This page was not yet optimized for use on mobile
devices.
Application Mobile MasterCard PayPass V1 - M/Chip 4, version V01.00.04, sur plateforme NFC FlyBuy Platinum V2 sur composant ST33F1ME
CSV information
| Status | archived |
|---|---|
| Valid from | 24.12.2013 |
| Valid until | 01.09.2019 |
| Scheme | 🇫🇷 FR |
| Manufacturer | Oberthur Technologies / STMicroelectronics |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | EAL4+, AVA_VAN.5, ALC_DVS.2 |
| Maintenance updates | ANSSI-CC-2013/65-M02 (23.05.2014) Certification report |
| Rapport de maintenance ANSSI-CC-2013/65-M01 (09.04.2014) Certification report |
Heuristics summary
Certificate ID: ANSSI-CC-2013/65
Certificate
certificate could not be downloaded, no link is available.
Certification report
Extracted keywords
Symmetric Algorithms
DESHash functions
SHA1, SHA2Libraries
NesLib v3.0JavaCard versions
Java Card 3.0.1Vendor
STMicroelectronics, Oberthur TechnologiesSecurity level
EAL 4, EAL4, EAL7, EAL 1, EAL 3, EAL 5, EAL 7, EAL4+, ITSEC E6 ElevéSecurity Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSSProtection profiles
BSI-PP-0035-2007, ANSSI-CC-PP-2010/03, ANSSI-CC-PP-2010/04Certificates
ANSSI-CC-2013/65, ANSSI-CC-2012/39, ANSSI-CC-2011/07, ANSSI-CC-PP-2010/03, ANSSI-CC-PP-2010/04, ANSSI-CC-2011/07-S01Standards
CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004File metadata
| Title | ANSSI-CC-2013/65 |
|---|---|
| Subject | Application Mobile MasterCard PayPass V1 - M/Chip 4, version V01.00.04, sur plateforme NFC FlyBuy Platinum V2 sur composant ST33F1ME |
| Keywords | ANSSI-CC-CER-F-07.010 |
| Author | Duquesnoy |
| Creation date | D:20140129142922+01'00' |
| Modification date | D:20140129142922+01'00' |
| Pages | 21 |
| Creator | Microsoft® Word 2010 |
| Producer | Microsoft® Word 2010 |
Frontpage
| Certificate ID | ANSSI-CC-2013/65 |
|---|---|
| Certified item | Carte Mobile MasterCard PayPass – M/Chip 4 sur plateforme NFC FlyBuy Platinum V2 sur composant ST33F1ME |
| Certification lab | THALES (TCS – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France |
| Developer | Oberthur Technologies 420, rue d’Estienne d’Orves, CS 40008, 92705 Colombes Cedex, France STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, B.P.2, 13106 Rousset, France Commanditaire Oberthur Technologies 420, rue d’Estienne d’Orves - CS 40008, 92705 Colombes Cedex, France |
Security target
Extracted keywords
Symmetric Algorithms
AES, DES, TDES, 3DESAsymmetric Algorithms
RSA 1024Hash functions
SHA-1Schemes
MACRandomness
RNGLibraries
NESLIB 3.0Block cipher modes
CBCJavaCard versions
GlobalPlatform 2.1.1Vendor
STMicroelectronics, Oberthur Technologies, OberthurSecurity level
EAL4+, EAL4, EAL 4, EAL4 augmentedClaims
O.TRANSACTION_UNIQUENESS, O.TRANSACTION_INTEGRITY, O.TRANSACTION_BYPASS, O.TRANSACTION_REPLAY, O.USER_AUTH, O.ISSUING_BANK_AUTH, O.MNO_AUTH, O.COMM_AUTH, O.AUTHORISATION_CONTROL, O.DATA_DISCLOSURE, O.DATA_INTEGRITY, O.DATA_USERS, O.RISK_MNGT, O.APP_BLOCK, O.SIM_UNLOCK, O.AUDIT, O.CHANNELS, O.AUDIT_ACCESS, O.GUIS_AUTH, O.TRANSACTION_UNIQUENES, O.TRANSACTION_UNIQUENE, O.AUTHORISATION_CONTR, O.COMM_INTEGRITY, O.TRANSACTION_UNIQUE, O.TRANSACTION_INTEGRI, O.TRANSACTION_INTEG, O.APP_BLOC, T.DISCLOSURE_KEYS, T.DISCLOSURE_REF_PC, T.INTEG_LOG_FILE, T.INTEG_KEYS, T.INTEG_ACCOUNT_INFO, T.INTEG_REF_PC, T.INTEG_TRANS_PARAM, T.INTEG_COUNT, T.TEMPORARY_DATA, T.INTEG_SEL_ACT_PARAM, T.STEALING, T.MERCHANT_ACCOMPLICE, T.MAN-IN-THE-MIDDLE, T.TRANSACTION_REPUDIATION, T.TRANSACTION_COUNTERFEITING, T.TRANSACTION_REPLAY, T.CERTIF_CORRUPTION, T.APPLICATIONS_DOS, T.MNO_USURPATION, T.ISSUING-BANK_USURPATION, T.CUSTOMER_USURPATION, T.ISSUING-, A.MERCHANT_AUTH, OE.CUSTOMER_PC_CONFID, OE.GUI_INST_ALERT, OE.TOE_USAGE, OE.GUIS_IDENTIFICATION, OE.POLICY, OE.NFC_PROTOCOL, OE.TRANSACTION_DISPLAY, OE.CHANNELS_SELECTION, OE.GUIS_TIMEOUT, OE.MERCHANT_CONTROL, OE.MERCHANT_AUTH, OE.LATENCY_CONTROL, OE.POS_APPROVAL, OE.POS_APPLICATIONS, OE.POS_DEACTIVATION, OE.CERTIFICATES_MNGT, OE.NO_VAD, OE.BANKS_PRIVILEGES, OE.GUIS_AUTH, OSP.POLICY, OSP.CUSTOMER_PC_CONFID, OSP.GUIS_IDENTIFICATION, OSP.CERTIFICATES_MNGT, OSP.TOE_USAGE, OSP.PISHING, OSP.MERCHANT_CONTROL, OSP.BANKS_PRIVILEGES, OSP.CUSTOMER_PC_CONFISecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ADV_FSP.1, ADV_TDS.1, ADV_FSP.2, ADV_TDS.2, AGD_PRE, AGD_OPE, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_TAT.1, ALC_CMC.4, ALC_CMS.1, ALC_DVS.1, ALC_LCD.1, ALC_CMS.4, ALC_DEL.1, ATE_DPT.1, ATE_COV.2, ATE_FUN.1, ATE_COV.1, ATE_IND.2, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1, ASE_REQ.2, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_ARP.1, FAU_ARP.1.1, FAU_SAA.1, FAU_SAA.1.1, FAU_SAA.1.2, FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_SAR, FAU_SAR.1, FCS_CKM, FCS_CKM.1, FCS_CKM.4, FCS_CKM.4.1, FCS_COP, FCS_COP.1, FCS_COP.1.1, FCS_CKM.2, FDP_ACC, FDP_ACC.2, FDP_ACF, FDP_ACF.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_IFC, FDP_IFC.2, FDP_IFF, FDP_IFF.1, FDP_IFF.1.2, FDP_SDI.2, FDP_SDI.2.1, FDP_SDI.2.2, FDP_RIP.1, FDP_RIP.1.1, FDP_DAU.1, FDP_DAU.1.1, FDP_DAU.1.2, FDP_ITC, FDP_ITC.2, FDP_ETC.1, FDP_ETC.1.1, FDP_ETC.1.2, FDP_ITC.1, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_UIT.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_ACC.1, FDP_IFC.1, FIA_AFL, FIA_AFL.1, FIA_ATD.1, FIA_ATD.1.1, FIA_UAU, FIA_UAU.1, FIA_UAU.3, FIA_UAU.3.1, FIA_UAU.3.2, FIA_UAU.4, FIA_UAU.4.1, FIA_UAU.6, FIA_UID, FIA_UID.1, FIA_USB.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_SOS.2, FIA_SOS.2.1, FIA_SOS.2.2, FIA_SOS, FMT_SMF, FMT_SMF.1, FMT_MOF, FMT_MOF.1, FMT_MTD, FMT_MTD.1, FMT_MSA, FMT_MSA.1, FMT_MSA.2, FMT_MSA.2.1, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FPR_UNO.1, FPR_UNO.1.1, FPT_TST.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_TDC.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_RPL.1, FPT_RPL.1.1, FPT_RPL.1.2, FPT_RPL, FPT_STM.1, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1Protection profiles
BSI-PP-0035, ANSSI-CC-PP 2010/04Certificates
ANSSI-CC-PP 2010/04, ANSSI-CC-2012/39, ANSSI-CC-2011/07, ANSSI-CC-2011/07-S01Standards
FIPS PUB 46-3, FIPS PUB 81, FIPS PUB 140-2, FIPS PUB 180-3, FIPS PUB 186-3, FIPS PUB 197, PKCS#1, PKCS 1, ISO/IEC 9796-1, ISO/IEC 9797-1, SCP02, SCP80File metadata
| Title | FQR 110 6672 Ed1 - ST JUBA Lite |
|---|---|
| Author | chrisduc |
| Creation date | D:20130807110801+02'00 |
| Modification date | D:20130807110801+02'00 |
| Pages | 131 |
| Creator | PDFCreator Version 0.8.1 |
| Producer | AFPL Ghostscript 8.50 |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
ANSSI-CC-2013/65Extracted SARs
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.5Similar certificates
Showing 5 out of 6.
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "8843ddf8e55f6df6",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2013/65",
"cert_lab": [
"THALES"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL4+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"01.00.04"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2014-05-23",
"maintenance_report_link": "https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC-2013_65_M02.pdf",
"maintenance_st_link": null,
"maintenance_title": "ANSSI-CC-2013/65-M02"
},
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2014-04-09",
"maintenance_report_link": "https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC-2013_65_M01.pdf",
"maintenance_st_link": null,
"maintenance_title": "Rapport de maintenance ANSSI-CC-2013/65-M01"
}
]
},
"manufacturer": "Oberthur Technologies / STMicroelectronics",
"manufacturer_web": null,
"name": "Application Mobile MasterCard PayPass V1 - M/Chip 4, version V01.00.04, sur plateforme NFC FlyBuy Platinum V2 sur composant ST33F1ME",
"not_valid_after": "2019-09-01",
"not_valid_before": "2013-12-24",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "ANSSI-CC-2013_65.pdf",
"report_frontpage": {
"FR": {
"cc_security_level": "EAL 4 augment\u00e9 ALC_DVS.2, AVA_VAN.5",
"cc_version": "Crit\u00e8res Communs version 3.1 r\u00e9vision 3",
"cert_id": "ANSSI-CC-2013/65",
"cert_item": "Carte Mobile MasterCard PayPass \u2013 M/Chip 4 sur plateforme NFC FlyBuy Platinum V2 sur composant ST33F1ME",
"cert_item_version": "MasterCard Mobile PayPass V1 \u2013 Version V01.00.04 Identification hardware 0768910, identification card Manager GOP Ref V1.8.v",
"cert_lab": "THALES (TCS \u2013 CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France",
"developer": "Oberthur Technologies 420, rue d\u2019Estienne d\u2019Orves, CS 40008, 92705 Colombes Cedex, France STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, B.P.2, 13106 Rousset, France Commanditaire Oberthur Technologies 420, rue d\u2019Estienne d\u2019Orves - CS 40008, 92705 Colombes Cedex, France",
"match_rules": [
"R\u00e9f\u00e9rence du rapport de certification(.+)Nom du produit(.+)R\u00e9f\u00e9rence/version du produit(.*)Conformit\u00e9 \u00e0 un profil de protection(.+)Crit\u00e8res d\u2019\u00e9valuation et version(.+)Niveau d\u2019\u00e9valuation(.+)D\u00e9veloppeurs(.+)Centre d\u2019\u00e9valuation(.+)Accords de reconnaissance applicables"
],
"ref_protection_profiles": "n\u00e9ant"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2011/07": 1,
"ANSSI-CC-2011/07-S01": 1,
"ANSSI-CC-2012/39": 4,
"ANSSI-CC-2013/65": 22,
"ANSSI-CC-PP-2010/03": 1,
"ANSSI-CC-PP-2010/04": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"ANSSI": {
"ANSSI-CC-PP-2010/03": 1,
"ANSSI-CC-PP-2010/04": 1
},
"BSI": {
"BSI-PP-0035-2007": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_FSP": 1,
"ADV_IMP": 1,
"ADV_INT": 1,
"ADV_SPM": 1,
"ADV_TDS": 1
},
"AGD": {
"AGD_OPE": 3,
"AGD_PRE": 2
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMS": 1,
"ALC_DEL": 1,
"ALC_DVS": 1,
"ALC_DVS.2": 3,
"ALC_FLR": 2,
"ALC_TAT": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_ECD": 1,
"ASE_INT": 1,
"ASE_OBJ": 1,
"ASE_REQ": 1,
"ASE_SPD": 1,
"ASE_TSS": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_DPT": 1,
"ATE_FUN": 1,
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 3,
"AVA_VAN.5": 3
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 3": 1,
"EAL 4": 1,
"EAL 5": 1,
"EAL 7": 1,
"EAL4": 4,
"EAL4+": 3,
"EAL7": 1
},
"ITSEC": {
"ITSEC E6 Elev\u00e9": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"Neslib": {
"NesLib v3.0": 1
}
},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA1": 2
},
"SHA2": {
"SHA2": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {
"JavaCard": {
"Java Card 3.0.1": 1
}
},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2009-07-001": 1,
"CCMB-2009-07-002": 1,
"CCMB-2009-07-003": 1,
"CCMB-2009-07-004": 1
}
},
"symmetric_crypto": {
"DES": {
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Oberthur": {
"Oberthur Technologies": 11
},
"STMicroelectronics": {
"STMicroelectronics": 3
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Duquesnoy",
"/CreationDate": "D:20140129142922+01\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2010",
"/Keywords": "ANSSI-CC-CER-F-07.010",
"/ModDate": "D:20140129142922+01\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2010",
"/Subject": "Application Mobile MasterCard PayPass V1 - M/Chip 4, version V01.00.04, sur plateforme NFC FlyBuy Platinum V2 sur composant ST33F1ME",
"/Title": "ANSSI-CC-2013/65",
"pdf_file_size_bytes": 774691,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"mailto:[email protected]",
"http://www.ssi.gouv.fr/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 21
},
"st_filename": "FQR 110 6672 Ed1 - ST JUBA Lite.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"RSA": {
"RSA 1024": 1
}
},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2011/07": 1,
"ANSSI-CC-2011/07-S01": 1,
"ANSSI-CC-2012/39": 1,
"ANSSI-CC-PP 2010/04": 1
}
},
"cc_claims": {
"A": {
"A.MERCHANT_AUTH": 5
},
"O": {
"O.APP_BLOC": 1,
"O.APP_BLOCK": 13,
"O.AUDIT": 14,
"O.AUDIT_ACCESS": 10,
"O.AUTHORISATION_CONTR": 1,
"O.AUTHORISATION_CONTROL": 19,
"O.CHANNELS": 9,
"O.COMM_AUTH": 5,
"O.COMM_INTEGRITY": 1,
"O.DATA_DISCLOSURE": 44,
"O.DATA_INTEGRITY": 62,
"O.DATA_USERS": 10,
"O.GUIS_AUTH": 13,
"O.ISSUING_BANK_AUTH": 54,
"O.MNO_AUTH": 8,
"O.RISK_MNGT": 10,
"O.SIM_UNLOCK": 10,
"O.TRANSACTION_BYPASS": 53,
"O.TRANSACTION_INTEG": 1,
"O.TRANSACTION_INTEGRI": 1,
"O.TRANSACTION_INTEGRITY": 38,
"O.TRANSACTION_REPLAY": 13,
"O.TRANSACTION_UNIQUE": 1,
"O.TRANSACTION_UNIQUENE": 1,
"O.TRANSACTION_UNIQUENES": 2,
"O.TRANSACTION_UNIQUENESS": 33,
"O.USER_AUTH": 55
},
"OE": {
"OE.BANKS_PRIVILEGES": 4,
"OE.CERTIFICATES_MNGT": 11,
"OE.CHANNELS_SELECTION": 4,
"OE.CUSTOMER_PC_CONFID": 8,
"OE.GUIS_AUTH": 1,
"OE.GUIS_IDENTIFICATION": 5,
"OE.GUIS_TIMEOUT": 7,
"OE.GUI_INST_ALERT": 7,
"OE.LATENCY_CONTROL": 5,
"OE.MERCHANT_AUTH": 8,
"OE.MERCHANT_CONTROL": 7,
"OE.NFC_PROTOCOL": 5,
"OE.NO_VAD": 6,
"OE.POLICY": 5,
"OE.POS_APPLICATIONS": 10,
"OE.POS_APPROVAL": 7,
"OE.POS_DEACTIVATION": 6,
"OE.TOE_USAGE": 9,
"OE.TRANSACTION_DISPLAY": 5
},
"OSP": {
"OSP.BANKS_PRIVILEGES": 4,
"OSP.CERTIFICATES_MNGT": 4,
"OSP.CUSTOMER_PC_CONFI": 1,
"OSP.CUSTOMER_PC_CONFID": 3,
"OSP.GUIS_IDENTIFICATION": 4,
"OSP.MERCHANT_CONTROL": 6,
"OSP.PISHING": 4,
"OSP.POLICY": 4,
"OSP.TOE_USAGE": 4
},
"T": {
"T.APPLICATIONS_DOS": 7,
"T.CERTIF_CORRUPTION": 5,
"T.CUSTOMER_USURPATION": 7,
"T.DISCLOSURE_KEYS": 6,
"T.DISCLOSURE_REF_PC": 6,
"T.INTEG_ACCOUNT_INFO": 6,
"T.INTEG_COUNT": 7,
"T.INTEG_KEYS": 8,
"T.INTEG_LOG_FILE": 5,
"T.INTEG_REF_PC": 6,
"T.INTEG_SEL_ACT_PARAM": 6,
"T.INTEG_TRANS_PARAM": 7,
"T.ISSUING-": 2,
"T.ISSUING-BANK_USURPATION": 3,
"T.MAN-IN-THE-MIDDLE": 12,
"T.MERCHANT_ACCOMPLICE": 9,
"T.MNO_USURPATION": 5,
"T.STEALING": 9,
"T.TEMPORARY_DATA": 7,
"T.TRANSACTION_COUNTERFEITING": 13,
"T.TRANSACTION_REPLAY": 8,
"T.TRANSACTION_REPUDIATION": 7
}
},
"cc_protection_profile_id": {
"ANSSI": {
"ANSSI-CC-PP 2010/04": 1
},
"BSI": {
"BSI-PP-0035": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 5,
"ADV_FSP.1": 3,
"ADV_FSP.2": 2,
"ADV_FSP.4": 9,
"ADV_IMP.1": 4,
"ADV_TDS.1": 2,
"ADV_TDS.2": 1,
"ADV_TDS.3": 8
},
"AGD": {
"AGD_OPE": 2,
"AGD_OPE.1": 5,
"AGD_PRE": 1,
"AGD_PRE.1": 5
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.1": 1,
"ALC_CMS.4": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_DVS.2": 6,
"ALC_LCD.1": 3,
"ALC_TAT.1": 3
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 4,
"ASE_INT.1": 5,
"ASE_OBJ.2": 3,
"ASE_REQ.1": 2,
"ASE_REQ.2": 2,
"ASE_SPD.1": 2,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.1": 2,
"ATE_COV.2": 3,
"ATE_DPT.1": 2,
"ATE_FUN.1": 6,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.5": 5
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 1,
"EAL4": 3,
"EAL4 augmented": 2,
"EAL4+": 10
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP.1": 7,
"FAU_ARP.1.1": 1,
"FAU_GEN.1": 11,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_SAA.1": 8,
"FAU_SAA.1.1": 1,
"FAU_SAA.1.2": 2,
"FAU_SAR": 12,
"FAU_SAR.1": 4
},
"FCS": {
"FCS_CKM": 9,
"FCS_CKM.1": 8,
"FCS_CKM.2": 1,
"FCS_CKM.4": 20,
"FCS_CKM.4.1": 1,
"FCS_COP": 40,
"FCS_COP.1": 9,
"FCS_COP.1.1": 1
},
"FDP": {
"FDP_ACC": 149,
"FDP_ACC.1": 14,
"FDP_ACC.2": 14,
"FDP_ACF": 133,
"FDP_ACF.1": 35,
"FDP_ACF.1.2": 7,
"FDP_ACF.1.3": 1,
"FDP_DAU.1": 5,
"FDP_DAU.1.1": 1,
"FDP_DAU.1.2": 1,
"FDP_ETC.1": 15,
"FDP_ETC.1.1": 1,
"FDP_ETC.1.2": 1,
"FDP_IFC": 77,
"FDP_IFC.1": 11,
"FDP_IFC.2": 8,
"FDP_IFF": 62,
"FDP_IFF.1": 24,
"FDP_IFF.1.2": 4,
"FDP_ITC": 28,
"FDP_ITC.1": 27,
"FDP_ITC.1.1": 1,
"FDP_ITC.1.2": 1,
"FDP_ITC.1.3": 1,
"FDP_ITC.2": 17,
"FDP_RIP.1": 7,
"FDP_RIP.1.1": 1,
"FDP_SDI.2": 5,
"FDP_SDI.2.1": 1,
"FDP_SDI.2.2": 1,
"FDP_UIT.1": 13,
"FDP_UIT.1.1": 1,
"FDP_UIT.1.2": 1
},
"FIA": {
"FIA_AFL": 16,
"FIA_AFL.1": 4,
"FIA_ATD.1": 9,
"FIA_ATD.1.1": 1,
"FIA_SOS": 1,
"FIA_SOS.2": 8,
"FIA_SOS.2.1": 1,
"FIA_SOS.2.2": 1,
"FIA_UAU": 35,
"FIA_UAU.1": 8,
"FIA_UAU.3": 7,
"FIA_UAU.3.1": 1,
"FIA_UAU.3.2": 1,
"FIA_UAU.4": 9,
"FIA_UAU.4.1": 1,
"FIA_UAU.6": 1,
"FIA_UID": 24,
"FIA_UID.1": 10,
"FIA_USB.1": 7,
"FIA_USB.1.1": 1,
"FIA_USB.1.2": 1,
"FIA_USB.1.3": 1
},
"FMT": {
"FMT_MOF": 7,
"FMT_MOF.1": 1,
"FMT_MSA": 9,
"FMT_MSA.1": 3,
"FMT_MSA.2": 4,
"FMT_MSA.2.1": 1,
"FMT_MSA.3": 29,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD": 4,
"FMT_MTD.1": 1,
"FMT_SMF": 17,
"FMT_SMF.1": 5,
"FMT_SMR.1": 18,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPR": {
"FPR_UNO.1": 4,
"FPR_UNO.1.1": 1
},
"FPT": {
"FPT_RPL": 1,
"FPT_RPL.1": 4,
"FPT_RPL.1.1": 1,
"FPT_RPL.1.2": 1,
"FPT_STM.1": 3,
"FPT_TDC.1": 16,
"FPT_TDC.1.1": 1,
"FPT_TDC.1.2": 1,
"FPT_TST.1": 7,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FTP": {
"FTP_ITC.1": 10,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1,
"FTP_TRP.1": 3
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"Neslib": {
"NESLIB 3.0": 2
}
},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 4
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {
"javacard": {
"javacard.security": 1
}
},
"javacard_version": {
"GlobalPlatform": {
"GlobalPlatform 2.1.1": 1
}
},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 1
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS PUB 140-2": 1,
"FIPS PUB 180-3": 1,
"FIPS PUB 186-3": 1,
"FIPS PUB 197": 1,
"FIPS PUB 46-3": 1,
"FIPS PUB 81": 1
},
"ISO": {
"ISO/IEC 9796-1": 1,
"ISO/IEC 9797-1": 1
},
"PKCS": {
"PKCS 1": 1,
"PKCS#1": 2
},
"SCP": {
"SCP02": 1,
"SCP80": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 2
}
},
"DES": {
"3DES": {
"3DES": 4,
"TDES": 1
},
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Oberthur": {
"Oberthur": 8,
"Oberthur Technologies": 137
},
"STMicroelectronics": {
"STMicroelectronics": 4
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "chrisduc",
"/CreationDate": "D:20130807110801+02\u002700",
"/Creator": "PDFCreator Version 0.8.1",
"/ModDate": "D:20130807110801+02\u002700",
"/Producer": "AFPL Ghostscript 8.50",
"/Title": "FQR 110 6672 Ed1 - ST JUBA Lite",
"pdf_file_size_bytes": 1527189,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 131
}
},
"protection_profile_links": null,
"report_link": "https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC-2013_65.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"ALC_DVS.2",
"EAL4+",
"AVA_VAN.5"
]
},
"st_link": "https://www.commoncriteriaportal.org/files/epfiles/FQR%20110%206672%20Ed1%20-%20ST%20JUBA%20%20Lite.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"json_hash": null,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "2e4127e86969ec105569806f18118fd611c63f4a9d829a478df861e6318532d5",
"txt_hash": "263aaaa523c471afe1ec9b93ab6e8df0cc5691eb3025b7f40a5e155b026f155a"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "734f297c82adaa229149775ac66c2d92919abd255e282c447445e63b13334675",
"txt_hash": "a12c1c5b1fe4396131085d0e0176fe1d760a42bd8b7cf77af908e01c93df5723"
}
},
"status": "archived"
}