name |
Application J-Sign version 1.8.4 sur la plateforme J-Safe version 2.11.0 |
eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated Référence/version du produit Version de l’application eTravel : 2.3 Version de la plateforme Java Card MultiApp : 4.1 |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
FR |
FR |
status |
archived |
archived |
not_valid_after |
21.05.2020 |
12.12.2023 |
not_valid_before |
21.05.2015 |
17.12.2021 |
cert_link |
None |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-2018_58v2.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_17.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018_58v2.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_17_cible.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2018_58v2en.pdf |
manufacturer |
Incard Division / ST Microelectronics |
THALES DIS FRANCE SA |
manufacturer_web |
None |
https://www.thalesgroup.com/en/europe/france |
security_level |
EAL4+, AVA_VAN.5 |
AVA_VAN.5, ALC_DVS.2, EAL5+ |
dgst |
ce97d64b517bf270 |
d3410ad9c75334cf |
heuristics/cert_id |
ANSSI-CC-2015/17 |
ANSSI-CC-2018/58v2 |
heuristics/cert_lab |
SERMA |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_CCL.1, ALC_DEL.1, ALC_CMC.4, AVA_VLA.4, ALC_DVS.2, ATE_DPT.1, AVA_VAN.5, ATE_FUN.1, ATE_IND.2, ASE_TSS.1, ADV_TDS.3, ADV_ARC.1, ASE_SPD.1, ASE_REQ.2, ALC_CMS.4, ADV_IMP.1, ALC_TAT.1, ATE_COV.2, AGD_OPE.1, AVA_SOF.1, ASE_ECD.1, AVA_MSU.3, ADV_FSP.4, ASE_INT.1, AGD_PRE.1, ALC_LCD.1, ASE_OBJ.2 |
ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ATE_DPT.1, ADV_IMP.1, AVA_VAN.5, ADV_ARC.1, ADV_FSP.4 |
heuristics/extracted_versions |
1.8.4, 2.11.0 |
4.1, 2.3 |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
ANSSI-CC-2015/16, ANSSI-CC-2012/68 |
ANSSI-CC-2017/24, ANSSI-CC-2018/32v2, ANSSI-CC-2018/58 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
ANSSI-CC-2009/05, ANSSI-CC-2015/16, ANSSI-CC-2009/50, ANSSI-CC-2009/06, ANSSI-CC-2009/28, ANSSI-CC-2009/62, ANSSI-CC-2009/26, ANSSI-CC-2012/68, ANSSI-CC-2010/02, ANSSI-CC-2010/01, ANSSI-CC-2009/51 |
ANSSI-CC-2016/59, BSI-DSZ-CC-0782-2012, ANSSI-CC-2017/76, ANSSI-CC-2017/54, ANSSI-CC-2017/07, ANSSI-CC-2018/32, BSI-DSZ-CC-0891-V2-2016, ANSSI-CC-2018/32v2, ANSSI-CC-2015/66, ANSSI-CC-2017/24, ANSSI-CC-2018/58, BSI-DSZ-CC-0891-2015 |
heuristics/scheme_data |
- cert_id: ANSSI-CC-2015/17
- description: Le produit certifié est la carte à puce « Application J-Sign version 1.8.4 sur la plateforme J-Safe version 2.11.0 » développée par STMicroelectronics S.r.l. – Incard Division et STMicroelectronics. Cette carte fournit une application de création de signature électronique utilisée dans le cadre du déploiement de la CIE/CNS (carte d’identité et de services au citoyen) italienne. Cette applicati
- developer: STMicroelectronics S.r.l. - Incard Division / STMicroelectronics
- enhanced:
- augmented: AVA_VAN.5
- category: Cartes à puce
- cc_version: Critères Communs version 3.1r3
- cert_id: ANSSI-CC-2015/17
- certification_date: 2015-05-21
- developer: STMicroelectronics S.r.l. - Incard Division / STMicroelectronics
- evaluation_facility: Serma Technologies
- level: EAL4+
- mutual_recognition:
- protection_profile: PP-0006
- report_link: https://cyber.gouv.fr/sites/default/files/2015/05/ANSSI-CC-2015_17.pdf
- sponsor: STMicroelectronics S.r.l. - Incard Division
- target_link: https://cyber.gouv.fr/sites/default/files/2015/05/ANSSI-CC-2015_17_cible.pdf
- level: EAL4+
- product: Application J-Sign version 1.8.4 sur la plateforme J-Safe version 2.11.0
- sponsor: STMicroelectronics S.r.l. - Incard Division
- url: https://cyber.gouv.fr/produits-certifies/application-j-sign-version-184-sur-la-plateforme-j-safe-version-2110
|
- cert_id: ANSSI-CC-2018/58v2
- description: Le produit évalué est l’application « eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated » développée par la société THALES DIS FRANCE SAS et embarquée sur le microcontrôleur S3FT9MH fabriqué par la société SAMSUNG ELECTRONICS CO. LTD. Le produit implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisation de l’aviation civile intern
- developer: THALES DIS FRANCE SAS SAMSUNG ELECTRONICS CO. LTD
- enhanced:
- augmented: ALC_DVS.2, AVA_VAN.5
- category: Cartes à puce
- cc_version: Critères Communs version 3.1r5
- cert_id: ANSSI-CC-2018/58v2
- cert_link: https://cyber.gouv.fr/sites/default/files/2022/01/certificat-2018_58v2.pdf
- certification_date: 2021-12-17
- developer: THALES DIS FRANCE SAS SAMSUNG ELECTRONICS CO. LTD
- evaluation_facility: SERMA SAFETY & SECURITY
- level: EAL5+
- mutual_recognition: SOG-IS CCRA
- protection_profile: Protection Profile, Machine Readable Travel Document with “ICAO Application”, Extended Access Control, version 1.10
- report_link: https://cyber.gouv.fr/sites/default/files/2022/01/anssi-cc-2018_58v2.pdf
- sponsor: THALES DIS FRANCE SAS SAMSUNG ELECTRONICS CO. LTD
- target_link: https://cyber.gouv.fr/sites/default/files/2022/01/anssi-cible-cc-2018_58v2en.pdf
- level: EAL5+
- product: eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated Référence/version du produit Version de l’application eTravel : 2.3 Version de la plateforme Java Card MultiApp : 4.1
- sponsor: THALES DIS FRANCE SAS SAMSUNG ELECTRONICS CO. LTD
- url: https://cyber.gouv.fr/produits-certifies/etravel-v23-multiapp-v41-platform-bac-eac-and-aa-activated-referenceversion-du
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
ANSSI-CC-2010/02 |
ANSSI-CC-2017/24 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
ANSSI-CC-2010/02 |
ANSSI-CC-2017/24 |
heuristics/verified_cpe_matches |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
None |
certificat-2018_58v2.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author: sharbus
- /CreationDate: D:20211222165349+01'00'
- /ModDate: D:20211222165349+01'00'
- /Producer: Microsoft: Print To PDF
- /Title: Microsoft Word - certificat-2018_58v2
- pdf_file_size_bytes: 1306910
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
ANSSI-CC-2015_17.pdf |
anssi-cc-2018_58v2.pdf |
pdf_data/report_frontpage |
- FR:
- cc_security_level: EAL 4 augmenté AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 3
- cert_id: ANSSI-CC-2015/17
- cert_item: Application J-Sign version 1.8.4 sur la plateforme J-Safe version 2.11.0
- cert_item_version: Version 1.8.4
- cert_lab: Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
- developer: STMicroelectronics S.r.l. - Incard Division Z.I Marcianise Sud, 81025 Marcianise, Italie STMicroelectronics 29 Boulevard Romain Rolland, 75669 Paris Cedex 14, France Commanditaire STMicroelectronics S.r.l. – Incard Division Z.I Marcianise Sud, 81025 Marcianise, Italie
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: PP-0006] Protection Profile - Secure Signature Creation Device Type 3, version 1.05
|
|
pdf_data/report_keywords/cc_cert_id |
- FR:
- ANSSI-CC-2012/68: 1
- ANSSI-CC-2015/16: 1
- ANSSI-CC-2015/17: 17
- ANSSI-CC-PP-2010/07-M01: 1
|
- FR:
- ANSSI-CC-2017/24: 2
- ANSSI-CC-2018/32v2: 2
- ANSSI-CC-2018/58: 4
- ANSSI-CC-2018/58v2: 17
|
pdf_data/report_keywords/cc_protection_profile_id |
- ANSSI:
- ANSSI-CC-PP-: 1
- ANSSI-CC-PP-2010/07-M01: 1
- BSI:
|
- BSI:
- BSI-CC-PP-0056-2009: 1
- BSI-PP-0056-2009: 1
- BSI-PP-0084-2014: 1
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 2
- EAL 5: 1
- EAL 7: 1
- EAL4: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 1
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- ICAO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: Administrateur
- /CreationDate: D:20150522134048+02'00'
- /Creator: Microsoft® Word 2010
- /Keywords: ANSSI-CC-CER-F-07.016
- /ModDate: D:20150522134048+02'00'
- /Producer: Microsoft® Word 2010
- /Subject: Application J-Sign version 1.8.4 sur la plateforme J-Safe version 2.11.0
- /Title: ANSSI-CC-2015/17
- pdf_file_size_bytes: 637015
- pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 16
|
- /Author: sharbus
- /CreationDate: D:20211222164829+01'00'
- /ModDate: D:20211222164829+01'00'
- /Producer: Microsoft: Print To PDF
- /Title: Microsoft Word - ANSSI-CC-2018_58v2
- pdf_file_size_bytes: 4218025
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 16
|
pdf_data/st_filename |
ANSSI-CC-2015_17_cible.pdf |
anssi-cible-cc-2018_58v2en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
- FR:
- ANSSI-2010/02-M01: 1
- ANSSI-CC-2010/02: 2
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0068-V2-2011-MA-01: 1
- BSI-CC-PP-0084-2014: 1
- BSI-PP-0055-2009: 1
- BSI-PP-0056-2009: 1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 4: 4
- EAL 4 augmented: 2
- EAL 4+: 1
- EAL4: 5
- EAL4 augmented: 2
- EAL4+: 3
- EAL5: 1
- EAL5 augmented: 1
- EAL5+: 1
|
- EAL:
- EAL 6+: 1
- EAL5: 5
- EAL5 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ADO:
- ADO_DEL.2: 1
- ADO_IGS.1: 1
- ADV:
- ADV_ARC.1: 3
- ADV_FSP.4: 2
- ADV_IMP.1: 4
- ADV_TDS.3: 2
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 3
- ALC:
- ALC_CMC.4: 3
- ALC_CMS.4: 2
- ALC_DEL.1: 3
- ALC_DVS.1: 3
- ALC_DVS.2: 2
- ALC_LCD.1: 4
- ALC_TAT.1: 3
- ASE:
- ASE_CCL.1: 3
- ASE_ECD.1: 2
- ASE_INT.1: 3
- ASE_OBJ.2: 2
- ASE_REQ.2: 3
- ASE_SPD.1: 2
- ASE_TSS.1: 3
- ATE:
- ATE_COV.2: 3
- ATE_DPT.1: 2
- ATE_FUN.1: 3
- ATE_IND.2: 2
- AVA:
- AVA_MSU.3: 1
- AVA_SOF: 1
- AVA_SOF.1: 1
- AVA_VAN.3: 1
- AVA_VAN.5: 15
- AVA_VLA.4: 2
|
- ADV:
- ADV_ARC.1: 2
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ASE:
- ATE:
- AVA:
- AVA_VAN.3: 2
- AVA_VAN.5: 4
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_CKM: 4
- FCS_CKM.1: 7
- FCS_CKM.1.1: 7
- FCS_CKM.2: 3
- FCS_CKM.3: 3
- FCS_CKM.4: 9
- FCS_CKM.4.1: 4
- FCS_COP: 10
- FCS_COP.1: 21
- FDP:
- FDP_ACC: 29
- FDP_ACC.1: 9
- FDP_ACC.1.1: 16
- FDP_ACF: 22
- FDP_ACF.1: 23
- FDP_ACF.1.1: 4
- FDP_ACF.1.2: 16
- FDP_ACF.1.3: 4
- FDP_ACF.1.4: 10
- FDP_ETC: 4
- FDP_ETC.1: 3
- FDP_ETC.1.1: 2
- FDP_ETC.1.2: 2
- FDP_ITC: 6
- FDP_ITC.1: 4
- FDP_ITC.1.1: 2
- FDP_ITC.1.2: 2
- FDP_ITC.1.3: 2
- FDP_RIP.1: 5
- FDP_RIP.1.1: 11
- FDP_SDI: 7
- FDP_SDI.2: 6
- FDP_SDI.2.1: 9
- FDP_SDI.2.2: 7
- FDP_UIT: 10
- FDP_UIT.1: 11
- FDP_UIT.1.1: 7
- FDP_UIT.1.2: 7
- FIA:
- FIA_AFL.1: 6
- FIA_AFL.1.1: 22
- FIA_AFL.1.2: 4
- FIA_ATD.1: 5
- FIA_ATD.1.1: 2
- FIA_UAU.1: 7
- FIA_UAU.1.1: 6
- FIA_UAU.1.2: 2
- FIA_UID.1: 8
- FIA_UID.1.1: 5
- FIA_UID.1.2: 2
- FMT:
- FMT_MOF: 1
- FMT_MOF.1: 7
- FMT_MOF.1.1: 2
- FMT_MSA: 10
- FMT_MSA.1: 2
- FMT_MSA.1.1: 4
- FMT_MSA.2: 8
- FMT_MSA.2.1: 2
- FMT_MSA.3: 11
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MTD: 1
- FMT_MTD.1: 5
- FMT_MTD.1.1: 5
- FMT_SMF: 4
- FMT_SMF.1: 23
- FMT_SMF.1.1: 4
- FMT_SMR.1: 9
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FPT:
- FPT_AMT.1: 6
- FPT_AMT.1.1: 4
- FPT_FLS: 1
- FPT_FLS.1: 3
- FPT_FLS.1.1: 8
- FPT_PHP.1: 4
- FPT_PHP.1.1: 7
- FPT_PHP.1.2: 7
- FPT_PHP.3: 4
- FPT_PHP.3.1: 7
- FPT_TRP: 1
- FPT_TST.1: 5
- FPT_TST.1.1: 4
- FPT_TST.1.2: 4
- FPT_TST.1.3: 2
- FTP:
- FTP_ITC: 14
- FTP_ITC.1: 17
- FTP_ITC.1.1: 11
- FTP_ITC.1.2: 8
- FTP_ITC.1.3: 8
- FTP_TRP: 8
- FTP_TRP.1: 12
- FTP_TRP.1.1: 7
- FTP_TRP.1.2: 4
- FTP_TRP.1.3: 4
|
- FAU:
- FAU_GEN: 1
- FAU_SAS: 6
- FAU_SAS.1: 12
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 31
- FCS_CKM.1: 21
- FCS_CKM.1.1: 2
- FCS_CKM.2: 6
- FCS_CKM.4: 42
- FCS_CKM.4.1: 1
- FCS_COP: 65
- FCS_COP.1: 8
- FCS_COP.1.1: 5
- FCS_RND: 7
- FCS_RND.1: 12
- FCS_RND.1.1: 2
- FCS_RNG: 1
- FDP:
- FDP_ACC.1: 19
- FDP_ACF: 1
- FDP_ACF.1: 13
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 3
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 2
- FDP_IFC.1: 4
- FDP_ITC: 1
- FDP_ITC.1: 14
- FDP_ITC.2: 14
- FDP_UCT.1: 9
- FDP_UCT.1.1: 1
- FDP_UIT.1: 9
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL: 11
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_API: 16
- FIA_API.1: 7
- FIA_API.1.1: 1
- FIA_SOS.2: 1
- FIA_UAU: 17
- FIA_UAU.1: 5
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 12
- FIA_UAU.4.1: 1
- FIA_UAU.5: 13
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 9
- FIA_UAU.6.1: 1
- FIA_UID: 20
- FIA_UID.1: 8
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_LIM: 7
- FMT_LIM.1: 22
- FMT_LIM.1.1: 3
- FMT_LIM.2: 20
- FMT_LIM.2.1: 3
- FMT_MSA.1: 1
- FMT_MSA.3: 3
- FMT_MTD: 53
- FMT_MTD.1: 7
- FMT_MTD.3: 6
- FMT_MTD.3.1: 1
- FMT_SMF.1: 44
- FMT_SMF.1.1: 1
- FMT_SMR.1: 31
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS: 4
- FPT_EMS.1: 13
- FPT_EMS.1.1: 3
- FPT_EMS.1.2: 3
- FPT_FLS.1: 10
- FPT_FLS.1.1: 1
- FPT_PHP.3: 11
- FPT_PHP.3.1: 1
- FPT_TST.1: 10
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC.1: 5
- FTP_TRP.1: 5
|
pdf_data/st_keywords/cc_claims |
- A:
- A.CGA: 5
- A.NO-DELETION: 2
- A.NO-INSTALL: 3
- A.SCA: 3
- A.SGA: 1
- A.VERIFICATION: 3
- O:
- O.ALARM: 5
- O.CIPHER: 4
- O.CSP: 1
- O.FIREWALL: 2
- O.GLOBAL_ARRAYS_INTEG: 1
- O.KEY-MNGT: 4
- O.NATIVE: 2
- O.OBJ-DEL: 2
- O.OPERATE: 1
- O.PIN-MNGT: 1
- O.REALLOCATION: 4
- O.ROLES: 1
- O.SCP: 6
- O.SID: 1
- O.SIDE_CHANNEL: 4
- O.TRANSACTION: 1
- OE:
- OE.CARD_MANAGEMENT: 5
- OE.HI_VAD: 8
- OE.MANAGEMENT_OF_SECRETS: 5
- OE.NO-DELETION: 2
- OE.NO-INSTALL: 1
- OE.VERIFICATION: 7
- OSP:
- OSP.CARD_ADMINISTRATION_DISABLED: 2
- OSP.MANAGEMENT_OF_SECRETS: 3
- OSP.ROLES: 2
- OSP.VERIFICATION: 1
- OT:
- T:
- T.EXE-CODE: 6
- T.INTEG-APPLI-CODE: 2
- T.INTEG-APPLI-DATA: 5
- T.NATIVE: 3
- T.PHYSICAL: 3
- T.TYPE: 1
|
- A:
- O:
- OE:
- OE.BAC-PP: 3
- OE.BAC_PP: 1
- OE.MRTD_: 3
|
pdf_data/st_keywords/vendor |
- STMicroelectronics:
- STM: 1
- STMicroelectronics: 19
|
- Gemalto:
- Samsung:
- Thales:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-224: 1
- SHA-256: 6
- SHA-512: 1
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 1
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- DFA: 1
- Physical tampering: 2
- physical tampering: 6
- SCA:
- DPA: 2
- SPA: 2
- timing attacks: 2
|
- FI:
- Malfunction: 6
- Physical Tampering: 5
- Physical tampering: 1
- fault injection: 1
- malfunction: 6
- physical tampering: 1
- SCA:
- DPA: 2
- Leak-Inherent: 1
- SPA: 1
- physical probing: 4
- timing attacks: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.COM: 7
- EF.DG1: 17
- EF.DG14: 7
- EF.DG15: 3
- EF.DG16: 16
- EF.DG2: 8
- EF.DG3: 19
- EF.DG4: 18
- EF.DG5: 6
- EF.SOD: 8
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- FIPS:
- FIPS PUB 113: 1
- FIPS PUB 180-1: 1
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 14443-3: 1
- ISO/IEC 14443-4: 1
- ISO/IEC 14888-3: 1
- ISO/IEC 7816: 12
- ISO/IEC 7816-: 1
- ISO/IEC 9797-1: 1
- PKCS:
- RFC:
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- FIPS:
- FIPS 180-2: 1
- FIPS 186-3: 1
- FIPS 197: 1
- ICAO:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816-4: 1
- NIST:
- SP 800-67: 1
- SP 800-90: 2
- PKCS:
- RFC:
- SCP:
- SCP01: 1
- SCP02: 1
- SCP03: 2
|
pdf_data/st_keywords/javacard_version |
- GlobalPlatform:
- JavaCard:
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- This component and its interface is permanently disabled before TOE delivery. The Card Manager is out of scope of current evaluation: 1
- This component and its interface is permanently disabled before TOE delivery. The Card Manager is out of scope of current evaluation) o GP API (This interface is permanently disabled before TOE delivery and it: 1
- This interface is permanently disabled before TOE delivery and it is out of scope of current evaluation: 1
- out of scope: 2
- out of scope of current evaluation) o Javacard 3.0.4 API o Proprietary API o Operating System o The Secured: 1
|
|
pdf_data/st_metadata |
- /Author: saverio donatiello
- /CreationDate: D:20150429154456+02'00'
- /Creator: PDFCreator Version 1.7.3
- /Keywords:
- /ModDate: D:20150429154456+02'00'
- /Producer: GPL Ghostscript 9.10
- /Subject:
- /Title: J-SIGN_SecurtyTarget_Lite
- pdf_file_size_bytes: 1850122
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 95
|
- /Author: D1417546
- /CreationDate: D:20210921161242+02'00'
- /Creator: Microsoft® Word 2016
- /Keywords: 05-07-2018
- /ModDate: D:20210921161242+02'00'
- /Producer: Microsoft® Word 2016
- /Subject: 1.5
- /Title: MultiApp V4.1: eTravel 2.3 EAC on BAC Security Target
- pdf_file_size_bytes: 1888188
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 73
|
state/cert/convert_garbage |
False |
True |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
True |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |