This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.
Applet IAS Classic V3 sur plateforme Java Card ouverte MultiApp Essential V1.0 embarquée sur le composant M7794 A12 et G12 ANSSI-CC-2016/24 |
Plateforme Java Card MultiApp Essential v1.0, en configuration ouverte, sur le composant Infineon M7794 A12 ou G12 ANSSI-CC-2016/06 |
|
---|---|---|
name | Applet IAS Classic V3 sur plateforme Java Card ouverte MultiApp Essential V1.0 embarquée sur le composant M7794 A12 et G12 | Plateforme Java Card MultiApp Essential v1.0, en configuration ouverte, sur le composant Infineon M7794 A12 ou G12 |
not_valid_before | 2016-05-23 | 2016-02-26 |
not_valid_after | 2021-05-23 | 2021-02-26 |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible_2016-24.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible2016-06.pdf |
manufacturer | Gemalto | Gemalto - Infineon Technologies AG |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2016-24.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2016-06.pdf |
protection_profiles | frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 5: Extension for device with key gene...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0072b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Version...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 3: Device with key import', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0075b_pdf.pdf', 'pp_ids': frozenset({'PP_SSCD_PART3_V1.0.2'})}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 6: Extension for device with key impo...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0076b_pdf.pdf', 'pp_ids': None}) | frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Java Card™ System Protection Profile Open Configuration, Version 2.6', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/ANSSI-CC-cible_PP-2010-03en.pdf', 'pp_ids': frozenset({'PDCP_V1.3'})}) |
state/report/pdf_hash | 30dea023a9917d98b161550b494270b455c2a5e2926512175f70e9a748bc323d | 0eed897bdc5c775a356e599a5aa6e9c81f9d70f2e7ce4176880cbe49b269d6bb |
state/report/txt_hash | 1d9fda6501d56f9964b149f1af9ad45a688c8e492202906e1fa24372df94c0b7 | 4be834269926fef09a361f5f41ea1d9972062561c19f3fc2c153b54fad1c574c |
state/st/pdf_hash | 7903c404de0848263e1d2c1511d9a763f311e8373a7526274d325b7f4d83bd8d | adbcdf7bf5a2fcabad411debc00363a02c1d8c5244a1dda3a774f85907795956 |
state/st/txt_hash | 3773a168f362110369c751c34d08b9e13cec025d79becf88ba5592bcfe75da07 | 5e1c491b19945118bc765368575e8df8eba5820c556f36460f49710655060a95 |
heuristics/cert_id | ANSSI-CC-2016/24 | ANSSI-CC-2016/06 |
heuristics/report_references/directly_referenced_by | None | ANSSI-CC-2016/24 |
heuristics/report_references/directly_referencing | ANSSI-CC-2016/06, BSI-DSZ-CC-0964-2015 | ANSSI-CC-2015/73 |
heuristics/report_references/indirectly_referenced_by | None | ANSSI-CC-2016/24 |
heuristics/scheme_data/cert_id | 2016/24 | 2016/06 |
heuristics/scheme_data/description | Le produit certifié est la carte à puce composée de l’« Applet IAS Classic V3 sur plateforme Java Card ouverte MultiApp Essential V1.0 embarquée sur le composant M7794 A12 et G12 » développé par GEMALTO et INFINEON. Le produit se présente sous la forme d’une carte à puce au format ISO 7816 fonctionnant en mode contact (standard ISO 7816-3) et/ou sans-contact (standard ISO 14443) ; le microcontr | Le produit certifié est la « Plateforme Java Card MultiApp Essential v1.0, en configurationouverte, sur le composant Infineon M7794 A12 ou G12 » développé par GEMALTO etINFINEON. Le produit se présente sous la forme d’une carte à puce au format ISO 7816 et fonctionnant enmode contact (standard ISO 7816-3) ; la plateforme ouverte Java Card est destinée à fournirdes services de sécurité aux a |
heuristics/scheme_data/enhanced/cert_id | 2016/24 | 2016/06 |
heuristics/scheme_data/enhanced/certification_date | 23/05/2016 | 26/02/2016 |
heuristics/scheme_data/enhanced/protection_profile | PP-SSCD part 2, PP-SSCD part 3, PP-SSCD part 4, PP-SSCD part 5, PP-SSCD part 6 | PP-JCS Open Configuration |
heuristics/scheme_data/enhanced/report_link | https://cyber.gouv.fr/sites/default/files/2016/05/anssi-cc-2016-24.pdf | https://cyber.gouv.fr/sites/default/files/2016/03/ANSSI-CC-2016-06.pdf |
heuristics/scheme_data/enhanced/target_link | https://cyber.gouv.fr/sites/default/files/2016/05/cible_2016-24.pdf | https://cyber.gouv.fr/sites/default/files/2016/03/cible2016-06.pdf |
heuristics/scheme_data/product | Applet IAS Classic V3 sur plateforme JavaCard ouverte MultiApp Essential V1.0 embarquée sur le composant M7794 A12 et G12 | Plateforme Java Card MultiApp Essential v1.0, en configuration ouverte, sur le composant Infineon M7794 A12 ou G12 |
heuristics/scheme_data/url | https://cyber.gouv.fr/produits-certifies/applet-ias-classic-v3-sur-plateforme-javacard-ouverte-multiapp-essential-v10-0 | https://cyber.gouv.fr/produits-certifies/plateforme-java-card-multiapp-essential-v10-en-configuration-ouverte-sur-le-0 |
heuristics/st_references/directly_referencing | BSI-DSZ-CC-0917-2014, BSI-DSZ-CC-0926-2014 | None |
heuristics/st_references/indirectly_referencing | BSI-DSZ-CC-0917-2014, BSI-DSZ-CC-0926-2014 | None |
pdf_data/report_filename | ANSSI-CC-2016-24.pdf | ANSSI-CC-2016-06.pdf |
pdf_data/report_frontpage/FR/cert_id | ANSSI-CC-2016/24 | ANSSI-CC-2016/06 |
pdf_data/report_frontpage/FR/cert_item | Applet IAS Classic V3 sur plateforme Java Card ouverte MultiApp Essential V1.0 embarquée sur le composant M7794 A12 et G12 | Plateforme Java Card MultiApp Essential v1.0, en configuration ouverte, sur le composant Infineon M7794 A12 ou G12 |
pdf_data/report_frontpage/FR/cert_item_version | Version de l’application IAS Classic : 3.4.e Version de la plateforme Java Card MultiApp Essential : 1.0 | Version 1.0 |
pdf_data/report_frontpage/FR/match_rules | Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur\(s\)(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables | Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables |
pdf_data/report_frontpage/FR/ref_protection_profiles | PP-SSCD part 2], version 2.0.1 - PP for Secure Signature Creation Device – Part 2 : Device with key generation. [PP-SSCD part 3], version 1.0.2 - PP for Secure Signature Creation Device – Part 3 : Device with key import. [PP-SSCD part 4], version 1.0.1 - PP for Secure Signature Creation Device – Part 4 : Extension for device with key generation and trusted communication with certificate generation application. [PP-SSCD part 5], version 1.0.1 - PP for Secure Signature Creation Device – Part 5 : Extension for device with key generation and trusted communication with signature creation application. [PP-SSCD part 6], version 1.0.4 - PP for Secure Signature Creation Device – Part 6 : Extension for device with key import and trusted communication with signature creation application | Java Card System Protection Profile – Open Configuration [PP-JCS Open Configuration], version 3.0 |
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_cert_id/FR |
|
|
pdf_data/report_keywords/cc_cert_id/FR/ANSSI-CC-2016/06 | 1 | 22 |
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/report_keywords/cc_sar/AGD/AGD_OPE | 1 | 2 |
pdf_data/report_keywords/cc_sar/AGD/AGD_PRE | 1 | 2 |
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 | 2 | 3 |
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN.5 | 4 | 5 |
pdf_data/report_keywords/cc_security_level/EAL |
|
|
pdf_data/report_keywords/crypto_protocol | |
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis | |
|
pdf_data/report_keywords/vendor/Infineon/Infineon | 2 | 27 |
pdf_data/report_metadata//Author | Jonathan Gimenez | |
pdf_data/report_metadata//CreationDate | D:20160226154150+01'00' | |
pdf_data/report_metadata//Creator | PDFCreator Version 1.2.1 | Microsoft® Word 2010 |
pdf_data/report_metadata//Keywords | ANSSI-CC-CER-F-07.017 | |
pdf_data/report_metadata//ModDate | D:20160226154150+01'00' | |
pdf_data/report_metadata//Producer | GPL Ghostscript 9.02 | Microsoft® Word 2010 |
pdf_data/report_metadata//Subject | Plateforme Java Card MultiApp Essential v1.0, en configuration ouverte, sur le composant Infineon M7794 A12 ou G12 | |
pdf_data/report_metadata//Title | ANSSI-CC-2016-24 | ANSSI-CC-2016/06 |
pdf_data/report_metadata/pdf_file_size_bytes | 276790 | 796998 |
pdf_data/report_metadata/pdf_hyperlinks | mailto:[email protected], http://www.ssi.gouv.fr/ | |
pdf_data/report_metadata/pdf_number_of_pages | 18 | 21 |
pdf_data/st_filename | cible_2016-24.pdf | cible2016-06.pdf |
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto/FF/DH/DH | 1 | 10 |
pdf_data/st_keywords/cc_cert_id/DE |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/cc_claims/A |
|
|
pdf_data/st_keywords/cc_claims/OE |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/st_keywords/cc_protection_profile_id/other |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_security_level/EAL |
|
|
pdf_data/st_keywords/cc_security_level/EAL/EAL5 augmented | 1 | 2 |
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_sfr/FCS |
|
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 | 5 | 7 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1.1 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 | 8 | 2 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4.1 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 | 2 | 11 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1.1 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FDP |
|
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC | 4 | 14 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 | 14 | 1 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF | 4 | 16 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 | 6 | 13 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 | 9 | 1 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC | 2 | 4 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 | 4 | 5 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP | 1 | 17 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 | 1 | 8 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2.1 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2.2 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT | 3 | 2 |
pdf_data/st_keywords/cc_sfr/FIA |
|
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU | 5 | 2 |
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 | 4 | 1 |
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 | 6 | 2 |
pdf_data/st_keywords/cc_sfr/FMT |
|
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA | 14 | 21 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 | 3 | 5 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.2 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 | 5 | 10 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 | 8 | 3 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 | 11 | 8 |
pdf_data/st_keywords/cc_sfr/FPT |
|
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 | 2 | 5 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FTP |
|
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC | 13 | 2 |
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 | 2 | 3 |
pdf_data/st_keywords/certification_process | |
|
pdf_data/st_keywords/cipher_mode | |
|
pdf_data/st_keywords/crypto_protocol | |
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_scheme/MAC/MAC | 2 | 7 |
pdf_data/st_keywords/hash_function/SHA |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA2 |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-224 | 1 | 3 |
pdf_data/st_keywords/javacard_api_const | |
|
pdf_data/st_keywords/javacard_packages | |
|
pdf_data/st_keywords/javacard_version | |
|
pdf_data/st_keywords/randomness/RNG/RND | 1 | 10 |
pdf_data/st_keywords/randomness/RNG/RNG | 2 | 5 |
pdf_data/st_keywords/side_channel_analysis/FI |
|
|
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction | 1 | 3 |
pdf_data/st_keywords/side_channel_analysis/FI/physical tampering | 4 | 1 |
pdf_data/st_keywords/side_channel_analysis/SCA |
|
|
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent | 1 | 3 |
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/standard_id/CC |
|
|
pdf_data/st_keywords/standard_id/FIPS |
|
|
pdf_data/st_keywords/standard_id/PKCS |
|
|
pdf_data/st_keywords/standard_id/PKCS/PKCS#1 | 2 | 8 |
pdf_data/st_keywords/standard_id/PKCS/PKCS#3 | 2 | 1 |
pdf_data/st_keywords/standard_id/SCP |
|
|
pdf_data/st_keywords/standard_id/SCP/SCP03 | 1 | 3 |
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES | 1 | 14 |
pdf_data/st_keywords/symmetric_crypto/DES/3DES |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDES | 4 | 7 |
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES | 2 | 14 |
pdf_data/st_keywords/vendor/Gemalto/Gemalto | 339 | 520 |
pdf_data/st_keywords/vendor/Infineon/Infineon | 4 | 5 |
pdf_data/st_metadata//CreationDate | D:20160504105208+02'00' | D:20150908153505+02'00' |
pdf_data/st_metadata//Keywords | Security Target, CC, eTravel | Security Target, CC |
pdf_data/st_metadata//ModDate | D:20160504105208+02'00' | D:20150908153505+02'00' |
pdf_data/st_metadata//Subject | MRTD | Security Target |
pdf_data/st_metadata/pdf_file_size_bytes | 1225698 | 1662139 |
pdf_data/st_metadata/pdf_number_of_pages | 52 | 83 |
dgst | 89df7836e74b174e | 832bbe4dde3c99d0 |