name |
Carte IAS ECC v1.0.1 sur ID-One Cosmo v7.0.1-a : applet (version 3124) masquée sur ID-One Cosmo V7.0.1-a (composant Inside Secure) en configuration Standard et Basic avec correctif 075243 |
Plateforme Java Card MAV31S en configuration ouverte de la carte à puce Optelio Contactless R7S masquée sur le composant P60D144JVA (version du patch: 1.4) |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
FR |
FR |
status |
archived |
archived |
not_valid_after |
01.09.2019 |
31.08.2020 |
not_valid_before |
12.06.2012 |
31.08.2015 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2012-10fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015-30en.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2012-10en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi_cible_2015_30_LITE.pdf |
manufacturer |
Oberthur Technologies / Inside Secure |
Gemalto / NXP Semiconductors |
manufacturer_web |
https://www.oberthur.com |
https://www.gemalto.com/ |
security_level |
AVA_VAN.5, ALC_DVS.2, EAL4+, ATE_DPT.2 |
AVA_VAN.5, ALC_DVS.2, EAL4+ |
dgst |
ba3947289ae4b518 |
585fe7142c257928 |
heuristics/cert_id |
ANSSI-CC-2012/10 |
ANSSI-CC-2015/30 |
heuristics/cert_lab |
THALES |
SERMA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_FSP.2, AGD_PRE.1, ADV_ARC.1, ATE_FUN.1, ALC_DVS.2, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AVA_VAN.5, ATE_DPT.2 |
ATE_FUN.1, ADV_IMP.1, ASE_TSS.2, AVA_VLA.5, AGD_PRE.1, ALC_DVS.2, AVA_VAN.5, ATE_COV.2, ALC_TAT.2, ADV_INT.2, ALC_CMC.4, ADV_FSP.5, ADV_ARC.1, ALC_DEL.1, ATE_DPT.1, AGD_OPE.1, ALC_LCD.1, ADV_TDS.4, ATE_IND.2 |
heuristics/extracted_versions |
7.0.1, 1.0.1 |
1.4 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2015/38 |
heuristics/report_references/directly_referencing |
ANSSI-CC-2010/39, ANSSI-CC-2009/46, ANSSI-CC-2011/01, ANSSI-CC-2010/38, ANSSI-CC-2010/36, ANSSI-CC-2009/47, ANSSI-CC-2010/40, ANSSI-CC-2010/37, ANSSI-CC-2010/58 |
ANSSI-CC-2014/86, BSI-DSZ-CC-0870-2014 |
heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2015/38 |
heuristics/report_references/indirectly_referencing |
ANSSI-CC-2010/39, BSI-DSZ-CC-0555-2009, ANSSI-CC-2009/46, BSI-DSZ-CC-0421-2008, ANSSI-CC-2011/01, BSI-DSZ-CC-0410-2007, ANSSI-CC-2010/38, ANSSI-CC-2010/36, ANSSI-CC-2009/36, BSI-DSZ-CC-0404-2007, ANSSI-CC-2009/11, ANSSI-CC-2009/47, ANSSI-CC-2010/40, BSI-DSZ-CC-0411-2007, ANSSI-CC-2010/37, ANSSI-CC-2010/58, ANSSI-CC-2009/48 |
ANSSI-CC-2014/86, BSI-DSZ-CC-0837-2013, BSI-DSZ-CC-0829-2012, ANSSI-CC-2014/06, BSI-DSZ-CC-0870-2014, BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0640-2010 |
heuristics/scheme_data |
- cert_id: ANSSI-CC-2012/10
- description: Le produit certifié est la « Carte IAS ECC v1.0.1 sur ID-One Cosmo v7.0.1-a : applet (version 3124) masquée sur ID-One Cosmo V7.0.1-a (composant Inside Secure) en configuration Standard et Basic avec correctif 075243 ». L'applet, la plateforme et le correctif sont développés par Oberthur Technologies, le composant est développé par Inside Secure. La cible d'évaluation (TOE : Target Of
- developer: Oberthur Technologies et Inside Secure
- enhanced:
- level: EAL4+
- product: Carte IAS ECC v1.0.1 sur ID-One Cosmo v7.0.1-a
- sponsor: Oberthur Technologies
- url: https://cyber.gouv.fr/produits-certifies/carte-ias-ecc-v101-sur-id-one-cosmo-v701
|
- cert_id: ANSSI-CC-2015/30
- description: La certificationporte sur la plateforme ouverte Java Card du produit « MultiApp v3.1S » qui est une carte à puce pouvant être en mode contact ou sans contact. Le produit est développé par la société GEMALTO et embarqué sur le microcontrôleur P60D144JVA fabriqué par la société NXP SEMICONDUCTORS. La plateforme ouverte Java Card est destinée à fournir des services de sécurité aux applets qui ser
- developer: Gemalto / NXP Semiconductors
- enhanced:
- level: EAL4+
- product: Plateforme Java Card MAV31S en configuration ouverte de la carte à puce Optelio Contactless R7S masquée sur le composant P60D144JVA
- sponsor: Gemalto
- url: https://cyber.gouv.fr/produits-certifies/plateforme-java-card-mav31s-en-configuration-ouverte-de-la-carte-puce-optelio
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
ANSSI-CC-2011/01 |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
BSI-DSZ-CC-0421-2008, ANSSI-CC-2011/01, ANSSI-CC-2009/11 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
ANSSI-CC_2012-10fr.pdf |
ANSSI-CC-2015-30en.pdf |
pdf_data/report_frontpage |
- FR:
- cc_security_level: EAL 4 augmenté ALC_DVS.2, ATE_DPT.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 3
- cert_id: ANSSI-CC-2012/10
- cert_item: Carte IAS ECC v1.0.1 sur ID-One Cosmo v7.0.1-a : applet (version 3124) masquée sur ID-One Cosmo V7.0.1-a (composant Inside Secure) en configuration Standard et Basic avec correctif 075243
- cert_item_version: Version applet 3124 Version correctif 075243
- cert_lab: THALES (TCS – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France
- developer: Oberthur Technologies 50 quai Michelet 92300 Levallois-Perret, France Inside Secure Maxwell Building – Scottish Enterprise Technology Park - East Kilbride – Glasgow G75 0QF - Ecosse Commanditaire Oberthur Technologies 50 quai Michelet 92300 Levallois-Perret, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: BSI-PP-0005-2002] : SSCD Type 2, version 1.04 [BSI-PP-0006-2002] : SSCD Type 3, version 1.05
|
- FR:
- cc_security_level: EAL 4 augmented ALC_DVS.2, AVA_VAN.5
- cc_version: Common Criteria version 3.1 revision 4
- cert_id: ANSSI-CC-2015/30
- cert_item: Plateforme Java Card MAV31S en configuration ouverte de la carte à puce Optelio Contactless R7S masquée sur le composant P60D144JVA
- cert_item_version: Version de la plateforme Java Card MultiApp : 3.1S Version du patch : 1.4
- cert_lab: Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
- developer: Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France NXP Semiconductors Box 54 02 40, D-22502 Hambourg, Allemagne Sponsor Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France
- match_rules: ['Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developer\\(s\\)(.+)Evaluation facility(.+)Recognition arrangements']
- ref_protection_profiles: ANSSI-CC-PP-2010/03-M01 [PP JCS] Java Card System – Open Configuration, version 3.0
|
pdf_data/report_keywords/cc_cert_id |
- FR:
- ANSSI-CC-2009_46: 1
- ANSSI-CC-2009_47: 1
- ANSSI-CC-2010_36: 2
- ANSSI-CC-2010_37: 1
- ANSSI-CC-2010_38: 2
- ANSSI-CC-2010_39: 1
- ANSSI-CC-2010_40: 1
- ANSSI-CC-2010_58: 1
- ANSSI-CC-2011_01: 7
- ANSSI-CC-2012/10: 22
|
- DE:
- FR:
- ANSSI-CC-2014/86: 2
- ANSSI-CC-2015/30: 20
- ANSSI-CC-PP-2010/03-M01: 2
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-PP- 0005-2002: 1
- BSI-PP- 0006-2002: 2
- BSI-PP-0005-2002: 3
- BSI-PP-0006-2002: 2
|
- ANSSI:
- ANSSI-CC-PP-2010/03-M01: 2
- BSI:
- BSI-PP- 0035-2007: 2
- BSI-PP-0035-2007: 1
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 2
- EAL 5: 1
- EAL 7: 1
- EAL4: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 2
- EAL 4 augmented: 2
- EAL 5: 1
- EAL 7: 1
- EAL4: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_IMP.2: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_FLR: 1
- ALC_LCD: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_DPT.2: 2
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.5: 3
- AVA_VLA.5: 1
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
- NXP:
- Oberthur:
- Oberthur Technologies: 12
|
- Gemalto:
- NXP:
- NXP: 2
- NXP Semiconductors: 1
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- SCP:
- SCP01: 2
- SCP02: 2
- SCP03: 2
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
- com:
- com.gemalto.javacardx.pace: 1
- javacardx:
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20120614094916+02'00'
- /Creator: PScript5.dll Version 5.2
- /ModDate: D:20120618193817+02'00'
- /Producer: Acrobat Distiller 8.1.0 (Windows)
- /Title:
- pdf_file_size_bytes: 200609
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 21
|
- /Author: romme
- /CreationDate: D:20151109154046+01'00'
- /Creator: Microsoft® Word 2010
- /Keywords: ANSSI-CC-CER-F-07EN.008
- /ModDate: D:20151109154046+01'00'
- /Producer: Microsoft® Word 2010
- /Subject: Plateforme Java Card MultiApp ID V3.1S en configuration ouverte de la carte à puce Optelio Contactless R7S masquée sur le composant P60D144JVA
- /Title: ANSSI-CC-2015/30
- pdf_file_size_bytes: 529824
- pdf_hyperlinks: mailto:[email protected], http://www.ssi.gouv.fr/
- pdf_is_encrypted: False
- pdf_number_of_pages: 19
|
pdf_data/st_filename |
ANSSI-CC-cible_2012-10en.pdf |
anssi_cible_2015_30_LITE.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-PP-0005-2002: 1
- BSI-PP-0006-2002: 1
|
- BSI:
- BSI-CC-PP-0059-2009-MA-01: 1
- BSI-CC-PP-0075-2012: 1
- BSI-PP-0035: 1
- other:
- PP-SSCD-KG: 2
- PP-SSCD-KI: 2
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 4+: 2
- EAL4: 5
- EAL4 augmented: 3
- EAL4+: 1
|
- EAL:
- EAL 5+: 1
- EAL4: 5
- EAL4 augmented: 2
- EAL4+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 2
- ADV_FSP: 1
- ADV_FSP.2: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- ADV_TDS.3: 2
- AGD:
- AGD_OPE: 10
- AGD_OPE.1: 1
- AGD_PRE: 17
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 2
- ALC_DVS.2: 7
- ALC_FLR: 1
- ALC_LCD: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_DPT.2: 6
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_IND: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 8
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 2
- ADV_FSP.4: 5
- ADV_FSP.5: 1
- ADV_IMP: 1
- ADV_IMP.1: 7
- ADV_INT.2: 1
- ADV_TDS: 1
- ADV_TDS.1: 2
- ADV_TDS.3: 6
- ADV_TDS.4: 4
- AGD:
- AGD_OPE.1: 7
- AGD_PRE.1: 6
- ALC:
- ALC_CMC.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 2
- ALC_DVS.2: 7
- ALC_LCD.1: 3
- ALC_TAT.1: 3
- ALC_TAT.2: 2
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 2
- ATE_DPT.1: 3
- ATE_FUN.1: 6
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_CKM.1: 5
- FCS_CKM.2: 2
- FCS_CKM.3: 2
- FCS_CKM.4: 4
- FCS_CKM.4.1: 6
- FCS_COP: 1
- FCS_COP.1: 50
- FCS_RNG: 6
- FCS_RNG.1: 5
- FCS_RNG.1.1: 4
- FCS_RNG.1.2: 4
- FDP:
- FDP_ACC: 2
- FDP_ACC.1: 10
- FDP_ACF: 1
- FDP_ACF.1: 28
- FDP_ETC: 1
- FDP_ETC.1: 6
- FDP_ITC: 1
- FDP_ITC.1: 9
- FDP_RIP: 1
- FDP_RIP.1.1: 3
- FDP_SDI: 1
- FDP_SDI.2: 4
- FDP_UCT: 1
- FDP_UCT.1: 5
- FDP_UIT: 1
- FDP_UIT.1: 14
- FIA:
- FIA_AFL: 2
- FIA_AFL.1.1: 1
- FIA_ATD: 1
- FIA_UAU: 1
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID: 1
- FIA_UID.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MOF: 2
- FMT_MOF.1.1: 1
- FMT_MSA: 1
- FMT_MSA.1: 6
- FMT_MSA.2.1: 1
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 5
- FMT_MTD.1: 5
- FMT_SMF: 1
- FMT_SMF.1: 1
- FMT_SMF.1.1: 1
- FMT_SMR: 1
- FMT_SMR.1.1: 1
- FPT:
- FPT_AMT: 1
- FPT_FLS: 1
- FPT_FLS.1.1: 1
- FPT_PHP: 1
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3.1: 1
- FPT_TEE: 2
- FPT_TST: 1
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 8
- FTP_ITC.1: 27
- FTP_ITC.1.3: 2
- FTP_TRP: 4
- FTP_TRP.1: 7
|
- FAU:
- FAU_ARP.1: 14
- FAU_ARP.1.1: 1
- FAU_SAA.1: 2
- FCO:
- FCS:
- FCS_CKM.1: 20
- FCS_CKM.1.1: 1
- FCS_CKM.2: 7
- FCS_CKM.2.1: 1
- FCS_CKM.3: 6
- FCS_CKM.3.1: 1
- FCS_CKM.4: 14
- FCS_CKM.4.1: 1
- FCS_COP.1: 18
- FCS_COP.1.1: 1
- FCS_RND: 7
- FCS_RND.1: 11
- FCS_RND.1.1: 2
- FCS_RNG.1: 1
- FDP:
- FDP_ACC: 37
- FDP_ACC.1: 13
- FDP_ACC.2: 6
- FDP_ACF: 30
- FDP_ACF.1: 16
- FDP_IFC: 22
- FDP_IFC.1: 12
- FDP_IFC.2: 2
- FDP_IFF: 15
- FDP_IFF.1: 12
- FDP_ITC: 11
- FDP_ITC.1: 4
- FDP_ITC.2: 9
- FDP_RIP: 77
- FDP_RIP.1: 10
- FDP_ROL: 13
- FDP_ROL.1: 2
- FDP_SDI.2: 8
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UIT: 6
- FDP_UIT.1: 2
- FIA:
- FIA_ATD: 8
- FIA_ATD.1: 2
- FIA_SOS.2: 1
- FIA_UAI.1: 1
- FIA_UAU: 6
- FIA_UAU.1: 1
- FIA_UID: 12
- FIA_UID.1: 10
- FIA_UID.2: 1
- FIA_USB: 7
- FIA_USB.1: 3
- FMT:
- FMT_MSA: 80
- FMT_MSA.1: 11
- FMT_MSA.2: 1
- FMT_MSA.3: 15
- FMT_MTD: 16
- FMT_MTD.1: 3
- FMT_MTD.3: 1
- FMT_SMF: 30
- FMT_SMF.1: 9
- FMT_SMR: 43
- FMT_SMR.1: 22
- FPR:
- FPR_UNO: 6
- FPR_UNO.1: 9
- FPR_UNO.1.1: 1
- FPT:
- FPT_FLS: 41
- FPT_FLS.1: 5
- FPT_ITT: 6
- FPT_ITT.1: 1
- FPT_PHP: 6
- FPT_PHP.3: 2
- FPT_RCV: 14
- FPT_RCV.3: 4
- FPT_RCV.4: 2
- FPT_TDC.1: 8
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST: 6
- FPT_TST.1: 3
- FTP:
- FTP_ITC: 8
- FTP_ITC.1: 5
- FTP_TRP.1: 2
|
pdf_data/st_keywords/cc_claims |
- A:
- D:
- D.APPLI: 1
- D.AUTH_CRYPTOGRAM: 1
- D.AUTH_KEYS: 7
- D.DTBS: 1
- D.EPHEMERAL_KEYS: 4
- D.ESERVICES_KEYS: 1
- D.IDENTIFICATION_DATA: 1
- D.RAD: 1
- D.SCD: 1
- D.SCD_ID: 1
- D.SM_DATA: 1
- D.STATE: 2
- D.SVD: 1
- D.TOE_AUTH_PRIVATE_KEYS: 1
- D.TOE_AUTH_PUBLIC_KEYS: 1
- OE:
|
- A:
- A.APPLET: 5
- A.DELETION: 5
- A.VERIFICATION: 4
- D:
- D.API_DATA: 3
- D.APP_CODE: 6
- D.APP_C_DATA: 3
- D.APP_I_DATA: 4
- D.CRYPTO: 5
- D.JCS_CODE: 3
- D.JCS_DATA: 5
- D.PIN: 4
- D.SEC_DATA: 7
- O:
- O.ALARM: 15
- O.APPLET: 28
- O.CARD-MANAGEMENT: 2
- O.CARD_MANAGEMENT: 18
- O.CIPHER: 10
- O.CODE_PCKG: 16
- O.CODE_PKG: 7
- O.DELETION: 8
- O.FIREWALL: 12
- O.GLOBAL_ARRAYS_CO: 3
- O.GLOBAL_ARRAYS_CONFID: 6
- O.GLOBAL_ARRAYS_INT: 3
- O.GLOBAL_ARRAYS_INTEG: 5
- O.HW_AES: 2
- O.INSTALL: 11
- O.JAVAOBJECT: 56
- O.KEY-: 1
- O.KEY-MNGT: 5
- O.KEY_MNGT: 4
- O.LOAD: 6
- O.NATIVE: 11
- O.OBJ-DELETION: 4
- O.OPERATE: 15
- O.PIN-: 1
- O.PIN-MNGT: 5
- O.REALLOCATION: 5
- O.RESOURCES: 9
- O.RND: 12
- O.SCP: 30
- O.SID: 13
- O.TRANSACTION: 6
- OE:
- OE.APPLET: 4
- OE.CODE-EVIDENCE: 10
- OE.CODE_EVIDENCE: 1
- OE.VERIFICATION: 25
- OP:
- OP.ARRAY_ACCESS: 6
- OP.CREATE: 10
- OP.DELETE_APPLET: 6
- OP.DELETE_PCKG: 4
- OP.DELETE_PCKG_APPLET: 4
- OP.INSTANCE_FIELD: 6
- OP.INVK_INTERFACE: 10
- OP.INVK_VIRTUAL: 8
- OP.JAVA: 8
- OP.PUT: 7
- OP.THROW: 7
- OP.TYPE_ACCESS: 7
- OSP:
- OSP: 1
- OSP.RND: 3
- OSP.RNG: 1
- OSP.VERIFICATION: 4
- R:
- T:
- T.CONFID-APPLI-DATA: 4
- T.CONFID-JCS-CODE: 4
- T.CONFID-JCS-DATA: 4
- T.DELETION: 3
- T.EXE-CODE: 8
- T.INSTALL: 4
- T.INTEG-APPLI-CODE: 7
- T.INTEG-APPLI-DATA: 8
- T.INTEG-JCS-CODE: 3
- T.INTEG-JCS-DATA: 4
- T.NATIVE: 4
- T.OBJ-DELETION: 4
- T.PHYSICAL: 4
- T.RESOURCES: 3
- T.SID: 8
|
pdf_data/st_keywords/vendor |
- Oberthur:
- OBERTHUR: 8
- Oberthur Technologies: 5
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- TDEA: 1
- TDES: 9
- Triple-DES: 2
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 3
- SHA-256: 4
- SHA-384: 4
- SHA-512: 3
- SHA224: 1
|
pdf_data/st_keywords/crypto_scheme |
- KA:
- Key Agreement: 6
- Key agreement: 1
- MAC:
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- SCA:
- DPA: 1
- SPA: 1
- Side channel: 1
- timing attacks: 1
|
- FI:
- Malfunction: 3
- fault induction: 2
- malfunction: 2
- physical tampering: 1
- SCA:
- DPA: 1
- Leak-Inherent: 3
- physical probing: 2
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- BSI:
- FIPS:
- FIPS 140-2: 5
- FIPS PUB 180-2: 1
- FIPS180-2: 1
- PKCS:
- PKCS #1: 6
- PKCS#1: 4
- PKCS#15: 3
- PKCS#3: 6
- SCP:
|
- BSI:
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- FIPS:
- NIST:
- PKCS:
- PKCS#1: 8
- PKCS#3: 1
- PKCS#5: 5
- SCP:
- SCP01: 3
- SCP02: 3
- SCP03: 3
|
pdf_data/st_keywords/javacard_version |
|
- JavaCard:
- JC2.2.2: 1
- Java Card 2.2.2: 7
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
- out of scope: 1
|
pdf_data/st_metadata |
- /CreationDate: D:20111123224431+02'00'
- /Creator: PDFCreator Version 0.8.1
- /ModDate: D:20120618193841+02'00'
- /Producer: AFPL Ghostscript 8.50
- /Title:
- pdf_file_size_bytes: 907567
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 113
|
- /Author: Antoine de Lavernette
- /CreationDate: D:20150723151408+02'00'
- /Creator: Microsoft® Office Word 2007
- /Keywords: Security Target, CC
- /ModDate: D:20150723151408+02'00'
- /Producer: Microsoft® Office Word 2007
- /Subject: Security Target
- /Title: eTravel v1.0 Security Target MAÏA3
- pdf_file_size_bytes: 1419745
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 93
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |