Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Plateforme J-Safe, en configuration fermée, version 2.11.0, sur le composant SB23YR80B
ANSSI-CC-2015/16
Application eTravel EAC v2.1, en configuration EAC et SAC, sur la plateforme ouverte ou fermée MultiApp V3.1 masquée sur le composant P60D144PVA (version du patch: 1.3)
ANSSI-CC-2015/39
name Plateforme J-Safe, en configuration fermée, version 2.11.0, sur le composant SB23YR80B Application eTravel EAC v2.1, en configuration EAC et SAC, sur la plateforme ouverte ou fermée MultiApp V3.1 masquée sur le composant P60D144PVA (version du patch: 1.3)
not_valid_before 2015-05-15 2015-09-28
not_valid_after 2020-05-15 2020-09-28
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_16_Cible.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi_cible_2015-39_LITE.pdf
manufacturer Incard Division / ST Microelectronics Gemalto / NXP Semiconductors
manufacturer_web None https://www.gemalto.com/
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_16.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_39.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Java Card System Protection Profile - Closed Configuration version 3.0', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/ANSSI-CC-profil_PP-2010-07en.pdf', 'pp_ids': frozenset({'ANSSI-CC-PP-2010-07-M01'})}) frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Machine Readable Travel Document with ICAO Application Extended Access Control with PACE, Version 1.3', 'pp_eal': 'EAL4', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0056_V2b_pdf.pdf', 'pp_ids': frozenset({'MRTD_ICAO_EAC_V1.3', 'MRTD-PP_V1.10'})})
maintenance_updates frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2016, 5, 20), 'maintenance_title': 'ANSSI-CC-2015/39-M01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_39-M01.pdf', 'maintenance_st_link': None})
state/report/pdf_hash b3cb628bfac0a4bce8c004064c9f41c07d14e3f0153073a9f62e56b6d9ca3207 c5a58f8c78324cb5c6536127eb10379326c43bb8951275c614e02aea60e7271e
state/report/txt_hash 5035b7914b7ed978e1ea32111a7492b11f34256e133ad436c1f3097101f76943 e65e7a3ee4cc3baf7938f5cf133a4e94d074ce9a2114dc88cd3b48983ebadf2a
state/st/pdf_hash 36c06e10735fe312f02299921740c4a902dff2d83c7340b00c62baca0cf9fb90 595dd1017d7d702af1c1d442a96b5d8dc8f9d1f783d32428c5b07acd1a8eb4a4
state/st/txt_hash 59d15b2ee5c2ba904009f029a07f27abd7c67a347f8a2b32e4d374d6f48dcfeb 5d1cd347f14c123c055455d9fb52274d1ab68bc6874a9a6fcad6df1ee5d49095
heuristics/cert_id ANSSI-CC-2015/16 ANSSI-CC-2015/39
heuristics/extracted_versions 2.11.0 2.1, 3.1, 1.3
heuristics/report_references/directly_referenced_by ANSSI-CC-2015/17 None
heuristics/report_references/directly_referencing ANSSI-CC-2012/68 ANSSI-CC-2015/15, BSI-DSZ-CC-0845-V2-2013
heuristics/report_references/indirectly_referenced_by ANSSI-CC-2015/17 None
heuristics/report_references/indirectly_referencing ANSSI-CC-2010/01, ANSSI-CC-2009/50, ANSSI-CC-2009/62, ANSSI-CC-2009/26, ANSSI-CC-2009/06, ANSSI-CC-2010/02, ANSSI-CC-2012/68, ANSSI-CC-2009/05, ANSSI-CC-2009/51, ANSSI-CC-2009/28 BSI-DSZ-CC-0837-2013, ANSSI-CC-2015/15, BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0666-2012, BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0845-2012, ANSSI-CC-2014/06, ANSSI-CC-2014/86, BSI-DSZ-CC-0845-V2-2013
heuristics/scheme_data/cert_id 2015/16 2015/39
heuristics/scheme_data/description Le produit certifié est la « Plateforme J-Safe, en configuration fermée, version 2.11.0, sur lecomposant SB23YR80B » développée par STMicroelectronics S.r.l. – Incard Division et STMicroelectronics. La plateforme est une carte à puce offrant les modes contact, sans contact et duaux. Elle est en configuration fermée, elle ne correspond donc pas un produit utilisable en tant que tel. Elle estn Le produit certifié est la carte à puce ouverte ou fermée « MultiApp v3.1 », pouvant être en mode contact ou sans contact. Le produit est développé par la société GEMALTO et embarqué sur le microcontrôleur P60D144PVA fabriqué par la société NXP SEMICONDUCTORS. Le produit implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisation de l’aviation c
heuristics/scheme_data/developer STMicroelectronics S.r.l. - Incard Division / STMicroelectronics Gemalto / NXP Semiconductors
heuristics/scheme_data/enhanced/cc_version Critères Communs version 3.1r3 Critères Communs version 3.1r4
heuristics/scheme_data/enhanced/cert_id 2015/16 2015/39
heuristics/scheme_data/enhanced/certification_date 15/05/2015 28/09/2015
heuristics/scheme_data/enhanced/developer STMicroelectronics S.r.l. - Incard Division / STMicroelectronics Gemalto / NXP Semiconductors
heuristics/scheme_data/enhanced/mutual_recognition SOG-IS CCRA
heuristics/scheme_data/enhanced/protection_profile PP JCS PP EAC PACE, PP SAC]
heuristics/scheme_data/enhanced/report_link https://cyber.gouv.fr/sites/default/files/2015/05/ANSSI-CC-2015_16.pdf https://cyber.gouv.fr/sites/default/files/2015/10/ANSSI-CC-2015_39.pdf
heuristics/scheme_data/enhanced/sponsor STMicroelectronics S.r.l. - Incard Division Gemalto
heuristics/scheme_data/enhanced/target_link https://cyber.gouv.fr/sites/default/files/2015/05/ANSSI-CC-2015_16_Cible.pdf https://cyber.gouv.fr/sites/default/files/2015/10/anssi_cible_2015-39_LITE.pdf
heuristics/scheme_data/product Plateforme J-Safe, en configuration fermée, version 2.11.0, sur le composant SB23YR80B Application eTravel EAC v2.1, en configuration EAC et SAC, sur la plateforme ouverte ou fermée MultiApp V3.1 masquée sur le composant P60D144PVA
heuristics/scheme_data/sponsor STMicroelectronics S.r.l. - Incard Division Gemalto
heuristics/scheme_data/url https://cyber.gouv.fr/produits-certifies/plateforme-j-safe-en-configuration-fermee-version-2110-sur-le-composant https://cyber.gouv.fr/produits-certifies/application-etravel-eac-v21-en-configuration-eac-et-sac-sur-la-plateforme-0
heuristics/st_references/directly_referencing ANSSI-CC-2012/68 BSI-DSZ-CC-0845-V2-2013
heuristics/st_references/indirectly_referencing ANSSI-CC-2012/68 BSI-DSZ-CC-0845-V2-2013
pdf_data/report_filename ANSSI-CC-2015_16.pdf ANSSI-CC-2015_39.pdf
pdf_data/report_frontpage/FR/cc_version Critères Communs version 3.1 révision 3 Critères Communs version 3.1 révision 4
pdf_data/report_frontpage/FR/cert_id ANSSI-CC-2015/16 ANSSI-CC-2015/39
pdf_data/report_frontpage/FR/cert_item Plateforme J-Safe, en configuration fermée, version 2.11.0, sur le composant SB23YR80B Application eTravel EAC v2.1, en configuration EAC et SAC, sur la plateforme ouverte ou fermée MultiApp V3.1 masquée sur le composant P60D144PVA
pdf_data/report_frontpage/FR/cert_item_version Version 2.11.0 Version de l’application eTravel EAC : 2.1 Version de la plateforme Java Card MultiApp : 3.1 Version du patch : 1.3
pdf_data/report_frontpage/FR/developer STMicroelectronics S.r.l. – Incard Division Z.I Marcianise Sud, 81025 Marcianise, Italie STMicroelectronics 29 Boulevard Romain Rolland, 75669 Paris Cedex 14, France Commanditaire STMicroelectronics S.r.l. – Incard Division Z.I Marcianise Sud, 81025 Marcianise, Italie Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France NXP Semiconductors Box 54 02 40, D-22502 Hambourg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France
pdf_data/report_frontpage/FR/ref_protection_profiles PP JCS] Java Card protection profile – closed configuration, version 3.0 BSI-CC-PP-0056-V2, [PP EAC PACE], version 1.3.1 Machine Readable Travel Document with ICAO Application, BSI-CC-PP-0068-V2, [PP SAC], version 1.0 Machine Readable Travel Document using Standard Inspection Procedure with PACE
pdf_data/report_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2015/16: 16
    • ANSSI-CC-2012/68: 2
    • ANSSI-CC-2012/68-S02: 1
  • DE:
    • BSI-DSZ-CC-0845-V2-2013: 3
  • FR:
    • ANSSI-CC-2015/39: 23
    • ANSSI-CC-2015/15: 3
pdf_data/report_keywords/cc_cert_id/FR
  • ANSSI-CC-2015/16: 16
  • ANSSI-CC-2012/68: 2
  • ANSSI-CC-2012/68-S02: 1
  • ANSSI-CC-2015/39: 23
  • ANSSI-CC-2015/15: 3
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0035-2007: 1
  • ANSSI:
    • ANSSI-CC-PP-: 1
    • ANSSI-CC-PP-2010/07-M01: 1
  • BSI:
    • BSI-CC-PP-0056-V2: 1
    • BSI-CC-PP-0068-V2: 1
    • BSI-PP-0035-2007: 2
    • BSI-CC-PP- 0056-V2-2012-MA-01: 1
    • BSI-CC-PP-0068-V2-2011: 1
    • BSI-PP-0035-: 1
pdf_data/report_keywords/cc_protection_profile_id/BSI
  • BSI-PP-0035-2007: 1
  • BSI-CC-PP-0056-V2: 1
  • BSI-CC-PP-0068-V2: 1
  • BSI-PP-0035-2007: 2
  • BSI-CC-PP- 0056-V2-2012-MA-01: 1
  • BSI-CC-PP-0068-V2-2011: 1
  • BSI-PP-0035-: 1
pdf_data/report_keywords/cc_protection_profile_id/BSI/BSI-PP-0035-2007 1 2
pdf_data/report_keywords/cc_sar/AGD/AGD_OPE 1 2
pdf_data/report_keywords/cc_sar/AGD/AGD_PRE 1 3
pdf_data/report_keywords/cc_sar/ASE
  • ASE_CCL: 1
  • ASE_ECD: 1
  • ASE_INT: 1
  • ASE_OBJ: 1
  • ASE_REQ: 1
  • ASE_SPD: 1
  • ASE_TSS: 1
  • ASE_TSS.2: 1
  • ASE_CCL: 1
  • ASE_ECD: 1
  • ASE_INT: 1
  • ASE_OBJ: 1
  • ASE_REQ: 1
  • ASE_SPD: 1
  • ASE_TSS: 1
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN.5 4 5
pdf_data/report_keywords/crypto_protocol
  • PACE:
    • PACE: 8
pdf_data/report_keywords/eval_facility
  • Serma:
    • Serma Technologies: 1
  • Serma:
    • Serma Technologies: 3
  • CESTI:
    • CESTI: 1
pdf_data/report_keywords/eval_facility/Serma/Serma Technologies 1 3
pdf_data/report_keywords/standard_id
  • ICAO:
    • ICAO: 3
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
pdf_data/report_keywords/vendor
  • STMicroelectronics:
    • STMicroelectronics: 6
  • NXP:
    • NXP Semiconductors: 3
    • NXP: 3
  • Gemalto:
    • Gemalto: 27
pdf_data/report_metadata//Author Administrateur
pdf_data/report_metadata//CreationDate D:20150522134001+02'00'
pdf_data/report_metadata//Creator Microsoft® Word 2010 PDFCreator Version 1.2.1
pdf_data/report_metadata//Keywords ANSSI-CC-CER-F-07.016
pdf_data/report_metadata//ModDate D:20150522134001+02'00'
pdf_data/report_metadata//Producer Microsoft® Word 2010 GPL Ghostscript 9.02
pdf_data/report_metadata//Subject Plateforme J-Safe, en configuration fermée, version 2.11.0, sur le composant SB23YR80B
pdf_data/report_metadata//Title ANSSI-CC-2015/16 Rapport ANSSI-CC-2015_39
pdf_data/report_metadata/pdf_file_size_bytes 579179 295104
pdf_data/report_metadata/pdf_hyperlinks http://www.ssi.gouv.fr/, mailto:[email protected]
pdf_data/report_metadata/pdf_number_of_pages 15 22
pdf_data/st_filename ANSSI-CC-2015_16_Cible.pdf anssi_cible_2015-39_LITE.pdf
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 1
  • FF:
    • DH:
      • Diffie-Hellman: 5
    • DSA:
      • DSA: 1
  • RSA:
    • RSA 1024: 1
  • ECC:
    • ECDH:
      • ECDH: 8
    • ECDSA:
      • ECDSA: 2
    • ECC:
      • ECC: 2
  • FF:
    • DH:
      • Diffie-Hellman: 9
      • DH: 6
pdf_data/st_keywords/asymmetric_crypto/ECC
  • ECDSA:
    • ECDSA: 1
  • ECDH:
    • ECDH: 8
  • ECDSA:
    • ECDSA: 2
  • ECC:
    • ECC: 2
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA 1 2
pdf_data/st_keywords/asymmetric_crypto/FF
  • DH:
    • Diffie-Hellman: 5
  • DSA:
    • DSA: 1
  • DH:
    • Diffie-Hellman: 9
    • DH: 6
pdf_data/st_keywords/asymmetric_crypto/FF/DH
  • Diffie-Hellman: 5
  • Diffie-Hellman: 9
  • DH: 6
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman 5 9
pdf_data/st_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2012/68: 2
  • DE:
    • BSI-DSZ-CC-0845-V2-2013: 2
    • BSI-DSZ-CC-0837-2013-MA-01: 2
  • NL:
    • CC-1: 6
    • CC-2: 6
    • CC-3: 3
pdf_data/st_keywords/cc_claims
  • D:
    • D.APP_CODE: 6
    • D.APP_C_DATA: 3
    • D.APP_I_DATA: 4
    • D.PIN: 9
    • D.API_DATA: 3
    • D.CRYPTO: 6
    • D.JCS_CODE: 4
    • D.JCS_DATA: 6
    • D.SEC_DATA: 5
    • D.EMBEDDED_SW_CODE: 4
    • D.EMBEDDED_SW_DATA: 4
    • D.GP_CODE: 3
    • D.GP_SENSITIVE_DATA: 3
  • O:
    • O.SCP: 65
    • O.SIDE_CHANNEL: 10
    • O.LIFE_CYCLE: 12
    • O.RND: 1
    • O.CIPHER: 40
    • O.SID: 25
    • O.GLOBAL_ARRAYS_CONFID: 15
    • O.NATIVE: 12
    • O.REALLOCATION: 9
    • O.KEY_MNGT: 1
    • O.TRANSACTION: 16
    • O.OPERATE: 34
    • O.ROLES: 7
    • O.FIREWALL: 26
    • O.GLOBAL_ARRAYS_INTEG: 8
    • O.RESOURCES: 9
    • O.ALARM: 21
    • O.KEY-MNGT: 15
    • O.PIN-MNGT: 13
    • O.OBJ-DELETION: 6
    • O.APPLET: 1
    • O.JAVAOBJECT: 20
    • O.GP_REGISTRY: 10
    • O.JAVA: 3
    • O.JAVAOB: 2
    • O.OBJ-DEL: 1
  • T:
    • T.LIFE_CYCLE: 7
    • T.PHYSICAL: 9
    • T.CONFID-APPLI-DATA: 17
    • T.CONFID-JCS-CODE: 6
    • T.CONFID-JCS-DATA: 11
    • T.INTEG-APPLI-CODE: 10
    • T.INTEG-APPLI-DATA: 21
    • T.INTEG-JCS-CODE: 6
    • T.INTEG-JCS-DATA: 10
    • T.SID: 16
    • T.EXE-CODE: 9
    • T.NATIVE: 4
    • T.RESOURCES: 7
    • T.OBJ-DELETION: 4
    • T.LEAKAGE: 1
    • T.INTEG-: 1
  • A:
    • A.XXX: 1
    • A.VERIFICATION: 4
    • A.NO-INSTALL: 5
    • A.NO-DELETION: 5
  • R:
    • R.JAVA: 5
  • OP:
    • OP.ARRAY_ACCESS: 4
    • OP.CREATE: 7
    • OP.INSTANCE_FIELD: 4
    • OP.INVK_VIRTUAL: 6
    • OP.INVK_INTERFACE: 7
    • OP.JAVA: 5
    • OP.THROW: 5
    • OP.TYPE_ACCESS: 5
    • OP.PUT: 6
    • OP.MANAGE_APP_LIFE_CYC: 1
    • OP.GET_CARD_LIFE_CYCLE_: 1
    • OP.CARD_LOCK: 4
    • OP.CARD_TERMINATE: 4
    • OP.MANAGE_APP_LIFE_CYCLE_STATE: 3
    • OP.GET_CARD_LIFE_CYCLE_STATE: 2
  • OE:
    • OE.SCP: 3
    • OE.NO-DELETION: 6
    • OE.VERIFICATION: 32
    • OE.CARD_MANAGEMENT: 16
    • OE.NO-INSTALL: 5
    • OE.MANAGEMENT_OF_SECRETS: 3
    • OE.CARD-MANAGEMENT: 12
  • OSP:
    • OSP.CARD_ADMINISTRATION_DISABLED: 5
    • OSP.MANAGEMENT_OF_SECRETS: 6
    • OSP.ROLES: 5
    • OSP.VERIFICATION: 5
  • OE:
    • OE.BAC-PP: 1
pdf_data/st_keywords/cc_claims/OE
  • OE.SCP: 3
  • OE.NO-DELETION: 6
  • OE.VERIFICATION: 32
  • OE.CARD_MANAGEMENT: 16
  • OE.NO-INSTALL: 5
  • OE.MANAGEMENT_OF_SECRETS: 3
  • OE.CARD-MANAGEMENT: 12
  • OE.BAC-PP: 1
pdf_data/st_keywords/cc_protection_profile_id/BSI
  • BSI-CC-PP-0055: 2
  • BSI-PP- 0035: 2
  • BSI-PP-0002: 1
  • BSI-PP-0035: 1
  • BSI-CC-PP-0056-V2-2012: 1
  • BSI-CC-PP-0068-V2-2011: 1
  • BSI-PP-0055: 1
pdf_data/st_keywords/cc_sar/ADV
  • ADV_FSP.5: 9
  • ADV_ARC.1: 7
  • ADV_TDS.4: 9
  • ADV_IMP.1: 10
  • ADV_INT.2: 2
  • ADV_FSP.1: 4
  • ADV_TDS.1: 2
  • ADV_TDS.3: 4
  • ADV_FSP.2: 2
  • ADV_FSP.4: 1
  • ADV_ARC.1: 2
  • ADV_FSP.4: 1
  • ADV_TDS.3: 1
  • ADV_IMP.1: 1
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 7 2
pdf_data/st_keywords/cc_sar/ADV/ADV_IMP.1 10 1
pdf_data/st_keywords/cc_sar/ADV/ADV_TDS.3 4 1
pdf_data/st_keywords/cc_sar/AGD/AGD_OPE.1 7 1
pdf_data/st_keywords/cc_sar/AGD/AGD_PRE.1 7 1
pdf_data/st_keywords/cc_sar/ALC
  • ALC_DVS.2: 9
  • ALC_CMC.4: 2
  • ALC_CMS.5: 1
  • ALC_LCD.1: 4
  • ALC_TAT.2: 4
  • ALC_DVS.1: 3
  • ALC_TAT.1: 2
  • ALC_CMS.1: 1
  • ALC_CMS.4: 1
  • ALC_DEL.1: 1
  • ALC_DVS.2: 4
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 9 4
pdf_data/st_keywords/cc_sar/ASE
  • ASE_CCL: 2
  • ASE_SPD: 2
  • ASE_OBJ: 2
  • ASE_ECD: 2
  • ASE_REQ: 2
  • ASE_TSS: 2
  • ASE_CCL.1: 2
  • ASE_ECD.1: 5
  • ASE_INT.1: 6
  • ASE_OBJ.2: 4
  • ASE_REQ.2: 3
  • ASE_SPD.1: 3
  • ASE_TSS.1: 2
  • ASE_REQ.1: 2
  • ASE_ECD: 1
pdf_data/st_keywords/cc_sar/ASE/ASE_ECD 2 1
pdf_data/st_keywords/cc_sar/ATE
  • ATE_COV.2: 4
  • ATE_DPT.3: 2
  • ATE_FUN.1: 7
  • ATE_IND.2: 1
  • ATE_COV.1: 2
  • ATE_DPT.1: 1
  • ATE_DPT.1: 1
pdf_data/st_keywords/cc_sar/AVA
  • AVA_VAN.5: 9
  • AVA_VAN.4: 1
  • AVA_VAN.3: 1
  • AVA_VAN.5: 4
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.5 9 4
pdf_data/st_keywords/cc_security_level/EAL
  • EAL5+: 3
  • EAL4+: 1
  • EAL5: 12
  • EAL5 augmented: 2
  • EAL5: 5
  • EAL 6+: 1
  • EAL5 augmented: 1
pdf_data/st_keywords/cc_security_level/EAL/EAL5 12 5
pdf_data/st_keywords/cc_security_level/EAL/EAL5 augmented 2 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_SAS.1: 2
    • FAU_ARP.1: 3
    • FAU_ARP: 5
    • FAU_SAA.1: 2
  • FCS:
    • FCS_RNG: 2
    • FCS_RNG.1: 7
    • FCS_COP.1: 4
    • FCS_COP: 9
    • FCS_CKM.1: 4
    • FCS_CKM: 3
    • FCS_RNG.1.1: 1
    • FCS_RNG.1.2: 1
    • FCS_CKM.2: 2
    • FCS_CKM.3: 2
    • FCS_CKM.4: 2
  • FDP:
    • FDP_ITT.1: 4
    • FDP_IFC.1: 7
    • FDP_ACC.2: 1
    • FDP_ACF.1: 4
    • FDP_ACF: 7
    • FDP_IFF.1: 5
    • FDP_ROL: 12
    • FDP_ROL.1: 3
    • FDP_ACC: 8
    • FDP_IFF: 3
    • FDP_IFC: 3
    • FDP_RIP: 36
    • FDP_RIP.1: 3
    • FDP_SDI.2: 2
  • FIA:
    • FIA_ATD: 2
    • FIA_UID: 1
    • FIA_USB: 2
  • FMT:
    • FMT_LIM: 5
    • FMT_LIM.1: 13
    • FMT_LIM.2: 12
    • FMT_MSA.3: 4
    • FMT_MSA.1: 2
    • FMT_LIM.1.1: 1
    • FMT_LIM.2.1: 1
    • FMT_MSA: 14
    • FMT_MSA.2: 2
    • FMT_SMR.1: 3
    • FMT_MTD: 6
    • FMT_SMR: 1
    • FMT_SMF.1: 6
  • FPR:
    • FPR_UNO.1: 3
  • FPT:
    • FPT_FLS.1: 5
    • FPT_PHP.3: 2
    • FPT_ITT.1: 2
    • FPT_FLS: 17
    • FPT_TDC.1: 1
    • FPT_TST.1: 2
  • FRU:
    • FRU_FLT.2: 3
  • FAU:
    • FAU_SAS: 6
    • FAU_GEN: 1
    • FAU_SAS.1: 14
    • FAU_SAS.1.1: 2
  • FCS:
    • FCS_RND: 7
    • FCS_CKM: 53
    • FCS_COP: 78
    • FCS_CKM.1: 20
    • FCS_RND.1: 16
    • FCS_RND.1.1: 2
    • FCS_CKM.2: 8
    • FCS_COP.1: 11
    • FCS_CKM.4: 55
    • FCS_CKM.1.1: 2
    • FCS_CKM.4.1: 1
    • FCS_COP.1.1: 7
  • FDP:
    • FDP_ACF: 13
    • FDP_ITC.1: 16
    • FDP_ITC.2: 16
    • FDP_ACC.1: 7
    • FDP_ACC: 16
    • FDP_ACF.1: 10
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_RIP.1: 9
    • FDP_RIP.1.1: 1
    • FDP_UCT.1: 3
    • FDP_UCT: 7
    • FDP_IFC.1: 4
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 3
    • FDP_UIT: 7
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_API: 17
    • FIA_AFL: 22
    • FIA_SOS.2: 1
    • FIA_API.1: 7
    • FIA_API.1.1: 1
    • FIA_UAU.4: 3
    • FIA_UAU: 75
    • FIA_UAU.1: 5
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_UID: 26
    • FIA_UID.1.1: 2
    • FIA_UID.1.2: 2
    • FIA_UID.1: 7
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UAU.4.1: 1
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.5: 4
    • FIA_UAU.6.1: 2
    • FIA_UAU.6: 1
  • FMT:
    • FMT_LIM: 7
    • FMT_LIM.1: 22
    • FMT_LIM.2: 20
    • FMT_LIM.1.1: 3
    • FMT_LIM.2.1: 3
    • FMT_MTD: 75
    • FMT_MSA.3: 3
    • FMT_SMF.1: 50
    • FMT_SMR.1: 2
    • FMT_SMF.1.1: 1
    • FMT_SMR: 33
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 1
    • FMT_MTD.1: 14
    • FMT_MTD.1.1: 1
    • FMT_MTD.3: 8
    • FMT_MTD.3.1: 1
    • FMT_MSA.1: 1
  • FPT:
    • FPT_EMS: 4
    • FPT_TST: 2
    • FPT_EMS.1: 14
    • FPT_EMS.1.1: 3
    • FPT_EMS.1.2: 3
    • FPT_FLS.1: 11
    • FPT_TST.1: 11
    • FPT_PHP.3: 13
    • FPT_FLS.1.1: 1
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_PHP.3.1: 1
  • FTP:
    • FTP_ITC.1: 4
    • FTP_TRP.1: 4
    • FTP_ITC: 14
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
pdf_data/st_keywords/cc_sfr/FAU
  • FAU_SAS.1: 2
  • FAU_ARP.1: 3
  • FAU_ARP: 5
  • FAU_SAA.1: 2
  • FAU_SAS: 6
  • FAU_GEN: 1
  • FAU_SAS.1: 14
  • FAU_SAS.1.1: 2
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1 2 14
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_RNG: 2
  • FCS_RNG.1: 7
  • FCS_COP.1: 4
  • FCS_COP: 9
  • FCS_CKM.1: 4
  • FCS_CKM: 3
  • FCS_RNG.1.1: 1
  • FCS_RNG.1.2: 1
  • FCS_CKM.2: 2
  • FCS_CKM.3: 2
  • FCS_CKM.4: 2
  • FCS_RND: 7
  • FCS_CKM: 53
  • FCS_COP: 78
  • FCS_CKM.1: 20
  • FCS_RND.1: 16
  • FCS_RND.1.1: 2
  • FCS_CKM.2: 8
  • FCS_COP.1: 11
  • FCS_CKM.4: 55
  • FCS_CKM.1.1: 2
  • FCS_CKM.4.1: 1
  • FCS_COP.1.1: 7
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM 3 53
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 4 20
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 2 8
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 2 55
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP 9 78
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 4 11
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ITT.1: 4
  • FDP_IFC.1: 7
  • FDP_ACC.2: 1
  • FDP_ACF.1: 4
  • FDP_ACF: 7
  • FDP_IFF.1: 5
  • FDP_ROL: 12
  • FDP_ROL.1: 3
  • FDP_ACC: 8
  • FDP_IFF: 3
  • FDP_IFC: 3
  • FDP_RIP: 36
  • FDP_RIP.1: 3
  • FDP_SDI.2: 2
  • FDP_ACF: 13
  • FDP_ITC.1: 16
  • FDP_ITC.2: 16
  • FDP_ACC.1: 7
  • FDP_ACC: 16
  • FDP_ACF.1: 10
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 2
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_RIP.1: 9
  • FDP_RIP.1.1: 1
  • FDP_UCT.1: 3
  • FDP_UCT: 7
  • FDP_IFC.1: 4
  • FDP_UCT.1.1: 1
  • FDP_UIT.1: 3
  • FDP_UIT: 7
  • FDP_UIT.1.1: 1
  • FDP_UIT.1.2: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC 8 16
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF 7 13
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 4 10
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 7 4
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 3 9
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_ATD: 2
  • FIA_UID: 1
  • FIA_USB: 2
  • FIA_API: 17
  • FIA_AFL: 22
  • FIA_SOS.2: 1
  • FIA_API.1: 7
  • FIA_API.1.1: 1
  • FIA_UAU.4: 3
  • FIA_UAU: 75
  • FIA_UAU.1: 5
  • FIA_AFL.1.1: 2
  • FIA_AFL.1.2: 2
  • FIA_UID: 26
  • FIA_UID.1.1: 2
  • FIA_UID.1.2: 2
  • FIA_UID.1: 7
  • FIA_UAU.1.1: 2
  • FIA_UAU.1.2: 2
  • FIA_UAU.4.1: 1
  • FIA_UAU.5.1: 1
  • FIA_UAU.5.2: 1
  • FIA_UAU.5: 4
  • FIA_UAU.6.1: 2
  • FIA_UAU.6: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID 1 26
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_LIM: 5
  • FMT_LIM.1: 13
  • FMT_LIM.2: 12
  • FMT_MSA.3: 4
  • FMT_MSA.1: 2
  • FMT_LIM.1.1: 1
  • FMT_LIM.2.1: 1
  • FMT_MSA: 14
  • FMT_MSA.2: 2
  • FMT_SMR.1: 3
  • FMT_MTD: 6
  • FMT_SMR: 1
  • FMT_SMF.1: 6
  • FMT_LIM: 7
  • FMT_LIM.1: 22
  • FMT_LIM.2: 20
  • FMT_LIM.1.1: 3
  • FMT_LIM.2.1: 3
  • FMT_MTD: 75
  • FMT_MSA.3: 3
  • FMT_SMF.1: 50
  • FMT_SMR.1: 2
  • FMT_SMF.1.1: 1
  • FMT_SMR: 33
  • FMT_SMR.1.1: 2
  • FMT_SMR.1.2: 1
  • FMT_MTD.1: 14
  • FMT_MTD.1.1: 1
  • FMT_MTD.3: 8
  • FMT_MTD.3.1: 1
  • FMT_MSA.1: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM 5 7
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1 13 22
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1.1 1 3
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 12 20
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2.1 1 3
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 2 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 4 3
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD 6 75
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 6 50
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR 1 33
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 3 2
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_FLS.1: 5
  • FPT_PHP.3: 2
  • FPT_ITT.1: 2
  • FPT_FLS: 17
  • FPT_TDC.1: 1
  • FPT_TST.1: 2
  • FPT_EMS: 4
  • FPT_TST: 2
  • FPT_EMS.1: 14
  • FPT_EMS.1.1: 3
  • FPT_EMS.1.2: 3
  • FPT_FLS.1: 11
  • FPT_TST.1: 11
  • FPT_PHP.3: 13
  • FPT_FLS.1.1: 1
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
  • FPT_PHP.3.1: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 5 11
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 2 13
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 2 11
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 4
    • interface for the secure management of applications on the smart card. The Card Manager is out of scope of current evaluation and its administrative interface is permanently disabled before TOE delivery: 1
    • and is out of the scope of current evaluation. Any other application being loaded pre-issuance is out of scope of current evaluation. 4.1.2.1 Java Card Platform The Java technology, embedded on the TOE: 1
    • of the TOE to the parties responsible of the following usage phases. Application development is out of scope of current evaluation. TOE Construction phase includes: Product Development Product: 1
    • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
pdf_data/st_keywords/cipher_mode
  • ECB:
    • ECB: 2
  • CBC:
    • CBC: 5
  • CBC:
    • CBC: 4
pdf_data/st_keywords/cipher_mode/CBC/CBC 5 4
pdf_data/st_keywords/crypto_library
  • Neslib:
    • NesLib v.3.1: 1
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 107
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 4
  • MAC:
    • MAC: 6
  • KA:
    • Key Agreement: 8
pdf_data/st_keywords/crypto_scheme/MAC/MAC 4 6
pdf_data/st_keywords/eval_facility
  • Serma:
    • SERMA: 1
pdf_data/st_keywords/hash_function/SHA
  • SHA1:
    • SHA-1: 3
    • SHA1: 2
  • SHA2:
    • SHA-224: 2
    • SHA-256: 2
    • SHA-384: 1
    • SHA-512: 2
    • SHA224: 2
    • SHA256: 2
    • SHA384: 2
    • SHA512: 2
  • SHA2:
    • SHA-224: 1
pdf_data/st_keywords/hash_function/SHA/SHA2
  • SHA-224: 2
  • SHA-256: 2
  • SHA-384: 1
  • SHA-512: 2
  • SHA224: 2
  • SHA256: 2
  • SHA384: 2
  • SHA512: 2
  • SHA-224: 1
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-224 2 1
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.DG1: 11
    • EF.DG2: 5
    • EF.DG3: 11
    • EF.DG4: 11
    • EF.DG5: 3
    • EF.DG16: 9
    • EF.DG14: 5
    • EF.DG15: 2
    • EF.COM: 3
    • EF.SOD: 4
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 5
pdf_data/st_keywords/javacard_packages
  • java:
    • java.lang: 1
  • javacard:
    • javacard.framework: 4
    • javacard.framework.applet: 1
    • javacard.security: 23
    • javacard.security.interface: 4
  • javacardx:
    • javacardx.crypto: 1
pdf_data/st_keywords/javacard_version
  • JavaCard:
    • Java Card 3.0.4: 1
  • GlobalPlatform:
    • GlobalPlatform 2.1.1: 2
pdf_data/st_keywords/randomness/RNG
  • RND: 1
  • RNG: 4
  • RNG: 3
pdf_data/st_keywords/randomness/RNG/RNG 4 3
pdf_data/st_keywords/side_channel_analysis
  • SCA:
    • Leak-Inherent: 1
    • physical probing: 4
    • side channel: 1
    • DPA: 3
    • SPA: 1
    • timing attacks: 1
  • FI:
    • Physical tampering: 2
    • physical tampering: 1
    • Malfunction: 1
    • malfunction: 2
    • fault injection: 2
  • SCA:
    • Leak-Inherent: 2
    • physical probing: 3
    • DPA: 2
    • SPA: 1
    • timing attacks: 1
  • FI:
    • Physical Tampering: 3
    • Physical tampering: 2
    • Malfunction: 5
    • malfunction: 6
    • fault injection: 1
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/side_channel_analysis/FI
  • Physical tampering: 2
  • physical tampering: 1
  • Malfunction: 1
  • malfunction: 2
  • fault injection: 2
  • Physical Tampering: 3
  • Physical tampering: 2
  • Malfunction: 5
  • malfunction: 6
  • fault injection: 1
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction 1 5
pdf_data/st_keywords/side_channel_analysis/FI/fault injection 2 1
pdf_data/st_keywords/side_channel_analysis/FI/malfunction 2 6
pdf_data/st_keywords/side_channel_analysis/SCA
  • Leak-Inherent: 1
  • physical probing: 4
  • side channel: 1
  • DPA: 3
  • SPA: 1
  • timing attacks: 1
  • Leak-Inherent: 2
  • physical probing: 3
  • DPA: 2
  • SPA: 1
  • timing attacks: 1
pdf_data/st_keywords/side_channel_analysis/SCA/DPA 3 2
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent 1 2
pdf_data/st_keywords/side_channel_analysis/SCA/physical probing 4 3
pdf_data/st_keywords/standard_id
  • PKCS:
    • PKCS#1: 1
    • PKCS3: 1
    • PKCS1: 1
  • SCP:
    • SCP02: 1
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
  • FIPS:
    • FIPS180-2: 1
    • FIPS46-3: 1
    • FIPS PUB 46-3: 1
    • FIPS 186-3: 1
    • FIPS 46-3: 1
    • FIPS 197: 1
  • NIST:
    • SP 800-67: 1
  • PKCS:
    • PKCS#3: 4
    • PKCS#1: 2
  • RFC:
    • RFC 2631: 1
    • RFC 3369: 1
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 7816-4: 1
  • ICAO:
    • ICAO: 15
  • SCP:
    • SCP03: 2
    • SCP01: 1
    • SCP02: 1
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
pdf_data/st_keywords/standard_id/CC
  • CCMB-2009-07-001: 1
  • CCMB-2009-07-002: 1
  • CCMB-2009-07-003: 1
  • CCMB-2012-09-001: 1
  • CCMB-2012-09-002: 1
  • CCMB-2012-09-003: 1
  • CCMB-2012-09-004: 1
pdf_data/st_keywords/standard_id/PKCS
  • PKCS#1: 1
  • PKCS3: 1
  • PKCS1: 1
  • PKCS#3: 4
  • PKCS#1: 2
pdf_data/st_keywords/standard_id/PKCS/PKCS#1 1 2
pdf_data/st_keywords/standard_id/SCP
  • SCP02: 1
  • SCP03: 2
  • SCP01: 1
  • SCP02: 1
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 7 12
pdf_data/st_keywords/symmetric_crypto/DES/3DES
  • 3-DES: 2
  • TripleDES: 1
  • Triple-DES: 1
  • Triple-DES: 7
  • TDES: 7
  • 3DES: 2
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES 1 7
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES 7 1
pdf_data/st_keywords/symmetric_crypto/constructions/MAC
  • CBC-MAC: 1
  • KMAC: 2
  • CMAC: 3
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-03110: 1
pdf_data/st_keywords/vendor
  • STMicroelectronics:
    • STMicroelectronics: 8
    • STM: 15
  • NXP:
    • NXP: 15
  • Gemalto:
    • Gemalto: 109
pdf_data/st_metadata
  • pdf_file_size_bytes: 1236830
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 90
  • /Author: Luca Di Cosmo
  • /CreationDate: D:20150402161829+02'00'
  • /Creator: Microsoft® Word 2013
  • /ModDate: D:20150522134244+02'00'
  • /Producer: Microsoft® Word 2013
  • /Title: J-Safe_SB23YR80B_Security_Target
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 1645397
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 89
  • /Title: eTravel EAC v2 Security Target
  • /Author: Antoine de Lavernette
  • /Subject: MRTD
  • /Keywords: Security Target, CC, eTravel
  • /Creator: Microsoft® Office Word 2007
  • /CreationDate: D:20150106172306+01'00'
  • /ModDate: D:20150106172306+01'00'
  • /Producer: Microsoft® Office Word 2007
  • pdf_hyperlinks:
pdf_data/st_metadata//Author Luca Di Cosmo Antoine de Lavernette
pdf_data/st_metadata//CreationDate D:20150402161829+02'00' D:20150106172306+01'00'
pdf_data/st_metadata//Creator Microsoft® Word 2013 Microsoft® Office Word 2007
pdf_data/st_metadata//ModDate D:20150522134244+02'00' D:20150106172306+01'00'
pdf_data/st_metadata//Producer Microsoft® Word 2013 Microsoft® Office Word 2007
pdf_data/st_metadata//Title J-Safe_SB23YR80B_Security_Target eTravel EAC v2 Security Target
pdf_data/st_metadata/pdf_file_size_bytes 1236830 1645397
pdf_data/st_metadata/pdf_number_of_pages 90 89
dgst bb81f40b202b203a 56b72a8258d8d420