name |
Applet IAS Classic V3 sur plateforme Java Card ouverte MultiApp Essential V1.0 embarquée sur le composant M7794 A12 et G12
|
Applet IAS Classic V3 sur plateforme Java Card ouverte MultiApp Essential V1.0 embarquée sur le composant M7793 A12 et G12
|
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
not_valid_before |
2016-05-23
|
2016-05-23
|
not_valid_after |
2021-05-23
|
2021-05-23
|
scheme |
FR
|
FR
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible_2016-24.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible_2016-23.pdf
|
status |
archived
|
archived
|
manufacturer |
Gemalto
|
Gemalto
|
manufacturer_web |
https://www.gemalto.com/
|
https://www.gemalto.com/
|
security_level |
EAL5+, AVA_VAN.5, ALC_DVS.2 |
EAL5+, AVA_VAN.5, ALC_DVS.2 |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2016-24.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2016-23.pdf
|
cert_link |
None
|
None
|
protection_profiles |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 5: Extension for device with key gene...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0072b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Version...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 3: Device with key import', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0075b_pdf.pdf', 'pp_ids': frozenset({'PP_SSCD_PART3_V1.0.2'})}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 6: Extension for device with key impo...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0076b_pdf.pdf', 'pp_ids': None}) |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 5: Extension for device with key gene...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0072b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Version...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 3: Device with key import', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0075b_pdf.pdf', 'pp_ids': frozenset({'PP_SSCD_PART3_V1.0.2'})}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 6: Extension for device with key impo...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0076b_pdf.pdf', 'pp_ids': None}) |
maintenance_updates |
|
|
state/cert |
- _type:
sec_certs.sample.cc.CCCertificate.DocumentState
- download_ok:
False
- convert_garbage:
False
- convert_ok:
False
- extract_ok:
False
- pdf_hash:
None
- txt_hash:
None
|
- _type:
sec_certs.sample.cc.CCCertificate.DocumentState
- download_ok:
False
- convert_garbage:
False
- convert_ok:
False
- extract_ok:
False
- pdf_hash:
None
- txt_hash:
None
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
30dea023a9917d98b161550b494270b455c2a5e2926512175f70e9a748bc323d
|
77f1bf97042b027d0aab5df6b633e332813f6e82305ae577ce5de164a21c53b3
|
state/report/txt_hash |
1d9fda6501d56f9964b149f1af9ad45a688c8e492202906e1fa24372df94c0b7
|
9a40f7f2e98e6a710e66586346c25c698a1a56470d069d842ca2aee8215caae8
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
7903c404de0848263e1d2c1511d9a763f311e8373a7526274d325b7f4d83bd8d
|
798b573ccc0303d931cc1084bfb0b3320332e35ff85b81a55a9e9acf6806ddd5
|
state/st/txt_hash |
3773a168f362110369c751c34d08b9e13cec025d79becf88ba5592bcfe75da07
|
a60ee89249f4900a34998c82d803b0ca2de8c90407e746228fe50d8353cffb1a
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
ANSSI-CC-2016/24
|
ANSSI-CC-2016/23
|
heuristics/cert_lab |
SERMA |
SERMA |
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_sars |
ALC_DVS.2, AVA_VAN.5 |
ALC_DVS.2, AVA_VAN.5 |
heuristics/extracted_versions |
1.0 |
1.0 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references/directly_referenced_by |
None
|
None
|
heuristics/report_references/directly_referencing |
ANSSI-CC-2016/06, BSI-DSZ-CC-0964-2015 |
ANSSI-CC-2015/73 |
heuristics/report_references/indirectly_referenced_by |
None
|
None
|
heuristics/scheme_data/cert_id |
2016/24
|
2016/23
|
heuristics/scheme_data/description |
Le produit certifié est la carte à puce composée de l’« Applet IAS Classic V3 sur plateforme Java Card ouverte MultiApp Essential V1.0 embarquée sur le composant M7794 A12 et G12 » développé par GEMALTO et INFINEON.
Le produit se présente sous la forme d’une carte à puce au format ISO 7816 fonctionnant en mode contact (standard ISO 7816-3) et/ou sans-contact (standard ISO 14443) ; le microcontr
|
Le produit certifié est la carte à puce composée de l’« Applet IAS Classic V3 sur plateforme Java Card ouverte MultiApp Essential V1.0 embarquée sur le composant M7793 A12 et G12 » développé par GEMALTO et INFINEON.
Le produit se présente sous la forme d’une carte à puce au format ISO 7816 fonctionnant en mode contact (standard ISO 7816-3) ; le microcontrôleur et la plateforme ouverte Java Car
|
heuristics/scheme_data/developer |
Gemalto / Infineon
|
Gemalto / Infineon
|
heuristics/scheme_data/enhanced/augmented |
ALC_DVS.2, AVA_VAN.5
|
ALC_DVS.2, AVA_VAN.5
|
heuristics/scheme_data/enhanced/category |
Cartes à puce
|
Cartes à puce
|
heuristics/scheme_data/enhanced/cc_version |
Critères Communs version 3.1r4
|
Critères Communs version 3.1r4
|
heuristics/scheme_data/enhanced/cert_id |
2016/24
|
2016/23
|
heuristics/scheme_data/enhanced/certification_date |
23/05/2016
|
23/05/2016
|
heuristics/scheme_data/enhanced/developer |
Gemalto / Infineon
|
Gemalto / Infineon
|
heuristics/scheme_data/enhanced/evaluation_facility |
Serma Safety & Security
|
Serma Safety & Security
|
heuristics/scheme_data/enhanced/level |
EAL5+
|
EAL5+
|
heuristics/scheme_data/enhanced/mutual_recognition |
SOG-IS
CCRA
|
SOG-IS
CCRA
|
heuristics/scheme_data/enhanced/protection_profile |
PP-SSCD part 2, PP-SSCD part 3, PP-SSCD part 4, PP-SSCD part 5, PP-SSCD part 6
|
PP-SSCD part 2, PP-SSCD part 3, PP-SSCD part 4, PP-SSCD part 5, PP-SSCD part 6
|
heuristics/scheme_data/enhanced/report_link |
https://cyber.gouv.fr/sites/default/files/2016/05/anssi-cc-2016-24.pdf
|
https://cyber.gouv.fr/sites/default/files/2016/05/anssi-cc-2016-23.pdf
|
heuristics/scheme_data/enhanced/sponsor |
Gemalto
|
Gemalto
|
heuristics/scheme_data/enhanced/target_link |
https://cyber.gouv.fr/sites/default/files/2016/05/cible_2016-24.pdf
|
https://cyber.gouv.fr/sites/default/files/2016/05/cible_2016-23.pdf
|
heuristics/scheme_data/level |
EAL5+
|
EAL5+
|
heuristics/scheme_data/product |
Applet IAS Classic V3 sur plateforme JavaCard ouverte MultiApp Essential V1.0 embarquée sur le composant M7794 A12 et G12
|
Applet IAS Classic V3 sur plateforme JavaCard ouverte MultiApp Essential V1.0 embarquée sur le composant M7793 A12 et G12
|
heuristics/scheme_data/sponsor |
Gemalto
|
Gemalto
|
heuristics/scheme_data/url |
https://cyber.gouv.fr/produits-certifies/applet-ias-classic-v3-sur-plateforme-javacard-ouverte-multiapp-essential-v10-0
|
https://cyber.gouv.fr/produits-certifies/applet-ias-classic-v3-sur-plateforme-javacard-ouverte-multiapp-essential-v10
|
heuristics/st_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
BSI-DSZ-CC-0917-2014, BSI-DSZ-CC-0926-2014
- indirectly_referencing:
BSI-DSZ-CC-0917-2014, BSI-DSZ-CC-0926-2014
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
BSI-DSZ-CC-0917-2014, BSI-DSZ-CC-0926-2014
- indirectly_referencing:
BSI-DSZ-CC-0917-2014, BSI-DSZ-CC-0926-2014
|
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
None
|
None
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords |
None
|
None
|
pdf_data/cert_metadata |
None
|
None
|
pdf_data/report_filename |
ANSSI-CC-2016-24.pdf
|
ANSSI-CC-2016-23.pdf
|
pdf_data/report_frontpage/FR/cc_security_level |
EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
|
EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
|
pdf_data/report_frontpage/FR/cc_version |
Critères Communs version 3.1 révision 4
|
Critères Communs version 3.1 révision 4
|
pdf_data/report_frontpage/FR/cert_id |
ANSSI-CC-2016/24
|
ANSSI-CC-2016/23
|
pdf_data/report_frontpage/FR/cert_item |
Applet IAS Classic V3 sur plateforme Java Card ouverte MultiApp Essential V1.0 embarquée sur le composant M7794 A12 et G12
|
Applet IAS Classic V3 sur plateforme Java Card ouverte MultiApp Essential V1.0 embarquée sur le composant M7793 A12 et G12
|
pdf_data/report_frontpage/FR/cert_item_version |
Version de l’application IAS Classic : 3.4.e Version de la plateforme Java Card MultiApp Essential : 1.0
|
Version de l’application IAS Classic : 3.4.e Version de la plateforme Java Card MultiApp Essential : 1.0
|
pdf_data/report_frontpage/FR/cert_lab |
Serma Safety & Security 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
|
Serma Safety & Security 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
|
pdf_data/report_frontpage/FR/developer |
Gemalto 6 rue de la Verrerie, 92190 Meudon Cedex, France Infineon Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92190 Meudon Cedex, France
|
Gemalto 6 rue de la Verrerie, 92190 Meudon Cedex, France Infineon Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92190 Meudon Cedex, France
|
pdf_data/report_frontpage/FR/match_rules |
Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur\(s\)(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables
|
Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables
|
pdf_data/report_frontpage/FR/ref_protection_profiles |
PP-SSCD part 2], version 2.0.1 - PP for Secure Signature Creation Device – Part 2 : Device with key generation. [PP-SSCD part 3], version 1.0.2 - PP for Secure Signature Creation Device – Part 3 : Device with key import. [PP-SSCD part 4], version 1.0.1 - PP for Secure Signature Creation Device – Part 4 : Extension for device with key generation and trusted communication with certificate generation application. [PP-SSCD part 5], version 1.0.1 - PP for Secure Signature Creation Device – Part 5 : Extension for device with key generation and trusted communication with signature creation application. [PP-SSCD part 6], version 1.0.4 - PP for Secure Signature Creation Device – Part 6 : Extension for device with key import and trusted communication with signature creation application
|
PP-SSCD part 2], version 2.0.1 - PP for Secure Signature Creation Device – Part 2 : Device with key generation. [PP-SSCD part 3], version 1.0.2 - PP for Secure Signature Creation Device – Part 3 : Device with key import. [PP-SSCD part 4], version 1.0.1 - PP for Secure Signature Creation Device – Part 4 : Extension for device with key generation and trusted communication with certificate generation application. [PP-SSCD part 5], version 1.0.1 - PP for Secure Signature Creation Device – Part 5 : Extension for device with key generation and trusted communication with signature creation application. [PP-SSCD part 6], version 1.0.4 - PP for Secure Signature Creation Device – Part 6 : Extension for device with key import and trusted communication with signature creation application
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id/DE |
|
|
pdf_data/report_keywords/cc_cert_id/FR |
- ANSSI-CC-2016/24:
19
- ANSSI-CC-2016/06:
1
|
- ANSSI-CC-2016/23:
19
- ANSSI-CC-2015/73:
1
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/cc_protection_profile_id/BSI |
- BSI-CC-PP- 0059-2009-MA-01:
2
- BSI-CC-PP- 0075-2012:
1
- BSI-CC-PP- 0071-2012:
1
- BSI-CC-PP- 0072-2012:
1
- BSI-PP-0035-2007:
1
|
- BSI-CC-PP- 0059-2009-MA-01:
1
- BSI-CC-PP- 0075-2012:
1
- BSI-CC-PP- 0071-2012:
1
- BSI-CC-PP- 0072-2012:
1
- BSI-CC-PP-0076-: 1
- BSI-PP-0035-2007:
1
|
pdf_data/report_keywords/cc_protection_profile_id/BSI/BSI-CC-PP- 0059-2009-MA-01 |
2
|
1
|
pdf_data/report_keywords/cc_protection_profile_id/BSI/BSI-CC-PP- 0071-2012 |
1
|
1
|
pdf_data/report_keywords/cc_protection_profile_id/BSI/BSI-CC-PP- 0072-2012 |
1
|
1
|
pdf_data/report_keywords/cc_protection_profile_id/BSI/BSI-CC-PP- 0075-2012 |
1
|
1
|
pdf_data/report_keywords/cc_protection_profile_id/BSI/BSI-PP-0035-2007 |
1
|
1
|
pdf_data/report_keywords/cc_protection_profile_id/other |
- PP-SSCD part:
10
- PP-SSCD-:
5
|
- PP-SSCD part:
10
- PP-SSCD-:
5
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_INT:
1
- ADV_SPM:
1
- ADV_TDS:
1
- AGD:
- ALC:
- ALC_DVS.2:
2
- ALC_FLR:
2
- ALC_CMC:
1
- ALC_CMS:
1
- ALC_DEL:
1
- ALC_DVS:
1
- ALC_TAT:
1
- ATE:
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
- AVA:
- ASE:
- ASE_CCL:
1
- ASE_ECD:
1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_REQ:
1
- ASE_SPD:
1
- ASE_TSS:
1
|
- ADV:
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_INT:
1
- ADV_SPM:
1
- ADV_TDS:
1
- AGD:
- ALC:
- ALC_DVS.2:
2
- ALC_FLR:
2
- ALC_CMC:
1
- ALC_CMS:
1
- ALC_DEL:
1
- ALC_DVS:
1
- ALC_TAT:
1
- ATE:
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
- AVA:
- ASE:
- ASE_CCL:
1
- ASE_ECD:
1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_REQ:
1
- ASE_SPD:
1
- ASE_TSS:
1
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 5:
3
- EAL2:
2
- EAL7:
1
- EAL 1:
1
- EAL 3:
1
- EAL 7:
1
- ITSEC:
|
- EAL:
- EAL 5:
3
- EAL2:
2
- EAL7:
1
- EAL 1:
1
- EAL 3:
1
- EAL 7:
1
- ITSEC:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
- Serma:
- Serma Safety & Security:
1
- SERMA:
1
|
- Serma:
- Serma Safety & Security:
1
- SERMA:
1
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor |
- Infineon:
- Infineon:
2
- Infineon Technologies:
1
- Gemalto:
|
- Infineon:
- Infineon:
2
- Infineon Technologies:
1
- Gemalto:
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata//Author |
|
|
pdf_data/report_metadata//CreationDate |
|
|
pdf_data/report_metadata//Creator |
PDFCreator Version 1.2.1
|
PDFCreator Version 1.2.1
|
pdf_data/report_metadata//Keywords |
|
|
pdf_data/report_metadata//ModDate |
|
|
pdf_data/report_metadata//Producer |
GPL Ghostscript 9.02
|
GPL Ghostscript 9.02
|
pdf_data/report_metadata//Subject |
|
|
pdf_data/report_metadata//Title |
ANSSI-CC-2016-24
|
ANSSI-CC-2016-23
|
pdf_data/report_metadata/pdf_file_size_bytes |
276790
|
277080
|
pdf_data/report_metadata/pdf_hyperlinks |
|
|
pdf_data/report_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/report_metadata/pdf_number_of_pages |
18
|
18
|
pdf_data/st_filename |
cible_2016-24.pdf
|
cible_2016-23.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords |
- cc_cert_id:
- DE:
- BSI-DSZ-CC-0926-2014:
1
- BSI-DSZ-CC-0917-2014:
1
- NL:
- cc_protection_profile_id:
- BSI:
- BSI-PP-0035:
1
- BSI-CC-PP-0059-2009-MA-01:
1
- BSI-CC-PP-0075-2012:
1
- BSI-CC-PP-0071-2012:
1
- BSI-CC-PP-0072-2012:
1
- BSI-CC-PP-0076-2013:
1
- other:
- PP-SSCD-KG:
36
- PP-SSCD-KI:
28
- PP-SSCD:
4
- cc_security_level:
- EAL:
- EAL 5+:
1
- EAL5:
2
- EAL5 augmented:
1
- cc_sar:
- cc_sfr:
- FCS:
- FCS_CKM:
14
- FCS_CKM.4:
8
- FCS_COP:
8
- FCS_CKM.2:
2
- FCS_COP.1:
2
- FCS_CKM.1.1:
2
- FCS_CKM.1:
5
- FCS_CKM.4.1:
2
- FCS_COP.1.1:
2
- FDP:
- FDP_DAU:
4
- FDP_UIT:
3
- FDP_ITC.1:
4
- FDP_ITC.2:
4
- FDP_ACC:
4
- FDP_ACF.1:
6
- FDP_ACC.1.1:
4
- FDP_ACF:
4
- FDP_ACC.1:
14
- FDP_ACF.1.1:
4
- FDP_ACF.1.2:
4
- FDP_ACF.1.3:
4
- FDP_ACF.1.4:
4
- FDP_DAU.1:
1
- FDP_DAU.2.1:
1
- FDP_DAU.2.2:
1
- FDP_ITC:
2
- FDP_IFC.1:
9
- FDP_ITC.1.1:
1
- FDP_ITC.1.2:
1
- FDP_ITC.1.3:
1
- FDP_RIP.1:
1
- FDP_RIP.1.1:
1
- FDP_SDI:
4
- FDP_SDI.1:
2
- FDP_SDI.2.1:
2
- FDP_SDI.2.2:
2
- FDP_UCT.1:
1
- FDP_UCT.1.1:
1
- FDP_UIT.1.1:
1
- FDP_UIT.1.2:
1
- FDP_UCT:
2
- FDP_RIP:
1
- FIA:
- FIA_API:
5
- FIA_AFL:
6
- FIA_API.1:
8
- FIA_API.1.1:
2
- FIA_UAU.1:
4
- FIA_UID.1:
6
- FIA_AFL.1.1:
2
- FIA_AFL.1.2:
2
- FIA_UAU:
5
- FIA_UAU.1.1:
2
- FIA_UAU.1.2:
2
- FIA_UID:
4
- FIA_UID.1.1:
2
- FIA_UID.1.2:
2
- FMT:
- FMT_MSA.3:
5
- FMT_MOF.1:
2
- FMT_SMR.1:
11
- FMT_SMF.1:
8
- FMT_MOF.1.1:
1
- FMT_MSA:
14
- FMT_MSA.1.1:
3
- FMT_MSA.2:
2
- FMT_MSA.1:
3
- FMT_MSA.2.1:
1
- FMT_MSA.3.1:
2
- FMT_MSA.3.2:
2
- FMT_MSA.4.1:
2
- FMT_MTD:
4
- FMT_MTD.1.1:
2
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FPT:
- FPT_EMS:
5
- FPT_EMS.1:
7
- FPT_EMS.1.1:
3
- FPT_EMS.1.2:
3
- FPT_TST.1:
3
- FPT_FLS.1:
2
- FPT_FLS.1.1:
1
- FPT_TST:
2
- FPT_PHP.1:
2
- FPT_PHP.1.1:
1
- FPT_PHP.1.2:
1
- FPT_PHP.3:
2
- FPT_PHP.3.1:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FTP:
- FTP_ITC:
13
- FTP_ITC.1:
2
- FTP_TRP.1:
2
- FTP_ITC.1.1:
4
- FTP_ITC.1.2:
4
- FTP_ITC.1.3:
4
- cc_claims:
- A:
- A.CGA:
4
- A.SCA:
4
- A.CSP:
5
- OE:
- OE.HI_VAD:
2
- OE.HID_VAD:
2
- vendor:
- eval_facility:
- symmetric_crypto:
- asymmetric_crypto:
- pq_crypto:
- hash_function:
- crypto_scheme:
- crypto_protocol:
- randomness:
- cipher_mode:
- ecc_curve:
- crypto_engine:
- tls_cipher_suite:
- crypto_library:
- vulnerability:
- side_channel_analysis:
- SCA:
- Leak-Inherent:
1
- SPA:
1
- DPA:
1
- timing attacks:
1
- FI:
- physical tampering:
4
- Malfunction:
1
- technical_report_id:
- device_model:
- tee_name:
- os_name:
- cplc_data:
- ic_data_group:
- standard_id:
- FIPS:
- FIPS180-2:
1
- FIPS46-3:
1
- FIPS PUB 46-3:
1
- PKCS:
- SCP:
- CC:
- CCMB-2012-09-001:
1
- CCMB-2012-09-002:
1
- CCMB-2012-09-003:
1
- CCMB-2009-07-004:
1
- javacard_version:
- javacard_api_const:
- javacard_packages:
- certification_process:
|
- cc_cert_id:
- DE:
- BSI-DSZ-CC-0926-2014:
1
- BSI-DSZ-CC-0917-2014:
1
- NL:
- cc_protection_profile_id:
- BSI:
- BSI-PP-0035:
1
- BSI-CC-PP-0059-2009-MA-01:
1
- BSI-CC-PP-0075-2012:
1
- BSI-CC-PP-0071-2012:
1
- BSI-CC-PP-0072-2012:
1
- BSI-CC-PP-0076-2013:
1
- other:
- PP-SSCD-KG:
36
- PP-SSCD-KI:
28
- PP-SSCD:
4
- cc_security_level:
- EAL:
- EAL 5+:
1
- EAL5:
2
- EAL5 augmented:
1
- cc_sar:
- cc_sfr:
- FCS:
- FCS_CKM:
14
- FCS_CKM.4:
8
- FCS_COP:
8
- FCS_CKM.2:
2
- FCS_COP.1:
2
- FCS_CKM.1.1:
2
- FCS_CKM.1:
5
- FCS_CKM.4.1:
2
- FCS_COP.1.1:
2
- FDP:
- FDP_DAU:
4
- FDP_UIT:
3
- FDP_ITC.1:
4
- FDP_ITC.2:
4
- FDP_ACC:
4
- FDP_ACF.1:
6
- FDP_ACC.1.1:
4
- FDP_ACF:
4
- FDP_ACC.1:
14
- FDP_ACF.1.1:
4
- FDP_ACF.1.2:
4
- FDP_ACF.1.3:
4
- FDP_ACF.1.4:
4
- FDP_DAU.1:
1
- FDP_DAU.2.1:
1
- FDP_DAU.2.2:
1
- FDP_ITC:
2
- FDP_IFC.1:
9
- FDP_ITC.1.1:
1
- FDP_ITC.1.2:
1
- FDP_ITC.1.3:
1
- FDP_RIP.1:
1
- FDP_RIP.1.1:
1
- FDP_SDI:
4
- FDP_SDI.1:
2
- FDP_SDI.2.1:
2
- FDP_SDI.2.2:
2
- FDP_UCT.1:
1
- FDP_UCT.1.1:
1
- FDP_UIT.1.1:
1
- FDP_UIT.1.2:
1
- FDP_UCT:
2
- FDP_RIP:
1
- FIA:
- FIA_API:
5
- FIA_AFL:
6
- FIA_API.1:
8
- FIA_API.1.1:
2
- FIA_UAU.1:
4
- FIA_UID.1:
6
- FIA_AFL.1.1:
2
- FIA_AFL.1.2:
2
- FIA_UAU:
5
- FIA_UAU.1.1:
2
- FIA_UAU.1.2:
2
- FIA_UID:
4
- FIA_UID.1.1:
2
- FIA_UID.1.2:
2
- FMT:
- FMT_MSA.3:
5
- FMT_MOF.1:
2
- FMT_SMR.1:
11
- FMT_SMF.1:
8
- FMT_MOF.1.1:
1
- FMT_MSA:
14
- FMT_MSA.1.1:
3
- FMT_MSA.2:
2
- FMT_MSA.1:
3
- FMT_MSA.2.1:
1
- FMT_MSA.3.1:
2
- FMT_MSA.3.2:
2
- FMT_MSA.4.1:
2
- FMT_MTD:
4
- FMT_MTD.1.1:
2
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FPT:
- FPT_EMS:
5
- FPT_EMS.1:
7
- FPT_EMS.1.1:
3
- FPT_EMS.1.2:
3
- FPT_TST.1:
3
- FPT_FLS.1:
2
- FPT_FLS.1.1:
1
- FPT_TST:
2
- FPT_PHP.1:
2
- FPT_PHP.1.1:
1
- FPT_PHP.1.2:
1
- FPT_PHP.3:
2
- FPT_PHP.3.1:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FTP:
- FTP_ITC:
13
- FTP_ITC.1:
2
- FTP_TRP.1:
2
- FTP_ITC.1.1:
4
- FTP_ITC.1.2:
4
- FTP_ITC.1.3:
4
- cc_claims:
- A:
- A.CGA:
4
- A.SCA:
4
- A.CSP:
5
- OE:
- OE.HI_VAD:
2
- OE.HID_VAD:
2
- vendor:
- eval_facility:
- symmetric_crypto:
- asymmetric_crypto:
- pq_crypto:
- hash_function:
- crypto_scheme:
- crypto_protocol:
- randomness:
- cipher_mode:
- ecc_curve:
- crypto_engine:
- tls_cipher_suite:
- crypto_library:
- vulnerability:
- side_channel_analysis:
- SCA:
- Leak-Inherent:
1
- SPA:
1
- DPA:
1
- timing attacks:
1
- FI:
- physical tampering:
4
- Malfunction:
1
- technical_report_id:
- device_model:
- tee_name:
- os_name:
- cplc_data:
- ic_data_group:
- standard_id:
- FIPS:
- FIPS180-2:
1
- FIPS46-3:
1
- FIPS PUB 46-3:
1
- PKCS:
- SCP:
- CC:
- CCMB-2012-09-001:
1
- CCMB-2012-09-002:
1
- CCMB-2012-09-003:
1
- CCMB-2009-07-004:
1
- javacard_version:
- javacard_api_const:
- javacard_packages:
- certification_process:
|
pdf_data/st_metadata//Author |
Antoine de Lavernette
|
Antoine de Lavernette
|
pdf_data/st_metadata//CreationDate |
D:20160504105208+02'00'
|
D:20160504104918+02'00'
|
pdf_data/st_metadata//Creator |
Microsoft® Word 2013
|
Microsoft® Word 2013
|
pdf_data/st_metadata//Keywords |
Security Target, CC, eTravel
|
Security Target, CC, eTravel
|
pdf_data/st_metadata//ModDate |
D:20160504105208+02'00'
|
D:20160504104918+02'00'
|
pdf_data/st_metadata//Producer |
Microsoft® Word 2013
|
Microsoft® Word 2013
|
pdf_data/st_metadata//Subject |
MRTD
|
MRTD
|
pdf_data/st_metadata//Title |
eTravel v1.0 Security Target MAÏA3
|
eTravel v1.0 Security Target MAÏA3
|
pdf_data/st_metadata/pdf_file_size_bytes |
1225698
|
1238467
|
pdf_data/st_metadata/pdf_hyperlinks |
|
|
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
52
|
52
|
dgst |
89df7836e74b174e
|
9aa814bc0df8341c
|