name |
Taiwan eID Applet BAC with CA and AA on ID-one V8.1 – Standard LDS Platform on NXP P6021M VB and on ID-One Cosmo v8.1-N – Large Platform on NXP P6022M VB (version 03 00 00 00) |
Oberthur Technologies Applet ID One Classic v1.01.1 en configuration CNS, Classic ou CIE chargée sur Cosmo v7.0-n Large, Standard et Basic (modes dual ou contact) sur composants NXP |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
FR |
FR |
status |
archived |
archived |
not_valid_after |
14.02.2023 |
01.09.2019 |
not_valid_before |
14.02.2018 |
20.05.2010 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2017_69fr_idemia.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2010-27fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st-2017_69.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2010-27en.pdf |
manufacturer |
Idemia |
Oberthur Technologies / NXP Semiconductors GmbH |
manufacturer_web |
https://www.idemia.com |
https://www.oberthur.com/ |
security_level |
ADV_INT.2, ADV_FSP.5, ALC_CMC.5, ALC_TAT.2, ADV_TDS.4, ALC_DVS.2, ATE_DPT.3, EAL4+ |
EAL4+, AVA_VAN.5, ALC_DVS.2 |
dgst |
07eb7b9cc0e585ca |
7bb1d4b3ded1f4fb |
heuristics/cert_id |
ANSSI-CC-2017/69 |
ANSSI-CC-2010/27 |
heuristics/cert_lab |
CEA |
THALES |
heuristics/cpe_matches |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_FSP.5, ALC_CMS.5, ALC_DVS.2, ATE_DPT.3, ADV_INT.2, ASE_TSS.2, AVA_VAN.5, ALC_CMC.5, ALC_TAT.2, ADV_TDS.4 |
ASE_CCL.1, ALC_DEL.1, ALC_CMC.4, ALC_DVS.2, AVA_VAN.5, ATE_FUN.1, ADV_ARC.1, ADV_TDS.3, ASE_TSS.1, ADV_IMP.2, ASE_SPD.1, ASE_REQ.2, ALC_CMS.4, ALC_TAT.1, ATE_COV.2, AGD_OPE.1, ASE_ECD.1, ADV_FSP.4, ASE_INT.1, AGD_PRE.1, ALC_LCD.1, ASE_OBJ.2 |
heuristics/extracted_versions |
8.1 |
1.01.1, 7.0 |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
ANSSI-CC-2017/47, BSI-DSZ-CC-0973-V2-2016, ANSSI-CC-2017/49, BSI-DSZ-CC-0955-V2-2016, ANSSI-CC-2010/03 |
ANSSI-CC-2009/48, ANSSI-CC-2010/36, ANSSI-CC-2009/36 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
ANSSI-CC-2009/05, BSI-DSZ-CC-0973-2016, ANSSI-CC-2009/26, ANSSI-CC-2009/06, ANSSI-CC-2017/47, BSI-DSZ-CC-0973-V2-2016, ANSSI-CC-2017/49, BSI-DSZ-CC-0955-V2-2016, BSI-DSZ-CC-0955-2016, ANSSI-CC-2010/03 |
ANSSI-CC-2009/48, ANSSI-CC-2009/36, BSI-DSZ-CC-0411-2007, ANSSI-CC-2010/36, ANSSI-CC-2009/11, BSI-DSZ-CC-0410-2007, BSI-DSZ-CC-0404-2007 |
heuristics/scheme_data |
- cert_id: ANSSI-CC-2017/69
- description: Le produit certifié est « Taiwan eID Applet BAC with CA and AA on ID-one V8.1 - Standard LDS Platform on NXP P6021M VB and on ID-One Cosmo v8.1-N - Large Platform on NXP P6022M VB, version 03 00 00 00 » développé par IDEMIA et NXP SEMICONDUCTORS GMBH. Le produit certifié est de type « carte à puce » avec et sans contact. Il implémente les fonctions de document de voyage électronique conformément
- developer: Chunghwa Telecom (CHT), IDEMIA, NXP Semiconductors GmbH
- enhanced:
- augmented: ADV_FSP.5, ADV_INT.2, ADV_TDS.4, ALC_CMS.5, ALC_DVS.2, ALC_TAT.2, ATE_DPT.3
- category: Cartes à puce
- cc_version: Critères Communs version 3.1r4
- cert_id: ANSSI-CC-2017/69
- certification_date: 2018-02-14
- developer: Chunghwa Telecom (CHT), IDEMIA, NXP Semiconductors GmbH
- evaluation_facility: CEA - LETI
- level: EAL4+
- mutual_recognition: SOG-IS CCRA
- protection_profile: PP BAC
- report_link: https://cyber.gouv.fr/sites/default/files/2018/03/anssi-cc-2017_69fr_idemia.pdf
- sponsor: IDEMIA
- target_link: https://cyber.gouv.fr/sites/default/files/2018/03/st-2017_69.pdf
- level: EAL4+
- product: Taiwan eID Applet BAC with CA and AA on ID-one V8.1 - Standard LDS Platform on NXP P6021M VB and on ID-One Cosmo v8.1-N - Large Platform on NXP P6022M VB (version 03 00 00 00)
- sponsor: IDEMIA
- url: https://cyber.gouv.fr/produits-certifies/taiwan-eid-applet-bac-ca-and-aa-id-one-v81-standard-lds-platform-nxp-p6021m-vb
|
- cert_id: ANSSI-CC-2010/27
- description: Le produit certifié est l'applet, d'Oberthur Technologies, ID One Classic v1.01.1 en configuration CNS, Classic ou CIE chargée sur la plateforme, d'Oberthur Technologies, Cosmo v7.0-n Large, Standard et Basic (modes dual ou contact) sur composants NXP. La TOE (Target Of Evaluation - cible d'évaluation) est une carte à puce destinée à être utilisée dans le cadre de projets mettan
- developer: Oberthur Technologies et NXP Semiconductors GmbH
- enhanced:
- augmented: ALC_DVS.2, AVA_VAN.5
- category: Cartes à puce
- cc_version: Critères Communs version 3.1
- cert_id: ANSSI-CC-2010/27
- certification_date: 2010-05-20
- developer: Oberthur Technologies et NXP Semiconductors GmbH
- evaluation_facility: CEACI (Thales Security Systems - CNES)
- level: EAL4+
- mutual_recognition: SOG-IS CCRA
- protection_profile: BSI-PP-0005-2002, BSI-PP-0006-2002
- report_link: https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2010-27fr.pdf
- sponsor: Oberthur Technologies
- target_link: https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2010-27en.pdf
- level: EAL4+
- product: Applet ID One Classic v1.01.1 en configuration CNS, Classic ou CIE chargée sur Cosmo v7.0-n Large, Standard et Basic (modes dual ou contact) sur composants NXP
- sponsor: Oberthur Technologies
- url: https://cyber.gouv.fr/produits-certifies/applet-id-one-classic-v1011-en-configuration-cns-classic-ou-cie-chargee-sur
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
ANSSI-CC-2017/48 |
ANSSI-CC-2009/48 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
ANSSI-CC-2017/48, BSI-DSZ-CC-0955-V2-2016 |
ANSSI-CC-2009/48 |
heuristics/verified_cpe_matches |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
anssi-cc-2017_69fr_idemia.pdf |
ANSSI-CC_2010-27fr.pdf |
pdf_data/report_frontpage |
- FR:
- cc_security_level: EAL 4 augmenté ADV_FSP.5, ADV_INT.2, ADV_TDS.4, ALC_CMS.5, ALC_DVS.2, ALC_TAT.2, ATE_DPT.3
- cc_version: Critères Communs version 3.1 révision 4
- cert_id: ANSSI-CC-2017/69
- cert_item: Taiwan eID Applet BAC with CA and AA on ID-one V8.1 - Standard LDS Platform on NXP P6021M VB and on ID- One Cosmo v8.1-N - Large Platform on NXP P6022M
- cert_item_version: Version 03 00 00 00
- cert_lab: CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France
- developer: Chunghwa Telecom (CHT) N°99 Dianyan Road – Yangmei Distric, Taiwan Taoyuan City 32661, Taiwan IDEMIA (ex Oberthur Technologies) 420 rue d’Estienne d’Orves, 92700 Colombes, France NXP Semiconductors GmbH Stresemannallee 101, 22539 Hamburg, Allemagne Commanditaire IDEMIA 420 rue d’Estienne d’Orves, 92700 Colombes, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: BSI-CC-PP-0055, [PP BAC], version 1.10 Machine Readable Travel Document with ICAO application, Basic Access Control
|
- FR:
- cc_security_level: EAL 4 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1
- cert_id: ANSSI-CC-2010/27
- cert_item: Applet ID One Classic v1.01.1 en configuration CNS, Classic ou CIE chargée sur Cosmo v7.0-n Large, Standard et Basic (modes dual ou contact) sur composants NXP
- cert_item_version: Version 1.01.1
- cert_lab: THALES - CEACI (T3S – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France Tél : +33 (0)5 62 88 28 01 ou 18, mél : [email protected]
- developer: Oberthur Technologies1 50 quai Michelet 92300 Levallois-Perret, France NXP Semiconductors GmbH1 Stresemannallee 101 D-22502 Hamburg, Germany Commanditaire Oberthur Technologies 50 quai Michelet 92300 Levallois-Perret, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: BSI-PP-0005-2002] : SSCD Type 2, version 1.04 [BSI-PP-0006-2002] : SSCD Type 3, version 1.05
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0955-V2-: 1
- BSI-DSZ-CC-0955-V2-2016: 1
- BSI-DSZ-CC-0973-V2-: 1
- BSI-DSZ-CC-0973-V2-2016: 1
- FR:
- ANSSI-CC-2010/03: 1
- ANSSI-CC-2010/03-M01: 1
- ANSSI-CC-2017/47: 2
- ANSSI-CC-2017/49: 1
- ANSSI-CC-2017/69: 19
|
- FR:
- ANSSI-CC-2007_02-M02: 1
- ANSSI-CC-2009_36: 1
- ANSSI-CC-2009_48: 6
- ANSSI-CC-2010/27: 21
- ANSSI-CC-2010_36: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0055: 1
- BSI-PP-0055-2009: 1
- BSI-PP-0084-2014: 1
|
- BSI:
- BSI-PP- 0005-2002: 1
- BSI-PP- 0006-2002: 1
- BSI-PP-0005-2002: 2
- BSI-PP-0006-2002: 2
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 1
- EAL 5: 1
- EAL 7: 1
- EAL2: 2
- EAL4: 1
- EAL5: 2
- EAL5+: 1
- EAL6: 1
- EAL7: 1
- ITSEC:
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 2
- EAL 5: 1
- EAL 7: 1
- EAL4: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_FSP.5: 2
- ADV_IMP: 1
- ADV_INT: 1
- ADV_INT.2: 2
- ADV_SPM: 1
- ADV_TDS: 1
- ADV_TDS.4: 2
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_CMS.5: 2
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 4
- ALC_FLR: 2
- ALC_TAT: 1
- ALC_TAT.2: 2
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_DPT.3: 2
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.3: 2
- AVA_VAN.5: 2
|
- ADO:
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_IMP.2: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
- Idemia:
- NXP:
- NXP: 52
- NXP Semiconductors: 1
- Oberthur:
- OBERTHUR: 4
- Oberthur Technologies: 1
|
- NXP:
- NXP: 25
- NXP Semiconductors: 1
- Oberthur:
- Oberthur: 1
- Oberthur Technologies: 10
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- ICAO:
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Category: Référence, Version
- /Comments: Développeur
- /Company: SGDSN/ANSSI
- /CreationDate: D:20180319144739+01'00'
- /Creator: Acrobat PDFMaker 11 pour Word
- /Keywords: ANSSI-CC-CER-F-07.026
- /ModDate: D:20180319165430+01'00'
- /Producer: Adobe PDF Library 11.0
- /SourceModified: D:20180319134734
- /Subject:
- /Title:
- pdf_file_size_bytes: 201754
- pdf_hyperlinks: mailto:[email protected], http://www.ssi.gouv.fr/
- pdf_is_encrypted: False
- pdf_number_of_pages: 18
|
- /CreationDate: D:20100525133424+02'00'
- /Keywords:
- /ModDate: D:20100525133424+02'00'
- /Producer: Acrobat Distiller 8.0.0 (Windows)
- pdf_file_size_bytes: 263844
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
pdf_data/st_filename |
st-2017_69.pdf |
ANSSI-CC-cible_2010-27en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0955-V2-: 2
- BSI-DSZ-CC-0973-V2-: 4
- FR:
- ANSSI-CC-017/48: 1
- ANSSI-CC-2017/49-M01: 1
- ANSSi-CC-PP-2009/02: 1
|
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-PP-0055: 2
- BSI-PP-0056: 2
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 4: 1
- EAL4: 3
- EAL4 augmented: 1
- EAL4+: 7
- EAL5: 11
- EAL5+: 12
|
- EAL:
- EAL 4+: 1
- EAL4: 10
- EAL4 augmented: 3
- EAL4+: 3
- EAL5: 1
- EAL5 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_FSP.5: 6
- ADV_INT.2: 8
- ADV_TDS.4: 6
- AGD:
- ALC:
- ALC_CMS.5: 6
- ALC_DVS.2: 18
- ALC_TAT.2: 6
- ASE:
- ATE:
- AVA:
- AVA_VAN: 7
- AVA_VAN.3: 2
- AVA_VAN.5: 10
|
- ADV:
- ADV_ARC.1: 6
- ADV_FSP.1: 3
- ADV_FSP.2: 4
- ADV_FSP.4: 8
- ADV_IMP.1: 5
- ADV_IMP.2: 1
- ADV_TDS.1: 2
- ADV_TDS.3: 10
- AGD:
- AGD_OPE.1: 6
- AGD_PRE.1: 6
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.1: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 2
- ALC_DVS.2: 8
- ALC_LCD.1: 3
- ALC_TAT.1: 3
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 4
- ASE_INT.1: 5
- ASE_OBJ.2: 3
- ASE_REQ.1: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 3
- ATE_FUN.1: 6
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_SAS: 4
- FAU_SAS.1: 7
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM: 12
- FCS_CKM.1: 9
- FCS_CKM.1.1: 1
- FCS_CKM.4: 4
- FCS_COP: 51
- FCS_COP.1: 19
- FCS_RND: 3
- FCS_RND.1: 9
- FCS_RND.1.1: 1
- FDP:
- FDP_ACC: 5
- FDP_ACC.1: 5
- FDP_ACC.2: 2
- FDP_ACF: 4
- FDP_ACF.1: 11
- FDP_DAU: 5
- FDP_DAU.1: 2
- FDP_ITC: 10
- FDP_ITC.1: 9
- FDP_UCT: 8
- FDP_UCT.1: 7
- FDP_UIT: 7
- FDP_UIT.1: 9
- FIA:
- FIA_AFL: 5
- FIA_AFL.1: 8
- FIA_API: 5
- FIA_API.1: 6
- FIA_API.1.1: 1
- FIA_UAU: 32
- FIA_UAU.1: 9
- FIA_UAU.4: 6
- FIA_UAU.5: 14
- FIA_UAU.6: 5
- FIA_UID: 7
- FIA_UID.1: 10
- FMT:
- FMT_LIM: 10
- FMT_LIM.1: 15
- FMT_LIM.1.1: 1
- FMT_LIM.2: 14
- FMT_LIM.2.1: 1
- FMT_MOF: 5
- FMT_MOF.1: 1
- FMT_MTD: 52
- FMT_MTD.1: 11
- FMT_SMF: 1
- FMT_SMF.1: 4
- FMT_SMR: 4
- FMT_SMR.1: 7
- FPT:
- FPT_EMS: 10
- FPT_EMS.1: 17
- FPT_EMS.1.1: 1
- FPT_EMS.1.2: 1
- FPT_FLS: 1
- FPT_FLS.1: 4
- FPT_PHP: 1
- FPT_PHP.3: 4
- FPT_TST: 7
- FPT_TST.1: 15
- FTP:
|
- FCS:
- FCS_CKM: 43
- FCS_CKM.1: 10
- FCS_CKM.2: 1
- FCS_CKM.4: 23
- FCS_CKM.4.1: 1
- FCS_COP: 69
- FCS_COP.1: 7
- FDP:
- FDP_ACC: 99
- FDP_ACC.1: 37
- FDP_ACF: 85
- FDP_ACF.1: 47
- FDP_ETC: 8
- FDP_ETC.1: 2
- FDP_IFC.1: 14
- FDP_ITC: 54
- FDP_ITC.1: 21
- FDP_ITC.2: 9
- FDP_RIP.1: 11
- FDP_RIP.1.1: 1
- FDP_SDI: 19
- FDP_SDI.2: 4
- FDP_UCT: 9
- FDP_UCT.1: 1
- FDP_UIT: 19
- FDP_UIT.1: 4
- FIA:
- FIA_AFL: 13
- FIA_AFL.1: 11
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 8
- FIA_ATD.1.1: 1
- FIA_UAU.1: 14
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID.1: 15
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MOF.1: 10
- FMT_MOF.1.1: 1
- FMT_MSA: 47
- FMT_MSA.1: 13
- FMT_MSA.2: 9
- FMT_MSA.2.1: 1
- FMT_MSA.3: 34
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 9
- FMT_MTD.1.1: 1
- FMT_SMF.1: 30
- FMT_SMF.1.1: 1
- FMT_SMR.1: 28
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_AMT.1: 5
- FPT_EMS.1: 1
- FPT_FLS.1: 8
- FPT_FLS.1.1: 1
- FPT_PHP.1: 8
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 10
- FPT_PHP.3.1: 1
- FPT_TEE.1: 13
- FPT_TEE.1.1: 1
- FPT_TEE.1.2: 1
- FPT_TST.1: 9
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 36
- FTP_ITC.1: 14
- FTP_TRP: 12
- FTP_TRP.1: 6
|
pdf_data/st_keywords/cc_claims |
|
- A:
- O:
- OE:
- OE.APPLET: 1
- OE.HI_VAD: 6
- OE.NATIVE: 1
- OE.VERIFICATION: 1
- OSP:
|
pdf_data/st_keywords/vendor |
- Idemia:
- Morpho:
- NXP:
- NXP: 7
- NXP Semiconductors: 4
- Oberthur:
- Oberthur: 3
- Oberthur Technologies: 14
|
- NXP:
- Oberthur:
- Oberthur Technologies: 162
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- 3DES:
- 3DES: 14
- TDES: 1
- Triple-DES: 1
- DES:
- constructions:
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-256: 2
- SHA-384: 1
- SHA-512: 2
- SHA2: 2
- SHA256: 1
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 1
- Physical tampering: 2
- fault injection: 1
- malfunction: 4
- SCA:
- DPA: 1
- physical probing: 3
- other:
- JIL: 1
- reverse engineering: 1
|
- FI:
- SCA:
- physical probing: 1
- side channel: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
- EF:
- EF.COM: 12
- EF.DG1: 20
- EF.DG13: 2
- EF.DG14: 5
- EF.DG15: 4
- EF.DG16: 18
- EF.DG2: 5
- EF.DG3: 5
- EF.DG4: 5
- EF.DG5: 4
- EF.SOD: 11
|
|
pdf_data/st_keywords/standard_id |
- BSI:
- CC:
- CCMB-2006-09-001: 1
- CCMB-2007-09-002: 1
- CCMB-2007-09-003: 1
- FIPS:
- FIPS PUB 140-2: 1
- FIPS PUB 180-3: 1
- FIPS PUB 186-3: 1
- FIPS PUB 197: 1
- FIPS PUB 46-3: 1
- FIPS PUB 81: 1
- ICAO:
- ISO:
- ISO/IEC 11770-2: 2
- ISO/IEC 14443: 6
- ISO/IEC 15946-1: 1
- ISO/IEC 15946-2: 1
- ISO/IEC 18013-3: 1
- ISO/IEC 7816-3: 2
- ISO/IEC 7816-4: 1
- ISO/IEC 9796-1: 1
- ISO/IEC 9796-2: 1
- ISO/IEC 9797-1: 3
- PKCS:
- RFC:
- SCP:
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- FIPS:
- PKCS:
|
pdf_data/st_keywords/javacard_version |
|
- JavaCard:
- Java Card 2.2: 2
- Java Card 2.2.1: 1
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- 3 Smartcard product life-cycle for the TOE 1 For details regarding phases see [COSMO-ST] §3.5. Out of scope TOE usage Applet Installation and Pre-personalisation Evaluation scope FQR : 110 5042 Issue: 1: 1
- Out of scope: 1
|
pdf_data/st_metadata |
- /CreationDate: D:20180208105430+01'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20180319164757+01'00'
- /Producer: Microsoft® Word 2016
- pdf_file_size_bytes: 1990717
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 83
|
- /CreationDate: D:20100525133408+02'00'
- /Keywords:
- /ModDate: D:20100525133408+02'00'
- /Producer: AFPL Ghostscript 8.50
- pdf_file_size_bytes: 958952
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 80
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |