ProxSIM Taurus, version 1.02

CSV information ?

Status archived
Valid from 04.08.2011
Valid until 04.08.2021
Scheme đŸ‡³đŸ‡± NL
Manufacturer G+D Mobile Security GmbH
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level EAL4+, AVA_VAN.5, ALC_DVS.2
Protection profiles

Heuristics summary ?

Certificate ID: NSCIB-CC-11-32973

Certification report ?

Extracted keywords

Symmetric Algorithms
AES, DES

JavaCard versions
Java Card 2.2.2, Java Card 2.2
Vendor
Samsung, Giesecke & Devrient, G&D

Security level
EAL4, EAL4+, EAL 5+, EAL 4, EAL4 augmented, EAL 4 augmented
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_LCD.1, ALC_TAT.1, ATE_IND, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Protection profiles
BSI-PP-0035, ANSSI-CC-PP-2010/03
Certificates
ANSSI-2010/57, ANSSI-CC-2009/57, NSCIB-CC-11-32973
Evaluation facilities
Brightsight

Side-channel analysis
side channel, DPA, DFA, JIL

Standards
ISO/IEC 7816-3, ISO/IEC 7816-4

File metadata

Creation date: D:20110807080131+02'00'
Pages: 17
Creator: pdfFactory Pro www.pdffactory.com
Producer: pdfFactory Pro 3.41 (Windows XP Professional Dutch)

Frontpage

Certificate ID: NSCIB-CC-11-32973-CR
Certified item: ProxSIM Taurus, v1.02
Certification lab: Brightsight
Developer: Giesecke & Devrient GmbH

References

Outgoing
  • ANSSI-CC-2010/57 - CC IDeal Citiz SmartCard (on SB23YR48B), version 1.4.5 IAS ECC application with PIN or MOC authentication

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES, 3-DES, CBC-MAC
Asymmetric Algorithms
RSA-CRT
Schemes
MAC, Key Exchange
Protocols
IKE
Randomness
RNG
Block cipher modes
ECB

JavaCard versions
Java Card 2.2.2, Java Card 2.2
JavaCard API constants
TYPE_ACCESS
Vendor
Samsung, Giesecke & Devrient, G&D

Security level
EAL4, EAL4 augmented
Claims
D.APP_CODE, D.APP_C_DATA, D.APP_I_DATA, D.PIN, D.JCS_CODE, D.JCS_DATA, D.SEC_DATA, D.API_DATA, D.CRYPTO, O.SCP, O.SID, O.OPERATE, O.RESOURCES, O.FIREWALL, O.NATIVE, O.REALLOCATION, O.GLOBAL_ARRAYS_CONFID, O.GLOBAL_ARRAYS_INTEG, O.ALARM, O.TRANSACTION, O.CIPHER, O.PIN-MNGT, O.KEY-MNGT, O.REMOTE, O.OBJ-DELETION, O.INSTALL, O.LOAD, O.DELETION, O.KEYMNGT, O.KEY-, O.JAVAOBJECT, O.CODE_PKG, O.APPLET, O.REMOTE_OBJ, O.ROR, O.REMOTE_MTHD, O.RMI_SERVICE, T.CONFID-JCS-CODE, T.CONFID-APPLI-DATA, T.CONFID-JCS-DATA, T.INTEG-APPLI-CODE, T.INTEG-JCS-CODE, T.INTEG-APPLI-DATA, T.INTEG-JCS-DATA, T.SID, T.EXE-CODE, T.NATIVE, T.EXE-CODE-REMOTE, T.EXE-, T.RESSOURCES, T.INSTALL, T.DELETION, T.OBJ-DELETION, T.PHYSICAL, T.CONFID-APPLI-, A.VERIFICATION, A.DELETION, A.APPLET, R.JAVA, OP.ARRAY_ACCESS, OP.INSTANCE_FIELD, OP.INVK_VIRTUAL, OP.INVK_INTERFACE, OP.THROW, OP.TYPE_ACCESS, OP.JAVA, OP.CREATE, OP.PUT, OP.DELETE_APPLET, OP.DELETE_PCKG, OP.DELETE_PCKG_APPLET, OP.GET_ROR, OP.INVOKE, OP.RET_RORD, OE.CARD-MANAGEMENT, OE.VERIFICATION, OE.APPLET, OE.SYM_KEY_GEN, OE.SCP, OE.CARDMANAGEMENT, OSP.VERIFICATION
Security Assurance Requirements (SAR)
ADV_ARC.1, ALC_DVS.2, AVA_VAN.5
Security Functional Requirements (SFR)
FAU_ARP, FAU_ARP.1, FCO_NRO, FCO_NRO.2, FCS_CKM.1, FCS_CKM.1.1, FCS_CKM.2, FCS_CKM.3, FCS_CKM.4, FCS_CKM.2.1, FCS_CKM.3.1, FCS_CKM.4.1, FCS_COP.1, FCS_COP.1.1, FDP_ACC, FDP_ACC.2, FDP_ACF, FDP_ACF.1, FDP_IFC, FDP_IFC.1, FDP_IFF, FDP_IFF.1, FDP_RIP, FDP_RIP.1, FDP_ROL.1, FDP_ROL, FDP_SDI.2, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ITC, FDP_ITC.2, FDP_IFC.2, FDP_UIT, FDP_UIT.1, FIA_ATD, FIA_ATD.1, FIA_UID, FIA_UID.2, FIA_USB, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_UID.1, FMT_MSA, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_SMR, FMT_SMR.1, FMT_SMF, FMT_SMF.1, FMT_MTD, FMT_MTD.1, FMT_MTD.3, FMT_REV.1, FMT_REV, FPR_UNO.1, FPR_UNO.1.1, FPT_TDC.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_FLS, FPT_FLS.1, FPT_RCV, FPT_RCV.3, FTP_ITC, FTP_ITC.1
Protection profiles
ANSSI-CC-PP-
Certificates
ANSSI-CC-2009/57
Certification process
out of scope, class Checksum) or implement its own mechanisms in the application, which both is out of scope of this evaluation, Java Card API (class Checksum) or implement its own mechanisms in the application, which both is out of scope of this evaluation. 6.1.1.3.3 FPT_TDC.1 Inter-TSF basic TSF data consistency 6.1.1.3.3.1 FPT_TDC.1

Side-channel analysis
physical probing, DPA, physical tampering, malfunction
Certification process
out of scope, class Checksum) or implement its own mechanisms in the application, which both is out of scope of this evaluation, Java Card API (class Checksum) or implement its own mechanisms in the application, which both is out of scope of this evaluation. 6.1.1.3.3 FPT_TDC.1 Inter-TSF basic TSF data consistency 6.1.1.3.3.1 FPT_TDC.1

Standards
PKCS1, PKCS5, AIS20, AIS 20, RFC2409, RFC 2409, RFC 3447, ISO/IEC 7816-3, ISO/IEC 7816-4, ISO/IEC 7816-6, ISO/IEC 14888, CCMB-2006-09-001, CCMB-2009-07-001, CCMB-2007-09-002, CCMB-2009-07-002, CCMB-2007-09-003, CCMB-2009-07-003, CCMB-2009-07-004

File metadata

Title: Microsoft Word - ASE_ST_ProxSIMTaurus_Lite.doc
Author: gawlasf
Creation date: D:20110721165002+02'00'
Modification date: D:20110721165002+02'00'
Pages: 98
Creator: PScript5.dll Version 5.2.2
Producer: Acrobat Distiller 9.4.5 (Windows)

References

Outgoing

Heuristics ?

Certificate ID: NSCIB-CC-11-32973

Extracted SARs

ASE_OBJ.2, ADV_FSP.4, ASE_TSS.1, ALC_TAT.1, ADV_IMP.1, ADV_ARC.1, ALC_DEL.1, ADV_TDS.3, ALC_DVS.2, AVA_VAN.5, ASE_REQ.2, ALC_CMS.4, ATE_FUN.1, ATE_COV.2, ASE_CCL.1, ATE_DPT.1, ASE_ECD.1, AGD_OPE.1, ALC_CMC.4, AGD_PRE.1, ASE_SPD.1, ATE_IND.2, ASE_INT.1, ALC_LCD.1

References ?

Updates ?

  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name ProxSIM Taurus, version 1.02 was processed.

  • 01.02.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'ProtectionProfile', 'pp_name': 'Java Cardâ„¢ System Protection Profile Open Configuration, Version 2.6', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/ANSSI-CC-cible_PP-2010-03en.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['PDCP_V1.3']}}]}.
  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {'cert_id': 'NSCIB-CC-11-32973-CR', 'cert_item': 'ProxSIM Taurus, v1.02', 'developer': 'Giesecke & Devrient GmbH', 'cert_lab': ' Brightsight'}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The report_keywords property was updated, with the {'rules_cert_id': {'__insert__': {'NSCIB-CC-11-32973': 1}}} data.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['1.02']}.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': {'_type': 'Set', 'elements': ['NSCIB-CC-11-32973', 'ANSSI-CC-2009/57', 'ANSSI-2010/57']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['NSCIB-CC-11-32973', 'ANSSI-CC-2009/57', 'ANSSI-2010/57']}}}.
    • The cert_lab property was set to [''].
    • The cert_id property was set to NSCIB-CC-11-32973-CR.
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}]}}.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': 'ec52a66d44ae704175101cd538319f21e1235e67475eaaf9908f3e36d3377d57', 'st_pdf_hash': 'ced8eb5d9dd59c42b0ccc9f58300752af1a297dcf5c1bfd28a61363a2ce1f1de', 'report_txt_hash': 'd838b06dad946b1fc9ecd70fe74e62d346e74734b504470c884de146fff9d59c', 'st_txt_hash': '7f8a3e4c422a0c1b54eb933574ceb3f7a985a37ec7aa152c317f95cc0b9b8085'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {'AES': 3, 'DES': 3}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {}, 'rules_randomness': {}, 'rules_tee': {}, 'rules_side_channels': {'side channel': 1, 'DPA': 4, 'DFA': 4}} values inserted.
    • The st_keywords property was updated, with the {'rules_symmetric_crypto': {'AES': 14, 'DES': 11}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {'MAC': 6, 'Key Exchange': 1}, 'rules_randomness': {'RNG': 1}, 'rules_tee': {'SE': 1}, 'rules_side_channels': {'malfunction': 2, 'physical probing': 2, 'physical tampering': 1, 'DPA': 1}} values inserted.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report_extract_ok property was set to False.
    • The errors property was set to ["Failed to read metadata of certs/reports/pdf/c8cc75b95f0c8047.pdf, error: unsupported operand type(s) for +: 'IndirectObject' and 'list'", "Failed to read metadata of certs/reports/pdf/c8cc75b95f0c8047.pdf, error: unsupported operand type(s) for +: 'IndirectObject' and 'list'"].

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': []}} values inserted.
    • The report_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-2010/57': 1, 'ANSSI-CC-2009/57': 2}, 'NL': {'NSCIB-CC-11-32973': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0035': 1}, 'ANSSI': {'ANSSI-CC-PP-2010/03': 1}}, 'cc_security_level': {'EAL': {'EAL4': 2, 'EAL4+': 3, 'EAL 5+': 1, 'EAL 4': 1, 'EAL4 augmented': 1, 'EAL 4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.4': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_DVS.2': 3, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.5': 2}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Samsung': {'Samsung': 3}, 'GD': {'Giesecke & Devrient': 6, 'G&D': 11}}, 'eval_facility': {'BrightSight': {'Brightsight': 10}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 3}}, 'DES': {'DES': {'DES': 3}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'side channel': 1, 'SPA': 3, 'DPA': 4}, 'FI': {'DFA': 4}, 'other': {'JIL': 3}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 7816-3': 1, 'ISO/IEC 7816-4': 1}}, 'javacard_version': {'JavaCard': {'Java Card 2.2.2': 3, 'Java Card 2.2': 1}}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {'ANSSI': {'ANSSI-CC-PP-': 1}}, 'cc_security_level': {'EAL': {'EAL4': 3, 'EAL4 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 5}, 'ALC': {'ALC_DVS.2': 4}, 'AVA': {'AVA_VAN.5': 4}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 6}, 'FCS': {'FCS_CKM.1': 5, 'FCS_CKM.1.1': 2, 'FCS_CKM.2': 7, 'FCS_CKM.3': 7, 'FCS_CKM.2.1': 2, 'FCS_CKM.3.1': 2, 'FCS_CKM.4': 6, 'FCS_CKM.4.1': 2, 'FCS_COP.1': 5, 'FCS_COP.1.1': 2}, 'FDP': {'FDP_ROL.1': 2, 'FDP_SDI.2': 4, 'FDP_SDI.2.1': 2, 'FDP_SDI.2.2': 2}, 'FIA': {'FIA_USB.1.1': 2, 'FIA_USB.1.2': 2, 'FIA_USB.1.3': 2}, 'FMT': {'FMT_SMR.1': 3, 'FMT_SMF.1': 2}, 'FPR': {'FPR_UNO.1': 4, 'FPR_UNO.1.1': 2}, 'FPT': {'FPT_TDC.1': 4, 'FPT_TDC.1.1': 2, 'FPT_TDC.1.2': 3}}, 'cc_claims': {'D': {'D': 1, 'D.APP_CODE': 7, 'D.APP_C_DATA': 3, 'D.APP_I_DATA': 5, 'D.PIN': 4, 'D.JCS_CODE': 3, 'D.JCS_DATA': 5, 'D.SEC_DATA': 7, 'D.API_DATA': 3, 'D.CRYPTO': 4}, 'O': {'O': 1, 'O.SCP.RECOVERY': 7, 'O.SCP.SUPPORT': 8, 'O.SCP.IC': 10, 'O.OPERATE': 4, 'O.SID': 3, 'O.RESOURCES': 1, 'O.FIREWALL': 3, 'O.NATIVE': 1, 'O.REALLOCATION': 3, 'O.GLOBAL_ARRAYS_CONFID': 2, 'O.GLOBAL_ARRAYS_INTEG': 2, 'O.ALARM': 3, 'O.TRANSACTION': 4, 'O.CIPHER': 4, 'O.PIN-MNGT': 4, 'O.KEY-MNGT': 3, 'O.REMOTE': 1, 'O.OBJ-DELETION': 1, 'O.INSTALL': 1, 'O.LOAD': 1, 'O.DELETION': 1, 'O.KEYMNGT': 2, 'O.KEY-': 1, 'O.JAVAOBJECT': 32, 'O.CODE_PKG': 13, 'O.APPLET': 22, 'O.REMOTE_OBJ': 11, 'O.ROR': 5, 'O.REMOTE_MTHD': 6, 'O.RMI_SERVICE': 13}, 'T': {'T': 6, 'T.OPERATE': 1, 'T.CONFID-JCS-CODE': 1, 'T.CONFID-APPLI-DATA': 4, 'T.CONFID-JCS-DATA': 1, 'T.INTEG-APPLI-CODE': 1, 'T.INTEG-JCS-CODE': 1, 'T.INTEG-APPLI-DATA': 4, 'T.INTEG-JCS-DATA': 1, 'T.INTEG-APPLI-CODE.LOAD': 1, 'T.INTEG-APPLI-DATA.LOAD': 1, 'T.NATIVE': 1, 'T.EXE-CODE-REMOTE': 1, 'T.EXE-': 1, 'T.RESSOURCES': 1, 'T.INSTALL': 1, 'T.DELETION': 1, 'T.OBJ-DELETION': 1, 'T.PHYSICAL': 5, 'T.CONFID-APPLI-': 1}, 'A': {'A': 2, 'A.VERIFICATION': 2, 'A.DELETION': 2, 'A.APPLET': 2, 'A.OPERATE': 1, 'A.LOAD': 1}, 'R': {'R': 2}, 'OP': {'OP.ARRAY_ACCESS': 4, 'OP.INSTANCE_FIELD': 4, 'OP.INVK_VIRTUAL': 6, 'OP.INVK_INTERFACE': 7, 'OP.THROW': 5, 'OP.TYPE_ACCESS': 5, 'OP.JAVA': 6, 'OP.CREATE': 8, 'OP.PUT': 5, 'OP.DELETE_APPLET': 4, 'OP.DELETE_PCKG': 3, 'OP.DELETE_PCKG_APPLET': 3, 'OP.GET_ROR': 3, 'OP.INVOKE': 3, 'OP.RET_RORD': 4}, 'OE': {'OE.CARD-MANAGEMENT': 2, 'OE.VERIFICATION': 4, 'OE.APPLET': 2, 'OE.SYM_KEY_GEN': 13, 'OE': 1, 'OE.SCP.RECOVERY': 6, 'OE.SCP.SUPPORT': 6, 'OE.SCP.IC': 6, 'OE.CARDMANAGEMENT': 2}, 'OSP': {'OSP.VERIFICATION': 2}}, 'vendor': {'Samsung': {'Samsung': 3}, 'GD': {'Giesecke & Devrient': 7, 'G&D': 25}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 14}}, 'DES': {'DES': {'DES': 11}, '3DES': {'3-DES': 8}}, 'constructions': {'MAC': {'CBC-MAC': 4}}}, 'asymmetric_crypto': {'RSA': {'RSA-CRT': 5}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 6}, 'KEX': {'Key Exchange': 1}, 'KA': {'KA': 19}}, 'crypto_protocol': {'IKE': {'IKE': 1}}, 'randomness': {'RNG': {'RNG': 1}}, 'cipher_mode': {'ECB': {'ECB': 4}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 2, 'DPA': 1}, 'FI': {'physical tampering': 1, 'malfunction': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 1}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'PKCS': {'PKCS1': 9, 'PKCS5': 5}, 'BSI': {'AIS20': 3, 'AIS 20': 1}, 'RFC': {'RFC2409': 5, 'RFC 2409': 1, 'RFC 3447': 1}, 'ISO': {'ISO/IEC 7816-3': 1, 'ISO/IEC 7816-4': 1, 'ISO/IEC 7816-6': 1}, 'CC': {'CCMB-2006-09-001': 1, 'CCMB-2007-09-002': 1, 'CCMB-2007-09-003': 1, 'CCMB-2009-07-003': 1, 'CCMB-2009-07-004': 1}}, 'javacard_version': {'JavaCard': {'Java Card 2.2.2': 3, 'Java Card 2.2': 1}}, 'javacard_api_const': {'misc': {'TYPE_ACCESS': 3}}, 'javacard_packages': {'javacard': {'javacard.security': 1}, 'javacardx': {'javacardx.crypto': 1}}, 'certification_process': {'OutOfScope': {'out of scope': 1, '(class Checksum) or implement its own mechanisms in the application, which both is out of scope of this evaluation': 1, 'he Java Card API (class Checksum) or implement its own mechanisms in the application, which both is out of scope of this evaluation. 6.1.1.3.3 FPT_TDC.1 Inter-TSF basic TSF data consistency 6.1.1.3.3.1': 1}}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
    • The cert_lab property was set to None.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Java Cardâ„¢ System Protection Profile Open Configuration, Version 2.6', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/ANSSI-CC-cible_PP-2010-03en.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['PDCP_V1.3']}}]}.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}]}.
  • 28.07.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report_extract_ok property was set to True.
    • The errors property was set to [].

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 728008, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 17, '/CreationDate': "D:20110807080131+02'00'", '/Creator': 'pdfFactory Pro www.pdffactory.com', '/Producer': 'pdfFactory Pro 3.41 (Windows XP Professional Dutch)', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['mailto:info@nl.tuv.com', 'http://www.tuv.com/nl', 'http://www.commoncriteriaportal.org']}}.

    The computed heuristics were updated.

    • The cert_lab property was set to [''].
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': 'Certification_Report_NSCIB-CC-11-32973-CR.pdf', 'st_filename': 'ST_ProxSIMTaurus_Lite_1.1.pdf'}.
    • The report_keywords property was updated, with the {'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL4': 3}}}}, 'cc_sar': {'__update__': {'ATE': {'__insert__': {'ATE_IND': 2}}, 'AVA': {'__update__': {'AVA_VAN.5': 3}}}}, 'vendor': {'__update__': {'GD': {'__update__': {'Giesecke & Devrient': 5}}}}, 'side_channel_analysis': {'__update__': {'SCA': {'__update__': {'DPA': 1}, '__delete__': ['SPA']}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'FR': {'ANSSI-CC-2009/57': 2}}, 'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL4 augmented': 3}}}}, 'cc_sar': {'__update__': {'ALC': {'__update__': {'ALC_DVS.2': 5}}, 'AVA': {'__update__': {'AVA_VAN.5': 5}}}}, 'cc_sfr': {'__insert__': {'FCO': {'FCO_NRO': 4, 'FCO_NRO.2': 6}, 'FTP': {'FTP_ITC': 4, 'FTP_ITC.1': 6}}, '__update__': {'FAU': {'__insert__': {'FAU_ARP': 4}, '__update__': {'FAU_ARP.1': 9}}, 'FCS': {'__update__': {'FCS_CKM.2': 6, 'FCS_COP.1': 6, 'FCS_COP.1.1': 13}}, 'FDP': {'__insert__': {'FDP_ACC': 12, 'FDP_ACC.2': 13, 'FDP_ACF': 12, 'FDP_ACF.1': 28, 'FDP_IFC': 12, 'FDP_IFC.1': 6, 'FDP_IFF': 12, 'FDP_IFF.1': 30, 'FDP_RIP': 32, 'FDP_RIP.1': 32, 'FDP_ROL': 8, 'FDP_ITC': 4, 'FDP_ITC.2': 10, 'FDP_IFC.2': 4, 'FDP_UIT': 4, 'FDP_UIT.1': 4}, '__update__': {'FDP_ROL.1': 8}}, 'FIA': {'__insert__': {'FIA_ATD': 4, 'FIA_ATD.1': 2, 'FIA_UID': 8, 'FIA_UID.2': 2, 'FIA_USB': 4, 'FIA_UID.1': 4}}, 'FMT': {'__insert__': {'FMT_MSA': 40, 'FMT_MSA.1': 12, 'FMT_MSA.2': 4, 'FMT_MSA.3': 26, 'FMT_SMR': 18, 'FMT_SMF': 14, 'FMT_MTD': 8, 'FMT_MTD.1': 2, 'FMT_MTD.3': 2, 'FMT_REV.1': 6, 'FMT_REV': 4}, '__update__': {'FMT_SMR.1': 23, 'FMT_SMF.1': 10}}, 'FPT': {'__insert__': {'FPT_FLS': 15, 'FPT_FLS.1': 8, 'FPT_RCV': 4, 'FPT_RCV.3': 8}, '__update__': {'FPT_TDC.1': 5}}}}, 'cc_claims': {'__update__': {'D': {'__delete__': ['D']}, 'O': {'__insert__': {'O.SCP': 25}, '__update__': {'O.OPERATE': 3}, '__delete__': ['O', 'O.SCP.RECOVERY', 'O.SCP.SUPPORT', 'O.SCP.IC']}, 'T': {'__insert__': {'T.SID': 2, 'T.EXE-CODE': 2}, '__update__': {'T.INTEG-APPLI-CODE': 2, 'T.INTEG-APPLI-DATA': 5}, '__delete__': ['T', 'T.OPERATE', 'T.INTEG-APPLI-CODE.LOAD', 'T.INTEG-APPLI-DATA.LOAD']}, 'A': {'__delete__': ['A', 'A.OPERATE', 'A.LOAD']}, 'R': {'R.JAVA': 11}, 'OP': {'__update__': {'OP.INSTANCE_FIELD': 3}}, 'OE': {'__insert__': {'OE.SCP': 18}, '__delete__': ['OE', 'OE.SCP.RECOVERY', 'OE.SCP.SUPPORT', 'OE.SCP.IC']}}}, 'vendor': {'__update__': {'GD': {'__update__': {'Giesecke & Devrient': 8, 'G&D': 24}}}}, 'symmetric_crypto': {'__update__': {'AES_competition': {'__update__': {'AES': {'__update__': {'AES': 13}}}}, 'DES': {'__update__': {'DES': {'__update__': {'DES': 3}}}}}}, 'crypto_scheme': {'__update__': {'MAC': {'__update__': {'MAC': 2}}}, '__delete__': ['KA']}, 'cipher_mode': {'__update__': {'ECB': {'__update__': {'ECB': 2}}}}, 'side_channel_analysis': {'__update__': {'SCA': {'__update__': {'DPA': 3}}}}, 'tee_name': {}, 'standard_id': {'__update__': {'ISO': {'__insert__': {'ISO/IEC 14888': 2}}, 'CC': {'__insert__': {'CCMB-2009-07-001': 1, 'CCMB-2009-07-002': 1}}}}, 'javacard_api_const': {'__update__': {'misc': {'__update__': {'TYPE_ACCESS': 5}}}}, 'javacard_packages': {'__insert__': {'java': {'java.rmi': 2}}, '__update__': {'javacard': {'__insert__': {'javacard.framework.service': 1, 'javacard.framework': 3}, '__update__': {'javacard.security': 2}}, 'javacardx': {'__insert__': {'javacardx.rmi': 1}}}}, 'certification_process': {'__update__': {'OutOfScope': {'__insert__': {'class Checksum) or implement its own mechanisms in the application, which both is out of scope of this evaluation': 1, 'Java Card API (class Checksum) or implement its own mechanisms in the application, which both is out of scope of this evaluation. 6.1.1.3.3 FPT_TDC.1 Inter-TSF basic TSF data consistency 6.1.1.3.3.1 FPT_TDC.1': 1}, '__delete__': ['(class Checksum) or implement its own mechanisms in the application, which both is out of scope of this evaluation', 'he Java Card API (class Checksum) or implement its own mechanisms in the application, which both is out of scope of this evaluation. 6.1.1.3.3 FPT_TDC.1 Inter-TSF basic TSF data consistency 6.1.1.3.3.1']}}}} data.

    The computed heuristics were updated.

    • The cert_id property was set to NSCIB-CC-11-32973.
    • The st_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2009/57']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2009/57']}} data.
    • The report_references property was updated, with the {'directly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['NSCIB-CC-11-32973', 'ANSSI-2010/57']}, '__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2010/57']}}, 'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['NSCIB-CC-11-32973', 'ANSSI-2010/57']}, '__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2009/50', 'ANSSI-CC-2009/51', 'ANSSI-CC-2009/05', 'ANSSI-CC-2009/28', 'ANSSI-CC-2010/01', 'ANSSI-CC-2010/19', 'ANSSI-CC-2010/57', 'ANSSI-CC-2009/06', 'ANSSI-CC-2010/22', 'ANSSI-CC-2009/26', 'ANSSI-CC-2010/02', 'ANSSI-CC-2009/62']}}} data.
  • 28.09.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The report_references property was updated, with the {'directly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2009/57']}}, 'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2009/57']}}} data.
  • 04.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Java Cardâ„¢ System Protection Profile Open Configuration, Version 2.6', 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/ANSSI-CC-cible_PP-2010-03en.pdf', 'pp_link': None, 'pp_ids': None}]}.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Java Cardâ„¢ System Protection Profile Open Configuration, Version 2.6', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/ANSSI-CC-cible_PP-2010-03en.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['PDCP_V1.3']}}]}.

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.

Raw data

{
  "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": null,
  "dgst": "c8cc75b95f0c8047",
  "heuristics": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics",
    "cert_id": "NSCIB-CC-11-32973",
    "cert_lab": [
      ""
    ],
    "cpe_matches": null,
    "direct_dependency_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.02"
      ]
    },
    "indirect_dependency_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2010/57"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2009/05",
          "ANSSI-CC-2009/51",
          "ANSSI-CC-2009/06",
          "ANSSI-CC-2009/26",
          "ANSSI-CC-2010/22",
          "ANSSI-CC-2010/02",
          "ANSSI-CC-2010/57",
          "ANSSI-CC-2010/01",
          "ANSSI-CC-2009/62",
          "ANSSI-CC-2009/50",
          "ANSSI-CC-2010/19",
          "ANSSI-CC-2009/28"
        ]
      }
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "G+D Mobile Security GmbH",
  "manufacturer_web": "https://www.gi-de.com/de/de/mobile-security/",
  "name": "ProxSIM Taurus, version 1.02",
  "not_valid_after": "2021-08-04",
  "not_valid_before": "2011-08-04",
  "pdf_data": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData",
    "report_filename": "Certification_Report_NSCIB-CC-11-32973-CR.pdf",
    "report_frontpage": {
      "anssi": {},
      "bsi": {},
      "canada": {},
      "niap": {},
      "nscib": {
        "cert_id": "NSCIB-CC-11-32973-CR",
        "cert_item": "ProxSIM Taurus, v1.02",
        "cert_lab": " Brightsight",
        "developer": "Giesecke \u0026 Devrient GmbH"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-2010/57": 1,
          "ANSSI-CC-2009/57": 2
        },
        "NL": {
          "NSCIB-CC-11-32973": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "ANSSI": {
          "ANSSI-CC-PP-2010/03": 1
        },
        "BSI": {
          "BSI-PP-0035": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.4": 1,
          "ADV_IMP.1": 1,
          "ADV_TDS.3": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.2": 3,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND": 2,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 3
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 1,
          "EAL 4 augmented": 1,
          "EAL 5+": 1,
          "EAL4": 3,
          "EAL4 augmented": 1,
          "EAL4+": 3
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "BrightSight": {
          "Brightsight": 10
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {
        "JavaCard": {
          "Java Card 2.2": 1,
          "Java Card 2.2.2": 3
        }
      },
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "FI": {
          "DFA": 4
        },
        "SCA": {
          "DPA": 1,
          "side channel": 1
        },
        "other": {
          "JIL": 3
        }
      },
      "standard_id": {
        "ISO": {
          "ISO/IEC 7816-3": 1,
          "ISO/IEC 7816-4": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 3
          }
        },
        "DES": {
          "DES": {
            "DES": 3
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "GD": {
          "G\u0026D": 11,
          "Giesecke \u0026 Devrient": 5
        },
        "Samsung": {
          "Samsung": 3
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20110807080131+02\u002700\u0027",
      "/Creator": "pdfFactory Pro www.pdffactory.com",
      "/Producer": "pdfFactory Pro 3.41 (Windows XP Professional Dutch)",
      "pdf_file_size_bytes": 728008,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.tuv.com/nl",
          "http://www.commoncriteriaportal.org",
          "mailto:info@nl.tuv.com"
        ]
      },
      "pdf_is_encrypted": true,
      "pdf_number_of_pages": 17
    },
    "st_filename": "ST_ProxSIMTaurus_Lite_1.1.pdf",
    "st_frontpage": {
      "anssi": {},
      "bsi": {},
      "canada": {},
      "niap": {},
      "nscib": {}
    },
    "st_keywords": {
      "asymmetric_crypto": {
        "RSA": {
          "RSA-CRT": 5
        }
      },
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2009/57": 2
        }
      },
      "cc_claims": {
        "A": {
          "A.APPLET": 2,
          "A.DELETION": 2,
          "A.VERIFICATION": 2
        },
        "D": {
          "D.API_DATA": 3,
          "D.APP_CODE": 7,
          "D.APP_C_DATA": 3,
          "D.APP_I_DATA": 5,
          "D.CRYPTO": 4,
          "D.JCS_CODE": 3,
          "D.JCS_DATA": 5,
          "D.PIN": 4,
          "D.SEC_DATA": 7
        },
        "O": {
          "O.ALARM": 3,
          "O.APPLET": 22,
          "O.CIPHER": 4,
          "O.CODE_PKG": 13,
          "O.DELETION": 1,
          "O.FIREWALL": 3,
          "O.GLOBAL_ARRAYS_CONFID": 2,
          "O.GLOBAL_ARRAYS_INTEG": 2,
          "O.INSTALL": 1,
          "O.JAVAOBJECT": 32,
          "O.KEY-": 1,
          "O.KEY-MNGT": 3,
          "O.KEYMNGT": 2,
          "O.LOAD": 1,
          "O.NATIVE": 1,
          "O.OBJ-DELETION": 1,
          "O.OPERATE": 3,
          "O.PIN-MNGT": 4,
          "O.REALLOCATION": 3,
          "O.REMOTE": 1,
          "O.REMOTE_MTHD": 6,
          "O.REMOTE_OBJ": 11,
          "O.RESOURCES": 1,
          "O.RMI_SERVICE": 13,
          "O.ROR": 5,
          "O.SCP": 25,
          "O.SID": 3,
          "O.TRANSACTION": 4
        },
        "OE": {
          "OE.APPLET": 2,
          "OE.CARD-MANAGEMENT": 2,
          "OE.CARDMANAGEMENT": 2,
          "OE.SCP": 18,
          "OE.SYM_KEY_GEN": 13,
          "OE.VERIFICATION": 4
        },
        "OP": {
          "OP.ARRAY_ACCESS": 4,
          "OP.CREATE": 8,
          "OP.DELETE_APPLET": 4,
          "OP.DELETE_PCKG": 3,
          "OP.DELETE_PCKG_APPLET": 3,
          "OP.GET_ROR": 3,
          "OP.INSTANCE_FIELD": 3,
          "OP.INVK_INTERFACE": 7,
          "OP.INVK_VIRTUAL": 6,
          "OP.INVOKE": 3,
          "OP.JAVA": 6,
          "OP.PUT": 5,
          "OP.RET_RORD": 4,
          "OP.THROW": 5,
          "OP.TYPE_ACCESS": 5
        },
        "OSP": {
          "OSP.VERIFICATION": 2
        },
        "R": {
          "R.JAVA": 11
        },
        "T": {
          "T.CONFID-APPLI-": 1,
          "T.CONFID-APPLI-DATA": 4,
          "T.CONFID-JCS-CODE": 1,
          "T.CONFID-JCS-DATA": 1,
          "T.DELETION": 1,
          "T.EXE-": 1,
          "T.EXE-CODE": 2,
          "T.EXE-CODE-REMOTE": 1,
          "T.INSTALL": 1,
          "T.INTEG-APPLI-CODE": 2,
          "T.INTEG-APPLI-DATA": 5,
          "T.INTEG-JCS-CODE": 1,
          "T.INTEG-JCS-DATA": 1,
          "T.NATIVE": 1,
          "T.OBJ-DELETION": 1,
          "T.PHYSICAL": 5,
          "T.RESSOURCES": 1,
          "T.SID": 2
        }
      },
      "cc_protection_profile_id": {
        "ANSSI": {
          "ANSSI-CC-PP-": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 5
        },
        "ALC": {
          "ALC_DVS.2": 5
        },
        "AVA": {
          "AVA_VAN.5": 5
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 3,
          "EAL4 augmented": 3
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP": 4,
          "FAU_ARP.1": 9
        },
        "FCO": {
          "FCO_NRO": 4,
          "FCO_NRO.2": 6
        },
        "FCS": {
          "FCS_CKM.1": 5,
          "FCS_CKM.1.1": 2,
          "FCS_CKM.2": 6,
          "FCS_CKM.2.1": 2,
          "FCS_CKM.3": 7,
          "FCS_CKM.3.1": 2,
          "FCS_CKM.4": 6,
          "FCS_CKM.4.1": 2,
          "FCS_COP.1": 6,
          "FCS_COP.1.1": 13
        },
        "FDP": {
          "FDP_ACC": 12,
          "FDP_ACC.2": 13,
          "FDP_ACF": 12,
          "FDP_ACF.1": 28,
          "FDP_IFC": 12,
          "FDP_IFC.1": 6,
          "FDP_IFC.2": 4,
          "FDP_IFF": 12,
          "FDP_IFF.1": 30,
          "FDP_ITC": 4,
          "FDP_ITC.2": 10,
          "FDP_RIP": 32,
          "FDP_RIP.1": 32,
          "FDP_ROL": 8,
          "FDP_ROL.1": 8,
          "FDP_SDI.2": 4,
          "FDP_SDI.2.1": 2,
          "FDP_SDI.2.2": 2,
          "FDP_UIT": 4,
          "FDP_UIT.1": 4
        },
        "FIA": {
          "FIA_ATD": 4,
          "FIA_ATD.1": 2,
          "FIA_UID": 8,
          "FIA_UID.1": 4,
          "FIA_UID.2": 2,
          "FIA_USB": 4,
          "FIA_USB.1.1": 2,
          "FIA_USB.1.2": 2,
          "FIA_USB.1.3": 2
        },
        "FMT": {
          "FMT_MSA": 40,
          "FMT_MSA.1": 12,
          "FMT_MSA.2": 4,
          "FMT_MSA.3": 26,
          "FMT_MTD": 8,
          "FMT_MTD.1": 2,
          "FMT_MTD.3": 2,
          "FMT_REV": 4,
          "FMT_REV.1": 6,
          "FMT_SMF": 14,
          "FMT_SMF.1": 10,
          "FMT_SMR": 18,
          "FMT_SMR.1": 23
        },
        "FPR": {
          "FPR_UNO.1": 4,
          "FPR_UNO.1.1": 2
        },
        "FPT": {
          "FPT_FLS": 15,
          "FPT_FLS.1": 8,
          "FPT_RCV": 4,
          "FPT_RCV.3": 8,
          "FPT_TDC.1": 5,
          "FPT_TDC.1.1": 2,
          "FPT_TDC.1.2": 3
        },
        "FTP": {
          "FTP_ITC": 4,
          "FTP_ITC.1": 6
        }
      },
      "certification_process": {
        "OutOfScope": {
          "Java Card API (class Checksum) or implement its own mechanisms in the application, which both is out of scope of this evaluation. 6.1.1.3.3 FPT_TDC.1 Inter-TSF basic TSF data consistency 6.1.1.3.3.1 FPT_TDC.1": 1,
          "class Checksum) or implement its own mechanisms in the application, which both is out of scope of this evaluation": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {
        "ECB": {
          "ECB": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IKE": {
          "IKE": 1
        }
      },
      "crypto_scheme": {
        "KEX": {
          "Key Exchange": 1
        },
        "MAC": {
          "MAC": 2
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {
        "misc": {
          "TYPE_ACCESS": 5
        }
      },
      "javacard_packages": {
        "java": {
          "java.rmi": 2
        },
        "javacard": {
          "javacard.framework": 3,
          "javacard.framework.service": 1,
          "javacard.security": 2
        },
        "javacardx": {
          "javacardx.crypto": 1,
          "javacardx.rmi": 1
        }
      },
      "javacard_version": {
        "JavaCard": {
          "Java Card 2.2": 1,
          "Java Card 2.2.2": 3
        }
      },
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "malfunction": 2,
          "physical tampering": 1
        },
        "SCA": {
          "DPA": 3,
          "physical probing": 2
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 20": 1,
          "AIS20": 3
        },
        "CC": {
          "CCMB-2006-09-001": 1,
          "CCMB-2007-09-002": 1,
          "CCMB-2007-09-003": 1,
          "CCMB-2009-07-001": 1,
          "CCMB-2009-07-002": 1,
          "CCMB-2009-07-003": 1,
          "CCMB-2009-07-004": 1
        },
        "ISO": {
          "ISO/IEC 14888": 2,
          "ISO/IEC 7816-3": 1,
          "ISO/IEC 7816-4": 1,
          "ISO/IEC 7816-6": 1
        },
        "PKCS": {
          "PKCS1": 9,
          "PKCS5": 5
        },
        "RFC": {
          "RFC 2409": 1,
          "RFC 3447": 1,
          "RFC2409": 5
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 13
          }
        },
        "DES": {
          "3DES": {
            "3-DES": 8
          },
          "DES": {
            "DES": 3
          }
        },
        "constructions": {
          "MAC": {
            "CBC-MAC": 4
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "GD": {
          "G\u0026D": 24,
          "Giesecke \u0026 Devrient": 8
        },
        "Samsung": {
          "Samsung": 3
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "gawlasf",
      "/CreationDate": "D:20110721165002+02\u002700\u0027",
      "/Creator": "PScript5.dll Version 5.2.2",
      "/ModDate": "D:20110721165002+02\u002700\u0027",
      "/Producer": "Acrobat Distiller 9.4.5 (Windows)",
      "/Title": "Microsoft Word - ASE_ST_ProxSIMTaurus_Lite.doc",
      "pdf_file_size_bytes": 472446,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 98
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": "EAL4+",
        "pp_ids": {
          "_type": "Set",
          "elements": [
            "PDCP_V1.3"
          ]
        },
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/ANSSI-CC-cible_PP-2010-03en.pdf",
        "pp_name": "Java Card\u2122 System Protection Profile Open Configuration, Version 2.6"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/Certification_Report_NSCIB-CC-11-32973-CR.pdf",
  "scheme": "NL",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4+",
      "ALC_DVS.2",
      "AVA_VAN.5"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/ST_ProxSIMTaurus_Lite_1.1.pdf",
  "state": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState",
    "errors": [],
    "report_convert_garbage": false,
    "report_convert_ok": true,
    "report_download_ok": true,
    "report_extract_ok": true,
    "report_pdf_hash": "ec52a66d44ae704175101cd538319f21e1235e67475eaaf9908f3e36d3377d57",
    "report_txt_hash": "d838b06dad946b1fc9ecd70fe74e62d346e74734b504470c884de146fff9d59c",
    "st_convert_garbage": false,
    "st_convert_ok": true,
    "st_download_ok": true,
    "st_extract_ok": true,
    "st_pdf_hash": "ced8eb5d9dd59c42b0ccc9f58300752af1a297dcf5c1bfd28a61363a2ce1f1de",
    "st_txt_hash": "7f8a3e4c422a0c1b54eb933574ceb3f7a985a37ec7aa152c317f95cc0b9b8085"
  },
  "status": "archived"
}