{"product_id":11423,"v_id":11423,"product_name":"Hypori Halo Client (Android) 4.3","certification_status":"Certified","certification_date":"2024-02-20T00:00:00Z","tech_type":"Application Software","vendor_id":{"name":"Hypori, Inc.","website":"www.Hypori.com"},"vendor_poc":"Matthew Stern","vendor_phone":"1.833.639.3964","vendor_email":"matthew.stern@hypori.com","assigned_lab":{"cctl_name":"Leidos Common Criteria Testing Laboratory"},"product_description":"<p class=\"Body\">The Target of Evaluation (TOE) is Hypori Halo Client (Android) 4.3. The TOE is a component of the Hypori Halo Platform. In the Hypori Halo Platform, end users install and run the TOE on their mobile devices to access a Hypori Virtual Device running on a Hypori Server in the cloud. The Hypori Virtual Device on the Hypori Server contains data and applications for the users. The TOE communicates with the Hypori Virtual Device using TLS 1.2 and brokers access between the mobile device and the applications executing in the Hypori Virtual Device.</p>\r\n<p class=\"Body\">The TOE comprises the Hypori Halo Client (Android) 4.3 application that installs on the end user&rsquo;s mobile device and communicates with the <a name=\"_Hlk149047883\"></a>Hypori Virtual Device on the server using TLS 1.2 (provided by the underlying Android platform). The Hypori Server, Hypori Virtual Device, Admin Console, applications running on the Hypori Server, the hardware platform device, and any functions not specified in the ST are outside the scope of the TOE. The TOE&rsquo;s operational environment comprises the Android-based mobile device on which it is installed.</p>","evaluation_configuration":"<p class=\"Body\">The TOE is evaluated on a Samsung Galaxy A53 5G running Android 13 and on a Google Pixel 6 running Android 12.0</p>","security_evaluation_summary":"<p>The evaluation was carried out in accordance with the Common Criteria Evaluation and Validation Scheme (CCEVS) process and scheme for the&nbsp;Protection Profile for Application Software, Version 1.4. The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Version 3.1 release 5. The product, when delivered and configured as identified in the guidance documentation, satisfies all of the security functional requirements stated in the Hypori Halo Client (Android) 4.3 Security Target. The evaluation was completed in February 2024. Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report prepared by CCEVS.</p>","environmental_strengths":"<p class=\"MsoNormal\" style=\"margin-bottom: .0001pt; page-break-after: avoid; mso-layout-grid-align: none; text-autospace: none;\"><strong style=\"mso-bidi-font-weight: normal;\"><em style=\"mso-bidi-font-style: normal;\"><span style=\"font-size: 11.0pt; line-height: 115%; font-family: 'Calibri',sans-serif; mso-ascii-theme-font: minor-latin; mso-hansi-theme-font: minor-latin; mso-bidi-theme-font: minor-latin;\">Cryptographic Support</span></em></strong></p>\r\n<p class=\"Body\">The TOE establishes secure communication with the Hypori Virtual Device on the server using TLS. It uses cryptographic services provided by the platform. The TOE stores credentials and certificates for mutual authentication in the platform&rsquo;s key chain.</p>\r\n<p class=\"MsoNormal\" style=\"margin-bottom: .0001pt; page-break-after: avoid; mso-layout-grid-align: none; text-autospace: none;\"><strong style=\"mso-bidi-font-weight: normal;\"><em style=\"mso-bidi-font-style: normal;\"><span style=\"font-size: 11.0pt; line-height: 115%; font-family: 'Calibri',sans-serif; mso-ascii-theme-font: minor-latin; mso-hansi-theme-font: minor-latin; mso-bidi-theme-font: minor-latin;\">User Data Protection</span></em></strong></p>\r\n<p class=\"Body\">The TOE informs a user of hardware and software resources the TOE accesses. The user initiates a secure network connection to the Hypori Virtual Device on the server using the TOE. In general, sensitive data resides on the Hypori Server and not the TOE or TOE platform, although the TOE does store credentials securely in accordance with the Cryptographic Support function.</p>\r\n<p class=\"MsoNormal\" style=\"margin-bottom: .0001pt; page-break-after: avoid; mso-layout-grid-align: none; text-autospace: none;\"><strong style=\"mso-bidi-font-weight: normal;\"><em style=\"mso-bidi-font-style: normal;\"><span style=\"font-size: 11.0pt; line-height: 115%; font-family: 'Calibri',sans-serif; mso-ascii-theme-font: minor-latin; mso-hansi-theme-font: minor-latin; mso-bidi-theme-font: minor-latin;\">Identification and Authentication</span></em></strong></p>\r\n<p class=\"Body\">The TOE supports X.509 certificate validation as part of establishing TLS connections. The TOE relies on platform-provided functionality to support certificate validity checking methods, including the checking of certificate revocation status using OCSP. If the validity status of a certificate cannot be determined, the certificate will not be accepted.</p>\r\n<p class=\"MsoNormal\" style=\"margin-bottom: .0001pt; page-break-after: avoid; mso-layout-grid-align: none; text-autospace: none;\"><strong style=\"mso-bidi-font-weight: normal;\"><em style=\"mso-bidi-font-style: normal;\"><span style=\"font-size: 11.0pt; line-height: 115%; font-family: 'Calibri',sans-serif; mso-ascii-theme-font: minor-latin; mso-hansi-theme-font: minor-latin; mso-bidi-theme-font: minor-latin;\">Security Management</span></em></strong></p>\r\n<p class=\"Body\">Security management consists of setting Hypori Client configuration options and <a name=\"_Hlk152940162\"></a><span style=\"mso-bidi-font-weight: bold; mso-bidi-font-style: italic;\">applying configuration policies from the Hypori Server.</span> The TOE stores the configuration settings and policies encrypted using cryptographic services provided by the platform.</p>\r\n<p class=\"MsoNormal\" style=\"margin-bottom: .0001pt; page-break-after: avoid; mso-layout-grid-align: none; text-autospace: none;\"><strong style=\"mso-bidi-font-weight: normal;\"><em style=\"mso-bidi-font-style: normal;\"><span style=\"font-size: 11.0pt; line-height: 115%; font-family: 'Calibri',sans-serif; mso-ascii-theme-font: minor-latin; mso-hansi-theme-font: minor-latin; mso-bidi-theme-font: minor-latin;\">Privacy</span></em></strong></p>\r\n<p class=\"Body\">The TOE does not transmit personally identifiable information (PII) over a network.</p>\r\n<p class=\"MsoNormal\" style=\"margin-bottom: .0001pt; page-break-after: avoid; mso-layout-grid-align: none; text-autospace: none;\"><strong style=\"mso-bidi-font-weight: normal;\"><em style=\"mso-bidi-font-style: normal;\"><span style=\"font-size: 11.0pt; line-height: 115%; font-family: 'Calibri',sans-serif; mso-ascii-theme-font: minor-latin; mso-hansi-theme-font: minor-latin; mso-bidi-theme-font: minor-latin;\">Protection of the TSF</span></em></strong></p>\r\n<p class=\"Body\">The TOE uses security features and APIs that the platform provides. The TOE leverages package management for secure installation and updates. The TOE package includes only those third-party libraries necessary for its intended operation.</p>\r\n<p class=\"MsoNormal\" style=\"margin-bottom: .0001pt; page-break-after: avoid; mso-layout-grid-align: none; text-autospace: none;\"><strong style=\"mso-bidi-font-weight: normal;\"><em style=\"mso-bidi-font-style: normal;\"><span style=\"font-size: 11.0pt; line-height: 115%; font-family: 'Calibri',sans-serif; mso-ascii-theme-font: minor-latin; mso-hansi-theme-font: minor-latin; mso-bidi-theme-font: minor-latin;\">Trusted Path/Channels</span></em></strong></p>\r\n<p class=\"Body\">The TOE invokes platform-provided functionality to encrypt all transmitted data using TLS 1.2 for all communication with the Hypori Virtual Device on the Hypori Server.</p>","features":[]}