Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
MultiApp V5.0 Platform (configuration 1 : 5.0.1 version 2a et configuration 2 : 5.0.1 version 2b) (ANSSI-CC-2025/42)
ANSSI-CC-2025/42
IDEMIA CA (Version 1.3.1)(ANSSI-CC-2025/29)
ANSSI-CC-2025/29
name MultiApp V5.0 Platform (configuration 1 : 5.0.1 version 2a et configuration 2 : 5.0.1 version 2b) (ANSSI-CC-2025/42) IDEMIA CA (Version 1.3.1)(ANSSI-CC-2025/29)
not_valid_after 01.12.2030 14.10.2030
not_valid_before 01.12.2025 14.10.2025
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2025-42-certificat.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-ANSSI-CC-2025_29fr.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2025-42-rapport.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2025_29fr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2025-42-cible.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-Cible-CC-2025_29en.pdf
manufacturer THALES DIS FRANCE SA IN SMART IDENTITY FRANCE
manufacturer_web https://www.thalesgroup.com/en/europe/france https://ingroupe.com/fr
security_level EAL6+, ALC_FLR.1 EAL4+, ALC_FLR.1
dgst da810f38d3629ce7 9505587f065ae03f
heuristics/cert_id ANSSI-CC-2025/42 ANSSI-CC-2025/29
heuristics/extracted_sars ASE_CCL.1, ASE_OBJ.2, ALC_CMC.5, ATE_DPT.3, AVA_VAN.5, ASE_INT.1, ASE_REQ.2, ATE_FUN.2, ADV_IMP.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, ALC_FLR.1, ALC_TAT.3, ALC_LCD.1, ALC_DVS.2, ADV_TDS.5, ASE_SPD.1, ATE_COV.3, ADV_INT.3, ALC_CMS.5, AGD_OPE.1, ADV_FSP.5, ALC_DEL.1, ASE_TSS.1, ADV_SPM.1, ADV_ARC.1 ADV_TDS.3, AVA_VAN.3, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ASE_INT.1, ALC_CMC.4, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ATE_DPT.1, ASE_ECD.1, ALC_FLR.1, ADV_IMP.1, ALC_LCD.1, ASE_SPD.1, ATE_COV.2, ALC_DVS.1, ALC_TAT.1, AGD_OPE.1, ALC_CMS.4, ALC_DEL.1, ASE_TSS.1, ADV_FSP.4, ADV_ARC.1
heuristics/extracted_versions 5.0.1, 5.0 1.3.1
heuristics/report_references/directly_referenced_by ANSSI-CC-2025/46 {}
heuristics/report_references/directly_referencing BSI-DSZ-CC-1107-V5-2024 {}
heuristics/report_references/indirectly_referenced_by ANSSI-CC-2025/46 {}
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-1107-V3-2022, BSI-DSZ-CC-1107-V5-2024, BSI-DSZ-CC-1107-V4-2023 {}
heuristics/st_references/directly_referencing BSI-DSZ-CC-1107-V5-2024 {}
heuristics/st_references/indirectly_referencing BSI-DSZ-CC-1107-V5-2024 {}
heuristics/protection_profiles 7f886b64878b68c1 {}
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0099V2b_pdf.pdf {}
pdf_data/cert_filename ANSSI-CC-2025-42-certificat.pdf Certificat-ANSSI-CC-2025_29fr.pdf
pdf_data/cert_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2025/42: 2
  • FR:
    • ANSSI-CC-2025/29: 2
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-099-V2-2020: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
    • EAL6: 1
  • EAL:
    • EAL2: 1
    • EAL4: 2
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR.1: 2
  • ALC:
    • ALC_FLR.1: 1
pdf_data/cert_keywords/vendor
  • Idemia:
    • IDEMIA: 1
pdf_data/cert_keywords/eval_facility
  • CEA-LETI:
    • CEA - LETI: 1
  • AMOSSYS:
    • AMOSSYS: 2
pdf_data/cert_metadata
  • /CreationDate: D:20251126120544+01'00'
  • /Creator: Acrobat PDFMaker 25 pour Word
  • /ModDate: D:20251202070142-08'00'
  • /Producer: PDFKit.NET 12.3.757.0 DMV10
  • pdf_file_size_bytes: 302417
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
  • /CreationDate: D:20251014114027+02'00'
  • /Creator: Acrobat PDFMaker 25 pour Word
  • /ModDate: D:20251014062248-07'00'
  • /Producer: PDFKit.NET 12.3.654.0 DMV10
  • pdf_file_size_bytes: 274579
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename ANSSI-CC-2025-42-rapport.pdf ANSSI-CC-2025_29fr.pdf
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1107-V5-2024: 1
  • FR:
    • ANSSI-CC-2025/42: 3
  • FR:
    • ANSSI-CC-2025/29: 3
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0099-V2-2020: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 2
    • EAL6: 1
    • EAL6+: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
  • EAL:
    • EAL2: 2
    • EAL4: 3
  • ITSEC:
    • ITSEC E3 Elémentaire: 1
pdf_data/report_keywords/cc_sar
  • AGD:
    • AGD_OPE: 3
    • AGD_PRE: 2
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.1: 2
  • AVA:
    • AVA_VAN: 1
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.1: 3
pdf_data/report_keywords/vendor
  • Idemia:
    • IDEMIA: 7
pdf_data/report_keywords/eval_facility
  • CEA-LETI:
    • CEA - LETI: 1
  • CESTI:
    • CESTI: 5
  • AMOSSYS:
    • AMOSSYS: 1
  • CESTI:
    • CESTI: 1
pdf_data/report_metadata
pdf_data/st_filename ANSSI-CC-2025-42-cible.pdf ANSSI-Cible-CC-2025_29en.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1107-V5-2024: 1
  • NL:
    • CC-1: 2
    • CC-2: 3
    • CC-3: 4
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0068-V2-2011-MA-01: 1
    • BSI-CC-PP-0084-: 1
    • BSI-CC-PP-0099-V2-2020: 1
    • BSI-PP- 0055-2009: 1
    • BSI-PP-0056-V2-MA-2012: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 6+: 1
    • EAL6: 31
    • EAL6 augmented: 1
    • EAL6+: 3
  • EAL:
    • EAL4: 6
    • EAL4 augmented: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC: 2
    • ADV_ARC.1: 8
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 2
    • ADV_FSP.4: 2
    • ADV_FSP.5: 5
    • ADV_IMP: 1
    • ADV_IMP.1: 6
    • ADV_IMP.2: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM.1: 8
    • ADV_TDS: 1
    • ADV_TDS.1: 2
    • ADV_TDS.3: 3
    • ADV_TDS.4: 7
    • ADV_TDS.5: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 7
    • AGD_PRE: 1
    • AGD_PRE.1: 6
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMC.5: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 2
    • ALC_DVS.1: 1
    • ALC_DVS.2: 3
    • ALC_FLR.1: 5
    • ALC_LCD.1: 4
    • ALC_TAT.1: 2
    • ALC_TAT.2: 3
    • ALC_TAT.3: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 2
    • ATE_COV.3: 1
    • ATE_DPT.1: 1
    • ATE_DPT.3: 2
    • ATE_FUN.1: 6
    • ATE_FUN.2: 1
    • ATE_IND.2: 2
  • AVA:
    • AVA_VAN.5: 2
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE: 3
    • AGD_OPE.1: 1
    • AGD_PRE: 3
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.1: 6
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_ARP.1: 15
    • FAU_ARP.1.1: 1
    • FAU_SAA.1: 2
    • FAU_SAS.1: 2
  • FCO:
    • FCO_NRO: 5
    • FCO_NRO.2: 3
  • FCS:
    • FCS_CKM: 61
    • FCS_CKM.1: 29
    • FCS_CKM.1.1: 3
    • FCS_CKM.2: 10
    • FCS_CKM.2.1: 1
    • FCS_CKM.3: 5
    • FCS_CKM.3.1: 1
    • FCS_CKM.4: 27
    • FCS_CKM.4.1: 2
    • FCS_CMK.4: 2
    • FCS_COP: 66
    • FCS_COP.1: 31
    • FCS_COP.1.1: 5
    • FCS_RNG: 26
    • FCS_RNG.1: 14
    • FCS_RNG.1.1: 3
    • FCS_RNG.1.2: 1
  • FDP:
    • FDP_ACC: 44
    • FDP_ACC.1: 20
    • FDP_ACC.2: 6
    • FDP_ACF: 39
    • FDP_ACF.1: 25
    • FDP_IFC: 24
    • FDP_IFC.1: 14
    • FDP_IFC.2: 2
    • FDP_IFF: 16
    • FDP_IFF.1: 14
    • FDP_ITC: 11
    • FDP_ITC.1: 12
    • FDP_ITC.2: 17
    • FDP_ITT.1: 2
    • FDP_RIP: 97
    • FDP_RIP.1: 11
    • FDP_RIP.1.1: 1
    • FDP_ROL: 13
    • FDP_ROL.1: 5
    • FDP_SDC.1: 2
    • FDP_SDI: 8
    • FDP_SDI.2: 4
    • FDP_UCT.1: 2
    • FDP_UIT: 6
    • FDP_UIT.1: 4
  • FIA:
    • FIA_AFL: 23
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_API: 1
    • FIA_API.1: 2
    • FIA_ATD: 12
    • FIA_ATD.1: 3
    • FIA_UAU: 64
    • FIA_UAU.1: 6
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UAU.4: 1
    • FIA_UAU.4.1: 1
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6.1: 1
    • FIA_UID: 42
    • FIA_UID.1: 18
    • FIA_UID.1.1: 2
    • FIA_UID.1.2: 2
    • FIA_UID.2: 1
    • FIA_USB: 6
    • FIA_USB.1: 3
  • FMT:
    • FMT_LIM: 38
    • FMT_LIM.1: 17
    • FMT_LIM.1.1: 3
    • FMT_LIM.2: 16
    • FMT_LIM.2.1: 3
    • FMT_MSA: 96
    • FMT_MSA.1: 13
    • FMT_MSA.2: 2
    • FMT_MSA.3: 21
    • FMT_MTD: 57
    • FMT_MTD.1: 13
    • FMT_MTD.3: 1
    • FMT_SMF: 78
    • FMT_SMF.1: 29
    • FMT_SMF.1.1: 2
    • FMT_SMR: 88
    • FMT_SMR.1: 38
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 2
  • FPR:
    • FPR_UNO: 5
    • FPR_UNO.1: 8
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_EMS: 4
    • FPT_EMS.1: 14
    • FPT_EMS.1.1: 3
    • FPT_EMS.1.2: 3
    • FPT_FLS: 47
    • FPT_FLS.1: 16
    • FPT_FLS.1.1: 2
    • FPT_ITT: 6
    • FPT_ITT.1: 2
    • FPT_PHP: 7
    • FPT_PHP.3: 17
    • FPT_PHP.3.1: 1
    • FPT_RCV: 12
    • FPT_RCV.3: 4
    • FPT_RCV.4: 2
    • FPT_TDC.1: 7
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TST: 8
    • FPT_TST.1: 15
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_TST.2: 2
  • FRU:
    • FRU_FLT.2: 2
  • FTP:
    • FTP_ITC: 17
    • FTP_ITC.1: 7
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP: 4
    • FTP_TRP.1: 7
  • FAU:
    • FAU_GEN.1: 3
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 3
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 3
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 3
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 3
    • FAU_SAR.3.1: 1
    • FAU_SEL.1: 3
    • FAU_SEL.1.1: 1
  • FCO:
    • FCO_NRO_CIMC: 4
    • FCO_NRO_CIMC.3: 6
    • FCO_NRO_CIMC.3.1: 1
    • FCO_NRO_CIMC.3.2: 1
    • FCO_NRO_CIMC.3.3: 1
    • FCO_NRO_CIMC.4: 4
    • FCO_NRO_CIMC.4.1: 1
    • FCO_NRO_CIMC.4.2: 1
  • FCS:
    • FCS_SOF_CIMC.1: 3
    • FCS_SOF_CIMC.1.1: 1
  • FDP:
    • FDP_ACC.1: 3
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 3
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_CIMC_CER.1: 3
    • FDP_CIMC_CER.1.1: 1
    • FDP_CIMC_CER.1.2: 1
    • FDP_CIMC_CER.1.3: 1
    • FDP_CIMC_CER.1.4: 1
    • FDP_CIMC_CRL.1: 3
    • FDP_CIMC_CRL.1.1: 1
    • FDP_CIMC_CSE.1: 3
    • FDP_CIMC_CSE.1.1: 1
    • FDP_DAU.1: 3
    • FDP_DAU.1.1: 1
    • FDP_DAU.1.2: 1
    • FDP_RIP.1: 3
    • FDP_RIP.1.1: 1
    • FDP_UCT.1: 3
    • FDP_UCT.1.1: 1
  • FIA:
    • FIA_ATD.1: 4
    • FIA_UAU.1: 3
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.6: 3
    • FIA_UAU.6.1: 1
    • FIA_UID.1: 6
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 3
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MODF_IDA.3: 1
    • FMT_MOF.1: 6
    • FMT_MOF.1.1: 1
    • FMT_MOF_CIMC.3: 3
    • FMT_MOF_CIMC.3.3: 1
    • FMT_MOF_CIMC.5: 3
    • FMT_MOF_CIMC.5.1: 1
    • FMT_MOF_CIMC.5.2: 1
    • FMT_MOF_CIMC.5.3: 1
    • FMT_MOF_IDA.3: 6
    • FMT_MOF_IDA.3.1: 1
    • FMT_MOF_IDA.3.2: 1
    • FMT_MOF_IDA.3.3: 1
    • FMT_MOF_IDA.3.4: 1
    • FMT_MTD.1: 4
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 4
    • FMT_SMF.1.1: 1
    • FMT_SMR: 2
    • FMT_SMR.1: 2
    • FMT_SMR.2: 4
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_ITC.1: 3
    • FPT_ITC.1.1: 1
    • FPT_RPL.1: 3
    • FPT_RPL.1.1: 1
    • FPT_RPL.1.2: 1
  • FTA:
    • FTA_SSL.3: 3
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_TRP.1: 4
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.CAP_FILE: 3
    • A.DELETION: 3
    • A.OS-UPDATE-EVIDENCE: 3
    • A.SECURE_ACODE_MANAGEMENT: 3
    • A.VERIFICATION: 3
  • D:
    • D.API_DATA: 3
    • D.APP_CODE: 6
    • D.APP_C_DATA: 3
    • D.APP_I_DATA: 5
    • D.APP_KEYS: 1
    • D.CRYPTO: 5
    • D.JCS_CODE: 6
    • D.JCS_DATA: 8
    • D.OS-: 1
    • D.OS-UPDATE-CODE-ID: 3
    • D.OS-UPDATE_ADDITIONALCODE: 5
    • D.OS-UPDATE_DEC-KEY: 2
    • D.OS-UPDATE_SGNVER-KEY: 2
    • D.PIN: 4
    • D.SEC_DATA: 7
  • O:
    • O.AES: 1
    • O.ALARM: 15
    • O.APPLET: 28
    • O.ARRAY_VIEWS_CONFID: 7
    • O.ARRAY_VIEWS_INTEG: 3
    • O.CARD-MANAGEMENT: 1
    • O.CARD_MANAGEMENT: 17
    • O.CIPHER: 10
    • O.CODE_CAP_FILE: 23
    • O.CONFID-OS-UPDATE: 3
    • O.DELETION: 4
    • O.FIREWALL: 12
    • O.GLOBAL_ARRAYS_CONFID: 9
    • O.GLOBAL_ARRAYS_INTEG: 5
    • O.INSTALL: 7
    • O.JAVAOBJECT: 68
    • O.KEY-MNGT: 6
    • O.LOAD: 11
    • O.NATIVE: 11
    • O.OBJ-DELETION: 4
    • O.OBJ_DELETION: 4
    • O.OPERATE: 15
    • O.PIN-MNGT: 6
    • O.PIN_MNGT: 4
    • O.REALLOCATION: 5
    • O.RESOURCES: 9
    • O.RND: 2
    • O.RNG: 10
    • O.SCP: 31
    • O.SECURE_AC_ACTIVATION: 4
    • O.SECURE_LOAD_ACODE: 9
    • O.SID: 13
    • O.TDES: 1
    • O.TOE_IDENTIFICATION: 6
    • O.TRANSACTION: 6
  • OE:
    • OE.CAP_FILE: 5
    • OE.CARD-: 1
    • OE.CARD-MANAGEMENT: 1
    • OE.CODE-: 1
    • OE.CODE-EVIDENCE: 10
    • OE.OS-UPDATE-ENCRYPTION: 5
    • OE.OS-UPDATE-EVIDENCE: 2
    • OE.SCP: 2
    • OE.SECURE_ACODE_MANAGEMENT: 2
    • OE.VERIFICATION: 25
  • OP:
    • OP.ARRAY_AASTORE: 3
    • OP.ARRAY_ACCESS: 7
    • OP.ARRAY_LENGTH: 3
    • OP.ARRAY_T_ALOAD: 3
    • OP.ARRAY_T_ASTORE: 3
    • OP.CREATE: 11
    • OP.DELETE_APPLET: 6
    • OP.DELETE_CAP_FILE: 4
    • OP.DELETE_CAP_FILE_APPLET: 4
    • OP.INSTANCE_FIELD: 6
    • OP.INVK_INTERFACE: 10
    • OP.INVK_VIRTUAL: 8
    • OP.JAVA: 8
    • OP.PUT: 8
    • OP.PUTFIELD: 1
    • OP.PUTSTATIC: 1
    • OP.THROW: 7
    • OP.TYPE_ACCESS: 7
  • OSP:
    • OSP.ADDITIONAL_CODE_ENCRYPTION: 3
    • OSP.ADDITIONAL_CODE_SIGNING: 3
    • OSP.ATOMIC_ACTIVATION: 3
    • OSP.RNG: 3
    • OSP.TOE_IDENTIFICATION: 3
    • OSP.VERIFICATION: 3
  • OT:
    • OT.X: 1
  • R:
    • R.JAVA: 12
  • T:
    • T.CONFID-APPLI-DATA: 3
    • T.CONFID-JCS-CODE: 3
    • T.CONFID-JCS-DATA: 3
    • T.CONFID-OS-UPDATE_LOAD: 3
    • T.DELETION: 3
    • T.EXE-CODE: 6
    • T.FAKE-SGNVER-KEY: 3
    • T.INSTALL: 3
    • T.INTEG-APPLI-CODE: 6
    • T.INTEG-APPLI-DATA: 6
    • T.INTEG-JCS-CODE: 3
    • T.INTEG-JCS-DATA: 3
    • T.INTEG-OS-UPDATE_LOAD: 3
    • T.NATIVE: 3
    • T.OBJ-DELETION: 3
    • T.PHYSICAL: 3
    • T.RESOURCES: 3
    • T.SID: 6
    • T.UNAUTHORIZED_TOE_CODE_UPDATE: 3
    • T.WRONG-UPDATE-STATE: 3
  • A:
    • A.AUDITORS_REVIEW_LO: 2
    • A.AUDITORS_REVIEW_LOGS: 1
    • A.COMPETENT_OPERATO: 2
    • A.COMPETENT_OPERATORS: 1
    • A.CPS: 1
    • A.DATABASE_SECURITY_: 2
    • A.DATABASE_SECURITY_AND_BACKUP: 5
    • A.DISPOSAL_OF_AUTHEN: 2
    • A.DISPOSAL_OF_AUTHENTICATION_DATA: 1
    • A.HSM_SECURITY: 4
    • A.NOTIFY_AUTHORITIES_: 2
    • A.NOTIFY_AUTHORITIES_OF_SECURITY_ISSUES: 1
    • A.OPERATING_SYSTEM: 3
    • A.PHYSICAL_COMMUNICATIONS_PROTECTIONS: 1
    • A.PHYSICAL_PROTECTION: 2
    • A.PHYSICAL_PROTECTIONS: 1
    • A.SANE_INSTALL: 4
    • A.SOCIAL_ENGINEERING_: 2
    • A.SOCIAL_ENGINEERING_TRAINING: 1
    • A.TRUSTED_AUTH_SERVE: 2
    • A.TRUSTED_AUTH_SERVER: 3
  • O:
    • O.CPS: 1
  • OE:
    • OE.ADMINISTRATOR_DOCUMENTATION: 2
    • OE.AUDITORS_REVIEW_LOGS: 3
    • OE.AUTHENTICATE_OPERATORS: 3
    • OE.BACKUP_STORAGE: 3
    • OE.CERT_REPOSITORY: 3
    • OE.COMPETENT_OPERATORS: 2
    • OE.CONFIGURATION_MANAGEMENT: 3
    • OE.CREDENTIALS_POLICY: 3
    • OE.DATA_INTEGRITY: 3
    • OE.ENVIRONMENT_CRYPTOGRAPHY: 3
    • OE.KEY_ARCHIVAL: 3
    • OE.LIFECYCLE_SECURITY: 2
    • OE.MALICIOUS_CODE_NOT_SIGNED: 3
    • OE.NOTIFY_AUTHORITIES_OF_SECURITY_ISSU: 1
    • OE.NOTIFY_AUTHORITIES_OF_SECURITY_ISSUES: 1
    • OE.OPERATING_SYSTEM: 3
    • OE.PERIODIC_INTEGRITY_CHECK: 3
    • OE.PHYSICAL_COMMUNICATION_PROTECTIONS: 3
    • OE.PHYSICAL_PROTECTION: 3
    • OE.PREVENT_MALICIOUS_CODE: 2
    • OE.PROTECT_DATA_INTERNAL_TRANSFER: 3
    • OE.RECOVERY_FROM_MALICIOUS_CODE: 3
    • OE.REPAIR_SECURITY_FLAWS: 2
    • OE.REQUIRE_INSPECTION_DOWNLOAD: 2
    • OE.SANE_INSTALL: 3
    • OE.SECURE_KEY_STORAGE_AND_OPERATIONS: 3
    • OE.SECURITY_ROLES: 3
    • OE.SOCIAL_ENGINEERING_TRAINING: 3
    • OE.TIMESTAMPS: 3
    • OE.VALIDATION_OF_SECURITY_FUNCTIONS: 2
  • OP:
    • OP.AUTHORIZE_HSM: 1
    • OP.FWD_HTTP_REQS: 1
    • OP.FWD_PRIVKEY_REQS: 1
    • OP.PRIVILEGED_WRITE_CA_AND_CERTS: 1
    • OP.READ_AUDIT_LOGS: 1
    • OP.READ_CERTS: 1
    • OP.READ_CONFIG: 1
    • OP.READ_TLS_KEYS: 1
    • OP.UNAUTHORIZE_HSM: 1
    • OP.USE_PRIVKEY: 1
    • OP.VERIF_AUTH_TOKEN: 1
    • OP.WRITE_AUDIT_LOG: 1
    • OP.WRITE_CA_AND_CERTS: 1
    • OP.WRITE_CSR: 1
  • OT:
    • OT.ADMIN_ACCESS_CONTR: 2
    • OT.ADMIN_ACCESS_CONTROL: 3
    • OT.AUDIT: 5
    • OT.CA_MANAGEMENT: 3
    • OT.CERTIFICATES: 5
    • OT.CERTIFICATION: 5
    • OT.COMMMUNICATION_PRO: 2
    • OT.COMMMUNICATION_PROTECTIONS: 3
    • OT.CRL_MANAGEMENT: 3
    • OT.DATA_IMPORT_EXPORT: 5
    • OT.MAINTAIN_USER_ATTRI: 2
    • OT.MAINTAIN_USER_ATTRIBUTES: 2
    • OT.MANAGE_SECURITY_FU: 2
    • OT.MANAGE_SECURITY_FUNCTIONS: 3
    • OT.NON_REPUDIATION: 2
    • OT.PROTECT_AUDIT_LOG: 3
    • OT.REPLAY_PROTECTION: 5
    • OT.RESIDUAL_MEMORY_CLEARING: 3
    • OT.RESTRICT_ACTIONS_BEFORE_AUTHENTIFIC: 1
    • OT.RESTRICT_ACTIONS_BEFORE_AUTHENTIFICATION: 2
    • OT.SESSION_MANAGEMENT: 5
    • OT.TOE_CRYPTOGRAPHY: 5
  • T:
    • T.AUDIT_LOG_CORRUPTI: 2
    • T.AUDIT_LOG_CORRUPTION: 9
    • T.CERTIFICATE_CORRUPTION: 12
    • T.CONFIG_CORRUPTION: 8
    • T.CRITICAL_COMPONENT: 2
    • T.CRITICAL_COMPONENT_FAILURE: 1
    • T.DISCLOSURE_OF_SECR: 2
    • T.DISCLOSURE_OF_SECRET_KEYS: 5
    • T.FLAWED_CODE: 4
    • T.MALICIOUS_CODE_EXPLOITATION: 4
    • T.MESSAGE_CONTENT_TA: 2
    • T.MESSAGE_CONTENT_TAMPERING: 5
    • T.MODIFICATION_OF_SE: 2
    • T.MODIFICATION_OF_SECRET_KEYS: 6
    • T.PHYSICAL_UNAUTHORI: 2
    • T.PHYSICAL_UNAUTHORIZED_ENTITY_ACCESS: 2
    • T.RESIDUAL_MEMORY_ACCESS: 3
    • T.SENDER_DENIABILITY: 4
    • T.UNAUTHENTICATED_TRANSACTIONS: 6
    • T.UNAUTHORIZED_ENTITY_ACCESS: 11
    • T.UNDETECTED_ACTIONS: 8
    • T.WEAK_CRYPTOGRAPHY: 5
pdf_data/st_keywords/vendor
  • Gemalto:
    • Gemalto: 8
  • Infineon:
    • Infineon: 18
  • Thales:
    • Thales: 42
  • Idemia:
    • IDEMIA: 27
pdf_data/st_keywords/eval_facility
  • AMOSSYS:
    • AMOSSYS: 2
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 29
      • AES-256: 2
  • DES:
    • 3DES:
      • 3DES: 2
      • TDEA: 1
      • TDES: 14
      • Triple-DES: 3
    • DES:
      • DES: 20
  • constructions:
    • MAC:
      • CMAC: 3
      • HMAC: 3
      • KMAC: 3
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 13
    • ECDH:
      • ECDH: 8
    • ECDSA:
      • ECDSA: 4
  • FF:
    • DH:
      • DH: 14
      • Diffie-Hellman: 5
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 4
      • SHA1: 2
    • SHA2:
      • SHA-224: 2
      • SHA-256: 2
      • SHA-384: 1
      • SHA-512: 2
      • SHA2: 1
      • SHA224: 1
    • SHA3:
      • SHA3: 2
      • SHA3-384: 1
      • SHA3-512: 1
  • SHA:
    • SHA1:
      • SHA-1: 1
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 6
    • Key agreement: 2
  • MAC:
    • MAC: 14
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 158
  • TLS:
    • TLS:
      • TLS: 3
      • TLS v1.3: 1
pdf_data/st_keywords/randomness
  • PRNG:
    • PRNG: 1
  • RNG:
    • RND: 2
    • RNG: 36
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 3
  • ECB:
    • ECB: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 5
    • Physical Tampering: 3
    • fault induction: 2
    • malfunction: 8
    • physical tampering: 1
  • SCA:
    • DPA: 2
    • Leak-Inherent: 2
    • SPA: 1
    • physical probing: 6
    • timing attacks: 1
  • FI:
    • physical tampering: 1
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 2
pdf_data/st_keywords/cplc_data
  • ICFab:
    • IC Fabricator: 1
  • ICType:
    • IC Type: 1
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.DG1: 6
    • EF.DG16: 6
    • EF.DG3: 1
    • EF.DG4: 1
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS20: 1
    • AIS31: 6
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS 197: 1
    • FIPS180-2: 1
    • FIPS197: 5
  • ICAO:
    • ICAO: 1
  • NIST:
    • SP 800-67: 1
  • PKCS:
    • PKCS#1: 7
    • PKCS#5: 5
  • SCP:
    • SCP01: 4
    • SCP02: 4
    • SCP03: 5
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS 140-2: 2
  • RFC:
    • RFC 5280: 1
    • RFC5280: 3
  • X509:
    • X.509: 8
pdf_data/st_keywords/javacard_version
  • JavaCard:
    • Java Card 3.1: 8
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 7
pdf_data/st_keywords/javacard_packages
  • java:
    • java.lang: 1
  • javacard:
    • javacard.framework: 3
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • 1, are out of the scope of the SPM as they are linked to the applet loading or deletion that is out of scope of the SPM boundaries limited to VM opcodes MultiApp V5.0: JCS Security Target ST Ref: 1
    • Context, the Selected Applet Context, and the Active Applets Note: the Selected Applet context is out of scope of the VM functionalities. It is a process that occurs prior to VM start MultiApp V5.0: JCS: 1
    • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
    • out of scope: 4
    • the scope because done before the JCVM entering (selection of the applet) Note: The Array View is out of scope of this modelisation ADV_SPM.1.2D For each policy covered by the formal security policy model, the: 1
pdf_data/st_metadata
  • /Author: OHAYON Franck
  • /CreationDate: D:20250916171850+02'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /ModDate: D:20250916171850+02'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • /Title: MultiApp V5.0: JCS Security Target LITE
  • pdf_file_size_bytes: 3884938
  • pdf_hyperlinks: https://www.ssi.gouv.fr/uploads/2021/03/anssi-guide-mecanismes_crypto-2.04.pdf
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 141
  • /Author: Antoine GUELLIER
  • /CreationDate: D:20250912163327+08'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /MSIP_Label_5f8610cf-4e4f-4168-a9a0-556235a89a9b_ActionId: 1e42b2bc-5d7f-44f6-9170-0defe7e86da2
  • /MSIP_Label_5f8610cf-4e4f-4168-a9a0-556235a89a9b_ContentBits: 0
  • /MSIP_Label_5f8610cf-4e4f-4168-a9a0-556235a89a9b_Enabled: true
  • /MSIP_Label_5f8610cf-4e4f-4168-a9a0-556235a89a9b_Method: Privileged
  • /MSIP_Label_5f8610cf-4e4f-4168-a9a0-556235a89a9b_Name: Unclassified
  • /MSIP_Label_5f8610cf-4e4f-4168-a9a0-556235a89a9b_SetDate: 2025-09-11T13:04:15Z
  • /MSIP_Label_5f8610cf-4e4f-4168-a9a0-556235a89a9b_SiteId: 7694d41c-5504-43d9-9e40-cb254ad755ec
  • /MSIP_Label_5f8610cf-4e4f-4168-a9a0-556235a89a9b_Tag: 10, 0, 1, 1
  • /MSIP_Label_9d900cae-8562-48ba-b9f0-7d683a8ec459_ActionId: 15dc182a-ce40-47eb-abee-7fa722c3e87a
  • /MSIP_Label_9d900cae-8562-48ba-b9f0-7d683a8ec459_ContentBits: 0
  • /MSIP_Label_9d900cae-8562-48ba-b9f0-7d683a8ec459_Enabled: true
  • /MSIP_Label_9d900cae-8562-48ba-b9f0-7d683a8ec459_Method: Privileged
  • /MSIP_Label_9d900cae-8562-48ba-b9f0-7d683a8ec459_SiteId: 76eb9ac3-0a27-417b-9e7d-e8eb81f82b62
  • /ModDate: D:20250912163327+08'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • /Title: FQR 550 0219 Ed 11 - IDEMIA CA v1.3 Security Target
  • pdf_file_size_bytes: 1725764
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 69
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different