name |
Application eTravel EAC 1.4 avec AA, configuration BAC avec AMD 122v1, masquée sur composants M7820 A11 |
Application eTravel EAC v2.0, en configuration "EAC on BAC" sur la plateforme ouverte MultiApp V3 masquée sur le composant M7820 A11 (Version du patch : 1.5) |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
FR |
FR |
status |
archived |
archived |
not_valid_after |
01.09.2019 |
01.09.2019 |
not_valid_before |
07.02.2013 |
11.07.2014 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2012_50fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2014-48fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-cible2012_50en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2014-48en.pdf |
manufacturer |
Gemalto - Infineon Technologies AG |
Gemalto - Infineon Technologies AG |
manufacturer_web |
https://www.gemalto.com/ |
https://www.gemalto.com/ |
security_level |
EAL4+, ALC_DVS.2 |
AVA_VAN.5, ALC_DVS.2, EAL5+ |
dgst |
989a91080ed24619 |
346f6fa7f35797dc |
heuristics/cert_id |
ANSSI-CC-2012/50 |
ANSSI-CC-2014/48 |
heuristics/cert_lab |
THALES |
SERMA |
heuristics/cpe_matches |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_DVS.2, AVA_VAN.5, ADV_ARC.1 |
ALC_DVS.2, AVA_VAN.5, ADV_ARC.1 |
heuristics/extracted_versions |
1.4 |
2.0, 1.5 |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2015/09 |
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-0813-2012 |
BSI-DSZ-CC-0829-2012, ANSSI-CC-2014/06 |
heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2015/09 |
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-0813-2012, BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0640-2010 |
BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0829-2012, ANSSI-CC-2014/06 |
heuristics/scheme_data |
- cert_id: ANSSI-CC-2012/50
- description: Le produit certifié est le passeport électronique intitulé « Application eTravel EAC 1.4 avec AA, configuration BAC avec AMD 122v1, masquée sur composants M7820 A11 » développé par Gemalto et Infineon. Les variantes des composants M7820 A11 utilisées sont les microcontrôleurs SLE78CLXxxxxP et SLE78CLXxxxxPM (cette dernière variante supporte une interface au standard Mifare). La version de la pl
- developer: Gemalto / Infineon Technologies AG
- enhanced:
- augmented: ALC_DVS.2
- category: Cartes à puce
- cc_version: Critères Communs version 3.1r3
- cert_id: ANSSI-CC-2012/50
- certification_date: 2013-02-07
- developer: Gemalto / Infineon Technologies AG
- evaluation_facility: THALES (TCS – CNES)
- level: EAL4+
- mutual_recognition: SOG-IS CCRA
- protection_profile: BSI-CC-PP-0055-2009, PP BAC
- report_link: https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2012-50fr.pdf
- sponsor: Gemalto
- target_link: https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2012-50en.pdf
- level: EAL4+
- product: Application eTravel EAC 1.4 avec AA, configuration BAC avec AMD 122v1, masquée sur composants M7820 A11
- sponsor: Gemalto
- url: https://cyber.gouv.fr/produits-certifies/application-etravel-eac-14-avec-aa-configuration-bac-avec-amd-122v1-masquee-sur
|
- cert_id: ANSSI-CC-2014/48
- description: Le produit certifié est la carte à puce ouverte « MultiApp V3 », pouvant être en mode contact ou sans-contact. Le produit est développé par la société Gemalto et embarqué sur le microcontrôleur M7820 A11 fabriqué par la société Infineon Technologies. Le produit implémente les fonctions de document de voyage électronique conformément aux spécifications de l'organisation de l'aviation civ
- developer: Gemalto / Infineon Technologies AG
- enhanced:
- augmented: ALC_DVS.2, AVA_VAN.5
- category: Cartes à puce
- cc_version: Critères Communs version 3.1r4
- cert_id: ANSSI-CC-2014/48
- certification_date: 2014-07-11
- developer: Gemalto / Infineon Technologies AG
- evaluation_facility: Serma Technologies
- level: EAL5+
- mutual_recognition: SOG-IS CCRA
- protection_profile: BSI-CC-PP-0056-2009, [PP EACv1], version 1.10
- report_link: https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2014-48fr.pdf
- sponsor: Gemalto
- target_link: https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2014-48en.pdf
- level: EAL5+
- product: Application eTravel EAC v2.0, en configuration ''EAC on BAC'', sur la plateforme ouverte MultiApp V3 masquée sur le composant M7820 A11
- sponsor: Gemalto
- url: https://cyber.gouv.fr/produits-certifies/application-etravel-eac-v20-en-configuration-eac-bac-sur-la-plateforme-ouverte
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
BSI-DSZ-CC-0813-2012, BSI-DSZ-CC-0640-2010 |
BSI-DSZ-CC-0829-2012 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
BSI-DSZ-CC-0813-2012, BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0640-2010 |
BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0813-2012, BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0695-2011, BSI-DSZ-CC-0829-2012 |
heuristics/verified_cpe_matches |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
ANSSI-CC-2012_50fr.pdf |
ANSSI-CC_2014-48fr.pdf |
pdf_data/report_frontpage |
- FR:
- cc_security_level: EAL 4 augmenté ALC_DVS.2
- cc_version: Critères Communs version 3.1 révision 3
- cert_id: ANSSI-CC-2012/50
- cert_item: Application eTravel EAC 1.4 avec AA, configuration BAC avec AMD 122v1, masquée sur composants M7820 A11
- cert_item_version: Version du logiciel embarqué : Plateformes Multos 74 et 75 Version du code correctif : AMD 122v1 Variantes du composant M7820 A11 : Microcontrôleurs SLE78CLXxxxxP et SLE78CLXxxxxPM
- cert_lab: THALES (TCS – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France
- developer: Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France Infineon Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: BSI-CC-PP-0055-2009, [PP BAC], version 1.10 Machine Readable Travel Document with “ICAO Application”, Basic Access Control
|
- FR:
- cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 4
- cert_id: ANSSI-CC-2014/48
- cert_item: Application eTravel EAC v2.0, en configuration "EAC on BAC", sur la plateforme ouverte MultiApp V3 masquée sur le composant M7820 A11
- cert_item_version: Version de l’application eTravel EAC : 2.0 Version plateforme Java Card MultiApp : 3.0 Version du patch : 1.5
- cert_lab: Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
- developer: Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France Infineon Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: BSI-CC-PP-0056-2009, [PP EACv1], version 1.10 CC Protection Profile – Machine Readable Travel Document with ICAO application, Extended Access Control
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- FR:
- ANSSI-CC-2014/06: 4
- ANSSI-CC-2014/48: 23
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0055-2009: 1
- BSI-PP- 0035-2007: 1
- BSI-PP-0035-2007: 2
- BSI-PP-0055-2009: 1
|
- BSI:
- BSI-CC-PP-0056-2009: 2
- BSI-PP- 0035-2007: 1
- BSI-PP-0035-2007: 2
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 2
- EAL 5: 1
- EAL 7: 1
- EAL4: 2
- EAL5: 1
- EAL5+: 1
- EAL7: 1
- ITSEC:
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 1
- EAL4: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
- Gemalto:
- Infineon:
- Infineon: 3
- Infineon Technologies AG: 2
|
- Gemalto:
- Infineon:
- Infineon: 2
- Infineon Technologies: 23
- Infineon Technologies AG: 1
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- ICAO:
- PKCS:
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- ICAO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: torno
- /CreationDate: D:20131102110534+01'00'
- /Creator: PDFCreator Version 0.9.0
- /Keywords:
- /ModDate: D:20131102110534+01'00'
- /Producer: AFPL Ghostscript 8.53
- /Subject:
- /Title: ANSSI-CC-2012_50fr
- pdf_file_size_bytes: 322525
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
- /CreationDate: D:20140711144222+02'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20140807095432+02'00'
- /Producer: Acrobat Distiller 9.0.0 (Windows)
- /Title:
- pdf_file_size_bytes: 266827
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 22
|
pdf_data/st_filename |
anssi-cc-cible2012_50en.pdf |
ANSSI-CC-cible_2014-48en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0640-2010: 1
- BSI-DSZ-CC-0813-2012: 1
- NL:
|
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-PP-0002: 1
- BSI-PP-0035: 1
- BSI-PP-0055: 3
- BSI-PP-0056: 1
|
- BSI:
- BSI-CC-PP-0056-V2-2012: 1
- BSI-CC-PP-0068-V2-2011: 1
- BSI-PP-0002: 1
- BSI-PP-0035: 1
- BSI-PP-0055: 1
- BSI-PP-0056: 1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 5+: 1
- EAL4: 1
- EAL4 augmented: 1
- EAL5: 1
|
- EAL:
- EAL 5+: 1
- EAL5: 2
- EAL5 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_TDS: 1
- ALC:
|
- ADV:
- ALC:
- AVA:
- AVA_VAN.3: 2
- AVA_VAN.5: 2
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_SAS: 5
- FAU_SAS.1: 6
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM.1: 10
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 9
- FCS_CKM.4.1: 1
- FCS_COP: 9
- FCS_COP.1: 8
- FCS_RND: 6
- FCS_RND.1: 6
- FCS_RND.1.1: 2
- FDP:
- FDP_ACC.1: 5
- FDP_ACC.1.1: 1
- FDP_ACF: 1
- FDP_ACF.1: 3
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FDP_ITC.1: 7
- FDP_ITC.2: 7
- FDP_UCT.1: 3
- FDP_UIT.1: 2
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL.1: 4
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_API: 1
- FIA_API.1: 3
- FIA_SOS.2: 1
- FIA_UAU: 5
- FIA_UAU.1: 3
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 3
- FIA_UAU.4.1: 1
- FIA_UAU.5: 3
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 3
- FIA_UAU.6: 3
- FIA_UAU.6.1: 1
- FIA_UID.1: 4
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_LIM: 6
- FMT_LIM.1: 14
- FMT_LIM.1.1: 2
- FMT_LIM.2: 13
- FMT_LIM.2.1: 2
- FMT_MSA.3: 1
- FMT_MTD: 5
- FMT_MTD.1: 5
- FMT_MTD.1.1: 1
- FMT_SMF.1: 8
- FMT_SMF.1.1: 1
- FMT_SMR.1: 8
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 3
- FPT_FLS.1.1: 1
- FPT_PHP.3: 4
- FPT_PHP.3.1: 1
- FPT_TST.1: 4
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC.1: 2
- FTP_TRP.1: 2
|
- FAU:
- FAU_GEN: 1
- FAU_SAS: 6
- FAU_SAS.1: 7
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 21
- FCS_CKM.1: 9
- FCS_CKM.1.1: 1
- FCS_CKM.2: 3
- FCS_CKM.4: 20
- FCS_CKM.4.1: 1
- FCS_COP: 34
- FCS_COP.1: 5
- FCS_COP.1.1: 5
- FCS_RND: 7
- FCS_RND.1: 6
- FCS_RND.1.1: 2
- FDP:
- FDP_ACC.1: 7
- FDP_ACF: 1
- FDP_ACF.1: 6
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FDP_ITC.1: 7
- FDP_ITC.2: 7
- FDP_UCT.1: 4
- FDP_UCT.1.1: 1
- FDP_UIT.1: 4
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL: 5
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_API: 9
- FIA_API.1: 7
- FIA_API.1.1: 1
- FIA_SOS.2: 1
- FIA_UAU: 5
- FIA_UAU.1: 4
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 5
- FIA_UAU.4.1: 1
- FIA_UAU.5: 6
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 4
- FIA_UAU.6.1: 1
- FIA_UID: 8
- FIA_UID.1: 6
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_LIM: 7
- FMT_LIM.1: 17
- FMT_LIM.1.1: 3
- FMT_LIM.2: 16
- FMT_LIM.2.1: 3
- FMT_MSA.3: 1
- FMT_MTD: 27
- FMT_MTD.1: 5
- FMT_MTD.3: 3
- FMT_MTD.3.1: 1
- FMT_SMF.1: 22
- FMT_SMF.1.1: 1
- FMT_SMR.1: 16
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS: 4
- FPT_EMS.1: 8
- FPT_EMS.1.1: 3
- FPT_EMS.1.2: 3
- FPT_FLS.1: 4
- FPT_FLS.1.1: 1
- FPT_PHP.3: 5
- FPT_PHP.3.1: 1
- FPT_TST: 2
- FPT_TST.1: 5
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC.1: 2
- FTP_TRP.1: 2
|
pdf_data/st_keywords/cc_claims |
|
- OE:
- OE.BAC-PP: 1
- OE.BAC_PP: 1
- OE.MRTD_: 1
|
pdf_data/st_keywords/vendor |
- Gemalto:
- Infineon:
- Thales:
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 1
- Physical Tampering: 2
- Physical tampering: 1
- fault injection: 1
- malfunction: 3
- physical tampering: 1
- SCA:
- DPA: 2
- SPA: 1
- physical probing: 3
- timing attacks: 1
- other:
|
- FI:
- Malfunction: 3
- Physical Tampering: 2
- Physical tampering: 1
- fault injection: 1
- malfunction: 4
- physical tampering: 1
- SCA:
- DPA: 2
- Leak-Inherent: 1
- SPA: 1
- physical probing: 4
- timing attacks: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
- EF:
- EF.COM: 10
- EF.DG1: 25
- EF.DG13: 3
- EF.DG14: 3
- EF.DG15: 4
- EF.DG16: 22
- EF.DG2: 11
- EF.DG3: 6
- EF.DG4: 6
- EF.DG5: 6
- EF.DG6: 2
- EF.SOD: 10
|
- EF:
- EF.COM: 7
- EF.DG1: 14
- EF.DG14: 6
- EF.DG15: 2
- EF.DG16: 13
- EF.DG2: 8
- EF.DG3: 18
- EF.DG4: 17
- EF.DG5: 6
- EF.SOD: 8
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2006-09-001: 2
- CCMB-2007-09-002: 2
- CCMB-2007-09-003: 2
- CCMB-2007-09-004: 2
- FIPS:
- FIPS 180-2: 1
- FIPS 48-3: 2
- FIPS PUB 46-3: 1
- FIPS180-2: 1
- FIPS46-3: 3
- ICAO:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816-4: 1
- PKCS:
- RFC:
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- FIPS:
- FIPS 180-2: 1
- FIPS 186-3: 1
- FIPS 197: 1
- FIPS PUB 46-3: 1
- FIPS180-2: 1
- FIPS46-3: 1
- ICAO:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816-4: 1
- NIST:
- PKCS:
- RFC:
- SCP:
- SCP01: 1
- SCP02: 1
- SCP03: 2
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: ccrippam
- /CreationDate: D:20120703144936+02'00'
- /Creator: PScript5.dll Version 5.2
- /ModDate: D:20120703144936+02'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /Title: Microsoft Word - ST_BAC_ID MOTION_D1192336-Pub.doc
- pdf_file_size_bytes: 748566
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 54
|
- /CreationDate: D:20140620160301+02'00'
- /Creator: Microsoft® Office Word 2007
- /Keywords: Security Target, CC, eTravel
- /ModDate: D:20140807095447+02'00'
- /Producer: Microsoft® Office Word 2007
- /Subject:
- /Title:
- pdf_file_size_bytes: 975021
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 65
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |