Application Mobile MasterCard PayPass V1 - M/Chip 4, version V01.00.04, sur plateforme NFC FlyBuy Platinum V2 sur composant ST33F1ME
CSV information ?
Status | archived |
---|---|
Valid from | 24.12.2013 |
Valid until | 01.09.2019 |
Scheme | 🇫🇷 FR |
Manufacturer | Oberthur Technologies / STMicroelectronics |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | AVA_VAN.5, ALC_DVS.2, EAL4+ |
Maintenance updates | ANSSI-CC-2013/65-M02 (23.05.2014) Certification report |
Rapport de maintenance ANSSI-CC-2013/65-M01 (09.04.2014) Certification report |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Symmetric Algorithms
DESHash functions
SHA1, SHA2Libraries
NesLib v3.0JavaCard versions
Java Card 3.0.1Vendor
STMicroelectronics, Oberthur TechnologiesSecurity level
EAL 4, EAL4, EAL7, EAL 1, EAL 3, EAL 5, EAL 7, EAL4+, ITSEC E6 ElevéSecurity Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSSProtection profiles
BSI-PP-0035-2007, ANSSI-CC-PP-2010/03, ANSSI-CC-PP-2010/04Certificates
ANSSI-CC-2013/65, ANSSI-CC-2012/39, ANSSI-CC-2011/07, ANSSI-CC-PP-2010/03, ANSSI-CC-PP-2010/04, ANSSI-CC-2011/07-S01Standards
CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004File metadata
Title | ANSSI-CC-2013/65 |
---|---|
Subject | Application Mobile MasterCard PayPass V1 - M/Chip 4, version V01.00.04, sur plateforme NFC FlyBuy Platinum V2 sur composant ST33F1ME |
Keywords | ANSSI-CC-CER-F-07.010 |
Author | Duquesnoy |
Creation date | D:20140129142922+01'00' |
Modification date | D:20140129142922+01'00' |
Pages | 21 |
Creator | Microsoft® Word 2010 |
Producer | Microsoft® Word 2010 |
Frontpage
Certificate ID | ANSSI-CC-2013/65 |
---|---|
Certified item | Carte Mobile MasterCard PayPass – M/Chip 4 sur plateforme NFC FlyBuy Platinum V2 sur composant ST33F1ME |
Certification lab | THALES (TCS – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France |
Developer | Oberthur Technologies 420, rue d’Estienne d’Orves, CS 40008, 92705 Colombes Cedex, France STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, B.P.2, 13106 Rousset, France Commanditaire Oberthur Technologies 420, rue d’Estienne d’Orves - CS 40008, 92705 Colombes Cedex, France |
Security target ?
Extracted keywords
Symmetric Algorithms
AES, DES, TDES, 3DESAsymmetric Algorithms
RSA 1024Hash functions
SHA-1Schemes
MACRandomness
RNGLibraries
NESLIB 3.0Block cipher modes
CBCJavaCard versions
GlobalPlatform 2.1.1Vendor
STMicroelectronics, Oberthur Technologies, OberthurSecurity level
EAL4+, EAL4, EAL 4, EAL4 augmentedClaims
O.TRANSACTION_UNIQUENESS, O.TRANSACTION_INTEGRITY, O.TRANSACTION_BYPASS, O.TRANSACTION_REPLAY, O.USER_AUTH, O.ISSUING_BANK_AUTH, O.MNO_AUTH, O.COMM_AUTH, O.AUTHORISATION_CONTROL, O.DATA_DISCLOSURE, O.DATA_INTEGRITY, O.DATA_USERS, O.RISK_MNGT, O.APP_BLOCK, O.SIM_UNLOCK, O.AUDIT, O.CHANNELS, O.AUDIT_ACCESS, O.GUIS_AUTH, O.TRANSACTION_UNIQUENES, O.TRANSACTION_UNIQUENE, O.AUTHORISATION_CONTR, O.COMM_INTEGRITY, O.TRANSACTION_UNIQUE, O.TRANSACTION_INTEGRI, O.TRANSACTION_INTEG, O.APP_BLOC, T.DISCLOSURE_KEYS, T.DISCLOSURE_REF_PC, T.INTEG_LOG_FILE, T.INTEG_KEYS, T.INTEG_ACCOUNT_INFO, T.INTEG_REF_PC, T.INTEG_TRANS_PARAM, T.INTEG_COUNT, T.TEMPORARY_DATA, T.INTEG_SEL_ACT_PARAM, T.STEALING, T.MERCHANT_ACCOMPLICE, T.MAN-IN-THE-MIDDLE, T.TRANSACTION_REPUDIATION, T.TRANSACTION_COUNTERFEITING, T.TRANSACTION_REPLAY, T.CERTIF_CORRUPTION, T.APPLICATIONS_DOS, T.MNO_USURPATION, T.ISSUING-BANK_USURPATION, T.CUSTOMER_USURPATION, T.ISSUING-, A.MERCHANT_AUTH, OE.CUSTOMER_PC_CONFID, OE.GUI_INST_ALERT, OE.TOE_USAGE, OE.GUIS_IDENTIFICATION, OE.POLICY, OE.NFC_PROTOCOL, OE.TRANSACTION_DISPLAY, OE.CHANNELS_SELECTION, OE.GUIS_TIMEOUT, OE.MERCHANT_CONTROL, OE.MERCHANT_AUTH, OE.LATENCY_CONTROL, OE.POS_APPROVAL, OE.POS_APPLICATIONS, OE.POS_DEACTIVATION, OE.CERTIFICATES_MNGT, OE.NO_VAD, OE.BANKS_PRIVILEGES, OE.GUIS_AUTH, OSP.POLICY, OSP.CUSTOMER_PC_CONFID, OSP.GUIS_IDENTIFICATION, OSP.CERTIFICATES_MNGT, OSP.TOE_USAGE, OSP.PISHING, OSP.MERCHANT_CONTROL, OSP.BANKS_PRIVILEGES, OSP.CUSTOMER_PC_CONFISecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ADV_FSP.1, ADV_TDS.1, ADV_FSP.2, ADV_TDS.2, AGD_PRE, AGD_OPE, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_TAT.1, ALC_CMC.4, ALC_CMS.1, ALC_DVS.1, ALC_LCD.1, ALC_CMS.4, ALC_DEL.1, ATE_DPT.1, ATE_COV.2, ATE_FUN.1, ATE_COV.1, ATE_IND.2, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1, ASE_REQ.2, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_ARP.1, FAU_ARP.1.1, FAU_SAA.1, FAU_SAA.1.1, FAU_SAA.1.2, FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_SAR, FAU_SAR.1, FCS_CKM, FCS_CKM.1, FCS_CKM.4, FCS_CKM.4.1, FCS_COP, FCS_COP.1, FCS_COP.1.1, FCS_CKM.2, FDP_ACC, FDP_ACC.2, FDP_ACF, FDP_ACF.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_IFC, FDP_IFC.2, FDP_IFF, FDP_IFF.1, FDP_IFF.1.2, FDP_SDI.2, FDP_SDI.2.1, FDP_SDI.2.2, FDP_RIP.1, FDP_RIP.1.1, FDP_DAU.1, FDP_DAU.1.1, FDP_DAU.1.2, FDP_ITC, FDP_ITC.2, FDP_ETC.1, FDP_ETC.1.1, FDP_ETC.1.2, FDP_ITC.1, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_UIT.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_ACC.1, FDP_IFC.1, FIA_AFL, FIA_AFL.1, FIA_ATD.1, FIA_ATD.1.1, FIA_UAU, FIA_UAU.1, FIA_UAU.3, FIA_UAU.3.1, FIA_UAU.3.2, FIA_UAU.4, FIA_UAU.4.1, FIA_UAU.6, FIA_UID, FIA_UID.1, FIA_USB.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_SOS.2, FIA_SOS.2.1, FIA_SOS.2.2, FIA_SOS, FMT_SMF, FMT_SMF.1, FMT_MOF, FMT_MOF.1, FMT_MTD, FMT_MTD.1, FMT_MSA, FMT_MSA.1, FMT_MSA.2, FMT_MSA.2.1, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FPR_UNO.1, FPR_UNO.1.1, FPT_TST.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_TDC.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_RPL.1, FPT_RPL.1.1, FPT_RPL.1.2, FPT_RPL, FPT_STM.1, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1Protection profiles
BSI-PP-0035, ANSSI-CC-PP 2010/04Certificates
ANSSI-CC-PP 2010/04, ANSSI-CC-2012/39, ANSSI-CC-2011/07, ANSSI-CC-2011/07-S01Standards
FIPS PUB 46-3, FIPS PUB 81, FIPS PUB 140-2, FIPS PUB 180-3, FIPS PUB 186-3, FIPS PUB 197, PKCS#1, PKCS 1, ISO/IEC 9796-1, ISO/IEC 9797-1, SCP02, SCP80File metadata
Title | FQR 110 6672 Ed1 - ST JUBA Lite |
---|---|
Author | chrisduc |
Creation date | D:20130807110801+02'00 |
Modification date | D:20130807110801+02'00 |
Pages | 131 |
Creator | PDFCreator Version 0.8.1 |
Producer | AFPL Ghostscript 8.50 |
Heuristics ?
Extracted SARs
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.5Similar certificates
References ?
No references are available for this certificate.
Updates ?
-
10.02.2025 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
05.02.2025 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'_type': 'sec_certs.sample.document_state.DocumentState'}
data. - The st property was updated, with the
{'_type': 'sec_certs.sample.document_state.DocumentState'}
data. - The cert property was updated, with the
{'_type': 'sec_certs.sample.document_state.DocumentState'}
data.
The computed heuristics were updated.
- The following values were inserted:
{'protection_profiles': None, 'eal': 'EAL4+'}
. - The prev_certificates property was set to
None
. - The next_certificates property was set to
None
. - The scheme_data property was set to
{'product': 'Application Mobile MasterCard PayPass V1 - M/Chip 4, version V01.00.04, sur plateforme NFC FlyBuy Platinum V2 sur composant ST33F1ME', 'url': 'https://cyber.gouv.fr/produits-certifies/application-mobile-mastercard-paypass-v1-mchip-4-version-v010004-sur-plateforme', 'description': 'Le produit certifé est la « Carte Mobile MasterCard PayPass – M/Chip 4 sur plateforme NFC FlyBuy Platinum V2 sur composant ST33F1ME » développée par Oberthur Technologies et STMicroelectronics. Ce produit est une carte (U)SIM destinée à être insérée dans un téléphone portable disposant de la technologie NFC2. Il embarque l'application Mobile PayPass v1.0 qui met en oeuvre la solution « Paye', 'sponsor': 'Oberthur Technologies', 'developer': 'Oberthur Technologies / Oberthur Technologies', 'cert_id': 'ANSSI-CC-2013/65', 'level': 'EAL4+', 'enhanced': {'cert_id': 'ANSSI-CC-2013/65', 'certification_date': '2013-12-24', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 3.1r3', 'developer': 'Oberthur Technologies / Oberthur Technologies', 'sponsor': 'Oberthur Technologies', 'evaluation_facility': 'THALES (TCS – CNES)', 'level': 'EAL4+', 'protection_profile': '', 'mutual_recognition': 'SOG-IS CCRA', 'augmented': 'ALC_DVS.2, AVA_VAN.5', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2013-65en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2013-65fr.pdf'}}
.
- The report property was updated, with the
-
03.02.2025 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
27.01.2025 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'Application Mobile MasterCard PayPass V1 - M/Chip 4, version V01.00.04, sur plateforme NFC FlyBuy Platinum V2 sur composant ST33F1ME', 'url': 'https://cyber.gouv.fr/produits-certifies/application-mobile-mastercard-paypass-v1-mchip-4-version-v010004-sur-plateforme', 'description': 'Le produit certifé est la « Carte Mobile MasterCard PayPass – M/Chip 4 sur plateforme NFC FlyBuy Platinum V2 sur composant ST33F1ME » développée par Oberthur Technologies et STMicroelectronics. Ce produit est une carte (U)SIM destinée à être insérée dans un téléphone portable disposant de la technologie NFC2. Il embarque l'application Mobile PayPass v1.0 qui met en oeuvre la solution « Paye', 'sponsor': 'Oberthur Technologies', 'developer': 'Oberthur Technologies / Oberthur Technologies', 'cert_id': 'ANSSI-CC-2013/65', 'level': 'EAL4+', 'enhanced': {'cert_id': 'ANSSI-CC-2013/65', 'certification_date': '2013-12-24', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 3.1r3', 'developer': 'Oberthur Technologies / Oberthur Technologies', 'sponsor': 'Oberthur Technologies', 'evaluation_facility': 'THALES (TCS – CNES)', 'level': 'EAL4+', 'protection_profile': '', 'mutual_recognition': 'SOG-IS CCRA', 'augmented': 'ALC_DVS.2, AVA_VAN.5', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2013-65en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2013-65fr.pdf'}}
.
- The scheme_data property was set to
-
06.01.2025 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
16.12.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'Application Mobile MasterCard PayPass V1 - M/Chip 4, version V01.00.04, sur plateforme NFC FlyBuy Platinum V2 sur composant ST33F1ME', 'url': 'https://cyber.gouv.fr/produits-certifies/application-mobile-mastercard-paypass-v1-mchip-4-version-v010004-sur-plateforme', 'description': 'Le produit certifé est la « Carte Mobile MasterCard PayPass – M/Chip 4 sur plateforme NFC FlyBuy Platinum V2 sur composant ST33F1ME » développée par Oberthur Technologies et STMicroelectronics. Ce produit est une carte (U)SIM destinée à être insérée dans un téléphone portable disposant de la technologie NFC2. Il embarque l'application Mobile PayPass v1.0 qui met en oeuvre la solution « Paye', 'sponsor': 'Oberthur Technologies', 'developer': 'Oberthur Technologies / Oberthur Technologies', 'cert_id': 'ANSSI-CC-2013/65', 'level': 'EAL4+', 'enhanced': {'cert_id': 'ANSSI-CC-2013/65', 'certification_date': '2013-12-24', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 3.1r3', 'developer': 'Oberthur Technologies / Oberthur Technologies', 'sponsor': 'Oberthur Technologies', 'evaluation_facility': 'THALES (TCS – CNES)', 'level': 'EAL4+', 'protection_profile': '', 'mutual_recognition': 'SOG-IS CCRA', 'augmented': 'ALC_DVS.2, AVA_VAN.5', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2013-65en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2013-65fr.pdf'}}
.
- The scheme_data property was set to
-
09.12.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
02.12.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC-2013_65.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/files/epfiles/FQR%20110%206672%20Ed1%20-%20ST%20JUBA%20%20Lite.pdf
.
The manufacturer_web was updated.
- The new value is
None
.
The Maintenance Updates of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': '2014-05-23', 'maintenance_title': 'ANSSI-CC-2013/65-M02', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC-2013_65_M02.pdf', 'maintenance_st_link': None}, {'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': '2014-04-09', 'maintenance_title': 'Rapport de maintenance ANSSI-CC-2013/65-M01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC-2013_65_M01.pdf', 'maintenance_st_link': None}]}
.
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data. - The report_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data.
- The new value is
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': [], 'next_certificates': []}
.
- The following values were inserted:
-
09.11.2024 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'cc_cert_id': {'__update__': {'FR': {'__insert__': {'ANSSI-CC-PP-2010/03': 1, 'ANSSI-CC-PP-2010/04': 1}}}}}
data. - The st_keywords property was updated, with the
{'cc_cert_id': {'__update__': {'FR': {'__insert__': {'ANSSI-CC-PP 2010/04': 1}}}}}
data.
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'description': 'Le produit certifé est la « Carte Mobile MasterCard PayPass – M/Chip 4 sur plateforme NFC FlyBuy Platinum V2 sur composant ST33F1ME » développée par Oberthur Technologies et STMicroelectronics. Ce produit est une carte (U)SIM destinée à être insérée dans un téléphone portable disposant de la technologie NFC2. Il embarque l'application Mobile PayPass v1.0 qui met en oeuvre la solution « Paye', 'cert_id': 'ANSSI-CC-2013/65', 'enhanced': {'__update__': {'cert_id': 'ANSSI-CC-2013/65', 'certification_date': '2013-12-24', 'mutual_recognition': 'SOG-IS CCRA'}}}
data.
- The report_keywords property was updated, with the
-
14.10.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'Application Mobile MasterCard PayPass V1 - M/Chip 4, version V01.00.04, sur plateforme NFC FlyBuy Platinum V2 sur composant ST33F1ME', 'url': 'https://cyber.gouv.fr/produits-certifies/application-mobile-mastercard-paypass-v1-mchip-4-version-v010004-sur-plateforme', 'description': 'Le produit certifé est la « Carte Mobile MasterCard PayPass – M/Chip 4 sur plateforme NFC FlyBuy Platinum V2 sur composant ST33F1ME » développée par Oberthur Technologies et STMicroelectronics.\n\nCe produit est une carte (U)SIM destinée à être insérée dans un téléphone portable disposant de la technologie NFC2. Il embarque l'application Mobile PayPass v1.0 qui met en oeuvre la solution « Paye', 'sponsor': 'Oberthur Technologies', 'developer': 'Oberthur Technologies / Oberthur Technologies', 'cert_id': '2013/65', 'level': 'EAL4+', 'enhanced': {'cert_id': '2013/65', 'certification_date': '24/12/2013', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 3.1r3', 'developer': 'Oberthur Technologies / Oberthur Technologies', 'sponsor': 'Oberthur Technologies', 'evaluation_facility': 'THALES (TCS – CNES)', 'level': 'EAL4+', 'protection_profile': '', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ALC_DVS.2, AVA_VAN.5', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2013-65en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2013-65fr.pdf'}}
.
- The scheme_data property was set to
-
02.09.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '2e4127e86969ec105569806f18118fd611c63f4a9d829a478df861e6318532d5', 'txt_hash': '263aaaa523c471afe1ec9b93ab6e8df0cc5691eb3025b7f40a5e155b026f155a'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '734f297c82adaa229149775ac66c2d92919abd255e282c447445e63b13334675', 'txt_hash': 'a12c1c5b1fe4396131085d0e0176fe1d760a42bd8b7cf77af908e01c93df5723'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 774691, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 21, '/Title': 'ANSSI-CC-2013/65', '/Author': 'Duquesnoy', '/Subject': 'Application Mobile MasterCard PayPass V1 - M/Chip 4, version V01.00.04, sur plateforme NFC FlyBuy Platinum V2 sur composant ST33F1ME', '/Keywords': 'ANSSI-CC-CER-F-07.010', '/Creator': 'Microsoft® Word 2010', '/CreationDate': "D:20140129142922+01'00'", '/ModDate': "D:20140129142922+01'00'", '/Producer': 'Microsoft® Word 2010', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['mailto:[email protected]', 'http://www.ssi.gouv.fr/']}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 1527189, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 131, '/Producer': 'AFPL Ghostscript 8.50', '/CreationDate': "D:20130807110801+02'00", '/ModDate': "D:20130807110801+02'00", '/Title': 'FQR 110 6672 Ed1 - ST JUBA Lite', '/Creator': 'PDFCreator Version 0.8.1', '/Author': 'chrisduc', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{'FR': {'match_rules': ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables'], 'cert_id': 'ANSSI-CC-2013/65', 'cert_item': 'Carte Mobile MasterCard PayPass – M/Chip 4 sur plateforme NFC FlyBuy Platinum V2 sur composant ST33F1ME', 'cert_item_version': 'MasterCard Mobile PayPass V1 – Version V01.00.04 Identification hardware 0768910, identification card Manager GOP Ref V1.8.v', 'ref_protection_profiles': 'néant', 'cc_version': 'Critères Communs version 3.1 révision 3', 'cc_security_level': 'EAL 4 augmenté ALC_DVS.2, AVA_VAN.5', 'developer': 'Oberthur Technologies 420, rue d’Estienne d’Orves, CS 40008, 92705 Colombes Cedex, France STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, B.P.2, 13106 Rousset, France Commanditaire Oberthur Technologies 420, rue d’Estienne d’Orves - CS 40008, 92705 Colombes Cedex, France', 'cert_lab': 'THALES (TCS – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France'}}
. - The report_keywords property was set to
{'cc_cert_id': {'FR': {'ANSSI-CC-2013/65': 22, 'ANSSI-CC-2012/39': 4, 'ANSSI-CC-2011/07': 1, 'ANSSI-CC-2011/07-S01': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0035-2007': 1}, 'ANSSI': {'ANSSI-CC-PP-2010/03': 1, 'ANSSI-CC-PP-2010/04': 1}}, 'cc_security_level': {'EAL': {'EAL 4': 1, 'EAL4': 4, 'EAL7': 1, 'EAL 1': 1, 'EAL 3': 1, 'EAL 5': 1, 'EAL 7': 1, 'EAL4+': 3}, 'ITSEC': {'ITSEC E6 Elevé': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE': 3, 'AGD_PRE': 2}, 'ALC': {'ALC_DVS.2': 3, 'ALC_FLR': 2, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.5': 3, 'AVA_VAN': 3}, 'ASE': {'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'STMicroelectronics': {'STMicroelectronics': 3}, 'Oberthur': {'Oberthur Technologies': 11}}, 'eval_facility': {}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA1': 2}, 'SHA2': {'SHA2': 2}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Neslib': {'NesLib v3.0': 1}}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2009-07-001': 1, 'CCMB-2009-07-002': 1, 'CCMB-2009-07-003': 1, 'CCMB-2009-07-004': 1}}, 'javacard_version': {'JavaCard': {'Java Card 3.0.1': 1}}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {'FR': {'ANSSI-CC-2012/39': 1, 'ANSSI-CC-2011/07': 1, 'ANSSI-CC-2011/07-S01': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0035': 1}, 'ANSSI': {'ANSSI-CC-PP 2010/04': 1}}, 'cc_security_level': {'EAL': {'EAL4+': 10, 'EAL4': 3, 'EAL 4': 1, 'EAL4 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 5, 'ADV_FSP.4': 9, 'ADV_IMP.1': 4, 'ADV_TDS.3': 8, 'ADV_FSP.1': 3, 'ADV_TDS.1': 2, 'ADV_FSP.2': 2, 'ADV_TDS.2': 1}, 'AGD': {'AGD_PRE': 1, 'AGD_OPE': 2, 'AGD_OPE.1': 5, 'AGD_PRE.1': 5}, 'ALC': {'ALC_DVS.2': 6, 'ALC_TAT.1': 3, 'ALC_CMC.4': 1, 'ALC_CMS.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 3, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_DPT.1': 2, 'ATE_COV.2': 3, 'ATE_FUN.1': 6, 'ATE_COV.1': 2, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.5': 5}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 4, 'ASE_INT.1': 5, 'ASE_REQ.1': 2, 'ASE_REQ.2': 2, 'ASE_OBJ.2': 3, 'ASE_SPD.1': 2, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 7, 'FAU_ARP.1.1': 1, 'FAU_SAA.1': 8, 'FAU_SAA.1.1': 1, 'FAU_SAA.1.2': 2, 'FAU_GEN.1': 11, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_SAR': 12, 'FAU_SAR.1': 4}, 'FCS': {'FCS_CKM': 9, 'FCS_CKM.1': 8, 'FCS_CKM.4': 20, 'FCS_CKM.4.1': 1, 'FCS_COP': 40, 'FCS_COP.1': 9, 'FCS_COP.1.1': 1, 'FCS_CKM.2': 1}, 'FDP': {'FDP_ACC': 149, 'FDP_ACC.2': 14, 'FDP_ACF': 133, 'FDP_ACF.1': 35, 'FDP_ACF.1.2': 7, 'FDP_ACF.1.3': 1, 'FDP_IFC': 77, 'FDP_IFC.2': 8, 'FDP_IFF': 62, 'FDP_IFF.1': 24, 'FDP_IFF.1.2': 4, 'FDP_SDI.2': 5, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_RIP.1': 7, 'FDP_RIP.1.1': 1, 'FDP_DAU.1': 5, 'FDP_DAU.1.1': 1, 'FDP_DAU.1.2': 1, 'FDP_ITC': 28, 'FDP_ITC.2': 17, 'FDP_ETC.1': 15, 'FDP_ETC.1.1': 1, 'FDP_ETC.1.2': 1, 'FDP_ITC.1': 27, 'FDP_ITC.1.1': 1, 'FDP_ITC.1.2': 1, 'FDP_ITC.1.3': 1, 'FDP_UIT.1': 13, 'FDP_UIT.1.1': 1, 'FDP_UIT.1.2': 1, 'FDP_ACC.1': 14, 'FDP_IFC.1': 11}, 'FIA': {'FIA_AFL': 16, 'FIA_AFL.1': 4, 'FIA_ATD.1': 9, 'FIA_ATD.1.1': 1, 'FIA_UAU': 35, 'FIA_UAU.1': 8, 'FIA_UAU.3': 7, 'FIA_UAU.3.1': 1, 'FIA_UAU.3.2': 1, 'FIA_UAU.4': 9, 'FIA_UAU.4.1': 1, 'FIA_UAU.6': 1, 'FIA_UID': 24, 'FIA_UID.1': 10, 'FIA_USB.1': 7, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_SOS.2': 8, 'FIA_SOS.2.1': 1, 'FIA_SOS.2.2': 1, 'FIA_SOS': 1}, 'FMT': {'FMT_SMF': 17, 'FMT_SMF.1': 5, 'FMT_MOF': 7, 'FMT_MOF.1': 1, 'FMT_MTD': 4, 'FMT_MTD.1': 1, 'FMT_MSA': 9, 'FMT_MSA.1': 3, 'FMT_MSA.2': 4, 'FMT_MSA.2.1': 1, 'FMT_MSA.3': 29, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_SMR.1': 18, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPR': {'FPR_UNO.1': 4, 'FPR_UNO.1.1': 1}, 'FPT': {'FPT_TST.1': 7, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_TDC.1': 16, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 1, 'FPT_RPL.1': 4, 'FPT_RPL.1.1': 1, 'FPT_RPL.1.2': 1, 'FPT_RPL': 1, 'FPT_STM.1': 3}, 'FTP': {'FTP_ITC.1': 10, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP.1': 3}}, 'cc_claims': {'O': {'O.TRANSACTION_UNIQUENESS': 33, 'O.TRANSACTION_INTEGRITY': 38, 'O.TRANSACTION_BYPASS': 53, 'O.TRANSACTION_REPLAY': 13, 'O.USER_AUTH': 55, 'O.ISSUING_BANK_AUTH': 54, 'O.MNO_AUTH': 8, 'O.COMM_AUTH': 5, 'O.AUTHORISATION_CONTROL': 19, 'O.DATA_DISCLOSURE': 44, 'O.DATA_INTEGRITY': 62, 'O.DATA_USERS': 10, 'O.RISK_MNGT': 10, 'O.APP_BLOCK': 13, 'O.SIM_UNLOCK': 10, 'O.AUDIT': 14, 'O.CHANNELS': 9, 'O.AUDIT_ACCESS': 10, 'O.GUIS_AUTH': 13, 'O.TRANSACTION_UNIQUENES': 2, 'O.TRANSACTION_UNIQUENE': 1, 'O.AUTHORISATION_CONTR': 1, 'O.COMM_INTEGRITY': 1, 'O.TRANSACTION_UNIQUE': 1, 'O.TRANSACTION_INTEGRI': 1, 'O.TRANSACTION_INTEG': 1, 'O.APP_BLOC': 1}, 'T': {'T.DISCLOSURE_KEYS': 6, 'T.DISCLOSURE_REF_PC': 6, 'T.INTEG_LOG_FILE': 5, 'T.INTEG_KEYS': 8, 'T.INTEG_ACCOUNT_INFO': 6, 'T.INTEG_REF_PC': 6, 'T.INTEG_TRANS_PARAM': 7, 'T.INTEG_COUNT': 7, 'T.TEMPORARY_DATA': 7, 'T.INTEG_SEL_ACT_PARAM': 6, 'T.STEALING': 9, 'T.MERCHANT_ACCOMPLICE': 9, 'T.MAN-IN-THE-MIDDLE': 12, 'T.TRANSACTION_REPUDIATION': 7, 'T.TRANSACTION_COUNTERFEITING': 13, 'T.TRANSACTION_REPLAY': 8, 'T.CERTIF_CORRUPTION': 5, 'T.APPLICATIONS_DOS': 7, 'T.MNO_USURPATION': 5, 'T.ISSUING-BANK_USURPATION': 3, 'T.CUSTOMER_USURPATION': 7, 'T.ISSUING-': 2}, 'A': {'A.MERCHANT_AUTH': 5}, 'OE': {'OE.CUSTOMER_PC_CONFID': 8, 'OE.GUI_INST_ALERT': 7, 'OE.TOE_USAGE': 9, 'OE.GUIS_IDENTIFICATION': 5, 'OE.POLICY': 5, 'OE.NFC_PROTOCOL': 5, 'OE.TRANSACTION_DISPLAY': 5, 'OE.CHANNELS_SELECTION': 4, 'OE.GUIS_TIMEOUT': 7, 'OE.MERCHANT_CONTROL': 7, 'OE.MERCHANT_AUTH': 8, 'OE.LATENCY_CONTROL': 5, 'OE.POS_APPROVAL': 7, 'OE.POS_APPLICATIONS': 10, 'OE.POS_DEACTIVATION': 6, 'OE.CERTIFICATES_MNGT': 11, 'OE.NO_VAD': 6, 'OE.BANKS_PRIVILEGES': 4, 'OE.GUIS_AUTH': 1}, 'OSP': {'OSP.POLICY': 4, 'OSP.CUSTOMER_PC_CONFID': 3, 'OSP.GUIS_IDENTIFICATION': 4, 'OSP.CERTIFICATES_MNGT': 4, 'OSP.TOE_USAGE': 4, 'OSP.PISHING': 4, 'OSP.MERCHANT_CONTROL': 6, 'OSP.BANKS_PRIVILEGES': 4, 'OSP.CUSTOMER_PC_CONFI': 1}}, 'vendor': {'STMicroelectronics': {'STMicroelectronics': 4}, 'Oberthur': {'Oberthur Technologies': 137, 'Oberthur': 8}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 2}}, 'DES': {'DES': {'DES': 1}, '3DES': {'TDES': 1, '3DES': 4}}}, 'asymmetric_crypto': {'RSA': {'RSA 1024': 1}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 4}}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 1}}, 'cipher_mode': {'CBC': {'CBC': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Neslib': {'NESLIB 3.0': 2}}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 46-3': 1, 'FIPS PUB 81': 1, 'FIPS PUB 140-2': 1, 'FIPS PUB 180-3': 1, 'FIPS PUB 186-3': 1, 'FIPS PUB 197': 1}, 'PKCS': {'PKCS#1': 2, 'PKCS 1': 1}, 'ISO': {'ISO/IEC 9796-1': 1, 'ISO/IEC 9797-1': 1}, 'SCP': {'SCP02': 1, 'SCP80': 1}}, 'javacard_version': {'GlobalPlatform': {'GlobalPlatform 2.1.1': 1}}, 'javacard_api_const': {}, 'javacard_packages': {'javacard': {'javacard.security': 1}}, 'certification_process': {}}
. - The report_filename property was set to
ANSSI-CC-2013_65.pdf
. - The st_filename property was set to
FQR 110 6672 Ed1 - ST JUBA Lite.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['THALES']
. - The cert_id property was set to
ANSSI-CC-2013/65
. - The st_references property was updated, with the
{'directly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2012/39', 'ANSSI-CC-2011/07']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2012/39', 'ANSSI-CC-2011/07']}}
data. - The report_references property was updated, with the
{'directly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2012/39', 'ANSSI-CC-2011/07']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2011/24', 'ANSSI-CC-2012/39', 'ANSSI-CC-2012/06', 'ANSSI-CC-2009/57', 'ANSSI-CC-2010/50', 'ANSSI-CC-2011/07', 'ANSSI-CC-2010/49', 'ANSSI-CC-2009/25']}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2013_65.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/FQR%20110%206672%20Ed1%20-%20ST%20JUBA%20%20Lite.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
. - The st_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data. - The report_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}]}
values discarded.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2012/39']}}, 'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2012/39']}}}
data. - The report_references property was updated, with the
{'directly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2012/39']}}, 'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2011/24', 'ANSSI-CC-2012/39', 'ANSSI-CC-2012/06', 'ANSSI-CC-2009/57', 'ANSSI-CC-2009/25']}}}
data. - The scheme_data property was set to
{'product': 'Application Mobile MasterCard PayPass V1 - M/Chip 4, version V01.00.04, sur plateforme NFC FlyBuy Platinum V2 sur composant ST33F1ME', 'url': 'https://cyber.gouv.fr/produits-certifies/application-mobile-mastercard-paypass-v1-mchip-4-version-v010004-sur-plateforme', 'description': 'Le produit certifé est la « Carte Mobile MasterCard PayPass – M/Chip 4 sur plateforme NFC FlyBuy Platinum V2 sur composant ST33F1ME » développée par Oberthur Technologies et STMicroelectronics.\n\nCe produit est une carte (U)SIM destinée à être insérée dans un téléphone portable disposant de la technologie NFC2. Il embarque l'application Mobile PayPass v1.0 qui met en oeuvre la solution « Paye', 'sponsor': 'Oberthur Technologies', 'developer': 'Oberthur Technologies / Oberthur Technologies', 'cert_id': '2013/65', 'level': 'EAL4+', 'enhanced': {'cert_id': '2013/65', 'certification_date': '24/12/2013', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 3.1r3', 'developer': 'Oberthur Technologies / Oberthur Technologies', 'sponsor': 'Oberthur Technologies', 'evaluation_facility': 'THALES (TCS – CNES)', 'level': 'EAL4+', 'protection_profile': '', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ALC_DVS.2, AVA_VAN.5', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2013-65en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2013-65fr.pdf'}}
.
- The st_references property was updated, with the
-
31.07.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Application Mobile MasterCard PayPass V1 - M/Chip 4, version V01.00.04, sur plateforme NFC FlyBuy Platinum V2 sur composant ST33F1ME was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "8843ddf8e55f6df6",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2013/65",
"cert_lab": [
"THALES"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL4+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"01.00.04"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2014-05-23",
"maintenance_report_link": "https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC-2013_65_M02.pdf",
"maintenance_st_link": null,
"maintenance_title": "ANSSI-CC-2013/65-M02"
},
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2014-04-09",
"maintenance_report_link": "https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC-2013_65_M01.pdf",
"maintenance_st_link": null,
"maintenance_title": "Rapport de maintenance ANSSI-CC-2013/65-M01"
}
]
},
"manufacturer": "Oberthur Technologies / STMicroelectronics",
"manufacturer_web": null,
"name": "Application Mobile MasterCard PayPass V1 - M/Chip 4, version V01.00.04, sur plateforme NFC FlyBuy Platinum V2 sur composant ST33F1ME",
"not_valid_after": "2019-09-01",
"not_valid_before": "2013-12-24",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "ANSSI-CC-2013_65.pdf",
"report_frontpage": {
"FR": {
"cc_security_level": "EAL 4 augment\u00e9 ALC_DVS.2, AVA_VAN.5",
"cc_version": "Crit\u00e8res Communs version 3.1 r\u00e9vision 3",
"cert_id": "ANSSI-CC-2013/65",
"cert_item": "Carte Mobile MasterCard PayPass \u2013 M/Chip 4 sur plateforme NFC FlyBuy Platinum V2 sur composant ST33F1ME",
"cert_item_version": "MasterCard Mobile PayPass V1 \u2013 Version V01.00.04 Identification hardware 0768910, identification card Manager GOP Ref V1.8.v",
"cert_lab": "THALES (TCS \u2013 CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France",
"developer": "Oberthur Technologies 420, rue d\u2019Estienne d\u2019Orves, CS 40008, 92705 Colombes Cedex, France STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, B.P.2, 13106 Rousset, France Commanditaire Oberthur Technologies 420, rue d\u2019Estienne d\u2019Orves - CS 40008, 92705 Colombes Cedex, France",
"match_rules": [
"R\u00e9f\u00e9rence du rapport de certification(.+)Nom du produit(.+)R\u00e9f\u00e9rence/version du produit(.*)Conformit\u00e9 \u00e0 un profil de protection(.+)Crit\u00e8res d\u2019\u00e9valuation et version(.+)Niveau d\u2019\u00e9valuation(.+)D\u00e9veloppeurs(.+)Centre d\u2019\u00e9valuation(.+)Accords de reconnaissance applicables"
],
"ref_protection_profiles": "n\u00e9ant"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2011/07": 1,
"ANSSI-CC-2011/07-S01": 1,
"ANSSI-CC-2012/39": 4,
"ANSSI-CC-2013/65": 22,
"ANSSI-CC-PP-2010/03": 1,
"ANSSI-CC-PP-2010/04": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"ANSSI": {
"ANSSI-CC-PP-2010/03": 1,
"ANSSI-CC-PP-2010/04": 1
},
"BSI": {
"BSI-PP-0035-2007": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_FSP": 1,
"ADV_IMP": 1,
"ADV_INT": 1,
"ADV_SPM": 1,
"ADV_TDS": 1
},
"AGD": {
"AGD_OPE": 3,
"AGD_PRE": 2
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMS": 1,
"ALC_DEL": 1,
"ALC_DVS": 1,
"ALC_DVS.2": 3,
"ALC_FLR": 2,
"ALC_TAT": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_ECD": 1,
"ASE_INT": 1,
"ASE_OBJ": 1,
"ASE_REQ": 1,
"ASE_SPD": 1,
"ASE_TSS": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_DPT": 1,
"ATE_FUN": 1,
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 3,
"AVA_VAN.5": 3
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 3": 1,
"EAL 4": 1,
"EAL 5": 1,
"EAL 7": 1,
"EAL4": 4,
"EAL4+": 3,
"EAL7": 1
},
"ITSEC": {
"ITSEC E6 Elev\u00e9": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"Neslib": {
"NesLib v3.0": 1
}
},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA1": 2
},
"SHA2": {
"SHA2": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {
"JavaCard": {
"Java Card 3.0.1": 1
}
},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2009-07-001": 1,
"CCMB-2009-07-002": 1,
"CCMB-2009-07-003": 1,
"CCMB-2009-07-004": 1
}
},
"symmetric_crypto": {
"DES": {
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Oberthur": {
"Oberthur Technologies": 11
},
"STMicroelectronics": {
"STMicroelectronics": 3
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Duquesnoy",
"/CreationDate": "D:20140129142922+01\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2010",
"/Keywords": "ANSSI-CC-CER-F-07.010",
"/ModDate": "D:20140129142922+01\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2010",
"/Subject": "Application Mobile MasterCard PayPass V1 - M/Chip 4, version V01.00.04, sur plateforme NFC FlyBuy Platinum V2 sur composant ST33F1ME",
"/Title": "ANSSI-CC-2013/65",
"pdf_file_size_bytes": 774691,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.ssi.gouv.fr/",
"mailto:[email protected]"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 21
},
"st_filename": "FQR 110 6672 Ed1 - ST JUBA Lite.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"RSA": {
"RSA 1024": 1
}
},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2011/07": 1,
"ANSSI-CC-2011/07-S01": 1,
"ANSSI-CC-2012/39": 1,
"ANSSI-CC-PP 2010/04": 1
}
},
"cc_claims": {
"A": {
"A.MERCHANT_AUTH": 5
},
"O": {
"O.APP_BLOC": 1,
"O.APP_BLOCK": 13,
"O.AUDIT": 14,
"O.AUDIT_ACCESS": 10,
"O.AUTHORISATION_CONTR": 1,
"O.AUTHORISATION_CONTROL": 19,
"O.CHANNELS": 9,
"O.COMM_AUTH": 5,
"O.COMM_INTEGRITY": 1,
"O.DATA_DISCLOSURE": 44,
"O.DATA_INTEGRITY": 62,
"O.DATA_USERS": 10,
"O.GUIS_AUTH": 13,
"O.ISSUING_BANK_AUTH": 54,
"O.MNO_AUTH": 8,
"O.RISK_MNGT": 10,
"O.SIM_UNLOCK": 10,
"O.TRANSACTION_BYPASS": 53,
"O.TRANSACTION_INTEG": 1,
"O.TRANSACTION_INTEGRI": 1,
"O.TRANSACTION_INTEGRITY": 38,
"O.TRANSACTION_REPLAY": 13,
"O.TRANSACTION_UNIQUE": 1,
"O.TRANSACTION_UNIQUENE": 1,
"O.TRANSACTION_UNIQUENES": 2,
"O.TRANSACTION_UNIQUENESS": 33,
"O.USER_AUTH": 55
},
"OE": {
"OE.BANKS_PRIVILEGES": 4,
"OE.CERTIFICATES_MNGT": 11,
"OE.CHANNELS_SELECTION": 4,
"OE.CUSTOMER_PC_CONFID": 8,
"OE.GUIS_AUTH": 1,
"OE.GUIS_IDENTIFICATION": 5,
"OE.GUIS_TIMEOUT": 7,
"OE.GUI_INST_ALERT": 7,
"OE.LATENCY_CONTROL": 5,
"OE.MERCHANT_AUTH": 8,
"OE.MERCHANT_CONTROL": 7,
"OE.NFC_PROTOCOL": 5,
"OE.NO_VAD": 6,
"OE.POLICY": 5,
"OE.POS_APPLICATIONS": 10,
"OE.POS_APPROVAL": 7,
"OE.POS_DEACTIVATION": 6,
"OE.TOE_USAGE": 9,
"OE.TRANSACTION_DISPLAY": 5
},
"OSP": {
"OSP.BANKS_PRIVILEGES": 4,
"OSP.CERTIFICATES_MNGT": 4,
"OSP.CUSTOMER_PC_CONFI": 1,
"OSP.CUSTOMER_PC_CONFID": 3,
"OSP.GUIS_IDENTIFICATION": 4,
"OSP.MERCHANT_CONTROL": 6,
"OSP.PISHING": 4,
"OSP.POLICY": 4,
"OSP.TOE_USAGE": 4
},
"T": {
"T.APPLICATIONS_DOS": 7,
"T.CERTIF_CORRUPTION": 5,
"T.CUSTOMER_USURPATION": 7,
"T.DISCLOSURE_KEYS": 6,
"T.DISCLOSURE_REF_PC": 6,
"T.INTEG_ACCOUNT_INFO": 6,
"T.INTEG_COUNT": 7,
"T.INTEG_KEYS": 8,
"T.INTEG_LOG_FILE": 5,
"T.INTEG_REF_PC": 6,
"T.INTEG_SEL_ACT_PARAM": 6,
"T.INTEG_TRANS_PARAM": 7,
"T.ISSUING-": 2,
"T.ISSUING-BANK_USURPATION": 3,
"T.MAN-IN-THE-MIDDLE": 12,
"T.MERCHANT_ACCOMPLICE": 9,
"T.MNO_USURPATION": 5,
"T.STEALING": 9,
"T.TEMPORARY_DATA": 7,
"T.TRANSACTION_COUNTERFEITING": 13,
"T.TRANSACTION_REPLAY": 8,
"T.TRANSACTION_REPUDIATION": 7
}
},
"cc_protection_profile_id": {
"ANSSI": {
"ANSSI-CC-PP 2010/04": 1
},
"BSI": {
"BSI-PP-0035": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 5,
"ADV_FSP.1": 3,
"ADV_FSP.2": 2,
"ADV_FSP.4": 9,
"ADV_IMP.1": 4,
"ADV_TDS.1": 2,
"ADV_TDS.2": 1,
"ADV_TDS.3": 8
},
"AGD": {
"AGD_OPE": 2,
"AGD_OPE.1": 5,
"AGD_PRE": 1,
"AGD_PRE.1": 5
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.1": 1,
"ALC_CMS.4": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_DVS.2": 6,
"ALC_LCD.1": 3,
"ALC_TAT.1": 3
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 4,
"ASE_INT.1": 5,
"ASE_OBJ.2": 3,
"ASE_REQ.1": 2,
"ASE_REQ.2": 2,
"ASE_SPD.1": 2,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.1": 2,
"ATE_COV.2": 3,
"ATE_DPT.1": 2,
"ATE_FUN.1": 6,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.5": 5
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 1,
"EAL4": 3,
"EAL4 augmented": 2,
"EAL4+": 10
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP.1": 7,
"FAU_ARP.1.1": 1,
"FAU_GEN.1": 11,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_SAA.1": 8,
"FAU_SAA.1.1": 1,
"FAU_SAA.1.2": 2,
"FAU_SAR": 12,
"FAU_SAR.1": 4
},
"FCS": {
"FCS_CKM": 9,
"FCS_CKM.1": 8,
"FCS_CKM.2": 1,
"FCS_CKM.4": 20,
"FCS_CKM.4.1": 1,
"FCS_COP": 40,
"FCS_COP.1": 9,
"FCS_COP.1.1": 1
},
"FDP": {
"FDP_ACC": 149,
"FDP_ACC.1": 14,
"FDP_ACC.2": 14,
"FDP_ACF": 133,
"FDP_ACF.1": 35,
"FDP_ACF.1.2": 7,
"FDP_ACF.1.3": 1,
"FDP_DAU.1": 5,
"FDP_DAU.1.1": 1,
"FDP_DAU.1.2": 1,
"FDP_ETC.1": 15,
"FDP_ETC.1.1": 1,
"FDP_ETC.1.2": 1,
"FDP_IFC": 77,
"FDP_IFC.1": 11,
"FDP_IFC.2": 8,
"FDP_IFF": 62,
"FDP_IFF.1": 24,
"FDP_IFF.1.2": 4,
"FDP_ITC": 28,
"FDP_ITC.1": 27,
"FDP_ITC.1.1": 1,
"FDP_ITC.1.2": 1,
"FDP_ITC.1.3": 1,
"FDP_ITC.2": 17,
"FDP_RIP.1": 7,
"FDP_RIP.1.1": 1,
"FDP_SDI.2": 5,
"FDP_SDI.2.1": 1,
"FDP_SDI.2.2": 1,
"FDP_UIT.1": 13,
"FDP_UIT.1.1": 1,
"FDP_UIT.1.2": 1
},
"FIA": {
"FIA_AFL": 16,
"FIA_AFL.1": 4,
"FIA_ATD.1": 9,
"FIA_ATD.1.1": 1,
"FIA_SOS": 1,
"FIA_SOS.2": 8,
"FIA_SOS.2.1": 1,
"FIA_SOS.2.2": 1,
"FIA_UAU": 35,
"FIA_UAU.1": 8,
"FIA_UAU.3": 7,
"FIA_UAU.3.1": 1,
"FIA_UAU.3.2": 1,
"FIA_UAU.4": 9,
"FIA_UAU.4.1": 1,
"FIA_UAU.6": 1,
"FIA_UID": 24,
"FIA_UID.1": 10,
"FIA_USB.1": 7,
"FIA_USB.1.1": 1,
"FIA_USB.1.2": 1,
"FIA_USB.1.3": 1
},
"FMT": {
"FMT_MOF": 7,
"FMT_MOF.1": 1,
"FMT_MSA": 9,
"FMT_MSA.1": 3,
"FMT_MSA.2": 4,
"FMT_MSA.2.1": 1,
"FMT_MSA.3": 29,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD": 4,
"FMT_MTD.1": 1,
"FMT_SMF": 17,
"FMT_SMF.1": 5,
"FMT_SMR.1": 18,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPR": {
"FPR_UNO.1": 4,
"FPR_UNO.1.1": 1
},
"FPT": {
"FPT_RPL": 1,
"FPT_RPL.1": 4,
"FPT_RPL.1.1": 1,
"FPT_RPL.1.2": 1,
"FPT_STM.1": 3,
"FPT_TDC.1": 16,
"FPT_TDC.1.1": 1,
"FPT_TDC.1.2": 1,
"FPT_TST.1": 7,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FTP": {
"FTP_ITC.1": 10,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1,
"FTP_TRP.1": 3
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"Neslib": {
"NESLIB 3.0": 2
}
},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 4
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {
"javacard": {
"javacard.security": 1
}
},
"javacard_version": {
"GlobalPlatform": {
"GlobalPlatform 2.1.1": 1
}
},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 1
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS PUB 140-2": 1,
"FIPS PUB 180-3": 1,
"FIPS PUB 186-3": 1,
"FIPS PUB 197": 1,
"FIPS PUB 46-3": 1,
"FIPS PUB 81": 1
},
"ISO": {
"ISO/IEC 9796-1": 1,
"ISO/IEC 9797-1": 1
},
"PKCS": {
"PKCS 1": 1,
"PKCS#1": 2
},
"SCP": {
"SCP02": 1,
"SCP80": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 2
}
},
"DES": {
"3DES": {
"3DES": 4,
"TDES": 1
},
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Oberthur": {
"Oberthur": 8,
"Oberthur Technologies": 137
},
"STMicroelectronics": {
"STMicroelectronics": 4
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "chrisduc",
"/CreationDate": "D:20130807110801+02\u002700",
"/Creator": "PDFCreator Version 0.8.1",
"/ModDate": "D:20130807110801+02\u002700",
"/Producer": "AFPL Ghostscript 8.50",
"/Title": "FQR 110 6672 Ed1 - ST JUBA Lite",
"pdf_file_size_bytes": 1527189,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 131
}
},
"protection_profile_links": null,
"report_link": "https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC-2013_65.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"ALC_DVS.2",
"EAL4+",
"AVA_VAN.5"
]
},
"st_link": "https://www.commoncriteriaportal.org/files/epfiles/FQR%20110%206672%20Ed1%20-%20ST%20JUBA%20%20Lite.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "2e4127e86969ec105569806f18118fd611c63f4a9d829a478df861e6318532d5",
"txt_hash": "263aaaa523c471afe1ec9b93ab6e8df0cc5691eb3025b7f40a5e155b026f155a"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "734f297c82adaa229149775ac66c2d92919abd255e282c447445e63b13334675",
"txt_hash": "a12c1c5b1fe4396131085d0e0176fe1d760a42bd8b7cf77af908e01c93df5723"
}
},
"status": "archived"
}