name |
Smart Tachograph G2 on MultiApp V4.0.1 (Versions 2.0.1 G et 2.0.1 H) (EUCC-ANSSI-2025-03-02) |
ST54J / ST54K (A07) (EUCC-ANSSI-2025-03-01) |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
FR |
FR |
status |
active |
active |
not_valid_after |
31.03.2030 |
31.03.2030 |
not_valid_before |
31.03.2025 |
31.03.2025 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-EUCC-2025_03_02fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat_EUCC_2025_03_01fr.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/EUCC-ANSSI-2025_03_02fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/EUCC-ANSSI-2025_03_01fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Cible-EUCC-ANSSI-2025_03_02en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Cible-EUCC-ANSSI-2025_01en.pdf |
manufacturer |
THALES DIS FRANCE SA |
STMicroelectronics |
manufacturer_web |
https://www.thalesgroup.com/en/europe/france |
https://www.st.com/ |
security_level |
ATE_DPT.3, ALC_DVS.2, EAL4+, AVA_VAN.5 |
ALC_DVS.2, EAL5+, ALC_FLR.2, AVA_VAN.5 |
dgst |
d85844122a167bac |
3e57eef81fcac2f1 |
heuristics/cert_id |
ANSSI-CC-2025/03 |
ANSSI-CC-2025/03 |
heuristics/cert_lab |
[] |
SERMA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
AGD_PRE.1, ALC_FLR.1, ATE_FUN.1, AVA_VAN.5, ALC_DEL.1, ATE_DPT.3, ADV_FSP.4, ALC_DVS.2, ADV_ARC.1, ADV_TDS.3, AGD_OPE.1, ADV_IMP.1 |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.4, ALC_TAT.2, ALC_FLR.2, ASE_REQ.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
2.0.1, 4.0.1 |
01, 2025, 03 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
d9ddf0d150631fef |
cf0f01bcd7be3e9c |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0091b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf |
pdf_data/cert_filename |
Certificat-EUCC-2025_03_02fr.pdf |
Certificat_EUCC_2025_03_01fr.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
- ALC:
- ALC_DVS.2: 1
- ALC_FLR.2: 2
- AVA:
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
EUCC-ANSSI-2025_03_02fr.pdf |
EUCC-ANSSI-2025_03_01fr.pdf |
pdf_data/report_frontpage |
|
- FR:
- cc_security_level: Elevé / EAL5 augmenté ALC_DVS.2, ALC_FLR.2, AVA_VAN.5 Référence du rapport d’évaluation Evaluation Technical Report PEACOCK A07 Project référence PEACOCK_A07_2024_ETR_v1.1 version 1.1 11 février 2025. Fonctionnalité de sécurité du produit voir 2.2.2 Services de sécurité Résumé des menaces Inherent Information Leakage Physical Probing Malfunction due to Environmental Stress Physical Manipulation Forced Information Leakage R a p p o r t d e c e r t i f i c a t i o n E U C C - A N S S I - 2 0 2 5 - 0 3 - 0 1 S T 5 4 J / S T 5 4 K ( A 0 7 ) A N S S I - C C - C E R - F - 0 7 _ v 3 1 . 9 P a g e 6 s u r 1 7 Abuse of Functionality Deficiency of Random Numbers Masquerade the TOE Memory Access Violation Diffusion of open samples (voir chapitre 3 [ST]) Exigences de configuration du produit voir 4.2 Restrictions d’usage Hypothèses liées à l’environnement d’exploitation voir 4.2 Restrictions d’usage
- cc_version: ISO/IEC 15408-1:2009, 15408-2:2008 15408-3:2008 (Critères Communs version 3.1 révision 5) ISO/IEC 18045:2008 (CEM version 3.1 révision 5
- cert_id: EUCC-ANSSI-2025-03-01
- cert_item: ST54J / ST54K
- cert_item_version: A07 Type de produit Cartes à puce et dispositifs similaires
- cert_lab: SERMA SAFETY & SECURITY 14 rue Galilée, CS 10071, 33608 Pessac Cedex, France Marque EUCC
- developer: STMICROELECTRONICS 190 Avenue Celestin Coq, 13106 Rousset, France Commanditaire STMICROELECTRONICS 190 Avenue Celestin Coq, 13106 Rousset, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur (.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: Security IC Platform Protection Profile with Augmentation Packages, version 1.0 certifié BSI-CC-PP-0084-2014 le 19 février 2014 avec conformité aux packages : “Authentication of the security IC” “Loader dedicated for usage in Secured Environment only” “Loader dedicated for usage by authorized users only
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0891-V7-2024: 1
- FR:
|
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0091-2017: 2
- BSI-PP-0084-2014: 1
|
- BSI:
- BSI-CC-PP-0084-2014: 1
- BSI-PP-0084-2014: 1
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
- ALC:
- ALC_DVS.2: 1
- ALC_FLR: 1
- ALC_FLR.2: 2
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
- Infineon:
- Infineon: 2
- Infineon Technologies AG: 1
- Thales:
- Thales: 8
- Thales Group: 1
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- ISO:
|
- BSI:
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- ISO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename |
Cible-EUCC-ANSSI-2025_03_02en.pdf |
Cible-EUCC-ANSSI-2025_01en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0891-V7-2024: 1
- NL:
|
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP- 0084-2014: 1
- BSI-CC-PP-0091-2017: 1
|
- BSI:
- BSI-CC-PP- 0084-2014: 10
- BSI-CC-PP-0084-: 2
- BSI-CC-PP-0084-2014: 64
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL4: 7
- EAL4 augmented: 2
- EAL6: 2
- EAL6 augmented: 2
- EAL6+: 1
|
- EAL:
- EAL 5: 1
- EAL 5 augmented: 1
- EAL4: 1
- EAL5: 17
- EAL5 augmented: 1
- EAL5+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 3
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_DEL.1: 3
- ALC_DVS: 2
- ALC_DVS.2: 3
- ALC_FLR.1: 1
- ASE:
- ATE:
- ATE_DPT: 2
- ATE_DPT.1: 1
- ATE_DPT.2: 2
- ATE_FUN.1: 2
- AVA:
|
- ADV:
- ADV_ARC: 2
- ADV_ARC.1: 2
- ADV_FSP: 4
- ADV_FSP.5: 3
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 3
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.4: 1
- ALC_CMS: 1
- ALC_CMS.5: 1
- ALC_DEL: 3
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.2: 4
- ALC_FLR.2: 6
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ASE:
- ASE_CCL: 4
- ASE_CCL.1: 1
- ASE_ECD: 4
- ASE_ECD.1: 1
- ASE_INT: 2
- ASE_INT.1: 1
- ASE_OBJ: 11
- ASE_OBJ.2: 1
- ASE_REQ: 30
- ASE_REQ.2: 1
- ASE_SPD: 8
- ASE_SPD.1: 1
- ASE_TSS: 7
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 3
- ATE_COV.2: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_ARP.1: 9
- FAU_ARP.1.1: 1
- FAU_GEN.1: 4
- FAU_SAA.1: 9
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 1
- FAU_SAS.1: 1
- FCO:
- FCO_NRO.1: 7
- FCO_NRO.1.1: 1
- FCO_NRO.1.2: 1
- FCO_NRO.1.3: 1
- FCS:
- FCS_CKM: 16
- FCS_CKM.1: 35
- FCS_CKM.1.1: 5
- FCS_CKM.2: 13
- FCS_CKM.2.1: 4
- FCS_CKM.4: 31
- FCS_CKM.4.1: 3
- FCS_COP: 17
- FCS_COP.1: 41
- FCS_RNG: 4
- FCS_RNG.1: 14
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC: 7
- FDP_ACC.1: 11
- FDP_ACC.2: 16
- FDP_ACF: 1
- FDP_ACF.1: 15
- FDP_DAU.1: 8
- FDP_DAU.1.1: 1
- FDP_ETC: 1
- FDP_ETC.1: 7
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_ETC.2: 5
- FDP_ETC.2.1: 1
- FDP_ETC.2.2: 1
- FDP_ETC.2.3: 1
- FDP_ETC.2.4: 1
- FDP_IFC.1: 8
- FDP_ITC.1: 23
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 22
- FDP_ITC.2.1: 1
- FDP_ITC.2.2: 1
- FDP_ITC.2.3: 1
- FDP_ITC.2.4: 1
- FDP_ITC.2.5: 1
- FDP_MSA.3: 1
- FDP_RIP.1: 8
- FDP_RIP.1.1: 1
- FDP_SDI.2: 10
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FIA:
- FIA_AFL: 3
- FIA_AFL.1: 16
- FIA_AFL.1.1: 3
- FIA_AFL.1.2: 3
- FIA_ATD.1: 9
- FIA_ATD.1.1: 1
- FIA_SOS.2: 1
- FIA_UAU.1: 20
- FIA_UAU.1.1: 2
- FIA_UAU.3: 8
- FIA_UAU.3.1: 1
- FIA_UAU.3.2: 1
- FIA_UAU.4: 6
- FIA_UAU.4.1: 1
- FIA_UID: 1
- FIA_UID.1: 4
- FIA_UID.2: 7
- FIA_UID.2.1: 1
- FIA_USB.1: 6
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_LIM.1: 1
- FMT_LIM.2: 1
- FMT_MSA.1: 1
- FMT_MSA.3: 5
- FMT_SMF.1: 1
- FPR:
- FPR_UNO.1: 8
- FPR_UNO.1.1: 1
- FPT:
- FPT_EMS: 7
- FPT_EMS.1: 11
- FPT_EMS.1.1: 2
- FPT_EMS.1.2: 2
- FPT_FLS.1: 11
- FPT_FLS.1.1: 1
- FPT_ITC.1: 4
- FPT_PHP: 1
- FPT_PHP.3: 14
- FPT_PHP.3.1: 1
- FPT_TDC: 4
- FPT_TDC.1: 14
- FPT_TST.1: 10
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FRU:
- FTP:
- FTP_ITC: 2
- FTP_ITC.1: 16
- FTP_TRP.1: 1
|
- FAU:
- FAU_GEN.1: 8
- FAU_SAR.1: 25
- FAU_SAS: 2
- FAU_SAS.1: 28
- FCS:
- FCS_CKM.1: 2
- FCS_CKM.4: 4
- FCS_COP.1: 17
- FCS_RNG: 2
- FCS_RNG.1: 6
- FDP:
- FDP_ACC.1: 23
- FDP_ACC.2: 12
- FDP_ACF: 1
- FDP_ACF.1: 28
- FDP_IFC.1: 17
- FDP_ITC.1: 2
- FDP_ITC.2: 2
- FDP_ITT.1: 10
- FDP_SDC: 2
- FDP_SDC.1: 8
- FDP_SDI.2: 14
- FDP_SMF.1: 2
- FDP_SMR.1: 1
- FDP_UCT.1: 16
- FDP_UIT.1: 16
- FIA:
- FIA_API: 2
- FIA_API.1: 6
- FIA_UAU.1: 14
- FIA_UID.1: 16
- FMT:
- FMT_LIM: 2
- FMT_LIM.1: 29
- FMT_LIM.2: 30
- FMT_MSA.1: 26
- FMT_MSA.3: 26
- FMT_SMF.1: 21
- FMT_SMR.1: 17
- FPT:
- FPT_FLS.1: 22
- FPT_ITT.1: 9
- FPT_PHP.3: 11
- FRU:
- FTP:
- FTP_ITC.1: 27
- FTP_TRP.1: 2
|
pdf_data/st_keywords/cc_claims |
|
- O:
- O.C: 4
- O.RND: 4
- O.TOE-: 1
- R:
- T:
|
pdf_data/st_keywords/vendor |
- Gemalto:
- Infineon:
- Thales:
|
- Infineon:
- Philips:
- STMicroelectronics:
- Samsung:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
- AES_competition:
- AES:
- AES: 17
- AES-128: 1
- AES-192: 1
- AES-256: 1
- DES:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-2: 4
- SHA-224: 1
- SHA-256: 1
- SHA-384: 2
- SHA-512: 2
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- Brainpool:
- brainpoolP256r1: 1
- brainpoolP384r1: 1
- brainpoolP512r1: 1
- NIST:
- NIST P-256: 1
- NIST P-384: 1
- NIST P-521: 1
- P-256: 1
- P-384: 1
- P-521: 1
- secp256r1: 1
- secp384r1: 1
- secp521r1: 1
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- DFA: 1
- Malfunction: 3
- malfunction: 2
- SCA:
- DPA: 2
- Leak-Inherent: 2
- Physical Probing: 2
- SPA: 2
- Side channel: 1
- physical probing: 7
- timing attacks: 2
|
- FI:
- Malfunction: 13
- malfunction: 2
- physical tampering: 1
- SCA:
- Leak-Inherent: 14
- Physical Probing: 4
- physical probing: 3
- side channel: 2
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- FIPS:
- FIPS PUB 180-4: 1
- FIPS PUB 186-4: 1
- FIPS PUB 197: 1
- FIPS180-4: 3
- PKCS:
- SCP:
- SCP01: 3
- SCP02: 2
- SCP03: 3
|
- BSI:
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 23
- CCMB-2017-04-003: 2
- FIPS:
- ISO:
- ISO/IEC 14888: 2
- ISO/IEC 7816-3: 1
- ISO/IEC 9796: 1
- ISO/IEC 9796-2: 1
- NIST:
- NIST SP 800-38A: 2
- NIST SP 800-67: 3
- SP 800-38A: 2
- SP 800-67: 1
- PKCS:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
- javacard:
- javacard.lang: 1
- javacard.security: 1
- javacardx:
- javacardx.apdu: 1
- javacardx.crypto: 1
- org:
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- The ST54J_SE is in the scope of this evaluation, while the ST54J_CLF and the ST54J_IOs are out of scope of this evaluation: 1
- The ST54J_SE is in the scope of this evaluation, while the ST54J_CLF and the ST54J_IOs are out of scope of this evaluation. 19 In the following, the TOE is denoted by “ST54J/K A07” or “TOE”. 20 Figure 1: 1
- ES) is in User NVM. 45 Note: The ES is not part of the TOE and is out of scope of the evaluation: 1
- Security IC Embedded Software (ES) is in User NVM. 45 Note: The ES is not part of the TOE and is out of scope of the evaluation. 1.6.3 TOE documentation 46 The user guidance documentation, part of the TOE: 1
- out of scope: 2
|
pdf_data/st_metadata |
- /Author: OHAYON Franck
- /CreationDate: D:20250206144408+01'00'
- /Creator: Microsoft® Word for Microsoft 365
- /Keywords: Security Target, CC, Tacho
- /ModDate: D:20250206144408+01'00'
- /Producer: Microsoft® Word for Microsoft 365
- /Title: Tachographe V2 Security Target
- pdf_file_size_bytes: 1543692
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 83
|
- /CreationDate: D:20250401102813+02'00'
- /Creator: FrameMaker 17.0.1
- /Keywords:
- /ModDate: D:20250401102813+02'00'
- /Producer: Adobe PDF Library 17.0
- pdf_file_size_bytes: 1623496
- pdf_hyperlinks: http://www.st.com
- pdf_is_encrypted: False
- pdf_number_of_pages: 80
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |