Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Microsoft SQL Server 2014 Database Engine Enterprise Edition x64 (English)12.0.2000.8
JISEC-CC-CRP-C0475
Plateforme Upteq NFC 2.1.3_Generic sur le composant ST33F1ME avec application DESFIRE 1.1 (S1124940, release C)
ANSSI-CC-2014/88
name Microsoft SQL Server 2014 Database Engine Enterprise Edition x64 (English)12.0.2000.8 Plateforme Upteq NFC 2.1.3_Generic sur le composant ST33F1ME avec application DESFIRE 1.1 (S1124940, release C)
category Databases ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme JP FR
not_valid_after 01.07.2020 17.12.2019
not_valid_before 16.06.2015 17.12.2014
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0475_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2014_88.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0475_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI_cible2014_88_LITE.pdf
manufacturer Microsoft Corporation Gemalto / STMicroelectronics
manufacturer_web https://www.microsoft.com https://www.gemalto.com/
security_level EAL2+, ALC_FLR.2 ALC_DVS.2, EAL4+, AVA_VAN.5
dgst c225189611bed8f2 276ef5ffa7d5941c
heuristics/cert_id JISEC-CC-CRP-C0475 ANSSI-CC-2014/88
heuristics/cert_lab [] THALES
heuristics/extracted_sars ALC_CMS.2, ALC_DEL.1, ATE_IND.2, ATE_COV.1, ADV_ARC.1, AVA_VAN.2, ADV_FSP.2, ALC_FLR.2, AGD_PRE.1 ALC_DVS.2, AVA_VAN.5
heuristics/extracted_versions 12.0.2000.8 2.1.3, 1.1
heuristics/report_references/directly_referencing {} ANSSI-CC-2011/07
heuristics/report_references/indirectly_referencing {} ANSSI-CC-2010/50, ANSSI-CC-2010/49, ANSSI-CC-2011/07
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0475
  • certification_date: 01.06.2015
  • claim: EAL2+ ALC_FLR.2 PP
  • enhanced:
    • assurance_level: EAL2 Augmented with ALC_FLR.2
    • cc_version: 3.1 Release4
    • cert_link: https://www.ipa.go.jp/en/security/c0475_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is the database engine of SQL Server 2014. SQL Server is a Database Management System (DBMS). The TOE has been developed as the core module of the DBMS to store and manage data in a secure way. TOE security functionality This TOE provides the following security functionality: - The Access Control function of the TOE controls the access of users to user data and metadata stored in the TOE. - The Session Handling function of the TOE limits the possibilities of users to establish sessions with the TOE. - The Security Audit function of the TOE produces log files about all security relevant events. - The Security Management function allows authorized administrators to manage the behavior of the security functionality of the TOE. - The Identification and Authentication function of the TOE is able to identify and authenticate users. - The Residual Information Protection function of the TOE overwrites the residual information on the memory that will be used for user sessions.
    • evaluation_facility: TÜV Informationstechnik GmbH, Evaluation Body for IT-Security
    • product: Microsoft SQL Server 2014 Database Engine Enterprise Edition x64 (English)
    • product_type: Database Management System (DBMS)
    • protection_profile: U.S. Government Protection Profile for Database Management Systems, Version 1.3
    • report_link: https://www.ipa.go.jp/en/security/c0475_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0475_est.pdf
    • toe_version: 12.0.2000.8
    • vendor: Microsoft Corporation
  • expiration_date: 01.07.2020
  • supplier: Microsoft Corporation
  • toe_japan_name: -----
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0475_it3480.html
  • toe_overseas_name: Microsoft SQL Server 2014 Database Engine Enterprise Edition x64 (English)12.0.2000.8
heuristics/st_references/directly_referencing {} ANSSI-CC-2011/07
heuristics/st_references/indirectly_referencing {} ANSSI-CC-2011/07
heuristics/protection_profiles 61018742063aaca9 9399bd94f9925b16
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_dbms_v1.3.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-profil_PP-2010-03en.pdf
pdf_data/report_filename c0475_erpt.pdf ANSSI-CC-2014_88.pdf
pdf_data/report_frontpage
  • FR:
  • FR:
    • cc_security_level: EAL 4 augmenté ALC_DVS.2, AVA_VAN.5
    • cc_version: Critères Communs version 3.1 révision 4
    • cert_id: ANSSI-CC-2014/88
    • cert_item: Plateforme Upteq NFC 2.1.3_Generic release C sur composant ST33F1ME
    • cert_item_version: T1020806, Release C
    • cert_lab: THALES (TCS – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France
    • developer: Gemalto La Vigie, Av du Jujubier ZI Athelia IV, 13705 La Ciotat Cedex, France STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, B.P. 2, 13106 Rousset, France Commanditaire Gemalto La Vigie, Av du Jujubier ZI Athelia IV, 13705 La Ciotat Cedex, France
    • match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
    • ref_protection_profiles: ANSSI-CC-PP-2010/03-M01 [PP JCS] Java Card System – Open Configuration, version 3.0
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0475-01: 1
    • Certification No. C0475: 1
  • FR:
    • ANSSI-CC-2011/07: 7
    • ANSSI-CC-2011/07-M01: 1
    • ANSSI-CC-2011/07-M02: 3
    • ANSSI-CC-2011/07-M03: 3
    • ANSSI-CC-2011/07-S02: 1
    • ANSSI-CC-2014/88: 22
    • ANSSI-CC-PP-2010/03-M01: 2
pdf_data/report_keywords/cc_protection_profile_id
  • ANSSI:
    • ANSSI-CC-PP-2010/03-M01: 2
  • BSI:
    • BSI-PP-0035-2007: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 4
    • EAL2 augmented: 3
    • EAL2+: 2
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 4: 2
    • EAL 5: 1
    • EAL 7: 1
    • EAL4: 2
    • EAL5: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 4
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 4
    • AGD_PRE: 2
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 3
    • ALC_FLR: 2
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 5
pdf_data/report_keywords/cc_claims
  • A:
    • A.NO_EVIL: 1
    • A.NO_GENERAL_: 1
    • A.PHYSICAL: 1
  • T:
    • T.ACCIDENTIAL_ADMIN_ERROR: 1
    • T.MASQUERADE: 1
    • T.POOR_DESIGN: 1
    • T.POOR_IMPLEMENTATION: 1
    • T.POOR_TEST: 1
    • T.RESIDUAL_DATA: 1
    • T.TSF_COMPROMISE: 1
    • T.UNAUTHORIZED_: 1
    • T.UNIDENTIFIED_: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 20
    • Microsoft Corporation: 7
  • Gemalto:
    • Gemalto: 4
  • STMicroelectronics:
    • STMicroelectronics: 2
pdf_data/report_keywords/eval_facility
  • TUV:
    • TÜV Informationstechnik: 4
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/crypto_library
  • Neslib:
    • NesLib v3.0: 2
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
pdf_data/report_metadata
  • /CreationDate: D:20150724094408+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20150724094442+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 233021
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 31
  • /Author: robert-n@intranet.fr
  • /CreationDate: D:20150115150459+01'00'
  • /Creator: Microsoft® Word 2010
  • /Keywords: ANSSI-CC-CER-F-07.013
  • /ModDate: D:20150115150459+01'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: Plateforme Upteq NFC 2.1.3_Generic sur le composant ST33F1ME avec application DESFIRE 1.1 (S1124940, release C)
  • /Title: ANSSI-CC-2014/88
  • pdf_file_size_bytes: 715730
  • pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 21
pdf_data/st_filename c0475_est.pdf ANSSI_cible2014_88_LITE.pdf
pdf_data/st_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2011/07: 1
    • ANSSI-CC-2011/07-M02: 1
  • NL:
    • CC-1: 1
    • CC-2: 4
    • CC-3: 2
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-2007-0035: 3
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 3
    • EAL 2 augmented: 1
    • EAL2: 2
    • EAL2 augmented: 2
    • EAL2+: 51
  • EAL:
    • EAL4: 3
    • EAL4 augmented: 3
    • EAL4+: 1
    • EAL5: 2
    • EAL5 augmented: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.2: 1
  • AGD:
    • AGD_ADD: 3
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR: 1
    • ALC_FLR.2: 4
  • ATE:
    • ATE_COV.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC: 1
  • ALC:
    • ALC_DVS.2: 5
  • AVA:
    • AVA_VAN.5: 5
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 10
    • FAU_GEN.1: 3
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
    • FAU_SEL: 8
    • FAU_SEL.1: 2
    • FAU_STG: 3
    • FAU_STG.1: 2
    • FAU_STG.3: 1
    • FAU_STG.4: 1
    • FAU_STG_EXP: 2
    • FAU_STG_EXP.5: 15
    • FAU_STG_EXP.5.1: 2
  • FDP:
    • FDP_ACC.1: 10
    • FDP_ACC.1.1: 1
    • FDP_ACF: 8
    • FDP_ACF.1: 6
    • FDP_IFC.1: 1
    • FDP_RIP.1: 6
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_ATD.1: 10
    • FIA_ATD.1.1: 2
    • FIA_UAU.2: 8
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 8
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UID.1: 11
    • FIA_UID.2: 12
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF.1: 6
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 6
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 8
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 7
    • FMT_MTD.1.1: 1
    • FMT_REV.1: 16
    • FMT_REV.1.1: 2
    • FMT_REV.1.2: 2
    • FMT_SMF.1: 7
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 14
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 1
    • FPT_TRC.1: 6
    • FPT_TRC.1.1: 1
    • FPT_TRC.1.2: 1
  • FTA:
    • FTA_MCS.1: 6
    • FTA_MCS.1.1: 1
    • FTA_MCS.1.2: 1
    • FTA_TAH.1: 8
    • FTA_TAH.1.1: 1
    • FTA_TAH.1.2: 1
    • FTA_TAH.1.3: 1
    • FTA_TSE.1: 6
    • FTA_TSE.1.1: 1
  • FAU:
    • FAU_ARP.1: 5
    • FAU_ARP.1.1: 1
    • FAU_SAS.1: 1
  • FCO:
    • FCO_NRO: 3
    • FCO_NRO.2: 8
  • FCS:
    • FCS_CKM: 11
    • FCS_CKM.1: 3
    • FCS_CKM.2: 3
    • FCS_CKM.3: 3
    • FCS_CKM.4: 2
    • FCS_CKM.4.1: 1
    • FCS_COP: 15
    • FCS_COP.1: 12
    • FCS_RND: 2
    • FCS_RND.1: 5
    • FCS_RND.1.1: 2
    • FCS_RNG.1: 2
  • FDP:
    • FDP_ACC: 10
    • FDP_ACC.1: 4
    • FDP_ACC.2: 6
    • FDP_ACF: 10
    • FDP_ACF.1: 28
    • FDP_ETC: 2
    • FDP_ETC.1: 2
    • FDP_IFC: 4
    • FDP_IFC.1: 2
    • FDP_IFC.2: 4
    • FDP_IFF: 4
    • FDP_IFF.1: 19
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.4: 1
    • FDP_ITC: 7
    • FDP_ITC.1: 3
    • FDP_ITC.2: 19
    • FDP_ITT.1: 1
    • FDP_RIP: 10
    • FDP_RIP.1: 8
    • FDP_ROL: 6
    • FDP_ROL.1: 9
    • FDP_SDI.2: 1
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UIT: 3
    • FDP_UIT.1: 4
  • FIA:
    • FIA_ATD: 1
    • FIA_ATD.1: 1
    • FIA_UAU: 8
    • FIA_UAU.1: 2
    • FIA_UAU.2: 1
    • FIA_UAU.4: 1
    • FIA_UAU.5: 2
    • FIA_UID: 9
    • FIA_UID.1: 4
    • FIA_UID.2: 3
    • FIA_USB: 1
    • FIA_USB.1: 3
  • FMT:
    • FMT_LIM: 1
    • FMT_LIM.1: 2
    • FMT_LIM.2: 1
    • FMT_MOF: 2
    • FMT_MOF.1: 1
    • FMT_MSA: 30
    • FMT_MSA.1: 10
    • FMT_MSA.2: 2
    • FMT_MSA.3: 21
    • FMT_MSA.3.1: 2
    • FMT_MTD: 6
    • FMT_MTD.1: 3
    • FMT_MTD.3: 1
    • FMT_SMF: 12
    • FMT_SMF.1: 9
    • FMT_SMF.1.1: 1
    • FMT_SMR: 12
    • FMT_SMR.1: 16
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO: 2
    • FPR_UNO.1: 2
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_FLS: 8
    • FPT_FLS.1: 7
    • FPT_FLS.1.1: 1
    • FPT_ITT: 2
    • FPT_ITT.1: 2
    • FPT_PHP.3: 1
    • FPT_RCV: 5
    • FPT_RCV.3: 11
    • FPT_RCV.4: 1
    • FPT_RPL: 2
    • FPT_RPL.1: 2
    • FPT_TDC: 2
    • FPT_TDC.1: 3
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
  • FRU:
    • FRU_FLT.2: 1
  • FTP:
    • FTP_ITC: 3
    • FTP_ITC.1: 6
    • FTP_TRP: 2
    • FTP_TRP.1: 3
pdf_data/st_keywords/cc_claims
  • A:
    • A.NO_EVIL: 3
    • A.NO_GENERAL_PURPOSE: 3
    • A.PHYSICAL: 3
  • O:
    • O.ACCESS_HISTORY: 5
    • O.ADMIN_GUIDANCE: 1
    • O.ADMIN_ROLE: 4
    • O.AUDIT_: 1
    • O.AUDIT_GENERATION: 4
    • O.CONFIGURATION_IDENTIFICATION: 1
    • O.DOCUMENTED_DESIGN: 1
    • O.INTERNAL_TOE_DOMAINS: 1
    • O.MANAGE: 6
    • O.MEDIATE: 5
    • O.PARTIAL_FUNCTIONAL_TEST: 1
    • O.PARTIAL_SELF_PROTECTION: 1
    • O.RESIDUAL_INFORM: 1
    • O.RESIDUAL_INFORMAT: 2
    • O.RESIDUAL_INFORMATION: 3
    • O.TOE_ACCESS: 7
    • O.VULNERABILITY_ANALYSIS: 1
  • OE:
    • OE.NO_EVIL: 4
    • OE.NO_GENERAL_: 2
    • OE.NO_GENERAL_PURPOSE: 1
    • OE.PHYSICAL: 4
  • T:
    • T.ACCIDENTIAL_ADMIN_ERROR: 1
    • T.MASQUERADE: 3
    • T.POOR_DESIGN: 1
    • T.POOR_IMPLEMENTATION: 1
    • T.POOR_TEST: 1
    • T.RESIDUAL_DATA: 3
    • T.TSF_COMPROMISE: 3
    • T.UNAUTHORIZED_ACCESS: 3
    • T.UNIDENTIFIED_ACTIONS: 3
  • A:
    • A.APPLET: 1
    • A.DELETION: 4
    • A.MOBILE-OPERATOR: 2
    • A.OTA-ADMIN: 2
    • A.PERSONALIZER: 1
    • A.PRODUCTION: 1
    • A.VERIFICATION: 1
  • D:
    • D.API_DATA: 3
    • D.APP_CODE: 7
    • D.APP_C_DATA: 5
    • D.APP_I_DATA: 6
    • D.CARD_MNGT_DATA: 4
    • D.CRYPTO: 4
    • D.GASD_KEYS: 5
    • D.ISD_KEYS: 4
    • D.JCS_CODE: 3
    • D.JCS_DATA: 6
    • D.OPTIONAL_PF_SERVICE: 4
    • D.PIN: 4
    • D.SEC_DATA: 7
  • O:
    • O.ALARM: 1
    • O.APPLET: 16
    • O.APPLI-AUTH: 2
    • O.CARD-MANAGEMENT: 5
    • O.CARD_MANAGEMENT: 1
    • O.CIPHER: 2
    • O.CODE_PKG: 14
    • O.COMM_AUTH: 2
    • O.COMM_INTEGRITY: 2
    • O.CONTROLED-ES_LOADING: 1
    • O.DELETION: 2
    • O.FIREWALL: 2
    • O.GLOBAL_ARRAYS_CONFID: 2
    • O.GLOBAL_ARRAYS_INTEG: 2
    • O.INSTALL: 1
    • O.JAVAOBJECT: 38
    • O.KEY-MNGT: 2
    • O.LOAD: 2
    • O.NATIVE: 2
    • O.OBJ-DELETION: 2
    • O.OPERATE: 1
    • O.PIN-MNGT: 2
    • O.REALLOCATION: 2
    • O.REMOTE_SERVICE_ACTIVATION: 1
    • O.REMOTE_SERVICE_AUDIT: 2
    • O.RESOURCES: 1
    • O.RND: 2
    • O.SCP: 8
    • O.SCP-SUPPORT: 2
    • O.SID: 1
    • O.TRANSACTION: 2
  • OE:
    • OE.ACTIVATION-KEY-ESCROW: 2
    • OE.AID-MANAGEMENT: 2
    • OE.APPLET: 1
    • OE.BASIC-APPS-VALIDATION: 2
    • OE.CARD-: 1
    • OE.CARD-MANAGEMENT: 2
    • OE.CARD_MANAGEMENT: 1
    • OE.CODE-: 1
    • OE.CODE-EVIDENCE: 1
    • OE.GEMACTIVATE-ADMIN: 2
    • OE.KEY-ESCROW: 2
    • OE.KEY-GENERATION: 2
    • OE.MOBILE-OPERATOR: 2
    • OE.OPERATOR-KEYS: 2
    • OE.OTA-ADMIN: 2
    • OE.OTA-LOADING: 2
    • OE.OTA-SERVERS: 2
    • OE.PERSONALIZER: 2
    • OE.PRODUCTION: 2
    • OE.SCP: 6
    • OE.TRUSTED-APPS-DEVELOPER: 2
    • OE.TRUSTED-APPS-PRE-ISSUANCE: 2
    • OE.VERIFICATION: 4
  • OP:
    • OP.ARRAY_ACCESS: 4
    • OP.CREATE: 7
    • OP.DELETE_APPLET: 4
    • OP.DELETE_PCKG: 3
    • OP.DELETE_PCKG_APPLET: 3
    • OP.INSTANCE_FIELD: 4
    • OP.INVK_INTERFACE: 7
    • OP.INVK_VIRTUAL: 6
    • OP.JAVA: 5
    • OP.PUT: 6
    • OP.THROW: 5
    • OP.TYPE_ACCESS: 5
  • OSP:
    • OSP.ACTIVATION-: 1
    • OSP.ACTIVATION-KEY-ESCROW: 1
    • OSP.AID-MANAGEMENT: 2
    • OSP.BASIC-APPS-VALIDATION: 2
    • OSP.KEY-ESCROW: 2
    • OSP.KEY-GENERATION: 2
    • OSP.OPERATOR-KEYS: 2
    • OSP.OTA-LOADING: 2
    • OSP.OTA-SERVERS: 2
    • OSP.PERSONALIZER: 2
    • OSP.PRODUCTION: 2
    • OSP.RNG: 3
    • OSP.SERVICE: 1
    • OSP.SERVICE_AUDIT: 2
    • OSP.TRUSTED-APPS-: 2
    • OSP.TRUSTED-APPS-DEVELOPER: 2
    • OSP.TRUSTED-APPS-PRE-ISSUANCE: 1
    • OSP.VERIFICATION: 1
  • R:
    • R.JAVA: 9
  • T:
    • T.CONFID-APPLI-DATA: 1
    • T.CONFID-JCS-CODE: 1
    • T.CONFID-JCS-DATA: 1
    • T.DELETION: 3
    • T.EXE-CODE: 2
    • T.INSTALL: 1
    • T.INTEG-APPLI-CODE: 2
    • T.INTEG-APPLI-DATA: 2
    • T.INTEG-JCS-CODE: 1
    • T.INTEG-JCS-DATA: 1
    • T.INTEG-USER-DATA: 2
    • T.LIFE_CYCLE: 2
    • T.NATIVE: 1
    • T.OBJ-DELETION: 1
    • T.PHYSICAL: 1
    • T.RESOURCES: 2
    • T.SID: 2
    • T.UNAUTHORIZED_ACCESS_TO_SERVICE: 2
    • T.UNAUTHORIZED_CARD_MNGT: 2
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 11
    • Microsoft Corporation: 2
  • Gemalto:
    • Gemalto: 171
  • NXP:
    • NXP: 1
    • NXP Semiconductors: 1
  • STMicroelectronics:
    • STMicroelectronics: 3
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 23
  • DES:
    • 3DES:
      • TDEA: 1
      • TDES: 5
      • Triple-DES: 3
    • DES:
      • DES: 18
  • constructions:
    • MAC:
      • CMAC: 2
      • HMAC: 7
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
  • MD:
    • MD5:
      • MD5: 1
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-2: 3
      • SHA-224: 2
      • SHA-256: 3
      • SHA-384: 3
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key agreement: 1
  • MAC:
    • MAC: 19
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 2
    • RNG: 6
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 8
  • ECB:
    • ECB: 4
pdf_data/st_keywords/crypto_engine
  • NesCrypt:
    • Nescrypt: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • fault induction: 2
    • malfunction: 3
    • physical tampering: 4
  • SCA:
    • DPA: 1
    • Leak-Inherent: 4
    • physical probing: 1
  • other:
    • JIL: 2
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 3
pdf_data/st_keywords/standard_id
  • CC:
    • CCIMB-2012-09-004: 1
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
  • FIPS:
    • FIPS 180-2: 1
    • FIPS 180-3: 1
    • FIPS 197: 1
    • FIPS 46-3: 1
    • FIPS PUB 197: 4
    • FIPS PUB 46-3: 5
    • FIPS PUB 81: 4
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 9796-2: 1
  • PKCS:
    • PKCS #1: 5
    • PKCS #5: 1
    • PKCS#1: 1
    • PKCS#5: 1
  • RFC:
    • RFC2085: 1
    • RFC2104: 1
  • SCP:
    • SCP 01: 1
    • SCP 02: 1
    • SCP 80: 1
    • SCP02: 5
    • SCP80: 8
pdf_data/st_keywords/javacard_version
  • GlobalPlatform:
    • Global Platform 2.2.1: 1
  • JavaCard:
    • Java Card 3.0.1: 1
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 5
pdf_data/st_keywords/javacard_packages
  • javacard:
    • javacard.framework: 2
    • javacard.security: 2
  • javacardx:
    • javacardx.crypto: 10
    • javacardx.security: 9
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • parameters for cryptographic operations, the use of these other values are not advised; and clearly out of scope of the TOE. See [USR] for details. JCS.EraseResidualData The security function ensures that: 1
pdf_data/st_metadata
  • /Author: mhajj
  • /CreationDate: D:20150112160126+01'00'
  • /Creator: PDFCreator Version 1.7.1
  • /Keywords:
  • /ModDate: D:20150112160126+01'00'
  • /Producer: GPL Ghostscript 9.07
  • /Subject:
  • /Title: ST_D1314435_DESFIRE_LITE_v1.0p - Copy
  • pdf_file_size_bytes: 1874846
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 143
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different