Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Plateforme J-Safe, en configuration fermée, version 2.11.0, sur le composant SB23YR80B
ANSSI-CC-2015/16
Application eTravel EAC v2.0, en configuration "EAC on BAC" sur la plateforme ouverte MultiApp V3 masquée sur le composant M7820 A11 (Version du patch : 1.5)
ANSSI-CC-2014/48
name Plateforme J-Safe, en configuration fermée, version 2.11.0, sur le composant SB23YR80B Application eTravel EAC v2.0, en configuration "EAC on BAC" sur la plateforme ouverte MultiApp V3 masquée sur le composant M7820 A11 (Version du patch : 1.5)
not_valid_before 2015-05-15 2014-07-11
not_valid_after 2020-05-15 2019-09-01
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_16_Cible.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2014-48en.pdf
manufacturer Incard Division / ST Microelectronics Gemalto - Infineon Technologies AG
manufacturer_web None https://www.gemalto.com/
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_16.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2014-48fr.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Java Card System Protection Profile - Closed Configuration version 3.0', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/ANSSI-CC-profil_PP-2010-07en.pdf', 'pp_ids': frozenset({'ANSSI-CC-PP-2010-07-M01'})}) frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Machine Readable Travel Document with ICAO Application Extended Access Control with PACE, Version 1.3', 'pp_eal': 'EAL4', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0056_V2b_pdf.pdf', 'pp_ids': frozenset({'MRTD_ICAO_EAC_V1.3', 'MRTD-PP_V1.10'})})
maintenance_updates frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2016, 5, 23), 'maintenance_title': 'ANSSI-CC-2014/48-M01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2014_48-M01.pdf', 'maintenance_st_link': None})
state/report/pdf_hash b3cb628bfac0a4bce8c004064c9f41c07d14e3f0153073a9f62e56b6d9ca3207 c3cf3a4512704461dfba0e5c008d52c8fccfbd77df5a90a15dfbddfa4bc6e670
state/report/txt_hash 5035b7914b7ed978e1ea32111a7492b11f34256e133ad436c1f3097101f76943 4ce73203207442d2e10b37001971c7ce775dac99c3f43a2e3ab6c78b1305eeb7
state/st/pdf_hash 36c06e10735fe312f02299921740c4a902dff2d83c7340b00c62baca0cf9fb90 5cfe524dec03bb72646c02e2b98d18c4d2b0374e4e485a69792755c631d30654
state/st/txt_hash 59d15b2ee5c2ba904009f029a07f27abd7c67a347f8a2b32e4d374d6f48dcfeb 69f36dc08d32d097323733161036e00ccad5e29f2411fa5aed42fec07ab6afef
heuristics/cert_id ANSSI-CC-2015/16 ANSSI-CC-2014/48
heuristics/extracted_versions 2.11.0 2.0, 1.5
heuristics/report_references/directly_referenced_by ANSSI-CC-2015/17 ANSSI-CC-2015/09
heuristics/report_references/directly_referencing ANSSI-CC-2012/68 BSI-DSZ-CC-0829-2012, ANSSI-CC-2014/06
heuristics/report_references/indirectly_referenced_by ANSSI-CC-2015/17 ANSSI-CC-2015/09
heuristics/report_references/indirectly_referencing ANSSI-CC-2010/01, ANSSI-CC-2009/50, ANSSI-CC-2009/62, ANSSI-CC-2009/26, ANSSI-CC-2009/06, ANSSI-CC-2010/02, ANSSI-CC-2012/68, ANSSI-CC-2009/05, ANSSI-CC-2009/51, ANSSI-CC-2009/28 BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0640-2010, ANSSI-CC-2014/06, BSI-DSZ-CC-0728-2011
heuristics/scheme_data/cert_id 2015/16 2014/11
heuristics/scheme_data/description Le produit certifié est la « Plateforme J-Safe, en configuration fermée, version 2.11.0, sur lecomposant SB23YR80B » développée par STMicroelectronics S.r.l. – Incard Division et STMicroelectronics. La plateforme est une carte à puce offrant les modes contact, sans contact et duaux. Elle est en configuration fermée, elle ne correspond donc pas un produit utilisable en tant que tel. Elle estn Le produit certifié est la carte à puce ouverte « MultiApp V3 », pouvant être en mode contact ou sans-contact. Le produit est développé par la société Gemalto et embarqué sur le microcontrôleur M7820 A11 fabriqué par la société Infineon Technologies. Le produit implémente les fonctions de document de voyage électronique conformément aux spécifications de l'organisation de l'aviation ci
heuristics/scheme_data/developer STMicroelectronics S.r.l. - Incard Division / STMicroelectronics Gemalto / Infineon Technologies AG
heuristics/scheme_data/enhanced/cc_version Critères Communs version 3.1r3 Critères Communs version 3.1r4
heuristics/scheme_data/enhanced/cert_id 2015/16 2014/11
heuristics/scheme_data/enhanced/certification_date 15/05/2015 27/03/2014
heuristics/scheme_data/enhanced/developer STMicroelectronics S.r.l. - Incard Division / STMicroelectronics Gemalto / Infineon Technologies AG
heuristics/scheme_data/enhanced/mutual_recognition SOG-IS CCRA
heuristics/scheme_data/enhanced/protection_profile PP JCS BSI-CC-PP-0056-V2, PP EAC PACE
heuristics/scheme_data/enhanced/report_link https://cyber.gouv.fr/sites/default/files/2015/05/ANSSI-CC-2015_16.pdf https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2014-11fr.pdf
heuristics/scheme_data/enhanced/sponsor STMicroelectronics S.r.l. - Incard Division Gemalto
heuristics/scheme_data/enhanced/target_link https://cyber.gouv.fr/sites/default/files/2015/05/ANSSI-CC-2015_16_Cible.pdf https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2014-11en.pdf
heuristics/scheme_data/product Plateforme J-Safe, en configuration fermée, version 2.11.0, sur le composant SB23YR80B Application eTravel EAC v2.0, en configuration EAC, sur la plateforme ouverte MultiApp V3 masquée sur le composant M7820 A11
heuristics/scheme_data/sponsor STMicroelectronics S.r.l. - Incard Division Gemalto
heuristics/scheme_data/url https://cyber.gouv.fr/produits-certifies/plateforme-j-safe-en-configuration-fermee-version-2110-sur-le-composant https://cyber.gouv.fr/produits-certifies/application-etravel-eac-v20-en-configuration-eac-sur-la-plateforme-ouverte
heuristics/st_references/directly_referencing ANSSI-CC-2012/68 BSI-DSZ-CC-0829-2012
heuristics/st_references/indirectly_referencing ANSSI-CC-2012/68 BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0695-2011, BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0813-2012
pdf_data/report_filename ANSSI-CC-2015_16.pdf ANSSI-CC_2014-48fr.pdf
pdf_data/report_frontpage/FR/cc_version Critères Communs version 3.1 révision 3 Critères Communs version 3.1 révision 4
pdf_data/report_frontpage/FR/cert_id ANSSI-CC-2015/16 ANSSI-CC-2014/48
pdf_data/report_frontpage/FR/cert_item Plateforme J-Safe, en configuration fermée, version 2.11.0, sur le composant SB23YR80B Application eTravel EAC v2.0, en configuration "EAC on BAC", sur la plateforme ouverte MultiApp V3 masquée sur le composant M7820 A11
pdf_data/report_frontpage/FR/cert_item_version Version 2.11.0 Version de l’application eTravel EAC : 2.0 Version plateforme Java Card MultiApp : 3.0 Version du patch : 1.5
pdf_data/report_frontpage/FR/developer STMicroelectronics S.r.l. – Incard Division Z.I Marcianise Sud, 81025 Marcianise, Italie STMicroelectronics 29 Boulevard Romain Rolland, 75669 Paris Cedex 14, France Commanditaire STMicroelectronics S.r.l. – Incard Division Z.I Marcianise Sud, 81025 Marcianise, Italie Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France Infineon Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France
pdf_data/report_frontpage/FR/ref_protection_profiles PP JCS] Java Card protection profile – closed configuration, version 3.0 BSI-CC-PP-0056-2009, [PP EACv1], version 1.10 CC Protection Profile – Machine Readable Travel Document with ICAO application, Extended Access Control
pdf_data/report_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2015/16: 16
    • ANSSI-CC-2012/68: 2
    • ANSSI-CC-2012/68-S02: 1
  • DE:
    • BSI-DSZ-CC-0829-2012: 3
  • FR:
    • ANSSI-CC-2014/48: 23
    • ANSSI-CC-2014/06: 4
pdf_data/report_keywords/cc_cert_id/FR
  • ANSSI-CC-2015/16: 16
  • ANSSI-CC-2012/68: 2
  • ANSSI-CC-2012/68-S02: 1
  • ANSSI-CC-2014/48: 23
  • ANSSI-CC-2014/06: 4
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0035-2007: 1
  • ANSSI:
    • ANSSI-CC-PP-: 1
    • ANSSI-CC-PP-2010/07-M01: 1
  • BSI:
    • BSI-CC-PP-0056-2009: 2
    • BSI-PP-0035-2007: 2
    • BSI-PP- 0035-2007: 1
pdf_data/report_keywords/cc_protection_profile_id/BSI
  • BSI-PP-0035-2007: 1
  • BSI-CC-PP-0056-2009: 2
  • BSI-PP-0035-2007: 2
  • BSI-PP- 0035-2007: 1
pdf_data/report_keywords/cc_protection_profile_id/BSI/BSI-PP-0035-2007 1 2
pdf_data/report_keywords/cc_sar/ALC
  • ALC_DVS.2: 2
  • ALC_FLR.1: 1
  • ALC_FLR: 2
  • ALC_CMC: 1
  • ALC_CMS: 1
  • ALC_DEL: 1
  • ALC_DVS: 1
  • ALC_TAT: 1
  • ALC_DVS.2: 3
  • ALC_FLR: 2
  • ALC_CMC: 1
  • ALC_CMS: 1
  • ALC_DEL: 1
  • ALC_DVS: 1
  • ALC_TAT: 1
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 2 3
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN.5 4 6
pdf_data/report_keywords/cc_security_level/EAL
  • EAL 5: 3
  • EAL4: 2
  • EAL6: 1
  • EAL7: 1
  • EAL 1: 1
  • EAL 3: 1
  • EAL 7: 1
  • EAL 5: 3
  • EAL4: 2
  • EAL5: 1
  • EAL7: 1
  • EAL 1: 1
  • EAL 3: 1
  • EAL 7: 1
pdf_data/report_keywords/crypto_library
  • Infineon:
    • v1.02.013: 3
pdf_data/report_keywords/eval_facility
  • Serma:
    • Serma Technologies: 1
  • Serma:
    • Serma Technologies: 3
  • CESTI:
    • CESTI: 1
pdf_data/report_keywords/eval_facility/Serma/Serma Technologies 1 3
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-2: 1
pdf_data/report_keywords/standard_id
  • ICAO:
    • ICAO: 2
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
pdf_data/report_keywords/vendor
  • STMicroelectronics:
    • STMicroelectronics: 6
  • Infineon:
    • Infineon Technologies AG: 1
    • Infineon Technologies: 23
    • Infineon: 2
  • Gemalto:
    • Gemalto: 38
pdf_data/report_metadata
  • pdf_file_size_bytes: 579179
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 15
  • /Title: ANSSI-CC-2015/16
  • /Author: Administrateur
  • /Subject: Plateforme J-Safe, en configuration fermée, version 2.11.0, sur le composant SB23YR80B
  • /Keywords: ANSSI-CC-CER-F-07.016
  • /Creator: Microsoft® Word 2010
  • /CreationDate: D:20150522134001+02'00'
  • /ModDate: D:20150522134001+02'00'
  • /Producer: Microsoft® Word 2010
  • pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
  • pdf_file_size_bytes: 266827
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 22
  • /CreationDate: D:20140711144222+02'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20140807095432+02'00'
  • /Producer: Acrobat Distiller 9.0.0 (Windows)
  • /Title:
  • pdf_hyperlinks:
pdf_data/report_metadata//CreationDate D:20150522134001+02'00' D:20140711144222+02'00'
pdf_data/report_metadata//Creator Microsoft® Word 2010 PScript5.dll Version 5.2.2
pdf_data/report_metadata//ModDate D:20150522134001+02'00' D:20140807095432+02'00'
pdf_data/report_metadata//Producer Microsoft® Word 2010 Acrobat Distiller 9.0.0 (Windows)
pdf_data/report_metadata//Title ANSSI-CC-2015/16
pdf_data/report_metadata/pdf_file_size_bytes 579179 266827
pdf_data/report_metadata/pdf_hyperlinks http://www.ssi.gouv.fr/, mailto:[email protected]
pdf_data/report_metadata/pdf_number_of_pages 15 22
pdf_data/st_filename ANSSI-CC-2015_16_Cible.pdf ANSSI-CC-cible_2014-48en.pdf
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 1
  • FF:
    • DH:
      • Diffie-Hellman: 5
    • DSA:
      • DSA: 1
  • RSA:
    • RSA 1024: 1
  • ECC:
    • ECDH:
      • ECDH: 4
    • ECDSA:
      • ECDSA: 2
    • ECC:
      • ECC: 2
  • FF:
    • DH:
      • Diffie-Hellman: 8
      • DH: 5
pdf_data/st_keywords/asymmetric_crypto/ECC
  • ECDSA:
    • ECDSA: 1
  • ECDH:
    • ECDH: 4
  • ECDSA:
    • ECDSA: 2
  • ECC:
    • ECC: 2
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA 1 2
pdf_data/st_keywords/asymmetric_crypto/FF
  • DH:
    • Diffie-Hellman: 5
  • DSA:
    • DSA: 1
  • DH:
    • Diffie-Hellman: 8
    • DH: 5
pdf_data/st_keywords/asymmetric_crypto/FF/DH
  • Diffie-Hellman: 5
  • Diffie-Hellman: 8
  • DH: 5
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman 5 8
pdf_data/st_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2012/68: 2
  • DE:
    • BSI-DSZ-CC-0829-2012: 1
  • NL:
    • CC-1: 4
    • CC-2: 6
    • CC-3: 3
pdf_data/st_keywords/cc_claims
  • D:
    • D.APP_CODE: 6
    • D.APP_C_DATA: 3
    • D.APP_I_DATA: 4
    • D.PIN: 9
    • D.API_DATA: 3
    • D.CRYPTO: 6
    • D.JCS_CODE: 4
    • D.JCS_DATA: 6
    • D.SEC_DATA: 5
    • D.EMBEDDED_SW_CODE: 4
    • D.EMBEDDED_SW_DATA: 4
    • D.GP_CODE: 3
    • D.GP_SENSITIVE_DATA: 3
  • O:
    • O.SCP: 65
    • O.SIDE_CHANNEL: 10
    • O.LIFE_CYCLE: 12
    • O.RND: 1
    • O.CIPHER: 40
    • O.SID: 25
    • O.GLOBAL_ARRAYS_CONFID: 15
    • O.NATIVE: 12
    • O.REALLOCATION: 9
    • O.KEY_MNGT: 1
    • O.TRANSACTION: 16
    • O.OPERATE: 34
    • O.ROLES: 7
    • O.FIREWALL: 26
    • O.GLOBAL_ARRAYS_INTEG: 8
    • O.RESOURCES: 9
    • O.ALARM: 21
    • O.KEY-MNGT: 15
    • O.PIN-MNGT: 13
    • O.OBJ-DELETION: 6
    • O.APPLET: 1
    • O.JAVAOBJECT: 20
    • O.GP_REGISTRY: 10
    • O.JAVA: 3
    • O.JAVAOB: 2
    • O.OBJ-DEL: 1
  • T:
    • T.LIFE_CYCLE: 7
    • T.PHYSICAL: 9
    • T.CONFID-APPLI-DATA: 17
    • T.CONFID-JCS-CODE: 6
    • T.CONFID-JCS-DATA: 11
    • T.INTEG-APPLI-CODE: 10
    • T.INTEG-APPLI-DATA: 21
    • T.INTEG-JCS-CODE: 6
    • T.INTEG-JCS-DATA: 10
    • T.SID: 16
    • T.EXE-CODE: 9
    • T.NATIVE: 4
    • T.RESOURCES: 7
    • T.OBJ-DELETION: 4
    • T.LEAKAGE: 1
    • T.INTEG-: 1
  • A:
    • A.XXX: 1
    • A.VERIFICATION: 4
    • A.NO-INSTALL: 5
    • A.NO-DELETION: 5
  • R:
    • R.JAVA: 5
  • OP:
    • OP.ARRAY_ACCESS: 4
    • OP.CREATE: 7
    • OP.INSTANCE_FIELD: 4
    • OP.INVK_VIRTUAL: 6
    • OP.INVK_INTERFACE: 7
    • OP.JAVA: 5
    • OP.THROW: 5
    • OP.TYPE_ACCESS: 5
    • OP.PUT: 6
    • OP.MANAGE_APP_LIFE_CYC: 1
    • OP.GET_CARD_LIFE_CYCLE_: 1
    • OP.CARD_LOCK: 4
    • OP.CARD_TERMINATE: 4
    • OP.MANAGE_APP_LIFE_CYCLE_STATE: 3
    • OP.GET_CARD_LIFE_CYCLE_STATE: 2
  • OE:
    • OE.SCP: 3
    • OE.NO-DELETION: 6
    • OE.VERIFICATION: 32
    • OE.CARD_MANAGEMENT: 16
    • OE.NO-INSTALL: 5
    • OE.MANAGEMENT_OF_SECRETS: 3
    • OE.CARD-MANAGEMENT: 12
  • OSP:
    • OSP.CARD_ADMINISTRATION_DISABLED: 5
    • OSP.MANAGEMENT_OF_SECRETS: 6
    • OSP.ROLES: 5
    • OSP.VERIFICATION: 5
  • OE:
    • OE.MRTD_: 1
    • OE.BAC_PP: 1
    • OE.BAC-PP: 1
pdf_data/st_keywords/cc_claims/OE
  • OE.SCP: 3
  • OE.NO-DELETION: 6
  • OE.VERIFICATION: 32
  • OE.CARD_MANAGEMENT: 16
  • OE.NO-INSTALL: 5
  • OE.MANAGEMENT_OF_SECRETS: 3
  • OE.CARD-MANAGEMENT: 12
  • OE.MRTD_: 1
  • OE.BAC_PP: 1
  • OE.BAC-PP: 1
pdf_data/st_keywords/cc_protection_profile_id/BSI
  • BSI-CC-PP-0055: 2
  • BSI-PP- 0035: 2
  • BSI-PP-0002: 1
  • BSI-PP-0035: 1
  • BSI-PP-0056: 1
  • BSI-CC-PP-0056-V2-2012: 1
  • BSI-CC-PP-0068-V2-2011: 1
  • BSI-PP-0055: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.5: 9
    • ADV_ARC.1: 7
    • ADV_TDS.4: 9
    • ADV_IMP.1: 10
    • ADV_INT.2: 2
    • ADV_FSP.1: 4
    • ADV_TDS.1: 2
    • ADV_TDS.3: 4
    • ADV_FSP.2: 2
    • ADV_FSP.4: 1
  • AGD:
    • AGD_OPE.1: 7
    • AGD_PRE.1: 7
  • ALC:
    • ALC_DVS.2: 9
    • ALC_CMC.4: 2
    • ALC_CMS.5: 1
    • ALC_LCD.1: 4
    • ALC_TAT.2: 4
    • ALC_DVS.1: 3
    • ALC_TAT.1: 2
    • ALC_CMS.1: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
  • ATE:
    • ATE_COV.2: 4
    • ATE_DPT.3: 2
    • ATE_FUN.1: 7
    • ATE_IND.2: 1
    • ATE_COV.1: 2
    • ATE_DPT.1: 1
  • AVA:
    • AVA_VAN.5: 9
    • AVA_VAN.4: 1
  • ASE:
    • ASE_CCL: 2
    • ASE_SPD: 2
    • ASE_OBJ: 2
    • ASE_ECD: 2
    • ASE_REQ: 2
    • ASE_TSS: 2
    • ASE_CCL.1: 2
    • ASE_ECD.1: 5
    • ASE_INT.1: 6
    • ASE_OBJ.2: 4
    • ASE_REQ.2: 3
    • ASE_SPD.1: 3
    • ASE_TSS.1: 2
    • ASE_REQ.1: 2
  • ADV:
    • ADV_ARC.1: 1
  • ALC:
    • ALC_DVS.2: 2
  • AVA:
    • AVA_VAN.3: 2
    • AVA_VAN.5: 2
pdf_data/st_keywords/cc_sar/ADV
  • ADV_FSP.5: 9
  • ADV_ARC.1: 7
  • ADV_TDS.4: 9
  • ADV_IMP.1: 10
  • ADV_INT.2: 2
  • ADV_FSP.1: 4
  • ADV_TDS.1: 2
  • ADV_TDS.3: 4
  • ADV_FSP.2: 2
  • ADV_FSP.4: 1
  • ADV_ARC.1: 1
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 7 1
pdf_data/st_keywords/cc_sar/ALC
  • ALC_DVS.2: 9
  • ALC_CMC.4: 2
  • ALC_CMS.5: 1
  • ALC_LCD.1: 4
  • ALC_TAT.2: 4
  • ALC_DVS.1: 3
  • ALC_TAT.1: 2
  • ALC_CMS.1: 1
  • ALC_CMS.4: 1
  • ALC_DEL.1: 1
  • ALC_DVS.2: 2
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 9 2
pdf_data/st_keywords/cc_sar/AVA
  • AVA_VAN.5: 9
  • AVA_VAN.4: 1
  • AVA_VAN.3: 2
  • AVA_VAN.5: 2
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.5 9 2
pdf_data/st_keywords/cc_security_level/EAL
  • EAL5+: 3
  • EAL4+: 1
  • EAL5: 12
  • EAL5 augmented: 2
  • EAL5: 2
  • EAL 5+: 1
  • EAL5 augmented: 1
pdf_data/st_keywords/cc_security_level/EAL/EAL5 12 2
pdf_data/st_keywords/cc_security_level/EAL/EAL5 augmented 2 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_SAS.1: 2
    • FAU_ARP.1: 3
    • FAU_ARP: 5
    • FAU_SAA.1: 2
  • FCS:
    • FCS_RNG: 2
    • FCS_RNG.1: 7
    • FCS_COP.1: 4
    • FCS_COP: 9
    • FCS_CKM.1: 4
    • FCS_CKM: 3
    • FCS_RNG.1.1: 1
    • FCS_RNG.1.2: 1
    • FCS_CKM.2: 2
    • FCS_CKM.3: 2
    • FCS_CKM.4: 2
  • FDP:
    • FDP_ITT.1: 4
    • FDP_IFC.1: 7
    • FDP_ACC.2: 1
    • FDP_ACF.1: 4
    • FDP_ACF: 7
    • FDP_IFF.1: 5
    • FDP_ROL: 12
    • FDP_ROL.1: 3
    • FDP_ACC: 8
    • FDP_IFF: 3
    • FDP_IFC: 3
    • FDP_RIP: 36
    • FDP_RIP.1: 3
    • FDP_SDI.2: 2
  • FIA:
    • FIA_ATD: 2
    • FIA_UID: 1
    • FIA_USB: 2
  • FMT:
    • FMT_LIM: 5
    • FMT_LIM.1: 13
    • FMT_LIM.2: 12
    • FMT_MSA.3: 4
    • FMT_MSA.1: 2
    • FMT_LIM.1.1: 1
    • FMT_LIM.2.1: 1
    • FMT_MSA: 14
    • FMT_MSA.2: 2
    • FMT_SMR.1: 3
    • FMT_MTD: 6
    • FMT_SMR: 1
    • FMT_SMF.1: 6
  • FPR:
    • FPR_UNO.1: 3
  • FPT:
    • FPT_FLS.1: 5
    • FPT_PHP.3: 2
    • FPT_ITT.1: 2
    • FPT_FLS: 17
    • FPT_TDC.1: 1
    • FPT_TST.1: 2
  • FRU:
    • FRU_FLT.2: 3
  • FAU:
    • FAU_SAS: 6
    • FAU_GEN: 1
    • FAU_SAS.1: 7
    • FAU_SAS.1.1: 2
  • FCS:
    • FCS_RND: 7
    • FCS_CKM: 21
    • FCS_COP: 34
    • FCS_CKM.1: 9
    • FCS_RND.1: 6
    • FCS_RND.1.1: 2
    • FCS_CKM.2: 3
    • FCS_COP.1: 5
    • FCS_CKM.4: 20
    • FCS_CKM.1.1: 1
    • FCS_CKM.4.1: 1
    • FCS_COP.1.1: 5
  • FDP:
    • FDP_ACF: 1
    • FDP_ITC.1: 7
    • FDP_ITC.2: 7
    • FDP_ACC.1: 7
    • FDP_ACF.1: 6
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_UCT.1: 4
    • FDP_IFC.1: 2
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 4
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_API: 9
    • FIA_AFL: 5
    • FIA_SOS.2: 1
    • FIA_API.1: 7
    • FIA_API.1.1: 1
    • FIA_UAU.4: 5
    • FIA_UAU.5: 6
    • FIA_UAU.6: 4
    • FIA_UID: 8
    • FIA_UAU.1: 4
    • FIA_UAU: 5
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_UID.1: 6
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.4.1: 1
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6.1: 1
  • FMT:
    • FMT_LIM: 7
    • FMT_LIM.1: 17
    • FMT_LIM.2: 16
    • FMT_LIM.1.1: 3
    • FMT_LIM.2.1: 3
    • FMT_MTD: 27
    • FMT_MSA.3: 1
    • FMT_SMF.1: 22
    • FMT_SMR.1: 16
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 1
    • FMT_MTD.1: 5
    • FMT_MTD.3: 3
    • FMT_MTD.3.1: 1
  • FPT:
    • FPT_EMS: 4
    • FPT_TST: 2
    • FPT_EMS.1: 8
    • FPT_EMS.1.1: 3
    • FPT_EMS.1.2: 3
    • FPT_FLS.1: 4
    • FPT_TST.1: 5
    • FPT_PHP.3: 5
    • FPT_FLS.1.1: 1
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_PHP.3.1: 1
  • FTP:
    • FTP_ITC.1: 2
    • FTP_TRP.1: 2
pdf_data/st_keywords/cc_sfr/FAU
  • FAU_SAS.1: 2
  • FAU_ARP.1: 3
  • FAU_ARP: 5
  • FAU_SAA.1: 2
  • FAU_SAS: 6
  • FAU_GEN: 1
  • FAU_SAS.1: 7
  • FAU_SAS.1.1: 2
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1 2 7
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_RNG: 2
  • FCS_RNG.1: 7
  • FCS_COP.1: 4
  • FCS_COP: 9
  • FCS_CKM.1: 4
  • FCS_CKM: 3
  • FCS_RNG.1.1: 1
  • FCS_RNG.1.2: 1
  • FCS_CKM.2: 2
  • FCS_CKM.3: 2
  • FCS_CKM.4: 2
  • FCS_RND: 7
  • FCS_CKM: 21
  • FCS_COP: 34
  • FCS_CKM.1: 9
  • FCS_RND.1: 6
  • FCS_RND.1.1: 2
  • FCS_CKM.2: 3
  • FCS_COP.1: 5
  • FCS_CKM.4: 20
  • FCS_CKM.1.1: 1
  • FCS_CKM.4.1: 1
  • FCS_COP.1.1: 5
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM 3 21
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 4 9
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 2 3
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 2 20
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP 9 34
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 4 5
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ITT.1: 4
  • FDP_IFC.1: 7
  • FDP_ACC.2: 1
  • FDP_ACF.1: 4
  • FDP_ACF: 7
  • FDP_IFF.1: 5
  • FDP_ROL: 12
  • FDP_ROL.1: 3
  • FDP_ACC: 8
  • FDP_IFF: 3
  • FDP_IFC: 3
  • FDP_RIP: 36
  • FDP_RIP.1: 3
  • FDP_SDI.2: 2
  • FDP_ACF: 1
  • FDP_ITC.1: 7
  • FDP_ITC.2: 7
  • FDP_ACC.1: 7
  • FDP_ACF.1: 6
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 2
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_UCT.1: 4
  • FDP_IFC.1: 2
  • FDP_UCT.1.1: 1
  • FDP_UIT.1: 4
  • FDP_UIT.1.1: 1
  • FDP_UIT.1.2: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF 7 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 4 6
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 7 2
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_ATD: 2
  • FIA_UID: 1
  • FIA_USB: 2
  • FIA_API: 9
  • FIA_AFL: 5
  • FIA_SOS.2: 1
  • FIA_API.1: 7
  • FIA_API.1.1: 1
  • FIA_UAU.4: 5
  • FIA_UAU.5: 6
  • FIA_UAU.6: 4
  • FIA_UID: 8
  • FIA_UAU.1: 4
  • FIA_UAU: 5
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_UID.1.1: 1
  • FIA_UID.1.2: 1
  • FIA_UID.1: 6
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.4.1: 1
  • FIA_UAU.5.1: 1
  • FIA_UAU.5.2: 1
  • FIA_UAU.6.1: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID 1 8
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_LIM: 5
  • FMT_LIM.1: 13
  • FMT_LIM.2: 12
  • FMT_MSA.3: 4
  • FMT_MSA.1: 2
  • FMT_LIM.1.1: 1
  • FMT_LIM.2.1: 1
  • FMT_MSA: 14
  • FMT_MSA.2: 2
  • FMT_SMR.1: 3
  • FMT_MTD: 6
  • FMT_SMR: 1
  • FMT_SMF.1: 6
  • FMT_LIM: 7
  • FMT_LIM.1: 17
  • FMT_LIM.2: 16
  • FMT_LIM.1.1: 3
  • FMT_LIM.2.1: 3
  • FMT_MTD: 27
  • FMT_MSA.3: 1
  • FMT_SMF.1: 22
  • FMT_SMR.1: 16
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 2
  • FMT_SMR.1.2: 1
  • FMT_MTD.1: 5
  • FMT_MTD.3: 3
  • FMT_MTD.3.1: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM 5 7
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1 13 17
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1.1 1 3
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 12 16
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2.1 1 3
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 4 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD 6 27
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 6 22
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 3 16
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_FLS.1: 5
  • FPT_PHP.3: 2
  • FPT_ITT.1: 2
  • FPT_FLS: 17
  • FPT_TDC.1: 1
  • FPT_TST.1: 2
  • FPT_EMS: 4
  • FPT_TST: 2
  • FPT_EMS.1: 8
  • FPT_EMS.1.1: 3
  • FPT_EMS.1.2: 3
  • FPT_FLS.1: 4
  • FPT_TST.1: 5
  • FPT_PHP.3: 5
  • FPT_FLS.1.1: 1
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
  • FPT_PHP.3.1: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 5 4
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 2 5
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 2 5
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 4
    • interface for the secure management of applications on the smart card. The Card Manager is out of scope of current evaluation and its administrative interface is permanently disabled before TOE delivery: 1
    • and is out of the scope of current evaluation. Any other application being loaded pre-issuance is out of scope of current evaluation. 4.1.2.1 Java Card Platform The Java technology, embedded on the TOE: 1
    • of the TOE to the parties responsible of the following usage phases. Application development is out of scope of current evaluation. TOE Construction phase includes: Product Development Product: 1
    • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
pdf_data/st_keywords/cipher_mode
  • ECB:
    • ECB: 2
  • CBC:
    • CBC: 5
  • CBC:
    • CBC: 2
pdf_data/st_keywords/cipher_mode/CBC/CBC 5 2
pdf_data/st_keywords/cplc_data
  • ICFab:
    • IC Fabricator: 1
  • ICType:
    • IC Type: 1
pdf_data/st_keywords/crypto_library
  • Neslib:
    • NesLib v.3.1: 1
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 21
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 4
  • MAC:
    • MAC: 4
  • KA:
    • Key Agreement: 5
pdf_data/st_keywords/eval_facility
  • Serma:
    • Serma Technologies: 1
pdf_data/st_keywords/hash_function/SHA/SHA1
  • SHA-1: 3
  • SHA1: 2
  • SHA-1: 1
pdf_data/st_keywords/hash_function/SHA/SHA1/SHA-1 3 1
pdf_data/st_keywords/hash_function/SHA/SHA2
  • SHA-224: 2
  • SHA-256: 2
  • SHA-384: 1
  • SHA-512: 2
  • SHA224: 2
  • SHA256: 2
  • SHA384: 2
  • SHA512: 2
  • SHA-224: 2
  • SHA-256: 1
  • SHA-384: 1
  • SHA-512: 1
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-256 2 1
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-512 2 1
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.DG1: 14
    • EF.DG2: 8
    • EF.DG3: 18
    • EF.DG4: 17
    • EF.DG5: 6
    • EF.DG16: 13
    • EF.DG14: 6
    • EF.DG15: 2
    • EF.COM: 7
    • EF.SOD: 8
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 5
pdf_data/st_keywords/javacard_packages
  • java:
    • java.lang: 1
  • javacard:
    • javacard.framework: 4
    • javacard.framework.applet: 1
    • javacard.security: 23
    • javacard.security.interface: 4
  • javacardx:
    • javacardx.crypto: 1
pdf_data/st_keywords/javacard_version
  • JavaCard:
    • Java Card 3.0.4: 1
  • GlobalPlatform:
    • GlobalPlatform 2.1.1: 2
pdf_data/st_keywords/randomness/RNG
  • RND: 1
  • RNG: 4
  • RNG: 2
pdf_data/st_keywords/randomness/RNG/RNG 4 2
pdf_data/st_keywords/side_channel_analysis
  • SCA:
    • Leak-Inherent: 1
    • physical probing: 4
    • side channel: 1
    • DPA: 3
    • SPA: 1
    • timing attacks: 1
  • FI:
    • Physical tampering: 2
    • physical tampering: 1
    • Malfunction: 1
    • malfunction: 2
    • fault injection: 2
  • SCA:
    • Leak-Inherent: 1
    • physical probing: 4
    • DPA: 2
    • SPA: 1
    • timing attacks: 1
  • FI:
    • Physical Tampering: 2
    • physical tampering: 1
    • Physical tampering: 1
    • Malfunction: 3
    • malfunction: 4
    • fault injection: 1
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/side_channel_analysis/FI
  • Physical tampering: 2
  • physical tampering: 1
  • Malfunction: 1
  • malfunction: 2
  • fault injection: 2
  • Physical Tampering: 2
  • physical tampering: 1
  • Physical tampering: 1
  • Malfunction: 3
  • malfunction: 4
  • fault injection: 1
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction 1 3
pdf_data/st_keywords/side_channel_analysis/FI/Physical tampering 2 1
pdf_data/st_keywords/side_channel_analysis/FI/fault injection 2 1
pdf_data/st_keywords/side_channel_analysis/FI/malfunction 2 4
pdf_data/st_keywords/side_channel_analysis/SCA
  • Leak-Inherent: 1
  • physical probing: 4
  • side channel: 1
  • DPA: 3
  • SPA: 1
  • timing attacks: 1
  • Leak-Inherent: 1
  • physical probing: 4
  • DPA: 2
  • SPA: 1
  • timing attacks: 1
pdf_data/st_keywords/side_channel_analysis/SCA/DPA 3 2
pdf_data/st_keywords/standard_id
  • PKCS:
    • PKCS#1: 1
    • PKCS3: 1
    • PKCS1: 1
  • SCP:
    • SCP02: 1
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
  • FIPS:
    • FIPS180-2: 1
    • FIPS46-3: 1
    • FIPS PUB 46-3: 1
    • FIPS 186-3: 1
    • FIPS 180-2: 1
    • FIPS 197: 1
  • NIST:
    • SP 800-67: 1
  • PKCS:
    • PKCS#3: 4
    • PKCS#1: 2
  • RFC:
    • RFC 2631: 1
    • RFC 3369: 1
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 7816-4: 1
  • ICAO:
    • ICAO: 13
  • SCP:
    • SCP03: 2
    • SCP01: 1
    • SCP02: 1
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
pdf_data/st_keywords/standard_id/CC
  • CCMB-2009-07-001: 1
  • CCMB-2009-07-002: 1
  • CCMB-2009-07-003: 1
  • CCMB-2012-09-001: 1
  • CCMB-2012-09-002: 1
  • CCMB-2012-09-003: 1
  • CCMB-2012-09-004: 1
pdf_data/st_keywords/standard_id/PKCS
  • PKCS#1: 1
  • PKCS3: 1
  • PKCS1: 1
  • PKCS#3: 4
  • PKCS#1: 2
pdf_data/st_keywords/standard_id/PKCS/PKCS#1 1 2
pdf_data/st_keywords/standard_id/SCP
  • SCP02: 1
  • SCP03: 2
  • SCP01: 1
  • SCP02: 1
pdf_data/st_keywords/symmetric_crypto/DES/3DES
  • 3-DES: 2
  • TripleDES: 1
  • Triple-DES: 1
  • Triple-DES: 6
  • TDES: 5
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES 1 6
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES 7 1
pdf_data/st_keywords/symmetric_crypto/constructions/MAC
  • CBC-MAC: 1
  • CMAC: 2
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-03110: 1
pdf_data/st_keywords/vendor
  • STMicroelectronics:
    • STMicroelectronics: 8
    • STM: 15
  • Gemalto:
    • Gemalto: 410
pdf_data/st_metadata
  • pdf_file_size_bytes: 1236830
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 90
  • /Author: Luca Di Cosmo
  • /CreationDate: D:20150402161829+02'00'
  • /Creator: Microsoft® Word 2013
  • /ModDate: D:20150522134244+02'00'
  • /Producer: Microsoft® Word 2013
  • /Title: J-Safe_SB23YR80B_Security_Target
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 975021
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 65
  • /CreationDate: D:20140620160301+02'00'
  • /Creator: Microsoft® Office Word 2007
  • /Keywords: Security Target, CC, eTravel
  • /ModDate: D:20140807095447+02'00'
  • /Producer: Microsoft® Office Word 2007
  • /Subject:
  • /Title:
  • pdf_hyperlinks:
pdf_data/st_metadata//CreationDate D:20150402161829+02'00' D:20140620160301+02'00'
pdf_data/st_metadata//Creator Microsoft® Word 2013 Microsoft® Office Word 2007
pdf_data/st_metadata//ModDate D:20150522134244+02'00' D:20140807095447+02'00'
pdf_data/st_metadata//Producer Microsoft® Word 2013 Microsoft® Office Word 2007
pdf_data/st_metadata//Title J-Safe_SB23YR80B_Security_Target
pdf_data/st_metadata/pdf_file_size_bytes 1236830 975021
pdf_data/st_metadata/pdf_number_of_pages 90 65
dgst bb81f40b202b203a 346f6fa7f35797dc