Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
HSL Secure KVM Models SK21D-3, SK21P-3, SK21H-3, SX22D-3, SX22H-3, DK22H-3, DK22P-3, DK22D-3, DK22PD-3, SK41D-3, SK41DU-3, SK41P-3, SK41PU-3, SK41H-3, SK41HU-3, DK42D-3, DK42DU-3, DK42P-3, DK42PU-3, DK42H-3, DK42HU-3, SX42DU-3, SX42PU-3, SX42HU-3, SK81DU-3, DK82DU-3, and SK161DU-3
CCEVS-VR-VID-10983-2019
Plateforme Java Card MultiApp V5.0.A - version 5.0.A
ANSSI-CC-2022/52
name HSL Secure KVM Models SK21D-3, SK21P-3, SK21H-3, SX22D-3, SX22H-3, DK22H-3, DK22P-3, DK22D-3, DK22PD-3, SK41D-3, SK41DU-3, SK41P-3, SK41PU-3, SK41H-3, SK41HU-3, DK42D-3, DK42DU-3, DK42P-3, DK42PU-3, DK42H-3, DK42HU-3, SX42DU-3, SX42PU-3, SX42HU-3, SK81DU-3, DK82DU-3, and SK161DU-3 Plateforme Java Card MultiApp V5.0.A - version 5.0.A
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme US FR
status archived active
not_valid_after 31.07.2021 14.11.2027
not_valid_before 31.07.2019 14.11.2022
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10983-ci.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-cc-2022_52.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10983-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2022_52fr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10983-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2022_52en.pdf
manufacturer High Security Labs Ltd. THALES DIS FRANCE SA
manufacturer_web https://www.highseclabs.com/ https://www.thalesgroup.com/en/europe/france
security_level {} EAL6+, ALC_FLR.1
dgst 8950f9478f4a0cdf 70c176a3a9ae4afe
heuristics/cert_id CCEVS-VR-VID-10983-2019 ANSSI-CC-2022/52
heuristics/cert_lab US []
heuristics/extracted_sars ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, AGD_PRE.1 ASE_INT.1, ALC_DVS.2, ADV_TDS.5, ASE_ECD.1, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ATE_FUN.2, ALC_TAT.3, ADV_FSP.5, AGD_OPE.1, AGD_PRE.1, ATE_DPT.3, ADV_ARC.1, ALC_CMC.5, ADV_IMP.2, ASE_OBJ.2, ASE_REQ.2, ADV_INT.3, ATE_IND.2, ASE_CCL.1, ATE_COV.3, ADV_SPM.1
heuristics/extracted_versions 3 5.0
heuristics/report_references/directly_referenced_by {} ANSSI-CC-2022/57, ANSSI-CC-2022/56, ANSSI-CC-2022/54, ANSSI-CC-2022/55
heuristics/report_references/directly_referencing {} ANSSI-CC-2022/10, BSI-DSZ-CC-1107-V2-2021
heuristics/report_references/indirectly_referenced_by {} ANSSI-CC-2022/57, ANSSI-CC-2022/56, ANSSI-CC-2022/54, ANSSI-CC-2022/55
heuristics/report_references/indirectly_referencing {} ANSSI-CC-2021/42, BSI-DSZ-CC-1107-2020, ANSSI-CC-2022/10, BSI-DSZ-CC-1107-V2-2021
heuristics/scheme_data
  • category: Peripheral Switch
  • certification_date: 31.07.2019
  • evaluation_facility: DXC.technology
  • expiration_date: 31.07.2021
  • id: CCEVS-VR-VID10983
  • product: HSL Secure KVM Models SK21D-3, SK21P-3, SK21H-3, SX22D-3, SX22H-3, DK22H-3, DK22P-3, DK22D-3, DK22PD-3, SK41D-3, SK41DU-3, SK41P-3, SK41PU-3, SK41H-3, SK41HU-3, DK42D-3, DK42DU-3, DK42P-3, DK42PU-3, DK42H-3, DK42HU-3, SX42DU-3, SX42PU-3, SX42HU-3, SK81DU-3, DK82DU-3, and SK161DU-3
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10983
  • vendor: High Sec Labs, Inc.
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-1107-V2-2021
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-1107-V2-2021
heuristics/protection_profiles da2e45c9b3fbb700 94167fd161e87d71
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_pss_v3.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0099b_pdf.pdf
pdf_data/cert_filename st_vid10983-ci.pdf certificat-cc-2022_52.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10983-2019: 1
  • FR:
    • ANSSI-CC-2022/52: 2
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL6: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR.1: 1
pdf_data/cert_keywords/eval_facility
  • CEA-LETI:
    • CEA - LETI: 2
pdf_data/cert_metadata
  • /CreationDate: D:20190814133107-04'00'
  • /ModDate: D:20190814133107-04'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 181262
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: DUCLOS Charlene
  • /CreationDate: D:20221117141107+01'00'
  • /Creator: Microsoft® Word 2019
  • /Keywords: version x.x, révision x
  • /ModDate: D:20221117141107+01'00'
  • /Producer: Microsoft® Word 2019
  • /Title: ANSSI-CC-2022/52
  • pdf_file_size_bytes: 290196
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename st_vid10983-vr.pdf anssi-cc-2022_52fr.pdf
pdf_data/report_frontpage
  • FR:
  • US:
    • cert_id: CCEVS-VR-VID10983-2019
    • cert_item: High Security Labs Secure KVM Models SK21D-3, SK21P-3, SK21H-3, SX22D-3, SX22H-3, DK22H-3, DK22P-3, DK22D-3, DK22PD-3, SK41D-3, SK41DU-3, SK41P-3, SK41PU-3, SK41H-3, SK41HU-3, DK42D-3, DK42DU-3, DK42P-3, DK42PU-3, DK42H-3, DK42HU-3, SX42DU-3, SX42PU-3, SX42HU-3, SK81DU-3, DK82DU-3, SK161DU-3
    • cert_lab: US NIAP
  • FR:
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10983-2019: 1
  • DE:
    • BSI-DSZ-CC-1107-V2-2021: 1
  • FR:
    • ANSSI-CC-2022/10: 2
    • ANSSI-CC-2022/52: 19
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0099-V2-2020: 2
    • BSI-PP-0084-2014: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 6: 1
    • EAL2: 2
    • EAL6+: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • AVA:
    • AVA_VAN.1: 1
  • AGD:
    • AGD_OPE: 4
    • AGD_PRE: 6
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.1: 1
  • AVA:
    • AVA_VAN: 1
pdf_data/report_keywords/cc_sfr
  • FDP:
    • FDP_IFF.1: 2
    • FDP_IFF.1.5: 1
    • FDP_RIP.1.1: 2
  • FMT:
    • FMT_MOF.1.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.NO_SPECIAL_ANALOG_CAPABILITIES: 1
    • A.NO_TEMPEST: 1
    • A.PHYSICAL: 1
    • A.TRUSTED_ADMIN: 1
    • A.TRUSTED_CONFIG: 1
  • O:
    • O.ANTI_TAMPERING: 1
    • O.ANTI_TAMPERING_BACKUP_FAIL: 1
    • O.ANTI_TAMPERING_BACKUP_POW: 1
    • O.ANTI_TAMPERING_INDICATION: 1
    • O.ANTI_TAMPERING_PERMANENTL: 1
    • O.AUTHORIZED_SWITCHING: 1
    • O.COMPUTER_INTERFACE_ISOLATI: 2
    • O.COMPUTER_TO_AUDIO_ISOLATIO: 1
    • O.CONTINUOUS_INDICATION: 1
    • O.DISABLE_UNAUTHORIZED_ENDP: 1
    • O.DISABLE_UNAUTHORIZED_PERIP: 1
    • O.DISPLAYPORT_AUX_FILTERING: 1
    • O.KEYBOARD_AND_MOUSE_TIED: 1
    • O.KEYBOARD_MOUSE_EMULATED: 1
    • O.KEYBOARD_MOUSE_UNIDIRECTI: 1
    • O.NO_AMBIGUOUS_CONTROL: 1
    • O.NO_ANALOG_AUDIO_INPUT: 1
    • O.NO_CONNECTED_COMPUTER_CO: 1
    • O.NO_DOCKING_PROTOCOLS: 1
    • O.NO_OTHER_EXTERNAL_INTERFA: 1
    • O.NO_TOE_ACCESS: 1
    • O.NO_USER_DATA_RETENTION: 1
    • O.PERIPHERAL_PORTS_ISOLATION: 1
    • O.PURGE_TOE_KB_DATA_WHILE_S: 1
    • O.SELF_TEST: 1
    • O.SELF_TEST_FAIL_INDICATION: 1
    • O.SELF_TEST_FAIL_TOE_DISABLE: 1
    • O.TAMPER_EVIDENT_LABEL: 1
    • O.UNIDIRECTIONAL_AUDIO_OUT: 1
    • O.UNIDIRECTIONAL_VIDEO: 1
    • O.UNIDIRERCTIONAL_EDID: 1
    • O.USER_AUTHENTICATION_ADMIN: 1
    • O.USER_AUTHENTICATION_ISOLAT: 1
    • O.USER_AUTHENTICATION_RESET: 1
    • O.USER_AUTHENTICATION_TERMINATION: 1
    • O.USER_DATA_ISOLATION: 1
  • OE:
    • OE.PHYSICAL: 1
    • OE.TRUSTED_ADMIN: 1
  • T:
    • T.AUDIO_REVERSED: 1
    • T.AUTHORIZED_BUT_UNTRUSTED_DEVICES: 1
    • T.DATA_LEAK: 1
    • T.FAILED: 1
    • T.LOGICAL_TAMPER: 1
    • T.MICROPHONE_USE: 1
    • T.PHYSICAL_TAMPER: 1
    • T.REPLACEMENT: 1
    • T.RESIDUAL_LEAK: 1
    • T.SIGNAL_LEAK: 1
    • T.UNAUTHORIZED_DEVICES: 1
    • T.UNINTENDED_SWITCHING: 1
pdf_data/report_keywords/vendor
  • Gemalto:
    • Gemalto: 1
  • Infineon:
    • Infineon Technologies AG: 1
  • Thales:
    • Thales: 4
pdf_data/report_keywords/eval_facility
  • DXC:
    • DXC Technology: 5
  • CEA-LETI:
    • CEA - LETI: 1
  • CESTI:
    • CESTI: 4
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DH: 13
pdf_data/report_keywords/crypto_protocol
  • PACE:
    • PACE: 1
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • physical tampering: 1
pdf_data/report_keywords/cplc_data
  • ICFab:
    • IC Fabricator: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
pdf_data/report_keywords/javacard_version
  • JavaCard:
    • Java Card 3.1: 3
pdf_data/report_metadata
  • /CreationDate: D:20190814100254-04'00'
  • /ModDate: D:20190814100254-04'00'
  • pdf_file_size_bytes: 852805
  • pdf_hyperlinks: http://highseclabs.com/page/?pid=23
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 27
pdf_data/st_filename st_vid10983-st.pdf anssi-cible-cc-2022_52en.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1107-V2-2021: 1
  • NL:
    • CC-1: 2
    • CC-2: 3
    • CC-3: 4
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0068-V2-2011-MA-01: 1
    • BSI-CC-PP-0084-: 1
    • BSI-CC-PP-0099-V2-2020: 1
    • BSI-PP-0055-: 1
    • BSI-PP-0056-V2-MA-2012: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 6+: 1
    • EAL6: 31
    • EAL6 augmented: 1
    • EAL6+: 3
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 2
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 8
    • ADV_FSP.1: 1
    • ADV_FSP.2: 2
    • ADV_FSP.4: 2
    • ADV_FSP.5: 5
    • ADV_IMP.1: 6
    • ADV_IMP.2: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM.1: 8
    • ADV_TDS.1: 2
    • ADV_TDS.3: 3
    • ADV_TDS.4: 7
    • ADV_TDS.5: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 7
    • AGD_PRE: 1
    • AGD_PRE.1: 6
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMC.5: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 2
    • ALC_DVS.1: 1
    • ALC_DVS.2: 3
    • ALC_FLR.1: 5
    • ALC_LCD.1: 4
    • ALC_TAT.1: 2
    • ALC_TAT.2: 3
    • ALC_TAT.3: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 2
    • ATE_COV.3: 1
    • ATE_DPT.1: 1
    • ATE_DPT.3: 2
    • ATE_FUN.1: 6
    • ATE_FUN.2: 1
    • ATE_IND.2: 2
  • AVA:
    • AVA_VAN.5: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 3
    • FAU_GEN.1.1: 2
    • FAU_GEN.1.2: 2
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 18
    • FDP_ACC.1.1: 1
    • FDP_ACF: 1
    • FDP_ACF.1: 15
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 79
    • FDP_IFC.1.1: 2
    • FDP_IFF: 2
    • FDP_IFF.1: 87
    • FDP_IFF.1.1: 2
    • FDP_IFF.1.2: 3
    • FDP_IFF.1.3: 3
    • FDP_IFF.1.4: 2
    • FDP_IFF.1.5: 14
    • FDP_RIP: 1
    • FDP_RIP.1: 11
    • FDP_RIP.1.1: 3
  • FIA:
    • FIA_UAU.1: 1
    • FIA_UAU.2: 3
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 3
    • FIA_UID.2: 5
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF: 1
    • FMT_MOF.1: 7
    • FMT_MOF.1.1: 2
    • FMT_MSA: 1
    • FMT_MSA.3: 12
    • FMT_SMF: 1
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 5
    • FMT_SMR.1.1: 1
  • FPT:
    • FPT_FLS: 1
    • FPT_FLS.1: 14
    • FPT_FLS.1.1: 1
    • FPT_PHP: 1
    • FPT_PHP.1: 9
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 20
    • FPT_PHP.3.1: 1
    • FPT_TST: 1
    • FPT_TST.1: 16
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_ATH_EXT: 1
    • FTA_ATH_EXT.1: 11
    • FTA_ATH_EXT.1.1: 2
    • FTA_CIN_EXT: 6
    • FTA_CIN_EXT.1: 9
    • FTA_CIN_EXT.1.1: 2
    • FTA_SSL.4: 1
    • FTA_TAB.1: 1
  • FAU:
    • FAU_ARP.1: 16
    • FAU_ARP.1.1: 1
    • FAU_SAA.1: 2
    • FAU_SAS.1: 2
  • FCO:
    • FCO_NRO: 6
    • FCO_NRO.2: 3
  • FCS:
    • FCS_CKM: 66
    • FCS_CKM.1: 30
    • FCS_CKM.1.1: 3
    • FCS_CKM.2: 11
    • FCS_CKM.2.1: 1
    • FCS_CKM.3: 6
    • FCS_CKM.3.1: 1
    • FCS_CKM.4: 29
    • FCS_CKM.4.1: 2
    • FCS_CMK.4: 2
    • FCS_COP: 74
    • FCS_COP.1: 32
    • FCS_COP.1.1: 5
    • FCS_RNG: 27
    • FCS_RNG.1: 15
    • FCS_RNG.1.1: 3
    • FCS_RNG.1.2: 3
  • FDP:
    • FDP_ACC: 59
    • FDP_ACC.1: 23
    • FDP_ACC.2: 6
    • FDP_ACF: 53
    • FDP_ACF.1: 30
    • FDP_IFC: 26
    • FDP_IFC.1: 14
    • FDP_IFC.2: 2
    • FDP_IFF: 18
    • FDP_IFF.1: 14
    • FDP_ITC: 12
    • FDP_ITC.1: 12
    • FDP_ITC.2: 17
    • FDP_ITT.1: 2
    • FDP_RIP: 109
    • FDP_RIP.1: 11
    • FDP_RIP.1.1: 1
    • FDP_ROL: 14
    • FDP_ROL.1: 5
    • FDP_SDC.1: 2
    • FDP_SDI: 9
    • FDP_SDI.2: 4
    • FDP_UCT.1: 2
    • FDP_UIT: 7
    • FDP_UIT.1: 4
  • FIA:
    • FIA_AFL: 27
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_API: 1
    • FIA_API.1: 2
    • FIA_ATD: 20
    • FIA_ATD.1: 4
    • FIA_UAU: 82
    • FIA_UAU.1: 6
    • FIA_UAU.1.1: 3
    • FIA_UAU.1.2: 3
    • FIA_UAU.4: 1
    • FIA_UAU.4.1: 1
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6.1: 1
    • FIA_UID: 61
    • FIA_UID.1: 21
    • FIA_UID.1.1: 3
    • FIA_UID.1.2: 3
    • FIA_UID.2: 1
    • FIA_USB: 7
    • FIA_USB.1: 3
  • FMT:
    • FMT_LIM: 42
    • FMT_LIM.1: 17
    • FMT_LIM.1.1: 3
    • FMT_LIM.2: 16
    • FMT_LIM.2.1: 3
    • FMT_MSA: 127
    • FMT_MSA.1: 15
    • FMT_MSA.2: 2
    • FMT_MSA.3: 24
    • FMT_MTD: 73
    • FMT_MTD.1: 13
    • FMT_MTD.3: 1
    • FMT_SMF: 94
    • FMT_SMF.1: 31
    • FMT_SMF.1.1: 2
    • FMT_SMR: 108
    • FMT_SMR.1: 42
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 2
  • FPR:
    • FPR_UNO: 6
    • FPR_UNO.1: 9
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_EMS: 4
    • FPT_EMS.1: 16
    • FPT_EMS.1.1: 3
    • FPT_EMS.1.2: 3
    • FPT_FLS: 63
    • FPT_FLS.1: 19
    • FPT_FLS.1.1: 2
    • FPT_ITT: 7
    • FPT_ITT.1: 2
    • FPT_PHP: 8
    • FPT_PHP.3: 19
    • FPT_PHP.3.1: 1
    • FPT_RCV: 14
    • FPT_RCV.3: 4
    • FPT_RCV.4: 2
    • FPT_TDC.1: 8
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TST: 10
    • FPT_TST.1: 17
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_TST.2: 2
  • FRU:
    • FRU_FLT.2: 2
  • FTP:
    • FTP_ITC: 20
    • FTP_ITC.1: 7
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP: 12
    • FTP_TRP.1: 10
pdf_data/st_keywords/cc_claims
  • A:
    • A.NO_SPECIAL_ANALOG_CAPABILITIES: 2
    • A.NO_TEMPEST: 3
    • A.PHYSICAL: 3
    • A.TRUSTED_ADMIN: 2
    • A.TRUSTED_CONFIG: 3
  • O:
    • O.ANTI_TAMPERING: 8
    • O.ANTI_TAMPERING_BACKUP_FAIL_T: 1
    • O.ANTI_TAMPERING_BACKUP_FAIL_TR: 1
    • O.ANTI_TAMPERING_BACKUP_FAIL_TRIGG: 2
    • O.ANTI_TAMPERING_BACKUP_FAIL_TRIGGE: 1
    • O.ANTI_TAMPERING_BACKUP_FAIL_TRIGGER: 2
    • O.ANTI_TAMPERING_BACKUP_POWER: 7
    • O.ANTI_TAMPERING_INDICATION: 7
    • O.ANTI_TAMPERING_PERMANENTLY_: 2
    • O.ANTI_TAMPERING_PERMANENTLY_DISA: 2
    • O.ANTI_TAMPERING_PERMANENTLY_DISAB: 1
    • O.ANTI_TAMPERING_PERMANENTLY_DISABLE_TOE: 3
    • O.AUTHORIZED_SWITCHING: 7
    • O.COMPUTER_INTERFACE_ISOLATION: 12
    • O.COMPUTER_INTERFACE_ISOLATION_: 1
    • O.COMPUTER_INTERFACE_ISOLATION_TO: 1
    • O.COMPUTER_INTERFACE_ISOLATION_TOE: 2
    • O.COMPUTER_INTERFACE_ISOLATION_TOE_UNPOWERED: 4
    • O.COMPUTER_TO_AUDIO_ISOLATION: 7
    • O.CONTINUOUS_INDICATION: 7
    • O.DISABLE_UNAUTHORIZED_ENDPOIN: 2
    • O.DISABLE_UNAUTHORIZED_ENDPOINTS: 5
    • O.DISABLE_UNAUTHORIZED_PERIPHER: 2
    • O.DISABLE_UNAUTHORIZED_PERIPHERAL: 5
    • O.DISPLAYPORT_AUX_FILTERING: 1
    • O.KEYBOARD_AND_MOUSE_TIED: 7
    • O.KEYBOARD_MOUSE_EMULATED: 7
    • O.KEYBOARD_MOUSE_UNIDIRECTION: 1
    • O.KEYBOARD_MOUSE_UNIDIRECTIONA: 1
    • O.KEYBOARD_MOUSE_UNIDIRECTIONAL: 5
    • O.NO_AMBIGUOUS_CONTROL: 7
    • O.NO_ANALOG_AUDIO_INPUT: 8
    • O.NO_CONNECTED_COMPUTER_CONT: 2
    • O.NO_CONNECTED_COMPUTER_CONTRO: 1
    • O.NO_CONNECTED_COMPUTER_CONTROL: 4
    • O.NO_DOCKING_PROTOCOLS: 7
    • O.NO_OTHER_EXTERNAL_INTERFACES: 10
    • O.NO_TOE_ACCESS: 8
    • O.NO_USER_DATA_RETENTION: 9
    • O.PERIPHERAL_PORTS_ISOLATION: 12
    • O.PURGE_TOE: 3
    • O.PURGE_TOE_KB_DATA_WHILE_SWI: 1
    • O.PURGE_TOE_KB_DATA_WHILE_SWIT: 1
    • O.PURGE_TOE_KB_DATA_WHILE_SWITCHI: 2
    • O.SELF_TEST: 9
    • O.SELF_TEST_FAIL_INDICATION: 7
    • O.SELF_TEST_FAIL_TOE_DISABLE: 9
    • O.TAMPER_EVIDENT_LABEL: 9
    • O.UNIDIRECTIONAL_AUDIO_OUT: 7
    • O.UNIDIRECTIONAL_VIDEO: 7
    • O.UNIDIRERCTIONAL_EDID: 7
    • O.USER_AUTHENTICATION_ADMIN: 7
    • O.USER_AUTHENTICATION_ISOLATION: 7
    • O.USER_AUTHENTICATION_RESET: 11
    • O.USER_AUTHENTICATION_TERMINATION: 1
    • O.USER_DATA_ISOLATION: 9
  • OE:
    • OE.PHYSICAL: 4
    • OE.TRUSTED_ADMIN: 6
  • T:
    • T.AUDIO_REVERSED: 1
    • T.AUTHORIZED_BUT_UNT: 1
    • T.AUTHORIZED_BUT_UNTRUSTED_DEVICES: 1
    • T.DATA_LEAK: 3
    • T.FAILED: 2
    • T.LOGICAL_TAMPER: 3
    • T.MICROPHONE_USE: 1
    • T.PHYSICAL_TAMPER: 2
    • T.REPLACEMENT: 3
    • T.RESIDUAL_LEAK: 3
    • T.SIGNAL_LEAK: 2
    • T.UNAUTHORIZED_DEVIC: 1
    • T.UNAUTHORIZED_DEVICES: 2
    • T.UNINTENDED_SWITCHI: 1
    • T.UNINTENDED_SWITCHING: 1
  • A:
    • A.CAP_FILE: 3
    • A.DELETION: 3
    • A.OS-UPDATE-EVIDENCE: 3
    • A.SECURE_ACODE_MANAGEMENT: 3
    • A.VERIFICATION: 3
  • D:
    • D.AAS_ID: 1
    • D.API_DATA: 3
    • D.APP_CODE: 6
    • D.APP_C_DATA: 3
    • D.APP_I_DATA: 5
    • D.APP_KEYS: 1
    • D.CRYPTO: 5
    • D.JCS_CODE: 6
    • D.JCS_DATA: 8
    • D.OS-: 1
    • D.OS-UPDATE-CODE-ID: 3
    • D.OS-UPDATE_ADDITIONALCODE: 5
    • D.OS-UPDATE_DEC-KEY: 2
    • D.OS-UPDATE_SGNVER-KEY: 2
    • D.PIN: 4
    • D.SEC_DATA: 7
  • O:
    • O.AES: 1
    • O.ALARM: 15
    • O.APPLET: 28
    • O.ARRAY_VIEWS_CONFID: 7
    • O.ARRAY_VIEWS_INTEG: 3
    • O.CARD-MANAGEMENT: 5
    • O.CARD_MANAGEMENT: 18
    • O.CIPHER: 10
    • O.CODE_CAP_FILE: 23
    • O.CONFID-OS-UPDATE: 4
    • O.DELETION: 4
    • O.FIREWALL: 12
    • O.GLOBAL_ARRAYS_CONFID: 9
    • O.GLOBAL_ARRAYS_INTEG: 5
    • O.INSTALL: 8
    • O.JAVAOBJECT: 68
    • O.KEY-MNGT: 6
    • O.LOAD: 11
    • O.NATIVE: 12
    • O.OBJ-DELETION: 4
    • O.OBJ_DELETION: 4
    • O.OPERATE: 15
    • O.PIN-MNGT: 6
    • O.PIN_MNGT: 4
    • O.REALLOCATION: 5
    • O.RESOURCES: 9
    • O.RND: 2
    • O.RNG: 11
    • O.SCP: 37
    • O.SECURE_AC_ACTIVATION: 10
    • O.SECURE_LOAD_ACODE: 14
    • O.SID: 13
    • O.TDES: 1
    • O.TOE_IDENTIFICATION: 7
    • O.TRANSACTION: 6
  • OE:
    • OE.CAP_FILE: 5
    • OE.CARD-: 1
    • OE.CARD-MANAGEMENT: 2
    • OE.CODE-: 1
    • OE.CODE-EVIDENCE: 10
    • OE.NATIVE: 1
    • OE.OS-UPDATE-ENCRYPTION: 5
    • OE.OS-UPDATE-EVIDENCE: 2
    • OE.SCP: 8
    • OE.SECURE_ACODE_MANAGEMENT: 2
    • OE.VERIFICATION: 25
  • OP:
    • OP.ARRAY_AASTORE: 3
    • OP.ARRAY_ACCESS: 7
    • OP.ARRAY_LENGTH: 3
    • OP.ARRAY_T_ALOAD: 3
    • OP.ARRAY_T_ASTORE: 3
    • OP.CREATE: 11
    • OP.DELETE_APPLET: 6
    • OP.DELETE_CAP_FILE: 4
    • OP.DELETE_CAP_FILE_APPLET: 4
    • OP.INSTANCE_FIELD: 6
    • OP.INVK_INTERFACE: 10
    • OP.INVK_VIRTUAL: 8
    • OP.JAVA: 8
    • OP.PUT: 7
    • OP.PUTFIELD: 1
    • OP.PUTSTATIC: 1
    • OP.THROW: 7
    • OP.TYPE_ACCESS: 7
  • OSP:
    • OSP: 1
    • OSP.ADDITIONAL_CODE_ENCRYPTION: 3
    • OSP.ADDITIONAL_CODE_SIGNING: 3
    • OSP.ATOMIC_ACTIVATION: 6
    • OSP.RNG: 3
    • OSP.TOE_IDENTIFICATION: 6
    • OSP.VERIFICATION: 3
  • OT:
    • OT.X: 1
  • R:
    • R.JAVA: 12
  • T:
    • T.CONFID-APPLI-DATA: 3
    • T.CONFID-JCS-CODE: 3
    • T.CONFID-JCS-DATA: 3
    • T.CONFID-OS-UPDATE_LOAD: 3
    • T.CONFID_INTEG_SERVICE_DEPLOYEMENT: 3
    • T.DELETION: 3
    • T.EXE-CODE: 6
    • T.FAKE-SGNVER-KEY: 3
    • T.INSTALL: 3
    • T.INTEG-APPLI-CODE: 6
    • T.INTEG-APPLI-DATA: 6
    • T.INTEG-JCS-CODE: 3
    • T.INTEG-JCS-DATA: 3
    • T.INTEG-OS-UPDATE_LOAD: 3
    • T.NATIVE: 3
    • T.OBJ-DELETION: 3
    • T.PHYSICAL: 3
    • T.RESOURCES: 3
    • T.SID: 6
    • T.UNAUTHORIZED_TOE_CODE_UPDATE: 3
    • T.WRONG-UPDATE-STATE: 3
    • T.WRONG_SERVICE_DEPLOYEMENT_STATE: 3
pdf_data/st_keywords/vendor
  • Gemalto:
    • Gemalto: 2
  • Infineon:
    • Infineon: 14
  • Thales:
    • Thales: 47
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 29
      • AES-256: 2
  • DES:
    • 3DES:
      • 3DES: 2
      • TDEA: 1
      • TDES: 14
      • Triple-DES: 3
    • DES:
      • DES: 20
  • constructions:
    • MAC:
      • CMAC: 3
      • HMAC: 3
      • KMAC: 3
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DH: 12
  • ECC:
    • ECC:
      • ECC: 12
    • ECDH:
      • ECDH: 8
    • ECDSA:
      • ECDSA: 4
  • FF:
    • DH:
      • DH: 13
      • Diffie-Hellman: 5
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 4
      • SHA1: 2
    • SHA2:
      • SHA-224: 2
      • SHA-256: 2
      • SHA-384: 1
      • SHA-512: 2
      • SHA2: 1
      • SHA224: 1
    • SHA3:
      • SHA3: 2
      • SHA3-384: 1
      • SHA3-512: 1
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 6
    • Key agreement: 2
  • MAC:
    • MAC: 14
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 169
pdf_data/st_keywords/randomness
  • PRNG:
    • PRNG: 1
  • RNG:
    • RND: 5
    • RNG: 44
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 3
  • ECB:
    • ECB: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Physical tampering: 1
    • physical tampering: 14
  • FI:
    • Malfunction: 5
    • Physical Tampering: 3
    • fault induction: 2
    • malfunction: 8
    • physical tampering: 1
  • SCA:
    • DPA: 2
    • Leak-Inherent: 2
    • SPA: 1
    • physical probing: 6
    • timing attacks: 1
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 2
pdf_data/st_keywords/cplc_data
  • ICFab:
    • IC Fabricator: 1
  • ICType:
    • IC Type: 1
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.DG1: 6
    • EF.DG16: 6
    • EF.DG3: 1
    • EF.DG4: 1
    • EF.SOD: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • BSI:
    • AIS20: 1
    • AIS31: 6
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS 197: 1
    • FIPS180-2: 1
    • FIPS197: 5
  • ICAO:
    • ICAO: 1
  • NIST:
    • SP 800-67: 1
  • PKCS:
    • PKCS#1: 7
    • PKCS#5: 5
  • SCP:
    • SCP01: 4
    • SCP02: 4
    • SCP03: 9
pdf_data/st_keywords/javacard_version
  • JavaCard:
    • Java Card 3.1: 8
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 7
pdf_data/st_keywords/javacard_packages
  • java:
    • java.lang: 1
  • javacard:
    • javacard.framework: 3
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • 1, are out of the scope of the SPM as they are linked to the applet loading or deletion that is out of scope of the SPM boundaries limited to VM opcodes MultiApp V5.0.A JCS platform public Security Target ST: 1
    • Context, the Selected Applet Context, and the Active Applets Note: the Selected Applet context is out of scope of the VM functionalities. It is a process that occurs prior to VM start 8.1.1.1.2 Application: 1
    • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
    • out of scope: 4
    • the scope because done before the JCVM entering (selection of the applet) Note: The Array View is out of scope of this modelisation ADV_SPM.1.2D For each policy covered by the formal security policy model, the: 1
pdf_data/st_metadata
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/convert_garbage False True
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different