name |
Symfoware Server Enterprise extended Edtion 4.0 |
Carte UpTeq NFC3.2.2_Generic v1.0 sur composant ST33G1M2-F |
category |
Databases |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
FR |
status |
archived |
archived |
not_valid_after |
10.12.2010 |
31.03.2025 |
not_valid_before |
26.11.2003 |
23.05.2016 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat%20ANSSI-CC-2016_22-S04.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0003.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2016-22.pdf |
st_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Cible-Lite-2016-22.pdf |
manufacturer |
Fujitsu Limited |
Gemalto / STMicroelectronics |
manufacturer_web |
https://www.fujitsu.com/ |
https://www.gemalto.com/ |
security_level |
EAL4 |
ALC_DVS.2, EAL4+, AVA_VAN.5 |
dgst |
505e2adba5d4a6cf |
ba5484f422a0a49b |
heuristics/cert_id |
JISEC-CC-CRP-C0003 |
ANSSI-CC-2016/22 |
heuristics/cert_lab |
[] |
SERMA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
{} |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, ADV_COMP.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ADV_FSP.4, ASE_CCL.1 |
heuristics/extracted_versions |
4.0 |
3.2.2, 1.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2016/31 |
heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2014/46 |
heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2016/31 |
heuristics/report_references/indirectly_referencing |
{} |
ANSSI-CC-2014/46 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0133
- certification_date: 01.11.2007
- claim: EAL1
- enhanced:
- assurance_level: EAL1
- cc_version: 2.3
- description: PRODUCT DESCRIPTION The TOE enables users to manage operations to execute jobs based on predefined daily schedule on distributed servers on enterprise internal networks. The TOE also enables users to manage those operations in a secure manner although systems are becoming diverse and getting complex. The TOE defines “Job execution based on predefined daily schedule” process and its related resources as protected resources. The TOE provides following security functions to prohibit unauthorized access to the protected resources. - "Extended user authentication function" to identify and authenticate users. - "Access control function" to restrict user operations to authorized users - "Audit log output function" to verify user operations - "Password protection function" to protect passwords from being sniffed sent over enterprise internal networks
- evaluation_facility: Japan Electronics and Information Technology Industries Association, Information Technology Security Center (JEITA ITSC)
- product: Systemwalker Operation Manager Enterprise Edition
- product_type: IT Product (Operation and maintenance supporting software)
- toe_version: V13.2.0 (Linux for Itanium)
- vendor: Fujitsu Limited
- expiration_date: 01.10.2013
- supplier: Fujitsu Limited
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0133_it7150.html
- toe_japan_name: Systemwalker Operation Manager Enterprise Edition V13.2.0 (Linux for Itanium)
- toe_overseas_link: None
- toe_overseas_name: -----
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
ANSSI-CC-2014/46 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
ANSSI-CC-2014/46 |
heuristics/protection_profiles |
{} |
7b81fd67c02d34de |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-cible_PP-2010-04en.pdf |
pdf_data/cert_filename |
|
certificat ANSSI-CC-2016_22-S04.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author:
- /CreationDate: D:20201222180522+01'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20201222180522+01'00'
- /Producer: Acrobat Distiller 11.0 (Windows)
- /Title:
- pdf_file_size_bytes: 275772
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
c0003.pdf |
ANSSI-CC-2016-22.pdf |
pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 4 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 4
- cert_id: ANSSI-CC-2016/22
- cert_item: Carte UpTeq NFC3.2.2_Generic v1.0 sur composant ST33G1M2-F
- cert_item_version: T1032507, Release A
- cert_lab: Serma Safety & Security 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
- developer: Gemalto La Vigie, Av du Jujubier ZI Athelia IV, 13705 La Ciotat Cedex, France STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, B.P. 2, 13106 Rousset, France Commanditaire Gemalto La Vigie, Av du Jujubier ZI Athelia IV, 13705 La Ciotat Cedex, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: PPUSIMB], version 2.0.2, (U)SIM Java Card Platform Protection Profile - Basic configuration
|
pdf_data/report_keywords/cc_cert_id |
|
- FR:
- ANSSI-CC-2014/46: 4
- ANSSI-CC-2014/46-S01: 1
- ANSSI-CC-2016/22: 19
- ANSSI-CC-PP-2010/04: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 2
- EAL 5: 1
- EAL 7: 1
- EAL2: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- AGD_APP: 3
- AGD_OPE: 1
- AGD_PRE: 1
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Gemalto:
- STMicroelectronics:
|
pdf_data/report_keywords/eval_facility |
|
- Serma:
- Serma Safety & Security: 1
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20040526154221+09'00'
- /ModDate: D:20040526154221+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 12495
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author:
- /CreationDate:
- /Creator: PDFCreator Version 1.2.1
- /Keywords:
- /ModDate:
- /Producer: GPL Ghostscript 9.02
- /Subject:
- /Title: Rapport ptf
- pdf_file_size_bytes: 215543
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 18
|
pdf_data/st_filename |
|
Cible-Lite-2016-22.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- FR:
- ANSSI-CC-2014/46: 1
- ANSSI-CC-PP-2010/03: 1
- NL:
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL4: 4
- EAL4 augmented: 2
- EAL4+: 2
- EAL5+: 1
|
pdf_data/st_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 5
- ADV_COMP.1: 2
- ADV_FSP.1: 3
- ADV_FSP.2: 2
- ADV_FSP.4: 9
- ADV_IMP.1: 4
- ADV_TDS.1: 2
- ADV_TDS.2: 1
- ADV_TDS.3: 4
- AGD:
- AGD_ADM: 1
- AGD_OPE.1: 9
- AGD_PRE.1: 3
- AGD_USR: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.1: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 5
- ALC_LCD.1: 3
- ALC_TAT.1: 3
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 4
- ASE_INT.1: 4
- ASE_OBJ.2: 2
- ASE_REQ.1: 2
- ASE_REQ.2: 1
- ASE_SPD.1: 3
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 3
- ATE_DPT.1: 2
- ATE_FUN.1: 5
- AVA:
|
pdf_data/st_keywords/cc_sfr |
|
- FAU:
- FAU_ARP.1: 19
- FAU_ARP.1.1: 1
- FAU_SAA.1: 3
- FAU_SAS.1: 2
- FCO:
- FCS:
- FCS_CKM: 105
- FCS_CKM.1: 28
- FCS_CKM.2: 10
- FCS_CKM.3: 5
- FCS_CKM.4: 57
- FCS_CKM.4.1: 1
- FCS_COP: 70
- FCS_COP.1: 23
- FCS_RND: 1
- FCS_RND.1: 10
- FCS_RND.1.1: 2
- FCS_RNG.1: 2
- FDP:
- FDP_ACC: 39
- FDP_ACC.1: 23
- FDP_ACC.2: 6
- FDP_ACF: 30
- FDP_ACF.1: 26
- FDP_IFC: 31
- FDP_IFC.1: 21
- FDP_IFC.2: 4
- FDP_IFF: 25
- FDP_IFF.1: 22
- FDP_IFF.1.2: 1
- FDP_IFF.1.4: 1
- FDP_ITC: 18
- FDP_ITC.1: 24
- FDP_ITC.2: 37
- FDP_ITT.1: 2
- FDP_RIP: 70
- FDP_RIP.1: 10
- FDP_ROL: 18
- FDP_ROL.1: 7
- FDP_SDI.2: 6
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UIT: 12
- FDP_UIT.1: 4
- FIA:
- FIA_ATD: 12
- FIA_ATD.1: 3
- FIA_UAU: 15
- FIA_UAU.1: 2
- FIA_UAU.4: 1
- FIA_UID: 28
- FIA_UID.1: 15
- FIA_UID.2: 1
- FIA_USB: 6
- FIA_USB.1: 3
- FMT:
- FMT_LIM.1: 5
- FMT_LIM.2: 5
- FMT_MOF: 7
- FMT_MOF.1: 1
- FMT_MSA: 123
- FMT_MSA.1: 18
- FMT_MSA.2: 2
- FMT_MSA.3: 26
- FMT_MSA.3.1: 2
- FMT_MTD: 20
- FMT_MTD.1: 3
- FMT_MTD.3: 1
- FMT_SMF: 45
- FMT_SMF.1: 28
- FMT_SMF.1.1: 1
- FMT_SMR: 51
- FMT_SMR.1: 39
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNO: 5
- FPR_UNO.1: 11
- FPR_UNO.1.1: 1
- FPT:
- FPT_FLS: 50
- FPT_FLS.1: 9
- FPT_FLS.1.1: 1
- FPT_ITT: 5
- FPT_ITT.1: 3
- FPT_PHP.3: 2
- FPT_RCV: 24
- FPT_RCV.3: 11
- FPT_RCV.4: 1
- FPT_TDC.1: 9
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST.1: 1
- FRU:
- FTP:
- FTP_ITC: 19
- FTP_ITC.1: 10
- FTP_TRP.1: 4
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.APPLET: 3
- A.APPS-PROVIDER: 4
- A.CONTROLLING-: 2
- A.CONTROLLING-AUTHORITY: 2
- A.KEY-ESCROW: 1
- A.MOBILE-: 1
- A.MOBILE-OPERATOR: 3
- A.OTA-ADMIN: 3
- A.PERSONALIZER: 1
- A.PRODUCTION: 1
- A.VERIFICA: 1
- A.VERIFICATION: 3
- A.VERIFICATION-: 2
- A.VERIFICATION-AUTHORITY: 1
- D:
- D.API_DATA: 3
- D.APP_CODE: 7
- D.APP_C_DATA: 5
- D.APP_I_DATA: 6
- D.APP_KEYS: 1
- D.APSD_KEYS: 3
- D.CARD_MNGT_DATA: 3
- D.CASD_KEYS: 3
- D.CRYPTO: 4
- D.GASD_KEYS: 2
- D.GP_CODE: 1
- D.ISD_KEYS: 3
- D.JCS_CODE: 3
- D.JCS_DATA: 5
- D.OPTIONAL_PF_SERVICE: 2
- D.PIN: 2
- D.SEC_DATA: 7
- D.VASD_KEYS: 2
- O:
- O.ALARM: 11
- O.APPLET: 16
- O.APPLI-AUTH: 8
- O.CARD-: 1
- O.CARD-MANAGEMENT: 25
- O.CIPHER: 10
- O.CODE_PKG: 14
- O.COMM_AUTH: 6
- O.COMM_CONFIDENT: 1
- O.COMM_CONFIDENTIALITY: 4
- O.COMM_INTEGRITY: 8
- O.DELETION: 4
- O.DOMAIN-RIGHTS: 7
- O.FIREWALL: 15
- O.GLOBAL_: 2
- O.GLOBAL_ARRAYS_CONFID: 4
- O.GLOBAL_ARRAYS_INTEG: 7
- O.INSTALL: 7
- O.JAVAOBJECT: 38
- O.KEY-: 1
- O.KEY-MNGT: 5
- O.LOAD: 9
- O.NATIVE: 7
- O.OBJ-DELETION: 7
- O.OPERATE: 19
- O.PIN-: 1
- O.PIN-MNGT: 8
- O.REALLOCATION: 5
- O.REMOTE_SERVICE_A: 2
- O.REMOTE_SERVICE_ACTIV: 1
- O.REMOTE_SERVICE_ACTIVATION: 5
- O.REMOTE_SERVICE_AUDIT: 7
- O.RESOURCES: 8
- O.RND: 11
- O.SCP: 20
- O.SCP-SUPPORT: 19
- O.SID: 9
- O.TRANSACTION: 5
- OE:
- OE.ACTIVATION-KEY-: 1
- OE.ACTIVATION-KEY-ESCROW: 2
- OE.AID-: 1
- OE.AID-MANAGEMENT: 3
- OE.AP: 1
- OE.AP-KEYS: 4
- OE.APPLET: 7
- OE.APPS-: 1
- OE.APPS-PROVIDER: 4
- OE.BASIC-: 2
- OE.BASIC-APPS-: 3
- OE.BASIC-APPS-VALIDATION: 9
- OE.CA: 1
- OE.CA-KEYS: 5
- OE.CODE-: 1
- OE.CODE-EVIDENCE: 10
- OE.CONTROLLING-: 2
- OE.CONTROLLING-AUTHORITY: 1
- OE.CONTROLLINGAUTHORITY: 1
- OE.GEMACTIVATE-ADMIN: 5
- OE.KEY: 1
- OE.KEY-: 2
- OE.KEY-CHANGE: 5
- OE.KEY-ESCROW: 4
- OE.KEY-GENERATION: 2
- OE.MOBILE-: 1
- OE.MOBILE-OPERATOR: 4
- OE.OPERATOR-: 1
- OE.OPERATOR-KEYS: 3
- OE.OTA-: 2
- OE.OTA-ADMIN: 3
- OE.OTA-LOADING: 3
- OE.OTA-SERVERS: 3
- OE.PERSONALIZER: 4
- OE.PRODUCTION: 5
- OE.QUOTAS: 5
- OE.SECURE-APPS-: 2
- OE.SECURE-APPS-CERTIFICATION: 1
- OE.SECURITY-: 1
- OE.SECURITY-DOMAINS: 2
- OE.SHARE-: 1
- OE.SHARE-CONTROL: 3
- OE.TRUSTED-APPS-: 3
- OE.TRUSTED-APPS-DEVELOPER: 2
- OE.TRUSTED-APPS_PRE-: 3
- OE.TRUSTED-APPS_PRE-ISSUANCE-LOADING: 1
- OE.VA: 1
- OE.VA-KEYS: 4
- OE.VERIFICATION: 20
- OE.VERIFICATION-: 1
- OE.VERIFICATION-AUTHORITY: 2
- OE.VERIFICATIONAUTHORITY: 1
- OP:
- OP.ARRAY_ACCESS: 4
- OP.CREATE: 7
- OP.DELETE_APPLET: 4
- OP.DELETE_PCKG: 3
- OP.DELETE_PCKG_APPLET: 3
- OP.INSTANCE_FIELD: 4
- OP.INVK_INTERFACE: 7
- OP.INVK_VIRTUAL: 6
- OP.JAVA: 5
- OP.PUT: 6
- OP.THROW: 5
- OP.TYPE_ACCESS: 5
- OSP:
- OSP.ACTIVATION-KEY-: 1
- OSP.ACTIVATION-KEY-ESCROW: 2
- OSP.AID-: 1
- OSP.AID-MANAGEMENT: 1
- OSP.APSD-KEYS: 3
- OSP.BASIC-APPS-: 1
- OSP.BASIC-APPS-VALIDATION: 1
- OSP.CASD-KEYS: 2
- OSP.KEY-: 2
- OSP.KEY-CHANGE: 2
- OSP.KEY-ESCROW: 4
- OSP.KEY-GENERATION: 2
- OSP.OPERATOR-: 1
- OSP.OPERATOR-KEYS: 1
- OSP.OTA-LOADING: 3
- OSP.OTA-SERVERS: 2
- OSP.PERSONALIZER: 3
- OSP.PRODUCTION: 6
- OSP.QUOTAS: 2
- OSP.RNG: 5
- OSP.SECURE-APPS-: 1
- OSP.SECURE-APPS-CERTIFICATION: 2
- OSP.SECURITY-: 1
- OSP.SECURITY-DOMAINS: 2
- OSP.SERVICE_AUDIT: 4
- OSP.SHARE-: 1
- OSP.SHARE-CONTROL: 2
- OSP.TRUSTED-APPS-: 1
- OSP.TRUSTED-APPS-DEVELOPER: 3
- OSP.TRUSTED-APPS_PRE-: 1
- OSP.TRUSTED-APPS_PRE-ISSUANCE-: 1
- OSP.TRUSTED-APPS_PRE-ISSUANCE-LOADING: 1
- OSP.VASD-KEYS: 3
- OSP.VERIFICATION: 2
- R:
- T:
- T.COM_EXPLOIT: 3
- T.CONFID-APPLI-: 1
- T.CONFID-APPLI-DATA: 3
- T.CONFID-JCS-: 2
- T.CONFID-JCS-CODE: 2
- T.CONFID-JCS-DATA: 1
- T.DELETION: 3
- T.EXE-CODE: 7
- T.INSTALL: 2
- T.INTEG-APPLI-: 4
- T.INTEG-APPLI-CODE: 3
- T.INTEG-APPLI-DATA: 5
- T.INTEG-JCS-: 1
- T.INTEG-JCS-CODE: 1
- T.INTEG-JCS-DATA: 3
- T.INTEG-USER-DATA: 2
- T.LIFE_CYCLE: 3
- T.NATIVE: 3
- T.OBJ-DELETION: 3
- T.PHYSICAL: 6
- T.RESOURCES: 2
- T.RND: 1
- T.SID: 8
- T.TOE_CLONING: 2
- T.TOE_IMPERSONATION: 3
- T.UNAUTHORIZED_ACCE: 1
- T.UNAUTHORIZED_ACCESS: 2
- T.UNAUTHORIZED_ACCESS_TO_SERVICE: 1
- T.UNAUTHORIZED_CARD_M: 1
- T.UNAUTHORIZED_CARD_MNGT: 1
- T.UNAUTHORIZED_TOE_: 2
- T.UNAUTHORIZED_TOE_CODE_UPDATE: 2
- T.UNAUTHORIZED_TOE_CODE_UPDATE_BLOCK: 1
|
pdf_data/st_keywords/vendor |
|
- Gemalto:
- NXP:
- STMicroelectronics:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
- MAC:
- CBC-MAC: 1
- CMAC: 3
- HMAC: 13
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- MD:
- SHA:
- SHA1:
- SHA2:
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
- SHA224: 5
- SHA256: 6
- SHA384: 6
- SHA512: 6
|
pdf_data/st_keywords/crypto_scheme |
|
- KA:
- Key Agreement: 1
- Key agreement: 1
- MAC:
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_PSK_WITH_3DES_EDE_CBC_SHA: 1
- TLS_PSK_WITH_AES_128_CBC_SHA: 1
- TLS_PSK_WITH_NULL_SHA: 1
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 4
- fault induction: 2
- malfunction: 7
- physical tampering: 3
- SCA:
- DPA: 1
- Leak-Inherent: 3
- Physical Probing: 2
- physical probing: 4
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- FIPS:
- FIPS 140-2: 1
- FIPS 180-3: 5
- FIPS PUB 186-2: 1
- FIPS PUB 197: 4
- FIPS PUB 46-3: 4
- FIPS PUB 81: 2
- ISO:
- ISO/IEC 10116: 4
- ISO/IEC 3309: 2
- ISO/IEC 9796-2: 1
- ISO/IEC 9797-1: 4
- NIST:
- PKCS:
- PKCS #1: 2
- PKCS#1: 9
- PKCS#5: 8
- RFC:
- RFC2409: 3
- RFC4279: 1
- RFC4785: 1
- SCP:
- SCP02: 6
- SCP03: 5
- SCP80: 8
- SCP81: 4
|
pdf_data/st_keywords/javacard_version |
|
- GlobalPlatform:
- JavaCard:
|
pdf_data/st_keywords/javacard_api_const |
|
- ALG:
- AES:
- ALG_AES_BLOCK_128_CBC_NOPAD: 1
- ALG_AES_BLOCK_128_ECB_NOPAD: 1
- ALG_AES_CBC_ISO9797_M1: 1
- ALG_AES_CBC_ISO9797_M2: 1
- ALG_AES_CBC_PKCS5: 1
- ALG_AES_ECB_ISO9797_M1: 1
- ALG_AES_ECB_ISO9797_M2: 1
- ALG_AES_ECB_PKCS5: 1
- ALG_AES_MAC_128_NOPAD: 1
- ALG_AES_MAC_192_NOPAD: 1
- ALG_AES_MAC_256_NOPAD: 1
- DES:
- ALG_DES_CBC_ISO9797_M1: 1
- ALG_DES_CBC_ISO9797_M2: 1
- ALG_DES_CBC_NOPAD: 1
- ALG_DES_CBC_PKCS5: 1
- ALG_DES_ECB_ISO9797_M1: 1
- ALG_DES_ECB_ISO9797_M2: 1
- ALG_DES_ECB_NOPAD: 1
- ALG_DES_ECB_PKCS5: 1
- ALG_DES_MAC4_ISO9797_1_M2_ALG3: 1
- ALG_DES_MAC4_ISO9797_M1: 1
- ALG_DES_MAC4_ISO9797_M2: 1
- ALG_DES_MAC4_NOPAD: 1
- ALG_DES_MAC4_PKCS5: 1
- ALG_DES_MAC8_ISO9797_1_M2_ALG3: 1
- ALG_DES_MAC8_ISO9797_M1: 1
- ALG_DES_MAC8_ISO9797_M2: 1
- ALG_DES_MAC8_NOPAD: 1
- ALG_DES_MAC8_PKCS5: 1
- ECDSA:
- ALG_ECDSA_SHA: 1
- ALG_ECDSA_SHA_224: 1
- ALG_ECDSA_SHA_256: 1
- ALG_ECDSA_SHA_384: 1
- ALG_ECDSA_SHA_512: 1
- HMAC:
- ALG_HMAC_MD5: 1
- ALG_HMAC_SHA1: 1
- ALG_HMAC_SHA_256: 1
- ALG_HMAC_SHA_384: 1
- ALG_HMAC_SHA_512: 1
- ISO3309:
- ALG_ISO3309_CRC16: 1
- ALG_ISO3309_CRC32: 1
- MD:
- RSA:
- ALG_RSA_MD5_PKCS1: 1
- ALG_RSA_MD5_PKCS1_PSS: 1
- ALG_RSA_MD5_RFC2409: 1
- ALG_RSA_NOPAD: 1
- ALG_RSA_PKCS1_OAEP: 1
- ALG_RSA_SHA_224_PKCS1: 1
- ALG_RSA_SHA_224_PKCS1_PSS: 1
- ALG_RSA_SHA_256_PKCS1: 1
- ALG_RSA_SHA_256_PKCS1_PSS: 1
- ALG_RSA_SHA_384_PKCS1: 1
- ALG_RSA_SHA_384_PKCS1_PSS: 1
- ALG_RSA_SHA_512_PKCS1: 1
- ALG_RSA_SHA_512_PKCS1_PSS: 1
- ALG_RSA_SHA_ISO9796: 1
- ALG_RSA_SHA_PKCS1: 1
- ALG_RSA_SHA_PKCS1_PSS: 1
- ALG_RSA_SHA_RFC2409: 1
- SHA:
- ALG_SHA_224: 1
- ALG_SHA_256: 1
- ALG_SHA_384: 1
- ALG_SHA_512: 1
- misc:
|
pdf_data/st_keywords/javacard_packages |
|
- javacard:
- javacard.framework: 2
- javacard.security: 5
- javacardx:
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- out of scope: 1
- parameters for cryptographic operations, the use of these other values are not advised; and clearly out of scope of the TOE. See [AGD] for details. JCS.RNG This security function provides random value using a: 1
|
pdf_data/st_metadata |
|
- /Author: mbruyere
- /CreationDate: D:20160519142646+02'00'
- /Creator: Microsoft® Word 2013
- /ModDate: D:20160519142646+02'00'
- /Producer: Microsoft® Word 2013
- pdf_file_size_bytes: 3765581
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 130
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
True |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
False |
True |
state/st/download_ok |
False |
True |
state/st/extract_ok |
False |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |