Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
MIFARE Plus EV2 on ST31N600 A01 (Version 1.0.2) (ANSSI-CC-2024/03)
ANSSI-CC-2024/03
Produit IAS Classic v5.2.1 with MOC Server v3.1 on MultiApp V5.1 Version 5.2.1.A.C et 5.2.1.A.O ( ANSSI-CC-2023/42 )
ANSSI-CC-2023/42
name MIFARE Plus EV2 on ST31N600 A01 (Version 1.0.2) (ANSSI-CC-2024/03) Produit IAS Classic v5.2.1 with MOC Server v3.1 on MultiApp V5.1 Version 5.2.1.A.C et 5.2.1.A.O ( ANSSI-CC-2023/42 )
not_valid_after 15.04.2029 29.09.2028
not_valid_before 15.04.2024 29.09.2023
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2024_03fr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2023_42fr.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2024_03fr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_42fr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-Cible-CC-2024_03en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-2023_42en.pdf
manufacturer STMicroelectronics THALES DIS FRANCE SA
manufacturer_web https://www.st.com/ https://www.thalesgroup.com/en/europe/france
security_level AVA_VAN.5, ALC_DVS.2, EAL5+, ALC_FLR.1 AVA_VAN.5, ALC_DVS.2, EAL5+
dgst d2f309e22cf72396 5f61ebf23c6ad99d
heuristics/cert_id ANSSI-CC-2024/03 ANSSI-CC-2023/42
heuristics/extracted_sars ALC_CMS.5, ASE_INT.1, ASE_ECD.1, ATE_FUN.1, ADV_IMP.1, ATE_DPT.3, ALC_FLR.1, ASE_TSS.1, AGD_PRE.1, ASE_CCL.1, ALC_DVS.2, AVA_VAN.5, ASE_SPD.1, ASE_OBJ.2, ATE_COV.2, ALC_TAT.2, ASE_REQ.2, ADV_INT.2, ALC_CMC.4, ADV_FSP.5, ADV_ARC.1, ALC_DEL.1, AGD_OPE.1, ALC_LCD.1, ADV_TDS.4, ATE_IND.2 ALC_DVS.2, AVA_VAN.5
heuristics/extracted_versions 1.0.2 5.1, 3.1, 5.2.1
heuristics/report_references/directly_referencing ANSSI-CC-2022/21 ANSSI-CC-2023/01, ANSSI-CC-2023/31
heuristics/report_references/indirectly_referencing ANSSI-CC-2022/21 ANSSI-CC-2023/01, ANSSI-CC-2023/31
heuristics/scheme_data
  • cert_id: ANSSI-CC-2024/03
  • description: Le produit évalué est « MIFARE Plus EV2 on ST31N600 A01, Version 1.0.2 » développé par STMICROELECTRONICS. Le microcontrôleur seul n’est pas un produit utilisable en tant que tel. Il est destiné à héberger une ou plusieurs applications. Il peut être inséré dans un support plastique pour constituer une carte à puce. Les usages possibles de cette carte sont multiples (documents d’identité sécurisés
  • developer: STMICROELECTRONICS
  • enhanced:
    • augmented: ALC_DVS.2, ALC_FLR.1, AVA_VAN.
    • category: Micro-circuits
    • cc_version: Critères Communs version 3.1r5
    • cert_id: ANSSI-CC-2024/03
    • cert_link: https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2024_03fr.pdf
    • certification_date: 15.04.2024
    • developer: STMICROELECTRONICS
    • evaluation_facility: THALES / CNES
    • expiration_date: 15.04.2029
    • level: EAL5+
    • mutual_recognition: CCRA SOG-IS
    • protection_profile: Security IC Platform Protection Profile with Augmentation Packages, version 1.0 certifié BSI-CC-PP-0084-2014 le 19 février 2014 avec conformité aux packages : “Authentication of the security IC” “Loader dedicated for usage in Secured Environment only” “Loader dedicated for usage by authorized users only”
    • sponsor: STMICROELECTRONICS
  • expiration_date: 15.04.2029
  • level: EAL5+
  • product: MIFARE Plus EV2 on ST31N600 A01 (Version 1.0.2)
  • sponsor: STMICROELECTRONICS
  • url: https://cyber.gouv.fr/produits-certifies/mifare-plus-ev2-st31n600-a01-version-102
  • cert_id: ANSSI-CC-2023/42
  • description: Le produit évalué est l’application « IAS Classic v5.2.1 with MOC Server v3.1 on MultiApp V5.1, Versions 5.2.1.A.C et 5.2.1.A.O » développée par THALES DIS FRANCE SAS et embarquée sur le microcontrôleur AQUARIUS_BA_09 fabriqué par THALES DIS. Ce produit est destiné à être utilisé comme dispositif sécurisé de création de signature (SSCD).    
  • developer: THALES DIS
  • enhanced:
    • augmented: ALC_DVS.2, AVA_VAN.5
    • category: Cartes à puce
    • cc_version: Critères Communs version 3.1r5
    • cert_id: ANSSI-CC-2023/42
    • cert_link: https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2023_42fr.pdf
    • certification_date: 22.09.2023
    • developer: THALES DIS
    • evaluation_facility: CEA - LETI
    • expiration_date: 22.09.2028
    • level: EAL5+
    • mutual_recognition: CCRA SOG-IS
    • protection_profile: Protection profiles for secure signature creation device : Part 2: Device with key generation, v2.01, BSI-CC-PP-0059-2009-MA-02 Part 3: Device with key import, v1.0.2, BSI-CC-PP-0075-2012-MA-01 Part 4: Extension for device with key generation and trusted channel to certificate generation application, v1.0.1, BSI-CC-PP-0071-2012-MA-01 Part5: Extension for device with key generation and trusted communication with signature-creation application, v1.0.1, BSI-CC-PP-0072-2012-MA-01 Part 6: Extension for device with key import and trusted channel to signature creation application, v1.0.4, BSI-CC-PP-0076-2013-MA-01
    • sponsor: THALES DIS
  • expiration_date: 22.09.2028
  • level: EAL5+
  • product: IAS Classic v5.2.1 with MOC Server v3.1 on MultiApp V5.1 (Versions 5.2.1.A.C et 5.2.1.A.O)
  • sponsor: THALES DIS
  • url: https://cyber.gouv.fr/produits-certifies/ias-classic-v521-moc-server-v31-multiapp-v51-versions-521ac-et-521ao
maintenance_updates
protection_profiles


pdf_data/cert_filename Certificat-CC-2024_03fr.pdf Certificat-CC-2023_42fr.pdf
pdf_data/cert_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2024/03: 2
  • FR:
    • ANSSI-CC-2023/42: 2
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 1
  • BSI:
    • BSI-CC-PP-0059-2009-MA-02: 1
    • BSI-CC-PP-0071-2012-MA-01: 1
    • BSI-CC-PP-0072-2012-MA-01: 1
    • BSI-CC-PP-0075-2012-MA-01: 1
    • BSI-CC-PP-0076-2013-MA-01: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR.1: 1
  • AVA:
    • AVA_VAN.5: 1
  • ALC:
    • ALC_DVS.2: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/cc_claims
  • A:
    • A.C: 1
    • A.O: 1
pdf_data/cert_keywords/eval_facility
  • CEA-LETI:
    • CEA - LETI: 2
pdf_data/cert_metadata
  • /CreationDate: D:20240419102056+02'00'
  • /Creator: Acrobat PDFMaker 23 pour Word
  • /Keywords:
  • /ModDate: D:20240419102224+02'00'
  • /Producer: Adobe PDF Library 23.1.175
  • pdf_file_size_bytes: 149588
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
  • /CreationDate: D:20230929173949+02'00'
  • /Creator: Acrobat PDFMaker 23 pour Word
  • /Keywords:
  • /ModDate: D:20230929174206+02'00'
  • /Producer: Adobe PDF Library 23.1.175
  • pdf_file_size_bytes: 158885
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename ANSSI-CC-2024_03fr.pdf ANSSI-CC-2023_42fr.pdf
pdf_data/report_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2022/21: 1
    • ANSSI-CC-2024/03: 2
  • FR:
    • ANSSI-CC-2023/01: 2
    • ANSSI-CC-2023/31: 3
    • ANSSI-CC-2023/42: 2
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 1
    • BSI-PP-0084-2014: 1
  • BSI:
    • BSI-CC-PP-0059-2009-MA-02: 2
    • BSI-CC-PP-0071-2012-MA-01: 2
    • BSI-CC-PP-0072-2012-MA-01: 2
    • BSI-CC-PP-0075-2012-MA-01: 2
    • BSI-CC-PP-0076-2013-MA-01: 2
  • other:
    • PP-SSCD-: 1
    • PP-SSCD-Part2: 2
    • PP-SSCD-Part3: 2
    • PP-SSCD-Part4: 2
    • PP-SSCD-Part5: 2
    • PP-SSCD-Part6: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR: 1
    • ALC_FLR.1: 2
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.C: 4
    • A.O: 4
pdf_data/report_keywords/vendor
  • Gemalto:
    • Gemalto: 1
pdf_data/report_keywords/eval_facility
  • CESTI:
    • CESTI: 1
  • CEA-LETI:
    • CEA - LETI: 1
  • CESTI:
    • CESTI: 3
pdf_data/report_metadata
pdf_data/st_filename ANSSI-Cible-CC-2024_03en.pdf ANSSI-cible-2023_42en.pdf
pdf_data/st_keywords/cc_cert_id
  • NL:
    • CC-1: 2
    • CC-2: 2
    • CC-3: 3
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0084-2014: 11
    • BSI-CC-PP-0084-: 1
    • BSI-CC-PP-0084-2014: 64
  • BSI:
    • BSI-CC-PP-0059-2009-MA-02: 1
    • BSI-CC-PP-0071-2012-MA-01: 1
    • BSI-CC-PP-0072-2012-MA-01: 1
    • BSI-CC-PP-0075-2012-MA-01: 1
    • BSI-CC-PP-0076-2013-MA-01: 1
    • BSI-CC-PP-0099-V2-2020: 1
  • other:
    • PP-SSCD: 4
    • PP-SSCD-KG: 37
    • PP-SSCD-KI: 28
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 1
    • EAL5: 19
    • EAL5 augmented: 3
    • EAL6: 2
    • EAL6 augmented: 2
  • EAL:
    • EAL 5+: 1
    • EAL5: 3
    • EAL5 augmented: 1
    • EAL5+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.5: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_INT.2: 1
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.4: 1
    • ALC_CMS: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 6
    • ALC_FLR.1: 9
    • ALC_LCD.1: 1
    • ALC_TAT.2: 1
  • ASE:
    • ASE_CCL: 4
    • ASE_CCL.1: 1
    • ASE_ECD: 3
    • ASE_ECD.1: 1
    • ASE_INT: 2
    • ASE_INT.1: 1
    • ASE_OBJ: 12
    • ASE_OBJ.2: 1
    • ASE_REQ: 15
    • ASE_REQ.2: 1
    • ASE_SPD: 5
    • ASE_SPD.1: 1
    • ASE_TSS: 6
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.2: 1
    • ATE_DPT.3: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 6
  • ALC:
    • ALC_DVS.2: 3
  • AVA:
    • AVA_VAN.5: 3
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 2
    • FAU_SAR.1: 11
    • FAU_SAS: 1
    • FAU_SAS.1: 13
  • FCS:
    • FCS_CKM.1: 22
    • FCS_CKM.2: 1
    • FCS_CKM.4: 15
    • FCS_COP.1: 25
    • FCS_RNG: 1
    • FCS_RNG.1: 6
  • FDP:
    • FDP_ACC.1: 36
    • FDP_ACC.2: 2
    • FDP_ACF.1: 26
    • FDP_CKM.2: 1
    • FDP_COP.1: 1
    • FDP_IFC.1: 18
    • FDP_ITC.1: 3
    • FDP_ITC.2: 13
    • FDP_ITT.1: 9
    • FDP_SDC: 1
    • FDP_SDC.1: 7
    • FDP_SDI.2: 10
    • FDP_SMF.1: 2
    • FDP_SMR.1: 1
    • FDP_UCT.1: 8
    • FDP_UIT.1: 8
  • FIA:
    • FIA_API: 1
    • FIA_API.1: 4
    • FIA_UAU.1: 8
    • FIA_UAU.2: 9
    • FIA_UAU.3: 11
    • FIA_UAU.5: 8
    • FIA_UID.1: 12
    • FIA_UID.2: 11
  • FMT:
    • FMT_LIM: 1
    • FMT_LIM.1: 20
    • FMT_LIM.2: 20
    • FMT_MSA.1: 25
    • FMT_MSA.3: 25
    • FMT_MTD.1: 9
    • FMT_SMF.1: 26
    • FMT_SMR.1: 23
  • FPR:
    • FPR_UNL.1: 9
  • FPT:
    • FPT_FLS.1: 15
    • FPT_ITT.1: 9
    • FPT_PHP.3: 9
    • FPT_RPL.1: 11
    • FPT_TDC.1: 10
  • FRU:
    • FRU_FLT.2: 8
  • FTP:
    • FTP_ITC.1: 18
    • FTP_TRP.1: 17
    • FTP_TRP.1.3: 3
  • FAU:
    • FAU_ARP.1: 1
  • FCO:
    • FCO_NRO: 1
  • FCS:
    • FCS_CKM: 59
    • FCS_CKM.1: 10
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 3
    • FCS_CKM.3: 1
    • FCS_CKM.4: 12
    • FCS_CKM.4.1: 2
    • FCS_COP: 35
    • FCS_COP.1: 6
    • FCS_COP.1.1: 2
    • FCS_RNG: 1
    • FCS_RNG.1: 2
  • FDP:
    • FDP_ACC: 55
    • FDP_ACC.1: 27
    • FDP_ACC.1.1: 4
    • FDP_ACF: 43
    • FDP_ACF.1: 9
    • FDP_ACF.1.1: 4
    • FDP_ACF.1.2: 4
    • FDP_ACF.1.3: 4
    • FDP_ACF.1.4: 4
    • FDP_AFC: 1
    • FDP_DAU: 11
    • FDP_DAU.1: 1
    • FDP_DAU.2.1: 1
    • FDP_DAU.2.2: 1
    • FDP_IFC: 2
    • FDP_IFC.1: 9
    • FDP_IFF: 2
    • FDP_ITC: 11
    • FDP_ITC.1: 9
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.2: 8
    • FDP_RIP: 6
    • FDP_RIP.1: 17
    • FDP_RIP.1.1: 1
    • FDP_SDI: 22
    • FDP_SDI.1: 2
    • FDP_SDI.2: 4
    • FDP_UCT: 11
    • FDP_UCT.1: 1
    • FDP_UIT: 10
    • FDP_UIT.1: 2
  • FIA:
    • FIA_AFL: 20
    • FIA_AFL.1: 4
    • FIA_API: 5
    • FIA_API.1: 14
    • FIA_API.1.1: 2
    • FIA_ATD: 2
    • FIA_UAU: 28
    • FIA_UAU.1: 8
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID: 25
    • FIA_UID.1: 14
    • FIA_USB: 1
  • FMT:
    • FMT_LIM: 2
    • FMT_MOF.1: 9
    • FMT_MOF.1.1: 1
    • FMT_MSA: 80
    • FMT_MSA.1: 10
    • FMT_MSA.2: 9
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 15
    • FMT_MSA.4: 3
    • FMT_MTD: 25
    • FMT_MTD.1: 3
    • FMT_SMF: 6
    • FMT_SMF.1: 27
    • FMT_SMF.1.1: 1
    • FMT_SMR: 7
    • FMT_SMR.1: 36
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO: 1
    • FPR_UNO.1: 1
  • FPT:
    • FPT_EMS: 5
    • FPT_EMS.1: 14
    • FPT_EMS.1.1: 4
    • FPT_EMS.1.2: 3
    • FPT_FLS: 6
    • FPT_FLS.1: 13
    • FPT_FLS.1.1: 1
    • FPT_PHP.1: 8
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 11
    • FPT_PHP.3.1: 1
    • FPT_RCV: 2
    • FPT_TST: 2
    • FPT_TST.1: 14
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 42
    • FTP_ITC.1: 16
    • FTP_TRP: 1
    • FTP_TRP.1: 4
pdf_data/st_keywords/cc_claims
  • O:
    • O.ABUSE-FUNC: 3
    • O.ADD-FUNCTIONS: 3
    • O.IDENTIFICATION: 3
    • O.LEAK-: 2
    • O.LEAK-FORCED: 3
    • O.LEAK-INHERENT: 6
    • O.MAC: 13
    • O.MALFUNCTION: 6
    • O.MEM-ACCESS: 3
    • O.PHYS-: 1
    • O.PHYS-MANIPULATION: 5
    • O.PHYS-PROBING: 5
    • O.RND: 6
  • OE:
    • OE.LIM-BLOCK-LOADER: 3
    • OE.LOADER-USAGE: 3
    • OE.PROCESS-SEC-IC: 3
    • OE.RESP-APPL: 3
  • T:
    • T.RND: 3
  • A:
    • A.C: 5
    • A.CAP_FILE: 4
    • A.CGA: 3
    • A.CSP: 3
    • A.O: 5
    • A.SCA: 3
    • A.VERIFICATION: 4
  • O:
    • O.ALARM: 1
    • O.ARRAY_VIEWS_CONFID: 1
    • O.CARD-MANAGEMENT: 1
    • O.CIPHER: 1
    • O.CONFID-OS-UPDATE: 2
    • O.DELETION: 1
    • O.FIREWALL: 1
    • O.GLOBAL_ARRAYS_CONFID: 1
    • O.GLOBAL_ARRAYS_INTEG: 1
    • O.INSTALL: 1
    • O.KEY-MNGT: 1
    • O.LOAD: 1
    • O.NATIVE: 1
    • O.OBJ-DELETION: 1
    • O.OPERATE: 1
    • O.PIN-MNGT: 1
    • O.REALLOCATION: 1
    • O.RESOURCES: 1
    • O.RNG: 1
    • O.SCP: 3
    • O.SECURE_AC_ACTIVATION: 2
    • O.SECURE_LOAD_ACODE: 2
    • O.SID: 1
    • O.TOE_IDENTIFICATION: 1
    • O.TRANSACTION: 1
  • OE:
    • OE.CAP_FILE: 5
    • OE.CARD-MANAGEMENT: 1
    • OE.CODE-EVIDENCE: 5
    • OE.HID_VAD: 3
    • OE.PERSONALISATION: 2
    • OE.PROT_LOGICAL_DATA: 1
    • OE.SCP: 2
    • OE.TERMINAL: 2
    • OE.USER_OBLIGATIONS: 1
    • OE.VERIFICATION: 7
pdf_data/st_keywords/vendor
  • NXP:
    • NXP: 1
  • STMicroelectronics:
    • STMicroelectronics: 11
  • Thales:
    • Thales: 75
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 24
  • DES:
    • 3DES:
      • TDEA: 1
      • TDES: 7
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • CMAC: 5
  • AES_competition:
    • AES:
      • AES: 6
  • DES:
    • 3DES:
      • TDES: 4
    • DES:
      • DES: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 2
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 1
  • FF:
    • DH:
      • DH: 2
      • Diffie-Hellman: 2
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 32
  • MAC:
    • MAC: 3
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 16
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 9
  • TRNG:
    • TRNG: 1
  • RNG:
    • RND: 1
    • RNG: 3
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 7
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 7
  • SCA:
    • Leak-Inherent: 7
    • Physical Probing: 4
    • side-channel: 1
  • other:
    • JIL: 28
  • FI:
    • DFA: 1
    • fault induction: 1
    • fault injection: 1
    • physical tampering: 4
  • SCA:
    • DPA: 1
    • SPA: 1
    • timing attacks: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 30
    • CCMB-2017-04-003: 2
  • FIPS:
    • FIPS 197: 3
  • NIST:
    • NIST SP 800-38A: 3
    • NIST SP 800-38B: 4
    • NIST SP 800-67: 1
    • SP 800-67: 1
  • CC:
    • CCMB-2012-04-003: 1
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS197: 2
  • ICAO:
    • ICAO: 2
  • PKCS:
    • PKCS#1: 2
    • PKCS#3: 3
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • Level. Proximity Check, Virtual Card Architecture, data access of sectors in SL3 or SL1SL3Mix, are out of scope. • Security level 3 (SL3): The card user can access the data and value blocks in the TOE after an: 1
    • Target for composition 12/74 SMD_MFPEV2_ST31N600_ST_22_002 Virtual Card Architecture are also out of scope. Personalization and Originality Check are in scope. • Security level 1 (SL1): Different: 1
    • out of scope: 2
  • OutOfScope:
    • by authorized users. The functionalities of IAS Classic 5.2.1 other than the ones from SSCD are out of scope of the TOE perimeter. For BioPIN (MOC Server v3.1.1 application) provides biometry recognition with: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: feixbeno
  • /CreationDate: D:20240305180700Z
  • /Creator: FrameMaker 17.0.1
  • /CreatorTool: FrameMaker 17.0.1
  • /ModDate: D:20240305182758+01'00'
  • /Producer: Adobe PDF Library 17.0
  • /Title: SMD_MFP_ST31N600_V01_1P.pdf
  • /Trapped: /False
  • pdf_file_size_bytes: 1996053
  • pdf_hyperlinks: http://www.st.com
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 73
  • /Author: Emmanuel BACHIMON
  • /CreationDate: D:20230504155302+02'00'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20230504155302+02'00'
  • /Producer: Microsoft® Word 2016
  • /Title: IAS Classic v5.2 on MultiApp V5.1- Security Target
  • pdf_file_size_bytes: 2282348
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 69
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different