name |
Plateforme Java Card MultiApp V4.2 en configuration ouverte sur le composant IFX_CCI_000010h (Version 4.2.0, Java Card version 3.0.5, GP version 2.3) |
Plateforme Java Card MAV31S en configuration ouverte de la carte à puce Optelio Contactless R7S masquée sur le composant P60D144JVA (version du patch: 1.4) |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
FR |
FR |
status |
active |
archived |
not_valid_after |
26.06.2025 |
31.08.2020 |
not_valid_before |
28.09.2021 |
31.08.2015 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2020-65v2.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_65v2.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015-30en.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible-anssi-cc-2020-65v2.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi_cible_2015_30_LITE.pdf |
manufacturer |
THALES DIS FRANCE SA |
Gemalto / NXP Semiconductors |
manufacturer_web |
https://www.thalesgroup.com/en/europe/france |
https://www.gemalto.com/ |
security_level |
AVA_VAN.5, ALC_DVS.2, EAL5+ |
AVA_VAN.5, ALC_DVS.2, EAL4+ |
dgst |
1412d1d9e0d553c1 |
585fe7142c257928 |
heuristics/cert_id |
ANSSI-CC-2020/65v2 |
ANSSI-CC-2015/30 |
heuristics/cert_lab |
[] |
SERMA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_FSP.5, AGD_PRE.1, ADV_ARC.1, ATE_COV.2, ATE_FUN.1, ALC_DEL.1, ADV_IMP.1, ATE_IND.2, ALC_TAT.2, ALC_LCD.1, ATE_DPT.3, ADV_TDS.4, ALC_DVS.2, AGD_OPE.1, ADV_INT.2, AVA_VAN.5, ALC_CMC.4 |
ATE_FUN.1, ADV_IMP.1, ASE_TSS.2, AVA_VLA.5, AGD_PRE.1, ALC_DVS.2, AVA_VAN.5, ATE_COV.2, ALC_TAT.2, ADV_INT.2, ALC_CMC.4, ADV_FSP.5, ADV_ARC.1, ALC_DEL.1, ATE_DPT.1, AGD_OPE.1, ALC_LCD.1, ADV_TDS.4, ATE_IND.2 |
heuristics/extracted_versions |
3.0.5, 4.2.0, 4.2, 2.3 |
1.4 |
heuristics/prev_certificates |
ANSSI-CC-2020/65 |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2015/38 |
heuristics/report_references/directly_referencing |
ANSSI-CC-2020/65 |
ANSSI-CC-2014/86, BSI-DSZ-CC-0870-2014 |
heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2015/38 |
heuristics/report_references/indirectly_referencing |
ANSSI-CC-2020/65 |
ANSSI-CC-2014/86, BSI-DSZ-CC-0837-2013, BSI-DSZ-CC-0829-2012, ANSSI-CC-2014/06, BSI-DSZ-CC-0870-2014, BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0640-2010 |
heuristics/scheme_data |
- cert_id: ANSSI-CC-2020/65v2
- description: Le produit évalué est la « Plateforme Java Card MultiApp V4.2 en configuration ouverte sur le composant IFX_CCI_000010h, version 4.2.0 », développé par THALES et INFINEON TECHNOLOGIES AG. Ce produit est destiné à héberger et exécuter une ou plusieurs applications, dites applets dans la terminologie Java Card. Ces applications peuvent revêtir un caractère sécuritaire différent (selon qu’elles soie
- developer: THALES et INFINEON TECHNOOGIES AG/ THALES
- enhanced:
- expiration_date: 26.06.2025
- level: EAL5+
- product: Plateforme Java Card MultiApp V4.2 en configuration ouverte sur le composant IFX_CCI_000010h (Version 4.2.0, Java Card version 3.0.5, GP version 2.3)
- sponsor: THALES et INFINEON TECHNOOGIES AG/ THALES
- url: https://cyber.gouv.fr/produits-certifies/plateforme-java-card-multiapp-v42-en-configuration-ouverte-sur-le-composant-0
|
- cert_id: ANSSI-CC-2015/30
- description: La certificationporte sur la plateforme ouverte Java Card du produit « MultiApp v3.1S » qui est une carte à puce pouvant être en mode contact ou sans contact. Le produit est développé par la société GEMALTO et embarqué sur le microcontrôleur P60D144JVA fabriqué par la société NXP SEMICONDUCTORS. La plateforme ouverte Java Card est destinée à fournir des services de sécurité aux applets qui ser
- developer: Gemalto / NXP Semiconductors
- enhanced:
- level: EAL4+
- product: Plateforme Java Card MAV31S en configuration ouverte de la carte à puce Optelio Contactless R7S masquée sur le composant P60D144JVA
- sponsor: Gemalto
- url: https://cyber.gouv.fr/produits-certifies/plateforme-java-card-mav31s-en-configuration-ouverte-de-la-carte-puce-optelio
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
BSI-DSZ-CC-1079-2018 |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
BSI-DSZ-CC-1079-2018 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
certificat-anssi-cc-2020-65v2.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author:
- /CreationDate: D:20211004103608+02'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20211004103608+02'00'
- /Producer: Acrobat Distiller 11.0 (Windows)
- /Title:
- pdf_file_size_bytes: 280367
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
|
pdf_data/report_filename |
anssi-cc-2020_65v2.pdf |
ANSSI-CC-2015-30en.pdf |
pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 4 augmented ALC_DVS.2, AVA_VAN.5
- cc_version: Common Criteria version 3.1 revision 4
- cert_id: ANSSI-CC-2015/30
- cert_item: Plateforme Java Card MAV31S en configuration ouverte de la carte à puce Optelio Contactless R7S masquée sur le composant P60D144JVA
- cert_item_version: Version de la plateforme Java Card MultiApp : 3.1S Version du patch : 1.4
- cert_lab: Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
- developer: Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France NXP Semiconductors Box 54 02 40, D-22502 Hambourg, Allemagne Sponsor Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France
- match_rules: ['Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developer\\(s\\)(.+)Evaluation facility(.+)Recognition arrangements']
- ref_protection_profiles: ANSSI-CC-PP-2010/03-M01 [PP JCS] Java Card System – Open Configuration, version 3.0
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-1079-2018-MA-01: 1
- FR:
- ANSSI-CC-2020/65: 3
- ANSSI-CC-2020/65v2: 2
|
- DE:
- FR:
- ANSSI-CC-2014/86: 2
- ANSSI-CC-2015/30: 20
- ANSSI-CC-PP-2010/03-M01: 2
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0099-2017: 1
- BSI-PP-0084-2014: 1
- BSI-PP-0099-2017: 1
|
- ANSSI:
- ANSSI-CC-PP-2010/03-M01: 2
- BSI:
- BSI-PP- 0035-2007: 2
- BSI-PP-0035-2007: 1
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 1
- EAL2: 2
- EAL7: 1
- ITSEC:
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 2
- EAL 4 augmented: 2
- EAL 5: 1
- EAL 7: 1
- EAL4: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.5: 3
- AVA_VLA.5: 1
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
- Gemalto:
- Infineon:
- Infineon Technologies AG: 1
- Microsoft:
|
- Gemalto:
- NXP:
- NXP: 2
- NXP Semiconductors: 1
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
- com:
- com.gemalto.emvapi: 1
- com.gemalto.javacard.filesystem: 1
- com.gemalto.javacard.iasclassic: 1
- com.gemalto.javacard.ism: 1
- com.gemalto.javacard.mspnp: 1
- com.gemalto.javacard.open: 1
- com.gemalto.javacard.securemessaging.builde: 1
- com.gemalto.javacard.securemessaging.intern: 1
- com.gemalto.javacard.security: 1
- com.gemalto.javacard.util: 1
- com.gemalto.javacardx: 1
- com.gemalto.javacardx.biometry: 1
- com.gemalto.javacardx.biometry.biocfg: 1
- com.gemalto.javacardx.crypto: 1
- com.gemalto.javacardx.crypto.asymmetric.rsa: 1
- com.gemalto.javacardx.gapplet: 1
- com.gemalto.moc.server: 1
- java:
- javacard:
- javacard.conformance: 1
- javacard.filesystem: 1
- javacard.framework: 1
- javacard.gpimage: 1
- javacard.iasclassic: 1
- javacard.icao: 1
- javacard.internal: 1
- javacard.ism: 1
- javacard.mspnp: 1
- javacard.open: 1
- javacard.securemessaging: 1
- javacard.securemessaging.builde: 1
- javacard.securemessaging.intern: 1
- javacard.security: 1
- javacard.tlv: 1
- javacard.util: 1
- javacardx:
- javacardx.apdu: 1
- javacardx.apdu.util: 1
- javacardx.biometry: 2
- javacardx.biometry.biocfg: 1
- javacardx.crypto: 2
- javacardx.crypto.asymmetric.ecc: 1
- javacardx.crypto.asymmetric.rsa: 1
- javacardx.gap: 1
- javacardx.gapplet: 1
- javacardx.gdp: 1
- org:
|
- com:
- com.gemalto.javacardx.pace: 1
- javacardx:
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author:
- /CreationDate: D:20211004103519+02'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20211004103519+02'00'
- /Producer: Acrobat Distiller 11.0 (Windows)
- /Title:
- pdf_file_size_bytes: 349522
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 21
|
- /Author: romme
- /CreationDate: D:20151109154046+01'00'
- /Creator: Microsoft® Word 2010
- /Keywords: ANSSI-CC-CER-F-07EN.008
- /ModDate: D:20151109154046+01'00'
- /Producer: Microsoft® Word 2010
- /Subject: Plateforme Java Card MultiApp ID V3.1S en configuration ouverte de la carte à puce Optelio Contactless R7S masquée sur le composant P60D144JVA
- /Title: ANSSI-CC-2015/30
- pdf_file_size_bytes: 529824
- pdf_hyperlinks: mailto:[email protected], http://www.ssi.gouv.fr/
- pdf_is_encrypted: False
- pdf_number_of_pages: 19
|
pdf_data/st_filename |
cible-anssi-cc-2020-65v2.pdf |
anssi_cible_2015_30_LITE.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-1079-2018: 1
- BSI-DSZ-CC-1079-2018-MA-01: 1
- NL:
|
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP- 0068-V2-2011-MA-01: 1
- BSI-CC-PP-0084-2014: 1
- BSI-CC-PP-0099-2017: 1
- BSI-PP- 0055-2009: 1
|
- BSI:
- BSI-CC-PP-0059-2009-MA-01: 1
- BSI-CC-PP-0075-2012: 1
- BSI-PP-0035: 1
- other:
- PP-SSCD-KG: 2
- PP-SSCD-KI: 2
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 5+: 1
- EAL 6+: 1
- EAL5: 6
- EAL5 augmented: 2
- EAL5+: 1
- EAL6: 1
- EAL6 augmented: 1
- EAL6+: 1
|
- EAL:
- EAL 5+: 1
- EAL4: 5
- EAL4 augmented: 2
- EAL4+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 7
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 2
- ADV_FSP.4: 2
- ADV_FSP.5: 4
- ADV_IMP: 1
- ADV_IMP.1: 7
- ADV_INT.2: 1
- ADV_TDS: 1
- ADV_TDS.1: 2
- ADV_TDS.3: 4
- ADV_TDS.4: 7
- AGD:
- AGD_OPE: 2
- AGD_OPE.1: 7
- AGD_PRE: 2
- AGD_PRE.1: 6
- ALC:
- ALC_CMC.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 2
- ALC_DVS.2: 7
- ALC_LCD.1: 3
- ALC_TAT.1: 2
- ALC_TAT.2: 3
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 2
- ATE_DPT.1: 2
- ATE_DPT.3: 1
- ATE_FUN.1: 6
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 8
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 2
- ADV_FSP.4: 5
- ADV_FSP.5: 1
- ADV_IMP: 1
- ADV_IMP.1: 7
- ADV_INT.2: 1
- ADV_TDS: 1
- ADV_TDS.1: 2
- ADV_TDS.3: 6
- ADV_TDS.4: 4
- AGD:
- AGD_OPE.1: 7
- AGD_PRE.1: 6
- ALC:
- ALC_CMC.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 2
- ALC_DVS.2: 7
- ALC_LCD.1: 3
- ALC_TAT.1: 3
- ALC_TAT.2: 2
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 2
- ATE_DPT.1: 3
- ATE_FUN.1: 6
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_ARP.1: 16
- FAU_ARP.1.1: 1
- FAU_SAA.1: 2
- FCO:
- FCS:
- FCS_CKM: 46
- FCS_CKM.1: 27
- FCS_CKM.1.1: 3
- FCS_CKM.4: 21
- FCS_CKM.4.1: 2
- FCS_COP: 35
- FCS_COP.1: 24
- FCS_COP.1.1: 5
- FCS_RNG: 18
- FCS_RNG.1: 8
- FCS_RNG.1.1: 3
- FCS_RNG.1.2: 3
- FDP:
- FDP_ACC: 35
- FDP_ACC.1: 14
- FDP_ACC.2: 6
- FDP_ACF: 30
- FDP_ACF.1: 16
- FDP_IFC: 20
- FDP_IFC.1: 12
- FDP_IFC.2: 2
- FDP_IFF: 13
- FDP_IFF.1: 17
- FDP_ITC: 10
- FDP_ITC.1: 10
- FDP_ITC.2: 15
- FDP_RIP: 98
- FDP_RIP.1: 11
- FDP_RIP.1.1: 1
- FDP_ROL: 14
- FDP_ROL.1: 5
- FDP_SDI: 6
- FDP_SDI.2: 3
- FDP_UIT: 5
- FDP_UIT.1: 2
- FIA:
- FIA_AFL: 21
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_ATD: 7
- FIA_ATD.1: 2
- FIA_UAU: 50
- FIA_UAU.1: 6
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UAU.4: 1
- FIA_UAU.4.1: 1
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6.1: 1
- FIA_UID: 33
- FIA_UID.1: 18
- FIA_UID.1.1: 2
- FIA_UID.1.2: 2
- FIA_UID.2: 1
- FIA_USB: 6
- FIA_USB.1: 3
- FMT:
- FMT_LIM: 18
- FMT_LIM.1: 15
- FMT_LIM.1.1: 3
- FMT_LIM.2: 14
- FMT_LIM.2.1: 3
- FMT_MSA: 73
- FMT_MSA.1: 11
- FMT_MSA.2: 2
- FMT_MSA.3: 17
- FMT_MTD: 31
- FMT_MTD.1: 9
- FMT_MTD.3: 1
- FMT_SMF: 50
- FMT_SMF.1: 19
- FMT_SMF.1.1: 2
- FMT_SMR: 62
- FMT_SMR.1: 29
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FPR:
- FPR_UNO: 5
- FPR_UNO.1: 10
- FPR_UNO.1.1: 1
- FPT:
- FPT_EMS: 4
- FPT_EMS.1: 12
- FPT_EMS.1.1: 3
- FPT_EMS.1.2: 3
- FPT_FLS: 34
- FPT_FLS.1: 14
- FPT_FLS.1.1: 2
- FPT_ITT: 5
- FPT_ITT.1: 1
- FPT_PHP: 5
- FPT_PHP.3: 12
- FPT_PHP.3.1: 1
- FPT_RCV: 12
- FPT_RCV.3: 7
- FPT_RCV.4: 2
- FPT_TDC.1: 7
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST: 7
- FPT_TST.1: 13
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 14
- FTP_ITC.1: 5
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 2
|
- FAU:
- FAU_ARP.1: 14
- FAU_ARP.1.1: 1
- FAU_SAA.1: 2
- FCO:
- FCS:
- FCS_CKM.1: 20
- FCS_CKM.1.1: 1
- FCS_CKM.2: 7
- FCS_CKM.2.1: 1
- FCS_CKM.3: 6
- FCS_CKM.3.1: 1
- FCS_CKM.4: 14
- FCS_CKM.4.1: 1
- FCS_COP.1: 18
- FCS_COP.1.1: 1
- FCS_RND: 7
- FCS_RND.1: 11
- FCS_RND.1.1: 2
- FCS_RNG.1: 1
- FDP:
- FDP_ACC: 37
- FDP_ACC.1: 13
- FDP_ACC.2: 6
- FDP_ACF: 30
- FDP_ACF.1: 16
- FDP_IFC: 22
- FDP_IFC.1: 12
- FDP_IFC.2: 2
- FDP_IFF: 15
- FDP_IFF.1: 12
- FDP_ITC: 11
- FDP_ITC.1: 4
- FDP_ITC.2: 9
- FDP_RIP: 77
- FDP_RIP.1: 10
- FDP_ROL: 13
- FDP_ROL.1: 2
- FDP_SDI.2: 8
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UIT: 6
- FDP_UIT.1: 2
- FIA:
- FIA_ATD: 8
- FIA_ATD.1: 2
- FIA_SOS.2: 1
- FIA_UAI.1: 1
- FIA_UAU: 6
- FIA_UAU.1: 1
- FIA_UID: 12
- FIA_UID.1: 10
- FIA_UID.2: 1
- FIA_USB: 7
- FIA_USB.1: 3
- FMT:
- FMT_MSA: 80
- FMT_MSA.1: 11
- FMT_MSA.2: 1
- FMT_MSA.3: 15
- FMT_MTD: 16
- FMT_MTD.1: 3
- FMT_MTD.3: 1
- FMT_SMF: 30
- FMT_SMF.1: 9
- FMT_SMR: 43
- FMT_SMR.1: 22
- FPR:
- FPR_UNO: 6
- FPR_UNO.1: 9
- FPR_UNO.1.1: 1
- FPT:
- FPT_FLS: 41
- FPT_FLS.1: 5
- FPT_ITT: 6
- FPT_ITT.1: 1
- FPT_PHP: 6
- FPT_PHP.3: 2
- FPT_RCV: 14
- FPT_RCV.3: 4
- FPT_RCV.4: 2
- FPT_TDC.1: 8
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST: 6
- FPT_TST.1: 3
- FTP:
- FTP_ITC: 8
- FTP_ITC.1: 5
- FTP_TRP.1: 2
|
pdf_data/st_keywords/cc_claims |
- A:
- A.APPLET: 5
- A.DELETION: 4
- A.VERIFICATION: 4
- D:
- D.API_DATA: 3
- D.APP_CODE: 6
- D.APP_C_DATA: 3
- D.APP_I_DATA: 5
- D.BIO: 1
- D.CRYPTO: 5
- D.JCS_CODE: 3
- D.JCS_DATA: 5
- D.PIN: 4
- D.SEC_DATA: 7
- O:
- O.AES: 1
- O.ALARM: 15
- O.APPLET: 28
- O.BIO-MNGT: 7
- O.CARD-MANAGEMENT: 2
- O.CARD_MANAGEMENT: 17
- O.CIPHER: 11
- O.CODE_PCKG: 16
- O.CODE_PKG: 7
- O.DELETION: 5
- O.FIREWALL: 12
- O.GLOBAL_ARRAYS_CONFID: 9
- O.GLOBAL_ARRAYS_INTEG: 5
- O.INSTALL: 8
- O.JAVAOBJECT: 66
- O.KEY-MNGT: 7
- O.KEY_MNGT: 1
- O.LOAD: 10
- O.NATIVE: 11
- O.OBJ-DELETION: 4
- O.OBJ_DELETION: 3
- O.OPERATE: 15
- O.PIN-: 1
- O.PIN-MNGT: 6
- O.PIN_MNGT: 1
- O.REALLOCATION: 5
- O.RESOURCES: 9
- O.RND: 3
- O.RNG: 9
- O.SCP: 32
- O.SID: 13
- O.TDES: 1
- O.TRANSACTION: 7
- OE:
- OE.APPLET: 4
- OE.CARD-MANAGEMENT: 1
- OE.CODE-EVIDENCE: 10
- OE.CODE_EVIDENCE: 1
- OE.VERIFICATION: 25
- OP:
- OP.ARRAY_AASTORE: 3
- OP.ARRAY_ACCESS: 7
- OP.ARRAY_LENGTH: 3
- OP.CREATE: 11
- OP.DELETE_APPLET: 6
- OP.DELETE_PCKG: 4
- OP.DELETE_PCKG_APPLET: 4
- OP.INSTANCE_FIELD: 6
- OP.INVK_INTERFACE: 10
- OP.INVK_VIRTUAL: 8
- OP.JAVA: 8
- OP.PUT: 8
- OP.PUTFIELD: 1
- OP.PUTSTATIC: 1
- OP.THROW: 7
- OP.TYPE_ACCESS: 7
- OSP:
- OSP.RND: 3
- OSP.RNG: 1
- OSP.VERIFICATION: 4
- OT:
- R:
- T:
- T.CONFID-APPLI-DATA: 4
- T.CONFID-JCS-CODE: 4
- T.CONFID-JCS-DATA: 4
- T.DELETION: 3
- T.EXE-CODE: 8
- T.INSTALL: 4
- T.INTEG-APPLI-CODE: 7
- T.INTEG-APPLI-DATA: 8
- T.INTEG-JCS-CODE: 3
- T.INTEG-JCS-DATA: 4
- T.NATIVE: 4
- T.OBJ-DELETION: 4
- T.PHYSICAL: 4
- T.RESOURCES: 3
- T.SID: 8
|
- A:
- A.APPLET: 5
- A.DELETION: 5
- A.VERIFICATION: 4
- D:
- D.API_DATA: 3
- D.APP_CODE: 6
- D.APP_C_DATA: 3
- D.APP_I_DATA: 4
- D.CRYPTO: 5
- D.JCS_CODE: 3
- D.JCS_DATA: 5
- D.PIN: 4
- D.SEC_DATA: 7
- O:
- O.ALARM: 15
- O.APPLET: 28
- O.CARD-MANAGEMENT: 2
- O.CARD_MANAGEMENT: 18
- O.CIPHER: 10
- O.CODE_PCKG: 16
- O.CODE_PKG: 7
- O.DELETION: 8
- O.FIREWALL: 12
- O.GLOBAL_ARRAYS_CO: 3
- O.GLOBAL_ARRAYS_CONFID: 6
- O.GLOBAL_ARRAYS_INT: 3
- O.GLOBAL_ARRAYS_INTEG: 5
- O.HW_AES: 2
- O.INSTALL: 11
- O.JAVAOBJECT: 56
- O.KEY-: 1
- O.KEY-MNGT: 5
- O.KEY_MNGT: 4
- O.LOAD: 6
- O.NATIVE: 11
- O.OBJ-DELETION: 4
- O.OPERATE: 15
- O.PIN-: 1
- O.PIN-MNGT: 5
- O.REALLOCATION: 5
- O.RESOURCES: 9
- O.RND: 12
- O.SCP: 30
- O.SID: 13
- O.TRANSACTION: 6
- OE:
- OE.APPLET: 4
- OE.CODE-EVIDENCE: 10
- OE.CODE_EVIDENCE: 1
- OE.VERIFICATION: 25
- OP:
- OP.ARRAY_ACCESS: 6
- OP.CREATE: 10
- OP.DELETE_APPLET: 6
- OP.DELETE_PCKG: 4
- OP.DELETE_PCKG_APPLET: 4
- OP.INSTANCE_FIELD: 6
- OP.INVK_INTERFACE: 10
- OP.INVK_VIRTUAL: 8
- OP.JAVA: 8
- OP.PUT: 7
- OP.THROW: 7
- OP.TYPE_ACCESS: 7
- OSP:
- OSP: 1
- OSP.RND: 3
- OSP.RNG: 1
- OSP.VERIFICATION: 4
- R:
- T:
- T.CONFID-APPLI-DATA: 4
- T.CONFID-JCS-CODE: 4
- T.CONFID-JCS-DATA: 4
- T.DELETION: 3
- T.EXE-CODE: 8
- T.INSTALL: 4
- T.INTEG-APPLI-CODE: 7
- T.INTEG-APPLI-DATA: 8
- T.INTEG-JCS-CODE: 3
- T.INTEG-JCS-DATA: 4
- T.NATIVE: 4
- T.OBJ-DELETION: 4
- T.PHYSICAL: 4
- T.RESOURCES: 3
- T.SID: 8
|
pdf_data/st_keywords/vendor |
- Gemalto:
- Infineon:
- Infineon: 15
- Infineon Technologies AG: 2
- Microsoft:
- Thales:
|
|
pdf_data/st_keywords/eval_facility |
- Serma:
- Serma Safety & Security: 1
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- 3DES:
- 3DES: 2
- TDEA: 1
- TDES: 15
- Triple-DES: 3
- DES:
- constructions:
|
- AES_competition:
- DES:
- 3DES:
- TDEA: 1
- TDES: 9
- Triple-DES: 2
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-224: 4
- SHA-256: 4
- SHA-384: 2
- SHA-512: 4
- SHA224: 3
- SHA256: 1
- SHA384: 1
- SHA512: 1
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 3
- SHA-256: 4
- SHA-384: 4
- SHA-512: 3
- SHA224: 1
|
pdf_data/st_keywords/crypto_scheme |
- KA:
- Key Agreement: 3
- Key agreement: 2
- MAC:
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 9
- Physical Tampering: 3
- fault induction: 2
- malfunction: 8
- physical tampering: 1
- SCA:
- DPA: 2
- Leak-Inherent: 5
- SPA: 1
- physical probing: 6
- timing attacks: 1
|
- FI:
- Malfunction: 3
- fault induction: 2
- malfunction: 2
- physical tampering: 1
- SCA:
- DPA: 1
- Leak-Inherent: 3
- physical probing: 2
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- BSI:
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- FIPS:
- FIPS 140-2: 3
- FIPS 197: 1
- FIPS 46-3: 1
- FIPS180-2: 1
- FIPS197: 5
- ICAO:
- ISO:
- NIST:
- PKCS:
- SCP:
- SCP01: 6
- SCP02: 6
- SCP03: 5
|
- BSI:
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- FIPS:
- NIST:
- PKCS:
- PKCS#1: 8
- PKCS#3: 1
- PKCS#5: 5
- SCP:
- SCP01: 3
- SCP02: 3
- SCP03: 3
|
pdf_data/st_keywords/javacard_version |
- JavaCard:
- Java Card 2.2.2: 3
- Java Card 3.0.5: 5
|
- JavaCard:
- JC2.2.2: 1
- Java Card 2.2.2: 7
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
- java:
- javacard:
- javacard.framework: 3
- javacard.security: 3
- javacardx:
- javacardx.biometry: 1
- javacardx.crypto: 2
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
- out of scope: 1
|
- OutOfScope:
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
- out of scope: 1
|
pdf_data/st_metadata |
- /Author: D1487827
- /CreationDate: D:20210505092700+02'00'
- /Creator: Microsoft® Word 2013
- /Keywords: 04-05-2021
- /ModDate: D:20210505092700+02'00'
- /Producer: Microsoft® Word 2013
- /Subject: 1.18
- /Title: MultiApp V4.2: JCS Security Target
- pdf_file_size_bytes: 2496334
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 157
|
- /Author: Antoine de Lavernette
- /CreationDate: D:20150723151408+02'00'
- /Creator: Microsoft® Office Word 2007
- /Keywords: Security Target, CC
- /ModDate: D:20150723151408+02'00'
- /Producer: Microsoft® Office Word 2007
- /Subject: Security Target
- /Title: eTravel v1.0 Security Target MAÏA3
- pdf_file_size_bytes: 1419745
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 93
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |