Java Card Platform Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0

CSV information ?

Status archived
Valid from 17.02.2015
Valid until 17.02.2020
Scheme 🇩🇪 DE
Manufacturer Oracle Corporation
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level EAL5+, AVA_VAN.5, ALC_DVS.2
Protection profiles

Heuristics summary ?

Certificate ID: BSI-DSZ-CC-0869-2015

Certification report ?

Extracted keywords

Symmetric Algorithms
AES, TDES, SEED
Asymmetric Algorithms
ECDH, ECDSA, DSA
Hash functions
SHA-1, SHA-2, MD5, RIPEMD160, RIPEMD
Randomness
TRNG, RNG
Libraries
v1.02.013
Block cipher modes
CCM

Vendor
Infineon, Infineon Technologies AG

Security level
EAL 5, EAL 4, EAL 1, EAL 2, EAL 5+, EAL 6, EAL 3, EAL 7, EAL 5 augmented, ITSEC Evaluation
Claims
OE.VERIFICATION
Security Assurance Requirements (SAR)
ADV_FSP.5, ADV_INT.2, ADV_TDS.4, ADV_ARC.1, ADV_FSP.1, ADV_FSP.2, ADV_FSP.3, ADV_FSP.4, ADV_FSP.6, ADV_IMP.1, ADV_IMP.2, ADV_INT.1, ADV_INT.3, ADV_SPM.1, ADV_TDS.1, ADV_TDS.2, ADV_TDS.3, ADV_TDS.5, ADV_TDS.6, ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_FLR, ALC_CMS.5, ALC_TAT.2, ALC_CMC.1, ALC_CMC.2, ALC_CMC.3, ALC_CMC.4, ALC_CMC.5, ALC_CMS.1, ALC_CMS.2, ALC_CMS.3, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_FLR.1, ALC_FLR.2, ALC_FLR.3, ALC_LCD.1, ALC_LCD.2, ALC_TAT.1, ALC_TAT.3, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_DPT.3, ATE_COV, ATE_DPT, ATE_FUN, ATE_COV.1, ATE_COV.2, ATE_COV.3, ATE_DPT.1, ATE_DPT.2, ATE_DPT.4, ATE_FUN.1, ATE_FUN.2, ATE_IND.1, ATE_IND.2, ATE_IND.3, ATE_IND, AVA_VAN.5, AVA_VAN, AVA_VAN.1, AVA_VAN.2, AVA_VAN.3, AVA_VAN.4, APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.1, APE_OBJ.2, APE_ECD.1, APE_REQ.1, APE_REQ.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.1, ASE_REQ.2, ASE_TSS.1, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_SPD, ASE_TSS
Protection profiles
ANSSI-CC-PP-2010/03-M01
Certificates
BSI-DSZ-CC-0869-2015, BSI-DSZ-CC-0782-2012
Evaluation facilities
TÜV Informationstechnik, TÜViT
Certification process
out of scope, the TOE, but pre-issuance loading of applets is possible. Native code post-issuance downloading is out of scope. The TOE fulfills the requirements of the Protection Profile Java Card Protection Profile - Open, and certification procedure is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the product or resulting from the evaluation and certification, SLJ 52GxxyyyzR) V1.0, BSI-DSZ-CC-0869-2015, ST Version 2.0, 20 November 2014, Oracle Corporation (confidential document) 9 specifically • AIS 1, Version 13, Durchführung der Ortsbesichtigung in der Entwicklungsumgebung, Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0, BSI-DSZ-CC-0869-2015, TÜViT GmbH (confidential document) [10] Configuration List BSI-DSZ-CC-0869-2015: Configuration Management Scope for Java Card, for Infineon on SLE78 (SLJ 52GxxyyyzR) V 1.0, Version 1.4, 29 January 2015, Oracle Corporation (confidential document) [11] AGD_OPE for Java Card Platform Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0, for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0, Version 1, 30 January 2015, TÜViT GmbH (confidential document) [19] Certification Report – for Infineon Security Controller M7892 B11 with optional RSA2048/4096, ETR for Composition (ETR-COMP), M7892 B11, BSI-DSZ-CC-0782, Version 5, 20 March 2014, TÜViT GmbH (confidential document) [21] SLx 70 Family Production and Personalization User’s Manual, Revision 2012-06-27, Infineon

Side-channel analysis
malfunction, JIL
Certification process
out of scope, the TOE, but pre-issuance loading of applets is possible. Native code post-issuance downloading is out of scope. The TOE fulfills the requirements of the Protection Profile Java Card Protection Profile - Open, and certification procedure is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the product or resulting from the evaluation and certification, SLJ 52GxxyyyzR) V1.0, BSI-DSZ-CC-0869-2015, ST Version 2.0, 20 November 2014, Oracle Corporation (confidential document) 9 specifically • AIS 1, Version 13, Durchführung der Ortsbesichtigung in der Entwicklungsumgebung, Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0, BSI-DSZ-CC-0869-2015, TÜViT GmbH (confidential document) [10] Configuration List BSI-DSZ-CC-0869-2015: Configuration Management Scope for Java Card, for Infineon on SLE78 (SLJ 52GxxyyyzR) V 1.0, Version 1.4, 29 January 2015, Oracle Corporation (confidential document) [11] AGD_OPE for Java Card Platform Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0, for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0, Version 1, 30 January 2015, TÜViT GmbH (confidential document) [19] Certification Report – for Infineon Security Controller M7892 B11 with optional RSA2048/4096, ETR for Composition (ETR-COMP), M7892 B11, BSI-DSZ-CC-0782, Version 5, 20 March 2014, TÜViT GmbH (confidential document) [21] SLx 70 Family Production and Personalization User’s Manual, Revision 2012-06-27, Infineon

Standards
AIS 36, AIS20, AIS 34, AIS 26, AIS 20, AIS 35, AIS 1, AIS 25, AIS 32, AIS 46, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065, SCP02, SCP03, SCP01
Technical reports
BSI TR-02102, BSI TR-02102-1, BSI 7138, BSI 7125, BSI 7148

File metadata

Title: Certification Report BSI-DSZ-CC-0869-2015
Subject: Common Criteria Certification BSI-DSZ-CC-0869-2015
Keywords: Common Criteria, Certification, Zertifizierung, BSI-DSZ-CC-0869-2015, Java Card
Author: Bundesamt für Sicherheit in der Informationstechnik
Creation date: D:20150227121448+01'00'
Modification date: D:20150227130818+01'00'
Pages: 40
Creator: Writer
Producer: LibreOffice 4.2

Frontpage

Certificate ID: BSI-DSZ-CC-0869-2015
Certified item: Java Card Platform Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0
Certification lab: BSI
Developer: Oracle Corporation

References

Outgoing
  • BSI-DSZ-CC-0782-2012 - Infineon Security Controller M7892 B11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01 and Toolbox v1.02.013 libraries and with specific IC dedicated software (firmware)
Incoming

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES, TDES, Triple-DES, TDEA, SEED, CMAC
Asymmetric Algorithms
RSA-CRT, ECDH, ECDSA, ECC, Diffie-Hellman, DSA
Hash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-2, MD5, RIPEMD160, RIPEMD-160
Schemes
MAC, Key exchange, Key Agreement, KA
Randomness
TRNG, RND, RNG
Libraries
v1.02.013
Elliptic Curves
P-192
Block cipher modes
ECB, CBC, CCM

JavaCard versions
Java Card 3.0.1
JavaCard API constants
TYPE_ACCESS
Vendor
NXP Semiconductors, Infineon, Infineon Technologies AG, STMicroelectronics

Security level
EAL 5, EAL5, EAL 5 augmented, EAL5 augmented
Claims
D.APP_CODE, D.APP_C_DATA, D.APP_I_DATA, D.PIN, D.API_DATA, D.CRYPTO, D.JCS_CODE, D.JCS_DATA, D.SEC_DATA, D.JCS_KEYS, D.SEC_ATTRIBUTES, D.CM_APDU, O.CARD-MANAGEMENT, O.IC_SUPPORT, O.RECOVERY, O.OS_SUPPORT, O.COMMUNICATION, O.EXT-MEM, O.RND, O.REMOTE, O.DELETION, O.SID, O.FIREWALL, O.GLOBAL_ARRAYS_CONFID, O.GLOBAL_ARRAYS_INTEG, O.NATIVE, O.OPERATE, O.REALLOCATION, O.RESOURCES, O.ALARM, O.CIPHER, O.KEY-MNGT, O.PIN-MNGT, O.TRANSACTION, O.OBJ-DELETION, O.LOAD, O.INSTALL, O.CARD-, O.EXT-, O.APPLET, O.CODE_PKG, O.JAVAOBJECT, O.EXT_MEM_INSTANCE, O.PACKAGE, O.GLOBAL_ARRAYS_C, O.GLOBAL_ARRAYS_IN, O.KEY-, O.PIN-, O.OS, T.CONFID-APPLI-DATA, T.CONFID-JCS-CODE, T.CONFID-JCS-DATA, T.INTEG-APPLI-CODE, T.INTEG-APPLI-DATA, T.INTEG-JCS-CODE, T.INTEG-JCS-DATA, T.SID, T.EXE-CODE, T.NATIVE, T.RESOURCES, T.DELETION, T.INSTALL, T.COMMUNICATION, T.OBJ-DELETION, T.PHYSICAL, T.LEAKAGE, T.FAULT, T.RND, T.CONFID-APPLI-, T.INTEG-APPLI-, T.CONFID-JCS-, T.INTEG-, T.EXE-, T.INTEG-JCS-, A.DELETION, A.APPLET, A.VERIFICATION, R.JAVA, OP.ARRAY_ACCESS, OP.CREATE, OP.LOAD_PCKG, OP.DELETE_APPLET, OP.DELETE_PCKG, OP.DELETE_PCKG_APPLET, OP.GP, OP.INSTANCE_FIELD, OP.INVK_VIRTUAL, OP.INVK_INTERFACE, OP.JAVA, OP.THROW, OP.TYPE_ACCESS, OP.PUT, OP.CREATE_EXT_MEM_INSTANCE, OP.READ_EXT_MEM, OP.WRITE_EXT_MEM, OE.CARD-MANAGEMENT, OE.SCP, OE.CODE-EVIDENCE, OE.APPLET, OE.VERIFICATION, OE.CODE-, OSP.VERIFICATION
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_TDS.1, ADV_FSP.4, ADV_TDS.3, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, ADV_FSP.5, ADV_FSP.2, ADV_TDS.2, ADV_COMP.1, AGD_OPE, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_TAT.1, ALC_TAT.2, ALC_CMC.4, ALC_CMS.1, ALC_DVS.1, ALC_LCD.1, ALC_CMS.4, ALC_DEL.1, ATE_COV.2, ATE_FUN.1, ATE_COV.1, ATE_DPT.1, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1, ASE_REQ.2, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_ARP.1, FAU_ARP.1.1, FAU_SAA.1, FCO_NRO, FCO_NRO.2, FCS_RNG, FCS_COP, FCS_RNG.1, FCS_CKM.1, FCS_CKM.2, FCS_CKM.2.1, FCS_CKM.3, FCS_CKM.3.1, FCS_CKM.4, FCS_CKM.4.1, FCS_COP.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM, FDP_ACC, FDP_ACC.2, FDP_ACF, FDP_ACF.1, FDP_IFC, FDP_IFC.1, FDP_IFF, FDP_IFF.1, FDP_RIP, FDP_RIP.1, FDP_ROL.1, FDP_ROL, FDP_SDI.2, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ITC, FDP_ITC.2, FDP_IFC.2, FDP_UIT, FDP_UIT.1, FDP_ACC.1, FDP_ITC.1, FDP_SDI.1, FDP_ITT.1, FIA_ATD, FIA_ATD.1, FIA_UID, FIA_UID.2, FIA_USB, FIA_USB.1, FIA_UID.1, FMT_MSA, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD, FMT_MTD.1, FMT_MTD.3, FMT_SMR, FMT_SMF, FPR_UNO.1, FPR_UNO.1.1, FPT_FLS.1, FPT_FLS.1.1, FPT_TDC.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_FLS, FPT_RCV, FPT_RCV.3, FPT_RCV.4, FPT_TST.1, FPT_PHP.3, FPT_ITT.1, FRU_FLT.2, FTP_ITC, FTP_ITC.1, FTP_TRP.1
Protection profiles
BSI-PP-0035, BSI-PP-0017-2005, BSI-CC-PP-0035-2007
Evaluation facilities
TÜV Informationstechnik, TUV Informationstechnik
Certification process
out of scope, by the TOE. There are no pre-issuance applets installed. Native code post-issuance downloading is out of scope The SCP is a certified hardware platform – the SLE78CLFX4000P(M) with RSA2048/4096 v1.02.013, EC v1, Software development environment. Phase 2 covers the Secure IC Development of Infineon and is out of scope of the TOE evaluation as that is part of the IC platform evaluation. In Phase 3, the Chip, a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.RECOVERY and O.OS_SUPPORT are

Side-channel analysis
Leak-Inherent, physical probing, side channel, DPA, SPA, timing attacks, physical tampering, malfunction, Malfunction
Certification process
out of scope, by the TOE. There are no pre-issuance applets installed. Native code post-issuance downloading is out of scope The SCP is a certified hardware platform – the SLE78CLFX4000P(M) with RSA2048/4096 v1.02.013, EC v1, Software development environment. Phase 2 covers the Secure IC Development of Infineon and is out of scope of the TOE evaluation as that is part of the IC platform evaluation. In Phase 3, the Chip, a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.RECOVERY and O.OS_SUPPORT are

Standards
FIPS 186-3, FIPS140, FIPS 180-4, FIPS 197, FIPS PUB 180-4, FIPS PUB 186-3, FIPS PUB 197, FIPS 140-2, NIST SP 800-108, NIST SP 800-38B, AIS20, AIS36, RFC 5639, ISO/IEC 18092, ISO/IEC7816, ISO/IEC 14443, ISO/IEC 15946-, ICAO, SCP02, SCP03, SCP01, SCP 03, SCP 02

File metadata

Title: Security Target Lite - Java Card Platform on SLE 78 (SLJ 52)
Subject: Common Criteria - ASE
Keywords: Java Card Platform, Smart Card,
Author: TÜV Informationstechnik GmbH, Roland Atoui, Linda Kyrnitszke
Creation date: D:20141120164433+01'00'
Modification date: D:20141120164433+01'00'
Pages: 158
Creator: Microsoft® Office Word 2007
Producer: Microsoft® Office Word 2007

References

Outgoing
Incoming

Heuristics ?

Certificate ID: BSI-DSZ-CC-0869-2015

Extracted SARs

APE_INT.1, APE_ECD.1, ADV_INT.2, ASE_OBJ.2, ADV_SPM.1, APE_OBJ.2, ASE_TSS.1, ADV_COMP.1, ADV_IMP.1, ADV_ARC.1, ADV_TDS.4, ALC_DEL.1, ALC_DVS.2, ADV_FSP.5, AVA_VAN.5, ASE_REQ.2, ALC_CMS.4, ATE_FUN.1, ATE_COV.2, APE_CCL.1, ASE_CCL.1, ATE_DPT.1, APE_REQ.2, ATE_IND.3, ALC_FLR.3, ASE_ECD.1, AGD_OPE.1, ALC_CMC.4, APE_SPD.1, AGD_PRE.1, ASE_SPD.1, ALC_TAT.2, ASE_INT.1, ALC_LCD.1

References ?

Updates ?

  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Java Card Platform Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0 was processed.

  • 01.02.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'ProtectionProfile', 'pp_name': 'Java Card™ System Protection Profile Open Configuration, Version 3.0', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/ANSSI-CC-profil_PP-2010-03en.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['ANSSI-CC-PP-2001-03-M01', 'ANSSI-CC-PP-2010-03', 'JCSPPC']}}]}.
  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['1.0']}.
    • The directly_affected_by property was set to {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0869-V2-2019']}.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0869-V2-2019']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0869-V2-2019']}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-2012']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-2012']}}}.
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'SAR', 'family': 'APE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_FLR', 'level': 3}, {'_type': 'SAR', 'family': 'APE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'APE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_COMP', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'APE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'SAR', 'family': 'APE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'APE_CCL', 'level': 1}]}}.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': '4919856aca1390ba0a11287b0ddfa3e9f976f6e678b2b2a2dc44f58e4842fcc2', 'st_pdf_hash': '3db4cbb37700c9c4a1a564689053f9f989120c0d09b8dc8720e40c7d776bc7fa', 'report_txt_hash': '16970b2f509be251e90601cc89d5bda8e4182f8616c7069cefd49701a354a75d', 'st_txt_hash': '67fedaf86fe2fd88b1299bfe9370da6eac9f84609bf8171fc31bd530d17d0443'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_block_cipher_modes': {'CCM': 1}} data.
    • The st_keywords property was updated, with the {'rules_block_cipher_modes': {'__insert__': {'CCM': 1}}} data.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.bsi.bund.de/zertifizierung', 'https://www.bsi.bund.de/', 'http://www.commoncriteriaportal.org/']}} values inserted.
    • The st_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.iso.org/iso/iso_catalogue/catalogue_tc/catalogue_detail.htm?csnumber=30656']}} values inserted.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0869-2015': 86, 'BSI-DSZ-CC-0782-2012': 4}}, 'cc_protection_profile_id': {'ANSSI': {'ANSSI-CC-PP-2010/03-M01': 4}}, 'cc_security_level': {'EAL': {'EAL 5': 14, 'EAL 4': 10, 'EAL 1': 7, 'EAL 2': 5, 'EAL 5+': 1, 'EAL 6': 5, 'EAL 3': 4, 'EAL 7': 4, 'EAL 5 augmented': 3}, 'ITSEC': {'ITSEC Evaluation': 1}}, 'cc_sar': {'ADV': {'ADV_FSP.5': 2, 'ADV_INT.2': 2, 'ADV_TDS.4': 2, 'ADV_ARC.1': 1, 'ADV_FSP.1': 1, 'ADV_FSP.2': 1, 'ADV_FSP.3': 1, 'ADV_FSP.4': 1, 'ADV_FSP.6': 1, 'ADV_IMP.1': 1, 'ADV_IMP.2': 1, 'ADV_INT.1': 1, 'ADV_INT.3': 1, 'ADV_SPM.1': 1, 'ADV_TDS.1': 1, 'ADV_TDS.2': 1, 'ADV_TDS.3': 1, 'ADV_TDS.5': 1, 'ADV_TDS.6': 1, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE': 2, 'AGD_PRE': 3, 'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_DVS.2': 7, 'ALC_FLR': 3, 'ALC_CMS.5': 3, 'ALC_TAT.2': 3, 'ALC_CMC.1': 1, 'ALC_CMC.2': 1, 'ALC_CMC.3': 1, 'ALC_CMC.4': 2, 'ALC_CMC.5': 1, 'ALC_CMS.1': 1, 'ALC_CMS.2': 1, 'ALC_CMS.3': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 2, 'ALC_DVS.1': 1, 'ALC_FLR.1': 1, 'ALC_FLR.2': 1, 'ALC_FLR.3': 1, 'ALC_LCD.1': 2, 'ALC_LCD.2': 1, 'ALC_TAT.1': 1, 'ALC_TAT.3': 1, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_LCD': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_DPT.3': 2, 'ATE_COV': 2, 'ATE_DPT': 2, 'ATE_FUN': 2, 'ATE_COV.1': 1, 'ATE_COV.2': 1, 'ATE_COV.3': 1, 'ATE_DPT.1': 1, 'ATE_DPT.2': 1, 'ATE_DPT.4': 1, 'ATE_FUN.1': 1, 'ATE_FUN.2': 1, 'ATE_IND.1': 1, 'ATE_IND.2': 1, 'ATE_IND.3': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.5': 5, 'AVA_VAN': 3, 'AVA_VAN.1': 1, 'AVA_VAN.2': 1, 'AVA_VAN.3': 1, 'AVA_VAN.4': 1}, 'APE': {'APE_INT.1': 1, 'APE_CCL.1': 1, 'APE_SPD.1': 1, 'APE_OBJ.1': 1, 'APE_OBJ.2': 1, 'APE_ECD.1': 1, 'APE_REQ.1': 1, 'APE_REQ.2': 1}, 'ASE': {'ASE_INT.1': 1, 'ASE_CCL.1': 1, 'ASE_SPD.1': 1, 'ASE_OBJ.1': 1, 'ASE_OBJ.2': 1, 'ASE_ECD.1': 1, 'ASE_REQ.1': 1, 'ASE_REQ.2': 1, 'ASE_TSS.1': 1, 'ASE_TSS.2': 1, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {'OE': {'OE.VERIFICATION': 3}}, 'vendor': {'Infineon': {'Infineon': 26, 'Infineon Technologies AG': 3}}, 'eval_facility': {'TUV': {'TÜV Informationstechnik': 2, 'TÜViT': 3}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 2}}, 'DES': {'DES': {'DES': 2}, '3DES': {'TDES': 2}}, 'miscellaneous': {'SEED': {'SEED': 2}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 1}, 'ECDSA': {'ECDSA': 1}}, 'FF': {'DH': {'DH': 1}, 'DSA': {'DSA': 3}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}, 'SHA2': {'SHA-2': 4}}, 'MD': {'MD5': {'MD5': 2}}, 'RIPEMD': {'RIPEMD160': 1, 'RIPEMD': 1}}, 'crypto_scheme': {'KA': {'KA': 1}}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 3}, 'RNG': {'RNG': 10}}, 'cipher_mode': {'CCM': {'CCM': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Infineon': {'v1.02.013': 6}}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'malfunction': 1}, 'other': {'JIL': 4}}, 'technical_report_id': {'BSI': {'BSI TR-02102-1': 1, 'BSI 7138': 2, 'BSI 7125': 2, 'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 2}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS 36': 6, 'AIS20': 1, 'AIS 34': 2, 'AIS 26': 2, 'AIS 20': 2, 'AIS 35': 2, 'AIS 1': 1, 'AIS 25': 1, 'AIS 32': 1, 'AIS 46': 1}, 'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 17065': 2}, 'SCP': {'SCP02': 2, 'SCP03': 3, 'SCP01': 3}}, 'javacard_version': {'JavaCard': {'JC3.0.1': 1, 'JC2.2.1': 1}}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'the TOE, but pre-issuance loading of applets is possible. Native code post-issuance downloading is out of scope. The TOE fulfills the requirements of the Protection Profile Java Card Protection Profile - Open': 1}, 'ConfidentialDocument': {'n and certification procedure is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the product or resulting from the evaluation and certification': 1, '(SLJ 52GxxyyyzR) V1.0, BSI-DSZ-CC-0869-2015, ST Version 2.0, 20 November 2014, Oracle Corporation (confidential document) 9 specifically • AIS 1, Version 13, Durchführung der Ortsbesichtigung in der Entwicklungsumgebung': 1, 'form Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0, BSI-DSZ-CC-0869-2015, TÜViT GmbH (confidential document) [10] Configuration List BSI-DSZ-CC-0869-2015: Configuration Management Scope for Java Card': 1, 'ion for Infineon on SLE78 (SLJ 52GxxyyyzR) V 1.0, Version 1.4, 29 January 2015, Oracle Corporation (confidential document) [11] AGD_OPE for Java Card Platform Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0': 1, 'mplementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0, Version 1, 30 January 2015, TÜViT GmbH (confidential document) [19] Certification Report – for Infineon Security Controller M7892 B11 with optional RSA2048/4096': 1, '] ETR for Composition (ETR-COMP), M7892 B11, BSI-DSZ-CC-0782, Version 5, 20 March 2014, TÜViT GmbH (confidential document) [21] SLx 70 Family Production and Personalization User’s Manual, Revision 2012-06-27, Infineon': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0035': 1, 'BSI-PP-0017-2005': 1, 'BSI-CC-PP-0035-2007': 1}}, 'cc_security_level': {'EAL': {'EAL 5': 1, 'EAL5': 4, 'EAL 5 augmented': 1, 'EAL5 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 6, 'ADV_FSP.1': 4, 'ADV_TDS.1': 2, 'ADV_FSP.4': 2, 'ADV_TDS.3': 10, 'ADV_FSP.5': 8, 'ADV_IMP.1': 10, 'ADV_INT.2': 1, 'ADV_TDS.4': 1, 'ADV_FSP.2': 2, 'ADV_TDS.2': 1, 'ADV_COMP.1': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1, 'AGD_OPE.1': 9, 'AGD_PRE.1': 6}, 'ALC': {'ALC_DVS.2': 6, 'ALC_TAT.1': 2, 'ALC_TAT.2': 3, 'ALC_CMC.4': 1, 'ALC_CMS.1': 1, 'ALC_DVS.1': 2, 'ALC_LCD.1': 3, 'ALC_CMS.4': 1, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.2': 3, 'ATE_FUN.1': 7, 'ATE_DPT.3': 1, 'ATE_COV.1': 2, 'ATE_IND.2': 1, 'ATE_DPT.1': 2}, 'AVA': {'AVA_VAN.5': 6}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 5, 'ASE_INT.1': 5, 'ASE_REQ.1': 2, 'ASE_REQ.2': 3, 'ASE_OBJ.2': 3, 'ASE_SPD.1': 3, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 23, 'FAU_ARP.1.1': 1, 'FAU_SAA.1': 3}, 'FCS': {'FCS_COP': 1, 'FCS_RNG.1': 16, 'FCS_CKM.1': 19, 'FCS_CKM.2': 12, 'FCS_CKM.2.1': 1, 'FCS_CKM.3': 10, 'FCS_CKM.3.1': 1, 'FCS_CKM.4': 18, 'FCS_CKM.4.1': 1, 'FCS_COP.1': 12, 'FCS_RNG.1.1': 2, 'FCS_RNG.1.2': 2, 'FCS_RNG': 3}, 'FDP': {'FDP_ROL.1': 2, 'FDP_SDI.2': 15, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_RIP.1': 2, 'FDP_ACC.1': 15, 'FDP_IFC.1': 13, 'FDP_ACF.1': 5, 'FDP_IFF.1': 2, 'FDP_ITC.1': 4, 'FDP_ITC.2': 4, 'FDP_SDI.1': 1, 'FDP_ITT.1': 1}, 'FIA': {'FIA_UID.1': 8, 'FIA_ATD.1': 1}, 'FMT': {'FMT_SMF.1': 19, 'FMT_SMF.1.1': 1, 'FMT_SMR.1': 29, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MSA.3': 7, 'FMT_MSA.1': 8, 'FMT_MTD.1': 1}, 'FPR': {'FPR_UNO.1': 13, 'FPR_UNO.1.1': 1}, 'FPT': {'FPT_FLS.1': 14, 'FPT_FLS.1.1': 2, 'FPT_TDC.1': 8, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 1, 'FPT_RCV.3': 2, 'FPT_RCV.4': 1, 'FPT_PHP.3': 1, 'FPT_ITT.1': 1}, 'FRU': {'FRU_FLT.2': 1}, 'FTP': {'FTP_ITC.1': 2, 'FTP_TRP.1': 2}}, 'cc_claims': {'D': {'D.APP_CODE': 7, 'D.APP_C_DATA': 3, 'D.APP_I_DATA': 5, 'D.PIN': 6, 'D.API_DATA': 3, 'D.CRYPTO': 6, 'D.JCS_CODE': 3, 'D.JCS_DATA': 5, 'D.SEC_DATA': 8, 'D.JCS_KEYS': 3, 'D.SEC_ATTRIBUTES': 2, 'D.CM_APDU': 1}, 'O': {'O.CARD-MANAGEMENT': 33, 'O.IC_SUPPORT': 17, 'O.RECOVERY': 24, 'O.OS_SUPPORT': 23, 'O.COMMUNICATION': 11, 'O.EXT-MEM': 20, 'O.RND': 14, 'O.REMOTE': 1, 'O.DELETION': 15, 'O.SID': 35, 'O.FIREWALL': 46, 'O.GLOBAL_ARRAYS_CONFID': 17, 'O.GLOBAL_ARRAYS_INTEG': 9, 'O.NATIVE': 13, 'O.OPERATE': 35, 'O.REALLOCATION': 17, 'O.RESOURCES': 24, 'O.ALARM': 21, 'O.CIPHER': 16, 'O.KEY-MNGT': 24, 'O.PIN-MNGT': 22, 'O.TRANSACTION': 18, 'O.OBJ-DELETION': 8, 'O.LOAD': 18, 'O.INSTALL': 15, 'O.CARD-': 6, 'O.EXT-': 1, 'O.APPLET': 19, 'O.CODE_PKG': 16, 'O.JAVAOBJECT': 39, 'O.EXT_MEM_INSTANCE': 10, 'O.PACKAGE': 2, 'O.GLOBAL_ARRAYS_C': 1, 'O.GLOBAL_ARRAYS_IN': 1, 'O.KEY-': 1, 'O.PIN-': 1, 'O.OS.SUPPORT': 1}, 'T': {'T.CONFID-APPLI-DATA': 17, 'T.CONFID-JCS-CODE': 6, 'T.CONFID-JCS-DATA': 8, 'T.INTEG-APPLI-CODE': 5, 'T.INTEG-APPLI-CODE.LOAD': 5, 'T.INTEG-APPLI-DATA': 15, 'T.INTEG-APPLI-DATA.LOAD': 4, 'T.INTEG-JCS-CODE': 8, 'T.INTEG-JCS-DATA': 9, 'T.NATIVE': 6, 'T.RESOURCES': 9, 'T.DELETION': 5, 'T.INSTALL': 6, 'T.COMMUNICATION': 5, 'T.OBJ-DELETION': 4, 'T.PHYSICAL': 8, 'T.LEAKAGE': 5, 'T.FAULT': 5, 'T.RND': 6, 'T.CONFID-APPLI-': 3, 'T.INTEG-APPLI-': 10, 'T.CONFID-JCS-': 8, 'T.INTEG-': 10, 'T.EXE-': 1, 'T.INTEG-JCS-': 1}, 'A': {'A.DELETION': 1, 'A.LOAD': 7, 'A.APPLET': 6, 'A.VERIFICATION': 6}, 'OP': {'OP.ARRAY_ACCESS': 4, 'OP.CREATE': 7, 'OP.LOAD_PCKG': 1, 'OP.DELETE_APPLET': 4, 'OP.DELETE_PCKG': 3, 'OP.DELETE_PCKG_APPLET': 3, 'OP.GP': 3, 'OP.INSTANCE_FIELD': 4, 'OP.INVK_VIRTUAL': 6, 'OP.INVK_INTERFACE': 7, 'OP.JAVA': 5, 'OP.THROW': 5, 'OP.TYPE_ACCESS': 5, 'OP.PUT': 6, 'OP.CREATE_EXT_MEM_INSTANCE': 3, 'OP.READ_EXT_MEM': 3, 'OP.WRITE_EXT_MEM': 3}, 'OE': {'OE.CARD-MANAGEMENT': 2, 'OE.SCP.IC': 2, 'OE.SCP.RECOVERY': 2, 'OE.SCP.SUPPORT': 2, 'OE.CODE-EVIDENCE': 17, 'OE.APPLET': 8, 'OE.VERIFICATION': 38, 'OE.CODE-': 4}, 'OSP': {'OSP.VERIFICATION': 6}}, 'vendor': {'NXP': {'NXP Semiconductors': 1}, 'Infineon': {'Infineon': 181, 'Infineon Technologies AG': 2}, 'STMicroelectronics': {'STMicroelectronics': 1}}, 'eval_facility': {'TUV': {'TÜV Informationstechnik': 1, 'TUV Informationstechnik': 1}, 'EWA': {'EWA': 6}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 24}}, 'DES': {'DES': {'DES': 36, 'DEA': 1}, '3DES': {'TDES': 22, 'Triple-DES': 1, 'TDEA': 1}}, 'miscellaneous': {'SEED': {'SEED': 2}}, 'constructions': {'MAC': {'CMAC': 3}}}, 'asymmetric_crypto': {'RSA': {'RSA-CRT': 3}, 'ECC': {'ECDH': {'ECDH': 9}, 'ECDSA': {'ECDSA': 16}, 'ECC': {'ECC': 8}}, 'FF': {'DH': {'DH': 9, 'Diffie-Hellman': 1}, 'DSA': {'DSA': 18}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}, 'SHA2': {'SHA-224': 1, 'SHA-256': 1, 'SHA-384': 1, 'SHA-512': 1, 'SHA-2': 5}}, 'MD': {'MD5': {'MD5': 3}}, 'RIPEMD': {'RIPEMD160': 1, 'RIPEMD-160': 2}}, 'crypto_scheme': {'MAC': {'MAC': 17}, 'KEX': {'Key exchange': 1}, 'KA': {'KA': 31, 'Key Agreement': 2}}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 5}, 'RNG': {'RNG': 18, 'RND': 18}}, 'cipher_mode': {'ECB': {'ECB': 7}, 'CBC': {'CBC': 23}, 'CCM': {'CCM': 1}}, 'ecc_curve': {'NIST': {'P-192': 2}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Infineon': {'v1.02.013': 3}}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 2, 'physical probing': 3, 'side channel': 1, 'DPA': 3, 'SPA': 1, 'timing attacks': 1}, 'FI': {'physical tampering': 1, 'malfunction': 3, 'Malfunction': 3}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 5}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 186-3': 7, 'FIPS140': 2, 'FIPS 180-4': 6, 'FIPS 197': 9, 'FIPS PUB 180-4': 1, 'FIPS PUB 186-3': 1, 'FIPS PUB 197': 1, 'FIPS 140-2': 1}, 'NIST': {'NIST SP 800-108': 1, 'NIST SP 800-38B': 1}, 'BSI': {'AIS20': 4, 'AIS36': 2}, 'RFC': {'RFC 5639': 5}, 'ISO': {'ISO/IEC 18092': 2, 'ISO/IEC7816': 2, 'ISO/IEC 14443': 2, 'ISO/IEC 15946-': 5}, 'ICAO': {'ICAO': 6}, 'SCP': {'SCP02': 9, 'SCP03': 9, 'SCP01': 3, 'SCP 03': 3, 'SCP 02': 2}}, 'javacard_version': {'JavaCard': {'Java Card 3.0.1': 3}}, 'javacard_api_const': {'misc': {'TYPE_ACCESS': 3}}, 'javacard_packages': {'javacard': {'javacard.security': 2}, 'javacardx': {'javacardx.crypto': 2, 'javacardx.security': 1, 'javacardx.external': 1}}, 'certification_process': {'OutOfScope': {'out of scope': 3, '. There are no pre-issuance applets installed. Native code post-issuance downloading is out of scope The SCP is a certified hardware platform – the SLE78CLFX4000P(M': 1, '. Phase 2 covers the Secure IC Development of Infineon and is out of scope of the TOE evaluation as that is part of the IC platform evaluation': 1, '. That point is out of scope of this Protection Profile, though': 1, 'd by the TOE. There are no pre-issuance applets installed. Native code post-issuance downloading is out of scope The SCP is a certified hardware platform – the SLE78CLFX4000P(M) with RSA2048/4096 v1.02.013, EC': 1, 'edded Software development environment. Phase 2 covers the Secure IC Development of Infineon and is out of scope of the TOE evaluation as that is part of the IC platform evaluation. In Phase 3, the Chip': 1, 'a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.RECOVERY and O.OS_SUPPORT are': 1}}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Java Card™ System Protection Profile Open Configuration, Version 3.0', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/ANSSI-CC-profil_PP-2010-03en.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['ANSSI-CC-PP-2001-03-M01', 'ANSSI-CC-PP-2010-03', 'JCSPPC']}}]}.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}]}.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': '0869a_pdf.pdf', 'st_filename': '0869b_pdf.pdf'}.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0869-2015': 48}}}}, 'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL 4': 9, 'EAL 2': 4, 'EAL 6': 4}}}}, 'cc_sar': {'__update__': {'ALC': {'__delete__': ['ALC_LCD']}, 'AVA': {'__update__': {'AVA_VAN.5': 6}}}}, 'symmetric_crypto': {'__update__': {'DES': {'__delete__': ['DES']}}}, 'asymmetric_crypto': {'__update__': {'FF': {'__update__': {'DSA': {'__update__': {'DSA': 2}}}, '__delete__': ['DH']}}}, 'crypto_scheme': {}, 'randomness': {'__update__': {'TRNG': {'__update__': {'TRNG': 2}}, 'RNG': {'__update__': {'RNG': 6}}}}, 'crypto_library': {'__update__': {'Infineon': {'__update__': {'v1.02.013': 5}}}}, 'technical_report_id': {'__update__': {'BSI': {'__insert__': {'BSI TR-02102': 1}}}}, 'tee_name': {}, 'standard_id': {'__update__': {'ISO': {'__insert__': {'ISO/IEC 18045': 4}, '__update__': {'ISO/IEC 15408': 4}}, 'SCP': {'__update__': {'SCP01': 2}}}}, 'javacard_version': {}, 'certification_process': {'__update__': {'OutOfScope': {'__insert__': {'out of scope': 1}}, 'ConfidentialDocument': {'and certification procedure is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the product or resulting from the evaluation and certification': 1, 'SLJ 52GxxyyyzR) V1.0, BSI-DSZ-CC-0869-2015, ST Version 2.0, 20 November 2014, Oracle Corporation (confidential document) 9 specifically • AIS 1, Version 13, Durchführung der Ortsbesichtigung in der Entwicklungsumgebung': 1, 'Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0, BSI-DSZ-CC-0869-2015, TÜViT GmbH (confidential document) [10] Configuration List BSI-DSZ-CC-0869-2015: Configuration Management Scope for Java Card': 1, 'for Infineon on SLE78 (SLJ 52GxxyyyzR) V 1.0, Version 1.4, 29 January 2015, Oracle Corporation (confidential document) [11] AGD_OPE for Java Card Platform Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0': 1, 'for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0, Version 1, 30 January 2015, TÜViT GmbH (confidential document) [19] Certification Report – for Infineon Security Controller M7892 B11 with optional RSA2048/4096': 1, 'ETR for Composition (ETR-COMP), M7892 B11, BSI-DSZ-CC-0782, Version 5, 20 March 2014, TÜViT GmbH (confidential document) [21] SLx 70 Family Production and Personalization User’s Manual, Revision 2012-06-27, Infineon': 1}}}} data.
    • The st_keywords property was updated, with the {'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL5': 6}}}}, 'cc_sar': {'__update__': {'ADV': {'__update__': {'ADV_FSP.5': 7, 'ADV_IMP.1': 9}}, 'AGD': {'__update__': {'AGD_OPE.1': 10}}, 'ALC': {'__delete__': ['ALC_CMS.5']}, 'ATE': {'__update__': {'ATE_FUN.1': 6}, '__delete__': ['ATE_DPT.3', 'ATE_IND.2']}, 'ASE': {'__update__': {'ASE_ECD.1': 4, 'ASE_REQ.2': 2, 'ASE_SPD.1': 2}}}}, 'cc_sfr': {'__insert__': {'FCO': {'FCO_NRO': 6, 'FCO_NRO.2': 6}}, '__update__': {'FAU': {'__update__': {'FAU_ARP.1': 24}}, 'FCS': {'__insert__': {'FCS_CKM': 6}, '__update__': {'FCS_COP': 32, 'FCS_RNG.1': 14, 'FCS_CKM.2': 11, 'FCS_CKM.3': 7, 'FCS_CKM.4': 17, 'FCS_COP.1': 26, 'FCS_RNG': 4}}, 'FDP': {'__insert__': {'FDP_ACC': 40, 'FDP_ACC.2': 5, 'FDP_ACF': 38, 'FDP_IFC': 25, 'FDP_IFF': 18, 'FDP_RIP': 135, 'FDP_ROL': 16, 'FDP_ITC': 12, 'FDP_IFC.2': 2, 'FDP_UIT': 6, 'FDP_UIT.1': 2}, '__update__': {'FDP_ROL.1': 5, 'FDP_SDI.2': 13, 'FDP_RIP.1': 11, 'FDP_ACC.1': 17, 'FDP_IFC.1': 15, 'FDP_ACF.1': 24, 'FDP_IFF.1': 17, 'FDP_ITC.2': 13}}, 'FIA': {'__insert__': {'FIA_ATD': 9, 'FIA_UID': 22, 'FIA_UID.2': 1, 'FIA_USB': 6, 'FIA_USB.1': 3}, '__update__': {'FIA_UID.1': 12, 'FIA_ATD.1': 2}}, 'FMT': {'__insert__': {'FMT_MSA': 135, 'FMT_MSA.2': 2, 'FMT_MTD': 20, 'FMT_MTD.3': 1, 'FMT_SMR': 43, 'FMT_SMF': 41}, '__update__': {'FMT_SMF.1': 22, 'FMT_SMR.1': 37, 'FMT_MSA.3': 22, 'FMT_MSA.1': 14, 'FMT_MTD.1': 2}}, 'FPT': {'__insert__': {'FPT_FLS': 36, 'FPT_RCV': 27, 'FPT_TST.1': 1}, '__update__': {'FPT_FLS.1': 16, 'FPT_RCV.3': 13, 'FPT_RCV.4': 2}}, 'FTP': {'__insert__': {'FTP_ITC': 10}, '__update__': {'FTP_ITC.1': 5}}}}, 'cc_claims': {'__insert__': {'R': {'R.JAVA': 12}}, '__update__': {'D': {'__update__': {'D.JCS_DATA': 4}}, 'O': {'__insert__': {'O.OS': 1}, '__update__': {'O.JAVAOBJECT': 41}, '__delete__': ['O.OS.SUPPORT']}, 'T': {'__insert__': {'T.SID': 19, 'T.EXE-CODE': 8}, '__update__': {'T.CONFID-JCS-DATA': 6, 'T.INTEG-APPLI-CODE': 9, 'T.INTEG-APPLI-DATA': 18, 'T.INTEG-JCS-DATA': 7, 'T.RND': 5}, '__delete__': ['T.INTEG-APPLI-CODE.LOAD', 'T.INTEG-APPLI-DATA.LOAD']}, 'A': {'__delete__': ['A.LOAD']}, 'OE': {'__insert__': {'OE.SCP': 6}, '__delete__': ['OE.SCP.IC', 'OE.SCP.RECOVERY', 'OE.SCP.SUPPORT']}}}, 'vendor': {'__update__': {'Infineon': {'__update__': {'Infineon': 182}}}}, 'eval_facility': {'__delete__': ['EWA']}, 'symmetric_crypto': {'__update__': {'AES_competition': {'__update__': {'AES': {'__update__': {'AES': 19}}}}, 'DES': {'__update__': {'DES': {'__update__': {'DES': 9}, '__delete__': ['DEA']}}}, 'constructions': {'__update__': {'MAC': {'__update__': {'CMAC': 1}}}}}}, 'asymmetric_crypto': {'__update__': {'ECC': {'__update__': {'ECDH': {'__update__': {'ECDH': 5}}, 'ECDSA': {'__update__': {'ECDSA': 10}}, 'ECC': {'__update__': {'ECC': 11}}}}, 'FF': {'__update__': {'DH': {'__delete__': ['DH']}, 'DSA': {'__update__': {'DSA': 2}}}}}}, 'crypto_scheme': {'__update__': {'MAC': {'__update__': {'MAC': 4}}, 'KA': {'__update__': {'KA': 2}}}}, 'randomness': {'__update__': {'TRNG': {'__update__': {'TRNG': 3}}, 'RNG': {'__update__': {'RNG': 11, 'RND': 20}}}}, 'cipher_mode': {'__update__': {'ECB': {'__update__': {'ECB': 6}}, 'CBC': {'__update__': {'CBC': 21}}}}, 'side_channel_analysis': {'__update__': {'SCA': {'__update__': {'DPA': 4}}, 'FI': {'__update__': {'malfunction': 4}}}}, 'tee_name': {}, 'standard_id': {'__update__': {'SCP': {'__update__': {'SCP01': 2}}}}, 'javacard_api_const': {'__update__': {'misc': {'__update__': {'TYPE_ACCESS': 5}}}}, 'javacard_packages': {'__update__': {'javacard': {'__insert__': {'javacard.framework': 4}, '__update__': {'javacard.security': 3}}, 'javacardx': {'__update__': {'javacardx.crypto': 3}}}}, 'certification_process': {'__update__': {'OutOfScope': {'__insert__': {'by the TOE. There are no pre-issuance applets installed. Native code post-issuance downloading is out of scope The SCP is a certified hardware platform – the SLE78CLFX4000P(M) with RSA2048/4096 v1.02.013, EC v1': 1, 'Software development environment. Phase 2 covers the Secure IC Development of Infineon and is out of scope of the TOE evaluation as that is part of the IC platform evaluation. In Phase 3, the Chip': 1}, '__delete__': ['. There are no pre-issuance applets installed. Native code post-issuance downloading is out of scope The SCP is a certified hardware platform – the SLE78CLFX4000P(M', '. Phase 2 covers the Secure IC Development of Infineon and is out of scope of the TOE evaluation as that is part of the IC platform evaluation', '. That point is out of scope of this Protection Profile, though', 'd by the TOE. There are no pre-issuance applets installed. Native code post-issuance downloading is out of scope The SCP is a certified hardware platform – the SLE78CLFX4000P(M) with RSA2048/4096 v1.02.013, EC', 'edded Software development environment. Phase 2 covers the Secure IC Development of Infineon and is out of scope of the TOE evaluation as that is part of the IC platform evaluation. In Phase 3, the Chip']}}}} data.

    The computed heuristics were updated.

    • The report_references property was updated, with the {'indirectly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['C0648', 'C0649']}}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}]} values added.
  • 04.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Java Card™ System Protection Profile Open Configuration, Version 3.0', 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/ANSSI-CC-profil_PP-2010-03en.pdf', 'pp_link': None, 'pp_ids': None}]}.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Java Card™ System Protection Profile Open Configuration, Version 3.0', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/ANSSI-CC-profil_PP-2010-03en.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['ANSSI-CC-PP-2001-03-M01', 'ANSSI-CC-PP-2010-03', 'JCSPPC']}}]}.

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.

Raw data

{
  "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": null,
  "dgst": "a9f542d8e2be69fd",
  "heuristics": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics",
    "cert_id": "BSI-DSZ-CC-0869-2015",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_dependency_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_COMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.0"
      ]
    },
    "indirect_dependency_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0869-V2-2019"
        ]
      },
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0782-2012"
        ]
      },
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "C0649",
          "C0648",
          "BSI-DSZ-CC-0869-V2-2019"
        ]
      },
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0782-2012"
        ]
      }
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Oracle Corporation",
  "manufacturer_web": "https://www.oracle.com",
  "name": "Java Card Platform Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0",
  "not_valid_after": "2020-02-17",
  "not_valid_before": "2015-02-17",
  "pdf_data": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData",
    "report_filename": "0869a_pdf.pdf",
    "report_frontpage": {
      "anssi": {},
      "bsi": {
        "cc_security_level": "Common Criteria Part 3 conformant EAL 5 augmented by ALC_DVS.2 and AVA_VAN.5 Valid until (*): 17 February 2020 SOGIS Recognition Agreement",
        "cc_version": "PP conformant including optional package EMG plus product specific extensions Common Criteria Part 2 extended",
        "cert_id": "BSI-DSZ-CC-0869-2015",
        "cert_item": "Java Card Platform Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0",
        "cert_lab": "BSI",
        "developer": "Oracle Corporation",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ],
        "ref_protection_profiles": "Java Card Protection Profile - Open Configuration, Version 3.0, May 2012, ANSSI-CC-PP-2010/03-M01"
      },
      "canada": {},
      "niap": {},
      "nscib": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECDH": {
            "ECDH": 1
          },
          "ECDSA": {
            "ECDSA": 1
          }
        },
        "FF": {
          "DSA": {
            "DSA": 2
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0782-2012": 4,
          "BSI-DSZ-CC-0869-2015": 48
        }
      },
      "cc_claims": {
        "OE": {
          "OE.VERIFICATION": 3
        }
      },
      "cc_protection_profile_id": {
        "ANSSI": {
          "ANSSI-CC-PP-2010/03-M01": 4
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 1,
          "ADV_FSP": 1,
          "ADV_FSP.1": 1,
          "ADV_FSP.2": 1,
          "ADV_FSP.3": 1,
          "ADV_FSP.4": 1,
          "ADV_FSP.5": 2,
          "ADV_FSP.6": 1,
          "ADV_IMP": 1,
          "ADV_IMP.1": 1,
          "ADV_IMP.2": 1,
          "ADV_INT": 1,
          "ADV_INT.1": 1,
          "ADV_INT.2": 2,
          "ADV_INT.3": 1,
          "ADV_SPM": 1,
          "ADV_SPM.1": 1,
          "ADV_TDS": 1,
          "ADV_TDS.1": 1,
          "ADV_TDS.2": 1,
          "ADV_TDS.3": 1,
          "ADV_TDS.4": 2,
          "ADV_TDS.5": 1,
          "ADV_TDS.6": 1
        },
        "AGD": {
          "AGD_OPE": 2,
          "AGD_OPE.1": 1,
          "AGD_PRE": 3,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.1": 1,
          "ALC_CMC.2": 1,
          "ALC_CMC.3": 1,
          "ALC_CMC.4": 2,
          "ALC_CMC.5": 1,
          "ALC_CMS": 1,
          "ALC_CMS.1": 1,
          "ALC_CMS.2": 1,
          "ALC_CMS.3": 1,
          "ALC_CMS.4": 1,
          "ALC_CMS.5": 3,
          "ALC_DEL": 1,
          "ALC_DEL.1": 2,
          "ALC_DVS": 1,
          "ALC_DVS.1": 1,
          "ALC_DVS.2": 7,
          "ALC_FLR": 3,
          "ALC_FLR.1": 1,
          "ALC_FLR.2": 1,
          "ALC_FLR.3": 1,
          "ALC_LCD.1": 2,
          "ALC_LCD.2": 1,
          "ALC_TAT": 1,
          "ALC_TAT.1": 1,
          "ALC_TAT.2": 3,
          "ALC_TAT.3": 1
        },
        "APE": {
          "APE_CCL.1": 1,
          "APE_ECD.1": 1,
          "APE_INT.1": 1,
          "APE_OBJ.1": 1,
          "APE_OBJ.2": 1,
          "APE_REQ.1": 1,
          "APE_REQ.2": 1,
          "APE_SPD.1": 1
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_CCL.1": 1,
          "ASE_ECD": 1,
          "ASE_ECD.1": 1,
          "ASE_INT": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ": 1,
          "ASE_OBJ.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.1": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS": 1,
          "ASE_TSS.1": 1,
          "ASE_TSS.2": 1
        },
        "ATE": {
          "ATE_COV": 2,
          "ATE_COV.1": 1,
          "ATE_COV.2": 1,
          "ATE_COV.3": 1,
          "ATE_DPT": 2,
          "ATE_DPT.1": 1,
          "ATE_DPT.2": 1,
          "ATE_DPT.3": 2,
          "ATE_DPT.4": 1,
          "ATE_FUN": 2,
          "ATE_FUN.1": 1,
          "ATE_FUN.2": 1,
          "ATE_IND": 1,
          "ATE_IND.1": 1,
          "ATE_IND.2": 1,
          "ATE_IND.3": 1
        },
        "AVA": {
          "AVA_VAN": 3,
          "AVA_VAN.1": 1,
          "AVA_VAN.2": 1,
          "AVA_VAN.3": 1,
          "AVA_VAN.4": 1,
          "AVA_VAN.5": 6
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 7,
          "EAL 2": 4,
          "EAL 3": 4,
          "EAL 4": 9,
          "EAL 5": 14,
          "EAL 5 augmented": 3,
          "EAL 5+": 1,
          "EAL 6": 4,
          "EAL 7": 4
        },
        "ITSEC": {
          "ITSEC Evaluation": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "ConfidentialDocument": {
          "ETR for Composition (ETR-COMP), M7892 B11, BSI-DSZ-CC-0782, Version 5, 20 March 2014, T\u00dcViT GmbH (confidential document) [21] SLx 70 Family Production and Personalization User\u2019s Manual, Revision 2012-06-27, Infineon": 1,
          "Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0, BSI-DSZ-CC-0869-2015, T\u00dcViT GmbH (confidential document) [10] Configuration List BSI-DSZ-CC-0869-2015: Configuration Management Scope for Java Card": 1,
          "SLJ 52GxxyyyzR) V1.0, BSI-DSZ-CC-0869-2015, ST Version 2.0, 20 November 2014, Oracle Corporation (confidential document) 9 specifically \u2022 AIS 1, Version 13, Durchf\u00fchrung der Ortsbesichtigung in der Entwicklungsumgebung": 1,
          "and certification procedure is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the product or resulting from the evaluation and certification": 1,
          "for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0, Version 1, 30 January 2015, T\u00dcViT GmbH (confidential document) [19] Certification Report \u2013 for Infineon Security Controller M7892 B11 with optional RSA2048/4096": 1,
          "for Infineon on SLE78 (SLJ 52GxxyyyzR) V 1.0, Version 1.4, 29 January 2015, Oracle Corporation (confidential document) [11] AGD_OPE for Java Card Platform Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0": 1
        },
        "OutOfScope": {
          "out of scope": 1,
          "the TOE, but pre-issuance loading of applets is possible. Native code post-issuance downloading is out of scope. The TOE fulfills the requirements of the Protection Profile Java Card Protection Profile - Open": 1
        }
      },
      "cipher_mode": {
        "CCM": {
          "CCM": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "Infineon": {
          "v1.02.013": 5
        }
      },
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "TUV": {
          "T\u00dcV Informationstechnik": 2,
          "T\u00dcViT": 3
        }
      },
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 2
          }
        },
        "RIPEMD": {
          "RIPEMD": 1,
          "RIPEMD160": 1
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 1
          },
          "SHA2": {
            "SHA-2": 4
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 6
        },
        "TRNG": {
          "TRNG": 2
        }
      },
      "side_channel_analysis": {
        "FI": {
          "malfunction": 1
        },
        "other": {
          "JIL": 4
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 1": 1,
          "AIS 20": 2,
          "AIS 25": 1,
          "AIS 26": 2,
          "AIS 32": 1,
          "AIS 34": 2,
          "AIS 35": 2,
          "AIS 36": 6,
          "AIS 46": 1,
          "AIS20": 1
        },
        "ISO": {
          "ISO/IEC 15408": 4,
          "ISO/IEC 17065": 2,
          "ISO/IEC 18045": 4
        },
        "SCP": {
          "SCP01": 2,
          "SCP02": 2,
          "SCP03": 3
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 2
          }
        },
        "DES": {
          "3DES": {
            "TDES": 2
          }
        },
        "miscellaneous": {
          "SEED": {
            "SEED": 2
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI 7125": 2,
          "BSI 7138": 2,
          "BSI 7148": 1,
          "BSI TR-02102": 1,
          "BSI TR-02102-1": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon": 26,
          "Infineon Technologies AG": 3
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20150227121448+01\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "Common Criteria, Certification, Zertifizierung, BSI-DSZ-CC-0869-2015, Java Card",
      "/ModDate": "D:20150227130818+01\u002700\u0027",
      "/Producer": "LibreOffice 4.2",
      "/Subject": "Common Criteria Certification BSI-DSZ-CC-0869-2015",
      "/Title": "Certification Report BSI-DSZ-CC-0869-2015",
      "pdf_file_size_bytes": 1268716,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.commoncriteriaportal.org/",
          "https://www.bsi.bund.de/",
          "https://www.bsi.bund.de/zertifizierung"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 40
    },
    "st_filename": "0869b_pdf.pdf",
    "st_frontpage": {
      "anssi": {},
      "bsi": {},
      "canada": {},
      "niap": {},
      "nscib": {}
    },
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 11
          },
          "ECDH": {
            "ECDH": 5
          },
          "ECDSA": {
            "ECDSA": 10
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 1
          },
          "DSA": {
            "DSA": 2
          }
        },
        "RSA": {
          "RSA-CRT": 3
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.APPLET": 6,
          "A.DELETION": 1,
          "A.VERIFICATION": 6
        },
        "D": {
          "D.API_DATA": 3,
          "D.APP_CODE": 7,
          "D.APP_C_DATA": 3,
          "D.APP_I_DATA": 5,
          "D.CM_APDU": 1,
          "D.CRYPTO": 6,
          "D.JCS_CODE": 3,
          "D.JCS_DATA": 4,
          "D.JCS_KEYS": 3,
          "D.PIN": 6,
          "D.SEC_ATTRIBUTES": 2,
          "D.SEC_DATA": 8
        },
        "O": {
          "O.ALARM": 21,
          "O.APPLET": 19,
          "O.CARD-": 6,
          "O.CARD-MANAGEMENT": 33,
          "O.CIPHER": 16,
          "O.CODE_PKG": 16,
          "O.COMMUNICATION": 11,
          "O.DELETION": 15,
          "O.EXT-": 1,
          "O.EXT-MEM": 20,
          "O.EXT_MEM_INSTANCE": 10,
          "O.FIREWALL": 46,
          "O.GLOBAL_ARRAYS_C": 1,
          "O.GLOBAL_ARRAYS_CONFID": 17,
          "O.GLOBAL_ARRAYS_IN": 1,
          "O.GLOBAL_ARRAYS_INTEG": 9,
          "O.IC_SUPPORT": 17,
          "O.INSTALL": 15,
          "O.JAVAOBJECT": 41,
          "O.KEY-": 1,
          "O.KEY-MNGT": 24,
          "O.LOAD": 18,
          "O.NATIVE": 13,
          "O.OBJ-DELETION": 8,
          "O.OPERATE": 35,
          "O.OS": 1,
          "O.OS_SUPPORT": 23,
          "O.PACKAGE": 2,
          "O.PIN-": 1,
          "O.PIN-MNGT": 22,
          "O.REALLOCATION": 17,
          "O.RECOVERY": 24,
          "O.REMOTE": 1,
          "O.RESOURCES": 24,
          "O.RND": 14,
          "O.SID": 35,
          "O.TRANSACTION": 18
        },
        "OE": {
          "OE.APPLET": 8,
          "OE.CARD-MANAGEMENT": 2,
          "OE.CODE-": 4,
          "OE.CODE-EVIDENCE": 17,
          "OE.SCP": 6,
          "OE.VERIFICATION": 38
        },
        "OP": {
          "OP.ARRAY_ACCESS": 4,
          "OP.CREATE": 7,
          "OP.CREATE_EXT_MEM_INSTANCE": 3,
          "OP.DELETE_APPLET": 4,
          "OP.DELETE_PCKG": 3,
          "OP.DELETE_PCKG_APPLET": 3,
          "OP.GP": 3,
          "OP.INSTANCE_FIELD": 4,
          "OP.INVK_INTERFACE": 7,
          "OP.INVK_VIRTUAL": 6,
          "OP.JAVA": 5,
          "OP.LOAD_PCKG": 1,
          "OP.PUT": 6,
          "OP.READ_EXT_MEM": 3,
          "OP.THROW": 5,
          "OP.TYPE_ACCESS": 5,
          "OP.WRITE_EXT_MEM": 3
        },
        "OSP": {
          "OSP.VERIFICATION": 6
        },
        "R": {
          "R.JAVA": 12
        },
        "T": {
          "T.COMMUNICATION": 5,
          "T.CONFID-APPLI-": 3,
          "T.CONFID-APPLI-DATA": 17,
          "T.CONFID-JCS-": 8,
          "T.CONFID-JCS-CODE": 6,
          "T.CONFID-JCS-DATA": 6,
          "T.DELETION": 5,
          "T.EXE-": 1,
          "T.EXE-CODE": 8,
          "T.FAULT": 5,
          "T.INSTALL": 6,
          "T.INTEG-": 10,
          "T.INTEG-APPLI-": 10,
          "T.INTEG-APPLI-CODE": 9,
          "T.INTEG-APPLI-DATA": 18,
          "T.INTEG-JCS-": 1,
          "T.INTEG-JCS-CODE": 8,
          "T.INTEG-JCS-DATA": 7,
          "T.LEAKAGE": 5,
          "T.NATIVE": 6,
          "T.OBJ-DELETION": 4,
          "T.PHYSICAL": 8,
          "T.RESOURCES": 9,
          "T.RND": 5,
          "T.SID": 19
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0035-2007": 1,
          "BSI-PP-0017-2005": 1,
          "BSI-PP-0035": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 6,
          "ADV_COMP.1": 1,
          "ADV_FSP.1": 4,
          "ADV_FSP.2": 2,
          "ADV_FSP.4": 2,
          "ADV_FSP.5": 7,
          "ADV_IMP.1": 9,
          "ADV_INT.2": 1,
          "ADV_TDS.1": 2,
          "ADV_TDS.2": 1,
          "ADV_TDS.3": 10,
          "ADV_TDS.4": 1
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 10,
          "AGD_PRE": 1,
          "AGD_PRE.1": 6
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.1": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 2,
          "ALC_DVS.2": 6,
          "ALC_LCD.1": 3,
          "ALC_TAT.1": 2,
          "ALC_TAT.2": 3
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 4,
          "ASE_INT.1": 5,
          "ASE_OBJ.2": 3,
          "ASE_REQ.1": 2,
          "ASE_REQ.2": 2,
          "ASE_SPD.1": 2,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.1": 2,
          "ATE_COV.2": 3,
          "ATE_DPT.1": 2,
          "ATE_FUN.1": 6
        },
        "AVA": {
          "AVA_VAN.5": 6
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 5": 1,
          "EAL 5 augmented": 1,
          "EAL5": 6,
          "EAL5 augmented": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 24,
          "FAU_ARP.1.1": 1,
          "FAU_SAA.1": 3
        },
        "FCO": {
          "FCO_NRO": 6,
          "FCO_NRO.2": 6
        },
        "FCS": {
          "FCS_CKM": 6,
          "FCS_CKM.1": 19,
          "FCS_CKM.2": 11,
          "FCS_CKM.2.1": 1,
          "FCS_CKM.3": 7,
          "FCS_CKM.3.1": 1,
          "FCS_CKM.4": 17,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 32,
          "FCS_COP.1": 26,
          "FCS_RNG": 4,
          "FCS_RNG.1": 14,
          "FCS_RNG.1.1": 2,
          "FCS_RNG.1.2": 2
        },
        "FDP": {
          "FDP_ACC": 40,
          "FDP_ACC.1": 17,
          "FDP_ACC.2": 5,
          "FDP_ACF": 38,
          "FDP_ACF.1": 24,
          "FDP_IFC": 25,
          "FDP_IFC.1": 15,
          "FDP_IFC.2": 2,
          "FDP_IFF": 18,
          "FDP_IFF.1": 17,
          "FDP_ITC": 12,
          "FDP_ITC.1": 4,
          "FDP_ITC.2": 13,
          "FDP_ITT.1": 1,
          "FDP_RIP": 135,
          "FDP_RIP.1": 11,
          "FDP_ROL": 16,
          "FDP_ROL.1": 5,
          "FDP_SDI.1": 1,
          "FDP_SDI.2": 13,
          "FDP_SDI.2.1": 1,
          "FDP_SDI.2.2": 1,
          "FDP_UIT": 6,
          "FDP_UIT.1": 2
        },
        "FIA": {
          "FIA_ATD": 9,
          "FIA_ATD.1": 2,
          "FIA_UID": 22,
          "FIA_UID.1": 12,
          "FIA_UID.2": 1,
          "FIA_USB": 6,
          "FIA_USB.1": 3
        },
        "FMT": {
          "FMT_MSA": 135,
          "FMT_MSA.1": 14,
          "FMT_MSA.2": 2,
          "FMT_MSA.3": 22,
          "FMT_MTD": 20,
          "FMT_MTD.1": 2,
          "FMT_MTD.3": 1,
          "FMT_SMF": 41,
          "FMT_SMF.1": 22,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 43,
          "FMT_SMR.1": 37,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPR": {
          "FPR_UNO.1": 13,
          "FPR_UNO.1.1": 1
        },
        "FPT": {
          "FPT_FLS": 36,
          "FPT_FLS.1": 16,
          "FPT_FLS.1.1": 2,
          "FPT_ITT.1": 1,
          "FPT_PHP.3": 1,
          "FPT_RCV": 27,
          "FPT_RCV.3": 13,
          "FPT_RCV.4": 2,
          "FPT_TDC.1": 8,
          "FPT_TDC.1.1": 1,
          "FPT_TDC.1.2": 1,
          "FPT_TST.1": 1
        },
        "FRU": {
          "FRU_FLT.2": 1
        },
        "FTP": {
          "FTP_ITC": 10,
          "FTP_ITC.1": 5,
          "FTP_TRP.1": 2
        }
      },
      "certification_process": {
        "OutOfScope": {
          "Software development environment. Phase 2 covers the Secure IC Development of Infineon and is out of scope of the TOE evaluation as that is part of the IC platform evaluation. In Phase 3, the Chip": 1,
          "a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.RECOVERY and O.OS_SUPPORT are": 1,
          "by the TOE. There are no pre-issuance applets installed. Native code post-issuance downloading is out of scope The SCP is a certified hardware platform \u2013 the SLE78CLFX4000P(M) with RSA2048/4096 v1.02.013, EC v1": 1,
          "out of scope": 3
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 21
        },
        "CCM": {
          "CCM": 1
        },
        "ECB": {
          "ECB": 6
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "Infineon": {
          "v1.02.013": 3
        }
      },
      "crypto_protocol": {},
      "crypto_scheme": {
        "KA": {
          "KA": 2,
          "Key Agreement": 2
        },
        "KEX": {
          "Key exchange": 1
        },
        "MAC": {
          "MAC": 4
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "P-192": 2
        }
      },
      "eval_facility": {
        "TUV": {
          "TUV Informationstechnik": 1,
          "T\u00dcV Informationstechnik": 1
        }
      },
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 3
          }
        },
        "RIPEMD": {
          "RIPEMD-160": 2,
          "RIPEMD160": 1
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 1
          },
          "SHA2": {
            "SHA-2": 5,
            "SHA-224": 1,
            "SHA-256": 1,
            "SHA-384": 1,
            "SHA-512": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {
        "misc": {
          "TYPE_ACCESS": 5
        }
      },
      "javacard_packages": {
        "javacard": {
          "javacard.framework": 4,
          "javacard.security": 3
        },
        "javacardx": {
          "javacardx.crypto": 3,
          "javacardx.external": 1,
          "javacardx.security": 1
        }
      },
      "javacard_version": {
        "JavaCard": {
          "Java Card 3.0.1": 3
        }
      },
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 20,
          "RNG": 11
        },
        "TRNG": {
          "TRNG": 3
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 3,
          "malfunction": 4,
          "physical tampering": 1
        },
        "SCA": {
          "DPA": 4,
          "Leak-Inherent": 2,
          "SPA": 1,
          "physical probing": 3,
          "side channel": 1,
          "timing attacks": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS20": 4,
          "AIS36": 2
        },
        "FIPS": {
          "FIPS 140-2": 1,
          "FIPS 180-4": 6,
          "FIPS 186-3": 7,
          "FIPS 197": 9,
          "FIPS PUB 180-4": 1,
          "FIPS PUB 186-3": 1,
          "FIPS PUB 197": 1,
          "FIPS140": 2
        },
        "ICAO": {
          "ICAO": 6
        },
        "ISO": {
          "ISO/IEC 14443": 2,
          "ISO/IEC 15946-": 5,
          "ISO/IEC 18092": 2,
          "ISO/IEC7816": 2
        },
        "NIST": {
          "NIST SP 800-108": 1,
          "NIST SP 800-38B": 1
        },
        "RFC": {
          "RFC 5639": 5
        },
        "SCP": {
          "SCP 02": 2,
          "SCP 03": 3,
          "SCP01": 2,
          "SCP02": 9,
          "SCP03": 9
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 19
          }
        },
        "DES": {
          "3DES": {
            "TDEA": 1,
            "TDES": 22,
            "Triple-DES": 1
          },
          "DES": {
            "DES": 9
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 1
          }
        },
        "miscellaneous": {
          "SEED": {
            "SEED": 2
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon": 182,
          "Infineon Technologies AG": 2
        },
        "NXP": {
          "NXP Semiconductors": 1
        },
        "STMicroelectronics": {
          "STMicroelectronics": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "T\u00dcV Informationstechnik GmbH, Roland Atoui, Linda Kyrnitszke",
      "/CreationDate": "D:20141120164433+01\u002700\u0027",
      "/Creator": "Microsoft\u00ae Office Word 2007",
      "/Keywords": "Java Card Platform, Smart Card,",
      "/ModDate": "D:20141120164433+01\u002700\u0027",
      "/Producer": "Microsoft\u00ae Office Word 2007",
      "/Subject": "Common Criteria - ASE",
      "/Title": "Security Target Lite - Java Card Platform on SLE 78 (SLJ 52)",
      "pdf_file_size_bytes": 2880995,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.iso.org/iso/iso_catalogue/catalogue_tc/catalogue_detail.htm?csnumber=30656"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 158
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": "EAL4+",
        "pp_ids": {
          "_type": "Set",
          "elements": [
            "ANSSI-CC-PP-2001-03-M01",
            "ANSSI-CC-PP-2010-03",
            "JCSPPC"
          ]
        },
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/ANSSI-CC-profil_PP-2010-03en.pdf",
        "pp_name": "Java Card\u2122 System Protection Profile Open Configuration, Version 3.0"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/0869a_pdf.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_DVS.2",
      "AVA_VAN.5",
      "EAL5+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/0869b_pdf.pdf",
  "state": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState",
    "errors": [],
    "report_convert_garbage": false,
    "report_convert_ok": true,
    "report_download_ok": true,
    "report_extract_ok": true,
    "report_pdf_hash": "4919856aca1390ba0a11287b0ddfa3e9f976f6e678b2b2a2dc44f58e4842fcc2",
    "report_txt_hash": "16970b2f509be251e90601cc89d5bda8e4182f8616c7069cefd49701a354a75d",
    "st_convert_garbage": false,
    "st_convert_ok": true,
    "st_download_ok": true,
    "st_extract_ok": true,
    "st_pdf_hash": "3db4cbb37700c9c4a1a564689053f9f989120c0d09b8dc8720e40c7d776bc7fa",
    "st_txt_hash": "67fedaf86fe2fd88b1299bfe9370da6eac9f84609bf8171fc31bd530d17d0443"
  },
  "status": "archived"
}