name |
Huawei SUN2000HA Software V300R001C00SPC608 |
Carte Upteq NFC 2.0.4_FRA release A sur composant ST33F1ME (T1020452, release A) |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
ES |
FR |
status |
active |
archived |
not_valid_after |
20.09.2027 |
01.09.2019 |
not_valid_before |
20.09.2022 |
23.04.2013 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-52%20Certificado.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-52%20INF-3892.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2013-18corrige.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-52%20ST.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST_D1266588_V11bp.pdf |
manufacturer |
Huawei Technologies Co., Ltd. |
Gemalto / STMicroelectronics |
manufacturer_web |
https://www.huawei.com |
https://www.gemalto.com/ |
security_level |
EAL3+, ALC_FLR.2 |
ALC_DVS.2, EAL4+, AVA_VAN.5 |
dgst |
a74f7bdf3acd72d7 |
710a58bda9b7d7d9 |
heuristics/cert_id |
2019-52-INF-3892 |
ANSSI-CC-2013/18 |
heuristics/cert_lab |
[] |
THALES |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ATE_COV.2, ASE_TSS.1, ASE_INT.1, ATE_FUN.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AVA_VAN.2, ADV_ARC.1, ALC_CMC.3, ASE_CCL.1, ALC_FLR.2, ASE_REQ.2 |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ADV_FSP.4, ASE_CCL.1 |
heuristics/extracted_versions |
- |
2.0.4 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2014/82, ANSSI-CC-2013/56, ANSSI-CC-2013/19 |
heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2011/07, ANSSI-CC-2012/48 |
heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2014/96, ANSSI-CC-2013/57, ANSSI-CC-2014/82, ANSSI-CC-2013/56, ANSSI-CC-2013/19 |
heuristics/report_references/indirectly_referencing |
{} |
ANSSI-CC-2010/49, ANSSI-CC-2011/17, ANSSI-CC-2012/48, ANSSI-CC-2011/07, ANSSI-CC-2011/77, ANSSI-CC-2010/50 |
heuristics/scheme_data |
- category: Others
- certification_date: 20.09.2022
- enhanced:
- category: Others
- cc_version: Common Criteria 3.1 release 5
- cert_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1595
- certification_date: 20.09.2022
- description: The TOE is the software running in the Operating System that is deployed into communication board inside Huawei SUN2000HA inverter, which is the access node of inverter. The TOE is a 'software only'. TOE consists of the software running on the Operating System of the SUN2000HA inverter chassis, but not the hardware. The TOE provides near-end maintenance through: Huawei mobile phone APP connected to the SUN2000HA inverter through the USB-WIFI Adapter stick inserted into the USB terminal. Smartlogger connected to the SUN2000HA inverter through the MBUS or RS485 with Modbus-RTU protocol (in the TOE evaluated configuration is used the RS485 port). The TOE provides the following major security features: Authentication and Authorization: Only authenticated users are allowed to log in to the TOE, query TOE data, and set TOE parameters. Only authorized users are able to execute the previous actions based on their privileges. If a user fails to be authenticated for multiple consecutive times, the user is locked for a period of time to prevent unauthorized access. Auditing: An operation log records the operation that an administrator has performed on the system and the result of the operation and is used for tracing and auditing. Security Management: The TOE provides four different user roles (Common user, Advanced user, Special user and Datalogger user). Also, the TOE provides: user password management, software upgrade, log exports and time settings.
- evaluation_facility: DEKRA Testing and Certification S.A.U.
- level: EAL3 + (ALC_FLR.2)
- manufacturer: Huawei Technologies Co., Ltd.
- report_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1596
- status: Certified
- target_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1594
- type: Product
- manufacturer: Huawei Technologies Co., Ltd.
- product: Huawei SUN2000HA Software V300R001C00SPC608
- product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/872-huawei-sun2000ha-software-v300r001c00spc608
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
b697a8aec7856a92 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-cible_PP-2010-05en.pdf |
pdf_data/cert_filename |
2019-52 Certificado.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL3: 1
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
- Huawei:
- Huawei: 3
- Huawei Technologies Co: 2
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author:
- /CreationDate:
- /Creator:
- /Keywords:
- /ModDate:
- /Producer:
- /Subject:
- /Title:
- /Trapped:
- pdf_file_size_bytes: 876880
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
|
pdf_data/report_filename |
2019-52 INF-3892.pdf |
anssi-cc-2013-18corrige.pdf |
pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 4 augmenté ALC_DVS.2 et AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 3
- cert_id: ANSSI-CC-2013/18
- cert_item: Carte Upteq NFC 2.0.4_FRA release A sur composant ST33F1ME (T1020452, release A
- cert_item_version: Plateforme Upteq NFC 2.0.4_FRA release A sur composant ST33F1ME (S1120746, release A
- cert_lab: THALES (TCS – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France
- developer: Gemalto La Vigie, Av du Jujubier, ZI Athelia IV, 13705 La Ciotat Cedex, France STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, B.P. 2, 13106 Rousset, France Commanditaire Gemalto La Vigie, Av du Jujubier, ZI Athelia IV, 13705 La Ciotat Cedex, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit \\(référence/version\\)(.+)Nom de la TOE \\(référence/version\\)(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: PPUSIMB], version 2.0.2 (U)SIM Java Card Platform Protection Profile - Basic configuration
|
pdf_data/report_keywords/cc_cert_id |
|
- FR:
- ANSSI-CC-2011/07: 4
- ANSSI-CC-2011/07-S01: 1
- ANSSI-CC-2012/48: 2
- ANSSI-CC-2013/18: 20
- ANSSI-CC-PP-2010/04: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 2: 1
- EAL 4: 2
- EAL2: 1
- EAL3: 8
- EAL4: 1
- ITSEC:
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 2
- EAL 5: 1
- EAL 7: 1
- EAL4: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- ALC:
- ALC_CMC.3: 1
- ALC_DEL.1: 1
- ALC_FLR: 3
- ALC_FLR.2: 8
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_INT.1: 1
- ASE_REQ.2: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_FUN.1: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
- Huawei:
- Huawei: 20
- Huawei Technologies Co: 3
|
- Gemalto:
- STMicroelectronics:
|
pdf_data/report_keywords/eval_facility |
- DEKRA:
- DEKRA Testing and Certification: 4
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
- /Author: robert-n
- /CreationDate: D:20130205153312+02'00'
- /Creator: PDFCreator Version 0.9.0
- /Keywords:
- /ModDate: D:20130205153312+02'00'
- /Producer: AFPL Ghostscript 8.53
- /Subject:
- /Title: anssi-cc-2013-18
- pdf_file_size_bytes: 254046
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 19
|
pdf_data/st_filename |
2019-52 ST.pdf |
ST_D1266588_V11bp.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL4: 4
- EAL4 augmented: 2
- EAL4+: 1
- EAL5: 1
- EAL5 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_FLR: 1
- ALC_FLR.2: 3
- ALC_LCD: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 6
- ADV_FSP.1: 4
- ADV_FSP.2: 2
- ADV_FSP.4: 9
- ADV_IMP.1: 5
- ADV_TDS.1: 2
- ADV_TDS.2: 1
- ADV_TDS.3: 9
- AGD:
- AGD_ADM: 1
- AGD_OPE.1: 10
- AGD_PRE.1: 6
- AGD_USR: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.1: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 2
- ALC_DVS.2: 9
- ALC_LCD.1: 3
- ALC_TAT.1: 3
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 4
- ASE_INT.1: 5
- ASE_OBJ.2: 3
- ASE_REQ.1: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 3
- ATE_DPT.1: 2
- ATE_FUN.1: 6
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 6
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_STG.1: 6
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 4
- FAU_STG.3.1: 1
- FDP:
- FDP_ACC.1: 8
- FDP_ACC.1.1: 1
- FDP_ACF.1: 6
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FIA:
- FIA_AFL.1: 5
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 4
- FIA_ATD.1.1: 1
- FIA_UAU.2: 6
- FIA_UAU.2.1: 1
- FIA_UID.1: 1
- FIA_UID.2: 5
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF.1: 7
- FMT_MOF.1.1: 1
- FMT_MSA.3: 2
- FMT_SMF.1: 7
- FMT_SMF.1.1: 1
- FMT_SMR.1: 7
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
|
- FAU:
- FAU_ARP.1: 17
- FAU_ARP.1.1: 1
- FAU_SAA.1: 3
- FAU_SAS.1: 1
- FCO:
- FCS:
- FCS_CKM: 73
- FCS_CKM.1: 23
- FCS_CKM.2: 7
- FCS_CKM.3: 4
- FCS_CKM.4: 45
- FCS_CKM.4.1: 1
- FCS_COP: 59
- FCS_COP.1: 18
- FCS_RND: 2
- FCS_RND.1: 9
- FCS_RND.1.1: 2
- FCS_RNG.1: 2
- FDP:
- FDP_ACC: 48
- FDP_ACC.1: 22
- FDP_ACC.2: 8
- FDP_ACF: 38
- FDP_ACF.1: 25
- FDP_IFC: 46
- FDP_IFC.1: 26
- FDP_IFC.2: 4
- FDP_IFF: 40
- FDP_IFF.1: 28
- FDP_IFF.1.2: 1
- FDP_IFF.1.4: 1
- FDP_ITC: 20
- FDP_ITC.1: 19
- FDP_ITC.2: 33
- FDP_ITT.1: 1
- FDP_RIP: 116
- FDP_RIP.1: 10
- FDP_ROL: 21
- FDP_ROL.1: 7
- FDP_SDI: 6
- FDP_SDI.1: 1
- FDP_SDI.2: 8
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UIT: 12
- FDP_UIT.1: 4
- FIA:
- FIA_ATD: 9
- FIA_ATD.1: 2
- FIA_UAU: 18
- FIA_UAU.1: 2
- FIA_UAU.4: 1
- FIA_UID: 33
- FIA_UID.1: 16
- FIA_UID.2: 1
- FIA_USB: 8
- FIA_USB.1: 3
- FMT:
- FMT_LIM: 1
- FMT_LIM.1: 2
- FMT_LIM.2: 1
- FMT_MOF: 6
- FMT_MOF.1: 1
- FMT_MSA: 173
- FMT_MSA.1: 18
- FMT_MSA.2: 2
- FMT_MSA.3: 27
- FMT_MSA.3.1: 2
- FMT_MTD: 26
- FMT_MTD.1: 3
- FMT_MTD.3: 1
- FMT_REV: 8
- FMT_REV.1: 4
- FMT_SMF: 68
- FMT_SMF.1: 30
- FMT_SMF.1.1: 1
- FMT_SMR: 75
- FMT_SMR.1: 48
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNO: 5
- FPR_UNO.1: 11
- FPR_UNO.1.1: 1
- FPT:
- FPT_FLS: 61
- FPT_FLS.1: 8
- FPT_FLS.1.1: 1
- FPT_ITT: 12
- FPT_ITT.1: 3
- FPT_PHP.3: 1
- FPT_RCV: 22
- FPT_RCV.3: 12
- FPT_RCV.4: 2
- FPT_TDC.1: 10
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST.1: 1
- FPT_UNO: 1
- FRU:
- FTP:
- FTP_ITC: 24
- FTP_ITC.1: 10
- FTP_TRP.1: 4
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.APPLET: 5
- A.APPS-PROVIDER: 4
- A.CONTROLLING-: 2
- A.CONTROLLING-AUTHORITY: 2
- A.DELETION: 2
- A.KEY-ESCROW: 1
- A.MOBILE-OPERATOR: 4
- A.OTA-ADMIN: 4
- A.PERSONALIZER: 1
- A.PRODUCTION: 3
- A.VERIFICATION: 4
- A.VERIFICATION-: 2
- A.VERIFICATION-AUTHORITY: 2
- D:
- D.API_DATA: 3
- D.APP_CODE: 8
- D.APP_C_DATA: 5
- D.APP_I_DATA: 6
- D.APSD_KEYS: 3
- D.CARD_MNGT_DATA: 3
- D.CASD_KEYS: 3
- D.CRYPTO: 4
- D.GP_CODE: 1
- D.ISD_KEYS: 3
- D.JCS_CODE: 3
- D.JCS_DATA: 5
- D.OPTIONAL_PF_SERVICE: 2
- D.PIN: 4
- D.SEC_DATA: 7
- D.VASD_KEYS: 2
- O:
- O.ALARM: 21
- O.APPLET: 21
- O.APPLI-: 1
- O.APPLI-AUTH: 10
- O.CARD-: 5
- O.CARD-MANAGEMENT: 49
- O.CARD_MANAGEMENT: 2
- O.CIPHER: 25
- O.CODE_PKG: 14
- O.COMM_AUTH: 16
- O.COMM_CONFIDENTIALITY: 13
- O.COMM_INTEGRITY: 16
- O.DELETION: 15
- O.DOMAIN-: 9
- O.DOMAIN-RIGHTS: 19
- O.FIREWALL: 52
- O.GLOBAL_ARRAYS_CONFID: 18
- O.GLOBAL_ARRAYS_INTEG: 11
- O.INSTALL: 16
- O.JAVAOBJECT: 41
- O.KEY-: 2
- O.KEY-MNGT: 33
- O.LOAD: 16
- O.NATIVE: 13
- O.OBJ-DELETION: 8
- O.OPERATE: 36
- O.PIN-: 7
- O.PIN-MNGT: 15
- O.REALLOCATION: 16
- O.REMOTE: 15
- O.REMOTE_MTHD: 6
- O.REMOTE_OBJ: 10
- O.REMOTE_SERVICE_ACTIVATION: 11
- O.REMOTE_SERVICE_AUDIT: 11
- O.RESOURCES: 26
- O.RMI_SERVICE: 12
- O.RND: 10
- O.ROR: 5
- O.SCP: 28
- O.SCP-: 3
- O.SCP-SUPPORT: 19
- O.SID: 36
- O.TRANSACTION: 19
- OE:
- OE.ACTIVATION-: 1
- OE.ACTIVATION-KEY-ESCROW: 6
- OE.AID-MANAGEMENT: 6
- OE.AP-KEYS: 6
- OE.APPLET: 9
- OE.APPS-PROVIDER: 6
- OE.BASIC-: 4
- OE.BASIC-APPS-: 6
- OE.BASIC-APPS-VALIDATION: 16
- OE.CA-KEYS: 8
- OE.CARD_MANAGEMENT: 2
- OE.CONTROLLING-: 1
- OE.CONTROLLING-AUTHORITY: 5
- OE.GEMACTIVATE-ADMIN: 5
- OE.KEY-CHANGE: 7
- OE.KEY-ESCROW: 6
- OE.KEY-GENERATION: 4
- OE.MOBILE-OPERATOR: 6
- OE.OPERATOR-KEYS: 6
- OE.OTA-ADMIN: 4
- OE.OTA-LOADING: 4
- OE.OTA-SERVERS: 6
- OE.PERSONALIZER: 4
- OE.PRODUCTION: 5
- OE.QUOTAS: 6
- OE.SCP: 3
- OE.SECURE-APPS-CERTIFICATION: 5
- OE.SECURITY-DOMAINS: 4
- OE.SHARE-CONTROL: 6
- OE.TRUSTED-APPS-DEVELOPER: 7
- OE.TRUSTED-APPS-PRE-ISSUANCE: 5
- OE.VA-KEYS: 7
- OE.VERIFICATION: 34
- OE.VERIFICATION-: 1
- OE.VERIFICATION-AUTHORITY: 3
- OP:
- OP.ARRAY_ACCESS: 4
- OP.CREATE: 7
- OP.DELETE_APPLET: 4
- OP.DELETE_PCKG: 3
- OP.DELETE_PCKG_APPLET: 3
- OP.GET_ROR: 3
- OP.INSTANCE_FIELD: 4
- OP.INVK_INTERFACE: 7
- OP.INVK_VIRTUAL: 6
- OP.INVOKE: 3
- OP.JAVA: 5
- OP.PUT: 6
- OP.RET_RORD: 3
- OP.THROW: 5
- OP.TYPE_ACCESS: 5
- OSP:
- OSP.ACTIVATION-KEY-ESCROW: 5
- OSP.AID-MANAGEMENT: 4
- OSP.APSD-KEYS: 4
- OSP.BASIC-: 1
- OSP.BASIC-APPS-VALIDATION: 3
- OSP.CASD-KEYS: 4
- OSP.KEY-CHANGE: 4
- OSP.KEY-ESCROW: 4
- OSP.KEY-GENERATION: 4
- OSP.OPERATOR-KEYS: 4
- OSP.OTA-LOADING: 4
- OSP.OTA-SERVERS: 4
- OSP.PERSONALIZER: 4
- OSP.PRODUCTION: 4
- OSP.QUOTAS: 4
- OSP.RNG: 5
- OSP.SECURE-APPS-: 2
- OSP.SECURE-APPS-CERTIFICATION: 2
- OSP.SECURITY-DOMAINS: 4
- OSP.SERVICE: 1
- OSP.SERVICE_AUDIT: 4
- OSP.SHARE-CONTROL: 4
- OSP.TRUSTED-: 1
- OSP.TRUSTED-APPS-DEVELOPER: 5
- OSP.TRUSTED-APPS-PRE-: 2
- OSP.TRUSTED-APPS-PRE-ISSUANCE: 2
- OSP.VASD-KEYS: 4
- OSP.VERIFICATION: 5
- R:
- T:
- T.COM_EXPLOIT: 6
- T.CONFID-APPLI-DATA: 18
- T.CONFID-JCS-: 9
- T.CONFID-JCS-CODE: 5
- T.CONFID-JCS-DATA: 4
- T.DELETION: 7
- T.EXE-: 1
- T.EXE-CODE: 11
- T.EXE-CODE-REMOTE: 4
- T.INSTALL: 6
- T.INTEG-: 10
- T.INTEG-APPLI-: 7
- T.INTEG-APPLI-CODE: 9
- T.INTEG-APPLI-DATA: 16
- T.INTEG-JCS-CODE: 7
- T.INTEG-JCS-DATA: 6
- T.INTEG-USER-DATA: 9
- T.LIFE_CYCLE: 6
- T.NATIVE: 7
- T.OBJ-DELETION: 4
- T.PHYSICAL: 5
- T.RESOURCES: 8
- T.SID: 18
- T.UNAUTHORIZED_ACCESS: 4
- T.UNAUTHORIZED_ACCESS_TO_SERVIC: 1
- T.UNAUTHORIZED_ACCESS_TO_SERVICE: 5
- T.UNAUTHORIZED_CARD_MNGT: 9
|
pdf_data/st_keywords/vendor |
- Huawei:
- Huawei: 62
- Huawei Technologies Co: 44
|
- Gemalto:
- STMicroelectronics:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- MD:
- SHA:
- SHA1:
- SHA2:
- SHA-2: 3
- SHA-224: 2
- SHA-256: 3
- SHA-384: 3
- SHA2: 2
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- fault induction: 2
- malfunction: 3
- physical tampering: 4
- SCA:
- DPA: 1
- physical probing: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- CC:
- CCIMB-2009-07-001: 1
- CCIMB-2009-07-002: 1
- CCIMB-2009-07-003: 1
- CCIMB-2009-07-004: 1
- FIPS:
- FIPS 140-2: 1
- FIPS 180-2: 1
- FIPS 180-3: 1
- FIPS 197: 1
- FIPS 46-3: 1
- FIPS PUB 197: 2
- FIPS PUB 46-3: 3
- FIPS PUB 81: 4
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 9796-2: 1
- PKCS:
- PKCS #1: 5
- PKCS #5: 1
- PKCS#1: 3
- PKCS#5: 1
- RFC:
- SCP:
- SCP 01: 1
- SCP 02: 1
- SCP 80: 1
- SCP02: 5
- SCP80: 8
|
pdf_data/st_keywords/javacard_version |
|
- GlobalPlatform:
- Global Platform 2.2.1: 1
- Global Platform 2.2.2: 1
- JavaCard:
- Java Card 2.2.2: 2
- Java Card 3.0.1: 1
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
- java:
- javacard:
- javacard.framework: 2
- javacard.framework.service: 1
- javacard.security: 2
- javacardx:
- javacardx.crypto: 10
- javacardx.rmi: 1
- javacardx.security: 9
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.SCP.RECOVERY and O.SCP-SUPPORT are: 1
- out of scope: 2
- parameters for cryptographic operations, the use of these other values are not advised; and clearly out of scope of the TOE. See [USR] for details. JCS.EraseResidualData The security function ensures that: 1
|
pdf_data/st_metadata |
|
- /Author: fguerin
- /CreationDate: D:20130417115544+02'00'
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20130417115544+02'00'
- /Producer: Microsoft® Office Word 2007
- /Title: ST NFC2.0.4_FRA
- pdf_file_size_bytes: 2318358
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 176
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
False |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |