Gemalto ECC CPU card - CPU e-purse application on GCX5.1 (MPH098) platform on NXP P5CD081V1A Version 1.0

CSV information ?

Status archived
Valid from 13.04.2011
Valid until 01.09.2019
Scheme 🇫🇷 FR
Manufacturer Gemalto / NXP Semiconductors
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level AVA_VAN.5, EAL4+, ALC_DVS.2

Heuristics summary ?

Certificate ID: ANSSI-CC-2011/05

Certificate ?

Certification report ?

Extracted keywords

Asymmetric Algorithms
ECC

Vendor
NXP, NXP Semiconductors, Gemalto

Security level
EAL 4, EAL4, EAL5, EAL7, EAL 1, EAL 3, EAL 5, EAL 7, EAL 4 augmented, ITSEC E6 High
Security Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_LCD, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSS
Certificates
BSI-DSZ-CC-0555-2009, ANSSI-CC-2011/05
Evaluation facilities
CEA - LETI
Certification process
out of scope, - The NXP P5CD081 IC The Other applications1 on the card are written in java language and are out of scope of the TOE. 1.2.4. Life cycle The product’s life cycle is organised as follow: 1 Applications

Certification process
out of scope, - The NXP P5CD081 IC The Other applications1 on the card are written in java language and are out of scope of the TOE. 1.2.4. Life cycle The product’s life cycle is organised as follow: 1 Applications

Standards
CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004

File metadata

Creation date: D:20110629162959+02'00'
Modification date: D:20110629162959+02'00'
Pages: 18
Producer: Acrobat Distiller 8.1.0 (Windows)

Frontpage

Certificate ID: ANSSI-CC-2011/05
Certified item: Gemalto ECC CPU card on GCX5.1 (MPH098) platform on NXP P5CD081V1A
Certification lab: CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France Phone: +33 (0)4 38 78 37 78, email : elisabeth.crochon@cea.fr
Developer: Gemalto SA 6 rue de la Verrerie, 92197 Meudon, France NXP Semiconductors GmbH Stresemannallee 101, D-22502 Hamburg, Germany Sponsor Gemalto SA 6 rue de la Verrerie, 92197 Meudon, France

References

Outgoing
  • BSI-DSZ-CC-0555-2009 - NXP Smart Card Controller P5CD081V1A and its major configurations P5CC081V1A, P5CN081V1A, P5CD041V1A, P5CD021V1A and P5CD016V1A each with IC dedicated Software

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES, Triple-DES, TDEA
Asymmetric Algorithms
ECC
Schemes
MAC
Randomness
RNG, RND

JavaCard versions
Java Card 2.2
JavaCard API constants
TYPE_ACCESS
Vendor
NXP, NXP Semiconductors, Gemalto

Security level
EAL5+, EAL4, EAL4+, EAL5, EAL4 augmented, EAL5 augmented
Claims
D.EM, D.EP_IVDATA, D.EP_CODE, D.KEYS, D.EP_STATE, D.LOG_DATA, D.COUNTERS, D.EP_IV_DATA, O.AUTH, O.OPERATE, O.REPLAY, O.EM, O.CONF_DATA, O.INTEG_DATA, O.TAMPER, O.RECORD, O.RND, O.HW_AES, O.MEM_ACCE, O.SFR_ACCES, O.JAVAOBJECT, O.CONFID_DATA, T.COUNTERFEITING_DEBIT, T.COUNTERFEITING_CREDIT, T.COUNTERFEITING_AUTOLOAD, T.COUNTERFEITING_AUTH, T.COUNTERFEITING_UPDATE, T.DISCLOSURE_KEYS, T.INTEG_EM, T.INTEG_EP_IVDATA, T.INTEG_CODE, T.INTEG_KEYS, T.INTEG_EP_STATE, T.INTEG_LOG_DATA, T.INTEG_COUNTERS, T.REPLAY_DEBIT, T.REPLAY_CREDIT, T.REPLAY_AUTOLOAD, T.REPLAY_UPDATE, T.COUNTERFEITING, T.INTEG, T.REPLAY, T.RND, T.INTEG_IVDATA, T.INTEG_, A.PHYSICAL, A.PROTECTION_AFTER_TOE_DELIVERY, A.PROTECTION_AFTER_TOE_DE, R.JAVA, OP.ARRAY_ACCESS, OP.INSTANCE_FIELD, OP.INVK_VIRTUAL, OP.INVK_INTERFACE, OP.THROW, OP.TYPE_ACCESS, OP.CREATE, OP.JAVA, OP.PUT, OE.SECRET_MNGT, OE.DEBIT_BEFORE_CREDIT, OE.PURSE_BEHAVIOR, OE.PHYSICAL, OE.PROTECTION_AFTER_TOE_DELIVERY, OSP.SECRET_MNGT, OSP.DEBIT_BEFORE_CREDIT, OSP.PURSE_BEHAVIOR
Security Assurance Requirements (SAR)
ADV_COMP.1, ADV_ARC.1, ADV_FSP.1, ADV_FSP.4, ADV_TDS.1, ADV_TDS.3, ADV_IMP.1, ADV_FSP.2, ADV_IMP, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_TAT.1, ALC_CMC.4, ALC_CMS.1, ALC_LCD.1, ALC_DEL.1, ALC_DVS.1, ALC_CMS.4, ATE_COV.2, ATE_FUN.1, ATE_COV.1, ATE_IND.2, ATE_DPT.1, AVA_VAN.5, ASE_TSS.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1, ASE_REQ.2, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_ARP.1, FAU_SAA.1, FAU_GEN.1, FAU_STG.1, FAU_ARP.1.1, FAU_GEN, FAU_GEN.1.1, FAU_GEN.1.2, FAU_SAA, FAU_SAA.1.1, FAU_SAA.1.2, FAU_SAR, FAU_SAR.1.1, FAU_SAR.1.2, FAU_STG, FAU_STG.1.1, FAU_STG.1.2, FAU_SAS.1, FAU_SAR.1, FCO_NRO.2, FCO_NRO, FCO_NRO.1, FCO_NRO.2.2, FCO_NRO.2.3, FCS_CKM.3, FCS_COP.1, FCS_CKM, FCS_CKM.2, FCS_CKM.4, FCS_CKM.1, FCS_CKM.1.1, FCS_CKM.2.1, FCS_CKM.3.1, FCS_CKM.4.1, FCS_COP, FCS_COP.1.1, FDP_ACC, FDP_IFC, FDP_ITC.1, FDP_ITC.2, FDP_ACF.1, FDP_ACC.1, FDP_IFF.1, FDP_IFC.1, FDP_ITC, FDP_RIP, FDP_ROL, FDP_UCT.1, FDP_UIT.1, FDP_ACC.1.1, FDP_ACC.2.2, FDP_ACC.2, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1.1, FDP_IFF, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_RIP.1.1, FDP_RIP.1, FDP_ROL.1.1, FDP_ROL.1.2, FDP_ROL.1, FDP_SDI.1, FDP_SDI.2.2, FDP_UCT, FDP_UCT.1.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_IFC.2, FDP_ITT.1, FDP_SDI.2, FDP_ACF, FDP_IFCC, FDP_UTC.1, FIA_UID.1, FIA_ATD, FIA_SOS.2, FIA_UAU, FIA_UID, FIA_USB, FIA_ATD.1, FIA_ATD.1.1, FIA_SOS, FIA_SOS.2.1, FIA_SOS.2.2, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.1, FIA_UAU.3.1, FIA_UAU.3.2, FIA_UAU.4.1, FIA_UAU.4, FIA_UAU.6.1, FIA_UAU.6, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_USB.1, FIA_UAU.3, FIA_UID.2, FMT_MSA.1, FMT_MSA.3, FMT_MSA, FMT_SMR.1, FMT_SMF.1, FMT_MOF.1, FMT_MSA.1.1, FMT_MSA.2.1, FMT_MSA.2, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD, FMT_MTD.1.1, FMT_SMF, FMT_SMF.1.1, FMT_SMR, FMT_SMR.1.1, FMT_SMR.1.2, FMT_LIM.1, FMT_LIM.2, FMT_MTD.1, FPR_UNO.1, FPR_UNO, FPR_UNO.1.1, FPT_PHP.3, FPT_STM.1, FPT_TDC.1, FPT_FLS.1, FPT_ITC.1, FPT_ITI.1, FPT_PHP.2, FPT_RCV.4, FPT_RPL.1, FPT_TDC, FPT_TST.1, FPT_FLS, FPT_FLS.1.1, FPT_ITC, FPT_ITC.1.1, FPT_ITI, FPT_ITI.1.1, FPT_ITI.1.2, FPT_PHP, FPT_PHP.1, FPT_PHP.2.2, FPT_PHP.2.3, FPT_PHP.3.1, FPT_RCV.4.1, FPT_RPL, FPT_RPL.1.1, FPT_RPL.1.2, FPT_TDC.1.1, FPT_TDC.1.2, FPT_TST, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_ITT.1, FRU_FLT.2, FTP_ITC.1, FTP_TRP.1
Protection profiles
BSI-PP-0035
Certificates
BSI-DSZ-CC-0555-2009, BSI-DSZ-CC-0555-, BSI-DSZ-CC-0555, CC-0555-2009
Certification process
out of scope, Crypto libs) written in native language, • The IC NXP P5CD081 The elements out of scope of the TOE are: • Other application(s, libraries itself) (Crypto libs) written in native language, • The IC NXP P5CD081 The elements out of scope of the TOE are: • Other application(s) written in java language 2.3.2 Logical scope of the TOE The

