ECC CPU card (Version 1.2)

CSV information ?

Status archived
Valid from 19.10.2014
Valid until 19.10.2019
Scheme 🇬🇧 UK
Manufacturer Gemalto
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level AVA_VAN.5, ALC_DVS.2, EAL4+

Heuristics summary ?

Certificate ID: CRP277

Certificate ?

Certification report ?

Extracted keywords

Symmetric Algorithms
AES
Asymmetric Algorithms
ECC

Vendor
Infineon Technologies, Gemalto

Security level
EAL4, EAL1, EAL7, EAL4 augmented
Security Assurance Requirements (SAR)
ADV_ARC, ALC_DVS.2, AVA_VAN.5
Certificates
BSI-DSZ-CC-0883, CRP277

Side-channel analysis
JIL

Standards
CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004

File metadata

Creation date D:20141110162819Z
Modification date D:20141110163029Z
Pages 18

Security target ?

Extracted keywords

Symmetric Algorithms
AES, 3DES
Asymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-Hellman
Schemes
MAC
Randomness
RNG, RND
Libraries
v1.02.013

JavaCard versions
Java Card 2.2
JavaCard API constants
TYPE_ACCESS
Vendor
Infineon, Infineon Technologies, Gemalto

Security level
EAL5+, EAL4, EAL4+, EAL5, EAL4 augmented, EAL5 augmented
Claims
D.EM, D.EP_IVDATA, D.EP_CODE, D.KEYS, D.EP_STATE, D.LOG_DATA, D.COUNTERS, D.EP_IV_DATA, O.AUTH, O.OPERATE, O.REPLAY, O.EM, O.CONF_DATA, O.INTEG_DATA, O.TAMPER, O.RECORD, O.RND, O.MEM_ACCE, O.JAVAOBJECT, O.CONFID_DATA, T.COUNTERFEITING_DEBIT, T.COUNTERFEITING_CREDIT, T.COUNTERFEITING_AUTOLOAD, T.COUNTERFEITING_AUTH, T.COUNTERFEITING_UPDATE, T.DISCLOSURE_KEYS, T.INTEG_EM, T.INTEG_EP_IVDATA, T.INTEG_CODE, T.INTEG_KEYS, T.INTEG_EP_STATE, T.INTEG_LOG_DATA, T.INTEG_COUNTERS, T.REPLAY_DEBIT, T.REPLAY_CREDIT, T.REPLAY_AUTOLOAD, T.REPLAY_UPDATE, T.COUNTERFEITING, T.INTEG, T.REPLAY, T.RND, T.INTEG_IVDATA, T.INTEG_, A.PHYSICAL, A.PROTECTION_AFTER_TOE_DELIVERY, A.PROTECTION_AFTER_TOE_DE, R.JAVA, OP.ARRAY_ACCESS, OP.INSTANCE_FIELD, OP.INVK_VIRTUAL, OP.INVK_INTERFACE, OP.THROW, OP.TYPE_ACCESS, OP.CREATE, OP.JAVA, OP.PUT, OE.SECRET_MNGT, OE.DEBIT_BEFORE_CREDIT, OE.PURSE_BEHAVIOR, OE.PHYSICAL, OE.PROTECTION_AFTER_TOE_DELIVERY, OSP.SECRET_MNGT, OSP.DEBIT_BEFORE_CREDIT, OSP.PURSE_BEHAVIOR
Security Assurance Requirements (SAR)
ADV_COMP.1, ADV_ARC.1, ADV_FSP.1, ADV_FSP.4, ADV_TDS.1, ADV_TDS.3, ADV_IMP.1, ADV_FSP.2, ADV_IMP, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_TAT.1, ALC_CMC.4, ALC_CMS.1, ALC_LCD.1, ALC_DEL.1, ALC_DVS.1, ALC_CMS.4, ATE_COV.2, ATE_FUN.1, ATE_COV.1, ATE_DPT.1, AVA_VAN.5, ASE_TSS.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1, ASE_REQ.2, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_ARP.1, FAU_SAA.1, FAU_GEN.1, FAU_ARP.1.1, FAU_GEN, FAU_GEN.1.1, FAU_GEN.1.2, FAU_SAA, FAU_SAA.1.1, FAU_SAA.1.2, FAU_SAR, FAU_SAR.1.1, FAU_SAR.1.2, FAU_STG, FAU_STG.1.1, FAU_STG.1.2, FAU_SAS.1, FAU_STG.1, FAU_SAR.1, FCO_NRO.2, FCO_NRO, FCO_NRO.1, FCO_NRO.2.2, FCO_NRO.2.3, FCS_CKM.3, FCS_COP.1, FCS_CKM, FCS_CKM.2, FCS_CKM.4, FCS_CKM.1, FCS_CKM.1.1, FCS_CKM.2.1, FCS_CKM.3.1, FCS_CKM.4.1, FCS_COP, FCS_COP.1.1, FCS_RNG.1, FDP_ACC, FDP_IFC, FDP_ITC.1, FDP_ITC.2, FDP_ACF.1, FDP_ACC.1, FDP_IFF.1, FDP_IFC.1, FDP_ITC, FDP_RIP, FDP_ROL, FDP_UCT.1, FDP_ACC.1.1, FDP_ACC.2.2, FDP_ACC.2, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1.1, FDP_IFF, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_RIP.1.1, FDP_RIP.1, FDP_ROL.1.1, FDP_ROL.1.2, FDP_ROL.1, FDP_SDI.1, FDP_SDI.2.2, FDP_UCT, FDP_UCT.1.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_SDI.2, FDP_IFC.2, FDP_ITT.1, FDP_ACF, FDP_UIT.1, FDP_IFCC, FDP_UTC.1, FIA_UID.1, FIA_ATD, FIA_SOS.2, FIA_UAU, FIA_UID, FIA_USB, FIA_ATD.1, FIA_ATD.1.1, FIA_SOS, FIA_SOS.2.1, FIA_SOS.2.2, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.1, FIA_UAU.3.1, FIA_UAU.3.2, FIA_UAU.4.1, FIA_UAU.4, FIA_UAU.6.1, FIA_UAU.6, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_USB.1, FIA_UAU.3, FIA_UID.2, FMT_MSA.1, FMT_MSA.3, FMT_MSA, FMT_SMR.1, FMT_SMF.1, FMT_MOF.1, FMT_MSA.1.1, FMT_MSA.2.1, FMT_MSA.2, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD, FMT_MTD.1.1, FMT_SMF, FMT_SMF.1.1, FMT_SMR, FMT_SMR.1.1, FMT_SMR.1.2, FMT_LIM.1, FMT_LIM.2, FMT_MTD.1, FPR_UNO.1, FPR_UNO, FPR_UNO.1.1, FPT_PHP.3, FPT_STM.1, FPT_TDC.1, FPT_FLS.1, FPT_ITC.1, FPT_ITI.1, FPT_PHP.2, FPT_RCV.4, FPT_RPL.1, FPT_TDC, FPT_TST.1, FPT_FLS, FPT_FLS.1.1, FPT_ITC, FPT_ITC.1.1, FPT_ITI, FPT_ITI.1.1, FPT_ITI.1.2, FPT_PHP, FPT_PHP.1, FPT_PHP.2.2, FPT_PHP.2.3, FPT_PHP.3.1, FPT_RCV.4.1, FPT_RPL, FPT_RPL.1.1, FPT_RPL.1.2, FPT_TDC.1.1, FPT_TDC.1.2, FPT_TST, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_ITT.1, FPT_TST.2, FRU_FLT.2, FTP_ITC.1, FTP_TRP.1
Protection profiles
BSI-PP-0035-2007
Certificates
BSI-DSZ-CC-0883-2013, BSI-DSZ-CC-0883-, BSI-DSZ-CC-0883

Side-channel analysis
Leak-Inherent, Physical Probing, physical probing, Side channel, physical tampering, Physical tampering, Malfunction, malfunction, JIL
Certification process
out of scope, Crypto libs) written in native language, The IC M7794 The elements out of scope of the TOE are: Other application(s, libraries itself) (Crypto libs) written in native language, The IC M7794 The elements out of scope of the TOE are: Other application(s) written in java language 2.3.2 Logical scope of the TOE The

Standards
RFC3447, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004

File metadata

Title Security Target ECC CPU card
Author C. Teri
Creation date D:20140930094956+02'00'
Modification date D:20141110132727Z
Pages 104
Creator Microsoft® Office Word 2007
Producer Microsoft® Office Word 2007

References

Outgoing
  • BSI-DSZ-CC-0883-2013 - archived - Infineon smartcard IC (Security Controller) M7794 A12 and G12 with optional RSA2048/4096 v1.02.013 EC v1.02.013 and Toolbox v1.02.013

Heuristics ?

Certificate ID: CRP277

Extracted SARs

ADV_ARC.1, ADV_COMP.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.2, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, AVA_VAN.5

References ?

Updates ?

  • 21.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'prev_certificates': [], 'next_certificates': []}.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '202bfbaa6783147e7bd95ace771fd66daf91e57e5f790d4b990e4ee0a0e27286', 'txt_hash': 'cebabf563b38d2d564982be49acea4979c84773b80dd8709b65d1f4b6fa9c050'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'c7735c1a6df01e07bbc01d349d93da59b8f44af3984cbc17b8301fc562a7dd6b', 'txt_hash': 'b02092709ada64c44d9eec768bb2c7e97bdf05b35ac06d9af8844f7b2915285c'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 841676, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 18, '/CreationDate': 'D:20141110162819Z', '/ModDate': 'D:20141110163029Z', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.cesg.gov.uk/', 'http://www.sogisportal.eu/', 'http://www.commoncriteriaportal.org/', 'http://www.ukas.org/']}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 1345514, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 104, '/Author': 'C. Teri', '/CreationDate': "D:20140930094956+02'00'", '/Creator': 'Microsoft® Office Word 2007', '/ModDate': 'D:20141110132727Z', '/Producer': 'Microsoft® Office Word 2007', '/Title': 'Security Target ECC CPU card', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {}.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0883': 1}, 'UK': {'CRP277': 2}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 5, 'EAL1': 1, 'EAL7': 1, 'EAL4 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_ARC': 2}, 'ALC': {'ALC_DVS.2': 5}, 'AVA': {'AVA_VAN.5': 5}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Infineon': {'Infineon Technologies': 1}, 'Gemalto': {'Gemalto': 11}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 2}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 28}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'other': {'JIL': 3}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2012-09-001': 1, 'CCMB-2012-09-002': 1, 'CCMB-2012-09-003': 1, 'CCMB-2012-09-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0883-2013': 2, 'BSI-DSZ-CC-0883-': 1, 'BSI-DSZ-CC-0883': 4}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0035-2007': 1}}, 'cc_security_level': {'EAL': {'EAL5+': 2, 'EAL4': 4, 'EAL4+': 2, 'EAL5': 1, 'EAL4 augmented': 3, 'EAL5 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_COMP.1': 2, 'ADV_ARC.1': 8, 'ADV_FSP.1': 5, 'ADV_FSP.4': 11, 'ADV_TDS.1': 3, 'ADV_TDS.3': 11, 'ADV_IMP.1': 5, 'ADV_FSP.2': 4, 'ADV_IMP': 1, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE.1': 8, 'AGD_PRE.1': 6}, 'ALC': {'ALC_DVS.2': 7, 'ALC_TAT.1': 5, 'ALC_CMC.4': 2, 'ALC_CMS.1': 2, 'ALC_LCD.1': 5, 'ALC_DEL.1': 2, 'ALC_DVS.1': 1, 'ALC_CMS.4': 1}, 'ATE': {'ATE_COV.2': 4, 'ATE_FUN.1': 8, 'ATE_COV.1': 4, 'ATE_DPT.1': 2}, 'AVA': {'AVA_VAN.5': 6}, 'ASE': {'ASE_TSS.2': 1, 'ASE_CCL.1': 1, 'ASE_ECD.1': 4, 'ASE_INT.1': 5, 'ASE_REQ.1': 2, 'ASE_REQ.2': 2, 'ASE_OBJ.2': 3, 'ASE_SPD.1': 2, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 11, 'FAU_SAA.1': 13, 'FAU_GEN.1': 10, 'FAU_ARP.1.1': 2, 'FAU_GEN': 1, 'FAU_GEN.1.1': 2, 'FAU_GEN.1.2': 2, 'FAU_SAA': 1, 'FAU_SAA.1.1': 3, 'FAU_SAA.1.2': 1, 'FAU_SAR': 1, 'FAU_SAR.1.1': 2, 'FAU_SAR.1.2': 2, 'FAU_STG': 1, 'FAU_STG.1.1': 2, 'FAU_STG.1.2': 2, 'FAU_SAS.1': 1, 'FAU_STG.1': 9, 'FAU_SAR.1': 3}, 'FCO': {'FCO_NRO.2': 2, 'FCO_NRO': 6, 'FCO_NRO.1': 3, 'FCO_NRO.2.2': 3, 'FCO_NRO.2.3': 3}, 'FCS': {'FCS_CKM.3': 5, 'FCS_COP.1': 16, 'FCS_CKM': 13, 'FCS_CKM.2': 5, 'FCS_CKM.4': 18, 'FCS_CKM.1': 11, 'FCS_CKM.1.1': 1, 'FCS_CKM.2.1': 1, 'FCS_CKM.3.1': 2, 'FCS_CKM.4.1': 2, 'FCS_COP': 13, 'FCS_COP.1.1': 2, 'FCS_RNG.1': 1}, 'FDP': {'FDP_ACC': 31, 'FDP_IFC': 12, 'FDP_ITC.1': 8, 'FDP_ITC.2': 4, 'FDP_ACF.1': 31, 'FDP_ACC.1': 27, 'FDP_IFF.1': 14, 'FDP_IFC.1': 19, 'FDP_ITC': 6, 'FDP_RIP': 10, 'FDP_ROL': 8, 'FDP_UCT.1': 5, 'FDP_ACC.1.1': 1, 'FDP_ACC.2.2': 1, 'FDP_ACC.2': 9, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_IFC.1.1': 1, 'FDP_IFF': 5, 'FDP_IFF.1.1': 1, 'FDP_IFF.1.2': 1, 'FDP_IFF.1.3': 1, 'FDP_IFF.1.4': 1, 'FDP_IFF.1.5': 1, 'FDP_ITC.1.1': 1, 'FDP_ITC.1.2': 1, 'FDP_ITC.1.3': 1, 'FDP_RIP.1.1': 1, 'FDP_RIP.1': 3, 'FDP_ROL.1.1': 1, 'FDP_ROL.1.2': 1, 'FDP_ROL.1': 4, 'FDP_SDI.1': 4, 'FDP_SDI.2.2': 2, 'FDP_UCT': 1, 'FDP_UCT.1.1': 2, 'FDP_UIT.1.1': 2, 'FDP_UIT.1.2': 2, 'FDP_SDI.2': 6, 'FDP_IFC.2': 3, 'FDP_ITT.1': 1, 'FDP_ACF': 11, 'FDP_UIT.1': 7, 'FDP_IFCC': 1, 'FDP_UTC.1': 1}, 'FIA': {'FIA_UID.1': 21, 'FIA_ATD': 5, 'FIA_SOS.2': 6, 'FIA_UAU': 23, 'FIA_UID': 4, 'FIA_USB': 4, 'FIA_ATD.1': 4, 'FIA_ATD.1.1': 1, 'FIA_SOS': 1, 'FIA_SOS.2.1': 2, 'FIA_SOS.2.2': 2, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.1': 4, 'FIA_UAU.3.1': 2, 'FIA_UAU.3.2': 2, 'FIA_UAU.4.1': 1, 'FIA_UAU.4': 2, 'FIA_UAU.6.1': 1, 'FIA_UAU.6': 2, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_USB.1': 4, 'FIA_UAU.3': 2, 'FIA_UID.2': 1}, 'FMT': {'FMT_MSA.1': 13, 'FMT_MSA.3': 16, 'FMT_MSA': 38, 'FMT_SMR.1': 27, 'FMT_SMF.1': 13, 'FMT_MOF.1': 5, 'FMT_MSA.1.1': 2, 'FMT_MSA.2.1': 1, 'FMT_MSA.2': 1, 'FMT_MSA.3.1': 2, 'FMT_MSA.3.2': 2, 'FMT_MTD': 1, 'FMT_MTD.1.1': 2, 'FMT_SMF': 4, 'FMT_SMF.1.1': 1, 'FMT_SMR': 1, 'FMT_SMR.1.1': 2, 'FMT_SMR.1.2': 2, 'FMT_LIM.1': 2, 'FMT_LIM.2': 2, 'FMT_MTD.1': 5}, 'FPR': {'FPR_UNO.1': 8, 'FPR_UNO': 1, 'FPR_UNO.1.1': 2}, 'FPT': {'FPT_PHP.3': 11, 'FPT_STM.1': 5, 'FPT_TDC.1': 3, 'FPT_FLS.1': 8, 'FPT_ITC.1': 4, 'FPT_ITI.1': 8, 'FPT_PHP.2': 4, 'FPT_RCV.4': 7, 'FPT_RPL.1': 5, 'FPT_TDC': 3, 'FPT_TST.1': 8, 'FPT_FLS': 1, 'FPT_FLS.1.1': 2, 'FPT_ITC': 1, 'FPT_ITC.1.1': 2, 'FPT_ITI': 1, 'FPT_ITI.1.1': 2, 'FPT_ITI.1.2': 2, 'FPT_PHP': 2, 'FPT_PHP.1': 2, 'FPT_PHP.2.2': 2, 'FPT_PHP.2.3': 2, 'FPT_PHP.3.1': 2, 'FPT_RCV.4.1': 2, 'FPT_RPL': 1, 'FPT_RPL.1.1': 2, 'FPT_RPL.1.2': 2, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 1, 'FPT_TST': 1, 'FPT_TST.1.1': 2, 'FPT_TST.1.2': 2, 'FPT_TST.1.3': 2, 'FPT_ITT.1': 1, 'FPT_TST.2': 1}, 'FRU': {'FRU_FLT.2': 2}, 'FTP': {'FTP_ITC.1': 9, 'FTP_TRP.1': 9}}, 'cc_claims': {'D': {'D.EM': 13, 'D.EP_IVDATA': 3, 'D.EP_CODE': 5, 'D.KEYS': 9, 'D.EP_STATE': 5, 'D.LOG_DATA': 4, 'D.COUNTERS': 6, 'D.EP_IV_DATA': 1}, 'O': {'O.AUTH': 13, 'O.OPERATE': 17, 'O.REPLAY': 7, 'O.EM': 6, 'O.CONF_DATA': 12, 'O.INTEG_DATA': 7, 'O.TAMPER': 16, 'O.RECORD': 5, 'O.RND': 1, 'O.MEM_ACCE': 1, 'O.JAVAOBJECT': 10, 'O.CONFID_DATA': 1}, 'T': {'T.COUNTERFEITING_DEBIT': 6, 'T.COUNTERFEITING_CREDIT': 2, 'T.COUNTERFEITING_AUTOLOAD': 6, 'T.COUNTERFEITING_AUTH': 2, 'T.COUNTERFEITING_UPDATE': 4, 'T.DISCLOSURE_KEYS': 10, 'T.INTEG_EM': 6, 'T.INTEG_EP_IVDATA': 2, 'T.INTEG_CODE': 6, 'T.INTEG_KEYS': 3, 'T.INTEG_EP_STATE': 6, 'T.INTEG_LOG_DATA': 3, 'T.INTEG_COUNTERS': 6, 'T.REPLAY_DEBIT': 4, 'T.REPLAY_CREDIT': 3, 'T.REPLAY_AUTOLOAD': 4, 'T.REPLAY_UPDATE': 3, 'T.COUNTERFEITING': 2, 'T.INTEG': 4, 'T.REPLAY': 2, 'T.RND': 1, 'T.INTEG_IVDATA': 1, 'T.INTEG_': 1}, 'A': {'A.PHYSICAL': 4, 'A.PROTECTION_AFTER_TOE_DELIVERY': 3, 'A.PROTECTION_AFTER_TOE_DE': 1}, 'R': {'R.JAVA': 5}, 'OP': {'OP.ARRAY_ACCESS': 2, 'OP.INSTANCE_FIELD': 1, 'OP.INVK_VIRTUAL': 2, 'OP.INVK_INTERFACE': 4, 'OP.THROW': 2, 'OP.TYPE_ACCESS': 2, 'OP.CREATE': 4, 'OP.JAVA': 3, 'OP.PUT': 3}, 'OE': {'OE.SECRET_MNGT': 3, 'OE.DEBIT_BEFORE_CREDIT': 3, 'OE.PURSE_BEHAVIOR': 3, 'OE.PHYSICAL': 3, 'OE.PROTECTION_AFTER_TOE_DELIVERY': 3}, 'OSP': {'OSP.SECRET_MNGT': 4, 'OSP.DEBIT_BEFORE_CREDIT': 3, 'OSP.PURSE_BEHAVIOR': 4}}, 'vendor': {'Infineon': {'Infineon': 11, 'Infineon Technologies': 1}, 'Gemalto': {'Gemalto': 21}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 23}}, 'DES': {'3DES': {'3DES': 5}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 1}, 'ECDSA': {'ECDSA': 1}, 'ECC': {'ECC': 244}}, 'FF': {'DH': {'Diffie-Hellman': 1}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 12}}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 3, 'RND': 2}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Infineon': {'v1.02.013': 3}}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 3, 'Physical Probing': 2, 'physical probing': 3, 'Side channel': 1}, 'FI': {'physical tampering': 13, 'Physical tampering': 1, 'Malfunction': 4, 'malfunction': 3}, 'other': {'JIL': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'RFC': {'RFC3447': 1}, 'CC': {'CCMB-2012-09-001': 1, 'CCMB-2012-09-002': 1, 'CCMB-2012-09-003': 1, 'CCMB-2012-09-004': 1}}, 'javacard_version': {'JavaCard': {'Java Card 2.2': 1}}, 'javacard_api_const': {'misc': {'TYPE_ACCESS': 2}}, 'javacard_packages': {'javacard': {'javacard.security': 1}}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'Crypto libs) written in native language, The IC M7794 The elements out of scope of the TOE are: Other application(s': 1, 'libraries itself) (Crypto libs) written in native language, The IC M7794 The elements out of scope of the TOE are: Other application(s) written in java language 2.3.2 Logical scope of the TOE The': 1}}}.
    • The report_filename property was set to CRP277.pdf.
    • The st_filename property was set to ST277.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to CRP277.
    • The st_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0883-2013']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0883-2013']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP277.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST277.pdf.

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}]} values discarded.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The report_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
    • The st_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name ECC CPU card (Version 1.2) was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": null,
  "dgst": "00c1aeb0ae6b7195",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "CRP277",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_COMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.2"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": [],
    "prev_certificates": [],
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0883-2013"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0883-2013"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Gemalto",
  "manufacturer_web": "https://www.gemalto.com/",
  "name": "ECC CPU card (Version 1.2)",
  "not_valid_after": "2019-10-19",
  "not_valid_before": "2014-10-19",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "CRP277.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 28
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0883": 1
        },
        "UK": {
          "CRP277": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 2
        },
        "ALC": {
          "ALC_DVS.2": 5
        },
        "AVA": {
          "AVA_VAN.5": 5
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL1": 1,
          "EAL4": 5,
          "EAL4 augmented": 2,
          "EAL7": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "other": {
          "JIL": 3
        }
      },
      "standard_id": {
        "CC": {
          "CCMB-2012-09-001": 1,
          "CCMB-2012-09-002": 1,
          "CCMB-2012-09-003": 1,
          "CCMB-2012-09-004": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 2
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Gemalto": {
          "Gemalto": 11
        },
        "Infineon": {
          "Infineon Technologies": 1
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20141110162819Z",
      "/ModDate": "D:20141110163029Z",
      "pdf_file_size_bytes": 841676,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.ukas.org/",
          "http://www.commoncriteriaportal.org/",
          "http://www.sogisportal.eu/",
          "http://www.cesg.gov.uk/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 18
    },
    "st_filename": "ST277.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 244
          },
          "ECDH": {
            "ECDH": 1
          },
          "ECDSA": {
            "ECDSA": 1
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 1
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0883": 4,
          "BSI-DSZ-CC-0883-": 1,
          "BSI-DSZ-CC-0883-2013": 2
        }
      },
      "cc_claims": {
        "A": {
          "A.PHYSICAL": 4,
          "A.PROTECTION_AFTER_TOE_DE": 1,
          "A.PROTECTION_AFTER_TOE_DELIVERY": 3
        },
        "D": {
          "D.COUNTERS": 6,
          "D.EM": 13,
          "D.EP_CODE": 5,
          "D.EP_IVDATA": 3,
          "D.EP_IV_DATA": 1,
          "D.EP_STATE": 5,
          "D.KEYS": 9,
          "D.LOG_DATA": 4
        },
        "O": {
          "O.AUTH": 13,
          "O.CONFID_DATA": 1,
          "O.CONF_DATA": 12,
          "O.EM": 6,
          "O.INTEG_DATA": 7,
          "O.JAVAOBJECT": 10,
          "O.MEM_ACCE": 1,
          "O.OPERATE": 17,
          "O.RECORD": 5,
          "O.REPLAY": 7,
          "O.RND": 1,
          "O.TAMPER": 16
        },
        "OE": {
          "OE.DEBIT_BEFORE_CREDIT": 3,
          "OE.PHYSICAL": 3,
          "OE.PROTECTION_AFTER_TOE_DELIVERY": 3,
          "OE.PURSE_BEHAVIOR": 3,
          "OE.SECRET_MNGT": 3
        },
        "OP": {
          "OP.ARRAY_ACCESS": 2,
          "OP.CREATE": 4,
          "OP.INSTANCE_FIELD": 1,
          "OP.INVK_INTERFACE": 4,
          "OP.INVK_VIRTUAL": 2,
          "OP.JAVA": 3,
          "OP.PUT": 3,
          "OP.THROW": 2,
          "OP.TYPE_ACCESS": 2
        },
        "OSP": {
          "OSP.DEBIT_BEFORE_CREDIT": 3,
          "OSP.PURSE_BEHAVIOR": 4,
          "OSP.SECRET_MNGT": 4
        },
        "R": {
          "R.JAVA": 5
        },
        "T": {
          "T.COUNTERFEITING": 2,
          "T.COUNTERFEITING_AUTH": 2,
          "T.COUNTERFEITING_AUTOLOAD": 6,
          "T.COUNTERFEITING_CREDIT": 2,
          "T.COUNTERFEITING_DEBIT": 6,
          "T.COUNTERFEITING_UPDATE": 4,
          "T.DISCLOSURE_KEYS": 10,
          "T.INTEG": 4,
          "T.INTEG_": 1,
          "T.INTEG_CODE": 6,
          "T.INTEG_COUNTERS": 6,
          "T.INTEG_EM": 6,
          "T.INTEG_EP_IVDATA": 2,
          "T.INTEG_EP_STATE": 6,
          "T.INTEG_IVDATA": 1,
          "T.INTEG_KEYS": 3,
          "T.INTEG_LOG_DATA": 3,
          "T.REPLAY": 2,
          "T.REPLAY_AUTOLOAD": 4,
          "T.REPLAY_CREDIT": 3,
          "T.REPLAY_DEBIT": 4,
          "T.REPLAY_UPDATE": 3,
          "T.RND": 1
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP-0035-2007": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 8,
          "ADV_COMP.1": 2,
          "ADV_FSP.1": 5,
          "ADV_FSP.2": 4,
          "ADV_FSP.4": 11,
          "ADV_IMP": 1,
          "ADV_IMP.1": 5,
          "ADV_TDS.1": 3,
          "ADV_TDS.2": 1,
          "ADV_TDS.3": 11
        },
        "AGD": {
          "AGD_OPE.1": 8,
          "AGD_PRE.1": 6
        },
        "ALC": {
          "ALC_CMC.4": 2,
          "ALC_CMS.1": 2,
          "ALC_CMS.4": 1,
          "ALC_DEL.1": 2,
          "ALC_DVS.1": 1,
          "ALC_DVS.2": 7,
          "ALC_LCD.1": 5,
          "ALC_TAT.1": 5
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 4,
          "ASE_INT.1": 5,
          "ASE_OBJ.2": 3,
          "ASE_REQ.1": 2,
          "ASE_REQ.2": 2,
          "ASE_SPD.1": 2,
          "ASE_TSS.1": 1,
          "ASE_TSS.2": 1
        },
        "ATE": {
          "ATE_COV.1": 4,
          "ATE_COV.2": 4,
          "ATE_DPT.1": 2,
          "ATE_FUN.1": 8
        },
        "AVA": {
          "AVA_VAN.5": 6
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 4,
          "EAL4 augmented": 3,
          "EAL4+": 2,
          "EAL5": 1,
          "EAL5 augmented": 1,
          "EAL5+": 2
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 11,
          "FAU_ARP.1.1": 2,
          "FAU_GEN": 1,
          "FAU_GEN.1": 10,
          "FAU_GEN.1.1": 2,
          "FAU_GEN.1.2": 2,
          "FAU_SAA": 1,
          "FAU_SAA.1": 13,
          "FAU_SAA.1.1": 3,
          "FAU_SAA.1.2": 1,
          "FAU_SAR": 1,
          "FAU_SAR.1": 3,
          "FAU_SAR.1.1": 2,
          "FAU_SAR.1.2": 2,
          "FAU_SAS.1": 1,
          "FAU_STG": 1,
          "FAU_STG.1": 9,
          "FAU_STG.1.1": 2,
          "FAU_STG.1.2": 2
        },
        "FCO": {
          "FCO_NRO": 6,
          "FCO_NRO.1": 3,
          "FCO_NRO.2": 2,
          "FCO_NRO.2.2": 3,
          "FCO_NRO.2.3": 3
        },
        "FCS": {
          "FCS_CKM": 13,
          "FCS_CKM.1": 11,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 5,
          "FCS_CKM.2.1": 1,
          "FCS_CKM.3": 5,
          "FCS_CKM.3.1": 2,
          "FCS_CKM.4": 18,
          "FCS_CKM.4.1": 2,
          "FCS_COP": 13,
          "FCS_COP.1": 16,
          "FCS_COP.1.1": 2,
          "FCS_RNG.1": 1
        },
        "FDP": {
          "FDP_ACC": 31,
          "FDP_ACC.1": 27,
          "FDP_ACC.1.1": 1,
          "FDP_ACC.2": 9,
          "FDP_ACC.2.2": 1,
          "FDP_ACF": 11,
          "FDP_ACF.1": 31,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 1,
          "FDP_IFC": 12,
          "FDP_IFC.1": 19,
          "FDP_IFC.1.1": 1,
          "FDP_IFC.2": 3,
          "FDP_IFCC": 1,
          "FDP_IFF": 5,
          "FDP_IFF.1": 14,
          "FDP_IFF.1.1": 1,
          "FDP_IFF.1.2": 1,
          "FDP_IFF.1.3": 1,
          "FDP_IFF.1.4": 1,
          "FDP_IFF.1.5": 1,
          "FDP_ITC": 6,
          "FDP_ITC.1": 8,
          "FDP_ITC.1.1": 1,
          "FDP_ITC.1.2": 1,
          "FDP_ITC.1.3": 1,
          "FDP_ITC.2": 4,
          "FDP_ITT.1": 1,
          "FDP_RIP": 10,
          "FDP_RIP.1": 3,
          "FDP_RIP.1.1": 1,
          "FDP_ROL": 8,
          "FDP_ROL.1": 4,
          "FDP_ROL.1.1": 1,
          "FDP_ROL.1.2": 1,
          "FDP_SDI.1": 4,
          "FDP_SDI.2": 6,
          "FDP_SDI.2.2": 2,
          "FDP_UCT": 1,
          "FDP_UCT.1": 5,
          "FDP_UCT.1.1": 2,
          "FDP_UIT.1": 7,
          "FDP_UIT.1.1": 2,
          "FDP_UIT.1.2": 2,
          "FDP_UTC.1": 1
        },
        "FIA": {
          "FIA_ATD": 5,
          "FIA_ATD.1": 4,
          "FIA_ATD.1.1": 1,
          "FIA_SOS": 1,
          "FIA_SOS.2": 6,
          "FIA_SOS.2.1": 2,
          "FIA_SOS.2.2": 2,
          "FIA_UAU": 23,
          "FIA_UAU.1": 4,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.3": 2,
          "FIA_UAU.3.1": 2,
          "FIA_UAU.3.2": 2,
          "FIA_UAU.4": 2,
          "FIA_UAU.4.1": 1,
          "FIA_UAU.6": 2,
          "FIA_UAU.6.1": 1,
          "FIA_UID": 4,
          "FIA_UID.1": 21,
          "FIA_UID.2": 1,
          "FIA_USB": 4,
          "FIA_USB.1": 4,
          "FIA_USB.1.1": 1,
          "FIA_USB.1.2": 1,
          "FIA_USB.1.3": 1
        },
        "FMT": {
          "FMT_LIM.1": 2,
          "FMT_LIM.2": 2,
          "FMT_MOF.1": 5,
          "FMT_MSA": 38,
          "FMT_MSA.1": 13,
          "FMT_MSA.1.1": 2,
          "FMT_MSA.2": 1,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 16,
          "FMT_MSA.3.1": 2,
          "FMT_MSA.3.2": 2,
          "FMT_MTD": 1,
          "FMT_MTD.1": 5,
          "FMT_MTD.1.1": 2,
          "FMT_SMF": 4,
          "FMT_SMF.1": 13,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 1,
          "FMT_SMR.1": 27,
          "FMT_SMR.1.1": 2,
          "FMT_SMR.1.2": 2
        },
        "FPR": {
          "FPR_UNO": 1,
          "FPR_UNO.1": 8,
          "FPR_UNO.1.1": 2
        },
        "FPT": {
          "FPT_FLS": 1,
          "FPT_FLS.1": 8,
          "FPT_FLS.1.1": 2,
          "FPT_ITC": 1,
          "FPT_ITC.1": 4,
          "FPT_ITC.1.1": 2,
          "FPT_ITI": 1,
          "FPT_ITI.1": 8,
          "FPT_ITI.1.1": 2,
          "FPT_ITI.1.2": 2,
          "FPT_ITT.1": 1,
          "FPT_PHP": 2,
          "FPT_PHP.1": 2,
          "FPT_PHP.2": 4,
          "FPT_PHP.2.2": 2,
          "FPT_PHP.2.3": 2,
          "FPT_PHP.3": 11,
          "FPT_PHP.3.1": 2,
          "FPT_RCV.4": 7,
          "FPT_RCV.4.1": 2,
          "FPT_RPL": 1,
          "FPT_RPL.1": 5,
          "FPT_RPL.1.1": 2,
          "FPT_RPL.1.2": 2,
          "FPT_STM.1": 5,
          "FPT_TDC": 3,
          "FPT_TDC.1": 3,
          "FPT_TDC.1.1": 1,
          "FPT_TDC.1.2": 1,
          "FPT_TST": 1,
          "FPT_TST.1": 8,
          "FPT_TST.1.1": 2,
          "FPT_TST.1.2": 2,
          "FPT_TST.1.3": 2,
          "FPT_TST.2": 1
        },
        "FRU": {
          "FRU_FLT.2": 2
        },
        "FTP": {
          "FTP_ITC.1": 9,
          "FTP_TRP.1": 9
        }
      },
      "certification_process": {
        "OutOfScope": {
          "Crypto libs) written in native language,  The IC M7794 The elements out of scope of the TOE are:  Other application(s": 1,
          "libraries itself) (Crypto libs) written in native language,  The IC M7794 The elements out of scope of the TOE are:  Other application(s) written in java language 2.3.2 Logical scope of the TOE The": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "Infineon": {
          "v1.02.013": 3
        }
      },
      "crypto_protocol": {},
      "crypto_scheme": {
        "MAC": {
          "MAC": 12
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {
        "misc": {
          "TYPE_ACCESS": 2
        }
      },
      "javacard_packages": {
        "javacard": {
          "javacard.security": 1
        }
      },
      "javacard_version": {
        "JavaCard": {
          "Java Card 2.2": 1
        }
      },
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 2,
          "RNG": 3
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 4,
          "Physical tampering": 1,
          "malfunction": 3,
          "physical tampering": 13
        },
        "SCA": {
          "Leak-Inherent": 3,
          "Physical Probing": 2,
          "Side channel": 1,
          "physical probing": 3
        },
        "other": {
          "JIL": 1
        }
      },
      "standard_id": {
        "CC": {
          "CCMB-2012-09-001": 1,
          "CCMB-2012-09-002": 1,
          "CCMB-2012-09-003": 1,
          "CCMB-2012-09-004": 1
        },
        "RFC": {
          "RFC3447": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 23
          }
        },
        "DES": {
          "3DES": {
            "3DES": 5
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Gemalto": {
          "Gemalto": 21
        },
        "Infineon": {
          "Infineon": 11,
          "Infineon Technologies": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "C. Teri",
      "/CreationDate": "D:20140930094956+02\u002700\u0027",
      "/Creator": "Microsoft\u00ae Office Word 2007",
      "/ModDate": "D:20141110132727Z",
      "/Producer": "Microsoft\u00ae Office Word 2007",
      "/Title": "Security Target ECC CPU card",
      "pdf_file_size_bytes": 1345514,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 104
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP277.pdf",
  "scheme": "UK",
  "security_level": {
    "_type": "Set",
    "elements": [
      "AVA_VAN.5",
      "EAL4+",
      "ALC_DVS.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST277.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "202bfbaa6783147e7bd95ace771fd66daf91e57e5f790d4b990e4ee0a0e27286",
      "txt_hash": "cebabf563b38d2d564982be49acea4979c84773b80dd8709b65d1f4b6fa9c050"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "c7735c1a6df01e07bbc01d349d93da59b8f44af3984cbc17b8301fc562a7dd6b",
      "txt_hash": "b02092709ada64c44d9eec768bb2c7e97bdf05b35ac06d9af8844f7b2915285c"
    }
  },
  "status": "archived"
}