name |
IAS ECC V2 en configuration #4 en composition sur la plateforme ouverte ID-One Cosmo v8.1-N – Large R2 masquée sur le composant NXP P6022M VB |
Plate-forme STSafe-J, en configuration fermée, version 1.1.4, sur le composant ST31H320 A03 |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
FR |
FR |
status |
active |
archived |
not_valid_after |
09.06.2026 |
23.03.2022 |
not_valid_before |
04.05.2018 |
23.03.2017 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat_ANSSI-CC-2018_18-S02fr.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2018_18fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2017_10fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2018_18en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI_cible2017_10en.pdf.pdf |
manufacturer |
Idemia |
ST INCARD S.r.I |
manufacturer_web |
https://www.idemia.com |
https://www.incard.it/ |
security_level |
AVA_VAN.5, ALC_DVS.2, EAL5+ |
AVA_VAN.5, ALC_DVS.2, EAL5+ |
dgst |
7e9be68c611b7c5f |
ea24eb45efa02e52 |
heuristics/cert_id |
ANSSI-CC-2018/18 |
ANSSI-CC-2017/10 |
heuristics/cert_lab |
CEA |
SERMA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_ARC.1, ALC_DVS.2, AGD_OPE.1, ADV_TDS.3, ATE_DPT.1, AVA_VAN.5 |
ALC_CMS.5, ASE_INT.1, ATE_FUN.1, ADV_IMP.1, ATE_DPT.3, ALC_FLR.1, ASE_TSS.1, AGD_PRE.1, ASE_CCL.1, ALC_DVS.2, ATE_IND.2, AVA_VAN.5, ASE_SPD.1, ASE_OBJ.2, ATE_COV.2, ALC_TAT.2, ASE_REQ.2, ADV_INT.2, ALC_CMC.4, ADV_FSP.5, ADV_ARC.1, ALC_DEL.1, AGD_OPE.1, ALC_LCD.1, ADV_TDS.4, ASE_ECD.1 |
heuristics/extracted_versions |
8.1 |
1.1.4 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2017/23 |
heuristics/report_references/directly_referencing |
ANSSI-CC-2017/49 |
ANSSI-CC-2015/59 |
heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2017/23, BSI-DSZ-CC-1037-2018 |
heuristics/report_references/indirectly_referencing |
ANSSI-CC-2017/49, BSI-DSZ-CC-0973-V2-2016, BSI-DSZ-CC-0973-2016 |
ANSSI-CC-2015/59 |
heuristics/scheme_data |
- cert_id: ANSSI-CC-2018/18
- description: Le produit certifié est « IAS ECC V2 en configuration #4 en composition sur la plateforme ouverte ID-One Cosmo v8.1-N - Large R2 masquée sur le composant NXP P6022M VB, Identification E0 02 02 0A » développé par IDEMIA et NXP SEMICONDUCTORS GMBH. Ce produit est une carte à puce constituée d’un logiciel conforme au standard IAS ECC v2, et d’un microcontrôleur sécurisés. Il est destiné à être uti
- developer: Idemia, NXP Semiconductors GmbH
- enhanced:
- expiration_date: 09.06.2026
- level: EAL5+
- product: IAS ECC V2 en configuration #4 en composition sur la plateforme ouverte ID-One Cosmo v8.1-N - Large R2 masquée sur le composant NXP P6022M VB
- sponsor: Idemia
- url: https://cyber.gouv.fr/produits-certifies/ias-ecc-v2-en-configuration-4-en-composition-sur-la-plateforme-ouverte-id-one
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
ANSSI-CC-2017/49 |
ANSSI-CC-2015/59 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
ANSSI-CC-2017/49, BSI-DSZ-CC-0955-V2-2016 |
ANSSI-CC-2015/59 |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
certificat_ANSSI-CC-2018_18-S02fr.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0059-2009-MA-01: 1
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20210611115918+02'00'
- /ModDate: D:20210611115918+02'00'
- pdf_file_size_bytes: 582321
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
|
pdf_data/report_filename |
ANSSI-CC-2018_18fr.pdf |
ANSSI-CC-2017_10fr.pdf |
pdf_data/report_frontpage |
- FR:
- cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 4
- cert_id: ANSSI-CC-2018/18
- cert_item: IAS ECC V2 en configuration #4 en composition sur la plateforme ouverte ID-One Cosmo v8.1-N - Large R2 masquée sur le composant NXP P6022M VB
- cert_item_version: Identification E0 02 02 0A
- cert_lab: CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France
- developer: Idemia 420 rue d’Estienne D’Orves 92700 Colombes, France NXP Semiconductors GmbH Stresemannallee 101 22539 Hamburg, Allemagne Commanditaire Idemia 420 rue d’Estienne D’Orves, 92700 Colombes, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: Protection profiles for secure signature creation device [PP-SSCD-Part2] Device with key generation, v2.0.1, BSI-CC-PP-0059-2009-MA-01 ; [PP-SSCD-Part3] Device with key import, v1.0.2, BSI-CC-PP-0075-2012 ; [PP-SSCD-Part4] Extension for device with key generation and trusted communication with certificate generation application, v1.0.1, BSI-CC-PP-0071-2012
|
- FR:
- cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 4
- cert_id: ANSSI-CC-2017/10
- cert_item: Plate-forme STSafe-J, en configuration fermée, version 1.1.4, sur le composant ST31H320 A03
- cert_item_version: Version 1.1.4
- cert_lab: Serma Safety & Security 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
- developer: STMicroelectronics S.r.l. Incard Division Z.I Marcianise Sud, 81025 Marcianise, Italie STMicroelectronics 29 Boulevard Romain Rolland, 75669 Paris Cedex 14, France Commanditaire STMicroelectronics S.r.l. Incard Division Z.I Marcianise Sud, 81025 Marcianise, Italie
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: Java Card Protection profile – Closed Configuration Version 3.0, ANSSI-CC-PP-2010/07-M01
|
pdf_data/report_keywords/cc_cert_id |
- FR:
- ANSSI-CC-2017/49: 1
- ANSSI-CC-2018/18: 17
|
- FR:
- ANSSI-CC-2015/59: 2
- ANSSI-CC-2015/59-M01: 2
- ANSSI-CC-2015/59-S01: 2
- ANSSI-CC-2017/10: 17
- ANSSI-CC-PP-2010/07-M01: 2
|
pdf_data/report_keywords/cc_protection_profile_id |
- ANSSI:
- BSI:
- BSI-CC-PP- 0059-2009-MA-01: 1
- BSI-CC-PP- 0071-2012: 1
- BSI-CC-PP- 0075-2012: 1
- BSI-CC-PP-0059-2009-MA-01: 1
- BSI-CC-PP-0071-2012: 1
- BSI-CC-PP-0075-2012: 1
- other:
- PP-SSCD-: 3
- PP-SSCD-Part2: 2
- PP-SSCD-Part3: 2
- PP-SSCD-Part4: 1
|
- ANSSI:
- ANSSI-CC-PP-: 1
- ANSSI-CC-PP-2010/07-M01: 2
- BSI:
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 1
- EAL2: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 1
- EAL2: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_TDS: 1
- ADV_TDS.5: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_FLR: 2
- ALC_FLR.1: 1
- ALC_TAT: 1
- ALC_TAT.3: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_FUN.2: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
- Idemia:
- NXP:
- NXP: 27
- NXP Semiconductors: 1
|
|
pdf_data/report_keywords/eval_facility |
|
- Serma:
- Serma Safety & Security: 3
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: cdu
- /CreationDate: D:20180514092540+02'00'
- /Creator: Microsoft® Word 2010
- /Keywords: ANSSI-CC-CER-F-07.026
- /ModDate: D:20180514092540+02'00'
- /Producer: Microsoft® Word 2010
- /Subject: IAS ECC V2 en configuration #4 en composition sur la plateforme ouverte ID-One Cosmo v8.1-N - Large R2 masquée sur le composant NXP P6022M VB
- /Title: ANSSI-CC-2018/18
- pdf_file_size_bytes: 615809
- pdf_hyperlinks: mailto:[email protected], http://www.ssi.gouv.fr/
- pdf_is_encrypted: False
- pdf_number_of_pages: 16
|
- /Author:
- /CreationDate:
- /Creator: PDFCreator Version 1.2.1
- /Keywords:
- /ModDate:
- /Producer: GPL Ghostscript 9.02
- /Subject:
- /Title: ANSSI-CC-2017_10fr
- pdf_file_size_bytes: 760577
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 16
|
pdf_data/st_filename |
anssi-cible-cc-2018_18en.pdf |
ANSSI_cible2017_10en.pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
- FR:
- ANSSI-CC-2017/49: 1
- ANSSI-CC-2017/49-M01: 1
|
- FR:
- ANSSI-CC-2015/59: 1
- ANSSI-CC-2015/59-M01: 1
- ANSSI-CC-2015/59-S01: 1
- ANSSI-CC-PP-2010/07-M01: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0059-2009-MA-01: 1
- BSI-CC-PP-0071: 1
- BSI-CC-PP-0075: 1
- BSI-CC-PP-0084-2014: 1
|
- ANSSI:
- ANSSI-CC-PP-2010/07-M01: 1
- BSI:
- BSI-CC-PP-0055: 2
- BSI-CC-PP-0084-2014: 1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 5: 2
- EAL 5 augmented: 1
- EAL4: 1
- EAL4 augmented: 1
- EAL5: 6
- EAL5 augmented: 2
|
- EAL:
- EAL4+: 1
- EAL5: 12
- EAL5 augmented: 2
- EAL5+: 3
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 2
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_TDS: 1
- ADV_TDS.3: 2
- AGD:
- AGD_OPE: 27
- AGD_OPE.1: 2
- AGD_PRE: 25
- AGD_PRE_PLT: 3
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 2
- ALC_DVS.2: 7
- ALC_LCD: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_DPT.1: 2
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 7
- ADV_FSP.1: 4
- ADV_FSP.2: 2
- ADV_FSP.4: 1
- ADV_FSP.5: 9
- ADV_IMP.1: 10
- ADV_INT.2: 2
- ADV_TDS.1: 2
- ADV_TDS.3: 4
- ADV_TDS.4: 9
- AGD:
- AGD_OPE.1: 7
- AGD_PRE.1: 7
- ALC:
- ALC_CMC.4: 2
- ALC_CMS.1: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 2
- ALC_DVS.1: 3
- ALC_DVS.2: 9
- ALC_LCD.1: 4
- ALC_TAT.1: 2
- ALC_TAT.2: 4
- ASE:
- ASE_CCL: 2
- ASE_CCL.1: 2
- ASE_ECD: 2
- ASE_ECD.1: 5
- ASE_INT.1: 6
- ASE_OBJ: 2
- ASE_OBJ.2: 4
- ASE_REQ: 2
- ASE_REQ.1: 2
- ASE_REQ.2: 3
- ASE_SPD: 2
- ASE_SPD.1: 3
- ASE_TSS: 2
- ASE_TSS.1: 2
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 4
- ATE_DPT.1: 1
- ATE_DPT.3: 2
- ATE_FUN.1: 7
- ATE_IND.2: 1
- AVA:
- AVA_VAN.4: 1
- AVA_VAN.5: 9
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_CKM: 37
- FCS_CKM.1: 41
- FCS_CKM.2: 8
- FCS_CKM.3: 9
- FCS_CKM.4: 60
- FCS_CKM.4.1: 1
- FCS_COP: 112
- FCS_COP.1: 38
- FCS_COP.1.1: 3
- FCS_RNG: 4
- FCS_RNG.1: 22
- FCS_RNG.1.1: 3
- FCS_RNG.1.2: 3
- FDP:
- FDP_ACC: 85
- FDP_ACC.1: 49
- FDP_ACF: 59
- FDP_ACF.1: 42
- FDP_CKM: 4
- FDP_CKM.1: 1
- FDP_DAU: 6
- FDP_DAU.1: 1
- FDP_DAU.2: 2
- FDP_ETC: 12
- FDP_ETC.1: 4
- FDP_IFC.1: 28
- FDP_ITC: 23
- FDP_ITC.1: 43
- FDP_ITC.2: 35
- FDP_RIP: 11
- FDP_RIP.1: 10
- FDP_RIP.1.1: 3
- FDP_ROL: 1
- FDP_SDI: 15
- FDP_SDI.1: 2
- FDP_SDI.2: 6
- FDP_UCT: 13
- FDP_UCT.1: 2
- FDP_UIT: 6
- FDP_UIT.1: 2
- FIA:
- FIA_AFL: 24
- FIA_AFL.1: 3
- FIA_AFL.1.1: 1
- FIA_API: 5
- FIA_API.1: 9
- FIA_API.1.1: 1
- FIA_UAU.1: 17
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID.1: 19
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MOF.1: 7
- FMT_MOF.1.1: 1
- FMT_MSA: 35
- FMT_MSA.1: 8
- FMT_MSA.2: 11
- FMT_MSA.2.1: 1
- FMT_MSA.3: 36
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MSA.4: 8
- FMT_MSA.4.1: 1
- FMT_MTD: 44
- FMT_MTD.1: 7
- FMT_SMF: 2
- FMT_SMF.1: 50
- FMT_SMF.1.1: 1
- FMT_SMR.1: 48
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPT:
- FPT_EMS: 7
- FPT_EMS.1: 9
- FPT_EMS.1.1: 4
- FPT_EMS.1.2: 2
- FPT_FLS: 5
- FPT_FLS.1: 10
- FPT_FLS.1.1: 1
- FPT_PHP: 2
- FPT_PHP.1: 5
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 7
- FPT_PHP.3.1: 1
- FPT_RCV: 2
- FPT_TST: 1
- FPT_TST.1: 13
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 28
- FTP_ITC.1: 14
- FTP_TRP.1: 6
|
- FAU:
- FAU_ARP: 5
- FAU_ARP.1: 3
- FAU_SAA.1: 2
- FAU_SAS.1: 1
- FCS:
- FCS_CKM: 3
- FCS_CKM.1: 4
- FCS_CKM.2: 2
- FCS_CKM.3: 2
- FCS_CKM.4: 2
- FCS_COP: 12
- FCS_COP.1: 4
- FCS_RNG: 6
- FCS_RNG.1: 6
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FDP:
- FDP_ACC: 10
- FDP_ACF: 9
- FDP_ACF.1: 3
- FDP_IFC: 3
- FDP_IFC.1: 7
- FDP_IFF: 3
- FDP_IFF.1: 5
- FDP_ITC: 1
- FDP_ITT.1: 4
- FDP_RIP: 31
- FDP_RIP.1: 3
- FDP_ROL: 10
- FDP_ROL.1: 3
- FDP_SDC: 4
- FDP_SDC.1: 8
- FDP_SDC.1.1: 1
- FDP_SDI: 3
- FDP_SDI.2: 2
- FIA:
- FIA_ATD: 2
- FIA_UID: 3
- FIA_USB: 2
- FMT:
- FMT_LIM: 14
- FMT_LIM.1: 10
- FMT_LIM.1.1: 1
- FMT_LIM.2: 10
- FMT_LIM.2.1: 1
- FMT_MSA: 20
- FMT_MSA.1: 1
- FMT_MSA.2: 2
- FMT_MSA.3: 3
- FMT_MTD: 6
- FMT_SMF: 2
- FMT_SMF.1: 6
- FMT_SMR: 2
- FMT_SMR.1: 3
- FPR:
- FPT:
- FPT_FLS: 9
- FPT_FLS.1: 6
- FPT_ITT.1: 2
- FPT_PHP.3: 2
- FPT_TDC.1: 1
- FPT_TST.1: 2
- FRU:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.APPLET: 1
- A.CGA: 4
- A.CSP: 4
- A.PLT: 2
- A.SCA: 3
- A.VERIFICATION: 1
- OE:
- OE.APPLET: 1
- OE.CODE-EVIDENCE: 1
- OE.CODE_EVIDENCE: 2
- OE.HID_VAD: 4
- OE.PLT: 2
- OE.VERIFICATION: 4
- OSP:
- OSP.PLT: 2
- OSP.VERIFICATION: 1
- T:
- T.CONFID_APPLI_DATA: 3
- T.INTEG_APPLI_DATA: 8
- T.OBJ_DELETION: 3
- T.PHYSICAL: 3
- T.RESSOURCES: 3
|
- A:
- A.NO-DELETION: 5
- A.NO-INSTALL: 5
- A.VERIFICATION: 4
- A.XXX: 1
- D:
- D.API_DATA: 3
- D.APP_CODE: 6
- D.APP_C_DATA: 3
- D.APP_I_DATA: 4
- D.CRYPTO: 6
- D.EMBEDDED_SW_CODE: 4
- D.EMBEDDED_SW_DATA: 4
- D.GP_CODE: 3
- D.GP_SENSITIVE_DATA: 3
- D.JCS_CODE: 4
- D.JCS_DATA: 6
- D.PIN: 9
- D.SEC_DATA: 5
- O:
- O.ALARM: 21
- O.APPLET: 1
- O.CIPHER: 45
- O.FIREWALL: 26
- O.GLOBAL_ARRAYS_CONFID: 10
- O.GLOBAL_ARRAYS_INTEG: 8
- O.GP_REGISTRY: 10
- O.JAVA: 3
- O.JAVAOB: 2
- O.JAVAOBJECT: 20
- O.KEY-MNGT: 11
- O.LIFE_CYCLE: 13
- O.NATIVE: 12
- O.OBJ-DELETION: 8
- O.OPERATE: 33
- O.PIN-MNGT: 16
- O.PIN_MNGT: 1
- O.REALLOCATION: 13
- O.RESOURCES: 9
- O.RND: 1
- O.ROLES: 6
- O.SCP: 70
- O.SID: 25
- O.SIDE_CHANNEL: 10
- O.TRANSACTION: 11
- OE:
- OE.CARD-MANAGEMENT: 12
- OE.CARD_MANAGEMENT: 17
- OE.CODE-: 1
- OE.CODE-EVIDENCE: 17
- OE.MANAGEMENT_OF_SECRETS: 3
- OE.NO-DELETION: 6
- OE.NO-INSTALL: 5
- OE.SCP: 3
- OE.VERIFICATION: 33
- OP:
- OP.ARRAY_ACCESS: 4
- OP.CARD_LOCK: 4
- OP.CARD_TERMINATE: 4
- OP.CREATE: 7
- OP.GET_CARD_LIFE_CYCLE_: 1
- OP.GET_CARD_LIFE_CYCLE_STATE: 2
- OP.INSTANCE_FIELD: 4
- OP.INVK_INTERFACE: 7
- OP.INVK_VIRTUAL: 6
- OP.JAVA: 5
- OP.MANAGE_APP_LIFE_CYC: 1
- OP.MANAGE_APP_LIFE_CYCLE_STATE: 3
- OP.PUT: 6
- OP.THROW: 5
- OP.TYPE_ACCESS: 5
- OSP:
- OSP.CARD_ADMINISTRATION_DISABLED: 5
- OSP.MANAGEMENT_OF_SECRETS: 6
- OSP.ROLES: 5
- OSP.VERIFICATION: 5
- R:
- T:
- T.CONFID-APPLI-DATA: 17
- T.CONFID-JCS-CODE: 6
- T.CONFID-JCS-DATA: 11
- T.EXE-CODE: 9
- T.INTEG-: 1
- T.INTEG-APPLI-CODE: 12
- T.INTEG-APPLI-DATA: 23
- T.INTEG-JCS-CODE: 7
- T.INTEG-JCS-DATA: 11
- T.LEAKAGE: 1
- T.LIFE_CYCLE: 7
- T.NATIVE: 4
- T.OBJ-DELETION: 4
- T.PHYSICAL: 9
- T.RESOURCES: 7
- T.SID: 16
|
pdf_data/st_keywords/vendor |
- Idemia:
- Morpho:
- NXP:
- Oberthur:
- Oberthur: 1
- Oberthur Technologies: 2
|
- STMicroelectronics:
- STM: 13
- STMicroelectronics: 6
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
- AES_competition:
- DES:
- 3DES:
- 3-DES: 2
- Triple-DES: 1
- TripleDES: 1
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-256: 5
- SHA-384: 2
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-256: 2
- SHA-512: 2
- SHA224: 2
- SHA256: 2
- SHA384: 3
- SHA512: 2
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- DFA: 2
- fault injection: 2
- physical tampering: 5
- SCA:
- DPA: 1
- SPA: 1
- side channel: 1
- timing attacks: 1
- other:
|
- FI:
- Malfunction: 1
- malfunction: 2
- physical tampering: 1
- SCA:
- DPA: 3
- Leak-Inherent: 1
- SPA: 1
- physical probing: 4
- side channel: 1
- timing attacks: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 180-3: 1
- FIPS PUB 180-3: 1
- FIPS180-3: 1
- ISO:
- PKCS:
- PKCS #1: 1
- PKCS#1: 3
- PKCS#15: 2
- PKCS#3: 3
- SCP:
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- FIPS:
- PKCS:
- SCP:
|
pdf_data/st_keywords/javacard_version |
|
- GlobalPlatform:
- JavaCard:
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
- java:
- javacard:
- javacard.framework: 4
- javacard.framework.applet: 1
- javacard.security: 23
- javacard.security.interface: 4
- javacardx:
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
- application being loaded pre-issuance is out of scope of current evaluation. 4.1.2.2 Java Card Platform The Java technology, embedded on the TOE: 1
- interface for the secure management of applications on the smart card. The Card Manager is out of scope of current evaluation and its administrative interface is permanently disabled before TOE delivery: 1
- of the TOE to the parties responsible of the following usage phases. Application development is out of scope of current evaluation. TOE Construction phase includes: • Product Development • Product: 1
- out of scope: 4
|
pdf_data/st_metadata |
- /Author: IDEMIA
- /CreationDate: D:20180425142526+02'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20180425142526+02'00'
- /Producer: Microsoft® Word 2016
- pdf_file_size_bytes: 2387254
- pdf_hyperlinks: ftp://ftp.itc.1/SCD, ftp://ftp.itc.1/SVD
- pdf_is_encrypted: False
- pdf_number_of_pages: 135
|
- /Author: daniela terracciano
- /CreationDate: D:20170127111137+01'00'
- /Creator: PDFCreator 2.0.0.0
- /Keywords:
- /ModDate: D:20170127111137+01'00'
- /Producer: PDFCreator 2.0.0.0
- /Subject:
- /Title: STSafe-J_SecurityTarget_Lite_A
- pdf_file_size_bytes: 692327
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 95
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |