Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
VMware Carbon Black Endpoint Detection and Response (EDR) Server 7.5
CCEVS-VR-VID-11156-2021
Plateforme Java Card MultiApp GP-SE (version 5.0)
ANSSI-CC-2022/23
name VMware Carbon Black Endpoint Detection and Response (EDR) Server 7.5 Plateforme Java Card MultiApp GP-SE (version 5.0)
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme US FR
status archived active
not_valid_after 02.08.2023 07.06.2027
not_valid_before 02.08.2021 07.06.2022
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11156-ci.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2022_23.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11156-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2022_23fr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11156-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2022_23en.pdf
manufacturer VMware Inc. THALES DIS FRANCE SA
manufacturer_web https://www.vmware.com https://www.thalesgroup.com/en/europe/france
security_level {} EAL5+, ALC_FLR.1, ALC_DVS.2, AVA_VAN.5
dgst 52a2ab8a0b76216a 563faccb6383f9fe
heuristics/cert_id CCEVS-VR-VID-11156-2021 ANSSI-CC-2022/23
heuristics/cert_lab US []
heuristics/extracted_sars ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, ALC_TSU_EXT.1, AGD_PRE.1 ALC_DVS.2, ALC_CMC.4, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ADV_TDS.4, ALC_TAT.2, ATE_IND.2
heuristics/extracted_versions 7.5 5.0
heuristics/report_references/directly_referencing {} ANSSI-CC-2021/42, BSI-DSZ-CC-1107-V2-2021
heuristics/report_references/indirectly_referencing {} ANSSI-CC-2021/42, BSI-DSZ-CC-1107-2020, BSI-DSZ-CC-1107-V2-2021
heuristics/scheme_data
  • category: Application Software
  • certification_date: 02.08.2021
  • evaluation_facility: Booz Allen Hamilton Common Criteria Testing Laboratory
  • expiration_date: 02.08.2023
  • id: CCEVS-VR-VID11156
  • product: VMware Carbon Black Endpoint Detection and Response (EDR) Server 7.5
  • scheme: US
  • url: https://www.niap-ccevs.org/product/11156
  • vendor: VMware, LLC
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-1107-V2-2021
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-1107-V2-2021
heuristics/protection_profiles a1cc4a4e079f4d1f 94167fd161e87d71, 3ebd6b9f8d81e522
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_APP_v1.3.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0099b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CCN-CC-PP-5-2021.pdf
pdf_data/cert_filename st_vid11156-ci.pdf certificat-anssi-cc-2022_23.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11156-2021: 1
  • FR:
    • ANSSI-CC-2022/23: 2
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-099-V2-2020: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
  • EAL:
    • EAL2: 1
    • EAL5: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR.1: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/eval_facility
  • BoozAllenHamilton:
    • Booz Allen Hamilton: 1
  • CEA-LETI:
    • CEA-LETI: 2
pdf_data/cert_metadata
  • /CreationDate: D:20210804113313-04'00'
  • /ModDate: D:20210804113313-04'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 183009
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: mflament
  • /CreationDate: D:20220613140532+02'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20220613140532+02'00'
  • /Producer: Acrobat Distiller 21.0 (Windows)
  • /Title: Microsoft Word - certificat-ANSSI-CC-2022_23
  • pdf_file_size_bytes: 1552786
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename st_vid11156-vr.pdf anssi-cc-2022_23fr.pdf
pdf_data/report_frontpage
  • FR:
  • US:
    • cert_id: CCEVS-VR-VID11156-2021
    • cert_item: VMware Carbon Black Endpoint Detection and Response (EDR) Server 7.5
    • cert_lab: US NIAP
  • FR:
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11156-2021: 1
  • DE:
    • BSI-DSZ-CC-1107-V2-2021: 1
  • FR:
    • ANSSI-CC-2021/42: 2
    • ANSSI-CC-2022/23: 2
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0099-V2-2020: 2
    • BSI-PP-0084-2014: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 5: 1
    • EAL2: 2
    • EAL5+: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_TSU_EXT.1: 1
  • AGD:
    • AGD_OPE: 5
    • AGD_PRE: 2
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR: 1
    • ALC_FLR.1: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 1
pdf_data/report_keywords/vendor
  • Gemalto:
    • Gemalto: 1
  • Infineon:
    • Infineon Technologies AG: 1
pdf_data/report_keywords/eval_facility
  • BoozAllenHamilton:
    • Booz Allen Hamilton: 3
  • CEA-LETI:
    • CEA - LETI: 1
  • CESTI:
    • CESTI: 4
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 1
      • TLSv1.2: 1
  • PACE:
    • PACE: 1
pdf_data/report_keywords/randomness
  • PRNG:
    • DRBG: 1
pdf_data/report_keywords/cplc_data
  • ICFab:
    • IC Fabricator: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
pdf_data/report_keywords/javacard_version
  • JavaCard:
    • Java Card 3.1: 3
pdf_data/report_metadata
  • /Author: mflament
  • /CreationDate: D:20220613140648+02'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20220613140648+02'00'
  • /Producer: Acrobat Distiller 21.0 (Windows)
  • /Title: Microsoft Word - ANSSI-CC-2022_23fr
  • pdf_file_size_bytes: 416158
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 18
pdf_data/st_filename st_vid11156-st.pdf anssi-cible-cc-2022_23en.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1107-V2-2021: 1
  • NL:
    • CC-1: 2
    • CC-2: 4
    • CC-3: 3
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 00842014: 1
    • BSI-CC-PP-0099-: 1
    • BSI-CC-PP0068-V2-2011-MA-01: 1
    • BSI-PP-0056-V2-MA-2012: 1
    • BSI-PP0055-2009: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 6+: 1
    • EAL4: 1
    • EAL4 augmented: 1
    • EAL5: 5
    • EAL5 augmented: 1
    • EAL5+: 3
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 9
  • AGD:
    • AGD_OPE.1: 12
    • AGD_PRE.1: 4
  • ALC:
    • ALC_CMC.1: 6
    • ALC_CMS.1: 7
    • ALC_TSU_EXT.1: 9
  • ASE:
    • ASE_CCL.1: 16
    • ASE_ECD.1: 12
    • ASE_INT.1: 14
    • ASE_OBJ.1: 6
    • ASE_REQ.1: 12
    • ASE_TSS.1: 7
  • ATE:
    • ATE_IND.1: 7
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.1: 9
  • ADV:
    • ADV_ARC: 2
    • ADV_ARC.1: 10
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 2
    • ADV_FSP.4: 2
    • ADV_FSP.5: 6
    • ADV_IMP: 1
    • ADV_IMP.1: 9
    • ADV_INT.2: 3
    • ADV_TDS: 1
    • ADV_TDS.1: 2
    • ADV_TDS.3: 4
    • ADV_TDS.4: 8
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 10
    • AGD_PRE: 2
    • AGD_PRE.1: 7
  • ALC:
    • ALC_CMC.4: 3
    • ALC_CMS.5: 2
    • ALC_DEL.1: 3
    • ALC_DVS.1: 2
    • ALC_DVS.2: 10
    • ALC_FLR.1: 5
    • ALC_LCD.1: 5
    • ALC_TAT.1: 2
    • ALC_TAT.2: 5
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 4
    • ATE_DPT.1: 2
    • ATE_DPT.3: 3
    • ATE_FUN.1: 9
    • ATE_IND.2: 4
  • AVA:
    • AVA_VAN.5: 10
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKM.1: 5
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 5
    • FCS_CKM.2.1: 1
    • FCS_CKM_EXT.1: 5
    • FCS_CKM_EXT.1.1: 1
    • FCS_COP: 1
    • FCS_RBG_EXT.1: 6
    • FCS_RBG_EXT.1.1: 2
    • FCS_STO_EXT.1: 6
    • FCS_STO_EXT.1.1: 1
  • FDP:
    • FDP_DAR_EXT: 1
    • FDP_DAR_EXT.1: 5
    • FDP_DAR_EXT.1.1: 1
    • FDP_DEC_EXT.1: 5
    • FDP_DEC_EXT.1.1: 2
    • FDP_DEC_EXT.1.2: 1
    • FDP_NET_EXT.1: 4
    • FDP_NET_EXT.1.1: 1
  • FMT:
    • FMT_CFG_EXT.1: 5
    • FMT_CFG_EXT.1.1: 1
    • FMT_CFG_EXT.1.2: 1
    • FMT_MEC_EXT.1: 8
    • FMT_MEC_EXT.1.1: 1
    • FMT_SMF.1: 4
    • FMT_SMF.1.1: 1
  • FPR:
    • FPR_ANO_EXT.1: 4
    • FPR_ANO_EXT.1.1: 1
  • FPT:
    • FPT_AEX_EXT.1: 5
    • FPT_AEX_EXT.1.1: 2
    • FPT_AEX_EXT.1.2: 1
    • FPT_AEX_EXT.1.3: 2
    • FPT_AEX_EXT.1.4: 2
    • FPT_AEX_EXT.1.5: 1
    • FPT_API_EXT.1: 4
    • FPT_API_EXT.1.1: 1
    • FPT_DIT_EXT.1: 1
    • FPT_IDV_EXT.1: 4
    • FPT_IDV_EXT.1.1: 1
    • FPT_LIB_EXT.1: 4
    • FPT_LIB_EXT.1.1: 1
    • FPT_TUD_EXT.1: 7
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 2
    • FPT_TUD_EXT.1.4: 1
    • FPT_TUD_EXT.1.5: 1
    • FPT_TUD_EXT.2: 7
    • FPT_TUD_EXT.2.1: 1
    • FPT_TUD_EXT.2.2: 1
  • FTP:
    • FTP_DIT_EXT.1: 7
    • FTP_DIT_EXT.1.1: 1
  • FAU:
    • FAU_ARP.1: 18
    • FAU_ARP.1.1: 1
    • FAU_SAA.1: 2
    • FAU_SAS.1: 2
  • FCO:
    • FCO_NRO: 34
    • FCO_NRO.2: 9
    • FCO_NRR: 7
    • FCO_NRR.1: 3
  • FCS:
    • FCS_CKM: 70
    • FCS_CKM.1: 40
    • FCS_CKM.1.1: 3
    • FCS_CKM.2: 12
    • FCS_CKM.2.1: 1
    • FCS_CKM.3: 7
    • FCS_CKM.3.1: 1
    • FCS_CKM.4: 45
    • FCS_CKM.4.1: 2
    • FCS_CMK.4: 2
    • FCS_COP: 114
    • FCS_COP.1: 42
    • FCS_COP.1.1: 5
    • FCS_RNG: 34
    • FCS_RNG.1: 20
    • FCS_RNG.1.1: 3
    • FCS_RNG.1.2: 3
  • FDP:
    • FDP_ACC: 54
    • FDP_ACC.1: 27
    • FDP_ACC.2: 6
    • FDP_ACF: 50
    • FDP_ACF.1: 27
    • FDP_IFC: 70
    • FDP_IFC.1: 22
    • FDP_IFC.2: 4
    • FDP_IFF: 49
    • FDP_IFF.1: 23
    • FDP_ITC: 44
    • FDP_ITC.1: 19
    • FDP_ITC.2: 29
    • FDP_ITT.1: 2
    • FDP_RIP: 123
    • FDP_RIP.1: 11
    • FDP_RIP.1.1: 1
    • FDP_ROL: 24
    • FDP_ROL.1: 7
    • FDP_SDC.1: 2
    • FDP_SDI: 11
    • FDP_SDI.2: 4
    • FDP_UCT: 9
    • FDP_UCT.1: 3
    • FDP_UIT: 19
    • FDP_UIT.1: 4
  • FIA:
    • FIA_AFL: 40
    • FIA_AFL.1: 7
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_API.1: 2
    • FIA_ATD: 15
    • FIA_ATD.1: 3
    • FIA_UAU: 88
    • FIA_UAU.1: 7
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UAU.4: 2
    • FIA_UAU.4.1: 1
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6.1: 1
    • FIA_UID: 68
    • FIA_UID.1: 25
    • FIA_UID.1.1: 2
    • FIA_UID.1.2: 2
    • FIA_UID.2: 1
    • FIA_USB: 9
    • FIA_USB.1: 3
  • FMT:
    • FMT_LIM: 40
    • FMT_LIM.1: 17
    • FMT_LIM.1.1: 3
    • FMT_LIM.2: 16
    • FMT_LIM.2.1: 3
    • FMT_MSA: 165
    • FMT_MSA.1: 16
    • FMT_MSA.2: 2
    • FMT_MSA.3: 24
    • FMT_MTD: 95
    • FMT_MTD.1: 16
    • FMT_MTD.3: 2
    • FMT_SMF: 109
    • FMT_SMF.1: 32
    • FMT_SMF.1.1: 2
    • FMT_SMR: 126
    • FMT_SMR.1: 41
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 2
  • FPR:
    • FPR_UNO: 23
    • FPR_UNO.1: 13
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_EMS: 4
    • FPT_EMS.1: 15
    • FPT_EMS.1.1: 3
    • FPT_EMS.1.2: 3
    • FPT_FLS: 72
    • FPT_FLS.1: 18
    • FPT_FLS.1.1: 1
    • FPT_ITT: 8
    • FPT_ITT.1: 2
    • FPT_PHP: 9
    • FPT_PHP.3: 18
    • FPT_PHP.3.1: 1
    • FPT_RCV: 30
    • FPT_RCV.3: 5
    • FPT_RCV.4: 2
    • FPT_TDC: 10
    • FPT_TDC.1: 14
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TST: 11
    • FPT_TST.1: 16
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_TST.2: 2
  • FRU:
    • FRU_FLT.2: 2
  • FTP:
    • FTP_ITC: 40
    • FTP_ITC.1: 11
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP: 21
    • FTP_TRP.1: 14
pdf_data/st_keywords/cc_claims
  • A:
    • A.PROPER_ADMIN: 1
    • A.PROPER_USER: 1
  • O:
    • O.INTEGRITY: 1
    • O.MANAGEMENT: 1
    • O.PROTECTED_COMMS: 1
    • O.PROTECTED_STORAGE: 1
    • O.QUALITY: 1
  • OE:
    • OE.PLATFORM: 1
    • OE.PROPER_ADMIN: 1
    • OE.PROPER_USER: 1
  • T:
    • T.LOCAL_ATTACK: 1
    • T.NETWORK_ATTACK: 1
    • T.NETWORK_EAVESDROP: 1
    • T.PHYSICAL_ACCESS: 1
  • A:
    • A.ADMIN: 3
    • A.APPLET: 1
    • A.APPS-PROVIDER: 4
    • A.CAP_FILE: 3
    • A.CONTROLLING-AUTHORITY: 4
    • A.DELETION: 2
    • A.ISSUER: 4
    • A.KEY-ESCROW: 4
    • A.KEYS-PROT: 4
    • A.OS-UPDATE-EVIDENCE: 3
    • A.OTA-ADMIN: 1
    • A.PERSONALISER: 3
    • A.PERSONALIZER: 1
    • A.PRODUCTION: 4
    • A.SCP-SUPP: 4
    • A.SECURE_ACODE_MANAGEMENT: 3
    • A.VERIFICATION: 4
    • A.VERIFICATION-AUTHORITY: 4
  • D:
    • D.API_DATA: 4
    • D.APP_CODE: 8
    • D.APP_C_DATA: 6
    • D.APP_I_DATA: 8
    • D.APP_KEYS: 9
    • D.APSD_DAP_KEYS: 1
    • D.APSD_KEYS: 6
    • D.CASD_DAP_KEYS: 1
    • D.CASD_KEYS: 4
    • D.CONFIRMATION-DATA: 2
    • D.CRYPTO: 6
    • D.CVM_MGMT_STATE: 3
    • D.CVM_PIN: 3
    • D.DAP_BLOCK: 1
    • D.GP_CODE: 2
    • D.GP_REGISTRY: 4
    • D.ISD_KEYS: 6
    • D.JCS_CODE: 7
    • D.JCS_DATA: 9
    • D.OS-: 1
    • D.OS-UPDATE-CODE-ID: 3
    • D.OS-UPDATE_ADDITIONALCODE: 4
    • D.OS-UPDATE_DEC-KEY: 2
    • D.OS-UPDATE_SGNVER-KEY: 3
    • D.PIN: 6
    • D.RECEIPT-GENERATION-KEY: 2
    • D.SEC_DATA: 9
    • D.TOE_IDENTIFIER: 2
    • D.TOKEN-VERIFICATION-KEY: 2
  • O:
    • O.AES: 1
    • O.ALARM: 15
    • O.APPLET: 28
    • O.APPLI-AUTH: 7
    • O.ARRAY_VIEWS_CONFID: 4
    • O.ARRAY_VIEWS_INTEG: 2
    • O.ARRAY_VIEW_CONFID: 1
    • O.ARRAY_VIEW_INTEG: 1
    • O.CARD-: 1
    • O.CARD-MANAGEMENT: 22
    • O.CARDMANAGEMENT: 2
    • O.CIPHER: 12
    • O.CODE_CAP_FILE: 23
    • O.COMM-: 1
    • O.COMM-AUTH: 5
    • O.COMM-CONFIDENTIALITY: 4
    • O.COMM-INTEGRITY: 5
    • O.COMM_AUTH: 1
    • O.COMM_CONFIDENTIALITY: 1
    • O.COMM_INTEGRITY: 1
    • O.CONFID-OS-UPDATE: 5
    • O.CVM-BLOCK: 5
    • O.CVM-MGMT: 6
    • O.CVM-MGNT: 1
    • O.CVM-MNGT: 1
    • O.DELETION: 7
    • O.DOMAIN-RIGHTS: 4
    • O.DOMAIN_RIGHTS: 1
    • O.FIREWALL: 14
    • O.GLOBAL-CVM: 5
    • O.GLOBAL_ARRAYS_CONFID: 8
    • O.GLOBAL_ARRAYS_INTEG: 6
    • O.INSTALL: 10
    • O.JAVAOBJECT: 68
    • O.KEY-MNGT: 7
    • O.KEY_DELETION: 1
    • O.LC-MANAGEMENT: 4
    • O.LOAD: 11
    • O.NATIVE: 11
    • O.NO-KEY-REUSE: 4
    • O.OBJ-DELETION: 5
    • O.OBJ_DELETION: 1
    • O.OPERATE: 17
    • O.PIN-MNGT: 7
    • O.PIN_MNGT: 2
    • O.PRIVILEGES-: 1
    • O.PRIVILEGES-MANAGEMENT: 5
    • O.REALLOCATION: 6
    • O.RECEIPT: 4
    • O.RESOURCES: 9
    • O.RND: 2
    • O.RNG: 13
    • O.SCP: 30
    • O.SECURE_AC_ACTIVATION: 6
    • O.SECURE_LOAD_ACODE: 8
    • O.SECURITY-: 1
    • O.SECURITY-DOMAINS: 3
    • O.SECURITY_DOMAINS: 1
    • O.SID: 13
    • O.TDES: 1
    • O.TOE_IDENTIFICATION: 7
    • O.TOKEN: 5
    • O.TRANSACTION: 7
  • OE:
    • OE.ADMIN: 2
    • OE.AID-MANAGEMENT: 4
    • OE.AP-KEYS: 3
    • OE.APPLET: 1
    • OE.APPLICATIONS: 3
    • OE.APPS-PROVIDER: 4
    • OE.CA-KEYS: 4
    • OE.CAP_FILE: 5
    • OE.CARD-MANAGEMENT: 3
    • OE.CARD_MANAGEMENT: 1
    • OE.CODE-EVIDENCE: 12
    • OE.CONTROLLING-: 1
    • OE.CONTROLLING-AUTHORITY: 3
    • OE.DAP_BLOCK_GEN: 3
    • OE.ISD-KEYS: 3
    • OE.ISSUER: 4
    • OE.ISSUER-KEYS: 1
    • OE.KEY-CHANGE: 2
    • OE.KEY-ESCROW: 4
    • OE.KEY-GENERATION: 2
    • OE.KEYCHANGE: 1
    • OE.KEYGENERATION: 1
    • OE.KEYS-PROT: 2
    • OE.LOADING: 2
    • OE.NATIVE: 1
    • OE.OS-UPDATE-ENCRYPTION: 3
    • OE.OS-UPDATE-EVIDENCE: 1
    • OE.OSUPDATE-ENCRYPTION: 2
    • OE.OSUPDATE-EVIDENCE: 1
    • OE.OTA-ADMIN: 1
    • OE.OTA-LOADING: 1
    • OE.OTA-SERVERS: 1
    • OE.PERSONALISER: 2
    • OE.PERSONALIZER: 1
    • OE.PRODUCTION: 4
    • OE.RECEIPT-VER: 1
    • OE.RECEIPTVER: 1
    • OE.SCP: 11
    • OE.SCP-SUPP: 2
    • OE.SECURE_ACODE_MANAGEMENT: 3
    • OE.SECURITY-DOMAINS: 1
    • OE.SERVERS: 3
    • OE.TOKEN-GEN: 3
    • OE.VA-KEYS: 1
    • OE.VERIFICATION: 26
    • OE.VERIFICATION-: 1
    • OE.VERIFICATION-AUTHORITY: 2
  • OP:
    • OP.ARRAY_AASTORE: 3
    • OP.ARRAY_ACCESS: 7
    • OP.ARRAY_LENGTH: 3
    • OP.ARRAY_T_ALOAD: 3
    • OP.ARRAY_T_ASTORE: 3
    • OP.CREATE: 11
    • OP.DELETE_APPLET: 6
    • OP.DELETE_CAP_FILE: 4
    • OP.DELETE_CAP_FILE_APPLET: 4
    • OP.INSTANCE_FIELD: 6
    • OP.INVK_INTERFACE: 10
    • OP.INVK_VIRTUAL: 8
    • OP.JAVA: 8
    • OP.PUT: 8
    • OP.PUTFIELD: 1
    • OP.PUTSTATIC: 1
    • OP.THROW: 7
    • OP.TYPE_ACCESS: 7
  • OSP:
    • OSP: 3
    • OSP.ADDITIONAL_CODE_ENCRYPTION: 3
    • OSP.ADDITIONAL_CODE_SIGNING: 3
    • OSP.AID-MANAGEMENT: 4
    • OSP.APPLICATIONS: 4
    • OSP.APSD-KEYS: 4
    • OSP.ATOMIC_ACTIVATION: 3
    • OSP.CASD-KEYS: 4
    • OSP.DAP_BLOCK_GEN: 3
    • OSP.ISD-KEYS: 3
    • OSP.ISSUER-KEYS: 1
    • OSP.KEY-CHANGE: 4
    • OSP.KEY-GENERATION: 4
    • OSP.LOADING: 3
    • OSP.OTA-LOADING: 1
    • OSP.OTA-SERVERS: 1
    • OSP.RECEIPT-VER: 3
    • OSP.RNG: 3
    • OSP.SECURITY-DOMAINS: 4
    • OSP.SERVERS: 3
    • OSP.TOE_IDENTIFICATION: 3
    • OSP.TOKEN-GEN: 3
    • OSP.VERIFICATION: 4
  • OT:
    • OT.X: 1
  • R:
    • R.JAVA: 12
  • T:
    • T.BRUTE-FORCE-CVM: 3
    • T.BRUTE-FORCE-SCP: 5
    • T.COM-EXPLOIT: 4
    • T.COM_EXPLOIT: 2
    • T.CONFID-APPLI-DATA: 4
    • T.CONFID-JCS-CODE: 4
    • T.CONFID-JCS-DATA: 4
    • T.CONFID-OS-UPDATE-LOAD: 1
    • T.CONFID-OS-UPDATE_LOAD: 2
    • T.CVM-IMPERSONATE: 3
    • T.CVM-UPDATE: 3
    • T.DELETION: 6
    • T.EXE-CODE: 8
    • T.FAKE-SGNVER-KEY: 3
    • T.INSTALL: 6
    • T.INTEG: 1
    • T.INTEG-APPLI-: 2
    • T.INTEG-APPLI-CODE: 9
    • T.INTEG-APPLI-DATA: 8
    • T.INTEG-JCS-CODE: 4
    • T.INTEG-JCS-DATA: 4
    • T.INTEG-OS-UPDATE_LOAD: 2
    • T.INTEGAPPLI-DATA: 1
    • T.LIFE-CYCLE: 3
    • T.LIFE_CYCLE: 2
    • T.NATIVE: 4
    • T.OBJ-DELETION: 4
    • T.PHYSICAL: 4
    • T.RECEIPT: 3
    • T.RESOURCES: 4
    • T.SID: 8
    • T.TOKEN: 3
    • T.UNAUTHORISED-CARD-MGMT: 4
    • T.UNAUTHORISED-TOE-CODE-UPDATE: 3
    • T.UNAUTHORIZED_CARD_MNGT: 2
    • T.WRONG-UPDATE-STATE: 3
pdf_data/st_keywords/vendor
  • Gemalto:
    • Gemalto: 3
  • Infineon:
    • Infineon: 15
  • Thales:
    • Thales: 42
pdf_data/st_keywords/eval_facility
  • BoozAllenHamilton:
    • Booz Allen Hamilton: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
      • AES-: 1
  • AES_competition:
    • AES:
      • AES: 36
      • AES-256: 1
      • AES256: 1
  • DES:
    • 3DES:
      • 3DES: 2
      • TDEA: 1
      • TDES: 20
      • Triple-DES: 3
    • DES:
      • DES: 21
  • constructions:
    • MAC:
      • CMAC: 5
      • HMAC: 3
      • KMAC: 2
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 3
  • ECC:
    • ECC:
      • ECC: 13
    • ECDH:
      • ECDH: 8
    • ECDSA:
      • ECDSA: 4
  • FF:
    • DH:
      • DH: 14
      • Diffie-Hellman: 5
  • RSA:
    • RSA 1024: 3
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 6
      • SHA1: 2
    • SHA2:
      • SHA-224: 2
      • SHA-256: 5
      • SHA-384: 4
      • SHA-512: 4
      • SHA2: 1
      • SHA224: 1
    • SHA3:
      • SHA3: 2
      • SHA3-512: 1
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 6
    • Key agreement: 2
  • MAC:
    • MAC: 16
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 3
      • TLS v1.2: 4
      • TLSv1.2: 1
  • VPN:
    • VPN: 1
  • PACE:
    • PACE: 165
  • TLS:
    • TLS:
      • TLS: 1
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 4
  • RNG:
    • RBG: 1
  • PRNG:
    • PRNG: 1
  • RNG:
    • RND: 3
    • RNG: 44
pdf_data/st_keywords/cipher_mode
  • CCM:
    • CCM: 1
  • CBC:
    • CBC: 5
  • CCM:
    • CCM: 8
  • ECB:
    • ECB: 1
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 4
    • P-384: 4
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 3
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 5
    • Physical Tampering: 3
    • fault induction: 2
    • malfunction: 8
    • physical tampering: 1
  • SCA:
    • DPA: 2
    • Leak-Inherent: 2
    • SPA: 1
    • physical probing: 6
    • timing attacks: 1
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 58
pdf_data/st_keywords/cplc_data
  • ICFab:
    • IC Fabricator: 1
  • ICType:
    • IC Type: 1
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.DG1: 4
    • EF.DG16: 4
    • EF.DG3: 1
    • EF.DG4: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS PUB 186-4: 5
  • NIST:
    • NIST SP 800-56A: 1
  • X509:
    • X.509: 2
  • BSI:
    • AIS20: 2
    • AIS31: 7
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS 140-2: 2
    • FIPS 180-4: 1
    • FIPS 197: 2
    • FIPS 198: 2
    • FIPS180-2: 1
    • FIPS197: 5
  • ICAO:
    • ICAO: 3
  • NIST:
    • SP 800-67: 1
  • PKCS:
    • PKCS#1: 8
    • PKCS#5: 5
  • SCP:
    • SCP01: 4
    • SCP02: 18
    • SCP03: 16
    • SCP10: 1
    • SCP11: 1
    • SCP21: 8
    • SCP22: 1
    • SCP80: 1
    • SCP81: 1
pdf_data/st_keywords/javacard_version
  • JavaCard:
    • Java Card 3.1: 8
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 7
pdf_data/st_keywords/javacard_packages
  • java:
    • java.lang: 1
    • java.lang.invoke: 1
    • java.lang.management: 1
    • java.lang.reflect: 1
    • java.net: 8
    • java.security.cert: 2
    • java.sql: 1
    • java.text: 1
    • java.time: 1
    • java.util: 1
    • java.util.zip: 1
  • org:
    • org.slf4j: 2
  • java:
    • java.lang: 1
  • javacard:
    • javacard.framework: 3
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • Functional Requirements in the claimed Protection Profile. Therefore, the following are considered out of scope of the evaluated configuration because there are no SFRs in the PP that allow this functionality to: 1
    • out of scope: 1
  • OutOfScope:
    • Context, the Selected Applet Context, and the Active Applets Note: the Selected Applet context is out of scope of the VM functionalities. It is a process that occurs prior to VM start 8.1.1.1.2 Application: 1
    • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
    • out of scope: 2
pdf_data/st_metadata
  • /Author: OHAYON Franck
  • /CreationDate: D:20220509100132+02'00'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20220509100132+02'00'
  • /Producer: Microsoft® Word 2016
  • /Title: MultiApp V5.0: GP-SE Security Target
  • pdf_file_size_bytes: 5335657
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 193
state/cert/convert_garbage True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different