Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Java Card Mokard Safe 2.2 V2.4.0
BSI-DSZ-CC-0251-2005
Plateforme J-Safe, en configuration fermée, version 2.11.0, sur le composant SB23YR80B
ANSSI-CC-2015/16
name Java Card Mokard Safe 2.2 V2.4.0 Plateforme J-Safe, en configuration fermée, version 2.11.0, sur le composant SB23YR80B
scheme DE FR
not_valid_after 01.09.2019 15.05.2020
not_valid_before 11.11.2005 15.05.2015
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0251a.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_16.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0251b.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_16_Cible.pdf
manufacturer ST Incard S.R.L. Incard Division / ST Microelectronics
manufacturer_web https://www.incard.it/
security_level AVA_VLA.3, EAL4+, ADV_IMP.2 ALC_DVS.2, EAL5+, AVA_VAN.5
dgst 643e82f312663824 bb81f40b202b203a
heuristics/cert_id BSI-DSZ-CC-0251-2005 ANSSI-CC-2015/16
heuristics/cert_lab BSI SERMA
heuristics/extracted_sars ASE_ENV.1, ADV_RCR.1, ASE_INT.1, ADV_HLD.2, AGD_USR.1, ASE_REQ.1, ASE_PPC.1, ASE_DES.1, ADV_FSP.2, AVA_SOF.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, AVA_MSU.2, AGD_ADM.1, ALC_LCD.1, ATE_FUN.1, ADV_IMP.2, ATE_DPT.1, AVA_VLA.3, ALC_DVS.1, ASE_SRE.1, ASE_OBJ.1, ATE_IND.2, ADV_LLD.1, ADV_SPM.1 ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_FLR.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.4, ALC_TAT.2, ASE_REQ.2, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions 2.2, 2.4.0 2.11.0
heuristics/report_references/directly_referenced_by {} ANSSI-CC-2015/17
heuristics/report_references/directly_referencing {} ANSSI-CC-2012/68
heuristics/report_references/indirectly_referenced_by {} ANSSI-CC-2025/17, ANSSI-CC-2015/17
heuristics/report_references/indirectly_referencing {} ANSSI-CC-2010/01, ANSSI-CC-2009/26, ANSSI-CC-2009/51, ANSSI-CC-2009/05, ANSSI-CC-2009/06, ANSSI-CC-2012/68, ANSSI-CC-2009/50, ANSSI-CC-2010/02, ANSSI-CC-2009/62, ANSSI-CC-2009/28
heuristics/st_references/directly_referencing {} ANSSI-CC-2012/68
heuristics/st_references/indirectly_referencing {} ANSSI-CC-2012/68
heuristics/protection_profiles {} 090c1a53c73889d8
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-profil_PP-2010-07en.pdf
pdf_data/report_filename 0251a.pdf ANSSI-CC-2015_16.pdf
pdf_data/report_frontpage
  • FR:
  • DE:
    • cert_id: BSI-DSZ-CC-0251-2005
    • cert_item: Java Card Mokard Safe 2.2 V2.4.0
    • cert_lab: BSI
    • developer: ST-Incard S.r.l
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
  • FR:
    • cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
    • cc_version: Critères Communs version 3.1 révision 3
    • cert_id: ANSSI-CC-2015/16
    • cert_item: Plateforme J-Safe, en configuration fermée, version 2.11.0, sur le composant SB23YR80B
    • cert_item_version: Version 2.11.0
    • cert_lab: Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
    • developer: STMicroelectronics S.r.l. – Incard Division Z.I Marcianise Sud, 81025 Marcianise, Italie STMicroelectronics 29 Boulevard Romain Rolland, 75669 Paris Cedex 14, France Commanditaire STMicroelectronics S.r.l. – Incard Division Z.I Marcianise Sud, 81025 Marcianise, Italie
    • match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
    • ref_protection_profiles: PP JCS] Java Card protection profile – closed configuration, version 3.0
  • DE:
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0251-2005: 21
  • FR:
    • ANSSI-CC-2012/68: 2
    • ANSSI-CC-2012/68-S02: 1
    • ANSSI-CC-2015/16: 16
    • ANSSI-CC-PP-2010/07-M01: 1
pdf_data/report_keywords/cc_protection_profile_id
  • ANSSI:
    • ANSSI-CC-PP-: 1
    • ANSSI-CC-PP-2010/07-M01: 1
  • BSI:
    • BSI-PP-0035-2007: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 4: 1
    • EAL 7: 1
    • EAL1: 5
    • EAL2: 3
    • EAL3: 4
    • EAL4: 12
    • EAL4 augmented: 3
    • EAL4+: 1
    • EAL5: 6
    • EAL6: 3
    • EAL7: 4
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 5: 3
    • EAL 7: 1
    • EAL4: 2
    • EAL6: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ACM:
    • ACM_AUT: 2
    • ACM_AUT.1: 1
    • ACM_CAP: 2
    • ACM_CAP.4: 1
    • ACM_SCP: 2
    • ACM_SCP.2: 1
  • ADO:
    • ADO_DEL: 2
    • ADO_DEL.2: 1
    • ADO_IGS: 2
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP: 2
    • ADV_FSP.2: 1
    • ADV_HLD: 2
    • ADV_HLD.2: 1
    • ADV_IMP: 2
    • ADV_IMP.2: 6
    • ADV_INT: 2
    • ADV_LLD: 2
    • ADV_LLD.1: 1
    • ADV_RCR: 2
    • ADV_RCR.1: 1
    • ADV_SPM: 2
    • ADV_SPM.1: 1
  • AGD:
    • AGD_ADM: 2
    • AGD_ADM.1: 4
    • AGD_USR: 2
    • AGD_USR.1: 4
  • ALC:
    • ALC_DVS: 2
    • ALC_DVS.1: 1
    • ALC_FLR: 2
    • ALC_LCD: 1
    • ALC_LCD.1: 1
    • ALC_TAT: 2
    • ALC_TAT.1: 1
  • ASE:
    • ASE_DES.1: 1
    • ASE_ENV.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_PPC.1: 1
    • ASE_REQ.1: 1
    • ASE_SRE.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV: 2
    • ATE_COV.2: 1
    • ATE_DPT: 2
    • ATE_DPT.1: 1
    • ATE_FUN: 2
    • ATE_FUN.1: 1
    • ATE_IND: 2
    • ATE_IND.2: 1
  • AVA:
    • AVA_CCA: 2
    • AVA_MSU: 2
    • AVA_MSU.2: 1
    • AVA_SOF: 4
    • AVA_SOF.1: 1
    • AVA_VLA: 4
    • AVA_VLA.2: 1
    • AVA_VLA.3: 7
    • AVA_VLA.4: 1
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 2
    • ALC_FLR: 2
    • ALC_FLR.1: 1
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 4
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_ARP.1: 1
  • FCO:
    • FCO_NRO.2: 1
  • FCS:
    • FCS_CKM.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.3: 1
    • FCS_CKM.4: 1
    • FCS_COP.1: 1
  • FDP:
    • FDP_ACC.2: 3
    • FDP_ACF.1: 3
    • FDP_IFC.1: 2
    • FDP_IFC.2: 1
    • FDP_IFF.1: 3
    • FDP_ITC.2: 1
    • FDP_RIP.1: 4
    • FDP_ROL.1: 1
    • FDP_SDI.2: 1
    • FDP_UIT.1: 1
  • FIA:
    • FIA_ATD.1: 1
    • FIA_UID.1: 1
    • FIA_UID.2: 1
    • FIA_USB.1: 1
  • FMT:
    • FMT_MSA.1: 4
    • FMT_MSA.2: 1
    • FMT_MSA.3: 4
    • FMT_MTD.1: 1
    • FMT_MTD.3: 1
    • FMT_REV.1: 1
    • FMT_SMF.1: 4
    • FMT_SMR.1: 5
  • FPR:
    • FPR_UNO.1: 1
  • FPT:
    • FPT_FLS.1: 4
    • FPT_RCV.3: 1
    • FPT_RVM.1: 1
    • FPT_SEP.1: 1
    • FPT_TDC.1: 1
    • FPT_TST.1: 1
  • FRU:
    • FRU_RSA.1: 1
  • FTP:
    • FTP_ITC.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.APPLET: 2
    • A.NATIVE: 2
    • A.VERIFICATION: 2
  • OSP:
    • OSP.VERIFICATION: 2
  • T:
    • T.CONFID-APPLI-DATA: 1
    • T.CONFID-JCS-CODE: 1
    • T.CONFID-JCS-DATA: 1
    • T.DELETION: 1
    • T.EXE-CODE: 2
    • T.EXE-CODE-REMOTE: 1
    • T.INSTALL: 1
    • T.INTEG-APPLI-: 1
    • T.INTEG-APPLI-CODE: 1
    • T.INTEG-APPLI-DATA: 2
    • T.INTEG-JCS-CODE: 1
    • T.INTEG-JCS-DATA: 1
    • T.NATIVE: 1
    • T.OBJ-DELETION: 1
    • T.PHYSICAL: 1
    • T.RESOURCES: 1
    • T.SID: 2
pdf_data/report_keywords/vendor
  • Samsung:
    • Samsung: 2
  • STMicroelectronics:
    • STMicroelectronics: 6
pdf_data/report_keywords/eval_facility
  • TUV:
    • TÜV Informationstechnik: 4
  • Serma:
    • Serma Technologies: 1
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • fault injection: 1
    • malfunction: 1
    • physical tampering: 1
  • SCA:
    • side channel: 1
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI 7149: 1
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 32: 1
    • AIS 34: 2
  • ISO:
    • ISO/IEC 15408:1999: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Mokard Safe 2.2, ASE-Security Target, BSI-DSZ-0251-2005, Version B- 0, Draft-11, Date 14.10.2005, (confidential document) [7] Mokard Safe 2.2, The User and Administrator Guidance AGD_USR.1 – AGD_ADM.1, Version A-0: 1
    • Report [8] Evaluation Technical Report, BSI-DSZ-CC-0251-2005, Version 2, Date: 09.11.2005, (confidential document) [9] Protection Profile PP/0305, JavaCard System Standard 2.2 Configuration Protection Profile [10: 1
pdf_data/report_metadata
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /Company: BSI
  • /CreationDate: D:20051219141321+01'00'
  • /Creator: Acrobat PDFMaker 7.0.5 für Word
  • /ModDate: D:20051219142354+01'00'
  • /Producer: Acrobat Distiller 7.0.5 (Windows)
  • /SourceModified: D:20051219131312
  • /Subject: BSI-DSZ-CC-0251-2005
  • /Title: Certification Report
  • pdf_file_size_bytes: 714197
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 40
  • /Author: Administrateur
  • /CreationDate: D:20150522134001+02'00'
  • /Creator: Microsof Word 2010
  • /Keywords: ANSSI-CC-CER-F-07.016
  • /ModDate: D:20150522134001+02'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: Plateforme J-Safe, en configuration fermée, version 2.11.0, sur le composant SB23YR80B
  • /Title: ANSSI-CC-2015/16
  • pdf_file_size_bytes: 579179
  • pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 15
pdf_data/st_filename 0251b.pdf ANSSI-CC-2015_16_Cible.pdf
pdf_data/st_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2012/68: 2
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-000: 1
    • BSI-PP-0002: 1
  • BSI:
    • BSI-CC-PP-0055: 2
    • BSI-PP- 0035: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 4: 5
    • EAL 4 augmented: 3
    • EAL4: 9
    • EAL4 augmented: 2
  • EAL:
    • EAL4+: 1
    • EAL5: 12
    • EAL5 augmented: 2
    • EAL5+: 3
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_AUT.1: 4
    • ACM_CAP.4: 3
    • ACM_SCP.2: 4
  • ADO:
    • ADO_DEL.2: 4
    • ADO_IGS.1: 4
  • ADV:
    • ADV_FSP.1: 1
    • ADV_FSP.2: 5
    • ADV_HLD.2: 6
    • ADV_IMP.1: 2
    • ADV_IMP.2: 11
    • ADV_LLD.1: 7
    • ADV_RCR.1: 4
    • ADV_SPM.1: 15
  • AGD:
    • AGD_ADM.1: 8
    • AGD_USR.1: 6
  • ALC:
    • ALC_DVS.1: 4
    • ALC_LCD: 1
    • ALC_LCD.1: 3
    • ALC_TAT.1: 5
  • ATE:
    • ATE_COV.2: 3
    • ATE_DPT.1: 2
    • ATE_FUN.1: 3
    • ATE_IND.2: 3
  • AVA:
    • AVA_MSU.2: 4
    • AVA_SOF.1: 5
    • AVA_VLA: 1
    • AVA_VLA.2: 3
    • AVA_VLA.3: 10
  • ADV:
    • ADV_ARC.1: 7
    • ADV_FSP.1: 4
    • ADV_FSP.2: 2
    • ADV_FSP.4: 1
    • ADV_FSP.5: 9
    • ADV_IMP.1: 10
    • ADV_INT.2: 2
    • ADV_TDS.1: 2
    • ADV_TDS.3: 4
    • ADV_TDS.4: 9
  • AGD:
    • AGD_OPE.1: 7
    • AGD_PRE.1: 7
  • ALC:
    • ALC_CMC.4: 2
    • ALC_CMS.1: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 3
    • ALC_DVS.2: 9
    • ALC_LCD.1: 4
    • ALC_TAT.1: 2
    • ALC_TAT.2: 4
  • ASE:
    • ASE_CCL: 2
    • ASE_CCL.1: 2
    • ASE_ECD: 2
    • ASE_ECD.1: 5
    • ASE_INT.1: 6
    • ASE_OBJ: 2
    • ASE_OBJ.2: 4
    • ASE_REQ: 2
    • ASE_REQ.1: 2
    • ASE_REQ.2: 3
    • ASE_SPD: 2
    • ASE_SPD.1: 3
    • ASE_TSS: 2
    • ASE_TSS.1: 2
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 4
    • ATE_DPT.1: 1
    • ATE_DPT.3: 2
    • ATE_FUN.1: 7
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.4: 1
    • AVA_VAN.5: 9
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_ARP: 3
    • FAU_ARP.1: 8
    • FAU_SAA.1: 4
  • FCO:
    • FCO_NRO: 1
    • FCO_NRO.2: 6
  • FCS:
    • FCS_CKM.1: 14
    • FCS_CKM.2: 9
    • FCS_CKM.3: 7
    • FCS_CKM.4: 12
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 8
  • FDP:
    • FDP_ACC: 21
    • FDP_ACC.1: 17
    • FDP_ACC.2: 12
    • FDP_ACF: 12
    • FDP_ACF.1: 33
    • FDP_IFC: 20
    • FDP_IFC.1: 25
    • FDP_IFC.2: 7
    • FDP_IFF: 11
    • FDP_IFF.1: 30
    • FDP_IFF.2: 8
    • FDP_IFF.2.7: 1
    • FDP_ITC.1: 4
    • FDP_ITC.2: 12
    • FDP_RIP: 2
    • FDP_RIP.1: 28
    • FDP_ROL: 1
    • FDP_ROL.1: 14
    • FDP_SDI.2: 9
    • FDP_UIT: 1
    • FDP_UIT.1: 4
  • FIA:
    • FIA_ATD: 2
    • FIA_ATD.1: 6
    • FIA_UID: 9
    • FIA_UID.1: 19
    • FIA_UID.2: 3
    • FIA_USB.1: 6
    • FIA_USB.1.1: 1
  • FMT:
    • FMT_MSA: 39
    • FMT_MSA.1: 31
    • FMT_MSA.2: 11
    • FMT_MSA.3: 28
    • FMT_MTD: 2
    • FMT_MTD.1: 7
    • FMT_MTD.3: 5
    • FMT_MTD.3.1: 1
    • FMT_REV: 1
    • FMT_REV.1: 5
    • FMT_SMF: 7
    • FMT_SMF.1: 32
    • FMT_SMR: 25
    • FMT_SMR.1: 48
  • FPR:
    • FPR_UNO.1: 7
  • FPT:
    • FPT_AMT: 3
    • FPT_AMT.1: 5
    • FPT_FLS: 10
    • FPT_FLS.1: 18
    • FPT_PHP: 1
    • FPT_PHP.3: 3
    • FPT_RCV: 3
    • FPT_RCV.3: 17
    • FPT_RCV.4: 4
    • FPT_RVM: 2
    • FPT_RVM.1: 9
    • FPT_RVM.1.1: 1
    • FPT_SEP: 2
    • FPT_SEP.1: 10
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
    • FPT_TDC.1: 5
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TST.1: 7
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FRU:
    • FRU_FLT: 2
    • FRU_FLT.1: 3
    • FRU_RSA: 2
    • FRU_RSA.1: 6
  • FTP:
    • FTP_ITC: 3
    • FTP_ITC.1: 8
    • FTP_TRP.1: 2
  • FAU:
    • FAU_ARP: 5
    • FAU_ARP.1: 3
    • FAU_SAA.1: 2
    • FAU_SAS.1: 2
  • FCS:
    • FCS_CKM: 3
    • FCS_CKM.1: 4
    • FCS_CKM.2: 2
    • FCS_CKM.3: 2
    • FCS_CKM.4: 2
    • FCS_COP: 9
    • FCS_COP.1: 4
    • FCS_RNG: 2
    • FCS_RNG.1: 7
    • FCS_RNG.1.1: 1
    • FCS_RNG.1.2: 1
  • FDP:
    • FDP_ACC: 8
    • FDP_ACC.2: 1
    • FDP_ACF: 7
    • FDP_ACF.1: 4
    • FDP_IFC: 3
    • FDP_IFC.1: 7
    • FDP_IFF: 3
    • FDP_IFF.1: 5
    • FDP_ITT.1: 4
    • FDP_RIP: 36
    • FDP_RIP.1: 3
    • FDP_ROL: 12
    • FDP_ROL.1: 3
    • FDP_SDI.2: 2
  • FIA:
    • FIA_ATD: 2
    • FIA_UID: 1
    • FIA_USB: 2
  • FMT:
    • FMT_LIM: 5
    • FMT_LIM.1: 13
    • FMT_LIM.1.1: 1
    • FMT_LIM.2: 12
    • FMT_LIM.2.1: 1
    • FMT_MSA: 14
    • FMT_MSA.1: 2
    • FMT_MSA.2: 2
    • FMT_MSA.3: 4
    • FMT_MTD: 6
    • FMT_SMF.1: 6
    • FMT_SMR: 1
    • FMT_SMR.1: 3
  • FPR:
    • FPR_UNO.1: 3
  • FPT:
    • FPT_FLS: 17
    • FPT_FLS.1: 5
    • FPT_ITT.1: 2
    • FPT_PHP.3: 2
    • FPT_TDC.1: 1
    • FPT_TST.1: 2
  • FRU:
    • FRU_FLT.2: 3
pdf_data/st_keywords/cc_claims
  • A:
    • A.APPLET: 4
    • A.NATIVE: 6
    • A.VERIFICATION: 3
  • D:
    • D.API_DATA: 3
    • D.APP_CODE: 8
    • D.APP_C_DATA: 3
    • D.APP_I_DATA: 4
    • D.CRYPTO: 4
    • D.JCS_CODE: 3
    • D.JCS_DATA: 5
    • D.PIN: 6
    • D.SEC_DATA: 7
  • O:
    • O.ALARM: 5
    • O.APPLET: 31
    • O.CIPHER: 7
    • O.CODE_PCKG: 8
    • O.CODE_PKG: 6
    • O.DELETION: 5
    • O.FIREWALL: 11
    • O.INSTALL: 8
    • O.JAVAOBJECT: 38
    • O.KEY-MNGT: 5
    • O.LOAD: 6
    • O.NATIVE: 7
    • O.OBJ-DELETION: 5
    • O.OPERATE: 9
    • O.PACKAGE: 9
    • O.PIN-: 1
    • O.PIN-MNGT: 5
    • O.REALLOCATION: 5
    • O.REMOTE: 4
    • O.REMOTE_MTHD: 6
    • O.REMOTE_OBJ: 9
    • O.REMOTE_OBJECT: 1
    • O.RESOURCES: 6
    • O.RMI_SERVICE: 12
    • O.ROR: 5
    • O.SHRD_VAR_CONFID: 5
    • O.SHRD_VAR_INTEG: 6
    • O.SID: 8
    • O.TODO: 1
    • O.TRANSACTION: 5
  • OE:
    • OE.APPLET: 6
    • OE.CARD-MANAGEMENT: 3
    • OE.NATIVE: 4
    • OE.SCP: 18
    • OE.VERIFICATION: 11
  • OP:
    • OP.ARRAY_ACCESS: 3
    • OP.AUTHENTICATION: 2
    • OP.BYTECODE: 1
    • OP.CARD_CONTENT_MGT: 2
    • OP.CREATE: 6
    • OP.DELETE_APPLET: 4
    • OP.DELETE_PCKG: 3
    • OP.DELETE_PCKG_APPLET: 3
    • OP.GET_ROR: 2
    • OP.INSTALL: 1
    • OP.INSTANCE_FIELD: 1
    • OP.INVK_INTERFACE: 4
    • OP.INVK_VIRTUAL: 3
    • OP.INVOKE: 2
    • OP.JAVA: 4
    • OP.LOAD: 1
    • OP.PUT: 4
    • OP.RECEIVE: 2
    • OP.RET_RORD: 2
    • OP.SEND: 2
    • OP.THROW: 3
    • OP.TYPE_ACCESS: 3
  • OSP:
    • OSP.VERIFICATION: 2
  • R:
    • R.CM: 1
    • R.GP: 2
    • R.JAVA: 19
  • T:
    • T.CONFID-APPLI-DATA: 3
    • T.CONFID-JCS-CODE: 3
    • T.CONFID-JCS-DATA: 3
    • T.DELETION: 4
    • T.EXE-CODE: 7
    • T.EXE-CODE-REMOTE: 3
    • T.INSTALL: 4
    • T.INTEG-APPLI-CODE: 6
    • T.INTEG-APPLI-DATA: 7
    • T.INTEG-JCS-CODE: 3
    • T.INTEG-JCS-DATA: 2
    • T.NATIVE: 3
    • T.OBJ-DELETION: 3
    • T.PHYSICAL: 3
    • T.RESOURCES: 3
    • T.SID: 7
  • A:
    • A.NO-DELETION: 5
    • A.NO-INSTALL: 5
    • A.VERIFICATION: 4
    • A.XXX: 1
  • D:
    • D.API_DATA: 3
    • D.APP_CODE: 6
    • D.APP_C_DATA: 3
    • D.APP_I_DATA: 4
    • D.CRYPTO: 6
    • D.EMBEDDED_SW_CODE: 4
    • D.EMBEDDED_SW_DATA: 4
    • D.GP_CODE: 3
    • D.GP_SENSITIVE_DATA: 3
    • D.JCS_CODE: 4
    • D.JCS_DATA: 6
    • D.PIN: 9
    • D.SEC_DATA: 5
  • O:
    • O.ALARM: 21
    • O.APPLET: 1
    • O.CIPHER: 40
    • O.FIREWALL: 26
    • O.GLOBAL_ARRAYS_CONFID: 15
    • O.GLOBAL_ARRAYS_INTEG: 8
    • O.GP_REGISTRY: 10
    • O.JAVA: 3
    • O.JAVAOB: 2
    • O.JAVAOBJECT: 20
    • O.KEY-MNGT: 15
    • O.KEY_MNGT: 1
    • O.LIFE_CYCLE: 12
    • O.NATIVE: 12
    • O.OBJ-DEL: 1
    • O.OBJ-DELETION: 6
    • O.OPERATE: 34
    • O.PIN-MNGT: 13
    • O.REALLOCATION: 9
    • O.RESOURCES: 9
    • O.RND: 1
    • O.ROLES: 7
    • O.SCP: 65
    • O.SID: 25
    • O.SIDE_CHANNEL: 10
    • O.TRANSACTION: 16
  • OE:
    • OE.CARD-MANAGEMENT: 12
    • OE.CARD_MANAGEMENT: 16
    • OE.MANAGEMENT_OF_SECRETS: 3
    • OE.NO-DELETION: 6
    • OE.NO-INSTALL: 5
    • OE.SCP: 3
    • OE.VERIFICATION: 32
  • OP:
    • OP.ARRAY_ACCESS: 4
    • OP.CARD_LOCK: 4
    • OP.CARD_TERMINATE: 4
    • OP.CREATE: 7
    • OP.GET_CARD_LIFE_CYCLE_: 1
    • OP.GET_CARD_LIFE_CYCLE_STATE: 2
    • OP.INSTANCE_FIELD: 4
    • OP.INVK_INTERFACE: 7
    • OP.INVK_VIRTUAL: 6
    • OP.JAVA: 5
    • OP.MANAGE_APP_LIFE_CYC: 1
    • OP.MANAGE_APP_LIFE_CYCLE_STATE: 3
    • OP.PUT: 6
    • OP.THROW: 5
    • OP.TYPE_ACCESS: 5
  • OSP:
    • OSP.CARD_ADMINISTRATION_DISABLED: 5
    • OSP.MANAGEMENT_OF_SECRETS: 6
    • OSP.ROLES: 5
    • OSP.VERIFICATION: 5
  • R:
    • R.JAVA: 5
  • T:
    • T.CONFID-APPLI-DATA: 17
    • T.CONFID-JCS-CODE: 6
    • T.CONFID-JCS-DATA: 11
    • T.EXE-CODE: 9
    • T.INTEG-: 1
    • T.INTEG-APPLI-CODE: 10
    • T.INTEG-APPLI-DATA: 21
    • T.INTEG-JCS-CODE: 6
    • T.INTEG-JCS-DATA: 10
    • T.LEAKAGE: 1
    • T.LIFE_CYCLE: 7
    • T.NATIVE: 4
    • T.OBJ-DELETION: 4
    • T.PHYSICAL: 9
    • T.RESOURCES: 7
    • T.SID: 16
pdf_data/st_keywords/vendor
  • Samsung:
    • Samsung: 3
  • STMicroelectronics:
    • STM: 15
    • STMicroelectronics: 8
pdf_data/st_keywords/eval_facility
  • TUV:
    • TUV Informationstechnik: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 5
  • DES:
    • 3DES:
      • 3-DES: 1
    • DES:
      • DES: 9
  • AES_competition:
    • AES:
      • AES: 7
  • DES:
    • 3DES:
      • 3-DES: 2
      • Triple-DES: 1
      • TripleDES: 1
    • DES:
      • DES: 7
  • constructions:
    • MAC:
      • CBC-MAC: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 1
  • FF:
    • DH:
      • Diffie-Hellman: 5
    • DSA:
      • DSA: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 3
      • SHA1: 2
    • SHA2:
      • SHA-224: 2
      • SHA-256: 2
      • SHA-384: 1
      • SHA-512: 2
      • SHA224: 2
      • SHA256: 2
      • SHA384: 2
      • SHA512: 2
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 5
  • MAC:
    • MAC: 4
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 1
    • RNG: 4
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 3
  • ECB:
    • ECB: 3
  • CBC:
    • CBC: 5
  • ECB:
    • ECB: 2
pdf_data/st_keywords/crypto_library
  • Neslib:
    • NesLib v.3.1: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Physical tampering: 1
    • malfunction: 2
    • physical tampering: 1
  • SCA:
    • physical probing: 1
  • FI:
    • Malfunction: 1
    • Physical tampering: 2
    • fault injection: 2
    • malfunction: 2
    • physical tampering: 1
  • SCA:
    • DPA: 3
    • Leak-Inherent: 1
    • SPA: 1
    • physical probing: 4
    • side channel: 1
    • timing attacks: 1
pdf_data/st_keywords/cplc_data
  • ICVersion:
    • IC. Version: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCIMB-99-031: 1
    • CCIMB-99-032: 1
    • CCIMB-99-033: 1
  • FIPS:
    • FIPS 197: 1
    • FIPS PUB 46-3: 1
  • PKCS:
    • PKCS#1: 2
  • SCP:
    • SCP 02: 2
    • SCP02: 1
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
  • PKCS:
    • PKCS#1: 1
    • PKCS1: 1
    • PKCS3: 1
  • SCP:
    • SCP02: 1
pdf_data/st_keywords/javacard_version
  • JavaCard:
    • Java Card 2.1.1: 3
    • Java Card 2.1.2: 1
    • Java Card 2.2: 128
    • Java Card 2.2.1: 2
  • GlobalPlatform:
    • GlobalPlatform 2.1.1: 2
  • JavaCard:
    • Java Card 3.0.4: 1
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 3
  • misc:
    • TYPE_ACCESS: 5
pdf_data/st_keywords/javacard_packages
  • java:
    • java.rmi: 2
  • javacard:
    • javacard.framework: 4
    • javacard.framework.appletclass: 1
    • javacard.framework.service: 1
    • javacard.security: 14
  • javacardx:
    • javacardx.crypto: 3
    • javacardx.rmi: 1
    • javacardx.security: 1
  • java:
    • java.lang: 1
  • javacard:
    • javacard.framework: 4
    • javacard.framework.applet: 1
    • javacard.security: 23
    • javacard.security.interface: 4
  • javacardx:
    • javacardx.crypto: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this PP, though. ASE – Security Target Java Card 2.2 on Mokard Safe Issued: 10/11/2005: 1
    • out of scope: 1
  • OutOfScope:
    • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
    • and is out of the scope of current evaluation. Any other application being loaded pre-issuance is out of scope of current evaluation. 4.1.2.1 Java Card Platform The Java technology, embedded on the TOE: 1
    • interface for the secure management of applications on the smart card. The Card Manager is out of scope of current evaluation and its administrative interface is permanently disabled before TOE delivery: 1
    • of the TOE to the parties responsible of the following usage phases. Application development is out of scope of current evaluation. TOE Construction phase includes: Product Development Product: 1
    • out of scope: 4
pdf_data/st_metadata
  • /Author: NDiiorio
  • /CreationDate: D:20051110164319
  • /Creator: Mokard Safe 2.2 ASE Security Target Lite.doc (Sola lettura) - Microsoft Word
  • /Producer: Acrobat PDFWriter 4.05 per Windows NT
  • /Title: Mokard Safe 2.2 ASE Security Target Lite.doc
  • pdf_file_size_bytes: 2702319
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 133
  • /Author: Luca Di Cosmo
  • /CreationDate: D:20150402161829+02'00'
  • /Creator: Microsoft® Word 2013
  • /ModDate: D:20150522134244+02'00'
  • /Producer: Microsoft® Word 2013
  • /Title: J-Safe_SB23YR80B_Security_Target
  • pdf_file_size_bytes: 1236830
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 90
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different