name |
CENTAGATE v3.010-build13 |
ID-ONE Cosmo V7.0.1-n Smartcard with patch 077121 on NXP P5CD081 V1A (Standard Dual), P5CC081 V1A (Standard) and P5CD041 V1A (Basic Dual) components |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
MY |
FR |
status |
archived |
archived |
not_valid_after |
06.06.2022 |
01.09.2019 |
not_valid_before |
06.06.2017 |
28.09.2012 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C072-CR-v1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2012-30en.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2017-05-08-CTG-ST-3.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2012-30en.pdf |
manufacturer |
SecureMetric Technology Sdn Bhd |
Oberthur Technologies / NXP Semiconductors GmbH |
manufacturer_web |
https://www.securemetric.com/ |
https://www.oberthur.com/ |
security_level |
EAL4+, ALC_FLR.2 |
EAL5+, ALC_DVS.2, AVA_VAN.5 |
dgst |
4149b933ed4230dd |
9fc7ad215da2d907 |
heuristics/cert_id |
ISCB-3-RPT-C072-CR-v1 |
ANSSI-CC-2012/30 |
heuristics/cert_lab |
[] |
THALES |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, ALC_FRL.2, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ALC_FLR.2, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 |
ALC_DVS.2, ADV_IMP.2, AVA_VAN.5 |
heuristics/extracted_versions |
3.010 |
7.0.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
CRP272, ANSSI-CC-2012/71 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0555-2009, ANSSI-CC-2011/64 |
heuristics/report_references/indirectly_referenced_by |
{} |
CRP272, ANSSI-CC-2012/71 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0555-2009, ANSSI-CC-2010/40, BSI-DSZ-CC-0645-2010, ANSSI-CC-2011/64 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
CRP272, ANSSI-CC-2016/69, ANSSI-CC-2012/71, ANSSI-CC-2013/70 |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0555-2009 |
heuristics/st_references/indirectly_referenced_by |
{} |
CRP272, ANSSI-CC-2016/69, ANSSI-CC-2012/71, ANSSI-CC-2013/70 |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0555-2009 |
heuristics/protection_profiles |
{} |
8ab4bd8434014a92 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/jcsppc.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
ISCB-5-RPT-C072-CR-v1.pdf |
ANSSI-CC_2012-30en.pdf |
pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 5 augmented ALC_DVS.2, AVA_VAN.5
- cc_version: Common Criteria version 3.1
- cert_id: ANSSI-CC-2012/30
- cert_item: ID-ONE Cosmo V7.0.1-n Smartcard with patch 077121 on NXP P5CD081 V1A (Standard Dual), P5CC081 V1A (Standard) and P5CD041 V1A (Basic Dual) components
- cert_item_version: Java Card platform Version : 7.0.1-n with patch 077121
- cert_lab: THALES - CEACI (T3S – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France Tél : +33 (0)5 62 88 28 01, mail : [email protected]
- developer: Oberthur Technologies NXP Semiconductors GmbH 50 quai Michelet Stresemannallee 101 92300 Levallois-Perret, France D-22502 Hamburg, Germany Sponsor Oberthur Technologies 50 quai Michelet 92300 Levallois-Perret, France
- match_rules: ['Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developers(.+)Evaluation facility(.+)Recognition arrangements']
- ref_protection_profiles: PP/0304], version 1.0b PP SUN Java Card™ System Protection Profile Collection, August 2003
|
pdf_data/report_keywords/cc_cert_id |
- MY:
- ISCB-3-RPT-C072-CR-v1: 28
|
- DE:
- BSI-DSZ-CC-0555-: 1
- BSI-DSZ-CC-0555-2009: 2
- BSI-DSZ-CC-0555-2009-MA-01: 1
- FR:
- ANSSI-CC-2011/64: 1
- ANSSI-CC-2012/30: 20
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL4: 5
- EAL4 augmented: 1
- EAL4+: 4
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 5 augmented: 2
- EAL 7: 1
- EAL4: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- NXP:
- NXP: 28
- NXP Semiconductors: 3
- Oberthur:
- Oberthur Technologies: 12
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- ISO:
- ISO/IEC 18045: 2
- ISO/IEC15408: 2
|
- BSI:
- CC:
- CCMB-2006-09-001: 1
- CCMB-2007-09-002: 1
- CCMB-2007-09-003: 1
- CCMB-2007-09-004: 1
- SCP:
- SCP01: 1
- SCP02: 1
- SCP03: 1
|
pdf_data/report_keywords/javacard_version |
|
- GlobalPlatform:
- JavaCard:
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- OutOfScope:
- OTP Hardware token, where this is out of the evaluation. SMS service to register the device is also out of scope. 18 Potential consumers of the TOE are advised that some functions and services may not have been: 1
- out of scope: 1
|
|
pdf_data/report_metadata |
- /Author: ISCB Department
- /CreationDate: D:20170720054033+00'00'
- /Creator: Microsoft Word
- /Keywords: MyCB_TMP_002
- /ModDate: D:20170720054033+00'00'
- /Subject: CENTAGATE v3.0.10-build13
- /Title: C072 Certification Report
- pdf_file_size_bytes: 649341
- pdf_hyperlinks: http://www.cybersecurity.my/mycc, mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 29
|
- /Author: badouard
- /CreationDate: D:20121210165508+02'00'
- /Creator: PDFCreator Version 0.9.0
- /Keywords:
- /ModDate: D:20121210165508+02'00'
- /Producer: AFPL Ghostscript 8.53
- /Subject:
- /Title: ANSSI-CC-2012_30en
- pdf_file_size_bytes: 212699
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 19
|
pdf_data/st_filename |
2017-05-08-CTG-ST-3.0.pdf |
ANSSI-CC-cible_2012-30en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 4: 1
- EAL 4 augmented: 1
- EAL4: 3
- EAL4 augmented: 1
|
- EAL:
- EAL5: 3
- EAL5 augmented: 3
- EAL5+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.2: 2
- ALC_FRL.2: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_ARP: 3
- FAU_ARP.1: 5
- FAU_ARP.1.1: 1
- FAU_GEN: 2
- FAU_GEN.1: 10
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 1
- FAU_GEN.2: 4
- FAU_GEN.2.1: 1
- FAU_SAA: 1
- FAU_SAA.1: 8
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 1
- FAU_SAA.2: 6
- FAU_SAA.2.1: 1
- FAU_SAA.2.2: 1
- FAU_SAA.2.3: 1
- FAU_SAR: 2
- FAU_SAR.1: 5
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 3
- FAU_SAR.2.1: 1
- FCS:
- FCS_CKM.1: 13
- FCS_CKM.1.1: 1
- FCS_CKM.2: 10
- FCS_CKM.2.1: 1
- FCS_CKM.4: 13
- FCS_CKM.4.1: 1
- FCS_COP.1: 11
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 12
- FDP_ACC.1.1: 1
- FDP_ACF.1: 12
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 1
- FDP_ITC.1: 3
- FDP_ITC.2: 3
- FIA:
- FIA_AFL.1: 6
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 7
- FIA_ATD.1.1: 1
- FIA_UAU.1: 8
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.2: 3
- FIA_UAU.2.1: 1
- FIA_UAU.5: 9
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 7
- FIA_UAU.6.1: 1
- FIA_UID.1: 13
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_UID.2: 7
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA.1: 5
- FMT_MSA.1.1: 1
- FMT_MSA.3: 5
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF.1: 5
- FMT_SMF.1.1: 1
- FMT_SMR.1: 12
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FTA:
|
- FAU:
- FAU_ARP: 1
- FAU_ARP.1: 3
- FAU_GEN: 1
- FAU_GEN.1: 2
- FAU_SAR: 1
- FAU_SAR.1: 2
- FCO:
- FCS:
- FCS_CKM: 8
- FCS_CKM.1: 5
- FCS_CKM.2: 1
- FCS_CKM.2.1: 1
- FCS_CKM.3: 1
- FCS_CKM.3.1: 1
- FCS_CKM.4: 2
- FCS_CKM.4.1: 1
- FCS_COP: 10
- FCS_COP.1: 9
- FCS_COP.1.1: 1
- FCS_RND: 1
- FCS_RNG: 4
- FCS_RNG.1: 7
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FDP:
- FDP_ACC: 5
- FDP_ACC.2: 9
- FDP_ACF: 4
- FDP_ACF.1: 18
- FDP_IFC: 2
- FDP_IFC.1: 1
- FDP_IFC.2: 2
- FDP_IFF: 2
- FDP_IFF.1: 10
- FDP_ITC: 2
- FDP_ITC.1: 3
- FDP_ITC.2: 5
- FDP_RIP: 8
- FDP_RIP.1: 9
- FDP_ROL: 1
- FDP_ROL.1: 2
- FDP_SDI.1: 1
- FDP_SDI.1.1: 1
- FDP_SDI.2: 1
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UCT: 1
- FDP_UCT.1: 1
- FDP_UIT: 1
- FDP_UIT.1: 2
- FIA:
- FIA_AFL: 4
- FIA_AFL.1: 8
- FIA_ATD: 2
- FIA_ATD.1: 3
- FIA_UAU: 6
- FIA_UAU.1: 4
- FIA_UAU.4: 2
- FIA_UAU.7: 2
- FIA_UID: 4
- FIA_UID.1: 6
- FIA_UID.2: 1
- FIA_USB.1: 2
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF: 2
- FMT_MOF.1: 2
- FMT_MSA: 11
- FMT_MSA.1: 6
- FMT_MSA.2: 1
- FMT_MSA.3: 8
- FMT_MTD: 3
- FMT_MTD.1: 3
- FMT_MTD.2: 2
- FMT_MTD.3: 1
- FMT_MTD.3.1: 1
- FMT_SMF: 4
- FMT_SMF.1: 4
- FMT_SMR: 6
- FMT_SMR.1: 9
- FMT_SMR.2: 6
- FPR:
- FPR_UNO: 3
- FPR_UNO.1: 4
- FPR_UNO.1.1: 1
- FPT:
- FPT_FLS: 5
- FPT_FLS.1: 5
- FPT_PHP: 2
- FPT_PHP.3: 2
- FPT_RCV: 3
- FPT_RCV.3: 8
- FPT_RCV.4: 1
- FPT_TDC: 1
- FPT_TDC.1: 3
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST: 2
- FPT_TST.1: 6
- FRU:
- FRU_FLT: 1
- FRU_FLT.1: 1
- FRU_RSA: 1
- FRU_RSA.1: 1
- FTP:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.COMPENT_ADMIN: 1
- A.COMPENT_ADMINSTRATORS: 1
- A.FIREWALL: 2
- A.MAIL_SERVER: 2
- A.MALICIOUS_CODE: 1
- A.NO_EVIL: 2
- A.OPERATING_SYSTEM: 1
- A.PORT_PROTECT: 2
- A.TIME_STAMP: 2
- D:
- O:
- O.ALERT: 6
- O.AUDIT: 7
- O.AUTH_MECH: 8
- O.MOBILE_SENSITVE: 2
- O.MOBILE_SENSITVE_: 1
- O.MOBILE_SENSITVE_PROTECTION: 5
- O.TRAFFIC_PROTECTION: 23
- O.USER_ACC: 1
- O.USER_ACC_CONTROL: 19
- OE:
- OE.COMPENT_: 1
- OE.COMPENT_ADMINSTRATORS: 1
- OE.FIREWALL: 2
- OE.MAIL_SERVER: 2
- OE.MALICIOUS_CODE_N: 1
- OE.MALICIOUS_CODE_NOT_SIGN: 1
- OE.NO_EVIL: 2
- OE.OPERATING_SYSTEM: 1
- OE.PHYSICAL_PROTECTION: 1
- OE.PORT_PROTECT: 2
- OE.TIME_STAMP: 2
- T:
- T.CUMMUNICATION: 1
- T.CUMMUNICATION_ATTACK: 1
- T.DATA_ACCESS: 2
- T.MOBILE: 1
- T.MOBILE_ATTACK: 1
- T.USER_ACC_CONTROL: 1
- T.WEB_ATTACK: 2
|
- A:
- A.APPLET: 1
- A.NATIVE: 1
- A.VERIFICATION: 1
- D:
- D.API_DATA: 3
- D.APPLILIFECYC: 1
- D.APP_CODE: 5
- D.APP_C_DATA: 3
- D.APP_I_DATA: 3
- D.ARRAY: 3
- D.AUDITLOG: 1
- D.CONFIG: 2
- D.CRYPTO: 4
- D.GLPIN: 1
- D.JCS_CODE: 3
- D.JCS_DATA: 5
- D.KEY: 2
- D.LOADFILE: 1
- D.NB_REMAINTRYGLB: 1
- D.PIN: 6
- D.SEC_DATA: 7
- D.SENSITIVE_DATA: 1
- O:
- O.ALARM: 1
- O.APPLET: 16
- O.CARD-MANAGEMENT: 3
- O.CIPHER: 1
- O.CODE_PCKG: 8
- O.CODE_PKG: 6
- O.DELETION: 1
- O.FIREWALL: 1
- O.INSTALL: 1
- O.JAVAOBJEC: 3
- O.JAVAOBJECT: 32
- O.KEY-MNGT: 1
- O.LOAD: 3
- O.NATIVE: 1
- O.OBJ-DELETION: 1
- O.OPERATE: 1
- O.PIN-MNGT: 1
- O.REALLOCATION: 1
- O.RESOURCES: 1
- O.SCP: 3
- O.SECURE_COMPARE: 1
- O.SHRD_VAR_CONFID: 1
- O.SHRD_VAR_INTEG: 1
- O.SID: 1
- O.TRANSACTION: 1
- OE:
- OE.APPLET: 1
- OE.NATIVE: 1
- OE.VERIFICATION: 1
- OP:
- OP.ARRAY_ACCESS: 3
- OP.CREATE: 5
- OP.DELETE_APPLET: 3
- OP.DELETE_PCKG: 2
- OP.DELETE_PCKG_APPLET: 2
- OP.INSTANCE_FIELD: 2
- OP.INVK_INTERFACE: 4
- OP.INVK_VIRTUAL: 3
- OP.JAVA: 4
- OP.PUT: 4
- OP.RECEIVE: 1
- OP.SEND: 1
- OP.THROW: 3
- OP.TYPE_ACCESS: 3
- OSP:
- R:
- T:
- T.CONFID-APPLI-DATA: 1
- T.CONFID-JCS-CODE: 1
- T.CONFID-JCS-DATA: 1
- T.CONFIGURATION: 2
- T.CONF_DATA_APPLET: 2
- T.DELETION: 1
- T.EXE-CODE: 2
- T.INSTALL: 1
- T.INTEG-APPLI-CODE: 4
- T.INTEG-APPLI-DATA: 4
- T.INTEG-APPLICODE: 1
- T.INTEG-APPLIDATA: 1
- T.INTEG-JCS-CODE: 1
- T.INTEG-JCS-DATA: 1
- T.NATIVE: 1
- T.OBJ-DELETION: 1
- T.PHYSICAL: 1
- T.RESSOURCES: 1
- T.SID: 2
|
pdf_data/st_keywords/vendor |
|
- NXP:
- Oberthur:
- OBERTHUR: 2
- Oberthur: 2
- Oberthur Technologies: 188
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-256: 3
- SHA-384: 2
- SHA-512: 2
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- fault injection: 1
- malfunction: 2
- physical tampering: 1
- SCA:
- DPA: 1
- SPA: 1
- physical probing: 2
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- FIPS:
- FIPS PUB 180-2: 2
- FIPS PUB 186-2: 1
- FIPS PUB 197: 5
- FIPS PUB 46-3: 5
- FIPS PUB 81: 4
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816: 2
- PKCS:
|
pdf_data/st_keywords/javacard_version |
|
- GlobalPlatform:
- JavaCard:
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
- java:
- javacard:
- javacard.framework: 3
- javacard.security: 1
- javacardx:
- javacardx.framework.util: 1
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- Out of Scope: 1
- issuer certificate validity, certificate status, and the certificate owner Mobile audio pass (Out of Scope) TOE will generate challenge and PKI certificate will be used to sign the challenge. The signature: 1
- out of scope: 5
- procedure. Table 21: Authentication Components Authentication Method of authentication PKI token (out of scope) The user prompted to select the valid certificate from the list, and then TOE will verify the: 1
- serial number / fingerprint that stored in the DB. Hardware CR OTP (out of scope) User needs to have CR OTP token to use this feature. User will request for a challenge from the: 1
- then be sent back to the TOE by the mobile application and verified for its validity. FIDO (out of scope) User need to plugged in the token then click on the button of the token to submit the validation: 1
- token. This is out of the scope of the evaluation. Also, using SMS to register the device is also out of scope of evaluation. SecureMetric Technology Sdn Bhd 2016 Page 17 of 76 For QR code registration: 1
- which will then be used by the user to generate the OTP. Hardware OTP (out of scope) User needs to have OTP token to use this feature. User will generate an OTP from the OTP token and: 1
|
|
pdf_data/st_metadata |
- /Author: Rajiv;Biau
- /CreationDate: D:20170523024954+00'00'
- /Creator: Microsoft Word
- /Keywords: ST
- /ModDate: D:20170720134505+08'00'
- /Title: Centagat Security Target
- pdf_file_size_bytes: 1592329
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 76
|
- /Author: poulen
- /CreationDate: D:20120216120829+02'00
- /Creator: PDFCreator Version 0.8.1
- /ModDate: D:20120216120829+02'00
- /Producer: AFPL Ghostscript 8.50
- /Title: FQR 110 5145 Ed4
- pdf_file_size_bytes: 3025997
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 92
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |