name |
Application eTravel EAC v2.0, en configuration EAC, sur la plateforme ouverte MultiApp V3 masquée sur le composant M7820 A11 |
Plateforme Java Card en configuration ouverte de la carte � puce MultiApp V2 masqu�e sur composants de la famille SLE66 |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
FR |
FR |
status |
archived |
archived |
not_valid_after |
01.09.2019 |
01.09.2019 |
not_valid_before |
27.02.2014 |
28.04.2011 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Rapport%20ANSSI-CC-2014_11fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2011-10fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Cible%20ANSSI-CC-2014_11en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2011-10en.pdf |
manufacturer |
Gemalto - Infineon Technologies AG |
Gemalto - Infineon Technologies AG |
manufacturer_web |
https://www.gemalto.com/ |
https://www.gemalto.com/ |
security_level |
AVA_VAN.5, ALC_DVS.2, EAL5+ |
EAL5, AVA_VAN.5, ALC_DVS.2 |
dgst |
1e8a276062b5313d |
3c1728af2f1f762d |
heuristics/cert_id |
ANSSI-CC-2014/11 |
ANSSI-CC-2011/10 |
heuristics/cert_lab |
SERMA |
SERMA |
heuristics/cpe_matches |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_DVS.2, AVA_VAN.5, ADV_ARC.1 |
AVA_MSU.3, AVA_VLA.4, AVA_VAN.5, ALC_DVS.2 |
heuristics/extracted_versions |
2.0 |
- |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2011/79, ANSSI-CC-2011/16, ANSSI-CC-2011/13, ANSSI-CC-2011/12, ANSSI-CC-2011/80 |
heuristics/report_references/directly_referencing |
ANSSI-CC-2014/07, BSI-DSZ-CC-0829-2012, ANSSI-CC-2014/06 |
BSI-DSZ-CC-0626-2009, BSI-DSZ-CC-0523-2008 |
heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2011/79, ANSSI-CC-2011/16, ANSSI-CC-2011/13, ANSSI-CC-2011/12, ANSSI-CC-2011/80 |
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-0640-2010, ANSSI-CC-2014/07, ANSSI-CC-2013/32, BSI-DSZ-CC-0728-2011, ANSSI-CC-2014/06, ANSSI-CC-2013/33, BSI-DSZ-CC-0829-2012 |
BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0626-2009, BSI-DSZ-CC-0169-2002, BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0482-2008, BSI-DSZ-CC-0223-2003, BSI-DSZ-CC-0523-2008, BSI-DSZ-CC-0399-2007 |
heuristics/scheme_data |
- cert_id: ANSSI-CC-2014/11
- description: Le produit certifié est la carte à puce ouverte « MultiApp V3 », pouvant être en mode contact ou sans-contact. Le produit est développé par la société Gemalto et embarqué sur le microcontrôleur M7820 A11 fabriqué par la société Infineon Technologies. Le produit implémente les fonctions de document de voyage électronique conformément aux spécifications de l'organisation de l'aviation ci
- developer: Gemalto / Infineon Technologies AG
- enhanced:
- augmented: ALC_DVS.2, AVA_VAN.5
- category: Cartes à puce
- cc_version: Critères Communs version 3.1r4
- cert_id: ANSSI-CC-2014/11
- certification_date: 2014-03-27
- developer: Gemalto / Infineon Technologies AG
- evaluation_facility: Serma Technologies
- level: EAL5+
- mutual_recognition: SOG-IS CCRA
- protection_profile: BSI-CC-PP-0056-V2, PP EAC PACE
- report_link: https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2014-11fr.pdf
- sponsor: Gemalto
- target_link: https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2014-11en.pdf
- level: EAL5+
- product: Application eTravel EAC v2.0, en configuration EAC, sur la plateforme ouverte MultiApp V3 masquée sur le composant M7820 A11
- sponsor: Gemalto
- url: https://cyber.gouv.fr/produits-certifies/application-etravel-eac-v20-en-configuration-eac-sur-la-plateforme-ouverte
|
- cert_id: ANSSI-CC-2011/10
- description: L'évaluation porte sur la plateforme ouverte Java Card du produit « MultiApp v2 » qui est une carte à puce pouvant être en mode contact ou dual. Le produit est développé par la société Gemalto et embarqué sur l'un des microcontrôleurs SLE66CLX360PEM m1588 k11/a15, SLE66CLX360PE m1587 k11/a15, SLE66CLX800PEM m1580 k11/a15, SLE66CLX800PE m1581 k11/a15, SLE66CX800PE m1599 k11/a15, SLE66CLX144
- developer: Gemalto / Infineon Technologies AG
- enhanced:
- augmented: ALC_DVS.2, AVA_VAN.5
- category: Cartes à puce
- cc_version: Critères Communs version 3.1r3
- cert_id: ANSSI-CC-2011/10
- certification_date: 2011-04-28
- developer: Gemalto / Infineon Technologies AG
- evaluation_facility: Serma Technologies
- level: EAL5+
- mutual_recognition: SOG-IS CCRA
- protection_profile: ANSSI-CC-PP-2010/03
- report_link: https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2011-10fr.pdf
- sponsor: Gemalto
- target_link: https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2011-10en.pdf
- level: EAL5+
- product: Plateforme Java Card en configuration ouverte de la carte à puce MultiApp V2 masquée sur composants de la famille SLE66
- sponsor: Gemalto
- url: https://cyber.gouv.fr/produits-certifies/plateforme-java-card-en-configuration-ouverte-de-la-carte-puce-multiapp-v2
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
BSI-DSZ-CC-0829-2012 |
BSI-DSZ-CC-0626-2009 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0813-2012, BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0695-2011, BSI-DSZ-CC-0829-2012 |
BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0626-2009, BSI-DSZ-CC-0482-2008, BSI-DSZ-CC-0322-2005 |
heuristics/verified_cpe_matches |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
Rapport ANSSI-CC-2014_11fr.pdf |
ANSSI-CC_2011-10fr.pdf |
pdf_data/report_frontpage |
- FR:
- cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 4
- cert_id: ANSSI-CC-2014/11
- cert_item: Application eTravel EAC v2.0, en configuration EAC, sur la plateforme ouverte MultiApp V3 masquée sur le composant M7820 A11
- cert_item_version: Version de l’application eTravel EAC : 2.0 Version plateforme Java Card MultiApp : 3.0 Version du patch : 1.5
- cert_lab: Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
- developer: Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France Infineon Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: BSI-CC-PP-0056-V2, [PP EAC PACE], version 1.3.1 Machine Readable Travel Document with ICAO Application, Extended Access Control with PACE
|
- FR:
- cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 3
- cert_id: ANSSI-CC-2011/10
- cert_item: Plateforme Java Card en configuration ouverte de la carte à puce MultiApp V2 masquée sur composants de la famille SLE66
- cert_item_version: Version plateforme Java Card MultiApp : 2.0 Version du patch : 2.7
- cert_lab: Serma Technologies 30 avenue Gustave Eiffel, 33608 Pessac, France Tél : +33 (0)5 57 26 08 75, mél : [email protected]
- developer: Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France Infineon Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur\\(s\\)(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: ANSSI-CC-PP-2010/03 [PP JCS] Java Card System – Open Configuration, version 2.6
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- FR:
- ANSSI-CC-2014/06: 4
- ANSSI-CC-2014/07: 1
- ANSSI-CC-2014/11: 23
|
- DE:
- BSI-DSZ-CC-0523-2008: 4
- BSI-DSZ-CC-0523-2008-MA-01: 1
- BSI-DSZ-CC-0626-: 1
- BSI-DSZ-CC-0626-2009: 2
- FR:
- ANSSI-CC-2011/10: 24
- ANSSI-CC-PP-2010/03: 2
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP- 0056-V2-2012-MA-01: 1
- BSI-CC-PP-0056-V2: 1
- BSI-PP- 0035-2007: 1
- BSI-PP-0035-2007: 2
|
- ANSSI:
- BSI:
- BSI-PP- 0002-2001: 2
- BSI-PP-0002-2001: 2
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 1
- EAL4: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 1
- EAL4: 2
- EAL5: 4
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 4
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
- AVA_MSU.3: 3
- AVA_VAN: 2
- AVA_VAN.5: 1
- AVA_VLA.4: 3
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
- Gemalto:
- Infineon:
- Infineon: 2
- Infineon Technologies: 23
- Infineon Technologies AG: 1
|
- Gemalto:
- Infineon:
- Infineon: 5
- Infineon Technologies: 24
- Infineon Technologies AG: 3
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- ICAO:
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: Duquesnoy
- /CreationDate: D:20140310105223+01'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20140310105223+01'00'
- /Producer: Acrobat Distiller 9.0.0 (Windows)
- /Title: Microsoft Word - Rapport ANSSI-CC-2014_11fr.doc
- pdf_file_size_bytes: 268204
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 22
|
- /CreationDate: D:20110614113244+02'00'
- /Keywords:
- /ModDate: D:20110614113244+02'00'
- /Producer: Acrobat Distiller 8.0.0 (Windows)
- pdf_file_size_bytes: 270404
- pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
pdf_data/st_filename |
Cible ANSSI-CC-2014_11en.pdf |
ANSSI-CC-cible_2011-10en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0523-2008-MA-01: 1
- BSI-DSZ-CC-0626-2009: 1
- FR:
- NL:
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0056-V2-2012: 1
- BSI-CC-PP-0068-V2-2011: 1
- BSI-PP-0002: 1
- BSI-PP-0035: 1
- BSI-PP-0055: 1
|
- BSI:
- BSI-PP-0002: 1
- BSI-PP-0035: 1
- BSI-PP-0055: 1
- BSI-PP-0056: 1
- other:
- PP-SSCD-T2: 1
- PP-SSCD-T3: 1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 5+: 1
- EAL5: 2
- EAL5 augmented: 1
|
- EAL:
- EAL 5+: 1
- EAL5: 2
- EAL5 augmented: 2
- EAL5+: 2
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ALC:
- AVA:
- AVA_VAN.3: 1
- AVA_VAN.5: 2
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_TDS: 1
- ALC:
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_SAS: 6
- FAU_SAS.1: 7
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 27
- FCS_CKM.1: 10
- FCS_CKM.1.1: 2
- FCS_CKM.2: 4
- FCS_CKM.4: 25
- FCS_CKM.4.1: 1
- FCS_COP: 41
- FCS_COP.1: 5
- FCS_COP.1.1: 7
- FCS_RND: 7
- FCS_RND.1: 6
- FCS_RND.1.1: 2
- FDP:
- FDP_ACC: 5
- FDP_ACC.1: 4
- FDP_ACC.1.1: 1
- FDP_ACF: 4
- FDP_ACF.1: 7
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FDP_ITC.1: 8
- FDP_ITC.2: 8
- FDP_RIP.1: 2
- FDP_RIP.1.1: 1
- FDP_UCT: 2
- FDP_UCT.1: 2
- FDP_UCT.1.1: 1
- FDP_UIT: 2
- FDP_UIT.1: 2
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL: 11
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_API: 10
- FIA_API.1: 5
- FIA_API.1.1: 1
- FIA_SOS.2: 1
- FIA_UAU: 25
- FIA_UAU.1: 2
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UAU.4: 2
- FIA_UAU.4.1: 1
- FIA_UAU.5: 3
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6.1: 2
- FIA_UID: 10
- FIA_UID.1: 3
- FIA_UID.1.1: 2
- FIA_UID.1.2: 2
- FMT:
- FMT_LIM: 7
- FMT_LIM.1: 16
- FMT_LIM.1.1: 3
- FMT_LIM.2: 15
- FMT_LIM.2.1: 3
- FMT_MSA.3: 1
- FMT_MTD: 27
- FMT_MTD.1: 10
- FMT_MTD.1.1: 1
- FMT_MTD.3: 3
- FMT_MTD.3.1: 1
- FMT_SMF.1: 22
- FMT_SMF.1.1: 1
- FMT_SMR: 14
- FMT_SMR.1: 2
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS: 4
- FPT_EMS.1: 8
- FPT_EMS.1.1: 3
- FPT_EMS.1.2: 3
- FPT_FLS.1: 4
- FPT_FLS.1.1: 1
- FPT_PHP.3: 5
- FPT_PHP.3.1: 1
- FPT_TST: 2
- FPT_TST.1: 5
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 4
- FTP_ITC.1: 2
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 2
|
- FAU:
- FAU_ARP.1: 5
- FAU_ARP.1.1: 1
- FCO:
- FCS:
- FCS_CKM.1: 9
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.2.1: 1
- FCS_CKM.3: 2
- FCS_CKM.3.1: 1
- FCS_CKM.4: 2
- FCS_CKM.4.1: 1
- FCS_COP.1: 11
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC: 15
- FDP_ACC.1: 1
- FDP_ACC.2: 8
- FDP_ACF: 22
- FDP_ACF.1: 17
- FDP_IFC: 8
- FDP_IFC.1: 3
- FDP_IFC.2: 2
- FDP_IFF: 8
- FDP_IFF.1: 15
- FDP_ITC: 4
- FDP_ITC.2: 5
- FDP_RIP: 17
- FDP_RIP.1: 8
- FDP_ROL: 6
- FDP_ROL.1: 2
- FDP_SDI.2: 2
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UIT: 2
- FDP_UIT.1: 2
- FIA:
- FIA_ATD: 2
- FIA_ATD.1: 1
- FIA_UAI.1: 1
- FIA_UAU: 2
- FIA_UAU.1: 1
- FIA_UID: 4
- FIA_UID.1: 2
- FIA_UID.2: 1
- FIA_USB: 2
- FIA_USB.1: 3
- FMT:
- FMT_MSA: 28
- FMT_MSA.1: 7
- FMT_MSA.2: 1
- FMT_MSA.3: 12
- FMT_MTD: 4
- FMT_MTD.1: 2
- FMT_MTD.3: 1
- FMT_REV: 3
- FMT_REV.1: 4
- FMT_SMF: 8
- FMT_SMF.1: 4
- FMT_SMR: 11
- FMT_SMR.1: 10
- FPR:
- FPR_UNO.1: 2
- FPR_UNO.1.1: 1
- FPT:
- FPT_FLS: 8
- FPT_FLS.1: 4
- FPT_PHP: 2
- FPT_PHP.3: 1
- FPT_RCV: 4
- FPT_RCV.3: 4
- FPT_RCV.4: 1
- FPT_TDC.1: 2
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST: 2
- FPT_TST.1: 3
- FTP:
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.APPLET: 1
- A.DELETION: 1
- A.VERIFICATION: 1
- D:
- D.API_DATA: 3
- D.APP_CODE: 7
- D.APP_C_DATA: 3
- D.APP_I_DATA: 4
- D.CRYPTO: 5
- D.JCS_CODE: 3
- D.JCS_DATA: 5
- D.PIN: 4
- D.SEC_DATA: 7
- O:
- O.ALARM: 1
- O.APPLET: 36
- O.CARD-MANAGEMENT: 1
- O.CIPHER: 2
- O.CODE_PCKG: 16
- O.CODE_PKG: 7
- O.DELETION: 1
- O.FIREWALL: 1
- O.GLOBAL_ARRAYS_CONFID: 1
- O.GLOBAL_ARRAYS_INTEG: 1
- O.INSTALL: 1
- O.JAVAOBJECT: 56
- O.KEY-MNGT: 2
- O.LOAD: 1
- O.NATIVE: 1
- O.OBJ-DELETION: 1
- O.OPERATE: 1
- O.PIN-MNGT: 2
- O.REALLOCATION: 1
- O.REMOTE: 1
- O.REMOTE_MTHD: 9
- O.REMOTE_OBJ: 13
- O.REMOTE_OBJECT: 2
- O.RESOURCES: 1
- O.RMI_SERVICE: 17
- O.ROR: 18
- O.SCP: 3
- O.SID: 1
- O.TRANSACTION: 2
- OE:
- OE.APPLET: 1
- OE.VERIFICATION: 1
- OP:
- OP.ARRAY_ACCESS: 6
- OP.CREATE: 10
- OP.DELETE_APPLET: 6
- OP.DELETE_PCKG: 4
- OP.DELETE_PCKG_APPLET: 4
- OP.GET_ROR: 6
- OP.INSTANCE_FIELD: 6
- OP.INVK_INTERFACE: 10
- OP.INVK_VIRTUAL: 8
- OP.INVOKE: 12
- OP.JAVA: 8
- OP.PUT: 7
- OP.RET: 1
- OP.RET_RORD: 3
- OP.THROW: 7
- OP.TYPE_ACCESS: 7
- OSP:
- R:
- T:
- T.CONFID-APPLI-DATA: 1
- T.CONFID-JCS-CODE: 1
- T.CONFID-JCS-DATA: 1
- T.DELETION: 1
- T.EXE-CODE: 3
- T.EXE-CODE-REMOTE: 1
- T.INSTALL: 1
- T.INTEG-APPLI-CODE: 2
- T.INTEG-APPLI-DATA: 2
- T.INTEG-JCS-CODE: 1
- T.INTEG-JCS-DATA: 1
- T.NATIVE: 1
- T.OBJ-DELETION: 1
- T.PHYSICAL: 1
- T.RESOURCES: 1
- T.SID: 2
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- 3DES:
- 3DES: 2
- TDES: 7
- Triple-DES: 6
- DES:
- constructions:
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 3
- SHA-256: 3
- SHA-384: 3
- SHA-512: 3
- SHA224: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 3
- Physical Tampering: 2
- Physical tampering: 2
- fault injection: 1
- malfunction: 4
- SCA:
- DPA: 2
- Leak-Inherent: 1
- SPA: 1
- physical probing: 3
- timing attacks: 1
- other:
|
- FI:
- malfunction: 2
- physical tampering: 1
- SCA:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
- EF:
- EF.COM: 3
- EF.DG1: 8
- EF.DG14: 4
- EF.DG15: 2
- EF.DG16: 6
- EF.DG2: 5
- EF.DG3: 9
- EF.DG4: 9
- EF.DG5: 3
- EF.SOD: 4
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- FIPS:
- FIPS 186-3: 1
- FIPS 197: 1
- FIPS 46-3: 1
- FIPS PUB 46-3: 1
- FIPS180-2: 1
- FIPS46-3: 1
- ICAO:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816-4: 1
- NIST:
- PKCS:
- RFC:
- SCP:
- SCP01: 1
- SCP02: 1
- SCP03: 2
|
- BSI:
- CC:
- CCMB-2009-07-001: 2
- CCMB-2009-07-002: 2
- CCMB-2009-07-003: 2
- CCMB-2009-07-004: 2
- FIPS:
- ICAO:
- PKCS:
- PKCS#1: 10
- PKCS#3: 1
- PKCS#5: 3
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
- java:
- javacard:
- javacard.framework: 2
- javacard.framework.service: 2
- javacardx:
|
pdf_data/st_keywords/certification_process |
|
- SecurityFunction:
- security function SF.9: 1
|
pdf_data/st_metadata |
- /Author: Antoine de Lavernette
- /CreationDate: D:20140127145341+01'00'
- /Creator: Microsoft® Office Word 2007
- /Keywords: Security Target, CC, eTravel
- /ModDate: D:20140127145341+01'00'
- /Producer: Microsoft® Office Word 2007
- /Subject: MRTD
- /Title: eTravel EAC v2 Security Target
- pdf_file_size_bytes: 1010629
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 73
|
- /CreationDate: D:20110614113132+02'00'
- /Keywords:
- /ModDate: D:20110614113132+02'00'
- /Producer: Microsoft® Office Word 2007
- pdf_file_size_bytes: 802338
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 77
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |