name |
Oberthur Technologies Applet ID One Classic v1.01.1 en configuration CNS, Classic ou CIE masquée sur Cosmo v7.0-a Standard et Basic sur composants Atmel
|
Oberthur Technologies Applet ID One Classic v1.01.1 en configuration CNS, Classic ou CIE chargée sur Cosmo v7.0-n Large, Standard et Basic (modes dual ou contact) sur composants NXP
|
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
not_valid_before |
2010-05-20
|
2010-05-20
|
not_valid_after |
2019-09-01
|
2019-09-01
|
scheme |
FR
|
FR
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2010-26en.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2010-27en.pdf
|
status |
archived
|
archived
|
manufacturer |
Oberthur Technologies / ATMEL Secure Microcontroller Solutions
|
Oberthur Technologies / NXP Semiconductors GmbH
|
manufacturer_web |
https://www.oberthur.com/
|
https://www.oberthur.com/
|
security_level |
ALC_DVS.2, AVA_VAN.5, EAL4+ |
ALC_DVS.2, AVA_VAN.5, EAL4+ |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2010-26fr.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2010-27fr.pdf
|
cert_link |
None
|
None
|
protection_profiles |
|
|
maintenance_updates |
frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2011, 7, 18), 'maintenance_title': 'Rapport de maintenance ANSSI-CC-2010/26-M01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2010-26-M01fr.pdf', 'maintenance_st_link': None}) |
frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2011, 7, 18), 'maintenance_title': 'Rapport de maintenance ANSSI-CC-2010/27-M01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2010-27-M01fr.pdf', 'maintenance_st_link': None}) |
state/cert |
- _type:
sec_certs.sample.cc.CCCertificate.DocumentState
- download_ok:
False
- convert_garbage:
False
- convert_ok:
False
- extract_ok:
False
- pdf_hash:
None
- txt_hash:
None
|
- _type:
sec_certs.sample.cc.CCCertificate.DocumentState
- download_ok:
False
- convert_garbage:
False
- convert_ok:
False
- extract_ok:
False
- pdf_hash:
None
- txt_hash:
None
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
9ac239291263124dbf8c29f074be4b53f95dffc28effe79edec0ca9ae670fd35
|
dde77ce88c787db261ad33b51caffaa0879b284448fb220b24e13b33ae2c5965
|
state/report/txt_hash |
71f471588cf2df2fd3e8599f7c111c55c0ec320e4ccebc7f225218127c28c14c
|
3c40103fd69af45728e6e4d78582913bf90bcad39f08e91eed3ea455040b2fd4
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
26ca91cab157b1b501322d05e7ffe3eddd4483440b1bec3ae887434f84ff23f1
|
d4710038a5ea8732419a5199f79ffccdf77223f0616c759a3cf84ded4b4cd6d0
|
state/st/txt_hash |
ebd882112948ec120c04c1e6f13708caf0118c3e3087b5b4182a43db51471544
|
d5141c190c80417f61c8d63d3280145fe778b9ab6276eaca8e2ce819046cd740
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
ANSSI-CC-2010/26
|
ANSSI-CC-2010/27
|
heuristics/cert_lab |
THALES |
THALES |
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_sars |
ALC_TAT.1, ADV_TDS.3, ALC_DVS.2, ALC_CMC.4, ASE_CCL.1, ASE_TSS.1, ATE_COV.2, ALC_LCD.1, ATE_FUN.1, ALC_CMS.4, AGD_OPE.1, ASE_OBJ.2, ALC_DEL.1, ADV_IMP.2, ASE_INT.1, ASE_REQ.2, ADV_ARC.1, AGD_PRE.1, AVA_VAN.5, ASE_ECD.1, ASE_SPD.1, ADV_FSP.4 |
ALC_TAT.1, ADV_TDS.3, ALC_DVS.2, ALC_CMC.4, ASE_CCL.1, ASE_TSS.1, ATE_COV.2, ALC_LCD.1, ATE_FUN.1, ALC_CMS.4, AGD_OPE.1, ASE_OBJ.2, ALC_DEL.1, ADV_IMP.2, ASE_INT.1, ASE_REQ.2, ADV_ARC.1, AGD_PRE.1, AVA_VAN.5, ASE_ECD.1, ASE_SPD.1, ADV_FSP.4 |
heuristics/extracted_versions |
1.01.1, 7.0 |
1.01.1, 7.0 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references/directly_referenced_by |
None
|
None
|
heuristics/report_references/indirectly_referenced_by |
None
|
None
|
heuristics/scheme_data/cert_id |
2010/26
|
2010/27
|
heuristics/scheme_data/description |
Le produit certifié est l'applet, d'Oberthur Technologies, ID One Classic v1.01.1 en configuration CNS, Classic ou CIE masquée sur la plateforme, d'Oberthur Technologies, Cosmo v7.0-a Standard et Basic sur composants Atmel Secure Microcontroller Solutions.
La TOE (Target Of Evaluation - cible d'évaluation) est une carte à puce destinée à être utilisée dans le cadre de projets me
|
Le produit certifié est l'applet, d'Oberthur Technologies, ID One Classic v1.01.1 en configuration CNS, Classic ou CIE chargée sur la plateforme, d'Oberthur Technologies, Cosmo v7.0-n Large, Standard et Basic (modes dual ou contact) sur composants NXP.
La TOE (Target Of Evaluation - cible d'évaluation) est une carte à puce destinée à être utilisée dans le cadre de projets mettan
|
heuristics/scheme_data/developer |
Oberthur Technologies et Atmel Secure Microcontroller Solutions
|
Oberthur Technologies et NXP Semiconductors GmbH
|
heuristics/scheme_data/enhanced/augmented |
ALC_DVS.2, AVA_VAN.5
|
ALC_DVS.2, AVA_VAN.5
|
heuristics/scheme_data/enhanced/category |
Cartes à puce
|
Cartes à puce
|
heuristics/scheme_data/enhanced/cc_version |
Critères Communs version 3.1
|
Critères Communs version 3.1
|
heuristics/scheme_data/enhanced/cert_id |
2010/26
|
2010/27
|
heuristics/scheme_data/enhanced/certification_date |
20/05/2010
|
20/05/2010
|
heuristics/scheme_data/enhanced/developer |
Oberthur Technologies et Atmel Secure Microcontroller Solutions
|
Oberthur Technologies et NXP Semiconductors GmbH
|
heuristics/scheme_data/enhanced/evaluation_facility |
CEACI (Thales Security Systems - CNES)
|
CEACI (Thales Security Systems - CNES)
|
heuristics/scheme_data/enhanced/level |
EAL4+
|
EAL4+
|
heuristics/scheme_data/enhanced/mutual_recognition |
SOG-IS
CCRA
|
SOG-IS
CCRA
|
heuristics/scheme_data/enhanced/protection_profile |
BSI-PP-0005-2002, BSI-PP-0006-2002
|
BSI-PP-0005-2002, BSI-PP-0006-2002
|
heuristics/scheme_data/enhanced/report_link |
https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2010-26fr.pdf
|
https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2010-27fr.pdf
|
heuristics/scheme_data/enhanced/sponsor |
Oberthur Technologies
|
Oberthur Technologies
|
heuristics/scheme_data/enhanced/target_link |
https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2010-26en.pdf
|
https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2010-27en.pdf
|
heuristics/scheme_data/level |
EAL4+
|
EAL4+
|
heuristics/scheme_data/product |
Applet ID One Classic v1.01.1 en configuration CNS, Classic ou CIE masquée sur Cosmo v7.0-a Standard et Basic sur composants Atmel
|
Applet ID One Classic v1.01.1 en configuration CNS, Classic ou CIE chargée sur Cosmo v7.0-n Large, Standard et Basic (modes dual ou contact) sur composants NXP
|
heuristics/scheme_data/sponsor |
Oberthur Technologies
|
Oberthur Technologies
|
heuristics/scheme_data/url |
https://cyber.gouv.fr/produits-certifies/applet-id-one-classic-v1011-en-configuration-cns-classic-ou-cie-masquee-sur-0
|
https://cyber.gouv.fr/produits-certifies/applet-id-one-classic-v1011-en-configuration-cns-classic-ou-cie-chargee-sur
|
heuristics/st_references/directly_referenced_by |
None
|
None
|
heuristics/st_references/directly_referencing |
ANSSI-CC-2009/46 |
ANSSI-CC-2009/48 |
heuristics/st_references/indirectly_referenced_by |
None
|
None
|
heuristics/st_references/indirectly_referencing |
ANSSI-CC-2009/46, BSI-DSZ-CC-0421-2008, ANSSI-CC-2009/11 |
ANSSI-CC-2009/48 |
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
None
|
None
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords |
None
|
None
|
pdf_data/cert_metadata |
None
|
None
|
pdf_data/report_filename |
ANSSI-CC_2010-26fr.pdf
|
ANSSI-CC_2010-27fr.pdf
|
pdf_data/report_frontpage/FR/cc_security_level |
EAL 4 augmenté ALC_DVS.2, AVA_VAN.5
|
EAL 4 augmenté ALC_DVS.2, AVA_VAN.5
|
pdf_data/report_frontpage/FR/cc_version |
Critères Communs version 3.1
|
Critères Communs version 3.1
|
pdf_data/report_frontpage/FR/cert_id |
ANSSI-CC-2010/26
|
ANSSI-CC-2010/27
|
pdf_data/report_frontpage/FR/cert_item |
Applet ID One Classic v1.01.1 en configuration CNS, Classic ou CIE masquée sur Cosmo v7.0-a Standard et Basic sur composants Atmel
|
Applet ID One Classic v1.01.1 en configuration CNS, Classic ou CIE chargée sur Cosmo v7.0-n Large, Standard et Basic (modes dual ou contact) sur composants NXP
|
pdf_data/report_frontpage/FR/cert_item_version |
Version 1.01.1
|
Version 1.01.1
|
pdf_data/report_frontpage/FR/cert_lab |
THALES - CEACI (T3S – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France Tél : +33 (0)5 62 88 28 01 ou 18, mél : [email protected]
|
THALES - CEACI (T3S – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France Tél : +33 (0)5 62 88 28 01 ou 18, mél : [email protected]
|
pdf_data/report_frontpage/FR/developer |
Oberthur Technologies1 50 quai Michelet 92300 Levallois-Perret, France Atmel Secure Microcontroller Solutions1 Maxwell Building - Scottish Enterprise technology Park East Kilbride, G75 0QR - Ecosse, Royaume-Uni Commanditaire Oberthur Technologies 50 quai Michelet 92300 Levallois-Perret, France
|
Oberthur Technologies1 50 quai Michelet 92300 Levallois-Perret, France NXP Semiconductors GmbH1 Stresemannallee 101 D-22502 Hamburg, Germany Commanditaire Oberthur Technologies 50 quai Michelet 92300 Levallois-Perret, France
|
pdf_data/report_frontpage/FR/match_rules |
Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables |
Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables |
pdf_data/report_frontpage/FR/ref_protection_profiles |
BSI-PP-0005-2002] : SSCD Type 2, version 1.04 [BSI-PP-0006-2002] : SSCD Type 3, version 1.05
|
BSI-PP-0005-2002] : SSCD Type 2, version 1.04 [BSI-PP-0006-2002] : SSCD Type 3, version 1.05
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id/FR |
- ANSSI-CC-2010/26: 20
- ANSSI-CC-2009_46: 7
- ANSSI-CC-2009_36:
2
- ANSSI-CC-2007_02-M02:
1
|
- ANSSI-CC-2010/27: 21
- ANSSI-CC-2009_48: 6
- ANSSI-CC-2010_36: 1
- ANSSI-CC-2009_36:
1
- ANSSI-CC-2007_02-M02:
1
|
pdf_data/report_keywords/cc_cert_id/FR/ANSSI-CC-2007_02-M02 |
1
|
1
|
pdf_data/report_keywords/cc_cert_id/FR/ANSSI-CC-2009_36 |
2
|
1
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-PP-0005-2002:
2
- BSI-PP-0006-2002:
2
- BSI-PP- 0005-2002:
1
- BSI-PP- 0006-2002:
1
|
- BSI:
- BSI-PP-0005-2002:
2
- BSI-PP-0006-2002:
2
- BSI-PP- 0005-2002:
1
- BSI-PP- 0006-2002:
1
|
pdf_data/report_keywords/cc_sar |
- ADO:
- ADV:
- ADV_IMP.2:
1
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_TDS:
1
- AGD:
- ALC:
- ALC_DVS.2:
2
- ALC_FLR:
2
- ALC_CMC:
1
- ALC_CMS:
1
- ALC_DVS:
1
- ALC_TAT:
1
- ATE:
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
- AVA:
- ASE:
- ASE_CCL:
1
- ASE_ECD:
1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_REQ:
1
- ASE_SPD:
1
- ASE_TSS:
1
|
- ADO:
- ADV:
- ADV_IMP.2:
1
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_TDS:
1
- AGD:
- ALC:
- ALC_DVS.2:
2
- ALC_FLR:
2
- ALC_CMC:
1
- ALC_CMS:
1
- ALC_DVS:
1
- ALC_TAT:
1
- ATE:
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
- AVA:
- ASE:
- ASE_CCL:
1
- ASE_ECD:
1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_REQ:
1
- ASE_SPD:
1
- ASE_TSS:
1
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 4:
2
- EAL4:
2
- EAL5:
1
- EAL7:
1
- EAL 1:
1
- EAL 3:
1
- EAL 5:
1
- EAL 7:
1
- ITSEC:
|
- EAL:
- EAL 4:
2
- EAL4:
2
- EAL5:
1
- EAL7:
1
- EAL 1:
1
- EAL 3:
1
- EAL 5:
1
- EAL 7:
1
- ITSEC:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2009-07-001:
1
- CCMB-2009-07-002:
1
- CCMB-2009-07-003:
1
- CCMB-2009-07-004:
1
|
- CC:
- CCMB-2009-07-001:
1
- CCMB-2009-07-002:
1
- CCMB-2009-07-003:
1
- CCMB-2009-07-004:
1
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor |
- Oberthur:
- Oberthur:
1
- Oberthur Technologies:
9
|
- NXP:
- NXP:
25
- NXP Semiconductors:
1
- Oberthur:
- Oberthur:
1
- Oberthur Technologies:
10
|
pdf_data/report_keywords/vendor/Oberthur/Oberthur |
1
|
1
|
pdf_data/report_keywords/vendor/Oberthur/Oberthur Technologies |
9
|
10
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata//CreationDate |
D:20100525132900+02'00'
|
D:20100525133424+02'00'
|
pdf_data/report_metadata//Keywords |
|
|
pdf_data/report_metadata//ModDate |
D:20100525132900+02'00'
|
D:20100525133424+02'00'
|
pdf_data/report_metadata//Producer |
Acrobat Distiller 8.0.0 (Windows)
|
Acrobat Distiller 8.0.0 (Windows)
|
pdf_data/report_metadata/pdf_file_size_bytes |
195087
|
263844
|
pdf_data/report_metadata/pdf_hyperlinks |
|
|
pdf_data/report_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/report_metadata/pdf_number_of_pages |
19
|
20
|
pdf_data/st_filename |
ANSSI-CC-cible_2010-26en.pdf
|
ANSSI-CC-cible_2010-27en.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/cc_cert_id/FR |
|
|
pdf_data/st_keywords/cc_cert_id/NL |
|
|
pdf_data/st_keywords/cc_claims |
- O:
- A:
- OE:
- OE.HI_VAD:
6
- OE.NATIVE:
1
- OE.APPLET:
1
- OE.VERIFICATION:
1
- OSP:
|
- O:
- A:
- OE:
- OE.HI_VAD:
6
- OE.NATIVE:
1
- OE.APPLET:
1
- OE.VERIFICATION:
1
- OSP:
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1:
6
- ADV_FSP.1:
3
- ADV_TDS.1:
2
- ADV_FSP.4:
8
- ADV_TDS.3:
10
- ADV_IMP.1:
5
- ADV_FSP.2:
4
- ADV_IMP.2:
1
- AGD:
- AGD_OPE.1:
6
- AGD_PRE.1:
6
- ALC:
- ALC_DVS.2:
8
- ALC_TAT.1:
3
- ALC_CMC.4:
1
- ALC_CMS.1:
1
- ALC_DVS.1:
2
- ALC_LCD.1:
3
- ALC_CMS.4:
1
- ALC_DEL.1:
1
- ATE:
- ATE_COV.2:
3
- ATE_FUN.1:
6
- ATE_COV.1:
2
- AVA:
- ASE:
- ASE_CCL.1:
1
- ASE_ECD.1:
4
- ASE_INT.1:
5
- ASE_REQ.1:
2
- ASE_REQ.2:
2
- ASE_OBJ.2:
3
- ASE_SPD.1:
2
- ASE_TSS.1:
1
|
- ADV:
- ADV_ARC.1:
6
- ADV_FSP.1:
3
- ADV_TDS.1:
2
- ADV_FSP.4:
8
- ADV_TDS.3:
10
- ADV_IMP.1:
5
- ADV_FSP.2:
4
- ADV_IMP.2:
1
- AGD:
- AGD_OPE.1:
6
- AGD_PRE.1:
6
- ALC:
- ALC_DVS.2:
8
- ALC_TAT.1:
3
- ALC_CMC.4:
1
- ALC_CMS.1:
1
- ALC_DVS.1:
2
- ALC_LCD.1:
3
- ALC_CMS.4:
1
- ALC_DEL.1:
1
- ATE:
- ATE_COV.2:
3
- ATE_FUN.1:
6
- ATE_COV.1:
2
- AVA:
- ASE:
- ASE_CCL.1:
1
- ASE_ECD.1:
4
- ASE_INT.1:
5
- ASE_REQ.1:
2
- ASE_REQ.2:
2
- ASE_OBJ.2:
3
- ASE_SPD.1:
2
- ASE_TSS.1:
1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL4:
10
- EAL5:
1
- EAL 4+:
1
- EAL4+:
3
- EAL4 augmented:
3
- EAL5 augmented:
1
|
- EAL:
- EAL4:
10
- EAL5:
1
- EAL 4+:
1
- EAL4+:
3
- EAL4 augmented:
3
- EAL5 augmented:
1
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM:
43
- FCS_CKM.1:
10
- FCS_CKM.4:
23
- FCS_CKM.4.1:
1
- FCS_COP:
69
- FCS_COP.1:
7
- FCS_CKM.2:
1
- FDP:
- FDP_ACC:
99
- FDP_ACC.1:
37
- FDP_ACF:
85
- FDP_ACF.1:
47
- FDP_ETC:
8
- FDP_ETC.1:
2
- FDP_ITC:
54
- FDP_ITC.1:
21
- FDP_RIP.1:
11
- FDP_RIP.1.1:
1
- FDP_SDI:
19
- FDP_SDI.2:
4
- FDP_UCT:
9
- FDP_UCT.1:
1
- FDP_UIT:
19
- FDP_UIT.1:
4
- FDP_ITC.2:
9
- FDP_IFC.1:
14
- FIA:
- FIA_AFL.1:
11
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
1
- FIA_ATD.1:
8
- FIA_ATD.1.1:
1
- FIA_UAU.1:
14
- FIA_UAU.1.1:
1
- FIA_UID.1:
15
- FIA_UAU.1.2:
1
- FIA_UID.1.1:
1
- FIA_UID.1.2:
1
- FIA_AFL:
13
- FMT:
- FMT_MOF.1:
10
- FMT_MOF.1.1:
1
- FMT_MSA:
47
- FMT_MSA.1:
13
- FMT_MSA.2:
9
- FMT_MSA.2.1:
1
- FMT_MSA.3:
34
- FMT_MSA.3.1:
1
- FMT_MSA.3.2:
1
- FMT_MTD.1:
9
- FMT_MTD.1.1:
1
- FMT_SMR.1:
28
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_SMF.1:
30
- FMT_SMF.1.1:
1
- FPT:
- FPT_TEE.1:
13
- FPT_TEE.1.1:
1
- FPT_TEE.1.2:
1
- FPT_AMT.1:
5
- FPT_FLS.1:
8
- FPT_FLS.1.1:
1
- FPT_PHP.1:
8
- FPT_PHP.1.1:
1
- FPT_PHP.1.2:
1
- FPT_PHP.3:
10
- FPT_PHP.3.1:
1
- FPT_TST.1:
9
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FPT_EMS.1:
1
- FTP:
- FTP_ITC:
36
- FTP_TRP:
12
- FTP_ITC.1:
14
- FTP_TRP.1:
6
|
- FCS:
- FCS_CKM:
43
- FCS_CKM.1:
10
- FCS_CKM.4:
23
- FCS_CKM.4.1:
1
- FCS_COP:
69
- FCS_COP.1:
7
- FCS_CKM.2:
1
- FDP:
- FDP_ACC:
99
- FDP_ACC.1:
37
- FDP_ACF:
85
- FDP_ACF.1:
47
- FDP_ETC:
8
- FDP_ETC.1:
2
- FDP_ITC:
54
- FDP_ITC.1:
21
- FDP_RIP.1:
11
- FDP_RIP.1.1:
1
- FDP_SDI:
19
- FDP_SDI.2:
4
- FDP_UCT:
9
- FDP_UCT.1:
1
- FDP_UIT:
19
- FDP_UIT.1:
4
- FDP_ITC.2:
9
- FDP_IFC.1:
14
- FIA:
- FIA_AFL.1:
11
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
1
- FIA_ATD.1:
8
- FIA_ATD.1.1:
1
- FIA_UAU.1:
14
- FIA_UAU.1.1:
1
- FIA_UID.1:
15
- FIA_UAU.1.2:
1
- FIA_UID.1.1:
1
- FIA_UID.1.2:
1
- FIA_AFL:
13
- FMT:
- FMT_MOF.1:
10
- FMT_MOF.1.1:
1
- FMT_MSA:
47
- FMT_MSA.1:
13
- FMT_MSA.2:
9
- FMT_MSA.2.1:
1
- FMT_MSA.3:
34
- FMT_MSA.3.1:
1
- FMT_MSA.3.2:
1
- FMT_MTD.1:
9
- FMT_MTD.1.1:
1
- FMT_SMR.1:
28
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_SMF.1:
30
- FMT_SMF.1.1:
1
- FPT:
- FPT_TEE.1:
13
- FPT_TEE.1.1:
1
- FPT_TEE.1.2:
1
- FPT_AMT.1:
5
- FPT_FLS.1:
8
- FPT_FLS.1.1:
1
- FPT_PHP.1:
8
- FPT_PHP.1.1:
1
- FPT_PHP.1.2:
1
- FPT_PHP.3:
10
- FPT_PHP.3.1:
1
- FPT_TST.1:
9
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FPT_EMS.1:
1
- FTP:
- FTP_ITC:
36
- FTP_TRP:
12
- FTP_ITC.1:
14
- FTP_TRP.1:
6
|
pdf_data/st_keywords/certification_process/OutOfScope |
- Out of scope:
1
- 3 Smartcard product life-cycle for the TOE 1 For details regarding phases see [COSMO-ST] §3.5. Out of scope TOE usage Applet Installation and Pre-personalisation Evaluation scope FQR : 110 5041 Issue: 1: 1
|
- Out of scope:
1
- 3 Smartcard product life-cycle for the TOE 1 For details regarding phases see [COSMO-ST] §3.5. Out of scope TOE usage Applet Installation and Pre-personalisation Evaluation scope FQR : 110 5042 Issue: 1: 1
|
pdf_data/st_keywords/certification_process/OutOfScope/Out of scope |
1
|
1
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
- JavaCard:
- Java Card 2.2.1:
1
- Java Card 2.2:
2
|
- JavaCard:
- Java Card 2.2.1:
1
- Java Card 2.2:
2
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/side_channel_analysis |
- SCA:
- physical probing:
1
- side channel:
1
- FI:
|
- SCA:
- physical probing:
1
- side channel:
1
- FI:
|
pdf_data/st_keywords/standard_id |
- FIPS:
- PKCS:
- CC:
- CCMB-2009-07-001:
1
- CCMB-2009-07-002:
1
- CCMB-2009-07-003:
1
- CCMB-2009-07-004:
1
|
- FIPS:
- PKCS:
- CC:
- CCMB-2009-07-001:
1
- CCMB-2009-07-002:
1
- CCMB-2009-07-003:
1
- CCMB-2009-07-004:
1
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor |
- Oberthur:
- Oberthur Technologies:
162
|
- NXP:
- Oberthur:
- Oberthur Technologies:
162
|
pdf_data/st_keywords/vendor/Oberthur |
- Oberthur Technologies:
162
|
- Oberthur Technologies:
162
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata//CreationDate |
D:20100525132820+02'00'
|
D:20100525133408+02'00'
|
pdf_data/st_metadata//Keywords |
|
|
pdf_data/st_metadata//ModDate |
D:20100525132820+02'00'
|
D:20100525133408+02'00'
|
pdf_data/st_metadata//Producer |
AFPL Ghostscript 8.50
|
AFPL Ghostscript 8.50
|
pdf_data/st_metadata/pdf_file_size_bytes |
954799
|
958952
|
pdf_data/st_metadata/pdf_hyperlinks |
|
|
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
80
|
80
|
dgst |
1f6c7d374ff17ce4
|
7bb1d4b3ded1f4fb
|