name |
Winbond SpiFlash TrustME Secure Flash Memory W75F40WBYJEG version A |
MULTOS I4C (1-1-1) platform with patch AMD 0029v002 on component SLE66CX322P/m1484a24 |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
ES |
FR |
status |
active |
archived |
not_valid_after |
07.06.2027 |
01.09.2019 |
not_valid_before |
07.06.2022 |
04.12.2003 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-48_Certificado.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-48%20INF-3811.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2003_14.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-48%20ST_lite.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible2003_14.pdf |
manufacturer |
Winbond Electonics Corporation |
Keycorp Limited / Infineon Technologies AG |
manufacturer_web |
https://www.winbond.com/ |
https://www.keycorp.net/ |
security_level |
EAL5+, AVA_VAN.5, ALC_DVS.2 |
AVA_VLA.4, ADV_IMP.2, EAL4+, ALC_DVS.2 |
dgst |
51a1149f945dea23 |
72ed5b59efbf992c |
heuristics/cert_id |
2019-48-INF-3811 |
ANSSI-CC-2003/14 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_LCD.1, ASE_CCL.1, AGD_OPE.1, ASE_SPD.1, ASE_OBJ.2, ATE_DPT.3, ATE_COV.2, ALC_CMS.5, ADV_ARC.1, ATE_FUN.1, ADV_IMP.1, ALC_DVS.2, ALC_TAT.2, ASE_INT.1, AVA_VAN.5, ASE_TSS.1, ADV_TDS.4, ALC_CMC.4, ADV_INT.2, ASE_REQ.2, ALC_DEL.1, ADV_FSP.5, AGD_PRE.1, ASE_ECD.1 |
ATE_IND.2, ALC_TAT.1, ALC_LCD.1, ADV_SPM.1, ATE_DPT.1, ADV_HLD.2, AGD_ADM.1, ADV_IMP.2, ASE_REQ.1, ATE_COV.2, ASE_PPC.1, ADV_FSP.1, ADV_RCR.1, AGD_USR.1, ATE_FUN.1, ASE_DES.1, ADV_LLD.1, ALC_DVS.2, ASE_INT.1, ASE_SRE.1, ASE_OBJ.1, AVA_SOF.1, ASE_TSS.1, AVA_MSU.3, AVA_VLA.4, ASE_ENV.1 |
heuristics/extracted_versions |
- |
1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0223-2003 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0223-2003, BSI-DSZ-CC-0169-2002 |
heuristics/scheme_data |
- category: Smart Cards and similiar devices
- certification_date: 07.06.2022
- enhanced:
- category: Smart Cards and similiar devices
- cc_version: Common Criteria 3.1 release 5
- cert_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1478
- certification_date: 07.06.2022
- description: The TOE is a memory flash IC designed to be embedded into highly critical hardware devices such as smart card, secure element, USB token, secure micro SD, etc. These devices will embed secure applications such as financial, telecommunication, identity (e-Government), etc. and will be working in a hostile environment. In particular, the TOE main function is the secure storage of the code and data of critical applications. The security needs for the TOE consist in: Maintaining the integrity of the content of the memories and the confidentiality of the content of protected memory areas as required by the critical HW products (e.g. Security IC) the Memory Flash is built for. Providing a secure communication with the Host device that will embed the TOE in a secure HW product such as Security IC.
- evaluation_facility: Applus Laboratories
- level: EAL5 + ALC_DVS.2 + AVA_VAN.5
- manufacturer: Winbond Electronics Corporation
- report_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1479
- status: Certified
- target_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1477
- type: Product
- manufacturer: Winbond Electronics Corporation
- product: Winbond SpiFlash TrustME Secure Flash Memory W75F40WBYJEG version A
- product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/826-winbond-spiflash-trustme-secure-flash-memory-w75f40wbyjeg-version-a
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
2019-48_Certificado.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author:
- /CreationDate:
- /Creator:
- /Keywords:
- /ModDate:
- /Producer:
- /Subject:
- /Title:
- /Trapped:
- pdf_file_size_bytes: 880365
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
|
pdf_data/report_filename |
2019-48 INF-3811.pdf |
2003_14.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- FR:
- Rapport de certification 2003/01: 1
- Rapport de certification 2003/14: 18
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 2: 1
- EAL 4: 2
- EAL2: 1
- EAL5: 8
- ITSEC:
|
- EAL:
- EAL 5: 1
- EAL1: 1
- EAL3: 1
- EAL4: 1
- EAL41: 1
- EAL5: 1
- EAL7: 2
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_IMP.1: 1
- ADV_TDS.4: 1
- AGD:
- ALC:
- ALC_CMC.4: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 8
- ALC_FLR: 3
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_INT.1: 1
- ASE_REQ.2: 1
- ATE:
- ATE_COV.2: 1
- ATE_FUN.1: 1
- AVA:
|
- ACM:
- ACM_AUT: 1
- ACM_AUT.1: 1
- ACM_CAP: 1
- ACM_CAP.4: 1
- ACM_SCP: 1
- ACM_SCP.2: 1
- ADO:
- ADO_DEL: 1
- ADO_DEL.2: 1
- ADO_IGS: 1
- ADO_IGS.1: 1
- ADV:
- ADV_FSP: 1
- ADV_FSP.2: 1
- ADV_HLD: 1
- ADV_HLD.2: 1
- ADV_IMP: 1
- ADV_IMP.2: 3
- ADV_INT: 1
- ADV_LLD: 1
- ADV_LLD.1: 1
- ADV_RCR: 1
- ADV_RCR.1: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- AGD:
- AGD_ADM: 1
- AGD_ADM.1: 1
- AGD_USR: 1
- AGD_USR.1: 1
- ALC:
- ALC_DVS: 1
- ALC_DVS.2: 4
- ALC_FLR: 2
- ALC_LCD.1: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ASE:
- ASE_DES.1: 1
- ASE_ENV.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_PPC.1: 1
- ASE_REQ.1: 1
- ASE_SRE.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 1
- ATE_COV.2: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_IND: 1
- ATE_IND.2: 1
- AVA:
- AVA_CCA: 1
- AVA_MSU: 1
- AVA_MSU.2: 1
- AVA_MSU.3: 1
- AVA_SOF: 1
- AVA_SOF.1: 1
- AVA_VLA: 1
- AVA_VLA.4: 4
|
pdf_data/report_keywords/cc_sfr |
- FDP:
- FDP_IFC.1: 1
- FDP_RIP.1: 1
- FDP_SDI.2: 1
- FDP_UIT.1: 1
- FMT:
- FPT:
- FPT_FLS: 2
- FPT_ITT.1: 1
- FPT_TRP.1: 1
- FRU:
|
- FAU:
- FAU_ARP.1: 2
- FAU_SAA.1: 2
- FCS:
- FCS_CKM.3: 2
- FCS_CKM.4: 2
- FCS_COP.1: 2
- FDP:
- FDP_ACC.2: 2
- FDP_ACF.1: 2
- FDP_DAU.1: 2
- FDP_ETC.1: 2
- FDP_ITC.1: 2
- FDP_RIP.1: 2
- FDP_ROL.1: 2
- FDP_SDI.2: 2
- FIA:
- FIA_AFL.1: 2
- FIA_ATD.1: 2
- FIA_UAU.1: 2
- FIA_UAU.4: 2
- FIA_UID.1: 2
- FIA_USB.1: 2
- FMT:
- FMT_MOF.1: 2
- FMT_MSA.1: 2
- FMT_MSA.2: 2
- FMT_MSA.3: 2
- FMT_MTD.1: 2
- FMT_MTD.2: 2
- FMT_SMR.1: 2
- FPR:
- FPT:
- FPT_FLS.1: 2
- FPT_PHP.3: 2
- FPT_RCV.4: 2
- FPT_RVM.1: 2
- FPT_SEP.1: 2
- FPT_TDC.1: 2
- FPT_TST.1: 2
- FRU:
|
pdf_data/report_keywords/cc_claims |
|
- O:
- O.APPLI_DEV: 1
- O.CODE_HASH: 1
- O.DLV_AUDIT: 1
- O.DLV_DATA: 1
- O.DLV_PROTECT: 1
- O.DLV_RESP: 1
- O.TEST_OPERATE: 1
- O.USE_DIAG: 1
|
pdf_data/report_keywords/vendor |
|
- Infineon:
- Infineon: 7
- Infineon Technologies AG: 7
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCIMB-99-031: 1
- CCIMB-99-032: 1
- CCIMB-99-033: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author:
- /CreationDate:
- /Creator:
- /Keywords:
- /ModDate:
- /Producer:
- /Subject:
- /Title:
- /Trapped:
- pdf_file_size_bytes: 964023
- pdf_hyperlinks: http://www.commoncriteriaportal.org/
- pdf_is_encrypted: False
- pdf_number_of_pages: 14
|
- /Author: Patrick REDON
- /CreationDate: D:20031204162531+01'00'
- /Creator: Acrobat PDFMaker 5.0 pour Word
- /ModDate: D:20031204162711+01'00'
- /Producer: Acrobat Distiller 5.0 (Windows)
- /Subject: Plate-forme MULTOS I4C (1-1-1)
- /Title: Rapport de certification 2003/14
- pdf_file_size_bytes: 867591
- pdf_hyperlinks: mailto:[email protected], mailto:[email protected]
- pdf_is_encrypted: True
- pdf_number_of_pages: 35
|
pdf_data/st_filename |
2019-48 ST_lite.pdf |
cible2003_14.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL5: 6
- EAL5 augmented: 2
|
- EAL:
- EAL4: 17
- EAL4 augmented: 3
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 6
- ADV_FSP.1: 3
- ADV_FSP.2: 3
- ADV_FSP.4: 1
- ADV_FSP.5: 8
- ADV_IMP.1: 9
- ADV_INT.2: 1
- ADV_TDS.1: 2
- ADV_TDS.3: 4
- ADV_TDS.4: 8
- AGD:
- AGD_OPE.1: 6
- AGD_PRE.1: 6
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.1: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 2
- ALC_DVS.2: 9
- ALC_LCD.1: 3
- ALC_TAT.1: 2
- ALC_TAT.2: 3
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 5
- ASE_INT.1: 5
- ASE_OBJ.2: 3
- ASE_REQ.1: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 3
- ATE_DPT.1: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 6
- AVA:
|
- ADV:
- ADV_FSP.1: 2
- ADV_HLD: 1
- ADV_HLD.2: 1
- ADV_IMP: 3
- ADV_IMP.1: 2
- ADV_IMP.2: 10
- ADV_LLD: 1
- ADV_LLD.1: 3
- ADV_RCR.1: 2
- AGD:
- AGD_ADM: 1
- AGD_ADM.1: 1
- AGD_USR.1: 2
- ALC:
- ALC_DVS: 2
- ALC_DVS.1: 1
- ALC_DVS.2: 10
- ALC_TAT.1: 2
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FDP:
- FDP_ACC.1: 3
- FDP_ACF: 1
- FDP_IFC.1: 27
- FDP_IFC.1.1: 1
- FDP_IFF.1: 4
- FDP_ITT.1: 13
- FDP_ITT.1.1: 1
- FDP_RIP.1: 8
- FDP_RIP.1.1: 1
- FDP_SDC: 4
- FDP_SDC.1: 16
- FDP_SDC.1.1: 2
- FDP_SDI: 1
- FDP_SDI.2: 11
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UCT.1: 8
- FDP_UCT.1.1: 1
- FDP_UIT.1: 8
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FMT:
- FMT_LIM: 5
- FMT_LIM.1: 22
- FMT_LIM.1.1: 2
- FMT_LIM.2: 19
- FMT_LIM.2.1: 2
- FPT:
- FPT_FLS: 24
- FPT_FLS.1: 3
- FPT_ITT.1: 12
- FPT_ITT.1.1: 1
- FPT_PHP.3: 14
- FPT_PHP.3.1: 1
- FRU:
- FRU_FLT.2: 12
- FRU_FLT.2.1: 1
- FTP:
- FTP_ITC.1: 2
- FTP_TRP.1: 11
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_ARP: 2
- FAU_ARP.1: 11
- FAU_ARP.1.1: 2
- FAU_SAA: 2
- FAU_SAA.1: 15
- FAU_SAA.1.1: 2
- FAU_SAA.1.2: 2
- FCS:
- FCS_CKM: 2
- FCS_CKM.3: 12
- FCS_CKM.3.1: 1
- FCS_CKM.4: 12
- FCS_CKM.4.1: 1
- FCS_COP: 2
- FCS_COP.1: 12
- FCS_COP.1.1: 4
- FDP:
- FDP_ACC: 2
- FDP_ACC.2: 15
- FDP_ACC.2.1: 2
- FDP_ACC.2.2: 1
- FDP_ACF: 2
- FDP_ACF.1: 14
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_DAU: 2
- FDP_DAU.1: 9
- FDP_DAU.1.1: 1
- FDP_DAU.1.2: 1
- FDP_ETC: 2
- FDP_ETC.1: 5
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_ITC: 2
- FDP_ITC.1: 10
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_RIP: 2
- FDP_RIP.1: 8
- FDP_RIP.1.1: 1
- FDP_ROL: 2
- FDP_ROL.1: 4
- FDP_ROL.1.1: 1
- FDP_ROL.1.2: 1
- FDP_SDI: 2
- FDP_SDI.2: 6
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FIA:
- FIA_AFL: 2
- FIA_AFL.1: 8
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD: 2
- FIA_ATD.1: 7
- FIA_ATD.1.1: 1
- FIA_UAU: 2
- FIA_UAU.1: 10
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 7
- FIA_UAU.4.1: 1
- FIA_UID: 2
- FIA_UID.1: 10
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB: 2
- FIA_USB.1: 8
- FIA_USB.1.1: 1
- FMT:
- FMT_MOF: 2
- FMT_MOF.1: 8
- FMT_MOF.1.1: 2
- FMT_MSA: 2
- FMT_MSA.1: 12
- FMT_MSA.1.1: 1
- FMT_MSA.2: 9
- FMT_MSA.2.1: 1
- FMT_MSA.3: 10
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 2
- FMT_MTD.1: 7
- FMT_MTD.1.1: 1
- FMT_MTD.2: 6
- FMT_MTD.2.1: 1
- FMT_MTD.2.2: 1
- FMT_SMR: 2
- FMT_SMR.1: 9
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNO: 3
- FPR_UNO.1: 7
- FPR_UNO.1.1: 1
- FPT:
- FPT_FLS: 2
- FPT_FLS.1: 10
- FPT_FLS.1.1: 1
- FPT_PHP: 2
- FPT_PHP.3: 10
- FPT_PHP.3.1: 1
- FPT_RCV: 2
- FPT_RCV.4: 4
- FPT_RCV.4.1: 1
- FPT_RVM: 2
- FPT_RVM.1: 6
- FPT_RVM.1.1: 1
- FPT_SEP: 2
- FPT_SEP.1: 11
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_TDC: 2
- FPT_TDC.1: 5
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST: 3
- FPT_TST.1: 6
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FRU:
- FRU_RSA: 2
- FRU_RSA.1: 5
- FRU_RSA.1.1: 1
|
pdf_data/st_keywords/cc_claims |
|
- A:
- O:
- O.APPLI_DEV: 4
- O.CLON: 1
- O.CODE_HASH: 2
- O.DEV_DIS_ES: 6
- O.DIS: 1
- O.DIS_: 1
- O.DIS_MEMORY: 1
- O.DLV_DATA: 3
- O.EFFECT_L: 4
- O.EFFECT_R: 3
- O.FLAW: 1
- O.INIT_ACS: 4
- O.LOAD: 4
- O.MOD_: 1
- O.MOD_MEMORY: 1
- O.OPERATE: 1
- O.REMOVE: 4
- O.RESOURCE: 2
- O.RESOURCES: 1
- O.ROLLBACK: 3
- O.SAMPLES_ACS: 1
- O.SAMPLE_ACS: 2
- O.SECURITY: 4
- O.SEGREGATE: 4
- O.SIDE: 4
- O.TAMPER_ES: 11
- T:
- T.APP_COR: 1
- T.APP_CORR: 4
- T.APP_DISC: 9
- T.APP_MOD: 5
- T.APP_REA: 1
- T.APP_READ: 4
- T.APP_REM: 1
- T.APP_REMOVE: 4
- T.CLON: 1
- T.DEL_REM: 1
- T.DEL_REMOVE: 4
- T.DIS_DATA: 5
- T.DIS_DEL: 1
- T.DIS_INFO: 1
- T.DIS_TEST: 1
- T.DIS_TEST_ES: 4
- T.ERR_REM: 1
- T.ERR_REMOVE: 4
- T.LOAD_APP: 6
- T.LOAD_MA: 1
- T.LOAD_MAN: 4
- T.LOAD_MO: 1
- T.LOAD_MOD: 6
- T.LOAD_OT: 1
- T.LOAD_OTHER: 4
- T.MOD: 5
- T.MOD_DAT: 1
- T.MOD_DATA: 3
- T.MOD_DEL: 3
- T.MOD_EXE: 5
- T.MOD_LOA: 1
- T.MOD_LOAD: 4
- T.MOD_SHA: 1
- T.MOD_SHARE: 4
- T.MOD_SOF: 1
- T.MOD_SOFT: 1
- T.MOD_TSF: 5
- T.RESOURC: 1
- T.RESOURCES: 4
- T.T_CMD: 5
- T.T_ES: 5
- T.T_SAMPLE: 1
- T.T_TOOLS: 5
|
pdf_data/st_keywords/vendor |
|
- Infineon:
- Infineon: 2
- Infineon Technologies: 5
- Thales:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Fault Injection: 1
- Malfunction: 17
- fault injection: 2
- malfunction: 3
- physical tampering: 3
- SCA:
- Leak-Inherent: 17
- Physical Probing: 2
- physical probing: 5
|
- FI:
- Physical tampering: 1
- physical tampering: 1
- SCA:
- DPA: 2
- SPA: 2
- Timing attacks: 1
- side channel: 2
- timing attack: 1
- timing attacks: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- Note that cryptographic primitives are out of scope. Table 3 shows how these security functions satisfy the TOE security functional requirements: 1
- out of scope: 1
- strength level of these security functions is “SOF high”. Note that cryptographic primitives are out of scope. Table 3 shows how these security functions satisfy the TOE security functional requirements. 6.1.1: 1
|
pdf_data/st_metadata |
|
- /Author: Thales Microelectronics & Keycorp MULTOS Team
- /CreationDate: D:20040526124355
- /Creator: Microsoft Word 8.0
- /ModDate: D:20040526124445+11'00'
- /Producer: Acrobat Distiller 4.0 for Windows
- /Subject: Keycorp MULTOS Common Criteria
- /Title: Public Security Target
- pdf_file_size_bytes: 652006
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 85
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |