Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Plateforme J-Safe, en configuration fermée, version 2.11.0, sur le composant SB23YR80B
ANSSI-CC-2015/16
Application eTravel EAC v2.1, en configuration BAC, sur la plateforme ouverte ou fermée MultiApp V3.1 masquée sur le composant P60D144PVA (version du patch: 1.3)
ANSSI-CC-2015/40
name Plateforme J-Safe, en configuration fermée, version 2.11.0, sur le composant SB23YR80B Application eTravel EAC v2.1, en configuration BAC, sur la plateforme ouverte ou fermée MultiApp V3.1 masquée sur le composant P60D144PVA (version du patch: 1.3)
not_valid_before 2015-05-15 2015-10-02
not_valid_after 2020-05-15 2020-10-02
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_16_Cible.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi_cible_2015-40_LITE.pdf
manufacturer Incard Division / ST Microelectronics Gemalto / NXP Semiconductors
manufacturer_web None https://www.gemalto.com/
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_16.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_40.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Java Card System Protection Profile - Closed Configuration version 3.0', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/ANSSI-CC-profil_PP-2010-07en.pdf', 'pp_ids': frozenset({'ANSSI-CC-PP-2010-07-M01'})}) frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': "Protection Profile for Machine Readable Travel Document with 'ICAO Application', Basic Acce...", 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0055b.pdf', 'pp_ids': None})
maintenance_updates frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2016, 5, 20), 'maintenance_title': 'ANSSI-CC-2015/40-M01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_40-M01.pdf', 'maintenance_st_link': None})
state/report/pdf_hash b3cb628bfac0a4bce8c004064c9f41c07d14e3f0153073a9f62e56b6d9ca3207 7514df63afdc4f81c3a47e6f0332b19ba5e3d4d6ebfd6e52535dd6848cb460c6
state/report/txt_hash 5035b7914b7ed978e1ea32111a7492b11f34256e133ad436c1f3097101f76943 963998600c3d84b495b438630aca667d9152df319948074290e0d263f792c47a
state/st/pdf_hash 36c06e10735fe312f02299921740c4a902dff2d83c7340b00c62baca0cf9fb90 0bc0f0e7eec957d3550274d6696bfeec177492fc643e607151b3a744d1c584f7
state/st/txt_hash 59d15b2ee5c2ba904009f029a07f27abd7c67a347f8a2b32e4d374d6f48dcfeb 39ce60d8a82386e24d40bb02b5289ca8b43d4c4b8a3b7792b5acd6844806e002
heuristics/cert_id ANSSI-CC-2015/16 ANSSI-CC-2015/40
heuristics/extracted_versions 2.11.0 2.1, 3.1, 1.3
heuristics/report_references/directly_referenced_by ANSSI-CC-2015/17 None
heuristics/report_references/directly_referencing ANSSI-CC-2012/68 ANSSI-CC-2015/15, BSI-DSZ-CC-0845-V2-2013
heuristics/report_references/indirectly_referenced_by ANSSI-CC-2015/17 None
heuristics/report_references/indirectly_referencing ANSSI-CC-2010/01, ANSSI-CC-2009/50, ANSSI-CC-2009/62, ANSSI-CC-2009/26, ANSSI-CC-2009/06, ANSSI-CC-2010/02, ANSSI-CC-2012/68, ANSSI-CC-2009/05, ANSSI-CC-2009/51, ANSSI-CC-2009/28 BSI-DSZ-CC-0837-2013, ANSSI-CC-2015/15, BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0666-2012, BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0640-2010, ANSSI-CC-2014/06, BSI-DSZ-CC-0845-2012, ANSSI-CC-2014/86, BSI-DSZ-CC-0845-V2-2013
heuristics/scheme_data/cert_id 2015/16 2015/40
heuristics/scheme_data/description Le produit certifié est la « Plateforme J-Safe, en configuration fermée, version 2.11.0, sur lecomposant SB23YR80B » développée par STMicroelectronics S.r.l. – Incard Division et STMicroelectronics. La plateforme est une carte à puce offrant les modes contact, sans contact et duaux. Elle est en configuration fermée, elle ne correspond donc pas un produit utilisable en tant que tel. Elle estn Le produit certifé est la carte à puce ouverte ou fermée« MultiApp v3.1 », pouvant être en mode contact ou sans contact. Le produit est développé par la société GEMALTO et embarqué sur le microcontrôleur P60D144PVA fabriqué par la société NXP SEMICONDUCTORS. Le produit implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisation de l’aviation civ
heuristics/scheme_data/developer STMicroelectronics S.r.l. - Incard Division / STMicroelectronics Gemalto / NXP Semiconductors
heuristics/scheme_data/enhanced/augmented ALC_DVS.2, AVA_VAN.5 ALC_DVS.2
heuristics/scheme_data/enhanced/cc_version Critères Communs version 3.1r3 Critères Communs version 3.1r4
heuristics/scheme_data/enhanced/cert_id 2015/16 2015/40
heuristics/scheme_data/enhanced/certification_date 15/05/2015 02/10/2015
heuristics/scheme_data/enhanced/developer STMicroelectronics S.r.l. - Incard Division / STMicroelectronics Gemalto / NXP Semiconductors
heuristics/scheme_data/enhanced/level EAL5+ EAL4+
heuristics/scheme_data/enhanced/mutual_recognition SOG-IS CCRA
heuristics/scheme_data/enhanced/protection_profile PP JCS PP BAC
heuristics/scheme_data/enhanced/report_link https://cyber.gouv.fr/sites/default/files/2015/05/ANSSI-CC-2015_16.pdf https://cyber.gouv.fr/sites/default/files/2015/10/ANSSI-CC-2015_40.pdf
heuristics/scheme_data/enhanced/sponsor STMicroelectronics S.r.l. - Incard Division Gemalto
heuristics/scheme_data/enhanced/target_link https://cyber.gouv.fr/sites/default/files/2015/05/ANSSI-CC-2015_16_Cible.pdf https://cyber.gouv.fr/sites/default/files/2015/10/anssi_cible_2015-40_LITE.pdf
heuristics/scheme_data/level EAL5+ EAL4+
heuristics/scheme_data/product Plateforme J-Safe, en configuration fermée, version 2.11.0, sur le composant SB23YR80B Application eTravel EAC v2.1, en configuration BAC, sur la plateforme ouverte ou fermée MultiApp V3.1 masquée sur le composant P60D144PVA
heuristics/scheme_data/sponsor STMicroelectronics S.r.l. - Incard Division Gemalto
heuristics/scheme_data/url https://cyber.gouv.fr/produits-certifies/plateforme-j-safe-en-configuration-fermee-version-2110-sur-le-composant https://cyber.gouv.fr/produits-certifies/application-etravel-eac-v21-en-configuration-bac-sur-la-plateforme-ouverte-ou
heuristics/st_references/directly_referencing ANSSI-CC-2012/68 BSI-DSZ-CC-0845-V2-2013
heuristics/st_references/indirectly_referencing ANSSI-CC-2012/68 BSI-DSZ-CC-0845-V2-2013
pdf_data/report_filename ANSSI-CC-2015_16.pdf ANSSI-CC-2015_40.pdf
pdf_data/report_frontpage/FR/cc_security_level EAL 5 augmenté ALC_DVS.2, AVA_VAN.5 EAL 4 augmenté ALC_DVS.2
pdf_data/report_frontpage/FR/cc_version Critères Communs version 3.1 révision 3 Critères Communs version 3.1 révision 4
pdf_data/report_frontpage/FR/cert_id ANSSI-CC-2015/16 ANSSI-CC-2015/40
pdf_data/report_frontpage/FR/cert_item Plateforme J-Safe, en configuration fermée, version 2.11.0, sur le composant SB23YR80B Application eTravel EAC v2.1, en configuration BAC, sur la plateforme ouverte ou fermée MultiApp V3.1 masquée sur le composant P60D144PVA
pdf_data/report_frontpage/FR/cert_item_version Version 2.11.0 Version de l’application eTravel EAC : 2.1 Version de la plateforme Java Card MultiApp : 3.1 Version du patch : 1.3
pdf_data/report_frontpage/FR/developer STMicroelectronics S.r.l. – Incard Division Z.I Marcianise Sud, 81025 Marcianise, Italie STMicroelectronics 29 Boulevard Romain Rolland, 75669 Paris Cedex 14, France Commanditaire STMicroelectronics S.r.l. – Incard Division Z.I Marcianise Sud, 81025 Marcianise, Italie Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France NXP Semiconductors Box 54 02 40, D-22502 Hambourg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France
pdf_data/report_frontpage/FR/ref_protection_profiles PP JCS] Java Card protection profile – closed configuration, version 3.0 BSI-CC-PP-0055, [PP BAC], version 1.10 Machine Readable Travel Document with ICAO application, Basic Access Control
pdf_data/report_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2015/16: 16
    • ANSSI-CC-2012/68: 2
    • ANSSI-CC-2012/68-S02: 1
  • DE:
    • BSI-DSZ-CC-0845-V2-2013: 3
  • FR:
    • ANSSI-CC-2015/40: 22
    • ANSSI-CC-2015/15: 3
pdf_data/report_keywords/cc_cert_id/FR
  • ANSSI-CC-2015/16: 16
  • ANSSI-CC-2012/68: 2
  • ANSSI-CC-2012/68-S02: 1
  • ANSSI-CC-2015/40: 22
  • ANSSI-CC-2015/15: 3
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0035-2007: 1
  • ANSSI:
    • ANSSI-CC-PP-: 1
    • ANSSI-CC-PP-2010/07-M01: 1
  • BSI:
    • BSI-CC-PP-0055: 1
    • BSI-PP-0035-2007: 2
    • BSI-CC-PP-0055-2009: 1
    • BSI-PP-0035-: 1
pdf_data/report_keywords/cc_protection_profile_id/BSI
  • BSI-PP-0035-2007: 1
  • BSI-CC-PP-0055: 1
  • BSI-PP-0035-2007: 2
  • BSI-CC-PP-0055-2009: 1
  • BSI-PP-0035-: 1
pdf_data/report_keywords/cc_protection_profile_id/BSI/BSI-PP-0035-2007 1 2
pdf_data/report_keywords/cc_sar/AGD/AGD_OPE 1 2
pdf_data/report_keywords/cc_sar/AGD/AGD_PRE 1 3
pdf_data/report_keywords/cc_sar/ASE
  • ASE_CCL: 1
  • ASE_ECD: 1
  • ASE_INT: 1
  • ASE_OBJ: 1
  • ASE_REQ: 1
  • ASE_SPD: 1
  • ASE_TSS: 1
  • ASE_TSS.2: 1
  • ASE_CCL: 1
  • ASE_ECD: 1
  • ASE_INT: 1
  • ASE_OBJ: 1
  • ASE_REQ: 1
  • ASE_SPD: 1
  • ASE_TSS: 1
pdf_data/report_keywords/cc_sar/AVA
  • AVA_VAN.5: 4
  • AVA_VAN: 2
  • AVA_VAN: 2
  • AVA_VAN.3: 2
pdf_data/report_keywords/cc_security_level/EAL
  • EAL 5: 3
  • EAL4: 2
  • EAL6: 1
  • EAL7: 1
  • EAL 1: 1
  • EAL 3: 1
  • EAL 7: 1
  • EAL 4: 2
  • EAL4: 2
  • EAL6: 1
  • EAL7: 1
  • EAL 1: 1
  • EAL 3: 1
  • EAL 5: 1
  • EAL 7: 1
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 3 1
pdf_data/report_keywords/eval_facility/Serma/Serma Technologies 1 3
pdf_data/report_keywords/standard_id
  • ICAO:
    • ICAO: 3
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
pdf_data/report_keywords/vendor
  • STMicroelectronics:
    • STMicroelectronics: 6
  • NXP:
    • NXP Semiconductors: 3
    • NXP: 3
  • Gemalto:
    • Gemalto: 27
pdf_data/report_metadata//Author Administrateur
pdf_data/report_metadata//CreationDate D:20150522134001+02'00'
pdf_data/report_metadata//Creator Microsoft® Word 2010 PDFCreator Version 1.2.1
pdf_data/report_metadata//Keywords ANSSI-CC-CER-F-07.016
pdf_data/report_metadata//ModDate D:20150522134001+02'00'
pdf_data/report_metadata//Producer Microsoft® Word 2010 GPL Ghostscript 9.02
pdf_data/report_metadata//Subject Plateforme J-Safe, en configuration fermée, version 2.11.0, sur le composant SB23YR80B
pdf_data/report_metadata//Title ANSSI-CC-2015/16 Rapport ANSSI-CC-2015_40
pdf_data/report_metadata/pdf_file_size_bytes 579179 289332
pdf_data/report_metadata/pdf_hyperlinks http://www.ssi.gouv.fr/, mailto:[email protected]
pdf_data/report_metadata/pdf_number_of_pages 15 21
pdf_data/st_filename ANSSI-CC-2015_16_Cible.pdf anssi_cible_2015-40_LITE.pdf
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 1
  • FF:
    • DH:
      • Diffie-Hellman: 5
    • DSA:
      • DSA: 1
  • RSA:
    • RSA 1024: 1
  • ECC:
    • ECDSA:
      • ECDSA: 2
    • ECC:
      • ECC: 1
  • FF:
    • DH:
      • Diffie-Hellman: 2
      • DH: 1
pdf_data/st_keywords/asymmetric_crypto/ECC
  • ECDSA:
    • ECDSA: 1
  • ECDSA:
    • ECDSA: 2
  • ECC:
    • ECC: 1
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA 1 2
pdf_data/st_keywords/asymmetric_crypto/FF
  • DH:
    • Diffie-Hellman: 5
  • DSA:
    • DSA: 1
  • DH:
    • Diffie-Hellman: 2
    • DH: 1
pdf_data/st_keywords/asymmetric_crypto/FF/DH
  • Diffie-Hellman: 5
  • Diffie-Hellman: 2
  • DH: 1
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman 5 2
pdf_data/st_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2012/68: 2
  • DE:
    • BSI-DSZ-CC-0845: 1
    • BSI-DSZ-CC-0845-V2-2013: 1
  • NL:
    • CC-1: 2
    • CC-2: 5
    • CC-3: 3
pdf_data/st_keywords/cc_claims
  • D:
    • D.APP_CODE: 6
    • D.APP_C_DATA: 3
    • D.APP_I_DATA: 4
    • D.PIN: 9
    • D.API_DATA: 3
    • D.CRYPTO: 6
    • D.JCS_CODE: 4
    • D.JCS_DATA: 6
    • D.SEC_DATA: 5
    • D.EMBEDDED_SW_CODE: 4
    • D.EMBEDDED_SW_DATA: 4
    • D.GP_CODE: 3
    • D.GP_SENSITIVE_DATA: 3
  • O:
    • O.SCP: 65
    • O.SIDE_CHANNEL: 10
    • O.LIFE_CYCLE: 12
    • O.RND: 1
    • O.CIPHER: 40
    • O.SID: 25
    • O.GLOBAL_ARRAYS_CONFID: 15
    • O.NATIVE: 12
    • O.REALLOCATION: 9
    • O.KEY_MNGT: 1
    • O.TRANSACTION: 16
    • O.OPERATE: 34
    • O.ROLES: 7
    • O.FIREWALL: 26
    • O.GLOBAL_ARRAYS_INTEG: 8
    • O.RESOURCES: 9
    • O.ALARM: 21
    • O.KEY-MNGT: 15
    • O.PIN-MNGT: 13
    • O.OBJ-DELETION: 6
    • O.APPLET: 1
    • O.JAVAOBJECT: 20
    • O.GP_REGISTRY: 10
    • O.JAVA: 3
    • O.JAVAOB: 2
    • O.OBJ-DEL: 1
  • T:
    • T.LIFE_CYCLE: 7
    • T.PHYSICAL: 9
    • T.CONFID-APPLI-DATA: 17
    • T.CONFID-JCS-CODE: 6
    • T.CONFID-JCS-DATA: 11
    • T.INTEG-APPLI-CODE: 10
    • T.INTEG-APPLI-DATA: 21
    • T.INTEG-JCS-CODE: 6
    • T.INTEG-JCS-DATA: 10
    • T.SID: 16
    • T.EXE-CODE: 9
    • T.NATIVE: 4
    • T.RESOURCES: 7
    • T.OBJ-DELETION: 4
    • T.LEAKAGE: 1
    • T.INTEG-: 1
  • A:
    • A.XXX: 1
    • A.VERIFICATION: 4
    • A.NO-INSTALL: 5
    • A.NO-DELETION: 5
  • R:
    • R.JAVA: 5
  • OP:
    • OP.ARRAY_ACCESS: 4
    • OP.CREATE: 7
    • OP.INSTANCE_FIELD: 4
    • OP.INVK_VIRTUAL: 6
    • OP.INVK_INTERFACE: 7
    • OP.JAVA: 5
    • OP.THROW: 5
    • OP.TYPE_ACCESS: 5
    • OP.PUT: 6
    • OP.MANAGE_APP_LIFE_CYC: 1
    • OP.GET_CARD_LIFE_CYCLE_: 1
    • OP.CARD_LOCK: 4
    • OP.CARD_TERMINATE: 4
    • OP.MANAGE_APP_LIFE_CYCLE_STATE: 3
    • OP.GET_CARD_LIFE_CYCLE_STATE: 2
  • OE:
    • OE.SCP: 3
    • OE.NO-DELETION: 6
    • OE.VERIFICATION: 32
    • OE.CARD_MANAGEMENT: 16
    • OE.NO-INSTALL: 5
    • OE.MANAGEMENT_OF_SECRETS: 3
    • OE.CARD-MANAGEMENT: 12
  • OSP:
    • OSP.CARD_ADMINISTRATION_DISABLED: 5
    • OSP.MANAGEMENT_OF_SECRETS: 6
    • OSP.ROLES: 5
    • OSP.VERIFICATION: 5
  • OT:
    • OT.AC: 1
  • OE:
    • OE.MRTD_: 3
    • OE.BAC_PP: 1
pdf_data/st_keywords/cc_claims/OE
  • OE.SCP: 3
  • OE.NO-DELETION: 6
  • OE.VERIFICATION: 32
  • OE.CARD_MANAGEMENT: 16
  • OE.NO-INSTALL: 5
  • OE.MANAGEMENT_OF_SECRETS: 3
  • OE.CARD-MANAGEMENT: 12
  • OE.MRTD_: 3
  • OE.BAC_PP: 1
pdf_data/st_keywords/cc_protection_profile_id/BSI
  • BSI-CC-PP-0055: 2
  • BSI-PP- 0035: 2
  • BSI-PP-0035: 1
  • BSI-CC-PP-0056-V2-2012: 1
  • BSI-CC-PP-0068-V2-2011: 1
  • BSI-PP-0055: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.5: 9
    • ADV_ARC.1: 7
    • ADV_TDS.4: 9
    • ADV_IMP.1: 10
    • ADV_INT.2: 2
    • ADV_FSP.1: 4
    • ADV_TDS.1: 2
    • ADV_TDS.3: 4
    • ADV_FSP.2: 2
    • ADV_FSP.4: 1
  • AGD:
    • AGD_OPE.1: 7
    • AGD_PRE.1: 7
  • ALC:
    • ALC_DVS.2: 9
    • ALC_CMC.4: 2
    • ALC_CMS.5: 1
    • ALC_LCD.1: 4
    • ALC_TAT.2: 4
    • ALC_DVS.1: 3
    • ALC_TAT.1: 2
    • ALC_CMS.1: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
  • ATE:
    • ATE_COV.2: 4
    • ATE_DPT.3: 2
    • ATE_FUN.1: 7
    • ATE_IND.2: 1
    • ATE_COV.1: 2
    • ATE_DPT.1: 1
  • AVA:
    • AVA_VAN.5: 9
    • AVA_VAN.4: 1
  • ASE:
    • ASE_CCL: 2
    • ASE_SPD: 2
    • ASE_OBJ: 2
    • ASE_ECD: 2
    • ASE_REQ: 2
    • ASE_TSS: 2
    • ASE_CCL.1: 2
    • ASE_ECD.1: 5
    • ASE_INT.1: 6
    • ASE_OBJ.2: 4
    • ASE_REQ.2: 3
    • ASE_SPD.1: 3
    • ASE_TSS.1: 2
    • ASE_REQ.1: 2
  • ADV:
    • ADV_ARC.1: 1
  • ALC:
    • ALC_DVS.2: 3
  • ASE:
    • ASE_ECD: 1
pdf_data/st_keywords/cc_sar/ADV
  • ADV_FSP.5: 9
  • ADV_ARC.1: 7
  • ADV_TDS.4: 9
  • ADV_IMP.1: 10
  • ADV_INT.2: 2
  • ADV_FSP.1: 4
  • ADV_TDS.1: 2
  • ADV_TDS.3: 4
  • ADV_FSP.2: 2
  • ADV_FSP.4: 1
  • ADV_ARC.1: 1
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 7 1
pdf_data/st_keywords/cc_sar/ALC
  • ALC_DVS.2: 9
  • ALC_CMC.4: 2
  • ALC_CMS.5: 1
  • ALC_LCD.1: 4
  • ALC_TAT.2: 4
  • ALC_DVS.1: 3
  • ALC_TAT.1: 2
  • ALC_CMS.1: 1
  • ALC_CMS.4: 1
  • ALC_DEL.1: 1
  • ALC_DVS.2: 3
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 9 3
pdf_data/st_keywords/cc_sar/ASE
  • ASE_CCL: 2
  • ASE_SPD: 2
  • ASE_OBJ: 2
  • ASE_ECD: 2
  • ASE_REQ: 2
  • ASE_TSS: 2
  • ASE_CCL.1: 2
  • ASE_ECD.1: 5
  • ASE_INT.1: 6
  • ASE_OBJ.2: 4
  • ASE_REQ.2: 3
  • ASE_SPD.1: 3
  • ASE_TSS.1: 2
  • ASE_REQ.1: 2
  • ASE_ECD: 1
pdf_data/st_keywords/cc_sar/ASE/ASE_ECD 2 1
pdf_data/st_keywords/cc_security_level/EAL
  • EAL5+: 3
  • EAL4+: 1
  • EAL5: 12
  • EAL5 augmented: 2
  • EAL4: 3
  • EAL 6+: 1
  • EAL4 augmented: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_SAS.1: 2
    • FAU_ARP.1: 3
    • FAU_ARP: 5
    • FAU_SAA.1: 2
  • FCS:
    • FCS_RNG: 2
    • FCS_RNG.1: 7
    • FCS_COP.1: 4
    • FCS_COP: 9
    • FCS_CKM.1: 4
    • FCS_CKM: 3
    • FCS_RNG.1.1: 1
    • FCS_RNG.1.2: 1
    • FCS_CKM.2: 2
    • FCS_CKM.3: 2
    • FCS_CKM.4: 2
  • FDP:
    • FDP_ITT.1: 4
    • FDP_IFC.1: 7
    • FDP_ACC.2: 1
    • FDP_ACF.1: 4
    • FDP_ACF: 7
    • FDP_IFF.1: 5
    • FDP_ROL: 12
    • FDP_ROL.1: 3
    • FDP_ACC: 8
    • FDP_IFF: 3
    • FDP_IFC: 3
    • FDP_RIP: 36
    • FDP_RIP.1: 3
    • FDP_SDI.2: 2
  • FIA:
    • FIA_ATD: 2
    • FIA_UID: 1
    • FIA_USB: 2
  • FMT:
    • FMT_LIM: 5
    • FMT_LIM.1: 13
    • FMT_LIM.2: 12
    • FMT_MSA.3: 4
    • FMT_MSA.1: 2
    • FMT_LIM.1.1: 1
    • FMT_LIM.2.1: 1
    • FMT_MSA: 14
    • FMT_MSA.2: 2
    • FMT_SMR.1: 3
    • FMT_MTD: 6
    • FMT_SMR: 1
    • FMT_SMF.1: 6
  • FPR:
    • FPR_UNO.1: 3
  • FPT:
    • FPT_FLS.1: 5
    • FPT_PHP.3: 2
    • FPT_ITT.1: 2
    • FPT_FLS: 17
    • FPT_TDC.1: 1
    • FPT_TST.1: 2
  • FRU:
    • FRU_FLT.2: 3
  • FAU:
    • FAU_SAS: 6
    • FAU_GEN: 1
    • FAU_SAS.1: 13
    • FAU_SAS.1.1: 2
  • FCS:
    • FCS_RND: 7
    • FCS_CKM: 6
    • FCS_COP: 53
    • FCS_CKM.1: 27
    • FCS_RND.1: 13
    • FCS_RND.1.1: 2
    • FCS_CKM.2: 4
    • FCS_COP.1: 11
    • FCS_CKM.4: 30
    • FCS_CKM.1.1: 2
    • FCS_CKM.4.1: 1
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACF: 1
    • FDP_ITC.1: 12
    • FDP_ITC.2: 12
    • FDP_ACC.1: 19
    • FDP_ACF.1: 12
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 2
    • FDP_UCT.1: 11
    • FDP_IFC.1: 4
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 10
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
    • FDP_ITC: 2
  • FIA:
    • FIA_API: 13
    • FIA_AFL.1: 12
    • FIA_SOS.2: 1
    • FIA_API.1: 6
    • FIA_API.1.1: 1
    • FIA_UAU.5.2: 3
    • FIA_UAU.4: 12
    • FIA_UAU.6: 12
    • FIA_UID.1: 12
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_UAU.1: 11
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.4.1: 1
    • FIA_UAU.5: 11
    • FIA_UAU.5.1: 1
    • FIA_UAU.6.1: 1
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_UAU: 5
  • FMT:
    • FMT_LIM: 7
    • FMT_LIM.1: 21
    • FMT_LIM.2: 19
    • FMT_LIM.1.1: 2
    • FMT_LIM.2.1: 2
    • FMT_MSA.3: 3
    • FMT_SMF.1: 20
    • FMT_SMR.1: 23
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_MTD.1: 6
    • FMT_MTD: 40
    • FMT_MSA.1: 1
    • FMT_SRM.1: 1
  • FPT:
    • FPT_EMS: 4
    • FPT_EMS.1: 14
    • FPT_EMS.1.1: 3
    • FPT_EMS.1.2: 3
    • FPT_FLS.1: 12
    • FPT_TST.1: 11
    • FPT_PHP.3: 13
    • FPT_FLS.1.1: 1
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_PHP.3.1: 1
  • FTP:
    • FTP_ITC.1: 5
    • FTP_TRP.1: 5
pdf_data/st_keywords/cc_sfr/FAU
  • FAU_SAS.1: 2
  • FAU_ARP.1: 3
  • FAU_ARP: 5
  • FAU_SAA.1: 2
  • FAU_SAS: 6
  • FAU_GEN: 1
  • FAU_SAS.1: 13
  • FAU_SAS.1.1: 2
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1 2 13
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_RNG: 2
  • FCS_RNG.1: 7
  • FCS_COP.1: 4
  • FCS_COP: 9
  • FCS_CKM.1: 4
  • FCS_CKM: 3
  • FCS_RNG.1.1: 1
  • FCS_RNG.1.2: 1
  • FCS_CKM.2: 2
  • FCS_CKM.3: 2
  • FCS_CKM.4: 2
  • FCS_RND: 7
  • FCS_CKM: 6
  • FCS_COP: 53
  • FCS_CKM.1: 27
  • FCS_RND.1: 13
  • FCS_RND.1.1: 2
  • FCS_CKM.2: 4
  • FCS_COP.1: 11
  • FCS_CKM.4: 30
  • FCS_CKM.1.1: 2
  • FCS_CKM.4.1: 1
  • FCS_COP.1.1: 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM 3 6
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 4 27
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 2 4
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 2 30
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP 9 53
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 4 11
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ITT.1: 4
  • FDP_IFC.1: 7
  • FDP_ACC.2: 1
  • FDP_ACF.1: 4
  • FDP_ACF: 7
  • FDP_IFF.1: 5
  • FDP_ROL: 12
  • FDP_ROL.1: 3
  • FDP_ACC: 8
  • FDP_IFF: 3
  • FDP_IFC: 3
  • FDP_RIP: 36
  • FDP_RIP.1: 3
  • FDP_SDI.2: 2
  • FDP_ACF: 1
  • FDP_ITC.1: 12
  • FDP_ITC.2: 12
  • FDP_ACC.1: 19
  • FDP_ACF.1: 12
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 2
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 2
  • FDP_UCT.1: 11
  • FDP_IFC.1: 4
  • FDP_UCT.1.1: 1
  • FDP_UIT.1: 10
  • FDP_UIT.1.1: 1
  • FDP_UIT.1.2: 1
  • FDP_ITC: 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF 7 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 4 12
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 7 4
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_ATD: 2
  • FIA_UID: 1
  • FIA_USB: 2
  • FIA_API: 13
  • FIA_AFL.1: 12
  • FIA_SOS.2: 1
  • FIA_API.1: 6
  • FIA_API.1.1: 1
  • FIA_UAU.5.2: 3
  • FIA_UAU.4: 12
  • FIA_UAU.6: 12
  • FIA_UID.1: 12
  • FIA_UID.1.1: 1
  • FIA_UID.1.2: 1
  • FIA_UAU.1: 11
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.4.1: 1
  • FIA_UAU.5: 11
  • FIA_UAU.5.1: 1
  • FIA_UAU.6.1: 1
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_UAU: 5
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_LIM: 5
  • FMT_LIM.1: 13
  • FMT_LIM.2: 12
  • FMT_MSA.3: 4
  • FMT_MSA.1: 2
  • FMT_LIM.1.1: 1
  • FMT_LIM.2.1: 1
  • FMT_MSA: 14
  • FMT_MSA.2: 2
  • FMT_SMR.1: 3
  • FMT_MTD: 6
  • FMT_SMR: 1
  • FMT_SMF.1: 6
  • FMT_LIM: 7
  • FMT_LIM.1: 21
  • FMT_LIM.2: 19
  • FMT_LIM.1.1: 2
  • FMT_LIM.2.1: 2
  • FMT_MSA.3: 3
  • FMT_SMF.1: 20
  • FMT_SMR.1: 23
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_MTD.1: 6
  • FMT_MTD: 40
  • FMT_MSA.1: 1
  • FMT_SRM.1: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM 5 7
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1 13 21
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1.1 1 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 12 19
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2.1 1 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 2 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 4 3
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD 6 40
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 6 20
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 3 23
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_FLS.1: 5
  • FPT_PHP.3: 2
  • FPT_ITT.1: 2
  • FPT_FLS: 17
  • FPT_TDC.1: 1
  • FPT_TST.1: 2
  • FPT_EMS: 4
  • FPT_EMS.1: 14
  • FPT_EMS.1.1: 3
  • FPT_EMS.1.2: 3
  • FPT_FLS.1: 12
  • FPT_TST.1: 11
  • FPT_PHP.3: 13
  • FPT_FLS.1.1: 1
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
  • FPT_PHP.3.1: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 5 12
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 2 13
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 2 11
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 4
    • interface for the secure management of applications on the smart card. The Card Manager is out of scope of current evaluation and its administrative interface is permanently disabled before TOE delivery: 1
    • and is out of the scope of current evaluation. Any other application being loaded pre-issuance is out of scope of current evaluation. 4.1.2.1 Java Card Platform The Java technology, embedded on the TOE: 1
    • of the TOE to the parties responsible of the following usage phases. Application development is out of scope of current evaluation. TOE Construction phase includes: Product Development Product: 1
    • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
pdf_data/st_keywords/cipher_mode
  • ECB:
    • ECB: 2
  • CBC:
    • CBC: 5
  • CBC:
    • CBC: 1
pdf_data/st_keywords/cipher_mode/CBC/CBC 5 1
pdf_data/st_keywords/crypto_library
  • Neslib:
    • NesLib v.3.1: 1
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 3
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 4
  • MAC:
    • MAC: 4
  • KA:
    • Key Agreement: 2
pdf_data/st_keywords/eval_facility
  • Serma:
    • SERMA: 1
pdf_data/st_keywords/hash_function/SHA/SHA1
  • SHA-1: 3
  • SHA1: 2
  • SHA-1: 1
pdf_data/st_keywords/hash_function/SHA/SHA1/SHA-1 3 1
pdf_data/st_keywords/hash_function/SHA/SHA2
  • SHA-224: 2
  • SHA-256: 2
  • SHA-384: 1
  • SHA-512: 2
  • SHA224: 2
  • SHA256: 2
  • SHA384: 2
  • SHA512: 2
  • SHA-224: 1
  • SHA-256: 1
  • SHA-512: 1
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-224 2 1
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-256 2 1
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-512 2 1
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.DG1: 30
    • EF.DG2: 12
    • EF.DG3: 8
    • EF.DG4: 8
    • EF.DG5: 8
    • EF.DG16: 28
    • EF.DG13: 3
    • EF.DG14: 3
    • EF.DG15: 4
    • EF.DG6: 2
    • EF.COM: 9
    • EF.SOD: 9
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 5
pdf_data/st_keywords/javacard_packages
  • java:
    • java.lang: 1
  • javacard:
    • javacard.framework: 4
    • javacard.framework.applet: 1
    • javacard.security: 23
    • javacard.security.interface: 4
  • javacardx:
    • javacardx.crypto: 1
pdf_data/st_keywords/javacard_version
  • JavaCard:
    • Java Card 3.0.4: 1
  • GlobalPlatform:
    • GlobalPlatform 2.1.1: 2
pdf_data/st_keywords/randomness/RNG
  • RND: 1
  • RNG: 4
  • RNG: 3
pdf_data/st_keywords/randomness/RNG/RNG 4 3
pdf_data/st_keywords/side_channel_analysis
  • SCA:
    • Leak-Inherent: 1
    • physical probing: 4
    • side channel: 1
    • DPA: 3
    • SPA: 1
    • timing attacks: 1
  • FI:
    • Physical tampering: 2
    • physical tampering: 1
    • Malfunction: 1
    • malfunction: 2
    • fault injection: 2
  • SCA:
    • Leak-Inherent: 2
    • physical probing: 3
    • DPA: 2
    • SPA: 1
    • timing attacks: 1
  • FI:
    • Physical Tampering: 5
    • physical tampering: 1
    • Physical tampering: 1
    • Malfunction: 6
    • malfunction: 5
    • fault injection: 1
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/side_channel_analysis/FI
  • Physical tampering: 2
  • physical tampering: 1
  • Malfunction: 1
  • malfunction: 2
  • fault injection: 2
  • Physical Tampering: 5
  • physical tampering: 1
  • Physical tampering: 1
  • Malfunction: 6
  • malfunction: 5
  • fault injection: 1
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction 1 6
pdf_data/st_keywords/side_channel_analysis/FI/Physical tampering 2 1
pdf_data/st_keywords/side_channel_analysis/FI/fault injection 2 1
pdf_data/st_keywords/side_channel_analysis/FI/malfunction 2 5
pdf_data/st_keywords/side_channel_analysis/SCA
  • Leak-Inherent: 1
  • physical probing: 4
  • side channel: 1
  • DPA: 3
  • SPA: 1
  • timing attacks: 1
  • Leak-Inherent: 2
  • physical probing: 3
  • DPA: 2
  • SPA: 1
  • timing attacks: 1
pdf_data/st_keywords/side_channel_analysis/SCA/DPA 3 2
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent 1 2
pdf_data/st_keywords/side_channel_analysis/SCA/physical probing 4 3
pdf_data/st_keywords/standard_id
  • PKCS:
    • PKCS#1: 1
    • PKCS3: 1
    • PKCS1: 1
  • SCP:
    • SCP02: 1
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
  • FIPS:
    • FIPS180-2: 1
    • FIPS46-3: 3
    • FIPS PUB 46-3: 1
    • FIPS 180-2: 1
    • FIPS 46-3: 2
  • PKCS:
    • PKCS#3: 1
  • RFC:
    • RFC3369: 1
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 7816-4: 1
  • ICAO:
    • ICAO: 17
  • CC:
    • CCMB-2006-09-001: 1
    • CCMB-2007-09-002: 1
    • CCMB-2007-09-003: 1
    • CCMB-2007-09-004: 1
pdf_data/st_keywords/standard_id/CC
  • CCMB-2009-07-001: 1
  • CCMB-2009-07-002: 1
  • CCMB-2009-07-003: 1
  • CCMB-2006-09-001: 1
  • CCMB-2007-09-002: 1
  • CCMB-2007-09-003: 1
  • CCMB-2007-09-004: 1
pdf_data/st_keywords/standard_id/PKCS
  • PKCS#1: 1
  • PKCS3: 1
  • PKCS1: 1
  • PKCS#3: 1
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 7 1
pdf_data/st_keywords/symmetric_crypto/DES/3DES
  • 3-DES: 2
  • TripleDES: 1
  • Triple-DES: 1
  • TDES: 1
  • Triple-DES: 8
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES 1 8
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES 7 2
pdf_data/st_keywords/symmetric_crypto/constructions/MAC
  • CBC-MAC: 1
  • KMAC: 1
pdf_data/st_keywords/vendor
  • STMicroelectronics:
    • STMicroelectronics: 8
    • STM: 15
  • NXP:
    • NXP: 14
  • Gemalto:
    • Gemalto: 82
pdf_data/st_metadata
  • pdf_file_size_bytes: 1236830
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 90
  • /Author: Luca Di Cosmo
  • /CreationDate: D:20150402161829+02'00'
  • /Creator: Microsoft® Word 2013
  • /ModDate: D:20150522134244+02'00'
  • /Producer: Microsoft® Word 2013
  • /Title: J-Safe_SB23YR80B_Security_Target
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 1119178
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 62
  • /Title: eTravel EAC v2 Security Target
  • /Author: Antoine de Lavernette
  • /Subject: MRTD
  • /Keywords: Security Target, CC, eTravel
  • /Creator: Microsoft® Office Word 2007
  • /CreationDate: D:20150423185724+02'00'
  • /ModDate: D:20150423185724+02'00'
  • /Producer: Microsoft® Office Word 2007
  • pdf_hyperlinks:
pdf_data/st_metadata//Author Luca Di Cosmo Antoine de Lavernette
pdf_data/st_metadata//CreationDate D:20150402161829+02'00' D:20150423185724+02'00'
pdf_data/st_metadata//Creator Microsoft® Word 2013 Microsoft® Office Word 2007
pdf_data/st_metadata//ModDate D:20150522134244+02'00' D:20150423185724+02'00'
pdf_data/st_metadata//Producer Microsoft® Word 2013 Microsoft® Office Word 2007
pdf_data/st_metadata//Title J-Safe_SB23YR80B_Security_Target eTravel EAC v2 Security Target
pdf_data/st_metadata/pdf_file_size_bytes 1236830 1119178
pdf_data/st_metadata/pdf_number_of_pages 90 62
dgst bb81f40b202b203a 0f7bd25c0253d284