name |
PR/SM for IBM z14 and IBM LinuxONE Systems Driver Level D36C with Bundle Level S08a |
Application Mobile PayPass 1.0.13vA.2.4(S1133159, release B) sur plateforme UpTeqNFC2.0.4_OFM configuration MIFARE activéou configuration MIFARE désactivé surcomposant ST33F1ME |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
DE |
FR |
status |
archived |
archived |
not_valid_after |
19.08.2024 |
28.11.2019 |
not_valid_before |
19.08.2019 |
28.11.2014 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1109c_pdf.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1109a_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2014-83.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1109b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ASE_MPP1.0.13vA.2.4_NFC2.0.4_OFM-RE_D1321206_v1.0.pdf |
manufacturer |
IBM Corporation |
Gemalto |
manufacturer_web |
https://www.ibm.com |
https://www.gemalto.com/ |
security_level |
ALC_TAT.3, ATE_FUN.2, EAL5+, AVA_VAN.5, ALC_FLR.3 |
EAL4+, AVA_VAN.5, ALC_DVS.2 |
dgst |
c2f2fdbe03716621 |
0650753c2f41eacf |
heuristics/cert_id |
BSI-DSZ-CC-1109-2019 |
ANSSI-CC-2014/83 |
heuristics/cert_lab |
BSI |
THALES |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_IMP.1, ATE_DPT.3, ADV_TDS.4, ASE_OBJ.2, ADV_ARC.1, AVA_VAN.5, ATE_IND.2, ATE_COV.2, ALC_LCD.1, ASE_TSS.1, ALC_DVS.1, ADV_FSP.5, ASE_ECD.1, ALC_FLR.3, AGD_OPE.1, ATE_FUN.2, ASE_INT.1, ALC_CMS.5, ASE_SPD.1, ASE_REQ.2, ALC_TAT.3, AGD_PRE.1, ADV_INT.2, ALC_DEL.1, ASE_CCL.1, ALC_CMC.4 |
ADV_IMP.1, ASE_OBJ.2, ADV_ARC.1, ATE_DPT.1, AVA_VAN.5, ATE_COV.2, ALC_LCD.1, ASE_COMP.1, ASE_TSS.1, ALC_CMS.4, ALC_DVS.2, ASE_ECD.1, AGD_OPE.1, ADV_FSP.4, ASE_INT.1, ASE_SPD.1, ATE_FUN.1, ASE_REQ.2, ADV_TDS.3, ALC_TAT.1, AGD_PRE.1, ALC_DEL.1, ASE_CCL.1, ALC_CMC.4 |
heuristics/extracted_versions |
- |
1.0.13, 2.0.4, 2.4 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
BSI-DSZ-CC-1133-2020 |
ANSSI-CC-2014/96 |
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-1048-2018 |
ANSSI-CC-2013/27, ANSSI-CC-2014/56 |
heuristics/report_references/indirectly_referenced_by |
BSI-DSZ-CC-1222-2024, BSI-DSZ-CC-1186-2023, BSI-DSZ-CC-1133-2020, BSI-DSZ-CC-1160-2021 |
ANSSI-CC-2014/96 |
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-1048-2018, BSI-DSZ-CC-0953-2015, BSI-DSZ-CC-0846-2013, BSI-DSZ-CC-1005-2016, BSI-DSZ-CC-0793-2012, BSI-DSZ-CC-0900-2014, BSI-DSZ-CC-0715-2011 |
ANSSI-CC-2011/77, ANSSI-CC-2013/28, ANSSI-CC-2011/17, ANSSI-CC-2012/11, ANSSI-CC-2012/49, ANSSI-CC-2010/49, ANSSI-CC-2014/56, ANSSI-CC-2010/50, ANSSI-CC-2013/27, ANSSI-CC-2011/07, ANSSI-CC-2012/48 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
1109c_pdf.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL 5: 1
- EAL 5 augmented: 1
|
|
pdf_data/cert_keywords/cc_sar |
- ALC:
- ALC_FLR: 1
- ALC_FLR.3: 1
- ALC_TAT.3: 1
- ATE:
- AVA:
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20190826140630+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, PR/SM for IBM z14 and IBM LinuxONE GA2 Systems Driver Level D36C with Bundle Level S08a, BSI-DSZ-CC-1109-2019"
- /ModDate: D:20190826143604+02'00'
- /Producer: LibreOffice 6.1
- /Subject: PR/SM for IBM z14 and IBM LinuxONE GA2 Systems Driver Level D36C with Bundle Level S08a from IBM Corporation
- /Title: Certification Report BSI-DSZ-CC-1109-2019
- pdf_file_size_bytes: 291533
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
1109a_pdf.pdf |
anssi-cc-2014-83.pdf |
pdf_data/report_frontpage |
- FR:
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 5 augmented by ALC_FLR.3, ALC_TAT.3, ATE_FUN.2, AVA_VAN.5
- cc_version: Product specific Security Target Common Criteria Part 2 conformant
- cert_id: BSI-DSZ-CC-1109-2019
- cert_item: PR/SM for IBM z14 and IBM LinuxONE GA2 Systems Driver Level D36C with Bundle Level S08a
- cert_lab: BSI
- developer: IBM Corporation
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: None
|
- FR:
- cc_security_level: EAL 4 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 3
- cert_id: ANSSI-CC-2014/83
- cert_item: Carte Mobile PayPass 1.0.13vA.2.4 sur plateforme UpTeq NFC2.0.4_OFM configuration MIFARE activé ou configuration MIFARE désactivé sur composant ST33F1ME (S1133159B/S1121881B
- cert_item_version: Application Mobile PayPass 1.0.13vA.2.4 (S1133159, release B) sur plateforme UpTeq NFC2.0.4_OFM configuration MIFARE activé ou configuration MIFARE désactivé sur composant ST33F1ME
- cert_lab: THALES (TCS – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France
- developer: Gemalto La Vigie, Av du Jujubier, ZI Athelia IV, 13705 La Ciotat Cedex, France STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, B.P. 2, 13106 Rousset, France Commanditaire Gemalto La Vigie, Av du Jujubier, ZI Athelia IV, 13705 La Ciotat Cedex, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit \\(référence/version\\)(.+)Nom de la TOE \\(référence/version\\)(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: néant
- DE:
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-1048-2018: 3
- BSI-DSZ-CC-1109-2019: 15
|
- FR:
- ANSSI-CC-2013/27: 1
- ANSSI-CC-2014/56: 5
- ANSSI-CC-2014/83: 22
- ANSSI-CC-PP-2010/04: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 2: 2
- EAL 2+: 1
- EAL 4: 4
- EAL 5: 4
- EAL 5 augmented: 3
- EAL 5+: 1
- EAL 6: 1
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 1
- EAL 5: 1
- EAL 7: 1
- EAL4: 4
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_FSP.5: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- ALC:
- ALC_CMS.5: 1
- ALC_FLR: 3
- ALC_FLR.3: 4
- ALC_TAT.3: 5
- ATE:
- ATE_DPT.3: 1
- ATE_FUN.2: 5
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Gemalto:
- Morpho:
- STMicroelectronics:
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- AIS 32: 1
- AIS 34: 1
- AIS 38: 1
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- Report, Version 2, 2019-08-01, Final Evaluation Technical Report, atsec information security GmbH, (confidential document) [8] z14 Hardware Management Console Operations Guide Version 2.14.1, Version 2.14.1, Date: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
|
|
pdf_data/report_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20190826140555+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, PR/SM for IBM z14 and IBM LinuxONE GA2 Systems Driver Level D36C with Bundle Level S08a, BSI-DSZ-CC-1109-2019"
- /ModDate: D:20190909155633+02'00'
- /Producer: LibreOffice 6.1
- /Subject: PR/SM for IBM z14 and IBM LinuxONE GA2 Systems Driver Level D36C with Bundle Level S08a from IBM Corporation
- /Title: Certification Report BSI-DSZ-CC-1109-2019
- pdf_file_size_bytes: 1051511
- pdf_hyperlinks: http://www.sogisportal.eu/, http://www.commoncriteriaportal.org/, http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/, https://www.bsi.bund.de/AIS
- pdf_is_encrypted: False
- pdf_number_of_pages: 30
|
- /Author:
- /CreationDate:
- /Creator: PDFCreator Version 1.2.1
- /Keywords:
- /ModDate:
- /Producer: GPL Ghostscript 9.02
- /Subject:
- /Title: anssi-cc
- pdf_file_size_bytes: 264109
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 21
|
pdf_data/st_filename |
1109b_pdf.pdf |
ASE_MPP1.0.13vA.2.4_NFC2.0.4_OFM-RE_D1321206_v1.0.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 1
- EAL4: 3
- EAL4 augmented: 2
- EAL4+: 2
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 2
- ADV_FSP.5: 2
- ADV_IMP.1: 2
- ADV_INT.2: 2
- ADV_TDS.4: 2
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.4: 2
- ALC_CMS.5: 2
- ALC_DEL.1: 2
- ALC_DVS.1: 2
- ALC_FLR.3: 4
- ALC_LCD.1: 2
- ALC_TAT.3: 4
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 2
- ATE_DPT.3: 2
- ATE_FUN.2: 4
- ATE_IND.2: 2
- AVA:
|
- ADV:
- ADV_ARC.1: 5
- ADV_FSP.1: 3
- ADV_FSP.2: 2
- ADV_FSP.4: 9
- ADV_IMP: 1
- ADV_IMP.1: 4
- ADV_TDS.1: 2
- ADV_TDS.2: 1
- ADV_TDS.3: 8
- AGD:
- AGD_OPE.1: 5
- AGD_PRE.1: 5
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.1: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 6
- ALC_LCD.1: 3
- ALC_TAT.1: 3
- ASE:
- ASE_CCL.1: 1
- ASE_COMP.1: 1
- ASE_ECD.1: 4
- ASE_INT.1: 5
- ASE_OBJ.2: 3
- ASE_REQ.1: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 3
- ATE_DPT.1: 2
- ATE_FUN.1: 6
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 10
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 1
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_SAR.1: 9
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 6
- FAU_SAR.2.1: 1
- FAU_SAR.3: 7
- FAU_SAR.3.1: 1
- FAU_STG.1: 7
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.4: 7
- FAU_STG.4.1: 1
- FDP:
- FDP_ACC: 4
- FDP_ACC.1: 3
- FDP_ACC.1.1: 2
- FDP_ACC.2: 25
- FDP_ACC.2.1: 1
- FDP_ACC.2.2: 1
- FDP_ACF: 43
- FDP_ACF.1: 14
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_IFC.1: 17
- FDP_IFC.1.1: 1
- FDP_IFF.1: 9
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_RIP.2: 8
- FDP_RIP.2.1: 1
- FIA:
- FIA_ATD.1: 10
- FIA_ATD.1.1: 1
- FIA_UID.2: 10
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA: 27
- FMT_MSA.1: 14
- FMT_MSA.3: 13
- FMT_MSA.3.1: 4
- FMT_MSA.3.2: 4
- FMT_MTD.1: 9
- FMT_MTD.1.1: 1
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR.1: 14
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNO.1: 13
- FPR_UNO.1.1: 1
- FPT:
- FPT_ITT.1: 8
- FPT_ITT.1.1: 1
- FPT_STM.1: 9
- FPT_STM.1.1: 1
- FPT_TRC.1: 6
- FPT_TRC.1.1: 1
- FPT_TRC.1.2: 1
- FPT_TST.1: 8
- FPT_TST.1.1: 2
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FRU:
- FRU_RSA.1: 7
- FRU_RSA.1.1: 1
- FTA:
- FTA_TSE.1: 10
- FTA_TSE.1.1: 1
|
- FAU:
- FAU_ARP.1: 9
- FAU_ARP.1.1: 1
- FAU_GEN.1: 13
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAA.1: 10
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 2
- FAU_SAR: 15
- FAU_SAR.1: 4
- FCO:
- FCS:
- FCS_CKM: 27
- FCS_CKM.1: 7
- FCS_CKM.2: 1
- FCS_CKM.4: 13
- FCS_COP: 63
- FCS_COP.1: 6
- FCS_RND.1: 1
- FDP:
- FDP_ACC: 155
- FDP_ACC.1: 14
- FDP_ACC.2: 14
- FDP_ACF: 140
- FDP_ACF.1: 35
- FDP_ACF.1.2: 7
- FDP_ACF.1.3: 1
- FDP_DAU.1: 7
- FDP_DAU.1.1: 1
- FDP_DAU.1.2: 1
- FDP_ETC.1: 16
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_IFC: 85
- FDP_IFC.1: 11
- FDP_IFC.2: 8
- FDP_IFF: 70
- FDP_IFF.1: 24
- FDP_IFF.1.2: 4
- FDP_ITC: 32
- FDP_ITC.1: 26
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 16
- FDP_RIP: 8
- FDP_RIP.1: 8
- FDP_RIP.1.1: 1
- FDP_ROL: 2
- FDP_RPL.1: 1
- FDP_SDI: 1
- FDP_SDI.2: 6
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UIT: 2
- FDP_UIT.1: 14
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL: 20
- FIA_AFL.1: 6
- FIA_ATD: 1
- FIA_ATD.1: 10
- FIA_ATD.1.1: 1
- FIA_SOS: 1
- FIA_SOS.2: 9
- FIA_SOS.2.1: 1
- FIA_SOS.2.2: 1
- FIA_UAU: 48
- FIA_UAU.1: 8
- FIA_UAU.3: 8
- FIA_UAU.3.1: 1
- FIA_UAU.3.2: 1
- FIA_UAU.4: 9
- FIA_UAU.4.1: 1
- FIA_UAU.6: 1
- FIA_UID: 30
- FIA_UID.1: 10
- FIA_USB: 1
- FIA_USB.1: 9
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF: 9
- FMT_MOF.1: 1
- FMT_MSA: 26
- FMT_MSA.1: 3
- FMT_MSA.2: 5
- FMT_MSA.2.1: 1
- FMT_MSA.3: 31
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 8
- FMT_MTD.1: 1
- FMT_REV: 1
- FMT_SMF: 14
- FMT_SMF.1: 6
- FMT_SMR: 6
- FMT_SMR.1: 21
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNO: 1
- FPR_UNO.1: 6
- FPR_UNO.1.1: 1
- FPT:
- FPT_FLS: 6
- FPT_ITC.1: 1
- FPT_ITT: 2
- FPT_RCV: 3
- FPT_RPL: 1
- FPT_RPL.1: 4
- FPT_RPL.1.1: 1
- FPT_RPL.1.2: 1
- FPT_STM.1: 3
- FPT_TDC.1: 19
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST.1: 7
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 2
- FTP_ITC.1: 10
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 3
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.APPLET: 1
- A.APPS-PROVIDER: 1
- A.CONTROLLING-AUTHORITY: 1
- A.MERCHANT_AUTH: 5
- A.MOBILE-OPERATOR: 1
- A.OTA-ADMIN: 1
- A.VERIFICATION: 1
- A.VERIFICATION-AUTHORITY: 1
- O:
- O.ALARM: 1
- O.APPLI-AUTH: 2
- O.APPLI_AUTH: 1
- O.APP_BLOCK: 15
- O.AUDIT: 14
- O.AUDIT_ACCESS: 10
- O.AUTHORISATION_CONTROL: 20
- O.CARD-MANAGEMENT: 1
- O.CHANNELS: 9
- O.CIPHER: 1
- O.COMM-: 1
- O.COMM-AUTH: 1
- O.COMM-INTEGRITY: 1
- O.COMM_AUTH: 3
- O.DATA_DISCLOSURE: 46
- O.DATA_INTEGRITY: 63
- O.DATA_USERS: 12
- O.DELETION: 1
- O.DOMAIN-RIGHTS: 1
- O.FIREWALL: 1
- O.GLOBAL-ARRAYS-CONFID: 1
- O.GLOBAL-ARRAYS-INTEG: 1
- O.GUIS_AUTH: 15
- O.INSTALL: 1
- O.ISSUING_BANK_AUTH: 54
- O.KEY-MNGT: 1
- O.LOAD: 1
- O.MNO_AUTH: 8
- O.NATIVE: 1
- O.OBJ-DELETION: 1
- O.OPERATE: 1
- O.PIN-MNGT: 1
- O.REALLOCATION: 1
- O.REMOTE: 1
- O.REMOTE_SERVICE_ACTIVCATION: 1
- O.REMOTE_SERVICE_AUDIT: 1
- O.RESSOURCES: 1
- O.RISK_MNGT: 20
- O.RNG: 1
- O.SCP: 2
- O.SID: 1
- O.SIM_UNLOCK: 10
- O.TRANSACTION: 1
- O.TRANSACTION_BYPASS: 53
- O.TRANSACTION_INTEGRITY: 38
- O.TRANSACTION_REPLAY: 11
- O.TRANSACTION_UNIQUENESS: 36
- O.USER_AUTH: 53
- OE:
- OE.ACTIVATION-KEY-ESCROW: 1
- OE.AID-MANAGEMENT: 1
- OE.AP-KEYS: 1
- OE.APPLET: 1
- OE.APPS-PROVIDER: 1
- OE.BANKS_PRIVILEGES: 4
- OE.BASIC-APPS-VALIDATION: 1
- OE.CA-KEYS: 1
- OE.CERTIFICATES_MNGT: 10
- OE.CHANNELS_SELECTION: 3
- OE.CONTROLLING-AUTHORITY: 1
- OE.CUSTOMER_PC_CONFID: 8
- OE.GUIS_IDENTIFICATION: 5
- OE.GUIS_TIMEOUT: 4
- OE.GUI_INST_ALERT: 7
- OE.KEY-CHANGE: 1
- OE.KEY-ESCROW: 1
- OE.KEY-GENERATION: 1
- OE.LATENCY_CONTROL: 5
- OE.MERCHANT_AUTH: 8
- OE.MERCHANT_CONTROL: 7
- OE.MOBILE-OPERATOR: 1
- OE.NFC_PROTOCOL: 5
- OE.NO_VAD: 6
- OE.OPERATOR-KEYS: 1
- OE.OTA-ADMIN: 1
- OE.OTA-LOADING: 1
- OE.OTA-SERVERS: 1
- OE.PERSONALIZER: 1
- OE.POLICY: 5
- OE.POS_APPLICATIONS: 10
- OE.POS_APPROVAL: 7
- OE.POS_DEACTIVATION: 6
- OE.PRODUCTION: 1
- OE.QUOTAS: 1
- OE.SECURE-APPS-CERTIFICATION: 1
- OE.SECURITY-DOMAINS: 1
- OE.SHARE-CONTROL: 1
- OE.TOE_USAGE: 9
- OE.TRANSACTION_DISPLAY: 5
- OE.TRUSTED-APPS-DEVELOPER: 1
- OE.TRUSTED-APPS-PRE-ISSUANCE-LOADING: 1
- OE.VA-KEYS: 1
- OE.VERIFICATION: 1
- OE.VERIFICATION-AUTHORITY: 1
- OSP:
- OSP: 2
- OSP.ACTIVATION-KEY-ESCROW: 1
- OSP.AID-MANAGEMENT: 1
- OSP.APSD-KEYS: 1
- OSP.BANKS_PRIVILEGES: 4
- OSP.BASIC-APPS-VALIDATION: 1
- OSP.CASD-KEYS: 1
- OSP.CERTIFICATES_MNGT: 4
- OSP.CUSTOMER_PC_CONFID: 4
- OSP.GUIS_IDENTIFICATION: 4
- OSP.KEY-CHANGE: 1
- OSP.KEY-ESCROW: 1
- OSP.KEY-GENERATION: 1
- OSP.MERCHANT_CONTROL: 6
- OSP.OPERATOR-KEYS: 1
- OSP.OTA-LOADING: 1
- OSP.OTA-SERVERS: 1
- OSP.PERSONALIZER: 1
- OSP.PISHING: 4
- OSP.POLICY: 4
- OSP.PRODUCTION: 1
- OSP.QUOTAS: 1
- OSP.RND: 1
- OSP.SECURE-APPS-CERTIFICATION: 1
- OSP.SECURITY-DOMAINS: 1
- OSP.SERVICE_AUDIT: 1
- OSP.SHARE-CONTROL: 1
- OSP.TOE_USAGE: 4
- OSP.TRUSTED-APPS-DEVELOPER: 1
- OSP.TRUSTED-APPS-PRE-ISSUANCE-LOADING: 1
- OSP.VASD-KEYS: 1
- OSP.VERIFICATION: 1
- T:
- T.APPLICATIONS_DOS: 6
- T.CERTIF_CORRUPTION: 5
- T.COM-EXPLOIT: 1
- T.CONFID-APPLI-DATA: 1
- T.CONFID-JCS-DATA: 1
- T.CUSTOMER_USURPATION: 7
- T.DELETION: 1
- T.DISCLOSURE: 4
- T.DISCLOSURE_KEYS: 6
- T.DISCLOSURE_REF_PC: 6
- T.EXE-CODE: 1
- T.EXE-CODE-REMOTE: 1
- T.INTEG: 7
- T.INTEG-APPLI-CODE: 2
- T.INTEG-APPLI-DATA: 2
- T.INTEG-JCS-CODE: 1
- T.INTEG-JCS-DATA: 1
- T.INTEG_ACCOUNT_INFO: 7
- T.INTEG_COUNT: 7
- T.INTEG_KEYS: 8
- T.INTEG_LOG_FILE: 6
- T.INTEG_REF_PC: 6
- T.INTEG_SEL_ACT_PARAM: 12
- T.INTEG_TRANS_PARAM: 8
- T.ISSUING-: 2
- T.ISSUING-BANK_USURPATION: 3
- T.LIFE-CYCLE: 1
- T.MAN-IN-THE-MIDDLE: 11
- T.MERCHANT_ACCOMPLICE: 9
- T.MNO_USURPATION: 5
- T.NATIVE: 1
- T.PHYSICAL: 1
- T.RESOURCES: 1
- T.STEALING: 9
- T.TEMPORARY_DATA: 8
- T.TRANSACTION: 1
- T.TRANSACTION_COUNTERFEITING: 12
- T.TRANSACTION_REPLAY: 8
- T.TRANSACTION_REPUDIATION: 7
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_ACCESS_TO_SERVICE: 1
- T.UNAUTHORIZED_CARD_MNGT: 1
|
pdf_data/st_keywords/vendor |
|
- Gemalto:
- Morpho:
- STMicroelectronics:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- fault induction: 2
- malfunction: 1
- physical tampering: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: Robert Nasser, Clemens Wittinger (generated by CCTool version 2.8.4.26)
- /CreationDate: D:20190709081113Z
- /Creator: Unknown
- /Keywords: access control, identification, authentication, audit, object reuse, z, LPAR, logical partitioning, isolation, PR/SM, LIC, cross-partition, HMC, SE
- /ModDate: D:20190709081113Z
- /Producer: XEP 4.25.502
- /Subject: PR/SM, Driver Level D36C with Bundle Level S08a for IBM z14 and IBM LinuxONE GA2 Systems
- /Title: Security Target for PR/SM for IBM z14 and IBM LinuxONE GA2 Systems (version 18.5 as of 2019-07-09)
- /Trapped: /False
- /application: CCTool version x.y
- pdf_file_size_bytes: 771952
- pdf_hyperlinks: http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R5.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R5.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R5.pdf
- pdf_is_encrypted: False
- pdf_number_of_pages: 61
|
- /Author: cteri
- /CreationDate: D:20140522121822+02'00'
- /Creator: Microsoft® Office Word 2007
- /Keywords: MPP
- /ModDate: D:20141204102057+01'00'
- /Producer: Microsoft® Office Word 2007
- /Subject: CTL Mastercard Payment Application (MPP)
- /Title: Mobile PayPass 1.0.13vA.2.4 on UpTeq NFC2.0.4_OFM with or without MIFARE ACTIVATED - Security Target
- pdf_file_size_bytes: 2125889
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 136
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |