name |
IDmove v4 on Infineon in BAC configuration with AA and/or CA in option OS Commercial Version : 0x 09 08 06 ; OS Unique Identifier : 0x DC 71 (ANSSI-CC-2019/55-R01) |
ST33G1M2A1 including optional cryptographic library NesLib and optional library SFM (C04)(ANSSI-CC-2020/24-R01) |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
FR |
FR |
status |
active |
active |
not_valid_after |
18.07.2028 |
27.02.2029 |
not_valid_before |
18.07.2023 |
27.02.2024 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2019_55-R01.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2020_24-R01fr.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2019_55-R01fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2020_24-R01fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2019_55-R01en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2020_24-R01en.pdf |
manufacturer |
Idemia / Infineon Technologies AG |
STMicroelectronics |
manufacturer_web |
|
https://www.st.com/ |
security_level |
ALC_DVS.2, ALC_CMC.5, ALC_TAT.2, ADV_TDS.4, ATE_DPT.3, ADV_INT.2, EAL4+, ADV_FSP.5 |
AVA_VAN.5, ALC_DVS.2, EAL5+ |
dgst |
70ea02713058cd74 |
1d67bb03765a278a |
heuristics/cert_id |
ANSSI-CC-2019/55-R01 |
ANSSI-CC-2020/24-R01 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_CMC.5, ALC_CMS.5, ASE_INT.1, ASE_ECD.1, ATE_FUN.1, ADV_IMP.1, ATE_DPT.3, ASE_TSS.1, AGD_PRE.1, ASE_CCL.1, ALC_DVS.2, AVA_VAN.5, ASE_SPD.1, ASE_OBJ.2, ATE_COV.2, ALC_TAT.2, ASE_REQ.2, ADV_INT.2, ADV_FSP.5, ADV_ARC.1, ALC_FLR.3, ALC_DEL.1, AGD_OPE.1, ALC_LCD.1, ADV_TDS.4, ATE_IND.2 |
ALC_CMS.5, ASE_INT.1, ASE_ECD.1, ATE_FUN.1, ADV_IMP.1, ATE_DPT.3, ASE_TSS.1, AGD_PRE.1, ASE_CCL.1, ALC_DVS.2, AVA_VAN.5, ASE_SPD.1, ASE_OBJ.2, ATE_COV.2, ALC_TAT.2, ASE_REQ.2, ADV_INT.2, ALC_CMC.4, ADV_FSP.5, ADV_ARC.1, ALC_DEL.1, AGD_OPE.1, ALC_LCD.1, ADV_TDS.4, ATE_IND.2 |
heuristics/extracted_versions |
2019, 55, 71, 06, 09, 08 |
24, 2020 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-1110-V5-2022 |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-0945-V3-2018, BSI-DSZ-CC-0945-V2-2018, BSI-DSZ-CC-0945-2017, BSI-DSZ-CC-1110-V2-2019, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-1110-2019, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-1110-V5-2022, BSI-DSZ-CC-1110-V3-2020, BSI-DSZ-CC-0891-V2-2016, BSI-DSZ-CC-1110-V4-2021 |
{} |
heuristics/scheme_data |
- cert_id: ANSSI-CC-2019/55-R01
- description: Le produit évalué est « IDmove v4 on Infineon in BAC configuration with AA and/or CA in option, Commercial Version : 0x 09 08 06 ; OS Unique Identifier : 0x DC 71 » développé par IDEMIA et INFINEON TECHNOLOGIES AG. Il implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisation de l’aviation civile internationale (ICAO). Ce produit est destiné à pe
- developer: IDEMIA et INFINEON TECHNOLOGIES AG
- enhanced:
- expiration_date: 18.07.2028
- level: EAL4+
- product: IDmove v4 on Infineon in BAC configuration with AA and/or CA in option (Commercial Version : 0x 09 08 06 ; OS Unique Identifier : 0x DC 71)
- sponsor: IDEMIA
- url: https://cyber.gouv.fr/produits-certifies/idmove-v4-infineon-bac-configuration-aa-andor-ca-option-commercial-version-0x-0
|
- cert_id: ANSSI-CC-2020/24-R01
- description: Le produit évalué est « ST33G1M2A1 including optional cryptographic library NesLib and optional library SFM, C04 » développé par STMICROELECTRONICS. Le microcontrôleur seul n’est pas un produit utilisable en tant que tel. Il est destiné à héberger une ou plusieurs applications. Il peut être inséré dans un support plastique pour constituer une carte à puce. Les usages possibles de cette carte sont
- developer: STMICROELECTRONICS
- enhanced:
- expiration_date: 27.02.2029
- level: EAL5+
- product: ST33G1M2A1 including optional cryptographic library NesLib and optional library SFM (C04)
- sponsor: STMICROELECTRONICS
- url: https://cyber.gouv.fr/produits-certifies/st33g1m2a1-including-optional-cryptographic-library-neslib-and-optional-library
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
BSI-DSZ-CC-1110-V5-2022 |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
BSI-DSZ-CC-1110-V5-2022 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
Certificat-CC-2019_55-R01.pdf |
Certificat-CC-2020_24-R01fr.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
- ADV:
- ADV_FSP.5: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- ALC:
- ALC_CMS.5: 1
- ALC_DVS.2: 1
- ALC_TAT.2: 1
- ATE:
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20230720131215+02'00'
- /Creator: Acrobat PDFMaker 23 pour Word
- /Keywords:
- /ModDate: D:20230720132022+02'00'
- /Producer: Adobe PDF Library 23.1.175
- pdf_file_size_bytes: 158722
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
- /Author: DUCLOS Charlene
- /Category:
- /Comments: ANSSI-CC-CER-F-14_v14.8
- /Company: SGDSN
- /CreationDate: D:20240229102447+01'00'
- /Creator: Acrobat PDFMaker 23 pour Word
- /Keywords: version x.x, révision x
- /ModDate: D:20240229102448+01'00'
- /Producer: Adobe PDF Library 23.1.175
- /SourceModified: D:20240229092422
- /Title: ANSSI-CC-2020/24-R01
- pdf_file_size_bytes: 144907
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
ANSSI-CC-2019_55-R01fr.pdf |
ANSSI-CC-2020_24-R01fr.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-1110-V5-2022: 2
- FR:
|
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0055-2009: 2
- BSI-PP-0084-2014: 1
|
- BSI:
- BSI-CC-PP-0035-2007: 1
- BSI-PP-0035-2007: 1
- BSI-PP-0084-2014: 1
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL2: 2
- EAL4: 1
- EAL6: 1
- EAL7: 1
- ITSEC:
|
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_FSP.5: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- AGD:
- ALC:
- ALC_CMS.5: 1
- ALC_DVS.2: 1
- ALC_FLR: 1
- ALC_FLR.1: 1
- ALC_TAT.2: 1
- ATE:
- AVA:
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- ICAO:
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename |
ANSSI-cible-CC-2019_55-R01en.pdf |
ANSSI-cible-CC-2020_24-R01en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-1110-V5-2022: 2
|
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0055: 1
- BSI-PP-0002-2001: 1
- BSI-PP-0056: 1
- BSI-PP-0084-2014: 1
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL4: 8
- EAL4 augmented: 2
- EAL4+: 6
- EAL5: 7
- EAL5+: 12
|
- EAL:
- EAL 5: 2
- EAL 5 augmented: 2
- EAL4: 1
- EAL5: 17
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 5
- ADV_FSP.1: 2
- ADV_FSP.2: 2
- ADV_FSP.5: 9
- ADV_IMP.1: 3
- ADV_INT.2: 6
- ADV_TDS.1: 2
- ADV_TDS.3: 2
- ADV_TDS.4: 10
- AGD:
- AGD_OPE: 3
- AGD_OPE.1: 5
- AGD_PRE: 7
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.5: 6
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 15
- ALC_FLR.3: 1
- ALC_LCD.1: 2
- ALC_SCT: 2
- ALC_STM: 2
- ALC_TAT.1: 2
- ALC_TAT.2: 8
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 2
- ASE_INT.1: 3
- ASE_OBJ.2: 3
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 2
- ATE_DPT.1: 1
- ATE_DPT.3: 6
- ATE_FUN.1: 4
- ATE_IND.2: 1
- AVA:
- AVA_VAN: 7
- AVA_VAN.3: 3
- AVA_VAN.5: 6
|
- ADO:
- ADV:
- ADV_ARC: 2
- ADV_ARC.1: 1
- ADV_FSP: 4
- ADV_FSP.5: 3
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.4: 1
- ALC_CMS: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.2: 4
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 3
- ATE_COV.2: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_SAS: 5
- FAU_SAS.1: 12
- FAU_SAS.1.1: 3
- FCS:
- FCS_CKM: 47
- FCS_CKM.1: 23
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 52
- FCS_CKM.4.1: 2
- FCS_COP: 100
- FCS_COP.1: 44
- FCS_RND: 6
- FCS_RND.1: 21
- FCS_RND.1.1: 3
- FDP:
- FDP_ACC: 29
- FDP_ACC.1: 16
- FDP_ACC.1.1: 1
- FDP_ACF: 26
- FDP_ACF.1: 31
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 6
- FDP_ITC: 12
- FDP_ITC.1: 12
- FDP_ITC.2: 4
- FDP_UCT: 26
- FDP_UCT.1: 11
- FDP_UCT.1.1: 1
- FDP_UIT: 27
- FDP_UIT.1: 19
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL: 12
- FIA_AFL.1: 10
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_API: 12
- FIA_API.1: 10
- FIA_API.1.1: 1
- FIA_SOS.2: 1
- FIA_UAU: 46
- FIA_UAU.1: 9
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UAU.4: 11
- FIA_UAU.4.1: 2
- FIA_UAU.5: 15
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 11
- FIA_UAU.6.1: 1
- FIA_UID.1: 10
- FIA_UID.1.1: 2
- FIA_UID.1.2: 2
- FMT:
- FMT_LIM: 6
- FMT_LIM.1: 17
- FMT_LIM.1.1: 3
- FMT_LIM.2: 16
- FMT_LIM.2.1: 3
- FMT_MOF: 10
- FMT_MOF.1: 6
- FMT_MSA.1: 2
- FMT_MSA.3: 7
- FMT_MTD: 81
- FMT_MTD.1: 53
- FMT_SMF.1: 14
- FMT_SMF.1.1: 2
- FMT_SMR.1: 13
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FPT:
- FPT_EMS: 4
- FPT_EMS.1: 18
- FPT_EMS.1.1: 4
- FPT_EMS.1.2: 4
- FPT_FLS.1: 13
- FPT_FLS.1.1: 2
- FPT_PHP.3: 13
- FPT_PHP.3.1: 2
- FPT_TST.1: 8
- FPT_TST.1.1: 2
- FPT_TST.1.2: 2
- FPT_TST.1.3: 2
- FTP:
- FTP_ITC: 11
- FTP_ITC.1: 13
- FTP_TRP.1: 5
|
- FAU:
- FCS:
- FCS_CKM.1: 21
- FCS_CKM.4: 4
- FCS_COP.1: 37
- FCS_RNG: 1
- FCS_RNG.1: 7
- FDP:
- FDP_ACC.1: 27
- FDP_ACC.2: 13
- FDP_ACF.1: 38
- FDP_CKM.2: 1
- FDP_IFC.1: 16
- FDP_ITC.1: 14
- FDP_ITC.2: 2
- FDP_ITT.1: 11
- FDP_SMF.1: 2
- FDP_SMR.1: 1
- FMT:
- FMT_ITC.1: 1
- FMT_LIM: 1
- FMT_LIM.1: 20
- FMT_LIM.2: 19
- FMT_MSA.1: 28
- FMT_MSA.2: 1
- FMT_MSA.3: 38
- FMT_SMF.1: 18
- FMT_SMR.1: 10
- FPT:
- FPT_FLS.1: 12
- FPT_ITT.1: 10
- FPT_PHP.3: 12
- FRU:
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
- Idemia:
- Infineon:
- Infineon: 18
- Infineon Technologies AG: 2
|
- Infineon:
- Philips:
- STMicroelectronics:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
- AES_competition:
- AES:
- AES: 17
- AES-128: 1
- AES-192: 1
- AES-256: 1
- DES:
- constructions:
- MAC:
- CBC-MAC: 2
- CMAC: 4
- HMAC: 4
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-256: 4
- SHA-384: 1
- SHA-512: 1
|
- Keccak:
- SHA:
- SHA1:
- SHA2:
- SHA-2: 4
- SHA-224: 5
- SHA-256: 8
- SHA-384: 7
- SHA-512: 5
- SHA3:
- SHA-3: 6
- SHA3-224: 4
- SHA3-256: 4
- SHA3-384: 4
- SHA3-512: 4
- SHAKE:
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
- Neslib:
- NesLib : 9
- NesLib 281: 1
- NesLib 282: 1
- NesLib 285: 1
- NesLib 289: 1
- NesLib 293: 1
- NesLib 295: 1
- NesLib 296: 1
- NesLib 298: 1
- NesLib 299: 1
- NesLib 6.3: 2
- NesLib 6.3.4: 3
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 7
- Physical Tampering: 6
- Physical tampering: 1
- fault injection: 1
- malfunction: 5
- physical tampering: 2
- SCA:
- DPA: 2
- SPA: 1
- physical probing: 3
- timing attacks: 1
- other:
|
- FI:
- Malfunction: 13
- malfunction: 2
- physical tampering: 1
- SCA:
- Leak-Inherent: 12
- Physical Probing: 4
- Side channel: 1
- physical probing: 3
- side channel: 9
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
- EF:
- EF.COM: 13
- EF.DG1: 24
- EF.DG13: 2
- EF.DG14: 5
- EF.DG15: 3
- EF.DG16: 24
- EF.DG2: 8
- EF.DG3: 7
- EF.DG4: 7
- EF.DG5: 7
- EF.SOD: 11
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- FIPS:
- FIPS 180-2: 1
- FIPS 186-3: 1
- FIPS 197: 1
- FIPS 46-3: 1
- FIPS PUB 197: 1
- ICAO:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 18013: 10
- ISO/IEC 7816-4: 1
- ISO/IEC 9797-1: 1
- PKCS:
- RFC:
- SCP:
|
- BSI:
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 19
- CCMB-2017-04-003: 2
- FIPS:
- FIPS 186-4: 4
- FIPS PUB 140-2: 5
- FIPS PUB 180-2: 5
- FIPS PUB 197: 4
- FIPS PUB 198-1: 2
- FIPS PUB 202: 6
- ISO:
- ISO/IEC 14888: 2
- ISO/IEC 7816-3: 1
- ISO/IEC 9796: 1
- ISO/IEC 9796-2: 3
- NIST:
- NIST SP 800-38A: 3
- NIST SP 800-38B: 1
- NIST SP 800-38C: 1
- NIST SP 800-38D: 1
- NIST SP 800-56A: 3
- NIST SP 800-67: 3
- NIST SP 800-90: 4
- SP 800-38A: 2
- SP 800-38B: 1
- SP 800-38C: 1
- SP 800-38D: 1
- SP 800-67: 1
- SP 800-90A: 1
- PKCS:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- 35 The Security IC Embedded Software (ES) is in User NVM. The ES is not part of the TOE and is out of scope of the evaluation, except NesLib and SFM when they are embedded. 36 The user guidance documentation: 1
- ES) is in User NVM. The ES is not part of the TOE and is out of scope of the evaluation, except NesLib and SFM when they are embedded: 1
- out of scope: 1
|
pdf_data/st_metadata |
- /Author: BOUKYOUD
- /CreationDate: D:20221222152334+01'00'
- /ModDate: D:20221222152334+01'00'
- /Producer: Microsoft: Print To PDF
- /Title: Microsoft Word - FQR 110 9125 Ed6.docx
- pdf_file_size_bytes: 2306805
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 116
|
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |