name |
eTravel Essential 1.2 – PACE, EAC and AA activated(release ‘0300’) |
eTravel Essential 1.2 – BAC, EAC and AA activated (release ‘0300’) |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
FR |
FR |
status |
active |
active |
not_valid_after |
15.06.2026 |
12.12.2027 |
not_valid_before |
15.06.2021 |
12.12.2022 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-2021_28.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-cc-2022_61.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2021_28fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2022_61.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2021_28en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-cc-2022_61.pdf |
manufacturer |
THALES DIS FRANCE SA |
THALES DIS FRANCE SA |
manufacturer_web |
https://www.thalesgroup.com/en/europe/france |
https://www.thalesgroup.com/en/europe/france |
security_level |
AVA_VAN.5, ALC_DVS.2, EAL5+ |
AVA_VAN.5, ALC_DVS.2, EAL5+ |
dgst |
84680b8178f9a797 |
70848d4d6f8d606a |
heuristics/cert_id |
ANSSI-CC-2021/28 |
ANSSI-CC-2022/61 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ATE_DPT.1, ASE_TSS.2, ADV_IMP.1, AVA_VAN.5, ADV_ARC.1, ADV_FSP.4 |
ASE_TSS.2, AVA_VAN.5, ALC_DVS.2 |
heuristics/extracted_versions |
1.2 |
1.2 |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/report_references/directly_referenced_by |
ANSSI-CC-2022/62 |
{} |
heuristics/report_references/directly_referencing |
ANSSI-CC-2020/34 |
ANSSI-CC-2020/34, ANSSI-CC-2021/27 |
heuristics/report_references/indirectly_referenced_by |
ANSSI-CC-2022/62 |
{} |
heuristics/report_references/indirectly_referencing |
ANSSI-CC-2020/34 |
ANSSI-CC-2020/34, ANSSI-CC-2021/27 |
heuristics/scheme_data |
- cert_id: ANSSI-CC-2021/28
- description: Le produit évalué est « eTravel Essential 1.2 – PACE, EAC and AA activated, release '0300' » développé par THALES DIS. Le produit évalué est de type « carte à puce » pouvant être utilisé en modes avec et sans contact. Il implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisation de l’aviation civile internationale (ICAO). Ce produit est destiné à
- developer: THALES DIS
- enhanced:
- augmented: ALC_DVS.2, AVA_VAN.5
- category: Cartes à puce
- cc_version: Critères Communs version 3.1r5
- cert_id: ANSSI-CC-2021/28
- cert_link: https://cyber.gouv.fr/sites/default/files/2021/07/certificat-2021_28.pdf
- certification_date: 2021-06-15
- developer: THALES DIS
- evaluation_facility: SERMA SAFETY & SECURITY
- expiration_date: 2026-06-15
- level: EAL5+
- mutual_recognition: SOG-IS CCRA
- protection_profile: Machine Readable Travel Document with « ICAO Application », Extended Access Control
- report_link: https://cyber.gouv.fr/sites/default/files/2021/07/anssi-cc-2021_28fr.pdf
- sponsor: THALES DIS DESIGN SERVICES
- target_link: https://cyber.gouv.fr/sites/default/files/2021/07/anssi-cible-cc-2021_28-m01en.pdf
- expiration_date: 2026-06-15
- level: EAL5+
- product: eTravel Essential 1.2 – PACE, EAC and AA activated(release '0300')
- sponsor: THALES DIS DESIGN SERVICES
- url: https://cyber.gouv.fr/produits-certifies/etravel-essential-12-pace-eac-and-aa-activatedrelease-0300
|
- cert_id: ANSSI-CC-2022/61
- description: Le produit évalué est « eTravel Essential 1.2 – BAC, EAC and AA activated, release '0300' » développé par THALES DIS.Le produit évalué est de type « carte à puce » pouvant être utilisé en modes avec et sans contact. Il implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisation de l’aviation civile internationale (ICAO). Ce produit est destiné à p
- developer: THALES DIS et THALES DIS DESIGN SERVICES
- enhanced:
- augmented: ALC_DVS.2, AVA_VAN.5
- category: Cartes à puce
- cc_version: Critères Communs version 3.1r5
- cert_id: ANSSI-CC-2022/61
- certification_date: 2022-12-12
- developer: THALES DIS et THALES DIS DESIGN SERVICES
- evaluation_facility: SERMA SAFETY & SECURITY
- expiration_date: 2027-12-11
- level: EAL5+
- mutual_recognition: CCRA SOG-IS
- protection_profile: Machine Readable Travel Document with « ICAO Application », Extended Access Control, version 1.10, certifié BSI-CC-PP-0056-2009
- sponsor: THALES DIS
- expiration_date: 2027-12-11
- level: EAL5+
- product: eTravel Essential 1.2 – BAC, EAC and AA activated (release '0300')
- sponsor: THALES DIS
- url: https://cyber.gouv.fr/produits-certifies/etravel-essential-12-bac-eac-and-aa-activated-release-0300
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
certificat-2021_28.pdf |
certificat-cc-2022_61.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0056-V2-2012-MA-02: 1
- BSI-CC-PP-0068-V2-2011-MA-01: 1
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author:
- /CreationDate: D:20210621171827+02'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20210621171827+02'00'
- /Producer: Acrobat Distiller 11.0 (Windows)
- /Title:
- pdf_file_size_bytes: 314713
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
- /Author: DUCLOS Charlene
- /Category: -R01
- /Comments: ANSSI-CC-CER-F-14_v14.8
- /Company: SGDSN
- /CreationDate: D:20221216141556+01'00'
- /Creator: Acrobat PDFMaker 22 pour Word
- /Keywords: version x.x, révision x
- /ModDate: D:20221216141556+01'00'
- /Producer: Adobe PDF Library 22.3.39
- /SourceModified: D:20221216131544
- /Title: ANSSI-CC-2022/61
- pdf_file_size_bytes: 153886
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
anssi-cc-2021_28fr.pdf |
anssi-cc-2022_61.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- FR:
- ANSSI-CC-2020/34: 1
- ANSSI-CC-2020/34-M01: 1
- ANSSI-CC-2021/28: 2
|
- FR:
- ANSSI-CC-2020/34: 1
- ANSSI-CC-2020/34-M01: 1
- ANSSI-CC-2020/34-S02: 1
- ANSSI-CC-2021/27: 2
- ANSSI-CC-2022/61: 2
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0056-V2-2012-MA-02: 2
- BSI-CC-PP-0068-V2-2011-MA-01: 1
- BSI-PP-0084-2014: 1
|
- BSI:
- BSI-CC-PP-0056-2009: 1
- BSI-PP-0084-2014: 1
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 1
- EAL2: 2
- EAL6: 1
- EAL7: 1
- ITSEC:
|
- EAL:
- EAL 5: 2
- EAL2: 2
- EAL6: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- ICAO:
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- ICAO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author:
- /CreationDate: D:20210621171133+02'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20210621171133+02'00'
- /Producer: Acrobat Distiller 11.0 (Windows)
- /Title:
- pdf_file_size_bytes: 143746
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 14
|
- /Author: [email protected]
- /Category: release '0300'
- /Comments: ANSSI-CC-CER-F-07_v31.3
- /Company: THALES DIS
- /CreationDate: D:20221216141522+01'00'
- /Creator: Acrobat PDFMaker 22 pour Word
- /Keywords: [ANSSI Crypto] <ou [SOG-IS Crypto]>
- /ModDate: D:20221216141525+01'00'
- /Producer: Adobe PDF Library 22.3.39
- /SourceModified: D:20221216131509
- /Subject: eTravel Essential 1.2 – BAC, EAC and AA activated
- /Title: ANSSI-CC-2022/61
- pdf_file_size_bytes: 400663
- pdf_hyperlinks: http://www.sogis.eu/, mailto:[email protected], http://www.ssi.gouv.fr/, http://www.commoncriteriaportal.org/
- pdf_is_encrypted: False
- pdf_number_of_pages: 15
|
pdf_data/st_filename |
anssi-cible-cc-2021_28en.pdf |
certificat-cc-2022_61.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0055: 1
- BSI-CC-PP-0056: 1
- BSI-CC-PP-0056-V2-2012: 1
- BSI-CC-PP-0068-V2-2011-MA-01: 1
- BSI-CC-PP-0084-2014: 1
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 5+: 1
- EAL 6+: 1
- EAL5: 7
- EAL5 augmented: 3
- EAL6: 1
- EAL6 augmented: 1
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 2
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE: 2
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ASE:
- ATE:
- AVA:
- AVA_VAN.3: 2
- AVA_VAN.5: 6
|
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_SAS: 6
- FAU_SAS.1: 19
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 61
- FCS_CKM.1: 26
- FCS_CKM.1.1: 2
- FCS_CKM.2: 8
- FCS_CKM.4: 67
- FCS_CKM.4.1: 1
- FCS_COP: 122
- FCS_COP.1: 13
- FCS_COP.1.1: 8
- FCS_RND: 7
- FCS_RND.1: 21
- FCS_RND.1.1: 2
- FCS_RNG: 2
- FCS_RNG.1: 1
- FDP:
- FDP_ACC: 34
- FDP_ACC.1: 9
- FDP_ACC.1.1: 1
- FDP_ACF: 32
- FDP_ACF.1: 19
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 6
- FDP_ITC.1: 22
- FDP_ITC.2: 22
- FDP_ITT.1: 2
- FDP_RIP.1: 9
- FDP_RIP.1.1: 1
- FDP_SDC.1: 8
- FDP_SDI.2: 5
- FDP_SMR: 1
- FDP_UCT: 10
- FDP_UCT.1: 4
- FDP_UCT.1.1: 1
- FDP_UIT: 9
- FDP_UIT.1: 6
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL: 25
- FIA_AFL.1: 1
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_API: 22
- FIA_API.1: 11
- FIA_API.1.1: 1
- FIA_ATD: 9
- FIA_ATD.1: 1
- FIA_SOS.2: 1
- FIA_UAU: 83
- FIA_UAU.1: 6
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UAU.4: 4
- FIA_UAU.4.1: 1
- FIA_UAU.5: 5
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 1
- FIA_UAU.6.1: 2
- FIA_UID: 37
- FIA_UID.1: 14
- FIA_UID.1.1: 2
- FIA_UID.1.2: 2
- FMT:
- FMT_LIM: 9
- FMT_LIM.1: 28
- FMT_LIM.1.1: 3
- FMT_LIM.2: 26
- FMT_LIM.2.1: 3
- FMT_MSA: 11
- FMT_MSA.1: 6
- FMT_MSA.3: 6
- FMT_MTD: 97
- FMT_MTD.1: 15
- FMT_MTD.1.1: 1
- FMT_MTD.3: 8
- FMT_MTD.3.1: 1
- FMT_SMF: 10
- FMT_SMF.1: 57
- FMT_SMF.1.1: 1
- FMT_SMR: 44
- FMT_SMR.1: 8
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS: 13
- FPT_EMS.1: 20
- FPT_EMS.1.1: 4
- FPT_EMS.1.2: 4
- FPT_FLS: 14
- FPT_FLS.1: 24
- FPT_FLS.1.1: 1
- FPT_ITT.1: 3
- FPT_PHP.3: 18
- FPT_PHP.3.1: 1
- FPT_TST: 15
- FPT_TST.1: 13
- FPT_TST.1.1: 2
- FPT_TST.1.2: 2
- FPT_TST.1.3: 2
- FRU:
- FTP:
- FTP_ITC: 16
- FTP_ITC.1: 6
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 4
|
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ACODE-EVIDENCE: 3
- A.ACODE-KEY-MANAGEMENT: 3
- D:
- D.ACODE: 8
- D.ACODE-ID: 3
- D.ACODE_: 1
- D.ACODE_CIPHEREDSIGNED: 7
- D.ACODE_DEC-KEY: 4
- D.ACODE_ENC-KEY: 2
- D.ACODE_SGNGEN-KEY: 2
- D.ACODE_SGNVER-: 1
- D.ACODE_SGNVER-KEY: 4
- O:
- O.CONFID-ES-UPDATE: 1
- O.CONFID-LOAD_ACODE: 4
- O.RND: 1
- O.SECURE_ACTIVATION_ACODE: 4
- O.SECURE_AC_ACTIVATION: 1
- O.SECURE_LOAD_ACODE: 9
- O.TOE_IDENTIFICATION: 7
- OE:
- OE.ACODE-: 1
- OE.ACODE-ENCRYPTION: 6
- OE.ACODE-EVIDENCE: 5
- OE.ACODE-KEY-MANAGEMENT: 6
- OE.ACODE-SECURE_LOAD: 1
- OE.ACODE-TRUSTED-: 1
- OE.ACODE-TRUSTED-DEVELOPER: 5
- OE.ACODE-VERIFICATION: 4
- OE.ACODE_SECURE_LOAD: 4
- OE.BAC-PP: 1
- OE.CODE-VERIFICATION: 1
- OE.ENCRYPTION_ACODE: 1
- OSP:
- T:
- T.CONFID-: 1
- T.CONFID-ACODE_LOAD: 2
- T.FAKE-SGNVER-KEY: 3
- T.INTEG-: 1
- T.INTEG-ACODE_LOAD: 2
- T.UNAUTHORIZED_ES_UPDATE: 3
- T.WRONG-UPDATE-STATE: 3
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
- Serma:
- Serma Safety & Security: 1
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- 3DES:
- 3DES: 2
- TDES: 7
- Triple-DES: 6
- DES:
- constructions:
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 6
- Physical Tampering: 3
- Physical tampering: 2
- fault injection: 1
- malfunction: 6
- SCA:
- DPA: 2
- Leak-Inherent: 3
- SPA: 1
- physical probing: 4
- timing attacks: 1
- other:
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
- EF:
- EF.COM: 3
- EF.DG1: 11
- EF.DG14: 5
- EF.DG15: 2
- EF.DG16: 9
- EF.DG2: 5
- EF.DG3: 11
- EF.DG4: 11
- EF.DG5: 3
- EF.SOD: 4
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- FIPS:
- FIPS 180-2: 1
- FIPS 186-4: 3
- FIPS 197: 2
- FIPS PUB 186-4: 1
- FIPS PUB 197: 1
- FIPS PUB 46-3: 1
- FIPS180-2: 1
- FIPS46-3: 1
- ICAO:
- ISO:
- ISO/IEC 14443: 4
- ISO/IEC 7816: 2
- ISO/IEC 7816-4: 1
- NIST:
- SP 800-67: 1
- SP 800-90: 2
- PKCS:
- RFC:
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: [email protected]
- /CreationDate: D:20210329115816+02'00'
- /Creator: Microsoft® Word 2016
- /Keywords: Security Target, CC, eTravel
- /ModDate: D:20210329115816+02'00'
- /Producer: Microsoft® Word 2016
- /Title: Security Target eTravel Essential 1.2 - BAC, EAC and AA activated
- pdf_file_size_bytes: 2574254
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 119
|
- /Author: DUCLOS Charlene
- /Category: -R01
- /Comments: ANSSI-CC-CER-F-14_v14.8
- /Company: SGDSN
- /CreationDate: D:20221216141556+01'00'
- /Creator: Acrobat PDFMaker 22 pour Word
- /Keywords: version x.x, révision x
- /ModDate: D:20221216141556+01'00'
- /Producer: Adobe PDF Library 22.3.39
- /SourceModified: D:20221216131544
- /Title: ANSSI-CC-2022/61
- pdf_file_size_bytes: 153886
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |