name |
IDmove v5 on SCR404U in PACE configuration with AA and/or CA in optionOS Commercial Version : 0x098912 ; OS Unique Identifier : 0xB7BC0108 et E48C0108 (ANSSI-CC-2023/66) |
IAS Classic V4.4.2 with MOC Server 1.1 on MultiApp V4.1 version IAS : 4.4.2.A, version MOC Server : 1.1.1A (ANSSI-CC-2023/57 ) |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
FR |
FR |
status |
active |
active |
not_valid_after |
19.01.2029 |
09.02.2029 |
not_valid_before |
19.01.2024 |
09.02.2024 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2023_66fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2023_57fr.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_66fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_57fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_66en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_57en.pdf |
manufacturer |
Idemia |
THALES DIS FRANCE SA |
manufacturer_web |
https://www.idemia.com |
https://www.thalesgroup.com/en/europe/france |
security_level |
ALC_DVS.2, EAL5+, ALC_CMC.5, ADV_INT.3, ATE_COV.3, ATE_FUN.2, ADV_TDS.5, AVA_VAN.5, ADV_IMP.2 |
AVA_VAN.5, ALC_DVS.2, EAL5+ |
dgst |
b26b4f91a5d3f44b |
cecfb5207379a342 |
heuristics/cert_id |
ANSSI-CC-2023/66 |
ANSSI-CC-2023/57 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_CMC.5, ALC_CMS.5, ASE_ECD.1, ATE_DPT.3, ASE_TSS.1, ADV_IMP.2, ATE_FUN.2, AGD_PRE.1, ASE_CCL.1, ALC_DVS.2, ADV_INT.3, AVA_VAN.5, ASE_SPD.1, ASE_OBJ.2, ASE_REQ.2, ADV_FSP.5, ASE_INT.3, ADV_ARC.1, ALC_FLR.3, ADV_TDS.5, ALC_DEL.1, ATE_COV.3, AGD_OPE.1, ALC_LCD.1, ATE_IND.2, ALC_TAT.3 |
ALC_DVS.2, AVA_VAN.5 |
heuristics/extracted_versions |
66, 2023 |
4.1, 1.1.1, 1.1, 4.4.2 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
ANSSI-CC-2023/37 |
ANSSI-CC-2023/30, ANSSI-CC-2023/20 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
ANSSI-CC-2023/37 |
ANSSI-CC-2023/30, ANSSI-CC-2023/20 |
heuristics/scheme_data |
- cert_id: ANSSI-CC-2023/66
- description: Le produit évalué est « IDmove v5 on SCR404U in PACE configuration with AA and/or CA in option, OS Commercial Version : 0x098912;OS Unique Identifier : 0xB7BC0108 et E48C0108 » développé par IDEMIA. Le produit est de type « carte à puce » pouvant être utilisé en modes avec et sans contact. Il implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisa
- developer: IDEMIA
- enhanced:
- augmented: ADV_IMP.2, ADV_INT.3, ADV_TDS.5, ALC_CMC.5, ALC_TAT.3, ALC_FLR.3, ALC_DVS.2, ATE_COV.3, ATE_FUN.2, AVA_VAN.5
- category: Cartes à puce
- cc_version: Critères Communs version 3.1r5
- cert_id: ANSSI-CC-2023/66
- cert_link: https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2023_66fr.pdf
- certification_date: 19.01.2024
- developer: IDEMIA
- evaluation_facility: SERMA SAFETY & SECURITY
- expiration_date: 19.01.2029
- level: EAL5+
- mutual_recognition: CCRA SOG-IS
- protection_profile: Machine Readable Travel Document using Standard Inspection Procedure with PACE, version 1.01, certifié BSI-CC-PP-0068-V2-2011-MA-01 le 22 juillet 2014
- report_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_66fr.pdf
- sponsor: IDEMIA
- target_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_66en.pdf
- expiration_date: 19.01.2029
- level: EAL5+
- product: IDmove v5 on SCR404U in PACE configuration with AA and/or CA in option OS Commercial Version : 0x098912 ; OS Unique Identifier : 0xB7BC0108 et E48C0108
- sponsor: IDEMIA
- url: https://cyber.gouv.fr/produits-certifies/idmove-v5-scr404u-pace-configuration-aa-andor-ca-option-os-commercial-version
|
- cert_id: ANSSI-CC-2023/57
- description: Le produit évalué est la « IAS Classic V4.4.2 with MOC Server 1.1 on MultiApp V4.1, version IAS 4.4.2.A, version MOC Server 1.1.1A » développé par THALES DIS FRANCE SAS. Ce produit est destiné à être utilisé comme dispositif sécurisé de création de signature (SSCD1).
- developer: THALES DIS FRANCE SAS
- enhanced:
- augmented: ALC_DVS.2, AVA_VAN.5
- category: Cartes à puce
- cc_version: Critères Communs version 3.1r5
- cert_id: ANSSI-CC-2023/57
- cert_link: https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2023_57fr.pdf
- certification_date: 09.02.2024
- developer: THALES DIS FRANCE SAS
- evaluation_facility: SERMA SAFETY & SECURITY
- expiration_date: 09.02.2029
- level: EAL5+
- mutual_recognition: CCRA SOG-IS
- protection_profile: Protection profiles for secure signature creation device: Part 2 : Device with key generation, v2.0.1, BSI-CC-PP-0059-2009-MA-02 ; Part 3 : Device with key import, v1.0.2, BSI-CC-PP-0075-2012-MA-01 ; Part 4 : Extension for device with key generation and trusted communication with certificate generation application, v1.0.1, BSI-CC-PP-0071-2012-MA-01 ; Part 5 : Extension for device with key generation and trusted communication with signature creation application, v1.0.1, BSI-CC-PP-0072-2012-MA-01 ; Part 6 : Extension for device with key import and trusted communication with signature creation application, v1.0.4, BSI-CC-PP-0076-2013-MA-01.
- report_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_57fr.pdf
- sponsor: THALES DIS FRANCE SAS
- target_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_57en.pdf
- expiration_date: 09.02.2029
- level: EAL5+
- product: IAS Classic V4.4.2 with MOC Server 1.1 on MultiApp V4.1 version IAS : 4.4.2.A, version MOC Server : 1.1.1A
- sponsor: THALES DIS FRANCE SAS
- url: https://cyber.gouv.fr/produits-certifies/ias-classic-v442-moc-server-11-multiapp-v41-version-ias-442a-version-moc-server
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
ANSSI-CC-2023/37 |
ANSSI-CC-2023/20 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
ANSSI-CC-2023/37 |
ANSSI-CC-2023/20 |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
Certificat-CC-2023_66fr.pdf |
Certificat-CC-2023_57fr.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0068-V2-2011-MA-01: 1
|
- BSI:
- BSI-CC-PP-0059-2009-MA-02: 1
- BSI-CC-PP-0071-2012-MA-01: 1
- BSI-CC-PP-0072-2012-MA-01: 1
- BSI-CC-PP-0075-2012-MA-01: 1
- BSI-CC-PP-0076-2013-MA-01: 1
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
- ADV:
- ADV_IMP.2: 1
- ADV_INT.3: 1
- ADV_TDS.5: 1
- ALC:
- ALC_CMC.5: 1
- ALC_DVS.2: 1
- ALC_FLR.3: 2
- ALC_TAT.3: 1
- ATE:
- ATE_COV.3: 1
- ATE_FUN.2: 1
- AVA:
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20240123145400+01'00'
- /Creator: Acrobat PDFMaker 23 pour Word
- /Keywords:
- /ModDate: D:20240123145400+01'00'
- /Producer: Adobe PDF Library 23.1.175
- pdf_file_size_bytes: 158762
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
- /Author:
- /Category:
- /Comments: ANSSI-CC-CER-F-14_v14.8
- /Company: SGDSN
- /CreationDate: D:20240215115407+01'00'
- /Creator: Acrobat PDFMaker 23 pour Word
- /Keywords: version x.x, révision x
- /ModDate: D:20240215115408+01'00'
- /Producer: Adobe PDF Library 23.1.175
- /SourceModified: D:20240215105356
- /Title: ANSSI-CC-2023/57
- pdf_file_size_bytes: 122264
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
ANSSI-CC-2023_66fr.pdf |
ANSSI-CC-2023_57fr.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- FR:
- ANSSI-CC-2023/37: 2
- ANSSI-CC-2023/66: 2
|
- FR:
- ANSSI-CC-2023/20: 1
- ANSSI-CC-2023/30: 1
- ANSSI-CC-2023/57: 2
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0068-V2-2011-MA-01: 2
- BSI-CC-PP-0090-2016: 1
- BSI-PP-0084-2014: 1
|
- BSI:
- BSI-CC-PP-0059-2009-MA-02: 2
- BSI-CC-PP-0071-2012-MA-01: 2
- BSI-CC-PP-0072-2012-MA-01: 2
- BSI-CC-PP-0075-2012-MA-01: 2
- BSI-CC-PP-0076-2013-MA-01: 2
- BSI-PP-0084-2014: 1
- other:
- PP-SSCD-Part2: 2
- PP-SSCD-Part3: 2
- PP-SSCD-Part4: 2
- PP-SSCD-Part5: 2
- PP-SSCD-Part6: 1
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_IMP.2: 1
- ADV_INT.3: 1
- ADV_TDS.5: 1
- AGD:
- ALC:
- ALC_CMC.5: 1
- ALC_DVS.2: 1
- ALC_FLR: 1
- ALC_FLR.3: 2
- ALC_TAT.3: 1
- ATE:
- ATE_COV.3: 1
- ATE_FUN.2: 1
- AVA:
|
- AGD:
- AGD_CPS: 2
- AGD_OPE: 1
- AGD_USE: 1
- ALC:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- ICAO:
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- SCP:
- SCP01: 1
- SCP02: 1
- SCP03: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename |
ANSSI-cible-CC-2023_66en.pdf |
ANSSI-cible-CC-2023_57en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0056-V2-: 1
- BSI-CC-PP-0068-V2-2011-MA-01: 2
- BSI-CC-PP-0086: 1
- BSI-CC-PP-0087-: 1
- BSI-CC-PP-0090-2016: 2
- BSI-PP-0056: 1
- BSI-PP-0084-2014: 1
|
- BSI:
- BSI-CC-PP-0059-2009-MA-02: 1
- BSI-CC-PP-0071-2012-MA-01: 1
- BSI-CC-PP-0072-2012-MA-01: 1
- BSI-CC-PP-0075-2012-MA-01: 1
- BSI-CC-PP-0076-2013-MA-01: 1
- BSI-CC-PP-0084-2014: 1
- other:
- PP-SSCD: 6
- PP-SSCD-: 1
- PP-SSCD-KG: 41
- PP-SSCD-KI: 30
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL4: 3
- EAL4 augmented: 2
- EAL5: 7
- EAL5 augmented: 1
|
- EAL:
- EAL 5+: 1
- EAL5: 3
- EAL5 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 6
- ADV_FSP.1: 2
- ADV_FSP.2: 2
- ADV_FSP.4: 1
- ADV_FSP.5: 4
- ADV_IMP.1: 2
- ADV_IMP.2: 6
- ADV_INT.3: 5
- ADV_TDS.1: 2
- ADV_TDS.3: 3
- ADV_TDS.5: 9
- AGD:
- AGD_OPE: 2
- AGD_OPE.1: 6
- AGD_PRE: 7
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.5: 5
- ALC_CMS.5: 1
- ALC_DEL: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 10
- ALC_FLR.3: 5
- ALC_LCD.1: 2
- ALC_STM: 2
- ALC_TAT.1: 2
- ALC_TAT.3: 7
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_INT.3: 2
- ASE_OBJ.2: 3
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 2
- ATE_COV.3: 6
- ATE_DPT.1: 2
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 7
- ATE_IND.2: 1
- AVA:
- AVA_VAN.3: 1
- AVA_VAN.5: 9
|
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_SAS: 11
- FAU_SAS.1: 13
- FAU_SAS.1.1: 3
- FCS:
- FCS_CKM: 82
- FCS_CKM.1: 23
- FCS_CKM.2: 2
- FCS_CKM.4: 38
- FCS_CKM.4.1: 2
- FCS_COP: 88
- FCS_COP.1: 36
- FCS_RND: 6
- FCS_RND.1: 16
- FCS_RND.1.1: 3
- FDP:
- FDP_ACC: 30
- FDP_ACC.1: 21
- FDP_ACF: 33
- FDP_ACF.1: 39
- FDP_ACF.1.2: 1
- FDP_IFC: 9
- FDP_IFC.1: 9
- FDP_IFF: 10
- FDP_IFF.1: 7
- FDP_ITC: 8
- FDP_ITC.1: 12
- FDP_ITC.2: 4
- FDP_RIP: 6
- FDP_RIP.1: 14
- FDP_RIP.1.1: 2
- FDP_UCT: 12
- FDP_UCT.1: 9
- FDP_UIT: 12
- FDP_UIT.1: 16
- FIA:
- FIA_AFL: 22
- FIA_AFL.1: 17
- FIA_API: 18
- FIA_API.1: 12
- FIA_API.1.1: 1
- FIA_SOS.2: 1
- FIA_UAU: 65
- FIA_UAU.1: 16
- FIA_UAU.4: 7
- FIA_UAU.5: 11
- FIA_UAU.6: 9
- FIA_UID: 17
- FIA_UID.1: 21
- FMT:
- FMT_LIM: 6
- FMT_LIM.1: 18
- FMT_LIM.1.1: 3
- FMT_LIM.2: 17
- FMT_LIM.2.1: 3
- FMT_MOF: 9
- FMT_MOF.1: 6
- FMT_MSA.1: 2
- FMT_MSA.3: 8
- FMT_MTD: 115
- FMT_MTD.1: 34
- FMT_SMF: 6
- FMT_SMF.1: 19
- FMT_SMF.1.1: 2
- FMT_SMR: 20
- FMT_SMR.1: 13
- FPT:
- FPT_EMS: 7
- FPT_EMS.1: 17
- FPT_EMS.1.1: 4
- FPT_EMS.1.2: 4
- FPT_FLS: 5
- FPT_FLS.1: 9
- FPT_FLS.1.1: 2
- FPT_PHP.3: 9
- FPT_PHP.3.1: 2
- FPT_TST: 5
- FPT_TST.1: 12
- FPT_TST.1.1: 2
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 17
- FTP_ITC.1: 30
- FTP_TRP.1: 4
|
- FCS:
- FCS_CKM: 47
- FCS_CKM.1: 13
- FCS_CKM.1.1: 2
- FCS_CKM.2: 4
- FCS_CKM.4: 12
- FCS_CKM.4.1: 2
- FCS_COP: 26
- FCS_COP.1: 6
- FCS_COP.1.1: 2
- FDP:
- FDP_ACC: 44
- FDP_ACC.1: 28
- FDP_ACC.1.1: 4
- FDP_ACF: 32
- FDP_ACF.1: 10
- FDP_ACF.1.1: 4
- FDP_ACF.1.2: 4
- FDP_ACF.1.3: 4
- FDP_ACF.1.4: 4
- FDP_AFC: 1
- FDP_DAU: 10
- FDP_DAU.1: 1
- FDP_DAU.2.1: 1
- FDP_DAU.2.2: 1
- FDP_IFC.1: 18
- FDP_ITC: 11
- FDP_ITC.1: 8
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 8
- FDP_RIP: 2
- FDP_RIP.1: 7
- FDP_RIP.1.1: 1
- FDP_SDI: 17
- FDP_SDI.1: 2
- FDP_SDI.2.1: 2
- FDP_SDI.2.2: 2
- FDP_UCT: 9
- FDP_UCT.1.1: 1
- FDP_UIT: 9
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL: 17
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_API: 5
- FIA_API.1: 14
- FIA_API.1.1: 2
- FIA_UAU: 20
- FIA_UAU.1: 7
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UID: 20
- FIA_UID.1: 10
- FIA_UID.1.1: 2
- FIA_UID.1.2: 2
- FMT:
- FMT_MOF.1: 9
- FMT_MOF.1.1: 1
- FMT_MSA: 62
- FMT_MSA.1: 7
- FMT_MSA.1.1: 3
- FMT_MSA.2: 9
- FMT_MSA.2.1: 1
- FMT_MSA.3: 12
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MSA.4: 3
- FMT_MSA.4.1: 2
- FMT_MTD: 16
- FMT_MTD.1: 1
- FMT_MTD.1.1: 2
- FMT_SMF.1: 26
- FMT_SMF.1.1: 1
- FMT_SMR.1: 36
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS: 5
- FPT_EMS.1: 13
- FPT_EMS.1.1: 4
- FPT_EMS.1.2: 3
- FPT_FLS.1: 9
- FPT_FLS.1.1: 1
- FPT_PHP.1: 8
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 9
- FPT_PHP.3.1: 1
- FPT_TST: 2
- FPT_TST.1: 11
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ICT: 2
- FTP_ITC: 38
- FTP_ITC.1: 4
- FTP_ITC.1.1: 4
- FTP_ITC.1.2: 4
- FTP_ITC.1.3: 4
- FTP_TRP.1: 4
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.APPLET: 2
- A.CGA: 3
- A.CSP: 4
- A.SCA: 3
- A.VERIFICATION: 2
- OE:
- OE.APPLET: 1
- OE.CODE-EVIDENCE: 1
- OE.HID_VAD: 1
- OE.HI_VAD: 2
- OE.VERIFICATION: 4
|
pdf_data/st_keywords/vendor |
|
- Gemalto:
- Samsung:
- Thales:
- Thales: 12
- Thales Group: 62
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-256: 8
- SHA-384: 2
- SHA-512: 2
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 7
- Physical Tampering: 6
- Physical tampering: 2
- fault injection: 1
- malfunction: 7
- physical tampering: 2
- SCA:
- DPA: 2
- SPA: 1
- physical probing: 3
- timing attacks: 1
- other:
|
- FI:
- DFA: 1
- Malfunction: 1
- fault injection: 1
- physical tampering: 4
- SCA:
- DPA: 1
- Leak-Inherent: 1
- SPA: 1
- timing attacks: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
- EF:
- EF.COM: 8
- EF.DG1: 6
- EF.DG14: 3
- EF.DG15: 3
- EF.DG16: 5
- EF.DG2: 4
- EF.DG3: 2
- EF.DG4: 2
- EF.DG5: 2
- EF.SOD: 7
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- FIPS:
- FIPS 180-2: 1
- FIPS 186-5: 1
- FIPS 197: 1
- FIPS 46-3: 1
- FIPS PUB 197: 1
- ICAO:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 18013: 6
- ISO/IEC 7816-4: 1
- ISO/IEC 9797-1: 1
- NIST:
- PKCS:
- RFC:
- SCP:
|
- CC:
- CCMB-2012-04-003: 1
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-004: 1
- FIPS:
- PKCS:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- by authorized users. The functionalities of IAS Classic V4.4.2 other than the ones from SSCD are out of scope of the TOE perimeter. MOC Server application provides biometric authentication of the signatory: 1
- out of scope: 1
|
pdf_data/st_metadata |
- /Author: Nicolas LOKIEC
- /CreationDate: D:20231121142312+01'00'
- /Creator: Microsoft® Word pour Microsoft 365
- /Keywords: Security Passport
- /MSIP_Label_4aa92827-4e57-481a-825f-7b85caa0c471_ActionId: 62ed3b39-a12c-4fbf-bcf1-99f24164d887
- /MSIP_Label_4aa92827-4e57-481a-825f-7b85caa0c471_ContentBits: 2
- /MSIP_Label_4aa92827-4e57-481a-825f-7b85caa0c471_Enabled: true
- /MSIP_Label_4aa92827-4e57-481a-825f-7b85caa0c471_Method: Privileged
- /MSIP_Label_4aa92827-4e57-481a-825f-7b85caa0c471_Name: Customer Restricted
- /MSIP_Label_4aa92827-4e57-481a-825f-7b85caa0c471_SetDate: 2023-08-10T14:49:02Z
- /MSIP_Label_4aa92827-4e57-481a-825f-7b85caa0c471_SiteId: 7694d41c-5504-43d9-9e40-cb254ad755ec
- /ModDate: D:20231121142312+01'00'
- /Producer: Microsoft® Word pour Microsoft 365
- /Subject: FQR 110 A0BE
- /Title: IDmove v5 on SCR404U in PACE configuration with AA and/or CA in option
- pdf_file_size_bytes: 2250377
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 124
|
- /Author: D1418852
- /CreationDate: D:20230928155442+02'00'
- /Creator: Microsoft® Word for Microsoft 365
- /Keywords: 16-03-2018
- /ModDate: D:20230928155442+02'00'
- /Producer: Microsoft® Word for Microsoft 365
- /Subject: 1.1
- /Title: MultiApp V4.1: IAS EN Core & Extensions Security Target
- pdf_file_size_bytes: 1252729
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 62
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |