Veridos ePass Applet on Sm@rtCafé Expert 8.0 C1, Version 1.0

CSV information ?

Status active
Valid from 31.10.2022
Valid until 31.10.2027
Scheme 🇳🇱 NL
Manufacturer Veridos GmbH - Identity Solutions by Giesecke & Devrient and Bundesdruckerei
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level AVA_VAN.5, EAL5+, ALC_DVS.2
Protection profiles

Heuristics summary ?

Certificate ID: NSCIB-CC-0568828-CR

Certificate ?

Extracted keywords

Protocols
PACE

Vendor
Giesecke+Devrient

Security level
EAL5, EAL4, EAL2, EAL7, EAL5 augmented, EAL4 augmented
Claims
R.L
Security Assurance Requirements (SAR)
ALC_DVS.2, ALC_FLR.3, ATE_DPT.2, AVA_VAN.5
Protection profiles
BSI-CC-PP-0055, BSI-CC-PP-0056, BSI-CC-PP- 0068
Certificates
CC-22-0568828
Evaluation facilities
SGS, SGS Brightsight, Brightsight

Standards
ISO/IEC 15408-1, ISO/IEC 15408-2, ISO/IEC 15408-3, ISO/IEC 18045

File metadata

Title: Microsoft Word - NSCIB-CC-22-0568828-cert.doc
Author: kruitr
Creation date: D:20221115162140+01'00'
Modification date: D:20221115162208+01'00'
Pages: 1
Creator: Bullzip PDF Printer (11.0.0.2588)
Producer: PDF Printer / www.bullzip.com / FPG / TUV Rheinland Service GmbH

Certification report ?

Extracted keywords

Symmetric Algorithms
AES, DES, CBC-MAC
Asymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-Hellman
Schemes
MAC
Protocols
PACE
Randomness
TRNG, RNG
Block cipher modes
ECB, CBC

Vendor
Infineon, Giesecke+Devrient

Security level
EAL4, EAL5, EAL5+, EAL4+, EAL 5, EAL54, EAL6, EAL6+, EAL5 augmented, EAL4 augmented, EAL 5 augmented, EAL6 augmented
Security Assurance Requirements (SAR)
ADV_IMP, ALC_DVS.2, ALC_FLR.1, ATE_DPT.2, ATE_DPT.2.5, AVA_VAN.5
Protection profiles
BSI-CC-PP-0055-2009, BSI-CC-PP-0056-V2-, BSI-CC-PP-0068-V2-MA-01
Certificates
BSI-DSZ-CC-1107-V3-2022, NSCIB-CC-0568828-CR, CC-22-0289060, NSCIB-CC-0289060-CR
Evaluation facilities
SGS, SGS Brightsight, Brightsight

Side-channel analysis
DFA, JIL, JIL-AAPS, JIL-AM

Standards
ICAO

File metadata

Title: Certification Report
Author: Microsoft Office User
Creation date: D:20221104113625+00'00'
Modification date: D:20221104113625+00'00'
Pages: 13
Creator: Microsoft® Word 2010
Producer: Microsoft® Word 2010

Frontpage

Certificate ID: NSCIB-CC-0568828-CR
Certified item: ePass Applet on Sm@rtCafé® Expert 8.0 C1, Version 1.0
Certification lab: SGS Brightsight B.V.
Developer: Giesecke+Devrient Mobile Security GmbH

References

Outgoing
  • NSCIB-CC-0289060-CR - Veridos/Giesecke+Devrient MS Sm@rtCafé® Expert 8.0 C1
  • BSI-DSZ-CC-1107-V3-2022 - IFX_CCI_00002Dh, IFX_CCI_000039h, IFX_CCI_00003Ah, IFX_CCI_000044h, IFX_CCI_000045h, IFX_CCI_000046h, IFX_CCI_000047h, IFX_CCI_000048h, IFX_CCI_000049h, IFX_CCI_00004Ah, IFX_CCI_00004Bh, IFX_CCI_00004Ch, IFX_CCI_00004Dh, IFX_CCI_00004Eh design step T11 with firmware 80.306.16.0 & 80.306.16.1, optional NRG SW 05.03.4097, optional HSL v3.52.9708, UMSLC lib v01.30.0564, optional SCL v2.15.000 and v2.11.003, optional ACL v3.33.003 and v3.02.000, optional RCL v1.10.007, optional HCL v1.13.002 and guidance

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES, 3DES, Triple-DES, CMAC
Asymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-Hellman, DH
Hash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
Schemes
MAC
Protocols
PACE
Randomness
RNG, RND
Elliptic Curves
P-256, P-384, P-521, secp256r1, secp384r1, secp521r1
Block cipher modes
CBC

IC data groups
EF.DG15, EF.DG1, EF.DG2, EF.DG5, EF.DG16, EF.DG3, EF.DG4, EF.DG14, EF.COM, EF.SOD
Vendor
Infineon, Infineon Technologies AG, G+D, Giesecke+Devrient, Giesecke & Devrient

Security level
EAL5, EAL4, EAL 6, EAL 5, EAL 4, EAL5+, EAL5 augmented, EAL4 augmented, EAL 6 augmented, EAL 5 augmented, EAL 4 augmented
Claims
O.SID, O.FIREWALL, O.GLOBAL_ARRAYS_CON, O.GLOBAL_ARRAYS_INTE, O.ARRAY_VIEWS_CONFID, O.ARRAY_VIEWS_INTEG, O.NATIVE, O.OPERATE, O.REALLOCATION, O.RESOURCES, O.ALARM, O.CIPHER, O.RNG, O.KEY-MNGT, O.PIN-MNGT, O.TRANSACTION, O.OBJ-DELETION, O.DELETION, O.LOAD, O.INSTALL, O.CARD-MANAGEMENT, O.SCP, T.CONFID-APPLI-DATA, T.CONFID-JCS-CODE, T.CONFID-JCS-DATA, T.INTEG-APPLI-CODE, T.INTEG-APPLI-DATA, T.INTEG-JCS-CODE, T.INTEG-JCS-DATA, T.SID, T.EXE-CODE, T.NATIVE, T.RESOURCES, T.DELETION, T.SECURE_DELETION, T.INSTALL, T.OBJ-DELETION, T.PHYSICAL, A.CAP_FILE, A.APPLET, A.VERIFICATION, OT.SCP, OE.CAP_FILE, OE.VERIFICATION, OE.CODE-EVIDENCE, OE.BAC_PP
Security Assurance Requirements (SAR)
ALC_DVS.2, ALC_FLR.1, ATE_DPT.2, AVA_VAN.5
Security Functional Requirements (SFR)
FAU_ARP.1, FAU_SAS.1, FAU_SAS, FAU_SAS.1.1, FAU_UAU.4, FCO_NRO, FCS_CKM.1, FCS_CKM.2, FCS_CKM.3, FCS_CKM.4, FCS_COP.1, FCS_COP, FCS_RNG.1, FCS_RND.1, FCS_CKM, FCS_CKM.4.1, FCS_RND.1.1, FCS_CKM.1.1, FDP_ACC, FDP_ACF, FDP_IFC, FDP_IFF, FDP_RIP.1, FDP_RIP, FDP_ROL, FDP_SDI.2, FDP_ITC, FDP_UIT, FDP_UCT, FDP_ACC.1, FDP_UCT.1, FDP_ITC.1, FDP_ITC.2, FDP_ACF.1, FDP_RIP.1.1, FDP_IFC.1, FDP_UIT.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_UCT.1.1, FDP_UIT.1.1, FDP_UIT.1.2, FIA_ATD, FIA_UID, FIA_USB, FIA_AFL, FIA_UAU, FIA_UID.1, FIA_UAU.4, FIA_UAU.6, FIA_API.1, FIA_API, FIA_AFL.1, FIA_UAU.1, FIA_UAU.5, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.4.1, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.6.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_API.1.1, FMT_MSA, FMT_SMF.1, FMT_SMR.1, FMT_MTD, FMT_SMR, FMT_SMF, FMT_LIM, FMT_LIM.1, FMT_MTD.3, FMT_MTD.1, FMT_MSA.3, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_LIM.2, FMT_LIM.2.1, FMT_LIM.1.1, FMT_MTD.3.1, FPR_UNO.1, FPT_FLS.1, FPT_FLS, FPT_PHP.3, FPT_EMS.1, FPT_TDC.1, FPT_TST.1, FPT_RCV, FPT_EMS, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_PHP.3.1, FPT_EMS.1.1, FPT_EMS.1.2, FPT_FLS.1.1, FPT_TST, FTP_ITC, FTP_ITC.1, FTP_TRP.1
Protection profiles
BSI-CC-PP-0099-V2-2020, BSI-CC-PP-0055, BSI-CC-PP-0056-V2-2012, BSI-CC-PP-0068-V2-2011-MA-01
Certificates
BSI-DSZ-CC-1107-V3-2022, CC-22-0289060, NSCIB-CC-22-0289060-CR
Certification process
Out of scope, chapter 8.1.1.1 in platform ST) FDP_ACC.2/FIREWALL IP_SFR No correspondence Out of scope (internal Java Card Firewall, internal Java Virtual Machine). No contradiction to this ST. FDP_IFF.1/JCVM IP_SFR No correspondence Out of scope (internal Java Virtual Machine, internal Java Card Firewall). No contradiction to this ST. FMT_MSA.1/JCVM IP_SFR No correspondence Out of scope (internal Java Card Firewall, internal Java Card Firew a l l ). No contradiction to this ST. FMT_SMF.1 IP_SFR No correspondence Out of scope (internal Java Card Firewall, FCS_CKM.1.1/RSA, FCS_CKM.1.1/ECC, FCS_CKM.1.1/3DES, FCS_CKM.1.1/AES) All IP_SFRs No crrespondence. Out of scope. The TOE uses the spe- cific Document Basic Access Key Derivation Algorithm, managed within Java Card OS). No contradiction to this ST. FCS_CKM.3 IP_SFR No correspondence Out of scope (managed within Java Card OS, DRG.4) that can be used directly. FDP_RIP.1/ABORT IP_SFR No correspondence. Out of scope (internal Java Card functionality, No contradiction to this ST. FDP_RIP.1/bArray IP_SFR No correspondence. Out of scope (internal Java Card functionality, No contradiction to this ST. FDP_RIP.1/TRANSIENT IP_SFR No correspondence. Out of scope (internal Java Card functionality, chapter 8.1.1.4 in platform ST) FIA_ATD.1/AID IP_SFR No correspondence. Out of scope (internal Java Card fun tionality, No contradiction to this ST. FIA_USB.1/AID IP_SFR No correspondence Out of scope (internal Java Card functionality, No contradiction to this ST. FMT_MTD.3/JCRE IP_SFR No correspondence Out of scope (internal Java Card functionality, No contradiction to this ST. FMT_SMR.1/Installer IP_SFR No correspondence Out of scope (internal Java Card func tionality, ADEL) policy on security aspects outside the runtime. FDP_ACC.2/ADEL IP_SFR No correspondence Out of scope (internal Java Card func- tionality, No contradiction to this ST. FDP_RIP.1/ADEL IP_SFR No correspondence Out of scope (internal Java Card func- tionality, No contradiction to this ST. FMT_MSA.3/ADEL IP_SFR No correspondence Out of scope (internal Java Card func- tionality, No contradiction to this ST. FMT_SMR.1/ADEL IP_SFR No correspondence Out of scope (internal Java Card func- tionality, No contradiction to this ST. FDP_IFF.1/CM IP_SFR No correspondence Out of scope (internal Java Card func- tionality, No contradiction to this ST. FIA_UID.1/CM IP_SFR No correspondence Out of scope (internal Java Card func- tionality, No contradiction to this ST. FMT_MSA.3/CM IP_SFR No correspondence Out of scope (internal Java Card func- tionality, No contradiction to this ST. FMT_SMR.1/CM IP_SFR No correspondence Out of scope (internal Java Card func- tionality, ST) Firewall Policy (chapter 8.1.1.1 in platform ST) FDP_ACC.2/FIREWALL IP_SFR No correspondence Out of scope (internal Java Card Firewall. The resulting requirements for applets are reflected in the User, of the TOE. No contradiction to this ST. FDP_ACF.1/FIREWALL IP_SFR No correspondence Out of scope (internal Java Card Firewall). The resulting requirements for applets are reflected in the User, of the TOE. No contradiction to this ST. FDP_IFC.1/JCVM IP_SFR No correspondence Out of scope (internal Java Virtual Machine). No contradiction to this ST. FDP_IFF.1/JCVM IP_SFR No, Out of scope (internal Java Virtual Machine). No contradiction to this ST. FDP_RIP.1 (FDP_RIP.1/OBJECTS FDP_RIP, FDP_RIP.1/bArray FDP_RIP.1/KEYS FDP_RIP.1/TRANSIENT No correspondence. Out of scope (internal Java Card Firewall). No contradiction to this ST. 3 Conformance Claims Security Target, FDP_RIP.1/ADEL FDP_RIP.1/ODEL FDP_RIP.1/ABORT) All IP_SFRs FMT_MSA.1/JCRE IP_SFR No correspondence Out of scope (internal Java Card Firewall). No contradiction to this ST. FMT_MSA.1/JCVM IP_SFR No correspondence, Java Card Firewall). No contradiction to this ST. FMT_MSA.2/FIREWALL- JCVM IP_SFR No correspondence Out of scope (internal Java Card Firewall). The resulting requirements for applets are reflected in the User, of the TOE. No contradic- tion to this ST. FMT_MSA.3/FIREWALL IP_SFR No correspondence Out of scope (internal Java Card Firewall). The resulting requirements for applets are reflected in the User, of the TOE. No contradic- tion to this ST. FMT_MSA.3/JCVM IP_SFR No correspondence Out of scope (internal Java Card Firew a l l ). No contradiction to this ST. FMT_SMF.1 IP_SFR No correspondence, internal Java Card Firewall). No contradiction to this ST. FMT_SMR.1 IP_SFR No correspondence Out of scope (internal Java Card Firewall). No contradiction to this ST. Application Programming Interface, FCS_CKM.1.1/RSA, FCS_CKM.1.1/ECC, FCS_CKM.1.1/3DES, FCS_CKM.1.1/AES) All IP_SFRs No crrespondence. Out of scope. The TOE uses the spe- cific Document Basic Access Key Derivation Algorithm. There are no, to this ST. FCS_CKM.2 IP_SFR No correspondence Out of scope (managed within Java Card OS). No contradiction to this ST. FCS_CKM.3 IP_SFR No correspondence Out, defined quality metric (DRG.4) that can be used directly. FDP_RIP.1/ABORT IP_SFR No correspondence. Out of scope (internal Java Card functionality). No contradiction to this ST. FDP_RIP.1/APDU IP_SFR No, Out of scope (internal Java Card functionality). No contradiction to this ST. FDP_RIP.1/bArray IP_SFR No, Out of scope (internal Java Card functionality). No contradiction to this ST. FDP_RIP.1/KEYS IP_SFR No, Out of scope (internal Java Card functionality). No contradiction to this ST. FDP_RIP.1/TRANSIENT IP_SFR No, Out of scope (internal Java Card functionality). No contradiction to this ST. FDP_ROL.1/FIREWALL IP_SFR No, Out of scope (internal Java Card Firewall). The resulting requirements for applets are reflected in the User, complement Java Card OS mechanisms. No contradiction tothis ST. FPT_TDC.1 IP_SFR No correspondence Out of scope (internal Java Card functionality). No contradiction to this ST. FPT_TST.1 RP_SFR-SERV FPT_TST.1, start-up. AID Management (chapter 8.1.1.4 in platform ST) FIA_ATD.1/AID IP_SFR No correspondence. Out of scope (internal Java Card fun tionality). No contradiction to this ST. FIA_UID.2/AID IP_SFR No, Out of scope (internal Java Card fun tionality). No contradiction to this ST. FIA_USB.1/AID IP_SFR No, Out of scope (internal Java Card functionality). No contradiction to this ST. FMT_MTD.1/JCRE IP_SFR No, Out of scope (internal Java Card fun tionality). No contradiction to this ST. FMT_MTD.3/JCRE IP_SFR No, Out of scope (internal Java Card functionality). No contradiction to this ST. INSTG Security Functional, which addresses security aspects outside the runtime. FDP_ITC.2/Installer IP_SFR No correspondence Out of scope (internal Java Card functionality). No contradiction to this ST. FMT_SMR.1/Installer IP_SFR No, Out of scope (internal Java Card func tionality). No contradiction to this ST. FPT_FLS.1/Installer IP_SFR No, Out of scope (internal Java Card func- tionality). No contradiction to this ST. 3 Conformance Claims Security, SFR Correspondence in this ST References/Remarks FPT_RCV.3/Installer IP_SFR No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. ADELG Security Functional, ADEL) policy on security aspects outside the runtime. FDP_ACC.2/ADEL IP_SFR No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_ACF.1/ADEL IP_SFR No, Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_RIP.1/ADEL IP_SFR No, Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.1/ADEL IP_SFR No, Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.3/ADEL IP_SFR No, Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_SMF.1/ADEL IP_SFR No, Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_SMR.1/ADEL IP_SFR No, Out of scope (internal Java Card func- tionality). No contradiction to this ST. FPT_FLS.1/ADEL IP_SFR No, Out of scope (internal Java Card func- tionality). No contradiction to this ST. ODELG Security Functional, owns the deleted objects by invoking a specific API method. FDP_RIP.1/ODEL IP_SFR No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FPT_FLS.1/ODEL RP_SFR-SERV, or that has been modified after bytecode verification. FCO_NRO.2/CM IP_SFR No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. 3 Conformance Claims Security, 93 Platform SFR Correspondence in this ST References/Remarks FDP_IFC.2/CM IP_SFR No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_IFF.1/CM IP_SFR No, Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_UIT.1/CM IP_SFR No, Out of scope (internal Java Card func- tionality). No contradiction to this ST. FIA_UID.1/CM IP_SFR No, Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.1/CM IP_SFR No, Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.3/CM IP_SFR No, Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_SMF.1/CM IP_SFR No, Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_SMR.1/CM IP_SFR No, Out of scope (internal Java Card func- tionality). No contradiction to this ST. FTP_ITC.1/CM IP_SFR No, Out of scope (internal Java Card func- tionality). No contradiction to this ST. CMGR Security Functional, for the TOE and are covered by SFRs in the platform ST. FTP_ITC.1/CMGR IP_SFR No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. SCPG Security Functional, 20 of 93 Platform Objective Correspondence in this ST References/Remarks O.SID No correspondence Out of scope. No contradiction tothis ST. O.FIREWALL No correspondence Out of scope. No contradiction tothis ST, G OT.Data-Integrity No contradiction to this ST. O.ARRAY_VIEWS_CONFID No correspondence Out of scope. No contradiction to this ST. O.ARRAY_VIEWS_INTEG No correspondence Out of scope. No contradiction, this ST. O.NATIVE No correspondence Out of scope. No contradiction to this ST. O.OPERATE No correspondence Out of scope. No contradiction to this ST, O.REALLOCATION No correspondence Out of scope. No contradiction to this ST. O.RESOURCES No correspondence Out of scope. No contradiction to this, O.ALARM No correspondence Out of scope. No contradiction to this ST. O.CIPHER No correspondence Indirectly relevant for the correct, no corresponding objectives for the TOE of this ST. No contradictions. O.KEY-MNGT No correspondence Out of scope. No contradiction to this ST. O.PIN-MNGT No correspondence Out of scope. No contradiction to this, O.TRANSACTION No correspondence Out of scope. No contradiction to this ST. O.OBJ-DELETION No correspondence Out of scope. No contradiction to, ST. O.DELETION No correspondence Out of scope. No contradiction to this ST. O.LOAD No correspondence Out of scope. No contradiction to this ST. O, No correspondence Out of scope. No contradiction to this ST. O.CARD-MANAGEMENT No correspondence Out of scope. No contradiction to this ST. OT.SCP.IC OT.Prot_Phys-Tamper The objectives are related. No con-, The objectives are related. No con- tradiction to this ST. O.SCP.SUPPORT No correspondence Out of scope. No contradiction to this 3 Conformance Claims Security Target Lite ePass Applet on Sm@rtCafé®, Platform Threat Correspondence in this ST References/Remarks T.CONFID-APPLI-DATA No correspondence Out of scope. No contradiction to this ST. T.CONFID-JCS-CODE No correspondence Out of scope. No contradiction to, T.Information_Leakage No contradiction to this ST. T.INTEG-APPLI-CODE No correspondence Out of scope. No contradiction to this ST. T.INTEG-APPLI-CODE.LOAD No correspondence Out of scope. No, T.INTEG-APPLI-DATA T.Forgery No contradiction to this ST. T.INTEG-APPLI-DATA.LOAD No correspondence Out of scope. No contradiction to this ST. T.INTEG-JCS-CODE No correspondence Out of scope. No contradiction to, ST. T.INTEG-JCS-DATA No correspondence Out of scope. No contradiction to this ST. T.SID.1 No correspondence Out of scope. No contradiction to this ST, SID.2 No correspondence Out of scope. No contradiction to this ST. T.EXE-CODE.1 No correspondence Out of scope. No contradiction to this ST. T.EXE-CODE.2 No correspondence Out of scope. No contradiction to this, T.NATIVE No correspondence Out of scope. No contradiction to this ST. T.RESOURCES No correspondence Out of scope. No contradiction to this, T.DELETION No correspondence Out of scope. No contradiction to this ST. T.SECURE_DELETION No correspondence Out of scope. No contradiction to, ST. T.INSTALL No correspondence Out of scope. No contradiction to this ST. T.OBJ-DELETION No correspondence Out of scope. No contradiction to

Side-channel analysis
physical probing, side channel, physical tampering, malfunction
Certification process
Out of scope, chapter 8.1.1.1 in platform ST) FDP_ACC.2/FIREWALL IP_SFR No correspondence Out of scope (internal Java Card Firewall, internal Java Virtual Machine). No contradiction to this ST. FDP_IFF.1/JCVM IP_SFR No correspondence Out of scope (internal Java Virtual Machine, internal Java Card Firewall). No contradiction to this ST. FMT_MSA.1/JCVM IP_SFR No correspondence Out of scope (internal Java Card Firewall, internal Java Card Firew a l l ). No contradiction to this ST. FMT_SMF.1 IP_SFR No correspondence Out of scope (internal Java Card Firewall, FCS_CKM.1.1/RSA, FCS_CKM.1.1/ECC, FCS_CKM.1.1/3DES, FCS_CKM.1.1/AES) All IP_SFRs No crrespondence. Out of scope. The TOE uses the spe- cific Document Basic Access Key Derivation Algorithm, managed within Java Card OS). No contradiction to this ST. FCS_CKM.3 IP_SFR No correspondence Out of scope (managed within Java Card OS, DRG.4) that can be used directly. FDP_RIP.1/ABORT IP_SFR No correspondence. Out of scope (internal Java Card functionality, No contradiction to this ST. FDP_RIP.1/bArray IP_SFR No correspondence. Out of scope (internal Java Card functionality, No contradiction to this ST. FDP_RIP.1/TRANSIENT IP_SFR No correspondence. Out of scope (internal Java Card functionality, chapter 8.1.1.4 in platform ST) FIA_ATD.1/AID IP_SFR No correspondence. Out of scope (internal Java Card fun tionality, No contradiction to this ST. FIA_USB.1/AID IP_SFR No correspondence Out of scope (internal Java Card functionality, No contradiction to this ST. FMT_MTD.3/JCRE IP_SFR No correspondence Out of scope (internal Java Card functionality, No contradiction to this ST. FMT_SMR.1/Installer IP_SFR No correspondence Out of scope (internal Java Card func tionality, ADEL) policy on security aspects outside the runtime. FDP_ACC.2/ADEL IP_SFR No correspondence Out of scope (internal Java Card func- tionality, No contradiction to this ST. FDP_RIP.1/ADEL IP_SFR No correspondence Out of scope (internal Java Card func- tionality, No contradiction to this ST. FMT_MSA.3/ADEL IP_SFR No correspondence Out of scope (internal Java Card func- tionality, No contradiction to this ST. FMT_SMR.1/ADEL IP_SFR No correspondence Out of scope (internal Java Card func- tionality, No contradiction to this ST. FDP_IFF.1/CM IP_SFR No correspondence Out of scope (internal Java Card func- tionality, No contradiction to this ST. FIA_UID.1/CM IP_SFR No correspondence Out of scope (internal Java Card func- tionality, No contradiction to this ST. FMT_MSA.3/CM IP_SFR No correspondence Out of scope (internal Java Card func- tionality, No contradiction to this ST. FMT_SMR.1/CM IP_SFR No correspondence Out of scope (internal Java Card func- tionality, ST) Firewall Policy (chapter 8.1.1.1 in platform ST) FDP_ACC.2/FIREWALL IP_SFR No correspondence Out of scope (internal Java Card Firewall. The resulting requirements for applets are reflected in the User, of the TOE. No contradiction to this ST. FDP_ACF.1/FIREWALL IP_SFR No correspondence Out of scope (internal Java Card Firewall). The resulting requirements for applets are reflected in the User, of the TOE. No contradiction to this ST. FDP_IFC.1/JCVM IP_SFR No correspondence Out of scope (internal Java Virtual Machine). No contradiction to this ST. FDP_IFF.1/JCVM IP_SFR No, Out of scope (internal Java Virtual Machine). No contradiction to this ST. FDP_RIP.1 (FDP_RIP.1/OBJECTS FDP_RIP, FDP_RIP.1/bArray FDP_RIP.1/KEYS FDP_RIP.1/TRANSIENT No correspondence. Out of scope (internal Java Card Firewall). No contradiction to this ST. 3 Conformance Claims Security Target, FDP_RIP.1/ADEL FDP_RIP.1/ODEL FDP_RIP.1/ABORT) All IP_SFRs FMT_MSA.1/JCRE IP_SFR No correspondence Out of scope (internal Java Card Firewall). No contradiction to this ST. FMT_MSA.1/JCVM IP_SFR No correspondence, Java Card Firewall). No contradiction to this ST. FMT_MSA.2/FIREWALL- JCVM IP_SFR No correspondence Out of scope (internal Java Card Firewall). The resulting requirements for applets are reflected in the User, of the TOE. No contradic- tion to this ST. FMT_MSA.3/FIREWALL IP_SFR No correspondence Out of scope (internal Java Card Firewall). The resulting requirements for applets are reflected in the User, of the TOE. No contradic- tion to this ST. FMT_MSA.3/JCVM IP_SFR No correspondence Out of scope (internal Java Card Firew a l l ). No contradiction to this ST. FMT_SMF.1 IP_SFR No correspondence, internal Java Card Firewall). No contradiction to this ST. FMT_SMR.1 IP_SFR No correspondence Out of scope (internal Java Card Firewall). No contradiction to this ST. Application Programming Interface, FCS_CKM.1.1/RSA, FCS_CKM.1.1/ECC, FCS_CKM.1.1/3DES, FCS_CKM.1.1/AES) All IP_SFRs No crrespondence. Out of scope. The TOE uses the spe- cific Document Basic Access Key Derivation Algorithm. There are no, to this ST. FCS_CKM.2 IP_SFR No correspondence Out of scope (managed within Java Card OS). No contradiction to this ST. FCS_CKM.3 IP_SFR No correspondence Out, defined quality metric (DRG.4) that can be used directly. FDP_RIP.1/ABORT IP_SFR No correspondence. Out of scope (internal Java Card functionality). No contradiction to this ST. FDP_RIP.1/APDU IP_SFR No, Out of scope (internal Java Card functionality). No contradiction to this ST. FDP_RIP.1/bArray IP_SFR No, Out of scope (internal Java Card functionality). No contradiction to this ST. FDP_RIP.1/KEYS IP_SFR No, Out of scope (internal Java Card functionality). No contradiction to this ST. FDP_RIP.1/TRANSIENT IP_SFR No, Out of scope (internal Java Card functionality). No contradiction to this ST. FDP_ROL.1/FIREWALL IP_SFR No, Out of scope (internal Java Card Firewall). The resulting requirements for applets are reflected in the User, complement Java Card OS mechanisms. No contradiction tothis ST. FPT_TDC.1 IP_SFR No correspondence Out of scope (internal Java Card functionality). No contradiction to this ST. FPT_TST.1 RP_SFR-SERV FPT_TST.1, start-up. AID Management (chapter 8.1.1.4 in platform ST) FIA_ATD.1/AID IP_SFR No correspondence. Out of scope (internal Java Card fun tionality). No contradiction to this ST. FIA_UID.2/AID IP_SFR No, Out of scope (internal Java Card fun tionality). No contradiction to this ST. FIA_USB.1/AID IP_SFR No, Out of scope (internal Java Card functionality). No contradiction to this ST. FMT_MTD.1/JCRE IP_SFR No, Out of scope (internal Java Card fun tionality). No contradiction to this ST. FMT_MTD.3/JCRE IP_SFR No, Out of scope (internal Java Card functionality). No contradiction to this ST. INSTG Security Functional, which addresses security aspects outside the runtime. FDP_ITC.2/Installer IP_SFR No correspondence Out of scope (internal Java Card functionality). No contradiction to this ST. FMT_SMR.1/Installer IP_SFR No, Out of scope (internal Java Card func tionality). No contradiction to this ST. FPT_FLS.1/Installer IP_SFR No, Out of scope (internal Java Card func- tionality). No contradiction to this ST. 3 Conformance Claims Security, SFR Correspondence in this ST References/Remarks FPT_RCV.3/Installer IP_SFR No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. ADELG Security Functional, ADEL) policy on security aspects outside the runtime. FDP_ACC.2/ADEL IP_SFR No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_ACF.1/ADEL IP_SFR No, Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_RIP.1/ADEL IP_SFR No, Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.1/ADEL IP_SFR No, Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.3/ADEL IP_SFR No, Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_SMF.1/ADEL IP_SFR No, Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_SMR.1/ADEL IP_SFR No, Out of scope (internal Java Card func- tionality). No contradiction to this ST. FPT_FLS.1/ADEL IP_SFR No, Out of scope (internal Java Card func- tionality). No contradiction to this ST. ODELG Security Functional, owns the deleted objects by invoking a specific API method. FDP_RIP.1/ODEL IP_SFR No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FPT_FLS.1/ODEL RP_SFR-SERV, or that has been modified after bytecode verification. FCO_NRO.2/CM IP_SFR No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. 3 Conformance Claims Security, 93 Platform SFR Correspondence in this ST References/Remarks FDP_IFC.2/CM IP_SFR No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_IFF.1/CM IP_SFR No, Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_UIT.1/CM IP_SFR No, Out of scope (internal Java Card func- tionality). No contradiction to this ST. FIA_UID.1/CM IP_SFR No, Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.1/CM IP_SFR No, Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.3/CM IP_SFR No, Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_SMF.1/CM IP_SFR No, Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_SMR.1/CM IP_SFR No, Out of scope (internal Java Card func- tionality). No contradiction to this ST. FTP_ITC.1/CM IP_SFR No, Out of scope (internal Java Card func- tionality). No contradiction to this ST. CMGR Security Functional, for the TOE and are covered by SFRs in the platform ST. FTP_ITC.1/CMGR IP_SFR No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. SCPG Security Functional, 20 of 93 Platform Objective Correspondence in this ST References/Remarks O.SID No correspondence Out of scope. No contradiction tothis ST. O.FIREWALL No correspondence Out of scope. No contradiction tothis ST, G OT.Data-Integrity No contradiction to this ST. O.ARRAY_VIEWS_CONFID No correspondence Out of scope. No contradiction to this ST. O.ARRAY_VIEWS_INTEG No correspondence Out of scope. No contradiction, this ST. O.NATIVE No correspondence Out of scope. No contradiction to this ST. O.OPERATE No correspondence Out of scope. No contradiction to this ST, O.REALLOCATION No correspondence Out of scope. No contradiction to this ST. O.RESOURCES No correspondence Out of scope. No contradiction to this, O.ALARM No correspondence Out of scope. No contradiction to this ST. O.CIPHER No correspondence Indirectly relevant for the correct, no corresponding objectives for the TOE of this ST. No contradictions. O.KEY-MNGT No correspondence Out of scope. No contradiction to this ST. O.PIN-MNGT No correspondence Out of scope. No contradiction to this, O.TRANSACTION No correspondence Out of scope. No contradiction to this ST. O.OBJ-DELETION No correspondence Out of scope. No contradiction to, ST. O.DELETION No correspondence Out of scope. No contradiction to this ST. O.LOAD No correspondence Out of scope. No contradiction to this ST. O, No correspondence Out of scope. No contradiction to this ST. O.CARD-MANAGEMENT No correspondence Out of scope. No contradiction to this ST. OT.SCP.IC OT.Prot_Phys-Tamper The objectives are related. No con-, The objectives are related. No con- tradiction to this ST. O.SCP.SUPPORT No correspondence Out of scope. No contradiction to this 3 Conformance Claims Security Target Lite ePass Applet on Sm@rtCafé®, Platform Threat Correspondence in this ST References/Remarks T.CONFID-APPLI-DATA No correspondence Out of scope. No contradiction to this ST. T.CONFID-JCS-CODE No correspondence Out of scope. No contradiction to, T.Information_Leakage No contradiction to this ST. T.INTEG-APPLI-CODE No correspondence Out of scope. No contradiction to this ST. T.INTEG-APPLI-CODE.LOAD No correspondence Out of scope. No, T.INTEG-APPLI-DATA T.Forgery No contradiction to this ST. T.INTEG-APPLI-DATA.LOAD No correspondence Out of scope. No contradiction to this ST. T.INTEG-JCS-CODE No correspondence Out of scope. No contradiction to, ST. T.INTEG-JCS-DATA No correspondence Out of scope. No contradiction to this ST. T.SID.1 No correspondence Out of scope. No contradiction to this ST, SID.2 No correspondence Out of scope. No contradiction to this ST. T.EXE-CODE.1 No correspondence Out of scope. No contradiction to this ST. T.EXE-CODE.2 No correspondence Out of scope. No contradiction to this, T.NATIVE No correspondence Out of scope. No contradiction to this ST. T.RESOURCES No correspondence Out of scope. No contradiction to this, T.DELETION No correspondence Out of scope. No contradiction to this ST. T.SECURE_DELETION No correspondence Out of scope. No contradiction to, ST. T.INSTALL No correspondence Out of scope. No contradiction to this ST. T.OBJ-DELETION No correspondence Out of scope. No contradiction to

Standards
FIPS 180-294, FIPS 180-2, FIPS 46-3, FIPS197, FIPS 197, FIPS PUB 46-3, FIPS PUB 197, PKCS#3, PKCS1, AIS20, AIS31, AIS 20, AIS 31, RFC5639, RFC 5639, ISO/IEC 7816-2, ISO/IEC 14888-3, ISO/IEC 9796-2, ICAO, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003

File metadata

Title: Security Target Lite
Subject: ePass Applet on Sm@rtCafé® Expert 8.0 C1
Keywords: Version 1.1/Status 12.09.2022
Author: G+D MS / stut
Creation date: D:20220912111407Z00'00'
Modification date: D:20221021105718Z00'00'
Pages: 93
Creator: Acrobat PDFMaker 22 für Word
Producer: macOS Version 12.6 (Build 21G115) Quartz PDFContext, AppendMode 1.1

References

Outgoing
  • BSI-DSZ-CC-1107-V3-2022 - IFX_CCI_00002Dh, IFX_CCI_000039h, IFX_CCI_00003Ah, IFX_CCI_000044h, IFX_CCI_000045h, IFX_CCI_000046h, IFX_CCI_000047h, IFX_CCI_000048h, IFX_CCI_000049h, IFX_CCI_00004Ah, IFX_CCI_00004Bh, IFX_CCI_00004Ch, IFX_CCI_00004Dh, IFX_CCI_00004Eh design step T11 with firmware 80.306.16.0 & 80.306.16.1, optional NRG SW 05.03.4097, optional HSL v3.52.9708, UMSLC lib v01.30.0564, optional SCL v2.15.000 and v2.11.003, optional ACL v3.33.003 and v3.02.000, optional RCL v1.10.007, optional HCL v1.13.002 and guidance

Heuristics ?

Certificate ID: NSCIB-CC-0568828-CR

Extracted SARs

AVA_VAN.5, ALC_FLR.1, ALC_DVS.2, ATE_DPT.2

Scheme data ?

Manufacturer Veridos GmbH
Product Sm@rtCafé® Expert 8.0 C1
Scheme NSCIB
Cert Id CC-22-0289060
Manufacturer Link www.veridos.com
Level EAL6 augmented with ALC_FLR.1
Cert Link https://www.tuv-nederland.nl/assets/files/cerfiticaten/2022/09/nscib-cc-0289060-cert.pdf
Report Link https://www.tuv-nederland.nl/assets/files/cerfiticaten/2022/09/nscib-cc-0289060-cr-1.0.pdf
Target Link https://www.tuv-nederland.nl/assets/files/cerfiticaten/2022/09/st-litev31veridos_gdms_8_0_c1_ase_v31_lite.pdf

References ?

Updates ?

  • 15.02.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '10499a6d8497918c4aedcac81a6080adf25d288a5d53a90814e677c6a5f29489', 'txt_hash': '9e11db4a7a3f891de35960b88f19d8ccf58a7651e63454da188cb4835ff04010'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '5886e98cf2ddfe06c08e7b5cb851e5cd9d57388a30c56adcd78ea1fc383ea9ae', 'txt_hash': '1b3a0d166b61772ce3bb003a96706ae80e82ff69686aa1a000d8c9590a950b2f'}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'ffea1c364aea8bad1f6fca61ba556b55ea7596f5dd4385328372721e6f75dbef', 'txt_hash': 'f434344410c36e38f7d9ba730b6e40720709add690e675f9eaf69441d23efb92'}}.
    • The following properties were deleted: ['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash'].

    The PDF extraction data was updated.

    • The following values were inserted: {'cert_metadata': {'pdf_file_size_bytes': 248278, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/Author': 'kruitr', '/CreationDate': "D:20221115162140+01'00'", '/Creator': 'Bullzip PDF Printer (11.0.0.2588)', '/ModDate': "D:20221115162208+01'00'", '/Producer': 'PDF Printer / www.bullzip.com / FPG / TUV Rheinland Service GmbH', '/Title': 'Microsoft Word - NSCIB-CC-22-0568828-cert.doc', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}, 'cert_frontpage': None, 'cert_keywords': {'cc_cert_id': {'NL': {'CC-22-0568828': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0055': 1, 'BSI-CC-PP-0056': 1, 'BSI-CC-PP- 0068': 1}}, 'cc_security_level': {'EAL': {'EAL5': 1, 'EAL4': 1, 'EAL2': 1, 'EAL7': 1, 'EAL5 augmented': 1, 'EAL4 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_DVS.2': 2, 'ALC_FLR.3': 2}, 'ATE': {'ATE_DPT.2': 1}, 'AVA': {'AVA_VAN.5': 1}}, 'cc_sfr': {}, 'cc_claims': {'R': {'R.L': 1}}, 'vendor': {'GD': {'Giesecke+Devrient': 1}}, 'eval_facility': {'SGS': {'SGS': 1, 'SGS Brightsight': 1}, 'BrightSight': {'Brightsight': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'PACE': {'PACE': 2}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408-1': 1, 'ISO/IEC 15408-2': 1, 'ISO/IEC 15408-3': 1, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}, 'cert_filename': 'NSCIB-CC-22-0568828-cert.pdf'}.
    • The report_frontpage property was set to {'NL': {'cert_id': 'NSCIB-CC-0568828-CR', 'cert_item': 'ePass Applet on Sm@rtCafé® Expert 8.0 C1, Version 1.0', 'developer': 'Giesecke+Devrient Mobile Security GmbH', 'cert_lab': ' SGS Brightsight B.V.'}}.
    • The st_frontpage property was set to None.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1107-V3-2022': 2}, '__delete__': ['BSI-DSZ-CC-1107-V3']}, 'NL': {'__insert__': {'CC-22-0289060': 1}, '__update__': {'NSCIB-CC-0568828-CR': 13, 'NSCIB-CC-0289060-CR': 1}}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'__insert__': {'NL': {'CC-22-0289060': 1, 'NSCIB-CC-22-0289060-CR': 1}}, '__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1107-V3-2022': 2}}}}} data.
  • 13.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__insert__': {'BSI-DSZ-CC-1107-V3': 3}, '__update__': {'BSI-DSZ-CC-1107-V3-2022': 4}}, 'NL': {'__update__': {'NSCIB-CC-0568828-CR': 39, 'NSCIB-CC-0289060-CR': 3}, '__delete__': ['CC-22-0289060']}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1107-V3-2022': 4}}}, '__delete__': ['NL']}} data.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__delete__': ['CA']}} data.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__insert__': {'CA': {'888 7 888': 1, '888 7 879': 1}}, '__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1107-V3-2022': 2}, '__delete__': ['BSI-DSZ-CC-1107-V3']}, 'NL': {'__insert__': {'CC-22-0289060': 1}, '__update__': {'NSCIB-CC-0568828-CR': 13, 'NSCIB-CC-0289060-CR': 1}}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'__insert__': {'NL': {'CC-22-0289060': 1, 'NSCIB-CC-22-0289060-CR': 1}}, '__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1107-V3-2022': 2}}}}} data.
  • 04.01.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'annotated_references': None}.
  • 21.09.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'product': 'Sm@rtCafé® Expert 8.0 C1', 'cert_id': 'CC-22-0289060', 'level': 'EAL6 augmented with ALC_FLR.1', 'cert_link': 'https://www.tuv-nederland.nl/assets/files/cerfiticaten/2022/09/nscib-cc-0289060-cert.pdf', 'report_link': 'https://www.tuv-nederland.nl/assets/files/cerfiticaten/2022/09/nscib-cc-0289060-cr-1.0.pdf', 'target_link': 'https://www.tuv-nederland.nl/assets/files/cerfiticaten/2022/09/st-litev31veridos_gdms_8_0_c1_ase_v31_lite.pdf'} data.
  • 26.04.2023 The certificate data changed.
    Certificate changed

    The security_level was updated.

    • The following values were removed: {'_type': 'Set', 'elements': ['EAL4', 'ATE_DPT.2']}.
    • The following values were added: {'_type': 'Set', 'elements': ['AVA_VAN.5', 'EAL5+']}.

    The computed heuristics were updated.

    • The following values were inserted: {'scheme_data': {'manufacturer': 'Veridos GmbH', 'product': 'ePass Applet on Sm@rtCafé® Expert 8.0 C1, Version 1.0', 'scheme': 'NSCIB', 'cert_id': 'CC-22-0568828', 'manufacturer_link': 'www.veridos.com', 'level': 'EAL5 augmented with ALC_DVS.2 and AVA_VAN.5 when authentication method PACE, EAC and AA is selected. EAL4 augmented with ALC_DVS.2 and ATE_DPT.2 when authentication method BAC is selected.', 'cert_link': 'https://www.tuv-nederland.nl/assets/files/cerfiticaten/2022/11/nscib-cc-22-0568828-cert.pdf', 'report_link': 'https://www.tuv-nederland.nl/assets/files/cerfiticaten/2022/11/nscib-cc-0568828-cr-1.0.pdf', 'target_link': 'https://www.tuv-nederland.nl/assets/files/cerfiticaten/2022/11/nscib-cc-0568828-stlite_v1.1.pdf'}}.
  • 11.02.2023 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.cc.CCCertificate.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.InternalState.
    • The following properties were deleted: ['errors'].

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.PdfData.

    The computed heuristics were updated.

    • The following values were inserted: {'direct_transitive_cves': None, 'indirect_transitive_cves': None}.
    • The _type property was set to sec_certs.sample.cc.CCCertificate.Heuristics.
    • The following properties were deleted: ['direct_dependency_cves', 'indirect_dependency_cves'].
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to [].
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/NSCIB-CC-0568828-CR-1.0.pdf, code: nok'].
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The cert_link was updated.

    • The new value is https://www.commoncriteriaportal.org/files/epfiles/NSCIB-CC-22-0568828-cert.pdf.

    The manufacturer_web was updated.

    • The new value is https://www.veridos.com.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Machine Readable Travel Document using Standard Inspection Procedure with PACE (PACE_PP)', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0068_V2b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['MRTD_SAC_PACEV2_V1.0', 'EPASS_V1.0', 'EPASS_PACE_V1.0']}}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': "Protection Profile for Machine Readable Travel Document with 'ICAO Application', Basic Acce...", 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0055b.pdf', 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Machine Readable Travel Document with ICAO Application Extended Access Control with PACE, Version 1.3', 'pp_eal': 'EAL4', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0056_V2b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['MRTD_ICAO_EAC_V1.3', 'MRTD-PP_V1.10']}}]}.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The cert_link was updated.

    • The new value is None.

    The manufacturer_web was updated.

    • The new value is None.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'EPASS_PACE_V1.0', 'pp_eal': None, 'pp_link': None, 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'MRTD_ICAO_EAC_V1.3', 'pp_eal': None, 'pp_link': None, 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'MRTD_ICAO_BA_V1.10', 'pp_eal': None, 'pp_link': None, 'pp_ids': None}]}.
  • 25.11.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Veridos ePass Applet on Sm@rtCafé Expert 8.0 C1, Version 1.0 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/files/epfiles/NSCIB-CC-22-0568828-cert.pdf",
  "dgst": "f9fb8170cecedc23",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "NSCIB-CC-0568828-CR",
    "cert_lab": [
      ""
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.0",
        "8.0"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "NSCIB-CC-0289060-CR",
          "BSI-DSZ-CC-1107-V3-2022"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "NSCIB-CC-0289060-CR",
          "BSI-DSZ-CC-1107-V3-2022"
        ]
      }
    },
    "scheme_data": {
      "cert_id": "CC-22-0289060",
      "cert_link": "https://www.tuv-nederland.nl/assets/files/cerfiticaten/2022/09/nscib-cc-0289060-cert.pdf",
      "level": "EAL6 augmented with ALC_FLR.1",
      "manufacturer": "Veridos GmbH",
      "manufacturer_link": "www.veridos.com",
      "product": "Sm@rtCaf\u00e9\u00ae Expert 8.0 C1",
      "report_link": "https://www.tuv-nederland.nl/assets/files/cerfiticaten/2022/09/nscib-cc-0289060-cr-1.0.pdf",
      "scheme": "NSCIB",
      "target_link": "https://www.tuv-nederland.nl/assets/files/cerfiticaten/2022/09/st-litev31veridos_gdms_8_0_c1_ase_v31_lite.pdf"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1107-V3-2022"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1107-V3-2022"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Veridos GmbH - Identity Solutions by Giesecke \u0026 Devrient and Bundesdruckerei",
  "manufacturer_web": "https://www.veridos.com",
  "name": "Veridos ePass Applet on Sm@rtCaf\u00e9 Expert 8.0 C1, Version 1.0",
  "not_valid_after": "2027-10-31",
  "not_valid_before": "2022-10-31",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "NSCIB-CC-22-0568828-cert.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "NL": {
          "CC-22-0568828": 1
        }
      },
      "cc_claims": {
        "R": {
          "R.L": 1
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP- 0068": 1,
          "BSI-CC-PP-0055": 1,
          "BSI-CC-PP-0056": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_DVS.2": 2,
          "ALC_FLR.3": 2
        },
        "ATE": {
          "ATE_DPT.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 1,
          "EAL4": 1,
          "EAL4 augmented": 1,
          "EAL5": 1,
          "EAL5 augmented": 1,
          "EAL7": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 2
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "BrightSight": {
          "Brightsight": 1
        },
        "SGS": {
          "SGS": 1,
          "SGS Brightsight": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 15408-1": 1,
          "ISO/IEC 15408-2": 1,
          "ISO/IEC 15408-3": 1,
          "ISO/IEC 18045": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "GD": {
          "Giesecke+Devrient": 1
        }
      },
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "kruitr",
      "/CreationDate": "D:20221115162140+01\u002700\u0027",
      "/Creator": "Bullzip PDF Printer (11.0.0.2588)",
      "/ModDate": "D:20221115162208+01\u002700\u0027",
      "/Producer": "PDF Printer / www.bullzip.com / FPG / TUV Rheinland Service GmbH",
      "/Title": "Microsoft Word - NSCIB-CC-22-0568828-cert.doc",
      "pdf_file_size_bytes": 248278,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "NSCIB-CC-0568828-CR-1.0.pdf",
    "report_frontpage": {
      "NL": {
        "cert_id": "NSCIB-CC-0568828-CR",
        "cert_item": "ePass Applet on Sm@rtCaf\u00e9\u00ae Expert 8.0 C1, Version 1.0",
        "cert_lab": " SGS Brightsight B.V.",
        "developer": "Giesecke+Devrient Mobile Security GmbH"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 1
          },
          "ECDH": {
            "ECDH": 1
          },
          "ECDSA": {
            "ECDSA": 1
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 1
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1107-V3-2022": 2
        },
        "NL": {
          "CC-22-0289060": 1,
          "NSCIB-CC-0289060-CR": 1,
          "NSCIB-CC-0568828-CR": 13
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0055-2009": 1,
          "BSI-CC-PP-0056-V2-": 1,
          "BSI-CC-PP-0068-V2-MA-01": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_IMP": 1
        },
        "ALC": {
          "ALC_DVS.2": 5,
          "ALC_FLR.1": 1
        },
        "ATE": {
          "ATE_DPT.2": 1,
          "ATE_DPT.2.5": 1
        },
        "AVA": {
          "AVA_VAN.5": 3
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 5": 1,
          "EAL 5 augmented": 1,
          "EAL4": 2,
          "EAL4 augmented": 1,
          "EAL4+": 2,
          "EAL5": 2,
          "EAL5 augmented": 2,
          "EAL5+": 2,
          "EAL54": 1,
          "EAL6": 1,
          "EAL6 augmented": 1,
          "EAL6+": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 1
        },
        "ECB": {
          "ECB": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 8
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "BrightSight": {
          "Brightsight": 2
        },
        "SGS": {
          "SGS": 2,
          "SGS Brightsight": 2
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 1
        },
        "TRNG": {
          "TRNG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "DFA": 1
        },
        "other": {
          "JIL": 4,
          "JIL-AAPS": 1,
          "JIL-AM": 1
        }
      },
      "standard_id": {
        "ICAO": {
          "ICAO": 5
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 1
          }
        },
        "DES": {
          "DES": {
            "DES": 1
          }
        },
        "constructions": {
          "MAC": {
            "CBC-MAC": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "GD": {
          "Giesecke+Devrient": 4
        },
        "Infineon": {
          "Infineon": 1
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Microsoft Office User",
      "/CreationDate": "D:20221104113625+00\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2010",
      "/ModDate": "D:20221104113625+00\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2010",
      "/Title": "Certification Report",
      "pdf_file_size_bytes": 446706,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.sogis.eu/",
          "http://www.tuv.com/nl",
          "http://www.commoncriteriaportal.org/",
          "mailto:info@nl.tuv.com"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 13
    },
    "st_filename": "NSCIB-CC-0568828-STLite_v1.1.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 4
          },
          "ECDH": {
            "ECDH": 7
          },
          "ECDSA": {
            "ECDSA": 5
          }
        },
        "FF": {
          "DH": {
            "DH": 2,
            "Diffie-Hellman": 4
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1107-V3-2022": 2
        },
        "NL": {
          "CC-22-0289060": 1,
          "NSCIB-CC-22-0289060-CR": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.APPLET": 1,
          "A.CAP_FILE": 1,
          "A.VERIFICATION": 1
        },
        "O": {
          "O.ALARM": 1,
          "O.ARRAY_VIEWS_CONFID": 1,
          "O.ARRAY_VIEWS_INTEG": 1,
          "O.CARD-MANAGEMENT": 1,
          "O.CIPHER": 1,
          "O.DELETION": 1,
          "O.FIREWALL": 1,
          "O.GLOBAL_ARRAYS_CON": 1,
          "O.GLOBAL_ARRAYS_INTE": 1,
          "O.INSTALL": 1,
          "O.KEY-MNGT": 1,
          "O.LOAD": 1,
          "O.NATIVE": 1,
          "O.OBJ-DELETION": 1,
          "O.OPERATE": 1,
          "O.PIN-MNGT": 1,
          "O.REALLOCATION": 1,
          "O.RESOURCES": 1,
          "O.RNG": 1,
          "O.SCP": 1,
          "O.SID": 1,
          "O.TRANSACTION": 1
        },
        "OE": {
          "OE.BAC_PP": 1,
          "OE.CAP_FILE": 1,
          "OE.CODE-EVIDENCE": 1,
          "OE.VERIFICATION": 1
        },
        "OT": {
          "OT.SCP": 2
        },
        "T": {
          "T.CONFID-APPLI-DATA": 1,
          "T.CONFID-JCS-CODE": 1,
          "T.CONFID-JCS-DATA": 1,
          "T.DELETION": 1,
          "T.EXE-CODE": 2,
          "T.INSTALL": 1,
          "T.INTEG-APPLI-CODE": 2,
          "T.INTEG-APPLI-DATA": 2,
          "T.INTEG-JCS-CODE": 1,
          "T.INTEG-JCS-DATA": 1,
          "T.NATIVE": 1,
          "T.OBJ-DELETION": 1,
          "T.PHYSICAL": 1,
          "T.RESOURCES": 1,
          "T.SECURE_DELETION": 1,
          "T.SID": 2
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0055": 1,
          "BSI-CC-PP-0056-V2-2012": 1,
          "BSI-CC-PP-0068-V2-2011-MA-01": 1,
          "BSI-CC-PP-0099-V2-2020": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_DVS.2": 9,
          "ALC_FLR.1": 1
        },
        "ATE": {
          "ATE_DPT.2": 3
        },
        "AVA": {
          "AVA_VAN.5": 7
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 1,
          "EAL 4 augmented": 1,
          "EAL 5": 1,
          "EAL 5 augmented": 1,
          "EAL 6": 1,
          "EAL 6 augmented": 1,
          "EAL4": 3,
          "EAL4 augmented": 1,
          "EAL5": 5,
          "EAL5 augmented": 3,
          "EAL5+": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 1,
          "FAU_SAS": 3,
          "FAU_SAS.1": 6,
          "FAU_SAS.1.1": 1,
          "FAU_UAU.4": 1
        },
        "FCO": {
          "FCO_NRO": 1
        },
        "FCS": {
          "FCS_CKM": 16,
          "FCS_CKM.1": 22,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 5,
          "FCS_CKM.3": 1,
          "FCS_CKM.4": 23,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 51,
          "FCS_COP.1": 31,
          "FCS_RND.1": 6,
          "FCS_RND.1.1": 1,
          "FCS_RNG.1": 1
        },
        "FDP": {
          "FDP_ACC": 10,
          "FDP_ACC.1": 14,
          "FDP_ACC.1.1": 1,
          "FDP_ACF": 9,
          "FDP_ACF.1": 25,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 1,
          "FDP_IFC": 2,
          "FDP_IFC.1": 4,
          "FDP_IFF": 2,
          "FDP_ITC": 1,
          "FDP_ITC.1": 11,
          "FDP_ITC.2": 11,
          "FDP_RIP": 15,
          "FDP_RIP.1": 5,
          "FDP_RIP.1.1": 1,
          "FDP_ROL": 1,
          "FDP_SDI.2": 1,
          "FDP_UCT": 4,
          "FDP_UCT.1": 6,
          "FDP_UCT.1.1": 1,
          "FDP_UIT": 5,
          "FDP_UIT.1": 5,
          "FDP_UIT.1.1": 1,
          "FDP_UIT.1.2": 1
        },
        "FIA": {
          "FIA_AFL": 4,
          "FIA_AFL.1": 6,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_API": 5,
          "FIA_API.1": 4,
          "FIA_API.1.1": 1,
          "FIA_ATD": 1,
          "FIA_UAU": 30,
          "FIA_UAU.1": 8,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.4": 11,
          "FIA_UAU.4.1": 1,
          "FIA_UAU.5": 10,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 1,
          "FIA_UAU.6": 8,
          "FIA_UAU.6.1": 1,
          "FIA_UID": 10,
          "FIA_UID.1": 13,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1,
          "FIA_USB": 1
        },
        "FMT": {
          "FMT_LIM": 6,
          "FMT_LIM.1": 12,
          "FMT_LIM.1.1": 3,
          "FMT_LIM.2": 13,
          "FMT_LIM.2.1": 4,
          "FMT_MSA": 9,
          "FMT_MSA.3": 3,
          "FMT_MTD": 48,
          "FMT_MTD.1": 18,
          "FMT_MTD.3": 6,
          "FMT_MTD.3.1": 1,
          "FMT_SMF": 5,
          "FMT_SMF.1": 22,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 12,
          "FMT_SMR.1": 18,
          "FMT_SMR.1.1": 2,
          "FMT_SMR.1.2": 1
        },
        "FPR": {
          "FPR_UNO.1": 1
        },
        "FPT": {
          "FPT_EMS": 4,
          "FPT_EMS.1": 7,
          "FPT_EMS.1.1": 1,
          "FPT_EMS.1.2": 1,
          "FPT_FLS": 10,
          "FPT_FLS.1": 11,
          "FPT_FLS.1.1": 1,
          "FPT_PHP.3": 8,
          "FPT_PHP.3.1": 1,
          "FPT_RCV": 1,
          "FPT_TDC.1": 1,
          "FPT_TST": 1,
          "FPT_TST.1": 6,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FTP": {
          "FTP_ITC": 9,
          "FTP_ITC.1": 8,
          "FTP_TRP.1": 4
        }
      },
      "certification_process": {
        "OutOfScope": {
          " No contradiction to this ST. FDP_IFF.1/CM IP_SFR No correspondence Out of scope (internal Java Card func- tionality": 1,
          " No contradiction to this ST. FDP_RIP.1/ADEL IP_SFR No correspondence Out of scope (internal Java Card func- tionality": 1,
          " No contradiction to this ST. FDP_RIP.1/TRANSIENT IP_SFR No correspondence. Out of scope (internal Java Card functionality": 1,
          " No contradiction to this ST. FDP_RIP.1/bArray IP_SFR No correspondence. Out of scope (internal Java Card functionality": 1,
          " No contradiction to this ST. FIA_UID.1/CM IP_SFR No correspondence Out of scope (internal Java Card func- tionality": 1,
          " No contradiction to this ST. FIA_USB.1/AID IP_SFR No correspondence Out of scope (internal Java Card functionality": 1,
          " No contradiction to this ST. FMT_MSA.3/ADEL IP_SFR No correspondence Out of scope (internal Java Card func- tionality": 1,
          " No contradiction to this ST. FMT_MSA.3/CM IP_SFR No correspondence Out of scope (internal Java Card func- tionality": 1,
          " No contradiction to this ST. FMT_MTD.3/JCRE IP_SFR No correspondence Out of scope (internal Java Card functionality": 1,
          " No contradiction to this ST. FMT_SMR.1/ADEL IP_SFR No correspondence Out of scope (internal Java Card func- tionality": 1,
          " No contradiction to this ST. FMT_SMR.1/CM IP_SFR No correspondence Out of scope (internal Java Card func- tionality": 1,
          " No contradiction to this ST. FMT_SMR.1/Installer IP_SFR No correspondence Out of scope (internal Java Card func tionality": 1,
          "20 of 93 Platform Objective Correspondence in this ST References/Remarks O.SID No correspondence Out of scope. No contradiction tothis ST. O.FIREWALL No correspondence Out of scope. No contradiction tothis ST": 1,
          "93 Platform SFR Correspondence in this ST References/Remarks FDP_IFC.2/CM IP_SFR No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_IFF.1/CM IP_SFR No": 1,
          "ADEL) policy on security aspects outside the runtime. FDP_ACC.2/ADEL IP_SFR No correspondence Out of scope (internal Java Card func- tionality": 1,
          "ADEL) policy on security aspects outside the runtime. FDP_ACC.2/ADEL IP_SFR No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_ACF.1/ADEL IP_SFR No": 1,
          "DRG.4) that can be used directly. FDP_RIP.1/ABORT IP_SFR No correspondence. Out of scope (internal Java Card functionality": 1,
          "FCS_CKM.1.1/RSA, FCS_CKM.1.1/ECC, FCS_CKM.1.1/3DES, FCS_CKM.1.1/AES) All IP_SFRs No crrespondence. Out of scope. The TOE uses the spe- cific Document Basic Access Key Derivation Algorithm": 1,
          "FCS_CKM.1.1/RSA, FCS_CKM.1.1/ECC, FCS_CKM.1.1/3DES, FCS_CKM.1.1/AES) All IP_SFRs No crrespondence. Out of scope. The TOE uses the spe- cific Document Basic Access Key Derivation Algorithm. There are no": 1,
          "FDP_RIP.1/ADEL FDP_RIP.1/ODEL FDP_RIP.1/ABORT) All IP_SFRs FMT_MSA.1/JCRE IP_SFR No correspondence Out of scope (internal Java Card Firewall). No contradiction to this ST. FMT_MSA.1/JCVM IP_SFR No correspondence": 1,
          "FDP_RIP.1/bArray FDP_RIP.1/KEYS FDP_RIP.1/TRANSIENT No correspondence. Out of scope (internal Java Card Firewall). No contradiction to this ST. 3 Conformance Claims Security Target": 1,
          "G OT.Data-Integrity No contradiction to this ST. O.ARRAY_VIEWS_CONFID No correspondence Out of scope. No contradiction to this ST. O.ARRAY_VIEWS_INTEG No correspondence Out of scope. No contradiction": 1,
          "Java Card Firewall). No contradiction to this ST. FMT_MSA.2/FIREWALL- JCVM IP_SFR No correspondence Out of scope (internal Java Card Firewall). The resulting requirements for applets are reflected in the User": 1,
          "No correspondence Out of scope. No contradiction to this ST. O.CARD-MANAGEMENT No correspondence Out of scope. No contradiction to this ST. OT.SCP.IC OT.Prot_Phys-Tamper The objectives are related. No con-": 1,
          "O.ALARM No correspondence Out of scope. No contradiction to this ST. O.CIPHER No correspondence Indirectly relevant for the correct": 1,
          "O.REALLOCATION No correspondence Out of scope. No contradiction to this ST. O.RESOURCES No correspondence Out of scope. No contradiction to this": 1,
          "O.TRANSACTION No correspondence Out of scope. No contradiction to this ST. O.OBJ-DELETION No correspondence Out of scope. No contradiction to": 1,
          "Out of scope": 86,
          "Out of scope (internal Java Card Firewall). The resulting requirements for applets are reflected in the User": 1,
          "Out of scope (internal Java Card fun tionality). No contradiction to this ST. FIA_USB.1/AID IP_SFR No": 1,
          "Out of scope (internal Java Card fun tionality). No contradiction to this ST. FMT_MTD.3/JCRE IP_SFR No": 1,
          "Out of scope (internal Java Card func tionality). No contradiction to this ST. FPT_FLS.1/Installer IP_SFR No": 1,
          "Out of scope (internal Java Card func- tionality). No contradiction to this ST. 3 Conformance Claims Security": 1,
          "Out of scope (internal Java Card func- tionality). No contradiction to this ST. CMGR Security Functional": 1,
          "Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_RIP.1/ADEL IP_SFR No": 1,
          "Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_UIT.1/CM IP_SFR No": 1,
          "Out of scope (internal Java Card func- tionality). No contradiction to this ST. FIA_UID.1/CM IP_SFR No": 1,
          "Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.1/ADEL IP_SFR No": 1,
          "Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.1/CM IP_SFR No": 1,
          "Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.3/ADEL IP_SFR No": 1,
          "Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.3/CM IP_SFR No": 1,
          "Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_SMF.1/ADEL IP_SFR No": 1,
          "Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_SMF.1/CM IP_SFR No": 1,
          "Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_SMR.1/ADEL IP_SFR No": 1,
          "Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_SMR.1/CM IP_SFR No": 1,
          "Out of scope (internal Java Card func- tionality). No contradiction to this ST. FPT_FLS.1/ADEL IP_SFR No": 1,
          "Out of scope (internal Java Card func- tionality). No contradiction to this ST. FTP_ITC.1/CM IP_SFR No": 1,
          "Out of scope (internal Java Card func- tionality). No contradiction to this ST. ODELG Security Functional": 1,
          "Out of scope (internal Java Card functionality). No contradiction to this ST. FDP_RIP.1/KEYS IP_SFR No": 1,
          "Out of scope (internal Java Card functionality). No contradiction to this ST. FDP_RIP.1/TRANSIENT IP_SFR No": 1,
          "Out of scope (internal Java Card functionality). No contradiction to this ST. FDP_RIP.1/bArray IP_SFR No": 1,
          "Out of scope (internal Java Card functionality). No contradiction to this ST. FDP_ROL.1/FIREWALL IP_SFR No": 1,
          "Out of scope (internal Java Card functionality). No contradiction to this ST. FMT_MTD.1/JCRE IP_SFR No": 1,
          "Out of scope (internal Java Card functionality). No contradiction to this ST. INSTG Security Functional": 1,
          "Out of scope (internal Java Virtual Machine). No contradiction to this ST. FDP_RIP.1 (FDP_RIP.1/OBJECTS FDP_RIP": 1,
          "Platform Threat Correspondence in this ST References/Remarks T.CONFID-APPLI-DATA No correspondence Out of scope. No contradiction to this ST. T.CONFID-JCS-CODE No correspondence Out of scope. No contradiction to": 1,
          "SFR Correspondence in this ST References/Remarks FPT_RCV.3/Installer IP_SFR No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. ADELG Security Functional": 1,
          "SID.2 No correspondence Out of scope. No contradiction to this ST. T.EXE-CODE.1 No correspondence Out of scope. No contradiction to this ST. T.EXE-CODE.2 No correspondence Out of scope. No contradiction to this": 1,
          "ST) Firewall Policy (chapter 8.1.1.1 in platform ST) FDP_ACC.2/FIREWALL IP_SFR No correspondence Out of scope (internal Java Card Firewall. The resulting requirements for applets are reflected in the User": 1,
          "ST. O.DELETION No correspondence Out of scope. No contradiction to this ST. O.LOAD No correspondence Out of scope. No contradiction to this ST. O": 1,
          "ST. T.INSTALL No correspondence Out of scope. No contradiction to this ST. T.OBJ-DELETION No correspondence Out of scope. No contradiction to": 1,
          "ST. T.INTEG-JCS-DATA No correspondence Out of scope. No contradiction to this ST. T.SID.1 No correspondence Out of scope. No contradiction to this ST": 1,
          "T.DELETION No correspondence Out of scope. No contradiction to this ST. T.SECURE_DELETION No correspondence Out of scope. No contradiction to": 1,
          "T.INTEG-APPLI-DATA T.Forgery No contradiction to this ST. T.INTEG-APPLI-DATA.LOAD No correspondence Out of scope. No contradiction to this ST. T.INTEG-JCS-CODE No correspondence Out of scope. No contradiction to": 1,
          "T.Information_Leakage No contradiction to this ST. T.INTEG-APPLI-CODE No correspondence Out of scope. No contradiction to this ST. T.INTEG-APPLI-CODE.LOAD No correspondence Out of scope. No": 1,
          "T.NATIVE No correspondence Out of scope. No contradiction to this ST. T.RESOURCES No correspondence Out of scope. No contradiction to this": 1,
          "The objectives are related. No con- tradiction to this ST. O.SCP.SUPPORT No correspondence Out of scope. No contradiction to this 3 Conformance Claims Security Target Lite ePass Applet on Sm@rtCaf\u00e9\u00ae": 1,
          "chapter 8.1.1.1 in platform ST) FDP_ACC.2/FIREWALL IP_SFR No correspondence Out of scope (internal Java Card Firewall": 1,
          "chapter 8.1.1.4 in platform ST) FIA_ATD.1/AID IP_SFR No correspondence. Out of scope (internal Java Card fun tionality": 1,
          "complement Java Card OS mechanisms. No contradiction tothis ST. FPT_TDC.1 IP_SFR No correspondence Out of scope (internal Java Card functionality). No contradiction to this ST. FPT_TST.1 RP_SFR-SERV FPT_TST.1": 1,
          "defined quality metric (DRG.4) that can be used directly. FDP_RIP.1/ABORT IP_SFR No correspondence. Out of scope (internal Java Card functionality). No contradiction to this ST. FDP_RIP.1/APDU IP_SFR No": 1,
          "for the TOE and are covered by SFRs in the platform ST. FTP_ITC.1/CMGR IP_SFR No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. SCPG Security Functional": 1,
          "internal Java Card Firew a l l ). No contradiction to this ST. FMT_SMF.1 IP_SFR No correspondence Out of scope (internal Java Card Firewall": 1,
          "internal Java Card Firewall). No contradiction to this ST. FMT_MSA.1/JCVM IP_SFR No correspondence Out of scope (internal Java Card Firewall": 1,
          "internal Java Card Firewall). No contradiction to this ST. FMT_SMR.1 IP_SFR No correspondence Out of scope (internal Java Card Firewall). No contradiction to this ST. Application Programming Interface": 1,
          "internal Java Virtual Machine). No contradiction to this ST. FDP_IFF.1/JCVM IP_SFR No correspondence Out of scope (internal Java Virtual Machine": 1,
          "managed within Java Card OS). No contradiction to this ST. FCS_CKM.3 IP_SFR No correspondence Out of scope (managed within Java Card OS": 1,
          "no corresponding objectives for the TOE of this ST. No contradictions. O.KEY-MNGT No correspondence Out of scope. No contradiction to this ST. O.PIN-MNGT No correspondence Out of scope. No contradiction to this": 1,
          "of the TOE. No contradic- tion to this ST. FMT_MSA.3/FIREWALL IP_SFR No correspondence Out of scope (internal Java Card Firewall). The resulting requirements for applets are reflected in the User": 1,
          "of the TOE. No contradic- tion to this ST. FMT_MSA.3/JCVM IP_SFR No correspondence Out of scope (internal Java Card Firew a l l ). No contradiction to this ST. FMT_SMF.1 IP_SFR No correspondence": 1,
          "of the TOE. No contradiction to this ST. FDP_ACF.1/FIREWALL IP_SFR No correspondence Out of scope (internal Java Card Firewall). The resulting requirements for applets are reflected in the User": 1,
          "of the TOE. No contradiction to this ST. FDP_IFC.1/JCVM IP_SFR No correspondence Out of scope (internal Java Virtual Machine). No contradiction to this ST. FDP_IFF.1/JCVM IP_SFR No": 1,
          "or that has been modified after bytecode verification. FCO_NRO.2/CM IP_SFR No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. 3 Conformance Claims Security": 1,
          "owns the deleted objects by invoking a specific API method. FDP_RIP.1/ODEL IP_SFR No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FPT_FLS.1/ODEL RP_SFR-SERV": 1,
          "start-up. AID Management (chapter 8.1.1.4 in platform ST) FIA_ATD.1/AID IP_SFR No correspondence. Out of scope (internal Java Card fun tionality). No contradiction to this ST. FIA_UID.2/AID IP_SFR No": 1,
          "this ST. O.NATIVE No correspondence Out of scope. No contradiction to this ST. O.OPERATE No correspondence Out of scope. No contradiction to this ST": 1,
          "to this ST. FCS_CKM.2 IP_SFR No correspondence Out of scope (managed within Java Card OS). No contradiction to this ST. FCS_CKM.3 IP_SFR No correspondence Out": 1,
          "which addresses security aspects outside the runtime. FDP_ITC.2/Installer IP_SFR No correspondence Out of scope (internal Java Card functionality). No contradiction to this ST. FMT_SMR.1/Installer IP_SFR No": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 4
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 85
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 10
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "P-256": 2,
          "P-384": 2,
          "P-521": 4,
          "secp256r1": 1,
          "secp384r1": 1,
          "secp521r1": 1
        }
      },
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 5
          },
          "SHA2": {
            "SHA-224": 2,
            "SHA-256": 2,
            "SHA-384": 2,
            "SHA-512": 1
          }
        }
      },
      "ic_data_group": {
        "EF": {
          "EF.COM": 8,
          "EF.DG1": 14,
          "EF.DG14": 3,
          "EF.DG15": 1,
          "EF.DG16": 14,
          "EF.DG2": 5,
          "EF.DG3": 11,
          "EF.DG4": 11,
          "EF.DG5": 5,
          "EF.SOD": 12
        }
      },
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 1,
          "RNG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "malfunction": 2,
          "physical tampering": 5
        },
        "SCA": {
          "physical probing": 2,
          "side channel": 2
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 20": 1,
          "AIS 31": 1,
          "AIS20": 6,
          "AIS31": 2
        },
        "CC": {
          "CCMB-2017-04-001": 2,
          "CCMB-2017-04-002": 2,
          "CCMB-2017-04-003": 2
        },
        "FIPS": {
          "FIPS 180-2": 1,
          "FIPS 180-294": 1,
          "FIPS 197": 1,
          "FIPS 46-3": 2,
          "FIPS PUB 197": 2,
          "FIPS PUB 46-3": 2,
          "FIPS197": 1
        },
        "ICAO": {
          "ICAO": 2
        },
        "ISO": {
          "ISO/IEC 14888-3": 4,
          "ISO/IEC 7816-2": 3,
          "ISO/IEC 9796-2": 1
        },
        "PKCS": {
          "PKCS#3": 2,
          "PKCS1": 2
        },
        "RFC": {
          "RFC 5639": 1,
          "RFC5639": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 24
          }
        },
        "DES": {
          "3DES": {
            "3DES": 3,
            "Triple-DES": 14
          },
          "DES": {
            "DES": 7
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 6
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "GD": {
          "G+D": 5,
          "Giesecke \u0026 Devrient": 4,
          "Giesecke+Devrient": 6
        },
        "Infineon": {
          "Infineon": 3,
          "Infineon Technologies AG": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "G+D MS / stut",
      "/Category": "Public",
      "/Chip": "SLC37GDA512",
      "/Comments": "Final",
      "/Company": "G+D Mobile Security GmbH",
      "/CreationDate": "D:20220912111407Z00\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 22 f\u00fcr Word",
      "/HWManufacturer": "Infineon",
      "/Keywords": "Version 1.1/Status 12.09.2022",
      "/ModDate": "D:20221021105718Z00\u002700\u0027",
      "/Producer": "macOS Version 12.6 (Build 21G115) Quartz PDFContext, AppendMode 1.1",
      "/ProductName": "ePass Applet on Sm@rtCaf\u00e9\u00ae Expert 8.0 C1",
      "/SourceModified": "D:20220912104846",
      "/Subject": "ePass Applet on Sm@rtCaf\u00e9\u00ae Expert 8.0 C1",
      "/TOE": "ePass Applet on Sm@rtCaf\u00e9\u00ae Expert 8.0 C1",
      "/Title": "Security Target Lite",
      "pdf_file_size_bytes": 1343333,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 93
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": "EAL4+",
        "pp_ids": {
          "_type": "Set",
          "elements": [
            "MRTD_SAC_PACEV2_V1.0",
            "EPASS_V1.0",
            "EPASS_PACE_V1.0"
          ]
        },
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0068_V2b_pdf.pdf",
        "pp_name": "Machine Readable Travel Document using Standard Inspection Procedure with PACE (PACE_PP)"
      },
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0055b.pdf",
        "pp_name": "Protection Profile for Machine Readable Travel Document with \u0027ICAO Application\u0027, Basic Acce..."
      },
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": "EAL4",
        "pp_ids": {
          "_type": "Set",
          "elements": [
            "MRTD-PP_V1.10",
            "MRTD_ICAO_EAC_V1.3"
          ]
        },
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0056_V2b_pdf.pdf",
        "pp_name": "Machine Readable Travel Document with ICAO Application Extended Access Control with PACE, Version 1.3"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/NSCIB-CC-0568828-CR-1.0.pdf",
  "scheme": "NL",
  "security_level": {
    "_type": "Set",
    "elements": [
      "AVA_VAN.5",
      "ALC_DVS.2",
      "EAL5+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/NSCIB-CC-0568828-STLite_v1.1.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "ffea1c364aea8bad1f6fca61ba556b55ea7596f5dd4385328372721e6f75dbef",
      "txt_hash": "f434344410c36e38f7d9ba730b6e40720709add690e675f9eaf69441d23efb92"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "10499a6d8497918c4aedcac81a6080adf25d288a5d53a90814e677c6a5f29489",
      "txt_hash": "9e11db4a7a3f891de35960b88f19d8ccf58a7651e63454da188cb4835ff04010"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "5886e98cf2ddfe06c08e7b5cb851e5cd9d57388a30c56adcd78ea1fc383ea9ae",
      "txt_hash": "1b3a0d166b61772ce3bb003a96706ae80e82ff69686aa1a000d8c9590a950b2f"
    }
  },
  "status": "active"
}