name |
IBM Enterprise PKCS#11 (EP11) Firmware identifier '2b638e8e' (4768) |
Carte Mobile PayPass 1.0 sur plateforme UpTeq NFC2.0.4_OFM sur composant ST33F1ME (S1109398/T1020364, version B) |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
DE |
FR |
status |
archived |
archived |
not_valid_after |
02.08.2024 |
01.09.2019 |
not_valid_before |
02.08.2019 |
29.05.2013 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1094c_pdf.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1094a_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2013-27fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1094b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2013-27en.pdf |
manufacturer |
IBM Corporation |
Gemalto / STMicroelectronics |
manufacturer_web |
https://www.ibm.com |
https://www.gemalto.com/ |
security_level |
EAL4 |
ALC_DVS.2, AVA_VAN.5, EAL4+ |
dgst |
1f2b1fe6f29f21b7 |
3b2d25259ad52afc |
heuristics/cert_id |
BSI-DSZ-CC-1094-2019 |
ANSSI-CC-2013/27 |
heuristics/cert_lab |
BSI |
THALES |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
{} |
ADV_ARC.1, AVA_VAN.5, ATE_COV.2, ASE_TSS.1, AGD_OPE.1, ATE_DPT.1, ADV_IMP.1, ASE_COMP.1, ASE_REQ.2, ALC_TAT.1, ALC_DVS.2, AGD_PRE.1, ASE_CCL.1, ALC_CMS.4, ASE_ECD.1, ADV_TDS.3, ALC_DEL.1, ASE_OBJ.2, ADV_FSP.4, ASE_INT.1, ASE_SPD.1, ATE_FUN.1, ALC_CMC.4, ALC_LCD.1 |
heuristics/extracted_versions |
4768, 11 |
1.0, 2.0.4 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2014/83 |
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-1002-2018 |
ANSSI-CC-2012/49, ANSSI-CC-2013/28 |
heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2014/96, ANSSI-CC-2014/83 |
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-1002-2018 |
ANSSI-CC-2012/49, ANSSI-CC-2011/07, ANSSI-CC-2011/17, ANSSI-CC-2012/11, ANSSI-CC-2012/48, ANSSI-CC-2011/77, ANSSI-CC-2010/49, ANSSI-CC-2010/50, ANSSI-CC-2013/28 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
1094c_pdf.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
- PKCS:
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20190826112423+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, IBM Enterprise PKCS#11 (EP11) Firmware identifier 2b638e8e"
- /ModDate: D:20190906121520+02'00'
- /Producer: LibreOffice 6.1
- /Subject: Urkunde, Zertifikat
- /Title: Certification Report BSI-DSZ-CC-1094-2019
- pdf_file_size_bytes: 368630
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
1094a_pdf.pdf |
ANSSI-CC_2013-27fr.pdf |
pdf_data/report_frontpage |
- FR:
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 4
- cc_version: Product specific Security Target Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-1094-2019
- cert_item: IBM Enterprise PKCS#11 (EP11) Firmware identifier '2b638e8e' (4768
- cert_lab: BSI
- developer: IBM Research & Development Germany
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: None
|
- FR:
- cc_security_level: EAL 4 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 3
- cert_id: ANSSI-CC-2013/27
- cert_item: Carte Mobile PayPass 1.0 sur plateforme UpTeq NFC2.0.4_OFM sur composant ST33F1ME (S1109398/T1020364, version B
- cert_item_version: Application Mobile PayPass 1.0 (S1109398, release A) sur plateforme UpTeq NFC2.0.4_OFM sur composant ST33F1ME
- cert_lab: THALES (TCS – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France
- developer: Gemalto La Vigie, Av du Jujubier, ZI Athelia IV, 13705 La Ciotat Cedex, France STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, B.P. 2, 13106 Rousset, France Commanditaire Gemalto La Vigie, Av du Jujubier, ZI Athelia IV, 13705 La Ciotat Cedex, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit \\(référence/version\\)(.+)Nom de la TOE \\(référence/version\\)(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: néant
- DE:
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-1002-2018: 2
- BSI-DSZ-CC-1094-2019: 14
- NL:
|
- FR:
- ANSSI-CC-2012/49: 1
- ANSSI-CC-2013/27: 20
- ANSSI-CC-2013/28: 4
- ANSSI-CC-PP-2010/04: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 2: 3
- EAL 4: 5
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 1
- EAL 5: 1
- EAL 7: 1
- EAL4: 4
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Gemalto:
- Morpho:
- STMicroelectronics:
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-2: 1
- SHA-224: 1
- SHA-256: 4
- SHA-384: 1
- SHA-512: 1
- SHA256: 4
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
- BSI:
- BSI 7148: 1
- BSI TR-02102: 1
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- AIS 20: 2
- AIS 32: 1
- AIS 38: 1
- FIPS:
- FIPS 180-4: 1
- FIPS 186-4: 9
- FIPS 197: 1
- FIPS 46-3: 1
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- NIST:
- NIST SP 800-38A: 2
- NIST SP 800-90A: 1
- PKCS:
- RFC:
- X509:
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- BOE) for documentation files, Version 1, 2017-07-14, IBM (confidential document) Configuration list from git, Charlotte part; Version 1, Date 2019-03-14, IBM (confidential: 1
- Notes for the configuration list from git, Charlotte part; Version 1, Date 2019-03-14, IBM (confidential document) Hardware configuration list for IBM 4765 and 4767 EP11 HSMs, Version 1.0, 2017- 08-31, IBM: 1
- Report, Version 2, 2019-07-10, Final Evaluation Technical Report, atsec information security GmbH (confidential document) [8] Configuration lists for the TOE: Configuration list of static content measured by SHA256: 1
- Version 1.0, 2016- 12-12, IBM (confidential document) EP11 configuration list BOE, Version 1, 2019-03-27, IBM (confidential document) EP11 configuration: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
|
|
pdf_data/report_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20190826112423+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, IBM Enterprise PKCS#11 (EP11) Firmware identifier 2b638e8e"
- /ModDate: D:20190910151840+02'00'
- /Producer: LibreOffice 6.1
- /Subject: Report BSI-DSZ-CC-1094 Zertifizierung
- /Title: Certification Report BSI-DSZ-CC-1094-2019
- pdf_file_size_bytes: 952779
- pdf_hyperlinks: https://www.ibm.com/downloads/cas/WXRDPRAN, https://www.ibm.com/downloads/cas/RMQG64AV, https://www.bsi.bund.de/zertifizierung, http://www.sogisportal.eu/, http://www.commoncriteriaportal.org/, http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/, https://www.bsi.bund.de/AIS, https://www.bsi.bund.de/zertifizierungsreporte, https://www-01.ibm.com/servers/resourcelink/svc00100.nsf/pages/zosv2r3izst100/$file/izst100_v2r3.pdf
- pdf_is_encrypted: False
- pdf_number_of_pages: 25
|
- /CreationDate:
- /CreationDate--Text:
- /Creator: PDFCreator Version 1.2.1
- /Keywords:
- /ModDate:
- /ModDate--Text:
- /Producer: GPL Ghostscript 9.02
- /Subject:
- /Title:
- pdf_file_size_bytes: 261922
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 19
|
pdf_data/st_filename |
1094b_pdf.pdf |
ANSSI-CC-cible_2013-27en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 1
- EAL4: 3
- EAL4 augmented: 2
- EAL4+: 2
|
pdf_data/st_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 5
- ADV_FSP.1: 3
- ADV_FSP.2: 2
- ADV_FSP.4: 9
- ADV_IMP: 1
- ADV_IMP.1: 4
- ADV_TDS.1: 2
- ADV_TDS.2: 1
- ADV_TDS.3: 8
- AGD:
- AGD_OPE.1: 5
- AGD_PRE.1: 5
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.1: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 6
- ALC_LCD.1: 3
- ALC_TAT.1: 3
- ASE:
- ASE_CCL.1: 1
- ASE_COMP.1: 1
- ASE_ECD.1: 4
- ASE_INT.1: 5
- ASE_OBJ.2: 3
- ASE_REQ.1: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 3
- ATE_DPT.1: 2
- ATE_FUN.1: 6
- AVA:
|
pdf_data/st_keywords/cc_sfr |
|
- FAU:
- FAU_ARP.1: 8
- FAU_ARP.1.1: 1
- FAU_GEN.1: 12
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAA.1: 9
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 2
- FAU_SAR: 13
- FAU_SAR.1: 4
- FCO:
- FCS:
- FCS_CKM: 25
- FCS_CKM.1: 7
- FCS_CKM.2: 1
- FCS_CKM.4: 13
- FCS_COP: 58
- FCS_COP.1: 6
- FCS_RND.1: 1
- FDP:
- FDP_ACC: 150
- FDP_ACC.1: 14
- FDP_ACC.2: 14
- FDP_ACF: 135
- FDP_ACF.1: 35
- FDP_ACF.1.2: 7
- FDP_ACF.1.3: 1
- FDP_DAU.1: 6
- FDP_DAU.1.1: 1
- FDP_DAU.1.2: 1
- FDP_ETC.1: 15
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_IFC: 81
- FDP_IFC.1: 11
- FDP_IFC.2: 8
- FDP_IFF: 66
- FDP_IFF.1: 24
- FDP_IFF.1.2: 4
- FDP_ITC: 30
- FDP_ITC.1: 25
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 16
- FDP_RIP: 8
- FDP_RIP.1: 7
- FDP_RIP.1.1: 1
- FDP_ROL: 2
- FDP_SDI: 1
- FDP_SDI.2: 5
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UIT: 2
- FDP_UIT.1: 13
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL: 18
- FIA_AFL.1: 6
- FIA_ATD: 1
- FIA_ATD.1: 9
- FIA_ATD.1.1: 1
- FIA_SOS: 1
- FIA_SOS.2: 8
- FIA_SOS.2.1: 1
- FIA_SOS.2.2: 1
- FIA_UAU: 44
- FIA_UAU.1: 8
- FIA_UAU.3: 7
- FIA_UAU.3.1: 1
- FIA_UAU.3.2: 1
- FIA_UAU.4: 9
- FIA_UAU.4.1: 1
- FIA_UAU.6: 1
- FIA_UID: 27
- FIA_UID.1: 10
- FIA_USB: 1
- FIA_USB.1: 7
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF: 8
- FMT_MOF.1: 1
- FMT_MSA: 25
- FMT_MSA.1: 3
- FMT_MSA.2: 4
- FMT_MSA.2.1: 1
- FMT_MSA.3: 30
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 7
- FMT_MTD.1: 1
- FMT_REV: 1
- FMT_SMF: 14
- FMT_SMF.1: 5
- FMT_SMR: 6
- FMT_SMR.1: 20
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNO: 1
- FPR_UNO.1: 5
- FPR_UNO.1.1: 1
- FPT:
- FPT_FLS: 6
- FPT_ITT: 2
- FPT_RCV: 3
- FPT_RPL: 1
- FPT_RPL.1: 4
- FPT_RPL.1.1: 1
- FPT_RPL.1.2: 1
- FPT_STM.1: 3
- FPT_TDC.1: 18
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST.1: 6
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 2
- FTP_ITC.1: 10
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 3
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.APPLET: 1
- A.APPS-PROVIDER: 1
- A.CONTROLLING-AUTHORITY: 1
- A.MERCHANT_AUTH: 5
- A.MOBILE-OPERATOR: 1
- A.OTA-ADMIN: 1
- A.VERIFICATION: 1
- A.VERIFICATION-AUTHORITY: 1
- O:
- O.ALARM: 1
- O.APPLI-AUTH: 2
- O.APPLI_AUTH: 1
- O.APP_BLOCK: 15
- O.AUDIT: 14
- O.AUDIT_ACCESS: 10
- O.AUTHORISATION_CONTROL: 20
- O.CARD-MANAGEMENT: 1
- O.CHANNELS: 9
- O.CIPHER: 1
- O.COMM-: 1
- O.COMM-AUTH: 1
- O.COMM-INTEGRITY: 1
- O.COMM_AUTH: 3
- O.DATA_DISCLOSURE: 46
- O.DATA_INTEGRITY: 63
- O.DATA_USERS: 12
- O.DELETION: 1
- O.DOMAIN-RIGHTS: 1
- O.FIREWALL: 1
- O.GLOBAL-ARRAYS-CONFID: 1
- O.GLOBAL-ARRAYS-INTEG: 1
- O.GUIS_AUTH: 15
- O.INSTALL: 1
- O.ISSUING_BANK_AUTH: 54
- O.KEY-MNGT: 1
- O.LOAD: 1
- O.MNO_AUTH: 8
- O.NATIVE: 1
- O.OBJ-DELETION: 1
- O.OPERATE: 1
- O.PIN-MNGT: 1
- O.REALLOCATION: 1
- O.REMOTE: 1
- O.REMOTE_SERVICE_ACTIVCATION: 1
- O.REMOTE_SERVICE_AUDIT: 1
- O.RESSOURCES: 1
- O.RISK_MNGT: 20
- O.RNG: 1
- O.SCP: 2
- O.SID: 1
- O.SIM_UNLOCK: 10
- O.TRANSACTION: 1
- O.TRANSACTION_BYPASS: 53
- O.TRANSACTION_INTEGRITY: 38
- O.TRANSACTION_REPLAY: 11
- O.TRANSACTION_UNIQUENESS: 36
- O.USER_AUTH: 53
- OE:
- OE.ACTIVATION-KEY-ESCROW: 1
- OE.AID-MANAGEMENT: 1
- OE.AP-KEYS: 1
- OE.APPLET: 1
- OE.APPS-PROVIDER: 1
- OE.BANKS_PRIVILEGES: 4
- OE.BASIC-APPS-VALIDATION: 1
- OE.CA-KEYS: 1
- OE.CERTIFICATES_MNGT: 10
- OE.CHANNELS_SELECTION: 3
- OE.CONTROLLING-AUTHORITY: 1
- OE.CUSTOMER_PC_CONFID: 8
- OE.GUIS_IDENTIFICATION: 5
- OE.GUIS_TIMEOUT: 4
- OE.GUI_INST_ALERT: 7
- OE.KEY-CHANGE: 1
- OE.KEY-ESCROW: 1
- OE.KEY-GENERATION: 1
- OE.LATENCY_CONTROL: 5
- OE.MERCHANT_AUTH: 8
- OE.MERCHANT_CONTROL: 7
- OE.MOBILE-OPERATOR: 1
- OE.NFC_PROTOCOL: 5
- OE.NO_VAD: 6
- OE.OPERATOR-KEYS: 1
- OE.OTA-ADMIN: 1
- OE.OTA-LOADING: 1
- OE.OTA-SERVERS: 1
- OE.PERSONALIZER: 1
- OE.POLICY: 5
- OE.POS_APPLICATIONS: 10
- OE.POS_APPROVAL: 7
- OE.POS_DEACTIVATION: 6
- OE.PRODUCTION: 1
- OE.QUOTAS: 1
- OE.SECURE-APPS-CERTIFICATION: 1
- OE.SECURITY-DOMAINS: 1
- OE.SHARE-CONTROL: 1
- OE.TOE_USAGE: 9
- OE.TRANSACTION_DISPLAY: 5
- OE.TRUSTED-APPS-DEVELOPER: 1
- OE.TRUSTED-APPS-PRE-ISSUANCE-LOADING: 1
- OE.VA-KEYS: 1
- OE.VERIFICATION: 1
- OE.VERIFICATION-AUTHORITY: 1
- OSP:
- OSP: 2
- OSP.ACTIVATION-KEY-ESCROW: 1
- OSP.AID-MANAGEMENT: 1
- OSP.APSD-KEYS: 1
- OSP.BANKS_PRIVILEGES: 4
- OSP.BASIC-APPS-VALIDATION: 1
- OSP.CASD-KEYS: 1
- OSP.CERTIFICATES_MNGT: 4
- OSP.CUSTOMER_PC_CONFID: 4
- OSP.GUIS_IDENTIFICATION: 4
- OSP.KEY-CHANGE: 1
- OSP.KEY-ESCROW: 1
- OSP.KEY-GENERATION: 1
- OSP.MERCHANT_CONTROL: 6
- OSP.OPERATOR-KEYS: 1
- OSP.OTA-LOADING: 1
- OSP.OTA-SERVERS: 1
- OSP.PERSONALIZER: 1
- OSP.PISHING: 4
- OSP.POLICY: 4
- OSP.PRODUCTION: 1
- OSP.QUOTAS: 1
- OSP.RND: 1
- OSP.SECURE-APPS-CERTIFICATION: 1
- OSP.SECURITY-DOMAINS: 1
- OSP.SERVICE_AUDIT: 1
- OSP.SHARE-CONTROL: 1
- OSP.TOE_USAGE: 4
- OSP.TRUSTED-APPS-DEVELOPER: 1
- OSP.TRUSTED-APPS-PRE-ISSUANCE-LOADING: 1
- OSP.VASD-KEYS: 1
- OSP.VERIFICATION: 1
- T:
- T.APPLICATIONS_DOS: 6
- T.CERTIF_CORRUPTION: 5
- T.COM-EXPLOIT: 1
- T.CONFID-APPLI-DATA: 1
- T.CONFID-JCS-DATA: 1
- T.CUSTOMER_USURPATION: 7
- T.DELETION: 1
- T.DISCLOSURE: 4
- T.DISCLOSURE_KEYS: 6
- T.DISCLOSURE_REF_PC: 6
- T.EXE-CODE: 1
- T.EXE-CODE-REMOTE: 1
- T.INTEG: 7
- T.INTEG-APPLI-CODE: 2
- T.INTEG-APPLI-DATA: 2
- T.INTEG-JCS-CODE: 1
- T.INTEG-JCS-DATA: 1
- T.INTEG_ACCOUNT_INFO: 7
- T.INTEG_COUNT: 7
- T.INTEG_KEYS: 8
- T.INTEG_LOG_FILE: 6
- T.INTEG_REF_PC: 6
- T.INTEG_SEL_ACT_PARAM: 12
- T.INTEG_TRANS_PARAM: 8
- T.ISSUING-: 2
- T.ISSUING-BANK_USURPATION: 3
- T.LIFE-CYCLE: 1
- T.MAN-IN-THE-MIDDLE: 11
- T.MERCHANT_ACCOMPLICE: 9
- T.MNO_USURPATION: 5
- T.NATIVE: 1
- T.PHYSICAL: 1
- T.RESOURCES: 1
- T.STEALING: 9
- T.TEMPORARY_DATA: 8
- T.TRANSACTION: 1
- T.TRANSACTION_COUNTERFEITING: 12
- T.TRANSACTION_REPLAY: 8
- T.TRANSACTION_REPUDIATION: 7
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_ACCESS_TO_SERVICE: 1
- T.UNAUTHORIZED_CARD_MNGT: 1
|
pdf_data/st_keywords/vendor |
|
- Gemalto:
- Morpho:
- STMicroelectronics:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
- miscellaneous:
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- RIPEMD:
- SHA:
- SHA1:
- SHA2:
- SHA-224: 5
- SHA-256: 14
- SHA-384: 4
- SHA-512: 4
|
|
pdf_data/st_keywords/crypto_scheme |
- KA:
- Key Agreement: 2
- Key agreement: 1
- KEX:
- MAC:
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-192: 8
- P-224: 8
- P-256: 8
- P-384: 8
- P-521: 8
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 3
- malfunction: 2
- SCA:
|
- FI:
- fault induction: 2
- malfunction: 1
- physical tampering: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- BSI:
- FIPS:
- FIPS 140-2: 3
- FIPS 180-4: 1
- FIPS 186-4: 1
- FIPS 197: 4
- ISO:
- PKCS:
- PKCS 11: 1
- PKCS#11: 158
- PKCS1: 14
- PKCS11: 1
- PKCS12: 1
- RFC:
- RFC 3394: 1
- RFC 3447: 12
- RFC 5649: 1
- RFC 8017: 1
- X509:
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: Visegrady, Tamas <tvi (at) zurich.ibm.com>
- /CreationDate: D:20190320220000+01'00'
- /Creator: IBM Research --- Zurich and IBM Boeblingen/Poughkeepsie
- /Keywords: IBM 4768 (hw. 00LV498PLH (3)); PCIeCC; XCP, Enterprise PKCS11 (EP11)
- /ModDate: D:20190320220000+01'00'
- /PTEX.Fullbanner: This is pdfTeX, Version 3.14159265-2.6-1.40.19 (TeX Live 2018/TeX Live for SUSE Linux) kpathsea version 6.3.0
- /Producer: pdfTeX
- /Subject: Security Policy [rev. 288]
- /Title: IBM Enterprise PKCS11(on 4768) Security Target (EAL 4 )
- /Trapped: /False
- pdf_file_size_bytes: 841608
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 53
|
- /CreationDate: D:20121129163538+01'00'
- /Creator: Microsoft® Office Word 2007
- /Keywords: MPP
- /ModDate: D:20130711140243+02'00'
- /Producer: Microsoft® Office Word 2007
- /Subject:
- /Title:
- pdf_file_size_bytes: 1506069
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 133
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |