Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Huawei UNC V001R001C20SPC200 with Patch V100R001C20SPH230
2019-7-INF-4068
Plateforme Java Card MultiApp V5.0 version 5.0
ANSSI-CC-2021/42
name Huawei UNC V001R001C20SPC200 with Patch V100R001C20SPH230 Plateforme Java Card MultiApp V5.0 version 5.0
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme ES FR
not_valid_after 21.09.2028 14.10.2026
not_valid_before 21.06.2023 14.10.2021
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-07_Certificado.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2021_42.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-07-INF-4068.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2021_42.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-07_ST.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2021_42en.pdf
manufacturer Huawei Technologies Co., Ltd. THALES DIS FRANCE SA
manufacturer_web https://www.huawei.com https://www.thalesgroup.com/en/europe/france
security_level EAL4+, ALC_FLR.1 EAL6+, ALC_FLR.1
dgst 0e8a25a9fbdc32c5 58725b1e960799a8
heuristics/cert_id 2019-7-INF-4068 ANSSI-CC-2021/42
heuristics/extracted_sars ATE_COV.2, ALC_FLR.1, ALC_TAT.1, ASE_INT.1, ALC_CMC.4, ATE_FUN.1, ALC_DEL.1, AGD_OPE.1, ADV_ARC.1, ADV_IMP.1, ASE_CCL.1, AVA_VAN.3, ASE_REQ.2 ASE_INT.1, ALC_DVS.2, ADV_TDS.5, ASE_ECD.1, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ATE_FUN.2, ALC_TAT.3, ADV_FSP.5, AGD_OPE.1, AGD_PRE.1, ATE_DPT.3, ADV_ARC.1, ALC_CMC.5, ADV_IMP.2, ASE_OBJ.2, ASE_REQ.2, ADV_INT.3, ATE_IND.2, ASE_CCL.1, ATE_COV.3, ADV_SPM.1
heuristics/extracted_versions - 5.0
heuristics/report_references/directly_referenced_by {} ANSSI-CC-2022/23, ANSSI-CC-2022/10, ANSSI-CC-2022/37, ANSSI-CC-2022/53
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-1107-2020
heuristics/report_references/indirectly_referenced_by {} ANSSI-CC-2022/22, ANSSI-CC-2022/12, ANSSI-CC-2022/53, ANSSI-CC-2022/11, ANSSI-CC-2022/55, ANSSI-CC-2022/54, ANSSI-CC-2022/57, ANSSI-CC-2022/56, ANSSI-CC-2022/52, ANSSI-CC-2022/23, ANSSI-CC-2022/10, ANSSI-CC-2022/37, ANSSI-CC-2022/13
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-1107-2020
heuristics/scheme_data
  • category: Others
  • certification_date: 21.06.2023
  • enhanced:
    • category: Others
    • cc_version: Common Criteria 3.1 release 5
    • cert_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1852
    • certification_date: 21.06.2023
    • description: The TOE is server service software that is deployed on CloudOS, which serves as a united network controller (UNC). UNC authenticates mobile subscribers onto the network system and tracks active and idle subscribers on the network system. UNC pages mobile subscribers when it is triggered by new data arriving for an idle subscriber at the assigned Serving GW (gateway). When a subscriber attaches to an eNodeB, the eNodeB select a UNC. UNC in turn selects the Serving GW and the PDN GW that will handle bearer packets of the subscriber. There are procedures to relocate a subscriber to a new UNC (and potentially a new Serving GW), when an active or idle subscriber moves to a new area outside of the current UNC control.
    • evaluation_facility: DEKRA Testing and Certification S.A.U.
    • level: EAL4 + ALC_FLR.1
    • manufacturer: Huawei Technologies Co., Ltd.
    • report_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1853
    • status: Certified
    • target_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1851
    • type: Product
  • manufacturer: Huawei Technologies Co., Ltd.
  • product: Huawei UNC V001R001C20SPC200 with Patch V100R001C20SPH230
  • product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/995-huawei-unc-v001r001c20spc200-with-patch-v100r001c20sph230
heuristics/st_references/directly_referenced_by {} ANSSI-CC-2022/53
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-1107-2020
heuristics/st_references/indirectly_referenced_by {} ANSSI-CC-2022/53
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-1107-2020
heuristics/protection_profiles {} 94167fd161e87d71
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0099b_pdf.pdf
pdf_data/cert_filename 2019-07_Certificado.pdf certificat-anssi-cc-2021_42.pdf
pdf_data/cert_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2021/42: 2
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-099-V2-2020: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 4: 1
    • EAL4: 1
  • EAL:
    • EAL2: 1
    • EAL6: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 2
    • ALC_FLR.1: 1
  • ALC:
    • ALC_FLR.1: 1
pdf_data/cert_keywords/cc_claims
  • A:
    • A.U: 1
  • O:
    • O.E: 1
  • R:
    • R.C: 1
pdf_data/cert_keywords/vendor
  • Huawei:
    • Huawei: 2
    • Huawei Technologies Co: 2
pdf_data/cert_keywords/eval_facility
  • CEA-LETI:
    • CEA-LETI: 2
pdf_data/cert_metadata
  • /Author:
  • /CreationDate:
  • /Creator:
  • /Keywords:
  • /ModDate:
  • /Producer:
  • /Subject:
  • /Title:
  • /Trapped:
  • pdf_file_size_bytes: 934591
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
  • /Author:
  • /CreationDate: D:20211018162825+02'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20211018162825+02'00'
  • /Producer: Acrobat Distiller 11.0 (Windows)
  • /Title:
  • pdf_file_size_bytes: 293555
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename 2019-07-INF-4068.pdf anssi-cc-2021_42.pdf
pdf_data/report_frontpage
  • FR:
  • FR:
pdf_data/report_keywords/cc_cert_id
  • ES:
    • 2019-7-INF-4068- v1: 1
  • DE:
    • BSI-DSZ-CC-1107-2020: 1
  • FR:
    • ANSSI-CC-2021/42: 2
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0099-V2-2020: 2
    • BSI-PP-0084-2014: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 1
    • EAL 4: 2
    • EAL2: 1
    • EAL4: 8
  • ITSEC:
    • ITSEC Evaluation: 1
  • EAL:
    • EAL 6: 1
    • EAL2: 2
    • EAL6+: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 ElevĂ©: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_IMP.1: 1
  • AGD:
    • AGD_OPE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_DEL.1: 1
    • ALC_FLR: 3
    • ALC_FLR.1: 9
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_INT.1: 1
    • ASE_REQ.2: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_FUN.1: 1
  • AVA:
    • AVA_VAN.3: 1
  • AGD:
    • AGD_ALP: 1
    • AGD_OPE: 4
    • AGD_PRE: 2
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.1: 1
  • AVA:
    • AVA_VAN: 1
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 1
    • FAU_SAR.1: 1
    • FAU_STG.1: 1
  • FDP:
    • FDP_ACC.1: 1
  • FIA:
    • FIA_ATD.1: 1
    • FIA_UAU.4: 1
    • FIA_UID.2: 1
  • FMT:
    • FMT_MOF.1: 1
    • FMT_MSA.3: 1
    • FMT_SMF.1: 1
  • FTA:
    • FTA_MCS: 2
    • FTA_SSL.3: 1
  • FTP:
    • FTP_TRP.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.U: 4
pdf_data/report_keywords/vendor
  • Huawei:
    • Huawei: 20
    • Huawei Technologies Co: 3
  • Microsoft:
    • Microsoft: 2
  • Gemalto:
    • Gemalto: 5
  • Infineon:
    • Infineon Technologies AG: 2
pdf_data/report_keywords/eval_facility
  • DEKRA:
    • DEKRA Testing and Certification: 4
  • CEA-LETI:
    • CEA - LETI: 1
  • CESTI:
    • CESTI: 3
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA256: 2
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 3
  • TLS:
    • TLS:
      • TLS: 3
  • PACE:
    • PACE: 1
pdf_data/report_keywords/cplc_data
  • ICFab:
    • IC Fabricator: 1
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS31: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
pdf_data/report_keywords/javacard_version
  • JavaCard:
    • Java Card 3.1: 3
pdf_data/report_metadata
  • /Author:
  • /CreationDate: D:20211018162639+02'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20211018162639+02'00'
  • /Producer: Acrobat Distiller 11.0 (Windows)
  • /Title:
  • pdf_file_size_bytes: 195709
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 17
pdf_data/st_filename 2019-07_ST.pdf anssi-cible-cc-2021_42en.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1107-2020: 1
  • NL:
    • CC-1: 2
    • CC-2: 3
    • CC-3: 4
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0068-V2-2011-MA-01: 1
    • BSI-CC-PP-0084-: 1
    • BSI-CC-PP-0099-V2-2020: 1
    • BSI-PP- 0055-2009: 1
    • BSI-PP-0056-V2-MA-2012: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 2
  • EAL:
    • EAL 6+: 1
    • EAL6: 31
    • EAL6 augmented: 1
    • EAL6+: 3
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_FLR: 1
    • ALC_FLR.1: 2
    • ALC_LCD: 1
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 1
  • ADV:
    • ADV_ARC: 2
    • ADV_ARC.1: 8
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 2
    • ADV_FSP.4: 2
    • ADV_FSP.5: 5
    • ADV_IMP: 1
    • ADV_IMP.1: 6
    • ADV_IMP.2: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM.1: 8
    • ADV_TDS: 1
    • ADV_TDS.1: 2
    • ADV_TDS.3: 3
    • ADV_TDS.4: 7
    • ADV_TDS.5: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 7
    • AGD_PRE: 1
    • AGD_PRE.1: 6
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMC.5: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 2
    • ALC_DVS.1: 1
    • ALC_DVS.2: 3
    • ALC_FLR.1: 5
    • ALC_LCD.1: 4
    • ALC_TAT.1: 2
    • ALC_TAT.2: 3
    • ALC_TAT.3: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 2
    • ATE_COV.3: 1
    • ATE_DPT.1: 1
    • ATE_DPT.3: 2
    • ATE_FUN.1: 6
    • ATE_FUN.2: 1
    • ATE_IND.2: 2
  • AVA:
    • AVA_VAN.5: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 8
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 5
