Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
IDeal Citiz v2.3-n embedding ID.me 1.6-n application (ID.me 1.6-n / 2.1.6.0.0)
ANSSI-CC-2019/32
- Kanguru Defender Elite 200 with Kanguru Defender Manager Elite 200, Firmware Version 02.03.10, KDME200 v2.0.0.0-2/3/6,- Kanguru Defender 2000 with Kanguru Defender Manager 2000, Firmware Version 02.03.10, KDM2000 v1.2.1.8-2/3/6,- Universal Kanguru Local Administrator, Version 3.2.0.3 and- Kanguru Remote Management Console, Version 5.0.2.6
BSI-DSZ-CC-0772-2014
name IDeal Citiz v2.3-n embedding ID.me 1.6-n application (ID.me 1.6-n / 2.1.6.0.0) - Kanguru Defender Elite 200 with Kanguru Defender Manager Elite 200, Firmware Version 02.03.10, KDME200 v2.0.0.0-2/3/6,- Kanguru Defender 2000 with Kanguru Defender Manager 2000, Firmware Version 02.03.10, KDM2000 v1.2.1.8-2/3/6,- Universal Kanguru Local Administrator, Version 3.2.0.3 and- Kanguru Remote Management Console, Version 5.0.2.6
category ICs, Smart Cards and Smart Card-Related Devices and Systems Data Protection
scheme FR DE
not_valid_after 21.08.2024 08.11.2019
not_valid_before 21.08.2019 07.11.2014
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2019_32fr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2019_32en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772b_pdf.pdf
manufacturer Idemia Kanguru Solutions
manufacturer_web https://www.idemia.com https://www.kanguru.com
security_level AVA_VAN.5, ALC_DVS.2, EAL5+ ALC_FLR.1, EAL2+
dgst 33e4966c9899cb42 eda06ca3c208ebd0
heuristics/cert_id ANSSI-CC-2019/32 BSI-DSZ-CC-0772-2014
heuristics/cert_lab CEA BSI
heuristics/extracted_sars ALC_CMS.5, ASE_INT.1, ATE_FUN.1, ADV_IMP.1, ATE_DPT.3, ASE_TSS.1, AGD_PRE.1, ASE_CCL.1, ALC_DVS.2, AVA_VAN.5, ASE_SPD.1, ASE_OBJ.2, ATE_COV.2, ALC_TAT.2, ASE_REQ.2, ALC_CMC.4, ADV_FSP.5, ADV_ARC.1, ALC_DEL.1, AGD_OPE.1, ALC_LCD.1, ADV_TDS.4, ASE_ECD.1 ALC_CMC.2, APE_REQ.2, ASE_INT.1, APE_INT.1, ATE_FUN.1, ATE_DPT.4, ADV_SPM.1, ATE_COV.1, ADV_TDS.1, ALC_FLR.1, ASE_TSS.1, ADV_IMP.2, APE_SPD.1, APE_ECD.1, ADV_FSP.2, AGD_PRE.1, ASE_CCL.1, ALC_DVS.2, ATE_IND.2, ADV_INT.3, ASE_SPD.1, ASE_OBJ.2, ASE_REQ.2, ADV_ARC.1, ALC_CMS.2, ALC_LCD.2, ALC_DEL.1, APE_OBJ.2, AGD_OPE.1, APE_CCL.1, ASE_ECD.1, ALC_TAT.3, AVA_VAN.2
heuristics/extracted_versions 2.1.6.0.0, 1.6, 2.3 5.0.2.6, 1.2.1.8, 02.03.10, 2.0.0.0, 3.2.0.3
heuristics/scheme_data
  • cert_id: ANSSI-CC-2019/32
  • description: Le produit évalué est l’applet Java Card «IDeal Citiz v2.3-n embedding ID.me 1.6-n application, version ID.me 1.6-n / 2.1.6.0.0 », développé par Idemia et NXP Semiconductors. Ce produit offre des services d’authentification et de signature électronique (SSCD) conformes aux spécifications IAS ECC v1.0.1. Il est embarqué sur la plateforme Java Card ouverte « NXP JCOP 3 P60 » (avec ou sans patch P
  • developer: Idemia, NXP Semiconductors
  • enhanced:
  • level: EAL5+
  • product: IDeal Citiz v2.3-n embedding ID.me 1.6-n application, version ID.me 1.6-n / 2.1.6.0.0
  • sponsor: Idemia
  • url: https://cyber.gouv.fr/produits-certifies/ideal-citiz-v23-n-embedding-idme-16-n-application-version-idme-16-n-21600
heuristics/st_references/directly_referencing BSI-DSZ-CC-0973-2016, BSI-DSZ-CC-1059-2018 {}
heuristics/st_references/indirectly_referencing BSI-DSZ-CC-0973-2016, BSI-DSZ-CC-1059-2018 {}
maintenance_updates
protection_profiles



pdf_data/report_filename anssi-cc-2019_32fr.pdf 0772a_pdf.pdf
pdf_data/report_frontpage
  • FR:
    • cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
    • cc_version: Critères Communs version 3.1 révision 5
    • cert_id: ANSSI-CC-2019/32
    • cert_item: IDeal Citiz v2.3-n embedding ID.me 1.6-n application
    • cert_item_version: ID.me 1.6-n / 2.1.6.0.0
    • cert_lab: CEA - LETI 17 avenue des martyrs, 38054 Grenoble Cedex 9, France
    • developer: IDEMIA 2 place Samuel Champlain 92400 Courbevoie, France NXP Semiconductors Troplowitzstrasse 20, 22529 Hamburg, Allemagne Commanditaire IDEMIA 2 place Samuel Champlain 92400 Courbevoie, France
    • match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
    • ref_protection_profiles: Protection profiles for secure signature creation device : Part 2: Device with key generation, v2.0.1, certifié BSI-CC-PP-0059-2009-MA-01 le 21 février 2012; Part 3: Device with key import, v1.0.2, certifié BSI-CC-PP-0075-2012 le 27 septembre 2012 ; Part 4: Extension for device with key generation and trusted communication with certificate generation application, v1.0.1, certifié BSI-CC-PP-0071-2012 le 12 décembre 2012 ; Part 5: Extension for device with key generation and trusted communication with signature creation application, v1.0.1, certifié BSI-CC-PP-0072-2012 le 12 décembre 2012 ; Part 6: Extension for device with key import and trusted communication with signature creation application, v1.0.4, certifié BSI-CC-PP-0076-2013 le 16 avril 2013
  • DE:
  • FR:
  • DE:
    • cert_id: BSI-DSZ-CC-0772-2014
    • cert_item: Kanguru Defender Elite 200 Kanguru Defender 2000 Universal Kanguru Local Administrator, v3.2.0.3 Kanguru Remote Management Console, v5.0.2.6
    • cert_lab: BSI
    • developer: Kanguru Solutions
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1059-: 1
  • FR:
    • ANSSI-CC-2019/32: 19
  • DE:
    • BSI-DSZ-CC-0772-2014: 22
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0059-2009-MA-01: 1
    • BSI-CC-PP- 0071-2012: 1
    • BSI-CC-PP- 0072-2012: 1
    • BSI-CC-PP- 0075-2012: 1
    • BSI-CC-PP-0059-2009-MA-01: 1
    • BSI-CC-PP-0071-2012: 1
    • BSI-CC-PP-0072-2012: 1
    • BSI-CC-PP-0075-2012: 1
    • BSI-CC-PP-0076-: 1
    • BSI-CC-PP-0076-2013: 1
    • BSI-CC-PP-0086-: 1
  • other:
    • PP-SSCD-: 6
    • PP-SSCD-Part2: 1
    • PP-SSCD-Part4: 1
    • PP-SSCD-Part5: 1
    • PP-SSCD-Part6: 1
  • BSI:
    • BSI-PP-0025-2006: 4
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 5: 3
    • EAL 7: 1
    • EAL2: 2
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
  • EAL:
    • EAL 1: 7
    • EAL 2: 8
    • EAL 2 augmented: 3
    • EAL 3: 4
    • EAL 4: 7
    • EAL 5: 6
    • EAL 6: 3
    • EAL 7: 4
    • EAL2: 2
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 2
    • ALC_FLR: 2
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 5
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 1
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 1
    • ALC_FLR: 3
    • ALC_FLR.1: 5
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 1
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 1
    • ALC_TAT.2: 1
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 2
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 1
    • ATE_DPT.4: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 1
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_CKM.1: 1
    • FCS_COP.1: 1
    • FCS_RNG.1: 1
  • FDP:
    • FDP_ACC.1: 2
    • FDP_ACF.1: 2
  • FIA:
    • FIA_SOS.1: 1
    • FIA_UAU.2: 4
    • FIA_UAU.6: 1
    • FIA_UID.2: 4
  • FMT:
    • FMT_MTD: 2
    • FMT_SMF: 2
    • FMT_SMF.1: 1
pdf_data/report_keywords/vendor
  • Idemia:
    • IDEMIA: 24
  • NXP:
    • NXP: 9
    • NXP Semiconductors: 1
  • Oberthur:
    • Oberthur Technologies: 1
  • Microsoft:
    • Microsoft: 1
pdf_data/report_keywords/eval_facility
  • CEA-LETI:
    • CEA - LETI: 1
    • CEA-LETI: 2
  • CESTI:
    • CESTI: 3
  • Serma:
    • SERMA: 8
  • atsec:
    • atsec: 3
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
  • AES_competition:
    • AES:
      • AES: 4
      • AES-256: 1
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 2
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 13
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 2
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • physical tampering: 2
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI TR-03110: 1
  • BSI:
    • BSI 7125: 2
    • BSI 7138: 2
    • BSI 7148: 1
    • BSI TR-02102: 1
pdf_data/report_keywords/os_name
  • JCOP:
    • JCOP 3: 5
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • BSI:
    • AIS 20: 2
    • AIS 32: 1
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 2
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • KRMC Administrator's User Manual, Version 5.0.2, 2013-11-01 [14] Configuration lists for the TOE (confidential documents): a) Configuration list for TOE executables, 2014-09-17 b) Configuration list from Phison: 1
    • Report, Version 8, 2014-10-07, Final Evaluation Technical Report, atsec information security GmbH, (confidential document) [9] Evaluated Product User Guide, Version 1.20, 2014-10-02 [10] Kanguru Defender Elite 200 User: 1
pdf_data/report_metadata
  • /Author: Géraldine Avoué
  • /CreationDate: D:20190913105844+02'00'
  • /Creator: Microsoft® Word 2010
  • /Keywords: ANSSI-CC-CER-F-07.29
  • /ModDate: D:20190913105844+02'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: IDeal Citiz v2.3-n embedding ID.me 1.6-n application
  • /Title: ANSSI-CC-2019/32
  • pdf_file_size_bytes: 732853
  • pdf_hyperlinks: mailto:[email protected], http://www.ssi.gouv.fr/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 18
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20141121083051+01'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, encrypted USB storage device, Kanguru Defender"
  • /ModDate: D:20141121113713+01'00'
  • /Producer: LibreOffice 4.2
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0772-2014
  • pdf_file_size_bytes: 1643286
  • pdf_hyperlinks: https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 42
pdf_data/st_filename anssi-cible-cc-2019_32en.pdf 0772b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0973-2016: 1
    • BSI-DSZ-CC-1059-2018: 3
  • NL:
    • CC-16-67206-CR: 1
    • CC-18-67206: 2
  • DE:
    • BSI-DSZ-CC-0772: 1
pdf_data/st_keywords/cc_protection_profile_id
  • ANSSI:
    • ANSSI-CC-PP-: 1
  • BSI:
    • BSI-CC-PP-0059-2009-MA-01: 1
    • BSI-CC-PP-0068-V2-2011: 1
    • BSI-CC-PP-0071-2012: 1
    • BSI-CC-PP-0072-2012: 1
    • BSI-CC-PP-0075-2012: 1
    • BSI-CC-PP-0076-2013: 1
    • BSI-CC-PP-0084-2014: 1
    • BSI-CC-PP-0086: 1
  • other:
    • PP-SSCD2: 22
    • PP-SSCD3: 22
    • PP-SSCD4: 22
    • PP-SSCD5: 23
    • PP-SSCD6: 21
  • BSI:
    • BSI-PP- 0025: 13
    • BSI-PP-0025: 6
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 5: 1
    • EAL 5 augmented: 1
    • EAL 5+: 1
    • EAL4+: 1
    • EAL5: 6
    • EAL5 augmented: 4
    • EAL5+: 1
  • EAL:
    • EAL2: 4
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 5
    • ADV_FSP.1: 3
    • ADV_FSP.2: 2
    • ADV_FSP.4: 1
    • ADV_FSP.5: 8
    • ADV_IMP.1: 8
    • ADV_TDS.1: 2
    • ADV_TDS.3: 3
    • ADV_TDS.4: 8
  • AGD:
    • AGD_OPE: 6
    • AGD_OPE.1: 5
    • AGD_PRE: 7
    • AGD_PRE.1: 5
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.1: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 8
    • ALC_LCD.1: 3
    • ALC_TAT.1: 2
    • ALC_TAT.2: 3
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 4
    • ASE_INT.1: 5
    • ASE_OBJ.2: 3
    • ASE_REQ.1: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 2
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 3
    • ATE_DPT.1: 1
    • ATE_DPT.3: 1
    • ATE_FUN.1: 6
  • AVA:
    • AVA_VAN.5: 7
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_SPM.1: 2
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.1: 5
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
  • FCS:
    • FCS_CKM: 24
    • FCS_CKM.1: 25
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 31
    • FCS_CKM.4.1: 1
    • FCS_COP: 41
    • FCS_COP.1: 17
    • FCS_COP.1.1: 1
    • FCS_RND: 5
    • FCS_RND.1: 20
    • FCS_RND.1.1: 2
    • FCS_RNG.1: 1
  • FDP:
    • FDP_ACC: 67
    • FDP_ACC.1: 19
    • FDP_ACF: 56
    • FDP_ACF.1: 30
    • FDP_DAU: 9
    • FDP_DAU.2: 2
    • FDP_IFC.1: 9
    • FDP_ITC: 11
    • FDP_ITC.1: 9
    • FDP_ITC.2: 6
    • FDP_RIP.1: 25
    • FDP_RIP.1.1: 1
    • FDP_SDI: 20
    • FDP_SDI.2: 4
    • FDP_UCT: 22
    • FDP_UCT.1: 2
    • FDP_UIT: 18
    • FDP_UIT.1: 4
  • FIA:
    • FIA_AFL: 36
    • FIA_AFL.1: 13
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_API: 19
    • FIA_API.1: 12
    • FIA_API.1.1: 2
    • FIA_SOS.2: 1
    • FIA_UAU: 93
    • FIA_UAU.1: 23
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.4: 1
    • FIA_UAU.5: 3
    • FIA_UAU.6: 2
    • FIA_UID: 34
    • FIA_UID.1: 25
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_LIM: 5
    • FMT_LIM.1: 14
    • FMT_LIM.1.1: 2
    • FMT_LIM.2: 13
    • FMT_LIM.2.1: 2
    • FMT_MOF.1: 9
    • FMT_MOF.1.1: 1
    • FMT_MSA: 21
    • FMT_MSA.1: 5
    • FMT_MSA.2: 11
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 24
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MSA.4: 13
    • FMT_MSA.4.1: 1
    • FMT_MTD: 174
    • FMT_MTD.1: 15
    • FMT_MTD.3: 11
    • FMT_MTD.3.1: 1
    • FMT_SMF.1: 57
    • FMT_SMF.1.1: 1
    • FMT_SMR: 28
    • FMT_SMR.1: 37
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_EMS: 5
    • FPT_EMS.1: 16
    • FPT_EMS.1.1: 4
    • FPT_EMS.1.2: 3
    • FPT_FLS.1: 12
    • FPT_FLS.1.1: 1
    • FPT_PHP.1: 7
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 15
    • FPT_PHP.3.1: 1
    • FPT_TST: 1
    • FPT_TST.1: 17
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 73
    • FTP_ITC.1: 22
    • FTP_TRP.1: 4
  • FAU:
    • FAU_GEN: 1
  • FCS:
    • FCS_CKM.1: 9
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 9
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 9
    • FCS_COP.1.1: 1
    • FCS_RNG: 2
    • FCS_RNG.1: 15
    • FCS_RNG.1.1: 3
    • FCS_RNG.1.2: 3
  • FDP:
    • FDP_ACC.1: 14
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 13
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 1
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
  • FIA:
    • FIA_SOS.1: 8
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 7
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.2: 9
    • FIA_UAU.2.1: 1
    • FIA_UAU.6: 8
    • FIA_UAU.6.1: 1
    • FIA_UID.1: 2
    • FIA_UID.2: 10
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA.1: 8
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 1
    • FMT_MTD: 12
    • FMT_MTD.1: 3
    • FMT_MTD.1.1: 2
    • FMT_SMF: 20
    • FMT_SMF.1: 6
    • FMT_SMF.1.1: 2
    • FMT_SMR.1: 12
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 9
    • FPT_FLS.1.1: 1
    • FPT_PHP.1: 8
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_RCV.4: 8
    • FPT_RCV.4.1: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.CGA: 6
    • A.CSP: 9
    • A.SCA: 5
  • D:
    • D.SCD: 1
    • D.SVD: 1
  • OE:
    • OE.HID_VAD: 7
    • OE.HI_VAD: 2
pdf_data/st_keywords/vendor
  • Idemia:
    • IDEMIA: 12
  • NXP:
    • NXP: 20
pdf_data/st_keywords/eval_facility
  • CEA-LETI:
    • CEA-LETI: 1
  • atsec:
    • atsec: 40
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 20
  • DES:
    • 3DES:
      • 3DES: 10
      • TDES: 9
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • CMAC: 5
      • KMAC: 2
  • AES_competition:
    • AES:
      • AES: 3
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 18
    • ECDH:
      • ECDH: 4
    • ECDSA:
      • ECDSA: 4
  • FF:
    • DH:
      • DH: 2
  • RSA:
    • RSA-OAEP: 1
    • RSA-PSS: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 6
    • SHA2:
      • SHA-224: 6
      • SHA-256: 5
      • SHA-384: 5
      • SHA-512: 6
  • SHA:
    • SHA2:
      • SHA-256: 1
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key agreement: 1
  • MAC:
    • MAC: 8
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 120
  • PGP:
    • PGP: 1
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 2
  • RNG:
    • RNG: 14
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 11
  • CBC:
    • CBC: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 1
    • Malfunction: 5
    • Physical Tampering: 1
    • fault injection: 1
    • malfunction: 5
    • physical tampering: 7
  • SCA:
    • DPA: 3
    • SPA: 3
    • physical probing: 3
    • side channel: 1
    • timing attacks: 2
  • FI:
    • physical tampering: 3
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-03110: 1
pdf_data/st_keywords/os_name
  • JCOP:
    • JCOP 3: 10
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.ChipSecurity: 1
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS20: 2
  • CC:
    • CCMB-2012-09-004: 1
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS PUB 180-2: 2
    • FIPS180-4: 1
  • ICAO:
    • ICAO: 2
  • ISO:
    • ISO/IEC 15408:2005: 2
    • ISO/IEC 7816-4: 1
    • ISO/IEC 9797-1: 3
  • NIST:
    • NIST SP 800-38B: 1
  • PKCS:
    • PKCS#1: 4
    • PKCS1: 4
  • BSI:
    • AIS 20: 1
    • AIS 31: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • of the Common Criteria certified IDEMIA IDeal Pass v2.3-n JC with Privacy Protection applet (out of scope of this TOE). IDeal Citiz v2.3-n enforces separation of the data between the applets and associated: 1
    • out of scope: 1
  • OutOfScope:
    • 11 1.5.4.3 Out of scope : 1
    • 11 1.5.4.3 Out of scope ........................................................................................... 12 1.5: 1
    • Out of scope: 2
    • from the KRMC to the device. Commands are queued at the KRMC until polled form the device. 1.5.4.3 Out of scope The TOE supports additional features that are not part of the scope: ● Antivirus solution ●: 1
pdf_data/st_metadata
  • /Author: G509704
  • /CreationDate: D:20190717162824+02'00'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20190717162824+02'00'
  • /Producer: Microsoft® Word 2016
  • /Title: Title
  • pdf_file_size_bytes: 2697853
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 142
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different