Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
CA eHealth Network Performance Manager r6.1.2
CCEVS-VR-VID-10367-2010
Plateforme Java Card en configuration ouverte de la carte à puce MultiApp v3.1 masquée sur le composant P60D080PVC(Version du patch : 1.4)
ANSSI-CC-2014/86
name CA eHealth Network Performance Manager r6.1.2 Plateforme Java Card en configuration ouverte de la carte à puce MultiApp v3.1 masquée sur le composant P60D080PVC(Version du patch : 1.4)
category Network and Network-Related Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme US FR
not_valid_after 01.11.2014 22.12.2019
not_valid_before 19.05.2010 22.12.2014
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10367-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2014_86.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10367-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI_cible2014_86_LITE.pdf
manufacturer CA Technologies Gemalto / NXP Semiconductors
manufacturer_web https://www.ca.com https://www.gemalto.com/
security_level EAL2 EAL5+, AVA_VAN.5, ALC_DVS.2
dgst fb721dfc90adae4a c85d31ec52d309ee
heuristics/cert_id CCEVS-VR-VID-10367-2010 ANSSI-CC-2014/86
heuristics/cert_lab US SERMA
heuristics/extracted_sars ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ASE_SPD.1, ALC_CMC.2, ASE_TSS.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ADV_ARC.1 ATE_FUN.1, ATE_DPT.3, AVA_VAN.5, ALC_CMC.4, ADV_INT.2, AGD_PRE.1, ATE_IND.2, ALC_FLR.1, ADV_IMP.1, ADV_TDS.4, ALC_LCD.1, ALC_DVS.2, ATE_COV.2, ASE_TSS.2, ALC_CMS.5, AGD_OPE.1, ADV_FSP.5, ALC_DEL.1, ADV_ARC.1, ALC_TAT.2
heuristics/extracted_versions 6.1.2 3.1, 1.4
heuristics/report_references/directly_referenced_by {} ANSSI-CC-2015/30, ANSSI-CC-2015/02, ANSSI-CC-2015/01, ANSSI-CC-2015/15, ANSSI-CC-2015/04, ANSSI-CC-2015/03, ANSSI-CC-2015/08
heuristics/report_references/directly_referencing {} ANSSI-CC-2014/06, BSI-DSZ-CC-0837-2013
heuristics/report_references/indirectly_referenced_by {} ANSSI-CC-2015/30, ANSSI-CC-2016/04, ANSSI-CC-2016/03, ANSSI-CC-2015/02, ANSSI-CC-2015/01, ANSSI-CC-2015/40, ANSSI-CC-2015/38, ANSSI-CC-2015/15, ANSSI-CC-2015/37, ANSSI-CC-2015/04, ANSSI-CC-2015/39, ANSSI-CC-2015/41, ANSSI-CC-2015/03, ANSSI-CC-2015/08
heuristics/report_references/indirectly_referencing {} ANSSI-CC-2014/06, BSI-DSZ-CC-0837-2013, BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0829-2012
heuristics/scheme_data
  • api_url: https://www.niap-ccevs.org/api/project/product/pcl_products/10367/
  • categories: ['Network Management']
  • category: Network Management
  • certification_date: 19.05.2010
  • evaluation_facility: Booz Allen Hamilton Common Criteria Testing Laboratory
  • expiration_date: 01.11.2014
  • id: CCEVS-VR-VID10367
  • product: CA eHealth Network Performance Manager r6.1.2
  • scheme: US
  • url: https://www.niap-ccevs.org/products/10367
  • vendor: CA Technologies
heuristics/protection_profiles {} 9399bd94f9925b16
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-profil_PP-2010-03en.pdf
pdf_data/report_filename st_vid10367-vr.pdf ANSSI-CC-2014_86.pdf
pdf_data/report_frontpage
  • FR:
  • US:
    • cert_id: CCEVS-VR-VID10367-2010
    • cert_item: CA eHealth Network Performance Manager 6.1.2
    • cert_lab: US NIAP
  • FR:
    • cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
    • cc_version: Critères Communs version 3.1 révision 4
    • cert_id: ANSSI-CC-2014/86
    • cert_item: Plateforme Java Card en configuration ouverte de la carte à puce MultiApp v3.1 masquée sur le composant P60D080PVC
    • cert_item_version: Version de la plateforme Java Card MultiApp : 3.1 Version du patch : 1.4
    • cert_lab: Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
    • developer: Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France NXP Semiconductors Box 54 02 40, D-22502 Hambourg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France
    • match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
    • ref_protection_profiles: ANSSI-CC-PP-2010/03-M01 [PP JCS] Java Card System – Open Configuration, version 3.0
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10367-2010: 1
  • DE:
    • BSI-DSZ-CC-0837-2013: 3
  • FR:
    • ANSSI-CC-2014/06: 1
    • ANSSI-CC-2014/86: 22
    • ANSSI-CC-PP-2010/03-M01: 2
pdf_data/report_keywords/cc_protection_profile_id
  • ANSSI:
    • ANSSI-CC-PP-2010/03-M01: 2
  • BSI:
    • BSI-PP-0035-: 1
    • BSI-PP-0035-2007: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 6
    • EAL2 augmented: 1
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 5: 3
    • EAL 7: 1
    • EAL4: 2
    • EAL6: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.2: 3
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 3
    • AGD_PRE: 3
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 2
    • ALC_FLR: 2
    • ALC_FLR.1: 1
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 3
pdf_data/report_keywords/cc_claims
  • T:
    • T.DOS: 1
pdf_data/report_keywords/vendor
  • Cisco:
    • Cisco: 7
    • Cisco Systems, Inc: 1
  • Microsoft:
    • Microsoft: 1
  • Gemalto:
    • Gemalto: 27
  • NXP:
    • NXP: 3
    • NXP Semiconductors: 2
pdf_data/report_keywords/eval_facility
  • BoozAllenHamilton:
    • Booz Allen Hamilton: 4
  • Serma:
    • Serma Technologies: 2
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 3
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 10
      • SSL v3.0: 3
pdf_data/report_keywords/standard_id
  • NIST:
    • SP 800-53: 1
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
pdf_data/report_keywords/javacard_packages
  • com:
    • com.gemalto.javacardx.pace: 1
  • javacardx:
    • javacardx.pace: 1
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • Interface. The Reports Center is not needed for this functionality. This is untrusted because it is out of scope of the TSF and was such was not tested. Reports Scheduler – This is accessed through the Motif: 1
    • out of scope: 4
    • to fail over to backup systems in the event of a failure. This is untrusted because it is out of scope of the TSF and was such was not tested. VALIDATION REPORT CA eHealth 6.1.2 11 Disaster Recovery: 1
    • to the standby system occurs, which then becomes the active system. This is untrusted because it is out of scope of the TSF and was such was not tested. 6.1.3 Not installed These components are not installed with: 1
    • which is not included in the evaluated configuration. This is untrusted because it is out of scope of the TSF and was such was not tested. High Availability configuration – High availability (HA) is: 1
pdf_data/report_metadata
  • /Author: Beatrice Duquesnoy
  • /CreationDate: D:20150105175233+01'00'
  • /Creator: Microsoft® Word 2010
  • /Keywords: ANSSI-CC-CER-F-07.014
  • /ModDate: D:20150105175233+01'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: Plateforme Java Card en configuration ouverte de la carte à puce MultiApp v3.1 masquée sur le composant P60D080PVC
  • /Title: ANSSI-CC-2014/86
  • pdf_file_size_bytes: 725914
  • pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 21
pdf_data/st_filename st_vid10367-st.pdf ANSSI_cible2014_86_LITE.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0837-2013-MA-01: 2
  • NL:
    • CC-1: 2
    • CC-2: 3
    • CC-3: 3
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0055: 1
    • BSI-CC-PP-0059-2009-MA-01: 1
    • BSI-CC-PP-0075-2012: 1
    • BSI-PP-0005: 1
    • BSI-PP-0006: 1
    • BSI-PP-0035: 1
  • other:
    • PP-SSCD-KG: 2
    • PP-SSCD-KI: 2
    • PP-SSCD-T2: 2
    • PP-SSCD-T3: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 6
    • EAL2 augmented: 1
  • EAL:
    • EAL 6+: 1
    • EAL5: 6
    • EAL5 augmented: 2
    • EAL5+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 12
    • ADV_FSP.2: 13
    • ADV_TDS.1: 13
  • AGD:
    • AGD_OPE.1: 16
    • AGD_PRE.1: 12
  • ALC:
    • ALC_CMC.2: 10
    • ALC_CMS.2: 8
    • ALC_DEL.1: 11
  • ASE:
    • ASE_CCL.1: 13
    • ASE_ECD.1: 12
    • ASE_INT.1: 14
    • ASE_OBJ.2: 12
    • ASE_REQ.2: 15
    • ASE_SPD.1: 9
    • ASE_TSS.2: 12
  • ATE:
    • ATE_COV.1: 6
    • ATE_FUN.1: 10
    • ATE_IND.2: 9
  • AVA:
    • AVA_VAN.2: 9
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 10
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 2
    • ADV_FSP.4: 2
    • ADV_FSP.5: 6
    • ADV_IMP: 1
    • ADV_IMP.1: 9
    • ADV_INT.2: 3
    • ADV_TDS: 1
    • ADV_TDS.1: 2
    • ADV_TDS.3: 4
    • ADV_TDS.4: 8
  • AGD:
    • AGD_OPE.1: 9
    • AGD_PRE: 1
    • AGD_PRE.1: 7
  • ALC:
    • ALC_CMC.4: 3
    • ALC_CMS.5: 2
    • ALC_DEL.1: 3
    • ALC_DVS.1: 2
    • ALC_DVS.2: 9
    • ALC_LCD.1: 5
    • ALC_TAT.1: 2
    • ALC_TAT.2: 5
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 4
    • ATE_DPT.1: 2
    • ATE_DPT.3: 3
    • ATE_FUN.1: 9
    • ATE_IND.2: 4
  • AVA:
    • AVA_VAN.5: 9
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 3
    • FAU_GEN.1: 15
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 9
    • FAU_GEN.2.1: 1
    • FAU_GEN_EXT: 2
    • FAU_GEN_EXT.1: 66
    • FAU_GEN_EXT.1.1: 5
    • FAU_GEN_EXT.1.2: 5
    • FAU_GEN_EXT.1.3: 1
    • FAU_SAR: 3
    • FAU_SAR.1: 12
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 9
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 9
    • FAU_SAR.3.1: 1
    • FAU_SAR_EXT: 1
    • FAU_SAR_EXT.1: 13
    • FAU_SAR_EXT.1.1: 2
  • FCS:
    • FCS_CKM.1: 12
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 12
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 12
    • FCS_COP.1.1: 2
  • FDP:
    • FDP_ACC.1: 9
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 9
    • FDP_ACF.1.1: 4
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_ITC.1: 3
    • FDP_ITC.2: 3
  • FIA:
    • FIA_ATD.1: 11
    • FIA_ATD.1.1: 1
    • FIA_UAU.1: 1
    • FIA_UAU.2: 8
    • FIA_UID.1: 4
    • FIA_UID.2: 8
  • FMT:
    • FMT_MOF.1: 18
    • FMT_MOF.1.1: 2
    • FMT_MSA: 1
    • FMT_MSA.1: 6
    • FMT_MSA.3: 11
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 29
    • FMT_MTD.1.1: 3
    • FMT_SMF.1: 15
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 13
    • FMT_SMR.1.1: 3
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 7
  • FTP:
    • FTP_TRP.1: 9
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_ARP.1: 15
    • FAU_ARP.1.1: 1
    • FAU_SAA.1: 2
  • FCO:
    • FCO_NRO: 7
    • FCO_NRO.2: 3
  • FCS:
    • FCS_CKM.1: 21
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 8
    • FCS_CKM.2.1: 1
    • FCS_CKM.3: 7
    • FCS_CKM.3.1: 1
    • FCS_CKM.4: 15
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 19
    • FCS_COP.1.1: 1
    • FCS_RND: 7
    • FCS_RND.1: 12
    • FCS_RND.1.1: 2
    • FCS_RNG.1: 1
  • FDP:
    • FDP_ACC: 40
    • FDP_ACC.1: 13
    • FDP_ACC.2: 6
    • FDP_ACF: 33
    • FDP_ACF.1: 16
    • FDP_IFC: 24
    • FDP_IFC.1: 12
    • FDP_IFC.2: 2
    • FDP_IFF: 17
    • FDP_IFF.1: 12
    • FDP_ITC: 12
    • FDP_ITC.1: 4
    • FDP_ITC.2: 9
    • FDP_RIP: 85
    • FDP_RIP.1: 10
    • FDP_ROL: 14
    • FDP_ROL.1: 2
    • FDP_SDI.2: 9
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UIT: 7
    • FDP_UIT.1: 2
  • FIA:
    • FIA_ATD: 9
    • FIA_ATD.1: 2
    • FIA_SOS.2: 1
    • FIA_UAI.1: 1
    • FIA_UAU: 7
    • FIA_UAU.1: 1
    • FIA_UID: 14
    • FIA_UID.1: 10
    • FIA_UID.2: 1
    • FIA_USB: 8
    • FIA_USB.1: 3
  • FMT:
    • FMT_MSA: 91
    • FMT_MSA.1: 11
    • FMT_MSA.2: 1
    • FMT_MSA.3: 15
    • FMT_MTD: 18
    • FMT_MTD.1: 3
    • FMT_MTD.3: 1
    • FMT_SMF: 33
    • FMT_SMF.1: 9
    • FMT_SMR: 47
    • FMT_SMR.1: 22
  • FPR:
    • FPR_UNO: 7
    • FPR_UNO.1: 10
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_FLS: 46
    • FPT_FLS.1: 5
    • FPT_ITT: 7
    • FPT_ITT.1: 1
    • FPT_PHP: 7
    • FPT_PHP.3: 2
    • FPT_RCV: 16
    • FPT_RCV.3: 4
    • FPT_RCV.4: 2
    • FPT_TDC.1: 9
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TST: 7
    • FPT_TST.1: 3
  • FTP:
    • FTP_ITC: 9
    • FTP_ITC.1: 5
    • FTP_TRP.1: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 3
    • A.CLIENT: 3
    • A.LOCATE: 3
    • A.NOEVIL: 3
    • A.PASSWORD: 3
    • A.PATCHES: 3
    • A.PROTECT: 3
  • O:
    • O.ACCESS: 4
    • O.AUDIT: 6
    • O.CRYPTOGRAPHIC: 2
    • O.CRYPTOGRAPHIC_FUNCTIO: 1
    • O.CRYPTOGRAPHIC_FUNCTIONS: 2
    • O.IDEN: 4
    • O.MANAGE: 6
    • O.MONITOR: 4
    • O.ROBUST_ADMIN_GUIDANC: 1
    • O.ROBUST_ADMIN_GUIDANCE: 5
  • OE:
    • OE.ADMIN: 5
    • OE.CLIENT: 3
    • OE.LOCATE: 3
    • OE.NOEVIL: 3
    • OE.PASSWORD: 3
    • OE.PROTECT: 3
  • T:
    • T.ACCESS: 3
    • T.ADMIN_ERRO: 1
    • T.ADMIN_ERROR: 3
    • T.AUDIT_COMP: 1
    • T.AUDIT_COMPROMISE: 2
    • T.CRYPTO_COM: 1
    • T.CRYPTO_COMPROMISE: 1
    • T.DOS: 2
    • T.EAVESDROPPI: 1
    • T.EAVESDROPPING: 2
    • T.MASK: 4
    • T.MODIFY: 3
  • A:
    • A.APPLET: 5
    • A.DELETION: 5
    • A.VERIFICATION: 4
  • D:
    • D.API_DATA: 3
    • D.APP_CODE: 6
    • D.APP_C_DATA: 3
    • D.APP_I_DATA: 4
    • D.CRYPTO: 5
    • D.JCS_CODE: 3
    • D.JCS_DATA: 5
    • D.PIN: 4
    • D.SEC_DATA: 7
  • O:
    • O.ALARM: 15
    • O.APPLET: 28
    • O.CARD-MANAGEMENT: 3
    • O.CARD_MANAGEMENT: 18
    • O.CIPHER: 10
    • O.CODE_PCKG: 16
    • O.CODE_PKG: 7
    • O.DELETION: 8
    • O.FIREWALL: 12
    • O.GLOBAL_ARRAYS_CO: 3
    • O.GLOBAL_ARRAYS_CONFID: 6
    • O.GLOBAL_ARRAYS_INT: 3
    • O.GLOBAL_ARRAYS_INTEG: 5
    • O.HW_AES: 2
    • O.INSTALL: 11
    • O.JAVAOBJECT: 56
    • O.KEY-: 1
    • O.KEY-MNGT: 5
    • O.KEY_MNGT: 4
    • O.LOAD: 6
    • O.NATIVE: 11
    • O.OBJ-DELETION: 4
    • O.OPERATE: 15
    • O.PIN-: 1
    • O.PIN-MNGT: 5
    • O.REALLOCATION: 5
    • O.RESOURCES: 9
    • O.RND: 13
    • O.SCP: 36
    • O.SID: 13
    • O.TRANSACTION: 6
  • OE:
    • OE.APPLET: 4
    • OE.CARD-MANAGEMENT: 1
    • OE.CODE-EVIDENCE: 10
    • OE.CODE_EVIDENCE: 1
    • OE.SCP: 6
    • OE.VERIFICATION: 25
  • OP:
    • OP.ARRAY_ACCESS: 6
    • OP.CREATE: 10
    • OP.DELETE_APPLET: 6
    • OP.DELETE_PCKG: 4
    • OP.DELETE_PCKG_APPLET: 4
    • OP.INSTANCE_FIELD: 6
    • OP.INVK_INTERFACE: 10
    • OP.INVK_VIRTUAL: 8
    • OP.JAVA: 8
    • OP.PUT: 7
    • OP.THROW: 7
    • OP.TYPE_ACCESS: 7
  • OSP:
    • OSP: 1
    • OSP.RND: 3
    • OSP.RNG: 1
    • OSP.VERIFICATION: 4
  • R:
    • R.JAVA: 9
  • T:
    • T.CONFID-APPLI-DATA: 4
    • T.CONFID-JCS-CODE: 4
    • T.CONFID-JCS-DATA: 4
    • T.DELETION: 3
    • T.EXE-CODE: 8
    • T.INSTALL: 4
    • T.INTEG-APPLI-CODE: 7
    • T.INTEG-APPLI-DATA: 8
    • T.INTEG-JCS-CODE: 3
    • T.INTEG-JCS-DATA: 4
    • T.NATIVE: 4
    • T.OBJ-DELETION: 4
    • T.PHYSICAL: 4
    • T.RESOURCES: 3
    • T.SID: 8
pdf_data/st_keywords/vendor
  • Cisco:
    • Cisco: 8
    • Cisco Systems, Inc: 1
  • Microsoft:
    • Microsoft: 1
  • Gemalto:
    • Gemalto: 117
  • NXP:
    • NXP: 12
pdf_data/st_keywords/eval_facility
  • BoozAllenHamilton:
    • Booz Allen Hamilton: 2
  • Serma:
    • SERMA: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 18
  • DES:
    • 3DES:
      • TDEA: 1
      • TDES: 9
      • Triple-DES: 2
    • DES:
      • DES: 20
  • constructions:
    • MAC:
      • CMAC: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 8
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 3
  • FF:
    • DH:
      • DH: 5
      • Diffie-Hellman: 4
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 7
  • SHA:
    • SHA1:
      • SHA-1: 4
    • SHA2:
      • SHA-224: 3
      • SHA-256: 4
      • SHA-384: 4
      • SHA-512: 3
      • SHA224: 1
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key agreement: 2
  • MAC:
    • MAC: 10
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 15
      • SSL v3.0: 22
  • PACE:
    • PACE: 10
pdf_data/st_keywords/randomness
  • PRNG:
    • PRNG: 1
  • RNG:
    • RND: 19
    • RNG: 7
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 3
    • fault induction: 2
    • malfunction: 2
    • physical tampering: 1
  • SCA:
    • DPA: 1
    • Leak-Inherent: 3
    • physical probing: 2
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2007-09-004: 1
  • FIPS:
    • FIPS 46-3: 2
  • RFC:
    • RFC 1321: 2
    • RFC 2021: 1
  • BSI:
    • AIS31: 1
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • FIPS:
    • FIPS180-2: 1
    • FIPS197: 4
  • ICAO:
    • ICAO: 3
  • NIST:
    • SP 800-38: 2
  • PKCS:
    • PKCS#1: 8
    • PKCS#3: 1
    • PKCS#5: 5
  • SCP:
    • SCP01: 3
    • SCP02: 3
    • SCP03: 3
pdf_data/st_keywords/javacard_version
  • JavaCard:
    • JC2.2.2: 1
    • Java Card 2.2.2: 7
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 7
pdf_data/st_keywords/javacard_packages
  • javacard:
    • javacard.framework: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • Interface. The Reports Center is not needed for this functionality. This is untrusted because it is out of scope of the TSF and was such was not tested. Reports Scheduler – This is accessed through the Motif: 1
    • out of scope: 4
    • to fail over to backup systems in the event of a failure. This is untrusted because it is out of scope of the TSF and was such was not tested. Disaster Recovery configuration - An eHealth environment: 1
    • to the standby system occurs, which then becomes the active system. This is untrusted because it is out of scope of the TSF and was such was not tested. 2.2.3 Not installed These components are not installed with: 1
    • which is not included in the evaluated configuration. This is untrusted because it is out of scope of the TSF and was such was not tested. High Availability configuration – High availability (HA) is: 1
  • OutOfScope:
    • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
    • out of scope: 1
pdf_data/st_metadata
  • /CreationDate: D:20100526203404
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20100526203404
  • /Producer: Microsoft® Office Word 2007
  • pdf_file_size_bytes: 898971
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 96
  • /Author: Antoine de Lavernette
  • /CreationDate: D:20141107143457+01'00'
  • /Creator: Microsoft® Office Word 2007
  • /Keywords: Security Target, CC
  • /ModDate: D:20141107143457+01'00'
  • /Producer: Microsoft® Office Word 2007
  • /Subject: Security Target
  • /Title: eTravel v1.0 Security Target MAÏA3
  • pdf_file_size_bytes: 1611052
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 93
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different