name |
Citrix XenDesktop 4 Platinum Edition |
Plateforme UpTeq NFC 2.0.4_OFM release B sur composant ST33F1ME (S1121881 / Release B), configuration MIFARE activé ou configuration MIFARE désactivé |
category |
Access Control Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
UK |
FR |
status |
archived |
archived |
not_valid_after |
05.01.2016 |
08.11.2019 |
not_valid_before |
20.08.2010 |
08.11.2014 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/crp256.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/rapport%20de%20certification%20anssi-cc-2014_56.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/crp256st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI_cible2014_56en.pdf |
manufacturer |
Citrix Systems, Inc. |
Gemalto / STMicroelectronics |
manufacturer_web |
https://www.citrix.com |
https://www.gemalto.com/ |
security_level |
EAL2+, ALC_FLR.2 |
ALC_DVS.2, EAL4+, AVA_VAN.5 |
dgst |
cd043f860d336c69 |
933e1822aabee195 |
heuristics/cert_id |
CRP256 |
ANSSI-CC-2014/56 |
heuristics/cert_lab |
[] |
THALES |
heuristics/cpe_matches |
cpe:2.3:a:citrix:xendesktop:4.0:*:*:*:*:*:*:* |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
CVE-2016-6493, CVE-2014-4700 |
{} |
heuristics/direct_transitive_cves |
CVE-2012-6314, CVE-2016-6493, CVE-2014-4700 |
{} |
heuristics/indirect_transitive_cves |
CVE-2016-6493, CVE-2012-6314, CVE-2016-4810, CVE-2014-4700 |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ADV_FSP.4, ASE_CCL.1 |
heuristics/extracted_versions |
4 |
2.0.4 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
CRP271 |
ANSSI-CC-2014/83 |
heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2013/28, ANSSI-CC-2011/07 |
heuristics/report_references/indirectly_referenced_by |
CRP271, CRP282, CRP281 |
ANSSI-CC-2014/83, ANSSI-CC-2014/96 |
heuristics/report_references/indirectly_referencing |
{} |
ANSSI-CC-2010/49, ANSSI-CC-2013/28, ANSSI-CC-2011/17, ANSSI-CC-2012/48, ANSSI-CC-2011/07, ANSSI-CC-2011/77, ANSSI-CC-2010/50 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
f6d23054061d72ba |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
crp256.pdf |
rapport de certification anssi-cc-2014_56.pdf |
pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 4 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 3
- cert_id: ANSSI-CC-2014/56
- cert_item: Carte UpTeq NFC 2.0.4_OFM release B, configuration MIFARE activé ou MIFARE désactivé, sur composant ST33F1ME (T1020364/release B
- cert_item_version: Plateforme UpTeq NFC 2.0.4_OFM release B sur composant ST33F1ME (S1121881 / Release B), configuration MIFARE activé ou configuration MIFARE désactivé
- cert_lab: THALES (TCS – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France
- developer: Gemalto La Vigie, Av du Jujubier, ZI Athelia IV, 13705 La Ciotat Cedex, France STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, B.P. 2, 13106 Rousset, France Commanditaire Gemalto La Vigie, Av du Jujubier, ZI Athelia IV, 13705 La Ciotat Cedex, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit \\(référence/version\\)(.+)Nom de la TOE \\(référence/version\\)(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: PPUSIMB], version 2.0.2, (U)SIM Java Card Platform Protection Profile - Basic configuration
|
pdf_data/report_keywords/cc_cert_id |
|
- FR:
- ANSSI-CC-2011/07: 4
- ANSSI-CC-2013/28: 2
- ANSSI-CC-2014/56: 21
- ANSSI-CC-PP-2010/04: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 2 augmented: 1
- EAL2: 1
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 2
- EAL 5: 1
- EAL 7: 1
- EAL4: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Gemalto:
- Morpho:
- STMicroelectronics:
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author:
- /Company: CESG Certification Body
- /CreationDate: D:20100823173833+01'00'
- /Creator: Acrobat PDFMaker 9.0 for Word
- /ModDate: D:20100831083026+01'00'
- /Producer: Acrobat Distiller 9.0.0 (Windows)
- /SourceModified: D:20100823163452
- /Title: Certification Report CRP256
- /_AdHocReviewCycleID: 703382741
- /_AuthorEmail: Nigel.WhittakerAxon@cesg.gsi.gov.uk
- /_AuthorEmailDisplayName: WhittakerAxon, Nigel
- /_EmailSubject: T005 - certified!
- pdf_file_size_bytes: 500557
- pdf_hyperlinks: https://www.citrix.com/security
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
- /Author: nrb
- /CreationDate: D:20140812161407+02'00'
- /Creator: Microsoft® Word 2010
- /Keywords: ANSSI-CC-CER-F-07.010
- /ModDate: D:20140812161407+02'00'
- /Producer: Microsoft® Word 2010
- /Subject: Plateforme UpTeq NFC 2.0.4_OFM release B sur composant ST33F1ME (S1121881 / Release B), configuration MIFARE activé ou configuration MIFARE désactivé
- /Title: ANSSI-CC-2014/56
- pdf_file_size_bytes: 617735
- pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
pdf_data/st_filename |
crp256st.pdf |
ANSSI_cible2014_56en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL2: 5
- EAL2 augmented: 2
|
- EAL:
- EAL4: 4
- EAL4 augmented: 2
- EAL4+: 1
- EAL5: 1
- EAL5 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 5
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 6
- ADV_FSP.1: 4
- ADV_FSP.2: 2
- ADV_FSP.4: 9
- ADV_IMP.1: 5
- ADV_TDS.1: 2
- ADV_TDS.2: 1
- ADV_TDS.3: 9
- AGD:
- AGD_ADM: 1
- AGD_OPE.1: 10
- AGD_PRE.1: 6
- AGD_USR: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.1: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 2
- ALC_DVS.2: 9
- ALC_LCD.1: 3
- ALC_TAT.1: 3
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 4
- ASE_INT.1: 5
- ASE_OBJ.2: 3
- ASE_REQ.1: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 3
- ATE_DPT.1: 2
- ATE_FUN.1: 6
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FCO:
- FCO_SCO: 38
- FCO_SCO.1: 21
- FCO_SCO.1.1: 1
- FCO_SCO.1.2: 1
- FCO_SCO.1.3: 2
- FCO_SCO.1.4: 1
- FCS:
- FCS_ECA: 18
- FCS_ECA.1: 7
- FCS_ECA.1.1: 1
- FDP:
- FDP_ACC: 24
- FDP_ACC.1: 5
- FDP_ACF: 23
- FDP_ACF.1: 10
- FDP_IFC.1: 1
- FDP_RIP: 7
- FDP_RIP.1: 1
- FIA:
- FIA_ATD: 8
- FIA_ATD.1: 1
- FIA_UAU: 8
- FIA_UAU.2: 1
- FIA_UID: 10
- FIA_UID.1: 2
- FIA_UID.2: 1
- FMT:
- FMT_MOF: 10
- FMT_MOF.1: 1
- FMT_MSA: 35
- FMT_MSA.1: 3
- FMT_MSA.3: 6
- FMT_SMF: 17
- FMT_SMF.1: 4
- FMT_SMR: 18
- FMT_SMR.1: 6
|
- FAU:
- FAU_ARP.1: 17
- FAU_ARP.1.1: 1
- FAU_SAA.1: 3
- FAU_SAS.1: 1
- FCO:
- FCS:
- FCS_CKM: 74
- FCS_CKM.1: 23
- FCS_CKM.2: 7
- FCS_CKM.3: 4
- FCS_CKM.4: 45
- FCS_CKM.4.1: 1
- FCS_COP: 58
- FCS_COP.1: 18
- FCS_RND: 2
- FCS_RND.1: 9
- FCS_RND.1.1: 2
- FCS_RNG.1: 2
- FDP:
- FDP_ACC: 48
- FDP_ACC.1: 22
- FDP_ACC.2: 8
- FDP_ACF: 38
- FDP_ACF.1: 25
- FDP_IFC: 46
- FDP_IFC.1: 26
- FDP_IFC.2: 4
- FDP_IFF: 40
- FDP_IFF.1: 28
- FDP_IFF.1.2: 1
- FDP_IFF.1.4: 1
- FDP_ITC: 20
- FDP_ITC.1: 19
- FDP_ITC.2: 33
- FDP_ITT.1: 1
- FDP_RIP: 116
- FDP_RIP.1: 10
- FDP_ROL: 21
- FDP_ROL.1: 7
- FDP_SDI: 6
- FDP_SDI.1: 1
- FDP_SDI.2: 8
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UIT: 12
- FDP_UIT.1: 4
- FIA:
- FIA_ATD: 9
- FIA_ATD.1: 2
- FIA_UAU: 18
- FIA_UAU.1: 2
- FIA_UAU.4: 1
- FIA_UID: 33
- FIA_UID.1: 16
- FIA_UID.2: 1
- FIA_USB: 8
- FIA_USB.1: 3
- FMT:
- FMT_LIM: 1
- FMT_LIM.1: 2
- FMT_LIM.2: 1
- FMT_MOF: 6
- FMT_MOF.1: 1
- FMT_MSA: 174
- FMT_MSA.1: 18
- FMT_MSA.2: 2
- FMT_MSA.3: 27
- FMT_MSA.3.1: 2
- FMT_MTD: 26
- FMT_MTD.1: 3
- FMT_MTD.3: 1
- FMT_REV: 8
- FMT_REV.1: 4
- FMT_SMF: 68
- FMT_SMF.1: 30
- FMT_SMF.1.1: 1
- FMT_SMR: 75
- FMT_SMR.1: 48
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNO: 5
- FPR_UNO.1: 11
- FPR_UNO.1.1: 1
- FPT:
- FPT_FLS: 61
- FPT_FLS.1: 8
- FPT_FLS.1.1: 1
- FPT_ITT: 12
- FPT_ITT.1: 3
- FPT_PHP.3: 1
- FPT_RCV: 22
- FPT_RCV.3: 12
- FPT_RCV.4: 2
- FPT_TDC.1: 10
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST.1: 1
- FPT_UNO: 1
- FRU:
- FTP:
- FTP_ITC: 24
- FTP_ITC.1: 10
- FTP_TRP.1: 4
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.APPLET: 5
- A.APPS-PROVIDER: 4
- A.CONTROLLING-: 2
- A.CONTROLLING-AUTHORITY: 2
- A.DELETION: 2
- A.KEY-ESCROW: 5
- A.MOBILE-OPERATOR: 4
- A.OTA-ADMIN: 4
- A.PERSONALIZER: 4
- A.PRODUCTION: 4
- A.VERIFICATION: 4
- A.VERIFICATION-: 2
- A.VERIFICATION-AUTHORITY: 2
- D:
- D.API_DATA: 3
- D.APP_CODE: 8
- D.APP_C_DATA: 5
- D.APP_I_DATA: 6
- D.APSD_KEYS: 3
- D.CARD_MNGT_DATA: 3
- D.CASD_KEYS: 3
- D.CRYPTO: 4
- D.GP_CODE: 1
- D.ISD_KEYS: 3
- D.JCS_CODE: 3
- D.JCS_DATA: 5
- D.OPTIONAL_PF_SERVICE: 2
- D.PIN: 4
- D.SEC_DATA: 7
- D.VASD_KEYS: 2
- O:
- O.ALARM: 21
- O.APPLET: 21
- O.APPLI-: 1
- O.APPLI-AUTH: 10
- O.CARD-: 5
- O.CARD-MANAGEMENT: 49
- O.CARD_MANAGEMENT: 2
- O.CIPHER: 25
- O.CODE_PKG: 14
- O.COMM_AUTH: 16
- O.COMM_CONFIDENTIALITY: 13
- O.COMM_INTEGRITY: 16
- O.DELETION: 15
- O.DOMAIN-: 9
- O.DOMAIN-RIGHTS: 19
- O.FIREWALL: 52
- O.GLOBAL_ARRAYS_CONFID: 18
- O.GLOBAL_ARRAYS_INTEG: 11
- O.INSTALL: 16
- O.JAVAOBJECT: 41
- O.KEY-: 2
- O.KEY-MNGT: 33
- O.LOAD: 16
- O.NATIVE: 13
- O.OBJ-DELETION: 8
- O.OPERATE: 36
- O.PIN-: 7
- O.PIN-MNGT: 15
- O.REALLOCATION: 16
- O.REMOTE: 15
- O.REMOTE_MTHD: 6
- O.REMOTE_OBJ: 10
- O.REMOTE_SERVICE_ACTIVATION: 11
- O.REMOTE_SERVICE_AUDIT: 11
- O.RESOURCES: 26
- O.RMI_SERVICE: 12
- O.RND: 10
- O.ROR: 5
- O.SCP: 28
- O.SCP-: 3
- O.SCP-SUPPORT: 19
- O.SID: 36
- O.TRANSACTION: 19
- OE:
- OE.ACTIVATION-: 1
- OE.ACTIVATION-KEY-ESCROW: 6
- OE.AID-MANAGEMENT: 6
- OE.AP-KEYS: 6
- OE.APPLET: 9
- OE.APPS-PROVIDER: 6
- OE.BASIC-: 4
- OE.BASIC-APPS-: 6
- OE.BASIC-APPS-VALIDATION: 16
- OE.CA-KEYS: 8
- OE.CARD_MANAGEMENT: 2
- OE.CONTROLLING-: 1
- OE.CONTROLLING-AUTHORITY: 5
- OE.GEMACTIVATE-ADMIN: 4
- OE.KEY-CHANGE: 7
- OE.KEY-ESCROW: 7
- OE.KEY-GENERATION: 4
- OE.MOBILE-OPERATOR: 6
- OE.OPERATOR-KEYS: 6
- OE.OTA-ADMIN: 4
- OE.OTA-LOADING: 4
- OE.OTA-SERVERS: 6
- OE.PERSONALIZER: 4
- OE.PRODUCTION: 5
- OE.QUOTAS: 6
- OE.SCP: 3
- OE.SECURE-APPS-CERTIFICATION: 4
- OE.SECURITY-DOMAINS: 4
- OE.SHARE-CONTROL: 6
- OE.TRUSTED-APPS-DEVELOPER: 7
- OE.TRUSTED-APPS-PRE-ISSUANCE: 5
- OE.VA-KEYS: 7
- OE.VERIFICATION: 34
- OE.VERIFICATION-: 1
- OE.VERIFICATION-AUTHORITY: 3
- OP:
- OP.ARRAY_ACCESS: 4
- OP.CREATE: 7
- OP.DELETE_APPLET: 4
- OP.DELETE_PCKG: 3
- OP.DELETE_PCKG_APPLET: 3
- OP.GET_ROR: 3
- OP.INSTANCE_FIELD: 4
- OP.INVK_INTERFACE: 7
- OP.INVK_VIRTUAL: 6
- OP.INVOKE: 3
- OP.JAVA: 5
- OP.PUT: 6
- OP.RET_RORD: 3
- OP.THROW: 5
- OP.TYPE_ACCESS: 5
- OSP:
- OSP.ACTIVATION-KEY-ESCROW: 5
- OSP.AID-MANAGEMENT: 4
- OSP.APSD-KEYS: 4
- OSP.BASIC-: 1
- OSP.BASIC-APPS-VALIDATION: 3
- OSP.CASD-KEYS: 4
- OSP.KEY-CHANGE: 4
- OSP.KEY-GENERATION: 4
- OSP.OPERATOR-KEYS: 4
- OSP.OTA-LOADING: 4
- OSP.OTA-SERVERS: 4
- OSP.QUOTAS: 4
- OSP.RNG: 5
- OSP.SECURE-APPS-: 2
- OSP.SECURE-APPS-CERTIFICATION: 2
- OSP.SECURITY-DOMAINS: 4
- OSP.SERVICE: 1
- OSP.SERVICE_AUDIT: 4
- OSP.SHARE-CONTROL: 4
- OSP.TRUSTED-: 1
- OSP.TRUSTED-APPS-DEVELOPER: 5
- OSP.TRUSTED-APPS-PRE-: 2
- OSP.TRUSTED-APPS-PRE-ISSUANCE: 2
- OSP.VASD-KEYS: 4
- OSP.VERIFICATION: 5
- R:
- T:
- T.COM_EXPLOIT: 6
- T.CONFID-APPLI-DATA: 18
- T.CONFID-JCS-: 9
- T.CONFID-JCS-CODE: 5
- T.CONFID-JCS-DATA: 4
- T.DELETION: 7
- T.EXE-: 1
- T.EXE-CODE: 11
- T.EXE-CODE-REMOTE: 4
- T.INSTALL: 6
- T.INTEG-: 10
- T.INTEG-APPLI-: 7
- T.INTEG-APPLI-CODE: 9
- T.INTEG-APPLI-DATA: 16
- T.INTEG-JCS-CODE: 7
- T.INTEG-JCS-DATA: 6
- T.INTEG-USER-DATA: 9
- T.LIFE_CYCLE: 6
- T.NATIVE: 7
- T.OBJ-DELETION: 4
- T.PHYSICAL: 5
- T.RESOURCES: 8
- T.SID: 18
- T.UNAUTHORIZED_ACCESS: 4
- T.UNAUTHORIZED_ACCESS_TO_SERVIC: 1
- T.UNAUTHORIZED_ACCESS_TO_SERVICE: 5
- T.UNAUTHORIZED_CARD_MNGT: 9
|
pdf_data/st_keywords/vendor |
|
- Gemalto:
- Morpho:
- STMicroelectronics:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- MD:
- SHA:
- SHA1:
- SHA2:
- SHA-2: 3
- SHA-224: 2
- SHA-256: 3
- SHA-384: 3
- SHA2: 2
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_RSA_WITH_3DES_EDE_CBC_SHA: 3
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- fault induction: 2
- malfunction: 3
- physical tampering: 4
- SCA:
- DPA: 1
- physical probing: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- FIPS:
- FIPS 140: 2
- FIPS 140-2: 9
- FIPS PUB 140-2: 1
- FIPS140-2: 10
- RFC:
|
- CC:
- CCIMB-2009-07-001: 1
- CCIMB-2009-07-002: 1
- CCIMB-2009-07-003: 1
- CCIMB-2009-07-004: 1
- FIPS:
- FIPS 140-2: 1
- FIPS 180-2: 1
- FIPS 180-3: 1
- FIPS 197: 1
- FIPS 46-3: 1
- FIPS PUB 197: 2
- FIPS PUB 46-3: 3
- FIPS PUB 81: 4
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 9796-2: 1
- PKCS:
- PKCS #1: 5
- PKCS #5: 1
- PKCS#1: 3
- PKCS#5: 1
- RFC:
- SCP:
- SCP 01: 1
- SCP 02: 1
- SCP 80: 1
- SCP02: 5
- SCP80: 8
|
pdf_data/st_keywords/javacard_version |
|
- GlobalPlatform:
- Global Platform 2.2.1: 1
- Global Platform 2.2.2: 1
- JavaCard:
- Java Card 2.2.2: 2
- Java Card 3.0.1: 1
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
- java:
- javacard:
- javacard.framework: 2
- javacard.framework.service: 1
- javacard.security: 2
- javacardx:
- javacardx.crypto: 10
- javacardx.rmi: 1
- javacardx.security: 9
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- 17 1.4.3 Summary of items out of scope of the TOE : 2
- Ver 1-0 SPB 17 August 2010 Page 18 of 53 Figure 4: Logical boundaries 1.4.3 Summary of items out of scope of the TOE The items out of scope of the TOE include the Microsoft components with which Citrix: 1
- integrates, as detailed in section 1.2.3. Also out of scope of the TOE are the following Citrix components which are included in XenDesktop Platinum Edition: •: 1
- out of scope: 4
|
- OutOfScope:
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Reference D1255596 Release 1.3p (Printed copy not controlled: 1
- out of scope: 2
- parameters for cryptographic operations, the use of these other values are not advised; and clearly out of scope of the TOE. See [USR] for details. JCS.EraseResidualData The security function ensures that: 1
|
pdf_data/st_metadata |
- /Author:
- /CreationDate: D:20100816144755Z
- /Creator: PScript5.dll Version 5.2
- /ModDate: D:20100831083207+01'00'
- /Producer: GPL Ghostscript 8.15
- /Title: CIN2-ST-0001 v1-0
- pdf_file_size_bytes: 1833337
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 53
|
- /Author: fguerin
- /CreationDate: D:20140602151611+02'00'
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20140602151611+02'00'
- /Producer: Microsoft® Office Word 2007
- /Title: ST Template for UpTeq NFC 2.0.4_OFM
- pdf_file_size_bytes: 2590947
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 179
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |