name |
LEO V2 |
PassBy[ME] Server System v1.2 |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
Other Devices and Systems |
scheme |
FR |
IT |
status |
archived |
archived |
not_valid_after |
01.09.2019 |
08.05.2023 |
not_valid_before |
19.07.2012 |
08.05.2018 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2012-37fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cr_passbyme12_v1.0_en.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2012-37en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_passbyme12_v1.7.pdf |
manufacturer |
Ingenico Healthcare/e-ID |
Microsec |
manufacturer_web |
https://www.ingenico.com |
https://www.microsec.hu/en/ |
security_level |
ADV_FSP.4, ALC_FLR.3, AVA_VAN.3, ALC_TAT.1, ADV_IMP.1, EAL3+, ADV_TDS.3 |
EAL2 |
dgst |
33537b8a859fdc32 |
21fc3e796c9eb030 |
heuristics/cert_id |
ANSSI-CC-2012/37 |
OCSI/CERT/SYS/03/2017/RC |
heuristics/cert_lab |
SERMA |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
- |
1.2 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
ANSSI-CC-2016/53 |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
ANSSI-CC-2016/53 |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
86afa36bc4e78466 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-profil_PP-2012-01en.pdf |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
ANSSI-CC_2012-37fr.pdf |
cr_passbyme12_v1.0_en.pdf |
pdf_data/report_frontpage |
- FR:
- cc_security_level: EAL3 Augmenté ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ALC_FLR.3, ALC_TAT.1 et AVA.VAN.3
- cc_version: CC version 3.1 révision 3
- cert_id: ANSSI-CC-2012/37
- cert_item: LEO V2
- cert_item_version: Référence PPD001-003-AXY, Version PK08.12
- cert_lab: SERMA Technologies 30 avenue Gustave Eiffel, 33608 Pessac France
- developer: Ingenico Healthcare/e-ID 25 quai Gallieni, 92158 Suresnes Cedex France Commanditaire Ingenico Healthcare/e-ID 25 quai Gallieni, 92158 Suresnes Cedex France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur (.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: PP LSCIHM], version v1.6 Lecteur sécurisé de carte avec interface homme machine
|
|
pdf_data/report_keywords/cc_cert_id |
- FR:
- ANSSI-CC-2011-31: 1
- ANSSI-CC-2012/37: 14
- ANSSI-CC-PP-2012/01: 1
|
- IT:
- OCSI/CERT/SYS/03/2017/RC: 26
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 3+: 1
- EAL 5: 1
- EAL 7: 1
- EAL3: 2
- EAL4: 2
- ITSEC:
|
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_FSP.4: 2
- ADV_IMP: 1
- ADV_IMP.1: 2
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- ADV_TDS.3: 2
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_FLR: 2
- ALC_FLR.3: 2
- ALC_LCD: 1
- ALC_TAT: 1
- ALC_TAT.1: 2
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- ISO:
- PKCS:
- RFC:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20120720163953+02'00'
- /Creator: PDFCreator Version 0.9.0
- /Keywords:
- /ModDate: D:20120727112114+02'00'
- /Producer: AFPL Ghostscript 8.53
- /Subject:
- /Title:
- pdf_file_size_bytes: 124103
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 13
|
- /Author: OCSI
- /CreationDate: D:20180516123730+02'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20180516123730+02'00'
- /Producer: Microsoft® Word 2010
- /Title: Certification Report “PassBy[ME] Server System v1.2”
- pdf_file_size_bytes: 859781
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 26
|
pdf_data/st_filename |
ANSSI-CC-cible_2012-37en.pdf |
st_passbyme12_v1.7.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL3: 2
- EAL3 augmented: 1
- EAL3+: 19
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 2
- ADV_IMP.1: 2
- ADV_TDS.3: 2
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.3: 3
- ALC_LCD.1: 1
- ALC_TAT.1: 2
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ASE:
- ASE_CCL.1: 3
- ASE_ECD.1: 3
- ASE_INT.1: 3
- ASE_OBJ.2: 3
- ASE_REQ.2: 3
- ASE_SPD.1: 3
- ASE_TSS.1: 3
|
pdf_data/st_keywords/cc_sfr |
- FDP:
- FDP_IFC.1: 2
- FDP_IFC.1.1: 3
- FDP_IFF.1: 2
- FDP_IFF.1.1: 3
- FDP_IFF.1.2: 2
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 3
- FDP_IFF.1.5: 3
- FDP_PHP.1.1: 2
- FDP_PHP.1.2: 2
- FDP_RIP: 1
- FDP_RIP.2: 1
- FDP_RIP.2.1: 3
- FMT:
- FPT:
- FPT_PHP: 1
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FTA:
- FTA_TAB: 1
- FTA_TAB.1.1: 3
|
- FAU:
- FAU_GEN.1: 15
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 9
- FAU_GEN.2.1: 1
- FAU_SAR.1: 9
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FDP:
- FDP_ACC.1: 16
- FDP_ACC.1.1: 1
- FDP_ACF.1: 8
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_DAU_CPI: 1
- FDP_DAU_CPV: 1
- FDP_IFC.1: 1
- FDP_IFF: 2
- FIA:
- FIA_AFL.1: 8
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 7
- FIA_ATD.1.1: 1
- FIA_UAU.1: 1
- FIA_UAU.2: 12
- FIA_UAU.2.1: 1
- FIA_UID.1: 9
- FIA_UID.2: 14
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA.1: 13
- FMT_MSA.1.1: 1
- FMT_MSA.3: 13
- FMT_MSA.3.1: 1
- FMT_SMF.1: 10
- FMT_SMF.1.1: 1
- FMT_SMR.1: 15
- FMT_SMR.1.1: 1
- FPT:
- FPT_ITT.1: 9
- FPT_ITT.1.1: 1
- FPT_STM.1: 11
- FPT_STM.1.1: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.USER: 5
- A.USER_DIS: 2
- A.USER_KEYPAD: 1
- A.USER_PIN: 2
- A.USER_UNOBSERVED: 2
- A.USER_USAGE: 1
- O:
- O.HARD_EVIDENT: 7
- O.REVEAL: 5
- O.SIGNAL: 3
- OE:
- OE.MANUAL: 3
- OE.PRIVATE: 2
- OP:
- OP.D_CONTROL: 1
- OP.P_ENTRY: 2
- OP.P_VERIFY: 1
- OSP:
- T:
- T.DIS: 1
- T.PIN_DISCLOSE: 1
- T.PIN_DISCLOSEE: 1
- T.PIN_MODIFY: 2
|
|
pdf_data/st_keywords/vendor |
|
- Microsoft:
- STMicroelectronics:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 2
- PKCS:
- RFC:
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- Workstation. The PC may be a Microsoft Windows, Mac or Linux OS powered. The security of the PC is out of scope of the TOE. As a Personal Identification Number (also known and referred as ‘PIN’) is required for: 1
- entry functionality can be activated from a software application loaded in the PC (not provided and out of scope of this TOE), and used in conjunction with a secure smartcard (not provided and out of scope of: 1
- not provided and out of scope of this TOE: 2
- out of scope: 3
|
- OutOfScope:
- User, but timestamped in the TOE. The signing of the answer takes place in the mobile device, so out of scope of this ST. The real asset of the TOE is the signed and timestamped answer of the User. Performing: 1
- out of scope: 1
|
pdf_data/st_metadata |
|
- /Author: Microsec Ltd.
- /CreationDate: D:20171016073000Z00'00'
- /Creator: PDF Architect
- /ModDate: D:20180516124816+02'00'
- /Producer: PDF Architect
- /Title: PassBy[ME] Server System v1.2 Security Target
- pdf_file_size_bytes: 1044932
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 68
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |