name |
Canon iR4570/iR3570/iR2870/iR2270 Series iR Security Kit-B2 Version 2.03 |
Carte UpTeq NFC3.2.2_Generic v1.0 sur composant ST33G1M2-F |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
FR |
status |
archived |
archived |
not_valid_after |
07.10.2013 |
31.03.2025 |
not_valid_before |
09.09.2005 |
23.05.2016 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat%20ANSSI-CC-2016_22-S04.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0036_ecvr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2016-22.pdf |
st_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Cible-Lite-2016-22.pdf |
manufacturer |
Canon Inc. |
Gemalto / STMicroelectronics |
manufacturer_web |
https://www.canon.com/ |
https://www.gemalto.com/ |
security_level |
EAL3 |
ALC_DVS.2, EAL4+, AVA_VAN.5 |
dgst |
0b61e662b1de9f6c |
ba5484f422a0a49b |
heuristics/cert_id |
JISEC-CC-CRP-C0036 |
ANSSI-CC-2016/22 |
heuristics/cert_lab |
[] |
SERMA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
{} |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, ADV_COMP.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ADV_FSP.4, ASE_CCL.1 |
heuristics/extracted_versions |
2.03 |
3.2.2, 1.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2016/31 |
heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2014/46 |
heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2016/31 |
heuristics/report_references/indirectly_referencing |
{} |
ANSSI-CC-2014/46 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0386
- certification_date: 01.04.2013
- claim: EAL3+ ALC_FLR.2 PP
- enhanced:
- assurance_level: EAL3 Augmented with ALC_FLR.2
- cc_version: 3.1
- description: PRODUCT DESCRIPTION Description of TOE The TOE is a MFP (Multifunction Product) that offers Copy, Print, Universal Send, Fax, I-Fax, and Mail Box capabilities. The TOE is capable of fully implementing the functionality required by the IEEE Std 2600.1™-2009 defined as the Protection Profile for MFP. TOE security functionality The TOE embodies the following security functions. - User Authentication Function Function for identifying and authenticating the user. - Function Use Restriction Function Function for restricting the use of the MFP depending on the authority of the user. - Job Output Restriction Function Function for restricting access to print, cancel, and other jobs to the user that executed the job and the administrator. - Forward Received Jobs Function Function for restricting the machine from forwarding received data directly to the LAN. - HDD Data Erase Function Function for erasing unnecessary data from the hard disk by overwriting the data. - HDD Data Encryption Function Function for encrypting all data stored in the HDD, and for restricting the connection of the HDD Data Encryption & Mirroring Board with the correct MFP. - LAN Data Protection Function Function for protecting all IP packets that are communicated with an IT device. - Self-Test Function Function for testing the integrity of the executable code at startup. - Audit Log Function Function for generating audit logs on security events and allowing them to be viewed by the administrator. - Management Function Function for restricting device settings that influence security to be made only by the administrator.
- evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
- product: Canon imageRUNNER ADVANCE 8200 Series 2600.1 model (JP)
- product_type: Multifunction Product
- protection_profile: IEEE Std 2600.1-2009
- toe_version: 1.0
- vendor: Canon Inc.
- expiration_date: 01.05.2018
- supplier: Canon Inc.
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0386_it2398.html
- toe_japan_name: Canon imageRUNNER ADVANCE 8200 Series 2600.1 model (JP) 1.0
- toe_overseas_link: None
- toe_overseas_name: -----
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
ANSSI-CC-2014/46 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
ANSSI-CC-2014/46 |
heuristics/protection_profiles |
{} |
7b81fd67c02d34de |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-cible_PP-2010-04en.pdf |
pdf_data/cert_filename |
|
certificat ANSSI-CC-2016_22-S04.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author:
- /CreationDate: D:20201222180522+01'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20201222180522+01'00'
- /Producer: Acrobat Distiller 11.0 (Windows)
- /Title:
- pdf_file_size_bytes: 275772
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
c0036_ecvr.pdf |
ANSSI-CC-2016-22.pdf |
pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 4 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 4
- cert_id: ANSSI-CC-2016/22
- cert_item: Carte UpTeq NFC3.2.2_Generic v1.0 sur composant ST33G1M2-F
- cert_item_version: T1032507, Release A
- cert_lab: Serma Safety & Security 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
- developer: Gemalto La Vigie, Av du Jujubier ZI Athelia IV, 13705 La Ciotat Cedex, France STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, B.P. 2, 13106 Rousset, France Commanditaire Gemalto La Vigie, Av du Jujubier ZI Athelia IV, 13705 La Ciotat Cedex, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: PPUSIMB], version 2.0.2, (U)SIM Java Card Platform Protection Profile - Basic configuration
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- Certification No. C0036: 1
|
- FR:
- ANSSI-CC-2014/46: 4
- ANSSI-CC-2014/46-S01: 1
- ANSSI-CC-2016/22: 19
- ANSSI-CC-PP-2010/04: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 2
- EAL 5: 1
- EAL 7: 1
- EAL2: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- AGD_APP: 3
- AGD_OPE: 1
- AGD_PRE: 1
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Gemalto:
- STMicroelectronics:
|
pdf_data/report_keywords/eval_facility |
|
- Serma:
- Serma Safety & Security: 1
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20060123172731+09'00'
- /ModDate: D:20060123172731+09'00'
- /Producer: Acrobat Distiller 6.0.1 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 14795
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author:
- /CreationDate:
- /Creator: PDFCreator Version 1.2.1
- /Keywords:
- /ModDate:
- /Producer: GPL Ghostscript 9.02
- /Subject:
- /Title: Rapport ptf
- pdf_file_size_bytes: 215543
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 18
|
pdf_data/st_filename |
|
Cible-Lite-2016-22.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- FR:
- ANSSI-CC-2014/46: 1
- ANSSI-CC-PP-2010/03: 1
- NL:
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL4: 4
- EAL4 augmented: 2
- EAL4+: 2
- EAL5+: 1
|
pdf_data/st_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 5
- ADV_COMP.1: 2
- ADV_FSP.1: 3
- ADV_FSP.2: 2
- ADV_FSP.4: 9
- ADV_IMP.1: 4
- ADV_TDS.1: 2
- ADV_TDS.2: 1
- ADV_TDS.3: 4
- AGD:
- AGD_ADM: 1
- AGD_OPE.1: 9
- AGD_PRE.1: 3
- AGD_USR: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.1: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 5
- ALC_LCD.1: 3
- ALC_TAT.1: 3
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 4
- ASE_INT.1: 4
- ASE_OBJ.2: 2
- ASE_REQ.1: 2
- ASE_REQ.2: 1
- ASE_SPD.1: 3
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 3
- ATE_DPT.1: 2
- ATE_FUN.1: 5
- AVA:
|
pdf_data/st_keywords/cc_sfr |
|
- FAU:
- FAU_ARP.1: 19
- FAU_ARP.1.1: 1
- FAU_SAA.1: 3
- FAU_SAS.1: 2
- FCO:
- FCS:
- FCS_CKM: 105
- FCS_CKM.1: 28
- FCS_CKM.2: 10
- FCS_CKM.3: 5
- FCS_CKM.4: 57
- FCS_CKM.4.1: 1
- FCS_COP: 70
- FCS_COP.1: 23
- FCS_RND: 1
- FCS_RND.1: 10
- FCS_RND.1.1: 2
- FCS_RNG.1: 2
- FDP:
- FDP_ACC: 39
- FDP_ACC.1: 23
- FDP_ACC.2: 6
- FDP_ACF: 30
- FDP_ACF.1: 26
- FDP_IFC: 31
- FDP_IFC.1: 21
- FDP_IFC.2: 4
- FDP_IFF: 25
- FDP_IFF.1: 22
- FDP_IFF.1.2: 1
- FDP_IFF.1.4: 1
- FDP_ITC: 18
- FDP_ITC.1: 24
- FDP_ITC.2: 37
- FDP_ITT.1: 2
- FDP_RIP: 70
- FDP_RIP.1: 10
- FDP_ROL: 18
- FDP_ROL.1: 7
- FDP_SDI.2: 6
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UIT: 12
- FDP_UIT.1: 4
- FIA:
- FIA_ATD: 12
- FIA_ATD.1: 3
- FIA_UAU: 15
- FIA_UAU.1: 2
- FIA_UAU.4: 1
- FIA_UID: 28
- FIA_UID.1: 15
- FIA_UID.2: 1
- FIA_USB: 6
- FIA_USB.1: 3
- FMT:
- FMT_LIM.1: 5
- FMT_LIM.2: 5
- FMT_MOF: 7
- FMT_MOF.1: 1
- FMT_MSA: 123
- FMT_MSA.1: 18
- FMT_MSA.2: 2
- FMT_MSA.3: 26
- FMT_MSA.3.1: 2
- FMT_MTD: 20
- FMT_MTD.1: 3
- FMT_MTD.3: 1
- FMT_SMF: 45
- FMT_SMF.1: 28
- FMT_SMF.1.1: 1
- FMT_SMR: 51
- FMT_SMR.1: 39
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNO: 5
- FPR_UNO.1: 11
- FPR_UNO.1.1: 1
- FPT:
- FPT_FLS: 50
- FPT_FLS.1: 9
- FPT_FLS.1.1: 1
- FPT_ITT: 5
- FPT_ITT.1: 3
- FPT_PHP.3: 2
- FPT_RCV: 24
- FPT_RCV.3: 11
- FPT_RCV.4: 1
- FPT_TDC.1: 9
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST.1: 1
- FRU:
- FTP:
- FTP_ITC: 19
- FTP_ITC.1: 10
- FTP_TRP.1: 4
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.APPLET: 3
- A.APPS-PROVIDER: 4
- A.CONTROLLING-: 2
- A.CONTROLLING-AUTHORITY: 2
- A.KEY-ESCROW: 1
- A.MOBILE-: 1
- A.MOBILE-OPERATOR: 3
- A.OTA-ADMIN: 3
- A.PERSONALIZER: 1
- A.PRODUCTION: 1
- A.VERIFICA: 1
- A.VERIFICATION: 3
- A.VERIFICATION-: 2
- A.VERIFICATION-AUTHORITY: 1
- D:
- D.API_DATA: 3
- D.APP_CODE: 7
- D.APP_C_DATA: 5
- D.APP_I_DATA: 6
- D.APP_KEYS: 1
- D.APSD_KEYS: 3
- D.CARD_MNGT_DATA: 3
- D.CASD_KEYS: 3
- D.CRYPTO: 4
- D.GASD_KEYS: 2
- D.GP_CODE: 1
- D.ISD_KEYS: 3
- D.JCS_CODE: 3
- D.JCS_DATA: 5
- D.OPTIONAL_PF_SERVICE: 2
- D.PIN: 2
- D.SEC_DATA: 7
- D.VASD_KEYS: 2
- O:
- O.ALARM: 11
- O.APPLET: 16
- O.APPLI-AUTH: 8
- O.CARD-: 1
- O.CARD-MANAGEMENT: 25
- O.CIPHER: 10
- O.CODE_PKG: 14
- O.COMM_AUTH: 6
- O.COMM_CONFIDENT: 1
- O.COMM_CONFIDENTIALITY: 4
- O.COMM_INTEGRITY: 8
- O.DELETION: 4
- O.DOMAIN-RIGHTS: 7
- O.FIREWALL: 15
- O.GLOBAL_: 2
- O.GLOBAL_ARRAYS_CONFID: 4
- O.GLOBAL_ARRAYS_INTEG: 7
- O.INSTALL: 7
- O.JAVAOBJECT: 38
- O.KEY-: 1
- O.KEY-MNGT: 5
- O.LOAD: 9
- O.NATIVE: 7
- O.OBJ-DELETION: 7
- O.OPERATE: 19
- O.PIN-: 1
- O.PIN-MNGT: 8
- O.REALLOCATION: 5
- O.REMOTE_SERVICE_A: 2
- O.REMOTE_SERVICE_ACTIV: 1
- O.REMOTE_SERVICE_ACTIVATION: 5
- O.REMOTE_SERVICE_AUDIT: 7
- O.RESOURCES: 8
- O.RND: 11
- O.SCP: 20
- O.SCP-SUPPORT: 19
- O.SID: 9
- O.TRANSACTION: 5
- OE:
- OE.ACTIVATION-KEY-: 1
- OE.ACTIVATION-KEY-ESCROW: 2
- OE.AID-: 1
- OE.AID-MANAGEMENT: 3
- OE.AP: 1
- OE.AP-KEYS: 4
- OE.APPLET: 7
- OE.APPS-: 1
- OE.APPS-PROVIDER: 4
- OE.BASIC-: 2
- OE.BASIC-APPS-: 3
- OE.BASIC-APPS-VALIDATION: 9
- OE.CA: 1
- OE.CA-KEYS: 5
- OE.CODE-: 1
- OE.CODE-EVIDENCE: 10
- OE.CONTROLLING-: 2
- OE.CONTROLLING-AUTHORITY: 1
- OE.CONTROLLINGAUTHORITY: 1
- OE.GEMACTIVATE-ADMIN: 5
- OE.KEY: 1
- OE.KEY-: 2
- OE.KEY-CHANGE: 5
- OE.KEY-ESCROW: 4
- OE.KEY-GENERATION: 2
- OE.MOBILE-: 1
- OE.MOBILE-OPERATOR: 4
- OE.OPERATOR-: 1
- OE.OPERATOR-KEYS: 3
- OE.OTA-: 2
- OE.OTA-ADMIN: 3
- OE.OTA-LOADING: 3
- OE.OTA-SERVERS: 3
- OE.PERSONALIZER: 4
- OE.PRODUCTION: 5
- OE.QUOTAS: 5
- OE.SECURE-APPS-: 2
- OE.SECURE-APPS-CERTIFICATION: 1
- OE.SECURITY-: 1
- OE.SECURITY-DOMAINS: 2
- OE.SHARE-: 1
- OE.SHARE-CONTROL: 3
- OE.TRUSTED-APPS-: 3
- OE.TRUSTED-APPS-DEVELOPER: 2
- OE.TRUSTED-APPS_PRE-: 3
- OE.TRUSTED-APPS_PRE-ISSUANCE-LOADING: 1
- OE.VA: 1
- OE.VA-KEYS: 4
- OE.VERIFICATION: 20
- OE.VERIFICATION-: 1
- OE.VERIFICATION-AUTHORITY: 2
- OE.VERIFICATIONAUTHORITY: 1
- OP:
- OP.ARRAY_ACCESS: 4
- OP.CREATE: 7
- OP.DELETE_APPLET: 4
- OP.DELETE_PCKG: 3
- OP.DELETE_PCKG_APPLET: 3
- OP.INSTANCE_FIELD: 4
- OP.INVK_INTERFACE: 7
- OP.INVK_VIRTUAL: 6
- OP.JAVA: 5
- OP.PUT: 6
- OP.THROW: 5
- OP.TYPE_ACCESS: 5
- OSP:
- OSP.ACTIVATION-KEY-: 1
- OSP.ACTIVATION-KEY-ESCROW: 2
- OSP.AID-: 1
- OSP.AID-MANAGEMENT: 1
- OSP.APSD-KEYS: 3
- OSP.BASIC-APPS-: 1
- OSP.BASIC-APPS-VALIDATION: 1
- OSP.CASD-KEYS: 2
- OSP.KEY-: 2
- OSP.KEY-CHANGE: 2
- OSP.KEY-ESCROW: 4
- OSP.KEY-GENERATION: 2
- OSP.OPERATOR-: 1
- OSP.OPERATOR-KEYS: 1
- OSP.OTA-LOADING: 3
- OSP.OTA-SERVERS: 2
- OSP.PERSONALIZER: 3
- OSP.PRODUCTION: 6
- OSP.QUOTAS: 2
- OSP.RNG: 5
- OSP.SECURE-APPS-: 1
- OSP.SECURE-APPS-CERTIFICATION: 2
- OSP.SECURITY-: 1
- OSP.SECURITY-DOMAINS: 2
- OSP.SERVICE_AUDIT: 4
- OSP.SHARE-: 1
- OSP.SHARE-CONTROL: 2
- OSP.TRUSTED-APPS-: 1
- OSP.TRUSTED-APPS-DEVELOPER: 3
- OSP.TRUSTED-APPS_PRE-: 1
- OSP.TRUSTED-APPS_PRE-ISSUANCE-: 1
- OSP.TRUSTED-APPS_PRE-ISSUANCE-LOADING: 1
- OSP.VASD-KEYS: 3
- OSP.VERIFICATION: 2
- R:
- T:
- T.COM_EXPLOIT: 3
- T.CONFID-APPLI-: 1
- T.CONFID-APPLI-DATA: 3
- T.CONFID-JCS-: 2
- T.CONFID-JCS-CODE: 2
- T.CONFID-JCS-DATA: 1
- T.DELETION: 3
- T.EXE-CODE: 7
- T.INSTALL: 2
- T.INTEG-APPLI-: 4
- T.INTEG-APPLI-CODE: 3
- T.INTEG-APPLI-DATA: 5
- T.INTEG-JCS-: 1
- T.INTEG-JCS-CODE: 1
- T.INTEG-JCS-DATA: 3
- T.INTEG-USER-DATA: 2
- T.LIFE_CYCLE: 3
- T.NATIVE: 3
- T.OBJ-DELETION: 3
- T.PHYSICAL: 6
- T.RESOURCES: 2
- T.RND: 1
- T.SID: 8
- T.TOE_CLONING: 2
- T.TOE_IMPERSONATION: 3
- T.UNAUTHORIZED_ACCE: 1
- T.UNAUTHORIZED_ACCESS: 2
- T.UNAUTHORIZED_ACCESS_TO_SERVICE: 1
- T.UNAUTHORIZED_CARD_M: 1
- T.UNAUTHORIZED_CARD_MNGT: 1
- T.UNAUTHORIZED_TOE_: 2
- T.UNAUTHORIZED_TOE_CODE_UPDATE: 2
- T.UNAUTHORIZED_TOE_CODE_UPDATE_BLOCK: 1
|
pdf_data/st_keywords/vendor |
|
- Gemalto:
- NXP:
- STMicroelectronics:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
- MAC:
- CBC-MAC: 1
- CMAC: 3
- HMAC: 13
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- MD:
- SHA:
- SHA1:
- SHA2:
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
- SHA224: 5
- SHA256: 6
- SHA384: 6
- SHA512: 6
|
pdf_data/st_keywords/crypto_scheme |
|
- KA:
- Key Agreement: 1
- Key agreement: 1
- MAC:
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_PSK_WITH_3DES_EDE_CBC_SHA: 1
- TLS_PSK_WITH_AES_128_CBC_SHA: 1
- TLS_PSK_WITH_NULL_SHA: 1
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 4
- fault induction: 2
- malfunction: 7
- physical tampering: 3
- SCA:
- DPA: 1
- Leak-Inherent: 3
- Physical Probing: 2
- physical probing: 4
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- FIPS:
- FIPS 140-2: 1
- FIPS 180-3: 5
- FIPS PUB 186-2: 1
- FIPS PUB 197: 4
- FIPS PUB 46-3: 4
- FIPS PUB 81: 2
- ISO:
- ISO/IEC 10116: 4
- ISO/IEC 3309: 2
- ISO/IEC 9796-2: 1
- ISO/IEC 9797-1: 4
- NIST:
- PKCS:
- PKCS #1: 2
- PKCS#1: 9
- PKCS#5: 8
- RFC:
- RFC2409: 3
- RFC4279: 1
- RFC4785: 1
- SCP:
- SCP02: 6
- SCP03: 5
- SCP80: 8
- SCP81: 4
|
pdf_data/st_keywords/javacard_version |
|
- GlobalPlatform:
- JavaCard:
|
pdf_data/st_keywords/javacard_api_const |
|
- ALG:
- AES:
- ALG_AES_BLOCK_128_CBC_NOPAD: 1
- ALG_AES_BLOCK_128_ECB_NOPAD: 1
- ALG_AES_CBC_ISO9797_M1: 1
- ALG_AES_CBC_ISO9797_M2: 1
- ALG_AES_CBC_PKCS5: 1
- ALG_AES_ECB_ISO9797_M1: 1
- ALG_AES_ECB_ISO9797_M2: 1
- ALG_AES_ECB_PKCS5: 1
- ALG_AES_MAC_128_NOPAD: 1
- ALG_AES_MAC_192_NOPAD: 1
- ALG_AES_MAC_256_NOPAD: 1
- DES:
- ALG_DES_CBC_ISO9797_M1: 1
- ALG_DES_CBC_ISO9797_M2: 1
- ALG_DES_CBC_NOPAD: 1
- ALG_DES_CBC_PKCS5: 1
- ALG_DES_ECB_ISO9797_M1: 1
- ALG_DES_ECB_ISO9797_M2: 1
- ALG_DES_ECB_NOPAD: 1
- ALG_DES_ECB_PKCS5: 1
- ALG_DES_MAC4_ISO9797_1_M2_ALG3: 1
- ALG_DES_MAC4_ISO9797_M1: 1
- ALG_DES_MAC4_ISO9797_M2: 1
- ALG_DES_MAC4_NOPAD: 1
- ALG_DES_MAC4_PKCS5: 1
- ALG_DES_MAC8_ISO9797_1_M2_ALG3: 1
- ALG_DES_MAC8_ISO9797_M1: 1
- ALG_DES_MAC8_ISO9797_M2: 1
- ALG_DES_MAC8_NOPAD: 1
- ALG_DES_MAC8_PKCS5: 1
- ECDSA:
- ALG_ECDSA_SHA: 1
- ALG_ECDSA_SHA_224: 1
- ALG_ECDSA_SHA_256: 1
- ALG_ECDSA_SHA_384: 1
- ALG_ECDSA_SHA_512: 1
- HMAC:
- ALG_HMAC_MD5: 1
- ALG_HMAC_SHA1: 1
- ALG_HMAC_SHA_256: 1
- ALG_HMAC_SHA_384: 1
- ALG_HMAC_SHA_512: 1
- ISO3309:
- ALG_ISO3309_CRC16: 1
- ALG_ISO3309_CRC32: 1
- MD:
- RSA:
- ALG_RSA_MD5_PKCS1: 1
- ALG_RSA_MD5_PKCS1_PSS: 1
- ALG_RSA_MD5_RFC2409: 1
- ALG_RSA_NOPAD: 1
- ALG_RSA_PKCS1_OAEP: 1
- ALG_RSA_SHA_224_PKCS1: 1
- ALG_RSA_SHA_224_PKCS1_PSS: 1
- ALG_RSA_SHA_256_PKCS1: 1
- ALG_RSA_SHA_256_PKCS1_PSS: 1
- ALG_RSA_SHA_384_PKCS1: 1
- ALG_RSA_SHA_384_PKCS1_PSS: 1
- ALG_RSA_SHA_512_PKCS1: 1
- ALG_RSA_SHA_512_PKCS1_PSS: 1
- ALG_RSA_SHA_ISO9796: 1
- ALG_RSA_SHA_PKCS1: 1
- ALG_RSA_SHA_PKCS1_PSS: 1
- ALG_RSA_SHA_RFC2409: 1
- SHA:
- ALG_SHA_224: 1
- ALG_SHA_256: 1
- ALG_SHA_384: 1
- ALG_SHA_512: 1
- misc:
|
pdf_data/st_keywords/javacard_packages |
|
- javacard:
- javacard.framework: 2
- javacard.security: 5
- javacardx:
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- out of scope: 1
- parameters for cryptographic operations, the use of these other values are not advised; and clearly out of scope of the TOE. See [AGD] for details. JCS.RNG This security function provides random value using a: 1
|
pdf_data/st_metadata |
|
- /Author: mbruyere
- /CreationDate: D:20160519142646+02'00'
- /Creator: Microsoft® Word 2013
- /ModDate: D:20160519142646+02'00'
- /Producer: Microsoft® Word 2013
- pdf_file_size_bytes: 3765581
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 130
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
False |
True |
state/st/download_ok |
False |
True |
state/st/extract_ok |
False |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |