Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
BAE Systems STOP™ 8.8.2
553-EWA
ST31P450 A02
ANSSI-CC-2020/04
name BAE Systems STOP™ 8.8.2 ST31P450 A02
category Operating Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme CA FR
not_valid_after 15.09.2028 02.02.2027
not_valid_before 15.09.2023 18.02.2020
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/553-EWA%20CT%20v1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2020_04-s02.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/553-EWA%20CR%20v1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_04.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/553-EWA%20ST%20v0.24.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2020_04en.pdf
manufacturer BAE Systems STMicroelectronics
manufacturer_web https://www.baesystems.com https://www.st.com/
security_level {} EAL5+, ALC_DVS.2, ASE_TSS.2, AVA_VAN.5
dgst 8a5ef8e5642a483d 68fe039987fcd01f
heuristics/cert_id 553-EWA ANSSI-CC-2020/04
heuristics/cert_lab CANADA THALES
heuristics/extracted_sars ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_OBJ.2, ASE_REQ.2, ASE_CCL.1, ASE_ECD.1, ALC_TSU_EXT.1, AGD_PRE.1 ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.4, ASE_TSS.2, ALC_TAT.2, ASE_REQ.2, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions 8.8.2 -
heuristics/report_references/directly_referenced_by {} BSI-DSZ-CC-1198-2022, ANSSI-CC-2022/50, ANSSI-CC-2022/43
heuristics/report_references/indirectly_referenced_by {} BSI-DSZ-CC-1198-2022, ANSSI-CC-2022/50, ANSSI-CC-2022/43
heuristics/scheme_data
  • certification_date: 15.09.2023
  • level: PP_OS_V4.2.1
  • product: BAE Systems STOP™ 8.8.2
  • vendor: BAE Systems
heuristics/st_references/directly_referenced_by {} BSI-DSZ-CC-1198-2022
heuristics/st_references/indirectly_referenced_by {} BSI-DSZ-CC-1198-2022
heuristics/protection_profiles e34797b67a3163c5 cf0f01bcd7be3e9c
maintenance_updates


protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_OS_V4.2.1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf
pdf_data/cert_filename 553-EWA CT v1.0.pdf certificat-anssi-cc-2020_04-s02.pdf
pdf_data/cert_keywords/cc_cert_id
  • CA:
    • 553-EWA: 1
  • FR:
    • ANSSI-CC-2020/04-S02: 2
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-201: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 1
  • ASE:
    • ASE_TSS.2: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/eval_facility
  • EWA:
    • EWA-Canada: 1
pdf_data/cert_metadata
  • /Author:
  • /CreationDate: D:20230925152434-04'00'
  • /Creator:
  • /Keywords:
  • /ModDate: D:20230925152502-05'00'
  • /Producer: Foxit PDF Editor Printer Version 12.1.0.15345
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 364620
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: DUCLOS Charlene
  • /CreationDate: D:20220203120312+01'00'
  • /Creator: Microsoft® Word 2019
  • /Keywords: version x.x, révision x
  • /ModDate: D:20220203120312+01'00'
  • /Producer: Microsoft® Word 2019
  • /Title: ANSSI-CC-2020/04
  • pdf_file_size_bytes: 279198
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename 553-EWA CR v1.0.pdf anssi-cc-2020_04.pdf
pdf_data/report_frontpage
  • FR:
  • CA:
    • cert_id: 553-EWA
    • cert_lab: CANADA
  • FR:
    • cc_security_level: EAL 5 augmenté ASE_TSS.2, ALC_DVS.2, AVA_VAN.5
    • cc_version: Critères Communs version 3.1 révision 5
    • cert_id: ANSSI-CC-2020/04
    • cert_item: ST31P450 A02
    • cert_item_version: A02
    • cert_lab: THALES / CNES 290 allée du Lac, 31670 Labège, France
    • developer: STMicroelectronics 190 avenue Célestin Coq, ZI de Rousset, 13106 Rousset Cedex, France Commanditaire STMicroelectronics 1 190 avenue Célestin Coq, ZI de Rousset, 13106 Rousset Cedex, France
    • match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur (.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
    • ref_protection_profiles: Security IC Platform Protection Profile with Augmentation Packages, version 1.0 certifié BSI-CC-PP-0084-2014 le 19 février 2014 avec conformité aux packages “Authentication of the security IC” “Loader dedicated for usage in Secured Environment only” “Loader dedicated for usage by authorized users only
  • CA:
pdf_data/report_keywords/cc_cert_id
  • CA:
    • 553-EWA: 1
  • FR:
    • ANSSI-CC-2020/04: 18
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 1
    • BSI-PP-0084-2014: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 5: 3
    • EAL 7: 1
    • EAL2: 1
    • EAL4: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 2
    • ALC_FLR: 2
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
    • ASE_TSS.2: 2
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 3
pdf_data/report_keywords/vendor
  • STMicroelectronics:
    • STM: 11
    • STMicroelectronics: 5
pdf_data/report_keywords/eval_facility
  • EWA:
    • EWA-Canada: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • constructions:
    • MAC:
      • HMAC: 1
  • AES_competition:
    • AES:
      • AES: 2
  • DES:
    • DES:
      • DES: 2
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 1
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 1
pdf_data/report_keywords/randomness
  • PRNG:
    • DRBG: 1
  • TRNG:
    • TRNG: 2
pdf_data/report_keywords/cipher_mode
  • XTS:
    • XTS: 1
pdf_data/report_keywords/crypto_engine
  • NesCrypt:
    • NESCRYPT: 1
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 2
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 17025: 2
  • BSI:
    • AIS 31: 1
    • AIS31: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • ISO:
    • ISO/IEC 14443: 2
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. The user of the OS is not willfully negligent or hostile and uses the software in: 1
    • out of scope: 1
pdf_data/report_metadata
  • /CreationDate: D:20200220174121+01'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20200220174143+01'00'
  • /Producer: Acrobat Distiller 11.0 (Windows)
  • /Title:
  • pdf_file_size_bytes: 353288
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 17
pdf_data/st_filename 553-EWA ST v0.24.pdf anssi-cible-cc-2020_04en.pdf
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0084-2014: 10
    • BSI-CC-PP-0084-: 3
    • BSI-CC-PP-0084-2014: 63
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 1
    • EAL5: 17
    • EAL5 augmented: 2
    • EAL5+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
    • ALC_TSU_EXT: 1
    • ALC_TSU_EXT.1: 8
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_ARC: 2
    • ADV_ARC.1: 1
    • ADV_FSP: 4
    • ADV_FSP.5: 3
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_INT.2: 1
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.4: 1
    • ALC_CMS: 1
    • ALC_CMS.5: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 5
    • ALC_LCD.1: 1
    • ALC_TAT.2: 1
  • ASE:
    • ASE_CCL: 4
    • ASE_CCL.1: 1
    • ASE_ECD: 4
    • ASE_ECD.1: 1
    • ASE_INT: 2
    • ASE_INT.1: 1
    • ASE_OBJ: 11
    • ASE_OBJ.2: 1
    • ASE_REQ: 29
    • ASE_REQ.2: 1
    • ASE_SPD: 7
    • ASE_SPD.1: 1
    • ASE_TSS: 7
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV: 3
    • ATE_COV.2: 1
    • ATE_DPT.3: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 5
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 6
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
  • FCS:
    • FCS_CKM.1: 6
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 6
    • FCS_CKM.2.1: 1
    • FCS_CKM_EXT.4: 7
    • FCS_CKM_EXT.4.1: 3
    • FCS_CKM_EXT.4.2: 1
    • FCS_COP: 1
    • FCS_COP.1: 40
    • FCS_COP.1.1: 4
    • FCS_DTLS_EXT.1: 1
    • FCS_RBG_EXT.1: 9
    • FCS_RBG_EXT.1.1: 2
    • FCS_RBG_EXT.1.2: 2
    • FCS_STO_EXT.1: 7
    • FCS_STO_EXT.1.1: 2
    • FCS_TLSC_EXT.1: 8
    • FCS_TLSC_EXT.1.1: 3
    • FCS_TLSC_EXT.1.2: 2
    • FCS_TLSC_EXT.1.3: 2
  • FDP:
    • FDP_ACF_EXT.1: 7
    • FDP_ACF_EXT.1.1: 2
  • FIA:
    • FIA_AFL.1: 6
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_UAU.5: 6
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
  • FMT:
    • FMT_MOF_EXT.1: 7
    • FMT_MOF_EXT.1.1: 2
    • FMT_SMF_EXT.1: 7
    • FMT_SMF_EXT.1.1: 4
  • FPT:
    • FPT_ACF_EXT.1: 7
    • FPT_ACF_EXT.1.1: 2
    • FPT_ACF_EXT.1.2: 2
    • FPT_ASLR_EXT.1: 7
    • FPT_ASLR_EXT.1.1: 2
    • FPT_SBOP_EXT.1: 7
    • FPT_SBOP_EXT.1.1: 2
    • FPT_TST_EXT.1: 7
    • FPT_TST_EXT.1.1: 2
    • FPT_TUD_EXT: 1
    • FPT_TUD_EXT.1: 7
    • FPT_TUD_EXT.1.1: 2
    • FPT_TUD_EXT.1.2: 2
    • FPT_TUD_EXT.2: 6
    • FPT_TUD_EXT.2.1: 2
    • FPT_TUD_EXT.2.2: 2
  • FTP:
    • FTP_ITC_EXT.1: 11
    • FTP_ITC_EXT.1.1: 2
    • FTP_TRP.1: 6
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 2
  • FAU:
    • FAU_GEN.1: 8
    • FAU_SAR.1: 25
    • FAU_SAS: 2
    • FAU_SAS.1: 28
  • FCS:
    • FCS_CKM.1: 3
    • FCS_CKM.4: 4
    • FCS_COP.1: 18
    • FCS_RNG: 2
    • FCS_RNG.1: 6
  • FDP:
    • FDP_ACC.1: 34
    • FDP_ACF: 1
    • FDP_ACF.1: 28
    • FDP_IFC.1: 16
    • FDP_ITC.1: 3
    • FDP_ITC.2: 3
    • FDP_ITT.1: 10
    • FDP_SDC: 2
    • FDP_SDC.1: 8
    • FDP_SDI.2: 15
    • FDP_SMF.1: 2
    • FDP_SMR.1: 1
    • FDP_UCT.1: 16
    • FDP_UIT.1: 16
  • FIA:
    • FIA_API: 2
    • FIA_API.1: 6
    • FIA_UAU.1: 14
    • FIA_UID.1: 16
  • FMT:
    • FMT_LIM: 2
    • FMT_LIM.1: 29
    • FMT_LIM.2: 30
    • FMT_MSA.1: 26
    • FMT_MSA.3: 26
    • FMT_SMF.1: 21
    • FMT_SMR.1: 17
  • FPT:
    • FPT_FLS.1: 22
    • FPT_ITT.1: 9
    • FPT_PHP.3: 11
  • FRU:
    • FRU_FLT.2: 11
  • FTP:
    • FTP_ITC.1: 27
    • FTP_TRP.1: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.PLATFORM: 4
    • A.PROPER_: 2
    • A.PROPER_ADMIN: 3
    • A.PROPER_USER: 2
  • O:
    • O.ACCOUNTABILITY: 9
    • O.INTEGRITY: 7
    • O.MANAGEMENT: 9
    • O.PROTECTED_: 2
    • O.PROTECTED_COMMS: 8
    • O.PROTECTED_STORAGE: 4
  • OE:
    • OE.PLATFORM: 4
    • OE.PROPER_ADMIN: 4
    • OE.PROPER_USER: 4
  • T:
    • T.LIMITED_: 1
    • T.LIMITED_PHYSICAL_ACCESS: 1
    • T.LOCAL_: 1
    • T.LOCAL_ATTACK: 2
    • T.NETWORK_: 2
    • T.NETWORK_ATTACK: 6
    • T.NETWORK_EAVESDROP: 3
  • O:
    • O.C: 2
    • O.RND: 4
    • O.TOE-: 1
  • R:
    • R.O: 2
  • T:
    • T.RND: 3
pdf_data/st_keywords/vendor
  • Infineon:
    • Infineon Technologies: 1
  • Philips:
    • Philips: 1
  • STMicroelectronics:
    • STMicroelectronics: 21
  • Samsung:
    • Samsung: 6
pdf_data/st_keywords/eval_facility
  • EWA:
    • EWA-Canada: 1
  • Intertek:
    • Intertek: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 7
      • AES-128: 1
      • AES-256: 1
  • constructions:
    • MAC:
      • HMAC: 4
  • AES_competition:
    • AES:
      • AES: 14
      • AES-128: 1
      • AES-192: 1
      • AES-256: 1
  • DES:
    • 3DES:
      • TDEA: 1
      • TDES: 9
      • Triple-DES: 1
    • DES:
      • DES: 10
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 3
    • ECDH:
      • ECDHE: 1
    • ECDSA:
      • ECDSA: 4
  • FF:
    • DH:
      • DH: 2
      • DHE: 1
      • Diffie-Hellman: 5
    • DSA:
      • DSA: 1
  • RSA:
    • RSA 4096: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 7
    • SHA2:
      • SHA-256: 4
      • SHA-384: 5
      • SHA-512: 4
pdf_data/st_keywords/crypto_protocol
  • IPsec:
    • IPsec: 1
  • PGP:
    • PGP: 1
  • SSH:
    • SSH: 2
  • TLS:
    • DTLS:
      • DTLS: 2
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 38
      • TLS 1.2: 2
      • TLSv1.2: 1
  • VPN:
    • VPN: 3
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 5
  • RNG:
    • RBG: 3
  • PRNG:
    • DRBG: 1
  • RNG:
    • RND: 7
    • RNG: 6
  • TRNG:
    • TRNG: 3
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 3
  • CTR:
    • CTR: 2
  • GCM:
    • GCM: 1
  • XTS:
    • XTS: 3
  • CBC:
    • CBC: 8
  • ECB:
    • ECB: 7
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 10
    • P-384: 10
    • P-521: 8
pdf_data/st_keywords/crypto_engine
  • NesCrypt:
    • NESCRYPT: 3
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 3
    • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: 3
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 3
    • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 3
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 3
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 3
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 3
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 3
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 3
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 3
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 3
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 3
    • TLS_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_RSA_WITH_AES_128_GCM_SHA256: 1
    • TLS_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_RSA_WITH_AES_256_CBC_SHA256: 1
    • TLS_RSA_WITH_AES_256_GCM_SHA384: 1
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 4
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 13
    • malfunction: 2
    • physical tampering: 1
  • SCA:
    • Leak-Inherent: 14
    • Physical Probing: 4
    • physical probing: 3
    • side channel: 2
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS 186-4: 1
    • FIPS 197: 1
    • FIPS PUB 186-4: 4
  • NIST:
    • NIST SP 800-38A: 1
    • NIST SP 800-38D: 1
    • NIST SP 800-57: 2
    • NIST SP 800-90A: 1
  • RFC:
    • RFC 3526: 2
    • RFC 5246: 12
    • RFC 5280: 5
    • RFC 5288: 8
    • RFC 5289: 24
    • RFC 5759: 1
    • RFC 6066: 2
    • RFC 6125: 2
    • RFC 6960: 2
    • RFC 6961: 2
    • RFC 8603: 2
  • X509:
    • X.509: 10
    • x.509: 1
  • BSI:
    • AIS31: 1
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 25
    • CCMB-2017-04-003: 2
  • FIPS:
    • FIPS PUB 197: 3
  • ISO:
    • ISO/IEC 13239: 2
    • ISO/IEC 14443: 2
    • ISO/IEC 14888: 2
    • ISO/IEC 7816-3: 1
    • ISO/IEC 9796: 1
    • ISO/IEC 9796-2: 1
  • NIST:
    • NIST SP 800-38A: 2
    • NIST SP 800-67: 3
    • NIST SP 800-90: 1
    • SP 800-38A: 2
    • SP 800-67: 1
  • PKCS:
    • PKCS #1: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile, and uses the: 1
    • The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. Objectives: OE.PLATFORM The OS relies on being installed on trusted hardware: 1
    • out of scope: 2
  • OutOfScope:
    • ES) is in User NVM. Note: The ES is not part of the TOE and is out of scope of the evaluation: 1
    • The Security IC Embedded Software (ES) is in User NVM. Note: The ES is not part of the TOE and is out of scope of the evaluation. 1.6.3 TOE documentation 39 The user guidance documentation, part of the TOE: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: Christiane DROULERS
  • /CreationDate: D:20200107162430Z
  • /Creator: FrameMaker 11.0
  • /ModDate: D:20200107163515+01'00'
  • /Producer: Acrobat Elements 10.0.0 (Windows)
  • /Title: SMD_ST31P450_VA02_0P.book
  • pdf_file_size_bytes: 649478
  • pdf_hyperlinks: http://www.st.com
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 76
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different