name |
ChipDoc v2 on JCOP 3 P60 in SSCD configuration (v7b4_2) (ANSSI-CC-2023/38) |
eTravel 3.1 BAC on MultiApp V5.1 Version 3.1.0.0 ( ANSSI-CC-2023/34 ) |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
FR |
FR |
status |
active |
active |
not_valid_after |
21.07.2028 |
22.09.2028 |
not_valid_before |
21.07.2023 |
22.09.2023 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2023_38fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2023_34fr.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_38fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_34fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-2023_38en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-2023_34en.pdf |
manufacturer |
NXP Semiconductors |
THALES DIS FRANCE SA |
manufacturer_web |
https://www.nxp.com/ |
https://www.thalesgroup.com/en/europe/france |
security_level |
AVA_VAN.5, EAL5+, ALC_DVS.2 |
ADV_INT.2, ALC_TAT.2, EAL4+, ADV_FSP.5, ATE_DPT.3, ADV_TDS.4, ALC_DVS.2, ALC_CMS.5 |
dgst |
5969704b09b393cd |
47e2487a9d336183 |
heuristics/cert_id |
ANSSI-CC-2023/38 |
ANSSI-CC-2023/34 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_LCD.1, ADV_TDS.4, ATE_DPT.3, ATE_COV.2, ATE_IND.2, ASE_SPD.1, AVA_VAN.5, ASE_TSS.1, ADV_ARC.1, ASE_ECD.1, ALC_DEL.1, ALC_CMC.4, ATE_FUN.1, ALC_TAT.2, ADV_INT.2, AGD_OPE.1, ADV_FSP.5, ASE_REQ.2, AGD_PRE.1, ALC_CMS.5, ALC_DVS.2, ASE_OBJ.2, ASE_INT.1, ASE_CCL.1, ADV_IMP.1 |
ALC_FLR.2, ADV_TDS.4, ADV_FSP.5, ALC_CMS.5, ASE_TSS.2, ALC_DVS.2, ADV_ARC.1, ATE_DPT.3, ALC_TAT.2, ADV_INT.2 |
heuristics/extracted_versions |
3, 38, 2023 |
3.1, 3.1.0.0, 5.1 |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
NSCIB-CC-2200035-01-CR |
ANSSI-CC-2023/01, ANSSI-CC-2023/31 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-1059-V5-2022, BSI-DSZ-CC-1059-2018, BSI-DSZ-CC-1059-V4-2021, NSCIB-CC-2200035-01-CR, BSI-DSZ-CC-1059-V3-2019, BSI-DSZ-CC-0973-V2-2016, BSI-DSZ-CC-1059-V2-2019, BSI-DSZ-CC-0973-2016 |
ANSSI-CC-2023/01, ANSSI-CC-2023/31 |
heuristics/scheme_data |
- cert_id: ANSSI-CC-2023/38
- description: Le produit évalué est « ChipDoc v2 on JCOP 3 P60 in SSCD configuration, v7b4_2 » développé par NXP SEMICONDUCTORS.
Ce produit offre des services d’authentification et de signature électronique (SSCD).
- developer: NXP SEMICONDUCTORS
- enhanced:
- augmented: ALC_DVS.2, AVA_VAN.5
- category: Cartes à puce
- cc_version: Critères Communs version 3.1r4
- cert_id: ANSSI-CC-2023/38
- cert_link: https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2023_38fr.pdf
- certification_date: 21/07/2023
- developer: NXP SEMICONDUCTORS
- evaluation_facility: THALES/CNES
- expiration_date: 21/07/2028
- level: EAL5+
- mutual_recognition: CCRA
SOG-IS
- protection_profile: Protection profiles for secure signature creation device
Part 2 : Device with key generation, v2.0.1, certifié BSI-CC-PP-0059-2009-MA-02
Part 3 : Device with key import, v1.0.2, certifié BSI-CC-PP-0075-2012-MA-01
- sponsor: NXP SEMICONDUCTORS
- expiration_date: 21 Juillet 2028
- level: EAL5+
- product: ChipDoc v2 on JCOP 3 P60 in SSCD configuration v7b4_2
- sponsor: NXP SEMICONDUCTORS
- url: https://cyber.gouv.fr/produits-certifies/chipdoc-v2-jcop-3-p60-sscd-configuration-v7b42
|
- cert_id: ANSSI-CC-2023/34
- description: Le produit évalué est « eTravel 3.1 BAC on MultiApp V5.1, Version 3.1.0.0 » développé par THALES DIS FRANCE SAS.
Le produit implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisation de l’aviation civile internationale (ICAO). Ce produit permet la vérification de l’authenticité du document de voyage et l’identification de son porteur notamment lo
- developer: THALES DIS FRANCE SAS
- enhanced:
- augmented: ADV_FSP.5, ADV_INT.2, ADV_TDS.4, ALC_CMS.5, ALC_DVS.2, ALC_TAT.2 et ATE_DPT.3
- category: Cartes à puce
- cc_version: Critères Communs version 3.1r5
- cert_id: ANSSI-CC-2023/34
- cert_link: https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2023_34fr.pdf
- certification_date: 22/09/2023
- developer: THALES DIS FRANCE SAS
- evaluation_facility: CEA-LETI
- expiration_date: 22/09/2028
- level: EAL4+
- mutual_recognition: CCRA
SOG-IS
- protection_profile: Protection Profile, Machine Readable Travel Document with “ICAO Application”, Basic Access Control, version 1.10 certifié BSI-PP-0055 le 25 mars 2009
- sponsor: THALES DIS FRANCE SAS
- target_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_34-M01en_0.pdf
- expiration_date: 22 Septembre 2028
- level: EAL4+
- product: eTravel 3.1 BAC on MultiApp V5.1 (Version 3.1.0.0 )
- sponsor: THALES DIS FRANCE SAS
- url: https://cyber.gouv.fr/produits-certifies/etravel-31-bac-multiapp-v51-version-3100
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
NSCIB-CC-23-67206-CR, BSI-DSZ-CC-1059-V5-2022 |
ANSSI-CC-2023/01 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
NSCIB-CC-23-67206-CR, BSI-DSZ-CC-1059-V5-2022 |
ANSSI-CC-2023/01 |
heuristics/verified_cpe_matches |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
Certificat-CC-2023_38fr.pdf |
Certificat-CC-2023_34fr.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0059-2009-MA-02: 1
- BSI-CC-PP-0075-2012-MA-01: 1
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
- ADV:
- ADV_FSP.5: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- ALC:
- ALC_CMS.5: 1
- ALC_DVS.2: 1
- ALC_TAT.2: 1
- ATE:
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20230727165622+02'00'
- /Creator: Acrobat PDFMaker 23 pour Word
- /Keywords:
- /ModDate: D:20230727165655+02'00'
- /Producer: Adobe PDF Library 23.1.175
- pdf_file_size_bytes: 171872
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
- /CreationDate: D:20230929174531+02'00'
- /Creator: Acrobat PDFMaker 23 pour Word
- /Keywords:
- /ModDate: D:20230929175424+02'00'
- /Producer: Adobe PDF Library 23.1.175
- pdf_file_size_bytes: 157890
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
ANSSI-CC-2023_38fr.pdf |
ANSSI-CC-2023_34fr.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- FR:
- NL:
- NSCIB-CC-2200035-01-CR: 1
|
- FR:
- ANSSI-CC-2023/01: 1
- ANSSI-CC-2023/31: 1
- ANSSI-CC-2023/34: 2
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0059-2009-MA-02: 2
- BSI-CC-PP-0075-2012-MA-01: 2
- other:
- PP-SSCD-Part2: 2
- PP-SSCD-Part3: 2
|
- BSI:
- BSI-CC-PP-0055-2009: 1
- BSI-PP-0055: 1
- BSI-PP-0084-2014: 1
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_FSP.5: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- ALC:
- ALC_CMS.5: 1
- ALC_DVS.2: 1
- ALC_FLR: 1
- ALC_TAT.2: 1
- ATE:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- ICAO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename |
ANSSI-cible-2023_38en.pdf |
ANSSI-cible-2023_34en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-1059-V5-2022: 1
- NL:
- CC-23-67206: 1
- NSCIB-CC-23-2200035-01: 1
|
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0059-2009-MA-01: 1
- BSI-PP-0035-2007: 1
- BSI-PP-0075: 1
|
- BSI:
- BSI-CC-PP-0068-: 1
- BSI-CC-PP-0084-: 1
- BSI-CC-PP-0084-2014: 1
- BSI-PP- 0056-V2-MA-2012: 1
- BSI-PP-0055-2009: 1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 5+: 1
- EAL4+: 1
- EAL5: 9
- EAL5 augmented: 3
|
- EAL:
- EAL 6+: 1
- EAL4: 3
- EAL4 augmented: 1
- EAL4+: 1
- EAL6: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 5
- ADV_FSP.4: 1
- ADV_FSP.5: 6
- ADV_IMP.1: 5
- ADV_INT.2: 2
- ADV_TDS.3: 1
- ADV_TDS.4: 8
- AGD:
- AGD_OPE.1: 5
- AGD_PRE.1: 5
- ALC:
- ALC_CMC.4: 2
- ALC_CMS.5: 1
- ALC_DEL.1: 2
- ALC_DVS: 1
- ALC_DVS.2: 7
- ALC_LCD.1: 3
- ALC_TAT.2: 4
- ASE:
- ASE_CCL: 2
- ASE_CCL.1: 2
- ASE_ECD: 2
- ASE_ECD.1: 1
- ASE_INT: 2
- ASE_INT.1: 4
- ASE_OBJ: 2
- ASE_OBJ.2: 3
- ASE_REQ: 2
- ASE_REQ.2: 4
- ASE_SPD: 2
- ASE_SPD.1: 1
- ASE_TSS: 2
- ASE_TSS.1: 2
- ATE:
- ATE_COV.2: 4
- ATE_DPT.1: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 4
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.5: 3
- ADV_INT.2: 3
- ADV_TDS.4: 3
- ALC:
- ALC_CMS.5: 3
- ALC_DVS.2: 3
- ALC_FLR.2: 1
- ALC_TAT.2: 3
- ASE:
- ATE:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_CKM.1: 10
- FCS_CKM.1.1: 1
- FCS_CKM.4: 11
- FCS_CKM.4.1: 1
- FCS_COP: 6
- FCS_COP.1: 11
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC: 33
- FDP_ACC.1: 13
- FDP_ACF: 23
- FDP_ACF.1: 23
- FDP_IFC.1: 4
- FDP_ITC: 6
- FDP_ITC.1: 8
- FDP_ITC.2: 1
- FDP_RIP.1: 7
- FDP_RIP.1.1: 1
- FDP_SDI: 11
- FDP_SDI.1: 2
- FDP_SDI.2: 6
- FDP_UCT: 6
- FDP_UCT.1: 3
- FIA:
- FIA_AFL.1: 5
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_UAU.1: 7
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 1
- FIA_UID.1: 9
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MOF: 1
- FMT_MOF.1: 6
- FMT_MSA: 12
- FMT_MSA.1: 4
- FMT_MSA.2: 6
- FMT_MSA.2.1: 1
- FMT_MSA.3: 16
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MSA.4: 7
- FMT_MSA.4.1: 1
- FMT_MTD: 10
- FMT_MTD.1: 2
- FMT_SMF.1: 14
- FMT_SMF.1.1: 1
- FMT_SMR.1: 14
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS: 1
- FPT_FLS.1: 6
- FPT_FLS.1.1: 1
- FPT_PHP.1: 5
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 6
- FPT_PHP.3.1: 1
- FPT_TST: 1
- FPT_TST.1: 9
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 7
- FTP_ITC.1: 6
- FTP_TRP.1: 1
|
- FAU:
- FAU_GEN: 1
- FAU_SAS: 6
- FAU_SAS.1: 9
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 15
- FCS_CKM.1: 15
- FCS_CKM.1.1: 2
- FCS_CKM.2: 4
- FCS_CKM.4: 28
- FCS_CKM.4.1: 1
- FCS_COP: 42
- FCS_COP.1: 9
- FCS_COP.1.1: 1
- FCS_RND: 7
- FCS_RND.1: 10
- FCS_RND.1.1: 2
- FDP:
- FDP_ACC.1: 16
- FDP_ACC.1.1: 1
- FDP_ACF: 1
- FDP_ACF.1: 9
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 2
- FDP_IFC.1: 4
- FDP_ITC: 2
- FDP_ITC.1: 12
- FDP_ITC.2: 12
- FDP_UCT.1: 8
- FDP_UCT.1.1: 1
- FDP_UIT.1: 7
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL.1: 8
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_API: 11
- FIA_API.1: 5
- FIA_API.1.1: 1
- FIA_SOS.2: 1
- FIA_UAU: 5
- FIA_UAU.1: 8
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 9
- FIA_UAU.4.1: 1
- FIA_UAU.5: 8
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 3
- FIA_UAU.6: 9
- FIA_UAU.6.1: 1
- FIA_UID.1: 9
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_LIM: 7
- FMT_LIM.1: 18
- FMT_LIM.1.1: 2
- FMT_LIM.2: 16
- FMT_LIM.2.1: 2
- FMT_MSA.1: 1
- FMT_MSA.3: 3
- FMT_MTD: 27
- FMT_MTD.1: 6
- FMT_SMF.1: 18
- FMT_SMF.1.1: 1
- FMT_SMR.1: 23
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS: 4
- FPT_EMS.1: 11
- FPT_EMS.1.1: 3
- FPT_EMS.1.2: 3
- FPT_FLS.1: 8
- FPT_FLS.1.1: 1
- FPT_PHP.3: 9
- FPT_PHP.3.1: 1
- FPT_TST.1: 8
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC.1: 5
- FTP_TRP.1: 5
|
pdf_data/st_keywords/cc_claims |
- A:
- A.CGA: 3
- A.CSP: 2
- A.SCA: 3
- A.SCP: 1
- OE:
|
|
pdf_data/st_keywords/vendor |
- NXP:
- NXP: 71
- NXP Semiconductors: 19
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
- Generic:
- Crypto Library ................7: 1
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- DFA: 1
- fault injection: 1
- malfunction: 1
- physical tampering: 4
- SCA:
- DPA: 3
- SPA: 2
- timing attacks: 2
|
- FI:
- Malfunction: 5
- Physical Tampering: 5
- Physical tampering: 1
- fault injection: 1
- malfunction: 6
- physical tampering: 1
- SCA:
- DPA: 2
- Leak-Inherent: 1
- Physical Probing: 1
- SPA: 1
- physical probing: 4
- timing attacks: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.COM: 8
- EF.DG1: 28
- EF.DG13: 3
- EF.DG14: 3
- EF.DG15: 5
- EF.DG16: 26
- EF.DG2: 10
- EF.DG3: 6
- EF.DG4: 6
- EF.DG5: 7
- EF.DG6: 1
- EF.SOD: 8
|
pdf_data/st_keywords/standard_id |
- CC:
- FIPS:
- FIPS PUB 180-2: 1
- FIPS PUB 197: 1
- FIPS PUB 46-3: 2
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816: 2
- PKCS:
|
- BSI:
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- FIPS:
- FIPS 180-2: 1
- FIPS 46-3: 2
- FIPS PUB 46-3: 1
- FIPS46-3: 3
- ICAO:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816-4: 1
- NIST:
- RFC:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: David Herrgesell
- /CreationDate: D:20230614172218+02'00'
- /Creator: Microsoft® Word for Microsoft 365
- /ModDate: D:20230614172218+02'00'
- /Producer: Microsoft® Word for Microsoft 365
- /Title:
- pdf_file_size_bytes: 1132893
- pdf_hyperlinks: mailto:[email protected], http://www.nxp.com/
- pdf_is_encrypted: False
- pdf_number_of_pages: 59
|
- /Author: THALES
- /CreationDate: D:20230517105330+02'00'
- /Creator: Microsoft® Word 2016
- /Keywords: Security Target
- /ModDate: D:20230517105330+02'00'
- /Producer: Microsoft® Word 2016
- /Title: MultiApp V5.1: eTravel 3.1 BAC Security Target
- pdf_file_size_bytes: 1795365
- pdf_hyperlinks: https://www.ssi.gouv.fr/uploads/2021/03/anssi-guide-mecanismes_crypto-2.04.pdf
- pdf_is_encrypted: False
- pdf_number_of_pages: 58
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |