Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
X0mail
SERTIT-014
Plateforme Java Card en configuration ouverte de la carte à puce MultiApp v3.1 masquée sur le composant P60D144PVA (version du patch: 1.3)
ANSSI-CC-2015/15
name X0mail Plateforme Java Card en configuration ouverte de la carte à puce MultiApp v3.1 masquée sur le composant P60D144PVA (version du patch: 1.3)
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme NO FR
not_valid_after 01.09.2019 31.08.2020
not_valid_before 23.02.2010 31.08.2015
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20100223_SERTIT-008CR_issue201.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_15.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/XOmail_Version_14.2_Security_Target_739_20597_aaaa_sc_ed10-public.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi_cible_2015_15_LITE.pdf
manufacturer Thales Norway AS Gemalto / NXP Semiconductors
manufacturer_web https://www.thales.no/ https://www.gemalto.com/
security_level EAL4 EAL5+, ALC_DVS.2, AVA_VAN.5
dgst f310fe4b0c9c7eb1 d89399d5b767d996
heuristics/cert_id SERTIT-014 ANSSI-CC-2015/15
heuristics/cert_lab [] SERMA
heuristics/extracted_sars ADV_RCR.1, AVA_VLA.2, ASE_INT.1, ADV_HLD.2, AGD_USR.1, ADV_FSP.2, ALC_CMC.4, AVA_SOF.1, ADV_IMP.1, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, AVA_MSU.2, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, AGD_ADM.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_DVS.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_LLD.1, ASE_CCL.1, ADV_SPM.1 ALC_DVS.2, ALC_CMC.4, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ADV_TDS.4, ALC_TAT.2, ASE_TSS.2, ATE_IND.2
heuristics/extracted_versions - 3.1, 1.3
heuristics/report_references/directly_referenced_by {} ANSSI-CC-2016/03, ANSSI-CC-2015/37, ANSSI-CC-2015/38, ANSSI-CC-2016/04, ANSSI-CC-2015/41, ANSSI-CC-2015/39, ANSSI-CC-2015/40
heuristics/report_references/directly_referencing {} ANSSI-CC-2014/86, BSI-DSZ-CC-0845-V2-2013
heuristics/report_references/indirectly_referenced_by {} ANSSI-CC-2016/03, ANSSI-CC-2015/37, ANSSI-CC-2015/38, ANSSI-CC-2016/04, ANSSI-CC-2015/41, ANSSI-CC-2015/39, ANSSI-CC-2015/40
heuristics/report_references/indirectly_referencing {} ANSSI-CC-2014/06, BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0845-2012, ANSSI-CC-2014/86, BSI-DSZ-CC-0837-2013, BSI-DSZ-CC-0845-V2-2013, BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0666-2012
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0845-V2-2013
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0845-V2-2013
heuristics/protection_profiles {} 85bef5b6f16c4d33
maintenance_updates
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-cible_PP-2010-03en.pdf
pdf_data/report_filename 20100223_SERTIT-008CR_issue201.0.pdf ANSSI-CC-2015_15.pdf
pdf_data/report_frontpage
  • FR:
  • FR:
    • cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
    • cc_version: Critères Communs version 3.1 révision 4
    • cert_id: ANSSI-CC-2015/15
    • cert_item: Plateforme Java Card en configuration ouverte de la carte à puce MultiApp v3.1 masquée sur le composant P60D144PVA
    • cert_item_version: Version de la plateforme Java Card MultiApp : 3.1 Version du patch : 1.3
    • cert_lab: Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
    • developer: Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France NXP Semiconductors Box 54 02 40, D-22502 Hambourg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France
    • match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
    • ref_protection_profiles: ANSSI-CC-PP-2010/03-M01 [PP JCS] Java Card System – Open Configuration, version 3.0
pdf_data/report_keywords/cc_cert_id
  • NO:
    • SERTIT-014: 16
  • DE:
    • BSI-DSZ-CC-0845-V2-2013: 3
  • FR:
    • ANSSI-CC-2014/86: 2
    • ANSSI-CC-2015/15: 22
    • ANSSI-CC-PP-2010/03-M01: 2
pdf_data/report_keywords/cc_protection_profile_id
  • ANSSI:
    • ANSSI-CC-PP-2010/03-M01: 2
  • BSI:
    • BSI-PP-0035-: 1
    • BSI-PP-0035-2007: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 3
    • EAL 4 augmented: 1
    • EAL 4+: 17
    • EAL1: 1
    • EAL4+: 3
    • EAL7: 1
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 5: 3
    • EAL 7: 1
    • EAL4: 2
    • EAL6: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 6
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 6
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 3
    • AGD_PRE: 3
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 2
    • ALC_FLR: 2
    • ALC_FLR.1: 1
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 3
pdf_data/report_keywords/cc_sfr
  • FDP:
    • FDP_IFC.2: 2
    • FDP_IFF.1: 2
pdf_data/report_keywords/vendor
  • Gemalto:
    • Gemalto: 12
  • NXP:
    • NXP: 4
    • NXP Semiconductors: 1
pdf_data/report_keywords/eval_facility
  • BrightSight:
    • Brightsight: 1
  • Serma:
    • Serma Technologies: 2
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
pdf_data/report_keywords/javacard_packages
  • com:
    • com.gemalto.javacardx.pace: 1
  • javacardx:
    • javacardx.pace: 1
pdf_data/report_metadata
  • /CreationDate: D:20100315130843
  • /ModDate: D:20100315130843
  • pdf_file_size_bytes: 542517
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 16
  • /Author: Beatrice Duquesnoy
  • /CreationDate: D:20150908144903+02'00'
  • /Creator: Microsoft® Word 2010
  • /Keywords: ANSSI-CC-CER-F-07.016
  • /ModDate: D:20150908144903+02'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: Plateforme Java Card en configuration ouverte de la carte à puce MultiApp v3.1 masquée sur le composant P60D144PVA
  • /Title: ANSSI-CC-2015/15
  • pdf_file_size_bytes: 731454
  • pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 21
pdf_data/st_filename XOmail_Version_14.2_Security_Target_739_20597_aaaa_sc_ed10-public.pdf anssi_cible_2015_15_LITE.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0845-V2-2013: 2
  • NL:
    • CC-1: 2
    • CC-2: 3
    • CC-3: 3
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0055: 1
    • BSI-CC-PP-0059-2009-MA-01: 1
    • BSI-CC-PP-0075-2012: 1
    • BSI-PP-0005: 1
    • BSI-PP-0006: 1
    • BSI-PP-0035: 1
  • other:
    • PP-SSCD-KG: 2
    • PP-SSCD-KI: 2
    • PP-SSCD-T2: 2
    • PP-SSCD-T3: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 8
  • EAL:
    • EAL 6+: 1
    • EAL5: 6
    • EAL5 augmented: 2
    • EAL5+: 1
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_AUT.1: 10
    • ACM_AUT.1.1: 1
    • ACM_CAP.3: 1
    • ACM_CAP.4: 20
    • ACM_SCP.2: 7
  • ADO:
    • ADO_DEL.1: 1
    • ADO_DEL.2: 11
    • ADO_IGS.1: 13
  • ADV:
    • ADV_DVS.1: 1
    • ADV_FSP.1: 7
    • ADV_FSP.2: 12
    • ADV_HLD.1: 2
    • ADV_HLD.2: 17
    • ADV_IMP.1: 11
    • ADV_LLD.1: 18
    • ADV_RCR.1: 9
    • ADV_SPM.1: 15
  • AGD:
    • AGD_ADM.1: 22
    • AGD_USR.1: 16
  • ALC:
    • ALC_DVS.1: 9
    • ALC_LCD.1: 9
    • ALC_TAT.1: 6
  • ATE:
    • ATE_COV.2: 8
    • ATE_DPT.1: 7
    • ATE_FUN.1: 15
    • ATE_IND.2: 10
  • AVA:
    • AVA_MSU.2: 15
    • AVA_SOF.1: 10
    • AVA_VLA.2: 15
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 10
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 2
    • ADV_FSP.4: 2
    • ADV_FSP.5: 6
    • ADV_IMP: 1
    • ADV_IMP.1: 9
    • ADV_INT.2: 3
    • ADV_TDS: 1
    • ADV_TDS.1: 2
    • ADV_TDS.3: 4
    • ADV_TDS.4: 8
  • AGD:
    • AGD_OPE.1: 9
    • AGD_PRE: 1
    • AGD_PRE.1: 7
  • ALC:
    • ALC_CMC.4: 3
    • ALC_CMS.5: 2
    • ALC_DEL.1: 3
    • ALC_DVS.1: 2
    • ALC_DVS.2: 9
    • ALC_LCD.1: 5
    • ALC_TAT.1: 2
    • ALC_TAT.2: 5
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 4
    • ATE_DPT.1: 2
    • ATE_DPT.3: 3
    • ATE_FUN.1: 9
    • ATE_IND.2: 4
  • AVA:
    • AVA_VAN.5: 9
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_ARP.1: 9
    • FAU_ARP.1.1: 1
    • FAU_GEN.1: 33
    • FAU_GEN.1.1: 1
    • FAU_GEN.2: 16
    • FAU_GEN.2.1: 1
    • FAU_SAA.1: 8
    • FAU_SAA.1.1: 1
    • FAU_SAA.1.2: 1
    • FAU_SAR.1: 20
    • FAU_SAR.2: 15
    • FAU_STG.1: 21
    • FAU_STG.3: 15
    • FAU_STG.4: 9
  • FDP:
    • FDP_ACC.1: 11
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 10
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_ETC.2: 10
    • FDP_ETC.2.1: 1
    • FDP_ETC.2.2: 1
    • FDP_ETC.2.3: 1
    • FDP_ETC.2.4: 1
    • FDP_IFC.1: 4
    • FDP_IFC.2: 9
    • FDP_IFC.2.1: 1
    • FDP_IFC.2.2: 1
    • FDP_IFF.2: 10
    • FDP_IFF.2.1: 1
    • FDP_IFF.2.2: 2
    • FDP_IFF.2.3: 1
    • FDP_IFF.2.4: 1
    • FDP_IFF.2.5: 1
    • FDP_IFF.2.6: 1
    • FDP_IFF.2.7: 1
    • FDP_ITC.2: 10
    • FDP_ITC.2.1: 1
    • FDP_ITC.2.2: 1
    • FDP_ITC.2.3: 1
    • FDP_ITC.2.4: 1
    • FDP_ITC.2.5: 1
    • FDP_ITT.1: 5
    • FDP_ITT.1.1: 1
    • FDP_RIP.2: 9
    • FDP_RIP.2.1: 1
  • FIA:
    • FIA_AFL.1: 9
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 11
    • FIA_ATD.1.1: 1
    • FIA_UAU.2: 17
    • FIA_UAU.2.1: 2
    • FIA_UAU.5: 9
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UID.1: 4
    • FIA_UID.2: 24
    • FIA_USB.1: 13
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA.1: 10
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 12
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 8
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 12
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_AMT.1: 2
    • FPT_FLS.1: 8
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 5
    • FPT_ITT.1.1: 1
    • FPT_RCV.1: 8
    • FPT_RCV.1.1: 1
    • FPT_RCV.2: 11
    • FPT_RCV.2.1: 1
    • FPT_RCV.2.2: 1
    • FPT_RCV.4: 9
    • FPT_RCV.4.1: 1
    • FPT_RVM.1: 9
    • FPT_RVM.1.1: 1
    • FPT_SEP.3: 10
    • FPT_SEP.3.1: 1
    • FPT_SEP.3.2: 1
    • FPT_SEP.3.3: 1
    • FPT_STM.1: 7
    • FPT_STM.1.1: 1
    • FPT_TDC.1: 14
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TSE.1: 1
    • FPT_TST.1: 11
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 8
    • FTA_SSL.3.1: 1
    • FTA_TSE.1: 19
  • FTP:
    • FTP_ITC.1: 2
    • FTP_TRP.1: 2
  • FAU:
    • FAU_ARP.1: 15
    • FAU_ARP.1.1: 1
    • FAU_SAA.1: 2
  • FCO:
    • FCO_NRO: 7
    • FCO_NRO.2: 3
  • FCS:
    • FCS_CKM.1: 21
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 8
    • FCS_CKM.2.1: 1
    • FCS_CKM.3: 7
    • FCS_CKM.3.1: 1
    • FCS_CKM.4: 15
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 19
    • FCS_COP.1.1: 1
    • FCS_RND: 7
    • FCS_RND.1: 12
    • FCS_RND.1.1: 2
    • FCS_RNG.1: 1
  • FDP:
    • FDP_ACC: 40
    • FDP_ACC.1: 13
    • FDP_ACC.2: 6
    • FDP_ACF: 33
    • FDP_ACF.1: 16
    • FDP_IFC: 24
    • FDP_IFC.1: 12
    • FDP_IFC.2: 2
    • FDP_IFF: 17
    • FDP_IFF.1: 12
    • FDP_ITC: 12
    • FDP_ITC.1: 4
    • FDP_ITC.2: 9
    • FDP_RIP: 85
    • FDP_RIP.1: 10
    • FDP_ROL: 14
    • FDP_ROL.1: 2
    • FDP_SDI.2: 9
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UIT: 7
    • FDP_UIT.1: 2
  • FIA:
    • FIA_ATD: 9
    • FIA_ATD.1: 2
    • FIA_SOS.2: 1
    • FIA_UAI.1: 1
    • FIA_UAU: 7
    • FIA_UAU.1: 1
    • FIA_UID: 14
    • FIA_UID.1: 10
    • FIA_UID.2: 1
    • FIA_USB: 8
    • FIA_USB.1: 3
  • FMT:
    • FMT_MSA: 91
    • FMT_MSA.1: 11
    • FMT_MSA.2: 1
    • FMT_MSA.3: 15
    • FMT_MTD: 18
    • FMT_MTD.1: 3
    • FMT_MTD.3: 1
    • FMT_SMF: 33
    • FMT_SMF.1: 9
    • FMT_SMR: 47
    • FMT_SMR.1: 22
  • FPR:
    • FPR_UNO: 7
    • FPR_UNO.1: 10
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_FLS: 46
    • FPT_FLS.1: 5
    • FPT_ITT: 7
    • FPT_ITT.1: 1
    • FPT_PHP: 7
    • FPT_PHP.3: 2
    • FPT_RCV: 16
    • FPT_RCV.3: 4
    • FPT_RCV.4: 2
    • FPT_TDC.1: 9
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TST: 7
    • FPT_TST.1: 3
  • FTP:
    • FTP_ITC: 9
    • FTP_ITC.1: 5
    • FTP_TRP.1: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADM_TRAINING: 4
    • A.AUDIT_REVIEW: 3
    • A.CONFIDENCE: 4
    • A.INVALIDATE: 3
    • A.NETWORK: 4
    • A.NOTIFY: 3
    • A.OS: 5
    • A.PHYSICAL: 4
    • A.PHYSICAL_LOC: 3
    • A.USR_TRAINING: 3
  • O:
    • O.ACCESS_HIST: 13
    • O.AUDIT: 13
    • O.AUTO_LOGOUT: 10
    • O.CMD_ACL: 7
    • O.CMD_LOG: 16
    • O.DAC: 8
    • O.DIG_SIGN: 3
    • O.ID_AUTH: 14
    • O.LABELLING: 8
    • O.LOCK: 8
    • O.MAC: 9
    • O.MAC_INTEGRITY: 10
    • O.MANAGE: 6
    • O.MESSAGING: 8
    • O.RECOVER: 9
    • O.REF_MONITOR: 8
    • O.RESOURCE_SHARE: 7
    • O.REUSE: 9
    • O.ROLES: 10
    • O.ROLE_MNG: 7
    • O.SELF_TEST: 8
  • OE:
    • OE.ACCOUNTABLE: 11
    • OE.AUDIT: 13
    • OE.ID_AUTH: 8
    • OE.NETWORK: 17
    • OE.PHYSICAL: 1
    • OE.TRAF_SEPARATION: 11
  • A:
    • A.APPLET: 5
    • A.DELETION: 5
    • A.VERIFICATION: 4
  • D:
    • D.API_DATA: 3
    • D.APP_CODE: 6
    • D.APP_C_DATA: 3
    • D.APP_I_DATA: 4
    • D.CRYPTO: 5
    • D.JCS_CODE: 3
    • D.JCS_DATA: 5
    • D.PIN: 4
    • D.SEC_DATA: 7
  • O:
    • O.ALARM: 15
    • O.APPLET: 28
    • O.CARD-MANAGEMENT: 3
    • O.CARD_MANAGEMENT: 18
    • O.CIPHER: 10
    • O.CODE_PCKG: 16
    • O.CODE_PKG: 7
    • O.DELETION: 8
    • O.FIREWALL: 12
    • O.GLOBAL_ARRAYS_CO: 3
    • O.GLOBAL_ARRAYS_CONFID: 6
    • O.GLOBAL_ARRAYS_INT: 3
    • O.GLOBAL_ARRAYS_INTEG: 5
    • O.HW_AES: 2
    • O.INSTALL: 11
    • O.JAVAOBJECT: 56
    • O.KEY-: 1
    • O.KEY-MNGT: 5
    • O.KEY_MNGT: 4
    • O.LOAD: 6
    • O.NATIVE: 11
    • O.OBJ-DELETION: 4
    • O.OPERATE: 15
    • O.PIN-: 1
    • O.PIN-MNGT: 5
    • O.REALLOCATION: 5
    • O.RESOURCES: 9
    • O.RND: 13
    • O.SCP: 36
    • O.SID: 13
    • O.TRANSACTION: 6
  • OE:
    • OE.APPLET: 4
    • OE.CARD-MANAGEMENT: 1
    • OE.CODE-EVIDENCE: 10
    • OE.CODE_EVIDENCE: 1
    • OE.SCP: 6
    • OE.VERIFICATION: 25
  • OP:
    • OP.ARRAY_ACCESS: 6
    • OP.CREATE: 10
    • OP.DELETE_APPLET: 6
    • OP.DELETE_PCKG: 4
    • OP.DELETE_PCKG_APPLET: 4
    • OP.INSTANCE_FIELD: 6
    • OP.INVK_INTERFACE: 10
    • OP.INVK_VIRTUAL: 8
    • OP.JAVA: 8
    • OP.PUT: 7
    • OP.THROW: 7
    • OP.TYPE_ACCESS: 7
  • OSP:
    • OSP: 1
    • OSP.RND: 3
    • OSP.RNG: 1
    • OSP.VERIFICATION: 4
  • R:
    • R.JAVA: 9
  • T:
    • T.CONFID-APPLI-DATA: 4
    • T.CONFID-JCS-CODE: 4
    • T.CONFID-JCS-DATA: 4
    • T.DELETION: 3
    • T.EXE-CODE: 8
    • T.INSTALL: 4
    • T.INTEG-APPLI-CODE: 7
    • T.INTEG-APPLI-DATA: 8
    • T.INTEG-JCS-CODE: 3
    • T.INTEG-JCS-DATA: 4
    • T.NATIVE: 4
    • T.OBJ-DELETION: 4
    • T.PHYSICAL: 4
    • T.RESOURCES: 3
    • T.SID: 8
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 3
  • Gemalto:
    • Gemalto: 117
  • NXP:
    • NXP: 12
pdf_data/st_keywords/eval_facility
  • Serma:
    • SERMA: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 18
  • DES:
    • 3DES:
      • TDEA: 1
      • TDES: 9
      • Triple-DES: 2
    • DES:
      • DES: 20
  • constructions:
    • MAC:
      • CMAC: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 8
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 3
  • FF:
    • DH:
      • DH: 5
      • Diffie-Hellman: 4
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 4
    • SHA2:
      • SHA-224: 3
      • SHA-256: 4
      • SHA-384: 4
      • SHA-512: 3
      • SHA224: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 74
  • KA:
    • Key agreement: 2
  • MAC:
    • MAC: 10
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 10
pdf_data/st_keywords/randomness
  • PRNG:
    • PRNG: 1
  • RNG:
    • RND: 19
    • RNG: 7
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 3
    • fault induction: 2
    • malfunction: 2
    • physical tampering: 1
  • SCA:
    • DPA: 1
    • Leak-Inherent: 3
    • physical probing: 2
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2005-08-001: 1
    • CCMB-2005-08-002: 1
    • CCMB-2005-08-003: 1
  • ISO:
    • ISO/IEC 15408: 10
  • RFC:
    • RFC 2156: 1
  • BSI:
    • AIS31: 1
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • FIPS:
    • FIPS180-2: 1
    • FIPS197: 4
  • ICAO:
    • ICAO: 3
  • NIST:
    • SP 800-38: 2
  • PKCS:
    • PKCS#1: 8
    • PKCS#3: 1
    • PKCS#5: 5
  • SCP:
    • SCP01: 3
    • SCP02: 3
    • SCP03: 3
pdf_data/st_keywords/javacard_version
  • JavaCard:
    • JC2.2.2: 1
    • Java Card 2.2.2: 7
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 7
pdf_data/st_keywords/javacard_packages
  • javacard:
    • javacard.framework: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • MLS environment The protection of the LANs to which the MMHS servers and clients are connected is out of scope of this Security Target. It is assumed that the confidentiality of information is protected using: 1
    • out of scope: 1
  • OutOfScope:
    • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: Thales Norway AS
  • /CreationDate: D:20090430154245+02'00'
  • /Creator: PDFCreator Version 0.9.3
  • /Keywords:
  • /ModDate: D:20090430154245
  • /Producer: AFPL Ghostscript 8.13
  • /Subject:
  • /Title: XOmail Version 14.2 Security Target ed 10-public
  • pdf_file_size_bytes: 2346280
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 111
  • /Author: Antoine de Lavernette
  • /CreationDate: D:20150414141904+02'00'
  • /Creator: Microsoft® Office Word 2007
  • /Keywords: Security Target, CC
  • /ModDate: D:20150414141904+02'00'
  • /Producer: Microsoft® Office Word 2007
  • /Subject: Security Target
  • /Title: eTravel v1.0 Security Target MAÏA3
  • pdf_file_size_bytes: 1611194
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 93
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different