NFC FlyBuy on S3FS91J

CSV information ?

Status archived
Valid from 12.07.2011
Valid until 01.09.2019
Scheme 🇫🇷 FR
Manufacturer Oberthur Technologies
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level AVA_VAN.5, ALC_DVS.2, EAL4+
Maintenance updates Rapport de maintenance ANSSI-CC-2011/24-M01 (24.10.2012) Certification report

Heuristics summary ?

Certificate ID: ANSSI-CC-2011/24

Certificate ?

Certification report ?

Extracted keywords

Symmetric Algorithms
DES, Triple-DES
Hash functions
SHA-1
Block cipher modes
ECB, CBC

JavaCard versions
Java Card 3.0.1
Vendor
Samsung, Oberthur Technologies, Oberthur

Security level
EAL 4, EAL4, EAL5, EAL7, EAL 1, EAL 3, EAL 5, EAL 7, ITSEC E6 Elevé
Security Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSS
Protection profiles
BSI-PP-0035, BSI-PP- 0035, BSI-PP-0035-2007
Certificates
ANSSI-CC-2011/24, ANSSI-CC-2009/57
Evaluation facilities
THALES - CEACI

Standards
SCP 80, CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004

File metadata

Creation date D:20110713100055+02'00'
Modification date D:20110713100055+02'00'
Pages 21
Producer Acrobat Distiller 8.1.0 (Windows)

Frontpage

Certificate ID ANSSI-CC-2011/24
Certified item NFC FlyBuy sur S3FS91J
Certification lab THALES - CEACI (T3S – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France TĂ©l : +33 (0)5 62 88 28 01 ou 18, mĂ©l : [email protected]
Developer Oberthur Technologies 71-73 chemin des Hautes Pâtures, 92 726 NANTERRE CEDEX, France Samsung Electronics Co. Ltd San#24 Nongseo-Ri, Giheung-Eup, Yongin-City, Gyeonggi-Do, 449-711, République de Corée Commanditaire Oberthur Technologies 71-73 chemin des Hautes Pâtures, 92 726 NANTERRE CEDEX, France

References

Outgoing
  • ANSSI-CC-2009/57 - archived - SAMSUNG Microcontroller RISC 32-bits S3FS91J / S3FS91H / S3FS91V / S3FS93I with SWP, Rev. 7
Incoming

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES, TDES
Asymmetric Algorithms
RSA 2048, Diffie-Hellman
Hash functions
SHA-1, SHA256, SHA384, SHA512, SHA-224, SHA-256, SHA-384, SHA-512
Schemes
MAC
Randomness
RNG
Block cipher modes
CBC

JavaCard versions
GlobalPlatform 2.1.1
JavaCard API constants
TYPE_ACCESS
Vendor
Samsung, Oberthur Technologies, Oberthur, OBERTHUR

Security level
EAL4, EAL4+, EAL 4, EAL4 augmented, EAL 4 augmented
Claims
D.APSD_KEYS, D.CASD_KEYS, D.ISD_KEYS, D.VASD_KEYS, D.GP_CODE, D.CARD_MNGT_DATA, D.APP_CODE, D.APP_C_DATA, D.APP_I_DATA, D.PIN, D.API_DATA, D.CRYPTO, D.JCS_CODE, D.JCS_DATA, D.SEC_DATA, O.CARD-, O.SCP, O.CARD-MANAGEMENT, O.DOMAIN-RIGHTS, O.APPLI-AUTH, O.COMM_AUTH, O.COMM_INTEGRITY, O.COMM_CONFIDENTIALITY, O.SID, O.FIREWALL, O.GLOBAL_ARRAYS_CONFID, O.GLOBAL_ARRAYS_INTEG, O.NATIVE, O.OPERATE, O.REALLOCATION, O.RESOURCES, O.ALARM, O.CIPHER, O.KEY-MNGT, O.PIN-MNGT, O.TRANSACTION, O.REMOTE, O.OBJ-DELETION, O.DELETION, O.LOAD, O.INSTALL, O.SCPP, O.SCP-IC, O.SCP-SUPPORT, O.DOMAIN-, O.KEY-, O.COMM_CONFIDENTIALI, O.GLOBAL_ARRAYS_CON, O.GLOBAL_ARRAYS_INTE, O.APPLET, O.CODE_PKG, O.JAVAOBJECT, O.REMOTE_MTH, O.REMOTE_OBJ, O.RMI_SERVICE, O.ROR, O.REMOTE_MTHD, O.GLOBAL_ARRAYS_CONFI, O.PIN-, O.OBJ-, T.PHYSICAL, T.INTEG-USER-DATA, T.COM_EXPLOIT, T.UNAUTHORIZED_CARD_MNGT, T.LIFE_CYCLE, T.UNAUTHORIZED_ACCESS, T.CONFID-APPLI-DATA, T.CONFID-JCS-CODE, T.CONFID-JCS-DATA, T.INTEG-APPLI-CODE, T.INTEG-APPLI-DATA, T.INTEG-JCS-CODE, T.INTEG-JCS-DATA, T.SID, T.EXE-CODE, T.NATIVE, T.EXE-CODE-REMOTE, T.RESOURCES, T.OBJ-DELETION, T.INSTALL, T.DELETION, T.UNAUTHORIZED_CARD_MNG, T.CONFID-JCS-, T.INTEG-, T.EXE-, T.INTEG-APPLI-, A.MOBILE-OPERATOR, A.OTA-ADMIN, A.APPS-PROVIDER, A.VERIFICATION-AUTHORITY, A.KEY-ESCROW, A.CONTROLLING-AUTHORITY, A.APPLET, A.VERIFICATION, A.VERIFICATION-, A.CONTROLLING-, R.JAVA, OP.SEND, OP.RECEIVE, OP.ARRAY_ACCESS, OP.CREATE, OP.DELETE_APPLET, OP.DELETE_PCKG, OP.DELETE_PCKG_APPLET, OP.GET_ROR, OP.INSTANCE_FIELD, OP.INVK_VIRTUAL, OP.INVK_INTERFACE, OP.INVOKE, OP.JAVA, OP.THROW, OP.TYPE_ACCESS, OP.PUT, OP.RET_RORD, OE.SCP, OE.PRODUCTION, OE.PERSONALIZER, OE.KEY-CHANGE, OE.MOBILE-OPERATOR, OE.OTA-ADMIN, OE.APPS-PROVIDER, OE.VERIFICATION-AUTHORITY, OE.KEY-ESCROW, OE.CONTROLLING-AUTHORITY, OE.SECURE-APPS-CERTIFICATION, OE.BASIC-APPS-VALIDATION, OE.AID-MANAGEMENT, OE.OTA-LOADING, OE.OTA-SERVERS, OE.AP-KEYS, OE.OPERATOR-KEYS, OE.KEY-GENERATION, OE.CA-KEYS, OE.VA-KEYS, OE.SECURITY-DOMAINS, OE.QUOTAS, OE.SHARE-CONTROL, OE.APPLET, OE.VERIFICATION, OE.VERIFICATION-, OE.CONTROLLING-, OE.SECURE-APPS-, OE.BASIC-APPS-, OSP.SECURE-APPS-CERTIFICATION, OSP.BASIC-APPS-VALIDATION, OSP.SHARE-CONTROL, OSP.AID-MANAGEMENT, OSP.OTA-LOADING, OSP.OTA-SERVERS, OSP.APSD-KEYS, OSP.OPERATOR-KEYS, OSP.KEY-GENERATION, OSP.CASD-KEYS, OSP.VASD-KEYS, OSP.KEY-CHANGE, OSP.SECURITY-DOMAINS, OSP.QUOTAS, OSP.VERIFICATION, OSP.SECURE-APPS-
Security Assurance Requirements (SAR)
ADV_ARC, ADV_ARC.1, ADV_FSP, ADV_FSP.4, ADV_IMP, ADV_IMP.1, ADV_TDS, ADV_TDS.3, ADV_FSP.1, ADV_TDS.1, ADV_FSP.2, ADV_TDS.2, ADV_IMP.2, AGD_PRE.1, AGD_PRE, AGD_OPE, AGD_ADM, AGD_USR, AGD_OPE.1, ALC_DVS, ALC_DVS.2, ALC_CMC, ALC_CMC.4, ALC_CMS, ALC_CMS.4, ALC_DEL, ALC_DEL.1, ALC_LCD, ALC_LCD.1, ALC_TAT, ALC_TAT.1, ALC_CMS.1, ALC_DVS.1, ATE_COV, ATE_COV.2, ATE_DPT, ATE_DPT.1, ATE_FUN, ATE_FUN.1, ATE_IND, ATE_IND.2, ATE_COV.1, AVA_VAN.5, AVA_VAN, ASE_CCL, ASE_CCL.1, ASE_ECD, ASE_ECD.1, ASE_INT, ASE_INT.1, ASE_OBJ, ASE_OBJ.2, ASE_REQ, ASE_REQ.2, ASE_SPD, ASE_SPD.1, ASE_APD.1, ASE_TSS, ASE_TSS.1, ASE_REQ.1
Security Functional Requirements (SFR)
FAU_ARP.1, FAU_ARP.1.1, FAU_SAA.1, FCO_NRO, FCO_NRO.2, FCS_RNG, FCS_RNG.1, FCS_COP, FCS_COP.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM.1, FCS_CKM.1.1, FCS_CKM.2, FCS_CKM.2.1, FCS_CKM.3, FCS_CKM.3.1, FCS_CKM.4, FCS_CKM.4.1, FCS_COP.1.1, FDP_UIT, FDP_UIT.1, FDP_ROL, FDP_ROL.1, FDP_ITC, FDP_ITC.2, FDP_ACF, FDP_ACF.1, FDP_ACC, FDP_ACC.1, FDP_IFC, FDP_IFC.2, FDP_IFF, FDP_IFF.1, FDP_IFF.1.4, FDP_IFF.1.2, FDP_ACC.2, FDP_IFC.1, FDP_RIP, FDP_RIP.1, FDP_SDI.2, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ITC.1, FIA_AFL, FIA_UAU, FIA_UID, FIA_UID.1, FIA_UAU.1, FIA_UAU.4, FIA_AFL.1, FIA_UAU.7, FIA_ATD, FIA_ATD.1, FIA_UID.2, FIA_USB, FIA_USB.1, FMT_MSA, FMT_MSA.1, FMT_SMF.1, FMT_SMR, FMT_SMR.1, FMT_MSA.3, FMT_MSA.3.1, FMT_SMF, FMT_MSA.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD, FMT_MTD.1, FMT_MTD.3, FMT_REV.1, FMT_REV, FPR_UNO, FPR_UNO.1, FPR_UNO.1.1, FPT_TDC, FPT_FLS, FPT_PHP, FPT_RCV, FPT_FLS.1, FPT_TDC.1, FPT_FLS.1.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_RCV.3, FPT_PHP.3, FPT_RCV.4, FPT_TST.1, FRU_FLT, FRU_FLT.1, FTP_ITC, FTP_ITC.1, FTP_TRP.1
Protection profiles
BSI-PP-0035, ANSSI-CC-PP 2010/04
Certificates
ANSSI-CC-PP 2010/04, ANSSI-CC-2009/57

Side-channel analysis
physical probing, DPA, physical tampering, malfunction
Certification process
out of scope, a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are

Standards
FIPS PUB 46-3, FIPS PUB 81, FIPS PUB 180-3, FIPS PUB 186-3, FIPS PUB 197, FIPS 186-3, FIPS 140-2, PKCS#1, SCP02, SCP80, SCP 80

File metadata

Creation date D:20110713095952+02'00'
Modification date D:20110713095952+02'00'
Pages 191
Producer GPL Ghostscript 8.61

References

Outgoing
  • ANSSI-CC-2009/57 - archived - SAMSUNG Microcontroller RISC 32-bits S3FS91J / S3FS91H / S3FS91V / S3FS93I with SWP, Rev. 7

Heuristics ?

Certificate ID: ANSSI-CC-2011/24

Extracted SARs

ADV_ARC.1, ADV_FSP.4, ADV_IMP.2, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.1, ASE_APD.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.5

Scheme data ?

Product NFC FlyBuy sur S3FS91J
Url https://cyber.gouv.fr/produits-certifies/nfc-flybuy-sur-s3fs91j
Description Le produit certifié est la plateforme (U)SIM Java Card « NFC FlyBuy sur S3FS91J », dont la version du système d'exploitation natif est 075895 et la version du Card Manager1 en Java Card est GOP Ref V1.5.o. Cette plateforme est développée par Oberthur Technologies et Samsung Electronics Co. Ltd. Le produit est une plateforme (U)SIM Java Card ouverte pouvant être insérée dans un téléphone por
Sponsor Oberthur Technologies
Developer Oberthur Technologies et Samsung Electronics Co. Ltd
Cert Id ANSSI-CC-2011/24
Level EAL4+
Enhanced
Cert Id ANSSI-CC-2011/24
Certification Date 12.07.2011
Category Cartes Ă  puce
Cc Version Critères Communs version 3.1r3
Developer Oberthur Technologies et Samsung Electronics Co. Ltd
Sponsor Oberthur Technologies
Evaluation Facility THALES - CEACI (T3S – CNES)
Level EAL4+
Protection Profile ANSSI-CC-PP-2010/04
Mutual Recognition SOG-IS CCRA
Augmented ALC_DVS.2, AVA_VAN.5
Target Link https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2011-24en.pdf
Report Link https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2011-24fr.pdf

References ?

Updates ?

  • 16.12.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'NFC FlyBuy sur S3FS91J', 'url': 'https://cyber.gouv.fr/produits-certifies/nfc-flybuy-sur-s3fs91j', 'description': 'Le produit certifiĂ© est la plateforme (U)SIM Java Card « NFC FlyBuy sur S3FS91J », dont la version du système d'exploitation natif est 075895 et la version du Card Manager1 en Java Card est GOP Ref V1.5.o. Cette plateforme est dĂ©veloppĂ©e par Oberthur Technologies et Samsung Electronics Co. Ltd. Le produit est une plateforme (U)SIM Java Card ouverte pouvant ĂŞtre insĂ©rĂ©e dans un tĂ©lĂ©phone por', 'sponsor': 'Oberthur Technologies', 'developer': 'Oberthur Technologies et Samsung Electronics Co. Ltd', 'cert_id': 'ANSSI-CC-2011/24', 'level': 'EAL4+', 'enhanced': {'cert_id': 'ANSSI-CC-2011/24', 'certification_date': '2011-07-12', 'category': 'Cartes Ă  puce', 'cc_version': 'Critères Communs version 3.1r3', 'developer': 'Oberthur Technologies et Samsung Electronics Co. Ltd', 'sponsor': 'Oberthur Technologies', 'evaluation_facility': 'THALES - CEACI (T3S – CNES)', 'level': 'EAL4+', 'protection_profile': 'ANSSI-CC-PP-2010/04', 'mutual_recognition': 'SOG-IS CCRA', 'augmented': 'ALC_DVS.2, AVA_VAN.5', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2011-24en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2011-24fr.pdf'}}.
  • 09.12.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 21.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'prev_certificates': [], 'next_certificates': []}.
  • 09.11.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The st_keywords property was updated, with the {'cc_cert_id': {'__update__': {'FR': {'__insert__': {'ANSSI-CC-PP 2010/04': 1}}}}} data.

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'description': 'Le produit certifiĂ© est la plateforme (U)SIM Java Card « NFC FlyBuy sur S3FS91J », dont la version du système d'exploitation natif est 075895 et la version du Card Manager1 en Java Card est GOP Ref V1.5.o. Cette plateforme est dĂ©veloppĂ©e par Oberthur Technologies et Samsung Electronics Co. Ltd. Le produit est une plateforme (U)SIM Java Card ouverte pouvant ĂŞtre insĂ©rĂ©e dans un tĂ©lĂ©phone por', 'cert_id': 'ANSSI-CC-2011/24', 'enhanced': {'__update__': {'cert_id': 'ANSSI-CC-2011/24', 'certification_date': '2011-07-12', 'mutual_recognition': 'SOG-IS CCRA'}}} data.
  • 14.10.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'NFC FlyBuy sur S3FS91J', 'url': 'https://cyber.gouv.fr/produits-certifies/nfc-flybuy-sur-s3fs91j', 'description': 'Le produit certifiĂ© est la plateforme (U)SIM Java Card « NFC FlyBuy sur S3FS91J », dont la version du système d'exploitation natif est 075895 et la version du Card Manager1 en Java Card est GOP Ref V1.5.o. Cette plateforme est dĂ©veloppĂ©e par Oberthur Technologies et Samsung Electronics Co. Ltd.\n\nLe produit est une plateforme (U)SIM Java Card ouverte pouvant ĂŞtre insĂ©rĂ©e dans un tĂ©lĂ©phone por', 'sponsor': 'Oberthur Technologies', 'developer': 'Oberthur Technologies et Samsung Electronics Co. Ltd', 'cert_id': '2011/24', 'level': 'EAL4+', 'enhanced': {'cert_id': '2011/24', 'certification_date': '12/07/2011', 'category': 'Cartes Ă  puce', 'cc_version': 'Critères Communs version 3.1r3', 'developer': 'Oberthur Technologies et Samsung Electronics Co. Ltd', 'sponsor': 'Oberthur Technologies', 'evaluation_facility': 'THALES - CEACI (T3S – CNES)', 'level': 'EAL4+', 'protection_profile': 'ANSSI-CC-PP-2010/04', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ALC_DVS.2, AVA_VAN.5', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2011-24en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2011-24fr.pdf'}}.
  • 02.09.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'f56348cd6c69307c10472582eb65da6b272390409085ececec8d1c99b27b41dd', 'txt_hash': '329fccce4a1cb1dd67e78e9cd7c630b819693a0689ddd3798a9b3e4144bf6983'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'bcf661a98f7f4f61d5d6cf60effa75e2b465149839a0af9f02d27aa7ad3f4ec9', 'txt_hash': '06acc16a060d7fea219e6d2c0ab8d1e5892368506d624f3d469e68696620c977'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 544621, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 21, '/CreationDate': "D:20110713100055+02'00'", '/Keywords': '', '/ModDate': "D:20110713100055+02'00'", '/Producer': 'Acrobat Distiller 8.1.0 (Windows)', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 1275792, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 191, '/CreationDate': "D:20110713095952+02'00'", '/Keywords': '', '/ModDate': "D:20110713095952+02'00'", '/Producer': 'GPL Ghostscript 8.61', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {'FR': {'match_rules': ['RĂ©fĂ©rence du rapport de certification(.+)Nom du produit(.+)RĂ©fĂ©rence/version du produit(.+)ConformitĂ© Ă  un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)DĂ©veloppeur\\(s\\)(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables'], 'cert_id': 'ANSSI-CC-2011/24', 'cert_item': 'NFC FlyBuy sur S3FS91J', 'cert_item_version': 'version du système d’exploitation en natif : 075895 version du Card Manager en Java Card : GOP Ref V1.5.o', 'ref_protection_profiles': 'PP (U)SIM], version 2.0.2, certifiĂ© par l’ANSSI (U)SIM Java Card Platform Protection Profile Basic and SCWS Configurations Evolutive Certification Scheme for (U)SIM cards', 'cc_version': 'Critères Communs version 3.1 rĂ©vision 3', 'cc_security_level': 'EAL 4 augmentĂ© ALC_DVS.2, AVA_VAN.5', 'developer': 'Oberthur Technologies 71-73 chemin des Hautes Pâtures, 92 726 NANTERRE CEDEX, France Samsung Electronics Co. Ltd San#24 Nongseo-Ri, Giheung-Eup, Yongin-City, Gyeonggi-Do, 449-711, RĂ©publique de CorĂ©e Commanditaire Oberthur Technologies 71-73 chemin des Hautes Pâtures, 92 726 NANTERRE CEDEX, France', 'cert_lab': 'THALES - CEACI (T3S – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France TĂ©l : +33 (0)5 62 88 28 01 ou 18, mĂ©l : [email protected]'}}.
    • The report_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2011/24': 22, 'ANSSI-CC-2009/57': 4}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0035': 1, 'BSI-PP- 0035': 1, 'BSI-PP-0035-2007': 1}}, 'cc_security_level': {'EAL': {'EAL 4': 2, 'EAL4': 2, 'EAL5': 1, 'EAL7': 1, 'EAL 1': 1, 'EAL 3': 1, 'EAL 5': 1, 'EAL 7': 1}, 'ITSEC': {'ITSEC E6 ElevĂ©': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 2}, 'ALC': {'ALC_DVS.2': 2, 'ALC_FLR': 2, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.5': 2, 'AVA_VAN': 2}, 'ASE': {'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Samsung': {'Samsung': 5}, 'Oberthur': {'Oberthur Technologies': 13, 'Oberthur': 6}}, 'eval_facility': {'Thales': {'THALES - CEACI': 1}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}, '3DES': {'Triple-DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {'ECB': {'ECB': 1}, 'CBC': {'CBC': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'SCP': {'SCP 80': 2}, 'CC': {'CCMB-2009-07-001': 1, 'CCMB-2009-07-002': 1, 'CCMB-2009-07-003': 1, 'CCMB-2009-07-004': 1}}, 'javacard_version': {'JavaCard': {'Java Card 3.0.1': 1}}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2009/57': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0035': 1}, 'ANSSI': {'ANSSI-CC-PP 2010/04': 1}}, 'cc_security_level': {'EAL': {'EAL4': 7, 'EAL4+': 3, 'EAL 4': 3, 'EAL4 augmented': 4, 'EAL 4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_ARC.1': 15, 'ADV_FSP': 1, 'ADV_FSP.4': 20, 'ADV_IMP': 1, 'ADV_IMP.1': 11, 'ADV_TDS': 1, 'ADV_TDS.3': 23, 'ADV_FSP.1': 3, 'ADV_TDS.1': 2, 'ADV_FSP.2': 2, 'ADV_TDS.2': 1, 'ADV_IMP.2': 1}, 'AGD': {'AGD_PRE.1': 12, 'AGD_PRE': 2, 'AGD_OPE': 3, 'AGD_ADM': 1, 'AGD_USR': 1, 'AGD_OPE.1': 19}, 'ALC': {'ALC_DVS': 8, 'ALC_DVS.2': 14, 'ALC_CMC': 1, 'ALC_CMC.4': 16, 'ALC_CMS': 1, 'ALC_CMS.4': 7, 'ALC_DEL': 1, 'ALC_DEL.1': 6, 'ALC_LCD': 1, 'ALC_LCD.1': 9, 'ALC_TAT': 1, 'ALC_TAT.1': 10, 'ALC_CMS.1': 1, 'ALC_DVS.1': 1}, 'ATE': {'ATE_COV': 1, 'ATE_COV.2': 8, 'ATE_DPT': 1, 'ATE_DPT.1': 7, 'ATE_FUN': 1, 'ATE_FUN.1': 14, 'ATE_IND': 1, 'ATE_IND.2': 7, 'ATE_COV.1': 2}, 'AVA': {'AVA_VAN.5': 17, 'AVA_VAN': 1}, 'ASE': {'ASE_CCL': 1, 'ASE_CCL.1': 15, 'ASE_ECD': 1, 'ASE_ECD.1': 14, 'ASE_INT': 1, 'ASE_INT.1': 17, 'ASE_OBJ': 1, 'ASE_OBJ.2': 13, 'ASE_REQ': 1, 'ASE_REQ.2': 15, 'ASE_SPD': 1, 'ASE_SPD.1': 8, 'ASE_APD.1': 1, 'ASE_TSS': 1, 'ASE_TSS.1': 6, 'ASE_REQ.1': 2}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 16, 'FAU_ARP.1.1': 1, 'FAU_SAA.1': 3}, 'FCO': {'FCO_NRO': 14, 'FCO_NRO.2': 6}, 'FCS': {'FCS_RNG': 9, 'FCS_RNG.1': 4, 'FCS_COP': 44, 'FCS_COP.1': 13, 'FCS_RNG.1.1': 1, 'FCS_RNG.1.2': 1, 'FCS_CKM.1': 19, 'FCS_CKM.1.1': 1, 'FCS_CKM.2': 8, 'FCS_CKM.2.1': 1, 'FCS_CKM.3': 6, 'FCS_CKM.3.1': 1, 'FCS_CKM.4': 26, 'FCS_CKM.4.1': 1, 'FCS_COP.1.1': 1}, 'FDP': {'FDP_UIT': 10, 'FDP_UIT.1': 4, 'FDP_ROL': 18, 'FDP_ROL.1': 7, 'FDP_ITC': 20, 'FDP_ITC.2': 22, 'FDP_ACF': 36, 'FDP_ACF.1': 24, 'FDP_ACC': 47, 'FDP_ACC.1': 20, 'FDP_IFC': 44, 'FDP_IFC.2': 4, 'FDP_IFF': 38, 'FDP_IFF.1': 26, 'FDP_IFF.1.4': 1, 'FDP_IFF.1.2': 1, 'FDP_ACC.2': 7, 'FDP_IFC.1': 23, 'FDP_RIP': 110, 'FDP_RIP.1': 10, 'FDP_SDI.2': 7, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_ITC.1': 8}, 'FIA': {'FIA_AFL': 6, 'FIA_UAU': 24, 'FIA_UID': 28, 'FIA_UID.1': 15, 'FIA_UAU.1': 4, 'FIA_UAU.4': 1, 'FIA_AFL.1': 2, 'FIA_UAU.7': 1, 'FIA_ATD': 8, 'FIA_ATD.1': 2, 'FIA_UID.2': 1, 'FIA_USB': 7, 'FIA_USB.1': 3}, 'FMT': {'FMT_MSA': 160, 'FMT_MSA.1': 17, 'FMT_SMF.1': 27, 'FMT_SMR': 63, 'FMT_SMR.1': 44, 'FMT_MSA.3': 26, 'FMT_MSA.3.1': 2, 'FMT_SMF': 58, 'FMT_MSA.2': 2, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MTD': 18, 'FMT_MTD.1': 2, 'FMT_MTD.3': 1, 'FMT_REV.1': 4, 'FMT_REV': 7}, 'FPR': {'FPR_UNO': 6, 'FPR_UNO.1': 10, 'FPR_UNO.1.1': 1}, 'FPT': {'FPT_TDC': 7, 'FPT_FLS': 49, 'FPT_PHP': 8, 'FPT_RCV': 28, 'FPT_FLS.1': 17, 'FPT_TDC.1': 10, 'FPT_FLS.1.1': 1, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 1, 'FPT_RCV.3': 8, 'FPT_PHP.3': 1, 'FPT_RCV.4': 1, 'FPT_TST.1': 1}, 'FRU': {'FRU_FLT': 8, 'FRU_FLT.1': 1}, 'FTP': {'FTP_ITC': 24, 'FTP_ITC.1': 10, 'FTP_TRP.1': 4}}, 'cc_claims': {'D': {'D.APSD_KEYS': 3, 'D.CASD_KEYS': 3, 'D.ISD_KEYS': 3, 'D.VASD_KEYS': 3, 'D.GP_CODE': 1, 'D.CARD_MNGT_DATA': 3, 'D.APP_CODE': 9, 'D.APP_C_DATA': 5, 'D.APP_I_DATA': 7, 'D.PIN': 5, 'D.API_DATA': 3, 'D.CRYPTO': 4, 'D.JCS_CODE': 3, 'D.JCS_DATA': 5, 'D.SEC_DATA': 8}, 'O': {'O.CARD-': 3, 'O.SCP': 63, 'O.CARD-MANAGEMENT': 76, 'O.DOMAIN-RIGHTS': 10, 'O.APPLI-AUTH': 13, 'O.COMM_AUTH': 20, 'O.COMM_INTEGRITY': 20, 'O.COMM_CONFIDENTIALITY': 13, 'O.SID': 40, 'O.FIREWALL': 51, 'O.GLOBAL_ARRAYS_CONFID': 17, 'O.GLOBAL_ARRAYS_INTEG': 9, 'O.NATIVE': 14, 'O.OPERATE': 35, 'O.REALLOCATION': 17, 'O.RESOURCES': 25, 'O.ALARM': 22, 'O.CIPHER': 16, 'O.KEY-MNGT': 23, 'O.PIN-MNGT': 13, 'O.TRANSACTION': 19, 'O.REMOTE': 15, 'O.OBJ-DELETION': 8, 'O.DELETION': 14, 'O.LOAD': 17, 'O.INSTALL': 16, 'O.SCPP': 1, 'O.SCP-IC': 1, 'O.SCP-SUPPORT': 2, 'O.DOMAIN-': 17, 'O.KEY-': 2, 'O.COMM_CONFIDENTIALI': 1, 'O.GLOBAL_ARRAYS_CON': 1, 'O.GLOBAL_ARRAYS_INTE': 1, 'O.APPLET': 21, 'O.CODE_PKG': 14, 'O.JAVAOBJECT': 41, 'O.REMOTE_MTH': 1, 'O.REMOTE_OBJ': 10, 'O.RMI_SERVICE': 12, 'O.ROR': 5, 'O.REMOTE_MTHD': 5, 'O.GLOBAL_ARRAYS_CONFI': 1, 'O.PIN-': 9, 'O.OBJ-': 1}, 'T': {'T.PHYSICAL': 5, 'T.INTEG-USER-DATA': 6, 'T.COM_EXPLOIT': 6, 'T.UNAUTHORIZED_CARD_MNGT': 7, 'T.LIFE_CYCLE': 5, 'T.UNAUTHORIZED_ACCESS': 4, 'T.CONFID-APPLI-DATA': 17, 'T.CONFID-JCS-CODE': 5, 'T.CONFID-JCS-DATA': 5, 'T.INTEG-APPLI-CODE': 8, 'T.INTEG-APPLI-DATA': 17, 'T.INTEG-JCS-CODE': 5, 'T.INTEG-JCS-DATA': 6, 'T.SID': 18, 'T.EXE-CODE': 8, 'T.NATIVE': 6, 'T.EXE-CODE-REMOTE': 4, 'T.RESOURCES': 8, 'T.OBJ-DELETION': 4, 'T.INSTALL': 6, 'T.DELETION': 5, 'T.UNAUTHORIZED_CARD_MNG': 1, 'T.CONFID-JCS-': 7, 'T.INTEG-': 9, 'T.EXE-': 1, 'T.INTEG-APPLI-': 7}, 'A': {'A.MOBILE-OPERATOR': 4, 'A.OTA-ADMIN': 4, 'A.APPS-PROVIDER': 4, 'A.VERIFICATION-AUTHORITY': 2, 'A.KEY-ESCROW': 4, 'A.CONTROLLING-AUTHORITY': 2, 'A.APPLET': 5, 'A.VERIFICATION': 4, 'A.VERIFICATION-': 2, 'A.CONTROLLING-': 2}, 'R': {'R.JAVA': 11}, 'OP': {'OP.SEND': 1, 'OP.RECEIVE': 1, 'OP.ARRAY_ACCESS': 4, 'OP.CREATE': 7, 'OP.DELETE_APPLET': 4, 'OP.DELETE_PCKG': 3, 'OP.DELETE_PCKG_APPLET': 3, 'OP.GET_ROR': 3, 'OP.INSTANCE_FIELD': 4, 'OP.INVK_VIRTUAL': 6, 'OP.INVK_INTERFACE': 7, 'OP.INVOKE': 3, 'OP.JAVA': 5, 'OP.THROW': 5, 'OP.TYPE_ACCESS': 5, 'OP.PUT': 6, 'OP.RET_RORD': 3}, 'OE': {'OE.SCP': 3, 'OE.PRODUCTION': 1, 'OE.PERSONALIZER': 1, 'OE.KEY-CHANGE': 6, 'OE.MOBILE-OPERATOR': 6, 'OE.OTA-ADMIN': 4, 'OE.APPS-PROVIDER': 6, 'OE.VERIFICATION-AUTHORITY': 3, 'OE.KEY-ESCROW': 6, 'OE.CONTROLLING-AUTHORITY': 4, 'OE.SECURE-APPS-CERTIFICATION': 3, 'OE.BASIC-APPS-VALIDATION': 4, 'OE.AID-MANAGEMENT': 6, 'OE.OTA-LOADING': 5, 'OE.OTA-SERVERS': 5, 'OE.AP-KEYS': 7, 'OE.OPERATOR-KEYS': 6, 'OE.KEY-GENERATION': 4, 'OE.CA-KEYS': 8, 'OE.VA-KEYS': 5, 'OE.SECURITY-DOMAINS': 5, 'OE.QUOTAS': 5, 'OE.SHARE-CONTROL': 7, 'OE.APPLET': 9, 'OE.VERIFICATION': 34, 'OE.VERIFICATION-': 1, 'OE.CONTROLLING-': 1, 'OE.SECURE-APPS-': 2, 'OE.BASIC-APPS-': 1}, 'OSP': {'OSP.SECURE-APPS-CERTIFICATION': 2, 'OSP.BASIC-APPS-VALIDATION': 4, 'OSP.SHARE-CONTROL': 4, 'OSP.AID-MANAGEMENT': 4, 'OSP.OTA-LOADING': 4, 'OSP.OTA-SERVERS': 5, 'OSP.APSD-KEYS': 4, 'OSP.OPERATOR-KEYS': 4, 'OSP.KEY-GENERATION': 4, 'OSP.CASD-KEYS': 4, 'OSP.VASD-KEYS': 4, 'OSP.KEY-CHANGE': 4, 'OSP.SECURITY-DOMAINS': 4, 'OSP.QUOTAS': 4, 'OSP.VERIFICATION': 4, 'OSP.SECURE-APPS-': 2}}, 'vendor': {'Samsung': {'Samsung': 11}, 'Oberthur': {'Oberthur Technologies': 384, 'Oberthur': 16, 'OBERTHUR': 2}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 7}}, 'DES': {'DES': {'DES': 27}, '3DES': {'TDES': 4}}}, 'asymmetric_crypto': {'RSA': {'RSA 2048': 1}, 'FF': {'DH': {'Diffie-Hellman': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 7}, 'SHA2': {'SHA256': 1, 'SHA384': 1, 'SHA512': 1, 'SHA-224': 1, 'SHA-256': 1, 'SHA-384': 1, 'SHA-512': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 4}}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 5}}, 'cipher_mode': {'CBC': {'CBC': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 1, 'DPA': 1}, 'FI': {'physical tampering': 2, 'malfunction': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 46-3': 4, 'FIPS PUB 81': 3, 'FIPS PUB 180-3': 1, 'FIPS PUB 186-3': 1, 'FIPS PUB 197': 3, 'FIPS 186-3': 1, 'FIPS 140-2': 1}, 'PKCS': {'PKCS#1': 9}, 'SCP': {'SCP02': 3, 'SCP80': 2, 'SCP 80': 1}}, 'javacard_version': {'GlobalPlatform': {'GlobalPlatform 2.1.1': 1}}, 'javacard_api_const': {'misc': {'TYPE_ACCESS': 5}}, 'javacard_packages': {'java': {'java.rmi': 3}, 'javacard': {'javacard.security': 3, 'javacard.framework': 4, 'javacard.framework.service': 1}, 'javacardx': {'javacardx.rmi': 2, 'javacardx.crypto': 2, 'javacardx.security': 1, 'javacardx.framework.util': 1}}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are': 1}}}.
    • The report_filename property was set to ANSSI-CC_2011-24fr.pdf.
    • The st_filename property was set to ANSSI-CC-cible_2011-24en.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to ['THALES'].
    • The cert_id property was set to ANSSI-CC-2011/24.
    • The st_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2009/57']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2009/57']}} data.
    • The report_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2012/06', 'ANSSI-CC-2012/39']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2012/39', 'ANSSI-CC-2013/60', 'ANSSI-CC-2016/60', 'ANSSI-CC-2019/38', 'ANSSI-CC-2014/81', 'ANSSI-CC-2012/06', 'ANSSI-CC-2013/65']}, 'directly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2009/57']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2009/25', 'ANSSI-CC-2009/57']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_APD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2011-24fr.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2011-24en.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to None.
    • The st_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The report_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_APD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}]} values discarded.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The report_references property was updated, with the {'directly_referenced_by': None, 'indirectly_referenced_by': None} data.
    • The scheme_data property was set to {'product': 'NFC FlyBuy sur S3FS91J', 'url': 'https://cyber.gouv.fr/produits-certifies/nfc-flybuy-sur-s3fs91j', 'description': 'Le produit certifiĂ© est la plateforme (U)SIM Java Card « NFC FlyBuy sur S3FS91J », dont la version du système d'exploitation natif est 075895 et la version du Card Manager1 en Java Card est GOP Ref V1.5.o. Cette plateforme est dĂ©veloppĂ©e par Oberthur Technologies et Samsung Electronics Co. Ltd.\n\nLe produit est une plateforme (U)SIM Java Card ouverte pouvant ĂŞtre insĂ©rĂ©e dans un tĂ©lĂ©phone por', 'sponsor': 'Oberthur Technologies', 'developer': 'Oberthur Technologies et Samsung Electronics Co. Ltd', 'cert_id': '2011/24', 'level': 'EAL4+', 'enhanced': {'cert_id': '2011/24', 'certification_date': '12/07/2011', 'category': 'Cartes Ă  puce', 'cc_version': 'Critères Communs version 3.1r3', 'developer': 'Oberthur Technologies et Samsung Electronics Co. Ltd', 'sponsor': 'Oberthur Technologies', 'evaluation_facility': 'THALES - CEACI (T3S – CNES)', 'level': 'EAL4+', 'protection_profile': 'ANSSI-CC-PP-2010/04', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ALC_DVS.2, AVA_VAN.5', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2011-24en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2011-24fr.pdf'}}.
  • 31.07.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name NFC FlyBuy on S3FS91J was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": null,
  "dgst": "091d302472777e95",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2011/24",
    "cert_lab": [
      "THALES"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_APD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": [],
    "prev_certificates": [],
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2012/06",
          "ANSSI-CC-2012/39"
        ]
      },
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2009/57"
        ]
      },
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2013/60",
          "ANSSI-CC-2019/38",
          "ANSSI-CC-2012/39",
          "ANSSI-CC-2014/81",
          "ANSSI-CC-2016/60",
          "ANSSI-CC-2012/06",
          "ANSSI-CC-2013/65"
        ]
      },
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2009/25",
          "ANSSI-CC-2009/57"
        ]
      }
    },
    "scheme_data": {
      "cert_id": "ANSSI-CC-2011/24",
      "description": "Le produit certifi\u00e9 est la plateforme (U)SIM Java Card \u00ab NFC FlyBuy sur S3FS91J \u00bb, dont la version du syst\u00e8me d\u0026#39;exploitation natif est 075895 et la version du Card Manager1 en Java Card est GOP Ref V1.5.o. Cette plateforme est d\u00e9velopp\u00e9e par Oberthur Technologies et Samsung Electronics Co. Ltd. Le produit est une plateforme (U)SIM Java Card ouverte pouvant \u00eatre ins\u00e9r\u00e9e dans un t\u00e9l\u00e9phone por",
      "developer": "Oberthur Technologies et Samsung Electronics Co. Ltd",
      "enhanced": {
        "augmented": "ALC_DVS.2, AVA_VAN.5",
        "category": "Cartes \u00e0 puce",
        "cc_version": "Crit\u00e8res Communs version 3.1r3",
        "cert_id": "ANSSI-CC-2011/24",
        "certification_date": "2011-07-12",
        "developer": "Oberthur Technologies et Samsung Electronics Co. Ltd",
        "evaluation_facility": "THALES - CEACI (T3S \u2013 CNES)",
        "level": "EAL4+",
        "mutual_recognition": "SOG-IS CCRA",
        "protection_profile": "ANSSI-CC-PP-2010/04",
        "report_link": "https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2011-24fr.pdf",
        "sponsor": "Oberthur Technologies",
        "target_link": "https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2011-24en.pdf"
      },
      "level": "EAL4+",
      "product": "NFC FlyBuy sur S3FS91J",
      "sponsor": "Oberthur Technologies",
      "url": "https://cyber.gouv.fr/produits-certifies/nfc-flybuy-sur-s3fs91j"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2009/57"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2009/57"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2012-10-24",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Rapport%20de%20maintenance%20FLY%202011_24_M01.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "Rapport de maintenance ANSSI-CC-2011/24-M01"
      }
    ]
  },
  "manufacturer": "Oberthur Technologies",
  "manufacturer_web": "https://www.oberthur.com/",
  "name": "NFC FlyBuy on S3FS91J",
  "not_valid_after": "2019-09-01",
  "not_valid_before": "2011-07-12",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "ANSSI-CC_2011-24fr.pdf",
    "report_frontpage": {
      "FR": {
        "cc_security_level": "EAL 4 augment\u00e9 ALC_DVS.2, AVA_VAN.5",
        "cc_version": "Crit\u00e8res Communs version 3.1 r\u00e9vision 3",
        "cert_id": "ANSSI-CC-2011/24",
        "cert_item": "NFC FlyBuy sur S3FS91J",
        "cert_item_version": "version du syst\u00e8me d\u2019exploitation en natif : 075895 version du Card Manager en Java Card : GOP Ref V1.5.o",
        "cert_lab": "THALES - CEACI (T3S \u2013 CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France T\u00e9l : +33 (0)5 62 88 28 01 ou 18, m\u00e9l : [email protected]",
        "developer": "Oberthur Technologies 71-73 chemin des Hautes P\u00e2tures, 92 726 NANTERRE CEDEX, France Samsung Electronics Co. Ltd San#24 Nongseo-Ri, Giheung-Eup, Yongin-City, Gyeonggi-Do, 449-711, R\u00e9publique de Cor\u00e9e Commanditaire Oberthur Technologies 71-73 chemin des Hautes P\u00e2tures, 92 726 NANTERRE CEDEX, France",
        "match_rules": [
          "R\u00e9f\u00e9rence du rapport de certification(.+)Nom du produit(.+)R\u00e9f\u00e9rence/version du produit(.+)Conformit\u00e9 \u00e0 un profil de protection(.+)Crit\u00e8res d\u2019\u00e9valuation et version(.+)Niveau d\u2019\u00e9valuation(.+)D\u00e9veloppeur\\(s\\)(.+)Centre d\u2019\u00e9valuation(.+)Accords de reconnaissance applicables"
        ],
        "ref_protection_profiles": "PP (U)SIM], version 2.0.2, certifi\u00e9 par l\u2019ANSSI (U)SIM Java Card Platform Protection Profile Basic and SCWS Configurations Evolutive Certification Scheme for (U)SIM cards"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2009/57": 4,
          "ANSSI-CC-2011/24": 22
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP- 0035": 1,
          "BSI-PP-0035": 1,
          "BSI-PP-0035-2007": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_FSP": 1,
          "ADV_IMP": 1,
          "ADV_INT": 1,
          "ADV_SPM": 1,
          "ADV_TDS": 1
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_PRE": 2
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMS": 1,
          "ALC_DEL": 1,
          "ALC_DVS": 1,
          "ALC_DVS.2": 2,
          "ALC_FLR": 2,
          "ALC_TAT": 1
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_ECD": 1,
          "ASE_INT": 1,
          "ASE_OBJ": 1,
          "ASE_REQ": 1,
          "ASE_SPD": 1,
          "ASE_TSS": 1
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_DPT": 1,
          "ATE_FUN": 1,
          "ATE_IND": 1
        },
        "AVA": {
          "AVA_VAN": 2,
          "AVA_VAN.5": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 3": 1,
          "EAL 4": 2,
          "EAL 5": 1,
          "EAL 7": 1,
          "EAL4": 2,
          "EAL5": 1,
          "EAL7": 1
        },
        "ITSEC": {
          "ITSEC E6 Elev\u00e9": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 1
        },
        "ECB": {
          "ECB": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Thales": {
          "THALES - CEACI": 1
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {
        "JavaCard": {
          "Java Card 3.0.1": 1
        }
      },
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2009-07-001": 1,
          "CCMB-2009-07-002": 1,
          "CCMB-2009-07-003": 1,
          "CCMB-2009-07-004": 1
        },
        "SCP": {
          "SCP 80": 2
        }
      },
      "symmetric_crypto": {
        "DES": {
          "3DES": {
            "Triple-DES": 1
          },
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Oberthur": {
          "Oberthur": 6,
          "Oberthur Technologies": 13
        },
        "Samsung": {
          "Samsung": 5
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20110713100055+02\u002700\u0027",
      "/Keywords": "",
      "/ModDate": "D:20110713100055+02\u002700\u0027",
      "/Producer": "Acrobat Distiller 8.1.0 (Windows)",
      "pdf_file_size_bytes": 544621,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 21
    },
    "st_filename": "ANSSI-CC-cible_2011-24en.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "FF": {
          "DH": {
            "Diffie-Hellman": 2
          }
        },
        "RSA": {
          "RSA 2048": 1
        }
      },
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2009/57": 1,
          "ANSSI-CC-PP 2010/04": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.APPLET": 5,
          "A.APPS-PROVIDER": 4,
          "A.CONTROLLING-": 2,
          "A.CONTROLLING-AUTHORITY": 2,
          "A.KEY-ESCROW": 4,
          "A.MOBILE-OPERATOR": 4,
          "A.OTA-ADMIN": 4,
          "A.VERIFICATION": 4,
          "A.VERIFICATION-": 2,
          "A.VERIFICATION-AUTHORITY": 2
        },
        "D": {
          "D.API_DATA": 3,
          "D.APP_CODE": 9,
          "D.APP_C_DATA": 5,
          "D.APP_I_DATA": 7,
          "D.APSD_KEYS": 3,
          "D.CARD_MNGT_DATA": 3,
          "D.CASD_KEYS": 3,
          "D.CRYPTO": 4,
          "D.GP_CODE": 1,
          "D.ISD_KEYS": 3,
          "D.JCS_CODE": 3,
          "D.JCS_DATA": 5,
          "D.PIN": 5,
          "D.SEC_DATA": 8,
          "D.VASD_KEYS": 3
        },
        "O": {
          "O.ALARM": 22,
          "O.APPLET": 21,
          "O.APPLI-AUTH": 13,
          "O.CARD-": 3,
          "O.CARD-MANAGEMENT": 76,
          "O.CIPHER": 16,
          "O.CODE_PKG": 14,
          "O.COMM_AUTH": 20,
          "O.COMM_CONFIDENTIALI": 1,
          "O.COMM_CONFIDENTIALITY": 13,
          "O.COMM_INTEGRITY": 20,
          "O.DELETION": 14,
          "O.DOMAIN-": 17,
          "O.DOMAIN-RIGHTS": 10,
          "O.FIREWALL": 51,
          "O.GLOBAL_ARRAYS_CON": 1,
          "O.GLOBAL_ARRAYS_CONFI": 1,
          "O.GLOBAL_ARRAYS_CONFID": 17,
          "O.GLOBAL_ARRAYS_INTE": 1,
          "O.GLOBAL_ARRAYS_INTEG": 9,
          "O.INSTALL": 16,
          "O.JAVAOBJECT": 41,
          "O.KEY-": 2,
          "O.KEY-MNGT": 23,
          "O.LOAD": 17,
          "O.NATIVE": 14,
          "O.OBJ-": 1,
          "O.OBJ-DELETION": 8,
          "O.OPERATE": 35,
          "O.PIN-": 9,
          "O.PIN-MNGT": 13,
          "O.REALLOCATION": 17,
          "O.REMOTE": 15,
          "O.REMOTE_MTH": 1,
          "O.REMOTE_MTHD": 5,
          "O.REMOTE_OBJ": 10,
          "O.RESOURCES": 25,
          "O.RMI_SERVICE": 12,
          "O.ROR": 5,
          "O.SCP": 63,
          "O.SCP-IC": 1,
          "O.SCP-SUPPORT": 2,
          "O.SCPP": 1,
          "O.SID": 40,
          "O.TRANSACTION": 19
        },
        "OE": {
          "OE.AID-MANAGEMENT": 6,
          "OE.AP-KEYS": 7,
          "OE.APPLET": 9,
          "OE.APPS-PROVIDER": 6,
          "OE.BASIC-APPS-": 1,
          "OE.BASIC-APPS-VALIDATION": 4,
          "OE.CA-KEYS": 8,
          "OE.CONTROLLING-": 1,
          "OE.CONTROLLING-AUTHORITY": 4,
          "OE.KEY-CHANGE": 6,
          "OE.KEY-ESCROW": 6,
          "OE.KEY-GENERATION": 4,
          "OE.MOBILE-OPERATOR": 6,
          "OE.OPERATOR-KEYS": 6,
          "OE.OTA-ADMIN": 4,
          "OE.OTA-LOADING": 5,
          "OE.OTA-SERVERS": 5,
          "OE.PERSONALIZER": 1,
          "OE.PRODUCTION": 1,
          "OE.QUOTAS": 5,
          "OE.SCP": 3,
          "OE.SECURE-APPS-": 2,
          "OE.SECURE-APPS-CERTIFICATION": 3,
          "OE.SECURITY-DOMAINS": 5,
          "OE.SHARE-CONTROL": 7,
          "OE.VA-KEYS": 5,
          "OE.VERIFICATION": 34,
          "OE.VERIFICATION-": 1,
          "OE.VERIFICATION-AUTHORITY": 3
        },
        "OP": {
          "OP.ARRAY_ACCESS": 4,
          "OP.CREATE": 7,
          "OP.DELETE_APPLET": 4,
          "OP.DELETE_PCKG": 3,
          "OP.DELETE_PCKG_APPLET": 3,
          "OP.GET_ROR": 3,
          "OP.INSTANCE_FIELD": 4,
          "OP.INVK_INTERFACE": 7,
          "OP.INVK_VIRTUAL": 6,
          "OP.INVOKE": 3,
          "OP.JAVA": 5,
          "OP.PUT": 6,
          "OP.RECEIVE": 1,
          "OP.RET_RORD": 3,
          "OP.SEND": 1,
          "OP.THROW": 5,
          "OP.TYPE_ACCESS": 5
        },
        "OSP": {
          "OSP.AID-MANAGEMENT": 4,
          "OSP.APSD-KEYS": 4,
          "OSP.BASIC-APPS-VALIDATION": 4,
          "OSP.CASD-KEYS": 4,
          "OSP.KEY-CHANGE": 4,
          "OSP.KEY-GENERATION": 4,
          "OSP.OPERATOR-KEYS": 4,
          "OSP.OTA-LOADING": 4,
          "OSP.OTA-SERVERS": 5,
          "OSP.QUOTAS": 4,
          "OSP.SECURE-APPS-": 2,
          "OSP.SECURE-APPS-CERTIFICATION": 2,
          "OSP.SECURITY-DOMAINS": 4,
          "OSP.SHARE-CONTROL": 4,
          "OSP.VASD-KEYS": 4,
          "OSP.VERIFICATION": 4
        },
        "R": {
          "R.JAVA": 11
        },
        "T": {
          "T.COM_EXPLOIT": 6,
          "T.CONFID-APPLI-DATA": 17,
          "T.CONFID-JCS-": 7,
          "T.CONFID-JCS-CODE": 5,
          "T.CONFID-JCS-DATA": 5,
          "T.DELETION": 5,
          "T.EXE-": 1,
          "T.EXE-CODE": 8,
          "T.EXE-CODE-REMOTE": 4,
          "T.INSTALL": 6,
          "T.INTEG-": 9,
          "T.INTEG-APPLI-": 7,
          "T.INTEG-APPLI-CODE": 8,
          "T.INTEG-APPLI-DATA": 17,
          "T.INTEG-JCS-CODE": 5,
          "T.INTEG-JCS-DATA": 6,
          "T.INTEG-USER-DATA": 6,
          "T.LIFE_CYCLE": 5,
          "T.NATIVE": 6,
          "T.OBJ-DELETION": 4,
          "T.PHYSICAL": 5,
          "T.RESOURCES": 8,
          "T.SID": 18,
          "T.UNAUTHORIZED_ACCESS": 4,
          "T.UNAUTHORIZED_CARD_MNG": 1,
          "T.UNAUTHORIZED_CARD_MNGT": 7
        }
      },
      "cc_protection_profile_id": {
        "ANSSI": {
          "ANSSI-CC-PP 2010/04": 1
        },
        "BSI": {
          "BSI-PP-0035": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 15,
          "ADV_FSP": 1,
          "ADV_FSP.1": 3,
          "ADV_FSP.2": 2,
          "ADV_FSP.4": 20,
          "ADV_IMP": 1,
          "ADV_IMP.1": 11,
          "ADV_IMP.2": 1,
          "ADV_TDS": 1,
          "ADV_TDS.1": 2,
          "ADV_TDS.2": 1,
          "ADV_TDS.3": 23
        },
        "AGD": {
          "AGD_ADM": 1,
          "AGD_OPE": 3,
          "AGD_OPE.1": 19,
          "AGD_PRE": 2,
          "AGD_PRE.1": 12,
          "AGD_USR": 1
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.4": 16,
          "ALC_CMS": 1,
          "ALC_CMS.1": 1,
          "ALC_CMS.4": 7,
          "ALC_DEL": 1,
          "ALC_DEL.1": 6,
          "ALC_DVS": 8,
          "ALC_DVS.1": 1,
          "ALC_DVS.2": 14,
          "ALC_LCD": 1,
          "ALC_LCD.1": 9,
          "ALC_TAT": 1,
          "ALC_TAT.1": 10
        },
        "ASE": {
          "ASE_APD.1": 1,
          "ASE_CCL": 1,
          "ASE_CCL.1": 15,
          "ASE_ECD": 1,
          "ASE_ECD.1": 14,
          "ASE_INT": 1,
          "ASE_INT.1": 17,
          "ASE_OBJ": 1,
          "ASE_OBJ.2": 13,
          "ASE_REQ": 1,
          "ASE_REQ.1": 2,
          "ASE_REQ.2": 15,
          "ASE_SPD": 1,
          "ASE_SPD.1": 8,
          "ASE_TSS": 1,
          "ASE_TSS.1": 6
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.1": 2,
          "ATE_COV.2": 8,
          "ATE_DPT": 1,
          "ATE_DPT.1": 7,
          "ATE_FUN": 1,
          "ATE_FUN.1": 14,
          "ATE_IND": 1,
          "ATE_IND.2": 7
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.5": 17
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 3,
          "EAL 4 augmented": 1,
          "EAL4": 7,
          "EAL4 augmented": 4,
          "EAL4+": 3
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 16,
          "FAU_ARP.1.1": 1,
          "FAU_SAA.1": 3
        },
        "FCO": {
          "FCO_NRO": 14,
          "FCO_NRO.2": 6
        },
        "FCS": {
          "FCS_CKM.1": 19,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 8,
          "FCS_CKM.2.1": 1,
          "FCS_CKM.3": 6,
          "FCS_CKM.3.1": 1,
          "FCS_CKM.4": 26,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 44,
          "FCS_COP.1": 13,
          "FCS_COP.1.1": 1,
          "FCS_RNG": 9,
          "FCS_RNG.1": 4,
          "FCS_RNG.1.1": 1,
          "FCS_RNG.1.2": 1
        },
        "FDP": {
          "FDP_ACC": 47,
          "FDP_ACC.1": 20,
          "FDP_ACC.2": 7,
          "FDP_ACF": 36,
          "FDP_ACF.1": 24,
          "FDP_IFC": 44,
          "FDP_IFC.1": 23,
          "FDP_IFC.2": 4,
          "FDP_IFF": 38,
          "FDP_IFF.1": 26,
          "FDP_IFF.1.2": 1,
          "FDP_IFF.1.4": 1,
          "FDP_ITC": 20,
          "FDP_ITC.1": 8,
          "FDP_ITC.2": 22,
          "FDP_RIP": 110,
          "FDP_RIP.1": 10,
          "FDP_ROL": 18,
          "FDP_ROL.1": 7,
          "FDP_SDI.2": 7,
          "FDP_SDI.2.1": 1,
          "FDP_SDI.2.2": 1,
          "FDP_UIT": 10,
          "FDP_UIT.1": 4
        },
        "FIA": {
          "FIA_AFL": 6,
          "FIA_AFL.1": 2,
          "FIA_ATD": 8,
          "FIA_ATD.1": 2,
          "FIA_UAU": 24,
          "FIA_UAU.1": 4,
          "FIA_UAU.4": 1,
          "FIA_UAU.7": 1,
          "FIA_UID": 28,
          "FIA_UID.1": 15,
          "FIA_UID.2": 1,
          "FIA_USB": 7,
          "FIA_USB.1": 3
        },
        "FMT": {
          "FMT_MSA": 160,
          "FMT_MSA.1": 17,
          "FMT_MSA.2": 2,
          "FMT_MSA.3": 26,
          "FMT_MSA.3.1": 2,
          "FMT_MTD": 18,
          "FMT_MTD.1": 2,
          "FMT_MTD.3": 1,
          "FMT_REV": 7,
          "FMT_REV.1": 4,
          "FMT_SMF": 58,
          "FMT_SMF.1": 27,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 63,
          "FMT_SMR.1": 44,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPR": {
          "FPR_UNO": 6,
          "FPR_UNO.1": 10,
          "FPR_UNO.1.1": 1
        },
        "FPT": {
          "FPT_FLS": 49,
          "FPT_FLS.1": 17,
          "FPT_FLS.1.1": 1,
          "FPT_PHP": 8,
          "FPT_PHP.3": 1,
          "FPT_RCV": 28,
          "FPT_RCV.3": 8,
          "FPT_RCV.4": 1,
          "FPT_TDC": 7,
          "FPT_TDC.1": 10,
          "FPT_TDC.1.1": 1,
          "FPT_TDC.1.2": 1,
          "FPT_TST.1": 1
        },
        "FRU": {
          "FRU_FLT": 8,
          "FRU_FLT.1": 1
        },
        "FTP": {
          "FTP_ITC": 24,
          "FTP_ITC.1": 10,
          "FTP_TRP.1": 4
        }
      },
      "certification_process": {
        "OutOfScope": {
          "a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "MAC": {
          "MAC": 4
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 7
          },
          "SHA2": {
            "SHA-224": 1,
            "SHA-256": 1,
            "SHA-384": 1,
            "SHA-512": 1,
            "SHA256": 1,
            "SHA384": 1,
            "SHA512": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {
        "misc": {
          "TYPE_ACCESS": 5
        }
      },
      "javacard_packages": {
        "java": {
          "java.rmi": 3
        },
        "javacard": {
          "javacard.framework": 4,
          "javacard.framework.service": 1,
          "javacard.security": 3
        },
        "javacardx": {
          "javacardx.crypto": 2,
          "javacardx.framework.util": 1,
          "javacardx.rmi": 2,
          "javacardx.security": 1
        }
      },
      "javacard_version": {
        "GlobalPlatform": {
          "GlobalPlatform 2.1.1": 1
        }
      },
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 5
        }
      },
      "side_channel_analysis": {
        "FI": {
          "malfunction": 1,
          "physical tampering": 2
        },
        "SCA": {
          "DPA": 1,
          "physical probing": 1
        }
      },
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 1,
          "FIPS 186-3": 1,
          "FIPS PUB 180-3": 1,
          "FIPS PUB 186-3": 1,
          "FIPS PUB 197": 3,
          "FIPS PUB 46-3": 4,
          "FIPS PUB 81": 3
        },
        "PKCS": {
          "PKCS#1": 9
        },
        "SCP": {
          "SCP 80": 1,
          "SCP02": 3,
          "SCP80": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 7
          }
        },
        "DES": {
          "3DES": {
            "TDES": 4
          },
          "DES": {
            "DES": 27
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Oberthur": {
          "OBERTHUR": 2,
          "Oberthur": 16,
          "Oberthur Technologies": 384
        },
        "Samsung": {
          "Samsung": 11
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/CreationDate": "D:20110713095952+02\u002700\u0027",
      "/Keywords": "",
      "/ModDate": "D:20110713095952+02\u002700\u0027",
      "/Producer": "GPL Ghostscript 8.61",
      "pdf_file_size_bytes": 1275792,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 191
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-cible_PP-2010-04en.pdf",
        "pp_name": "(U)SIM Java Card Platform Protection Profile / Basic Configuration (ref. PU-2009-..."
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2011-24fr.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_DVS.2",
      "AVA_VAN.5",
      "EAL4+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2011-24en.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "f56348cd6c69307c10472582eb65da6b272390409085ececec8d1c99b27b41dd",
      "txt_hash": "329fccce4a1cb1dd67e78e9cd7c630b819693a0689ddd3798a9b3e4144bf6983"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "bcf661a98f7f4f61d5d6cf60effa75e2b465149839a0af9f02d27aa7ad3f4ec9",
      "txt_hash": "06acc16a060d7fea219e6d2c0ab8d1e5892368506d624f3d469e68696620c977"
    }
  },
  "status": "archived"
}