name |
ChipDoc v4 on JCOP 4.5 P71 in ICAO EAC(1&2) with PACE configuration (Version 4.0.1.52) (ANSSI-CC-2023/11-R01) |
eTravel 2.5.A EAC on BAC on MultiApp V5.0.A (version 2.5.A.0.0) |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
FR |
FR |
status |
active |
active |
not_valid_after |
09.02.2029 |
16.05.2027 |
not_valid_before |
09.02.2024 |
16.05.2022 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-2023_11-R01fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2022_12.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_11-R01fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2022_12fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-Cible-CC-2023_11-R01en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2022_12en.pdf |
manufacturer |
NXP Semiconductors Germany GmbH |
THALES DIS FRANCE SA |
manufacturer_web |
https://www.nxp.com |
https://www.thalesgroup.com/en/europe/france |
security_level |
AVA_VAN.5, ALC_DVS.2, EAL5+ |
AVA_VAN.5, ALC_DVS.2, EAL5+ |
dgst |
2fdb7ebde10e8402 |
4335f698330f3227 |
heuristics/cert_id |
ANSSI-CC-2023/11-R01 |
ANSSI-CC-2022/12 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_CMS.5, ASE_INT.1, ASE_ECD.1, ATE_FUN.1, ADV_IMP.1, ATE_DPT.3, ASE_TSS.1, AGD_PRE.1, ASE_CCL.1, ALC_DVS.2, AVA_VAN.5, ASE_SPD.1, ASE_OBJ.2, ATE_COV.2, ALC_TAT.2, ASE_REQ.2, ADV_INT.2, ALC_CMC.4, ADV_FSP.5, ADV_ARC.1, ALC_DEL.1, AGD_OPE.1, ALC_LCD.1, ADV_TDS.4, ATE_IND.2 |
AGD_PRE.1, ADV_ARC.1, ADV_FSP.4, ALC_DVS.2, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, ATE_DPT.1, AVA_VAN.5 |
heuristics/extracted_versions |
4.0.1.52, 4.5 |
5.0, 0.0, 2.5 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2022/55 |
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-1149-V2-2023, NSCIB-CC-0313985-CR |
ANSSI-CC-2022/10, BSI-DSZ-CC-1107-V2-2021 |
heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2022/55 |
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-1149-2022, BSI-DSZ-CC-1149-V2-2023, NSCIB-CC-0313985-CR |
ANSSI-CC-2022/10, BSI-DSZ-CC-1107-2020, ANSSI-CC-2021/42, BSI-DSZ-CC-1107-V2-2021 |
heuristics/scheme_data |
- cert_id: ANSSI-CC-2023/11-R01
- description: Le produit évalué est « ChipDoc v4 on JCOP 4.5 P71 in ICAO EAC(1&2) with PACE configuration, Version 4.0.1.52 » développé par NXP SEMICONDUCTORS. Il s’agit de documents électroniques, qui permettent différents types d’usage basés sur l’identité électronique.
- developer: NXP SEMICONDUCTORS
- enhanced:
- expiration_date: 09.02.2029
- level: EAL5+
- product: ChipDoc v4 on JCOP 4.5 P71 in ICAO EAC(1&2) with PACE configuration (Version 4.0.1.52)
- sponsor: NXP SEMICONDUCTORS
- url: https://cyber.gouv.fr/produits-certifies/chipdoc-v4-jcop-45-p71-icao-eac12-pace-configuration-version-40152-0
|
- cert_id: ANSSI-CC-2022/12
- description: Le produit implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisation de l’aviation civile internationale (ICAO). Ce produit permet la vérification de l’authenticité du document de voyage et l’identification de son porteur notamment lors du contrôle aux frontières, à l’aide d’un système d’inspection. Il est disponible en mode contact ou sans co
- developer: THALES DIS FRANCE SAS INFINEON TECHNOLOGIES AG
- enhanced:
- expiration_date: 16.05.2027
- level: EAL5+
- product: eTravel 2.5.A EAC on BAC on MultiApp V5.0.A (version 2.5.A.0.0)
- sponsor: THALES DIS FRANCE SAS INFINEON TECHNOLOGIES AG
- url: https://cyber.gouv.fr/produits-certifies/etravel-25a-eac-bac-multiapp-v50a-version-25a00
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
BSI-DSZ-CC-1149-V2-2023 |
BSI-DSZ-CC-1107-V2-2021 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
BSI-DSZ-CC-1149-V2-2023 |
BSI-DSZ-CC-1107-V2-2021 |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
certificat-2023_11-R01fr.pdf |
certificat-anssi-cc-2022_12.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0056-V2-2012-MA-02: 1
- BSI-CC-PP-0068-V2-2011-MA-01: 1
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20240214225001+01'00'
- /Creator: Acrobat PDFMaker 23 pour Word
- /Keywords:
- /ModDate: D:20240214231042+01'00'
- /Producer: Adobe PDF Library 23.1.175
- pdf_file_size_bytes: 194428
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
- /Author: mflament
- /CreationDate: D:20220523132641+02'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20220523132641+02'00'
- /Producer: Acrobat Distiller 21.0 (Windows)
- /Title: Microsoft Word - PS-certificat-ANSSI-CC-2022_12
- pdf_file_size_bytes: 1553049
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
ANSSI-CC-2023_11-R01fr.pdf |
anssi-cc-2022_12fr.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-1149-V2-2023: 1
- FR:
- NL:
- NSCIB-CC-0313985-1MA2: 1
- NSCIB-CC-0313985-CR: 1
|
- DE:
- BSI-DSZ-CC-1107-V2-2021: 1
- FR:
- ANSSI-CC-2022/10: 1
- ANSSI-CC-2022/12: 2
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0056-V2-2012-MA-02: 1
- BSI-CC-PP-0056-V2-2012-MA02: 1
- BSI-CC-PP-0068-V2-2011-MA-01: 2
|
- BSI:
- BSI-PP-0056-2009: 2
- BSI-PP-0084-2014: 1
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
- NXP:
- NXP: 5
- NXP Semiconductors: 1
|
- Gemalto:
- Infineon:
- Infineon Technologies AG: 1
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- ICAO:
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- ICAO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
- /Author: mflament
- /CreationDate: D:20220523105939+02'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20220523105939+02'00'
- /Producer: Acrobat Distiller 21.0 (Windows)
- /Title: Microsoft Word - PS-ANSSI-CC-2022_12fr
- pdf_file_size_bytes: 449752
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 15
|
pdf_data/st_filename |
ANSSI-Cible-CC-2023_11-R01en.pdf |
anssi-cible-cc-2022_12en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-1149-V2-2023: 2
|
- DE:
- BSI-DSZ-CC-1107-V2-2021: 1
- NL:
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0055: 1
- BSI-CC-PP-0056-V2-2012-MA-02: 2
- BSI-CC-PP-0068-: 2
- BSI-CC-PP-0086: 1
- BSI-CC-PP-0087-V2-MA-01: 1
|
- BSI:
- BSI-CC-PP-0068-V2-2011-MA-01: 1
- BSI-CC-PP-0084-2014: 1
- BSI-PP-0055-2009: 1
- BSI-PP-0056-2009: 1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL5: 7
- EAL5 augmented: 3
|
- EAL:
- EAL 6+: 1
- EAL5: 5
- EAL5 augmented: 1
- EAL5+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 5
- ADV_FSP.4: 1
- ADV_FSP.5: 6
- ADV_IMP.1: 5
- ADV_INT.2: 2
- ADV_TDS.3: 1
- ADV_TDS.4: 8
- AGD:
- AGD_OPE.1: 4
- AGD_PRE.1: 5
- ALC:
- ALC_CMC.4: 2
- ALC_CMS.5: 1
- ALC_DEL.1: 2
- ALC_DVS.1: 1
- ALC_DVS.2: 6
- ALC_LCD.1: 3
- ALC_TAT.1: 1
- ALC_TAT.2: 3
- ASE:
- ASE_CCL.1: 2
- ASE_ECD.1: 2
- ASE_INT.1: 4
- ASE_OBJ.2: 3
- ASE_REQ.2: 4
- ASE_SPD.1: 1
- ASE_TSS.1: 2
- ATE:
- ATE_COV.2: 4
- ATE_DPT.1: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 3
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 2
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ASE:
- ATE:
- AVA:
- AVA_VAN.3: 2
- AVA_VAN.5: 4
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_SAS: 1
- FAU_SAS.1: 8
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM: 50
- FCS_CKM.1: 1
- FCS_CKM.4: 1
- FCS_COP: 58
- FCS_COP.1: 1
- FCS_RND: 1
- FCS_RND.1: 14
- FCS_RND.1.1: 1
- FDP:
- FDP_ACC: 13
- FDP_ACC.1: 1
- FDP_ACF: 19
- FDP_ACF.1: 16
- FDP_RIP: 27
- FDP_RIP.1: 3
- FDP_SDC: 10
- FDP_SDC.1: 6
- FDP_SDC.1.1: 1
- FDP_SDI: 1
- FDP_UCT: 8
- FDP_UCT.1: 1
- FDP_UIT: 7
- FDP_UIT.1: 2
- FIA:
- FIA_AFL: 32
- FIA_AFL.1: 3
- FIA_API: 26
- FIA_API.1: 3
- FIA_UAU: 85
- FIA_UAU.1: 4
- FIA_UAU.4: 2
- FIA_UAU.5: 2
- FIA_UAU.6: 1
- FIA_UID: 35
- FIA_UID.1: 4
- FMT:
- FMT_LIM: 1
- FMT_LIM.1: 7
- FMT_LIM.1.1: 1
- FMT_LIM.2: 7
- FMT_LIM.2.1: 1
- FMT_MOF: 5
- FMT_MOF.1: 2
- FMT_MSA.1: 1
- FMT_MSA.3: 3
- FMT_MTD: 96
- FMT_MTD.1: 4
- FMT_MTD.3: 9
- FMT_MTD.3.1: 1
- FMT_SMF: 21
- FMT_SMF.1: 2
- FMT_SMR: 18
- FMT_SMR.1: 2
- FPT:
- FPT_EMS: 7
- FPT_EMS.1: 3
- FPT_FLS: 11
- FPT_FLS.1: 2
- FPT_PHP: 7
- FPT_PHP.3: 1
- FPT_TST: 7
- FPT_TST.1: 3
- FTP:
|
- FAU:
- FAU_GEN: 1
- FAU_SAS: 6
- FAU_SAS.1: 11
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 47
- FCS_CKM.1: 17
- FCS_CKM.1.1: 1
- FCS_CKM.2: 6
- FCS_CKM.4: 46
- FCS_CKM.4.1: 1
- FCS_COP: 73
- FCS_COP.1: 8
- FCS_COP.1.1: 4
- FCS_RND: 7
- FCS_RND.1: 15
- FCS_RND.1.1: 2
- FCS_RNG: 1
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 20
- FDP_ACF: 2
- FDP_ACF.1: 14
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 3
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 2
- FDP_IFC.1: 6
- FDP_ITC: 1
- FDP_ITC.1: 14
- FDP_ITC.2: 14
- FDP_ITT.1: 1
- FDP_SDC.1: 1
- FDP_SDI.2: 1
- FDP_UCT.1: 10
- FDP_UCT.1.1: 1
- FDP_UIT.1: 10
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL: 11
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_API: 17
- FIA_API.1: 7
- FIA_API.1.1: 1
- FIA_SOS.2: 1
- FIA_UAU: 17
- FIA_UAU.1: 5
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 12
- FIA_UAU.4.1: 1
- FIA_UAU.5: 13
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 9
- FIA_UAU.6.1: 1
- FIA_UID: 21
- FIA_UID.1: 8
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_LIM: 9
- FMT_LIM.1: 23
- FMT_LIM.1.1: 3
- FMT_LIM.2: 21
- FMT_LIM.2.1: 3
- FMT_MSA.1: 2
- FMT_MSA.3: 4
- FMT_MTD: 54
- FMT_MTD.1: 5
- FMT_MTD.3: 6
- FMT_MTD.3.1: 1
- FMT_SMF: 1
- FMT_SMF.1: 45
- FMT_SMF.1.1: 1
- FMT_SMR: 1
- FMT_SMR.1: 32
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS: 4
- FPT_EMS.1: 13
- FPT_EMS.1.1: 3
- FPT_EMS.1.2: 3
- FPT_FLS.1: 10
- FPT_FLS.1.1: 1
- FPT_ITT.1: 1
- FPT_PHP.3: 10
- FPT_PHP.3.1: 1
- FPT_TST.1: 10
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FPT_TST.2: 1
- FRU:
- FTP:
- FTP_ITC.1: 7
- FTP_TRP.1: 5
|
pdf_data/st_keywords/cc_claims |
|
- A:
- O:
- OE:
- OE.BAC-PP: 4
- OE.BAC_PP: 1
- OE.MRTD_: 2
|
pdf_data/st_keywords/vendor |
- NXP:
- NXP: 106
- NXP Semiconductors: 38
|
- Gemalto:
- Infineon:
- Thales:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-256: 3
- SHA-384: 2
- SHA-512: 3
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 1
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 4
- Physical Tampering: 3
- malfunction: 8
- physical tampering: 2
- SCA:
|
- FI:
- Malfunction: 4
- Physical Tampering: 5
- Physical tampering: 1
- fault injection: 1
- malfunction: 6
- physical tampering: 1
- SCA:
- DPA: 2
- SPA: 1
- physical probing: 4
- timing attacks: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
- EF:
- EF.COM: 1
- EF.CardAccess: 1
- EF.ChipSecurity: 1
- EF.DG1: 5
- EF.DG14: 5
- EF.DG15: 2
- EF.DG16: 4
- EF.DG2: 2
- EF.DG3: 8
- EF.DG4: 8
- EF.DG5: 1
- EF.SOD: 2
|
- EF:
- EF.COM: 7
- EF.DG1: 17
- EF.DG14: 7
- EF.DG15: 2
- EF.DG16: 16
- EF.DG2: 8
- EF.DG3: 19
- EF.DG4: 18
- EF.DG5: 6
- EF.SOD: 8
|
pdf_data/st_keywords/standard_id |
- BSI:
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
- FIPS:
- FIPS 180-4: 1
- FIPS 197: 4
- FIPS 46-3: 3
- FIPS PUB 46-3: 1
- FIPS180-4: 1
- ICAO:
- ISO:
- PKCS:
- SCP:
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- FIPS:
- FIPS 180-2: 1
- FIPS 186-3: 1
- FIPS 197: 1
- ICAO:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816-4: 1
- NIST:
- SP 800-67: 1
- SP 800-90: 2
- PKCS:
- RFC:
- SCP:
- SCP01: 1
- SCP02: 1
- SCP03: 2
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: NXP B.V.
- /CreationDate: D:20231011000545+02'00'
- /Creator: DITA Open Toolkit 3.3.1
- /Keywords: Common Criteria, Security Target Lite, ChipDoc v4, JCOP 4.5 P71, ICAO EAC with BAC, ICAO EAC with PACE
- /Producer: Apache FOP Version 2.3
- /Subject: ChipDoc v4 on JCOP 4.5 P71 in ICAO EAC(1&2) with PACE configuration
- /Title: Security Target Lite
- pdf_file_size_bytes: 807888
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 87
|
- /Author: OHAYON Franck
- /CreationDate: D:20220222154807+01'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20220222154807+01'00'
- /Producer: Microsoft® Word 2016
- /Title: MultiApp V5.0.A: eTravel 2.5.A EAC on BAC Security Target
- pdf_file_size_bytes: 2005662
- pdf_hyperlinks: https://www.ssi.gouv.fr/uploads/2021/03/anssi-guide-mecanismes_crypto-2.04.pdf
- pdf_is_encrypted: False
- pdf_number_of_pages: 70
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |