name |
SANRISE Universal Storage Platform CHA/DKA Program, TagmaStore Universal Storage Platform CHA/DKA Program SANRISE Network Storage Controller CHA/DKA Program TagmaStore Network Storage Controller CHA/DKA Program SANRISE H12000 CHA/DKA Program SANRISE H10000 CHA/DKA Program 50-04-34-00/00 |
Plateforme Java Card MultiApp V5.0 version 5.0 |
category |
Access Control Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
FR |
status |
archived |
active |
not_valid_after |
07.10.2013 |
14.10.2026 |
not_valid_before |
27.06.2007 |
14.10.2021 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2021_42.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0102_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2021_42.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0102_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2021_42en.pdf |
manufacturer |
Hitachi, Ltd. |
THALES DIS FRANCE SA |
manufacturer_web |
https://www.hitachi.com/ |
https://www.thalesgroup.com/en/europe/france |
security_level |
EAL2 |
ALC_FLR.1, EAL6+ |
dgst |
5647d3c66dfdd6f9 |
58725b1e960799a8 |
heuristics/cert_id |
JISEC-CC-CRP-C0102 |
ANSSI-CC-2021/42 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
AGD_ADM.1, AVA_VLA.1, ADV_SPM.1, ATE_COV.1, ADV_RCR.1, ADV_FSP.1, ADV_HLD.1, ATE_IND.2, ATE_FUN.1, AGD_USR.1, AVA_SOF.1 |
ADV_SPM.1, AGD_OPE.1, ATE_COV.3, ALC_DEL.1, ALC_FLR.1, ADV_TDS.5, ASE_INT.1, ADV_ARC.1, ALC_CMC.5, ADV_FSP.5, AVA_VAN.5, ASE_ECD.1, ATE_DPT.3, ALC_LCD.1, ASE_REQ.2, ALC_DVS.2, ASE_OBJ.2, ATE_IND.2, ADV_IMP.2, ALC_CMS.5, ASE_CCL.1, ADV_INT.3, ATE_FUN.2, ASE_SPD.1, ASE_TSS.1, AGD_PRE.1, ALC_TAT.3 |
heuristics/extracted_versions |
04, 50, 34, 00 |
5.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2022/37, ANSSI-CC-2022/10, ANSSI-CC-2022/23, ANSSI-CC-2022/53 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-1107-2020 |
heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2022/57, ANSSI-CC-2022/13, ANSSI-CC-2022/10, ANSSI-CC-2022/12, ANSSI-CC-2022/53, ANSSI-CC-2022/56, ANSSI-CC-2022/23, ANSSI-CC-2022/11, ANSSI-CC-2022/37, ANSSI-CC-2022/54, ANSSI-CC-2022/22, ANSSI-CC-2022/55, ANSSI-CC-2022/52 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1107-2020 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0102
- certification_date: 01.06.2007
- claim: EAL2
- enhanced:
- assurance_level: EAL2
- cc_version: 2.1
- description: PRODUCT DESCRIPTION TOEs are software programs that run on the storage subsystems manufactured by Hitachi, Ltd. and control these subsystems. The subsystems are “SANRISE Universal Storage Platform”, “SANRISE Network Storage Controller”, “TagmaStore Universal Storage Platform”, “TagmaStore Network Storage Controller”, “SANRISE H12000”, and “SANRISE H10000”. TOEs have security feature to control access so that unintended access to user data on the storage subsystems would not be performed (i.e. User data that should not be changed would not be changed due to illegal access or operation mistakes)
- evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
- product: SANRISE Universal Storage Platform CHA/DKA Program TagmaStore Universal Storage Platform CHA/DKA Program SANRISE Network Storage Controller CHA/DKA Program TagmaStore Network Storage Controller CHA/DKA Program SANRISE H12000 CHA/DKA Program SANRISE H10000 CHA/DKA Program
- product_type: IT Product (Storage Control Software)
- report_link: https://www.ipa.go.jp/en/security/c0102_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0102_est.pdf
- toe_version: 50-04-34-00/00
- vendor: Hitachi, Ltd.
- expiration_date: 01.10.2013
- supplier: Hitachi, Ltd.
- toe_japan_name: SANRISE Universal Storage Platform CHA/DKA Program SANRISE Network Storage Controller CHA/DKA Program SANRISE H12000 CHA/DKA Program SANRISE H10000 CHA/DKA Program 50-04-34-00/00
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0102_it5068.html
- toe_overseas_name: TagmaStore Universal Storage Platform CHA/DKA Program TagmaStore Network Storage Controller CHA/DKA Program 50-04-34-00/00
|
|
heuristics/st_references/directly_referenced_by |
{} |
ANSSI-CC-2022/53 |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-1107-2020 |
heuristics/st_references/indirectly_referenced_by |
{} |
ANSSI-CC-2022/53 |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1107-2020 |
heuristics/protection_profiles |
{} |
94167fd161e87d71 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0099b_pdf.pdf |
pdf_data/cert_filename |
|
certificat-anssi-cc-2021_42.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author:
- /CreationDate: D:20211018162825+02'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20211018162825+02'00'
- /Producer: Acrobat Distiller 11.0 (Windows)
- /Title:
- pdf_file_size_bytes: 293555
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
c0102_erpt.pdf |
anssi-cc-2021_42.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0102-01: 1
- Certification No. C0102: 1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0099-V2-2020: 2
- BSI-PP-0084-2014: 1
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 6: 1
- EAL2: 2
- EAL6+: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- AGD:
- AGD_ALP: 1
- AGD_OPE: 4
- AGD_PRE: 2
- ALC:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Gemalto:
- Infineon:
- Infineon Technologies AG: 2
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCIMB-99-031: 1
- CCIMB-99-032: 2
- CCIMB-99-033: 2
- ISO:
|
- BSI:
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20070918163642+09'00'
- /ModDate: D:20070918163642+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 104544
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
- /Author:
- /CreationDate: D:20211018162639+02'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20211018162639+02'00'
- /Producer: Acrobat Distiller 11.0 (Windows)
- /Title:
- pdf_file_size_bytes: 195709
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 17
|
pdf_data/st_filename |
c0102_est.pdf |
anssi-cible-cc-2021_42en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0068-V2-2011-MA-01: 1
- BSI-CC-PP-0084-: 1
- BSI-CC-PP-0099-V2-2020: 1
- BSI-PP- 0055-2009: 1
- BSI-PP-0056-V2-MA-2012: 1
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 6+: 1
- EAL6: 31
- EAL6 augmented: 1
- EAL6+: 3
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ADO:
- ADO_DEL.1: 2
- ADO_IGS.1: 3
- ADV:
- ADV_FSP.1: 2
- ADV_HLD.1: 3
- ADV_RCR.1: 2
- ADV_SPM.1: 4
- AGD:
- AGD_ADM.1: 3
- AGD_USR.1: 3
- ATE:
- ATE_COV.1: 2
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
- AVA_SOF.1: 2
- AVA_VLA.1: 2
|
- ADV:
- ADV_ARC: 2
- ADV_ARC.1: 8
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 2
- ADV_FSP.4: 2
- ADV_FSP.5: 5
- ADV_IMP: 1
- ADV_IMP.1: 6
- ADV_IMP.2: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM.1: 8
- ADV_TDS: 1
- ADV_TDS.1: 2
- ADV_TDS.3: 3
- ADV_TDS.4: 7
- ADV_TDS.5: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 7
- AGD_PRE: 1
- AGD_PRE.1: 6
- ALC:
- ALC_CMC.4: 1
- ALC_CMC.5: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 2
- ALC_DVS.1: 1
- ALC_DVS.2: 3
- ALC_FLR.1: 5
- ALC_LCD.1: 4
- ALC_TAT.1: 2
- ALC_TAT.2: 3
- ALC_TAT.3: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 2
- ATE_COV.3: 1
- ATE_DPT.1: 1
- ATE_DPT.3: 2
- ATE_FUN.1: 6
- ATE_FUN.2: 1
- ATE_IND.2: 2
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FDP:
- FDP_ACC.1: 15
- FDP_ACC.1.1: 1
- FDP_ACF.1: 8
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 4
- FIA:
- FIA_UID.1: 4
- FIA_UID.2: 13
- FMT:
- FMT_MSA.1: 13
- FMT_MSA.1.1: 1
- FMT_MSA.2: 11
- FMT_MSA.2.1: 1
- FMT_MSA.3: 11
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SAE.1: 10
- FMT_SAE.1.1: 1
- FMT_SAE.1.2: 1
- FMT_SMF.1: 13
- FMT_SMF.1.1: 1
- FMT_SMR.1: 14
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_RVM.1: 13
- FPT_RVM.1.1: 1
- FPT_SEP.1: 12
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_STM.1: 14
- FPT_STM.1.1: 1
|
- FAU:
- FAU_ARP.1: 15
- FAU_ARP.1.1: 1
- FAU_SAA.1: 2
- FAU_SAS.1: 2
- FCO:
- FCS:
- FCS_CKM: 62
- FCS_CKM.1: 29
- FCS_CKM.1.1: 3
- FCS_CKM.2: 10
- FCS_CKM.2.1: 1
- FCS_CKM.3: 5
- FCS_CKM.3.1: 1
- FCS_CKM.4: 28
- FCS_CKM.4.1: 2
- FCS_CMK.4: 2
- FCS_COP: 66
- FCS_COP.1: 31
- FCS_COP.1.1: 5
- FCS_RNG: 25
- FCS_RNG.1: 14
- FCS_RNG.1.1: 3
- FCS_RNG.1.2: 1
- FDP:
- FDP_ACC: 44
- FDP_ACC.1: 20
- FDP_ACC.2: 6
- FDP_ACF: 39
- FDP_ACF.1: 25
- FDP_IFC: 24
- FDP_IFC.1: 14
- FDP_IFC.2: 2
- FDP_IFF: 16
- FDP_IFF.1: 14
- FDP_ITC: 11
- FDP_ITC.1: 12
- FDP_ITC.2: 17
- FDP_ITT.1: 2
- FDP_RIP: 97
- FDP_RIP.1: 11
- FDP_RIP.1.1: 1
- FDP_ROL: 13
- FDP_ROL.1: 5
- FDP_SDC.1: 2
- FDP_SDI: 8
- FDP_SDI.2: 4
- FDP_UCT.1: 2
- FDP_UIT: 6
- FDP_UIT.1: 4
- FIA:
- FIA_AFL: 21
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_API: 1
- FIA_API.1: 2
- FIA_ATD: 12
- FIA_ATD.1: 3
- FIA_UAU: 64
- FIA_UAU.1: 6
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UAU.4: 1
- FIA_UAU.4.1: 1
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6.1: 1
- FIA_UID: 42
- FIA_UID.1: 18
- FIA_UID.1.1: 2
- FIA_UID.1.2: 2
- FIA_UID.2: 1
- FIA_USB: 6
- FIA_USB.1: 3
- FMT:
- FMT_LIM: 34
- FMT_LIM.1: 17
- FMT_LIM.1.1: 3
- FMT_LIM.2: 16
- FMT_LIM.2.1: 3
- FMT_MSA: 96
- FMT_MSA.1: 13
- FMT_MSA.2: 2
- FMT_MSA.3: 21
- FMT_MTD: 57
- FMT_MTD.1: 13
- FMT_MTD.3: 1
- FMT_SMF: 78
- FMT_SMF.1: 29
- FMT_SMF.1.1: 2
- FMT_SMR: 88
- FMT_SMR.1: 38
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FPR:
- FPR_UNO: 5
- FPR_UNO.1: 8
- FPR_UNO.1.1: 1
- FPT:
- FPT_EMS: 4
- FPT_EMS.1: 14
- FPT_EMS.1.1: 3
- FPT_EMS.1.2: 3
- FPT_FLS: 47
- FPT_FLS.1: 16
- FPT_FLS.1.1: 2
- FPT_ITT: 6
- FPT_ITT.1: 2
- FPT_PHP: 7
- FPT_PHP.3: 17
- FPT_PHP.3.1: 1
- FPT_RCV: 12
- FPT_RCV.3: 4
- FPT_RCV.4: 2
- FPT_TDC.1: 7
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST: 8
- FPT_TST.1: 15
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FPT_TST.2: 2
- FRU:
- FTP:
- FTP_ITC: 17
- FTP_ITC.1: 7
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 4
- FTP_TRP.1: 7
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.CAP_FILE: 3
- A.DELETION: 3
- A.OS-UPDATE-EVIDENCE: 3
- A.SECURE_ACODE_MANAGEMENT: 3
- A.VERIFICATION: 3
- D:
- D.API_DATA: 3
- D.APP_CODE: 6
- D.APP_C_DATA: 3
- D.APP_I_DATA: 5
- D.APP_KEYS: 1
- D.CRYPTO: 5
- D.JCS_CODE: 6
- D.JCS_DATA: 8
- D.OS-: 1
- D.OS-UPDATE-CODE-ID: 3
- D.OS-UPDATE_ADDITIONALCODE: 5
- D.OS-UPDATE_DEC-KEY: 2
- D.OS-UPDATE_SGNVER-KEY: 2
- D.PIN: 4
- D.SEC_DATA: 7
- O:
- O.AES: 1
- O.ALARM: 15
- O.APPLET: 28
- O.ARRAY_VIEWS_CONFID: 7
- O.ARRAY_VIEWS_INTEG: 3
- O.CARD-MANAGEMENT: 1
- O.CARD_MANAGEMENT: 17
- O.CIPHER: 10
- O.CODE_CAP_FILE: 23
- O.CONFID-OS-UPDATE: 3
- O.DELETION: 4
- O.FIREWALL: 12
- O.GLOBAL_ARRAYS_CONFID: 9
- O.GLOBAL_ARRAYS_INTEG: 5
- O.INSTALL: 7
- O.JAVAOBJECT: 68
- O.KEY-MNGT: 6
- O.LOAD: 11
- O.NATIVE: 11
- O.OBJ-DELETION: 4
- O.OBJ_DELETION: 4
- O.OPERATE: 15
- O.PIN-MNGT: 6
- O.PIN_MNGT: 4
- O.REALLOCATION: 5
- O.RESOURCES: 9
- O.RND: 2
- O.RNG: 10
- O.SCP: 31
- O.SECURE_AC_ACTIVATION: 4
- O.SECURE_LOAD_ACODE: 9
- O.SID: 13
- O.TDES: 1
- O.TOE_IDENTIFICATION: 6
- O.TRANSACTION: 6
- OE:
- OE.CAP_FILE: 5
- OE.CARD-: 1
- OE.CARD-MANAGEMENT: 1
- OE.CODE-: 1
- OE.CODE-EVIDENCE: 10
- OE.OS-UPDATE-ENCRYPTION: 5
- OE.OS-UPDATE-EVIDENCE: 2
- OE.SCP: 2
- OE.SECURE_ACODE_MANAGEMENT: 2
- OE.VERIFICATION: 25
- OP:
- OP.ARRAY_AASTORE: 3
- OP.ARRAY_ACCESS: 7
- OP.ARRAY_LENGTH: 3
- OP.ARRAY_T_ALOAD: 3
- OP.ARRAY_T_ASTORE: 3
- OP.CREATE: 11
- OP.DELETE_APPLET: 6
- OP.DELETE_CAP_FILE: 4
- OP.DELETE_CAP_FILE_APPLET: 4
- OP.INSTANCE_FIELD: 6
- OP.INVK_INTERFACE: 10
- OP.INVK_VIRTUAL: 8
- OP.JAVA: 8
- OP.PUT: 8
- OP.PUTFIELD: 1
- OP.PUTSTATIC: 1
- OP.THROW: 7
- OP.TYPE_ACCESS: 7
- OSP:
- OSP.ADDITIONAL_CODE_ENCRYPTION: 3
- OSP.ADDITIONAL_CODE_SIGNING: 3
- OSP.ATOMIC_ACTIVATION: 3
- OSP.RNG: 3
- OSP.TOE_IDENTIFICATION: 3
- OSP.VERIFICATION: 3
- OT:
- R:
- T:
- T.CONFID-APPLI-DATA: 3
- T.CONFID-JCS-CODE: 3
- T.CONFID-JCS-DATA: 3
- T.CONFID-OS-UPDATE_LOAD: 3
- T.DELETION: 3
- T.EXE-CODE: 6
- T.FAKE-SGNVER-KEY: 3
- T.INSTALL: 3
- T.INTEG-APPLI-CODE: 6
- T.INTEG-APPLI-DATA: 6
- T.INTEG-JCS-CODE: 3
- T.INTEG-JCS-DATA: 3
- T.INTEG-OS-UPDATE_LOAD: 3
- T.NATIVE: 3
- T.OBJ-DELETION: 3
- T.PHYSICAL: 3
- T.RESOURCES: 3
- T.SID: 6
- T.UNAUTHORIZED_TOE_CODE_UPDATE: 3
- T.WRONG-UPDATE-STATE: 3
|
pdf_data/st_keywords/vendor |
- Microsoft:
- Microsoft: 1
- Microsoft Corporation: 1
|
- Gemalto:
- Infineon:
- Thales:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 2
- TDEA: 1
- TDES: 14
- Triple-DES: 3
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-256: 2
- SHA-384: 1
- SHA-512: 2
- SHA2: 1
- SHA224: 1
- SHA3:
- SHA3: 2
- SHA3-384: 1
- SHA3-512: 1
|
pdf_data/st_keywords/crypto_scheme |
|
- KA:
- Key Agreement: 6
- Key agreement: 2
- MAC:
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 5
- Physical Tampering: 3
- fault induction: 2
- malfunction: 8
- physical tampering: 1
- SCA:
- DPA: 2
- Leak-Inherent: 2
- SPA: 1
- physical probing: 6
- timing attacks: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.DG1: 6
- EF.DG16: 6
- EF.DG3: 1
- EF.DG4: 1
|
pdf_data/st_keywords/standard_id |
- CC:
- CCIMB-99-031: 1
- CCIMB-99-032: 1
- CCIMB-99-033: 1
|
- BSI:
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- FIPS 197: 1
- FIPS180-2: 1
- FIPS197: 5
- ICAO:
- NIST:
- PKCS:
- SCP:
- SCP01: 4
- SCP02: 4
- SCP03: 5
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- 1, are out of the scope of the SPM as they are linked to the applet loading or deletion that is out of scope of the SPM boundaries limited to VM opcodes MultiApp V5: JCS Security Target ST Ref: D1494591_LITE: 1
- Context, the Selected Applet Context, and the Active Applets Note: the Selected Applet context is out of scope of the VM functionalities. It is a process that occurs prior to VM start MultiApp V5: JCS Security: 1
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
- out of scope: 4
- the scope because done before the JCVM entering (selection of the applet) Note: The Array View is out of scope of this modelisation ADV_SPM.1.2D For each policy covered by the formal security policy model, the: 1
|
pdf_data/st_metadata |
- /Author: hiwa.sysdeptdm
- /CreationDate: D:20070918131359+09'00'
- /Creator: PScript5.dll Version 5.2
- /ModDate: D:20070918131359+09'00'
- /Producer: Acrobat Distiller 7.0.5 (Windows)
- /Title: Microsoft Word - User Data Protection Security Target_Eng.doc
- pdf_file_size_bytes: 231671
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 57
|
- /Author: D1417544
- /CreationDate: D:20211021152816+02'00'
- /Creator: Microsoft® Word 2016
- /Keywords: 28-03-2018
- /ModDate: D:20211021152816+02'00'
- /Producer: Microsoft® Word 2016
- /Subject: 1.12
- /Title: MultiApp V4.1: JCS Security Target
- pdf_file_size_bytes: 3796482
- pdf_hyperlinks: https://www.ssi.gouv.fr/uploads/2021/03/anssi-guide-mecanismes_crypto-2.04.pdf
- pdf_is_encrypted: False
- pdf_number_of_pages: 147
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |