Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Belkin F1DN002MOD-KM-4, F1DN004MOD-KM-4 and F1DN-FLTR-HID-4 Firmware Version 40404-0E7 Peripheral Sharing Devices
535-EWA
MultiApp Essential v1.1 Platform with Full, Light, XLight_T1 and XLight_NB configurations
2020-33-INF-3550
name Belkin F1DN002MOD-KM-4, F1DN004MOD-KM-4 and F1DN-FLTR-HID-4 Firmware Version 40404-0E7 Peripheral Sharing Devices MultiApp Essential v1.1 Platform with Full, Light, XLight_T1 and XLight_NB configurations
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme CA ES
not_valid_after 24.01.2027 18.06.2026
not_valid_before 24.01.2022 18.06.2021
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/535-EWA%20CT%20Done.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2020-33%20CCRA.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/535-EWA%20CR.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2020-33%20INF-3550.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST%201.6%20Belkin_CFG_PSD-KM_Combined_ST_1.6.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2020-33%20ST_lite.pdf
manufacturer Belkin International, Inc. THALES DIS FRANCE SA
manufacturer_web https://www.belkin.com https://www.thalesgroup.com/en/europe/france
security_level {} EAL5+, ALC_DVS.2, AVA_VAN.5
dgst 99b3bc3ca928c39f 8ba234174b5f18cb
heuristics/cert_id 535-EWA 2020-33-INF-3550
heuristics/cert_lab CANADA []
heuristics/extracted_sars ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_OBJ.2, ASE_REQ.2, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.4, ALC_TAT.2, ASE_REQ.2, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions 40404, 4 1.1
heuristics/scheme_data
  • certification_date: 24.01.2022
  • level: PP_PSD_v4.0, MOD_KM_v1.0
  • product: Belkin F1DN002MOD-KM-4, F1DN004MOD-KM-4 and F1DN-FLTR-HID-4 Firmware Version 40404-0E7 Peripheral Sharing Devices
  • vendor: Belkin International, Inc.
  • category: Smart Cards and similiar devices
  • certification_date: 18.06.2021
  • enhanced:
    • category: Smart Cards and similiar devices
    • cc_version: Common Criteria 3.1 release 5
    • cert_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1214
    • certification_date: 18.06.2021
    • description: The MultiApp Essential V1.1 Platform is a smart card operating system (IC and OS) that complies with two major industry standards: Sun Java Card 3.0.4, which consists of the Java Card 3.0.4 Virtual Machine [JCVM304], the Java Card 3.0.4 Runtime Environment [JCRE304] and the Java Card 3.0.4 Application Programming Interface [JCAPI304]. The Global Platform Card Specification version 2.2.1 [GP221]. It is intended to host a set of Java Card applications and provides cryptographic services for symmetric (3DES, AES), asymmetric (RSA) and hash (SHA) operations, Moreover, it also provides random number generation and integrity check features. The TOE allows the loading of applets before or after the issuance of the card, but the Issuer can forbid this operation to be carried out. The TOE has four possible configurations: Full Configuration. Light Configuration. XLight_T1 Configuration. XLight_NB Configuration. The details about the features of each configuration are described in [ST LITE], chapter 2.4 (TOE Description).
    • evaluation_facility: Applus Laboratories
    • level: EAL5 + ALC_DVS.2 + AVA_VAN.5
    • manufacturer: THALES
    • report_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1215
    • status: Certified
    • target_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1242
    • type: Product
  • manufacturer: THALES
  • product: MultiApp Essential v1.1 Platform with Full, Light, XLight_T1 and XLight_NB configurations
  • product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/697-multiapp-essential-v1-1-platform-with-full-light-xlight-t1-and-xlight-nb-configurations
heuristics/st_references/directly_referencing {} ANSSI-CC-2018/51
heuristics/st_references/indirectly_referencing {} ANSSI-CC-2018/51
heuristics/protection_profiles 76f8f05a35d87f59, 814f66c77bc7f33b 9399bd94f9925b16
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_psd_v4.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_km_v1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-profil_PP-2010-03en.pdf
pdf_data/cert_filename 535-EWA CT Done.pdf 2020-33 CCRA.pdf
pdf_data/cert_keywords/cc_cert_id
  • CA:
    • 535-EWA: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 1
  • AVA:
    • AVA_VAN: 1
pdf_data/cert_keywords/cc_claims
  • O:
    • O.E: 1
pdf_data/cert_keywords/eval_facility
  • EWA:
    • EWA-Canada: 1
  • Applus:
    • Applus Laboratories: 1
pdf_data/cert_metadata
  • /CreationDate: D:20190122115136-04'00'
  • /Creator: Adobe Illustrator CC 22.0 (Windows)
  • /ModDate: D:20220127142407-05'00'
  • /Producer: Adobe PDF library 15.00
  • /Title: cyber-centre-product-evaluation-certificate-e-bg
  • pdf_file_size_bytes: 1643295
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author:
  • /CreationDate:
  • /Creator:
  • /Keywords:
  • /ModDate:
  • /Producer:
  • /Subject:
  • /Title:
  • /Trapped:
  • pdf_file_size_bytes: 746775
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename 535-EWA CR.pdf 2020-33 INF-3550.pdf
pdf_data/report_frontpage
  • CA:
    • cert_id: 535-EWA
    • cert_lab: CANADA
  • CA:
pdf_data/report_keywords/cc_cert_id
  • CA:
    • 535-EWA: 1
  • ES:
    • 2020-33-INF-3550- v1: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 1
    • EAL 4: 2
    • EAL2: 1
    • EAL5: 3
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_IMP.1: 1
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 3
    • ALC_FLR: 3
    • ALC_FLR.1: 1
    • ALC_TAT.2: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_INT.1: 1
    • ASE_REQ.2: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_FUN.1: 1
  • AVA:
    • AVA_VAN.5: 4
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_ARP.1: 1
  • FCO:
    • FCO_NRO: 1
  • FCS:
    • FCS_CKM: 10
    • FCS_CKM.1: 4
    • FCS_CKM.4: 1
    • FCS_COP: 6
    • FCS_RND.1: 1
  • FDP:
    • FDP_ACC: 3
    • FDP_ACF: 3
    • FDP_IFC: 2
    • FDP_IFF: 2
    • FDP_ITC: 1
    • FDP_RIP: 8
    • FDP_ROL: 1
    • FDP_SDI.2: 1
    • FDP_UIT: 1
  • FIA:
    • FIA_ATD: 1
    • FIA_UAU: 1
    • FIA_UID: 2
    • FIA_USB: 1
  • FMT:
    • FMT_MSA: 11
    • FMT_MTD: 2
    • FMT_SMF: 3
    • FMT_SMR: 4
  • FPR:
    • FPR_UNO: 1
    • FPR_UNO.1: 1
  • FPT:
    • FPT_FLS: 4
    • FPT_ITT: 1
    • FPT_PHP: 1
    • FPT_RCV: 2
    • FPT_TDC.1: 1
    • FPT_TST: 1
  • FTP:
    • FTP_ITC: 1
pdf_data/report_keywords/cc_claims
  • R:
    • R.C: 1
pdf_data/report_keywords/vendor
  • Gemalto:
    • Gemalto: 2
  • Microsoft:
    • Microsoft: 1
  • Thales:
    • Thales: 1
pdf_data/report_keywords/eval_facility
  • EWA:
    • EWA-Canada: 1
  • Applus:
    • Applus Laboratories: 5
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • DES:
    • 3DES:
      • 3DES: 2
    • DES:
      • DES: 5
pdf_data/report_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DH: 1
  • RSA:
    • RSA 1024: 1
    • RSA 2048: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 3
    • SHA2:
      • SHA-224: 2
      • SHA-256: 1
      • SHA-384: 1
      • SHA-512: 1
pdf_data/report_keywords/randomness
  • PRNG:
    • PRNG: 1
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • ECB:
    • ECB: 1
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 17025: 2
  • SCP:
    • SCP03: 1
pdf_data/report_keywords/javacard_version
  • JavaCard:
    • Java Card 3.0.4: 4
    • JavaCard 3.0.4: 1
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • These applications could be removed based on customer needs and they are out of scope of the evaluation: 1
    • out of scope: 1
    • v1.1 & Server v1.1. (These applications could be removed based on customer needs and they are out of scope of the evaluation). Additionally, other applets – not determined at the moment of the present: 1
pdf_data/report_metadata
pdf_data/st_filename ST 1.6 Belkin_CFG_PSD-KM_Combined_ST_1.6.pdf 2020-33 ST_lite.pdf
pdf_data/st_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2018/51: 1
  • NL:
    • CC-1: 2
    • CC-2: 7
    • CC-3: 4
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 5+: 2
    • EAL5: 6
    • EAL5 augmented: 2
    • EAL5+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_ARC: 2
    • ADV_ARC.1: 7
    • ADV_FSP: 1
    • ADV_FSP.1: 3
    • ADV_FSP.2: 2
    • ADV_FSP.4: 2
    • ADV_FSP.5: 5
    • ADV_IMP: 1
    • ADV_IMP.1: 7
    • ADV_INT.2: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 2
    • ADV_TDS.3: 4
    • ADV_TDS.4: 7
  • AGD:
    • AGD_OPE: 2
    • AGD_OPE.1: 7
    • AGD_PRE: 2
    • AGD_PRE.1: 6
  • ALC:
    • ALC_CMC.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 2
    • ALC_DVS.2: 7
    • ALC_LCD.1: 3
    • ALC_TAT.1: 2
    • ALC_TAT.2: 3
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 4
    • ASE_INT.1: 2
    • ASE_OBJ.2: 2
    • ASE_REQ.1: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 2
    • ATE_DPT.1: 2
    • ATE_DPT.3: 1
    • ATE_FUN.1: 6
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 7
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 3
  • FDP:
    • FDP_APC_EXT: 15
    • FDP_APC_EXT.1: 13
    • FDP_APC_EXT.1.1: 1
    • FDP_APC_EXT.1.2: 1
    • FDP_APC_EXT.1.3: 1
    • FDP_APC_EXT.1.4: 1
    • FDP_FIL_EXT: 16
    • FDP_FIL_EXT.1: 7
    • FDP_FIL_EXT.1.1: 1
    • FDP_FIL_EXT.1.2: 1
    • FDP_FIL_EXT.1.3: 1
    • FDP_FLS_EXT: 1
    • FDP_PDC_EXT: 17
    • FDP_PDC_EXT.1: 26
    • FDP_PDC_EXT.1.1: 2
    • FDP_PDC_EXT.1.2: 1
    • FDP_PDC_EXT.1.3: 1
    • FDP_PDC_EXT.1.4: 1
    • FDP_PDC_EXT.1.5: 1
    • FDP_PDC_EXT.2: 6
    • FDP_PDC_EXT.2.1: 1
    • FDP_PDC_EXT.2.2: 1
    • FDP_PDC_EXT.3: 7
    • FDP_PDC_EXT.3.1: 1
    • FDP_PDC_EXT.3.2: 1
    • FDP_RDR_EXT: 4
    • FDP_RDR_EXT.1: 15
    • FDP_RDR_EXT.1.1: 2
    • FDP_RIP: 6
    • FDP_RIP.1: 1
    • FDP_RIP_EXT: 4
    • FDP_RIP_EXT.1: 9
    • FDP_RIP_EXT.1.1: 2
    • FDP_SWI_EXT: 4
    • FDP_SWI_EXT.1: 21
    • FDP_SWI_EXT.1.1: 3
    • FDP_SWI_EXT.2: 11
    • FDP_SWI_EXT.2.1: 2
    • FDP_SWI_EXT.2.2: 3
    • FDP_SWI_EXT.3: 14
    • FDP_SWI_EXT.3.1: 2
    • FDP_UDF_EXT: 11
    • FDP_UDF_EXT.1: 5
    • FDP_UDF_EXT.1.1: 1
  • FPT:
    • FPT_FLS_EXT: 3
    • FPT_FLS_EXT.1: 10
    • FPT_FLS_EXT.1.1: 3
    • FPT_NTA_EXT: 4
    • FPT_NTA_EXT.1: 8
    • FPT_NTA_EXT.1.1: 2
    • FPT_PHP.1: 8
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 2
    • FPT_TST.1: 9
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_TST_EXT: 4
    • FPT_TST_EXT.1: 18
    • FPT_TST_EXT.1.1: 3
  • FTA:
    • FTA_CIN_EXT: 4
    • FTA_CIN_EXT.1: 11
    • FTA_CIN_EXT.1.1: 2
    • FTA_CIN_EXT.1.2: 2
    • FTA_CIN_EXT.1.3: 2
  • FAU:
    • FAU_ARP.1: 13
    • FAU_ARP.1.1: 1
    • FAU_SAA.1: 2
    • FAU_SAS.1: 1
  • FCO:
    • FCO_NRO: 5
    • FCO_NRO.2: 3
  • FCS:
    • FCS_CKM: 68
    • FCS_CKM.1: 20
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 5
    • FCS_CKM.2.1: 1
    • FCS_CKM.3: 1
    • FCS_CKM.3.1: 1
    • FCS_CKM.4: 46
    • FCS_CKM.4.1: 1
    • FCS_COP: 32
    • FCS_COP.1: 7
    • FCS_COP.1.1: 1
    • FCS_RND: 8
    • FCS_RND.1: 10
    • FCS_RND.1.1: 2
    • FCS_RNG: 1
  • FDP:
    • FDP_ACC: 36
    • FDP_ACC.1: 14
    • FDP_ACC.2: 6
    • FDP_ACF: 30
    • FDP_ACF.1: 17
    • FDP_IFC: 22
    • FDP_IFC.1: 13
    • FDP_IFC.2: 2
    • FDP_IFF: 12
    • FDP_IFF.1: 12
    • FDP_ITC: 11
    • FDP_ITC.1: 18
    • FDP_ITC.2: 23
    • FDP_ITT.1: 1
    • FDP_RIP: 69
    • FDP_RIP.1: 10
    • FDP_ROL: 12
    • FDP_ROL.1: 2
    • FDP_SDC.1: 1
    • FDP_SDI: 3
    • FDP_SDI.2: 7
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UIT: 6
    • FDP_UIT.1: 3
  • FIA:
    • FIA_API.1: 1
    • FIA_ATD: 6
    • FIA_ATD.1: 2
    • FIA_SOS.2: 1
    • FIA_UAU: 6
    • FIA_UAU.1: 3
    • FIA_UID: 12
    • FIA_UID.1: 10
    • FIA_UID.2: 1
    • FIA_USB: 6
    • FIA_USB.1: 3
  • FMT:
    • FMT_LIM: 2
    • FMT_LIM.1: 1
    • FMT_LIM.2: 1
    • FMT_MSA: 83
    • FMT_MSA.1: 12
    • FMT_MSA.2: 1
    • FMT_MSA.3: 16
    • FMT_MTD: 16
    • FMT_MTD.1: 3
    • FMT_MTD.3: 1
    • FMT_SMF: 30
    • FMT_SMF.1: 13
    • FMT_SMR: 39
    • FMT_SMR.1: 25
  • FPR:
    • FPR_UNO: 5
    • FPR_UNO.1: 8
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_FLS: 42
    • FPT_FLS.1: 8
    • FPT_ITT: 5
    • FPT_ITT.1: 2
    • FPT_PHP: 6
    • FPT_PHP.3: 2
    • FPT_RCV: 13
    • FPT_RCV.3: 4
    • FPT_RCV.4: 1
    • FPT_TDC.1: 7
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TST: 5
    • FPT_TST.1: 3
  • FRU:
    • FRU_FLT.2: 1
  • FTP:
    • FTP_ITC: 8
    • FTP_ITC.1: 5
    • FTP_TRP.1: 3
pdf_data/st_keywords/cc_claims
  • A:
    • A.NO_PHYSICAL: 1
    • A.NO_TEMPEST: 2
    • A.NO_WIRELESS: 1
    • A.NO_WIRELESS_DEVICES: 1
    • A.PHYSICAL: 1
    • A.TRUSTED: 1
    • A.TRUSTED_ADMIN: 2
    • A.TRUSTED_CONFIG: 1
    • A.USER_ALLOWED: 1
    • A.USER_ALLOWED_ACCESS: 1
  • O:
    • O.ANTI_TAMPERING: 2
    • O.AUTHORIZED: 2
    • O.COMPUTER: 5
    • O.EMULATED_INPUT: 3
    • O.LEAK: 1
    • O.LEAK_PREVENTION: 1
    • O.NO_OTHER: 3
    • O.NO_TOE_ACCESS: 2
    • O.NO_USER: 1
    • O.NO_USER_DATA: 1
    • O.PERIPHERAL: 1
    • O.PERIPHERAL_PORTS: 1
    • O.REJECT: 4
    • O.SELF_TEST: 4
    • O.SELF_TEST_FAIL: 2
    • O.TAMPER: 1
    • O.TAMPER_EVIDENT: 2
    • O.UNIDIRECTIONAL: 3
    • O.USER_DATA: 2
  • OE:
    • OE.NO_TEMPEST: 2
    • OE.NO_WIRELESS: 1
    • OE.NO_WIRELESS_DEVICES: 1
    • OE.PHYSICAL: 3
    • OE.TRUSTED: 2
    • OE.TRUSTED_ADMIN: 1
    • OE.TRUSTED_CONFIG: 1
  • T:
    • T.DATA_LEAK: 2
    • T.FAILED: 2
    • T.LOGICAL: 1
    • T.LOGICAL_TAMPER: 1
    • T.PHYSICAL: 1
    • T.PHYSICAL_TAMPER: 1
    • T.REPLACEMENT: 2
    • T.RESIDUAL: 1
    • T.RESIDUAL_LEAK: 1
    • T.SIGNAL_LEAK: 2
    • T.UNAUTHORIZED: 1
    • T.UNAUTHORIZED_DEVICES: 1
    • T.UNINTENDED: 1
    • T.UNINTENDED_USE: 1
  • A:
    • A.APPLET: 5
    • A.VERIFICATION: 4
  • D:
    • D.API_DATA: 3
    • D.APP_CODE: 6
    • D.APP_C_DATA: 3
    • D.APP_I_DATA: 4
    • D.CRYPTO: 5
    • D.JCS_CODE: 3
    • D.JCS_DATA: 5
    • D.PIN: 4
    • D.SEC_DATA: 7
  • O:
    • O.ALARM: 16
    • O.APPLET: 28
    • O.CARD-MANAGEMENT: 3
    • O.CARD_MANAGEMENT: 18
    • O.CIPHER: 11
    • O.CODE_PCKG: 16
    • O.CODE_PKG: 7
    • O.DELETION: 9
    • O.FIREWALL: 12
    • O.GLOBAL_ARRAYS_CONFID: 10
    • O.GLOBAL_ARRAYS_INTEG: 5
    • O.INSTALL: 12
    • O.JAVAOBJECT: 57
    • O.KEY-MNGT: 6
    • O.KEY_MNGT: 5
    • O.LOAD: 7
    • O.NATIVE: 12
    • O.OBJ-DELETION: 4
    • O.OPERATE: 15
    • O.PIN-: 1
    • O.PIN-MNGT: 5
    • O.REALLOCATION: 5
    • O.RESOURCES: 10
    • O.RND: 14
    • O.SCP: 35
    • O.SID: 14
    • O.TRANSACTION: 6
  • OE:
    • OE.APPLET: 4
    • OE.CARD-MANAGEMENT: 1
    • OE.CODE-EVIDENCE: 10
    • OE.SCP: 3
    • OE.VERIFICATION: 26
  • OP:
    • OP.ARRAY_ACCESS: 6
    • OP.CREATE: 10
    • OP.DELETE_APPLET: 6
    • OP.DELETE_PCKG: 4
    • OP.DELETE_PCKG_APPLET: 4
    • OP.INSTANCE_FIELD: 6
    • OP.INVK_INTERFACE: 10
    • OP.INVK_VIRTUAL: 8
    • OP.JAVA: 8
    • OP.PUT: 7
    • OP.THROW: 7
    • OP.TYPE_ACCESS: 7
  • OSP:
    • OSP.RND: 4
    • OSP.VERIFICATION: 4
  • R:
    • R.JAVA: 9
  • T:
    • T.CONFID-APPLI-DATA: 4
    • T.CONFID-JCS-CODE: 4
    • T.CONFID-JCS-DATA: 4
    • T.DELETION: 3
    • T.EXE-CODE: 8
    • T.INSTALL: 4
    • T.INTEG-APPLI-CODE: 7
    • T.INTEG-APPLI-DATA: 8
    • T.INTEG-JCS-CODE: 3
    • T.INTEG-JCS-DATA: 4
    • T.NATIVE: 4
    • T.OBJ-DELETION: 4
    • T.PHYSICAL: 4
    • T.RESOURCES: 3
    • T.SID: 8
pdf_data/st_keywords/vendor
  • Gemalto:
    • Gemalto: 11
  • Microsoft:
    • Microsoft: 4
  • Thales:
    • Thales: 133
pdf_data/st_keywords/eval_facility
  • EWA:
    • EWA-Canada: 1
  • Intertek:
    • Intertek: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 15
  • DES:
    • 3DES:
      • 3DES: 2
      • TDEA: 1
      • TDES: 8
    • DES:
      • DES: 17
  • constructions:
    • MAC:
      • CMAC: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
  • FF:
    • DH:
      • DH: 10
      • Diffie-Hellman: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 5
    • SHA2:
      • SHA-224: 2
      • SHA-256: 4
      • SHA-384: 4
      • SHA-512: 3
      • SHA224: 1
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key agreement: 1
  • MAC:
    • MAC: 7
pdf_data/st_keywords/randomness
  • PRNG:
    • PRNG: 1
  • RNG:
    • RND: 18
    • RNG: 4
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • ECB:
    • ECB: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 7
  • FI:
    • Malfunction: 3
    • fault induction: 2
    • malfunction: 2
    • physical tampering: 1
  • SCA:
    • DPA: 1
    • Leak-Inherent: 3
    • physical probing: 2
pdf_data/st_keywords/device_model
  • STM:
    • STM32:
      • STM32F070C6T6: 2
pdf_data/st_keywords/cplc_data
  • ICFab:
    • IC Fabricator: 1
  • ICType:
    • IC Type: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • BSI:
    • AIS31: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS PUB 180-4: 1
    • FIPS180-4: 1
    • FIPS197: 3
  • ISO:
    • ISO/IEC 18033-3: 1
  • PKCS:
    • PKCS#1: 8
    • PKCS#5: 3
  • SCP:
    • SCP01: 4
    • SCP02: 3
    • SCP03: 3
pdf_data/st_keywords/javacard_version
  • GlobalPlatform:
    • GlobalPlatform 2.2.1: 1
  • JavaCard:
    • Java Card 3.0.4: 4
    • JavaCard 3.0.4: 1
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 7
pdf_data/st_keywords/javacard_packages
  • javacard:
    • javacard.framework: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • Client v1.1 & Server v1.1 (These applications could be removed based on customer needs and they are out of scope of the evaluation). Additionally, other applets – not determined at the moment of the present: 1
    • These applications could be removed based on customer needs and they are out of scope of the evaluation: 1
    • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
    • out of scope: 2
pdf_data/st_metadata
  • /Author:
  • /CreationDate:
  • /Creator:
  • /Keywords:
  • /ModDate:
  • /Producer:
  • /Subject:
  • /Title:
  • /Trapped:
  • pdf_file_size_bytes: 1421244
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 100
state/cert/convert_garbage False True
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different