Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Plateforme Java Card en configuration ouverte de la carte à puce MultiApp v3.1 masquée sur le composant P60D080PVC(Version du patch : 1.4)
ANSSI-CC-2014/86
Plate-forme STSafe-J, en configuration fermée, version 1.1.4, sur le composant ST31H320 A03
ANSSI-CC-2017/10
name Plateforme Java Card en configuration ouverte de la carte à puce MultiApp v3.1 masquée sur le composant P60D080PVC(Version du patch : 1.4) Plate-forme STSafe-J, en configuration fermée, version 1.1.4, sur le composant ST31H320 A03
not_valid_after 22.12.2019 23.03.2022
not_valid_before 22.12.2014 23.03.2017
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2014_86.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2017_10fr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI_cible2014_86_LITE.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI_cible2017_10en.pdf.pdf
manufacturer Gemalto / NXP Semiconductors ST INCARD S.r.I
manufacturer_web https://www.gemalto.com/ https://www.incard.it/
dgst c85d31ec52d309ee ea24eb45efa02e52
heuristics/cert_id ANSSI-CC-2014/86 ANSSI-CC-2017/10
heuristics/extracted_sars ALC_CMS.5, ATE_FUN.1, ADV_IMP.1, ASE_TSS.2, ATE_DPT.3, ALC_FLR.1, AGD_PRE.1, ALC_DVS.2, AVA_VAN.5, ATE_COV.2, ALC_TAT.2, ADV_INT.2, ALC_CMC.4, ADV_FSP.5, ADV_ARC.1, ALC_DEL.1, AGD_OPE.1, ALC_LCD.1, ADV_TDS.4, ATE_IND.2 ALC_CMS.5, ASE_INT.1, ATE_FUN.1, ADV_IMP.1, ATE_DPT.3, ALC_FLR.1, ASE_TSS.1, AGD_PRE.1, ASE_CCL.1, ALC_DVS.2, ATE_IND.2, AVA_VAN.5, ASE_SPD.1, ASE_OBJ.2, ATE_COV.2, ALC_TAT.2, ASE_REQ.2, ADV_INT.2, ALC_CMC.4, ADV_FSP.5, ADV_ARC.1, ALC_DEL.1, AGD_OPE.1, ALC_LCD.1, ADV_TDS.4, ASE_ECD.1
heuristics/extracted_versions 3.1, 1.4 1.1.4
heuristics/report_references/directly_referenced_by ANSSI-CC-2015/08, ANSSI-CC-2015/04, ANSSI-CC-2015/03, ANSSI-CC-2015/15, ANSSI-CC-2015/01, ANSSI-CC-2015/02, ANSSI-CC-2015/30 ANSSI-CC-2017/23
heuristics/report_references/directly_referencing ANSSI-CC-2014/06, BSI-DSZ-CC-0837-2013 ANSSI-CC-2015/59
heuristics/report_references/indirectly_referenced_by ANSSI-CC-2015/08, ANSSI-CC-2016/03, ANSSI-CC-2015/04, ANSSI-CC-2015/41, ANSSI-CC-2015/37, ANSSI-CC-2015/39, ANSSI-CC-2015/03, ANSSI-CC-2015/15, ANSSI-CC-2016/04, ANSSI-CC-2015/01, ANSSI-CC-2015/02, ANSSI-CC-2015/30, ANSSI-CC-2015/38, ANSSI-CC-2015/40 ANSSI-CC-2017/23, BSI-DSZ-CC-1037-2018
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-0837-2013, BSI-DSZ-CC-0829-2012, ANSSI-CC-2014/06, BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0640-2010 ANSSI-CC-2015/59
heuristics/scheme_data
heuristics/st_references/directly_referencing {} ANSSI-CC-2015/59
heuristics/st_references/indirectly_referencing {} ANSSI-CC-2015/59
protection_profiles
pdf_data/report_filename ANSSI-CC-2014_86.pdf ANSSI-CC-2017_10fr.pdf
pdf_data/report_frontpage
  • FR:
    • cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
    • cc_version: Critères Communs version 3.1 révision 4
    • cert_id: ANSSI-CC-2014/86
    • cert_item: Plateforme Java Card en configuration ouverte de la carte à puce MultiApp v3.1 masquée sur le composant P60D080PVC
    • cert_item_version: Version de la plateforme Java Card MultiApp : 3.1 Version du patch : 1.4
    • cert_lab: Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
    • developer: Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France NXP Semiconductors Box 54 02 40, D-22502 Hambourg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France
    • match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
    • ref_protection_profiles: ANSSI-CC-PP-2010/03-M01 [PP JCS] Java Card System – Open Configuration, version 3.0
  • FR:
    • cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
    • cc_version: Critères Communs version 3.1 révision 4
    • cert_id: ANSSI-CC-2017/10
    • cert_item: Plate-forme STSafe-J, en configuration fermée, version 1.1.4, sur le composant ST31H320 A03
    • cert_item_version: Version 1.1.4
    • cert_lab: Serma Safety & Security 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
    • developer: STMicroelectronics S.r.l. Incard Division Z.I Marcianise Sud, 81025 Marcianise, Italie STMicroelectronics 29 Boulevard Romain Rolland, 75669 Paris Cedex 14, France Commanditaire STMicroelectronics S.r.l. Incard Division Z.I Marcianise Sud, 81025 Marcianise, Italie
    • match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
    • ref_protection_profiles: Java Card Protection profile – Closed Configuration Version 3.0, ANSSI-CC-PP-2010/07-M01
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0837-2013: 3
  • FR:
    • ANSSI-CC-2014/06: 1
    • ANSSI-CC-2014/86: 22
    • ANSSI-CC-PP-2010/03-M01: 2
  • FR:
    • ANSSI-CC-2015/59: 2
    • ANSSI-CC-2015/59-M01: 2
    • ANSSI-CC-2015/59-S01: 2
    • ANSSI-CC-2017/10: 17
    • ANSSI-CC-PP-2010/07-M01: 2
pdf_data/report_keywords/cc_protection_profile_id
  • ANSSI:
    • ANSSI-CC-PP-2010/03-M01: 2
  • BSI:
    • BSI-PP-0035-: 1
    • BSI-PP-0035-2007: 2
  • ANSSI:
    • ANSSI-CC-PP-: 1
    • ANSSI-CC-PP-2010/07-M01: 2
  • BSI:
    • BSI-PP-0084-2014: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 5: 3
    • EAL 7: 1
    • EAL4: 2
    • EAL6: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 5: 3
    • EAL 7: 1
    • EAL2: 2
    • EAL5: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 3
    • AGD_PRE: 3
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 2
    • ALC_FLR: 2
    • ALC_FLR.1: 1
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 3
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
    • ADV_TDS.5: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 3
    • ALC_FLR: 2
    • ALC_FLR.1: 1
    • ALC_TAT: 1
    • ALC_TAT.3: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_FUN.2: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 5
pdf_data/report_keywords/cc_claims
  • R:
    • R.L: 1
pdf_data/report_keywords/vendor
  • Gemalto:
    • Gemalto: 27
  • NXP:
    • NXP: 3
    • NXP Semiconductors: 2
  • STMicroelectronics:
    • STMicroelectronics: 3
pdf_data/report_keywords/eval_facility
  • Serma:
    • Serma Technologies: 2
  • Serma:
    • Serma Safety & Security: 3
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
pdf_data/report_keywords/javacard_packages
  • com:
    • com.gemalto.javacardx.pace: 1
  • javacardx:
    • javacardx.pace: 1
pdf_data/report_metadata
  • /Author: Beatrice Duquesnoy
  • /CreationDate: D:20150105175233+01'00'
  • /Creator: Microsoft® Word 2010
  • /Keywords: ANSSI-CC-CER-F-07.014
  • /ModDate: D:20150105175233+01'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: Plateforme Java Card en configuration ouverte de la carte à puce MultiApp v3.1 masquée sur le composant P60D080PVC
  • /Title: ANSSI-CC-2014/86
  • pdf_file_size_bytes: 725914
  • pdf_hyperlinks: mailto:[email protected], http://www.ssi.gouv.fr/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 21
  • /Author:
  • /CreationDate:
  • /Creator: PDFCreator Version 1.2.1
  • /Keywords:
  • /ModDate:
  • /Producer: GPL Ghostscript 9.02
  • /Subject:
  • /Title: ANSSI-CC-2017_10fr
  • pdf_file_size_bytes: 760577
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 16
pdf_data/st_filename ANSSI_cible2014_86_LITE.pdf ANSSI_cible2017_10en.pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0837-2013-MA-01: 2
  • NL:
    • CC-1: 2
    • CC-2: 3
    • CC-3: 3
  • FR:
    • ANSSI-CC-2015/59: 1
    • ANSSI-CC-2015/59-M01: 1
    • ANSSI-CC-2015/59-S01: 1
    • ANSSI-CC-PP-2010/07-M01: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0055: 1
    • BSI-CC-PP-0059-2009-MA-01: 1
    • BSI-CC-PP-0075-2012: 1
    • BSI-PP-0005: 1
    • BSI-PP-0006: 1
    • BSI-PP-0035: 1
  • other:
    • PP-SSCD-KG: 2
    • PP-SSCD-KI: 2
    • PP-SSCD-T2: 2
    • PP-SSCD-T3: 2
  • ANSSI:
    • ANSSI-CC-PP-2010/07-M01: 1
  • BSI:
    • BSI-CC-PP-0055: 2
    • BSI-CC-PP-0084-2014: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 6+: 1
    • EAL5: 6
    • EAL5 augmented: 2
    • EAL5+: 1
  • EAL:
    • EAL4+: 1
    • EAL5: 12
    • EAL5 augmented: 2
    • EAL5+: 3
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 10
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 2
    • ADV_FSP.4: 2
    • ADV_FSP.5: 6
    • ADV_IMP: 1
    • ADV_IMP.1: 9
    • ADV_INT.2: 3
    • ADV_TDS: 1
    • ADV_TDS.1: 2
    • ADV_TDS.3: 4
    • ADV_TDS.4: 8
  • AGD:
    • AGD_OPE.1: 9
    • AGD_PRE: 1
    • AGD_PRE.1: 7
  • ALC:
    • ALC_CMC.4: 3
    • ALC_CMS.5: 2
    • ALC_DEL.1: 3
    • ALC_DVS.1: 2
    • ALC_DVS.2: 9
    • ALC_LCD.1: 5
    • ALC_TAT.1: 2
    • ALC_TAT.2: 5
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 4
    • ATE_DPT.1: 2
    • ATE_DPT.3: 3
    • ATE_FUN.1: 9
    • ATE_IND.2: 4
  • AVA:
    • AVA_VAN.5: 9
  • ADV:
    • ADV_ARC.1: 7
    • ADV_FSP.1: 4
    • ADV_FSP.2: 2
    • ADV_FSP.4: 1
    • ADV_FSP.5: 9
    • ADV_IMP.1: 10
    • ADV_INT.2: 2
    • ADV_TDS.1: 2
    • ADV_TDS.3: 4
    • ADV_TDS.4: 9
  • AGD:
    • AGD_OPE.1: 7
    • AGD_PRE.1: 7
  • ALC:
    • ALC_CMC.4: 2
    • ALC_CMS.1: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 2
    • ALC_DVS.1: 3
    • ALC_DVS.2: 9
    • ALC_LCD.1: 4
    • ALC_TAT.1: 2
    • ALC_TAT.2: 4
  • ASE:
    • ASE_CCL: 2
    • ASE_CCL.1: 2
    • ASE_ECD: 2
    • ASE_ECD.1: 5
    • ASE_INT.1: 6
    • ASE_OBJ: 2
    • ASE_OBJ.2: 4
    • ASE_REQ: 2
    • ASE_REQ.1: 2
    • ASE_REQ.2: 3
    • ASE_SPD: 2
    • ASE_SPD.1: 3
    • ASE_TSS: 2
    • ASE_TSS.1: 2
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 4
    • ATE_DPT.1: 1
    • ATE_DPT.3: 2
    • ATE_FUN.1: 7
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.4: 1
    • AVA_VAN.5: 9
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_ARP.1: 15
    • FAU_ARP.1.1: 1
    • FAU_SAA.1: 2
  • FCO:
    • FCO_NRO: 7
    • FCO_NRO.2: 3
  • FCS:
    • FCS_CKM.1: 21
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 8
    • FCS_CKM.2.1: 1
    • FCS_CKM.3: 7
    • FCS_CKM.3.1: 1
    • FCS_CKM.4: 15
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 19
    • FCS_COP.1.1: 1
    • FCS_RND: 7
    • FCS_RND.1: 12
    • FCS_RND.1.1: 2
    • FCS_RNG.1: 1
  • FDP:
    • FDP_ACC: 40
    • FDP_ACC.1: 13
    • FDP_ACC.2: 6
    • FDP_ACF: 33
    • FDP_ACF.1: 16
    • FDP_IFC: 24
    • FDP_IFC.1: 12
    • FDP_IFC.2: 2
    • FDP_IFF: 17
    • FDP_IFF.1: 12
    • FDP_ITC: 12
    • FDP_ITC.1: 4
    • FDP_ITC.2: 9
    • FDP_RIP: 85
    • FDP_RIP.1: 10
    • FDP_ROL: 14
    • FDP_ROL.1: 2
    • FDP_SDI.2: 9
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UIT: 7
    • FDP_UIT.1: 2
  • FIA:
    • FIA_ATD: 9
    • FIA_ATD.1: 2
    • FIA_SOS.2: 1
    • FIA_UAI.1: 1
    • FIA_UAU: 7
    • FIA_UAU.1: 1
    • FIA_UID: 14
    • FIA_UID.1: 10
    • FIA_UID.2: 1
    • FIA_USB: 8
    • FIA_USB.1: 3
  • FMT:
    • FMT_MSA: 91
    • FMT_MSA.1: 11
    • FMT_MSA.2: 1
    • FMT_MSA.3: 15
    • FMT_MTD: 18
    • FMT_MTD.1: 3
    • FMT_MTD.3: 1
    • FMT_SMF: 33
    • FMT_SMF.1: 9
    • FMT_SMR: 47
    • FMT_SMR.1: 22
  • FPR:
    • FPR_UNO: 7
    • FPR_UNO.1: 10
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_FLS: 46
    • FPT_FLS.1: 5
    • FPT_ITT: 7
    • FPT_ITT.1: 1
    • FPT_PHP: 7
    • FPT_PHP.3: 2
    • FPT_RCV: 16
    • FPT_RCV.3: 4
    • FPT_RCV.4: 2
    • FPT_TDC.1: 9
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TST: 7
    • FPT_TST.1: 3
  • FTP:
    • FTP_ITC: 9
    • FTP_ITC.1: 5
    • FTP_TRP.1: 2
  • FAU:
    • FAU_ARP: 5
    • FAU_ARP.1: 3
    • FAU_SAA.1: 2
    • FAU_SAS.1: 1
  • FCS:
    • FCS_CKM: 3
    • FCS_CKM.1: 4
    • FCS_CKM.2: 2
    • FCS_CKM.3: 2
    • FCS_CKM.4: 2
    • FCS_COP: 12
    • FCS_COP.1: 4
    • FCS_RNG: 6
    • FCS_RNG.1: 6
    • FCS_RNG.1.1: 1
    • FCS_RNG.1.2: 1
  • FDP:
    • FDP_ACC: 10
    • FDP_ACF: 9
    • FDP_ACF.1: 3
    • FDP_IFC: 3
    • FDP_IFC.1: 7
    • FDP_IFF: 3
    • FDP_IFF.1: 5
    • FDP_ITC: 1
    • FDP_ITT.1: 4
    • FDP_RIP: 31
    • FDP_RIP.1: 3
    • FDP_ROL: 10
    • FDP_ROL.1: 3
    • FDP_SDC: 4
    • FDP_SDC.1: 8
    • FDP_SDC.1.1: 1
    • FDP_SDI: 3
    • FDP_SDI.2: 2
  • FIA:
    • FIA_ATD: 2
    • FIA_UID: 3
    • FIA_USB: 2
  • FMT:
    • FMT_LIM: 14
    • FMT_LIM.1: 10
    • FMT_LIM.1.1: 1
    • FMT_LIM.2: 10
    • FMT_LIM.2.1: 1
    • FMT_MSA: 20
    • FMT_MSA.1: 1
    • FMT_MSA.2: 2
    • FMT_MSA.3: 3
    • FMT_MTD: 6
    • FMT_SMF: 2
    • FMT_SMF.1: 6
    • FMT_SMR: 2
    • FMT_SMR.1: 3
  • FPR:
    • FPR_UNO: 2
    • FPR_UNO.1: 1
  • FPT:
    • FPT_FLS: 9
    • FPT_FLS.1: 6
    • FPT_ITT.1: 2
    • FPT_PHP.3: 2
    • FPT_TDC.1: 1
    • FPT_TST.1: 2
  • FRU:
    • FRU_FLT.2: 3
pdf_data/st_keywords/cc_claims
  • A:
    • A.APPLET: 5
    • A.DELETION: 5
    • A.VERIFICATION: 4
  • D:
    • D.API_DATA: 3
    • D.APP_CODE: 6
    • D.APP_C_DATA: 3
    • D.APP_I_DATA: 4
    • D.CRYPTO: 5
    • D.JCS_CODE: 3
    • D.JCS_DATA: 5
    • D.PIN: 4
    • D.SEC_DATA: 7
  • O:
    • O.ALARM: 15
    • O.APPLET: 28
    • O.CARD-MANAGEMENT: 3
    • O.CARD_MANAGEMENT: 18
    • O.CIPHER: 10
    • O.CODE_PCKG: 16
    • O.CODE_PKG: 7
    • O.DELETION: 8
    • O.FIREWALL: 12
    • O.GLOBAL_ARRAYS_CO: 3
    • O.GLOBAL_ARRAYS_CONFID: 6
    • O.GLOBAL_ARRAYS_INT: 3
    • O.GLOBAL_ARRAYS_INTEG: 5
    • O.HW_AES: 2
    • O.INSTALL: 11
    • O.JAVAOBJECT: 56
    • O.KEY-: 1
    • O.KEY-MNGT: 5
    • O.KEY_MNGT: 4
    • O.LOAD: 6
    • O.NATIVE: 11
    • O.OBJ-DELETION: 4
    • O.OPERATE: 15
    • O.PIN-: 1
    • O.PIN-MNGT: 5
    • O.REALLOCATION: 5
    • O.RESOURCES: 9
    • O.RND: 13
    • O.SCP: 36
    • O.SID: 13
    • O.TRANSACTION: 6
  • OE:
    • OE.APPLET: 4
    • OE.CARD-MANAGEMENT: 1
    • OE.CODE-EVIDENCE: 10
    • OE.CODE_EVIDENCE: 1
    • OE.SCP: 6
    • OE.VERIFICATION: 25
  • OP:
    • OP.ARRAY_ACCESS: 6
    • OP.CREATE: 10
    • OP.DELETE_APPLET: 6
    • OP.DELETE_PCKG: 4
    • OP.DELETE_PCKG_APPLET: 4
    • OP.INSTANCE_FIELD: 6
    • OP.INVK_INTERFACE: 10
    • OP.INVK_VIRTUAL: 8
    • OP.JAVA: 8
    • OP.PUT: 7
    • OP.THROW: 7
    • OP.TYPE_ACCESS: 7
  • OSP:
    • OSP: 1
    • OSP.RND: 3
    • OSP.RNG: 1
    • OSP.VERIFICATION: 4
  • R:
    • R.JAVA: 9
  • T:
    • T.CONFID-APPLI-DATA: 4
    • T.CONFID-JCS-CODE: 4
    • T.CONFID-JCS-DATA: 4
    • T.DELETION: 3
    • T.EXE-CODE: 8
    • T.INSTALL: 4
    • T.INTEG-APPLI-CODE: 7
    • T.INTEG-APPLI-DATA: 8
    • T.INTEG-JCS-CODE: 3
    • T.INTEG-JCS-DATA: 4
    • T.NATIVE: 4
    • T.OBJ-DELETION: 4
    • T.PHYSICAL: 4
    • T.RESOURCES: 3
    • T.SID: 8
  • A:
    • A.NO-DELETION: 5
    • A.NO-INSTALL: 5
    • A.VERIFICATION: 4
    • A.XXX: 1
  • D:
    • D.API_DATA: 3
    • D.APP_CODE: 6
    • D.APP_C_DATA: 3
    • D.APP_I_DATA: 4
    • D.CRYPTO: 6
    • D.EMBEDDED_SW_CODE: 4
    • D.EMBEDDED_SW_DATA: 4
    • D.GP_CODE: 3
    • D.GP_SENSITIVE_DATA: 3
    • D.JCS_CODE: 4
    • D.JCS_DATA: 6
    • D.PIN: 9
    • D.SEC_DATA: 5
  • O:
    • O.ALARM: 21
    • O.APPLET: 1
    • O.CIPHER: 45
    • O.FIREWALL: 26
    • O.GLOBAL_ARRAYS_CONFID: 10
    • O.GLOBAL_ARRAYS_INTEG: 8
    • O.GP_REGISTRY: 10
    • O.JAVA: 3
    • O.JAVAOB: 2
    • O.JAVAOBJECT: 20
    • O.KEY-MNGT: 11
    • O.LIFE_CYCLE: 13
    • O.NATIVE: 12
    • O.OBJ-DELETION: 8
    • O.OPERATE: 33
    • O.PIN-MNGT: 16
    • O.PIN_MNGT: 1
    • O.REALLOCATION: 13
    • O.RESOURCES: 9
    • O.RND: 1
    • O.ROLES: 6
    • O.SCP: 70
    • O.SID: 25
    • O.SIDE_CHANNEL: 10
    • O.TRANSACTION: 11
  • OE:
    • OE.CARD-MANAGEMENT: 12
    • OE.CARD_MANAGEMENT: 17
    • OE.CODE-: 1
    • OE.CODE-EVIDENCE: 17
    • OE.MANAGEMENT_OF_SECRETS: 3
    • OE.NO-DELETION: 6
    • OE.NO-INSTALL: 5
    • OE.SCP: 3
    • OE.VERIFICATION: 33
  • OP:
    • OP.ARRAY_ACCESS: 4
    • OP.CARD_LOCK: 4
    • OP.CARD_TERMINATE: 4
    • OP.CREATE: 7
    • OP.GET_CARD_LIFE_CYCLE_: 1
    • OP.GET_CARD_LIFE_CYCLE_STATE: 2
    • OP.INSTANCE_FIELD: 4
    • OP.INVK_INTERFACE: 7
    • OP.INVK_VIRTUAL: 6
    • OP.JAVA: 5
    • OP.MANAGE_APP_LIFE_CYC: 1
    • OP.MANAGE_APP_LIFE_CYCLE_STATE: 3
    • OP.PUT: 6
    • OP.THROW: 5
    • OP.TYPE_ACCESS: 5
  • OSP:
    • OSP.CARD_ADMINISTRATION_DISABLED: 5
    • OSP.MANAGEMENT_OF_SECRETS: 6
    • OSP.ROLES: 5
    • OSP.VERIFICATION: 5
  • R:
    • R.JAVA: 5
  • T:
    • T.CONFID-APPLI-DATA: 17
    • T.CONFID-JCS-CODE: 6
    • T.CONFID-JCS-DATA: 11
    • T.EXE-CODE: 9
    • T.INTEG-: 1
    • T.INTEG-APPLI-CODE: 12
    • T.INTEG-APPLI-DATA: 23
    • T.INTEG-JCS-CODE: 7
    • T.INTEG-JCS-DATA: 11
    • T.LEAKAGE: 1
    • T.LIFE_CYCLE: 7
    • T.NATIVE: 4
    • T.OBJ-DELETION: 4
    • T.PHYSICAL: 9
    • T.RESOURCES: 7
    • T.SID: 16
pdf_data/st_keywords/vendor
  • Gemalto:
    • Gemalto: 117
  • NXP:
    • NXP: 12
  • STMicroelectronics:
    • STM: 13
    • STMicroelectronics: 6
pdf_data/st_keywords/eval_facility
  • Serma:
    • SERMA: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 18
  • DES:
    • 3DES:
      • TDEA: 1
      • TDES: 9
      • Triple-DES: 2
    • DES:
      • DES: 20
  • constructions:
    • MAC:
      • CMAC: 1
  • AES_competition:
    • AES:
      • AES: 7
  • DES:
    • 3DES:
      • 3-DES: 2
      • Triple-DES: 1
      • TripleDES: 1
    • DES:
      • DES: 5
  • constructions:
    • MAC:
      • CBC-MAC: 2
      • CMAC: 3
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 8
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 3
  • FF:
    • DH:
      • DH: 5
      • Diffie-Hellman: 4
  • ECC:
    • ECC:
      • ECC: 1
    • ECDH:
      • ECDH: 2
    • ECDSA:
      • ECDSA: 2
  • FF:
    • DH:
      • DH: 1
      • Diffie-Hellman: 5
    • DSA:
      • DSA: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 4
    • SHA2:
      • SHA-224: 3
      • SHA-256: 4
      • SHA-384: 4
      • SHA-512: 3
      • SHA224: 1
  • SHA:
    • SHA1:
      • SHA-1: 3
      • SHA1: 2
    • SHA2:
      • SHA-224: 2
      • SHA-256: 2
      • SHA-512: 2
      • SHA224: 2
      • SHA256: 2
      • SHA384: 3
      • SHA512: 2
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key agreement: 2
  • MAC:
    • MAC: 10
  • KA:
    • Key Agreement: 2
  • MAC:
    • MAC: 6
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 10
pdf_data/st_keywords/randomness
  • PRNG:
    • PRNG: 1
  • RNG:
    • RND: 19
    • RNG: 7
  • PRNG:
    • DRBG: 1
  • RNG:
    • RND: 1
    • RNG: 19
  • TRNG:
    • TRNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 5
  • ECB:
    • ECB: 2
pdf_data/st_keywords/crypto_library
  • Neslib:
    • NesLib v.4.2.10: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 3
    • fault induction: 2
    • malfunction: 2
    • physical tampering: 1
  • SCA:
    • DPA: 1
    • Leak-Inherent: 3
    • physical probing: 2
  • FI:
    • Malfunction: 1
    • malfunction: 2
    • physical tampering: 1
  • SCA:
    • DPA: 3
    • Leak-Inherent: 1
    • SPA: 1
    • physical probing: 4
    • side channel: 1
    • timing attacks: 1
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS31: 1
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • FIPS:
    • FIPS180-2: 1
    • FIPS197: 4
  • ICAO:
    • ICAO: 3
  • NIST:
    • SP 800-38: 2
  • PKCS:
    • PKCS#1: 8
    • PKCS#3: 1
    • PKCS#5: 5
  • SCP:
    • SCP01: 3
    • SCP02: 3
    • SCP03: 3
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
  • FIPS:
    • FIPS 140-2: 1
  • PKCS:
    • PKCS#1: 2
    • PKCS1: 1
  • SCP:
    • SCP02: 2
    • SCP03: 2
pdf_data/st_keywords/javacard_version
  • JavaCard:
    • JC2.2.2: 1
    • Java Card 2.2.2: 7
  • GlobalPlatform:
    • GlobalPlatform 2.1.1: 3
  • JavaCard:
    • Java Card 3.0.4: 1
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 7
  • misc:
    • TYPE_ACCESS: 5
pdf_data/st_keywords/javacard_packages
  • javacard:
    • javacard.framework: 2
  • java:
    • java.lang: 1
  • javacard:
    • javacard.framework: 4
    • javacard.framework.applet: 1
    • javacard.security: 23
    • javacard.security.interface: 4
  • javacardx:
    • javacardx.crypto: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
    • out of scope: 1
  • OutOfScope:
    • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
    • application being loaded pre-issuance is out of scope of current evaluation. 4.1.2.2 Java Card Platform The Java technology, embedded on the TOE: 1
    • interface for the secure management of applications on the smart card. The Card Manager is out of scope of current evaluation and its administrative interface is permanently disabled before TOE delivery: 1
    • of the TOE to the parties responsible of the following usage phases. Application development is out of scope of current evaluation. TOE Construction phase includes: • Product Development • Product: 1
    • out of scope: 4
pdf_data/st_metadata
  • /Author: Antoine de Lavernette
  • /CreationDate: D:20141107143457+01'00'
  • /Creator: Microsoft® Office Word 2007
  • /Keywords: Security Target, CC
  • /ModDate: D:20141107143457+01'00'
  • /Producer: Microsoft® Office Word 2007
  • /Subject: Security Target
  • /Title: eTravel v1.0 Security Target MAÏA3
  • pdf_file_size_bytes: 1611052
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 93
  • /Author: daniela terracciano
  • /CreationDate: D:20170127111137+01'00'
  • /Creator: PDFCreator 2.0.0.0
  • /Keywords:
  • /ModDate: D:20170127111137+01'00'
  • /Producer: PDFCreator 2.0.0.0
  • /Subject:
  • /Title: STSafe-J_SecurityTarget_Lite_A
  • pdf_file_size_bytes: 692327
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 95
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different