Sm@rtCafé® Expert 7.0 EAL 6+ C1

CSV information ?

Status active
Valid from 29.05.2020
Valid until 29.05.2025
Scheme 🇩🇪 DE
Manufacturer Veridos GmbH - Identity Solutions by Giesecke & Devrient and Bundesdruckerei
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level ALC_FLR.1, EAL6+

Heuristics summary ?

Certificate ID: BSI-DSZ-CC-1092-2020

Certificate ?

Extracted keywords

Vendor
Giesecke+Devrient

Security level
EAL 6+, EAL 6, EAL 5, EAL 2, EAL 6 augmented
Security Assurance Requirements (SAR)
ALC_FLR.1, ALC_FLR
Protection profiles
BSI-CC-PP-0099-
Certificates
BSI-DSZ-CC-1092-2020

Standards
ISO/IEC 15408, ISO/IEC 18045

File metadata

Title: Certificate BSI-DSZ-CC-1092-2020
Subject: Sm@rtCafé® Expert 7.0 EAL 6+C1
Keywords: Common Criteria, Certification, Zertifizierung, Smart Card, Java Card
Author: Bundesamt für Sicherheit in der Informationstechnik
Creation date: D:20200608084917+02'00'
Modification date: D:20200608085041+02'00'
Pages: 1
Creator: Writer
Producer: LibreOffice 6.2

Certification report ?

Extracted keywords

Symmetric Algorithms
AES, DES, 3-DES, 3DES, TDEA, CBC-MAC, CMAC
Asymmetric Algorithms
RSA 2048, RSA-CRT, ECDH, ECDSA, ECC
Hash functions
SHA-1, SHA-2
Schemes
MAC, Key Agreement
Protocols
PGP
Randomness
RNG
Block cipher modes
ECB, CBC

Vendor
Infineon, Infineon Technologies AG, Giesecke+Devrient, G+D, G&D, Giesecke & Devrient

Security level
EAL 6+, EAL 6, EAL 5, EAL 2, EAL 1, EAL 4, EAL 2+, EAL6, EAL 5+, EAL 6 augmented, EAL6 augmented
Security Assurance Requirements (SAR)
ADV_SPM.1, ADV_ARC, ALC_FLR.1, ALC_FLR, ALC_CMC.5, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.3, ATE_FUN, ATE_COV, ATE_DPT, ATE_IND, AVA_VAN
Security Functional Requirements (SFR)
FCO_NRO.2, FCS_COP.1, FCS_RNG.1, FCS_CKM.1, FCS_COP.1.1, FIA_UID, FPT_TDC.1, FTP_ITC
Protection profiles
BSI-CC-PP-0099-, BSI-CC-PP-0099-2017
Certificates
BSI-DSZ-CC-1092-2020, BSI-DSZ-CC-1028-2017, BSI-DSZ-CC-1092-, BSI-DSZ-CC-0951-V4-2019, BSI-DSZ-CC-S-0127-2019, BSI-DSZ-CC-S-0127-
Evaluation facilities
TÜV Informationstechnik, TÜViT
Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, 04.2020, Security Target Sm@rtCafé® Expert 7.0 EAL 6+ C1, Giesecke+Devrient Mobile Security GmbH (confidential document) 7 specifically • AIS 1, Version 13, Durchführung der Ortsbesichtigung in der Entwicklungsumgebung, Sm@rtCafé® Expert 7.0 EAL 6+ C1, Version 6, 25.05.2020, TÜV Informationstechnik GmbH (confidential document) [8] Java Card Protection Profile - Open Configuration, December 2017, Version 3.0.5, 36 for Sm@rtCafé® Expert 7.0 EAL 6+ C1, Version 6, 25.05.2020, BSI-DSZ-CC-1092- 2020, TÜViT GmbH (confidential document) [11] Configuration list for the TOE, Version 1.5, 18.05.2020, Giesecke+Devrient Mobile Security, confidential document) [12] Preparative Procedures Sm@rtCafé® Expert Expert 7.0 EAL 6+ C1 Version 2.1 , 15.04.2020, “Evaluation Technical Report for Composite Evaluation (ETR Comp)”, TÜV Informationstechnik GmbH (confidential document) [16] GlobalPlatform Card Specification Version 2.2.1, January 2011 [17] GlobalPlatform Card Common

Side-channel analysis
malfunction, JIL
Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, 04.2020, Security Target Sm@rtCafé® Expert 7.0 EAL 6+ C1, Giesecke+Devrient Mobile Security GmbH (confidential document) 7 specifically • AIS 1, Version 13, Durchführung der Ortsbesichtigung in der Entwicklungsumgebung, Sm@rtCafé® Expert 7.0 EAL 6+ C1, Version 6, 25.05.2020, TÜV Informationstechnik GmbH (confidential document) [8] Java Card Protection Profile - Open Configuration, December 2017, Version 3.0.5, 36 for Sm@rtCafé® Expert 7.0 EAL 6+ C1, Version 6, 25.05.2020, BSI-DSZ-CC-1092- 2020, TÜViT GmbH (confidential document) [11] Configuration list for the TOE, Version 1.5, 18.05.2020, Giesecke+Devrient Mobile Security, confidential document) [12] Preparative Procedures Sm@rtCafé® Expert Expert 7.0 EAL 6+ C1 Version 2.1 , 15.04.2020, “Evaluation Technical Report for Composite Evaluation (ETR Comp)”, TÜV Informationstechnik GmbH (confidential document) [16] GlobalPlatform Card Specification Version 2.2.1, January 2011 [17] GlobalPlatform Card Common

Standards
FIPS180-4, FIPS 197, FIPS186-4, FIPS46-3, FIPS PUB 180-4, FIPS PUB 186-4, FIPS197, SP 800-108, PKCS5, PKCS #1, AIS 34, AIS 25, AIS 26, AIS 36, AIS 46, AIS 37, AIS 20, AIS 31, AIS 35, AIS 1, AIS 32, AIS 47, AIS20, AIS31, RFC 5639, RFC5639, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065, ISO/IEC9796-2, ISO/IEC 11770-3, ISO/IEC 18031:2011, SCP03, SCP02
Technical reports
BSI TR-02102, BSI 7148, BSI 24

File metadata

Title: Certification Report BSI-DSZ-CC-1092-2020
Subject: Sm@rtCafé® Expert 7.0 EAL 6+C1
Keywords: "Common Criteria, Certification, Zertifizierung, Smart Card, Java Card"
Author: Bundesamt für Sicherheit in der Informationstechnik
Creation date: D:20200608083506+02'00'
Modification date: D:20200608084737+02'00'
Pages: 37
Creator: Writer
Producer: LibreOffice 6.2

Frontpage

Certificate ID: BSI-DSZ-CC-1092-2020
Certified item: Sm@rtCafé® Expert 7.0 EAL 6+ C1
Certification lab: BSI
Developer: Veridos GmbH - Identity Solutions by Giesecke+Devrient and Bundesdruckerei

References

Outgoing
  • BSI-DSZ-CC-1028-2017 - Sm@rtCafé® Expert 7.0 C3
  • BSI-DSZ-CC-0951-V4-2019 - Infineon Security Controller M5073 G11 with optional RSA2048/4096 v2.03.008 or v2.07.003, EC v2.03.008 or v2.07.003, SHA-2 v1.01 and Toolbox v2.03.008 or v2.07.003 libraries, symmetric crypto library v2.02.010, as well as with specific IC dedicated firmware, including the Flash Loader enhanced by the Mutual Authentication Extension (MAE)

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES, 3DES, 3-DES, Triple-DES, TDES, TDEA, CBC-MAC, CMAC
Asymmetric Algorithms
RSA-CRT, ECDH, ECDSA, ECC, Diffie-Hellman
Hash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-2
Schemes
MAC, Key Agreement
Randomness
TRNG, RNG, RND
Block cipher modes
ECB, CBC

JavaCard versions
Java Card 2.2.2
JavaCard API constants
TYPE_ACCESS
Vendor
Infineon, Infineon Technologies AG, Giesecke+Devrient, G+D, G&D, Giesecke & Devrient

Security level
EAL 6+, EAL6+, EAL6, EAL 4+, EAL 6, EAL6 augmented, EAL 6 augmented
Claims
D.APP_I_DATA, D.SEC_DATA, D.PIN, D.CRYPTO, O.CARD-, O.SCP, O.SID, O.FIREWALL, O.GLOBAL_ARRAYS_CONFID, O.GLOBAL_ARRAYS_INTEG, O.NATIVE, O.OPERATE, O.REALLOCATION, O.RESOURCES, O.ALARM, O.CIPHER, O.RNG, O.KEY-MNGT, O.PIN-MNGT, O.TRANSACTION, O.OBJ-DELETION, O.DELETION, O.LOAD, O.INSTALL, O.CARD-MANAGEMENT, O.PIN-, O.APPLET, O.CODE_PKG, O.JAVAOBJECT, O.GLOBAL_ARRAYS, O.KEY-, O.PINMNGT, O.RND, O.TDES, O.AES, T.SECURE_DELETION, T.CONFID-APPLI-DATA, T.CONFID-JCS-CODE, T.CONFID-JCS-DATA, T.INTEG-APPLI-CODE, T.INTEG-APPLI-DATA, T.INTEG-JCS-CODE, T.INTEG-JCS-DATA, T.SID, T.EXE-CODE, T.NATIVE, T.RESOURCES, T.DELETION, T.INSTALL, T.OBJ-DELETION, T.PHYSICAL, T.CONFID-APPLI-, T.CONFID-, T.INTEG-APPLI-, T.OBJDELETION, T.INTEGJCS-DATA, T.EXECODE, T.INTEG-, T.INTEGAPPLI-DATA, T.INTEGAPPLI-CODE, T.INTEG-JCS-, T.INTEG-JCSCODE, A.DELETION, A.APPLET, A.VERIFICATION, R.JAVA, OP.ARRAY_ACCESS, OP.ARRAY_LENGTH, OP.ARRAY_AASTORE, OP.CREATE, OP.DELETE_APPLET, OP.DELETE_PCKG, OP.DELETE_PCKG_APPLET, OP.INSTANCE_FIELD, OP.INVK_VIRTUAL, OP.INVK_INTERFACE, OP.JAVA, OP.THROW, OP.TYPE_ACCESS, OP.PUTFIELD, OP.PUTSTATIC, OP.PUT, OE.CARD-MANAGEMENT, OE.SCP, OE.APPLET, OE.VERIFICATION, OE.CODE-EVIDENCE, OE.CODE-, OSP.VERIFICATION
Security Assurance Requirements (SAR)
ADV_SPM.1, ADV_FSP.4, ADV_ARC, ADV_ARC.1, ADV_FSP.1, ADV_TDS.1, ADV_FSP.5, ADV_TDS.4, ADV_TDS.3, ADV_TDS.5, ADV_INT.3, ADV_IMP.1, ADV_IMP.2, ADV_FSP.2, AGD_OPE.1, AGD_PRE.1, ALC_FLR.1, ALC_DVS.2, ALC_CMC.5, ALC_TAT.1, ALC_TAT, ALC_TAT.3, ALC_CMS.1, ALC_LCD.1, ALC_CMS.5, ALC_DEL.1, ATE_COV.3, ATE_FUN.1, ATE_FUN.2, ATE_COV.1, ATE_COV.2, ATE_DPT.1, ATE_DPT.3, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1, ASE_INT.2, ASE_REQ.2, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_ARP.1, FAU_ARP.1.1, FAU_SAA.1, FAU_SAS.1, FCO_NRO, FCO_NRO.2, FCS_RNG, FCS_RNG.1.1, FCS_RNG.1, FCS_RNG.1.2, FCS_CKM.1, FCS_CKM.4, FCS_CKM.4.1, FCS_COP.1, FCS_CKM.2, FCS_CKM, FCS_COP, FDP_ACC, FDP_ACC.2, FDP_ACF, FDP_ACF.1, FDP_IFC, FDP_IFC.1, FDP_IFF, FDP_IFF.1, FDP_RIP, FDP_RIP.1, FDP_ROL.1, FDP_ROL, FDP_SDI, FDP_SDI.2, FDP_ITC, FDP_ITC.2, FDP_IFC.2, FDP_UIT, FDP_UIT.1, FDP_ACC.1, FDP_ITC.1, FDP_SDI.1, FDP_ITT.1, FDP_SDC.1, FIA_ATD, FIA_ATD.1, FIA_UID, FIA_UID.2, FIA_USB, FIA_USB.1, FIA_UID.1, FIA_API.1, FMT_MSA, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD, FMT_MTD.1, FMT_MTD.3, FMT_SMR, FMT_SMF, FMT_LIM.1, FMT_LIM.2, FMT_LIM, FPR_UNO.1, FPR_UNO.1.1, FPT_PHP.3, FPT_TST.1, FPT_FLS.1, FPT_FLS.1.1, FPT_TDC.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_FLS, FPT_RCV, FPT_RCV.3, FPT_PHP.3.1, FPT_ITT.1, FPT_TST.2, FRU_FLT.2, FTP_ITC, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.3, FTP_TRP.1
Protection profiles
BSI-CC-PP-0084-2014
Certificates
BSI-DSZ-CC-0951-V4-2019, BSI-DSZ-CC-0951-V4-
Certification process
out of scope, a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are, with ECDH is part of this SFR. 6 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 8 Security Functional Requirements Security Target Lite Sm@rtCafé® Expert 7.0 EAL 6+, Dependencies: No dependencies. 7 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 8 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 9, shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 10 The implemented ECDH key agreement is reduced to scalar multiplication, checking for

Side-channel analysis
Leak-Inherent, physical probing, physical tampering, Malfunction, JIL
Certification process
out of scope, a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are, with ECDH is part of this SFR. 6 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 8 Security Functional Requirements Security Target Lite Sm@rtCafé® Expert 7.0 EAL 6+, Dependencies: No dependencies. 7 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 8 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 9, shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 10 The implemented ECDH key agreement is reduced to scalar multiplication, checking for

Standards
FIPS 186-4, FIPS 197, FIPS180-4, FIPS 140-2, PKCS1, PKCS5, PKCS3, AIS20, AIS 31, AIS31, AIS 20, RFC5639, RFC 5639, ISO/IEC 7816, ISO/IEC 14443, ISO/IEC 9796-2, SCP02, SCP03, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-001

File metadata

Title: Security Target Lite Sm@rtCafé® Expert 7.0 EAL 6+ C1
Subject: Common Criteria Security Target Lite in version 4.7 from 18.05.2020
Keywords: dual-interface, contact based or pure contactless smart card, Javacard operating system (OS), multi-purpose Java card, post-issuance installation of applets, open configuration, Java Card System Protection Profile (Open Configuration), government card, ID card, passport, payment card, signature card
Author: Dr. Ulrich Stutenbäumer (Giesecke+Devrient Mobile Security GmbH)
Creation date: D:20200518130755+02'00'
Modification date: D:20200518132406+02'00'
Pages: 130
Creator: Acrobat PDFMaker 19 für Word
Producer: Adobe PDF Library 19.21.90

References

Outgoing
  • BSI-DSZ-CC-0951-V4-2019 - Infineon Security Controller M5073 G11 with optional RSA2048/4096 v2.03.008 or v2.07.003, EC v2.03.008 or v2.07.003, SHA-2 v1.01 and Toolbox v2.03.008 or v2.07.003 libraries, symmetric crypto library v2.02.010, as well as with specific IC dedicated firmware, including the Flash Loader enhanced by the Mutual Authentication Extension (MAE)

Heuristics ?

Certificate ID: BSI-DSZ-CC-1092-2020

Extracted SARs

ASE_TSS.1, AGD_PRE.1, ADV_INT.3, AVA_VAN.5, ADV_FSP.5, ALC_CMC.5, ALC_LCD.1, ASE_REQ.2, ATE_FUN.2, AGD_OPE.1, ASE_ECD.1, ATE_COV.3, ADV_SPM.1, ALC_DEL.1, ATE_DPT.3, ALC_TAT.3, ASE_SPD.1, ADV_IMP.2, ALC_CMS.5, ADV_TDS.5, ASE_CCL.1, ASE_INT.2, ALC_DVS.2, ALC_FLR.1, ASE_OBJ.2, ADV_ARC.1

Scheme data ?

Cert Id BSI-DSZ-CC-1092-2020
Product Sm@rtCafé® Expert 7.0 EAL 6+ C1
Vendor Veridos GmbH - Identity Solutions by Giesecke & Devrient and Bundesdruckerei
Certification Date 29.05.2020
Category Smart Cards and similar devices
Url https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/SmartCards_Betriebssysteme_Anwendungen/1092.html
Enhanced
Product Sm@rtCafé® Expert 7.0 EAL 6+ C1
Applicant Veridos GmbH - Identity Solutions by Giesecke & Devrient and Bundesdruckerei Oranienstraße 91 10969 Berlin
Evaluation Facility TÜV Informationstechnik GmbH
Assurance Level EAL6+,ALC_FLR.1
Protection Profile Java Card Protection Profile - Open Configuration, December 2017, Version 3.0.5, BSI-CC-PP-0099-2017
Certification Date 29.05.2020
Expiration Date 28.05.2025
Report Link https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1092a_pdf.pdf?__blob=publicationFile&v=1
Target Link https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1092b_pdf.pdf?__blob=publicationFile&v=1
Cert Link https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1092c_pdf.pdf?__blob=publicationFile&v=1
Description The Target of Evaluation (TOE), the Sm@rtCafé® Expert 7.0 EAL 6+ C1 is a dual-interface, contact based or a pure contactless smart card with a Java Card operating system (OS). The composite TOE is a multi-purpose Java Card platform where applets of different kind can be installed. Since a post-issuance installation of applets is possible, the TOE corresponds to an open configuration, as defined in the PP. Depending on the installed applets, the entire product (consisting of the TOE plus applets) can be used as a government card (like an ID card or a passport), a payment card, a signature card and for other purposes. The composite TOE is based on the certified Integrated Circuit (IC) M5073 G11 (Certification ID BSI-DSZ-CC-0951-V4-2019). The composite TOE comprises the underlying hardware IC, the operating system including the G+D crypto library and according TOE guidance documents. The Biometric API is not part of the TOE and can be part of the product or not.
Subcategory Operating systems and applications

References ?

Updates ?

  • 15.02.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'ac6942be2e36f7024acbcb055671f17291076f4c37399fa86016f6aa87a333ca', 'txt_hash': 'fa45fb4406fc99148c06c47e909e94cab4fbc6ba80a9c959fc8962e737070d29'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '753b0b266ff06be0af75a92593b2d04c56ce629c5be17dcb3e442ab3ce2d1124', 'txt_hash': 'ece1b80fb4b1a40a26bee2cac92bc794144df8a4d369d04a126bbc734f3c7081'}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'ea45147852194f9922c832dda9b6f2327b55e9c762b65f65727324ca9ab84af4', 'txt_hash': 'd8035d205e2c1d6ad3e63cc743c77f0c2fb277114148131c63781c00892eb353'}}.
    • The following properties were deleted: ['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash'].

    The PDF extraction data was updated.

    • The following values were inserted: {'cert_metadata': {'pdf_file_size_bytes': 296860, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/CreationDate': "D:20200608084917+02'00'", '/Creator': 'Writer', '/Keywords': 'Common Criteria, Certification, Zertifizierung, Smart Card, Java Card', '/ModDate': "D:20200608085041+02'00'", '/Producer': 'LibreOffice 6.2', '/Subject': 'Sm@rtCafé® Expert 7.0 EAL 6+C1 ', '/Title': 'Certificate BSI-DSZ-CC-1092-2020', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}, 'cert_frontpage': None, 'cert_keywords': {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1092-2020': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0099-': 1}}, 'cc_security_level': {'EAL': {'EAL 6+': 1, 'EAL 6': 1, 'EAL 5': 1, 'EAL 2': 1, 'EAL 6 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.1': 1, 'ALC_FLR': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'GD': {'Giesecke+Devrient': 1}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}, 'cert_filename': '1092c_pdf.pdf'}.
    • The report_frontpage property was set to {'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-1092-2020', 'cert_item': 'Sm@rtCafé® Expert 7.0 EAL 6+ C1', 'developer': 'Veridos GmbH - Identity Solutions by Giesecke+Devrient and Bundesdruckerei', 'cert_lab': 'BSI', 'ref_protection_profiles': 'Java Card Protection Profile - Open Configuration, December 2017, Version 3.0.5, BSI-CC-PP-0099- 2017', 'cc_version': 'PP conformant plus product specific extensions Common Criteria Part 2 extended', 'cc_security_level': 'Common Criteria Part 3 conformant EAL 6 augmented by ALC_FLR.1'}}.
    • The st_frontpage property was set to None.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__insert__': {'BSI-DSZ-CC-1092-': 1, 'BSI-DSZ-CC-S-0127-2019': 2, 'BSI-DSZ-CC-S-0127-': 1}, '__update__': {'BSI-DSZ-CC-1092-2020': 23, 'BSI-DSZ-CC-1028-2017': 3, 'BSI-DSZ-CC-0951-V4-2019': 1}}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__insert__': {'BSI-DSZ-CC-0951-V4-': 1}, '__update__': {'BSI-DSZ-CC-0951-V4-2019': 2}}}}} data.
  • 13.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1092-2020': 46, 'BSI-DSZ-CC-1028-2017': 6, 'BSI-DSZ-CC-0951-V4-2019': 2}, '__delete__': ['BSI-DSZ-CC-1092-', 'BSI-DSZ-CC-S-0127-2019', 'BSI-DSZ-CC-S-0127-']}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0951-V4-2019': 4}, '__delete__': ['BSI-DSZ-CC-0951-V4-']}}}} data.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__insert__': {'BSI-DSZ-CC-1092-': 1, 'BSI-DSZ-CC-S-0127-2019': 2, 'BSI-DSZ-CC-S-0127-': 1}, '__update__': {'BSI-DSZ-CC-1092-2020': 23, 'BSI-DSZ-CC-1028-2017': 3, 'BSI-DSZ-CC-0951-V4-2019': 1}}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__insert__': {'BSI-DSZ-CC-0951-V4-': 1}, '__update__': {'BSI-DSZ-CC-0951-V4-2019': 2}}}}} data.
  • 04.01.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'annotated_references': None}.
  • 26.04.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'scheme_data': {'cert_id': 'BSI-DSZ-CC-1092-2020', 'product': 'Sm@rtCafé® Expert 7.0 EAL 6+ C1', 'vendor': 'Veridos GmbH - Identity Solutions by Giesecke & Devrient and Bundesdruckerei', 'certification_date': '29.05.2020', 'category': 'Smart Cards and similar devices', 'url': 'https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/SmartCards_Betriebssysteme_Anwendungen/1092.html', 'enhanced': {'product': 'Sm@rtCafé® Expert 7.0 EAL 6+ C1', 'applicant': 'Veridos GmbH - Identity Solutions by Giesecke & Devrient and Bundesdruckerei\nOranienstraße 91\n10969 Berlin', 'evaluation_facility': 'TÜV Informationstechnik GmbH', 'assurance_level': 'EAL6+,ALC_FLR.1', 'protection_profile': 'Java Card Protection Profile - Open Configuration, December 2017, Version 3.0.5, BSI-CC-PP-0099-2017', 'certification_date': '29.05.2020', 'expiration_date': '28.05.2025', 'report_link': 'https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1092a_pdf.pdf?__blob=publicationFile&v=1', 'target_link': 'https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1092b_pdf.pdf?__blob=publicationFile&v=1', 'cert_link': 'https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1092c_pdf.pdf?__blob=publicationFile&v=1', 'description': 'The Target of Evaluation (TOE), the Sm@rtCafé® Expert 7.0 EAL 6+ C1 is a dual-interface, contact based or a pure contactless smart card with a Java Card operating system (OS). The composite TOE is a multi-purpose Java Card platform where applets of different kind can be installed. Since a post-issuance installation of applets is possible, the TOE corresponds to an open configuration, as defined in the PP. Depending on the installed applets, the entire product (consisting of the TOE plus applets) can be used as a government card (like an ID card or a passport), a payment card, a signature card and for other purposes.\nThe composite TOE is based on the certified Integrated Circuit (IC) M5073 G11 (Certification ID BSI-DSZ-CC-0951-V4-2019). The composite TOE comprises the underlying hardware IC, the operating system including the G+D crypto library and according TOE guidance documents. The Biometric API is not part of the TOE and can be part of the product or not.'}, 'subcategory': 'Operating systems and applications'}}.
  • 11.02.2023 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.cc.CCCertificate.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.InternalState.
    • The following properties were deleted: ['errors'].

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.PdfData.

    The computed heuristics were updated.

    • The following values were inserted: {'direct_transitive_cves': None, 'indirect_transitive_cves': None}.
    • The _type property was set to sec_certs.sample.cc.CCCertificate.Heuristics.
    • The following properties were deleted: ['direct_dependency_cves', 'indirect_dependency_cves'].
  • 26.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to 753b0b266ff06be0af75a92593b2d04c56ce629c5be17dcb3e442ab3ce2d1124.
    • The st_txt_hash property was set to ece1b80fb4b1a40a26bee2cac92bc794144df8a4d369d04a126bbc734f3c7081.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 1543454, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 130, '/Author': 'Dr. Ulrich Stutenbäumer (Giesecke+Devrient Mobile Security GmbH)', '/Category': 'Public', '/Chip': 'M5073 G11', '/Comments': 'Final', '/Company': 'GuD', '/CreationDate': "D:20200518130755+02'00'", '/Creator': 'Acrobat PDFMaker 19 für Word', '/HWManufacturer': 'Infineon', '/Keywords': 'dual-interface, contact based or pure contactless smart card, Javacard operating system (OS), multi-purpose Java card, post-issuance installation of applets, open configuration, Java Card System Protection Profile (Open Configuration), government card, ID card, passport, payment card, signature card', '/ModDate': "D:20200518132406+02'00'", '/Producer': 'Adobe PDF Library 19.21.90', '/ProductName': 'Sm@rtCafé® Expert 7.0 EAL 6+ C1', '/SourceModified': 'D:20200518110720', '/Subject': 'Common Criteria Security Target Lite in version 4.7 from 18.05.2020', '/TOE': 'Sm@rtCafé® Expert 7.0 EAL 6+ C1', '/Title': 'Security Target Lite Sm@rtCafé® Expert 7.0 EAL 6+ C1', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0951-V4-2019': 4}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 1}}, 'cc_security_level': {'EAL': {'EAL 6+': 147, 'EAL6+': 1, 'EAL6': 4, 'EAL 4+': 1, 'EAL 6': 3, 'EAL6 augmented': 2, 'EAL 6 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_SPM.1': 3, 'ADV_FSP.4': 3, 'ADV_ARC': 6, 'ADV_ARC.1': 5, 'ADV_FSP.1': 3, 'ADV_TDS.1': 2, 'ADV_FSP.5': 9, 'ADV_TDS.4': 5, 'ADV_TDS.3': 3, 'ADV_TDS.5': 2, 'ADV_INT.3': 1, 'ADV_IMP.1': 5, 'ADV_IMP.2': 1, 'ADV_FSP.2': 2}, 'AGD': {'AGD_OPE.1': 7, 'AGD_PRE.1': 5}, 'ALC': {'ALC_FLR.1': 7, 'ALC_DVS.2': 4, 'ALC_CMC.5': 3, 'ALC_TAT.1': 2, 'ALC_TAT': 1, 'ALC_TAT.3': 2, 'ALC_CMS.1': 1, 'ALC_LCD.1': 3, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.3': 1, 'ATE_FUN.1': 5, 'ATE_FUN.2': 1, 'ATE_COV.1': 2, 'ATE_COV.2': 2, 'ATE_DPT.1': 1, 'ATE_DPT.3': 1}, 'AVA': {'AVA_VAN.5': 2}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 4, 'ASE_INT.1': 3, 'ASE_REQ.1': 2, 'ASE_INT.2': 2, 'ASE_REQ.2': 2, 'ASE_OBJ.2': 3, 'ASE_SPD.1': 3, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 21, 'FAU_ARP.1.1': 1, 'FAU_SAA.1': 3, 'FAU_SAS.1': 1}, 'FCO': {'FCO_NRO': 6, 'FCO_NRO.2': 3}, 'FCS': {'FCS_RNG': 5, 'FCS_RNG.1.1': 5, 'FCS_RNG.1': 13, 'FCS_RNG.1.2': 2, 'FCS_CKM.1': 35, 'FCS_CKM.4': 30, 'FCS_CKM.4.1': 1, 'FCS_COP.1': 117, 'FCS_CKM.2': 4, 'FCS_CKM': 10, 'FCS_COP': 12}, 'FDP': {'FDP_ACC': 28, 'FDP_ACC.2': 5, 'FDP_ACF': 27, 'FDP_ACF.1': 14, 'FDP_IFC': 27, 'FDP_IFC.1': 13, 'FDP_IFF': 19, 'FDP_IFF.1': 17, 'FDP_RIP': 138, 'FDP_RIP.1': 11, 'FDP_ROL.1': 5, 'FDP_ROL': 16, 'FDP_SDI': 16, 'FDP_SDI.2': 3, 'FDP_ITC': 12, 'FDP_ITC.2': 19, 'FDP_IFC.2': 2, 'FDP_UIT': 9, 'FDP_UIT.1': 2, 'FDP_ACC.1': 11, 'FDP_ITC.1': 7, 'FDP_SDI.1': 2, 'FDP_ITT.1': 1, 'FDP_SDC.1': 2}, 'FIA': {'FIA_ATD': 10, 'FIA_ATD.1': 2, 'FIA_UID': 16, 'FIA_UID.2': 1, 'FIA_USB': 9, 'FIA_USB.1': 3, 'FIA_UID.1': 9, 'FIA_API.1': 1}, 'FMT': {'FMT_MSA': 101, 'FMT_MSA.1': 10, 'FMT_MSA.2': 2, 'FMT_MSA.3': 17, 'FMT_SMF.1': 20, 'FMT_SMF.1.1': 1, 'FMT_SMR.1': 32, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MTD': 22, 'FMT_MTD.1': 2, 'FMT_MTD.3': 1, 'FMT_SMR': 35, 'FMT_SMF': 22, 'FMT_LIM.1': 1, 'FMT_LIM.2': 1, 'FMT_LIM': 4}, 'FPR': {'FPR_UNO.1': 10, 'FPR_UNO.1.1': 1}, 'FPT': {'FPT_PHP.3': 9, 'FPT_TST.1': 9, 'FPT_FLS.1': 21, 'FPT_FLS.1.1': 2, 'FPT_TDC.1': 8, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 2, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_FLS': 39, 'FPT_RCV': 13, 'FPT_RCV.3': 10, 'FPT_PHP.3.1': 3, 'FPT_ITT.1': 2, 'FPT_TST.2': 1}, 'FRU': {'FRU_FLT.2': 1}, 'FTP': {'FTP_ITC': 14, 'FTP_ITC.1': 8, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP.1': 2}}, 'cc_claims': {'D': {'D.APP_I_DATA': 2, 'D.SEC_DATA': 1, 'D.PIN': 1, 'D.CRYPTO': 2}, 'O': {'O.CARD-': 7, 'O.SCP': 64, 'O.SID': 33, 'O.FIREWALL': 43, 'O.GLOBAL_ARRAYS_CONFID': 19, 'O.GLOBAL_ARRAYS_INTEG': 9, 'O.NATIVE': 14, 'O.OPERATE': 36, 'O.REALLOCATION': 18, 'O.RESOURCES': 23, 'O.ALARM': 22, 'O.CIPHER': 15, 'O.RNG': 11, 'O.KEY-MNGT': 15, 'O.PIN-MNGT': 18, 'O.TRANSACTION': 19, 'O.OBJ-DELETION': 9, 'O.DELETION': 17, 'O.LOAD': 18, 'O.INSTALL': 16, 'O.CARD-MANAGEMENT': 26, 'O.PIN-': 5, 'O.APPLET': 15, 'O.CODE_PKG': 13, 'O.JAVAOBJECT': 44, 'O.GLOBAL_ARRAYS': 1, 'O.KEY-': 8, 'O.PINMNGT': 1, 'O.RND': 4, 'O.TDES': 2, 'O.AES': 1}, 'T': {'T.SECURE_DELETION': 8, 'T.CONFID-APPLI-DATA': 16, 'T.CONFID-JCS-CODE': 3, 'T.CONFID-JCS-DATA': 4, 'T.INTEG-APPLI-CODE': 4, 'T.INTEG-APPLI-DATA': 12, 'T.INTEG-JCS-CODE': 5, 'T.INTEG-JCS-DATA': 3, 'T.SID': 16, 'T.EXE-CODE': 6, 'T.NATIVE': 5, 'T.RESOURCES': 7, 'T.DELETION': 4, 'T.INSTALL': 5, 'T.OBJ-DELETION': 2, 'T.PHYSICAL': 3, 'T.CONFID-APPLI-': 1, 'T.CONFID-': 8, 'T.INTEG-APPLI-': 4, 'T.OBJDELETION': 1, 'T.INTEGJCS-DATA': 6, 'T.EXECODE': 1, 'T.INTEG-': 10, 'T.INTEGAPPLI-DATA': 1, 'T.INTEGAPPLI-CODE': 2, 'T.INTEG-JCS-': 2, 'T.INTEG-JCSCODE': 1}, 'A': {'A.DELETION': 5, 'A.APPLET': 4, 'A.VERIFICATION': 4}, 'R': {'R.JAVA': 12}, 'OP': {'OP.ARRAY_ACCESS': 4, 'OP.ARRAY_LENGTH': 4, 'OP.ARRAY_AASTORE': 3, 'OP.CREATE': 7, 'OP.DELETE_APPLET': 4, 'OP.DELETE_PCKG': 3, 'OP.DELETE_PCKG_APPLET': 3, 'OP.INSTANCE_FIELD': 3, 'OP.INVK_VIRTUAL': 6, 'OP.INVK_INTERFACE': 7, 'OP.JAVA': 6, 'OP.THROW': 5, 'OP.TYPE_ACCESS': 5, 'OP.PUTFIELD': 1, 'OP.PUTSTATIC': 1, 'OP.PUT': 5}, 'OE': {'OE.CARD-MANAGEMENT': 5, 'OE.SCP': 13, 'OE.APPLET': 9, 'OE.VERIFICATION': 38, 'OE.CODE-EVIDENCE': 14, 'OE.CODE-': 5}, 'OSP': {'OSP.VERIFICATION': 5}}, 'vendor': {'Infineon': {'Infineon': 2, 'Infineon Technologies AG': 1}, 'GD': {'Giesecke+Devrient': 8, 'G+D': 4, 'G&D': 10, 'Giesecke & Devrient': 2}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 28}}, 'DES': {'DES': {'DES': 12}, '3DES': {'3DES': 3, '3-DES': 7, 'Triple-DES': 4, 'TDES': 3, 'TDEA': 1}}, 'constructions': {'MAC': {'CBC-MAC': 10, 'CMAC': 6}}}, 'asymmetric_crypto': {'RSA': {'RSA-CRT': 12}, 'ECC': {'ECDH': {'ECDH': 9}, 'ECDSA': {'ECDSA': 8}, 'ECC': {'ECC': 8}}, 'FF': {'DH': {'Diffie-Hellman': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 4}, 'SHA2': {'SHA-224': 3, 'SHA-256': 4, 'SHA-384': 4, 'SHA-512': 3, 'SHA-2': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 10}, 'KA': {'Key Agreement': 1}}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 1}, 'RNG': {'RNG': 19, 'RND': 4}}, 'cipher_mode': {'ECB': {'ECB': 9}, 'CBC': {'CBC': 6}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 2, 'physical probing': 1}, 'FI': {'physical tampering': 5, 'Malfunction': 3}, 'other': {'JIL': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 186-4': 7, 'FIPS 197': 10, 'FIPS180-4': 3, 'FIPS 140-2': 1}, 'PKCS': {'PKCS1': 12, 'PKCS5': 3, 'PKCS3': 1}, 'BSI': {'AIS20': 4, 'AIS 31': 2, 'AIS31': 2, 'AIS 20': 1}, 'RFC': {'RFC5639': 5, 'RFC 5639': 1}, 'ISO': {'ISO/IEC 7816': 2, 'ISO/IEC 14443': 2, 'ISO/IEC 9796-2': 1}, 'SCP': {'SCP02': 4, 'SCP03': 3}, 'CC': {'CCMB-2017-04-002': 2, 'CCMB-2017-04-003': 2, 'CCMB-2017-04-001': 1}}, 'javacard_version': {'JavaCard': {'Java Card 2.2.2': 3}}, 'javacard_api_const': {'misc': {'TYPE_ACCESS': 5}}, 'javacard_packages': {'javacard': {'javacard.security': 7, 'javacard.framework': 5, 'javacard.framework.applet': 1}, 'javacardx': {'javacardx.crypto': 1}}, 'certification_process': {'OutOfScope': {'out of scope': 5, 'a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are': 1, 'with ECDH is part of this SFR. 6 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 8 Security Functional Requirements Security Target Lite Sm@rtCafé® Expert 7.0 EAL 6+': 1, 'Dependencies: No dependencies. 7 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 8 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 9': 1, 'shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 10 The implemented ECDH key agreement is reduced to scalar multiplication, checking for': 1}}}.
    • The st_filename property was set to 1092b_pdf.pdf.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0951-V4-2019']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0951-V4-2019']}} data.
    • The report_references property was updated, with the {'directly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1028-2017']}}, 'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1028-2017', 'BSI-DSZ-CC-0868-2014']}}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]} values added.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/1092b_pdf.pdf, code: nok'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The report_references property was updated, with the {'directly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1028-2017']}}, 'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1028-2017', 'BSI-DSZ-CC-0868-2014']}}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]} values discarded.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to 753b0b266ff06be0af75a92593b2d04c56ce629c5be17dcb3e442ab3ce2d1124.
    • The st_txt_hash property was set to ece1b80fb4b1a40a26bee2cac92bc794144df8a4d369d04a126bbc734f3c7081.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 1543454, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 130, '/Author': 'Dr. Ulrich Stutenbäumer (Giesecke+Devrient Mobile Security GmbH)', '/Category': 'Public', '/Chip': 'M5073 G11', '/Comments': 'Final', '/Company': 'GuD', '/CreationDate': "D:20200518130755+02'00'", '/Creator': 'Acrobat PDFMaker 19 für Word', '/HWManufacturer': 'Infineon', '/Keywords': 'dual-interface, contact based or pure contactless smart card, Javacard operating system (OS), multi-purpose Java card, post-issuance installation of applets, open configuration, Java Card System Protection Profile (Open Configuration), government card, ID card, passport, payment card, signature card', '/ModDate': "D:20200518132406+02'00'", '/Producer': 'Adobe PDF Library 19.21.90', '/ProductName': 'Sm@rtCafé® Expert 7.0 EAL 6+ C1', '/SourceModified': 'D:20200518110720', '/Subject': 'Common Criteria Security Target Lite in version 4.7 from 18.05.2020', '/TOE': 'Sm@rtCafé® Expert 7.0 EAL 6+ C1', '/Title': 'Security Target Lite Sm@rtCafé® Expert 7.0 EAL 6+ C1', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0951-V4-2019': 4}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 1}}, 'cc_security_level': {'EAL': {'EAL 6+': 147, 'EAL6+': 1, 'EAL6': 4, 'EAL 4+': 1, 'EAL 6': 3, 'EAL6 augmented': 2, 'EAL 6 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_SPM.1': 3, 'ADV_FSP.4': 3, 'ADV_ARC': 6, 'ADV_ARC.1': 5, 'ADV_FSP.1': 3, 'ADV_TDS.1': 2, 'ADV_FSP.5': 9, 'ADV_TDS.4': 5, 'ADV_TDS.3': 3, 'ADV_TDS.5': 2, 'ADV_INT.3': 1, 'ADV_IMP.1': 5, 'ADV_IMP.2': 1, 'ADV_FSP.2': 2}, 'AGD': {'AGD_OPE.1': 7, 'AGD_PRE.1': 5}, 'ALC': {'ALC_FLR.1': 7, 'ALC_DVS.2': 4, 'ALC_CMC.5': 3, 'ALC_TAT.1': 2, 'ALC_TAT': 1, 'ALC_TAT.3': 2, 'ALC_CMS.1': 1, 'ALC_LCD.1': 3, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.3': 1, 'ATE_FUN.1': 5, 'ATE_FUN.2': 1, 'ATE_COV.1': 2, 'ATE_COV.2': 2, 'ATE_DPT.1': 1, 'ATE_DPT.3': 1}, 'AVA': {'AVA_VAN.5': 2}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 4, 'ASE_INT.1': 3, 'ASE_REQ.1': 2, 'ASE_INT.2': 2, 'ASE_REQ.2': 2, 'ASE_OBJ.2': 3, 'ASE_SPD.1': 3, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 21, 'FAU_ARP.1.1': 1, 'FAU_SAA.1': 3, 'FAU_SAS.1': 1}, 'FCO': {'FCO_NRO': 6, 'FCO_NRO.2': 3}, 'FCS': {'FCS_RNG': 5, 'FCS_RNG.1.1': 5, 'FCS_RNG.1': 13, 'FCS_RNG.1.2': 2, 'FCS_CKM.1': 35, 'FCS_CKM.4': 30, 'FCS_CKM.4.1': 1, 'FCS_COP.1': 117, 'FCS_CKM.2': 4, 'FCS_CKM': 10, 'FCS_COP': 12}, 'FDP': {'FDP_ACC': 28, 'FDP_ACC.2': 5, 'FDP_ACF': 27, 'FDP_ACF.1': 14, 'FDP_IFC': 27, 'FDP_IFC.1': 13, 'FDP_IFF': 19, 'FDP_IFF.1': 17, 'FDP_RIP': 138, 'FDP_RIP.1': 11, 'FDP_ROL.1': 5, 'FDP_ROL': 16, 'FDP_SDI': 16, 'FDP_SDI.2': 3, 'FDP_ITC': 12, 'FDP_ITC.2': 19, 'FDP_IFC.2': 2, 'FDP_UIT': 9, 'FDP_UIT.1': 2, 'FDP_ACC.1': 11, 'FDP_ITC.1': 7, 'FDP_SDI.1': 2, 'FDP_ITT.1': 1, 'FDP_SDC.1': 2}, 'FIA': {'FIA_ATD': 10, 'FIA_ATD.1': 2, 'FIA_UID': 16, 'FIA_UID.2': 1, 'FIA_USB': 9, 'FIA_USB.1': 3, 'FIA_UID.1': 9, 'FIA_API.1': 1}, 'FMT': {'FMT_MSA': 101, 'FMT_MSA.1': 10, 'FMT_MSA.2': 2, 'FMT_MSA.3': 17, 'FMT_SMF.1': 20, 'FMT_SMF.1.1': 1, 'FMT_SMR.1': 32, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MTD': 22, 'FMT_MTD.1': 2, 'FMT_MTD.3': 1, 'FMT_SMR': 35, 'FMT_SMF': 22, 'FMT_LIM.1': 1, 'FMT_LIM.2': 1, 'FMT_LIM': 4}, 'FPR': {'FPR_UNO.1': 10, 'FPR_UNO.1.1': 1}, 'FPT': {'FPT_PHP.3': 9, 'FPT_TST.1': 9, 'FPT_FLS.1': 21, 'FPT_FLS.1.1': 2, 'FPT_TDC.1': 8, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 2, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_FLS': 39, 'FPT_RCV': 13, 'FPT_RCV.3': 10, 'FPT_PHP.3.1': 3, 'FPT_ITT.1': 2, 'FPT_TST.2': 1}, 'FRU': {'FRU_FLT.2': 1}, 'FTP': {'FTP_ITC': 14, 'FTP_ITC.1': 8, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP.1': 2}}, 'cc_claims': {'D': {'D.APP_I_DATA': 2, 'D.SEC_DATA': 1, 'D.PIN': 1, 'D.CRYPTO': 2}, 'O': {'O.CARD-': 7, 'O.SCP': 64, 'O.SID': 33, 'O.FIREWALL': 43, 'O.GLOBAL_ARRAYS_CONFID': 19, 'O.GLOBAL_ARRAYS_INTEG': 9, 'O.NATIVE': 14, 'O.OPERATE': 36, 'O.REALLOCATION': 18, 'O.RESOURCES': 23, 'O.ALARM': 22, 'O.CIPHER': 15, 'O.RNG': 11, 'O.KEY-MNGT': 15, 'O.PIN-MNGT': 18, 'O.TRANSACTION': 19, 'O.OBJ-DELETION': 9, 'O.DELETION': 17, 'O.LOAD': 18, 'O.INSTALL': 16, 'O.CARD-MANAGEMENT': 26, 'O.PIN-': 5, 'O.APPLET': 15, 'O.CODE_PKG': 13, 'O.JAVAOBJECT': 44, 'O.GLOBAL_ARRAYS': 1, 'O.KEY-': 8, 'O.PINMNGT': 1, 'O.RND': 4, 'O.TDES': 2, 'O.AES': 1}, 'T': {'T.SECURE_DELETION': 8, 'T.CONFID-APPLI-DATA': 16, 'T.CONFID-JCS-CODE': 3, 'T.CONFID-JCS-DATA': 4, 'T.INTEG-APPLI-CODE': 4, 'T.INTEG-APPLI-DATA': 12, 'T.INTEG-JCS-CODE': 5, 'T.INTEG-JCS-DATA': 3, 'T.SID': 16, 'T.EXE-CODE': 6, 'T.NATIVE': 5, 'T.RESOURCES': 7, 'T.DELETION': 4, 'T.INSTALL': 5, 'T.OBJ-DELETION': 2, 'T.PHYSICAL': 3, 'T.CONFID-APPLI-': 1, 'T.CONFID-': 8, 'T.INTEG-APPLI-': 4, 'T.OBJDELETION': 1, 'T.INTEGJCS-DATA': 6, 'T.EXECODE': 1, 'T.INTEG-': 10, 'T.INTEGAPPLI-DATA': 1, 'T.INTEGAPPLI-CODE': 2, 'T.INTEG-JCS-': 2, 'T.INTEG-JCSCODE': 1}, 'A': {'A.DELETION': 5, 'A.APPLET': 4, 'A.VERIFICATION': 4}, 'R': {'R.JAVA': 12}, 'OP': {'OP.ARRAY_ACCESS': 4, 'OP.ARRAY_LENGTH': 4, 'OP.ARRAY_AASTORE': 3, 'OP.CREATE': 7, 'OP.DELETE_APPLET': 4, 'OP.DELETE_PCKG': 3, 'OP.DELETE_PCKG_APPLET': 3, 'OP.INSTANCE_FIELD': 3, 'OP.INVK_VIRTUAL': 6, 'OP.INVK_INTERFACE': 7, 'OP.JAVA': 6, 'OP.THROW': 5, 'OP.TYPE_ACCESS': 5, 'OP.PUTFIELD': 1, 'OP.PUTSTATIC': 1, 'OP.PUT': 5}, 'OE': {'OE.CARD-MANAGEMENT': 5, 'OE.SCP': 13, 'OE.APPLET': 9, 'OE.VERIFICATION': 38, 'OE.CODE-EVIDENCE': 14, 'OE.CODE-': 5}, 'OSP': {'OSP.VERIFICATION': 5}}, 'vendor': {'Infineon': {'Infineon': 2, 'Infineon Technologies AG': 1}, 'GD': {'Giesecke+Devrient': 8, 'G+D': 4, 'G&D': 10, 'Giesecke & Devrient': 2}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 28}}, 'DES': {'DES': {'DES': 12}, '3DES': {'3DES': 3, '3-DES': 7, 'Triple-DES': 4, 'TDES': 3, 'TDEA': 1}}, 'constructions': {'MAC': {'CBC-MAC': 10, 'CMAC': 6}}}, 'asymmetric_crypto': {'RSA': {'RSA-CRT': 12}, 'ECC': {'ECDH': {'ECDH': 9}, 'ECDSA': {'ECDSA': 8}, 'ECC': {'ECC': 8}}, 'FF': {'DH': {'Diffie-Hellman': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 4}, 'SHA2': {'SHA-224': 3, 'SHA-256': 4, 'SHA-384': 4, 'SHA-512': 3, 'SHA-2': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 10}, 'KA': {'Key Agreement': 1}}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 1}, 'RNG': {'RNG': 19, 'RND': 4}}, 'cipher_mode': {'ECB': {'ECB': 9}, 'CBC': {'CBC': 6}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 2, 'physical probing': 1}, 'FI': {'physical tampering': 5, 'Malfunction': 3}, 'other': {'JIL': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 186-4': 7, 'FIPS 197': 10, 'FIPS180-4': 3, 'FIPS 140-2': 1}, 'PKCS': {'PKCS1': 12, 'PKCS5': 3, 'PKCS3': 1}, 'BSI': {'AIS20': 4, 'AIS 31': 2, 'AIS31': 2, 'AIS 20': 1}, 'RFC': {'RFC5639': 5, 'RFC 5639': 1}, 'ISO': {'ISO/IEC 7816': 2, 'ISO/IEC 14443': 2, 'ISO/IEC 9796-2': 1}, 'SCP': {'SCP02': 4, 'SCP03': 3}, 'CC': {'CCMB-2017-04-002': 2, 'CCMB-2017-04-003': 2, 'CCMB-2017-04-001': 1}}, 'javacard_version': {'JavaCard': {'Java Card 2.2.2': 3}}, 'javacard_api_const': {'misc': {'TYPE_ACCESS': 5}}, 'javacard_packages': {'javacard': {'javacard.security': 7, 'javacard.framework': 5, 'javacard.framework.applet': 1}, 'javacardx': {'javacardx.crypto': 1}}, 'certification_process': {'OutOfScope': {'out of scope': 5, 'a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are': 1, 'with ECDH is part of this SFR. 6 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 8 Security Functional Requirements Security Target Lite Sm@rtCafé® Expert 7.0 EAL 6+': 1, 'Dependencies: No dependencies. 7 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 8 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 9': 1, 'shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 10 The implemented ECDH key agreement is reduced to scalar multiplication, checking for': 1}}}.
    • The st_filename property was set to 1092b_pdf.pdf.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0951-V4-2019']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0951-V4-2019']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]} values added.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/1092b_pdf.pdf, code: 408'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The report_references property was updated, with the {'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0951-V2-2017', 'BSI-DSZ-CC-0951-V3-2018']}}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]} values discarded.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The cert_link was updated.

    • The new value is https://www.commoncriteriaportal.org/files/epfiles/1092c_pdf.pdf.

    The manufacturer_web was updated.

    • The new value is https://www.veridos.com.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Java Card Protection Profile - Open Configuration', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0099b_pdf.pdf', 'pp_ids': None}]}.

    The computed heuristics were updated.

    • The report_references property was updated, with the {'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0951-V2-2017', 'BSI-DSZ-CC-0951-V3-2018']}}} data.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The cert_link was updated.

    • The new value is None.

    The manufacturer_web was updated.

    • The new value is None.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'JAVA_OC', 'pp_eal': None, 'pp_link': None, 'pp_ids': None}]}.

    The computed heuristics were updated.

    • The report_references property was updated, with the {'directly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1028-2017']}}, 'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1028-2017', 'BSI-DSZ-CC-0868-2014']}}} data.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report_download_ok property was set to True.
    • The report_convert_ok property was set to True.
    • The report_extract_ok property was set to True.
    • The errors property was updated.
    • The report_pdf_hash property was set to ac6942be2e36f7024acbcb055671f17291076f4c37399fa86016f6aa87a333ca.
    • The report_txt_hash property was set to fa45fb4406fc99148c06c47e909e94cab4fbc6ba80a9c959fc8962e737070d29.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 1019539, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 37, '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/CreationDate': "D:20200608083506+02'00'", '/Creator': 'Writer', '/Keywords': '"Common Criteria, Certification, Zertifizierung, Smart Card, Java Card"', '/ModDate': "D:20200608084737+02'00'", '/Producer': 'LibreOffice 6.2', '/Subject': 'Sm@rtCafé® Expert 7.0 EAL 6+C1 ', '/Title': 'Certification Report BSI-DSZ-CC-1092-2020', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.bsi.bund.de/zertifizierung', 'https://www.bsi.bund.de/zertifizierungsreporte', 'https://www.sogis.eu/', 'https://www.bsi.bund.de/AIS', 'http://www.commoncriteriaportal.org/cc/', 'https://www.bsi.bund.de/', 'http://www.commoncriteriaportal.org/']}}.
    • The report_frontpage property was set to {'anssi': {}, 'bsi': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-1092-2020', 'cert_item': 'Sm@rtCafé® Expert 7.0 EAL 6+ C1', 'developer': 'Veridos GmbH - Identity Solutions by Giesecke+Devrient and Bundesdruckerei', 'cert_lab': 'BSI', 'ref_protection_profiles': 'Java Card Protection Profile - Open Configuration, December 2017, Version 3.0.5, BSI-CC-PP-0099- 2017', 'cc_version': 'PP conformant plus product specific extensions Common Criteria Part 2 extended', 'cc_security_level': 'Common Criteria Part 3 conformant EAL 6 augmented by ALC_FLR.1'}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1092-2020': 46, 'BSI-DSZ-CC-1028-2017': 6, 'BSI-DSZ-CC-0951-V4-2019': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0099-': 1, 'BSI-CC-PP-0099-2017': 3}}, 'cc_security_level': {'EAL': {'EAL 6+': 18, 'EAL 6': 5, 'EAL 5': 4, 'EAL 2': 2, 'EAL 1': 1, 'EAL 4': 1, 'EAL 2+': 1, 'EAL6': 1, 'EAL 5+': 1, 'EAL 6 augmented': 3, 'EAL6 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_SPM.1': 1, 'ADV_ARC': 2}, 'ALC': {'ALC_FLR.1': 5, 'ALC_FLR': 3, 'ALC_CMC.5': 1, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1, 'ALC_DVS.2': 1, 'ALC_LCD.1': 1, 'ALC_TAT.3': 1}, 'ATE': {'ATE_FUN': 1, 'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN': 1}}, 'cc_sfr': {'FCO': {'FCO_NRO.2': 2}, 'FCS': {'FCS_COP.1': 30, 'FCS_RNG.1': 2, 'FCS_CKM.1': 5, 'FCS_COP.1.1': 16}, 'FIA': {'FIA_UID': 2}, 'FPT': {'FPT_TDC.1': 1}, 'FTP': {'FTP_ITC': 2}}, 'cc_claims': {}, 'vendor': {'Infineon': {'Infineon': 2, 'Infineon Technologies AG': 1}, 'GD': {'Giesecke+Devrient': 13, 'G+D': 2, 'G&D': 1, 'Giesecke & Devrient': 4}}, 'eval_facility': {'TUV': {'TÜV Informationstechnik': 4, 'TÜViT': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 16}}, 'DES': {'DES': {'DES': 2}, '3DES': {'3-DES': 6, '3DES': 17, 'TDEA': 1}}, 'constructions': {'MAC': {'CBC-MAC': 5, 'CMAC': 9}}}, 'asymmetric_crypto': {'RSA': {'RSA 2048': 2, 'RSA-CRT': 5}, 'ECC': {'ECDH': {'ECDH': 4}, 'ECDSA': {'ECDSA': 1}, 'ECC': {'ECC': 4}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 5}, 'SHA2': {'SHA-2': 2}}}, 'crypto_scheme': {'MAC': {'MAC': 6}, 'KA': {'Key Agreement': 2}}, 'crypto_protocol': {'PGP': {'PGP': 3}}, 'randomness': {'RNG': {'RNG': 2}}, 'cipher_mode': {'ECB': {'ECB': 4}, 'CBC': {'CBC': 15}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'malfunction': 1}, 'other': {'JIL': 4}}, 'technical_report_id': {'BSI': {'BSI TR-02102': 1, 'BSI 7148': 1, 'BSI 24': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS180-4': 14, 'FIPS 197': 9, 'FIPS186-4': 4, 'FIPS46-3': 1, 'FIPS PUB 180-4': 1, 'FIPS PUB 186-4': 1, 'FIPS197': 1}, 'NIST': {'SP 800-108': 3}, 'PKCS': {'PKCS5': 6, 'PKCS #1': 24}, 'BSI': {'AIS 34': 2, 'AIS 25': 3, 'AIS 26': 2, 'AIS 36': 6, 'AIS 46': 2, 'AIS 37': 2, 'AIS 20': 2, 'AIS 31': 2, 'AIS 35': 2, 'AIS 1': 1, 'AIS 32': 1, 'AIS 47': 1, 'AIS20': 1, 'AIS31': 1}, 'RFC': {'RFC 5639': 4, 'RFC5639': 1}, 'ISO': {'ISO/IEC 15408': 4, 'ISO/IEC 18045': 4, 'ISO/IEC 17065': 2, 'ISO/IEC9796-2': 1, 'ISO/IEC 11770-3': 1, 'ISO/IEC 18031:2011': 1}, 'SCP': {'SCP03': 2, 'SCP02': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, '04.2020, Security Target Sm@rtCafé® Expert 7.0 EAL 6+ C1, Giesecke+Devrient Mobile Security GmbH (confidential document) 7 specifically • AIS 1, Version 13, Durchführung der Ortsbesichtigung in der Entwicklungsumgebung': 1, 'Sm@rtCafé® Expert 7.0 EAL 6+ C1, Version 6, 25.05.2020, TÜV Informationstechnik GmbH (confidential document) [8] Java Card Protection Profile - Open Configuration, December 2017, Version 3.0.5': 1, '36 for Sm@rtCafé® Expert 7.0 EAL 6+ C1, Version 6, 25.05.2020, BSI-DSZ-CC-1092- 2020, TÜViT GmbH (confidential document) [11] Configuration list for the TOE, Version 1.5, 18.05.2020, Giesecke+Devrient Mobile Security': 1, 'confidential document) [12] Preparative Procedures Sm@rtCafé® Expert Expert 7.0 EAL 6+ C1 Version 2.1 , 15.04.2020': 1, '“Evaluation Technical Report for Composite Evaluation (ETR Comp)”, TÜV Informationstechnik GmbH (confidential document) [16] GlobalPlatform Card Specification Version 2.2.1, January 2011 [17] GlobalPlatform Card Common': 1}}}.
    • The report_filename property was set to 1092a_pdf.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to ['BSI'].
    • The cert_id property was set to BSI-DSZ-CC-1092-2020.
    • The st_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0951-V4-2019']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0951-V4-2019']}} data.
    • The report_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0951-V4-2019']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0951-V2-2017', 'BSI-DSZ-CC-0951-2015', 'BSI-DSZ-CC-0782-2012', 'BSI-DSZ-CC-0891-2015', 'BSI-DSZ-CC-0951-V3-2018', 'BSI-DSZ-CC-0951-V4-2019']}} data.
  • 22.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The report_download_ok property was set to False.
    • The st_convert_ok property was set to True.
    • The report_convert_ok property was set to False.
    • The st_extract_ok property was set to True.
    • The report_extract_ok property was set to False.
    • The errors property was updated, with the [[0, 'failed to download report from https://www.commoncriteriaportal.org/files/epfiles/1092a_pdf.pdf, code: nok'], [2, 'failed to download report from https://www.commoncriteriaportal.org/files/epfiles/1092a_pdf.pdf, code: nok']] values inserted.
    • The st_pdf_hash property was set to 753b0b266ff06be0af75a92593b2d04c56ce629c5be17dcb3e442ab3ce2d1124.
    • The report_pdf_hash property was set to None.
    • The st_txt_hash property was set to ece1b80fb4b1a40a26bee2cac92bc794144df8a4d369d04a126bbc734f3c7081.
    • The report_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to {'pdf_file_size_bytes': 1543454, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 130, '/Author': 'Dr. Ulrich Stutenbäumer (Giesecke+Devrient Mobile Security GmbH)', '/Category': 'Public', '/Chip': 'M5073 G11', '/Comments': 'Final', '/Company': 'GuD', '/CreationDate': "D:20200518130755+02'00'", '/Creator': 'Acrobat PDFMaker 19 für Word', '/HWManufacturer': 'Infineon', '/Keywords': 'dual-interface, contact based or pure contactless smart card, Javacard operating system (OS), multi-purpose Java card, post-issuance installation of applets, open configuration, Java Card System Protection Profile (Open Configuration), government card, ID card, passport, payment card, signature card', '/ModDate': "D:20200518132406+02'00'", '/Producer': 'Adobe PDF Library 19.21.90', '/ProductName': 'Sm@rtCafé® Expert 7.0 EAL 6+ C1', '/SourceModified': 'D:20200518110720', '/Subject': 'Common Criteria Security Target Lite in version 4.7 from 18.05.2020', '/TOE': 'Sm@rtCafé® Expert 7.0 EAL 6+ C1', '/Title': 'Security Target Lite Sm@rtCafé® Expert 7.0 EAL 6+ C1', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to None.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The report_keywords property was set to None.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0951-V4-2019': 4}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 1}}, 'cc_security_level': {'EAL': {'EAL 6+': 147, 'EAL6+': 1, 'EAL6': 4, 'EAL 4+': 1, 'EAL 6': 3, 'EAL6 augmented': 2, 'EAL 6 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_SPM.1': 3, 'ADV_FSP.4': 3, 'ADV_ARC': 6, 'ADV_ARC.1': 5, 'ADV_FSP.1': 3, 'ADV_TDS.1': 2, 'ADV_FSP.5': 9, 'ADV_TDS.4': 5, 'ADV_TDS.3': 3, 'ADV_TDS.5': 2, 'ADV_INT.3': 1, 'ADV_IMP.1': 5, 'ADV_IMP.2': 1, 'ADV_FSP.2': 2}, 'AGD': {'AGD_OPE.1': 7, 'AGD_PRE.1': 5}, 'ALC': {'ALC_FLR.1': 7, 'ALC_DVS.2': 4, 'ALC_CMC.5': 3, 'ALC_TAT.1': 2, 'ALC_TAT': 1, 'ALC_TAT.3': 2, 'ALC_CMS.1': 1, 'ALC_LCD.1': 3, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.3': 1, 'ATE_FUN.1': 5, 'ATE_FUN.2': 1, 'ATE_COV.1': 2, 'ATE_COV.2': 2, 'ATE_DPT.1': 1, 'ATE_DPT.3': 1}, 'AVA': {'AVA_VAN.5': 2}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 4, 'ASE_INT.1': 3, 'ASE_REQ.1': 2, 'ASE_INT.2': 2, 'ASE_REQ.2': 2, 'ASE_OBJ.2': 3, 'ASE_SPD.1': 3, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 21, 'FAU_ARP.1.1': 1, 'FAU_SAA.1': 3, 'FAU_SAS.1': 1}, 'FCO': {'FCO_NRO': 6, 'FCO_NRO.2': 3}, 'FCS': {'FCS_RNG': 5, 'FCS_RNG.1.1': 5, 'FCS_RNG.1': 13, 'FCS_RNG.1.2': 2, 'FCS_CKM.1': 35, 'FCS_CKM.4': 30, 'FCS_CKM.4.1': 1, 'FCS_COP.1': 117, 'FCS_CKM.2': 4, 'FCS_CKM': 10, 'FCS_COP': 12}, 'FDP': {'FDP_ACC': 28, 'FDP_ACC.2': 5, 'FDP_ACF': 27, 'FDP_ACF.1': 14, 'FDP_IFC': 27, 'FDP_IFC.1': 13, 'FDP_IFF': 19, 'FDP_IFF.1': 17, 'FDP_RIP': 138, 'FDP_RIP.1': 11, 'FDP_ROL.1': 5, 'FDP_ROL': 16, 'FDP_SDI': 16, 'FDP_SDI.2': 3, 'FDP_ITC': 12, 'FDP_ITC.2': 19, 'FDP_IFC.2': 2, 'FDP_UIT': 9, 'FDP_UIT.1': 2, 'FDP_ACC.1': 11, 'FDP_ITC.1': 7, 'FDP_SDI.1': 2, 'FDP_ITT.1': 1, 'FDP_SDC.1': 2}, 'FIA': {'FIA_ATD': 10, 'FIA_ATD.1': 2, 'FIA_UID': 16, 'FIA_UID.2': 1, 'FIA_USB': 9, 'FIA_USB.1': 3, 'FIA_UID.1': 9, 'FIA_API.1': 1}, 'FMT': {'FMT_MSA': 101, 'FMT_MSA.1': 10, 'FMT_MSA.2': 2, 'FMT_MSA.3': 17, 'FMT_SMF.1': 20, 'FMT_SMF.1.1': 1, 'FMT_SMR.1': 32, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MTD': 22, 'FMT_MTD.1': 2, 'FMT_MTD.3': 1, 'FMT_SMR': 35, 'FMT_SMF': 22, 'FMT_LIM.1': 1, 'FMT_LIM.2': 1, 'FMT_LIM': 4}, 'FPR': {'FPR_UNO.1': 10, 'FPR_UNO.1.1': 1}, 'FPT': {'FPT_PHP.3': 9, 'FPT_TST.1': 9, 'FPT_FLS.1': 21, 'FPT_FLS.1.1': 2, 'FPT_TDC.1': 8, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 2, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_FLS': 39, 'FPT_RCV': 13, 'FPT_RCV.3': 10, 'FPT_PHP.3.1': 3, 'FPT_ITT.1': 2, 'FPT_TST.2': 1}, 'FRU': {'FRU_FLT.2': 1}, 'FTP': {'FTP_ITC': 14, 'FTP_ITC.1': 8, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP.1': 2}}, 'cc_claims': {'D': {'D.APP_I_DATA': 2, 'D.SEC_DATA': 1, 'D.PIN': 1, 'D.CRYPTO': 2}, 'O': {'O.CARD-': 7, 'O.SCP': 64, 'O.SID': 33, 'O.FIREWALL': 43, 'O.GLOBAL_ARRAYS_CONFID': 19, 'O.GLOBAL_ARRAYS_INTEG': 9, 'O.NATIVE': 14, 'O.OPERATE': 36, 'O.REALLOCATION': 18, 'O.RESOURCES': 23, 'O.ALARM': 22, 'O.CIPHER': 15, 'O.RNG': 11, 'O.KEY-MNGT': 15, 'O.PIN-MNGT': 18, 'O.TRANSACTION': 19, 'O.OBJ-DELETION': 9, 'O.DELETION': 17, 'O.LOAD': 18, 'O.INSTALL': 16, 'O.CARD-MANAGEMENT': 26, 'O.PIN-': 5, 'O.APPLET': 15, 'O.CODE_PKG': 13, 'O.JAVAOBJECT': 44, 'O.GLOBAL_ARRAYS': 1, 'O.KEY-': 8, 'O.PINMNGT': 1, 'O.RND': 4, 'O.TDES': 2, 'O.AES': 1}, 'T': {'T.SECURE_DELETION': 8, 'T.CONFID-APPLI-DATA': 16, 'T.CONFID-JCS-CODE': 3, 'T.CONFID-JCS-DATA': 4, 'T.INTEG-APPLI-CODE': 4, 'T.INTEG-APPLI-DATA': 12, 'T.INTEG-JCS-CODE': 5, 'T.INTEG-JCS-DATA': 3, 'T.SID': 16, 'T.EXE-CODE': 6, 'T.NATIVE': 5, 'T.RESOURCES': 7, 'T.DELETION': 4, 'T.INSTALL': 5, 'T.OBJ-DELETION': 2, 'T.PHYSICAL': 3, 'T.CONFID-APPLI-': 1, 'T.CONFID-': 8, 'T.INTEG-APPLI-': 4, 'T.OBJDELETION': 1, 'T.INTEGJCS-DATA': 6, 'T.EXECODE': 1, 'T.INTEG-': 10, 'T.INTEGAPPLI-DATA': 1, 'T.INTEGAPPLI-CODE': 2, 'T.INTEG-JCS-': 2, 'T.INTEG-JCSCODE': 1}, 'A': {'A.DELETION': 5, 'A.APPLET': 4, 'A.VERIFICATION': 4}, 'R': {'R.JAVA': 12}, 'OP': {'OP.ARRAY_ACCESS': 4, 'OP.ARRAY_LENGTH': 4, 'OP.ARRAY_AASTORE': 3, 'OP.CREATE': 7, 'OP.DELETE_APPLET': 4, 'OP.DELETE_PCKG': 3, 'OP.DELETE_PCKG_APPLET': 3, 'OP.INSTANCE_FIELD': 3, 'OP.INVK_VIRTUAL': 6, 'OP.INVK_INTERFACE': 7, 'OP.JAVA': 6, 'OP.THROW': 5, 'OP.TYPE_ACCESS': 5, 'OP.PUTFIELD': 1, 'OP.PUTSTATIC': 1, 'OP.PUT': 5}, 'OE': {'OE.CARD-MANAGEMENT': 5, 'OE.SCP': 13, 'OE.APPLET': 9, 'OE.VERIFICATION': 38, 'OE.CODE-EVIDENCE': 14, 'OE.CODE-': 5}, 'OSP': {'OSP.VERIFICATION': 5}}, 'vendor': {'Infineon': {'Infineon': 2, 'Infineon Technologies AG': 1}, 'GD': {'Giesecke+Devrient': 8, 'G+D': 4, 'G&D': 10, 'Giesecke & Devrient': 2}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 28}}, 'DES': {'DES': {'DES': 12}, '3DES': {'3DES': 3, '3-DES': 7, 'Triple-DES': 4, 'TDES': 3, 'TDEA': 1}}, 'constructions': {'MAC': {'CBC-MAC': 10, 'CMAC': 6}}}, 'asymmetric_crypto': {'RSA': {'RSA-CRT': 12}, 'ECC': {'ECDH': {'ECDH': 9}, 'ECDSA': {'ECDSA': 8}, 'ECC': {'ECC': 8}}, 'FF': {'DH': {'Diffie-Hellman': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 4}, 'SHA2': {'SHA-224': 3, 'SHA-256': 4, 'SHA-384': 4, 'SHA-512': 3, 'SHA-2': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 10}, 'KA': {'Key Agreement': 1}}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 1}, 'RNG': {'RNG': 19, 'RND': 4}}, 'cipher_mode': {'ECB': {'ECB': 9}, 'CBC': {'CBC': 6}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 2, 'physical probing': 1}, 'FI': {'physical tampering': 5, 'Malfunction': 3}, 'other': {'JIL': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 186-4': 7, 'FIPS 197': 10, 'FIPS180-4': 3, 'FIPS 140-2': 1}, 'PKCS': {'PKCS1': 12, 'PKCS5': 3, 'PKCS3': 1}, 'BSI': {'AIS20': 4, 'AIS 31': 2, 'AIS31': 2, 'AIS 20': 1}, 'RFC': {'RFC5639': 5, 'RFC 5639': 1}, 'ISO': {'ISO/IEC 7816': 2, 'ISO/IEC 14443': 2, 'ISO/IEC 9796-2': 1}, 'SCP': {'SCP02': 4, 'SCP03': 3}, 'CC': {'CCMB-2017-04-002': 2, 'CCMB-2017-04-003': 2, 'CCMB-2017-04-001': 1}}, 'javacard_version': {'JavaCard': {'Java Card 2.2.2': 3}}, 'javacard_api_const': {'misc': {'TYPE_ACCESS': 5}}, 'javacard_packages': {'javacard': {'javacard.security': 7, 'javacard.framework': 5, 'javacard.framework.applet': 1}, 'javacardx': {'javacardx.crypto': 1}}, 'certification_process': {'OutOfScope': {'out of scope': 5, 'a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are': 1, 'with ECDH is part of this SFR. 6 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 8 Security Functional Requirements Security Target Lite Sm@rtCafé® Expert 7.0 EAL 6+': 1, 'Dependencies: No dependencies. 7 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 8 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 9': 1, 'shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 10 The implemented ECDH key agreement is reduced to scalar multiplication, checking for': 1}}}.
    • The report_filename property was set to None.
    • The st_filename property was set to 1092b_pdf.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to None.
    • The report_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]} values added.
  • 21.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/1092b_pdf.pdf, code: nok'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The report_references property was updated, with the {'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0891-2015']}}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]} values discarded.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Java Card Protection Profile - Open Configuration', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0099b_pdf.pdf', 'pp_ids': None}]}.

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.
  • 04.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Java Card Protection Profile - Open Configuration', 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/pp0099b_pdf.pdf', 'pp_link': None, 'pp_ids': None}]}.
  • 26.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'crypto_protocol': {'PGP': {'PGP': 3}}} data.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': '1092a_pdf.pdf', 'st_filename': '1092b_pdf.pdf'}.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1092-2020': 46, 'BSI-DSZ-CC-1028-2017': 6}}}}, 'cc_security_level': {'__update__': {'EAL': {'__insert__': {'EAL 4': 1}}}}, 'cc_sar': {'__update__': {'ALC': {'__update__': {'ALC_FLR.1': 5}}}}, 'cc_sfr': {'__insert__': {'FCO': {'FCO_NRO.2': 2}, 'FIA': {'FIA_UID': 2}, 'FTP': {'FTP_ITC': 2}}, '__update__': {'FCS': {'__insert__': {'FCS_COP.1': 30, 'FCS_RNG.1': 2, 'FCS_CKM.1': 5}}}}, 'symmetric_crypto': {'__update__': {'AES_competition': {'__update__': {'AES': {'__update__': {'AES': 16}}}}, 'DES': {'__update__': {'DES': {'__update__': {'DES': 2}, '__delete__': ['DEA']}, '3DES': {'__update__': {'3DES': 17}}}}, 'constructions': {'__update__': {'MAC': {'__update__': {'CMAC': 9}}}}}}, 'asymmetric_crypto': {'__update__': {'ECC': {'__update__': {'ECDH': {'__update__': {'ECDH': 4}}, 'ECC': {'__update__': {'ECC': 4}}}}}, '__delete__': ['FF']}, 'crypto_scheme': {'__update__': {'MAC': {'__update__': {'MAC': 6}}}}, 'randomness': {'__update__': {'RNG': {'__delete__': ['RBG']}}, '__delete__': ['PRNG']}, 'side_channel_analysis': {'__update__': {'FI': {'__delete__': ['DFA']}}, '__delete__': ['SCA']}, 'technical_report_id': {'__update__': {'BSI': {'__insert__': {'BSI TR-02102': 1}}}}, 'tee_name': {}, 'standard_id': {'__update__': {'ISO': {'__update__': {'ISO/IEC 15408': 4, 'ISO/IEC 18045': 4}}}}, 'certification_process': {'__update__': {'ConfidentialDocument': {'being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, '04.2020, Security Target Sm@rtCafé® Expert 7.0 EAL 6+ C1, Giesecke+Devrient Mobile Security GmbH (confidential document) 7 specifically • AIS 1, Version 13, Durchführung der Ortsbesichtigung in der Entwicklungsumgebung': 1, 'Sm@rtCafé® Expert 7.0 EAL 6+ C1, Version 6, 25.05.2020, TÜV Informationstechnik GmbH (confidential document) [8] Java Card Protection Profile - Open Configuration, December 2017, Version 3.0.5': 1, '36 for Sm@rtCafé® Expert 7.0 EAL 6+ C1, Version 6, 25.05.2020, BSI-DSZ-CC-1092- 2020, TÜViT GmbH (confidential document) [11] Configuration list for the TOE, Version 1.5, 18.05.2020, Giesecke+Devrient Mobile Security': 1, 'confidential document) [12] Preparative Procedures Sm@rtCafé® Expert Expert 7.0 EAL 6+ C1 Version 2.1 , 15.04.2020': 1, '“Evaluation Technical Report for Composite Evaluation (ETR Comp)”, TÜV Informationstechnik GmbH (confidential document) [16] GlobalPlatform Card Specification Version 2.2.1, January 2011 [17] GlobalPlatform Card Common': 1}}}} data.
    • The st_keywords property was updated, with the {'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL 6+': 147, 'EAL6': 4}}}}, 'cc_sar': {'__update__': {'ADV': {'__update__': {'ADV_SPM.1': 3, 'ADV_ARC': 6, 'ADV_FSP.5': 9, 'ADV_IMP.2': 1, 'ADV_TDS.5': 2}}, 'ALC': {'__insert__': {'ALC_TAT': 1}, '__update__': {'ALC_FLR.1': 7, 'ALC_DVS.2': 4, 'ALC_CMS.5': 1}}, 'ATE': {'__update__': {'ATE_FUN.2': 1, 'ATE_DPT.3': 1}, '__delete__': ['ATE_IND.2']}, 'ASE': {'__update__': {'ASE_ECD.1': 4, 'ASE_REQ.2': 2}}}}, 'cc_sfr': {'__insert__': {'FCO': {'FCO_NRO': 6, 'FCO_NRO.2': 3}}, '__update__': {'FAU': {'__update__': {'FAU_ARP.1': 21}}, 'FCS': {'__insert__': {'FCS_CKM': 10, 'FCS_COP': 12}, '__update__': {'FCS_RNG': 5, 'FCS_CKM.1': 35, 'FCS_COP.1': 117}}, 'FDP': {'__insert__': {'FDP_ACC': 28, 'FDP_ACC.2': 5, 'FDP_ACF': 27, 'FDP_IFC': 27, 'FDP_IFF': 19, 'FDP_RIP': 138, 'FDP_ROL': 16, 'FDP_SDI': 16, 'FDP_ITC': 12, 'FDP_IFC.2': 2, 'FDP_UIT': 9, 'FDP_UIT.1': 2}, '__update__': {'FDP_ROL.1': 5, 'FDP_RIP.1': 11, 'FDP_ACF.1': 14, 'FDP_IFF.1': 17, 'FDP_IFC.1': 13, 'FDP_ITC.2': 19, 'FDP_SDI.2': 3}}, 'FIA': {'__insert__': {'FIA_ATD': 10, 'FIA_UID': 16, 'FIA_UID.2': 1, 'FIA_USB': 9, 'FIA_USB.1': 3}, '__update__': {'FIA_UID.1': 9, 'FIA_ATD.1': 2}}, 'FMT': {'__insert__': {'FMT_MSA': 101, 'FMT_MSA.2': 2, 'FMT_MTD': 22, 'FMT_MTD.3': 1, 'FMT_SMR': 35, 'FMT_SMF': 22, 'FMT_LIM': 4}, '__update__': {'FMT_SMF.1': 20, 'FMT_SMR.1': 32, 'FMT_MSA.3': 17, 'FMT_MSA.1': 10, 'FMT_MTD.1': 2}}, 'FPT': {'__insert__': {'FPT_FLS': 39, 'FPT_RCV': 13}, '__update__': {'FPT_TST.1': 9, 'FPT_FLS.1': 21, 'FPT_RCV.3': 10}}, 'FTP': {'__insert__': {'FTP_ITC': 14}, '__update__': {'FTP_ITC.1': 8}}}}, 'cc_claims': {'__insert__': {'R': {'R.JAVA': 12}}, '__update__': {'O': {'__insert__': {'O.SCP': 64}, '__update__': {'O.FIREWALL': 43, 'O.GLOBAL_ARRAYS_INTEG': 9, 'O.OPERATE': 36, 'O.RESOURCES': 23, 'O.CIPHER': 15, 'O.KEY-MNGT': 15, 'O.TRANSACTION': 19, 'O.DELETION': 17, 'O.JAVAOBJECT': 44, 'O.AES': 1}, '__delete__': ['O', 'O.SCP.IC', 'O.SCP.RECOVERY', 'O.SCP.SUPPORT']}, 'T': {'__insert__': {'T.SID': 16, 'T.EXE-CODE': 6, 'T.EXECODE': 1, 'T.INTEGAPPLI-DATA': 1}, '__update__': {'T.SECURE_DELETION': 8, 'T.INTEG-APPLI-CODE': 4, 'T.INTEG-APPLI-DATA': 12}, '__delete__': ['T', 'T.INTEG-APPLI-CODE.LOAD', 'T.INTEG-APPLI-DATA.LOAD', 'T.INTEGAPPLI-DATA.LOAD']}, 'A': {'__update__': {'A.DELETION': 5}, '__delete__': ['A.LOAD']}, 'OP': {'__update__': {'OP.PUT': 5}}, 'OE': {'__insert__': {'OE.SCP': 13}, '__delete__': ['OE', 'OE.SCP.IC', 'OE.SCP.RECOVERY', 'OE.SCP.SUPPORT']}}}, 'symmetric_crypto': {'__update__': {'AES_competition': {'__update__': {'AES': {'__update__': {'AES': 28}}}, '__delete__': ['E2']}, 'DES': {'__update__': {'DES': {'__update__': {'DES': 12}, '__delete__': ['DEA']}, '3DES': {'__update__': {'3DES': 3, 'TDES': 3}}}}, 'constructions': {'__update__': {'MAC': {'__update__': {'CMAC': 6}}}}}}, 'asymmetric_crypto': {'__update__': {'ECC': {'__update__': {'ECDH': {'__update__': {'ECDH': 9}}, 'ECDSA': {'__update__': {'ECDSA': 8}}, 'ECC': {'__update__': {'ECC': 8}}}}, 'FF': {'__update__': {'DH': {'__delete__': ['DH']}}, '__delete__': ['DSA']}}}, 'hash_function': {'__update__': {'SHA': {'__update__': {'SHA2': {'__update__': {'SHA-512': 3}}}}}}, 'crypto_scheme': {'__update__': {'MAC': {'__update__': {'MAC': 10}}, 'KA': {'__delete__': ['KA']}}}, 'randomness': {'__update__': {'TRNG': {'__update__': {'TRNG': 1}}, 'RNG': {'__update__': {'RNG': 19}}}}, 'cipher_mode': {'__update__': {'ECB': {'__update__': {'ECB': 9}}}}, 'side_channel_analysis': {'__update__': {'FI': {'__update__': {'physical tampering': 5}}}}, 'standard_id': {'__update__': {'CC': {'__insert__': {'CCMB-2017-04-001': 1}, '__update__': {'CCMB-2017-04-002': 2, 'CCMB-2017-04-003': 2}}}}, 'javacard_api_const': {'__update__': {'misc': {'__update__': {'TYPE_ACCESS': 5}}}}, 'javacard_packages': {'__update__': {'javacard': {'__insert__': {'javacard.framework': 5}, '__update__': {'javacard.security': 7}}}}, 'certification_process': {'__update__': {'OutOfScope': {'__insert__': {'with ECDH is part of this SFR. 6 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 8 Security Functional Requirements Security Target Lite Sm@rtCafé® Expert 7.0 EAL 6+': 1, 'Dependencies: No dependencies. 7 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 8 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 9': 1, 'shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 10 The implemented ECDH key agreement is reduced to scalar multiplication, checking for': 1}, '__delete__': ['. That point is out of scope of this Security Target, though', '. 6 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE', '. Dependencies: No dependencies. 7 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE', '. 9 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE', 'greement with ECDH is part of this SFR. 6 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 8 Security Functional Requirements Security Target Lite Sm@rtCafé® Expert 7.0 EAL 6+', 'ponents. Dependencies: No dependencies. 7 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 8 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 9', 'The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 10 The implemented ECDH key agreement is reduced to scalar multiplication, checking for']}}}} data.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}]} values discarded.
  • 02.09.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to 753b0b266ff06be0af75a92593b2d04c56ce629c5be17dcb3e442ab3ce2d1124.
    • The st_txt_hash property was set to ece1b80fb4b1a40a26bee2cac92bc794144df8a4d369d04a126bbc734f3c7081.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 1543454, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 130, '/Author': 'Dr. Ulrich Stutenbäumer (Giesecke+Devrient Mobile Security GmbH)', '/Category': 'Public', '/Chip': 'M5073 G11', '/Comments': 'Final', '/Company': 'GuD', '/CreationDate': "D:20200518130755+02'00'", '/Creator': 'Acrobat PDFMaker 19 für Word', '/HWManufacturer': 'Infineon', '/Keywords': 'dual-interface, contact based or pure contactless smart card, Javacard operating system (OS), multi-purpose Java card, post-issuance installation of applets, open configuration, Java Card System Protection Profile (Open Configuration), government card, ID card, passport, payment card, signature card', '/ModDate': "D:20200518132406+02'00'", '/Producer': 'Adobe PDF Library 19.21.90', '/ProductName': 'Sm@rtCafé® Expert 7.0 EAL 6+ C1', '/SourceModified': 'D:20200518110720', '/Subject': 'Common Criteria Security Target Lite in version 4.7 from 18.05.2020', '/TOE': 'Sm@rtCafé® Expert 7.0 EAL 6+ C1', '/Title': 'Security Target Lite Sm@rtCafé® Expert 7.0 EAL 6+ C1', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0951-V4-2019': 4}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 1}}, 'cc_security_level': {'EAL': {'EAL 6+': 146, 'EAL6': 5, 'EAL6+': 1, 'EAL 4+': 1, 'EAL 6': 3, 'EAL6 augmented': 2, 'EAL 6 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_SPM.1': 2, 'ADV_FSP.4': 3, 'ADV_ARC': 1, 'ADV_ARC.1': 5, 'ADV_FSP.1': 3, 'ADV_TDS.1': 2, 'ADV_FSP.5': 10, 'ADV_TDS.4': 5, 'ADV_IMP.2': 2, 'ADV_TDS.3': 3, 'ADV_TDS.5': 3, 'ADV_INT.3': 1, 'ADV_IMP.1': 5, 'ADV_FSP.2': 2}, 'AGD': {'AGD_OPE.1': 7, 'AGD_PRE.1': 5}, 'ALC': {'ALC_FLR.1': 4, 'ALC_CMC.5': 3, 'ALC_TAT.1': 2, 'ALC_TAT.3': 2, 'ALC_CMS.1': 1, 'ALC_DVS.2': 3, 'ALC_LCD.1': 3, 'ALC_CMS.5': 2, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.3': 1, 'ATE_FUN.1': 5, 'ATE_FUN.2': 2, 'ATE_DPT.3': 2, 'ATE_COV.1': 2, 'ATE_COV.2': 2, 'ATE_IND.2': 1, 'ATE_DPT.1': 1}, 'AVA': {'AVA_VAN.5': 2}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 5, 'ASE_INT.1': 3, 'ASE_REQ.1': 2, 'ASE_INT.2': 2, 'ASE_REQ.2': 3, 'ASE_OBJ.2': 3, 'ASE_SPD.1': 3, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 19, 'FAU_ARP.1.1': 1, 'FAU_SAA.1': 3, 'FAU_SAS.1': 1}, 'FCS': {'FCS_RNG': 4, 'FCS_RNG.1.1': 5, 'FCS_RNG.1': 13, 'FCS_RNG.1.2': 2, 'FCS_CKM.1': 10, 'FCS_CKM.4': 30, 'FCS_CKM.4.1': 1, 'FCS_COP.1': 9, 'FCS_CKM.2': 4}, 'FDP': {'FDP_ROL.1': 2, 'FDP_RIP.1': 1, 'FDP_ACF.1': 3, 'FDP_ACC.1': 11, 'FDP_IFF.1': 2, 'FDP_IFC.1': 11, 'FDP_ITC.1': 7, 'FDP_ITC.2': 7, 'FDP_SDI.1': 2, 'FDP_SDI.2': 1, 'FDP_ITT.1': 1, 'FDP_SDC.1': 2}, 'FIA': {'FIA_UID.1': 7, 'FIA_ATD.1': 1, 'FIA_API.1': 1}, 'FMT': {'FMT_SMF.1': 19, 'FMT_SMF.1.1': 1, 'FMT_SMR.1': 26, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MSA.3': 5, 'FMT_MSA.1': 6, 'FMT_MTD.1': 1, 'FMT_LIM.1': 1, 'FMT_LIM.2': 1}, 'FPR': {'FPR_UNO.1': 10, 'FPR_UNO.1.1': 1}, 'FPT': {'FPT_PHP.3': 9, 'FPT_TST.1': 8, 'FPT_FLS.1': 18, 'FPT_FLS.1.1': 2, 'FPT_TDC.1': 8, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 2, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_PHP.3.1': 3, 'FPT_RCV.3': 3, 'FPT_ITT.1': 2, 'FPT_TST.2': 1}, 'FRU': {'FRU_FLT.2': 1}, 'FTP': {'FTP_ITC.1.1': 1, 'FTP_ITC.1.3': 1, 'FTP_ITC.1': 2, 'FTP_TRP.1': 2}}, 'cc_claims': {'D': {'D.APP_I_DATA': 2, 'D.SEC_DATA': 1, 'D.PIN': 1, 'D.CRYPTO': 2}, 'O': {'O': 1, 'O.CARD-': 7, 'O.SCP.IC': 14, 'O.SCP.RECOVERY': 25, 'O.SCP.SUPPORT': 26, 'O.SID': 33, 'O.FIREWALL': 44, 'O.GLOBAL_ARRAYS_CONFID': 19, 'O.GLOBAL_ARRAYS_INTEG': 10, 'O.NATIVE': 14, 'O.OPERATE': 37, 'O.REALLOCATION': 18, 'O.RESOURCES': 24, 'O.ALARM': 22, 'O.CIPHER': 16, 'O.RNG': 11, 'O.KEY-MNGT': 16, 'O.PIN-MNGT': 18, 'O.TRANSACTION': 20, 'O.OBJ-DELETION': 9, 'O.DELETION': 18, 'O.LOAD': 18, 'O.INSTALL': 16, 'O.CARD-MANAGEMENT': 26, 'O.PIN-': 5, 'O.APPLET': 15, 'O.CODE_PKG': 13, 'O.JAVAOBJECT': 42, 'O.GLOBAL_ARRAYS': 1, 'O.KEY-': 8, 'O.PINMNGT': 1, 'O.RND': 4, 'O.TDES': 2, 'O.AES': 2}, 'T': {'T.SECURE_DELETION': 10, 'T': 2, 'T.CONFID-APPLI-DATA': 16, 'T.CONFID-JCS-CODE': 3, 'T.CONFID-JCS-DATA': 4, 'T.INTEG-APPLI-CODE': 3, 'T.INTEG-APPLI-CODE.LOAD': 2, 'T.INTEG-APPLI-DATA': 9, 'T.INTEG-APPLI-DATA.LOAD': 3, 'T.INTEG-JCS-CODE': 5, 'T.INTEG-JCS-DATA': 3, 'T.NATIVE': 5, 'T.RESOURCES': 7, 'T.DELETION': 4, 'T.INSTALL': 5, 'T.OBJ-DELETION': 2, 'T.PHYSICAL': 3, 'T.CONFID-APPLI-': 1, 'T.CONFID-': 8, 'T.INTEG-APPLI-': 4, 'T.OBJDELETION': 1, 'T.INTEGJCS-DATA': 6, 'T.INTEG-': 10, 'T.INTEGAPPLI-DATA.LOAD': 1, 'T.INTEGAPPLI-CODE': 2, 'T.INTEG-JCS-': 2, 'T.INTEG-JCSCODE': 1}, 'A': {'A.DELETION': 7, 'A.LOAD': 5, 'A.APPLET': 4, 'A.VERIFICATION': 4}, 'OP': {'OP.ARRAY_ACCESS': 4, 'OP.ARRAY_LENGTH': 4, 'OP.ARRAY_AASTORE': 3, 'OP.CREATE': 7, 'OP.DELETE_APPLET': 4, 'OP.DELETE_PCKG': 3, 'OP.DELETE_PCKG_APPLET': 3, 'OP.INSTANCE_FIELD': 3, 'OP.INVK_VIRTUAL': 6, 'OP.INVK_INTERFACE': 7, 'OP.JAVA': 6, 'OP.THROW': 5, 'OP.TYPE_ACCESS': 5, 'OP.PUT': 6, 'OP.PUTFIELD': 1, 'OP.PUTSTATIC': 1}, 'OE': {'OE': 2, 'OE.CARD-MANAGEMENT': 5, 'OE.SCP.IC': 4, 'OE.SCP.RECOVERY': 4, 'OE.SCP.SUPPORT': 4, 'OE.APPLET': 9, 'OE.VERIFICATION': 38, 'OE.CODE-EVIDENCE': 14, 'OE.CODE-': 5}, 'OSP': {'OSP.VERIFICATION': 5}}, 'vendor': {'Infineon': {'Infineon': 2, 'Infineon Technologies AG': 1}, 'GD': {'Giesecke+Devrient': 8, 'G+D': 4, 'G&D': 10, 'Giesecke & Devrient': 2}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 64}, 'E2': {'E2': 1}}, 'DES': {'DES': {'DES': 58, 'DEA': 1}, '3DES': {'3DES': 20, '3-DES': 7, 'Triple-DES': 4, 'TDES': 8, 'TDEA': 1}}, 'constructions': {'MAC': {'CBC-MAC': 10, 'CMAC': 14}}}, 'asymmetric_crypto': {'RSA': {'RSA-CRT': 12}, 'ECC': {'ECDH': {'ECDH': 16}, 'ECDSA': {'ECDSA': 7}, 'ECC': {'ECC': 15}}, 'FF': {'DH': {'Diffie-Hellman': 2, 'DH': 16}, 'DSA': {'DSA': 7}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 4}, 'SHA2': {'SHA-224': 3, 'SHA-256': 4, 'SHA-384': 4, 'SHA-512': 2, 'SHA-2': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 28}, 'KA': {'KA': 22, 'Key Agreement': 1}}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 4}, 'RNG': {'RNG': 26, 'RND': 4}}, 'cipher_mode': {'ECB': {'ECB': 13}, 'CBC': {'CBC': 6}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 2, 'physical probing': 1}, 'FI': {'physical tampering': 4, 'Malfunction': 3}, 'other': {'JIL': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 186-4': 7, 'FIPS 197': 10, 'FIPS180-4': 3, 'FIPS 140-2': 1}, 'PKCS': {'PKCS1': 12, 'PKCS5': 3, 'PKCS3': 1}, 'BSI': {'AIS20': 4, 'AIS 31': 2, 'AIS31': 2, 'AIS 20': 1}, 'RFC': {'RFC5639': 5, 'RFC 5639': 1}, 'ISO': {'ISO/IEC 7816': 2, 'ISO/IEC 14443': 2, 'ISO/IEC 9796-2': 1}, 'SCP': {'SCP02': 4, 'SCP03': 3}, 'CC': {'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1}}, 'javacard_version': {'JavaCard': {'Java Card 2.2.2': 3}}, 'javacard_api_const': {'misc': {'TYPE_ACCESS': 4}}, 'javacard_packages': {'javacard': {'javacard.security': 2, 'javacard.framework.applet': 1}, 'javacardx': {'javacardx.crypto': 1}}, 'certification_process': {'OutOfScope': {'out of scope': 5, '. That point is out of scope of this Security Target, though': 1, '. 6 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE': 1, '. Dependencies: No dependencies. 7 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE': 1, '. 9 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE': 1, 'a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are': 1, 'greement with ECDH is part of this SFR. 6 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 8 Security Functional Requirements Security Target Lite Sm@rtCafé® Expert 7.0 EAL 6+': 1, 'ponents. Dependencies: No dependencies. 7 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 8 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 9': 1, 'The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 10 The implemented ECDH key agreement is reduced to scalar multiplication, checking for': 1}}}.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0951-V4-2019']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0951-V4-2019']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]} values added.
  • 01.09.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/1092a_pdf.pdf, code: nok'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]} values discarded.
  • 28.07.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_extract_ok property was set to True.
    • The errors property was set to [].

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 1543454, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 130, '/Author': 'Dr. Ulrich Stutenbäumer (Giesecke+Devrient Mobile Security GmbH)', '/Category': 'Public', '/Chip': 'M5073 G11', '/Comments': 'Final', '/Company': 'GuD', '/CreationDate': "D:20200518130755+02'00'", '/Creator': 'Acrobat PDFMaker 19 für Word', '/HWManufacturer': 'Infineon', '/Keywords': 'dual-interface, contact based or pure contactless smart card, Javacard operating system (OS), multi-purpose Java card, post-issuance installation of applets, open configuration, Java Card System Protection Profile (Open Configuration), government card, ID card, passport, payment card, signature card', '/ModDate': "D:20200518132406+02'00'", '/Producer': 'Adobe PDF Library 19.21.90', '/ProductName': 'Sm@rtCafé® Expert 7.0 EAL 6+ C1', '/SourceModified': 'D:20200518110720', '/Subject': 'Common Criteria Security Target Lite in version 4.7 from 18.05.2020', '/TOE': 'Sm@rtCafé® Expert 7.0 EAL 6+ C1', '/Title': 'Security Target Lite Sm@rtCafé® Expert 7.0 EAL 6+ C1', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Java Card Protection Profile - Open Configuration', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0099b_pdf.pdf', 'pp_ids': None}]}.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]}.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_extract_ok property was set to False.
    • The errors property was set to ['Failed to read metadata of certs/targets/pdf/f6a89befd13a643f.pdf, error: can only concatenate list (not "IndirectObject") to list', 'Failed to read metadata of certs/targets/pdf/f6a89befd13a643f.pdf, error: can only concatenate list (not "IndirectObject") to list'].

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.bsi.bund.de/zertifizierung', 'https://www.bsi.bund.de/zertifizierungsreporte', 'https://www.sogis.eu/', 'https://www.bsi.bund.de/AIS', 'http://www.commoncriteriaportal.org/cc/', 'https://www.bsi.bund.de/', 'http://www.commoncriteriaportal.org/']}} values inserted.
    • The st_metadata property was set to None.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1092-2020': 82, 'BSI-DSZ-CC-1028-2017': 4, 'BSI-DSZ-CC-0951-V4-2019': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0099-': 1, 'BSI-CC-PP-0099-2017': 3}}, 'cc_security_level': {'EAL': {'EAL 6+': 18, 'EAL 6': 5, 'EAL 5': 4, 'EAL 2': 2, 'EAL 1': 1, 'EAL 2+': 1, 'EAL6': 1, 'EAL 5+': 1, 'EAL 6 augmented': 3, 'EAL6 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_SPM.1': 1, 'ADV_ARC': 2}, 'ALC': {'ALC_FLR.1': 3, 'ALC_FLR': 3, 'ALC_CMC.5': 1, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1, 'ALC_DVS.2': 1, 'ALC_LCD.1': 1, 'ALC_TAT.3': 1}, 'ATE': {'ATE_FUN': 1, 'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN': 1}}, 'cc_sfr': {'FCS': {'FCS_COP.1.1': 16}, 'FPT': {'FPT_TDC.1': 1}}, 'cc_claims': {}, 'vendor': {'Infineon': {'Infineon': 2, 'Infineon Technologies AG': 1}, 'GD': {'Giesecke+Devrient': 13, 'G+D': 2, 'G&D': 1, 'Giesecke & Devrient': 4}}, 'eval_facility': {'TUV': {'TÜV Informationstechnik': 4, 'TÜViT': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 24}}, 'DES': {'DES': {'DES': 33, 'DEA': 1}, '3DES': {'3-DES': 6, '3DES': 22, 'TDEA': 1}}, 'constructions': {'MAC': {'CBC-MAC': 5, 'CMAC': 14}}}, 'asymmetric_crypto': {'RSA': {'RSA 2048': 2, 'RSA-CRT': 5}, 'ECC': {'ECDH': {'ECDH': 5}, 'ECDSA': {'ECDSA': 1}, 'ECC': {'ECC': 5}}, 'FF': {'DH': {'DH': 5}, 'DSA': {'DSA': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 5}, 'SHA2': {'SHA-2': 2}}}, 'crypto_scheme': {'MAC': {'MAC': 24}, 'KA': {'Key Agreement': 2}}, 'crypto_protocol': {}, 'randomness': {'PRNG': {'DRBG': 1}, 'RNG': {'RNG': 2, 'RBG': 1}}, 'cipher_mode': {'ECB': {'ECB': 4}, 'CBC': {'CBC': 15}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'SPA': 2}, 'FI': {'malfunction': 1, 'DFA': 2}, 'other': {'JIL': 4}}, 'technical_report_id': {'BSI': {'BSI 7148': 1, 'BSI 24': 1}}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 2}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS180-4': 14, 'FIPS 197': 9, 'FIPS186-4': 4, 'FIPS46-3': 1, 'FIPS PUB 180-4': 1, 'FIPS PUB 186-4': 1, 'FIPS197': 1}, 'NIST': {'SP 800-108': 3}, 'PKCS': {'PKCS5': 6, 'PKCS #1': 24}, 'BSI': {'AIS 34': 2, 'AIS 25': 3, 'AIS 26': 2, 'AIS 36': 6, 'AIS 46': 2, 'AIS 37': 2, 'AIS 20': 2, 'AIS 31': 2, 'AIS 35': 2, 'AIS 1': 1, 'AIS 32': 1, 'AIS 47': 1, 'AIS20': 1, 'AIS31': 1}, 'RFC': {'RFC 5639': 4, 'RFC5639': 1}, 'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 17065': 2, 'ISO/IEC 18045': 2, 'ISO/IEC9796-2': 1, 'ISO/IEC 11770-3': 1, 'ISO/IEC 18031:2011': 1}, 'SCP': {'SCP03': 2, 'SCP02': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'identiality being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, '5.04.2020, Security Target Sm@rtCafé® Expert 7.0 EAL 6+ C1, Giesecke+Devrient Mobile Security GmbH (confidential document) 7 specifically • AIS 1, Version 13, Durchführung der Ortsbesichtigung in der Entwicklungsumgebung': 1, '-CC-1092-2020 Sm@rtCafé® Expert 7.0 EAL 6+ C1, Version 6, 25.05.2020, TÜV Informationstechnik GmbH (confidential document) [8] Java Card Protection Profile - Open Configuration, December 2017, Version 3.0.5': 1, 'S 36 for Sm@rtCafé® Expert 7.0 EAL 6+ C1, Version 6, 25.05.2020, BSI-DSZ-CC-1092- 2020, TÜViT GmbH (confidential document) [11] Configuration list for the TOE, Version 1.5, 18.05.2020, Giesecke+Devrient Mobile Security': 1, 'GmbH (confidential document) [12] Preparative Procedures Sm@rtCafé® Expert Expert 7.0 EAL 6+ C1 Version 2.1 , 15.04.2020': 1, '0, “Evaluation Technical Report for Composite Evaluation (ETR Comp)”, TÜV Informationstechnik GmbH (confidential document) [16] GlobalPlatform Card Specification Version 2.2.1, January 2011 [17] GlobalPlatform Card Common': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0951-V4-2019': 4}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 1}}, 'cc_security_level': {'EAL': {'EAL 6+': 146, 'EAL6': 5, 'EAL6+': 1, 'EAL 4+': 1, 'EAL 6': 3, 'EAL6 augmented': 2, 'EAL 6 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_SPM.1': 2, 'ADV_FSP.4': 3, 'ADV_ARC': 1, 'ADV_ARC.1': 5, 'ADV_FSP.1': 3, 'ADV_TDS.1': 2, 'ADV_FSP.5': 10, 'ADV_TDS.4': 5, 'ADV_IMP.2': 2, 'ADV_TDS.3': 3, 'ADV_TDS.5': 3, 'ADV_INT.3': 1, 'ADV_IMP.1': 5, 'ADV_FSP.2': 2}, 'AGD': {'AGD_OPE.1': 7, 'AGD_PRE.1': 5}, 'ALC': {'ALC_FLR.1': 4, 'ALC_CMC.5': 3, 'ALC_TAT.1': 2, 'ALC_TAT.3': 2, 'ALC_CMS.1': 1, 'ALC_DVS.2': 3, 'ALC_LCD.1': 3, 'ALC_CMS.5': 2, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.3': 1, 'ATE_FUN.1': 5, 'ATE_FUN.2': 2, 'ATE_DPT.3': 2, 'ATE_COV.1': 2, 'ATE_COV.2': 2, 'ATE_IND.2': 1, 'ATE_DPT.1': 1}, 'AVA': {'AVA_VAN.5': 2}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 5, 'ASE_INT.1': 3, 'ASE_REQ.1': 2, 'ASE_INT.2': 2, 'ASE_REQ.2': 3, 'ASE_OBJ.2': 3, 'ASE_SPD.1': 3, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 19, 'FAU_ARP.1.1': 1, 'FAU_SAA.1': 3, 'FAU_SAS.1': 1}, 'FCS': {'FCS_RNG': 4, 'FCS_RNG.1.1': 5, 'FCS_RNG.1': 13, 'FCS_RNG.1.2': 2, 'FCS_CKM.1': 10, 'FCS_CKM.4': 30, 'FCS_CKM.4.1': 1, 'FCS_COP.1': 9, 'FCS_CKM.2': 4}, 'FDP': {'FDP_ROL.1': 2, 'FDP_RIP.1': 1, 'FDP_ACF.1': 3, 'FDP_ACC.1': 11, 'FDP_IFF.1': 2, 'FDP_IFC.1': 11, 'FDP_ITC.1': 7, 'FDP_ITC.2': 7, 'FDP_SDI.1': 2, 'FDP_SDI.2': 1, 'FDP_ITT.1': 1, 'FDP_SDC.1': 2}, 'FIA': {'FIA_UID.1': 7, 'FIA_ATD.1': 1, 'FIA_API.1': 1}, 'FMT': {'FMT_SMF.1': 19, 'FMT_SMF.1.1': 1, 'FMT_SMR.1': 26, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MSA.3': 5, 'FMT_MSA.1': 6, 'FMT_MTD.1': 1, 'FMT_LIM.1': 1, 'FMT_LIM.2': 1}, 'FPR': {'FPR_UNO.1': 10, 'FPR_UNO.1.1': 1}, 'FPT': {'FPT_PHP.3': 9, 'FPT_TST.1': 8, 'FPT_FLS.1': 18, 'FPT_FLS.1.1': 2, 'FPT_TDC.1': 8, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 2, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_PHP.3.1': 3, 'FPT_RCV.3': 3, 'FPT_ITT.1': 2, 'FPT_TST.2': 1}, 'FRU': {'FRU_FLT.2': 1}, 'FTP': {'FTP_ITC.1.1': 1, 'FTP_ITC.1.3': 1, 'FTP_ITC.1': 2, 'FTP_TRP.1': 2}}, 'cc_claims': {'D': {'D.APP_I_DATA': 2, 'D.SEC_DATA': 1, 'D.PIN': 1, 'D.CRYPTO': 2}, 'O': {'O': 1, 'O.CARD-': 7, 'O.SCP.IC': 14, 'O.SCP.RECOVERY': 25, 'O.SCP.SUPPORT': 26, 'O.SID': 33, 'O.FIREWALL': 44, 'O.GLOBAL_ARRAYS_CONFID': 19, 'O.GLOBAL_ARRAYS_INTEG': 10, 'O.NATIVE': 14, 'O.OPERATE': 37, 'O.REALLOCATION': 18, 'O.RESOURCES': 24, 'O.ALARM': 22, 'O.CIPHER': 16, 'O.RNG': 11, 'O.KEY-MNGT': 16, 'O.PIN-MNGT': 18, 'O.TRANSACTION': 20, 'O.OBJ-DELETION': 9, 'O.DELETION': 18, 'O.LOAD': 18, 'O.INSTALL': 16, 'O.CARD-MANAGEMENT': 26, 'O.PIN-': 5, 'O.APPLET': 15, 'O.CODE_PKG': 13, 'O.JAVAOBJECT': 42, 'O.GLOBAL_ARRAYS': 1, 'O.KEY-': 8, 'O.PINMNGT': 1, 'O.RND': 4, 'O.TDES': 2, 'O.AES': 2}, 'T': {'T.SECURE_DELETION': 10, 'T': 2, 'T.CONFID-APPLI-DATA': 16, 'T.CONFID-JCS-CODE': 3, 'T.CONFID-JCS-DATA': 4, 'T.INTEG-APPLI-CODE': 3, 'T.INTEG-APPLI-CODE.LOAD': 2, 'T.INTEG-APPLI-DATA': 9, 'T.INTEG-APPLI-DATA.LOAD': 3, 'T.INTEG-JCS-CODE': 5, 'T.INTEG-JCS-DATA': 3, 'T.NATIVE': 5, 'T.RESOURCES': 7, 'T.DELETION': 4, 'T.INSTALL': 5, 'T.OBJ-DELETION': 2, 'T.PHYSICAL': 3, 'T.CONFID-APPLI-': 1, 'T.CONFID-': 8, 'T.INTEG-APPLI-': 4, 'T.OBJDELETION': 1, 'T.INTEGJCS-DATA': 6, 'T.INTEG-': 10, 'T.INTEGAPPLI-DATA.LOAD': 1, 'T.INTEGAPPLI-CODE': 2, 'T.INTEG-JCS-': 2, 'T.INTEG-JCSCODE': 1}, 'A': {'A.DELETION': 7, 'A.LOAD': 5, 'A.APPLET': 4, 'A.VERIFICATION': 4}, 'OP': {'OP.ARRAY_ACCESS': 4, 'OP.ARRAY_LENGTH': 4, 'OP.ARRAY_AASTORE': 3, 'OP.CREATE': 7, 'OP.DELETE_APPLET': 4, 'OP.DELETE_PCKG': 3, 'OP.DELETE_PCKG_APPLET': 3, 'OP.INSTANCE_FIELD': 3, 'OP.INVK_VIRTUAL': 6, 'OP.INVK_INTERFACE': 7, 'OP.JAVA': 6, 'OP.THROW': 5, 'OP.TYPE_ACCESS': 5, 'OP.PUT': 6, 'OP.PUTFIELD': 1, 'OP.PUTSTATIC': 1}, 'OE': {'OE': 2, 'OE.CARD-MANAGEMENT': 5, 'OE.SCP.IC': 4, 'OE.SCP.RECOVERY': 4, 'OE.SCP.SUPPORT': 4, 'OE.APPLET': 9, 'OE.VERIFICATION': 38, 'OE.CODE-EVIDENCE': 14, 'OE.CODE-': 5}, 'OSP': {'OSP.VERIFICATION': 5}}, 'vendor': {'Infineon': {'Infineon': 2, 'Infineon Technologies AG': 1}, 'GD': {'Giesecke+Devrient': 8, 'G+D': 4, 'G&D': 10, 'Giesecke & Devrient': 2}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 64}, 'E2': {'E2': 1}}, 'DES': {'DES': {'DES': 58, 'DEA': 1}, '3DES': {'3DES': 20, '3-DES': 7, 'Triple-DES': 4, 'TDES': 8, 'TDEA': 1}}, 'constructions': {'MAC': {'CBC-MAC': 10, 'CMAC': 14}}}, 'asymmetric_crypto': {'RSA': {'RSA-CRT': 12}, 'ECC': {'ECDH': {'ECDH': 16}, 'ECDSA': {'ECDSA': 7}, 'ECC': {'ECC': 15}}, 'FF': {'DH': {'Diffie-Hellman': 2, 'DH': 16}, 'DSA': {'DSA': 7}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 4}, 'SHA2': {'SHA-224': 3, 'SHA-256': 4, 'SHA-384': 4, 'SHA-512': 2, 'SHA-2': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 28}, 'KA': {'KA': 22, 'Key Agreement': 1}}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 4}, 'RNG': {'RNG': 26, 'RND': 4}}, 'cipher_mode': {'ECB': {'ECB': 13}, 'CBC': {'CBC': 6}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 2, 'physical probing': 1}, 'FI': {'physical tampering': 4, 'Malfunction': 3}, 'other': {'JIL': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 186-4': 7, 'FIPS 197': 10, 'FIPS180-4': 3, 'FIPS 140-2': 1}, 'PKCS': {'PKCS1': 12, 'PKCS5': 3, 'PKCS3': 1}, 'BSI': {'AIS20': 4, 'AIS 31': 2, 'AIS31': 2, 'AIS 20': 1}, 'RFC': {'RFC5639': 5, 'RFC 5639': 1}, 'ISO': {'ISO/IEC 7816': 2, 'ISO/IEC 14443': 2, 'ISO/IEC 9796-2': 1}, 'SCP': {'SCP02': 4, 'SCP03': 3}, 'CC': {'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1}}, 'javacard_version': {'JavaCard': {'Java Card 2.2.2': 3}}, 'javacard_api_const': {'misc': {'TYPE_ACCESS': 4}}, 'javacard_packages': {'javacard': {'javacard.security': 2, 'javacard.framework.applet': 1}, 'javacardx': {'javacardx.crypto': 1}}, 'certification_process': {'OutOfScope': {'out of scope': 5, '. That point is out of scope of this Security Target, though': 1, '. 6 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE': 1, '. Dependencies: No dependencies. 7 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE': 1, '. 9 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE': 1, 'a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are': 1, 'greement with ECDH is part of this SFR. 6 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 8 Security Functional Requirements Security Target Lite Sm@rtCafé® Expert 7.0 EAL 6+': 1, 'ponents. Dependencies: No dependencies. 7 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 8 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 9': 1, 'The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 10 The implemented ECDH key agreement is reduced to scalar multiplication, checking for': 1}}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': 'ac6942be2e36f7024acbcb055671f17291076f4c37399fa86016f6aa87a333ca', 'st_pdf_hash': '753b0b266ff06be0af75a92593b2d04c56ce629c5be17dcb3e442ab3ce2d1124', 'report_txt_hash': 'fa45fb4406fc99148c06c47e909e94cab4fbc6ba80a9c959fc8962e737070d29', 'st_txt_hash': 'ece1b80fb4b1a40a26bee2cac92bc794144df8a4d369d04a126bbc734f3c7081'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {'AES': 24, 'DES': 11, '3DES': 22, 'TDEA': 1}, 'rules_asymmetric_crypto': {'RSA 2048': 2, 'ECDH': 5, 'ECDSA': 1, 'ECC': 5, 'DH': 5, 'DSA': 1}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA-1': 5}, 'rules_crypto_schemes': {'MAC': 24}, 'rules_randomness': {'DRBG': 1, 'RNG': 2, 'RBG': 1}, 'rules_tee': {'SE': 2}, 'rules_side_channels': {'malfunction': 1, 'DFA': 1}} values inserted.
    • The st_keywords property was updated, with the {'rules_symmetric_crypto': {'AES': 64, 'E2': 1, 'DES': 30, '3DES': 20, 'TDES': 8, 'TDEA': 1}, 'rules_asymmetric_crypto': {'ECDH': 16, 'ECDSA': 7, 'ECC': 15, 'Diffie-Hellman': 2, 'DH': 16, 'DSA': 7}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA-1': 4, 'SHA-224': 3, 'SHA-256': 4, 'SHA-384': 4, 'SHA-512': 2}, 'rules_crypto_schemes': {'MAC': 28}, 'rules_randomness': {'TRNG': 4, 'RNG': 26, 'RND': 4}, 'rules_tee': {}, 'rules_side_channels': {'Malfunction': 3, 'Leak-Inherent': 2, 'physical probing': 1, 'physical tampering': 4}} values inserted.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}]}}.
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0951-V4-2019']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0951-V4-2019']}}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1028-2017', 'BSI-DSZ-CC-0951-V4-2019']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1028-2017', 'BSI-DSZ-CC-0951-V2-2017', 'BSI-DSZ-CC-0782-2012', 'BSI-DSZ-CC-0891-2015', 'BSI-DSZ-CC-0951-V3-2018', 'BSI-DSZ-CC-0951-V4-2019', 'BSI-DSZ-CC-0868-2014', 'BSI-DSZ-CC-0951-2015']}}}.
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['7.0']}.
  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Sm@rtCafé® Expert 7.0 EAL 6+ C1 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/files/epfiles/1092c_pdf.pdf",
  "dgst": "f6a89befd13a643f",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "BSI-DSZ-CC-1092-2020",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "7.0"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0951-V4-2019",
          "BSI-DSZ-CC-1028-2017"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0951-2015",
          "BSI-DSZ-CC-0951-V4-2019",
          "BSI-DSZ-CC-0951-V3-2018",
          "BSI-DSZ-CC-1028-2017",
          "BSI-DSZ-CC-0891-2015",
          "BSI-DSZ-CC-0868-2014",
          "BSI-DSZ-CC-0951-V2-2017",
          "BSI-DSZ-CC-0782-2012"
        ]
      }
    },
    "scheme_data": {
      "category": "Smart Cards and similar devices",
      "cert_id": "BSI-DSZ-CC-1092-2020",
      "certification_date": "29.05.2020",
      "enhanced": {
        "applicant": "Veridos GmbH - Identity Solutions by Giesecke \u0026 Devrient and Bundesdruckerei\nOranienstra\u00dfe 91\n10969 Berlin",
        "assurance_level": "EAL6+,ALC_FLR.1",
        "cert_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1092c_pdf.pdf?__blob=publicationFile\u0026v=1",
        "certification_date": "29.05.2020",
        "description": "The Target of Evaluation (TOE), the Sm@rtCaf\u00e9\u00ae Expert 7.0 EAL 6+ C1 is a dual-interface, contact based or a pure contactless smart card with a Java Card operating system (OS). The composite TOE is a multi-purpose Java Card platform where applets of different kind can be installed. Since a post-issuance installation of applets is possible, the TOE corresponds to an open configuration, as defined in the PP. Depending on the installed applets, the entire product (consisting of the TOE plus applets) can be used as a government card (like an ID card or a passport), a payment card, a signature card and for other purposes.\nThe composite TOE is based on the certified Integrated Circuit (IC) M5073 G11 (Certification ID BSI-DSZ-CC-0951-V4-2019). The composite TOE comprises the underlying hardware IC, the operating system including the G+D crypto library and according TOE guidance documents. The Biometric API is not part of the TOE and can be part of the product or not.",
        "evaluation_facility": "T\u00dcV Informationstechnik GmbH",
        "expiration_date": "28.05.2025",
        "product": "Sm@rtCaf\u00e9\u00ae Expert 7.0 EAL 6+ C1",
        "protection_profile": "Java Card Protection Profile - Open Configuration, December 2017, Version 3.0.5, BSI-CC-PP-0099-2017",
        "report_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1092a_pdf.pdf?__blob=publicationFile\u0026v=1",
        "target_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1092b_pdf.pdf?__blob=publicationFile\u0026v=1"
      },
      "product": "Sm@rtCaf\u00e9\u00ae Expert 7.0 EAL 6+ C1",
      "subcategory": "Operating systems and applications",
      "url": "https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/SmartCards_Betriebssysteme_Anwendungen/1092.html",
      "vendor": "Veridos GmbH - Identity Solutions by Giesecke \u0026 Devrient and Bundesdruckerei"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0951-V4-2019"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0951-V4-2019"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Veridos GmbH - Identity Solutions by Giesecke \u0026 Devrient and Bundesdruckerei",
  "manufacturer_web": "https://www.veridos.com",
  "name": "Sm@rtCaf\u00e9\u00ae Expert 7.0 EAL 6+ C1",
  "not_valid_after": "2025-05-29",
  "not_valid_before": "2020-05-29",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "1092c_pdf.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1092-2020": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0099-": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_FLR": 1,
          "ALC_FLR.1": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL 5": 1,
          "EAL 6": 1,
          "EAL 6 augmented": 1,
          "EAL 6+": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 15408": 2,
          "ISO/IEC 18045": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "GD": {
          "Giesecke+Devrient": 1
        }
      },
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20200608084917+02\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "Common Criteria, Certification, Zertifizierung, Smart Card, Java Card",
      "/ModDate": "D:20200608085041+02\u002700\u0027",
      "/Producer": "LibreOffice 6.2",
      "/Subject": "Sm@rtCaf\u00e9\u00ae Expert 7.0 EAL 6+C1  ",
      "/Title": "Certificate BSI-DSZ-CC-1092-2020",
      "pdf_file_size_bytes": 296860,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "1092a_pdf.pdf",
    "report_frontpage": {
      "DE": {
        "cc_security_level": "Common Criteria Part 3 conformant EAL 6 augmented by ALC_FLR.1",
        "cc_version": "PP conformant plus product specific extensions Common Criteria Part 2 extended",
        "cert_id": "BSI-DSZ-CC-1092-2020",
        "cert_item": "Sm@rtCaf\u00e9\u00ae Expert 7.0 EAL 6+ C1",
        "cert_lab": "BSI",
        "developer": "Veridos GmbH - Identity Solutions by Giesecke+Devrient and Bundesdruckerei",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ],
        "ref_protection_profiles": "Java Card Protection Profile - Open Configuration, December 2017, Version 3.0.5, BSI-CC-PP-0099- 2017"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 4
          },
          "ECDH": {
            "ECDH": 4
          },
          "ECDSA": {
            "ECDSA": 1
          }
        },
        "RSA": {
          "RSA 2048": 2,
          "RSA-CRT": 5
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0951-V4-2019": 1,
          "BSI-DSZ-CC-1028-2017": 3,
          "BSI-DSZ-CC-1092-": 1,
          "BSI-DSZ-CC-1092-2020": 23,
          "BSI-DSZ-CC-S-0127-": 1,
          "BSI-DSZ-CC-S-0127-2019": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0099-": 1,
          "BSI-CC-PP-0099-2017": 3
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 2,
          "ADV_SPM.1": 1
        },
        "ALC": {
          "ALC_CMC.5": 1,
          "ALC_CMS.5": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.2": 1,
          "ALC_FLR": 3,
          "ALC_FLR.1": 5,
          "ALC_LCD.1": 1,
          "ALC_TAT.3": 1
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_DPT": 1,
          "ATE_FUN": 1,
          "ATE_IND": 1
        },
        "AVA": {
          "AVA_VAN": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 2": 2,
          "EAL 2+": 1,
          "EAL 4": 1,
          "EAL 5": 4,
          "EAL 5+": 1,
          "EAL 6": 5,
          "EAL 6 augmented": 3,
          "EAL 6+": 18,
          "EAL6": 1,
          "EAL6 augmented": 1
        }
      },
      "cc_sfr": {
        "FCO": {
          "FCO_NRO.2": 2
        },
        "FCS": {
          "FCS_CKM.1": 5,
          "FCS_COP.1": 30,
          "FCS_COP.1.1": 16,
          "FCS_RNG.1": 2
        },
        "FIA": {
          "FIA_UID": 2
        },
        "FPT": {
          "FPT_TDC.1": 1
        },
        "FTP": {
          "FTP_ITC": 2
        }
      },
      "certification_process": {
        "ConfidentialDocument": {
          "04.2020, Security Target Sm@rtCaf\u00e9\u00ae Expert 7.0 EAL 6+ C1, Giesecke+Devrient Mobile Security GmbH (confidential document) 7 specifically \u2022 AIS 1, Version 13, Durchf\u00fchrung der Ortsbesichtigung in der Entwicklungsumgebung": 1,
          "36 for Sm@rtCaf\u00e9\u00ae Expert 7.0 EAL 6+ C1, Version 6, 25.05.2020, BSI-DSZ-CC-1092- 2020, T\u00dcViT GmbH (confidential document) [11] Configuration list for the TOE, Version 1.5, 18.05.2020, Giesecke+Devrient Mobile Security": 1,
          "Sm@rtCaf\u00e9\u00ae Expert 7.0 EAL 6+ C1, Version 6, 25.05.2020, T\u00dcV Informationstechnik GmbH (confidential document) [8] Java Card Protection Profile - Open Configuration, December 2017, Version 3.0.5": 1,
          "being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1,
          "confidential document) [12] Preparative Procedures Sm@rtCaf\u00e9\u00ae Expert Expert 7.0 EAL 6+ C1 Version 2.1 , 15.04.2020": 1,
          "\u201cEvaluation Technical Report for Composite Evaluation (ETR Comp)\u201d, T\u00dcV Informationstechnik GmbH (confidential document) [16] GlobalPlatform Card Specification Version 2.2.1, January 2011 [17] GlobalPlatform Card Common": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 15
        },
        "ECB": {
          "ECB": 4
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PGP": {
          "PGP": 3
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 2
        },
        "MAC": {
          "MAC": 6
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "TUV": {
          "T\u00dcV Informationstechnik": 4,
          "T\u00dcViT": 1
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 5
          },
          "SHA2": {
            "SHA-2": 2
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 2
        }
      },
      "side_channel_analysis": {
        "FI": {
          "malfunction": 1
        },
        "other": {
          "JIL": 4
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 1": 1,
          "AIS 20": 2,
          "AIS 25": 3,
          "AIS 26": 2,
          "AIS 31": 2,
          "AIS 32": 1,
          "AIS 34": 2,
          "AIS 35": 2,
          "AIS 36": 6,
          "AIS 37": 2,
          "AIS 46": 2,
          "AIS 47": 1,
          "AIS20": 1,
          "AIS31": 1
        },
        "FIPS": {
          "FIPS 197": 9,
          "FIPS PUB 180-4": 1,
          "FIPS PUB 186-4": 1,
          "FIPS180-4": 14,
          "FIPS186-4": 4,
          "FIPS197": 1,
          "FIPS46-3": 1
        },
        "ISO": {
          "ISO/IEC 11770-3": 1,
          "ISO/IEC 15408": 4,
          "ISO/IEC 17065": 2,
          "ISO/IEC 18031:2011": 1,
          "ISO/IEC 18045": 4,
          "ISO/IEC9796-2": 1
        },
        "NIST": {
          "SP 800-108": 3
        },
        "PKCS": {
          "PKCS #1": 24,
          "PKCS5": 6
        },
        "RFC": {
          "RFC 5639": 4,
          "RFC5639": 1
        },
        "SCP": {
          "SCP02": 1,
          "SCP03": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 16
          }
        },
        "DES": {
          "3DES": {
            "3-DES": 6,
            "3DES": 17,
            "TDEA": 1
          },
          "DES": {
            "DES": 2
          }
        },
        "constructions": {
          "MAC": {
            "CBC-MAC": 5,
            "CMAC": 9
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI 24": 1,
          "BSI 7148": 1,
          "BSI TR-02102": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "GD": {
          "G\u0026D": 1,
          "G+D": 2,
          "Giesecke \u0026 Devrient": 4,
          "Giesecke+Devrient": 13
        },
        "Infineon": {
          "Infineon": 2,
          "Infineon Technologies AG": 1
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20200608083506+02\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung, Smart Card, Java Card\"",
      "/ModDate": "D:20200608084737+02\u002700\u0027",
      "/Producer": "LibreOffice 6.2",
      "/Subject": "Sm@rtCaf\u00e9\u00ae Expert 7.0 EAL 6+C1  ",
      "/Title": "Certification Report BSI-DSZ-CC-1092-2020",
      "pdf_file_size_bytes": 1019539,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.bsi.bund.de/zertifizierung",
          "https://www.bsi.bund.de/zertifizierungsreporte",
          "https://www.sogis.eu/",
          "http://www.commoncriteriaportal.org/cc/",
          "https://www.bsi.bund.de/AIS",
          "http://www.commoncriteriaportal.org/",
          "https://www.bsi.bund.de/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 37
    },
    "st_filename": "1092b_pdf.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 8
          },
          "ECDH": {
            "ECDH": 9
          },
          "ECDSA": {
            "ECDSA": 8
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 2
          }
        },
        "RSA": {
          "RSA-CRT": 12
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0951-V4-": 1,
          "BSI-DSZ-CC-0951-V4-2019": 2
        }
      },
      "cc_claims": {
        "A": {
          "A.APPLET": 4,
          "A.DELETION": 5,
          "A.VERIFICATION": 4
        },
        "D": {
          "D.APP_I_DATA": 2,
          "D.CRYPTO": 2,
          "D.PIN": 1,
          "D.SEC_DATA": 1
        },
        "O": {
          "O.AES": 1,
          "O.ALARM": 22,
          "O.APPLET": 15,
          "O.CARD-": 7,
          "O.CARD-MANAGEMENT": 26,
          "O.CIPHER": 15,
          "O.CODE_PKG": 13,
          "O.DELETION": 17,
          "O.FIREWALL": 43,
          "O.GLOBAL_ARRAYS": 1,
          "O.GLOBAL_ARRAYS_CONFID": 19,
          "O.GLOBAL_ARRAYS_INTEG": 9,
          "O.INSTALL": 16,
          "O.JAVAOBJECT": 44,
          "O.KEY-": 8,
          "O.KEY-MNGT": 15,
          "O.LOAD": 18,
          "O.NATIVE": 14,
          "O.OBJ-DELETION": 9,
          "O.OPERATE": 36,
          "O.PIN-": 5,
          "O.PIN-MNGT": 18,
          "O.PINMNGT": 1,
          "O.REALLOCATION": 18,
          "O.RESOURCES": 23,
          "O.RND": 4,
          "O.RNG": 11,
          "O.SCP": 64,
          "O.SID": 33,
          "O.TDES": 2,
          "O.TRANSACTION": 19
        },
        "OE": {
          "OE.APPLET": 9,
          "OE.CARD-MANAGEMENT": 5,
          "OE.CODE-": 5,
          "OE.CODE-EVIDENCE": 14,
          "OE.SCP": 13,
          "OE.VERIFICATION": 38
        },
        "OP": {
          "OP.ARRAY_AASTORE": 3,
          "OP.ARRAY_ACCESS": 4,
          "OP.ARRAY_LENGTH": 4,
          "OP.CREATE": 7,
          "OP.DELETE_APPLET": 4,
          "OP.DELETE_PCKG": 3,
          "OP.DELETE_PCKG_APPLET": 3,
          "OP.INSTANCE_FIELD": 3,
          "OP.INVK_INTERFACE": 7,
          "OP.INVK_VIRTUAL": 6,
          "OP.JAVA": 6,
          "OP.PUT": 5,
          "OP.PUTFIELD": 1,
          "OP.PUTSTATIC": 1,
          "OP.THROW": 5,
          "OP.TYPE_ACCESS": 5
        },
        "OSP": {
          "OSP.VERIFICATION": 5
        },
        "R": {
          "R.JAVA": 12
        },
        "T": {
          "T.CONFID-": 8,
          "T.CONFID-APPLI-": 1,
          "T.CONFID-APPLI-DATA": 16,
          "T.CONFID-JCS-CODE": 3,
          "T.CONFID-JCS-DATA": 4,
          "T.DELETION": 4,
          "T.EXE-CODE": 6,
          "T.EXECODE": 1,
          "T.INSTALL": 5,
          "T.INTEG-": 10,
          "T.INTEG-APPLI-": 4,
          "T.INTEG-APPLI-CODE": 4,
          "T.INTEG-APPLI-DATA": 12,
          "T.INTEG-JCS-": 2,
          "T.INTEG-JCS-CODE": 5,
          "T.INTEG-JCS-DATA": 3,
          "T.INTEG-JCSCODE": 1,
          "T.INTEGAPPLI-CODE": 2,
          "T.INTEGAPPLI-DATA": 1,
          "T.INTEGJCS-DATA": 6,
          "T.NATIVE": 5,
          "T.OBJ-DELETION": 2,
          "T.OBJDELETION": 1,
          "T.PHYSICAL": 3,
          "T.RESOURCES": 7,
          "T.SECURE_DELETION": 8,
          "T.SID": 16
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0084-2014": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 6,
          "ADV_ARC.1": 5,
          "ADV_FSP.1": 3,
          "ADV_FSP.2": 2,
          "ADV_FSP.4": 3,
          "ADV_FSP.5": 9,
          "ADV_IMP.1": 5,
          "ADV_IMP.2": 1,
          "ADV_INT.3": 1,
          "ADV_SPM.1": 3,
          "ADV_TDS.1": 2,
          "ADV_TDS.3": 3,
          "ADV_TDS.4": 5,
          "ADV_TDS.5": 2
        },
        "AGD": {
          "AGD_OPE.1": 7,
          "AGD_PRE.1": 5
        },
        "ALC": {
          "ALC_CMC.5": 3,
          "ALC_CMS.1": 1,
          "ALC_CMS.5": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.2": 4,
          "ALC_FLR.1": 7,
          "ALC_LCD.1": 3,
          "ALC_TAT": 1,
          "ALC_TAT.1": 2,
          "ALC_TAT.3": 2
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 4,
          "ASE_INT.1": 3,
          "ASE_INT.2": 2,
          "ASE_OBJ.2": 3,
          "ASE_REQ.1": 2,
          "ASE_REQ.2": 2,
          "ASE_SPD.1": 3,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.1": 2,
          "ATE_COV.2": 2,
          "ATE_COV.3": 1,
          "ATE_DPT.1": 1,
          "ATE_DPT.3": 1,
          "ATE_FUN.1": 5,
          "ATE_FUN.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4+": 1,
          "EAL 6": 3,
          "EAL 6 augmented": 2,
          "EAL 6+": 147,
          "EAL6": 4,
          "EAL6 augmented": 2,
          "EAL6+": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 21,
          "FAU_ARP.1.1": 1,
          "FAU_SAA.1": 3,
          "FAU_SAS.1": 1
        },
        "FCO": {
          "FCO_NRO": 6,
          "FCO_NRO.2": 3
        },
        "FCS": {
          "FCS_CKM": 10,
          "FCS_CKM.1": 35,
          "FCS_CKM.2": 4,
          "FCS_CKM.4": 30,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 12,
          "FCS_COP.1": 117,
          "FCS_RNG": 5,
          "FCS_RNG.1": 13,
          "FCS_RNG.1.1": 5,
          "FCS_RNG.1.2": 2
        },
        "FDP": {
          "FDP_ACC": 28,
          "FDP_ACC.1": 11,
          "FDP_ACC.2": 5,
          "FDP_ACF": 27,
          "FDP_ACF.1": 14,
          "FDP_IFC": 27,
          "FDP_IFC.1": 13,
          "FDP_IFC.2": 2,
          "FDP_IFF": 19,
          "FDP_IFF.1": 17,
          "FDP_ITC": 12,
          "FDP_ITC.1": 7,
          "FDP_ITC.2": 19,
          "FDP_ITT.1": 1,
          "FDP_RIP": 138,
          "FDP_RIP.1": 11,
          "FDP_ROL": 16,
          "FDP_ROL.1": 5,
          "FDP_SDC.1": 2,
          "FDP_SDI": 16,
          "FDP_SDI.1": 2,
          "FDP_SDI.2": 3,
          "FDP_UIT": 9,
          "FDP_UIT.1": 2
        },
        "FIA": {
          "FIA_API.1": 1,
          "FIA_ATD": 10,
          "FIA_ATD.1": 2,
          "FIA_UID": 16,
          "FIA_UID.1": 9,
          "FIA_UID.2": 1,
          "FIA_USB": 9,
          "FIA_USB.1": 3
        },
        "FMT": {
          "FMT_LIM": 4,
          "FMT_LIM.1": 1,
          "FMT_LIM.2": 1,
          "FMT_MSA": 101,
          "FMT_MSA.1": 10,
          "FMT_MSA.2": 2,
          "FMT_MSA.3": 17,
          "FMT_MTD": 22,
          "FMT_MTD.1": 2,
          "FMT_MTD.3": 1,
          "FMT_SMF": 22,
          "FMT_SMF.1": 20,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 35,
          "FMT_SMR.1": 32,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPR": {
          "FPR_UNO.1": 10,
          "FPR_UNO.1.1": 1
        },
        "FPT": {
          "FPT_FLS": 39,
          "FPT_FLS.1": 21,
          "FPT_FLS.1.1": 2,
          "FPT_ITT.1": 2,
          "FPT_PHP.3": 9,
          "FPT_PHP.3.1": 3,
          "FPT_RCV": 13,
          "FPT_RCV.3": 10,
          "FPT_TDC.1": 8,
          "FPT_TDC.1.1": 1,
          "FPT_TDC.1.2": 2,
          "FPT_TST.1": 9,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1,
          "FPT_TST.2": 1
        },
        "FRU": {
          "FRU_FLT.2": 1
        },
        "FTP": {
          "FTP_ITC": 14,
          "FTP_ITC.1": 8,
          "FTP_ITC.1.1": 1,
          "FTP_ITC.1.3": 1,
          "FTP_TRP.1": 2
        }
      },
      "certification_process": {
        "OutOfScope": {
          "Dependencies: No dependencies. 7 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 8 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 9": 1,
          "a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are": 1,
          "out of scope": 5,
          "shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 10 The implemented ECDH key agreement is reduced to scalar multiplication, checking for": 1,
          "with ECDH is part of this SFR. 6 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 8 Security Functional Requirements Security Target Lite Sm@rtCaf\u00e9\u00ae Expert 7.0 EAL 6+": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 6
        },
        "ECB": {
          "ECB": 9
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 1
        },
        "MAC": {
          "MAC": 10
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 4
          },
          "SHA2": {
            "SHA-2": 1,
            "SHA-224": 3,
            "SHA-256": 4,
            "SHA-384": 4,
            "SHA-512": 3
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {
        "misc": {
          "TYPE_ACCESS": 5
        }
      },
      "javacard_packages": {
        "javacard": {
          "javacard.framework": 5,
          "javacard.framework.applet": 1,
          "javacard.security": 7
        },
        "javacardx": {
          "javacardx.crypto": 1
        }
      },
      "javacard_version": {
        "JavaCard": {
          "Java Card 2.2.2": 3
        }
      },
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 4,
          "RNG": 19
        },
        "TRNG": {
          "TRNG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 3,
          "physical tampering": 5
        },
        "SCA": {
          "Leak-Inherent": 2,
          "physical probing": 1
        },
        "other": {
          "JIL": 2
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 20": 1,
          "AIS 31": 2,
          "AIS20": 4,
          "AIS31": 2
        },
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 2,
          "CCMB-2017-04-003": 2
        },
        "FIPS": {
          "FIPS 140-2": 1,
          "FIPS 186-4": 7,
          "FIPS 197": 10,
          "FIPS180-4": 3
        },
        "ISO": {
          "ISO/IEC 14443": 2,
          "ISO/IEC 7816": 2,
          "ISO/IEC 9796-2": 1
        },
        "PKCS": {
          "PKCS1": 12,
          "PKCS3": 1,
          "PKCS5": 3
        },
        "RFC": {
          "RFC 5639": 1,
          "RFC5639": 5
        },
        "SCP": {
          "SCP02": 4,
          "SCP03": 3
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 28
          }
        },
        "DES": {
          "3DES": {
            "3-DES": 7,
            "3DES": 3,
            "TDEA": 1,
            "TDES": 3,
            "Triple-DES": 4
          },
          "DES": {
            "DES": 12
          }
        },
        "constructions": {
          "MAC": {
            "CBC-MAC": 10,
            "CMAC": 6
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "GD": {
          "G\u0026D": 10,
          "G+D": 4,
          "Giesecke \u0026 Devrient": 2,
          "Giesecke+Devrient": 8
        },
        "Infineon": {
          "Infineon": 2,
          "Infineon Technologies AG": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Dr. Ulrich Stutenb\u00e4umer (Giesecke+Devrient Mobile Security GmbH)",
      "/Category": "Public",
      "/Chip": "M5073 G11",
      "/Comments": "Final",
      "/Company": "GuD",
      "/CreationDate": "D:20200518130755+02\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 19 f\u00fcr Word",
      "/HWManufacturer": "Infineon",
      "/Keywords": "dual-interface, contact based or pure contactless smart card, Javacard operating system (OS), multi-purpose Java card, post-issuance installation of applets, open configuration, Java Card System Protection Profile (Open Configuration),  government card, ID card, passport, payment card, signature card",
      "/ModDate": "D:20200518132406+02\u002700\u0027",
      "/Producer": "Adobe PDF Library 19.21.90",
      "/ProductName": "Sm@rtCaf\u00e9\u00ae Expert 7.0 EAL 6+ C1",
      "/SourceModified": "D:20200518110720",
      "/Subject": "Common Criteria Security Target Lite in version 4.7 from 18.05.2020",
      "/TOE": "Sm@rtCaf\u00e9\u00ae Expert 7.0 EAL 6+ C1",
      "/Title": "Security Target Lite Sm@rtCaf\u00e9\u00ae Expert 7.0 EAL 6+ C1",
      "pdf_file_size_bytes": 1543454,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 130
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": "EAL4+",
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0099b_pdf.pdf",
        "pp_name": "Java Card Protection Profile - Open Configuration"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/1092a_pdf.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL6+",
      "ALC_FLR.1"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/1092b_pdf.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "ea45147852194f9922c832dda9b6f2327b55e9c762b65f65727324ca9ab84af4",
      "txt_hash": "d8035d205e2c1d6ad3e63cc743c77f0c2fb277114148131c63781c00892eb353"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "ac6942be2e36f7024acbcb055671f17291076f4c37399fa86016f6aa87a333ca",
      "txt_hash": "fa45fb4406fc99148c06c47e909e94cab4fbc6ba80a9c959fc8962e737070d29"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "753b0b266ff06be0af75a92593b2d04c56ce629c5be17dcb3e442ab3ce2d1124",
      "txt_hash": "ece1b80fb4b1a40a26bee2cac92bc794144df8a4d369d04a126bbc734f3c7081"
    }
  },
  "status": "active"
}