name |
CardOS V6.0 ID R1.2 |
Athena IDPass ICAO BAC avec AA sur composant SB23YR48/80B avec librairie cryptographique NesLib v3.0 |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
DE |
FR |
status |
active |
archived |
not_valid_after |
04.12.2029 |
01.09.2019 |
not_valid_before |
04.12.2024 |
23.12.2011 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1162V3c_pdf.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1162V3a_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2011-58fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1162V3b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2011-58en.pdf |
manufacturer |
Eviden Germany GmbH |
Athena Smartcard Solutions Inc / STMicroelectronics |
manufacturer_web |
https://eviden.com |
https://www.athena-scs.com/ |
security_level |
ALC_DVS.2, ATE_DPT.2, AVA_VAN.5, EAL4+ |
ALC_DVS.2, EAL4+ |
dgst |
876b69c4523f5df2 |
b534ad7d6a801e8b |
heuristics/cert_id |
BSI-DSZ-CC-1162-V3-2024 |
ANSSI-CC-2011/58 |
heuristics/cert_lab |
BSI |
SERMA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
AVA_VAN.5, ADV_ARC.1, ATE_COV.2, ASE_TSS.1, AGD_OPE.1, ADV_IMP.1, ASE_REQ.2, ALC_TAT.1, ALC_DVS.2, AGD_PRE.1, ATE_IND.2, ASE_CCL.1, ALC_LCD.1, ALC_CMS.4, ASE_ECD.1, ADV_TDS.3, ALC_DEL.1, ATE_DPT.2, ASE_OBJ.2, ALC_FLR.1, ADV_FSP.4, ASE_INT.1, ASE_SPD.1, ATE_FUN.1, ALC_CMC.4 |
ADV_ARC.1, ATE_COV.2, ASE_TSS.1, AGD_OPE.1, ADV_IMP.1, ASE_REQ.2, ALC_TAT.1, ALC_DVS.2, AGD_PRE.1, ASE_CCL.1, ATE_IND.2, ALC_CMS.4, ASE_ECD.1, ADV_TDS.3, ALC_DEL.1, ATE_DPT.2, ASE_OBJ.2, AVA_VAN.3, ALC_FLR.1, ADV_FSP.4, ASE_INT.1, ASE_SPD.1, ATE_FUN.1, ALC_CMC.4, ALC_LCD.1 |
heuristics/extracted_versions |
1.2, 6.0 |
3.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-1162-V2-2023, BSI-DSZ-CC-1110-V7-2024 |
ANSSI-CC-2010/02 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-0945-2017, BSI-DSZ-CC-1110-V3-2020, BSI-DSZ-CC-1162-2021, BSI-DSZ-CC-1110-2019, BSI-DSZ-CC-1110-V7-2024, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-1110-V5-2022, BSI-DSZ-CC-0945-V3-2018, BSI-DSZ-CC-0945-V2-2018, BSI-DSZ-CC-1110-V6-2023, BSI-DSZ-CC-0891-V2-2016, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-1110-V4-2021, BSI-DSZ-CC-1162-V2-2023, BSI-DSZ-CC-1110-V2-2019 |
ANSSI-CC-2009/05, ANSSI-CC-2010/02, ANSSI-CC-2009/26, ANSSI-CC-2009/51, ANSSI-CC-2010/01, ANSSI-CC-2009/28, ANSSI-CC-2009/50, ANSSI-CC-2009/06, ANSSI-CC-2009/62 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
ANSSI-CC-2010/02 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
ANSSI-CC-2010/02 |
heuristics/protection_profiles |
1f7ea2e05de5b88b, d918b28fd7bb5d79, d9553e7194783182, b380aabf93b29692, a33327d40f253f46 |
60455fc9564e2545 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0072b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056_V2b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0068_V2b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0071b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0055b.pdf |
pdf_data/cert_filename |
1162V3c_pdf.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-1162-V3-2024: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0056-V2-2012-MA-02: 1
- BSI-CC-PP-0059-2009-MA-02: 1
- BSI-CC-PP-0071-2012-MA-01: 1
- BSI-CC-PP-0072-2012-MA-01: 1
|
|
pdf_data/cert_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL 4 augmented: 1
- EAL 5: 1
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author: Federal Office for Information Security
- /Keywords: Common Criteria, Certification, CardOS V6.0 ID R1.2, Eviden Germany GmbH, Smartcard, MRTD, SSCD
- /Subject: Common Criteria, Certification, CardOS V6.0 ID R1.2, Eviden Germany GmbH, Smartcard, MRTD, SSCD
- /Title: Certificate BSI-DSZ-CC-1162-V3-2024
- pdf_file_size_bytes: 230957
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
1162V3a_pdf.pdf |
ANSSI-CC_2011-58fr.pdf |
pdf_data/report_frontpage |
- FR:
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ALC_DVS.2, ATE_DPT.2 and AVA_VAN.5 valid until: 3 December 2029 SOGIS Recognition Agreement
- cc_version: PP conformant plus product specific extensions Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-1162-V3-2024
- cert_item: CardOS V6.0 ID R1.2
- cert_lab: BSI
- developer: Eviden Germany GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: BSI-CC-PP-0056-V2-2012-MA-02 BSI-CC-PP-0068-V2-2011-MA-01 EN 419211-2:2013 (BSI-CC-PP-0059-2009-MA-02) EN 419211-4:2013 (BSI-CC-PP-0071-2012-MA-01) EN 419211-5:2013 (BSI-CC-PP-0072-2012-MA-01
|
- FR:
- cc_security_level: EAL 4 augmenté ALC_DVS.2
- cc_version: Critères Communs version 3.1 révision 3
- cert_id: ANSSI-CC-2011/58
- cert_item: Athena IDPass ICAO BAC avec AA sur composant SB23YR48/80B avec librairie cryptographique NesLib v3.0
- cert_item_version: Athena IDProtect/OS755 Java Card: ID 8211, release 0355, level 0402 Athena IDPass Applet: version 03, build 02, patch F1 STMicroelectronics SB23YR48/80B: revision G STMicroelectronics NesLib: version 3.0
- cert_lab: Serma Technologies 30 avenue Gustave Eiffel, 33608 Pessac, France
- developer: Athena Smartcard Solutions 20380 Town Center Lane, suite 240 Cupertino CA 95014, USA STMicroelectronics 190 Avenue Célestin Coq, ZI de Rousset, BP2, 13106 Rousset Cedex, France Commanditaire Athena Smartcard Solutions 20380 Town Center Lane, suite 240 Cupertino CA 95014, USA
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur\\(s\\)(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: BSI-CC-PP-0055-2009, [PP BAC], version 1.10 CC Protection Profile – Machine Readable Travel Document with ICAO application, Basic Access Control
- DE:
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-1110-V7-2024: 6
- BSI-DSZ-CC-1162-V2-2023: 3
- BSI-DSZ-CC-1162-V3-2024: 19
|
- FR:
- ANSSI-2010/02-M01: 1
- ANSSI-2010/02-M02: 1
- ANSSI-CC-2010/02: 5
- ANSSI-CC-2010/02-M01: 1
- ANSSI-CC-2011/58: 19
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP- 0068-V2-2011-MA-01: 1
- BSI-CC-PP- 0071-2012-MA-01: 1
- BSI-CC-PP- 0072-2012-MA-01: 1
- BSI-CC-PP-0056-V2-2012-: 1
- BSI-CC-PP-0056-V2-2012-MA-: 1
- BSI-CC-PP-0056-V2-2012-MA-02: 2
- BSI-CC-PP-0059-2009-: 1
- BSI-CC-PP-0059-2009-MA-: 1
- BSI-CC-PP-0059-2009-MA-02: 2
- BSI-CC-PP-0068-V2-2011-MA-01: 2
- BSI-CC-PP-0071-2012-: 1
- BSI-CC-PP-0071-2012-MA-: 1
- BSI-CC-PP-0071-2012-MA-01: 1
- BSI-CC-PP-0072-2012-: 1
- BSI-CC-PP-0072-2012-MA-01: 2
|
- BSI:
- BSI-CC-PP-0055-2009: 2
- BSI-PP-0035-2007: 2
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 2: 3
- EAL 4: 5
- EAL 4 augmented: 3
- EAL 5: 4
- EAL 5+: 1
- EAL 6: 1
- EAL5+: 1
- EAL6: 1
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 2
- EAL 5: 1
- EAL 7: 1
- EAL4: 2
- EAL4+: 1
- EAL6: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 5
- ALC_FLR: 2
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_DPT.2: 4
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 1
- ALC_FLR: 2
- ALC_FLR.1: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
- Infineon:
- Infineon: 4
- Infineon Technologies AG: 4
|
- STMicroelectronics:
- STM: 2
- STMicroelectronics: 15
|
pdf_data/report_keywords/eval_facility |
- TUV:
- TÜV Informationstechnik: 8
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
- Neslib:
- NesLib v2.0: 1
- NesLib v3.0: 25
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
- FI:
- SCA:
- side channel: 1
- side-channel: 2
- other:
|
|
pdf_data/report_keywords/technical_report_id |
- BSI:
- BSI 7148: 1
- BSI TR-02102-1: 1
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- AIS 1: 1
- AIS 14: 1
- AIS 19: 1
- AIS 20: 3
- AIS 25: 4
- AIS 26: 4
- AIS 31: 3
- AIS 32: 1
- AIS 34: 4
- AIS 35: 1
- AIS 36: 5
- AIS 37: 3
- AIS 38: 1
- AIS 46: 3
- ICAO:
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- ICAO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- ETR-COMP) for BSI-DSZ- CC-1110-V6-2023, Version 3, 2023-12-01, TÜV Informationstechnik GmbH (confidential document) Evaluation Technical Report for Composite Evaluation Addendum (ETR COMP_ADD) for: 1
- Germany GmbH Packages & Release Notes, CardOS V6.0, 11/2024, Eviden Germany GmbH [13] STAR Reports (confidential documents, refer to BSI-DSZ-CC-1162-V2-MA-01): Site Technical Audit Report (STAR) – Munich, Version 1, 15: 1
- Technical Report Summary (ETR Summary), Version 1, 2024-11-22, TÜV Informationstechnik GmbH (confidential document) [8] Protection Profiles: Protection profiles for secure signature creation device – Part 2: Device: 1
- V6.0 ID R1.2 (BAC)’, Version 1.45, 2024-11-21, Eviden Germany GmbH (confidential document) [12] Guidance documentation for the TOE (confidential documents): CardOS V6.0 User’s Manual: 1
- Version 3, 2024-09-20, TÜV Informationstechnik GmbH (confidential document) [11] Configuration List for BSI-DSZ-CC-1162-V3-2024, Configuration List ’CardOS V6.0 ID R1.2’ and: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
|
|
pdf_data/report_metadata |
- /Author: Federal Office for Information Security
- /Keywords: "Common Criteria, Certification, Zertifizierung, Smartcard, MRTD, SSCD, CardOS V6.0 ID R1.2, Eviden Germany GmbH"
- /Subject: Common Criteria, Certification, Zertifizierung, Smartcard, MRTD, SSCD, CardOS V6.0 ID R1.2, Eviden Germany GmbH
- /Title: Certification Report BSI-DSZ-CC-1162-V3-2024
- pdf_file_size_bytes: 556489
- pdf_hyperlinks: https://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.sogis.eu/, http://www.commoncriteriaportal.org/, http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/, https://www.bsi.bund.de/AIS, https://www.bsi.bund.de/zertifizierungsreporte
- pdf_is_encrypted: False
- pdf_number_of_pages: 30
|
- /CreationDate: D:20120124160503+01'00'
- /Keywords:
- /ModDate: D:20120124160503+01'00'
- /Producer: AFPL Ghostscript 8.53
- pdf_file_size_bytes: 222513
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 18
|
pdf_data/st_filename |
1162V3b_pdf.pdf |
ANSSI-CC-cible_2011-58en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- FR:
- ANSSI-2010/02: 1
- ANSSI-CC-2010/02: 2
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP- 0055-110: 2
- BSI-CC-PP- 0056-V2-2012-MA-02: 2
- BSI-CC-PP- 0059-2009-MA-02: 3
- BSI-CC-PP- 0068-V2-2011-MA-01: 5
- BSI-CC-PP- 0084-2014: 1
- BSI-CC-PP- 1605: 1
- BSI-CC-PP- 2370: 1
- BSI-CC-PP- 2910: 1
- BSI-CC-PP- 4145: 1
- BSI-CC-PP- 5805: 1
- BSI-CC-PP- 610: 1
- BSI-CC-PP-0055: 1
- BSI-CC-PP-0055-110: 10
- BSI-CC-PP-0056-: 2
- BSI-CC-PP-0056-V2-: 1
- BSI-CC-PP-0056-V2-2012-: 2
- BSI-CC-PP-0056-V2-2012-MA-: 1
- BSI-CC-PP-0056-V2-2012-MA-02: 22
- BSI-CC-PP-0059-: 2
- BSI-CC-PP-0059-2009-MA-: 1
- BSI-CC-PP-0059-2009-MA-02: 31
- BSI-CC-PP-0068-: 2
- BSI-CC-PP-0068-V2-: 2
- BSI-CC-PP-0068-V2-2011-: 3
- BSI-CC-PP-0068-V2-2011-MA-01: 55
- BSI-CC-PP-0071-2012-: 1
- BSI-CC-PP-0071-2012-MA-01: 7
- BSI-CC-PP-0072-: 1
- BSI-CC-PP-0072-2012-: 1
- BSI-CC-PP-0072-2012-MA-01: 11
- BSI-CC-PP-0084-2014: 10
- BSI-CC-PP-0086-2015: 4
|
- BSI:
- BSI-CC-PP-0055: 1
- BSI-CC-PP-0055-2009: 1
- BSI-CC-PP0055: 1
- BSI-CC-PP0056: 1
- BSI-PP-0035-2007: 3
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 6+: 1
- EAL4: 15
- EAL4 augmented: 4
- EAL6: 2
- EAL6 augmented: 2
- EAL6+: 1
|
- EAL:
- EAL 4: 3
- EAL 4 augmented: 3
- EAL 4+: 2
- EAL 6+: 4
- EAL4: 7
- EAL4 augmented: 1
- EAL4+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 6
- ADV_FSP.4: 3
- ADV_IMP.1: 3
- ADV_TDS.3: 4
- AGD:
- AGD_OPE.1: 3
- AGD_PRE.1: 4
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 2
- ALC_DVS.2: 9
- ALC_FLR.1: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT: 12
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ: 84
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS: 29
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 2
- ATE_DPT.2: 7
- ATE_FUN.1: 2
- ATE_IND.2: 1
- AVA:
- AVA_VAN.3: 1
- AVA_VAN.5: 9
|
- ADV:
- ADV_ARC.1: 2
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.2: 6
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- APE:
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.2: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_SAS.1: 9
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM: 139
- FCS_CKM.1: 35
- FCS_CKM.2: 14
- FCS_CKM.4: 68
- FCS_CKM.4.1: 2
- FCS_COP: 151
- FCS_COP.1: 25
- FCS_ITC: 1
- FCS_RNG: 1
- FCS_RNG.1: 24
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FDP:
- FDP_ACC: 39
- FDP_ACC.1: 27
- FDP_ACF: 34
- FDP_ACF.1: 53
- FDP_DAU: 7
- FDP_DAU.1: 1
- FDP_DAU.2: 2
- FDP_IFC.1: 15
- FDP_ITC.1: 24
- FDP_ITC.2: 24
- FDP_ITT.1: 1
- FDP_LIM: 2
- FDP_RIP.1: 22
- FDP_RIP.1.1: 2
- FDP_SDC.1: 1
- FDP_SDI: 12
- FDP_SDI.1: 2
- FDP_SDI.2: 5
- FDP_UCT: 12
- FDP_UCT.1: 3
- FDP_UIT: 16
- FDP_UIT.1: 6
- FIA:
- FIA_AFL: 38
- FIA_AFL.1: 10
- FIA_API: 15
- FIA_API.1: 9
- FIA_API.1.1: 1
- FIA_UAU: 99
- FIA_UAU.1: 26
- FIA_UAU.1.1: 5
- FIA_UAU.1.2: 1
- FIA_UAU.4: 2
- FIA_UAU.5: 17
- FIA_UAU.6: 4
- FIA_UID: 14
- FIA_UID.1: 24
- FIA_UID.1.1: 3
- FIA_UID.1.2: 1
- FMT:
- FMT_LIM: 1
- FMT_LIM.1: 13
- FMT_LIM.1.1: 2
- FMT_LIM.2: 11
- FMT_LIM.2.1: 3
- FMT_MOF.1: 6
- FMT_MOF.1.1: 1
- FMT_MSA: 14
- FMT_MSA.1: 7
- FMT_MSA.2: 11
- FMT_MSA.2.1: 1
- FMT_MSA.3: 21
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MSA.4: 8
- FMT_MSA.4.1: 1
- FMT_MTD: 97
- FMT_MTD.1: 11
- FMT_MTD.3: 9
- FMT_MTD.3.1: 1
- FMT_SMF: 1
- FMT_SMF.1: 55
- FMT_SMF.1.1: 1
- FMT_SMR: 19
- FMT_SMR.1: 42
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS: 9
- FPT_EMS.1: 17
- FPT_EMS.1.1: 1
- FPT_EMS.1.2: 1
- FPT_FLS.1: 9
- FPT_FLS.1.1: 1
- FPT_ITT.1: 1
- FPT_PHP.1: 6
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 11
- FPT_PHP.3.1: 1
- FPT_TST: 2
- FPT_TST.1: 16
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 2
- FPT_TST.2: 1
- FRU:
- FTP:
- FTP_ITC: 39
- FTP_ITC.1: 19
- FTP_TRP.1: 6
|
- FAU:
- FAU_GEN: 1
- FAU_SAS: 7
- FAU_SAS.1: 10
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 8
- FCS_CKM.1: 13
- FCS_CKM.4: 8
- FCS_CKM.4.1: 1
- FCS_COP: 44
- FCS_COP.1: 7
- FCS_RND: 8
- FCS_RND.1: 18
- FCS_RND.1.1: 2
- FDP:
- FDP_ACC.1: 6
- FDP_ACC.1.1: 1
- FDP_ACF: 1
- FDP_ACF.1: 6
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 4
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 5
- FDP_UCT.1: 9
- FDP_UCT.1.1: 1
- FDP_UIT.1: 8
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL.1: 6
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_API: 9
- FIA_API.1: 10
- FIA_API.1.1: 2
- FIA_SOS.2: 1
- FIA_UAU.1: 10
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 17
- FIA_UAU.4.1: 1
- FIA_UAU.5: 12
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 3
- FIA_UAU.6: 10
- FIA_UAU.6.1: 1
- FIA_UID.1: 7
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_LIM: 8
- FMT_LIM.1: 15
- FMT_LIM.1.1: 3
- FMT_LIM.2: 14
- FMT_LIM.2.1: 4
- FMT_MOF: 3
- FMT_MOF.1: 4
- FMT_MOF.1.1: 1
- FMT_MTD: 24
- FMT_MTD.1: 6
- FMT_SMF.1: 11
- FMT_SMF.1.1: 2
- FMT_SMR.1: 7
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 6
- FPT_FLS.1.1: 1
- FPT_PHP.1: 1
- FPT_PHP.3: 7
- FPT_PHP.3.1: 1
- FPT_RVM.1: 1
- FPT_SEP.1: 1
- FPT_TEE: 1
- FPT_TEE.1: 4
- FPT_TEE.1.1: 1
- FPT_TEE.1.2: 1
- FPT_TST.1: 11
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- OE:
- OE.CGA_TC_: 1
- OE.HID_VAD: 9
- OE.SCA_TC_DTBS_: 1
- OE.SSCD_: 1
- OT:
- OT.TOE_: 1
- OT.TOE_TC_VAD_: 1
|
- OE:
- OT:
- OT.CCLI_END: 7
- OT.PATCH_END: 7
- OT.PATCH_SEC: 5
- T:
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- 3DES:
- 3DES: 1
- TDEA: 1
- Triple-DES: 1
- DES:
- constructions:
|
|
pdf_data/st_keywords/asymmetric_crypto |
- ECC:
- FF:
- DH:
- DH: 11
- Diffie-Hellman: 16
- DSA:
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-2: 3
- SHA-256: 11
- SHA-384: 7
- SHA-512: 6
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-256: 3
- SHA-384: 2
- SHA-512: 2
|
pdf_data/st_keywords/crypto_scheme |
- KA:
- Key Agreement: 4
- Key agreement: 1
- MAC:
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- Brainpool:
- brainpoolP256r1: 1
- brainpoolP384r1: 1
- brainpoolP512r1: 1
- NIST:
- NIST P-384: 4
- NIST P-521: 4
- P-256: 4
- P-384: 8
- P-521: 8
- prime256v1: 1
- secp256r1: 1
- secp384r1: 1
- secp521r1: 1
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- DFA: 1
- Malfunction: 7
- Physical Tampering: 6
- Physical tampering: 2
- fault injection: 1
- malfunction: 6
- physical tampering: 5
- SCA:
- physical probing: 4
- side channel: 1
- other:
|
- FI:
- Malfunction: 3
- Physical Tampering: 3
- Physical tampering: 1
- fault injection: 1
- malfunction: 6
- physical tampering: 2
- SCA:
- DPA: 2
- SPA: 2
- Timing attacks: 1
- physical probing: 4
- timing attacks: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
- BSI:
- BSI TR-03110: 1
- BSI TR-03116: 1
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
- EF:
- EF.COM: 1
- EF.DG1: 7
- EF.DG14: 7
- EF.DG15: 3
- EF.DG16: 6
- EF.DG2: 2
- EF.DG3: 12
- EF.DG4: 12
- EF.DG5: 1
- EF.SOD: 8
|
- EF:
- EF.COM: 13
- EF.DG1: 33
- EF.DG13: 4
- EF.DG14: 2
- EF.DG15: 6
- EF.DG16: 33
- EF.DG2: 12
- EF.DG3: 10
- EF.DG4: 9
- EF.DG5: 10
- EF.SOD: 13
|
pdf_data/st_keywords/standard_id |
- BSI:
- AIS 20: 1
- AIS 31: 2
- AIS 36: 1
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
- FIPS:
- FIPS PUB 180-4: 1
- FIPS PUB 186-4: 1
- FIPS PUB 197: 2
- ICAO:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816-2: 1
- PKCS:
- RFC:
|
- BSI:
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- FIPS:
- FIPS 140-2: 4
- FIPS 180-2: 1
- FIPS 46-3: 2
- FIPS PUB 140-2: 1
- FIPS PUB 180-2: 1
- FIPS PUB 46-3: 1
- ICAO:
- ISO:
- ISO/IEC 14443: 6
- ISO/IEC 7816: 2
- ISO/IEC 7816-: 3
- ISO/IEC 7816-4: 1
- ISO/IEC 9796-2: 3
- RFC:
- SCP:
- SCP01: 2
- SCP02: 2
- SCP03: 1
|
pdf_data/st_keywords/javacard_version |
|
- GlobalPlatform:
- JavaCard:
|
pdf_data/st_keywords/javacard_api_const |
|
- ALG:
- ECDSA:
- ALG_ECDSA_SHA: 1
- ALG_ECDSA_SHA256: 1
- ALG_ECDSA_SHA_224: 1
- RSA:
- ALG_RSA_NOPAD: 1
- ALG_RSA_PCKS1: 1
- ALG_RSA_SHA256_PKCS1: 1
- ALG_RSA_SHA256_PKCS1_PSS: 1
- ALG_RSA_SHA_ISO9796: 1
- ALG_RSA_SHA_PKCS1: 1
- ALG_RSA_SHA_PKCS1_PSS: 1
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- it should then proceed with passive authentications. Others than above listed terminals are out of scope of this ST. In particular, terminals using Basic Access Control (BAC) may be functionally supported: 1
- out of scope: 1
|
|
pdf_data/st_metadata |
- /Author: Eviden Germany GmbH
- /Keywords: Common Criteria, CardOS, ASE, eID, ICAO, QSCD
- /Subject: Security Target CardOS V6.0
- /Title: Security Target 'CardOS V6.0 ID R1.2'
- pdf_file_size_bytes: 1798865
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 184
|
- /CreationDate: D:20111027152238
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20111027152238
- /Producer: Microsoft® Office Word 2007
- pdf_file_size_bytes: 873824
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 68
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |