name |
Bundesdruckerei Dokument Reading Application Version 1.2.1129 |
Plateforme jTOP INFv#46 masquée sur composants Infineon SLE78CLX1600PM, SLE78CLX800P et SLE78CLX360PM avec fonctionnalités MRTD |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
DE |
FR |
status |
archived |
archived |
not_valid_after |
01.09.2019 |
01.09.2019 |
not_valid_before |
18.12.2013 |
27.06.2013 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0908a_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2013-42fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0908b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2013-42en.pdf |
manufacturer |
Bundesdruckerei GmbH |
Trusted Logic / Infineon |
manufacturer_web |
https://www.bundesdruckerei.de |
https://www.trusted-logic.com/ |
security_level |
EAL3 |
EAL5+, AVA_VAN.5, ALC_DVS.2 |
dgst |
a593c2a6a880836c |
ac1e7ac251e9255c |
heuristics/cert_id |
BSI-DSZ-CC-0908-2013 |
ANSSI-CC-2013/42 |
heuristics/cert_lab |
BSI |
SERMA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_INT.3, ALC_FLR.3, ADV_SPM.1, ATE_FUN.2, ASE_CCL.1, AGD_OPE.1, ASE_SPD.1, ADV_IMP.2, ALC_TAT.3, ASE_OBJ.2, APE_CCL.1, ASE_TSS.2, APE_ECD.1, ATE_DPT.4, ADV_TDS.6, APE_INT.1, ATE_IND.3, APE_OBJ.2, ALC_CMS.5, ADV_ARC.1, ALC_DVS.2, ALC_LCD.2, ASE_INT.1, AVA_VAN.5, APE_SPD.1, APE_REQ.2, ADV_FSP.6, ASE_REQ.2, ALC_DEL.1, AGD_PRE.1, ATE_COV.3, ALC_CMC.5, ASE_ECD.1 |
AVA_VAN.5, ALC_DVS.2 |
heuristics/extracted_versions |
1.2.1129 |
46 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0898-2014, ANSSI-CC-2015/25 |
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-0737-2012 |
BSI-DSZ-CC-0829-2012 |
heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-0898-2014, ANSSI-CC-2015/25 |
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-0737-2012 |
BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0728-2011 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0898-2014 |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-0898-2014 |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
c3398dec6cc86c4f |
9399bd94f9925b16 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0064b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-profil_PP-2010-03en.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
0908a_pdf.pdf |
ANSSI-CC_2013-42fr.pdf |
pdf_data/report_frontpage |
- FR:
- DE:
- cert_id: BSI-DSZ-CC-0908-2013
- cert_item: Bundesdruckerei Document Reading Application Version 1.2.1129
- cert_lab: BSI
- developer: Bundesdruckerei GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
- FR:
- cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 3
- cert_id: ANSSI-CC-2013/42
- cert_item: Plateforme jTOP INFv#46 masquée sur composants Infineon SLE78CLX1600PM, SLE78CLX800P et SLE78CLX360PM avec fonctionnalités MRTD
- cert_item_version: Version 46.03
- cert_lab: Serma Technologies 30 avenue Gustave Eiffel, 33608 Pessac, FRANCE
- developer: Trusted Logic SAS 6, rue de la Verrerie, 92197 Meudon, FRANCE Infineon Technologies AG AIM CC SM PS - Am Campeon 1-12 - 85579 Neubiberg, GERMANY Commanditaire Trusted Logic SAS 6, rue de la Verrerie, 92197 Meudon, FRANCE
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: JCSPP], version 3.0 Java CardTM System Open Configuration Protection Profile
- DE:
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0737-2012: 3
- BSI-DSZ-CC-0908-2013: 20
|
- DE:
- FR:
- ANSSI-CC-2013/42: 19
- Rapport de certification 2013/42: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 3: 4
- EAL 4: 1
- EAL1: 7
- EAL2: 3
- EAL3: 4
- EAL4: 6
- EAL5: 6
- EAL6: 3
- EAL7: 4
- ITSEC:
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 1
- EAL4: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 3
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 1
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 1
- ALC_DEL: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 1
- ALC_FLR: 1
- ALC_FLR.1: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 1
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ALC_TAT.2: 1
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 1
- ATE_DPT.4: 1
- ATE_FUN: 2
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 2
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 4
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 1
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Infineon:
- Infineon: 23
- Infineon Technologies AG: 1
|
pdf_data/report_keywords/eval_facility |
- TUV:
- TUViT: 1
- TÜV Informationstechnik: 3
- TÜViT: 1
|
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
- MD:
- SHA:
- SHA1:
- SHA2:
- SHA-224: 1
- SHA-256: 2
- SHA-384: 1
- SHA-512: 1
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- AIS 20: 2
- AIS 32: 1
- AIS 38: 1
- ICAO:
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- 1.2.1129, TÜV Informationstechnik GmbH, (confidential document) [10] Visotec© Leseterminal - Installation und Bedienung Version 1.7.18, 18.10.2013: 1
- list for the TOE, Configuration Item Liste Document Reading Application, V1.32, 07.11.2013 (confidential document) [9] Evaluation Technical Report, Version 5, 18.11.2013, Bundesdruckerei Document Reading: 1
- OutOfScope:
- out of scope: 1
- the administrator, operator and revisor of the terminal. However, the delivery of those cards is out of scope for this evaluation. The terminal that operates the TOE is delivered to the user via standard: 1
|
|
pdf_data/report_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20140120143322+01'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, BDr, Leseterminal, BSI-CC-PP-0064-2010, Inspection System, TR-03110"
- /ModDate: D:20140120144125+01'00'
- /Producer: LibreOffice 3.6
- /Subject: Bundesdruckerei Document Reading Application
- /Title: Certification Report BSI-DSZ-CC-0908-2013
- pdf_file_size_bytes: 1325842
- pdf_hyperlinks: https://www.bsi.bund.de/zertifizierung, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 38
|
- /CreationDate: D:20130731165216+02'00'
- /Creator: PDFCreator Version 1.2.1
- /Keywords:
- /ModDate: D:20130801102813+02'00'
- /Producer: GPL Ghostscript 9.02
- /Subject:
- /Title:
- pdf_file_size_bytes: 231283
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 19
|
pdf_data/st_filename |
0908b_pdf.pdf |
ANSSI-CC-cible_2013-42en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP-0017: 1
- BSI-PP-0035: 1
- BSI-PP-0055: 1
- BSI-PP-0056: 1
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL5: 2
- EAL5 augmented: 2
- EAL5+: 2
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 8
- FAU_GEN.1: 4
- FAU_GEN.1.2: 1
- FCS:
- FCS_CKM: 10
- FCS_CKM.1: 7
- FCS_CKM.4: 6
- FCS_CKM.4.1: 1
- FCS_COP: 24
- FCS_COP.1: 5
- FCS_RND.1: 5
- FCS_RND.1.1: 1
- FDP:
- FDP_IFC.1: 7
- FDP_IFC.1.1: 1
- FDP_IFF.1: 5
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC.1: 1
- FDP_ITC.2: 1
- FDP_RIP.1: 4
- FDP_RIP.1.1: 1
- FIA:
- FIA_API: 7
- FIA_API.1: 3
- FIA_UAU: 2
- FIA_UAU.4: 5
- FIA_UAU.4.1: 1
- FIA_UAU.5: 5
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 3
- FIA_UID.1: 1
- FIA_UID.2: 6
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA.3: 2
- FMT_MTD: 11
- FMT_MTD.1: 2
- FMT_SMF.1: 8
- FMT_SMF.1.1: 1
- FMT_SMR.1: 6
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
|
- FAU:
- FAU_ARP: 3
- FAU_ARP.1: 3
- FAU_SAS: 1
- FCO:
- FCO_NRO: 7
- FCO_NRO.2: 8
- FCO_NRR: 2
- FCO_NRR.1: 3
- FCS:
- FCS_CKM: 19
- FCS_CKM.1: 3
- FCS_CKM.2: 2
- FCS_CKM.3: 1
- FCS_CKM.4: 2
- FCS_COP: 30
- FCS_COP.1: 5
- FCS_RND: 4
- FCS_RND.1: 5
- FCS_RND.1.1: 1
- FCS_RNG: 1
- FCS_TST.1: 1
- FDP:
- FDP_ACC: 12
- FDP_ACC.1: 3
- FDP_ACC.2: 5
- FDP_ACF: 13
- FDP_ACF.1: 23
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_IFC: 6
- FDP_IFC.1: 1
- FDP_IFC.2: 2
- FDP_IFF: 5
- FDP_IFF.1: 16
- FDP_IFF.1.2: 1
- FDP_IFF.1.4: 1
- FDP_ITC: 5
- FDP_ITC.1: 3
- FDP_ITC.2: 9
- FDP_ITT: 1
- FDP_RIP: 23
- FDP_RIP.1: 9
- FDP_ROL: 6
- FDP_ROL.1: 7
- FDP_SDI: 2
- FDP_SDI.2: 2
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UCT: 2
- FDP_UCT.1: 1
- FDP_UIT: 6
- FDP_UIT.1: 4
- FIA:
- FIA_AFL: 9
- FIA_AFL.1: 8
- FIA_ATD: 2
- FIA_ATD.1: 1
- FIA_UAU: 14
- FIA_UAU.1: 4
- FIA_UAU.4: 2
- FIA_UAU.5: 2
- FIA_UAU.6: 1
- FIA_UID: 9
- FIA_UID.1: 4
- FIA_UID.2: 1
- FIA_USB: 2
- FIA_USB.1: 3
- FMT:
- FMT_LIM: 9
- FMT_LIM.1: 9
- FMT_LIM.1.1: 2
- FMT_LIM.2: 8
- FMT_LIM.2.1: 2
- FMT_MSA: 40
- FMT_MSA.1: 10
- FMT_MSA.2: 3
- FMT_MSA.3: 14
- FMT_MTD: 9
- FMT_MTD.1: 2
- FMT_MTD.3: 1
- FMT_SMF: 11
- FMT_SMF.1: 7
- FMT_SMF.1.1: 1
- FMT_SMR: 15
- FMT_SMR.1: 15
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPT:
- FPT_FLS: 14
- FPT_FLS.1: 5
- FPT_ITT: 1
- FPT_PHP: 1
- FPT_RCV: 10
- FPT_RCV.3: 18
- FPT_RCV.4: 1
- FPT_TDC: 2
- FPT_TDC.1: 4
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST: 4
- FPT_TST.1: 5
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FRU:
- FRU_FLT: 1
- FRU_RSA: 2
- FRU_RSA.1: 1
- FTP:
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.APPLET: 2
- A.CARD-MANAGEMENT: 1
- A.DELETION: 1
- A.NATIVE: 3
- A.VERIFICATION: 2
- D:
- D.API_DATA: 4
- D.APP-CODE: 3
- D.APP-INST: 2
- D.APP_CODE: 5
- D.APP_C_DATA: 4
- D.APP_I_DATA: 6
- D.COMMAND: 2
- D.CRYPTO: 5
- D.CVM: 2
- D.GP-REGISTRY: 2
- D.JCS_CODE: 5
- D.JCS_DATA: 6
- D.PIN: 5
- D.SD-PERSO: 2
- D.SD-SESSION-KEYS: 2
- D.SEC_DATA: 8
- D.SOFTWARE: 2
- O:
- O.ALARM: 2
- O.APPLET: 16
- O.CARD-: 1
- O.CARD-MANAGEMENT: 2
- O.CIPHER: 3
- O.CODE_PKG: 14
- O.CVM-BLOCK: 2
- O.DELETION: 2
- O.ERROR-COUNTERS: 2
- O.FIREWALL: 2
- O.GLOBAL-CVM: 2
- O.GLOBAL_ARRAYS_CONFID: 2
- O.GLOBAL_ARRAYS_INTEG: 2
- O.INFO-CONFIDENTIALITY: 2
- O.INFO-INTEGRITY: 3
- O.INFO-ORIGIN: 2
- O.INSTALL: 4
- O.JAVAOBJECT: 41
- O.KEY-MNGT: 3
- O.LIFE-CYCLE: 2
- O.LOAD: 4
- O.LOCK: 2
- O.NATIVE: 2
- O.NO-KEY-REUSE: 2
- O.OBJ-DELETION: 2
- O.OPERATE: 2
- O.OS-SUPPORT: 2
- O.PIN-MNGT: 3
- O.REALLOCATION: 2
- O.RECEIPT: 2
- O.RECOVERY: 2
- O.REQUEST: 2
- O.RESOURCES: 2
- O.RND: 1
- O.SID: 2
- O.TRANSACTION: 3
- O.VERIFICATION: 3
- OE:
- OE.APPLET: 2
- OE.BAC_PP: 2
- OE.CARD-MANAGEMENT: 2
- OE.CODE-EVIDENCE: 2
- OE.KEY-LENGTH: 2
- OE.MRTD_: 1
- OE.NATIVE: 2
- OE.NO-RMI-APPLETS: 2
- OE.SCP: 6
- OE.SECRETS: 2
- OE.VERIFICATION: 5
- OP:
- OP.ARRAY_ACCESS: 4
- OP.CREATE: 7
- OP.DELETE_APPLET: 4
- OP.DELETE_PCKG: 3
- OP.DELETE_PCKG_APPLET: 2
- OP.DELETE_PKG_APPLET: 1
- OP.INSTANCE_FIELD: 4
- OP.INVK_INTERFACE: 7
- OP.INVK_VIRTUAL: 6
- OP.JAVA: 5
- OP.PUT: 6
- OP.THROW: 5
- OP.TYPE_ACCESS: 5
- OSP:
- OSP.BAC-PP: 2
- OSP.FILE-ORIGIN: 2
- OSP.KEY-LENGTH: 2
- OSP.NO-RMI-APPLETS: 2
- OSP.PERSONALIZATION: 2
- OSP.PROCESS-TOE: 1
- OSP.SECRETS: 3
- OSP.VERIFICATION: 2
- R:
- T:
- T.BRUTE-FORCE: 2
- T.CONFID-APPLI-DATA: 2
- T.CONFID-JCS-CODE: 2
- T.CONFID-JCS-DATA: 2
- T.CRYPTO: 2
- T.DELETION: 4
- T.EXE-CODE: 4
- T.FORCED-RESET: 2
- T.IMPERSONATE: 2
- T.INSTALL: 4
- T.INTEG-APPLI-CODE: 4
- T.INTEG-APPLI-DATA: 4
- T.INTEG-JCS-CODE: 2
- T.INTEG-JCS-DATA: 2
- T.INVALID-INPUT: 2
- T.INVALID-ORDER: 2
- T.LIFE-CYCLE: 2
- T.MALFUNCTION: 1
- T.MEM_ACCESS: 1
- T.NATIVE: 2
- T.OBJ-DELETION: 2
- T.PHYSICAL: 2
- T.PHYS_MANIPULATION: 1
- T.PHYS_PROBING: 1
- T.RECEIPT: 2
- T.REPLAY: 2
- T.RESOURCES: 2
- T.RND: 1
- T.SID: 4
|
pdf_data/st_keywords/vendor |
|
- Infineon:
- Infineon: 2
- Infineon Technologies AG: 1
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
- ECC:
- FF:
- RSA:
- RSA 1536: 1
- RSA-CRT: 3
- RSA1024: 2
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-224: 1
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
|
- SHA:
- SHA1:
- SHA2:
- SHA-2: 1
- SHA-224: 1
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 2
- Malfunction: 3
- Physical Tampering: 1
- Physical tampering: 1
- fault injection: 1
- malfunction: 7
- physical tampering: 2
- SCA:
- DPA: 4
- Leak-Inherent: 1
- SPA: 2
- physical probing: 3
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
- EF:
- EF.COM: 2
- EF.DG1: 2
- EF.DG13: 1
- EF.DG16: 2
- EF.DG2: 1
- EF.DG3: 2
- EF.DG4: 2
- EF.DG5: 1
- EF.SOD: 2
|
- EF:
- EF.COM: 2
- EF.DG1: 2
- EF.DG14: 1
- EF.DG16: 2
- EF.DG2: 2
- EF.DG3: 2
- EF.DG4: 2
- EF.DG5: 2
- EF.SOD: 2
|
pdf_data/st_keywords/standard_id |
- BSI:
- FIPS:
- FIPS 180-3: 1
- FIPS PUB 180-3: 1
- FIPS180-3: 2
- ICAO:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816-4: 1
- PKCS:
- RFC:
|
- BSI:
- CC:
- CCMB-2006-09-001: 1
- CCMB-2007-09-002: 1
- CCMB-2007-09-003: 1
- CCMB-2007-09-004: 1
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- FIPS:
- FIPS 180-2: 2
- FIPS 197: 2
- FIPS 46-2: 1
- FIPS 46-3: 2
- FIPS PUB 197: 2
- FIPS PUB 46-3: 6
- FIPS PUB 81: 1
- ICAO:
- ISO:
- ISO/IEC 15408:2005: 3
- ISO/IEC 15946-: 2
- ISO/IEC 15946-3: 3
- NIST:
- PKCS:
- SCP:
|
pdf_data/st_keywords/javacard_version |
|
- GlobalPlatform:
- JavaCard:
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
- java:
- javacard:
- javacard.framework: 3
- javacard.internalservices: 1
- javacard.lds.filesystem: 1
- javacard.pace: 1
- javacard.security: 5
- javacardx:
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /CreationDate: D:20131024122617+02'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20131024122617+02'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 1050960
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 56
|
- /CreationDate: D:20130519162311+02'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20130801102846+02'00'
- /Producer: Acrobat Distiller 7.0.5 (Windows)
- /Title:
- pdf_file_size_bytes: 3935958
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 162
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |