Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Produit IAS Classic v5.2.1 with MOC Server v3.1 on MultiApp V5.1 Version 5.2.1.A.C et 5.2.1.A.O ( ANSSI-CC-2023/42 )
ANSSI-CC-2023/42
IAS Classic v5.2 on MultiApp V5.0
ANSSI-CC-2021/54
name Produit IAS Classic v5.2.1 with MOC Server v3.1 on MultiApp V5.1 Version 5.2.1.A.C et 5.2.1.A.O ( ANSSI-CC-2023/42 ) IAS Classic v5.2 on MultiApp V5.0
not_valid_after 29.09.2028 04.11.2026
not_valid_before 29.09.2023 04.11.2021
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2023_42fr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2021_54.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_42fr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2021_54.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-2023_42en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2021_54en.pdf
dgst 5f61ebf23c6ad99d c29a527d36110778
heuristics/cert_id ANSSI-CC-2023/42 ANSSI-CC-2021/54
heuristics/extracted_versions 5.1, 3.1, 5.2.1 5.0, 5.2
heuristics/report_references/directly_referencing ANSSI-CC-2023/01, ANSSI-CC-2023/31 BSI-DSZ-CC-1107-2020
heuristics/report_references/indirectly_referencing ANSSI-CC-2023/01, ANSSI-CC-2023/31 BSI-DSZ-CC-1107-2020
heuristics/scheme_data
  • cert_id: ANSSI-CC-2023/42
  • description: Le produit évalué est l’application « IAS Classic v5.2.1 with MOC Server v3.1 on MultiApp V5.1, Versions 5.2.1.A.C et 5.2.1.A.O » développée par THALES DIS FRANCE SAS et embarquée sur le microcontrôleur AQUARIUS_BA_09 fabriqué par THALES DIS. Ce produit est destiné à être utilisé comme dispositif sécurisé de création de signature (SSCD).    
  • developer: THALES DIS
  • enhanced:
    • augmented: ALC_DVS.2, AVA_VAN.5
    • category: Cartes à puce
    • cc_version: Critères Communs version 3.1r5
    • cert_id: ANSSI-CC-2023/42
    • cert_link: https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2023_42fr.pdf
    • certification_date: 22.09.2023
    • developer: THALES DIS
    • evaluation_facility: CEA - LETI
    • expiration_date: 22.09.2028
    • level: EAL5+
    • mutual_recognition: CCRA SOG-IS
    • protection_profile: Protection profiles for secure signature creation device : Part 2: Device with key generation, v2.01, BSI-CC-PP-0059-2009-MA-02 Part 3: Device with key import, v1.0.2, BSI-CC-PP-0075-2012-MA-01 Part 4: Extension for device with key generation and trusted channel to certificate generation application, v1.0.1, BSI-CC-PP-0071-2012-MA-01 Part5: Extension for device with key generation and trusted communication with signature-creation application, v1.0.1, BSI-CC-PP-0072-2012-MA-01 Part 6: Extension for device with key import and trusted channel to signature creation application, v1.0.4, BSI-CC-PP-0076-2013-MA-01
    • sponsor: THALES DIS
  • expiration_date: 22.09.2028
  • level: EAL5+
  • product: IAS Classic v5.2.1 with MOC Server v3.1 on MultiApp V5.1 (Versions 5.2.1.A.C et 5.2.1.A.O)
  • sponsor: THALES DIS
  • url: https://cyber.gouv.fr/produits-certifies/ias-classic-v521-moc-server-v31-multiapp-v51-versions-521ac-et-521ao
  • cert_id: ANSSI-CC-2021/54
  • description: Le produit évalué est l’application « IAS Classic v5.2 on MultiApp V5.0, versions 5.2.0.A.C et 5.2.0.A.O » développée par THALES DIS et embarquée sur le microcontrôleur développé et fabriqué par INFINEON TECHNOLOGIES AG. Ce produit est de type « carte à puce » destiné à être utilisé comme dispositif sécurisé de création de signature (SSCD1). Il peut être utilisé dans différents types de documents
  • developer: INFINEON TECHNOLOGIES AG
  • enhanced:
    • augmented: ALC_DVS.2, AVA_VAN.5
    • category: Cartes à puce
    • cc_version: Critères Communs version 3.1r5
    • cert_id: ANSSI-CC-2021/54
    • cert_link: https://cyber.gouv.fr/sites/default/files/2021/11/certificat-anssi-cc-2021_54.pdf
    • certification_date: 04.11.2021
    • developer: INFINEON TECHNOLOGIES AG
    • evaluation_facility: CEA - LETI
    • expiration_date: 04.11.2026
    • level: EAL5+
    • mutual_recognition: SOG-IS CCRA
    • protection_profile: Protection profiles for secure signature creation device: Part 2 : Device with key generation, v2.01, BSI-CC-PP-0059-2009-MA-02 ; Part 3 : Device with key import, v1.0.2, BSI-CC-PP-0075-2012-MA-01 ; Part 4 : Extension for device with key generation and trusted communication with certificate generation application, v1.0.1, BSI-CC-PP-0071-2012-MA-01 ; Part 5 : Extension for device with key generation and trusted communication with signature creation application, v1.0.1, BSI-CC-PP-0072-2012- MA-01 ; Part 6 : Extension for device with key import and trusted communication with signature creation application, v1.0.4, BSI-CC-PP-0076-2013-MA-01.
    • report_link: https://cyber.gouv.fr/sites/default/files/2021/11/anssi-cc-2021_54.pdf
    • sponsor: THALES DIS
    • target_link: https://cyber.gouv.fr/sites/default/files/2021/11/anssi-cible-cc-2021_54en.pdf
  • expiration_date: 04.11.2026
  • level: EAL5+
  • product: IAS Classic v5.2 on MultiApp V5.0
  • sponsor: THALES DIS
  • url: https://cyber.gouv.fr/produits-certifies/ias-classic-v52-multiapp-v50
maintenance_updates
protection_profiles






pdf_data/cert_filename Certificat-CC-2023_42fr.pdf certificat-anssi-cc-2021_54.pdf
pdf_data/cert_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2023/42: 2
  • FR:
    • ANSSI-CC-2021/54: 2
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0059-2009-MA-02: 1
    • BSI-CC-PP-0071-2012-MA-01: 1
    • BSI-CC-PP-0072-2012-MA-01: 1
    • BSI-CC-PP-0075-2012-MA-01: 1
    • BSI-CC-PP-0076-2013-MA-01: 1
  • BSI:
    • BSI-CC-PP- 0072-2012-: 1
    • BSI-CC-PP- 0076-2013-MA-01: 1
    • BSI-CC-PP-0059-2009-MA-02: 1
    • BSI-CC-PP-0075-2012-MA-01: 1
pdf_data/cert_metadata
  • /CreationDate: D:20230929173949+02'00'
  • /Creator: Acrobat PDFMaker 23 pour Word
  • /Keywords:
  • /ModDate: D:20230929174206+02'00'
  • /Producer: Adobe PDF Library 23.1.175
  • pdf_file_size_bytes: 158885
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
  • /Author:
  • /CreationDate: D:20211104110617+01'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20211104110617+01'00'
  • /Producer: Acrobat Distiller 11.0 (Windows)
  • /Title:
  • pdf_file_size_bytes: 293970
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename ANSSI-CC-2023_42fr.pdf anssi-cc-2021_54.pdf
pdf_data/report_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2023/01: 2
    • ANSSI-CC-2023/31: 3
    • ANSSI-CC-2023/42: 2
  • DE:
    • BSI-DSZ-CC-1107-2020: 1
  • FR:
    • ANSSI-CC-2021/54: 2
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0059-2009-MA-02: 2
    • BSI-CC-PP-0071-2012-MA-01: 2
    • BSI-CC-PP-0072-2012-MA-01: 2
    • BSI-CC-PP-0075-2012-MA-01: 2
    • BSI-CC-PP-0076-2013-MA-01: 2
  • other:
    • PP-SSCD-: 1
    • PP-SSCD-Part2: 2
    • PP-SSCD-Part3: 2
    • PP-SSCD-Part4: 2
    • PP-SSCD-Part5: 2
    • PP-SSCD-Part6: 1
  • BSI:
    • BSI-CC-PP-0059-: 1
    • BSI-CC-PP-0059-2009-MA-02: 1
    • BSI-CC-PP-0071-: 1
    • BSI-CC-PP-0071-2012-MA-01: 1
    • BSI-CC-PP-0072-: 1
    • BSI-CC-PP-0072-2012-: 1
    • BSI-CC-PP-0075-: 1
    • BSI-CC-PP-0075-2012-MA-01: 1
    • BSI-CC-PP-0076-: 1
    • BSI-CC-PP-0076-2013-MA-01: 1
    • BSI-PP-0084-2014: 1
  • other:
    • PP-SSCD-: 5
    • PP-SSCD-Part2: 1
    • PP-SSCD-Part3: 1
    • PP-SSCD-Part4: 1
    • PP-SSCD-Part5: 1
    • PP-SSCD-Part6: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 2
    • EAL5: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
  • EAL:
    • EAL 5: 1
    • EAL2: 2
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 1
  • AGD:
    • AGD_PRE_OPE: 2
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 1
pdf_data/report_keywords/vendor
  • Gemalto:
    • Gemalto: 1
  • Gemalto:
    • Gemalto: 1
  • Infineon:
    • Infineon Technologies AG: 1
pdf_data/report_keywords/eval_facility
  • CEA-LETI:
    • CEA - LETI: 1
  • CESTI:
    • CESTI: 3
  • CEA-LETI:
    • CEA - LETI: 1
    • CEA-LETI: 2
  • CESTI:
    • CESTI: 2
pdf_data/report_keywords/cplc_data
  • ICType:
    • IC Type: 1
pdf_data/report_metadata
  • /Author:
  • /CreationDate: D:20211104110830+01'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20211104110830+01'00'
  • /Producer: Acrobat Distiller 11.0 (Windows)
  • /Title:
  • pdf_file_size_bytes: 171587
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 15
pdf_data/st_filename ANSSI-cible-2023_42en.pdf anssi-cible-cc-2021_54en.pdf
pdf_data/st_keywords/cc_cert_id
  • NL:
    • CC-1: 2
    • CC-2: 2
    • CC-3: 3
  • NL:
    • CC-1: 2
    • CC-2: 3
    • CC-3: 3
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0059-2009-MA-02: 1
    • BSI-CC-PP-0071-2012-MA-01: 1
    • BSI-CC-PP-0072-2012-MA-01: 1
    • BSI-CC-PP-0075-2012-MA-01: 1
    • BSI-CC-PP-0076-2013-MA-01: 1
    • BSI-CC-PP-0099-V2-2020: 1
  • other:
    • PP-SSCD: 4
    • PP-SSCD-KG: 37
    • PP-SSCD-KI: 28
  • BSI:
    • BSI-CC-PP-0059-2009-MA-02: 1
    • BSI-CC-PP-0071-2012-MA-01: 1
    • BSI-CC-PP-0072-2012-MA-01: 1
    • BSI-CC-PP-0075-2012-MA-01: 1
    • BSI-CC-PP-0076-2013-MA-01: 1
    • BSI-CC-PP-0099-V2-2020: 1
  • other:
    • PP-SSCD: 4
    • PP-SSCD-: 1
    • PP-SSCD-KG: 35
    • PP-SSCD-KI: 27
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 5+: 1
    • EAL5: 3
    • EAL5 augmented: 1
    • EAL5+: 1
  • EAL:
    • EAL 5+: 1
    • EAL5: 3
    • EAL5 augmented: 1
    • EAL6+: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_ARP.1: 1
  • FCO:
    • FCO_NRO: 1
  • FCS:
    • FCS_CKM: 59
    • FCS_CKM.1: 10
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 3
    • FCS_CKM.3: 1
    • FCS_CKM.4: 12
    • FCS_CKM.4.1: 2
    • FCS_COP: 35
    • FCS_COP.1: 6
    • FCS_COP.1.1: 2
    • FCS_RNG: 1
    • FCS_RNG.1: 2
  • FDP:
    • FDP_ACC: 55
    • FDP_ACC.1: 27
    • FDP_ACC.1.1: 4
    • FDP_ACF: 43
    • FDP_ACF.1: 9
    • FDP_ACF.1.1: 4
    • FDP_ACF.1.2: 4
    • FDP_ACF.1.3: 4
    • FDP_ACF.1.4: 4
    • FDP_AFC: 1
    • FDP_DAU: 11
    • FDP_DAU.1: 1
    • FDP_DAU.2.1: 1
    • FDP_DAU.2.2: 1
    • FDP_IFC: 2
    • FDP_IFC.1: 9
    • FDP_IFF: 2
    • FDP_ITC: 11
    • FDP_ITC.1: 9
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.2: 8
    • FDP_RIP: 6
    • FDP_RIP.1: 17
    • FDP_RIP.1.1: 1
    • FDP_SDI: 22
    • FDP_SDI.1: 2
    • FDP_SDI.2: 4
    • FDP_UCT: 11
    • FDP_UCT.1: 1
    • FDP_UIT: 10
    • FDP_UIT.1: 2
  • FIA:
    • FIA_AFL: 20
    • FIA_AFL.1: 4
    • FIA_API: 5
    • FIA_API.1: 14
    • FIA_API.1.1: 2
    • FIA_ATD: 2
    • FIA_UAU: 28
    • FIA_UAU.1: 8
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID: 25
    • FIA_UID.1: 14
    • FIA_USB: 1
  • FMT:
    • FMT_LIM: 2
    • FMT_MOF.1: 9
    • FMT_MOF.1.1: 1
    • FMT_MSA: 80
    • FMT_MSA.1: 10
    • FMT_MSA.2: 9
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 15
    • FMT_MSA.4: 3
    • FMT_MTD: 25
    • FMT_MTD.1: 3
    • FMT_SMF: 6
    • FMT_SMF.1: 27
    • FMT_SMF.1.1: 1
    • FMT_SMR: 7
    • FMT_SMR.1: 36
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO: 1
    • FPR_UNO.1: 1
  • FPT:
    • FPT_EMS: 5
    • FPT_EMS.1: 14
    • FPT_EMS.1.1: 4
    • FPT_EMS.1.2: 3
    • FPT_FLS: 6
    • FPT_FLS.1: 13
    • FPT_FLS.1.1: 1
    • FPT_PHP.1: 8
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 11
    • FPT_PHP.3.1: 1
    • FPT_RCV: 2
    • FPT_TST: 2
    • FPT_TST.1: 14
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 42
    • FTP_ITC.1: 16
    • FTP_TRP: 1
    • FTP_TRP.1: 4
  • FAU:
    • FAU_ARP.1: 1
  • FCO:
    • FCO_NRO: 1
  • FCS:
    • FCS_CKM: 46
    • FCS_CKM.1: 14
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 1
    • FCS_CKM.3: 1
    • FCS_CKM.4: 13
    • FCS_CKM.4.1: 2
    • FCS_COP: 28
    • FCS_COP.1: 7
    • FCS_COP.1.1: 2
    • FCS_RNG: 1
    • FCS_RNG.1: 2
  • FDP:
    • FDP_ACC: 47
    • FDP_ACC.1: 26
    • FDP_ACC.1.1: 4
    • FDP_ACF: 34
    • FDP_ACF.1: 9
    • FDP_ACF.1.1: 4
    • FDP_ACF.1.2: 4
    • FDP_ACF.1.3: 4
    • FDP_ACF.1.4: 4
    • FDP_AFC: 1
    • FDP_DAU: 8
    • FDP_DAU.1: 1
    • FDP_DAU.2.1: 1
    • FDP_DAU.2.2: 1
    • FDP_IFC: 2
    • FDP_IFC.1: 9
    • FDP_IFF: 2
    • FDP_ITC: 8
    • FDP_ITC.1: 9
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.2: 8
    • FDP_RIP: 6
    • FDP_RIP.1: 14
    • FDP_RIP.1.1: 1
    • FDP_SDI: 16
    • FDP_SDI.1: 2
    • FDP_SDI.2: 4
    • FDP_UCT: 8
    • FDP_UCT.1: 1
    • FDP_UIT: 7
    • FDP_UIT.1: 2
  • FIA:
    • FIA_AFL: 14
    • FIA_AFL.1: 4
    • FIA_API: 5
    • FIA_API.1: 11
    • FIA_API.1.1: 2
    • FIA_ATD: 2
    • FIA_UAU: 21
    • FIA_UAU.1: 9
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID: 19
    • FIA_UID.1: 14
    • FIA_USB: 1
  • FMT:
    • FMT_LIM: 2
    • FMT_MOF.1: 6
    • FMT_MOF.1.1: 1
    • FMT_MSA: 62
    • FMT_MSA.1: 9
    • FMT_MSA.2: 6
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 15
    • FMT_MSA.4: 4
    • FMT_MTD: 21
    • FMT_MTD.1: 2
    • FMT_SMF: 6
    • FMT_SMF.1: 23
    • FMT_SMF.1.1: 1
    • FMT_SMR: 7
    • FMT_SMR.1: 33
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO: 1
    • FPR_UNO.1: 1
  • FPT:
    • FPT_EMS: 5
    • FPT_EMS.1: 11
    • FPT_EMS.1.1: 4
    • FPT_EMS.1.2: 3
    • FPT_FLS: 6
    • FPT_FLS.1: 10
    • FPT_FLS.1.1: 1
    • FPT_PHP.1: 5
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 8
    • FPT_PHP.3.1: 1
    • FPT_RCV: 2
    • FPT_TST: 2
    • FPT_TST.1: 11
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ICT: 2
    • FTP_ITC: 28
    • FTP_ITC.1: 16
    • FTP_TRP: 1
    • FTP_TRP.1: 4
pdf_data/st_keywords/cc_claims
  • A:
    • A.C: 5
    • A.CAP_FILE: 4
    • A.CGA: 3
    • A.CSP: 3
    • A.O: 5
    • A.SCA: 3
    • A.VERIFICATION: 4
  • O:
    • O.ALARM: 1
    • O.ARRAY_VIEWS_CONFID: 1
    • O.CARD-MANAGEMENT: 1
    • O.CIPHER: 1
    • O.CONFID-OS-UPDATE: 2
    • O.DELETION: 1
    • O.FIREWALL: 1
    • O.GLOBAL_ARRAYS_CONFID: 1
    • O.GLOBAL_ARRAYS_INTEG: 1
    • O.INSTALL: 1
    • O.KEY-MNGT: 1
    • O.LOAD: 1
    • O.NATIVE: 1
    • O.OBJ-DELETION: 1
    • O.OPERATE: 1
    • O.PIN-MNGT: 1
    • O.REALLOCATION: 1
    • O.RESOURCES: 1
    • O.RNG: 1
    • O.SCP: 3
    • O.SECURE_AC_ACTIVATION: 2
    • O.SECURE_LOAD_ACODE: 2
    • O.SID: 1
    • O.TOE_IDENTIFICATION: 1
    • O.TRANSACTION: 1
  • OE:
    • OE.CAP_FILE: 5
    • OE.CARD-MANAGEMENT: 1
    • OE.CODE-EVIDENCE: 5
    • OE.HID_VAD: 3
    • OE.PERSONALISATION: 2
    • OE.PROT_LOGICAL_DATA: 1
    • OE.SCP: 2
    • OE.TERMINAL: 2
    • OE.USER_OBLIGATIONS: 1
    • OE.VERIFICATION: 7
  • A:
    • A.C: 5
    • A.CAP_FILE: 3
    • A.CGA: 2
    • A.CSP: 2
    • A.O: 5
    • A.SCA: 2
    • A.VERIFICATION: 3
  • O:
    • O.ALARM: 1
    • O.ARRAY_VIEWS_CONFID: 1
    • O.CIPHER: 1
    • O.CONFID-OS-UPDATE: 2
    • O.DELETION: 1
    • O.FIREWALL: 1
    • O.GLOBAL_ARRAYS_CONFID: 1
    • O.GLOBAL_ARRAYS_INTEG: 1
    • O.INSTALL: 1
    • O.KEY-MNGT: 1
    • O.LOAD: 1
    • O.NATIVE: 1
    • O.OBJ-DELETION: 1
    • O.OPERATE: 1
    • O.PIN-MNGT: 1
    • O.REALLOCATION: 1
    • O.RESOURCES: 1
    • O.RNG: 1
    • O.SCP: 3
    • O.SECURE_AC_ACTIVATION: 2
    • O.SECURE_LOAD_ACODE: 2
    • O.SID: 1
    • O.TOE_IDENTIFICATION: 1
    • O.TRANSACTION: 1
  • OE:
    • OE.CAP_FILE: 4
    • OE.CARD-MANAGEMENT: 2
    • OE.CODE-: 1
    • OE.CODE-EVIDENCE: 3
    • OE.HID_VAD: 1
    • OE.HI_VAD: 2
    • OE.SCP: 2
    • OE.VERIFICATION: 7
pdf_data/st_keywords/vendor
  • Thales:
    • Thales: 75
  • Gemalto:
    • Gemalto: 3
  • Infineon:
    • Infineon: 8
  • Thales:
    • Thales: 7
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 16
  • PACE:
    • PACE: 11
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • by authorized users. The functionalities of IAS Classic 5.2.1 other than the ones from SSCD are out of scope of the TOE perimeter. For BioPIN (MOC Server v3.1.1 application) provides biometry recognition with: 1
    • out of scope: 1
  • OutOfScope:
    • data by authorized users. The functionalities of IAS Classic 5.2 other than the ones from SSCD are out of scope of the TOE perimeter. For BioPIN (MOC Server v3.1 application) provides biometry recognition with: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: Emmanuel BACHIMON
  • /CreationDate: D:20230504155302+02'00'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20230504155302+02'00'
  • /Producer: Microsoft® Word 2016
  • /Title: IAS Classic v5.2 on MultiApp V5.1- Security Target
  • pdf_file_size_bytes: 2282348
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 69
  • /Author: D1491739
  • /CreationDate: D:20211019114756+02'00'
  • /Creator: Microsoft® Word 2016
  • /Keywords: 09-04-2019
  • /ModDate: D:20211019185225+02'00'
  • /Producer: Microsoft® Word 2016
  • /Subject: 1.1
  • /Title: MultiApp V4.2: IAS EN Core & Extensions Security Target
  • pdf_file_size_bytes: 2133951
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 65
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different