Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Samsung Galaxy S5 & Note 10.1 2014 Edition
CCEVS-VR-VID-10562-2014
Plateforme J-Safe, en configuration fermée, version 2.11.0, sur le composant SB23YR80B
ANSSI-CC-2015/16
name Samsung Galaxy S5 & Note 10.1 2014 Edition Plateforme J-Safe, en configuration fermée, version 2.11.0, sur le composant SB23YR80B
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme US FR
not_valid_after 19.04.2016 15.05.2020
not_valid_before 10.09.2014 15.05.2015
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10562-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_16.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10562-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_16_Cible.pdf
manufacturer Samsung Electronics Co., Ltd. Incard Division / ST Microelectronics
manufacturer_web https://www.samsung.com
security_level {} EAL5+, ALC_DVS.2, AVA_VAN.5
dgst 2430b5640273f920 bb81f40b202b203a
heuristics/cert_id CCEVS-VR-VID-10562-2014 ANSSI-CC-2015/16
heuristics/cert_lab US SERMA
heuristics/cpe_matches cpe:2.3:h:samsung:galaxy_s5:-:*:*:*:*:*:*:*, cpe:2.3:h:samsung:note_10:-:*:*:*:*:*:*:* {}
heuristics/related_cves CVE-2015-4034 {}
heuristics/extracted_sars ALC_CMS.2, ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, AGD_OPE.1, ALC_TSU_EXT.1, AGD_PRE.1 ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.4, ALC_TAT.2, ASE_REQ.2, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions 10.1 2.11.0
heuristics/report_references/directly_referenced_by {} ANSSI-CC-2015/17
heuristics/report_references/directly_referencing {} ANSSI-CC-2012/68
heuristics/report_references/indirectly_referenced_by {} ANSSI-CC-2015/17
heuristics/report_references/indirectly_referencing {} ANSSI-CC-2009/26, ANSSI-CC-2010/01, ANSSI-CC-2009/05, ANSSI-CC-2009/51, ANSSI-CC-2009/06, ANSSI-CC-2012/68, ANSSI-CC-2009/50, ANSSI-CC-2010/02, ANSSI-CC-2009/62, ANSSI-CC-2009/28
heuristics/st_references/directly_referencing {} ANSSI-CC-2012/68
heuristics/st_references/indirectly_referencing {} ANSSI-CC-2012/68
heuristics/protection_profiles 7a7b216fc3e5f2ae 090c1a53c73889d8
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_MD_v1.1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-profil_PP-2010-07en.pdf
pdf_data/report_filename st_vid10562-vr.pdf ANSSI-CC-2015_16.pdf
pdf_data/report_frontpage
  • FR:
  • US:
    • cert_id: CCEVS-VR-VID10562-2014
    • cert_item: Samsung Electronics Co., Ltd. 416 Maetan-3dong, Yeongtong-gu, Suwon-si, Gyeonggi- do, 443-742 Korea Samsung Electronics Co., Ltd. Samsung Galaxy Samsung Galaxy S5 & Note 10.1 2014 Edition
    • cert_lab: US NIAP
  • FR:
    • cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
    • cc_version: Critères Communs version 3.1 révision 3
    • cert_id: ANSSI-CC-2015/16
    • cert_item: Plateforme J-Safe, en configuration fermée, version 2.11.0, sur le composant SB23YR80B
    • cert_item_version: Version 2.11.0
    • cert_lab: Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
    • developer: STMicroelectronics S.r.l. – Incard Division Z.I Marcianise Sud, 81025 Marcianise, Italie STMicroelectronics 29 Boulevard Romain Rolland, 75669 Paris Cedex 14, France Commanditaire STMicroelectronics S.r.l. – Incard Division Z.I Marcianise Sud, 81025 Marcianise, Italie
    • match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
    • ref_protection_profiles: PP JCS] Java Card protection profile – closed configuration, version 3.0
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10562-2014: 1
  • FR:
    • ANSSI-CC-2012/68: 2
    • ANSSI-CC-2012/68-S02: 1
    • ANSSI-CC-2015/16: 16
    • ANSSI-CC-PP-2010/07-M01: 1
pdf_data/report_keywords/cc_protection_profile_id
  • ANSSI:
    • ANSSI-CC-PP-: 1
    • ANSSI-CC-PP-2010/07-M01: 1
  • BSI:
    • BSI-PP-0035-2007: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 7
    • EAL1: 1
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 5: 3
    • EAL 7: 1
    • EAL4: 2
    • EAL6: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 2
    • ALC_FLR: 2
    • ALC_FLR.1: 1
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 4
pdf_data/report_keywords/vendor
  • Samsung:
    • Samsung: 35
  • STMicroelectronics:
    • STMicroelectronics: 6
pdf_data/report_keywords/eval_facility
  • Gossamer:
    • Gossamer Security: 5
  • Serma:
    • Serma Technologies: 1
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/asymmetric_crypto
  • RSA:
    • RSA-PSS: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-512: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 4
  • VPN:
    • VPN: 2
pdf_data/report_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 5
  • PKCS:
    • PKCS #1: 1
pdf_data/report_metadata
  • /Author: Jerome Myers
  • /Company: The Aerospace Corporation
  • /ContentTypeId: 0x0101005D9107176838F542B4297D2C73272E37
  • /CreationDate: D:20140505144817-04'00'
  • /Creator: Acrobat PDFMaker 10.1 for Word
  • /ModDate: D:20140505144825-04'00'
  • /Producer: Adobe PDF Library 10.0
  • /SourceModified: D:20140505184745
  • /_NewReviewCycle:
  • pdf_file_size_bytes: 154354
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 16
  • /Author: Administrateur
  • /CreationDate: D:20150522134001+02'00'
  • /Creator: Microsoft® Word 2010
  • /Keywords: ANSSI-CC-CER-F-07.016
  • /ModDate: D:20150522134001+02'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: Plateforme J-Safe, en configuration fermée, version 2.11.0, sur le composant SB23YR80B
  • /Title: ANSSI-CC-2015/16
  • pdf_file_size_bytes: 579179
  • pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 15
pdf_data/st_filename st_vid10562-st.pdf ANSSI-CC-2015_16_Cible.pdf
pdf_data/st_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2012/68: 2
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0055: 2
    • BSI-PP- 0035: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 1: 5
    • EAL 1 augmented: 5
  • EAL:
    • EAL4+: 1
    • EAL5: 12
    • EAL5 augmented: 2
    • EAL5+: 3
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP: 1
    • ADV_FSP.1: 9
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 10
    • AGD_PRE: 1
    • AGD_PRE.1: 6
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 4
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 4
    • ALC_TSU_EXT: 2
    • ALC_TSU_EXT.1: 11
  • ATE:
    • ATE_IND: 1
    • ATE_IND.1: 5
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.1: 6
  • ADV:
    • ADV_ARC.1: 7
    • ADV_FSP.1: 4
    • ADV_FSP.2: 2
    • ADV_FSP.4: 1
    • ADV_FSP.5: 9
    • ADV_IMP.1: 10
    • ADV_INT.2: 2
    • ADV_TDS.1: 2
    • ADV_TDS.3: 4
    • ADV_TDS.4: 9
  • AGD:
    • AGD_OPE.1: 7
    • AGD_PRE.1: 7
  • ALC:
    • ALC_CMC.4: 2
    • ALC_CMS.1: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 3
    • ALC_DVS.2: 9
    • ALC_LCD.1: 4
    • ALC_TAT.1: 2
    • ALC_TAT.2: 4
  • ASE:
    • ASE_CCL: 2
    • ASE_CCL.1: 2
    • ASE_ECD: 2
    • ASE_ECD.1: 5
    • ASE_INT.1: 6
    • ASE_OBJ: 2
    • ASE_OBJ.2: 4
    • ASE_REQ: 2
    • ASE_REQ.1: 2
    • ASE_REQ.2: 3
    • ASE_SPD: 2
    • ASE_SPD.1: 3
    • ASE_TSS: 2
    • ASE_TSS.1: 2
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 4
    • ATE_DPT.1: 1
    • ATE_DPT.3: 2
    • ATE_FUN.1: 7
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.4: 1
    • AVA_VAN.5: 9
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKM: 2
    • FCS_CKM.1: 19
    • FCS_CKM.2: 1
    • FCS_CKM.2.1: 1
    • FCS_CKM_EXT: 18
    • FCS_CKM_EXT.1: 1
    • FCS_CKM_EXT.1.1: 1
    • FCS_CKM_EXT.1.2: 1
    • FCS_CKM_EXT.1.3: 1
    • FCS_CKM_EXT.1.4: 1
    • FCS_CKM_EXT.2: 1
    • FCS_CKM_EXT.2.1: 1
    • FCS_CKM_EXT.3: 1
    • FCS_CKM_EXT.3.1: 1
    • FCS_CKM_EXT.3.2: 1
    • FCS_CKM_EXT.4: 1
    • FCS_CKM_EXT.4.1: 2
    • FCS_CKM_EXT.4.2: 1
    • FCS_CKM_EXT.5: 1
    • FCS_CKM_EXT.5.1: 1
    • FCS_CKM_EXT.5.2: 1
    • FCS_CKM_EXT.6: 1
    • FCS_CKM_EXT.6.1: 1
    • FCS_COP: 1
    • FCS_COP.1: 28
    • FCS_RBG_EXT.1: 11
    • FCS_RBG_EXT.1.1: 2
    • FCS_RBG_EXT.1.2: 2
    • FCS_RBG_EXT.1.3: 2
    • FCS_SRV_EXT: 3
    • FCS_SRV_EXT.1: 1
    • FCS_SRV_EXT.1.1: 1
    • FCS_STG_EXT: 9
    • FCS_STG_EXT.1: 1
    • FCS_STG_EXT.1.1: 1
    • FCS_STG_EXT.1.2: 1
    • FCS_STG_EXT.1.3: 1
    • FCS_STG_EXT.1.4: 1
    • FCS_STG_EXT.1.5: 1
    • FCS_STG_EXT.2: 2
    • FCS_STG_EXT.2.1: 1
    • FCS_STG_EXT.2.2: 1
    • FCS_STG_EXT.3: 1
    • FCS_STG_EXT.3.1: 1
    • FCS_STG_EXT.3.2: 1
    • FCS_TLS_EXT: 6
    • FCS_TLS_EXT.1: 1
    • FCS_TLS_EXT.1.1: 1
    • FCS_TLS_EXT.1.2: 1
    • FCS_TLS_EXT.2: 2
    • FCS_TLS_EXT.2.1: 1
    • FCS_TLS_EXT.2.2: 1
  • FDP:
    • FDP_ACC: 2
    • FDP_ACC.1: 1
    • FDP_ACF_EXT: 3
    • FDP_ACF_EXT.1: 1
    • FDP_ACF_EXT.1.1: 1
    • FDP_DAR_EXT: 3
    • FDP_DAR_EXT.1: 1
    • FDP_DAR_EXT.1.1: 1
    • FDP_DAR_EXT.1.2: 1
    • FDP_IFC_EXT: 3
    • FDP_IFC_EXT.1: 1
    • FDP_IFC_EXT.1.1: 1
    • FDP_STG_EXT: 1
    • FDP_STG_EXT.1: 3
    • FDP_STG_EXT.1.1: 1
  • FIA:
    • FIA_AFL_EXT: 3
    • FIA_AFL_EXT.1: 1
    • FIA_AFL_EXT.1.1: 1
    • FIA_AFL_EXT.1.2: 1
    • FIA_PAE_EXT: 3
    • FIA_PAE_EXT.1: 1
    • FIA_PAE_EXT.1.1: 1
    • FIA_PMG_EXT: 3
    • FIA_PMG_EXT.1: 1
    • FIA_PMG_EXT.1.1: 1
    • FIA_TRT_EXT: 3
    • FIA_TRT_EXT.1: 1
    • FIA_TRT_EXT.1.1: 1
    • FIA_UAU: 2
    • FIA_UAU.7: 1
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT: 7
    • FIA_UAU_EXT.1: 4
    • FIA_UAU_EXT.2: 1
    • FIA_UAU_EXT.2.1: 1
    • FIA_UAU_EXT.2.2: 1
    • FIA_UAU_EXT.3: 1
    • FIA_UAU_EXT.3.1: 1
  • FMT:
    • FMT_MOF.1: 8
    • FMT_SMF: 2
    • FMT_SMF.1: 2
    • FMT_SMF.1.1: 1
    • FMT_SMF_EXT: 3
    • FMT_SMF_EXT.1: 2
  • FPT:
    • FPT_AEX_EXT: 12
    • FPT_AEX_EXT.1: 1
    • FPT_AEX_EXT.1.1: 1
    • FPT_AEX_EXT.1.2: 1
    • FPT_AEX_EXT.2: 1
    • FPT_AEX_EXT.2.1: 1
    • FPT_AEX_EXT.3: 1
    • FPT_AEX_EXT.3.1: 1
    • FPT_AEX_EXT.4: 1
    • FPT_AEX_EXT.4.1: 1
    • FPT_AEX_EXT.4.2: 1
    • FPT_BBD_EXT: 3
    • FPT_BBD_EXT.1: 1
    • FPT_BBD_EXT.1.1: 1
    • FPT_KST_EXT: 9
    • FPT_KST_EXT.1: 1
    • FPT_KST_EXT.1.1: 1
    • FPT_KST_EXT.2: 1
    • FPT_KST_EXT.2.1: 1
    • FPT_KST_EXT.3: 1
    • FPT_KST_EXT.3.1: 1
    • FPT_NOT_EXT: 3
    • FPT_NOT_EXT.1: 1
    • FPT_NOT_EXT.1.1: 1
    • FPT_STM: 2
    • FPT_STM.1: 1
    • FPT_STM.1.1: 1
    • FPT_TST_EXT: 6
    • FPT_TST_EXT.1: 1
    • FPT_TST_EXT.1.1: 1
    • FPT_TST_EXT.2: 1
    • FPT_TST_EXT.2.1: 1
    • FPT_TUD_EXT: 6
    • FPT_TUD_EXT.1: 1
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
    • FPT_TUD_EXT.2: 1
    • FPT_TUD_EXT.2.1: 1
    • FPT_TUD_EXT.2.2: 1
    • FPT_TUD_EXT.2.3: 1
    • FPT_TUD_EXT.2.4: 1
  • FTA:
    • FTA_SSL_EXT: 3
    • FTA_SSL_EXT.1: 1
    • FTA_SSL_EXT.1.1: 1
    • FTA_TAB: 2
    • FTA_TAB.1: 1
    • FTA_TAB.1.1: 1
    • FTA_WSE_EXT: 3
    • FTA_WSE_EXT.1: 1
    • FTA_WSE_EXT.1.1: 1
  • FTP:
    • FTP_ITC_EXT: 3
    • FTP_ITC_EXT.1: 1
    • FTP_ITC_EXT.1.1: 1
    • FTP_ITC_EXT.1.2: 1
    • FTP_ITC_EXT.1.3: 1
  • FAU:
    • FAU_ARP: 5
    • FAU_ARP.1: 3
    • FAU_SAA.1: 2
    • FAU_SAS.1: 2
  • FCS:
    • FCS_CKM: 3
    • FCS_CKM.1: 4
    • FCS_CKM.2: 2
    • FCS_CKM.3: 2
    • FCS_CKM.4: 2
    • FCS_COP: 9
    • FCS_COP.1: 4
    • FCS_RNG: 2
    • FCS_RNG.1: 7
    • FCS_RNG.1.1: 1
    • FCS_RNG.1.2: 1
  • FDP:
    • FDP_ACC: 8
    • FDP_ACC.2: 1
    • FDP_ACF: 7
    • FDP_ACF.1: 4
    • FDP_IFC: 3
    • FDP_IFC.1: 7
    • FDP_IFF: 3
    • FDP_IFF.1: 5
    • FDP_ITT.1: 4
    • FDP_RIP: 36
    • FDP_RIP.1: 3
    • FDP_ROL: 12
    • FDP_ROL.1: 3
    • FDP_SDI.2: 2
  • FIA:
    • FIA_ATD: 2
    • FIA_UID: 1
    • FIA_USB: 2
  • FMT:
    • FMT_LIM: 5
    • FMT_LIM.1: 13
    • FMT_LIM.1.1: 1
    • FMT_LIM.2: 12
    • FMT_LIM.2.1: 1
    • FMT_MSA: 14
    • FMT_MSA.1: 2
    • FMT_MSA.2: 2
    • FMT_MSA.3: 4
    • FMT_MTD: 6
    • FMT_SMF.1: 6
    • FMT_SMR: 1
    • FMT_SMR.1: 3
  • FPR:
    • FPR_UNO.1: 3
  • FPT:
    • FPT_FLS: 17
    • FPT_FLS.1: 5
    • FPT_ITT.1: 2
    • FPT_PHP.3: 2
    • FPT_TDC.1: 1
    • FPT_TST.1: 2
  • FRU:
    • FRU_FLT.2: 3
pdf_data/st_keywords/cc_claims
  • OE:
    • OE.CONFIG: 1
    • OE.NOTIFY: 1
    • OE.PRECAUTION: 1
  • A:
    • A.NO-DELETION: 5
    • A.NO-INSTALL: 5
    • A.VERIFICATION: 4
    • A.XXX: 1
  • D:
    • D.API_DATA: 3
    • D.APP_CODE: 6
    • D.APP_C_DATA: 3
    • D.APP_I_DATA: 4
    • D.CRYPTO: 6
    • D.EMBEDDED_SW_CODE: 4
    • D.EMBEDDED_SW_DATA: 4
    • D.GP_CODE: 3
    • D.GP_SENSITIVE_DATA: 3
    • D.JCS_CODE: 4
    • D.JCS_DATA: 6
    • D.PIN: 9
    • D.SEC_DATA: 5
  • O:
    • O.ALARM: 21
    • O.APPLET: 1
    • O.CIPHER: 40
    • O.FIREWALL: 26
    • O.GLOBAL_ARRAYS_CONFID: 15
    • O.GLOBAL_ARRAYS_INTEG: 8
    • O.GP_REGISTRY: 10
    • O.JAVA: 3
    • O.JAVAOB: 2
    • O.JAVAOBJECT: 20
    • O.KEY-MNGT: 15
    • O.KEY_MNGT: 1
    • O.LIFE_CYCLE: 12
    • O.NATIVE: 12
    • O.OBJ-DEL: 1
    • O.OBJ-DELETION: 6
    • O.OPERATE: 34
    • O.PIN-MNGT: 13
    • O.REALLOCATION: 9
    • O.RESOURCES: 9
    • O.RND: 1
    • O.ROLES: 7
    • O.SCP: 65
    • O.SID: 25
    • O.SIDE_CHANNEL: 10
    • O.TRANSACTION: 16
  • OE:
    • OE.CARD-MANAGEMENT: 12
    • OE.CARD_MANAGEMENT: 16
    • OE.MANAGEMENT_OF_SECRETS: 3
    • OE.NO-DELETION: 6
    • OE.NO-INSTALL: 5
    • OE.SCP: 3
    • OE.VERIFICATION: 32
  • OP:
    • OP.ARRAY_ACCESS: 4
    • OP.CARD_LOCK: 4
    • OP.CARD_TERMINATE: 4
    • OP.CREATE: 7
    • OP.GET_CARD_LIFE_CYCLE_: 1
    • OP.GET_CARD_LIFE_CYCLE_STATE: 2
    • OP.INSTANCE_FIELD: 4
    • OP.INVK_INTERFACE: 7
    • OP.INVK_VIRTUAL: 6
    • OP.JAVA: 5
    • OP.MANAGE_APP_LIFE_CYC: 1
    • OP.MANAGE_APP_LIFE_CYCLE_STATE: 3
    • OP.PUT: 6
    • OP.THROW: 5
    • OP.TYPE_ACCESS: 5
  • OSP:
    • OSP.CARD_ADMINISTRATION_DISABLED: 5
    • OSP.MANAGEMENT_OF_SECRETS: 6
    • OSP.ROLES: 5
    • OSP.VERIFICATION: 5
  • R:
    • R.JAVA: 5
  • T:
    • T.CONFID-APPLI-DATA: 17
    • T.CONFID-JCS-CODE: 6
    • T.CONFID-JCS-DATA: 11
    • T.EXE-CODE: 9
    • T.INTEG-: 1
    • T.INTEG-APPLI-CODE: 10
    • T.INTEG-APPLI-DATA: 21
    • T.INTEG-JCS-CODE: 6
    • T.INTEG-JCS-DATA: 10
    • T.LEAKAGE: 1
    • T.LIFE_CYCLE: 7
    • T.NATIVE: 4
    • T.OBJ-DELETION: 4
    • T.PHYSICAL: 9
    • T.RESOURCES: 7
    • T.SID: 16
pdf_data/st_keywords/vendor
  • Qualcomm:
    • Qualcomm: 1
  • Samsung:
    • Samsung: 79
  • STMicroelectronics:
    • STM: 15
    • STMicroelectronics: 8
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 19
      • AES-: 1
      • AES-128: 5
      • AES-256: 9
      • AES256: 1
  • constructions:
    • MAC:
      • HMAC: 5
      • HMAC-SHA-256: 1
      • HMAC-SHA-384: 1
      • HMAC-SHA-512: 2
  • AES_competition:
    • AES:
      • AES: 7
  • DES:
    • 3DES:
      • 3-DES: 2
      • Triple-DES: 1
      • TripleDES: 1
    • DES:
      • DES: 7
  • constructions:
    • MAC:
      • CBC-MAC: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
    • ECDH:
      • ECDH: 2
    • ECDSA:
      • ECDSA: 10
  • FF:
    • DH:
      • DH: 1
  • RSA:
    • RSA 2048: 3
    • RSA-PSS: 1
  • ECC:
    • ECDSA:
      • ECDSA: 1
  • FF:
    • DH:
      • Diffie-Hellman: 5
    • DSA:
      • DSA: 1
pdf_data/st_keywords/hash_function
  • PBKDF:
    • PBKDF: 1
    • PBKDF2: 2
  • SHA:
    • SHA1:
      • SHA-1: 4
    • SHA2:
      • SHA-256: 7
      • SHA-384: 1
      • SHA-512: 4
      • SHA256: 6
  • SHA:
    • SHA1:
      • SHA-1: 3
      • SHA1: 2
    • SHA2:
      • SHA-224: 2
      • SHA-256: 2
      • SHA-384: 1
      • SHA-512: 2
      • SHA224: 2
      • SHA256: 2
      • SHA384: 2
      • SHA512: 2
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 1
  • MAC:
    • MAC: 4
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKEv2: 1
  • IPsec:
    • IPsec: 10
  • TLS:
    • TLS:
      • TLS: 23
      • TLS 1.0: 2
      • TLS 1.1: 1
      • TLS 1.2: 1
  • VPN:
    • VPN: 13
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 5
  • RNG:
    • RBG: 12
    • RNG: 3
  • RNG:
    • RND: 1
    • RNG: 4
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 7
  • CCM:
    • CCM: 1
  • GCM:
    • GCM: 7
  • CBC:
    • CBC: 5
  • ECB:
    • ECB: 2
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 8
    • P-384: 8
    • P-521: 8
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 4
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 4
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_RSA_WITH_AES_128_CBC_SHA: 4
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 2
    • TLS_RSA_WITH_AES_256_CBC_SHA: 4
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 18
  • Neslib:
    • NesLib v.3.1: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 1
    • Physical tampering: 2
    • fault injection: 2
    • malfunction: 2
    • physical tampering: 1
  • SCA:
    • DPA: 3
    • Leak-Inherent: 1
    • SPA: 1
    • physical probing: 4
    • side channel: 1
    • timing attacks: 1
pdf_data/st_keywords/tee_name
  • ARM:
    • TrustZone: 2
  • other:
    • TEE: 11
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 5
    • FIPS 180-4: 2
    • FIPS 186-2: 2
    • FIPS 186-4: 1
    • FIPS 197: 2
    • FIPS 198-1: 2
    • FIPS PUB 186-4: 4
    • FIPS PUB 197: 1
  • NIST:
    • NIST SP 800-132: 1
    • NIST SP 800-38A: 1
    • NIST SP 800-38C: 1
    • NIST SP 800-38D: 1
    • NIST SP 800-38F: 2
    • NIST SP 800-56A: 1
    • NIST SP 800-57: 2
    • SP 800-108: 2
    • SP 800-132: 1
    • SP 800-38A: 1
    • SP 800-38F: 1
    • SP 800-56A: 1
    • SP 800-90A: 1
  • PKCS:
    • PKCS #1: 1
    • PKCS 1: 2
    • PKCS 2: 1
    • PKCS#12: 2
  • RFC:
    • RFC 2246: 2
    • RFC 2818: 2
    • RFC 3394: 1
    • RFC 4346: 1
    • RFC 5216: 1
    • RFC 5246: 9
    • RFC 5280: 2
    • RFC 5289: 4
    • RFC 5759: 1
    • RFC 6460: 4
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
  • PKCS:
    • PKCS#1: 1
    • PKCS1: 1
    • PKCS3: 1
  • SCP:
    • SCP02: 1
pdf_data/st_keywords/javacard_version
  • GlobalPlatform:
    • GlobalPlatform 2.1.1: 2
  • JavaCard:
    • Java Card 3.0.4: 1
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 5
pdf_data/st_keywords/javacard_packages
  • java:
    • java.lang: 1
  • javacard:
    • javacard.framework: 4
    • javacard.framework.applet: 1
    • javacard.security: 23
    • javacard.security.interface: 4
  • javacardx:
    • javacardx.crypto: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
    • and is out of the scope of current evaluation. Any other application being loaded pre-issuance is out of scope of current evaluation. 4.1.2.1 Java Card Platform The Java technology, embedded on the TOE: 1
    • interface for the secure management of applications on the smart card. The Card Manager is out of scope of current evaluation and its administrative interface is permanently disabled before TOE delivery: 1
    • of the TOE to the parties responsible of the following usage phases. Application development is out of scope of current evaluation. TOE Construction phase includes: Product Development Product: 1
    • out of scope: 4
pdf_data/st_metadata
  • /Author: Luca Di Cosmo
  • /CreationDate: D:20150402161829+02'00'
  • /Creator: Microsoft® Word 2013
  • /ModDate: D:20150522134244+02'00'
  • /Producer: Microsoft® Word 2013
  • /Title: J-Safe_SB23YR80B_Security_Target
  • pdf_file_size_bytes: 1236830
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 90
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different