_hash": null } } } }, "pdf_data": { "__update__": { "cert_metadata": null, "cert_keywords": null, "cert_filename": null } } } } }, { "_id": { "$oid": "67a4087c616188395327189d" }, "run_id": { "$oid": "67a4080e616188395327018d" }, "dgst": "f0c22e3e4abad667", "timestamp": { "$date": "2025-02-05T18:04:55.043Z" }, "type": "change", "diff": { "__insert__": { "protection_profile_links": null }, "__update__": { "state": { "__update__": { "report": { "__update__": { "_type": "sec_certs.sample.document_state.DocumentState" } }, "st": { "__update__": { "_type": "sec_certs.sample.document_state.DocumentState" } }, "cert": { "__update__": { "_type": "sec_certs.sample.document_state.DocumentState" } } } }, "heuristics": { "__insert__": { "protection_profiles": null, "eal": null }, "__update__": { "prev_certificates": null, "next_certificates": null } } }, "__delete__": [ "protection_profiles" ] } }, { "_id": { "$oid": "669f80cd566b7c5a18058cc8" }, "run_id": { "$oid": "669f8076566b7c5a1805773d" }, "dgst": "f1174ac2e100bc5c", "timestamp": { "$date": "2024-07-23T00:09:57.927Z" }, "type": "new", "diff": { "_type": "sec_certs.sample.cc.CCCertificate", "dgst": "f1174ac2e100bc5c", "status": "archived", "category": "Network and Network-Related Devices and Systems", "name": "Allied Telesis x930 Series Switches v5.4.6-1", "manufacturer": "Allied Telesis", "scheme": "US", "security_level": { "_type": "set", "_value": [] }, "not_valid_before": { "_type": "date", "_value": "2018-05-01" }, "not_valid_after": { "_type": "date", "_value": "2020-05-01" }, "report_link": "https://www.commoncriteriaportal.org/files/epfiles/st_vid10784-vr.pdf", "st_link": "https://www.commoncriteriaportal.org/files/epfiles/st_vid10784-st.pdf", "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10784-ci.pdf", "manufacturer_web": "https://alliedtelesis.com/", "protection_profiles": { "_type": "set", "_value": [ { "_type": "sec_certs.sample.protection_profile.ProtectionProfile", "pp_name": "collaborative Protection Profile for Network Devices v1.0", "pp_eal": null, "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V1.0.pdf", "pp_ids": null } ] }, "maintenance_updates": { "_type": "set", "_value": [] }, "state": { "_type": "sec_certs.sample.cc.CCCertificate.InternalState", "report": { "_type": "sec_certs.sample.cc.CCCertificate.DocumentState", "download_ok": true, "convert_garbage": false, "convert_ok": true, "extract_ok": true, "pdf_hash": "ef1e331d623caff5d9c2a8d69618406dea561d93e2ae41a86dbec88b7235d915", "txt_hash": "b5100b444e1f1cbb511b4a25626c161a2eed6f4c38be913a47ac937a9a325bf3" }, "st": { "_type": "sec_certs.sample.cc.CCCertificate.DocumentState", "download_ok": true, "convert_garbage": false, "convert_ok": true, "extract_ok": true, "pdf_hash": "f82ad5e1cee4bcfcae9d7cbaf04b045331c17d93664a6e84df6b0ceb3f5a1268", "txt_hash": "6e4019d8338c73fa8565073c764dd5399c635d7068e8762da83dd0f1bfaed7bf" }, "cert": { "_type": "sec_certs.sample.cc.CCCertificate.DocumentState", "download_ok": true, "convert_garbage": true, "convert_ok": true, "extract_ok": true, "pdf_hash": "f7c91a1b171bde1b889ea01e4c1c7c7453a9e6519c661265cfce39ffad6b6123", "txt_hash": "c60e2f8d622969b2f2d95e03e43c1b41d2f292ef85d39416ebad98a6cf3dceaa" } }, "pdf_data": { "_type": "sec_certs.sample.cc.CCCertificate.PdfData", "report_metadata": { "pdf_file_size_bytes": 675049, "pdf_is_encrypted": false, "pdf_number_of_pages": 19, "/CreationDate": "D:20180502155110-04'00'", "/ModDate": "D:20180502155110-04'00'", "pdf_hyperlinks": { "_type": "set", "_value": [] } }, "st_metadata": { "pdf_file_size_bytes": 802620, "pdf_is_encrypted": false, "pdf_number_of_pages": 89, "/AppVersion": "15.0000", "/Author": "Bethany Henderson", "/Comments": "", "/Company": "", "/CreationDate": "D:20180410100904-07'00'", "/Creator": "Acrobat PDFMaker 17 for Word", "/DocSecurity": "0", "/HyperlinksChanged": "0", "/LinksUpToDate": "0", "/ModDate": "D:20180410100915-07'00'", "/Producer": "Adobe PDF Library 15.0", "/ScaleCrop": "0", "/ShareDoc": "0", "/SourceModified": "D:20180410170810", "/Subject": "", "/Title": "", "pdf_hyperlinks": { "_type": "set", "_value": [ "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=169", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=241", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=115", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=98", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=154", "https://csrc.nist.gov/Projects/Cryptographic-Algorithm-Validation-Program/Validation/Validation-List/Component#1834", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=129", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=263", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=97", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=168", "https://csrc.nist.gov/Projects/Cryptographic-Algorithm-Validation-Program/Validation/Validation-List/RSA#2229", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=174", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=120", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=171", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=234", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=116", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=157", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=287", "https://csrc.nist.gov/Projects/Cryptographic-Algorithm-Validation-Program/Validation/Validation-List/ECDSA#858", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=232", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=188", "https://csrc.nist.gov/Projects/Cryptographic-Algorithm-Validation-Program/Validation/Validation-List/HMAC#2546", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=189", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=156", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=193", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=203", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=173", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=93", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=192", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=114", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=119", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=172", "https://csrc.nist.gov/Projects/Cryptographic-Algorithm-Validation-Program/Validation/Validation-List/DRBG#1133", "https://csrc.nist.gov/Projects/Cryptographic-Algorithm-Validation-Program/Validation/Validation-List/SHS#3228", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=191", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=233", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=133", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=187", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=186", "https://csrc.nist.gov/Projects/Cryptographic-Algorithm-Validation-Program/Validation/Validation-List/RSA#2871", "https://csrc.nist.gov/Projects/Cryptographic-Algorithm-Validation-Program/Validation/Validation-List/AES#3919", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=185", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=117", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=158", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=99", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=205" ] } }, "cert_metadata": { "pdf_file_size_bytes": 183860, "pdf_is_encrypted": false, "pdf_number_of_pages": 1, "/ModDate": "D:20180502163026-04'00'", "/CreationDate": "D:20180502163026-04'00'", "/Producer": "iText 2.1.0 (by lowagie.com)", "pdf_hyperlinks": { "_type": "set", "_value": [] } }, "report_frontpage": { "US": { "cert_id": "CCEVS-VR-10784-2018", "cert_item": "Allied Telesis, Inc. Allied Telesis x930 Series Switches x930 Series Switches with AlliedWare Plus version 5.4.6-1", "cert_lab": "US NIAP" } }, "st_frontpage": null, "cert_frontpage": null, "report_keywords": { "cc_cert_id": { "US": { "CCEVS-VR-10784-2018": 1 } }, "cc_protection_profile_id": {}, "cc_security_level": {}, "cc_sar": {}, "cc_sfr": {}, "cc_claims": { "T": { "T.UNAUTHORIZED_ADMINISTRATOR_ACCESS": 1, "T.WEAK_CRYPTOGRAPHY": 1, "T.UNTRUSTED_COMMUNICATION_CHANNELS": 1, "T.WEAK_AUTHENTICATION_ENDPOINTS": 1, "T.UPDATE_COMPROMISE": 1, "T.UNDETECTED_ACTIVITY": 1, "T.SECURITY_FUNCTIONALITY_COMPROMISE": 1, "T.PASSWORD_CRACKING": 1, "T.SECURITY_FUNCTIONALITY_FAILURE": 1 }, "A": { "A.PHYSICAL_PROTECTION": 1, "A.LIMITED_FUNCTIONALITY": 1, "A.NO_THRU_TRAFFIC_PROTECTION": 1, "A.TRUSTED_ADMINISTRATOR": 1, "A.REGULAR_UPDATES": 1, "A.ADMIN_CREDENTIALS_SECURE": 1 } }, "vendor": {}, "eval_facility": { "UL": { "UL Verification Services": 4 } }, "symmetric_crypto": { "AES_competition": { "AES": { "AES": 1 } }, "constructions": { "MAC": { "HMAC-SHA-256": 1 } } }, "asymmetric_crypto": { "ECC": { "ECDH": { "ECDH": 2 }, "ECDSA": { "ECDSA": 3 } } }, "pq_crypto": {}, "hash_function": {}, "crypto_scheme": { "KEX": { "Key Exchange": 1 } }, "crypto_protocol": { "SSH": { "SSH": 4 }, "TLS": { "TLS": { "TLS": 2 } } }, "randomness": {}, "cipher_mode": { "CBC": { "CBC": 1 } }, "ecc_curve": { "NIST": { "P-256": 6, "P-384": 6 } }, "crypto_engine": {}, "tls_cipher_suite": { "TLS": { "TLS_RSA_WITH_AES_128_CBC_SHA": 2 } }, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": {}, "technical_report_id": {}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": { "CC": { "CCMB-2012-09-001": 1, "CCMB-2012-09-002": 1, "CCMB-2012-09-003": 1, "CCMB-2012-09-004": 1 } }, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": {} }, "st_keywords": { "cc_cert_id": {}, "cc_protection_profile_id": {}, "cc_security_level": {}, "cc_sar": { "ADV": { "ADV_FSP.1": 5 }, "AGD": { "AGD_OPE.1": 2, "AGD_PRE.1": 2 }, "ALC": { "ALC_CMC.1": 3, "ALC_CMS.1": 3 }, "ATE": { "ATE_IND.1": 3, "ATE_IND": 2 }, "AVA": { "AVA_VAN.1": 2, "AVA_VAN": 2 }, "ASE": { "ASE_CCL.1": 7, "ASE_ECD.1": 1, "ASE_INT.1": 1, "ASE_OBJ.1": 1, "ASE_REQ.1": 1, "ASE_SPD.1": 1, "ASE_TSS.1": 2 } }, "cc_sfr": { "FAU": { "FAU_GEN.1": 5, "FAU_GEN.2": 4, "FAU_STG.1": 4, "FAU_STG_EXT.1": 4, "FAU_GEN.1.1": 3, "FAU_GEN.1.2": 1, "FAU_GEN.2.1": 1, "FAU_STG.1.1": 1, "FAU_STG.1.2": 1, "FAU_STG_EXT.1.1": 2, "FAU_STG_EXT.1.2": 4, "FAU_STG_EXT.1.3": 10, "FAU_STG_EXT.2": 5 }, "FCS": { "FCS_CKM.1": 11, "FCS_TLSC_EXT": 1, "FCS_CKM.2": 11, "FCS_CKM.4": 5, "FCS_COP.1": 28, "FCS_RBG_EXT.1": 5, "FCS_SSHS_EXT.1": 5, "FCS_TLSC_EXT.1": 7, "FCS_PMG_EXT.1": 1, "FCS_CKM.1.1": 6, "FCS_CKM.2.1": 6, "FCS_CKM.4.1": 1, "FCS_COP.1.1": 8, "FCS_RBG_EXT.1.1": 1, "FCS_RBG_EXT.1.2": 3, "FCS_SSHS_EXT.1.1": 1, "FCS_SSHS_EXT.1.2": 1, "FCS_SSHS_EXT.1.5": 2, "FCS_SSHS_EXT.1.3": 1, "FCS_SSHS_EXT.1.4": 1, "FCS_COP": 1, "FCS_SSH_EXT.1.4": 1, "FCS_SSH_EXT.1.8": 2, "FCS_SSHS_EXT.1.6": 1, "FCS_SSHS_EXT.1.7": 1, "FCS_SSHS_EXT.1.8": 2, "FCS_TLSC_EXT.1.1": 4, "FCS_TLSS_EXT.1.1": 1, "FCS_TLSS_EXT.2.1": 1, "FCS_TLSC_EXT.1.2": 2, "FCS_TLSC_EXT.1.3": 1, "FCS_TLSC_EXT.1.4": 1, "FCS_TLS_EXT.1.1": 1, "FCS_SSHC_EXT.1.8": 1 }, "FIA": { "FIA_UAU.1.1": 1, "FIA_UAU.1": 1, "FIA_PMG_EXT.1": 2, "FIA_UIA_EXT.1": 8, "FIA_UAU_EXT.2": 4, "FIA_UAU.7": 4, "FIA_PMG_EXT.1.1": 2, "FIA_UIA_EXT.1.1": 1, "FIA_UIA_EXT.1.2": 1, "FIA_UAU_EXT.2.1": 1, "FIA_UAU.7.1": 1 }, "FMT": { "FMT_SMF.1.1": 3, "FMT_MOF.1": 26, "FMT_MTD.1": 6, "FMT_MTD": 5, "FMT_SMF.1": 7, "FMT_SMR.2": 4, "FMT_MOF.1.1": 7, "FMT_MTD.1.1": 1, "FMT_MOF": 3, "FMT_SMR.2.1": 1, "FMT_SMR.2.2": 1, "FMT_SMR.2.3": 2 }, "FPT": { "FPT_SKP_EXT.1": 4, "FPT_APW_EXT.1": 5, "FPT_TST_EXT.1": 4, "FPT_TUD_EXT.1": 7, "FPT_STM.1": 4, "FPT_TUD_EXT.2": 2, "FPT_TST_EXT.2": 2, "FPT_TUD_EXT.2.2": 2, "FPT_TST_EXT": 1, "FPT_SKP_EXT.1.1": 1, "FPT_APW_EXT.1.1": 1, "FPT_APW_EXT.1.2": 1, "FPT_TST_EXT.1.1": 1, "FPT_TUD_EXT.1.1": 4, "FPT_TUD_EXT.1.2": 2, "FPT_TUD_EXT.1.3": 3, "FPT_STM.1.1": 1, "FPT_ITT.1": 1 }, "FTA": { "FTA_SSL_EXT.1": 4, "FTA_SSL.3": 6, "FTA_SSL.4": 6, "FTA_TAB.1": 7, "FTA_SSL_EXT.1.1": 1, "FTA_SSL.3.1": 1, "FTA_SSL.4.1": 1, "FTA_TAB.1.1": 1 }, "FTP": { "FTP_ITC.1": 7, "FTP_TRP.1": 5, "FTP_ITC.1.1": 3, "FTP_ITC.1.2": 1, "FTP_ITC.1.3": 2, "FTP_TRP.1.1": 1, "FTP_TRP.1.2": 1, "FTP_TRP.1.3": 1, "FTP_TRP": 2 } }, "cc_claims": { "T": { "T.UNAUTHORIZED_ADMINISTRATOR_ACCESS": 1, "T.WEAK_CRYPTOGRAPHY": 1, "T.UNTRUSTED_COMMUNICATION_CHANNELS": 1, "T.WEAK_AUTHENTICATION_ENDPOINTS": 1, "T.UPDATE_COMPROMISE": 1, "T.UNDETECTED_ACTIVITY": 1, "T.SECURITY_FUNCTIONALITY_COMPROMISE": 1, "T.PASSWORD_CRACKING": 1, "T.SECURITY_FUNCTIONALITY_FAILURE": 1 }, "A": { "A.PHYSICAL_PROTECTION": 1, "A.LIMITED_FUNCTIONALITY": 1, "A.NO_THRU_TRAFFIC_PROTECTION": 1, "A.TRUSTED_ADMINISTRATOR": 1, "A.REGULAR_UPDATES": 1, "A.ADMIN_CREDENTIALS_SECURE": 1 }, "OE": { "OE.PHYSICAL": 1, "OE.NO_GENERAL_PURPOSE": 1, "OE.NO_THRU_TRAFFIC_PROTECTION": 1, "OE.TRUSTED_ADMIN": 1, "OE.UPDATES": 1, "OE.ADMIN_CREDENTIALS_SECURE": 1 } }, "vendor": { "Microsoft": { "Microsoft": 1 } }, "eval_facility": { "UL": { "UL Verification Services": 1 } }, "symmetric_crypto": { "AES_competition": { "AES": { "AES": 19, "AES-256": 2 } }, "constructions": { "MAC": { "HMAC": 8, "HMAC-SHA-256": 6 } } }, "asymmetric_crypto": { "RSA": { "RSA 2048": 5, "RSA 3072": 2 }, "ECC": { "ECDH": { "ECDH": 7, "ECDHE": 2 }, "ECDSA": { "ECDSA": 21 }, "ECC": { "ECC": 8 } }, "FF": { "DH": { "DH": 2, "Diffie-Hellman": 9, "DHE": 1 }, "DSA": { "DSA": 1 } } }, "pq_crypto": {}, "hash_function": { "SHA": { "SHA1": { "SHA-1": 5 }, "SHA2": { "SHA-256": 10, "SHA-384": 4, "SHA-224": 1, "SHA-512": 1, "SHA-2": 1 } } }, "crypto_scheme": { "MAC": { "MAC": 17 }, "KEX": { "Key Exchange": 6 }, "KA": { "Key Agreement": 4 } }, "crypto_protocol": { "SSH": { "SSH": 98 }, "TLS": { "TLS": { "TLS": 51, "TLS 1.2": 1, "TLS 1.1": 1, "TLS v1.2": 1, "TLSv1.1": 1, "TLSv1.2": 1 } }, "IPsec": { "IPsec": 2 } }, "randomness": { "PRNG": { "DRBG": 6 }, "RNG": { "RNG": 6, "RBG": 7 } }, "cipher_mode": { "CBC": { "CBC": 6 } }, "ecc_curve": { "NIST": { "P-256": 28, "P-384": 26, "P-192": 2, "P-224": 4, "P-521": 8 } }, "crypto_engine": {}, "tls_cipher_suite": { "TLS": { "TLS_RSA_WITH_AES_128_CBC_SHA": 7, "TLS_NULL_WITH_NULL_NULL": 1 } }, "crypto_library": { "OpenSSL": { "OpenSSL": 1 } }, "vulnerability": {}, "side_channel_analysis": {}, "technical_report_id": {}, "device_model": {}, "tee_name": { "other": { "T6": 1 } }, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": { "FIPS": { "FIPS PUB 186-4": 4, "FIPS 140-2": 2, "FIPS 186-4": 5 }, "NIST": { "NIST SP 800-56B": 1, "SP 800-56B": 1, "SP 800-131A": 1, "NIST SP 800-131A": 1, "SP 800-56A": 1 }, "PKCS": { "PKCS #1": 1 }, "RFC": { "RFC5759": 1, "RFC5280": 1, "RFC 3526": 1, "RFC 4253": 4, "RFC 5647": 4, "RFC 6668": 1, "RFC 5246": 4, "RFC 4346": 2, "RFC 3268": 1, "RFC 6125": 3, "RFC 5280": 3, "RFC 2560": 1, "RFC 5425": 1, "RFC 6614": 1, "RFC 4252": 1 }, "ISO": { "ISO/IEC 9796-2": 1, "ISO/IEC 14888-3": 1, "ISO/IEC 10118": 2, "ISO/IEC 18031:2011": 3 }, "X509": { "X.509": 26 }, "CC": { "CCMB-2012-09-001": 1, "CCMB-2012-09-002": 1, "CCMB-2012-09-003": 1, "CCMB-2012-09-004": 1 } }, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": { "OutOfScope": { "out of scope": 1, "indicated as “REQUIRED” but not listed in the later elements of this component are implemented is out of scope of the assurance activity for this requirement. FCS_SSHS_EXT.1.2 The TSF shall ensure that the SSH": 1 } } }, "cert_keywords": { "cc_cert_id": { "US": { "CCEVS-VR-VID10784-2018": 1 } }, "cc_protection_profile_id": {}, "cc_security_level": {}, "cc_sar": {}, "cc_sfr": {}, "cc_claims": {}, "vendor": {}, "eval_facility": { "UL": { "UL Verification Services": 1 } }, "symmetric_crypto": {}, "asymmetric_crypto": {}, "pq_crypto": {}, "hash_function": {}, "crypto_scheme": {}, "crypto_protocol": {}, "randomness": {}, "cipher_mode": {}, "ecc_curve": {}, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": {}, "technical_report_id": {}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": {}, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": {} }, "report_filename": "st_vid10784-vr.pdf", "st_filename": "st_vid10784-st.pdf", "cert_filename": "st_vid10784-ci.pdf" }, "heuristics": { "_type": "sec_certs.sample.cc.CCCertificate.Heuristics", "extracted_versions": { "_type": "set", "_value": [ "5.4.6" ] }, "cpe_matches": null, "verified_cpe_matches": null, "related_cves": null, "cert_lab": [ "US" ], "cert_id": "CCEVS-VR-10784-2018", "st_references": { "_type": "sec_certs.sample.certificate.References", "directly_referenced_by": null, "indirectly_referenced_by": null, "directly_referencing": null, "indirectly_referencing": null }, "report_references": { "_type": "sec_certs.sample.certificate.References", "directly_referenced_by": null, "indirectly_referenced_by": null, "directly_referencing": null, "indirectly_referencing": null }, "annotated_references": null, "extracted_sars": { "_type": "set", "_value": [ { "_type": "sec_certs.sample.sar.SAR", "family": "ATE_IND", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_INT", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_ECD", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AGD_PRE", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AVA_VAN", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_OBJ", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_TSS", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ADV_FSP", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_CCL", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_CMC", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_SPD", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AGD_OPE", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_CMS", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_REQ", "level": 1 } ] }, "direct_transitive_cves": null, "indirect_transitive_cves": null, "scheme_data": { "product": "Allied Telesis x930 Series Switches v5.4.6-1", "id": "CCEVS-VR-VID10784", "url": "https://www.niap-ccevs.org/product/10784", "certification_date": "2018-05-01T00:00:00Z", "expiration_date": "2020-05-01T00:00:00Z", "category": "Network Device", "vendor": "Allied Telesis", "evaluation_facility": "UL Verification Services Inc. (Formerly InfoGard)", "scheme": "US" } }, "_id": "f1174ac2e100bc5c" } }, { "_id": { "$oid": "66ba44469466f60634175242" }, "run_id": { "$oid": "66ba432a9466f606341743a8" }, "dgst": "f1174ac2e100bc5c", "timestamp": { "$date": "2024-08-12T12:00:07.61Z" }, "type": "change", "diff": { "__update__": { "state": { "__update__": { "report": { "__update__": { "download_ok": false, "convert_ok": false, "extract_ok": false, "pdf_hash": null, "txt_hash": null } } } }, "pdf_data": { "__update__": { "report_metadata": null, "report_frontpage": null, "report_keywords": null, "report_filename": null } }, "heuristics": { "__update__": { "cert_lab": null, "cert_id": "CCEVS-VR-VID-10784-2018" } } } } }, { "_id": { "$oid": "66c0a10b1c78507fd106081b" }, "run_id": { "$oid": "66c0a0e21c78507fd105fc06" }, "dgst": "f1174ac2e100bc5c", "timestamp": { "$date": "2024-08-17T12:52:18.171Z" }, "type": "change", "diff": { "__update__": { "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10784-vr.pdf", "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10784-st.pdf", "state": { "__update__": { "st": { "__update__": { "download_ok": false, "convert_ok": false, "extract_ok": false, "pdf_hash": null, "txt_hash": null } }, "cert": { "__update__": { "download_ok": false, "convert_garbage": false, "convert_ok": false, "extract_ok": false, "pdf_hash": null, "txt_hash": null } } } }, "pdf_data": { "__update__": { "st_metadata": null, "cert_metadata": null, "st_keywords": null, "cert_keywords": null, "st_filename": null, "cert_filename": null } }, "heuristics": { "__update__": { "cert_id": null, "extracted_sars": null } } } } }, { "_id": { "$oid": "66c7affd2ff8c812f518c9a4" }, "run_id": { "$oid": "66c7afc82ff8c812f518b966" }, "dgst": "f1174ac2e100bc5c", "timestamp": { "$date": "2024-08-22T18:04:48.021Z" }, "type": "change", "diff": { "__update__": { "state": { "__update__": { "report": { "__update__": { "download_ok": true, "convert_ok": true, "extract_ok": true, "pdf_hash": "ef1e331d623caff5d9c2a8d69618406dea561d93e2ae41a86dbec88b7235d915", "txt_hash": "b5100b444e1f1cbb511b4a25626c161a2eed6f4c38be913a47ac937a9a325bf3" } }, "st": { "__update__": { "download_ok": true, "convert_ok": true, "extract_ok": true, "pdf_hash": "f82ad5e1cee4bcfcae9d7cbaf04b045331c17d93664a6e84df6b0ceb3f5a1268", "txt_hash": "6e4019d8338c73fa8565073c764dd5399c635d7068e8762da83dd0f1bfaed7bf" } }, "cert": { "__update__": { "download_ok": true, "convert_garbage": true, "convert_ok": true, "extract_ok": true, "pdf_hash": "f7c91a1b171bde1b889ea01e4c1c7c7453a9e6519c661265cfce39ffad6b6123", "txt_hash": "c60e2f8d622969b2f2d95e03e43c1b41d2f292ef85d39416ebad98a6cf3dceaa" } } } }, "pdf_data": { "__update__": { "report_metadata": { "pdf_file_size_bytes": 675049, "pdf_is_encrypted": false, "pdf_number_of_pages": 19, "/CreationDate": "D:20180502155110-04'00'", "/ModDate": "D:20180502155110-04'00'", "pdf_hyperlinks": { "_type": "set", "_value": [] } }, "st_metadata": { "pdf_file_size_bytes": 802620, "pdf_is_encrypted": false, "pdf_number_of_pages": 89, "/AppVersion": "15.0000", "/Author": "Bethany Henderson", "/Comments": "", "/Company": "", "/CreationDate": "D:20180410100904-07'00'", "/Creator": "Acrobat PDFMaker 17 for Word", "/DocSecurity": "0", "/HyperlinksChanged": "0", "/LinksUpToDate": "0", "/ModDate": "D:20180410100915-07'00'", "/Producer": "Adobe PDF Library 15.0", "/ScaleCrop": "0", "/ShareDoc": "0", "/SourceModified": "D:20180410170810", "/Subject": "", "/Title": "", "pdf_hyperlinks": { "_type": "set", "_value": [ "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=172", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=233", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=120", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=114", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=158", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=157", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=129", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=191", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=185", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=187", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=168", "https://csrc.nist.gov/Projects/Cryptographic-Algorithm-Validation-Program/Validation/Validation-List/SHS#3228", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=174", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=287", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=234", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=205", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=192", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=232", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=189", "https://csrc.nist.gov/Projects/Cryptographic-Algorithm-Validation-Program/Validation/Validation-List/RSA#2229", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=193", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=203", "https://csrc.nist.gov/Projects/Cryptographic-Algorithm-Validation-Program/Validation/Validation-List/Component#1834", "https://csrc.nist.gov/Projects/Cryptographic-Algorithm-Validation-Program/Validation/Validation-List/AES#3919", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=263", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=119", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=116", "https://csrc.nist.gov/Projects/Cryptographic-Algorithm-Validation-Program/Validation/Validation-List/RSA#2871", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=117", "https://csrc.nist.gov/Projects/Cryptographic-Algorithm-Validation-Program/Validation/Validation-List/DRBG#1133", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=173", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=98", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=186", "https://csrc.nist.gov/Projects/Cryptographic-Algorithm-Validation-Program/Validation/Validation-List/HMAC#2546", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=97", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=154", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=93", "https://csrc.nist.gov/Projects/Cryptographic-Algorithm-Validation-Program/Validation/Validation-List/ECDSA#858", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=169", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=188", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=99", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=241", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=115", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=133", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=171", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=156" ] } }, "cert_metadata": { "pdf_file_size_bytes": 183860, "pdf_is_encrypted": false, "pdf_number_of_pages": 1, "/ModDate": "D:20180502163026-04'00'", "/CreationDate": "D:20180502163026-04'00'", "/Producer": "iText 2.1.0 (by lowagie.com)", "pdf_hyperlinks": { "_type": "set", "_value": [] } }, "report_frontpage": { "US": { "cert_id": "CCEVS-VR-10784-2018", "cert_item": "Allied Telesis, Inc. Allied Telesis x930 Series Switches x930 Series Switches with AlliedWare Plus version 5.4.6-1", "cert_lab": "US NIAP" } }, "report_keywords": { "cc_cert_id": { "US": { "CCEVS-VR-10784-2018": 1 } }, "cc_protection_profile_id": {}, "cc_security_level": {}, "cc_sar": {}, "cc_sfr": {}, "cc_claims": { "T": { "T.UNAUTHORIZED_ADMINISTRATOR_ACCESS": 1, "T.WEAK_CRYPTOGRAPHY": 1, "T.UNTRUSTED_COMMUNICATION_CHANNELS": 1, "T.WEAK_AUTHENTICATION_ENDPOINTS": 1, "T.UPDATE_COMPROMISE": 1, "T.UNDETECTED_ACTIVITY": 1, "T.SECURITY_FUNCTIONALITY_COMPROMISE": 1, "T.PASSWORD_CRACKING": 1, "T.SECURITY_FUNCTIONALITY_FAILURE": 1 }, "A": { "A.PHYSICAL_PROTECTION": 1, "A.LIMITED_FUNCTIONALITY": 1, "A.NO_THRU_TRAFFIC_PROTECTION": 1, "A.TRUSTED_ADMINISTRATOR": 1, "A.REGULAR_UPDATES": 1, "A.ADMIN_CREDENTIALS_SECURE": 1 } }, "vendor": {}, "eval_facility": { "UL": { "UL Verification Services": 4 } }, "symmetric_crypto": { "AES_competition": { "AES": { "AES": 1 } }, "constructions": { "MAC": { "HMAC-SHA-256": 1 } } }, "asymmetric_crypto": { "ECC": { "ECDH": { "ECDH": 2 }, "ECDSA": { "ECDSA": 3 } } }, "pq_crypto": {}, "hash_function": {}, "crypto_scheme": { "KEX": { "Key Exchange": 1 } }, "crypto_protocol": { "SSH": { "SSH": 4 }, "TLS": { "TLS": { "TLS": 2 } } }, "randomness": {}, "cipher_mode": { "CBC": { "CBC": 1 } }, "ecc_curve": { "NIST": { "P-256": 6, "P-384": 6 } }, "crypto_engine": {}, "tls_cipher_suite": { "TLS": { "TLS_RSA_WITH_AES_128_CBC_SHA": 2 } }, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": {}, "technical_report_id": {}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": { "CC": { "CCMB-2012-09-001": 1, "CCMB-2012-09-002": 1, "CCMB-2012-09-003": 1, "CCMB-2012-09-004": 1 } }, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": {} }, "st_keywords": { "cc_cert_id": {}, "cc_protection_profile_id": {}, "cc_security_level": {}, "cc_sar": { "ADV": { "ADV_FSP.1": 5 }, "AGD": { "AGD_OPE.1": 2, "AGD_PRE.1": 2 }, "ALC": { "ALC_CMC.1": 3, "ALC_CMS.1": 3 }, "ATE": { "ATE_IND.1": 3, "ATE_IND": 2 }, "AVA": { "AVA_VAN.1": 2, "AVA_VAN": 2 }, "ASE": { "ASE_CCL.1": 7, "ASE_ECD.1": 1, "ASE_INT.1": 1, "ASE_OBJ.1": 1, "ASE_REQ.1": 1, "ASE_SPD.1": 1, "ASE_TSS.1": 2 } }, "cc_sfr": { "FAU": { "FAU_GEN.1": 5, "FAU_GEN.2": 4, "FAU_STG.1": 4, "FAU_STG_EXT.1": 4, "FAU_GEN.1.1": 3, "FAU_GEN.1.2": 1, "FAU_GEN.2.1": 1, "FAU_STG.1.1": 1, "FAU_STG.1.2": 1, "FAU_STG_EXT.1.1": 2, "FAU_STG_EXT.1.2": 4, "FAU_STG_EXT.1.3": 10, "FAU_STG_EXT.2": 5 }, "FCS": { "FCS_CKM.1": 11, "FCS_TLSC_EXT": 1, "FCS_CKM.2": 11, "FCS_CKM.4": 5, "FCS_COP.1": 28, "FCS_RBG_EXT.1": 5, "FCS_SSHS_EXT.1": 5, "FCS_TLSC_EXT.1": 7, "FCS_PMG_EXT.1": 1, "FCS_CKM.1.1": 6, "FCS_CKM.2.1": 6, "FCS_CKM.4.1": 1, "FCS_COP.1.1": 8, "FCS_RBG_EXT.1.1": 1, "FCS_RBG_EXT.1.2": 3, "FCS_SSHS_EXT.1.1": 1, "FCS_SSHS_EXT.1.2": 1, "FCS_SSHS_EXT.1.5": 2, "FCS_SSHS_EXT.1.3": 1, "FCS_SSHS_EXT.1.4": 1, "FCS_COP": 1, "FCS_SSH_EXT.1.4": 1, "FCS_SSH_EXT.1.8": 2, "FCS_SSHS_EXT.1.6": 1, "FCS_SSHS_EXT.1.7": 1, "FCS_SSHS_EXT.1.8": 2, "FCS_TLSC_EXT.1.1": 4, "FCS_TLSS_EXT.1.1": 1, "FCS_TLSS_EXT.2.1": 1, "FCS_TLSC_EXT.1.2": 2, "FCS_TLSC_EXT.1.3": 1, "FCS_TLSC_EXT.1.4": 1, "FCS_TLS_EXT.1.1": 1, "FCS_SSHC_EXT.1.8": 1 }, "FIA": { "FIA_UAU.1.1": 1, "FIA_UAU.1": 1, "FIA_PMG_EXT.1": 2, "FIA_UIA_EXT.1": 8, "FIA_UAU_EXT.2": 4, "FIA_UAU.7": 4, "FIA_PMG_EXT.1.1": 2, "FIA_UIA_EXT.1.1": 1, "FIA_UIA_EXT.1.2": 1, "FIA_UAU_EXT.2.1": 1, "FIA_UAU.7.1": 1 }, "FMT": { "FMT_SMF.1.1": 3, "FMT_MOF.1": 26, "FMT_MTD.1": 6, "FMT_MTD": 5, "FMT_SMF.1": 7, "FMT_SMR.2": 4, "FMT_MOF.1.1": 7, "FMT_MTD.1.1": 1, "FMT_MOF": 3, "FMT_SMR.2.1": 1, "FMT_SMR.2.2": 1, "FMT_SMR.2.3": 2 }, "FPT": { "FPT_SKP_EXT.1": 4, "FPT_APW_EXT.1": 5, "FPT_TST_EXT.1": 4, "FPT_TUD_EXT.1": 7, "FPT_STM.1": 4, "FPT_TUD_EXT.2": 2, "FPT_TST_EXT.2": 2, "FPT_TUD_EXT.2.2": 2, "FPT_TST_EXT": 1, "FPT_SKP_EXT.1.1": 1, "FPT_APW_EXT.1.1": 1, "FPT_APW_EXT.1.2": 1, "FPT_TST_EXT.1.1": 1, "FPT_TUD_EXT.1.1": 4, "FPT_TUD_EXT.1.2": 2, "FPT_TUD_EXT.1.3": 3, "FPT_STM.1.1": 1, "FPT_ITT.1": 1 }, "FTA": { "FTA_SSL_EXT.1": 4, "FTA_SSL.3": 6, "FTA_SSL.4": 6, "FTA_TAB.1": 7, "FTA_SSL_EXT.1.1": 1, "FTA_SSL.3.1": 1, "FTA_SSL.4.1": 1, "FTA_TAB.1.1": 1 }, "FTP": { "FTP_ITC.1": 7, "FTP_TRP.1": 5, "FTP_ITC.1.1": 3, "FTP_ITC.1.2": 1, "FTP_ITC.1.3": 2, "FTP_TRP.1.1": 1, "FTP_TRP.1.2": 1, "FTP_TRP.1.3": 1, "FTP_TRP": 2 } }, "cc_claims": { "T": { "T.UNAUTHORIZED_ADMINISTRATOR_ACCESS": 1, "T.WEAK_CRYPTOGRAPHY": 1, "T.UNTRUSTED_COMMUNICATION_CHANNELS": 1, "T.WEAK_AUTHENTICATION_ENDPOINTS": 1, "T.UPDATE_COMPROMISE": 1, "T.UNDETECTED_ACTIVITY": 1, "T.SECURITY_FUNCTIONALITY_COMPROMISE": 1, "T.PASSWORD_CRACKING": 1, "T.SECURITY_FUNCTIONALITY_FAILURE": 1 }, "A": { "A.PHYSICAL_PROTECTION": 1, "A.LIMITED_FUNCTIONALITY": 1, "A.NO_THRU_TRAFFIC_PROTECTION": 1, "A.TRUSTED_ADMINISTRATOR": 1, "A.REGULAR_UPDATES": 1, "A.ADMIN_CREDENTIALS_SECURE": 1 }, "OE": { "OE.PHYSICAL": 1, "OE.NO_GENERAL_PURPOSE": 1, "OE.NO_THRU_TRAFFIC_PROTECTION": 1, "OE.TRUSTED_ADMIN": 1, "OE.UPDATES": 1, "OE.ADMIN_CREDENTIALS_SECURE": 1 } }, "vendor": { "Microsoft": { "Microsoft": 1 } }, "eval_facility": { "UL": { "UL Verification Services": 1 } }, "symmetric_crypto": { "AES_competition": { "AES": { "AES": 19, "AES-256": 2 } }, "constructions": { "MAC": { "HMAC": 8, "HMAC-SHA-256": 6 } } }, "asymmetric_crypto": { "RSA": { "RSA 2048": 5, "RSA 3072": 2 }, "ECC": { "ECDH": { "ECDH": 7, "ECDHE": 2 }, "ECDSA": { "ECDSA": 21 }, "ECC": { "ECC": 8 } }, "FF": { "DH": { "DH": 2, "Diffie-Hellman": 9, "DHE": 1 }, "DSA": { "DSA": 1 } } }, "pq_crypto": {}, "hash_function": { "SHA": { "SHA1": { "SHA-1": 5 }, "SHA2": { "SHA-256": 10, "SHA-384": 4, "SHA-224": 1, "SHA-512": 1, "SHA-2": 1 } } }, "crypto_scheme": { "MAC": { "MAC": 17 }, "KEX": { "Key Exchange": 6 }, "KA": { "Key Agreement": 4 } }, "crypto_protocol": { "SSH": { "SSH": 98 }, "TLS": { "TLS": { "TLS": 51, "TLS 1.2": 1, "TLS 1.1": 1, "TLS v1.2": 1, "TLSv1.1": 1, "TLSv1.2": 1 } }, "IPsec": { "IPsec": 2 } }, "randomness": { "PRNG": { "DRBG": 6 }, "RNG": { "RNG": 6, "RBG": 7 } }, "cipher_mode": { "CBC": { "CBC": 6 } }, "ecc_curve": { "NIST": { "P-256": 28, "P-384": 26, "P-192": 2, "P-224": 4, "P-521": 8 } }, "crypto_engine": {}, "tls_cipher_suite": { "TLS": { "TLS_RSA_WITH_AES_128_CBC_SHA": 7, "TLS_NULL_WITH_NULL_NULL": 1 } }, "crypto_library": { "OpenSSL": { "OpenSSL": 1 } }, "vulnerability": {}, "side_channel_analysis": {}, "technical_report_id": {}, "device_model": {}, "tee_name": { "other": { "T6": 1 } }, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": { "FIPS": { "FIPS PUB 186-4": 4, "FIPS 140-2": 2, "FIPS 186-4": 5 }, "NIST": { "NIST SP 800-56B": 1, "SP 800-56B": 1, "SP 800-131A": 1, "NIST SP 800-131A": 1, "SP 800-56A": 1 }, "PKCS": { "PKCS #1": 1 }, "RFC": { "RFC5759": 1, "RFC5280": 1, "RFC 3526": 1, "RFC 4253": 4, "RFC 5647": 4, "RFC 6668": 1, "RFC 5246": 4, "RFC 4346": 2, "RFC 3268": 1, "RFC 6125": 3, "RFC 5280": 3, "RFC 2560": 1, "RFC 5425": 1, "RFC 6614": 1, "RFC 4252": 1 }, "ISO": { "ISO/IEC 9796-2": 1, "ISO/IEC 14888-3": 1, "ISO/IEC 10118": 2, "ISO/IEC 18031:2011": 3 }, "X509": { "X.509": 26 }, "CC": { "CCMB-2012-09-001": 1, "CCMB-2012-09-002": 1, "CCMB-2012-09-003": 1, "CCMB-2012-09-004": 1 } }, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": { "OutOfScope": { "out of scope": 1, "indicated as “REQUIRED” but not listed in the later elements of this component are implemented is out of scope of the assurance activity for this requirement. FCS_SSHS_EXT.1.2 The TSF shall ensure that the SSH": 1 } } }, "cert_keywords": { "cc_cert_id": { "US": { "CCEVS-VR-VID10784-2018": 1 } }, "cc_protection_profile_id": {}, "cc_security_level": {}, "cc_sar": {}, "cc_sfr": {}, "cc_claims": {}, "vendor": {}, "eval_facility": { "UL": { "UL Verification Services": 1 } }, "symmetric_crypto": {}, "asymmetric_crypto": {}, "pq_crypto": {}, "hash_function": {}, "crypto_scheme": {}, "crypto_protocol": {}, "randomness": {}, "cipher_mode": {}, "ecc_curve": {}, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": {}, "technical_report_id": {}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": {}, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": {} }, "report_filename": "st_vid10784-vr.pdf", "st_filename": "st_vid10784-st.pdf", "cert_filename": "st_vid10784-ci.pdf" } }, "heuristics": { "__update__": { "cert_lab": [ "US" ], "cert_id": "CCEVS-VR-10784-2018", "extracted_sars": { "_type": "set", "_value": [ { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_CMC", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_CCL", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ADV_FSP", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_OBJ", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_SPD", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AVA_VAN", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ALC_CMS", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AGD_PRE", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_REQ", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "AGD_OPE", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_ECD", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ATE_IND", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_TSS", "level": 1 }, { "_type": "sec_certs.sample.sar.SAR", "family": "ASE_INT", "level": 1 } ] } } } } } }, { "_id": { "$oid": "672ffc06fb882d74835eb6cd" }, "run_id": { "$oid": "672ffba8fb882d74835eae78" }, "dgst": "f1174ac2e100bc5c", "timestamp": { "$date": "2024-11-09T17:43:21.303Z" }, "type": "change", "diff": { "__update__": { "heuristics": { "__update__": { "scheme_data": { "__update__": { "certification_date": { "_type": "date", "_value": "2018-05-01" }, "expiration_date": { "_type": "date", "_value": "2020-05-01" } } } } } } } }, { "_id": { "$oid": "673f6585a1452c910a80b687" }, "run_id": { "$oid": "673f6538a1452c910a80b5ad" }, "dgst": "f1174ac2e100bc5c", "timestamp": { "$date": "2024-11-21T11:03:40.77Z" }, "type": "change", "diff": { "__update__": { "heuristics": { "__insert__": { "prev_certificates": [], "next_certificates": [] } } } } }, { "_id": { "$oid": "67572cbfe54d5dd1c4cb700d" }, "run_id": { "$oid": "67572c76e54d5dd1c4cb688c" }, "dgst": "f1174ac2e100bc5c", "timestamp": { "$date": "2024-12-09T12:00:03.127Z" }, "type": "change", "diff": { "__update__": { "heuristics": { "__update__": { "scheme_data": null } } } } }, { "_id": { "$oid": "676071d3e54d5dd1c4cb786a" }, "run_id": { "$oid": "67607184e54d5dd1c4cb70e4" }, "dgst": "f1174ac2e100bc5c", "timestamp": { "$date": "2024-12-16T12:00:01.445Z" }, "type": "change", "diff": { "__update__": { "heuristics": { "__update__": { "scheme_data": { "product": "Allied Telesis x930 Series Switches v5.4.6-1", "id": "CCEVS-VR-VID10784", "url": "https://www.niap-ccevs.org/product/10784", "certification_date": { "_type": "date", "_value": "2018-05-01" }, "expiration_date": { "_type": "date", "_value": "2020-05-01" }, "category": "Network Device", "vendor": "Allied Telesis", "evaluation_facility": "UL Verification Services Inc. (Formerly InfoGard)", "scheme": "US" } } } } } }, { "_id": { "$oid": "6772ddb1f2031bf1fe70bf2b" }, "run_id": { "$oid": "6772dd6df2031bf1fe70bb44" }, "dgst": "f1174ac2e100bc5c", "timestamp": { "$date": "2024-12-30T12:00:01.588Z" }, "type": "change", "diff": { "__update__": { "heuristics": { "__update__": { "scheme_data": null } } } } }, { "_id": { "$oid": "677c179be54d5dd1c4cb8152" }, "run_id": { "$oid": "677c1753e54d5dd1c4cb79d9" }, "dgst": "f1174ac2e100bc5c", "timestamp": { "$date": "2025-01-06T12:00:01.435Z" }, "type": "change", "diff": { "__update__": { "heuristics": { "__update__": { "scheme_data": { "product": "Allied Telesis x930 Series Switches v5.4.6-1", "id": "CCEVS-VR-VID10784", "url": "https://www.niap-ccevs.org/product/10784", "certification_date": { "_type": "date", "_value": "2018-05-01" }, "expiration_date": { "_type": "date", "_value": "2020-05-01" }, "category": "Network Device", "vendor": "Allied Telesis", "evaluation_facility": "UL Verification Services Inc. (Formerly InfoGard)", "scheme": "US" } } } } } }, { "_id": { "$oid": "67a4087c6161883953270bce" }, "run_id": { "$oid": "67a4080e616188395327018d" }, "dgst": "f1174ac2e100bc5c", "timestamp": { "$date": "2025-02-05T18:04:55.043Z" }, "type": "change", "diff": { "__insert__": { "protection_profile_links": { "_type": "set", "_value": [ "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V1.0.pdf" ] } }, "__update__": { "state": { "__update__": { "report": { "__update__": { "_type": "sec_certs.sample.document_state.DocumentState" } }, "st": { "__update__": { "_type": "sec_certs.sample.document_state.DocumentState" } }, "cert": { "__update__": { "_type": "sec_certs.sample.document_state.DocumentState" } } } }, "heuristics": { "__insert__": { "protection_profiles": { "_type": "set", "_value": [ "c7cf611c6bb1e4b0" ] }, "eal": null }, "__update__": { "prev_certificates": null, "next_certificates": null, "scheme_data": null } } }, "__delete__": [ "protection_profiles" ] } }, { "_id": { "$oid": "67aa459ed14b3692bb8071d6" }, "run_id": { "$oid": "67aa4548d14b3692bb806e73" }, "dgst": "f1174ac2e100bc5c", "timestamp": { "$date": "2025-02-10T12:00:00.586Z" }, "type": "change", "diff": { "__update__": { "heuristics": { "__update__": { "scheme_data": { "product": "Allied Telesis x930 Series Switches v5.4.6-1", "id": "CCEVS-VR-VID10784", "url": "https://www.niap-ccevs.org/product/10784", "certification_date": { "_type": "date", "_value": "2018-05-01" }, "expiration_date": { "_type": "date", "_value": "2020-05-01" }, "category": "Network Device", "vendor": "Allied Telesis", "evaluation_facility": "UL Verification Services Inc. (Formerly InfoGard)", "scheme": "US" } } } } } }, { "_id": { "$oid": "67eec0677557876db2c02d2e" }, "run_id": { "$oid": "67eebff77557876db2c02cde" }, "dgst": "f1174ac2e100bc5c", "timestamp": { "$date": "2025-04-03T09:18:42.399Z" }, "type": "change", "diff": { "__update__": { "pdf_data": { "__update__": { "report_keywords": { "__update__": { "crypto_protocol": { "__update__": { "SSH": { "__insert__": { "SSHv2": 2 } } } } } }, "st_keywords": { "__update__": { "crypto_protocol": { "__update__": { "SSH": { "__insert__": { "SSHv2": 1 } } } } } } } } } } }, { "_id": { "$oid": "68223522330129f1379729c4" }, "run_id": { "$oid": "682234eb330129f137972551" }, "dgst": "f1174ac2e100bc5c", "timestamp": { "$date": "2025-05-12T12:00:01.455Z" }, "type": "change", "diff": { "__update__": { "heuristics": { "__update__": { "scheme_data": null } } } } }]