name |
Fortinet FortiManager 5.6.6 build 7352 190510 (EAL4+) |
Application Mobile PayPass 1.0.13vA.2.4(S1133159, release B) sur plateforme UpTeqNFC2.0.4_OFM configuration MIFARE activéou configuration MIFARE désactivé surcomposant ST33F1ME |
category |
Network and Network-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
ES |
FR |
status |
active |
archived |
not_valid_after |
29.05.2025 |
28.11.2019 |
not_valid_before |
29.05.2020 |
28.11.2014 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2017-48-Diploma.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2017-48-INF-3131.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2014-83.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2017-48-ST.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ASE_MPP1.0.13vA.2.4_NFC2.0.4_OFM-RE_D1321206_v1.0.pdf |
manufacturer |
Fortinet, Inc. |
Gemalto |
manufacturer_web |
https://www.fortinet.com/ |
https://www.gemalto.com/ |
security_level |
EAL4+, ALC_FLR.3 |
EAL4+, ALC_DVS.2, AVA_VAN.5 |
dgst |
27ade261a5b0a226 |
0650753c2f41eacf |
heuristics/cert_id |
2017-48-INF-3131 |
ANSSI-CC-2014/83 |
heuristics/cert_lab |
[] |
THALES |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 |
ASE_INT.1, ASE_COMP.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ADV_FSP.4, ASE_CCL.1 |
heuristics/extracted_versions |
5.6.6 |
1.0.13, 2.0.4, 2.4 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2014/96 |
heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2014/56, ANSSI-CC-2013/27 |
heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2014/96 |
heuristics/report_references/indirectly_referencing |
{} |
ANSSI-CC-2013/27, ANSSI-CC-2010/49, ANSSI-CC-2014/56, ANSSI-CC-2012/11, ANSSI-CC-2013/28, ANSSI-CC-2011/17, ANSSI-CC-2012/49, ANSSI-CC-2012/48, ANSSI-CC-2011/07, ANSSI-CC-2011/77, ANSSI-CC-2010/50 |
heuristics/scheme_data |
- category: Others
- certification_date: 29.05.2020
- enhanced:
- category: Others
- cc_version: Common Criteria 3.1 release 5
- cert_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=939
- certification_date: 29.05.2020
- description: TOE Overview The TOE provides network management to one or more Fortinet network security devices. Authorized administrators are able to configure and manage devices, using functions that include verification and update of firmware and license information. Administrators can create and modify policies and objects and push them to the devices. The TOE is able to retrieve up-to-date antivirus and intrusion prevention signatures from Fortinet’s FortiGuard service to push to the managed devices. The TOE is capable of grouping devices into administrative domains (ADOMs), which simplifies the application of policies, distribution of content security and firmware updates for large implementations. ADOMs are implemented in the evaluated configuration. The TOE has extensive logging capabilities which include the logging of administrative actions and logging of use of the trusted cryptographic channels. The TOE is a software only TOE. It is supported by the FortiManager appliance hardware, which is in the operational environment.
- evaluation_facility: Applus Laboratories
- level: EAL4 + ALC_FLR.3
- manufacturer: Fortinet, Inc.
- report_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=940
- status: Certified
- target_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=938
- type: Product
- manufacturer: Fortinet, Inc.
- product: Fortinet FortiManager 5.6.6 build 7352 190510 (EAL4+)
- product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/368-fortinet-fortimanager-5-6-6-build-7352-190510-eal4
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
2017-48-Diploma.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL4: 2
- EAL4+: 2
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author:
- /CreationDate:
- /Creator:
- /Keywords:
- /ModDate:
- /Producer:
- /Subject:
- /Title:
- /Trapped:
- pdf_file_size_bytes: 868949
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
|
pdf_data/report_filename |
2017-48-INF-3131.pdf |
anssi-cc-2014-83.pdf |
pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 4 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 3
- cert_id: ANSSI-CC-2014/83
- cert_item: Carte Mobile PayPass 1.0.13vA.2.4 sur plateforme UpTeq NFC2.0.4_OFM configuration MIFARE activé ou configuration MIFARE désactivé sur composant ST33F1ME (S1133159B/S1121881B
- cert_item_version: Application Mobile PayPass 1.0.13vA.2.4 (S1133159, release B) sur plateforme UpTeq NFC2.0.4_OFM configuration MIFARE activé ou configuration MIFARE désactivé sur composant ST33F1ME
- cert_lab: THALES (TCS – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France
- developer: Gemalto La Vigie, Av du Jujubier, ZI Athelia IV, 13705 La Ciotat Cedex, France STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, B.P. 2, 13106 Rousset, France Commanditaire Gemalto La Vigie, Av du Jujubier, ZI Athelia IV, 13705 La Ciotat Cedex, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit \\(référence/version\\)(.+)Nom de la TOE \\(référence/version\\)(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: néant
|
pdf_data/report_keywords/cc_cert_id |
|
- FR:
- ANSSI-CC-2013/27: 1
- ANSSI-CC-2014/56: 5
- ANSSI-CC-2014/83: 22
- ANSSI-CC-PP-2010/04: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 2: 1
- EAL 4: 2
- EAL2: 1
- EAL4: 10
- EAL4+: 11
- ITSEC:
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 1
- EAL 5: 1
- EAL 7: 1
- EAL4: 4
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_IMP.1: 1
- AGD:
- ALC:
- ALC_CMC.4: 1
- ALC_DEL.1: 1
- ALC_FLR: 3
- ALC_FLR.3: 9
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_INT.1: 1
- ASE_REQ.2: 1
- ATE:
- ATE_COV.2: 1
- ATE_FUN.1: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 1
- FAU_SAR.1: 1
- FCS:
- FCS_CKM.1: 3
- FCS_CKM.4: 1
- FDP:
- FIA:
- FIA_AFL.1: 1
- FIA_UAU.2: 1
- FMT:
- FMT_MSA.1: 1
- FMT_MTD.1: 1
- FMT_SMR.1: 1
- FPT:
- FTA:
- FTP:
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Gemalto:
- Morpho:
- STMicroelectronics:
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
- /Author:
- /CreationDate:
- /Creator: PDFCreator Version 1.2.1
- /Keywords:
- /ModDate:
- /Producer: GPL Ghostscript 9.02
- /Subject:
- /Title: anssi-cc
- pdf_file_size_bytes: 264109
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 21
|
pdf_data/st_filename |
2017-48-ST.pdf |
ASE_MPP1.0.13vA.2.4_NFC2.0.4_OFM-RE_D1321206_v1.0.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 4: 4
- EAL4: 2
- EAL4+: 4
|
- EAL:
- EAL 4: 1
- EAL4: 3
- EAL4 augmented: 2
- EAL4+: 2
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.3: 6
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 5
- ADV_FSP.1: 3
- ADV_FSP.2: 2
- ADV_FSP.4: 9
- ADV_IMP: 1
- ADV_IMP.1: 4
- ADV_TDS.1: 2
- ADV_TDS.2: 1
- ADV_TDS.3: 8
- AGD:
- AGD_OPE.1: 5
- AGD_PRE.1: 5
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.1: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 6
- ALC_LCD.1: 3
- ALC_TAT.1: 3
- ASE:
- ASE_CCL.1: 1
- ASE_COMP.1: 1
- ASE_ECD.1: 4
- ASE_INT.1: 5
- ASE_OBJ.2: 3
- ASE_REQ.1: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 3
- ATE_DPT.1: 2
- ATE_FUN.1: 6
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 11
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 7
- FAU_GEN.2.1: 1
- FAU_SAR.1: 15
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 9
- FAU_SAR.2.1: 1
- FCS:
- FCS_CKM.1: 35
- FCS_CKM.2: 3
- FCS_CKM.4: 18
- FCS_CKM.4.1: 1
- FCS_COP.1: 17
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 14
- FDP_ACC.1.1: 1
- FDP_ACF.1: 9
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FDP_ITC.1: 2
- FDP_ITC.2: 2
- FIA:
- FIA_AFL.1: 9
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_SOS.1: 8
- FIA_SOS.1.1: 1
- FIA_UAU.1: 4
- FIA_UAU.2: 12
- FIA_UAU.2.1: 1
- FIA_UID.1: 9
- FIA_UID.2: 13
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA.1: 15
- FMT_MSA.1.1: 1
- FMT_MSA.3: 14
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 11
- FMT_MTD.1.1: 1
- FMT_SMF.1: 13
- FMT_SMF.1.1: 1
- FMT_SMR.1: 18
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_ITC.1: 8
- FPT_ITC.1.1: 1
- FPT_STM.1: 11
- FPT_STM.1.1: 1
- FTA:
- FTA_SSL.3: 7
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 8
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 8
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_ARP.1: 9
- FAU_ARP.1.1: 1
- FAU_GEN.1: 13
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAA.1: 10
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 2
- FAU_SAR: 15
- FAU_SAR.1: 4
- FCO:
- FCS:
- FCS_CKM: 27
- FCS_CKM.1: 7
- FCS_CKM.2: 1
- FCS_CKM.4: 13
- FCS_COP: 63
- FCS_COP.1: 6
- FCS_RND.1: 1
- FDP:
- FDP_ACC: 155
- FDP_ACC.1: 14
- FDP_ACC.2: 14
- FDP_ACF: 140
- FDP_ACF.1: 35
- FDP_ACF.1.2: 7
- FDP_ACF.1.3: 1
- FDP_DAU.1: 7
- FDP_DAU.1.1: 1
- FDP_DAU.1.2: 1
- FDP_ETC.1: 16
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_IFC: 85
- FDP_IFC.1: 11
- FDP_IFC.2: 8
- FDP_IFF: 70
- FDP_IFF.1: 24
- FDP_IFF.1.2: 4
- FDP_ITC: 32
- FDP_ITC.1: 26
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 16
- FDP_RIP: 8
- FDP_RIP.1: 8
- FDP_RIP.1.1: 1
- FDP_ROL: 2
- FDP_RPL.1: 1
- FDP_SDI: 1
- FDP_SDI.2: 6
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UIT: 2
- FDP_UIT.1: 14
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL: 20
- FIA_AFL.1: 6
- FIA_ATD: 1
- FIA_ATD.1: 10
- FIA_ATD.1.1: 1
- FIA_SOS: 1
- FIA_SOS.2: 9
- FIA_SOS.2.1: 1
- FIA_SOS.2.2: 1
- FIA_UAU: 48
- FIA_UAU.1: 8
- FIA_UAU.3: 8
- FIA_UAU.3.1: 1
- FIA_UAU.3.2: 1
- FIA_UAU.4: 9
- FIA_UAU.4.1: 1
- FIA_UAU.6: 1
- FIA_UID: 30
- FIA_UID.1: 10
- FIA_USB: 1
- FIA_USB.1: 9
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF: 9
- FMT_MOF.1: 1
- FMT_MSA: 26
- FMT_MSA.1: 3
- FMT_MSA.2: 5
- FMT_MSA.2.1: 1
- FMT_MSA.3: 31
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 8
- FMT_MTD.1: 1
- FMT_REV: 1
- FMT_SMF: 14
- FMT_SMF.1: 6
- FMT_SMR: 6
- FMT_SMR.1: 21
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNO: 1
- FPR_UNO.1: 6
- FPR_UNO.1.1: 1
- FPT:
- FPT_FLS: 6
- FPT_ITC.1: 1
- FPT_ITT: 2
- FPT_RCV: 3
- FPT_RPL: 1
- FPT_RPL.1: 4
- FPT_RPL.1.1: 1
- FPT_RPL.1.2: 1
- FPT_STM.1: 3
- FPT_TDC.1: 19
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST.1: 7
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 2
- FTP_ITC.1: 10
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 3
|
pdf_data/st_keywords/cc_claims |
- A:
- A.DELIVER: 3
- A.LOCATE: 2
- A.MANAGE: 2
- A.NOEVIL: 3
- O:
- O.ACCESS: 9
- O.ADMIN: 9
- O.AUDIT: 11
- O.ENCRYP: 6
- O.IDAUTH: 14
- O.PROTCT: 9
- O.TIME: 11
- OE:
- OE.ADMIN: 10
- OE.PHYCAL: 6
- T:
- T.AUDACC: 3
- T.NOAUTH: 2
- T.PRIVIL: 3
- T.PROCOM: 2
|
- A:
- A.APPLET: 1
- A.APPS-PROVIDER: 1
- A.CONTROLLING-AUTHORITY: 1
- A.MERCHANT_AUTH: 5
- A.MOBILE-OPERATOR: 1
- A.OTA-ADMIN: 1
- A.VERIFICATION: 1
- A.VERIFICATION-AUTHORITY: 1
- O:
- O.ALARM: 1
- O.APPLI-AUTH: 2
- O.APPLI_AUTH: 1
- O.APP_BLOCK: 15
- O.AUDIT: 14
- O.AUDIT_ACCESS: 10
- O.AUTHORISATION_CONTROL: 20
- O.CARD-MANAGEMENT: 1
- O.CHANNELS: 9
- O.CIPHER: 1
- O.COMM-: 1
- O.COMM-AUTH: 1
- O.COMM-INTEGRITY: 1
- O.COMM_AUTH: 3
- O.DATA_DISCLOSURE: 46
- O.DATA_INTEGRITY: 63
- O.DATA_USERS: 12
- O.DELETION: 1
- O.DOMAIN-RIGHTS: 1
- O.FIREWALL: 1
- O.GLOBAL-ARRAYS-CONFID: 1
- O.GLOBAL-ARRAYS-INTEG: 1
- O.GUIS_AUTH: 15
- O.INSTALL: 1
- O.ISSUING_BANK_AUTH: 54
- O.KEY-MNGT: 1
- O.LOAD: 1
- O.MNO_AUTH: 8
- O.NATIVE: 1
- O.OBJ-DELETION: 1
- O.OPERATE: 1
- O.PIN-MNGT: 1
- O.REALLOCATION: 1
- O.REMOTE: 1
- O.REMOTE_SERVICE_ACTIVCATION: 1
- O.REMOTE_SERVICE_AUDIT: 1
- O.RESSOURCES: 1
- O.RISK_MNGT: 20
- O.RNG: 1
- O.SCP: 2
- O.SID: 1
- O.SIM_UNLOCK: 10
- O.TRANSACTION: 1
- O.TRANSACTION_BYPASS: 53
- O.TRANSACTION_INTEGRITY: 38
- O.TRANSACTION_REPLAY: 11
- O.TRANSACTION_UNIQUENESS: 36
- O.USER_AUTH: 53
- OE:
- OE.ACTIVATION-KEY-ESCROW: 1
- OE.AID-MANAGEMENT: 1
- OE.AP-KEYS: 1
- OE.APPLET: 1
- OE.APPS-PROVIDER: 1
- OE.BANKS_PRIVILEGES: 4
- OE.BASIC-APPS-VALIDATION: 1
- OE.CA-KEYS: 1
- OE.CERTIFICATES_MNGT: 10
- OE.CHANNELS_SELECTION: 3
- OE.CONTROLLING-AUTHORITY: 1
- OE.CUSTOMER_PC_CONFID: 8
- OE.GUIS_IDENTIFICATION: 5
- OE.GUIS_TIMEOUT: 4
- OE.GUI_INST_ALERT: 7
- OE.KEY-CHANGE: 1
- OE.KEY-ESCROW: 1
- OE.KEY-GENERATION: 1
- OE.LATENCY_CONTROL: 5
- OE.MERCHANT_AUTH: 8
- OE.MERCHANT_CONTROL: 7
- OE.MOBILE-OPERATOR: 1
- OE.NFC_PROTOCOL: 5
- OE.NO_VAD: 6
- OE.OPERATOR-KEYS: 1
- OE.OTA-ADMIN: 1
- OE.OTA-LOADING: 1
- OE.OTA-SERVERS: 1
- OE.PERSONALIZER: 1
- OE.POLICY: 5
- OE.POS_APPLICATIONS: 10
- OE.POS_APPROVAL: 7
- OE.POS_DEACTIVATION: 6
- OE.PRODUCTION: 1
- OE.QUOTAS: 1
- OE.SECURE-APPS-CERTIFICATION: 1
- OE.SECURITY-DOMAINS: 1
- OE.SHARE-CONTROL: 1
- OE.TOE_USAGE: 9
- OE.TRANSACTION_DISPLAY: 5
- OE.TRUSTED-APPS-DEVELOPER: 1
- OE.TRUSTED-APPS-PRE-ISSUANCE-LOADING: 1
- OE.VA-KEYS: 1
- OE.VERIFICATION: 1
- OE.VERIFICATION-AUTHORITY: 1
- OSP:
- OSP: 2
- OSP.ACTIVATION-KEY-ESCROW: 1
- OSP.AID-MANAGEMENT: 1
- OSP.APSD-KEYS: 1
- OSP.BANKS_PRIVILEGES: 4
- OSP.BASIC-APPS-VALIDATION: 1
- OSP.CASD-KEYS: 1
- OSP.CERTIFICATES_MNGT: 4
- OSP.CUSTOMER_PC_CONFID: 4
- OSP.GUIS_IDENTIFICATION: 4
- OSP.KEY-CHANGE: 1
- OSP.KEY-ESCROW: 1
- OSP.KEY-GENERATION: 1
- OSP.MERCHANT_CONTROL: 6
- OSP.OPERATOR-KEYS: 1
- OSP.OTA-LOADING: 1
- OSP.OTA-SERVERS: 1
- OSP.PERSONALIZER: 1
- OSP.PISHING: 4
- OSP.POLICY: 4
- OSP.PRODUCTION: 1
- OSP.QUOTAS: 1
- OSP.RND: 1
- OSP.SECURE-APPS-CERTIFICATION: 1
- OSP.SECURITY-DOMAINS: 1
- OSP.SERVICE_AUDIT: 1
- OSP.SHARE-CONTROL: 1
- OSP.TOE_USAGE: 4
- OSP.TRUSTED-APPS-DEVELOPER: 1
- OSP.TRUSTED-APPS-PRE-ISSUANCE-LOADING: 1
- OSP.VASD-KEYS: 1
- OSP.VERIFICATION: 1
- T:
- T.APPLICATIONS_DOS: 6
- T.CERTIF_CORRUPTION: 5
- T.COM-EXPLOIT: 1
- T.CONFID-APPLI-DATA: 1
- T.CONFID-JCS-DATA: 1
- T.CUSTOMER_USURPATION: 7
- T.DELETION: 1
- T.DISCLOSURE: 4
- T.DISCLOSURE_KEYS: 6
- T.DISCLOSURE_REF_PC: 6
- T.EXE-CODE: 1
- T.EXE-CODE-REMOTE: 1
- T.INTEG: 7
- T.INTEG-APPLI-CODE: 2
- T.INTEG-APPLI-DATA: 2
- T.INTEG-JCS-CODE: 1
- T.INTEG-JCS-DATA: 1
- T.INTEG_ACCOUNT_INFO: 7
- T.INTEG_COUNT: 7
- T.INTEG_KEYS: 8
- T.INTEG_LOG_FILE: 6
- T.INTEG_REF_PC: 6
- T.INTEG_SEL_ACT_PARAM: 12
- T.INTEG_TRANS_PARAM: 8
- T.ISSUING-: 2
- T.ISSUING-BANK_USURPATION: 3
- T.LIFE-CYCLE: 1
- T.MAN-IN-THE-MIDDLE: 11
- T.MERCHANT_ACCOMPLICE: 9
- T.MNO_USURPATION: 5
- T.NATIVE: 1
- T.PHYSICAL: 1
- T.RESOURCES: 1
- T.STEALING: 9
- T.TEMPORARY_DATA: 8
- T.TRANSACTION: 1
- T.TRANSACTION_COUNTERFEITING: 12
- T.TRANSACTION_REPLAY: 8
- T.TRANSACTION_REPUDIATION: 7
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_ACCESS_TO_SERVICE: 1
- T.UNAUTHORIZED_CARD_MNGT: 1
|
pdf_data/st_keywords/vendor |
|
- Gemalto:
- Morpho:
- STMicroelectronics:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC: 2
- HMAC-SHA-256: 1
- HMAC-SHA-384: 1
|
|
pdf_data/st_keywords/asymmetric_crypto |
- ECC:
- FF:
- DH:
- DH: 5
- DHE: 1
- Diffie-Hellman: 4
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- SSH:
- TLS:
- TLS:
- TLS: 8
- TLS 1.1: 2
- TLS 1.2: 2
- VPN:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- fault induction: 2
- malfunction: 1
- physical tampering: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- FIPS 186-4: 1
- FIPS PUB 197: 1
- PKCS:
- RFC:
- RFC 2631: 1
- RFC 4346: 1
- RFC 5246: 2
- RFC4346: 1
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author:
- /CreationDate:
- /Creator:
- /Keywords:
- /ModDate:
- /Producer:
- /Subject:
- /Title:
- /Trapped:
- pdf_file_size_bytes: 608207
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 51
|
- /Author: cteri
- /CreationDate: D:20140522121822+02'00'
- /Creator: Microsoft® Office Word 2007
- /Keywords: MPP
- /ModDate: D:20141204102057+01'00'
- /Producer: Microsoft® Office Word 2007
- /Subject: CTL Mastercard Payment Application (MPP)
- /Title: Mobile PayPass 1.0.13vA.2.4 on UpTeq NFC2.0.4_OFM with or without MIFARE ACTIVATED - Security Target
- pdf_file_size_bytes: 2125889
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 136
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |