name |
Application IAS V4 sur la plateforme JavaCard ouverte MultiApp V3 masquée sur le composant M7820 A11 (Version du patch : 1.5) |
Plateforme JavaCard MultiApp V4.0 - PACE en configuration ouverte basée sur l'Operating System JLEP3 masquée sur le composant SLE78CLFX4000PH (M7892 G12) |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
FR |
FR |
status |
archived |
archived |
not_valid_after |
01.09.2019 |
25.09.2022 |
not_valid_before |
11.07.2014 |
25.09.2017 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2014-49fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2017_54fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2014-49en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2017_54en.pdf |
manufacturer |
Gemalto - Infineon Technologies AG |
Gemalto |
manufacturer_web |
https://www.gemalto.com/ |
https://www.gemalto.com/ |
security_level |
AVA_VAN.5, ALC_DVS.2, EAL5+ |
AVA_VAN.5, ALC_DVS.2, EAL5+ |
dgst |
995da0406e6ca2af |
2a7558be56bc385d |
heuristics/cert_id |
ANSSI-CC-2014/49 |
ANSSI-CC-2017/54 |
heuristics/cert_lab |
SERMA |
SERMA |
heuristics/cpe_matches |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
AVA_VAN.5, ALC_DVS.2 |
ALC_FLR.1, ALC_DVS.2, AVA_VAN.5, ADV_ARC.1 |
heuristics/extracted_versions |
1.5 |
4.0 |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/report_references/directly_referenced_by |
ANSSI-CC-2014/50 |
BSI-DSZ-CC-1003-2018, ANSSI-CC-2017/76 |
heuristics/report_references/directly_referencing |
ANSSI-CC-2014/14, BSI-DSZ-CC-0829-2012, ANSSI-CC-2014/06 |
ANSSI-CC-2017/07, BSI-DSZ-CC-0891-V2-2016 |
heuristics/report_references/indirectly_referenced_by |
ANSSI-CC-2014/50 |
ANSSI-CC-2017/82, BSI-DSZ-CC-1003-2018, ANSSI-CC-2019/31, ANSSI-CC-2020/45, ANSSI-CC-2018/24, ANSSI-CC-2020/33, ANSSI-CC-2020/43, ANSSI-CC-2018/11, ANSSI-CC-2018/56v2, ANSSI-CC-2020/44, ANSSI-CC-2018/58v2, ANSSI-CC-2017/81, ANSSI-CC-2018/21, ANSSI-CC-2018/53, ANSSI-CC-2017/83, ANSSI-CC-2018/57, ANSSI-CC-2018/57v2, ANSSI-CC-2018/32, ANSSI-CC-2019/07, ANSSI-CC-2020/49, ANSSI-CC-2018/32v2, ANSSI-CC-2018/56, ANSSI-CC-2017/76, ANSSI-CC-2020/42, ANSSI-CC-2018/58 |
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-0640-2010, ANSSI-CC-2014/14, BSI-DSZ-CC-0728-2011, ANSSI-CC-2014/06, BSI-DSZ-CC-0829-2012 |
ANSSI-CC-2017/07, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0891-V2-2016, BSI-DSZ-CC-0891-2015 |
heuristics/scheme_data |
- cert_id: ANSSI-CC-2014/49
- description: Le produit qualifié est l'« application IAS V4 sur la plateforme JavaCard ouverte MultiApp V3masquée sur le composant M7820 A11 », pouvant être en mode contact ou sans-contact. Leproduit est développé par la société Gemalto et embarqué sur le microcontrôleur M7820 A11fabriqué par la société Infineon Technologies. Ce produit est également proposé sous les noms IDPrime MD 840 (mode contact uni
- developer: Gemalto / Infineon Technologies AG
- enhanced:
- augmented: ALC_DVS.2, AVA_VAN.5
- category: Cartes à puce
- cc_version: Critères Communs version 3.1r4
- cert_id: ANSSI-CC-2014/49
- certification_date: 2014-07-11
- developer: Gemalto / Infineon Technologies AG
- evaluation_facility: Serma Technologies
- level: EAL5+
- mutual_recognition: SOG-IS CCRA
- protection_profile: BSI-CC-PP-0059-2009-MA-01, BSI-CC-PP-0075-2012
- report_link: https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2014-49fr.pdf
- sponsor: Gemalto
- target_link: https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2014-49en.pdf
- level: EAL5+
- product: Application IAS V4 sur la plateforme JavaCard ouverte MultiApp V3 masquée sur le composant M7820 A11 (Version du patch : 1.5)
- sponsor: Gemalto
- url: https://cyber.gouv.fr/produits-certifies/application-ias-v4-sur-la-plateforme-javacard-ouverte-multiapp-v3-masquee-sur-1
|
- cert_id: ANSSI-CC-2017/54
- description: Le produit certifié est la « plateforme JavaCard MultiApp V4.0 - PACE en configuration ouverte basée sur l’Operating System JLEP3 masquée sur le composant SLE78CLFX4000PH (M7892 G12), JavaCard version 3.0.4, GP version 2.2.1 » développé par GEMALTO et par INFINEON TECHNOLOGIES AG. Le produit est destiné à héberger et exécuter une ou plusieurs applications, dites applets dans la terminologie Jav
- developer: Gemalto, Infineon Technologies AG
- enhanced:
- augmented: ALC_DVS.2, AVA_VAN.5
- category: Cartes à puce
- cc_version: Critères Communs version 3.1r4
- cert_id: ANSSI-CC-2017/54
- certification_date: 2017-09-25
- developer: Gemalto, Infineon Technologies AG
- evaluation_facility: Serma Safety & Security
- level: EAL5+
- mutual_recognition: SOG-IS CCRA
- protection_profile: PP JCS-O
- report_link: https://cyber.gouv.fr/sites/default/files/2017/09/anssi-cc-2017_54fr.pdf
- sponsor: Gemalto
- target_link: https://cyber.gouv.fr/sites/default/files/2017/09/anssi-cible-cc-2017_54en.pdf
- level: EAL5+
- product: Plateforme JavaCard MultiApp V4.0 - PACE en configuration ouverte basée sur l’OS JLEP3 masquée sur le composant SLE78CLFX4000PH (M7892 G12)
- sponsor: Gemalto
- url: https://cyber.gouv.fr/produits-certifies/plateforme-javacard-multiapp-v40-pace-en-configuration-ouverte-basee-sur-los
|
heuristics/st_references/directly_referenced_by |
{} |
BSI-DSZ-CC-1003-2018 |
heuristics/st_references/directly_referencing |
BSI-DSZ-CC-0695-2011 |
BSI-DSZ-CC-0891-V2-2016 |
heuristics/st_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-1003-2018, BSI-DSZ-CC-1000-2023 |
heuristics/st_references/indirectly_referencing |
BSI-DSZ-CC-0695-2011 |
BSI-DSZ-CC-0891-V2-2016 |
heuristics/verified_cpe_matches |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
ANSSI-CC_2014-49fr.pdf |
anssi-cc-2017_54fr.pdf |
pdf_data/report_frontpage |
- FR:
- cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 4
- cert_id: ANSSI-CC-2014/49
- cert_item: Application IAS V4 sur la plateforme JavaCard ouverte MultiApp V3 masquée sur le composant M7820 A11
- cert_item_version: Version de l’application IAS : 4.0.2.K Version de l’application MOCA Server : 1.0 Version plateforme Java Card MultiApp : 3.0 Version du patch : 1.5
- cert_lab: Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France Rapport de certification ANSSI-CC-2014/49 Application IAS V4 sur la plateforme JavaCard ouverte MultiApp V3 masquée sur le composant M7820 A11 Page 4 sur 24 ANSSI-CC-CER-F-07.011
- developer: Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France Infineon Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: Protection profiles for secure signature creation device – Part 2: Device with key generation, Référence : prEN 14169-2:2012, Version 2.0.1, maintenu sous la référence BSI-CC-PP-0059-2009-MA-01 (voir [PP-SSCD-Part2]). Protection profiles for secure signature creation device – Part 3: Device with key import, Référence : prEN 14169-3:2012, Version 1.0.2, certifié sous la référence BSI-CC-PP-0075-2012 (voir [PP-SSCD-Part3
|
- FR:
- cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 4
- cert_id: ANSSI-CC-2017/54
- cert_item: Plateforme JavaCard MultiApp V4.0 - PACE en configuration ouverte basée sur l’Operating System JLEP3 masquée sur le composant SLE78CLFX4000PH (M7892 G12
- cert_item_version: JavaCard version 3.0.4, GP version 2.2.1
- cert_lab: Serma Safety & Security 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
- developer: Gemalto 6 rue de la Verrerie CS20001 92197 Meudon Cedex, France Infineon Technologies AG Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie CS20001 92197 Meudon Cedex, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: PP JCS-O] SUN Java Card System Protection Profile Open Configuration, version 3.0
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- FR:
- ANSSI-CC-2014/06: 4
- ANSSI-CC-2014/14: 2
- ANSSI-CC-2014/49: 25
|
- DE:
- BSI-DSZ-CC-0891-V2-2016: 1
- FR:
- ANSSI-CC-2017/07: 1
- ANSSI-CC-2017/54: 21
- ANSSI-CC-PP-2010/03-M01: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP- 0059-2009-MA-01: 1
- BSI-CC-PP-0059-2009-MA-01: 2
- BSI-CC-PP-0075-2012: 2
- BSI-PP- 0035-2007: 1
- BSI-PP-0035-: 1
- BSI-PP-0035-2007: 1
- other:
- PP-SSCD-: 2
- PP-SSCD-Part2: 2
- PP-SSCD-Part3: 2
|
- ANSSI:
- ANSSI-CC-PP-2010/03-M01: 1
- BSI:
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 1
- EAL4: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 1
- EAL2: 2
- EAL6: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_FLR.1: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
- Gemalto:
- Infineon:
- Infineon: 3
- Infineon Technologies: 5
- Infineon Technologies AG: 1
|
- Gemalto:
- Infineon:
- Infineon: 2
- Infineon Technologies AG: 2
- Microsoft:
|
pdf_data/report_keywords/eval_facility |
|
- Serma:
- Serma Safety & Security: 1
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
- com:
- com.gemalto.javacardx.pace: 1
- javacardx:
|
- com:
- com.gemalto.javacardx.pace: 1
- javacardx:
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20140711145810+02'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20140807095407+02'00'
- /Producer: Acrobat Distiller 9.0.0 (Windows)
- /Title:
- pdf_file_size_bytes: 237258
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 24
|
- /Category: Référence, Version
- /Comments: Developpeur
- /Company: SGDSN/ANSSI
- /CreationDate: D:20170926164220+02'00'
- /Creator: Acrobat PDFMaker 11 pour Word
- /Keywords: ANSSI-CC-CER-F-07.025
- /ModDate: D:20170927101601+02'00'
- /Producer: Adobe PDF Library 11.0
- /SourceModified: D:20170926144215
- /Subject:
- /Title:
- pdf_file_size_bytes: 503173
- pdf_hyperlinks: mailto:[email protected], http://www.ssi.gouv.fr/
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
pdf_data/st_filename |
ANSSI-CC-cible_2014-49en.pdf |
anssi-cible-cc-2017_54en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0891-V2-2016: 1
- FR:
- NL:
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0059-2009-MA-01: 1
- BSI-CC-PP-0071-2012: 1
- BSI-CC-PP-0072-2012: 1
- BSI-CC-PP-0075-2012: 1
- BSI-CC-PP-0076-2013: 1
- BSI-PP-0035: 1
- other:
- PP-SSCD: 4
- PP-SSCD-KG: 25
- PP-SSCD-KI: 21
|
- BSI:
- BSI-CC-PP- 0056-V2-2012: 1
- BSI-CC-PP- 0068-V2-2011-MA-01: 1
- BSI-CC-PP-0084-: 1
- BSI-PP- 0055-2009: 1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 5+: 1
- EAL5: 2
- EAL5 augmented: 1
|
- EAL:
- EAL 6+: 1
- EAL5: 2
- EAL5 augmented: 2
- EAL5+: 1
- EAL6: 1
- EAL6 augmented: 1
- EAL6+: 1
|
pdf_data/st_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_TDS: 1
- ALC:
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM: 14
- FCS_CKM.1: 5
- FCS_CKM.1.1: 2
- FCS_CKM.2: 2
- FCS_CKM.4: 8
- FCS_CKM.4.1: 2
- FCS_COP: 8
- FCS_COP.1: 2
- FCS_COP.1.1: 2
- FDP:
- FDP_ACC: 4
- FDP_ACC.1: 13
- FDP_ACC.1.1: 4
- FDP_ACF: 4
- FDP_ACF.1: 6
- FDP_ACF.1.1: 4
- FDP_ACF.1.2: 4
- FDP_ACF.1.3: 4
- FDP_ACF.1.4: 4
- FDP_IFC.1: 8
- FDP_ITC: 2
- FDP_ITC.1: 4
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 4
- FDP_RIP: 1
- FDP_RIP.1: 1
- FDP_RIP.1.1: 1
- FDP_SDI: 4
- FDP_SDI.1: 2
- FDP_SDI.2.1: 2
- FDP_SDI.2.2: 2
- FDP_UCT: 2
- FDP_UCT.1: 1
- FDP_UCT.1.1: 1
- FIA:
- FIA_AFL: 6
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_UAU: 4
- FIA_UAU.1: 2
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UID: 4
- FIA_UID.1: 5
- FIA_UID.1.1: 2
- FIA_UID.1.2: 2
- FMT:
- FMT_MOF.1: 2
- FMT_MOF.1.1: 1
- FMT_MSA: 14
- FMT_MSA.1: 3
- FMT_MSA.1.1: 3
- FMT_MSA.2: 2
- FMT_MSA.2.1: 1
- FMT_MSA.3: 5
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MSA.4.1: 2
- FMT_MTD: 4
- FMT_MTD.1.1: 2
- FMT_SMF.1: 8
- FMT_SMF.1.1: 1
- FMT_SMR.1: 11
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS: 5
- FPT_EMS.1: 7
- FPT_EMS.1.1: 3
- FPT_EMS.1.2: 3
- FPT_FLS.1: 2
- FPT_FLS.1.1: 1
- FPT_PHP.1: 2
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 2
- FPT_PHP.3.1: 1
- FPT_TST: 2
- FPT_TST.1: 3
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 2
- FTP_ITC.1: 1
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 1
|
- FAU:
- FAU_ARP.1: 5
- FAU_ARP.1.1: 1
- FCO:
- FCS:
- FCS_CKM: 21
- FCS_CKM.1: 14
- FCS_CKM.1.1: 3
- FCS_CKM.2: 4
- FCS_CKM.2.1: 1
- FCS_CKM.3: 2
- FCS_CKM.3.1: 1
- FCS_CKM.4: 8
- FCS_CKM.4.1: 2
- FCS_COP: 15
- FCS_COP.1: 16
- FCS_COP.1.1: 4
- FCS_RND: 10
- FCS_RND.1: 7
- FCS_RND.1.1: 3
- FDP:
- FDP_ACC: 14
- FDP_ACC.1: 2
- FDP_ACC.2: 6
- FDP_ACF: 17
- FDP_ACF.1: 13
- FDP_IFC: 4
- FDP_IFC.1: 1
- FDP_IFC.2: 2
- FDP_IFF: 4
- FDP_IFF.1: 10
- FDP_ITC: 4
- FDP_ITC.1: 4
- FDP_ITC.2: 9
- FDP_RIP: 20
- FDP_RIP.1: 8
- FDP_RIP.1.1: 1
- FDP_ROL: 6
- FDP_ROL.1: 2
- FDP_SDI.2: 2
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UIT: 2
- FDP_UIT.1: 2
- FIA:
- FIA_AFL: 11
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_ATD: 3
- FIA_ATD.1: 1
- FIA_SOS.2: 1
- FIA_UAI.1: 1
- FIA_UAU: 21
- FIA_UAU.1: 3
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UAU.4: 1
- FIA_UAU.4.1: 1
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6.1: 1
- FIA_UID: 14
- FIA_UID.1: 6
- FIA_UID.1.1: 2
- FIA_UID.1.2: 2
- FIA_UID.2: 1
- FIA_USB: 2
- FIA_USB.1: 3
- FMT:
- FMT_LIM: 12
- FMT_LIM.1: 13
- FMT_LIM.1.1: 3
- FMT_LIM.2: 12
- FMT_LIM.2.1: 3
- FMT_MSA: 21
- FMT_MSA.1: 5
- FMT_MSA.2: 1
- FMT_MSA.3: 10
- FMT_MTD: 12
- FMT_MTD.1: 6
- FMT_MTD.3: 1
- FMT_SMF: 14
- FMT_SMF.1: 8
- FMT_SMF.1.1: 2
- FMT_SMR: 18
- FMT_SMR.1: 13
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FPR:
- FPR_UNO: 2
- FPR_UNO.1: 3
- FPR_UNO.1.1: 1
- FPT:
- FPT_EMS: 4
- FPT_EMS.1: 8
- FPT_EMS.1.1: 3
- FPT_EMS.1.2: 3
- FPT_FLS: 10
- FPT_FLS.1: 9
- FPT_FLS.1.1: 1
- FPT_ITT: 2
- FPT_ITT.1: 1
- FPT_PHP: 2
- FPT_PHP.3: 6
- FPT_PHP.3.1: 1
- FPT_RCV: 4
- FPT_RCV.3: 4
- FPT_RCV.4: 1
- FPT_TDC.1: 2
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST: 4
- FPT_TST.1: 8
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 4
- FTP_ITC.1: 3
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.CGA: 2
- A.CSP: 3
- A.SCA: 2
- OE:
|
- A:
- A.APPLET: 2
- A.DELETION: 2
- A.VERIFICATION: 2
- D:
- D.API_DATA: 3
- D.APP_CODE: 6
- D.APP_C_DATA: 3
- D.APP_I_DATA: 4
- D.CRYPTO: 5
- D.JCS_CODE: 3
- D.JCS_DATA: 5
- D.PIN: 4
- D.SEC_DATA: 7
- O:
- O.ALARM: 1
- O.APPLET: 28
- O.CARD-MANAGEMENT: 1
- O.CIPHER: 2
- O.CODE_PCKG: 16
- O.CODE_PKG: 7
- O.DELETION: 1
- O.FIREWALL: 1
- O.GLOBAL_ARRAYS_CONFID: 1
- O.GLOBAL_ARRAYS_INTEG: 1
- O.INSTALL: 1
- O.JAVAOBJECT: 56
- O.KEY-MNGT: 2
- O.LOAD: 1
- O.NATIVE: 1
- O.OBJ-DELETION: 1
- O.OPERATE: 1
- O.PIN-MNGT: 2
- O.REALLOCATION: 1
- O.RESOURCES: 1
- O.RND: 1
- O.SCP: 3
- O.SID: 1
- O.TRANSACTION: 2
- OE:
- OE.APPLET: 1
- OE.CODE-EVIDENCE: 1
- OE.VERIFICATION: 4
- OP:
- OP.ARRAY_ACCESS: 6
- OP.CREATE: 10
- OP.DELETE_APPLET: 6
- OP.DELETE_PCKG: 4
- OP.DELETE_PCKG_APPLET: 4
- OP.INSTANCE_FIELD: 6
- OP.INVK_INTERFACE: 10
- OP.INVK_VIRTUAL: 8
- OP.JAVA: 8
- OP.PUT: 7
- OP.THROW: 7
- OP.TYPE_ACCESS: 7
- OSP:
- OSP.RND: 2
- OSP.VERIFICATION: 2
- OT:
- R:
- T:
- T.CONFID-APPLI-DATA: 2
- T.CONFID-JCS-CODE: 2
- T.CONFID-JCS-DATA: 2
- T.DELETION: 1
- T.EXE-CODE: 4
- T.INSTALL: 2
- T.INTEG-APPLI-CODE: 3
- T.INTEG-APPLI-DATA: 4
- T.INTEG-JCS-CODE: 1
- T.INTEG-JCS-DATA: 2
- T.NATIVE: 2
- T.OBJ-DELETION: 2
- T.PHYSICAL: 2
- T.RESOURCES: 1
- T.SID: 4
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 2
- TDEA: 1
- TDES: 14
- Triple-DES: 3
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 3
- SHA-256: 3
- SHA-384: 2
- SHA-512: 3
- SHA224: 1
|
pdf_data/st_keywords/crypto_scheme |
|
- KA:
- Key Agreement: 3
- Key agreement: 2
- MAC:
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- SCA:
- DPA: 1
- SPA: 1
- timing attacks: 1
|
- FI:
- Malfunction: 5
- Physical Tampering: 2
- fault induction: 2
- malfunction: 6
- physical tampering: 1
- SCA:
- DPA: 2
- Leak-Inherent: 3
- SPA: 1
- physical probing: 5
- timing attacks: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.DG1: 2
- EF.DG16: 2
- EF.DG3: 1
- EF.DG4: 1
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2009-07-004: 1
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- FIPS:
- FIPS PUB 46-3: 1
- FIPS180-2: 1
- FIPS197: 2
- FIPS46-3: 1
- PKCS:
|
- BSI:
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- FIPS:
- FIPS 197: 1
- FIPS 46-3: 1
- FIPS180-2: 1
- FIPS197: 5
- ICAO:
- NIST:
- PKCS:
- PKCS#1: 7
- PKCS#3: 1
- PKCS#5: 5
- SCP:
- SCP01: 4
- SCP02: 4
- SCP03: 5
|
pdf_data/st_keywords/javacard_version |
|
- JavaCard:
- Java Card 2.2.2: 3
- Java Card 3.0.4: 8
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /CreationDate: D:20140131122341+01'00'
- /Creator: Microsoft® Office Word 2007
- /Keywords: Security Target, CC, eTravel
- /ModDate: D:20140807095419+02'00'
- /Producer: Microsoft® Office Word 2007
- /Subject:
- /Title:
- pdf_file_size_bytes: 606196
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 41
|
- /CreationDate: D:20170801100149+02'00'
- /Creator: Microsoft® Word 2013
- /Keywords: Security Target, CC
- /ModDate: D:20170927101615+02'00'
- /Producer: Microsoft® Word 2013
- /Subject:
- /Title:
- pdf_file_size_bytes: 2095172
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 107
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |