Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

NPCT7xx TPM2.0 rev 1.59 (configuration version 1.4.2.2) (ANSSI-CC-2024/11)
ANSSI-CC-2024/11
Application Mobile PayPass 1.0.13vA.2.4(S1133159, release B) sur plateforme UpTeqNFC2.0.4_OFM configuration MIFARE activéou configuration MIFARE désactivé surcomposant ST33F1ME
ANSSI-CC-2014/83
name NPCT7xx TPM2.0 rev 1.59 (configuration version 1.4.2.2) (ANSSI-CC-2024/11) Application Mobile PayPass 1.0.13vA.2.4(S1133159, release B) sur plateforme UpTeqNFC2.0.4_OFM configuration MIFARE activéou configuration MIFARE désactivé surcomposant ST33F1ME
category Trusted Computing ICs, Smart Cards and Smart Card-Related Devices and Systems
not_valid_before 2024-04-17 2014-11-28
not_valid_after 2029-04-17 2019-11-28
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2024_11en%201.4.2.2.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ASE_MPP1.0.13vA.2.4_NFC2.0.4_OFM-RE_D1321206_v1.0.pdf
status active archived
manufacturer Nuvoton Technology Gemalto
manufacturer_web None https://www.gemalto.com/
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2024_11fr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2014-83.pdf
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2024_11fr.pdf None
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile PC Client Specific Trusted Platform Module Specification Family 2.0; Level 0; Revi...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/anssi-profil-pp-2021_02en.pdf', 'pp_ids': None})
state/cert/convert_ok True False
state/cert/download_ok True False
state/cert/extract_ok True False
state/cert/pdf_hash 6da74cbe0fad8225af6034b8ddf24a76e3790ff192965be6c893285718e6647b None
state/cert/txt_hash b040dbeaff64bb3f5d13035d3569862d66a5664cd51ee1ed459aadf009186daa None
state/report/pdf_hash 940c6a00ea01d9ecb7ad80569b8c406054e035e78b6c5a1e9a7cb4e80e53a2ac 18ecfa6752548a1638d90116a4a85d3b46699824043d96e65eaf6b40ecd44591
state/report/txt_hash caf118fd959f9baa9875ecbe2e16f3bff3883d9ddd2f9c98c7dceb808f6709e3 36947a5a0d6bdb47c777f5c54b0dfb8f75cc33665cf102f55536a45d3177f9fb
state/st/pdf_hash 5430b2f86679586b37ed0794f7f7ae2b908a294efc3b8b6ecfd9748cf3ecad3e 139c22c8fd8c3e813efd1b243f868edabf3a19bc9f5b1291ccc3339c0fdd5f1b
state/st/txt_hash bc034291da17c7fbd1cafd1223e1f9c9106e96a768eb8d88c7a4ff0e9e89ab17 56bb77cb6e27470580f7fdb2b0e3e799e6ddce080cb3a05883c6e95d4c1a8e9c
heuristics/cert_id ANSSI-CC-2024/11 ANSSI-CC-2014/83
heuristics/cert_lab None THALES
heuristics/extracted_versions 1.59, 2.0, 1.4.2.2 2.0.4, 2.4, 1.0.13
heuristics/report_references/directly_referenced_by None ANSSI-CC-2014/96
heuristics/report_references/directly_referencing None ANSSI-CC-2014/56, ANSSI-CC-2013/27
heuristics/report_references/indirectly_referenced_by None ANSSI-CC-2014/96
heuristics/report_references/indirectly_referencing None ANSSI-CC-2011/07, ANSSI-CC-2010/49, ANSSI-CC-2010/50, ANSSI-CC-2013/27, ANSSI-CC-2011/17, ANSSI-CC-2014/56, ANSSI-CC-2013/28, ANSSI-CC-2012/48, ANSSI-CC-2011/77, ANSSI-CC-2012/49, ANSSI-CC-2012/11
heuristics/scheme_data
  • product: NPCT7xx TPM2.0 rev 1.59 (configuration version 1.4.2.2)
  • url: https://cyber.gouv.fr/produits-certifies/npct7xx-tpm20-rev-159-configuration-version-1422
  • description: Le produit évalué est « NPCT7xx TPM2.0 rev 1.59, configuration version 1.4.2.2 » développé par NUVOTON TECHNOLOGY CORPORATION. Ce produit est un TPM (Trusted Platform Module). Il est destiné à garantir l’intégrité matérielle et logicielle des plateformes de confiance (serveurs, ordinateurs, etc.) conformément aux spécifications fonctionnelles TPM2.0.
  • sponsor: NUVOTON TECHNOLOGY CORPORATION
  • developer: NUVOTON TECHNOLOGY CORPORATION
  • cert_id: ANSSI-CC-2024/11
  • level: EAL4+
  • expiration_date: 17 Avril 2029
  • enhanced:
    • cert_id: ANSSI-CC-2024/11
    • certification_date: 17/04/2024
    • expiration_date: 17/04/2029
    • category: Micro-circuits
    • cc_version: Critères Communs version 3.1r5
    • developer: NUVOTON TECHNOLOGY CORPORATION
    • sponsor: NUVOTON TECHNOLOGY CORPORATION
    • evaluation_facility: SERMA SAFETY & SECURITY
    • level: EAL4+
    • protection_profile: Protection Profile PC Client Specific TPM PP PCCS TPM F2.0 L0 r1.59 V1.3, certifié ANSSI-CC-PP-2021/02 le 30 novembre 2021 certifié ANSSI-CC-PP-2021/02 le 30 novembre 2021.
    • mutual_recognition: CCRA SOG-IS
    • augmented: ALC_FLR.1, AVA_VAN.4, ALC_DVS.2
    • report_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2024_11fr.pdf
    • target_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2024_11en%201.4.2.2.pdf
    • cert_link: https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2024_11fr.pdf
  • product: Application Mobile PayPass 1.0.13vA.2.4 (S1133159, release B) sur plateforme UpTeq NFC2.0.4_OFM configuration MIFARE activé ou configuration MIFARE désactivé sur composant ST33F1ME
  • url: https://cyber.gouv.fr/produits-certifies/application-mobile-paypass-1013va24-s1133159-release-b-sur-plateforme-upteq-0
  • sponsor: Gemalto
  • developer: Gemalto / STMicroelectronics
  • cert_id: 2014/83
  • level: EAL4+
  • enhanced:
    • cert_id: 2014/83
    • certification_date: 28/11/2014
    • category: Cartes à puce
    • cc_version: Critères Communs version 3.1r3
    • developer: Gemalto / STMicroelectronics
    • sponsor: Gemalto
    • evaluation_facility: THALES (TCS – CNES)
    • level: EAL4+
    • protection_profile:
    • mutual_recognition: SOG-IS CCRA
    • augmented: ALC_DVS.2, AVA_VAN.5
    • report_link: https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2014-83fr.pdf
heuristics/scheme_data/cert_id ANSSI-CC-2024/11 2014/83
heuristics/scheme_data/developer NUVOTON TECHNOLOGY CORPORATION Gemalto / STMicroelectronics
heuristics/scheme_data/enhanced
  • cert_id: ANSSI-CC-2024/11
  • certification_date: 17/04/2024
  • expiration_date: 17/04/2029
  • category: Micro-circuits
  • cc_version: Critères Communs version 3.1r5
  • developer: NUVOTON TECHNOLOGY CORPORATION
  • sponsor: NUVOTON TECHNOLOGY CORPORATION
  • evaluation_facility: SERMA SAFETY & SECURITY
  • level: EAL4+
  • protection_profile: Protection Profile PC Client Specific TPM PP PCCS TPM F2.0 L0 r1.59 V1.3, certifié ANSSI-CC-PP-2021/02 le 30 novembre 2021 certifié ANSSI-CC-PP-2021/02 le 30 novembre 2021.
  • mutual_recognition: CCRA SOG-IS
  • augmented: ALC_FLR.1, AVA_VAN.4, ALC_DVS.2
  • report_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2024_11fr.pdf
  • target_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2024_11en%201.4.2.2.pdf
  • cert_link: https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2024_11fr.pdf
  • cert_id: 2014/83
  • certification_date: 28/11/2014
  • category: Cartes à puce
  • cc_version: Critères Communs version 3.1r3
  • developer: Gemalto / STMicroelectronics
  • sponsor: Gemalto
  • evaluation_facility: THALES (TCS – CNES)
  • level: EAL4+
  • protection_profile:
  • mutual_recognition: SOG-IS CCRA
  • augmented: ALC_DVS.2, AVA_VAN.5
  • report_link: https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2014-83fr.pdf
heuristics/scheme_data/enhanced/augmented ALC_FLR.1, AVA_VAN.4, ALC_DVS.2 ALC_DVS.2, AVA_VAN.5
heuristics/scheme_data/enhanced/category Micro-circuits Cartes à puce
heuristics/scheme_data/enhanced/cc_version Critères Communs version 3.1r5 Critères Communs version 3.1r3
heuristics/scheme_data/enhanced/cert_id ANSSI-CC-2024/11 2014/83
heuristics/scheme_data/enhanced/certification_date 17/04/2024 28/11/2014
heuristics/scheme_data/enhanced/developer NUVOTON TECHNOLOGY CORPORATION Gemalto / STMicroelectronics
heuristics/scheme_data/enhanced/evaluation_facility SERMA SAFETY & SECURITY THALES (TCS – CNES)
heuristics/scheme_data/enhanced/mutual_recognition CCRA SOG-IS SOG-IS CCRA
heuristics/scheme_data/enhanced/protection_profile Protection Profile PC Client Specific TPM PP PCCS TPM F2.0 L0 r1.59 V1.3, certifié ANSSI-CC-PP-2021/02 le 30 novembre 2021 certifié ANSSI-CC-PP-2021/02 le 30 novembre 2021.
heuristics/scheme_data/enhanced/report_link https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2024_11fr.pdf https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2014-83fr.pdf
heuristics/scheme_data/enhanced/sponsor NUVOTON TECHNOLOGY CORPORATION Gemalto
heuristics/scheme_data/product NPCT7xx TPM2.0 rev 1.59 (configuration version 1.4.2.2) Application Mobile PayPass 1.0.13vA.2.4 (S1133159, release B) sur plateforme UpTeq NFC2.0.4_OFM configuration MIFARE activé ou configuration MIFARE désactivé sur composant ST33F1ME
heuristics/scheme_data/sponsor NUVOTON TECHNOLOGY CORPORATION Gemalto
heuristics/scheme_data/url https://cyber.gouv.fr/produits-certifies/npct7xx-tpm20-rev-159-configuration-version-1422 https://cyber.gouv.fr/produits-certifies/application-mobile-paypass-1013va24-s1133159-release-b-sur-plateforme-upteq-0
pdf_data/cert_filename Certificat-CC-2024_11fr.pdf None
pdf_data/cert_keywords
  • cc_cert_id:
    • FR:
      • ANSSI-CC-2024/11: 2
  • cc_protection_profile_id:
    • ANSSI:
      • ANSSI-CC-PP-2021/02: 1
  • cc_security_level:
    • EAL:
      • EAL4: 1
      • EAL2: 1
  • cc_sar:
    • ALC:
      • ALC_FLR.1: 2
      • ALC_DVS.2: 1
    • AVA:
      • AVA_VAN.4: 1
  • cc_sfr:
  • cc_claims:
  • vendor:
  • eval_facility:
    • Serma:
      • SERMA: 2
  • symmetric_crypto:
  • asymmetric_crypto:
  • pq_crypto:
  • hash_function:
  • crypto_scheme:
  • crypto_protocol:
  • randomness:
  • cipher_mode:
  • ecc_curve:
  • crypto_engine:
  • tls_cipher_suite:
  • crypto_library:
  • vulnerability:
  • side_channel_analysis:
  • technical_report_id:
  • device_model:
  • tee_name:
  • os_name:
  • cplc_data:
  • ic_data_group:
  • standard_id:
  • javacard_version:
  • javacard_api_const:
  • javacard_packages:
  • certification_process:
None
pdf_data/cert_metadata
  • pdf_file_size_bytes: 149374
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
  • /CreationDate: D:20240424100246+02'00'
  • /Creator: Acrobat PDFMaker 23 pour Word
  • /Keywords:
  • /ModDate: D:20240424100716+02'00'
  • /Producer: Adobe PDF Library 23.1.175
  • pdf_hyperlinks:
None
pdf_data/report_filename ANSSI-CC-2024_11fr.pdf anssi-cc-2014-83.pdf
pdf_data/report_frontpage/FR
  • match_rules: Référence du rapport de certification(.+)Nom du produit \(référence/version\)(.+)Nom de la TOE \(référence/version\)(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables
  • cert_id: ANSSI-CC-2014/83
  • cert_item: Carte Mobile PayPass 1.0.13vA.2.4 sur plateforme UpTeq NFC2.0.4_OFM configuration MIFARE activé ou configuration MIFARE désactivé sur composant ST33F1ME (S1133159B/S1121881B
  • cert_item_version: Application Mobile PayPass 1.0.13vA.2.4 (S1133159, release B) sur plateforme UpTeq NFC2.0.4_OFM configuration MIFARE activé ou configuration MIFARE désactivé sur composant ST33F1ME
  • ref_protection_profiles: néant
  • cc_version: Critères Communs version 3.1 révision 3
  • cc_security_level: EAL 4 augmenté ALC_DVS.2, AVA_VAN.5
  • developer: Gemalto La Vigie, Av du Jujubier, ZI Athelia IV, 13705 La Ciotat Cedex, France STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, B.P. 2, 13106 Rousset, France Commanditaire Gemalto La Vigie, Av du Jujubier, ZI Athelia IV, 13705 La Ciotat Cedex, France
  • cert_lab: THALES (TCS – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France
pdf_data/report_keywords/cc_cert_id/FR
  • ANSSI-CC-2024/11: 2
  • ANSSI-CC-2014/83: 22
  • ANSSI-CC-2014/56: 5
  • ANSSI-CC-2013/27: 1
pdf_data/report_keywords/cc_claims
  • O:
    • O.C: 2
  • R:
    • R.O: 2
pdf_data/report_keywords/cc_protection_profile_id/ANSSI
  • ANSSI-CC-PP-2021/02: 3
  • ANSSI-CC-PP-2010/04: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.1: 2
    • ALC_DVS.2: 1
    • ALC_FLR: 1
  • AVA:
    • AVA_VAN.4: 1
    • AVA_VAN: 1
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_DVS.2: 3
    • ALC_FLR: 2
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_TAT: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN.5: 3
    • AVA_VAN: 2
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
pdf_data/report_keywords/cc_sar/ALC
  • ALC_FLR.1: 2
  • ALC_DVS.2: 1
  • ALC_FLR: 1
  • ALC_DVS.2: 3
  • ALC_FLR: 2
  • ALC_CMC: 1
  • ALC_CMS: 1
  • ALC_DEL: 1
  • ALC_DVS: 1
  • ALC_TAT: 1
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 1 3
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR 1 2
pdf_data/report_keywords/cc_sar/AVA
  • AVA_VAN.4: 1
  • AVA_VAN: 1
  • AVA_VAN.5: 3
  • AVA_VAN: 2
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN 1 2
pdf_data/report_keywords/cc_security_level/EAL
  • EAL4: 1
  • EAL2: 2
  • EAL7: 1
  • EAL 4: 1
  • EAL4: 4
  • EAL7: 1
  • EAL 1: 1
  • EAL 3: 1
  • EAL 5: 1
  • EAL 7: 1
pdf_data/report_keywords/cc_security_level/EAL/EAL4 1 4
pdf_data/report_keywords/eval_facility
  • Serma:
    • SERMA: 1
  • CESTI:
    • CESTI: 1
  • CESTI:
    • CESTI: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA1: 2
    • SHA2:
      • SHA2: 2
pdf_data/report_keywords/standard_id/CC
  • CCMB-2017-04-001: 1
  • CCMB-2017-04-002: 1
  • CCMB-2017-04-003: 1
  • CCMB-2009-07-001: 1
  • CCMB-2009-07-002: 1
  • CCMB-2009-07-003: 1
  • CCMB-2009-07-004: 1
pdf_data/report_keywords/vendor
  • STMicroelectronics:
    • STMicroelectronics: 2
  • Gemalto:
    • Gemalto: 5
  • Morpho:
    • Morpho: 1
pdf_data/report_metadata
  • pdf_file_size_bytes: 336748
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 11
  • /CreationDate: D:20240424100335+02'00'
  • /Creator: Acrobat PDFMaker 23 pour Word
  • /Keywords:
  • /ModDate: D:20240424100715+02'00'
  • /Producer: Adobe PDF Library 23.1.175
  • pdf_hyperlinks: mailto:[email protected], http://www.ssi.gouv.fr/, http://www.commoncriteriaportal.org/, http://www.sogis.eu/
  • pdf_file_size_bytes: 264109
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 21
  • /Producer: GPL Ghostscript 9.02
  • /CreationDate:
  • /ModDate:
  • /Title: anssi-cc
  • /Creator: PDFCreator Version 1.2.1
  • /Author:
  • /Keywords:
  • /Subject:
  • pdf_hyperlinks:
pdf_data/report_metadata//CreationDate D:20240424100335+02'00'
pdf_data/report_metadata//Creator Acrobat PDFMaker 23 pour Word PDFCreator Version 1.2.1
pdf_data/report_metadata//ModDate D:20240424100715+02'00'
pdf_data/report_metadata//Producer Adobe PDF Library 23.1.175 GPL Ghostscript 9.02
pdf_data/report_metadata/pdf_file_size_bytes 336748 264109
pdf_data/report_metadata/pdf_hyperlinks mailto:[email protected], http://www.ssi.gouv.fr/, http://www.commoncriteriaportal.org/, http://www.sogis.eu/
pdf_data/report_metadata/pdf_number_of_pages 11 21
pdf_data/st_filename ANSSI-cible-CC-2024_11en 1.4.2.2.pdf ASE_MPP1.0.13vA.2.4_NFC2.0.4_OFM-RE_D1321206_v1.0.pdf
pdf_data/st_keywords/asymmetric_crypto
  • RSA:
    • RSA 4096: 1
    • RSA 2048: 2
  • ECC:
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 2
    • ECC:
      • ECC: 24
pdf_data/st_keywords/cc_claims
  • O:
    • O.C: 9
    • O.DAC: 5
  • R:
    • R.O: 9
  • O:
    • O.CARD-MANAGEMENT: 1
    • O.DOMAIN-RIGHTS: 1
    • O.APPLI-AUTH: 2
    • O.GUIS_AUTH: 15
    • O.COMM-INTEGRITY: 1
    • O.DATA_INTEGRITY: 63
    • O.DATA_DISCLOSURE: 46
    • O.SID: 1
    • O.FIREWALL: 1
    • O.GLOBAL-ARRAYS-CONFID: 1
    • O.GLOBAL-ARRAYS-INTEG: 1
    • O.NATIVE: 1
    • O.OPERATE: 1
    • O.REALLOCATION: 1
    • O.RESSOURCES: 1
    • O.ALARM: 1
    • O.CIPHER: 1
    • O.KEY-MNGT: 1
    • O.PIN-MNGT: 1
    • O.REMOTE: 1
    • O.TRANSACTION: 1
    • O.OBJ-DELETION: 1
    • O.DELETION: 1
    • O.LOAD: 1
    • O.INSTALL: 1
    • O.SCP: 2
    • O.RNG: 1
    • O.REMOTE_SERVICE_AUDIT: 1
    • O.REMOTE_SERVICE_ACTIVCATION: 1
    • O.TRANSACTION_UNIQUENESS: 36
    • O.TRANSACTION_INTEGRITY: 38
    • O.TRANSACTION_BYPASS: 53
    • O.TRANSACTION_REPLAY: 11
    • O.USER_AUTH: 53
    • O.ISSUING_BANK_AUTH: 54
    • O.MNO_AUTH: 8
    • O.COMM_AUTH: 3
    • O.AUTHORISATION_CONTROL: 20
    • O.DATA_USERS: 12
    • O.RISK_MNGT: 20
    • O.APP_BLOCK: 15
    • O.SIM_UNLOCK: 10
    • O.AUDIT: 14
    • O.CHANNELS: 9
    • O.AUDIT_ACCESS: 10
    • O.APPLI_AUTH: 1
    • O.COMM-: 1
    • O.COMM-AUTH: 1
  • T:
    • T.PHYSICAL: 1
    • T.DISCLOSURE: 4
    • T.INTEG: 7
    • T.COM-EXPLOIT: 1
    • T.UNAUTHORIZED_CARD_MNGT: 1
    • T.TRANSACTION: 1
    • T.LIFE-CYCLE: 1
    • T.UNAUTHORIZED_ACCESS: 1
    • T.CONFID-APPLI-DATA: 1
    • T.CONFID-JCS-DATA: 1
    • T.INTEG-APPLI-CODE: 2
    • T.INTEG-APPLI-DATA: 2
    • T.INTEG-JCS-CODE: 1
    • T.INTEG-JCS-DATA: 1
    • T.INTEG_SEL_ACT_PARAM: 12
    • T.INTEG_KEYS: 8
    • T.EXE-CODE: 1
    • T.EXE-CODE-REMOTE: 1
    • T.NATIVE: 1
    • T.RESOURCES: 1
    • T.DELETION: 1
    • T.UNAUTHORIZED_ACCESS_TO_SERVICE: 1
    • T.DISCLOSURE_KEYS: 6
    • T.DISCLOSURE_REF_PC: 6
    • T.INTEG_LOG_FILE: 6
    • T.INTEG_ACCOUNT_INFO: 7
    • T.INTEG_REF_PC: 6
    • T.INTEG_TRANS_PARAM: 8
    • T.INTEG_COUNT: 7
    • T.TEMPORARY_DATA: 8
    • T.STEALING: 9
    • T.MERCHANT_ACCOMPLICE: 9
    • T.MAN-IN-THE-MIDDLE: 11
    • T.TRANSACTION_REPUDIATION: 7
    • T.TRANSACTION_COUNTERFEITING: 12
    • T.TRANSACTION_REPLAY: 8
    • T.CERTIF_CORRUPTION: 5
    • T.APPLICATIONS_DOS: 6
    • T.MNO_USURPATION: 5
    • T.ISSUING-BANK_USURPATION: 3
    • T.CUSTOMER_USURPATION: 7
    • T.ISSUING-: 2
  • A:
    • A.MOBILE-OPERATOR: 1
    • A.OTA-ADMIN: 1
    • A.APPS-PROVIDER: 1
    • A.VERIFICATION-AUTHORITY: 1
    • A.CONTROLLING-AUTHORITY: 1
    • A.APPLET: 1
    • A.VERIFICATION: 1
    • A.MERCHANT_AUTH: 5
  • OE:
    • OE.MOBILE-OPERATOR: 1
    • OE.OTA-ADMIN: 1
    • OE.APPS-PROVIDER: 1
    • OE.VERIFICATION-AUTHORITY: 1
    • OE.CONTROLLING-AUTHORITY: 1
    • OE.SECURE-APPS-CERTIFICATION: 1
    • OE.BASIC-APPS-VALIDATION: 1
    • OE.SHARE-CONTROL: 1
    • OE.AID-MANAGEMENT: 1
    • OE.OTA-LOADING: 1
    • OE.OTA-SERVERS: 1
    • OE.AP-KEYS: 1
    • OE.OPERATOR-KEYS: 1
    • OE.KEY-GENERATION: 1
    • OE.CA-KEYS: 1
    • OE.VA-KEYS: 1
    • OE.KEY-CHANGE: 1
    • OE.SECURITY-DOMAINS: 1
    • OE.QUOTAS: 1
    • OE.PRODUCTION: 1
    • OE.PERSONALIZER: 1
    • OE.KEY-ESCROW: 1
    • OE.APPLET: 1
    • OE.VERIFICATION: 1
    • OE.TRUSTED-APPS-DEVELOPER: 1
    • OE.TRUSTED-APPS-PRE-ISSUANCE-LOADING: 1
    • OE.ACTIVATION-KEY-ESCROW: 1
    • OE.CUSTOMER_PC_CONFID: 8
    • OE.GUI_INST_ALERT: 7
    • OE.TOE_USAGE: 9
    • OE.GUIS_IDENTIFICATION: 5
    • OE.POLICY: 5
    • OE.NFC_PROTOCOL: 5
    • OE.TRANSACTION_DISPLAY: 5
    • OE.CHANNELS_SELECTION: 3
    • OE.GUIS_TIMEOUT: 4
    • OE.MERCHANT_CONTROL: 7
    • OE.MERCHANT_AUTH: 8
    • OE.LATENCY_CONTROL: 5
    • OE.POS_APPROVAL: 7
    • OE.POS_APPLICATIONS: 10
    • OE.POS_DEACTIVATION: 6
    • OE.CERTIFICATES_MNGT: 10
    • OE.NO_VAD: 6
    • OE.BANKS_PRIVILEGES: 4
  • OSP:
    • OSP: 2
    • OSP.SECURE-APPS-CERTIFICATION: 1
    • OSP.BASIC-APPS-VALIDATION: 1
    • OSP.SHARE-CONTROL: 1
    • OSP.AID-MANAGEMENT: 1
    • OSP.OTA-LOADING: 1
    • OSP.OTA-SERVERS: 1
    • OSP.APSD-KEYS: 1
    • OSP.OPERATOR-KEYS: 1
    • OSP.KEY-GENERATION: 1
    • OSP.CASD-KEYS: 1
    • OSP.VASD-KEYS: 1
    • OSP.KEY-CHANGE: 1
    • OSP.SECURITY-DOMAINS: 1
    • OSP.QUOTAS: 1
    • OSP.PRODUCTION: 1
    • OSP.PERSONALIZER: 1
    • OSP.KEY-ESCROW: 1
    • OSP.VERIFICATION: 1
    • OSP.RND: 1
    • OSP.TRUSTED-APPS-DEVELOPER: 1
    • OSP.TRUSTED-APPS-PRE-ISSUANCE-LOADING: 1
    • OSP.SERVICE_AUDIT: 1
    • OSP.ACTIVATION-KEY-ESCROW: 1
    • OSP.POLICY: 4
    • OSP.CUSTOMER_PC_CONFID: 4
    • OSP.GUIS_IDENTIFICATION: 4
    • OSP.CERTIFICATES_MNGT: 4
    • OSP.TOE_USAGE: 4
    • OSP.PISHING: 4
    • OSP.MERCHANT_CONTROL: 6
    • OSP.BANKS_PRIVILEGES: 4
pdf_data/st_keywords/cc_claims/O
  • O.C: 9
  • O.DAC: 5
  • O.CARD-MANAGEMENT: 1
  • O.DOMAIN-RIGHTS: 1
  • O.APPLI-AUTH: 2
  • O.GUIS_AUTH: 15
  • O.COMM-INTEGRITY: 1
  • O.DATA_INTEGRITY: 63
  • O.DATA_DISCLOSURE: 46
  • O.SID: 1
  • O.FIREWALL: 1
  • O.GLOBAL-ARRAYS-CONFID: 1
  • O.GLOBAL-ARRAYS-INTEG: 1
  • O.NATIVE: 1
  • O.OPERATE: 1
  • O.REALLOCATION: 1
  • O.RESSOURCES: 1
  • O.ALARM: 1
  • O.CIPHER: 1
  • O.KEY-MNGT: 1
  • O.PIN-MNGT: 1
  • O.REMOTE: 1
  • O.TRANSACTION: 1
  • O.OBJ-DELETION: 1
  • O.DELETION: 1
  • O.LOAD: 1
  • O.INSTALL: 1
  • O.SCP: 2
  • O.RNG: 1
  • O.REMOTE_SERVICE_AUDIT: 1
  • O.REMOTE_SERVICE_ACTIVCATION: 1
  • O.TRANSACTION_UNIQUENESS: 36
  • O.TRANSACTION_INTEGRITY: 38
  • O.TRANSACTION_BYPASS: 53
  • O.TRANSACTION_REPLAY: 11
  • O.USER_AUTH: 53
  • O.ISSUING_BANK_AUTH: 54
  • O.MNO_AUTH: 8
  • O.COMM_AUTH: 3
  • O.AUTHORISATION_CONTROL: 20
  • O.DATA_USERS: 12
  • O.RISK_MNGT: 20
  • O.APP_BLOCK: 15
  • O.SIM_UNLOCK: 10
  • O.AUDIT: 14
  • O.CHANNELS: 9
  • O.AUDIT_ACCESS: 10
  • O.APPLI_AUTH: 1
  • O.COMM-: 1
  • O.COMM-AUTH: 1
pdf_data/st_keywords/cc_protection_profile_id
  • ANSSI:
    • ANSSI-CC-PP-2021/02: 1
pdf_data/st_keywords/cc_sar
  • ALC:
    • ALC_FLR.1: 3
    • ALC_DVS.2: 4
    • ALC_DVS.1: 1
  • AVA:
    • AVA_VAN.4: 3
  • ADV:
    • ADV_ARC.1: 5
    • ADV_FSP.4: 9
    • ADV_IMP.1: 4
    • ADV_TDS.3: 8
    • ADV_FSP.1: 3
    • ADV_TDS.1: 2
    • ADV_FSP.2: 2
    • ADV_TDS.2: 1
    • ADV_IMP: 1
  • AGD:
    • AGD_OPE.1: 5
    • AGD_PRE.1: 5
  • ALC:
    • ALC_DVS.2: 6
    • ALC_TAT.1: 3
    • ALC_CMC.4: 1
    • ALC_CMS.1: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 3
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
  • ATE:
    • ATE_DPT.1: 2
    • ATE_COV.2: 3
    • ATE_FUN.1: 6
    • ATE_COV.1: 2
  • AVA:
    • AVA_VAN.5: 5
  • ASE:
    • ASE_COMP.1: 1
    • ASE_CCL.1: 1
    • ASE_ECD.1: 4
    • ASE_INT.1: 5
    • ASE_REQ.1: 2
    • ASE_REQ.2: 2
    • ASE_OBJ.2: 3
    • ASE_SPD.1: 2
    • ASE_TSS.1: 1
pdf_data/st_keywords/cc_sar/ALC
  • ALC_FLR.1: 3
  • ALC_DVS.2: 4
  • ALC_DVS.1: 1
  • ALC_DVS.2: 6
  • ALC_TAT.1: 3
  • ALC_CMC.4: 1
  • ALC_CMS.1: 1
  • ALC_DVS.1: 1
  • ALC_LCD.1: 3
  • ALC_CMS.4: 1
  • ALC_DEL.1: 1
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 4 6
pdf_data/st_keywords/cc_sar/AVA
  • AVA_VAN.4: 3
  • AVA_VAN.5: 5
pdf_data/st_keywords/cc_security_level/EAL
  • EAL 4: 1
  • EAL4: 2
  • EAL 4 augmented: 1
  • EAL4 augmented: 1
  • EAL4: 3
  • EAL4+: 2
  • EAL 4: 1
  • EAL4 augmented: 2
pdf_data/st_keywords/cc_security_level/EAL/EAL4 2 3
pdf_data/st_keywords/cc_security_level/EAL/EAL4 augmented 1 2
pdf_data/st_keywords/cc_sfr
  • FCO:
    • FCO_NRO: 6
    • FCO_NRO.1: 6
  • FCS:
    • FCS_RNG.1: 4
    • FCS_RNG.1.1: 1
    • FCS_RNG.1.2: 1
    • FCS_CKM: 12
    • FCS_CKM.2: 4
    • FCS_COP.1: 11
    • FCS_CKM.4: 14
    • FCS_CKM.1: 12
    • FCS_CKM.4.1: 1
    • FCS_COP: 21
  • FDP:
    • FDP_ACC.1: 35
    • FDP_IFC.1: 20
    • FDP_RIP.1: 3
    • FDP_RIP.1.1: 1
    • FDP_ITC.1: 11
    • FDP_ITC.2: 13
    • FDP_ITT.1: 3
    • FDP_ITT.1.1: 1
    • FDP_ACC: 21
    • FDP_ACF.1: 35
    • FDP_ACC.2: 2
    • FDP_ACF: 23
    • FDP_UIT: 9
    • FDP_UIT.1: 4
    • FDP_SDI.1: 3
    • FDP_SDI.1.1: 1
    • FDP_ETC: 6
    • FDP_ETC.2: 4
    • FDP_ITC: 6
    • FDP_UCT: 7
    • FDP_UCT.1: 2
    • FDP_ETC.1: 2
  • FIA:
    • FIA_UID.1: 7
    • FIA_SOS.2: 3
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
    • FIA_AFL: 12
    • FIA_UAU.1: 7
    • FIA_AFL.1: 8
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.5: 3
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 3
    • FIA_UAU.6.1: 1
    • FIA_USB.1: 3
    • FIA_ATD.1: 1
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
    • FIA_SOS.1: 1
  • FMT:
    • FMT_SMR.1: 21
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_SMF.1: 13
    • FMT_SMF.1.1: 1
    • FMT_MSA.2: 4
    • FMT_MSA.1: 15
    • FMT_MSA.2.1: 1
    • FMT_MSA: 51
    • FMT_MSA.4: 3
    • FMT_MTD: 6
    • FMT_MTD.1: 2
    • FMT_MSA.3: 22
    • FMT_MOF: 3
    • FMT_MOF.1: 1
  • FPT:
    • FPT_STM.1: 2
    • FPT_STM.1.1: 1
    • FPT_TST.1: 5
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_FLS: 7
    • FPT_FLS.1: 2
    • FPT_PHP.3: 3
    • FPT_PHP.3.1: 1
    • FPT_ITT.1: 3
    • FPT_ITT.1.1: 1
    • FPT_TDC.1: 1
  • FTP:
    • FTP_ITC.1: 5
    • FTP_TRP.1: 5
    • FTP_ITC: 3
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FAU:
    • FAU_ARP.1: 9
    • FAU_ARP.1.1: 1
    • FAU_SAA.1: 10
    • FAU_SAA.1.1: 1
    • FAU_SAA.1.2: 2
    • FAU_GEN.1: 13
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR: 15
    • FAU_SAR.1: 4
  • FCO:
    • FCO_NRO: 2
  • FCS:
    • FCS_COP: 63
    • FCS_CKM: 27
    • FCS_CKM.4: 13
    • FCS_RND.1: 1
    • FCS_CKM.1: 7
    • FCS_COP.1: 6
    • FCS_CKM.2: 1
  • FDP:
    • FDP_ITC: 32
    • FDP_ROL: 2
    • FDP_UIT: 2
    • FDP_ACC: 155
    • FDP_ACF: 140
    • FDP_IFC: 85
    • FDP_IFF: 70
    • FDP_RIP: 8
    • FDP_SDI.2: 6
    • FDP_SDI: 1
    • FDP_ACC.2: 14
    • FDP_ACF.1: 35
    • FDP_ACF.1.2: 7
    • FDP_ACF.1.3: 1
    • FDP_IFC.2: 8
    • FDP_IFF.1: 24
    • FDP_IFF.1.2: 4
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_RIP.1: 8
    • FDP_RIP.1.1: 1
    • FDP_DAU.1: 7
    • FDP_DAU.1.1: 1
    • FDP_DAU.1.2: 1
    • FDP_ITC.2: 16
    • FDP_ETC.1: 16
    • FDP_ETC.1.1: 1
    • FDP_ETC.1.2: 1
    • FDP_ITC.1: 26
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_UIT.1: 14
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
    • FDP_ACC.1: 14
    • FDP_IFC.1: 11
    • FDP_RPL.1: 1
  • FIA:
    • FIA_UID: 30
    • FIA_UAU: 48
    • FIA_ATD: 1
    • FIA_USB: 1
    • FIA_SOS.2: 9
    • FIA_AFL: 20
    • FIA_AFL.1: 6
    • FIA_ATD.1: 10
    • FIA_ATD.1.1: 1
    • FIA_UAU.1: 8
    • FIA_UAU.3: 8
    • FIA_UAU.3.1: 1
    • FIA_UAU.3.2: 1
    • FIA_UAU.4: 9
    • FIA_UAU.4.1: 1
    • FIA_UAU.6: 1
    • FIA_UID.1: 10
    • FIA_USB.1: 9
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
    • FIA_SOS: 1
  • FMT:
    • FMT_MSA: 26
    • FMT_SMF: 14
    • FMT_SMR: 6
    • FMT_SMF.1: 6
    • FMT_SMR.1: 21
    • FMT_MTD: 8
    • FMT_REV: 1
    • FMT_MOF: 9
    • FMT_MOF.1: 1
    • FMT_MTD.1: 1
    • FMT_MSA.1: 3
    • FMT_MSA.2: 5
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 31
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO.1: 6
    • FPR_UNO: 1
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_FLS: 6
    • FPT_TDC.1: 19
    • FPT_RCV: 3
    • FPT_ITT: 2
    • FPT_TST.1: 7
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_RPL.1: 4
    • FPT_RPL.1.1: 1
    • FPT_RPL.1.2: 1
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_RPL: 1
    • FPT_STM.1: 3
    • FPT_ITC.1: 1
  • FTP:
    • FTP_ITC: 2
    • FTP_ITC.1: 10
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 3
pdf_data/st_keywords/cc_sfr/FCO
  • FCO_NRO: 6
  • FCO_NRO.1: 6
  • FCO_NRO: 2
pdf_data/st_keywords/cc_sfr/FCO/FCO_NRO 6 2
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_RNG.1: 4
  • FCS_RNG.1.1: 1
  • FCS_RNG.1.2: 1
  • FCS_CKM: 12
  • FCS_CKM.2: 4
  • FCS_COP.1: 11
  • FCS_CKM.4: 14
  • FCS_CKM.1: 12
  • FCS_CKM.4.1: 1
  • FCS_COP: 21
  • FCS_COP: 63
  • FCS_CKM: 27
  • FCS_CKM.4: 13
  • FCS_RND.1: 1
  • FCS_CKM.1: 7
  • FCS_COP.1: 6
  • FCS_CKM.2: 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM 12 27
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 12 7
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 4 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 14 13
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP 21 63
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 11 6
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACC.1: 35
  • FDP_IFC.1: 20
  • FDP_RIP.1: 3
  • FDP_RIP.1.1: 1
  • FDP_ITC.1: 11
  • FDP_ITC.2: 13
  • FDP_ITT.1: 3
  • FDP_ITT.1.1: 1
  • FDP_ACC: 21
  • FDP_ACF.1: 35
  • FDP_ACC.2: 2
  • FDP_ACF: 23
  • FDP_UIT: 9
  • FDP_UIT.1: 4
  • FDP_SDI.1: 3
  • FDP_SDI.1.1: 1
  • FDP_ETC: 6
  • FDP_ETC.2: 4
  • FDP_ITC: 6
  • FDP_UCT: 7
  • FDP_UCT.1: 2
  • FDP_ETC.1: 2
  • FDP_ITC: 32
  • FDP_ROL: 2
  • FDP_UIT: 2
  • FDP_ACC: 155
  • FDP_ACF: 140
  • FDP_IFC: 85
  • FDP_IFF: 70
  • FDP_RIP: 8
  • FDP_SDI.2: 6
  • FDP_SDI: 1
  • FDP_ACC.2: 14
  • FDP_ACF.1: 35
  • FDP_ACF.1.2: 7
  • FDP_ACF.1.3: 1
  • FDP_IFC.2: 8
  • FDP_IFF.1: 24
  • FDP_IFF.1.2: 4
  • FDP_SDI.2.1: 1
  • FDP_SDI.2.2: 1
  • FDP_RIP.1: 8
  • FDP_RIP.1.1: 1
  • FDP_DAU.1: 7
  • FDP_DAU.1.1: 1
  • FDP_DAU.1.2: 1
  • FDP_ITC.2: 16
  • FDP_ETC.1: 16
  • FDP_ETC.1.1: 1
  • FDP_ETC.1.2: 1
  • FDP_ITC.1: 26
  • FDP_ITC.1.1: 1
  • FDP_ITC.1.2: 1
  • FDP_ITC.1.3: 1
  • FDP_UIT.1: 14
  • FDP_UIT.1.1: 1
  • FDP_UIT.1.2: 1
  • FDP_ACC.1: 14
  • FDP_IFC.1: 11
  • FDP_RPL.1: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC 21 155
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 35 14
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.2 2 14
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF 23 140
pdf_data/st_keywords/cc_sfr/FDP/FDP_ETC.1 2 16
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 20 11
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC 6 32
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 11 26
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 13 16
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 3 8
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT 9 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT.1 4 14
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_UID.1: 7
  • FIA_SOS.2: 3
  • FIA_SOS.2.1: 1
  • FIA_SOS.2.2: 1
  • FIA_AFL: 12
  • FIA_UAU.1: 7
  • FIA_AFL.1: 8
  • FIA_UID.1.1: 1
  • FIA_UID.1.2: 1
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.5: 3
  • FIA_UAU.5.1: 1
  • FIA_UAU.5.2: 1
  • FIA_UAU.6: 3
  • FIA_UAU.6.1: 1
  • FIA_USB.1: 3
  • FIA_ATD.1: 1
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
  • FIA_SOS.1: 1
  • FIA_UID: 30
  • FIA_UAU: 48
  • FIA_ATD: 1
  • FIA_USB: 1
  • FIA_SOS.2: 9
  • FIA_AFL: 20
  • FIA_AFL.1: 6
  • FIA_ATD.1: 10
  • FIA_ATD.1.1: 1
  • FIA_UAU.1: 8
  • FIA_UAU.3: 8
  • FIA_UAU.3.1: 1
  • FIA_UAU.3.2: 1
  • FIA_UAU.4: 9
  • FIA_UAU.4.1: 1
  • FIA_UAU.6: 1
  • FIA_UID.1: 10
  • FIA_USB.1: 9
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
  • FIA_SOS.2.1: 1
  • FIA_SOS.2.2: 1
  • FIA_SOS: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL 12 20
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1 8 6
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD.1 1 10
pdf_data/st_keywords/cc_sfr/FIA/FIA_SOS.2 3 9
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 7 8
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.6 3 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 7 10
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.1 3 9
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_SMR.1: 21
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_SMF.1: 13
  • FMT_SMF.1.1: 1
  • FMT_MSA.2: 4
  • FMT_MSA.1: 15
  • FMT_MSA.2.1: 1
  • FMT_MSA: 51
  • FMT_MSA.4: 3
  • FMT_MTD: 6
  • FMT_MTD.1: 2
  • FMT_MSA.3: 22
  • FMT_MOF: 3
  • FMT_MOF.1: 1
  • FMT_MSA: 26
  • FMT_SMF: 14
  • FMT_SMR: 6
  • FMT_SMF.1: 6
  • FMT_SMR.1: 21
  • FMT_MTD: 8
  • FMT_REV: 1
  • FMT_MOF: 9
  • FMT_MOF.1: 1
  • FMT_MTD.1: 1
  • FMT_MSA.1: 3
  • FMT_MSA.2: 5
  • FMT_MSA.2.1: 1
  • FMT_MSA.3: 31
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MOF 3 9
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA 51 26
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 15 3
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.2 4 5
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 22 31
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD 6 8
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 2 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 13 6
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_STM.1: 2
  • FPT_STM.1.1: 1
  • FPT_TST.1: 5
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
  • FPT_FLS: 7
  • FPT_FLS.1: 2
  • FPT_PHP.3: 3
  • FPT_PHP.3.1: 1
  • FPT_ITT.1: 3
  • FPT_ITT.1.1: 1
  • FPT_TDC.1: 1
  • FPT_FLS: 6
  • FPT_TDC.1: 19
  • FPT_RCV: 3
  • FPT_ITT: 2
  • FPT_TST.1: 7
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
  • FPT_RPL.1: 4
  • FPT_RPL.1.1: 1
  • FPT_RPL.1.2: 1
  • FPT_TDC.1.1: 1
  • FPT_TDC.1.2: 1
  • FPT_RPL: 1
  • FPT_STM.1: 3
  • FPT_ITC.1: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS 7 6
pdf_data/st_keywords/cc_sfr/FPT/FPT_STM.1 2 3
pdf_data/st_keywords/cc_sfr/FPT/FPT_TDC.1 1 19
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 5 7
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC 3 2
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 5 10
pdf_data/st_keywords/cc_sfr/FTP/FTP_TRP.1 5 3
pdf_data/st_keywords/cipher_mode
  • CTR:
    • CTR: 2
  • CFB:
    • CFB: 2
  • OFB:
    • OFB: 2
  • CBC:
    • CBC: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 2
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 2
    • P-384: 3
    • NIST P-384: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 8
    • SHA2:
      • SHA-256: 7
      • SHA-384: 8
pdf_data/st_keywords/javacard_packages
  • javacard:
    • javacard.security: 1
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 5
  • RNG:
    • RNG: 17
    • RBG: 1
  • RNG:
    • RND: 1
    • RNG: 1
pdf_data/st_keywords/randomness/RNG
  • RNG: 17
  • RBG: 1
  • RND: 1
  • RNG: 1
pdf_data/st_keywords/randomness/RNG/RNG 17 1
pdf_data/st_keywords/side_channel_analysis
  • SCA:
    • physical probing: 1
  • FI:
    • Physical Tampering: 2
    • physical tampering: 2
    • malfunction: 2
    • Malfunction: 2
  • FI:
    • physical tampering: 1
    • malfunction: 1
    • fault induction: 2
pdf_data/st_keywords/side_channel_analysis/FI
  • Physical Tampering: 2
  • physical tampering: 2
  • malfunction: 2
  • Malfunction: 2
  • physical tampering: 1
  • malfunction: 1
  • fault induction: 2
pdf_data/st_keywords/side_channel_analysis/FI/malfunction 2 1
pdf_data/st_keywords/side_channel_analysis/FI/physical tampering 2 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS140-2: 2
    • FIPS 186-3: 4
    • FIPS 140-2: 3
    • FIPS 180-4: 1
    • FIPS 198-1: 2
    • FIPS186-4: 2
    • FIPS180-4: 1
    • FIPS PUB 186-4: 1
    • FIPS198-1: 1
    • FIPS 197: 2
    • FIPS 180-1: 1
  • PKCS:
    • PKCS#1: 1
    • PKCS #1: 1
  • BSI:
    • AIS31: 1
  • RFC:
    • RFC 3447: 1
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 14888-3: 1
    • ISO/IEC 9797-2: 1
    • ISO/IEC 18033-3: 1
    • ISO/IEC 15946-1: 1
    • ISO/IEC 10116:2006: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
pdf_data/st_keywords/standard_id/CC
  • CCMB-2017-04-001: 1
  • CCMB-2017-04-002: 1
  • CCMB-2017-04-003: 1
  • CCMB-2009-07-001: 1
  • CCMB-2009-07-002: 1
  • CCMB-2009-07-003: 1
  • CCMB-2009-07-004: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 9
      • AES-: 1
      • AES-256: 2
  • constructions:
    • MAC:
      • HMAC: 31
  • DES:
    • 3DES:
      • 3DES: 4
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 1
  • STMicroelectronics:
    • STMicroelectronics: 1
  • Gemalto:
    • Gemalto: 152
  • Morpho:
    • Morpho: 1
pdf_data/st_metadata
  • pdf_file_size_bytes: 2855895
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 90
  • /Author: Karsten Grans
  • /CreationDate: D:20240314162754+02'00'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20240314162754+02'00'
  • /Producer: Microsoft® Word 2016
  • /Subject: Security Target
  • /Title: Developer Document
  • pdf_hyperlinks: https://www.trustedcomputinggroup.org/home, file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23FDP_UCT_1_FW, file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23sfr_FMT_MSA_2_States, file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23sfr_FPT_FLS_1_States, file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23sfr_FDP_ACF_1_States, http://www.rsa.com/
  • pdf_file_size_bytes: 2125889
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 136
  • /Author: cteri
  • /CreationDate: D:20140522121822+02'00'
  • /Creator: Microsoft® Office Word 2007
  • /Keywords: MPP
  • /ModDate: D:20141204102057+01'00'
  • /Producer: Microsoft® Office Word 2007
  • /Subject: CTL Mastercard Payment Application (MPP)
  • /Title: Mobile PayPass 1.0.13vA.2.4 on UpTeq NFC2.0.4_OFM with or without MIFARE ACTIVATED - Security Target
  • pdf_hyperlinks:
pdf_data/st_metadata//Author Karsten Grans cteri
pdf_data/st_metadata//CreationDate D:20240314162754+02'00' D:20140522121822+02'00'
pdf_data/st_metadata//Creator Microsoft® Word 2016 Microsoft® Office Word 2007
pdf_data/st_metadata//ModDate D:20240314162754+02'00' D:20141204102057+01'00'
pdf_data/st_metadata//Producer Microsoft® Word 2016 Microsoft® Office Word 2007
pdf_data/st_metadata//Subject Security Target CTL Mastercard Payment Application (MPP)
pdf_data/st_metadata//Title Developer Document Mobile PayPass 1.0.13vA.2.4 on UpTeq NFC2.0.4_OFM with or without MIFARE ACTIVATED - Security Target
pdf_data/st_metadata/pdf_file_size_bytes 2855895 2125889
pdf_data/st_metadata/pdf_hyperlinks https://www.trustedcomputinggroup.org/home, file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23FDP_UCT_1_FW, file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23sfr_FMT_MSA_2_States, file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23sfr_FPT_FLS_1_States, file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23sfr_FDP_ACF_1_States, http://www.rsa.com/
pdf_data/st_metadata/pdf_number_of_pages 90 136
dgst 5d96ca8577702d78 0650753c2f41eacf