Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
MultiApp Essential v1.1 Platform with Full, Light, XLight_T1 and XLight_NB configurations
2020-33-INF-3550
Strong Customer Authentication pour Apple Pay sur iPhone SE (2nde génération) avec A13 Bionic exécutant iOS 15.4.1 (Version 15.4.1 (build 19E258))
ANSSI-CC-2023/15
name MultiApp Essential v1.1 Platform with Full, Light, XLight_T1 and XLight_NB configurations Strong Customer Authentication pour Apple Pay sur iPhone SE (2nde génération) avec A13 Bionic exécutant iOS 15.4.1 (Version 15.4.1 (build 19E258))
category ICs, Smart Cards and Smart Card-Related Devices and Systems Mobility
scheme ES FR
not_valid_after 18.06.2026 27.03.2028
not_valid_before 18.06.2021 27.03.2023
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2020-33%20CCRA.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-cc-2023_15.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2020-33%20INF-3550.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2023_15fr-2.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2020-33%20ST_lite.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2023_15en.pdf
manufacturer THALES DIS FRANCE SA Apple Inc.
manufacturer_web https://www.thalesgroup.com/en/europe/france https://www.apple.com/
security_level EAL5+, AVA_VAN.5, ALC_DVS.2 ADV_FSP.3, EAL2+, ALC_FLR.3
dgst 8ba234174b5f18cb dbd63b4bb015bf39
heuristics/cert_id 2020-33-INF-3550 ANSSI-CC-2023/15
heuristics/cpe_matches {} cpe:2.3:o:apple:iphone_os:15.4.1:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2025-43355, CVE-2022-42859, CVE-2025-24251, CVE-2023-42869, CVE-2025-24270, CVE-2025-43379, CVE-2025-24206, CVE-2024-27831, CVE-2024-40789, CVE-2023-38590, CVE-2024-54530, CVE-2025-43303, CVE-2023-41983, CVE-2023-41063, CVE-2022-32835, CVE-2025-43365, CVE-2023-40416, CVE-2023-38133, CVE-2022-42848, CVE-2025-24252, CVE-2023-42852, CVE-2022-46715, CVE-2023-23520, CVE-2024-44232, CVE-2023-40429, CVE-2025-24131, CVE-2023-32367, CVE-2024-40782, CVE-2023-41061, CVE-2025-43535, CVE-2023-40520, CVE-2024-23296, CVE-2024-54468, CVE-2024-27879, CVE-2024-44282, CVE-2025-24205, CVE-2024-27851, CVE-2023-27930, CVE-2022-42790, CVE-2024-44204, CVE-2023-32393, CVE-2024-23293, CVE-2022-22658, CVE-2025-43455, CVE-2024-54518, CVE-2023-39434, CVE-2025-31206, CVE-2025-30433, CVE-2023-38572, CVE-2022-32829, CVE-2024-23201, CVE-2023-42848, CVE-2024-23220, CVE-2025-43529, CVE-2025-43458, CVE-2023-32423, CVE-2025-43439, CVE-2024-27801, CVE-2025-24149, CVE-2025-24221, CVE-2023-42841, CVE-2024-54488, CVE-2022-32855, CVE-2025-31277, CVE-2024-27808, CVE-2023-42855, CVE-2023-23502, CVE-2025-30468, CVE-2022-46717, CVE-2023-42872, CVE-2023-27942, CVE-2024-27817, CVE-2024-27880, CVE-2023-41995, CVE-2023-42830, CVE-2022-26738, CVE-2023-32396, CVE-2024-44147, CVE-2025-43442, CVE-2023-38136, CVE-2024-40809, CVE-2023-23503, CVE-2025-24150, CVE-2025-31234, CVE-2022-32917, CVE-2023-42946, CVE-2024-44276, CVE-2023-42843, CVE-2023-38610, CVE-2024-44302, CVE-2024-23241, CVE-2022-32824, CVE-2024-23226, CVE-2024-54543, CVE-2023-32366, CVE-2025-31208, CVE-2024-44308, CVE-2022-32891, CVE-2022-42811, CVE-2023-23528, CVE-2022-26744, CVE-2024-23284, CVE-2024-27818, CVE-2023-32394, CVE-2023-23537, CVE-2025-30434, CVE-2024-23223, CVE-2022-32814, CVE-2023-35984, CVE-2024-44263, CVE-2021-36690, CVE-2023-27937, CVE-2022-32870, CVE-2022-32841, CVE-2025-43317, CVE-2023-40529, CVE-2025-43494, CVE-2025-43493, CVE-2023-23494, CVE-2024-54512, CVE-2024-23208, CVE-2025-30447, CVE-2025-24230, CVE-2024-44234, CVE-2023-41982, CVE-2023-34352, CVE-2025-24091, CVE-2024-44241, CVE-2023-38599, CVE-2025-43389, CVE-2022-32912, CVE-2025-43383, CVE-2023-42941, CVE-2025-43309, CVE-2023-27936, CVE-2023-27943, CVE-2024-44269, CVE-2023-27970, CVE-2022-26740, CVE-2024-27791, CVE-2023-42884, CVE-2023-41065, CVE-2024-23270, CVE-2023-23504, CVE-2025-43211, CVE-2022-26716, CVE-2024-44192, CVE-2023-32352, CVE-2025-43501, CVE-2024-44309, CVE-2025-24111, CVE-2024-44274, CVE-2024-23231, CVE-2022-32943, CVE-2023-23519, CVE-2024-40771, CVE-2024-44273, CVE-2024-44278, CVE-2025-30438, CVE-2023-23543, CVE-2025-6558, CVE-2024-44124, CVE-2025-24225, CVE-2025-43436, CVE-2022-32939, CVE-2023-38600, CVE-2025-30436, CVE-2025-30463, CVE-2023-42849, CVE-2023-40394, CVE-2024-44127, CVE-2022-26717, CVE-2025-43221, CVE-2022-32839, CVE-2024-23235, CVE-2022-42850, CVE-2024-40836, CVE-2023-41174, CVE-2023-27963, CVE-2025-24202, CVE-2025-31228, CVE-2023-32428, CVE-2025-24133, CVE-2023-37450, CVE-2025-31210, CVE-2022-32879, CVE-2025-43413, CVE-2024-44297, CVE-2025-24184, CVE-2025-24190, CVE-2023-42836, CVE-2025-31191, CVE-2023-32434, CVE-2025-43358, CVE-2023-40438, CVE-2023-27946, CVE-2024-44123, CVE-2023-40408, CVE-2022-32916, CVE-2023-32389, CVE-2022-32923, CVE-2022-26710, CVE-2023-32354, CVE-2024-44277, CVE-2024-44155, CVE-2024-54500, CVE-2023-40385, CVE-2025-31229, CVE-2022-32918, CVE-2024-27850, CVE-2022-32922, CVE-2022-42800, CVE-2024-54469, CVE-2025-24145, CVE-2024-23265, CVE-2024-27816, CVE-2024-0258, CVE-2023-40413, CVE-2022-26766, CVE-2023-40449, CVE-2025-43400, CVE-2023-32420, CVE-2023-28202, CVE-2024-44233, CVE-2023-41074, CVE-2024-40852, CVE-2023-42873, CVE-2025-31227, CVE-2025-31200, CVE-2025-30430, CVE-2024-40826, CVE-2023-32422, CVE-2022-32938, CVE-2024-40813, CVE-2023-32371, CVE-2023-38565, CVE-2025-43460, CVE-2023-42875, CVE-2025-31182, CVE-2024-27811, CVE-2025-43350, CVE-2025-43374, CVE-2025-43407, CVE-2022-42817, CVE-2022-32838, CVE-2022-32944, CVE-2022-42825, CVE-2023-23541, CVE-2023-32410, CVE-2022-42867, CVE-2023-41068, CVE-2025-31221, CVE-2022-32935, CVE-2024-54510, CVE-2025-43500, CVE-2022-32828, CVE-2025-43520, CVE-2022-32817, CVE-2025-43234, CVE-2025-43224, CVE-2024-40829, CVE-2024-40863, CVE-2023-23499, CVE-2025-43426, CVE-2023-41075, CVE-2025-24144, CVE-2023-27928, CVE-2025-43391, CVE-2025-43302, CVE-2023-28206, CVE-2024-27856, CVE-2023-42952, CVE-2024-27838, CVE-2024-40806, CVE-2025-43361, CVE-2025-24257, CVE-2024-40815, CVE-2022-42806, CVE-2022-26702, CVE-2025-43511, CVE-2024-23256, CVE-2024-23240, CVE-2025-43432, CVE-2023-35990, CVE-2022-26737, CVE-2025-43531, CVE-2024-54470, CVE-2022-46720, CVE-2023-27954, CVE-2023-41997, CVE-2024-44169, CVE-2024-23264, CVE-2023-32412, CVE-2024-40787, CVE-2024-44200, CVE-2022-46690, CVE-2024-44227, CVE-2025-43430, CVE-2025-43345, CVE-2022-42808, CVE-2023-35993, CVE-2024-40824, CVE-2025-31251, CVE-2023-38603, CVE-2023-42956, CVE-2025-31192, CVE-2025-24104, CVE-2022-32949, CVE-2025-24271, CVE-2022-42813, CVE-2025-24173, CVE-2023-40454, CVE-2023-42883, CVE-2025-43214, CVE-2025-31201, CVE-2024-23282, CVE-2023-32419, CVE-2025-24178, CVE-2022-46716, CVE-2025-31241, CVE-2022-26731, CVE-2024-54479, CVE-2025-43359, CVE-2023-40443, CVE-2024-23255, CVE-2024-23280, CVE-2023-38611, CVE-2023-42939, CVE-2024-23228, CVE-2024-44252, CVE-2024-54514, CVE-2022-42830, CVE-2023-40447, CVE-2025-31207, CVE-2025-43445, CVE-2023-28191, CVE-2023-42962, CVE-2022-42845, CVE-2022-26765, CVE-2025-43227, CVE-2024-23273, CVE-2024-44251, CVE-2025-24123, CVE-2025-24107, CVE-2025-43384, CVE-2024-44201, CVE-2022-32929, CVE-2024-44176, CVE-2025-43449, CVE-2024-54525, CVE-2023-27969, CVE-2024-27857, CVE-2024-23222, CVE-2024-27815, CVE-2023-40392, CVE-2023-38606, CVE-2022-32854, CVE-2025-24180, CVE-2025-31226, CVE-2022-32849, CVE-2025-24158, CVE-2025-43423, CVE-2025-43338, CVE-2024-44296, CVE-2022-42851, CVE-2025-43203, CVE-2023-38597, CVE-2023-38580, CVE-2025-31233, CVE-2024-54494, CVE-2025-43356, CVE-2024-40776, CVE-2025-43419, CVE-2023-40417, CVE-2023-41990, CVE-2022-26751, CVE-2024-23292, CVE-2022-32903, CVE-2023-32388, CVE-2025-31215, CVE-2023-42953, CVE-2022-32898, CVE-2022-32888, CVE-2022-32858, CVE-2024-27845, CVE-2025-43372, CVE-2024-27873, CVE-2023-42846, CVE-2024-54513, CVE-2024-40779, CVE-2024-23254, CVE-2022-32932, CVE-2023-42878, CVE-2024-27796, CVE-2023-38424, CVE-2022-23308, CVE-2023-41992, CVE-2022-48618, CVE-2025-43217, CVE-2023-32403, CVE-2025-24161, CVE-2022-46725, CVE-2022-26736, CVE-2024-44239, CVE-2025-43265, CVE-2024-27863, CVE-2023-32390, CVE-2024-27832, CVE-2024-27835, CVE-2025-43272, CVE-2024-40784, CVE-2025-31253, CVE-2024-44165, CVE-2024-23287, CVE-2025-43354, CVE-2023-42834, CVE-2025-24128, CVE-2025-31225, CVE-2023-27959, CVE-2022-32868, CVE-2022-42810, CVE-2022-32927, CVE-2023-32398, CVE-2025-43443, CVE-2025-24264, CVE-2025-43425, CVE-2025-24244, CVE-2024-27841, CVE-2022-32810, CVE-2025-24213, CVE-2025-24086, CVE-2023-41991, CVE-2023-41977, CVE-2023-32424, CVE-2022-32833, CVE-2023-23535, CVE-2023-42951, CVE-2023-27961, CVE-2023-40396, CVE-2024-23243, CVE-2022-32816, CVE-2022-46710, CVE-2025-43228, CVE-2022-42855, CVE-2022-42861, CVE-2022-40303, CVE-2022-26757, CVE-2025-30426, CVE-2023-38594, CVE-2022-32825, CVE-2023-32433, CVE-2024-27819, CVE-2022-42796, CVE-2022-46699, CVE-2023-27955, CVE-2025-43223, CVE-2022-32907, CVE-2025-31273, CVE-2023-32425, CVE-2024-54505, CVE-2025-43437, CVE-2025-24223, CVE-2023-41993, CVE-2022-26711, CVE-2022-32946, CVE-2024-44184, CVE-2022-32802, CVE-2024-40805, CVE-2023-23512, CVE-2024-23257, CVE-2025-31255, CVE-2023-40391, CVE-2023-23526, CVE-2023-41974, CVE-2025-43190, CVE-2023-42871, CVE-2025-43230, CVE-2025-43418, CVE-2022-32948, CVE-2022-32865, CVE-2023-35074, CVE-2023-41968, CVE-2023-23530, CVE-2022-32867, CVE-2023-32359, CVE-2025-24193, CVE-2024-54467, CVE-2025-24217, CVE-2024-27803, CVE-2025-31212, CVE-2022-26762, CVE-2022-46695, CVE-2024-27869, CVE-2023-42923, CVE-2023-41073, CVE-2024-44194, CVE-2024-54564, CVE-2025-43200, CVE-2024-27876, CVE-2022-48610, CVE-2023-42833, CVE-2023-28204, CVE-2025-24177, CVE-2025-31199, CVE-2022-26700, CVE-2025-31278, CVE-2022-42839, CVE-2024-44185, CVE-2023-28198, CVE-2025-24192, CVE-2024-23283, CVE-2024-44187, CVE-2023-32435, CVE-2022-32887, CVE-2022-26719, CVE-2024-44167, CVE-2022-32909, CVE-2022-32781, CVE-2023-32441, CVE-2025-43205, CVE-2024-44240, CVE-2023-41986, CVE-2023-40398, CVE-2022-46692, CVE-2023-32407, CVE-2025-24238, CVE-2024-27847, CVE-2024-40833, CVE-2024-27848, CVE-2023-23524, CVE-2025-24117, CVE-2023-40442, CVE-2025-24212, CVE-2024-27840, CVE-2022-32792, CVE-2023-32365, CVE-2025-43299, CVE-2022-42849, CVE-2025-43496, CVE-2022-32847, CVE-2024-44207, CVE-2022-46696, CVE-2024-44290, CVE-2025-24216, CVE-2025-31214, CVE-2025-24209, CVE-2023-40456, CVE-2024-40853, CVE-2023-40428, CVE-2022-32832, CVE-2023-42970, CVE-2022-42803, CVE-2025-24127, CVE-2023-40423, CVE-2024-44164, CVE-2022-42826, CVE-2025-24237, CVE-2023-40420, CVE-2022-46694, CVE-2024-54526, CVE-2022-42843, CVE-2024-54503, CVE-2023-32409, CVE-2022-32785, CVE-2024-44254, CVE-2025-43216, CVE-2023-42893, CVE-2024-44198, CVE-2023-40452, CVE-2024-40844, CVE-2024-40794, CVE-2023-23517, CVE-2025-24154, CVE-2022-26706, CVE-2023-38604, CVE-2024-27859, CVE-2024-44144, CVE-2025-43429, CVE-2022-46718, CVE-2022-26771, CVE-2024-27855, CVE-2024-27800, CVE-2023-23532, CVE-2024-40851, CVE-2023-40419, CVE-2024-44171, CVE-2022-42856, CVE-2023-32416, CVE-2023-28181, CVE-2025-24097, CVE-2022-32886, CVE-2022-42793, CVE-2023-41980, CVE-2025-43360, CVE-2022-42829, CVE-2025-43323, CVE-2024-44170, CVE-2023-42857, CVE-2024-40785, CVE-2025-43386, CVE-2024-27871, CVE-2024-54522, CVE-2023-42896, CVE-2025-43186, CVE-2023-40437, CVE-2025-43392, CVE-2023-41984, CVE-2025-31197, CVE-2023-28182, CVE-2025-31203, CVE-2023-41070, CVE-2022-32925, CVE-2022-32892, CVE-2025-43422, CVE-2025-24194, CVE-2023-40399, CVE-2024-40812, CVE-2023-38261, CVE-2023-32391, CVE-2025-31281, CVE-2024-54501, CVE-2025-31185, CVE-2024-40818, CVE-2022-42799, CVE-2025-43213, CVE-2023-32376, CVE-2024-44244, CVE-2025-43462, CVE-2022-32845, CVE-2023-45866, CVE-2024-27874, CVE-2025-43398, CVE-2023-28178, CVE-2024-40839, CVE-2024-54527, CVE-2025-43349, CVE-2024-27821, CVE-2024-40774, CVE-2024-27852, CVE-2025-43447, CVE-2023-40432, CVE-2024-44136, CVE-2025-43450, CVE-2024-40793, CVE-2024-44206, CVE-2024-23263, CVE-2025-24182, CVE-2025-14174, CVE-2023-32734, CVE-2024-44191, CVE-2024-44126, CVE-2024-54499, CVE-2025-30427, CVE-2024-54658, CVE-2024-44212, CVE-2025-43507, CVE-2024-40822, CVE-2022-32787, CVE-2024-40777, CVE-2022-42832, CVE-2022-32815, CVE-2022-43454, CVE-2022-26763, CVE-2024-40840, CVE-2022-42827, CVE-2024-40799, CVE-2023-40441, CVE-2025-46292, CVE-2025-30448, CVE-2023-28185, CVE-2023-42969, CVE-2024-23290, CVE-2022-32820, CVE-2025-30425, CVE-2023-42839, CVE-2023-32408, CVE-2022-22677, CVE-2024-23219, CVE-2022-42805, CVE-2025-24214, CVE-2022-32914, CVE-2023-38614, CVE-2023-27940, CVE-2024-54551, CVE-2023-38596, CVE-2024-4558, CVE-2022-32837, CVE-2023-23505, CVE-2024-27826, CVE-2023-28205, CVE-2025-30429, CVE-2022-46693, CVE-2024-23288, CVE-2023-32381, CVE-2022-26709, CVE-2023-42936, CVE-2023-40384, CVE-2024-44242, CVE-2024-27830, CVE-2022-1622, CVE-2024-27799, CVE-2022-32894, CVE-2023-42831, CVE-2025-43385, CVE-2023-42824, CVE-2022-32889, CVE-2024-44229, CVE-2022-32926, CVE-2022-42837, CVE-2025-43480, CVE-2022-46700, CVE-2023-32432, CVE-2023-41069, CVE-2025-43295, CVE-2025-24224, CVE-2024-44299, CVE-2022-26701, CVE-2024-40857, CVE-2023-38410, CVE-2025-43342, CVE-2023-40446, CVE-2024-40786, CVE-2024-44258, CVE-2024-40835, CVE-2022-32924, CVE-2023-23540, CVE-2023-38425, CVE-2024-40867, CVE-2023-40439, CVE-2023-23527, CVE-2024-44202, CVE-2024-54508, CVE-2023-40424, CVE-2023-38595, CVE-2024-54492, CVE-2022-32813, CVE-2024-27807, CVE-2022-42863, CVE-2025-43344, CVE-2025-43343, CVE-2024-23278, CVE-2023-32385, CVE-2023-32439, CVE-2023-38593, CVE-2022-32821, CVE-2022-32827, CVE-2022-32911, CVE-2025-30456, CVE-2023-42862, CVE-2022-32919, CVE-2024-54534, CVE-2022-46705, CVE-2024-44183, CVE-2022-42866, CVE-2022-32830, CVE-2024-27806, CVE-2025-31205, CVE-2025-43438, CVE-2024-40830, CVE-2025-24113, CVE-2023-42890, CVE-2023-42949, CVE-2025-24162, CVE-2025-43444, CVE-2022-32819, CVE-2024-23210, CVE-2024-44261, CVE-2023-28200, CVE-2023-42922, CVE-2023-42823, CVE-2025-31276, CVE-2025-31219, CVE-2023-42961, CVE-2025-24167, CVE-2023-42866, CVE-2025-30466, CVE-2023-32438, CVE-2023-23518, CVE-2024-54550, CVE-2024-44205, CVE-2024-44139, CVE-2025-43346, CVE-2025-24211, CVE-2023-23511, CVE-2023-32397, CVE-2022-46698, CVE-2023-42957, CVE-2023-41976, CVE-2022-40304, CVE-2025-30469, CVE-2025-43452, CVE-2025-43329, CVE-2023-34425, CVE-2022-26739, CVE-2022-42798, CVE-2024-23262, CVE-2024-44235, CVE-2025-43454, CVE-2024-27828, CVE-2024-23250, CVE-2025-30445, CVE-2025-43448, CVE-2023-38598, CVE-2023-38605, CVE-2025-43457, CVE-2022-26764, CVE-2022-42852, CVE-2023-41254, CVE-2022-46703, CVE-2023-23514, CVE-2024-40850, CVE-2024-54497, CVE-2024-27833, CVE-2024-40788, CVE-2024-54517, CVE-2025-43209, CVE-2024-23215, CVE-2025-43431, CVE-2025-31204, CVE-2022-32793, CVE-2022-32875, CVE-2024-27836, CVE-2023-32400, CVE-2025-24210, CVE-2024-44217, CVE-2024-23271, CVE-2025-31184, CVE-2024-54523, CVE-2023-23536, CVE-2025-43502, CVE-2022-3970, CVE-2024-54542, CVE-2022-32928, CVE-2023-27932, CVE-2023-32357, CVE-2022-32840, CVE-2025-43300, CVE-2022-32885, CVE-2022-32913, CVE-2023-42974, CVE-2024-44255, CVE-2023-40448, CVE-2023-42916, CVE-2022-32893, CVE-2025-31217, CVE-2024-54486, CVE-2024-40854, CVE-2024-44145, CVE-2022-42824, CVE-2025-43434, CVE-2024-23246, CVE-2023-40412, CVE-2022-46724, CVE-2022-32945, CVE-2025-31202, CVE-2025-24126, CVE-2023-28208, CVE-2023-23496, CVE-2024-54541, CVE-2022-46709, CVE-2024-44179, CVE-2022-26760, CVE-2025-43357, CVE-2024-54538, CVE-2025-24220, CVE-2022-42820, CVE-2024-27834, CVE-2022-32899, CVE-2022-32940, CVE-2022-42840, CVE-2025-31254, CVE-2023-41232, CVE-2025-30467, CVE-2022-42831, CVE-2025-43424, CVE-2023-32445, CVE-2024-23297, CVE-2022-37434, CVE-2025-31257, CVE-2024-40796, CVE-2024-44131, CVE-2024-40780, CVE-2025-43441, CVE-2023-27929, CVE-2023-37285, CVE-2022-32864, CVE-2023-42865, CVE-2025-43347, CVE-2024-54485, CVE-2025-43368, CVE-2022-32947, CVE-2024-54507, CVE-2025-31183, CVE-2024-23259, CVE-2024-44215, CVE-2022-32872, CVE-2025-46279, CVE-2023-43000, CVE-2025-43435, CVE-2022-26703, CVE-2024-40778, CVE-2024-40856, CVE-2023-42917, CVE-2024-23286, CVE-2023-38612, CVE-2022-42792, CVE-2023-40403, CVE-2024-27804, CVE-2024-40798, CVE-2023-28194, CVE-2023-32399, CVE-2023-40528, CVE-2025-24163, CVE-2023-28201, CVE-2025-24198, CVE-2023-42870, CVE-2023-23498, CVE-2025-31223, CVE-2023-27949, CVE-2023-40427, CVE-2022-32826, CVE-2022-32823, CVE-2023-42928, CVE-2022-42842, CVE-2024-23218, CVE-2024-44218, CVE-2023-41060, CVE-2024-23291, CVE-2022-32860, CVE-2025-24160, CVE-2023-42947, CVE-2022-32883, CVE-2025-43541, CVE-2024-23242, CVE-2025-31262, CVE-2025-24208, CVE-2025-24243, CVE-2023-42950, CVE-2025-43503, CVE-2022-48503, CVE-2023-41064, CVE-2024-27789, CVE-2022-32788, CVE-2025-31209, CVE-2023-40431, CVE-2024-23289, CVE-2024-23225, CVE-2025-30432, CVE-2023-23523, CVE-2025-30470, CVE-2024-27802, CVE-2025-43376, CVE-2023-23529, CVE-2025-31216, CVE-2023-40414, CVE-2023-27956, CVE-2023-42925, CVE-2025-31222, CVE-2023-32361, CVE-2024-40791, CVE-2025-43212, CVE-2025-24159, CVE-2022-26981, CVE-2023-23500, CVE-2024-23251, CVE-2022-32941, CVE-2022-26768, CVE-2024-27810, CVE-2025-43282, CVE-2024-40795, CVE-2022-42823, CVE-2024-54560, CVE-2022-46691, CVE-2024-23205, CVE-2025-24129, CVE-2025-43421, CVE-2025-24124, CVE-2025-24085, CVE-2022-42844, CVE-2022-32844, CVE-2023-40395, CVE-2024-54558, CVE-2023-27933, CVE-2025-43226, CVE-2025-43280, CVE-2023-32384, CVE-2025-43510, CVE-2022-42865, CVE-2025-43498, CVE-2025-31239, CVE-2023-32413, CVE-2025-30454, CVE-2025-43427, CVE-2025-43362, CVE-2025-43536, CVE-2024-27805, CVE-2023-23531, CVE-2022-42791, CVE-2023-40410, CVE-2024-27839, CVE-2022-42862, CVE-2025-31245, CVE-2025-30428, CVE-2022-32795, CVE-2022-42795, CVE-2022-32871, CVE-2022-2294, CVE-2022-26714, CVE-2023-27931, CVE-2022-32908, CVE-2024-54535, CVE-2023-32373, CVE-2024-54478, CVE-2025-24189, CVE-2022-42846, CVE-2024-27820, CVE-2023-42977, CVE-2024-44158, CVE-2024-23217, CVE-2025-43495, CVE-2025-30439, CVE-2023-41981, CVE-2024-27823, CVE-2023-41071, CVE-2024-44180, CVE-2024-1580, CVE-2023-42914, CVE-2023-23525, CVE-2024-23239, CVE-2022-32859, CVE-2025-24095, CVE-2023-40400, CVE-2023-28826, CVE-2023-36495, CVE-2025-43433, CVE-2025-31238, CVE-2025-30471, CVE-2023-32392, CVE-2022-46689, CVE-2025-24141, CVE-2022-42864, CVE-2023-42919, CVE-2024-54502, CVE-2023-27941, CVE-2023-42899, CVE-2024-44259, CVE-2025-24137, CVE-2023-40409, CVE-2023-40434, CVE-2025-24200, CVE-2025-24179, CVE-2023-32368, CVE-2022-32784, CVE-2024-27884, CVE-2023-32372, CVE-2022-32857, CVE-2023-42942, CVE-2023-42934, CVE-2022-32790, CVE-2025-43440, CVE-2023-32437, CVE-2025-24283
heuristics/extracted_sars ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ATE_DPT.3, AVA_VAN.5, ASE_INT.1, ALC_CMC.4, ASE_REQ.2, ADV_INT.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, ALC_FLR.1, ADV_IMP.1, ADV_TDS.4, ALC_LCD.1, ALC_DVS.2, ASE_SPD.1, ATE_COV.2, AGD_OPE.1, ADV_FSP.5, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1, ALC_TAT.2 ALC_FLR.3, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_FSP.3, ADV_TDS.1, ASE_SPD.1, ALC_CMC.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1
heuristics/extracted_versions 1.1 15.4.1
heuristics/scheme_data
  • category: Smart Cards and similiar devices
  • certification_date: 18.06.2021
  • enhanced:
    • category: Smart Cards and similiar devices
    • cc_version: Common Criteria 3.1 release 5
    • cert_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1214
    • certification_date: 18.06.2021
    • description: The MultiApp Essential V1.1 Platform is a smart card operating system (IC and OS) that complies with two major industry standards: Sun Java Card 3.0.4, which consists of the Java Card 3.0.4 Virtual Machine [JCVM304], the Java Card 3.0.4 Runtime Environment [JCRE304] and the Java Card 3.0.4 Application Programming Interface [JCAPI304]. The Global Platform Card Specification version 2.2.1 [GP221]. It is intended to host a set of Java Card applications and provides cryptographic services for symmetric (3DES, AES), asymmetric (RSA) and hash (SHA) operations, Moreover, it also provides random number generation and integrity check features. The TOE allows the loading of applets before or after the issuance of the card, but the Issuer can forbid this operation to be carried out. The TOE has four possible configurations: Full Configuration. Light Configuration. XLight_T1 Configuration. XLight_NB Configuration. The details about the features of each configuration are described in [ST LITE], chapter 2.4 (TOE Description).
    • evaluation_facility: Applus Laboratories
    • level: EAL5 + ALC_DVS.2 + AVA_VAN.5
    • manufacturer: THALES
    • report_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1215
    • status: Certified
    • target_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1242
    • type: Product
  • manufacturer: THALES
  • product: MultiApp Essential v1.1 Platform with Full, Light, XLight_T1 and XLight_NB configurations
  • product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/697-multiapp-essential-v1-1-platform-with-full-light-xlight-t1-and-xlight-nb-configurations
heuristics/st_references/directly_referencing ANSSI-CC-2018/51 {}
heuristics/st_references/indirectly_referencing ANSSI-CC-2018/51 {}
heuristics/protection_profiles 9399bd94f9925b16 {}
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-profil_PP-2010-03en.pdf {}
pdf_data/cert_filename 2020-33 CCRA.pdf certificat-cc-2023_15.pdf
pdf_data/cert_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2023/15: 2
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 2
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 1
  • AVA:
    • AVA_VAN: 1
  • ADV:
    • ADV_FSP.3: 1
  • ALC:
    • ALC_FLR.3: 1
pdf_data/cert_keywords/cc_claims
  • O:
    • O.E: 1
pdf_data/cert_keywords/eval_facility
  • Applus:
    • Applus Laboratories: 1
pdf_data/cert_keywords/tee_name
  • IBM:
    • SE: 1
pdf_data/cert_metadata
  • /Author:
  • /CreationDate:
  • /Creator:
  • /Keywords:
  • /ModDate:
  • /Producer:
  • /Subject:
  • /Title:
  • /Trapped:
  • pdf_file_size_bytes: 746775
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename 2020-33 INF-3550.pdf anssi-cc-2023_15fr-2.pdf
pdf_data/report_frontpage
  • FR:
  • FR:
pdf_data/report_keywords/cc_cert_id
  • ES:
    • 2020-33-INF-3550- v1: 1
  • FR:
    • ANSSI-CC-2023/15: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 1
    • EAL 4: 2
    • EAL2: 1
    • EAL5: 3
  • ITSEC:
    • ITSEC Evaluation: 1
  • EAL:
    • EAL2: 3
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_IMP.1: 1
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 3
    • ALC_FLR: 3
    • ALC_FLR.1: 1
    • ALC_TAT.2: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_INT.1: 1
    • ASE_REQ.2: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_FUN.1: 1
  • AVA:
    • AVA_VAN.5: 4
  • ADV:
    • ADV_FSP.3: 1
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.3: 2
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_ARP.1: 1
  • FCO:
    • FCO_NRO: 1
  • FCS:
    • FCS_CKM: 10
    • FCS_CKM.1: 4
    • FCS_CKM.4: 1
    • FCS_COP: 6
    • FCS_RND.1: 1
  • FDP:
    • FDP_ACC: 3
    • FDP_ACF: 3
    • FDP_IFC: 2
    • FDP_IFF: 2
    • FDP_ITC: 1
    • FDP_RIP: 8
    • FDP_ROL: 1
    • FDP_SDI.2: 1
    • FDP_UIT: 1
  • FIA:
    • FIA_ATD: 1
    • FIA_UAU: 1
    • FIA_UID: 2
    • FIA_USB: 1
  • FMT:
    • FMT_MSA: 11
    • FMT_MTD: 2
    • FMT_SMF: 3
    • FMT_SMR: 4
  • FPR:
    • FPR_UNO: 1
    • FPR_UNO.1: 1
  • FPT:
    • FPT_FLS: 4
    • FPT_ITT: 1
    • FPT_PHP: 1
    • FPT_RCV: 2
    • FPT_TDC.1: 1
    • FPT_TST: 1
  • FTP:
    • FTP_ITC: 1
pdf_data/report_keywords/cc_claims
  • R:
    • R.C: 1
pdf_data/report_keywords/vendor
  • Gemalto:
    • Gemalto: 2
  • Microsoft:
    • Microsoft: 1
  • Thales:
    • Thales: 1
pdf_data/report_keywords/eval_facility
  • Applus:
    • Applus Laboratories: 5
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • DES:
    • 3DES:
      • 3DES: 2
    • DES:
      • DES: 5
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DH: 1
  • RSA:
    • RSA 1024: 1
    • RSA 2048: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 3
    • SHA2:
      • SHA-224: 2
      • SHA-256: 1
      • SHA-384: 1
      • SHA-512: 1
pdf_data/report_keywords/randomness
  • PRNG:
    • PRNG: 1
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • ECB:
    • ECB: 1
pdf_data/report_keywords/tee_name
  • IBM:
    • SE: 9
pdf_data/report_keywords/standard_id
  • SCP:
    • SCP03: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
pdf_data/report_keywords/javacard_version
  • JavaCard:
    • Java Card 3.0.4: 4
    • JavaCard 3.0.4: 1
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • These applications could be removed based on customer needs and they are out of scope of the evaluation: 1
    • out of scope: 1
    • v1.1 & Server v1.1. (These applications could be removed based on customer needs and they are out of scope of the evaluation). Additionally, other applets – not determined at the moment of the present: 1
pdf_data/report_metadata
pdf_data/st_filename 2020-33 ST_lite.pdf anssi-cible-cc-2023_15en.pdf
pdf_data/st_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2018/51: 1
  • NL:
    • CC-1: 2
    • CC-2: 7
    • CC-3: 4
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 5+: 2
    • EAL5: 6
    • EAL5 augmented: 2
    • EAL5+: 1
  • EAL:
    • EAL 2: 1
    • EAL 2 augmented: 1
    • EAL2: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC: 2
    • ADV_ARC.1: 7
    • ADV_FSP: 1
    • ADV_FSP.1: 3
    • ADV_FSP.2: 2
    • ADV_FSP.4: 2
    • ADV_FSP.5: 5
    • ADV_IMP: 1
    • ADV_IMP.1: 7
    • ADV_INT.2: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 2
    • ADV_TDS.3: 4
    • ADV_TDS.4: 7
  • AGD:
    • AGD_OPE: 2
    • AGD_OPE.1: 7
    • AGD_PRE: 2
    • AGD_PRE.1: 6
  • ALC:
    • ALC_CMC.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 2
    • ALC_DVS.2: 7
    • ALC_LCD.1: 3
    • ALC_TAT.1: 2
    • ALC_TAT.2: 3
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 4
    • ASE_INT.1: 2
    • ASE_OBJ.2: 2
    • ASE_REQ.1: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 2
    • ATE_DPT.1: 2
    • ATE_DPT.3: 1
    • ATE_FUN.1: 6
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 7
  • ADV:
    • ADV_ARC.1: 3
    • ADV_FSP.1: 2
    • ADV_FSP.2: 4
    • ADV_FSP.3: 3
    • ADV_TDS.1: 4
  • AGD:
    • AGD_OPE.1: 4
    • AGD_PRE.1: 4
  • ALC:
    • ALC_CMC.2: 2
    • ALC_CMS.2: 2
    • ALC_DEL.1: 2
    • ALC_FLR: 1
    • ALC_FLR.3: 3
  • ASE:
    • ASE_CCL.1: 2
    • ASE_ECD.1: 3
    • ASE_INT.1: 2
    • ASE_OBJ.2: 2
    • ASE_REQ.1: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 1
    • ASE_TSS.1: 2
  • ATE:
    • ATE_COV.1: 4
    • ATE_FUN.1: 3
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_ARP.1: 13
    • FAU_ARP.1.1: 1
    • FAU_SAA.1: 2
    • FAU_SAS.1: 1
  • FCO:
    • FCO_NRO: 5
    • FCO_NRO.2: 3
  • FCS:
    • FCS_CKM: 68
    • FCS_CKM.1: 20
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 5
    • FCS_CKM.2.1: 1
    • FCS_CKM.3: 1
    • FCS_CKM.3.1: 1
    • FCS_CKM.4: 46
    • FCS_CKM.4.1: 1
    • FCS_COP: 32
    • FCS_COP.1: 7
    • FCS_COP.1.1: 1
    • FCS_RND: 8
    • FCS_RND.1: 10
    • FCS_RND.1.1: 2
    • FCS_RNG: 1
  • FDP:
    • FDP_ACC: 36
    • FDP_ACC.1: 14
    • FDP_ACC.2: 6
    • FDP_ACF: 30
    • FDP_ACF.1: 17
    • FDP_IFC: 22
    • FDP_IFC.1: 13
    • FDP_IFC.2: 2
    • FDP_IFF: 12
    • FDP_IFF.1: 12
    • FDP_ITC: 11
    • FDP_ITC.1: 18
    • FDP_ITC.2: 23
    • FDP_ITT.1: 1
    • FDP_RIP: 69
    • FDP_RIP.1: 10
    • FDP_ROL: 12
    • FDP_ROL.1: 2
    • FDP_SDC.1: 1
    • FDP_SDI: 3
    • FDP_SDI.2: 7
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UIT: 6
    • FDP_UIT.1: 3
  • FIA:
    • FIA_API.1: 1
    • FIA_ATD: 6
    • FIA_ATD.1: 2
    • FIA_SOS.2: 1
    • FIA_UAU: 6
    • FIA_UAU.1: 3
    • FIA_UID: 12
    • FIA_UID.1: 10
    • FIA_UID.2: 1
    • FIA_USB: 6
    • FIA_USB.1: 3
  • FMT:
    • FMT_LIM: 2
    • FMT_LIM.1: 1
    • FMT_LIM.2: 1
    • FMT_MSA: 83
    • FMT_MSA.1: 12
    • FMT_MSA.2: 1
    • FMT_MSA.3: 16
    • FMT_MTD: 16
    • FMT_MTD.1: 3
    • FMT_MTD.3: 1
    • FMT_SMF: 30
    • FMT_SMF.1: 13
    • FMT_SMR: 39
    • FMT_SMR.1: 25
  • FPR:
    • FPR_UNO: 5
    • FPR_UNO.1: 8
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_FLS: 42
    • FPT_FLS.1: 8
    • FPT_ITT: 5
    • FPT_ITT.1: 2
    • FPT_PHP: 6
    • FPT_PHP.3: 2
    • FPT_RCV: 13
    • FPT_RCV.3: 4
    • FPT_RCV.4: 1
    • FPT_TDC.1: 7
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TST: 5
    • FPT_TST.1: 3
  • FRU:
    • FRU_FLT.2: 1
  • FTP:
    • FTP_ITC: 8
    • FTP_ITC.1: 5
    • FTP_TRP.1: 3
  • FDP:
    • FDP_ACC: 21
    • FDP_ACC.1: 9
    • FDP_ACC.2: 4
    • FDP_ACC.2.1: 1
    • FDP_ACC.2.2: 1
    • FDP_ACF: 16
    • FDP_ACF.1: 12
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_DAU.1: 4
    • FDP_DAU.1.1: 1
    • FDP_DAU.1.2: 1
    • FDP_ETC: 8
    • FDP_ETC.2: 2
    • FDP_ETC.2.1: 2
    • FDP_ETC.2.2: 2
    • FDP_ETC.2.3: 2
    • FDP_ETC.2.4: 2
    • FDP_IFC.1: 7
    • FDP_ITC: 5
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITT.1: 4
    • FDP_ITT.1.1: 1
    • FDP_RIP.1: 13
    • FDP_RIP.1.1: 1
    • FDP_SDI.1: 10
    • FDP_SDI.1.1: 1
    • FDP_UCT: 3
    • FDP_UCT.1: 1
    • FDP_UIT: 4
    • FDP_UIT.1: 2
  • FIA:
    • FIA_AFL: 7
    • FIA_AFL.1: 3
    • FIA_AFL.1.1: 3
    • FIA_AFL.1.2: 3
    • FIA_ATD.1: 4
    • FIA_ATD.1.1: 2
    • FIA_UAU.1: 1
    • FIA_UAU.2: 11
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 5
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 11
    • FIA_UAU.6.1: 2
    • FIA_UID.1: 1
    • FIA_UID.2: 6
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA.1: 5
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 11
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 4
    • FMT_MTD.1.1: 1
    • FMT_MTD.3: 4
    • FMT_MTD.3.1: 1
    • FMT_SMF.1: 6
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 10
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO.1: 11
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_ITC.1: 4
    • FPT_ITC.1.1: 1
    • FPT_RPL: 4
    • FPT_RPL.1: 2
  • FTP:
    • FTP_ITC: 6
    • FTP_ITC.1: 5
    • FTP_TRP.1: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.APPLET: 5
    • A.VERIFICATION: 4
  • D:
    • D.API_DATA: 3
    • D.APP_CODE: 6
    • D.APP_C_DATA: 3
    • D.APP_I_DATA: 4
    • D.CRYPTO: 5
    • D.JCS_CODE: 3
    • D.JCS_DATA: 5
    • D.PIN: 4
    • D.SEC_DATA: 7
  • O:
    • O.ALARM: 16
    • O.APPLET: 28
    • O.CARD-MANAGEMENT: 3
    • O.CARD_MANAGEMENT: 18
    • O.CIPHER: 11
    • O.CODE_PCKG: 16
    • O.CODE_PKG: 7
    • O.DELETION: 9
    • O.FIREWALL: 12
    • O.GLOBAL_ARRAYS_CONFID: 10
    • O.GLOBAL_ARRAYS_INTEG: 5
    • O.INSTALL: 12
    • O.JAVAOBJECT: 57
    • O.KEY-MNGT: 6
    • O.KEY_MNGT: 5
    • O.LOAD: 7
    • O.NATIVE: 12
    • O.OBJ-DELETION: 4
    • O.OPERATE: 15
    • O.PIN-: 1
    • O.PIN-MNGT: 5
    • O.REALLOCATION: 5
    • O.RESOURCES: 10
    • O.RND: 14
    • O.SCP: 35
    • O.SID: 14
    • O.TRANSACTION: 6
  • OE:
    • OE.APPLET: 4
    • OE.CARD-MANAGEMENT: 1
    • OE.CODE-EVIDENCE: 10
    • OE.SCP: 3
    • OE.VERIFICATION: 26
  • OP:
    • OP.ARRAY_ACCESS: 6
    • OP.CREATE: 10
    • OP.DELETE_APPLET: 6
    • OP.DELETE_PCKG: 4
    • OP.DELETE_PCKG_APPLET: 4
    • OP.INSTANCE_FIELD: 6
    • OP.INVK_INTERFACE: 10
    • OP.INVK_VIRTUAL: 8
    • OP.JAVA: 8
    • OP.PUT: 7
    • OP.THROW: 7
    • OP.TYPE_ACCESS: 7
  • OSP:
    • OSP.RND: 4
    • OSP.VERIFICATION: 4
  • R:
    • R.JAVA: 9
  • T:
    • T.CONFID-APPLI-DATA: 4
    • T.CONFID-JCS-CODE: 4
    • T.CONFID-JCS-DATA: 4
    • T.DELETION: 3
    • T.EXE-CODE: 8
    • T.INSTALL: 4
    • T.INTEG-APPLI-CODE: 7
    • T.INTEG-APPLI-DATA: 8
    • T.INTEG-JCS-CODE: 3
    • T.INTEG-JCS-DATA: 4
    • T.NATIVE: 4
    • T.OBJ-DELETION: 4
    • T.PHYSICAL: 4
    • T.RESOURCES: 3
    • T.SID: 8
  • A:
    • A.CDCVM: 3
    • A.DEVICE_AUTH: 3
    • A.PERSO: 3
  • D:
    • D.OS: 17
    • D.SEP_SE: 3
  • OE:
    • OE.CDCVM: 3
  • OT:
    • OT.-: 1
  • T:
    • T.CORRUPT: 2
    • T.PHYSICAL: 2
    • T.RECOVER: 2
    • T.REPLAY: 2
    • T.SILENT: 2
    • T.SKIM-: 1
    • T.SKIMMING: 1
    • T.USURP: 2
pdf_data/st_keywords/vendor
  • Gemalto:
    • Gemalto: 11
  • Microsoft:
    • Microsoft: 4
  • Thales:
    • Thales: 133
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 15
  • DES:
    • 3DES:
      • 3DES: 2
      • TDEA: 1
      • TDES: 8
    • DES:
      • DES: 17
  • constructions:
    • MAC:
      • CMAC: 1
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
  • FF:
    • DH:
      • DH: 10
      • Diffie-Hellman: 1
  • ECC:
    • ECDH:
      • ECDH: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 5
    • SHA2:
      • SHA-224: 2
      • SHA-256: 4
      • SHA-384: 4
      • SHA-512: 3
      • SHA224: 1
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key agreement: 1
  • MAC:
    • MAC: 7
  • MAC:
    • MAC: 1
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 3
pdf_data/st_keywords/randomness
  • PRNG:
    • PRNG: 1
  • RNG:
    • RND: 18
    • RNG: 4
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • ECB:
    • ECB: 1
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 3
    • fault induction: 2
    • malfunction: 2
    • physical tampering: 1
  • SCA:
    • DPA: 1
    • Leak-Inherent: 3
    • physical probing: 2
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 74
pdf_data/st_keywords/cplc_data
  • ICFab:
    • IC Fabricator: 1
  • ICType:
    • IC Type: 1
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS31: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS PUB 180-4: 1
    • FIPS180-4: 1
    • FIPS197: 3
  • ISO:
    • ISO/IEC 18033-3: 1
  • PKCS:
    • PKCS#1: 8
    • PKCS#5: 3
  • SCP:
    • SCP01: 4
    • SCP02: 3
    • SCP03: 3
  • FIPS:
    • FIPS 140-3: 1
pdf_data/st_keywords/javacard_version
  • GlobalPlatform:
    • GlobalPlatform 2.2.1: 1
  • JavaCard:
    • Java Card 3.0.4: 4
    • JavaCard 3.0.4: 1
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 7
pdf_data/st_keywords/javacard_packages
  • javacard:
    • javacard.framework: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • Client v1.1 & Server v1.1 (These applications could be removed based on customer needs and they are out of scope of the evaluation). Additionally, other applets – not determined at the moment of the present: 1
    • These applications could be removed based on customer needs and they are out of scope of the evaluation: 1
    • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
    • out of scope: 2
  • OutOfScope:
    • Element of the device is separately certified according to the Common Criteria and is therefore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by: 1
    • out of scope: 2
    • to return to its User. Note: Defending against device re-use after physical com- promise is out of scope. D.User_Passcode D.User_Bio D.Card_Data T.RECOVER Card Re- covery An attacker attempts to recover: 1
pdf_data/st_metadata
  • /Author:
  • /CreationDate:
  • /Creator:
  • /Keywords:
  • /ModDate:
  • /Producer:
  • /Subject:
  • /Title:
  • /Trapped:
  • pdf_file_size_bytes: 1421244
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 100
state/cert/extract_ok True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/extract_ok True False
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/extract_ok True False
state/st/pdf_hash Different Different
state/st/txt_hash Different Different