| name |
Spreadtrum Unisoc TEE OS version 2.1.2 |
Carte Upteq NFC 2.0.4_OFM release B sur composant ST33F1ME (T1020364, release B) |
| category |
Trusted Computing |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme |
NL |
FR |
| status |
active |
archived |
| not_valid_after |
12.12.2028 |
01.09.2019 |
| not_valid_before |
12.12.2023 |
29.05.2013 |
| cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-0492117-CERT.pdf |
|
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-0492117-CR.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2013-28fr.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-0492117-ST%20Lite-v0.30.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2013-28en.pdf |
| manufacturer |
Spreadtrum Communications(Shanghai) Co., Ltd |
Gemalto / STMicroelectronics |
| manufacturer_web |
http:%20//www.unisoc.com/ |
https://www.gemalto.com/ |
| security_level |
EAL2+ |
EAL4+, AVA_VAN.5, ALC_DVS.2 |
| dgst |
3f3135d0517d27f9 |
3dcf00d5f9878043 |
| heuristics/cert_id |
NSCIB-CC-0492117-CR |
ANSSI-CC-2013/28 |
| heuristics/cert_lab |
|
THALES |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 |
ADV_TDS.3, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, AVA_VAN.5, ASE_INT.1, ALC_CMC.4, ASE_REQ.2, AGD_PRE.1, ATE_DPT.1, ASE_ECD.1, ADV_IMP.1, ALC_LCD.1, ALC_DVS.2, ASE_SPD.1, ATE_COV.2, ALC_TAT.1, AGD_OPE.1, ALC_CMS.4, ALC_DEL.1, ASE_TSS.1, ADV_FSP.4, ADV_ARC.1 |
| heuristics/extracted_versions |
2.1.2 |
2.0.4 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2014/56, ANSSI-CC-2013/27 |
| heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2012/48, ANSSI-CC-2011/07 |
| heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2014/96, ANSSI-CC-2014/56, ANSSI-CC-2013/27, ANSSI-CC-2014/83 |
| heuristics/report_references/indirectly_referencing |
{} |
ANSSI-CC-2010/49, ANSSI-CC-2011/07, ANSSI-CC-2011/77, ANSSI-CC-2010/50, ANSSI-CC-2012/48, ANSSI-CC-2011/17 |
| heuristics/scheme_data |
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
{} |
7b81fd67c02d34de |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-cible_PP-2010-04en.pdf |
| pdf_data/cert_filename |
NSCIB-CC-0492117-CERT.pdf |
|
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
- EAL:
- EAL2: 2
- EAL2 augmented: 1
- EAL4: 1
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
- ISO:
- ISO/IEC 15408-1: 1
- ISO/IEC 15408-2: 1
- ISO/IEC 15408-3: 1
- ISO/IEC 18045: 2
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
- /Author: kruitr
- /CreationDate: D:20231220093800+01'00'
- /Creator: Bullzip PDF Printer (11.10.0.2761)
- /ModDate: D:20231220094050+01'00'
- /Producer: PDF Printer / www.bullzip.com / FPG / TUV Rheinland Service GmbH
- /Title: Microsoft Word - NSCIB-CC-0492117-CERT.doc
- pdf_file_size_bytes: 267546
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
| pdf_data/report_filename |
NSCIB-CC-0492117-CR.pdf |
ANSSI-CC_2013-28fr.pdf |
| pdf_data/report_frontpage |
- FR:
- NL:
- cert_id: NSCIB-CC-0492117-CR
- cert_item: Unisoc TEE OS version 2.1.2
- cert_lab: Riscure B.V.
- developer: Spreadtrum Communications(Shanghai)Co., Ltd
|
- FR:
- cc_security_level: EAL 4 augmenté ALC_DVS.2 et AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 3
- cert_id: ANSSI-CC-2013/28
- cert_item: Carte Upteq NFC 2.0.4_OFM release B sur composant ST33F1ME (T1020364, release B
- cert_item_version: Plateforme Upteq NFC 2.0.4_OFM release B sur composant ST33F1ME (S1121881, release B
- cert_lab: THALES (TCS – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France
- developer: Gemalto La Vigie, Av du Jujubier, ZI Athelia IV, 13705 La Ciotat Cedex, France STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, B.P. 2, 13106 Rousset, France Commanditaire Gemalto La Vigie, Av du Jujubier, ZI Athelia IV, 13705 La Ciotat Cedex, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit \\(référence/version\\)(.+)Nom de la TOE \\(référence/version\\)(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: PPUSIMB], version 2.0.2 (U)SIM Java Card Platform Protection Profile - Basic configuration
- NL:
|
| pdf_data/report_keywords/cc_cert_id |
|
- FR:
- ANSSI-CC-2011/07: 4
- ANSSI-CC-2011/07-S01: 1
- ANSSI-CC-2012/48: 2
- ANSSI-CC-2013/28: 20
- ANSSI-CC-PP-2010/04: 1
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 2 augmented: 1
- EAL2: 1
- EAL2 augmented: 1
- EAL2+: 1
- EAL4: 1
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 2
- EAL 5: 1
- EAL 7: 1
- EAL4: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
| pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
- A:
- A.SECURE_HARDWARE_PLATFORM: 1
|
|
| pdf_data/report_keywords/vendor |
|
- Gemalto:
- Morpho:
- STMicroelectronics:
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
- FI:
- fault Injection: 1
- malfunction: 1
- SCA:
- other:
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
|
- /CreationDate:
- /CreationDate--Text:
- /Creator: PDFCreator Version 1.2.1
- /Keywords:
- /ModDate:
- /ModDate--Text:
- /Producer: GPL Ghostscript 9.02
- /Subject:
- /Title:
- pdf_file_size_bytes: 320571
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 19
|
| pdf_data/st_filename |
NSCIB-CC-0492117-ST Lite-v0.30.pdf |
ANSSI-CC-cible_2013-28en.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 2: 4
- EAL 2 augmented: 1
- EAL 2+: 1
- EAL2: 2
|
- EAL:
- EAL4: 4
- EAL4 augmented: 2
- EAL4+: 1
- EAL5: 1
- EAL5 augmented: 1
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 6
- ADV_FSP: 1
- ADV_FSP.1: 5
- ADV_FSP.2: 11
- ADV_TDS: 1
- ADV_TDS.1: 9
- AGD:
- AGD_OPE: 2
- AGD_OPE.1: 9
- AGD_PRE: 2
- AGD_PRE.1: 7
- ALC:
- ALC_CMC: 1
- ALC_CMC.2: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 2
- ALC_DEL: 1
- ALC_DEL.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 5
- ASE_INT: 1
- ASE_INT.1: 2
- ASE_OBJ: 1
- ASE_OBJ.2: 1
- ASE_REQ: 1
- ASE_REQ.1: 4
- ASE_REQ.2: 3
- ASE_SPD: 1
- ASE_SPD.1: 2
- ASE_TSS: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 4
- ATE_FUN: 1
- ATE_FUN.1: 5
- ATE_IND: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 6
- ADV_FSP.1: 4
- ADV_FSP.2: 2
- ADV_FSP.4: 9
- ADV_IMP.1: 5
- ADV_TDS.1: 2
- ADV_TDS.2: 1
- ADV_TDS.3: 9
- AGD:
- AGD_ADM: 1
- AGD_OPE.1: 10
- AGD_PRE.1: 6
- AGD_USR: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.1: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 2
- ALC_DVS.2: 9
- ALC_LCD.1: 3
- ALC_TAT.1: 3
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 4
- ASE_INT.1: 5
- ASE_OBJ.2: 3
- ASE_REQ.1: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 3
- ATE_DPT.1: 2
- ATE_FUN.1: 6
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_ARP: 2
- FAU_ARP.1: 7
- FAU_ARP.1.1: 1
- FAU_SAA.1: 2
- FAU_SAR.1: 1
- FAU_STG.1: 1
- FCS:
- FCS_CKM: 2
- FCS_CKM.1: 8
- FCS_CKM.4: 13
- FCS_CKM.4.1: 1
- FCS_COP: 4
- FCS_COP.1: 14
- FCS_COP.1.1: 1
- FCS_RNG.1: 1
- FDP:
- FDP_ACC: 24
- FDP_ACC.1: 9
- FDP_ACF: 18
- FDP_ACF.1: 10
- FDP_IFC: 12
- FDP_IFC.1: 7
- FDP_IFC.2: 3
- FDP_IFF: 13
- FDP_IFF.1: 7
- FDP_ITC: 3
- FDP_ITC.1: 8
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 4
- FDP_ITT: 8
- FDP_ITT.1: 1
- FDP_RIP: 7
- FDP_RIP.1: 1
- FDP_ROL: 7
- FDP_ROL.1: 2
- FDP_SDI: 2
- FDP_SDI.2: 9
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FIA:
- FIA_ATD: 2
- FIA_ATD.1: 7
- FIA_ATD.1.1: 1
- FIA_UID: 2
- FIA_UID.1: 2
- FIA_UID.2: 6
- FIA_UID.2.1: 1
- FIA_USB: 2
- FIA_USB.1: 6
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA: 37
- FMT_MSA.1: 4
- FMT_MSA.3: 11
- FMT_SMF: 2
- FMT_SMF.1: 13
- FMT_SMF.1.1: 1
- FMT_SMR: 2
- FMT_SMR.1: 14
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS: 2
- FPT_FLS.1: 8
- FPT_FLS.1.1: 1
- FPT_INI.1: 1
- FPT_ITT: 1
- FPT_STM: 1
- FPT_TEE: 2
- FPT_TEE.1: 5
- FPT_TEE.1.1: 1
- FPT_TEE.1.2: 1
|
- FAU:
- FAU_ARP.1: 17
- FAU_ARP.1.1: 1
- FAU_SAA.1: 3
- FAU_SAS.1: 1
- FCO:
- FCS:
- FCS_CKM: 73
- FCS_CKM.1: 23
- FCS_CKM.2: 7
- FCS_CKM.3: 4
- FCS_CKM.4: 45
- FCS_CKM.4.1: 1
- FCS_COP: 59
- FCS_COP.1: 18
- FCS_RND: 2
- FCS_RND.1: 9
- FCS_RND.1.1: 2
- FCS_RNG.1: 2
- FDP:
- FDP_ACC: 48
- FDP_ACC.1: 22
- FDP_ACC.2: 8
- FDP_ACF: 38
- FDP_ACF.1: 25
- FDP_IFC: 46
- FDP_IFC.1: 26
- FDP_IFC.2: 4
- FDP_IFF: 40
- FDP_IFF.1: 28
- FDP_IFF.1.2: 1
- FDP_IFF.1.4: 1
- FDP_ITC: 20
- FDP_ITC.1: 19
- FDP_ITC.2: 33
- FDP_ITT.1: 1
- FDP_RIP: 116
- FDP_RIP.1: 10
- FDP_ROL: 21
- FDP_ROL.1: 7
- FDP_SDI: 6
- FDP_SDI.1: 1
- FDP_SDI.2: 8
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UIT: 12
- FDP_UIT.1: 4
- FIA:
- FIA_ATD: 9
- FIA_ATD.1: 2
- FIA_UAU: 18
- FIA_UAU.1: 2
- FIA_UAU.4: 1
- FIA_UID: 33
- FIA_UID.1: 16
- FIA_UID.2: 1
- FIA_USB: 8
- FIA_USB.1: 3
- FMT:
- FMT_LIM: 1
- FMT_LIM.1: 2
- FMT_LIM.2: 1
- FMT_MOF: 6
- FMT_MOF.1: 1
- FMT_MSA: 173
- FMT_MSA.1: 18
- FMT_MSA.2: 2
- FMT_MSA.3: 27
- FMT_MSA.3.1: 2
- FMT_MTD: 26
- FMT_MTD.1: 3
- FMT_MTD.3: 1
- FMT_REV: 8
- FMT_REV.1: 4
- FMT_SMF: 68
- FMT_SMF.1: 30
- FMT_SMF.1.1: 1
- FMT_SMR: 75
- FMT_SMR.1: 48
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNO: 5
- FPR_UNO.1: 11
- FPR_UNO.1.1: 1
- FPT:
- FPT_FLS: 61
- FPT_FLS.1: 8
- FPT_FLS.1.1: 1
- FPT_ITT: 12
- FPT_ITT.1: 3
- FPT_PHP.3: 1
- FPT_RCV: 22
- FPT_RCV.3: 12
- FPT_RCV.4: 2
- FPT_TDC.1: 10
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST.1: 1
- FPT_UNO: 1
- FRU:
- FTP:
- FTP_ITC: 24
- FTP_ITC.1: 10
- FTP_TRP.1: 4
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.INTEGRATION: 3
- A.PROTECTION_: 1
- A.PROTECTION_AFTER_DELIVERY: 2
- A.ROLLBACK: 3
- A.ROOT_KEY: 3
- A.SECUREBOOT: 3
- A.SECURE_: 1
- A.SECURE_HARDWARE_PLATFORM: 2
- A.TA_DEVELOPMENT: 3
- A.TA_MANAGEMENT: 3
- O:
- O.CA_TA_IDENTIFICATION: 10
- O.INITIALIZATION: 1
- O.INSTANCE_TIME: 1
- O.KEYS_USAGE: 9
- O.OPERATION: 10
- O.RNG: 1
- O.RUNTIME_CONFIDENTIALITY: 19
- O.RUNTIME_INTEGRITY: 10
- O.TA_AUTHENTICITY: 15
- O.TA_ISOLATION: 6
- O.TEE_DATA_PROTECTION: 18
- O.TEE_ID: 1
- O.TEE_ISOLATION: 1
- O.TRUSTED_STORAGE: 8
- OE:
- OE.DISABLED_DEBUG: 6
- OE.INITIALIZATION: 17
- OE.INSTANCE_TIME: 6
- OE.INTEGRATION_CONFIGURATION: 10
- OE.PROTECTION_AFTER_DELIVERY: 7
- OE.RNG: 6
- OE.ROLLBACK: 5
- OE.ROOT_KEY: 3
- OE.SECRETS: 3
- OE.TA_DEVELOPMENT: 8
- OE.TA_MANAGEMENT: 3
- OE.TEE_ISOLATION: 27
- OE.TRUSTED_HARDWARE: 31
- OP:
- OP.EXTRACT_KEY: 3
- OP.LOAD: 2
- OP.STORE: 3
- OP.USE_KEY: 3
- OSP:
- OSP.INTEGRATION_: 1
- OSP.INTEGRATION_CONFIGURATION: 2
- OSP.SECRETS: 3
- T:
- T.ABUSE_DEBUG: 3
- T.ABUSE_FUNC: 2
- T.ABUSE_FUNCT: 1
- T.CLONE: 3
- T.FLASH_DUMP: 3
- T.IMPERSONATION: 3
- T.PERTURBATION: 3
- T.RAM: 3
- T.RNG: 3
- T.ROGUE_CODE_: 1
- T.ROGUE_CODE_EXECUTION: 2
- T.SPY: 3
- T.STORAGE_: 1
- T.STORAGE_CORRUPTION: 2
- T.TEE_FIRMWARE_DOWNGRADE: 1
|
- A:
- A.APPLET: 5
- A.APPS-PROVIDER: 4
- A.CONTROLLING-: 2
- A.CONTROLLING-AUTHORITY: 2
- A.DELETION: 2
- A.KEY-ESCROW: 5
- A.MOBILE-OPERATOR: 4
- A.OTA-ADMIN: 4
- A.PERSONALIZER: 4
- A.PRODUCTION: 4
- A.VERIFICATION: 4
- A.VERIFICATION-: 2
- A.VERIFICATION-AUTHORITY: 2
- D:
- D.API_DATA: 3
- D.APP_CODE: 8
- D.APP_C_DATA: 5
- D.APP_I_DATA: 6
- D.APSD_KEYS: 3
- D.CARD_MNGT_DATA: 3
- D.CASD_KEYS: 3
- D.CRYPTO: 4
- D.GP_CODE: 1
- D.ISD_KEYS: 3
- D.JCS_CODE: 3
- D.JCS_DATA: 5
- D.OPTIONAL_PF_SERVICE: 2
- D.PIN: 4
- D.SEC_DATA: 7
- D.VASD_KEYS: 2
- O:
- O.ALARM: 21
- O.APPLET: 21
- O.APPLI-: 1
- O.APPLI-AUTH: 10
- O.CARD-: 5
- O.CARD-MANAGEMENT: 49
- O.CARD_MANAGEMENT: 2
- O.CIPHER: 25
- O.CODE_PKG: 14
- O.COMM_AUTH: 16
- O.COMM_CONFIDENTIALITY: 13
- O.COMM_INTEGRITY: 16
- O.DELETION: 15
- O.DOMAIN-: 9
- O.DOMAIN-RIGHTS: 19
- O.FIREWALL: 52
- O.GLOBAL_ARRAYS_CONFID: 18
- O.GLOBAL_ARRAYS_INTEG: 11
- O.INSTALL: 16
- O.JAVAOBJECT: 41
- O.KEY-: 2
- O.KEY-MNGT: 33
- O.LOAD: 16
- O.NATIVE: 13
- O.OBJ-DELETION: 8
- O.OPERATE: 36
- O.PIN-: 7
- O.PIN-MNGT: 15
- O.REALLOCATION: 16
- O.REMOTE: 15
- O.REMOTE_MTHD: 6
- O.REMOTE_OBJ: 10
- O.REMOTE_SERVICE_ACTIVATION: 11
- O.REMOTE_SERVICE_AUDIT: 11
- O.RESOURCES: 26
- O.RMI_SERVICE: 12
- O.RND: 10
- O.ROR: 5
- O.SCP: 28
- O.SCP-: 3
- O.SCP-SUPPORT: 19
- O.SID: 36
- O.TRANSACTION: 19
- OE:
- OE.ACTIVATION-: 1
- OE.ACTIVATION-KEY-ESCROW: 6
- OE.AID-MANAGEMENT: 6
- OE.AP-KEYS: 6
- OE.APPLET: 9
- OE.APPS-PROVIDER: 6
- OE.BASIC-: 4
- OE.BASIC-APPS-: 6
- OE.BASIC-APPS-VALIDATION: 16
- OE.CA-KEYS: 8
- OE.CARD_MANAGEMENT: 2
- OE.CONTROLLING-: 1
- OE.CONTROLLING-AUTHORITY: 5
- OE.GEMACTIVATE-ADMIN: 5
- OE.KEY-CHANGE: 7
- OE.KEY-ESCROW: 7
- OE.KEY-GENERATION: 4
- OE.MOBILE-OPERATOR: 6
- OE.OPERATOR-KEYS: 6
- OE.OTA-ADMIN: 4
- OE.OTA-LOADING: 4
- OE.OTA-SERVERS: 6
- OE.PERSONALIZER: 4
- OE.PRODUCTION: 5
- OE.QUOTAS: 6
- OE.SCP: 3
- OE.SECURE-APPS-CERTIFICATION: 4
- OE.SECURITY-DOMAINS: 4
- OE.SHARE-CONTROL: 6
- OE.TRUSTED-APPS-DEVELOPER: 7
- OE.TRUSTED-APPS-PRE-ISSUANCE: 5
- OE.VA-KEYS: 7
- OE.VERIFICATION: 34
- OE.VERIFICATION-: 1
- OE.VERIFICATION-AUTHORITY: 3
- OP:
- OP.ARRAY_ACCESS: 4
- OP.CREATE: 7
- OP.DELETE_APPLET: 4
- OP.DELETE_PCKG: 3
- OP.DELETE_PCKG_APPLET: 3
- OP.GET_ROR: 3
- OP.INSTANCE_FIELD: 4
- OP.INVK_INTERFACE: 7
- OP.INVK_VIRTUAL: 6
- OP.INVOKE: 3
- OP.JAVA: 5
- OP.PUT: 6
- OP.RET_RORD: 3
- OP.THROW: 5
- OP.TYPE_ACCESS: 5
- OSP:
- OSP.ACTIVATION-KEY-ESCROW: 5
- OSP.AID-MANAGEMENT: 4
- OSP.APSD-KEYS: 4
- OSP.BASIC-: 1
- OSP.BASIC-APPS-VALIDATION: 3
- OSP.CASD-KEYS: 4
- OSP.KEY-CHANGE: 4
- OSP.KEY-GENERATION: 4
- OSP.OPERATOR-KEYS: 4
- OSP.OTA-LOADING: 4
- OSP.OTA-SERVERS: 4
- OSP.QUOTAS: 4
- OSP.RNG: 5
- OSP.SECURE-APPS-: 2
- OSP.SECURE-APPS-CERTIFICATION: 2
- OSP.SECURITY-DOMAINS: 4
- OSP.SERVICE: 1
- OSP.SERVICE_AUDIT: 4
- OSP.SHARE-CONTROL: 4
- OSP.TRUSTED-: 1
- OSP.TRUSTED-APPS-DEVELOPER: 5
- OSP.TRUSTED-APPS-PRE-: 2
- OSP.TRUSTED-APPS-PRE-ISSUANCE: 2
- OSP.VASD-KEYS: 4
- OSP.VERIFICATION: 5
- R:
- T:
- T.COM_EXPLOIT: 6
- T.CONFID-APPLI-DATA: 18
- T.CONFID-JCS-: 9
- T.CONFID-JCS-CODE: 5
- T.CONFID-JCS-DATA: 4
- T.DELETION: 7
- T.EXE-: 1
- T.EXE-CODE: 11
- T.EXE-CODE-REMOTE: 4
- T.INSTALL: 6
- T.INTEG-: 10
- T.INTEG-APPLI-: 7
- T.INTEG-APPLI-CODE: 9
- T.INTEG-APPLI-DATA: 16
- T.INTEG-JCS-CODE: 7
- T.INTEG-JCS-DATA: 6
- T.INTEG-USER-DATA: 9
- T.LIFE_CYCLE: 6
- T.NATIVE: 7
- T.OBJ-DELETION: 4
- T.PHYSICAL: 5
- T.RESOURCES: 8
- T.SID: 18
- T.UNAUTHORIZED_ACCESS: 4
- T.UNAUTHORIZED_ACCESS_TO_SERVIC: 1
- T.UNAUTHORIZED_ACCESS_TO_SERVICE: 5
- T.UNAUTHORIZED_CARD_MNGT: 9
|
| pdf_data/st_keywords/vendor |
|
- Gemalto:
- Morpho:
- STMicroelectronics:
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
- MAC:
- CBC-MAC: 1
- CMAC: 1
- HMAC: 2
- HMAC-SHA-256: 1
- HMAC-SHA-512: 1
|
- AES_competition:
- DES:
- constructions:
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
- SHA:
- SHA2:
- SHA-256: 3
- SHA224: 1
- SHA256: 1
- SHA384: 1
- SHA512: 1
|
- MD:
- SHA:
- SHA1:
- SHA2:
- SHA-2: 3
- SHA-224: 2
- SHA-256: 3
- SHA-384: 3
- SHA2: 2
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
- CBC:
- CCM:
- CFB:
- CTR:
- ECB:
- OFB:
|
|
| pdf_data/st_keywords/ecc_curve |
- NIST:
- P-192: 4
- P-224: 4
- P-256: 4
- P-384: 4
- P-521: 4
- ansip160k1: 2
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
- SCA:
- Side-channel: 1
- side-channels: 1
|
- FI:
- fault induction: 2
- malfunction: 3
- physical tampering: 4
- SCA:
- DPA: 1
- physical probing: 1
- other:
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
- ARM:
- ARM TrustZone: 4
- TrustZone: 2
- IBM:
- other:
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 180-4: 1
- FIPS 186-4: 3
- FIPS 197: 3
- FIPS 46-3: 2
- FIPS 81: 2
- FIPS PUB 180-4: 1
- FIPS PUB 186-4: 1
- NIST:
- RFC:
- RFC 5480: 2
- RFC 8017: 3
- RFC-3610: 1
- RFC-4231: 1
|
- CC:
- CCIMB-2009-07-001: 1
- CCIMB-2009-07-002: 1
- CCIMB-2009-07-003: 1
- CCIMB-2009-07-004: 1
- FIPS:
- FIPS 140-2: 1
- FIPS 180-2: 1
- FIPS 180-3: 1
- FIPS 197: 1
- FIPS 46-3: 1
- FIPS PUB 197: 2
- FIPS PUB 46-3: 3
- FIPS PUB 81: 4
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 9796-2: 1
- PKCS:
- PKCS #1: 5
- PKCS #5: 1
- PKCS#1: 3
- PKCS#5: 1
- RFC:
- SCP:
- SCP 01: 1
- SCP 02: 1
- SCP 80: 1
- SCP02: 5
- SCP80: 8
|
| pdf_data/st_keywords/javacard_version |
|
- GlobalPlatform:
- Global Platform 2.2.1: 1
- Global Platform 2.2.2: 1
- JavaCard:
- Java Card 2.2.2: 2
- Java Card 3.0.1: 1
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
- java:
- javacard:
- javacard.framework: 2
- javacard.framework.service: 1
- javacard.security: 2
- javacardx:
- javacardx.crypto: 10
- javacardx.rmi: 1
- javacardx.security: 9
|
| pdf_data/st_keywords/certification_process |
- OutOfScope:
- TA/TEE isolation functionality. It is not considered for isolation between REE and TEE, as that is out of scope. Information: Unisoc TEE OS Security Target Lite v0.30 - 66 - No changes needed. 6.1 SECURITY: 1
- are managed between the delivery and the end-usage phase. Note that the operational environment is out of scope of the evaluation. A.TA_MANAGEMENT: If the TEE allows managing the set of TAs, e.g. updating: 1
- as the TOE does not contain the hardware elements of the TEE, some of the lifecycle phases are out of scope. Nevertheless, a description of all phases is included in order to fully understand the life cycle: 1
- or hardware component which may be used alternatively by the TEE, and this separation is now out of scope. - S.RAM_UNIT is modified to consider only the “TA Identifier” security attribute, removing the REE: 1
- out of scope: 4
|
- OutOfScope:
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.SCP.RECOVERY and O.SCP-SUPPORT are: 1
- out of scope: 2
- parameters for cryptographic operations, the use of these other values are not advised; and clearly out of scope of the TOE. See [USR] for details. JCS.EraseResidualData The security function ensures that: 1
|
| pdf_data/st_metadata |
|
- /CreationDate: D:20121001120716+02'00'
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20130711165213+02'00'
- /Producer: Microsoft® Office Word 2007
- /Title:
- pdf_file_size_bytes: 2345844
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 177
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
True |
False |
| state/cert/download_ok |
True |
False |
| state/cert/extract_ok |
True |
False |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |