Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Belkin Secure KVM Switch (Models F1DN102B, F1DN104B, F1DN102C, F1DN104C, F1DN104E, F1DN104F)
CCEVS-VR-VID-10455-2011
Application Mobile PayPass 1.0.13vA.2.4(S1133159, release B) sur plateforme UpTeqNFC2.0.4_FRA sur composant ST33F1ME
ANSSI-CC-2014/82
name Belkin Secure KVM Switch (Models F1DN102B, F1DN104B, F1DN102C, F1DN104C, F1DN104E, F1DN104F) Application Mobile PayPass 1.0.13vA.2.4(S1133159, release B) sur plateforme UpTeqNFC2.0.4_FRA sur composant ST33F1ME
category Network and Network-Related Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme US FR
not_valid_after 14.05.2015 28.11.2019
not_valid_before 01.08.2011 28.11.2014
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10455-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2014_82.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10455-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ASE_MPP1.0.13vA.2.4_NFC2.0.4_FRA_D1321200%20v1.0.pdf
manufacturer Belkin International, Inc. Gemalto
manufacturer_web https://www.belkin.com https://www.gemalto.com/
security_level EAL2+, ALC_FLR.3 EAL4+, ALC_DVS.2, AVA_VAN.5
dgst 29a987839a62165e a3609daf3aa344fa
heuristics/cert_id CCEVS-VR-VID-10455-2011 ANSSI-CC-2014/82
heuristics/cert_lab US THALES
heuristics/extracted_sars ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ALC_CMC.2, ALC_DEL.1, ATE_IND.2, ATE_COV.1, AVA_VAN.2, ALC_FLR.3, ADV_ARC.1, AGD_OPE.1, ADV_FSP.2, AGD_PRE.1 ASE_INT.1, ASE_COMP.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ADV_FSP.4, ASE_CCL.1
heuristics/extracted_versions - 1.0.13, 2.0.4, 2.4
heuristics/report_references/directly_referencing {} ANSSI-CC-2013/18
heuristics/report_references/indirectly_referencing {} ANSSI-CC-2010/49, ANSSI-CC-2011/17, ANSSI-CC-2012/48, ANSSI-CC-2011/77, ANSSI-CC-2011/07, ANSSI-CC-2010/50, ANSSI-CC-2013/18
heuristics/scheme_data
  • category: Peripheral Switch
  • certification_date: 01.08.2011
  • evaluation_facility: UL Verification Services Inc. (Formerly InfoGard)
  • expiration_date: 14.05.2015
  • id: CCEVS-VR-VID10455
  • product: Belkin Secure KVM Switch (Models F1DN102B, F1DN104B, F1DN102C, F1DN104C, F1DN104E, F1DN104F)
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10455
  • vendor: Belkin International, Inc.
heuristics/protection_profiles fd5d86dc01df0437 {}
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_psshid_v2.1-vr.pdf {}
pdf_data/report_filename st_vid10455-vr.pdf anssi-cc-2014_82.pdf
pdf_data/report_frontpage
  • FR:
  • US:
    • cert_id: CCEVS-VR-VID10455-2011
    • cert_item: Belkin® Secure DVI-I KVM Switch
    • cert_lab: US NIAP
  • FR:
    • cc_security_level: EAL 4 augmenté ALC_DVS.2, AVA_VAN.5
    • cc_version: Critères Communs version 3.1 révision 3
    • cert_id: ANSSI-CC-2014/82
    • cert_item: Carte Mobile PayPass 1.0.13vA.2.4 sur plateforme UpTeq NFC2.0.4_FRA sur composant ST33F1ME (S1133159B/S1120746A
    • cert_item_version: Application Mobile PayPass 1.0.13vA.2.4 (S1133159, release B) sur plateforme UpTeq NFC2.0.4_FRA sur composant ST33F1ME
    • cert_lab: THALES (TCS – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France
    • developer: Gemalto La Vigie, Av du Jujubier, ZI Athelia IV, 13705 La Ciotat Cedex, France STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, B.P. 2, 13106 Rousset, France Commanditaire Gemalto La Vigie, Av du Jujubier, ZI Athelia IV, 13705 La Ciotat Cedex, France
    • match_rules: ['Référence du rapport de certification(.+)Nom du produit \\(référence/version\\)(.+)Nom de la TOE \\(référence/version\\)(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
    • ref_protection_profiles: néant
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10455-2011: 1
  • FR:
    • ANSSI-CC-2013/18: 4
    • ANSSI-CC-2013/18-S01: 1
    • ANSSI-CC-2014/82: 21
    • ANSSI-CC-PP-2010/04: 1
pdf_data/report_keywords/cc_protection_profile_id
  • ANSSI:
    • ANSSI-CC-PP-2010/04: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 8
    • EAL 2 augmented: 2
    • EAL 4: 1
    • EAL2: 5
    • EAL2 augmented: 4
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 4: 1
    • EAL 5: 1
    • EAL 7: 1
    • EAL4: 4
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.3: 7
  • ATE:
    • ATE_IND: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 1
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 3
    • ALC_FLR: 2
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 3
pdf_data/report_keywords/cc_claims
  • A:
    • A.ACCESS: 1
    • A.MANAGE: 1
    • A.NOEVIL: 1
    • A.PHYSICAL: 1
  • T:
    • T.INVALIDUSB: 1
    • T.PHYSICAL: 1
    • T.RESIDUAL: 1
    • T.ROM_PROG: 1
    • T.SPOOF: 1
    • T.STATE: 1
    • T.TRANSFER: 1
pdf_data/report_keywords/vendor
  • Gemalto:
    • Gemalto: 5
  • STMicroelectronics:
    • STMicroelectronics: 2
pdf_data/report_keywords/eval_facility
  • CESTI:
    • CESTI: 1
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA1: 2
    • SHA2:
      • SHA2: 2
pdf_data/report_metadata
  • /Author:
  • /CreationDate:
  • /Creator: PDFCreator Version 1.2.1
  • /Keywords:
  • /ModDate:
  • /Producer: GPL Ghostscript 9.02
  • /Subject:
  • /Title: anssi-cc-2014_82.
  • pdf_file_size_bytes: 257650
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 20
pdf_data/st_filename st_vid10455-st.pdf ASE_MPP1.0.13vA.2.4_NFC2.0.4_FRA_D1321200 v1.0.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 3
    • EAL 2 augmented: 1
    • EAL2: 3
    • EAL2 augmented: 2
  • EAL:
    • EAL 4: 1
    • EAL4: 3
    • EAL4 augmented: 2
    • EAL4+: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 3
    • ALC_FLR.3: 5
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC.1: 5
    • ADV_FSP.1: 3
    • ADV_FSP.2: 2
    • ADV_FSP.4: 9
    • ADV_IMP: 1
    • ADV_IMP.1: 4
    • ADV_TDS.1: 2
    • ADV_TDS.2: 1
    • ADV_TDS.3: 8
  • AGD:
    • AGD_OPE.1: 5
    • AGD_PRE.1: 5
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.1: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 6
    • ALC_LCD.1: 3
    • ALC_TAT.1: 3
  • ASE:
    • ASE_CCL.1: 1
    • ASE_COMP.1: 1
    • ASE_ECD.1: 4
    • ASE_INT.1: 5
    • ASE_OBJ.2: 3
    • ASE_REQ.1: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 2
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 3
    • ATE_DPT.1: 2
    • ATE_FUN.1: 6
  • AVA:
    • AVA_VAN.5: 5
pdf_data/st_keywords/cc_sfr
  • FDP:
    • FDP_IFC: 2
    • FDP_IFC.1: 7
    • FDP_IFC.1.1: 1
    • FDP_IFF: 3
    • FDP_IFF.1: 6
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_IFF.1.6: 1
    • FDP_ITC.1: 1
  • FMT:
    • FMT_MSA: 3
    • FMT_MSA.1: 8
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 9
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 1
    • FMT_SMR.1: 3
  • FPT:
    • FPT_PHP: 1
    • FPT_PHP.1: 5
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
  • FAU:
    • FAU_ARP.1: 9
    • FAU_ARP.1.1: 1
    • FAU_GEN.1: 13
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAA.1: 10
    • FAU_SAA.1.1: 1
    • FAU_SAA.1.2: 2
    • FAU_SAR: 15
    • FAU_SAR.1: 4
  • FCO:
    • FCO_NRO: 2
  • FCS:
    • FCS_CKM: 27
    • FCS_CKM.1: 7
    • FCS_CKM.2: 1
    • FCS_CKM.4: 13
    • FCS_COP: 63
    • FCS_COP.1: 6
    • FCS_RND.1: 1
  • FDP:
    • FDP_ACC: 155
    • FDP_ACC.1: 14
    • FDP_ACC.2: 14
    • FDP_ACF: 140
    • FDP_ACF.1: 35
    • FDP_ACF.1.2: 7
    • FDP_ACF.1.3: 1
    • FDP_DAU.1: 7
    • FDP_DAU.1.1: 1
    • FDP_DAU.1.2: 1
    • FDP_ETC.1: 16
    • FDP_ETC.1.1: 1
    • FDP_ETC.1.2: 1
    • FDP_IFC: 85
    • FDP_IFC.1: 11
    • FDP_IFC.2: 8
    • FDP_IFF: 70
    • FDP_IFF.1: 24
    • FDP_IFF.1.2: 4
    • FDP_ITC: 32
    • FDP_ITC.1: 26
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITC.2: 16
    • FDP_RIP: 8
    • FDP_RIP.1: 8
    • FDP_RIP.1.1: 1
    • FDP_ROL: 2
    • FDP_RPL.1: 1
    • FDP_SDI: 1
    • FDP_SDI.2: 6
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UIT: 2
    • FDP_UIT.1: 14
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_AFL: 20
    • FIA_AFL.1: 6
    • FIA_ATD: 1
    • FIA_ATD.1: 10
    • FIA_ATD.1.1: 1
    • FIA_SOS: 1
    • FIA_SOS.2: 9
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
    • FIA_UAU: 48
    • FIA_UAU.1: 8
    • FIA_UAU.3: 8
    • FIA_UAU.3.1: 1
    • FIA_UAU.3.2: 1
    • FIA_UAU.4: 9
    • FIA_UAU.4.1: 1
    • FIA_UAU.6: 1
    • FIA_UID: 30
    • FIA_UID.1: 10
    • FIA_USB: 1
    • FIA_USB.1: 9
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF: 9
    • FMT_MOF.1: 1
    • FMT_MSA: 26
    • FMT_MSA.1: 3
    • FMT_MSA.2: 5
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 31
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD: 8
    • FMT_MTD.1: 1
    • FMT_REV: 1
    • FMT_SMF: 14
    • FMT_SMF.1: 6
    • FMT_SMR: 6
    • FMT_SMR.1: 21
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO: 1
    • FPR_UNO.1: 6
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_FLS: 6
    • FPT_ITC.1: 1
    • FPT_ITT: 2
    • FPT_RCV: 3
    • FPT_RPL: 1
    • FPT_RPL.1: 4
    • FPT_RPL.1.1: 1
    • FPT_RPL.1.2: 1
    • FPT_STM.1: 3
    • FPT_TDC.1: 19
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TST.1: 7
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 2
    • FTP_ITC.1: 10
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 3
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 2
    • A.MANAGE: 2
    • A.NOEVIL: 2
    • A.PHYSICAL: 2
  • O:
    • O.CONF: 7
    • O.INDICATE: 3
    • O.ROM: 5
    • O.SELECT: 4
    • O.SWITCH: 5
    • O.TAMPER: 3
    • O.USBDETECT: 6
  • OE:
    • OE.ACCESS: 2
    • OE.MANAGE: 2
    • OE.NOEVIL: 2
    • OE.PHYSICAL: 2
  • T:
    • T.INVALIDUSB: 3
    • T.PHYSICAL: 3
    • T.RESIDUAL: 3
    • T.ROM_PROG: 3
    • T.SPOOF: 3
    • T.STATE: 3
    • T.TRANSFER: 3
  • A:
    • A.APPLET: 1
    • A.APPS-PROVIDER: 1
    • A.CONTROLLING-AUTHORITY: 1
    • A.MERCHANT_AUTH: 5
    • A.MOBILE-OPERATOR: 1
    • A.OTA-ADMIN: 1
    • A.VERIFICATION: 1
    • A.VERIFICATION-AUTHORITY: 1
  • O:
    • O.ALARM: 1
    • O.APPLI-AUTH: 2
    • O.APPLI_AUTH: 1
    • O.APP_BLOCK: 15
    • O.AUDIT: 14
    • O.AUDIT_ACCESS: 10
    • O.AUTHORISATION_CONTROL: 20
    • O.CARD-MANAGEMENT: 1
    • O.CHANNELS: 9
    • O.CIPHER: 1
    • O.COMM-: 1
    • O.COMM-AUTH: 1
    • O.COMM-INTEGRITY: 1
    • O.COMM_AUTH: 3
    • O.DATA_DISCLOSURE: 46
    • O.DATA_INTEGRITY: 63
    • O.DATA_USERS: 12
    • O.DELETION: 1
    • O.DOMAIN-RIGHTS: 1
    • O.FIREWALL: 1
    • O.GLOBAL-ARRAYS-CONFID: 1
    • O.GLOBAL-ARRAYS-INTEG: 1
    • O.GUIS_AUTH: 15
    • O.INSTALL: 1
    • O.ISSUING_BANK_AUTH: 54
    • O.KEY-MNGT: 1
    • O.LOAD: 1
    • O.MNO_AUTH: 8
    • O.NATIVE: 1
    • O.OBJ-DELETION: 1
    • O.OPERATE: 1
    • O.PIN-MNGT: 1
    • O.REALLOCATION: 1
    • O.REMOTE: 1
    • O.REMOTE_SERVICE_ACTIVCATION: 1
    • O.REMOTE_SERVICE_AUDIT: 1
    • O.RESSOURCES: 1
    • O.RISK_MNGT: 20
    • O.RNG: 1
    • O.SCP: 2
    • O.SID: 1
    • O.SIM_UNLOCK: 10
    • O.TRANSACTION: 1
    • O.TRANSACTION_BYPASS: 53
    • O.TRANSACTION_INTEGRITY: 38
    • O.TRANSACTION_REPLAY: 11
    • O.TRANSACTION_UNIQUENESS: 36
    • O.USER_AUTH: 53
  • OE:
    • OE.ACTIVATION-KEY-ESCROW: 1
    • OE.AID-MANAGEMENT: 1
    • OE.AP-KEYS: 1
    • OE.APPLET: 1
    • OE.APPS-PROVIDER: 1
    • OE.BANKS_PRIVILEGES: 4
    • OE.BASIC-APPS-VALIDATION: 1
    • OE.CA-KEYS: 1
    • OE.CERTIFICATES_MNGT: 10
    • OE.CHANNELS_SELECTION: 3
    • OE.CONTROLLING-AUTHORITY: 1
    • OE.CUSTOMER_PC_CONFID: 8
    • OE.GUIS_IDENTIFICATION: 5
    • OE.GUIS_TIMEOUT: 4
    • OE.GUI_INST_ALERT: 7
    • OE.KEY-CHANGE: 1
    • OE.KEY-ESCROW: 1
    • OE.KEY-GENERATION: 1
    • OE.LATENCY_CONTROL: 5
    • OE.MERCHANT_AUTH: 8
    • OE.MERCHANT_CONTROL: 7
    • OE.MOBILE-OPERATOR: 1
    • OE.NFC_PROTOCOL: 5
    • OE.NO_VAD: 6
    • OE.OPERATOR-KEYS: 1
    • OE.OTA-ADMIN: 1
    • OE.OTA-LOADING: 1
    • OE.OTA-SERVERS: 1
    • OE.PERSONALIZER: 1
    • OE.POLICY: 5
    • OE.POS_APPLICATIONS: 10
    • OE.POS_APPROVAL: 7
    • OE.POS_DEACTIVATION: 6
    • OE.PRODUCTION: 1
    • OE.QUOTAS: 1
    • OE.SECURE-APPS-CERTIFICATION: 1
    • OE.SECURITY-DOMAINS: 1
    • OE.SHARE-CONTROL: 1
    • OE.TOE_USAGE: 9
    • OE.TRANSACTION_DISPLAY: 5
    • OE.TRUSTED-APPS-DEVELOPER: 1
    • OE.TRUSTED-APPS-PRE-ISSUANCE-LOADING: 1
    • OE.VA-KEYS: 1
    • OE.VERIFICATION: 1
    • OE.VERIFICATION-AUTHORITY: 1
  • OSP:
    • OSP: 2
    • OSP.ACTIVATION-KEY-ESCROW: 1
    • OSP.AID-MANAGEMENT: 1
    • OSP.APSD-KEYS: 1
    • OSP.BANKS_PRIVILEGES: 4
    • OSP.BASIC-APPS-VALIDATION: 1
    • OSP.CASD-KEYS: 1
    • OSP.CERTIFICATES_MNGT: 4
    • OSP.CUSTOMER_PC_CONFID: 4
    • OSP.GUIS_IDENTIFICATION: 4
    • OSP.KEY-CHANGE: 1
    • OSP.KEY-ESCROW: 1
    • OSP.KEY-GENERATION: 1
    • OSP.MERCHANT_CONTROL: 6
    • OSP.OPERATOR-KEYS: 1
    • OSP.OTA-LOADING: 1
    • OSP.OTA-SERVERS: 1
    • OSP.PERSONALIZER: 1
    • OSP.PISHING: 4
    • OSP.POLICY: 4
    • OSP.PRODUCTION: 1
    • OSP.QUOTAS: 1
    • OSP.RND: 1
    • OSP.SECURE-APPS-CERTIFICATION: 1
    • OSP.SECURITY-DOMAINS: 1
    • OSP.SERVICE_AUDIT: 1
    • OSP.SHARE-CONTROL: 1
    • OSP.TOE_USAGE: 4
    • OSP.TRUSTED-APPS-DEVELOPER: 1
    • OSP.TRUSTED-APPS-PRE-ISSUANCE-LOADING: 1
    • OSP.VASD-KEYS: 1
    • OSP.VERIFICATION: 1
  • T:
    • T.APPLICATIONS_DOS: 6
    • T.CERTIF_CORRUPTION: 5
    • T.COM-EXPLOIT: 1
    • T.CONFID-APPLI-DATA: 1
    • T.CONFID-JCS-DATA: 1
    • T.CUSTOMER_USURPATION: 7
    • T.DELETION: 1
    • T.DISCLOSURE: 4
    • T.DISCLOSURE_KEYS: 6
    • T.DISCLOSURE_REF_PC: 6
    • T.EXE-CODE: 1
    • T.EXE-CODE-REMOTE: 1
    • T.INTEG: 7
    • T.INTEG-APPLI-CODE: 2
    • T.INTEG-APPLI-DATA: 2
    • T.INTEG-JCS-CODE: 1
    • T.INTEG-JCS-DATA: 1
    • T.INTEG_ACCOUNT_INFO: 7
    • T.INTEG_COUNT: 7
    • T.INTEG_KEYS: 8
    • T.INTEG_LOG_FILE: 6
    • T.INTEG_REF_PC: 6
    • T.INTEG_SEL_ACT_PARAM: 12
    • T.INTEG_TRANS_PARAM: 8
    • T.ISSUING-: 2
    • T.ISSUING-BANK_USURPATION: 3
    • T.LIFE-CYCLE: 1
    • T.MAN-IN-THE-MIDDLE: 11
    • T.MERCHANT_ACCOMPLICE: 9
    • T.MNO_USURPATION: 5
    • T.NATIVE: 1
    • T.PHYSICAL: 1
    • T.RESOURCES: 1
    • T.STEALING: 9
    • T.TEMPORARY_DATA: 8
    • T.TRANSACTION: 1
    • T.TRANSACTION_COUNTERFEITING: 12
    • T.TRANSACTION_REPLAY: 8
    • T.TRANSACTION_REPUDIATION: 7
    • T.UNAUTHORIZED_ACCESS: 1
    • T.UNAUTHORIZED_ACCESS_TO_SERVICE: 1
    • T.UNAUTHORIZED_CARD_MNGT: 1
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 1
  • Samsung:
    • Samsung: 3
  • Gemalto:
    • Gemalto: 152
  • STMicroelectronics:
    • STMicroelectronics: 1
pdf_data/st_keywords/symmetric_crypto
  • DES:
    • 3DES:
      • 3DES: 4
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 1
  • MAC:
    • MAC: 2
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 1
    • RNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 9
  • FI:
    • fault induction: 2
    • malfunction: 1
    • physical tampering: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
pdf_data/st_keywords/javacard_packages
  • javacard:
    • javacard.security: 1
pdf_data/st_metadata
  • /Author: seckgren
  • /CreationDate: D:20110822114124-07'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20110822114124-07'00'
  • /Producer: Acrobat Distiller 9.4.5 (Windows)
  • /Title: Microsoft Word - 01g - Belkin_2098_ST_Clean.doc
  • pdf_file_size_bytes: 197617
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 33
  • /Author: cteri
  • /CreationDate: D:20140429174638+02'00'
  • /Creator: Microsoft® Office Word 2007
  • /Keywords: MPP
  • /ModDate: D:20141204101833+01'00'
  • /Producer: Microsoft® Office Word 2007
  • /Subject: CTL Mastercard Payment Application (MPP)
  • /Title: Mobile PayPass 1.0.13vA.2.4 on UpTeq NFC2.0.4_FRA - Security Target
  • pdf_file_size_bytes: 2141227
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 136
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different