name |
BlackBerry® Enterprise Server Version 5.0.0 |
IDMotion V2 Multos Virtual Machine OS Multos V4.5.2, AMD version 0151v001 |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
CA |
FR |
status |
archived |
archived |
not_valid_after |
28.09.2015 |
14.12.2023 |
not_valid_before |
12.03.2010 |
14.12.2018 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/blackberry-smart-v50-cert-eng.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018_50fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/blackberry-smart-v50-sec-eng.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2018_50en.pdf |
manufacturer |
Research In Motion Limited |
Gemalto / Trusted Labs |
manufacturer_web |
https://www.rim.com/ |
https://www.gemalto.com |
security_level |
EAL4+, ALC_FLR.1 |
EAL7 |
dgst |
1999de0c48802e38 |
efb9f87dde709ef7 |
heuristics/cert_id |
383-4-100 |
ANSSI-CC-2018/50 |
heuristics/cert_lab |
CANADA |
THALES |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ALC_TAT.1, ASE_TSS.1, ASE_SPD.1, ATE_DPT.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 |
ADV_TAT.3, ALC_LCD.2, ATE_DPT.4, ADV_INT.3, ADV_LCD.2, AVA_VAN.5, ADV_FSP.6, ALC_CMS.1, ALC_DVS.2, ALC_TAT.3, ATE_FUN.2, ADV_ARC.1, ADV_CMC.5, ADV_IMP.2, ALC_CMC.5, ADV_TDS.6, ATE_COV.3, ADV_SPM.1 |
heuristics/extracted_versions |
5.0.0 |
4.5.2 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2018/35, BSI-DSZ-CC-0945-2017 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
ANSSI-CC-2018/35, BSI-DSZ-CC-0945-2017, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0782-2012 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0945-2017 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0945-2017 |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
blackberry-smart-v50-cert-eng.pdf |
anssi-cc-2018_50fr.pdf |
pdf_data/report_frontpage |
- FR:
- CA:
- cert_id: 383-4-100-CR
- cert_lab: CANADA
|
- FR:
- cc_security_level: EAL 7
- cc_version: Critères Communs version 3.1 révision 5
- cert_id: ANSSI-CC-2018/50
- cert_item: IDMotion V2 Multos Virtual Machine
- cert_item_version: OS version Multos V4.5.2 AMD version 0151v001
- cert_lab: THALES (TCS – CNES) 290 allée du Lac, 31670 Labège, France
- developer: Gemalto La Vigie, Avenue du jujubier, ZI Athélia IV, BP 90- 13702 La Ciotat Trusted Labs 6, rue de la Verrerie – CS20001, 92197 Meudon Cedex Infineon Technologies AG Am Campeon 1-12, 85579 Neubiberg Commanditaire Gemalto La Vigie, Avenue du jujubier, ZI Athélia IV, BP 90- 13702 La Ciotat
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: Néant
- CA:
|
pdf_data/report_keywords/cc_cert_id |
- CA:
- 383-4-100: 1
- 383-4-100-CR: 1
|
- DE:
- FR:
- ANSSI-CC-2018/35: 2
- ANSSI-CC-2018/50: 15
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 4: 4
- EAL 4 augmented: 1
- EAL 4+: 3
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 4
- EAL2: 2
- EAL7: 3
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
- FCS:
- FDP:
- FDP_SDP_EXP.1: 1
- FDP_SDP_EXP.2: 1
- FTA:
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Gemalto:
- Infineon:
- Infineon Technologies AG: 2
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /AM_ACPP_Date: [dd month yyyy]
- /AM_ACPP_Doc#: [AM_AMCPP_Doc#]
- /AM_ACPP_Title: Assurance Continuity Program Plan (ACPP)
- /AM_ACPP_Version: [AM_AMCPP_Version]
- /AM_IAR_Date: [dd month yyyy]
- /AM_IAR_Doc#: [AM_IAR_Doc#]
- /AM_IAR_Title: Assurance Maintenace Impact Analysis Report
- /AM_IAR_Version: [AM_IAR_Version]
- /AM_ST Date: [dd month yyyy]
- /AM_ST Title: [AM_ST Title]
- /AM_ST Version: [AM_ST Version]
- /AM_TOE: [AM_TOE]
- /AM_TOE Short: [AM_TOE Short]
- /AM_TOE Version: [AM_TOE Version]
- /Author: sjackson
- /CC Version: 3.1R3
- /CC date: July 2009
- /CEM Version: 3.1R3
- /CEM date: July 2009
- /CR_Date: 24 February 2010
- /CR_Version: 0.3
- /Client City: Waterloo
- /Client Country: Canada
- /Client Full Name: Research In Motion Limited
- /Client Postal Code: N2L 3W8
- /Client Short Name: RIM
- /Client State: Ontario
- /Client Street: 295 Phillip Street
- /Comments: PCR Template Version 0.1-EWA-C (for CC 3.1)
- /Company:
- /CreationDate: D:20101014092443-04'00'
- /Creator: Acrobat PDFMaker 9.1 for Word
- /Developer Long Name: Research In Motion Limited
- /Developer Short Name: RIM
- /EAL Level: 4+
- /EAL Level Base: 4
- /EAL Long: EAL 4 Augmented
- /EAL Short: EAL 4+
- /ETPlan_Doc#: 1603-000-D003
- /ETPlan_Title: Evaluation Test Plan
- /ETPlan_Version: 0.3
- /ETPlan_date: 24 February 2010
- /ETProcRes_Date: 24 February 2010
- /ETProcRes_Doc#: 1603-000-D005
- /ETProcRes_Title: Evaluation Test Results
- /ETProcRes_Version: 0.3
- /ETProc_Date: 24 Februrary 2010
- /ETProc_Doc#: 1603-000-D004
- /ETProc_Title: Evaluation Test Procedures
- /ETProc_Version: 0.3
- /ETReport_Date: 24 February 2010
- /ETReport_Doc#: 1603-000-D002
- /ETReport_Title: Evaluation Technical Report
- /ETReport_TitleShort: ETR
- /ETReport_Version: 0.5
- /EWP_Date: 15 July 2008
- /EWP_Doc#: 1603-000-D001
- /EWP_Title: Evaluation Work Plan
- /EWP_Version: 1.1
- /Eval number: 383-4-100
- /Eval_End_Date: [dd month yyyy (date on certificate)]
- /Eval_Start_Date: 18 July 2008
- /Keywords:
- /LeadEvaluator: S. Jackson
- /LeadEvaluatorInitials: SJ
- /Manager:
- /ModDate: D:20101014092605-04'00'
- /Producer: Acrobat Distiller 9.2.0 (Windows)
- /ProjectManager: M. Gauvreau
- /ProjectManagerInitials: MG
- /ProjectNumber: 1603
- /ST_Date: 11 February 2010
- /ST_Title: Security Target BlackBerry® Smartphone Version 5.0
- /ST_Version: 4.0
- /SVC_Date: 1 December 2008
- /SVC_Doc#: 1603-000-D007
- /SVC_Title: Site Visit Checklist
- /SVC_Version: 0.1
- /SVR_Date: 30 March 2009
- /SVR_Doc#: 1603-000-D006
- /SVR_Title: Site Visit Report
- /SVR_Version: 0.3
- /SV_City: Waterloo
- /Security Classification: EWA-Canada & RIM Proprietary
- /SourceModified: D:20101014132425
- /Sponsor: Research In Motion Limited
- /Sponsor City: Waterloo
- /Sponsor Country: Canada
- /Sponsor Postal Code: N2L 3W8
- /Sponsor State: Ontario
- /Sponsor Street: 295 Phillip Street
- /Subject:
- /TOE: BlackBerry® Smartphone
- /TOE Line1: [TOE Line1 - enter later for PCR or web page]
- /TOE Line2: [TOE Line2 - enter later for PCR or web page]
- /TOE Line3: [TOE Line3 - enter later for PCR or web page]
- /TOE Line4: [TOE Line4 - enter later for PCR or web page]
- /TOE Line5: [TOE Line5 - enter later for PCR or web page]
- /TOE Short: BlackBerry® Smartphone
- /TOE Short with version: BlackBerry® Smartphone
- /TOE Short-NoTM: BlackBerry Smartphone
- /TOE Version: 5.0
- /TOE with version: BlackBerry® Smartphone Version 5.0
- /TOE-NoTM: BlackBerry Smartphone
- /Title: EAL X+ Evaluation of [Developer Long Name]
- /_AdHocReviewCycleID: 500818796
- /_AuthorEmail: [email protected]
- /_AuthorEmailDisplayName: Reade, Rick A.
- /_EmailSubject: RIM CPL post update ... rick
- /_ReviewingToolsShownOnce:
- pdf_file_size_bytes: 94281
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 15
|
- /CreationDate: D:20181219113402+01'00'
- /Creator: Microsoft® Word 2010
- /Keywords: ANSSI-CC-CER-F-07.028
- /ModDate: D:20181219115454+01'00'
- /Producer: Microsoft® Word 2010
- /Subject:
- /Title:
- pdf_file_size_bytes: 749242
- pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 14
|
pdf_data/st_filename |
blackberry-smart-v50-sec-eng.pdf |
anssi-cible-cc-2018_50en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 4: 6
- EAL 4 augmented: 2
|
- EAL:
- EAL4: 1
- EAL5: 3
- EAL5+: 1
- EAL7: 6
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 6
- ADV_FSP.1: 3
- ADV_FSP.2: 3
- ADV_FSP.4: 5
- ADV_IMP.1: 5
- ADV_TDS.1: 2
- ADV_TDS.3: 6
- AGD:
- AGD_OPE.1: 6
- AGD_PRE.1: 6
- ALC:
- ALC_CMC.4: 4
- ALC_CMS.1: 1
- ALC_CMS.4: 3
- ALC_DEL.1: 4
- ALC_DVS.1: 5
- ALC_FLR.1: 8
- ALC_LCD.1: 5
- ALC_TAT.1: 5
- ASE:
- ASE_CCL.1: 4
- ASE_ECD.1: 6
- ASE_INT.1: 5
- ASE_OBJ.2: 6
- ASE_REQ.1: 1
- ASE_REQ.2: 3
- ASE_SPD.1: 5
- ASE_TSS.1: 4
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 4
- ATE_DPT.1: 3
- ATE_DPT.2: 1
- ATE_FUN.1: 7
- ATE_IND.2: 3
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_CMC.5: 4
- ADV_FSP.2: 1
- ADV_FSP.6: 3
- ADV_IMP.1: 3
- ADV_IMP.2: 2
- ADV_INT.3: 3
- ADV_LCD.2: 1
- ADV_SPM.1: 5
- ADV_TAT.3: 1
- ADV_TDS.4: 1
- ADV_TDS.6: 3
- ALC:
- ALC_CMC.5: 2
- ALC_CMS.1: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 5
- ALC_LCD.1: 1
- ALC_LCD.2: 5
- ALC_TAT.3: 5
- ATE:
- ATE_COV.1: 1
- ATE_COV.3: 3
- ATE_DPT.4: 3
- ATE_FUN.1: 2
- ATE_FUN.2: 3
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 19
- FCS_CKM.1.1: 2
- FCS_CKM.2: 4
- FCS_CKM.4: 16
- FCS_CKM.4.1: 1
- FCS_COP.1: 20
- FCS_COP.1.1: 1
- FCS_VAL_EXP.1: 12
- FCS_VAL_EXP.1.1: 2
- FDP:
- FDP_ACC.1: 38
- FDP_ACC.1.1: 3
- FDP_ACF.1: 27
- FDP_ACF.1.1: 3
- FDP_ACF.1.2: 3
- FDP_ACF.1.3: 3
- FDP_ACF.1.4: 5
- FDP_ETC.2: 7
- FDP_ETC.2.1: 2
- FDP_ETC.2.2: 1
- FDP_ETC.2.3: 1
- FDP_ETC.2.4: 3
- FDP_IFC.1: 91
- FDP_IFC.1.1: 9
- FDP_IFF: 1
- FDP_IFF.1: 79
- FDP_IFF.1.1: 9
- FDP_IFF.1.2: 8
- FDP_IFF.1.3: 16
- FDP_IFF.1.4: 16
- FDP_IFF.1.5: 8
- FDP_ITC.1: 6
- FDP_ITC.2: 11
- FDP_ITC.2.1: 2
- FDP_ITC.2.2: 1
- FDP_ITC.2.3: 1
- FDP_ITC.2.4: 1
- FDP_ITC.2.5: 3
- FDP_SDP_EXP.1: 14
- FDP_SDP_EXP.1.1: 2
- FDP_SDP_EXP.2: 13
- FDP_SDP_EXP.2.1: 2
- FIA:
- FIA_AFL.1: 7
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_SOS.1: 7
- FIA_SOS.1.1: 1
- FIA_UAU.1: 18
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 1
- FIA_UAU.7: 5
- FIA_UAU.7.1: 1
- FIA_UID.1: 9
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MOF.1: 2
- FMT_MOF.1.1: 3
- FMT_MSA.1: 48
- FMT_MSA.1.1: 4
- FMT_MSA.2: 14
- FMT_MSA.2.1: 1
- FMT_MSA.3: 61
- FMT_MSA.3.1: 6
- FMT_MSA.3.2: 6
- FMT_SAE.1: 7
- FMT_SAE.1.1: 1
- FMT_SAE.1.2: 1
- FMT_SMF.1: 19
- FMT_SMF.1.1: 1
- FMT_SMR.1: 24
- FMT_SMR.1.1: 1
- FPT:
- FPT_ITT.1.1: 1
- FPT_STM.1: 8
- FPT_STM.1.1: 1
- FPT_TDC.1: 9
- FPT_TDC.1.1: 3
- FPT_TDC.1.2: 3
- FTA:
- FTA_SSL.1: 11
- FTA_SSL.1.1: 1
- FTA_SSL.1.2: 1
- FTA_SSL.2: 6
- FTA_SSL.2.1: 1
- FTA_SSL.2.2: 1
- FTA_SSL_EXP.4: 15
- FTA_SSL_EXP.4.1: 2
- FTA_SSL_EXP.4.2: 2
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC.1: 8
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 2
|
- FAU:
- FAU_ACC.2: 1
- FAU_ARP: 3
- FAU_ARP.1: 6
- FAU_ARP.1.1: 4
- FAU_GEN.1: 4
- FAU_SAA: 3
- FAU_SAA.1: 10
- FAU_SAA.1.1: 2
- FAU_SAA.1.2: 3
- FAU_SAS.1: 1
- FCS:
- FCS_CKM: 4
- FCS_COP: 5
- FCS_RNG: 4
- FDP:
- FDP_ACC: 5
- FDP_ACC.1: 4
- FDP_ACC.2: 13
- FDP_ACC.2.1: 2
- FDP_ACC.2.2: 1
- FDP_ACF: 4
- FDP_ACF.1: 13
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_IFC.1: 1
- FDP_ITT.1: 1
- FDP_ROL: 3
- FDP_ROL.1: 5
- FDP_ROL.1.1: 1
- FDP_ROL.1.2: 1
- FDP_SDC.1: 1
- FDP_SDI.1: 1
- FDP_SDI.2: 1
- FDP_UCT.1: 1
- FDP_UIT.1: 1
- FIA:
- FMT:
- FMT_LIM: 2
- FMT_LIM.2: 1
- FMT_MSA.1: 3
- FMT_MSA.3: 3
- FMT_SMF.1: 1
- FPT:
- FPT_FLS: 4
- FPT_FLS.1: 12
- FPT_FLS.1.1: 2
- FPT_PHP.3: 1
- FPT_RCV: 3
- FPT_RCV.4: 7
- FPT_RCV.4.1: 1
- FPT_TST.2: 1
- FRU:
- FRU_FLT.2: 1
- FRU_RSA: 3
- FRU_RSA.1: 6
- FRU_RSA.1.1: 1
- FTP:
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.APPLI_CONT: 9
- A.CIPHER: 3
- A.CLON: 3
- A.DECIPHER: 3
- A.DIS_MEMORY: 3
- A.LOAD: 3
- A.MOD_MEMORY: 3
- A.OPERATE: 3
- A.REMOVE: 3
- A.SECURITY: 3
- A.SIDE: 3
- A.TAMPER_ES: 3
- O:
- O.AES: 1
- O.APPLI_DEV: 12
- O.CIPHER: 3
- O.CLON: 2
- O.DECIPHER: 4
- O.DEV_DIS_ES: 13
- O.DIS: 1
- O.DIS_MEMORY: 2
- O.DLV_: 7
- O.DLV_AUDIT: 1
- O.DLV_DATA: 6
- O.EFECT_REMOVE: 1
- O.EFFECT_L: 1
- O.EFFECT_LOAD: 5
- O.EFFECT_R: 1
- O.EFFECT_REMOVE: 3
- O.FLAW: 1
- O.INIT_A: 2
- O.INIT_ACS: 7
- O.LOAD: 8
- O.MOD_MEMORY: 1
- O.OPERATE: 1
- O.REMOVE: 6
- O.RESOURCE: 4
- O.RESOURCES: 1
- O.RND: 1
- O.ROLLBACK: 5
- O.SAMPLES_ACS: 1
- O.SAMPLE_ACS: 4
- O.SECURITY: 5
- O.SEGREGATE: 5
- O.SIDE: 6
- O.TAMPER_ES: 17
- O.TEST_OPERA: 1
- OSP:
- OSP.CIPHER: 3
- OSP.CONF-ALU: 3
- T:
- T.APP_CORR: 6
- T.APP_DISC: 7
- T.APP_MOD: 7
- T.APP_READ: 7
- T.APP_REMOVE: 7
- T.CLON: 2
- T.DEL_REMOVE: 7
- T.DIS: 2
- T.DIS_DATA: 14
- T.DIS_TEST_ES: 5
- T.ERR_REMOVE: 6
- T.LOAD_APP: 8
- T.LOAD_MAN: 5
- T.LOAD_MOD: 5
- T.LOAD_OTHER: 5
- T.MOD: 5
- T.MOD_DATA: 7
- T.MOD_EXE: 10
- T.MOD_LOAD: 7
- T.MOD_SHARE: 8
- T.MOD_TSF: 8
- T.RESOURCES: 5
- T.RND: 2
- T.T_CMD: 10
- T.T_ES: 8
- T.T_TOOLS: 5
|
pdf_data/st_keywords/vendor |
|
- Gemalto:
- Infineon:
- Infineon: 5
- Infineon Technologies: 2
- Thales:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 13
- AES-: 1
- AES-256: 8
- RC:
- DES:
- constructions:
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 3
- malfunction: 1
- SCA:
- Leak-Inherent: 4
- Physical Probing: 2
- physical probing: 1
- side channel: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140-2: 13
- FIPS 186-2: 8
- FIPS 197: 1
- FIPS 46-3: 1
- PKCS:
|
- CC:
- CCMB-2006-09-001: 1
- CCMB-2007-09-002: 1
- CCMB-2007-09-003: 1
- CCMB-2007-09-004: 1
- ICAO:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- out of scope: 2
- the TOE, the product also contain native applications and native modules used by ICAO application (out of scope of the TOE). Mel applications and native modules Native/MEL application: GMF v1.0 The GMF: 1
- to the context in which the security functions take place. Note that cryptographic primitives are out of scope. Table 16 shows how these security functions satisfy the TOE security functional requirements. 8.1: 1
|
pdf_data/st_metadata |
|
- /CreationDate: D:20181113151704+01'00'
- /Creator: Microsoft® Word 2013
- /Keywords: Security Target, CC, MULTOS, IDMotion, Platform
- /ModDate: D:20181219115510+01'00'
- /Producer: Microsoft® Word 2013
- /Subject:
- /Title:
- pdf_file_size_bytes: 2271251
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 75
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |