Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
DMT-CBS-CE3D3 Family (DMT-CBS-CE3D3/CC080/CC048) Dual Interface smart card chips with HAL library, version 2.0
SERTIT-093
IDMotion V2 Multos Virtual Machine OS Multos V4.5.2, AMD version 0151v001
ANSSI-CC-2018/50
name DMT-CBS-CE3D3 Family (DMT-CBS-CE3D3/CC080/CC048) Dual Interface smart card chips with HAL library, version 2.0 IDMotion V2 Multos Virtual Machine OS Multos V4.5.2, AMD version 0151v001
scheme NO FR
not_valid_after 10.02.2022 14.12.2023
not_valid_before 10.02.2017 14.12.2018
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SERTIT-093%20CR%20V1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018_50fr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[09083][SERTIT-093][ST][0.3]%20ASE_DMT-CBS-CE3D3%20Security%20Target%20Lite.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2018_50en.pdf
manufacturer Datang Microelectronics Technology Co., Ltd (DMT) Gemalto / Trusted Labs
manufacturer_web https://www.dmt.com.cn/English/ https://www.gemalto.com
security_level ALC_DVS.2, EAL5+, AVA_VAN.5 EAL7
dgst ac00266687e9a428 efb9f87dde709ef7
heuristics/cert_id SERTIT-093 ANSSI-CC-2018/50
heuristics/cert_lab [] THALES
heuristics/extracted_sars ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ALC_TAT.2, ADV_TDS.4, ASE_REQ.2, ATE_IND.2, ASE_CCL.1 ADV_TAT.3, ALC_LCD.2, ATE_DPT.4, ADV_INT.3, ADV_LCD.2, AVA_VAN.5, ADV_FSP.6, ALC_CMS.1, ALC_DVS.2, ALC_TAT.3, ATE_FUN.2, ADV_ARC.1, ADV_CMC.5, ADV_IMP.2, ALC_CMC.5, ADV_TDS.6, ATE_COV.3, ADV_SPM.1
heuristics/extracted_versions 2.0 4.5.2
heuristics/report_references/directly_referencing {} ANSSI-CC-2018/35, BSI-DSZ-CC-0945-2017
heuristics/report_references/indirectly_referencing {} ANSSI-CC-2018/35, BSI-DSZ-CC-0945-2017, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0782-2012
heuristics/scheme_data
  • category: ICs, Smart Cards and Smart Card-Related Devices and Systems
  • certification_date: 10.02.2017
  • developer: Datang Microelectronics Technology Co., Ltd (DMT)
  • enhanced:
    • category: ICs, Smart Cards and Smart Card-Related Devices and Systems
    • cert_id: SERTIT-093
    • certification_date: 10.02.2017
    • description: The DMT-CBS-CE3D3 Family TOE is a dual interface smart card chips suitable for instance to support a Java Card OS, ID cards, Banking card, etc. The TOE consists of hardware and IC dedicated software. The hardware is based on a 32-bit CPU with ROM (Non-Volatile Read-Only Memory), EEPROM (Non-volatile Programmable Memory) and RAM (Volatile Memory). The hardware of the DMT-CBS-CE3D3 Family also incorporates communication peripherals and cryptographic coprocessors for execution and acceleration of symmetric and asymmetric cryptographic algorithms. The IC dedicated software contains a library of cryptographic services.
    • developer: Datang Microelectronics Technology Co., Ltd (DMT)
    • documents: frozendict({'cert': [frozendict({'href': 'https://sertit.no/getfile.php/135637-1611769644/SERTIT/Sertifikater/2017/93/SERTIT-093%20C.pdf'})], 'target': [frozendict({'href': 'https://sertit.no/getfile.php/135193-1607953274/SERTIT/Sertifikater/2017/93/%5B09083%5D%5BSERTIT-093%5D%5BST%5D%5B0.3%5D%20ASE_DMT-CBS-CE3D3%20Security%20Target%20Lite.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/135640-1611769655/SERTIT/Sertifikater/2017/93/SERTIT-093%20CR.pdf'})]})
    • evaluation_facility: Brightsight B.V.
    • level: EAL 5, ALC_DVS.2, AVA_VAN.5
    • mutual_recognition: CCRA, SOG-IS
    • product: 2.0
    • sponsor: Datang Microelectronics Technology Co., Ltd (DMT)
  • product: DMT-CBS-CE3D3 Family (DMT-CBS-CE3D3/CC080/CC048) Dual Interface smart card chips with HAL library
  • url: https://sertit.no/certified-products/product-archive/dmt-cbs-ce3d3-family-dmt-cbs-ce3d3-cc080-cc048-dual-interface-smart-card-chips-with-hal-library
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0945-2017
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0945-2017
heuristics/protection_profiles cf0f01bcd7be3e9c {}
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf {}
pdf_data/report_filename SERTIT-093 CR V1.0.pdf anssi-cc-2018_50fr.pdf
pdf_data/report_frontpage
  • FR:
  • FR:
    • cc_security_level: EAL 7
    • cc_version: Critères Communs version 3.1 révision 5
    • cert_id: ANSSI-CC-2018/50
    • cert_item: IDMotion V2 Multos Virtual Machine
    • cert_item_version: OS version Multos V4.5.2 AMD version 0151v001
    • cert_lab: THALES (TCS – CNES) 290 allée du Lac, 31670 Labège, France
    • developer: Gemalto La Vigie, Avenue du jujubier, ZI Athélia IV, BP 90- 13702 La Ciotat Trusted Labs 6, rue de la Verrerie – CS20001, 92197 Meudon Cedex Infineon Technologies AG Am Campeon 1-12, 85579 Neubiberg Commanditaire Gemalto La Vigie, Avenue du jujubier, ZI Athélia IV, BP 90- 13702 La Ciotat
    • match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
    • ref_protection_profiles: Néant
pdf_data/report_keywords/cc_cert_id
  • NO:
    • SERTIT-093: 18
  • DE:
    • BSI-DSZ-CC-0945-2017: 1
  • FR:
    • ANSSI-CC-2018/35: 2
    • ANSSI-CC-2018/50: 15
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 18
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 5: 2
    • EAL 5 augmented: 1
    • EAL 5+: 17
    • EAL1: 1
    • EAL2: 1
    • EAL4: 1
    • EAL5: 1
    • EAL5+: 1
    • EAL7: 1
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 5: 3
    • EAL 7: 4
    • EAL2: 2
    • EAL7: 3
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.5: 1
    • ADV_IMP.1: 1
    • ADV_INT.2: 1
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE.1: 3
    • AGD_PRE.1: 3
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 4
    • ALC_FLR: 1
    • ALC_LCD.1: 1
    • ALC_TAT.2: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.2: 1
    • ATE_DPT.3: 1
    • ATE_FUN.1: 1
    • ATE_IND: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 4
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 2
    • ALC_FLR: 2
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 4
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_SAS.1: 3
  • FCS:
    • FCS_COP.1: 4
    • FCS_RNG.1: 2
  • FDP:
    • FDP_IFC.1: 1
    • FDP_ITT.1: 1
    • FDP_SDC.1: 3
    • FDP_SDI.2: 2
  • FMT:
    • FMT_LIM.1: 2
    • FMT_LIM.2: 2
  • FPT:
    • FPT_FLS.1: 1
    • FPT_ITT.1: 1
    • FPT_PHP.3: 1
  • FRU:
    • FRU_FLT.2: 1
pdf_data/report_keywords/vendor
  • Gemalto:
    • Gemalto: 2
  • Infineon:
    • Infineon Technologies AG: 2
pdf_data/report_keywords/eval_facility
  • BrightSight:
    • Brightsight: 2
  • TrustedLabs:
    • Trusted Labs: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
  • DES:
    • 3DES:
      • TDES: 3
    • DES:
      • DES: 1
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 1
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • Fault Injection: 1
  • SCA:
    • DPA: 1
    • SPA: 1
  • other:
    • JIL: 2
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 15408: 2
    • ISO/IEC 7816: 2
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
pdf_data/report_metadata
  • /AAPL:Keywords: ['ugradert']
  • /Author: Ulrich Isachsen
  • /CreationDate: D:20170210134309Z00'00'
  • /Creator: Microsoft® Word 2010
  • /Keywords: ugradert
  • /ModDate: D:20170210134309Z00'00'
  • /Producer: Mac OS X 10.12.3 Quartz PDFContext
  • /Title: tittel
  • pdf_file_size_bytes: 1420130
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 20
  • /CreationDate: D:20181219113402+01'00'
  • /Creator: Microsoft® Word 2010
  • /Keywords: ANSSI-CC-CER-F-07.028
  • /ModDate: D:20181219115454+01'00'
  • /Producer: Microsoft® Word 2010
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 749242
  • pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 14
pdf_data/st_filename [09083][SERTIT-093][ST][0.3] ASE_DMT-CBS-CE3D3 Security Target Lite.pdf anssi-cible-cc-2018_50en.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0945-2017: 1
  • NL:
    • CC-1: 1
    • CC-2: 1
    • CC-3: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0084-2014: 1
    • BSI-CC-PP-0084-2014: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL5: 2
    • EAL5 augmented: 2
  • EAL:
    • EAL4: 1
    • EAL5: 3
    • EAL5+: 1
    • EAL7: 6
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.5: 1
    • ADV_IMP.1: 1
    • ADV_INT.2: 1
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 2
    • ALC_LCD.1: 1
    • ALC_TAT.2: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.3: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 3
  • ADV:
    • ADV_ARC.1: 1
    • ADV_CMC.5: 4
    • ADV_FSP.2: 1
    • ADV_FSP.6: 3
    • ADV_IMP.1: 3
    • ADV_IMP.2: 2
    • ADV_INT.3: 3
    • ADV_LCD.2: 1
    • ADV_SPM.1: 5
    • ADV_TAT.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.6: 3
  • ALC:
    • ALC_CMC.5: 2
    • ALC_CMS.1: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 5
    • ALC_LCD.1: 1
    • ALC_LCD.2: 5
    • ALC_TAT.3: 5
  • ATE:
    • ATE_COV.1: 1
    • ATE_COV.3: 3
    • ATE_DPT.4: 3
    • ATE_FUN.1: 2
    • ATE_FUN.2: 3
  • AVA:
    • AVA_VAN.5: 6
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_SAS.1: 6
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_CKM.1: 7
    • FCS_CKM.4: 7
    • FCS_COP.1: 21
    • FCS_COP.1.1: 3
    • FCS_RNG.1: 7
    • FCS_RNG.1.1: 1
    • FCS_RNG.1.2: 1
  • FDP:
    • FDP_IFC.1: 10
    • FDP_ITC.1: 7
    • FDP_ITC.2: 7
    • FDP_ITT.1: 9
    • FDP_SDC.1: 7
    • FDP_SDC.1.1: 1
    • FDP_SDI.1: 2
    • FDP_SDI.2: 6
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
  • FMT:
    • FMT_LIM.1: 4
    • FMT_LIM.2: 3
  • FPT:
    • FPT_FLS.1: 11
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 10
    • FPT_PHP.3: 11
    • FPT_PHP.3.1: 1
  • FRU:
    • FRU_FLT.2: 11
  • FAU:
    • FAU_ACC.2: 1
    • FAU_ARP: 3
    • FAU_ARP.1: 6
    • FAU_ARP.1.1: 4
    • FAU_GEN.1: 4
    • FAU_SAA: 3
    • FAU_SAA.1: 10
    • FAU_SAA.1.1: 2
    • FAU_SAA.1.2: 3
    • FAU_SAS.1: 1
  • FCS:
    • FCS_CKM: 4
    • FCS_COP: 5
    • FCS_RNG: 4
  • FDP:
    • FDP_ACC: 5
    • FDP_ACC.1: 4
    • FDP_ACC.2: 13
    • FDP_ACC.2.1: 2
    • FDP_ACC.2.2: 1
    • FDP_ACF: 4
    • FDP_ACF.1: 13
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 1
    • FDP_ITT.1: 1
    • FDP_ROL: 3
    • FDP_ROL.1: 5
    • FDP_ROL.1.1: 1
    • FDP_ROL.1.2: 1
    • FDP_SDC.1: 1
    • FDP_SDI.1: 1
    • FDP_SDI.2: 1
    • FDP_UCT.1: 1
    • FDP_UIT.1: 1
  • FIA:
    • FIA_API.1: 1
  • FMT:
    • FMT_LIM: 2
    • FMT_LIM.2: 1
    • FMT_MSA.1: 3
    • FMT_MSA.3: 3
    • FMT_SMF.1: 1
  • FPT:
    • FPT_FLS: 4
    • FPT_FLS.1: 12
    • FPT_FLS.1.1: 2
    • FPT_PHP.3: 1
    • FPT_RCV: 3
    • FPT_RCV.4: 7
    • FPT_RCV.4.1: 1
    • FPT_TST.2: 1
  • FRU:
    • FRU_FLT.2: 1
    • FRU_RSA: 3
    • FRU_RSA.1: 6
    • FRU_RSA.1.1: 1
  • FTP:
    • FTP_ITC.1: 1
pdf_data/st_keywords/cc_claims
  • O:
    • O.AES: 5
    • O.DES: 3
    • O.RND: 3
    • O.RSA: 4
    • O.TDES: 3
  • T:
    • T.RND: 2
  • A:
    • A.APPLI_CONT: 9
    • A.CIPHER: 3
    • A.CLON: 3
    • A.DECIPHER: 3
    • A.DIS_MEMORY: 3
    • A.LOAD: 3
    • A.MOD_MEMORY: 3
    • A.OPERATE: 3
    • A.REMOVE: 3
    • A.SECURITY: 3
    • A.SIDE: 3
    • A.TAMPER_ES: 3
  • O:
    • O.AES: 1
    • O.APPLI_DEV: 12
    • O.CIPHER: 3
    • O.CLON: 2
    • O.DECIPHER: 4
    • O.DEV_DIS_ES: 13
    • O.DIS: 1
    • O.DIS_MEMORY: 2
    • O.DLV_: 7
    • O.DLV_AUDIT: 1
    • O.DLV_DATA: 6
    • O.EFECT_REMOVE: 1
    • O.EFFECT_L: 1
    • O.EFFECT_LOAD: 5
    • O.EFFECT_R: 1
    • O.EFFECT_REMOVE: 3
    • O.FLAW: 1
    • O.INIT_A: 2
    • O.INIT_ACS: 7
    • O.LOAD: 8
    • O.MOD_MEMORY: 1
    • O.OPERATE: 1
    • O.REMOVE: 6
    • O.RESOURCE: 4
    • O.RESOURCES: 1
    • O.RND: 1
    • O.ROLLBACK: 5
    • O.SAMPLES_ACS: 1
    • O.SAMPLE_ACS: 4
    • O.SECURITY: 5
    • O.SEGREGATE: 5
    • O.SIDE: 6
    • O.TAMPER_ES: 17
    • O.TEST_OPERA: 1
  • OSP:
    • OSP.CIPHER: 3
    • OSP.CONF-ALU: 3
  • T:
    • T.APP_CORR: 6
    • T.APP_DISC: 7
    • T.APP_MOD: 7
    • T.APP_READ: 7
    • T.APP_REMOVE: 7
    • T.CLON: 2
    • T.DEL_REMOVE: 7
    • T.DIS: 2
    • T.DIS_DATA: 14
    • T.DIS_TEST_ES: 5
    • T.ERR_REMOVE: 6
    • T.LOAD_APP: 8
    • T.LOAD_MAN: 5
    • T.LOAD_MOD: 5
    • T.LOAD_OTHER: 5
    • T.MOD: 5
    • T.MOD_DATA: 7
    • T.MOD_EXE: 10
    • T.MOD_LOAD: 7
    • T.MOD_SHARE: 8
    • T.MOD_TSF: 8
    • T.RESOURCES: 5
    • T.RND: 2
    • T.T_CMD: 10
    • T.T_ES: 8
    • T.T_TOOLS: 5
pdf_data/st_keywords/vendor
  • Gemalto:
    • Gemalto: 39
  • Infineon:
    • Infineon: 5
    • Infineon Technologies: 2
  • Thales:
    • Thales: 1
pdf_data/st_keywords/eval_facility
  • TrustedLabs:
    • Trusted Labs: 3
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 27
  • DES:
    • 3DES:
      • TDEA: 1
      • TDES: 16
      • Triple-DES: 5
    • DES:
      • DES: 11
  • AES_competition:
    • AES:
      • AES: 9
  • DES:
    • 3DES:
      • TDES: 4
      • Triple-DES: 1
    • DES:
      • DES: 6
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 2
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 3
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 5
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 5
    • RNG: 6
  • TRNG:
    • TRNG: 1
  • RNG:
    • RND: 3
  • TRNG:
    • TRNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 4
  • ECB:
    • ECB: 4
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 7
    • malfunction: 2
    • physical tampering: 1
  • SCA:
    • Leak-Inherent: 5
    • Physical Probing: 2
    • physical probing: 3
    • side channel: 1
  • FI:
    • Malfunction: 3
    • malfunction: 1
  • SCA:
    • Leak-Inherent: 4
    • Physical Probing: 2
    • physical probing: 1
    • side channel: 1
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.CardAccess: 2
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS31: 1
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • FIPS:
    • FIPS 197: 2
  • ISO:
    • ISO/IEC 14443: 4
    • ISO/IEC 7816: 4
  • NIST:
    • NIST SP 800-38A: 1
    • NIST SP 800-67: 1
  • PKCS:
    • PKCS #1: 1
  • CC:
    • CCMB-2006-09-001: 1
    • CCMB-2007-09-002: 1
    • CCMB-2007-09-003: 1
    • CCMB-2007-09-004: 1
  • ICAO:
    • ICAO: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 2
    • the TOE, the product also contain native applications and native modules used by ICAO application (out of scope of the TOE). Mel applications and native modules Native/MEL application: GMF v1.0 The GMF: 1
    • to the context in which the security functions take place. Note that cryptographic primitives are out of scope. Table 16 shows how these security functions satisfy the TOE security functional requirements. 8.1: 1
pdf_data/st_metadata
  • /Author: DMT
  • /CreationDate: D:20170125114905+01'00'
  • /Creator: Microsoft® Word 2013
  • /ModDate: D:20170125114905+01'00'
  • /Producer: Microsoft® Word 2013
  • /Title: DMT
  • pdf_file_size_bytes: 787920
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 25
  • /CreationDate: D:20181113151704+01'00'
  • /Creator: Microsoft® Word 2013
  • /Keywords: Security Target, CC, MULTOS, IDMotion, Platform
  • /ModDate: D:20181219115510+01'00'
  • /Producer: Microsoft® Word 2013
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 2271251
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 75
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different