name |
Symfoware Server Enterprise extended Edtion 4.0 |
Application Mobile PayPass 1.0.13vA.2.4 (S1133159, release B) sur plateforme Orange NFC V2 G1 configuration MIFARE activé ou configuration MIFARE désactivé sur composant ST33F1ME |
category |
Databases |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
FR |
status |
archived |
archived |
not_valid_after |
10.12.2010 |
05.01.2020 |
not_valid_before |
26.11.2003 |
05.01.2015 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0003.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2014_96.pdf |
st_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi_cible2014_96_LITE.pdf |
manufacturer |
Fujitsu Limited |
Gemalto / STMicroelectronics |
manufacturer_web |
https://www.fujitsu.com/ |
https://www.gemalto.com/ |
security_level |
EAL4 |
EAL4+, ALC_DVS.1, AVA_VAN.5 |
dgst |
505e2adba5d4a6cf |
4a0f237a4ae5cd9a |
heuristics/cert_id |
JISEC-CC-CRP-C0003 |
ANSSI-CC-2014/96 |
heuristics/cert_lab |
[] |
THALES |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
{} |
ASE_INT.1, ASE_COMP.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ASE_CCL.1 |
heuristics/extracted_versions |
4.0 |
1.0.13, 2.4 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2014/83, ANSSI-CC-2013/56 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
ANSSI-CC-2013/27, ANSSI-CC-2014/83, ANSSI-CC-2010/49, ANSSI-CC-2014/56, ANSSI-CC-2012/11, ANSSI-CC-2013/28, ANSSI-CC-2011/17, ANSSI-CC-2012/49, ANSSI-CC-2012/48, ANSSI-CC-2013/56, ANSSI-CC-2011/07, ANSSI-CC-2011/77, ANSSI-CC-2010/50, ANSSI-CC-2013/18 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0133
- certification_date: 01.11.2007
- claim: EAL1
- enhanced:
- assurance_level: EAL1
- cc_version: 2.3
- description: PRODUCT DESCRIPTION The TOE enables users to manage operations to execute jobs based on predefined daily schedule on distributed servers on enterprise internal networks. The TOE also enables users to manage those operations in a secure manner although systems are becoming diverse and getting complex. The TOE defines “Job execution based on predefined daily schedule” process and its related resources as protected resources. The TOE provides following security functions to prohibit unauthorized access to the protected resources. - "Extended user authentication function" to identify and authenticate users. - "Access control function" to restrict user operations to authorized users - "Audit log output function" to verify user operations - "Password protection function" to protect passwords from being sniffed sent over enterprise internal networks
- evaluation_facility: Japan Electronics and Information Technology Industries Association, Information Technology Security Center (JEITA ITSC)
- product: Systemwalker Operation Manager Enterprise Edition
- product_type: IT Product (Operation and maintenance supporting software)
- toe_version: V13.2.0 (Linux for Itanium)
- vendor: Fujitsu Limited
- expiration_date: 01.10.2013
- supplier: Fujitsu Limited
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0133_it7150.html
- toe_japan_name: Systemwalker Operation Manager Enterprise Edition V13.2.0 (Linux for Itanium)
- toe_overseas_link: None
- toe_overseas_name: -----
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0003.pdf |
anssi-cc-2014_96.pdf |
pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 4 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 4
- cert_id: ANSSI-CC-2014/96
- cert_item: Carte Mobile PayPass 1.0.13vA.2.4 sur plateforme Orange NFC V2 G1 configuration MIFARE activé ou configuration MIFARE désactivé sur composant ST33F1ME (S1133159B/S1105439B
- cert_item_version: Application Mobile PayPass 1.0.13vA.2.4 (S1133159, release B) sur plateforme Orange NFC V2 G1 configuration MIFARE activé ou configuration MIFARE désactivé sur composant ST33F1ME
- cert_lab: THALES (TCS – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France
- developer: Gemalto La Vigie, Av du Jujubier, ZI Athelia IV, 13705 La Ciotat Cedex, France STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, B.P. 2, 13106 Rousset, France Commanditaire Gemalto La Vigie, Av du Jujubier, ZI Athelia IV, 13705 La Ciotat Cedex, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit \\(référence/version\\)(.+)Nom de la TOE \\(référence/version\\)(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: néant
|
pdf_data/report_keywords/cc_cert_id |
|
- FR:
- ANSSI-CC-2013/56: 5
- ANSSI-CC-2013/56-S01: 1
- ANSSI-CC-2014/83: 1
- ANSSI-CC-2014/96: 22
- ANSSI-CC-PP-2010/04: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 1
- EAL 5: 1
- EAL 7: 1
- EAL4: 4
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Gemalto:
- STMicroelectronics:
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20040526154221+09'00'
- /ModDate: D:20040526154221+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 12495
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author: robert-n
- /CreationDate: D:20150107163115+01'00'
- /Creator: Microsoft® Word 2010
- /Keywords: ANSSI-CC-CER-F-07.008
- /ModDate: D:20150107163115+01'00'
- /Producer: Microsoft® Word 2010
- /Subject: Application Mobile PayPass 1.0.13vA.2.4 (S1133159, release B) sur plateforme Orange NFC V2 G1 configuration MIFARE activé ou configuration MIFARE désactivé sur composant ST33F1ME
- /Title: ANSSI-CC-2014/96
- pdf_file_size_bytes: 753229
- pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 21
|
pdf_data/st_filename |
|
anssi_cible2014_96_LITE.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 1
- EAL4: 3
- EAL4 augmented: 2
- EAL4+: 2
|
pdf_data/st_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 5
- ADV_FSP.1: 3
- ADV_FSP.2: 2
- ADV_FSP.4: 9
- ADV_IMP: 1
- ADV_IMP.1: 4
- ADV_TDS.1: 2
- ADV_TDS.2: 1
- ADV_TDS.3: 8
- AGD:
- AGD_OPE.1: 5
- AGD_PRE.1: 5
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.1: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 6
- ALC_LCD.1: 3
- ALC_TAT.1: 3
- ASE:
- ASE_CCL.1: 1
- ASE_COMP.1: 1
- ASE_ECD.1: 4
- ASE_INT.1: 5
- ASE_OBJ.2: 3
- ASE_REQ.1: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 3
- ATE_DPT.1: 2
- ATE_FUN.1: 6
- AVA:
|
pdf_data/st_keywords/cc_sfr |
|
- FAU:
- FAU_ARP.1: 9
- FAU_ARP.1.1: 1
- FAU_GEN.1: 13
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAA.1: 10
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 2
- FAU_SAR: 15
- FAU_SAR.1: 4
- FCO:
- FCS:
- FCS_CKM: 27
- FCS_CKM.1: 7
- FCS_CKM.2: 1
- FCS_CKM.4: 13
- FCS_COP: 63
- FCS_COP.1: 6
- FCS_RND.1: 1
- FDP:
- FDP_ACC: 155
- FDP_ACC.1: 14
- FDP_ACC.2: 14
- FDP_ACF: 140
- FDP_ACF.1: 35
- FDP_ACF.1.2: 7
- FDP_ACF.1.3: 1
- FDP_DAU.1: 7
- FDP_DAU.1.1: 1
- FDP_DAU.1.2: 1
- FDP_ETC.1: 16
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_IFC: 85
- FDP_IFC.1: 11
- FDP_IFC.2: 8
- FDP_IFF: 70
- FDP_IFF.1: 24
- FDP_IFF.1.2: 4
- FDP_ITC: 32
- FDP_ITC.1: 26
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 16
- FDP_RIP: 8
- FDP_RIP.1: 8
- FDP_RIP.1.1: 1
- FDP_ROL: 2
- FDP_RPL.1: 1
- FDP_SDI: 1
- FDP_SDI.2: 6
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UIT: 2
- FDP_UIT.1: 14
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL: 20
- FIA_AFL.1: 6
- FIA_ATD: 1
- FIA_ATD.1: 10
- FIA_ATD.1.1: 1
- FIA_SOS: 1
- FIA_SOS.2: 9
- FIA_SOS.2.1: 1
- FIA_SOS.2.2: 1
- FIA_UAU: 48
- FIA_UAU.1: 8
- FIA_UAU.3: 8
- FIA_UAU.3.1: 1
- FIA_UAU.3.2: 1
- FIA_UAU.4: 9
- FIA_UAU.4.1: 1
- FIA_UAU.6: 1
- FIA_UID: 30
- FIA_UID.1: 10
- FIA_USB: 1
- FIA_USB.1: 9
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF: 9
- FMT_MOF.1: 1
- FMT_MSA: 26
- FMT_MSA.1: 3
- FMT_MSA.2: 5
- FMT_MSA.2.1: 1
- FMT_MSA.3: 31
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 8
- FMT_MTD.1: 1
- FMT_REV: 1
- FMT_SMF: 14
- FMT_SMF.1: 6
- FMT_SMR: 6
- FMT_SMR.1: 21
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNO: 1
- FPR_UNO.1: 6
- FPR_UNO.1.1: 1
- FPT:
- FPT_FLS: 6
- FPT_ITC.1: 1
- FPT_ITT: 2
- FPT_RCV: 3
- FPT_RPL: 1
- FPT_RPL.1: 4
- FPT_RPL.1.1: 1
- FPT_RPL.1.2: 1
- FPT_STM.1: 3
- FPT_TDC.1: 19
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST.1: 7
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 2
- FTP_ITC.1: 10
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 3
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.APPLET: 1
- A.APPS-PROVIDER: 1
- A.CONTROLLING-AUTHORITY: 1
- A.MERCHANT_AUTH: 5
- A.MOBILE-OPERATOR: 1
- A.OTA-ADMIN: 1
- A.VERIFICATION: 1
- A.VERIFICATION-AUTHORITY: 1
- O:
- O.ALARM: 1
- O.APPLI-AUTH: 2
- O.APPLI_AUTH: 1
- O.APP_BLOCK: 15
- O.AUDIT: 14
- O.AUDIT_ACCESS: 10
- O.AUTHORISATION_CONTROL: 20
- O.CARD-MANAGEMENT: 1
- O.CHANNELS: 9
- O.CIPHER: 1
- O.COMM-: 1
- O.COMM-AUTH: 1
- O.COMM-INTEGRITY: 1
- O.COMM_AUTH: 3
- O.DATA_DISCLOSURE: 46
- O.DATA_INTEGRITY: 63
- O.DATA_USERS: 12
- O.DELETION: 1
- O.DOMAIN-RIGHTS: 1
- O.FIREWALL: 1
- O.GLOBAL-ARRAYS-CONFID: 1
- O.GLOBAL-ARRAYS-INTEG: 1
- O.GUIS_AUTH: 15
- O.INSTALL: 1
- O.ISSUING_BANK_AUTH: 54
- O.KEY-MNGT: 1
- O.LOAD: 1
- O.MNO_AUTH: 8
- O.NATIVE: 1
- O.OBJ-DELETION: 1
- O.OPERATE: 1
- O.PIN-MNGT: 1
- O.REALLOCATION: 1
- O.REMOTE: 1
- O.REMOTE_SERVICE_ACTIVCATION: 1
- O.REMOTE_SERVICE_AUDIT: 1
- O.RESSOURCES: 1
- O.RISK_MNGT: 20
- O.RNG: 1
- O.SCP: 2
- O.SID: 1
- O.SIM_UNLOCK: 10
- O.TRANSACTION: 1
- O.TRANSACTION_BYPASS: 53
- O.TRANSACTION_INTEGRITY: 38
- O.TRANSACTION_REPLAY: 11
- O.TRANSACTION_UNIQUENESS: 36
- O.USER_AUTH: 53
- OE:
- OE.ACTIVATION-KEY-ESCROW: 1
- OE.AID-MANAGEMENT: 1
- OE.AP-KEYS: 1
- OE.APPLET: 1
- OE.APPS-PROVIDER: 1
- OE.BANKS_PRIVILEGES: 4
- OE.BASIC-APPS-VALIDATION: 1
- OE.CA-KEYS: 1
- OE.CERTIFICATES_MNGT: 10
- OE.CHANNELS_SELECTION: 3
- OE.CONTROLLING-AUTHORITY: 1
- OE.CUSTOMER_PC_CONFID: 8
- OE.GUIS_IDENTIFICATION: 5
- OE.GUIS_TIMEOUT: 4
- OE.GUI_INST_ALERT: 7
- OE.KEY-CHANGE: 1
- OE.KEY-ESCROW: 1
- OE.KEY-GENERATION: 1
- OE.LATENCY_CONTROL: 5
- OE.MERCHANT_AUTH: 8
- OE.MERCHANT_CONTROL: 7
- OE.MOBILE-OPERATOR: 1
- OE.NFC_PROTOCOL: 5
- OE.NO_VAD: 6
- OE.OPERATOR-KEYS: 1
- OE.OTA-ADMIN: 1
- OE.OTA-LOADING: 1
- OE.OTA-SERVERS: 1
- OE.PERSONALIZER: 1
- OE.POLICY: 5
- OE.POS_APPLICATIONS: 10
- OE.POS_APPROVAL: 7
- OE.POS_DEACTIVATION: 6
- OE.PRODUCTION: 1
- OE.QUOTAS: 1
- OE.SECURE-APPS-CERTIFICATION: 1
- OE.SECURITY-DOMAINS: 1
- OE.SHARE-CONTROL: 1
- OE.TOE_USAGE: 9
- OE.TRANSACTION_DISPLAY: 5
- OE.TRUSTED-APPS-DEVELOPER: 1
- OE.TRUSTED-APPS-PRE-ISSUANCE-LOADING: 1
- OE.VA-KEYS: 1
- OE.VERIFICATION: 1
- OE.VERIFICATION-AUTHORITY: 1
- OSP:
- OSP: 2
- OSP.ACTIVATION-KEY-ESCROW: 1
- OSP.AID-MANAGEMENT: 1
- OSP.APSD-KEYS: 1
- OSP.BANKS_PRIVILEGES: 4
- OSP.BASIC-APPS-VALIDATION: 1
- OSP.CASD-KEYS: 1
- OSP.CERTIFICATES_MNGT: 4
- OSP.CUSTOMER_PC_CONFID: 4
- OSP.GUIS_IDENTIFICATION: 4
- OSP.KEY-CHANGE: 1
- OSP.KEY-ESCROW: 1
- OSP.KEY-GENERATION: 1
- OSP.MERCHANT_CONTROL: 6
- OSP.OPERATOR-KEYS: 1
- OSP.OTA-LOADING: 1
- OSP.OTA-SERVERS: 1
- OSP.PERSONALIZER: 1
- OSP.PISHING: 4
- OSP.POLICY: 4
- OSP.PRODUCTION: 1
- OSP.QUOTAS: 1
- OSP.RND: 1
- OSP.SECURE-APPS-CERTIFICATION: 1
- OSP.SECURITY-DOMAINS: 1
- OSP.SERVICE_AUDIT: 1
- OSP.SHARE-CONTROL: 1
- OSP.TOE_USAGE: 4
- OSP.TRUSTED-APPS-DEVELOPER: 1
- OSP.TRUSTED-APPS-PRE-ISSUANCE-LOADING: 1
- OSP.VASD-KEYS: 1
- OSP.VERIFICATION: 1
- T:
- T.APPLICATIONS_DOS: 6
- T.CERTIF_CORRUPTION: 5
- T.COM-EXPLOIT: 1
- T.CONFID-APPLI-DATA: 1
- T.CONFID-JCS-DATA: 1
- T.CUSTOMER_USURPATION: 7
- T.DELETION: 1
- T.DISCLOSURE: 4
- T.DISCLOSURE_KEYS: 6
- T.DISCLOSURE_REF_PC: 6
- T.EXE-CODE: 1
- T.EXE-CODE-REMOTE: 1
- T.INTEG: 7
- T.INTEG-APPLI-CODE: 2
- T.INTEG-APPLI-DATA: 2
- T.INTEG-JCS-CODE: 1
- T.INTEG-JCS-DATA: 1
- T.INTEG_ACCOUNT_INFO: 7
- T.INTEG_COUNT: 7
- T.INTEG_KEYS: 8
- T.INTEG_LOG_FILE: 6
- T.INTEG_REF_PC: 6
- T.INTEG_SEL_ACT_PARAM: 12
- T.INTEG_TRANS_PARAM: 8
- T.ISSUING-: 2
- T.ISSUING-BANK_USURPATION: 3
- T.LIFE-CYCLE: 1
- T.MAN-IN-THE-MIDDLE: 11
- T.MERCHANT_ACCOMPLICE: 9
- T.MNO_USURPATION: 5
- T.NATIVE: 1
- T.PHYSICAL: 1
- T.RESOURCES: 1
- T.STEALING: 9
- T.TEMPORARY_DATA: 8
- T.TRANSACTION: 1
- T.TRANSACTION_COUNTERFEITING: 12
- T.TRANSACTION_REPLAY: 8
- T.TRANSACTION_REPUDIATION: 7
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_ACCESS_TO_SERVICE: 1
- T.UNAUTHORIZED_CARD_MNGT: 1
|
pdf_data/st_keywords/vendor |
|
- Gemalto:
- STMicroelectronics:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- fault induction: 2
- malfunction: 1
- physical tampering: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
- /Author: cteri
- /CreationDate: D:20141020171815+02'00'
- /Creator: Microsoft® Office Word 2007
- /Keywords: MPP
- /ModDate: D:20141020171815+02'00'
- /Producer: Microsoft® Office Word 2007
- /Subject: CTL Mastercard Payment Application (MPP)
- /Title: Mobile PayPass 1.0.13vA.2.4 on Orange NFC V2 G1 with or without MIFARE ACTIVATED - Public Security Target
- pdf_file_size_bytes: 2637615
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 133
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
True |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
False |
True |
state/st/download_ok |
False |
True |
state/st/extract_ok |
False |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |