name |
Oberthur Carte à puce ID-One Cosmo V7.0-n en configuration Large, Standard, Basic (modes dual ou contact) ou Entry (mode dual) masquée sur composant NXP |
Application eTravel EAC v2.0, en configuration BAC, sur la carte à puce fermée MultiApp V3 masquée sur le composant M7820 A11 |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
FR |
FR |
status |
archived |
archived |
not_valid_after |
01.09.2019 |
01.09.2019 |
not_valid_before |
19.11.2009 |
03.02.2014 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc_2009-48en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Rapport%20ANSSI-CC-2014_09fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-cible_2009-48en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Cible%20ANSSI-CC-2014_09en.pdf |
manufacturer |
Oberthur Technologies / NXP Semiconductors GmbH |
Gemalto - Infineon Technologies AG |
manufacturer_web |
https://www.oberthur.com/ |
https://www.gemalto.com/ |
security_level |
ADV_IMP.2, AVA_VAN.5, ALC_DVS.2, EAL5+ |
EAL4+, ALC_DVS.2 |
dgst |
f362eb2c23fa3a77 |
345704690da76381 |
heuristics/cert_id |
ANSSI-CC-2009/48 |
ANSSI-CC-2014/09 |
heuristics/cert_lab |
THALES |
SERMA |
heuristics/cpe_matches |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
AVA_VLA.4, ALC_DVS.2, AVA_VAN.5, AVA_MSU.3, ADV_IMP.2 |
ALC_DVS.2, AVA_VAN.5, ADV_ARC.1 |
heuristics/extracted_versions |
7.0 |
2.0 |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0829-2012, ANSSI-CC-2014/06 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0829-2012, ANSSI-CC-2014/06 |
heuristics/scheme_data |
- cert_id: ANSSI-CC-2019/28
- description: Le produit évalué est la « Plateforme ID-One Cosmo v8.2, masquée sur le composant NXP P60D145, identification du matériel 091121». Elle est développée par Idemia et embarquée sur le microcontrôleur NXP P60D145 développé et fabriqué par NXP Semiconductors GmbH. Le produit dispose d'interfaces avec et sans contact. Il est destiné à héberger et exécuter une ou plusieurs applications, dites applets d
- developer: Idemia et NXP Semiconductors GmbH
- enhanced:
- augmented: ALC_DVS.2 et AVA_VAN.5
- category: Cartes à puce
- cc_version: Critères Communs version 3.1r5
- cert_id: ANSSI-CC-2019/28
- certification_date: 2019-07-19
- developer: Idemia et NXP Semiconductors GmbH
- evaluation_facility: CEA-Leti
- level: EAL5+
- mutual_recognition: SOG-IS CCRA
- protection_profile: Java Card Protection Profile Open Configuration, version 3.0
- report_link: https://cyber.gouv.fr/sites/default/files/2019/08/anssi-cc-2019_28fr.pdf
- sponsor: Idemia
- target_link: https://cyber.gouv.fr/sites/default/files/2019/08/anssi-cible-cc-2019_28-m02en.pdf
- level: EAL5+
- product: Plateforme ID-One Cosmo v8.2, masquée sur le composant NXP P60D145
- sponsor: Idemia
- url: https://cyber.gouv.fr/produits-certifies/plateforme-id-one-cosmo-v82-masquee-sur-le-composant-nxp-p60d145
|
- cert_id: ANSSI-CC-2014/09
- description: Le produit évalué est la carte à puce fermée « MultiApp V3 », pouvant être en mode contact ou sans-contact. Le produit est développé par la société Gemalto et embarqué sur le microcontrôleur M7820 A11 fabriqué par la société Infineon Technologies. Le produit implémente les fonctions de document de voyage électronique conformément aux spécifications de l'organisation de l'aviation civile
- developer: Gemalto / Infineon Technologies AG
- enhanced:
- augmented: ALC_DVS.2
- category: Cartes à puce
- cc_version: Critères Communs version 3.1r4
- cert_id: ANSSI-CC-2014/09
- certification_date: 2014-02-03
- developer: Gemalto / Infineon Technologies AG
- evaluation_facility: Serma Technologies
- level: EAL4+
- mutual_recognition: SOG-IS CCRA
- protection_profile: BSI-CC-PP-0055, PP BAC
- report_link: https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2014-09fr.pdf
- sponsor: Gemalto
- target_link: https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2014-09en.pdf
- level: EAL4+
- product: Application eTravel EAC v2.0, en configuration BAC, sur la carte à puce fermée MultiApp V3 masquée sur le composant M7820 A11 (Version du patch : 1.5)
- sponsor: Gemalto
- url: https://cyber.gouv.fr/produits-certifies/application-etravel-eac-v20-en-configuration-bac-sur-la-carte-puce-fermee-0
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0829-2012 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0813-2012, BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0695-2011, BSI-DSZ-CC-0829-2012 |
heuristics/verified_cpe_matches |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
anssi-cc_2009-48en.pdf |
Rapport ANSSI-CC-2014_09fr.pdf |
pdf_data/report_frontpage |
- FR:
- cc_security_level: EAL 5 augmented ADV_IMP.2, ALC_DVS.2, AVA_VAN.5
- cc_version: Common Criteria version 3.1
- cert_id: ANSSI-CC-2009/36
- cert_item: ID-One Cosmo V7.0-n SmartCard in configuration Large, Standard, Basic (dual or contact modes) or Entry (mode dual) on NXP components
- cert_item_version: JavaCard Platform version for any configuration: 7.0-n Optional Code r4.0 Generic version for any configuration: 069774
- cert_lab: THALES - CEACI (T3S – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France Phone: +33 (0)5 62 88 28 01 or 18, email : [email protected]
- developer: Oberthur Technologies1 50 quai Michelet 92300 Levallois-Perret, France NXP Semiconductors GmbH1 Stresemannallee 101 D-22502 Hamburg, Germany Sponsor Oberthur Technologies 50 quai Michelet, 92300 Levallois-Perret, France
- match_rules: ['Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developer\\(s\\)(.+)Evaluation facility(.+)Recognition arrangements']
- ref_protection_profiles: PP/0304] Java Card System - Standard 2.1.1 Configuration Protection Profile – version 1.0b, August 2003 Certified by ANSSI
|
- FR:
- cc_security_level: EAL 4 augmenté ALC_DVS.2
- cc_version: Critères Communs version 3.1 révision 4
- cert_id: ANSSI-CC-2014/09
- cert_item: Application eTravel EAC v2.0, en configuration BAC, sur la carte à puce fermée MultiApp V3 masquée sur le composant M7820 A11
- cert_item_version: Version de l’application eTravel EAC : 2.0 Version plateforme Java Card MultiApp : 3.0 Version du patch : 1.5
- cert_lab: Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
- developer: Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France Infineon Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: BSI-CC-PP-0055, [PP BAC], version 1.10 Machine Readable Travel Document with ICAO application, Basic Access Control
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0404-2007: 2
- BSI-DSZ-CC-0410-2007: 2
- BSI-DSZ-CC-0411-2007: 2
- FR:
- ANSSI-CC-2009/36: 1
- ANSSI-CC-2009/48: 17
|
- DE:
- FR:
- ANSSI-CC-2014/06: 3
- ANSSI-CC-2014/09: 21
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0055: 1
- BSI-CC-PP-0055-2009: 1
- BSI-PP-0035-: 1
- BSI-PP-0035-2007: 2
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 1
- EAL 5: 3
- EAL 5 augmented: 2
- EAL 7: 1
- EAL4: 1
- EAL5: 1
- EAL7: 1
- ITSEC:
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 2
- EAL 5: 1
- EAL 7: 1
- EAL4: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADO:
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_IMP.2: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
- AVA_MSU.3: 1
- AVA_VAN: 1
- AVA_VAN.5: 1
- AVA_VLA.4: 1
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.3: 1
- AVA_VAN.5: 1
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
- NXP:
- NXP: 26
- NXP Semiconductors: 3
- Oberthur:
- Oberthur: 2
- Oberthur Technologies: 15
|
- Gemalto:
- Infineon:
- Infineon: 2
- Infineon Technologies: 23
- Infineon Technologies AG: 1
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2006-09-001: 1
- CCMB-2007-09-002: 1
- CCMB-2007-09-003: 1
- CCMB-2007-09-004: 1
- SCP:
- SCP01: 1
- SCP02: 1
- SCP03: 1
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- ICAO:
|
pdf_data/report_keywords/javacard_version |
- GlobalPlatform:
- JavaCard:
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20100204113143+01'00'
- /Keywords:
- /ModDate: D:20100204113143+01'00'
- /Producer: Acrobat Distiller 8.0.0 (Windows)
- pdf_file_size_bytes: 159490
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 17
|
- /Author: Duquesnoy
- /CreationDate: D:20140318135351+01'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20140318135351+01'00'
- /Producer: Acrobat Distiller 9.0.0 (Windows)
- /Title: Microsoft Word - Rapport ANSSI-CC-2014_09fr.doc
- pdf_file_size_bytes: 284279
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
pdf_data/st_filename |
anssi-cc-cible_2009-48en.pdf |
Cible ANSSI-CC-2014_09en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0404: 4
- BSI-DSZ-CC-0404-2007-MA-04: 3
- BSI-DSZ-CC-0410: 3
- BSI-DSZ-CC-0410-2007-MA-04: 3
- BSI-DSZ-CC-0411: 1
- BSI-DSZ-CC-0411-2007-MA-03: 2
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0056-V2-2012: 1
- BSI-CC-PP-0068-V2-2011: 1
- BSI-PP-0035: 1
- BSI-PP-0055: 1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL5: 3
- EAL5 augmented: 3
- EAL5+: 1
|
- EAL:
- EAL 5+: 1
- EAL5: 2
- EAL5 augmented: 2
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_ARP: 2
- FAU_ARP.1: 4
- FAU_GEN: 1
- FAU_GEN.1: 2
- FAU_SAA: 1
- FAU_SAA.1: 2
- FAU_SAR: 1
- FAU_SAR.1: 2
- FCO:
- FCS:
- FCS_CKM: 5
- FCS_CKM.1: 3
- FCS_CKM.2: 1
- FCS_CKM.2.1: 1
- FCS_CKM.3: 1
- FCS_CKM.3.1: 1
- FCS_CKM.4: 2
- FCS_CKM.4.1: 1
- FCS_COP: 7
- FCS_COP.1: 7
- FCS_COP.1.1: 1
- FCS_RND: 1
- FCS_RNG: 4
- FCS_RNG.1: 7
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FDP:
- FDP_ACC: 5
- FDP_ACC.2: 9
- FDP_ACF: 4
- FDP_ACF.1: 18
- FDP_IFC: 2
- FDP_IFC.1: 1
- FDP_IFC.2: 2
- FDP_IFF: 2
- FDP_IFF.1: 10
- FDP_ITC: 2
- FDP_ITC.1: 3
- FDP_ITC.2: 5
- FDP_RIP: 9
- FDP_RIP.1: 10
- FDP_ROL: 1
- FDP_ROL.1: 2
- FDP_SDI.1: 1
- FDP_SDI.1.1: 1
- FDP_SDI.2: 1
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UCT: 1
- FDP_UCT.1: 1
- FDP_UIT: 1
- FDP_UIT.1: 2
- FIA:
- FIA_AFL: 4
- FIA_AFL.1: 8
- FIA_ATD: 2
- FIA_ATD.1: 3
- FIA_UAU: 6
- FIA_UAU.1: 4
- FIA_UAU.4: 2
- FIA_UAU.7: 2
- FIA_UID: 4
- FIA_UID.1: 6
- FIA_UID.2: 1
- FIA_USB.1: 2
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF: 2
- FMT_MOF.1: 2
- FMT_MSA: 11
- FMT_MSA.1: 6
- FMT_MSA.2: 1
- FMT_MSA.3: 8
- FMT_MTD: 3
- FMT_MTD.1: 3
- FMT_MTD.2: 2
- FMT_MTD.3: 1
- FMT_MTD.3.1: 1
- FMT_SMF: 4
- FMT_SMF.1: 4
- FMT_SMR: 6
- FMT_SMR.1: 9
- FMT_SMR.2: 6
- FPR:
- FPR_UNO: 4
- FPR_UNO.1: 5
- FPR_UNO.1.1: 1
- FPT:
- FPT_FLS: 5
- FPT_FLS.1: 5
- FPT_PHP: 3
- FPT_PHP.2: 3
- FPT_PHP.3: 2
- FPT_RCV: 3
- FPT_RCV.3: 8
- FPT_RCV.4: 1
- FPT_TDC: 1
- FPT_TDC.1: 3
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST: 2
- FPT_TST.1: 6
- FRU:
- FRU_FLT: 1
- FRU_FLT.1: 1
- FRU_RSA: 1
- FRU_RSA.1: 1
- FTP:
|
- FAU:
- FAU_GEN: 1
- FAU_SAS: 8
- FAU_SAS.1: 5
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 23
- FCS_CKM.1: 8
- FCS_CKM.1.1: 2
- FCS_CKM.2: 3
- FCS_CKM.4: 16
- FCS_CKM.4.1: 1
- FCS_COP: 24
- FCS_COP.1: 5
- FCS_COP.1.1: 4
- FCS_RND: 8
- FCS_RND.1: 8
- FCS_RND.1.1: 2
- FDP:
- FDP_ACC: 5
- FDP_ACC.1: 3
- FDP_ACC.1.1: 1
- FDP_ACF: 7
- FDP_ACF.1: 1
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FDP_ITC.1: 5
- FDP_ITC.2: 5
- FDP_RIP: 2
- FDP_RIP.1: 1
- FDP_RIP.1.1: 1
- FDP_UCT: 2
- FDP_UCT.1.1: 1
- FDP_UIT: 2
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL: 12
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_API: 7
- FIA_API.1: 4
- FIA_API.1.1: 1
- FIA_SOS.2: 1
- FIA_UAU: 25
- FIA_UAU.1: 2
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UAU.4: 1
- FIA_UAU.4.1: 1
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6.1: 1
- FIA_UID: 11
- FIA_UID.1: 3
- FIA_UID.1.1: 2
- FIA_UID.1.2: 2
- FMT:
- FMT_LIM: 6
- FMT_LIM.1: 15
- FMT_LIM.1.1: 3
- FMT_LIM.2: 14
- FMT_LIM.2.1: 3
- FMT_MSA.1: 1
- FMT_MSA.3: 2
- FMT_MTD: 15
- FMT_MTD.1: 1
- FMT_MTD.1.1: 4
- FMT_SMF.1: 13
- FMT_SMF.1.1: 1
- FMT_SMR: 10
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS: 6
- FPT_EMS.1: 6
- FPT_EMS.1.1: 3
- FPT_EMS.1.2: 3
- FPT_FLS: 1
- FPT_FLS.1: 2
- FPT_FLS.1.1: 1
- FPT_PHP.3: 4
- FPT_PHP.3.1: 1
- FPT_TST: 3
- FPT_TST.1: 3
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 5
- FTP_ITC.1: 2
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 2
|
pdf_data/st_keywords/cc_claims |
- A:
- A.APPLET: 1
- A.NATIVE: 1
- A.VERIFICATION: 1
- D:
- D.API_DATA: 3
- D.APPLILIFECYC: 1
- D.APP_CODE: 5
- D.APP_C_DATA: 3
- D.APP_I_DATA: 3
- D.ARRAY: 3
- D.AUDITLOG: 1
- D.CONFIG: 2
- D.CRYPTO: 4
- D.GLPIN: 1
- D.JCS_CODE: 3
- D.JCS_DATA: 5
- D.KEY: 2
- D.LOADFILE: 1
- D.NB_REMAINTRYGLB: 1
- D.PIN: 6
- D.SEC_DATA: 7
- D.SENSITIVE_DATA: 1
- O:
- O.ALARM: 1
- O.APPLET: 16
- O.CARD-MANAGEMENT: 3
- O.CIPHER: 1
- O.CODE_PCKG: 8
- O.CODE_PKG: 6
- O.DELETION: 1
- O.FIREWALL: 1
- O.INSTALL: 1
- O.JAVAOBJEC: 4
- O.JAVAOBJECT: 31
- O.KEY-MNGT: 1
- O.LOAD: 3
- O.NATIVE: 1
- O.OBJ-DELETION: 1
- O.OPERATE: 1
- O.PIN-MNGT: 1
- O.REALLOCATION: 1
- O.RESOURCES: 1
- O.SCP: 3
- O.SECURE_COMPARE: 1
- O.SHRD_VAR_CONFID: 1
- O.SHRD_VAR_INTEG: 1
- O.SID: 1
- O.TRANSACTION: 1
- OE:
- OE.APPLET: 1
- OE.NATIVE: 1
- OE.VERIFICATION: 1
- OP:
- OP.ARRAY_ACCESS: 3
- OP.CREATE: 5
- OP.DELETE_APPLET: 3
- OP.DELETE_PCKG: 2
- OP.DELETE_PCKG_APPLET: 2
- OP.INSTANCE_FIELD: 2
- OP.INVK_INTERFACE: 4
- OP.INVK_VIRTUAL: 3
- OP.JAVA: 4
- OP.PUT: 4
- OP.RECEIVE: 1
- OP.SEND: 1
- OP.THROW: 3
- OP.TYPE_ACCESS: 3
- OSP:
- R:
- T:
- T.CONFID-APPLI-DATA: 1
- T.CONFID-JCS-CODE: 1
- T.CONFID-JCS-DATA: 1
- T.CONFIGURATION: 2
- T.CONF_DATA_APPLET: 2
- T.DELETION: 1
- T.EXE-CODE: 2
- T.INSTALL: 1
- T.INTEG-APPLI-CODE: 4
- T.INTEG-APPLI-DATA: 4
- T.INTEG-APPLICODE: 1
- T.INTEG-APPLIDATA: 1
- T.INTEG-JCS-CODE: 1
- T.INTEG-JCS-DATA: 1
- T.NATIVE: 1
- T.OBJ-DELETION: 1
- T.PHYSICAL: 1
- T.RESSOURCES: 1
- T.SID: 2
|
|
pdf_data/st_keywords/vendor |
- NXP:
- Oberthur:
- OBERTHUR: 2
- Oberthur: 1
- Oberthur Technologies: 190
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 2
- TDES: 5
- Triple-DES: 3
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- fault injection: 1
- malfunction: 2
- physical tampering: 4
- SCA:
- DPA: 1
- SPA: 1
- physical probing: 2
- other:
|
- FI:
- Malfunction: 3
- Physical Tampering: 2
- Physical tampering: 2
- fault injection: 1
- malfunction: 4
- SCA:
- DPA: 2
- Leak-Inherent: 1
- SPA: 1
- physical probing: 3
- timing attacks: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.COM: 3
- EF.DG1: 7
- EF.DG15: 2
- EF.DG16: 5
- EF.DG2: 5
- EF.DG3: 1
- EF.DG4: 1
- EF.DG5: 1
- EF.DG6: 2
- EF.SOD: 4
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 180-3: 1
- FIPS PUB 180-2: 1
- FIPS PUB 186-2: 1
- FIPS PUB 197: 2
- FIPS PUB 46-3: 5
- FIPS PUB 81: 4
- PKCS:
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- FIPS:
- FIPS 186-3: 1
- FIPS 197: 1
- FIPS PUB 46-3: 1
- FIPS180-2: 1
- FIPS46-3: 1
- ICAO:
- ISO:
- ISO/IEC 14443: 4
- ISO/IEC 7816-4: 1
- NIST:
- PKCS:
- RFC:
- SCP:
- SCP01: 1
- SCP02: 1
- SCP03: 2
|
pdf_data/st_keywords/javacard_version |
- GlobalPlatform:
- JavaCard:
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
- java:
- javacard:
- javacard.framework: 3
- javacard.security: 1
- javacardx:
- javacardx.framework.util: 1
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- out of scope: 1
- to the plastic travel document is achieved by physical and organisational security measures being out of scope of the current ST. The TOE comprises: i) the circuitry of the contactless/contact chip incl. all IC: 1
|
pdf_data/st_metadata |
- /CreationDate: D:20091125163034+01'00'
- /Keywords:
- /ModDate: D:20091125163034+01'00'
- /Producer: AFPL Ghostscript 8.50
- pdf_file_size_bytes: 682980
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 93
|
- /Author: Antoine de Lavernette
- /CreationDate: D:20140123162320+01'00'
- /Creator: Microsoft® Office Word 2007
- /Keywords: Security Target, CC, eTravel
- /ModDate: D:20140123162320+01'00'
- /Producer: Microsoft® Office Word 2007
- /Subject: MRTD
- /Title: eTravel EAC v2 Security Target
- pdf_file_size_bytes: 889635
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 65
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |