name |
Qualcomm Secure Processor Unit SPU230 in SDM855 SoC |
Plateforme Java Card MultiApp V5.0 version 5.0 |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
DE |
FR |
status |
archived |
active |
not_valid_after |
07.05.2024 |
14.10.2026 |
not_valid_before |
08.05.2019 |
14.10.2021 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1045c_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2021_42.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1045a_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2021_42.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1045b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2021_42en.pdf |
manufacturer |
Qualcomm Technologies Inc. |
THALES DIS FRANCE SA |
manufacturer_web |
https://www.qualcomm.com |
https://www.thalesgroup.com/en/europe/france |
security_level |
EAL4+, ALC_DVS.2, AVA_VAN.5 |
EAL6+, ALC_FLR.1 |
dgst |
2e8cbf6ce18d4c6f |
58725b1e960799a8 |
heuristics/cert_id |
BSI-DSZ-CC-1045-2019 |
ANSSI-CC-2021/42 |
heuristics/cert_lab |
BSI |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_TAT.1, ALC_CMS.4, AVA_VAN.5, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_CMC.4 |
ASE_INT.1, ALC_DVS.2, ADV_TDS.5, ASE_ECD.1, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ATE_FUN.2, ALC_TAT.3, ADV_FSP.5, AGD_OPE.1, AGD_PRE.1, ATE_DPT.3, ADV_ARC.1, ALC_CMC.5, ADV_IMP.2, ASE_OBJ.2, ASE_REQ.2, ADV_INT.3, ATE_IND.2, ASE_CCL.1, ATE_COV.3, ADV_SPM.1 |
heuristics/extracted_versions |
- |
5.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
BSI-DSZ-CC-1045-V2-2023 |
ANSSI-CC-2022/23, ANSSI-CC-2022/10, ANSSI-CC-2022/37, ANSSI-CC-2022/53 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-1107-2020 |
heuristics/report_references/indirectly_referenced_by |
BSI-DSZ-CC-1045-V2-2023 |
ANSSI-CC-2022/22, ANSSI-CC-2022/12, ANSSI-CC-2022/53, ANSSI-CC-2022/11, ANSSI-CC-2022/55, ANSSI-CC-2022/54, ANSSI-CC-2022/57, ANSSI-CC-2022/56, ANSSI-CC-2022/52, ANSSI-CC-2022/23, ANSSI-CC-2022/10, ANSSI-CC-2022/37, ANSSI-CC-2022/13 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1107-2020 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
ANSSI-CC-2022/53 |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-1107-2020 |
heuristics/st_references/indirectly_referenced_by |
{} |
ANSSI-CC-2022/53 |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1107-2020 |
heuristics/protection_profiles |
cf0f01bcd7be3e9c |
94167fd161e87d71 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0099b_pdf.pdf |
pdf_data/cert_filename |
1045c_pdf.pdf |
certificat-anssi-cc-2021_42.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL 4 augmented: 1
- EAL 5: 1
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20200129140240+01'00'
- /Creator: Writer
- /Keywords: Common Criteria, Certification, Zertifizierung, Qualcomm, SoC, system on chip, SPU230, hardmacro, secure element, secure processor
- /ModDate: D:20200129140509+01'00'
- /Producer: LibreOffice 6.2
- /Subject: Common Criteria Certification
- /Title: Certificate BSI-DSZ-CC-1045-2019
- pdf_file_size_bytes: 898760
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author:
- /CreationDate: D:20211018162825+02'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20211018162825+02'00'
- /Producer: Acrobat Distiller 11.0 (Windows)
- /Title:
- pdf_file_size_bytes: 293555
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
1045a_pdf.pdf |
anssi-cc-2021_42.pdf |
pdf_data/report_frontpage |
- FR:
- DE:
- cc_security_level: Common Criteria Part 3 extended EAL 4 augmented by AVA_VAN.5 and ALC_DVS.2
- cc_version: PP conformant plus product specific extensions Common Criteria Part 2 conformant
- cert_id: BSI-DSZ-CC-1045-2019
- cert_item: Qualcomm Secure Processor Unit SPU230 in SDM855 SoC
- cert_lab: BSI
- developer: Qualcomm Technologies Inc
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0084-: 1
- BSI-CC-PP-0084-2014: 3
|
- BSI:
- BSI-CC-PP-0099-V2-2020: 2
- BSI-PP-0084-2014: 1
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 2: 3
- EAL 4: 5
- EAL 4 augmented: 3
- EAL 5: 4
|
- EAL:
- EAL 6: 1
- EAL2: 2
- EAL6+: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.2: 5
- ALC_FLR: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ATE:
- AVA:
|
- AGD:
- AGD_ALP: 1
- AGD_OPE: 4
- AGD_PRE: 2
- ALC:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Gemalto:
- Infineon:
- Infineon Technologies AG: 2
|
pdf_data/report_keywords/eval_facility |
- TSystems:
- T-Systems International: 3
- atsec:
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
- FI:
- SCA:
- Side-channel: 1
- physical probing: 1
- other:
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- AIS 20: 1
- AIS 25: 2
- AIS 26: 3
- AIS 31: 3
- AIS 32: 1
- AIS 34: 1
- AIS 35: 2
- AIS 36: 1
- AIS 37: 1
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
|
- BSI:
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- List TOE implementation representation and tools, ALC/SPU_3_1_config_list.txt, April 11th 2019 (confidential document) [11] Guidance documentation for the TOE; Qualcomm SPUI Core, Hana Application Programming: 1
- Qualcomm SPU230 Core Security Target 80-NU430-5-C; Revision C, April 8th , 2019 (confidential document) [7] Evaluation Technical Report, Version 1.2, May 06th 2019, Evaluation Technical Report - Summary: 1
- T-Systems International GmbH (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
|
|
pdf_data/report_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20200128144340+01'00'
- /Creator: Writer
- /Keywords: Common Criteria, Certification, Zertifizierung, Qualcomm, SoC, system on chip, SPU230, hardmacro, secure element, secure processor
- /ModDate: D:20200129135949+01'00'
- /Producer: LibreOffice 6.2
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-1045-2019
- pdf_file_size_bytes: 1375836
- pdf_hyperlinks: http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/AIS, http://www.sogisportal.eu/, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 25
|
- /Author:
- /CreationDate: D:20211018162639+02'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20211018162639+02'00'
- /Producer: Acrobat Distiller 11.0 (Windows)
- /Title:
- pdf_file_size_bytes: 195709
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 17
|
pdf_data/st_filename |
1045b_pdf.pdf |
anssi-cible-cc-2021_42en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0068-V2-2011-MA-01: 1
- BSI-CC-PP-0084-: 1
- BSI-CC-PP-0099-V2-2020: 1
- BSI-PP- 0055-2009: 1
- BSI-PP-0056-V2-MA-2012: 1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL4: 1
- EAL4 augmented: 1
|
- EAL:
- EAL 6+: 1
- EAL6: 31
- EAL6 augmented: 1
- EAL6+: 3
|
pdf_data/st_keywords/cc_sar |
- ALC:
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 1
- AVA:
|
- ADV:
- ADV_ARC: 2
- ADV_ARC.1: 8
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 2
- ADV_FSP.4: 2
- ADV_FSP.5: 5
- ADV_IMP: 1
- ADV_IMP.1: 6
- ADV_IMP.2: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM.1: 8
- ADV_TDS: 1
- ADV_TDS.1: 2
- ADV_TDS.3: 3
- ADV_TDS.4: 7
- ADV_TDS.5: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 7
- AGD_PRE: 1
- AGD_PRE.1: 6
- ALC:
- ALC_CMC.4: 1
- ALC_CMC.5: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 2
- ALC_DVS.1: 1
- ALC_DVS.2: 3
- ALC_FLR.1: 5
- ALC_LCD.1: 4
- ALC_TAT.1: 2
- ALC_TAT.2: 3
- ALC_TAT.3: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 2
- ATE_COV.3: 1
- ATE_DPT.1: 1
- ATE_DPT.3: 2
- ATE_FUN.1: 6
- ATE_FUN.2: 1
- ATE_IND.2: 2
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_SAS.1: 4
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM: 30
- FCS_CKM.1: 7
- FCS_CKM.2: 2
- FCS_CKM.4: 7
- FCS_COP: 17
- FCS_COP.1: 5
- FCS_ITC.1: 5
- FCS_ITC.2: 5
- FCS_RNG.1: 3
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FDP:
- FDP_ACC: 4
- FDP_ACC.1: 2
- FDP_ACC.2: 3
- FDP_ACC.2.1: 1
- FDP_ACC.2.2: 1
- FDP_ACF: 3
- FDP_ACF.1: 4
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_ICT.1: 1
- FDP_IFC.1: 5
- FDP_IFC.1.1: 2
- FDP_IFF.1: 1
- FDP_ITC.1: 8
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITT.1: 3
- FDP_ITT.1.1: 1
- FDP_RIP: 10
- FDP_RIP.1: 2
- FDP_SDA: 7
- FDP_SDA.1: 8
- FDP_SDA.1.1: 2
- FDP_SDC.1: 11
- FDP_SDC.1.1: 2
- FDP_SDI: 2
- FDP_SDI.2: 18
- FDP_SDI.2.1: 3
- FDP_SDI.2.2: 3
- FDP_SDR: 7
- FDP_SDR.1: 8
- FDP_SDR.1.1: 2
- FMT:
- FMT_CMT: 2
- FMT_CMT.1: 35
- FMT_CMT.1.1: 7
- FMT_LIM.1: 5
- FMT_LIM.1.1: 1
- FMT_LIM.2: 5
- FMT_LIM.2.1: 1
- FMT_MSA: 5
- FMT_MSA.1: 2
- FMT_MSA.3: 5
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMR.1: 1
- FPT:
- FPT_FLS.1: 5
- FPT_FLS.1.1: 1
- FPT_ITT.1: 3
- FPT_ITT.1.1: 1
- FPT_PHP.3: 3
- FPT_PHP.3.1: 1
- FRU:
- FRU_FLT.2: 4
- FRU_FLT.2.1: 1
|
- FAU:
- FAU_ARP.1: 15
- FAU_ARP.1.1: 1
- FAU_SAA.1: 2
- FAU_SAS.1: 2
- FCO:
- FCS:
- FCS_CKM: 62
- FCS_CKM.1: 29
- FCS_CKM.1.1: 3
- FCS_CKM.2: 10
- FCS_CKM.2.1: 1
- FCS_CKM.3: 5
- FCS_CKM.3.1: 1
- FCS_CKM.4: 28
- FCS_CKM.4.1: 2
- FCS_CMK.4: 2
- FCS_COP: 66
- FCS_COP.1: 31
- FCS_COP.1.1: 5
- FCS_RNG: 25
- FCS_RNG.1: 14
- FCS_RNG.1.1: 3
- FCS_RNG.1.2: 1
- FDP:
- FDP_ACC: 44
- FDP_ACC.1: 20
- FDP_ACC.2: 6
- FDP_ACF: 39
- FDP_ACF.1: 25
- FDP_IFC: 24
- FDP_IFC.1: 14
- FDP_IFC.2: 2
- FDP_IFF: 16
- FDP_IFF.1: 14
- FDP_ITC: 11
- FDP_ITC.1: 12
- FDP_ITC.2: 17
- FDP_ITT.1: 2
- FDP_RIP: 97
- FDP_RIP.1: 11
- FDP_RIP.1.1: 1
- FDP_ROL: 13
- FDP_ROL.1: 5
- FDP_SDC.1: 2
- FDP_SDI: 8
- FDP_SDI.2: 4
- FDP_UCT.1: 2
- FDP_UIT: 6
- FDP_UIT.1: 4
- FIA:
- FIA_AFL: 21
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_API: 1
- FIA_API.1: 2
- FIA_ATD: 12
- FIA_ATD.1: 3
- FIA_UAU: 64
- FIA_UAU.1: 6
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UAU.4: 1
- FIA_UAU.4.1: 1
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6.1: 1
- FIA_UID: 42
- FIA_UID.1: 18
- FIA_UID.1.1: 2
- FIA_UID.1.2: 2
- FIA_UID.2: 1
- FIA_USB: 6
- FIA_USB.1: 3
- FMT:
- FMT_LIM: 34
- FMT_LIM.1: 17
- FMT_LIM.1.1: 3
- FMT_LIM.2: 16
- FMT_LIM.2.1: 3
- FMT_MSA: 96
- FMT_MSA.1: 13
- FMT_MSA.2: 2
- FMT_MSA.3: 21
- FMT_MTD: 57
- FMT_MTD.1: 13
- FMT_MTD.3: 1
- FMT_SMF: 78
- FMT_SMF.1: 29
- FMT_SMF.1.1: 2
- FMT_SMR: 88
- FMT_SMR.1: 38
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FPR:
- FPR_UNO: 5
- FPR_UNO.1: 8
- FPR_UNO.1.1: 1
- FPT:
- FPT_EMS: 4
- FPT_EMS.1: 14
- FPT_EMS.1.1: 3
- FPT_EMS.1.2: 3
- FPT_FLS: 47
- FPT_FLS.1: 16
- FPT_FLS.1.1: 2
- FPT_ITT: 6
- FPT_ITT.1: 2
- FPT_PHP: 7
- FPT_PHP.3: 17
- FPT_PHP.3.1: 1
- FPT_RCV: 12
- FPT_RCV.3: 4
- FPT_RCV.4: 2
- FPT_TDC.1: 7
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST: 8
- FPT_TST.1: 15
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FPT_TST.2: 2
- FRU:
- FTP:
- FTP_ITC: 17
- FTP_ITC.1: 7
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 4
- FTP_TRP.1: 7
|
pdf_data/st_keywords/cc_claims |
- O:
- O.AES: 3
- O.KDF: 5
- O.RND: 1
- O.SHA: 4
- T:
- T.AUTH-APPLI-DATA: 3
- T.AUTH-TSF-DATA: 3
- T.CONFID-APPLI-DATA: 5
- T.CONFID-TSF-CODE: 3
- T.CONFID-TSF-DATA: 4
- T.INTEG-: 1
- T.INTEG-APPLI-CODE: 3
- T.INTEG-APPLI-DATA: 5
- T.INTEG-TSF-CODE: 3
- T.INTEG-TSF-DATA: 3
- T.RBP-APPLI-DATA: 3
- T.RBP-TSF-DATA: 3
- T.RND: 1
|
- A:
- A.CAP_FILE: 3
- A.DELETION: 3
- A.OS-UPDATE-EVIDENCE: 3
- A.SECURE_ACODE_MANAGEMENT: 3
- A.VERIFICATION: 3
- D:
- D.API_DATA: 3
- D.APP_CODE: 6
- D.APP_C_DATA: 3
- D.APP_I_DATA: 5
- D.APP_KEYS: 1
- D.CRYPTO: 5
- D.JCS_CODE: 6
- D.JCS_DATA: 8
- D.OS-: 1
- D.OS-UPDATE-CODE-ID: 3
- D.OS-UPDATE_ADDITIONALCODE: 5
- D.OS-UPDATE_DEC-KEY: 2
- D.OS-UPDATE_SGNVER-KEY: 2
- D.PIN: 4
- D.SEC_DATA: 7
- O:
- O.AES: 1
- O.ALARM: 15
- O.APPLET: 28
- O.ARRAY_VIEWS_CONFID: 7
- O.ARRAY_VIEWS_INTEG: 3
- O.CARD-MANAGEMENT: 1
- O.CARD_MANAGEMENT: 17
- O.CIPHER: 10
- O.CODE_CAP_FILE: 23
- O.CONFID-OS-UPDATE: 3
- O.DELETION: 4
- O.FIREWALL: 12
- O.GLOBAL_ARRAYS_CONFID: 9
- O.GLOBAL_ARRAYS_INTEG: 5
- O.INSTALL: 7
- O.JAVAOBJECT: 68
- O.KEY-MNGT: 6
- O.LOAD: 11
- O.NATIVE: 11
- O.OBJ-DELETION: 4
- O.OBJ_DELETION: 4
- O.OPERATE: 15
- O.PIN-MNGT: 6
- O.PIN_MNGT: 4
- O.REALLOCATION: 5
- O.RESOURCES: 9
- O.RND: 2
- O.RNG: 10
- O.SCP: 31
- O.SECURE_AC_ACTIVATION: 4
- O.SECURE_LOAD_ACODE: 9
- O.SID: 13
- O.TDES: 1
- O.TOE_IDENTIFICATION: 6
- O.TRANSACTION: 6
- OE:
- OE.CAP_FILE: 5
- OE.CARD-: 1
- OE.CARD-MANAGEMENT: 1
- OE.CODE-: 1
- OE.CODE-EVIDENCE: 10
- OE.OS-UPDATE-ENCRYPTION: 5
- OE.OS-UPDATE-EVIDENCE: 2
- OE.SCP: 2
- OE.SECURE_ACODE_MANAGEMENT: 2
- OE.VERIFICATION: 25
- OP:
- OP.ARRAY_AASTORE: 3
- OP.ARRAY_ACCESS: 7
- OP.ARRAY_LENGTH: 3
- OP.ARRAY_T_ALOAD: 3
- OP.ARRAY_T_ASTORE: 3
- OP.CREATE: 11
- OP.DELETE_APPLET: 6
- OP.DELETE_CAP_FILE: 4
- OP.DELETE_CAP_FILE_APPLET: 4
- OP.INSTANCE_FIELD: 6
- OP.INVK_INTERFACE: 10
- OP.INVK_VIRTUAL: 8
- OP.JAVA: 8
- OP.PUT: 8
- OP.PUTFIELD: 1
- OP.PUTSTATIC: 1
- OP.THROW: 7
- OP.TYPE_ACCESS: 7
- OSP:
- OSP.ADDITIONAL_CODE_ENCRYPTION: 3
- OSP.ADDITIONAL_CODE_SIGNING: 3
- OSP.ATOMIC_ACTIVATION: 3
- OSP.RNG: 3
- OSP.TOE_IDENTIFICATION: 3
- OSP.VERIFICATION: 3
- OT:
- R:
- T:
- T.CONFID-APPLI-DATA: 3
- T.CONFID-JCS-CODE: 3
- T.CONFID-JCS-DATA: 3
- T.CONFID-OS-UPDATE_LOAD: 3
- T.DELETION: 3
- T.EXE-CODE: 6
- T.FAKE-SGNVER-KEY: 3
- T.INSTALL: 3
- T.INTEG-APPLI-CODE: 6
- T.INTEG-APPLI-DATA: 6
- T.INTEG-JCS-CODE: 3
- T.INTEG-JCS-DATA: 3
- T.INTEG-OS-UPDATE_LOAD: 3
- T.NATIVE: 3
- T.OBJ-DELETION: 3
- T.PHYSICAL: 3
- T.RESOURCES: 3
- T.SID: 6
- T.UNAUTHORIZED_TOE_CODE_UPDATE: 3
- T.WRONG-UPDATE-STATE: 3
|
pdf_data/st_keywords/vendor |
|
- Gemalto:
- Infineon:
- Thales:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 2
- TDEA: 1
- TDES: 14
- Triple-DES: 3
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 10
- SHA-384: 3
- SHA-512: 4
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-256: 2
- SHA-384: 1
- SHA-512: 2
- SHA2: 1
- SHA224: 1
- SHA3:
- SHA3: 2
- SHA3-384: 1
- SHA3-512: 1
|
pdf_data/st_keywords/crypto_scheme |
|
- KA:
- Key Agreement: 6
- Key agreement: 2
- MAC:
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 3
- fault injection: 2
- malfunction: 3
- SCA:
- Leak-Inherent: 3
- Physical Probing: 2
- Side-channel: 1
- physical probing: 4
- side channels: 1
- side-channel: 2
- other:
|
- FI:
- Malfunction: 5
- Physical Tampering: 3
- fault induction: 2
- malfunction: 8
- physical tampering: 1
- SCA:
- DPA: 2
- Leak-Inherent: 2
- SPA: 1
- physical probing: 6
- timing attacks: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.DG1: 6
- EF.DG16: 6
- EF.DG3: 1
- EF.DG4: 1
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- FIPS 180-4: 3
- FIPS 186-4: 1
- FIPS 197: 5
- FIPS 198-1: 2
- FIPS PUB 180-4: 3
- FIPS PUB 186-4: 1
- FIPS PUB 197: 3
- FIPS PUB 198-1: 2
- NIST:
- NIST SP 800-108: 3
- NIST SP 800-38A: 2
- NIST SP 800-38B: 2
- NIST SP 800-38C: 1
- NIST SP 800-90A: 1
- PKCS:
- RFC:
|
- BSI:
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- FIPS 197: 1
- FIPS180-2: 1
- FIPS197: 5
- ICAO:
- NIST:
- PKCS:
- SCP:
- SCP01: 4
- SCP02: 4
- SCP03: 5
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- 1, are out of the scope of the SPM as they are linked to the applet loading or deletion that is out of scope of the SPM boundaries limited to VM opcodes MultiApp V5: JCS Security Target ST Ref: D1494591_LITE: 1
- Context, the Selected Applet Context, and the Active Applets Note: the Selected Applet context is out of scope of the VM functionalities. It is a process that occurs prior to VM start MultiApp V5: JCS Security: 1
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
- out of scope: 4
- the scope because done before the JCVM entering (selection of the applet) Note: The Array View is out of scope of this modelisation ADV_SPM.1.2D For each policy covered by the formal security policy model, the: 1
|
pdf_data/st_metadata |
- /Author: QTI
- /CreationDate: D:20190503125434-07'00'
- /Creator: Microsoft® Word for Office 365
- /Keywords: integrated secure element, PP0084, Qualcomm, secure processing unit, secure subsystem, SDM855, SoC, SPU230
- /ModDate: D:20190503125649-07'00'
- /Producer: Microsoft® Word for Office 365
- /Subject: 80-NU430-6 Rev. B
- /Title: Qualcomm® Secure Processing Unit SPU230 Core Security Target Lite
- pdf_file_size_bytes: 723737
- pdf_hyperlinks: https://createpoint.qti.qualcomm.com/, mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 54
|
- /Author: D1417544
- /CreationDate: D:20211021152816+02'00'
- /Creator: Microsoft® Word 2016
- /Keywords: 28-03-2018
- /ModDate: D:20211021152816+02'00'
- /Producer: Microsoft® Word 2016
- /Subject: 1.12
- /Title: MultiApp V4.1: JCS Security Target
- pdf_file_size_bytes: 3796482
- pdf_hyperlinks: https://www.ssi.gouv.fr/uploads/2021/03/anssi-guide-mecanismes_crypto-2.04.pdf
- pdf_is_encrypted: False
- pdf_number_of_pages: 147
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |