Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
MicroCloud X4
CCEVS-VR-VID-10740-2017
Plateforme Java Card MultiApp V5.0.A version 5.0.A
ANSSI-CC-2022/10
name MicroCloud X4 Plateforme Java Card MultiApp V5.0.A version 5.0.A
category Data Protection ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme US FR
status archived active
not_valid_after 29.08.2019 08.04.2027
not_valid_before 29.08.2017 08.04.2022
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10740-ci.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2022_10.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10740-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2022_10fr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10740-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2022_10en.pdf
manufacturer Bluechip Systems LLC THALES DIS FRANCE SA
manufacturer_web https://bluechipsys.com https://www.thalesgroup.com/en/europe/france
security_level {} EAL6+, ALC_FLR.1
dgst 7242ac21cba93014 217b91b3b8ce1ef5
heuristics/cert_id CCEVS-VR-VID-10740-2017 ANSSI-CC-2022/10
heuristics/cert_lab US []
heuristics/extracted_sars ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 ASE_INT.1, ALC_DVS.2, ADV_TDS.5, ASE_ECD.1, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ATE_FUN.2, ALC_TAT.3, ADV_FSP.5, AGD_OPE.1, AGD_PRE.1, ATE_DPT.3, ADV_ARC.1, ALC_CMC.5, ADV_IMP.2, ASE_OBJ.2, ASE_REQ.2, ADV_INT.3, ATE_IND.2, ASE_CCL.1, ATE_COV.3, ADV_SPM.1
heuristics/extracted_versions - 5.0
heuristics/report_references/directly_referenced_by {} ANSSI-CC-2022/22, ANSSI-CC-2022/11, ANSSI-CC-2022/52, ANSSI-CC-2022/13, ANSSI-CC-2022/12
heuristics/report_references/directly_referencing {} ANSSI-CC-2021/42, BSI-DSZ-CC-1107-V2-2021
heuristics/report_references/indirectly_referenced_by {} ANSSI-CC-2022/22, ANSSI-CC-2022/12, ANSSI-CC-2022/55, ANSSI-CC-2022/11, ANSSI-CC-2022/54, ANSSI-CC-2022/57, ANSSI-CC-2022/56, ANSSI-CC-2022/52, ANSSI-CC-2022/13
heuristics/report_references/indirectly_referencing {} ANSSI-CC-2021/42, BSI-DSZ-CC-1107-2020, BSI-DSZ-CC-1107-V2-2021
heuristics/scheme_data
  • category: Encrypted Storage
  • certification_date: 29.08.2017
  • evaluation_facility: UL Verification Services Inc. (Formerly InfoGard)
  • expiration_date: 29.08.2019
  • id: CCEVS-VR-VID10740
  • product: MicroCloud X4
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10740
  • vendor: Bluechip Systems LLC
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-1107-V2-2021
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-1107-V2-2021
heuristics/protection_profiles 255bd1d2c2f45133, dc3ab206bf47162b 94167fd161e87d71
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_FDE_AA_V1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_FDE_EE_V1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0099b_pdf.pdf
pdf_data/cert_filename st_vid10740-ci.pdf certificat-anssi-cc-2022_10.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10740-2017: 1
  • FR:
    • ANSSI-CC-2022/10: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
    • EAL6: 1
pdf_data/cert_keywords/eval_facility
  • UL:
    • UL Verification Services: 1
  • CEA-LETI:
    • CEA-LETI: 2
pdf_data/cert_metadata
  • /CreationDate: D:20170831152136-04'00'
  • /ModDate: D:20170831152215-04'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 180322
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: ANSSI
  • /CreationDate: D:20220425145856+02'00'
  • /Creator: Microsoft® Word 2019
  • /Keywords: version 3.1, révision 5
  • /ModDate: D:20220425145856+02'00'
  • /Producer: Microsoft® Word 2019
  • /Title: ANSSI-CC-2022/10
  • pdf_file_size_bytes: 304678
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename st_vid10740-vr.pdf anssi-cc-2022_10fr.pdf
pdf_data/report_frontpage
  • FR:
  • US:
    • cert_id: CCEVS-VR-VID10740-2017
    • cert_item: Bluechip Systems LLC MicroCloud X4
    • cert_lab: US NIAP
  • FR:
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10740-2017: 1
  • DE:
    • BSI-DSZ-CC-1107-V2-2021: 1
  • FR:
    • ANSSI-CC-2021/42: 2
    • ANSSI-CC-2022/10: 19
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0099-V2-2020: 2
    • BSI-PP-0084-2014: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 6: 1
    • EAL2: 2
    • EAL6+: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • AGD:
    • AGD_OPE: 4
    • AGD_PRE: 2
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.1: 1
  • AVA:
    • AVA_VAN: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.PASSWORD_STRENGTH: 1
    • A.PLATFORM_STATE: 1
    • A.POWER_DOWN: 1
    • A.SINGLE_USE_ET: 1
    • A.STRONG_CRYPTO: 1
    • A.SUCURE_STATE: 1
    • A.TRAINED_USER: 1
    • A.TRUSTED_CHANNEL: 1
  • T:
    • T.AUTHORIZATION_GUESSIN: 1
    • T.CHOSEN_PLAINTEXT: 1
    • T.KEYING_MATERIAL_: 1
    • T.KEYSPACE_EXHAUST: 1
    • T.KNOWN_PLAINTEXT: 1
    • T.UNAUTHORIZED_DATA_: 1
    • T.UNAUTHORIZED_UPDATE: 1
pdf_data/report_keywords/vendor
  • Samsung:
    • Samsung: 1
  • Gemalto:
    • Gemalto: 1
  • Infineon:
    • Infineon: 5
    • Infineon Technologies AG: 1
  • Thales:
    • Thales: 19
pdf_data/report_keywords/eval_facility
  • UL:
    • UL Verification Services: 2
  • CEA-LETI:
    • CEA-LETI: 1
  • CESTI:
    • CESTI: 3
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 1
pdf_data/report_keywords/crypto_protocol
  • PACE:
    • PACE: 1
pdf_data/report_keywords/randomness
  • RNG:
    • RBG: 1
pdf_data/report_keywords/cipher_mode
  • XTS:
    • XTS: 1
pdf_data/report_keywords/cplc_data
  • ICFab:
    • IC Fabricator: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
pdf_data/report_keywords/javacard_version
  • JavaCard:
    • Java Card 3.1: 3
pdf_data/report_metadata
  • /CreationDate: D:20170831151348-04'00'
  • /ModDate: D:20170831151348-04'00'
  • pdf_file_size_bytes: 482732
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 13
pdf_data/st_filename st_vid10740-st.pdf anssi-cible-cc-2022_10en.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1107-V2-2021: 1
  • NL:
    • CC-1: 2
    • CC-2: 3
    • CC-3: 4
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0068-V2-2011-MA-01: 1
    • BSI-CC-PP-0084-: 1
    • BSI-CC-PP-0099-V2-2020: 1
    • BSI-PP-0055-: 1
    • BSI-PP-0056-V2-MA-2012: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 6+: 1
    • EAL6: 31
    • EAL6 augmented: 1
    • EAL6+: 3
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 5
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.1: 3
    • ALC_CMS.1: 3
  • ASE:
    • ASE_CCL.1: 7
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND: 3
    • ATE_IND.1: 3
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 2
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 8
    • ADV_FSP.1: 1
    • ADV_FSP.2: 2
    • ADV_FSP.4: 2
    • ADV_FSP.5: 5
    • ADV_IMP.1: 6
    • ADV_IMP.2: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM.1: 8
    • ADV_TDS.1: 2
    • ADV_TDS.3: 3
    • ADV_TDS.4: 7
    • ADV_TDS.5: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 7
    • AGD_PRE: 1
    • AGD_PRE.1: 6
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMC.5: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 2
    • ALC_DVS.1: 1
    • ALC_DVS.2: 3
    • ALC_FLR.1: 5
    • ALC_LCD.1: 4
    • ALC_TAT.1: 2
    • ALC_TAT.2: 3
    • ALC_TAT.3: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 2
    • ATE_COV.3: 1
    • ATE_DPT.1: 1
    • ATE_DPT.3: 2
    • ATE_FUN.1: 6
    • ATE_FUN.2: 1
    • ATE_IND.2: 2
  • AVA:
    • AVA_VAN.5: 2
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_AFA_EXT.1: 5
    • FCS_AFA_EXT.1.1: 1
    • FCS_CKM.1: 9
    • FCS_CKM.1.1: 2
    • FCS_CKM.4: 5
    • FCS_CKM.4.1: 2
    • FCS_CKM_EXT.4: 3
    • FCS_CKM_EXT.4.1: 1
    • FCS_COP: 2
    • FCS_COP.1: 41
    • FCS_COP.1.1: 6
    • FCS_KDF_EXT.1: 2
    • FCS_KYC_EXT.1: 4
    • FCS_KYC_EXT.1.1: 1
    • FCS_KYC_EXT.1.2: 2
    • FCS_KYC_EXT.2: 5
    • FCS_KYC_EXT.2.1: 1
    • FCS_KYC_EXT.2.2: 1
    • FCS_PCC_EXT.1: 9
    • FCS_PCC_EXT.1.1: 1
    • FCS_RBG_EXT.1: 11
    • FCS_RBG_EXT.1.1: 2
    • FCS_RBG_EXT.1.2: 4
    • FCS_SMC_EXT.1: 1
    • FCS_SMV_EXT.1: 3
    • FCS_SMV_EXT.1.1: 1
    • FCS_SMV_EXT.1.2: 1
    • FCS_SNI_EXT.1: 3
    • FCS_SNI_EXT.1.1: 1
    • FCS_SNI_EXT.1.2: 1
    • FCS_SNI_EXT.1.3: 2
    • FCS_VAL_EXT.1: 3
  • FDP:
    • FDP_DSK_EXT.1: 5
    • FDP_DSK_EXT.1.1: 1
    • FDP_DSK_EXT.1.2: 1
  • FIA:
    • FIA_UAU.1: 1
    • FIA_UAU.1.1: 1
  • FMT:
    • FMT_SMF.1: 3
    • FMT_SMF.1.1: 1
  • FPT:
    • FPT_KYP_EXT.1: 3
    • FPT_KYP_EXT.1.1: 4
    • FPT_TST_EXT.1: 4
    • FPT_TST_EXT.1.1: 1
    • FPT_TUD_EXT.1: 3
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
  • FAU:
    • FAU_ARP.1: 15
    • FAU_ARP.1.1: 1
    • FAU_SAA.1: 2
    • FAU_SAS.1: 2
  • FCO:
    • FCO_NRO: 5
    • FCO_NRO.2: 3
  • FCS:
    • FCS_CKM: 60
    • FCS_CKM.1: 29
    • FCS_CKM.1.1: 3
    • FCS_CKM.2: 10
    • FCS_CKM.2.1: 1
    • FCS_CKM.3: 5
    • FCS_CKM.3.1: 1
    • FCS_CKM.4: 28
    • FCS_CKM.4.1: 2
    • FCS_CMK.4: 2
    • FCS_COP: 66
    • FCS_COP.1: 31
    • FCS_COP.1.1: 5
    • FCS_RNG: 25
    • FCS_RNG.1: 14
    • FCS_RNG.1.1: 3
    • FCS_RNG.1.2: 3
  • FDP:
    • FDP_ACC: 54
    • FDP_ACC.1: 23
    • FDP_ACC.2: 6
    • FDP_ACF: 48
    • FDP_ACF.1: 30
    • FDP_IFC: 24
    • FDP_IFC.1: 14
    • FDP_IFC.2: 2
    • FDP_IFF: 16
    • FDP_IFF.1: 14
    • FDP_ITC: 11
    • FDP_ITC.1: 12
    • FDP_ITC.2: 17
    • FDP_ITT.1: 2
    • FDP_RIP: 98
    • FDP_RIP.1: 11
    • FDP_RIP.1.1: 1
    • FDP_ROL: 13
    • FDP_ROL.1: 5
    • FDP_SDC.1: 2
    • FDP_SDI: 8
    • FDP_SDI.2: 4
    • FDP_UCT.1: 2
    • FDP_UIT: 6
    • FDP_UIT.1: 4
  • FIA:
    • FIA_AFL: 23
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_API: 1
    • FIA_API.1: 2
    • FIA_ATD: 16
    • FIA_ATD.1: 4
    • FIA_UAU: 70
    • FIA_UAU.1: 6
    • FIA_UAU.1.1: 3
    • FIA_UAU.1.2: 3
    • FIA_UAU.4: 1
    • FIA_UAU.4.1: 1
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6.1: 1
    • FIA_UID: 54
    • FIA_UID.1: 21
    • FIA_UID.1.1: 3
    • FIA_UID.1.2: 3
    • FIA_UID.2: 1
    • FIA_USB: 6
    • FIA_USB.1: 3
  • FMT:
    • FMT_LIM: 38
    • FMT_LIM.1: 17
    • FMT_LIM.1.1: 3
    • FMT_LIM.2: 16
    • FMT_LIM.2.1: 3
    • FMT_MSA: 113
    • FMT_MSA.1: 15
    • FMT_MSA.2: 2
    • FMT_MSA.3: 24
    • FMT_MTD: 57
    • FMT_MTD.1: 13
    • FMT_MTD.3: 1
    • FMT_SMF: 85
    • FMT_SMF.1: 31
    • FMT_SMF.1.1: 2
    • FMT_SMR: 98
    • FMT_SMR.1: 42
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 2
  • FPR:
    • FPR_UNO: 5
    • FPR_UNO.1: 8
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_EMS: 4
    • FPT_EMS.1: 14
    • FPT_EMS.1.1: 3
    • FPT_EMS.1.2: 3
    • FPT_FLS: 56
    • FPT_FLS.1: 17
    • FPT_FLS.1.1: 2
    • FPT_ITT: 6
    • FPT_ITT.1: 2
    • FPT_PHP: 7
    • FPT_PHP.3: 17
    • FPT_PHP.3.1: 1
    • FPT_RCV: 12
    • FPT_RCV.3: 4
    • FPT_RCV.4: 2
    • FPT_TDC.1: 7
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TST: 9
    • FPT_TST.1: 15
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_TST.2: 2
  • FRU:
    • FRU_FLT.2: 2
  • FTP:
    • FTP_ITC: 17
    • FTP_ITC.1: 7
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP: 10
    • FTP_TRP.1: 10
pdf_data/st_keywords/cc_claims
  • A:
    • A.PASSWORD_STRENGTH: 1
    • A.PLATFORM_STATE: 1
    • A.POWER_DOWN: 1
    • A.SINGLE_USE_ET: 1
    • A.STRONG_CRYPTO: 1
    • A.SUCURE_STATE: 1
    • A.TRAINED_USER: 1
    • A.TRUSTED_CHANNEL: 1
  • OE:
    • OE.INITIAL_DRIVE_STATE: 1
    • OE.PASSPHRASE_STRENGTH: 1
    • OE.PLATFORM_STATE: 1
    • OE.POWER_DOWN: 1
    • OE.SINGLE_USE_ET: 1
    • OE.STRONG_ENVIRONMENT_CRYPTO: 1
    • OE.TRAINED_USERS: 1
    • OE.TRUSTED_CHANNEL: 1
  • T:
    • T.AUTHORIZATION_GUESSIN: 1
    • T.CHOSEN_PLAINTEXT: 1
    • T.KEYING_MATERIAL_: 1
    • T.KEYSPACE_EXHAUST: 1
    • T.KNOWN_PLAINTEXT: 1
    • T.UNAUTHORIZED_DATA_: 1
    • T.UNAUTHORIZED_UPDATE: 1
  • A:
    • A.CAP_FILE: 3
    • A.DELETION: 3
    • A.OS-UPDATE-EVIDENCE: 3
    • A.SECURE_ACODE_MANAGEMENT: 3
    • A.VERIFICATION: 3
  • D:
    • D.AAS_ID: 1
    • D.API_DATA: 3
    • D.APP_CODE: 6
    • D.APP_C_DATA: 3
    • D.APP_I_DATA: 5
    • D.APP_KEYS: 1
    • D.CRYPTO: 5
    • D.JCS_CODE: 6
    • D.JCS_DATA: 8
    • D.OS-: 1
    • D.OS-UPDATE-CODE-ID: 3
    • D.OS-UPDATE_ADDITIONALCODE: 5
    • D.OS-UPDATE_DEC-KEY: 2
    • D.OS-UPDATE_SGNVER-KEY: 2
    • D.PIN: 4
    • D.SEC_DATA: 7
  • O:
    • O.AES: 1
    • O.ALARM: 15
    • O.APPLET: 28
    • O.ARRAY_VIEWS_CONFID: 7
    • O.ARRAY_VIEWS_INTEG: 3
    • O.CARD-MANAGEMENT: 5
    • O.CARD_MANAGEMENT: 18
    • O.CIPHER: 10
    • O.CODE_CAP_FILE: 23
    • O.CONFID-OS-UPDATE: 4
    • O.DELETION: 4
    • O.FIREWALL: 12
    • O.GLOBAL_ARRAYS_CONFID: 9
    • O.GLOBAL_ARRAYS_INTEG: 5
    • O.INSTALL: 8
    • O.JAVAOBJECT: 68
    • O.KEY-MNGT: 6
    • O.LOAD: 11
    • O.NATIVE: 12
    • O.OBJ-DELETION: 4
    • O.OBJ_DELETION: 4
    • O.OPERATE: 15
    • O.PIN-MNGT: 6
    • O.PIN_MNGT: 4
    • O.REALLOCATION: 5
    • O.RESOURCES: 9
    • O.RND: 2
    • O.RNG: 11
    • O.SCP: 37
    • O.SECURE_AC_ACTIVATION: 10
    • O.SECURE_LOAD_ACODE: 14
    • O.SID: 13
    • O.TDES: 1
    • O.TOE_IDENTIFICATION: 7
    • O.TRANSACTION: 6
  • OE:
    • OE.CAP_FILE: 5
    • OE.CARD-: 1
    • OE.CARD-MANAGEMENT: 2
    • OE.CODE-: 1
    • OE.CODE-EVIDENCE: 10
    • OE.NATIVE: 1
    • OE.OS-UPDATE-ENCRYPTION: 5
    • OE.OS-UPDATE-EVIDENCE: 2
    • OE.SCP: 8
    • OE.SECURE_ACODE_MANAGEMENT: 2
    • OE.VERIFICATION: 25
  • OP:
    • OP.ARRAY_AASTORE: 3
    • OP.ARRAY_ACCESS: 7
    • OP.ARRAY_LENGTH: 3
    • OP.ARRAY_T_ALOAD: 3
    • OP.ARRAY_T_ASTORE: 3
    • OP.CREATE: 11
    • OP.DELETE_APPLET: 6
    • OP.DELETE_CAP_FILE: 4
    • OP.DELETE_CAP_FILE_APPLET: 4
    • OP.INSTANCE_FIELD: 6
    • OP.INVK_INTERFACE: 10
    • OP.INVK_VIRTUAL: 8
    • OP.JAVA: 8
    • OP.PUT: 8
    • OP.PUTFIELD: 1
    • OP.PUTSTATIC: 1
    • OP.THROW: 7
    • OP.TYPE_ACCESS: 7
  • OSP:
    • OSP.ADDITIONAL_CODE_ENCRYPTION: 3
    • OSP.ADDITIONAL_CODE_SIGNING: 3
    • OSP.ATOMIC_ACTIVATION: 6
    • OSP.RNG: 3
    • OSP.TOE_IDENTIFICATION: 6
    • OSP.VERIFICATION: 3
  • OT:
    • OT.X: 1
  • R:
    • R.JAVA: 12
  • T:
    • T.CONFID-APPLI-DATA: 3
    • T.CONFID-JCS-CODE: 3
    • T.CONFID-JCS-DATA: 3
    • T.CONFID-OS-UPDATE_LOAD: 3
    • T.CONFID_INTEG_SERVICE_DEPLOYEMENT: 3
    • T.DELETION: 3
    • T.EXE-CODE: 6
    • T.FAKE-SGNVER-KEY: 3
    • T.INSTALL: 3
    • T.INTEG-APPLI-CODE: 6
    • T.INTEG-APPLI-DATA: 6
    • T.INTEG-JCS-CODE: 3
    • T.INTEG-JCS-DATA: 3
    • T.INTEG-OS-UPDATE_LOAD: 3
    • T.NATIVE: 3
    • T.OBJ-DELETION: 3
    • T.PHYSICAL: 3
    • T.RESOURCES: 3
    • T.SID: 6
    • T.UNAUTHORIZED_TOE_CODE_UPDATE: 3
    • T.WRONG-UPDATE-STATE: 3
    • T.WRONG_SERVICE_DEPLOYEMENT_STATE: 3
pdf_data/st_keywords/vendor
  • Samsung:
    • Samsung: 1
  • Gemalto:
    • Gemalto: 3
  • Infineon:
    • Infineon: 16
  • Thales:
    • Thales: 46
pdf_data/st_keywords/eval_facility
  • UL:
    • UL Verification Services: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 30
      • AES-: 1
      • AES-128: 4
      • AES-256: 4
  • constructions:
    • MAC:
      • HMAC: 7
      • HMAC-SHA-256: 4
      • HMAC-SHA-512: 1
  • AES_competition:
    • AES:
      • AES: 29
      • AES-256: 2
  • DES:
    • 3DES:
      • 3DES: 2
      • TDEA: 1
      • TDES: 14
      • Triple-DES: 3
    • DES:
      • DES: 20
  • constructions:
    • MAC:
      • CMAC: 3
      • HMAC: 3
      • KMAC: 3
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
    • ECDSA:
      • ECDSA: 18
  • ECC:
    • ECC:
      • ECC: 13
    • ECDH:
      • ECDH: 8
    • ECDSA:
      • ECDSA: 4
  • FF:
    • DH:
      • DH: 14
      • Diffie-Hellman: 5
pdf_data/st_keywords/hash_function
  • PBKDF:
    • PBKDF: 1
  • SHA:
    • SHA2:
      • SHA-224: 1
      • SHA-256: 14
      • SHA-384: 1
      • SHA-512: 3
  • SHA:
    • SHA1:
      • SHA-1: 4
      • SHA1: 2
    • SHA2:
      • SHA-224: 2
      • SHA-256: 2
      • SHA-384: 1
      • SHA-512: 2
      • SHA2: 1
      • SHA224: 1
    • SHA3:
      • SHA3: 2
      • SHA3-384: 1
      • SHA3-512: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 4
  • KA:
    • Key Agreement: 6
    • Key agreement: 2
  • MAC:
    • MAC: 14
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 165
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 15
  • RNG:
    • RBG: 15
    • RNG: 11
  • PRNG:
    • PRNG: 1
  • RNG:
    • RND: 2
    • RNG: 44
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 4
  • CCM:
    • CCM: 1
  • GCM:
    • GCM: 3
  • XEX:
    • XEX: 1
  • XTS:
    • XTS: 13
  • CBC:
    • CBC: 3
  • ECB:
    • ECB: 1
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 24
    • P-384: 10
    • P-521: 2
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 5
    • Physical Tampering: 3
    • fault induction: 2
    • malfunction: 8
    • physical tampering: 1
  • SCA:
    • DPA: 2
    • Leak-Inherent: 2
    • SPA: 1
    • physical probing: 6
    • timing attacks: 1
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 2
pdf_data/st_keywords/cplc_data
  • ICFab:
    • IC Fabricator: 1
  • ICType:
    • IC Type: 1
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.DG1: 6
    • EF.DG16: 6
    • EF.DG3: 1
    • EF.DG4: 1
    • EF.SOD: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • FIPS:
    • FIPS 186-4: 1
    • FIPS PUB 186-4: 1
  • ISO:
    • ISO/IEC 10118: 2
    • ISO/IEC 14888-3: 1
    • ISO/IEC 18031:2011: 4
    • ISO/IEC 18033-3: 1
    • ISO/IEC 19772: 2
    • ISO/IEC18033-3: 1
  • NIST:
    • NIST SP 800-132: 2
    • NIST SP 800-38F: 1
    • NIST SP 800-90: 4
    • NIST SP 800-90A: 1
    • SP 800-132: 1
    • SP 800-90A: 1
  • BSI:
    • AIS20: 1
    • AIS31: 6
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS 197: 1
    • FIPS180-2: 1
    • FIPS197: 5
  • ICAO:
    • ICAO: 1
  • NIST:
    • SP 800-67: 1
  • PKCS:
    • PKCS#1: 7
    • PKCS#5: 5
  • SCP:
    • SCP01: 4
    • SCP02: 4
    • SCP03: 9
pdf_data/st_keywords/javacard_version
  • JavaCard:
    • Java Card 3.1: 8
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 7
pdf_data/st_keywords/javacard_packages
  • java:
    • java.lang: 1
  • javacard:
    • javacard.framework: 3
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • 1, are out of the scope of the SPM as they are linked to the applet loading or deletion that is out of scope of the SPM boundaries limited to VM opcodes MultiApp V5.0.A JCS platform Security Target ST Ref: 1
    • Context, the Selected Applet Context, and the Active Applets Note: the Selected Applet context is out of scope of the VM functionalities. It is a process that occurs prior to VM start MultiApp V5.0.A JCS: 1
    • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
    • out of scope: 4
    • the scope because done before the JCVM entering (selection of the applet) Note: The Array View is out of scope of this modelisation ADV_SPM.1.2D For each policy covered by the formal security policy model, the: 1
pdf_data/st_metadata
  • /Author:
  • /CreationDate: D:20170831081721-07'00'
  • /Creator: PDFCreator 2.1.2.0
  • /Keywords:
  • /ModDate: D:20170831151027-04'00'
  • /Producer: PDFCreator 2.1.2.0
  • /Subject:
  • /Title: MicroCloud X4 Security Target v1.0
  • pdf_file_size_bytes: 475366
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 57
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/convert_garbage False True
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different