Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
FIN.X RTOS SE V4.0
OCSI/CERT/RES/06/2014/RC
LINQUS USIM 128K Smartcard: ESIGN PKI signature application loaded on GemXplore Generations G152B-EP3B platform embedded on SLE88CFX4002P/m8834b17, version 1.0
ANSSI-CC-2008/37
name FIN.X RTOS SE V4.0 LINQUS USIM 128K Smartcard: ESIGN PKI signature application loaded on GemXplore Generations G152B-EP3B platform embedded on SLE88CFX4002P/m8834b17, version 1.0
category Operating Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme IT FR
not_valid_after 25.07.2022 01.09.2019
not_valid_before 25.07.2017 03.11.2008
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/rc_finx_rtos_se_4_v1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/dcssi-2008_37en.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/tds_finx_rtos_se_4_lite03.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible2008_37en.pdf
manufacturer MBDA Italia S.p.A. Gemalto - Infineon Technologies AG
manufacturer_web https://www.mbda-systems.com/ https://www.gemalto.com/
security_level EAL4+, ALC_FLR.1 EAL4+, AVA_MSU.3, AVA_VLA.4
dgst 9cb1663e606ec87b 18b005fb398b1c2b
heuristics/cert_id OCSI/CERT/RES/06/2014/RC ANSSI-CC-2008/37
heuristics/cert_lab [] CEACI
heuristics/extracted_sars ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ALC_TAT.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 ATE_COV.2, ADV_RCR.1, AVA_VLA.4, ALC_TAT.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, ATE_IND.2, AGD_ADM.1, ADV_LLD.1, ALC_DVS.2, ALC_LCD.1, ADV_FSP.2, ATE_DPT.1, AVA_SOF.1, ADV_SPM.1, AVA_MSU.3, ADV_IMP.1
heuristics/extracted_versions 4.0 1.0
heuristics/report_references/directly_referenced_by OCSI/CERT/LEO/08/2021/RC {}
heuristics/report_references/directly_referencing OCSI/CERT/RES/03/2012/RC BSI-DSZ-CC-0376-2006
heuristics/report_references/indirectly_referenced_by OCSI/CERT/LEO/08/2021/RC {}
heuristics/report_references/indirectly_referencing OCSI/CERT/RES/03/2012/RC BSI-DSZ-CC-0376-2006, BSI-DSZ-CC-0269-2006
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0269-2006
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0269-2006
maintenance_updates
pdf_data/report_filename rc_finx_rtos_se_4_v1.0.pdf dcssi-2008_37en.pdf
pdf_data/report_frontpage
  • FR:
  • FR:
    • cc_security_level: EAL 4 augmented AVA_MSU.3, AVA_VLA.4
    • cc_version: Common Criteria version 2.3 compliant with ISO 15408:2005
    • cert_id: DCSSI-2008/37
    • cert_item: LINQUS USIM 128K Smartcard: ESIGN PKI signature application loaded on GemXplore Generations G152B- EP3B platform embedded on SLE88CFX4002P/m8834b17
    • cert_item_version: T1004530 A3 / Version 1.0
    • cert_lab: CEACI (Thales Security Systems – CNES) 18 avenue Edouard Belin, 31401 Toulouse Cedex 9, France Phone: +33 (0)5 61 28 16 51, email : [email protected]
    • developer: GEMALTO 6 rue de la verrerie, 92197 Meudon, France Infineon Technologies AG Automotive, Industrial & Multimarket, Chipcard & Security IC´s, Am Campeon 1- 12, 85579 Neubiberg, Germany Sponsor GEMALTO 6 rue de la verrerie, 92197 Meudon, France
    • match_rules: ['Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developers(.+)Evaluation facility(.+)Recognition arrangements']
    • ref_protection_profiles: none
pdf_data/report_keywords/cc_cert_id
  • IT:
    • OCSI/CERT/RES/03/2012/RC: 1
    • OCSI/CERT/RES/06/2014/RC: 35
  • DE:
    • BSI-DSZ-CC-0376-2006: 1
  • FR:
    • DCSSI-2008/37: 18
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0002-2001: 1
    • BSI-PP-0006-2002T: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 1
    • EAL2: 1
    • EAL4: 9
    • EAL4+: 1
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 4: 2
    • EAL 4 augmented: 2
    • EAL 5: 1
    • EAL 7: 1
    • EAL4: 3
    • EAL5: 1
    • EAL5+: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 and: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR: 2
    • ALC_FLR.1: 5
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 1
  • ACM:
    • ACM_AUT: 1
    • ACM_CAP: 1
    • ACM_SCP: 1
  • ADO:
    • ADO_DEL: 1
    • ADO_IGS: 1
  • ADV:
    • ADV_FSP: 1
    • ADV_HLD: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_LLD: 1
    • ADV_RCR: 1
    • ADV_SPM: 1
  • AGD:
    • AGD_ADM: 1
    • AGD_USR: 1
  • ALC:
    • ALC_DVS: 1
    • ALC_DVS.2: 1
    • ALC_FLR: 2
    • ALC_TAT: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_CCA: 1
    • AVA_MSU: 1
    • AVA_MSU.3: 2
    • AVA_SOF: 1
    • AVA_VLA: 1
    • AVA_VLA.4: 2
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_STG.3: 1
    • FAU_STG.4: 1
  • FCS:
    • FCS_CKM.1: 2
pdf_data/report_keywords/cc_claims
  • A:
    • A: 1
  • OE:
    • OE.HI_VAD: 1
pdf_data/report_keywords/vendor
  • Gemalto:
    • Gemalto: 1
  • Infineon:
    • Infineon: 4
    • Infineon Technologies AG: 4
  • Thales:
    • Thales: 1
pdf_data/report_keywords/asymmetric_crypto
  • FF:
    • DSA:
      • DSA: 4
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 1
      • SHA256: 5
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 5
  • TLS:
    • SSL:
      • SSL: 3
pdf_data/report_keywords/tee_name
  • IBM:
    • SE: 33
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • ISO:
    • ISO/IEC 15408: 2
  • BSI:
    • AIS 34: 2
    • AIS34: 1
  • CC:
    • CCMB-2005-08-001: 1
    • CCMB-2005-08-002: 1
    • CCMB-2005-08-003: 1
    • CCMB-2005-08-004: 1
  • ISO:
    • ISO/IEC 15408:2005: 1
    • ISO/IEC 18045:2005: 1
pdf_data/report_keywords/javacard_version
  • JavaCard:
    • Java Card 2.2.1: 2
pdf_data/report_metadata
  • /Author: ocsi
  • /CreationDate: D:20170727120322+02'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20170727120322+02'00'
  • /Producer: Microsoft® Word 2010
  • /Title: Rapporto di Certificazione del prodotto “FIN.X RTOS SE V4.0”
  • pdf_file_size_bytes: 805511
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 35
  • /Author: J. Chuzel
  • /Comments: Developpeur
  • /Company: SGDN/DCSSI
  • /CreationDate: D:20081103113048+01'00'
  • /Creator: Acrobat PDFMaker 8.0 for Word
  • /Keywords: CER/F/07.5
  • /ModDate: D:20081103113130+01'00'
  • /Producer: Acrobat Distiller 8.0.0 (Windows)
  • /SourceModified: D:20081103103036
  • /Subject: LINQUS USIM 128K Smartcard: ESIGN PKI signature application loaded on GemXplore Generations G152B-EP3B platform embedded on SLE88CFX4002P/m8834b17
  • /Title: DCSSI-2008/37
  • pdf_file_size_bytes: 237599
  • pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 17
pdf_data/st_filename tds_finx_rtos_se_4_lite03.pdf cible2008_37en.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0269-2006: 2
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP: 1
    • BSI-PP-0002: 1
    • BSI-PP-0004-2002T-: 1
    • BSI-PP-0005-2002T-03-04-2002: 1
    • BSI-PP-0006-2002T-: 1
    • BSI-PP-0006-2002T-03-04-2002: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 4
    • EAL4 augmented: 2
  • EAL:
    • EAL4: 2
    • EAL4 augmented: 2
    • EAL4+: 1
    • EAL5: 1
    • EAL5 augmented: 1
    • EAL5+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 5
  • ALC:
    • ALC_FLR.1: 3
  • ACM:
    • ACM_AUT.1: 1
    • ACM_CAP.4: 1
    • ACM_SCP.2: 1
    • ACM_XXX: 1
  • ADO:
    • ADO_DEL.2: 1
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP.2: 1
    • ADV_HLD.2: 1
    • ADV_IMP.1: 1
    • ADV_LLD.1: 1
    • ADV_RCR.1: 1
    • ADV_SPM.1: 1
  • AGD:
    • AGD_ADM.1: 1
    • AGD_USR.1: 1
  • ALC:
    • ALC_DVS.1: 1
    • ALC_DVS.2: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_MSU.3: 4
    • AVA_SOF.1: 1
    • AVA_VLA.4: 4
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 13
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 10
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 7
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 8
    • FAU_SAR.3.1: 1
    • FAU_SEL.1: 7
    • FAU_SEL.1.1: 3
    • FAU_STG.1: 9
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 8
    • FAU_STG.3.1: 1
    • FAU_STG.4: 7
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM: 17
    • FCS_CKM.1: 64
    • FCS_CKM.1.1: 7
    • FCS_CKM.2: 16
    • FCS_CKM.2.1: 2
    • FCS_CKM.4: 5
    • FCS_CKM.4.1: 1
    • FCS_CKM_EXT: 1
    • FCS_CKM_EXT.4: 1
    • FCS_CKM_EXT.4.1: 1
    • FCS_COP.1: 24
    • FCS_COP.1.1: 4
    • FCS_COP.1.2: 1
    • FCS_RNG_EXT.1: 1
  • FDP:
    • FDP_ACC.1: 20
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 14
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 3
    • FDP_ITC.1: 5
    • FDP_ITC.2: 5
    • FDP_RIP.2: 9
    • FDP_RIP.2.1: 1
    • FDP_UCT.1: 8
    • FDP_UCT.1.1: 2
    • FDP_UIT.1: 7
    • FDP_UIT.1.1: 2
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_AFL: 1
    • FIA_AFL.1: 10
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 2
    • FIA_AFL_EXT.1: 3
    • FIA_ATD.1: 11
    • FIA_ATD.1.1: 1
    • FIA_SOS: 1
    • FIA_SOS.1: 14
    • FIA_SOS.1.1: 3
    • FIA_UAU.1: 1
    • FIA_UAU.2: 13
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 11
    • FIA_UAU.5.1: 3
    • FIA_UAU.5.2: 3
    • FIA_UAU.6: 7
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 10
    • FIA_UAU.7.1: 1
    • FIA_UID: 1
    • FIA_UID.1: 2
    • FIA_UID.2: 10
    • FIA_UID.2.1: 1
    • FIA_USB.1: 12
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 17
    • FMT_MOF.1.1: 2
    • FMT_MSA.1: 13
    • FMT_MSA.1.1: 1
    • FMT_MSA.2: 8
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 12
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 52
    • FMT_MTD.1.1: 7
    • FMT_REV.1: 25
    • FMT_REV.1.1: 2
    • FMT_SAE.1: 8
    • FMT_SAE.1.1: 1
    • FMT_SAE.1.2: 2
    • FMT_SMF.1: 19
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 25
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 24
    • FPT_FLS.1.1: 5
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
    • FPT_TST.1: 8
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.2: 7
    • FTA_SSL.2.1: 1
    • FTA_SSL.2.2: 2
    • FTA_TAB.1: 8
    • FTA_TAB.1.1: 2
    • FTA_TAH.1: 8
    • FTA_TAH.1.1: 2
    • FTA_TAH.1.2: 2
    • FTA_TAH.1.3: 1
  • FTP:
    • FTP_ITC.1: 13
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP: 2
  • FCS:
    • FCS_CKM: 1
    • FCS_CKM.1: 5
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 3
    • FCS_CKM.3: 3
    • FCS_CKM.4: 4
    • FCS_COP: 1
    • FCS_COP.1: 9
  • FDP:
    • FDP_ACC.1: 7
    • FDP_ACF.1: 12
    • FDP_ACF.1.1: 4
    • FDP_ACF.1.2: 4
    • FDP_ETC.1: 5
    • FDP_ITC.1: 8
    • FDP_RIP.1: 4
    • FDP_SDI.2: 8
    • FDP_UIT.1: 13
    • FDP_UIT.1.2: 2
  • FIA:
    • FIA_AFL.1: 4
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 4
    • FIA_UAU.1: 4
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID.1: 5
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MOF: 1
    • FMT_MOF.1: 5
    • FMT_MSA.1: 5
    • FMT_MSA.1.1: 3
    • FMT_MSA.2: 4
    • FMT_MSA.3: 4
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 5
    • FMT_SMF: 2
    • FMT_SMF.1: 4
    • FMT_SMR.1: 4
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_AMT.1: 4
    • FPT_FLS.1: 4
    • FPT_PHP.1: 4
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 4
    • FPT_SEP: 1
    • FPT_SEP.1: 2
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
    • FPT_TST.1: 5
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 3
  • FTP:
    • FTP_ITC: 2
    • FTP_ITC.1: 11
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 4
    • FTP_ITC.1.3: 4
    • FTP_TRP.1: 3
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.AUTHUSER: 3
    • A.CONNECT: 3
    • A.DETECT: 4
    • A.MANAGE: 3
    • A.PEER_FUNC: 2
    • A.PEER_MGT: 2
    • A.PHYSICAL: 3
    • A.TRAINEDUSER: 3
  • O:
    • O.ACCESS: 10
    • O.ACCESS_HISTORY: 4
    • O.AUDIT_GENERATION: 8
    • O.AUDIT_PROTECTION: 5
    • O.AUDIT_REVIEW: 5
    • O.CRYPTO_MEDIA: 7
    • O.CRYPTO_NET: 13
    • O.DISCRETIONARY_ACCESS: 11
    • O.DISCRETIONARY_USER_CONTROL: 7
    • O.DISPLAY_BANNER: 3
    • O.ENFORCEMENT: 3
    • O.MANAGE: 19
    • O.PROTECT: 13
    • O.RESIDUAL_INFORMATION: 4
    • O.RUNTIME: 8
    • O.TRUSTED_CHANNEL: 6
    • O.USER_AUTHENTICATION: 12
    • O.USER_IDENTIFICATION: 5
  • OE:
    • OE.ADMIN: 1
    • OE.INFO_PROTECT: 1
    • OE.INSTALL: 1
    • OE.MAINTENANCE: 1
    • OE.PHYSICAL: 4
    • OE.RECOVER: 1
    • OE.TRUSTED: 6
  • T:
    • T.ASSETS_COMPROMISE: 7
    • T.AUDIT_COMPROMISE: 4
    • T.COMM: 4
    • T.MASQUERADE: 3
    • T.RESIDUAL_DATA: 2
    • T.TSFDATA: 3
    • T.TSFFUNC: 4
    • T.UNATTENDED_SESSION: 2
    • T.UNAUTHORIZED_ACCESS: 7
    • T.UNIDENTIFIED_ACTIONS: 2
    • T.USER: 5
    • T.USERDATA: 3
  • A:
    • A.CGA: 1
    • A.SCA: 1
  • D:
    • D.DTBS: 8
    • D.RAD: 13
    • D.SCD: 11
    • D.SIGNATURE: 4
    • D.SIGN_APPLI: 3
    • D.SVD: 6
    • D.USER_PIN: 1
    • D.VAD: 5
  • OE:
    • OE.HI_VAD: 1
pdf_data/st_keywords/vendor
  • Gemalto:
    • Gemalto: 53
  • Infineon:
    • Infineon: 4
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 5
  • DES:
    • 3DES:
      • T-DES: 2
      • TDES: 1
  • constructions:
    • MAC:
      • HMAC: 1
  • AES_competition:
    • AES:
      • AES: 1
  • DES:
    • 3DES:
      • 3-DES: 1
      • Triple-DES: 1
    • DES:
      • DES: 9
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • Diffie-Hellman: 2
    • DSA:
      • DSA: 27
  • RSA:
    • RSA 1024: 1
pdf_data/st_keywords/hash_function
  • PBKDF:
    • PBKDF2: 6
  • SHA:
    • SHA1:
      • SHA-1: 1
      • SHA1: 1
    • SHA2:
      • SHA-2: 1
      • SHA-224: 1
      • SHA-256: 1
      • SHA-384: 1
      • SHA-512: 2
  • SHA:
    • SHA1:
      • SHA-1: 3
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 44
  • TLS:
    • TLS:
      • TLS: 1
pdf_data/st_keywords/randomness
  • PRNG:
    • PRNG: 4
  • RNG:
    • RNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 4
  • CTR:
    • CTR: 2
  • XTS:
    • XTS: 1
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 16
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Physical tampering: 1
    • malfunction: 1
    • physical tampering: 5
  • SCA:
    • DPA: 2
    • SPA: 1
    • timing attacks: 1
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 112
pdf_data/st_keywords/standard_id
  • CC:
    • CCIMB-2012-09-003: 1
    • CCMB-2012-09-001: 1
  • FIPS:
    • FIPS 140-2: 1
    • FIPS 186-2: 1
    • FIPS 186-4: 2
    • FIPS PUB 186-2: 4
    • FIPS PUB 186-4: 3
    • FIPS140: 2
    • FIPS186: 1
    • FIPS186-2: 8
    • FIPS186-3: 1
    • FIPS186-4: 9
  • RFC:
    • RFC 2898: 2
    • RFC 4252: 7
    • RFC 4253: 6
    • RFC 6668: 5
    • RFC4253: 4
  • SCP:
    • SCP02: 2
pdf_data/st_keywords/javacard_version
  • GlobalPlatform:
    • Global Platform 2.1.1: 1
  • JavaCard:
    • JC2.2.1: 5
    • Java Card 2.2.1: 3
    • JavaCard 2.2.1: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • DAC mechanism but may be supplemented by further restrictions. These additional restrictions are out of scope for this evaluation. Examples of objects which are accessible to users but cannot be used to store: 1
    • out of scope: 1
  • OutOfScope:
    • out of scope: 1
    • verification of correct passcode stored in SIM at perso time. NB: The passcode functionality is out of scope of this Security target. 2.3 TOE LIFE CYCLE The TOE is composed of a JavaCard and a EEPROMed Java: 1
pdf_data/st_metadata
  • /Author:
  • /CreationDate: D:20081020110655
  • /Creator: PDFCreator Version 0.9.3
  • /Keywords:
  • /ModDate: D:20081020110655
  • /Producer: GPL Ghostscript 8.54
  • /Subject:
  • /Title: ASE10448v1.4_Lite
  • pdf_file_size_bytes: 410066
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 52
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different