Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Plateforme ID-One Cosmo v8.1-N- Large masquée sur le composant NXP P6022M VB
ANSSI-CC-2017/49
Oberthur Carte à puce ID-One Cosmo V7.0-n en configuration Large, Standard, Basic (modes dual ou contact) ou Entry (mode dual) masquée sur composant NXP
ANSSI-CC-2009/48
name Plateforme ID-One Cosmo v8.1-N- Large masquée sur le composant NXP P6022M VB Oberthur Carte à puce ID-One Cosmo V7.0-n en configuration Large, Standard, Basic (modes dual ou contact) ou Entry (mode dual) masquée sur composant NXP
not_valid_before 2017-09-05 2009-11-19
not_valid_after 2025-04-24 2019-09-01
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2017_49en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-cible_2009-48en.pdf
status active archived
manufacturer Oberthur Technologies Oberthur Technologies / NXP Semiconductors GmbH
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2017_49fr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc_2009-48en.pdf
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat%20ANSSI-CC-2017_49-S02.pdf None
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'JavaCard System Standard 2.2 Configuration Protection Profile, Version 1.0b', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/jcsppc.pdf', 'pp_ids': None})
maintenance_updates frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2019, 1, 24), 'maintenance_title': 'Plateforme ID -One Cosmo v8.1-N - Large, masquée sur le composant NXP P6022M VB Identification du matériel 084022', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2017_49_m02.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2017_49en(1).pdf'}), frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2020, 4, 24), 'maintenance_title': 'Reassessment report: ANSSI-CC-2017/49-S02', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2017_49-S02.pdf', 'maintenance_st_link': None}), frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2017, 11, 20), 'maintenance_title': 'Plateforme ID-One Cosmo v8.1-N - Large, masquée sur le composant NXP P6022M VB Identification du matériel 084022', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2017_49_m01.pdf', 'maintenance_st_link': None}), frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2017, 11, 20), 'maintenance_title': 'Plateforme ID -One Cosmo v8.1-N - Large, masquée sur le composant NXP P6022M VB Identification du matériel 084022', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2017_49_m01.pdf', 'maintenance_st_link': None}), frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2017, 11, 20), 'maintenance_title': 'ANSSI-CC-2017/49-M01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2017_49_m01.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2017_49en(1).pdf'}), frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2020, 1, 21), 'maintenance_title': 'ANSSI-CC-2017/49-M03', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2017_49-m03fr.pdf', 'maintenance_st_link': None}) frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2010, 10, 22), 'maintenance_title': 'Rapport de maintenance ANSSI-CC-2009/48-M01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2009-48-M01fr.pdf', 'maintenance_st_link': None})
state/cert/convert_ok True False
state/cert/download_ok True False
state/cert/extract_ok True False
state/cert/pdf_hash 1b0535e6124b8bd374c190f018820b31b2cdefb4c9bb40b987d83cababb538d6 None
state/cert/txt_hash df0f39dca29d89cd639270b1d99b58d7dbeb98d84414ca6f1514d0d7abb20e3a None
state/report/pdf_hash e7b7e38b2f83d93902feb5120ed29aafe5c3a401495485aa5be0426a9e41445f 695a144a7fe6f6327bd25b4500871eb89e7af20cb9dd18627ca70ec518cba88c
state/report/txt_hash f21d59943a64c72866d0b4491029120b12c0b921e58002156de396dffc9ef7e9 c2740ee65fbadc31cc355b96acc74968a649bbad919cd50b2e071f4e77917f28
state/st/pdf_hash 5091a06e7662832af51a423f5941d1f1600a8c3d4c4f7cbabe897d34ad399cda 8f668d9785ec13634ad9bdb2a7027f81f53fb2cefc7f6ce75010a0adbf9b11ee
state/st/txt_hash 24413aba53a23aeac8194bbd3dc9f08ff18e82b1c594b13e9f252a4c5df88785 f34fe1fcf5a51ad7bceec7503e1d459eb28dfd56ac036d143014045eaf73d17d
heuristics/cert_id ANSSI-CC-2017/49 ANSSI-CC-2009/48
heuristics/cert_lab CEA THALES
heuristics/extracted_versions 8.1 7.0
heuristics/report_references/directly_referenced_by ANSSI-CC-2018/03, ANSSI-CC-2017/72, ANSSI-CC-2017/69, ANSSI-CC-2018/17, ANSSI-CC-2017/70, ANSSI-CC-2018/05, ANSSI-CC-2018/18, ANSSI-CC-2018/06, ANSSI-CC-2018/16, ANSSI-CC-2017/71, ANSSI-CC-2018/04, ANSSI-CC-2019/28, ANSSI-CC-2018/15 None
heuristics/report_references/directly_referencing BSI-DSZ-CC-0973-V2-2016 None
heuristics/report_references/indirectly_referenced_by ANSSI-CC-2017/72, ANSSI-CC-2019/33, ANSSI-CC-2020/26, ANSSI-CC-2019/43-R01, ANSSI-CC-2019/28, ANSSI-CC-2018/18, ANSSI-CC-2019/47, ANSSI-CC-2019/36, ANSSI-CC-2019/49, ANSSI-CC-2019/48, ANSSI-CC-2020/36, ANSSI-CC-2020/38, ANSSI-CC-2017/70, ANSSI-CC-2017/69, ANSSI-CC-2019/43, ANSSI-CC-2018/06, ANSSI-CC-2018/04, ANSSI-CC-2020/53, ANSSI-CC-2020/52, ANSSI-CC-2022/33, ANSSI-CC-2020/35, ANSSI-CC-2018/05, ANSSI-CC-2018/16, ANSSI-CC-2017/71, ANSSI-CC-2018/15, ANSSI-CC-2018/03, ANSSI-CC-2019/35, ANSSI-CC-2020/50, ANSSI-CC-2019/34, ANSSI-CC-2018/17, ANSSI-CC-2020/51, ANSSI-CC-2019/50, ANSSI-CC-2019/41, ANSSI-CC-2020/37 None
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-0973-2016, BSI-DSZ-CC-0973-V2-2016 None
heuristics/scheme_data
  • product: Plateforme ID-One Cosmo v8.1-N - Large, masquée sur le composant NXP P6022M VB
  • url: https://cyber.gouv.fr/produits-certifies/plateforme-id-one-cosmo-v81-n-large-masquee-sur-le-composant-nxp-p6022m-vb
  • description: Le produit certfié est la plateforme ouverte Java Card : « plateforme ID-One Cosmo v8.1-N - Large, masquée sur le composant NXP P6022M VB » dont l’identification du matériel est 084021. La version de la plateforme évaluée inclut les patchs identifiés au chapitre 1.2.4 du présent rapport. Elle est développée par OBERTHUR TECHNOLOGIES et embarquée sur le microcontrôleur NXP P6022M VB, développé et f
  • sponsor: Oberthur Technologies
  • developer: Oberthur Technologies, NXP Semiconductors GmbH
  • cert_id: 2017/49
  • level: EAL5+
  • expiration_date: 24 Avril 2025
  • enhanced:
    • cert_id: 2017/49
    • certification_date: 05/09/2017
    • expiration_date: 24/04/2025
    • category: Cartes à puce
    • cc_version: Critères Communs version 3.1r4
    • developer: Oberthur Technologies, NXP Semiconductors GmbH
    • sponsor: Oberthur Technologies
    • evaluation_facility: CEA - LETI
    • level: EAL5+
    • protection_profile: PP JCS-O
    • mutual_recognition: SOG-IS CCRA
    • augmented: ALC_DVS.2, AVA_VAN.5
    • target_link: https://cyber.gouv.fr/sites/default/files/2017/09/anssi-cible-cc-2017_49-m03en.pdf
    • report_link: https://cyber.gouv.fr/sites/default/files/2017/09/anssi-cc-2017_49fr.pdf
    • cert_link: https://cyber.gouv.fr/sites/default/files/2017/09/certificat-anssi-cc-2017_49-s02.pdf
  • product: Carte à puce ID-One Cosmo V7.0-n en configuration Large, Standard, Basic (modes dual ou contact) ou Entry (mode dual) masquée sur composant NXP
  • url: https://cyber.gouv.fr/produits-certifies/carte-puce-id-one-cosmo-v70-n-en-configuration-large-standard-basic-modes-dual
  • description: Le produit évalué est la carte à puce ID-One Cosmo V7.0-n, plate-forme Java Card ouverte, développée par Oberthur Technologies : - compatible avec les spécifications de Java Card 2.2.2 et de VISA GlobalPlatform 2.1.1 ; - masquée sur des variantes (par la taille mémoire et les interfaces offertes) d'une même famille de composants développées par NXP ; - patchée par Optional Code r4.0 Generic
  • sponsor: Oberthur Technologies
  • developer: Oberthur Technologies - NXP Semiconductors GmbH
  • cert_id: 2009/48
  • level: EAL5+
  • enhanced:
    • cert_id: 2009/48
    • certification_date: 19/11/2009
    • category: Cartes à puce
    • cc_version: Critères Communs version 3.1
    • developer: Oberthur Technologies - NXP Semiconductors GmbH
    • sponsor: Oberthur Technologies
    • evaluation_facility: THALES - CEACI
    • level: EAL5+
    • protection_profile: PP/0304
    • mutual_recognition: SOG-IS CCRA
    • augmented: ADV_IMP.2, ALC_DVS.2, AVA_VAN.5
    • target_link: https://cyber.gouv.fr/sites/default/files/IMG/certificat/anssi-cc-cible_2009-48en.pdf
    • report_link: https://cyber.gouv.fr/sites/default/files/IMG/certificat/anssi-cc_2009-48en.pdf
heuristics/scheme_data/cert_id 2017/49 2009/48
heuristics/scheme_data/description Le produit certfié est la plateforme ouverte Java Card : « plateforme ID-One Cosmo v8.1-N - Large, masquée sur le composant NXP P6022M VB » dont l’identification du matériel est 084021. La version de la plateforme évaluée inclut les patchs identifiés au chapitre 1.2.4 du présent rapport. Elle est développée par OBERTHUR TECHNOLOGIES et embarquée sur le microcontrôleur NXP P6022M VB, développé et f Le produit évalué est la carte à puce ID-One Cosmo V7.0-n, plate-forme Java Card ouverte, développée par Oberthur Technologies : - compatible avec les spécifications de Java Card 2.2.2 et de VISA GlobalPlatform 2.1.1 ; - masquée sur des variantes (par la taille mémoire et les interfaces offertes) d'une même famille de composants développées par NXP ; - patchée par Optional Code r4.0 Generic
heuristics/scheme_data/developer Oberthur Technologies, NXP Semiconductors GmbH Oberthur Technologies - NXP Semiconductors GmbH
heuristics/scheme_data/enhanced
  • cert_id: 2017/49
  • certification_date: 05/09/2017
  • expiration_date: 24/04/2025
  • category: Cartes à puce
  • cc_version: Critères Communs version 3.1r4
  • developer: Oberthur Technologies, NXP Semiconductors GmbH
  • sponsor: Oberthur Technologies
  • evaluation_facility: CEA - LETI
  • level: EAL5+
  • protection_profile: PP JCS-O
  • mutual_recognition: SOG-IS CCRA
  • augmented: ALC_DVS.2, AVA_VAN.5
  • target_link: https://cyber.gouv.fr/sites/default/files/2017/09/anssi-cible-cc-2017_49-m03en.pdf
  • report_link: https://cyber.gouv.fr/sites/default/files/2017/09/anssi-cc-2017_49fr.pdf
  • cert_link: https://cyber.gouv.fr/sites/default/files/2017/09/certificat-anssi-cc-2017_49-s02.pdf
  • cert_id: 2009/48
  • certification_date: 19/11/2009
  • category: Cartes à puce
  • cc_version: Critères Communs version 3.1
  • developer: Oberthur Technologies - NXP Semiconductors GmbH
  • sponsor: Oberthur Technologies
  • evaluation_facility: THALES - CEACI
  • level: EAL5+
  • protection_profile: PP/0304
  • mutual_recognition: SOG-IS CCRA
  • augmented: ADV_IMP.2, ALC_DVS.2, AVA_VAN.5
  • target_link: https://cyber.gouv.fr/sites/default/files/IMG/certificat/anssi-cc-cible_2009-48en.pdf
  • report_link: https://cyber.gouv.fr/sites/default/files/IMG/certificat/anssi-cc_2009-48en.pdf
heuristics/scheme_data/enhanced/augmented ALC_DVS.2, AVA_VAN.5 ADV_IMP.2, ALC_DVS.2, AVA_VAN.5
heuristics/scheme_data/enhanced/cc_version Critères Communs version 3.1r4 Critères Communs version 3.1
heuristics/scheme_data/enhanced/cert_id 2017/49 2009/48
heuristics/scheme_data/enhanced/certification_date 05/09/2017 19/11/2009
heuristics/scheme_data/enhanced/developer Oberthur Technologies, NXP Semiconductors GmbH Oberthur Technologies - NXP Semiconductors GmbH
heuristics/scheme_data/enhanced/evaluation_facility CEA - LETI THALES - CEACI
heuristics/scheme_data/enhanced/protection_profile PP JCS-O PP/0304
heuristics/scheme_data/enhanced/report_link https://cyber.gouv.fr/sites/default/files/2017/09/anssi-cc-2017_49fr.pdf https://cyber.gouv.fr/sites/default/files/IMG/certificat/anssi-cc_2009-48en.pdf
heuristics/scheme_data/enhanced/target_link https://cyber.gouv.fr/sites/default/files/2017/09/anssi-cible-cc-2017_49-m03en.pdf https://cyber.gouv.fr/sites/default/files/IMG/certificat/anssi-cc-cible_2009-48en.pdf
heuristics/scheme_data/product Plateforme ID-One Cosmo v8.1-N - Large, masquée sur le composant NXP P6022M VB Carte à puce ID-One Cosmo V7.0-n en configuration Large, Standard, Basic (modes dual ou contact) ou Entry (mode dual) masquée sur composant NXP
heuristics/scheme_data/url https://cyber.gouv.fr/produits-certifies/plateforme-id-one-cosmo-v81-n-large-masquee-sur-le-composant-nxp-p6022m-vb https://cyber.gouv.fr/produits-certifies/carte-puce-id-one-cosmo-v70-n-en-configuration-large-standard-basic-modes-dual
heuristics/st_references/directly_referenced_by ANSSI-CC-2017/68, ANSSI-CC-2018/17, ANSSI-CC-2018/18, ANSSI-CC-2018/16, ANSSI-CC-2018/15 None
heuristics/st_references/directly_referencing BSI-DSZ-CC-0955-V2-2016 None
heuristics/st_references/indirectly_referenced_by ANSSI-CC-2017/68, ANSSI-CC-2018/17, ANSSI-CC-2018/18, ANSSI-CC-2018/16, ANSSI-CC-2018/15 None
heuristics/st_references/indirectly_referencing BSI-DSZ-CC-0955-V2-2016 None
pdf_data/cert_filename certificat ANSSI-CC-2017_49-S02.pdf None
pdf_data/cert_keywords
  • cc_cert_id:
    • FR:
      • ANSSI-CC-2017/49-S02: 2
  • cc_protection_profile_id:
  • cc_security_level:
    • EAL:
      • EAL5: 1
  • cc_sar:
    • ALC:
      • ALC_DVS.2: 1
    • AVA:
      • AVA_VAN.5: 1
  • cc_sfr:
  • cc_claims:
  • vendor:
    • NXP:
      • NXP: 1
      • NXP Semiconductors: 1
    • Oberthur:
      • OBERTHUR: 2
  • eval_facility:
    • CEA-LETI:
      • CEA - LETI: 2
  • symmetric_crypto:
  • asymmetric_crypto:
  • pq_crypto:
  • hash_function:
  • crypto_scheme:
  • crypto_protocol:
  • randomness:
  • cipher_mode:
  • ecc_curve:
  • crypto_engine:
  • tls_cipher_suite:
  • crypto_library:
  • vulnerability:
  • side_channel_analysis:
  • technical_report_id:
  • device_model:
  • tee_name:
  • os_name:
  • cplc_data:
  • ic_data_group:
  • standard_id:
  • javacard_version:
  • javacard_api_const:
  • javacard_packages:
  • certification_process:
None
pdf_data/cert_metadata
  • pdf_file_size_bytes: 264781
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
  • /Author:
  • /CreationDate: D:20201223101616+01'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20201223101616+01'00'
  • /Producer: Acrobat Distiller 11.0 (Windows)
  • /Title:
  • pdf_hyperlinks:
None
pdf_data/report_filename ANSSI-CC-2017_49fr.pdf anssi-cc_2009-48en.pdf
pdf_data/report_frontpage/FR/cc_security_level EAL 5 augmenté ALC_DVS.2, AVA_VAN.5 EAL 5 augmented ADV_IMP.2, ALC_DVS.2, AVA_VAN.5
pdf_data/report_frontpage/FR/cc_version Critères Communs version 3.1 révision 4 Common Criteria version 3.1
pdf_data/report_frontpage/FR/cert_id ANSSI-CC-2017/49 ANSSI-CC-2009/36
pdf_data/report_frontpage/FR/cert_item Plateforme ID-One Cosmo v8.1-N - Large, masquée sur le composant NXP P6022M VB ID-One Cosmo V7.0-n SmartCard in configuration Large, Standard, Basic (dual or contact modes) or Entry (mode dual) on NXP components
pdf_data/report_frontpage/FR/cert_item_version Identification du matériel 084021 Identification du patch générique 089041 Identification du patch additionnel 086684 JavaCard Platform version for any configuration: 7.0-n Optional Code r4.0 Generic version for any configuration: 069774
pdf_data/report_frontpage/FR/cert_lab CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France THALES - CEACI (T3S – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France Phone: +33 (0)5 62 88 28 01 or 18, email : [email protected]
pdf_data/report_frontpage/FR/developer Oberthur Technologies 420 rue d’Estienne d’Orves, 92700 Colombes, France NXP Semiconductors GmbH Stresemannallee 101, 22539 Hamburg, Allemagne Commanditaire Oberthur Technologies 420 rue d’Estienne d’Orves, 92700 Colombes, France Oberthur Technologies1 50 quai Michelet 92300 Levallois-Perret, France NXP Semiconductors GmbH1 Stresemannallee 101 D-22502 Hamburg, Germany Sponsor Oberthur Technologies 50 quai Michelet, 92300 Levallois-Perret, France
pdf_data/report_frontpage/FR/match_rules Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developer\(s\)(.+)Evaluation facility(.+)Recognition arrangements
pdf_data/report_frontpage/FR/ref_protection_profiles PP JCS-O] Java Card Protection Profile Open Configuration, version 3.0 PP/0304] Java Card System - Standard 2.1.1 Configuration Protection Profile – version 1.0b, August 2003 Certified by ANSSI
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 3
pdf_data/report_keywords/cc_cert_id/DE
  • BSI-DSZ-CC-0973-V2-2016: 3
  • BSI-DSZ-CC-0404-2007: 2
  • BSI-DSZ-CC-0410-2007: 2
  • BSI-DSZ-CC-0411-2007: 2
pdf_data/report_keywords/cc_cert_id/FR
  • ANSSI-CC-2017/49: 18
  • ANSSI-CC-2009/48: 17
  • ANSSI-CC-2009/36: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0084-2014: 1
  • ANSSI:
    • ANSSI-CC-PP-2010/03-: 1
  • BSI:
    • BSI-PP-0002-2001: 1
pdf_data/report_keywords/cc_protection_profile_id/BSI
  • BSI-PP-0084-2014: 1
  • BSI-PP-0002-2001: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 4
    • AGD_PRE: 3
  • ALC:
    • ALC_DVS.2: 3
    • ALC_FLR: 2
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_TAT: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN.5: 5
    • AVA_VAN: 2
  • ASE:
    • ASE_TSS.2: 1
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ADO:
    • ADO_DEL: 1
  • ADV:
    • ADV_IMP.2: 1
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_DVS.2: 2
    • ALC_FLR: 2
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DVS: 1
    • ALC_TAT: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN.5: 1
    • AVA_MSU.3: 1
    • AVA_VLA.4: 1
    • AVA_VAN: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
pdf_data/report_keywords/cc_sar/ADV
  • ADV_ARC: 1
  • ADV_FSP: 1
  • ADV_IMP: 1
  • ADV_INT: 1
  • ADV_SPM: 1
  • ADV_TDS: 1
  • ADV_IMP.2: 1
  • ADV_ARC: 1
  • ADV_FSP: 1
  • ADV_IMP: 1
  • ADV_TDS: 1
pdf_data/report_keywords/cc_sar/AGD/AGD_OPE 4 1
pdf_data/report_keywords/cc_sar/AGD/AGD_PRE 3 1
pdf_data/report_keywords/cc_sar/ALC
  • ALC_DVS.2: 3
  • ALC_FLR: 2
  • ALC_CMC: 1
  • ALC_CMS: 1
  • ALC_DEL: 1
  • ALC_DVS: 1
  • ALC_TAT: 1
  • ALC_DVS.2: 2
  • ALC_FLR: 2
  • ALC_CMC: 1
  • ALC_CMS: 1
  • ALC_DVS: 1
  • ALC_TAT: 1
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 3 2
pdf_data/report_keywords/cc_sar/ASE
  • ASE_TSS.2: 1
  • ASE_CCL: 1
  • ASE_ECD: 1
  • ASE_INT: 1
  • ASE_OBJ: 1
  • ASE_REQ: 1
  • ASE_SPD: 1
  • ASE_TSS: 1
  • ASE_CCL: 1
  • ASE_ECD: 1
  • ASE_INT: 1
  • ASE_OBJ: 1
  • ASE_REQ: 1
  • ASE_SPD: 1
  • ASE_TSS: 1
pdf_data/report_keywords/cc_sar/AVA
  • AVA_VAN.5: 5
  • AVA_VAN: 2
  • AVA_VAN.5: 1
  • AVA_MSU.3: 1
  • AVA_VLA.4: 1
  • AVA_VAN: 1
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN 2 1
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN.5 5 1
pdf_data/report_keywords/cc_security_level/EAL
  • EAL 5: 3
  • EAL2: 2
  • EAL5: 1
  • EAL7: 1
  • EAL 1: 1
  • EAL 3: 1
  • EAL 7: 1
  • EAL 5: 3
  • EAL4: 1
  • EAL5: 1
  • EAL7: 1
  • EAL 4: 1
  • EAL 1: 1
  • EAL 3: 1
  • EAL 7: 1
  • EAL 5 augmented: 2
pdf_data/report_keywords/cc_security_level/ITSEC
  • ITSEC E6 Elevé: 1
  • ITSEC E6 and: 1
pdf_data/report_keywords/eval_facility
  • CESTI:
    • CESTI: 1
  • CEA-LETI:
    • CEA - LETI: 1
  • Thales:
    • THALES - CEACI: 1
pdf_data/report_keywords/javacard_version
  • JavaCard:
    • Java Card 2.2.2: 1
  • GlobalPlatform:
    • GlobalPlatform 2.1.1: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • SCP:
    • SCP01: 1
    • SCP02: 1
    • SCP03: 1
  • CC:
    • CCMB-2006-09-001: 1
    • CCMB-2007-09-002: 1
    • CCMB-2007-09-003: 1
    • CCMB-2007-09-004: 1
pdf_data/report_keywords/standard_id/CC
  • CCMB-2012-09-001: 1
  • CCMB-2012-09-002: 1
  • CCMB-2012-09-003: 1
  • CCMB-2012-09-004: 1
  • CCMB-2006-09-001: 1
  • CCMB-2007-09-002: 1
  • CCMB-2007-09-003: 1
  • CCMB-2007-09-004: 1
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/vendor/NXP/NXP 30 26
pdf_data/report_keywords/vendor/NXP/NXP Semiconductors 2 3
pdf_data/report_keywords/vendor/Oberthur
  • Oberthur Technologies: 2
  • OBERTHUR: 7
  • Oberthur: 2
  • Oberthur Technologies: 15
pdf_data/report_keywords/vendor/Oberthur/Oberthur Technologies 2 15
pdf_data/report_metadata
  • pdf_file_size_bytes: 1020447
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 17
  • /Title: ANSSI-CC-2017/49
  • /Author: Christian Benardeau
  • /Subject: ID-One Cosmo v8.1-N - Large, masquée sur le composant NXP P6022M VB
  • /Keywords: ANSSI-CC-CER-F-07.025
  • /Creator: Microsoft® Word 2010
  • /CreationDate: D:20170908111651+02'00'
  • /ModDate: D:20170908111651+02'00'
  • /Producer: Microsoft® Word 2010
  • pdf_hyperlinks: mailto:[email protected], http://www.ssi.gouv.fr/
  • pdf_file_size_bytes: 159490
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 17
  • /CreationDate: D:20100204113143+01'00'
  • /Keywords:
  • /Producer: Acrobat Distiller 8.0.0 (Windows)
  • /ModDate: D:20100204113143+01'00'
  • pdf_hyperlinks:
pdf_data/report_metadata//CreationDate D:20170908111651+02'00' D:20100204113143+01'00'
pdf_data/report_metadata//Keywords ANSSI-CC-CER-F-07.025
pdf_data/report_metadata//ModDate D:20170908111651+02'00' D:20100204113143+01'00'
pdf_data/report_metadata//Producer Microsoft® Word 2010 Acrobat Distiller 8.0.0 (Windows)
pdf_data/report_metadata/pdf_file_size_bytes 1020447 159490
pdf_data/report_metadata/pdf_hyperlinks mailto:[email protected], http://www.ssi.gouv.fr/
pdf_data/st_filename anssi-cible-cc-2017_49en.pdf anssi-cc-cible_2009-48en.pdf
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC 9 2
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDH/ECDH 2 1
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA 4 1
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman 5 4
pdf_data/st_keywords/cc_cert_id/DE
  • BSI-DSZ-CC-0955-V2-2016: 2
  • BSI-DSZ-CC-0973-V2-: 1
  • BSI-DSZ-CC-0955-V2-: 2
  • BSI-DSZ-CC-0410: 3
  • BSI-DSZ-CC-0404: 4
  • BSI-DSZ-CC-0411: 1
  • BSI-DSZ-CC-0411-2007-MA-03: 2
  • BSI-DSZ-CC-0410-2007-MA-04: 3
  • BSI-DSZ-CC-0404-2007-MA-04: 3
pdf_data/st_keywords/cc_claims/A
  • A.IC: 2
  • A.DELETION: 3
  • A.APPLET: 5
  • A.VERIFICATION: 5
  • A.NATIVE: 1
  • A.VERIFICATION: 1
  • A.APPLET: 1
pdf_data/st_keywords/cc_claims/A/A.APPLET 5 1
pdf_data/st_keywords/cc_claims/A/A.VERIFICATION 5 1
pdf_data/st_keywords/cc_claims/D
  • D.BIO: 12
  • D.CONFIG: 4
  • D.SENSITIVE_DATA: 2
  • D.ARRAY: 6
  • D.JCS_KEYS: 7
  • D.APP_CODE: 6
  • D.APP_C_DATA: 3
  • D.APP_I_DATA: 4
  • D.PIN: 9
  • D.API_DATA: 3
  • D.CRYPTO: 4
  • D.JCS_CODE: 3
  • D.JCS_DATA: 5
  • D.SEC_DATA: 7
  • D.NB_REMAINTRYGLB: 1
  • D.APP_CODE: 5
  • D.APP_C_DATA: 3
  • D.APP_I_DATA: 3
  • D.PIN: 6
  • D.JCS_CODE: 3
  • D.JCS_DATA: 5
  • D.SEC_DATA: 7
  • D.API_DATA: 3
  • D.CRYPTO: 4
  • D.CONFIG: 2
  • D.SENSITIVE_DATA: 1
  • D.ARRAY: 3
  • D.KEY: 2
  • D.AUDITLOG: 1
  • D.LOADFILE: 1
  • D.GLPIN: 1
  • D.APPLILIFECYC: 1
  • D.NB_REMAINTRYGLB: 1
pdf_data/st_keywords/cc_claims/D/D.APP_CODE 6 5
pdf_data/st_keywords/cc_claims/D/D.APP_I_DATA 4 3
pdf_data/st_keywords/cc_claims/D/D.ARRAY 6 3
pdf_data/st_keywords/cc_claims/D/D.CONFIG 4 2
pdf_data/st_keywords/cc_claims/D/D.PIN 9 6
pdf_data/st_keywords/cc_claims/D/D.SENSITIVE_DATA 2 1
pdf_data/st_keywords/cc_claims/O
  • O.IC: 2
  • O.TOE: 2
  • O.CARD_MANAGEMENT: 51
  • O.SCP: 57
  • O.RESIDENT_APPLICATION: 23
  • O.SECURE_COMPARE: 10
  • O.PATCH_LOADING: 26
  • O.BIO-: 2
  • O.SID: 33
  • O.FIREWALL: 64
  • O.GLOBAL_ARRAYS_CONFID: 20
  • O.GLOBAL_ARRAYS_INTEG: 12
  • O.NATIVE: 14
  • O.OPERATE: 38
  • O.REALLOCATION: 18
  • O.RESOURCES: 26
  • O.ALARM: 26
  • O.CIPHER: 19
  • O.KEY-MNGT: 26
  • O.PIN-MNGT: 27
  • O.BIO-MNGT: 23
  • O.TRANSACTION: 18
  • O.OBJ-DELETION: 9
  • O.DELETION: 14
  • O.LOAD: 17
  • O.INSTALL: 17
  • O.PIN-: 3
  • O.REMOTE: 4
  • O.APPLET: 16
  • O.CODE_PKG: 22
  • O.JAVAOBJECT: 49
  • O.REMOTE_MTHD: 1
  • O.REMOTE_OBJ: 1
  • O.ROR: 1
  • O.GLOBAL_ARRRAYS_INTEG: 1
  • O.GLOBAL_ARRRAYS_CONFID: 2
  • O.RND: 1
  • O.TDES: 1
  • O.AES: 1
  • O.CUST_RECONF_PLAIN: 1
  • O.FM_FW: 1
  • O.MEM_ACCESS: 1
  • O.SFR_ACCESS: 1
  • O.PUF: 1
  • O.LOAD: 3
  • O.CARD-MANAGEMENT: 3
  • O.SID: 1
  • O.OPERATE: 1
  • O.RESOURCES: 1
  • O.FIREWALL: 1
  • O.NATIVE: 1
  • O.REALLOCATION: 1
  • O.SHRD_VAR_CONFID: 1
  • O.SHRD_VAR_INTEG: 1
  • O.INSTALL: 1
  • O.DELETION: 1
  • O.OBJ-DELETION: 1
  • O.ALARM: 1
  • O.TRANSACTION: 1
  • O.CIPHER: 1
  • O.PIN-MNGT: 1
  • O.KEY-MNGT: 1
  • O.SECURE_COMPARE: 1
  • O.SCP: 3
  • O.JAVAOBJECT: 31
  • O.APPLET: 16
  • O.CODE_PKG: 6
  • O.JAVAOBJEC: 4
  • O.CODE_PCKG: 8
pdf_data/st_keywords/cc_claims/O/O.ALARM 26 1
pdf_data/st_keywords/cc_claims/O/O.CIPHER 19 1
pdf_data/st_keywords/cc_claims/O/O.CODE_PKG 22 6
pdf_data/st_keywords/cc_claims/O/O.DELETION 14 1
pdf_data/st_keywords/cc_claims/O/O.FIREWALL 64 1
pdf_data/st_keywords/cc_claims/O/O.INSTALL 17 1
pdf_data/st_keywords/cc_claims/O/O.JAVAOBJECT 49 31
pdf_data/st_keywords/cc_claims/O/O.KEY-MNGT 26 1
pdf_data/st_keywords/cc_claims/O/O.LOAD 17 3
pdf_data/st_keywords/cc_claims/O/O.NATIVE 14 1
pdf_data/st_keywords/cc_claims/O/O.OBJ-DELETION 9 1
pdf_data/st_keywords/cc_claims/O/O.OPERATE 38 1
pdf_data/st_keywords/cc_claims/O/O.PIN-MNGT 27 1
pdf_data/st_keywords/cc_claims/O/O.REALLOCATION 18 1
pdf_data/st_keywords/cc_claims/O/O.RESOURCES 26 1
pdf_data/st_keywords/cc_claims/O/O.SCP 57 3
pdf_data/st_keywords/cc_claims/O/O.SECURE_COMPARE 10 1
pdf_data/st_keywords/cc_claims/O/O.SID 33 1
pdf_data/st_keywords/cc_claims/O/O.TRANSACTION 18 1
pdf_data/st_keywords/cc_claims/OE
  • OE.VERIFICATION: 38
  • OE.CODE-EVIDENCE: 19
  • OE.CARD_MANAGEMENT: 3
  • OE.SCP: 6
  • OE.APPLET: 8
  • OE.CODE-: 2
  • OE.CHECK-INIT: 1
  • OE.NATIVE: 1
  • OE.VERIFICATION: 1
  • OE.APPLET: 1
pdf_data/st_keywords/cc_claims/OE/OE.APPLET 8 1
pdf_data/st_keywords/cc_claims/OE/OE.VERIFICATION 38 1
pdf_data/st_keywords/cc_claims/OP
  • OP.ARRAY_ACCESS: 9
  • OP.CREATE: 7
  • OP.DELETE_APPLET: 4
  • OP.DELETE_PCKG: 3
  • OP.DELETE_PCKG_APPLET: 3
  • OP.FLOW: 3
  • OP.IMPORT_KEY: 2
  • OP.INSTANCE_FIELD: 6
  • OP.INVK_INTERFACE: 7
  • OP.INVK_VIRTUAL: 6
  • OP.JAVA: 5
  • OP.THROW: 5
  • OP.TYPE_ACCESS: 5
  • OP.LOCAL_STACK_ACCESS: 3
  • OP.OPERAND_STACK_ACCE: 1
  • OP.PUT: 6
  • OP.RET_RORD: 1
  • OP.STATIC_FIELD: 3
  • OP.OPERAND_STACK_ACCESS: 2
  • OP.PUT: 4
  • OP.JAVA: 4
  • OP.CREATE: 5
  • OP.DELETE_APPLET: 3
  • OP.DELETE_PCKG: 2
  • OP.DELETE_PCKG_APPLET: 2
  • OP.ARRAY_ACCESS: 3
  • OP.INSTANCE_FIELD: 2
  • OP.INVK_VIRTUAL: 3
  • OP.INVK_INTERFACE: 4
  • OP.THROW: 3
  • OP.TYPE_ACCESS: 3
  • OP.SEND: 1
  • OP.RECEIVE: 1
pdf_data/st_keywords/cc_claims/OP/OP.ARRAY_ACCESS 9 3
pdf_data/st_keywords/cc_claims/OP/OP.CREATE 7 5
pdf_data/st_keywords/cc_claims/OP/OP.DELETE_APPLET 4 3
pdf_data/st_keywords/cc_claims/OP/OP.DELETE_PCKG 3 2
pdf_data/st_keywords/cc_claims/OP/OP.DELETE_PCKG_APPLET 3 2
pdf_data/st_keywords/cc_claims/OP/OP.INSTANCE_FIELD 6 2
pdf_data/st_keywords/cc_claims/OP/OP.INVK_INTERFACE 7 4
pdf_data/st_keywords/cc_claims/OP/OP.INVK_VIRTUAL 6 3
pdf_data/st_keywords/cc_claims/OP/OP.JAVA 5 4
pdf_data/st_keywords/cc_claims/OP/OP.PUT 6 4
pdf_data/st_keywords/cc_claims/OP/OP.THROW 5 3
pdf_data/st_keywords/cc_claims/OP/OP.TYPE_ACCESS 5 3
pdf_data/st_keywords/cc_claims/OSP/OSP.VERIFICATION 5 1
pdf_data/st_keywords/cc_claims/T
  • T.CONFIGURATION: 5
  • T.CONF_DATA_APPLET: 5
  • T.PATCH_LOADING: 5
  • T.CONFID-APPLI-DATA: 18
  • T.CONFID-JCS-CODE: 6
  • T.CONFID-JCS-DATA: 11
  • T.INTEG-APPLI-CODE: 11
  • T.INTEG-APPLI-DATA: 21
  • T.INTEG-JCS-CODE: 6
  • T.INTEG-JCS-DATA: 12
  • T.SID: 18
  • T.EXE-CODE: 8
  • T.NATIVE: 6
  • T.RESOURCES: 8
  • T.DELETION: 6
  • T.INSTALL: 6
  • T.OBJ-DELETION: 4
  • T.PHYSICAL: 4
  • T.EXE-CODE-REMOTE: 3
  • T.INTEG-APPLI-: 5
  • T.INTEG-: 2
  • T.EXE-: 1
  • T.IC: 2
  • T.RND: 1
  • T.CONFIGURATION: 2
  • T.CONF_DATA_APPLET: 2
  • T.PHYSICAL: 1
  • T.CONFID-JCS-CODE: 1
  • T.CONFID-APPLI-DATA: 1
  • T.CONFID-JCS-DATA: 1
  • T.INTEG-APPLI-CODE: 4
  • T.INTEG-JCS-CODE: 1
  • T.INTEG-APPLI-DATA: 4
  • T.INTEG-JCS-DATA: 1
  • T.INTEG-APPLICODE: 1
  • T.INTEG-APPLIDATA: 1
  • T.SID: 2
  • T.EXE-CODE: 2
  • T.NATIVE: 1
  • T.RESSOURCES: 1
  • T.INSTALL: 1
  • T.DELETION: 1
  • T.OBJ-DELETION: 1
pdf_data/st_keywords/cc_claims/T/T.CONFID-APPLI-DATA 18 1
pdf_data/st_keywords/cc_claims/T/T.CONFID-JCS-CODE 6 1
pdf_data/st_keywords/cc_claims/T/T.CONFID-JCS-DATA 11 1
pdf_data/st_keywords/cc_claims/T/T.CONFIGURATION 5 2
pdf_data/st_keywords/cc_claims/T/T.CONF_DATA_APPLET 5 2
pdf_data/st_keywords/cc_claims/T/T.DELETION 6 1
pdf_data/st_keywords/cc_claims/T/T.EXE-CODE 8 2
pdf_data/st_keywords/cc_claims/T/T.INSTALL 6 1
pdf_data/st_keywords/cc_claims/T/T.INTEG-APPLI-CODE 11 4
pdf_data/st_keywords/cc_claims/T/T.INTEG-APPLI-DATA 21 4
pdf_data/st_keywords/cc_claims/T/T.INTEG-JCS-CODE 6 1
pdf_data/st_keywords/cc_claims/T/T.INTEG-JCS-DATA 12 1
pdf_data/st_keywords/cc_claims/T/T.NATIVE 6 1
pdf_data/st_keywords/cc_claims/T/T.OBJ-DELETION 4 1
pdf_data/st_keywords/cc_claims/T/T.PHYSICAL 4 1
pdf_data/st_keywords/cc_claims/T/T.SID 18 2
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 1
  • ANSSI:
    • ANSSI-CC-PP-2010/03_M01: 1
  • BSI:
    • BSI-PP-0035: 1
pdf_data/st_keywords/cc_protection_profile_id/BSI
  • BSI-CC-PP-0084-2014: 1
  • BSI-PP-0035: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 6
    • ADV_FSP.1: 4
    • ADV_TDS.1: 2
    • ADV_FSP.5: 8
    • ADV_TDS.4: 8
    • ADV_IMP.1: 9
    • ADV_TDS.3: 4
    • ADV_FSP.2: 2
    • ADV_FSP.4: 1
    • ADV_IMP: 1
    • ADV_ARC: 1
    • ADV_COMP: 1
  • AGD:
    • AGD_PRE: 12
    • AGD_OPE: 2
    • AGD_OPE.1: 10
    • AGD_PRE.1: 6
  • ALC:
    • ALC_DVS.2: 20
    • ALC_DVS: 1
    • ALC_TAT.1: 2
    • ALC_TAT.2: 3
    • ALC_CMC.4: 1
    • ALC_CMS.1: 1
    • ALC_DVS.1: 2
    • ALC_LCD.1: 3
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
  • ATE:
    • ATE_COV.2: 3
    • ATE_FUN.1: 6
    • ATE_COV.1: 2
    • ATE_DPT.1: 1
    • ATE_DPT.3: 1
  • AVA:
    • AVA_VAN.5: 21
    • AVA_VAN: 9
  • ASE:
    • ASE_TSS.2: 6
    • ASE_CCL.1: 1
    • ASE_ECD.1: 4
    • ASE_INT.1: 5
    • ASE_REQ.1: 2
    • ASE_REQ.2: 2
    • ASE_OBJ.2: 3
    • ASE_SPD.1: 2
    • ASE_TSS.1: 1
  • ADV:
    • ADV_IMP.2: 4
  • ALC:
    • ALC_DVS.2: 3
  • AVA:
    • AVA_VAN.5: 3
pdf_data/st_keywords/cc_sar/ADV
  • ADV_ARC.1: 6
  • ADV_FSP.1: 4
  • ADV_TDS.1: 2
  • ADV_FSP.5: 8
  • ADV_TDS.4: 8
  • ADV_IMP.1: 9
  • ADV_TDS.3: 4
  • ADV_FSP.2: 2
  • ADV_FSP.4: 1
  • ADV_IMP: 1
  • ADV_ARC: 1
  • ADV_COMP: 1
  • ADV_IMP.2: 4
pdf_data/st_keywords/cc_sar/ALC
  • ALC_DVS.2: 20
  • ALC_DVS: 1
  • ALC_TAT.1: 2
  • ALC_TAT.2: 3
  • ALC_CMC.4: 1
  • ALC_CMS.1: 1
  • ALC_DVS.1: 2
  • ALC_LCD.1: 3
  • ALC_CMS.5: 1
  • ALC_DEL.1: 1
  • ALC_DVS.2: 3
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 20 3
pdf_data/st_keywords/cc_sar/AVA
  • AVA_VAN.5: 21
  • AVA_VAN: 9
  • AVA_VAN.5: 3
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.5 21 3
pdf_data/st_keywords/cc_security_level/EAL
  • EAL5+: 4
  • EAL5: 11
  • EAL 5+: 3
  • EAL5 augmented: 1
  • EAL5: 3
  • EAL5+: 1
  • EAL5 augmented: 3
pdf_data/st_keywords/cc_security_level/EAL/EAL5 11 3
pdf_data/st_keywords/cc_security_level/EAL/EAL5 augmented 1 3
pdf_data/st_keywords/cc_security_level/EAL/EAL5+ 4 1
pdf_data/st_keywords/cc_sfr/FAU
  • FAU_STG.2: 10
  • FAU_ARP.1: 24
  • FAU_ARP.1.1: 1
  • FAU_STG.2.1: 1
  • FAU_STG.2.2: 1
  • FAU_STG.2.3: 1
  • FAU_SAA.1: 3
  • FAU_GEN.1: 2
  • FAU_SAS.1: 1
  • FAU_ARP: 2
  • FAU_ARP.1: 4
  • FAU_SAR: 1
  • FAU_SAR.1: 2
  • FAU_GEN: 1
  • FAU_GEN.1: 2
  • FAU_SAA: 1
  • FAU_SAA.1: 2
pdf_data/st_keywords/cc_sfr/FAU/FAU_ARP.1 24 4
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAA.1 3 2
pdf_data/st_keywords/cc_sfr/FCO/FCO_NRO 19 3
pdf_data/st_keywords/cc_sfr/FCO/FCO_NRO.2 8 9
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_RNG: 14
  • FCS_RNG.1: 7
  • FCS_COP: 29
  • FCS_CKM: 23
  • FCS_RNG.1.1: 1
  • FCS_RNG.1.2: 1
  • FCS_CKM.1: 24
  • FCS_CKM.1.1: 1
  • FCS_CKM.2: 12
  • FCS_CKM.2.1: 1
  • FCS_CKM.3: 9
  • FCS_CKM.3.1: 1
  • FCS_CKM.4: 23
  • FCS_CKM.4.1: 1
  • FCS_COP.1: 32
  • FCS_COP.1.1: 1
  • FCS_RNG: 4
  • FCS_RNG.1: 7
  • FCS_RNG.1.1: 1
  • FCS_RNG.1.2: 1
  • FCS_CKM: 5
  • FCS_CKM.1: 3
  • FCS_CKM.3: 1
  • FCS_CKM.3.1: 1
  • FCS_CKM.4: 2
  • FCS_CKM.4.1: 1
  • FCS_COP: 7
  • FCS_COP.1: 7
  • FCS_CKM.2: 1
  • FCS_CKM.2.1: 1
  • FCS_COP.1.1: 1
  • FCS_RND: 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM 23 5
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 24 3
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 12 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.3 9 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 23 2
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP 29 7
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 32 7
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG 14 4
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACC: 88
  • FDP_ACF: 73
  • FDP_UCT: 16
  • FDP_ITC: 31
  • FDP_UIT: 19
  • FDP_ACC.2: 13
  • FDP_ACF.1: 34
  • FDP_IFC: 31
  • FDP_IFC.1: 22
  • FDP_IFF: 24
  • FDP_IFF.1: 16
  • FDP_RIP: 151
  • FDP_RIP.1: 10
  • FDP_ROL.1: 5
  • FDP_ROL: 17
  • FDP_SDI.2: 13
  • FDP_SDI.2.1: 1
  • FDP_SDI.2.2: 1
  • FDP_ITC.2: 16
  • FDP_IFC.2: 2
  • FDP_UIT.1: 4
  • FDP_UCT.1: 1
  • FDP_ITC.1: 10
  • FDP_ACC.1: 24
  • FDP_SDC.1: 1
  • FDP_ITT.1: 1
  • FDP_IFC: 2
  • FDP_IFC.1: 1
  • FDP_IFF: 2
  • FDP_IFF.1: 10
  • FDP_RIP: 9
  • FDP_RIP.1: 10
  • FDP_ROL: 1
  • FDP_ROL.1: 2
  • FDP_SDI.2: 1
  • FDP_SDI.2.1: 1
  • FDP_SDI.2.2: 1
  • FDP_SDI.1: 1
  • FDP_SDI.1.1: 1
  • FDP_ACC: 5
  • FDP_ACC.2: 9
  • FDP_ACF: 4
  • FDP_ACF.1: 18
  • FDP_UCT: 1
  • FDP_UCT.1: 1
  • FDP_ITC: 2
  • FDP_ITC.1: 3
  • FDP_IFC.2: 2
  • FDP_UIT: 1
  • FDP_UIT.1: 2
  • FDP_ITC.2: 5
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC 88 5
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.2 13 9
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF 73 4
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 34 18
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC 31 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 22 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFF 24 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFF.1 16 10
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC 31 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 10 3
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 16 5
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP 151 9
pdf_data/st_keywords/cc_sfr/FDP/FDP_ROL 17 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ROL.1 5 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2 13 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_UCT 16 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT 19 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT.1 4 2
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_AFL: 49
  • FIA_UAU: 67
  • FIA_UID: 38
  • FIA_ATD: 20
  • FIA_ATD.1: 3
  • FIA_UID.2: 1
  • FIA_USB: 10
  • FIA_USB.1: 3
  • FIA_UID.1: 16
  • FIA_AFL.1: 10
  • FIA_UAU.1: 11
  • FIA_UAU.4: 2
  • FIA_UAU.7: 2
  • FIA_ATD: 2
  • FIA_ATD.1: 3
  • FIA_UID: 4
  • FIA_UID.2: 1
  • FIA_USB.1: 2
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
  • FIA_AFL: 4
  • FIA_AFL.1: 8
  • FIA_UAU: 6
  • FIA_UAU.1: 4
  • FIA_UAU.4: 2
  • FIA_UAU.7: 2
  • FIA_UID.1: 6
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL 49 4
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1 10 8
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD 20 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU 67 6
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 11 4
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID 38 4
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 16 6
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.1 3 2
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_SMR: 69
  • FMT_MSA: 224
  • FMT_SMF: 73
  • FMT_MOF: 12
  • FMT_MTD: 51
  • FMT_MSA.1: 20
  • FMT_MSA.2: 5
  • FMT_MSA.3: 27
  • FMT_SMF.1: 31
  • FMT_SMF.1.1: 1
  • FMT_SMR.1: 57
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_MTD.1: 5
  • FMT_MTD.3: 1
  • FMT_SMR.2: 6
  • FMT_MOF.1: 1
  • FMT_MTD.2: 2
  • FMT_LIM.1: 1
  • FMT_LIM.2: 1
  • FMT_MSA: 11
  • FMT_MSA.2: 1
  • FMT_MSA.3: 8
  • FMT_SMR: 6
  • FMT_SMR.1: 9
  • FMT_MSA.1: 6
  • FMT_MTD: 3
  • FMT_MTD.1: 3
  • FMT_MTD.3: 1
  • FMT_MTD.3.1: 1
  • FMT_SMF: 4
  • FMT_SMF.1: 4
  • FMT_MOF: 2
  • FMT_MOF.1: 2
  • FMT_SMR.2: 6
  • FMT_MTD.2: 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_MOF 12 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_MOF.1 1 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA 224 11
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 20 6
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.2 5 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 27 8
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD 51 3
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 5 3
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF 73 4
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 31 4
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR 69 6
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 57 9
pdf_data/st_keywords/cc_sfr/FPR/FPR_UNO 29 4
pdf_data/st_keywords/cc_sfr/FPR/FPR_UNO.1 17 5
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_TST.1: 13
  • FPT_TDC: 9
  • FPT_PHP: 9
  • FPT_FLS: 57
  • FPT_RCV: 39
  • FPT_FLS.1: 23
  • FPT_FLS.1.1: 2
  • FPT_TDC.1: 12
  • FPT_TDC.1.1: 1
  • FPT_TDC.1.2: 1
  • FPT_RCV.3: 11
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
  • FPT_PHP.3: 3
  • FPT_RCV.4: 1
  • FPT_ITT.1: 1
  • FPT_TDC.1: 3
  • FPT_TDC.1.1: 1
  • FPT_TDC.1.2: 1
  • FPT_FLS: 5
  • FPT_FLS.1: 5
  • FPT_TST: 2
  • FPT_TST.1: 6
  • FPT_PHP: 3
  • FPT_PHP.3: 2
  • FPT_RCV: 3
  • FPT_RCV.3: 8
  • FPT_RCV.4: 1
  • FPT_TDC: 1
  • FPT_PHP.2: 3
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS 57 5
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 23 5
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP 9 3
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 3 2
pdf_data/st_keywords/cc_sfr/FPT/FPT_RCV 39 3
pdf_data/st_keywords/cc_sfr/FPT/FPT_RCV.3 11 8
pdf_data/st_keywords/cc_sfr/FPT/FPT_TDC 9 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_TDC.1 12 3
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 13 6
pdf_data/st_keywords/cc_sfr/FRU
  • FRU_FLT: 10
  • FRU_FLT.1: 1
  • FRU_FLT.2: 1
  • FRU_FLT: 1
  • FRU_FLT.1: 1
  • FRU_RSA: 1
  • FRU_RSA.1: 1
pdf_data/st_keywords/cc_sfr/FRU/FRU_FLT 10 1
pdf_data/st_keywords/cc_sfr/FTP
  • FTP_ITC: 28
  • FTP_ITC.1: 10
  • FTP_TRP.1: 4
  • FTP_ITC: 1
  • FTP_ITC.1: 3
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC 28 1
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 10 3
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
pdf_data/st_keywords/cipher_mode
  • ECB:
    • ECB: 3
pdf_data/st_keywords/crypto_scheme/KA
  • Key Agreement: 3
  • Key agreement: 1
  • Key Agreement: 2
pdf_data/st_keywords/crypto_scheme/KA/Key Agreement 3 2
pdf_data/st_keywords/crypto_scheme/MAC/MAC 2 1
pdf_data/st_keywords/hash_function/SHA
  • SHA1:
    • SHA-1: 5
    • SHA1: 1
  • SHA2:
    • SHA-224: 4
    • SHA-384: 4
    • SHA-256: 4
    • SHA-512: 3
  • SHA3:
    • SHA3-224: 2
    • SHA3-256: 2
    • SHA3-384: 2
    • SHA3-512: 2
    • SHA-3: 3
    • SHA3: 4
  • SHA1:
    • SHA-1: 3
  • SHA2:
    • SHA-256: 1
    • SHA-384: 1
    • SHA-512: 1
pdf_data/st_keywords/hash_function/SHA/SHA1
  • SHA-1: 5
  • SHA1: 1
  • SHA-1: 3
pdf_data/st_keywords/hash_function/SHA/SHA1/SHA-1 5 3
pdf_data/st_keywords/hash_function/SHA/SHA2
  • SHA-224: 4
  • SHA-384: 4
  • SHA-256: 4
  • SHA-512: 3
  • SHA-256: 1
  • SHA-384: 1
  • SHA-512: 1
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-256 4 1
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-384 4 1
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-512 3 1
pdf_data/st_keywords/javacard_api_const/misc/TYPE_ACCESS 5 3
pdf_data/st_keywords/javacard_packages
  • java:
    • java.rmi: 2
  • javacard:
    • javacard.security: 4
    • javacard.crypto: 1
    • javacard.framework: 4
  • javacardx:
    • javacardx.biometry: 1
    • javacardx.crypto: 2
    • javacardx.security: 1
    • javacardx.framework.util: 1
  • com:
    • com.oberthurcs.javacard: 3
  • java:
    • java.rmi: 1
  • javacard:
    • javacard.framework: 3
    • javacard.security: 1
  • javacardx:
    • javacardx.framework.util: 1
pdf_data/st_keywords/javacard_packages/java/java.rmi 2 1
pdf_data/st_keywords/javacard_packages/javacard
  • javacard.security: 4
  • javacard.crypto: 1
  • javacard.framework: 4
  • javacard.framework: 3
  • javacard.security: 1
pdf_data/st_keywords/javacard_packages/javacard/javacard.framework 4 3
pdf_data/st_keywords/javacard_packages/javacard/javacard.security 4 1
pdf_data/st_keywords/javacard_packages/javacardx
  • javacardx.biometry: 1
  • javacardx.crypto: 2
  • javacardx.security: 1
  • javacardx.framework.util: 1
  • javacardx.framework.util: 1
pdf_data/st_keywords/javacard_version/GlobalPlatform
  • Global Platform 2.2.1: 2
  • GlobalPlatform 2.1.1: 5
pdf_data/st_keywords/javacard_version/JavaCard
  • Java Card 3.0.4: 4
  • Java Card 2.2.2: 5
pdf_data/st_keywords/randomness/RNG
  • RNG: 16
  • RND: 2
  • RNG: 8
pdf_data/st_keywords/randomness/RNG/RNG 16 8
pdf_data/st_keywords/side_channel_analysis
  • SCA:
    • Leak-Inherent: 2
    • physical probing: 4
    • DPA: 2
    • SPA: 1
  • FI:
    • physical tampering: 2
    • malfunction: 2
    • Malfunction: 2
    • fault injection: 1
  • SCA:
    • physical probing: 2
    • SPA: 1
    • DPA: 1
  • FI:
    • physical tampering: 4
    • malfunction: 2
    • fault injection: 1
  • other:
    • JIL: 1
pdf_data/st_keywords/side_channel_analysis/FI
  • physical tampering: 2
  • malfunction: 2
  • Malfunction: 2
  • fault injection: 1
  • physical tampering: 4
  • malfunction: 2
  • fault injection: 1
pdf_data/st_keywords/side_channel_analysis/FI/physical tampering 2 4
pdf_data/st_keywords/side_channel_analysis/SCA
  • Leak-Inherent: 2
  • physical probing: 4
  • DPA: 2
  • SPA: 1
  • physical probing: 2
  • SPA: 1
  • DPA: 1
pdf_data/st_keywords/side_channel_analysis/SCA/DPA 2 1
pdf_data/st_keywords/side_channel_analysis/SCA/physical probing 4 2
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 46-3: 4
    • FIPS PUB 81: 6
    • FIPS PUB 197: 5
    • FIPS PUB 180-3: 2
    • FIPS PUB 202: 3
    • FIPS 140-2: 1
    • FIPS PUB 186-3: 1
  • NIST:
    • NIST SP 800-90: 2
  • PKCS:
    • PKCS#1: 3
  • BSI:
    • AIS31: 1
  • ISO:
    • ISO/IEC 7816: 2
    • ISO/IEC 14443: 2
    • ISO/IEC 9797: 8
    • ISO/IEC 9796-: 1
    • ISO/IEC 7816-6: 1
    • ISO/IEC 9796-1: 1
    • ISO/IEC 9797-1: 1
  • SCP:
    • SCP02: 4
    • SCP03: 5
  • FIPS:
    • FIPS PUB 46-3: 5
    • FIPS PUB 81: 4
    • FIPS PUB 180-2: 1
    • FIPS PUB 186-2: 1
    • FIPS PUB 197: 2
    • FIPS 180-3: 1
  • PKCS:
    • PKCS#1: 2
pdf_data/st_keywords/standard_id/FIPS
  • FIPS PUB 46-3: 4
  • FIPS PUB 81: 6
  • FIPS PUB 197: 5
  • FIPS PUB 180-3: 2
  • FIPS PUB 202: 3
  • FIPS 140-2: 1
  • FIPS PUB 186-3: 1
  • FIPS PUB 46-3: 5
  • FIPS PUB 81: 4
  • FIPS PUB 180-2: 1
  • FIPS PUB 186-2: 1
  • FIPS PUB 197: 2
  • FIPS 180-3: 1
pdf_data/st_keywords/standard_id/FIPS/FIPS PUB 197 5 2
pdf_data/st_keywords/standard_id/FIPS/FIPS PUB 46-3 4 5
pdf_data/st_keywords/standard_id/FIPS/FIPS PUB 81 6 4
pdf_data/st_keywords/standard_id/PKCS/PKCS#1 3 2
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 26
  • DES:
    • DES:
      • DES: 18
    • 3DES:
      • TDES: 15
      • Triple-DES: 1
  • constructions:
    • MAC:
      • HMAC: 2
      • CMAC: 1
  • AES_competition:
    • AES:
      • AES: 11
  • DES:
    • DES:
      • DES: 19
    • 3DES:
      • 3DES: 1
      • TDES: 4
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 26 11
pdf_data/st_keywords/symmetric_crypto/DES/3DES
  • TDES: 15
  • Triple-DES: 1
  • 3DES: 1
  • TDES: 4
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDES 15 4
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES 18 19
pdf_data/st_keywords/vendor/NXP/NXP 20 7
pdf_data/st_keywords/vendor/Oberthur
  • Oberthur Technologies: 35
  • Oberthur: 13
  • Oberthur Technologies: 190
  • Oberthur: 1
  • OBERTHUR: 2
pdf_data/st_keywords/vendor/Oberthur/Oberthur 13 1
pdf_data/st_keywords/vendor/Oberthur/Oberthur Technologies 35 190
pdf_data/st_metadata
  • pdf_file_size_bytes: 3563890
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 228
  • /CreationDate: D:20170816182749+02'00'
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20170911162201+02'00'
  • /Producer: Microsoft® Office Word 2007
  • /Subject:
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 682980
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 93
  • /CreationDate: D:20091125163034+01'00'
  • /Keywords:
  • /Producer: AFPL Ghostscript 8.50
  • /ModDate: D:20091125163034+01'00'
  • pdf_hyperlinks:
pdf_data/st_metadata//CreationDate D:20170816182749+02'00' D:20091125163034+01'00'
pdf_data/st_metadata//ModDate D:20170911162201+02'00' D:20091125163034+01'00'
pdf_data/st_metadata//Producer Microsoft® Office Word 2007 AFPL Ghostscript 8.50
pdf_data/st_metadata/pdf_file_size_bytes 3563890 682980
pdf_data/st_metadata/pdf_number_of_pages 228 93
dgst dfd11a506e301942 f362eb2c23fa3a77