This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.
Applet IAS Classic V3 sur plateforme Java Card ouverte MultiApp Essential V1.0 embarquée sur le composant M7794 A12 et G12 ANSSI-CC-2016/24 |
eTravel Essential 1.0 avec SAC, AA et EAC activés sur composants M7794 A12/G12 identifiant : B2 8C 01, version 01 02 ANSSI-CC-2020/83 |
|
---|---|---|
name | Applet IAS Classic V3 sur plateforme Java Card ouverte MultiApp Essential V1.0 embarquée sur le composant M7794 A12 et G12 | eTravel Essential 1.0 avec SAC, AA et EAC activés sur composants M7794 A12/G12 identifiant : B2 8C 01, version 01 02 |
not_valid_before | 2016-05-23 | 2020-12-15 |
not_valid_after | 2021-05-23 | 2025-12-15 |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible_2016-24.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-2020_83en.pdf |
status | archived | active |
manufacturer | Gemalto | Thales |
manufacturer_web | https://www.gemalto.com/ | None |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2016-24.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020-83fr.pdf |
cert_link | None | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat_2020_83fr.pdf |
protection_profiles | frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 5: Extension for device with key gene...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0072b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Version...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 3: Device with key import', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0075b_pdf.pdf', 'pp_ids': frozenset({'PP_SSCD_PART3_V1.0.2'})}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 6: Extension for device with key impo...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0076b_pdf.pdf', 'pp_ids': None}) | frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Machine Readable Travel Document with ICAO Application Extended Access Control with PACE, Version 1.3', 'pp_eal': 'EAL4', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0056_V2b_pdf.pdf', 'pp_ids': frozenset({'MRTD_ICAO_EAC_V1.3', 'MRTD-PP_V1.10'})}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Machine Readable Travel Document using Standard Inspection Procedure with PACE (PACE_PP)', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0068_V2b_pdf.pdf', 'pp_ids': frozenset({'EPASS_PACE_V1.0', 'MRTD_SAC_PACEV2_V1.0', 'EPASS_V1.0'})}) |
maintenance_updates | frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2022, 2, 18), 'maintenance_title': 'Maintenant report: ANSSI-CC-2020/83-M01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_83-m01.pdf', 'maintenance_st_link': None}) | |
state/cert/convert_ok | False | True |
state/cert/download_ok | False | True |
state/cert/extract_ok | False | True |
state/cert/pdf_hash | None | 426f00bb33b7f035657f92112253324a3cbe57e33a05e29704c5e76ec767848a |
state/cert/txt_hash | None | acd9a274b25496bfa3fab59e80192b5cfcd39aa189d2b932f1a2691e1337db5b |
state/report/convert_garbage | False | True |
state/report/pdf_hash | 30dea023a9917d98b161550b494270b455c2a5e2926512175f70e9a748bc323d | 7a5d78cc11943d2b42df3113da02191e51fc11e2d666ddaf00c325bd83be6a41 |
state/report/txt_hash | 1d9fda6501d56f9964b149f1af9ad45a688c8e492202906e1fa24372df94c0b7 | 3a631e0b048b479dc3b5b920a8f7b340029bb3a9ecca3955736b26e0ff556385 |
state/st/pdf_hash | 7903c404de0848263e1d2c1511d9a763f311e8373a7526274d325b7f4d83bd8d | d514ae71974f435d1a9f41202471b755ed8e711af8b67f60d25f0314b7af23f8 |
state/st/txt_hash | 3773a168f362110369c751c34d08b9e13cec025d79becf88ba5592bcfe75da07 | 395990b624f546bb98577e799df327d8501f2560506fd90cc514b5bd53f0e3dd |
heuristics/cert_id | ANSSI-CC-2016/24 | ANSSI-CC-2020/83 |
heuristics/cert_lab | SERMA | None |
heuristics/report_references/directly_referencing | ANSSI-CC-2016/06, BSI-DSZ-CC-0964-2015 | BSI-DSZ-CC-0964-V4-2019, ANSSI-CC-2015/32 |
heuristics/scheme_data |
|
|
heuristics/scheme_data/cert_id | 2016/24 | 2020/83 |
heuristics/scheme_data/description | Le produit certifié est la carte à puce composée de l’« Applet IAS Classic V3 sur plateforme Java Card ouverte MultiApp Essential V1.0 embarquée sur le composant M7794 A12 et G12 » développé par GEMALTO et INFINEON. Le produit se présente sous la forme d’une carte à puce au format ISO 7816 fonctionnant en mode contact (standard ISO 7816-3) et/ou sans-contact (standard ISO 14443) ; le microcontr | Le produit évalué est « eTravel Essential 1.0 avec SAC, AA et EAC activés sur composants M7794 A12/G12, identifiant : B2 8C 01, version 01 02 » développé par THALES et INFINEON TECHNOLOGIES AG. Le produit certifié est de type « carte à puce » avec et sans contact. Il implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisation de l’aviation civile |
heuristics/scheme_data/developer | Gemalto / Infineon | THALES INFINEON TECHNOLOGIES AG |
heuristics/scheme_data/enhanced |
|
|
heuristics/scheme_data/enhanced/cc_version | Critères Communs version 3.1r4 | Critères Communs version 3.1r5 |
heuristics/scheme_data/enhanced/cert_id | 2016/24 | 2020/83 |
heuristics/scheme_data/enhanced/certification_date | 23/05/2016 | 15/12/2020 |
heuristics/scheme_data/enhanced/developer | Gemalto / Infineon | THALES INFINEON TECHNOLOGIES AG |
heuristics/scheme_data/enhanced/evaluation_facility | Serma Safety & Security | SERMA SAFETY & SECURITY |
heuristics/scheme_data/enhanced/protection_profile | PP-SSCD part 2, PP-SSCD part 3, PP-SSCD part 4, PP-SSCD part 5, PP-SSCD part 6 | Machine Readable Travel Document with “ICAO Application”, Extended Access Control with PACE & Machine Readable Travel Document using Standard Inspection Procedure with PACE |
heuristics/scheme_data/enhanced/report_link | https://cyber.gouv.fr/sites/default/files/2016/05/anssi-cc-2016-24.pdf | https://cyber.gouv.fr/sites/default/files/2021/01/anssi-cc-2020-83fr.pdf |
heuristics/scheme_data/enhanced/sponsor | Gemalto | THALES INFINEON TECHNOLOGIES AG |
heuristics/scheme_data/enhanced/target_link | https://cyber.gouv.fr/sites/default/files/2016/05/cible_2016-24.pdf | https://cyber.gouv.fr/sites/default/files/2021/01/anssi-cible-2020_83-m01en.pdf |
heuristics/scheme_data/product | Applet IAS Classic V3 sur plateforme JavaCard ouverte MultiApp Essential V1.0 embarquée sur le composant M7794 A12 et G12 | eTravel Essential 1.0 avec SAC, AA et EAC activés sur composants M7794 A12/G12 identifiant : B2 8C 01, version 01 02 |
heuristics/scheme_data/sponsor | Gemalto | THALES INFINEON TECHNOLOGIES AG |
heuristics/scheme_data/url | https://cyber.gouv.fr/produits-certifies/applet-ias-classic-v3-sur-plateforme-javacard-ouverte-multiapp-essential-v10-0 | https://cyber.gouv.fr/produits-certifies/etravel-essential-10-avec-sac-aa-et-eac-actives-sur-composants-m7794-a12g12 |
heuristics/st_references/directly_referencing | BSI-DSZ-CC-0917-2014, BSI-DSZ-CC-0926-2014 | BSI-DSZ-CC-0964-V4-2019 |
heuristics/st_references/indirectly_referencing | BSI-DSZ-CC-0917-2014, BSI-DSZ-CC-0926-2014 | BSI-DSZ-CC-0964-V4-2019 |
pdf_data/cert_filename | None | certificat_2020_83fr.pdf |
pdf_data/cert_keywords | None |
|
pdf_data/cert_metadata | None |
|
pdf_data/report_filename | ANSSI-CC-2016-24.pdf | anssi-cc-2020-83fr.pdf |
pdf_data/report_frontpage/FR |
|
|
pdf_data/report_keywords/asymmetric_crypto | |
|
pdf_data/report_keywords/cc_cert_id/DE |
|
|
pdf_data/report_keywords/cc_cert_id/FR |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/report_keywords/cc_sar/AGD/AGD_PRE | 1 | 2 |
pdf_data/report_keywords/cc_sar/ALC |
|
|
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 | 2 | 3 |
pdf_data/report_keywords/cc_sar/AVA |
|
|
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN | 2 | 6 |
pdf_data/report_keywords/cc_security_level/EAL |
|
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 | 3 | 2 |
pdf_data/report_keywords/crypto_protocol | |
|
pdf_data/report_keywords/eval_facility/Serma |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/standard_id | |
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/vendor/Infineon |
|
|
pdf_data/report_metadata |
|
|
pdf_data/report_metadata//CreationDate | D:20201216183614+01'00' | |
pdf_data/report_metadata//ModDate | D:20201216183614+01'00' | |
pdf_data/report_metadata/pdf_file_size_bytes | 276790 | 2876998 |
pdf_data/report_metadata/pdf_hyperlinks | http://www.ssi.gouv.fr/, http://www.commoncriteriaportal.org/, http://www.sogis.eu/, mailto:[email protected], file://intranet.fr/sgdsn/anssi/SDE/PSS/CCN/Qualite/_répertoire%20de%20travail/ANSSI-CC-CER-F-07%20Rapport%20de%20certification/v30%20-%20Charte/Relecture/www.ssi.gouv.fr | |
pdf_data/report_metadata/pdf_number_of_pages | 18 | 16 |
pdf_data/st_filename | cible_2016-24.pdf | anssi-cible-2020_83en.pdf |
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto/FF/DH/DH | 1 | 9 |
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman | 2 | 9 |
pdf_data/st_keywords/cc_cert_id/DE |
|
|
pdf_data/st_keywords/cc_cert_id/NL/CC-1 | 2 | 5 |
pdf_data/st_keywords/cc_cert_id/NL/CC-2 | 3 | 6 |
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/cc_claims/OE |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 | 2 | 4 |
pdf_data/st_keywords/cc_sar/AVA |
|
|
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.5 | 2 | 4 |
pdf_data/st_keywords/cc_security_level/EAL/EAL 5+ | 1 | 2 |
pdf_data/st_keywords/cc_security_level/EAL/EAL5 | 2 | 5 |
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_sfr/FCS |
|
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM | 14 | 48 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 | 5 | 18 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 | 2 | 8 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 | 8 | 53 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4.1 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP | 8 | 70 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 | 2 | 9 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1.1 | 2 | 7 |
pdf_data/st_keywords/cc_sfr/FDP |
|
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC | 4 | 14 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 | 14 | 7 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1.1 | 4 | 1 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF | 4 | 11 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 | 6 | 10 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 | 4 | 1 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 | 4 | 2 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 | 4 | 1 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 | 4 | 1 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 | 9 | 4 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 | 4 | 16 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 | 4 | 16 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 | 1 | 7 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_UCT | 2 | 6 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_UCT.1 | 1 | 2 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT | 3 | 6 |
pdf_data/st_keywords/cc_sfr/FIA |
|
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL | 6 | 20 |
pdf_data/st_keywords/cc_sfr/FIA/FIA_API | 5 | 15 |
pdf_data/st_keywords/cc_sfr/FIA/FIA_API.1 | 8 | 6 |
pdf_data/st_keywords/cc_sfr/FIA/FIA_API.1.1 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU | 5 | 69 |
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID | 4 | 24 |
pdf_data/st_keywords/cc_sfr/FMT |
|
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 | 3 | 1 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 | 5 | 3 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD | 4 | 66 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1.1 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 | 8 | 48 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 | 11 | 3 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.1 | 1 | 2 |
pdf_data/st_keywords/cc_sfr/FPT |
|
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_EMS | 5 | 4 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_EMS.1 | 7 | 12 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 | 2 | 8 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 | 2 | 10 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 | 3 | 9 |
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC | 13 | 12 |
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 | 2 | 4 |
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.1 | 4 | 1 |
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.2 | 4 | 1 |
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.3 | 4 | 1 |
pdf_data/st_keywords/cc_sfr/FTP/FTP_TRP.1 | 2 | 4 |
pdf_data/st_keywords/cipher_mode | |
|
pdf_data/st_keywords/crypto_protocol | |
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_scheme/MAC/MAC | 2 | 6 |
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/ic_data_group | |
|
pdf_data/st_keywords/randomness/RNG |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/side_channel_analysis/FI |
|
|
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction | 1 | 5 |
pdf_data/st_keywords/side_channel_analysis/SCA |
|
|
pdf_data/st_keywords/side_channel_analysis/SCA/DPA | 1 | 2 |
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent | 1 | 2 |
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/standard_id/CC |
|
|
pdf_data/st_keywords/standard_id/FIPS |
|
|
pdf_data/st_keywords/standard_id/PKCS/PKCS#3 | 2 | 5 |
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES | 1 | 12 |
pdf_data/st_keywords/symmetric_crypto/DES |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDES | 4 | 7 |
pdf_data/st_keywords/technical_report_id | |
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/vendor/Gemalto/Gemalto | 339 | 19 |
pdf_data/st_metadata//Author | Antoine de Lavernette | D1315455 |
pdf_data/st_metadata//CreationDate | D:20160504105208+02'00' | D:20200928110811+02'00' |
pdf_data/st_metadata//Keywords | Security Target, CC, eTravel | 10-06-2020 |
pdf_data/st_metadata//ModDate | D:20160504105208+02'00' | D:20200928110811+02'00' |
pdf_data/st_metadata//Subject | MRTD | 1.7p |
pdf_data/st_metadata//Title | eTravel v1.0 Security Target MAÏA3 | Erodium2: eTravel Essential 1.0 EAC on PACE Security Target Lite |
pdf_data/st_metadata/pdf_file_size_bytes | 1225698 | 1509090 |
pdf_data/st_metadata/pdf_number_of_pages | 52 | 83 |
dgst | 89df7836e74b174e | 340aeee69861d949 |