name |
Application J-Sign version 1.8.4 sur la plateforme J-Safe version 2.11.0 |
Application eTravel EAC v2.1, en configurationBAC, sur la plateforme fermée MultiApp V3.1masquée sur le composant P60D080PVC(Version du patch : 1.4) |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
FR |
FR |
status |
archived |
archived |
not_valid_after |
21.05.2020 |
12.02.2020 |
not_valid_before |
21.05.2015 |
12.02.2015 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_17.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_04.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_17_cible.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi_cible_2015-04_LITE.pdf |
manufacturer |
Incard Division / ST Microelectronics |
Gemalto / NXP Semiconductors |
manufacturer_web |
None |
https://www.gemalto.com/ |
security_level |
EAL4+, AVA_VAN.5 |
EAL4+, ALC_DVS.2 |
dgst |
ce97d64b517bf270 |
f3dfb829d295e583 |
heuristics/cert_id |
ANSSI-CC-2015/17 |
ANSSI-CC-2015/04 |
heuristics/cert_lab |
SERMA |
SERMA |
heuristics/cpe_matches |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_CCL.1, ALC_DEL.1, ALC_CMC.4, AVA_VLA.4, ALC_DVS.2, ATE_DPT.1, AVA_VAN.5, ATE_FUN.1, ATE_IND.2, ASE_TSS.1, ADV_TDS.3, ADV_ARC.1, ASE_SPD.1, ASE_REQ.2, ALC_CMS.4, ADV_IMP.1, ALC_TAT.1, ATE_COV.2, AGD_OPE.1, AVA_SOF.1, ASE_ECD.1, AVA_MSU.3, ADV_FSP.4, ASE_INT.1, AGD_PRE.1, ALC_LCD.1, ASE_OBJ.2 |
AVA_VAN.3, ALC_DVS.2, ALC_FLR.1, ASE_TSS.2, ADV_ARC.1 |
heuristics/extracted_versions |
1.8.4, 2.11.0 |
1.4, 2.1, 3.1 |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
ANSSI-CC-2015/16, ANSSI-CC-2012/68 |
ANSSI-CC-2014/86, BSI-DSZ-CC-0837-V2-2014 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
ANSSI-CC-2009/05, ANSSI-CC-2015/16, ANSSI-CC-2009/50, ANSSI-CC-2009/06, ANSSI-CC-2009/28, ANSSI-CC-2009/62, ANSSI-CC-2009/26, ANSSI-CC-2012/68, ANSSI-CC-2010/02, ANSSI-CC-2010/01, ANSSI-CC-2009/51 |
BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0728-2011, ANSSI-CC-2014/86, ANSSI-CC-2014/06, BSI-DSZ-CC-0837-2013, BSI-DSZ-CC-0837-V2-2014, BSI-DSZ-CC-0829-2012 |
heuristics/scheme_data |
- cert_id: ANSSI-CC-2015/17
- description: Le produit certifié est la carte à puce « Application J-Sign version 1.8.4 sur la plateforme J-Safe version 2.11.0 » développée par STMicroelectronics S.r.l. – Incard Division et STMicroelectronics. Cette carte fournit une application de création de signature électronique utilisée dans le cadre du déploiement de la CIE/CNS (carte d’identité et de services au citoyen) italienne. Cette applicati
- developer: STMicroelectronics S.r.l. - Incard Division / STMicroelectronics
- enhanced:
- augmented: AVA_VAN.5
- category: Cartes à puce
- cc_version: Critères Communs version 3.1r3
- cert_id: ANSSI-CC-2015/17
- certification_date: 2015-05-21
- developer: STMicroelectronics S.r.l. - Incard Division / STMicroelectronics
- evaluation_facility: Serma Technologies
- level: EAL4+
- mutual_recognition:
- protection_profile: PP-0006
- report_link: https://cyber.gouv.fr/sites/default/files/2015/05/ANSSI-CC-2015_17.pdf
- sponsor: STMicroelectronics S.r.l. - Incard Division
- target_link: https://cyber.gouv.fr/sites/default/files/2015/05/ANSSI-CC-2015_17_cible.pdf
- level: EAL4+
- product: Application J-Sign version 1.8.4 sur la plateforme J-Safe version 2.11.0
- sponsor: STMicroelectronics S.r.l. - Incard Division
- url: https://cyber.gouv.fr/produits-certifies/application-j-sign-version-184-sur-la-plateforme-j-safe-version-2110
|
- cert_id: ANSSI-CC-2015/04
- description: Le produit certifiéest la carte à puce fermée « MultiApp v3.1 », pouvant être en mode contact ou sans contact. Le produit est développé par la société GEMALTO et embarqué sur le microcontrôleur P60D080PVC fabriqué par la société NXP SEMICONDUCTORS. Le produit implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisation de l’aviation civile inter
- developer: Gemalto / NXP Semiconductors
- enhanced:
- augmented: ALC_DVS.2
- category: Cartes à puce
- cc_version: Critères Communs version 3.1r4
- cert_id: ANSSI-CC-2015/04
- certification_date: 2015-02-12
- developer: Gemalto / NXP Semiconductors
- evaluation_facility: Serma Technologies
- level: EAL4+
- mutual_recognition:
- protection_profile: BSI-CC-PP-0055, [PP BAC],
- report_link: https://cyber.gouv.fr/sites/default/files/2015/03/ANSSI-CC-2015_04.pdf
- sponsor: Gemalto
- target_link: https://cyber.gouv.fr/sites/default/files/2015/03/anssi_cible_2015-04_LITE.pdf
- level: EAL4+
- product: Application eTravel EAC v2.1, en configuration BAC, sur la plateforme fermée MultiApp V3.1 masquée sur le composant P60D080PVC
- sponsor: Gemalto
- url: https://cyber.gouv.fr/produits-certifies/application-etravel-eac-v21-en-configuration-bac-sur-la-plateforme-fermee
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
ANSSI-CC-2010/02 |
BSI-DSZ-CC-0845-V2-2013 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
ANSSI-CC-2010/02 |
BSI-DSZ-CC-0845-V2-2013 |
heuristics/verified_cpe_matches |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
ANSSI-CC-2015_17.pdf |
ANSSI-CC-2015_04.pdf |
pdf_data/report_frontpage |
- FR:
- cc_security_level: EAL 4 augmenté AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 3
- cert_id: ANSSI-CC-2015/17
- cert_item: Application J-Sign version 1.8.4 sur la plateforme J-Safe version 2.11.0
- cert_item_version: Version 1.8.4
- cert_lab: Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
- developer: STMicroelectronics S.r.l. - Incard Division Z.I Marcianise Sud, 81025 Marcianise, Italie STMicroelectronics 29 Boulevard Romain Rolland, 75669 Paris Cedex 14, France Commanditaire STMicroelectronics S.r.l. – Incard Division Z.I Marcianise Sud, 81025 Marcianise, Italie
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: PP-0006] Protection Profile - Secure Signature Creation Device Type 3, version 1.05
|
- FR:
- cc_security_level: EAL 4 augmenté ALC_DVS.2
- cc_version: Critères Communs version 3.1 révision 4
- cert_id: ANSSI-CC-2015/04
- cert_item: Application eTravel EAC v2.1, en configuration BAC, sur la plateforme fermée MultiApp V3.1 masquée sur le composant P60D080PVC
- cert_item_version: Version de l’application eTravel EAC : 2.1 Version de la plateforme Java Card MultiApp : 3.1 Version du patch : 1.4
- cert_lab: Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
- developer: Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France NXP Semiconductors Box 54 02 40, D-22502 Hambourg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: BSI-CC-PP-0055, [PP BAC], version 1.10 Machine Readable Travel Document with ICAO application, Basic Access Control
|
pdf_data/report_keywords/cc_cert_id |
- FR:
- ANSSI-CC-2012/68: 1
- ANSSI-CC-2015/16: 1
- ANSSI-CC-2015/17: 17
- ANSSI-CC-PP-2010/07-M01: 1
|
- DE:
- BSI-DSZ-CC-0837-V2-2014: 3
- FR:
- ANSSI-CC-2014/86: 2
- ANSSI-CC-2015/04: 21
|
pdf_data/report_keywords/cc_protection_profile_id |
- ANSSI:
- ANSSI-CC-PP-: 1
- ANSSI-CC-PP-2010/07-M01: 1
- BSI:
|
- BSI:
- BSI-CC-PP-0055: 1
- BSI-CC-PP-0055-2009: 1
- BSI-PP-0035-: 1
- BSI-PP-0035-2007: 2
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 2
- EAL 5: 1
- EAL 7: 1
- EAL4: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 2
- EAL 5: 1
- EAL 7: 1
- EAL4: 2
- EAL6: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 1
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_FLR.1: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Gemalto:
- NXP:
- NXP: 3
- NXP Semiconductors: 3
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- ICAO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: Administrateur
- /CreationDate: D:20150522134048+02'00'
- /Creator: Microsoft® Word 2010
- /Keywords: ANSSI-CC-CER-F-07.016
- /ModDate: D:20150522134048+02'00'
- /Producer: Microsoft® Word 2010
- /Subject: Application J-Sign version 1.8.4 sur la plateforme J-Safe version 2.11.0
- /Title: ANSSI-CC-2015/17
- pdf_file_size_bytes: 637015
- pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 16
|
- /Author:
- /CreationDate:
- /Creator: PDFCreator Version 1.2.1
- /Keywords:
- /ModDate:
- /Producer: GPL Ghostscript 9.02
- /Subject:
- /Title: ANSSI-CC-2015_04
- pdf_file_size_bytes: 281083
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
pdf_data/st_filename |
ANSSI-CC-2015_17_cible.pdf |
anssi_cible_2015-04_LITE.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
- FR:
- ANSSI-2010/02-M01: 1
- ANSSI-CC-2010/02: 2
|
- DE:
- BSI-DSZ-CC-0837-2013-MA-01: 1
- BSI-DSZ-CC-0845: 1
- BSI-DSZ-CC-0845-V2-2013: 1
- NL:
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0056-V2-2012: 1
- BSI-CC-PP-0068-V2-2011: 1
- BSI-PP-0035: 1
- BSI-PP-0055: 1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 4: 4
- EAL 4 augmented: 2
- EAL 4+: 1
- EAL4: 5
- EAL4 augmented: 2
- EAL4+: 3
- EAL5: 1
- EAL5 augmented: 1
- EAL5+: 1
|
- EAL:
- EAL 6+: 1
- EAL4: 3
- EAL4 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ADO:
- ADO_DEL.2: 1
- ADO_IGS.1: 1
- ADV:
- ADV_ARC.1: 3
- ADV_FSP.4: 2
- ADV_IMP.1: 4
- ADV_TDS.3: 2
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 3
- ALC:
- ALC_CMC.4: 3
- ALC_CMS.4: 2
- ALC_DEL.1: 3
- ALC_DVS.1: 3
- ALC_DVS.2: 2
- ALC_LCD.1: 4
- ALC_TAT.1: 3
- ASE:
- ASE_CCL.1: 3
- ASE_ECD.1: 2
- ASE_INT.1: 3
- ASE_OBJ.2: 2
- ASE_REQ.2: 3
- ASE_SPD.1: 2
- ASE_TSS.1: 3
- ATE:
- ATE_COV.2: 3
- ATE_DPT.1: 2
- ATE_FUN.1: 3
- ATE_IND.2: 2
- AVA:
- AVA_MSU.3: 1
- AVA_SOF: 1
- AVA_SOF.1: 1
- AVA_VAN.3: 1
- AVA_VAN.5: 15
- AVA_VLA.4: 2
|
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_CKM: 4
- FCS_CKM.1: 7
- FCS_CKM.1.1: 7
- FCS_CKM.2: 3
- FCS_CKM.3: 3
- FCS_CKM.4: 9
- FCS_CKM.4.1: 4
- FCS_COP: 10
- FCS_COP.1: 21
- FDP:
- FDP_ACC: 29
- FDP_ACC.1: 9
- FDP_ACC.1.1: 16
- FDP_ACF: 22
- FDP_ACF.1: 23
- FDP_ACF.1.1: 4
- FDP_ACF.1.2: 16
- FDP_ACF.1.3: 4
- FDP_ACF.1.4: 10
- FDP_ETC: 4
- FDP_ETC.1: 3
- FDP_ETC.1.1: 2
- FDP_ETC.1.2: 2
- FDP_ITC: 6
- FDP_ITC.1: 4
- FDP_ITC.1.1: 2
- FDP_ITC.1.2: 2
- FDP_ITC.1.3: 2
- FDP_RIP.1: 5
- FDP_RIP.1.1: 11
- FDP_SDI: 7
- FDP_SDI.2: 6
- FDP_SDI.2.1: 9
- FDP_SDI.2.2: 7
- FDP_UIT: 10
- FDP_UIT.1: 11
- FDP_UIT.1.1: 7
- FDP_UIT.1.2: 7
- FIA:
- FIA_AFL.1: 6
- FIA_AFL.1.1: 22
- FIA_AFL.1.2: 4
- FIA_ATD.1: 5
- FIA_ATD.1.1: 2
- FIA_UAU.1: 7
- FIA_UAU.1.1: 6
- FIA_UAU.1.2: 2
- FIA_UID.1: 8
- FIA_UID.1.1: 5
- FIA_UID.1.2: 2
- FMT:
- FMT_MOF: 1
- FMT_MOF.1: 7
- FMT_MOF.1.1: 2
- FMT_MSA: 10
- FMT_MSA.1: 2
- FMT_MSA.1.1: 4
- FMT_MSA.2: 8
- FMT_MSA.2.1: 2
- FMT_MSA.3: 11
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MTD: 1
- FMT_MTD.1: 5
- FMT_MTD.1.1: 5
- FMT_SMF: 4
- FMT_SMF.1: 23
- FMT_SMF.1.1: 4
- FMT_SMR.1: 9
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FPT:
- FPT_AMT.1: 6
- FPT_AMT.1.1: 4
- FPT_FLS: 1
- FPT_FLS.1: 3
- FPT_FLS.1.1: 8
- FPT_PHP.1: 4
- FPT_PHP.1.1: 7
- FPT_PHP.1.2: 7
- FPT_PHP.3: 4
- FPT_PHP.3.1: 7
- FPT_TRP: 1
- FPT_TST.1: 5
- FPT_TST.1.1: 4
- FPT_TST.1.2: 4
- FPT_TST.1.3: 2
- FTP:
- FTP_ITC: 14
- FTP_ITC.1: 17
- FTP_ITC.1.1: 11
- FTP_ITC.1.2: 8
- FTP_ITC.1.3: 8
- FTP_TRP: 8
- FTP_TRP.1: 12
- FTP_TRP.1.1: 7
- FTP_TRP.1.2: 4
- FTP_TRP.1.3: 4
|
- FAU:
- FAU_GEN: 1
- FAU_SAS: 6
- FAU_SAS.1: 13
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 7
- FCS_CKM.1: 27
- FCS_CKM.1.1: 2
- FCS_CKM.2: 4
- FCS_CKM.4: 30
- FCS_CKM.4.1: 1
- FCS_COP: 53
- FCS_COP.1: 11
- FCS_COP.1.1: 1
- FCS_RND: 7
- FCS_RND.1: 13
- FCS_RND.1.1: 2
- FDP:
- FDP_ACC.1: 19
- FDP_ACC.1.1: 1
- FDP_ACF: 1
- FDP_ACF.1: 12
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 2
- FDP_IFC.1: 4
- FDP_ITC: 2
- FDP_ITC.1: 12
- FDP_ITC.2: 12
- FDP_UCT.1: 11
- FDP_UCT.1.1: 1
- FDP_UIT.1: 10
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL.1: 12
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_API: 13
- FIA_API.1: 6
- FIA_API.1.1: 1
- FIA_SOS.2: 1
- FIA_UAU: 5
- FIA_UAU.1: 11
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 13
- FIA_UAU.4.1: 1
- FIA_UAU.5: 11
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 3
- FIA_UAU.6: 12
- FIA_UAU.6.1: 1
- FIA_UID.1: 12
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_LIM: 7
- FMT_LIM.1: 21
- FMT_LIM.1.1: 2
- FMT_LIM.2: 19
- FMT_LIM.2.1: 2
- FMT_MSA.1: 1
- FMT_MSA.3: 3
- FMT_MTD: 40
- FMT_MTD.1: 6
- FMT_SMF.1: 20
- FMT_SMF.1.1: 1
- FMT_SMR.1: 23
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FMT_SRM.1: 1
- FPT:
- FPT_EMS: 4
- FPT_EMS.1: 14
- FPT_EMS.1.1: 3
- FPT_EMS.1.2: 3
- FPT_FLS.1: 12
- FPT_FLS.1.1: 1
- FPT_PHP.3: 13
- FPT_PHP.3.1: 1
- FPT_TST.1: 11
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC.1: 5
- FTP_TRP.1: 5
|
pdf_data/st_keywords/cc_claims |
- A:
- A.CGA: 5
- A.NO-DELETION: 2
- A.NO-INSTALL: 3
- A.SCA: 3
- A.SGA: 1
- A.VERIFICATION: 3
- O:
- O.ALARM: 5
- O.CIPHER: 4
- O.CSP: 1
- O.FIREWALL: 2
- O.GLOBAL_ARRAYS_INTEG: 1
- O.KEY-MNGT: 4
- O.NATIVE: 2
- O.OBJ-DEL: 2
- O.OPERATE: 1
- O.PIN-MNGT: 1
- O.REALLOCATION: 4
- O.ROLES: 1
- O.SCP: 6
- O.SID: 1
- O.SIDE_CHANNEL: 4
- O.TRANSACTION: 1
- OE:
- OE.CARD_MANAGEMENT: 5
- OE.HI_VAD: 8
- OE.MANAGEMENT_OF_SECRETS: 5
- OE.NO-DELETION: 2
- OE.NO-INSTALL: 1
- OE.VERIFICATION: 7
- OSP:
- OSP.CARD_ADMINISTRATION_DISABLED: 2
- OSP.MANAGEMENT_OF_SECRETS: 3
- OSP.ROLES: 2
- OSP.VERIFICATION: 1
- OT:
- T:
- T.EXE-CODE: 6
- T.INTEG-APPLI-CODE: 2
- T.INTEG-APPLI-DATA: 5
- T.NATIVE: 3
- T.PHYSICAL: 3
- T.TYPE: 1
|
|
pdf_data/st_keywords/vendor |
- STMicroelectronics:
- STM: 1
- STMicroelectronics: 19
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-224: 1
- SHA-256: 6
- SHA-512: 1
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 1
- SHA-256: 1
- SHA-512: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- DFA: 1
- Physical tampering: 2
- physical tampering: 6
- SCA:
- DPA: 2
- SPA: 2
- timing attacks: 2
|
- FI:
- Malfunction: 6
- Physical Tampering: 5
- Physical tampering: 1
- fault injection: 1
- malfunction: 5
- physical tampering: 1
- SCA:
- DPA: 2
- Leak-Inherent: 2
- SPA: 1
- physical probing: 3
- timing attacks: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.COM: 9
- EF.DG1: 30
- EF.DG13: 3
- EF.DG14: 3
- EF.DG15: 4
- EF.DG16: 28
- EF.DG2: 12
- EF.DG3: 8
- EF.DG4: 8
- EF.DG5: 8
- EF.DG6: 2
- EF.SOD: 9
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- FIPS:
- FIPS PUB 113: 1
- FIPS PUB 180-1: 1
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 14443-3: 1
- ISO/IEC 14443-4: 1
- ISO/IEC 14888-3: 1
- ISO/IEC 7816: 12
- ISO/IEC 7816-: 1
- ISO/IEC 9797-1: 1
- PKCS:
- RFC:
|
- CC:
- CCMB-2006-09-001: 1
- CCMB-2007-09-002: 1
- CCMB-2007-09-003: 1
- CCMB-2007-09-004: 1
- FIPS:
- FIPS 180-2: 1
- FIPS 46-3: 2
- FIPS PUB 46-3: 1
- FIPS180-2: 1
- FIPS46-3: 3
- ICAO:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816-4: 1
- PKCS:
- RFC:
|
pdf_data/st_keywords/javacard_version |
- GlobalPlatform:
- JavaCard:
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- This component and its interface is permanently disabled before TOE delivery. The Card Manager is out of scope of current evaluation: 1
- This component and its interface is permanently disabled before TOE delivery. The Card Manager is out of scope of current evaluation) o GP API (This interface is permanently disabled before TOE delivery and it: 1
- This interface is permanently disabled before TOE delivery and it is out of scope of current evaluation: 1
- out of scope: 2
- out of scope of current evaluation) o Javacard 3.0.4 API o Proprietary API o Operating System o The Secured: 1
|
|
pdf_data/st_metadata |
- /Author: saverio donatiello
- /CreationDate: D:20150429154456+02'00'
- /Creator: PDFCreator Version 1.7.3
- /Keywords:
- /ModDate: D:20150429154456+02'00'
- /Producer: GPL Ghostscript 9.10
- /Subject:
- /Title: J-SIGN_SecurtyTarget_Lite
- pdf_file_size_bytes: 1850122
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 95
|
- /Author: Antoine de Lavernette
- /CreationDate: D:20150106172107+01'00'
- /Creator: Microsoft® Office Word 2007
- /Keywords: Security Target, CC, eTravel
- /ModDate: D:20150106172107+01'00'
- /Producer: Microsoft® Office Word 2007
- /Subject: MRTD
- /Title: eTravel EAC v2 Security Target
- pdf_file_size_bytes: 1117016
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 64
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |