name |
Scrambler Board GP-1010 V2.0 for the e-STUDIO 550/650/810 |
DragonFly v4.0 sur composant SLE97CNFX1M50PE Identification Hardware 412691 Card Manager GOP Ref V21.06.01 |
category |
Multi-Function Devices |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
FR |
status |
archived |
archived |
not_valid_after |
10.12.2010 |
06.10.2021 |
not_valid_before |
16.03.2004 |
06.10.2016 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0005.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2016-60.pdf |
st_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2016-60_cible%20publique.pdf |
manufacturer |
Toshiba TEC Corporation |
Oberthur Technologies |
manufacturer_web |
https://www.toshibatec.co.jp/en/ |
https://www.oberthur.com/ |
security_level |
EAL2 |
EAL4+, ALC_DVS.2, AVA_VAN.5 |
dgst |
1ca981c1dbed4283 |
016fa888cd789095 |
heuristics/cert_id |
JISEC-CC-CRP-C0005 |
ANSSI-CC-2016/60 |
heuristics/cert_lab |
[] |
THALES |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
{} |
ASE_INT.1, ASE_APD.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
2.0 |
21.06.01, 4.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2019/38 |
heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2014/81, BSI-DSZ-CC-0946-V2-2015, BSI-DSZ-CC-0946-2014 |
heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2019/38 |
heuristics/report_references/indirectly_referencing |
{} |
ANSSI-CC-2010/49, BSI-DSZ-CC-0791-2012, ANSSI-CC-2012/39, BSI-DSZ-CC-0827-2013, ANSSI-CC-2009/25, ANSSI-CC-2009/57, ANSSI-CC-2014/81, BSI-DSZ-CC-0946-2014, BSI-DSZ-CC-0827-V2-2014, ANSSI-CC-2011/07, ANSSI-CC-2012/06, ANSSI-CC-2010/50, ANSSI-CC-2013/13, ANSSI-CC-2013/60, BSI-DSZ-CC-0946-V2-2015, ANSSI-CC-2012/79, ANSSI-CC-2011/24 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0195
- certification_date:
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1
- description: PRODUCT DESCRIPTION Description of TOE The TOE is the system software of the digital multi function device “e-STUDIO2330C/2820C/2830C/3520C/3530C/4520C” manufactured by TOSHIBA TEC CORPORATION. The TOE controls general functions as a digital multi function device (Copy, Scan, Print and Fax), and provides functions of e-Filing Box and Shared folder. TOE Security functions The TOE provides function of data overwrite and complete deletion on the user document data deleted from HDD in the “e-STUDIO2330C/2820C/2830C/3520C/3530C/4520C” (except following data: fax reception; expired user document data stored in e-Filing Box and Shared folder after such data’s effective period). The function of data overwrite and complete deletion includes the function to collectively and completely delete all user document data from the HDD before the HDD is disposed or replaced. This function also prevents unauthorized restore of data.
- evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
- product: Japanese: e-STUDIO 2330C/2820C/2830C/ 3520C/3530C/4520C System Software English: System Software for e-STUDIO 2330C/2820C/2830C/ 3520C/3530C/4520C
- product_type: data protection function in Multi Function Device
- toe_version: V3.0
- vendor: TOSHIBA TEC CORPORATION
- expiration_date: 01.03.2013
- supplier: TOSHIBA TEC CORPORATION
- toe_japan_name: e-STUDIO2330C/2820C/2830C/ 3520C/3530C/4520C System Software V3.0
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0195_it8200.html
- toe_overseas_name: System Software for e-STUDIO2330C/ 2820C/2830C/3520C/3530C/4520C V3.0
|
|
heuristics/st_references/directly_referenced_by |
{} |
ANSSI-CC-2019/38 |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0946-2014 |
heuristics/st_references/indirectly_referenced_by |
{} |
ANSSI-CC-2019/38 |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0946-2014 |
heuristics/protection_profiles |
{} |
f6d23054061d72ba |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0005.pdf |
ANSSI-CC-2016-60.pdf |
pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 4 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 4
- cert_id: ANSSI-CC-2016/60
- cert_item: DragonFly v4.0 sur composant SLE97CNFX1M50PE
- cert_item_version: Version 4.0, Identification Hardware 412691 Card Manager GOP Ref V21.06.01
- cert_lab: THALES (TCS – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France
- developer: Oberthur Technologies 420, rue d’Estienne d’Orves CS 40008, 92 705 Colombes Cedex, France Infineon Technologies AG Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Oberthur Technologies 420 rue d’Estienne d’Orves CS 40008, 92 705 COLOMBES CEDEX, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: U)SIM Java Card Platform Protection Profile - Basic Configuration, version 2.0.2
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- Certification No. C0005: 1
|
- DE:
- BSI-DSZ-CC-0946-2014: 2
- BSI-DSZ-CC-0946-V2-2015: 1
- FR:
- ANSSI-CC-2014/81: 1
- ANSSI-CC-2016/60: 22
- ANSSI-CC-PP-2010/04: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 2
- EAL 5: 1
- EAL 7: 1
- EAL4: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_FLR: 2
- ALC_LCD: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Infineon:
- Infineon Technologies: 3
- Infineon Technologies AG: 4
- Oberthur:
- OBERTHUR: 3
- Oberthur Technologies: 12
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20040526154004+09'00'
- /ModDate: D:20040526154004+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 13611
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author:
- /CreationDate:
- /Creator: PDFCreator Version 1.2.1
- /Keywords:
- /ModDate:
- /Producer: GPL Ghostscript 9.02
- /Subject:
- /Title: ANSSI-CC-2016-60
- pdf_file_size_bytes: 353899
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 21
|
pdf_data/st_filename |
|
ANSSI-CC-2016-60_cible publique.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 2
- EAL 4 augmented: 1
- EAL4: 7
- EAL4 augmented: 5
- EAL4+: 3
- EAL5: 2
- EAL5 augmented: 2
- EAL5+: 2
|
pdf_data/st_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 15
- ADV_FSP: 1
- ADV_FSP.1: 3
- ADV_FSP.2: 2
- ADV_FSP.4: 20
- ADV_IMP: 1
- ADV_IMP.1: 11
- ADV_TDS: 1
- ADV_TDS.1: 2
- ADV_TDS.2: 1
- ADV_TDS.3: 23
- AGD:
- AGD_ADM: 1
- AGD_OPE: 3
- AGD_OPE.1: 19
- AGD_PRE: 1
- AGD_PRE.1: 11
- AGD_USR: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.4: 16
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.4: 7
- ALC_DEL: 1
- ALC_DEL.1: 6
- ALC_DVS: 8
- ALC_DVS.1: 1
- ALC_DVS.2: 20
- ALC_FLR.3: 23
- ALC_LCD: 1
- ALC_LCD.1: 9
- ALC_TAT: 1
- ALC_TAT.1: 10
- ASE:
- ASE_APD.1: 1
- ASE_CCL: 1
- ASE_CCL.1: 15
- ASE_ECD: 1
- ASE_ECD.1: 14
- ASE_INT: 1
- ASE_INT.1: 17
- ASE_OBJ: 1
- ASE_OBJ.2: 13
- ASE_REQ: 1
- ASE_REQ.1: 2
- ASE_REQ.2: 15
- ASE_SPD: 1
- ASE_SPD.1: 8
- ASE_TSS: 1
- ASE_TSS.1: 6
- ATE:
- ATE_COV: 1
- ATE_COV.1: 2
- ATE_COV.2: 8
- ATE_DPT: 1
- ATE_DPT.1: 7
- ATE_FUN: 1
- ATE_FUN.1: 14
- ATE_IND: 1
- ATE_IND.2: 7
- AVA:
|
pdf_data/st_keywords/cc_sfr |
|
- FAU:
- FAU_ARP.1: 16
- FAU_ARP.1.1: 1
- FAU_SAA.1: 3
- FCO:
- FCS:
- FCS_CKM.1: 19
- FCS_CKM.1.1: 1
- FCS_CKM.2: 8
- FCS_CKM.2.1: 1
- FCS_CKM.3: 6
- FCS_CKM.3.1: 1
- FCS_CKM.4: 21
- FCS_CKM.4.1: 1
- FCS_COP: 52
- FCS_COP.1: 25
- FCS_COP.1.1: 1
- FCS_RNG: 9
- FCS_RNG.1: 7
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FDP:
- FDP_ACC: 55
- FDP_ACC.1: 26
- FDP_ACC.2: 7
- FDP_ACF: 41
- FDP_ACF.1: 29
- FDP_IFC: 44
- FDP_IFC.1: 26
- FDP_IFC.2: 4
- FDP_IFF: 38
- FDP_IFF.1: 26
- FDP_IFF.1.2: 1
- FDP_IFF.1.4: 1
- FDP_ITC: 25
- FDP_ITC.1: 8
- FDP_ITC.2: 28
- FDP_RIP: 110
- FDP_RIP.1: 10
- FDP_ROL: 23
- FDP_ROL.1: 10
- FDP_SDI.2: 7
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UIT: 10
- FDP_UIT.1: 4
- FIA:
- FIA_AFL: 6
- FIA_AFL.1: 2
- FIA_ATD: 8
- FIA_ATD.1: 2
- FIA_UAU: 36
- FIA_UAU.1: 4
- FIA_UAU.2: 1
- FIA_UAU.4: 1
- FIA_UAU.5: 3
- FIA_UAU.7: 1
- FIA_UID: 33
- FIA_UID.1: 16
- FIA_UID.2: 4
- FIA_USB: 7
- FIA_USB.1: 3
- FMT:
- FMT_MSA: 173
- FMT_MSA.1: 20
- FMT_MSA.2: 2
- FMT_MSA.3: 30
- FMT_MSA.3.1: 2
- FMT_MTD: 23
- FMT_MTD.1: 3
- FMT_MTD.1.1: 1
- FMT_MTD.3: 1
- FMT_REV: 7
- FMT_REV.1: 4
- FMT_SMF: 65
- FMT_SMF.1: 30
- FMT_SMF.1.1: 1
- FMT_SMR: 71
- FMT_SMR.1: 49
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNO: 6
- FPR_UNO.1: 11
- FPR_UNO.1.1: 1
- FPT:
- FPT_FLS: 49
- FPT_FLS.1: 17
- FPT_FLS.1.1: 1
- FPT_PHP: 8
- FPT_PHP.3: 1
- FPT_RCV: 28
- FPT_RCV.3: 8
- FPT_RCV.4: 1
- FPT_RPL: 7
- FPT_RPL.1: 4
- FPT_TDC: 14
- FPT_TDC.1: 14
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST.1: 1
- FRU:
- FTP:
- FTP_ITC: 24
- FTP_ITC.1: 11
- FTP_TRP: 8
- FTP_TRP.1: 14
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.APPLET: 5
- A.APPS-PROVIDER: 4
- A.CONTROLLING-: 2
- A.CONTROLLING-AUTHORITY: 2
- A.DF_SECURE_VALUES: 1
- A.KEY-ESCROW: 4
- A.MOBILE-OPERATOR: 4
- A.OTA-ADMIN: 4
- A.VERIFICATION: 5
- A.VERIFICATION-: 2
- A.VERIFICATION-AUTHORITY: 2
- D:
- D.API_DATA: 3
- D.APP_CODE: 8
- D.APP_C_DATA: 5
- D.APP_I_DATA: 7
- D.APSD_KEYS: 3
- D.CARD_MNGT_DATA: 3
- D.CASD_KEYS: 3
- D.CRYPTO: 4
- D.DF_CODE: 3
- D.DF_DATA: 2
- D.GP_CODE: 2
- D.ISD_KEYS: 3
- D.JCS_CODE: 3
- D.JCS_DATA: 5
- D.PIN: 5
- D.SEC_DATA: 7
- D.VASD_KEYS: 3
- O:
- O.ALARM: 22
- O.APPLET: 21
- O.APPLI-AUTH: 13
- O.CARD-: 7
- O.CARD-MANAGEMENT: 72
- O.CIPHER: 16
- O.CODE_PKG: 14
- O.COMM_AUTH: 20
- O.COMM_CONFIDENTIALITY: 14
- O.COMM_INTEGRITY: 20
- O.DELETION: 14
- O.DF_ACCESS-CONTROL: 2
- O.DF_AUTHENTICATION: 4
- O.DF_TYPE_CONSISTENCY: 1
- O.DOMAIN-RIGHTS: 27
- O.FIREWALL: 51
- O.GLOBAL_ARRAYS_CONFI: 1
- O.GLOBAL_ARRAYS_CONFID: 18
- O.GLOBAL_ARRAYS_INTEG: 10
- O.INSTALL: 16
- O.JAVAOBJECT: 41
- O.KEY-MNGT: 25
- O.LOAD: 18
- O.NATIVE: 14
- O.OBJ-DELETION: 9
- O.OPERATE: 35
- O.PIN-: 3
- O.PIN-MNGT: 19
- O.REALLOCATION: 17
- O.REMOTE: 15
- O.REMOTE_MTH: 1
- O.REMOTE_MTHD: 5
- O.REMOTE_OBJ: 10
- O.RESOURCES: 25
- O.RMI_SERVICE: 12
- O.ROR: 5
- O.SCP: 63
- O.SCP-IC: 1
- O.SCP-SUPPORT: 2
- O.SCPP: 1
- O.SID: 40
- O.TRANSACTION: 19
- OE:
- OE.AID-MANAGEMENT: 5
- OE.AP-: 1
- OE.AP-KEYS: 6
- OE.APPLET: 9
- OE.APPS-PROVIDER: 6
- OE.BASIC-APPS-VALIDATION: 5
- OE.CA-KEYS: 8
- OE.CODE-: 6
- OE.CODE-EVIDENCE: 20
- OE.CONTROLLING-: 1
- OE.CONTROLLING-AUTHORITY: 3
- OE.DF_SECURE_VALUES: 3
- OE.KEY-CHANGE: 7
- OE.KEY-ESCROW: 6
- OE.KEY-GENERATION: 4
- OE.MOBILE-OPERATOR: 6
- OE.OPERATOR-KEYS: 6
- OE.OTA-ADMIN: 4
- OE.OTA-LOADING: 5
- OE.OTA-SERVERS: 5
- OE.PERSONALIZER: 1
- OE.PRODUCTION: 1
- OE.QUOTAS: 6
- OE.SCP: 3
- OE.SECURE-APPS-: 2
- OE.SECURE-APPS-CERTIFICATION: 4
- OE.SECURITY-DOMAINS: 4
- OE.SHARE-CONTROL: 7
- OE.VA-KEYS: 5
- OE.VA_KEYS: 1
- OE.VERIFICATION: 39
- OE.VERIFICATION-: 1
- OE.VERIFICATION-AUTHORITY: 3
- OP:
- OP.ARRAY_ACCESS: 4
- OP.CREATE: 7
- OP.DELETE_APPLET: 4
- OP.DELETE_PCKG: 3
- OP.DELETE_PCKG_APPLET: 3
- OP.GET_ROR: 3
- OP.INSTANCE_FIELD: 4
- OP.INVK_INTERFACE: 7
- OP.INVK_VIRTUAL: 6
- OP.INVOKE: 3
- OP.JAVA: 5
- OP.PUT: 6
- OP.RECEIVE: 1
- OP.RET_RORD: 3
- OP.SEND: 1
- OP.THROW: 5
- OP.TYPE_ACCESS: 5
- OSP:
- OSP.AID-MANAGEMENT: 4
- OSP.APSD-KEYS: 4
- OSP.BASIC-APPS-VALIDATION: 4
- OSP.CASD-KEYS: 4
- OSP.KEY-CHANGE: 4
- OSP.KEY-GENERATION: 4
- OSP.OPERATOR-KEYS: 4
- OSP.OTA-LOADING: 4
- OSP.OTA-SERVERS: 5
- OSP.QUOTAS: 4
- OSP.SECURE-APPS-: 2
- OSP.SECURE-APPS-CERTIFICATION: 2
- OSP.SECURITY-DOMAINS: 4
- OSP.SHARE-CONTROL: 4
- OSP.VASD-KEYS: 4
- OSP.VERIFICATION: 5
- R:
- T:
- T.COM_EXPLOIT: 6
- T.CONFID-: 1
- T.CONFID-APPLI-DATA: 17
- T.CONFID-JCS-CODE: 6
- T.CONFID-JCS-DATA: 10
- T.DELETION: 5
- T.DF_CLONING: 4
- T.DF_DATA_MODIFICATI: 1
- T.DF_DATA_MODIFICATION: 3
- T.DF_IMPERSONATE: 4
- T.EXE-: 1
- T.EXE-CODE: 8
- T.EXE-CODE-REMOTE: 4
- T.IN: 1
- T.INSTALL: 7
- T.INTEG-: 1
- T.INTEG-APPLI-: 6
- T.INTEG-APPLI-CODE: 11
- T.INTEG-APPLI-DATA: 22
- T.INTEG-JCS-: 1
- T.INTEG-JCS-CODE: 5
- T.INTEG-JCS-DATA: 12
- T.INTEG-USER-DATA: 7
- T.LIFE_CYCLE: 5
- T.NATIVE: 6
- T.OBJ-DELETION: 4
- T.PHYSICAL: 5
- T.RESOURCES: 9
- T.SID: 20
- T.UNAUTHORIZED_ACC: 1
- T.UNAUTHORIZED_ACCESS: 3
- T.UNAUTHORIZED_CAR: 1
- T.UNAUTHORIZED_CARD_MNGT: 7
|
pdf_data/st_keywords/vendor |
|
- Infineon:
- NXP:
- NXP: 7
- NXP Semiconductors: 1
- Oberthur:
- Oberthur: 19
- Oberthur Technologies: 212
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- MD:
- SHA:
- SHA1:
- SHA2:
- SHA-256: 2
- SHA-384: 1
- SHA-512: 1
- SHA256: 1
- SHA384: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- malfunction: 1
- physical tampering: 2
- SCA:
- DPA: 1
- SPA: 1
- physical probing: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- FIPS:
- FIPS 140-2: 1
- FIPS 180-3: 4
- FIPS 186-3: 1
- FIPS 197: 2
- FIPS 46-3: 2
- FIPS 81: 1
- FIPS PUB 140-2: 1
- FIPS PUB 180-3: 1
- FIPS PUB 186-3: 1
- FIPS PUB 197: 1
- FIPS PUB 46-3: 1
- FIPS PUB 81: 1
- FIPS186-3: 2
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 14443-3: 1
- ISO/IEC 9796-1: 1
- ISO/IEC 9797-1: 2
- PKCS:
- RFC:
- SCP:
- SCP 80: 1
- SCP02: 3
- SCP80: 3
- SCP81: 1
|
pdf_data/st_keywords/javacard_version |
|
- GlobalPlatform:
- GlobalPlatform 2.1.1: 1
- GlobalPlatform 2.2.1: 2
- JavaCard:
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
- java:
- javacard:
- javacard.framework: 4
- javacard.framework.service: 3
- javacard.security: 4
- javacardx:
- javacardx.crypto: 3
- javacardx.framework.util: 1
- javacardx.security: 1
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. PUBLIC DRAGONFLY V4 FQR : 401 4747 Issue: 1 Date : 1
- out of scope: 1
|
pdf_data/st_metadata |
|
- /Author: mestiri
- /CreationDate: D:20160304105412+01'00'
- /Creator: PDFCreator Version 1.6.2
- /Keywords: Dragon 4
- /ModDate: D:20160304105412+01'00'
- /Producer: GPL Ghostscript 9.05
- /Subject: ST-LITE
- /Title: FQR 401 4747 Ed 1 dragonFly v4 0 ST Lite
- pdf_file_size_bytes: 1487766
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 205
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
False |
True |
state/st/download_ok |
False |
True |
state/st/extract_ok |
False |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |