Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Fortinet FortiManager 5.6.6 build 7352 190510 (EAL4+)
2017-48-INF-3131
Plateforme Java Card MAV31S en configuration ouverte de la carte à puce Optelio Contactless R7S masquée sur le composant P60D144JVA (version du patch: 1.4)
ANSSI-CC-2015/30
name Fortinet FortiManager 5.6.6 build 7352 190510 (EAL4+) Plateforme Java Card MAV31S en configuration ouverte de la carte à puce Optelio Contactless R7S masquée sur le composant P60D144JVA (version du patch: 1.4)
category Network and Network-Related Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme ES FR
status active archived
not_valid_after 29.05.2025 31.08.2020
not_valid_before 29.05.2020 31.08.2015
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2017-48-Diploma.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2017-48-INF-3131.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015-30en.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2017-48-ST.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi_cible_2015_30_LITE.pdf
manufacturer Fortinet, Inc. Gemalto / NXP Semiconductors
manufacturer_web https://www.fortinet.com/ https://www.gemalto.com/
security_level EAL4+, ALC_FLR.3 EAL4+, ALC_DVS.2, AVA_VAN.5
dgst 27ade261a5b0a226 585fe7142c257928
heuristics/cert_id 2017-48-INF-3131 ANSSI-CC-2015/30
heuristics/cert_lab [] SERMA
heuristics/extracted_sars ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 ALC_DVS.2, ALC_CMC.4, ADV_IMP.1, ATE_COV.2, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ATE_DPT.1, ADV_TDS.4, ALC_TAT.2, ASE_TSS.2, AVA_VLA.5, ATE_IND.2
heuristics/extracted_versions 5.6.6 1.4
heuristics/report_references/directly_referenced_by {} ANSSI-CC-2015/38
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0870-2014, ANSSI-CC-2014/86
heuristics/report_references/indirectly_referenced_by {} ANSSI-CC-2015/38
heuristics/report_references/indirectly_referencing {} ANSSI-CC-2014/06, BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0870-2014, ANSSI-CC-2014/86, BSI-DSZ-CC-0837-2013, BSI-DSZ-CC-0640-2010
heuristics/scheme_data
  • category: Others
  • certification_date: 29.05.2020
  • enhanced:
    • category: Others
    • cc_version: Common Criteria 3.1 release 5
    • cert_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=939
    • certification_date: 29.05.2020
    • description: TOE Overview The TOE provides network management to one or more Fortinet network security devices. Authorized administrators are able to configure and manage devices, using functions that include verification and update of firmware and license information. Administrators can create and modify policies and objects and push them to the devices. The TOE is able to retrieve up-to-date antivirus and intrusion prevention signatures from Fortinet’s FortiGuard service to push to the managed devices. The TOE is capable of grouping devices into administrative domains (ADOMs), which simplifies the application of policies, distribution of content security and firmware updates for large implementations. ADOMs are implemented in the evaluated configuration. The TOE has extensive logging capabilities which include the logging of administrative actions and logging of use of the trusted cryptographic channels. The TOE is a software only TOE. It is supported by the FortiManager appliance hardware, which is in the operational environment.
    • evaluation_facility: Applus Laboratories
    • level: EAL4 + ALC_FLR.3
    • manufacturer: Fortinet, Inc.
    • report_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=940
    • status: Certified
    • target_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=938
    • type: Product
  • manufacturer: Fortinet, Inc.
  • product: Fortinet FortiManager 5.6.6 build 7352 190510 (EAL4+)
  • product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/368-fortinet-fortimanager-5-6-6-build-7352-190510-eal4
heuristics/protection_profiles {} 85bef5b6f16c4d33
maintenance_updates
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-cible_PP-2010-03en.pdf
pdf_data/cert_filename 2017-48-Diploma.pdf
pdf_data/cert_keywords/cc_cert_id
pdf_data/cert_keywords/cc_protection_profile_id
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL4: 2
    • EAL4+: 2
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 2
    • ALC_FLR.3: 1
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
  • O:
    • O.E: 1
  • T:
    • T.I: 1
pdf_data/cert_keywords/vendor
pdf_data/cert_keywords/eval_facility
  • Applus:
    • Applus Laboratories: 1
pdf_data/cert_keywords/symmetric_crypto
pdf_data/cert_keywords/asymmetric_crypto
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
pdf_data/cert_keywords/crypto_scheme
pdf_data/cert_keywords/crypto_protocol
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
pdf_data/cert_keywords/ecc_curve
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
pdf_data/cert_keywords/technical_report_id
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
pdf_data/cert_metadata
  • /Author:
  • /CreationDate:
  • /Creator:
  • /Keywords:
  • /ModDate:
  • /Producer:
  • /Subject:
  • /Title:
  • /Trapped:
  • pdf_file_size_bytes: 868949
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename 2017-48-INF-3131.pdf ANSSI-CC-2015-30en.pdf
pdf_data/report_frontpage
  • FR:
  • FR:
    • cc_security_level: EAL 4 augmented ALC_DVS.2, AVA_VAN.5
    • cc_version: Common Criteria version 3.1 revision 4
    • cert_id: ANSSI-CC-2015/30
    • cert_item: Plateforme Java Card MAV31S en configuration ouverte de la carte à puce Optelio Contactless R7S masquée sur le composant P60D144JVA
    • cert_item_version: Version de la plateforme Java Card MultiApp : 3.1S Version du patch : 1.4
    • cert_lab: Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
    • developer: Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France NXP Semiconductors Box 54 02 40, D-22502 Hambourg, Allemagne Sponsor Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France
    • match_rules: ['Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developer\\(s\\)(.+)Evaluation facility(.+)Recognition arrangements']
    • ref_protection_profiles: ANSSI-CC-PP-2010/03-M01 [PP JCS] Java Card System – Open Configuration, version 3.0
pdf_data/report_keywords/cc_cert_id
  • ES:
    • 2017-48-INF-3131-v1: 1
  • DE:
    • BSI-DSZ-CC-0870-2014: 3
  • FR:
    • ANSSI-CC-2014/86: 2
    • ANSSI-CC-2015/30: 20
    • ANSSI-CC-PP-2010/03-M01: 2
pdf_data/report_keywords/cc_protection_profile_id
  • ANSSI:
    • ANSSI-CC-PP-2010/03-M01: 2
  • BSI:
    • BSI-PP- 0035-2007: 2
    • BSI-PP-0035-2007: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 1
    • EAL 4: 2
    • EAL2: 1
    • EAL4: 10
    • EAL4+: 11
  • ITSEC:
    • ITSEC Evaluation: 1
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 4: 2
    • EAL 4 augmented: 2
    • EAL 5: 1
    • EAL 7: 1
    • EAL4: 2
    • EAL5: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 High: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_IMP.1: 1
  • AGD:
    • AGD_OPE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_DEL.1: 1
    • ALC_FLR: 3
    • ALC_FLR.3: 9
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_INT.1: 1
    • ASE_REQ.2: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_FUN.1: 1
  • AVA:
    • AVA_VAN.3: 1
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 3
    • AGD_PRE: 3
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 3
    • ALC_FLR: 2
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 3
    • AVA_VLA.5: 1
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 1
    • FAU_SAR.1: 1
  • FCS:
    • FCS_CKM.1: 3
    • FCS_CKM.4: 1
  • FDP:
    • FDP_ACC.1: 1
  • FIA:
    • FIA_AFL.1: 1
    • FIA_UAU.2: 1
  • FMT:
    • FMT_MSA.1: 1
    • FMT_MTD.1: 1
    • FMT_SMR.1: 1
  • FPT:
    • FPT_ITC.1: 1
  • FTA:
    • FTA_SSL.3: 1
  • FTP:
    • FTP_ITC.1: 1
pdf_data/report_keywords/vendor
  • Gemalto:
    • Gemalto: 18
  • NXP:
    • NXP: 2
    • NXP Semiconductors: 1
pdf_data/report_keywords/eval_facility
  • Applus:
    • Applus Laboratories: 5
  • Serma:
    • Serma Technologies: 2
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 1
pdf_data/report_keywords/javacard_packages
  • com:
    • com.gemalto.javacardx.pace: 1
  • javacardx:
    • javacardx.pace: 1
pdf_data/report_metadata
  • /Author: romme
  • /CreationDate: D:20151109154046+01'00'
  • /Creator: Microsoft® Word 2010
  • /Keywords: ANSSI-CC-CER-F-07EN.008
  • /ModDate: D:20151109154046+01'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: Plateforme Java Card MultiApp ID V3.1S en configuration ouverte de la carte à puce Optelio Contactless R7S masquée sur le composant P60D144JVA
  • /Title: ANSSI-CC-2015/30
  • pdf_file_size_bytes: 529824
  • pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 19
pdf_data/st_filename 2017-48-ST.pdf anssi_cible_2015_30_LITE.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0870-: 2
  • NL:
    • CC-1: 2
    • CC-2: 3
    • CC-3: 3
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0059-2009-MA-01: 1
    • BSI-CC-PP-0075-2012: 1
    • BSI-PP-0035: 1
  • other:
    • PP-SSCD-KG: 2
    • PP-SSCD-KI: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 4: 4
    • EAL4: 2
    • EAL4+: 4
  • EAL:
    • EAL 5+: 1
    • EAL4: 5
    • EAL4 augmented: 2
    • EAL4+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.3: 6
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 1
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 8
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 2
    • ADV_FSP.4: 5
    • ADV_FSP.5: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 7
    • ADV_INT.2: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 2
    • ADV_TDS.3: 6
    • ADV_TDS.4: 4
  • AGD:
    • AGD_OPE.1: 7
    • AGD_PRE.1: 6
  • ALC:
    • ALC_CMC.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 2
    • ALC_DVS.2: 7
    • ALC_LCD.1: 3
    • ALC_TAT.1: 3
    • ALC_TAT.2: 2
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 2
    • ATE_DPT.1: 3
    • ATE_FUN.1: 6
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 7
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 11
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 7
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 15
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 9
    • FAU_SAR.2.1: 1
  • FCS:
    • FCS_CKM.1: 35
    • FCS_CKM.2: 3
    • FCS_CKM.4: 18
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 17
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 14
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 9
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 2
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
  • FIA:
    • FIA_AFL.1: 9
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_SOS.1: 8
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 4
    • FIA_UAU.2: 12
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 9
    • FIA_UID.2: 13
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA.1: 15
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 14
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 11
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 13
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 18
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_ITC.1: 8
    • FPT_ITC.1.1: 1
    • FPT_STM.1: 11
    • FPT_STM.1.1: 1
  • FTA:
    • FTA_SSL.3: 7
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 8
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 8
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_ARP.1: 14
    • FAU_ARP.1.1: 1
    • FAU_SAA.1: 2
  • FCO:
    • FCO_NRO: 6
    • FCO_NRO.2: 3
  • FCS:
    • FCS_CKM.1: 20
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 7
    • FCS_CKM.2.1: 1
    • FCS_CKM.3: 6
    • FCS_CKM.3.1: 1
    • FCS_CKM.4: 14
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 18
    • FCS_COP.1.1: 1
    • FCS_RND: 7
    • FCS_RND.1: 11
    • FCS_RND.1.1: 2
    • FCS_RNG.1: 1
  • FDP:
    • FDP_ACC: 37
    • FDP_ACC.1: 13
    • FDP_ACC.2: 6
    • FDP_ACF: 30
    • FDP_ACF.1: 16
    • FDP_IFC: 22
    • FDP_IFC.1: 12
    • FDP_IFC.2: 2
    • FDP_IFF: 15
    • FDP_IFF.1: 12
    • FDP_ITC: 11
    • FDP_ITC.1: 4
    • FDP_ITC.2: 9
    • FDP_RIP: 77
    • FDP_RIP.1: 10
    • FDP_ROL: 13
    • FDP_ROL.1: 2
    • FDP_SDI.2: 8
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UIT: 6
    • FDP_UIT.1: 2
  • FIA:
    • FIA_ATD: 8
    • FIA_ATD.1: 2
    • FIA_SOS.2: 1
    • FIA_UAI.1: 1
    • FIA_UAU: 6
    • FIA_UAU.1: 1
    • FIA_UID: 12
    • FIA_UID.1: 10
    • FIA_UID.2: 1
    • FIA_USB: 7
    • FIA_USB.1: 3
  • FMT:
    • FMT_MSA: 80
    • FMT_MSA.1: 11
    • FMT_MSA.2: 1
    • FMT_MSA.3: 15
    • FMT_MTD: 16
    • FMT_MTD.1: 3
    • FMT_MTD.3: 1
    • FMT_SMF: 30
    • FMT_SMF.1: 9
    • FMT_SMR: 43
    • FMT_SMR.1: 22
  • FPR:
    • FPR_UNO: 6
    • FPR_UNO.1: 9
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_FLS: 41
    • FPT_FLS.1: 5
    • FPT_ITT: 6
    • FPT_ITT.1: 1
    • FPT_PHP: 6
    • FPT_PHP.3: 2
    • FPT_RCV: 14
    • FPT_RCV.3: 4
    • FPT_RCV.4: 2
    • FPT_TDC.1: 8
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TST: 6
    • FPT_TST.1: 3
  • FTP:
    • FTP_ITC: 8
    • FTP_ITC.1: 5
    • FTP_TRP.1: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.DELIVER: 3
    • A.LOCATE: 2
    • A.MANAGE: 2
    • A.NOEVIL: 3
  • O:
    • O.ACCESS: 9
    • O.ADMIN: 9
    • O.AUDIT: 11
    • O.ENCRYP: 6
    • O.IDAUTH: 14
    • O.PROTCT: 9
    • O.TIME: 11
  • OE:
    • OE.ADMIN: 10
    • OE.PHYCAL: 6
  • T:
    • T.AUDACC: 3
    • T.NOAUTH: 2
    • T.PRIVIL: 3
    • T.PROCOM: 2
  • A:
    • A.APPLET: 5
    • A.DELETION: 5
    • A.VERIFICATION: 4
  • D:
    • D.API_DATA: 3
    • D.APP_CODE: 6
    • D.APP_C_DATA: 3
    • D.APP_I_DATA: 4
    • D.CRYPTO: 5
    • D.JCS_CODE: 3
    • D.JCS_DATA: 5
    • D.PIN: 4
    • D.SEC_DATA: 7
  • O:
    • O.ALARM: 15
    • O.APPLET: 28
    • O.CARD-MANAGEMENT: 2
    • O.CARD_MANAGEMENT: 18
    • O.CIPHER: 10
    • O.CODE_PCKG: 16
    • O.CODE_PKG: 7
    • O.DELETION: 8
    • O.FIREWALL: 12
    • O.GLOBAL_ARRAYS_CO: 3
    • O.GLOBAL_ARRAYS_CONFID: 6
    • O.GLOBAL_ARRAYS_INT: 3
    • O.GLOBAL_ARRAYS_INTEG: 5
    • O.HW_AES: 2
    • O.INSTALL: 11
    • O.JAVAOBJECT: 56
    • O.KEY-: 1
    • O.KEY-MNGT: 5
    • O.KEY_MNGT: 4
    • O.LOAD: 6
    • O.NATIVE: 11
    • O.OBJ-DELETION: 4
    • O.OPERATE: 15
    • O.PIN-: 1
    • O.PIN-MNGT: 5
    • O.REALLOCATION: 5
    • O.RESOURCES: 9
    • O.RND: 12
    • O.SCP: 30
    • O.SID: 13
    • O.TRANSACTION: 6
  • OE:
    • OE.APPLET: 4
    • OE.CODE-EVIDENCE: 10
    • OE.CODE_EVIDENCE: 1
    • OE.VERIFICATION: 25
  • OP:
    • OP.ARRAY_ACCESS: 6
    • OP.CREATE: 10
    • OP.DELETE_APPLET: 6
    • OP.DELETE_PCKG: 4
    • OP.DELETE_PCKG_APPLET: 4
    • OP.INSTANCE_FIELD: 6
    • OP.INVK_INTERFACE: 10
    • OP.INVK_VIRTUAL: 8
    • OP.JAVA: 8
    • OP.PUT: 7
    • OP.THROW: 7
    • OP.TYPE_ACCESS: 7
  • OSP:
    • OSP: 1
    • OSP.RND: 3
    • OSP.RNG: 1
    • OSP.VERIFICATION: 4
  • R:
    • R.JAVA: 9
  • T:
    • T.CONFID-APPLI-DATA: 4
    • T.CONFID-JCS-CODE: 4
    • T.CONFID-JCS-DATA: 4
    • T.DELETION: 3
    • T.EXE-CODE: 8
    • T.INSTALL: 4
    • T.INTEG-APPLI-CODE: 7
    • T.INTEG-APPLI-DATA: 8
    • T.INTEG-JCS-CODE: 3
    • T.INTEG-JCS-DATA: 4
    • T.NATIVE: 4
    • T.OBJ-DELETION: 4
    • T.PHYSICAL: 4
    • T.RESOURCES: 3
    • T.SID: 8
pdf_data/st_keywords/vendor
  • Gemalto:
    • Gemalto: 105
  • NXP:
    • NXP: 10
pdf_data/st_keywords/eval_facility
  • EWA:
    • EWA-Canada: 1
  • Serma:
    • SERMA: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 8
  • constructions:
    • MAC:
      • HMAC: 2
      • HMAC-SHA-256: 1
      • HMAC-SHA-384: 1
  • AES_competition:
    • AES:
      • AES: 18
  • DES:
    • 3DES:
      • TDEA: 1
      • TDES: 9
      • Triple-DES: 2
    • DES:
      • DES: 20
  • constructions:
    • MAC:
      • CMAC: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDHE: 1
  • FF:
    • DH:
      • DH: 5
      • DHE: 1
      • Diffie-Hellman: 4
  • ECC:
    • ECC:
      • ECC: 8
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 3
  • FF:
    • DH:
      • DH: 5
      • Diffie-Hellman: 4
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
    • SHA2:
      • SHA-256: 3
      • SHA-384: 2
  • SHA:
    • SHA1:
      • SHA-1: 4
    • SHA2:
      • SHA-224: 3
      • SHA-256: 4
      • SHA-384: 4
      • SHA-512: 3
      • SHA224: 1
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 3
  • KA:
    • Key agreement: 2
  • MAC:
    • MAC: 10
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 4
  • TLS:
    • TLS:
      • TLS: 8
      • TLS 1.1: 2
      • TLS 1.2: 2
  • VPN:
    • VPN: 1
  • PACE:
    • PACE: 4
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 6
  • PRNG:
    • PRNG: 1
  • RNG:
    • RND: 15
    • RNG: 7
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 4
  • CTR:
    • CTR: 2
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 3
    • fault induction: 2
    • malfunction: 2
    • physical tampering: 1
  • SCA:
    • DPA: 1
    • Leak-Inherent: 3
    • physical probing: 2
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS 186-4: 1
    • FIPS PUB 197: 1
  • PKCS:
    • PKCS #1: 1
    • PKCS1: 1
  • RFC:
    • RFC 2631: 1
    • RFC 4346: 1
    • RFC 5246: 2
    • RFC4346: 1
  • BSI:
    • AIS31: 1
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • FIPS:
    • FIPS180-2: 1
    • FIPS197: 4
  • NIST:
    • SP 800-38: 2
  • PKCS:
    • PKCS#1: 8
    • PKCS#3: 1
    • PKCS#5: 5
  • SCP:
    • SCP01: 3
    • SCP02: 3
    • SCP03: 3
pdf_data/st_keywords/javacard_version
  • JavaCard:
    • JC2.2.2: 1
    • Java Card 2.2.2: 7
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 7
pdf_data/st_keywords/javacard_packages
  • javacard:
    • javacard.framework: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author:
  • /CreationDate:
  • /Creator:
  • /Keywords:
  • /ModDate:
  • /Producer:
  • /Subject:
  • /Title:
  • /Trapped:
  • pdf_file_size_bytes: 608207
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 51
  • /Author: Antoine de Lavernette
  • /CreationDate: D:20150723151408+02'00'
  • /Creator: Microsoft® Office Word 2007
  • /Keywords: Security Target, CC
  • /ModDate: D:20150723151408+02'00'
  • /Producer: Microsoft® Office Word 2007
  • /Subject: Security Target
  • /Title: eTravel v1.0 Security Target MAÏA3
  • pdf_file_size_bytes: 1419745
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 93
state/cert/convert_garbage True False
state/cert/convert_ok True False
state/cert/download_ok True False
state/cert/extract_ok True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different