name |
Plateforme ouverte Java Card MultiApp V4.1 en configuration ouverte masquée sur le composant S3FT9MH
|
Plateforme ouverte Java Card MultiApp V4.1 en configuration ouverte masquée sur le composant S3FT9MH(Version 4.1.0.2) ( ANSSI-CC-2023/30 )
|
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
not_valid_before |
2018-08-03
|
2023-12-14
|
not_valid_after |
2021-10-08
|
2028-12-14
|
scheme |
FR
|
FR
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2018_32en.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-2023_30en.pdf
|
status |
archived
|
active
|
manufacturer |
Gemalto / Samsung
|
THALES DIS FRANCE SA
|
manufacturer_web |
https://www.gemalto.com/
|
https://www.thalesgroup.com/en/europe/france
|
security_level |
EAL5+, AVA_VAN.5, ALC_DVS.2 |
EAL5+, AVA_VAN.5, ALC_DVS.2 |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018_32fr.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_30fr.pdf
|
cert_link |
None
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2023_30fr.pdf
|
protection_profiles |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Operating System Protection Profile, Version 2.0', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0067b_pdf.pdf', 'pp_ids': frozenset({'OSPP_V2.0'})}) |
|
maintenance_updates |
frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2019, 4, 4), 'maintenance_title': 'Plateforme ouverte Java Card MultiApp V4.1 en configuration ouverte masquée sur le composant S3FT9MH', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018_32-m01fr.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018_32-m01fr.pdf'}) |
|
state/cert/convert_garbage |
False
|
False
|
state/cert/convert_ok |
False
|
True
|
state/cert/download_ok |
False
|
True
|
state/cert/extract_ok |
False
|
True
|
state/cert/pdf_hash |
None
|
46ce4d86c51bfea9151f3ae2a134b8146e20413b58456591b5b5ad605ec8dfb3
|
state/cert/txt_hash |
None
|
546717b8cf2510dc652539481d861aa9c8253c534a29ed59f8b329aea3449d0f
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
8cfa16e5d8bbf8ea4aacb3edadbb96a846af8471d442f8f6cf7345c4e9c9443c
|
a8f09be61fb4e48491d8a453bd3734c9a4f6686a5e276efad5b03b1f01eaf6c9
|
state/report/txt_hash |
7480bc39a402605118f1a7f1cee1b6e80ab5cfb923fe3458602ea4361bf79e61
|
1c1aad4e8b1288d133b8e7c92cc7ed8ba4a53198d9bae411d4cead02117d038c
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
df9957c41228653aa1c2a6ffb3f5481f65db02f71a78b4f87940aa360a2a996a
|
7e414208388fd6e6242c66bbd99519deaad477f67891ebfc7641a1b2cb7fb969
|
state/st/txt_hash |
815e10c9947598ae786e2c363f479f143caaf4d8168f12b73337a3396e987e0e
|
313d28fe49a2a0995b99b6f12dd12391fc54f9fb72d30f5be326f68fb8cdf40d
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
ANSSI-CC-2018/32
|
ANSSI-CC-2023/30
|
heuristics/cert_lab |
SERMA |
None
|
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references/directly_referenced_by |
ANSSI-CC-2019/07, ANSSI-CC-2018/53, ANSSI-CC-2019/31, ANSSI-CC-2018/57, ANSSI-CC-2018/32v2, ANSSI-CC-2018/56, ANSSI-CC-2018/58 |
ANSSI-CC-2019/31-R01, ANSSI-CC-2023/55, ANSSI-CC-2023/54, ANSSI-CC-2023/57, ANSSI-CC-2023/56 |
heuristics/report_references/directly_referencing |
ANSSI-CC-2017/24, ANSSI-CC-2017/76 |
ANSSI-CC-2023/20 |
heuristics/report_references/indirectly_referenced_by |
ANSSI-CC-2018/58v2, ANSSI-CC-2019/07, ANSSI-CC-2018/53, ANSSI-CC-2019/31, ANSSI-CC-2018/57, ANSSI-CC-2018/56v2, ANSSI-CC-2018/32v2, ANSSI-CC-2018/57v2, ANSSI-CC-2018/56, ANSSI-CC-2018/58 |
ANSSI-CC-2019/31-R01, ANSSI-CC-2023/55, ANSSI-CC-2023/54, ANSSI-CC-2023/57, ANSSI-CC-2023/56 |
heuristics/report_references/indirectly_referencing |
ANSSI-CC-2016/59, ANSSI-CC-2015/66, ANSSI-CC-2017/07, ANSSI-CC-2017/54, ANSSI-CC-2017/24, ANSSI-CC-2017/76, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0891-V2-2016 |
ANSSI-CC-2023/20 |
heuristics/scheme_data |
- product:
Plateforme ouverte Java Card MultiApp V4.1 en configuration ouverte masquée sur le composant S3FT9MH (Release Date 28/09/2018)
- url:
https://cyber.gouv.fr/produits-certifies/plateforme-ouverte-java-card-multiapp-v41-en-configuration-ouverte-masquee-sur-0
- description:
Le produit certifié est la « Plateforme ouverte Java Card MultiApp V4.1 en configuration ouverte masquée sur le composant S3FT9MH, Java Card version 3.0.4, GP version 2.3 (avec ID configuration version 1.0 et GP Mapping version 1.0) » développé par GEMALTO et par SAMSUNG ELECTRONICS CO..
e produit est destiné à héberger et exécuter une ou plusieurs applications, dites applets dans la terminolog
- sponsor:
Gemalto
- developer:
Gemalto, Samsung Electronics Co.
- cert_id:
2018/32v2
- level:
EAL5+
- enhanced:
- cert_id:
2018/32v2
- certification_date:
08/10/2021
- category:
Cartes à puce
- cc_version:
Critères Communs version 3.1r5
- developer:
Gemalto, Samsung Electronics Co.
- sponsor:
Gemalto
- evaluation_facility:
Serma Safety & Security
- level:
EAL5+
- protection_profile:
Java Card System Protection Profile - Open Configuration, v.3.0
- mutual_recognition:
SOG-IS
CCRA
- augmented:
ALC_DVS.2, AVA_VAN.5
- cert_link:
https://cyber.gouv.fr/sites/default/files/2021/12/certificat-anssi-cc-2018_32v2.pdf
- target_link:
https://cyber.gouv.fr/sites/default/files/2021/12/anssi-cible-cc-2018_32v2.pdf
- report_link:
https://cyber.gouv.fr/sites/default/files/2021/12/anssi-cc-2018_32v2.pdf
|
- product:
Plateforme ouverte Java Card MultiApp V4.1 en configuration ouverte masquée sur le composant S3FT9MH (Version 4.1.0.2)
- url:
https://cyber.gouv.fr/produits-certifies/plateforme-ouverte-java-card-multiapp-v41-en-configuration-ouverte-masquee-sur-2
- description:
Le produit évalué est la « Plateforme ouverte Java Card MultiApp V4.1 en configuration ouverte masquée sur le composant S3FT9MH, Version 4.1.0.2 » développé par THALES DIS FRANCE SAS et par SAMSUNG ELECTRONICS CO.
- sponsor:
THALES DIS France SAS
- developer:
THALES DIS FRANCE SAS / SAMSUNG ELECTRONICS CO.
- cert_id:
ANSSI-CC-2023/30
- level:
EAL5+
- expiration_date: 14 Décembre 2028
- enhanced:
- cert_id:
ANSSI-CC-2023/30
- certification_date:
14/12/2023
- expiration_date:
14/12/2028
- category:
Cartes à puce
- cc_version:
Critères Communs version 3.1r5
- developer:
THALES DIS FRANCE SAS / SAMSUNG ELECTRONICS CO.
- sponsor:
THALES DIS France SAS
- evaluation_facility:
SERMA SAFETY & SECURITY
- level:
EAL5+
- protection_profile:
Java Card System Protection Profile – Open Configuration, version 3, certifié ANSSI-PP-2010-03 en mai 2012
- mutual_recognition:
CCRA
SOG-IS
- augmented:
ALC_DVS.2, AVA_VAN.5
|
heuristics/scheme_data/cert_id |
2018/32v2
|
ANSSI-CC-2023/30
|
heuristics/scheme_data/description |
Le produit certifié est la « Plateforme ouverte Java Card MultiApp V4.1 en configuration ouverte masquée sur le composant S3FT9MH, Java Card version 3.0.4, GP version 2.3 (avec ID configuration version 1.0 et GP Mapping version 1.0) » développé par GEMALTO et par SAMSUNG ELECTRONICS CO..
e produit est destiné à héberger et exécuter une ou plusieurs applications, dites applets dans la terminolog
|
Le produit évalué est la « Plateforme ouverte Java Card MultiApp V4.1 en configuration ouverte masquée sur le composant S3FT9MH, Version 4.1.0.2 » développé par THALES DIS FRANCE SAS et par SAMSUNG ELECTRONICS CO.
|
heuristics/scheme_data/developer |
Gemalto, Samsung Electronics Co.
|
THALES DIS FRANCE SAS / SAMSUNG ELECTRONICS CO.
|
heuristics/scheme_data/enhanced |
- cert_id:
2018/32v2
- certification_date:
08/10/2021
- category:
Cartes à puce
- cc_version:
Critères Communs version 3.1r5
- developer:
Gemalto, Samsung Electronics Co.
- sponsor:
Gemalto
- evaluation_facility:
Serma Safety & Security
- level:
EAL5+
- protection_profile:
Java Card System Protection Profile - Open Configuration, v.3.0
- mutual_recognition:
SOG-IS
CCRA
- augmented:
ALC_DVS.2, AVA_VAN.5
- cert_link: https://cyber.gouv.fr/sites/default/files/2021/12/certificat-anssi-cc-2018_32v2.pdf
- target_link: https://cyber.gouv.fr/sites/default/files/2021/12/anssi-cible-cc-2018_32v2.pdf
- report_link: https://cyber.gouv.fr/sites/default/files/2021/12/anssi-cc-2018_32v2.pdf
|
- cert_id:
ANSSI-CC-2023/30
- certification_date:
14/12/2023
- expiration_date: 14/12/2028
- category:
Cartes à puce
- cc_version:
Critères Communs version 3.1r5
- developer:
THALES DIS FRANCE SAS / SAMSUNG ELECTRONICS CO.
- sponsor:
THALES DIS France SAS
- evaluation_facility:
SERMA SAFETY & SECURITY
- level:
EAL5+
- protection_profile:
Java Card System Protection Profile – Open Configuration, version 3, certifié ANSSI-PP-2010-03 en mai 2012
- mutual_recognition:
CCRA
SOG-IS
- augmented:
ALC_DVS.2, AVA_VAN.5
|
heuristics/scheme_data/enhanced/augmented |
ALC_DVS.2, AVA_VAN.5
|
ALC_DVS.2, AVA_VAN.5
|
heuristics/scheme_data/enhanced/category |
Cartes à puce
|
Cartes à puce
|
heuristics/scheme_data/enhanced/cc_version |
Critères Communs version 3.1r5
|
Critères Communs version 3.1r5
|
heuristics/scheme_data/enhanced/cert_id |
2018/32v2
|
ANSSI-CC-2023/30
|
heuristics/scheme_data/enhanced/certification_date |
08/10/2021
|
14/12/2023
|
heuristics/scheme_data/enhanced/developer |
Gemalto, Samsung Electronics Co.
|
THALES DIS FRANCE SAS / SAMSUNG ELECTRONICS CO.
|
heuristics/scheme_data/enhanced/evaluation_facility |
Serma Safety & Security
|
SERMA SAFETY & SECURITY
|
heuristics/scheme_data/enhanced/level |
EAL5+
|
EAL5+
|
heuristics/scheme_data/enhanced/mutual_recognition |
SOG-IS
CCRA
|
CCRA
SOG-IS
|
heuristics/scheme_data/enhanced/protection_profile |
Java Card System Protection Profile - Open Configuration, v.3.0
|
Java Card System Protection Profile – Open Configuration, version 3, certifié ANSSI-PP-2010-03 en mai 2012
|
heuristics/scheme_data/enhanced/sponsor |
Gemalto
|
THALES DIS France SAS
|
heuristics/scheme_data/level |
EAL5+
|
EAL5+
|
heuristics/scheme_data/product |
Plateforme ouverte Java Card MultiApp V4.1 en configuration ouverte masquée sur le composant S3FT9MH (Release Date 28/09/2018)
|
Plateforme ouverte Java Card MultiApp V4.1 en configuration ouverte masquée sur le composant S3FT9MH (Version 4.1.0.2)
|
heuristics/scheme_data/sponsor |
Gemalto
|
THALES DIS France SAS
|
heuristics/scheme_data/url |
https://cyber.gouv.fr/produits-certifies/plateforme-ouverte-java-card-multiapp-v41-en-configuration-ouverte-masquee-sur-0
|
https://cyber.gouv.fr/produits-certifies/plateforme-ouverte-java-card-multiapp-v41-en-configuration-ouverte-masquee-sur-2
|
heuristics/st_references/directly_referenced_by |
ANSSI-CC-2019/31 |
None
|
heuristics/st_references/directly_referencing |
ANSSI-CC-2017/24 |
ANSSI-CC-2023/20 |
heuristics/st_references/indirectly_referenced_by |
ANSSI-CC-2019/31 |
None
|
heuristics/st_references/indirectly_referencing |
ANSSI-CC-2017/24 |
ANSSI-CC-2023/20 |
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
None
|
Certificat-CC-2023_30fr.pdf
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords |
None
|
- cc_cert_id:
- cc_protection_profile_id:
- cc_security_level:
- cc_sar:
- cc_sfr:
- cc_claims:
- vendor:
- eval_facility:
- symmetric_crypto:
- asymmetric_crypto:
- pq_crypto:
- hash_function:
- crypto_scheme:
- crypto_protocol:
- randomness:
- cipher_mode:
- ecc_curve:
- crypto_engine:
- tls_cipher_suite:
- crypto_library:
- vulnerability:
- side_channel_analysis:
- technical_report_id:
- device_model:
- tee_name:
- os_name:
- cplc_data:
- ic_data_group:
- standard_id:
- javacard_version:
- javacard_api_const:
- javacard_packages:
- certification_process:
|
pdf_data/cert_metadata |
None
|
- pdf_file_size_bytes:
158013
- pdf_is_encrypted:
False
- pdf_number_of_pages:
2
- /CreationDate:
D:20231220095051+01'00'
- /Creator:
Acrobat PDFMaker 23 pour Word
- /Keywords:
- /ModDate:
D:20231220095051+01'00'
- /Producer:
Adobe PDF Library 23.1.175
- pdf_hyperlinks:
|
pdf_data/report_filename |
anssi-cc-2018_32fr.pdf
|
ANSSI-CC-2023_30fr.pdf
|
pdf_data/report_frontpage/FR |
- match_rules:
Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables
- cert_id:
ANSSI-CC-2018/32
- cert_item:
Plateforme ouverte Java Card MultiApp V4.1 en configuration ouverte masquée sur le composant S3FT9MH
- cert_item_version:
Java Card version 3.0.4, GP version 2.3 (avec ID configuration version 1.0 et GP Mapping version 1.0
- ref_protection_profiles:
Java Card System Protection Profile – Open Configuration, version 3.0
- cc_version:
Critères Communs version 3.1 révision 5
- cc_security_level:
EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
- developer:
Gemalto 6, rue de la Verrerie, 92197 Meudon cedex, France Samsung Electronics Co. 17 Floor, B-Tower, DSR building, Samsungjeonja-ro 1-1, Hwaseong-si, Gyenonggi-do 445-330 South Korea Commanditaire Gemalto 6, rue de la Verrerie, 92197 Meudon cedex, France
- cert_lab:
Serma Safety & Security 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id/FR |
- ANSSI-CC-2018/32:
22
- ANSSI-CC-2017/24:
3
- ANSSI-CC-2017/76:
3
|
- ANSSI-CC-2023/30:
2
- ANSSI-CC-2023/20:
1
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- ANSSI:
- ANSSI-CC-PP-2010/03-M01:
1
|
- BSI:
- ANSSI:
- ANSSI-CC-PP-2010/03-M01:
1
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_INT:
1
- ADV_SPM:
1
- ADV_TDS:
1
- AGD:
- ALC:
- ALC_DVS.2:
2
- ALC_FLR:
2
- ALC_CMC:
1
- ALC_CMS:
1
- ALC_DEL:
1
- ALC_DVS:
1
- ALC_TAT:
1
- ATE:
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
- AVA:
- ASE:
- ASE_TSS.2:
1
- ASE_CCL:
1
- ASE_ECD:
1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_REQ:
1
- ASE_SPD:
1
- ASE_TSS:
1
|
|
pdf_data/report_keywords/cc_sar/AGD/AGD_OPE |
4
|
2
|
pdf_data/report_keywords/cc_sar/AGD/AGD_PRE |
3
|
1
|
pdf_data/report_keywords/cc_sar/ALC |
- ALC_DVS.2:
2
- ALC_FLR:
2
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_TAT: 1
|
|
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 |
2
|
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR |
2
|
1
|
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN |
2
|
1
|
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN.5 |
4
|
1
|
pdf_data/report_keywords/cc_security_level/EAL |
- EAL 5:
3
- EAL2:
2
- EAL6: 1
- EAL7:
1
- EAL 1: 1
- EAL 3: 1
- EAL 7: 1
|
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 |
3
|
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL2 |
2
|
2
|
pdf_data/report_keywords/cc_security_level/EAL/EAL7 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/ITSEC |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol/PACE/PACE |
5
|
3
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
- Serma:
- Serma Safety & Security:
1
- SERMA:
2
|
|
pdf_data/report_keywords/eval_facility/Serma |
- Serma Safety & Security: 1
- SERMA:
2
|
|
pdf_data/report_keywords/eval_facility/Serma/SERMA |
2
|
1
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
- javacard:
- javacard.eid:
1
- javacard.esign:
1
- javacard.mspnp:
1
- javacard.iasclassic:
1
- com:
- com.gemalto.puredi:
1
- com.gemalto.javacard.eid:
1
- com.gemalto.mchipadv:
1
- com.gemalto.mpcos:
1
- com.gemalto.javacard.esign:
1
- com.gemalto.moc.server:
1
- com.gemalto:
1
- com.gemalto.javacard.mspnp:
1
- com.gemalto.pure:
1
- com.visa.vsdc:
1
- com.gemalto.javacard.iasclassic:
1
|
- javacard:
- javacard.eid:
1
- javacard.esign:
1
- javacard.mspnp:
1
- javacard.iasclassic:
1
- com:
- com.gemalto.puredi:
1
- com.gemalto.javacard.eid:
1
- com.gemalto.mchipadv:
1
- com.gemalto.mpcos:
1
- com.gemalto.javacard.esign:
1
- com.gemalto.moc.server:
1
- com.gemalto:
1
- com.gemalto.javacard.mspnp:
1
- com.gemalto.pure:
1
- com.visa.vsdc:
1
- com.gemalto.javacard.iasclassic:
1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- SCP:
- CC:
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
- CCMB-2017-04-004:
1
|
- SCP:
- CC:
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
|
pdf_data/report_keywords/standard_id/CC |
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
- CCMB-2017-04-004: 1
|
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
|
pdf_data/report_keywords/standard_id/CC/CCMB-2017-04-001 |
1
|
1
|
pdf_data/report_keywords/standard_id/CC/CCMB-2017-04-002 |
1
|
1
|
pdf_data/report_keywords/standard_id/CC/CCMB-2017-04-003 |
1
|
1
|
pdf_data/report_keywords/standard_id/SCP |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor/Gemalto/Gemalto |
11
|
3
|
pdf_data/report_keywords/vendor/Samsung |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata |
- pdf_file_size_bytes:
845849
- pdf_is_encrypted:
False
- pdf_number_of_pages:
21
- /CreationDate:
D:20180822151858+02'00'
- /Creator:
Microsoft® Word 2010
- /Keywords:
ANSSI-CC-CER-F-07.026
- /ModDate:
D:20180823113947+02'00'
- /Producer:
Microsoft® Word 2010
- /Subject:
- /Title:
- pdf_hyperlinks:
mailto:[email protected], http://www.ssi.gouv.fr/
|
- pdf_file_size_bytes:
667950
- pdf_is_encrypted:
False
- pdf_number_of_pages:
18
- /CreationDate:
D:20231220094915+01'00'
- /Creator:
Acrobat PDFMaker 23 pour Word
- /Keywords:
- /ModDate:
D:20231220095048+01'00'
- /Producer:
Adobe PDF Library 23.1.175
- pdf_hyperlinks:
http://www.cyber.gouv.fr/, mailto:[email protected], http://www.commoncriteriaportal.org/, http://www.sogis.eu/
|
pdf_data/report_metadata//CreationDate |
D:20180822151858+02'00'
|
D:20231220094915+01'00'
|
pdf_data/report_metadata//Creator |
Microsoft® Word 2010
|
Acrobat PDFMaker 23 pour Word
|
pdf_data/report_metadata//Keywords |
ANSSI-CC-CER-F-07.026
|
|
pdf_data/report_metadata//ModDate |
D:20180823113947+02'00'
|
D:20231220095048+01'00'
|
pdf_data/report_metadata//Producer |
Microsoft® Word 2010
|
Adobe PDF Library 23.1.175
|
pdf_data/report_metadata/pdf_file_size_bytes |
845849
|
667950
|
pdf_data/report_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/report_metadata/pdf_number_of_pages |
21
|
18
|
pdf_data/st_filename |
anssi-cible-cc-2018_32en.pdf
|
ANSSI-cible-2023_30en.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC |
14
|
12
|
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDH |
|
|
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDSA |
|
|
pdf_data/st_keywords/asymmetric_crypto/FF |
|
|
pdf_data/st_keywords/cc_cert_id/FR |
|
|
pdf_data/st_keywords/cc_cert_id/NL |
|
|
pdf_data/st_keywords/cc_claims/A |
- A.APPLET:
5
- A.VERIFICATION:
4
|
- A.APPLET:
5
- A.VERIFICATION:
4
|
pdf_data/st_keywords/cc_claims/D |
- D.APP_CODE:
6
- D.APP_C_DATA:
3
- D.APP_I_DATA:
4
- D.PIN:
4
- D.API_DATA:
3
- D.CRYPTO:
5
- D.JCS_CODE:
3
- D.JCS_DATA:
5
- D.SEC_DATA:
7
|
- D.APP_CODE:
6
- D.APP_C_DATA:
3
- D.APP_I_DATA:
4
- D.PIN:
4
- D.BIO: 1
- D.API_DATA:
3
- D.CRYPTO:
5
- D.JCS_CODE:
3
- D.JCS_DATA:
5
- D.SEC_DATA:
7
|
pdf_data/st_keywords/cc_claims/D/D.API_DATA |
3
|
3
|
pdf_data/st_keywords/cc_claims/D/D.APP_CODE |
6
|
6
|
pdf_data/st_keywords/cc_claims/D/D.APP_C_DATA |
3
|
3
|
pdf_data/st_keywords/cc_claims/D/D.APP_I_DATA |
4
|
4
|
pdf_data/st_keywords/cc_claims/D/D.CRYPTO |
5
|
5
|
pdf_data/st_keywords/cc_claims/D/D.JCS_CODE |
3
|
3
|
pdf_data/st_keywords/cc_claims/D/D.JCS_DATA |
5
|
5
|
pdf_data/st_keywords/cc_claims/D/D.PIN |
4
|
4
|
pdf_data/st_keywords/cc_claims/D/D.SEC_DATA |
7
|
7
|
pdf_data/st_keywords/cc_claims/O |
- O.SID:
13
- O.FIREWALL:
12
- O.GLOBAL_ARRAYS_CONFID:
6
- O.GLOBAL_ARRAYS_INTEG:
5
- O.NATIVE:
11
- O.OPERATE:
15
- O.REALLOCATION:
5
- O.RESOURCES:
9
- O.ALARM:
15
- O.CIPHER:
10
- O.KEY-MNGT:
6
- O.PIN-MNGT:
5
- O.TRANSACTION:
6
- O.OBJ-DELETION:
4
- O.DELETION:
8
- O.LOAD:
6
- O.INSTALL:
11
- O.SCP:
29
- O.CARD-MANAGEMENT:
2
- O.RND:
13
- O.KEY_MNGT:
4
- O.CARD_MANAGEMENT:
17
- O.PIN-:
1
- O.TDES:
1
- O.AES:
1
- O.APPLET:
28
- O.CODE_PKG:
7
- O.JAVAOBJECT:
56
- O.CODE_PCKG:
16
- O.GLOBAL_ARRAYS_CO: 3
- O.GLOBAL_ARRAYS_INT: 3
|
- O.SID:
12
- O.FIREWALL:
12
- O.GLOBAL_ARRAYS_CONFID:
8
- O.GLOBAL_ARRAYS_INTEG:
5
- O.NATIVE:
10
- O.OPERATE:
15
- O.REALLOCATION:
5
- O.RESOURCES:
8
- O.ALARM:
14
- O.CIPHER:
9
- O.KEY-MNGT:
6
- O.PIN-MNGT:
5
- O.TRANSACTION:
6
- O.BIO-MNGT: 5
- O.OBJ-DELETION:
4
- O.DELETION:
6
- O.LOAD:
7
- O.INSTALL:
9
- O.SCP:
28
- O.CARD-MANAGEMENT:
2
- O.RND:
12
- O.OBJ_DELETION: 1
- O.CARD_MANAGEMENT:
16
- O.PIN-:
1
- O.TDES:
1
- O.AES:
1
- O.APPLET:
28
- O.CODE_PKG:
7
- O.JAVAOBJECT:
56
- O.CODE_PCKG:
16
- O.KEY_MNGT:
2
|
pdf_data/st_keywords/cc_claims/O/O.AES |
1
|
1
|
pdf_data/st_keywords/cc_claims/O/O.ALARM |
15
|
14
|
pdf_data/st_keywords/cc_claims/O/O.APPLET |
28
|
28
|
pdf_data/st_keywords/cc_claims/O/O.CARD-MANAGEMENT |
2
|
2
|
pdf_data/st_keywords/cc_claims/O/O.CARD_MANAGEMENT |
17
|
16
|
pdf_data/st_keywords/cc_claims/O/O.CIPHER |
10
|
9
|
pdf_data/st_keywords/cc_claims/O/O.CODE_PCKG |
16
|
16
|
pdf_data/st_keywords/cc_claims/O/O.CODE_PKG |
7
|
7
|
pdf_data/st_keywords/cc_claims/O/O.DELETION |
8
|
6
|
pdf_data/st_keywords/cc_claims/O/O.FIREWALL |
12
|
12
|
pdf_data/st_keywords/cc_claims/O/O.GLOBAL_ARRAYS_CONFID |
6
|
8
|
pdf_data/st_keywords/cc_claims/O/O.GLOBAL_ARRAYS_INTEG |
5
|
5
|
pdf_data/st_keywords/cc_claims/O/O.INSTALL |
11
|
9
|
pdf_data/st_keywords/cc_claims/O/O.JAVAOBJECT |
56
|
56
|
pdf_data/st_keywords/cc_claims/O/O.KEY-MNGT |
6
|
6
|
pdf_data/st_keywords/cc_claims/O/O.KEY_MNGT |
4
|
2
|
pdf_data/st_keywords/cc_claims/O/O.LOAD |
6
|
7
|
pdf_data/st_keywords/cc_claims/O/O.NATIVE |
11
|
10
|
pdf_data/st_keywords/cc_claims/O/O.OBJ-DELETION |
4
|
4
|
pdf_data/st_keywords/cc_claims/O/O.OPERATE |
15
|
15
|
pdf_data/st_keywords/cc_claims/O/O.PIN- |
1
|
1
|
pdf_data/st_keywords/cc_claims/O/O.PIN-MNGT |
5
|
5
|
pdf_data/st_keywords/cc_claims/O/O.REALLOCATION |
5
|
5
|
pdf_data/st_keywords/cc_claims/O/O.RESOURCES |
9
|
8
|
pdf_data/st_keywords/cc_claims/O/O.RND |
13
|
12
|
pdf_data/st_keywords/cc_claims/O/O.SCP |
29
|
28
|
pdf_data/st_keywords/cc_claims/O/O.SID |
13
|
12
|
pdf_data/st_keywords/cc_claims/O/O.TDES |
1
|
1
|
pdf_data/st_keywords/cc_claims/O/O.TRANSACTION |
6
|
6
|
pdf_data/st_keywords/cc_claims/OE |
- OE.VERIFICATION:
25
- OE.APPLET:
4
- OE.CODE-EVIDENCE:
10
|
- OE.VERIFICATION:
25
- OE.APPLET:
4
- OE.CODE-EVIDENCE:
10
|
pdf_data/st_keywords/cc_claims/OP |
- OP.ARRAY_ACCESS:
6
- OP.CREATE:
10
- OP.DELETE_APPLET:
6
- OP.DELETE_PCKG:
4
- OP.DELETE_PCKG_APPLET:
4
- OP.INSTANCE_FIELD:
6
- OP.INVK_VIRTUAL:
8
- OP.INVK_INTERFACE:
10
- OP.JAVA:
8
- OP.THROW:
7
- OP.TYPE_ACCESS:
7
- OP.PUT:
7
|
- OP.ARRAY_ACCESS:
6
- OP.CREATE:
10
- OP.DELETE_APPLET:
6
- OP.DELETE_PCKG:
4
- OP.DELETE_PCKG_APPLET:
4
- OP.INSTANCE_FIELD:
6
- OP.INVK_VIRTUAL:
8
- OP.INVK_INTERFACE:
10
- OP.JAVA:
8
- OP.THROW:
7
- OP.TYPE_ACCESS:
7
- OP.PUT:
7
|
pdf_data/st_keywords/cc_claims/OSP |
- OSP: 1
- OSP.VERIFICATION:
4
- OSP.RNG:
1
- OSP.RND:
3
|
- OSP.VERIFICATION:
4
- OSP.RNG:
1
- OSP.RND:
3
|
pdf_data/st_keywords/cc_claims/OSP/OSP.RND |
3
|
3
|
pdf_data/st_keywords/cc_claims/OSP/OSP.RNG |
1
|
1
|
pdf_data/st_keywords/cc_claims/OSP/OSP.VERIFICATION |
4
|
4
|
pdf_data/st_keywords/cc_claims/OT |
|
|
pdf_data/st_keywords/cc_claims/R |
|
|
pdf_data/st_keywords/cc_claims/T |
- T.CONFID-APPLI-DATA:
4
- T.CONFID-JCS-CODE:
4
- T.CONFID-JCS-DATA:
4
- T.INTEG-APPLI-CODE:
7
- T.INTEG-APPLI-DATA:
8
- T.INTEG-JCS-CODE:
3
- T.INTEG-JCS-DATA:
4
- T.SID:
8
- T.EXE-CODE:
8
- T.NATIVE:
4
- T.RESOURCES:
3
- T.DELETION:
3
- T.INSTALL:
4
- T.OBJ-DELETION:
4
- T.PHYSICAL:
4
|
- T.CONFID-APPLI-DATA:
4
- T.CONFID-JCS-CODE:
4
- T.CONFID-JCS-DATA:
4
- T.INTEG-APPLI-CODE:
7
- T.INTEG-APPLI-DATA:
8
- T.INTEG-JCS-CODE:
3
- T.INTEG-JCS-DATA:
4
- T.SID:
8
- T.EXE-CODE:
8
- T.NATIVE:
4
- T.RESOURCES:
3
- T.DELETION:
3
- T.INSTALL:
4
- T.OBJ-DELETION:
4
- T.PHYSICAL:
4
|
pdf_data/st_keywords/cc_protection_profile_id/BSI |
- BSI-CC-PP-0084-:
1
- BSI-CC-PP- 0068-V2-2011-MA-01:
1
- BSI-PP-0056-V2-MA-2012: 1
- BSI-PP- 0055-2009:
1
|
- BSI-CC-PP-0084-:
1
- BSI-CC-PP- 0068-V2-2011-MA-01:
1
- BSI-PP- 0055-2009:
1
|
pdf_data/st_keywords/cc_protection_profile_id/BSI/BSI-CC-PP- 0068-V2-2011-MA-01 |
1
|
1
|
pdf_data/st_keywords/cc_protection_profile_id/BSI/BSI-CC-PP-0084- |
1
|
1
|
pdf_data/st_keywords/cc_protection_profile_id/BSI/BSI-PP- 0055-2009 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ADV |
- ADV_ARC.1:
9
- ADV_TDS.1:
2
- ADV_TDS.4:
7
- ADV_IMP.1:
7
- ADV_TDS.3:
4
- ADV_INT.2:
1
- ADV_FSP.5:
4
- ADV_FSP.1:
1
- ADV_FSP.2:
2
- ADV_FSP.4:
2
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_TDS:
1
|
- ADV_ARC.1:
9
- ADV_TDS.1:
2
- ADV_TDS.4:
7
- ADV_IMP.1:
7
- ADV_TDS.3:
4
- ADV_INT.2:
1
- ADV_FSP.5:
4
- ADV_FSP.1:
1
- ADV_FSP.2:
2
- ADV_FSP.4:
2
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_TDS:
1
|
pdf_data/st_keywords/cc_sar/AGD |
- AGD_OPE.1:
7
- AGD_PRE.1:
6
|
- AGD_OPE: 1
- AGD_PRE: 1
- AGD_OPE.1:
7
- AGD_PRE.1:
6
|
pdf_data/st_keywords/cc_sar/AGD/AGD_OPE.1 |
7
|
7
|
pdf_data/st_keywords/cc_sar/AGD/AGD_PRE.1 |
6
|
6
|
pdf_data/st_keywords/cc_sar/ALC |
- ALC_DVS.2:
7
- ALC_TAT.1:
2
- ALC_TAT.2:
3
- ALC_CMC.4:
1
- ALC_DVS.1:
2
- ALC_LCD.1:
3
- ALC_DEL.1:
1
|
- ALC_DVS.2:
7
- ALC_TAT.1:
2
- ALC_TAT.2:
3
- ALC_CMC.4:
1
- ALC_DVS.1:
2
- ALC_LCD.1:
3
- ALC_DEL.1:
1
|
pdf_data/st_keywords/cc_sar/ATE |
- ATE_COV.2:
2
- ATE_FUN.1:
6
- ATE_COV.1:
2
- ATE_IND.2:
1
- ATE_DPT.1:
2
- ATE_DPT.3:
1
|
- ATE_COV.2:
2
- ATE_FUN.1:
6
- ATE_COV.1:
2
- ATE_IND.2:
1
- ATE_DPT.1:
2
- ATE_DPT.3:
1
|
pdf_data/st_keywords/cc_sar/AVA |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL5:
7
- EAL5+:
1
- EAL 6+:
1
- EAL5 augmented:
2
|
- EAL:
- EAL5:
7
- EAL5+:
1
- EAL 6+:
1
- EAL5 augmented:
2
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_ARP.1 |
14
|
13
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_ARP.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAA.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FCO/FCO_NRO |
6
|
5
|
pdf_data/st_keywords/cc_sfr/FCO/FCO_NRO.2 |
3
|
3
|
pdf_data/st_keywords/cc_sfr/FCS |
- FCS_RND:
18
- FCS_CKM:
48
- FCS_COP:
38
- FCS_CKM.1:
31
- FCS_RND.1:
8
- FCS_RND.1.1:
3
- FCS_CKM.1.1:
3
- FCS_CKM.2:
10
- FCS_CKM.2.1:
1
- FCS_CKM.3:
6
- FCS_CKM.3.1:
1
- FCS_CKM.4:
24
- FCS_CKM.4.1:
2
- FCS_COP.1:
30
- FCS_COP.1.1:
5
- FCS_RNG.1: 1
|
- FCS_RND:
17
- FCS_CKM:
46
- FCS_COP:
35
- FCS_CKM.1:
29
- FCS_RND.1:
7
- FCS_RND.1.1:
3
- FCS_CKM.1.1:
3
- FCS_CKM.2:
9
- FCS_CKM.2.1:
1
- FCS_CKM.3:
5
- FCS_CKM.3.1:
1
- FCS_CKM.4:
23
- FCS_CKM.4.1:
2
- FCS_COP.1:
22
- FCS_COP.1.1:
5
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM |
48
|
46
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 |
31
|
29
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1.1 |
3
|
3
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 |
10
|
9
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.3 |
6
|
5
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.3.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 |
24
|
23
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP |
38
|
35
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 |
30
|
22
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1.1 |
5
|
5
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_RND |
18
|
17
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_RND.1 |
8
|
7
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_RND.1.1 |
3
|
3
|
pdf_data/st_keywords/cc_sfr/FDP |
- FDP_ACF:
31
- FDP_ACC:
37
- FDP_ACC.2:
6
- FDP_ACF.1:
16
- FDP_IFC:
22
- FDP_IFC.1:
13
- FDP_IFF:
15
- FDP_IFF.1:
12
- FDP_RIP:
85
- FDP_RIP.1:
10
- FDP_ROL:
13
- FDP_ROL.1:
2
- FDP_SDI.2:
8
- FDP_SDI.2.1:
1
- FDP_SDI.2.2:
1
- FDP_ITC:
11
- FDP_ITC.2:
17
- FDP_IFC.2:
2
- FDP_UIT:
6
- FDP_UIT.1:
2
- FDP_ACC.1:
14
- FDP_ITC.1:
12
- FDP_RIP.1.1:
1
- FDP_SDI.1: 1
- FDP_ITT.1: 1
|
- FDP_ACF:
29
- FDP_ACC:
35
- FDP_ACC.2:
6
- FDP_ACF.1:
16
- FDP_IFC:
20
- FDP_IFC.1:
12
- FDP_IFF:
13
- FDP_IFF.1:
12
- FDP_RIP:
83
- FDP_RIP.1:
10
- FDP_ROL:
13
- FDP_ROL.1:
2
- FDP_SDI.2:
7
- FDP_SDI.2.1:
1
- FDP_SDI.2.2:
1
- FDP_ITC:
10
- FDP_ITC.2:
17
- FDP_IFC.2:
2
- FDP_UIT:
5
- FDP_UIT.1:
2
- FDP_ACC.1:
14
- FDP_ITC.1:
12
- FDP_RIP.1.1:
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC |
37
|
35
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 |
14
|
14
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.2 |
6
|
6
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF |
31
|
29
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 |
16
|
16
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC |
22
|
20
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 |
13
|
12
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.2 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFF |
15
|
13
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFF.1 |
12
|
12
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC |
11
|
10
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 |
12
|
12
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 |
17
|
17
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP |
85
|
83
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 |
10
|
10
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ROL |
13
|
13
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ROL.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2 |
8
|
7
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT |
6
|
5
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL |
21
|
21
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.2 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD |
8
|
7
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_SOS.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU |
54
|
53
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 |
6
|
6
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.2 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.4 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.4.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.5.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.5.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.6.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID |
35
|
33
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 |
18
|
18
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1.2 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB |
7
|
6
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.1 |
3
|
3
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM |
20
|
18
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1 |
16
|
15
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1.1 |
3
|
3
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 |
15
|
14
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2.1 |
3
|
3
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA |
80
|
69
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 |
11
|
11
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 |
15
|
15
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD |
33
|
31
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 |
9
|
9
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.3 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF |
53
|
50
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
17
|
17
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR |
67
|
63
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
27
|
27
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.2 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FPR/FPR_UNO |
6
|
5
|
pdf_data/st_keywords/cc_sfr/FPR/FPR_UNO.1 |
9
|
9
|
pdf_data/st_keywords/cc_sfr/FPR/FPR_UNO.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT |
- FPT_EMS:
4
- FPT_TST:
8
- FPT_EMS.1:
13
- FPT_EMS.1.1:
3
- FPT_EMS.1.2:
3
- FPT_FLS:
42
- FPT_FLS.1:
14
- FPT_TDC.1:
8
- FPT_TDC.1.1:
1
- FPT_TDC.1.2:
1
- FPT_RCV:
14
- FPT_RCV.3:
4
- FPT_TST.1:
13
- FPT_PHP:
6
- FPT_PHP.3:
15
- FPT_RCV.4:
2
- FPT_ITT:
6
- FPT_ITT.1:
2
- FPT_FLS.1.1:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FPT_PHP.3.1:
1
- FPT_TST.2: 1
|
- FPT_EMS:
4
- FPT_TST:
7
- FPT_EMS.1:
12
- FPT_EMS.1.1:
3
- FPT_EMS.1.2:
3
- FPT_FLS:
36
- FPT_FLS.1:
13
- FPT_TDC.1:
7
- FPT_TDC.1.1:
1
- FPT_TDC.1.2:
1
- FPT_RCV:
12
- FPT_RCV.3:
4
- FPT_TST.1:
12
- FPT_PHP:
5
- FPT_PHP.3:
12
- FPT_RCV.4:
2
- FPT_ITT:
5
- FPT_ITT.1:
1
- FPT_FLS.1.1:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FPT_PHP.3.1:
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_EMS |
4
|
4
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_EMS.1 |
13
|
12
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_EMS.1.1 |
3
|
3
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_EMS.1.2 |
3
|
3
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS |
42
|
36
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 |
14
|
13
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_ITT |
6
|
5
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_ITT.1 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP |
6
|
5
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 |
15
|
12
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_RCV |
14
|
12
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_RCV.3 |
4
|
4
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_RCV.4 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TDC.1 |
8
|
7
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TDC.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TDC.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST |
8
|
7
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 |
13
|
12
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.3 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC |
15
|
14
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 |
5
|
5
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.3 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_TRP.1 |
2
|
2
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- out of scope:
1
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are:
1
|
- OutOfScope:
- out of scope:
1
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are:
1
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol/PACE/PACE |
174
|
166
|
pdf_data/st_keywords/crypto_scheme |
- MAC:
- KA:
- Key Agreement:
3
- Key agreement:
2
|
- MAC:
- KA:
- Key Agreement:
3
- Key agreement:
2
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/eval_facility |
- Serma:
- Serma Safety & Security:
1
|
- Serma:
- Serma Safety & Security:
1
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-224:
4
- SHA-256:
4
- SHA-512:
4
- SHA224:
1
- SHA-384:
2
|
- SHA:
- SHA1:
- SHA2:
- SHA-224:
4
- SHA-256:
4
- SHA-512:
4
- SHA224:
1
- SHA-384:
2
|
pdf_data/st_keywords/ic_data_group |
- EF:
- EF.DG1:
6
- EF.DG16:
6
- EF.DG3:
1
- EF.DG4:
1
|
- EF:
- EF.DG1:
6
- EF.DG16:
6
- EF.DG3:
1
- EF.DG4:
1
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
- javacard:
- javacard.util:
1
- javacard.filesystem:
1
- javacard.tlv:
1
- javacard.framework:
2
- javacardx:
- javacardx.gap:
2
- javacardx.biometry:
3
- javacardx.crypto.asymmetric.rsa:
1
- com:
- com.gemalto.javacard.util:
1
- com.gemalto.javacard:
3
- com.gemalto.javacardx.gap:
2
- com.gemalto.javacardx.biometry:
1
- com.gemalto.javacardx.crypto.asymmetric.rsa:
1
- com.gemalto.javacard.filesystem:
1
- com.gemalto.javacard.tlv:
1
|
pdf_data/st_keywords/javacard_packages/javacard |
|
- javacard.util: 1
- javacard.filesystem: 1
- javacard.tlv: 1
- javacard.framework:
2
|
pdf_data/st_keywords/javacard_packages/javacard/javacard.framework |
2
|
2
|
pdf_data/st_keywords/javacard_version |
- JavaCard:
- Java Card 2.2.2:
3
- Java Card 3.0.4:
8
|
- JavaCard:
- Java Card 2.2.2:
3
- Java Card 3.0.4:
8
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/randomness/PRNG |
|
|
pdf_data/st_keywords/randomness/RNG/RND |
16
|
15
|
pdf_data/st_keywords/randomness/RNG/RNG |
14
|
14
|
pdf_data/st_keywords/side_channel_analysis |
- SCA:
- Leak-Inherent:
5
- physical probing:
6
- DPA:
2
- SPA:
1
- timing attacks:
1
- FI:
- physical tampering:
1
- Physical Tampering:
3
- malfunction:
8
- Malfunction:
9
- fault induction:
2
|
- SCA:
- Leak-Inherent:
5
- physical probing:
6
- DPA:
2
- SPA:
1
- timing attacks:
1
- FI:
- physical tampering:
1
- Physical Tampering:
3
- malfunction:
8
- Malfunction:
9
- fault induction:
2
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS180-2:
1
- FIPS197:
5
- FIPS 46-3:
1
- FIPS 197:
1
- NIST:
- PKCS:
- BSI:
- ICAO:
- SCP:
- SCP01:
4
- SCP02:
4
- SCP03:
5
- CC:
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
- CCMB-2009-07-004:
1
|
- FIPS:
- FIPS180-2:
1
- FIPS197:
5
- FIPS 46-3:
1
- FIPS 197:
1
- NIST:
- PKCS:
- BSI:
- ICAO:
- SCP:
- SCP01:
4
- SCP02:
4
- SCP03:
5
- CC:
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
- CCMB-2009-07-004:
1
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- DES:
- 3DES:
- TDEA:
1
- 3DES:
2
- TDES:
15
- Triple-DES:
3
- constructions:
|
- AES_competition:
- DES:
- DES:
- 3DES:
- TDEA:
1
- 3DES:
2
- TDES:
15
- Triple-DES:
3
- constructions:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor |
|
- Samsung:
- Gemalto:
- Thales:
- Thales Group:
134
- Thales:
20
|
pdf_data/st_keywords/vendor/Gemalto/Gemalto |
528
|
7
|
pdf_data/st_keywords/vendor/Samsung |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata |
- pdf_file_size_bytes:
2571177
- pdf_is_encrypted:
False
- pdf_number_of_pages:
127
- /CreationDate:
D:20180328144957+02'00'
- /Creator:
Microsoft® Word 2013
- /Keywords:
28-03-2018
- /ModDate:
D:20180823114004+02'00'
- /Producer:
Microsoft® Word 2013
- /Subject:
- /Title:
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
2361484
- pdf_is_encrypted:
False
- pdf_number_of_pages:
134
- /Title:
MultiApp V4.1: JCS Security Target
- /Author: D1417544
- /Subject:
1.12
- /Keywords:
28-03-2018
- /Creator:
Microsoft® Word for Microsoft 365
- /CreationDate:
D:20231003153730+02'00'
- /ModDate:
D:20231003153730+02'00'
- /Producer:
Microsoft® Word for Microsoft 365
- pdf_hyperlinks:
|
pdf_data/st_metadata//CreationDate |
D:20180328144957+02'00'
|
D:20231003153730+02'00'
|
pdf_data/st_metadata//Creator |
Microsoft® Word 2013
|
Microsoft® Word for Microsoft 365
|
pdf_data/st_metadata//Keywords |
28-03-2018
|
28-03-2018
|
pdf_data/st_metadata//ModDate |
D:20180823114004+02'00'
|
D:20231003153730+02'00'
|
pdf_data/st_metadata//Producer |
Microsoft® Word 2013
|
Microsoft® Word for Microsoft 365
|
pdf_data/st_metadata//Subject |
|
1.12
|
pdf_data/st_metadata//Title |
|
MultiApp V4.1: JCS Security Target
|
pdf_data/st_metadata/pdf_file_size_bytes |
2571177
|
2361484
|
pdf_data/st_metadata/pdf_hyperlinks |
|
|
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
127
|
134
|
dgst |
2ed49e59b7e90e34
|
8bf786600723d853
|