name |
Carte Mobile PayPass 1.0 sur plateforme UpTeq NFC2.0.4_OFM sur composant ST33F1ME (S1109398/T1020364, version B)
|
Application IAS V4.2.0.B sur la plateforme JavaCard ouverte MultiApp V3.1 masquée sur le composant P60D144PVA (Version du patch : 1.3)
|
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
not_valid_before |
2013-05-29
|
2016-02-09
|
not_valid_after |
2019-09-01
|
2021-02-09
|
scheme |
FR
|
FR
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2013-27en.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi_cible_2016_04_LITE.pdf
|
status |
archived
|
archived
|
manufacturer |
Gemalto / STMicroelectronics
|
Gemalto / NXP Semiconductors
|
manufacturer_web |
https://www.gemalto.com/
|
https://www.gemalto.com/
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2013-27fr.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2016_04.pdf
|
cert_link |
None
|
None
|
protection_profiles |
|
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 5: Extension for device with key gene...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0072b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Version...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 3: Device with key import', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0075b_pdf.pdf', 'pp_ids': frozenset({'PP_SSCD_PART3_V1.0.2'})}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 6: Extension for device with key impo...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0076b_pdf.pdf', 'pp_ids': None}) |
maintenance_updates |
|
frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2016, 5, 20), 'maintenance_title': 'ANSSI-CC-2015/37-M01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_37-M01.pdf', 'maintenance_st_link': None}) |
state/cert |
- _type:
sec_certs.sample.cc.CCCertificate.DocumentState
- download_ok:
False
- convert_garbage:
False
- convert_ok:
False
- extract_ok:
False
- pdf_hash:
None
- txt_hash:
None
|
- _type:
sec_certs.sample.cc.CCCertificate.DocumentState
- download_ok:
False
- convert_garbage:
False
- convert_ok:
False
- extract_ok:
False
- pdf_hash:
None
- txt_hash:
None
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
3635a2cbfbda4759b76efacbb3efa3157b274501cb49f612bd997109725e2cec
|
000909a24e93458358f2804019359481c8e5a87faab4e47f71de1eaf26dfb705
|
state/report/txt_hash |
4277564f297e7f9dc87ce67eabb7e71f593e42143022e000e7371578e240df67
|
59f9104bb5838746174671ce6aeb693c5cf400819f6ccd8cc5c1dce0e939c8e5
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
ffe490e77bd7e32057cbf2ccefc42b63c78cbae005d679857f782bed78eca438
|
203c2ce4c96e3b711a9bf18531fa6925c945f7a55c7c0f314f0c74be655984a3
|
state/st/txt_hash |
106006f20d104bc8ad69f1e8078d14c6e1f35ee0512ced928afae27170c46b1e
|
e534e87f2135bbf4c026738d8834088cd82c32d81bb30b4ee9c0c0f167d7843b
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
ANSSI-CC-2013/27
|
ANSSI-CC-2016/04
|
heuristics/cert_lab |
THALES
|
SERMA
|
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_versions |
2.0.4, 1.0 |
4.2.0, 3.1, 1.3 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references/directly_referenced_by |
ANSSI-CC-2014/83 |
None
|
heuristics/report_references/directly_referencing |
ANSSI-CC-2013/28, ANSSI-CC-2012/49 |
ANSSI-CC-2015/37, ANSSI-CC-2015/15, BSI-DSZ-CC-0845-V2-2013 |
heuristics/report_references/indirectly_referenced_by |
ANSSI-CC-2014/83, ANSSI-CC-2014/96 |
None
|
heuristics/report_references/indirectly_referencing |
ANSSI-CC-2011/07, ANSSI-CC-2010/49, ANSSI-CC-2010/50, ANSSI-CC-2011/17, ANSSI-CC-2013/28, ANSSI-CC-2012/48, ANSSI-CC-2011/77, ANSSI-CC-2012/49, ANSSI-CC-2012/11 |
BSI-DSZ-CC-0837-2013, ANSSI-CC-2015/37, ANSSI-CC-2015/15, BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0666-2012, BSI-DSZ-CC-0837-V2-2014, ANSSI-CC-2015/08, BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0845-2012, ANSSI-CC-2014/06, ANSSI-CC-2014/86, ANSSI-CC-2014/14, BSI-DSZ-CC-0845-V2-2013 |
heuristics/scheme_data/cert_id |
2012/75
|
2016/04
|
heuristics/scheme_data/description |
Le produit certifié est la « Carte M-NFC2.0.3_TUR sur composant ST33F1ME, référence T1019850, Release A » développée par Gemalto et STMicroelectronics.
La cible d'évaluation correspond à la plateforme (U)SIM1 Java Card ouverte embarquée dans cette carte (U)SIM destinée à être insérée dans un téléphone portable ou tout autre équipement téléphonique.
Ce produit permet d'accueillir des app
|
Le produit certifié est la carte à puce ouverte « MultiApp V3.1 » pouvant être en mode contact ou sans-contact. Le produit est développé par la société GEMALTO et embarqué sur le microcontrôleur P60D144PVA fabriqué par la société NXP SEMICONDUCTORS.
La cible d’évaluation est composée :
de l’applet IAS Classic V4.2.0.B, qui permet à l’utilisateur de signer électroniquement des données ;
de
|
heuristics/scheme_data/developer |
Gemalto, STMicroelectronics
|
Gemalto / NXP Semiconductors
|
heuristics/scheme_data/enhanced/augmented |
ALC_DVS.2, AVA_VAN.5
|
ALC_DVS.2, AVA_VAN.5
|
heuristics/scheme_data/enhanced/category |
Cartes à puce
|
Cartes à puce
|
heuristics/scheme_data/enhanced/cc_version |
Critères Communs version 3.1r3
|
Critères Communs version 3.1r4
|
heuristics/scheme_data/enhanced/cert_id |
2012/75
|
2016/04
|
heuristics/scheme_data/enhanced/certification_date |
22/10/2012
|
09/02/2016
|
heuristics/scheme_data/enhanced/developer |
Gemalto, STMicroelectronics
|
Gemalto / NXP Semiconductors
|
heuristics/scheme_data/enhanced/evaluation_facility |
THALES - CEACI (T3S - CNES)
|
Serma Technologies
|
heuristics/scheme_data/enhanced/level |
EAL4+
|
EAL5+
|
heuristics/scheme_data/enhanced/mutual_recognition |
SOG-IS
CCRA
|
SOG-IS
CCRA
|
heuristics/scheme_data/enhanced/protection_profile |
PP JCS-O
|
PP-SSCD-Part2, PP-SSCD-Part3, PP-SSCD-Part4, PP-SSCD-Part5, PP-SSCD-Part6
|
heuristics/scheme_data/enhanced/report_link |
https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2012-75fr.pdf
|
https://cyber.gouv.fr/sites/default/files/2016/02/ANSSI-CC-2016_04.pdf
|
heuristics/scheme_data/enhanced/sponsor |
Gemalto
|
Gemalto
|
heuristics/scheme_data/enhanced/target_link |
https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2012-75en.pdf
|
https://cyber.gouv.fr/sites/default/files/2016/02/anssi_cible_2016_04_LITE.pdf
|
heuristics/scheme_data/level |
EAL4+
|
EAL5+
|
heuristics/scheme_data/product |
Plateforme M-NFC2.0.3_TUR sur composant ST33F1ME
|
Application IAS V4.2.0.B sur la plateforme JavaCard ouverte MultiApp V3.1 masquée sur le composant P60D144PVA
|
heuristics/scheme_data/sponsor |
Gemalto
|
Gemalto
|
heuristics/scheme_data/url |
https://cyber.gouv.fr/produits-certifies/plateforme-m-nfc203tur-sur-composant-st33f1me
|
https://cyber.gouv.fr/produits-certifies/application-ias-v420b-sur-la-plateforme-javacard-ouverte-multiapp-v31-masquee-1
|
heuristics/st_references/directly_referenced_by |
None
|
None
|
heuristics/st_references/directly_referencing |
None
|
BSI-DSZ-CC-0845-V2-2013 |
heuristics/st_references/indirectly_referenced_by |
None
|
None
|
heuristics/st_references/indirectly_referencing |
None
|
BSI-DSZ-CC-0845-V2-2013 |
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
None
|
None
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords |
None
|
None
|
pdf_data/cert_metadata |
None
|
None
|
pdf_data/report_filename |
ANSSI-CC_2013-27fr.pdf
|
ANSSI-CC-2016_04.pdf
|
pdf_data/report_frontpage/FR/cc_security_level |
EAL 4 augmenté ALC_DVS.2, AVA_VAN.5
|
EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
|
pdf_data/report_frontpage/FR/cc_version |
Critères Communs version 3.1 révision 3
|
Critères Communs version 3.1 révision 4
|
pdf_data/report_frontpage/FR/cert_id |
ANSSI-CC-2013/27
|
ANSSI-CC-2016/04
|
pdf_data/report_frontpage/FR/cert_item |
Carte Mobile PayPass 1.0 sur plateforme UpTeq NFC2.0.4_OFM sur composant ST33F1ME (S1109398/T1020364, version B
|
Application IAS V4.2.0.B sur la plateforme JavaCard ouverte MultiApp V3.1 masquée sur le composant P60D144PVA
|
pdf_data/report_frontpage/FR/cert_item_version |
Application Mobile PayPass 1.0 (S1109398, release A) sur plateforme UpTeq NFC2.0.4_OFM sur composant ST33F1ME
|
Version de l’application IAS : 4.2.0.B Version de l’application MOCA Server : 1.0 Version de la plateforme Java Card MultiApp : 3.1 Version du patch : 1.3
|
pdf_data/report_frontpage/FR/cert_lab |
THALES (TCS – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France
|
Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
|
pdf_data/report_frontpage/FR/developer |
Gemalto La Vigie, Av du Jujubier, ZI Athelia IV, 13705 La Ciotat Cedex, France STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, B.P. 2, 13106 Rousset, France Commanditaire Gemalto La Vigie, Av du Jujubier, ZI Athelia IV, 13705 La Ciotat Cedex, France
|
Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France NXP Semiconductors Box 54 02 40, D-22502 Hambourg, Allemagne Rapport de certification ANSSI-CC-2016/04 Application IAS V4.2.0.B sur la plateforme JavaCard ouverte MultiApp V3.1 masquée sur le composant P60D144PVA Page 4 sur 22 ANSSI-CC-CER-F-07.017 Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France
|
pdf_data/report_frontpage/FR/match_rules |
Référence du rapport de certification(.+)Nom du produit \(référence/version\)(.+)Nom de la TOE \(référence/version\)(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables
|
Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables
|
pdf_data/report_frontpage/FR/ref_protection_profiles |
néant
|
Protection profiles for secure signature creation device – Part 2 : Device with key generation, version 2.0.1, maintenu sous la référence [PP-SSCD-Part2]. Protection profiles for secure signature creation device – Part 3 : Device with key import, version 1.0.2, certifié sous la référence [PP-SSCD-Part3]. Protection profiles for secure signature creation device – Part 4: Extension for device with key generation and trusted communication with certificate generation application, Version 1.0.1, certifié sous la référence [PP-SSCD-Part4]. Protection profiles for secure signature creation device – Part 5: Extension for device with key generation and trusted communication with signature creation application, Version 1.0.1, certifié sous la référence [PP-SSCD-Part5]. Protection profiles for secure signature creation device – Part 6: Extension for device with key import and trusted communication with signature creation application, Version 1.0.4, certifié sous la référence [PP-SSCD-Part6
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id |
- FR:
- ANSSI-CC-2013/27:
20
- ANSSI-CC-2013/28:
4
- ANSSI-CC-2012/49:
1
|
- DE:
- BSI-DSZ-CC-0845-V2-2013:
2
- FR:
- ANSSI-CC-2016/04:
23
- ANSSI-CC-2015/15:
3
- ANSSI-CC-2015/37:
1
|
pdf_data/report_keywords/cc_cert_id/FR |
- ANSSI-CC-2013/27:
20
- ANSSI-CC-2013/28:
4
- ANSSI-CC-2012/49:
1
|
- ANSSI-CC-2016/04:
23
- ANSSI-CC-2015/15:
3
- ANSSI-CC-2015/37:
1
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0059-2009-MA-01:
1
- BSI-CC-PP- 0075-2012:
1
- BSI-CC-PP- 0071-2012:
1
- BSI-CC-PP- 0072-2012:
1
- BSI-CC-PP-0076-:
1
- other:
- PP-SSCD-Part2:
2
- PP-SSCD-Part3:
2
- PP-SSCD-Part4:
2
- PP-SSCD-Part5:
2
- PP-SSCD-Part6:
2
- PP-SSCD-:
5
|
pdf_data/report_keywords/cc_sar/ADV |
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_TDS:
1
|
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS:
1
|
pdf_data/report_keywords/cc_sar/ADV/ADV_ARC |
1
|
1
|
pdf_data/report_keywords/cc_sar/ADV/ADV_FSP |
1
|
1
|
pdf_data/report_keywords/cc_sar/ADV/ADV_IMP |
1
|
1
|
pdf_data/report_keywords/cc_sar/ADV/ADV_TDS |
1
|
1
|
pdf_data/report_keywords/cc_sar/AGD |
|
|
pdf_data/report_keywords/cc_sar/ALC |
- ALC_DVS.2:
3
- ALC_FLR:
2
- ALC_CMC:
1
- ALC_CMS:
1
- ALC_DEL:
1
- ALC_DVS:
1
- ALC_TAT:
1
|
- ALC_DVS.2:
3
- ALC_FLR:
2
- ALC_CMC:
1
- ALC_CMS:
1
- ALC_DEL:
1
- ALC_DVS:
1
- ALC_TAT:
1
|
pdf_data/report_keywords/cc_sar/ASE |
- ASE_CCL:
1
- ASE_ECD:
1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_REQ:
1
- ASE_SPD:
1
- ASE_TSS:
1
|
- ASE_CCL:
1
- ASE_ECD:
1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_REQ:
1
- ASE_SPD:
1
- ASE_TSS:
1
|
pdf_data/report_keywords/cc_sar/ATE |
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
|
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
|
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN |
2
|
2
|
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN.5 |
3
|
6
|
pdf_data/report_keywords/cc_security_level/EAL |
- EAL 4: 1
- EAL4:
4
- EAL7:
1
- EAL 1:
1
- EAL 3:
1
- EAL 5:
1
- EAL 7:
1
|
- EAL 5:
2
- EAL4:
2
- EAL5: 2
- EAL7:
1
- EAL 1:
1
- EAL 3:
1
- EAL 7:
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 1 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 3 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 |
1
|
2
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 7 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL4 |
4
|
2
|
pdf_data/report_keywords/cc_security_level/EAL/EAL7 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/ITSEC |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/eval_facility/CESTI |
|
|
pdf_data/report_keywords/hash_function/SHA |
|
|
pdf_data/report_keywords/hash_function/SHA/SHA1 |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
- javacardx:
- com:
- com.gemalto.javacardx.pace:
1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2009-07-001:
1
- CCMB-2009-07-002:
1
- CCMB-2009-07-003:
1
- CCMB-2009-07-004:
1
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor |
- STMicroelectronics:
- Gemalto:
- Morpho:
|
- NXP:
- NXP Semiconductors:
1
- NXP:
3
- Gemalto:
|
pdf_data/report_keywords/vendor/Gemalto/Gemalto |
5
|
9
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata |
- pdf_file_size_bytes:
261922
- pdf_is_encrypted:
False
- pdf_number_of_pages:
19
- /CreationDate:
- /CreationDate--Text:
- /Creator:
PDFCreator Version 1.2.1
- /Keywords:
- /ModDate:
- /ModDate--Text:
- /Producer:
GPL Ghostscript 9.02
- /Subject:
- /Title:
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
1916006
- pdf_is_encrypted:
False
- pdf_number_of_pages:
22
- /Producer:
GPL Ghostscript 9.02
- /CreationDate:
- /ModDate:
- /Title:
ANSSI-CC-2016_04
- /Creator:
PDFCreator Version 1.2.1
- /Author:
- /Keywords:
- /Subject:
- pdf_hyperlinks:
|
pdf_data/report_metadata//CreationDate |
|
|
pdf_data/report_metadata//Creator |
PDFCreator Version 1.2.1
|
PDFCreator Version 1.2.1
|
pdf_data/report_metadata//Keywords |
|
|
pdf_data/report_metadata//ModDate |
|
|
pdf_data/report_metadata//Producer |
GPL Ghostscript 9.02
|
GPL Ghostscript 9.02
|
pdf_data/report_metadata//Subject |
|
|
pdf_data/report_metadata//Title |
|
ANSSI-CC-2016_04
|
pdf_data/report_metadata/pdf_file_size_bytes |
261922
|
1916006
|
pdf_data/report_metadata/pdf_hyperlinks |
|
|
pdf_data/report_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/report_metadata/pdf_number_of_pages |
19
|
22
|
pdf_data/st_filename |
ANSSI-CC-cible_2013-27en.pdf
|
anssi_cible_2016_04_LITE.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0845-V2-2013:
2
- NL:
|
pdf_data/st_keywords/cc_claims |
- O:
- O.CARD-MANAGEMENT:
1
- O.DOMAIN-RIGHTS:
1
- O.APPLI-AUTH:
2
- O.GUIS_AUTH:
15
- O.COMM-INTEGRITY:
1
- O.DATA_INTEGRITY:
63
- O.DATA_DISCLOSURE:
46
- O.SID:
1
- O.FIREWALL:
1
- O.GLOBAL-ARRAYS-CONFID:
1
- O.GLOBAL-ARRAYS-INTEG:
1
- O.NATIVE:
1
- O.OPERATE:
1
- O.REALLOCATION:
1
- O.RESSOURCES:
1
- O.ALARM:
1
- O.CIPHER:
1
- O.KEY-MNGT:
1
- O.PIN-MNGT:
1
- O.REMOTE:
1
- O.TRANSACTION:
1
- O.OBJ-DELETION:
1
- O.DELETION:
1
- O.LOAD:
1
- O.INSTALL:
1
- O.SCP:
2
- O.RNG:
1
- O.REMOTE_SERVICE_AUDIT:
1
- O.REMOTE_SERVICE_ACTIVCATION:
1
- O.TRANSACTION_UNIQUENESS:
36
- O.TRANSACTION_INTEGRITY:
38
- O.TRANSACTION_BYPASS:
53
- O.TRANSACTION_REPLAY:
11
- O.USER_AUTH:
53
- O.ISSUING_BANK_AUTH:
54
- O.MNO_AUTH:
8
- O.COMM_AUTH:
3
- O.AUTHORISATION_CONTROL:
20
- O.DATA_USERS:
12
- O.RISK_MNGT:
20
- O.APP_BLOCK:
15
- O.SIM_UNLOCK:
10
- O.AUDIT:
14
- O.CHANNELS:
9
- O.AUDIT_ACCESS:
10
- O.APPLI_AUTH:
1
- O.COMM-:
1
- O.COMM-AUTH:
1
- T:
- T.PHYSICAL:
1
- T.DISCLOSURE:
4
- T.INTEG:
7
- T.COM-EXPLOIT:
1
- T.UNAUTHORIZED_CARD_MNGT:
1
- T.TRANSACTION:
1
- T.LIFE-CYCLE:
1
- T.UNAUTHORIZED_ACCESS:
1
- T.CONFID-APPLI-DATA:
1
- T.CONFID-JCS-DATA:
1
- T.INTEG-APPLI-CODE:
2
- T.INTEG-APPLI-DATA:
2
- T.INTEG-JCS-CODE:
1
- T.INTEG-JCS-DATA:
1
- T.INTEG_SEL_ACT_PARAM:
12
- T.INTEG_KEYS:
8
- T.EXE-CODE:
1
- T.EXE-CODE-REMOTE:
1
- T.NATIVE:
1
- T.RESOURCES:
1
- T.DELETION:
1
- T.UNAUTHORIZED_ACCESS_TO_SERVICE:
1
- T.DISCLOSURE_KEYS:
6
- T.DISCLOSURE_REF_PC:
6
- T.INTEG_LOG_FILE:
6
- T.INTEG_ACCOUNT_INFO:
7
- T.INTEG_REF_PC:
6
- T.INTEG_TRANS_PARAM:
8
- T.INTEG_COUNT:
7
- T.TEMPORARY_DATA:
8
- T.STEALING:
9
- T.MERCHANT_ACCOMPLICE:
9
- T.MAN-IN-THE-MIDDLE:
11
- T.TRANSACTION_REPUDIATION:
7
- T.TRANSACTION_COUNTERFEITING:
12
- T.TRANSACTION_REPLAY:
8
- T.CERTIF_CORRUPTION:
5
- T.APPLICATIONS_DOS:
6
- T.MNO_USURPATION:
5
- T.ISSUING-BANK_USURPATION:
3
- T.CUSTOMER_USURPATION:
7
- T.ISSUING-:
2
- A:
- A.MOBILE-OPERATOR:
1
- A.OTA-ADMIN:
1
- A.APPS-PROVIDER:
1
- A.VERIFICATION-AUTHORITY:
1
- A.CONTROLLING-AUTHORITY:
1
- A.APPLET:
1
- A.VERIFICATION:
1
- A.MERCHANT_AUTH:
5
- OE:
- OE.MOBILE-OPERATOR:
1
- OE.OTA-ADMIN:
1
- OE.APPS-PROVIDER:
1
- OE.VERIFICATION-AUTHORITY:
1
- OE.CONTROLLING-AUTHORITY:
1
- OE.SECURE-APPS-CERTIFICATION:
1
- OE.BASIC-APPS-VALIDATION:
1
- OE.SHARE-CONTROL:
1
- OE.AID-MANAGEMENT:
1
- OE.OTA-LOADING:
1
- OE.OTA-SERVERS:
1
- OE.AP-KEYS:
1
- OE.OPERATOR-KEYS:
1
- OE.KEY-GENERATION:
1
- OE.CA-KEYS:
1
- OE.VA-KEYS:
1
- OE.KEY-CHANGE:
1
- OE.SECURITY-DOMAINS:
1
- OE.QUOTAS:
1
- OE.PRODUCTION:
1
- OE.PERSONALIZER:
1
- OE.KEY-ESCROW:
1
- OE.APPLET:
1
- OE.VERIFICATION:
1
- OE.TRUSTED-APPS-DEVELOPER:
1
- OE.TRUSTED-APPS-PRE-ISSUANCE-LOADING:
1
- OE.ACTIVATION-KEY-ESCROW:
1
- OE.CUSTOMER_PC_CONFID:
8
- OE.GUI_INST_ALERT:
7
- OE.TOE_USAGE:
9
- OE.GUIS_IDENTIFICATION:
5
- OE.POLICY:
5
- OE.NFC_PROTOCOL:
5
- OE.TRANSACTION_DISPLAY:
5
- OE.CHANNELS_SELECTION:
3
- OE.GUIS_TIMEOUT:
4
- OE.MERCHANT_CONTROL:
7
- OE.MERCHANT_AUTH:
8
- OE.LATENCY_CONTROL:
5
- OE.POS_APPROVAL:
7
- OE.POS_APPLICATIONS:
10
- OE.POS_DEACTIVATION:
6
- OE.CERTIFICATES_MNGT:
10
- OE.NO_VAD:
6
- OE.BANKS_PRIVILEGES:
4
- OSP:
- OSP:
2
- OSP.SECURE-APPS-CERTIFICATION:
1
- OSP.BASIC-APPS-VALIDATION:
1
- OSP.SHARE-CONTROL:
1
- OSP.AID-MANAGEMENT:
1
- OSP.OTA-LOADING:
1
- OSP.OTA-SERVERS:
1
- OSP.APSD-KEYS:
1
- OSP.OPERATOR-KEYS:
1
- OSP.KEY-GENERATION:
1
- OSP.CASD-KEYS:
1
- OSP.VASD-KEYS:
1
- OSP.KEY-CHANGE:
1
- OSP.SECURITY-DOMAINS:
1
- OSP.QUOTAS:
1
- OSP.PRODUCTION:
1
- OSP.PERSONALIZER:
1
- OSP.KEY-ESCROW:
1
- OSP.VERIFICATION:
1
- OSP.RND:
1
- OSP.TRUSTED-APPS-DEVELOPER:
1
- OSP.TRUSTED-APPS-PRE-ISSUANCE-LOADING:
1
- OSP.SERVICE_AUDIT:
1
- OSP.ACTIVATION-KEY-ESCROW:
1
- OSP.POLICY:
4
- OSP.CUSTOMER_PC_CONFID:
4
- OSP.GUIS_IDENTIFICATION:
4
- OSP.CERTIFICATES_MNGT:
4
- OSP.TOE_USAGE:
4
- OSP.PISHING:
4
- OSP.MERCHANT_CONTROL:
6
- OSP.BANKS_PRIVILEGES:
4
|
- A:
- A.CGA:
4
- A.SCA:
4
- A.CSP:
5
- OE:
- OE.HI_VAD:
2
- OE.HID_VAD:
2
|
pdf_data/st_keywords/cc_claims/A |
- A.MOBILE-OPERATOR:
1
- A.OTA-ADMIN:
1
- A.APPS-PROVIDER:
1
- A.VERIFICATION-AUTHORITY:
1
- A.CONTROLLING-AUTHORITY:
1
- A.APPLET:
1
- A.VERIFICATION:
1
- A.MERCHANT_AUTH:
5
|
- A.CGA:
4
- A.SCA:
4
- A.CSP:
5
|
pdf_data/st_keywords/cc_claims/OE |
- OE.MOBILE-OPERATOR:
1
- OE.OTA-ADMIN:
1
- OE.APPS-PROVIDER:
1
- OE.VERIFICATION-AUTHORITY:
1
- OE.CONTROLLING-AUTHORITY:
1
- OE.SECURE-APPS-CERTIFICATION:
1
- OE.BASIC-APPS-VALIDATION:
1
- OE.SHARE-CONTROL:
1
- OE.AID-MANAGEMENT:
1
- OE.OTA-LOADING:
1
- OE.OTA-SERVERS:
1
- OE.AP-KEYS:
1
- OE.OPERATOR-KEYS:
1
- OE.KEY-GENERATION:
1
- OE.CA-KEYS:
1
- OE.VA-KEYS:
1
- OE.KEY-CHANGE:
1
- OE.SECURITY-DOMAINS:
1
- OE.QUOTAS:
1
- OE.PRODUCTION:
1
- OE.PERSONALIZER:
1
- OE.KEY-ESCROW:
1
- OE.APPLET:
1
- OE.VERIFICATION:
1
- OE.TRUSTED-APPS-DEVELOPER:
1
- OE.TRUSTED-APPS-PRE-ISSUANCE-LOADING:
1
- OE.ACTIVATION-KEY-ESCROW:
1
- OE.CUSTOMER_PC_CONFID:
8
- OE.GUI_INST_ALERT:
7
- OE.TOE_USAGE:
9
- OE.GUIS_IDENTIFICATION:
5
- OE.POLICY:
5
- OE.NFC_PROTOCOL:
5
- OE.TRANSACTION_DISPLAY:
5
- OE.CHANNELS_SELECTION:
3
- OE.GUIS_TIMEOUT:
4
- OE.MERCHANT_CONTROL:
7
- OE.MERCHANT_AUTH:
8
- OE.LATENCY_CONTROL:
5
- OE.POS_APPROVAL:
7
- OE.POS_APPLICATIONS:
10
- OE.POS_DEACTIVATION:
6
- OE.CERTIFICATES_MNGT:
10
- OE.NO_VAD:
6
- OE.BANKS_PRIVILEGES:
4
|
- OE.HI_VAD:
2
- OE.HID_VAD:
2
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP-0035:
1
- BSI-CC-PP-0059-2009-MA-01:
1
- BSI-CC-PP-0075-2012:
1
- BSI-CC-PP-0071-2012:
1
- BSI-CC-PP-0072-2012:
1
- BSI-CC-PP-0076-2013:
1
- other:
- PP-SSCD-KG:
38
- PP-SSCD-KI:
29
- PP-SSCD:
4
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1:
5
- ADV_FSP.4:
9
- ADV_IMP.1:
4
- ADV_TDS.3:
8
- ADV_FSP.1:
3
- ADV_TDS.1:
2
- ADV_FSP.2:
2
- ADV_TDS.2:
1
- ADV_IMP:
1
- AGD:
- AGD_OPE.1:
5
- AGD_PRE.1:
5
- ALC:
- ALC_DVS.2:
6
- ALC_TAT.1:
3
- ALC_CMC.4:
1
- ALC_CMS.1:
1
- ALC_DVS.1:
1
- ALC_LCD.1:
3
- ALC_CMS.4:
1
- ALC_DEL.1:
1
- ATE:
- ATE_DPT.1:
2
- ATE_COV.2:
3
- ATE_FUN.1:
6
- ATE_COV.1:
2
- AVA:
- ASE:
- ASE_COMP.1:
1
- ASE_CCL.1:
1
- ASE_ECD.1:
4
- ASE_INT.1:
5
- ASE_REQ.1:
2
- ASE_REQ.2:
2
- ASE_OBJ.2:
3
- ASE_SPD.1:
2
- ASE_TSS.1:
1
|
|
pdf_data/st_keywords/cc_sar/ALC |
- ALC_DVS.2:
6
- ALC_TAT.1: 3
- ALC_CMC.4: 1
- ALC_CMS.1: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 3
- ALC_CMS.4: 1
- ALC_DEL.1: 1
|
|
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 |
6
|
3
|
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.5 |
5
|
3
|
pdf_data/st_keywords/cc_security_level/EAL |
- EAL4:
3
- EAL4+:
2
- EAL 4:
1
- EAL4 augmented:
2
|
- EAL 5+:
1
- EAL5:
3
- EAL5 augmented:
1
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_ARP.1:
8
- FAU_ARP.1.1:
1
- FAU_SAA.1:
9
- FAU_SAA.1.1:
1
- FAU_SAA.1.2:
2
- FAU_GEN.1:
12
- FAU_GEN.1.1:
1
- FAU_GEN.1.2:
1
- FAU_SAR:
13
- FAU_SAR.1:
4
- FCO:
- FCS:
- FCS_COP:
58
- FCS_CKM:
25
- FCS_CKM.4:
13
- FCS_RND.1:
1
- FCS_CKM.1:
7
- FCS_COP.1:
6
- FCS_CKM.2:
1
- FDP:
- FDP_ITC:
30
- FDP_ROL:
2
- FDP_UIT:
2
- FDP_ACC:
150
- FDP_ACF:
135
- FDP_IFC:
81
- FDP_IFF:
66
- FDP_RIP:
8
- FDP_SDI.2:
5
- FDP_SDI:
1
- FDP_ACC.2:
14
- FDP_ACF.1:
35
- FDP_ACF.1.2:
7
- FDP_ACF.1.3:
1
- FDP_IFC.2:
8
- FDP_IFF.1:
24
- FDP_IFF.1.2:
4
- FDP_SDI.2.1:
1
- FDP_SDI.2.2:
1
- FDP_RIP.1:
7
- FDP_RIP.1.1:
1
- FDP_DAU.1:
6
- FDP_DAU.1.1:
1
- FDP_DAU.1.2:
1
- FDP_ITC.2:
16
- FDP_ETC.1:
15
- FDP_ETC.1.1:
1
- FDP_ETC.1.2:
1
- FDP_ITC.1:
25
- FDP_ITC.1.1:
1
- FDP_ITC.1.2:
1
- FDP_ITC.1.3:
1
- FDP_UIT.1:
13
- FDP_UIT.1.1:
1
- FDP_UIT.1.2:
1
- FDP_ACC.1:
14
- FDP_IFC.1:
11
- FIA:
- FIA_UID:
27
- FIA_UAU:
44
- FIA_ATD:
1
- FIA_USB:
1
- FIA_SOS.2:
8
- FIA_AFL:
18
- FIA_AFL.1:
6
- FIA_ATD.1:
9
- FIA_ATD.1.1:
1
- FIA_UAU.1:
8
- FIA_UAU.3:
7
- FIA_UAU.3.1:
1
- FIA_UAU.3.2:
1
- FIA_UAU.4:
9
- FIA_UAU.4.1:
1
- FIA_UAU.6:
1
- FIA_UID.1:
10
- FIA_USB.1:
7
- FIA_USB.1.1:
1
- FIA_USB.1.2:
1
- FIA_USB.1.3:
1
- FIA_SOS.2.1:
1
- FIA_SOS.2.2:
1
- FIA_SOS:
1
- FMT:
- FMT_MSA:
25
- FMT_SMF:
14
- FMT_SMR:
6
- FMT_SMF.1:
5
- FMT_SMR.1:
20
- FMT_MTD:
7
- FMT_REV:
1
- FMT_MOF:
8
- FMT_MOF.1:
1
- FMT_MTD.1:
1
- FMT_MSA.1:
3
- FMT_MSA.2:
4
- FMT_MSA.2.1:
1
- FMT_MSA.3:
30
- FMT_MSA.3.1:
1
- FMT_MSA.3.2:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FPR:
- FPR_UNO.1:
5
- FPR_UNO:
1
- FPR_UNO.1.1:
1
- FPT:
- FPT_FLS:
6
- FPT_TDC.1:
18
- FPT_RCV:
3
- FPT_ITT:
2
- FPT_TST.1:
6
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FPT_RPL.1:
4
- FPT_RPL.1.1:
1
- FPT_RPL.1.2:
1
- FPT_TDC.1.1:
1
- FPT_TDC.1.2:
1
- FPT_RPL:
1
- FPT_STM.1:
3
- FTP:
- FTP_ITC:
2
- FTP_ITC.1:
10
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
- FTP_TRP.1:
3
|
- FCS:
- FCS_CKM:
39
- FCS_CKM.4:
13
- FCS_COP:
19
- FCS_CKM.2:
4
- FCS_COP.1:
7
- FCS_CKM.1.1:
2
- FCS_CKM.1:
15
- FCS_CKM.4.1:
2
- FCS_COP.1.1:
2
- FDP:
- FDP_DAU:
9
- FDP_UIT:
9
- FDP_ITC.1:
9
- FDP_ITC.2:
8
- FDP_ACC:
44
- FDP_ACF.1:
11
- FDP_ACC.1.1:
4
- FDP_ACF:
31
- FDP_ACC.1:
28
- FDP_ACF.1.1:
4
- FDP_ACF.1.2:
4
- FDP_ACF.1.3:
4
- FDP_ACF.1.4:
4
- FDP_DAU.1:
1
- FDP_DAU.2.1:
1
- FDP_DAU.2.2:
1
- FDP_ITC:
10
- FDP_IFC.1:
18
- FDP_ITC.1.1:
1
- FDP_ITC.1.2:
1
- FDP_ITC.1.3:
1
- FDP_RIP.1:
8
- FDP_RIP.1.1:
1
- FDP_SDI:
17
- FDP_SDI.1:
2
- FDP_SDI.2.1:
2
- FDP_SDI.2.2:
2
- FDP_UCT.1:
2
- FDP_UCT.1.1:
1
- FDP_UIT.1.1:
1
- FDP_UIT.1.2:
1
- FDP_UCT:
8
- FDP_AFC:
1
- FDP_SDI.2:
2
- FDP_DAU.2:
1
- FDP_ETC.1:
1
- FDP_UIT.1:
1
- FDP_RIP:
1
- FIA:
- FIA_API:
5
- FIA_AFL:
15
- FIA_API.1:
14
- FIA_API.1.1:
2
- FIA_UAU.1:
8
- FIA_UID.1:
11
- FIA_AFL.1.1:
2
- FIA_AFL.1.2:
2
- FIA_UAU:
18
- FIA_UAU.1.1:
2
- FIA_UAU.1.2:
2
- FIA_UID:
18
- FIA_UID.1.1:
2
- FIA_UID.1.2:
2
- FIA_AFL.1:
1
- FMT:
- FMT_MSA.3:
12
- FMT_MOF.1:
9
- FMT_SMR.1:
36
- FMT_SMF.1:
26
- FMT_MOF.1.1:
1
- FMT_MSA:
62
- FMT_MSA.1.1:
3
- FMT_MSA.2:
9
- FMT_MSA.1:
7
- FMT_MSA.2.1:
1
- FMT_MSA.3.1:
2
- FMT_MSA.3.2:
2
- FMT_MSA.4.1:
2
- FMT_MTD:
16
- FMT_MTD.1.1:
2
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_MSA.4:
3
- FMT_MTD.1:
1
- FPT:
- FPT_EMS:
5
- FPT_EMS.1:
13
- FPT_EMS.1.1:
4
- FPT_EMS.1.2:
3
- FPT_TST.1:
12
- FPT_FLS.1:
9
- FPT_FLS.1.1:
1
- FPT_TST:
2
- FPT_PHP.1:
8
- FPT_PHP.1.1:
1
- FPT_PHP.1.2:
1
- FPT_PHP.3:
9
- FPT_PHP.3.1:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FTP:
- FTP_ITC:
36
- FTP_ITC.1:
5
- FTP_TRP.1:
5
- FTP_ITC.1.1:
4
- FTP_ITC.1.2:
4
- FTP_ITC.1.3:
4
- FTP_ICT:
2
|
pdf_data/st_keywords/cc_sfr/FCS |
- FCS_COP:
58
- FCS_CKM:
25
- FCS_CKM.4:
13
- FCS_RND.1: 1
- FCS_CKM.1:
7
- FCS_COP.1:
6
- FCS_CKM.2:
1
|
- FCS_CKM:
39
- FCS_CKM.4:
13
- FCS_COP:
19
- FCS_CKM.2:
4
- FCS_COP.1:
7
- FCS_CKM.1.1: 2
- FCS_CKM.1:
15
- FCS_CKM.4.1: 2
- FCS_COP.1.1: 2
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM |
25
|
39
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 |
7
|
15
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 |
1
|
4
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 |
13
|
13
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP |
58
|
19
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 |
6
|
7
|
pdf_data/st_keywords/cc_sfr/FDP |
- FDP_ITC:
30
- FDP_ROL: 2
- FDP_UIT:
2
- FDP_ACC:
150
- FDP_ACF:
135
- FDP_IFC: 81
- FDP_IFF: 66
- FDP_RIP:
8
- FDP_SDI.2:
5
- FDP_SDI:
1
- FDP_ACC.2: 14
- FDP_ACF.1:
35
- FDP_ACF.1.2:
7
- FDP_ACF.1.3:
1
- FDP_IFC.2: 8
- FDP_IFF.1: 24
- FDP_IFF.1.2: 4
- FDP_SDI.2.1:
1
- FDP_SDI.2.2:
1
- FDP_RIP.1:
7
- FDP_RIP.1.1:
1
- FDP_DAU.1:
6
- FDP_DAU.1.1: 1
- FDP_DAU.1.2: 1
- FDP_ITC.2:
16
- FDP_ETC.1:
15
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_ITC.1:
25
- FDP_ITC.1.1:
1
- FDP_ITC.1.2:
1
- FDP_ITC.1.3:
1
- FDP_UIT.1:
13
- FDP_UIT.1.1:
1
- FDP_UIT.1.2:
1
- FDP_ACC.1:
14
- FDP_IFC.1:
11
|
- FDP_DAU: 9
- FDP_UIT:
9
- FDP_ITC.1:
9
- FDP_ITC.2:
8
- FDP_ACC:
44
- FDP_ACF.1:
11
- FDP_ACC.1.1: 4
- FDP_ACF:
31
- FDP_ACC.1:
28
- FDP_ACF.1.1: 4
- FDP_ACF.1.2:
4
- FDP_ACF.1.3:
4
- FDP_ACF.1.4: 4
- FDP_DAU.1:
1
- FDP_DAU.2.1: 1
- FDP_DAU.2.2: 1
- FDP_ITC:
10
- FDP_IFC.1:
18
- FDP_ITC.1.1:
1
- FDP_ITC.1.2:
1
- FDP_ITC.1.3:
1
- FDP_RIP.1:
8
- FDP_RIP.1.1:
1
- FDP_SDI:
17
- FDP_SDI.1: 2
- FDP_SDI.2.1:
2
- FDP_SDI.2.2:
2
- FDP_UCT.1: 2
- FDP_UCT.1.1: 1
- FDP_UIT.1.1:
1
- FDP_UIT.1.2:
1
- FDP_UCT: 8
- FDP_AFC: 1
- FDP_SDI.2:
2
- FDP_DAU.2: 1
- FDP_ETC.1:
1
- FDP_UIT.1:
1
- FDP_RIP:
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC |
150
|
44
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 |
14
|
28
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF |
135
|
31
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 |
35
|
11
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 |
7
|
4
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 |
1
|
4
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_DAU.1 |
6
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ETC.1 |
15
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 |
11
|
18
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC |
30
|
10
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 |
25
|
9
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1.3 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 |
16
|
8
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP |
8
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 |
7
|
8
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI |
1
|
17
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2 |
5
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2.2 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT |
2
|
9
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT.1 |
13
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA |
- FIA_UID:
27
- FIA_UAU:
44
- FIA_ATD: 1
- FIA_USB: 1
- FIA_SOS.2: 8
- FIA_AFL:
18
- FIA_AFL.1:
6
- FIA_ATD.1: 9
- FIA_ATD.1.1: 1
- FIA_UAU.1:
8
- FIA_UAU.3: 7
- FIA_UAU.3.1: 1
- FIA_UAU.3.2: 1
- FIA_UAU.4: 9
- FIA_UAU.4.1: 1
- FIA_UAU.6: 1
- FIA_UID.1:
10
- FIA_USB.1: 7
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FIA_SOS.2.1: 1
- FIA_SOS.2.2: 1
- FIA_SOS: 1
|
- FIA_API: 5
- FIA_AFL:
15
- FIA_API.1: 14
- FIA_API.1.1: 2
- FIA_UAU.1:
8
- FIA_UID.1:
11
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_UAU:
18
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UID:
18
- FIA_UID.1.1: 2
- FIA_UID.1.2: 2
- FIA_AFL.1:
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL |
18
|
15
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1 |
6
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU |
44
|
18
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 |
8
|
8
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID |
27
|
18
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 |
10
|
11
|
pdf_data/st_keywords/cc_sfr/FMT |
- FMT_MSA:
25
- FMT_SMF: 14
- FMT_SMR: 6
- FMT_SMF.1:
5
- FMT_SMR.1:
20
- FMT_MTD:
7
- FMT_REV: 1
- FMT_MOF: 8
- FMT_MOF.1:
1
- FMT_MTD.1:
1
- FMT_MSA.1:
3
- FMT_MSA.2:
4
- FMT_MSA.2.1:
1
- FMT_MSA.3:
30
- FMT_MSA.3.1:
1
- FMT_MSA.3.2:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
|
- FMT_MSA.3:
12
- FMT_MOF.1:
9
- FMT_SMR.1:
36
- FMT_SMF.1:
26
- FMT_MOF.1.1: 1
- FMT_MSA:
62
- FMT_MSA.1.1: 3
- FMT_MSA.2:
9
- FMT_MSA.1:
7
- FMT_MSA.2.1:
1
- FMT_MSA.3.1:
2
- FMT_MSA.3.2:
2
- FMT_MSA.4.1: 2
- FMT_MTD:
16
- FMT_MTD.1.1: 2
- FMT_SMF.1.1: 1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_MSA.4: 3
- FMT_MTD.1:
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MOF.1 |
1
|
9
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA |
25
|
62
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 |
3
|
7
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.2 |
4
|
9
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.2.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 |
30
|
12
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.2 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD |
7
|
16
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
5
|
26
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
20
|
36
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT |
- FPT_FLS: 6
- FPT_TDC.1: 18
- FPT_RCV: 3
- FPT_ITT: 2
- FPT_TST.1:
6
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FPT_RPL.1: 4
- FPT_RPL.1.1: 1
- FPT_RPL.1.2: 1
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_RPL: 1
- FPT_STM.1: 3
|
- FPT_EMS: 5
- FPT_EMS.1: 13
- FPT_EMS.1.1: 4
- FPT_EMS.1.2: 3
- FPT_TST.1:
12
- FPT_FLS.1: 9
- FPT_FLS.1.1: 1
- FPT_TST: 2
- FPT_PHP.1: 8
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 9
- FPT_PHP.3.1: 1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 |
6
|
12
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.3 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FTP |
- FTP_ITC:
2
- FTP_ITC.1:
10
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
- FTP_TRP.1:
3
|
- FTP_ITC:
36
- FTP_ITC.1:
5
- FTP_TRP.1:
5
- FTP_ITC.1.1:
4
- FTP_ITC.1.2:
4
- FTP_ITC.1.3:
4
- FTP_ICT: 2
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC |
2
|
36
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 |
10
|
5
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.1 |
1
|
4
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.2 |
1
|
4
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.3 |
1
|
4
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_TRP.1 |
3
|
5
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_scheme/MAC/MAC |
2
|
3
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness/RNG/RND |
1
|
1
|
pdf_data/st_keywords/randomness/RNG/RNG |
1
|
2
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- physical tampering:
1
- malfunction:
1
- fault induction:
2
|
- SCA:
- Leak-Inherent:
1
- SPA:
1
- DPA:
1
- timing attacks:
1
- FI:
- physical tampering:
4
- Malfunction:
1
- DFA:
1
- fault injection:
1
|
pdf_data/st_keywords/side_channel_analysis/FI |
- physical tampering:
1
- malfunction: 1
- fault induction: 2
|
- physical tampering:
4
- Malfunction: 1
- DFA: 1
- fault injection: 1
|
pdf_data/st_keywords/side_channel_analysis/FI/physical tampering |
1
|
4
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2009-07-001:
1
- CCMB-2009-07-002:
1
- CCMB-2009-07-003:
1
- CCMB-2009-07-004:
1
|
- FIPS:
- FIPS180-2:
1
- FIPS46-3:
1
- FIPS PUB 46-3:
1
- FIPS197:
2
- PKCS:
- ICAO:
- CC:
- CCMB-2012-09-001:
1
- CCMB-2012-09-002:
1
- CCMB-2012-09-003:
1
- CCMB-2009-07-004:
1
|
pdf_data/st_keywords/standard_id/CC |
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004:
1
|
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2009-07-004:
1
|
pdf_data/st_keywords/standard_id/CC/CCMB-2009-07-004 |
1
|
1
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/symmetric_crypto/DES |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor |
- STMicroelectronics:
- Gemalto:
- Morpho:
|
|
pdf_data/st_keywords/vendor/Gemalto/Gemalto |
148
|
83
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata |
- pdf_file_size_bytes:
1506069
- pdf_is_encrypted:
False
- pdf_number_of_pages:
133
- /CreationDate:
D:20121129163538+01'00'
- /Creator:
Microsoft® Office Word 2007
- /Keywords:
MPP
- /ModDate:
D:20130711140243+02'00'
- /Producer:
Microsoft® Office Word 2007
- /Subject:
- /Title:
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
1145055
- pdf_is_encrypted:
False
- pdf_number_of_pages:
64
- /Title:
eTravel v1.0 Security Target MAÏA3
- /Author: Antoine de Lavernette
- /Subject:
MRTD
- /Keywords:
Security Target, CC, eTravel
- /Creator:
Microsoft® Office Word 2007
- /CreationDate:
D:20150723160151+02'00'
- /ModDate:
D:20150723160151+02'00'
- /Producer:
Microsoft® Office Word 2007
- pdf_hyperlinks:
|
pdf_data/st_metadata//CreationDate |
D:20121129163538+01'00'
|
D:20150723160151+02'00'
|
pdf_data/st_metadata//Creator |
Microsoft® Office Word 2007
|
Microsoft® Office Word 2007
|
pdf_data/st_metadata//Keywords |
MPP
|
Security Target, CC, eTravel
|
pdf_data/st_metadata//ModDate |
D:20130711140243+02'00'
|
D:20150723160151+02'00'
|
pdf_data/st_metadata//Producer |
Microsoft® Office Word 2007
|
Microsoft® Office Word 2007
|
pdf_data/st_metadata//Subject |
|
MRTD
|
pdf_data/st_metadata//Title |
|
eTravel v1.0 Security Target MAÏA3
|
pdf_data/st_metadata/pdf_file_size_bytes |
1506069
|
1145055
|
pdf_data/st_metadata/pdf_hyperlinks |
|
|
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
133
|
64
|
dgst |
3b2d25259ad52afc
|
fd22d93c12fd2799
|