name |
IBM Enterprise PKCS#11 Firmware FW IDs 'dada00eb' ((4767) and 'e41c1444' (4765) |
Carte Upteq NFC 2.0.4_OFM release B sur composant ST33F1ME (T1020364, release B) |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
DE |
FR |
status |
archived |
archived |
not_valid_after |
26.03.2023 |
01.09.2019 |
not_valid_before |
26.03.2018 |
29.05.2013 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1002c_pdf.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1002a_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2013-28fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1002b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2013-28en.pdf |
manufacturer |
IBM Corporation |
Gemalto / STMicroelectronics |
manufacturer_web |
https://www.ibm.com |
https://www.gemalto.com/ |
security_level |
EAL4 |
EAL4+, ALC_DVS.2, AVA_VAN.5 |
dgst |
4db9ed66ccab7fd5 |
3dcf00d5f9878043 |
heuristics/cert_id |
BSI-DSZ-CC-1002-2018 |
ANSSI-CC-2013/28 |
heuristics/cert_lab |
BSI |
THALES |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
{} |
ADV_ARC.1, ALC_CMC.4, ALC_DVS.2, ADV_FSP.4, ASE_OBJ.2, ASE_SPD.1, AGD_PRE.1, ALC_DEL.1, ATE_FUN.1, ATE_DPT.1, ALC_TAT.1, ATE_COV.2, ASE_ECD.1, ALC_CMS.4, ASE_REQ.2, ALC_LCD.1, ASE_TSS.1, ASE_INT.1, AVA_VAN.5, ADV_IMP.1, ASE_CCL.1, ADV_TDS.3, AGD_OPE.1 |
heuristics/extracted_versions |
4765, 4767, 11 |
2.0.4 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
BSI-DSZ-CC-1094-2019 |
ANSSI-CC-2014/56, ANSSI-CC-2013/27 |
heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2011/07, ANSSI-CC-2012/48 |
heuristics/report_references/indirectly_referenced_by |
BSI-DSZ-CC-1094-2019 |
ANSSI-CC-2014/56, ANSSI-CC-2014/83, ANSSI-CC-2014/96, ANSSI-CC-2013/27 |
heuristics/report_references/indirectly_referencing |
{} |
ANSSI-CC-2010/49, ANSSI-CC-2012/48, ANSSI-CC-2011/77, ANSSI-CC-2011/07, ANSSI-CC-2011/17, ANSSI-CC-2010/50 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
7b81fd67c02d34de |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-cible_PP-2010-04en.pdf |
pdf_data/cert_filename |
1002c_pdf.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
- PKCS:
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20180423082623+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, IBM, PKCS#11 FW IDs 'dada00eb' (4767) and 'e41c1444' (4765)"
- /ModDate: D:20180423142404+02'00'
- /Producer: LibreOffice 5.2
- /Subject: Zertifikat, Certificate, Urkunde
- /Title: Certification Report BSI-DSZ-CC-1002-2018
- pdf_file_size_bytes: 922473
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
1002a_pdf.pdf |
ANSSI-CC_2013-28fr.pdf |
pdf_data/report_frontpage |
- FR:
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 4
- cc_version: Product specific Security Target Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-1002-2018
- cert_item: IBM Enterprise PKCS#11 Firmware FW IDs 'dada00eb' (4767) and 'e41c1444' (4765
- cert_lab: BSI
- developer: IBM Research & Development Germany
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: None
|
- FR:
- cc_security_level: EAL 4 augmenté ALC_DVS.2 et AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 3
- cert_id: ANSSI-CC-2013/28
- cert_item: Carte Upteq NFC 2.0.4_OFM release B sur composant ST33F1ME (T1020364, release B
- cert_item_version: Plateforme Upteq NFC 2.0.4_OFM release B sur composant ST33F1ME (S1121881, release B
- cert_lab: THALES (TCS – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France
- developer: Gemalto La Vigie, Av du Jujubier, ZI Athelia IV, 13705 La Ciotat Cedex, France STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, B.P. 2, 13106 Rousset, France Commanditaire Gemalto La Vigie, Av du Jujubier, ZI Athelia IV, 13705 La Ciotat Cedex, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit \\(référence/version\\)(.+)Nom de la TOE \\(référence/version\\)(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: PPUSIMB], version 2.0.2 (U)SIM Java Card Platform Protection Profile - Basic configuration
- DE:
|
pdf_data/report_keywords/cc_cert_id |
|
- FR:
- ANSSI-CC-2011/07: 4
- ANSSI-CC-2011/07-S01: 1
- ANSSI-CC-2012/48: 2
- ANSSI-CC-2013/28: 20
- ANSSI-CC-PP-2010/04: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 2: 3
- EAL 4: 5
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 2
- EAL 5: 1
- EAL 7: 1
- EAL4: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Gemalto:
- Morpho:
- STMicroelectronics:
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-2: 1
- SHA-224: 1
- SHA-256: 6
- SHA-384: 1
- SHA-512: 1
- SHA256: 1
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
- BSI:
- BSI 7148: 1
- BSI TR-02102: 1
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- AIS 20: 2
- AIS 23: 1
- AIS 32: 1
- FIPS:
- FIPS 180-4: 1
- FIPS 186-3: 1
- FIPS 186-4: 8
- FIPS 197: 1
- FIPS 46-3: 1
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- NIST:
- NIST SP 800-38A: 2
- NIST SP 800-90A: 1
- PKCS:
- RFC:
- X509:
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- EP11 configuration list (BOE) for documentation files, Version 1, 2017-07-14, IBM (confidential document) Hardware configuration list for IBM 4765 and 4767 EP11 HSMs, Version 1.0, 2017- 08-31, IBM: 1
- Report, Version 5, 2018-03-12, Final Evaluation Technical Report, atsec information security GmbH (confidential document) [8] Configuration lists for the TOE: Configuration list of static content measured by SHA256: 1
- Version 1.0, 2016- 12-12, IBM (confidential document) EP11 configuration list BOE, Version 1, 2017-07-14, IBM (confidential document) 7 specifically •: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
|
|
pdf_data/report_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20180423082645+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, IBM, PKCS#11 FW IDs 'dada00eb' (4767) and 'e41c1444' (4765)"
- /ModDate: D:20180423142111+02'00'
- /Producer: LibreOffice 5.2
- /Subject: Certification Report, Zertifizierungsreport
- /Title: Certification Report BSI-DSZ-CC-1002-2018
- pdf_file_size_bytes: 1388431
- pdf_hyperlinks: http://www.commoncriteriaportal.org/cc/, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/AIS, http://www.sogisportal.eu/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 28
|
- /CreationDate:
- /CreationDate--Text:
- /Creator: PDFCreator Version 1.2.1
- /Keywords:
- /ModDate:
- /ModDate--Text:
- /Producer: GPL Ghostscript 9.02
- /Subject:
- /Title:
- pdf_file_size_bytes: 320571
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 19
|
pdf_data/st_filename |
1002b_pdf.pdf |
ANSSI-CC-cible_2013-28en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL4: 4
- EAL4 augmented: 2
- EAL4+: 1
- EAL5: 1
- EAL5 augmented: 1
|
pdf_data/st_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 6
- ADV_FSP.1: 4
- ADV_FSP.2: 2
- ADV_FSP.4: 9
- ADV_IMP.1: 5
- ADV_TDS.1: 2
- ADV_TDS.2: 1
- ADV_TDS.3: 9
- AGD:
- AGD_ADM: 1
- AGD_OPE.1: 10
- AGD_PRE.1: 6
- AGD_USR: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.1: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 2
- ALC_DVS.2: 9
- ALC_LCD.1: 3
- ALC_TAT.1: 3
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 4
- ASE_INT.1: 5
- ASE_OBJ.2: 3
- ASE_REQ.1: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 3
- ATE_DPT.1: 2
- ATE_FUN.1: 6
- AVA:
|
pdf_data/st_keywords/cc_sfr |
|
- FAU:
- FAU_ARP.1: 17
- FAU_ARP.1.1: 1
- FAU_SAA.1: 3
- FAU_SAS.1: 1
- FCO:
- FCS:
- FCS_CKM: 73
- FCS_CKM.1: 23
- FCS_CKM.2: 7
- FCS_CKM.3: 4
- FCS_CKM.4: 45
- FCS_CKM.4.1: 1
- FCS_COP: 59
- FCS_COP.1: 18
- FCS_RND: 2
- FCS_RND.1: 9
- FCS_RND.1.1: 2
- FCS_RNG.1: 2
- FDP:
- FDP_ACC: 48
- FDP_ACC.1: 22
- FDP_ACC.2: 8
- FDP_ACF: 38
- FDP_ACF.1: 25
- FDP_IFC: 46
- FDP_IFC.1: 26
- FDP_IFC.2: 4
- FDP_IFF: 40
- FDP_IFF.1: 28
- FDP_IFF.1.2: 1
- FDP_IFF.1.4: 1
- FDP_ITC: 20
- FDP_ITC.1: 19
- FDP_ITC.2: 33
- FDP_ITT.1: 1
- FDP_RIP: 116
- FDP_RIP.1: 10
- FDP_ROL: 21
- FDP_ROL.1: 7
- FDP_SDI: 6
- FDP_SDI.1: 1
- FDP_SDI.2: 8
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UIT: 12
- FDP_UIT.1: 4
- FIA:
- FIA_ATD: 9
- FIA_ATD.1: 2
- FIA_UAU: 18
- FIA_UAU.1: 2
- FIA_UAU.4: 1
- FIA_UID: 33
- FIA_UID.1: 16
- FIA_UID.2: 1
- FIA_USB: 8
- FIA_USB.1: 3
- FMT:
- FMT_LIM: 1
- FMT_LIM.1: 2
- FMT_LIM.2: 1
- FMT_MOF: 6
- FMT_MOF.1: 1
- FMT_MSA: 173
- FMT_MSA.1: 18
- FMT_MSA.2: 2
- FMT_MSA.3: 27
- FMT_MSA.3.1: 2
- FMT_MTD: 26
- FMT_MTD.1: 3
- FMT_MTD.3: 1
- FMT_REV: 8
- FMT_REV.1: 4
- FMT_SMF: 68
- FMT_SMF.1: 30
- FMT_SMF.1.1: 1
- FMT_SMR: 75
- FMT_SMR.1: 48
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNO: 5
- FPR_UNO.1: 11
- FPR_UNO.1.1: 1
- FPT:
- FPT_FLS: 61
- FPT_FLS.1: 8
- FPT_FLS.1.1: 1
- FPT_ITT: 12
- FPT_ITT.1: 3
- FPT_PHP.3: 1
- FPT_RCV: 22
- FPT_RCV.3: 12
- FPT_RCV.4: 2
- FPT_TDC.1: 10
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST.1: 1
- FPT_UNO: 1
- FRU:
- FTP:
- FTP_ITC: 24
- FTP_ITC.1: 10
- FTP_TRP.1: 4
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.APPLET: 5
- A.APPS-PROVIDER: 4
- A.CONTROLLING-: 2
- A.CONTROLLING-AUTHORITY: 2
- A.DELETION: 2
- A.KEY-ESCROW: 5
- A.MOBILE-OPERATOR: 4
- A.OTA-ADMIN: 4
- A.PERSONALIZER: 4
- A.PRODUCTION: 4
- A.VERIFICATION: 4
- A.VERIFICATION-: 2
- A.VERIFICATION-AUTHORITY: 2
- D:
- D.API_DATA: 3
- D.APP_CODE: 8
- D.APP_C_DATA: 5
- D.APP_I_DATA: 6
- D.APSD_KEYS: 3
- D.CARD_MNGT_DATA: 3
- D.CASD_KEYS: 3
- D.CRYPTO: 4
- D.GP_CODE: 1
- D.ISD_KEYS: 3
- D.JCS_CODE: 3
- D.JCS_DATA: 5
- D.OPTIONAL_PF_SERVICE: 2
- D.PIN: 4
- D.SEC_DATA: 7
- D.VASD_KEYS: 2
- O:
- O.ALARM: 21
- O.APPLET: 21
- O.APPLI-: 1
- O.APPLI-AUTH: 10
- O.CARD-: 5
- O.CARD-MANAGEMENT: 49
- O.CARD_MANAGEMENT: 2
- O.CIPHER: 25
- O.CODE_PKG: 14
- O.COMM_AUTH: 16
- O.COMM_CONFIDENTIALITY: 13
- O.COMM_INTEGRITY: 16
- O.DELETION: 15
- O.DOMAIN-: 9
- O.DOMAIN-RIGHTS: 19
- O.FIREWALL: 52
- O.GLOBAL_ARRAYS_CONFID: 18
- O.GLOBAL_ARRAYS_INTEG: 11
- O.INSTALL: 16
- O.JAVAOBJECT: 41
- O.KEY-: 2
- O.KEY-MNGT: 33
- O.LOAD: 16
- O.NATIVE: 13
- O.OBJ-DELETION: 8
- O.OPERATE: 36
- O.PIN-: 7
- O.PIN-MNGT: 15
- O.REALLOCATION: 16
- O.REMOTE: 15
- O.REMOTE_MTHD: 6
- O.REMOTE_OBJ: 10
- O.REMOTE_SERVICE_ACTIVATION: 11
- O.REMOTE_SERVICE_AUDIT: 11
- O.RESOURCES: 26
- O.RMI_SERVICE: 12
- O.RND: 10
- O.ROR: 5
- O.SCP: 28
- O.SCP-: 3
- O.SCP-SUPPORT: 19
- O.SID: 36
- O.TRANSACTION: 19
- OE:
- OE.ACTIVATION-: 1
- OE.ACTIVATION-KEY-ESCROW: 6
- OE.AID-MANAGEMENT: 6
- OE.AP-KEYS: 6
- OE.APPLET: 9
- OE.APPS-PROVIDER: 6
- OE.BASIC-: 4
- OE.BASIC-APPS-: 6
- OE.BASIC-APPS-VALIDATION: 16
- OE.CA-KEYS: 8
- OE.CARD_MANAGEMENT: 2
- OE.CONTROLLING-: 1
- OE.CONTROLLING-AUTHORITY: 5
- OE.GEMACTIVATE-ADMIN: 5
- OE.KEY-CHANGE: 7
- OE.KEY-ESCROW: 7
- OE.KEY-GENERATION: 4
- OE.MOBILE-OPERATOR: 6
- OE.OPERATOR-KEYS: 6
- OE.OTA-ADMIN: 4
- OE.OTA-LOADING: 4
- OE.OTA-SERVERS: 6
- OE.PERSONALIZER: 4
- OE.PRODUCTION: 5
- OE.QUOTAS: 6
- OE.SCP: 3
- OE.SECURE-APPS-CERTIFICATION: 4
- OE.SECURITY-DOMAINS: 4
- OE.SHARE-CONTROL: 6
- OE.TRUSTED-APPS-DEVELOPER: 7
- OE.TRUSTED-APPS-PRE-ISSUANCE: 5
- OE.VA-KEYS: 7
- OE.VERIFICATION: 34
- OE.VERIFICATION-: 1
- OE.VERIFICATION-AUTHORITY: 3
- OP:
- OP.ARRAY_ACCESS: 4
- OP.CREATE: 7
- OP.DELETE_APPLET: 4
- OP.DELETE_PCKG: 3
- OP.DELETE_PCKG_APPLET: 3
- OP.GET_ROR: 3
- OP.INSTANCE_FIELD: 4
- OP.INVK_INTERFACE: 7
- OP.INVK_VIRTUAL: 6
- OP.INVOKE: 3
- OP.JAVA: 5
- OP.PUT: 6
- OP.RET_RORD: 3
- OP.THROW: 5
- OP.TYPE_ACCESS: 5
- OSP:
- OSP.ACTIVATION-KEY-ESCROW: 5
- OSP.AID-MANAGEMENT: 4
- OSP.APSD-KEYS: 4
- OSP.BASIC-: 1
- OSP.BASIC-APPS-VALIDATION: 3
- OSP.CASD-KEYS: 4
- OSP.KEY-CHANGE: 4
- OSP.KEY-GENERATION: 4
- OSP.OPERATOR-KEYS: 4
- OSP.OTA-LOADING: 4
- OSP.OTA-SERVERS: 4
- OSP.QUOTAS: 4
- OSP.RNG: 5
- OSP.SECURE-APPS-: 2
- OSP.SECURE-APPS-CERTIFICATION: 2
- OSP.SECURITY-DOMAINS: 4
- OSP.SERVICE: 1
- OSP.SERVICE_AUDIT: 4
- OSP.SHARE-CONTROL: 4
- OSP.TRUSTED-: 1
- OSP.TRUSTED-APPS-DEVELOPER: 5
- OSP.TRUSTED-APPS-PRE-: 2
- OSP.TRUSTED-APPS-PRE-ISSUANCE: 2
- OSP.VASD-KEYS: 4
- OSP.VERIFICATION: 5
- R:
- T:
- T.COM_EXPLOIT: 6
- T.CONFID-APPLI-DATA: 18
- T.CONFID-JCS-: 9
- T.CONFID-JCS-CODE: 5
- T.CONFID-JCS-DATA: 4
- T.DELETION: 7
- T.EXE-: 1
- T.EXE-CODE: 11
- T.EXE-CODE-REMOTE: 4
- T.INSTALL: 6
- T.INTEG-: 10
- T.INTEG-APPLI-: 7
- T.INTEG-APPLI-CODE: 9
- T.INTEG-APPLI-DATA: 16
- T.INTEG-JCS-CODE: 7
- T.INTEG-JCS-DATA: 6
- T.INTEG-USER-DATA: 9
- T.LIFE_CYCLE: 6
- T.NATIVE: 7
- T.OBJ-DELETION: 4
- T.PHYSICAL: 5
- T.RESOURCES: 8
- T.SID: 18
- T.UNAUTHORIZED_ACCESS: 4
- T.UNAUTHORIZED_ACCESS_TO_SERVIC: 1
- T.UNAUTHORIZED_ACCESS_TO_SERVICE: 5
- T.UNAUTHORIZED_CARD_MNGT: 9
|
pdf_data/st_keywords/vendor |
|
- Gemalto:
- Morpho:
- STMicroelectronics:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
- miscellaneous:
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-224: 5
- SHA-256: 14
- SHA-384: 4
- SHA-512: 4
|
- MD:
- SHA:
- SHA1:
- SHA2:
- SHA-2: 3
- SHA-224: 2
- SHA-256: 3
- SHA-384: 3
- SHA2: 2
|
pdf_data/st_keywords/crypto_scheme |
- KA:
- Key Agreement: 2
- Key agreement: 1
- KEX:
- MAC:
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-192: 8
- P-224: 8
- P-256: 8
- P-384: 8
- P-521: 8
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 3
- malfunction: 2
- SCA:
|
- FI:
- fault induction: 2
- malfunction: 3
- physical tampering: 4
- SCA:
- DPA: 1
- physical probing: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- BSI:
- FIPS:
- FIPS 140-2: 3
- FIPS 180-4: 1
- FIPS 186-4: 1
- FIPS 197: 4
- ISO:
- PKCS:
- PKCS 11: 1
- PKCS#11: 153
- PKCS1: 5
- PKCS11: 1
- PKCS12: 1
- RFC:
- RFC 3394: 1
- RFC 3447: 11
- RFC 5649: 1
- X509:
|
- CC:
- CCIMB-2009-07-001: 1
- CCIMB-2009-07-002: 1
- CCIMB-2009-07-003: 1
- CCIMB-2009-07-004: 1
- FIPS:
- FIPS 140-2: 1
- FIPS 180-2: 1
- FIPS 180-3: 1
- FIPS 197: 1
- FIPS 46-3: 1
- FIPS PUB 197: 2
- FIPS PUB 46-3: 3
- FIPS PUB 81: 4
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 9796-2: 1
- PKCS:
- PKCS #1: 5
- PKCS #5: 1
- PKCS#1: 3
- PKCS#5: 1
- RFC:
- SCP:
- SCP 01: 1
- SCP 02: 1
- SCP 80: 1
- SCP02: 5
- SCP80: 8
|
pdf_data/st_keywords/javacard_version |
|
- GlobalPlatform:
- Global Platform 2.2.1: 1
- Global Platform 2.2.2: 1
- JavaCard:
- Java Card 2.2.2: 2
- Java Card 3.0.1: 1
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
- java:
- javacard:
- javacard.framework: 2
- javacard.framework.service: 1
- javacard.security: 2
- javacardx:
- javacardx.crypto: 10
- javacardx.rmi: 1
- javacardx.security: 9
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.SCP.RECOVERY and O.SCP-SUPPORT are: 1
- out of scope: 2
- parameters for cryptographic operations, the use of these other values are not advised; and clearly out of scope of the TOE. See [USR] for details. JCS.EraseResidualData The security function ensures that: 1
|
pdf_data/st_metadata |
- /Author: Visegrady, Tamas <tvi (at) zurich.ibm.com>
- /CreationDate: D:20170830165958+02'00'
- /Creator: IBM Research --- Zurich and IBM Boeblingen/Poughkeepsie
- /Keywords: IBM 4767 (hw. 00LV498 (2)); PCIeCC; XCP, Enterprise PKCS11 (EP11)
- /ModDate: D:20170830165958+02'00'
- /PTEX.Fullbanner: This is pdfTeX, Version 3.14159265-2.6-1.40.18 (TeX Live 2017/TeX Live for SUSE Linux) kpathsea version 6.2.3
- /Producer: pdfTeX
- /Subject: Security Policy [rev. 273]
- /Title: IBM Enterprise PKCS11(on 4767) Security Target (EAL 4 )
- /Trapped: /False
- pdf_file_size_bytes: 840064
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 52
|
- /CreationDate: D:20121001120716+02'00'
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20130711165213+02'00'
- /Producer: Microsoft® Office Word 2007
- /Title:
- pdf_file_size_bytes: 2345844
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 177
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |