name |
LGMS Security Assessment Report Generator (LGMS Reporter) v1.0.0 |
MultiApp V4 JavaCard Virtual Machine |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
MY |
FR |
status |
archived |
active |
not_valid_after |
24.12.2024 |
22.04.2027 |
not_valid_before |
24.12.2019 |
28.05.2020 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C106-CERTIFICATE-v1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2020_33-s01.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C106-CR-V1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_33fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST-2019%20LGMS%20Security%20Assessment%20Report%20Generator%20Security%20Target-v2.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible_anssi_cc_2020-33.pdf |
manufacturer |
LE Global Services Sdn Bhd |
Gemalto |
manufacturer_web |
https://www.lgms.global |
https://www.gemalto.com/ |
security_level |
EAL2 |
EAL7 |
dgst |
1fc0ca2718acb33f |
dfa48e7ac54d10f0 |
heuristics/cert_id |
ISCB-5-RPT-C106-CR-v1 |
ANSSI-CC-2020/33 |
heuristics/cert_lab |
[] |
SERMA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_CCL.1, ASE_INT.1, ATE_IND.2, ADV_ARC.1, ASE_REQ.2, ALC_DEL.1, ASE_TSS.1, ADV_TDS.1, ATE_COV.1, AGD_OPE.1, AVA_VAN.2, ALC_CMC.2 |
ADV_IMP.2, ADV_ARC.1, AVA_VAN.5, ATE_IND.3, ALC_CMC.5, ASE_TSS.1, ADV_TDS.6, AGD_OPE.1, ADV_TAT.3, ALC_CMS.1, ATE_COV.3, ASE_REQ.2, ADV_SPM.1, ADV_LCD.2, ATE_FUN.2, ADV_CMC.5, ALC_DVS.2, ADV_FSP.6, AGD_PRE.1, ASE_CCL.1, ASE_ECD.1, ADV_INT.3, ALC_DEL.1, ASE_OBJ.2, ALC_LCD.2, ATE_DPT.4, ASE_INT.1, ALC_TAT.3, ASE_SPD.1 |
heuristics/extracted_versions |
1.0.0 |
- |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2017/76, BSI-DSZ-CC-0891-V4-2019 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0891-V3-2018, ANSSI-CC-2017/54, BSI-DSZ-CC-0891-V4-2019, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0891-V2-2016, ANSSI-CC-2017/07, BSI-DSZ-CC-0782-2012, ANSSI-CC-2017/76 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0891-V2-2016 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0891-V2-2016 |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
ISCB-5-CERT-C106-CERTIFICATE-v1.pdf |
certificat-anssi-cc-2020_33-s01.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /AAPL:Keywords: []
- /CreationDate: D:20200106085800Z00'00'
- /Creator: Word
- /Keywords:
- /ModDate: D:20200106085800Z00'00'
- /Producer: macOS Version 10.14.6 (Build 18G95) Quartz PDFContext
- /Title: Microsoft Word - ISCB-5-CERT-C106-CERTIFICATE-v1.docx
- pdf_file_size_bytes: 271097
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author: DUCLOS Charlene
- /CreationDate: D:20220429113327+02'00'
- /Creator: Microsoft® Word 2019
- /Keywords: version x.x, révision x
- /ModDate: D:20220429113327+02'00'
- /Producer: Microsoft® Word 2019
- /Title: ANSSI-CC-2020/33
- pdf_file_size_bytes: 251233
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
ISCB-5-RPT-C106-CR-V1.pdf |
anssi-cc-2020_33fr.pdf |
pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 7
- cc_version: Critères Communs version 3.1 révision 4
- cert_id: ANSSI-CC-2020/33
- cert_item: MultiApp V4 JavaCard Virtual Machine
- cert_item_version: Référence 4.0.1
- cert_lab: Serma Safety & Security 14 rue Galilée, CS 10071, 33608 Pessac Cedex, France
- developer: Gemalto 6 rue de la verrerie, 92190 Meudon, France Trusted Labs 6 rue de la verrerie, 92190 Meudon, France Infineon Technologies AG Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la verrerie, 92190 Meudon, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: Néant
|
pdf_data/report_keywords/cc_cert_id |
- MY:
- ISCB-5-RPT-C106-CR-V1: 27
|
- DE:
- BSI-DSZ-CC-0891-V4-2019: 1
- FR:
- ANSSI-CC-2017/76: 2
- ANSSI-CC-2017/76-S01: 1
- ANSSI-CC-2020/33: 15
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 2: 1
- EAL 3: 1
- EAL 5: 2
- EAL 7: 7
- EAL2: 1
- EAL5: 2
- EAL7: 2
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ADMIN: 1
- A.PHY: 1
- A.TIMESTAMP: 1
|
|
pdf_data/report_keywords/vendor |
|
- Gemalto:
- Infineon:
- Infineon: 2
- Infineon Technologies AG: 1
|
pdf_data/report_keywords/eval_facility |
|
- Serma:
- Serma Safety & Security: 1
- TrustedLabs:
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- ISO:
- ISO/IEC 18045: 2
- ISO/IEC15408: 2
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- OutOfScope:
- by LE Global Services Sdn Bhd. The platform, virtual machine and SQL database of the TOE are out of scope. Users are able to access to TOE upon successful authentication through web browser and perform the: 1
- out of scope: 1
|
|
pdf_data/report_metadata |
- /CreationDate: D:20200106044235Z00'00'
- /Creator: Word
- /ModDate: D:20200106044235Z00'00'
- /Producer: macOS Version 10.15 (Build 19A583) Quartz PDFContext
- /Title: Microsoft Word - ISCB-5-RPT-C106-CR-V1.docx
- pdf_file_size_bytes: 678518
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 28
|
- /Author: Pat
- /CreationDate: D:20200604113216+02'00'
- /Creator: PDF24 Creator
- /ModDate: D:20200604113216+02'00'
- /Producer: GPL Ghostscript 9.26
- /Title: Microsoft Word - ANSSI-CC-2020_33fr.doc
- pdf_file_size_bytes: 481052
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 14
|
pdf_data/st_filename |
ST-2019 LGMS Security Assessment Report Generator Security Target-v2.0.pdf |
cible_anssi_cc_2020-33.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0891-V2-2016: 1
- NL:
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL5+: 1
- EAL6: 1
- EAL6 augmented: 1
- EAL6+: 1
- EAL7: 8
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_TDS.1: 1
- AGD:
- ALC:
- ALC_CMC.2: 1
- ALC_DEL.1: 1
- ASE:
- ASE_CCL: 2
- ASE_CCL.1: 1
- ASE_ECD: 3
- ASE_INT: 2
- ASE_INT.1: 1
- ASE_OBJ: 2
- ASE_REQ: 4
- ASE_REQ.2: 1
- ASE_SPD: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 6
- ADV_CMC.5: 3
- ADV_FSP.1: 2
- ADV_FSP.2: 2
- ADV_FSP.4: 3
- ADV_FSP.6: 11
- ADV_IMP.1: 5
- ADV_IMP.2: 6
- ADV_INT.3: 4
- ADV_LCD.2: 1
- ADV_SPM.1: 7
- ADV_TAT.3: 1
- ADV_TDS.1: 1
- ADV_TDS.3: 3
- ADV_TDS.4: 3
- ADV_TDS.6: 15
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 6
- AGD_PRE: 1
- AGD_PRE.1: 5
- ALC:
- ALC_CMC.5: 7
- ALC_CMS.1: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 6
- ALC_LCD.1: 3
- ALC_LCD.2: 6
- ALC_TAT.1: 2
- ALC_TAT.3: 10
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 4
- ASE_INT.1: 5
- ASE_OBJ.2: 3
- ASE_REQ.1: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 3
- ATE_COV.3: 5
- ATE_DPT.1: 1
- ATE_DPT.4: 4
- ATE_FUN.1: 6
- ATE_FUN.2: 5
- ATE_IND.3: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 8
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 7
- FAU_GEN.2.1: 1
- FDP:
- FDP_ACC.1: 9
- FDP_ACC.1.1: 1
- FDP_ACF.1: 7
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FIA:
- FIA_AFL.1: 7
- FIA_AFL.1.1: 1
- FIA_ATD.1: 6
- FIA_ATD.1.1: 1
- FIA_SOS.1: 6
- FIA_SOS.1.1: 1
- FIA_UAU.1: 6
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID.1: 10
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MSA.1: 7
- FMT_MSA.1.1: 1
- FMT_MSA.3: 8
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF.1: 8
- FMT_SMF.1.1: 1
- FMT_SMR.1: 10
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FTP:
- FTP_TRP.1: 6
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_ARP.1: 16
- FAU_ARP.1.1: 1
- FAU_SAA.1: 2
- FCO:
- FCS:
- FCS_CKM.1: 3
- FCS_CKM.2: 2
- FCS_CKM.3: 2
- FCS_CKM.4: 2
- FCS_COP.1: 3
- FCS_RND.1: 1
- FDP:
- FDP_ACC: 22
- FDP_ACC.1: 4
- FDP_ACC.2: 2
- FDP_ACF: 19
- FDP_ACF.1: 6
- FDP_IFC: 15
- FDP_IFC.1: 5
- FDP_IFF: 13
- FDP_IFF.1: 8
- FDP_ITC: 2
- FDP_RIP: 16
- FDP_ROL: 12
- FDP_ROL.1: 3
- FDP_SDI.1: 1
- FDP_SDI.2: 3
- FDP_UIT: 2
- FIA:
- FIA_ATD: 8
- FIA_ATD.1: 1
- FIA_UAU: 1
- FIA_UID: 4
- FIA_UID.1: 1
- FIA_USB: 2
- FMT:
- FMT_MSA: 54
- FMT_MSA.1: 5
- FMT_MSA.2: 3
- FMT_MSA.3: 10
- FMT_MTD: 16
- FMT_MTD.1: 2
- FMT_MTD.3: 1
- FMT_REV: 1
- FMT_SMF: 14
- FMT_SMF.1: 4
- FMT_SMR: 18
- FMT_SMR.1: 8
- FPR:
- FPT:
- FPT_FLS: 21
- FPT_FLS.1: 4
- FPT_ITT: 1
- FPT_PHP: 1
- FPT_PHP.3: 1
- FPT_RCV: 10
- FPT_RCV.3: 7
- FPT_TDC.1: 9
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST: 1
- FTP:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN: 3
- A.PHY: 3
- A.TIMESTAMP: 2
- O:
- O.AUTHENTICATE: 5
- O.MAL_UPLOAD: 4
- O.SEC_ACCESS: 5
- O.SEC_PROTOCOL: 4
- OE:
- OE.PHY: 3
- OE.TRUSTED_ADMIN: 3
- OE.TRUSTED_TIMESTAMP: 3
- T:
- T.BROKEN_ACCESS: 3
- T.BROKEN_AUTH: 4
- T.MAL_INTERCEPTION: 3
- T.MAL_UPLOAD: 4
|
- A:
- A.ALARM-ENV: 4
- A.APPLET: 5
- A.CIPHER: 4
- A.DELETION: 8
- A.FIREWALL-ENV: 4
- A.GLOBAL_ARRAYS_CONFI: 1
- A.GLOBAL_ARRAYS_CONFID: 3
- A.INSTALL-ENV: 4
- A.KEY-MNGT: 4
- A.LOAD: 4
- A.OBJ-: 1
- A.OBJ-DELETION: 3
- A.OPERATE-ENV: 4
- A.PIN-MNGT: 4
- A.REALLOCATION: 4
- A.RESOURCES: 4
- A.SID: 4
- A.TRANSACTION: 4
- A.VERIFICATION: 5
- D:
- D.API_DATA: 3
- D.APP_CODE: 6
- D.APP_C_DATA: 3
- D.APP_I_DATA: 4
- D.CRYPTO: 3
- D.JCS_CODE: 3
- D.JCS_DATA: 5
- D.PIN: 4
- D.SEC_DATA: 7
- O:
- O.ALARM: 15
- O.APPLET: 1
- O.CARD-MANAGEMENT: 1
- O.DELETION: 1
- O.FIREWALL: 15
- O.GLOBAL_ARRAYS_CONFID: 2
- O.GLOBAL_ARRAYS_INTEG: 3
- O.INSTALL: 8
- O.JAVAOBJECT: 31
- O.KEY-MNGT: 1
- O.LOAD: 1
- O.NATIVE: 11
- O.OBJ-DELETION: 1
- O.OPERATE: 16
- O.PIN-: 1
- O.REALLOCATION: 1
- O.RESOURCES: 1
- O.RND: 4
- O.SCP: 3
- O.SID: 1
- O.TRANSACTION: 1
- OE:
- OE.ALARM-ENV: 2
- OE.APPLET: 4
- OE.CARD-MANAGEMENT: 1
- OE.CARD_MANAGEMENT: 15
- OE.CIPHER: 7
- OE.CODE-EVIDENCE: 10
- OE.DELETION: 3
- OE.FIREWALL-ENV: 4
- OE.GLOBAL_ARRAYS_CONFID: 4
- OE.GLOBAL_ARRAYS_INTEG: 1
- OE.INSTALL-ENV: 2
- OE.KEY-MNGT: 5
- OE.LOAD: 7
- OE.OBJ-DELETION: 5
- OE.OPERATE: 1
- OE.OPERATE-ENV: 4
- OE.PIN-MNGT: 7
- OE.REALLOCATION: 4
- OE.RESOURCES: 6
- OE.RND: 4
- OE.SCP: 22
- OE.SID: 8
- OE.TRANSACTION: 5
- OE.VERIFICATION: 26
- OP:
- OP.ARRAY_ACCESS: 6
- OP.CREATE: 12
- OP.INSTANCE_FIELD: 6
- OP.INVK_INTERFACE: 10
- OP.INVK_VIRTUAL: 8
- OP.JAVA: 8
- OP.PUT: 9
- OP.THROW: 7
- OP.TYPE_ACCESS: 7
- OSP:
- OSP.RND: 4
- OSP.VERIFICATION: 4
- OT:
- OT.GLOBAL_ARRAYS_INTEG: 1
- R:
- T:
- T.CONFID-APPLI-DATA: 4
- T.CONFID-JCS-CODE: 4
- T.CONFID-JCS-DATA: 4
- T.DELETION: 3
- T.EXE-CODE: 8
- T.INSTALL: 4
- T.INTEG-APPLI-CODE: 7
- T.INTEG-APPLI-DATA: 8
- T.INTEG-JCS-CODE: 3
- T.INTEG-JCS-DATA: 4
- T.NATIVE: 4
- T.OBJ-DELETION: 4
- T.PHYSICAL: 4
- T.RESOURCES: 3
- T.SID: 8
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 3
- fault induction: 2
- malfunction: 2
- physical tampering: 1
- SCA:
- DPA: 1
- Leak-Inherent: 3
- physical probing: 2
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
pdf_data/st_keywords/javacard_version |
|
- JavaCard:
- Java Card 2.2.2: 3
- Java Card 3.0.4: 4
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
- java:
- javacard:
- javacard.framework: 1
- javacard.framework.service: 1
- javacard.security: 1
- javacardx:
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- by LE Global Services Sdn Bhd. The platform, virtual machine and SQL database of the TOE are out of scope. Users are able to access to TOE upon successful authentication through web browser and perform the: 1
- out of scope: 1
|
- OutOfScope:
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives OE.SCP.RECOVERY and OE.SCP.SUPPORT are: 1
- out of scope: 1
|
pdf_data/st_metadata |
- /CreationDate: D:20191210064800Z00'00'
- /Creator: Word
- /ModDate: D:20191210064800Z00'00'
- /Producer: macOS Version 10.15.1 (Build 19B88) Quartz PDFContext
- /Title: Microsoft Word - ST-2019 LGMS Security Assessment Report Generator Security Target-v2.0.docx
- pdf_file_size_bytes: 2698829
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 27
|
- /Author: Maria Christofi
- /CreationDate: D:20200309171000+01'00'
- /Creator: Microsoft® Word 2013
- /Keywords: Security Target, CC
- /ModDate: D:20200309171000+01'00'
- /Producer: Microsoft® Word 2013
- /Subject: Security Target
- /Title: Security Target: Formal assurance for MultiAppV4 JCS
- pdf_file_size_bytes: 1571623
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 61
|
state/cert/convert_garbage |
True |
True |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |