FIPS Level 1 Security Policy Version Number: 1.5 Date: February 29, 2016

Size: px
Start display at page:

Download "FIPS Level 1 Security Policy Version Number: 1.5 Date: February 29, 2016"

Transcription

1 Nn-Prprietary Bx JCA Cryptgraphic Mdule 1.0 FIPS Level 1 Security Plicy Versin Number: 1.5 Date: February 29, 2016

2 Table f Cntents 1. MODULE OVERVIEW 3 2. MODES OF OPERATION APPROVED CRYPTOGRAPHIC FUNCTIONS ALL OTHER ALGORITHMS 6 3. PORTS AND INTERFACES 6 4. ROLES AND SERVICES CRYPTO-OFFICER AND USER ROLES APPROVED SERVICES 7 5. CRYPTOGRAPHIC KEYS AND CSPS 8 6. SELF-TESTS 9 2

3 3 1. Mdule Overview The Bx Java Cryptgraphy Architecture (JCA) Cryptgraphic Mdule is a Java Cryptgraphy Architecture prvider that prvides encryptin, hashing and randm number generatin utilizing FIPS apprved algrithms. The JCA is a sftware mdule that executes in a mdifiable peratinal envirnment by a general purpse cmputer. The lgical bundary f the sftware mdule includes f the fllwing cmpnents (Figure 1): bxjca_prvider.jar bx_sunjce_prvider.jar lcal_plicy.jar US_exprt_plicy.jar bxjca_prvider.hmac Figure 1: Bx JCA Cryptgraphic Mdule Blck Diagram Cryptgraphic Bundary Bx JCA Cryptgraphic Mdule Includes: bxjca_prvider.jar, bx_sunjce_prvider.jar, lcal_plicy.jar, US_exprt_plicy.jar, and bxjca_prvider.hmac Java Virtual Machine Operating System FIPS cnfrmance testing was perfrmed at Security Level 1. The cnfiguratin tested by the lab is described in Table 1. 3

4 4 Table 1: Cnfiguratin tested by the lab Sftware Cmpnent Operating System Java Run-Time Envirnment (JRE) bxjca_prvider.jar bx_sunjce_prvider.jar lcal_plicy.jar US_exprt_plicy.jar bxjca_prvider.hmac Scientific Linux 6.4 JRE JRE CPU Dell PwerEdge R610 using Intel(R) Xen(R) X5675 The Bx JCA Cryptgraphic Mdule meets FIPS Level 1 requirements as described in Table 2. Table 2: Mdule Security Level Statement FIPS Security Area Security Level Cryptgraphic Mdule Specificatin 1 Mdule Prts and Interfaces 1 Rles, Services and Authenticatin 1 Finite State Mdel 1 Physical Security Operatinal Envirnment 1 Cryptgraphic Key Management 1 EMI/EMC 1 Self-tests 1 Design Assurance 1 Mitigatin f Other Attacks 4

5 5 2. Mdes f Operatin In the FIPS apprved mde f peratin, the JCA mdule perfrms FIPS apprved security functins as listed in sectin 2.1 Apprved Cryptgraphic Functins. When the Java virtual machine begins executin, it lads the class BxPrvider f the bxjca_prvider and instantiates the prvider if the pwer-up self-tests have been passed successfully. The pwer-up self-tests are called frm the cnstructr f the class BxPrvider. 2.1 Apprved Cryptgraphic Functins The fllwing apprved cryptgraphic algrithms are used in the FIPS apprved mde f peratin. Table 3: Apprved Cryptgraphic Functins Algrithm AES ECB (128, 192, 256) AES CTR (128, 192, 256) CAVP Certificate 2666 SHS (SHA1, SHA256, SHA384 and SHA512) 2239 HMAC (HMAC-SHA1, HMAC-SHA256, HMAC- SHA384, and HMAC-SHA512) 1657 SP A HMAC_DRBG 429 5

6 6 2.2 All Other Algrithms In the nn-fips mde f peratin the mdule perfrms nn-apprved functins listed in this sectin. With the exceptin f NDRNG these functins shall nt be used in FIPS apprved mde f peratin. AES (CBC, PCBC, CTS, CFB, CFB8, CFB128, OFB, OFB8, and OFB128 mdes; nn-cmpliant) Blwfish DES Triple-DES (nn-cmpliant) RC2 Diffie-Hellman (nn-cmpliant) PBEWithMD5AndDES PBEWithMD5AndTripleDES PBEWithSHA1AndTripleDES PBEWithSHA1AndRC2_40 ARCFOUR RSA (key wrapping; nn-cmpliant) HMAC-MD5 PBKDF2WithHmacSHA1 DSA (nn-cmpliant) MD2 MD5 SHA1PRNG NDRNG 3. Prts and Interfaces The lgical interfaces t the mdule are implemented via an Applicatin Prgramming Interface (API). The fllwing table describes each lgical interface. Table 4: FIPS Lgical Interfaces Lgical Interface Data Input Data Output Cntrl Input Status Output Descriptin Input parameters that are supplied t the API cmmands Output parameters that are returned by the API cmmands API cmmands Exceptins and return status prvided by API cmmands 6

7 4. Rles and Services and rles There are tw rles the mdule supprts: rle and a rle. 4.2 Apprved Services The mdule prvides the fllwing cryptgraphic services. Table 5: Rles and Services Service AES Cipher Encrypt / Decrypt SHA hash cmputatin HMAC hash cmputatin HMAC-SHA256 DRBG Randm utput Perfrm Self-Tests Zerizatin by pwer cycling r rebting the system Shw status Installatin f the mdule Crrespnding Rles Types f Access t Cryptgraphic Keys and Critical Security Parameters (CSPs) R Read W Write r Create Z Zerize AES Key: R Nne HMAC Key: R Entrpy Input: R DRBG seed: R, W AES key: W HMAC key: W All: Z 7

8 8 The mdule prvides the fllwing APIs: Cipher.getInstance Cipher.init Cipher.dFinal MessageDigest.getInstance MessageDigest.digest Mac.getInstance bxprvider.pweronselftest Mac.init Mac.dFinal SecureRandm.getInstance SecureRandm.setSeed SecureRandm.nextBytes The user must call the mdule s APIs with apprpriate parameters t invke the mdule s services. See user guidance fr details. Nn-Apprved cryptgraphic services are implementatins f Nn-Apprved algrithms. They are listed in the Sectin Cryptgraphic Keys and CSPs The table belw describes cryptgraphic keys and CSPs used by the mdule. Table 6: Cryptgraphic keys and CSPs emplyed by the mdule Key Descriptin/Usage Origin Zerizatin AES Key HMAC Key Entrpy Input DRBG Seed Used during AES encryptin and decryptin Used during cmputatin f HMAC Used during cnstructin f the seed Used during instantiatin f the DRBG Generated using HMAC_DRBG Generated using HMAC_DRBG Generated using NDRNG Cnstructed in accrdance with SP A Zerized during pwer cycle r rebt Zerized during pwer cycle r rebt Zerized during pwer cycle r rebt Zerized during pwer cycle r rebt The keys must be generated by using SP A HMAC_DRBG. The Keys and CSPs are stred in plain text within the mdule. 8

9 9 6. Self-tests The mdule perfrms pwer-up and cnditinal self-tests that are listed in the table belw. Upn failure f a pwer-up self-test the mdule thrws an exceptin and fails t lad. Upn failure f a cnditinal self-test the mdule thrws an exceptin and returns n data t the caller. The fllwing table describes self-tests implemented by the mdule. Table 7: Self-Tests Algrithm AES encrypt AES decrypt SHA1 SHA256 SHA384 SHA512 HMAC-SHA1 HMAC-SHA256 HMAC-SHA384 HMAC-SHA512 SP800-90A HMAC_DRBG Native NDRNG Bx entrpy surce NDRNG Sftware integrity test Test Knwn Answer Test [] Cntinuus Randm Number Generatr test DRBG Health test Cntinuus Randm Number Generatr test Cntinuus Randm Number Generatr test using HMAC 9

Cisco IOS 15.5M Router Security Policy

Cisco IOS 15.5M Router Security Policy Cisc IOS 15.5M Ruter Security Plicy Integrated Services Ruter (ISR) 891W, 1941W, 829W FIPS 140-2 Nn Prprietary Security Plicy Level 1 Validatin Versin 1.0 June 2016 Cpyright 2016 Cisc Systems, Inc. Table

More information

Assurance Activity Report

Assurance Activity Report Assurance Activity Reprt VID 10783 17-3660-R-0008 V1.2 August 24, 2017 Security Target fr Mercury Systems ASURRE-Str Slid State Self-Encrypting Drives Versin 1.0 August 21, 2017 Evaluated by: UL Verificatin

More information

Symantec Corporation

Symantec Corporation Symantec Corporation Symantec PGP Cryptographic Engine FIPS 140-2 Non-proprietary Security Policy Document Version 1.0.4 Revision Date 05/01/2015 Symantec Corporation, 2015 May be reproduced only in its

More information

LEVEL 3 NON-PROPRIETARY SECURITY POLICY FOR

LEVEL 3 NON-PROPRIETARY SECURITY POLICY FOR LEVEL 3 NON-PROPRIETARY SECURITY POLICY FOR Luna PCI-E Cryptgraphic Mdule and Luna PCI-E Cryptgraphic Mdule fr Luna SA (Used as a Standalne Device that includes cnfiguratins Clning [CL] and Key Exprt [CKE];

More information

Assurance Activities Report for

Assurance Activities Report for Assurance Activities Reprt fr Pal Alt Netwrks PA-200, PA-500, PA- 2000 Series, PA-3000 Series, PA-4000 Series, PA-5000 Series, PA-7000 Series, VM Series, Next-Generatin Firewall with PAN-OS 7.0.1-h4 Versin

More information

Patch Management Policy

Patch Management Policy Patch Management Plicy (Versin 1) Dcument Cntrl Infrmatin: Date: 21/5/18 Master Tracking Name Patch Management Plicy Master Tracking Reference Owning Service / Department Exeter IT Issue: 1 Apprvals: Authrs:

More information

VMware, Inc. VMware Horizon JCE (Java Cryptographic Extension) Module

VMware, Inc. VMware Horizon JCE (Java Cryptographic Extension) Module VMware, Inc. VMware Horizon JCE (Java Cryptographic Extension) Module Software Version: 1.0 FIPS 140-2 Non-Proprietary Security Policy F I P S S E C U R I T Y L E V E L 1 D O C U M E N T V E R S I O N

More information

W76S(2/4)MR(KD/DN/D1/Q1/Q3/4F) Winbond TrustME Secure Element. Security Target Lite

W76S(2/4)MR(KD/DN/D1/Q1/Q3/4F) Winbond TrustME Secure Element. Security Target Lite W76S(2/4)MR(KD/DN/D1/Q1/Q3/4F) Winbnd TrustME Secure Element Security Target Lite PUBLIC Publicatin Release date: July 2017 Table f Cntents 1 SECURITY TARGET INTRODUCTION... 5 1.1 SECURITY TARGET REFERENCE...

More information

Programming Project: Building a Web Server

Programming Project: Building a Web Server Prgramming Prject: Building a Web Server Submissin Instructin: Grup prject Submit yur cde thrugh Bb by Dec. 8, 2014 11:59 PM. Yu need t generate a simple index.html page displaying all yur grup members

More information

GE Multilin 850 Feeder Protection Relay Specifications

GE Multilin 850 Feeder Protection Relay Specifications GE Multilin 850 Feeder Prtectin Relay Specificatins Prtectin, mnitring and metering shall be supplied in ne integrated digital relay package fr applicatin t mtrs suitable fr incrpratin int an integrated

More information

Avocent Universal Management Gateway Appliance Plug-in for the Avocent DSView 4.5 Management Software Release Notes

Avocent Universal Management Gateway Appliance Plug-in for the Avocent DSView 4.5 Management Software Release Notes VERTIV Avcent Universal Management Gateway Appliance Plug-in fr the Avcent DSView 4.5 Management Sftware Release Ntes VERSION 4.2.0.33, SEPTEMBER 14, 2018 Release Ntes Sectin Outline 1 System Requirements

More information

It has hardware. It has application software.

It has hardware. It has application software. Q.1 What is System? Explain with an example A system is an arrangement in which all its unit assemble wrk tgether accrding t a set f rules. It can als be defined as a way f wrking, rganizing r ding ne

More information

Point-to-Point Encryption (P2PE)

Point-to-Point Encryption (P2PE) Payment Card Industry (PCI) Pint-t-Pint Encryptin (P2PE) Template fr P2PE Applicatin Reprt n Validatin (Applicatin P-ROV) Applicatin P-ROV Template Fr Applicatins used with PCI P2PE Hardware/Hardware Standard

More information

Setting up the ncipher nshield HSM for use with Kerberized Certificate Authority

Setting up the ncipher nshield HSM for use with Kerberized Certificate Authority Setting up the ncipher nshield HSM fr use with Kerberized Certificate Authrity Intrductin This dcument cntains instructins fr setting up ncipher nshield hardware security mdules (HSM) fr use with the Kerberized

More information

Digital Imaging and Communications in Medicine (DICOM) Supplement 204 TLS Security Profiles

Digital Imaging and Communications in Medicine (DICOM) Supplement 204 TLS Security Profiles Digital Imaging and Cmmunicatins in Medicine (DICOM) Supplement 204 TLS Security Prfiles Prepared by: DICOM Standards Cmmittee, Wrking Grup 6 1300 N. 17th Street Rsslyn, Virginia 22209 USA VERSION: Public

More information

Infrastructure Series

Infrastructure Series Infrastructure Series TechDc WebSphere Message Brker / IBM Integratin Bus Parallel Prcessing (Aggregatin) (Message Flw Develpment) February 2015 Authr(s): - IBM Message Brker - Develpment Parallel Prcessing

More information

Application Note. Digi Connect Wi-SP Troubleshooting Guide. Digi Technical Support 10 May 2016

Application Note. Digi Connect Wi-SP Troubleshooting Guide. Digi Technical Support 10 May 2016 Applicatin Nte Digi Cnnect Wi-SP Trubleshting Guide Digi Technical Supprt 10 May 2016 Cntents 1 Intrductin... 3 1.1 Assumptins... 3 1.2 Crrectins... 3 2 Quick Facts... 3 2.1 Cmmn Questins Abut the Cnnect

More information

Secusmart. Security Target

Secusmart. Security Target SecuSUITE Client v3.0 and Vdafne Secure Call Client v3.0 May 2017 Dcument prepared by: Dcument prepared fr: Ark Infsec Labs, Inc. www.arkinfsec.net Electrnic Warfare Assciates-Canada, Ltd. https://www.ewa-canada.cm/

More information

DS-5 Release Notes. (build 472 dated 2010/04/28 08:33:48 GMT)

DS-5 Release Notes. (build 472 dated 2010/04/28 08:33:48 GMT) DS-5 Release Ntes (build 472 dated 2010/04/28 08:33:48 GMT) Intrductin This is a trial release f Keil Develpment Studi 5 (DS-5). DS-5 cntains tls fr building and debugging C/C++ and ARM assembly language

More information

Dedicated to Tanjore (Ravi) Ravishankar, His leadership, passion and devotion inspired us all

Dedicated to Tanjore (Ravi) Ravishankar, His leadership, passion and devotion inspired us all Release Ntes Specificatins fr the Java Card 3 Platfrm Versin 3.0.5, Classic Editin Nvember 2017 Table f Cntents 1. Acknwledgment 2. Overview 3. Supprted Platfrms 4. Installatin Instructins 5. Changes in

More information

Course 10262A: Developing Windows Applications with Microsoft Visual Studio 2010 OVERVIEW

Course 10262A: Developing Windows Applications with Microsoft Visual Studio 2010 OVERVIEW Curse 10262A: Develping Windws Applicatins with Micrsft Visual Studi 2010 OVERVIEW Abut this Curse In this curse, experienced develpers wh knw the basics f Windws Frms develpment gain mre advanced Windws

More information

CSC IT practix Recommendations

CSC IT practix Recommendations CSC IT practix Recmmendatins CSC Healthcare 17 th June 2015 Versin 3.1 www.csc.cm/glbalhealthcare Cntents 1 Imprtant infrmatin 3 2 IT Specificatins 4 2.1 Wrkstatins... 4 2.2 Minimum Server with 1-5 wrkstatins

More information

Summary. Server environment: Subversion 1.4.6

Summary. Server environment: Subversion 1.4.6 Surce Management Tl Server Envirnment Operatin Summary In the e- gvernment standard framewrk, Subversin, an pen surce, is used as the surce management tl fr develpment envirnment. Subversin (SVN, versin

More information

AvePoint Discovery Tool 3.5. User Guide

AvePoint Discovery Tool 3.5. User Guide AvePint Discvery Tl 3.5 User Guide Issued January 2018 Table f Cntents What s New in this Release... 3 Abut AvePint Discvery Tl... 4 Submitting Dcumentatin Feedback t AvePint... 5 Befre Yu Begin... 6 System

More information

History of Java. VM (Java Virtual Machine) What is JVM. What it does. 1. Brief history of Java 2. Java Version History

History of Java. VM (Java Virtual Machine) What is JVM. What it does. 1. Brief history of Java 2. Java Version History Histry f Java 1. Brief histry f Java 2. Java Versin Histry The histry f Java is very interesting. Java was riginally designed fr interactive televisin, but it was t advanced technlgy fr the digital cable

More information

FIPS Non-Proprietary Security Policy. Level 1 Validation Version 1.2

FIPS Non-Proprietary Security Policy. Level 1 Validation Version 1.2 Oracle Solaris Kernel Cryptographic Framework with SPARC T4 and T5 Software Version: 1.0 and 1.1; Hardware Version: SPARC T4 (527-1437-01) and T5 (7043165) FIPS 140-2 Non-Proprietary Security Policy Level

More information

FIPS Security Policy

FIPS Security Policy FIPS 140-2 Security Policy BlackBerry Cryptographic Library Version 2.0.0.10 Document Version 1.2 BlackBerry Certifications, Research In Motion This document may be freely copied and distributed provided

More information

WHITE PAPER January 2019 RASPBERRY PI 3B+ AND VMWARE PULSE 1.1. Version 0.1

WHITE PAPER January 2019 RASPBERRY PI 3B+ AND VMWARE PULSE 1.1. Version 0.1 WHITE PAPER January 2019 RASPBERRY PI 3B+ AND VMWARE PULSE 1.1 Versin 0.1 Table f Cntents Executive Summary... 1 Business Case... 1 Slutin Overview... 1 Intrductin... 2 Purpse... 2 Audience... 2 Slutin

More information

Implementation of Authentication Mechanism for a Virtual File System

Implementation of Authentication Mechanism for a Virtual File System Implementatin f Authenticatin Mechanism fr a Virtual File System Prject fr Operating Systems Curse (CS 5204) Implemented by- Vinth Jagannathan Abhishek Ram Under the guidance f Dr Dennis Kafura Abstract

More information

TRAUMACAD 2.5 PREREQUISITES

TRAUMACAD 2.5 PREREQUISITES TRAUMACAD 2.5 PREREQUISITES Befre beginning the TraumaCad Server sftware installatin, please verify all prerequisite are installed and minimum hardware and sftware requirements are met, as described belw.

More information

Cookbook Qermid Defibrillator web service Version This document is provided to you free of charge by the. ehealth platform

Cookbook Qermid Defibrillator web service Version This document is provided to you free of charge by the. ehealth platform Ckbk Qermid Defibrillatr web service Versin 1.01 This dcument is prvided t yu free f charge by the ehealth platfrm Willebrekkaai 38 38, Quai de Willebrek 1000 BRUSSELS All are free t circulate this dcument

More information

Oracle Universal Records Management Oracle Universal Records Manager Adapter for Documentum Installation Guide

Oracle Universal Records Management Oracle Universal Records Manager Adapter for Documentum Installation Guide Oracle Universal Recrds Management Oracle Universal Recrds Manager Adapter fr Dcumentum Installatin Guide December 2009 Universal Recrds Manager Adapter fr Dcumentum Installatin Guide, Cpyright 2009, Oracle.

More information

Security Policy. Jan 2012

Security Policy. Jan 2012 IBM Java JCE FIPS 140-2 Cryptographic Module Security Policy IBM JAVA JCE FIPS 140-2 Cryptographic Module Revision: 1.7 Jan 2012 Status: Final 1.7 Edition (February 2012) This edition applies to the 1.7

More information

2. When logging is used, which severity level indicates that a device is unusable?

2. When logging is used, which severity level indicates that a device is unusable? CCNA 4 Chapter 8 v5.0 Exam Answers 2015 (100%) 1. What are the mst cmmn syslg messages? thse that ccur when a packet matches a parameter cnditin in an access cntrl list link up and link dwn messages utput

More information

Xilinx Answer Xilinx PCI Express DMA Drivers and Software Guide

Xilinx Answer Xilinx PCI Express DMA Drivers and Software Guide Xilinx Answer 65444 Xilinx PCI Express DMA Drivers and Sftware Guide Imprtant Nte: This dwnladable PDF f an Answer Recrd is prvided t enhance its usability and readability. It is imprtant t nte that Answer

More information

CMC Blade BIOS Profile Cloning

CMC Blade BIOS Profile Cloning This white paper describes the detailed capabilities f the Chassis Management Cntrller s Blade BIOS Prfile Clning feature. Authr Crey Farrar This dcument is fr infrmatinal purpses nly and may cntain typgraphical

More information

Samsung FIPS BC for Mobile Phone and Tablet FIPS Security Policy

Samsung FIPS BC for Mobile Phone and Tablet FIPS Security Policy Version 1.6 Last Update: 2014-02-11 Trademarks... 3 1. Introduction... 4 1.1. Purpose of the Security Policy... 4 1.2. Target Audience... 4 2. Cryptographic Module Specification... 5 2.1. Description of

More information

Security Target. BlackBerry Device Software Document Version 5.0. BlackBerry Certifications Research In Motion

Security Target. BlackBerry Device Software Document Version 5.0. BlackBerry Certifications Research In Motion BlackBerry Device Sftware 5.0.0 Dcument Versin 5.0 BlackBerry Certificatins Research In Mtin 2010 Research In Mtin Limited. All rights reserved. www.blackberry.cm BlackBerry Device Sftware Dcument and

More information

Protocol Insight UFS Test Executive Key Features and Benefits Deep packet inspection performed with a unique protocol-aware Rule Checker engine

Protocol Insight UFS Test Executive Key Features and Benefits Deep packet inspection performed with a unique protocol-aware Rule Checker engine Prtcl Insight UFS Test Executive UFS20COMP Test Executive prvides cmplete prtcl debug and analysis f UFS devices, including deep packet inspectin, stress testing, custm test case executin, and CTS and

More information

Firmware Download Anybus X-gateway Modbus-TCP

Firmware Download Anybus X-gateway Modbus-TCP Firmware Dwnlad Anybus X-gateway Mdbus-TCP Firmware Dwnlad Anybus X-gateway Mdbus-TCP HMS Industrial Netwrks AB Page 1 (5) Firmware Dwnlad Anybus X-gateway Mdbus-TCP Histry Revisin Date Descriptin Respnsible

More information

ACR122S. Serial NFC Reader. Application Programming Interface V2.02. Subject to change without prior notice.

ACR122S. Serial NFC Reader. Application Programming Interface V2.02. Subject to change without prior notice. ACR122S Serial NFC Reader Applicatin Prgramming Interface V2.02 Subject t change withut prir ntice Table f Cntents 1.0. Intrductin... 3 2.0. Features... 4 3.0. Applicatin Prgramming Interface Overview...

More information

Cisco Tetration Analytics, Release , Release Notes

Cisco Tetration Analytics, Release , Release Notes Cisc Tetratin Analytics, Release 1.102.21, Release Ntes This dcument describes the features, caveats, and limitatins fr the Cisc Tetratin Analytics sftware. Additinal prduct Release ntes are smetimes updated

More information

Satisfying CC Cryptography Requirements through CAVP/CMVP Certifications. International Crypto Module Conference May 19, 2017

Satisfying CC Cryptography Requirements through CAVP/CMVP Certifications. International Crypto Module Conference May 19, 2017 Satisfying CC Cryptography Requirements through CAVP/CMVP Certifications International Crypto Module Conference May 19, 2017 Synopsis Background NIAP policy relating to cryptographic requirements NIAP

More information

Secure Mobile Access to the Local ICS Network. Jan Vossaert Veilige industriële netwerken 29/09/2016

Secure Mobile Access to the Local ICS Network. Jan Vossaert Veilige industriële netwerken 29/09/2016 Secure Mbile Access t the Lcal ICS Netwrk Jan Vssaert Veilige industriële netwerken 29/09/2016 Intrductin ffice netwrk prductin cell ruter 192.168.2.0/24 Internet ICS DMZ servers 192.168.1.0/24 prductin

More information

D e v e l o p e r s G u i d e

D e v e l o p e r s G u i d e A D S S A u t h r i s e d R e m t e S i g n i n g ( A R S ) D e v e l p e r s G u i d e A S C E R T I A LTD S E P T E M B E R 2 0 1 8 D c u m e n t V e r s i n - 5. 9. 0. 1 Ascertia Limited. All rights

More information

APG8201 PINhandy 1. Technical Specifications V2.00. Subject to change without prior notice.

APG8201 PINhandy 1. Technical Specifications V2.00. Subject to change without prior notice. APG8201 PINhandy 1 Technical Specificatins V2.00 Subject t change withut prir ntice Table f Cntents 1.0. Intrductin... 3 2.0. Features... 4 3.0. Typical Applicatins... 6 4.0. Technical Specificatins...

More information

Release Notes MC92N0-KK v

Release Notes MC92N0-KK v Release Ntes MC92N0-KK v03.13.1006 Cntents Descriptin Device Cmpatibility Cmpnent Cntents Installatin Requirements Installatin Instructins Dwnladable Sftware included in this Release Descriptin The MC9200

More information

Standardizing On A Set Of Radio Set APIs To Ensure Waveform Portability

Standardizing On A Set Of Radio Set APIs To Ensure Waveform Portability Standardizing On A Set Of Radi Set APIs T Ensure Wavefrm Prtability Glenn Fgarty Embedded Sftware Engineer The Being Cmpany, Anaheim, CA glenn.a.fgarty@being.cm (714) 762-0137 Wavefrm Applicatin Prtability

More information

Vodafone MachineLink 3G Plus Firmware release notes

Vodafone MachineLink 3G Plus Firmware release notes Vdafne MachineLink 3G Plus Firmware release ntes Vdafne Pwer t yu Cpyright Cpyright 2014 NetCmm Wireless Limited. All rights reserved. Cpyright 2014 Vdafne Grup Plc. All rights reserved. The infrmatin

More information

ACR1255U-J1 Secure Bluetooth NFC Reader

ACR1255U-J1 Secure Bluetooth NFC Reader ACR1255U-J1 Secure Bluetth NFC Reader Technical Specificatins V1.09 Subject t change withut prir ntice inf@acs.cm.hk www.acs.cm.hk Table f Cntents 1.0. Intrductin... 3 1.1. Smart Card Reader... 3 1.2.

More information

Silent Circle Mobile Application Cryptographic Module

Silent Circle Mobile Application Cryptographic Module FIPS 140-2 Non-Proprietary Security Policy Silent Circle Mobile Application Cryptographic Module Software Version 1.0 Document Version 1.2 February 2, 2016 Prepared For: Prepared By: Silent Circle 174

More information

MOBILE ARMOR DATAARMOR & POLICYSERVER V3.1

MOBILE ARMOR DATAARMOR & POLICYSERVER V3.1 MOBILE ARMOR DATAARMOR & POLICYSERVER V3.1 SECURITY TARGET VERSION: 1.72 DATE: 4/2/2010 2010 Mbile Armr, Inc. All Rights Reserved. Mbile Armr DataArmr & PlicyServer v3.1 Security Target This dcument is

More information

1 Getting and Extracting the Upgrader

1 Getting and Extracting the Upgrader Hughes BGAN-X 9202 Upgrader User Guide (PC) Rev 1.0 (23-Feb-12) This dcument explains hw t use the Hughes BGAN-X Upgrader prgram fr the 9202 User Terminal using a PC. 1 Getting and Extracting the Upgrader

More information

Cryptography Introduction

Cryptography Introduction Cryptgraphy Intrductin Last Updated: Sep 7, 2017 Cryptgraphy Literal definitin means hidden writing Until mdern times, cryptgraphy was synnymus with encryptin, but the field has expanded This lecture reviews

More information

Juniper Network Connect Cryptographic Module Version 2.0 Security Policy Document Version 1.0. Juniper Networks, Inc.

Juniper Network Connect Cryptographic Module Version 2.0 Security Policy Document Version 1.0. Juniper Networks, Inc. Juniper Network Connect Cryptographic Module Version 2.0 Security Policy Document Version 1.0 Juniper Networks, Inc. September 10, 2009 Copyright Juniper Networks, Inc. 2009. May be reproduced only in

More information

Cookbook ORTHOpride web service Version v1. This document is provided to you free of charge by the. ehealth platform

Cookbook ORTHOpride web service Version v1. This document is provided to you free of charge by the. ehealth platform Ckbk ORTHOpride web service Versin v1 This dcument is prvided t yu free f charge by the ehealth platfrm Willebrekkaai 38 38, Quai de Willebrek 1000 BRUSSELS All are free t circulate this dcument with reference

More information

ACR3901U-S1. Bluetooth Contact Card Reader. Technical Specifications V1.02. Subject to change without prior notice.

ACR3901U-S1. Bluetooth Contact Card Reader. Technical Specifications V1.02. Subject to change without prior notice. ACR3901U-S1 Bluetth Cntact Card Reader Technical Specificatins V1.02 Subject t change withut prir ntice Table f Cntents 1.0. Intrductin... 3 1.1. Smart Card Reader... 3 1.2. Cmpact Design... 3 1.3. Firmware

More information

ACR1283L Standalone Contactless Reader

ACR1283L Standalone Contactless Reader ACR1283L Standalne Cntactless Reader Technical Specificatins V1.05 Subject t change withut prir ntice inf@acs.cm.hk www.acs.cm.hk Table f Cntents 1.0. Intrductin... 3 2.0. Features... 4 3.0. Typical Applicatins...

More information

Brocade MLXe Family Devices with Multi-Service IronWare R (NDPP11E3/VPNGEP11) Security Target

Brocade MLXe Family Devices with Multi-Service IronWare R (NDPP11E3/VPNGEP11) Security Target Brcade MLXe Family Devices with Multi-Service IrnWare R06.0.00 (NDPP11E3/VPNGEP11) Security Target Versin 0.8 8/24/16 Prepared fr: Brcade Cmmunicatin Systems, Inc. 130 Hlger Way San Jse, CA 95134 Prepared

More information

Quick Installation Guide

Quick Installation Guide Oracle Strategic Operatinal Planning Release 3.5.1 Quick Installatin Guide Quick Installatin Guide This file cntains the fllwing sectins: Purpse... 1 System Requirements... 1 Server Cnfiguratin... 1 Client

More information

Dynamic Storage (ECS)

Dynamic Storage (ECS) User Guide Dynamic Strage (ECS) Swisscm (Schweiz) AG 1 / 10 Cntent 1 Abut Dynamic Strage... 3 2 Virtual drive, the EMC CIFS-ECS Tl... 4 3 Amazn S3 Brwer... 6 4 Strage Gateway Appliance... 9 5 Amazn S3

More information

Customer Information. Agilent 2100 Bioanalyzer System Startup Service G2949CA - Checklist

Customer Information. Agilent 2100 Bioanalyzer System Startup Service G2949CA - Checklist This checklist is used t prvide guidance and clarificatin n aspects f the auxillary Startup Service (G2949CA) including Security Pack Installatin and Familiarizatin f yur Agilent 2100 Bianalyzer System

More information

CCNA Security v2.0 Chapter 10 Exam Answers

CCNA Security v2.0 Chapter 10 Exam Answers CCNA Security v2.0 Chapter 10 Exam Answers 1. Which statement describes the functin prvided t a netwrk administratrwh uses the Cisc Adaptive Security Device Manager (ASDM) GUI that runs as a Java Web Start

More information

CCNA Security v2.0 Chapter 2 Exam Answers

CCNA Security v2.0 Chapter 2 Exam Answers CCNA Security v2.0 Chapter 2 Exam Answers 1. An administratr defined a lcal user accunt with a secret passwrd n ruter R1 fr use with SSH. Which three additinal steps are required t cnfigure R1 t accept

More information

DocAve 6 VM Backup & Restore

DocAve 6 VM Backup & Restore DcAve 6 VM Backup & Restre User Guide Service Pack 10 Issued February 2018 The Enterprise-Class Management Platfrm fr SharePint Gvernance Table f Cntents What s New in this Guide... 3 Abut DcAve VM Backup

More information

Launching Xacta 360 Marketplace AMI Guide June 2017

Launching Xacta 360 Marketplace AMI Guide June 2017 Launching Xacta 360 Marketplace AMI Guide June 2017 Tels Crpratin 2017. All rights reserved. U.S. patents Ns. 6,901,346; 6,980,927; 6,983,221; 6,993,448; and 7,380,270. Xacta is a registered trademark

More information

CNS-220-1I: Citrix NetScaler Essentials and Traffic Management

CNS-220-1I: Citrix NetScaler Essentials and Traffic Management CNS-220-1I: Citrix NetScaler Essentials and Traffic Management Overview Designed fr students with little r n previus NetScaler experience, this curse is best suited fr individuals wh will be deplying r

More information

Using CppSim to Generate Neural Network Modules in Simulink using the simulink_neural_net_gen command

Using CppSim to Generate Neural Network Modules in Simulink using the simulink_neural_net_gen command Using CppSim t Generate Neural Netwrk Mdules in Simulink using the simulink_neural_net_gen cmmand Michael H. Perrtt http://www.cppsim.cm June 24, 2008 Cpyright 2008 by Michael H. Perrtt All rights reserved.

More information

FIPS Security Policy

FIPS Security Policy Motorola Mobility Linux Kernel Software Cryptographic Module FIPS 140-2 Security Policy Module Version 1.0 Document version 1.13 March 11, 2015 This document may be freely copied and distributed provided

More information

Fujitsu Microelectronics Europe Application Note MCU-AN E-V11 FR FAMILY 32-BIT MICROCONTROLLER MB91460 RESET APPLICATION NOTE

Fujitsu Microelectronics Europe Application Note MCU-AN E-V11 FR FAMILY 32-BIT MICROCONTROLLER MB91460 RESET APPLICATION NOTE Fujitsu Micrelectrnics Eurpe Applicatin Nte MCU-AN-300052-E-V11 FR FAMILY 32-BIT MICROCONTROLLER MB91460 RESET APPLICATION NOTE Revisin Histry Revisin Histry Date 2007-11-02 V1.0 RSchum First draft 2008-06-24

More information

Dell SonicWALL. NSA 220, NSA 220W and NSA 240. FIPS Non-Proprietary Security Policy

Dell SonicWALL. NSA 220, NSA 220W and NSA 240. FIPS Non-Proprietary Security Policy Dell SonicWALL NSA 220, NSA 220W and NSA 240 FIPS 140-2 Non-Proprietary Security Policy Level 2 Version 3.1 April 28, 2014 1 Copyright Notice Copyright 2014 Dell SonicWALL May be reproduced only in its

More information

1 Getting and Extracting the Upgrader

1 Getting and Extracting the Upgrader Hughes BGAN-X 9211 Upgrader User Guide (Mac) Rev 1.2 (6-Jul-17) This dcument explains hw t use the Hughes BGAN Upgrader prgram fr the 9211 User Terminal using a Mac Nte: Mac OS X Versin 10.4 r newer is

More information

Final Report. Graphical User Interface for the European Transport Model TREMOVE. June 15 th 2010

Final Report. Graphical User Interface for the European Transport Model TREMOVE. June 15 th 2010 Date June 15 th 2010 Authrs Charitn Kuridis Dr Mia Fu Dr Andrew Kelly Thmas Papagergiu Client Eurpean Cmmissin DG Climate Actin Directrate A: Internatinal & Climate Strategy Unit A4: Strategy & Ecnmic

More information

Understanding Active Directory Domain Services (AD DS) Functional Levels

Understanding Active Directory Domain Services (AD DS) Functional Levels Understanding Active Directry Dmain Services (AD DS) Functinal Levels 92 ut f 99 rated this helpful - Rate this tpic Updated: May 28, 2014 Applies T:,,, Functinal levels determine the available Active

More information

The UNIVERSITY of NORTH CAROLINA at CHAPEL HILL

The UNIVERSITY of NORTH CAROLINA at CHAPEL HILL Yu will learn the fllwing in this lab: The UNIVERSITY f NORTH CAROLINA at CHAPEL HILL Cmp 541 Digital Lgic and Cmputer Design Spring 2016 Lab Prject (PART A): A Full Cmputer! Issued Fri 4/8/16; Suggested

More information

Imprivata FIPS Cryptographic Module Non-Proprietary Security Policy Version: 2.9 Date: August 10, 2016

Imprivata FIPS Cryptographic Module Non-Proprietary Security Policy Version: 2.9 Date: August 10, 2016 Imprivata FIPS 140-2 Cryptographic Module Non-Proprietary Security Policy Version: 2.9 Date: August 10, 2016 Copyright Imprivata 2016, all rights reserved Imprivata FIPS Crypto Module 1 Table of Contents

More information

PCI Multiple I/O Host Adapter 1. Introduction

PCI Multiple I/O Host Adapter 1. Introduction PCI Multiple I/O Hst Adapter 1. Intrductin This PCI Hst Adapter is a PCI cntrller bard which can upgrade yur desktp cmputer t have Multiple RS232 (UART) prts. This Lw Prfile Frm factr can supprt Lw prfile

More information

IT Essentials (ITE v6.0) Chapter 5 Exam Answers 100% 2016

IT Essentials (ITE v6.0) Chapter 5 Exam Answers 100% 2016 IT Essentials (ITE v6.0) Chapter 5 Exam Answers 100% 2016 1. What are tw functins f an perating system? (Chse tw.) cntrlling hardware access managing applicatins text prcessing flw chart editing prgram

More information

EMV. Terminal Type Approval Contactless Product. Administrative Process. Version 2.6 February 2017

EMV. Terminal Type Approval Contactless Product. Administrative Process. Version 2.6 February 2017 EMV Terminal Type Apprval Cntactless Prduct Administrative Prcess Versin 2.6 February 2017 Legal Ntice Page i / v Legal Ntice This dcument summarizes EMVC s present plans fr evaluatin services and related

More information

CCNA 1 Chapter v5.1 Answers 100%

CCNA 1 Chapter v5.1 Answers 100% CCNA 1 Chapter 11 2016 v5.1 Answers 100% 1. A newly hired netwrk technician is given the task f rdering new hardware fr a small business with a large grwth frecast. Which primary factr shuld the technician

More information

Oracle Solaris Userland Cryptographic Framework Software Version 1.0 and 1.1

Oracle Solaris Userland Cryptographic Framework Software Version 1.0 and 1.1 Oracle Solaris Userland Cryptographic Framework Software Version 1.0 and 1.1 FIPS 140-2 Non-Proprietary Security Policy Level 1 Validation Version 1.3 2014-01-08 Copyright 2014 Oracle Corporation Table

More information

USER MANUAL. RoomWizard Administrative Console

USER MANUAL. RoomWizard Administrative Console USER MANUAL RmWizard Administrative Cnsle Cntents Welcme... 3 Administer yur RmWizards frm ne lcatin... 3 Abut This Manual... 4 Setup f the Administrative Cnsle... 4 Installatin... 4 The Cnsle Windw...

More information

FIPS Non-Proprietary Security Policy. Cotap Cryptographic Module. Software Version 1.0. Document Version 1.4.

FIPS Non-Proprietary Security Policy. Cotap Cryptographic Module. Software Version 1.0. Document Version 1.4. FIPS 140-2 Non-Proprietary Security Policy Cotap Cryptographic Module Software Version 1.0 Document Version 1.4 February 22, 2016 Prepared For: Prepared By: Cotap, Inc. 55 New Montgomery St. San Francisco,

More information

European Component Oriented Architecture (ECOA ) Collaboration Programme: Architecture Specification Part 3: Mechanisms

European Component Oriented Architecture (ECOA ) Collaboration Programme: Architecture Specification Part 3: Mechanisms Eurpean Cmpnent Oriented Architecture (ECOA ) Cllabratin Prgramme: Architecture Specificatin Part 3: Mechanisms BAE Ref N: IAWG-ECOA-TR-007 Dassault Ref N: DGT 144482-E Issue: 5 Prepared by BAE Systems

More information

HPE LoadRunner Best Practices Series. LoadRunner Upgrade Best Practices

HPE LoadRunner Best Practices Series. LoadRunner Upgrade Best Practices HPE LadRunner Best Practices Series LadRunner 12.50 Upgrade Best Practices Dcument publicatin date: Nvember 2015 Cntents 1. Intrductin... 3 Overview... 3 Audience... 3 2. Preparatin... 3 Backup assets...

More information

Dell Chassis Management Controller (CMC) Version 1.35 for Dell PowerEdge VRTX. Release Notes

Dell Chassis Management Controller (CMC) Version 1.35 for Dell PowerEdge VRTX. Release Notes Dell Chassis Management Cntrller (CMC) Versin 1.35 fr Dell PwerEdge VRTX Release Ntes Release Type and Definitin The Dell Chassis Management Cntrller (CMC) Versin 1.35 fr Dell PwerEdge VRTX is a System

More information

UFS Test Executive is certified by the UFSA to verify compliance of UFS devices with the UFSA UFS Compliance Test Matrix v1.0.

UFS Test Executive is certified by the UFSA to verify compliance of UFS devices with the UFSA UFS Compliance Test Matrix v1.0. Prtcl Insight UFS Test Executive UFS20COMP Test Executive prvides cmplete prtcl debug and analysis f UFS devices, including deep packet inspectin, stress testing, custm test case executin, and UFS cmpliance

More information

Hewlett-Packard Development Company, L.P. NonStop Volume Level Encryption (NSVLE) Product No: T0867 SW Version: 2.0

Hewlett-Packard Development Company, L.P. NonStop Volume Level Encryption (NSVLE) Product No: T0867 SW Version: 2.0 Hewlett-Packard Development Company, L.P. NonStop Volume Level Encryption (NSVLE) Product No: T0867 SW Version: 2.0 FIPS 140 2 Non Proprietary Security Policy FIPS Security Level: 1 Document Version: 1.3

More information

APG8205 OTP Generator

APG8205 OTP Generator APG8205 OTP Generatr Technical Specificatins V1.00 Subject t change withut prir ntice inf@acs.cm.hk www.acs.cm.hk Table f Cntents 1.0. Intrductin... 3 2.0. Features... 4 3.0. Typical Applicatins... 6 4.0.

More information

Parallels Operations Automation 5.3

Parallels Operations Automation 5.3 Prduct Update Parallels Operatins Autmatin 5.3 What s New Learn mre at http://www.parallels.cm/spp Nvember 2011 Table f Cntents Intrductin... 1 Tp New Features... 1 Tp Imprvements... 2 SaaS Imprvements...

More information

CONTROL-COMMAND. Software Technical Specifications for ThomX Suppliers 1.INTRODUCTION TECHNICAL REQUIREMENTS... 2

CONTROL-COMMAND. Software Technical Specifications for ThomX Suppliers 1.INTRODUCTION TECHNICAL REQUIREMENTS... 2 Réf. ThmX-NT-SI-CC001 Table f Cntents Sftware Technical Specificatins fr ThmX Authr : Philippe Page 1 / 9 1.INTRODUCTION... 2 2.TECHNICAL REQUIREMENTS... 2 3.DOCUMENTATION REQUIREMENTS... 4 4.COMPUTING

More information

PHP / JAVA Summer Training Program 2012

PHP / JAVA Summer Training Program 2012 PHP / JAVA Summer Training Prgram 2012 Curse Duratin: 45 days Pre-Requisite: Basic Knwledge f Internet Curse Fee: 10,000 ( Online Examinatin Fee, Bks, Certificatin, Tls & Sftware's Included ) Intrductin

More information

DELL PowerVault MD3200/MD3220 Series of Storage Arrays. A Dell Transition Guide Version 1.0

DELL PowerVault MD3200/MD3220 Series of Storage Arrays. A Dell Transition Guide Version 1.0 DELL PwerVault MD3200/MD3220 Series f Strage Arrays A Dell Transitin Guide Versin 1.0 Transitin Guide fr PwerVault MD3200 and MD3220 Series Arrays THIS TRANSITION GUIDE IS FOR INFORMATIONAL PURPOSES ONLY,

More information

Intel ICH6 I/O Controller Hub 6 R (ICH6R) Advance Host Controller Interface (AHCI)

Intel ICH6 I/O Controller Hub 6 R (ICH6R) Advance Host Controller Interface (AHCI) Intel ICH6 I/O Cntrller Hub 6 (ICH6) Advance Hst Cntrller Interface (AHCI) Prgrammer s eference Manual (PM) June 2004 Dcument Number: 301444-001 INFOMATION IN THIS DOCUMENT IS POVIDED IN CONNECTION WITH

More information

VMware AirWatch SDK Plugin for Apache Cordova Instructions Add AirWatch Functionality to Enterprise Applicataions with SDK Plugins

VMware AirWatch SDK Plugin for Apache Cordova Instructions Add AirWatch Functionality to Enterprise Applicataions with SDK Plugins VMware AirWatch SDK Plugin fr Apache Crdva Instructins Add AirWatch Functinality t Enterprise Applicatains with SDK Plugins v1.2 Have dcumentatin feedback? Submit a Dcumentatin Feedback supprt ticket using

More information

GE Multilin F650 Feeder Protection Relay and Bay Controller Specifications

GE Multilin F650 Feeder Protection Relay and Bay Controller Specifications GE Multilin F650 Feeder Prtectin Relay and Bay Cntrller Specificatins Prtectin, mnitring and metering shall be supplied in ne integrated digital relay package fr applicatins suitable fr incrpratin int

More information

ASM Educational Center (ASM) Est Authorized SCNP Security Certified Network Professional Boot Camp

ASM Educational Center (ASM) Est Authorized SCNP Security Certified Network Professional Boot Camp ASM Educatinal Center (ASM) Est. 1992 11200 Rckville Pike, Suite 220 Rckville, MD 20852 Phne: 301-984-7400 Fax: 301-984-7401 Web: www.asmed.cm E-mail: inf@asmed.cm Authrized SCNP Security Certified Netwrk

More information

CITI Technical Report 08-1 Parallel NFS Block Layout Module for Linux

CITI Technical Report 08-1 Parallel NFS Block Layout Module for Linux CITI Technical Reprt 08-1 Parallel NFS Blck Layut Mdule fr Linux William A. Adamsn, University f Michigan andrs@citi.umich.edu Frederic Isaman, University f Michigan iisaman@citi.umich.edu Jasn Glasgw,

More information

RSA BSAFE Crypto-J JSAFE and JCE Software Module 5.0 Security Policy Level 1 Roles, Authentication and Services

RSA BSAFE Crypto-J JSAFE and JCE Software Module 5.0 Security Policy Level 1 Roles, Authentication and Services Security Policy 01.02.11 RSA BSAFE Crypto-J JSAFE and JCE Software Module 5.0 Security Policy Level 1 Roles, Authentication and Services This document is a non-proprietary security policy for RSA BSAFE

More information

Contents: Module. Objectives. Lesson 1: Lesson 2: appropriately. As benefit of good. with almost any planning. it places on the.

Contents: Module. Objectives. Lesson 1: Lesson 2: appropriately. As benefit of good. with almost any planning. it places on the. 1 f 22 26/09/2016 15:58 Mdule Cnsideratins Cntents: Lessn 1: Lessn 2: Mdule Befre yu start with almst any planning. apprpriately. As benefit f gd T appreciate architecture. it places n the understanding

More information