Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
PR/SM for IBM z16 and IBM LinuxONE Emperor 4 Systems, Driver Level D51C with Bundle Level 4B
BSI-DSZ-CC-1186-2023
MultiApp v4.0.1 with Filter Set 1.0 Java Card Open Platform on M7892 G12 chip(MultiApp v4.0.1 with Filter Set 1.0) (ANSSI-CC-2020/42-R01)
ANSSI-CC-2020/42-R01
name PR/SM for IBM z16 and IBM LinuxONE Emperor 4 Systems, Driver Level D51C with Bundle Level 4B MultiApp v4.0.1 with Filter Set 1.0 Java Card Open Platform on M7892 G12 chip(MultiApp v4.0.1 with Filter Set 1.0) (ANSSI-CC-2020/42-R01)
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme DE FR
not_valid_after 09.03.2028 08.01.2030
not_valid_before 10.03.2023 08.01.2025
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1186c_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-CC-2020_42-R01.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1186a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2020_42-R01fr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1186b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2020_42-R01en.pdf
manufacturer IBM Corporation THALES DIS FRANCE SA
manufacturer_web https://www.ibm.com https://www.thalesgroup.com/en/europe/france
security_level EAL5+, AVA_VAN.5, ALC_TAT.3, ATE_FUN.2, ALC_FLR.3 EAL5+, ALC_DVS.2, AVA_VAN.5
dgst 07abbe7023cf3637 da1854c6923c5a64
heuristics/cert_id BSI-DSZ-CC-1186-2023 ANSSI-CC-2020/42-R01
heuristics/cert_lab BSI []
heuristics/extracted_sars ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.3, ALC_FLR.3, ADV_FSP.5, ATE_FUN.2, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.4, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ASE_CCL.1 AGD_PRE.1, ATE_COV.2, ALC_CMC.4, ATE_FUN.1, ALC_DEL.1, AVA_VAN.5, ATE_DPT.3, ADV_TDS.4, ALC_LCD.1, ALC_DVS.2, ADV_ARC.1, ADV_FSP.5, ATE_IND.2, AGD_OPE.1, ADV_INT.2, ALC_TAT.2, ADV_IMP.1
heuristics/extracted_versions 4 4.0.1, 1.0
heuristics/report_references/directly_referenced_by BSI-DSZ-CC-1222-2024 ANSSI-CC-2020/45-R01, ANSSI-CC-2020/49-R01, ANSSI-CC-2020/44-R01, ANSSI-CC-2020/43-R01
heuristics/report_references/directly_referencing BSI-DSZ-CC-1160-2021 BSI-DSZ-CC-0891-V7-2024
heuristics/report_references/indirectly_referenced_by BSI-DSZ-CC-1222-2024 ANSSI-CC-2020/45-R01, ANSSI-CC-2020/49-R01, ANSSI-CC-2020/44-R01, ANSSI-CC-2020/43-R01
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-0846-2013, BSI-DSZ-CC-0715-2011, BSI-DSZ-CC-1005-2016, BSI-DSZ-CC-1109-2019, BSI-DSZ-CC-0953-2015, BSI-DSZ-CC-1160-2021, BSI-DSZ-CC-1133-2020, BSI-DSZ-CC-0793-2012, BSI-DSZ-CC-0900-2014, BSI-DSZ-CC-1048-2018 BSI-DSZ-CC-0891-V7-2024, BSI-DSZ-CC-0891-V6-2021, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0891-V4-2019, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0891-V3-2018, BSI-DSZ-CC-0891-V2-2016
heuristics/scheme_data
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0891-V7-2024
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0891-V7-2024
heuristics/protection_profiles {} 94167fd161e87d71
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0099b_pdf.pdf
pdf_data/cert_filename 1186c_pdf.pdf certificat-CC-2020_42-R01.pdf
pdf_data/cert_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1186-2023: 1
  • FR:
    • ANSSI-CC-2020/42-R01: 2
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 4: 1
    • EAL 5: 1
    • EAL 5 augmented: 1
  • EAL:
    • EAL2: 1
    • EAL5: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.3: 1
    • ALC_TAT.3: 1
  • ATE:
    • ATE_FUN.2: 1
  • AVA:
    • AVA_VAN.5: 1
  • ALC:
    • ALC_DVS.2: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/eval_facility
