name |
eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated Référence/version du produit Version de l’application eTravel : 2.3 Version de la plateforme Java Card MultiApp : 4.1
|
- Kanguru Defender Elite 200 with Kanguru Defender Manager Elite 200, Firmware Version 02.03.10, KDME200 v2.0.0.0-2/3/6,- Kanguru Defender 2000 with Kanguru Defender Manager 2000, Firmware Version 02.03.10, KDM2000 v1.2.1.8-2/3/6,- Universal Kanguru Local Administrator, Version 3.2.0.3 and- Kanguru Remote Management Console, Version 5.0.2.6
|
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
Data Protection
|
not_valid_before |
2021-12-17
|
2014-11-07
|
not_valid_after |
2023-12-12
|
2019-11-08
|
scheme |
FR
|
DE
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2018_56v2en.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772b_pdf.pdf
|
status |
archived
|
archived
|
manufacturer |
THALES DIS FRANCE SA
|
Kanguru Solutions
|
manufacturer_web |
https://www.thalesgroup.com/en/europe/france
|
https://www.kanguru.com
|
security_level |
ADV_INT.2, ATE_DPT.3, ALC_CMS.5, ADV_TDS.4, ALC_TAT.2, ALC_DVS.2, EAL4+, ADV_FSP.5 |
ALC_FLR.1, EAL2+ |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018_56v2.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772a_pdf.pdf
|
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-2018_56v2.pdf
|
None
|
protection_profiles |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': "Protection Profile for Machine Readable Travel Document with 'ICAO Application', Basic Acce...", 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP0017b.pdf', 'pp_ids': None}) |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Schutzprofil fur USB-Datentrager, Version 1.4', 'pp_eal': 'EAL2+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0025b.pdf', 'pp_ids': frozenset({'SCHUTZPROFIL_USB-DATENTRAGER_V1.4'})}) |
maintenance_updates |
|
frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2015, 1, 20), 'maintenance_title': 'Kanguru Defender Elite 200 and Kanguru Defender 2000, firmware version 2.05.10', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772_ma1a_pdf.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772_ma1b_pdf.pdf'}) |
state/cert/convert_garbage |
True
|
False
|
state/cert/convert_ok |
True
|
False
|
state/cert/download_ok |
True
|
False
|
state/cert/extract_ok |
True
|
False
|
state/cert/pdf_hash |
bc1a323bf86f766a2a05002ebbe6cb7b1bfa796e1bcf72d951179ca97acf29fd
|
None
|
state/cert/txt_hash |
1018fd637a39b2bcf71a00c37edb1cf5c6ef25acde27358ee8cac90a772c107d
|
None
|
state/report/convert_garbage |
True
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
ef08f099149e3563348b259c3c17a57af626df249f41afb1f0e7a6c37a0c7275
|
16e52e72927a5eee7124e6fde0c186c1d3d113e733e6116f5fdfcc44278c5b57
|
state/report/txt_hash |
6a8ba41b7357f6221f27f5a0688a580043952960c24cb2abf92bb773bf07b3d2
|
8cb2309bdc02367be25c3961b565d25c9f78b2d7cdce20c08213092f4a2eff82
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
dbea7643ac66ba446ba75b9bb9ab26725d274afbd3d2469e3901d3ac33ee9adf
|
077d27d1e2e9eafc65cbb9d302bc66883e2dd06e21ea816741ca25fe7f7dcd7d
|
state/st/txt_hash |
54016fc5b7a689364a2bb7c5b94766f52735101957eba6c31f0059e76b7348e9
|
74714db4c60a8332c3603aaae83a1c8ec3cbea7950400f562332e8ccdcc98147
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
ANSSI-CC-2018/56v2
|
BSI-DSZ-CC-0772-2014
|
heuristics/cert_lab |
None
|
BSI |
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_versions |
4.1, 2.3 |
2.0.0.0, 1.2.1.8, 3.2.0.3, 02.03.10, 5.0.2.6 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references/directly_referenced_by |
None
|
None
|
heuristics/report_references/directly_referencing |
ANSSI-CC-2017/24, ANSSI-CC-2018/32v2, ANSSI-CC-2018/56 |
None
|
heuristics/report_references/indirectly_referenced_by |
None
|
None
|
heuristics/report_references/indirectly_referencing |
ANSSI-CC-2016/59, ANSSI-CC-2015/66, ANSSI-CC-2017/07, ANSSI-CC-2018/32, ANSSI-CC-2018/32v2, ANSSI-CC-2017/54, ANSSI-CC-2017/24, ANSSI-CC-2017/76, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0891-2015, ANSSI-CC-2018/56, BSI-DSZ-CC-0891-V2-2016 |
None
|
heuristics/scheme_data |
- product:
eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated Référence/version du produit Version de l’application eTravel : 2.3 Version de la plateforme Java Card MultiApp : 4.1
- url:
https://cyber.gouv.fr/produits-certifies/etravel-v23-multiapp-v41-platform-bac-eac-and-aa-activated-referenceversion-du
- description:
Le produit évalué est l’application « eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated » développée par la société THALES DIS FRANCE SAS et embarquée sur le microcontrôleur S3FT9MH fabriqué par la société SAMSUNG ELECTRONICS CO. LTD.
Le produit implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisation de l’aviation civile intern
- sponsor:
THALES DIS FRANCE SAS SAMSUNG ELECTRONICS CO. LTD
- developer:
THALES DIS FRANCE SAS SAMSUNG ELECTRONICS CO. LTD
- cert_id:
2018/58v2
- level:
EAL5+
- enhanced:
- cert_id:
2018/58v2
- certification_date:
17/12/2021
- category:
Cartes à puce
- cc_version:
Critères Communs version 3.1r5
- developer:
THALES DIS FRANCE SAS SAMSUNG ELECTRONICS CO. LTD
- sponsor:
THALES DIS FRANCE SAS SAMSUNG ELECTRONICS CO. LTD
- evaluation_facility:
SERMA SAFETY & SECURITY
- level:
EAL5+
- protection_profile:
Protection Profile, Machine Readable Travel Document with “ICAO Application”, Extended Access Control, version 1.10
- mutual_recognition:
SOG-IS
CCRA
- augmented:
ALC_DVS.2, AVA_VAN.5
- cert_link:
https://cyber.gouv.fr/sites/default/files/2022/01/certificat-2018_58v2.pdf
- report_link:
https://cyber.gouv.fr/sites/default/files/2022/01/anssi-cc-2018_58v2.pdf
- target_link:
https://cyber.gouv.fr/sites/default/files/2022/01/anssi-cible-cc-2018_58v2en.pdf
|
None
|
heuristics/st_references/directly_referenced_by |
None
|
None
|
heuristics/st_references/directly_referencing |
ANSSI-CC-2017/24 |
None
|
heuristics/st_references/indirectly_referenced_by |
None
|
None
|
heuristics/st_references/indirectly_referencing |
ANSSI-CC-2017/24 |
None
|
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
certificat-2018_56v2.pdf
|
None
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords |
- cc_cert_id:
- cc_protection_profile_id:
- cc_security_level:
- cc_sar:
- ADV:
- ADV_FSP.5:
1
- ADV_TDS.4:
1
- ADV_INT.2:
1
- ALC:
- ALC_CMS.5:
1
- ALC_DVS.2:
1
- ALC_TAT.2:
1
- ATE:
- cc_sfr:
- cc_claims:
- vendor:
- eval_facility:
- symmetric_crypto:
- asymmetric_crypto:
- pq_crypto:
- hash_function:
- crypto_scheme:
- crypto_protocol:
- randomness:
- cipher_mode:
- ecc_curve:
- crypto_engine:
- tls_cipher_suite:
- crypto_library:
- vulnerability:
- side_channel_analysis:
- technical_report_id:
- device_model:
- tee_name:
- os_name:
- cplc_data:
- ic_data_group:
- standard_id:
- javacard_version:
- javacard_api_const:
- javacard_packages:
- certification_process:
|
None
|
pdf_data/cert_metadata |
- pdf_file_size_bytes:
1310722
- pdf_is_encrypted:
False
- pdf_number_of_pages:
2
- /Author:
sharbus
- /CreationDate:
D:20211222165036+01'00'
- /ModDate:
D:20211222165036+01'00'
- /Producer:
Microsoft: Print To PDF
- /Title:
Microsoft Word - certificat-2018_56v2
- pdf_hyperlinks:
|
None
|
pdf_data/report_filename |
anssi-cc-2018_56v2.pdf
|
0772a_pdf.pdf
|
pdf_data/report_frontpage |
|
- DE:
- match_rules:
(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)
- cert_id:
BSI-DSZ-CC-0772-2014
- cert_item:
Kanguru Defender Elite 200 Kanguru Defender 2000 Universal Kanguru Local Administrator, v3.2.0.3 Kanguru Remote Management Console, v5.0.2.6
- developer:
Kanguru Solutions
- cert_lab:
BSI
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id |
- FR:
- ANSSI-CC-2018/56v2:
15
- ANSSI-CC-2018/56:
4
- ANSSI-CC-2017/24:
2
- ANSSI-CC-2018/32v2:
2
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/cc_protection_profile_id/BSI |
- BSI-PP-0055-2009:
1
- BSI-PP-0084-2014:
1
- BSI-CC-PP-0055-2009:
1
|
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_FSP.5:
1
- ADV_TDS.4:
1
- ADV_INT.2:
1
- AGD:
- ALC:
- ALC_CMS.5:
1
- ALC_DVS.2:
1
- ALC_TAT.2:
1
- ALC_FLR:
1
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1:
1
- ADV_FSP.1:
1
- ADV_FSP.2:
1
- ADV_FSP.3:
1
- ADV_FSP.4:
1
- ADV_FSP.5:
1
- ADV_FSP.6:
1
- ADV_IMP.1:
1
- ADV_IMP.2:
1
- ADV_INT.1:
1
- ADV_INT.2:
1
- ADV_INT.3:
1
- ADV_SPM.1:
1
- ADV_TDS.1:
1
- ADV_TDS.2:
1
- ADV_TDS.3:
1
- ADV_TDS.4:
1
- ADV_TDS.5:
1
- ADV_TDS.6:
1
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_INT:
1
- ADV_SPM:
1
- ADV_TDS:
1
- AGD:
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- AGD_OPE:
1
- AGD_PRE:
1
- ALC:
- ALC_FLR.1:
5
- ALC_FLR:
3
- ALC_CMC.1:
1
- ALC_CMC.2:
1
- ALC_CMC.3:
1
- ALC_CMC.4:
1
- ALC_CMC.5:
1
- ALC_CMS.1:
1
- ALC_CMS.2:
1
- ALC_CMS.3:
1
- ALC_CMS.4:
1
- ALC_CMS.5:
1
- ALC_DEL.1:
1
- ALC_DVS.1:
1
- ALC_DVS.2:
1
- ALC_FLR.2:
1
- ALC_FLR.3:
1
- ALC_LCD.1:
1
- ALC_LCD.2:
1
- ALC_TAT.1:
1
- ALC_TAT.2:
1
- ALC_TAT.3:
1
- ALC_CMC:
1
- ALC_CMS:
1
- ALC_DEL:
1
- ALC_DVS:
1
- ALC_TAT:
1
- ATE:
- ATE_COV.1:
2
- ATE_COV.2:
1
- ATE_COV.3:
1
- ATE_DPT.1:
1
- ATE_DPT.2:
1
- ATE_DPT.3:
1
- ATE_DPT.4:
1
- ATE_FUN.1:
1
- ATE_FUN.2:
1
- ATE_IND.1:
1
- ATE_IND.2:
1
- ATE_IND.3:
1
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
- AVA:
- AVA_VAN.1:
1
- AVA_VAN.2:
1
- AVA_VAN.3:
1
- AVA_VAN.4:
1
- AVA_VAN.5:
1
- AVA_VAN:
2
- APE:
- APE_INT.1:
1
- APE_CCL.1:
1
- APE_SPD.1:
1
- APE_OBJ.1:
1
- APE_OBJ.2:
1
- APE_ECD.1:
1
- APE_REQ.1:
1
- APE_REQ.2:
1
- ASE:
- ASE_INT.1:
1
- ASE_CCL.1:
1
- ASE_SPD.1:
1
- ASE_OBJ.1:
1
- ASE_OBJ.2:
1
- ASE_ECD.1:
1
- ASE_REQ.1:
1
- ASE_REQ.2:
1
- ASE_TSS.1:
1
- ASE_TSS.2:
1
- ASE_CCL:
1
- ASE_ECD:
1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_SPD:
1
- ASE_TSS:
1
|
pdf_data/report_keywords/cc_sar/ADV |
- ADV_FSP.5:
1
- ADV_TDS.4:
1
- ADV_INT.2:
1
|
- ADV_ARC.1: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5:
1
- ADV_FSP.6: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT.1: 1
- ADV_INT.2:
1
- ADV_INT.3: 1
- ADV_SPM.1: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4:
1
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
|
pdf_data/report_keywords/cc_sar/ADV/ADV_FSP.5 |
1
|
1
|
pdf_data/report_keywords/cc_sar/ADV/ADV_INT.2 |
1
|
1
|
pdf_data/report_keywords/cc_sar/ADV/ADV_TDS.4 |
1
|
1
|
pdf_data/report_keywords/cc_sar/AGD |
|
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- AGD_OPE:
1
- AGD_PRE:
1
|
pdf_data/report_keywords/cc_sar/AGD/AGD_OPE |
1
|
1
|
pdf_data/report_keywords/cc_sar/AGD/AGD_PRE |
1
|
1
|
pdf_data/report_keywords/cc_sar/ALC |
- ALC_CMS.5:
1
- ALC_DVS.2:
1
- ALC_TAT.2:
1
- ALC_FLR:
1
|
- ALC_FLR.1: 5
- ALC_FLR:
3
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 1
- ALC_CMC.5: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 1
- ALC_CMS.5:
1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_DVS.2:
1
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 1
- ALC_LCD.2: 1
- ALC_TAT.1: 1
- ALC_TAT.2:
1
- ALC_TAT.3: 1
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_TAT: 1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_CMS.5 |
1
|
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 |
1
|
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR |
1
|
3
|
pdf_data/report_keywords/cc_sar/ALC/ALC_TAT.2 |
1
|
1
|
pdf_data/report_keywords/cc_sar/ATE |
|
- ATE_COV.1: 2
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3:
1
- ATE_DPT.4: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
|
pdf_data/report_keywords/cc_sar/ATE/ATE_DPT.3 |
1
|
1
|
pdf_data/report_keywords/cc_sar/AVA |
|
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3:
1
- AVA_VAN.4: 1
- AVA_VAN.5: 1
- AVA_VAN:
2
|
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN |
1
|
2
|
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN.3 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/EAL |
|
- EAL 2: 8
- EAL 1: 7
- EAL 4:
7
- EAL2:
2
- EAL 3: 4
- EAL 5: 6
- EAL 6: 3
- EAL 7: 4
- EAL 2 augmented: 3
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 4 |
1
|
7
|
pdf_data/report_keywords/cc_security_level/EAL/EAL2 |
2
|
2
|
pdf_data/report_keywords/cc_security_level/ITSEC |
|
|
pdf_data/report_keywords/cc_sfr |
|
- FCS:
- FCS_COP.1:
1
- FCS_CKM.1:
1
- FCS_RNG.1:
1
- FDP:
- FDP_ACC.1:
2
- FDP_ACF.1:
2
- FIA:
- FIA_UID.2:
4
- FIA_UAU.2:
4
- FIA_UAU.6:
1
- FIA_SOS.1:
1
- FMT:
- FMT_MTD:
2
- FMT_SMF:
2
- FMT_SMF.1:
1
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- Report, Version 8, 2014-10-07, Final Evaluation Technical Report, atsec information security GmbH, (confidential document) [9] Evaluated Product User Guide, Version 1.20, 2014-10-02 [10] Kanguru Defender Elite 200 User:
1
- KRMC Administrator's User Manual, Version 5.0.2, 2013-11-01 [14] Configuration lists for the TOE (confidential documents): a) Configuration list for TOE executables, 2014-09-17 b) Configuration list from Phison:
1
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
- ICAO:
- CC:
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
|
- BSI:
- ISO:
- ISO/IEC 17065:
2
- ISO/IEC 15408:
2
- ISO/IEC 18045:
2
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI TR-02102:
1
- BSI 7138:
2
- BSI 7125:
2
- BSI 7148:
1
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata |
- pdf_file_size_bytes:
4196349
- pdf_is_encrypted:
False
- pdf_number_of_pages:
15
- /Author:
sharbus
- /CreationDate:
D:20211222164244+01'00'
- /ModDate:
D:20211222164244+01'00'
- /Producer:
Microsoft: Print To PDF
- /Title:
Microsoft Word - ANSSI-CC-2018_56v2fr
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
1643286
- pdf_is_encrypted:
False
- pdf_number_of_pages:
42
- /Author:
Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate:
D:20141121083051+01'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, encrypted USB storage device, Kanguru Defender"
- /ModDate:
D:20141121113713+01'00'
- /Producer:
LibreOffice 4.2
- /Subject: Common Criteria Certification
- /Title:
Certification Report BSI-DSZ-CC-0772-2014
- pdf_hyperlinks:
https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/
|
pdf_data/report_metadata//Author |
sharbus
|
Bundesamt für Sicherheit in der Informationstechnik
|
pdf_data/report_metadata//CreationDate |
D:20211222164244+01'00'
|
D:20141121083051+01'00'
|
pdf_data/report_metadata//ModDate |
D:20211222164244+01'00'
|
D:20141121113713+01'00'
|
pdf_data/report_metadata//Producer |
Microsoft: Print To PDF
|
LibreOffice 4.2
|
pdf_data/report_metadata//Title |
Microsoft Word - ANSSI-CC-2018_56v2fr
|
Certification Report BSI-DSZ-CC-0772-2014
|
pdf_data/report_metadata/pdf_file_size_bytes |
4196349
|
1643286
|
pdf_data/report_metadata/pdf_hyperlinks |
|
https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/ |
pdf_data/report_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/report_metadata/pdf_number_of_pages |
15
|
42
|
pdf_data/st_filename |
anssi-cible-cc-2018_56v2en.pdf
|
0772b_pdf.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/cc_protection_profile_id/BSI |
- BSI-CC-PP-0084-:
1
- BSI-PP-0056-V2-MA-2012:
1
- BSI-CC-PP-0068-:
1
- BSI-PP-0055-2009:
1
|
- BSI-PP-0025:
6
- BSI-PP- 0025:
13
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_FSP.5:
2
- ADV_INT.2:
2
- ADV_TDS.4:
2
- ADV_ARC.1:
1
- ALC:
- ALC_CMS.5:
2
- ALC_DVS.2:
3
- ALC_TAT.2:
2
- ATE:
- ASE:
|
- ADV:
- ADV_SPM.1:
2
- ADV_ARC.1:
1
- ADV_FSP.2:
1
- ADV_TDS.1:
1
- AGD:
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- ALC:
- ALC_FLR.1:
5
- ALC_CMC.2:
1
- ALC_CMS.2:
1
- ALC_DEL.1:
1
- ATE:
- ATE_COV.1:
1
- ATE_FUN.1:
1
- ATE_IND.2:
1
- AVA:
- ASE:
- ASE_INT.1:
1
- ASE_CCL.1:
1
- ASE_SPD.1:
1
- ASE_OBJ.2:
1
- ASE_ECD.1:
1
- ASE_REQ.2:
1
- ASE_TSS.1:
1
|
pdf_data/st_keywords/cc_sar/ADV |
- ADV_FSP.5: 2
- ADV_INT.2: 2
- ADV_TDS.4: 2
- ADV_ARC.1:
1
|
- ADV_SPM.1: 2
- ADV_ARC.1:
1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
|
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ALC |
- ALC_CMS.5:
2
- ALC_DVS.2:
3
- ALC_TAT.2:
2
|
- ALC_FLR.1:
5
- ALC_CMC.2:
1
- ALC_CMS.2:
1
- ALC_DEL.1:
1
|
pdf_data/st_keywords/cc_sar/ASE |
|
- ASE_INT.1:
1
- ASE_CCL.1:
1
- ASE_SPD.1:
1
- ASE_OBJ.2:
1
- ASE_ECD.1:
1
- ASE_REQ.2:
1
- ASE_TSS.1:
1
|
pdf_data/st_keywords/cc_sar/ATE |
|
- ATE_COV.1:
1
- ATE_FUN.1:
1
- ATE_IND.2:
1
|
pdf_data/st_keywords/cc_security_level/EAL |
- EAL4:
3
- EAL 6+:
1
- EAL4 augmented:
1
|
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_SAS:
6
- FAU_GEN:
1
- FAU_SAS.1:
12
- FAU_SAS.1.1:
2
- FCS:
- FCS_RND:
7
- FCS_CKM:
14
- FCS_COP:
50
- FCS_CKM.1:
19
- FCS_RND.1:
12
- FCS_RND.1.1:
2
- FCS_CKM.2:
4
- FCS_COP.1:
9
- FCS_CKM.4:
29
- FCS_CKM.1.1:
2
- FCS_CKM.4.1:
1
- FCS_COP.1.1:
1
- FCS_RNG:
1
- FDP:
- FDP_ACF:
1
- FDP_ITC.1:
12
- FDP_ITC.2:
12
- FDP_ACC.1:
18
- FDP_ACF.1:
11
- FDP_ACC.1.1:
1
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
2
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
2
- FDP_UCT.1:
10
- FDP_IFC.1:
4
- FDP_UCT.1.1:
1
- FDP_UIT.1:
10
- FDP_UIT.1.1:
1
- FDP_UIT.1.2:
1
- FDP_ITC:
2
- FIA:
- FIA_API:
13
- FIA_AFL.1:
11
- FIA_SOS.2:
1
- FIA_API.1:
5
- FIA_API.1.1:
1
- FIA_UAU.5.2:
3
- FIA_UAU.4:
11
- FIA_UAU.6:
11
- FIA_UID.1:
11
- FIA_UID.1.1:
1
- FIA_UID.1.2:
1
- FIA_UAU.1:
10
- FIA_UAU.1.1:
1
- FIA_UAU.1.2:
1
- FIA_UAU.4.1:
1
- FIA_UAU.5:
10
- FIA_UAU.5.1:
1
- FIA_UAU.6.1:
1
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
1
- FIA_UAU:
5
- FMT:
- FMT_LIM:
7
- FMT_LIM.1:
20
- FMT_LIM.2:
18
- FMT_LIM.1.1:
2
- FMT_LIM.2.1:
2
- FMT_MSA.3:
3
- FMT_SMF.1:
20
- FMT_SMR.1:
24
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_MTD.1:
6
- FMT_MTD:
36
- FMT_MSA.1:
1
- FMT_SRM.1:
1
- FPT:
- FPT_EMS:
4
- FPT_EMS.1:
13
- FPT_EMS.1.1:
3
- FPT_EMS.1.2:
3
- FPT_FLS.1:
11
- FPT_TST.1:
10
- FPT_PHP.3:
12
- FPT_FLS.1.1:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FPT_PHP.3.1:
1
- FTP:
- FTP_ITC.1:
5
- FTP_TRP.1:
5
|
- FAU:
- FCS:
- FCS_RNG.1:
15
- FCS_CKM.1:
9
- FCS_CKM.4:
9
- FCS_COP.1:
9
- FCS_RNG:
2
- FCS_RNG.1.1:
3
- FCS_RNG.1.2:
3
- FCS_CKM.1.1:
1
- FCS_CKM.4.1:
1
- FCS_COP.1.1:
1
- FCS_CKM.2:
1
- FDP:
- FDP_ACC.1:
14
- FDP_ACF.1:
13
- FDP_ACC.1.1:
1
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
1
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
- FDP_ITC.1:
2
- FDP_ITC.2:
2
- FDP_IFC.1:
1
- FIA:
- FIA_UAU.1:
7
- FIA_UAU.6:
8
- FIA_SOS.1:
8
- FIA_UAU.2:
9
- FIA_UID.2:
10
- FIA_UAU.1.1:
1
- FIA_UAU.1.2:
1
- FIA_UAU.6.1:
1
- FIA_SOS.1.1:
1
- FIA_UAU.2.1:
1
- FIA_UID.2.1:
1
- FIA_UID.1:
2
- FMT:
- FMT_MSA.1:
8
- FMT_MTD:
12
- FMT_SMF:
20
- FMT_SMR.1:
12
- FMT_SMF.1:
6
- FMT_MTD.1:
3
- FMT_MSA.1.1:
1
- FMT_MTD.1.1:
2
- FMT_SMF.1.1:
2
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_MSA.3:
1
- FPT:
- FPT_FLS.1:
9
- FPT_RCV.4:
8
- FPT_PHP.1:
8
- FPT_RCV.4.1:
2
- FPT_FLS.1.1:
1
- FPT_PHP.1.1:
1
- FPT_PHP.1.2:
1
|
pdf_data/st_keywords/cc_sfr/FAU |
- FAU_SAS: 6
- FAU_GEN:
1
- FAU_SAS.1: 12
- FAU_SAS.1.1: 2
|
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FCS |
- FCS_RND: 7
- FCS_CKM: 14
- FCS_COP: 50
- FCS_CKM.1:
19
- FCS_RND.1: 12
- FCS_RND.1.1: 2
- FCS_CKM.2:
4
- FCS_COP.1:
9
- FCS_CKM.4:
29
- FCS_CKM.1.1:
2
- FCS_CKM.4.1:
1
- FCS_COP.1.1:
1
- FCS_RNG:
1
|
- FCS_RNG.1: 15
- FCS_CKM.1:
9
- FCS_CKM.4:
9
- FCS_COP.1:
9
- FCS_RNG:
2
- FCS_RNG.1.1: 3
- FCS_RNG.1.2: 3
- FCS_CKM.1.1:
1
- FCS_CKM.4.1:
1
- FCS_COP.1.1:
1
- FCS_CKM.2:
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 |
19
|
9
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1.1 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 |
4
|
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 |
29
|
9
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 |
9
|
9
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FDP |
- FDP_ACF: 1
- FDP_ITC.1:
12
- FDP_ITC.2:
12
- FDP_ACC.1:
18
- FDP_ACF.1:
11
- FDP_ACC.1.1:
1
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
2
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
2
- FDP_UCT.1: 10
- FDP_IFC.1:
4
- FDP_UCT.1.1: 1
- FDP_UIT.1: 10
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FDP_ITC: 2
|
- FDP_ACC.1:
14
- FDP_ACF.1:
13
- FDP_ACC.1.1:
1
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
1
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
- FDP_ITC.1:
2
- FDP_ITC.2:
2
- FDP_IFC.1:
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 |
18
|
14
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 |
11
|
13
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 |
4
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 |
12
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 |
12
|
2
|
pdf_data/st_keywords/cc_sfr/FIA |
- FIA_API: 13
- FIA_AFL.1: 11
- FIA_SOS.2: 1
- FIA_API.1: 5
- FIA_API.1.1: 1
- FIA_UAU.5.2: 3
- FIA_UAU.4: 11
- FIA_UAU.6:
11
- FIA_UID.1:
11
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_UAU.1:
10
- FIA_UAU.1.1:
1
- FIA_UAU.1.2:
1
- FIA_UAU.4.1: 1
- FIA_UAU.5: 10
- FIA_UAU.5.1: 1
- FIA_UAU.6.1:
1
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_UAU: 5
|
- FIA_UAU.1:
7
- FIA_UAU.6:
8
- FIA_SOS.1: 8
- FIA_UAU.2: 9
- FIA_UID.2: 10
- FIA_UAU.1.1:
1
- FIA_UAU.1.2:
1
- FIA_UAU.6.1:
1
- FIA_SOS.1.1: 1
- FIA_UAU.2.1: 1
- FIA_UID.2.1: 1
- FIA_UID.1:
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 |
10
|
7
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.6 |
11
|
8
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.6.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 |
11
|
2
|
pdf_data/st_keywords/cc_sfr/FMT |
- FMT_LIM: 7
- FMT_LIM.1: 20
- FMT_LIM.2: 18
- FMT_LIM.1.1: 2
- FMT_LIM.2.1: 2
- FMT_MSA.3:
3
- FMT_SMF.1:
20
- FMT_SMR.1:
24
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_MTD.1:
6
- FMT_MTD:
36
- FMT_MSA.1:
1
- FMT_SRM.1: 1
|
- FMT_MSA.1:
8
- FMT_MTD:
12
- FMT_SMF: 20
- FMT_SMR.1:
12
- FMT_SMF.1:
6
- FMT_MTD.1:
3
- FMT_MSA.1.1: 1
- FMT_MTD.1.1: 2
- FMT_SMF.1.1:
2
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_MSA.3:
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 |
1
|
8
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 |
3
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD |
36
|
12
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 |
6
|
3
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
20
|
6
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
24
|
12
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT |
- FPT_EMS: 4
- FPT_EMS.1: 13
- FPT_EMS.1.1: 3
- FPT_EMS.1.2: 3
- FPT_FLS.1:
11
- FPT_TST.1: 10
- FPT_PHP.3: 12
- FPT_FLS.1.1:
1
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FPT_PHP.3.1: 1
|
- FPT_FLS.1:
9
- FPT_RCV.4: 8
- FPT_PHP.1: 8
- FPT_RCV.4.1: 2
- FPT_FLS.1.1:
1
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 |
11
|
9
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1.1 |
1
|
1
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- Out of scope:
2
- 11 1.5.4.3 Out of scope :
1
- 11 1.5.4.3 Out of scope ........................................................................................... 12 1.5:
1
- from the KRMC to the device. Commands are queued at the KRMC until polled form the device. 1.5.4.3 Out of scope The TOE supports additional features that are not part of the scope: ● Antivirus solution ●:
1
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function/SHA |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA2 |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-256 |
1
|
1
|
pdf_data/st_keywords/ic_data_group |
- EF:
- EF.DG1:
28
- EF.DG2:
10
- EF.DG3:
6
- EF.DG4:
6
- EF.DG5:
7
- EF.DG16:
26
- EF.DG13:
3
- EF.DG14:
3
- EF.DG15:
5
- EF.DG6:
1
- EF.COM:
8
- EF.SOD:
8
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness/RNG |
|
|
pdf_data/st_keywords/randomness/RNG/RNG |
2
|
14
|
pdf_data/st_keywords/side_channel_analysis |
- SCA:
- Leak-Inherent:
1
- physical probing:
3
- DPA:
2
- SPA:
1
- timing attacks:
1
- FI:
- Physical Tampering:
5
- physical tampering:
1
- Physical tampering:
1
- Malfunction:
6
- malfunction:
5
- fault injection:
1
- other:
|
|
pdf_data/st_keywords/side_channel_analysis/FI |
- Physical Tampering: 5
- physical tampering:
1
- Physical tampering: 1
- Malfunction: 6
- malfunction: 5
- fault injection: 1
|
|
pdf_data/st_keywords/side_channel_analysis/FI/physical tampering |
1
|
3
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS46-3:
3
- FIPS PUB 46-3:
1
- FIPS 180-2:
1
- FIPS 46-3:
2
- RFC:
- ISO:
- ISO/IEC 14443:
2
- ISO/IEC 7816-4:
1
- ICAO:
- CC:
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
- CCMB-2017-04-004:
1
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor |
- Samsung:
- Gemalto:
- Thales:
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata |
- pdf_file_size_bytes:
1660503
- pdf_is_encrypted:
False
- pdf_number_of_pages:
55
- /Title:
MultiApp V4.1: eTravel 2.3 BAC Security Target
- /Author:
D1417545
- /Subject:
1.5
- /Keywords:
05-07-2018
- /Creator:
Microsoft® Word 2016
- /CreationDate:
D:20210921161905+02'00'
- /ModDate:
D:20210921161905+02'00'
- /Producer:
Microsoft® Word 2016
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
704587
- pdf_is_encrypted:
False
- pdf_number_of_pages:
41
- /Keywords:
Security Target, Common Criteria, USB Storage, Encryption, Protected Storage
- /Subject:
- /Title:
Kanguru Defender Security Target (version 1.10 as of 2014-10-06)
- /Creator:
Unknown
- /Author:
Andreas Siegert (generated by CCTool version 2.8)
- /Producer:
XEP 4.23
- /application: CCTool version x.y
- /Trapped: /False
- /CreationDate:
D:20141006150157Z
- /ModDate:
D:20141006150157Z
- pdf_hyperlinks:
http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R3.pdf
|
pdf_data/st_metadata//Author |
D1417545
|
Andreas Siegert (generated by CCTool version 2.8)
|
pdf_data/st_metadata//CreationDate |
D:20210921161905+02'00'
|
D:20141006150157Z
|
pdf_data/st_metadata//Creator |
Microsoft® Word 2016
|
Unknown
|
pdf_data/st_metadata//Keywords |
05-07-2018
|
Security Target, Common Criteria, USB Storage, Encryption, Protected Storage
|
pdf_data/st_metadata//ModDate |
D:20210921161905+02'00'
|
D:20141006150157Z
|
pdf_data/st_metadata//Producer |
Microsoft® Word 2016
|
XEP 4.23
|
pdf_data/st_metadata//Subject |
1.5
|
|
pdf_data/st_metadata//Title |
MultiApp V4.1: eTravel 2.3 BAC Security Target
|
Kanguru Defender Security Target (version 1.10 as of 2014-10-06)
|
pdf_data/st_metadata/pdf_file_size_bytes |
1660503
|
704587
|
pdf_data/st_metadata/pdf_hyperlinks |
|
http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R3.pdf |
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
55
|
41
|
dgst |
c41fa08d50e81932
|
eda06ca3c208ebd0
|