name |
CA ACF2 r16 |
E-Passport Morpho-ePass V3 with BAC, AA and EAC RSA / EAC ECC embedded on secure microcontroller STMicroelectronics |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
US |
FR |
status |
archived |
archived |
not_valid_after |
01.09.2019 |
01.09.2019 |
not_valid_before |
01.09.2017 |
28.07.2008 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10811-ci.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10811-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/dcssi-2008_23en.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10811-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/dcssi-cible2008_23en.pdf |
manufacturer |
CA Technologies |
Sagem Défense Sécurité/ ATMEL Smart Card ICs |
manufacturer_web |
https://www.ca.com |
https://www.sagem-ds.com/ |
security_level |
{} |
ADV_IMP.2, AVA_VLA.4, AVA_MSU.3, EAL4+, ALC_DVS.2 |
dgst |
61c9cd7cd4d905c5 |
77a0f1a9c88e2512 |
heuristics/cert_id |
CCEVS-VR-VID-10811-2017 |
ANSSI-CC-2008/23 |
heuristics/cert_lab |
US |
CEA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, AGD_PRE.1 |
AVA_VLA.4, ALC_DVS.2, ADV_IMP.2, AVA_MSU.3 |
heuristics/extracted_versions |
- |
- |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2007/23 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
ANSSI-CC-2007/23 |
heuristics/scheme_data |
- category: Enterprise Security Management
- certification_date: 18.08.2017
- evaluation_facility: Booz Allen Hamilton Common Criteria Testing Laboratory
- expiration_date: 18.08.2019
- id: CCEVS-VR-VID10811
- product: CA ACF2 r16
- scheme: US
- url: https://www.niap-ccevs.org/product/10811
- vendor: CA Technologies
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
292a489599472031, 64065af56aac20cf |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_esm_ac_v2.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_esm_pm_v2.1.pdf |
{} |
pdf_data/cert_filename |
st_vid10811-ci.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10811-2017: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20170901125546-04'00'
- /ModDate: D:20170901125657-04'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 178593
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
st_vid10811-vr.pdf |
dcssi-2008_23en.pdf |
pdf_data/report_frontpage |
- FR:
- US:
- cert_id: CCEVS-VR-VID10811-2017
- cert_item: CAACF2 r16
- cert_lab: US NIAP
|
- FR:
- cc_security_level: EAL 4 augmented ADV_IMP.2, ALC_DVS.2, AVA_MSU.3, AVA_VLA.4
- cc_version: Common Criteria version 2.3 compliant with ISO 15408:2005
- cert_id: DCSSI-2008/23
- cert_item: Passport Morpho-ePass V3 with BAC, AA and EAC RSA or EAC ECC, on STMicroelectronics microcontroller
- cert_item_version: MORPHOEPASSCC/ST19NR66-A/1.0.2
- cert_lab: CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France Phone: +33 (0)4 38 78 40 87, email : [email protected]
- developer: Sagem Sécurité Etablissement d’Osny, 18 Chaussée Jules César, 95520 Osny, France STMicroelectronics Smartcard IC division, ZI de Rousset, BP2, 13106 Rousset Cedex, France Sponsor Sagem Sécurité Etablissement d’Osny, 18 Chaussée Jules César, 95520 Osny, France
- match_rules: ['Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developers(.+)Evaluation facility(.+)Recognition arrangements']
- ref_protection_profiles: BSI-PP-0026 version 1.2 Common Criteria Protection Profile - Machine Readable Travel Document with “ICAO Application”, Extended Access Control
- US:
|
pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10811-2017: 1
|
- DE:
- FR:
- DCSSI-2007/23: 1
- DCSSI-2008/23: 18
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP-0002-2001: 1
- BSI-PP-0026: 2
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 2
- EAL 4 augmented: 2
- EAL 5: 1
- EAL 7: 1
- EAL4: 3
- EAL5: 1
- EAL5+: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
|
- ACM:
- ACM_AUT: 1
- ACM_CAP: 1
- ACM_SCP: 1
- ADO:
- ADV:
- ADV_FSP: 1
- ADV_HLD: 1
- ADV_IMP: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_LLD: 1
- ADV_RCR: 1
- ADV_SPM: 1
- AGD:
- ALC:
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_TAT: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
- AVA_CCA: 1
- AVA_MSU: 1
- AVA_MSU.3: 2
- AVA_SOF: 1
- AVA_VLA: 1
- AVA_VLA.4: 2
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- O:
- O.ACCESSID: 1
- O.AUDIT: 1
- O.AUTH: 1
- O.CONSISTENT: 1
- O.DATAPROT: 1
- O.DISTRIB: 1
- O.INTEGRITY: 2
- O.MAINTAIN: 1
- O.MANAGE: 1
- O.MNGRID: 1
- O.MONITOR: 1
- O.OFLOWS: 1
- O.POLICY: 1
- O.PROTCOMMS: 1
- O.ROBUST: 1
- O.SELFID: 2
- T:
- T.ADMIN_ERROR: 1
- T.CONTRADICT: 1
- T.DISABLE: 1
- T.EAVES: 1
- T.FALSIFY: 1
- T.FORGE: 2
- T.MASK: 1
- T.NOROUTE: 1
- T.OFLOWS: 1
- T.UNAUTH: 2
- T.WEAKIA: 1
- T.WEAKPOL: 1
|
|
pdf_data/report_keywords/vendor |
|
- STMicroelectronics:
- Sagem:
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- BSI:
- CC:
- CCMB-2006-09-001: 1
- CCMB-2007-09-002: 1
- CCMB-2007-09-003: 1
- CCMB-2007-09-004: 1
- ICAO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
- /Author: Mathieu Robert
- /CreationDate: D:20080728154259+02'00'
- /Creator: Acrobat PDFMaker 5.0 pour Word
- /Keywords: CER/F/07.5
- /ModDate: D:20080728154302+03'00'
- /Producer: Acrobat Distiller 5.0 (Windows)
- /Subject: Passport Morpho-ePass V3 with BAC, AA and EAC RSA or EAC ECC, on STMicroelectronics microcontroller
- /Title: DCSSI-2008/23
- pdf_file_size_bytes: 263008
- pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
- pdf_is_encrypted: True
- pdf_number_of_pages: 17
|
pdf_data/st_filename |
st_vid10811-st.pdf |
dcssi-cible2008_23en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0026: 1
- BSI-PP-0026: 1
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 1
- EAL4: 3
- EAL4 augmented: 2
- EAL5+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 11
- AGD_PRE.1: 3
- ALC:
- ALC_CMC.1: 5
- ALC_CMS.1: 6
- ATE:
- AVA:
|
- ADO:
- ADV:
- ALC:
- AVA:
- AVA_MSU.3: 4
- AVA_VLA.2: 2
- AVA_VLA.4: 4
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 2
- FAU_GEN.1: 2
- FAU_GEN.1.1: 3
- FAU_GEN.1.2: 1
- FAU_SEL: 2
- FAU_SEL.1: 4
- FAU_SEL.1.1: 1
- FAU_SEL_EXT: 2
- FAU_SEL_EXT.1: 6
- FAU_SEL_EXT.1.1: 1
- FAU_STG: 2
- FAU_STG.1: 2
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG_EXT: 2
- FAU_STG_EXT.1: 7
- FAU_STG_EXT.1.1: 1
- FAU_STG_EXT.1.2: 1
- FAU_STG_EXT.1.3: 1
- FCO:
- FCO_NRR: 2
- FCO_NRR.2: 3
- FCO_NRR.2.1: 2
- FCO_NRR.2.2: 1
- FCO_NRR.2.3: 1
- FDP:
- FDP_ACC.1: 10
- FDP_ACC.1.1: 2
- FDP_ACF.1: 11
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 3
- FIA:
- FIA_AFL: 2
- FIA_AFL.1: 6
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_USB: 2
- FIA_USB.1: 6
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF: 2
- FMT_MOF.1: 12
- FMT_MOF.1.1: 4
- FMT_MOF_EXT: 2
- FMT_MOF_EXT.1: 5
- FMT_MOF_EXT.1.1: 1
- FMT_MSA: 4
- FMT_MSA.1: 2
- FMT_MSA.1.1: 1
- FMT_MSA.3: 3
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MSA_EXT: 2
- FMT_MSA_EXT.5: 5
- FMT_MSA_EXT.5.1: 1
- FMT_MSA_EXT.5.2: 1
- FMT_SMF: 2
- FMT_SMF.1: 3
- FMT_SMF.1.1: 1
- FMT_SMR: 2
- FMT_SMR.1: 8
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_APW_EXT: 2
- FPT_APW_EXT.1: 4
- FPT_FLS_EXT: 2
- FPT_FLS_EXT.1: 4
- FPT_FLS_EXT.1.1: 1
- FPT_RPL: 2
- FPT_RPL.1: 3
- FPT_RPL.1.1: 1
- FPT_RPL.1.2: 1
- FPT_SKP_EXT: 2
- FPT_SKP_EXT.1: 2
- FPT_SKP_EXT.1.1: 1
- FRU:
- FRU_FLT: 2
- FRU_FLT.1: 2
- FRU_FLT.1.1: 1
- FTA:
- FTA_TAB.1: 4
- FTA_TSE: 2
- FTA_TSE.1: 4
- FTA_TSE.1.1: 1
- FTP:
- FTP_ITC: 2
- FTP_ITC.1: 7
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 2
- FTP_TRP.1: 6
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_SAS.1: 3
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM: 12
- FCS_CKM.1: 3
- FCS_CKM.1.1: 5
- FCS_CKM.4: 3
- FCS_CKM.4.1: 2
- FCS_COP: 22
- FCS_COP.1: 4
- FCS_COP.1.1: 13
- FCS_RND: 4
- FCS_RND.1: 4
- FCS_RND.1.1: 3
- FDP:
- FDP_ACC.1: 2
- FDP_ACC.1.1: 1
- FDP_ACF.1: 3
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_DAU: 2
- FDP_DAU.1: 1
- FDP_DAU.1.1: 2
- FDP_UCT: 3
- FDP_UCT.1: 2
- FDP_UCT.1.1: 2
- FDP_UIT: 3
- FDP_UIT.1: 2
- FDP_UIT.1.1: 2
- FDP_UIT.1.2: 2
- FIA:
- FIA_AFL.1: 3
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_API: 10
- FIA_API.1: 3
- FIA_API.1.1: 4
- FIA_UAU: 30
- FIA_UAU.1: 2
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 7
- FIA_UAU.4.1: 4
- FIA_UAU.5: 3
- FIA_UAU.5.1: 2
- FIA_UAU.5.2: 3
- FIA_UAU.6: 3
- FIA_UAU.6.1: 3
- FIA_UID.1: 2
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_LIM.1: 5
- FMT_LIM.1.1: 1
- FMT_LIM.2: 5
- FMT_LIM.2.1: 1
- FMT_MTD: 14
- FMT_MTD.1: 2
- FMT_MTD.1.1: 9
- FMT_MTD.3: 5
- FMT_MTD.3.1: 1
- FMT_SMF.1: 3
- FMT_SMF.1.1: 1
- FMT_SMR.1: 3
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 5
- FPT_FLS.1.1: 1
- FPT_PHP.3: 4
- FPT_PHP.3.1: 1
- FPT_RVM.1: 3
- FPT_RVM.1.1: 1
- FPT_SEP.1: 3
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_TST.1: 6
- FPT_TST.1.1: 1
- FPT_TST.2.1: 1
- FPT_TST.3.1: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.CRYPTO: 1
- A.ESM: 1
- A.INSTALL: 1
- A.MANAGE: 1
- A.POLICY: 1
- A.SYSTIME: 1
- A.USERID: 1
- O:
- O.ACCESSID: 1
- O.AUDIT: 1
- O.AUTH: 1
- O.BANNER: 1
- O.CONSISTENT: 1
- O.DATAPROT: 1
- O.DISTRIB: 1
- O.INTEGRITY: 1
- O.MAINTAIN: 1
- O.MANAGE: 1
- O.MNGRID: 1
- O.MONITOR: 1
- O.OFLOWS: 1
- O.POLICY: 1
- O.PROTCOMMS: 1
- O.ROBUST: 1
- O.SELFID: 2
- OE:
- OE.ADMIN: 2
- OE.BANNER: 2
- OE.CRYPTO: 3
- OE.INSTALL: 2
- OE.PERSON: 2
- OE.POLICY: 2
- OE.PROTECT: 2
- OE.ROBUST: 1
- OE.SYSTIME: 2
- OE.USERID: 3
- T:
- T.ADMIN_ERROR: 1
- T.CONTRADICT: 1
- T.DISABLE: 1
- T.EAVES: 1
- T.FALSIFY: 1
- T.FORGE: 1
- T.MASK: 1
- T.NOROUTE: 1
- T.OFLOWS: 1
- T.UNAUTH: 3
- T.WEAKIA: 1
- T.WEAKPOL: 1
|
|
pdf_data/st_keywords/vendor |
|
- STMicroelectronics:
- Sagem:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 3
- SHA-256: 4
- SHA224: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 1
- Physical Tampering: 2
- Physical tampering: 2
- fault injection: 1
- malfunction: 4
- physical tampering: 2
- SCA:
- DPA: 1
- physical probing: 4
- side channel: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
- BSI:
- BSI 2006: 1
- BSI TR-03110: 1
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.COM: 8
- EF.DG1: 21
- EF.DG13: 3
- EF.DG14: 8
- EF.DG15: 6
- EF.DG16: 20
- EF.DG2: 9
- EF.DG3: 11
- EF.DG4: 10
- EF.DG5: 6
- EF.SOD: 8
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2012-009-001: 1
- CCMB-2012-009-003: 1
- CCMB-2012-009-004: 1
- FIPS:
- FIPS 140-2: 1
- FIPS PUB 197: 2
- PKCS:
|
- BSI:
- CC:
- CCMB-2005-08-001: 2
- CCMB-2005-08-002: 2
- CCMB-2005-08-003: 3
- FIPS:
- FIPS 180-2: 4
- FIPS 46-3: 3
- FIPS PUB 46-3: 1
- ICAO:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 15946: 2
- ISO/IEC 7816-4: 1
- PKCS:
- RFC:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- boundary. It does not matter if they are installed on the Operational Environment because they are out of scope for the requirements in this evaluation as explained below. EUA – Extended User Authentication: 1
- out of scope: 1
|
|
pdf_data/st_metadata |
|
- /Author: g073432
- /CreationDate: D:20080723184618+02'00'
- /Creator: Acrobat PDFMaker 5.0 pour Word
- /Keywords: nov 2004
- /ModDate: D:20080723184659+03'00'
- /Producer: Acrobat Distiller 5.0 (Windows)
- /Subject: CARTES A PUCE
- /Title: Security Target: Morpho-ePass V3
- pdf_file_size_bytes: 445516
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 71
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |