name |
ID-One ePass Full EAC v2 MRTD en configuration BAC avec AA et CA masqué sur les composants P60x080PVC/PVG |
Oberthur Technologies Applet ID One Classic v1.01.1 en configuration CNS, Classic ou CIE masquée sur Cosmo v7.0-a Standard et Basic sur composants Atmel |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
FR |
FR |
status |
archived |
archived |
not_valid_after |
23.06.2021 |
01.09.2019 |
not_valid_before |
23.06.2016 |
20.05.2010 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-En_2016_37en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2010-26fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi_cible_2016_37_LITE.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2010-26en.pdf |
manufacturer |
Oberthur Technologies |
Oberthur Technologies / ATMEL Secure Microcontroller Solutions |
manufacturer_web |
https://www.oberthur.com/ |
https://www.oberthur.com/ |
security_level |
ADV_INT.2, ADV_TDS.2, ADV_FSP.5, ALC_CMC.5, ALC_TAT.2, ALC_DVS.2, ATE_DPT.3, EAL4+ |
EAL4+, AVA_VAN.5, ALC_DVS.2 |
dgst |
5a7ae03fa2b6bdbb |
1f6c7d374ff17ce4 |
heuristics/cert_id |
ANSSI-CC-2016/37 |
ANSSI-CC-2010/26 |
heuristics/cert_lab |
CEA |
THALES |
heuristics/cpe_matches |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_FSP.5, ADV_TDS.2, ALC_CMS.5, ALC_DVS.2, ATE_DPT.3, ALC_FLR.1, ADV_INT.2, ASE_TSS.2, ALC_CMC.5, AVA_VAN.5, ALC_TAT.2 |
ASE_CCL.1, ALC_DEL.1, ALC_CMC.4, ALC_DVS.2, AVA_VAN.5, ATE_FUN.1, ADV_ARC.1, ADV_TDS.3, ASE_TSS.1, ADV_IMP.2, ASE_SPD.1, ASE_REQ.2, ALC_CMS.4, ALC_TAT.1, ATE_COV.2, AGD_OPE.1, ASE_ECD.1, ADV_FSP.4, ASE_INT.1, AGD_PRE.1, ALC_LCD.1, ASE_OBJ.2 |
heuristics/extracted_versions |
- |
1.01.1, 7.0 |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-0837-V2-2014 |
ANSSI-CC-2009/46, ANSSI-CC-2009/36 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-0837-V2-2014 |
ANSSI-CC-2009/11, ANSSI-CC-2009/46, ANSSI-CC-2009/36 |
heuristics/scheme_data |
- cert_id: ANSSI-CC-2016/37
- description: Le produit certifié est la carte à puce « ID-One ePass Full EAC v2 MRTD en configuration BAC avec AA et CA masqué sur le composant P60x080PVC/PVG », pouvant être en mode contact ou sans contact. Le produit est développé par OBERTHUR TECHNOLOGIES sur un composant NXP SEMICONDUCTORS. Le produit implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organi
- developer: Oberthur Technologies / NXP Semiconductors
- enhanced:
- augmented: ADV_FSP.5, ADV_INT.2, ADV_TDS.4, ALC_CMS.5, ALC_DVS.2, ALC_TAT.2, ATE_DPT.3
- category: Cartes à puce
- cc_version: Critères Communs version 3.1r4
- cert_id: ANSSI-CC-2016/37
- certification_date: 2016-06-23
- developer: Oberthur Technologies / NXP Semiconductors
- evaluation_facility: CEA - LETI
- level: EAL4+
- mutual_recognition: SOG-IS CCRA
- protection_profile: BSI-CC-PP-0055, [PP BAC]
- report_link: https://cyber.gouv.fr/sites/default/files/2016/06/anssi-cc-en_2016_37en.pdf
- sponsor: Oberthur Technologies
- target_link: https://cyber.gouv.fr/sites/default/files/2016/06/anssi-cc-2016-37-m01-cible-lite.pdf
- level: EAL4+
- product: ID-One ePass Full EAC v2 MRTD en configuration BAC avec AA et CA masqué sur les composants P60x080PVC/PVG
- sponsor: Oberthur Technologies
- url: https://cyber.gouv.fr/produits-certifies/id-one-epass-full-eac-v2-mrtd-en-configuration-bac-avec-aa-et-ca-masque-sur-les
|
- cert_id: ANSSI-CC-2010/26
- description: Le produit certifié est l'applet, d'Oberthur Technologies, ID One Classic v1.01.1 en configuration CNS, Classic ou CIE masquée sur la plateforme, d'Oberthur Technologies, Cosmo v7.0-a Standard et Basic sur composants Atmel Secure Microcontroller Solutions. La TOE (Target Of Evaluation - cible d'évaluation) est une carte à puce destinée à être utilisée dans le cadre de projets me
- developer: Oberthur Technologies et Atmel Secure Microcontroller Solutions
- enhanced:
- augmented: ALC_DVS.2, AVA_VAN.5
- category: Cartes à puce
- cc_version: Critères Communs version 3.1
- cert_id: ANSSI-CC-2010/26
- certification_date: 2010-05-20
- developer: Oberthur Technologies et Atmel Secure Microcontroller Solutions
- evaluation_facility: CEACI (Thales Security Systems - CNES)
- level: EAL4+
- mutual_recognition: SOG-IS CCRA
- protection_profile: BSI-PP-0005-2002, BSI-PP-0006-2002
- report_link: https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2010-26fr.pdf
- sponsor: Oberthur Technologies
- target_link: https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2010-26en.pdf
- level: EAL4+
- product: Applet ID One Classic v1.01.1 en configuration CNS, Classic ou CIE masquée sur Cosmo v7.0-a Standard et Basic sur composants Atmel
- sponsor: Oberthur Technologies
- url: https://cyber.gouv.fr/produits-certifies/applet-id-one-classic-v1011-en-configuration-cns-classic-ou-cie-masquee-sur-0
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
BSI-DSZ-CC-0837-V2-2014 |
ANSSI-CC-2009/46 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
BSI-DSZ-CC-0837-V2-2014 |
ANSSI-CC-2009/11, ANSSI-CC-2009/46, BSI-DSZ-CC-0421-2008 |
heuristics/verified_cpe_matches |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
ANSSI-CC-En_2016_37en.pdf |
ANSSI-CC_2010-26fr.pdf |
pdf_data/report_frontpage |
- FR:
- cc_security_level: EAL 4 augmented ADV_FSP.5, ADV_INT.2, ADV_TDS.4, ALC_CMS.5, ALC_DVS.2, ALC_TAT.2, ATE_DPT.3
- cc_version: Common Criteria version 3.1 revision 4
- cert_id: ANSSI-CC-2016/37
- cert_item: ID-One ePass Full EAC v2 MRTD in BAC configuration with AA and CA on P60x080PVC/PVG components
- cert_item_version: SAAAAR 080031 : ePass V3 Full EACv2 on NXP SAAAAR 082456 : Code r6.0 Generic SAAAAR 082844 : Optional Code r4.0 Digital Blurred Image
- cert_lab: CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France
- developer: Oberthur Technologies 420 rue d'Estienne d'Orves CS 40008 92705 Colombes, France NXP Semiconductors Box 54 02 40, D-22502 Hamburg, Allemagne Sponsor Oberthur Technologies 420 rue d'Estienne d'Orves CS 40008 92705 Colombes, France
- match_rules: ['Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developers(.+)Evaluation facility(.+)Recognition arrangements']
- ref_protection_profiles: BSI-CC-PP-0055, [PP BAC], version 1.10 Machine Readable Travel Document with ICAO application, Basic Access Control
|
- FR:
- cc_security_level: EAL 4 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1
- cert_id: ANSSI-CC-2010/26
- cert_item: Applet ID One Classic v1.01.1 en configuration CNS, Classic ou CIE masquée sur Cosmo v7.0-a Standard et Basic sur composants Atmel
- cert_item_version: Version 1.01.1
- cert_lab: THALES - CEACI (T3S – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France Tél : +33 (0)5 62 88 28 01 ou 18, mél : [email protected]
- developer: Oberthur Technologies1 50 quai Michelet 92300 Levallois-Perret, France Atmel Secure Microcontroller Solutions1 Maxwell Building - Scottish Enterprise technology Park East Kilbride, G75 0QR - Ecosse, Royaume-Uni Commanditaire Oberthur Technologies 50 quai Michelet 92300 Levallois-Perret, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: BSI-PP-0005-2002] : SSCD Type 2, version 1.04 [BSI-PP-0006-2002] : SSCD Type 3, version 1.05
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0837-V2-2014: 3
- FR:
|
- FR:
- ANSSI-CC-2007_02-M02: 1
- ANSSI-CC-2009_36: 2
- ANSSI-CC-2009_46: 7
- ANSSI-CC-2010/26: 20
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0055: 1
- BSI-CC-PP-0055-2009: 1
- BSI-PP- 0035-2007: 2
- BSI-PP-0035-2007: 1
|
- BSI:
- BSI-PP- 0005-2002: 1
- BSI-PP- 0006-2002: 1
- BSI-PP-0005-2002: 2
- BSI-PP-0006-2002: 2
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 2
- EAL 4 augmented: 2
- EAL 5: 1
- EAL 7: 1
- EAL2: 2
- EAL6: 1
- EAL7: 1
- ITSEC:
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 2
- EAL 5: 1
- EAL 7: 1
- EAL4: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_FSP.5: 2
- ADV_IMP: 1
- ADV_INT: 1
- ADV_INT.2: 2
- ADV_SPM: 1
- ADV_TDS: 1
- ADV_TDS.4: 2
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_CMS.5: 2
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_FLR.1: 1
- ALC_TAT: 1
- ALC_TAT.2: 2
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_DPT.3: 2
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
- ADO:
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_IMP.2: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
- NXP:
- NXP: 8
- NXP Semiconductors: 2
- Oberthur:
- OBERTHUR: 4
- Oberthur Technologies: 8
|
- Oberthur:
- Oberthur: 1
- Oberthur Technologies: 9
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author:
- /CreationDate:
- /Creator: PDFCreator Version 1.2.1
- /Keywords:
- /ModDate:
- /Producer: GPL Ghostscript 9.02
- /Subject:
- /Title: ANSSI-CC-En_2016_37en
- pdf_file_size_bytes: 205180
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 17
|
- /CreationDate: D:20100525132900+02'00'
- /Keywords:
- /ModDate: D:20100525132900+02'00'
- /Producer: Acrobat Distiller 8.0.0 (Windows)
- pdf_file_size_bytes: 195087
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 19
|
pdf_data/st_filename |
anssi_cible_2016_37_LITE.pdf |
ANSSI-CC-cible_2010-26en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0837-v2-2014: 1
- FR:
|
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-055: 1
- BSI-PP-0035: 1
- BSI-PP-0056: 2
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 4: 1
- EAL 6: 1
- EAL4: 5
- EAL4 augmented: 3
- EAL5: 6
|
- EAL:
- EAL 4+: 1
- EAL4: 10
- EAL4 augmented: 3
- EAL4+: 3
- EAL5: 1
- EAL5 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_FSP.5: 5
- ADV_INT.2: 5
- ADV_TDS.4: 5
- AGD:
- ALC:
- ALC_CMS.5: 5
- ALC_DVS.2: 12
- ALC_TAT.2: 5
- ASE:
- ATE:
- AVA:
- AVA_VAN: 1
- AVA_VAN.3: 2
- AVA_VAN.5: 7
|
- ADV:
- ADV_ARC.1: 6
- ADV_FSP.1: 3
- ADV_FSP.2: 4
- ADV_FSP.4: 8
- ADV_IMP.1: 5
- ADV_IMP.2: 1
- ADV_TDS.1: 2
- ADV_TDS.3: 10
- AGD:
- AGD_OPE.1: 6
- AGD_PRE.1: 6
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.1: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 2
- ALC_DVS.2: 8
- ALC_LCD.1: 3
- ALC_TAT.1: 3
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 4
- ASE_INT.1: 5
- ASE_OBJ.2: 3
- ASE_REQ.1: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 3
- ATE_FUN.1: 6
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_SAS: 4
- FAU_SAS.1: 6
- FAU_SAS.1.1: 1
- FAU_STG: 3
- FAU_STG.2: 3
- FCS:
- FCS_CKM: 18
- FCS_CKM.1: 7
- FCS_CKM.1.1: 1
- FCS_CKM.4: 2
- FCS_COP: 49
- FCS_COP.1: 21
- FCS_RND: 4
- FCS_RND.1: 6
- FCS_RND.1.1: 1
- FDP:
- FDP_ACC: 5
- FDP_ACC.1: 2
- FDP_ACC.2: 2
- FDP_ACF: 5
- FDP_ACF.1: 9
- FDP_DAU: 3
- FDP_DAU.1: 2
- FDP_ITC: 8
- FDP_ITC.1: 9
- FDP_UCT: 7
- FDP_UCT.1: 4
- FDP_UIT: 11
- FDP_UIT.1: 9
- FIA:
- FIA_AFL: 5
- FIA_AFL.1: 5
- FIA_API: 5
- FIA_API.1: 6
- FIA_API.1.1: 1
- FIA_UAU: 31
- FIA_UAU.1: 7
- FIA_UAU.4: 4
- FIA_UAU.5: 11
- FIA_UAU.6: 3
- FIA_UID: 8
- FIA_UID.1: 7
- FMT:
- FMT_LIM: 10
- FMT_LIM.1: 11
- FMT_LIM.1.1: 1
- FMT_LIM.2: 11
- FMT_LIM.2.1: 1
- FMT_MOF: 3
- FMT_MOF.1: 1
- FMT_MTD: 42
- FMT_MTD.1: 13
- FMT_SMF: 2
- FMT_SMF.1: 2
- FMT_SMR: 7
- FMT_SMR.1: 7
- FPT:
- FPT_EMS: 12
- FPT_EMS.1: 16
- FPT_EMS.1.1: 1
- FPT_EMS.1.2: 1
- FPT_FLS: 2
- FPT_FLS.1: 2
- FPT_PHP: 2
- FPT_PHP.3: 2
- FPT_TST: 6
- FPT_TST.1: 11
- FTP:
|
- FCS:
- FCS_CKM: 43
- FCS_CKM.1: 10
- FCS_CKM.2: 1
- FCS_CKM.4: 23
- FCS_CKM.4.1: 1
- FCS_COP: 69
- FCS_COP.1: 7
- FDP:
- FDP_ACC: 99
- FDP_ACC.1: 37
- FDP_ACF: 85
- FDP_ACF.1: 47
- FDP_ETC: 8
- FDP_ETC.1: 2
- FDP_IFC.1: 14
- FDP_ITC: 54
- FDP_ITC.1: 21
- FDP_ITC.2: 9
- FDP_RIP.1: 11
- FDP_RIP.1.1: 1
- FDP_SDI: 19
- FDP_SDI.2: 4
- FDP_UCT: 9
- FDP_UCT.1: 1
- FDP_UIT: 19
- FDP_UIT.1: 4
- FIA:
- FIA_AFL: 13
- FIA_AFL.1: 11
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 8
- FIA_ATD.1.1: 1
- FIA_UAU.1: 14
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID.1: 15
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MOF.1: 10
- FMT_MOF.1.1: 1
- FMT_MSA: 47
- FMT_MSA.1: 13
- FMT_MSA.2: 9
- FMT_MSA.2.1: 1
- FMT_MSA.3: 34
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 9
- FMT_MTD.1.1: 1
- FMT_SMF.1: 30
- FMT_SMF.1.1: 1
- FMT_SMR.1: 28
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_AMT.1: 5
- FPT_EMS.1: 1
- FPT_FLS.1: 8
- FPT_FLS.1.1: 1
- FPT_PHP.1: 8
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 10
- FPT_PHP.3.1: 1
- FPT_TEE.1: 13
- FPT_TEE.1.1: 1
- FPT_TEE.1.2: 1
- FPT_TST.1: 9
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 36
- FTP_ITC.1: 14
- FTP_TRP: 12
- FTP_TRP.1: 6
|
pdf_data/st_keywords/cc_claims |
|
- A:
- O:
- OE:
- OE.APPLET: 1
- OE.HI_VAD: 6
- OE.NATIVE: 1
- OE.VERIFICATION: 1
- OSP:
|
pdf_data/st_keywords/vendor |
- NXP:
- NXP: 105
- NXP Semiconductors: 6
- Oberthur:
- Oberthur: 1
- Oberthur Technologies: 102
|
- Oberthur:
- Oberthur Technologies: 162
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
- SHA256: 2
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- DFA: 1
- Malfunction: 3
- Physical tampering: 1
- fault injection: 1
- malfunction: 3
- physical tampering: 1
- SCA:
- DPA: 1
- physical probing: 3
- other:
|
- FI:
- SCA:
- physical probing: 1
- side channel: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
- EF:
- EF.COM: 10
- EF.DG1: 18
- EF.DG13: 2
- EF.DG14: 4
- EF.DG15: 3
- EF.DG16: 17
- EF.DG2: 4
- EF.DG3: 2
- EF.DG4: 2
- EF.DG5: 3
- EF.SOD: 9
|
|
pdf_data/st_keywords/standard_id |
- BSI:
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- FIPS:
- ICAO:
- ISO:
- ISO/IEC 11770-2: 3
- ISO/IEC 15946: 2
- ISO/IEC 15946-1: 1
- ISO/IEC 15946-2: 1
- ISO/IEC 7816-4: 1
- ISO/IEC 7816-9: 1
- NIST:
- PKCS:
- RFC:
- SCP:
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- FIPS:
- PKCS:
|
pdf_data/st_keywords/javacard_version |
|
- JavaCard:
- Java Card 2.2: 2
- Java Card 2.2.1: 1
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- 3 Smartcard product life-cycle for the TOE 1 For details regarding phases see [COSMO-ST] §3.5. Out of scope TOE usage Applet Installation and Pre-personalisation Evaluation scope FQR : 110 5041 Issue: 1: 1
- Out of scope: 1
|
pdf_data/st_metadata |
- /Author: michetho
- /CreationDate: D:20160317194315+01'00'
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20160317194315+01'00'
- /Producer: Microsoft® Office Word 2007
- /Subject: <Document name>
- /Title: ID-One ePass Full EAC v2 MRTD in BAC configuration with AA and CA on NXP P60x080 PVC/PVG - Public Security Target
- pdf_file_size_bytes: 2110955
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 93
|
- /CreationDate: D:20100525132820+02'00'
- /Keywords:
- /ModDate: D:20100525132820+02'00'
- /Producer: AFPL Ghostscript 8.50
- pdf_file_size_bytes: 954799
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 80
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |