Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Gemalto Carte à puce Multiapp ID IAS ECC : applet de signature v4.2.7.A chargée sur la plate-forme Java Card Multiapp v1.0 avec correctif v1.2 masquée sur microcontrôleur NXP P5CD144 VOB
ANSSI-CC-2009/56
Application CPS2ter, adossée à l’application IAS ECC v1.3, en composition sur la plateforme ID-One Cosmo v8.2Code SAAAAR Applet : 0708312 ; Code SAAAAR Patch : 093072
ANSSI-CC-2019/43-R01
name Gemalto Carte à puce Multiapp ID IAS ECC : applet de signature v4.2.7.A chargée sur la plate-forme Java Card Multiapp v1.0 avec correctif v1.2 masquée sur microcontrôleur NXP P5CD144 VOB Application CPS2ter, adossée à l’application IAS ECC v1.3, en composition sur la plateforme ID-One Cosmo v8.2Code SAAAAR Applet : 0708312 ; Code SAAAAR Patch : 093072
status archived active
not_valid_after 01.09.2019 04.07.2028
not_valid_before 17.02.2010 04.07.2023
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2019_43-R01.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2009-56en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2019_43-R01fr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-cible_2009-56en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2019_43-R01en.pdf
manufacturer Gemalto / NXP Semiconductors Idemia
manufacturer_web https://www.gemalto.com/ https://www.idemia.com
dgst 03de79a10467e320 6f512e5d3c5d6a70
heuristics/cert_id ANSSI-CC-2009/56 ANSSI-CC-2019/43-R01
heuristics/cert_lab SERMA []
heuristics/indirect_transitive_cves CVE-2011-4022, CVE-2014-3402, CVE-2013-1218, CVE-2014-2103, CVE-2013-1243, CVE-2014-3406 {}
heuristics/extracted_sars ADV_IMP.2, AGD_PRE.1, ADV_ARC.1, ADV_FSP.4, ALC_TAT.1, ATE_FUN.1, ATE_COV.2, AVA_MSU.3, ALC_DEL.1, ALC_DVS.2, ADV_TDS.3, ALC_LCD.1, AVA_VLA.4, AGD_OPE.1, ATE_DPT.1, ATE_IND.2, AVA_VAN.5, ALC_CMC.4 ASE_INT.1, ALC_TAT.1, ATE_FUN.1, ADV_IMP.1, ASE_TSS.1, AGD_PRE.1, ASE_CCL.1, ALC_CMS.4, ALC_DVS.2, AVA_VAN.5, ASE_SPD.1, ASE_OBJ.2, ADV_FSP.4, ATE_COV.2, ASE_REQ.2, ALC_CMC.4, ADV_ARC.1, ALC_DEL.1, ATE_DPT.1, ADV_TDS.3, AGD_OPE.1, ALC_LCD.1, ASE_ECD.1
heuristics/extracted_versions 1.2, 4.2.7, 1.0 8.2, 1.3
heuristics/report_references/directly_referenced_by ANSSI-CC-2010/52, ANSSI-CC-2010/59, ANSSI-CC-2012/81 {}
heuristics/report_references/directly_referencing {} ANSSI-CC-2019/28, BSI-DSZ-CC-1059-V4-2021
heuristics/report_references/indirectly_referenced_by ANSSI-CC-2010/52, ANSSI-CC-2010/59, Certificate Number: 2012/81, ANSSI-CC-2012/81 {}
heuristics/report_references/indirectly_referencing {} ANSSI-CC-2019/28, BSI-DSZ-CC-0973-2016, ANSSI-CC-2017/49, BSI-DSZ-CC-1059-V2-2019, BSI-DSZ-CC-1059-2018, BSI-DSZ-CC-0973-V2-2016, BSI-DSZ-CC-1059-V4-2021, BSI-DSZ-CC-1059-V3-2019
heuristics/scheme_data
  • cert_id: ANSSI-CC-2009/56
  • description: Le produit certifié est la carte à puce Multiapp ID IAS ECC, applet de signature v4.2.7.A chargée sur plate-forme Java Card Multiapp v1.0 avec correctif v1.2 masquée sur microcontrôleur NXP P5CD144 VOB, développée par Gemalto. La TOE (Target Of Evaluation - cible d'évaluation) est une carte à puce destinée à être utilisée dans le cadre de l'administration électronique. Elle répond aux c
  • developer: Gemalto SA et NXP Semiconductors GmbH
  • enhanced:
  • level: EAL4+
  • product: Carte à puce Multiapp ID IAS ECC : applet de signature v4.2.7.A chargée sur la plate-forme Java Card Multiapp v1.0 avec correctif v1.2 masquée sur microcontrôleur NXP P5CD144 VOB
  • sponsor: Gemalto SA
  • url: https://cyber.gouv.fr/produits-certifies/carte-puce-multiapp-id-ias-ecc-applet-de-signature-v427a-chargee-sur-la-plate
  • cert_id: ANSSI-CC-2019/43-R01
  • description: Le produit évalué est l’« Application CPS2ter, adossée à l’application IAS ECC v1.3, en composition sur la plateforme ID-One Cosmo v8.2, Code SAAAAR Applet : 0708312; Code SAAAAR Patch : 093072 » développé par IDEMIA et masqué sur le composant NXP P60D145 développé par NXP SEMICONDUCTORS GMBH. Ce produit est une carte à puce disposant d’une interface contact et d’une interface sans contact qui pr
  • developer: IDEMIA et NXP SEMICONDUCTORS GMBH
  • enhanced:
    • augmented: ALC_DVS.2, AVA_VAN.5
    • category: Cartes à puce
    • cc_version: Critères Communs version 2.1
    • cert_id: ANSSI-CC-2019/43-R01
    • cert_link: https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2019_43-R01.pdf
    • certification_date: 04.07.2023
    • developer: IDEMIA et NXP SEMICONDUCTORS GMBH
    • evaluation_facility: CEA - LETI
    • expiration_date: 04.07.2028
    • level: EAL4+
    • mutual_recognition: CCRA SOG-IS
    • protection_profile:
    • sponsor: IDEMIA
  • expiration_date: 04.07.2028
  • level: EAL4+
  • product: Application CPS2ter, adossée à l’application IAS ECC v1.3, en composition sur la plateforme ID-One Cosmo v8.2 Code SAAAAR Applet : 0708312 ; Code SAAAAR Patch : 093072
  • sponsor: IDEMIA
  • url: https://cyber.gouv.fr/produits-certifies/application-cps2ter-adossee-lapplication-ias-ecc-v13-en-composition-sur-la
heuristics/st_references/directly_referencing {} ANSSI-CC-2019/34, ANSSI-CC-2019/36, ANSSI-CC-2019/33, BSI-DSZ-CC-1059-V4-2021, ANSSI-CC-2019/35
heuristics/st_references/indirectly_referencing {} ANSSI-CC-2019/28, ANSSI-CC-2019/34, ANSSI-CC-2019/36, ANSSI-CC-2019/33, BSI-DSZ-CC-1059-V4-2021, ANSSI-CC-2019/35
pdf_data/cert_filename Certificat-CC-2019_43-R01.pdf
pdf_data/cert_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2019/43-R01: 2
pdf_data/cert_keywords/cc_protection_profile_id
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
    • EAL4: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
pdf_data/cert_keywords/vendor
  • Idemia:
    • IDEMIA: 2
  • NXP:
    • NXP: 1
pdf_data/cert_keywords/eval_facility
pdf_data/cert_keywords/symmetric_crypto
pdf_data/cert_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
pdf_data/cert_keywords/crypto_scheme
pdf_data/cert_keywords/crypto_protocol
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
pdf_data/cert_keywords/ecc_curve
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
pdf_data/cert_keywords/technical_report_id
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
pdf_data/cert_metadata
  • /CreationDate: D:20230706152413+02'00'
  • /Creator: Acrobat PDFMaker 23 pour Word
  • /Keywords:
  • /ModDate: D:20230706154544+02'00'
  • /Producer: Adobe PDF Library 23.1.175
  • pdf_file_size_bytes: 133173
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename ANSSI-CC_2009-56en.pdf ANSSI-CC-2019_43-R01fr.pdf
pdf_data/report_frontpage
  • FR:
    • cc_security_level: EAL 4 augmented ALC_DVS.2, AVA_VAN.5
    • cc_version: Common Criteria version 3.1
    • cert_id: ANSSI-CC-2009/56
    • cert_item: Multiapp ID IAS ECC smart card : electronic signature application v4.2.7.A loaded on Multiapp v1.0 Java Card platform with v1.2 soft mask embedded on NXP P5CD144 VOB
    • cert_item_version: Applet version: v4.2.7.A Multiapp Java Card platform version : v1.0 soft mask version: v1.2 Microcontroller version : V0B
    • cert_lab: Serma Technologies 30 avenue Gustave Eiffel, 33608 Pessac, France Phone: +33 (0)5 57 26 08 75, email : [email protected]
    • developer: Gemalto SA1 6 rue de la Verrerie 92197 Meudon, France NXP Semiconductors GmbH1 Stresemannallee 101 D-22502 Hamburg, Germany Sponsor Gemalto SA 6 rue de la Verrerie, 92197 Meudon, France
    • match_rules: ['Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developer\\(s\\)(.+)Evaluation facility(.+)Recognition arrangements']
    • ref_protection_profiles: BSI-PP-0005-2002] : SSCD Type 2, version 1.04 [BSI-PP-0006-2002] : SSCD Type 3, version 1.05
  • FR:
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0411-2007-MA-04: 1
  • FR:
    • ANSSI-CC-2009/56: 20
  • DE:
    • BSI-DSZ-CC-1059-V4-2021: 1
  • FR:
    • ANSSI-CC-2019/28: 2
    • ANSSI-CC-2019/28-S01: 1
    • ANSSI-CC-2019/33-S01: 2
    • ANSSI-CC-2019/34-S01: 2
    • ANSSI-CC-2019/35-S01: 2
    • ANSSI-CC-2019/36-S01: 2
    • ANSSI-CC-2019/43-R01: 2
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP- 0002-2001: 1
    • BSI-PP- 0005-2002: 1
    • BSI-PP- 0006-2002: 1
    • BSI-PP-0002-2001: 2
    • BSI-PP-0005-: 1
    • BSI-PP-0005-2002: 3
    • BSI-PP-0006-2002: 3
  • ANSSI:
    • ANSSI-CC-PP-2010/03-: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 4: 2
    • EAL 4 augmented: 2
    • EAL 5: 1
    • EAL 7: 1
    • EAL4: 3
    • EAL5: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 and: 1
  • EAL:
    • EAL2: 2
    • EAL4: 1
    • EAL5: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ADO:
    • ADO_DEL: 1
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 2
    • ALC_FLR: 2
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_MSU.3: 1
    • AVA_VAN: 1
    • AVA_VAN.5: 2
    • AVA_VLA.4: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 3
  • ALC:
    • ALC_DVS.2: 2
    • ALC_FLR: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 3
pdf_data/report_keywords/vendor
  • Gemalto:
    • Gemalto: 26
  • NXP:
    • NXP: 9
    • NXP Semiconductors: 2
  • Idemia:
    • IDEMIA: 2
  • NXP:
    • NXP: 8
pdf_data/report_keywords/eval_facility
  • Serma:
    • Serma Technologies: 2
  • CEA-LETI:
    • CEA - LETI: 1
  • CESTI:
    • CESTI: 2
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 34
  • ECC:
    • ECC:
      • ECC: 8
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 2
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2006-09-001: 1
    • CCMB-2007-09-002: 1
    • CCMB-2007-09-003: 1
    • CCMB-2007-09-004: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • SCP:
    • SCP03: 2
pdf_data/report_metadata
  • /CreationDate: D:20100827152755+02'00'
  • /Keywords:
  • /ModDate: D:20100827152755+02'00'
  • /Producer: Acrobat Distiller 8.0.0 (Windows)
  • pdf_file_size_bytes: 147571
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 19
pdf_data/st_filename anssi-cc-cible_2009-56en.pdf ANSSI-cible-CC-2019_43-R01en.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1059-V4-2021: 1
  • FR:
    • ANSSI-CC-2019/33: 1
    • ANSSI-CC-2019/34: 1
    • ANSSI-CC-2019/35: 1
    • ANSSI-CC-2019/36: 1
  • NL:
    • CC-1: 2
    • CC-2: 2
    • CC-3: 4
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0002-2001: 1
    • BSI-PP-0004-2002T-: 1
    • BSI-PP-0005-2002T-03-04-2002: 1
    • BSI-PP-0006-2002T-03-04-2002: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 8
    • EAL4 augmented: 6
    • EAL4+: 4
    • EAL5+: 1
  • EAL:
    • EAL4: 9
    • EAL4 augmented: 3
    • EAL5: 1
    • EAL5 augmented: 1
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_AUT: 1
    • ACM_CAP: 2
    • ACM_SCP: 2
  • ADO:
    • ADO_DEL: 2
    • ADO_IGS: 1
  • ADV:
    • ADV_ARC: 2
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.4: 1
    • ADV_HLD: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 2
    • ADV_IMP.2: 1
    • ADV_LLD: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_ADM: 1
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 3
    • AGD_PRE.1: 3
    • AGD_USR: 1
  • ALC:
    • ALC_CMC: 2
    • ALC_CMC.4: 1
    • ALC_CMS: 2
    • ALC_DEL: 2
    • ALC_DEL.1: 1
    • ALC_DVS: 3
    • ALC_DVS.2: 3
    • ALC_LCD: 1
    • ALC_LCD.1: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.2: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_IND: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_CCA: 1
    • AVA_MSU: 1
    • AVA_MSU.3: 2
    • AVA_SOF: 1
    • AVA_VAN: 2
    • AVA_VAN.5: 2
    • AVA_VLA: 1
    • AVA_VLA.4: 2
  • ADV:
    • ADV_ARC.1: 6
    • ADV_FSP.1: 3
    • ADV_FSP.2: 3
    • ADV_FSP.4: 9
    • ADV_IMP.1: 5
    • ADV_TDS.1: 2
    • ADV_TDS.2: 1
    • ADV_TDS.3: 9
  • AGD:
    • AGD_OPE: 6
    • AGD_OPE.1: 6
    • AGD_PRE: 8
    • AGD_PRE.1: 6
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.1: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 2
    • ALC_DVS.2: 10
    • ALC_LCD.1: 3
    • ALC_TAT.1: 3
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 4
    • ASE_INT.1: 5
    • ASE_OBJ.2: 3
    • ASE_REQ.1: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 2
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 3
    • ATE_DPT.1: 2
    • ATE_FUN.1: 6
  • AVA:
    • AVA_VAN.5: 10
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
  • FCS:
    • FCS_CKM: 9
    • FCS_CKM.1: 5
    • FCS_CKM.4: 4
    • FCS_COP: 9
    • FCS_COP.1: 9
  • FDP:
    • FDP_ACC: 10
    • FDP_ACC.1: 9
    • FDP_ACF: 9
    • FDP_ACF.1: 24
    • FDP_ETC: 6
    • FDP_ETC.1: 4
    • FDP_ITC: 6
    • FDP_ITC.1: 8
    • FDP_RIP: 4
    • FDP_RIP.1: 2
    • FDP_RIP.1.1: 1
    • FDP_SDI: 5
    • FDP_SDI.2: 7
    • FDP_UCT: 3
    • FDP_UCT.1: 5
    • FDP_UIT: 6
    • FDP_UIT.1: 6
  • FIA:
    • FIA_AFL: 3
    • FIA_AFL.1: 3
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD: 4
    • FIA_ATD.1: 2
    • FIA_ATD.1.1: 1
    • FIA_UAU: 3
    • FIA_UAU.1: 3
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 1
    • FIA_UID: 4
    • FIA_UID.1: 4
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MOF: 3
    • FMT_MOF.1: 3
    • FMT_MOF.1.1: 1
    • FMT_MSA: 9
    • FMT_MSA.1: 5
    • FMT_MSA.2: 3
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 7
    • FMT_MTD: 3
    • FMT_MTD.1: 3
    • FMT_MTD.1.1: 1
    • FMT_SMF: 3
    • FMT_SMF.1: 3
    • FMT_SMF.1.1: 2
    • FMT_SMR: 3
    • FMT_SMR.1: 3
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_AMT: 1
    • FPT_AMT.1: 1
    • FPT_FLS: 3
    • FPT_FLS.1: 3
    • FPT_FLS.1.1: 1
    • FPT_PHP: 4
    • FPT_PHP.1: 3
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 3
    • FPT_PHP.3.1: 1
    • FPT_TST: 5
    • FPT_TST.1: 3
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 10
    • FTP_ITC.1: 14
    • FTP_TRP: 7
    • FTP_TRP.1: 3
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_ARP.1: 1
  • FCS:
    • FCS_CKM: 11
    • FCS_CKM.1: 2
    • FCS_CKM.4: 3
    • FCS_COP: 22
    • FCS_COP.1: 2
    • FCS_RNG: 16
    • FCS_RNG.1: 3
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC: 15
    • FDP_ACC.1: 6
    • FDP_ACF: 25
    • FDP_ACF.1: 5
    • FDP_ACF.1.4: 1
    • FDP_DAU: 8
    • FDP_DAU.1: 2
    • FDP_ETC: 8
    • FDP_ETC.1: 2
    • FDP_IFC.1: 4
    • FDP_ITC: 11
    • FDP_ITC.1: 5
    • FDP_ITC.2: 2
    • FDP_SDI: 8
    • FDP_SDI.2: 3
    • FDP_UCT: 9
    • FDP_UCT.1: 1
    • FDP_UIT: 17
    • FDP_UIT.1: 2
  • FIA:
    • FIA_AFL: 16
    • FIA_AFL.1: 4
    • FIA_ATD: 14
    • FIA_ATD.1: 3
    • FIA_UAU: 25
    • FIA_UAU.1: 6
    • FIA_UID: 20
    • FIA_UID.1: 6
    • FIA_USB: 16
    • FIA_USB.1: 8
  • FMT:
    • FMT_MSA.3: 4
    • FMT_SMF: 14
    • FMT_SMF.1: 1
  • FPT:
    • FPT_FLS: 4
    • FPT_FLS.1: 14
    • FPT_FLS.1.1: 1
    • FPT_PHP.3: 21
    • FPT_PHP.3.1: 1
  • FTP:
    • FTP_ITC: 17
    • FTP_ITC.1: 7
    • FTP_TRP.1: 4
pdf_data/st_keywords/cc_claims
  • A:
    • A.CGA: 2
    • A.SCA: 2
  • D:
    • D.DTBS: 6
    • D.RAD: 5
    • D.SCD: 10
    • D.SIG: 3
    • D.SSCD: 1
    • D.SVD: 7
    • D.VAD: 1
  • OE:
    • OE.HI_VAD: 3
    • OE.SVD_AUTH_CGA: 1
  • A:
    • A.APPLET: 1
    • A.VERIFICATION: 1
  • D:
    • D.BOULY: 1
  • O:
    • O.ALARM: 1
    • O.BIO-MNGT: 1
    • O.CARD-MANAGEMENT: 1
    • O.CHV: 13
    • O.CIPHER: 1
    • O.DELETION: 1
    • O.FIREWALL: 1
    • O.GLOBAL_ARRAYS_CONFID: 1
    • O.GLOBAL_ARRAYS_INTEG: 1
    • O.INSTALL: 1
    • O.KEY-MNGT: 1
    • O.LOAD: 1
    • O.NATIVE: 1
    • O.OBJ-DELETION: 1
    • O.OPERATE: 1
    • O.PATCH_LOADING: 1
    • O.PIN-MNGT: 1
    • O.REALLOCATION: 1
    • O.RESIDENT_APPLICATION: 1
    • O.RESOURCES: 1
    • O.SCP: 3
    • O.SECURE_COMPARE: 1
    • O.SID: 1
    • O.TRANSACTION: 1
  • OE:
    • OE.APPLET: 1
    • OE.CODE-: 1
    • OE.VERIFICATION: 2
  • OSP:
    • OSP.VERIFICATION: 1
  • T:
    • T.CONFID-APPLI-DATA: 1
    • T.CONFID-JCS-CODE: 1
    • T.CONFID-JCS-DATA: 1
    • T.CONFIGURATION: 1
    • T.CONF_DATA_APPLET: 1
    • T.DELETION: 1
    • T.EXE-CODE: 2
    • T.INSTALL: 1
    • T.INTEG-APPLI-CODE: 2
    • T.INTEG-APPLI-DATA: 2
    • T.INTEG-JCS-CODE: 1
    • T.INTEG-JCS-DATA: 1
    • T.NATIVE: 1
    • T.OBJ-DELETION: 1
    • T.PATCH_LOADING: 1
    • T.PHYSICAL: 1
    • T.RESOURCES: 1
    • T.SID: 2
pdf_data/st_keywords/vendor
  • Gemalto:
    • Gemalto: 357
  • NXP:
    • NXP: 10
  • Idemia:
    • IDEMIA: 93
  • NXP:
    • NXP: 5
pdf_data/st_keywords/eval_facility
  • CEA-LETI:
    • CEA-LETI: 1
pdf_data/st_keywords/symmetric_crypto
  • DES:
    • 3DES:
      • TDES: 9
      • Triple-DES: 1
    • DES:
      • DES: 2
  • DES:
    • 3DES:
      • 3DES: 18
    • DES:
      • DES: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 28
  • FF:
    • DH:
      • DH: 1
  • ECC:
    • ECC:
      • ECC: 25
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 5
    • SHA2:
      • SHA-256: 4
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 3
  • KEX:
    • Key Exchange: 1
  • MAC:
    • MAC: 6
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 4
  • RNG:
    • RNG: 5
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 5
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 4
  • SCA:
    • DPA: 1
    • SPA: 1
    • Side channel: 1
    • timing attacks: 1
  • FI:
    • physical tampering: 3
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS31: 1
  • CC:
    • CCMB-2006-09-001: 1
    • CCMB-2007-09-002: 1
    • CCMB-2007-09-003: 1
    • CCMB-2007-09-004: 1
  • FIPS:
    • FIPS 180-2: 1
    • FIPS 46-3: 1
  • PKCS:
    • PKCS #1: 1
  • CC:
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS 46-3: 3
    • FIPS 81: 3
    • FIPS PUB 46-3: 1
  • NIST:
    • NIST SP 800-90: 2
pdf_data/st_keywords/javacard_version
  • JavaCard:
    • JC2.2: 1
    • JC2.2.1: 1
    • Java Card 2.2.1: 5
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • Multiapp platform. Beside the TOE, the product also contains the following Java Card applications (out of scope of the TOE) Figure 1 represents the product. The TOE is bordered with bold and un-continuous line: 1
    • out of scope: 1
  • OutOfScope:
    • 2.2.5 Out of scope features Some features are put out of the evaluation scope and are therefore not part of the TSF: 1
    • 12 2.2.5 Out of scope features: 2
    • Out of scope: 2
    • security features overview For more information about CPS2ter security features see [SRS]. 2.2.5 Out of scope features Some features are put out of the evaluation scope and are therefore not part of the TSF: 1
pdf_data/st_metadata
  • /CreationDate: D:20100301110216+01'00'
  • /Keywords:
  • /ModDate: D:20100301110216+01'00'
  • /Producer: GPL Ghostscript 8.54
  • pdf_file_size_bytes: 791366
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 58
state/cert/convert_ok False True
state/cert/download_ok False True
state/cert/extract_ok False True
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different