name |
IAS Classic V4.4.2 with MOC Server 1.1 on MultiApp V4.1 version IAS : 4.4.2.A, version MOC Server : 1.1.1A (ANSSI-CC-2023/57 ) |
IAS ECC v2, version 1.3, in configuration #1 on ID-One Cosmo v8.2 open platform on NXP P6022M VB (Identification de l’application : F0 02 02 13) (ANSSI-CC-2020/50-R01) |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
FR |
FR |
status |
active |
active |
not_valid_after |
09.02.2029 |
10.11.2028 |
not_valid_before |
09.02.2024 |
10.11.2023 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2023_57fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2020_50-R01.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_57fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2020_50-R01fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_57en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2020_50-R01en.pdf |
manufacturer |
THALES DIS FRANCE SA |
Idemia |
manufacturer_web |
https://www.thalesgroup.com/en/europe/france |
https://www.idemia.com |
security_level |
AVA_VAN.5, ALC_DVS.2, EAL5+ |
AVA_VAN.5, ALC_DVS.2, EAL5+ |
dgst |
cecfb5207379a342 |
5b23f4434b62b13d |
heuristics/cert_id |
ANSSI-CC-2023/57 |
ANSSI-CC-2020/50-R01 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_DVS.2, AVA_VAN.5 |
ADV_ARC.1, ALC_DVS.2, AGD_OPE.1, ADV_TDS.3, ATE_DPT.1, AVA_VAN.5 |
heuristics/extracted_versions |
4.1, 1.1.1, 1.1, 4.4.2 |
8.2, 1.3 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
ANSSI-CC-2023/30, ANSSI-CC-2023/20 |
ANSSI-CC-2020/26-R01, BSI-DSZ-CC-1059-V5-2022 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
ANSSI-CC-2023/30, ANSSI-CC-2023/20 |
ANSSI-CC-2020/26-R01, BSI-DSZ-CC-0973-2016, BSI-DSZ-CC-1059-V2-2019, BSI-DSZ-CC-1059-2018, BSI-DSZ-CC-0973-V2-2016, BSI-DSZ-CC-1059-V4-2021, BSI-DSZ-CC-1059-V5-2022, BSI-DSZ-CC-1059-V3-2019 |
heuristics/scheme_data |
- cert_id: ANSSI-CC-2023/57
- description: Le produit évalué est la « IAS Classic V4.4.2 with MOC Server 1.1 on MultiApp V4.1, version IAS 4.4.2.A, version MOC Server 1.1.1A » développé par THALES DIS FRANCE SAS. Ce produit est destiné à être utilisé comme dispositif sécurisé de création de signature (SSCD1).
- developer: THALES DIS FRANCE SAS
- enhanced:
- augmented: ALC_DVS.2, AVA_VAN.5
- category: Cartes à puce
- cc_version: Critères Communs version 3.1r5
- cert_id: ANSSI-CC-2023/57
- cert_link: https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2023_57fr.pdf
- certification_date: 09.02.2024
- developer: THALES DIS FRANCE SAS
- evaluation_facility: SERMA SAFETY & SECURITY
- expiration_date: 09.02.2029
- level: EAL5+
- mutual_recognition: CCRA SOG-IS
- protection_profile: Protection profiles for secure signature creation device: Part 2 : Device with key generation, v2.0.1, BSI-CC-PP-0059-2009-MA-02 ; Part 3 : Device with key import, v1.0.2, BSI-CC-PP-0075-2012-MA-01 ; Part 4 : Extension for device with key generation and trusted communication with certificate generation application, v1.0.1, BSI-CC-PP-0071-2012-MA-01 ; Part 5 : Extension for device with key generation and trusted communication with signature creation application, v1.0.1, BSI-CC-PP-0072-2012-MA-01 ; Part 6 : Extension for device with key import and trusted communication with signature creation application, v1.0.4, BSI-CC-PP-0076-2013-MA-01.
- report_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_57fr.pdf
- sponsor: THALES DIS FRANCE SAS
- target_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_57en.pdf
- expiration_date: 09.02.2029
- level: EAL5+
- product: IAS Classic V4.4.2 with MOC Server 1.1 on MultiApp V4.1 version IAS : 4.4.2.A, version MOC Server : 1.1.1A
- sponsor: THALES DIS FRANCE SAS
- url: https://cyber.gouv.fr/produits-certifies/ias-classic-v442-moc-server-11-multiapp-v41-version-ias-442a-version-moc-server
|
- cert_id: ANSSI-CC-2020/50-R01
- description: Le produit évalué est « IAS ECC v2, version 1.3, in configuration #1 on ID-One Cosmo v8.2 open platform on NXP P6022M VB, Identification de l’application : F0 02 02 13 » développé par IDEMIA et masquée sur le composant NXP P6022M VB développé par NXP SEMICONDUCTORS GMBH.
- developer: IDEMIA et NXP SEMICONDUCTORS GMBH
- enhanced:
- expiration_date: 10.11.2028
- level: EAL5+
- product: IAS ECC v2, version 1.3, in configuration #1 on ID-One Cosmo v8.2 open platform on NXP P6022M VB (Identification de l’application : F0 02 02 13)
- sponsor: IDEMIA
- url: https://cyber.gouv.fr/produits-certifies/ias-ecc-v2-version-13-configuration-1-id-one-cosmo-v82-open-platform-nxp-p6022m
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
ANSSI-CC-2023/20 |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
ANSSI-CC-2023/20 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
Certificat-CC-2023_57fr.pdf |
Certificat-CC-2020_50-R01.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0059-2009-MA-02: 1
- BSI-CC-PP-0071-2012-MA-01: 1
- BSI-CC-PP-0072-2012-MA-01: 1
- BSI-CC-PP-0075-2012-MA-01: 1
- BSI-CC-PP-0076-2013-MA-01: 1
|
- BSI:
- BSI-CC-PP-0059-2009-MA-01: 1
- BSI-CC-PP-0071-2012: 1
- BSI-CC-PP-0072-2012: 1
- BSI-CC-PP-0075-2012: 1
- BSI-CC-PP-0076-2013: 1
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author:
- /Category:
- /Comments: ANSSI-CC-CER-F-14_v14.8
- /Company: SGDSN
- /CreationDate: D:20240215115407+01'00'
- /Creator: Acrobat PDFMaker 23 pour Word
- /Keywords: version x.x, révision x
- /ModDate: D:20240215115408+01'00'
- /Producer: Adobe PDF Library 23.1.175
- /SourceModified: D:20240215105356
- /Title: ANSSI-CC-2023/57
- pdf_file_size_bytes: 122264
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
- /CreationDate: D:20231117170457+01'00'
- /Creator: Acrobat PDFMaker 23 pour Word
- /Keywords:
- /ModDate: D:20231117172057+01'00'
- /Producer: Adobe PDF Library 23.1.175
- pdf_file_size_bytes: 159225
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
ANSSI-CC-2023_57fr.pdf |
ANSSI-CC-2020_50-R01fr.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- FR:
- ANSSI-CC-2023/20: 1
- ANSSI-CC-2023/30: 1
- ANSSI-CC-2023/57: 2
|
- DE:
- BSI-DSZ-CC-1059-V5-2022: 2
- FR:
- ANSSI-CC-2020/26-R01: 1
- ANSSI-CC-2020/50-R01: 2
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0059-2009-MA-02: 2
- BSI-CC-PP-0071-2012-MA-01: 2
- BSI-CC-PP-0072-2012-MA-01: 2
- BSI-CC-PP-0075-2012-MA-01: 2
- BSI-CC-PP-0076-2013-MA-01: 2
- BSI-PP-0084-2014: 1
- other:
- PP-SSCD-Part2: 2
- PP-SSCD-Part3: 2
- PP-SSCD-Part4: 2
- PP-SSCD-Part5: 2
- PP-SSCD-Part6: 1
|
- BSI:
- BSI-CC-PP-0059-2009-MA-01: 2
- BSI-CC-PP-0071-2012: 2
- BSI-CC-PP-0072-2012: 2
- BSI-CC-PP-0075-2012: 2
- BSI-CC-PP-0076-2013: 2
- BSI-PP-0084-2014: 1
- other:
- PP-SSCD-Part2: 2
- PP-SSCD-Part3: 1
- PP-SSCD-Part4: 2
- PP-SSCD-Part5: 2
- PP-SSCD-Part6: 2
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
- AGD:
- AGD_CPS: 2
- AGD_OPE: 1
- AGD_USE: 1
- ALC:
- AVA:
|
- ADV:
- AGD:
- AGD_OPE: 2
- AGD_PRE: 4
- AGD_QUA: 1
- ALC:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Idemia:
- NXP:
- NXP: 10
- NXP Semiconductors: 1
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- SCP:
- SCP01: 1
- SCP02: 1
- SCP03: 1
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename |
ANSSI-cible-CC-2023_57en.pdf |
ANSSI-cible-CC-2020_50-R01en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0059-2009-MA-02: 1
- BSI-CC-PP-0071-2012-MA-01: 1
- BSI-CC-PP-0072-2012-MA-01: 1
- BSI-CC-PP-0075-2012-MA-01: 1
- BSI-CC-PP-0076-2013-MA-01: 1
- BSI-CC-PP-0084-2014: 1
- other:
- PP-SSCD: 6
- PP-SSCD-: 1
- PP-SSCD-KG: 41
- PP-SSCD-KI: 30
|
- BSI:
- BSI-CC-PP-0059-2009-MA-01: 1
- BSI-CC-PP-0071: 1
- BSI-CC-PP-0072: 1
- BSI-CC-PP-0075: 1
- BSI-CC-PP-0076: 1
- BSI-CC-PP-0084-2014: 1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 5+: 1
- EAL5: 3
- EAL5 augmented: 1
|
- EAL:
- EAL 5: 2
- EAL 5 augmented: 1
- EAL4: 1
- EAL4 augmented: 1
- EAL5: 6
- EAL5 augmented: 2
|
pdf_data/st_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 2
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_TDS: 1
- ADV_TDS.3: 2
- AGD:
- AGD_OPE: 11
- AGD_OPE.1: 2
- AGD_PRE: 14
- AGD_PRE_PLT: 2
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 2
- ALC_DVS.2: 7
- ALC_LCD: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_DPT.1: 2
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM: 47
- FCS_CKM.1: 13
- FCS_CKM.1.1: 2
- FCS_CKM.2: 4
- FCS_CKM.4: 12
- FCS_CKM.4.1: 2
- FCS_COP: 26
- FCS_COP.1: 6
- FCS_COP.1.1: 2
- FDP:
- FDP_ACC: 44
- FDP_ACC.1: 28
- FDP_ACC.1.1: 4
- FDP_ACF: 32
- FDP_ACF.1: 10
- FDP_ACF.1.1: 4
- FDP_ACF.1.2: 4
- FDP_ACF.1.3: 4
- FDP_ACF.1.4: 4
- FDP_AFC: 1
- FDP_DAU: 10
- FDP_DAU.1: 1
- FDP_DAU.2.1: 1
- FDP_DAU.2.2: 1
- FDP_IFC.1: 18
- FDP_ITC: 11
- FDP_ITC.1: 8
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 8
- FDP_RIP: 2
- FDP_RIP.1: 7
- FDP_RIP.1.1: 1
- FDP_SDI: 17
- FDP_SDI.1: 2
- FDP_SDI.2.1: 2
- FDP_SDI.2.2: 2
- FDP_UCT: 9
- FDP_UCT.1.1: 1
- FDP_UIT: 9
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL: 17
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_API: 5
- FIA_API.1: 14
- FIA_API.1.1: 2
- FIA_UAU: 20
- FIA_UAU.1: 7
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UID: 20
- FIA_UID.1: 10
- FIA_UID.1.1: 2
- FIA_UID.1.2: 2
- FMT:
- FMT_MOF.1: 9
- FMT_MOF.1.1: 1
- FMT_MSA: 62
- FMT_MSA.1: 7
- FMT_MSA.1.1: 3
- FMT_MSA.2: 9
- FMT_MSA.2.1: 1
- FMT_MSA.3: 12
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MSA.4: 3
- FMT_MSA.4.1: 2
- FMT_MTD: 16
- FMT_MTD.1: 1
- FMT_MTD.1.1: 2
- FMT_SMF.1: 26
- FMT_SMF.1.1: 1
- FMT_SMR.1: 36
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS: 5
- FPT_EMS.1: 13
- FPT_EMS.1.1: 4
- FPT_EMS.1.2: 3
- FPT_FLS.1: 9
- FPT_FLS.1.1: 1
- FPT_PHP.1: 8
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 9
- FPT_PHP.3.1: 1
- FPT_TST: 2
- FPT_TST.1: 11
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ICT: 2
- FTP_ITC: 38
- FTP_ITC.1: 4
- FTP_ITC.1.1: 4
- FTP_ITC.1.2: 4
- FTP_ITC.1.3: 4
- FTP_TRP.1: 4
|
- FAU:
- FCS:
- FCS_CKM: 34
- FCS_CKM.1: 41
- FCS_CKM.2: 8
- FCS_CKM.3: 7
- FCS_CKM.4: 60
- FCS_CKM.4.1: 1
- FCS_COP: 104
- FCS_COP.1: 38
- FCS_COP.1.1: 3
- FCS_RNG: 4
- FCS_RNG.1: 19
- FCS_RNG.1.1: 3
- FCS_RNG.1.2: 3
- FDP:
- FDP_ACC: 70
- FDP_ACC.1: 40
- FDP_ACF: 49
- FDP_ACF.1: 36
- FDP_CKM: 4
- FDP_CKM.1: 1
- FDP_DAU: 6
- FDP_DAU.1: 1
- FDP_DAU.2: 2
- FDP_ETC: 5
- FDP_ETC.1: 2
- FDP_IFC.1: 22
- FDP_ITC: 21
- FDP_ITC.1: 42
- FDP_ITC.2: 35
- FDP_RIP: 11
- FDP_RIP.1: 10
- FDP_RIP.1.1: 3
- FDP_ROL: 1
- FDP_SDI: 15
- FDP_SDI.1: 2
- FDP_SDI.2: 6
- FDP_UCT: 7
- FDP_UCT.1: 1
- FDP_UIT: 5
- FDP_UIT.1: 2
- FIA:
- FIA_AFL: 22
- FIA_AFL.1: 3
- FIA_AFL.1.1: 1
- FIA_API: 5
- FIA_API.1: 9
- FIA_API.1.1: 1
- FIA_UAU.1: 16
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID.1: 17
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MOF.1: 7
- FMT_MOF.1.1: 1
- FMT_MSA: 30
- FMT_MSA.1: 7
- FMT_MSA.2: 9
- FMT_MSA.2.1: 1
- FMT_MSA.3: 30
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MSA.4: 8
- FMT_MSA.4.1: 1
- FMT_MTD: 40
- FMT_MTD.1: 6
- FMT_SMF.1: 44
- FMT_SMF.1.1: 1
- FMT_SMR.1: 42
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPT:
- FPT_EMS: 7
- FPT_EMS.1: 9
- FPT_EMS.1.1: 4
- FPT_EMS.1.2: 2
- FPT_FLS: 6
- FPT_FLS.1: 10
- FPT_FLS.1.1: 1
- FPT_PHP: 2
- FPT_PHP.1: 5
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 7
- FPT_PHP.3.1: 1
- FPT_RCV: 2
- FPT_TST: 1
- FPT_TST.1: 13
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 31
- FTP_ITC.1: 16
- FTP_TRP.1: 4
|
pdf_data/st_keywords/cc_claims |
- A:
- A.APPLET: 2
- A.CGA: 3
- A.CSP: 4
- A.SCA: 3
- A.VERIFICATION: 2
- OE:
- OE.APPLET: 1
- OE.CODE-EVIDENCE: 1
- OE.HID_VAD: 1
- OE.HI_VAD: 2
- OE.VERIFICATION: 4
|
- A:
- A.APPLET: 1
- A.CGA: 5
- A.CSP: 5
- A.PLT: 1
- A.SCA: 3
- A.VERIFICATION: 1
- OE:
- OE.APPLET: 1
- OE.CODE-EVIDENCE: 1
- OE.CODE_EVIDENCE: 2
- OE.PLT: 2
- OE.VERIFICATION: 4
- OSP:
- OSP.PLT: 2
- OSP.VERIFICATION: 1
- T:
- T.CONFID_APPLI_DATA: 3
- T.INTEG_APPLI_DATA: 6
- T.OBJ_DELETION: 3
- T.PHYSICAL: 3
- T.RESSOURCES: 3
|
pdf_data/st_keywords/vendor |
- Gemalto:
- Samsung:
- Thales:
- Thales: 12
- Thales Group: 62
|
- Idemia:
- Morpho:
- NXP:
- Oberthur:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-256: 5
- SHA-384: 2
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- DFA: 1
- Malfunction: 1
- fault injection: 1
- physical tampering: 4
- SCA:
- DPA: 1
- Leak-Inherent: 1
- SPA: 1
- timing attacks: 1
|
- FI:
- DFA: 2
- fault injection: 2
- physical tampering: 5
- SCA:
- DPA: 1
- SPA: 1
- side channel: 1
- timing attacks: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2012-04-003: 1
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-004: 1
- FIPS:
- PKCS:
|
- FIPS:
- FIPS 180-3: 1
- FIPS PUB 180-3: 1
- FIPS180-3: 1
- ISO:
- PKCS:
- PKCS #1: 1
- PKCS#1: 3
- PKCS#15: 2
- PKCS#3: 3
- SCP:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- by authorized users. The functionalities of IAS Classic V4.4.2 other than the ones from SSCD are out of scope of the TOE perimeter. MOC Server application provides biometric authentication of the signatory: 1
- out of scope: 1
|
|
pdf_data/st_metadata |
- /Author: D1418852
- /CreationDate: D:20230928155442+02'00'
- /Creator: Microsoft® Word for Microsoft 365
- /Keywords: 16-03-2018
- /ModDate: D:20230928155442+02'00'
- /Producer: Microsoft® Word for Microsoft 365
- /Subject: 1.1
- /Title: MultiApp V4.1: IAS EN Core & Extensions Security Target
- pdf_file_size_bytes: 1252729
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 62
|
- /Author: IDEMIA
- /CreationDate: D:20230922153157+02'00'
- /Creator: Microsoft® Word pour Microsoft 365
- /Keywords: Quality
- /MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_Application: Microsoft Azure Information Protection
- /MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_Enabled: True
- /MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_Extended_MSFT_Method: Automatic
- /MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_Name: Public
- /MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_Owner: [email protected]
- /MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_Ref: https://api.informationprotection.azure.com/api/7694d41c-5504-43d9-9e40-cb254ad755ec
- /MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_SetDate: 2019-08-02T10:50:29.5775469+02:00
- /MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_SiteId: 7694d41c-5504-43d9-9e40-cb254ad755ec
- /ModDate: D:20230922153157+02'00'
- /Producer: Microsoft® Word pour Microsoft 365
- /Subject: FQR standard
- pdf_file_size_bytes: 1948913
- pdf_hyperlinks: ftp://ftp.itc.1/SCD, ftp://ftp.itc.1/SVD
- pdf_is_encrypted: False
- pdf_number_of_pages: 94
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |