name |
Plateforme Java Card MultiApp Essential v1.0, en configuration ouverte, sur le composant Infineon M7793 A12 ou G12 |
Plateforme Java Card en configuration ouverte de la carte à puce MultiApp v3.1 masquée sur le composant P60D144PVA (version du patch: 1.3) |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
FR |
FR |
status |
archived |
archived |
not_valid_after |
05.01.2021 |
31.08.2020 |
not_valid_before |
05.01.2016 |
31.08.2015 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015-73.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_15.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible2015-73lite.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi_cible_2015_15_LITE.pdf |
manufacturer |
Gemalto - Infineon Technologies AG |
Gemalto / NXP Semiconductors |
manufacturer_web |
https://www.gemalto.com/ |
https://www.gemalto.com/ |
security_level |
AVA_VAN.5, ALC_DVS.2, EAL5+ |
AVA_VAN.5, ALC_DVS.2, EAL5+ |
dgst |
37f694d2de25cb63 |
d89399d5b767d996 |
heuristics/cert_id |
ANSSI-CC-2015/73 |
ANSSI-CC-2015/15 |
heuristics/cert_lab |
SERMA |
SERMA |
heuristics/cpe_matches |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
AVA_VAN.5, ALC_DVS.2 |
ALC_DEL.1, ADV_FSP.5, ALC_CMC.4, ALC_CMS.5, ALC_DVS.2, AVA_VAN.5, ATE_FUN.1, ATE_IND.2, ADV_ARC.1, ALC_TAT.2, ADV_INT.2, ADV_IMP.1, ASE_TSS.2, ADV_TDS.4, ATE_COV.2, AGD_OPE.1, AGD_PRE.1, ALC_LCD.1, ATE_DPT.3, ALC_FLR.1 |
heuristics/extracted_versions |
1.0 |
3.1, 1.3 |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/report_references/directly_referenced_by |
ANSSI-CC-2016/23, ANSSI-CC-2016/06 |
ANSSI-CC-2015/40, ANSSI-CC-2015/39, ANSSI-CC-2016/03, ANSSI-CC-2016/04, ANSSI-CC-2015/37, ANSSI-CC-2015/38, ANSSI-CC-2015/41 |
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-0926-2014 |
BSI-DSZ-CC-0845-V2-2013, ANSSI-CC-2014/86 |
heuristics/report_references/indirectly_referenced_by |
ANSSI-CC-2016/23, ANSSI-CC-2016/06, ANSSI-CC-2016/24 |
ANSSI-CC-2015/40, ANSSI-CC-2015/39, ANSSI-CC-2016/03, ANSSI-CC-2016/04, ANSSI-CC-2015/37, ANSSI-CC-2015/38, ANSSI-CC-2015/41 |
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-0757-2011, BSI-DSZ-CC-0926-2014, BSI-DSZ-CC-0907-2013 |
BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0845-V2-2013, BSI-DSZ-CC-0728-2011, ANSSI-CC-2014/86, ANSSI-CC-2014/06, BSI-DSZ-CC-0837-2013, BSI-DSZ-CC-0666-2012, BSI-DSZ-CC-0845-2012, BSI-DSZ-CC-0829-2012 |
heuristics/scheme_data |
- cert_id: ANSSI-CC-2015/73
- description: Le produit certifié est la « Plateforme Java Card MultiApp Essential v1.0, en configuration ouverte, sur le composant Infineon M7793 A12 ou G12 » développé par GEMALTO et INFINEON. Le produit se présente sous la forme d’une carte à puce au format ISO 7816 et fonctionnant en mode contact (standard ISO 7816-3) ; la plateforme ouverte Java Card est destinée à fournir des services de sécurité aux a
- developer: Gemalto / Infineon
- enhanced:
- augmented: ALC_DVS.2, AVA_VAN.5
- category: Cartes à puce
- cc_version: Critères Communs version 3.1r4
- cert_id: ANSSI-CC-2015/73
- certification_date: 2016-01-05
- developer: Gemalto / Infineon
- evaluation_facility: Serma Technologies
- level: EAL5+
- mutual_recognition: SOG-IS CCRA
- protection_profile: PP-JCS Open Configuration
- report_link: https://cyber.gouv.fr/sites/default/files/2016/01/ANSSI-CC-2015-73.pdf
- sponsor: Gemalto
- target_link: https://cyber.gouv.fr/sites/default/files/2016/01/cible2015-73lite.pdf
- level: EAL5+
- product: Plateforme Java Card MultiApp Essential v1.0, en configuration ouverte, sur le composant Infineon M7793 A12 ou G12
- sponsor: Gemalto
- url: https://cyber.gouv.fr/produits-certifies/plateforme-java-card-multiapp-essential-v10-en-configuration-ouverte-sur-le
|
- cert_id: ANSSI-CC-2015/15
- description: La certificationporte sur la plateforme ouverte Java Card du produit « MultiApp v3.1 » qui est une carte à puce pouvant être en mode contact ou sans contact. Le produit est développé par la société GEMALTO et embarqué sur le microcontrôleur P60D144PVA fabriqué par la société NXP SEMICONDUCTORS. La plateforme ouverte Java Card est destinée à fournir des services de sécurité aux applets qui sero
- developer: Gemalto / NXP Semiconductors
- enhanced:
- augmented: ALC_DVS.2, AVA_VAN.5
- category: Cartes à puce
- cc_version: Critères Communs version 3.1r4
- cert_id: ANSSI-CC-2015/15
- certification_date: 2015-08-31
- developer: Gemalto / NXP Semiconductors
- evaluation_facility: Serma Technologies
- level: EAL5+
- mutual_recognition: SOG-IS CCRA
- protection_profile: PP JCS
- report_link: https://cyber.gouv.fr/sites/default/files/2015/09/ANSSI-CC-2015_15.pdf
- sponsor: Gemalto
- target_link: https://cyber.gouv.fr/sites/default/files/2015/09/anssi_cible_2015_15_LITE.pdf
- level: EAL5+
- product: Plateforme Java Card en configuration ouverte de la carte à puce MultiApp v3.1 masquée sur le composant P60D144PVA
- sponsor: Gemalto
- url: https://cyber.gouv.fr/produits-certifies/plateforme-java-card-en-configuration-ouverte-de-la-carte-puce-multiapp-v31-0
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
BSI-DSZ-CC-0926-2014 |
BSI-DSZ-CC-0845-V2-2013 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
BSI-DSZ-CC-0926-2014 |
BSI-DSZ-CC-0845-V2-2013 |
heuristics/verified_cpe_matches |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
ANSSI-CC-2015-73.pdf |
ANSSI-CC-2015_15.pdf |
pdf_data/report_frontpage |
- FR:
- cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 4
- cert_id: ANSSI-CC-2015/73
- cert_item: Plateforme Java Card MultiApp Essential v1.0, en configuration ouverte, sur le composant Infineon M7793 A12 ou G12
- cert_item_version: Version 1.0
- cert_lab: Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
- developer: Gemalto 6 rue de la Verrerie, 92190 Meudon Cedex, France Infineon Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92190 Meudon Cedex, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: Java Card System Protection Profile – Open Configuration [PP-JCS Open Configuration], version 3.0
|
- FR:
- cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 4
- cert_id: ANSSI-CC-2015/15
- cert_item: Plateforme Java Card en configuration ouverte de la carte à puce MultiApp v3.1 masquée sur le composant P60D144PVA
- cert_item_version: Version de la plateforme Java Card MultiApp : 3.1 Version du patch : 1.3
- cert_lab: Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
- developer: Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France NXP Semiconductors Box 54 02 40, D-22502 Hambourg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: ANSSI-CC-PP-2010/03-M01 [PP JCS] Java Card System – Open Configuration, version 3.0
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0845-V2-2013: 3
- FR:
- ANSSI-CC-2014/86: 2
- ANSSI-CC-2015/15: 22
- ANSSI-CC-PP-2010/03-M01: 2
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- ANSSI:
- ANSSI-CC-PP-2010/03-M01: 2
- BSI:
- BSI-PP-0035-: 1
- BSI-PP-0035-2007: 2
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 1
- EAL2: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 1
- EAL4: 2
- EAL6: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_FLR.1: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
- Gemalto:
- Infineon:
- Infineon: 25
- Infineon Technologies: 1
|
- Gemalto:
- NXP:
- NXP: 4
- NXP Semiconductors: 1
|
pdf_data/report_keywords/eval_facility |
- Serma:
- SERMA: 1
- Serma Technologies: 1
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
- com:
- com.gemalto.javacardx.pace: 1
- javacardx:
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: Jonathan Gimenez
- /CreationDate: D:20160106150825+01'00'
- /Creator: Microsoft® Word 2010
- /Keywords: ANSSI-CC-CER-F-07.017
- /ModDate: D:20160106150825+01'00'
- /Producer: Microsoft® Word 2010
- /Subject: Plateforme Java Card MultiApp Essential v1.0, en configuration ouverte, sur le composant Infineon M7793 A12 ou G12
- /Title: ANSSI-CC-2015/73
- pdf_file_size_bytes: 794770
- pdf_hyperlinks: mailto:[email protected], http://www.ssi.gouv.fr/
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
- /Author: Beatrice Duquesnoy
- /CreationDate: D:20150908144903+02'00'
- /Creator: Microsoft® Word 2010
- /Keywords: ANSSI-CC-CER-F-07.016
- /ModDate: D:20150908144903+02'00'
- /Producer: Microsoft® Word 2010
- /Subject: Plateforme Java Card en configuration ouverte de la carte à puce MultiApp v3.1 masquée sur le composant P60D144PVA
- /Title: ANSSI-CC-2015/15
- pdf_file_size_bytes: 731454
- pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 21
|
pdf_data/st_filename |
cible2015-73lite.pdf |
anssi_cible_2015_15_LITE.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
- DE:
- FR:
- ANSSI-CC-PP-2010/03-M01: 1
- NL:
|
- DE:
- BSI-DSZ-CC-0845-V2-2013: 2
- NL:
|
pdf_data/st_keywords/cc_protection_profile_id |
- ANSSI:
- ANSSI-CC-PP-2010/03-M01: 1
- BSI:
- BSI-CC-PP-0059-2009-MA-01: 1
- BSI-CC-PP-0071: 1
- BSI-CC-PP-0072: 1
- BSI-CC-PP-0075: 1
- BSI-CC-PP-0076: 1
- BSI-PP-0035: 1
- other:
- PP-SSCD-P2: 1
- PP-SSCD-P3: 1
- PP-SSCD-P4: 1
- PP-SSCD-P5: 1
- PP-SSCD-P6: 1
- PP-SSCD-T2: 1
- PP-SSCD-T3: 1
- PP-SSCD-T4: 1
- PP-SSCD-T5: 1
- PP-SSCD-T6: 1
|
- BSI:
- BSI-CC-PP-0055: 1
- BSI-CC-PP-0059-2009-MA-01: 1
- BSI-CC-PP-0075-2012: 1
- BSI-PP-0005: 1
- BSI-PP-0006: 1
- BSI-PP-0035: 1
- other:
- PP-SSCD-KG: 2
- PP-SSCD-KI: 2
- PP-SSCD-T2: 2
- PP-SSCD-T3: 2
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 5+: 1
- EAL5: 2
- EAL5 augmented: 2
- EAL5+: 1
|
- EAL:
- EAL 6+: 1
- EAL5: 6
- EAL5 augmented: 2
- EAL5+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_TDS: 1
- ALC:
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 10
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 2
- ADV_FSP.4: 2
- ADV_FSP.5: 6
- ADV_IMP: 1
- ADV_IMP.1: 9
- ADV_INT.2: 3
- ADV_TDS: 1
- ADV_TDS.1: 2
- ADV_TDS.3: 4
- ADV_TDS.4: 8
- AGD:
- AGD_OPE.1: 9
- AGD_PRE: 1
- AGD_PRE.1: 7
- ALC:
- ALC_CMC.4: 3
- ALC_CMS.5: 2
- ALC_DEL.1: 3
- ALC_DVS.1: 2
- ALC_DVS.2: 9
- ALC_LCD.1: 5
- ALC_TAT.1: 2
- ALC_TAT.2: 5
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 4
- ATE_DPT.1: 2
- ATE_DPT.3: 3
- ATE_FUN.1: 9
- ATE_IND.2: 4
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_ARP.1: 5
- FAU_ARP.1.1: 1
- FCO:
- FCS:
- FCS_CKM.1: 6
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.2.1: 1
- FCS_CKM.3: 2
- FCS_CKM.3.1: 1
- FCS_CKM.4: 2
- FCS_CKM.4.1: 1
- FCS_COP.1: 10
- FCS_COP.1.1: 1
- FCS_RND: 7
- FCS_RND.1: 7
- FCS_RND.1.1: 2
- FDP:
- FDP_ACC: 14
- FDP_ACC.1: 1
- FDP_ACC.2: 6
- FDP_ACF: 16
- FDP_ACF.1: 13
- FDP_IFC: 4
- FDP_IFC.1: 1
- FDP_IFC.2: 2
- FDP_IFF: 4
- FDP_IFF.1: 10
- FDP_ITC: 4
- FDP_ITC.2: 5
- FDP_RIP: 17
- FDP_RIP.1: 8
- FDP_ROL: 6
- FDP_ROL.1: 2
- FDP_SDI.2: 2
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UIT: 2
- FDP_UIT.1: 2
- FIA:
- FIA_ATD: 3
- FIA_ATD.1: 1
- FIA_SOS.2: 1
- FIA_UAI.1: 1
- FIA_UAU: 2
- FIA_UAU.1: 1
- FIA_UID: 4
- FIA_UID.1: 2
- FIA_UID.2: 1
- FIA_USB: 2
- FIA_USB.1: 3
- FMT:
- FMT_MSA: 21
- FMT_MSA.1: 5
- FMT_MSA.2: 1
- FMT_MSA.3: 10
- FMT_MTD: 3
- FMT_MTD.1: 2
- FMT_MTD.3: 1
- FMT_SMF: 6
- FMT_SMF.1: 3
- FMT_SMR: 9
- FMT_SMR.1: 8
- FPR:
- FPR_UNO: 2
- FPR_UNO.1: 3
- FPR_UNO.1.1: 1
- FPT:
- FPT_FLS: 10
- FPT_FLS.1: 5
- FPT_ITT: 2
- FPT_ITT.1: 1
- FPT_PHP: 2
- FPT_PHP.3: 1
- FPT_RCV: 4
- FPT_RCV.3: 4
- FPT_RCV.4: 1
- FPT_TDC.1: 2
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST: 2
- FPT_TST.1: 3
- FTP:
|
- FAU:
- FAU_ARP.1: 15
- FAU_ARP.1.1: 1
- FAU_SAA.1: 2
- FCO:
- FCS:
- FCS_CKM.1: 21
- FCS_CKM.1.1: 1
- FCS_CKM.2: 8
- FCS_CKM.2.1: 1
- FCS_CKM.3: 7
- FCS_CKM.3.1: 1
- FCS_CKM.4: 15
- FCS_CKM.4.1: 1
- FCS_COP.1: 19
- FCS_COP.1.1: 1
- FCS_RND: 7
- FCS_RND.1: 12
- FCS_RND.1.1: 2
- FCS_RNG.1: 1
- FDP:
- FDP_ACC: 40
- FDP_ACC.1: 13
- FDP_ACC.2: 6
- FDP_ACF: 33
- FDP_ACF.1: 16
- FDP_IFC: 24
- FDP_IFC.1: 12
- FDP_IFC.2: 2
- FDP_IFF: 17
- FDP_IFF.1: 12
- FDP_ITC: 12
- FDP_ITC.1: 4
- FDP_ITC.2: 9
- FDP_RIP: 85
- FDP_RIP.1: 10
- FDP_ROL: 14
- FDP_ROL.1: 2
- FDP_SDI.2: 9
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UIT: 7
- FDP_UIT.1: 2
- FIA:
- FIA_ATD: 9
- FIA_ATD.1: 2
- FIA_SOS.2: 1
- FIA_UAI.1: 1
- FIA_UAU: 7
- FIA_UAU.1: 1
- FIA_UID: 14
- FIA_UID.1: 10
- FIA_UID.2: 1
- FIA_USB: 8
- FIA_USB.1: 3
- FMT:
- FMT_MSA: 91
- FMT_MSA.1: 11
- FMT_MSA.2: 1
- FMT_MSA.3: 15
- FMT_MTD: 18
- FMT_MTD.1: 3
- FMT_MTD.3: 1
- FMT_SMF: 33
- FMT_SMF.1: 9
- FMT_SMR: 47
- FMT_SMR.1: 22
- FPR:
- FPR_UNO: 7
- FPR_UNO.1: 10
- FPR_UNO.1.1: 1
- FPT:
- FPT_FLS: 46
- FPT_FLS.1: 5
- FPT_ITT: 7
- FPT_ITT.1: 1
- FPT_PHP: 7
- FPT_PHP.3: 2
- FPT_RCV: 16
- FPT_RCV.3: 4
- FPT_RCV.4: 2
- FPT_TDC.1: 9
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST: 7
- FPT_TST.1: 3
- FTP:
- FTP_ITC: 9
- FTP_ITC.1: 5
- FTP_TRP.1: 2
|
pdf_data/st_keywords/cc_claims |
- A:
- A.APPLET: 4
- A.DELETION: 5
- A.VERIFICATION: 4
- D:
- D.API_DATA: 3
- D.APP_CODE: 6
- D.APP_C_DATA: 3
- D.APP_I_DATA: 4
- D.CRYPTO: 5
- D.JCS_CODE: 3
- D.JCS_DATA: 5
- D.PIN: 4
- D.SEC_DATA: 7
- O:
- O.ALARM: 11
- O.APPLET: 28
- O.CARD-MANAGEMENT: 2
- O.CARD_MANAGEMENT: 14
- O.CIPHER: 5
- O.CODE_PCKG: 16
- O.CODE_PKG: 7
- O.DELETION: 4
- O.FIREWALL: 11
- O.GLOBAL_ARRAYS_CONFID: 5
- O.GLOBAL_ARRAYS_INTEG: 4
- O.INSTALL: 7
- O.JAVAOBJECT: 56
- O.KEY-MNGT: 5
- O.KEY_MNGT: 1
- O.LOAD: 5
- O.NATIVE: 7
- O.OBJ-DELETION: 3
- O.OPERATE: 14
- O.PIN-: 1
- O.PIN-MNGT: 4
- O.REALLOCATION: 4
- O.RESOURCES: 5
- O.RND: 7
- O.SCP: 21
- O.SID: 9
- O.TRANSACTION: 5
- OE:
- OE.APPLET: 3
- OE.APPS-VALIDATION: 1
- OE.CODE-EVIDENCE: 10
- OE.VERIFICATION: 25
- OP:
- OP.ARRAY_ACCESS: 6
- OP.CREATE: 10
- OP.DELETE_APPLET: 6
- OP.DELETE_PCKG: 4
- OP.DELETE_PCKG_APPLET: 4
- OP.INSTANCE_FIELD: 6
- OP.INVK_INTERFACE: 10
- OP.INVK_VIRTUAL: 8
- OP.JAVA: 8
- OP.PUT: 7
- OP.THROW: 7
- OP.TYPE_ACCESS: 7
- OSP:
- OSP.RND: 3
- OSP.RNG: 1
- OSP.VERIFICATION: 4
- R:
- T:
- T.CONFID-APPLI-DATA: 4
- T.CONFID-JCS-CODE: 4
- T.CONFID-JCS-DATA: 4
- T.DELETION: 3
- T.EXE-CODE: 8
- T.INSTALL: 4
- T.INTEG-APPLI-CODE: 7
- T.INTEG-APPLI-DATA: 8
- T.INTEG-JCS-CODE: 3
- T.INTEG-JCS-DATA: 4
- T.NATIVE: 4
- T.OBJ-DELETION: 4
- T.PHYSICAL: 4
- T.RESOURCES: 3
- T.SID: 8
|
- A:
- A.APPLET: 5
- A.DELETION: 5
- A.VERIFICATION: 4
- D:
- D.API_DATA: 3
- D.APP_CODE: 6
- D.APP_C_DATA: 3
- D.APP_I_DATA: 4
- D.CRYPTO: 5
- D.JCS_CODE: 3
- D.JCS_DATA: 5
- D.PIN: 4
- D.SEC_DATA: 7
- O:
- O.ALARM: 15
- O.APPLET: 28
- O.CARD-MANAGEMENT: 3
- O.CARD_MANAGEMENT: 18
- O.CIPHER: 10
- O.CODE_PCKG: 16
- O.CODE_PKG: 7
- O.DELETION: 8
- O.FIREWALL: 12
- O.GLOBAL_ARRAYS_CO: 3
- O.GLOBAL_ARRAYS_CONFID: 6
- O.GLOBAL_ARRAYS_INT: 3
- O.GLOBAL_ARRAYS_INTEG: 5
- O.HW_AES: 2
- O.INSTALL: 11
- O.JAVAOBJECT: 56
- O.KEY-: 1
- O.KEY-MNGT: 5
- O.KEY_MNGT: 4
- O.LOAD: 6
- O.NATIVE: 11
- O.OBJ-DELETION: 4
- O.OPERATE: 15
- O.PIN-: 1
- O.PIN-MNGT: 5
- O.REALLOCATION: 5
- O.RESOURCES: 9
- O.RND: 13
- O.SCP: 36
- O.SID: 13
- O.TRANSACTION: 6
- OE:
- OE.APPLET: 4
- OE.CARD-MANAGEMENT: 1
- OE.CODE-EVIDENCE: 10
- OE.CODE_EVIDENCE: 1
- OE.SCP: 6
- OE.VERIFICATION: 25
- OP:
- OP.ARRAY_ACCESS: 6
- OP.CREATE: 10
- OP.DELETE_APPLET: 6
- OP.DELETE_PCKG: 4
- OP.DELETE_PCKG_APPLET: 4
- OP.INSTANCE_FIELD: 6
- OP.INVK_INTERFACE: 10
- OP.INVK_VIRTUAL: 8
- OP.JAVA: 8
- OP.PUT: 7
- OP.THROW: 7
- OP.TYPE_ACCESS: 7
- OSP:
- OSP: 1
- OSP.RND: 3
- OSP.RNG: 1
- OSP.VERIFICATION: 4
- R:
- T:
- T.CONFID-APPLI-DATA: 4
- T.CONFID-JCS-CODE: 4
- T.CONFID-JCS-DATA: 4
- T.DELETION: 3
- T.EXE-CODE: 8
- T.INSTALL: 4
- T.INTEG-APPLI-CODE: 7
- T.INTEG-APPLI-DATA: 8
- T.INTEG-JCS-CODE: 3
- T.INTEG-JCS-DATA: 4
- T.NATIVE: 4
- T.OBJ-DELETION: 4
- T.PHYSICAL: 4
- T.RESOURCES: 3
- T.SID: 8
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- TDEA: 1
- TDES: 9
- Triple-DES: 2
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-224: 3
- SHA-256: 3
- SHA224: 2
- SHA256: 1
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 3
- SHA-256: 4
- SHA-384: 4
- SHA-512: 3
- SHA224: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 3
- fault induction: 2
- malfunction: 2
- physical tampering: 1
- SCA:
- DPA: 1
- Leak-Inherent: 3
- physical probing: 2
|
- FI:
- Malfunction: 3
- fault induction: 2
- malfunction: 2
- physical tampering: 1
- SCA:
- DPA: 1
- Leak-Inherent: 3
- physical probing: 2
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- BSI:
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- FIPS:
- PKCS:
- PKCS#1: 8
- PKCS#3: 1
- PKCS#5: 3
- SCP:
- SCP01: 3
- SCP02: 3
- SCP03: 3
|
- BSI:
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- FIPS:
- ICAO:
- NIST:
- PKCS:
- PKCS#1: 8
- PKCS#3: 1
- PKCS#5: 5
- SCP:
- SCP01: 3
- SCP02: 3
- SCP03: 3
|
pdf_data/st_keywords/javacard_version |
- JavaCard:
- Java Card 2.2.2: 3
- Java Card 3.0.4: 7
- JavaCard 3.0: 1
|
- JavaCard:
- JC2.2.2: 1
- Java Card 2.2.2: 7
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
- out of scope: 1
|
- OutOfScope:
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
- out of scope: 1
|
pdf_data/st_metadata |
- /Author: Antoine de Lavernette
- /CreationDate: D:20151126145415+01'00'
- /Creator: Microsoft® Word 2013
- /Keywords: Security Target, CC
- /ModDate: D:20151126145415+01'00'
- /Producer: Microsoft® Word 2013
- /Subject: Security Target
- /Title: eTravel v1.0 Security Target MAÏA3
- pdf_file_size_bytes: 1708746
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 80
|
- /Author: Antoine de Lavernette
- /CreationDate: D:20150414141904+02'00'
- /Creator: Microsoft® Office Word 2007
- /Keywords: Security Target, CC
- /ModDate: D:20150414141904+02'00'
- /Producer: Microsoft® Office Word 2007
- /Subject: Security Target
- /Title: eTravel v1.0 Security Target MAÏA3
- pdf_file_size_bytes: 1611194
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 93
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |