name |
Application IAS V4 sur la plateforme JavaCard ouverte MultiApp V3 masquée sur le composant M7820 A11 (Version du patch : 1.5) |
Applet IAS Classic v3 sur carte à puce MultiApp V2 masquée sur composants de la famille SLE66 |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
FR |
FR |
status |
archived |
archived |
not_valid_after |
01.09.2019 |
01.09.2019 |
not_valid_before |
11.07.2014 |
18.08.2011 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2014-50fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2011-16fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2014-50en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2011-16en.pdf |
manufacturer |
Gemalto - Infineon Technologies AG |
Gemalto - Infineon Technologies AG |
manufacturer_web |
https://www.gemalto.com/ |
https://www.gemalto.com/ |
security_level |
AVA_VAN.5, ALC_DVS.2, EAL5+ |
AVA_VAN.5, ALC_DVS.2, EAL4+ |
dgst |
623e0ce934d1f19c |
c1db7b13db8adf3a |
heuristics/cert_id |
ANSSI-CC-2014/50 |
ANSSI-CC-2011/16 |
heuristics/cert_lab |
SERMA |
SERMA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_DVS.2, AVA_VAN.5 |
AVA_VLA.4, ALC_DVS.2, AVA_MSU.3, AVA_VAN.5 |
heuristics/extracted_versions |
1.5 |
- |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-0829-2012, ANSSI-CC-2014/06, ANSSI-CC-2014/14, ANSSI-CC-2014/49 |
BSI-DSZ-CC-0523-2008, BSI-DSZ-CC-0626-2009, ANSSI-CC-2011/10 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
ANSSI-CC-2014/49, ANSSI-CC-2014/14, BSI-DSZ-CC-0829-2012, ANSSI-CC-2014/06, BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0640-2010 |
BSI-DSZ-CC-0223-2003, BSI-DSZ-CC-0266-2005, ANSSI-CC-2011/10, BSI-DSZ-CC-0399-2007, BSI-DSZ-CC-0523-2008, BSI-DSZ-CC-0169-2002, BSI-DSZ-CC-0626-2009, BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0482-2008 |
heuristics/scheme_data |
- cert_id: ANSSI-CC-2014/50
- description: Le produit qualifié est l'« application IAS V4 sur la plateforme JavaCard ouverte MultiApp V3masquée sur le composant M7820 A11 », pouvant être en mode contact ou sans-contact. Leproduit est développé par la société Gemalto et embarqué sur le microcontrôleur M7820 A11fabriqué par la société Infineon Technologies. Ce produit est également proposé sous les noms IDPrime MD 840 (mode contact uni
- developer: Gemalto / Infineon Technologies AG
- enhanced:
- level: EAL5+
- product: Application IAS V4 sur la plateforme JavaCard ouverte MultiApp V3 masquée sur le composant M7820 A11 (Version du patch : 1.5)
- sponsor: Gemalto
- url: https://cyber.gouv.fr/produits-certifies/application-ias-v4-sur-la-plateforme-javacard-ouverte-multiapp-v3-masquee-sur-0
|
- cert_id: ANSSI-CC-2011/16
- description: Le produit évalué est la carte à puce « MultiApp v2 », pouvant être en mode contact ou dual. Le produit est développé par la société Gemalto et embarqué sur l'un des microcontrôleurs SLE66CLX360PEM m1588 k11/a15, SLE66CLX360PE m1587 k11/a15, SLE66CLX800PEM m1580 k11/a15, SLE66CLX800PE m1581 k11/a15, SLE66CX800PE m1599 k11/a15, SLE66CLX1440PEM m2090/a13, SLE66CLX1440PE m2091/a13 ou SLE66CX1440P
- developer: Gemalto et Infineon Technologies AG
- enhanced:
- level: EAL4+
- product: Applet IAS Classic v3 sur carte à puce MultiApp V2 masquée sur composants de la famille SLE66
- sponsor: Gemalto
- url: https://cyber.gouv.fr/produits-certifies/applet-ias-classic-v3-sur-carte-puce-multiapp-v2-masquee-sur-composants-de-la
|
heuristics/st_references/directly_referenced_by |
OCSI/CERT/CCL/02/2020/RC, OCSI/CERT/SYS/06/2017/RC |
{} |
heuristics/st_references/directly_referencing |
BSI-DSZ-CC-0695-2011 |
BSI-DSZ-CC-0626-2009 |
heuristics/st_references/indirectly_referenced_by |
OCSI/CERT/CCL/02/2020/RC, OCSI/CERT/SYS/06/2017/RC |
{} |
heuristics/st_references/indirectly_referencing |
BSI-DSZ-CC-0695-2011 |
BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0626-2009, BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0482-2008 |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
ANSSI-CC_2014-50fr.pdf |
ANSSI-CC_2011-16fr.pdf |
pdf_data/report_frontpage |
- FR:
- cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 4
- cert_id: ANSSI-CC-2014/50
- cert_item: Application IAS V4 sur la plateforme JavaCard ouverte MultiApp V3 masquée sur le composant M7820 A11
- cert_item_version: Version de l’application IAS : 4.0.2.K Version de l’application MOCA Server : 1.0 Version plateforme Java Card MultiApp : 3.0 Version du patch : 1.5
- cert_lab: Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
- developer: Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France Infineon Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: Protection profiles for secure signature creation device – Part 2: Device with key generation, Référence : prEN 14169-2:2012, Version 2.0.1, maintenu sous la référence BSI-CC-PP-0059-2009-MA-01 (voir [PP-SSCD-Part2]). Protection profiles for secure signature creation device – Part 3: Device with key import, Référence : prEN 14169-3:2012, Version 1.0.2, certifié sous la référence BSI-CC-PP-0075-2012 (voir [PP-SSCD-Part3]). Protection profiles for secure signature creation device – Part 4: Extension for device with key generation and trusted communication with certificate generation application, Référence : prEN 14169-4:2012, Version 1.0.1, certifié sous la référence BSI-CC-PP-0071-2012 (voir [PP-SSCD-Part4]). Protection profiles for secure signature creation device – Part 5: Extension for device with key generation and trusted communication with signature creation application, Référence : prEN 14169-5:2012, Version 1.0.1, certifié sous la référence BSI-CC-PP-0072-2012 (voir [PP-SSCD-Part5]). Protection profiles for secure signature creation device – Part 6: Extension for device with key import and trusted communication with signature creation application, Référence : prEN 14169-6:2013, Version 1.0.4, certifié sous la référence BSI-CC-PP-0076-2013 (voir [PP-SSCD-Part6]). Rapport de certification ANSSI-CC-2014/50 Application IAS V4 sur la plateforme JavaCard ouverte MultiApp V3 masquée sur le composant M7820 A11 Page 4 sur 24 ANSSI-CC-CER-F-07.011
|
- FR:
- cc_security_level: EAL 4 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 3
- cert_id: ANSSI-CC-2011/16
- cert_item: Applet IAS Classic v3 sur carte à puce MultiApp V2 masquée sur composants de la famille SLE66
- cert_item_version: Version du masque : 1.0 Version plateforme Java Card MultiApp : 2.0 Version du patch : 2.7
- cert_lab: Serma Technologies 30 avenue Gustave Eiffel, 33608 Pessac, France Tél : +33 (0)5 57 26 08 75, mél : [email protected]
- developer: Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France Infineon Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur\\(s\\)(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: BSI-PP-0005-2002], Protection Profile – Secure Signature-Creation Device Type 2, version 1.04 [BSI-PP-0006-2002], Protection Profile – Secure Signature-Creation Device Type 3, version 1.05
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- FR:
- ANSSI-CC-2014/06: 4
- ANSSI-CC-2014/14: 2
- ANSSI-CC-2014/49: 3
- ANSSI-CC-2014/50: 25
|
- DE:
- BSI-DSZ-CC-0523-2008: 4
- BSI-DSZ-CC-0523-2008-MA-01: 1
- BSI-DSZ-CC-0626-: 1
- BSI-DSZ-CC-0626-2009: 2
- FR:
- ANSSI-CC-2011/10: 3
- ANSSI-CC-2011/16: 22
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP- 0059-2009-MA-01: 1
- BSI-CC-PP- 0071-2012: 1
- BSI-CC-PP- 0072-2012: 1
- BSI-CC-PP- 0075-2012: 1
- BSI-CC-PP-0059-2009-MA-01: 2
- BSI-CC-PP-0071-2012: 2
- BSI-CC-PP-0072-2012: 2
- BSI-CC-PP-0075-2012: 2
- BSI-CC-PP-0076-: 1
- BSI-CC-PP-0076-2013: 2
- BSI-PP- 0035-2007: 1
- BSI-PP-0035-: 1
- BSI-PP-0035-2007: 1
- other:
- PP-SSCD-: 5
- PP-SSCD-Part2: 2
- PP-SSCD-Part3: 2
- PP-SSCD-Part4: 2
- PP-SSCD-Part5: 2
- PP-SSCD-Part6: 2
|
- BSI:
- BSI-PP- 0002-2001: 2
- BSI-PP- 0005-2002: 1
- BSI-PP- 0006-2002: 1
- BSI-PP-0002-2001: 2
- BSI-PP-0005-: 1
- BSI-PP-0005-2002: 2
- BSI-PP-0006-2002: 1
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 1
- EAL4: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 2
- EAL 5: 1
- EAL 7: 1
- EAL4: 2
- EAL4+: 1
- EAL5: 3
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 4
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
- AVA_MSU.3: 3
- AVA_VAN: 2
- AVA_VAN.5: 1
- AVA_VLA.4: 3
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
- Gemalto:
- Infineon:
- Infineon: 3
- Infineon Technologies: 5
- Infineon Technologies AG: 1
|
- Gemalto:
- Infineon:
- Infineon: 7
- Infineon Technologies: 25
- Infineon Technologies AG: 3
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
- com:
- com.gemalto.javacardx.pace: 1
- javacardx:
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: Duquesnoy
- /CreationDate: D:20140711150029+02'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20140711150029+02'00'
- /Producer: Acrobat Distiller 9.0.0 (Windows)
- /Title: Microsoft Word - Rapport ANSSI-CC-2014_50fr.doc
- pdf_file_size_bytes: 234712
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 24
|
- /Author: Duquesnoy
- /Comments: Developpeur
- /Company: SGDSN/ANSSI
- /CreationDate: D:20110818130658+02'00'
- /Creator: Acrobat PDFMaker 8.0 pour Word
- /Keywords: ANSSI-CC-CER-F-07.007
- /ModDate: D:20110818130719+02'00'
- /Producer: Acrobat Distiller 8.0.0 (Windows)
- /SourceModified: D:20110818110640
- /Subject: Applet IAS Classic v3 sur carte puce MultiApp V2 masque sur composants de la famille SLE66
- /Title: ANSSI-CC-2011/16
- pdf_file_size_bytes: 371515
- pdf_hyperlinks: mailto:[email protected], http://www.ssi.gouv.fr/
- pdf_is_encrypted: False
- pdf_number_of_pages: 21
|
pdf_data/st_filename |
ANSSI-CC-cible_2014-50en.pdf |
ANSSI-CC-cible_2011-16en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0523-2008-MA-01: 1
- BSI-DSZ-CC-0626-2009: 1
- FR:
- NL:
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0059-2009-MA-01: 1
- BSI-CC-PP-0071-2012: 1
- BSI-CC-PP-0072-2012: 1
- BSI-CC-PP-0075-2012: 1
- BSI-CC-PP-0076-2013: 1
- BSI-PP-0035: 1
- other:
- PP-SSCD: 4
- PP-SSCD-KG: 33
- PP-SSCD-KI: 25
|
- ANSSI:
- BSI:
- BSI-PP-0002: 1
- BSI-PP-0005: 1
- BSI-PP-0006: 1
- BSI-PP-0035: 1
- other:
- PP-SSCD-T2: 12
- PP-SSCD-T3: 13
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 5+: 1
- EAL5: 2
- EAL5 augmented: 1
|
- EAL:
- EAL 5+: 3
- EAL4: 2
- EAL4 augmented: 1
- EAL4+: 1
|
pdf_data/st_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_TDS: 1
- ALC:
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM: 14
- FCS_CKM.1: 5
- FCS_CKM.1.1: 2
- FCS_CKM.2: 2
- FCS_CKM.4: 8
- FCS_CKM.4.1: 2
- FCS_COP: 8
- FCS_COP.1: 2
- FCS_COP.1.1: 2
- FDP:
- FDP_ACC: 4
- FDP_ACC.1: 14
- FDP_ACC.1.1: 4
- FDP_ACF: 4
- FDP_ACF.1: 6
- FDP_ACF.1.1: 4
- FDP_ACF.1.2: 4
- FDP_ACF.1.3: 4
- FDP_ACF.1.4: 4
- FDP_DAU: 4
- FDP_DAU.1: 1
- FDP_DAU.2.1: 1
- FDP_DAU.2.2: 1
- FDP_IFC.1: 9
- FDP_ITC: 2
- FDP_ITC.1: 4
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 4
- FDP_RIP: 1
- FDP_RIP.1: 1
- FDP_RIP.1.1: 1
- FDP_SDI: 4
- FDP_SDI.1: 2
- FDP_SDI.2.1: 2
- FDP_SDI.2.2: 2
- FDP_UCT: 2
- FDP_UCT.1: 1
- FDP_UCT.1.1: 1
- FDP_UIT: 3
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL: 6
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_API: 5
- FIA_API.1: 8
- FIA_API.1.1: 2
- FIA_UAU: 5
- FIA_UAU.1: 4
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UID: 4
- FIA_UID.1: 6
- FIA_UID.1.1: 2
- FIA_UID.1.2: 2
- FMT:
- FMT_MOF.1: 2
- FMT_MOF.1.1: 1
- FMT_MSA: 14
- FMT_MSA.1: 3
- FMT_MSA.1.1: 3
- FMT_MSA.2: 2
- FMT_MSA.2.1: 1
- FMT_MSA.3: 5
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MSA.4.1: 2
- FMT_MTD: 4
- FMT_MTD.1.1: 2
- FMT_SMF.1: 8
- FMT_SMF.1.1: 1
- FMT_SMR.1: 11
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS: 5
- FPT_EMS.1: 7
- FPT_EMS.1.1: 3
- FPT_EMS.1.2: 3
- FPT_FLS.1: 2
- FPT_FLS.1.1: 1
- FPT_PHP.1: 2
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 2
- FPT_PHP.3.1: 1
- FPT_TST: 2
- FPT_TST.1: 3
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 13
- FTP_ITC.1: 2
- FTP_ITC.1.1: 4
- FTP_ITC.1.2: 4
- FTP_ITC.1.3: 4
- FTP_TRP.1: 2
|
- FCS:
- FCS_CKM.1: 5
- FCS_CKM.2: 1
- FCS_CKM.4: 5
- FCS_COP.1: 7
- FDP:
- FDP_ACC.1: 13
- FDP_ACF.1: 22
- FDP_ETC.1: 1
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_IFC.1: 6
- FDP_ITC.1: 9
- FDP_ITC.2: 2
- FDP_RIP.1: 1
- FDP_RIP.1.1: 1
- FDP_SDI.1: 1
- FDP_SDI.2: 5
- FDP_UCT.1: 2
- FDP_UIT: 1
- FDP_UIT.1: 4
- FIA:
- FIA_AFL.1: 1
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD: 1
- FIA_ATD.1.1: 1
- FIA_UAU.1: 2
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 1
- FIA_UID.1: 4
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MOF.1: 1
- FMT_MOF.1.1: 1
- FMT_MSA.1: 5
- FMT_MSA.2: 1
- FMT_MSA.2.1: 1
- FMT_MSA.3: 7
- FMT_MTD.1: 2
- FMT_SMF.1: 4
- FMT_SMF.1.1: 1
- FMT_SMR.1: 6
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 1
- FPT_FLS.1.1: 1
- FPT_PHP.1: 1
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 1
- FPT_PHP.3.1: 1
- FPT_TST.1: 1
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 7
- FTP_ITC.1: 12
- FTP_TRP: 4
- FTP_TRP.1: 3
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.CGA: 2
- A.CSP: 3
- A.SCA: 2
- OE:
|
- A:
- D:
- D.DTBS: 4
- D.RAD: 5
- D.SCD: 6
- D.SIG: 1
- D.SSCD: 1
- D.SVD: 5
- D.VAD: 1
- OE:
- OE.HI_VAD: 1
- OE.SVD_AUTH_CGA: 1
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- SCA:
- DPA: 1
- SPA: 1
- timing attacks: 1
|
- FI:
- SCA:
- DPA: 1
- SPA: 1
- timing attacks: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2009-07-004: 1
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- FIPS:
- FIPS PUB 46-3: 1
- FIPS180-2: 1
- FIPS197: 2
- FIPS46-3: 1
- PKCS:
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- FIPS:
- FIPS 180-2: 1
- FIPS PUB 46-3: 1
- FIPS180-2: 1
- FIPS46-3: 1
- ICAO:
- PKCS:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /CreationDate: D:20140131160737+01'00'
- /Creator: Microsoft® Office Word 2007
- /Keywords: Security Target, CC, eTravel
- /ModDate: D:20140807095336+02'00'
- /Producer: Microsoft® Office Word 2007
- /Subject:
- /Title:
- pdf_file_size_bytes: 652503
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 45
|
- /Author: delavernette
- /CreationDate: D:20110607185448
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20110607185448
- /Producer: Microsoft® Office Word 2007
- pdf_file_size_bytes: 525873
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 50
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |