| name |
SecurePay Platform V4.9.1 |
Morpho JC ePassport V3.0.0 (EAC) |
| category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme |
MY |
DE |
| status |
active |
archived |
| not_valid_after |
16.06.2026 |
01.09.2019 |
| not_valid_before |
16.06.2021 |
23.10.2012 |
| cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C119-CERTIFICATE-v1.pdf |
|
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C119-CR-v1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0745a_pdf.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SecurePay%20Security%20Target%20v1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0745b_pdf.pdf |
| manufacturer |
SecurePay Sdn. Bhd. |
Morpho B.V. |
| manufacturer_web |
https://www.securepay.my/ |
https://www.morpho.com |
| security_level |
EAL2 |
EAL4+, AVA_VAN.5, ALC_DVS.2 |
| dgst |
b61f25e372177a5d |
2d215ffbbefdb693 |
| heuristics/cert_id |
ISCB-5-RPT-C119-CR-v1 |
BSI-DSZ-CC-0745-2012 |
| heuristics/cert_lab |
[] |
BSI |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 |
ADV_TDS.3, ALC_FLR.3, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, AVA_VAN.5, ASE_INT.1, ALC_CMC.4, ADV_COMP.1, APE_ECD.1, ASE_REQ.2, ASE_COMP.1, AGD_PRE.1, ATE_IND.2, ATE_DPT.1, ASE_ECD.1, APE_OBJ.2, ADV_IMP.1, ALC_LCD.1, ADV_FSP.4, ALC_DVS.2, ASE_SPD.1, ALC_COMP.1, APE_INT.1, ATE_COV.2, ADV_INT.3, ATE_COMP.1, ALC_TAT.1, APE_CCL.1, AVA_COMP.1, AGD_OPE.1, ALC_CMS.4, APE_SPD.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1, ADV_SPM.1, APE_REQ.2 |
| heuristics/extracted_versions |
4.9.1 |
3.0.0 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0746-2012 |
| heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0633-2010, BSI-DSZ-CC-0675-2011, BSI-DSZ-CC-0555-2009 |
| heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-0746-2012 |
| heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0709-2010, BSI-DSZ-CC-0674-2011, BSI-DSZ-CC-0675-2011, BSI-DSZ-CC-0417-2008, BSI-DSZ-CC-0608-2010, BSI-DSZ-CC-0410-2007, BSI-DSZ-CC-0633-2010, BSI-DSZ-CC-0404-2007, BSI-DSZ-CC-0555-2009 |
| heuristics/scheme_data |
- cert_no: 2021-003-C119
- certification_date: 16.06.2021
- developer: SecurePay Sdn. Bhd.
- enhanced:
- assurance_level: EAL2
- category: Other Devices and Systems
- cert_id: C119
- certification_date: 16.06.2021
- developer: A-3A-13, Blok A, Radia Office,Persiaran Arked, Bukit Jelutong,40150 Shah Alam, Selangor Amir Amir Haris Ahmad ([email protected]) https://www.securepay.my/
- expiration_date: 16.06.2026
- mutual_recognition: CCRA
- product: SecurePay Platform V4.9.1
- report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C119/ISCB-5-RPT-C119-CR-v1.pdf
- scope: The TOE is a software platform as a service whilst installed, configured and deployed on an enterprise cloud environment. The TOE is used by corporate, S_M_E_'s_ _or merchants as a secure payment processing platform for their customers. Users also able to perform e-commerce transaction, sending bills, bulk payments, collections and statutory payments. The TOE is connected to various banks which facilitate same day processing, ensure data integrity, reduces processing discrepancies and faster response time. It is simple, robust, user friendly, scalable, secured and available 24x7.Below are the primary features of the TOE: E-Commerce - Users able to use the TOE as an e-commerce portal and conduct business over the internet. Collection - Users able to create bill form and payment form for their customers Payment Processing - The TOE provides a secure payment processing platform and it is connected to various major banks in Malaysia API integration - Third-party developers able to use and access the TOE via API integrations
- status: Valid
- target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C119/SecurePay_Security_Target_v1.0.pdf
- type: Other Devices and Systems
- expiration_date: 16.06.2026
- level: EAL2
- product: SecurePay Platform V4.9.1
- recognition: CCRA
- url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/certified-products-and-systems-5/submission-view/131
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0675-2011, BSI-DSZ-CC-0555-2009 |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0675-2011, BSI-DSZ-CC-0555-2009 |
| heuristics/protection_profiles |
{} |
78bcc246f0f43034 |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056b.pdf |
| pdf_data/cert_filename |
ISCB-5-CERT-C119-CERTIFICATE-v1.pdf |
|
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
- /CreationDate: D:20210702032620Z00'00'
- /Creator: Word
- /ModDate: D:20210702032620Z00'00'
- /Producer: macOS Version 10.15.7 (Build 19H1217) Quartz PDFContext
- pdf_file_size_bytes: 196015
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
| pdf_data/report_filename |
ISCB-5-RPT-C119-CR-v1.pdf |
0745a_pdf.pdf |
| pdf_data/report_frontpage |
|
- DE:
- cert_id: BSI-DSZ-CC-0745-2012
- cert_item: Morpho JC ePassport V3.0.0 (EAC
- cert_lab: BSI
- developer: Morpho B.V
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
| pdf_data/report_keywords/cc_cert_id |
- MY:
- ISCB-5-RPT-C119-CR-v1: 31
|
- DE:
- BSI-DSZ-CC-0555-2009: 3
- BSI-DSZ-CC-0633-2010: 3
- BSI-DSZ-CC-0675-2011: 2
- BSI-DSZ-CC-0745-2012: 22
- BSI-DSZ-CC-S-0004-2010: 1
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 4: 6
- EAL 4 augmented: 3
- EAL 5: 3
- EAL1: 7
- EAL2: 3
- EAL3: 4
- EAL4: 7
- EAL5: 7
- EAL5+: 1
- EAL6: 4
- EAL7: 4
- ITSEC:
|
| pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 2
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 2
- ALC_CMS.5: 1
- ALC_DEL: 1
- ALC_DEL.1: 2
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 7
- ALC_FLR: 1
- ALC_FLR.1: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 2
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 2
- ALC_TAT.2: 1
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 1
- ATE_DPT.4: 1
- ATE_FUN: 3
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 3
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 4
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 6
|
| pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 2
- FAU_SAR.1: 3
- FDP:
- FDP_ACC.1: 2
- FDP_ACF.1: 2
- FIA:
- FIA_ATD.1: 2
- FIA_SOS.1: 2
- FIA_UAU.1: 2
- FIA_UAU.2: 2
- FIA_UAU.6: 2
- FMT:
- FMT_MSA.1: 2
- FMT_MSA.3: 1
- FMT_MTD.1: 2
- FMT_SMF.1: 2
- FMT_SMR.1: 2
- FTP:
|
|
| pdf_data/report_keywords/cc_claims |
- A:
- A.CLOUD: 1
- A.NOEVIL: 1
- A.NOTRST: 1
- A.TIMESTAMP: 1
|
|
| pdf_data/report_keywords/vendor |
|
- Morpho:
- NXP:
- NXP: 10
- NXP Semiconductors: 2
|
| pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 3
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 23: 1
- BSI 7125: 2
- BSI 7148: 1
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- ISO:
- ISO/IEC 18045: 2
- ISO/IEC15408: 2
|
- BSI:
- AIS 20: 2
- AIS 25: 2
- AIS 26: 2
- AIS 32: 1
- AIS 34: 3
- AIS 35: 3
- AIS 36: 2
- AIS 38: 2
- FIPS:
- FIPS 180-2: 3
- FIPS 46-3: 1
- ICAO:
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- 12.2011, Morpho B.V. (confidential document) [11] Preparative Procedures for the Morpho JC ePassport version 3.0.0, document version 0.1.1, 11: 1
- ETR), Version 2, 06.03.2011, Morpho JC ePassport version 3.0.0, TÜV Informationstechnik GmbH (confidential document) [10] Configuration List, Scope for the Morpho JC ePassport version 3.0.0, document version 0.1.2: 1
- Security Target for Morpho JC ePassport version 3.0.0, Morpho B.V., Version 0.1.1, 11.11.2011 (confidential document) [7] Machine Readable Travel Document with "ICAO Application" Extended Access Control, Version 1.10: 1
|
| pdf_data/report_metadata |
- /CreationDate: D:20210624100326Z00'00'
- /Creator: Word
- /ModDate: D:20210624100326Z00'00'
- /Producer: macOS Version 10.15.7 (Build 19H524) Quartz PDFContext
- pdf_file_size_bytes: 952717
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 32
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20121113102955+01'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, MRTD, EAC, Extended Access Control, Morpho"
- /ModDate: D:20121113110257+01'00'
- /Producer: LibreOffice 3.5
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0745-2012
- pdf_file_size_bytes: 1013680
- pdf_hyperlinks: https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung
- pdf_is_encrypted: False
- pdf_number_of_pages: 38
|
| pdf_data/st_filename |
SecurePay Security Target v1.0.pdf |
0745b_pdf.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0555-: 1
- BSI-DSZ-CC-0555-2009: 1
- BSI-DSZ-CC-0633: 2
- BSI-DSZ-CC-0675-2011: 2
- BSI-DSZ-CC-0745: 2
- BSI-DSZ-CC-0746: 1
- NL:
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 1
- EAL 4 augmented: 1
- EAL4: 3
- EAL4 augmented: 2
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ASE:
- ASE_CCL.1: 2
- ASE_ECD.1: 1
- ASE_INT.1: 2
- ASE_OBJ.2: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 2
- ASE_TSS.1: 4
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_COMP.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_SPM.1: 2
- ADV_TDS.3: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_COMP.1: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 5
- ALC_LCD: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_COMP.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COMP.1: 1
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_COMP.1: 1
- AVA_VAN.3: 1
- AVA_VAN.5: 5
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 6
- FAU_GEN.1.1: 1
- FAU_SAR.1: 5
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FDP:
- FDP_ACC.1: 14
- FDP_ACC.1.1: 1
- FDP_ACF.1: 8
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FDP_IFF: 2
- FIA:
- FIA_ATD.1: 7
- FIA_ATD.1.1: 1
- FIA_SOS.1: 6
- FIA_SOS.1.1: 1
- FIA_UAU.1: 7
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.2: 5
- FIA_UAU.2.1: 1
- FIA_UAU.6: 5
- FIA_UAU.6.1: 1
- FIA_UID.1: 6
- FIA_UID.2: 9
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA.1: 8
- FMT_MSA.1.1: 1
- FMT_MSA.3: 9
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 6
- FMT_MTD.1.1: 1
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR.1: 11
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FTP:
- FTP_TRP.1: 5
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_GEN: 1
- FAU_SAS: 7
- FAU_SAS.1: 7
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 4
- FCS_CKM.1: 10
- FCS_CKM.2: 2
- FCS_CKM.4: 11
- FCS_COP: 15
- FCS_COP.1: 9
- FCS_RND: 8
- FCS_RND.1: 10
- FCS_RND.1.1: 1
- FDP:
- FDP_ACC.1: 7
- FDP_ACC.1.1: 1
- FDP_ACF: 1
- FDP_ACF.1: 5
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FDP_ITC.1: 6
- FDP_ITC.2: 6
- FDP_UCT.1: 5
- FDP_UCT.1.1: 1
- FDP_UIT.1: 5
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_API: 11
- FIA_API.1: 5
- FIA_API.1.1: 1
- FIA_SOS.2: 1
- FIA_UAU: 2
- FIA_UAU.1: 4
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 7
- FIA_UAU.4.1: 1
- FIA_UAU.5: 9
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 9
- FIA_UAU.6.1: 1
- FIA_UID.1: 6
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_LIM: 8
- FMT_LIM.1: 14
- FMT_LIM.1.1: 2
- FMT_LIM.2: 13
- FMT_LIM.2.1: 2
- FMT_MSA.2: 8
- FMT_MSA.3: 1
- FMT_MTD: 19
- FMT_MTD.1: 9
- FMT_MTD.3: 3
- FMT_MTD.3.1: 1
- FMT_SMF.1: 13
- FMT_SMF.1.1: 1
- FMT_SMR.1: 16
- FMT_SMR.1.1: 4
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 4
- FPT_FLS.1.1: 1
- FPT_PHP.3: 5
- FPT_PHP.3.1: 1
- FPT_TST: 1
- FPT_TST.1: 4
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC.1: 2
- FTP_TRP.1: 2
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.CLOUD: 3
- A.NOEVIL: 3
- A.NOTRST: 2
- A.TIMESTAMP: 3
- O:
- O.ACC_CONTROL: 1
- O.ACC_CTRL: 4
- O.AUDREC: 3
- O.AUTH: 4
- O.MANAGE: 4
- O.PASSWORD: 3
- O.TOECOM: 4
- OE:
- OE.ADMIN: 2
- OE.AUTHDATA: 4
- OE.CLOUD: 2
- OE.TIMESTAMP: 3
- T:
- T.AUDREC: 3
- T.NOMGMT: 2
- T.PSWD_CRACKING: 2
- T.UNAUTH: 3
- T.WEB_ATTACK: 3
|
- OE:
- OE.BAC-PP: 1
- OE.BAC_PP: 1
- OE.MRTD_: 1
|
| pdf_data/st_keywords/vendor |
- Microsoft:
- STMicroelectronics:
|
|
| pdf_data/st_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 1
- TÜViT: 1
|
| pdf_data/st_keywords/symmetric_crypto |
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 1
- Physical Tampering: 2
- Physical tampering: 1
- fault injection: 1
- malfunction: 7
- physical tampering: 2
- SCA:
- DPA: 2
- SPA: 1
- physical probing: 2
- timing attacks: 1
- other:
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.COM: 6
- EF.DG1: 13
- EF.DG14: 4
- EF.DG15: 4
- EF.DG16: 13
- EF.DG2: 6
- EF.DG3: 12
- EF.DG4: 11
- EF.DG5: 4
- EF.SOD: 6
|
| pdf_data/st_keywords/standard_id |
|
- BSI:
- FIPS:
- FIPS 180-220: 1
- FIPS 46-3: 1
- FIPS46: 2
- ICAO:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816-4: 1
- RFC:
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
|
| pdf_data/st_metadata |
|
- /Author: Morpho bv
- /CreationDate: D:20111206163011+01'00'
- /Creator: PDFCreator Version 1.0.1
- /Keywords: ASE, ASE-Lite, ST, ST-Lite, BSI-DSZ-CC-0745, BAC, EAC, ePassport, ePass, MRTD, Machine Readable Travel Documents, CC, EAL4+, ECC, Terminal Authentication, Chip Authentication, Active Authentication, AA
- /ModDate: D:20111206163011+01'00'
- /Producer: GPL Ghostscript 8.71
- /Subject: Security Target Lite for the Morpho JC ePassport 3.0.0
- /Title: 8929-8135-112 Morpho JC ePassport 3.0.0-J3A081R3 - ASE-Lite EAC V1.0.0
- pdf_file_size_bytes: 445425
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 84
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
True |
False |
| state/cert/download_ok |
True |
False |
| state/cert/extract_ok |
True |
False |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |