Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Plateforme Java Card en configuration ouverte de la carte à puce MultiApp v3.1 masquée sur le composant P60D080PVC(Version du patch : 1.4)
ANSSI-CC-2014/86
IAS ECC V2, Version 1.3 en configuration #4 sur la plateforme ID-One Cosmo v8.2
ANSSI-CC-2019/36
name Plateforme Java Card en configuration ouverte de la carte à puce MultiApp v3.1 masquée sur le composant P60D080PVC(Version du patch : 1.4) IAS ECC V2, Version 1.3 en configuration #4 sur la plateforme ID-One Cosmo v8.2
not_valid_before 2014-12-22 2019-09-17
not_valid_after 2019-12-22 2024-09-17
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI_cible2014_86_LITE.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2019_36en.pdf
manufacturer Gemalto / NXP Semiconductors Idemia
manufacturer_web https://www.gemalto.com/ https://www.idemia.com
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2014_86.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2019_36fr.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Java Card™ System Protection Profile Open Configuration, Version 3.0', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/ANSSI-CC-profil_PP-2010-03en.pdf', 'pp_ids': frozenset({'ANSSI-CC-PP-2010-03', 'JCSPPC', 'ANSSI-CC-PP-2001-03-M01'})}) frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 4: Extension for device with key gene...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0071b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Version...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 3: Device with key import', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0075b_pdf.pdf', 'pp_ids': frozenset({'PP_SSCD_PART3_V1.0.2'})})
maintenance_updates frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2022, 11, 17), 'maintenance_title': 'Reassessment report : ANSSI-CC-2019/36-01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2019_36-s01.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-cc-2019_36-s01.pdf'})
state/report/convert_garbage False True
state/report/pdf_hash c11a55d96f7645af38060f050513a34bf020db62b7dffab22b902f2ddfb87c21 60a86f8d80bc4a5a33fddf4f92414fc58fb8bc87d9163f90104f149d5589d277
state/report/txt_hash 1af2633037cf51255fc3536ab8fb6aaced2078008edd7ffa25b4b1de811cacbe abbc68bd920f8062047bffd7d4be0f34c350ff7431cc165e38f308df03daf85e
state/st/pdf_hash d5e97cff024273121e28248463513405b95dcb5ac796c24227003f7030d1dbd6 c2c589271a5e1674da7e5ebf250a0840f6ffb5b02d15ac874e7b1abb5aefb565
state/st/txt_hash 181b2f07c07d227fa74abfc63c36afeb2e1d7a0907d9d66cf42db2e56dd61d61 6c8ef060047b0ef8b3cc12f7fc7c3acba1b2d0042ce8df9e843e00af0bbdef59
heuristics/cert_id ANSSI-CC-2014/86 ANSSI-CC-2019/36
heuristics/cert_lab SERMA None
heuristics/extracted_versions 3.1, 1.4 8.2, 1.3
heuristics/report_references/directly_referenced_by ANSSI-CC-2015/02, ANSSI-CC-2015/04, ANSSI-CC-2015/15, ANSSI-CC-2015/08, ANSSI-CC-2015/01, ANSSI-CC-2015/03, ANSSI-CC-2015/30 ANSSI-CC-2020/53, ANSSI-CC-2019/43
heuristics/report_references/directly_referencing BSI-DSZ-CC-0837-2013, ANSSI-CC-2014/06 ANSSI-CC-2019/28, BSI-DSZ-CC-1059-2018
heuristics/report_references/indirectly_referenced_by ANSSI-CC-2015/02, ANSSI-CC-2015/38, ANSSI-CC-2015/40, ANSSI-CC-2015/04, ANSSI-CC-2015/37, ANSSI-CC-2015/30, ANSSI-CC-2015/15, ANSSI-CC-2015/41, ANSSI-CC-2015/08, ANSSI-CC-2016/03, ANSSI-CC-2015/39, ANSSI-CC-2016/04, ANSSI-CC-2015/01, ANSSI-CC-2015/03 ANSSI-CC-2020/53, ANSSI-CC-2019/43
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0640-2010, ANSSI-CC-2014/06, BSI-DSZ-CC-0837-2013 BSI-DSZ-CC-1059-2018, ANSSI-CC-2017/49, BSI-DSZ-CC-0973-2016, BSI-DSZ-CC-0973-V2-2016, ANSSI-CC-2019/28
heuristics/scheme_data/cert_id 2014/86 2019/33
heuristics/scheme_data/description La certification porte sur la plateforme ouverte Java Card du produit « MultiApp v3.1 » qui est une carte à puce pouvant être en mode contact ou sans contact. Le produit est développé par la société GEMALTO et embarqué sur le microcontrôleur P60D080PVC fabriqué par la société NXP SEMICONDUCTORS. La plateforme ouverte Java Card est destinée à fournir des services de sécurité aux applets qui sero Le produit évalué est l’application « IAS ECC V2, version 1.3 en configuration #1 sur la plateforme ID-One Cosmo v8.2, Identification F0 02 02 13 » développée par Idemia et masquée sur le composant NXP P60D145 développé par NXP Semiconductors GmbH. Ce produit est une carte à puce constituée d’un logiciel conforme au standard IAS ECC v2 et d’un microcontrôleur sécurisés. Il est destiné à être util
heuristics/scheme_data/developer Gemalto / NXP Semiconductors Idemia, NXP Semiconductors GmbH
heuristics/scheme_data/enhanced/cc_version Critères Communs version 3.1r4 Critères Communs version 3.1r5
heuristics/scheme_data/enhanced/cert_id 2014/86 2019/33
heuristics/scheme_data/enhanced/certification_date 22/12/2005 17/09/2019
heuristics/scheme_data/enhanced/developer Gemalto / NXP Semiconductors Idemia, NXP Semiconductors GmbH
heuristics/scheme_data/enhanced/evaluation_facility Serma Technologies CEA-LETI
heuristics/scheme_data/enhanced/protection_profile PP JCS PP for secure signature creation device (Part 2, 3, 4, 5, 6)
heuristics/scheme_data/enhanced/report_link https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi_2014-86fr.pdf https://cyber.gouv.fr/sites/default/files/2019/10/anssi-cc-2019_33fr.pdf
heuristics/scheme_data/enhanced/sponsor Gemalto Idemia
heuristics/scheme_data/enhanced/target_link https://cyber.gouv.fr/sites/default/files/IMG/certificat/DCSSI-cible_2014-86en.pdf https://cyber.gouv.fr/sites/default/files/2019/10/anssi-cible-cc-2019_33en.pdf
heuristics/scheme_data/product Plateforme Java Card en configuration ouverte de la carte à puce MultiApp v3.1 masquée sur le composant P60D080PVC IAS ECC V2, version 1.3 en configuration #1 sur la plateforme ID-One Cosmo v8.2
heuristics/scheme_data/sponsor Gemalto Idemia
heuristics/scheme_data/url https://cyber.gouv.fr/produits-certifies/plateforme-java-card-en-configuration-ouverte-de-la-carte-puce-multiapp-v31 https://cyber.gouv.fr/produits-certifies/ias-ecc-v2-version-13-en-configuration-1-sur-la-plateforme-id-one-cosmo-v82
heuristics/st_references/directly_referenced_by None ANSSI-CC-2019/43-R01, ANSSI-CC-2019/43
heuristics/st_references/directly_referencing None ANSSI-CC-2019/28
heuristics/st_references/indirectly_referenced_by None ANSSI-CC-2019/43-R01, ANSSI-CC-2019/43
heuristics/st_references/indirectly_referencing None ANSSI-CC-2019/28
pdf_data/report_filename ANSSI-CC-2014_86.pdf anssi-cc-2019_36fr.pdf
pdf_data/report_frontpage/FR
  • match_rules: Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables
  • cert_id: ANSSI-CC-2014/86
  • cert_item: Plateforme Java Card en configuration ouverte de la carte à puce MultiApp v3.1 masquée sur le composant P60D080PVC
  • cert_item_version: Version de la plateforme Java Card MultiApp : 3.1 Version du patch : 1.4
  • ref_protection_profiles: ANSSI-CC-PP-2010/03-M01 [PP JCS] Java Card System – Open Configuration, version 3.0
  • cc_version: Critères Communs version 3.1 révision 4
  • cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
  • developer: Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France NXP Semiconductors Box 54 02 40, D-22502 Hambourg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France
  • cert_lab: Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 28
pdf_data/report_keywords/cc_cert_id/DE
  • BSI-DSZ-CC-0837-2013: 3
  • BSI-DSZ-CC-1059-2018: 1
pdf_data/report_keywords/cc_cert_id/FR
  • ANSSI-CC-2014/86: 22
  • ANSSI-CC-2014/06: 1
  • ANSSI-CC-2019/36: 18
  • ANSSI-CC-2019/28: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0035-2007: 2
    • BSI-PP-0035-: 1
  • ANSSI:
    • ANSSI-CC-PP-2010/03-M01: 2
  • BSI:
    • BSI-CC-PP-0059-2009-MA-01: 1
    • BSI-CC-PP-0075-2012: 1
    • BSI-CC-PP-0071-2012: 1
    • BSI-CC-PP- 0059-2009-MA-01: 1
    • BSI-CC-PP- 0075-2012: 1
    • BSI-CC-PP- 0071-2012: 1
    • BSI-PP-0084-2014: 1
  • other:
    • PP-SSCD-Part2: 1
    • PP-SSCD-Part4: 1
    • PP-SSCD-: 3
pdf_data/report_keywords/cc_protection_profile_id/BSI
  • BSI-PP-0035-2007: 2
  • BSI-PP-0035-: 1
  • BSI-CC-PP-0059-2009-MA-01: 1
  • BSI-CC-PP-0075-2012: 1
  • BSI-CC-PP-0071-2012: 1
  • BSI-CC-PP- 0059-2009-MA-01: 1
  • BSI-CC-PP- 0075-2012: 1
  • BSI-CC-PP- 0071-2012: 1
  • BSI-PP-0084-2014: 1
pdf_data/report_keywords/cc_sar/ADV
  • ADV_ARC: 1
  • ADV_FSP: 1
  • ADV_IMP: 1
  • ADV_INT: 1
  • ADV_SPM: 1
  • ADV_TDS: 1
  • ADV_ARC: 1
  • ADV_FSP: 1
  • ADV_INT: 1
  • ADV_SPM: 1
  • ADV_TDS: 1
  • ADV_PRE: 1
  • ADV_OPE: 1
pdf_data/report_keywords/cc_sar/AGD
  • AGD_OPE: 3
  • AGD_PRE: 3
  • AGD_PRE: 5
  • AGD_OPE: 3
  • AGD_QUA: 2
  • AGD_PPRE: 1
  • AGD_POPE: 1
  • AGD_PDEV: 1
  • AGD_PALP: 1
pdf_data/report_keywords/cc_sar/AGD/AGD_PRE 3 5
pdf_data/report_keywords/cc_sar/ALC
  • ALC_DVS.2: 2
  • ALC_FLR.1: 1
  • ALC_FLR: 2
  • ALC_CMC: 1
  • ALC_CMS: 1
  • ALC_DEL: 1
  • ALC_DVS: 1
  • ALC_TAT: 1
  • ALC_DVS.2: 2
  • ALC_FLR: 2
  • ALC_CMC: 1
  • ALC_GMS: 1
  • ALC_DEL: 1
pdf_data/report_keywords/cc_sar/ASE
  • ASE_TSS.2: 1
  • ASE_CCL: 1
  • ASE_ECD: 1
  • ASE_INT: 1
  • ASE_OBJ: 1
  • ASE_REQ: 1
  • ASE_SPD: 1
  • ASE_TSS: 1
  • ASE_CCL: 1
  • ASE_ECD: 1
  • ASE_INT: 1
  • ASE_OBJ: 1
  • ASE_REQ: 1
  • ASE_SPD: 1
  • ASE_TSS: 1
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN.5 3 2
pdf_data/report_keywords/cc_security_level/EAL
  • EAL 5: 3
  • EAL4: 2
  • EAL6: 1
  • EAL7: 1
  • EAL 1: 1
  • EAL 3: 1
  • EAL 7: 1
  • EAL 5: 2
  • EAL2: 2
  • EAL7: 1
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 3 2
pdf_data/report_keywords/eval_facility
  • Serma:
    • Serma Technologies: 2
  • Serma:
    • SERMA: 4
  • CESTI:
    • CESTI: 3
  • CEA-LETI:
    • CEA - LETI: 1
pdf_data/report_keywords/eval_facility/Serma
  • Serma Technologies: 2
  • SERMA: 4
pdf_data/report_keywords/javacard_packages
  • javacardx:
    • javacardx.pace: 1
  • com:
    • com.gemalto.javacardx.pace: 1
pdf_data/report_keywords/standard_id/CC
  • CCMB-2012-09-001: 1
  • CCMB-2012-09-002: 1
  • CCMB-2012-09-003: 1
  • CCMB-2012-09-004: 1
  • CCMB-2017-04-001: 1
  • CCMB-2017-04-002: 1
  • CCMB-2017-04-003: 1
  • CCMB-2017-04-004: 1
pdf_data/report_keywords/vendor
  • NXP:
    • NXP Semiconductors: 2
    • NXP: 3
  • Gemalto:
    • Gemalto: 27
  • NXP:
    • NXP Semiconductors: 2
    • NXP: 8
  • Idemia:
    • Idemia: 2
    • IDEMIA: 21
pdf_data/report_keywords/vendor/NXP/NXP 3 8
pdf_data/report_metadata
  • pdf_file_size_bytes: 725914
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 21
  • /Title: ANSSI-CC-2014/86
  • /Author: Beatrice Duquesnoy
  • /Subject: Plateforme Java Card en configuration ouverte de la carte à puce MultiApp v3.1 masquée sur le composant P60D080PVC
  • /Keywords: ANSSI-CC-CER-F-07.014
  • /Creator: Microsoft® Word 2010
  • /CreationDate: D:20150105175233+01'00'
  • /ModDate: D:20150105175233+01'00'
  • /Producer: Microsoft® Word 2010
  • pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
  • pdf_file_size_bytes: 293777
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 18
  • /Author: chuzel
  • /CreationDate: D:20190925140113+02'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20190925140113+02'00'
  • /Producer: Acrobat Distiller 11.0 (Windows)
  • /Title: Microsoft Word - ANSSI-CC-2019_36fr.docx
  • pdf_hyperlinks:
pdf_data/report_metadata//Author Beatrice Duquesnoy chuzel
pdf_data/report_metadata//CreationDate D:20150105175233+01'00' D:20190925140113+02'00'
pdf_data/report_metadata//Creator Microsoft® Word 2010 PScript5.dll Version 5.2.2
pdf_data/report_metadata//ModDate D:20150105175233+01'00' D:20190925140113+02'00'
pdf_data/report_metadata//Producer Microsoft® Word 2010 Acrobat Distiller 11.0 (Windows)
pdf_data/report_metadata//Title ANSSI-CC-2014/86 Microsoft Word - ANSSI-CC-2019_36fr.docx
pdf_data/report_metadata/pdf_file_size_bytes 725914 293777
pdf_data/report_metadata/pdf_hyperlinks http://www.ssi.gouv.fr/, mailto:[email protected]
pdf_data/report_metadata/pdf_number_of_pages 21 18
pdf_data/st_filename ANSSI_cible2014_86_LITE.pdf anssi-cible-cc-2019_36en.pdf
pdf_data/st_keywords/asymmetric_crypto/ECC
  • ECDH:
    • ECDH: 1
  • ECDSA:
    • ECDSA: 3
  • ECC:
    • ECC: 8
  • ECDSA:
    • ECDSA: 2
  • ECC:
    • ECC: 36
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC 8 36
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA 3 2
pdf_data/st_keywords/asymmetric_crypto/FF
  • DH:
    • Diffie-Hellman: 4
    • DH: 5
  • DH:
    • DH: 5
    • Diffie-Hellman: 1
  • DSA:
    • DSA: 1
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman 4 1
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0837-2013-MA-01: 2
  • NL:
    • CC-1: 2
    • CC-2: 3
    • CC-3: 3
  • FR:
    • ANSSI-CC-2019/28: 1
pdf_data/st_keywords/cc_claims
  • D:
    • D.APP_CODE: 6
    • D.APP_C_DATA: 3
    • D.APP_I_DATA: 4
    • D.PIN: 4
    • D.API_DATA: 3
    • D.CRYPTO: 5
    • D.JCS_CODE: 3
    • D.JCS_DATA: 5
    • D.SEC_DATA: 7
  • O:
    • O.SID: 13
    • O.FIREWALL: 12
    • O.GLOBAL_ARRAYS_CONFID: 6
    • O.GLOBAL_ARRAYS_INTEG: 5
    • O.NATIVE: 11
    • O.OPERATE: 15
    • O.REALLOCATION: 5
    • O.RESOURCES: 9
    • O.ALARM: 15
    • O.CIPHER: 10
    • O.KEY-MNGT: 5
    • O.PIN-MNGT: 5
    • O.TRANSACTION: 6
    • O.OBJ-DELETION: 4
    • O.DELETION: 8
    • O.LOAD: 6
    • O.INSTALL: 11
    • O.SCP: 36
    • O.CARD-MANAGEMENT: 3
    • O.RND: 13
    • O.KEY_MNGT: 4
    • O.CARD_MANAGEMENT: 18
    • O.KEY-: 1
    • O.PIN-: 1
    • O.HW_AES: 2
    • O.APPLET: 28
    • O.CODE_PKG: 7
    • O.JAVAOBJECT: 56
    • O.CODE_PCKG: 16
    • O.GLOBAL_ARRAYS_CO: 3
    • O.GLOBAL_ARRAYS_INT: 3
  • T:
    • T.CONFID-APPLI-DATA: 4
    • T.CONFID-JCS-CODE: 4
    • T.CONFID-JCS-DATA: 4
    • T.INTEG-APPLI-CODE: 7
    • T.INTEG-APPLI-DATA: 8
    • T.INTEG-JCS-CODE: 3
    • T.INTEG-JCS-DATA: 4
    • T.SID: 8
    • T.EXE-CODE: 8
    • T.NATIVE: 4
    • T.RESOURCES: 3
    • T.DELETION: 3
    • T.INSTALL: 4
    • T.OBJ-DELETION: 4
    • T.PHYSICAL: 4
  • A:
    • A.APPLET: 5
    • A.DELETION: 5
    • A.VERIFICATION: 4
  • R:
    • R.JAVA: 9
  • OP:
    • OP.ARRAY_ACCESS: 6
    • OP.CREATE: 10
    • OP.DELETE_APPLET: 6
    • OP.DELETE_PCKG: 4
    • OP.DELETE_PCKG_APPLET: 4
    • OP.INSTANCE_FIELD: 6
    • OP.INVK_VIRTUAL: 8
    • OP.INVK_INTERFACE: 10
    • OP.JAVA: 8
    • OP.THROW: 7
    • OP.TYPE_ACCESS: 7
    • OP.PUT: 7
  • OE:
    • OE.VERIFICATION: 25
    • OE.APPLET: 4
    • OE.CODE-EVIDENCE: 10
    • OE.CODE_EVIDENCE: 1
    • OE.CARD-MANAGEMENT: 1
    • OE.SCP: 6
  • OSP:
    • OSP: 1
    • OSP.VERIFICATION: 4
    • OSP.RNG: 1
    • OSP.RND: 3
  • T:
    • T.CONFID_APPLI_DATA: 3
    • T.RESSOURCES: 3
    • T.OBJ_DELETION: 3
    • T.PHYSICAL: 3
    • T.INTEG_APPLI_DATA: 8
  • A:
    • A.CGA: 4
    • A.SCA: 3
    • A.CSP: 4
    • A.PLT: 2
    • A.APPLET: 1
    • A.VERIFICATION: 1
  • OE:
    • OE.HID_VAD: 4
    • OE.PLT: 2
    • OE.VERIFICATION: 4
    • OE.CODE_EVIDENCE: 2
    • OE.APPLET: 1
    • OE.CODE-EVIDENCE: 1
  • OSP:
    • OSP.PLT: 1
    • OSP.VERIFICATION: 1
pdf_data/st_keywords/cc_claims/A
  • A.APPLET: 5
  • A.DELETION: 5
  • A.VERIFICATION: 4
  • A.CGA: 4
  • A.SCA: 3
  • A.CSP: 4
  • A.PLT: 2
  • A.APPLET: 1
  • A.VERIFICATION: 1
pdf_data/st_keywords/cc_claims/A/A.APPLET 5 1
pdf_data/st_keywords/cc_claims/A/A.VERIFICATION 4 1
pdf_data/st_keywords/cc_claims/OE
  • OE.VERIFICATION: 25
  • OE.APPLET: 4
  • OE.CODE-EVIDENCE: 10
  • OE.CODE_EVIDENCE: 1
  • OE.CARD-MANAGEMENT: 1
  • OE.SCP: 6
  • OE.HID_VAD: 4
  • OE.PLT: 2
  • OE.VERIFICATION: 4
  • OE.CODE_EVIDENCE: 2
  • OE.APPLET: 1
  • OE.CODE-EVIDENCE: 1
pdf_data/st_keywords/cc_claims/OE/OE.APPLET 4 1
pdf_data/st_keywords/cc_claims/OE/OE.CODE-EVIDENCE 10 1
pdf_data/st_keywords/cc_claims/OE/OE.CODE_EVIDENCE 1 2
pdf_data/st_keywords/cc_claims/OE/OE.VERIFICATION 25 4
pdf_data/st_keywords/cc_claims/OSP
  • OSP: 1
  • OSP.VERIFICATION: 4
  • OSP.RNG: 1
  • OSP.RND: 3
  • OSP.PLT: 1
  • OSP.VERIFICATION: 1
pdf_data/st_keywords/cc_claims/OSP/OSP.VERIFICATION 4 1
pdf_data/st_keywords/cc_claims/T
  • T.CONFID-APPLI-DATA: 4
  • T.CONFID-JCS-CODE: 4
  • T.CONFID-JCS-DATA: 4
  • T.INTEG-APPLI-CODE: 7
  • T.INTEG-APPLI-DATA: 8
  • T.INTEG-JCS-CODE: 3
  • T.INTEG-JCS-DATA: 4
  • T.SID: 8
  • T.EXE-CODE: 8
  • T.NATIVE: 4
  • T.RESOURCES: 3
  • T.DELETION: 3
  • T.INSTALL: 4
  • T.OBJ-DELETION: 4
  • T.PHYSICAL: 4
  • T.CONFID_APPLI_DATA: 3
  • T.RESSOURCES: 3
  • T.OBJ_DELETION: 3
  • T.PHYSICAL: 3
  • T.INTEG_APPLI_DATA: 8
pdf_data/st_keywords/cc_claims/T/T.PHYSICAL 4 3
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0035: 1
    • BSI-CC-PP-0055: 1
    • BSI-PP-0005: 1
    • BSI-PP-0006: 1
    • BSI-CC-PP-0059-2009-MA-01: 1
    • BSI-CC-PP-0075-2012: 1
  • other:
    • PP-SSCD-T2: 2
    • PP-SSCD-T3: 2
    • PP-SSCD-KG: 2
    • PP-SSCD-KI: 2
  • BSI:
    • BSI-CC-PP-0084-2014: 1
    • BSI-CC-PP-0059-2009-MA-01: 1
    • BSI-CC-PP-0075: 1
    • BSI-CC-PP-0071: 1
pdf_data/st_keywords/cc_protection_profile_id/BSI
  • BSI-PP-0035: 1
  • BSI-CC-PP-0055: 1
  • BSI-PP-0005: 1
  • BSI-PP-0006: 1
  • BSI-CC-PP-0059-2009-MA-01: 1
  • BSI-CC-PP-0075-2012: 1
  • BSI-CC-PP-0084-2014: 1
  • BSI-CC-PP-0059-2009-MA-01: 1
  • BSI-CC-PP-0075: 1
  • BSI-CC-PP-0071: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 10
    • ADV_TDS.1: 2
    • ADV_TDS.4: 8
    • ADV_IMP.1: 9
    • ADV_TDS.3: 4
    • ADV_INT.2: 3
    • ADV_FSP.5: 6
    • ADV_FSP.1: 1
    • ADV_FSP.2: 2
    • ADV_FSP.4: 2
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE.1: 9
    • AGD_PRE.1: 7
    • AGD_PRE: 1
  • ALC:
    • ALC_DVS.2: 9
    • ALC_TAT.1: 2
    • ALC_TAT.2: 5
    • ALC_CMC.4: 3
    • ALC_DVS.1: 2
    • ALC_LCD.1: 5
    • ALC_DEL.1: 3
    • ALC_CMS.5: 2
  • ATE:
    • ATE_COV.2: 4
    • ATE_FUN.1: 9
    • ATE_COV.1: 2
    • ATE_IND.2: 4
    • ATE_DPT.1: 2
    • ATE_DPT.3: 3
  • AVA:
    • AVA_VAN.5: 9
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_TDS: 1
    • ADV_ARC.1: 2
    • ADV_TDS.3: 2
  • AGD:
    • AGD_PRE: 14
    • AGD_OPE: 10
    • AGD_PRE_PLT: 2
    • AGD_OPE.1: 2
  • ALC:
    • ALC_DVS.2: 7
    • ALC_DVS: 2
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_LCD: 1
    • ALC_TAT: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
    • ATE_DPT.1: 2
  • AVA:
    • AVA_VAN.5: 8
    • AVA_VAN: 2
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_TSS: 1
pdf_data/st_keywords/cc_sar/ADV
  • ADV_ARC.1: 10
  • ADV_TDS.1: 2
  • ADV_TDS.4: 8
  • ADV_IMP.1: 9
  • ADV_TDS.3: 4
  • ADV_INT.2: 3
  • ADV_FSP.5: 6
  • ADV_FSP.1: 1
  • ADV_FSP.2: 2
  • ADV_FSP.4: 2
  • ADV_ARC: 1
  • ADV_FSP: 1
  • ADV_IMP: 1
  • ADV_TDS: 1
  • ADV_ARC: 1
  • ADV_FSP: 1
  • ADV_IMP: 1
  • ADV_INT: 1
  • ADV_TDS: 1
  • ADV_ARC.1: 2
  • ADV_TDS.3: 2
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 10 2
pdf_data/st_keywords/cc_sar/ADV/ADV_TDS.3 4 2
pdf_data/st_keywords/cc_sar/AGD
  • AGD_OPE.1: 9
  • AGD_PRE.1: 7
  • AGD_PRE: 1
  • AGD_PRE: 14
  • AGD_OPE: 10
  • AGD_PRE_PLT: 2
  • AGD_OPE.1: 2
pdf_data/st_keywords/cc_sar/AGD/AGD_OPE.1 9 2
pdf_data/st_keywords/cc_sar/AGD/AGD_PRE 1 14
pdf_data/st_keywords/cc_sar/ALC
  • ALC_DVS.2: 9
  • ALC_TAT.1: 2
  • ALC_TAT.2: 5
  • ALC_CMC.4: 3
  • ALC_DVS.1: 2
  • ALC_LCD.1: 5
  • ALC_DEL.1: 3
  • ALC_CMS.5: 2
  • ALC_DVS.2: 7
  • ALC_DVS: 2
  • ALC_CMC: 1
  • ALC_CMS: 1
  • ALC_DEL: 1
  • ALC_LCD: 1
  • ALC_TAT: 1
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 9 7
pdf_data/st_keywords/cc_sar/ATE
  • ATE_COV.2: 4
  • ATE_FUN.1: 9
  • ATE_COV.1: 2
  • ATE_IND.2: 4
  • ATE_DPT.1: 2
  • ATE_DPT.3: 3
  • ATE_COV: 1
  • ATE_DPT: 1
  • ATE_FUN: 1
  • ATE_IND: 1
  • ATE_DPT.1: 2
pdf_data/st_keywords/cc_sar/AVA
  • AVA_VAN.5: 9
  • AVA_VAN.5: 8
  • AVA_VAN: 2
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.5 9 8
pdf_data/st_keywords/cc_security_level/EAL
  • EAL5+: 1
  • EAL5: 6
  • EAL 6+: 1
  • EAL5 augmented: 2
  • EAL5: 6
  • EAL 5: 2
  • EAL4: 1
  • EAL5 augmented: 2
  • EAL4 augmented: 1
  • EAL 5 augmented: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_ARP.1: 15
    • FAU_ARP.1.1: 1
    • FAU_SAA.1: 2
  • FCO:
    • FCO_NRO: 7
    • FCO_NRO.2: 3
  • FCS:
    • FCS_RND: 7
    • FCS_RND.1: 12
    • FCS_CKM.1: 21
    • FCS_RND.1.1: 2
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 8
    • FCS_CKM.2.1: 1
    • FCS_CKM.3: 7
    • FCS_CKM.3.1: 1
    • FCS_CKM.4: 15
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 19
    • FCS_COP.1.1: 1
    • FCS_RNG.1: 1
  • FDP:
    • FDP_ACC: 40
    • FDP_ACC.2: 6
    • FDP_ACF: 33
    • FDP_ACF.1: 16
    • FDP_IFC: 24
    • FDP_IFC.1: 12
    • FDP_IFF: 17
    • FDP_IFF.1: 12
    • FDP_RIP: 85
    • FDP_RIP.1: 10
    • FDP_ROL: 14
    • FDP_ROL.1: 2
    • FDP_SDI.2: 9
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_ITC: 12
    • FDP_ITC.2: 9
    • FDP_IFC.2: 2
    • FDP_UIT: 7
    • FDP_UIT.1: 2
    • FDP_ACC.1: 13
    • FDP_ITC.1: 4
  • FIA:
    • FIA_SOS.2: 1
    • FIA_ATD: 9
    • FIA_ATD.1: 2
    • FIA_UID: 14
    • FIA_UID.2: 1
    • FIA_USB: 8
    • FIA_USB.1: 3
    • FIA_UAU: 7
    • FIA_UAI.1: 1
    • FIA_UAU.1: 1
    • FIA_UID.1: 10
  • FMT:
    • FMT_MSA: 91
    • FMT_MSA.1: 11
    • FMT_MSA.2: 1
    • FMT_MSA.3: 15
    • FMT_SMR: 47
    • FMT_SMR.1: 22
    • FMT_SMF: 33
    • FMT_SMF.1: 9
    • FMT_MTD: 18
    • FMT_MTD.1: 3
    • FMT_MTD.3: 1
  • FPR:
    • FPR_UNO.1: 10
    • FPR_UNO.1.1: 1
    • FPR_UNO: 7
  • FPT:
    • FPT_FLS: 46
    • FPT_FLS.1: 5
    • FPT_TDC.1: 9
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_RCV: 16
    • FPT_RCV.3: 4
    • FPT_TST: 7
    • FPT_TST.1: 3
    • FPT_PHP: 7
    • FPT_PHP.3: 2
    • FPT_RCV.4: 2
    • FPT_ITT: 7
    • FPT_ITT.1: 1
  • FTP:
    • FTP_ITC: 9
    • FTP_ITC.1: 5
    • FTP_TRP.1: 2
  • FAU:
    • FAU_GEN: 1
    • FAU_ARP.1: 2
  • FCS:
    • FCS_RNG: 4
    • FCS_CKM.1: 41
    • FCS_CKM: 36
    • FCS_COP: 113
    • FCS_RNG.1: 22
    • FCS_RNG.1.1: 3
    • FCS_RNG.1.2: 3
    • FCS_CKM.2: 8
    • FCS_COP.1: 38
    • FCS_CKM.4: 60
    • FCS_CKM.4.1: 1
    • FCS_COP.1.1: 3
    • FCS_CKM.3: 9
  • FDP:
    • FDP_ACC: 85
    • FDP_ACF: 59
    • FDP_ETC: 12
    • FDP_ITC: 23
    • FDP_UCT: 13
    • FDP_UIT: 6
    • FDP_ITC.1: 43
    • FDP_ITC.2: 35
    • FDP_ACF.1: 42
    • FDP_ACC.1: 49
    • FDP_RIP.1: 10
    • FDP_RIP.1.1: 3
    • FDP_SDI: 15
    • FDP_SDI.1: 2
    • FDP_SDI.2: 6
    • FDP_IFC.1: 28
    • FDP_UCT.1: 2
    • FDP_DAU: 6
    • FDP_DAU.1: 1
    • FDP_DAU.2: 2
    • FDP_ETC.1: 4
    • FDP_UIT.1: 2
    • FDP_CKM: 4
    • FDP_CKM.1: 1
    • FDP_RIP: 11
    • FDP_ROL: 1
  • FIA:
    • FIA_API: 5
    • FIA_API.1: 9
    • FIA_UID.1: 19
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_UAU.1: 17
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_API.1.1: 1
    • FIA_AFL.1: 3
    • FIA_AFL: 24
    • FIA_AFL.1.1: 1
  • FMT:
    • FMT_MSA: 36
    • FMT_MTD: 44
    • FMT_MSA.3: 35
    • FMT_SMR.1: 48
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_SMF.1: 50
    • FMT_SMF.1.1: 1
    • FMT_MSA.1: 8
    • FMT_MSA.2: 11
    • FMT_MSA.2.1: 1
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MSA.4: 8
    • FMT_MSA.4.1: 1
    • FMT_MTD.1: 7
    • FMT_MOF.1: 7
    • FMT_MOF.1.1: 1
    • FMT_SMF: 2
  • FPR:
    • FPR_UNO.1: 1
    • FPR_UNO: 3
  • FPT:
    • FPT_EMS: 7
    • FPT_EMS.1: 9
    • FPT_EMS.1.1: 4
    • FPT_EMS.1.2: 2
    • FPT_TST.1: 13
    • FPT_FLS.1: 10
    • FPT_FLS.1.1: 1
    • FPT_TST: 1
    • FPT_FLS: 5
    • FPT_PHP.1: 5
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 7
    • FPT_PHP.3.1: 1
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_RCV: 2
    • FPT_PHP: 2
  • FTP:
    • FTP_ITC: 28
    • FTP_ITC.1: 14
    • FTP_TRP.1: 6
pdf_data/st_keywords/cc_sfr/FAU
  • FAU_ARP.1: 15
  • FAU_ARP.1.1: 1
  • FAU_SAA.1: 2
  • FAU_GEN: 1
  • FAU_ARP.1: 2
pdf_data/st_keywords/cc_sfr/FAU/FAU_ARP.1 15 2
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_RND: 7
  • FCS_RND.1: 12
  • FCS_CKM.1: 21
  • FCS_RND.1.1: 2
  • FCS_CKM.1.1: 1
  • FCS_CKM.2: 8
  • FCS_CKM.2.1: 1
  • FCS_CKM.3: 7
  • FCS_CKM.3.1: 1
  • FCS_CKM.4: 15
  • FCS_CKM.4.1: 1
  • FCS_COP.1: 19
  • FCS_COP.1.1: 1
  • FCS_RNG.1: 1
  • FCS_RNG: 4
  • FCS_CKM.1: 41
  • FCS_CKM: 36
  • FCS_COP: 113
  • FCS_RNG.1: 22
  • FCS_RNG.1.1: 3
  • FCS_RNG.1.2: 3
  • FCS_CKM.2: 8
  • FCS_COP.1: 38
  • FCS_CKM.4: 60
  • FCS_CKM.4.1: 1
  • FCS_COP.1.1: 3
  • FCS_CKM.3: 9
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 21 41
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.3 7 9
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 15 60
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 19 38
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1.1 1 3
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1 1 22
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACC: 40
  • FDP_ACC.2: 6
  • FDP_ACF: 33
  • FDP_ACF.1: 16
  • FDP_IFC: 24
  • FDP_IFC.1: 12
  • FDP_IFF: 17
  • FDP_IFF.1: 12
  • FDP_RIP: 85
  • FDP_RIP.1: 10
  • FDP_ROL: 14
  • FDP_ROL.1: 2
  • FDP_SDI.2: 9
  • FDP_SDI.2.1: 1
  • FDP_SDI.2.2: 1
  • FDP_ITC: 12
  • FDP_ITC.2: 9
  • FDP_IFC.2: 2
  • FDP_UIT: 7
  • FDP_UIT.1: 2
  • FDP_ACC.1: 13
  • FDP_ITC.1: 4
  • FDP_ACC: 85
  • FDP_ACF: 59
  • FDP_ETC: 12
  • FDP_ITC: 23
  • FDP_UCT: 13
  • FDP_UIT: 6
  • FDP_ITC.1: 43
  • FDP_ITC.2: 35
  • FDP_ACF.1: 42
  • FDP_ACC.1: 49
  • FDP_RIP.1: 10
  • FDP_RIP.1.1: 3
  • FDP_SDI: 15
  • FDP_SDI.1: 2
  • FDP_SDI.2: 6
  • FDP_IFC.1: 28
  • FDP_UCT.1: 2
  • FDP_DAU: 6
  • FDP_DAU.1: 1
  • FDP_DAU.2: 2
  • FDP_ETC.1: 4
  • FDP_UIT.1: 2
  • FDP_CKM: 4
  • FDP_CKM.1: 1
  • FDP_RIP: 11
  • FDP_ROL: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC 40 85
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 13 49
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF 33 59
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 16 42
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 12 28
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC 12 23
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 4 43
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 9 35
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP 85 11
pdf_data/st_keywords/cc_sfr/FDP/FDP_ROL 14 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2 9 6
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT 7 6
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_SOS.2: 1
  • FIA_ATD: 9
  • FIA_ATD.1: 2
  • FIA_UID: 14
  • FIA_UID.2: 1
  • FIA_USB: 8
  • FIA_USB.1: 3
  • FIA_UAU: 7
  • FIA_UAI.1: 1
  • FIA_UAU.1: 1
  • FIA_UID.1: 10
  • FIA_API: 5
  • FIA_API.1: 9
  • FIA_UID.1: 19
  • FIA_UID.1.1: 1
  • FIA_UID.1.2: 1
  • FIA_UAU.1: 17
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_API.1.1: 1
  • FIA_AFL.1: 3
  • FIA_AFL: 24
  • FIA_AFL.1.1: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 1 17
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 10 19
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_MSA: 91
  • FMT_MSA.1: 11
  • FMT_MSA.2: 1
  • FMT_MSA.3: 15
  • FMT_SMR: 47
  • FMT_SMR.1: 22
  • FMT_SMF: 33
  • FMT_SMF.1: 9
  • FMT_MTD: 18
  • FMT_MTD.1: 3
  • FMT_MTD.3: 1
  • FMT_MSA: 36
  • FMT_MTD: 44
  • FMT_MSA.3: 35
  • FMT_SMR.1: 48
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_SMF.1: 50
  • FMT_SMF.1.1: 1
  • FMT_MSA.1: 8
  • FMT_MSA.2: 11
  • FMT_MSA.2.1: 1
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_MSA.4: 8
  • FMT_MSA.4.1: 1
  • FMT_MTD.1: 7
  • FMT_MOF.1: 7
  • FMT_MOF.1.1: 1
  • FMT_SMF: 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA 91 36
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 11 8
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.2 1 11
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 15 35
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD 18 44
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 3 7
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF 33 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 9 50
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 22 48
pdf_data/st_keywords/cc_sfr/FPR
  • FPR_UNO.1: 10
  • FPR_UNO.1.1: 1
  • FPR_UNO: 7
  • FPR_UNO.1: 1
  • FPR_UNO: 3
pdf_data/st_keywords/cc_sfr/FPR/FPR_UNO 7 3
pdf_data/st_keywords/cc_sfr/FPR/FPR_UNO.1 10 1
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_FLS: 46
  • FPT_FLS.1: 5
  • FPT_TDC.1: 9
  • FPT_TDC.1.1: 1
  • FPT_TDC.1.2: 1
  • FPT_RCV: 16
  • FPT_RCV.3: 4
  • FPT_TST: 7
  • FPT_TST.1: 3
  • FPT_PHP: 7
  • FPT_PHP.3: 2
  • FPT_RCV.4: 2
  • FPT_ITT: 7
  • FPT_ITT.1: 1
  • FPT_EMS: 7
  • FPT_EMS.1: 9
  • FPT_EMS.1.1: 4
  • FPT_EMS.1.2: 2
  • FPT_TST.1: 13
  • FPT_FLS.1: 10
  • FPT_FLS.1.1: 1
  • FPT_TST: 1
  • FPT_FLS: 5
  • FPT_PHP.1: 5
  • FPT_PHP.1.1: 1
  • FPT_PHP.1.2: 1
  • FPT_PHP.3: 7
  • FPT_PHP.3.1: 1
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
  • FPT_RCV: 2
  • FPT_PHP: 2
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS 46 5
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 5 10
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP 7 2
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 2 7
pdf_data/st_keywords/cc_sfr/FPT/FPT_RCV 16 2
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST 7 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 3 13
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC 9 28
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 5 14
pdf_data/st_keywords/cc_sfr/FTP/FTP_TRP.1 2 6
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 10
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 10
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 10
  • KA:
    • Key agreement: 2
  • MAC:
    • MAC: 11
pdf_data/st_keywords/crypto_scheme/MAC/MAC 10 11
pdf_data/st_keywords/eval_facility
  • Serma:
    • SERMA: 1
pdf_data/st_keywords/hash_function/SHA/SHA1/SHA-1 4 8
pdf_data/st_keywords/hash_function/SHA/SHA2
  • SHA-224: 3
  • SHA-256: 4
  • SHA-384: 4
  • SHA-512: 3
  • SHA224: 1
  • SHA-256: 5
  • SHA-224: 2
  • SHA-384: 2
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-224 3 2
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-256 4 5
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-384 4 2
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 7
pdf_data/st_keywords/javacard_packages
  • javacard:
    • javacard.framework: 2
pdf_data/st_keywords/javacard_version
  • JavaCard:
    • Java Card 2.2.2: 7
    • JC2.2.2: 1
pdf_data/st_keywords/randomness
  • PRNG:
    • PRNG: 1
  • RNG:
    • RNG: 7
    • RND: 19
  • RNG:
    • RNG: 6
pdf_data/st_keywords/randomness/RNG
  • RNG: 7
  • RND: 19
  • RNG: 6
pdf_data/st_keywords/randomness/RNG/RNG 7 6
pdf_data/st_keywords/side_channel_analysis
  • SCA:
    • Leak-Inherent: 3
    • physical probing: 2
    • DPA: 1
  • FI:
    • physical tampering: 1
    • malfunction: 2
    • Malfunction: 3
    • fault induction: 2
  • SCA:
    • side channel: 1
    • SPA: 1
    • DPA: 1
    • timing attacks: 1
  • FI:
    • physical tampering: 5
    • DFA: 2
    • fault injection: 2
  • other:
    • JIL: 1
    • JIL-COMP: 2
pdf_data/st_keywords/side_channel_analysis/FI
  • physical tampering: 1
  • malfunction: 2
  • Malfunction: 3
  • fault induction: 2
  • physical tampering: 5
  • DFA: 2
  • fault injection: 2
pdf_data/st_keywords/side_channel_analysis/FI/physical tampering 1 5
pdf_data/st_keywords/side_channel_analysis/SCA
  • Leak-Inherent: 3
  • physical probing: 2
  • DPA: 1
  • side channel: 1
  • SPA: 1
  • DPA: 1
  • timing attacks: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS180-2: 1
    • FIPS197: 4
  • NIST:
    • SP 800-38: 2
  • PKCS:
    • PKCS#3: 1
    • PKCS#1: 8
    • PKCS#5: 5
  • BSI:
    • AIS31: 1
  • ICAO:
    • ICAO: 3
  • SCP:
    • SCP01: 3
    • SCP02: 3
    • SCP03: 3
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • FIPS:
    • FIPS180-3: 1
    • FIPS PUB 180-3: 1
    • FIPS 180-3: 1
  • PKCS:
    • PKCS#1: 3
    • PKCS #1: 1
    • PKCS#3: 3
    • PKCS#15: 2
  • ISO:
    • ISO/IEC 9796-2: 4
  • SCP:
    • SCP03: 7
    • SCP02: 2
pdf_data/st_keywords/standard_id/FIPS
  • FIPS180-2: 1
  • FIPS197: 4
  • FIPS180-3: 1
  • FIPS PUB 180-3: 1
  • FIPS 180-3: 1
pdf_data/st_keywords/standard_id/PKCS
  • PKCS#3: 1
  • PKCS#1: 8
  • PKCS#5: 5
  • PKCS#1: 3
  • PKCS #1: 1
  • PKCS#3: 3
  • PKCS#15: 2
pdf_data/st_keywords/standard_id/PKCS/PKCS#1 8 3
pdf_data/st_keywords/standard_id/PKCS/PKCS#3 1 3
pdf_data/st_keywords/standard_id/SCP
  • SCP01: 3
  • SCP02: 3
  • SCP03: 3
  • SCP03: 7
  • SCP02: 2
pdf_data/st_keywords/standard_id/SCP/SCP02 3 2
pdf_data/st_keywords/standard_id/SCP/SCP03 3 7
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 18 17
pdf_data/st_keywords/symmetric_crypto/DES/3DES
  • TDEA: 1
  • Triple-DES: 2
  • TDES: 9
  • TDES: 3
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDES 9 3
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES 20 10
pdf_data/st_keywords/symmetric_crypto/constructions/MAC/CMAC 1 3
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 1
pdf_data/st_keywords/vendor
  • NXP:
    • NXP: 12
  • Gemalto:
    • Gemalto: 117
  • NXP:
    • NXP: 4
  • Oberthur:
    • Oberthur Technologies: 1
  • Idemia:
    • IDEMIA: 18
  • Morpho:
    • Morpho: 1
pdf_data/st_keywords/vendor/NXP/NXP 12 4
pdf_data/st_metadata
  • pdf_file_size_bytes: 1611052
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 93
  • /Title: eTravel v1.0 Security Target MAÏA3
  • /Author: Antoine de Lavernette
  • /Subject: Security Target
  • /Keywords: Security Target, CC
  • /Creator: Microsoft® Office Word 2007
  • /CreationDate: D:20141107143457+01'00'
  • /ModDate: D:20141107143457+01'00'
  • /Producer: Microsoft® Office Word 2007
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 2948639
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 97
  • /Author: IDEMIA
  • /Subject: FQR standard
  • /Keywords: Quality
  • /Creator: Microsoft® Word 2016
  • /CreationDate: D:20190802135629+02'00'
  • /ModDate: D:20190802135629+02'00'
  • /Producer: Microsoft® Word 2016
  • pdf_hyperlinks: ftp://ftp.itc.1/SVD, ftp://ftp.itc.1/SCD
pdf_data/st_metadata//Author Antoine de Lavernette IDEMIA
pdf_data/st_metadata//CreationDate D:20141107143457+01'00' D:20190802135629+02'00'
pdf_data/st_metadata//Creator Microsoft® Office Word 2007 Microsoft® Word 2016
pdf_data/st_metadata//Keywords Security Target, CC Quality
pdf_data/st_metadata//ModDate D:20141107143457+01'00' D:20190802135629+02'00'
pdf_data/st_metadata//Producer Microsoft® Office Word 2007 Microsoft® Word 2016
pdf_data/st_metadata//Subject Security Target FQR standard
pdf_data/st_metadata/pdf_file_size_bytes 1611052 2948639
pdf_data/st_metadata/pdf_hyperlinks ftp://ftp.itc.1/SVD, ftp://ftp.itc.1/SCD
pdf_data/st_metadata/pdf_number_of_pages 93 97
dgst c85d31ec52d309ee 2adccd1a98338d08