name |
Plateforme Java Card en configuration ouverte de la carte à puce MultiApp v3.1 masquée sur le composant P60D144PVA (version du patch: 1.3) |
Plateforme ouverte Java Card MultiApp V4.1 en configuration ouverte masquée sur le composant S3FT9MH(Version 4.1.0.2) ( ANSSI-CC-2023/30 ) |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
FR |
FR |
status |
archived |
active |
not_valid_after |
31.08.2020 |
14.12.2028 |
not_valid_before |
31.08.2015 |
14.12.2023 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2023_30fr.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_15.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_30fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi_cible_2015_15_LITE.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-2023_30en.pdf |
manufacturer |
Gemalto / NXP Semiconductors |
THALES DIS FRANCE SA |
manufacturer_web |
https://www.gemalto.com/ |
https://www.thalesgroup.com/en/europe/france |
security_level |
AVA_VAN.5, ALC_DVS.2, EAL5+ |
AVA_VAN.5, ALC_DVS.2, EAL5+ |
dgst |
d89399d5b767d996 |
8bf786600723d853 |
heuristics/cert_id |
ANSSI-CC-2015/15 |
ANSSI-CC-2023/30 |
heuristics/cert_lab |
SERMA |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_CMS.5, ATE_FUN.1, ADV_IMP.1, ASE_TSS.2, ATE_DPT.3, ALC_FLR.1, AGD_PRE.1, ALC_DVS.2, AVA_VAN.5, ATE_COV.2, ALC_TAT.2, ADV_INT.2, ALC_CMC.4, ADV_FSP.5, ADV_ARC.1, ALC_DEL.1, AGD_OPE.1, ALC_LCD.1, ADV_TDS.4, ATE_IND.2 |
ADV_FSP.5, AGD_PRE.1, ADV_ARC.1, ATE_COV.2, ATE_FUN.1, ALC_DEL.1, ADV_IMP.1, ATE_IND.2, ALC_TAT.2, ALC_LCD.1, ATE_DPT.3, ADV_TDS.4, ALC_DVS.2, AGD_OPE.1, ADV_INT.2, AVA_VAN.5, ALC_CMC.4 |
heuristics/extracted_versions |
3.1, 1.3 |
4.1, 4.1.0.2 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
ANSSI-CC-2016/03, ANSSI-CC-2015/41, ANSSI-CC-2015/37, ANSSI-CC-2015/39, ANSSI-CC-2016/04, ANSSI-CC-2015/38, ANSSI-CC-2015/40 |
ANSSI-CC-2023/57, ANSSI-CC-2023/55, ANSSI-CC-2019/31-R01, ANSSI-CC-2023/56, ANSSI-CC-2023/54 |
heuristics/report_references/directly_referencing |
ANSSI-CC-2014/86, BSI-DSZ-CC-0845-V2-2013 |
ANSSI-CC-2023/20 |
heuristics/report_references/indirectly_referenced_by |
ANSSI-CC-2016/03, ANSSI-CC-2015/41, ANSSI-CC-2015/37, ANSSI-CC-2015/39, ANSSI-CC-2016/04, ANSSI-CC-2015/38, ANSSI-CC-2015/40 |
ANSSI-CC-2023/57, ANSSI-CC-2023/55, ANSSI-CC-2019/31-R01, ANSSI-CC-2023/56, ANSSI-CC-2023/54 |
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-0666-2012, ANSSI-CC-2014/86, BSI-DSZ-CC-0837-2013, BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0845-2012, BSI-DSZ-CC-0845-V2-2013, ANSSI-CC-2014/06, BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0640-2010 |
ANSSI-CC-2023/20 |
heuristics/scheme_data |
- cert_id: ANSSI-CC-2015/15
- description: La certificationporte sur la plateforme ouverte Java Card du produit « MultiApp v3.1 » qui est une carte à puce pouvant être en mode contact ou sans contact. Le produit est développé par la société GEMALTO et embarqué sur le microcontrôleur P60D144PVA fabriqué par la société NXP SEMICONDUCTORS. La plateforme ouverte Java Card est destinée à fournir des services de sécurité aux applets qui sero
- developer: Gemalto / NXP Semiconductors
- enhanced:
- level: EAL5+
- product: Plateforme Java Card en configuration ouverte de la carte à puce MultiApp v3.1 masquée sur le composant P60D144PVA
- sponsor: Gemalto
- url: https://cyber.gouv.fr/produits-certifies/plateforme-java-card-en-configuration-ouverte-de-la-carte-puce-multiapp-v31-0
|
- cert_id: ANSSI-CC-2023/30
- description: Le produit évalué est la « Plateforme ouverte Java Card MultiApp V4.1 en configuration ouverte masquée sur le composant S3FT9MH, Version 4.1.0.2 » développé par THALES DIS FRANCE SAS et par SAMSUNG ELECTRONICS CO.
- developer: THALES DIS FRANCE SAS / SAMSUNG ELECTRONICS CO.
- enhanced:
- augmented: ALC_DVS.2, AVA_VAN.5
- category: Cartes à puce
- cc_version: Critères Communs version 3.1r5
- cert_id: ANSSI-CC-2023/30
- certification_date: 14.12.2023
- developer: THALES DIS FRANCE SAS / SAMSUNG ELECTRONICS CO.
- evaluation_facility: SERMA SAFETY & SECURITY
- expiration_date: 14.12.2028
- level: EAL5+
- mutual_recognition: CCRA SOG-IS
- protection_profile: Java Card System Protection Profile – Open Configuration, version 3, certifié ANSSI-PP-2010-03 en mai 2012
- sponsor: THALES DIS France SAS
- expiration_date: 14.12.2028
- level: EAL5+
- product: Plateforme ouverte Java Card MultiApp V4.1 en configuration ouverte masquée sur le composant S3FT9MH (Version 4.1.0.2)
- sponsor: THALES DIS France SAS
- url: https://cyber.gouv.fr/produits-certifies/plateforme-ouverte-java-card-multiapp-v41-en-configuration-ouverte-masquee-sur-2
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
BSI-DSZ-CC-0845-V2-2013 |
ANSSI-CC-2023/20 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
BSI-DSZ-CC-0845-V2-2013 |
ANSSI-CC-2023/20 |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
|
Certificat-CC-2023_30fr.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /CreationDate: D:20231220095051+01'00'
- /Creator: Acrobat PDFMaker 23 pour Word
- /Keywords:
- /ModDate: D:20231220095051+01'00'
- /Producer: Adobe PDF Library 23.1.175
- pdf_file_size_bytes: 158013
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
ANSSI-CC-2015_15.pdf |
ANSSI-CC-2023_30fr.pdf |
pdf_data/report_frontpage |
- FR:
- cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 4
- cert_id: ANSSI-CC-2015/15
- cert_item: Plateforme Java Card en configuration ouverte de la carte à puce MultiApp v3.1 masquée sur le composant P60D144PVA
- cert_item_version: Version de la plateforme Java Card MultiApp : 3.1 Version du patch : 1.3
- cert_lab: Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
- developer: Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France NXP Semiconductors Box 54 02 40, D-22502 Hambourg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: ANSSI-CC-PP-2010/03-M01 [PP JCS] Java Card System – Open Configuration, version 3.0
|
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0845-V2-2013: 3
- FR:
- ANSSI-CC-2014/86: 2
- ANSSI-CC-2015/15: 22
- ANSSI-CC-PP-2010/03-M01: 2
|
- FR:
- ANSSI-CC-2023/20: 1
- ANSSI-CC-2023/30: 2
- ANSSI-CC-PP-2010/03-M01: 1
- ANSSI-PP-2010-03: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
- ANSSI:
- ANSSI-CC-PP-2010/03-M01: 2
- BSI:
- BSI-PP-0035-: 1
- BSI-PP-0035-2007: 2
|
- ANSSI:
- ANSSI-CC-PP-2010/03-M01: 1
- BSI:
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 1
- EAL4: 2
- EAL6: 1
- EAL7: 1
- ITSEC:
|
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_FLR.1: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
- Gemalto:
- NXP:
- NXP: 4
- NXP Semiconductors: 1
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- SCP:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
- com:
- com.gemalto.javacardx.pace: 1
- javacardx:
|
- com:
- com.gemalto: 1
- com.gemalto.javacard.eid: 1
- com.gemalto.javacard.esign: 1
- com.gemalto.javacard.iasclassic: 1
- com.gemalto.javacard.mspnp: 1
- com.gemalto.mchipadv: 1
- com.gemalto.moc.server: 1
- com.gemalto.mpcos: 1
- com.gemalto.pure: 1
- com.gemalto.puredi: 1
- com.visa.vsdc: 1
- javacard:
- javacard.eid: 1
- javacard.esign: 1
- javacard.iasclassic: 1
- javacard.mspnp: 1
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: Beatrice Duquesnoy
- /CreationDate: D:20150908144903+02'00'
- /Creator: Microsoft® Word 2010
- /Keywords: ANSSI-CC-CER-F-07.016
- /ModDate: D:20150908144903+02'00'
- /Producer: Microsoft® Word 2010
- /Subject: Plateforme Java Card en configuration ouverte de la carte à puce MultiApp v3.1 masquée sur le composant P60D144PVA
- /Title: ANSSI-CC-2015/15
- pdf_file_size_bytes: 731454
- pdf_hyperlinks: mailto:[email protected], http://www.ssi.gouv.fr/
- pdf_is_encrypted: False
- pdf_number_of_pages: 21
|
|
pdf_data/st_filename |
anssi_cible_2015_15_LITE.pdf |
ANSSI-cible-2023_30en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0845-V2-2013: 2
- NL:
|
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0055: 1
- BSI-CC-PP-0059-2009-MA-01: 1
- BSI-CC-PP-0075-2012: 1
- BSI-PP-0005: 1
- BSI-PP-0006: 1
- BSI-PP-0035: 1
- other:
- PP-SSCD-KG: 2
- PP-SSCD-KI: 2
- PP-SSCD-T2: 2
- PP-SSCD-T3: 2
|
- BSI:
- BSI-CC-PP- 0068-V2-2011-MA-01: 1
- BSI-CC-PP-0084-: 1
- BSI-PP- 0055-2009: 1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 6+: 1
- EAL5: 6
- EAL5 augmented: 2
- EAL5+: 1
|
- EAL:
- EAL 6+: 1
- EAL5: 7
- EAL5 augmented: 2
- EAL5+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 10
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 2
- ADV_FSP.4: 2
- ADV_FSP.5: 6
- ADV_IMP: 1
- ADV_IMP.1: 9
- ADV_INT.2: 3
- ADV_TDS: 1
- ADV_TDS.1: 2
- ADV_TDS.3: 4
- ADV_TDS.4: 8
- AGD:
- AGD_OPE.1: 9
- AGD_PRE: 1
- AGD_PRE.1: 7
- ALC:
- ALC_CMC.4: 3
- ALC_CMS.5: 2
- ALC_DEL.1: 3
- ALC_DVS.1: 2
- ALC_DVS.2: 9
- ALC_LCD.1: 5
- ALC_TAT.1: 2
- ALC_TAT.2: 5
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 4
- ATE_DPT.1: 2
- ATE_DPT.3: 3
- ATE_FUN.1: 9
- ATE_IND.2: 4
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 9
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 2
- ADV_FSP.4: 2
- ADV_FSP.5: 4
- ADV_IMP: 1
- ADV_IMP.1: 7
- ADV_INT.2: 1
- ADV_TDS: 1
- ADV_TDS.1: 2
- ADV_TDS.3: 4
- ADV_TDS.4: 7
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 7
- AGD_PRE: 1
- AGD_PRE.1: 6
- ALC:
- ALC_CMC.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 2
- ALC_DVS.2: 7
- ALC_LCD.1: 3
- ALC_TAT.1: 2
- ALC_TAT.2: 3
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 2
- ATE_DPT.1: 2
- ATE_DPT.3: 1
- ATE_FUN.1: 6
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_ARP.1: 15
- FAU_ARP.1.1: 1
- FAU_SAA.1: 2
- FCO:
- FCS:
- FCS_CKM.1: 21
- FCS_CKM.1.1: 1
- FCS_CKM.2: 8
- FCS_CKM.2.1: 1
- FCS_CKM.3: 7
- FCS_CKM.3.1: 1
- FCS_CKM.4: 15
- FCS_CKM.4.1: 1
- FCS_COP.1: 19
- FCS_COP.1.1: 1
- FCS_RND: 7
- FCS_RND.1: 12
- FCS_RND.1.1: 2
- FCS_RNG.1: 1
- FDP:
- FDP_ACC: 40
- FDP_ACC.1: 13
- FDP_ACC.2: 6
- FDP_ACF: 33
- FDP_ACF.1: 16
- FDP_IFC: 24
- FDP_IFC.1: 12
- FDP_IFC.2: 2
- FDP_IFF: 17
- FDP_IFF.1: 12
- FDP_ITC: 12
- FDP_ITC.1: 4
- FDP_ITC.2: 9
- FDP_RIP: 85
- FDP_RIP.1: 10
- FDP_ROL: 14
- FDP_ROL.1: 2
- FDP_SDI.2: 9
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UIT: 7
- FDP_UIT.1: 2
- FIA:
- FIA_ATD: 9
- FIA_ATD.1: 2
- FIA_SOS.2: 1
- FIA_UAI.1: 1
- FIA_UAU: 7
- FIA_UAU.1: 1
- FIA_UID: 14
- FIA_UID.1: 10
- FIA_UID.2: 1
- FIA_USB: 8
- FIA_USB.1: 3
- FMT:
- FMT_MSA: 91
- FMT_MSA.1: 11
- FMT_MSA.2: 1
- FMT_MSA.3: 15
- FMT_MTD: 18
- FMT_MTD.1: 3
- FMT_MTD.3: 1
- FMT_SMF: 33
- FMT_SMF.1: 9
- FMT_SMR: 47
- FMT_SMR.1: 22
- FPR:
- FPR_UNO: 7
- FPR_UNO.1: 10
- FPR_UNO.1.1: 1
- FPT:
- FPT_FLS: 46
- FPT_FLS.1: 5
- FPT_ITT: 7
- FPT_ITT.1: 1
- FPT_PHP: 7
- FPT_PHP.3: 2
- FPT_RCV: 16
- FPT_RCV.3: 4
- FPT_RCV.4: 2
- FPT_TDC.1: 9
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST: 7
- FPT_TST.1: 3
- FTP:
- FTP_ITC: 9
- FTP_ITC.1: 5
- FTP_TRP.1: 2
|
- FAU:
- FAU_ARP.1: 13
- FAU_ARP.1.1: 1
- FAU_SAA.1: 2
- FCO:
- FCS:
- FCS_CKM: 46
- FCS_CKM.1: 29
- FCS_CKM.1.1: 3
- FCS_CKM.2: 9
- FCS_CKM.2.1: 1
- FCS_CKM.3: 5
- FCS_CKM.3.1: 1
- FCS_CKM.4: 23
- FCS_CKM.4.1: 2
- FCS_COP: 35
- FCS_COP.1: 22
- FCS_COP.1.1: 5
- FCS_RND: 17
- FCS_RND.1: 7
- FCS_RND.1.1: 3
- FDP:
- FDP_ACC: 35
- FDP_ACC.1: 14
- FDP_ACC.2: 6
- FDP_ACF: 29
- FDP_ACF.1: 16
- FDP_IFC: 20
- FDP_IFC.1: 12
- FDP_IFC.2: 2
- FDP_IFF: 13
- FDP_IFF.1: 12
- FDP_ITC: 10
- FDP_ITC.1: 12
- FDP_ITC.2: 17
- FDP_RIP: 83
- FDP_RIP.1: 10
- FDP_RIP.1.1: 1
- FDP_ROL: 13
- FDP_ROL.1: 2
- FDP_SDI.2: 7
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UIT: 5
- FDP_UIT.1: 2
- FIA:
- FIA_AFL: 21
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_ATD: 7
- FIA_ATD.1: 2
- FIA_SOS.2: 1
- FIA_UAU: 53
- FIA_UAU.1: 6
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UAU.4: 1
- FIA_UAU.4.1: 1
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6.1: 1
- FIA_UID: 33
- FIA_UID.1: 18
- FIA_UID.1.1: 2
- FIA_UID.1.2: 2
- FIA_UID.2: 1
- FIA_USB: 6
- FIA_USB.1: 3
- FMT:
- FMT_LIM: 18
- FMT_LIM.1: 15
- FMT_LIM.1.1: 3
- FMT_LIM.2: 14
- FMT_LIM.2.1: 3
- FMT_MSA: 69
- FMT_MSA.1: 11
- FMT_MSA.2: 1
- FMT_MSA.3: 15
- FMT_MTD: 31
- FMT_MTD.1: 9
- FMT_MTD.3: 1
- FMT_SMF: 50
- FMT_SMF.1: 17
- FMT_SMF.1.1: 2
- FMT_SMR: 63
- FMT_SMR.1: 27
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FPR:
- FPR_UNO: 5
- FPR_UNO.1: 9
- FPR_UNO.1.1: 1
- FPT:
- FPT_EMS: 4
- FPT_EMS.1: 12
- FPT_EMS.1.1: 3
- FPT_EMS.1.2: 3
- FPT_FLS: 36
- FPT_FLS.1: 13
- FPT_FLS.1.1: 1
- FPT_ITT: 5
- FPT_ITT.1: 1
- FPT_PHP: 5
- FPT_PHP.3: 12
- FPT_PHP.3.1: 1
- FPT_RCV: 12
- FPT_RCV.3: 4
- FPT_RCV.4: 2
- FPT_TDC.1: 7
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST: 7
- FPT_TST.1: 12
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 14
- FTP_ITC.1: 5
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 2
|
pdf_data/st_keywords/cc_claims |
- A:
- A.APPLET: 5
- A.DELETION: 5
- A.VERIFICATION: 4
- D:
- D.API_DATA: 3
- D.APP_CODE: 6
- D.APP_C_DATA: 3
- D.APP_I_DATA: 4
- D.CRYPTO: 5
- D.JCS_CODE: 3
- D.JCS_DATA: 5
- D.PIN: 4
- D.SEC_DATA: 7
- O:
- O.ALARM: 15
- O.APPLET: 28
- O.CARD-MANAGEMENT: 3
- O.CARD_MANAGEMENT: 18
- O.CIPHER: 10
- O.CODE_PCKG: 16
- O.CODE_PKG: 7
- O.DELETION: 8
- O.FIREWALL: 12
- O.GLOBAL_ARRAYS_CO: 3
- O.GLOBAL_ARRAYS_CONFID: 6
- O.GLOBAL_ARRAYS_INT: 3
- O.GLOBAL_ARRAYS_INTEG: 5
- O.HW_AES: 2
- O.INSTALL: 11
- O.JAVAOBJECT: 56
- O.KEY-: 1
- O.KEY-MNGT: 5
- O.KEY_MNGT: 4
- O.LOAD: 6
- O.NATIVE: 11
- O.OBJ-DELETION: 4
- O.OPERATE: 15
- O.PIN-: 1
- O.PIN-MNGT: 5
- O.REALLOCATION: 5
- O.RESOURCES: 9
- O.RND: 13
- O.SCP: 36
- O.SID: 13
- O.TRANSACTION: 6
- OE:
- OE.APPLET: 4
- OE.CARD-MANAGEMENT: 1
- OE.CODE-EVIDENCE: 10
- OE.CODE_EVIDENCE: 1
- OE.SCP: 6
- OE.VERIFICATION: 25
- OP:
- OP.ARRAY_ACCESS: 6
- OP.CREATE: 10
- OP.DELETE_APPLET: 6
- OP.DELETE_PCKG: 4
- OP.DELETE_PCKG_APPLET: 4
- OP.INSTANCE_FIELD: 6
- OP.INVK_INTERFACE: 10
- OP.INVK_VIRTUAL: 8
- OP.JAVA: 8
- OP.PUT: 7
- OP.THROW: 7
- OP.TYPE_ACCESS: 7
- OSP:
- OSP: 1
- OSP.RND: 3
- OSP.RNG: 1
- OSP.VERIFICATION: 4
- R:
- T:
- T.CONFID-APPLI-DATA: 4
- T.CONFID-JCS-CODE: 4
- T.CONFID-JCS-DATA: 4
- T.DELETION: 3
- T.EXE-CODE: 8
- T.INSTALL: 4
- T.INTEG-APPLI-CODE: 7
- T.INTEG-APPLI-DATA: 8
- T.INTEG-JCS-CODE: 3
- T.INTEG-JCS-DATA: 4
- T.NATIVE: 4
- T.OBJ-DELETION: 4
- T.PHYSICAL: 4
- T.RESOURCES: 3
- T.SID: 8
|
- A:
- A.APPLET: 5
- A.VERIFICATION: 4
- D:
- D.API_DATA: 3
- D.APP_CODE: 6
- D.APP_C_DATA: 3
- D.APP_I_DATA: 4
- D.BIO: 1
- D.CRYPTO: 5
- D.JCS_CODE: 3
- D.JCS_DATA: 5
- D.PIN: 4
- D.SEC_DATA: 7
- O:
- O.AES: 1
- O.ALARM: 14
- O.APPLET: 28
- O.BIO-MNGT: 5
- O.CARD-MANAGEMENT: 2
- O.CARD_MANAGEMENT: 16
- O.CIPHER: 9
- O.CODE_PCKG: 16
- O.CODE_PKG: 7
- O.DELETION: 6
- O.FIREWALL: 12
- O.GLOBAL_ARRAYS_CONFID: 8
- O.GLOBAL_ARRAYS_INTEG: 5
- O.INSTALL: 9
- O.JAVAOBJECT: 56
- O.KEY-MNGT: 6
- O.KEY_MNGT: 2
- O.LOAD: 7
- O.NATIVE: 10
- O.OBJ-DELETION: 4
- O.OBJ_DELETION: 1
- O.OPERATE: 15
- O.PIN-: 1
- O.PIN-MNGT: 5
- O.REALLOCATION: 5
- O.RESOURCES: 8
- O.RND: 12
- O.SCP: 28
- O.SID: 12
- O.TDES: 1
- O.TRANSACTION: 6
- OE:
- OE.APPLET: 4
- OE.CODE-EVIDENCE: 10
- OE.VERIFICATION: 25
- OP:
- OP.ARRAY_ACCESS: 6
- OP.CREATE: 10
- OP.DELETE_APPLET: 6
- OP.DELETE_PCKG: 4
- OP.DELETE_PCKG_APPLET: 4
- OP.INSTANCE_FIELD: 6
- OP.INVK_INTERFACE: 10
- OP.INVK_VIRTUAL: 8
- OP.JAVA: 8
- OP.PUT: 7
- OP.THROW: 7
- OP.TYPE_ACCESS: 7
- OSP:
- OSP.RND: 3
- OSP.RNG: 1
- OSP.VERIFICATION: 4
- OT:
- R:
- T:
- T.CONFID-APPLI-DATA: 4
- T.CONFID-JCS-CODE: 4
- T.CONFID-JCS-DATA: 4
- T.DELETION: 3
- T.EXE-CODE: 8
- T.INSTALL: 4
- T.INTEG-APPLI-CODE: 7
- T.INTEG-APPLI-DATA: 8
- T.INTEG-JCS-CODE: 3
- T.INTEG-JCS-DATA: 4
- T.NATIVE: 4
- T.OBJ-DELETION: 4
- T.PHYSICAL: 4
- T.RESOURCES: 3
- T.SID: 8
|
pdf_data/st_keywords/vendor |
|
- Gemalto:
- Samsung:
- Thales:
- Thales: 20
- Thales Group: 134
|
pdf_data/st_keywords/eval_facility |
|
- Serma:
- Serma Safety & Security: 1
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- 3DES:
- TDEA: 1
- TDES: 9
- Triple-DES: 2
- DES:
- constructions:
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 2
- TDEA: 1
- TDES: 15
- Triple-DES: 3
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-224: 3
- SHA-256: 4
- SHA-384: 4
- SHA-512: 3
- SHA224: 1
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 4
- SHA-256: 4
- SHA-384: 2
- SHA-512: 4
- SHA224: 1
|
pdf_data/st_keywords/crypto_scheme |
|
- KA:
- Key Agreement: 3
- Key agreement: 2
- MAC:
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 3
- fault induction: 2
- malfunction: 2
- physical tampering: 1
- SCA:
- DPA: 1
- Leak-Inherent: 3
- physical probing: 2
|
- FI:
- Malfunction: 9
- Physical Tampering: 3
- fault induction: 2
- malfunction: 8
- physical tampering: 1
- SCA:
- DPA: 2
- Leak-Inherent: 5
- SPA: 1
- physical probing: 6
- timing attacks: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.DG1: 6
- EF.DG16: 6
- EF.DG3: 1
- EF.DG4: 1
|
pdf_data/st_keywords/standard_id |
- BSI:
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- FIPS:
- ICAO:
- NIST:
- PKCS:
- PKCS#1: 8
- PKCS#3: 1
- PKCS#5: 5
- SCP:
- SCP01: 3
- SCP02: 3
- SCP03: 3
|
- BSI:
- CC:
- CCMB-2009-07-004: 1
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- FIPS 197: 1
- FIPS 46-3: 1
- FIPS180-2: 1
- FIPS197: 5
- ICAO:
- NIST:
- PKCS:
- SCP:
- SCP01: 4
- SCP02: 4
- SCP03: 5
|
pdf_data/st_keywords/javacard_version |
- JavaCard:
- JC2.2.2: 1
- Java Card 2.2.2: 7
|
- JavaCard:
- Java Card 2.2.2: 3
- Java Card 3.0.4: 8
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
- com:
- com.gemalto.javacard: 3
- com.gemalto.javacard.filesystem: 1
- com.gemalto.javacard.tlv: 1
- com.gemalto.javacard.util: 1
- com.gemalto.javacardx.biometry: 1
- com.gemalto.javacardx.crypto.asymmetric.rsa: 1
- com.gemalto.javacardx.gap: 2
- javacard:
- javacard.filesystem: 1
- javacard.framework: 2
- javacard.tlv: 1
- javacard.util: 1
- javacardx:
- javacardx.biometry: 3
- javacardx.crypto.asymmetric.rsa: 1
- javacardx.gap: 2
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
- out of scope: 1
|
- OutOfScope:
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
- out of scope: 1
|
pdf_data/st_metadata |
- /Author: Antoine de Lavernette
- /CreationDate: D:20150414141904+02'00'
- /Creator: Microsoft® Office Word 2007
- /Keywords: Security Target, CC
- /ModDate: D:20150414141904+02'00'
- /Producer: Microsoft® Office Word 2007
- /Subject: Security Target
- /Title: eTravel v1.0 Security Target MAÏA3
- pdf_file_size_bytes: 1611194
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 93
|
- /Author: D1417544
- /CreationDate: D:20231003153730+02'00'
- /Creator: Microsoft® Word for Microsoft 365
- /Keywords: 28-03-2018
- /ModDate: D:20231003153730+02'00'
- /Producer: Microsoft® Word for Microsoft 365
- /Subject: 1.12
- /Title: MultiApp V4.1: JCS Security Target
- pdf_file_size_bytes: 2361484
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 134
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |