Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Microsoft Exchange Server 2007 Enterprise Edition (English), Version/Build 08.02.0176.002
BSI-DSZ-CC-0436-2009
Plateforme Upteq NFC 2.1.3_Generic sur le composant ST33F1ME avec application DESFIRE 1.1 (S1124940, release C)
ANSSI-CC-2014/88
name Microsoft Exchange Server 2007 Enterprise Edition (English), Version/Build 08.02.0176.002 Plateforme Upteq NFC 2.1.3_Generic sur le composant ST33F1ME avec application DESFIRE 1.1 (S1124940, release C)
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme DE FR
not_valid_after 01.09.2019 17.12.2019
not_valid_before 16.11.2009 17.12.2014
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0436a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2014_88.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0436b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI_cible2014_88_LITE.pdf
manufacturer Microsoft Corporation Gemalto / STMicroelectronics
manufacturer_web https://www.microsoft.com https://www.gemalto.com/
security_level EAL4+ EAL4+, AVA_VAN.5, ALC_DVS.2
dgst 95badceef1b711cb 276ef5ffa7d5941c
heuristics/cert_id BSI-DSZ-CC-0436-2009 ANSSI-CC-2014/88
heuristics/cert_lab BSI THALES
heuristics/extracted_sars AVA_MSU.2, ALC_FLR.3, ATE_FUN.1, ADV_RCR.1, ADV_LLD.1, ATE_IND.2, AVA_VLA.2, ATE_DPT.1, AGD_USR.1, ADV_IMP.1, ALC_LCD.1, ADV_HLD.2, ATE_COV.2, ALC_DVS.1, ALC_TAT.1, ADV_FSP.2, AGD_ADM.1, AVA_SOF.1, ADV_SPM.1 AVA_VAN.5, ALC_DVS.2
heuristics/extracted_versions 08.02.0176.002 2.1.3, 1.1
heuristics/report_references/directly_referencing {} ANSSI-CC-2011/07
heuristics/report_references/indirectly_referencing {} ANSSI-CC-2010/49, ANSSI-CC-2011/07, ANSSI-CC-2010/50
heuristics/st_references/directly_referencing {} ANSSI-CC-2011/07
heuristics/st_references/indirectly_referencing {} ANSSI-CC-2011/07
heuristics/protection_profiles {} 9399bd94f9925b16
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-profil_PP-2010-03en.pdf
pdf_data/report_filename 0436a_pdf.pdf ANSSI-CC-2014_88.pdf
pdf_data/report_frontpage
  • FR:
  • DE:
    • cert_id: BSI-DSZ-CC-0436-2009
    • cert_item: Microsoft Exchange Server 2007 Enterprise Edition (English) Version/Build 08.02.0176.002
    • cert_lab: BSI
    • developer: Microsoft Corporation
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
  • FR:
    • cc_security_level: EAL 4 augmenté ALC_DVS.2, AVA_VAN.5
    • cc_version: Critères Communs version 3.1 révision 4
    • cert_id: ANSSI-CC-2014/88
    • cert_item: Plateforme Upteq NFC 2.1.3_Generic release C sur composant ST33F1ME
    • cert_item_version: T1020806, Release C
    • cert_lab: THALES (TCS – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France
    • developer: Gemalto La Vigie, Av du Jujubier ZI Athelia IV, 13705 La Ciotat Cedex, France STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, B.P. 2, 13106 Rousset, France Commanditaire Gemalto La Vigie, Av du Jujubier ZI Athelia IV, 13705 La Ciotat Cedex, France
    • match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
    • ref_protection_profiles: ANSSI-CC-PP-2010/03-M01 [PP JCS] Java Card System – Open Configuration, version 3.0
  • DE:
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0436-2009: 17
  • FR:
    • ANSSI-CC-2011/07: 7
    • ANSSI-CC-2011/07-M01: 1
    • ANSSI-CC-2011/07-M02: 3
    • ANSSI-CC-2011/07-M03: 3
    • ANSSI-CC-2011/07-S02: 1
    • ANSSI-CC-2014/88: 22
    • ANSSI-CC-PP-2010/03-M01: 2
pdf_data/report_keywords/cc_protection_profile_id
  • ANSSI:
    • ANSSI-CC-PP-2010/03-M01: 2
  • BSI:
    • BSI-PP-0035-2007: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 4: 3
    • EAL 4 augmented: 2
    • EAL 7: 1
    • EAL1: 5
    • EAL2: 3
    • EAL3: 4
    • EAL4: 8
    • EAL4 augmented: 1
    • EAL5: 6
    • EAL6: 3
    • EAL7: 4
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 4: 2
    • EAL 5: 1
    • EAL 7: 1
    • EAL4: 2
    • EAL5: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ACM:
    • ACM_AUT: 2
    • ACM_CAP: 2
    • ACM_SCP: 2
  • ADO:
    • ADO_DEL: 2
    • ADO_IGS: 2
  • ADV:
    • ADV_FSP: 2
    • ADV_HLD: 2
    • ADV_IMP: 2
    • ADV_INT: 2
    • ADV_LLD: 2
    • ADV_RCR: 2
    • ADV_SPM: 2
  • AGD:
    • AGD_ADM: 2
    • AGD_USR: 2
  • ALC:
    • ALC_DVS: 2
    • ALC_FLR: 2
    • ALC_FLR.3: 4
    • ALC_LCD: 1
    • ALC_TAT: 2
  • APE:
    • APE_DES: 1
    • APE_ENV: 1
    • APE_INT: 1
    • APE_OBJ: 1
    • APE_REQ: 1
    • APE_SRE: 1
  • ASE:
    • ASE_DES: 1
    • ASE_ENV: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_PPC: 1
    • ASE_REQ: 1
    • ASE_SRE: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 2
    • ATE_DPT: 2
    • ATE_FUN: 2
    • ATE_IND: 2
  • AVA:
    • AVA_CCA: 2
    • AVA_MSU: 2
    • AVA_SOF: 3
    • AVA_VLA: 3
    • AVA_VLA.2: 1
    • AVA_VLA.3: 1
    • AVA_VLA.4: 1
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 4
    • AGD_PRE: 2
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 3
    • ALC_FLR: 2
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 5
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 17
    • Microsoft Corporation: 5
  • Gemalto:
    • Gemalto: 4
  • STMicroelectronics:
    • STMicroelectronics: 2
pdf_data/report_keywords/eval_facility
  • TUV:
    • TÜV Informationstechnik: 3
    • tuvit: 12
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 5
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 1
pdf_data/report_keywords/crypto_library
  • Neslib:
    • NesLib v3.0: 2
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI 7149: 1
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 32: 1
    • AIS 34: 1
  • ISO:
    • ISO/IEC 15408:2005: 2
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • 02.0176.002, EVALUATION TECHNICAL REPORT, Version 3, Date 2009-10-01, TÜV Informationstechnik GmbH (confidential document) [8] Configuration list for the TOE: Exchange Server 2007 Common Criteria Evaluation, Configuration: 1
    • Server, Version: 1.05, Date: 2009-09-28; including all document as referenced in chapter 3.2. (confidential documents) [9] Microsoft Exchange Server 2007 Enterprise Edition Common Criteria Evaluation – Guidance: 1
  • OutOfScope:
    • TOE in the certified version and configuration. The version of the help-file on the product DVD is out of scope of the certification. The TOE has to be installed and configured according to the Guidance Addendum: 1
    • any client. The way external lists for filtering of messages are compiled and transferred is also out of scope of the evaluation. Some security functionality of the TOE environment, namely of the operating: 1
    • out of scope: 2
pdf_data/report_metadata
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20091209111723+01'00'
  • /Creator: Writer
  • /Keywords: "Microsoft Exchange Server 2007 Enterprise Edition (English) Version/Build 08.02.0176.002, Microsoft Corporation, Common Criteria, Certification, Zertifzierung"
  • /ModDate: D:20091218092509+01'00'
  • /Producer: StarOffice 9
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0436-2009
  • pdf_file_size_bytes: 966828
  • pdf_hyperlinks: http://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 34
  • /Author: robert-n@intranet.fr
  • /CreationDate: D:20150115150459+01'00'
  • /Creator: Microsoft® Word 2010
  • /Keywords: ANSSI-CC-CER-F-07.013
  • /ModDate: D:20150115150459+01'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: Plateforme Upteq NFC 2.1.3_Generic sur le composant ST33F1ME avec application DESFIRE 1.1 (S1124940, release C)
  • /Title: ANSSI-CC-2014/88
  • pdf_file_size_bytes: 715730
  • pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 21
pdf_data/st_filename 0436b_pdf.pdf ANSSI_cible2014_88_LITE.pdf
pdf_data/st_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2011/07: 1
    • ANSSI-CC-2011/07-M02: 1
  • NL:
    • CC-1: 1
    • CC-2: 4
    • CC-3: 2
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-2007-0035: 3
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 9
    • EAL4 augmented: 4
  • EAL:
    • EAL4: 3
    • EAL4 augmented: 3
    • EAL4+: 1
    • EAL5: 2
    • EAL5 augmented: 2
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_AUT.1: 2
    • ACM_CAP.4: 1
    • ACM_SCP.2: 2
  • ADO:
    • ADO_DEL.2: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP.2: 2
    • ADV_HLD.2: 2
    • ADV_IMP.1: 2
    • ADV_LLD.1: 2
    • ADV_RCR.1: 2
    • ADV_SPM.1: 2
  • AGD:
    • AGD_ADD: 2
    • AGD_ADM.1: 2
    • AGD_USR.1: 1
  • ALC:
    • ALC_DVS.1: 2
    • ALC_FLR.3: 8
    • ALC_LCD.1: 2
    • ALC_TAT.1: 2
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.1: 1
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_MSU.2: 2
    • AVA_SOF.1: 2
    • AVA_VLA.2: 3
  • ADV:
    • ADV_ARC: 1
  • ALC:
    • ALC_DVS.2: 5
  • AVA:
    • AVA_VAN.5: 5
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 2
  • FDP:
    • FDP_ACC: 26
    • FDP_ACC.1: 13
    • FDP_ACF: 21
    • FDP_ACF.1: 16
    • FDP_IFC: 45
    • FDP_IFC.1: 17
    • FDP_IFF: 43
    • FDP_IFF.1: 35
  • FIA:
    • FIA_AFL: 1
    • FIA_ATD.1: 7
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 7
    • FIA_SOS.1.1: 1
    • FIA_UAU: 1
    • FIA_UAU.8: 30
    • FIA_UID: 1
    • FIA_UID.1: 3
    • FIA_UID.2: 2
    • FIA_UID.3: 34
    • FIA_USB.1: 7
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA: 95
    • FMT_MSA.1: 14
    • FMT_MSA.3: 22
    • FMT_SMF.1: 32
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 22
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FRU:
    • FRU_RSA: 18
    • FRU_RSA.1: 2
  • FAU:
    • FAU_ARP.1: 5
    • FAU_ARP.1.1: 1
    • FAU_SAS.1: 1
  • FCO:
    • FCO_NRO: 3
    • FCO_NRO.2: 8
  • FCS:
    • FCS_CKM: 11
    • FCS_CKM.1: 3
    • FCS_CKM.2: 3
    • FCS_CKM.3: 3
    • FCS_CKM.4: 2
    • FCS_CKM.4.1: 1
    • FCS_COP: 15
    • FCS_COP.1: 12
    • FCS_RND: 2
    • FCS_RND.1: 5
    • FCS_RND.1.1: 2
    • FCS_RNG.1: 2
  • FDP:
    • FDP_ACC: 10
    • FDP_ACC.1: 4
    • FDP_ACC.2: 6
    • FDP_ACF: 10
    • FDP_ACF.1: 28
    • FDP_ETC: 2
    • FDP_ETC.1: 2
    • FDP_IFC: 4
    • FDP_IFC.1: 2
    • FDP_IFC.2: 4
    • FDP_IFF: 4
    • FDP_IFF.1: 19
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.4: 1
    • FDP_ITC: 7
    • FDP_ITC.1: 3
    • FDP_ITC.2: 19
    • FDP_ITT.1: 1
    • FDP_RIP: 10
    • FDP_RIP.1: 8
    • FDP_ROL: 6
    • FDP_ROL.1: 9
    • FDP_SDI.2: 1
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UIT: 3
    • FDP_UIT.1: 4
  • FIA:
    • FIA_ATD: 1
    • FIA_ATD.1: 1
    • FIA_UAU: 8
    • FIA_UAU.1: 2
    • FIA_UAU.2: 1
    • FIA_UAU.4: 1
    • FIA_UAU.5: 2
    • FIA_UID: 9
    • FIA_UID.1: 4
    • FIA_UID.2: 3
    • FIA_USB: 1
    • FIA_USB.1: 3
  • FMT:
    • FMT_LIM: 1
    • FMT_LIM.1: 2
    • FMT_LIM.2: 1
    • FMT_MOF: 2
    • FMT_MOF.1: 1
    • FMT_MSA: 30
    • FMT_MSA.1: 10
    • FMT_MSA.2: 2
    • FMT_MSA.3: 21
    • FMT_MSA.3.1: 2
    • FMT_MTD: 6
    • FMT_MTD.1: 3
    • FMT_MTD.3: 1
    • FMT_SMF: 12
    • FMT_SMF.1: 9
    • FMT_SMF.1.1: 1
    • FMT_SMR: 12
    • FMT_SMR.1: 16
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO: 2
    • FPR_UNO.1: 2
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_FLS: 8
    • FPT_FLS.1: 7
    • FPT_FLS.1.1: 1
    • FPT_ITT: 2
    • FPT_ITT.1: 2
    • FPT_PHP.3: 1
    • FPT_RCV: 5
    • FPT_RCV.3: 11
    • FPT_RCV.4: 1
    • FPT_RPL: 2
    • FPT_RPL.1: 2
    • FPT_TDC: 2
    • FPT_TDC.1: 3
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
  • FRU:
    • FRU_FLT.2: 1
  • FTP:
    • FTP_ITC: 3
    • FTP_ITC.1: 6
    • FTP_TRP: 2
    • FTP_TRP.1: 3
pdf_data/st_keywords/cc_claims
  • A:
    • A.BLOCKLIST: 4
    • A.COM_PROT: 3
    • A.INSTALL: 3
    • A.NO_EVIL_ADM: 1
    • A.NO_EVIL_ADMIN: 2
    • A.PHYS_PROTECT: 4
    • A.PLATFORM: 4
  • O:
    • O.CONBLK: 7
    • O.DAC: 11
    • O.MAIL_FLOW: 5
    • O.QUOTA: 7
    • O.REDUCE_SPAM: 6
    • O.RESTDIST: 7
  • OE:
    • OE.BLOCKLIST: 3
    • OE.COM_PROT: 3
    • OE.INSTALL: 7
    • OE.PHYSICAL: 3
    • OE.PLATFORM: 16
  • OSP:
    • OSP.MAIL_FLOW: 3
  • T:
    • T.AUTH_DAC: 4
    • T.DL_MISUSE: 4
    • T.OVERFLOW: 4
    • T.SPAM: 7
    • T.UNAUTHUSE: 3
    • T.UNAUTH_DAC: 3
  • A:
    • A.APPLET: 1
    • A.DELETION: 4
    • A.MOBILE-OPERATOR: 2
    • A.OTA-ADMIN: 2
    • A.PERSONALIZER: 1
    • A.PRODUCTION: 1
    • A.VERIFICATION: 1
  • D:
    • D.API_DATA: 3
    • D.APP_CODE: 7
    • D.APP_C_DATA: 5
    • D.APP_I_DATA: 6
    • D.CARD_MNGT_DATA: 4
    • D.CRYPTO: 4
    • D.GASD_KEYS: 5
    • D.ISD_KEYS: 4
    • D.JCS_CODE: 3
    • D.JCS_DATA: 6
    • D.OPTIONAL_PF_SERVICE: 4
    • D.PIN: 4
    • D.SEC_DATA: 7
  • O:
    • O.ALARM: 1
    • O.APPLET: 16
    • O.APPLI-AUTH: 2
    • O.CARD-MANAGEMENT: 5
    • O.CARD_MANAGEMENT: 1
    • O.CIPHER: 2
    • O.CODE_PKG: 14
    • O.COMM_AUTH: 2
    • O.COMM_INTEGRITY: 2
    • O.CONTROLED-ES_LOADING: 1
    • O.DELETION: 2
    • O.FIREWALL: 2
    • O.GLOBAL_ARRAYS_CONFID: 2
    • O.GLOBAL_ARRAYS_INTEG: 2
    • O.INSTALL: 1
    • O.JAVAOBJECT: 38
    • O.KEY-MNGT: 2
    • O.LOAD: 2
    • O.NATIVE: 2
    • O.OBJ-DELETION: 2
    • O.OPERATE: 1
    • O.PIN-MNGT: 2
    • O.REALLOCATION: 2
    • O.REMOTE_SERVICE_ACTIVATION: 1
    • O.REMOTE_SERVICE_AUDIT: 2
    • O.RESOURCES: 1
    • O.RND: 2
    • O.SCP: 8
    • O.SCP-SUPPORT: 2
    • O.SID: 1
    • O.TRANSACTION: 2
  • OE:
    • OE.ACTIVATION-KEY-ESCROW: 2
    • OE.AID-MANAGEMENT: 2
    • OE.APPLET: 1
    • OE.BASIC-APPS-VALIDATION: 2
    • OE.CARD-: 1
    • OE.CARD-MANAGEMENT: 2
    • OE.CARD_MANAGEMENT: 1
    • OE.CODE-: 1
    • OE.CODE-EVIDENCE: 1
    • OE.GEMACTIVATE-ADMIN: 2
    • OE.KEY-ESCROW: 2
    • OE.KEY-GENERATION: 2
    • OE.MOBILE-OPERATOR: 2
    • OE.OPERATOR-KEYS: 2
    • OE.OTA-ADMIN: 2
    • OE.OTA-LOADING: 2
    • OE.OTA-SERVERS: 2
    • OE.PERSONALIZER: 2
    • OE.PRODUCTION: 2
    • OE.SCP: 6
    • OE.TRUSTED-APPS-DEVELOPER: 2
    • OE.TRUSTED-APPS-PRE-ISSUANCE: 2
    • OE.VERIFICATION: 4
  • OP:
    • OP.ARRAY_ACCESS: 4
    • OP.CREATE: 7
    • OP.DELETE_APPLET: 4
    • OP.DELETE_PCKG: 3
    • OP.DELETE_PCKG_APPLET: 3
    • OP.INSTANCE_FIELD: 4
    • OP.INVK_INTERFACE: 7
    • OP.INVK_VIRTUAL: 6
    • OP.JAVA: 5
    • OP.PUT: 6
    • OP.THROW: 5
    • OP.TYPE_ACCESS: 5
  • OSP:
    • OSP.ACTIVATION-: 1
    • OSP.ACTIVATION-KEY-ESCROW: 1
    • OSP.AID-MANAGEMENT: 2
    • OSP.BASIC-APPS-VALIDATION: 2
    • OSP.KEY-ESCROW: 2
    • OSP.KEY-GENERATION: 2
    • OSP.OPERATOR-KEYS: 2
    • OSP.OTA-LOADING: 2
    • OSP.OTA-SERVERS: 2
    • OSP.PERSONALIZER: 2
    • OSP.PRODUCTION: 2
    • OSP.RNG: 3
    • OSP.SERVICE: 1
    • OSP.SERVICE_AUDIT: 2
    • OSP.TRUSTED-APPS-: 2
    • OSP.TRUSTED-APPS-DEVELOPER: 2
    • OSP.TRUSTED-APPS-PRE-ISSUANCE: 1
    • OSP.VERIFICATION: 1
  • R:
    • R.JAVA: 9
  • T:
    • T.CONFID-APPLI-DATA: 1
    • T.CONFID-JCS-CODE: 1
    • T.CONFID-JCS-DATA: 1
    • T.DELETION: 3
    • T.EXE-CODE: 2
    • T.INSTALL: 1
    • T.INTEG-APPLI-CODE: 2
    • T.INTEG-APPLI-DATA: 2
    • T.INTEG-JCS-CODE: 1
    • T.INTEG-JCS-DATA: 1
    • T.INTEG-USER-DATA: 2
    • T.LIFE_CYCLE: 2
    • T.NATIVE: 1
    • T.OBJ-DELETION: 1
    • T.PHYSICAL: 1
    • T.RESOURCES: 2
    • T.SID: 2
    • T.UNAUTHORIZED_ACCESS_TO_SERVICE: 2
    • T.UNAUTHORIZED_CARD_MNGT: 2
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 42
    • Microsoft Corporation: 2
  • Gemalto:
    • Gemalto: 171
  • NXP:
    • NXP: 1
    • NXP Semiconductors: 1
  • STMicroelectronics:
    • STMicroelectronics: 3
pdf_data/st_keywords/eval_facility
  • TUV:
    • tuvit: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • RC:
      • RC4: 1
  • AES_competition:
    • AES:
      • AES: 23
  • DES:
    • 3DES:
      • TDEA: 1
      • TDES: 5
      • Triple-DES: 3
    • DES:
      • DES: 18
  • constructions:
    • MAC:
      • CMAC: 2
      • HMAC: 7
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 1
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-2: 3
      • SHA-224: 2
      • SHA-256: 3
      • SHA-384: 3
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key agreement: 1
  • MAC:
    • MAC: 19
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 3
      • SSL 3.0: 1
    • TLS:
      • TLS: 19
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 2
    • RNG: 6
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 8
  • ECB:
    • ECB: 4
pdf_data/st_keywords/crypto_engine
  • NesCrypt:
    • Nescrypt: 1
pdf_data/st_keywords/side_channel_analysis
  • other:
    • reverse engineering: 1
  • FI:
    • fault induction: 2
    • malfunction: 3
    • physical tampering: 4
  • SCA:
    • DPA: 1
    • Leak-Inherent: 4
    • physical probing: 1
  • other:
    • JIL: 2
pdf_data/st_keywords/standard_id
  • RFC:
    • RFC 1725: 1
    • RFC 1730: 1
    • RFC 2821: 11
    • RFC 2822: 7
    • RFC1725: 1
    • RFC1730: 1
  • CC:
    • CCIMB-2012-09-004: 1
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
  • FIPS:
    • FIPS 180-2: 1
    • FIPS 180-3: 1
    • FIPS 197: 1
    • FIPS 46-3: 1
    • FIPS PUB 197: 4
    • FIPS PUB 46-3: 5
    • FIPS PUB 81: 4
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 9796-2: 1
  • PKCS:
    • PKCS #1: 5
    • PKCS #5: 1
    • PKCS#1: 1
    • PKCS#5: 1
  • RFC:
    • RFC2085: 1
    • RFC2104: 1
  • SCP:
    • SCP 01: 1
    • SCP 02: 1
    • SCP 80: 1
    • SCP02: 5
    • SCP80: 8
pdf_data/st_keywords/javacard_version
  • GlobalPlatform:
    • Global Platform 2.2.1: 1
  • JavaCard:
    • Java Card 3.0.1: 1
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 5
pdf_data/st_keywords/javacard_packages
  • javacard:
    • javacard.framework: 2
    • javacard.security: 2
  • javacardx:
    • javacardx.crypto: 10
    • javacardx.security: 9
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • it should be noted that the way these external lists are compiled and transferred to the TOE are out of scope of the evaluation. Security Target Page 14/83 2.3.4 Important functionality of the environment The: 1
    • out of scope: 1
  • OutOfScope:
    • out of scope: 1
    • parameters for cryptographic operations, the use of these other values are not advised; and clearly out of scope of the TOE. See [USR] for details. JCS.EraseResidualData The security function ensures that: 1
pdf_data/st_metadata
  • /Author: mhajj
  • /CreationDate: D:20150112160126+01'00'
  • /Creator: PDFCreator Version 1.7.1
  • /Keywords:
  • /ModDate: D:20150112160126+01'00'
  • /Producer: GPL Ghostscript 9.07
  • /Subject:
  • /Title: ST_D1314435_DESFIRE_LITE_v1.0p - Copy
  • pdf_file_size_bytes: 1874846
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 143
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different