Side-channel analysis
Leak-Inherent, Physical Probing, physical probing, physical tampering, Physical tampering, Malfunction, malfunction, JIL
Certification process
out of scope, Crypto libs) written in native language, • The IC NXP P5CD081 The elements out of scope of the TOE are: • Other application(s, libraries itself) (Crypto libs) written in native language, • The IC NXP P5CD081 The elements out of scope of the TOE are: • Other application(s) written in java language 2.3.2 Logical scope of the TOE The

Standards
FIPS PUB 46-3, FIPS PUB 197, CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004

File metadata

Creation date: D:20110629163023+02'00'
Modification date: D:20110629163023+02'00'
Pages: 103
Producer: Acrobat Distiller 7.0.5 (Windows)

References

Outgoing
  • BSI-DSZ-CC-0555-2009 - NXP Smart Card Controller P5CD081V1A and its major configurations P5CC081V1A, P5CN081V1A, P5CD041V1A, P5CD021V1A and P5CD016V1A each with IC dedicated Software

Heuristics ?

Certificate ID: ANSSI-CC-2011/05

Extracted SARs

AGD_PRE.1, ASE_TSS.2, ASE_REQ.2, ASE_OBJ.2, AGD_OPE.1, ALC_CMC.4, ADV_COMP.1, ASE_CCL.1, ASE_INT.1, AVA_VAN.5, ALC_DEL.1, ASE_ECD.1, ALC_LCD.1, ALC_TAT.1, ATE_FUN.1, ALC_DVS.2, ATE_DPT.1, ADV_FSP.4, ADV_TDS.3, ASE_SPD.1, ALC_CMS.4, ATE_COV.2, ATE_IND.2, ADV_IMP.1, ADV_ARC.1

References ?

Updates ?

  • 15.02.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '845e97937d2dd8ce1bd4fb59cbd027b2bdd9713aa8fc17020413121cdcb4542b', 'txt_hash': '46c26b3b9532a7f824da91ca18227d80bccb714ab392e60e255dd9f073d1e5c7'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '47624c9fc0a22d46f4cf8b95abf7fa5db9d078fd1f7d4dfb94dde08a9dc00568', 'txt_hash': '5987549e517401f6d9a3fd0dbf768a74c1859513af818db35902e897e510e8a4'}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}}.
    • The following properties were deleted: ['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash'].

    The PDF extraction data was updated.

    • The following values were inserted: {'cert_metadata': None, 'cert_frontpage': None, 'cert_keywords': None, 'cert_filename': None}.
    • The report_frontpage property was set to {'FR': {'match_rules': ['Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developer\\(s\\)(.+)Evaluation facility(.+)Recognition arrangements'], 'cert_id': 'ANSSI-CC-2011/05', 'cert_item': 'Gemalto ECC CPU card on GCX5.1 (MPH098) platform on NXP P5CD081V1A', 'cert_item_version': 'CPU e-purse on GCX5.1 MPH098 Version 1.0', 'ref_protection_profiles': 'None', 'cc_version': 'Common Criteria version 3.1 revision 3', 'cc_security_level': 'EAL 4 augmented ALC_DVS.2, AVA_VAN.5', 'developer': 'Gemalto SA 6 rue de la Verrerie, 92197 Meudon, France NXP Semiconductors GmbH Stresemannallee 101, D-22502 Hamburg, Germany Sponsor Gemalto SA 6 rue de la Verrerie, 92197 Meudon, France', 'cert_lab': 'CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France Phone: +33 (0)4 38 78 37 78, email : elisabeth.crochon@cea.fr'}}.
    • The st_frontpage property was set to None.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0555-2009': 2}}, 'FR': {'__update__': {'ANSSI-CC-2011/05': 2}}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'__insert__': {'NL': {'CC-0555-2009': 1}}, '__update__': {'DE': {'__insert__': {'BSI-DSZ-CC-0555-': 1, 'BSI-DSZ-CC-0555': 1}, '__update__': {'BSI-DSZ-CC-0555-2009': 4}}}}} data.

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 13.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0555-2009': 4}}, 'FR': {'__update__': {'ANSSI-CC-2011/05': 4}}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0555-2009': 8}, '__delete__': ['BSI-DSZ-CC-0555-', 'BSI-DSZ-CC-0555']}}, '__delete__': ['NL']}} data.

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'Porte-monnaie électronique ''Gemalto ECC CPU card sur plateforme GCX5.1 masquée (MPH098) sur le composant NXP P5CD081V1A''', 'url': 'https://cyber.gouv.fr/produits-certifies/porte-monnaie-electronique-gemalto-ecc-cpu-card-sur-plateforme-gcx51-masquee', 'description': 'Le produit certifié est le Porte-monnaie électronique ''Gemalto ECC CPU card sur plateforme GCX5.1 masquée (MPH098) sur le composant NXP P5CD081V1A'', développé par Gemalto.\n\nLa cible d'évaluation est une carte à puce avec application de porte-monnaie électronique (CPU e-purse), sur plateforme Java Card fermée, avec interfaces contact et sans contact.\n\nL'application de', 'sponsor': 'Gemalto SA', 'developer': 'Gemalto SA / NXP Semiconductors GmbH', 'cert_id': '2011/05', 'level': 'EAL4+', 'enhanced': {'cert_id': '2011/05', 'certification_date': '13/04/2011', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 3.1r3', 'developer': 'Gemalto SA / NXP Semiconductors GmbH', 'sponsor': 'Gemalto SA', 'evaluation_facility': 'CEA - LETI', 'level': 'EAL4+', 'protection_profile': '', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ALC_DVS.2, AVA_VAN.5', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2011-05en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2011-05en.pdf'}}.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__delete__': ['CA']}} data.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__insert__': {'CA': {'1 1 1': 21, '1 2 3': 6, '5 5 6': 1, '1 1 2': 1, '2 3 3': 1, '5 6 3': 1, '4 5 5': 2, '5 5 5': 1, '1 2 2': 5, '2 2 2': 2, '3 3 2': 1, '2 2 1': 1, '2 2 3': 1}}, '__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0555-2009': 2}}, 'FR': {'__update__': {'ANSSI-CC-2011/05': 2}}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'__insert__': {'NL': {'CC-0555-2009': 1}}, '__update__': {'DE': {'__insert__': {'BSI-DSZ-CC-0555-': 1, 'BSI-DSZ-CC-0555': 1}, '__update__': {'BSI-DSZ-CC-0555-2009': 4}}}}} data.

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 05.02.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'Porte-monnaie électronique ''Gemalto ECC CPU card sur plateforme GCX5.1 masquée (MPH098) sur le composant NXP P5CD081V1A''', 'url': 'https://cyber.gouv.fr/produits-certifies/porte-monnaie-electronique-gemalto-ecc-cpu-card-sur-plateforme-gcx51-masquee', 'description': 'Le produit certifié est le Porte-monnaie électronique ''Gemalto ECC CPU card sur plateforme GCX5.1 masquée (MPH098) sur le composant NXP P5CD081V1A'', développé par Gemalto.\n\nLa cible d'évaluation est une carte à puce avec application de porte-monnaie électronique (CPU e-purse), sur plateforme Java Card fermée, avec interfaces contact et sans contact.\n\nL'application de', 'sponsor': 'Gemalto SA', 'developer': 'Gemalto SA / NXP Semiconductors GmbH', 'cert_id': '2011/05', 'level': 'EAL4+', 'enhanced': {'cert_id': '2011/05', 'certification_date': '13/04/2011', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 3.1r3', 'developer': 'Gemalto SA / NXP Semiconductors GmbH', 'sponsor': 'Gemalto SA', 'evaluation_facility': 'CEA - LETI', 'level': 'EAL4+', 'protection_profile': '', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ALC_DVS.2, AVA_VAN.5', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2011-05en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2011-05en.pdf'}}.
  • 04.01.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'annotated_references': None}.
  • 26.04.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'scheme_data': None}.
  • 11.02.2023 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.cc.CCCertificate.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.InternalState.
    • The following properties were deleted: ['errors'].

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.PdfData.

    The computed heuristics were updated.

    • The following values were inserted: {'direct_transitive_cves': None, 'indirect_transitive_cves': None}.
    • The _type property was set to sec_certs.sample.cc.CCCertificate.Heuristics.
    • The following properties were deleted: ['direct_dependency_cves', 'indirect_dependency_cves'].
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to 47624c9fc0a22d46f4cf8b95abf7fa5db9d078fd1f7d4dfb94dde08a9dc00568.
    • The st_txt_hash property was set to 5987549e517401f6d9a3fd0dbf768a74c1859513af818db35902e897e510e8a4.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 510681, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 103, '/CreationDate': "D:20110629163023+02'00'", '/Keywords': '', '/ModDate': "D:20110629163023+02'00'", '/Producer': 'Acrobat Distiller 7.0.5 (Windows)', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0555-2009': 8}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0035': 1}}, 'cc_security_level': {'EAL': {'EAL5+': 2, 'EAL4': 4, 'EAL4+': 2, 'EAL5': 1, 'EAL4 augmented': 3, 'EAL5 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_COMP.1': 2, 'ADV_ARC.1': 8, 'ADV_FSP.1': 5, 'ADV_FSP.4': 11, 'ADV_TDS.1': 3, 'ADV_TDS.3': 11, 'ADV_IMP.1': 5, 'ADV_FSP.2': 4, 'ADV_IMP': 1, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE.1': 8, 'AGD_PRE.1': 6}, 'ALC': {'ALC_DVS.2': 7, 'ALC_TAT.1': 5, 'ALC_CMC.4': 2, 'ALC_CMS.1': 2, 'ALC_LCD.1': 5, 'ALC_DEL.1': 2, 'ALC_DVS.1': 1, 'ALC_CMS.4': 1}, 'ATE': {'ATE_COV.2': 4, 'ATE_FUN.1': 8, 'ATE_COV.1': 4, 'ATE_IND.2': 1, 'ATE_DPT.1': 2}, 'AVA': {'AVA_VAN.5': 6}, 'ASE': {'ASE_TSS.2': 1, 'ASE_CCL.1': 1, 'ASE_ECD.1': 4, 'ASE_INT.1': 5, 'ASE_REQ.1': 2, 'ASE_REQ.2': 2, 'ASE_OBJ.2': 3, 'ASE_SPD.1': 2, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 10, 'FAU_SAA.1': 13, 'FAU_GEN.1': 10, 'FAU_STG.1': 10, 'FAU_ARP.1.1': 2, 'FAU_GEN': 1, 'FAU_GEN.1.1': 2, 'FAU_GEN.1.2': 2, 'FAU_SAA': 1, 'FAU_SAA.1.1': 3, 'FAU_SAA.1.2': 1, 'FAU_SAR': 1, 'FAU_SAR.1.1': 2, 'FAU_SAR.1.2': 2, 'FAU_STG': 1, 'FAU_STG.1.1': 2, 'FAU_STG.1.2': 2, 'FAU_SAS.1': 1, 'FAU_SAR.1': 3}, 'FCO': {'FCO_NRO.2': 2, 'FCO_NRO': 6, 'FCO_NRO.1': 3, 'FCO_NRO.2.2': 3, 'FCO_NRO.2.3': 3}, 'FCS': {'FCS_CKM.3': 5, 'FCS_COP.1': 17, 'FCS_CKM': 11, 'FCS_CKM.2': 5, 'FCS_CKM.4': 18, 'FCS_CKM.1': 11, 'FCS_CKM.1.1': 1, 'FCS_CKM.2.1': 1, 'FCS_CKM.3.1': 2, 'FCS_CKM.4.1': 2, 'FCS_COP': 11, 'FCS_COP.1.1': 2}, 'FDP': {'FDP_ACC': 31, 'FDP_IFC': 12, 'FDP_ITC.1': 8, 'FDP_ITC.2': 4, 'FDP_ACF.1': 33, 'FDP_ACC.1': 27, 'FDP_IFF.1': 14, 'FDP_IFC.1': 20, 'FDP_ITC': 6, 'FDP_RIP': 10, 'FDP_ROL': 8, 'FDP_UCT.1': 5, 'FDP_UIT.1': 8, 'FDP_ACC.1.1': 1, 'FDP_ACC.2.2': 1, 'FDP_ACC.2': 9, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_IFC.1.1': 1, 'FDP_IFF': 5, 'FDP_IFF.1.1': 1, 'FDP_IFF.1.2': 1, 'FDP_IFF.1.3': 1, 'FDP_IFF.1.4': 1, 'FDP_IFF.1.5': 1, 'FDP_ITC.1.1': 1, 'FDP_ITC.1.2': 1, 'FDP_ITC.1.3': 1, 'FDP_RIP.1.1': 1, 'FDP_RIP.1': 3, 'FDP_ROL.1.1': 1, 'FDP_ROL.1.2': 1, 'FDP_ROL.1': 4, 'FDP_SDI.1': 2, 'FDP_SDI.2.2': 2, 'FDP_UCT': 1, 'FDP_UCT.1.1': 2, 'FDP_UIT.1.1': 2, 'FDP_UIT.1.2': 2, 'FDP_IFC.2': 3, 'FDP_ITT.1': 1, 'FDP_SDI.2': 5, 'FDP_ACF': 11, 'FDP_IFCC': 1, 'FDP_UTC.1': 1}, 'FIA': {'FIA_UID.1': 21, 'FIA_ATD': 5, 'FIA_SOS.2': 6, 'FIA_UAU': 23, 'FIA_UID': 4, 'FIA_USB': 4, 'FIA_ATD.1': 4, 'FIA_ATD.1.1': 1, 'FIA_SOS': 1, 'FIA_SOS.2.1': 2, 'FIA_SOS.2.2': 2, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.1': 4, 'FIA_UAU.3.1': 2, 'FIA_UAU.3.2': 2, 'FIA_UAU.4.1': 1, 'FIA_UAU.4': 2, 'FIA_UAU.6.1': 1, 'FIA_UAU.6': 2, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_USB.1': 4, 'FIA_UAU.3': 2, 'FIA_UID.2': 1}, 'FMT': {'FMT_MSA.1': 13, 'FMT_MSA.3': 17, 'FMT_MSA': 38, 'FMT_SMR.1': 27, 'FMT_SMF.1': 14, 'FMT_MOF.1': 5, 'FMT_MSA.1.1': 2, 'FMT_MSA.2.1': 1, 'FMT_MSA.2': 1, 'FMT_MSA.3.1': 2, 'FMT_MSA.3.2': 2, 'FMT_MTD': 1, 'FMT_MTD.1.1': 2, 'FMT_SMF': 4, 'FMT_SMF.1.1': 1, 'FMT_SMR': 1, 'FMT_SMR.1.1': 2, 'FMT_SMR.1.2': 2, 'FMT_LIM.1': 2, 'FMT_LIM.2': 2, 'FMT_MTD.1': 5}, 'FPR': {'FPR_UNO.1': 8, 'FPR_UNO': 1, 'FPR_UNO.1.1': 2}, 'FPT': {'FPT_PHP.3': 11, 'FPT_STM.1': 5, 'FPT_TDC.1': 3, 'FPT_FLS.1': 9, 'FPT_ITC.1': 4, 'FPT_ITI.1': 8, 'FPT_PHP.2': 4, 'FPT_RCV.4': 7, 'FPT_RPL.1': 5, 'FPT_TDC': 3, 'FPT_TST.1': 7, 'FPT_FLS': 1, 'FPT_FLS.1.1': 2, 'FPT_ITC': 1, 'FPT_ITC.1.1': 2, 'FPT_ITI': 1, 'FPT_ITI.1.1': 2, 'FPT_ITI.1.2': 2, 'FPT_PHP': 2, 'FPT_PHP.1': 2, 'FPT_PHP.2.2': 2, 'FPT_PHP.2.3': 2, 'FPT_PHP.3.1': 2, 'FPT_RCV.4.1': 2, 'FPT_RPL': 1, 'FPT_RPL.1.1': 2, 'FPT_RPL.1.2': 2, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 1, 'FPT_TST': 1, 'FPT_TST.1.1': 2, 'FPT_TST.1.2': 2, 'FPT_TST.1.3': 2, 'FPT_ITT.1': 1}, 'FRU': {'FRU_FLT.2': 2}, 'FTP': {'FTP_ITC.1': 9, 'FTP_TRP.1': 9}}, 'cc_claims': {'D': {'D.EM': 13, 'D.EP_IVDATA': 3, 'D.EP_CODE': 5, 'D.KEYS': 9, 'D.EP_STATE': 5, 'D.LOG_DATA': 4, 'D.COUNTERS': 6, 'D.EP_IV_DATA': 1}, 'O': {'O.AUTH': 9, 'O.OPERATE': 13, 'O.REPLAY': 7, 'O.EM': 6, 'O.CONF_DATA': 8, 'O.INTEG_DATA': 6, 'O.TAMPER': 11, 'O.RECORD': 5, 'O.RND': 1, 'O.HW_AES': 1, 'O.MEM_ACCE': 1, 'O.SFR_ACCES': 1, 'O.JAVAOBJECT': 10, 'O.CONFID_DATA': 1}, 'T': {'T.COUNTERFEITING_DEBIT': 6, 'T.COUNTERFEITING_CREDIT': 2, 'T.COUNTERFEITING_AUTOLOAD': 6, 'T.COUNTERFEITING_AUTH': 2, 'T.COUNTERFEITING_UPDATE': 4, 'T.DISCLOSURE_KEYS': 9, 'T.INTEG_EM': 5, 'T.INTEG_EP_IVDATA': 2, 'T.INTEG_CODE': 5, 'T.INTEG_KEYS': 4, 'T.INTEG_EP_STATE': 5, 'T.INTEG_LOG_DATA': 4, 'T.INTEG_COUNTERS': 5, 'T.REPLAY_DEBIT': 4, 'T.REPLAY_CREDIT': 3, 'T.REPLAY_AUTOLOAD': 4, 'T.REPLAY_UPDATE': 3, 'T.COUNTERFEITING': 2, 'T.INTEG': 3, 'T.REPLAY': 2, 'T.RND': 1, 'T.INTEG_IVDATA': 2, 'T.INTEG_': 1}, 'A': {'A.PHYSICAL': 4, 'A.PROTECTION_AFTER_TOE_DELIVERY': 3, 'A.PROTECTION_AFTER_TOE_DE': 1}, 'R': {'R.JAVA': 5}, 'OP': {'OP.ARRAY_ACCESS': 2, 'OP.INSTANCE_FIELD': 1, 'OP.INVK_VIRTUAL': 2, 'OP.INVK_INTERFACE': 4, 'OP.THROW': 2, 'OP.TYPE_ACCESS': 2, 'OP.CREATE': 4, 'OP.JAVA': 3, 'OP.PUT': 3}, 'OE': {'OE.SECRET_MNGT': 3, 'OE.DEBIT_BEFORE_CREDIT': 3, 'OE.PURSE_BEHAVIOR': 3, 'OE.PHYSICAL': 3, 'OE.PROTECTION_AFTER_TOE_DELIVERY': 3}, 'OSP': {'OSP.SECRET_MNGT': 4, 'OSP.DEBIT_BEFORE_CREDIT': 3, 'OSP.PURSE_BEHAVIOR': 4}}, 'vendor': {'NXP': {'NXP': 18, 'NXP Semiconductors': 2}, 'Gemalto': {'Gemalto': 19}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 34}}, 'DES': {'DES': {'DES': 6}, '3DES': {'Triple-DES': 3, 'TDEA': 1}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 237}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 12}}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 6, 'RND': 2}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 5, 'Physical Probing': 2, 'physical probing': 4}, 'FI': {'physical tampering': 13, 'Physical tampering': 1, 'Malfunction': 4, 'malfunction': 3}, 'other': {'JIL': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 46-3': 1, 'FIPS PUB 197': 2}, 'CC': {'CCMB-2009-07-001': 1, 'CCMB-2009-07-002': 1, 'CCMB-2009-07-003': 1, 'CCMB-2009-07-004': 1}}, 'javacard_version': {'JavaCard': {'Java Card 2.2': 1}}, 'javacard_api_const': {'misc': {'TYPE_ACCESS': 2}}, 'javacard_packages': {'javacard': {'javacard.security': 1}}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'Crypto libs) written in native language, • The IC NXP P5CD081 The elements out of scope of the TOE are: • Other application(s': 1, 'libraries itself) (Crypto libs) written in native language, • The IC NXP P5CD081 The elements out of scope of the TOE are: • Other application(s) written in java language 2.3.2 Logical scope of the TOE The': 1}}}.
    • The st_filename property was set to ANSSI-CC-cible_2011-05en.pdf.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0555-2009']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0555-2009']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]} values added.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was updated, with the [[0, 'failed to download report from https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC_2011-05en.pdf, code: nok']] values inserted.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC-cible_2011-05en.pdf, code: nok'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]} values discarded.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to [].
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC_2011-05en.pdf, code: nok'].
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': 'ANSSI-CC_2011-05en.pdf', 'st_filename': 'ANSSI-CC-cible_2011-05en.pdf'}.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0555-2009': 4}}}}, 'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL 4': 2, 'EAL 4 augmented': 2}, '__delete__': ['EAL 2', 'EAL 6', 'EAL 4+']}}}, 'cc_sar': {'__update__': {'AVA': {'__update__': {'AVA_VAN': 2}}}}, 'cc_claims': {}, 'vendor': {'__update__': {'Gemalto': {'__update__': {'Gemalto': 15}}}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {'__update__': {'ECC': {'__update__': {'ECC': {'__update__': {'ECC': 26}}}}}}, 'tee_name': {}, 'standard_id': {'__update__': {'CC': {'__insert__': {'CCMB-2009-07-003': 1, 'CCMB-2009-07-004': 1}}}}, 'certification_process': {'__update__': {'OutOfScope': {'__insert__': {' - The NXP P5CD081 IC The Other applications1 on the card are written in java language and are out of scope of the TOE. 1.2.4. Life cycle The product’s life cycle is organised as follow: 1 Applications': 1}, '__delete__': ['ibs), - The NXP P5CD081 IC The Other applications1 on the card are written in java language and are out of scope of the TOE. 1.2.4. Life cycle The product’s life cycle is organised as follow: 1 Applications']}}}} data.
    • The st_keywords property was updated, with the {'cc_sar': {'__update__': {'ADV': {'__update__': {'ADV_TDS.1': 3, 'ADV_FSP.4': 11, 'ADV_IMP.1': 5, 'ADV_TDS.3': 11, 'ADV_FSP.2': 4}}, 'AGD': {'__update__': {'AGD_PRE.1': 6}}, 'ALC': {'__update__': {'ALC_DVS.1': 1, 'ALC_CMS.4': 1}}, 'ATE': {'__update__': {'ATE_FUN.1': 8, 'ATE_DPT.1': 2, 'ATE_IND.2': 1}}, 'AVA': {'__update__': {'AVA_VAN.5': 6}}, 'ASE': {'__update__': {'ASE_ECD.1': 4, 'ASE_REQ.2': 2, 'ASE_SPD.1': 2}}}}, 'cc_sfr': {'__update__': {'FAU': {'__insert__': {'FAU_GEN': 1, 'FAU_SAA': 1, 'FAU_SAR': 1, 'FAU_STG': 1}, '__update__': {'FAU_SAA.1': 13, 'FAU_GEN.1': 10, 'FAU_SAR.1': 3}}, 'FCO': {'__insert__': {'FCO_NRO': 6}, '__delete__': ['FCO_NRO.2.1']}, 'FCS': {'__insert__': {'FCS_CKM': 11, 'FCS_COP': 11}, '__update__': {'FCS_CKM.2': 5, 'FCS_CKM.4': 18, 'FCS_CKM.1': 11}, '__delete__': ['FCS_RNG.1']}, 'FDP': {'__insert__': {'FDP_IFC': 12, 'FDP_ITC': 6, 'FDP_RIP': 10, 'FDP_ROL': 8, 'FDP_IFF': 5, 'FDP_ROL.1': 4, 'FDP_UCT': 1, 'FDP_IFCC': 1}, '__update__': {'FDP_ITC.1': 8, 'FDP_ACF.1': 33, 'FDP_ACC.1': 27, 'FDP_IFF.1': 14, 'FDP_IFC.1': 20, 'FDP_SDI.2': 5, 'FDP_ACC.2': 9, 'FDP_RIP.1': 3, 'FDP_ACC': 31, 'FDP_ACF': 11}, '__delete__': ['FDP_ACC.2.1', 'FDP_SDI.2.1']}, 'FIA': {'__insert__': {'FIA_ATD': 5, 'FIA_UAU': 23, 'FIA_UID': 4, 'FIA_USB': 4, 'FIA_SOS': 1, 'FIA_UAU.1': 4, 'FIA_UAU.4': 2, 'FIA_UAU.6': 2}, '__update__': {'FIA_UAU.3': 2, 'FIA_USB.1': 4}, '__delete__': ['FIA_UID.2.1']}, 'FMT': {'__insert__': {'FMT_MSA': 38, 'FMT_MSA.2': 1, 'FMT_MTD': 1, 'FMT_SMF': 4, 'FMT_SMR': 1}, '__update__': {'FMT_SMF.1': 14, 'FMT_MSA.1': 13, 'FMT_MTD.1': 5}}, 'FPR': {'__insert__': {'FPR_UNO': 1}}, 'FPT': {'__insert__': {'FPT_TDC': 3, 'FPT_FLS': 1, 'FPT_ITC': 1, 'FPT_ITI': 1, 'FPT_PHP': 2, 'FPT_RPL': 1, 'FPT_TST': 1}, '__update__': {'FPT_TDC.1': 3, 'FPT_PHP.3': 11}, '__delete__': ['FPT_PHP.2.1']}}}, 'cc_claims': {'__insert__': {'R': {'R.JAVA': 5}}, '__update__': {'D': {'__update__': {'D.EP_IVDATA': 3, 'D.KEYS': 9, 'D.LOG_DATA': 4, 'D.COUNTERS': 6}}, 'O': {'__update__': {'O.EM': 6, 'O.TAMPER': 11, 'O.REPLAY': 7, 'O.CONF_DATA': 8, 'O.INTEG_DATA': 6, 'O.RECORD': 5, 'O.JAVAOBJECT': 10}, '__delete__': ['O.MF_FW']}, 'T': {'__update__': {'T.COUNTERFEITING_CREDIT': 2, 'T.COUNTERFEITING_AUTH': 2, 'T.DISCLOSURE_KEYS': 9, 'T.INTEG_EM': 5, 'T.INTEG_EP_IVDATA': 2, 'T.INTEG_CODE': 5, 'T.INTEG_KEYS': 4, 'T.INTEG_EP_STATE': 5, 'T.INTEG_LOG_DATA': 4, 'T.INTEG_COUNTERS': 5, 'T.REPLAY_DEBIT': 4, 'T.REPLAY_CREDIT': 3, 'T.REPLAY_AUTOLOAD': 4, 'T.REPLAY_UPDATE': 3, 'T.INTEG_IVDATA': 2}}, 'A': {'__update__': {'A.PROTECTION_AFTER_TOE_DELIVERY': 3}}, 'OP': {'__update__': {'OP.INSTANCE_FIELD': 1}}, 'OSP': {'__update__': {'OSP.DEBIT_BEFORE_CREDIT': 3}}}}, 'vendor': {'__delete__': ['STMicroelectronics']}, 'symmetric_crypto': {'__update__': {'AES_competition': {'__update__': {'AES': {'__update__': {'AES': 34}}}}, 'DES': {'__update__': {'DES': {'__update__': {'DES': 6}, '__delete__': ['DEA']}}}}}, 'asymmetric_crypto': {'__update__': {'ECC': {'__update__': {'ECC': {'__update__': {'ECC': 237}}}}}}, 'crypto_scheme': {'__update__': {'MAC': {'__update__': {'MAC': 12}}}, '__delete__': ['KA']}, 'randomness': {'__update__': {'RNG': {'__update__': {'RNG': 6}}}}, 'side_channel_analysis': {'__update__': {'SCA': {'__update__': {'Leak-Inherent': 5}}, 'FI': {'__update__': {'Malfunction': 4}}}}, 'tee_name': {}, 'standard_id': {'__update__': {'FIPS': {'__update__': {'FIPS PUB 197': 2}}}}, 'javacard_version': {'JavaCard': {'Java Card 2.2': 1}}, 'javacard_packages': {'__update__': {'javacard': {'__update__': {'javacard.security': 1}}}}, 'certification_process': {'__update__': {'OutOfScope': {'__insert__': {'Crypto libs) written in native language, • The IC NXP P5CD081 The elements out of scope of the TOE are: • Other application(s': 1, 'libraries itself) (Crypto libs) written in native language, • The IC NXP P5CD081 The elements out of scope of the TOE are: • Other application(s) written in java language 2.3.2 Logical scope of the TOE The': 1}, '__delete__': ['(Crypto libs) written in native language, • The IC NXP P5CD081 The elements out of scope of the TOE are: • Other application(s', 'aphic libraries itself) (Crypto libs) written in native language, • The IC NXP P5CD081 The elements out of scope of the TOE are: • Other application(s) written in java language 2.3.2 Logical scope of the TOE The']}}}} data.
  • 28.07.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report_extract_ok property was set to True.
    • The errors property was set to [].

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 278826, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 18, '/CreationDate': "D:20110629162959+02'00'", '/Keywords': '', '/ModDate': "D:20110629162959+02'00'", '/Producer': 'Acrobat Distiller 8.1.0 (Windows)', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.ssi.gouv.fr/', 'mailto:certification.anssi@ssi.gouv.fr']}}.

    The computed heuristics were updated.

    • The cert_lab property was set to ['CEA'].
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]}.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report_extract_ok property was set to False.
    • The errors property was set to ['Failed to read metadata of certs/reports/pdf/a38fbb576027f6c6.pdf, error: can only concatenate list (not "IndirectObject") to list', 'Failed to read metadata of certs/reports/pdf/a38fbb576027f6c6.pdf, error: can only concatenate list (not "IndirectObject") to list'].

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': []}} values inserted.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0555-2009': 2}, 'FR': {'ANSSI-CC-2011/05': 4}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 3, 'EAL4': 2, 'EAL5': 1, 'EAL7': 1, 'EAL 1': 1, 'EAL 2': 1, 'EAL 3': 1, 'EAL 5': 1, 'EAL 6': 1, 'EAL 7': 1, 'EAL 4+': 1, 'EAL 4 augmented': 1}, 'ITSEC': {'ITSEC E6 High': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_DVS.2': 2, 'ALC_FLR': 1, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_LCD': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.5': 2, 'AVA_VAN': 1}, 'ASE': {'ASE_TSS.2': 1, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {'T': {'T': 3}}, 'vendor': {'NXP': {'NXP': 24, 'NXP Semiconductors': 2}, 'Gemalto': {'Gemalto': 24}}, 'eval_facility': {'CEA-LETI': {'CEA - LETI': 1}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 3}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 30}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 2}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2009-07-001': 1, 'CCMB-2009-07-002': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'ibs), - The NXP P5CD081 IC The Other applications1 on the card are written in java language and are out of scope of the TOE. 1.2.4. Life cycle The product’s life cycle is organised as follow: 1 Applications': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0555-2009': 8}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0035': 1}}, 'cc_security_level': {'EAL': {'EAL5+': 2, 'EAL4': 4, 'EAL4+': 2, 'EAL5': 1, 'EAL4 augmented': 3, 'EAL5 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_COMP.1': 2, 'ADV_ARC.1': 8, 'ADV_FSP.1': 5, 'ADV_TDS.1': 4, 'ADV_FSP.4': 12, 'ADV_IMP.1': 8, 'ADV_TDS.3': 12, 'ADV_FSP.2': 5, 'ADV_IMP': 1, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE.1': 8, 'AGD_PRE.1': 8}, 'ALC': {'ALC_DVS.2': 7, 'ALC_TAT.1': 5, 'ALC_CMC.4': 2, 'ALC_CMS.1': 2, 'ALC_DVS.1': 2, 'ALC_LCD.1': 5, 'ALC_CMS.4': 3, 'ALC_DEL.1': 2}, 'ATE': {'ATE_COV.2': 4, 'ATE_FUN.1': 11, 'ATE_DPT.1': 4, 'ATE_COV.1': 4, 'ATE_IND.2': 2}, 'AVA': {'AVA_VAN.5': 4}, 'ASE': {'ASE_TSS.2': 1, 'ASE_CCL.1': 1, 'ASE_ECD.1': 5, 'ASE_INT.1': 5, 'ASE_REQ.1': 2, 'ASE_REQ.2': 3, 'ASE_OBJ.2': 3, 'ASE_SPD.1': 3, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 10, 'FAU_SAA.1': 12, 'FAU_GEN.1': 11, 'FAU_SAR.1': 4, 'FAU_STG.1': 10, 'FAU_ARP.1.1': 2, 'FAU_GEN.1.1': 2, 'FAU_GEN.1.2': 2, 'FAU_SAA.1.1': 3, 'FAU_SAA.1.2': 1, 'FAU_SAR.1.1': 2, 'FAU_SAR.1.2': 2, 'FAU_STG.1.1': 2, 'FAU_STG.1.2': 2, 'FAU_SAS.1': 1}, 'FCO': {'FCO_NRO.2': 2, 'FCO_NRO.1': 3, 'FCO_NRO.2.1': 3, 'FCO_NRO.2.2': 3, 'FCO_NRO.2.3': 3}, 'FCS': {'FCS_CKM.3': 5, 'FCS_COP.1': 17, 'FCS_CKM.2': 4, 'FCS_CKM.4': 19, 'FCS_CKM.1': 10, 'FCS_CKM.1.1': 1, 'FCS_CKM.2.1': 1, 'FCS_CKM.3.1': 2, 'FCS_CKM.4.1': 2, 'FCS_COP.1.1': 2, 'FCS_RNG.1': 1}, 'FDP': {'FDP_ITC.1': 5, 'FDP_ITC.2': 4, 'FDP_ACF.1': 17, 'FDP_ACC.1': 26, 'FDP_IFF.1': 4, 'FDP_IFC.1': 18, 'FDP_SDI.2': 6, 'FDP_UCT.1': 5, 'FDP_UIT.1': 8, 'FDP_ACC.1.1': 1, 'FDP_ACC.2.1': 1, 'FDP_ACC.2.2': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_IFC.1.1': 1, 'FDP_IFF.1.1': 1, 'FDP_IFF.1.2': 1, 'FDP_IFF.1.3': 1, 'FDP_IFF.1.4': 1, 'FDP_IFF.1.5': 1, 'FDP_ITC.1.1': 1, 'FDP_ITC.1.2': 1, 'FDP_ITC.1.3': 1, 'FDP_RIP.1.1': 1, 'FDP_ROL.1.1': 1, 'FDP_ROL.1.2': 1, 'FDP_SDI.1': 2, 'FDP_SDI.2.1': 2, 'FDP_SDI.2.2': 2, 'FDP_UCT.1.1': 2, 'FDP_UIT.1.1': 2, 'FDP_UIT.1.2': 2, 'FDP_ACC.2': 6, 'FDP_IFC.2': 3, 'FDP_ITT.1': 1, 'FDP_RIP.1': 1, 'FDP_ACC': 1, 'FDP_ACF': 1, 'FDP_UTC.1': 1}, 'FIA': {'FIA_UID.1': 21, 'FIA_SOS.2': 6, 'FIA_UAU.3': 3, 'FIA_ATD.1': 4, 'FIA_ATD.1.1': 1, 'FIA_SOS.2.1': 2, 'FIA_SOS.2.2': 2, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.3.1': 2, 'FIA_UAU.3.2': 2, 'FIA_UAU.4.1': 1, 'FIA_UAU.6.1': 1, 'FIA_UID.2.1': 1, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_UID.2': 1, 'FIA_USB.1': 1}, 'FMT': {'FMT_MSA.3': 17, 'FMT_SMR.1': 27, 'FMT_SMF.1': 13, 'FMT_MSA.1': 12, 'FMT_MTD.1': 6, 'FMT_MOF.1': 5, 'FMT_MSA.1.1': 2, 'FMT_MSA.2.1': 1, 'FMT_MSA.3.1': 2, 'FMT_MSA.3.2': 2, 'FMT_MTD.1.1': 2, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 2, 'FMT_SMR.1.2': 2, 'FMT_LIM.1': 2, 'FMT_LIM.2': 2}, 'FPR': {'FPR_UNO.1': 8, 'FPR_UNO.1.1': 2}, 'FPT': {'FPT_STM.1': 5, 'FPT_TDC.1': 1, 'FPT_FLS.1': 9, 'FPT_ITC.1': 4, 'FPT_ITI.1': 8, 'FPT_PHP.2': 4, 'FPT_PHP.3': 13, 'FPT_RCV.4': 7, 'FPT_RPL.1': 5, 'FPT_TST.1': 7, 'FPT_FLS.1.1': 2, 'FPT_ITC.1.1': 2, 'FPT_ITI.1.1': 2, 'FPT_ITI.1.2': 2, 'FPT_PHP.1': 2, 'FPT_PHP.2.1': 2, 'FPT_PHP.2.2': 2, 'FPT_PHP.2.3': 2, 'FPT_PHP.3.1': 2, 'FPT_RCV.4.1': 2, 'FPT_RPL.1.1': 2, 'FPT_RPL.1.2': 2, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 1, 'FPT_TST.1.1': 2, 'FPT_TST.1.2': 2, 'FPT_TST.1.3': 2, 'FPT_ITT.1': 1}, 'FRU': {'FRU_FLT.2': 2}, 'FTP': {'FTP_ITC.1': 9, 'FTP_TRP.1': 9}}, 'cc_claims': {'D': {'D.EM': 13, 'D.EP_IVDATA': 4, 'D.EP_CODE': 5, 'D.KEYS': 10, 'D.EP_STATE': 5, 'D.LOG_DATA': 5, 'D.COUNTERS': 8, 'D.EP_IV_DATA': 1}, 'O': {'O.AUTH': 9, 'O.EM': 8, 'O.OPERATE': 13, 'O.TAMPER': 16, 'O.REPLAY': 9, 'O.CONF_DATA': 11, 'O.INTEG_DATA': 11, 'O.RECORD': 6, 'O.RND': 1, 'O.HW_AES': 1, 'O.MF_FW': 1, 'O.MEM_ACCE': 1, 'O.SFR_ACCES': 1, 'O.JAVAOBJECT': 8, 'O.CONFID_DATA': 1}, 'T': {'T.COUNTERFEITING_DEBIT': 6, 'T.COUNTERFEITING_CREDIT': 6, 'T.COUNTERFEITING_AUTOLOAD': 6, 'T.COUNTERFEITING_AUTH': 4, 'T.COUNTERFEITING_UPDATE': 4, 'T.DISCLOSURE_KEYS': 12, 'T.INTEG_EM': 8, 'T.INTEG_EP_IVDATA': 3, 'T.INTEG_CODE': 7, 'T.INTEG_KEYS': 7, 'T.INTEG_EP_STATE': 7, 'T.INTEG_LOG_DATA': 8, 'T.INTEG_COUNTERS': 7, 'T.REPLAY_DEBIT': 5, 'T.REPLAY_CREDIT': 5, 'T.REPLAY_AUTOLOAD': 5, 'T.REPLAY_UPDATE': 4, 'T.COUNTERFEITING': 2, 'T.INTEG': 3, 'T.REPLAY': 2, 'T.RND': 1, 'T.INTEG_IVDATA': 4, 'T.INTEG_': 1}, 'A': {'A.PHYSICAL': 4, 'A.PROTECTION_AFTER_TOE_DELIVERY': 4, 'A.PROTECTION_AFTER_TOE_DE': 1}, 'OP': {'OP.ARRAY_ACCESS': 2, 'OP.INSTANCE_FIELD': 2, 'OP.INVK_VIRTUAL': 2, 'OP.INVK_INTERFACE': 4, 'OP.THROW': 2, 'OP.TYPE_ACCESS': 2, 'OP.CREATE': 4, 'OP.JAVA': 3, 'OP.PUT': 3}, 'OE': {'OE.SECRET_MNGT': 3, 'OE.DEBIT_BEFORE_CREDIT': 3, 'OE.PURSE_BEHAVIOR': 3, 'OE.PHYSICAL': 3, 'OE.PROTECTION_AFTER_TOE_DELIVERY': 3}, 'OSP': {'OSP.SECRET_MNGT': 4, 'OSP.DEBIT_BEFORE_CREDIT': 4, 'OSP.PURSE_BEHAVIOR': 4}}, 'vendor': {'NXP': {'NXP': 18, 'NXP Semiconductors': 2}, 'STMicroelectronics': {'STM': 5}, 'Gemalto': {'Gemalto': 19}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 47}}, 'DES': {'DES': {'DES': 9, 'DEA': 1}, '3DES': {'Triple-DES': 3, 'TDEA': 1}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 239}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 16}, 'KA': {'KA': 8}}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 5, 'RND': 2}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 3, 'Physical Probing': 2, 'physical probing': 4}, 'FI': {'physical tampering': 13, 'Physical tampering': 1, 'Malfunction': 5, 'malfunction': 3}, 'other': {'JIL': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 26}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 46-3': 1, 'FIPS PUB 197': 3}, 'CC': {'CCMB-2009-07-001': 1, 'CCMB-2009-07-002': 1, 'CCMB-2009-07-003': 1, 'CCMB-2009-07-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {'misc': {'TYPE_ACCESS': 2}}, 'javacard_packages': {'javacard': {'javacard.security': 2}}, 'certification_process': {'OutOfScope': {'out of scope': 1, '(Crypto libs) written in native language, • The IC NXP P5CD081 The elements out of scope of the TOE are: • Other application(s': 1, 'aphic libraries itself) (Crypto libs) written in native language, • The IC NXP P5CD081 The elements out of scope of the TOE are: • Other application(s) written in java language 2.3.2 Logical scope of the TOE The': 1}}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
    • The cert_lab property was set to None.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': '845e97937d2dd8ce1bd4fb59cbd027b2bdd9713aa8fc17020413121cdcb4542b', 'st_pdf_hash': '47624c9fc0a22d46f4cf8b95abf7fa5db9d078fd1f7d4dfb94dde08a9dc00568', 'report_txt_hash': '46c26b3b9532a7f824da91ca18227d80bccb714ab392e60e255dd9f073d1e5c7', 'st_txt_hash': '5987549e517401f6d9a3fd0dbf768a74c1859513af818db35902e897e510e8a4'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {'DES': 3}, 'rules_asymmetric_crypto': {'ECC': 30}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {}, 'rules_randomness': {}, 'rules_tee': {'SE': 2}, 'rules_side_channels': {}} values inserted.
    • The st_keywords property was updated, with the {'rules_symmetric_crypto': {'AES': 47, 'DES': 9, 'TDEA': 1}, 'rules_asymmetric_crypto': {'ECC': 239}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {'MAC': 16}, 'rules_randomness': {'RNG': 5, 'RND': 2}, 'rules_tee': {'SE': 26}, 'rules_side_channels': {'Malfunction': 5, 'malfunction': 3, 'Leak-Inherent': 3, 'Physical Probing': 2, 'physical probing': 4, 'physical tampering': 13, 'Physical tampering': 1}} values inserted.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_COMP', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 4}]}}.
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0555-2009']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0555-2009']}}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0555-2009']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0555-2009']}}}.
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['1.0', '5.1']}.
  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Gemalto ECC CPU card - CPU e-purse application on GCX5.1 (MPH098) platform on NXP P5CD081V1A Version 1.0 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": null,
  "dgst": "a38fbb576027f6c6",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2011/05",
    "cert_lab": [
      "CEA"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_COMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "5.1",
        "1.0"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0555-2009"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0555-2009"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0555-2009"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0555-2009"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Gemalto / NXP Semiconductors",
  "manufacturer_web": "https://www.gemalto.com/",
  "name": "Gemalto ECC CPU card - CPU e-purse application on GCX5.1 (MPH098) platform on NXP P5CD081V1A Version 1.0",
  "not_valid_after": "2019-09-01",
  "not_valid_before": "2011-04-13",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "ANSSI-CC_2011-05en.pdf",
    "report_frontpage": {
      "FR": {
        "cc_security_level": "EAL 4 augmented ALC_DVS.2, AVA_VAN.5",
        "cc_version": "Common Criteria version 3.1 revision 3",
        "cert_id": "ANSSI-CC-2011/05",
        "cert_item": "Gemalto ECC CPU card on GCX5.1 (MPH098) platform on NXP P5CD081V1A",
        "cert_item_version": "CPU e-purse on GCX5.1 MPH098 Version 1.0",
        "cert_lab": "CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France Phone: +33 (0)4 38 78 37 78, email : elisabeth.crochon@cea.fr",
        "developer": "Gemalto SA 6 rue de la Verrerie, 92197 Meudon, France NXP Semiconductors GmbH Stresemannallee 101, D-22502 Hamburg, Germany Sponsor Gemalto SA 6 rue de la Verrerie, 92197 Meudon, France",
        "match_rules": [
          "Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developer\\(s\\)(.+)Evaluation facility(.+)Recognition arrangements"
        ],
        "ref_protection_profiles": "None"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 26
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0555-2009": 2
        },
        "FR": {
          "ANSSI-CC-2011/05": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_FSP": 1,
          "ADV_IMP": 1,
          "ADV_INT": 1,
          "ADV_SPM": 1,
          "ADV_TDS": 1
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_PRE": 1
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMS": 1,
          "ALC_DEL": 1,
          "ALC_DVS": 1,
          "ALC_DVS.2": 2,
          "ALC_FLR": 1,
          "ALC_LCD": 1,
          "ALC_TAT": 1
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_ECD": 1,
          "ASE_INT": 1,
          "ASE_OBJ": 1,
          "ASE_REQ": 1,
          "ASE_SPD": 1,
          "ASE_TSS": 1,
          "ASE_TSS.2": 1
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_DPT": 1,
          "ATE_FUN": 1,
          "ATE_IND": 1
        },
        "AVA": {
          "AVA_VAN": 2,
          "AVA_VAN.5": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 3": 1,
          "EAL 4": 2,
          "EAL 4 augmented": 2,
          "EAL 5": 1,
          "EAL 7": 1,
          "EAL4": 2,
          "EAL5": 1,
          "EAL7": 1
        },
        "ITSEC": {
          "ITSEC E6 High": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "OutOfScope": {
          " - The NXP P5CD081 IC The Other applications1 on the card are written in java language and are out of scope of the TOE. 1.2.4. Life cycle The product\u2019s life cycle is organised as follow: 1 Applications": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "CEA-LETI": {
          "CEA - LETI": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2009-07-001": 1,
          "CCMB-2009-07-002": 1,
          "CCMB-2009-07-003": 1,
          "CCMB-2009-07-004": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Gemalto": {
          "Gemalto": 15
        },
        "NXP": {
          "NXP": 24,
          "NXP Semiconductors": 2
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20110629162959+02\u002700\u0027",
      "/Keywords": "",
      "/ModDate": "D:20110629162959+02\u002700\u0027",
      "/Producer": "Acrobat Distiller 8.1.0 (Windows)",
      "pdf_file_size_bytes": 278826,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.ssi.gouv.fr/",
          "mailto:certification.anssi@ssi.gouv.fr"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 18
    },
    "st_filename": "ANSSI-CC-cible_2011-05en.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 237
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0555": 1,
          "BSI-DSZ-CC-0555-": 1,
          "BSI-DSZ-CC-0555-2009": 4
        },
        "NL": {
          "CC-0555-2009": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.PHYSICAL": 4,
          "A.PROTECTION_AFTER_TOE_DE": 1,
          "A.PROTECTION_AFTER_TOE_DELIVERY": 3
        },
        "D": {
          "D.COUNTERS": 6,
          "D.EM": 13,
          "D.EP_CODE": 5,
          "D.EP_IVDATA": 3,
          "D.EP_IV_DATA": 1,
          "D.EP_STATE": 5,
          "D.KEYS": 9,
          "D.LOG_DATA": 4
        },
        "O": {
          "O.AUTH": 9,
          "O.CONFID_DATA": 1,
          "O.CONF_DATA": 8,
          "O.EM": 6,
          "O.HW_AES": 1,
          "O.INTEG_DATA": 6,
          "O.JAVAOBJECT": 10,
          "O.MEM_ACCE": 1,
          "O.OPERATE": 13,
          "O.RECORD": 5,
          "O.REPLAY": 7,
          "O.RND": 1,
          "O.SFR_ACCES": 1,
          "O.TAMPER": 11
        },
        "OE": {
          "OE.DEBIT_BEFORE_CREDIT": 3,
          "OE.PHYSICAL": 3,
          "OE.PROTECTION_AFTER_TOE_DELIVERY": 3,
          "OE.PURSE_BEHAVIOR": 3,
          "OE.SECRET_MNGT": 3
        },
        "OP": {
          "OP.ARRAY_ACCESS": 2,
          "OP.CREATE": 4,
          "OP.INSTANCE_FIELD": 1,
          "OP.INVK_INTERFACE": 4,
          "OP.INVK_VIRTUAL": 2,
          "OP.JAVA": 3,
          "OP.PUT": 3,
          "OP.THROW": 2,
          "OP.TYPE_ACCESS": 2
        },
        "OSP": {
          "OSP.DEBIT_BEFORE_CREDIT": 3,
          "OSP.PURSE_BEHAVIOR": 4,
          "OSP.SECRET_MNGT": 4
        },
        "R": {
          "R.JAVA": 5
        },
        "T": {
          "T.COUNTERFEITING": 2,
          "T.COUNTERFEITING_AUTH": 2,
          "T.COUNTERFEITING_AUTOLOAD": 6,
          "T.COUNTERFEITING_CREDIT": 2,
          "T.COUNTERFEITING_DEBIT": 6,
          "T.COUNTERFEITING_UPDATE": 4,
          "T.DISCLOSURE_KEYS": 9,
          "T.INTEG": 3,
          "T.INTEG_": 1,
          "T.INTEG_CODE": 5,
          "T.INTEG_COUNTERS": 5,
          "T.INTEG_EM": 5,
          "T.INTEG_EP_IVDATA": 2,
          "T.INTEG_EP_STATE": 5,
          "T.INTEG_IVDATA": 2,
          "T.INTEG_KEYS": 4,
          "T.INTEG_LOG_DATA": 4,
          "T.REPLAY": 2,
          "T.REPLAY_AUTOLOAD": 4,
          "T.REPLAY_CREDIT": 3,
          "T.REPLAY_DEBIT": 4,
          "T.REPLAY_UPDATE": 3,
          "T.RND": 1
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP-0035": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 8,
          "ADV_COMP.1": 2,
          "ADV_FSP.1": 5,
          "ADV_FSP.2": 4,
          "ADV_FSP.4": 11,
          "ADV_IMP": 1,
          "ADV_IMP.1": 5,
          "ADV_TDS.1": 3,
          "ADV_TDS.2": 1,
          "ADV_TDS.3": 11
        },
        "AGD": {
          "AGD_OPE.1": 8,
          "AGD_PRE.1": 6
        },
        "ALC": {
          "ALC_CMC.4": 2,
          "ALC_CMS.1": 2,
          "ALC_CMS.4": 1,
          "ALC_DEL.1": 2,
          "ALC_DVS.1": 1,
          "ALC_DVS.2": 7,
          "ALC_LCD.1": 5,
          "ALC_TAT.1": 5
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 4,
          "ASE_INT.1": 5,
          "ASE_OBJ.2": 3,
          "ASE_REQ.1": 2,
          "ASE_REQ.2": 2,
          "ASE_SPD.1": 2,
          "ASE_TSS.1": 1,
          "ASE_TSS.2": 1
        },
        "ATE": {
          "ATE_COV.1": 4,
          "ATE_COV.2": 4,
          "ATE_DPT.1": 2,
          "ATE_FUN.1": 8,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 6
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 4,
          "EAL4 augmented": 3,
          "EAL4+": 2,
          "EAL5": 1,
          "EAL5 augmented": 1,
          "EAL5+": 2
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 10,
          "FAU_ARP.1.1": 2,
          "FAU_GEN": 1,
          "FAU_GEN.1": 10,
          "FAU_GEN.1.1": 2,
          "FAU_GEN.1.2": 2,
          "FAU_SAA": 1,
          "FAU_SAA.1": 13,
          "FAU_SAA.1.1": 3,
          "FAU_SAA.1.2": 1,
          "FAU_SAR": 1,
          "FAU_SAR.1": 3,
          "FAU_SAR.1.1": 2,
          "FAU_SAR.1.2": 2,
          "FAU_SAS.1": 1,
          "FAU_STG": 1,
          "FAU_STG.1": 10,
          "FAU_STG.1.1": 2,
          "FAU_STG.1.2": 2
        },
        "FCO": {
          "FCO_NRO": 6,
          "FCO_NRO.1": 3,
          "FCO_NRO.2": 2,
          "FCO_NRO.2.2": 3,
          "FCO_NRO.2.3": 3
        },
        "FCS": {
          "FCS_CKM": 11,
          "FCS_CKM.1": 11,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 5,
          "FCS_CKM.2.1": 1,
          "FCS_CKM.3": 5,
          "FCS_CKM.3.1": 2,
          "FCS_CKM.4": 18,
          "FCS_CKM.4.1": 2,
          "FCS_COP": 11,
          "FCS_COP.1": 17,
          "FCS_COP.1.1": 2
        },
        "FDP": {
          "FDP_ACC": 31,
          "FDP_ACC.1": 27,
          "FDP_ACC.1.1": 1,
          "FDP_ACC.2": 9,
          "FDP_ACC.2.2": 1,
          "FDP_ACF": 11,
          "FDP_ACF.1": 33,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 1,
          "FDP_IFC": 12,
          "FDP_IFC.1": 20,
          "FDP_IFC.1.1": 1,
          "FDP_IFC.2": 3,
          "FDP_IFCC": 1,
          "FDP_IFF": 5,
          "FDP_IFF.1": 14,
          "FDP_IFF.1.1": 1,
          "FDP_IFF.1.2": 1,
          "FDP_IFF.1.3": 1,
          "FDP_IFF.1.4": 1,
          "FDP_IFF.1.5": 1,
          "FDP_ITC": 6,
          "FDP_ITC.1": 8,
          "FDP_ITC.1.1": 1,
          "FDP_ITC.1.2": 1,
          "FDP_ITC.1.3": 1,
          "FDP_ITC.2": 4,
          "FDP_ITT.1": 1,
          "FDP_RIP": 10,
          "FDP_RIP.1": 3,
          "FDP_RIP.1.1": 1,
          "FDP_ROL": 8,
          "FDP_ROL.1": 4,
          "FDP_ROL.1.1": 1,
          "FDP_ROL.1.2": 1,
          "FDP_SDI.1": 2,
          "FDP_SDI.2": 5,
          "FDP_SDI.2.2": 2,
          "FDP_UCT": 1,
          "FDP_UCT.1": 5,
          "FDP_UCT.1.1": 2,
          "FDP_UIT.1": 8,
          "FDP_UIT.1.1": 2,
          "FDP_UIT.1.2": 2,
          "FDP_UTC.1": 1
        },
        "FIA": {
          "FIA_ATD": 5,
          "FIA_ATD.1": 4,
          "FIA_ATD.1.1": 1,
          "FIA_SOS": 1,
          "FIA_SOS.2": 6,
          "FIA_SOS.2.1": 2,
          "FIA_SOS.2.2": 2,
          "FIA_UAU": 23,
          "FIA_UAU.1": 4,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.3": 2,
          "FIA_UAU.3.1": 2,
          "FIA_UAU.3.2": 2,
          "FIA_UAU.4": 2,
          "FIA_UAU.4.1": 1,
          "FIA_UAU.6": 2,
          "FIA_UAU.6.1": 1,
          "FIA_UID": 4,
          "FIA_UID.1": 21,
          "FIA_UID.2": 1,
          "FIA_USB": 4,
          "FIA_USB.1": 4,
          "FIA_USB.1.1": 1,
          "FIA_USB.1.2": 1,
          "FIA_USB.1.3": 1
        },
        "FMT": {
          "FMT_LIM.1": 2,
          "FMT_LIM.2": 2,
          "FMT_MOF.1": 5,
          "FMT_MSA": 38,
          "FMT_MSA.1": 13,
          "FMT_MSA.1.1": 2,
          "FMT_MSA.2": 1,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 17,
          "FMT_MSA.3.1": 2,
          "FMT_MSA.3.2": 2,
          "FMT_MTD": 1,
          "FMT_MTD.1": 5,
          "FMT_MTD.1.1": 2,
          "FMT_SMF": 4,
          "FMT_SMF.1": 14,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 1,
          "FMT_SMR.1": 27,
          "FMT_SMR.1.1": 2,
          "FMT_SMR.1.2": 2
        },
        "FPR": {
          "FPR_UNO": 1,
          "FPR_UNO.1": 8,
          "FPR_UNO.1.1": 2
        },
        "FPT": {
          "FPT_FLS": 1,
          "FPT_FLS.1": 9,
          "FPT_FLS.1.1": 2,
          "FPT_ITC": 1,
          "FPT_ITC.1": 4,
          "FPT_ITC.1.1": 2,
          "FPT_ITI": 1,
          "FPT_ITI.1": 8,
          "FPT_ITI.1.1": 2,
          "FPT_ITI.1.2": 2,
          "FPT_ITT.1": 1,
          "FPT_PHP": 2,
          "FPT_PHP.1": 2,
          "FPT_PHP.2": 4,
          "FPT_PHP.2.2": 2,
          "FPT_PHP.2.3": 2,
          "FPT_PHP.3": 11,
          "FPT_PHP.3.1": 2,
          "FPT_RCV.4": 7,
          "FPT_RCV.4.1": 2,
          "FPT_RPL": 1,
          "FPT_RPL.1": 5,
          "FPT_RPL.1.1": 2,
          "FPT_RPL.1.2": 2,
          "FPT_STM.1": 5,
          "FPT_TDC": 3,
          "FPT_TDC.1": 3,
          "FPT_TDC.1.1": 1,
          "FPT_TDC.1.2": 1,
          "FPT_TST": 1,
          "FPT_TST.1": 7,
          "FPT_TST.1.1": 2,
          "FPT_TST.1.2": 2,
          "FPT_TST.1.3": 2
        },
        "FRU": {
          "FRU_FLT.2": 2
        },
        "FTP": {
          "FTP_ITC.1": 9,
          "FTP_TRP.1": 9
        }
      },
      "certification_process": {
        "OutOfScope": {
          "Crypto libs) written in native language, \u2022 The IC NXP P5CD081 The elements out of scope of the TOE are: \u2022 Other application(s": 1,
          "libraries itself) (Crypto libs) written in native language, \u2022 The IC NXP P5CD081 The elements out of scope of the TOE are: \u2022 Other application(s) written in java language 2.3.2 Logical scope of the TOE The": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "MAC": {
          "MAC": 12
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {
        "misc": {
          "TYPE_ACCESS": 2
        }
      },
      "javacard_packages": {
        "javacard": {
          "javacard.security": 1
        }
      },
      "javacard_version": {
        "JavaCard": {
          "Java Card 2.2": 1
        }
      },
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 2,
          "RNG": 6
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 4,
          "Physical tampering": 1,
          "malfunction": 3,
          "physical tampering": 13
        },
        "SCA": {
          "Leak-Inherent": 5,
          "Physical Probing": 2,
          "physical probing": 4
        },
        "other": {
          "JIL": 1
        }
      },
      "standard_id": {
        "CC": {
          "CCMB-2009-07-001": 1,
          "CCMB-2009-07-002": 1,
          "CCMB-2009-07-003": 1,
          "CCMB-2009-07-004": 1
        },
        "FIPS": {
          "FIPS PUB 197": 2,
          "FIPS PUB 46-3": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 34
          }
        },
        "DES": {
          "3DES": {
            "TDEA": 1,
            "Triple-DES": 3
          },
          "DES": {
            "DES": 6
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Gemalto": {
          "Gemalto": 19
        },
        "NXP": {
          "NXP": 18,
          "NXP Semiconductors": 2
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/CreationDate": "D:20110629163023+02\u002700\u0027",
      "/Keywords": "",
      "/ModDate": "D:20110629163023+02\u002700\u0027",
      "/Producer": "Acrobat Distiller 7.0.5 (Windows)",
      "pdf_file_size_bytes": 510681,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 103
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC_2011-05en.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4+",
      "ALC_DVS.2",
      "AVA_VAN.5"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC-cible_2011-05en.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "845e97937d2dd8ce1bd4fb59cbd027b2bdd9713aa8fc17020413121cdcb4542b",
      "txt_hash": "46c26b3b9532a7f824da91ca18227d80bccb714ab392e60e255dd9f073d1e5c7"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "47624c9fc0a22d46f4cf8b95abf7fa5db9d078fd1f7d4dfb94dde08a9dc00568",
      "txt_hash": "5987549e517401f6d9a3fd0dbf768a74c1859513af818db35902e897e510e8a4"
    }
  },
  "status": "archived"
}