Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Strong Customer Authentication pour Apple Pay sur iPhone 13 avec A15 Bionic exécutant iOS 15.4.1 Version 15.4.1 (build 19E258)
ANSSI-CC-2023/18
Composite system comprised of ECI LightSoft Software Version 11.2 (build 04113) with fixes NSx1120_4113-100 10, NC1120_4113-100 10 EMS-APT Software Version 4.0 (build 20) with fixes BC0400-01 1, BC0400-02 1, BS0400-01 1, BS0400-02 1; NPT-1010 Software Version 4.0 (build 35); NPT-1020/1021 Software Version 4.0 (build 35); and NPT-1200 Software Version 4.0 (build 35)
None
name Strong Customer Authentication pour Apple Pay sur iPhone 13 avec A15 Bionic exécutant iOS 15.4.1 Version 15.4.1 (build 19E258) Composite system comprised of ECI LightSoft Software Version 11.2 (build 04113) with fixes NSx1120_4113-100 10, NC1120_4113-100 10 EMS-APT Software Version 4.0 (build 20) with fixes BC0400-01 1, BC0400-02 1, BS0400-01 1, BS0400-02 1; NPT-1010 Software Version 4.0 (build 35); NPT-1020/1021 Software Version 4.0 (build 35); and NPT-1200 Software Version 4.0 (build 35)
category Mobility Network and Network-Related Devices and Systems
not_valid_before 2023-03-27 2017-04-16
not_valid_after 2028-03-27 2022-04-15
scheme FR IN
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2023_18en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ECI_LightSoft-EMS-APT-NPT_Security_Targetv1.8.pdf
status active archived
manufacturer Apple Inc. ECI telecom India Pvt. Ltd.
manufacturer_web https://www.apple.com/ https://www.ecitele.com/
security_level ADV_FSP.3, ALC_FLR.3, EAL2+ EAL2
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2023_18fr-2.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CR-ECI-NPT_EAL2.pdf
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-cc-2023_18.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ECI_Lightsoft.pdf
state/cert/convert_garbage False True
state/cert/extract_ok False True
state/cert/pdf_hash 01c917da9205c5938540b6d32e0772a53387e3f1d7d8f3e4bab625cf478d6b03 9d3cf26238b4e7b7c3a9edccf589142b2a69be1391d5c66ab0e6f4a7246d1d24
state/cert/txt_hash 29c09ca9ca8c0a2a28ea27c8e0642a68dbec26f37bacb1e4033d50059b3c2ac5 efa3218f4cd8a7b469922983d907f7e17791e1e5c6ad3ccf4c7d9120ab80e61d
state/report/extract_ok False True
state/report/pdf_hash 490d9c3dc871eb4a7e83e36813b9951dad1fb256079b1906ca2e9c07258de9e7 3e15b90a1863114e453b8ea40d3b7f7dc3869712f5248259d87a0d04ebe75f70
state/report/txt_hash 2064c67338126d58fa57ab4689536dd82223acc83a1981523d61686a4866497c d2d252a6208b295fb19ce71db47d07931d5894620a810e67bb6a04392a96cf57
state/st/extract_ok False True
state/st/pdf_hash 0d2cf124e1d430a4ddf4a2e4b5a0889766b36cd8ba9632ad7b3d2c7fa6e55699 3d1252b676595c688e4e4c581efd492b4b971a270811fdf7f72aea054c4d0da6
state/st/txt_hash 3cc366766c4e88db1d0f306f0f4872567d9d034d4b6e5505da1e636acda3369c 052d754832af1395bc643a9897f86977a989c1378c5bfbfc48184a8a7c7da672
heuristics/cert_id ANSSI-CC-2023/18 None
heuristics/extracted_versions 15.4.1 11.2, 4.0
heuristics/scheme_data
  • product: Strong Customer Authentication pour Apple Pay sur iPhone 13 avec A15 Bionic exécutant iOS 15.4.1 Version 15.4.1 (build 19E258)
  • url: https://cyber.gouv.fr/produits-certifies/strong-customer-authentication-pour-apple-pay-sur-iphone-13-avec-a15-bionic
  • description: Le produit évalué est « Strong Customer Authentication pour Apple Pay sur iPhone 13 avec A15 Bionic exécutant iOS 15.4.1, Version 15.4.1 (build 19E258) » développé par APPLE INC. Apple Pay est une solution de paiement mobile développée par la société APPLE INC. Après avoir enregistré une carte bancaire dans son équipement Apple, l’utilisateur peut faire des paiements au travers de celui-ci. Pour
  • sponsor: APPLE INC.
  • developer: APPLE INC.
  • cert_id: ANSSI-CC-2023/18
  • level: EAL2+
  • expiration_date: 26 Mars 2028
  • enhanced:
    • cert_id: ANSSI-CC-2023/18
    • certification_date: 27/03/2023
    • expiration_date: 26/03/2028
    • category: Divers
    • cc_version: Critères Communs version 3.1r5
    • developer: APPLE INC.
    • sponsor: APPLE INC.
    • evaluation_facility: THALES / CNES
    • level: EAL2+
    • protection_profile:
    • mutual_recognition: CCRA SOG-IS
    • augmented: ADV_FSP.3 et ALC_FLR.3
    • cert_link: https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2023_18.pdf
  • serial_number: 5
  • product: ECI LightSoft Software Version 11.2,(build 04113), EMS-APT Software Version 4.0(build 20), NPT-1010 Software Version 4.0, NPT-1020/1021 Software Version 4.0 and NPT-1200 Software Version 4.0 (build 35)
  • sponsor: ECI Telecom India Pvt.Ltd
  • developer: ECI Telecom India Pvt.Ltd.
  • level: EAL 2
  • target_link: https://www.commoncriteria-india.gov.in/sites/default/files/2022-02/ECI_LightSoft-EMS-APT-NPT_Security_Targetv1.8.pdf
  • target_name: ECI_LightSoft-EMS-APT-NPT_Security_Targetv1.8.pdf
  • cert_link: https://www.commoncriteria-india.gov.in/sites/default/files/2022-02/ECI_Lightsoft.pdf
  • cert_name: ECI_Lightsoft.pdf
  • certification_date: 12/Jun/2017
heuristics/scheme_data/developer APPLE INC. ECI Telecom India Pvt.Ltd.
heuristics/scheme_data/level EAL2+ EAL 2
heuristics/scheme_data/product Strong Customer Authentication pour Apple Pay sur iPhone 13 avec A15 Bionic exécutant iOS 15.4.1 Version 15.4.1 (build 19E258) ECI LightSoft Software Version 11.2,(build 04113), EMS-APT Software Version 4.0(build 20), NPT-1010 Software Version 4.0, NPT-1020/1021 Software Version 4.0 and NPT-1200 Software Version 4.0 (build 35)
heuristics/scheme_data/sponsor APPLE INC. ECI Telecom India Pvt.Ltd
pdf_data/cert_filename certificat-cc-2023_18.pdf ECI_Lightsoft.pdf
pdf_data/cert_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2023/18: 2
pdf_data/cert_keywords/cc_sar
  • ADV:
    • ADV_FSP.3: 1
  • ALC:
    • ALC_FLR.3: 1
pdf_data/cert_keywords/cc_security_level/EAL/EAL2 2 1
pdf_data/cert_metadata None
  • pdf_file_size_bytes: 2149641
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 3
  • /Creator:
  • /CreationDate:
  • /Author:
  • /Producer:
  • /Title:
  • /Subject:
  • pdf_hyperlinks:
pdf_data/report_filename anssi-cc-2023_18fr-2.pdf CR-ECI-NPT_EAL2.pdf
pdf_data/report_frontpage
  • FR:
pdf_data/report_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2023/18: 2
pdf_data/report_keywords/cc_claims
  • A:
    • A.ECI: 1
    • A.LOCATE: 1
    • A.MANAGE: 1
    • A.MGMTNET: 1
    • A.NOEVIL: 1
    • A.NOTRST: 1
    • A.PROTCT: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.3: 1
  • ALC:
    • ALC_FLR.3: 2
    • ALC_FLR: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 3
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
  • EAL:
    • EAL2: 6
pdf_data/report_keywords/cc_security_level/EAL
  • EAL2: 3
  • EAL7: 1
  • EAL2: 6
pdf_data/report_keywords/cc_security_level/EAL/EAL2 3 6
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 1
pdf_data/report_keywords/eval_facility
  • ERTL:
    • Common Criteria Test Laboratory, ERTL: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/tee_name
  • IBM:
    • SE: 1
pdf_data/report_metadata None
  • pdf_file_size_bytes: 654812
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 14
  • /Title: LOGO
  • /Author: Mitali Chatterjee
  • /Creator: Microsoft® Word 2010
  • /CreationDate: D:20190207153657+05'30'
  • /ModDate: D:20190207153657+05'30'
  • /Producer: Microsoft® Word 2010
  • pdf_hyperlinks: http://www.commoncriteria-india.gov.in/
pdf_data/st_filename anssi-cible-cc-2023_18en.pdf ECI_LightSoft-EMS-APT-NPT_Security_Targetv1.8.pdf
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 1
pdf_data/st_keywords/cc_claims
  • D:
    • D.OS: 17
    • D.SEP_SE: 3
  • T:
    • T.CORRUPT: 2
    • T.PHYSICAL: 2
    • T.RECOVER: 2
    • T.REPLAY: 2
    • T.SILENT: 2
    • T.SKIMMING: 2
    • T.USURP: 2
  • A:
    • A.DEVICE_AUTH: 3
    • A.PERSO: 3
    • A.CDCVM: 3
    • A.WATCH_USER: 3
  • OT:
    • OT.-: 1
  • OE:
    • OE.CDCVM: 3
  • O:
    • O.ACCESS: 9
    • O.AUDITS: 3
    • O.EADMIN: 5
    • O.IDAUTH: 13
    • O.INFFLW: 5
    • O.PROTCT: 5
    • O.INVFLW: 1
  • T:
    • T.COMINT: 3
    • T.INVSRC: 3
    • T.LOSSOF: 3
    • T.NOHALT: 3
    • T.PRIVIL: 3
    • T.UNAUTHDST: 3
  • A:
    • A.ECI: 3
    • A.LOCATE: 3
    • A.MANAGE: 3
    • A.MGMTNETWORK: 2
    • A.NOEVIL: 3
    • A.NOTRST: 3
    • A.PROTCT: 3
    • A.MGMTNETW: 1
  • OE:
    • OE.ECI: 3
    • OE.CREDEN: 4
    • OE.INSTAL: 4
    • OE.MGMTNET: 1
    • OE.PERSON: 5
    • OE.PHYCAL: 6
    • OE.TIME: 4
    • OE.MGMTNETWORK: 1
pdf_data/st_keywords/cc_claims/A
  • A.DEVICE_AUTH: 3
  • A.PERSO: 3
  • A.CDCVM: 3
  • A.WATCH_USER: 3
  • A.ECI: 3
  • A.LOCATE: 3
  • A.MANAGE: 3
  • A.MGMTNETWORK: 2
  • A.NOEVIL: 3
  • A.NOTRST: 3
  • A.PROTCT: 3
  • A.MGMTNETW: 1
pdf_data/st_keywords/cc_claims/OE
  • OE.CDCVM: 3
  • OE.ECI: 3
  • OE.CREDEN: 4
  • OE.INSTAL: 4
  • OE.MGMTNET: 1
  • OE.PERSON: 5
  • OE.PHYCAL: 6
  • OE.TIME: 4
  • OE.MGMTNETWORK: 1
pdf_data/st_keywords/cc_claims/T
  • T.CORRUPT: 2
  • T.PHYSICAL: 2
  • T.RECOVER: 2
  • T.REPLAY: 2
  • T.SILENT: 2
  • T.SKIMMING: 2
  • T.USURP: 2
  • T.COMINT: 3
  • T.INVSRC: 3
  • T.LOSSOF: 3
  • T.NOHALT: 3
  • T.PRIVIL: 3
  • T.UNAUTHDST: 3
pdf_data/st_keywords/cc_sar/ADV
  • ADV_FSP.3: 3
  • ADV_ARC.1: 3
  • ADV_TDS.1: 4
  • ADV_FSP.2: 4
  • ADV_FSP.1: 2
  • ADV_ARC.1: 1
  • ADV_FSP.2: 1
  • ADV_TDS.1: 1
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 3 1
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.2 4 1
pdf_data/st_keywords/cc_sar/ADV/ADV_TDS.1 4 1
pdf_data/st_keywords/cc_sar/AGD/AGD_OPE.1 4 1
pdf_data/st_keywords/cc_sar/AGD/AGD_PRE.1 4 1
pdf_data/st_keywords/cc_sar/ALC
  • ALC_FLR: 1
  • ALC_CMC.2: 2
  • ALC_CMS.2: 2
  • ALC_DEL.1: 2
  • ALC_FLR.3: 3
  • ALC_CMC.2: 1
  • ALC_CMS.2: 1
  • ALC_DEL.1: 1
pdf_data/st_keywords/cc_sar/ALC/ALC_CMC.2 2 1
pdf_data/st_keywords/cc_sar/ALC/ALC_CMS.2 2 1
pdf_data/st_keywords/cc_sar/ALC/ALC_DEL.1 2 1
pdf_data/st_keywords/cc_sar/ASE
  • ASE_CCL.1: 2
  • ASE_ECD.1: 3
  • ASE_INT.1: 2
  • ASE_OBJ.2: 2
  • ASE_REQ.2: 2
  • ASE_SPD.1: 1
  • ASE_TSS.1: 2
  • ASE_REQ.1: 2
  • ASE_CCL.1: 1
  • ASE_ECD.1: 1
  • ASE_INT.1: 1
  • ASE_OBJ.2: 1
  • ASE_REQ.2: 1
  • ASE_SPD.1: 1
  • ASE_TSS.1: 1
pdf_data/st_keywords/cc_sar/ASE/ASE_CCL.1 2 1
pdf_data/st_keywords/cc_sar/ASE/ASE_ECD.1 3 1
pdf_data/st_keywords/cc_sar/ASE/ASE_INT.1 2 1
pdf_data/st_keywords/cc_sar/ASE/ASE_OBJ.2 2 1
pdf_data/st_keywords/cc_sar/ASE/ASE_REQ.2 2 1
pdf_data/st_keywords/cc_sar/ASE/ASE_TSS.1 2 1
pdf_data/st_keywords/cc_sar/ATE/ATE_COV.1 4 1
pdf_data/st_keywords/cc_sar/ATE/ATE_FUN.1 3 1
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.2 2 1
pdf_data/st_keywords/cc_security_level/EAL
  • EAL 2: 1
  • EAL2: 1
  • EAL 2 augmented: 1
  • EAL2: 6
pdf_data/st_keywords/cc_security_level/EAL/EAL2 1 6
pdf_data/st_keywords/cc_sfr
  • FDP:
    • FDP_DAU.1: 4
    • FDP_DAU.1.1: 1
    • FDP_DAU.1.2: 1
    • FDP_ACC: 23
    • FDP_ACF: 19
    • FDP_ITT.1: 4
    • FDP_ACC.2: 4
    • FDP_ACF.1: 12
    • FDP_ITT.1.1: 1
    • FDP_ETC: 8
    • FDP_ETC.2.1: 2
    • FDP_ETC.2.2: 2
    • FDP_ETC.2.3: 2
    • FDP_ETC.2.4: 2
    • FDP_ACC.2.1: 1
    • FDP_ACC.2.2: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_ITC: 5
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_UCT: 9
    • FDP_UIT: 10
    • FDP_UCT.1: 1
    • FDP_UIT.1: 2
    • FDP_UCT.1.1: 1
    • FDP_RIP.1: 15
    • FDP_SDI.1: 10
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
    • FDP_RIP.1.1: 1
    • FDP_SDI.1.1: 1
    • FDP_ACC.1: 11
    • FDP_IFC.1: 9
    • FDP_ETC.2: 2
  • FIA:
    • FIA_UID.2: 6
    • FIA_UAU.2: 10
    • FIA_UID.2.1: 1
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 5
    • FIA_AFL: 7
    • FIA_UAU.6: 11
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_AFL.1: 3
    • FIA_AFL.1.1: 3
    • FIA_AFL.1.2: 3
    • FIA_ATD.1: 5
    • FIA_SOS.2: 4
    • FIA_UAU.6.1: 2
    • FIA_ATD.1.1: 2
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
    • FIA_UAU.1: 1
    • FIA_UID.1: 1
  • FMT:
    • FMT_SMR.1: 10
    • FMT_SMF.1: 6
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_SMF.1.1: 1
    • FMT_MSA.1: 6
    • FMT_MSA.3: 11
    • FMT_MTD.1: 4
    • FMT_MTD.3: 4
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MSA.1.1: 2
    • FMT_MTD.1.1: 1
    • FMT_MTD.3.1: 1
  • FPR:
    • FPR_UNO.1: 14
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_ITC.1: 4
    • FPT_ITC.1.1: 1
    • FPT_RPL: 8
    • FPT_RPL.1: 6
  • FTP:
    • FTP_ITC: 14
    • FTP_ITC.1: 7
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 4
  • FAU:
    • FAU_GEN.1: 12
    • FAU_SAR.1: 9
    • FAU_SAR.2: 8
    • FAU_STG.2: 9
    • FAU_ARP.1: 1
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2.1: 1
    • FAU_STG.2.1: 1
    • FAU_STG.2.2: 1
    • FAU_STG.2.3: 1
    • FAU_SAR.3: 1
    • FAU_SEL.1: 1
  • FDP:
    • FDP_IFC.1: 9
    • FDP_IFF.1: 8
    • FDP_IFC.1.1: 1
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_ACC.1: 1
  • FIA:
    • FIA_AFL.1: 8
    • FIA_ATD.1: 7
    • FIA_UAU.1: 10
    • FIA_UID.1: 10
    • FIA_UAU.7: 8
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1.1: 1
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_UAU.7.1: 1
  • FMT:
    • FMT_MTD.1: 16
    • FMT_MSA.1: 8
    • FMT_MSA.3: 8
    • FMT_SMF.1: 9
    • FMT_SMR.1: 9
    • FMT_MSA.1.1: 1
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1.1: 2
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 1
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_DAU.1: 4
  • FDP_DAU.1.1: 1
  • FDP_DAU.1.2: 1
  • FDP_ACC: 23
  • FDP_ACF: 19
  • FDP_ITT.1: 4
  • FDP_ACC.2: 4
  • FDP_ACF.1: 12
  • FDP_ITT.1.1: 1
  • FDP_ETC: 8
  • FDP_ETC.2.1: 2
  • FDP_ETC.2.2: 2
  • FDP_ETC.2.3: 2
  • FDP_ETC.2.4: 2
  • FDP_ACC.2.1: 1
  • FDP_ACC.2.2: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_ITC: 5
  • FDP_ITC.1.1: 1
  • FDP_ITC.1.2: 1
  • FDP_ITC.1.3: 1
  • FDP_UCT: 9
  • FDP_UIT: 10
  • FDP_UCT.1: 1
  • FDP_UIT.1: 2
  • FDP_UCT.1.1: 1
  • FDP_RIP.1: 15
  • FDP_SDI.1: 10
  • FDP_UIT.1.1: 1
  • FDP_UIT.1.2: 1
  • FDP_RIP.1.1: 1
  • FDP_SDI.1.1: 1
  • FDP_ACC.1: 11
  • FDP_IFC.1: 9
  • FDP_ETC.2: 2
  • FDP_IFC.1: 9
  • FDP_IFF.1: 8
  • FDP_IFC.1.1: 1
  • FDP_IFF.1.1: 1
  • FDP_IFF.1.2: 1
  • FDP_IFF.1.3: 1
  • FDP_IFF.1.4: 1
  • FDP_IFF.1.5: 1
  • FDP_ACC.1: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 11 1
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_UID.2: 6
  • FIA_UAU.2: 10
  • FIA_UID.2.1: 1
  • FIA_UAU.2.1: 1
  • FIA_UAU.5: 5
  • FIA_AFL: 7
  • FIA_UAU.6: 11
  • FIA_UAU.5.1: 1
  • FIA_UAU.5.2: 1
  • FIA_AFL.1: 3
  • FIA_AFL.1.1: 3
  • FIA_AFL.1.2: 3
  • FIA_ATD.1: 5
  • FIA_SOS.2: 4
  • FIA_UAU.6.1: 2
  • FIA_ATD.1.1: 2
  • FIA_SOS.2.1: 1
  • FIA_SOS.2.2: 1
  • FIA_UAU.1: 1
  • FIA_UID.1: 1
  • FIA_AFL.1: 8
  • FIA_ATD.1: 7
  • FIA_UAU.1: 10
  • FIA_UID.1: 10
  • FIA_UAU.7: 8
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_ATD.1.1: 1
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UID.1.1: 1
  • FIA_UID.1.2: 1
  • FIA_UAU.7.1: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1 3 8
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.1 3 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.2 3 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD.1 5 7
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD.1.1 2 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 1 10
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 1 10
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_SMR.1: 10
  • FMT_SMF.1: 6
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_SMF.1.1: 1
  • FMT_MSA.1: 6
  • FMT_MSA.3: 11
  • FMT_MTD.1: 4
  • FMT_MTD.3: 4
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_MSA.1.1: 2
  • FMT_MTD.1.1: 1
  • FMT_MTD.3.1: 1
  • FMT_MTD.1: 16
  • FMT_MSA.1: 8
  • FMT_MSA.3: 8
  • FMT_SMF.1: 9
  • FMT_SMR.1: 9
  • FMT_MSA.1.1: 1
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_MTD.1.1: 2
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 6 8
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1.1 2 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 11 8
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 4 16
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1.1 1 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 6 9
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 10 9
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_ITC.1: 4
  • FPT_ITC.1.1: 1
  • FPT_RPL: 8
  • FPT_RPL.1: 6
  • FPT_STM.1: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 2
    • Element of the device is separately certified according to the Common Criteria and is therefore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by: 1
    • ted to return to its User. Note: Defending against device re-use after phys- ical compromise is out of scope. D.User_Passcode D.User_Bio D.Card_Data D.Unlock_Secret* D.SEP_Watch* T.RECOVER Card Re- covery An: 1
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 3
pdf_data/st_keywords/crypto_scheme/MAC/MAC 1 12
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 2
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 140-3: 1
    • FIPS 140-2: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 6
pdf_data/st_metadata None
  • pdf_file_size_bytes: 299013
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 36
  • /Author: User
  • /Company: Hewlett-Packard
  • /CreationDate: D:20170710162021+05'30'
  • /Creator: Acrobat PDFMaker 9.0 for Word
  • /ModDate: D:20170710162027+05'30'
  • /Producer: Adobe PDF Library 9.0
  • /SourceModified: D:20170710104904
  • /Title: SECURITY TARGET
  • pdf_hyperlinks: http://www.ecitele.com/, http://www.consulting-cc.com/
dgst e70bd18f9606a20a 6c9fe6528a0c24b3