| name |
Hitachi Virtual Storage Platform G1000, Hitachi Virtual Storage Platform VX7 Control Program 80-01-25-00/00(R8-01A-06_Z) |
Plateforme Upteq NFC 2.1.3_Generic sur le composant ST33F1ME avec application DESFIRE 1.1 (S1124940, release C) |
| category |
Access Control Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme |
JP |
FR |
| status |
archived |
archived |
| not_valid_after |
06.06.2021 |
17.12.2019 |
| not_valid_before |
06.06.2016 |
17.12.2014 |
| cert_link |
None |
None |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0514_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2014_88.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0514_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI_cible2014_88_LITE.pdf |
| manufacturer |
Hitachi, Ltd. |
Gemalto / STMicroelectronics |
| manufacturer_web |
https://www.hitachi.com/ |
https://www.gemalto.com/ |
| security_level |
EAL2+, ALC_FLR.1 |
EAL4+, AVA_VAN.5, ALC_DVS.2 |
| dgst |
4b794daffbae517d |
276ef5ffa7d5941c |
| heuristics/cert_id |
JISEC-CC-CRP-C0514 |
ANSSI-CC-2014/88 |
| heuristics/cert_lab |
[] |
THALES |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ALC_FLR.1, ADV_TDS.1, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 |
AVA_VAN.5, ALC_DVS.2 |
| heuristics/extracted_versions |
00, 80, 01, 25 |
2.1.3, 1.1 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2011/07 |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
ANSSI-CC-2010/49, ANSSI-CC-2011/07, ANSSI-CC-2010/50 |
| heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0514
- certification_date: 01.06.2016
- claim: EAL2+ALC_FLR.1
- enhanced:
- assurance_level: EAL2 Augmented with ALC_FLR.1
- cc_version: 3.1 Release4
- cert_link: https://www.ipa.go.jp/en/security/c0514_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is a software program operating on the storage system : " Hitachi Unified Storage VM" (as known as “Hitachi Virtual Storage Platform VX7”). This TOE receives a request for access to a storage device in a storage system from a host computer (hereinafter referred to as “host”) and controls data transmission between the host and the storage device. TOE Security functions The major security functions of this TOE are as follows. - Function that identifies the host and controls access, so that the host can access only the designated storage area - Function that erases data by overwriting it with dummy data in the storage device - Function that manages an encryption key to encrypt data written to the storage device - Function that identifies/authenticates fibre channel switches - Function that identifies/authenticates users and limits settings related to security to specific roles - Function that records events related to security in logs and enables persons who have a specific role to read it
- evaluation_facility: Mizuho Information & Research Institute, Inc. Information Security Evaluation Office
- product: Hitachi Virtual Storage Platform G1000, Hitachi Virtual Storage Platform VX7 Control Program
- product_type: Control Program for storage system
- report_link: https://www.ipa.go.jp/en/security/c0514_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0514_est.pdf
- toe_version: 80-01-25-00/00(R8-01A-06_Z)
- vendor: Hitachi, Ltd.
- expiration_date: 01.07.2021
- supplier: Hitachi, Ltd.
- toe_japan_name: Hitachi Virtual Storage Platform G1000, Hitachi Virtual Storage Platform VX7 Control Program 80-01-25-00/00(R8-01A-06_Z)
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0514_it4504.html
- toe_overseas_name: Hitachi Virtual Storage Platform G1000, Hitachi Virtual Storage Platform VX7 Control Program80-01-25-00/00(R8-01A-06_Z)
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
ANSSI-CC-2011/07 |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
ANSSI-CC-2011/07 |
| heuristics/protection_profiles |
{} |
9399bd94f9925b16 |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-profil_PP-2010-03en.pdf |
| pdf_data/cert_filename |
None |
None |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename |
c0514_erpt.pdf |
ANSSI-CC-2014_88.pdf |
| pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 4 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 4
- cert_id: ANSSI-CC-2014/88
- cert_item: Plateforme Upteq NFC 2.1.3_Generic release C sur composant ST33F1ME
- cert_item_version: T1020806, Release C
- cert_lab: THALES (TCS – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France
- developer: Gemalto La Vigie, Av du Jujubier ZI Athelia IV, 13705 La Ciotat Cedex, France STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, B.P. 2, 13106 Rousset, France Commanditaire Gemalto La Vigie, Av du Jujubier ZI Athelia IV, 13705 La Ciotat Cedex, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: ANSSI-CC-PP-2010/03-M01 [PP JCS] Java Card System – Open Configuration, version 3.0
|
| pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0514-01: 1
- Certification No. C0514: 1
|
- FR:
- ANSSI-CC-2011/07: 7
- ANSSI-CC-2011/07-M01: 1
- ANSSI-CC-2011/07-M02: 3
- ANSSI-CC-2011/07-M03: 3
- ANSSI-CC-2011/07-S02: 1
- ANSSI-CC-2014/88: 22
- ANSSI-CC-PP-2010/03-M01: 2
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
- ANSSI:
- ANSSI-CC-PP-2010/03-M01: 2
- BSI:
|
| pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL2: 4
- EAL2 augmented: 3
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 2
- EAL 5: 1
- EAL 7: 1
- EAL4: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
| pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
- A:
- A.CONNECT_STORAGE: 1
- A.EXTERNAL_SERVER: 1
- A.MAINTENCE_PC: 1
- A.MANAGEMENT_PC: 1
- A.MANAGE_SECRET: 1
- A.NOEVIL: 1
- A.PHYSICAL_SEC: 1
- T:
- T.CHG_CONFIG: 1
- T.HDD_REUSE: 1
- T.HDD_THEFT: 1
- T.LP_LEAK: 1
- T.TSF_COMP: 1
|
|
| pdf_data/report_keywords/vendor |
|
- Gemalto:
- STMicroelectronics:
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- CCMB-2012-09-004: 2
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
- /CreationDate: D:20160906162354+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20160906162432+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 473024
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 41
|
- /Author: robert-n@intranet.fr
- /CreationDate: D:20150115150459+01'00'
- /Creator: Microsoft® Word 2010
- /Keywords: ANSSI-CC-CER-F-07.013
- /ModDate: D:20150115150459+01'00'
- /Producer: Microsoft® Word 2010
- /Subject: Plateforme Upteq NFC 2.1.3_Generic sur le composant ST33F1ME avec application DESFIRE 1.1 (S1124940, release C)
- /Title: ANSSI-CC-2014/88
- pdf_file_size_bytes: 715730
- pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 21
|
| pdf_data/st_filename |
c0514_est.pdf |
ANSSI_cible2014_88_LITE.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
- FR:
- ANSSI-CC-2011/07: 1
- ANSSI-CC-2011/07-M02: 1
- NL:
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL4: 3
- EAL4 augmented: 3
- EAL4+: 1
- EAL5: 2
- EAL5 augmented: 2
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.1: 4
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 18
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 8
- FAU_GEN.2.1: 1
- FAU_SAR.1: 9
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_STG.1: 12
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 10
- FAU_STG.3.1: 1
- FAU_STG.4: 8
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM.1: 12
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 11
- FCS_CKM.4.1: 1
- FCS_COP.1: 2
- FDP:
- FDP_ACC.1: 16
- FDP_ACC.1.1: 1
- FDP_ACF.1: 13
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FDP_ITC.1: 2
- FDP_ITC.2: 2
- FDP_RIP.1: 10
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 10
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD: 19
- FIA_ATD.1: 6
- FIA_SOS: 20
- FIA_SOS.1: 2
- FIA_UAU: 1
- FIA_UAU.1: 2
- FIA_UAU.2: 18
- FIA_UAU.2.1: 1
- FIA_UID: 1
- FIA_UID.1: 6
- FIA_UID.2: 18
- FIA_UID.2.1: 1
- FIA_USB: 19
- FIA_USB.1: 6
- FMT:
- FMT_MOF.1: 14
- FMT_MOF.1.1: 1
- FMT_MSA.1: 12
- FMT_MSA.1.1: 1
- FMT_MSA.3: 13
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 15
- FMT_MTD.1.1: 1
- FMT_MTD.3: 10
- FMT_MTD.3.1: 1
- FMT_SMF.1: 15
- FMT_SMF.1.1: 1
- FMT_SMR.1: 18
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM: 1
- FPT_STM.1: 13
- FPT_STM.1.1: 1
- FTP:
- FTP_ITC.1: 10
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 9
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_ARP.1: 5
- FAU_ARP.1.1: 1
- FAU_SAS.1: 1
- FCO:
- FCS:
- FCS_CKM: 11
- FCS_CKM.1: 3
- FCS_CKM.2: 3
- FCS_CKM.3: 3
- FCS_CKM.4: 2
- FCS_CKM.4.1: 1
- FCS_COP: 15
- FCS_COP.1: 12
- FCS_RND: 2
- FCS_RND.1: 5
- FCS_RND.1.1: 2
- FCS_RNG.1: 2
- FDP:
- FDP_ACC: 10
- FDP_ACC.1: 4
- FDP_ACC.2: 6
- FDP_ACF: 10
- FDP_ACF.1: 28
- FDP_ETC: 2
- FDP_ETC.1: 2
- FDP_IFC: 4
- FDP_IFC.1: 2
- FDP_IFC.2: 4
- FDP_IFF: 4
- FDP_IFF.1: 19
- FDP_IFF.1.2: 1
- FDP_IFF.1.4: 1
- FDP_ITC: 7
- FDP_ITC.1: 3
- FDP_ITC.2: 19
- FDP_ITT.1: 1
- FDP_RIP: 10
- FDP_RIP.1: 8
- FDP_ROL: 6
- FDP_ROL.1: 9
- FDP_SDI.2: 1
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UIT: 3
- FDP_UIT.1: 4
- FIA:
- FIA_ATD: 1
- FIA_ATD.1: 1
- FIA_UAU: 8
- FIA_UAU.1: 2
- FIA_UAU.2: 1
- FIA_UAU.4: 1
- FIA_UAU.5: 2
- FIA_UID: 9
- FIA_UID.1: 4
- FIA_UID.2: 3
- FIA_USB: 1
- FIA_USB.1: 3
- FMT:
- FMT_LIM: 1
- FMT_LIM.1: 2
- FMT_LIM.2: 1
- FMT_MOF: 2
- FMT_MOF.1: 1
- FMT_MSA: 30
- FMT_MSA.1: 10
- FMT_MSA.2: 2
- FMT_MSA.3: 21
- FMT_MSA.3.1: 2
- FMT_MTD: 6
- FMT_MTD.1: 3
- FMT_MTD.3: 1
- FMT_SMF: 12
- FMT_SMF.1: 9
- FMT_SMF.1.1: 1
- FMT_SMR: 12
- FMT_SMR.1: 16
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNO: 2
- FPR_UNO.1: 2
- FPR_UNO.1.1: 1
- FPT:
- FPT_FLS: 8
- FPT_FLS.1: 7
- FPT_FLS.1.1: 1
- FPT_ITT: 2
- FPT_ITT.1: 2
- FPT_PHP.3: 1
- FPT_RCV: 5
- FPT_RCV.3: 11
- FPT_RCV.4: 1
- FPT_RPL: 2
- FPT_RPL.1: 2
- FPT_TDC: 2
- FPT_TDC.1: 3
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FRU:
- FTP:
- FTP_ITC: 3
- FTP_ITC.1: 6
- FTP_TRP: 2
- FTP_TRP.1: 3
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.CONNECT_STORAGE: 3
- A.EXTERNAL_SERVER: 3
- A.MAINTENANCE_PC: 3
- A.MANAGEMENT_PC: 3
- A.MANAGE_SECRET: 3
- A.NOEVIL: 3
- A.PHYSICAL_SEC: 3
- O:
- O.ADM_AUTH: 8
- O.ADM_ROLE: 5
- O.AUD_GEN: 7
- O.HDD_: 2
- O.HDD_ENC: 6
- O.HDD_SHRED: 3
- O.HOST_ACCESS: 8
- O.SEC_COMM: 8
- O.SWITCH_AUTH: 6
- OE:
- OE.CONNECT_STORAGE: 2
- OE.EXTERNAL_SERVER: 3
- OE.FC-: 1
- OE.FC-SP_HBA: 2
- OE.HDD_ENC: 2
- OE.MAINTENANCE_PC: 3
- OE.MANAGEMENT_PC: 2
- OE.MANAGE_SECRET: 3
- OE.NOEVIL: 2
- OE.PHYSICAL_SEC: 3
- T:
- T.CHG_CONFIG: 3
- T.HDD_REUSE: 3
- T.HDD_THEFT: 3
- T.LP_LEAK: 3
- T.TSF_COMP: 3
|
- A:
- A.APPLET: 1
- A.DELETION: 4
- A.MOBILE-OPERATOR: 2
- A.OTA-ADMIN: 2
- A.PERSONALIZER: 1
- A.PRODUCTION: 1
- A.VERIFICATION: 1
- D:
- D.API_DATA: 3
- D.APP_CODE: 7
- D.APP_C_DATA: 5
- D.APP_I_DATA: 6
- D.CARD_MNGT_DATA: 4
- D.CRYPTO: 4
- D.GASD_KEYS: 5
- D.ISD_KEYS: 4
- D.JCS_CODE: 3
- D.JCS_DATA: 6
- D.OPTIONAL_PF_SERVICE: 4
- D.PIN: 4
- D.SEC_DATA: 7
- O:
- O.ALARM: 1
- O.APPLET: 16
- O.APPLI-AUTH: 2
- O.CARD-MANAGEMENT: 5
- O.CARD_MANAGEMENT: 1
- O.CIPHER: 2
- O.CODE_PKG: 14
- O.COMM_AUTH: 2
- O.COMM_INTEGRITY: 2
- O.CONTROLED-ES_LOADING: 1
- O.DELETION: 2
- O.FIREWALL: 2
- O.GLOBAL_ARRAYS_CONFID: 2
- O.GLOBAL_ARRAYS_INTEG: 2
- O.INSTALL: 1
- O.JAVAOBJECT: 38
- O.KEY-MNGT: 2
- O.LOAD: 2
- O.NATIVE: 2
- O.OBJ-DELETION: 2
- O.OPERATE: 1
- O.PIN-MNGT: 2
- O.REALLOCATION: 2
- O.REMOTE_SERVICE_ACTIVATION: 1
- O.REMOTE_SERVICE_AUDIT: 2
- O.RESOURCES: 1
- O.RND: 2
- O.SCP: 8
- O.SCP-SUPPORT: 2
- O.SID: 1
- O.TRANSACTION: 2
- OE:
- OE.ACTIVATION-KEY-ESCROW: 2
- OE.AID-MANAGEMENT: 2
- OE.APPLET: 1
- OE.BASIC-APPS-VALIDATION: 2
- OE.CARD-: 1
- OE.CARD-MANAGEMENT: 2
- OE.CARD_MANAGEMENT: 1
- OE.CODE-: 1
- OE.CODE-EVIDENCE: 1
- OE.GEMACTIVATE-ADMIN: 2
- OE.KEY-ESCROW: 2
- OE.KEY-GENERATION: 2
- OE.MOBILE-OPERATOR: 2
- OE.OPERATOR-KEYS: 2
- OE.OTA-ADMIN: 2
- OE.OTA-LOADING: 2
- OE.OTA-SERVERS: 2
- OE.PERSONALIZER: 2
- OE.PRODUCTION: 2
- OE.SCP: 6
- OE.TRUSTED-APPS-DEVELOPER: 2
- OE.TRUSTED-APPS-PRE-ISSUANCE: 2
- OE.VERIFICATION: 4
- OP:
- OP.ARRAY_ACCESS: 4
- OP.CREATE: 7
- OP.DELETE_APPLET: 4
- OP.DELETE_PCKG: 3
- OP.DELETE_PCKG_APPLET: 3
- OP.INSTANCE_FIELD: 4
- OP.INVK_INTERFACE: 7
- OP.INVK_VIRTUAL: 6
- OP.JAVA: 5
- OP.PUT: 6
- OP.THROW: 5
- OP.TYPE_ACCESS: 5
- OSP:
- OSP.ACTIVATION-: 1
- OSP.ACTIVATION-KEY-ESCROW: 1
- OSP.AID-MANAGEMENT: 2
- OSP.BASIC-APPS-VALIDATION: 2
- OSP.KEY-ESCROW: 2
- OSP.KEY-GENERATION: 2
- OSP.OPERATOR-KEYS: 2
- OSP.OTA-LOADING: 2
- OSP.OTA-SERVERS: 2
- OSP.PERSONALIZER: 2
- OSP.PRODUCTION: 2
- OSP.RNG: 3
- OSP.SERVICE: 1
- OSP.SERVICE_AUDIT: 2
- OSP.TRUSTED-APPS-: 2
- OSP.TRUSTED-APPS-DEVELOPER: 2
- OSP.TRUSTED-APPS-PRE-ISSUANCE: 1
- OSP.VERIFICATION: 1
- R:
- T:
- T.CONFID-APPLI-DATA: 1
- T.CONFID-JCS-CODE: 1
- T.CONFID-JCS-DATA: 1
- T.DELETION: 3
- T.EXE-CODE: 2
- T.INSTALL: 1
- T.INTEG-APPLI-CODE: 2
- T.INTEG-APPLI-DATA: 2
- T.INTEG-JCS-CODE: 1
- T.INTEG-JCS-DATA: 1
- T.INTEG-USER-DATA: 2
- T.LIFE_CYCLE: 2
- T.NATIVE: 1
- T.OBJ-DELETION: 1
- T.PHYSICAL: 1
- T.RESOURCES: 2
- T.SID: 2
- T.UNAUTHORIZED_ACCESS_TO_SERVICE: 2
- T.UNAUTHORIZED_CARD_MNGT: 2
|
| pdf_data/st_keywords/vendor |
|
- Gemalto:
- NXP:
- NXP: 1
- NXP Semiconductors: 1
- STMicroelectronics:
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- TDEA: 1
- TDES: 5
- Triple-DES: 3
- DES:
- constructions:
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
- MD:
- SHA:
- SHA1:
- SHA2:
- SHA-2: 3
- SHA-224: 2
- SHA-256: 3
- SHA-384: 3
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- fault induction: 2
- malfunction: 3
- physical tampering: 4
- SCA:
- DPA: 1
- Leak-Inherent: 4
- physical probing: 1
- other:
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- CCMB-2012-09-004: 2
- FIPS:
- FIPS PUB 180-2: 1
- FIPS PUB 197: 2
- FIPS PUB 46-3: 1
- RFC:
|
- CC:
- CCIMB-2012-09-004: 1
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- FIPS:
- FIPS 180-2: 1
- FIPS 180-3: 1
- FIPS 197: 1
- FIPS 46-3: 1
- FIPS PUB 197: 4
- FIPS PUB 46-3: 5
- FIPS PUB 81: 4
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 9796-2: 1
- PKCS:
- PKCS #1: 5
- PKCS #5: 1
- PKCS#1: 1
- PKCS#5: 1
- RFC:
- SCP:
- SCP 01: 1
- SCP 02: 1
- SCP 80: 1
- SCP02: 5
- SCP80: 8
|
| pdf_data/st_keywords/javacard_version |
|
- GlobalPlatform:
- JavaCard:
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
- javacard:
- javacard.framework: 2
- javacard.security: 2
- javacardx:
- javacardx.crypto: 10
- javacardx.security: 9
|
| pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- out of scope: 1
- parameters for cryptographic operations, the use of these other values are not advised; and clearly out of scope of the TOE. See [USR] for details. JCS.EraseResidualData The security function ensures that: 1
|
| pdf_data/st_metadata |
- /Author: 八木
- /CreationDate: D:20160901154400+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20160901154400+09'00'
- /Producer: Microsoft® Word 2010
- /Subject: CC EAL2 Security Target
- /Title: USP_V ST
- pdf_file_size_bytes: 1477873
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 78
|
- /Author: mhajj
- /CreationDate: D:20150112160126+01'00'
- /Creator: PDFCreator Version 1.7.1
- /Keywords:
- /ModDate: D:20150112160126+01'00'
- /Producer: GPL Ghostscript 9.07
- /Subject:
- /Title: ST_D1314435_DESFIRE_LITE_v1.0p - Copy
- pdf_file_size_bytes: 1874846
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 143
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
False |
| state/cert/download_ok |
False |
False |
| state/cert/extract_ok |
False |
False |
| state/cert/pdf_hash |
Equal |
Equal |
| state/cert/txt_hash |
Equal |
Equal |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |