Secure Microcontroller CXD9916H3 / MB94RS403 & HAL Library for contactless smart-card FeliCa

CSV information ?

Status archived
Valid from 26.05.2008
Valid until 01.09.2019
Scheme 🇫🇷 FR
Manufacturer Fujitsu Limited
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level ADV_IMP.2, EAL4+, ALC_DVS.2, AVA_VLA.4, AVA_MSU.3

Heuristics summary ?

Certificate ID: ANSSI-CC-2008/15

Certificate ?

Certification report ?

Extracted keywords

Symmetric Algorithms
DES
Engines
TORNADO
Block cipher modes
ECB, CBC

Vendor
Thales

Security level
EAL 4, EAL4, EAL7, EAL 1, EAL 3, EAL 5, EAL 7, EAL5+, EAL 4 augmented, ITSEC E6 and
Security Assurance Requirements (SAR)
ACM_AUT, ACM_CAP, ACM_SCP, ADO_DEL, ADO_IGS, ADV_IMP.2, ADV_FSP, ADV_HLD, ADV_IMP, ADV_INT, ADV_LLD, ADV_RCR, ADV_SPM, AGD_ADM, AGD_USR, ALC_DVS.2, ALC_FLR, ALC_DVS, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_MSU.3, AVA_VLA.4, AVA_CCA, AVA_MSU, AVA_SOF, AVA_VLA
Protection profiles
BSI-PP-0002-2001
Certificates
DCSSI-2008/15

Side-channel analysis
physical probing, side-channel

Standards
FIPS46-3, AIS 34, AIS 20, AIS34, ISO/IEC18092, ISO/IEC 15408:2005, ISO/IEC 18045:2005, CCMB-2005-08-001, CCMB-2005-08-002, CCMB-2005-08-003, CCMB-2005-08-004

File metadata

Title: DCSSI-2008/15
Subject: IC Platform of FeliCa Contactless Smartcard CXD9916H3 / MB94RS403 & HAL Library
Keywords: CER/F/07.5
Author: Mathieu Robert
Creation date: D:20080530155803+02'00'
Modification date: D:20080530155806+03'00'
Pages: 17
Creator: Acrobat PDFMaker 5.0 pour Word
Producer: Acrobat Distiller 5.0 (Windows)

Frontpage

Certificate ID: DCSSI-2008/15
Certified item: IC Platform of FeliCa Contactless Smartcard CXD9916H3 / MB94RS403 & HAL Library
Certification lab: CEACI (Thales Security Systems – CNES) 18 avenue Edouard Belin, 31401 Toulouse Cedex 9, France Phone: +33 (0)5 61 28 16 51, email : ceaci@cnes.fr
Developer: Fujitsu Microelectronics Limited 1-1, Kamikodanaka 4-chome, Nakahara-ku, Kawasaki, 211-8588, Japan Sponsor Fujitsu Microelectronics Limited 1-1, Kamikodanaka 4-chome, Nakahara-ku, Kawasaki, 211-8588, Japan

References

Incoming

Security target ?

Extracted keywords

Symmetric Algorithms
DES, 3DES
Randomness
RND, RNG
Block cipher modes
ECB, CBC

Vendor
Infineon Technologies, Thales, Philips

Security level
EAL4, EAL4 augmented
Claims
O.RND, T.RND
Security Assurance Requirements (SAR)
ACM_AUT.1, ACM_CAP.4, ACM_SCP.2, ACM_SCP, ACM_CAP, ACM_AUT, ADO_DEL.2, ADO_IGS.1, ADO_DEL, ADO_IGS, ADV_IMP.2, ADV_SPM.1, ADV_FSP.2, ADV_HLD.2, ADV_LLD.1, ADV_RCR.1, ADV_FSP, ADV_IMP.1, ADV_FSP.1, AGD_ADM.1, AGD_USR.1, AGD_USR, AGD_ADM, ALC_DVS.2, ALC_LCD.1, ALC_TAT.1, ALC_DVS, ALC_LCD, ALC_TAT, ALC_DVS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, ATE_COV, ATE_FUN, AVA_MSU.3, AVA_VLA.4, AVA_VLA, AVA_SOF.1, AVA_SOF, AVA_MSU.2
Security Functional Requirements (SFR)
FAU_SAS.1, FAU_GEN.1, FAU_SAS.1.1, FAU_SAS, FAU_GEN, FCS_RND.1, FCS_COP.1, FCS_RND, FCS_RND.1.1, FCS_COP.1.1, FCS_CKM.1, FCS_CKM.4, FCS_CKM.1.1, FCS_CKM.2, FCS_CKM.4.1, FDP_ITT.1, FDP_IFC.1, FDP_ACC.1, FDP_ACF.1, FDP_SDI.2, FDP_ITT.1.1, FDP_IFC.1.1, FDP_IFF.1, FDP_ITC.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_SDI.1, FIA_UID.1, FMT_LIM.1, FMT_LIM.2, FMT_MSA.3, FMT_MSA.1, FMT_SMR.1, FMT_SMF.1, FMT_LIM.1.1, FMT_LIM.2.1, FMT_MSA.2, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1.1, FMT_MSA.2.1, FPT_FLS.1, FPT_SEP.1, FPT_PHP.3, FPT_ITT.1, FPT_ITT.3, FPT_FLS.1.1, FPT_SEP.1.1, FPT_SEP.1.2, FPT_PHP.3.1, FPT_ITT.1.1, FPT_ITT.3.1, FPT_ITT.3.2, FRU_FLT.2, FRU_FLT.1
Protection profiles
BSI-PP-0002, BSI-PP-002, BSI-PP- 0002

Side-channel analysis
Leak-Inherent, Physical Probing, physical probing, Physical probing, side channel, side-channel, SPA, DPA, timing attacks, physical tampering, malfunction, Malfunction, DFA, reverse engineering

Standards
FIPS PUB 46-3, FIPS46-3, FIPS PUB 81, AIS20, AIS31, ISO/IEC18092, ISO/IEC 18092

File metadata

Title: FUJITSU
Author: takasaki
Creation date: D:20080527191019+09'00'
Modification date: D:20080527191030+09'00'
Pages: 101
Creator: Word 用 Acrobat PDFMaker 7.0
Producer: Acrobat Distiller 7.0 (Windows)

References

Incoming

Heuristics ?

Certificate ID: ANSSI-CC-2008/15

Extracted SARs

ATE_DPT.1, ADV_HLD.2, AGD_USR.1, ADV_RCR.1, AVA_MSU.3, ADV_FSP.2, ADV_IMP.2, AVA_VLA.4, ALC_LCD.1, ATE_IND.2, ADV_SPM.1, ALC_DVS.2, ALC_TAT.1, ADV_LLD.1, AVA_SOF.1, ATE_FUN.1, AGD_ADM.1, ATE_COV.2

Scheme data ?

Product Microcontrôleur CXD9916H3 / MB94RS403 & HAL Library pour carte sans-contact FeliCa
Url https://cyber.gouv.fr/produits-certifies/microcontroleur-cxd9916h3-mb94rs403-hal-library-pour-carte-sans-contact-felica
Description Le produit évalué est le microcontrôleur CXD9916H3 / MB94RS403 avec sa librairie logicielle HAL, développé par Fujitsu Microelectronics Limited. Un microcontrôleur seul n'est pas un produit utilisable en tant que tel. Il est destiné à héberger une ou plusieurs applications. Il peut être inséré dans un support plastique pour constituer une carte à puce. Les usages possibles de cette carte so
Sponsor Fujitsu Microelectronics Limited
Developer Fujitsu Microelectronics Limited
Cert Id 2008/15
Level EAL4+
Enhanced
Cert Id 2008/15
Certification Date 26/05/2008
Category Micro-circuits
Cc Version Critères Communs version 2.3
Developer Fujitsu Microelectronics Limited
Sponsor Fujitsu Microelectronics Limited
Evaluation Facility CEACI
Level EAL4+
Protection Profile BSI-PP-0002-2001
Mutual Recognition SOG-IS CCRA
Augmented ADV_IMP.2, ALC_DVS.2, AVA_MSU.3, AVA_VLA.4
Target Link https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi-cible_2008-15en.pdf
Report Link https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi_2008-15en.pdf

References ?

Updates ?

  • 15.02.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'fb3319311743b77937f98ddaad91fafdccdec23852c1a7a446e2b2f012f8faa9', 'txt_hash': '0c8081b4704cdd0ac9988ea24a8d861710901cb1aece6dc57af02dfcf96cfcb3'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'c5a32f68ddea15c30556c80d43e996d570a005e9551626bebfac7a401f7a0269', 'txt_hash': '2448bfc8e6cd9b53f03cf7e7522e3c2760b8a51682ddb0a4c22948cabcf9e116'}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}}.
    • The following properties were deleted: ['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash'].

    The PDF extraction data was updated.

    • The following values were inserted: {'cert_metadata': None, 'cert_frontpage': None, 'cert_keywords': None, 'cert_filename': None}.
    • The report_frontpage property was set to {'FR': {'match_rules': ['Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developer (.+)Evaluation facility(.+)Recognition arrangements'], 'cert_id': 'DCSSI-2008/15', 'cert_item': 'IC Platform of FeliCa Contactless Smartcard CXD9916H3 / MB94RS403 & HAL Library', 'cert_item_version': 'IC platform reference: CXD9916H3/MB94RS403 Version FR01 0001 Software library reference: HAL Library Version 01', 'ref_protection_profiles': 'BSI-PP-0002-2001 Smart card IC Platform Protection Profile Version 1.0 July 2001', 'cc_version': 'Common Criteria version 2.3 compliant with ISO 15408:2005', 'cc_security_level': 'EAL 4 augmented ADV_IMP.2, ALC_DVS.2, AVA_MSU.3, AVA_VLA.4', 'developer': 'Fujitsu Microelectronics Limited 1-1, Kamikodanaka 4-chome, Nakahara-ku, Kawasaki, 211-8588, Japan Sponsor Fujitsu Microelectronics Limited 1-1, Kamikodanaka 4-chome, Nakahara-ku, Kawasaki, 211-8588, Japan', 'cert_lab': 'CEACI (Thales Security Systems – CNES) 18 avenue Edouard Belin, 31401 Toulouse Cedex 9, France Phone: +33 (0)5 61 28 16 51, email : ceaci@cnes.fr'}}.
    • The st_frontpage property was set to None.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__delete__': ['CA']}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {}} data.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__insert__': {'CA': {'2-2-1': 1, '1 1 2': 5, '1 2 3': 5, '4 5 5': 1, '2 3 2': 1, '1 1 1': 12, '3 3 4': 1, '1 2 2': 6, '4 5 2': 1, '2 2 3': 2, '1 3 3': 1, '3 3 2': 1, '2 2 1': 1, '4 4 4': 1}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'CA': {'1 2 3': 1, '5 6 7': 1}}} data.
  • 05.02.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'Microcontrôleur CXD9916H3 / MB94RS403 & HAL Library pour carte sans-contact FeliCa', 'url': 'https://cyber.gouv.fr/produits-certifies/microcontroleur-cxd9916h3-mb94rs403-hal-library-pour-carte-sans-contact-felica', 'description': 'Le produit évalué est le microcontrôleur CXD9916H3 / MB94RS403 avec sa librairie logicielle HAL, développé par Fujitsu Microelectronics Limited.\n\nUn microcontrôleur seul n'est pas un produit utilisable en tant que tel. Il est destiné à héberger une ou plusieurs applications. Il peut être inséré dans un support plastique pour constituer une carte à puce. Les usages possibles de cette carte so', 'sponsor': 'Fujitsu Microelectronics Limited', 'developer': 'Fujitsu Microelectronics Limited', 'cert_id': '2008/15', 'level': 'EAL4+', 'enhanced': {'cert_id': '2008/15', 'certification_date': '26/05/2008', 'category': 'Micro-circuits', 'cc_version': 'Critères Communs version 2.3', 'developer': 'Fujitsu Microelectronics Limited', 'sponsor': 'Fujitsu Microelectronics Limited', 'evaluation_facility': 'CEACI', 'level': 'EAL4+', 'protection_profile': 'BSI-PP-0002-2001', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ADV_IMP.2, ALC_DVS.2, AVA_MSU.3, AVA_VLA.4', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi-cible_2008-15en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi_2008-15en.pdf'}}.
  • 04.01.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'annotated_references': None}.
  • 26.04.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'scheme_data': None}.
  • 11.02.2023 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.cc.CCCertificate.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.InternalState.
    • The following properties were deleted: ['errors'].

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.PdfData.

    The computed heuristics were updated.

    • The following values were inserted: {'direct_transitive_cves': None, 'indirect_transitive_cves': None}.
    • The _type property was set to sec_certs.sample.cc.CCCertificate.Heuristics.
    • The following properties were deleted: ['direct_dependency_cves', 'indirect_dependency_cves'].
  • 05.02.2023 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to [].
  • 26.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/dcssi-2008_15en.pdf, code: nok'].
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to [].
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report_download_ok property was set to True.
    • The report_convert_ok property was set to True.
    • The report_extract_ok property was set to True.
    • The errors property was updated.
    • The report_pdf_hash property was set to fb3319311743b77937f98ddaad91fafdccdec23852c1a7a446e2b2f012f8faa9.
    • The report_txt_hash property was set to 0c8081b4704cdd0ac9988ea24a8d861710901cb1aece6dc57af02dfcf96cfcb3.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 265718, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 17, '/Author': 'Mathieu Robert', '/CreationDate': "D:20080530155803+02'00'", '/Creator': 'Acrobat PDFMaker 5.0 pour Word', '/Keywords': 'CER/F/07.5', '/ModDate': "D:20080530155806+03'00'", '/Producer': 'Acrobat Distiller 5.0 (Windows)', '/Subject': 'IC Platform of FeliCa Contactless Smartcard CXD9916H3 / MB94RS403 & HAL Library', '/Title': 'DCSSI-2008/15', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {'anssi': {'match_rules': ['Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developer (.+)Evaluation facility(.+)Recognition arrangements'], 'cert_id': 'DCSSI-2008/15', 'cert_item': 'IC Platform of FeliCa Contactless Smartcard CXD9916H3 / MB94RS403 & HAL Library', 'cert_item_version': 'IC platform reference: CXD9916H3/MB94RS403 Version FR01 0001 Software library reference: HAL Library Version 01', 'ref_protection_profiles': 'BSI-PP-0002-2001 Smart card IC Platform Protection Profile Version 1.0 July 2001', 'cc_version': 'Common Criteria version 2.3 compliant with ISO 15408:2005', 'cc_security_level': 'EAL 4 augmented ADV_IMP.2, ALC_DVS.2, AVA_MSU.3, AVA_VLA.4', 'developer': 'Fujitsu Microelectronics Limited 1-1, Kamikodanaka 4-chome, Nakahara-ku, Kawasaki, 211-8588, Japan Sponsor Fujitsu Microelectronics Limited 1-1, Kamikodanaka 4-chome, Nakahara-ku, Kawasaki, 211-8588, Japan', 'cert_lab': 'CEACI (Thales Security Systems – CNES) 18 avenue Edouard Belin, 31401 Toulouse Cedex 9, France Phone: +33 (0)5 61 28 16 51, email : ceaci@cnes.fr'}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The report_keywords property was set to {'cc_cert_id': {'FR': {'DCSSI-2008/15': 18}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0002-2001': 2}}, 'cc_security_level': {'EAL': {'EAL 4': 2, 'EAL4': 3, 'EAL7': 1, 'EAL 1': 1, 'EAL 3': 1, 'EAL 5': 1, 'EAL 7': 1, 'EAL5+': 1, 'EAL 4 augmented': 2}, 'ITSEC': {'ITSEC E6 and': 1}}, 'cc_sar': {'ACM': {'ACM_AUT': 1, 'ACM_CAP': 1, 'ACM_SCP': 1}, 'ADO': {'ADO_DEL': 1, 'ADO_IGS': 1}, 'ADV': {'ADV_IMP.2': 1, 'ADV_FSP': 1, 'ADV_HLD': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_LLD': 1, 'ADV_RCR': 1, 'ADV_SPM': 1}, 'AGD': {'AGD_ADM': 1, 'AGD_USR': 1}, 'ALC': {'ALC_DVS.2': 1, 'ALC_FLR': 2, 'ALC_DVS': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_MSU.3': 1, 'AVA_VLA.4': 1, 'AVA_CCA': 1, 'AVA_MSU': 1, 'AVA_SOF': 1, 'AVA_VLA': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Thales': {'Thales': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'DES': {'DES': {'DES': 2}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {'ECB': {'ECB': 1}, 'CBC': {'CBC': 1}}, 'ecc_curve': {}, 'crypto_engine': {'TORNADO': {'TORNADO': 2}}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 1, 'side-channel': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS46-3': 1}, 'BSI': {'AIS 34': 2, 'AIS 20': 4, 'AIS34': 1}, 'ISO': {'ISO/IEC18092': 2, 'ISO/IEC 15408:2005': 1, 'ISO/IEC 18045:2005': 1}, 'CC': {'CCMB-2005-08-001': 1, 'CCMB-2005-08-002': 1, 'CCMB-2005-08-003': 1, 'CCMB-2005-08-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to dcssi-2008_15en.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to ['CEACI'].
    • The cert_id property was set to ANSSI-CC-2008/15.
    • The report_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2008/18']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2008/18']}} data.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report_download_ok property was set to False.
    • The report_convert_ok property was set to False.
    • The report_extract_ok property was set to False.
    • The errors property was updated, with the [[0, 'failed to download report from https://www.commoncriteriaportal.org/files/epfiles/dcssi-2008_15en.pdf, code: nok']] values inserted.
    • The report_pdf_hash property was set to None.
    • The report_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The report_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to None.
    • The report_references property was updated, with the {'directly_referenced_by': None, 'indirectly_referenced_by': None} data.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/dcssi-2008_15en.pdf, code: nok'].
  • 22.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to [].
  • 21.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/dcssi-2008_15en.pdf, code: nok'].
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': 'dcssi-2008_15en.pdf', 'st_filename': 'dcssi-cible2008_15en.pdf'}.
    • The report_keywords property was updated, with the {'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL 4': 2, 'EAL 4 augmented': 2}, '__delete__': ['EAL 2', 'EAL 6', 'EAL 4+']}}}, 'cc_sar': {'__update__': {'ALC': {'__delete__': ['ALC_LCD']}}}, 'cc_claims': {}, 'symmetric_crypto': {'__update__': {'DES': {'__update__': {'DES': {'__update__': {'DES': 2}}}}}}, 'randomness': {}, 'standard_id': {'__update__': {'ISO': {'__insert__': {'ISO/IEC 15408:2005': 1, 'ISO/IEC 18045:2005': 1}, '__delete__': ['ISO/IEC 18092']}, 'CC': {'__insert__': {'CCMB-2005-08-003': 1, 'CCMB-2005-08-004': 1}}}}} data.
    • The st_keywords property was updated, with the {'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL4': 15, 'EAL4 augmented': 2}}}}, 'cc_sar': {'__update__': {'ACM': {'__update__': {'ACM_CAP.4': 19, 'ACM_SCP.2': 5, 'ACM_SCP': 7, 'ACM_CAP': 7}}, 'ADO': {'__update__': {'ADO_DEL.2': 9, 'ADO_IGS.1': 7, 'ADO_DEL': 6, 'ADO_IGS': 9}}, 'ADV': {'__update__': {'ADV_FSP.2': 10, 'ADV_FSP': 4}}, 'AGD': {'__update__': {'AGD_ADM.1': 14, 'AGD_USR.1': 12, 'AGD_USR': 7, 'AGD_ADM': 8}}, 'ALC': {'__update__': {'ALC_DVS.2': 14, 'ALC_DVS': 9}}, 'ATE': {'__insert__': {'ATE_FUN': 1}, '__update__': {'ATE_COV.2': 6, 'ATE_DPT.1': 1, 'ATE_COV': 5}}, 'AVA': {'__update__': {'AVA_VLA.4': 8}}}}, 'cc_sfr': {'__update__': {'FAU': {'__update__': {'FAU_SAS.1': 15}}, 'FCS': {'__update__': {'FCS_RND.1': 16, 'FCS_COP.1': 18}}, 'FDP': {'__update__': {'FDP_IFC.1': 33, 'FDP_ACC.1': 16, 'FDP_ACF.1': 10, 'FDP_SDI.2': 13, 'FDP_IFF.1': 3}}, 'FMT': {'__update__': {'FMT_LIM.1': 23, 'FMT_LIM.2': 28, 'FMT_MSA.1': 12, 'FMT_SMR.1': 15, 'FMT_SMF.1': 13}}, 'FPT': {'__update__': {'FPT_FLS.1': 28, 'FPT_SEP.1': 8, 'FPT_PHP.3': 29, 'FPT_ITT.1': 41}}, 'FRU': {'__delete__': ['FRU_FLT.2.1']}}}, 'cc_claims': {'__delete__': ['OE']}, 'symmetric_crypto': {'__update__': {'DES': {'__update__': {'DES': {'__update__': {'DES': 21}}}}}}, 'crypto_scheme': {}, 'randomness': {'__update__': {'RNG': {'__update__': {'RNG': 4, 'RND': 10}}}}, 'ecc_curve': {}, 'side_channel_analysis': {'__update__': {'SCA': {'__update__': {'Physical Probing': 4, 'physical probing': 7}, '__delete__': ['Timing Attack']}, 'FI': {'__update__': {'Malfunction': 21, 'DFA': 1}}}}, 'tee_name': {}} data.

    The computed heuristics were updated.

    • The cert_id property was set to ANSSI-CC-2008/15.
    • The report_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2008/18']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2008/18']}} data.
  • 28.07.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_extract_ok property was set to True.
    • The errors property was set to [].

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 461500, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 101, '/CreationDate': "D:20080527191019+09'00'", '/Author': 'takasaki', '/Creator': 'Word 用 Acrobat PDFMaker 7.0', '/Producer': 'Acrobat Distiller 7.0 (Windows)', '/ModDate': "D:20080527191030+09'00'", '/Company': '富士通株式会社\u3000LSI事本)FRAM事業部', '/Title': 'FUJITSU', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}]}.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_extract_ok property was set to False.
    • The errors property was set to ['Failed to read metadata of certs/targets/pdf/a3e8209a528a4037.pdf, error: can only concatenate list (not "IndirectObject") to list', 'Failed to read metadata of certs/targets/pdf/a3e8209a528a4037.pdf, error: can only concatenate list (not "IndirectObject") to list'].

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': []}} values inserted.
    • The st_metadata property was set to None.
    • The report_keywords property was set to {'cc_cert_id': {'FR': {'DCSSI-2008/15': 18}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0002-2001': 2}}, 'cc_security_level': {'EAL': {'EAL 4': 3, 'EAL4': 3, 'EAL7': 1, 'EAL 1': 1, 'EAL 2': 1, 'EAL 3': 1, 'EAL 5': 1, 'EAL 6': 1, 'EAL 7': 1, 'EAL 4+': 1, 'EAL5+': 1, 'EAL 4 augmented': 1}, 'ITSEC': {'ITSEC E6 and': 1}}, 'cc_sar': {'ACM': {'ACM_AUT': 1, 'ACM_CAP': 1, 'ACM_SCP': 1}, 'ADO': {'ADO_DEL': 1, 'ADO_IGS': 1}, 'ADV': {'ADV_IMP.2': 1, 'ADV_FSP': 1, 'ADV_HLD': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_LLD': 1, 'ADV_RCR': 1, 'ADV_SPM': 1}, 'AGD': {'AGD_ADM': 1, 'AGD_USR': 1}, 'ALC': {'ALC_DVS.2': 1, 'ALC_FLR': 2, 'ALC_DVS': 1, 'ALC_LCD': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_MSU.3': 1, 'AVA_VLA.4': 1, 'AVA_CCA': 1, 'AVA_MSU': 1, 'AVA_SOF': 1, 'AVA_VLA': 1}}, 'cc_sfr': {}, 'cc_claims': {'T': {'T': 3}}, 'vendor': {'Thales': {'Thales': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'DES': {'DES': {'DES': 4}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 3}}, 'cipher_mode': {'ECB': {'ECB': 1}, 'CBC': {'CBC': 1}}, 'ecc_curve': {}, 'crypto_engine': {'TORNADO': {'TORNADO': 2}}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 1, 'side-channel': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS46-3': 1}, 'BSI': {'AIS 34': 2, 'AIS 20': 4, 'AIS34': 1}, 'ISO': {'ISO/IEC18092': 2, 'ISO/IEC 18092': 2}, 'CC': {'CCMB-2005-08-001': 1, 'CCMB-2005-08-002': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0002': 53, 'BSI-PP-002': 1, 'BSI-PP- 0002': 1}}, 'cc_security_level': {'EAL': {'EAL4': 12, 'EAL4 augmented': 1}}, 'cc_sar': {'ACM': {'ACM_AUT.1': 2, 'ACM_CAP.4': 3, 'ACM_SCP.2': 2, 'ACM_SCP': 6, 'ACM_CAP': 5, 'ACM_AUT': 1}, 'ADO': {'ADO_DEL.2': 3, 'ADO_IGS.1': 3, 'ADO_DEL': 5, 'ADO_IGS': 7}, 'ADV': {'ADV_IMP.2': 7, 'ADV_SPM.1': 5, 'ADV_FSP.2': 2, 'ADV_HLD.2': 3, 'ADV_LLD.1': 4, 'ADV_RCR.1': 3, 'ADV_FSP': 3, 'ADV_IMP.1': 2, 'ADV_FSP.1': 2}, 'AGD': {'AGD_ADM.1': 4, 'AGD_USR.1': 4, 'AGD_USR': 6, 'AGD_ADM': 6}, 'ALC': {'ALC_DVS.2': 8, 'ALC_LCD.1': 2, 'ALC_TAT.1': 3, 'ALC_DVS': 7, 'ALC_LCD': 2, 'ALC_TAT': 1, 'ALC_DVS.1': 1}, 'ATE': {'ATE_COV.2': 2, 'ATE_DPT.1': 2, 'ATE_FUN.1': 2, 'ATE_IND.2': 2, 'ATE_COV': 4}, 'AVA': {'AVA_MSU.3': 7, 'AVA_VLA.4': 9, 'AVA_VLA': 3, 'AVA_SOF.1': 2, 'AVA_SOF': 2, 'AVA_MSU.2': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 13, 'FAU_GEN.1': 2, 'FAU_SAS.1.1': 1, 'FAU_SAS': 2, 'FAU_GEN': 1}, 'FCS': {'FCS_RND.1': 15, 'FCS_COP.1': 16, 'FCS_RND': 2, 'FCS_RND.1.1': 1, 'FCS_COP.1.1': 2, 'FCS_CKM.1': 10, 'FCS_CKM.4': 10, 'FCS_CKM.1.1': 1, 'FCS_CKM.2': 1, 'FCS_CKM.4.1': 1}, 'FDP': {'FDP_ITT.1': 28, 'FDP_IFC.1': 25, 'FDP_ACC.1': 18, 'FDP_ACF.1': 12, 'FDP_SDI.2': 12, 'FDP_ITT.1.1': 1, 'FDP_IFC.1.1': 1, 'FDP_IFF.1': 4, 'FDP_ITC.1': 10, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_ITC.1.1': 1, 'FDP_ITC.1.2': 1, 'FDP_ITC.1.3': 1, 'FDP_SDI.1': 2}, 'FIA': {'FIA_UID.1': 3}, 'FMT': {'FMT_LIM.1': 22, 'FMT_LIM.2': 27, 'FMT_MSA.3': 14, 'FMT_MSA.1': 14, 'FMT_SMR.1': 16, 'FMT_SMF.1': 12, 'FMT_LIM.1.1': 1, 'FMT_LIM.2.1': 1, 'FMT_MSA.2': 11, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MSA.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SMF.1.1': 1, 'FMT_MSA.2.1': 1}, 'FPT': {'FPT_FLS.1': 27, 'FPT_SEP.1': 11, 'FPT_PHP.3': 25, 'FPT_ITT.1': 42, 'FPT_ITT.3': 12, 'FPT_FLS.1.1': 1, 'FPT_SEP.1.1': 1, 'FPT_SEP.1.2': 1, 'FPT_PHP.3.1': 1, 'FPT_ITT.1.1': 2, 'FPT_ITT.3.1': 1, 'FPT_ITT.3.2': 1}, 'FRU': {'FRU_FLT.2': 24, 'FRU_FLT.1': 1, 'FRU_FLT.2.1': 1}}, 'cc_claims': {'O': {'O.RND': 6}, 'T': {'T.RND': 4}, 'OE': {'OE': 1}}, 'vendor': {'Infineon': {'Infineon Technologies': 1}, 'Thales': {'Thales': 1}, 'Philips': {'Philips': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'DES': {'DES': {'DES': 26}, '3DES': {'3DES': 3}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 1}}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 10, 'RND': 12}}, 'cipher_mode': {'ECB': {'ECB': 2}, 'CBC': {'CBC': 2}}, 'ecc_curve': {'NIST': {'P-002': 1}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 19, 'Physical Probing': 7, 'physical probing': 6, 'Physical probing': 2, 'side channel': 2, 'side-channel': 1, 'SPA': 3, 'DPA': 3, 'Timing Attack': 1, 'timing attacks': 1}, 'FI': {'physical tampering': 3, 'malfunction': 15, 'Malfunction': 25, 'DFA': 2}, 'other': {'reverse engineering': 3}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 1}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 46-3': 4, 'FIPS46-3': 1, 'FIPS PUB 81': 1}, 'BSI': {'AIS20': 8, 'AIS31': 2}, 'ISO': {'ISO/IEC18092': 2, 'ISO/IEC 18092': 6}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ACM_SCP', 'level': 2}, {'_type': 'SAR', 'family': 'ADO_DEL', 'level': 2}, {'_type': 'SAR', 'family': 'ADO_IGS', 'level': 1}, {'_type': 'SAR', 'family': 'ACM_AUT', 'level': 1}, {'_type': 'SAR', 'family': 'ACM_CAP', 'level': 4}]} values discarded.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': 'fb3319311743b77937f98ddaad91fafdccdec23852c1a7a446e2b2f012f8faa9', 'st_pdf_hash': 'c5a32f68ddea15c30556c80d43e996d570a005e9551626bebfac7a401f7a0269', 'report_txt_hash': '0c8081b4704cdd0ac9988ea24a8d861710901cb1aece6dc57af02dfcf96cfcb3', 'st_txt_hash': '2448bfc8e6cd9b53f03cf7e7522e3c2760b8a51682ddb0a4c22948cabcf9e116'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {'DES': 4}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {}, 'rules_randomness': {'RNG': 3}, 'rules_tee': {}, 'rules_side_channels': {'physical probing': 1, 'side-channel': 1}} values inserted.
    • The st_keywords property was updated, with the {'rules_ecc_curves': {'P-002': 1}} data.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'SAR', 'family': 'AVA_MSU', 'level': 3}, {'_type': 'SAR', 'family': 'ACM_CAP', 'level': 4}, {'_type': 'SAR', 'family': 'AVA_VLA', 'level': 4}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'SAR', 'family': 'ADO_IGS', 'level': 1}, {'_type': 'SAR', 'family': 'ACM_AUT', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'SAR', 'family': 'ACM_SCP', 'level': 2}, {'_type': 'SAR', 'family': 'ADO_DEL', 'level': 2}, {'_type': 'SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 2}]}}.
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': {'_type': 'Set', 'elements': ['DCSSI-2008/18']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['DCSSI-2008/18']}, 'directly_referencing': None, 'indirectly_referencing': None}}.
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['-']}.
    • The directly_affected_by property was set to {'_type': 'Set', 'elements': ['DCSSI-2008/18']}.
  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Secure Microcontroller CXD9916H3 / MB94RS403 & HAL Library for contactless smart-card FeliCa was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": null,
  "dgst": "a3e8209a528a4037",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2008/15",
    "cert_lab": [
      "CEACI"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VLA",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_SOF",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_HLD",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_USR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_ADM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_RCR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_LLD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_MSU",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2008/18"
        ]
      },
      "directly_referencing": null,
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2008/18"
        ]
      },
      "indirectly_referencing": null
    },
    "scheme_data": {
      "cert_id": "2008/15",
      "description": "Le produit \u00e9valu\u00e9 est le microcontr\u00f4leur CXD9916H3 / MB94RS403 avec sa librairie logicielle HAL, d\u00e9velopp\u00e9 par Fujitsu Microelectronics Limited.\n\nUn microcontr\u00f4leur seul n\u0026#39;est pas un produit utilisable en tant que tel. Il est destin\u00e9 \u00e0 h\u00e9berger une ou plusieurs applications. Il peut \u00eatre ins\u00e9r\u00e9 dans un support plastique pour constituer une carte \u00e0 puce. Les usages possibles de cette carte so",
      "developer": "Fujitsu Microelectronics Limited",
      "enhanced": {
        "augmented": "ADV_IMP.2, ALC_DVS.2, AVA_MSU.3, AVA_VLA.4",
        "category": "Micro-circuits",
        "cc_version": "Crit\u00e8res Communs version 2.3",
        "cert_id": "2008/15",
        "certification_date": "26/05/2008",
        "developer": "Fujitsu Microelectronics Limited",
        "evaluation_facility": "CEACI",
        "level": "EAL4+",
        "mutual_recognition": "SOG-IS\n                          CCRA",
        "protection_profile": "BSI-PP-0002-2001",
        "report_link": "https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi_2008-15en.pdf",
        "sponsor": "Fujitsu Microelectronics Limited",
        "target_link": "https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi-cible_2008-15en.pdf"
      },
      "level": "EAL4+",
      "product": "Microcontr\u00f4leur CXD9916H3 / MB94RS403 \u0026 HAL Library pour carte sans-contact FeliCa",
      "sponsor": "Fujitsu Microelectronics Limited",
      "url": "https://cyber.gouv.fr/produits-certifies/microcontroleur-cxd9916h3-mb94rs403-hal-library-pour-carte-sans-contact-felica"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Fujitsu Limited",
  "manufacturer_web": "https://www.fujitsu.com/",
  "name": "Secure Microcontroller CXD9916H3 / MB94RS403 \u0026 HAL Library for contactless smart-card FeliCa",
  "not_valid_after": "2019-09-01",
  "not_valid_before": "2008-05-26",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "dcssi-2008_15en.pdf",
    "report_frontpage": {
      "FR": {
        "cc_security_level": "EAL 4 augmented ADV_IMP.2, ALC_DVS.2, AVA_MSU.3, AVA_VLA.4",
        "cc_version": "Common Criteria version 2.3 compliant with ISO 15408:2005",
        "cert_id": "DCSSI-2008/15",
        "cert_item": "IC Platform of FeliCa Contactless Smartcard CXD9916H3 / MB94RS403 \u0026 HAL Library",
        "cert_item_version": "IC platform reference: CXD9916H3/MB94RS403 Version FR01 0001 Software library reference: HAL Library Version 01",
        "cert_lab": "CEACI (Thales Security Systems \u2013 CNES) 18 avenue Edouard Belin, 31401 Toulouse Cedex 9, France Phone: +33 (0)5 61 28 16 51, email : ceaci@cnes.fr",
        "developer": "Fujitsu Microelectronics Limited 1-1, Kamikodanaka 4-chome, Nakahara-ku, Kawasaki, 211-8588, Japan Sponsor Fujitsu Microelectronics Limited 1-1, Kamikodanaka 4-chome, Nakahara-ku, Kawasaki, 211-8588, Japan",
        "match_rules": [
          "Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developer (.+)Evaluation facility(.+)Recognition arrangements"
        ],
        "ref_protection_profiles": "BSI-PP-0002-2001 Smart card IC Platform Protection Profile Version 1.0 July 2001"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "DCSSI-2008/15": 18
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP-0002-2001": 2
        }
      },
      "cc_sar": {
        "ACM": {
          "ACM_AUT": 1,
          "ACM_CAP": 1,
          "ACM_SCP": 1
        },
        "ADO": {
          "ADO_DEL": 1,
          "ADO_IGS": 1
        },
        "ADV": {
          "ADV_FSP": 1,
          "ADV_HLD": 1,
          "ADV_IMP": 1,
          "ADV_IMP.2": 1,
          "ADV_INT": 1,
          "ADV_LLD": 1,
          "ADV_RCR": 1,
          "ADV_SPM": 1
        },
        "AGD": {
          "AGD_ADM": 1,
          "AGD_USR": 1
        },
        "ALC": {
          "ALC_DVS": 1,
          "ALC_DVS.2": 1,
          "ALC_FLR": 2,
          "ALC_TAT": 1
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_DPT": 1,
          "ATE_FUN": 1,
          "ATE_IND": 1
        },
        "AVA": {
          "AVA_CCA": 1,
          "AVA_MSU": 1,
          "AVA_MSU.3": 1,
          "AVA_SOF": 1,
          "AVA_VLA": 1,
          "AVA_VLA.4": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 3": 1,
          "EAL 4": 2,
          "EAL 4 augmented": 2,
          "EAL 5": 1,
          "EAL 7": 1,
          "EAL4": 3,
          "EAL5+": 1,
          "EAL7": 1
        },
        "ITSEC": {
          "ITSEC E6 and": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 1
        },
        "ECB": {
          "ECB": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {
        "TORNADO": {
          "TORNADO": 2
        }
      },
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "SCA": {
          "physical probing": 1,
          "side-channel": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 20": 4,
          "AIS 34": 2,
          "AIS34": 1
        },
        "CC": {
          "CCMB-2005-08-001": 1,
          "CCMB-2005-08-002": 1,
          "CCMB-2005-08-003": 1,
          "CCMB-2005-08-004": 1
        },
        "FIPS": {
          "FIPS46-3": 1
        },
        "ISO": {
          "ISO/IEC 15408:2005": 1,
          "ISO/IEC 18045:2005": 1,
          "ISO/IEC18092": 2
        }
      },
      "symmetric_crypto": {
        "DES": {
          "DES": {
            "DES": 2
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Thales": {
          "Thales": 1
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Mathieu Robert",
      "/CreationDate": "D:20080530155803+02\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 5.0 pour Word",
      "/Keywords": "CER/F/07.5",
      "/ModDate": "D:20080530155806+03\u002700\u0027",
      "/Producer": "Acrobat Distiller 5.0 (Windows)",
      "/Subject": "IC Platform of FeliCa Contactless Smartcard CXD9916H3 / MB94RS403 \u0026 HAL Library",
      "/Title": "DCSSI-2008/15",
      "pdf_file_size_bytes": 265718,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": true,
      "pdf_number_of_pages": 17
    },
    "st_filename": "dcssi-cible2008_15en.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "O": {
          "O.RND": 6
        },
        "T": {
          "T.RND": 4
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP- 0002": 1,
          "BSI-PP-0002": 53,
          "BSI-PP-002": 1
        }
      },
      "cc_sar": {
        "ACM": {
          "ACM_AUT": 1,
          "ACM_AUT.1": 2,
          "ACM_CAP": 7,
          "ACM_CAP.4": 19,
          "ACM_SCP": 7,
          "ACM_SCP.2": 5
        },
        "ADO": {
          "ADO_DEL": 6,
          "ADO_DEL.2": 9,
          "ADO_IGS": 9,
          "ADO_IGS.1": 7
        },
        "ADV": {
          "ADV_FSP": 4,
          "ADV_FSP.1": 2,
          "ADV_FSP.2": 10,
          "ADV_HLD.2": 3,
          "ADV_IMP.1": 2,
          "ADV_IMP.2": 7,
          "ADV_LLD.1": 4,
          "ADV_RCR.1": 3,
          "ADV_SPM.1": 5
        },
        "AGD": {
          "AGD_ADM": 8,
          "AGD_ADM.1": 14,
          "AGD_USR": 7,
          "AGD_USR.1": 12
        },
        "ALC": {
          "ALC_DVS": 9,
          "ALC_DVS.1": 1,
          "ALC_DVS.2": 14,
          "ALC_LCD": 2,
          "ALC_LCD.1": 2,
          "ALC_TAT": 1,
          "ALC_TAT.1": 3
        },
        "ATE": {
          "ATE_COV": 5,
          "ATE_COV.2": 6,
          "ATE_DPT.1": 1,
          "ATE_FUN": 1,
          "ATE_FUN.1": 2,
          "ATE_IND.2": 2
        },
        "AVA": {
          "AVA_MSU.2": 1,
          "AVA_MSU.3": 7,
          "AVA_SOF": 2,
          "AVA_SOF.1": 2,
          "AVA_VLA": 3,
          "AVA_VLA.4": 8
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 15,
          "EAL4 augmented": 2
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 1,
          "FAU_GEN.1": 2,
          "FAU_SAS": 2,
          "FAU_SAS.1": 15,
          "FAU_SAS.1.1": 1
        },
        "FCS": {
          "FCS_CKM.1": 10,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 1,
          "FCS_CKM.4": 10,
          "FCS_CKM.4.1": 1,
          "FCS_COP.1": 18,
          "FCS_COP.1.1": 2,
          "FCS_RND": 2,
          "FCS_RND.1": 16,
          "FCS_RND.1.1": 1
        },
        "FDP": {
          "FDP_ACC.1": 16,
          "FDP_ACC.1.1": 1,
          "FDP_ACF.1": 10,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 1,
          "FDP_IFC.1": 33,
          "FDP_IFC.1.1": 1,
          "FDP_IFF.1": 3,
          "FDP_ITC.1": 10,
          "FDP_ITC.1.1": 1,
          "FDP_ITC.1.2": 1,
          "FDP_ITC.1.3": 1,
          "FDP_ITT.1": 28,
          "FDP_ITT.1.1": 1,
          "FDP_SDI.1": 2,
          "FDP_SDI.2": 13,
          "FDP_SDI.2.1": 1,
          "FDP_SDI.2.2": 1
        },
        "FIA": {
          "FIA_UID.1": 3
        },
        "FMT": {
          "FMT_LIM.1": 23,
          "FMT_LIM.1.1": 1,
          "FMT_LIM.2": 28,
          "FMT_LIM.2.1": 1,
          "FMT_MSA.1": 12,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.2": 11,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 14,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_SMF.1": 13,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 15,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_FLS.1": 28,
          "FPT_FLS.1.1": 1,
          "FPT_ITT.1": 41,
          "FPT_ITT.1.1": 2,
          "FPT_ITT.3": 12,
          "FPT_ITT.3.1": 1,
          "FPT_ITT.3.2": 1,
          "FPT_PHP.3": 29,
          "FPT_PHP.3.1": 1,
          "FPT_SEP.1": 8,
          "FPT_SEP.1.1": 1,
          "FPT_SEP.1.2": 1
        },
        "FRU": {
          "FRU_FLT.1": 1,
          "FRU_FLT.2": 24
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 2
        },
        "ECB": {
          "ECB": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 10,
          "RNG": 4
        }
      },
      "side_channel_analysis": {
        "FI": {
          "DFA": 1,
          "Malfunction": 21,
          "malfunction": 15,
          "physical tampering": 3
        },
        "SCA": {
          "DPA": 3,
          "Leak-Inherent": 19,
          "Physical Probing": 4,
          "Physical probing": 2,
          "SPA": 3,
          "physical probing": 7,
          "side channel": 2,
          "side-channel": 1,
          "timing attacks": 1
        },
        "other": {
          "reverse engineering": 3
        }
      },
      "standard_id": {
        "BSI": {
          "AIS20": 8,
          "AIS31": 2
        },
        "FIPS": {
          "FIPS PUB 46-3": 4,
          "FIPS PUB 81": 1,
          "FIPS46-3": 1
        },
        "ISO": {
          "ISO/IEC 18092": 6,
          "ISO/IEC18092": 2
        }
      },
      "symmetric_crypto": {
        "DES": {
          "3DES": {
            "3DES": 3
          },
          "DES": {
            "DES": 21
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon Technologies": 1
        },
        "Philips": {
          "Philips": 1
        },
        "Thales": {
          "Thales": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "takasaki",
      "/Company": "\u5bcc\u58eb\u901a\u682a\u5f0f\u4f1a\u793e\u3000\uff2c\uff33\uff29\u4e8b\u672c\uff09FRAM\u4e8b\u696d\u90e8",
      "/CreationDate": "D:20080527191019+09\u002700\u0027",
      "/Creator": "Word \u7528 Acrobat PDFMaker 7.0",
      "/ModDate": "D:20080527191030+09\u002700\u0027",
      "/Producer": "Acrobat Distiller 7.0 (Windows)",
      "/Title": "FUJITSU",
      "pdf_file_size_bytes": 461500,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 101
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/dcssi-2008_15en.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4+",
      "ADV_IMP.2",
      "ALC_DVS.2",
      "AVA_VLA.4",
      "AVA_MSU.3"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/dcssi-cible2008_15en.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "fb3319311743b77937f98ddaad91fafdccdec23852c1a7a446e2b2f012f8faa9",
      "txt_hash": "0c8081b4704cdd0ac9988ea24a8d861710901cb1aece6dc57af02dfcf96cfcb3"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "c5a32f68ddea15c30556c80d43e996d570a005e9551626bebfac7a401f7a0269",
      "txt_hash": "2448bfc8e6cd9b53f03cf7e7522e3c2760b8a51682ddb0a4c22948cabcf9e116"
    }
  },
  "status": "archived"
}