Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Vertiv CYBEX™ SCMDR0001 Multi-Domain Smart Card Reader Firmware Version 40040-0E7
CCEVS-VR-VID-11145-2021
IDeal Pass v2.3-i JC with Privacy Protection (BAC Configuration)
NSCIB-CC-196231-CR
name Vertiv CYBEX™ SCMDR0001 Multi-Domain Smart Card Reader Firmware Version 40040-0E7 IDeal Pass v2.3-i JC with Privacy Protection (BAC Configuration)
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme US NL
status active archived
not_valid_after 22.10.2026 19.11.2023
not_valid_before 22.10.2021 19.11.2018
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11145-ci.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Signed%20certificate%20CC-18-196231.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11145-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20NSCIB-CC-196231-CR.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11145-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[ST-BAC-Lite]%202018_2000037746%20-%20Security%20Target%20Lite%20IDeal%20Pass%20v2.3-i%20JC%20(BAC%20Configuration)%20(v1.0,%202018-09-07).pdf
manufacturer Vertiv IT Systems Idemia
manufacturer_web https://www.vertiv.com https://www.idemia.com
security_level {} ADV_TDS.4, ALC_CMS.5, ATE_DPT.3, ADV_INT.2, ADV_FSP.5, EAL4+, ALC_DVS.2, ALC_TAT.2
dgst 3fc12377415d351f ce867531085e33f8
heuristics/cert_id CCEVS-VR-VID-11145-2021 NSCIB-CC-196231-CR
heuristics/cert_lab US
heuristics/extracted_sars AGD_PRE.1, ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_OBJ.2, ASE_CCL.1, ASE_ECD.1, ASE_REQ.2 ALC_CMS.5, AVA_VAN.5, ADV_TDS.4, ATE_DPT.3, ALC_DVS.2, ADV_ARC.1, ADV_FSP.5, ADV_INT.2, ALC_TAT.2, ADV_SPM.1
heuristics/extracted_versions 40040 2.3
heuristics/report_references/directly_referencing {} ANSSI-CC-2018/27, NSCIB-CC-195748-CR
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0782-2012, ANSSI-CC-2016/66, NSCIB-CC-195748-CR, BSI-DSZ-CC-0782-V3-2017, BSI-DSZ-CC-0782-V4-2018, ANSSI-CC-2017/59, ANSSI-CC-2018/27, BSI-DSZ-CC-0782-V2-2015
heuristics/scheme_data
heuristics/st_references/directly_referencing {} ANSSI-CC-2018/27
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0782-V4-2018, ANSSI-CC-2018/27
heuristics/protection_profiles 76f8f05a35d87f59, 48f73a122587b992 60455fc9564e2545
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_psd_v4.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_ua_v1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0055b.pdf
pdf_data/cert_filename st_vid11145-ci.pdf Signed certificate CC-18-196231.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11145-2021: 1
  • NL:
    • CC-18-196231: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
    • EAL7: 1
pdf_data/cert_keywords/cc_sar
  • ADV:
    • ADV_FSP.5: 1
    • ADV_INT.2: 1
    • ADV_TDS.4: 1
  • ALC:
    • ALC_CMS.5: 1
    • ALC_DVS.2: 1
    • ALC_TAT.2: 1
  • ATE:
    • ATE_DPT.3: 1
pdf_data/cert_keywords/cc_claims
  • O:
    • O.M: 1
pdf_data/cert_keywords/eval_facility
  • Acumen:
    • Acumen Security: 1
  • BrightSight:
    • Brightsight: 1
pdf_data/cert_keywords/standard_id
  • ICAO:
    • ICAO: 1
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • /CreationDate: D:20211025140828-04'00'
  • /ModDate: D:20211025140828-04'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 181114
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20181119163400+01'00'
  • /Creator: BHC364e
  • /ModDate: D:20181119163400+01'00'
  • /Producer: KONICA MINOLTA bizhub C364e
  • /Title: BHC364e-20181119163400
  • pdf_file_size_bytes: 202344
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename st_vid11145-vr.pdf Certification Report NSCIB-CC-196231-CR.pdf
pdf_data/report_frontpage
  • NL:
  • US:
    • cert_id: CCEVS-VR-VID11145-2021
    • cert_item: for the Vertiv CYBEX™ SCMDR0001 Multi-Domain Smart Card Reader Firmware Version 40040-0E7 Version 1.0
    • cert_lab: US NIAP
  • NL:
    • cert_id: NSCIB-CC-196231-CR
    • cert_item: IDeal Pass v2.3-i JC with Privacy Protection (BAC Configuration
    • cert_lab: Brightsight
    • developer: IDEMIA
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11145-2021: 1
  • FR:
    • ANSSI-CC-2018/27: 1
  • NL:
    • CC-19-180045: 1
    • CC-195748: 2
    • NSCIB-CC-196231-CR: 12
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0055: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 5
  • EAL:
    • EAL 4: 1
    • EAL 4 augmented: 1
    • EAL4: 2
    • EAL4 augmented: 1
    • EAL4+: 2
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.5: 2
    • ADV_INT.2: 2
    • ADV_TDS.4: 2
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMS.5: 2
    • ALC_DVS.2: 2
    • ALC_TAT.2: 2
  • ATE:
    • ATE_DPT.3: 2
  • AVA:
    • AVA_VAN.5: 2
pdf_data/report_keywords/cc_claims
  • A:
    • A.NO_TEMPEST: 1
    • A.NO_WIRELESS_DEVICES: 1
    • A.PHYSICAL: 1
    • A.TRUSTED_ADMIN: 1
    • A.TRUSTED_CONFIG: 1
    • A.USER_ALLOWED_ACCESS: 1
  • T:
    • T.DATA_LEAK: 1
    • T.FAILED: 1
    • T.LOGICAL_TAMPER: 1
    • T.PHYSICAL_TAMPER: 1
    • T.REPLACEMENT: 1
    • T.RESIDUAL_LEAK: 1
    • T.SIGNAL_LEAK: 1
    • T.UNAUTHORIZED_DEVICES: 1
    • T.UNINTENDED_USE: 1
pdf_data/report_keywords/vendor
  • STMicroelectronics:
    • STMicroelectronics: 1
  • Idemia:
    • IDEMIA: 6
  • Infineon:
    • Infineon: 3
pdf_data/report_keywords/eval_facility
  • Acumen:
    • Acumen Security: 4
  • BrightSight:
    • Brightsight: 2
  • CESTI:
    • CESTI: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-2: 1
pdf_data/report_keywords/crypto_library
  • Infineon:
    • v1.02.013: 4
pdf_data/report_keywords/vulnerability
  • ROCA:
    • ROCA: 2
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • fault injection: 1
  • SCA:
    • side channel: 1
  • other:
    • JIL: 2
pdf_data/report_keywords/standard_id
  • ICAO:
    • ICAO: 6
  • ISO:
    • ISO/IEC 18013: 2
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • of the TOE hardware depending on the used hardware platform. For the TOE the MIFARE application is out of scope, but this poses no security risk to the TOE. 2.5 Documentation The following documentation is: 1
    • out of scope: 1
pdf_data/report_metadata
  • /Author: ppatin
  • /CreationDate: D:20220118210807-05'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /ModDate: D:20220118210807-05'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • pdf_file_size_bytes: 357086
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 23
  • /Author: p646
  • /CreationDate: D:20181120153406+01'00'
  • /Creator: PDFCreator Version 1.2.0
  • /Keywords:
  • /ModDate: D:20181120153406+01'00'
  • /Producer: GPL Ghostscript 9.0
  • /Subject:
  • /Title: Certification Report NSCIB-CC-196231-CR
  • pdf_file_size_bytes: 630780
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 13
pdf_data/st_filename st_vid11145-st.pdf [ST-BAC-Lite] 2018_2000037746 - Security Target Lite IDeal Pass v2.3-i JC (BAC Configuration) (v1.0, 2018-09-07).pdf
pdf_data/st_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2018/27: 2
  • NL:
    • CC-1: 6
    • CC-2: 3
    • CC-3: 3
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0055-2009: 1
    • BSI-CC-PP-0056-V2-2012-MA-02: 1
    • BSI-PP-0035: 1
    • BSI-PP-0055: 1
    • BSI-PP-0056: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 6
    • EAL4 augmented: 2
    • EAL5: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.5: 4
    • ADV_INT.2: 4
    • ADV_SPM.1: 1
    • ADV_TDS.4: 4
  • AGD:
    • AGD_OPE: 10
    • AGD_PRE: 9
  • ALC:
    • ALC_CMS.5: 4
    • ALC_DVS.2: 5
    • ALC_TAT.2: 4
  • ATE:
    • ATE_DPT.3: 4
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 3
  • FDP:
    • FDP_APC_EXT: 14
    • FDP_APC_EXT.1: 10
    • FDP_APC_EXT.1.1: 1
    • FDP_APC_EXT.1.2: 1
    • FDP_APC_EXT.1.3: 1
    • FDP_APC_EXT.1.4: 1
    • FDP_FIL_EXT: 15
    • FDP_FIL_EXT.1: 7
    • FDP_FIL_EXT.1.1: 1
    • FDP_FIL_EXT.1.2: 1
    • FDP_FIL_EXT.1.3: 1
    • FDP_FLS_EXT: 1
    • FDP_PDC_EXT: 14
    • FDP_PDC_EXT.1: 23
    • FDP_PDC_EXT.1.1: 2
    • FDP_PDC_EXT.1.2: 2
    • FDP_PDC_EXT.1.3: 2
    • FDP_PDC_EXT.1.4: 2
    • FDP_PDC_EXT.1.5: 2
    • FDP_PDC_EXT.2: 10
    • FDP_PDC_EXT.2.1: 1
    • FDP_PDC_EXT.2.2: 1
    • FDP_PDC_EXT.4: 15
    • FDP_PDC_EXT.4.1: 2
    • FDP_PWR_EXT: 4
    • FDP_PWR_EXT.1: 14
    • FDP_PWR_EXT.1.1: 2
    • FDP_RIP_EXT: 4
    • FDP_RIP_EXT.1: 9
    • FDP_RIP_EXT.1.1: 2
    • FDP_SWI_EXT: 4
    • FDP_SWI_EXT.1: 12
    • FDP_SWI_EXT.1.1: 2
    • FDP_SWI_EXT.2: 16
    • FDP_SWI_EXT.2.1: 2
    • FDP_SWI_EXT.2.2: 2
    • FDP_TER_EXT: 4
    • FDP_TER_EXT.1: 9
    • FDP_TER_EXT.1.1: 2
    • FDP_TER_EXT.2: 9
    • FDP_TER_EXT.2.1: 2
    • FDP_TER_EXT.3: 9
    • FDP_TER_EXT.3.1: 2
    • FDP_TER_EXT.3.2: 2
    • FDP_UAI_EXT: 4
    • FDP_UAI_EXT.1: 9
    • FDP_UAI_EXT.1.1: 2
  • FPT:
    • FPT_FLS_EXT: 3
    • FPT_FLS_EXT.1: 9
    • FPT_FLS_EXT.1.1: 3
    • FPT_NTA_EXT: 4
    • FPT_NTA_EXT.1: 8
    • FPT_NTA_EXT.1.1: 2
    • FPT_PHP.1: 6
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 2
    • FPT_TST.1: 7
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_TST_EXT: 4
    • FPT_TST_EXT.1: 10
    • FPT_TST_EXT.1.1: 2
  • FTA:
    • FTA_CIN_EXT: 4
    • FTA_CIN_EXT.1: 9
    • FTA_CIN_EXT.1.1: 2
    • FTA_CIN_EXT.1.2: 2
    • FTA_CIN_EXT.1.3: 2
  • FAU:
    • FAU_GEN: 1
    • FAU_SAS: 7
    • FAU_SAS.1: 11
    • FAU_SAS.1.1: 2
  • FCS:
    • FCS_CKM: 1
    • FCS_CKM.1: 30
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 22
    • FCS_CKM.4.1: 1
    • FCS_COP: 51
    • FCS_COP.1: 9
    • FCS_RND: 9
    • FCS_RND.1: 13
    • FCS_RND.1.1: 2
  • FDP:
    • FDP_ACC.1: 18
    • FDP_ACC.1.1: 1
    • FDP_ACF: 1
    • FDP_ACF.1: 13
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 4
    • FDP_ITC: 2
    • FDP_ITC.1: 12
    • FDP_ITC.2: 12
    • FDP_UCT.1: 11
    • FDP_UCT.1.1: 1
    • FDP_UIT: 1
    • FDP_UIT.1: 10
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_AFL.1: 8
    • FIA_AFL.1.1: 3
    • FIA_AFL.1.2: 3
    • FIA_API: 16
    • FIA_API.1: 5
    • FIA_API.1.1: 1
    • FIA_SOS.2: 1
    • FIA_UAU: 6
    • FIA_UAU.1: 10
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.4: 16
    • FIA_UAU.4.1: 1
    • FIA_UAU.5: 10
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 4
    • FIA_UAU.6: 12
    • FIA_UAU.6.1: 1
    • FIA_UID.1: 12
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_LIM: 8
    • FMT_LIM.1: 18
    • FMT_LIM.1.1: 3
    • FMT_LIM.2: 19
    • FMT_LIM.2.1: 4
    • FMT_MSA.1: 1
    • FMT_MSA.2: 1
    • FMT_MSA.3: 3
    • FMT_MTD: 35
    • FMT_MTD.1: 5
    • FMT_SMF.1: 18
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 19
    • FMT_SMR.1.1: 3
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_EMS.1: 1
    • FPT_EMS.1.1: 1
    • FPT_EMS.1.2: 1
    • FPT_FLS.1: 10
    • FPT_FLS.1.1: 1
    • FPT_PHP.3: 10
    • FPT_PHP.3.1: 1
    • FPT_RVM.1: 1
    • FPT_SEP.1: 1
    • FPT_TST.1: 9
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 2
  • FTP:
    • FTP_ITC.1: 5
    • FTP_TRP.1: 5
pdf_data/st_keywords/cc_claims
  • A:
    • A.NO_PHYSICAL: 1
    • A.NO_TEMPEST: 2
    • A.NO_WIRELESS: 1
    • A.NO_WIRELESS_DEVICES: 1
    • A.PHYSICAL: 1
    • A.TRUSTED: 1
    • A.TRUSTED_ADMIN: 2
    • A.TRUSTED_CONFIG: 1
    • A.USER_ALLOWED: 1
    • A.USER_ALLOWED_ACCESS: 1
  • O:
    • O.ANTI_TAMPERING: 2
    • O.AUTHORIZED: 2
    • O.COMPUTER: 5
    • O.LEAK: 1
    • O.LEAK_PREVENTION: 1
    • O.NO_OTHER: 3
    • O.NO_TOE_ACCESS: 2
    • O.NO_USER: 1
    • O.NO_USER_DATA: 1
    • O.PERIPHERAL: 1
    • O.PERIPHERAL_PORTS: 1
    • O.REJECT: 4
    • O.SELF_TEST: 4
    • O.SELF_TEST_FAIL: 2
    • O.SESSION: 5
    • O.TAMPER: 1
    • O.TAMPER_EVIDENT: 2
    • O.USER: 4
    • O.USER_DATA: 2
  • OE:
    • OE.NO_TEMPEST: 2
    • OE.NO_WIRELESS: 1
    • OE.NO_WIRELESS_DEVICES: 1
    • OE.PHYSICAL: 3
    • OE.TRUSTED: 2
    • OE.TRUSTED_ADMIN: 1
    • OE.TRUSTED_CONFIG: 1
  • T:
    • T.DATA_LEAK: 2
    • T.FAILED: 2
    • T.LOGICAL: 1
    • T.LOGICAL_TAMPER: 1
    • T.PHYSICAL: 1
    • T.PHYSICAL_TAMPER: 1
    • T.REPLACEMENT: 2
    • T.RESIDUAL: 1
    • T.RESIDUAL_LEAK: 1
    • T.SIGNAL_LEAK: 2
    • T.UNAUTHORIZED: 1
    • T.UNAUTHORIZED_DEVICES: 1
    • T.UNINTENDED: 1
    • T.UNINTENDED_USE: 1
  • A:
    • A.MRTD_: 1
  • OE:
    • OE.AA_MRTD: 6
    • OE.MRTD_: 2
pdf_data/st_keywords/vendor
  • Idemia:
    • IDEMIA: 16
  • Infineon:
    • Infineon: 22
pdf_data/st_keywords/eval_facility
  • EWA:
    • EWA-Canada: 1
  • Intertek:
    • Intertek: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 11
      • AES-: 1
      • AES-128: 1
  • DES:
    • 3DES:
      • 3DES: 7
      • Triple-DES: 13
    • DES:
      • DES: 4
  • constructions:
    • MAC:
      • CMAC: 4
      • KMAC: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
    • ECDSA:
      • ECDSA: 12
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 3
      • SHA1: 1
    • SHA2:
      • SHA-2: 2
      • SHA-224: 2
      • SHA-256: 1
      • SHA-384: 2
      • SHA-512: 1
      • SHA224: 1
      • SHA256: 1
      • SHA384: 1
      • SHA512: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 24
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 16
  • PGP:
    • PGP: 1
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
pdf_data/st_keywords/crypto_library
  • Infineon:
    • v1.02.013: 8
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 6
  • FI:
    • Malfunction: 3
    • Physical Tampering: 5
    • Physical tampering: 1
    • fault injection: 1
    • malfunction: 7
    • physical tampering: 1
  • SCA:
    • DPA: 2
    • SPA: 1
    • physical probing: 4
    • timing attacks: 1
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.COM: 9
    • EF.DG1: 27
    • EF.DG13: 4
    • EF.DG14: 3
    • EF.DG15: 8
    • EF.DG16: 27
    • EF.DG2: 10
    • EF.DG3: 7
    • EF.DG4: 6
    • EF.DG5: 8
    • EF.SOD: 9
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • BSI:
    • AIS31: 4
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS 180-4: 2
    • FIPS 46-3: 2
    • FIPS PUB 197: 1
    • FIPS46: 1
  • ICAO:
    • ICAO: 20
  • ISO:
    • ISO/IEC 14443: 6
    • ISO/IEC 18013: 6
    • ISO/IEC 7816-2: 1
    • ISO/IEC 7816-4: 1
    • ISO/IEC15946-2: 1
  • RFC:
    • RFC 5639: 1
    • RFC-5639: 1
    • RFC3369: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • of the TOE hardware depending on the used hardware platform. For the TOE the MIFARE application is out of scope, but this poses no risk to the TOE security. Figure 1: TOE 1.4.2 TOE usage and security features: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: Teresa MacArthur
  • /Client Full Name: Vertiv
  • /Client Short Name: Vertiv
  • /Comments: CC V3.1 Security Target Template Version 1_0
  • /Company: EWA-Canada
  • /CreationDate: D:20211020151732+02'00'
  • /Creator: Acrobat PDFMaker 17 for Word
  • /Document Number: 2149-001-D102C5
  • /ModDate: D:20211020125336-04'00'
  • /Producer: Adobe PDF Library 17.11.238
  • /Product_Name: Vertiv Multi-Domain Smart Card Reader
  • /ST_Date: 20 October 2021
  • /ST_Version: 1.12
  • /SourceModified: D:20211020131707
  • /Title: Security Target
  • pdf_file_size_bytes: 775665
  • pdf_hyperlinks: mailto:[email protected], http://www.vertiv.com/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 49
  • /Author: IDEMIA
  • /CreationDate: D:20180907132327+02'00'
  • /Creator: Microsoft® Word 2016
  • /Keywords: NSCIB-CC-196231, ASE Lite, ICAO, ePassport, BAC
  • /ModDate: D:20180907132327+02'00'
  • /Producer: Microsoft® Word 2016
  • /Subject: ASE Lite 2018_2000037746, v1.0, 2018-09-07
  • /Title: Security Target Lite IDeal Pass v2.3-i JC with Privacy Protection (BAC Configuration)
  • pdf_file_size_bytes: 1486764
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 102
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different