Card Usimera Protect: SLE88CFX4000P microcontroller embedding SIM, USIM and OTA applications on Java card open platform (version 2.1).

CSV information ?

Status archived
Valid from 30.03.2007
Valid until 01.09.2019
Scheme 🇫🇷 FR
Manufacturer Gemalto - Infineon Technologies AG
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level AVA_MSU.3, EAL4+, AVA_VLA.4, ADV_IMP.2, ALC_DVS.2

Heuristics summary ?

Certificate ID: ANSSI-CC-2007/08

Certificate ?

Certification report ?

Extracted keywords

Symmetric Algorithms
DES
Block cipher modes
CCM

Vendor
Infineon, Infineon Technologies AG, Gemalto

Security level
EAL 4, EAL4, EAL5, EAL7, EAL 1, EAL 3, EAL 5, EAL 7, EAL4+, EAL5+, EAL 4 augmented, ITSEC E6 and
Security Assurance Requirements (SAR)
ACM_AUT, ACM_CAP, ACM_SCP, ADO_DEL, ADO_IGS, ADV_IMP.2, ADV_FSP, ADV_HLD, ADV_IMP, ADV_INT, ADV_LLD, ADV_RCR, ADV_SPM, AGD_ADM, AGD_USR, ALC_DVS.2, ALC_FLR, ALC_DVS, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_MSU.3, AVA_VLA.4, AVA_CCA, AVA_MSU, AVA_SOF, AVA_VLA
Protection profiles
BSI-PP-0002-2001
Certificates
BSI-DSZ-CC-0269-2006, BSI-DSZ-CC-0269-2006-MA-02, DCSSI-2007/08
Evaluation facilities
Serma Technologies

Standards
AIS34, AIS31, AIS 34, CCIMB-2004-01-001, CCIMB-2004-01-002, CCIMB-2004-01-003, CCIMB-2004-01-004

File metadata

Title: DCSSI-2007/08
Subject: Card Usimera Protect: SLE88CFX4000P microcontroller embedding SIM, USIM and OTA applications on Java card open plate-form ...
Keywords: CER/F/07.5
Author: Mathieu Robert
Creation date: D:20070330160630+02'00'
Modification date: D:20070330160633+03'00'
Pages: 17
Creator: Acrobat PDFMaker 5.0 pour Word
Producer: Acrobat Distiller 5.0 (Windows)

Frontpage

Certificate ID: DCSSI-2007/08
Certified item: Card Usimera Protect: SLE88CFX4000P microcontroller embedding SIM, USIM and OTA applications on Java card open plate-form (version 2.1). Product reference
Certification lab: Serma Technologies 30 avenue Gustave Eiffel, 33608 Pessac, France Phone: +33 (0)5 57 26 08 75, email : e.francois@serma.com
Developer: Gemalto 6 rue de la verrerie, 92197 Meudon, France Infineon Technologies AG St.-Martin-Straße 76, 81609 München, Allemagne Sponsor Gemalto 6 rue de la verrerie, 92197 Meudon, France

References

Outgoing
  • BSI-DSZ-CC-0269-2006 - Infineon Smart Card IC (Security Controller) SLE88CFX4000P/m8830b17, SLE88CFX4002P/m8834b17, SLE88CFX3520P/m8847b17 and SLE88CFX2920P/m8849b17 each with PSL V0.50.23 and specific IC Dedicated Software
Incoming
  • ANSSI-CC-2007/19 - Java Card System of Usimera Protect V1.0 card on SLE88CFX4000P

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES, TDES
Hash functions
SHA-1, MD5
Schemes
MAC

JavaCard versions
Java Card 2.2.1, Java Card 2.2, Java Card 3.4.3, Global Platform 2.1.1
JavaCard API constants
TYPE_ACCESS
Vendor
Infineon, Infineon Technologies AG, Gemalto, Axalto

Security level
EAL4, EAL4+, EAL4 augmented
Claims
D.NET_AUTH_KEY, D.NET_ACCESS, D.APP_CODE, D.APP_C_DATA, D.APP_I_DATA, D.PIN, D.AUTH-APPLI_ATTRIB, D.AUTH-KEY_ATTRIB, D.AUTH-CRYPTO_ALGO, D.AUTH_CODE, D.JCS_CODE, D.JCS_DATA, D.SEC_DATA, D.API_DATA, D.CRYPTO, O.JAVAOBJECT, O.APPLET, O.CODE_PKG, O.CODE_PCKG, O.REMOTE_OBJ, O.REMOTE_MTHD, O.ROR, O.RMI_SERVICE, O.REMOTE_OBJECT, T.PHYSICAL, T.AUTH-DATA_DISCLOSURE, T.AUTH-DATA_MODIFICATION, T.AUTH-ALGO_DISCLOSURE, T.AUTH-ALGO_MODIFICATION, T.AUTH-ALGO_EXE, T.UNAUTH_NET_ACCESS, T.CONFID-JCS-CODE, T.CONFID-APPLI-DATA, T.CONFID-JCS-DATA, T.INTEG-APPLI-CODE, T.INTEG-JCS-CODE, T.INTEG-APPLI-DATA, T.INTEG-JCS-DATA, T.SID, T.EXE-CODE, T.NATIVE, T.EXE-CODE-REMOTE, T.RESOURCES, T.INSTALL, T.DELETION, T.OBJ-DELETION, A.NET-OP_KEY_MGT, A.NATIVE, A.VERIFICATION, A.APPLET, R.JAVA, OT.AUTH-KEYS_CONFID, OT.AUTH-KEYS_INTEG, OT.AUTH-ALGO_CONFID, OT.AUTH-ALGO_INTEG, OT.AUTH-ALGO_EXEC, OT.ACCOUNT_NET_ACCESS, OT.SID, OT.OPERATE, OT.RESOURCES, OT.FIREWALL, OT.NATIVE, OT.REALLOCATION, OT.SHRD_VAR_CONFID, OT.SHRD_VAR_INTEG, OT.ALARM, OT.TRANSACTION, OT.KEY-MNGT, OT.CIPHER, OT.PIN-MNGT, OT.REMOTE, OT.INSTALL, OT.LOAD, OT.DELETION, OT.OBJ-DELETION, OT.SCP, OT.CARD-MANAGEMENT, OP.PUT, OP.JAVA, OP.CREATE, OP.DELETE_APPLET, OP.DELETE_PCKG, OP.DELETE_PCKG_APPLET, OP.GET_ROR, OP.INVOKE, OP.RET_RORD, OP.ARRAY_ACCESS, OP.INSTANCE_FIELD, OP.INVK_VIRTUAL, OP.INVK_INTERFACE, OP.THROW, OP.TYPE_ACCESS, OP.SEND, OP.RECEIVE, OP.BYTECODE, OE.NATIVE, OE.DEVELOPMENT, OE.KEY_MANAGEMENT, OE.APPLET, OE.VERIFICATION, OSP.NATIVE, OSP.VERIFICATION
Security Assurance Requirements (SAR)
ACM_AUT, ACM_AUT.1, ACM_CAP, ACM_CAP.4, ACM_SCP, ACM_SCP.2, ADO_DEL, ADO_DEL.2, ADO_IGS, ADO_IGS.1, ADV_IMP.2, ADV_FSP, ADV_FSP.2, ADV_HLD, ADV_HLD.2, ADV_IMP, ADV_LLD, ADV_LLD.1, ADV_RCR, ADV_RCR.1, ADV_SPM, ADV_SPM.1, AGD_ADM, AGD_ADM.1, AGD_USR, AGD_USR.1, ALC_DVS.2, ALC_DVS, ALC_LCD, ALC_LCD.1, ALC_TAT, ALC_TAT.1, ATE_COV, ATE_COV.2, ATE_DPT, ATE_DPT.1, ATE_FUN, ATE_FUN.1, ATE_IND, ATE_IND.2, AVA_VLA.4, AVA_MSU.3, AVA_MSU, AVA_SOF, AVA_SOF.1, AVA_VLA, AVA_VLA.3
Security Functional Requirements (SFR)
FAU_ARP, FAU_ARP.1, FCO_NRO, FCO_NRO.2, FCS_COP, FCS_COP.1, FCS_CKM, FCS_CKM.1, FCS_CKM.2, FCS_CKM.3, FCS_CKM.4, FDP_ACC, FDP_ACC.1, FDP_ACF, FDP_ACF.1, FDP_SDI, FDP_SDI.2, FDP_IFC, FDP_IFC.1, FDP_IFF, FDP_IFF.1, FDP_RIP, FDP_RIP.1, FDP_ROL, FDP_ROL.1, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ITC, FDP_ITC.2, FDP_ACC.2, FDP_IFC.2, FDP_UIT, FDP_UIT.1, FDP_IFF.2, FDP_IFF.2.2, FDP_IFF.2.7, FIA_UID, FIA_UID.1, FIA_ATD, FIA_ATD.1, FIA_UID.2, FIA_USB.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FMT_SMR, FMT_MSA, FMT_MSA.1, FMT_MSA.3, FMT_MSA.2, FMT_SMR.1, FMT_SMF, FMT_SMF.1, FMT_MTD, FMT_MTD.1, FMT_MTD.3, FMT_MTD.3.1, FMT_REV, FMT_REV.1, FMT_SMR.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FPR_UNO, FPR_UNO.1, FPR_UNO.1.1, FPT_RCV, FPT_RVM, FPT_RVM.1, FPT_AMT, FPT_AMT.1, FPT_FLS, FPT_FLS.1, FPT_PHP, FPT_PHP.3, FPT_SEP, FPT_SEP.1, FPT_RCV.4, FPT_ITT, FPT_ITT.1, FPT_ITT.3, FPT_RCV.3, FPT_TDC.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_TST.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FRU_FLT, FRU_FLT.1, FRU_RSA, FRU_RSA.1, FTP_ITC, FTP_ITC.1
Certificates
CC-1, CC-2, CC-3

Side-channel analysis
side channel, timing attacks, physical tampering, malfunction, DFA, fault injection

Standards
FIPS 46-3, FIPS 197, FIPS 180-2, CCIMB-2004-01-001, CCIMB-2004-01-002, CCIMB-2004-01-003, CCIMB-2004-01-004

File metadata

Title: D1019540
Subject: Security Target for Usimera Protect
Author: Sorin Aurel SPORNIC
Creation date: D:20070323143339+01'00'
Modification date: D:20070327163427+03'00'
Pages: 93
Creator: Acrobat PDFMaker 6.0 for Word
Producer: Acrobat Distiller 6.0.1 (Windows)

References

Outgoing
Incoming

Heuristics ?

Certificate ID: ANSSI-CC-2007/08

Extracted SARs

ATE_IND.2, ADV_IMP.2, ADV_LLD.1, ADV_HLD.2, AGD_ADM.1, AVA_SOF.1, ADV_FSP.2, ALC_DVS.2, AGD_USR.1, ATE_FUN.1, ADV_RCR.1, ADV_SPM.1, ALC_TAT.1, ATE_DPT.1, AVA_VLA.4, AVA_MSU.3, ATE_COV.2, ALC_LCD.1

References ?

Updates ?

  • 15.02.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '498405734249530e0720cb9aa262f8f8ed57a78a434ce11fa54ac4e24de9caec', 'txt_hash': 'c6a7f47e00d8d02e1d6932685afa2c3b69e125b8a1dceb2777be83c0d727ed84'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '1992c3313476f4edabd9014a1fb52a202cd7bc1a2eb6dcd3f92e70b9f9fe0897', 'txt_hash': '82675e4cd8014f4796318b7bc78165c6320b1fe8b0d237c785bd64886fb69e3f'}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}}.
    • The following properties were deleted: ['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash'].

    The PDF extraction data was updated.

    • The following values were inserted: {'cert_metadata': None, 'cert_frontpage': None, 'cert_keywords': None, 'cert_filename': None}.
    • The report_frontpage property was set to {'FR': {'match_rules': ['Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developer\\(s\\)(.+)Evaluation facility(.+)Recognition arrangements'], 'cert_id': 'DCSSI-2007/08', 'cert_item': 'Card Usimera Protect: SLE88CFX4000P microcontroller embedding SIM, USIM and OTA applications on Java card open plate-form (version 2.1). Product reference', 'cert_item_version': ' T1000230 Usimera Protect 128K crypto on Infineon Code version: 2.1', 'ref_protection_profiles': 'Java Card System Protection Profile Collection, V1.0b, Configuration Standard 2.2. Reference PP/0305', 'cc_version': 'Common Criteria version 2.2', 'cc_security_level': 'EAL 4 augmented ADV_IMP.2, ALC_DVS.2, AVA_MSU.3, AVA_VLA.4', 'developer': 'Gemalto 6 rue de la verrerie, 92197 Meudon, France Infineon Technologies AG St.-Martin-Straße 76, 81609 München, Allemagne Sponsor Gemalto 6 rue de la verrerie, 92197 Meudon, France', 'cert_lab': 'Serma Technologies 30 avenue Gustave Eiffel, 33608 Pessac, France Phone: +33 (0)5 57 26 08 75, email : e.francois@serma.com'}}.
    • The st_frontpage property was set to None.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__insert__': {'BSI-DSZ-CC-0269-2006-MA-02': 1}, '__update__': {'BSI-DSZ-CC-0269-2006': 6}}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'NL': {'CC-1': 2, 'CC-2': 2, 'CC-3': 2}}} data.

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 13.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0269-2006': 12}, '__delete__': ['BSI-DSZ-CC-0269-2006-MA-02']}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {}} data.

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'Carte Usimera Protect : composant SLE88CFX4000P embarquant les applications SIM, USIM et OTA sur plate-forme ouverte Javacard (version 2.1)', 'url': 'https://cyber.gouv.fr/produits-certifies/carte-usimera-protect-composant-sle88cfx4000p-embarquant-les-applications-sim', 'description': 'Le produit évalué est la carte Usimera Protect, constituée du composant SLE88CFX4000P / m8830 B17 avec sa bibliothèque logicielle PSL v0.50.23, développé par Infineon Technologies AG, et embarquant les applications SIM, USIM et OTA sur plate-forme ouverte Javacard, développées par Gemalto.\nLa référence du logiciel chargé en mémoire « flash » est « T1000230 Usimera Protect 128K crypto on Infineon', 'sponsor': 'Infineon Technologies AG', 'developer': 'Gemalto', 'cert_id': '2007/08', 'level': 'EAL4+', 'enhanced': {'cert_id': '2007/08', 'certification_date': '30/03/2007', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 2.2', 'developer': 'Gemalto', 'sponsor': 'Infineon Technologies AG', 'evaluation_facility': 'Serma Technologies', 'level': 'EAL4+', 'protection_profile': 'PP/0305', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ADV_IMP.2, ALC_DVS.2, AVA_MSU.3, AVA_VLA.4', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi-cible_2007-08en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi_2007-08en.pdf'}}.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__delete__': ['CA']}} data.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__insert__': {'CA': {'1 1 2': 5, '1 2 3': 5, '4 5 5': 1, '2 3 2': 1, '1 1 1': 12, '3 3 4': 1, '1 2 2': 6, '4 5 2': 1, '2 2 3': 2, '1 3 3': 1, '3 3 2': 1, '2 2 1': 1, '4 4 4': 1}}, '__update__': {'DE': {'__insert__': {'BSI-DSZ-CC-0269-2006-MA-02': 1}, '__update__': {'BSI-DSZ-CC-0269-2006': 6}}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'NL': {'CC-1': 2, 'CC-2': 2, 'CC-3': 2}}} data.

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 05.02.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'Carte Usimera Protect : composant SLE88CFX4000P embarquant les applications SIM, USIM et OTA sur plate-forme ouverte Javacard (version 2.1)', 'url': 'https://cyber.gouv.fr/produits-certifies/carte-usimera-protect-composant-sle88cfx4000p-embarquant-les-applications-sim', 'description': 'Le produit évalué est la carte Usimera Protect, constituée du composant SLE88CFX4000P / m8830 B17 avec sa bibliothèque logicielle PSL v0.50.23, développé par Infineon Technologies AG, et embarquant les applications SIM, USIM et OTA sur plate-forme ouverte Javacard, développées par Gemalto.\nLa référence du logiciel chargé en mémoire « flash » est « T1000230 Usimera Protect 128K crypto on Infineon', 'sponsor': 'Infineon Technologies AG', 'developer': 'Gemalto', 'cert_id': '2007/08', 'level': 'EAL4+', 'enhanced': {'cert_id': '2007/08', 'certification_date': '30/03/2007', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 2.2', 'developer': 'Gemalto', 'sponsor': 'Infineon Technologies AG', 'evaluation_facility': 'Serma Technologies', 'level': 'EAL4+', 'protection_profile': 'PP/0305', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ADV_IMP.2, ALC_DVS.2, AVA_MSU.3, AVA_VLA.4', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi-cible_2007-08en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi_2007-08en.pdf'}}.
  • 04.01.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'annotated_references': None}.
  • 26.04.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'scheme_data': None}.
  • 11.02.2023 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.cc.CCCertificate.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.InternalState.
    • The following properties were deleted: ['errors'].

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.PdfData.

    The computed heuristics were updated.

    • The following values were inserted: {'direct_transitive_cves': None, 'indirect_transitive_cves': None}.
    • The _type property was set to sec_certs.sample.cc.CCCertificate.Heuristics.
    • The following properties were deleted: ['direct_dependency_cves', 'indirect_dependency_cves'].
  • 05.02.2023 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to [].
  • 26.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/2007_08en.pdf, code: 408'].
    • The st_pdf_hash property was set to 1992c3313476f4edabd9014a1fb52a202cd7bc1a2eb6dcd3f92e70b9f9fe0897.
    • The st_txt_hash property was set to 82675e4cd8014f4796318b7bc78165c6320b1fe8b0d237c785bd64886fb69e3f.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 555904, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 93, '/ModDate': "D:20070327163427+03'00'", '/CreationDate': "D:20070323143339+01'00'", '/Title': 'D1019540', '/Creator': 'Acrobat PDFMaker 6.0 for Word', '/Category': 'CC evaluation', '/Producer': 'Acrobat Distiller 6.0.1 (Windows)', '/Author': 'Sorin Aurel SPORNIC', '/Subject': 'Security Target for Usimera Protect', '/Company': 'Axalto', '/security-level': 'AXLT-Public', '/classification-date': '21/03/2007', '/classification-version': 'Version 3.6.0', '/SourceModified': 'D:20070323133327', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 4, 'EAL4+': 1, 'EAL4 augmented': 3}}, 'cc_sar': {'ACM': {'ACM_AUT': 1, 'ACM_AUT.1': 9, 'ACM_CAP': 1, 'ACM_CAP.4': 19, 'ACM_SCP': 1, 'ACM_SCP.2': 5}, 'ADO': {'ADO_DEL': 1, 'ADO_DEL.2': 8, 'ADO_IGS': 1, 'ADO_IGS.1': 6}, 'ADV': {'ADV_IMP.2': 12, 'ADV_FSP': 1, 'ADV_FSP.2': 10, 'ADV_HLD': 1, 'ADV_HLD.2': 14, 'ADV_IMP': 1, 'ADV_LLD': 1, 'ADV_LLD.1': 15, 'ADV_RCR': 1, 'ADV_RCR.1': 5, 'ADV_SPM': 1, 'ADV_SPM.1': 9}, 'AGD': {'AGD_ADM': 1, 'AGD_ADM.1': 12, 'AGD_USR': 1, 'AGD_USR.1': 10}, 'ALC': {'ALC_DVS.2': 11, 'ALC_DVS': 1, 'ALC_LCD': 1, 'ALC_LCD.1': 7, 'ALC_TAT': 1, 'ALC_TAT.1': 8}, 'ATE': {'ATE_COV': 1, 'ATE_COV.2': 6, 'ATE_DPT': 1, 'ATE_DPT.1': 5, 'ATE_FUN': 1, 'ATE_FUN.1': 10, 'ATE_IND': 1, 'ATE_IND.2': 8}, 'AVA': {'AVA_VLA.4': 18, 'AVA_MSU.3': 17, 'AVA_MSU': 1, 'AVA_SOF': 8, 'AVA_SOF.1': 7, 'AVA_VLA': 1, 'AVA_VLA.3': 1}}, 'cc_sfr': {'FAU': {'FAU_ARP': 3, 'FAU_ARP.1': 1}, 'FCO': {'FCO_NRO': 3, 'FCO_NRO.2': 3}, 'FCS': {'FCS_COP': 19, 'FCS_COP.1': 8, 'FCS_CKM': 16, 'FCS_CKM.1': 3, 'FCS_CKM.2': 3, 'FCS_CKM.3': 3, 'FCS_CKM.4': 3}, 'FDP': {'FDP_ACC': 13, 'FDP_ACC.1': 2, 'FDP_ACF': 14, 'FDP_ACF.1': 22, 'FDP_SDI': 3, 'FDP_SDI.2': 5, 'FDP_IFC': 8, 'FDP_IFC.1': 2, 'FDP_IFF': 11, 'FDP_IFF.1': 18, 'FDP_RIP': 18, 'FDP_RIP.1': 8, 'FDP_ROL': 2, 'FDP_ROL.1': 2, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_ITC': 2, 'FDP_ITC.2': 5, 'FDP_ACC.2': 7, 'FDP_IFC.2': 4, 'FDP_UIT': 2, 'FDP_UIT.1': 2, 'FDP_IFF.2': 7, 'FDP_IFF.2.2': 1, 'FDP_IFF.2.7': 2}, 'FIA': {'FIA_UID': 13, 'FIA_UID.1': 4, 'FIA_ATD': 2, 'FIA_ATD.1': 1, 'FIA_UID.2': 1, 'FIA_USB.1': 2, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1}, 'FMT': {'FMT_SMR': 29, 'FMT_MSA': 49, 'FMT_MSA.1': 14, 'FMT_MSA.3': 14, 'FMT_MSA.2': 3, 'FMT_SMR.1': 7, 'FMT_SMF': 3, 'FMT_SMF.1': 1, 'FMT_MTD': 2, 'FMT_MTD.1': 1, 'FMT_MTD.3': 2, 'FMT_MTD.3.1': 1, 'FMT_REV': 2, 'FMT_REV.1': 2, 'FMT_SMR.1.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1}, 'FPR': {'FPR_UNO': 3, 'FPR_UNO.1': 4, 'FPR_UNO.1.1': 1}, 'FPT': {'FPT_RCV': 10, 'FPT_RVM': 3, 'FPT_RVM.1': 3, 'FPT_AMT': 2, 'FPT_AMT.1': 1, 'FPT_FLS': 16, 'FPT_FLS.1': 6, 'FPT_PHP': 3, 'FPT_PHP.3': 1, 'FPT_SEP': 3, 'FPT_SEP.1': 3, 'FPT_RCV.4': 1, 'FPT_ITT': 6, 'FPT_ITT.1': 1, 'FPT_ITT.3': 2, 'FPT_RCV.3': 4, 'FPT_TDC.1': 2, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 1, 'FPT_TST.1': 2, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1}, 'FRU': {'FRU_FLT': 3, 'FRU_FLT.1': 1, 'FRU_RSA': 4, 'FRU_RSA.1': 2}, 'FTP': {'FTP_ITC': 2, 'FTP_ITC.1': 3}}, 'cc_claims': {'D': {'D.NET_AUTH_KEY': 3, 'D.NET_ACCESS': 2, 'D.APP_CODE': 2, 'D.APP_C_DATA': 2, 'D.APP_I_DATA': 2, 'D.PIN': 2, 'D.AUTH-APPLI_ATTRIB': 2, 'D.AUTH-KEY_ATTRIB': 2, 'D.AUTH-CRYPTO_ALGO': 3, 'D.AUTH_CODE': 2, 'D.JCS_CODE': 2, 'D.JCS_DATA': 2, 'D.SEC_DATA': 2, 'D.API_DATA': 2, 'D.CRYPTO': 3}, 'O': {'O.JAVAOBJECT': 39, 'O.APPLET': 23, 'O.CODE_PKG': 6, 'O.CODE_PCKG': 8, 'O.REMOTE_OBJ': 8, 'O.REMOTE_MTHD': 6, 'O.ROR': 10, 'O.RMI_SERVICE': 9, 'O.REMOTE_OBJECT': 1}, 'T': {'T.PHYSICAL': 3, 'T.AUTH-DATA_DISCLOSURE': 2, 'T.AUTH-DATA_MODIFICATION': 2, 'T.AUTH-ALGO_DISCLOSURE': 2, 'T.AUTH-ALGO_MODIFICATION': 2, 'T.AUTH-ALGO_EXE': 2, 'T.UNAUTH_NET_ACCESS': 2, 'T.CONFID-JCS-CODE': 2, 'T.CONFID-APPLI-DATA': 2, 'T.CONFID-JCS-DATA': 2, 'T.INTEG-APPLI-CODE': 4, 'T.INTEG-JCS-CODE': 2, 'T.INTEG-APPLI-DATA': 4, 'T.INTEG-JCS-DATA': 2, 'T.SID': 4, 'T.EXE-CODE': 4, 'T.NATIVE': 2, 'T.EXE-CODE-REMOTE': 2, 'T.RESOURCES': 2, 'T.INSTALL': 2, 'T.DELETION': 2, 'T.OBJ-DELETION': 2}, 'A': {'A.NET-OP_KEY_MGT': 2, 'A.NATIVE': 3, 'A.VERIFICATION': 2, 'A.APPLET': 2}, 'R': {'R.JAVA': 21}, 'OT': {'OT.AUTH-KEYS_CONFID': 2, 'OT.AUTH-KEYS_INTEG': 2, 'OT.AUTH-ALGO_CONFID': 2, 'OT.AUTH-ALGO_INTEG': 2, 'OT.AUTH-ALGO_EXEC': 2, 'OT.ACCOUNT_NET_ACCESS': 2, 'OT.SID': 2, 'OT.OPERATE': 2, 'OT.RESOURCES': 2, 'OT.FIREWALL': 2, 'OT.NATIVE': 5, 'OT.REALLOCATION': 2, 'OT.SHRD_VAR_CONFID': 2, 'OT.SHRD_VAR_INTEG': 2, 'OT.ALARM': 2, 'OT.TRANSACTION': 3, 'OT.KEY-MNGT': 6, 'OT.CIPHER': 3, 'OT.PIN-MNGT': 3, 'OT.REMOTE': 2, 'OT.INSTALL': 2, 'OT.LOAD': 2, 'OT.DELETION': 2, 'OT.OBJ-DELETION': 2, 'OT.SCP': 7, 'OT.CARD-MANAGEMENT': 2}, 'OP': {'OP.PUT': 3, 'OP.JAVA': 4, 'OP.CREATE': 5, 'OP.DELETE_APPLET': 3, 'OP.DELETE_PCKG': 2, 'OP.DELETE_PCKG_APPLET': 2, 'OP.GET_ROR': 3, 'OP.INVOKE': 6, 'OP.RET_RORD': 2, 'OP.ARRAY_ACCESS': 3, 'OP.INSTANCE_FIELD': 3, 'OP.INVK_VIRTUAL': 3, 'OP.INVK_INTERFACE': 4, 'OP.THROW': 3, 'OP.TYPE_ACCESS': 3, 'OP.SEND': 1, 'OP.RECEIVE': 1, 'OP.BYTECODE': 1}, 'OE': {'OE.NATIVE': 1, 'OE.DEVELOPMENT': 2, 'OE.KEY_MANAGEMENT': 2, 'OE.APPLET': 2, 'OE.VERIFICATION': 2}, 'OSP': {'OSP.NATIVE': 3, 'OSP.VERIFICATION': 2}}, 'vendor': {'Infineon': {'Infineon': 8, 'Infineon Technologies AG': 2}, 'Gemalto': {'Gemalto': 10}, 'Axalto': {'Axalto': 188}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 7}}, 'DES': {'DES': {'DES': 5}, '3DES': {'TDES': 11}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 2}}, 'MD': {'MD5': {'MD5': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 5}}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'side channel': 1, 'timing attacks': 1}, 'FI': {'physical tampering': 2, 'malfunction': 1, 'DFA': 1, 'fault injection': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 46-3': 2, 'FIPS 197': 2, 'FIPS 180-2': 2}, 'CC': {'CCIMB-2004-01-001': 1, 'CCIMB-2004-01-002': 1, 'CCIMB-2004-01-003': 1, 'CCIMB-2004-01-004': 1}}, 'javacard_version': {'JavaCard': {'Java Card 2.2.1': 1, 'Java Card 2.2': 2, 'Java Card 3.4.3': 1}, 'GlobalPlatform': {'Global Platform 2.1.1': 1}}, 'javacard_api_const': {'misc': {'TYPE_ACCESS': 3}}, 'javacard_packages': {'java': {'java.rmi': 2}, 'javacard': {'javacard.framework.service': 1, 'javacard.framework': 2}, 'javacardx': {'javacardx.rmi': 1}}, 'certification_process': {}}.
    • The st_filename property was set to cible2007_08en.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}]} values added.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/cible2007_08en.pdf, code: 408'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}]} values discarded.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/2007_08en.pdf, code: nok'].
    • The st_pdf_hash property was set to 1992c3313476f4edabd9014a1fb52a202cd7bc1a2eb6dcd3f92e70b9f9fe0897.
    • The st_txt_hash property was set to 82675e4cd8014f4796318b7bc78165c6320b1fe8b0d237c785bd64886fb69e3f.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 555904, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 93, '/ModDate': "D:20070327163427+03'00'", '/CreationDate': "D:20070323143339+01'00'", '/Title': 'D1019540', '/Creator': 'Acrobat PDFMaker 6.0 for Word', '/Category': 'CC evaluation', '/Producer': 'Acrobat Distiller 6.0.1 (Windows)', '/Author': 'Sorin Aurel SPORNIC', '/Subject': 'Security Target for Usimera Protect', '/Company': 'Axalto', '/security-level': 'AXLT-Public', '/classification-date': '21/03/2007', '/classification-version': 'Version 3.6.0', '/SourceModified': 'D:20070323133327', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 4, 'EAL4+': 1, 'EAL4 augmented': 3}}, 'cc_sar': {'ACM': {'ACM_AUT': 1, 'ACM_AUT.1': 9, 'ACM_CAP': 1, 'ACM_CAP.4': 19, 'ACM_SCP': 1, 'ACM_SCP.2': 5}, 'ADO': {'ADO_DEL': 1, 'ADO_DEL.2': 8, 'ADO_IGS': 1, 'ADO_IGS.1': 6}, 'ADV': {'ADV_IMP.2': 12, 'ADV_FSP': 1, 'ADV_FSP.2': 10, 'ADV_HLD': 1, 'ADV_HLD.2': 14, 'ADV_IMP': 1, 'ADV_LLD': 1, 'ADV_LLD.1': 15, 'ADV_RCR': 1, 'ADV_RCR.1': 5, 'ADV_SPM': 1, 'ADV_SPM.1': 9}, 'AGD': {'AGD_ADM': 1, 'AGD_ADM.1': 12, 'AGD_USR': 1, 'AGD_USR.1': 10}, 'ALC': {'ALC_DVS.2': 11, 'ALC_DVS': 1, 'ALC_LCD': 1, 'ALC_LCD.1': 7, 'ALC_TAT': 1, 'ALC_TAT.1': 8}, 'ATE': {'ATE_COV': 1, 'ATE_COV.2': 6, 'ATE_DPT': 1, 'ATE_DPT.1': 5, 'ATE_FUN': 1, 'ATE_FUN.1': 10, 'ATE_IND': 1, 'ATE_IND.2': 8}, 'AVA': {'AVA_VLA.4': 18, 'AVA_MSU.3': 17, 'AVA_MSU': 1, 'AVA_SOF': 8, 'AVA_SOF.1': 7, 'AVA_VLA': 1, 'AVA_VLA.3': 1}}, 'cc_sfr': {'FAU': {'FAU_ARP': 3, 'FAU_ARP.1': 1}, 'FCO': {'FCO_NRO': 3, 'FCO_NRO.2': 3}, 'FCS': {'FCS_COP': 19, 'FCS_COP.1': 8, 'FCS_CKM': 16, 'FCS_CKM.1': 3, 'FCS_CKM.2': 3, 'FCS_CKM.3': 3, 'FCS_CKM.4': 3}, 'FDP': {'FDP_ACC': 13, 'FDP_ACC.1': 2, 'FDP_ACF': 14, 'FDP_ACF.1': 22, 'FDP_SDI': 3, 'FDP_SDI.2': 5, 'FDP_IFC': 8, 'FDP_IFC.1': 2, 'FDP_IFF': 11, 'FDP_IFF.1': 18, 'FDP_RIP': 18, 'FDP_RIP.1': 8, 'FDP_ROL': 2, 'FDP_ROL.1': 2, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_ITC': 2, 'FDP_ITC.2': 5, 'FDP_ACC.2': 7, 'FDP_IFC.2': 4, 'FDP_UIT': 2, 'FDP_UIT.1': 2, 'FDP_IFF.2': 7, 'FDP_IFF.2.2': 1, 'FDP_IFF.2.7': 2}, 'FIA': {'FIA_UID': 13, 'FIA_UID.1': 4, 'FIA_ATD': 2, 'FIA_ATD.1': 1, 'FIA_UID.2': 1, 'FIA_USB.1': 2, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1}, 'FMT': {'FMT_SMR': 29, 'FMT_MSA': 49, 'FMT_MSA.1': 14, 'FMT_MSA.3': 14, 'FMT_MSA.2': 3, 'FMT_SMR.1': 7, 'FMT_SMF': 3, 'FMT_SMF.1': 1, 'FMT_MTD': 2, 'FMT_MTD.1': 1, 'FMT_MTD.3': 2, 'FMT_MTD.3.1': 1, 'FMT_REV': 2, 'FMT_REV.1': 2, 'FMT_SMR.1.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1}, 'FPR': {'FPR_UNO': 3, 'FPR_UNO.1': 4, 'FPR_UNO.1.1': 1}, 'FPT': {'FPT_RCV': 10, 'FPT_RVM': 3, 'FPT_RVM.1': 3, 'FPT_AMT': 2, 'FPT_AMT.1': 1, 'FPT_FLS': 16, 'FPT_FLS.1': 6, 'FPT_PHP': 3, 'FPT_PHP.3': 1, 'FPT_SEP': 3, 'FPT_SEP.1': 3, 'FPT_RCV.4': 1, 'FPT_ITT': 6, 'FPT_ITT.1': 1, 'FPT_ITT.3': 2, 'FPT_RCV.3': 4, 'FPT_TDC.1': 2, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 1, 'FPT_TST.1': 2, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1}, 'FRU': {'FRU_FLT': 3, 'FRU_FLT.1': 1, 'FRU_RSA': 4, 'FRU_RSA.1': 2}, 'FTP': {'FTP_ITC': 2, 'FTP_ITC.1': 3}}, 'cc_claims': {'D': {'D.NET_AUTH_KEY': 3, 'D.NET_ACCESS': 2, 'D.APP_CODE': 2, 'D.APP_C_DATA': 2, 'D.APP_I_DATA': 2, 'D.PIN': 2, 'D.AUTH-APPLI_ATTRIB': 2, 'D.AUTH-KEY_ATTRIB': 2, 'D.AUTH-CRYPTO_ALGO': 3, 'D.AUTH_CODE': 2, 'D.JCS_CODE': 2, 'D.JCS_DATA': 2, 'D.SEC_DATA': 2, 'D.API_DATA': 2, 'D.CRYPTO': 3}, 'O': {'O.JAVAOBJECT': 39, 'O.APPLET': 23, 'O.CODE_PKG': 6, 'O.CODE_PCKG': 8, 'O.REMOTE_OBJ': 8, 'O.REMOTE_MTHD': 6, 'O.ROR': 10, 'O.RMI_SERVICE': 9, 'O.REMOTE_OBJECT': 1}, 'T': {'T.PHYSICAL': 3, 'T.AUTH-DATA_DISCLOSURE': 2, 'T.AUTH-DATA_MODIFICATION': 2, 'T.AUTH-ALGO_DISCLOSURE': 2, 'T.AUTH-ALGO_MODIFICATION': 2, 'T.AUTH-ALGO_EXE': 2, 'T.UNAUTH_NET_ACCESS': 2, 'T.CONFID-JCS-CODE': 2, 'T.CONFID-APPLI-DATA': 2, 'T.CONFID-JCS-DATA': 2, 'T.INTEG-APPLI-CODE': 4, 'T.INTEG-JCS-CODE': 2, 'T.INTEG-APPLI-DATA': 4, 'T.INTEG-JCS-DATA': 2, 'T.SID': 4, 'T.EXE-CODE': 4, 'T.NATIVE': 2, 'T.EXE-CODE-REMOTE': 2, 'T.RESOURCES': 2, 'T.INSTALL': 2, 'T.DELETION': 2, 'T.OBJ-DELETION': 2}, 'A': {'A.NET-OP_KEY_MGT': 2, 'A.NATIVE': 3, 'A.VERIFICATION': 2, 'A.APPLET': 2}, 'R': {'R.JAVA': 21}, 'OT': {'OT.AUTH-KEYS_CONFID': 2, 'OT.AUTH-KEYS_INTEG': 2, 'OT.AUTH-ALGO_CONFID': 2, 'OT.AUTH-ALGO_INTEG': 2, 'OT.AUTH-ALGO_EXEC': 2, 'OT.ACCOUNT_NET_ACCESS': 2, 'OT.SID': 2, 'OT.OPERATE': 2, 'OT.RESOURCES': 2, 'OT.FIREWALL': 2, 'OT.NATIVE': 5, 'OT.REALLOCATION': 2, 'OT.SHRD_VAR_CONFID': 2, 'OT.SHRD_VAR_INTEG': 2, 'OT.ALARM': 2, 'OT.TRANSACTION': 3, 'OT.KEY-MNGT': 6, 'OT.CIPHER': 3, 'OT.PIN-MNGT': 3, 'OT.REMOTE': 2, 'OT.INSTALL': 2, 'OT.LOAD': 2, 'OT.DELETION': 2, 'OT.OBJ-DELETION': 2, 'OT.SCP': 7, 'OT.CARD-MANAGEMENT': 2}, 'OP': {'OP.PUT': 3, 'OP.JAVA': 4, 'OP.CREATE': 5, 'OP.DELETE_APPLET': 3, 'OP.DELETE_PCKG': 2, 'OP.DELETE_PCKG_APPLET': 2, 'OP.GET_ROR': 3, 'OP.INVOKE': 6, 'OP.RET_RORD': 2, 'OP.ARRAY_ACCESS': 3, 'OP.INSTANCE_FIELD': 3, 'OP.INVK_VIRTUAL': 3, 'OP.INVK_INTERFACE': 4, 'OP.THROW': 3, 'OP.TYPE_ACCESS': 3, 'OP.SEND': 1, 'OP.RECEIVE': 1, 'OP.BYTECODE': 1}, 'OE': {'OE.NATIVE': 1, 'OE.DEVELOPMENT': 2, 'OE.KEY_MANAGEMENT': 2, 'OE.APPLET': 2, 'OE.VERIFICATION': 2}, 'OSP': {'OSP.NATIVE': 3, 'OSP.VERIFICATION': 2}}, 'vendor': {'Infineon': {'Infineon': 8, 'Infineon Technologies AG': 2}, 'Gemalto': {'Gemalto': 10}, 'Axalto': {'Axalto': 188}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 7}}, 'DES': {'DES': {'DES': 5}, '3DES': {'TDES': 11}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 2}}, 'MD': {'MD5': {'MD5': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 5}}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'side channel': 1, 'timing attacks': 1}, 'FI': {'physical tampering': 2, 'malfunction': 1, 'DFA': 1, 'fault injection': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 46-3': 2, 'FIPS 197': 2, 'FIPS 180-2': 2}, 'CC': {'CCIMB-2004-01-001': 1, 'CCIMB-2004-01-002': 1, 'CCIMB-2004-01-003': 1, 'CCIMB-2004-01-004': 1}}, 'javacard_version': {'JavaCard': {'Java Card 2.2.1': 1, 'Java Card 2.2': 2, 'Java Card 3.4.3': 1}, 'GlobalPlatform': {'Global Platform 2.1.1': 1}}, 'javacard_api_const': {'misc': {'TYPE_ACCESS': 3}}, 'javacard_packages': {'java': {'java.rmi': 2}, 'javacard': {'javacard.framework.service': 1, 'javacard.framework': 2}, 'javacardx': {'javacardx.rmi': 1}}, 'certification_process': {}}.
    • The st_filename property was set to cible2007_08en.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}]} values added.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/cible2007_08en.pdf, code: nok'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}]} values discarded.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/2007_08en.pdf, code: nok'].
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': '2007_08en.pdf', 'st_filename': 'cible2007_08en.pdf'}.
    • The report_frontpage property was updated, with the {'anssi': {'__update__': {'cert_item_version': ' T1000230 Usimera Protect 128K crypto on Infineon Code version: 2.1'}}} data.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0269-2006': 12}}}}, 'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL 4': 2, 'EAL 4 augmented': 2}, '__delete__': ['EAL 2', 'EAL 6', 'EAL 4+']}}}, 'cc_sar': {'__update__': {'ALC': {'__delete__': ['ALC_LCD']}}}, 'cc_claims': {}, 'vendor': {'__update__': {'Gemalto': {'__update__': {'Gemalto': 24}}}}, 'symmetric_crypto': {'__update__': {'DES': {'__update__': {'DES': {'__update__': {'DES': 1}}}, '__delete__': ['3DES']}}}, 'standard_id': {'__update__': {'CC': {'__insert__': {'CCIMB-2004-01-003': 1, 'CCIMB-2004-01-004': 1}}}}} data.
    • The st_keywords property was updated, with the {'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL4': 4}}}}, 'cc_sar': {'__update__': {'ACM': {'__update__': {'ACM_AUT.1': 9, 'ACM_CAP.4': 19, 'ACM_SCP.2': 5}}, 'ADO': {'__update__': {'ADO_DEL.2': 8, 'ADO_IGS.1': 6}}, 'ADV': {'__update__': {'ADV_IMP.2': 12, 'ADV_FSP.2': 10, 'ADV_HLD.2': 14, 'ADV_LLD.1': 15, 'ADV_RCR.1': 5, 'ADV_SPM.1': 9}}, 'AGD': {'__update__': {'AGD_ADM.1': 12, 'AGD_USR.1': 10}}, 'ALC': {'__update__': {'ALC_DVS.2': 11, 'ALC_LCD.1': 7, 'ALC_TAT.1': 8}}, 'ATE': {'__update__': {'ATE_COV.2': 6, 'ATE_DPT.1': 5, 'ATE_FUN.1': 10, 'ATE_IND.2': 8}}, 'AVA': {'__insert__': {'AVA_VLA.3': 1}, '__update__': {'AVA_VLA.4': 18, 'AVA_MSU.3': 17, 'AVA_SOF.1': 7}}}}, 'cc_sfr': {'__insert__': {'FAU': {'FAU_ARP': 3, 'FAU_ARP.1': 1}, 'FCO': {'FCO_NRO': 3, 'FCO_NRO.2': 3}, 'FRU': {'FRU_FLT': 3, 'FRU_FLT.1': 1, 'FRU_RSA': 4, 'FRU_RSA.1': 2}, 'FTP': {'FTP_ITC': 2, 'FTP_ITC.1': 3}}, '__update__': {'FCS': {'__insert__': {'FCS_CKM': 16}, '__update__': {'FCS_COP': 19, 'FCS_CKM.1': 3, 'FCS_CKM.2': 3, 'FCS_CKM.3': 3, 'FCS_CKM.4': 3, 'FCS_COP.1': 8}}, 'FDP': {'__insert__': {'FDP_ACC': 13, 'FDP_ACC.1': 2, 'FDP_ACF': 14, 'FDP_ACF.1': 22, 'FDP_SDI': 3, 'FDP_IFC': 8, 'FDP_IFC.1': 2, 'FDP_IFF': 11, 'FDP_IFF.1': 18, 'FDP_RIP': 18, 'FDP_RIP.1': 8, 'FDP_ROL': 2, 'FDP_ROL.1': 2, 'FDP_ITC': 2, 'FDP_ITC.2': 5, 'FDP_ACC.2': 7, 'FDP_IFC.2': 4, 'FDP_UIT': 2, 'FDP_UIT.1': 2, 'FDP_IFF.2': 7}, '__update__': {'FDP_SDI.2': 5, 'FDP_IFF.2.7': 2}}, 'FIA': {'__insert__': {'FIA_UID': 13, 'FIA_UID.1': 4, 'FIA_ATD': 2, 'FIA_ATD.1': 1, 'FIA_UID.2': 1}}, 'FMT': {'__insert__': {'FMT_SMR': 29, 'FMT_MSA': 49, 'FMT_MSA.3': 14, 'FMT_MSA.2': 3, 'FMT_SMF': 3, 'FMT_SMF.1': 1, 'FMT_MTD': 2, 'FMT_MTD.1': 1, 'FMT_REV': 2, 'FMT_REV.1': 2}, '__update__': {'FMT_MSA.1': 14, 'FMT_SMR.1': 7}}, 'FPR': {'__insert__': {'FPR_UNO': 3}, '__update__': {'FPR_UNO.1': 4}}, 'FPT': {'__insert__': {'FPT_RCV': 10, 'FPT_RVM': 3, 'FPT_AMT': 2, 'FPT_AMT.1': 1, 'FPT_FLS': 16, 'FPT_FLS.1': 6, 'FPT_PHP': 3, 'FPT_PHP.3': 1, 'FPT_SEP': 3, 'FPT_RCV.4': 1, 'FPT_ITT': 6, 'FPT_ITT.1': 1, 'FPT_ITT.3': 2, 'FPT_RCV.3': 4}, '__update__': {'FPT_SEP.1': 3, 'FPT_RVM.1': 3}}}}, 'cc_claims': {'__insert__': {'R': {'R.JAVA': 21}}, '__update__': {'T': {'__insert__': {'T.EXE-CODE': 4}, '__update__': {'T.INTEG-APPLI-CODE': 4, 'T.INTEG-APPLI-DATA': 4, 'T.NATIVE': 2, 'T.RESOURCES': 2, 'T.INSTALL': 2, 'T.DELETION': 2, 'T.OBJ-DELETION': 2, 'T.SID': 4}, '__delete__': ['T.AUTH-KEYS_CONFID', 'T.AUTH-KEYS_INTEG', 'T.AUTH-ALGO_CONFID', 'T.AUTH-ALGO_INTEG', 'T.AUTH-ALGO_EXEC', 'T.ACCOUNT_NET_ACCESS', 'T.OPERATE', 'T.FIREWALL', 'T.REALLOCATION', 'T.SHRD_VAR_CONFID', 'T.SHRD_VAR_INTEG', 'T.ALARM', 'T.TRANSACTION', 'T.KEY-MNGT', 'T.CIPHER', 'T.PIN-MNGT', 'T.REMOTE', 'T.LOAD', 'T.SCP.RECOVERY', 'T.SCP.SUPPORT', 'T.SCP.IC', 'T.CARD-MANAGEMENT']}, 'OT': {'__insert__': {'OT.SCP': 7}, '__update__': {'OT.NATIVE': 5}, '__delete__': ['OT.SCP.RECOVERY', 'OT.SCP.SUPPORT', 'OT.SCP.IC']}, 'OE': {'__delete__': ['OE']}}}, 'vendor': {'__update__': {'Infineon': {'__update__': {'Infineon': 8}}}}, 'symmetric_crypto': {'__update__': {'AES_competition': {'__update__': {'AES': {'__update__': {'AES': 7}}}}, 'DES': {'__update__': {'DES': {'__update__': {'DES': 5}}, '3DES': {'__update__': {'TDES': 11}}}}}}, 'hash_function': {'__update__': {'SHA': {'__update__': {'SHA1': {'__update__': {'SHA-1': 2}}}}}}, 'crypto_scheme': {'__delete__': ['KA']}, 'cipher_mode': {}, 'side_channel_analysis': {'__update__': {'SCA': {'__insert__': {'timing attacks': 1}}}}, 'tee_name': {}, 'standard_id': {'__insert__': {'CC': {'CCIMB-2004-01-001': 1, 'CCIMB-2004-01-002': 1, 'CCIMB-2004-01-003': 1, 'CCIMB-2004-01-004': 1}}, '__delete__': ['SCP']}, 'javacard_version': {'__update__': {'JavaCard': {'__insert__': {'Java Card 3.4.3': 1}}}}, 'javacard_packages': {'java': {'java.rmi': 2}, 'javacard': {'javacard.framework.service': 1, 'javacard.framework': 2}, 'javacardx': {'javacardx.rmi': 1}}} data.

    The computed heuristics were updated.

    • The cert_id property was set to ANSSI-CC-2007/08.
    • The report_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2007/19']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2007/19']}} data.
  • 28.07.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_extract_ok property was set to True.
    • The errors property was set to [].

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 555904, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 93, '/ModDate': "D:20070327163427+03'00'", '/CreationDate': "D:20070323143339+01'00'", '/Title': 'D1019540', '/Creator': 'Acrobat PDFMaker 6.0 for Word', '/Category': 'CC evaluation', '/Producer': 'Acrobat Distiller 6.0.1 (Windows)', '/Author': 'Sorin Aurel SPORNIC', '/Subject': 'Security Target for Usimera Protect', '/Company': 'Axalto', '/security-level': 'AXLT-Public', '/classification-date': '21/03/2007', '/classification-version': 'Version 3.6.0', '/SourceModified': 'D:20070323133327', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}]}.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_extract_ok property was set to False.
    • The errors property was set to ['Failed to read metadata of certs/targets/pdf/b6c15035f759ec50.pdf, error: can only concatenate list (not "IndirectObject") to list', 'Failed to read metadata of certs/targets/pdf/b6c15035f759ec50.pdf, error: can only concatenate list (not "IndirectObject") to list'].

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': []}} values inserted.
    • The st_metadata property was set to None.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0269-2006': 10}, 'FR': {'DCSSI-2007/08': 18}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0002-2001': 1}}, 'cc_security_level': {'EAL': {'EAL 4': 3, 'EAL4': 3, 'EAL5': 1, 'EAL7': 1, 'EAL 1': 1, 'EAL 2': 1, 'EAL 3': 1, 'EAL 5': 1, 'EAL 6': 1, 'EAL 7': 1, 'EAL 4+': 1, 'EAL4+': 1, 'EAL5+': 1, 'EAL 4 augmented': 1}, 'ITSEC': {'ITSEC E6 and': 1}}, 'cc_sar': {'ACM': {'ACM_AUT': 1, 'ACM_CAP': 1, 'ACM_SCP': 1}, 'ADO': {'ADO_DEL': 1, 'ADO_IGS': 1}, 'ADV': {'ADV_IMP.2': 1, 'ADV_FSP': 1, 'ADV_HLD': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_LLD': 1, 'ADV_RCR': 1, 'ADV_SPM': 1}, 'AGD': {'AGD_ADM': 1, 'AGD_USR': 1}, 'ALC': {'ALC_DVS.2': 2, 'ALC_FLR': 2, 'ALC_DVS': 1, 'ALC_LCD': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_MSU.3': 2, 'AVA_VLA.4': 2, 'AVA_CCA': 1, 'AVA_MSU': 1, 'AVA_SOF': 1, 'AVA_VLA': 1}}, 'cc_sfr': {}, 'cc_claims': {'T': {'T': 3}}, 'vendor': {'Infineon': {'Infineon': 8, 'Infineon Technologies AG': 3}, 'Gemalto': {'Gemalto': 23}}, 'eval_facility': {'Serma': {'Serma Technologies': 2}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 4}, '3DES': {'TDES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {'CCM': {'CCM': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS34': 2, 'AIS31': 3, 'AIS 34': 1}, 'CC': {'CCIMB-2004-01-001': 1, 'CCIMB-2004-01-002': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 3, 'EAL4+': 1, 'EAL4 augmented': 3}}, 'cc_sar': {'ACM': {'ACM_AUT': 1, 'ACM_AUT.1': 2, 'ACM_CAP': 1, 'ACM_CAP.4': 2, 'ACM_SCP': 1, 'ACM_SCP.2': 2}, 'ADO': {'ADO_DEL': 1, 'ADO_DEL.2': 2, 'ADO_IGS': 1, 'ADO_IGS.1': 2}, 'ADV': {'ADV_IMP.2': 6, 'ADV_FSP': 1, 'ADV_FSP.2': 2, 'ADV_HLD': 1, 'ADV_HLD.2': 2, 'ADV_IMP': 1, 'ADV_LLD': 1, 'ADV_LLD.1': 2, 'ADV_RCR': 1, 'ADV_RCR.1': 2, 'ADV_SPM': 1, 'ADV_SPM.1': 2}, 'AGD': {'AGD_ADM': 1, 'AGD_ADM.1': 2, 'AGD_USR': 1, 'AGD_USR.1': 2}, 'ALC': {'ALC_DVS.2': 4, 'ALC_DVS': 1, 'ALC_LCD': 1, 'ALC_LCD.1': 2, 'ALC_TAT': 1, 'ALC_TAT.1': 2}, 'ATE': {'ATE_COV': 1, 'ATE_COV.2': 2, 'ATE_DPT': 1, 'ATE_DPT.1': 2, 'ATE_FUN': 1, 'ATE_FUN.1': 2, 'ATE_IND': 1, 'ATE_IND.2': 2}, 'AVA': {'AVA_VLA.4': 5, 'AVA_MSU.3': 5, 'AVA_MSU': 1, 'AVA_SOF': 8, 'AVA_SOF.1': 2, 'AVA_VLA': 1}}, 'cc_sfr': {'FCS': {'FCS_COP': 1, 'FCS_CKM.1': 1, 'FCS_CKM.2': 1, 'FCS_CKM.3': 1, 'FCS_CKM.4': 1, 'FCS_COP.1': 1}, 'FDP': {'FDP_SDI.2': 3, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_IFF.2.2': 1, 'FDP_IFF.2.7': 1}, 'FIA': {'FIA_USB.1': 2, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1}, 'FMT': {'FMT_MSA.1': 1, 'FMT_SMR.1': 1, 'FMT_MTD.3': 2, 'FMT_MTD.3.1': 1, 'FMT_SMR.1.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1}, 'FPR': {'FPR_UNO.1': 2, 'FPR_UNO.1.1': 1}, 'FPT': {'FPT_SEP.1': 1, 'FPT_RVM.1': 1, 'FPT_TDC.1': 2, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 1, 'FPT_TST.1': 2, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1}}, 'cc_claims': {'D': {'D.NET_AUTH_KEY': 3, 'D.NET_ACCESS': 2, 'D.APP_CODE': 2, 'D.APP_C_DATA': 2, 'D.APP_I_DATA': 2, 'D.PIN': 2, 'D.AUTH-APPLI_ATTRIB': 2, 'D.AUTH-KEY_ATTRIB': 2, 'D.AUTH-CRYPTO_ALGO': 3, 'D.AUTH_CODE': 2, 'D.JCS_CODE': 2, 'D.JCS_DATA': 2, 'D.SEC_DATA': 2, 'D.API_DATA': 2, 'D.CRYPTO': 3}, 'O': {'O.JAVAOBJECT': 39, 'O.APPLET': 23, 'O.CODE_PKG': 6, 'O.CODE_PCKG': 8, 'O.REMOTE_OBJ': 8, 'O.REMOTE_MTHD': 6, 'O.ROR': 10, 'O.RMI_SERVICE': 9, 'O.REMOTE_OBJECT': 1}, 'T': {'T.PHYSICAL': 3, 'T.AUTH-DATA_DISCLOSURE': 2, 'T.AUTH-DATA_MODIFICATION': 2, 'T.AUTH-ALGO_DISCLOSURE': 2, 'T.AUTH-ALGO_MODIFICATION': 2, 'T.AUTH-ALGO_EXE': 2, 'T.UNAUTH_NET_ACCESS': 2, 'T.CONFID-JCS-CODE': 2, 'T.CONFID-APPLI-DATA': 2, 'T.CONFID-JCS-DATA': 2, 'T.INTEG-APPLI-CODE': 2, 'T.INTEG-JCS-CODE': 2, 'T.INTEG-APPLI-DATA': 2, 'T.INTEG-JCS-DATA': 2, 'T.NATIVE': 4, 'T.EXE-CODE-REMOTE': 2, 'T.RESOURCES': 4, 'T.INSTALL': 4, 'T.DELETION': 4, 'T.OBJ-DELETION': 4, 'T.AUTH-KEYS_CONFID': 2, 'T.AUTH-KEYS_INTEG': 2, 'T.AUTH-ALGO_CONFID': 2, 'T.AUTH-ALGO_INTEG': 2, 'T.AUTH-ALGO_EXEC': 2, 'T.ACCOUNT_NET_ACCESS': 2, 'T.SID': 2, 'T.OPERATE': 2, 'T.FIREWALL': 2, 'T.REALLOCATION': 2, 'T.SHRD_VAR_CONFID': 2, 'T.SHRD_VAR_INTEG': 2, 'T.ALARM': 2, 'T.TRANSACTION': 3, 'T.KEY-MNGT': 6, 'T.CIPHER': 3, 'T.PIN-MNGT': 3, 'T.REMOTE': 2, 'T.LOAD': 2, 'T.SCP.RECOVERY': 2, 'T.SCP.SUPPORT': 3, 'T.SCP.IC': 2, 'T.CARD-MANAGEMENT': 2}, 'A': {'A.NET-OP_KEY_MGT': 2, 'A.NATIVE': 3, 'A.VERIFICATION': 2, 'A.APPLET': 2}, 'OT': {'OT.AUTH-KEYS_CONFID': 2, 'OT.AUTH-KEYS_INTEG': 2, 'OT.AUTH-ALGO_CONFID': 2, 'OT.AUTH-ALGO_INTEG': 2, 'OT.AUTH-ALGO_EXEC': 2, 'OT.ACCOUNT_NET_ACCESS': 2, 'OT.SID': 2, 'OT.OPERATE': 2, 'OT.RESOURCES': 2, 'OT.FIREWALL': 2, 'OT.NATIVE': 2, 'OT.REALLOCATION': 2, 'OT.SHRD_VAR_CONFID': 2, 'OT.SHRD_VAR_INTEG': 2, 'OT.ALARM': 2, 'OT.TRANSACTION': 3, 'OT.KEY-MNGT': 6, 'OT.CIPHER': 3, 'OT.PIN-MNGT': 3, 'OT.REMOTE': 2, 'OT.INSTALL': 2, 'OT.LOAD': 2, 'OT.DELETION': 2, 'OT.OBJ-DELETION': 2, 'OT.SCP.RECOVERY': 2, 'OT.SCP.SUPPORT': 3, 'OT.SCP.IC': 2, 'OT.CARD-MANAGEMENT': 2}, 'OP': {'OP.PUT': 3, 'OP.JAVA': 4, 'OP.CREATE': 5, 'OP.DELETE_APPLET': 3, 'OP.DELETE_PCKG': 2, 'OP.DELETE_PCKG_APPLET': 2, 'OP.GET_ROR': 3, 'OP.INVOKE': 6, 'OP.RET_RORD': 2, 'OP.ARRAY_ACCESS': 3, 'OP.INSTANCE_FIELD': 3, 'OP.INVK_VIRTUAL': 3, 'OP.INVK_INTERFACE': 4, 'OP.THROW': 3, 'OP.TYPE_ACCESS': 3, 'OP.SEND': 1, 'OP.RECEIVE': 1, 'OP.BYTECODE': 1}, 'OE': {'OE': 1, 'OE.NATIVE': 1, 'OE.DEVELOPMENT': 2, 'OE.KEY_MANAGEMENT': 2, 'OE.APPLET': 2, 'OE.VERIFICATION': 2}, 'OSP': {'OSP.NATIVE': 3, 'OSP.VERIFICATION': 2}}, 'vendor': {'Infineon': {'Infineon': 10, 'Infineon Technologies AG': 2}, 'Gemalto': {'Gemalto': 10}, 'Axalto': {'Axalto': 188}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 22}}, 'DES': {'DES': {'DES': 32}, '3DES': {'TDES': 27}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 4}}, 'MD': {'MD5': {'MD5': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 5}, 'KA': {'KA': 20}}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {'CBC': {'CBC': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'side channel': 1}, 'FI': {'physical tampering': 2, 'malfunction': 1, 'DFA': 1, 'fault injection': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 1}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 46-3': 2, 'FIPS 197': 2, 'FIPS 180-2': 2}, 'SCP': {'SCP 31': 5, 'SCP 32': 2}}, 'javacard_version': {'JavaCard': {'Java Card 2.2.1': 1, 'Java Card 2.2': 2}, 'GlobalPlatform': {'Global Platform 2.1.1': 1}}, 'javacard_api_const': {'misc': {'TYPE_ACCESS': 3}}, 'javacard_packages': {}, 'certification_process': {}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ADO_DEL', 'level': 2}, {'_type': 'SAR', 'family': 'ACM_CAP', 'level': 4}, {'_type': 'SAR', 'family': 'ACM_SCP', 'level': 2}, {'_type': 'SAR', 'family': 'ADO_IGS', 'level': 1}, {'_type': 'SAR', 'family': 'ACM_AUT', 'level': 1}]} values discarded.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': '498405734249530e0720cb9aa262f8f8ed57a78a434ce11fa54ac4e24de9caec', 'st_pdf_hash': '1992c3313476f4edabd9014a1fb52a202cd7bc1a2eb6dcd3f92e70b9f9fe0897', 'report_txt_hash': 'c6a7f47e00d8d02e1d6932685afa2c3b69e125b8a1dceb2777be83c0d727ed84', 'st_txt_hash': '82675e4cd8014f4796318b7bc78165c6320b1fe8b0d237c785bd64886fb69e3f'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_block_cipher_modes': {'CCM': 1}} data.
    • The st_keywords property was updated, with the {'rules_symmetric_crypto': {'AES': 22, 'DES': 5, 'TDES': 27}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA-1': 4, 'MD5': 1}, 'rules_crypto_schemes': {'MAC': 5}, 'rules_randomness': {}, 'rules_tee': {'SE': 1}, 'rules_side_channels': {'malfunction': 1, 'physical tampering': 2, 'side channel': 1, 'DFA': 1, 'fault injection': 2}} values inserted.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ADO_DEL', 'level': 2}, {'_type': 'SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_MSU', 'level': 3}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'ACM_AUT', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'SAR', 'family': 'ACM_CAP', 'level': 4}, {'_type': 'SAR', 'family': 'ACM_SCP', 'level': 2}, {'_type': 'SAR', 'family': 'ADO_IGS', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_VLA', 'level': 4}, {'_type': 'SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_DPT', 'level': 1}]}}.
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0269-2006']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0269-2006']}}}.
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['2.1']}.
  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Card Usimera Protect: SLE88CFX4000P microcontroller embedding SIM, USIM and OTA applications on Java card open platform (version 2.1). was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": null,
  "dgst": "b6c15035f759ec50",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2007/08",
    "cert_lab": [
      "SERMA"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VLA",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_SOF",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_HLD",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_USR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_ADM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_RCR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_LLD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_MSU",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "2.1"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2007/19"
        ]
      },
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0269-2006"
        ]
      },
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2007/19"
        ]
      },
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0269-2006"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Gemalto - Infineon Technologies AG",
  "manufacturer_web": "https://www.gemalto.com/",
  "name": "Card Usimera Protect: SLE88CFX4000P microcontroller embedding SIM, USIM and OTA applications on Java card open platform (version 2.1).",
  "not_valid_after": "2019-09-01",
  "not_valid_before": "2007-03-30",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "2007_08en.pdf",
    "report_frontpage": {
      "FR": {
        "cc_security_level": "EAL 4 augmented ADV_IMP.2, ALC_DVS.2, AVA_MSU.3, AVA_VLA.4",
        "cc_version": "Common Criteria version 2.2",
        "cert_id": "DCSSI-2007/08",
        "cert_item": "Card Usimera Protect: SLE88CFX4000P microcontroller embedding SIM, USIM and OTA applications on Java card open plate-form (version 2.1). Product reference",
        "cert_item_version": " T1000230 Usimera Protect 128K crypto on Infineon Code version: 2.1",
        "cert_lab": "Serma Technologies 30 avenue Gustave Eiffel, 33608 Pessac, France Phone: +33 (0)5 57 26 08 75, email : e.francois@serma.com",
        "developer": "Gemalto 6 rue de la verrerie, 92197 Meudon, France Infineon Technologies AG St.-Martin-Stra\u00dfe 76, 81609 M\u00fcnchen, Allemagne Sponsor Gemalto 6 rue de la verrerie, 92197 Meudon, France",
        "match_rules": [
          "Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developer\\(s\\)(.+)Evaluation facility(.+)Recognition arrangements"
        ],
        "ref_protection_profiles": "Java Card System Protection Profile Collection, V1.0b, Configuration Standard 2.2. Reference PP/0305"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0269-2006": 6,
          "BSI-DSZ-CC-0269-2006-MA-02": 1
        },
        "FR": {
          "DCSSI-2007/08": 18
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP-0002-2001": 1
        }
      },
      "cc_sar": {
        "ACM": {
          "ACM_AUT": 1,
          "ACM_CAP": 1,
          "ACM_SCP": 1
        },
        "ADO": {
          "ADO_DEL": 1,
          "ADO_IGS": 1
        },
        "ADV": {
          "ADV_FSP": 1,
          "ADV_HLD": 1,
          "ADV_IMP": 1,
          "ADV_IMP.2": 1,
          "ADV_INT": 1,
          "ADV_LLD": 1,
          "ADV_RCR": 1,
          "ADV_SPM": 1
        },
        "AGD": {
          "AGD_ADM": 1,
          "AGD_USR": 1
        },
        "ALC": {
          "ALC_DVS": 1,
          "ALC_DVS.2": 2,
          "ALC_FLR": 2,
          "ALC_TAT": 1
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_DPT": 1,
          "ATE_FUN": 1,
          "ATE_IND": 1
        },
        "AVA": {
          "AVA_CCA": 1,
          "AVA_MSU": 1,
          "AVA_MSU.3": 2,
          "AVA_SOF": 1,
          "AVA_VLA": 1,
          "AVA_VLA.4": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 3": 1,
          "EAL 4": 2,
          "EAL 4 augmented": 2,
          "EAL 5": 1,
          "EAL 7": 1,
          "EAL4": 3,
          "EAL4+": 1,
          "EAL5": 1,
          "EAL5+": 1,
          "EAL7": 1
        },
        "ITSEC": {
          "ITSEC E6 and": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {
        "CCM": {
          "CCM": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Serma": {
          "Serma Technologies": 2
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "BSI": {
          "AIS 34": 1,
          "AIS31": 3,
          "AIS34": 2
        },
        "CC": {
          "CCIMB-2004-01-001": 1,
          "CCIMB-2004-01-002": 1,
          "CCIMB-2004-01-003": 1,
          "CCIMB-2004-01-004": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Gemalto": {
          "Gemalto": 24
        },
        "Infineon": {
          "Infineon": 8,
          "Infineon Technologies AG": 3
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Mathieu Robert",
      "/CreationDate": "D:20070330160630+02\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 5.0 pour Word",
      "/Keywords": "CER/F/07.5",
      "/ModDate": "D:20070330160633+03\u002700\u0027",
      "/Producer": "Acrobat Distiller 5.0 (Windows)",
      "/Subject": "Card Usimera Protect: SLE88CFX4000P microcontroller embedding SIM, USIM and OTA applications on Java card open plate-form  ...",
      "/Title": "DCSSI-2007/08",
      "pdf_file_size_bytes": 273691,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": true,
      "pdf_number_of_pages": 17
    },
    "st_filename": "cible2007_08en.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "NL": {
          "CC-1": 2,
          "CC-2": 2,
          "CC-3": 2
        }
      },
      "cc_claims": {
        "A": {
          "A.APPLET": 2,
          "A.NATIVE": 3,
          "A.NET-OP_KEY_MGT": 2,
          "A.VERIFICATION": 2
        },
        "D": {
          "D.API_DATA": 2,
          "D.APP_CODE": 2,
          "D.APP_C_DATA": 2,
          "D.APP_I_DATA": 2,
          "D.AUTH-APPLI_ATTRIB": 2,
          "D.AUTH-CRYPTO_ALGO": 3,
          "D.AUTH-KEY_ATTRIB": 2,
          "D.AUTH_CODE": 2,
          "D.CRYPTO": 3,
          "D.JCS_CODE": 2,
          "D.JCS_DATA": 2,
          "D.NET_ACCESS": 2,
          "D.NET_AUTH_KEY": 3,
          "D.PIN": 2,
          "D.SEC_DATA": 2
        },
        "O": {
          "O.APPLET": 23,
          "O.CODE_PCKG": 8,
          "O.CODE_PKG": 6,
          "O.JAVAOBJECT": 39,
          "O.REMOTE_MTHD": 6,
          "O.REMOTE_OBJ": 8,
          "O.REMOTE_OBJECT": 1,
          "O.RMI_SERVICE": 9,
          "O.ROR": 10
        },
        "OE": {
          "OE.APPLET": 2,
          "OE.DEVELOPMENT": 2,
          "OE.KEY_MANAGEMENT": 2,
          "OE.NATIVE": 1,
          "OE.VERIFICATION": 2
        },
        "OP": {
          "OP.ARRAY_ACCESS": 3,
          "OP.BYTECODE": 1,
          "OP.CREATE": 5,
          "OP.DELETE_APPLET": 3,
          "OP.DELETE_PCKG": 2,
          "OP.DELETE_PCKG_APPLET": 2,
          "OP.GET_ROR": 3,
          "OP.INSTANCE_FIELD": 3,
          "OP.INVK_INTERFACE": 4,
          "OP.INVK_VIRTUAL": 3,
          "OP.INVOKE": 6,
          "OP.JAVA": 4,
          "OP.PUT": 3,
          "OP.RECEIVE": 1,
          "OP.RET_RORD": 2,
          "OP.SEND": 1,
          "OP.THROW": 3,
          "OP.TYPE_ACCESS": 3
        },
        "OSP": {
          "OSP.NATIVE": 3,
          "OSP.VERIFICATION": 2
        },
        "OT": {
          "OT.ACCOUNT_NET_ACCESS": 2,
          "OT.ALARM": 2,
          "OT.AUTH-ALGO_CONFID": 2,
          "OT.AUTH-ALGO_EXEC": 2,
          "OT.AUTH-ALGO_INTEG": 2,
          "OT.AUTH-KEYS_CONFID": 2,
          "OT.AUTH-KEYS_INTEG": 2,
          "OT.CARD-MANAGEMENT": 2,
          "OT.CIPHER": 3,
          "OT.DELETION": 2,
          "OT.FIREWALL": 2,
          "OT.INSTALL": 2,
          "OT.KEY-MNGT": 6,
          "OT.LOAD": 2,
          "OT.NATIVE": 5,
          "OT.OBJ-DELETION": 2,
          "OT.OPERATE": 2,
          "OT.PIN-MNGT": 3,
          "OT.REALLOCATION": 2,
          "OT.REMOTE": 2,
          "OT.RESOURCES": 2,
          "OT.SCP": 7,
          "OT.SHRD_VAR_CONFID": 2,
          "OT.SHRD_VAR_INTEG": 2,
          "OT.SID": 2,
          "OT.TRANSACTION": 3
        },
        "R": {
          "R.JAVA": 21
        },
        "T": {
          "T.AUTH-ALGO_DISCLOSURE": 2,
          "T.AUTH-ALGO_EXE": 2,
          "T.AUTH-ALGO_MODIFICATION": 2,
          "T.AUTH-DATA_DISCLOSURE": 2,
          "T.AUTH-DATA_MODIFICATION": 2,
          "T.CONFID-APPLI-DATA": 2,
          "T.CONFID-JCS-CODE": 2,
          "T.CONFID-JCS-DATA": 2,
          "T.DELETION": 2,
          "T.EXE-CODE": 4,
          "T.EXE-CODE-REMOTE": 2,
          "T.INSTALL": 2,
          "T.INTEG-APPLI-CODE": 4,
          "T.INTEG-APPLI-DATA": 4,
          "T.INTEG-JCS-CODE": 2,
          "T.INTEG-JCS-DATA": 2,
          "T.NATIVE": 2,
          "T.OBJ-DELETION": 2,
          "T.PHYSICAL": 3,
          "T.RESOURCES": 2,
          "T.SID": 4,
          "T.UNAUTH_NET_ACCESS": 2
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ACM": {
          "ACM_AUT": 1,
          "ACM_AUT.1": 9,
          "ACM_CAP": 1,
          "ACM_CAP.4": 19,
          "ACM_SCP": 1,
          "ACM_SCP.2": 5
        },
        "ADO": {
          "ADO_DEL": 1,
          "ADO_DEL.2": 8,
          "ADO_IGS": 1,
          "ADO_IGS.1": 6
        },
        "ADV": {
          "ADV_FSP": 1,
          "ADV_FSP.2": 10,
          "ADV_HLD": 1,
          "ADV_HLD.2": 14,
          "ADV_IMP": 1,
          "ADV_IMP.2": 12,
          "ADV_LLD": 1,
          "ADV_LLD.1": 15,
          "ADV_RCR": 1,
          "ADV_RCR.1": 5,
          "ADV_SPM": 1,
          "ADV_SPM.1": 9
        },
        "AGD": {
          "AGD_ADM": 1,
          "AGD_ADM.1": 12,
          "AGD_USR": 1,
          "AGD_USR.1": 10
        },
        "ALC": {
          "ALC_DVS": 1,
          "ALC_DVS.2": 11,
          "ALC_LCD": 1,
          "ALC_LCD.1": 7,
          "ALC_TAT": 1,
          "ALC_TAT.1": 8
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.2": 6,
          "ATE_DPT": 1,
          "ATE_DPT.1": 5,
          "ATE_FUN": 1,
          "ATE_FUN.1": 10,
          "ATE_IND": 1,
          "ATE_IND.2": 8
        },
        "AVA": {
          "AVA_MSU": 1,
          "AVA_MSU.3": 17,
          "AVA_SOF": 8,
          "AVA_SOF.1": 7,
          "AVA_VLA": 1,
          "AVA_VLA.3": 1,
          "AVA_VLA.4": 18
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 4,
          "EAL4 augmented": 3,
          "EAL4+": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP": 3,
          "FAU_ARP.1": 1
        },
        "FCO": {
          "FCO_NRO": 3,
          "FCO_NRO.2": 3
        },
        "FCS": {
          "FCS_CKM": 16,
          "FCS_CKM.1": 3,
          "FCS_CKM.2": 3,
          "FCS_CKM.3": 3,
          "FCS_CKM.4": 3,
          "FCS_COP": 19,
          "FCS_COP.1": 8
        },
        "FDP": {
          "FDP_ACC": 13,
          "FDP_ACC.1": 2,
          "FDP_ACC.2": 7,
          "FDP_ACF": 14,
          "FDP_ACF.1": 22,
          "FDP_IFC": 8,
          "FDP_IFC.1": 2,
          "FDP_IFC.2": 4,
          "FDP_IFF": 11,
          "FDP_IFF.1": 18,
          "FDP_IFF.2": 7,
          "FDP_IFF.2.2": 1,
          "FDP_IFF.2.7": 2,
          "FDP_ITC": 2,
          "FDP_ITC.2": 5,
          "FDP_RIP": 18,
          "FDP_RIP.1": 8,
          "FDP_ROL": 2,
          "FDP_ROL.1": 2,
          "FDP_SDI": 3,
          "FDP_SDI.2": 5,
          "FDP_SDI.2.1": 1,
          "FDP_SDI.2.2": 1,
          "FDP_UIT": 2,
          "FDP_UIT.1": 2
        },
        "FIA": {
          "FIA_ATD": 2,
          "FIA_ATD.1": 1,
          "FIA_UID": 13,
          "FIA_UID.1": 4,
          "FIA_UID.2": 1,
          "FIA_USB.1": 2,
          "FIA_USB.1.1": 1,
          "FIA_USB.1.2": 1,
          "FIA_USB.1.3": 1
        },
        "FMT": {
          "FMT_MSA": 49,
          "FMT_MSA.1": 14,
          "FMT_MSA.2": 3,
          "FMT_MSA.3": 14,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MTD": 2,
          "FMT_MTD.1": 1,
          "FMT_MTD.3": 2,
          "FMT_MTD.3.1": 1,
          "FMT_REV": 2,
          "FMT_REV.1": 2,
          "FMT_SMF": 3,
          "FMT_SMF.1": 1,
          "FMT_SMR": 29,
          "FMT_SMR.1": 7,
          "FMT_SMR.1.1": 1
        },
        "FPR": {
          "FPR_UNO": 3,
          "FPR_UNO.1": 4,
          "FPR_UNO.1.1": 1
        },
        "FPT": {
          "FPT_AMT": 2,
          "FPT_AMT.1": 1,
          "FPT_FLS": 16,
          "FPT_FLS.1": 6,
          "FPT_ITT": 6,
          "FPT_ITT.1": 1,
          "FPT_ITT.3": 2,
          "FPT_PHP": 3,
          "FPT_PHP.3": 1,
          "FPT_RCV": 10,
          "FPT_RCV.3": 4,
          "FPT_RCV.4": 1,
          "FPT_RVM": 3,
          "FPT_RVM.1": 3,
          "FPT_SEP": 3,
          "FPT_SEP.1": 3,
          "FPT_TDC.1": 2,
          "FPT_TDC.1.1": 1,
          "FPT_TDC.1.2": 1,
          "FPT_TST.1": 2,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FRU": {
          "FRU_FLT": 3,
          "FRU_FLT.1": 1,
          "FRU_RSA": 4,
          "FRU_RSA.1": 2
        },
        "FTP": {
          "FTP_ITC": 2,
          "FTP_ITC.1": 3
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "MAC": {
          "MAC": 5
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 1
          }
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 2
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {
        "misc": {
          "TYPE_ACCESS": 3
        }
      },
      "javacard_packages": {
        "java": {
          "java.rmi": 2
        },
        "javacard": {
          "javacard.framework": 2,
          "javacard.framework.service": 1
        },
        "javacardx": {
          "javacardx.rmi": 1
        }
      },
      "javacard_version": {
        "GlobalPlatform": {
          "Global Platform 2.1.1": 1
        },
        "JavaCard": {
          "Java Card 2.2": 2,
          "Java Card 2.2.1": 1,
          "Java Card 3.4.3": 1
        }
      },
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "FI": {
          "DFA": 1,
          "fault injection": 2,
          "malfunction": 1,
          "physical tampering": 2
        },
        "SCA": {
          "side channel": 1,
          "timing attacks": 1
        }
      },
      "standard_id": {
        "CC": {
          "CCIMB-2004-01-001": 1,
          "CCIMB-2004-01-002": 1,
          "CCIMB-2004-01-003": 1,
          "CCIMB-2004-01-004": 1
        },
        "FIPS": {
          "FIPS 180-2": 2,
          "FIPS 197": 2,
          "FIPS 46-3": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 7
          }
        },
        "DES": {
          "3DES": {
            "TDES": 11
          },
          "DES": {
            "DES": 5
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Axalto": {
          "Axalto": 188
        },
        "Gemalto": {
          "Gemalto": 10
        },
        "Infineon": {
          "Infineon": 8,
          "Infineon Technologies AG": 2
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Sorin Aurel SPORNIC",
      "/Category": "CC evaluation",
      "/Company": "Axalto",
      "/CreationDate": "D:20070323143339+01\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 6.0 for Word",
      "/ModDate": "D:20070327163427+03\u002700\u0027",
      "/Producer": "Acrobat Distiller 6.0.1 (Windows)",
      "/SourceModified": "D:20070323133327",
      "/Subject": "Security Target for Usimera Protect",
      "/Title": "D1019540",
      "/classification-date": "21/03/2007",
      "/classification-version": "Version 3.6.0",
      "/security-level": "AXLT-Public",
      "pdf_file_size_bytes": 555904,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 93
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/2007_08en.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4+",
      "ADV_IMP.2",
      "ALC_DVS.2",
      "AVA_VLA.4",
      "AVA_MSU.3"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/cible2007_08en.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "498405734249530e0720cb9aa262f8f8ed57a78a434ce11fa54ac4e24de9caec",
      "txt_hash": "c6a7f47e00d8d02e1d6932685afa2c3b69e125b8a1dceb2777be83c0d727ed84"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "1992c3313476f4edabd9014a1fb52a202cd7bc1a2eb6dcd3f92e70b9f9fe0897",
      "txt_hash": "82675e4cd8014f4796318b7bc78165c6320b1fe8b0d237c785bd64886fb69e3f"
    }
  },
  "status": "archived"
}