  • Serma:
    • SERMA: 2
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /Keywords: "Common Criteria, Certification, Zertifizierung, PR/SM for IBM z16 and IBM LinuxONE Emperor 4 Systems Driver Level D51C with Bundle Level 4B, BSI-DSZ-CC-1186"
  • /Subject: Common Criteria, Certification, Zertifizierung, PR/SM for IBM z16 and IBM LinuxONE Emperor 4 Systems Driver Level D51C with Bundle Level 4B, BSI-DSZ-CC-1186
  • /Title: Certification Report BSI-DSZ-CC-1186-2023
  • pdf_file_size_bytes: 328621
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20250110094558+01'00'
  • /Creator: Acrobat PDFMaker 23 pour Word
  • /Keywords:
  • /ModDate: D:20250110094717+01'00'
  • /Producer: Adobe PDF Library 23.1.175
  • pdf_file_size_bytes: 170045
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename 1186a_pdf.pdf ANSSI-CC-2020_42-R01fr.pdf
pdf_data/report_frontpage
  • FR:
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 5 augmented by ALC_FLR.3, ALC_TAT.3, ATE_FUN.2, AVA_VAN.5
    • cc_version: Product specific Security Target Common Criteria Part 2 conformant
    • cert_id: BSI-DSZ-CC-1186-2023
    • cert_item: PR/SM for IBM z16 and IBM LinuxONE Emperor 4 Systems, Driver Level D51C with Bundle Level 4B
    • cert_lab: BSI
    • developer: IBM Corporation
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: None
  • FR:
  • DE:
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1160-2021: 3
    • BSI-DSZ-CC-1186-2023: 16
  • DE:
    • BSI-DSZ-CC-0891-V7-2024: 2
  • FR:
    • ANSSI-CC-2020/42-R01: 2
    • ANSSI-CC-PP-2010/03-M01: 1
pdf_data/report_keywords/cc_protection_profile_id
  • ANSSI:
    • ANSSI-CC-PP-2010/03-M01: 1
  • BSI:
    • BSI-PP-0084-2014: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 3
    • EAL 4: 5
    • EAL 5: 4
    • EAL 5 augmented: 3
    • EAL 5+: 1
    • EAL 6: 1
  • EAL:
    • EAL2: 2
    • EAL5: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_TDS: 1
  • ALC:
    • ALC_CMS.5: 1
    • ALC_FLR: 3
    • ALC_FLR.3: 4
    • ALC_TAT.3: 4
  • ATE:
    • ATE_FUN.2: 4
  • AVA:
    • AVA_VAN.5: 4
  • AGD:
    • AGD_OPE: 4
    • AGD_PRE: 2
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 1
pdf_data/report_keywords/vendor
  • Gemalto:
    • Gemalto: 1
  • Microsoft:
    • Microsoft: 1
pdf_data/report_keywords/eval_facility
  • atsec:
    • atsec: 3
  • CESTI:
    • CESTI: 1
  • Serma:
    • SERMA: 1
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS 1.3: 1
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
pdf_data/report_keywords/tee_name
  • IBM:
    • SE: 17
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 32: 1
    • AIS 34: 1
    • AIS 38: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Report, Version 4, 2023-02-17, Final Evaluation Technical Report, atsec information security GmbH (confidential document) [8] Hardware Management Console Online Help, Version 2.16.0, 2022-05-27, IBM Corporation [9] IBM Z: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
  • OutOfScope:
    • out of scope: 1
    • the security test suite FTP06 must be included in the driver regression testing, which however is out of scope for this evaluation The combination of the above ensures that changes to the driver, including: 1
pdf_data/report_metadata
pdf_data/st_filename 1186b_pdf.pdf ANSSI-cible-CC-2020_42-R01en.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1186: 1
  • DE:
    • BSI-DSZ-CC-0891-V7-2024: 1
  • FR:
    • ANSSI-PP-2010/03-M01: 1
  • NL:
    • CC-1: 2
    • CC-2: 3
    • CC-3: 3
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0068-V2-2011-MA-01: 1
    • BSI-CC-PP-0056-V2-2012: 1
    • BSI-CC-PP-0084-: 1
    • BSI-PP-0055-: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL5: 4
  • EAL:
    • EAL 6+: 1
    • EAL5: 6
    • EAL5 augmented: 2
    • EAL5+: 2
    • EAL6: 1
    • EAL6 augmented: 1
    • EAL6+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.5: 2
    • ADV_IMP.1: 2
    • ADV_INT.2: 2
    • ADV_TDS.4: 2
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.4: 2
    • ALC_CMS.5: 2
    • ALC_DEL.1: 2
    • ALC_DVS.1: 2
    • ALC_FLR.3: 4
    • ALC_LCD.1: 2
    • ALC_TAT.3: 4
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.3: 2
    • ATE_FUN.2: 4
    • ATE_IND.2: 2
  • AVA:
    • AVA_VAN.5: 4
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 9
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 2
    • ADV_FSP.4: 2
    • ADV_FSP.5: 4
    • ADV_IMP: 1
    • ADV_IMP.1: 7
    • ADV_INT.2: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 2
    • ADV_TDS.3: 4
    • ADV_TDS.4: 7
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 7
    • AGD_PRE: 1
    • AGD_PRE.1: 6
  • ALC:
    • ALC_CMC.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 2
    • ALC_DVS.2: 7
    • ALC_LCD.1: 3
    • ALC_TAT.1: 2
    • ALC_TAT.2: 3
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 2
    • ATE_DPT.1: 2
    • ATE_DPT.3: 1
    • ATE_FUN.1: 6
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 7
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 10
    • FAU_GEN.1.1: 2
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 9
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 6
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 7
    • FAU_SAR.3.1: 1
    • FAU_STG.1: 7
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.4: 7
    • FAU_STG.4.1: 1
  • FDP:
    • FDP_ACC: 4
    • FDP_ACC.1: 3
    • FDP_ACC.1.1: 2
    • FDP_ACC.2: 25
    • FDP_ACC.2.1: 1
    • FDP_ACC.2.2: 1
    • FDP_ACF: 43
    • FDP_ACF.1: 14
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 17
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 9
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_RIP.2: 8
    • FDP_RIP.2.1: 1
  • FIA:
    • FIA_ATD.1: 10
    • FIA_ATD.1.1: 1
    • FIA_UID.2: 10
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA: 27
    • FMT_MSA.1: 14
    • FMT_MSA.3: 13
    • FMT_MSA.3.1: 4
    • FMT_MSA.3.2: 4
    • FMT_MTD.1: 9
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 12
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 14
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO.1: 13
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_ITT.1: 8
    • FPT_ITT.1.1: 1
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
    • FPT_TRC.1: 6
    • FPT_TRC.1.1: 1
    • FPT_TRC.1.2: 1
    • FPT_TST.1: 8
    • FPT_TST.1.1: 2
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FRU:
    • FRU_RSA.1: 7
    • FRU_RSA.1.1: 1
  • FTA:
    • FTA_TSE.1: 10
    • FTA_TSE.1.1: 1
  • FAU:
    • FAU_ARP.1: 13
    • FAU_ARP.1.1: 1
    • FAU_SAA.1: 2
  • FCO:
    • FCO_NRO: 5
    • FCO_NRO.2: 3
  • FCS:
    • FCS_CKM: 45
    • FCS_CKM.1: 28
    • FCS_CKM.1.1: 3
    • FCS_CKM.2: 10
    • FCS_CKM.2.1: 1
    • FCS_CKM.3: 5
    • FCS_CKM.3.1: 1
    • FCS_CKM.4: 26
    • FCS_CKM.4.1: 2
    • FCS_COP: 28
    • FCS_COP.1: 27
    • FCS_COP.1.1: 5
    • FCS_RND: 14
    • FCS_RND.1: 10
    • FCS_RND.1.1: 3
  • FDP:
    • FDP_ACC: 41
    • FDP_ACC.1: 18
    • FDP_ACC.2: 6
    • FDP_ACF: 37
    • FDP_ACF.1: 21
    • FDP_IFC: 20
    • FDP_IFC.1: 12
    • FDP_IFC.2: 2
    • FDP_IFF: 13
    • FDP_IFF.1: 12
    • FDP_ITC: 10
    • FDP_ITC.1: 13
    • FDP_ITC.2: 18
    • FDP_RIP: 77
    • FDP_RIP.1: 10
    • FDP_RIP.1.1: 1
    • FDP_ROL: 12
    • FDP_ROL.1: 2
    • FDP_SDI.2: 6
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UIT: 5
    • FDP_UIT.1: 2
  • FIA:
    • FIA_AFL: 21
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_ATD: 12
    • FIA_ATD.1: 3
    • FIA_SOS.2: 1
    • FIA_UAI.1: 1
    • FIA_UAU: 53
    • FIA_UAU.1: 5
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UAU.4: 1
    • FIA_UAU.4.1: 1
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6.1: 1
    • FIA_UID: 31
    • FIA_UID.1: 19
    • FIA_UID.1.1: 2
    • FIA_UID.1.2: 2
    • FIA_UID.2: 1
    • FIA_USB: 6
    • FIA_USB.1: 3
  • FMT:
    • FMT_LIM: 18
    • FMT_LIM.1: 15
    • FMT_LIM.1.1: 3
    • FMT_LIM.2: 14
    • FMT_LIM.2.1: 3
    • FMT_MSA: 78
    • FMT_MSA.1: 12
    • FMT_MSA.2: 1
    • FMT_MSA.3: 18
    • FMT_MTD: 31
    • FMT_MTD.1: 9
    • FMT_MTD.3: 1
    • FMT_SMF: 56
    • FMT_SMF.1: 20
    • FMT_SMF.1.1: 2
    • FMT_SMR: 71
    • FMT_SMR.1: 30
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 2
  • FPR:
    • FPR_UNO: 5
    • FPR_UNO.1: 8
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_EMS: 4
    • FPT_EMS.1: 12
    • FPT_EMS.1.1: 3
    • FPT_EMS.1.2: 3
    • FPT_FLS: 43
    • FPT_FLS.1: 14
    • FPT_FLS.1.1: 1
    • FPT_ITT: 5
    • FPT_ITT.1: 1
    • FPT_PHP: 5
    • FPT_PHP.3: 12
    • FPT_PHP.3.1: 1
    • FPT_RCV: 12
    • FPT_RCV.3: 4
    • FPT_RCV.4: 2
    • FPT_TDC.1: 7
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TST: 7
    • FPT_TST.1: 12
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 14
    • FTP_ITC.1: 5
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP: 7
    • FTP_TRP.1: 5
pdf_data/st_keywords/cc_claims
  • OE:
    • OE.SIE: 3
  • T:
    • T.LPAR_XCTL: 5
  • A:
    • A.APPLET: 4
    • A.DELETION: 4
    • A.VERIFICATION: 3
  • D:
    • D.API_DATA: 3
    • D.APP_CODE: 6
    • D.APP_C_DATA: 3
    • D.APP_I_DATA: 4
    • D.CRYPTO: 5
    • D.JCS_CODE: 3
    • D.JCS_DATA: 5
    • D.PIN: 4
    • D.SEC_DATA: 7
  • O:
    • O.ALARM: 14
    • O.APPLET: 28
    • O.CARD-MANAGEMENT: 3
    • O.CARD_MANAGEMENT: 18
    • O.CIPHER: 10
    • O.CODE_PCKG: 16
    • O.CODE_PKG: 7
    • O.DELETION: 7
    • O.FIREWALL: 11
    • O.GLOBAL_ARRAYS_CO: 3
    • O.GLOBAL_ARRAYS_CONFID: 5
    • O.GLOBAL_ARRAYS_INT: 3
    • O.GLOBAL_ARRAYS_INTEG: 4
    • O.INSTALL: 10
    • O.JAVAOBJECT: 56
    • O.KEY-MNGT: 5
    • O.KEY_MNGT: 4
    • O.LOAD: 5
    • O.NATIVE: 10
    • O.OBJ-DELETION: 3
    • O.OPERATE: 14
    • O.PIN-MNGT: 5
    • O.REALLOCATION: 4
    • O.RESOURCES: 8
    • O.RND: 8
    • O.SCP: 27
    • O.SID: 12
    • O.TRANSACTION: 5
  • OE:
    • OE.APPLET: 4
    • OE.CODE-EVIDENCE: 9
    • OE.VERIFICATION: 24
  • OP:
    • OP.ARRAY_ACCESS: 6
    • OP.CREATE: 10
    • OP.DELETE_APPLET: 6
    • OP.DELETE_PCKG: 4
    • OP.DELETE_PCKG_APPLET: 4
    • OP.INSTANCE_FIELD: 6
    • OP.INVK_INTERFACE: 10
    • OP.INVK_VIRTUAL: 8
    • OP.JAVA: 8
    • OP.PUT: 7
    • OP.THROW: 7
    • OP.TYPE_ACCESS: 7
  • OSP:
    • OSP.ATOMIC_ACTIVATION: 3
    • OSP.RND: 3
    • OSP.TOE_IDENTIFICATION: 3
    • OSP.VERIFICATION: 3
  • OT:
    • OT.X: 1
  • R:
    • R.JAVA: 9
  • T:
    • T.CONFID-APPLI-DATA: 3
    • T.CONFID-JCS-CODE: 3
    • T.CONFID-JCS-DATA: 3
    • T.CONFID_INTEG_SERVICE_DEPLOYEMENT: 3
    • T.DELETION: 3
    • T.EXE-CODE: 6
    • T.INSTALL: 3
    • T.INTEG-APPLI-CODE: 6
    • T.INTEG-APPLI-DATA: 6
    • T.INTEG-JCS-CODE: 3
    • T.INTEG-JCS-DATA: 3
    • T.NATIVE: 3
    • T.OBJ-DELETION: 3
    • T.PHYSICAL: 3
    • T.RESOURCES: 3
    • T.SID: 6
    • T.WRONG_SERVICE_DEPLOYEMENT_STATE: 3
pdf_data/st_keywords/vendor
  • Gemalto:
    • Gemalto: 2
  • Infineon:
    • Infineon: 12
  • Thales:
    • Thales: 10
pdf_data/st_keywords/eval_facility
  • atsec:
    • atsec: 1
  • Serma:
    • Serma Safety & Security: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 31
  • DES:
    • 3DES:
      • 3DES: 2
      • TDEA: 1
      • TDES: 14
      • Triple-DES: 3
    • DES:
      • DES: 20
  • constructions:
    • MAC:
      • CMAC: 3
      • HMAC: 3
      • KMAC: 2
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 10
    • ECDH:
      • ECDH: 8
    • ECDSA:
      • ECDSA: 4
  • FF:
    • DH:
      • DH: 11
      • Diffie-Hellman: 5
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA1: 1
    • SHA2:
      • SHA-224: 1
      • SHA-256: 6
      • SHA-384: 4
      • SHA-512: 6
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 3
    • Key agreement: 2
  • MAC:
    • MAC: 14
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 156
pdf_data/st_keywords/randomness
  • PRNG:
    • PRNG: 1
  • RNG:
    • RND: 11
    • RNG: 12
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 3
  • ECB:
    • ECB: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 3
    • Physical Tampering: 3
    • fault induction: 2
    • malfunction: 8
    • physical tampering: 1
  • SCA:
    • DPA: 2
    • SPA: 1
    • physical probing: 5
    • timing attacks: 1
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 26
pdf_data/st_keywords/cplc_data
  • ICFab:
    • IC Fabricator: 2
  • ICType:
    • IC Type: 2
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.DG1: 6
    • EF.DG16: 6
    • EF.DG3: 1
    • EF.DG4: 1
    • EF.SOD: 1
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS31: 4
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS 197: 1
    • FIPS 46-3: 1
    • FIPS180-2: 1
    • FIPS197: 5
  • ICAO:
    • ICAO: 3
  • NIST:
    • SP 800-67: 1
  • PKCS:
    • PKCS#1: 7
    • PKCS#3: 1
    • PKCS#5: 5
  • SCP:
    • SCP01: 4
    • SCP02: 4
    • SCP03: 7
pdf_data/st_keywords/javacard_version
  • JavaCard:
    • Java Card 2.2.2: 3
    • Java Card 3.0.4: 8
pdf_data/st_keywords/javacard_api_const
  • ALG:
    • AES:
      • ALG_AES_CMAC_128: 1
  • misc:
    • TYPE_ACCESS: 7
pdf_data/st_keywords/javacard_packages
  • javacard:
    • javacard.framework: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • The PACE module to provide PACE secure channel. Note: The Biometry feature of the Javacard API is out of scope of the TOE Applications stored in Flash mask in code area in MultiApp V4.0.1, are outside the TOE: 1
    • The commands terminal authenticate (TA) and Chip Authenticate (CA) are out of scope of this TOE and are managed at application level: 1
    • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
    • is an extension of PACE, (The commands terminal authenticate (TA) and Chip Authenticate (CA) are out of scope of this TOE and are managed at application level). GAP provides mutual authentication, secure: 1
    • out of scope: 3
pdf_data/st_metadata
  • /Author: OHAYON Franck
  • /CreationDate: D:20241127180125+01'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /Keywords: Security Target, CC
  • /ModDate: D:20241127180125+01'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • /Subject: Security Target
  • /Title: MultiApp v4.0.1 Javacard Platform with Filter Set 1.0
  • pdf_file_size_bytes: 2361844
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 122
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different