Java Card Platform Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0
CSV information ?
Status | archived |
---|---|
Valid from | 17.02.2015 |
Valid until | 17.02.2020 |
Scheme | 🇩🇪 DE |
Manufacturer | Oracle Corporation |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | AVA_VAN.5, EAL5+, ALC_DVS.2 |
Protection profiles |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Symmetric Algorithms
AES, TDES, SEEDAsymmetric Algorithms
ECDH, ECDSA, DSAHash functions
SHA-1, SHA-2, MD5, RIPEMD160, RIPEMDRandomness
TRNG, RNGLibraries
v1.02.013Block cipher modes
CCMVendor
Infineon, Infineon Technologies AGSecurity level
EAL 5, EAL 4, EAL 1, EAL 2, EAL 5+, EAL 6, EAL 3, EAL 7, EAL 5 augmented, ITSEC EvaluationClaims
OE.VERIFICATIONSecurity Assurance Requirements (SAR)
ADV_FSP.5, ADV_INT.2, ADV_TDS.4, ADV_ARC.1, ADV_FSP.1, ADV_FSP.2, ADV_FSP.3, ADV_FSP.4, ADV_FSP.6, ADV_IMP.1, ADV_IMP.2, ADV_INT.1, ADV_INT.3, ADV_SPM.1, ADV_TDS.1, ADV_TDS.2, ADV_TDS.3, ADV_TDS.5, ADV_TDS.6, ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_FLR, ALC_CMS.5, ALC_TAT.2, ALC_CMC.1, ALC_CMC.2, ALC_CMC.3, ALC_CMC.4, ALC_CMC.5, ALC_CMS.1, ALC_CMS.2, ALC_CMS.3, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_FLR.1, ALC_FLR.2, ALC_FLR.3, ALC_LCD.1, ALC_LCD.2, ALC_TAT.1, ALC_TAT.3, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_DPT.3, ATE_COV, ATE_DPT, ATE_FUN, ATE_COV.1, ATE_COV.2, ATE_COV.3, ATE_DPT.1, ATE_DPT.2, ATE_DPT.4, ATE_FUN.1, ATE_FUN.2, ATE_IND.1, ATE_IND.2, ATE_IND.3, ATE_IND, AVA_VAN.5, AVA_VAN, AVA_VAN.1, AVA_VAN.2, AVA_VAN.3, AVA_VAN.4, APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.1, APE_OBJ.2, APE_ECD.1, APE_REQ.1, APE_REQ.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.1, ASE_REQ.2, ASE_TSS.1, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_SPD, ASE_TSSProtection profiles
ANSSI-CC-PP-2010/03-M01Certificates
BSI-DSZ-CC-0869-2015, BSI-DSZ-CC-0782-2012-MA-01, BSI-DSZ-CC-0782-MA-01, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0782Evaluation facilities
TÃœV Informationstechnik, TÃœViTCertification process
out of scope, the TOE, but pre-issuance loading of applets is possible. Native code post-issuance downloading is out of scope. The TOE fulfills the requirements of the Protection Profile Java Card Protection Profile - Open, and certification procedure is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the product or resulting from the evaluation and certification, SLJ 52GxxyyyzR) V1.0, BSI-DSZ-CC-0869-2015, ST Version 2.0, 20 November 2014, Oracle Corporation (confidential document) 9 specifically • AIS 1, Version 13, Durchführung der Ortsbesichtigung in der Entwicklungsumgebung, Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0, BSI-DSZ-CC-0869-2015, TÜViT GmbH (confidential document) [10] Configuration List BSI-DSZ-CC-0869-2015: Configuration Management Scope for Java Card, for Infineon on SLE78 (SLJ 52GxxyyyzR) V 1.0, Version 1.4, 29 January 2015, Oracle Corporation (confidential document) [11] AGD_OPE for Java Card Platform Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0, for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0, Version 1, 30 January 2015, TÜViT GmbH (confidential document) [19] Certification Report – for Infineon Security Controller M7892 B11 with optional RSA2048/4096, ETR for Composition (ETR-COMP), M7892 B11, BSI-DSZ-CC-0782, Version 5, 20 March 2014, TÜViT GmbH (confidential document) [21] SLx 70 Family Production and Personalization User’s Manual, Revision 2012-06-27, InfineonSide-channel analysis
malfunction, JILCertification process
out of scope, the TOE, but pre-issuance loading of applets is possible. Native code post-issuance downloading is out of scope. The TOE fulfills the requirements of the Protection Profile Java Card Protection Profile - Open, and certification procedure is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the product or resulting from the evaluation and certification, SLJ 52GxxyyyzR) V1.0, BSI-DSZ-CC-0869-2015, ST Version 2.0, 20 November 2014, Oracle Corporation (confidential document) 9 specifically • AIS 1, Version 13, Durchführung der Ortsbesichtigung in der Entwicklungsumgebung, Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0, BSI-DSZ-CC-0869-2015, TÜViT GmbH (confidential document) [10] Configuration List BSI-DSZ-CC-0869-2015: Configuration Management Scope for Java Card, for Infineon on SLE78 (SLJ 52GxxyyyzR) V 1.0, Version 1.4, 29 January 2015, Oracle Corporation (confidential document) [11] AGD_OPE for Java Card Platform Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0, for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0, Version 1, 30 January 2015, TÜViT GmbH (confidential document) [19] Certification Report – for Infineon Security Controller M7892 B11 with optional RSA2048/4096, ETR for Composition (ETR-COMP), M7892 B11, BSI-DSZ-CC-0782, Version 5, 20 March 2014, TÜViT GmbH (confidential document) [21] SLx 70 Family Production and Personalization User’s Manual, Revision 2012-06-27, InfineonStandards
AIS 36, AIS20, AIS 34, AIS 26, AIS 20, AIS 35, AIS 1, AIS 25, AIS 32, AIS 46, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065, SCP02, SCP03, SCP01Technical reports
BSI TR-02102, BSI TR-02102-1, BSI 7138, BSI 7125, BSI 7148File metadata
Title: | Certification Report BSI-DSZ-CC-0869-2015 |
---|---|
Subject: | Common Criteria Certification BSI-DSZ-CC-0869-2015 |
Keywords: | Common Criteria, Certification, Zertifizierung, BSI-DSZ-CC-0869-2015, Java Card |
Author: | Bundesamt für Sicherheit in der Informationstechnik |
Creation date: | D:20150227121448+01'00' |
Modification date: | D:20150227130818+01'00' |
Pages: | 40 |
Creator: | Writer |
Producer: | LibreOffice 4.2 |
Frontpage
Certificate ID: | BSI-DSZ-CC-0869-2015 |
---|---|
Certified item: | Java Card Platform Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0 |
Certification lab: | BSI |
Developer: | Oracle Corporation |
References
Outgoing- BSI-DSZ-CC-0782-2012 - Infineon Security Controller M7892 B11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01 and Toolbox v1.02.013 libraries and with specific IC dedicated software (firmware)
- BSI-DSZ-CC-0869-V2-2019 - Java Card Platform Implementation for Infineon on M7892 G12 (SLJ 52GxxyyyzC) V2.0
Security target ?
Extracted keywords
Symmetric Algorithms
AES, DES, TDES, Triple-DES, TDEA, SEED, CMACAsymmetric Algorithms
RSA-CRT, ECDH, ECDSA, ECC, Diffie-Hellman, DSAHash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-2, MD5, RIPEMD160, RIPEMD-160Schemes
MAC, Key exchange, Key Agreement, KARandomness
TRNG, RND, RNGLibraries
v1.02.013Elliptic Curves
P-192Block cipher modes
ECB, CBC, CCMJavaCard versions
Java Card 3.0.1JavaCard API constants
TYPE_ACCESSVendor
NXP Semiconductors, Infineon, Infineon Technologies AG, STMicroelectronicsSecurity level
EAL 5, EAL5, EAL 5 augmented, EAL5 augmentedClaims
D.APP_CODE, D.APP_C_DATA, D.APP_I_DATA, D.PIN, D.API_DATA, D.CRYPTO, D.JCS_CODE, D.JCS_DATA, D.SEC_DATA, D.JCS_KEYS, D.SEC_ATTRIBUTES, D.CM_APDU, O.CARD-MANAGEMENT, O.IC_SUPPORT, O.RECOVERY, O.OS_SUPPORT, O.COMMUNICATION, O.EXT-MEM, O.RND, O.REMOTE, O.DELETION, O.SID, O.FIREWALL, O.GLOBAL_ARRAYS_CONFID, O.GLOBAL_ARRAYS_INTEG, O.NATIVE, O.OPERATE, O.REALLOCATION, O.RESOURCES, O.ALARM, O.CIPHER, O.KEY-MNGT, O.PIN-MNGT, O.TRANSACTION, O.OBJ-DELETION, O.LOAD, O.INSTALL, O.CARD-, O.EXT-, O.APPLET, O.CODE_PKG, O.JAVAOBJECT, O.EXT_MEM_INSTANCE, O.PACKAGE, O.GLOBAL_ARRAYS_C, O.GLOBAL_ARRAYS_IN, O.KEY-, O.PIN-, O.OS, T.CONFID-APPLI-DATA, T.CONFID-JCS-CODE, T.CONFID-JCS-DATA, T.INTEG-APPLI-CODE, T.INTEG-APPLI-DATA, T.INTEG-JCS-CODE, T.INTEG-JCS-DATA, T.SID, T.EXE-CODE, T.NATIVE, T.RESOURCES, T.DELETION, T.INSTALL, T.COMMUNICATION, T.OBJ-DELETION, T.PHYSICAL, T.LEAKAGE, T.FAULT, T.RND, T.CONFID-APPLI-, T.INTEG-APPLI-, T.CONFID-JCS-, T.INTEG-, T.EXE-, T.INTEG-JCS-, A.DELETION, A.APPLET, A.VERIFICATION, R.JAVA, OP.ARRAY_ACCESS, OP.CREATE, OP.LOAD_PCKG, OP.DELETE_APPLET, OP.DELETE_PCKG, OP.DELETE_PCKG_APPLET, OP.GP, OP.INSTANCE_FIELD, OP.INVK_VIRTUAL, OP.INVK_INTERFACE, OP.JAVA, OP.THROW, OP.TYPE_ACCESS, OP.PUT, OP.CREATE_EXT_MEM_INSTANCE, OP.READ_EXT_MEM, OP.WRITE_EXT_MEM, OE.CARD-MANAGEMENT, OE.SCP, OE.CODE-EVIDENCE, OE.APPLET, OE.VERIFICATION, OE.CODE-, OSP.VERIFICATIONSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_TDS.1, ADV_FSP.4, ADV_TDS.3, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, ADV_FSP.5, ADV_FSP.2, ADV_TDS.2, ADV_COMP.1, AGD_OPE, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_TAT.1, ALC_TAT.2, ALC_CMC.4, ALC_CMS.1, ALC_DVS.1, ALC_LCD.1, ALC_CMS.4, ALC_DEL.1, ATE_COV.2, ATE_FUN.1, ATE_COV.1, ATE_DPT.1, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1, ASE_REQ.2, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_ARP.1, FAU_ARP.1.1, FAU_SAA.1, FCO_NRO, FCO_NRO.2, FCS_RNG, FCS_COP, FCS_RNG.1, FCS_CKM.1, FCS_CKM.2, FCS_CKM.2.1, FCS_CKM.3, FCS_CKM.3.1, FCS_CKM.4, FCS_CKM.4.1, FCS_COP.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM, FDP_ACC, FDP_ACC.2, FDP_ACF, FDP_ACF.1, FDP_IFC, FDP_IFC.1, FDP_IFF, FDP_IFF.1, FDP_RIP, FDP_RIP.1, FDP_ROL.1, FDP_ROL, FDP_SDI.2, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ITC, FDP_ITC.2, FDP_IFC.2, FDP_UIT, FDP_UIT.1, FDP_ACC.1, FDP_ITC.1, FDP_SDI.1, FDP_ITT.1, FIA_ATD, FIA_ATD.1, FIA_UID, FIA_UID.2, FIA_USB, FIA_USB.1, FIA_UID.1, FMT_MSA, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD, FMT_MTD.1, FMT_MTD.3, FMT_SMR, FMT_SMF, FPR_UNO.1, FPR_UNO.1.1, FPT_FLS.1, FPT_FLS.1.1, FPT_TDC.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_FLS, FPT_RCV, FPT_RCV.3, FPT_RCV.4, FPT_TST.1, FPT_PHP.3, FPT_ITT.1, FRU_FLT.2, FTP_ITC, FTP_ITC.1, FTP_TRP.1Protection profiles
BSI-PP-0035, BSI-PP-0017-2005, BSI-CC-PP-0035-2007Certificates
BSI-DSZ-CC-0782-MA-01, BSI-DSZ-CC-0869, BSI-DSZ-CC-0782-2012-MA-01Evaluation facilities
TÃœV Informationstechnik, TUV InformationstechnikCertification process
out of scope, by the TOE. There are no pre-issuance applets installed. Native code post-issuance downloading is out of scope The SCP is a certified hardware platform – the SLE78CLFX4000P(M) with RSA2048/4096 v1.02.013, EC v1, Software development environment. Phase 2 covers the Secure IC Development of Infineon and is out of scope of the TOE evaluation as that is part of the IC platform evaluation. In Phase 3, the Chip, a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.RECOVERY and O.OS_SUPPORT areSide-channel analysis
Leak-Inherent, physical probing, side channel, DPA, SPA, timing attacks, physical tampering, malfunction, MalfunctionCertification process
out of scope, by the TOE. There are no pre-issuance applets installed. Native code post-issuance downloading is out of scope The SCP is a certified hardware platform – the SLE78CLFX4000P(M) with RSA2048/4096 v1.02.013, EC v1, Software development environment. Phase 2 covers the Secure IC Development of Infineon and is out of scope of the TOE evaluation as that is part of the IC platform evaluation. In Phase 3, the Chip, a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.RECOVERY and O.OS_SUPPORT areStandards
FIPS 186-3, FIPS140, FIPS 180-4, FIPS 197, FIPS PUB 180-4, FIPS PUB 186-3, FIPS PUB 197, FIPS 140-2, NIST SP 800-108, NIST SP 800-38B, AIS20, AIS36, RFC 5639, ISO/IEC 18092, ISO/IEC7816, ISO/IEC 14443, ISO/IEC 15946-, ICAO, SCP02, SCP03, SCP01, SCP 03, SCP 02File metadata
Title: | Security Target Lite - Java Card Platform on SLE 78 (SLJ 52) |
---|---|
Subject: | Common Criteria - ASE |
Keywords: | Java Card Platform, Smart Card, |
Author: | TÃœV Informationstechnik GmbH, Roland Atoui, Linda Kyrnitszke |
Creation date: | D:20141120164433+01'00' |
Modification date: | D:20141120164433+01'00' |
Pages: | 158 |
Creator: | Microsoft® Office Word 2007 |
Producer: | Microsoft® Office Word 2007 |
References
OutgoingHeuristics ?
Extracted SARs
AGD_PRE.1, APE_REQ.2, ASE_REQ.2, ASE_OBJ.2, ALC_FLR.3, AGD_OPE.1, ASE_TSS.1, ALC_CMC.4, ADV_COMP.1, ADV_FSP.5, ASE_CCL.1, ASE_INT.1, AVA_VAN.5, ADV_TDS.4, APE_CCL.1, ALC_DEL.1, ASE_ECD.1, ALC_LCD.1, ATE_FUN.1, ADV_INT.2, ALC_DVS.2, ATE_DPT.1, APE_SPD.1, APE_OBJ.2, APE_ECD.1, ADV_SPM.1, ASE_SPD.1, ALC_CMS.4, ATE_COV.2, ADV_IMP.1, ADV_ARC.1, ALC_TAT.2, ATE_IND.3, APE_INT.1References ?
Updates ?
-
15.02.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The following values were inserted:
{'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '4919856aca1390ba0a11287b0ddfa3e9f976f6e678b2b2a2dc44f58e4842fcc2', 'txt_hash': '16970b2f509be251e90601cc89d5bda8e4182f8616c7069cefd49701a354a75d'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '3db4cbb37700c9c4a1a564689053f9f989120c0d09b8dc8720e40c7d776bc7fa', 'txt_hash': '67fedaf86fe2fd88b1299bfe9370da6eac9f84609bf8171fc31bd530d17d0443'}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}}
. - The following properties were deleted:
['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash']
.
The PDF extraction data was updated.
- The following values were inserted:
{'cert_metadata': None, 'cert_frontpage': None, 'cert_keywords': None, 'cert_filename': None}
. - The report_frontpage property was set to
{'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-0869-2015', 'cert_item': 'Java Card Platform Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0', 'developer': 'Oracle Corporation', 'cert_lab': 'BSI', 'ref_protection_profiles': 'Java Card Protection Profile - Open Configuration, Version 3.0, May 2012, ANSSI-CC-PP-2010/03-M01', 'cc_version': 'PP conformant including optional package EMG plus product specific extensions Common Criteria Part 2 extended', 'cc_security_level': 'Common Criteria Part 3 conformant EAL 5 augmented by ALC_DVS.2 and AVA_VAN.5 Valid until (*): 17 February 2020 SOGIS Recognition Agreement'}}
. - The st_frontpage property was set to
None
. - The report_keywords property was updated, with the
{'cc_cert_id': {'__update__': {'DE': {'__insert__': {'BSI-DSZ-CC-0782-2012-MA-01': 2, 'BSI-DSZ-CC-0782-MA-01': 2, 'BSI-DSZ-CC-0782': 1}, '__update__': {'BSI-DSZ-CC-0869-2015': 24, 'BSI-DSZ-CC-0782-2012': 2}}}}}
data. - The st_keywords property was updated, with the
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0782-MA-01': 2, 'BSI-DSZ-CC-0869': 1, 'BSI-DSZ-CC-0782-2012-MA-01': 1}}}
data.
The computed heuristics were updated.
- The report_references property was updated, with the
{'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['C0648', 'C0649']}, '__add__': {'_type': 'Set', 'elements': ['JISEC-CC-CRP-C0649-01-2019', 'JISEC-CC-CRP-C0648-01-2019']}}}
data.
- The following values were inserted:
-
13.02.2024 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0869-2015': 48, 'BSI-DSZ-CC-0782-2012': 4}, '__delete__': ['BSI-DSZ-CC-0782-2012-MA-01', 'BSI-DSZ-CC-0782-MA-01', 'BSI-DSZ-CC-0782']}}}}
data. - The st_keywords property was updated, with the
{'cc_cert_id': {}}
data.
The computed heuristics were updated.
- The report_references property was updated, with the
{'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['JISEC-CC-CRP-C0649-01-2019', 'JISEC-CC-CRP-C0648-01-2019']}, '__add__': {'_type': 'Set', 'elements': ['C0649', 'C0648']}}}
data.
- The report_keywords property was updated, with the
-
07.02.2024 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'cc_cert_id': {'__delete__': ['CA']}}
data.
- The report_keywords property was updated, with the
-
07.02.2024 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'cc_cert_id': {'__insert__': {'CA': {'1 1 1': 18, '1 2 3': 5, '5 5 6': 1, '1 1 2': 1, '2 3 3': 1, '4 5 5': 2, '5 5 5': 1, '1 2 2': 5, '2 2 2': 2, '1 1 3': 1, '2 2 3': 1}}, '__update__': {'DE': {'__insert__': {'BSI-DSZ-CC-0782-2012-MA-01': 2, 'BSI-DSZ-CC-0782-MA-01': 2, 'BSI-DSZ-CC-0782': 1}, '__update__': {'BSI-DSZ-CC-0869-2015': 24, 'BSI-DSZ-CC-0782-2012': 2}}}}}
data. - The st_keywords property was updated, with the
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0782-MA-01': 2, 'BSI-DSZ-CC-0869': 1, 'BSI-DSZ-CC-0782-2012-MA-01': 1}}}
data.
The computed heuristics were updated.
- The report_references property was updated, with the
{'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['C0649', 'C0648']}, '__add__': {'_type': 'Set', 'elements': ['JISEC-CC-CRP-C0649-01-2019', 'JISEC-CC-CRP-C0648-01-2019']}}}
data.
- The report_keywords property was updated, with the
-
04.01.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'annotated_references': None}
.
- The following values were inserted:
-
26.04.2023 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'scheme_data': None}
.
- The following values were inserted:
-
11.02.2023 The certificate data changed.
Certificate changed
The _type was updated.
- The new value is
sec_certs.sample.cc.CCCertificate
.
The state of the certificate object was updated.
- The _type property was set to
sec_certs.sample.cc.CCCertificate.InternalState
. - The following properties were deleted:
['errors']
.
The PDF extraction data was updated.
- The _type property was set to
sec_certs.sample.cc.CCCertificate.PdfData
.
The computed heuristics were updated.
- The following values were inserted:
{'direct_transitive_cves': None, 'indirect_transitive_cves': None}
. - The _type property was set to
sec_certs.sample.cc.CCCertificate.Heuristics
. - The following properties were deleted:
['direct_dependency_cves', 'indirect_dependency_cves']
.
- The new value is
-
26.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
True
. - The st_convert_ok property was set to
True
. - The st_extract_ok property was set to
True
. - The errors property was set to
[]
. - The st_pdf_hash property was set to
3db4cbb37700c9c4a1a564689053f9f989120c0d09b8dc8720e40c7d776bc7fa
. - The st_txt_hash property was set to
67fedaf86fe2fd88b1299bfe9370da6eac9f84609bf8171fc31bd530d17d0443
.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 2880995, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 158, '/Title': 'Security Target Lite - Java Card Platform on SLE 78 (SLJ 52)', '/Author': 'TÜV Informationstechnik GmbH, Roland Atoui, Linda Kyrnitszke', '/Subject': 'Common Criteria - ASE', '/Keywords': 'Java Card Platform, Smart Card,', '/Creator': 'Microsoft® Office Word 2007', '/CreationDate': "D:20141120164433+01'00'", '/ModDate': "D:20141120164433+01'00'", '/Producer': 'Microsoft® Office Word 2007', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.iso.org/iso/iso_catalogue/catalogue_tc/catalogue_detail.htm?csnumber=30656']}}
. - The st_frontpage property was set to
{'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0035': 1, 'BSI-PP-0017-2005': 1, 'BSI-CC-PP-0035-2007': 1}}, 'cc_security_level': {'EAL': {'EAL 5': 1, 'EAL5': 6, 'EAL 5 augmented': 1, 'EAL5 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 6, 'ADV_FSP.1': 4, 'ADV_TDS.1': 2, 'ADV_FSP.4': 2, 'ADV_TDS.3': 10, 'ADV_IMP.1': 9, 'ADV_INT.2': 1, 'ADV_TDS.4': 1, 'ADV_FSP.5': 7, 'ADV_FSP.2': 2, 'ADV_TDS.2': 1, 'ADV_COMP.1': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1, 'AGD_OPE.1': 10, 'AGD_PRE.1': 6}, 'ALC': {'ALC_DVS.2': 6, 'ALC_TAT.1': 2, 'ALC_TAT.2': 3, 'ALC_CMC.4': 1, 'ALC_CMS.1': 1, 'ALC_DVS.1': 2, 'ALC_LCD.1': 3, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.2': 3, 'ATE_FUN.1': 6, 'ATE_COV.1': 2, 'ATE_DPT.1': 2}, 'AVA': {'AVA_VAN.5': 6}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 4, 'ASE_INT.1': 5, 'ASE_REQ.1': 2, 'ASE_REQ.2': 2, 'ASE_OBJ.2': 3, 'ASE_SPD.1': 2, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 24, 'FAU_ARP.1.1': 1, 'FAU_SAA.1': 3}, 'FCO': {'FCO_NRO': 6, 'FCO_NRO.2': 6}, 'FCS': {'FCS_RNG': 4, 'FCS_COP': 32, 'FCS_RNG.1': 14, 'FCS_CKM.1': 19, 'FCS_CKM.2': 11, 'FCS_CKM.2.1': 1, 'FCS_CKM.3': 7, 'FCS_CKM.3.1': 1, 'FCS_CKM.4': 17, 'FCS_CKM.4.1': 1, 'FCS_COP.1': 26, 'FCS_RNG.1.1': 2, 'FCS_RNG.1.2': 2, 'FCS_CKM': 6}, 'FDP': {'FDP_ACC': 40, 'FDP_ACC.2': 5, 'FDP_ACF': 38, 'FDP_ACF.1': 24, 'FDP_IFC': 25, 'FDP_IFC.1': 15, 'FDP_IFF': 18, 'FDP_IFF.1': 17, 'FDP_RIP': 135, 'FDP_RIP.1': 11, 'FDP_ROL.1': 5, 'FDP_ROL': 16, 'FDP_SDI.2': 13, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_ITC': 12, 'FDP_ITC.2': 13, 'FDP_IFC.2': 2, 'FDP_UIT': 6, 'FDP_UIT.1': 2, 'FDP_ACC.1': 17, 'FDP_ITC.1': 4, 'FDP_SDI.1': 1, 'FDP_ITT.1': 1}, 'FIA': {'FIA_ATD': 9, 'FIA_ATD.1': 2, 'FIA_UID': 22, 'FIA_UID.2': 1, 'FIA_USB': 6, 'FIA_USB.1': 3, 'FIA_UID.1': 12}, 'FMT': {'FMT_MSA': 135, 'FMT_MSA.1': 14, 'FMT_MSA.2': 2, 'FMT_MSA.3': 22, 'FMT_SMF.1': 22, 'FMT_SMF.1.1': 1, 'FMT_SMR.1': 37, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MTD': 20, 'FMT_MTD.1': 2, 'FMT_MTD.3': 1, 'FMT_SMR': 43, 'FMT_SMF': 41}, 'FPR': {'FPR_UNO.1': 13, 'FPR_UNO.1.1': 1}, 'FPT': {'FPT_FLS.1': 16, 'FPT_FLS.1.1': 2, 'FPT_TDC.1': 8, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 1, 'FPT_FLS': 36, 'FPT_RCV': 27, 'FPT_RCV.3': 13, 'FPT_RCV.4': 2, 'FPT_TST.1': 1, 'FPT_PHP.3': 1, 'FPT_ITT.1': 1}, 'FRU': {'FRU_FLT.2': 1}, 'FTP': {'FTP_ITC': 10, 'FTP_ITC.1': 5, 'FTP_TRP.1': 2}}, 'cc_claims': {'D': {'D.APP_CODE': 7, 'D.APP_C_DATA': 3, 'D.APP_I_DATA': 5, 'D.PIN': 6, 'D.API_DATA': 3, 'D.CRYPTO': 6, 'D.JCS_CODE': 3, 'D.JCS_DATA': 4, 'D.SEC_DATA': 8, 'D.JCS_KEYS': 3, 'D.SEC_ATTRIBUTES': 2, 'D.CM_APDU': 1}, 'O': {'O.CARD-MANAGEMENT': 33, 'O.IC_SUPPORT': 17, 'O.RECOVERY': 24, 'O.OS_SUPPORT': 23, 'O.COMMUNICATION': 11, 'O.EXT-MEM': 20, 'O.RND': 14, 'O.REMOTE': 1, 'O.DELETION': 15, 'O.SID': 35, 'O.FIREWALL': 46, 'O.GLOBAL_ARRAYS_CONFID': 17, 'O.GLOBAL_ARRAYS_INTEG': 9, 'O.NATIVE': 13, 'O.OPERATE': 35, 'O.REALLOCATION': 17, 'O.RESOURCES': 24, 'O.ALARM': 21, 'O.CIPHER': 16, 'O.KEY-MNGT': 24, 'O.PIN-MNGT': 22, 'O.TRANSACTION': 18, 'O.OBJ-DELETION': 8, 'O.LOAD': 18, 'O.INSTALL': 15, 'O.CARD-': 6, 'O.EXT-': 1, 'O.APPLET': 19, 'O.CODE_PKG': 16, 'O.JAVAOBJECT': 41, 'O.EXT_MEM_INSTANCE': 10, 'O.PACKAGE': 2, 'O.GLOBAL_ARRAYS_C': 1, 'O.GLOBAL_ARRAYS_IN': 1, 'O.KEY-': 1, 'O.PIN-': 1, 'O.OS': 1}, 'T': {'T.CONFID-APPLI-DATA': 17, 'T.CONFID-JCS-CODE': 6, 'T.CONFID-JCS-DATA': 6, 'T.INTEG-APPLI-CODE': 9, 'T.INTEG-APPLI-DATA': 18, 'T.INTEG-JCS-CODE': 8, 'T.INTEG-JCS-DATA': 7, 'T.SID': 19, 'T.EXE-CODE': 8, 'T.NATIVE': 6, 'T.RESOURCES': 9, 'T.DELETION': 5, 'T.INSTALL': 6, 'T.COMMUNICATION': 5, 'T.OBJ-DELETION': 4, 'T.PHYSICAL': 8, 'T.LEAKAGE': 5, 'T.FAULT': 5, 'T.RND': 5, 'T.CONFID-APPLI-': 3, 'T.INTEG-APPLI-': 10, 'T.CONFID-JCS-': 8, 'T.INTEG-': 10, 'T.EXE-': 1, 'T.INTEG-JCS-': 1}, 'A': {'A.DELETION': 1, 'A.APPLET': 6, 'A.VERIFICATION': 6}, 'R': {'R.JAVA': 12}, 'OP': {'OP.ARRAY_ACCESS': 4, 'OP.CREATE': 7, 'OP.LOAD_PCKG': 1, 'OP.DELETE_APPLET': 4, 'OP.DELETE_PCKG': 3, 'OP.DELETE_PCKG_APPLET': 3, 'OP.GP': 3, 'OP.INSTANCE_FIELD': 4, 'OP.INVK_VIRTUAL': 6, 'OP.INVK_INTERFACE': 7, 'OP.JAVA': 5, 'OP.THROW': 5, 'OP.TYPE_ACCESS': 5, 'OP.PUT': 6, 'OP.CREATE_EXT_MEM_INSTANCE': 3, 'OP.READ_EXT_MEM': 3, 'OP.WRITE_EXT_MEM': 3}, 'OE': {'OE.CARD-MANAGEMENT': 2, 'OE.SCP': 6, 'OE.CODE-EVIDENCE': 17, 'OE.APPLET': 8, 'OE.VERIFICATION': 38, 'OE.CODE-': 4}, 'OSP': {'OSP.VERIFICATION': 6}}, 'vendor': {'NXP': {'NXP Semiconductors': 1}, 'Infineon': {'Infineon': 182, 'Infineon Technologies AG': 2}, 'STMicroelectronics': {'STMicroelectronics': 1}}, 'eval_facility': {'TUV': {'TÜV Informationstechnik': 1, 'TUV Informationstechnik': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 19}}, 'DES': {'DES': {'DES': 9}, '3DES': {'TDES': 22, 'Triple-DES': 1, 'TDEA': 1}}, 'miscellaneous': {'SEED': {'SEED': 2}}, 'constructions': {'MAC': {'CMAC': 1}}}, 'asymmetric_crypto': {'RSA': {'RSA-CRT': 3}, 'ECC': {'ECDH': {'ECDH': 5}, 'ECDSA': {'ECDSA': 10}, 'ECC': {'ECC': 11}}, 'FF': {'DH': {'Diffie-Hellman': 1}, 'DSA': {'DSA': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}, 'SHA2': {'SHA-224': 1, 'SHA-256': 1, 'SHA-384': 1, 'SHA-512': 1, 'SHA-2': 5}}, 'MD': {'MD5': {'MD5': 3}}, 'RIPEMD': {'RIPEMD160': 1, 'RIPEMD-160': 2}}, 'crypto_scheme': {'MAC': {'MAC': 4}, 'KEX': {'Key exchange': 1}, 'KA': {'Key Agreement': 2, 'KA': 2}}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 3}, 'RNG': {'RND': 20, 'RNG': 11}}, 'cipher_mode': {'ECB': {'ECB': 6}, 'CBC': {'CBC': 21}, 'CCM': {'CCM': 1}}, 'ecc_curve': {'NIST': {'P-192': 2}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Infineon': {'v1.02.013': 3}}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 2, 'physical probing': 3, 'side channel': 1, 'DPA': 4, 'SPA': 1, 'timing attacks': 1}, 'FI': {'physical tampering': 1, 'malfunction': 4, 'Malfunction': 3}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 186-3': 7, 'FIPS140': 2, 'FIPS 180-4': 6, 'FIPS 197': 9, 'FIPS PUB 180-4': 1, 'FIPS PUB 186-3': 1, 'FIPS PUB 197': 1, 'FIPS 140-2': 1}, 'NIST': {'NIST SP 800-108': 1, 'NIST SP 800-38B': 1}, 'BSI': {'AIS20': 4, 'AIS36': 2}, 'RFC': {'RFC 5639': 5}, 'ISO': {'ISO/IEC 18092': 2, 'ISO/IEC7816': 2, 'ISO/IEC 14443': 2, 'ISO/IEC 15946-': 5}, 'ICAO': {'ICAO': 6}, 'SCP': {'SCP02': 9, 'SCP03': 9, 'SCP01': 2, 'SCP 03': 3, 'SCP 02': 2}}, 'javacard_version': {'JavaCard': {'Java Card 3.0.1': 3}}, 'javacard_api_const': {'misc': {'TYPE_ACCESS': 5}}, 'javacard_packages': {'javacard': {'javacard.security': 3, 'javacard.framework': 4}, 'javacardx': {'javacardx.crypto': 3, 'javacardx.security': 1, 'javacardx.external': 1}}, 'certification_process': {'OutOfScope': {'out of scope': 3, 'by the TOE. There are no pre-issuance applets installed. Native code post-issuance downloading is out of scope The SCP is a certified hardware platform – the SLE78CLFX4000P(M) with RSA2048/4096 v1.02.013, EC v1': 1, 'Software development environment. Phase 2 covers the Secure IC Development of Infineon and is out of scope of the TOE evaluation as that is part of the IC platform evaluation. In Phase 3, the Chip': 1, 'a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.RECOVERY and O.OS_SUPPORT are': 1}}}
. - The st_filename property was set to
0869b_pdf.pdf
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}]}
values added.
- The st_download_ok property was set to
-
25.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
False
. - The st_convert_ok property was set to
False
. - The st_extract_ok property was set to
False
. - The errors property was set to
['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/0869a_pdf.pdf, code: nok', 'failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/0869b_pdf.pdf, code: 408']
. - The st_pdf_hash property was set to
None
. - The st_txt_hash property was set to
None
.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_frontpage property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The report_references property was updated, with the
{'indirectly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['C0649']}}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 6}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 6}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}]}
values added.
- The st_download_ok property was set to
-
25.12.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The report_references property was updated, with the
{'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['C0649']}}}
data.
- The report_references property was updated, with the
-
24.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
True
. - The st_convert_ok property was set to
True
. - The st_extract_ok property was set to
True
. - The errors property was set to
[]
. - The st_pdf_hash property was set to
3db4cbb37700c9c4a1a564689053f9f989120c0d09b8dc8720e40c7d776bc7fa
. - The st_txt_hash property was set to
67fedaf86fe2fd88b1299bfe9370da6eac9f84609bf8171fc31bd530d17d0443
.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 2880995, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 158, '/Title': 'Security Target Lite - Java Card Platform on SLE 78 (SLJ 52)', '/Author': 'TÜV Informationstechnik GmbH, Roland Atoui, Linda Kyrnitszke', '/Subject': 'Common Criteria - ASE', '/Keywords': 'Java Card Platform, Smart Card,', '/Creator': 'Microsoft® Office Word 2007', '/CreationDate': "D:20141120164433+01'00'", '/ModDate': "D:20141120164433+01'00'", '/Producer': 'Microsoft® Office Word 2007', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.iso.org/iso/iso_catalogue/catalogue_tc/catalogue_detail.htm?csnumber=30656']}}
. - The st_frontpage property was set to
{'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0035': 1, 'BSI-PP-0017-2005': 1, 'BSI-CC-PP-0035-2007': 1}}, 'cc_security_level': {'EAL': {'EAL 5': 1, 'EAL5': 6, 'EAL 5 augmented': 1, 'EAL5 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 6, 'ADV_FSP.1': 4, 'ADV_TDS.1': 2, 'ADV_FSP.4': 2, 'ADV_TDS.3': 10, 'ADV_IMP.1': 9, 'ADV_INT.2': 1, 'ADV_TDS.4': 1, 'ADV_FSP.5': 7, 'ADV_FSP.2': 2, 'ADV_TDS.2': 1, 'ADV_COMP.1': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1, 'AGD_OPE.1': 10, 'AGD_PRE.1': 6}, 'ALC': {'ALC_DVS.2': 6, 'ALC_TAT.1': 2, 'ALC_TAT.2': 3, 'ALC_CMC.4': 1, 'ALC_CMS.1': 1, 'ALC_DVS.1': 2, 'ALC_LCD.1': 3, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.2': 3, 'ATE_FUN.1': 6, 'ATE_COV.1': 2, 'ATE_DPT.1': 2}, 'AVA': {'AVA_VAN.5': 6}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 4, 'ASE_INT.1': 5, 'ASE_REQ.1': 2, 'ASE_REQ.2': 2, 'ASE_OBJ.2': 3, 'ASE_SPD.1': 2, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 24, 'FAU_ARP.1.1': 1, 'FAU_SAA.1': 3}, 'FCO': {'FCO_NRO': 6, 'FCO_NRO.2': 6}, 'FCS': {'FCS_RNG': 4, 'FCS_COP': 32, 'FCS_RNG.1': 14, 'FCS_CKM.1': 19, 'FCS_CKM.2': 11, 'FCS_CKM.2.1': 1, 'FCS_CKM.3': 7, 'FCS_CKM.3.1': 1, 'FCS_CKM.4': 17, 'FCS_CKM.4.1': 1, 'FCS_COP.1': 26, 'FCS_RNG.1.1': 2, 'FCS_RNG.1.2': 2, 'FCS_CKM': 6}, 'FDP': {'FDP_ACC': 40, 'FDP_ACC.2': 5, 'FDP_ACF': 38, 'FDP_ACF.1': 24, 'FDP_IFC': 25, 'FDP_IFC.1': 15, 'FDP_IFF': 18, 'FDP_IFF.1': 17, 'FDP_RIP': 135, 'FDP_RIP.1': 11, 'FDP_ROL.1': 5, 'FDP_ROL': 16, 'FDP_SDI.2': 13, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_ITC': 12, 'FDP_ITC.2': 13, 'FDP_IFC.2': 2, 'FDP_UIT': 6, 'FDP_UIT.1': 2, 'FDP_ACC.1': 17, 'FDP_ITC.1': 4, 'FDP_SDI.1': 1, 'FDP_ITT.1': 1}, 'FIA': {'FIA_ATD': 9, 'FIA_ATD.1': 2, 'FIA_UID': 22, 'FIA_UID.2': 1, 'FIA_USB': 6, 'FIA_USB.1': 3, 'FIA_UID.1': 12}, 'FMT': {'FMT_MSA': 135, 'FMT_MSA.1': 14, 'FMT_MSA.2': 2, 'FMT_MSA.3': 22, 'FMT_SMF.1': 22, 'FMT_SMF.1.1': 1, 'FMT_SMR.1': 37, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MTD': 20, 'FMT_MTD.1': 2, 'FMT_MTD.3': 1, 'FMT_SMR': 43, 'FMT_SMF': 41}, 'FPR': {'FPR_UNO.1': 13, 'FPR_UNO.1.1': 1}, 'FPT': {'FPT_FLS.1': 16, 'FPT_FLS.1.1': 2, 'FPT_TDC.1': 8, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 1, 'FPT_FLS': 36, 'FPT_RCV': 27, 'FPT_RCV.3': 13, 'FPT_RCV.4': 2, 'FPT_TST.1': 1, 'FPT_PHP.3': 1, 'FPT_ITT.1': 1}, 'FRU': {'FRU_FLT.2': 1}, 'FTP': {'FTP_ITC': 10, 'FTP_ITC.1': 5, 'FTP_TRP.1': 2}}, 'cc_claims': {'D': {'D.APP_CODE': 7, 'D.APP_C_DATA': 3, 'D.APP_I_DATA': 5, 'D.PIN': 6, 'D.API_DATA': 3, 'D.CRYPTO': 6, 'D.JCS_CODE': 3, 'D.JCS_DATA': 4, 'D.SEC_DATA': 8, 'D.JCS_KEYS': 3, 'D.SEC_ATTRIBUTES': 2, 'D.CM_APDU': 1}, 'O': {'O.CARD-MANAGEMENT': 33, 'O.IC_SUPPORT': 17, 'O.RECOVERY': 24, 'O.OS_SUPPORT': 23, 'O.COMMUNICATION': 11, 'O.EXT-MEM': 20, 'O.RND': 14, 'O.REMOTE': 1, 'O.DELETION': 15, 'O.SID': 35, 'O.FIREWALL': 46, 'O.GLOBAL_ARRAYS_CONFID': 17, 'O.GLOBAL_ARRAYS_INTEG': 9, 'O.NATIVE': 13, 'O.OPERATE': 35, 'O.REALLOCATION': 17, 'O.RESOURCES': 24, 'O.ALARM': 21, 'O.CIPHER': 16, 'O.KEY-MNGT': 24, 'O.PIN-MNGT': 22, 'O.TRANSACTION': 18, 'O.OBJ-DELETION': 8, 'O.LOAD': 18, 'O.INSTALL': 15, 'O.CARD-': 6, 'O.EXT-': 1, 'O.APPLET': 19, 'O.CODE_PKG': 16, 'O.JAVAOBJECT': 41, 'O.EXT_MEM_INSTANCE': 10, 'O.PACKAGE': 2, 'O.GLOBAL_ARRAYS_C': 1, 'O.GLOBAL_ARRAYS_IN': 1, 'O.KEY-': 1, 'O.PIN-': 1, 'O.OS': 1}, 'T': {'T.CONFID-APPLI-DATA': 17, 'T.CONFID-JCS-CODE': 6, 'T.CONFID-JCS-DATA': 6, 'T.INTEG-APPLI-CODE': 9, 'T.INTEG-APPLI-DATA': 18, 'T.INTEG-JCS-CODE': 8, 'T.INTEG-JCS-DATA': 7, 'T.SID': 19, 'T.EXE-CODE': 8, 'T.NATIVE': 6, 'T.RESOURCES': 9, 'T.DELETION': 5, 'T.INSTALL': 6, 'T.COMMUNICATION': 5, 'T.OBJ-DELETION': 4, 'T.PHYSICAL': 8, 'T.LEAKAGE': 5, 'T.FAULT': 5, 'T.RND': 5, 'T.CONFID-APPLI-': 3, 'T.INTEG-APPLI-': 10, 'T.CONFID-JCS-': 8, 'T.INTEG-': 10, 'T.EXE-': 1, 'T.INTEG-JCS-': 1}, 'A': {'A.DELETION': 1, 'A.APPLET': 6, 'A.VERIFICATION': 6}, 'R': {'R.JAVA': 12}, 'OP': {'OP.ARRAY_ACCESS': 4, 'OP.CREATE': 7, 'OP.LOAD_PCKG': 1, 'OP.DELETE_APPLET': 4, 'OP.DELETE_PCKG': 3, 'OP.DELETE_PCKG_APPLET': 3, 'OP.GP': 3, 'OP.INSTANCE_FIELD': 4, 'OP.INVK_VIRTUAL': 6, 'OP.INVK_INTERFACE': 7, 'OP.JAVA': 5, 'OP.THROW': 5, 'OP.TYPE_ACCESS': 5, 'OP.PUT': 6, 'OP.CREATE_EXT_MEM_INSTANCE': 3, 'OP.READ_EXT_MEM': 3, 'OP.WRITE_EXT_MEM': 3}, 'OE': {'OE.CARD-MANAGEMENT': 2, 'OE.SCP': 6, 'OE.CODE-EVIDENCE': 17, 'OE.APPLET': 8, 'OE.VERIFICATION': 38, 'OE.CODE-': 4}, 'OSP': {'OSP.VERIFICATION': 6}}, 'vendor': {'NXP': {'NXP Semiconductors': 1}, 'Infineon': {'Infineon': 182, 'Infineon Technologies AG': 2}, 'STMicroelectronics': {'STMicroelectronics': 1}}, 'eval_facility': {'TUV': {'TÜV Informationstechnik': 1, 'TUV Informationstechnik': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 19}}, 'DES': {'DES': {'DES': 9}, '3DES': {'TDES': 22, 'Triple-DES': 1, 'TDEA': 1}}, 'miscellaneous': {'SEED': {'SEED': 2}}, 'constructions': {'MAC': {'CMAC': 1}}}, 'asymmetric_crypto': {'RSA': {'RSA-CRT': 3}, 'ECC': {'ECDH': {'ECDH': 5}, 'ECDSA': {'ECDSA': 10}, 'ECC': {'ECC': 11}}, 'FF': {'DH': {'Diffie-Hellman': 1}, 'DSA': {'DSA': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}, 'SHA2': {'SHA-224': 1, 'SHA-256': 1, 'SHA-384': 1, 'SHA-512': 1, 'SHA-2': 5}}, 'MD': {'MD5': {'MD5': 3}}, 'RIPEMD': {'RIPEMD160': 1, 'RIPEMD-160': 2}}, 'crypto_scheme': {'MAC': {'MAC': 4}, 'KEX': {'Key exchange': 1}, 'KA': {'Key Agreement': 2, 'KA': 2}}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 3}, 'RNG': {'RND': 20, 'RNG': 11}}, 'cipher_mode': {'ECB': {'ECB': 6}, 'CBC': {'CBC': 21}, 'CCM': {'CCM': 1}}, 'ecc_curve': {'NIST': {'P-192': 2}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Infineon': {'v1.02.013': 3}}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 2, 'physical probing': 3, 'side channel': 1, 'DPA': 4, 'SPA': 1, 'timing attacks': 1}, 'FI': {'physical tampering': 1, 'malfunction': 4, 'Malfunction': 3}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 186-3': 7, 'FIPS140': 2, 'FIPS 180-4': 6, 'FIPS 197': 9, 'FIPS PUB 180-4': 1, 'FIPS PUB 186-3': 1, 'FIPS PUB 197': 1, 'FIPS 140-2': 1}, 'NIST': {'NIST SP 800-108': 1, 'NIST SP 800-38B': 1}, 'BSI': {'AIS20': 4, 'AIS36': 2}, 'RFC': {'RFC 5639': 5}, 'ISO': {'ISO/IEC 18092': 2, 'ISO/IEC7816': 2, 'ISO/IEC 14443': 2, 'ISO/IEC 15946-': 5}, 'ICAO': {'ICAO': 6}, 'SCP': {'SCP02': 9, 'SCP03': 9, 'SCP01': 2, 'SCP 03': 3, 'SCP 02': 2}}, 'javacard_version': {'JavaCard': {'Java Card 3.0.1': 3}}, 'javacard_api_const': {'misc': {'TYPE_ACCESS': 5}}, 'javacard_packages': {'javacard': {'javacard.security': 3, 'javacard.framework': 4}, 'javacardx': {'javacardx.crypto': 3, 'javacardx.security': 1, 'javacardx.external': 1}}, 'certification_process': {'OutOfScope': {'out of scope': 3, 'by the TOE. There are no pre-issuance applets installed. Native code post-issuance downloading is out of scope The SCP is a certified hardware platform – the SLE78CLFX4000P(M) with RSA2048/4096 v1.02.013, EC v1': 1, 'Software development environment. Phase 2 covers the Secure IC Development of Infineon and is out of scope of the TOE evaluation as that is part of the IC platform evaluation. In Phase 3, the Chip': 1, 'a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.RECOVERY and O.OS_SUPPORT are': 1}}}
. - The st_filename property was set to
0869b_pdf.pdf
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}]}
values added.
- The st_download_ok property was set to
-
24.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
False
. - The st_convert_ok property was set to
False
. - The st_extract_ok property was set to
False
. - The errors property was set to
['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/0869b_pdf.pdf, code: nok']
. - The st_pdf_hash property was set to
None
. - The st_txt_hash property was set to
None
.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_frontpage property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The report_references property was updated, with the
{'indirectly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['C0648']}}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 6}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 6}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}]}
values added.
- The st_download_ok property was set to
-
23.12.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The report_references property was updated, with the
{'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['C0648']}}}
data.
- The report_references property was updated, with the
-
23.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
True
. - The st_convert_ok property was set to
True
. - The st_extract_ok property was set to
True
. - The errors property was set to
[]
. - The st_pdf_hash property was set to
3db4cbb37700c9c4a1a564689053f9f989120c0d09b8dc8720e40c7d776bc7fa
. - The st_txt_hash property was set to
67fedaf86fe2fd88b1299bfe9370da6eac9f84609bf8171fc31bd530d17d0443
.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 2880995, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 158, '/Title': 'Security Target Lite - Java Card Platform on SLE 78 (SLJ 52)', '/Author': 'TÜV Informationstechnik GmbH, Roland Atoui, Linda Kyrnitszke', '/Subject': 'Common Criteria - ASE', '/Keywords': 'Java Card Platform, Smart Card,', '/Creator': 'Microsoft® Office Word 2007', '/CreationDate': "D:20141120164433+01'00'", '/ModDate': "D:20141120164433+01'00'", '/Producer': 'Microsoft® Office Word 2007', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.iso.org/iso/iso_catalogue/catalogue_tc/catalogue_detail.htm?csnumber=30656']}}
. - The st_frontpage property was set to
{'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0035': 1, 'BSI-PP-0017-2005': 1, 'BSI-CC-PP-0035-2007': 1}}, 'cc_security_level': {'EAL': {'EAL 5': 1, 'EAL5': 6, 'EAL 5 augmented': 1, 'EAL5 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 6, 'ADV_FSP.1': 4, 'ADV_TDS.1': 2, 'ADV_FSP.4': 2, 'ADV_TDS.3': 10, 'ADV_IMP.1': 9, 'ADV_INT.2': 1, 'ADV_TDS.4': 1, 'ADV_FSP.5': 7, 'ADV_FSP.2': 2, 'ADV_TDS.2': 1, 'ADV_COMP.1': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1, 'AGD_OPE.1': 10, 'AGD_PRE.1': 6}, 'ALC': {'ALC_DVS.2': 6, 'ALC_TAT.1': 2, 'ALC_TAT.2': 3, 'ALC_CMC.4': 1, 'ALC_CMS.1': 1, 'ALC_DVS.1': 2, 'ALC_LCD.1': 3, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.2': 3, 'ATE_FUN.1': 6, 'ATE_COV.1': 2, 'ATE_DPT.1': 2}, 'AVA': {'AVA_VAN.5': 6}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 4, 'ASE_INT.1': 5, 'ASE_REQ.1': 2, 'ASE_REQ.2': 2, 'ASE_OBJ.2': 3, 'ASE_SPD.1': 2, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 24, 'FAU_ARP.1.1': 1, 'FAU_SAA.1': 3}, 'FCO': {'FCO_NRO': 6, 'FCO_NRO.2': 6}, 'FCS': {'FCS_RNG': 4, 'FCS_COP': 32, 'FCS_RNG.1': 14, 'FCS_CKM.1': 19, 'FCS_CKM.2': 11, 'FCS_CKM.2.1': 1, 'FCS_CKM.3': 7, 'FCS_CKM.3.1': 1, 'FCS_CKM.4': 17, 'FCS_CKM.4.1': 1, 'FCS_COP.1': 26, 'FCS_RNG.1.1': 2, 'FCS_RNG.1.2': 2, 'FCS_CKM': 6}, 'FDP': {'FDP_ACC': 40, 'FDP_ACC.2': 5, 'FDP_ACF': 38, 'FDP_ACF.1': 24, 'FDP_IFC': 25, 'FDP_IFC.1': 15, 'FDP_IFF': 18, 'FDP_IFF.1': 17, 'FDP_RIP': 135, 'FDP_RIP.1': 11, 'FDP_ROL.1': 5, 'FDP_ROL': 16, 'FDP_SDI.2': 13, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_ITC': 12, 'FDP_ITC.2': 13, 'FDP_IFC.2': 2, 'FDP_UIT': 6, 'FDP_UIT.1': 2, 'FDP_ACC.1': 17, 'FDP_ITC.1': 4, 'FDP_SDI.1': 1, 'FDP_ITT.1': 1}, 'FIA': {'FIA_ATD': 9, 'FIA_ATD.1': 2, 'FIA_UID': 22, 'FIA_UID.2': 1, 'FIA_USB': 6, 'FIA_USB.1': 3, 'FIA_UID.1': 12}, 'FMT': {'FMT_MSA': 135, 'FMT_MSA.1': 14, 'FMT_MSA.2': 2, 'FMT_MSA.3': 22, 'FMT_SMF.1': 22, 'FMT_SMF.1.1': 1, 'FMT_SMR.1': 37, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MTD': 20, 'FMT_MTD.1': 2, 'FMT_MTD.3': 1, 'FMT_SMR': 43, 'FMT_SMF': 41}, 'FPR': {'FPR_UNO.1': 13, 'FPR_UNO.1.1': 1}, 'FPT': {'FPT_FLS.1': 16, 'FPT_FLS.1.1': 2, 'FPT_TDC.1': 8, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 1, 'FPT_FLS': 36, 'FPT_RCV': 27, 'FPT_RCV.3': 13, 'FPT_RCV.4': 2, 'FPT_TST.1': 1, 'FPT_PHP.3': 1, 'FPT_ITT.1': 1}, 'FRU': {'FRU_FLT.2': 1}, 'FTP': {'FTP_ITC': 10, 'FTP_ITC.1': 5, 'FTP_TRP.1': 2}}, 'cc_claims': {'D': {'D.APP_CODE': 7, 'D.APP_C_DATA': 3, 'D.APP_I_DATA': 5, 'D.PIN': 6, 'D.API_DATA': 3, 'D.CRYPTO': 6, 'D.JCS_CODE': 3, 'D.JCS_DATA': 4, 'D.SEC_DATA': 8, 'D.JCS_KEYS': 3, 'D.SEC_ATTRIBUTES': 2, 'D.CM_APDU': 1}, 'O': {'O.CARD-MANAGEMENT': 33, 'O.IC_SUPPORT': 17, 'O.RECOVERY': 24, 'O.OS_SUPPORT': 23, 'O.COMMUNICATION': 11, 'O.EXT-MEM': 20, 'O.RND': 14, 'O.REMOTE': 1, 'O.DELETION': 15, 'O.SID': 35, 'O.FIREWALL': 46, 'O.GLOBAL_ARRAYS_CONFID': 17, 'O.GLOBAL_ARRAYS_INTEG': 9, 'O.NATIVE': 13, 'O.OPERATE': 35, 'O.REALLOCATION': 17, 'O.RESOURCES': 24, 'O.ALARM': 21, 'O.CIPHER': 16, 'O.KEY-MNGT': 24, 'O.PIN-MNGT': 22, 'O.TRANSACTION': 18, 'O.OBJ-DELETION': 8, 'O.LOAD': 18, 'O.INSTALL': 15, 'O.CARD-': 6, 'O.EXT-': 1, 'O.APPLET': 19, 'O.CODE_PKG': 16, 'O.JAVAOBJECT': 41, 'O.EXT_MEM_INSTANCE': 10, 'O.PACKAGE': 2, 'O.GLOBAL_ARRAYS_C': 1, 'O.GLOBAL_ARRAYS_IN': 1, 'O.KEY-': 1, 'O.PIN-': 1, 'O.OS': 1}, 'T': {'T.CONFID-APPLI-DATA': 17, 'T.CONFID-JCS-CODE': 6, 'T.CONFID-JCS-DATA': 6, 'T.INTEG-APPLI-CODE': 9, 'T.INTEG-APPLI-DATA': 18, 'T.INTEG-JCS-CODE': 8, 'T.INTEG-JCS-DATA': 7, 'T.SID': 19, 'T.EXE-CODE': 8, 'T.NATIVE': 6, 'T.RESOURCES': 9, 'T.DELETION': 5, 'T.INSTALL': 6, 'T.COMMUNICATION': 5, 'T.OBJ-DELETION': 4, 'T.PHYSICAL': 8, 'T.LEAKAGE': 5, 'T.FAULT': 5, 'T.RND': 5, 'T.CONFID-APPLI-': 3, 'T.INTEG-APPLI-': 10, 'T.CONFID-JCS-': 8, 'T.INTEG-': 10, 'T.EXE-': 1, 'T.INTEG-JCS-': 1}, 'A': {'A.DELETION': 1, 'A.APPLET': 6, 'A.VERIFICATION': 6}, 'R': {'R.JAVA': 12}, 'OP': {'OP.ARRAY_ACCESS': 4, 'OP.CREATE': 7, 'OP.LOAD_PCKG': 1, 'OP.DELETE_APPLET': 4, 'OP.DELETE_PCKG': 3, 'OP.DELETE_PCKG_APPLET': 3, 'OP.GP': 3, 'OP.INSTANCE_FIELD': 4, 'OP.INVK_VIRTUAL': 6, 'OP.INVK_INTERFACE': 7, 'OP.JAVA': 5, 'OP.THROW': 5, 'OP.TYPE_ACCESS': 5, 'OP.PUT': 6, 'OP.CREATE_EXT_MEM_INSTANCE': 3, 'OP.READ_EXT_MEM': 3, 'OP.WRITE_EXT_MEM': 3}, 'OE': {'OE.CARD-MANAGEMENT': 2, 'OE.SCP': 6, 'OE.CODE-EVIDENCE': 17, 'OE.APPLET': 8, 'OE.VERIFICATION': 38, 'OE.CODE-': 4}, 'OSP': {'OSP.VERIFICATION': 6}}, 'vendor': {'NXP': {'NXP Semiconductors': 1}, 'Infineon': {'Infineon': 182, 'Infineon Technologies AG': 2}, 'STMicroelectronics': {'STMicroelectronics': 1}}, 'eval_facility': {'TUV': {'TÜV Informationstechnik': 1, 'TUV Informationstechnik': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 19}}, 'DES': {'DES': {'DES': 9}, '3DES': {'TDES': 22, 'Triple-DES': 1, 'TDEA': 1}}, 'miscellaneous': {'SEED': {'SEED': 2}}, 'constructions': {'MAC': {'CMAC': 1}}}, 'asymmetric_crypto': {'RSA': {'RSA-CRT': 3}, 'ECC': {'ECDH': {'ECDH': 5}, 'ECDSA': {'ECDSA': 10}, 'ECC': {'ECC': 11}}, 'FF': {'DH': {'Diffie-Hellman': 1}, 'DSA': {'DSA': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}, 'SHA2': {'SHA-224': 1, 'SHA-256': 1, 'SHA-384': 1, 'SHA-512': 1, 'SHA-2': 5}}, 'MD': {'MD5': {'MD5': 3}}, 'RIPEMD': {'RIPEMD160': 1, 'RIPEMD-160': 2}}, 'crypto_scheme': {'MAC': {'MAC': 4}, 'KEX': {'Key exchange': 1}, 'KA': {'Key Agreement': 2, 'KA': 2}}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 3}, 'RNG': {'RND': 20, 'RNG': 11}}, 'cipher_mode': {'ECB': {'ECB': 6}, 'CBC': {'CBC': 21}, 'CCM': {'CCM': 1}}, 'ecc_curve': {'NIST': {'P-192': 2}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Infineon': {'v1.02.013': 3}}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 2, 'physical probing': 3, 'side channel': 1, 'DPA': 4, 'SPA': 1, 'timing attacks': 1}, 'FI': {'physical tampering': 1, 'malfunction': 4, 'Malfunction': 3}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 186-3': 7, 'FIPS140': 2, 'FIPS 180-4': 6, 'FIPS 197': 9, 'FIPS PUB 180-4': 1, 'FIPS PUB 186-3': 1, 'FIPS PUB 197': 1, 'FIPS 140-2': 1}, 'NIST': {'NIST SP 800-108': 1, 'NIST SP 800-38B': 1}, 'BSI': {'AIS20': 4, 'AIS36': 2}, 'RFC': {'RFC 5639': 5}, 'ISO': {'ISO/IEC 18092': 2, 'ISO/IEC7816': 2, 'ISO/IEC 14443': 2, 'ISO/IEC 15946-': 5}, 'ICAO': {'ICAO': 6}, 'SCP': {'SCP02': 9, 'SCP03': 9, 'SCP01': 2, 'SCP 03': 3, 'SCP 02': 2}}, 'javacard_version': {'JavaCard': {'Java Card 3.0.1': 3}}, 'javacard_api_const': {'misc': {'TYPE_ACCESS': 5}}, 'javacard_packages': {'javacard': {'javacard.security': 3, 'javacard.framework': 4}, 'javacardx': {'javacardx.crypto': 3, 'javacardx.security': 1, 'javacardx.external': 1}}, 'certification_process': {'OutOfScope': {'out of scope': 3, 'by the TOE. There are no pre-issuance applets installed. Native code post-issuance downloading is out of scope The SCP is a certified hardware platform – the SLE78CLFX4000P(M) with RSA2048/4096 v1.02.013, EC v1': 1, 'Software development environment. Phase 2 covers the Secure IC Development of Infineon and is out of scope of the TOE evaluation as that is part of the IC platform evaluation. In Phase 3, the Chip': 1, 'a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.RECOVERY and O.OS_SUPPORT are': 1}}}
. - The st_filename property was set to
0869b_pdf.pdf
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}]}
values added.
- The st_download_ok property was set to
-
22.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
False
. - The st_convert_ok property was set to
False
. - The st_extract_ok property was set to
False
. - The errors property was set to
['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/0869a_pdf.pdf, code: nok', 'failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/0869b_pdf.pdf, code: nok']
. - The st_pdf_hash property was set to
None
. - The st_txt_hash property was set to
None
.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_frontpage property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 6}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 6}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}]}
values added.
- The st_download_ok property was set to
-
05.10.2022 The certificate data changed.
Certificate changed
The Protection profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Java Cardâ„¢ System Protection Profile Open Configuration, Version 3.0', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/ANSSI-CC-profil_PP-2010-03en.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['ANSSI-CC-PP-2010-03', 'JCSPPC', 'ANSSI-CC-PP-2001-03-M01']}}]}
.
The state of the certificate object was updated.
- The following values were inserted:
{'st_convert_garbage': False, 'report_convert_garbage': False}
.
- The new value is
-
04.10.2022 The certificate data changed.
Certificate changed
The Protection profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Java Cardâ„¢ System Protection Profile Open Configuration, Version 3.0', 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/ANSSI-CC-profil_PP-2010-03en.pdf', 'pp_link': None, 'pp_ids': None}]}
.
- The new value is
-
24.09.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The following values were inserted:
{'report_filename': '0869a_pdf.pdf', 'st_filename': '0869b_pdf.pdf'}
. - The report_keywords property was updated, with the
{'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0869-2015': 48}}}}, 'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL 4': 9, 'EAL 2': 4, 'EAL 6': 4}}}}, 'cc_sar': {'__update__': {'ALC': {'__delete__': ['ALC_LCD']}, 'AVA': {'__update__': {'AVA_VAN.5': 6}}}}, 'symmetric_crypto': {'__update__': {'DES': {'__delete__': ['DES']}}}, 'asymmetric_crypto': {'__update__': {'FF': {'__update__': {'DSA': {'__update__': {'DSA': 2}}}, '__delete__': ['DH']}}}, 'crypto_scheme': {}, 'randomness': {'__update__': {'TRNG': {'__update__': {'TRNG': 2}}, 'RNG': {'__update__': {'RNG': 6}}}}, 'crypto_library': {'__update__': {'Infineon': {'__update__': {'v1.02.013': 5}}}}, 'technical_report_id': {'__update__': {'BSI': {'__insert__': {'BSI TR-02102': 1}}}}, 'tee_name': {}, 'standard_id': {'__update__': {'ISO': {'__insert__': {'ISO/IEC 18045': 4}, '__update__': {'ISO/IEC 15408': 4}}, 'SCP': {'__update__': {'SCP01': 2}}}}, 'javacard_version': {}, 'certification_process': {'__update__': {'OutOfScope': {'__insert__': {'out of scope': 1}}, 'ConfidentialDocument': {'and certification procedure is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the product or resulting from the evaluation and certification': 1, 'SLJ 52GxxyyyzR) V1.0, BSI-DSZ-CC-0869-2015, ST Version 2.0, 20 November 2014, Oracle Corporation (confidential document) 9 specifically • AIS 1, Version 13, Durchführung der Ortsbesichtigung in der Entwicklungsumgebung': 1, 'Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0, BSI-DSZ-CC-0869-2015, TÜViT GmbH (confidential document) [10] Configuration List BSI-DSZ-CC-0869-2015: Configuration Management Scope for Java Card': 1, 'for Infineon on SLE78 (SLJ 52GxxyyyzR) V 1.0, Version 1.4, 29 January 2015, Oracle Corporation (confidential document) [11] AGD_OPE for Java Card Platform Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0': 1, 'for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0, Version 1, 30 January 2015, TÜViT GmbH (confidential document) [19] Certification Report – for Infineon Security Controller M7892 B11 with optional RSA2048/4096': 1, 'ETR for Composition (ETR-COMP), M7892 B11, BSI-DSZ-CC-0782, Version 5, 20 March 2014, TÜViT GmbH (confidential document) [21] SLx 70 Family Production and Personalization User’s Manual, Revision 2012-06-27, Infineon': 1}}}}
data. - The st_keywords property was updated, with the
{'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL5': 6}}}}, 'cc_sar': {'__update__': {'ADV': {'__update__': {'ADV_FSP.5': 7, 'ADV_IMP.1': 9}}, 'AGD': {'__update__': {'AGD_OPE.1': 10}}, 'ALC': {'__delete__': ['ALC_CMS.5']}, 'ATE': {'__update__': {'ATE_FUN.1': 6}, '__delete__': ['ATE_DPT.3', 'ATE_IND.2']}, 'ASE': {'__update__': {'ASE_ECD.1': 4, 'ASE_REQ.2': 2, 'ASE_SPD.1': 2}}}}, 'cc_sfr': {'__insert__': {'FCO': {'FCO_NRO': 6, 'FCO_NRO.2': 6}}, '__update__': {'FAU': {'__update__': {'FAU_ARP.1': 24}}, 'FCS': {'__insert__': {'FCS_CKM': 6}, '__update__': {'FCS_COP': 32, 'FCS_RNG.1': 14, 'FCS_CKM.2': 11, 'FCS_CKM.3': 7, 'FCS_CKM.4': 17, 'FCS_COP.1': 26, 'FCS_RNG': 4}}, 'FDP': {'__insert__': {'FDP_ACC': 40, 'FDP_ACC.2': 5, 'FDP_ACF': 38, 'FDP_IFC': 25, 'FDP_IFF': 18, 'FDP_RIP': 135, 'FDP_ROL': 16, 'FDP_ITC': 12, 'FDP_IFC.2': 2, 'FDP_UIT': 6, 'FDP_UIT.1': 2}, '__update__': {'FDP_ROL.1': 5, 'FDP_SDI.2': 13, 'FDP_RIP.1': 11, 'FDP_ACC.1': 17, 'FDP_IFC.1': 15, 'FDP_ACF.1': 24, 'FDP_IFF.1': 17, 'FDP_ITC.2': 13}}, 'FIA': {'__insert__': {'FIA_ATD': 9, 'FIA_UID': 22, 'FIA_UID.2': 1, 'FIA_USB': 6, 'FIA_USB.1': 3}, '__update__': {'FIA_UID.1': 12, 'FIA_ATD.1': 2}}, 'FMT': {'__insert__': {'FMT_MSA': 135, 'FMT_MSA.2': 2, 'FMT_MTD': 20, 'FMT_MTD.3': 1, 'FMT_SMR': 43, 'FMT_SMF': 41}, '__update__': {'FMT_SMF.1': 22, 'FMT_SMR.1': 37, 'FMT_MSA.3': 22, 'FMT_MSA.1': 14, 'FMT_MTD.1': 2}}, 'FPT': {'__insert__': {'FPT_FLS': 36, 'FPT_RCV': 27, 'FPT_TST.1': 1}, '__update__': {'FPT_FLS.1': 16, 'FPT_RCV.3': 13, 'FPT_RCV.4': 2}}, 'FTP': {'__insert__': {'FTP_ITC': 10}, '__update__': {'FTP_ITC.1': 5}}}}, 'cc_claims': {'__insert__': {'R': {'R.JAVA': 12}}, '__update__': {'D': {'__update__': {'D.JCS_DATA': 4}}, 'O': {'__insert__': {'O.OS': 1}, '__update__': {'O.JAVAOBJECT': 41}, '__delete__': ['O.OS.SUPPORT']}, 'T': {'__insert__': {'T.SID': 19, 'T.EXE-CODE': 8}, '__update__': {'T.CONFID-JCS-DATA': 6, 'T.INTEG-APPLI-CODE': 9, 'T.INTEG-APPLI-DATA': 18, 'T.INTEG-JCS-DATA': 7, 'T.RND': 5}, '__delete__': ['T.INTEG-APPLI-CODE.LOAD', 'T.INTEG-APPLI-DATA.LOAD']}, 'A': {'__delete__': ['A.LOAD']}, 'OE': {'__insert__': {'OE.SCP': 6}, '__delete__': ['OE.SCP.IC', 'OE.SCP.RECOVERY', 'OE.SCP.SUPPORT']}}}, 'vendor': {'__update__': {'Infineon': {'__update__': {'Infineon': 182}}}}, 'eval_facility': {'__delete__': ['EWA']}, 'symmetric_crypto': {'__update__': {'AES_competition': {'__update__': {'AES': {'__update__': {'AES': 19}}}}, 'DES': {'__update__': {'DES': {'__update__': {'DES': 9}, '__delete__': ['DEA']}}}, 'constructions': {'__update__': {'MAC': {'__update__': {'CMAC': 1}}}}}}, 'asymmetric_crypto': {'__update__': {'ECC': {'__update__': {'ECDH': {'__update__': {'ECDH': 5}}, 'ECDSA': {'__update__': {'ECDSA': 10}}, 'ECC': {'__update__': {'ECC': 11}}}}, 'FF': {'__update__': {'DH': {'__delete__': ['DH']}, 'DSA': {'__update__': {'DSA': 2}}}}}}, 'crypto_scheme': {'__update__': {'MAC': {'__update__': {'MAC': 4}}, 'KA': {'__update__': {'KA': 2}}}}, 'randomness': {'__update__': {'TRNG': {'__update__': {'TRNG': 3}}, 'RNG': {'__update__': {'RNG': 11, 'RND': 20}}}}, 'cipher_mode': {'__update__': {'ECB': {'__update__': {'ECB': 6}}, 'CBC': {'__update__': {'CBC': 21}}}}, 'side_channel_analysis': {'__update__': {'SCA': {'__update__': {'DPA': 4}}, 'FI': {'__update__': {'malfunction': 4}}}}, 'tee_name': {}, 'standard_id': {'__update__': {'SCP': {'__update__': {'SCP01': 2}}}}, 'javacard_api_const': {'__update__': {'misc': {'__update__': {'TYPE_ACCESS': 5}}}}, 'javacard_packages': {'__update__': {'javacard': {'__insert__': {'javacard.framework': 4}, '__update__': {'javacard.security': 3}}, 'javacardx': {'__update__': {'javacardx.crypto': 3}}}}, 'certification_process': {'__update__': {'OutOfScope': {'__insert__': {'by the TOE. There are no pre-issuance applets installed. Native code post-issuance downloading is out of scope The SCP is a certified hardware platform – the SLE78CLFX4000P(M) with RSA2048/4096 v1.02.013, EC v1': 1, 'Software development environment. Phase 2 covers the Secure IC Development of Infineon and is out of scope of the TOE evaluation as that is part of the IC platform evaluation. In Phase 3, the Chip': 1}, '__delete__': ['. There are no pre-issuance applets installed. Native code post-issuance downloading is out of scope The SCP is a certified hardware platform – the SLE78CLFX4000P(M', '. Phase 2 covers the Secure IC Development of Infineon and is out of scope of the TOE evaluation as that is part of the IC platform evaluation', '. That point is out of scope of this Protection Profile, though', 'd by the TOE. There are no pre-issuance applets installed. Native code post-issuance downloading is out of scope The SCP is a certified hardware platform – the SLE78CLFX4000P(M) with RSA2048/4096 v1.02.013, EC', 'edded Software development environment. Phase 2 covers the Secure IC Development of Infineon and is out of scope of the TOE evaluation as that is part of the IC platform evaluation. In Phase 3, the Chip']}}}}
data.
The computed heuristics were updated.
- The report_references property was updated, with the
{'indirectly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['C0648', 'C0649']}}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}]}
values added.
- The following values were inserted:
-
18.07.2022 The certificate data changed.
Certificate changed
The _type was updated.
- The new value is
sec_certs.sample.common_criteria.CommonCriteriaCert
.
The Protection profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Java Cardâ„¢ System Protection Profile Open Configuration, Version 3.0', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/ANSSI-CC-profil_PP-2010-03en.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['ANSSI-CC-PP-2010-03', 'JCSPPC', 'ANSSI-CC-PP-2001-03-M01']}}]}
.
The state of the certificate object was updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState
.
The PDF extraction data was updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData
.
The computed heuristics were updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics
. - The st_references property was updated, with the
{'_type': 'sec_certs.sample.certificate.References'}
data. - The report_references property was updated, with the
{'_type': 'sec_certs.sample.certificate.References'}
data. - The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_INT', 'level': 1}]}
.
- The new value is
-
17.07.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_metadata property was updated, with the
{'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.bsi.bund.de/zertifizierung', 'http://www.commoncriteriaportal.org/', 'https://www.bsi.bund.de/']}}
values inserted. - The st_metadata property was updated, with the
{'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.iso.org/iso/iso_catalogue/catalogue_tc/catalogue_detail.htm?csnumber=30656']}}
values inserted. - The report_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0869-2015': 86, 'BSI-DSZ-CC-0782-2012': 4}}, 'cc_protection_profile_id': {'ANSSI': {'ANSSI-CC-PP-2010/03-M01': 4}}, 'cc_security_level': {'EAL': {'EAL 5': 14, 'EAL 4': 10, 'EAL 1': 7, 'EAL 2': 5, 'EAL 5+': 1, 'EAL 6': 5, 'EAL 3': 4, 'EAL 7': 4, 'EAL 5 augmented': 3}, 'ITSEC': {'ITSEC Evaluation': 1}}, 'cc_sar': {'ADV': {'ADV_FSP.5': 2, 'ADV_INT.2': 2, 'ADV_TDS.4': 2, 'ADV_ARC.1': 1, 'ADV_FSP.1': 1, 'ADV_FSP.2': 1, 'ADV_FSP.3': 1, 'ADV_FSP.4': 1, 'ADV_FSP.6': 1, 'ADV_IMP.1': 1, 'ADV_IMP.2': 1, 'ADV_INT.1': 1, 'ADV_INT.3': 1, 'ADV_SPM.1': 1, 'ADV_TDS.1': 1, 'ADV_TDS.2': 1, 'ADV_TDS.3': 1, 'ADV_TDS.5': 1, 'ADV_TDS.6': 1, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE': 2, 'AGD_PRE': 3, 'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_DVS.2': 7, 'ALC_FLR': 3, 'ALC_CMS.5': 3, 'ALC_TAT.2': 3, 'ALC_CMC.1': 1, 'ALC_CMC.2': 1, 'ALC_CMC.3': 1, 'ALC_CMC.4': 2, 'ALC_CMC.5': 1, 'ALC_CMS.1': 1, 'ALC_CMS.2': 1, 'ALC_CMS.3': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 2, 'ALC_DVS.1': 1, 'ALC_FLR.1': 1, 'ALC_FLR.2': 1, 'ALC_FLR.3': 1, 'ALC_LCD.1': 2, 'ALC_LCD.2': 1, 'ALC_TAT.1': 1, 'ALC_TAT.3': 1, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_LCD': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_DPT.3': 2, 'ATE_COV': 2, 'ATE_DPT': 2, 'ATE_FUN': 2, 'ATE_COV.1': 1, 'ATE_COV.2': 1, 'ATE_COV.3': 1, 'ATE_DPT.1': 1, 'ATE_DPT.2': 1, 'ATE_DPT.4': 1, 'ATE_FUN.1': 1, 'ATE_FUN.2': 1, 'ATE_IND.1': 1, 'ATE_IND.2': 1, 'ATE_IND.3': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.5': 5, 'AVA_VAN': 3, 'AVA_VAN.1': 1, 'AVA_VAN.2': 1, 'AVA_VAN.3': 1, 'AVA_VAN.4': 1}, 'APE': {'APE_INT.1': 1, 'APE_CCL.1': 1, 'APE_SPD.1': 1, 'APE_OBJ.1': 1, 'APE_OBJ.2': 1, 'APE_ECD.1': 1, 'APE_REQ.1': 1, 'APE_REQ.2': 1}, 'ASE': {'ASE_INT.1': 1, 'ASE_CCL.1': 1, 'ASE_SPD.1': 1, 'ASE_OBJ.1': 1, 'ASE_OBJ.2': 1, 'ASE_ECD.1': 1, 'ASE_REQ.1': 1, 'ASE_REQ.2': 1, 'ASE_TSS.1': 1, 'ASE_TSS.2': 1, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {'OE': {'OE.VERIFICATION': 3}}, 'vendor': {'Infineon': {'Infineon': 26, 'Infineon Technologies AG': 3}}, 'eval_facility': {'TUV': {'TÜV Informationstechnik': 2, 'TÜViT': 3}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 2}}, 'DES': {'DES': {'DES': 2}, '3DES': {'TDES': 2}}, 'miscellaneous': {'SEED': {'SEED': 2}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 1}, 'ECDSA': {'ECDSA': 1}}, 'FF': {'DH': {'DH': 1}, 'DSA': {'DSA': 3}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}, 'SHA2': {'SHA-2': 4}}, 'MD': {'MD5': {'MD5': 2}}, 'RIPEMD': {'RIPEMD160': 1, 'RIPEMD': 1}}, 'crypto_scheme': {'KA': {'KA': 1}}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 3}, 'RNG': {'RNG': 10}}, 'cipher_mode': {'CCM': {'CCM': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Infineon': {'v1.02.013': 6}}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'malfunction': 1}, 'other': {'JIL': 4}}, 'technical_report_id': {'BSI': {'BSI TR-02102-1': 1, 'BSI 7138': 2, 'BSI 7125': 2, 'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 2}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS 36': 6, 'AIS20': 1, 'AIS 34': 2, 'AIS 26': 2, 'AIS 20': 2, 'AIS 35': 2, 'AIS 1': 1, 'AIS 25': 1, 'AIS 32': 1, 'AIS 46': 1}, 'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 17065': 2}, 'SCP': {'SCP02': 2, 'SCP03': 3, 'SCP01': 3}}, 'javacard_version': {'JavaCard': {'JC3.0.1': 1, 'JC2.2.1': 1}}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'the TOE, but pre-issuance loading of applets is possible. Native code post-issuance downloading is out of scope. The TOE fulfills the requirements of the Protection Profile Java Card Protection Profile - Open': 1}, 'ConfidentialDocument': {'n and certification procedure is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the product or resulting from the evaluation and certification': 1, '(SLJ 52GxxyyyzR) V1.0, BSI-DSZ-CC-0869-2015, ST Version 2.0, 20 November 2014, Oracle Corporation (confidential document) 9 specifically • AIS 1, Version 13, Durchführung der Ortsbesichtigung in der Entwicklungsumgebung': 1, 'form Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0, BSI-DSZ-CC-0869-2015, TÜViT GmbH (confidential document) [10] Configuration List BSI-DSZ-CC-0869-2015: Configuration Management Scope for Java Card': 1, 'ion for Infineon on SLE78 (SLJ 52GxxyyyzR) V 1.0, Version 1.4, 29 January 2015, Oracle Corporation (confidential document) [11] AGD_OPE for Java Card Platform Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0': 1, 'mplementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0, Version 1, 30 January 2015, TÜViT GmbH (confidential document) [19] Certification Report – for Infineon Security Controller M7892 B11 with optional RSA2048/4096': 1, '] ETR for Composition (ETR-COMP), M7892 B11, BSI-DSZ-CC-0782, Version 5, 20 March 2014, TÜViT GmbH (confidential document) [21] SLx 70 Family Production and Personalization User’s Manual, Revision 2012-06-27, Infineon': 1}}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0035': 1, 'BSI-PP-0017-2005': 1, 'BSI-CC-PP-0035-2007': 1}}, 'cc_security_level': {'EAL': {'EAL 5': 1, 'EAL5': 4, 'EAL 5 augmented': 1, 'EAL5 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 6, 'ADV_FSP.1': 4, 'ADV_TDS.1': 2, 'ADV_FSP.4': 2, 'ADV_TDS.3': 10, 'ADV_FSP.5': 8, 'ADV_IMP.1': 10, 'ADV_INT.2': 1, 'ADV_TDS.4': 1, 'ADV_FSP.2': 2, 'ADV_TDS.2': 1, 'ADV_COMP.1': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1, 'AGD_OPE.1': 9, 'AGD_PRE.1': 6}, 'ALC': {'ALC_DVS.2': 6, 'ALC_TAT.1': 2, 'ALC_TAT.2': 3, 'ALC_CMC.4': 1, 'ALC_CMS.1': 1, 'ALC_DVS.1': 2, 'ALC_LCD.1': 3, 'ALC_CMS.4': 1, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.2': 3, 'ATE_FUN.1': 7, 'ATE_DPT.3': 1, 'ATE_COV.1': 2, 'ATE_IND.2': 1, 'ATE_DPT.1': 2}, 'AVA': {'AVA_VAN.5': 6}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 5, 'ASE_INT.1': 5, 'ASE_REQ.1': 2, 'ASE_REQ.2': 3, 'ASE_OBJ.2': 3, 'ASE_SPD.1': 3, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 23, 'FAU_ARP.1.1': 1, 'FAU_SAA.1': 3}, 'FCS': {'FCS_COP': 1, 'FCS_RNG.1': 16, 'FCS_CKM.1': 19, 'FCS_CKM.2': 12, 'FCS_CKM.2.1': 1, 'FCS_CKM.3': 10, 'FCS_CKM.3.1': 1, 'FCS_CKM.4': 18, 'FCS_CKM.4.1': 1, 'FCS_COP.1': 12, 'FCS_RNG.1.1': 2, 'FCS_RNG.1.2': 2, 'FCS_RNG': 3}, 'FDP': {'FDP_ROL.1': 2, 'FDP_SDI.2': 15, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_RIP.1': 2, 'FDP_ACC.1': 15, 'FDP_IFC.1': 13, 'FDP_ACF.1': 5, 'FDP_IFF.1': 2, 'FDP_ITC.1': 4, 'FDP_ITC.2': 4, 'FDP_SDI.1': 1, 'FDP_ITT.1': 1}, 'FIA': {'FIA_UID.1': 8, 'FIA_ATD.1': 1}, 'FMT': {'FMT_SMF.1': 19, 'FMT_SMF.1.1': 1, 'FMT_SMR.1': 29, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MSA.3': 7, 'FMT_MSA.1': 8, 'FMT_MTD.1': 1}, 'FPR': {'FPR_UNO.1': 13, 'FPR_UNO.1.1': 1}, 'FPT': {'FPT_FLS.1': 14, 'FPT_FLS.1.1': 2, 'FPT_TDC.1': 8, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 1, 'FPT_RCV.3': 2, 'FPT_RCV.4': 1, 'FPT_PHP.3': 1, 'FPT_ITT.1': 1}, 'FRU': {'FRU_FLT.2': 1}, 'FTP': {'FTP_ITC.1': 2, 'FTP_TRP.1': 2}}, 'cc_claims': {'D': {'D.APP_CODE': 7, 'D.APP_C_DATA': 3, 'D.APP_I_DATA': 5, 'D.PIN': 6, 'D.API_DATA': 3, 'D.CRYPTO': 6, 'D.JCS_CODE': 3, 'D.JCS_DATA': 5, 'D.SEC_DATA': 8, 'D.JCS_KEYS': 3, 'D.SEC_ATTRIBUTES': 2, 'D.CM_APDU': 1}, 'O': {'O.CARD-MANAGEMENT': 33, 'O.IC_SUPPORT': 17, 'O.RECOVERY': 24, 'O.OS_SUPPORT': 23, 'O.COMMUNICATION': 11, 'O.EXT-MEM': 20, 'O.RND': 14, 'O.REMOTE': 1, 'O.DELETION': 15, 'O.SID': 35, 'O.FIREWALL': 46, 'O.GLOBAL_ARRAYS_CONFID': 17, 'O.GLOBAL_ARRAYS_INTEG': 9, 'O.NATIVE': 13, 'O.OPERATE': 35, 'O.REALLOCATION': 17, 'O.RESOURCES': 24, 'O.ALARM': 21, 'O.CIPHER': 16, 'O.KEY-MNGT': 24, 'O.PIN-MNGT': 22, 'O.TRANSACTION': 18, 'O.OBJ-DELETION': 8, 'O.LOAD': 18, 'O.INSTALL': 15, 'O.CARD-': 6, 'O.EXT-': 1, 'O.APPLET': 19, 'O.CODE_PKG': 16, 'O.JAVAOBJECT': 39, 'O.EXT_MEM_INSTANCE': 10, 'O.PACKAGE': 2, 'O.GLOBAL_ARRAYS_C': 1, 'O.GLOBAL_ARRAYS_IN': 1, 'O.KEY-': 1, 'O.PIN-': 1, 'O.OS.SUPPORT': 1}, 'T': {'T.CONFID-APPLI-DATA': 17, 'T.CONFID-JCS-CODE': 6, 'T.CONFID-JCS-DATA': 8, 'T.INTEG-APPLI-CODE': 5, 'T.INTEG-APPLI-CODE.LOAD': 5, 'T.INTEG-APPLI-DATA': 15, 'T.INTEG-APPLI-DATA.LOAD': 4, 'T.INTEG-JCS-CODE': 8, 'T.INTEG-JCS-DATA': 9, 'T.NATIVE': 6, 'T.RESOURCES': 9, 'T.DELETION': 5, 'T.INSTALL': 6, 'T.COMMUNICATION': 5, 'T.OBJ-DELETION': 4, 'T.PHYSICAL': 8, 'T.LEAKAGE': 5, 'T.FAULT': 5, 'T.RND': 6, 'T.CONFID-APPLI-': 3, 'T.INTEG-APPLI-': 10, 'T.CONFID-JCS-': 8, 'T.INTEG-': 10, 'T.EXE-': 1, 'T.INTEG-JCS-': 1}, 'A': {'A.DELETION': 1, 'A.LOAD': 7, 'A.APPLET': 6, 'A.VERIFICATION': 6}, 'OP': {'OP.ARRAY_ACCESS': 4, 'OP.CREATE': 7, 'OP.LOAD_PCKG': 1, 'OP.DELETE_APPLET': 4, 'OP.DELETE_PCKG': 3, 'OP.DELETE_PCKG_APPLET': 3, 'OP.GP': 3, 'OP.INSTANCE_FIELD': 4, 'OP.INVK_VIRTUAL': 6, 'OP.INVK_INTERFACE': 7, 'OP.JAVA': 5, 'OP.THROW': 5, 'OP.TYPE_ACCESS': 5, 'OP.PUT': 6, 'OP.CREATE_EXT_MEM_INSTANCE': 3, 'OP.READ_EXT_MEM': 3, 'OP.WRITE_EXT_MEM': 3}, 'OE': {'OE.CARD-MANAGEMENT': 2, 'OE.SCP.IC': 2, 'OE.SCP.RECOVERY': 2, 'OE.SCP.SUPPORT': 2, 'OE.CODE-EVIDENCE': 17, 'OE.APPLET': 8, 'OE.VERIFICATION': 38, 'OE.CODE-': 4}, 'OSP': {'OSP.VERIFICATION': 6}}, 'vendor': {'NXP': {'NXP Semiconductors': 1}, 'Infineon': {'Infineon': 181, 'Infineon Technologies AG': 2}, 'STMicroelectronics': {'STMicroelectronics': 1}}, 'eval_facility': {'TUV': {'TÜV Informationstechnik': 1, 'TUV Informationstechnik': 1}, 'EWA': {'EWA': 6}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 24}}, 'DES': {'DES': {'DES': 36, 'DEA': 1}, '3DES': {'TDES': 22, 'Triple-DES': 1, 'TDEA': 1}}, 'miscellaneous': {'SEED': {'SEED': 2}}, 'constructions': {'MAC': {'CMAC': 3}}}, 'asymmetric_crypto': {'RSA': {'RSA-CRT': 3}, 'ECC': {'ECDH': {'ECDH': 9}, 'ECDSA': {'ECDSA': 16}, 'ECC': {'ECC': 8}}, 'FF': {'DH': {'DH': 9, 'Diffie-Hellman': 1}, 'DSA': {'DSA': 18}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}, 'SHA2': {'SHA-224': 1, 'SHA-256': 1, 'SHA-384': 1, 'SHA-512': 1, 'SHA-2': 5}}, 'MD': {'MD5': {'MD5': 3}}, 'RIPEMD': {'RIPEMD160': 1, 'RIPEMD-160': 2}}, 'crypto_scheme': {'MAC': {'MAC': 17}, 'KEX': {'Key exchange': 1}, 'KA': {'KA': 31, 'Key Agreement': 2}}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 5}, 'RNG': {'RNG': 18, 'RND': 18}}, 'cipher_mode': {'ECB': {'ECB': 7}, 'CBC': {'CBC': 23}, 'CCM': {'CCM': 1}}, 'ecc_curve': {'NIST': {'P-192': 2}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Infineon': {'v1.02.013': 3}}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 2, 'physical probing': 3, 'side channel': 1, 'DPA': 3, 'SPA': 1, 'timing attacks': 1}, 'FI': {'physical tampering': 1, 'malfunction': 3, 'Malfunction': 3}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 5}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 186-3': 7, 'FIPS140': 2, 'FIPS 180-4': 6, 'FIPS 197': 9, 'FIPS PUB 180-4': 1, 'FIPS PUB 186-3': 1, 'FIPS PUB 197': 1, 'FIPS 140-2': 1}, 'NIST': {'NIST SP 800-108': 1, 'NIST SP 800-38B': 1}, 'BSI': {'AIS20': 4, 'AIS36': 2}, 'RFC': {'RFC 5639': 5}, 'ISO': {'ISO/IEC 18092': 2, 'ISO/IEC7816': 2, 'ISO/IEC 14443': 2, 'ISO/IEC 15946-': 5}, 'ICAO': {'ICAO': 6}, 'SCP': {'SCP02': 9, 'SCP03': 9, 'SCP01': 3, 'SCP 03': 3, 'SCP 02': 2}}, 'javacard_version': {'JavaCard': {'Java Card 3.0.1': 3}}, 'javacard_api_const': {'misc': {'TYPE_ACCESS': 3}}, 'javacard_packages': {'javacard': {'javacard.security': 2}, 'javacardx': {'javacardx.crypto': 2, 'javacardx.security': 1, 'javacardx.external': 1}}, 'certification_process': {'OutOfScope': {'out of scope': 3, '. There are no pre-issuance applets installed. Native code post-issuance downloading is out of scope The SCP is a certified hardware platform – the SLE78CLFX4000P(M': 1, '. Phase 2 covers the Secure IC Development of Infineon and is out of scope of the TOE evaluation as that is part of the IC platform evaluation': 1, '. That point is out of scope of this Protection Profile, though': 1, 'd by the TOE. There are no pre-issuance applets installed. Native code post-issuance downloading is out of scope The SCP is a certified hardware platform – the SLE78CLFX4000P(M) with RSA2048/4096 v1.02.013, EC': 1, 'edded Software development environment. Phase 2 covers the Secure IC Development of Infineon and is out of scope of the TOE evaluation as that is part of the IC platform evaluation. In Phase 3, the Chip': 1, 'a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.RECOVERY and O.OS_SUPPORT are': 1}}}
.
The computed heuristics were updated.
- The _type property was set to
Heuristics
.
- The report_metadata property was updated, with the
-
14.06.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The following values were inserted:
{'report_pdf_hash': '4919856aca1390ba0a11287b0ddfa3e9f976f6e678b2b2a2dc44f58e4842fcc2', 'st_pdf_hash': '3db4cbb37700c9c4a1a564689053f9f989120c0d09b8dc8720e40c7d776bc7fa', 'report_txt_hash': '16970b2f509be251e90601cc89d5bda8e4182f8616c7069cefd49701a354a75d', 'st_txt_hash': '67fedaf86fe2fd88b1299bfe9370da6eac9f84609bf8171fc31bd530d17d0443'}
.
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'rules_block_cipher_modes': {'CCM': 1}}
data. - The st_keywords property was updated, with the
{'rules_block_cipher_modes': {'__insert__': {'CCM': 1}}}
data.
- The following values were inserted:
-
13.05.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'APE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'APE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'APE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'APE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_FLR', 'level': 3}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'APE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'SAR', 'family': 'ADV_COMP', 'level': 1}, {'_type': 'SAR', 'family': 'APE_SPD', 'level': 1}]}}
.
- The following values were inserted:
-
24.04.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'direct_dependency_cves': None, 'indirect_dependency_cves': None}
.
- The following values were inserted:
-
08.03.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0869-V2-2019']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0869-V2-2019']}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-2012']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-2012']}}}
. - The following properties were deleted:
['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting']
.
- The following values were inserted:
-
18.02.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_frontpage property was updated, with the
{'nscib': {}, 'niap': {}, 'canada': {}}
values inserted. - The st_frontpage property was updated, with the
{'nscib': {}, 'niap': {}, 'canada': {}}
values inserted.
The computed heuristics were updated.
- The extracted_versions property was set to
{'_type': 'Set', 'elements': ['1.0']}
. - The directly_affected_by property was set to
{'_type': 'Set', 'elements': ['BSI-DSZ-CC-0869-V2-2019']}
.
- The report_frontpage property was updated, with the
-
01.02.2022 The certificate data changed.
Certificate changed
The Protection profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'ProtectionProfile', 'pp_name': 'Java Cardâ„¢ System Protection Profile Open Configuration, Version 3.0', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/ANSSI-CC-profil_PP-2010-03en.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['ANSSI-CC-PP-2010-03', 'JCSPPC', 'ANSSI-CC-PP-2001-03-M01']}}]}
.
- The new value is
-
28.01.2022 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Java Card Platform Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "a9f542d8e2be69fd",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-0869-2015",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_COMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"1.0"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0869-V2-2019"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0782-2012"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0869-V2-2019",
"JISEC-CC-CRP-C0649-01-2019",
"JISEC-CC-CRP-C0648-01-2019"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0782-2012"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Oracle Corporation",
"manufacturer_web": "https://www.oracle.com",
"name": "Java Card Platform Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0",
"not_valid_after": "2020-02-17",
"not_valid_before": "2015-02-17",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "0869a_pdf.pdf",
"report_frontpage": {
"DE": {
"cc_security_level": "Common Criteria Part 3 conformant EAL 5 augmented by ALC_DVS.2 and AVA_VAN.5 Valid until (*): 17 February 2020 SOGIS Recognition Agreement",
"cc_version": "PP conformant including optional package EMG plus product specific extensions Common Criteria Part 2 extended",
"cert_id": "BSI-DSZ-CC-0869-2015",
"cert_item": "Java Card Platform Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0",
"cert_lab": "BSI",
"developer": "Oracle Corporation",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
],
"ref_protection_profiles": "Java Card Protection Profile - Open Configuration, Version 3.0, May 2012, ANSSI-CC-PP-2010/03-M01"
}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDH": {
"ECDH": 1
},
"ECDSA": {
"ECDSA": 1
}
},
"FF": {
"DSA": {
"DSA": 2
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0782": 1,
"BSI-DSZ-CC-0782-2012": 2,
"BSI-DSZ-CC-0782-2012-MA-01": 2,
"BSI-DSZ-CC-0782-MA-01": 2,
"BSI-DSZ-CC-0869-2015": 24
}
},
"cc_claims": {
"OE": {
"OE.VERIFICATION": 3
}
},
"cc_protection_profile_id": {
"ANSSI": {
"ANSSI-CC-PP-2010/03-M01": 4
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 1,
"ADV_FSP": 1,
"ADV_FSP.1": 1,
"ADV_FSP.2": 1,
"ADV_FSP.3": 1,
"ADV_FSP.4": 1,
"ADV_FSP.5": 2,
"ADV_FSP.6": 1,
"ADV_IMP": 1,
"ADV_IMP.1": 1,
"ADV_IMP.2": 1,
"ADV_INT": 1,
"ADV_INT.1": 1,
"ADV_INT.2": 2,
"ADV_INT.3": 1,
"ADV_SPM": 1,
"ADV_SPM.1": 1,
"ADV_TDS": 1,
"ADV_TDS.1": 1,
"ADV_TDS.2": 1,
"ADV_TDS.3": 1,
"ADV_TDS.4": 2,
"ADV_TDS.5": 1,
"ADV_TDS.6": 1
},
"AGD": {
"AGD_OPE": 2,
"AGD_OPE.1": 1,
"AGD_PRE": 3,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.1": 1,
"ALC_CMC.2": 1,
"ALC_CMC.3": 1,
"ALC_CMC.4": 2,
"ALC_CMC.5": 1,
"ALC_CMS": 1,
"ALC_CMS.1": 1,
"ALC_CMS.2": 1,
"ALC_CMS.3": 1,
"ALC_CMS.4": 1,
"ALC_CMS.5": 3,
"ALC_DEL": 1,
"ALC_DEL.1": 2,
"ALC_DVS": 1,
"ALC_DVS.1": 1,
"ALC_DVS.2": 7,
"ALC_FLR": 3,
"ALC_FLR.1": 1,
"ALC_FLR.2": 1,
"ALC_FLR.3": 1,
"ALC_LCD.1": 2,
"ALC_LCD.2": 1,
"ALC_TAT": 1,
"ALC_TAT.1": 1,
"ALC_TAT.2": 3,
"ALC_TAT.3": 1
},
"APE": {
"APE_CCL.1": 1,
"APE_ECD.1": 1,
"APE_INT.1": 1,
"APE_OBJ.1": 1,
"APE_OBJ.2": 1,
"APE_REQ.1": 1,
"APE_REQ.2": 1,
"APE_SPD.1": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_CCL.1": 1,
"ASE_ECD": 1,
"ASE_ECD.1": 1,
"ASE_INT": 1,
"ASE_INT.1": 1,
"ASE_OBJ": 1,
"ASE_OBJ.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.1": 1,
"ASE_REQ.2": 1,
"ASE_SPD": 1,
"ASE_SPD.1": 1,
"ASE_TSS": 1,
"ASE_TSS.1": 1,
"ASE_TSS.2": 1
},
"ATE": {
"ATE_COV": 2,
"ATE_COV.1": 1,
"ATE_COV.2": 1,
"ATE_COV.3": 1,
"ATE_DPT": 2,
"ATE_DPT.1": 1,
"ATE_DPT.2": 1,
"ATE_DPT.3": 2,
"ATE_DPT.4": 1,
"ATE_FUN": 2,
"ATE_FUN.1": 1,
"ATE_FUN.2": 1,
"ATE_IND": 1,
"ATE_IND.1": 1,
"ATE_IND.2": 1,
"ATE_IND.3": 1
},
"AVA": {
"AVA_VAN": 3,
"AVA_VAN.1": 1,
"AVA_VAN.2": 1,
"AVA_VAN.3": 1,
"AVA_VAN.4": 1,
"AVA_VAN.5": 6
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 7,
"EAL 2": 4,
"EAL 3": 4,
"EAL 4": 9,
"EAL 5": 14,
"EAL 5 augmented": 3,
"EAL 5+": 1,
"EAL 6": 4,
"EAL 7": 4
},
"ITSEC": {
"ITSEC Evaluation": 1
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"ETR for Composition (ETR-COMP), M7892 B11, BSI-DSZ-CC-0782, Version 5, 20 March 2014, T\u00dcViT GmbH (confidential document) [21] SLx 70 Family Production and Personalization User\u2019s Manual, Revision 2012-06-27, Infineon": 1,
"Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0, BSI-DSZ-CC-0869-2015, T\u00dcViT GmbH (confidential document) [10] Configuration List BSI-DSZ-CC-0869-2015: Configuration Management Scope for Java Card": 1,
"SLJ 52GxxyyyzR) V1.0, BSI-DSZ-CC-0869-2015, ST Version 2.0, 20 November 2014, Oracle Corporation (confidential document) 9 specifically \u2022 AIS 1, Version 13, Durchf\u00fchrung der Ortsbesichtigung in der Entwicklungsumgebung": 1,
"and certification procedure is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the product or resulting from the evaluation and certification": 1,
"for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0, Version 1, 30 January 2015, T\u00dcViT GmbH (confidential document) [19] Certification Report \u2013 for Infineon Security Controller M7892 B11 with optional RSA2048/4096": 1,
"for Infineon on SLE78 (SLJ 52GxxyyyzR) V 1.0, Version 1.4, 29 January 2015, Oracle Corporation (confidential document) [11] AGD_OPE for Java Card Platform Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0": 1
},
"OutOfScope": {
"out of scope": 1,
"the TOE, but pre-issuance loading of applets is possible. Native code post-issuance downloading is out of scope. The TOE fulfills the requirements of the Protection Profile Java Card Protection Profile - Open": 1
}
},
"cipher_mode": {
"CCM": {
"CCM": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"Infineon": {
"v1.02.013": 5
}
},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"TUV": {
"T\u00dcV Informationstechnik": 2,
"T\u00dcViT": 3
}
},
"hash_function": {
"MD": {
"MD5": {
"MD5": 2
}
},
"RIPEMD": {
"RIPEMD": 1,
"RIPEMD160": 1
},
"SHA": {
"SHA1": {
"SHA-1": 1
},
"SHA2": {
"SHA-2": 4
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 6
},
"TRNG": {
"TRNG": 2
}
},
"side_channel_analysis": {
"FI": {
"malfunction": 1
},
"other": {
"JIL": 4
}
},
"standard_id": {
"BSI": {
"AIS 1": 1,
"AIS 20": 2,
"AIS 25": 1,
"AIS 26": 2,
"AIS 32": 1,
"AIS 34": 2,
"AIS 35": 2,
"AIS 36": 6,
"AIS 46": 1,
"AIS20": 1
},
"ISO": {
"ISO/IEC 15408": 4,
"ISO/IEC 17065": 2,
"ISO/IEC 18045": 4
},
"SCP": {
"SCP01": 2,
"SCP02": 2,
"SCP03": 3
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 2
}
},
"DES": {
"3DES": {
"TDES": 2
}
},
"miscellaneous": {
"SEED": {
"SEED": 2
}
}
},
"technical_report_id": {
"BSI": {
"BSI 7125": 2,
"BSI 7138": 2,
"BSI 7148": 1,
"BSI TR-02102": 1,
"BSI TR-02102-1": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon": 26,
"Infineon Technologies AG": 3
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20150227121448+01\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "Common Criteria, Certification, Zertifizierung, BSI-DSZ-CC-0869-2015, Java Card",
"/ModDate": "D:20150227130818+01\u002700\u0027",
"/Producer": "LibreOffice 4.2",
"/Subject": "Common Criteria Certification BSI-DSZ-CC-0869-2015",
"/Title": "Certification Report BSI-DSZ-CC-0869-2015",
"pdf_file_size_bytes": 1268716,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.bsi.bund.de/zertifizierung",
"http://www.commoncriteriaportal.org/",
"https://www.bsi.bund.de/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 40
},
"st_filename": "0869b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 11
},
"ECDH": {
"ECDH": 5
},
"ECDSA": {
"ECDSA": 10
}
},
"FF": {
"DH": {
"Diffie-Hellman": 1
},
"DSA": {
"DSA": 2
}
},
"RSA": {
"RSA-CRT": 3
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0782-2012-MA-01": 1,
"BSI-DSZ-CC-0782-MA-01": 2,
"BSI-DSZ-CC-0869": 1
}
},
"cc_claims": {
"A": {
"A.APPLET": 6,
"A.DELETION": 1,
"A.VERIFICATION": 6
},
"D": {
"D.API_DATA": 3,
"D.APP_CODE": 7,
"D.APP_C_DATA": 3,
"D.APP_I_DATA": 5,
"D.CM_APDU": 1,
"D.CRYPTO": 6,
"D.JCS_CODE": 3,
"D.JCS_DATA": 4,
"D.JCS_KEYS": 3,
"D.PIN": 6,
"D.SEC_ATTRIBUTES": 2,
"D.SEC_DATA": 8
},
"O": {
"O.ALARM": 21,
"O.APPLET": 19,
"O.CARD-": 6,
"O.CARD-MANAGEMENT": 33,
"O.CIPHER": 16,
"O.CODE_PKG": 16,
"O.COMMUNICATION": 11,
"O.DELETION": 15,
"O.EXT-": 1,
"O.EXT-MEM": 20,
"O.EXT_MEM_INSTANCE": 10,
"O.FIREWALL": 46,
"O.GLOBAL_ARRAYS_C": 1,
"O.GLOBAL_ARRAYS_CONFID": 17,
"O.GLOBAL_ARRAYS_IN": 1,
"O.GLOBAL_ARRAYS_INTEG": 9,
"O.IC_SUPPORT": 17,
"O.INSTALL": 15,
"O.JAVAOBJECT": 41,
"O.KEY-": 1,
"O.KEY-MNGT": 24,
"O.LOAD": 18,
"O.NATIVE": 13,
"O.OBJ-DELETION": 8,
"O.OPERATE": 35,
"O.OS": 1,
"O.OS_SUPPORT": 23,
"O.PACKAGE": 2,
"O.PIN-": 1,
"O.PIN-MNGT": 22,
"O.REALLOCATION": 17,
"O.RECOVERY": 24,
"O.REMOTE": 1,
"O.RESOURCES": 24,
"O.RND": 14,
"O.SID": 35,
"O.TRANSACTION": 18
},
"OE": {
"OE.APPLET": 8,
"OE.CARD-MANAGEMENT": 2,
"OE.CODE-": 4,
"OE.CODE-EVIDENCE": 17,
"OE.SCP": 6,
"OE.VERIFICATION": 38
},
"OP": {
"OP.ARRAY_ACCESS": 4,
"OP.CREATE": 7,
"OP.CREATE_EXT_MEM_INSTANCE": 3,
"OP.DELETE_APPLET": 4,
"OP.DELETE_PCKG": 3,
"OP.DELETE_PCKG_APPLET": 3,
"OP.GP": 3,
"OP.INSTANCE_FIELD": 4,
"OP.INVK_INTERFACE": 7,
"OP.INVK_VIRTUAL": 6,
"OP.JAVA": 5,
"OP.LOAD_PCKG": 1,
"OP.PUT": 6,
"OP.READ_EXT_MEM": 3,
"OP.THROW": 5,
"OP.TYPE_ACCESS": 5,
"OP.WRITE_EXT_MEM": 3
},
"OSP": {
"OSP.VERIFICATION": 6
},
"R": {
"R.JAVA": 12
},
"T": {
"T.COMMUNICATION": 5,
"T.CONFID-APPLI-": 3,
"T.CONFID-APPLI-DATA": 17,
"T.CONFID-JCS-": 8,
"T.CONFID-JCS-CODE": 6,
"T.CONFID-JCS-DATA": 6,
"T.DELETION": 5,
"T.EXE-": 1,
"T.EXE-CODE": 8,
"T.FAULT": 5,
"T.INSTALL": 6,
"T.INTEG-": 10,
"T.INTEG-APPLI-": 10,
"T.INTEG-APPLI-CODE": 9,
"T.INTEG-APPLI-DATA": 18,
"T.INTEG-JCS-": 1,
"T.INTEG-JCS-CODE": 8,
"T.INTEG-JCS-DATA": 7,
"T.LEAKAGE": 5,
"T.NATIVE": 6,
"T.OBJ-DELETION": 4,
"T.PHYSICAL": 8,
"T.RESOURCES": 9,
"T.RND": 5,
"T.SID": 19
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0035-2007": 1,
"BSI-PP-0017-2005": 1,
"BSI-PP-0035": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 6,
"ADV_COMP.1": 1,
"ADV_FSP.1": 4,
"ADV_FSP.2": 2,
"ADV_FSP.4": 2,
"ADV_FSP.5": 7,
"ADV_IMP.1": 9,
"ADV_INT.2": 1,
"ADV_TDS.1": 2,
"ADV_TDS.2": 1,
"ADV_TDS.3": 10,
"ADV_TDS.4": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 10,
"AGD_PRE": 1,
"AGD_PRE.1": 6
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.1": 1,
"ALC_CMS.4": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 2,
"ALC_DVS.2": 6,
"ALC_LCD.1": 3,
"ALC_TAT.1": 2,
"ALC_TAT.2": 3
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 4,
"ASE_INT.1": 5,
"ASE_OBJ.2": 3,
"ASE_REQ.1": 2,
"ASE_REQ.2": 2,
"ASE_SPD.1": 2,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.1": 2,
"ATE_COV.2": 3,
"ATE_DPT.1": 2,
"ATE_FUN.1": 6
},
"AVA": {
"AVA_VAN.5": 6
}
},
"cc_security_level": {
"EAL": {
"EAL 5": 1,
"EAL 5 augmented": 1,
"EAL5": 6,
"EAL5 augmented": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP.1": 24,
"FAU_ARP.1.1": 1,
"FAU_SAA.1": 3
},
"FCO": {
"FCO_NRO": 6,
"FCO_NRO.2": 6
},
"FCS": {
"FCS_CKM": 6,
"FCS_CKM.1": 19,
"FCS_CKM.2": 11,
"FCS_CKM.2.1": 1,
"FCS_CKM.3": 7,
"FCS_CKM.3.1": 1,
"FCS_CKM.4": 17,
"FCS_CKM.4.1": 1,
"FCS_COP": 32,
"FCS_COP.1": 26,
"FCS_RNG": 4,
"FCS_RNG.1": 14,
"FCS_RNG.1.1": 2,
"FCS_RNG.1.2": 2
},
"FDP": {
"FDP_ACC": 40,
"FDP_ACC.1": 17,
"FDP_ACC.2": 5,
"FDP_ACF": 38,
"FDP_ACF.1": 24,
"FDP_IFC": 25,
"FDP_IFC.1": 15,
"FDP_IFC.2": 2,
"FDP_IFF": 18,
"FDP_IFF.1": 17,
"FDP_ITC": 12,
"FDP_ITC.1": 4,
"FDP_ITC.2": 13,
"FDP_ITT.1": 1,
"FDP_RIP": 135,
"FDP_RIP.1": 11,
"FDP_ROL": 16,
"FDP_ROL.1": 5,
"FDP_SDI.1": 1,
"FDP_SDI.2": 13,
"FDP_SDI.2.1": 1,
"FDP_SDI.2.2": 1,
"FDP_UIT": 6,
"FDP_UIT.1": 2
},
"FIA": {
"FIA_ATD": 9,
"FIA_ATD.1": 2,
"FIA_UID": 22,
"FIA_UID.1": 12,
"FIA_UID.2": 1,
"FIA_USB": 6,
"FIA_USB.1": 3
},
"FMT": {
"FMT_MSA": 135,
"FMT_MSA.1": 14,
"FMT_MSA.2": 2,
"FMT_MSA.3": 22,
"FMT_MTD": 20,
"FMT_MTD.1": 2,
"FMT_MTD.3": 1,
"FMT_SMF": 41,
"FMT_SMF.1": 22,
"FMT_SMF.1.1": 1,
"FMT_SMR": 43,
"FMT_SMR.1": 37,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPR": {
"FPR_UNO.1": 13,
"FPR_UNO.1.1": 1
},
"FPT": {
"FPT_FLS": 36,
"FPT_FLS.1": 16,
"FPT_FLS.1.1": 2,
"FPT_ITT.1": 1,
"FPT_PHP.3": 1,
"FPT_RCV": 27,
"FPT_RCV.3": 13,
"FPT_RCV.4": 2,
"FPT_TDC.1": 8,
"FPT_TDC.1.1": 1,
"FPT_TDC.1.2": 1,
"FPT_TST.1": 1
},
"FRU": {
"FRU_FLT.2": 1
},
"FTP": {
"FTP_ITC": 10,
"FTP_ITC.1": 5,
"FTP_TRP.1": 2
}
},
"certification_process": {
"OutOfScope": {
"Software development environment. Phase 2 covers the Secure IC Development of Infineon and is out of scope of the TOE evaluation as that is part of the IC platform evaluation. In Phase 3, the Chip": 1,
"a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.RECOVERY and O.OS_SUPPORT are": 1,
"by the TOE. There are no pre-issuance applets installed. Native code post-issuance downloading is out of scope The SCP is a certified hardware platform \u2013 the SLE78CLFX4000P(M) with RSA2048/4096 v1.02.013, EC v1": 1,
"out of scope": 3
}
},
"cipher_mode": {
"CBC": {
"CBC": 21
},
"CCM": {
"CCM": 1
},
"ECB": {
"ECB": 6
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"Infineon": {
"v1.02.013": 3
}
},
"crypto_protocol": {},
"crypto_scheme": {
"KA": {
"KA": 2,
"Key Agreement": 2
},
"KEX": {
"Key exchange": 1
},
"MAC": {
"MAC": 4
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"P-192": 2
}
},
"eval_facility": {
"TUV": {
"TUV Informationstechnik": 1,
"T\u00dcV Informationstechnik": 1
}
},
"hash_function": {
"MD": {
"MD5": {
"MD5": 3
}
},
"RIPEMD": {
"RIPEMD-160": 2,
"RIPEMD160": 1
},
"SHA": {
"SHA1": {
"SHA-1": 1
},
"SHA2": {
"SHA-2": 5,
"SHA-224": 1,
"SHA-256": 1,
"SHA-384": 1,
"SHA-512": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {
"misc": {
"TYPE_ACCESS": 5
}
},
"javacard_packages": {
"javacard": {
"javacard.framework": 4,
"javacard.security": 3
},
"javacardx": {
"javacardx.crypto": 3,
"javacardx.external": 1,
"javacardx.security": 1
}
},
"javacard_version": {
"JavaCard": {
"Java Card 3.0.1": 3
}
},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 20,
"RNG": 11
},
"TRNG": {
"TRNG": 3
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 3,
"malfunction": 4,
"physical tampering": 1
},
"SCA": {
"DPA": 4,
"Leak-Inherent": 2,
"SPA": 1,
"physical probing": 3,
"side channel": 1,
"timing attacks": 1
}
},
"standard_id": {
"BSI": {
"AIS20": 4,
"AIS36": 2
},
"FIPS": {
"FIPS 140-2": 1,
"FIPS 180-4": 6,
"FIPS 186-3": 7,
"FIPS 197": 9,
"FIPS PUB 180-4": 1,
"FIPS PUB 186-3": 1,
"FIPS PUB 197": 1,
"FIPS140": 2
},
"ICAO": {
"ICAO": 6
},
"ISO": {
"ISO/IEC 14443": 2,
"ISO/IEC 15946-": 5,
"ISO/IEC 18092": 2,
"ISO/IEC7816": 2
},
"NIST": {
"NIST SP 800-108": 1,
"NIST SP 800-38B": 1
},
"RFC": {
"RFC 5639": 5
},
"SCP": {
"SCP 02": 2,
"SCP 03": 3,
"SCP01": 2,
"SCP02": 9,
"SCP03": 9
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 19
}
},
"DES": {
"3DES": {
"TDEA": 1,
"TDES": 22,
"Triple-DES": 1
},
"DES": {
"DES": 9
}
},
"constructions": {
"MAC": {
"CMAC": 1
}
},
"miscellaneous": {
"SEED": {
"SEED": 2
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon": 182,
"Infineon Technologies AG": 2
},
"NXP": {
"NXP Semiconductors": 1
},
"STMicroelectronics": {
"STMicroelectronics": 1
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "T\u00dcV Informationstechnik GmbH, Roland Atoui, Linda Kyrnitszke",
"/CreationDate": "D:20141120164433+01\u002700\u0027",
"/Creator": "Microsoft\u00ae Office Word 2007",
"/Keywords": "Java Card Platform, Smart Card,",
"/ModDate": "D:20141120164433+01\u002700\u0027",
"/Producer": "Microsoft\u00ae Office Word 2007",
"/Subject": "Common Criteria - ASE",
"/Title": "Security Target Lite - Java Card Platform on SLE 78 (SLJ 52)",
"pdf_file_size_bytes": 2880995,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.iso.org/iso/iso_catalogue/catalogue_tc/catalogue_detail.htm?csnumber=30656"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 158
}
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": "EAL4+",
"pp_ids": {
"_type": "Set",
"elements": [
"ANSSI-CC-PP-2001-03-M01",
"ANSSI-CC-PP-2010-03",
"JCSPPC"
]
},
"pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/ANSSI-CC-profil_PP-2010-03en.pdf",
"pp_name": "Java Card\u2122 System Protection Profile Open Configuration, Version 3.0"
}
]
},
"report_link": "https://www.commoncriteriaportal.org/files/epfiles/0869a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"AVA_VAN.5",
"ALC_DVS.2",
"EAL5+"
]
},
"st_link": "https://www.commoncriteriaportal.org/files/epfiles/0869b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "4919856aca1390ba0a11287b0ddfa3e9f976f6e678b2b2a2dc44f58e4842fcc2",
"txt_hash": "16970b2f509be251e90601cc89d5bda8e4182f8616c7069cefd49701a354a75d"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "3db4cbb37700c9c4a1a564689053f9f989120c0d09b8dc8720e40c7d776bc7fa",
"txt_hash": "67fedaf86fe2fd88b1299bfe9370da6eac9f84609bf8171fc31bd530d17d0443"
}
},
"status": "archived"
}