name |
SafeNet eToken (Smartcard or USB token) version 9.1.2 Athena IDProtect/OS755 Java Card on INSIDE Secure AT90SC25672RCTUSB Microcontroller embedding IDSign applet |
Card Usimera Protect: SLE88CFX4000P microcontroller embedding SIM, USIM and OTA applications on Java card open platform (version 2.1). |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
FR |
FR |
status |
archived |
archived |
not_valid_after |
01.09.2019 |
01.09.2019 |
not_valid_before |
22.09.2011 |
30.03.2007 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2011-45en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2007_08en.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2011-45en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible2007_08en.pdf |
manufacturer |
Athena Smartcard Solutions Inc. / Inside Secure S.A. |
Gemalto - Infineon Technologies AG |
manufacturer_web |
https://www.athena-scs.com/ |
https://www.gemalto.com/ |
security_level |
EAL4+, AVA_VAN.5 |
ADV_IMP.2, AVA_MSU.3, ALC_DVS.2, EAL4+, AVA_VLA.4 |
dgst |
6a79b4cde1876387 |
ae320d6accec3536 |
heuristics/cert_id |
ANSSI-CC-2011/45 |
ANSSI-CC-2007/08 |
heuristics/cert_lab |
THALES |
SERMA |
heuristics/cpe_matches |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_LLD.1, ASE_CCL.1, ALC_DEL.1, ALC_CMC.4, AVA_VLA.4, AVA_VAN.5, ATE_FUN.1, ATE_IND.2, ASE_TSS.1, ADV_TDS.3, ADV_ARC.1, ADV_HLD.2, ASE_SPD.1, ASE_REQ.2, ALC_CMS.4, ADV_IMP.1, ALC_TAT.1, ATE_COV.2, AGD_OPE.1, AVA_SOF.1, ALC_DVS.1, ADV_RCR.1, ASE_ECD.1, AGD_USR.1, ADV_SPM.1, AVA_MSU.3, ADV_FSP.4, ASE_INT.1, AGD_ADM.1, AGD_PRE.1, ALC_LCD.1, ATE_DPT.2, ASE_OBJ.2 |
ATE_COV.2, ADV_LLD.1, AVA_SOF.1, ADV_HLD.2, AGD_ADM.1, ADV_FSP.2, AVA_VLA.4, ALC_LCD.1, ATE_FUN.1, ALC_DVS.2, ATE_DPT.1, AVA_MSU.3, ADV_RCR.1, ALC_TAT.1, AGD_USR.1, ADV_SPM.1, ATE_IND.2, ADV_IMP.2 |
heuristics/extracted_versions |
9.1.2 |
2.1 |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/report_references/directly_referenced_by |
ANSSI-CC-2012/43 |
ANSSI-CC-2007/19 |
heuristics/report_references/directly_referencing |
ANSSI-CC-2009/11, ANSSI-CC-2011/03, ANSSI-CC-2006/30 |
BSI-DSZ-CC-0269-2006 |
heuristics/report_references/indirectly_referenced_by |
ANSSI-CC-2012/43 |
ANSSI-CC-2007/19 |
heuristics/report_references/indirectly_referencing |
ANSSI-CC-2009/11, ANSSI-CC-2011/03, ANSSI-CC-2006/30 |
BSI-DSZ-CC-0269-2006 |
heuristics/scheme_data |
- cert_id: ANSSI-CC-2011/45
- description: Le produit certifié est « SafeNet eToken (Smartcard or USB token) version 9.1.2 - Athena IDProtect/OS755 Java Card on INSIDE Secure AT90SC25672RCT-USB Microcontroller embedding IDSign applet», développé par Athena Smartcard Solutions Inc. et Inside Secure S.A. Il peut prendre la forme d'une carte à puce ou d'une clé USB. La cible d'évaluation est constituée :du composant :Atmel AT90
- developer: Athena Smartcard Solutions Inc. / Inside Secure S.A.
- enhanced:
- augmented: AVA_VAN.5
- category: Cartes à puce
- cc_version: Critères Communs version 3.1r3
- cert_id: ANSSI-CC-2011/45
- certification_date: 2011-09-22
- developer: Athena Smartcard Solutions Inc. / Inside Secure S.A.
- evaluation_facility: THALES - CEACI (T3S – CNES)
- level: EAL4+
- mutual_recognition: SOG-IS CCRA
- protection_profile: BSI-PP-0005-2002, BSI-PP-0006-2002
- report_link: https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2011-45en.pdf
- sponsor: SafeNet Inc.
- target_link: https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2011-45en.pdf
- level: EAL4+
- product: SafeNet eToken (Smartcard or USB token) version 9.1.2 Athena IDProtect/OS755 Java Card on INSIDE Secure AT90SC25672RCT-USB Microcontroller embedding IDSign applet
- sponsor: SafeNet Inc.
- url: https://cyber.gouv.fr/produits-certifies/safenet-etoken-smartcard-or-usb-token-version-912-athena-idprotectos755-java
|
- cert_id: ANSSI-CC-2007/08
- description: Le produit évalué est la carte Usimera Protect, constituée du composant SLE88CFX4000P / m8830 B17 avec sa bibliothèque logicielle PSL v0.50.23, développé par Infineon Technologies AG, et embarquant les applications SIM, USIM et OTA sur plate-forme ouverte Javacard, développées par Gemalto. La référence du logiciel chargé en mémoire « flash » est « T1000230 Usimera Protect 128K crypto on Infineon
- developer: Gemalto
- enhanced:
- augmented: ADV_IMP.2, ALC_DVS.2, AVA_MSU.3, AVA_VLA.4
- category: Cartes à puce
- cc_version: Critères Communs version 2.2
- cert_id: ANSSI-CC-2007/08
- certification_date: 2007-03-30
- developer: Gemalto
- evaluation_facility: Serma Technologies
- level: EAL4+
- mutual_recognition: SOG-IS CCRA
- protection_profile: PP/0305
- report_link: https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi_2007-08en.pdf
- sponsor: Infineon Technologies AG
- target_link: https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi-cible_2007-08en.pdf
- level: EAL4+
- product: Carte Usimera Protect : composant SLE88CFX4000P embarquant les applications SIM, USIM et OTA sur plate-forme ouverte Javacard (version 2.1)
- sponsor: Infineon Technologies AG
- url: https://cyber.gouv.fr/produits-certifies/carte-usimera-protect-composant-sle88cfx4000p-embarquant-les-applications-sim
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
ANSSI-CC-2006/30 |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
ANSSI-CC-2006/30 |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
ANSSI-CC_2011-45en.pdf |
2007_08en.pdf |
pdf_data/report_frontpage |
- FR:
- cc_security_level: EAL 4 augmented AVA_VAN.5
- cc_version: Common Criteria version 3.1 revision 3
- cert_id: ANSSI-CC-2011/45
- cert_item: SafeNet eToken (Smartcard or USB token) version 9.1.2 Athena IDProtect/OS755 Java Card on INSIDE Secure AT90SC25672RCT- USB Microcontroller embedding IDSign applet
- cert_item_version: - Athena IDProtect/OS755 Java Card : release date 0113, release level 2109 - Atmel AT90SC25672RCT-USB Microcontroller : AT58829, révision D - Atmel Toolbox version: 00.03.11.05 - Athena IDSign applet : version 3.0, build 001
- cert_lab: THALES - CEACI (T3S – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France Tél : +33 (0)5 62 88 28 01 ou 18, mél : [email protected]
- developer: Athena Smartcard Solutions Inc. 1-14-16, Motoyokoyama-cho Hachioji-shi, Tokyo, 192-0063, Japan Inside Secure S.A. Maxwell Building - Scottish Enterprise technology Park, East Kilbride, G75 0QR, Scotland, United Kingdom Sponsor SafeNet Inc. 4690 Millenium Drive, Belcamp, MD 21017, USA
- match_rules: ['Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developer\\(s\\)(.+)Evaluation facility(.+)Recognition arrangements']
- ref_protection_profiles: BSI-PP-0005-2002] : SSCD Type 2, version 1.04 [BSI-PP-0006-2002] : SSCD Type 3, version 1.05
|
- FR:
- cc_security_level: EAL 4 augmented ADV_IMP.2, ALC_DVS.2, AVA_MSU.3, AVA_VLA.4
- cc_version: Common Criteria version 2.2
- cert_id: DCSSI-2007/08
- cert_item: Card Usimera Protect: SLE88CFX4000P microcontroller embedding SIM, USIM and OTA applications on Java card open plate-form (version 2.1). Product reference
- cert_item_version: T1000230 Usimera Protect 128K crypto on Infineon Code version: 2.1
- cert_lab: Serma Technologies 30 avenue Gustave Eiffel, 33608 Pessac, France Phone: +33 (0)5 57 26 08 75, email : [email protected]
- developer: Gemalto 6 rue de la verrerie, 92197 Meudon, France Infineon Technologies AG St.-Martin-Straße 76, 81609 München, Allemagne Sponsor Gemalto 6 rue de la verrerie, 92197 Meudon, France
- match_rules: ['Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developer\\(s\\)(.+)Evaluation facility(.+)Recognition arrangements']
- ref_protection_profiles: Java Card System Protection Profile Collection, V1.0b, Configuration Standard 2.2. Reference PP/0305
|
pdf_data/report_keywords/cc_cert_id |
- FR:
- ANSSI-CC-2006_30: 1
- ANSSI-CC-2009_11: 1
- ANSSI-CC-2011/45: 19
- ANSSI-CC-2011_03: 1
- ANSSI-CC-PP-1998_06: 1
|
- DE:
- BSI-DSZ-CC-0269-2006: 6
- BSI-DSZ-CC-0269-2006-MA-02: 1
- FR:
|
pdf_data/report_keywords/cc_protection_profile_id |
- ANSSI:
- BSI:
- BSI-PP- 0005-2002: 1
- BSI-PP- 0006-2002: 2
- BSI-PP-0005-: 1
- BSI-PP-0005-2002: 3
- BSI-PP-0006-: 1
- BSI-PP-0006-2002: 2
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 2
- EAL 4 augmented: 2
- EAL 5: 1
- EAL 7: 1
- EAL4: 3
- EAL5: 1
- EAL5 augmented: 1
- EAL7: 1
- ITSEC:
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 2
- EAL 4 augmented: 2
- EAL 5: 1
- EAL 7: 1
- EAL4: 3
- EAL4+: 1
- EAL5: 1
- EAL5+: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_IMP.2: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
- AVA_MSU.3: 2
- AVA_VAN: 1
- AVA_VAN.5: 3
- AVA_VLA.4: 2
|
- ACM:
- ACM_AUT: 1
- ACM_CAP: 1
- ACM_SCP: 1
- ADO:
- ADV:
- ADV_FSP: 1
- ADV_HLD: 1
- ADV_IMP: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_LLD: 1
- ADV_RCR: 1
- ADV_SPM: 1
- AGD:
- ALC:
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_TAT: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
- AVA_CCA: 1
- AVA_MSU: 1
- AVA_MSU.3: 2
- AVA_SOF: 1
- AVA_VLA: 1
- AVA_VLA.4: 2
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Gemalto:
- Infineon:
- Infineon: 8
- Infineon Technologies AG: 3
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
- AtmelToolbox:
- ATMEL Toolbox 00.03.11.05: 2
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
- ATMEL:
- ATMEL AT90SC25672RCT-USB: 2
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
- BSI:
- AIS 34: 1
- AIS31: 3
- AIS34: 2
- CC:
- CCIMB-2004-01-001: 1
- CCIMB-2004-01-002: 1
- CCIMB-2004-01-003: 1
- CCIMB-2004-01-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20111219112640+01'00'
- /Keywords:
- /ModDate: D:20111219112640+01'00'
- /Producer: Acrobat Distiller 8.1.0 (Windows)
- pdf_file_size_bytes: 141290
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 18
|
- /Author: Mathieu Robert
- /CreationDate: D:20070330160630+02'00'
- /Creator: Acrobat PDFMaker 5.0 pour Word
- /Keywords: CER/F/07.5
- /ModDate: D:20070330160633+03'00'
- /Producer: Acrobat Distiller 5.0 (Windows)
- /Subject: Card Usimera Protect: SLE88CFX4000P microcontroller embedding SIM, USIM and OTA applications on Java card open plate-form ...
- /Title: DCSSI-2007/08
- pdf_file_size_bytes: 273691
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 17
|
pdf_data/st_filename |
ANSSI-CC-cible_2011-45en.pdf |
cible2007_08en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
- AU:
- Certification Report 2006/30: 1
- FR:
- Certification Report 2006/30: 1
|
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-PP-0005-2002: 1
- BSI-PP-0006-2002: 1
- BSI-PP-002-2001: 1
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 4: 1
- EAL 4 augmented: 1
- EAL 4+: 7
- EAL4: 7
- EAL4 augmented: 2
- EAL4+: 1
|
- EAL:
- EAL4: 4
- EAL4 augmented: 3
- EAL4+: 1
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_AUT.1: 1
- ACM_CAP.4: 1
- ACM_SCP.2: 1
- ADO:
- ADO_DEL.2: 2
- ADO_IGS.1: 2
- ADV:
- ADV_ARC.1: 2
- ADV_FSP.2: 2
- ADV_FSP.4: 1
- ADV_HLD.2: 1
- ADV_IMP.1: 3
- ADV_LLD.1: 1
- ADV_RCR.1: 1
- ADV_SPM.1: 1
- ADV_TDS.3: 2
- AGD:
- AGD_ADM.1: 1
- AGD_OPE.1: 2
- AGD_PRE.1: 3
- AGD_USR.1: 1
- ALC:
- ALC_CMC.4: 3
- ALC_CMS.4: 1
- ALC_DEL.1: 2
- ALC_DVS.1: 3
- ALC_LCD.1: 3
- ALC_TAT.1: 2
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 2
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
- AVA_MSU.3: 1
- AVA_SOF.1: 2
- AVA_VAN: 1
- AVA_VAN.5: 10
- AVA_VLA.4: 2
|
- ACM:
- ACM_AUT: 1
- ACM_AUT.1: 9
- ACM_CAP: 1
- ACM_CAP.4: 19
- ACM_SCP: 1
- ACM_SCP.2: 5
- ADO:
- ADO_DEL: 1
- ADO_DEL.2: 8
- ADO_IGS: 1
- ADO_IGS.1: 6
- ADV:
- ADV_FSP: 1
- ADV_FSP.2: 10
- ADV_HLD: 1
- ADV_HLD.2: 14
- ADV_IMP: 1
- ADV_IMP.2: 12
- ADV_LLD: 1
- ADV_LLD.1: 15
- ADV_RCR: 1
- ADV_RCR.1: 5
- ADV_SPM: 1
- ADV_SPM.1: 9
- AGD:
- AGD_ADM: 1
- AGD_ADM.1: 12
- AGD_USR: 1
- AGD_USR.1: 10
- ALC:
- ALC_DVS: 1
- ALC_DVS.2: 11
- ALC_LCD: 1
- ALC_LCD.1: 7
- ALC_TAT: 1
- ALC_TAT.1: 8
- ATE:
- ATE_COV: 1
- ATE_COV.2: 6
- ATE_DPT: 1
- ATE_DPT.1: 5
- ATE_FUN: 1
- ATE_FUN.1: 10
- ATE_IND: 1
- ATE_IND.2: 8
- AVA:
- AVA_MSU: 1
- AVA_MSU.3: 17
- AVA_SOF: 8
- AVA_SOF.1: 7
- AVA_VLA: 1
- AVA_VLA.3: 1
- AVA_VLA.4: 18
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_ACC.1: 1
- FCS_CKM.1: 2
- FCS_CKM.1.1: 2
- FCS_CKM.2: 2
- FCS_CKM.3: 2
- FCS_CKM.4: 3
- FCS_CKM.4.1: 1
- FCS_COP.1: 7
- FDP:
- FDP_ACC.1: 7
- FDP_ACF.1: 21
- FDP_ETC.1: 3
- FDP_ITC.1: 8
- FDP_RIP.1: 1
- FDP_RIP.1.1: 1
- FDP_SDI.1: 1
- FDP_SDI.2: 5
- FDP_UCT.1: 4
- FDP_UIT.1: 11
- FIA:
- FIA_AFL.1: 1
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 1
- FIA_ATD.1.1: 1
- FIA_UAU.1: 1
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 1
- FIA_UID.1: 2
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MOF.1: 3
- FMT_MSA.1: 3
- FMT_MSA.2: 1
- FMT_MSA.2.1: 1
- FMT_MSA.3: 1
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 1
- FMT_MTD.1.1: 1
- FMT_SMF.1: 1
- FMT_SMF.1.1: 1
- FMT_SMR.1: 1
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 1
- FPT_FLS.1.1: 1
- FPT_PHP.1: 1
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 1
- FPT_PHP.3.1: 1
- FPT_TEE.1: 1
- FPT_TEE.1.1: 1
- FPT_TEE.1.2: 1
- FPT_TST.1: 1
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 4
- FTP_ITC.1: 24
- FTP_TRP: 4
- FTP_TRP.1: 8
|
- FAU:
- FCO:
- FCS:
- FCS_CKM: 16
- FCS_CKM.1: 3
- FCS_CKM.2: 3
- FCS_CKM.3: 3
- FCS_CKM.4: 3
- FCS_COP: 19
- FCS_COP.1: 8
- FDP:
- FDP_ACC: 13
- FDP_ACC.1: 2
- FDP_ACC.2: 7
- FDP_ACF: 14
- FDP_ACF.1: 22
- FDP_IFC: 8
- FDP_IFC.1: 2
- FDP_IFC.2: 4
- FDP_IFF: 11
- FDP_IFF.1: 18
- FDP_IFF.2: 7
- FDP_IFF.2.2: 1
- FDP_IFF.2.7: 2
- FDP_ITC: 2
- FDP_ITC.2: 5
- FDP_RIP: 18
- FDP_RIP.1: 8
- FDP_ROL: 2
- FDP_ROL.1: 2
- FDP_SDI: 3
- FDP_SDI.2: 5
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UIT: 2
- FDP_UIT.1: 2
- FIA:
- FIA_ATD: 2
- FIA_ATD.1: 1
- FIA_UID: 13
- FIA_UID.1: 4
- FIA_UID.2: 1
- FIA_USB.1: 2
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA: 49
- FMT_MSA.1: 14
- FMT_MSA.2: 3
- FMT_MSA.3: 14
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 2
- FMT_MTD.1: 1
- FMT_MTD.3: 2
- FMT_MTD.3.1: 1
- FMT_REV: 2
- FMT_REV.1: 2
- FMT_SMF: 3
- FMT_SMF.1: 1
- FMT_SMR: 29
- FMT_SMR.1: 7
- FMT_SMR.1.1: 1
- FPR:
- FPR_UNO: 3
- FPR_UNO.1: 4
- FPR_UNO.1.1: 1
- FPT:
- FPT_AMT: 2
- FPT_AMT.1: 1
- FPT_FLS: 16
- FPT_FLS.1: 6
- FPT_ITT: 6
- FPT_ITT.1: 1
- FPT_ITT.3: 2
- FPT_PHP: 3
- FPT_PHP.3: 1
- FPT_RCV: 10
- FPT_RCV.3: 4
- FPT_RCV.4: 1
- FPT_RVM: 3
- FPT_RVM.1: 3
- FPT_SEP: 3
- FPT_SEP.1: 3
- FPT_TDC.1: 2
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST.1: 2
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FRU:
- FRU_FLT: 3
- FRU_FLT.1: 1
- FRU_RSA: 4
- FRU_RSA.1: 2
- FTP:
|
pdf_data/st_keywords/cc_claims |
- A:
- OE:
- OT:
- OT.CCLI_END: 1
- OT.PATCH_END: 1
- OT.PATCH_SEC: 1
- T:
|
- A:
- A.APPLET: 2
- A.NATIVE: 3
- A.NET-OP_KEY_MGT: 2
- A.VERIFICATION: 2
- D:
- D.API_DATA: 2
- D.APP_CODE: 2
- D.APP_C_DATA: 2
- D.APP_I_DATA: 2
- D.AUTH-APPLI_ATTRIB: 2
- D.AUTH-CRYPTO_ALGO: 3
- D.AUTH-KEY_ATTRIB: 2
- D.AUTH_CODE: 2
- D.CRYPTO: 3
- D.JCS_CODE: 2
- D.JCS_DATA: 2
- D.NET_ACCESS: 2
- D.NET_AUTH_KEY: 3
- D.PIN: 2
- D.SEC_DATA: 2
- O:
- O.APPLET: 23
- O.CODE_PCKG: 8
- O.CODE_PKG: 6
- O.JAVAOBJECT: 39
- O.REMOTE_MTHD: 6
- O.REMOTE_OBJ: 8
- O.REMOTE_OBJECT: 1
- O.RMI_SERVICE: 9
- O.ROR: 10
- OE:
- OE.APPLET: 2
- OE.DEVELOPMENT: 2
- OE.KEY_MANAGEMENT: 2
- OE.NATIVE: 1
- OE.VERIFICATION: 2
- OP:
- OP.ARRAY_ACCESS: 3
- OP.BYTECODE: 1
- OP.CREATE: 5
- OP.DELETE_APPLET: 3
- OP.DELETE_PCKG: 2
- OP.DELETE_PCKG_APPLET: 2
- OP.GET_ROR: 3
- OP.INSTANCE_FIELD: 3
- OP.INVK_INTERFACE: 4
- OP.INVK_VIRTUAL: 3
- OP.INVOKE: 6
- OP.JAVA: 4
- OP.PUT: 3
- OP.RECEIVE: 1
- OP.RET_RORD: 2
- OP.SEND: 1
- OP.THROW: 3
- OP.TYPE_ACCESS: 3
- OSP:
- OSP.NATIVE: 3
- OSP.VERIFICATION: 2
- OT:
- OT.ACCOUNT_NET_ACCESS: 2
- OT.ALARM: 2
- OT.AUTH-ALGO_CONFID: 2
- OT.AUTH-ALGO_EXEC: 2
- OT.AUTH-ALGO_INTEG: 2
- OT.AUTH-KEYS_CONFID: 2
- OT.AUTH-KEYS_INTEG: 2
- OT.CARD-MANAGEMENT: 2
- OT.CIPHER: 3
- OT.DELETION: 2
- OT.FIREWALL: 2
- OT.INSTALL: 2
- OT.KEY-MNGT: 6
- OT.LOAD: 2
- OT.NATIVE: 5
- OT.OBJ-DELETION: 2
- OT.OPERATE: 2
- OT.PIN-MNGT: 3
- OT.REALLOCATION: 2
- OT.REMOTE: 2
- OT.RESOURCES: 2
- OT.SCP: 7
- OT.SHRD_VAR_CONFID: 2
- OT.SHRD_VAR_INTEG: 2
- OT.SID: 2
- OT.TRANSACTION: 3
- R:
- T:
- T.AUTH-ALGO_DISCLOSURE: 2
- T.AUTH-ALGO_EXE: 2
- T.AUTH-ALGO_MODIFICATION: 2
- T.AUTH-DATA_DISCLOSURE: 2
- T.AUTH-DATA_MODIFICATION: 2
- T.CONFID-APPLI-DATA: 2
- T.CONFID-JCS-CODE: 2
- T.CONFID-JCS-DATA: 2
- T.DELETION: 2
- T.EXE-CODE: 4
- T.EXE-CODE-REMOTE: 2
- T.INSTALL: 2
- T.INTEG-APPLI-CODE: 4
- T.INTEG-APPLI-DATA: 4
- T.INTEG-JCS-CODE: 2
- T.INTEG-JCS-DATA: 2
- T.NATIVE: 2
- T.OBJ-DELETION: 2
- T.PHYSICAL: 3
- T.RESOURCES: 2
- T.SID: 4
- T.UNAUTH_NET_ACCESS: 2
|
pdf_data/st_keywords/vendor |
|
- Axalto:
- Gemalto:
- Infineon:
- Infineon: 8
- Infineon Technologies AG: 2
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
- AtmelToolbox:
- Atmel Toolbox 00.03.11.05: 1
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- SCA:
- DPA: 1
- SPA: 1
- timing attacks: 1
|
- FI:
- DFA: 1
- fault injection: 2
- malfunction: 1
- physical tampering: 2
- SCA:
- side channel: 1
- timing attacks: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- FIPS:
- FIPS 140-2: 4
- FIPS PUB 140-2: 1
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816-: 2
- SCP:
|
- CC:
- CCIMB-2004-01-001: 1
- CCIMB-2004-01-002: 1
- CCIMB-2004-01-003: 1
- CCIMB-2004-01-004: 1
- FIPS:
- FIPS 180-2: 2
- FIPS 197: 2
- FIPS 46-3: 2
|
pdf_data/st_keywords/javacard_version |
- GlobalPlatform:
- JavaCard:
|
- GlobalPlatform:
- JavaCard:
- Java Card 2.2: 2
- Java Card 2.2.1: 1
- Java Card 3.4.3: 1
|
pdf_data/st_keywords/javacard_api_const |
- ALG:
- RSA:
- ALG_RSA_NOPAD: 1
- ALG_RSA_PCKS1: 1
- ALG_RSA_SHA_ISO9796: 1
- ALG_RSA_SHA_PKCS1: 1
|
|
pdf_data/st_keywords/javacard_packages |
|
- java:
- javacard:
- javacard.framework: 2
- javacard.framework.service: 1
- javacardx:
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- a manner that any subsequent change of the data is detectable The SafeNet eToken Java applet is out of scope of the TOE. This Java Card applet is used to provide cryptographic and secure storage services to: 1
- out of scope: 1
|
|
pdf_data/st_metadata |
- /CreationDate: D:20110721111406
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20110721111406
- /Producer: Microsoft® Office Word 2007
- pdf_file_size_bytes: 860365
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 36
|
- /Author: Sorin Aurel SPORNIC
- /Category: CC evaluation
- /Company: Axalto
- /CreationDate: D:20070323143339+01'00'
- /Creator: Acrobat PDFMaker 6.0 for Word
- /ModDate: D:20070327163427+03'00'
- /Producer: Acrobat Distiller 6.0.1 (Windows)
- /SourceModified: D:20070323133327
- /Subject: Security Target for Usimera Protect
- /Title: D1019540
- /classification-date: 21/03/2007
- /classification-version: Version 3.6.0
- /security-level: AXLT-Public
- pdf_file_size_bytes: 555904
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 93
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |