name |
IDmove v5 on SCR404U in BAC configuration with AA and/or CA in option(OS Commercial Version : 0x098912;OS Unique Identifier : 0xB7BC0108 et E48C0108),(ANSSI-CC-2023/63) |
Produit IAS Classic v5.2.1 with MOC Server v3.1 on MultiApp V5.1 Version 5.2.1.A.C et 5.2.1.A.O ( ANSSI-CC-2023/42 ) |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
FR |
FR |
status |
active |
active |
not_valid_after |
19.01.2029 |
29.09.2028 |
not_valid_before |
19.01.2024 |
29.09.2023 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2023_63fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2023_42fr.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_63fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_42fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_63en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-2023_42en.pdf |
manufacturer |
Idemia |
THALES DIS FRANCE SA |
manufacturer_web |
https://www.idemia.com |
https://www.thalesgroup.com/en/europe/france |
security_level |
ALC_FLR.3, ALC_TAT.3, ADV_TDS.5, ATE_COV.3, ADV_IMP.2, ADV_FSP.3, ALC_CMC.5, ALC_DVS.2, ATE_FUN.2, EAL4+, ADV_INT.3, ATE_DPT.3 |
AVA_VAN.5, ALC_DVS.2, EAL5+ |
dgst |
b66e36c3f01e061e |
5f61ebf23c6ad99d |
heuristics/cert_id |
ANSSI-CC-2023/63 |
ANSSI-CC-2023/42 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_CCL.1, ALC_DEL.1, ALC_CMS.5, ALC_DVS.2, ASE_INT.3, AVA_VAN.5, ALC_CMC.5, ATE_IND.2, ASE_TSS.1, ADV_IMP.2, ADV_ARC.1, ATE_FUN.2, ASE_SPD.1, ASE_REQ.2, ALC_FLR.3, AGD_OPE.1, ATE_COV.3, ALC_TAT.3, ASE_ECD.1, ADV_INT.3, AGD_PRE.1, ADV_TDS.5, ALC_LCD.1, ATE_DPT.3, ASE_OBJ.2, ADV_FSP.3 |
AVA_VAN.5, ALC_DVS.2 |
heuristics/extracted_versions |
2023, 63 |
3.1, 5.1, 5.2.1 |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
ANSSI-CC-2023/37 |
ANSSI-CC-2023/01, ANSSI-CC-2023/31 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
ANSSI-CC-2023/37 |
ANSSI-CC-2023/01, ANSSI-CC-2023/31 |
heuristics/scheme_data |
- cert_id: ANSSI-CC-2023/63
- description: Le produit évalué est « IDmove v5 on SCR404U in BAC configuration with AA and/or CA in option, OS Commercial Version : 0x098912;OS Unique Identifier : 0xB7BC0108 et E48C0108 » développé par IDEMIA. Le produit est de type « carte à puce » pouvant être utilisé en modes avec et sans contact. Il implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisat
- developer: IDEMIA
- enhanced:
- augmented: ADV_IMP.2, ADV_FSP.5, ADV_INT.3, ADV_TDS.5, ALC_CMC.5, ALC_TAT.3, ALC_FLR.3, ALC_DVS.2, ATE_COV.3, ATE_DPT.3, ATE_FUN.2
- category: Cartes à puce
- cc_version: Critères Communs version 3.1r5
- cert_id: ANSSI-CC-2023/63
- cert_link: https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2023_63fr.pdf
- certification_date: 2024-01-19
- developer: IDEMIA
- evaluation_facility: SERMA SAFETY & SECURITY
- expiration_date: 2029-01-19
- level: EAL4+
- mutual_recognition: CCRA SOG-IS
- protection_profile: Machine Readable Travel Document with "ICAO Application", Basic Access Control, version 1.10, certifié BSI-CC-PP-0055-2009 le 25 mars 2009
- report_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_63fr.pdf
- sponsor: IDEMIA
- target_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_63en.pdf
- expiration_date: 2029-01-19
- level: EAL4+
- product: IDmove v5 on SCR404U in BAC configuration with AA and/or CA in option (OS Commercial Version : 0x098912;OS Unique Identifier : 0xB7BC0108 et E48C0108)
- sponsor: IDEMIA
- url: https://cyber.gouv.fr/produits-certifies/idmove-v5-scr404u-bac-configuration-aa-andor-ca-option-os-commercial-version
|
- cert_id: ANSSI-CC-2023/42
- description: Le produit évalué est l’application « IAS Classic v5.2.1 with MOC Server v3.1 on MultiApp V5.1, Versions 5.2.1.A.C et 5.2.1.A.O » développée par THALES DIS FRANCE SAS et embarquée sur le microcontrôleur AQUARIUS_BA_09 fabriqué par THALES DIS. Ce produit est destiné à être utilisé comme dispositif sécurisé de création de signature (SSCD).
- developer: THALES DIS
- enhanced:
- augmented: ALC_DVS.2, AVA_VAN.5
- category: Cartes à puce
- cc_version: Critères Communs version 3.1r5
- cert_id: ANSSI-CC-2023/42
- cert_link: https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2023_42fr.pdf
- certification_date: 2023-09-22
- developer: THALES DIS
- evaluation_facility: CEA - LETI
- expiration_date: 2028-09-22
- level: EAL5+
- mutual_recognition: CCRA SOG-IS
- protection_profile: Protection profiles for secure signature creation device : Part 2: Device with key generation, v2.01, BSI-CC-PP-0059-2009-MA-02 Part 3: Device with key import, v1.0.2, BSI-CC-PP-0075-2012-MA-01 Part 4: Extension for device with key generation and trusted channel to certificate generation application, v1.0.1, BSI-CC-PP-0071-2012-MA-01 Part5: Extension for device with key generation and trusted communication with signature-creation application, v1.0.1, BSI-CC-PP-0072-2012-MA-01 Part 6: Extension for device with key import and trusted channel to signature creation application, v1.0.4, BSI-CC-PP-0076-2013-MA-01
- sponsor: THALES DIS
- expiration_date: 2028-09-22
- level: EAL5+
- product: IAS Classic v5.2.1 with MOC Server v3.1 on MultiApp V5.1 (Versions 5.2.1.A.C et 5.2.1.A.O)
- sponsor: THALES DIS
- url: https://cyber.gouv.fr/produits-certifies/ias-classic-v521-moc-server-v31-multiapp-v51-versions-521ac-et-521ao
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
ANSSI-CC-2023/37 |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
ANSSI-CC-2023/37 |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
Certificat-CC-2023_63fr.pdf |
Certificat-CC-2023_42fr.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0059-2009-MA-02: 1
- BSI-CC-PP-0071-2012-MA-01: 1
- BSI-CC-PP-0072-2012-MA-01: 1
- BSI-CC-PP-0075-2012-MA-01: 1
- BSI-CC-PP-0076-2013-MA-01: 1
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
- ADV:
- ADV_FSP.5: 1
- ADV_IMP.2: 1
- ADV_INT.3: 1
- ADV_TDS.5: 1
- ALC:
- ALC_CMC.5: 1
- ALC_DVS.2: 1
- ALC_FLR.3: 2
- ALC_TAT.3: 1
- ATE:
- ATE_COV.3: 1
- ATE_DPT.3: 1
- ATE_FUN.2: 1
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20240123143841+01'00'
- /Creator: Acrobat PDFMaker 23 pour Word
- /Keywords:
- /ModDate: D:20240123145403+01'00'
- /Producer: Adobe PDF Library 23.1.175
- pdf_file_size_bytes: 158663
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
- /CreationDate: D:20230929173949+02'00'
- /Creator: Acrobat PDFMaker 23 pour Word
- /Keywords:
- /ModDate: D:20230929174206+02'00'
- /Producer: Adobe PDF Library 23.1.175
- pdf_file_size_bytes: 158885
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
ANSSI-CC-2023_63fr.pdf |
ANSSI-CC-2023_42fr.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- FR:
- ANSSI-CC-2023/37: 2
- ANSSI-CC-2023/63: 2
|
- FR:
- ANSSI-CC-2023/01: 2
- ANSSI-CC-2023/31: 3
- ANSSI-CC-2023/42: 2
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0055-2009: 2
- BSI-CC-PP-0090-2016: 1
- BSI-PP-0084-2014: 1
|
- BSI:
- BSI-CC-PP-0059-2009-MA-02: 2
- BSI-CC-PP-0071-2012-MA-01: 2
- BSI-CC-PP-0072-2012-MA-01: 2
- BSI-CC-PP-0075-2012-MA-01: 2
- BSI-CC-PP-0076-2013-MA-01: 2
- other:
- PP-SSCD-: 1
- PP-SSCD-Part2: 2
- PP-SSCD-Part3: 2
- PP-SSCD-Part4: 2
- PP-SSCD-Part5: 2
- PP-SSCD-Part6: 1
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_FSP.5: 1
- ADV_IMP.2: 1
- ADV_INT.3: 1
- ADV_TDS.5: 1
- AGD:
- ALC:
- ALC_CMC.5: 1
- ALC_DVS.2: 1
- ALC_FLR: 1
- ALC_FLR.3: 2
- ALC_TAT.3: 1
- ATE:
- ATE_COV.3: 1
- ATE_DPT.3: 1
- ATE_FUN.2: 1
- AVA:
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- ICAO:
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename |
ANSSI-cible-CC-2023_63en.pdf |
ANSSI-cible-2023_42en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0055: 1
- BSI-CC-PP-0087-V2-2016-: 1
- BSI-CC-PP-0090-2016: 2
- BSI-PP- 0055: 1
- BSI-PP-0002-2001: 1
- BSI-PP-0056: 1
|
- BSI:
- BSI-CC-PP-0059-2009-MA-02: 1
- BSI-CC-PP-0071-2012-MA-01: 1
- BSI-CC-PP-0072-2012-MA-01: 1
- BSI-CC-PP-0075-2012-MA-01: 1
- BSI-CC-PP-0076-2013-MA-01: 1
- BSI-CC-PP-0099-V2-2020: 1
- other:
- PP-SSCD: 4
- PP-SSCD-KG: 37
- PP-SSCD-KI: 28
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL4: 10
- EAL4 augmented: 3
- EAL4+: 6
- EAL5: 6
- EAL5+: 12
|
- EAL:
- EAL 5+: 1
- EAL5: 3
- EAL5 augmented: 1
- EAL5+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 5
- ADV_FSP.1: 2
- ADV_FSP.2: 2
- ADV_FSP.5: 8
- ADV_IMP.1: 1
- ADV_IMP.2: 5
- ADV_INT.2: 2
- ADV_INT.3: 4
- ADV_TDS.1: 2
- ADV_TDS.3: 2
- ADV_TDS.5: 10
- AGD:
- AGD_OPE: 2
- AGD_OPE.1: 5
- AGD_PRE: 7
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.5: 4
- ALC_CMS.5: 3
- ALC_DEL: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 9
- ALC_FLR.3: 4
- ALC_LCD.1: 2
- ALC_SCT: 2
- ALC_STM: 2
- ALC_TAT.1: 2
- ALC_TAT.2: 2
- ALC_TAT.3: 6
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_INT.3: 2
- ASE_OBJ.2: 3
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 2
- ATE_COV.3: 5
- ATE_DPT.1: 1
- ATE_DPT.3: 5
- ATE_FUN.1: 1
- ATE_FUN.2: 6
- ATE_IND.2: 1
- AVA:
- AVA_VAN: 7
- AVA_VAN.3: 3
- AVA_VAN.5: 6
|
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_SAS: 11
- FAU_SAS.1: 13
- FAU_SAS.1.1: 3
- FCS:
- FCS_CKM: 78
- FCS_CKM.1: 28
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 46
- FCS_CKM.4.1: 2
- FCS_COP: 121
- FCS_COP.1: 39
- FCS_RND: 6
- FCS_RND.1: 21
- FCS_RND.1.1: 3
- FDP:
- FDP_ACC: 34
- FDP_ACC.1: 19
- FDP_ACC.1.1: 1
- FDP_ACF: 34
- FDP_ACF.1: 36
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC: 9
- FDP_IFC.1: 9
- FDP_IFF: 10
- FDP_IFF.1: 7
- FDP_ITC: 12
- FDP_ITC.1: 12
- FDP_ITC.2: 4
- FDP_RIP: 6
- FDP_RIP.1: 6
- FDP_UCT: 19
- FDP_UCT.1: 9
- FDP_UCT.1.1: 1
- FDP_UIT: 20
- FDP_UIT.1: 15
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL: 18
- FIA_AFL.1: 12
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_API: 12
- FIA_API.1: 10
- FIA_API.1.1: 1
- FIA_SOS.2: 1
- FIA_UAU: 48
- FIA_UAU.1: 11
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UAU.4: 11
- FIA_UAU.4.1: 2
- FIA_UAU.5: 15
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 9
- FIA_UAU.6.1: 1
- FIA_UID: 6
- FIA_UID.1: 14
- FIA_UID.1.1: 2
- FIA_UID.1.2: 2
- FMT:
- FMT_LIM: 6
- FMT_LIM.1: 17
- FMT_LIM.1.1: 3
- FMT_LIM.2: 16
- FMT_LIM.2.1: 3
- FMT_MOF: 12
- FMT_MOF.1: 6
- FMT_MSA.1: 2
- FMT_MSA.3: 8
- FMT_MTD: 94
- FMT_MTD.1: 42
- FMT_SMF: 6
- FMT_SMF.1: 15
- FMT_SMF.1.1: 2
- FMT_SMR: 8
- FMT_SMR.1: 15
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FPT:
- FPT_EMS: 7
- FPT_EMS.1: 22
- FPT_EMS.1.1: 4
- FPT_EMS.1.2: 4
- FPT_FLS: 5
- FPT_FLS.1: 13
- FPT_FLS.1.1: 2
- FPT_PHP.3: 13
- FPT_PHP.3.1: 2
- FPT_TST: 5
- FPT_TST.1: 12
- FPT_TST.1.1: 2
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 15
- FTP_ITC.1: 16
- FTP_TRP.1: 5
|
- FAU:
- FCO:
- FCS:
- FCS_CKM: 59
- FCS_CKM.1: 10
- FCS_CKM.1.1: 2
- FCS_CKM.2: 3
- FCS_CKM.3: 1
- FCS_CKM.4: 12
- FCS_CKM.4.1: 2
- FCS_COP: 35
- FCS_COP.1: 6
- FCS_COP.1.1: 2
- FCS_RNG: 1
- FCS_RNG.1: 2
- FDP:
- FDP_ACC: 55
- FDP_ACC.1: 27
- FDP_ACC.1.1: 4
- FDP_ACF: 43
- FDP_ACF.1: 9
- FDP_ACF.1.1: 4
- FDP_ACF.1.2: 4
- FDP_ACF.1.3: 4
- FDP_ACF.1.4: 4
- FDP_AFC: 1
- FDP_DAU: 11
- FDP_DAU.1: 1
- FDP_DAU.2.1: 1
- FDP_DAU.2.2: 1
- FDP_IFC: 2
- FDP_IFC.1: 9
- FDP_IFF: 2
- FDP_ITC: 11
- FDP_ITC.1: 9
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.2: 8
- FDP_RIP: 6
- FDP_RIP.1: 17
- FDP_RIP.1.1: 1
- FDP_SDI: 22
- FDP_SDI.1: 2
- FDP_SDI.2: 4
- FDP_UCT: 11
- FDP_UCT.1: 1
- FDP_UIT: 10
- FDP_UIT.1: 2
- FIA:
- FIA_AFL: 20
- FIA_AFL.1: 4
- FIA_API: 5
- FIA_API.1: 14
- FIA_API.1.1: 2
- FIA_ATD: 2
- FIA_UAU: 28
- FIA_UAU.1: 8
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID: 25
- FIA_UID.1: 14
- FIA_USB: 1
- FMT:
- FMT_LIM: 2
- FMT_MOF.1: 9
- FMT_MOF.1.1: 1
- FMT_MSA: 80
- FMT_MSA.1: 10
- FMT_MSA.2: 9
- FMT_MSA.2.1: 1
- FMT_MSA.3: 15
- FMT_MSA.4: 3
- FMT_MTD: 25
- FMT_MTD.1: 3
- FMT_SMF: 6
- FMT_SMF.1: 27
- FMT_SMF.1.1: 1
- FMT_SMR: 7
- FMT_SMR.1: 36
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPT:
- FPT_EMS: 5
- FPT_EMS.1: 14
- FPT_EMS.1.1: 4
- FPT_EMS.1.2: 3
- FPT_FLS: 6
- FPT_FLS.1: 13
- FPT_FLS.1.1: 1
- FPT_PHP.1: 8
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 11
- FPT_PHP.3.1: 1
- FPT_RCV: 2
- FPT_TST: 2
- FPT_TST.1: 14
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 42
- FTP_ITC.1: 16
- FTP_TRP: 1
- FTP_TRP.1: 4
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.C: 5
- A.CAP_FILE: 4
- A.CGA: 3
- A.CSP: 3
- A.O: 5
- A.SCA: 3
- A.VERIFICATION: 4
- O:
- O.ALARM: 1
- O.ARRAY_VIEWS_CONFID: 1
- O.CARD-MANAGEMENT: 1
- O.CIPHER: 1
- O.CONFID-OS-UPDATE: 2
- O.DELETION: 1
- O.FIREWALL: 1
- O.GLOBAL_ARRAYS_CONFID: 1
- O.GLOBAL_ARRAYS_INTEG: 1
- O.INSTALL: 1
- O.KEY-MNGT: 1
- O.LOAD: 1
- O.NATIVE: 1
- O.OBJ-DELETION: 1
- O.OPERATE: 1
- O.PIN-MNGT: 1
- O.REALLOCATION: 1
- O.RESOURCES: 1
- O.RNG: 1
- O.SCP: 3
- O.SECURE_AC_ACTIVATION: 2
- O.SECURE_LOAD_ACODE: 2
- O.SID: 1
- O.TOE_IDENTIFICATION: 1
- O.TRANSACTION: 1
- OE:
- OE.CAP_FILE: 5
- OE.CARD-MANAGEMENT: 1
- OE.CODE-EVIDENCE: 5
- OE.HID_VAD: 3
- OE.PERSONALISATION: 2
- OE.PROT_LOGICAL_DATA: 1
- OE.SCP: 2
- OE.TERMINAL: 2
- OE.USER_OBLIGATIONS: 1
- OE.VERIFICATION: 7
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-224: 1
- SHA-256: 7
- SHA-384: 2
- SHA-512: 1
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 7
- Physical Tampering: 6
- Physical tampering: 1
- fault injection: 1
- malfunction: 6
- physical tampering: 3
- SCA:
- DPA: 2
- SPA: 1
- physical probing: 3
- timing attacks: 1
- other:
|
- FI:
- DFA: 1
- fault induction: 1
- fault injection: 1
- physical tampering: 4
- SCA:
- DPA: 1
- SPA: 1
- timing attacks: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
- EF:
- EF.COM: 13
- EF.DG1: 24
- EF.DG13: 2
- EF.DG14: 5
- EF.DG15: 3
- EF.DG16: 24
- EF.DG2: 8
- EF.DG3: 7
- EF.DG4: 7
- EF.DG5: 7
- EF.SOD: 11
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- FIPS:
- FIPS 180-2: 1
- FIPS 186-5: 1
- FIPS 197: 1
- FIPS 46-3: 1
- FIPS PUB 197: 1
- ICAO:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 18013: 10
- ISO/IEC 7816-4: 1
- ISO/IEC 9797-1: 1
- NIST:
- PKCS:
- RFC:
- SCP:
|
- CC:
- CCMB-2012-04-003: 1
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-004: 1
- FIPS:
- ICAO:
- PKCS:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- by authorized users. The functionalities of IAS Classic 5.2.1 other than the ones from SSCD are out of scope of the TOE perimeter. For BioPIN (MOC Server v3.1.1 application) provides biometry recognition with: 1
- out of scope: 1
|
pdf_data/st_metadata |
- /Author: Nicolas Lokiec
- /CreationDate: D:20231121142741+01'00'
- /Creator: Microsoft® Word pour Microsoft 365
- /Keywords: Security Passport
- /MSIP_Label_4aa92827-4e57-481a-825f-7b85caa0c471_ActionId: b831e952-57f9-4ee0-a39b-cb311aff0e9c
- /MSIP_Label_4aa92827-4e57-481a-825f-7b85caa0c471_ContentBits: 2
- /MSIP_Label_4aa92827-4e57-481a-825f-7b85caa0c471_Enabled: true
- /MSIP_Label_4aa92827-4e57-481a-825f-7b85caa0c471_Method: Privileged
- /MSIP_Label_4aa92827-4e57-481a-825f-7b85caa0c471_Name: Customer Restricted
- /MSIP_Label_4aa92827-4e57-481a-825f-7b85caa0c471_SetDate: 2023-08-10T14:54:27Z
- /MSIP_Label_4aa92827-4e57-481a-825f-7b85caa0c471_SiteId: 7694d41c-5504-43d9-9e40-cb254ad755ec
- /ModDate: D:20231121142741+01'00'
- /Producer: Microsoft® Word pour Microsoft 365
- /Subject: FQR Standard
- /Title: IDmove v5 on SCR404U in BAC configuration with BAC and/or CA in option
- pdf_file_size_bytes: 2358393
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 117
|
- /Author: Emmanuel BACHIMON
- /CreationDate: D:20230504155302+02'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20230504155302+02'00'
- /Producer: Microsoft® Word 2016
- /Title: IAS Classic v5.2 on MultiApp V5.1- Security Target
- pdf_file_size_bytes: 2282348
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 69
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |