Application Mobile MasterCard PayPass V1 - M/Chip 4, version V01.00.04, sur plateforme NFC FlyBuy Platinum V2 sur composant ST33F1ME
CSV information ?
Status | archived |
---|---|
Valid from | 24.12.2013 |
Valid until | 01.09.2019 |
Scheme | 🇫🇷 FR |
Manufacturer | Oberthur Technologies / STMicroelectronics |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | EAL4+, AVA_VAN.5, ALC_DVS.2 |
Maintenance updates | ANSSI-CC-2013/65-M02 (23.05.2014) Certification report |
Rapport de maintenance ANSSI-CC-2013/65-M01 (09.04.2014) Certification report |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Symmetric Algorithms
DESHash functions
SHA1, SHA2Libraries
NesLib v3.0JavaCard versions
Java Card 3.0.1Vendor
STMicroelectronics, Oberthur TechnologiesSecurity level
EAL 4, EAL4, EAL7, EAL 1, EAL 3, EAL 5, EAL 7, EAL4+, ITSEC E6 ElevéSecurity Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSSProtection profiles
BSI-PP-0035-2007, ANSSI-CC-PP-2010/03, ANSSI-CC-PP-2010/04Certificates
ANSSI-CC-2013/65, ANSSI-CC-2012/39, ANSSI-CC-2011/07, ANSSI-CC-2011/07-S01Standards
CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004File metadata
Title | ANSSI-CC-2013/65 |
---|---|
Subject | Application Mobile MasterCard PayPass V1 - M/Chip 4, version V01.00.04, sur plateforme NFC FlyBuy Platinum V2 sur composant ST33F1ME |
Keywords | ANSSI-CC-CER-F-07.010 |
Author | Duquesnoy |
Creation date | D:20140129142922+01'00' |
Modification date | D:20140129142922+01'00' |
Pages | 21 |
Creator | Microsoft® Word 2010 |
Producer | Microsoft® Word 2010 |
Frontpage
Certificate ID | ANSSI-CC-2013/65 |
---|---|
Certified item | Carte Mobile MasterCard PayPass – M/Chip 4 sur plateforme NFC FlyBuy Platinum V2 sur composant ST33F1ME |
Certification lab | THALES (TCS – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France |
Developer | Oberthur Technologies 420, rue d’Estienne d’Orves, CS 40008, 92705 Colombes Cedex, France STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, B.P.2, 13106 Rousset, France Commanditaire Oberthur Technologies 420, rue d’Estienne d’Orves - CS 40008, 92705 Colombes Cedex, France |
References
Outgoing- ANSSI-CC-2011/07 - archived - STMicroelectronics Secured microcontroller ST33F1ME, ST33F768E, SC33F768E, ST33F640E, SC33F640E, ST33F512E, SC33F512E et SC33F384E all with optional cryptographic library NESLIB 3.0
- ANSSI-CC-2012/39 - archived - NFC FLYBUY PLATINUM V2 sur composant ST33F1ME
Security target ?
Extracted keywords
Symmetric Algorithms
AES, DES, TDES, 3DESAsymmetric Algorithms
RSA 1024Hash functions
SHA-1Schemes
MACRandomness
RNGLibraries
NESLIB 3.0Block cipher modes
CBCJavaCard versions
GlobalPlatform 2.1.1Vendor
STMicroelectronics, Oberthur Technologies, OberthurSecurity level
EAL4+, EAL4, EAL 4, EAL4 augmentedClaims
O.TRANSACTION_UNIQUENESS, O.TRANSACTION_INTEGRITY, O.TRANSACTION_BYPASS, O.TRANSACTION_REPLAY, O.USER_AUTH, O.ISSUING_BANK_AUTH, O.MNO_AUTH, O.COMM_AUTH, O.AUTHORISATION_CONTROL, O.DATA_DISCLOSURE, O.DATA_INTEGRITY, O.DATA_USERS, O.RISK_MNGT, O.APP_BLOCK, O.SIM_UNLOCK, O.AUDIT, O.CHANNELS, O.AUDIT_ACCESS, O.GUIS_AUTH, O.TRANSACTION_UNIQUENES, O.TRANSACTION_UNIQUENE, O.AUTHORISATION_CONTR, O.COMM_INTEGRITY, O.TRANSACTION_UNIQUE, O.TRANSACTION_INTEGRI, O.TRANSACTION_INTEG, O.APP_BLOC, T.DISCLOSURE_KEYS, T.DISCLOSURE_REF_PC, T.INTEG_LOG_FILE, T.INTEG_KEYS, T.INTEG_ACCOUNT_INFO, T.INTEG_REF_PC, T.INTEG_TRANS_PARAM, T.INTEG_COUNT, T.TEMPORARY_DATA, T.INTEG_SEL_ACT_PARAM, T.STEALING, T.MERCHANT_ACCOMPLICE, T.MAN-IN-THE-MIDDLE, T.TRANSACTION_REPUDIATION, T.TRANSACTION_COUNTERFEITING, T.TRANSACTION_REPLAY, T.CERTIF_CORRUPTION, T.APPLICATIONS_DOS, T.MNO_USURPATION, T.ISSUING-BANK_USURPATION, T.CUSTOMER_USURPATION, T.ISSUING-, A.MERCHANT_AUTH, OE.CUSTOMER_PC_CONFID, OE.GUI_INST_ALERT, OE.TOE_USAGE, OE.GUIS_IDENTIFICATION, OE.POLICY, OE.NFC_PROTOCOL, OE.TRANSACTION_DISPLAY, OE.CHANNELS_SELECTION, OE.GUIS_TIMEOUT, OE.MERCHANT_CONTROL, OE.MERCHANT_AUTH, OE.LATENCY_CONTROL, OE.POS_APPROVAL, OE.POS_APPLICATIONS, OE.POS_DEACTIVATION, OE.CERTIFICATES_MNGT, OE.NO_VAD, OE.BANKS_PRIVILEGES, OE.GUIS_AUTH, OSP.POLICY, OSP.CUSTOMER_PC_CONFID, OSP.GUIS_IDENTIFICATION, OSP.CERTIFICATES_MNGT, OSP.TOE_USAGE, OSP.PISHING, OSP.MERCHANT_CONTROL, OSP.BANKS_PRIVILEGES, OSP.CUSTOMER_PC_CONFISecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ADV_FSP.1, ADV_TDS.1, ADV_FSP.2, ADV_TDS.2, AGD_PRE, AGD_OPE, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_TAT.1, ALC_CMC.4, ALC_CMS.1, ALC_DVS.1, ALC_LCD.1, ALC_CMS.4, ALC_DEL.1, ATE_DPT.1, ATE_COV.2, ATE_FUN.1, ATE_COV.1, ATE_IND.2, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1, ASE_REQ.2, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_ARP.1, FAU_ARP.1.1, FAU_SAA.1, FAU_SAA.1.1, FAU_SAA.1.2, FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_SAR, FAU_SAR.1, FCS_CKM, FCS_CKM.1, FCS_CKM.4, FCS_CKM.4.1, FCS_COP, FCS_COP.1, FCS_COP.1.1, FCS_CKM.2, FDP_ACC, FDP_ACC.2, FDP_ACF, FDP_ACF.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_IFC, FDP_IFC.2, FDP_IFF, FDP_IFF.1, FDP_IFF.1.2, FDP_SDI.2, FDP_SDI.2.1, FDP_SDI.2.2, FDP_RIP.1, FDP_RIP.1.1, FDP_DAU.1, FDP_DAU.1.1, FDP_DAU.1.2, FDP_ITC, FDP_ITC.2, FDP_ETC.1, FDP_ETC.1.1, FDP_ETC.1.2, FDP_ITC.1, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_UIT.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_ACC.1, FDP_IFC.1, FIA_AFL, FIA_AFL.1, FIA_ATD.1, FIA_ATD.1.1, FIA_UAU, FIA_UAU.1, FIA_UAU.3, FIA_UAU.3.1, FIA_UAU.3.2, FIA_UAU.4, FIA_UAU.4.1, FIA_UAU.6, FIA_UID, FIA_UID.1, FIA_USB.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_SOS.2, FIA_SOS.2.1, FIA_SOS.2.2, FIA_SOS, FMT_SMF, FMT_SMF.1, FMT_MOF, FMT_MOF.1, FMT_MTD, FMT_MTD.1, FMT_MSA, FMT_MSA.1, FMT_MSA.2, FMT_MSA.2.1, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FPR_UNO.1, FPR_UNO.1.1, FPT_TST.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_TDC.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_RPL.1, FPT_RPL.1.1, FPT_RPL.1.2, FPT_RPL, FPT_STM.1, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1Protection profiles
BSI-PP-0035, ANSSI-CC-PP 2010/04Certificates
ANSSI-CC-2012/39, ANSSI-CC-2011/07, ANSSI-CC-2011/07-S01Standards
FIPS PUB 46-3, FIPS PUB 81, FIPS PUB 140-2, FIPS PUB 180-3, FIPS PUB 186-3, FIPS PUB 197, PKCS#1, PKCS 1, ISO/IEC 9796-1, ISO/IEC 9797-1, SCP02, SCP80File metadata
Title | FQR 110 6672 Ed1 - ST JUBA Lite |
---|---|
Author | chrisduc |
Creation date | D:20130807110801+02'00 |
Modification date | D:20130807110801+02'00 |
Pages | 131 |
Creator | PDFCreator Version 0.8.1 |
Producer | AFPL Ghostscript 8.50 |
References
Outgoing- ANSSI-CC-2011/07 - archived - STMicroelectronics Secured microcontroller ST33F1ME, ST33F768E, SC33F768E, ST33F640E, SC33F640E, ST33F512E, SC33F512E et SC33F384E all with optional cryptographic library NESLIB 3.0
- ANSSI-CC-2012/39 - archived - NFC FLYBUY PLATINUM V2 sur composant ST33F1ME
Heuristics ?
Extracted SARs
ALC_TAT.1, ADV_FSP.4, ATE_COV.2, ASE_CCL.1, ALC_CMC.4, ATE_DPT.1, ALC_LCD.1, ASE_TSS.1, ALC_DEL.1, AVA_VAN.5, ASE_REQ.2, ALC_CMS.4, ADV_ARC.1, ADV_TDS.3, ADV_IMP.1, AGD_PRE.1, ALC_DVS.2, ATE_FUN.1, ASE_SPD.1, ATE_IND.2, ASE_ECD.1, AGD_OPE.1, ASE_OBJ.2, ASE_INT.1Similar certificates
Scheme data ?
Product | Application Mobile MasterCard PayPass V1 - M/Chip 4, version V01.00.04, sur plateforme NFC FlyBuy Platinum V2 sur composant ST33F1ME | |
---|---|---|
Url | https://cyber.gouv.fr/produits-certifies/application-mobile-mastercard-paypass-v1-mchip-4-version-v010004-sur-plateforme | |
Description | Le produit certifé est la « Carte Mobile MasterCard PayPass – M/Chip 4 sur plateforme NFC FlyBuy Platinum V2 sur composant ST33F1ME » développée par Oberthur Technologies et STMicroelectronics. Ce produit est une carte (U)SIM destinée à être insérée dans un téléphone portable disposant de la technologie NFC2. Il embarque l'application Mobile PayPass v1.0 qui met en oeuvre la solution « Paye | |
Sponsor | Oberthur Technologies | |
Developer | Oberthur Technologies / Oberthur Technologies | |
Cert Id | 2013/65 | |
Level | EAL4+ | |
Enhanced | ||
Cert Id | 2013/65 | |
Certification Date | 24/12/2013 | |
Category | Cartes Ă puce | |
Cc Version | Critères Communs version 3.1r3 | |
Developer | Oberthur Technologies / Oberthur Technologies | |
Sponsor | Oberthur Technologies | |
Evaluation Facility | THALES (TCS – CNES) | |
Level | EAL4+ | |
Protection Profile | ||
Mutual Recognition | SOG-IS CCRA | |
Augmented | ALC_DVS.2, AVA_VAN.5 | |
Target Link | https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2013-65en.pdf | |
Report Link | https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2013-65fr.pdf |
References ?
Updates ?
-
14.10.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'Application Mobile MasterCard PayPass V1 - M/Chip 4, version V01.00.04, sur plateforme NFC FlyBuy Platinum V2 sur composant ST33F1ME', 'url': 'https://cyber.gouv.fr/produits-certifies/application-mobile-mastercard-paypass-v1-mchip-4-version-v010004-sur-plateforme', 'description': 'Le produit certifé est la « Carte Mobile MasterCard PayPass – M/Chip 4 sur plateforme NFC FlyBuy Platinum V2 sur composant ST33F1ME » développée par Oberthur Technologies et STMicroelectronics.\n\nCe produit est une carte (U)SIM destinée à être insérée dans un téléphone portable disposant de la technologie NFC2. Il embarque l'application Mobile PayPass v1.0 qui met en oeuvre la solution « Paye', 'sponsor': 'Oberthur Technologies', 'developer': 'Oberthur Technologies / Oberthur Technologies', 'cert_id': '2013/65', 'level': 'EAL4+', 'enhanced': {'cert_id': '2013/65', 'certification_date': '24/12/2013', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 3.1r3', 'developer': 'Oberthur Technologies / Oberthur Technologies', 'sponsor': 'Oberthur Technologies', 'evaluation_facility': 'THALES (TCS – CNES)', 'level': 'EAL4+', 'protection_profile': '', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ALC_DVS.2, AVA_VAN.5', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2013-65en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2013-65fr.pdf'}}
.
- The scheme_data property was set to
-
02.09.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '2e4127e86969ec105569806f18118fd611c63f4a9d829a478df861e6318532d5', 'txt_hash': '263aaaa523c471afe1ec9b93ab6e8df0cc5691eb3025b7f40a5e155b026f155a'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '734f297c82adaa229149775ac66c2d92919abd255e282c447445e63b13334675', 'txt_hash': 'a12c1c5b1fe4396131085d0e0176fe1d760a42bd8b7cf77af908e01c93df5723'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 774691, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 21, '/Title': 'ANSSI-CC-2013/65', '/Author': 'Duquesnoy', '/Subject': 'Application Mobile MasterCard PayPass V1 - M/Chip 4, version V01.00.04, sur plateforme NFC FlyBuy Platinum V2 sur composant ST33F1ME', '/Keywords': 'ANSSI-CC-CER-F-07.010', '/Creator': 'Microsoft® Word 2010', '/CreationDate': "D:20140129142922+01'00'", '/ModDate': "D:20140129142922+01'00'", '/Producer': 'Microsoft® Word 2010', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['mailto:[email protected]', 'http://www.ssi.gouv.fr/']}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 1527189, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 131, '/Producer': 'AFPL Ghostscript 8.50', '/CreationDate': "D:20130807110801+02'00", '/ModDate': "D:20130807110801+02'00", '/Title': 'FQR 110 6672 Ed1 - ST JUBA Lite', '/Creator': 'PDFCreator Version 0.8.1', '/Author': 'chrisduc', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{'FR': {'match_rules': ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables'], 'cert_id': 'ANSSI-CC-2013/65', 'cert_item': 'Carte Mobile MasterCard PayPass – M/Chip 4 sur plateforme NFC FlyBuy Platinum V2 sur composant ST33F1ME', 'cert_item_version': 'MasterCard Mobile PayPass V1 – Version V01.00.04 Identification hardware 0768910, identification card Manager GOP Ref V1.8.v', 'ref_protection_profiles': 'néant', 'cc_version': 'Critères Communs version 3.1 révision 3', 'cc_security_level': 'EAL 4 augmenté ALC_DVS.2, AVA_VAN.5', 'developer': 'Oberthur Technologies 420, rue d’Estienne d’Orves, CS 40008, 92705 Colombes Cedex, France STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, B.P.2, 13106 Rousset, France Commanditaire Oberthur Technologies 420, rue d’Estienne d’Orves - CS 40008, 92705 Colombes Cedex, France', 'cert_lab': 'THALES (TCS – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France'}}
. - The report_keywords property was set to
{'cc_cert_id': {'FR': {'ANSSI-CC-2013/65': 22, 'ANSSI-CC-2012/39': 4, 'ANSSI-CC-2011/07': 1, 'ANSSI-CC-2011/07-S01': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0035-2007': 1}, 'ANSSI': {'ANSSI-CC-PP-2010/03': 1, 'ANSSI-CC-PP-2010/04': 1}}, 'cc_security_level': {'EAL': {'EAL 4': 1, 'EAL4': 4, 'EAL7': 1, 'EAL 1': 1, 'EAL 3': 1, 'EAL 5': 1, 'EAL 7': 1, 'EAL4+': 3}, 'ITSEC': {'ITSEC E6 Elevé': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE': 3, 'AGD_PRE': 2}, 'ALC': {'ALC_DVS.2': 3, 'ALC_FLR': 2, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.5': 3, 'AVA_VAN': 3}, 'ASE': {'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'STMicroelectronics': {'STMicroelectronics': 3}, 'Oberthur': {'Oberthur Technologies': 11}}, 'eval_facility': {}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA1': 2}, 'SHA2': {'SHA2': 2}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Neslib': {'NesLib v3.0': 1}}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2009-07-001': 1, 'CCMB-2009-07-002': 1, 'CCMB-2009-07-003': 1, 'CCMB-2009-07-004': 1}}, 'javacard_version': {'JavaCard': {'Java Card 3.0.1': 1}}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {'FR': {'ANSSI-CC-2012/39': 1, 'ANSSI-CC-2011/07': 1, 'ANSSI-CC-2011/07-S01': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0035': 1}, 'ANSSI': {'ANSSI-CC-PP 2010/04': 1}}, 'cc_security_level': {'EAL': {'EAL4+': 10, 'EAL4': 3, 'EAL 4': 1, 'EAL4 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 5, 'ADV_FSP.4': 9, 'ADV_IMP.1': 4, 'ADV_TDS.3': 8, 'ADV_FSP.1': 3, 'ADV_TDS.1': 2, 'ADV_FSP.2': 2, 'ADV_TDS.2': 1}, 'AGD': {'AGD_PRE': 1, 'AGD_OPE': 2, 'AGD_OPE.1': 5, 'AGD_PRE.1': 5}, 'ALC': {'ALC_DVS.2': 6, 'ALC_TAT.1': 3, 'ALC_CMC.4': 1, 'ALC_CMS.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 3, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_DPT.1': 2, 'ATE_COV.2': 3, 'ATE_FUN.1': 6, 'ATE_COV.1': 2, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.5': 5}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 4, 'ASE_INT.1': 5, 'ASE_REQ.1': 2, 'ASE_REQ.2': 2, 'ASE_OBJ.2': 3, 'ASE_SPD.1': 2, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 7, 'FAU_ARP.1.1': 1, 'FAU_SAA.1': 8, 'FAU_SAA.1.1': 1, 'FAU_SAA.1.2': 2, 'FAU_GEN.1': 11, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_SAR': 12, 'FAU_SAR.1': 4}, 'FCS': {'FCS_CKM': 9, 'FCS_CKM.1': 8, 'FCS_CKM.4': 20, 'FCS_CKM.4.1': 1, 'FCS_COP': 40, 'FCS_COP.1': 9, 'FCS_COP.1.1': 1, 'FCS_CKM.2': 1}, 'FDP': {'FDP_ACC': 149, 'FDP_ACC.2': 14, 'FDP_ACF': 133, 'FDP_ACF.1': 35, 'FDP_ACF.1.2': 7, 'FDP_ACF.1.3': 1, 'FDP_IFC': 77, 'FDP_IFC.2': 8, 'FDP_IFF': 62, 'FDP_IFF.1': 24, 'FDP_IFF.1.2': 4, 'FDP_SDI.2': 5, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_RIP.1': 7, 'FDP_RIP.1.1': 1, 'FDP_DAU.1': 5, 'FDP_DAU.1.1': 1, 'FDP_DAU.1.2': 1, 'FDP_ITC': 28, 'FDP_ITC.2': 17, 'FDP_ETC.1': 15, 'FDP_ETC.1.1': 1, 'FDP_ETC.1.2': 1, 'FDP_ITC.1': 27, 'FDP_ITC.1.1': 1, 'FDP_ITC.1.2': 1, 'FDP_ITC.1.3': 1, 'FDP_UIT.1': 13, 'FDP_UIT.1.1': 1, 'FDP_UIT.1.2': 1, 'FDP_ACC.1': 14, 'FDP_IFC.1': 11}, 'FIA': {'FIA_AFL': 16, 'FIA_AFL.1': 4, 'FIA_ATD.1': 9, 'FIA_ATD.1.1': 1, 'FIA_UAU': 35, 'FIA_UAU.1': 8, 'FIA_UAU.3': 7, 'FIA_UAU.3.1': 1, 'FIA_UAU.3.2': 1, 'FIA_UAU.4': 9, 'FIA_UAU.4.1': 1, 'FIA_UAU.6': 1, 'FIA_UID': 24, 'FIA_UID.1': 10, 'FIA_USB.1': 7, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_SOS.2': 8, 'FIA_SOS.2.1': 1, 'FIA_SOS.2.2': 1, 'FIA_SOS': 1}, 'FMT': {'FMT_SMF': 17, 'FMT_SMF.1': 5, 'FMT_MOF': 7, 'FMT_MOF.1': 1, 'FMT_MTD': 4, 'FMT_MTD.1': 1, 'FMT_MSA': 9, 'FMT_MSA.1': 3, 'FMT_MSA.2': 4, 'FMT_MSA.2.1': 1, 'FMT_MSA.3': 29, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_SMR.1': 18, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPR': {'FPR_UNO.1': 4, 'FPR_UNO.1.1': 1}, 'FPT': {'FPT_TST.1': 7, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_TDC.1': 16, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 1, 'FPT_RPL.1': 4, 'FPT_RPL.1.1': 1, 'FPT_RPL.1.2': 1, 'FPT_RPL': 1, 'FPT_STM.1': 3}, 'FTP': {'FTP_ITC.1': 10, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP.1': 3}}, 'cc_claims': {'O': {'O.TRANSACTION_UNIQUENESS': 33, 'O.TRANSACTION_INTEGRITY': 38, 'O.TRANSACTION_BYPASS': 53, 'O.TRANSACTION_REPLAY': 13, 'O.USER_AUTH': 55, 'O.ISSUING_BANK_AUTH': 54, 'O.MNO_AUTH': 8, 'O.COMM_AUTH': 5, 'O.AUTHORISATION_CONTROL': 19, 'O.DATA_DISCLOSURE': 44, 'O.DATA_INTEGRITY': 62, 'O.DATA_USERS': 10, 'O.RISK_MNGT': 10, 'O.APP_BLOCK': 13, 'O.SIM_UNLOCK': 10, 'O.AUDIT': 14, 'O.CHANNELS': 9, 'O.AUDIT_ACCESS': 10, 'O.GUIS_AUTH': 13, 'O.TRANSACTION_UNIQUENES': 2, 'O.TRANSACTION_UNIQUENE': 1, 'O.AUTHORISATION_CONTR': 1, 'O.COMM_INTEGRITY': 1, 'O.TRANSACTION_UNIQUE': 1, 'O.TRANSACTION_INTEGRI': 1, 'O.TRANSACTION_INTEG': 1, 'O.APP_BLOC': 1}, 'T': {'T.DISCLOSURE_KEYS': 6, 'T.DISCLOSURE_REF_PC': 6, 'T.INTEG_LOG_FILE': 5, 'T.INTEG_KEYS': 8, 'T.INTEG_ACCOUNT_INFO': 6, 'T.INTEG_REF_PC': 6, 'T.INTEG_TRANS_PARAM': 7, 'T.INTEG_COUNT': 7, 'T.TEMPORARY_DATA': 7, 'T.INTEG_SEL_ACT_PARAM': 6, 'T.STEALING': 9, 'T.MERCHANT_ACCOMPLICE': 9, 'T.MAN-IN-THE-MIDDLE': 12, 'T.TRANSACTION_REPUDIATION': 7, 'T.TRANSACTION_COUNTERFEITING': 13, 'T.TRANSACTION_REPLAY': 8, 'T.CERTIF_CORRUPTION': 5, 'T.APPLICATIONS_DOS': 7, 'T.MNO_USURPATION': 5, 'T.ISSUING-BANK_USURPATION': 3, 'T.CUSTOMER_USURPATION': 7, 'T.ISSUING-': 2}, 'A': {'A.MERCHANT_AUTH': 5}, 'OE': {'OE.CUSTOMER_PC_CONFID': 8, 'OE.GUI_INST_ALERT': 7, 'OE.TOE_USAGE': 9, 'OE.GUIS_IDENTIFICATION': 5, 'OE.POLICY': 5, 'OE.NFC_PROTOCOL': 5, 'OE.TRANSACTION_DISPLAY': 5, 'OE.CHANNELS_SELECTION': 4, 'OE.GUIS_TIMEOUT': 7, 'OE.MERCHANT_CONTROL': 7, 'OE.MERCHANT_AUTH': 8, 'OE.LATENCY_CONTROL': 5, 'OE.POS_APPROVAL': 7, 'OE.POS_APPLICATIONS': 10, 'OE.POS_DEACTIVATION': 6, 'OE.CERTIFICATES_MNGT': 11, 'OE.NO_VAD': 6, 'OE.BANKS_PRIVILEGES': 4, 'OE.GUIS_AUTH': 1}, 'OSP': {'OSP.POLICY': 4, 'OSP.CUSTOMER_PC_CONFID': 3, 'OSP.GUIS_IDENTIFICATION': 4, 'OSP.CERTIFICATES_MNGT': 4, 'OSP.TOE_USAGE': 4, 'OSP.PISHING': 4, 'OSP.MERCHANT_CONTROL': 6, 'OSP.BANKS_PRIVILEGES': 4, 'OSP.CUSTOMER_PC_CONFI': 1}}, 'vendor': {'STMicroelectronics': {'STMicroelectronics': 4}, 'Oberthur': {'Oberthur Technologies': 137, 'Oberthur': 8}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 2}}, 'DES': {'DES': {'DES': 1}, '3DES': {'TDES': 1, '3DES': 4}}}, 'asymmetric_crypto': {'RSA': {'RSA 1024': 1}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 4}}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 1}}, 'cipher_mode': {'CBC': {'CBC': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Neslib': {'NESLIB 3.0': 2}}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 46-3': 1, 'FIPS PUB 81': 1, 'FIPS PUB 140-2': 1, 'FIPS PUB 180-3': 1, 'FIPS PUB 186-3': 1, 'FIPS PUB 197': 1}, 'PKCS': {'PKCS#1': 2, 'PKCS 1': 1}, 'ISO': {'ISO/IEC 9796-1': 1, 'ISO/IEC 9797-1': 1}, 'SCP': {'SCP02': 1, 'SCP80': 1}}, 'javacard_version': {'GlobalPlatform': {'GlobalPlatform 2.1.1': 1}}, 'javacard_api_const': {}, 'javacard_packages': {'javacard': {'javacard.security': 1}}, 'certification_process': {}}
. - The report_filename property was set to
ANSSI-CC-2013_65.pdf
. - The st_filename property was set to
FQR 110 6672 Ed1 - ST JUBA Lite.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['THALES']
. - The cert_id property was set to
ANSSI-CC-2013/65
. - The st_references property was updated, with the
{'directly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2011/07', 'ANSSI-CC-2012/39']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2011/07', 'ANSSI-CC-2012/39']}}
data. - The report_references property was updated, with the
{'directly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2011/07', 'ANSSI-CC-2012/39']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2012/06', 'ANSSI-CC-2012/39', 'ANSSI-CC-2011/24', 'ANSSI-CC-2010/50', 'ANSSI-CC-2011/07', 'ANSSI-CC-2010/49', 'ANSSI-CC-2009/57', 'ANSSI-CC-2009/25']}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2013_65.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/FQR%20110%206672%20Ed1%20-%20ST%20JUBA%20%20Lite.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
. - The st_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data. - The report_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}]}
values discarded.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2012/39']}}, 'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2012/39']}}}
data. - The report_references property was updated, with the
{'directly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2012/39']}}, 'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2012/39', 'ANSSI-CC-2012/06', 'ANSSI-CC-2011/24', 'ANSSI-CC-2009/57', 'ANSSI-CC-2009/25']}}}
data. - The scheme_data property was set to
{'product': 'Application Mobile MasterCard PayPass V1 - M/Chip 4, version V01.00.04, sur plateforme NFC FlyBuy Platinum V2 sur composant ST33F1ME', 'url': 'https://cyber.gouv.fr/produits-certifies/application-mobile-mastercard-paypass-v1-mchip-4-version-v010004-sur-plateforme', 'description': 'Le produit certifé est la « Carte Mobile MasterCard PayPass – M/Chip 4 sur plateforme NFC FlyBuy Platinum V2 sur composant ST33F1ME » développée par Oberthur Technologies et STMicroelectronics.\n\nCe produit est une carte (U)SIM destinée à être insérée dans un téléphone portable disposant de la technologie NFC2. Il embarque l'application Mobile PayPass v1.0 qui met en oeuvre la solution « Paye', 'sponsor': 'Oberthur Technologies', 'developer': 'Oberthur Technologies / Oberthur Technologies', 'cert_id': '2013/65', 'level': 'EAL4+', 'enhanced': {'cert_id': '2013/65', 'certification_date': '24/12/2013', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 3.1r3', 'developer': 'Oberthur Technologies / Oberthur Technologies', 'sponsor': 'Oberthur Technologies', 'evaluation_facility': 'THALES (TCS – CNES)', 'level': 'EAL4+', 'protection_profile': '', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ALC_DVS.2, AVA_VAN.5', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2013-65en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2013-65fr.pdf'}}
.
- The st_references property was updated, with the
-
31.07.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Application Mobile MasterCard PayPass V1 - M/Chip 4, version V01.00.04, sur plateforme NFC FlyBuy Platinum V2 sur composant ST33F1ME was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "8843ddf8e55f6df6",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2013/65",
"cert_lab": [
"THALES"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"01.00.04"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2011/07",
"ANSSI-CC-2012/39"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2010/50",
"ANSSI-CC-2010/49",
"ANSSI-CC-2011/07",
"ANSSI-CC-2009/57",
"ANSSI-CC-2012/06",
"ANSSI-CC-2011/24",
"ANSSI-CC-2009/25",
"ANSSI-CC-2012/39"
]
}
},
"scheme_data": {
"cert_id": "2013/65",
"description": "Le produit certif\u00e9 est la \u00ab Carte Mobile MasterCard PayPass \u2013 M/Chip 4 sur plateforme NFC FlyBuy Platinum V2 sur composant ST33F1ME \u00bb d\u00e9velopp\u00e9e par Oberthur Technologies et STMicroelectronics.\n\nCe produit est une carte (U)SIM destin\u00e9e \u00e0 \u00eatre ins\u00e9r\u00e9e dans un t\u00e9l\u00e9phone portable disposant de la technologie NFC2. Il embarque l\u0026#39;application Mobile PayPass v1.0 qui met en oeuvre la solution \u00ab Paye",
"developer": "Oberthur Technologies / Oberthur Technologies",
"enhanced": {
"augmented": "ALC_DVS.2, AVA_VAN.5",
"category": "Cartes \u00e0 puce",
"cc_version": "Crit\u00e8res Communs version 3.1r3",
"cert_id": "2013/65",
"certification_date": "24/12/2013",
"developer": "Oberthur Technologies / Oberthur Technologies",
"evaluation_facility": "THALES (TCS \u2013 CNES)",
"level": "EAL4+",
"mutual_recognition": "SOG-IS\n CCRA",
"protection_profile": "",
"report_link": "https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2013-65fr.pdf",
"sponsor": "Oberthur Technologies",
"target_link": "https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2013-65en.pdf"
},
"level": "EAL4+",
"product": "Application Mobile MasterCard PayPass V1 - M/Chip 4, version V01.00.04, sur plateforme NFC FlyBuy Platinum V2 sur composant ST33F1ME",
"sponsor": "Oberthur Technologies",
"url": "https://cyber.gouv.fr/produits-certifies/application-mobile-mastercard-paypass-v1-mchip-4-version-v010004-sur-plateforme"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2011/07",
"ANSSI-CC-2012/39"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2011/07",
"ANSSI-CC-2012/39"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2014-04-09",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2013_65_M01.pdf",
"maintenance_st_link": null,
"maintenance_title": "Rapport de maintenance ANSSI-CC-2013/65-M01"
},
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2014-05-23",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2013_65_M02.pdf",
"maintenance_st_link": null,
"maintenance_title": "ANSSI-CC-2013/65-M02"
}
]
},
"manufacturer": "Oberthur Technologies / STMicroelectronics",
"manufacturer_web": "https://www.oberthur.com/",
"name": "Application Mobile MasterCard PayPass V1 - M/Chip 4, version V01.00.04, sur plateforme NFC FlyBuy Platinum V2 sur composant ST33F1ME",
"not_valid_after": "2019-09-01",
"not_valid_before": "2013-12-24",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "ANSSI-CC-2013_65.pdf",
"report_frontpage": {
"FR": {
"cc_security_level": "EAL 4 augment\u00e9 ALC_DVS.2, AVA_VAN.5",
"cc_version": "Crit\u00e8res Communs version 3.1 r\u00e9vision 3",
"cert_id": "ANSSI-CC-2013/65",
"cert_item": "Carte Mobile MasterCard PayPass \u2013 M/Chip 4 sur plateforme NFC FlyBuy Platinum V2 sur composant ST33F1ME",
"cert_item_version": "MasterCard Mobile PayPass V1 \u2013 Version V01.00.04 Identification hardware 0768910, identification card Manager GOP Ref V1.8.v",
"cert_lab": "THALES (TCS \u2013 CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France",
"developer": "Oberthur Technologies 420, rue d\u2019Estienne d\u2019Orves, CS 40008, 92705 Colombes Cedex, France STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, B.P.2, 13106 Rousset, France Commanditaire Oberthur Technologies 420, rue d\u2019Estienne d\u2019Orves - CS 40008, 92705 Colombes Cedex, France",
"match_rules": [
"R\u00e9f\u00e9rence du rapport de certification(.+)Nom du produit(.+)R\u00e9f\u00e9rence/version du produit(.*)Conformit\u00e9 \u00e0 un profil de protection(.+)Crit\u00e8res d\u2019\u00e9valuation et version(.+)Niveau d\u2019\u00e9valuation(.+)D\u00e9veloppeurs(.+)Centre d\u2019\u00e9valuation(.+)Accords de reconnaissance applicables"
],
"ref_protection_profiles": "n\u00e9ant"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2011/07": 1,
"ANSSI-CC-2011/07-S01": 1,
"ANSSI-CC-2012/39": 4,
"ANSSI-CC-2013/65": 22
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"ANSSI": {
"ANSSI-CC-PP-2010/03": 1,
"ANSSI-CC-PP-2010/04": 1
},
"BSI": {
"BSI-PP-0035-2007": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_FSP": 1,
"ADV_IMP": 1,
"ADV_INT": 1,
"ADV_SPM": 1,
"ADV_TDS": 1
},
"AGD": {
"AGD_OPE": 3,
"AGD_PRE": 2
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMS": 1,
"ALC_DEL": 1,
"ALC_DVS": 1,
"ALC_DVS.2": 3,
"ALC_FLR": 2,
"ALC_TAT": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_ECD": 1,
"ASE_INT": 1,
"ASE_OBJ": 1,
"ASE_REQ": 1,
"ASE_SPD": 1,
"ASE_TSS": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_DPT": 1,
"ATE_FUN": 1,
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 3,
"AVA_VAN.5": 3
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 3": 1,
"EAL 4": 1,
"EAL 5": 1,
"EAL 7": 1,
"EAL4": 4,
"EAL4+": 3,
"EAL7": 1
},
"ITSEC": {
"ITSEC E6 Elev\u00e9": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"Neslib": {
"NesLib v3.0": 1
}
},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA1": 2
},
"SHA2": {
"SHA2": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {
"JavaCard": {
"Java Card 3.0.1": 1
}
},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2009-07-001": 1,
"CCMB-2009-07-002": 1,
"CCMB-2009-07-003": 1,
"CCMB-2009-07-004": 1
}
},
"symmetric_crypto": {
"DES": {
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Oberthur": {
"Oberthur Technologies": 11
},
"STMicroelectronics": {
"STMicroelectronics": 3
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Duquesnoy",
"/CreationDate": "D:20140129142922+01\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2010",
"/Keywords": "ANSSI-CC-CER-F-07.010",
"/ModDate": "D:20140129142922+01\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2010",
"/Subject": "Application Mobile MasterCard PayPass V1 - M/Chip 4, version V01.00.04, sur plateforme NFC FlyBuy Platinum V2 sur composant ST33F1ME",
"/Title": "ANSSI-CC-2013/65",
"pdf_file_size_bytes": 774691,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.ssi.gouv.fr/",
"mailto:[email protected]"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 21
},
"st_filename": "FQR 110 6672 Ed1 - ST JUBA Lite.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"RSA": {
"RSA 1024": 1
}
},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2011/07": 1,
"ANSSI-CC-2011/07-S01": 1,
"ANSSI-CC-2012/39": 1
}
},
"cc_claims": {
"A": {
"A.MERCHANT_AUTH": 5
},
"O": {
"O.APP_BLOC": 1,
"O.APP_BLOCK": 13,
"O.AUDIT": 14,
"O.AUDIT_ACCESS": 10,
"O.AUTHORISATION_CONTR": 1,
"O.AUTHORISATION_CONTROL": 19,
"O.CHANNELS": 9,
"O.COMM_AUTH": 5,
"O.COMM_INTEGRITY": 1,
"O.DATA_DISCLOSURE": 44,
"O.DATA_INTEGRITY": 62,
"O.DATA_USERS": 10,
"O.GUIS_AUTH": 13,
"O.ISSUING_BANK_AUTH": 54,
"O.MNO_AUTH": 8,
"O.RISK_MNGT": 10,
"O.SIM_UNLOCK": 10,
"O.TRANSACTION_BYPASS": 53,
"O.TRANSACTION_INTEG": 1,
"O.TRANSACTION_INTEGRI": 1,
"O.TRANSACTION_INTEGRITY": 38,
"O.TRANSACTION_REPLAY": 13,
"O.TRANSACTION_UNIQUE": 1,
"O.TRANSACTION_UNIQUENE": 1,
"O.TRANSACTION_UNIQUENES": 2,
"O.TRANSACTION_UNIQUENESS": 33,
"O.USER_AUTH": 55
},
"OE": {
"OE.BANKS_PRIVILEGES": 4,
"OE.CERTIFICATES_MNGT": 11,
"OE.CHANNELS_SELECTION": 4,
"OE.CUSTOMER_PC_CONFID": 8,
"OE.GUIS_AUTH": 1,
"OE.GUIS_IDENTIFICATION": 5,
"OE.GUIS_TIMEOUT": 7,
"OE.GUI_INST_ALERT": 7,
"OE.LATENCY_CONTROL": 5,
"OE.MERCHANT_AUTH": 8,
"OE.MERCHANT_CONTROL": 7,
"OE.NFC_PROTOCOL": 5,
"OE.NO_VAD": 6,
"OE.POLICY": 5,
"OE.POS_APPLICATIONS": 10,
"OE.POS_APPROVAL": 7,
"OE.POS_DEACTIVATION": 6,
"OE.TOE_USAGE": 9,
"OE.TRANSACTION_DISPLAY": 5
},
"OSP": {
"OSP.BANKS_PRIVILEGES": 4,
"OSP.CERTIFICATES_MNGT": 4,
"OSP.CUSTOMER_PC_CONFI": 1,
"OSP.CUSTOMER_PC_CONFID": 3,
"OSP.GUIS_IDENTIFICATION": 4,
"OSP.MERCHANT_CONTROL": 6,
"OSP.PISHING": 4,
"OSP.POLICY": 4,
"OSP.TOE_USAGE": 4
},
"T": {
"T.APPLICATIONS_DOS": 7,
"T.CERTIF_CORRUPTION": 5,
"T.CUSTOMER_USURPATION": 7,
"T.DISCLOSURE_KEYS": 6,
"T.DISCLOSURE_REF_PC": 6,
"T.INTEG_ACCOUNT_INFO": 6,
"T.INTEG_COUNT": 7,
"T.INTEG_KEYS": 8,
"T.INTEG_LOG_FILE": 5,
"T.INTEG_REF_PC": 6,
"T.INTEG_SEL_ACT_PARAM": 6,
"T.INTEG_TRANS_PARAM": 7,
"T.ISSUING-": 2,
"T.ISSUING-BANK_USURPATION": 3,
"T.MAN-IN-THE-MIDDLE": 12,
"T.MERCHANT_ACCOMPLICE": 9,
"T.MNO_USURPATION": 5,
"T.STEALING": 9,
"T.TEMPORARY_DATA": 7,
"T.TRANSACTION_COUNTERFEITING": 13,
"T.TRANSACTION_REPLAY": 8,
"T.TRANSACTION_REPUDIATION": 7
}
},
"cc_protection_profile_id": {
"ANSSI": {
"ANSSI-CC-PP 2010/04": 1
},
"BSI": {
"BSI-PP-0035": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 5,
"ADV_FSP.1": 3,
"ADV_FSP.2": 2,
"ADV_FSP.4": 9,
"ADV_IMP.1": 4,
"ADV_TDS.1": 2,
"ADV_TDS.2": 1,
"ADV_TDS.3": 8
},
"AGD": {
"AGD_OPE": 2,
"AGD_OPE.1": 5,
"AGD_PRE": 1,
"AGD_PRE.1": 5
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.1": 1,
"ALC_CMS.4": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_DVS.2": 6,
"ALC_LCD.1": 3,
"ALC_TAT.1": 3
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 4,
"ASE_INT.1": 5,
"ASE_OBJ.2": 3,
"ASE_REQ.1": 2,
"ASE_REQ.2": 2,
"ASE_SPD.1": 2,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.1": 2,
"ATE_COV.2": 3,
"ATE_DPT.1": 2,
"ATE_FUN.1": 6,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.5": 5
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 1,
"EAL4": 3,
"EAL4 augmented": 2,
"EAL4+": 10
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP.1": 7,
"FAU_ARP.1.1": 1,
"FAU_GEN.1": 11,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_SAA.1": 8,
"FAU_SAA.1.1": 1,
"FAU_SAA.1.2": 2,
"FAU_SAR": 12,
"FAU_SAR.1": 4
},
"FCS": {
"FCS_CKM": 9,
"FCS_CKM.1": 8,
"FCS_CKM.2": 1,
"FCS_CKM.4": 20,
"FCS_CKM.4.1": 1,
"FCS_COP": 40,
"FCS_COP.1": 9,
"FCS_COP.1.1": 1
},
"FDP": {
"FDP_ACC": 149,
"FDP_ACC.1": 14,
"FDP_ACC.2": 14,
"FDP_ACF": 133,
"FDP_ACF.1": 35,
"FDP_ACF.1.2": 7,
"FDP_ACF.1.3": 1,
"FDP_DAU.1": 5,
"FDP_DAU.1.1": 1,
"FDP_DAU.1.2": 1,
"FDP_ETC.1": 15,
"FDP_ETC.1.1": 1,
"FDP_ETC.1.2": 1,
"FDP_IFC": 77,
"FDP_IFC.1": 11,
"FDP_IFC.2": 8,
"FDP_IFF": 62,
"FDP_IFF.1": 24,
"FDP_IFF.1.2": 4,
"FDP_ITC": 28,
"FDP_ITC.1": 27,
"FDP_ITC.1.1": 1,
"FDP_ITC.1.2": 1,
"FDP_ITC.1.3": 1,
"FDP_ITC.2": 17,
"FDP_RIP.1": 7,
"FDP_RIP.1.1": 1,
"FDP_SDI.2": 5,
"FDP_SDI.2.1": 1,
"FDP_SDI.2.2": 1,
"FDP_UIT.1": 13,
"FDP_UIT.1.1": 1,
"FDP_UIT.1.2": 1
},
"FIA": {
"FIA_AFL": 16,
"FIA_AFL.1": 4,
"FIA_ATD.1": 9,
"FIA_ATD.1.1": 1,
"FIA_SOS": 1,
"FIA_SOS.2": 8,
"FIA_SOS.2.1": 1,
"FIA_SOS.2.2": 1,
"FIA_UAU": 35,
"FIA_UAU.1": 8,
"FIA_UAU.3": 7,
"FIA_UAU.3.1": 1,
"FIA_UAU.3.2": 1,
"FIA_UAU.4": 9,
"FIA_UAU.4.1": 1,
"FIA_UAU.6": 1,
"FIA_UID": 24,
"FIA_UID.1": 10,
"FIA_USB.1": 7,
"FIA_USB.1.1": 1,
"FIA_USB.1.2": 1,
"FIA_USB.1.3": 1
},
"FMT": {
"FMT_MOF": 7,
"FMT_MOF.1": 1,
"FMT_MSA": 9,
"FMT_MSA.1": 3,
"FMT_MSA.2": 4,
"FMT_MSA.2.1": 1,
"FMT_MSA.3": 29,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD": 4,
"FMT_MTD.1": 1,
"FMT_SMF": 17,
"FMT_SMF.1": 5,
"FMT_SMR.1": 18,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPR": {
"FPR_UNO.1": 4,
"FPR_UNO.1.1": 1
},
"FPT": {
"FPT_RPL": 1,
"FPT_RPL.1": 4,
"FPT_RPL.1.1": 1,
"FPT_RPL.1.2": 1,
"FPT_STM.1": 3,
"FPT_TDC.1": 16,
"FPT_TDC.1.1": 1,
"FPT_TDC.1.2": 1,
"FPT_TST.1": 7,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FTP": {
"FTP_ITC.1": 10,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1,
"FTP_TRP.1": 3
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"Neslib": {
"NESLIB 3.0": 2
}
},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 4
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {
"javacard": {
"javacard.security": 1
}
},
"javacard_version": {
"GlobalPlatform": {
"GlobalPlatform 2.1.1": 1
}
},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 1
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS PUB 140-2": 1,
"FIPS PUB 180-3": 1,
"FIPS PUB 186-3": 1,
"FIPS PUB 197": 1,
"FIPS PUB 46-3": 1,
"FIPS PUB 81": 1
},
"ISO": {
"ISO/IEC 9796-1": 1,
"ISO/IEC 9797-1": 1
},
"PKCS": {
"PKCS 1": 1,
"PKCS#1": 2
},
"SCP": {
"SCP02": 1,
"SCP80": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 2
}
},
"DES": {
"3DES": {
"3DES": 4,
"TDES": 1
},
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Oberthur": {
"Oberthur": 8,
"Oberthur Technologies": 137
},
"STMicroelectronics": {
"STMicroelectronics": 4
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "chrisduc",
"/CreationDate": "D:20130807110801+02\u002700",
"/Creator": "PDFCreator Version 0.8.1",
"/ModDate": "D:20130807110801+02\u002700",
"/Producer": "AFPL Ghostscript 8.50",
"/Title": "FQR 110 6672 Ed1 - ST JUBA Lite",
"pdf_file_size_bytes": 1527189,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 131
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2013_65.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"AVA_VAN.5",
"EAL4+",
"ALC_DVS.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/FQR%20110%206672%20Ed1%20-%20ST%20JUBA%20%20Lite.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "2e4127e86969ec105569806f18118fd611c63f4a9d829a478df861e6318532d5",
"txt_hash": "263aaaa523c471afe1ec9b93ab6e8df0cc5691eb3025b7f40a5e155b026f155a"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "734f297c82adaa229149775ac66c2d92919abd255e282c447445e63b13334675",
"txt_hash": "a12c1c5b1fe4396131085d0e0176fe1d760a42bd8b7cf77af908e01c93df5723"
}
},
"status": "archived"
}