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 6
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.3: 4
    • FAU_SAR.3.1: 1
    • FAU_STG.1: 7
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 4
    • FAU_STG.3.1: 1
  • FDP:
    • FDP_ACC.1: 9
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 7
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 1
  • FIA:
    • FIA_AFL.1: 6
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 5
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 5
    • FIA_SOS.1.1: 1
    • FIA_UAU.2: 6
    • FIA_UAU.2.1: 1
    • FIA_UAU.4: 4
    • FIA_UAU.4.1: 1
    • FIA_UID.1: 4
    • FIA_UID.2: 6
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF.1: 5
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 4
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 7
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SAE.1: 3
    • FMT_SAE.1.1: 1
    • FMT_SAE.1.2: 1
    • FMT_SMF.1: 7
    • FMT_SMF.1.1: 2
    • FMT_SMR.1: 13
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 3
  • FTA:
    • FTA_MCS: 10
    • FTA_MCS.1.1: 2
    • FTA_MCS.1.2: 2
    • FTA_SSL.3: 5
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 5
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 5
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_ARP.1: 15
    • FAU_ARP.1.1: 1
    • FAU_SAA.1: 2
    • FAU_SAS.1: 2
  • FCO:
    • FCO_NRO: 5
    • FCO_NRO.2: 3
  • FCS:
    • FCS_CKM: 62
    • FCS_CKM.1: 29
    • FCS_CKM.1.1: 3
    • FCS_CKM.2: 10
    • FCS_CKM.2.1: 1
    • FCS_CKM.3: 5
    • FCS_CKM.3.1: 1
    • FCS_CKM.4: 28
    • FCS_CKM.4.1: 2
    • FCS_CMK.4: 2
    • FCS_COP: 66
    • FCS_COP.1: 31
    • FCS_COP.1.1: 5
    • FCS_RNG: 25
    • FCS_RNG.1: 14
    • FCS_RNG.1.1: 3
    • FCS_RNG.1.2: 1
  • FDP:
    • FDP_ACC: 44
    • FDP_ACC.1: 20
    • FDP_ACC.2: 6
    • FDP_ACF: 39
    • FDP_ACF.1: 25
    • FDP_IFC: 24
    • FDP_IFC.1: 14
    • FDP_IFC.2: 2
    • FDP_IFF: 16
    • FDP_IFF.1: 14
    • FDP_ITC: 11
    • FDP_ITC.1: 12
    • FDP_ITC.2: 17
    • FDP_ITT.1: 2
    • FDP_RIP: 97
    • FDP_RIP.1: 11
    • FDP_RIP.1.1: 1
    • FDP_ROL: 13
    • FDP_ROL.1: 5
    • FDP_SDC.1: 2
    • FDP_SDI: 8
    • FDP_SDI.2: 4
    • FDP_UCT.1: 2
    • FDP_UIT: 6
    • FDP_UIT.1: 4
  • FIA:
    • FIA_AFL: 21
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_API: 1
    • FIA_API.1: 2
    • FIA_ATD: 12
    • FIA_ATD.1: 3
    • FIA_UAU: 64
    • FIA_UAU.1: 6
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UAU.4: 1
    • FIA_UAU.4.1: 1
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6.1: 1
    • FIA_UID: 42
    • FIA_UID.1: 18
    • FIA_UID.1.1: 2
    • FIA_UID.1.2: 2
    • FIA_UID.2: 1
    • FIA_USB: 6
    • FIA_USB.1: 3
  • FMT:
    • FMT_LIM: 34
    • FMT_LIM.1: 17
    • FMT_LIM.1.1: 3
    • FMT_LIM.2: 16
    • FMT_LIM.2.1: 3
    • FMT_MSA: 96
    • FMT_MSA.1: 13
    • FMT_MSA.2: 2
    • FMT_MSA.3: 21
    • FMT_MTD: 57
    • FMT_MTD.1: 13
    • FMT_MTD.3: 1
    • FMT_SMF: 78
    • FMT_SMF.1: 29
    • FMT_SMF.1.1: 2
    • FMT_SMR: 88
    • FMT_SMR.1: 38
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 2
  • FPR:
    • FPR_UNO: 5
    • FPR_UNO.1: 8
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_EMS: 4
    • FPT_EMS.1: 14
    • FPT_EMS.1.1: 3
    • FPT_EMS.1.2: 3
    • FPT_FLS: 47
    • FPT_FLS.1: 16
    • FPT_FLS.1.1: 2
    • FPT_ITT: 6
    • FPT_ITT.1: 2
    • FPT_PHP: 7
    • FPT_PHP.3: 17
    • FPT_PHP.3.1: 1
    • FPT_RCV: 12
    • FPT_RCV.3: 4
    • FPT_RCV.4: 2
    • FPT_TDC.1: 7
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TST: 8
    • FPT_TST.1: 15
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_TST.2: 2
  • FRU:
    • FRU_FLT.2: 2
  • FTP:
    • FTP_ITC: 17
    • FTP_ITC.1: 7
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP: 4
    • FTP_TRP.1: 7
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN_CREDENTIALS_SECU: 1
    • A.ADMIN_CREDENTIALS_SECURE: 2
    • A.COMPONENTS_RUNNING: 3
    • A.ENVIRONMENT_ACL: 3
    • A.LIMITED_FUNCTIONALITY: 3
    • A.NETWORK_SEGREGATION: 3
    • A.PHYSICAL_PROTECTION: 3
    • A.RESIDUAL_INFORMATION: 3
    • A.TIME: 3
    • A.TRUSTED_ADMINISTRATOR: 3
  • O:
    • O.AUDIT: 5
    • O.COMMUNICA: 1
    • O.COMMUNICATI: 1
    • O.COMMUNICATION: 5
    • O.IDAUTH: 8
  • OE:
    • OE.ADMIN_CRE: 1
    • OE.ADMIN_CREDENTI: 2
    • OE.ADMIN_CREDENTIALS_SEC: 2
    • OE.COMPONEN: 1
    • OE.COMPONENTS_RU: 1
    • OE.COMPONENTS_RUNNING: 1
    • OE.ENVIRONM: 1
    • OE.ENVIRONMENT_AC: 1
    • OE.ENVIRONMENT_ACL: 1
    • OE.LIMITED_FU: 1
    • OE.LIMITED_FUNCTIO: 1
    • OE.LIMITED_FUNCTIONALITY: 1
    • OE.NETWORK_: 1
    • OE.NETWORK_SEGRE: 1
    • OE.NETWORK_SEGREGATION: 1
    • OE.NETWOR_SEGREG: 1
    • OE.NETWOR_SEGREGATION: 1
    • OE.PHYSICAL: 4
    • OE.RESIDUAL_I: 1
    • OE.RESIDUAL_INFOR: 3
    • OE.RESIDUAL_INFORMATION: 3
    • OE.TIME: 7
    • OE.TRUSTED_A: 1
    • OE.TRUSTED_ADMIN: 4
  • OSP:
    • OSP: 1
    • OSP.AUDIT: 4
  • T:
    • T.UNAUTHORIZED_: 2
    • T.UNAUTHORIZED_ADMINISTR: 1
    • T.UNTRUSTED_COMMUNICATI: 2
    • T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
    • T.WEAK_AUTHENTICATION_E: 2
    • T.WEAK_AUTHENTICATION_ENDPOINTS: 1
    • T.WEAK_CRYPTOGRAPHY: 3
  • A:
    • A.CAP_FILE: 3
    • A.DELETION: 3
    • A.OS-UPDATE-EVIDENCE: 3
    • A.SECURE_ACODE_MANAGEMENT: 3
    • A.VERIFICATION: 3
  • D:
    • D.API_DATA: 3
    • D.APP_CODE: 6
    • D.APP_C_DATA: 3
    • D.APP_I_DATA: 5
    • D.APP_KEYS: 1
    • D.CRYPTO: 5
    • D.JCS_CODE: 6
    • D.JCS_DATA: 8
    • D.OS-: 1
    • D.OS-UPDATE-CODE-ID: 3
    • D.OS-UPDATE_ADDITIONALCODE: 5
    • D.OS-UPDATE_DEC-KEY: 2
    • D.OS-UPDATE_SGNVER-KEY: 2
    • D.PIN: 4
    • D.SEC_DATA: 7
  • O:
    • O.AES: 1
    • O.ALARM: 15
    • O.APPLET: 28
    • O.ARRAY_VIEWS_CONFID: 7
    • O.ARRAY_VIEWS_INTEG: 3
    • O.CARD-MANAGEMENT: 1
    • O.CARD_MANAGEMENT: 17
    • O.CIPHER: 10
    • O.CODE_CAP_FILE: 23
    • O.CONFID-OS-UPDATE: 3
    • O.DELETION: 4
    • O.FIREWALL: 12
    • O.GLOBAL_ARRAYS_CONFID: 9
    • O.GLOBAL_ARRAYS_INTEG: 5
    • O.INSTALL: 7
    • O.JAVAOBJECT: 68
    • O.KEY-MNGT: 6
    • O.LOAD: 11
    • O.NATIVE: 11
    • O.OBJ-DELETION: 4
    • O.OBJ_DELETION: 4
    • O.OPERATE: 15
    • O.PIN-MNGT: 6
    • O.PIN_MNGT: 4
    • O.REALLOCATION: 5
    • O.RESOURCES: 9
    • O.RND: 2
    • O.RNG: 10
    • O.SCP: 31
    • O.SECURE_AC_ACTIVATION: 4
    • O.SECURE_LOAD_ACODE: 9
    • O.SID: 13
    • O.TDES: 1
    • O.TOE_IDENTIFICATION: 6
    • O.TRANSACTION: 6
  • OE:
    • OE.CAP_FILE: 5
    • OE.CARD-: 1
    • OE.CARD-MANAGEMENT: 1
    • OE.CODE-: 1
    • OE.CODE-EVIDENCE: 10
    • OE.OS-UPDATE-ENCRYPTION: 5
    • OE.OS-UPDATE-EVIDENCE: 2
    • OE.SCP: 2
    • OE.SECURE_ACODE_MANAGEMENT: 2
    • OE.VERIFICATION: 25
  • OP:
    • OP.ARRAY_AASTORE: 3
    • OP.ARRAY_ACCESS: 7
    • OP.ARRAY_LENGTH: 3
    • OP.ARRAY_T_ALOAD: 3
    • OP.ARRAY_T_ASTORE: 3
    • OP.CREATE: 11
    • OP.DELETE_APPLET: 6
    • OP.DELETE_CAP_FILE: 4
    • OP.DELETE_CAP_FILE_APPLET: 4
    • OP.INSTANCE_FIELD: 6
    • OP.INVK_INTERFACE: 10
    • OP.INVK_VIRTUAL: 8
    • OP.JAVA: 8
    • OP.PUT: 8
    • OP.PUTFIELD: 1
    • OP.PUTSTATIC: 1
    • OP.THROW: 7
    • OP.TYPE_ACCESS: 7
  • OSP:
    • OSP.ADDITIONAL_CODE_ENCRYPTION: 3
    • OSP.ADDITIONAL_CODE_SIGNING: 3
    • OSP.ATOMIC_ACTIVATION: 3
    • OSP.RNG: 3
    • OSP.TOE_IDENTIFICATION: 3
    • OSP.VERIFICATION: 3
  • OT:
    • OT.X: 1
  • R:
    • R.JAVA: 12
  • T:
    • T.CONFID-APPLI-DATA: 3
    • T.CONFID-JCS-CODE: 3
    • T.CONFID-JCS-DATA: 3
    • T.CONFID-OS-UPDATE_LOAD: 3
    • T.DELETION: 3
    • T.EXE-CODE: 6
    • T.FAKE-SGNVER-KEY: 3
    • T.INSTALL: 3
    • T.INTEG-APPLI-CODE: 6
    • T.INTEG-APPLI-DATA: 6
    • T.INTEG-JCS-CODE: 3
    • T.INTEG-JCS-DATA: 3
    • T.INTEG-OS-UPDATE_LOAD: 3
    • T.NATIVE: 3
    • T.OBJ-DELETION: 3
    • T.PHYSICAL: 3
    • T.RESOURCES: 3
    • T.SID: 6
    • T.UNAUTHORIZED_TOE_CODE_UPDATE: 3
    • T.WRONG-UPDATE-STATE: 3
pdf_data/st_keywords/vendor
  • Huawei:
    • Huawei: 23
    • Huawei Technologies Co: 3
  • Microsoft:
    • Microsoft: 2
  • Gemalto:
    • Gemalto: 9
  • Infineon:
    • Infineon: 17
  • Thales:
    • Thales: 42
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 7
  • constructions:
    • MAC:
      • HMAC: 4
  • AES_competition:
    • AES:
      • AES: 29
      • AES-256: 2
  • DES:
    • 3DES:
      • 3DES: 2
      • TDEA: 1
      • TDES: 14
      • Triple-DES: 3
    • DES:
      • DES: 20
  • constructions:
    • MAC:
      • CMAC: 3
      • HMAC: 3
      • KMAC: 3
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
  • ECC:
    • ECC:
      • ECC: 13
    • ECDH:
      • ECDH: 8
    • ECDSA:
      • ECDSA: 4
  • FF:
    • DH:
      • DH: 14
      • Diffie-Hellman: 5
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA256: 3
      • SHA384: 1
  • SHA:
    • SHA1:
      • SHA-1: 4
      • SHA1: 2
    • SHA2:
      • SHA-224: 2
      • SHA-256: 2
      • SHA-384: 1
      • SHA-512: 2
      • SHA2: 1
      • SHA224: 1
    • SHA3:
      • SHA3: 2
      • SHA3-384: 1
      • SHA3-512: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 1
  • KA:
    • Key Agreement: 6
    • Key agreement: 2
  • MAC:
    • MAC: 14
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 45
  • TLS:
    • SSL:
      • SSL: 12
    • TLS:
      • TLS: 33
      • TLS1.2: 1
  • VPN:
    • VPN: 1
  • PACE:
    • PACE: 158
pdf_data/st_keywords/randomness
  • PRNG:
    • PRNG: 1
  • RNG:
    • RND: 2
    • RNG: 36
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
  • GCM:
    • GCM: 1
  • CBC:
    • CBC: 3
  • ECB:
    • ECB: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 5
    • Physical Tampering: 3
    • fault induction: 2
    • malfunction: 8
    • physical tampering: 1
  • SCA:
    • DPA: 2
    • Leak-Inherent: 2
    • SPA: 1
    • physical probing: 6
    • timing attacks: 1
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 2
pdf_data/st_keywords/cplc_data
  • ICFab:
    • IC Fabricator: 1
  • ICType:
    • IC Type: 1
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.DG1: 6
    • EF.DG16: 6
    • EF.DG3: 1
    • EF.DG4: 1
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS20: 1
    • AIS31: 6
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS 197: 1
    • FIPS180-2: 1
    • FIPS197: 5
  • ICAO:
    • ICAO: 1
  • NIST:
    • SP 800-67: 1
  • PKCS:
    • PKCS#1: 7
    • PKCS#5: 5
  • SCP:
    • SCP01: 4
    • SCP02: 4
    • SCP03: 5
pdf_data/st_keywords/javacard_version
  • JavaCard:
    • Java Card 3.1: 8
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 7
pdf_data/st_keywords/javacard_packages
  • java:
    • java.lang: 1
  • javacard:
    • javacard.framework: 3
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • 1, are out of the scope of the SPM as they are linked to the applet loading or deletion that is out of scope of the SPM boundaries limited to VM opcodes MultiApp V5: JCS Security Target ST Ref: D1494591_LITE: 1
    • Context, the Selected Applet Context, and the Active Applets Note: the Selected Applet context is out of scope of the VM functionalities. It is a process that occurs prior to VM start MultiApp V5: JCS Security: 1
    • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
    • out of scope: 4
    • the scope because done before the JCVM entering (selection of the applet) Note: The Array View is out of scope of this modelisation ADV_SPM.1.2D For each policy covered by the formal security policy model, the: 1
pdf_data/st_metadata
  • /Author: D1417544
  • /CreationDate: D:20211021152816+02'00'
  • /Creator: Microsoft® Word 2016
  • /Keywords: 28-03-2018
  • /ModDate: D:20211021152816+02'00'
  • /Producer: Microsoft® Word 2016
  • /Subject: 1.12
  • /Title: MultiApp V4.1: JCS Security Target
  • pdf_file_size_bytes: 3796482
  • pdf_hyperlinks: https://www.ssi.gouv.fr/uploads/2021/03/anssi-guide-mecanismes_crypto-2.04.pdf
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 147
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different