name |
BMC Atrium® Discovery and Dependency Mapping 10.0 |
Plateforme Upteq NFC 2.1.3_Generic sur le composant ST33F1ME avec application DESFIRE 1.1 (S1124940, release C) |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
CA |
FR |
status |
archived |
archived |
not_valid_after |
10.02.2020 |
17.12.2019 |
not_valid_before |
10.02.2015 |
17.12.2014 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-259CT%20v1.0e.docx |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-259%20CR%20v1.1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2014_88.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-259%20ST%20v12.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI_cible2014_88_LITE.pdf |
manufacturer |
BMC Software, Inc. |
Gemalto / STMicroelectronics |
manufacturer_web |
https://www.bmc.com/ |
https://www.gemalto.com/ |
security_level |
EAL2+, ALC_FLR.2 |
ALC_DVS.2, EAL4+, AVA_VAN.5 |
dgst |
86e19de07e49d48a |
276ef5ffa7d5941c |
heuristics/cert_id |
383-4-259 |
ANSSI-CC-2014/88 |
heuristics/cert_lab |
CANADA |
THALES |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
ALC_DVS.2, AVA_VAN.5 |
heuristics/extracted_versions |
10.0 |
2.1.3, 1.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2011/07 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
ANSSI-CC-2010/50, ANSSI-CC-2010/49, ANSSI-CC-2011/07 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
ANSSI-CC-2011/07 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
ANSSI-CC-2011/07 |
heuristics/protection_profiles |
{} |
9399bd94f9925b16 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-profil_PP-2010-03en.pdf |
pdf_data/cert_filename |
383-4-259CT v1.0e.docx |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
383-4-259 CR v1.1.pdf |
ANSSI-CC-2014_88.pdf |
pdf_data/report_frontpage |
- FR:
- CA:
- cert_id: 383-4-259-CR
- cert_lab: CANADA
|
- FR:
- cc_security_level: EAL 4 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 4
- cert_id: ANSSI-CC-2014/88
- cert_item: Plateforme Upteq NFC 2.1.3_Generic release C sur composant ST33F1ME
- cert_item_version: T1020806, Release C
- cert_lab: THALES (TCS – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France
- developer: Gemalto La Vigie, Av du Jujubier ZI Athelia IV, 13705 La Ciotat Cedex, France STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, B.P. 2, 13106 Rousset, France Commanditaire Gemalto La Vigie, Av du Jujubier ZI Athelia IV, 13705 La Ciotat Cedex, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: ANSSI-CC-PP-2010/03-M01 [PP JCS] Java Card System – Open Configuration, version 3.0
- CA:
|
pdf_data/report_keywords/cc_cert_id |
|
- FR:
- ANSSI-CC-2011/07: 7
- ANSSI-CC-2011/07-M01: 1
- ANSSI-CC-2011/07-M02: 3
- ANSSI-CC-2011/07-M03: 3
- ANSSI-CC-2011/07-S02: 1
- ANSSI-CC-2014/88: 22
- ANSSI-CC-PP-2010/03-M01: 2
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- ANSSI:
- ANSSI-CC-PP-2010/03-M01: 2
- BSI:
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 2 augmented: 1
- EAL 2+: 3
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 2
- EAL 5: 1
- EAL 7: 1
- EAL4: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Gemalto:
- STMicroelectronics:
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: White, Debra E.
- /CR date: 10 February 2015
- /CR version: 1.1
- /Certificate date: 10 February 2015
- /Company: CSEC-CSTC
- /Conformance Claim: Conformance Claim (EAL number augmented?)
- /CreationDate: D:20160420101751-04'00'
- /Creator: Acrobat PDFMaker 11 for Word
- /Developer name: BMC Software, Inc.
- /Document number: 383-4-259-CR
- /ETR title, version, date: Evaluation Technical Report for EAL 2+ Common Criteria Evaluation for BMC Software, Inc. BMC Atrium® Discovery and Dependency Mapping 10.0 Document No. 1815-000-D002-B, Version 1.2, 10 February 2015
- /Evaluation completion date: 10 February 2015
- /ModDate: D:20160420101756-04'00'
- /Producer: Adobe PDF Library 11.0
- /ST Title: BMC Atrium Discovery and Dependency Mapping 10 Security Target version 0.12, 10 February 2015
- /SourceModified: D:20160420140405
- /TOE name and version: BMC Atrium® Discovery and Dependency Mapping 10.0
- /TOE short name: BMC Atrium® Discovery
- /Title: 383-4-XXX CR vxe
- /_DocHome: -1616610741
- pdf_file_size_bytes: 167573
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 14
|
- /Author: robert-n@intranet.fr
- /CreationDate: D:20150115150459+01'00'
- /Creator: Microsoft® Word 2010
- /Keywords: ANSSI-CC-CER-F-07.013
- /ModDate: D:20150115150459+01'00'
- /Producer: Microsoft® Word 2010
- /Subject: Plateforme Upteq NFC 2.1.3_Generic sur le composant ST33F1ME avec application DESFIRE 1.1 (S1124940, release C)
- /Title: ANSSI-CC-2014/88
- pdf_file_size_bytes: 715730
- pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 21
|
pdf_data/st_filename |
383-4-259 ST v12.pdf |
ANSSI_cible2014_88_LITE.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- FR:
- ANSSI-CC-2011/07: 1
- ANSSI-CC-2011/07-M02: 1
- NL:
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL4: 3
- EAL4 augmented: 3
- EAL4+: 1
- EAL5: 2
- EAL5 augmented: 2
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 4
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 2
- FAU_GEN.1: 13
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 7
- FAU_GEN.2.1: 1
- FAU_SAR.1: 12
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 6
- FAU_SAR.2.1: 1
- FAU_SAR.3: 7
- FAU_SAR.3.1: 1
- FAU_STG.1: 2
- FAU_STG.2: 7
- FAU_STG.2.1: 1
- FAU_STG.2.2: 1
- FAU_STG.2.3: 1
- FAU_STG.3: 7
- FAU_STG.3.1: 1
- FCS:
- FCS_CKM.1: 34
- FCS_CKM.1.1: 2
- FCS_CKM.2: 4
- FCS_CKM.4: 20
- FCS_CKM.4.1: 1
- FCS_COP.1: 41
- FCS_COP.1.1: 4
- FDP:
- FDP_ACC.1: 13
- FDP_ACC.1.1: 1
- FDP_ACF.1: 9
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FDP_ITC.1: 10
- FDP_ITC.2: 10
- FIA:
- FIA_AFL.1: 7
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 6
- FIA_ATD.1.1: 1
- FIA_SOS.1: 8
- FIA_SOS.1.1: 1
- FIA_UAU.1: 4
- FIA_UAU.2: 8
- FIA_UAU.2.1: 1
- FIA_UAU.7: 6
- FIA_UAU.7.1: 1
- FIA_UID.1: 6
- FIA_UID.2: 8
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF.1: 7
- FMT_MOF.1.1: 1
- FMT_MSA.1: 8
- FMT_MSA.1.1: 1
- FMT_MSA.3: 9
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 8
- FMT_MTD.1.1: 1
- FMT_SAE.1: 7
- FMT_SAE.1.1: 1
- FMT_SAE.1.2: 1
- FMT_SMF.1: 13
- FMT_SMF.1.1: 1
- FMT_SMR.1: 17
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 2
- FPT:
- FPT_ITC.1: 9
- FPT_ITC.1.1: 1
- FPT_ITT.1: 9
- FPT_ITT.1.1: 1
- FPT_STM.1: 4
- FPT_TRP.1: 1
- FTP:
- FTP_TRP.1: 9
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_ARP.1: 5
- FAU_ARP.1.1: 1
- FAU_SAS.1: 1
- FCO:
- FCS:
- FCS_CKM: 11
- FCS_CKM.1: 3
- FCS_CKM.2: 3
- FCS_CKM.3: 3
- FCS_CKM.4: 2
- FCS_CKM.4.1: 1
- FCS_COP: 15
- FCS_COP.1: 12
- FCS_RND: 2
- FCS_RND.1: 5
- FCS_RND.1.1: 2
- FCS_RNG.1: 2
- FDP:
- FDP_ACC: 10
- FDP_ACC.1: 4
- FDP_ACC.2: 6
- FDP_ACF: 10
- FDP_ACF.1: 28
- FDP_ETC: 2
- FDP_ETC.1: 2
- FDP_IFC: 4
- FDP_IFC.1: 2
- FDP_IFC.2: 4
- FDP_IFF: 4
- FDP_IFF.1: 19
- FDP_IFF.1.2: 1
- FDP_IFF.1.4: 1
- FDP_ITC: 7
- FDP_ITC.1: 3
- FDP_ITC.2: 19
- FDP_ITT.1: 1
- FDP_RIP: 10
- FDP_RIP.1: 8
- FDP_ROL: 6
- FDP_ROL.1: 9
- FDP_SDI.2: 1
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UIT: 3
- FDP_UIT.1: 4
- FIA:
- FIA_ATD: 1
- FIA_ATD.1: 1
- FIA_UAU: 8
- FIA_UAU.1: 2
- FIA_UAU.2: 1
- FIA_UAU.4: 1
- FIA_UAU.5: 2
- FIA_UID: 9
- FIA_UID.1: 4
- FIA_UID.2: 3
- FIA_USB: 1
- FIA_USB.1: 3
- FMT:
- FMT_LIM: 1
- FMT_LIM.1: 2
- FMT_LIM.2: 1
- FMT_MOF: 2
- FMT_MOF.1: 1
- FMT_MSA: 30
- FMT_MSA.1: 10
- FMT_MSA.2: 2
- FMT_MSA.3: 21
- FMT_MSA.3.1: 2
- FMT_MTD: 6
- FMT_MTD.1: 3
- FMT_MTD.3: 1
- FMT_SMF: 12
- FMT_SMF.1: 9
- FMT_SMF.1.1: 1
- FMT_SMR: 12
- FMT_SMR.1: 16
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNO: 2
- FPR_UNO.1: 2
- FPR_UNO.1.1: 1
- FPT:
- FPT_FLS: 8
- FPT_FLS.1: 7
- FPT_FLS.1.1: 1
- FPT_ITT: 2
- FPT_ITT.1: 2
- FPT_PHP.3: 1
- FPT_RCV: 5
- FPT_RCV.3: 11
- FPT_RCV.4: 1
- FPT_RPL: 2
- FPT_RPL.1: 2
- FPT_TDC: 2
- FPT_TDC.1: 3
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FRU:
- FTP:
- FTP_ITC: 3
- FTP_ITC.1: 6
- FTP_TRP: 2
- FTP_TRP.1: 3
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN: 3
- A.LOCATE: 3
- A.LOCKED_DOWN: 1
- A.LOCK_DOWN: 3
- A.NOEVIL: 4
- A.PHYSICAL_PROTECT: 3
- A.TIME: 4
- O:
- O.ACCOUNTABLE: 7
- O.AUTHORIZATION: 5
- O.DISCOVERY: 8
- O.DISCRETIONARY_: 1
- O.DISCRETIONARY_ACCESS: 4
- O.EAVESDROPPING: 7
- O.MANAGE: 8
- OE:
- OE.ADMIN: 4
- OE.LOCATE: 4
- OE.LOCKED_DOWN: 1
- OE.LOCK_DOWN: 3
- OE.NOEVIL: 4
- OE.PHYSICAL: 4
- OE.TIME: 6
- T:
- T.ACCOUNT: 4
- T.EAVESDROPPING: 3
- T.EXCEED_PRIV: 6
- T.MANAGE: 3
- T.UNAUTH_ACCESS: 8
- T.UNKNOWN: 3
|
- A:
- A.APPLET: 1
- A.DELETION: 4
- A.MOBILE-OPERATOR: 2
- A.OTA-ADMIN: 2
- A.PERSONALIZER: 1
- A.PRODUCTION: 1
- A.VERIFICATION: 1
- D:
- D.API_DATA: 3
- D.APP_CODE: 7
- D.APP_C_DATA: 5
- D.APP_I_DATA: 6
- D.CARD_MNGT_DATA: 4
- D.CRYPTO: 4
- D.GASD_KEYS: 5
- D.ISD_KEYS: 4
- D.JCS_CODE: 3
- D.JCS_DATA: 6
- D.OPTIONAL_PF_SERVICE: 4
- D.PIN: 4
- D.SEC_DATA: 7
- O:
- O.ALARM: 1
- O.APPLET: 16
- O.APPLI-AUTH: 2
- O.CARD-MANAGEMENT: 5
- O.CARD_MANAGEMENT: 1
- O.CIPHER: 2
- O.CODE_PKG: 14
- O.COMM_AUTH: 2
- O.COMM_INTEGRITY: 2
- O.CONTROLED-ES_LOADING: 1
- O.DELETION: 2
- O.FIREWALL: 2
- O.GLOBAL_ARRAYS_CONFID: 2
- O.GLOBAL_ARRAYS_INTEG: 2
- O.INSTALL: 1
- O.JAVAOBJECT: 38
- O.KEY-MNGT: 2
- O.LOAD: 2
- O.NATIVE: 2
- O.OBJ-DELETION: 2
- O.OPERATE: 1
- O.PIN-MNGT: 2
- O.REALLOCATION: 2
- O.REMOTE_SERVICE_ACTIVATION: 1
- O.REMOTE_SERVICE_AUDIT: 2
- O.RESOURCES: 1
- O.RND: 2
- O.SCP: 8
- O.SCP-SUPPORT: 2
- O.SID: 1
- O.TRANSACTION: 2
- OE:
- OE.ACTIVATION-KEY-ESCROW: 2
- OE.AID-MANAGEMENT: 2
- OE.APPLET: 1
- OE.BASIC-APPS-VALIDATION: 2
- OE.CARD-: 1
- OE.CARD-MANAGEMENT: 2
- OE.CARD_MANAGEMENT: 1
- OE.CODE-: 1
- OE.CODE-EVIDENCE: 1
- OE.GEMACTIVATE-ADMIN: 2
- OE.KEY-ESCROW: 2
- OE.KEY-GENERATION: 2
- OE.MOBILE-OPERATOR: 2
- OE.OPERATOR-KEYS: 2
- OE.OTA-ADMIN: 2
- OE.OTA-LOADING: 2
- OE.OTA-SERVERS: 2
- OE.PERSONALIZER: 2
- OE.PRODUCTION: 2
- OE.SCP: 6
- OE.TRUSTED-APPS-DEVELOPER: 2
- OE.TRUSTED-APPS-PRE-ISSUANCE: 2
- OE.VERIFICATION: 4
- OP:
- OP.ARRAY_ACCESS: 4
- OP.CREATE: 7
- OP.DELETE_APPLET: 4
- OP.DELETE_PCKG: 3
- OP.DELETE_PCKG_APPLET: 3
- OP.INSTANCE_FIELD: 4
- OP.INVK_INTERFACE: 7
- OP.INVK_VIRTUAL: 6
- OP.JAVA: 5
- OP.PUT: 6
- OP.THROW: 5
- OP.TYPE_ACCESS: 5
- OSP:
- OSP.ACTIVATION-: 1
- OSP.ACTIVATION-KEY-ESCROW: 1
- OSP.AID-MANAGEMENT: 2
- OSP.BASIC-APPS-VALIDATION: 2
- OSP.KEY-ESCROW: 2
- OSP.KEY-GENERATION: 2
- OSP.OPERATOR-KEYS: 2
- OSP.OTA-LOADING: 2
- OSP.OTA-SERVERS: 2
- OSP.PERSONALIZER: 2
- OSP.PRODUCTION: 2
- OSP.RNG: 3
- OSP.SERVICE: 1
- OSP.SERVICE_AUDIT: 2
- OSP.TRUSTED-APPS-: 2
- OSP.TRUSTED-APPS-DEVELOPER: 2
- OSP.TRUSTED-APPS-PRE-ISSUANCE: 1
- OSP.VERIFICATION: 1
- R:
- T:
- T.CONFID-APPLI-DATA: 1
- T.CONFID-JCS-CODE: 1
- T.CONFID-JCS-DATA: 1
- T.DELETION: 3
- T.EXE-CODE: 2
- T.INSTALL: 1
- T.INTEG-APPLI-CODE: 2
- T.INTEG-APPLI-DATA: 2
- T.INTEG-JCS-CODE: 1
- T.INTEG-JCS-DATA: 1
- T.INTEG-USER-DATA: 2
- T.LIFE_CYCLE: 2
- T.NATIVE: 1
- T.OBJ-DELETION: 1
- T.PHYSICAL: 1
- T.RESOURCES: 2
- T.SID: 2
- T.UNAUTHORIZED_ACCESS_TO_SERVICE: 2
- T.UNAUTHORIZED_CARD_MNGT: 2
|
pdf_data/st_keywords/vendor |
- Microsoft:
- Microsoft: 1
- Microsoft Corporation: 1
|
- Gemalto:
- NXP:
- NXP: 1
- NXP Semiconductors: 1
- STMicroelectronics:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
- AES_competition:
- DES:
- 3DES:
- TDEA: 1
- TDES: 5
- Triple-DES: 3
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
- FF:
- DH:
- DH: 2
- DHE: 1
- Diffie-Hellman: 1
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- MD:
- SHA:
- SHA1:
- SHA2:
- SHA-2: 3
- SHA-224: 2
- SHA-256: 3
- SHA-384: 3
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- SSH:
- TLS:
- SSL:
- TLS:
- TLS: 28
- TLS v1.0: 6
- TLSv1.0: 4
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 5
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- fault induction: 2
- malfunction: 3
- physical tampering: 4
- SCA:
- DPA: 1
- Leak-Inherent: 4
- physical probing: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- CCMB-2012-09-004: 1
- FIPS:
- FIPS 140-2: 6
- FIPS 180-3: 3
- FIPS 186-2: 2
- FIPS 197: 2
- FIPS 198-1: 2
- FIPS PUB 140-2: 1
- FIPS PUB 180-3: 1
- FIPS PUB 186-2: 1
- FIPS PUB 197: 1
- FIPS PUB 198-1: 1
- FIPS140-2: 2
- FIPS180-3: 3
- FIPS186-2: 2
- FIPS197: 2
- FIPS198-1: 2
- PKCS:
- RFC:
|
- CC:
- CCIMB-2012-09-004: 1
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- FIPS:
- FIPS 180-2: 1
- FIPS 180-3: 1
- FIPS 197: 1
- FIPS 46-3: 1
- FIPS PUB 197: 4
- FIPS PUB 46-3: 5
- FIPS PUB 81: 4
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 9796-2: 1
- PKCS:
- PKCS #1: 5
- PKCS #5: 1
- PKCS#1: 1
- PKCS#5: 1
- RFC:
- SCP:
- SCP 01: 1
- SCP 02: 1
- SCP 80: 1
- SCP02: 5
- SCP80: 8
|
pdf_data/st_keywords/javacard_version |
|
- GlobalPlatform:
- JavaCard:
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
- javacard:
- javacard.framework: 2
- javacard.security: 2
- javacardx:
- javacardx.crypto: 10
- javacardx.security: 9
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- out of scope: 1
- parameters for cryptographic operations, the use of these other values are not advised; and clearly out of scope of the TOE. See [USR] for details. JCS.EraseResidualData The security function ensures that: 1
|
pdf_data/st_metadata |
- /Author: tmacarthur
- /CreationDate: D:20160419134043-04'00'
- /Creator: PDFCreator Version 1.1.0
- /Keywords:
- /ModDate: D:20160419134043-04'00'
- /Producer: GPL Ghostscript 9.0
- /Subject:
- /Title: BMC_ADDM_ST13a
- pdf_file_size_bytes: 455164
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 61
|
- /Author: mhajj
- /CreationDate: D:20150112160126+01'00'
- /Creator: PDFCreator Version 1.7.1
- /Keywords:
- /ModDate: D:20150112160126+01'00'
- /Producer: GPL Ghostscript 9.07
- /Subject:
- /Title: ST_D1314435_DESFIRE_LITE_v1.0p - Copy
- pdf_file_size_bytes: 1874846
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 143
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |