Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Application IAS V4 sur la plateforme JavaCard ouverte MultiApp V3 masquée sur le composant M7820 A11 (Version du patch : 1.5)
ANSSI-CC-2014/49
Plateforme Java Card MultiApp V4.2 en configuration ouverte sur le composant IFX_CCI_000010h (Version 4.2.0, Java Card version 3.0.5, GP version 2.3)
ANSSI-CC-2020/65v2
name Application IAS V4 sur la plateforme JavaCard ouverte MultiApp V3 masquée sur le composant M7820 A11 (Version du patch : 1.5) Plateforme Java Card MultiApp V4.2 en configuration ouverte sur le composant IFX_CCI_000010h (Version 4.2.0, Java Card version 3.0.5, GP version 2.3)
status archived active
not_valid_after 01.09.2019 26.06.2025
not_valid_before 11.07.2014 28.09.2021
cert_link None https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2020-65v2.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2014-49fr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_65v2.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2014-49en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible-anssi-cc-2020-65v2.pdf
manufacturer Gemalto - Infineon Technologies AG THALES DIS FRANCE SA
manufacturer_web https://www.gemalto.com/ https://www.thalesgroup.com/en/europe/france
dgst 995da0406e6ca2af 1412d1d9e0d553c1
heuristics/cert_id ANSSI-CC-2014/49 ANSSI-CC-2020/65v2
heuristics/cert_lab SERMA []
heuristics/extracted_sars AVA_VAN.5, ALC_DVS.2 ATE_COV.2, AGD_OPE.1, ADV_ARC.1, ALC_DEL.1, ADV_FSP.5, AGD_PRE.1, ALC_CMC.4, ALC_LCD.1, ALC_DVS.2, ATE_DPT.3, ADV_INT.2, ADV_IMP.1, AVA_VAN.5, ATE_FUN.1, ATE_IND.2, ALC_TAT.2, ADV_TDS.4
heuristics/extracted_versions 1.5 4.2, 3.0.5, 4.2.0, 2.3
heuristics/report_references/directly_referenced_by ANSSI-CC-2014/50 {}
heuristics/report_references/directly_referencing ANSSI-CC-2014/14, BSI-DSZ-CC-0829-2012, ANSSI-CC-2014/06 ANSSI-CC-2020/65
heuristics/report_references/indirectly_referenced_by ANSSI-CC-2014/50 {}
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-0640-2010, ANSSI-CC-2014/14, BSI-DSZ-CC-0728-2011, ANSSI-CC-2014/06, BSI-DSZ-CC-0829-2012 ANSSI-CC-2020/65
heuristics/scheme_data
  • cert_id: ANSSI-CC-2014/49
  • description: Le produit qualifié est l'« application IAS V4 sur la plateforme JavaCard ouverte MultiApp V3masquée sur le composant M7820 A11 », pouvant être en mode contact ou sans-contact. Leproduit est développé par la société Gemalto et embarqué sur le microcontrôleur M7820 A11fabriqué par la société Infineon Technologies. Ce produit est également proposé sous les noms IDPrime MD 840 (mode contact uni
  • developer: Gemalto / Infineon Technologies AG
  • enhanced:
    • augmented: ALC_DVS.2, AVA_VAN.5
    • category: Cartes à puce
    • cc_version: Critères Communs version 3.1r4
    • cert_id: ANSSI-CC-2014/49
    • certification_date: 2014-07-11
    • developer: Gemalto / Infineon Technologies AG
    • evaluation_facility: Serma Technologies
    • level: EAL5+
    • mutual_recognition: SOG-IS CCRA
    • protection_profile: BSI-CC-PP-0059-2009-MA-01, BSI-CC-PP-0075-2012
    • report_link: https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2014-49fr.pdf
    • sponsor: Gemalto
    • target_link: https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2014-49en.pdf
  • level: EAL5+
  • product: Application IAS V4 sur la plateforme JavaCard ouverte MultiApp V3 masquée sur le composant M7820 A11 (Version du patch : 1.5)
  • sponsor: Gemalto
  • url: https://cyber.gouv.fr/produits-certifies/application-ias-v4-sur-la-plateforme-javacard-ouverte-multiapp-v3-masquee-sur-1
  • cert_id: ANSSI-CC-2020/65v2
  • description: Le produit évalué est la « Plateforme Java Card MultiApp V4.2 en configuration ouverte sur le composant IFX_CCI_000010h, version 4.2.0 », développé par THALES et INFINEON TECHNOLOGIES AG. Ce produit est destiné à héberger et exécuter une ou plusieurs applications, dites applets dans la terminologie Java Card. Ces applications peuvent revêtir un caractère sécuritaire différent (selon qu’elles soie
  • developer: THALES et INFINEON TECHNOOGIES AG/ THALES
  • enhanced:
    • augmented: ALC_DVS.2, AVA_VAN.5
    • category: Cartes à puce
    • cc_version: Critères Communs version 3.1r5
    • cert_id: ANSSI-CC-2020/65v2
    • cert_link: https://cyber.gouv.fr/sites/default/files/2021/11/certificat-anssi-cc-2020-65v2.pdf
    • certification_date: 2021-09-28
    • developer: THALES et INFINEON TECHNOOGIES AG/ THALES
    • evaluation_facility: SERMA SAFETY & SECURITY
    • expiration_date: 2025-06-26
    • level: EAL5+
    • mutual_recognition: SOG-IS CCRA
    • protection_profile: Java Card System Protection Profile Open Configuration
    • report_link: https://cyber.gouv.fr/sites/default/files/2021/11/anssi-cc-2020_65v2.pdf
    • sponsor: THALES et INFINEON TECHNOOGIES AG/ THALES
    • target_link: https://cyber.gouv.fr/sites/default/files/2021/11/cible-anssi-cc-2020-65v2.pdf
  • expiration_date: 2025-06-26
  • level: EAL5+
  • product: Plateforme Java Card MultiApp V4.2 en configuration ouverte sur le composant IFX_CCI_000010h (Version 4.2.0, Java Card version 3.0.5, GP version 2.3)
  • sponsor: THALES et INFINEON TECHNOOGIES AG/ THALES
  • url: https://cyber.gouv.fr/produits-certifies/plateforme-java-card-multiapp-v42-en-configuration-ouverte-sur-le-composant-0
heuristics/st_references/directly_referencing BSI-DSZ-CC-0695-2011 BSI-DSZ-CC-1079-2018
heuristics/st_references/indirectly_referencing BSI-DSZ-CC-0695-2011 BSI-DSZ-CC-1079-2018
maintenance_updates
protection_profiles
pdf_data/cert_filename None certificat-anssi-cc-2020-65v2.pdf
pdf_data/cert_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2020/65v2: 2
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0099-2: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
    • EAL5: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
pdf_data/cert_keywords/vendor
pdf_data/cert_keywords/eval_facility
  • Serma:
    • SERMA: 2
pdf_data/cert_keywords/symmetric_crypto
pdf_data/cert_keywords/asymmetric_crypto
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
pdf_data/cert_keywords/crypto_scheme
pdf_data/cert_keywords/crypto_protocol
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
pdf_data/cert_keywords/ecc_curve
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
pdf_data/cert_keywords/technical_report_id
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
pdf_data/cert_metadata
  • /Author:
  • /CreationDate: D:20211004103608+02'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20211004103608+02'00'
  • /Producer: Acrobat Distiller 11.0 (Windows)
  • /Title:
  • pdf_file_size_bytes: 280367
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename ANSSI-CC_2014-49fr.pdf anssi-cc-2020_65v2.pdf
pdf_data/report_frontpage
  • FR:
    • cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
    • cc_version: Critères Communs version 3.1 révision 4
    • cert_id: ANSSI-CC-2014/49
    • cert_item: Application IAS V4 sur la plateforme JavaCard ouverte MultiApp V3 masquée sur le composant M7820 A11
    • cert_item_version: Version de l’application IAS : 4.0.2.K Version de l’application MOCA Server : 1.0 Version plateforme Java Card MultiApp : 3.0 Version du patch : 1.5
    • cert_lab: Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France Rapport de certification ANSSI-CC-2014/49 Application IAS V4 sur la plateforme JavaCard ouverte MultiApp V3 masquée sur le composant M7820 A11 Page 4 sur 24 ANSSI-CC-CER-F-07.011
    • developer: Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France Infineon Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France
    • match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
    • ref_protection_profiles: Protection profiles for secure signature creation device – Part 2: Device with key generation, Référence : prEN 14169-2:2012, Version 2.0.1, maintenu sous la référence BSI-CC-PP-0059-2009-MA-01 (voir [PP-SSCD-Part2]). Protection profiles for secure signature creation device – Part 3: Device with key import, Référence : prEN 14169-3:2012, Version 1.0.2, certifié sous la référence BSI-CC-PP-0075-2012 (voir [PP-SSCD-Part3
  • FR:
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0829-2012: 3
  • FR:
    • ANSSI-CC-2014/06: 4
    • ANSSI-CC-2014/14: 2
    • ANSSI-CC-2014/49: 25
  • DE:
    • BSI-DSZ-CC-1079-2018-MA-01: 1
  • FR:
    • ANSSI-CC-2020/65: 3
    • ANSSI-CC-2020/65v2: 2
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0059-2009-MA-01: 1
    • BSI-CC-PP-0059-2009-MA-01: 2
    • BSI-CC-PP-0075-2012: 2
    • BSI-PP- 0035-2007: 1
    • BSI-PP-0035-: 1
    • BSI-PP-0035-2007: 1
  • other:
    • PP-SSCD-: 2
    • PP-SSCD-Part2: 2
    • PP-SSCD-Part3: 2
  • BSI:
    • BSI-CC-PP-0099-2017: 1
    • BSI-PP-0084-2014: 1
    • BSI-PP-0099-2017: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 5: 3
    • EAL 7: 1
    • EAL4: 2
    • EAL5: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 5: 3
    • EAL 7: 1
    • EAL2: 2
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 3
    • ALC_FLR: 2
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 6
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 2
    • AGD_PRE: 2
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 2
    • ALC_FLR: 2
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 4
pdf_data/report_keywords/vendor
  • Gemalto:
    • Gemalto: 33
  • Infineon:
    • Infineon: 3
    • Infineon Technologies: 5
    • Infineon Technologies AG: 1
  • Gemalto:
    • Gemalto: 5
  • Infineon:
    • Infineon Technologies AG: 1
  • Microsoft:
    • Microsoft: 1
pdf_data/report_keywords/eval_facility
  • CESTI:
    • CESTI: 1
  • Serma:
    • Serma Technologies: 3
  • CESTI:
    • CESTI: 1
  • Serma:
    • SERMA: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-2: 1
pdf_data/report_keywords/crypto_protocol
  • PACE:
    • PACE: 1
  • PACE:
    • PACE: 2
pdf_data/report_keywords/crypto_library
  • Infineon:
    • v1.02.013: 3
pdf_data/report_keywords/cplc_data
  • ICFab:
    • IC Fabricator: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • BSI:
    • AIS 31: 1
    • AIS31: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
pdf_data/report_keywords/javacard_version
  • JavaCard:
    • Java Card 3.0.5: 3
pdf_data/report_keywords/javacard_packages
  • com:
    • com.gemalto.javacardx.pace: 1
  • javacardx:
    • javacardx.pace: 1
  • com:
    • com.gemalto.emvapi: 1
    • com.gemalto.javacard.filesystem: 1
    • com.gemalto.javacard.iasclassic: 1
    • com.gemalto.javacard.ism: 1
    • com.gemalto.javacard.mspnp: 1
    • com.gemalto.javacard.open: 1
    • com.gemalto.javacard.securemessaging.builde: 1
    • com.gemalto.javacard.securemessaging.intern: 1
    • com.gemalto.javacard.security: 1
    • com.gemalto.javacard.util: 1
    • com.gemalto.javacardx: 1
    • com.gemalto.javacardx.biometry: 1
    • com.gemalto.javacardx.biometry.biocfg: 1
    • com.gemalto.javacardx.crypto: 1
    • com.gemalto.javacardx.crypto.asymmetric.rsa: 1
    • com.gemalto.javacardx.gapplet: 1
    • com.gemalto.moc.server: 1
  • java:
    • java.io: 1
    • java.lang: 1
  • javacard:
    • javacard.conformance: 1
    • javacard.filesystem: 1
    • javacard.framework: 1
    • javacard.gpimage: 1
    • javacard.iasclassic: 1
    • javacard.icao: 1
    • javacard.internal: 1
    • javacard.ism: 1
    • javacard.mspnp: 1
    • javacard.open: 1
    • javacard.securemessaging: 1
    • javacard.securemessaging.builde: 1
    • javacard.securemessaging.intern: 1
    • javacard.security: 1
    • javacard.tlv: 1
    • javacard.util: 1
  • javacardx:
    • javacardx.apdu: 1
    • javacardx.apdu.util: 1
    • javacardx.biometry: 2
    • javacardx.biometry.biocfg: 1
    • javacardx.crypto: 2
    • javacardx.crypto.asymmetric.ecc: 1
    • javacardx.crypto.asymmetric.rsa: 1
    • javacardx.gap: 1
    • javacardx.gapplet: 1
    • javacardx.gdp: 1
  • org:
    • org.globalplatform: 1
pdf_data/report_metadata
  • /CreationDate: D:20140711145810+02'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20140807095407+02'00'
  • /Producer: Acrobat Distiller 9.0.0 (Windows)
  • /Title:
  • pdf_file_size_bytes: 237258
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 24
  • /Author:
  • /CreationDate: D:20211004103519+02'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20211004103519+02'00'
  • /Producer: Acrobat Distiller 11.0 (Windows)
  • /Title:
  • pdf_file_size_bytes: 349522
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 21
pdf_data/st_filename ANSSI-CC-cible_2014-49en.pdf cible-anssi-cc-2020-65v2.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0695-2011: 1
  • NL:
    • CC-1: 2
    • CC-2: 3
    • CC-3: 3
  • DE:
    • BSI-DSZ-CC-1079-2018: 1
    • BSI-DSZ-CC-1079-2018-MA-01: 1
  • NL:
    • CC-1: 2
    • CC-2: 3
    • CC-3: 3
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0059-2009-MA-01: 1
    • BSI-CC-PP-0071-2012: 1
    • BSI-CC-PP-0072-2012: 1
    • BSI-CC-PP-0075-2012: 1
    • BSI-CC-PP-0076-2013: 1
    • BSI-PP-0035: 1
  • other:
    • PP-SSCD: 4
    • PP-SSCD-KG: 25
    • PP-SSCD-KI: 21
  • BSI:
    • BSI-CC-PP- 0068-V2-2011-MA-01: 1
    • BSI-CC-PP-0084-2014: 1
    • BSI-CC-PP-0099-2017: 1
    • BSI-PP- 0055-2009: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 5+: 1
    • EAL5: 2
    • EAL5 augmented: 1
  • EAL:
    • EAL 5+: 1
    • EAL 6+: 1
    • EAL5: 6
    • EAL5 augmented: 2
    • EAL5+: 1
    • EAL6: 1
    • EAL6 augmented: 1
    • EAL6+: 1
pdf_data/st_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 2
  • AVA:
    • AVA_VAN.5: 2
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 7
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 2
    • ADV_FSP.4: 2
    • ADV_FSP.5: 4
    • ADV_IMP: 1
    • ADV_IMP.1: 7
    • ADV_INT.2: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 2
    • ADV_TDS.3: 4
    • ADV_TDS.4: 7
  • AGD:
    • AGD_OPE: 2
    • AGD_OPE.1: 7
    • AGD_PRE: 2
    • AGD_PRE.1: 6
  • ALC:
    • ALC_CMC.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 2
    • ALC_DVS.2: 7
    • ALC_LCD.1: 3
    • ALC_TAT.1: 2
    • ALC_TAT.2: 3
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 2
    • ATE_DPT.1: 2
    • ATE_DPT.3: 1
    • ATE_FUN.1: 6
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 7
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKM: 14
    • FCS_CKM.1: 5
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 2
    • FCS_CKM.4: 8
    • FCS_CKM.4.1: 2
    • FCS_COP: 8
    • FCS_COP.1: 2
    • FCS_COP.1.1: 2
  • FDP:
    • FDP_ACC: 4
    • FDP_ACC.1: 13
    • FDP_ACC.1.1: 4
    • FDP_ACF: 4
    • FDP_ACF.1: 6
    • FDP_ACF.1.1: 4
    • FDP_ACF.1.2: 4
    • FDP_ACF.1.3: 4
    • FDP_ACF.1.4: 4
    • FDP_IFC.1: 8
    • FDP_ITC: 2
    • FDP_ITC.1: 4
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITC.2: 4
    • FDP_RIP: 1
    • FDP_RIP.1: 1
    • FDP_RIP.1.1: 1
    • FDP_SDI: 4
    • FDP_SDI.1: 2
    • FDP_SDI.2.1: 2
    • FDP_SDI.2.2: 2
    • FDP_UCT: 2
    • FDP_UCT.1: 1
    • FDP_UCT.1.1: 1
  • FIA:
    • FIA_AFL: 6
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_UAU: 4
    • FIA_UAU.1: 2
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UID: 4
    • FIA_UID.1: 5
    • FIA_UID.1.1: 2
    • FIA_UID.1.2: 2
  • FMT:
    • FMT_MOF.1: 2
    • FMT_MOF.1.1: 1
    • FMT_MSA: 14
    • FMT_MSA.1: 3
    • FMT_MSA.1.1: 3
    • FMT_MSA.2: 2
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 5
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MSA.4.1: 2
    • FMT_MTD: 4
    • FMT_MTD.1.1: 2
    • FMT_SMF.1: 8
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 11
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_EMS: 5
    • FPT_EMS.1: 7
    • FPT_EMS.1.1: 3
    • FPT_EMS.1.2: 3
    • FPT_FLS.1: 2
    • FPT_FLS.1.1: 1
    • FPT_PHP.1: 2
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 2
    • FPT_PHP.3.1: 1
    • FPT_TST: 2
    • FPT_TST.1: 3
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 2
    • FTP_ITC.1: 1
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 1
  • FAU:
    • FAU_ARP.1: 16
    • FAU_ARP.1.1: 1
    • FAU_SAA.1: 2
  • FCO:
    • FCO_NRO: 5
    • FCO_NRO.2: 3
  • FCS:
    • FCS_CKM: 46
    • FCS_CKM.1: 27
    • FCS_CKM.1.1: 3
    • FCS_CKM.4: 21
    • FCS_CKM.4.1: 2
    • FCS_COP: 35
    • FCS_COP.1: 24
    • FCS_COP.1.1: 5
    • FCS_RNG: 18
    • FCS_RNG.1: 8
    • FCS_RNG.1.1: 3
    • FCS_RNG.1.2: 3
  • FDP:
    • FDP_ACC: 35
    • FDP_ACC.1: 14
    • FDP_ACC.2: 6
    • FDP_ACF: 30
    • FDP_ACF.1: 16
    • FDP_IFC: 20
    • FDP_IFC.1: 12
    • FDP_IFC.2: 2
    • FDP_IFF: 13
    • FDP_IFF.1: 17
    • FDP_ITC: 10
    • FDP_ITC.1: 10
    • FDP_ITC.2: 15
    • FDP_RIP: 98
    • FDP_RIP.1: 11
    • FDP_RIP.1.1: 1
    • FDP_ROL: 14
    • FDP_ROL.1: 5
    • FDP_SDI: 6
    • FDP_SDI.2: 3
    • FDP_UIT: 5
    • FDP_UIT.1: 2
  • FIA:
    • FIA_AFL: 21
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_ATD: 7
    • FIA_ATD.1: 2
    • FIA_UAU: 50
    • FIA_UAU.1: 6
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UAU.4: 1
    • FIA_UAU.4.1: 1
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6.1: 1
    • FIA_UID: 33
    • FIA_UID.1: 18
    • FIA_UID.1.1: 2
    • FIA_UID.1.2: 2
    • FIA_UID.2: 1
    • FIA_USB: 6
    • FIA_USB.1: 3
  • FMT:
    • FMT_LIM: 18
    • FMT_LIM.1: 15
    • FMT_LIM.1.1: 3
    • FMT_LIM.2: 14
    • FMT_LIM.2.1: 3
    • FMT_MSA: 73
    • FMT_MSA.1: 11
    • FMT_MSA.2: 2
    • FMT_MSA.3: 17
    • FMT_MTD: 31
    • FMT_MTD.1: 9
    • FMT_MTD.3: 1
    • FMT_SMF: 50
    • FMT_SMF.1: 19
    • FMT_SMF.1.1: 2
    • FMT_SMR: 62
    • FMT_SMR.1: 29
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 2
  • FPR:
    • FPR_UNO: 5
    • FPR_UNO.1: 10
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_EMS: 4
    • FPT_EMS.1: 12
    • FPT_EMS.1.1: 3
    • FPT_EMS.1.2: 3
    • FPT_FLS: 34
    • FPT_FLS.1: 14
    • FPT_FLS.1.1: 2
    • FPT_ITT: 5
    • FPT_ITT.1: 1
    • FPT_PHP: 5
    • FPT_PHP.3: 12
    • FPT_PHP.3.1: 1
    • FPT_RCV: 12
    • FPT_RCV.3: 7
    • FPT_RCV.4: 2
    • FPT_TDC.1: 7
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TST: 7
    • FPT_TST.1: 13
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 14
    • FTP_ITC.1: 5
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.CGA: 2
    • A.CSP: 3
    • A.SCA: 2
  • OE:
    • OE.HID_VAD: 1
  • A:
    • A.APPLET: 5
    • A.DELETION: 4
    • A.VERIFICATION: 4
  • D:
    • D.API_DATA: 3
    • D.APP_CODE: 6
    • D.APP_C_DATA: 3
    • D.APP_I_DATA: 5
    • D.BIO: 1
    • D.CRYPTO: 5
    • D.JCS_CODE: 3
    • D.JCS_DATA: 5
    • D.PIN: 4
    • D.SEC_DATA: 7
  • O:
    • O.AES: 1
    • O.ALARM: 15
    • O.APPLET: 28
    • O.BIO-MNGT: 7
    • O.CARD-MANAGEMENT: 2
    • O.CARD_MANAGEMENT: 17
    • O.CIPHER: 11
    • O.CODE_PCKG: 16
    • O.CODE_PKG: 7
    • O.DELETION: 5
    • O.FIREWALL: 12
    • O.GLOBAL_ARRAYS_CONFID: 9
    • O.GLOBAL_ARRAYS_INTEG: 5
    • O.INSTALL: 8
    • O.JAVAOBJECT: 66
    • O.KEY-MNGT: 7
    • O.KEY_MNGT: 1
    • O.LOAD: 10
    • O.NATIVE: 11
    • O.OBJ-DELETION: 4
    • O.OBJ_DELETION: 3
    • O.OPERATE: 15
    • O.PIN-: 1
    • O.PIN-MNGT: 6
    • O.PIN_MNGT: 1
    • O.REALLOCATION: 5
    • O.RESOURCES: 9
    • O.RND: 3
    • O.RNG: 9
    • O.SCP: 32
    • O.SID: 13
    • O.TDES: 1
    • O.TRANSACTION: 7
  • OE:
    • OE.APPLET: 4
    • OE.CARD-MANAGEMENT: 1
    • OE.CODE-EVIDENCE: 10
    • OE.CODE_EVIDENCE: 1
    • OE.VERIFICATION: 25
  • OP:
    • OP.ARRAY_AASTORE: 3
    • OP.ARRAY_ACCESS: 7
    • OP.ARRAY_LENGTH: 3
    • OP.CREATE: 11
    • OP.DELETE_APPLET: 6
    • OP.DELETE_PCKG: 4
    • OP.DELETE_PCKG_APPLET: 4
    • OP.INSTANCE_FIELD: 6
    • OP.INVK_INTERFACE: 10
    • OP.INVK_VIRTUAL: 8
    • OP.JAVA: 8
    • OP.PUT: 8
    • OP.PUTFIELD: 1
    • OP.PUTSTATIC: 1
    • OP.THROW: 7
    • OP.TYPE_ACCESS: 7
  • OSP:
    • OSP.RND: 3
    • OSP.RNG: 1
    • OSP.VERIFICATION: 4
  • OT:
    • OT.X: 1
  • R:
    • R.JAVA: 10
  • T:
    • T.CONFID-APPLI-DATA: 4
    • T.CONFID-JCS-CODE: 4
    • T.CONFID-JCS-DATA: 4
    • T.DELETION: 3
    • T.EXE-CODE: 8
    • T.INSTALL: 4
    • T.INTEG-APPLI-CODE: 7
    • T.INTEG-APPLI-DATA: 8
    • T.INTEG-JCS-CODE: 3
    • T.INTEG-JCS-DATA: 4
    • T.NATIVE: 4
    • T.OBJ-DELETION: 4
    • T.PHYSICAL: 4
    • T.RESOURCES: 3
    • T.SID: 8
pdf_data/st_keywords/vendor
  • Gemalto:
    • Gemalto: 276
  • Infineon:
    • Infineon: 3
  • Gemalto:
    • Gemalto: 30
  • Infineon:
    • Infineon: 15
    • Infineon Technologies AG: 2
  • Microsoft:
    • Microsoft: 1
  • Thales:
    • Thales: 1
pdf_data/st_keywords/eval_facility
  • Serma:
    • Serma Technologies: 1
  • Serma:
    • Serma Safety & Security: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 6
  • DES:
    • 3DES:
      • TDES: 4
    • DES:
      • DES: 2
  • AES_competition:
    • AES:
      • AES: 28
  • DES:
    • 3DES:
      • 3DES: 2
      • TDEA: 1
      • TDES: 15
      • Triple-DES: 3
    • DES:
      • DES: 20
  • constructions:
    • MAC:
      • CMAC: 2
      • HMAC: 2
      • KMAC: 2
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 2
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 1
  • FF:
    • DH:
      • DH: 2
      • Diffie-Hellman: 2
  • ECC:
    • ECC:
      • ECC: 10
    • ECDH:
      • ECDH: 6
    • ECDSA:
      • ECDSA: 3
  • FF:
    • DH:
      • DH: 8
      • Diffie-Hellman: 4
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-224: 1
  • SHA:
    • SHA1:
      • SHA-1: 4
      • SHA1: 2
    • SHA2:
      • SHA-224: 4
      • SHA-256: 4
      • SHA-384: 2
      • SHA-512: 4
      • SHA224: 3
      • SHA256: 1
      • SHA384: 1
      • SHA512: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 3
  • KA:
    • Key Agreement: 3
    • Key agreement: 2
  • MAC:
    • MAC: 16
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 162
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 1
    • RNG: 2
  • RNG:
    • RND: 6
    • RNG: 32
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 4
  • SCA:
    • DPA: 1
    • SPA: 1
    • timing attacks: 1
  • FI:
    • Malfunction: 9
    • Physical Tampering: 3
    • fault induction: 2
    • malfunction: 8
    • physical tampering: 1
  • SCA:
    • DPA: 2
    • Leak-Inherent: 5
    • SPA: 1
    • physical probing: 6
    • timing attacks: 1
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.DG1: 6
    • EF.DG16: 6
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2009-07-004: 1
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
  • FIPS:
    • FIPS PUB 46-3: 1
    • FIPS180-2: 1
    • FIPS197: 2
    • FIPS46-3: 1
  • PKCS:
    • PKCS#1: 2
    • PKCS#3: 3
  • BSI:
    • AIS 31: 1
    • AIS31: 4
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS 140-2: 3
    • FIPS 197: 1
    • FIPS 46-3: 1
    • FIPS180-2: 1
    • FIPS197: 5
  • ICAO:
    • ICAO: 1
  • ISO:
    • ISO/IEC 7816-2: 1
  • NIST:
    • SP 800-67: 1
  • PKCS:
    • PKCS#1: 8
    • PKCS#5: 5
  • SCP:
    • SCP01: 6
    • SCP02: 6
    • SCP03: 5
pdf_data/st_keywords/javacard_version
  • JavaCard:
    • Java Card 2.2.2: 3
    • Java Card 3.0.5: 5
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 7
pdf_data/st_keywords/javacard_packages
  • java:
    • java.lang: 1
  • javacard:
    • javacard.framework: 3
    • javacard.security: 3
  • javacardx:
    • javacardx.biometry: 1
    • javacardx.crypto: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
    • out of scope: 1
pdf_data/st_metadata
  • /CreationDate: D:20140131122341+01'00'
  • /Creator: Microsoft® Office Word 2007
  • /Keywords: Security Target, CC, eTravel
  • /ModDate: D:20140807095419+02'00'
  • /Producer: Microsoft® Office Word 2007
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 606196
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 41
  • /Author: D1487827
  • /CreationDate: D:20210505092700+02'00'
  • /Creator: Microsoft® Word 2013
  • /Keywords: 04-05-2021
  • /ModDate: D:20210505092700+02'00'
  • /Producer: Microsoft® Word 2013
  • /Subject: 1.18
  • /Title: MultiApp V4.2: JCS Security Target
  • pdf_file_size_bytes: 2496334
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 157
state/cert/convert_ok False True
state/cert/download_ok False True
state/cert/extract_ok False True
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different