Feitian FT-JCOS v1.0/0.106.13 running on Infineon M7892 B11

CSV information ?

Status archived
Valid from 22.11.2016
Valid until 22.11.2021
Scheme 🇳🇴 NO
Manufacturer Feitian Technologies Co., Ltd.
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level AVA_VAN.5, EAL5+, ALC_DVS.2
Protection profiles

Heuristics summary ?

Certificate ID: SERTIT-091

Certificate ?

Certification report ?

Extracted keywords

Symmetric Algorithms
AES, DES
Asymmetric Algorithms
ECC

JavaCard versions
Java Card 2.2.2, GlobalPlatform 2.1.1
Vendor
Infineon, Feitian, Feitian Technologies Co

Security level
EAL 5+, EAL 2, EAL 4, EAL1, EAL7, EAL5
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, ADV_COMP.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR, ALC_DVS.2, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.2, ALC_COMP.1, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, ATE_COMP.1, ATE_IND, AVA_VAN.5, AVA_COMP.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.2, ASE_SPD.1, ASE_OBJ.2, ASE_TSS.1, ASE_COMP.1
Security Functional Requirements (SFR)
FAU_ARP.1, FCO_NRO, FCS_RNG.1, FCS_CKM.1, FCS_CKM.2, FCS_CKM.3, FCS_CKM.4, FCS_COP.1, FDP_ACC, FDP_ACF, FDP_IFC, FDP_IFF, FDP_ITC, FDP_RIP, FDP_ROL, FDP_SDI.2, FDP_UIT, FIA_UID, FIA_USB, FMT_MSA, FMT_MTD, FMT_SMF.1, FMT_SMF, FMT_SMR.1, FMT_SMR, FPR_UNO.1, FPT_FLS.1, FPT_FLS, FPT_RCV, FPT_TDC.1, FTP_ITC
Certificates
SERTIT-091
Evaluation facilities
Brightsight

Side-channel analysis
JIL

Standards
ISO/IEC 15408, ISO/IEC 7816, ISO/IEC 14443, SCP02, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004

File metadata

Author: Rage, Arne Høye
Creation date: D:20161122114425Z00'00'
Modification date: D:20161122114425Z00'00'
Pages: 23
Creator: Microsoft® Word 2010
Producer: Mac OS X 10.12.1 Quartz PDFContext

References

Outgoing

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES, TDES, Triple-DES, TDEA, CMAC
Asymmetric Algorithms
RSA2048, ECDH, ECDSA, ECC, Diffie-Hellman
Hash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-2, MD5
Schemes
MAC, Key exchange, Key Agreement
Randomness
TRNG, RND, RNG
Libraries
v1.02.013
Block cipher modes
CBC, CCM

JavaCard versions
Java Card 2.2.2, GlobalPlatform 2.1.1
JavaCard API constants
TYPE_ACCESS
Vendor
Infineon, Infineon Technologies AG, Feitian Technologies Co, Feitian

Security level
EAL 4, EAL 5, EAL5+, EAL5, EAL6, EAL6+, EAL 5 augmented, EAL5 augmented, EAL6 augmented
Claims
D.APP_CODE, D.APP_C_DATA, D.APP_I_DATA, D.PIN, D.API_DATA, D.CRYPTO, D.JCS_CODE, D.JCS_DATA, D.SEC_DATA, D.JCS_KEYS, D.SEC_ATTRIBUTES, D.CM_APDU, O.CARD-, O.IC_SUPPORT, O.RECOVERY, O.OS_SUPPORT, O.COMMUNICATION, O.RND, O.REMOTE, O.SID, O.FIREWALL, O.GLOBAL_ARRAYS_CONFID, O.GLOBAL_ARRAYS_INTEG, O.NATIVE, O.OPERATE, O.REALLOCATION, O.RESOURCES, O.ALARM, O.CIPHER, O.KEY-MNGT, O.PIN-MNGT, O.TRANSACTION, O.OBJ-DELETION, O.DELETION, O.LOAD, O.INSTALL, O.CARD-MANAGEMENT, O.KEY-, O.APPLET, O.CODE_PKG, O.JAVAOBJECT, O.PACKAGE, O.GLOBAL, O.PIN-, O.OS, T.CONFID-APPLI-DATA, T.CONFID-JCS-CODE, T.CONFID-JCS-DATA, T.INTEG-APPLI-CODE, T.INTEG-APPLI-DATA, T.INTEG-JCS-CODE, T.INTEG-JCS-DATA, T.SID, T.EXE-CODE, T.NATIVE, T.RESOURCES, T.DELETION, T.INSTALL, T.COMMUNICATION, T.OBJ-DELETION, T.PHYSICAL, T.LEAKAGE, T.FAULT, T.RND, T.CONFID-APPLI-, T.INTEG-APPLI-, T.INTEG-, T.EXE-, T.INTEG-JCS-, T.CONFID-, A.APPLET, A.DELETION, A.VERIFICATION, R.JAVA, OP.ARRAY_ACCESS, OP.CREATE, OP.LOAD_PCKG, OP.DELETE_APPLET, OP.DELETE_PCKG, OP.DELETE_PCKG_APPLET, OP.GP, OP.INSTANCE_FIELD, OP.INVK_VIRTUAL, OP.INVK_INTERFACE, OP.JAVA, OP.THROW, OP.TYPE_ACCESS, OP.PUT, OE.CARD-MANAGEMENT, OE.SCP, OE.CODE-EVIDENCE, OE.APPLET, OE.VERIFICATION, OE.CODE-, OSP.VERIFICATION
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_TDS.1, ADV_FSP.4, ADV_TDS.3, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, ADV_FSP.5, ADV_FSP.2, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_TAT.1, ALC_TAT.2, ALC_CMC.4, ALC_CMS.1, ALC_DVS.1, ALC_CMS.4, ALC_CMS.5, ALC_DEL.1, ALC_LCD.1, ATE_COV.2, ATE_FUN.1, ATE_COV.1, ATE_DPT.1, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1, ASE_REQ.2, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_ARP.1.1, FAU_ARP.1, FAU_SAA.1, FCO_NRO, FCO_NRO.2, FCS_RNG, FCS_COP, FCS_CKM.1, FCS_CKM.2, FCS_CKM.2.1, FCS_CKM.3, FCS_CKM.3.1, FCS_CKM.4, FCS_CKM.4.1, FCS_COP.1, FCS_RNG.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM, FDP_ACC, FDP_ACC.2, FDP_ACF, FDP_ACF.1, FDP_IFC, FDP_IFC.1, FDP_IFF, FDP_IFF.1, FDP_RIP, FDP_RIP.1, FDP_ROL.1, FDP_ROL, FDP_SDI.2, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ITC, FDP_ITC.2, FDP_IFC.2, FDP_UIT, FDP_UIT.1, FDP_ACC.1, FDP_SDI.1, FDP_ITT.1, FIA_ATD, FIA_ATD.1, FIA_UID, FIA_UID.2, FIA_USB, FIA_USB.1, FIA_UID.1, FMT_MSA, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD, FMT_MTD.1, FMT_MTD.3, FMT_SMR, FMT_SMF, FPR_UNO.1.1, FPR_UNO.1, FPT_TDC.1.2, FPT_FLS.1, FPT_FLS.1.1, FPT_TDC.1, FPT_TDC.1.1, FPT_FLS, FPT_RCV, FPT_RCV.3, FPT_RCV.4, FPT_TST.1, FPT_PHP.3, FPT_ITT.1, FRU_FLT.2, FTP_ITC, FTP_ITC.1, FTP_TRP.1
Protection profiles
BSI-PP-0084
Certificates
BSI-DSZ-CC-0782-, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0782-2012-MA-01
Certification process
out of scope, Software development environment. Phase 2 covers the Secure IC Development of Infineon and is out of scope of the TOE evaluation as that is part of the IC platform evaluation. In Phase 3, the Chip, a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.RECOVERY and O.OS_SUPPORT are

Side-channel analysis
Leak-Inherent, physical probing, DPA, SPA, timing attacks, physical tampering, malfunction, Malfunction
Certification process
out of scope, Software development environment. Phase 2 covers the Secure IC Development of Infineon and is out of scope of the TOE evaluation as that is part of the IC platform evaluation. In Phase 3, the Chip, a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.RECOVERY and O.OS_SUPPORT are

Standards
FIPS 186-3, FIPS140, FIPS180-4, FIPS197, FIPS PUB 140-2, FIPS PUB 197, FIPS PUB 180-4, AIS20, AIS36, RFC 5639, ICAO, SCP02, SCP03

File metadata

Creation date: D:20160409153415+08'00'
Pages: 100
Creator: LaTeX with hyperref package
Producer: MiKTeX-xdvipdfmx (0.7.8)

References

Outgoing
  • BSI-DSZ-CC-0782-2012 - Infineon Security Controller M7892 B11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01 and Toolbox v1.02.013 libraries and with specific IC dedicated software (firmware)

Heuristics ?

Certificate ID: SERTIT-091

Extracted SARs

ASE_SPD.1, ASE_COMP.1, ADV_TDS.4, AGD_PRE.1, ALC_DVS.2, ASE_ECD.1, ASE_TSS.1, ALC_CMC.4, ALC_LCD.1, ADV_FSP.5, ALC_TAT.2, ADV_ARC.1, ASE_REQ.2, ALC_DEL.1, ATE_COV.2, ASE_CCL.1, ASE_INT.1, AGD_OPE.1, ATE_FUN.1, ADV_IMP.1, ALC_COMP.1, AVA_VAN.5, ATE_IND.2, ASE_OBJ.2, ALC_CMS.5, ADV_COMP.1, ATE_COMP.1, AVA_COMP.1, ADV_INT.2, ATE_DPT.1

Scheme data ?

Product Feitian FT-JCOS
Url https://sertit.no/certified-products/product-archive/feitian-ft-jcos
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Developer Feitian Technologies Co., Ltd.
Certification Date 22.11.2016
Enhanced
Description FT-JCOS V1.0 is a Java Card Platform compliant with Java Card Specification v.2.2.2 and GlobalPlatform Specification v.2.1.1. It allows post-issuance downloading of applications that have been previously verified by an off-card trusted IT component. It constitutes a secure generic platform that supports multi-application runtime environment and provides facilities for secure loading and interoperability between different applications. Typical applications of FT-JCOS V1.0 are financial applications, transport ticketing, telephony, personal identification, electronic passports, secure information storage, loyalty programs and so on.
Id SERTIT-091
Mutual Recognition CCRA, SOG-IS
Product Hardware M7892 B11; Software FT-JCOS v1.0 0.106.13; Document FT-JCOS v1.0/0.106.13 Administrator Manual 1.0.5, FT-JCOS v1.0/0.106.13 User Manual 1.0.4
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Developer Feitian Technologies Co., Ltd.
Evaluation Facility Brightsight B.V.
Certification Date 22.11.2016
Level EAL 5, ALC_DVS.2, AVA_VAN.5
Protection Profile Java Card™ System Protection Profile Open Configuration, Version 3.0
Documents frozendict({'cert': [frozendict({'href': 'https://sertit.no/getfile.php/135115-1607952953/SERTIT/Sertifikater/2016/91/20161122%20SERTIT-091%20C.pdf'})], 'target': [frozendict({'href': 'https://sertit.no/getfile.php/135118-1607952955/SERTIT/Sertifikater/2016/91/%5B08250%5D%5BFTJCOS%5D%5BST%5D%5BV1.0.12%5DFTJCOS_Security_Target.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/135121-1607952961/SERTIT/Sertifikater/2016/91/SERTIT-091CR%20Feitian%20v1.0.pdf'})]})

References ?

Updates ?

  • 22.04.2024 The certificate data changed.
    Certificate changed

    The Status was updated.

    • The new value is archived.

    The Valid until date was updated.

    • The new value is 2021-11-22.

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'Feitian FT-JCOS', 'url': 'https://sertit.no/certified-products/product-archive/feitian-ft-jcos', 'category': 'ICs, Smart Cards and Smart Card-Related Devices and Systems', 'developer': 'Feitian Technologies Co., Ltd.', 'certification_date': '22.11.2016', 'enhanced': {'description': 'FT-JCOS V1.0 is a Java Card Platform compliant with Java Card Specification v.2.2.2 and GlobalPlatform Specification v.2.1.1. It allows post-issuance downloading of applications that have been previously verified by an off-card trusted IT component. It constitutes a secure generic platform that supports multi-application runtime environment and provides facilities for secure loading and interoperability between different applications. Typical applications of FT-JCOS V1.0 are financial applications, transport ticketing, telephony, personal identification, electronic passports, secure information storage, loyalty programs and so on.', 'id': 'SERTIT-091', 'mutual_recognition': 'CCRA, SOG-IS', 'product': 'Hardware M7892 B11; Software FT-JCOS v1.0 0.106.13; Document FT-JCOS v1.0/0.106.13 Administrator Manual 1.0.5, FT-JCOS v1.0/0.106.13 User Manual 1.0.4', 'category': 'ICs, Smart Cards and Smart Card-Related Devices and Systems', 'developer': 'Feitian Technologies Co., Ltd.', 'evaluation_facility': 'Brightsight B.V.', 'certification_date': '22.11.2016', 'level': 'EAL 5, ALC_DVS.2, AVA_VAN.5', 'protection_profile': 'Java Card™ System Protection Profile Open Configuration, Version 3.0', 'documents': {'cert': [{'href': 'https://sertit.no/getfile.php/135115-1607952953/SERTIT/Sertifikater/2016/91/20161122%20SERTIT-091%20C.pdf'}], 'target': [{'href': 'https://sertit.no/getfile.php/135118-1607952955/SERTIT/Sertifikater/2016/91/%5B08250%5D%5BFTJCOS%5D%5BST%5D%5BV1.0.12%5DFTJCOS_Security_Target.pdf'}], 'report': [{'href': 'https://sertit.no/getfile.php/135121-1607952961/SERTIT/Sertifikater/2016/91/SERTIT-091CR%20Feitian%20v1.0.pdf'}]}}}.
  • 15.02.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '5a8a65baf0a8aee2b250808561dfbcf2dd9713c77b1ddcaf2f7aa2f4a074e468', 'txt_hash': '6d1cc9314978c3d3dcf0ac1dc7fb1e3c314a96f47688d905eabf41c0c7bd74a0'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'cf9ee577c5f614e3552b52d9a691a93372311d9f4288c03cabd00fb0dea71372', 'txt_hash': '3ebeecb7cdc894f501ab212ac846d556944669a7210d69d3a852d8218e7ecdae'}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}}.
    • The following properties were deleted: ['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash'].

    The PDF extraction data was updated.

    • The following values were inserted: {'cert_metadata': None, 'cert_frontpage': None, 'cert_keywords': None, 'cert_filename': None}.
    • The report_frontpage property was set to {}.
    • The st_frontpage property was set to None.
    • The st_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__insert__': {'BSI-DSZ-CC-0782-': 1, 'BSI-DSZ-CC-0782-2012-MA-01': 1}, '__update__': {'BSI-DSZ-CC-0782-2012': 1}}}}} data.
  • 13.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The st_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0782-2012': 2}, '__delete__': ['BSI-DSZ-CC-0782-', 'BSI-DSZ-CC-0782-2012-MA-01']}}}} data.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The st_keywords property was updated, with the {'cc_cert_id': {'__delete__': ['CA']}} data.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The st_keywords property was updated, with the {'cc_cert_id': {'__insert__': {'CA': {'2016-1-6': 1, '2016-1-31': 1, '2016-2-22': 1, '2016-3-1': 1, '2016-3-4': 1, '2016-4-8': 1}}, '__update__': {'DE': {'__insert__': {'BSI-DSZ-CC-0782-': 1, 'BSI-DSZ-CC-0782-2012-MA-01': 1}, '__update__': {'BSI-DSZ-CC-0782-2012': 1}}}}} data.
  • 04.01.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'annotated_references': None}.
  • 21.09.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 26.04.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'scheme_data': {'product': 'FT-JCOS V5.0', 'url': 'https://sertit.no/certified-products/ft-jcos-v5-0-article2247-1919.html', 'category': 'ICs, Smart Cards and Smart Card-Related Devices and Systems', 'developer': 'Feitian Technologies Co., Ltd.', 'certification_date': '17.09.2018', 'enhanced': {'description': 'The TOE is an open Java Card Platforms (JCP), that is, smart cards or similar devices enabled with JavaCard technology that support post-issuance downloading of applications.The purpose of the TOE is to provide a limited Java Card environment for a single applet, specifically for e-passport and similar applications such as eID and driving license.The TOE is composed of a Smart Card Platform (SCP) and an embedded software (JCS + non-TSF parts). The JCP is compliant with Java Card Specification v3.0.4 and GlobalPlatform Specification v.2.3.\nThe TOE allows for the loading of the customer applets, but after loading the single applet the platform must be closed to prevent further loading of applets after issuance of the card to the end user. To support this functionality, the TOE provides a closing mechanism with specific guidance. The applet should have been previously verified by an off-card trusted IT component. The JCP is managed by Card Manager that is a part of the TOE. The Card Manager(ISD) is a pre-issuance applet. The JCP is fully compliant with the Java Card Specification v3.0.4 excluding the optional part JCRMI which is not implemented by the TOE.\nThe SCP is a certified hardware platform – the SLE77CLFX2400PM with specific IC dedicated software (firmware). The hardware platform is certified by the BSI under the certification ID: BSI-DSZ-CC-0964-V3-2017 . Not all functionality of the hardware is used by the composite TOE. Therefore some parts of the IC platform are not part of the composite TOEto ensure that the developed applet has sufficient ability to counter attacks.', 'id': 'SERTIT-116', 'mutual_recognition': 'CCRA, SOG-IS', 'product': 'V5.0.9', 'category': 'ICs, Smart Cards and Smart Card-Related Devices and Systems', 'sponsor': 'Feitian Technologies Co., Ltd.', 'developer': 'Feitian Technologies Co., Ltd.', 'evaluation_facility': 'Brightsight B.V.', 'certification_date': '17.09.2018', 'level': 'EAL 5, ALC_DVS.2, AVA_VAN.5', 'documents': {'cert': [{'href': 'https://sertit.no/getfile.php/135382-1607954033/SERTIT/Sertifikater/2018/116/20180917SERTIT-116%20C.pdf'}], 'target': [{'href': 'https://sertit.no/getfile.php/135385-1607954035/SERTIT/Sertifikater/2018/116/%5B09895%5D%5BSERTIT-116%5D%5BST%5D%5Bv1.0.8%5D%20FTJCOS%20v5.0%20Security%20Target.pdf'}], 'report': [{'href': 'https://sertit.no/getfile.php/135379-1607954030/SERTIT/Sertifikater/2018/116/20180917%20Sertit-116%20CR%20Feitian%20v10.pdf'}]}}}}.
  • 11.02.2023 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.cc.CCCertificate.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.InternalState.
    • The following properties were deleted: ['errors'].

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.PdfData.

    The computed heuristics were updated.

    • The following values were inserted: {'direct_transitive_cves': None, 'indirect_transitive_cves': None}.
    • The _type property was set to sec_certs.sample.cc.CCCertificate.Heuristics.
    • The following properties were deleted: ['direct_dependency_cves', 'indirect_dependency_cves'].
  • 26.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to [].

    The computed heuristics were updated.

    • The st_references property was updated, with the {'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0758-2012']}}} data.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/SERTIT-091CR%20Feitian%20v1.0.pdf, code: 408'].

    The computed heuristics were updated.

    • The st_references property was updated, with the {'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0758-2012']}}} data.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report_download_ok property was set to True.
    • The report_convert_ok property was set to True.
    • The report_extract_ok property was set to True.
    • The errors property was set to [].
    • The report_pdf_hash property was set to 5a8a65baf0a8aee2b250808561dfbcf2dd9713c77b1ddcaf2f7aa2f4a074e468.
    • The report_txt_hash property was set to 6d1cc9314978c3d3dcf0ac1dc7fb1e3c314a96f47688d905eabf41c0c7bd74a0.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 752545, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 23, '/Author': 'Rage, Arne Høye', '/Producer': 'Mac OS X 10.12.1 Quartz PDFContext', '/Creator': 'Microsoft® Word 2010', '/CreationDate': "D:20161122114425Z00'00'", '/ModDate': "D:20161122114425Z00'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The report_keywords property was set to {'cc_cert_id': {'NO': {'SERTIT-091': 22}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 5+': 23, 'EAL 2': 1, 'EAL 4': 1, 'EAL1': 1, 'EAL7': 1, 'EAL5': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.5': 1, 'ADV_IMP.1': 1, 'ADV_INT.2': 1, 'ADV_TDS.4': 1, 'ADV_COMP.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR': 1, 'ALC_DVS.2': 4, 'ALC_CMC.4': 1, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.2': 1, 'ALC_COMP.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.3': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1, 'ATE_COMP.1': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.5': 3, 'AVA_COMP.1': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_OBJ.2': 1, 'ASE_TSS.1': 1, 'ASE_COMP.1': 1}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 1}, 'FCO': {'FCO_NRO': 1}, 'FCS': {'FCS_RNG.1': 4, 'FCS_CKM.1': 1, 'FCS_CKM.2': 1, 'FCS_CKM.3': 1, 'FCS_CKM.4': 1, 'FCS_COP.1': 1}, 'FDP': {'FDP_ACC': 3, 'FDP_ACF': 3, 'FDP_IFC': 2, 'FDP_IFF': 2, 'FDP_ITC': 1, 'FDP_RIP': 8, 'FDP_ROL': 1, 'FDP_SDI.2': 1, 'FDP_UIT': 1}, 'FIA': {'FIA_UID': 3, 'FIA_USB': 1}, 'FMT': {'FMT_MSA': 11, 'FMT_MTD': 2, 'FMT_SMF.1': 1, 'FMT_SMF': 3, 'FMT_SMR.1': 1, 'FMT_SMR': 4}, 'FPR': {'FPR_UNO.1': 1}, 'FPT': {'FPT_FLS.1': 1, 'FPT_FLS': 3, 'FPT_RCV': 3, 'FPT_TDC.1': 1}, 'FTP': {'FTP_ITC': 1}}, 'cc_claims': {}, 'vendor': {'Infineon': {'Infineon': 2}, 'Feitian': {'Feitian': 2, 'Feitian Technologies Co': 2}}, 'eval_facility': {'BrightSight': {'Brightsight': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}}, 'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 1}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'other': {'JIL': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408': 4, 'ISO/IEC 7816': 2, 'ISO/IEC 14443': 2}, 'SCP': {'SCP02': 1}, 'CC': {'CCMB-2012-09-001': 1, 'CCMB-2012-09-002': 1, 'CCMB-2012-09-003': 1, 'CCMB-2012-09-004': 1}}, 'javacard_version': {'JavaCard': {'Java Card 2.2.2': 5}, 'GlobalPlatform': {'GlobalPlatform 2.1.1': 2}}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to SERTIT-091CR Feitian v1.0.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to SERTIT-091.
    • The st_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-2012']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-2012', 'BSI-DSZ-CC-0758-2012']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_COMP', 'level': 1}]} values added.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report_download_ok property was set to False.
    • The report_convert_ok property was set to False.
    • The report_extract_ok property was set to False.
    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/SERTIT-091CR%20Feitian%20v1.0.pdf, code: nok', 'failed to download report from https://www.commoncriteriaportal.org/files/epfiles/SERTIT-091CR%20Feitian%20v1.0.pdf, code: nok'].
    • The report_pdf_hash property was set to None.
    • The report_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The report_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
    • The st_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_COMP', 'level': 1}]} values discarded.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The manufacturer_web was updated.

    • The new value is https://www.ftsafe.com.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Java Card™ System Protection Profile Open Configuration, Version 3.0', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/ANSSI-CC-profil_PP-2010-03en.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['JCSPPC', 'ANSSI-CC-PP-2010-03', 'ANSSI-CC-PP-2001-03-M01']}}]}.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The manufacturer_web was updated.

    • The new value is None.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'ANSSI-CC-PP-2001-03-M01', 'pp_eal': None, 'pp_link': None, 'pp_ids': None}]}.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Java Card™ System Protection Profile Open Configuration, Version 3.0', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/ANSSI-CC-profil_PP-2010-03en.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['JCSPPC', 'ANSSI-CC-PP-2010-03', 'ANSSI-CC-PP-2001-03-M01']}}]}.

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.
  • 04.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Java Card™ System Protection Profile Open Configuration, Version 3.0', 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/ANSSI-CC-profil_PP-2010-03en.pdf', 'pp_link': None, 'pp_ids': None}]}.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': 'SERTIT-091CR Feitian v1.0.pdf', 'st_filename': '[08250][FTJCOS][ST][V1.0.12]FTJCOS_Security_Target.pdf'}.
    • The report_keywords property was updated, with the {'cc_security_level': {'__update__': {'EAL': {'__insert__': {'EAL 4': 1, 'EAL7': 1}}}}, 'cc_sar': {'__update__': {'ALC': {'__update__': {'ALC_DVS.2': 4}}}}, 'cc_sfr': {'__insert__': {'FCO': {'FCO_NRO': 1}, 'FIA': {'FIA_UID': 3, 'FIA_USB': 1}, 'FTP': {'FTP_ITC': 1}}, '__update__': {'FDP': {'__insert__': {'FDP_ACC': 3, 'FDP_ACF': 3, 'FDP_IFC': 2, 'FDP_IFF': 2, 'FDP_ITC': 1, 'FDP_RIP': 8, 'FDP_ROL': 1, 'FDP_UIT': 1}}, 'FMT': {'__insert__': {'FMT_MSA': 11, 'FMT_MTD': 2, 'FMT_SMF': 3, 'FMT_SMR': 4}}, 'FPT': {'__insert__': {'FPT_FLS': 3, 'FPT_RCV': 3}}}}, 'symmetric_crypto': {'__update__': {'AES_competition': {'__update__': {'AES': {'__update__': {'AES': 1}}}}}}, 'standard_id': {'__delete__': ['ICAO']}} data.
    • The st_keywords property was updated, with the {'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL5': 6}}}}, 'cc_sar': {'__update__': {'ADV': {'__update__': {'ADV_FSP.5': 7, 'ADV_IMP.1': 9}}, 'AGD': {'__update__': {'AGD_OPE.1': 10}}, 'ATE': {'__update__': {'ATE_FUN.1': 6}, '__delete__': ['ATE_DPT.3', 'ATE_IND.2']}, 'ASE': {'__update__': {'ASE_ECD.1': 4, 'ASE_REQ.2': 2, 'ASE_SPD.1': 2}}}}, 'cc_sfr': {'__insert__': {'FCO': {'FCO_NRO': 6, 'FCO_NRO.2': 5}}, '__update__': {'FAU': {'__update__': {'FAU_ARP.1': 24}}, 'FCS': {'__insert__': {'FCS_CKM': 3}, '__update__': {'FCS_RNG': 6, 'FCS_COP': 13, 'FCS_CKM.2': 8, 'FCS_CKM.3': 6, 'FCS_CKM.4': 8, 'FCS_COP.1': 25, 'FCS_RNG.1': 12}}, 'FDP': {'__insert__': {'FDP_ACC': 29, 'FDP_ACC.2': 5, 'FDP_ACF': 31, 'FDP_IFC': 22, 'FDP_IFF': 18, 'FDP_RIP': 117, 'FDP_ROL': 15, 'FDP_ITC': 10, 'FDP_ITC.2': 9, 'FDP_IFC.2': 2, 'FDP_UIT': 5, 'FDP_UIT.1': 2}, '__update__': {'FDP_ROL.1': 4, 'FDP_SDI.2': 13, 'FDP_RIP.1': 10, 'FDP_ACC.1': 13, 'FDP_IFC.1': 13, 'FDP_ACF.1': 18, 'FDP_IFF.1': 17}}, 'FIA': {'__insert__': {'FIA_ATD': 8, 'FIA_UID': 19, 'FIA_UID.2': 1, 'FIA_USB': 6, 'FIA_USB.1': 3}, '__update__': {'FIA_UID.1': 11, 'FIA_ATD.1': 2}}, 'FMT': {'__insert__': {'FMT_MSA': 105, 'FMT_MSA.2': 2, 'FMT_MTD': 20, 'FMT_MTD.3': 1, 'FMT_SMR': 43, 'FMT_SMF': 29}, '__update__': {'FMT_SMF.1': 20, 'FMT_SMR.1': 28, 'FMT_MSA.3': 19, 'FMT_MSA.1': 9, 'FMT_MTD.1': 2}}, 'FPT': {'__insert__': {'FPT_FLS': 31, 'FPT_RCV': 23, 'FPT_TST.1': 1}, '__update__': {'FPT_FLS.1': 16, 'FPT_RCV.3': 13, 'FPT_RCV.4': 2}}, 'FTP': {'__insert__': {'FTP_ITC': 6}, '__update__': {'FTP_ITC.1': 4}}}}, 'cc_claims': {'__insert__': {'R': {'R.JAVA': 9}}, '__update__': {'O': {'__insert__': {'O.OS': 1}, '__update__': {'O.RECOVERY': 23, 'O.FIREWALL': 43, 'O.GLOBAL_ARRAYS_INTEG': 9, 'O.OPERATE': 35, 'O.RESOURCES': 23, 'O.CIPHER': 16, 'O.PIN-MNGT': 22, 'O.OBJ-DELETION': 8, 'O.LOAD': 17}, '__delete__': ['O.OS.SUPPORT']}, 'T': {'__insert__': {'T.SID': 19, 'T.EXE-CODE': 8}, '__update__': {'T.CONFID-JCS-DATA': 9, 'T.INTEG-APPLI-CODE': 12, 'T.INTEG-APPLI-DATA': 18, 'T.INTEG-JCS-DATA': 12, 'T.RND': 5}, '__delete__': ['T.INTEG-APPLI-CODE.LOAD', 'T.INTEG-APPLI-DATA.LOAD']}, 'A': {'__delete__': ['A.LOAD']}, 'OE': {'__insert__': {'OE.SCP': 6}, '__update__': {'OE.VERIFICATION': 37}, '__delete__': ['OE.SCP.IC', 'OE.SCP.RECOVERY', 'OE.SCP.SUPPORT']}}}, 'vendor': {'__update__': {'Infineon': {'__insert__': {'Infineon Technologies AG': 1}, '__update__': {'Infineon': 10}, '__delete__': ['Infineon Technologies']}, 'Feitian': {'__insert__': {'Feitian': 1}}}}, 'eval_facility': {}, 'symmetric_crypto': {'__update__': {'AES_competition': {'__update__': {'AES': {'__update__': {'AES': 9}}}}, 'DES': {'__update__': {'DES': {'__update__': {'DES': 6}, '__delete__': ['DEA']}}}, 'constructions': {'__update__': {'MAC': {'__update__': {'CMAC': 1}}}}}}, 'asymmetric_crypto': {'__update__': {'ECC': {'__update__': {'ECDH': {'__update__': {'ECDH': 2}}, 'ECDSA': {'__update__': {'ECDSA': 3}}, 'ECC': {'__update__': {'ECC': 8}}}}, 'FF': {'__update__': {'DH': {'__delete__': ['DH']}}, '__delete__': ['DSA']}}}, 'crypto_scheme': {'__update__': {'MAC': {'__update__': {'MAC': 2}}, 'KA': {'__delete__': ['KA']}}}, 'randomness': {'__update__': {'TRNG': {'__update__': {'TRNG': 3}}, 'RNG': {'__update__': {'RNG': 10, 'RND': 20}}}}, 'cipher_mode': {'__update__': {'CBC': {'__update__': {'CBC': 4}}}, '__delete__': ['ECB']}, 'side_channel_analysis': {'__update__': {'SCA': {'__update__': {'DPA': 3}}, 'FI': {'__update__': {'malfunction': 4}}}}, 'standard_id': {'__update__': {'ICAO': {'__update__': {'ICAO': 3}}, 'SCP': {'__delete__': ['SCP01']}}}, 'javacard_api_const': {'__update__': {'misc': {'__update__': {'TYPE_ACCESS': 5}}}}, 'javacard_packages': {'__update__': {'javacard': {'__update__': {'javacard.security': 3}}}}, 'certification_process': {'__update__': {'OutOfScope': {'__insert__': {'Software development environment. Phase 2 covers the Secure IC Development of Infineon and is out of scope of the TOE evaluation as that is part of the IC platform evaluation. In Phase 3, the Chip': 1}, '__delete__': ['. Phase 2 covers the Secure IC Development of Infineon and is out of scope of the TOE evaluation as that is part of the IC platform evaluation', '. That point is out of scope of this Protection Profile, though', 'edded Software development environment. Phase 2 covers the Secure IC Development of Infineon and is out of scope of the TOE evaluation as that is part of the IC platform evaluation. In Phase 3, the Chip']}}}} data.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-2012']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-2012', 'BSI-DSZ-CC-0758-2012']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}]} values added.
  • 28.07.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_extract_ok property was set to True.
    • The report_extract_ok property was set to True.
    • The errors property was set to [].

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 752545, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 23, '/Author': 'Rage, Arne Høye', '/Producer': 'Mac OS X 10.12.1 Quartz PDFContext', '/Creator': 'Microsoft® Word 2010', '/CreationDate': "D:20161122114425Z00'00'", '/ModDate': "D:20161122114425Z00'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 1236898, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 100, '/Creator': 'LaTeX with hyperref package', '/Producer': 'MiKTeX-xdvipdfmx (0.7.8)', '/CreationDate': "D:20160409153415+08'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Java Card™ System Protection Profile Open Configuration, Version 3.0', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/ANSSI-CC-profil_PP-2010-03en.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['JCSPPC', 'ANSSI-CC-PP-2010-03', 'ANSSI-CC-PP-2001-03-M01']}}]}.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}]}.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_extract_ok property was set to False.
    • The errors property was set to ['Failed to read metadata of certs/reports/pdf/682ae6d18001b529.pdf, error: can only concatenate list (not "IndirectObject") to list', 'Failed to read metadata of certs/targets/pdf/682ae6d18001b529.pdf, error: can only concatenate list (not "IndirectObject") to list', 'Failed to read metadata of certs/reports/pdf/682ae6d18001b529.pdf, error: can only concatenate list (not "IndirectObject") to list', 'Failed to read metadata of certs/targets/pdf/682ae6d18001b529.pdf, error: can only concatenate list (not "IndirectObject") to list'].

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The report_keywords property was set to {'cc_cert_id': {'NO': {'SERTIT-091': 22}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 5+': 23, 'EAL 2': 1, 'EAL1': 1, 'EAL5': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.5': 1, 'ADV_IMP.1': 1, 'ADV_INT.2': 1, 'ADV_TDS.4': 1, 'ADV_COMP.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR': 1, 'ALC_DVS.2': 3, 'ALC_CMC.4': 1, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.2': 1, 'ALC_COMP.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.3': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1, 'ATE_COMP.1': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.5': 3, 'AVA_COMP.1': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_OBJ.2': 1, 'ASE_TSS.1': 1, 'ASE_COMP.1': 1}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 1}, 'FCS': {'FCS_RNG.1': 4, 'FCS_CKM.1': 1, 'FCS_CKM.2': 1, 'FCS_CKM.3': 1, 'FCS_CKM.4': 1, 'FCS_COP.1': 1}, 'FDP': {'FDP_SDI.2': 1}, 'FMT': {'FMT_SMF.1': 1, 'FMT_SMR.1': 1}, 'FPR': {'FPR_UNO.1': 1}, 'FPT': {'FPT_FLS.1': 1, 'FPT_TDC.1': 1}}, 'cc_claims': {}, 'vendor': {'Infineon': {'Infineon': 2}, 'Feitian': {'Feitian': 2, 'Feitian Technologies Co': 2}}, 'eval_facility': {'BrightSight': {'Brightsight': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 2}}, 'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 1}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'other': {'JIL': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408': 4, 'ISO/IEC 7816': 2, 'ISO/IEC 14443': 2}, 'ICAO': {'ICAO': 2}, 'SCP': {'SCP02': 1}, 'CC': {'CCMB-2012-09-001': 1, 'CCMB-2012-09-002': 1, 'CCMB-2012-09-003': 1, 'CCMB-2012-09-004': 1}}, 'javacard_version': {'JavaCard': {'Java Card 2.2.2': 5}, 'GlobalPlatform': {'GlobalPlatform 2.1.1': 2}}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0782-2012': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0084': 1}}, 'cc_security_level': {'EAL': {'EAL 4': 1, 'EAL 5': 2, 'EAL5+': 1, 'EAL5': 4, 'EAL6': 1, 'EAL6+': 1, 'EAL 5 augmented': 1, 'EAL5 augmented': 1, 'EAL6 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 6, 'ADV_FSP.1': 4, 'ADV_TDS.1': 2, 'ADV_FSP.4': 2, 'ADV_TDS.3': 10, 'ADV_FSP.5': 8, 'ADV_IMP.1': 10, 'ADV_INT.2': 1, 'ADV_TDS.4': 1, 'ADV_FSP.2': 2, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE.1': 9, 'AGD_PRE.1': 6}, 'ALC': {'ALC_DVS.2': 7, 'ALC_TAT.1': 1, 'ALC_TAT.2': 2, 'ALC_CMC.4': 1, 'ALC_CMS.1': 1, 'ALC_DVS.1': 2, 'ALC_CMS.4': 1, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1}, 'ATE': {'ATE_COV.2': 3, 'ATE_FUN.1': 7, 'ATE_DPT.3': 1, 'ATE_COV.1': 2, 'ATE_IND.2': 1, 'ATE_DPT.1': 2}, 'AVA': {'AVA_VAN.5': 7}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 5, 'ASE_INT.1': 5, 'ASE_REQ.1': 2, 'ASE_REQ.2': 3, 'ASE_OBJ.2': 3, 'ASE_SPD.1': 3, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_ARP.1.1': 2, 'FAU_ARP.1': 23, 'FAU_SAA.1': 3}, 'FCS': {'FCS_RNG': 5, 'FCS_COP': 1, 'FCS_CKM.1': 10, 'FCS_CKM.2': 9, 'FCS_CKM.2.1': 1, 'FCS_CKM.3': 8, 'FCS_CKM.3.1': 1, 'FCS_CKM.4': 9, 'FCS_CKM.4.1': 1, 'FCS_COP.1': 10, 'FCS_RNG.1': 14, 'FCS_RNG.1.1': 2, 'FCS_RNG.1.2': 2}, 'FDP': {'FDP_ROL.1': 2, 'FDP_SDI.2': 14, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_RIP.1': 1, 'FDP_ACC.1': 12, 'FDP_IFC.1': 11, 'FDP_ACF.1': 4, 'FDP_IFF.1': 2, 'FDP_SDI.1': 1, 'FDP_ITT.1': 1}, 'FIA': {'FIA_UID.1': 7, 'FIA_ATD.1': 1}, 'FMT': {'FMT_SMF.1': 17, 'FMT_SMF.1.1': 1, 'FMT_SMR.1': 20, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MSA.3': 6, 'FMT_MSA.1': 4, 'FMT_MTD.1': 1}, 'FPR': {'FPR_UNO.1.1': 2, 'FPR_UNO.1': 13}, 'FPT': {'FPT_TDC.1.2': 2, 'FPT_FLS.1': 14, 'FPT_FLS.1.1': 2, 'FPT_TDC.1': 8, 'FPT_TDC.1.1': 1, 'FPT_RCV.3': 2, 'FPT_RCV.4': 1, 'FPT_PHP.3': 1, 'FPT_ITT.1': 1}, 'FRU': {'FRU_FLT.2': 1}, 'FTP': {'FTP_ITC.1': 1, 'FTP_TRP.1': 2}}, 'cc_claims': {'D': {'D.APP_CODE': 7, 'D.APP_C_DATA': 3, 'D.APP_I_DATA': 5, 'D.PIN': 6, 'D.API_DATA': 3, 'D.CRYPTO': 6, 'D.JCS_CODE': 3, 'D.JCS_DATA': 5, 'D.SEC_DATA': 8, 'D.JCS_KEYS': 3, 'D.SEC_ATTRIBUTES': 2, 'D.CM_APDU': 1}, 'O': {'O.CARD-': 7, 'O.IC_SUPPORT': 17, 'O.RECOVERY': 24, 'O.OS_SUPPORT': 23, 'O.COMMUNICATION': 11, 'O.RND': 14, 'O.REMOTE': 1, 'O.SID': 32, 'O.FIREWALL': 44, 'O.GLOBAL_ARRAYS_CONFID': 18, 'O.GLOBAL_ARRAYS_INTEG': 10, 'O.NATIVE': 14, 'O.OPERATE': 36, 'O.REALLOCATION': 17, 'O.RESOURCES': 24, 'O.ALARM': 22, 'O.CIPHER': 17, 'O.KEY-MNGT': 23, 'O.PIN-MNGT': 23, 'O.TRANSACTION': 19, 'O.OBJ-DELETION': 9, 'O.DELETION': 15, 'O.LOAD': 18, 'O.INSTALL': 16, 'O.CARD-MANAGEMENT': 32, 'O.KEY-': 3, 'O.APPLET': 19, 'O.CODE_PKG': 16, 'O.JAVAOBJECT': 38, 'O.PACKAGE': 2, 'O.GLOBAL': 2, 'O.PIN-': 1, 'O.OS.SUPPORT': 1}, 'T': {'T.CONFID-APPLI-DATA': 17, 'T.CONFID-JCS-CODE': 7, 'T.CONFID-JCS-DATA': 11, 'T.INTEG-APPLI-CODE': 8, 'T.INTEG-APPLI-CODE.LOAD': 5, 'T.INTEG-APPLI-DATA': 14, 'T.INTEG-APPLI-DATA.LOAD': 5, 'T.INTEG-JCS-CODE': 7, 'T.INTEG-JCS-DATA': 14, 'T.NATIVE': 6, 'T.RESOURCES': 9, 'T.DELETION': 5, 'T.INSTALL': 6, 'T.COMMUNICATION': 5, 'T.OBJ-DELETION': 4, 'T.PHYSICAL': 8, 'T.LEAKAGE': 5, 'T.FAULT': 5, 'T.RND': 6, 'T.CONFID-APPLI-': 2, 'T.INTEG-APPLI-': 4, 'T.INTEG-': 6, 'T.EXE-': 1, 'T.INTEG-JCS-': 1, 'T.CONFID-': 2}, 'A': {'A.LOAD': 7, 'A.APPLET': 6, 'A.DELETION': 1, 'A.VERIFICATION': 6}, 'OP': {'OP.ARRAY_ACCESS': 4, 'OP.CREATE': 7, 'OP.LOAD_PCKG': 1, 'OP.DELETE_APPLET': 4, 'OP.DELETE_PCKG': 3, 'OP.DELETE_PCKG_APPLET': 3, 'OP.GP': 3, 'OP.INSTANCE_FIELD': 4, 'OP.INVK_VIRTUAL': 6, 'OP.INVK_INTERFACE': 7, 'OP.JAVA': 5, 'OP.THROW': 5, 'OP.TYPE_ACCESS': 5, 'OP.PUT': 6}, 'OE': {'OE.CARD-MANAGEMENT': 2, 'OE.SCP.IC': 2, 'OE.SCP.RECOVERY': 2, 'OE.SCP.SUPPORT': 2, 'OE.CODE-EVIDENCE': 16, 'OE.APPLET': 9, 'OE.VERIFICATION': 38, 'OE.CODE-': 5}, 'OSP': {'OSP.VERIFICATION': 6}}, 'vendor': {'Infineon': {'Infineon': 9, 'Infineon Technologies': 1}, 'Feitian': {'Feitian Technologies Co': 105}}, 'eval_facility': {'EWA': {'EWA': 5}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 13}}, 'DES': {'DES': {'DES': 17, 'DEA': 1}, '3DES': {'TDES': 7, 'Triple-DES': 1, 'TDEA': 1}}, 'constructions': {'MAC': {'CMAC': 3}}}, 'asymmetric_crypto': {'RSA': {'RSA2048': 1}, 'ECC': {'ECDH': {'ECDH': 5}, 'ECDSA': {'ECDSA': 7}, 'ECC': {'ECC': 5}}, 'FF': {'DH': {'DH': 5, 'Diffie-Hellman': 1}, 'DSA': {'DSA': 7}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}, 'SHA2': {'SHA-224': 1, 'SHA-256': 1, 'SHA-384': 1, 'SHA-512': 1, 'SHA-2': 2}}, 'MD': {'MD5': {'MD5': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 7}, 'KEX': {'Key exchange': 1}, 'KA': {'KA': 29, 'Key Agreement': 1}}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 2}, 'RNG': {'RNG': 16, 'RND': 18}}, 'cipher_mode': {'ECB': {'ECB': 1}, 'CBC': {'CBC': 6}, 'CCM': {'CCM': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Infineon': {'v1.02.013': 3}}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 2, 'physical probing': 3, 'DPA': 2, 'SPA': 1, 'timing attacks': 1}, 'FI': {'physical tampering': 1, 'malfunction': 3, 'Malfunction': 3}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 186-3': 3, 'FIPS140': 2, 'FIPS180-4': 2, 'FIPS197': 5, 'FIPS PUB 140-2': 1, 'FIPS PUB 197': 1, 'FIPS PUB 180-4': 1}, 'BSI': {'AIS20': 2, 'AIS36': 2}, 'RFC': {'RFC 5639': 3}, 'ICAO': {'ICAO': 2}, 'SCP': {'SCP02': 5, 'SCP03': 4, 'SCP01': 1}}, 'javacard_version': {'JavaCard': {'Java Card 2.2.2': 3}, 'GlobalPlatform': {'GlobalPlatform 2.1.1': 1}}, 'javacard_api_const': {'misc': {'TYPE_ACCESS': 4}}, 'javacard_packages': {'javacard': {'javacard.security': 2}, 'javacardx': {'javacardx.crypto': 2, 'javacardx.security': 1}}, 'certification_process': {'OutOfScope': {'out of scope': 2, '. Phase 2 covers the Secure IC Development of Infineon and is out of scope of the TOE evaluation as that is part of the IC platform evaluation': 1, '. That point is out of scope of this Protection Profile, though': 1, 'edded Software development environment. Phase 2 covers the Secure IC Development of Infineon and is out of scope of the TOE evaluation as that is part of the IC platform evaluation. In Phase 3, the Chip': 1, 'a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.RECOVERY and O.OS_SUPPORT are': 1}}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': '5a8a65baf0a8aee2b250808561dfbcf2dd9713c77b1ddcaf2f7aa2f4a074e468', 'st_pdf_hash': 'cf9ee577c5f614e3552b52d9a691a93372311d9f4288c03cabd00fb0dea71372', 'report_txt_hash': '6d1cc9314978c3d3dcf0ac1dc7fb1e3c314a96f47688d905eabf41c0c7bd74a0', 'st_txt_hash': '3ebeecb7cdc894f501ab212ac846d556944669a7210d69d3a852d8218e7ecdae'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {'AES': 2, 'DES': 1}, 'rules_asymmetric_crypto': {'ECC': 1}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {}, 'rules_randomness': {}, 'rules_tee': {}, 'rules_side_channels': {}} values inserted.
    • The st_keywords property was updated, with the {'rules_block_cipher_modes': {'__insert__': {'CCM': 1}}} data.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'SAR', 'family': 'ATE_COMP', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'SAR', 'family': 'ALC_COMP', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_COMP', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_COMP', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_COMP', 'level': 1}]}}.
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 10.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cert_id property was set to SERTIT-091.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}}.
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 18.02.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report_extract_ok property was set to False.
    • The errors property was set to ['Failed to read metadata of certs/reports/pdf/682ae6d18001b529.pdf, error: seek of closed file', 'Failed to read metadata of certs/reports/pdf/682ae6d18001b529.pdf, error: seek of closed file'].

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['1.0', '0.106.13']}.
    • The cert_id property was set to None.
  • 01.02.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'ProtectionProfile', 'pp_name': 'Java Card™ System Protection Profile Open Configuration, Version 3.0', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/ANSSI-CC-profil_PP-2010-03en.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['JCSPPC', 'ANSSI-CC-PP-2010-03', 'ANSSI-CC-PP-2001-03-M01']}}]}.
  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Feitian FT-JCOS v1.0/0.106.13 running on Infineon M7892 B11 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": null,
  "dgst": "682ae6d18001b529",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "SERTIT-091",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_COMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_COMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_COMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_COMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.0",
        "0.106.13"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
      "certification_date": "22.11.2016",
      "developer": "Feitian Technologies Co., Ltd.",
      "enhanced": {
        "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
        "certification_date": "22.11.2016",
        "description": "FT-JCOS V1.0 is a Java Card Platform compliant with Java Card Specification v.2.2.2 and GlobalPlatform Specification v.2.1.1. It allows post-issuance downloading of applications that have been previously verified by an off-card trusted IT component. It constitutes a secure generic platform that supports multi-application runtime environment and provides facilities for secure loading and interoperability between different applications. Typical applications of FT-JCOS V1.0 are financial applications, transport ticketing, telephony, personal identification, electronic passports, secure information storage, loyalty programs and so on.",
        "developer": "Feitian Technologies Co., Ltd.",
        "documents": {
          "cert": [
            {
              "href": "https://sertit.no/getfile.php/135115-1607952953/SERTIT/Sertifikater/2016/91/20161122%20SERTIT-091%20C.pdf"
            }
          ],
          "report": [
            {
              "href": "https://sertit.no/getfile.php/135121-1607952961/SERTIT/Sertifikater/2016/91/SERTIT-091CR%20Feitian%20v1.0.pdf"
            }
          ],
          "target": [
            {
              "href": "https://sertit.no/getfile.php/135118-1607952955/SERTIT/Sertifikater/2016/91/%5B08250%5D%5BFTJCOS%5D%5BST%5D%5BV1.0.12%5DFTJCOS_Security_Target.pdf"
            }
          ]
        },
        "evaluation_facility": "Brightsight B.V.",
        "id": "SERTIT-091",
        "level": "EAL 5, ALC_DVS.2, AVA_VAN.5",
        "mutual_recognition": "CCRA, SOG-IS",
        "product": "Hardware M7892 B11; Software FT-JCOS v1.0 0.106.13; Document FT-JCOS v1.0/0.106.13 Administrator Manual 1.0.5, FT-JCOS v1.0/0.106.13 User Manual 1.0.4",
        "protection_profile": "Java Card\u2122 System Protection Profile Open Configuration, Version 3.0"
      },
      "product": "Feitian FT-JCOS",
      "url": "https://sertit.no/certified-products/product-archive/feitian-ft-jcos"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0782-2012"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0782-2012",
          "BSI-DSZ-CC-0758-2012"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Feitian Technologies Co., Ltd.",
  "manufacturer_web": "https://www.ftsafe.com",
  "name": "Feitian FT-JCOS v1.0/0.106.13 running on Infineon M7892 B11",
  "not_valid_after": "2021-11-22",
  "not_valid_before": "2016-11-22",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "SERTIT-091CR Feitian v1.0.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 1
          }
        }
      },
      "cc_cert_id": {
        "NO": {
          "SERTIT-091": 22
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_COMP.1": 1,
          "ADV_FSP.5": 1,
          "ADV_IMP.1": 1,
          "ADV_INT.2": 1,
          "ADV_TDS.4": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.5": 1,
          "ALC_COMP.1": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.2": 4,
          "ALC_FLR": 1,
          "ALC_LCD.1": 1,
          "ALC_TAT.2": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_COMP.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COMP.1": 1,
          "ATE_COV.2": 1,
          "ATE_DPT.3": 1,
          "ATE_FUN.1": 1,
          "ATE_IND": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_COMP.1": 1,
          "AVA_VAN.5": 3
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL 4": 1,
          "EAL 5+": 23,
          "EAL1": 1,
          "EAL5": 1,
          "EAL7": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 1
        },
        "FCO": {
          "FCO_NRO": 1
        },
        "FCS": {
          "FCS_CKM.1": 1,
          "FCS_CKM.2": 1,
          "FCS_CKM.3": 1,
          "FCS_CKM.4": 1,
          "FCS_COP.1": 1,
          "FCS_RNG.1": 4
        },
        "FDP": {
          "FDP_ACC": 3,
          "FDP_ACF": 3,
          "FDP_IFC": 2,
          "FDP_IFF": 2,
          "FDP_ITC": 1,
          "FDP_RIP": 8,
          "FDP_ROL": 1,
          "FDP_SDI.2": 1,
          "FDP_UIT": 1
        },
        "FIA": {
          "FIA_UID": 3,
          "FIA_USB": 1
        },
        "FMT": {
          "FMT_MSA": 11,
          "FMT_MTD": 2,
          "FMT_SMF": 3,
          "FMT_SMF.1": 1,
          "FMT_SMR": 4,
          "FMT_SMR.1": 1
        },
        "FPR": {
          "FPR_UNO.1": 1
        },
        "FPT": {
          "FPT_FLS": 3,
          "FPT_FLS.1": 1,
          "FPT_RCV": 3,
          "FPT_TDC.1": 1
        },
        "FTP": {
          "FTP_ITC": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "BrightSight": {
          "Brightsight": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {
        "GlobalPlatform": {
          "GlobalPlatform 2.1.1": 2
        },
        "JavaCard": {
          "Java Card 2.2.2": 5
        }
      },
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "other": {
          "JIL": 2
        }
      },
      "standard_id": {
        "CC": {
          "CCMB-2012-09-001": 1,
          "CCMB-2012-09-002": 1,
          "CCMB-2012-09-003": 1,
          "CCMB-2012-09-004": 1
        },
        "ISO": {
          "ISO/IEC 14443": 2,
          "ISO/IEC 15408": 4,
          "ISO/IEC 7816": 2
        },
        "SCP": {
          "SCP02": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 1
          }
        },
        "DES": {
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Feitian": {
          "Feitian": 2,
          "Feitian Technologies Co": 2
        },
        "Infineon": {
          "Infineon": 2
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Rage, Arne H\u00f8ye",
      "/CreationDate": "D:20161122114425Z00\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2010",
      "/ModDate": "D:20161122114425Z00\u002700\u0027",
      "/Producer": "Mac OS X 10.12.1 Quartz PDFContext",
      "pdf_file_size_bytes": 752545,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 23
    },
    "st_filename": "[08250][FTJCOS][ST][V1.0.12]FTJCOS_Security_Target.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 8
          },
          "ECDH": {
            "ECDH": 2
          },
          "ECDSA": {
            "ECDSA": 3
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 1
          }
        },
        "RSA": {
          "RSA2048": 1
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0782-": 1,
          "BSI-DSZ-CC-0782-2012": 1,
          "BSI-DSZ-CC-0782-2012-MA-01": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.APPLET": 6,
          "A.DELETION": 1,
          "A.VERIFICATION": 6
        },
        "D": {
          "D.API_DATA": 3,
          "D.APP_CODE": 7,
          "D.APP_C_DATA": 3,
          "D.APP_I_DATA": 5,
          "D.CM_APDU": 1,
          "D.CRYPTO": 6,
          "D.JCS_CODE": 3,
          "D.JCS_DATA": 5,
          "D.JCS_KEYS": 3,
          "D.PIN": 6,
          "D.SEC_ATTRIBUTES": 2,
          "D.SEC_DATA": 8
        },
        "O": {
          "O.ALARM": 22,
          "O.APPLET": 19,
          "O.CARD-": 7,
          "O.CARD-MANAGEMENT": 32,
          "O.CIPHER": 16,
          "O.CODE_PKG": 16,
          "O.COMMUNICATION": 11,
          "O.DELETION": 15,
          "O.FIREWALL": 43,
          "O.GLOBAL": 2,
          "O.GLOBAL_ARRAYS_CONFID": 18,
          "O.GLOBAL_ARRAYS_INTEG": 9,
          "O.IC_SUPPORT": 17,
          "O.INSTALL": 16,
          "O.JAVAOBJECT": 38,
          "O.KEY-": 3,
          "O.KEY-MNGT": 23,
          "O.LOAD": 17,
          "O.NATIVE": 14,
          "O.OBJ-DELETION": 8,
          "O.OPERATE": 35,
          "O.OS": 1,
          "O.OS_SUPPORT": 23,
          "O.PACKAGE": 2,
          "O.PIN-": 1,
          "O.PIN-MNGT": 22,
          "O.REALLOCATION": 17,
          "O.RECOVERY": 23,
          "O.REMOTE": 1,
          "O.RESOURCES": 23,
          "O.RND": 14,
          "O.SID": 32,
          "O.TRANSACTION": 19
        },
        "OE": {
          "OE.APPLET": 9,
          "OE.CARD-MANAGEMENT": 2,
          "OE.CODE-": 5,
          "OE.CODE-EVIDENCE": 16,
          "OE.SCP": 6,
          "OE.VERIFICATION": 37
        },
        "OP": {
          "OP.ARRAY_ACCESS": 4,
          "OP.CREATE": 7,
          "OP.DELETE_APPLET": 4,
          "OP.DELETE_PCKG": 3,
          "OP.DELETE_PCKG_APPLET": 3,
          "OP.GP": 3,
          "OP.INSTANCE_FIELD": 4,
          "OP.INVK_INTERFACE": 7,
          "OP.INVK_VIRTUAL": 6,
          "OP.JAVA": 5,
          "OP.LOAD_PCKG": 1,
          "OP.PUT": 6,
          "OP.THROW": 5,
          "OP.TYPE_ACCESS": 5
        },
        "OSP": {
          "OSP.VERIFICATION": 6
        },
        "R": {
          "R.JAVA": 9
        },
        "T": {
          "T.COMMUNICATION": 5,
          "T.CONFID-": 2,
          "T.CONFID-APPLI-": 2,
          "T.CONFID-APPLI-DATA": 17,
          "T.CONFID-JCS-CODE": 7,
          "T.CONFID-JCS-DATA": 9,
          "T.DELETION": 5,
          "T.EXE-": 1,
          "T.EXE-CODE": 8,
          "T.FAULT": 5,
          "T.INSTALL": 6,
          "T.INTEG-": 6,
          "T.INTEG-APPLI-": 4,
          "T.INTEG-APPLI-CODE": 12,
          "T.INTEG-APPLI-DATA": 18,
          "T.INTEG-JCS-": 1,
          "T.INTEG-JCS-CODE": 7,
          "T.INTEG-JCS-DATA": 12,
          "T.LEAKAGE": 5,
          "T.NATIVE": 6,
          "T.OBJ-DELETION": 4,
          "T.PHYSICAL": 8,
          "T.RESOURCES": 9,
          "T.RND": 5,
          "T.SID": 19
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP-0084": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 6,
          "ADV_FSP.1": 4,
          "ADV_FSP.2": 2,
          "ADV_FSP.4": 2,
          "ADV_FSP.5": 7,
          "ADV_IMP.1": 9,
          "ADV_INT.2": 1,
          "ADV_TDS.1": 2,
          "ADV_TDS.2": 1,
          "ADV_TDS.3": 10,
          "ADV_TDS.4": 1
        },
        "AGD": {
          "AGD_OPE.1": 10,
          "AGD_PRE.1": 6
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.1": 1,
          "ALC_CMS.4": 1,
          "ALC_CMS.5": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 2,
          "ALC_DVS.2": 7,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 1,
          "ALC_TAT.2": 2
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 4,
          "ASE_INT.1": 5,
          "ASE_OBJ.2": 3,
          "ASE_REQ.1": 2,
          "ASE_REQ.2": 2,
          "ASE_SPD.1": 2,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.1": 2,
          "ATE_COV.2": 3,
          "ATE_DPT.1": 2,
          "ATE_FUN.1": 6
        },
        "AVA": {
          "AVA_VAN.5": 7
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 1,
          "EAL 5": 2,
          "EAL 5 augmented": 1,
          "EAL5": 6,
          "EAL5 augmented": 1,
          "EAL5+": 1,
          "EAL6": 1,
          "EAL6 augmented": 1,
          "EAL6+": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 24,
          "FAU_ARP.1.1": 2,
          "FAU_SAA.1": 3
        },
        "FCO": {
          "FCO_NRO": 6,
          "FCO_NRO.2": 5
        },
        "FCS": {
          "FCS_CKM": 3,
          "FCS_CKM.1": 10,
          "FCS_CKM.2": 8,
          "FCS_CKM.2.1": 1,
          "FCS_CKM.3": 6,
          "FCS_CKM.3.1": 1,
          "FCS_CKM.4": 8,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 13,
          "FCS_COP.1": 25,
          "FCS_RNG": 6,
          "FCS_RNG.1": 12,
          "FCS_RNG.1.1": 2,
          "FCS_RNG.1.2": 2
        },
        "FDP": {
          "FDP_ACC": 29,
          "FDP_ACC.1": 13,
          "FDP_ACC.2": 5,
          "FDP_ACF": 31,
          "FDP_ACF.1": 18,
          "FDP_IFC": 22,
          "FDP_IFC.1": 13,
          "FDP_IFC.2": 2,
          "FDP_IFF": 18,
          "FDP_IFF.1": 17,
          "FDP_ITC": 10,
          "FDP_ITC.2": 9,
          "FDP_ITT.1": 1,
          "FDP_RIP": 117,
          "FDP_RIP.1": 10,
          "FDP_ROL": 15,
          "FDP_ROL.1": 4,
          "FDP_SDI.1": 1,
          "FDP_SDI.2": 13,
          "FDP_SDI.2.1": 1,
          "FDP_SDI.2.2": 1,
          "FDP_UIT": 5,
          "FDP_UIT.1": 2
        },
        "FIA": {
          "FIA_ATD": 8,
          "FIA_ATD.1": 2,
          "FIA_UID": 19,
          "FIA_UID.1": 11,
          "FIA_UID.2": 1,
          "FIA_USB": 6,
          "FIA_USB.1": 3
        },
        "FMT": {
          "FMT_MSA": 105,
          "FMT_MSA.1": 9,
          "FMT_MSA.2": 2,
          "FMT_MSA.3": 19,
          "FMT_MTD": 20,
          "FMT_MTD.1": 2,
          "FMT_MTD.3": 1,
          "FMT_SMF": 29,
          "FMT_SMF.1": 20,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 43,
          "FMT_SMR.1": 28,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPR": {
          "FPR_UNO.1": 13,
          "FPR_UNO.1.1": 2
        },
        "FPT": {
          "FPT_FLS": 31,
          "FPT_FLS.1": 16,
          "FPT_FLS.1.1": 2,
          "FPT_ITT.1": 1,
          "FPT_PHP.3": 1,
          "FPT_RCV": 23,
          "FPT_RCV.3": 13,
          "FPT_RCV.4": 2,
          "FPT_TDC.1": 8,
          "FPT_TDC.1.1": 1,
          "FPT_TDC.1.2": 2,
          "FPT_TST.1": 1
        },
        "FRU": {
          "FRU_FLT.2": 1
        },
        "FTP": {
          "FTP_ITC": 6,
          "FTP_ITC.1": 4,
          "FTP_TRP.1": 2
        }
      },
      "certification_process": {
        "OutOfScope": {
          "Software development environment. Phase 2 covers the Secure IC Development of Infineon and is out of scope of the TOE evaluation as that is part of the IC platform evaluation. In Phase 3, the Chip": 1,
          "a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.RECOVERY and O.OS_SUPPORT are": 1,
          "out of scope": 2
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 4
        },
        "CCM": {
          "CCM": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "Infineon": {
          "v1.02.013": 3
        }
      },
      "crypto_protocol": {},
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 1
        },
        "KEX": {
          "Key exchange": 1
        },
        "MAC": {
          "MAC": 2
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 1
          }
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 1
          },
          "SHA2": {
            "SHA-2": 2,
            "SHA-224": 1,
            "SHA-256": 1,
            "SHA-384": 1,
            "SHA-512": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {
        "misc": {
          "TYPE_ACCESS": 5
        }
      },
      "javacard_packages": {
        "javacard": {
          "javacard.security": 3
        },
        "javacardx": {
          "javacardx.crypto": 2,
          "javacardx.security": 1
        }
      },
      "javacard_version": {
        "GlobalPlatform": {
          "GlobalPlatform 2.1.1": 1
        },
        "JavaCard": {
          "Java Card 2.2.2": 3
        }
      },
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 20,
          "RNG": 10
        },
        "TRNG": {
          "TRNG": 3
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 3,
          "malfunction": 4,
          "physical tampering": 1
        },
        "SCA": {
          "DPA": 3,
          "Leak-Inherent": 2,
          "SPA": 1,
          "physical probing": 3,
          "timing attacks": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS20": 2,
          "AIS36": 2
        },
        "FIPS": {
          "FIPS 186-3": 3,
          "FIPS PUB 140-2": 1,
          "FIPS PUB 180-4": 1,
          "FIPS PUB 197": 1,
          "FIPS140": 2,
          "FIPS180-4": 2,
          "FIPS197": 5
        },
        "ICAO": {
          "ICAO": 3
        },
        "RFC": {
          "RFC 5639": 3
        },
        "SCP": {
          "SCP02": 5,
          "SCP03": 4
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 9
          }
        },
        "DES": {
          "3DES": {
            "TDEA": 1,
            "TDES": 7,
            "Triple-DES": 1
          },
          "DES": {
            "DES": 6
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Feitian": {
          "Feitian": 1,
          "Feitian Technologies Co": 105
        },
        "Infineon": {
          "Infineon": 10,
          "Infineon Technologies AG": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/CreationDate": "D:20160409153415+08\u002700\u0027",
      "/Creator": "LaTeX with hyperref package",
      "/Producer": "MiKTeX-xdvipdfmx (0.7.8)",
      "pdf_file_size_bytes": 1236898,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 100
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": "EAL4+",
        "pp_ids": {
          "_type": "Set",
          "elements": [
            "ANSSI-CC-PP-2001-03-M01",
            "JCSPPC",
            "ANSSI-CC-PP-2010-03"
          ]
        },
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/ANSSI-CC-profil_PP-2010-03en.pdf",
        "pp_name": "Java Card\u2122 System Protection Profile Open Configuration, Version 3.0"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/SERTIT-091CR%20Feitian%20v1.0.pdf",
  "scheme": "NO",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_DVS.2",
      "AVA_VAN.5",
      "EAL5+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/[08250][FTJCOS][ST][V1.0.12]FTJCOS_Security_Target.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "5a8a65baf0a8aee2b250808561dfbcf2dd9713c77b1ddcaf2f7aa2f4a074e468",
      "txt_hash": "6d1cc9314978c3d3dcf0ac1dc7fb1e3c314a96f47688d905eabf41c0c7bd74a0"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "cf9ee577c5f614e3552b52d9a691a93372311d9f4288c03cabd00fb0dea71372",
      "txt_hash": "3ebeecb7cdc894f501ab212ac846d556944669a7210d69d3a852d8218e7ecdae"
    }
  },
  "status": "archived"
}