LINQUS USIM 128K Smartcard: ESIGN PKI signature application loaded on GemXplore Generations G152B-EP3B platform embedded on SLE88CFX4002P/m8834b17, version 1.0

CSV information

Status archived
Valid from 03.11.2008
Valid until 01.09.2019
Scheme 🇫🇷 FR
Manufacturer Gemalto - Infineon Technologies AG
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level EAL4+, AVA_MSU.3, AVA_VLA.4
Maintenance updates Maintenance Report ANSSI-CC-2008/37-M01 (12.03.2010) Certification report

Heuristics summary

Certificate ID: ANSSI-CC-2008/37

Certificate

certificate file processing did not finish successfully.
Download pdf: ERROR
Convert pdf to text: ERROR
Extract keywords: ERROR

Certification report

Extracted keywords

JavaCard versions
Java Card 2.2.1
Vendor
Infineon Technologies AG, Infineon, Gemalto, Thales

Security level
EAL 4, EAL4, EAL5, EAL7, EAL 1, EAL 3, EAL 5, EAL 7, EAL5+, EAL 4 augmented, ITSEC E6 and
Claims
OE.HI_VAD
Security Assurance Requirements (SAR)
ACM_AUT, ACM_CAP, ACM_SCP, ADO_DEL, ADO_IGS, ADV_FSP, ADV_HLD, ADV_IMP, ADV_INT, ADV_LLD, ADV_RCR, ADV_SPM, AGD_ADM, AGD_USR, ALC_DVS.2, ALC_FLR, ALC_DVS, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_MSU.3, AVA_VLA.4, AVA_CCA, AVA_MSU, AVA_SOF, AVA_VLA
Protection profiles
BSI-PP-0006-2002T, BSI-PP-0002-2001
Certificates
BSI-DSZ-CC-0376-2006, DCSSI-2008/37

Standards
AIS 34, AIS34, ISO/IEC 15408:2005, ISO/IEC 18045:2005, CCMB-2005-08-001, CCMB-2005-08-002, CCMB-2005-08-003, CCMB-2005-08-004

File metadata

Title DCSSI-2008/37
Subject LINQUS USIM 128K Smartcard: ESIGN PKI signature application loaded on GemXplore Generations G152B-EP3B platform embedded on SLE88CFX4002P/m8834b17
Keywords CER/F/07.5
Author J. Chuzel
Creation date D:20081103113048+01'00'
Modification date D:20081103113130+01'00'
Pages 17
Creator Acrobat PDFMaker 8.0 for Word
Producer Acrobat Distiller 8.0.0 (Windows)

Frontpage

Certificate ID DCSSI-2008/37
Certified item LINQUS USIM 128K Smartcard: ESIGN PKI signature application loaded on GemXplore Generations G152B- EP3B platform embedded on SLE88CFX4002P/m8834b17
Certification lab CEACI (Thales Security Systems – CNES) 18 avenue Edouard Belin, 31401 Toulouse Cedex 9, France Phone: +33 (0)5 61 28 16 51, email : [email protected]
Developer GEMALTO 6 rue de la verrerie, 92197 Meudon, France Infineon Technologies AG Automotive, Industrial & Multimarket, Chipcard & Security IC´s, Am Campeon 1- 12, 85579 Neubiberg, Germany Sponsor GEMALTO 6 rue de la verrerie, 92197 Meudon, France

References

Outgoing
  • BSI-DSZ-CC-0376-2006 - archived - Infineon Smart Card IC (Security Controller) SLE88CFX4000P/m8830b17, SLE88CFX4002P/m8834b17, SLE88CFX3520P/m8847b17, SLE88CFX2920P/m8849b17, SLE88CF4000P/m8845b17, SLE88CF4002P/m8846b17 SLE88CF3520P/m8848b17, SLE88CF2920P/m8850b17 each with PSL V0.50.23_E107 or PSL V0.50.23_E110 and specific IC Dedicated Software

Security target

Extracted keywords

Symmetric Algorithms
AES, DES, 3-DES, Triple-DES
Asymmetric Algorithms
RSA 1024
Hash functions
SHA-1

JavaCard versions
JavaCard 2.2.1, Java Card 2.2.1, JC2.2.1, Global Platform 2.1.1
Vendor
Infineon, Gemalto

Security level
EAL4+, EAL5, EAL4, EAL5+, EAL5 augmented, EAL4 augmented
Claims
D.SCD, D.SVD, D.DTBS, D.VAD, D.RAD, D.SIGN_APPLI, D.SIGNATURE, D.USER_PIN, A.CGA, A.SCA, OE.HI_VAD
Security Assurance Requirements (SAR)
ACM_AUT.1, ACM_CAP.4, ACM_SCP.2, ACM_XXX, ADO_DEL.2, ADO_IGS.1, ADV_FSP.2, ADV_HLD.2, ADV_IMP.1, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.2, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.3, AVA_VLA.4, AVA_SOF.1
Security Functional Requirements (SFR)
FCS_CKM.1, FCS_CKM.4, FCS_COP.1, FCS_CKM.2, FCS_CKM.3, FCS_CKM.1.1, FCS_CKM, FCS_COP, FDP_ACC.1, FDP_ACF.1, FDP_ETC.1, FDP_ITC.1, FDP_RIP.1, FDP_SDI.2, FDP_UIT.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_UIT.1.2, FIA_AFL.1, FIA_ATD.1, FIA_UAU.1, FIA_UID.1, FIA_AFL.1.2, FIA_UAU.1.2, FIA_UAU.1.1, FIA_UID.1.2, FMT_MOF.1, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_MTD.1, FMT_SMR.1, FMT_SMF.1, FMT_MOF, FMT_MSA.1.1, FMT_MSA.3.2, FMT_SMR.1.2, FMT_SMF, FPT_AMT.1, FPT_FLS.1, FPT_PHP.1, FPT_PHP.3, FPT_TST.1, FPT_SEP.1, FPT_TST.1.3, FPT_PHP.1.2, FPT_TST.1.2, FPT_SEP.1.1, FPT_SEP.1.2, FPT_SEP, FTP_ITC.1, FTP_TRP.1, FTP_ITC, FTP_ITC.1.2, FTP_ITC.1.3, FTP_ITC.1.1, FTP_TRP.1.2, FTP_TRP.1.3
Protection profiles
BSI-PP, BSI-PP-0006-2002T-, BSI-PP-0004-2002T-, BSI-PP-0005-2002T-03-04-2002, BSI-PP-0006-2002T-03-04-2002, BSI-PP-0002
Certificates
BSI-DSZ-CC-0269-2006

Side-channel analysis
SPA, DPA, timing attacks, physical tampering, Physical tampering, malfunction
Certification process
out of scope, verification of correct passcode stored in SIM at perso time. NB: The passcode functionality is out of scope of this Security target. 2.3 TOE LIFE CYCLE The TOE is composed of a JavaCard and a EEPROMed Java

Standards
SCP02

File metadata

Title ASE10448v1.4_Lite
Creation date D:20081020110655
Modification date D:20081020110655
Pages 52
Creator PDFCreator Version 0.9.3
Producer GPL Ghostscript 8.54

References

Outgoing
  • BSI-DSZ-CC-0269-2006 - archived - Infineon Smart Card IC (Security Controller) SLE88CFX4000P/m8830b17, SLE88CFX4002P/m8834b17, SLE88CFX3520P/m8847b17 and SLE88CFX2920P/m8849b17 each with PSL V0.50.23 and specific IC Dedicated Software

Heuristics

Certificate ID: ANSSI-CC-2008/37

Extracted SARs

ADV_FSP.2, ADV_HLD.2, ADV_IMP.1, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.3, AVA_SOF.1, AVA_VLA.4

References

Loading...

Updates

  • 10.02.2025 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 05.02.2025 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'_type': 'sec_certs.sample.document_state.DocumentState'} data.
    • The st property was updated, with the {'_type': 'sec_certs.sample.document_state.DocumentState'} data.
    • The cert property was updated, with the {'_type': 'sec_certs.sample.document_state.DocumentState'} data.

    The computed heuristics were updated.

    • The following values were inserted: {'protection_profiles': None, 'eal': 'EAL4+'}.
    • The prev_certificates property was set to None.
    • The next_certificates property was set to None.
    • The scheme_data property was set to {'product': 'Carte Linqus USIM 128K : Composant SLE88CFX4002P/m8834b17 masqué par la plateforme GemXplore Generations G152B-EP3B et embarquant l'application de signature ESIGN, réf. T1004530 A3, v.1.0', 'url': 'https://cyber.gouv.fr/produits-certifies/carte-linqus-usim-128k-composant-sle88cfx4002pm8834b17-masque-par-la-plateforme', 'description': 'Le produit évalué est la ''Carte Linqus USIM 128K : Composant SLE88CFX4002P/m8834b17 masqué par la plateforme GemXplore Generations G152B-EP3B et embarquant l'application de signature ESIGN, version 1.0'' développée par GEMALTO et Infineon Technologies AG. Ce produit correspond à une carte à puce insérée dans un téléphone portable (i.e. carte SIM). Il est destiné à être util', 'sponsor': 'Gemalto', 'developer': 'Gemalto, Infineon Technologies AG', 'cert_id': 'ANSSI-CC-2008/37', 'level': 'EAL4+', 'enhanced': {'cert_id': 'ANSSI-CC-2008/37', 'certification_date': '2008-11-03', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 2.3', 'developer': 'Gemalto, Infineon Technologies AG', 'sponsor': 'Gemalto', 'evaluation_facility': 'CEACI', 'level': 'EAL4+', 'protection_profile': '', 'mutual_recognition': 'SOG-IS CCRA', 'augmented': 'AVA_MSU.3, AVA_VLA.4', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi-cible_2008-37en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi_2008-37en.pdf'}}.
  • 03.02.2025 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 27.01.2025 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'Carte Linqus USIM 128K : Composant SLE88CFX4002P/m8834b17 masqué par la plateforme GemXplore Generations G152B-EP3B et embarquant l'application de signature ESIGN, réf. T1004530 A3, v.1.0', 'url': 'https://cyber.gouv.fr/produits-certifies/carte-linqus-usim-128k-composant-sle88cfx4002pm8834b17-masque-par-la-plateforme', 'description': 'Le produit évalué est la ''Carte Linqus USIM 128K : Composant SLE88CFX4002P/m8834b17 masqué par la plateforme GemXplore Generations G152B-EP3B et embarquant l'application de signature ESIGN, version 1.0'' développée par GEMALTO et Infineon Technologies AG. Ce produit correspond à une carte à puce insérée dans un téléphone portable (i.e. carte SIM). Il est destiné à être util', 'sponsor': 'Gemalto', 'developer': 'Gemalto, Infineon Technologies AG', 'cert_id': 'ANSSI-CC-2008/37', 'level': 'EAL4+', 'enhanced': {'cert_id': 'ANSSI-CC-2008/37', 'certification_date': '2008-11-03', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 2.3', 'developer': 'Gemalto, Infineon Technologies AG', 'sponsor': 'Gemalto', 'evaluation_facility': 'CEACI', 'level': 'EAL4+', 'protection_profile': '', 'mutual_recognition': 'SOG-IS CCRA', 'augmented': 'AVA_MSU.3, AVA_VLA.4', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi-cible_2008-37en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi_2008-37en.pdf'}}.
  • 06.01.2025 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 16.12.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'Carte Linqus USIM 128K : Composant SLE88CFX4002P/m8834b17 masqué par la plateforme GemXplore Generations G152B-EP3B et embarquant l'application de signature ESIGN, réf. T1004530 A3, v.1.0', 'url': 'https://cyber.gouv.fr/produits-certifies/carte-linqus-usim-128k-composant-sle88cfx4002pm8834b17-masque-par-la-plateforme', 'description': 'Le produit évalué est la ''Carte Linqus USIM 128K : Composant SLE88CFX4002P/m8834b17 masqué par la plateforme GemXplore Generations G152B-EP3B et embarquant l'application de signature ESIGN, version 1.0'' développée par GEMALTO et Infineon Technologies AG. Ce produit correspond à une carte à puce insérée dans un téléphone portable (i.e. carte SIM). Il est destiné à être util', 'sponsor': 'Gemalto', 'developer': 'Gemalto, Infineon Technologies AG', 'cert_id': 'ANSSI-CC-2008/37', 'level': 'EAL4+', 'enhanced': {'cert_id': 'ANSSI-CC-2008/37', 'certification_date': '2008-11-03', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 2.3', 'developer': 'Gemalto, Infineon Technologies AG', 'sponsor': 'Gemalto', 'evaluation_facility': 'CEACI', 'level': 'EAL4+', 'protection_profile': '', 'mutual_recognition': 'SOG-IS CCRA', 'augmented': 'AVA_MSU.3, AVA_VLA.4', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi-cible_2008-37en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi_2008-37en.pdf'}}.
  • 09.12.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 21.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'prev_certificates': [], 'next_certificates': []}.
  • 09.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'Carte Linqus USIM 128K : Composant SLE88CFX4002P/m8834b17 masqué par la plateforme GemXplore Generations G152B-EP3B et embarquant l'application de signature ESIGN, réf. T1004530 A3, v.1.0', 'url': 'https://cyber.gouv.fr/produits-certifies/carte-linqus-usim-128k-composant-sle88cfx4002pm8834b17-masque-par-la-plateforme', 'description': 'Le produit évalué est la ''Carte Linqus USIM 128K : Composant SLE88CFX4002P/m8834b17 masqué par la plateforme GemXplore Generations G152B-EP3B et embarquant l'application de signature ESIGN, version 1.0'' développée par GEMALTO et Infineon Technologies AG. Ce produit correspond à une carte à puce insérée dans un téléphone portable (i.e. carte SIM). Il est destiné à être util', 'sponsor': 'Gemalto', 'developer': 'Gemalto, Infineon Technologies AG', 'cert_id': 'ANSSI-CC-2008/37', 'level': 'EAL4+', 'enhanced': {'cert_id': 'ANSSI-CC-2008/37', 'certification_date': '2008-11-03', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 2.3', 'developer': 'Gemalto, Infineon Technologies AG', 'sponsor': 'Gemalto', 'evaluation_facility': 'CEACI', 'level': 'EAL4+', 'protection_profile': '', 'mutual_recognition': 'SOG-IS CCRA', 'augmented': 'AVA_MSU.3, AVA_VLA.4', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi-cible_2008-37en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi_2008-37en.pdf'}}.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '74989bfcb830405a4750cd400060c9fcf84025a0f23fa61df041231a1ee4cce4', 'txt_hash': 'a3b2c4e05840847402dcdc15fd6f112d8eea8094ddebfaee5d1c6ed346fbc507'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'a6923322412785b9b77b3e5717d84c360ad723994cbd9e08b981ab64dd29f802', 'txt_hash': '6d7c33979b7bc8c9edcb9df02e412897ccd7283b87813ef4f4410d43559ec709'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 237599, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 17, '/CreationDate': "D:20081103113048+01'00'", '/Subject': 'LINQUS USIM 128K Smartcard: ESIGN PKI signature application loaded on GemXplore Generations G152B-EP3B platform embedded on SLE88CFX4002P/m8834b17', '/Author': 'J. Chuzel', '/Creator': 'Acrobat PDFMaker 8.0 for Word', '/Keywords': 'CER/F/07.5', '/Producer': 'Acrobat Distiller 8.0.0 (Windows)', '/ModDate': "D:20081103113130+01'00'", '/Company': 'SGDN/DCSSI', '/Comments': 'Developpeur', '/SourceModified': 'D:20081103103036', '/Title': 'DCSSI-2008/37', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.ssi.gouv.fr/', 'mailto:[email protected]']}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 410066, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 52, '/Producer': 'GPL Ghostscript 8.54', '/CreationDate': 'D:20081020110655', '/ModDate': 'D:20081020110655', '/Title': 'ASE10448v1.4_Lite', '/Creator': 'PDFCreator Version 0.9.3', '/Author': '', '/Keywords': '', '/Subject': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {'FR': {'match_rules': ['Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developers(.+)Evaluation facility(.+)Recognition arrangements'], 'cert_id': 'DCSSI-2008/37', 'cert_item': 'LINQUS USIM 128K Smartcard: ESIGN PKI signature application loaded on GemXplore Generations G152B- EP3B platform embedded on SLE88CFX4002P/m8834b17', 'cert_item_version': 'T1004530 A3 / Version 1.0', 'ref_protection_profiles': 'none', 'cc_version': 'Common Criteria version 2.3 compliant with ISO 15408:2005', 'cc_security_level': 'EAL 4 augmented AVA_MSU.3, AVA_VLA.4', 'developer': 'GEMALTO 6 rue de la verrerie, 92197 Meudon, France Infineon Technologies AG Automotive, Industrial & Multimarket, Chipcard & Security IC´s, Am Campeon 1- 12, 85579 Neubiberg, Germany Sponsor GEMALTO 6 rue de la verrerie, 92197 Meudon, France', 'cert_lab': 'CEACI (Thales Security Systems – CNES) 18 avenue Edouard Belin, 31401 Toulouse Cedex 9, France Phone: +33 (0)5 61 28 16 51, email : [email protected]'}}.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0376-2006': 1}, 'FR': {'DCSSI-2008/37': 18}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0006-2002T': 1, 'BSI-PP-0002-2001': 1}}, 'cc_security_level': {'EAL': {'EAL 4': 2, 'EAL4': 3, 'EAL5': 1, 'EAL7': 1, 'EAL 1': 1, 'EAL 3': 1, 'EAL 5': 1, 'EAL 7': 1, 'EAL5+': 1, 'EAL 4 augmented': 2}, 'ITSEC': {'ITSEC E6 and': 1}}, 'cc_sar': {'ACM': {'ACM_AUT': 1, 'ACM_CAP': 1, 'ACM_SCP': 1}, 'ADO': {'ADO_DEL': 1, 'ADO_IGS': 1}, 'ADV': {'ADV_FSP': 1, 'ADV_HLD': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_LLD': 1, 'ADV_RCR': 1, 'ADV_SPM': 1}, 'AGD': {'AGD_ADM': 1, 'AGD_USR': 1}, 'ALC': {'ALC_DVS.2': 1, 'ALC_FLR': 2, 'ALC_DVS': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_MSU.3': 2, 'AVA_VLA.4': 2, 'AVA_CCA': 1, 'AVA_MSU': 1, 'AVA_SOF': 1, 'AVA_VLA': 1}}, 'cc_sfr': {}, 'cc_claims': {'OE': {'OE.HI_VAD': 1}}, 'vendor': {'Infineon': {'Infineon Technologies AG': 4, 'Infineon': 4}, 'Gemalto': {'Gemalto': 1}, 'Thales': {'Thales': 1}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS 34': 2, 'AIS34': 1}, 'ISO': {'ISO/IEC 15408:2005': 1, 'ISO/IEC 18045:2005': 1}, 'CC': {'CCMB-2005-08-001': 1, 'CCMB-2005-08-002': 1, 'CCMB-2005-08-003': 1, 'CCMB-2005-08-004': 1}}, 'javacard_version': {'JavaCard': {'Java Card 2.2.1': 2}}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0269-2006': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP': 1, 'BSI-PP-0006-2002T-': 1, 'BSI-PP-0004-2002T-': 1, 'BSI-PP-0005-2002T-03-04-2002': 1, 'BSI-PP-0006-2002T-03-04-2002': 1, 'BSI-PP-0002': 1}}, 'cc_security_level': {'EAL': {'EAL4+': 1, 'EAL5': 1, 'EAL4': 2, 'EAL5+': 1, 'EAL5 augmented': 1, 'EAL4 augmented': 2}}, 'cc_sar': {'ACM': {'ACM_AUT.1': 1, 'ACM_CAP.4': 1, 'ACM_SCP.2': 1, 'ACM_XXX': 1}, 'ADO': {'ADO_DEL.2': 1, 'ADO_IGS.1': 1}, 'ADV': {'ADV_FSP.2': 1, 'ADV_HLD.2': 1, 'ADV_IMP.1': 1, 'ADV_LLD.1': 1, 'ADV_RCR.1': 1, 'ADV_SPM.1': 1}, 'AGD': {'AGD_ADM.1': 1, 'AGD_USR.1': 1}, 'ALC': {'ALC_DVS.2': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_MSU.3': 4, 'AVA_VLA.4': 4, 'AVA_SOF.1': 1}}, 'cc_sfr': {'FCS': {'FCS_CKM.1': 5, 'FCS_CKM.4': 4, 'FCS_COP.1': 9, 'FCS_CKM.2': 3, 'FCS_CKM.3': 3, 'FCS_CKM.1.1': 1, 'FCS_CKM': 1, 'FCS_COP': 1}, 'FDP': {'FDP_ACC.1': 7, 'FDP_ACF.1': 12, 'FDP_ETC.1': 5, 'FDP_ITC.1': 8, 'FDP_RIP.1': 4, 'FDP_SDI.2': 8, 'FDP_UIT.1': 13, 'FDP_ACF.1.1': 4, 'FDP_ACF.1.2': 4, 'FDP_UIT.1.2': 2}, 'FIA': {'FIA_AFL.1': 4, 'FIA_ATD.1': 4, 'FIA_UAU.1': 4, 'FIA_UID.1': 5, 'FIA_AFL.1.2': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.1.1': 1, 'FIA_UID.1.2': 1}, 'FMT': {'FMT_MOF.1': 5, 'FMT_MSA.1': 5, 'FMT_MSA.2': 4, 'FMT_MSA.3': 4, 'FMT_MTD.1': 5, 'FMT_SMR.1': 4, 'FMT_SMF.1': 4, 'FMT_MOF': 1, 'FMT_MSA.1.1': 3, 'FMT_MSA.3.2': 1, 'FMT_SMR.1.2': 1, 'FMT_SMF': 2}, 'FPT': {'FPT_AMT.1': 4, 'FPT_FLS.1': 4, 'FPT_PHP.1': 4, 'FPT_PHP.3': 4, 'FPT_TST.1': 5, 'FPT_SEP.1': 2, 'FPT_TST.1.3': 3, 'FPT_PHP.1.2': 1, 'FPT_TST.1.2': 1, 'FPT_SEP.1.1': 1, 'FPT_SEP.1.2': 1, 'FPT_SEP': 1}, 'FTP': {'FTP_ITC.1': 11, 'FTP_TRP.1': 3, 'FTP_ITC': 2, 'FTP_ITC.1.2': 4, 'FTP_ITC.1.3': 4, 'FTP_ITC.1.1': 1, 'FTP_TRP.1.2': 1, 'FTP_TRP.1.3': 1}}, 'cc_claims': {'D': {'D.SCD': 11, 'D.SVD': 6, 'D.DTBS': 8, 'D.VAD': 5, 'D.RAD': 13, 'D.SIGN_APPLI': 3, 'D.SIGNATURE': 4, 'D.USER_PIN': 1}, 'A': {'A.CGA': 1, 'A.SCA': 1}, 'OE': {'OE.HI_VAD': 1}}, 'vendor': {'Infineon': {'Infineon': 4}, 'Gemalto': {'Gemalto': 53}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}}, 'DES': {'DES': {'DES': 9}, '3DES': {'3-DES': 1, 'Triple-DES': 1}}}, 'asymmetric_crypto': {'RSA': {'RSA 1024': 1}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 3}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'SPA': 1, 'DPA': 2, 'timing attacks': 1}, 'FI': {'physical tampering': 5, 'Physical tampering': 1, 'malfunction': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'SCP': {'SCP02': 2}}, 'javacard_version': {'JavaCard': {'JavaCard 2.2.1': 2, 'Java Card 2.2.1': 3, 'JC2.2.1': 5}, 'GlobalPlatform': {'Global Platform 2.1.1': 1}}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'verification of correct passcode stored in SIM at perso time. NB: The passcode functionality is out of scope of this Security target. 2.3 TOE LIFE CYCLE The TOE is composed of a JavaCard and a EEPROMed Java': 1}}}.
    • The report_filename property was set to dcssi-2008_37en.pdf.
    • The st_filename property was set to cible2008_37en.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to ['CEACI'].
    • The cert_id property was set to ANSSI-CC-2008/37.
    • The st_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0269-2006']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0269-2006']}} data.
    • The report_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0376-2006']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0376-2006', 'BSI-DSZ-CC-0269-2006']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/dcssi-2008_37en.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible2008_37en.pdf.

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}]} values discarded.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The report_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to None.
    • The st_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The report_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name LINQUS USIM 128K Smartcard: ESIGN PKI signature application loaded on GemXplore Generations G152B-EP3B platform embedded on SLE88CFX4002P/m8834b17, version 1.0 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": null,
  "dgst": "18b005fb398b1c2b",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2008/37",
    "cert_lab": [
      "CEACI"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL4+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_LLD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_MSU",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_HLD",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_RCR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_USR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VLA",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_SOF",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_ADM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.0"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0376-2006"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0376-2006",
          "BSI-DSZ-CC-0269-2006"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0269-2006"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0269-2006"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2010-03-12",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2008-37-M01en.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "Maintenance Report ANSSI-CC-2008/37-M01"
      }
    ]
  },
  "manufacturer": "Gemalto - Infineon Technologies AG",
  "manufacturer_web": "https://www.gemalto.com/",
  "name": "LINQUS USIM 128K Smartcard: ESIGN PKI signature application loaded on GemXplore Generations G152B-EP3B platform embedded on SLE88CFX4002P/m8834b17, version 1.0",
  "not_valid_after": "2019-09-01",
  "not_valid_before": "2008-11-03",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "dcssi-2008_37en.pdf",
    "report_frontpage": {
      "FR": {
        "cc_security_level": "EAL 4 augmented AVA_MSU.3, AVA_VLA.4",
        "cc_version": "Common Criteria version 2.3 compliant with ISO 15408:2005",
        "cert_id": "DCSSI-2008/37",
        "cert_item": "LINQUS USIM 128K Smartcard: ESIGN PKI signature application loaded on GemXplore Generations G152B- EP3B platform embedded on SLE88CFX4002P/m8834b17",
        "cert_item_version": "T1004530 A3 / Version 1.0",
        "cert_lab": "CEACI (Thales Security Systems \u2013 CNES) 18 avenue Edouard Belin, 31401 Toulouse Cedex 9, France Phone: +33 (0)5 61 28 16 51, email : [email protected]",
        "developer": "GEMALTO 6 rue de la verrerie, 92197 Meudon, France Infineon Technologies AG Automotive, Industrial \u0026 Multimarket, Chipcard \u0026 Security IC\u00b4s, Am Campeon 1- 12, 85579 Neubiberg, Germany Sponsor GEMALTO 6 rue de la verrerie, 92197 Meudon, France",
        "match_rules": [
          "Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developers(.+)Evaluation facility(.+)Recognition arrangements"
        ],
        "ref_protection_profiles": "none"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0376-2006": 1
        },
        "FR": {
          "DCSSI-2008/37": 18
        }
      },
      "cc_claims": {
        "OE": {
          "OE.HI_VAD": 1
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP-0002-2001": 1,
          "BSI-PP-0006-2002T": 1
        }
      },
      "cc_sar": {
        "ACM": {
          "ACM_AUT": 1,
          "ACM_CAP": 1,
          "ACM_SCP": 1
        },
        "ADO": {
          "ADO_DEL": 1,
          "ADO_IGS": 1
        },
        "ADV": {
          "ADV_FSP": 1,
          "ADV_HLD": 1,
          "ADV_IMP": 1,
          "ADV_INT": 1,
          "ADV_LLD": 1,
          "ADV_RCR": 1,
          "ADV_SPM": 1
        },
        "AGD": {
          "AGD_ADM": 1,
          "AGD_USR": 1
        },
        "ALC": {
          "ALC_DVS": 1,
          "ALC_DVS.2": 1,
          "ALC_FLR": 2,
          "ALC_TAT": 1
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_DPT": 1,
          "ATE_FUN": 1,
          "ATE_IND": 1
        },
        "AVA": {
          "AVA_CCA": 1,
          "AVA_MSU": 1,
          "AVA_MSU.3": 2,
          "AVA_SOF": 1,
          "AVA_VLA": 1,
          "AVA_VLA.4": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 3": 1,
          "EAL 4": 2,
          "EAL 4 augmented": 2,
          "EAL 5": 1,
          "EAL 7": 1,
          "EAL4": 3,
          "EAL5": 1,
          "EAL5+": 1,
          "EAL7": 1
        },
        "ITSEC": {
          "ITSEC E6 and": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {
        "JavaCard": {
          "Java Card 2.2.1": 2
        }
      },
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "BSI": {
          "AIS 34": 2,
          "AIS34": 1
        },
        "CC": {
          "CCMB-2005-08-001": 1,
          "CCMB-2005-08-002": 1,
          "CCMB-2005-08-003": 1,
          "CCMB-2005-08-004": 1
        },
        "ISO": {
          "ISO/IEC 15408:2005": 1,
          "ISO/IEC 18045:2005": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Gemalto": {
          "Gemalto": 1
        },
        "Infineon": {
          "Infineon": 4,
          "Infineon Technologies AG": 4
        },
        "Thales": {
          "Thales": 1
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "J. Chuzel",
      "/Comments": "Developpeur",
      "/Company": "SGDN/DCSSI",
      "/CreationDate": "D:20081103113048+01\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 8.0 for Word",
      "/Keywords": "CER/F/07.5",
      "/ModDate": "D:20081103113130+01\u002700\u0027",
      "/Producer": "Acrobat Distiller 8.0.0 (Windows)",
      "/SourceModified": "D:20081103103036",
      "/Subject": "LINQUS USIM 128K Smartcard: ESIGN PKI signature application loaded on GemXplore Generations G152B-EP3B platform embedded on SLE88CFX4002P/m8834b17",
      "/Title": "DCSSI-2008/37",
      "pdf_file_size_bytes": 237599,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.ssi.gouv.fr/",
          "mailto:[email protected]"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 17
    },
    "st_filename": "cible2008_37en.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "RSA": {
          "RSA 1024": 1
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0269-2006": 2
        }
      },
      "cc_claims": {
        "A": {
          "A.CGA": 1,
          "A.SCA": 1
        },
        "D": {
          "D.DTBS": 8,
          "D.RAD": 13,
          "D.SCD": 11,
          "D.SIGNATURE": 4,
          "D.SIGN_APPLI": 3,
          "D.SVD": 6,
          "D.USER_PIN": 1,
          "D.VAD": 5
        },
        "OE": {
          "OE.HI_VAD": 1
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP": 1,
          "BSI-PP-0002": 1,
          "BSI-PP-0004-2002T-": 1,
          "BSI-PP-0005-2002T-03-04-2002": 1,
          "BSI-PP-0006-2002T-": 1,
          "BSI-PP-0006-2002T-03-04-2002": 1
        }
      },
      "cc_sar": {
        "ACM": {
          "ACM_AUT.1": 1,
          "ACM_CAP.4": 1,
          "ACM_SCP.2": 1,
          "ACM_XXX": 1
        },
        "ADO": {
          "ADO_DEL.2": 1,
          "ADO_IGS.1": 1
        },
        "ADV": {
          "ADV_FSP.2": 1,
          "ADV_HLD.2": 1,
          "ADV_IMP.1": 1,
          "ADV_LLD.1": 1,
          "ADV_RCR.1": 1,
          "ADV_SPM.1": 1
        },
        "AGD": {
          "AGD_ADM.1": 1,
          "AGD_USR.1": 1
        },
        "ALC": {
          "ALC_DVS.1": 1,
          "ALC_DVS.2": 1,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_MSU.3": 4,
          "AVA_SOF.1": 1,
          "AVA_VLA.4": 4
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 2,
          "EAL4 augmented": 2,
          "EAL4+": 1,
          "EAL5": 1,
          "EAL5 augmented": 1,
          "EAL5+": 1
        }
      },
      "cc_sfr": {
        "FCS": {
          "FCS_CKM": 1,
          "FCS_CKM.1": 5,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 3,
          "FCS_CKM.3": 3,
          "FCS_CKM.4": 4,
          "FCS_COP": 1,
          "FCS_COP.1": 9
        },
        "FDP": {
          "FDP_ACC.1": 7,
          "FDP_ACF.1": 12,
          "FDP_ACF.1.1": 4,
          "FDP_ACF.1.2": 4,
          "FDP_ETC.1": 5,
          "FDP_ITC.1": 8,
          "FDP_RIP.1": 4,
          "FDP_SDI.2": 8,
          "FDP_UIT.1": 13,
          "FDP_UIT.1.2": 2
        },
        "FIA": {
          "FIA_AFL.1": 4,
          "FIA_AFL.1.2": 1,
          "FIA_ATD.1": 4,
          "FIA_UAU.1": 4,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UID.1": 5,
          "FIA_UID.1.2": 1
        },
        "FMT": {
          "FMT_MOF": 1,
          "FMT_MOF.1": 5,
          "FMT_MSA.1": 5,
          "FMT_MSA.1.1": 3,
          "FMT_MSA.2": 4,
          "FMT_MSA.3": 4,
          "FMT_MSA.3.2": 1,
          "FMT_MTD.1": 5,
          "FMT_SMF": 2,
          "FMT_SMF.1": 4,
          "FMT_SMR.1": 4,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_AMT.1": 4,
          "FPT_FLS.1": 4,
          "FPT_PHP.1": 4,
          "FPT_PHP.1.2": 1,
          "FPT_PHP.3": 4,
          "FPT_SEP": 1,
          "FPT_SEP.1": 2,
          "FPT_SEP.1.1": 1,
          "FPT_SEP.1.2": 1,
          "FPT_TST.1": 5,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 3
        },
        "FTP": {
          "FTP_ITC": 2,
          "FTP_ITC.1": 11,
          "FTP_ITC.1.1": 1,
          "FTP_ITC.1.2": 4,
          "FTP_ITC.1.3": 4,
          "FTP_TRP.1": 3,
          "FTP_TRP.1.2": 1,
          "FTP_TRP.1.3": 1
        }
      },
      "certification_process": {
        "OutOfScope": {
          "out of scope": 1,
          "verification of correct passcode stored in SIM at perso time. NB: The passcode functionality is out of scope of this Security target. 2.3 TOE LIFE CYCLE The TOE is composed of a JavaCard and a EEPROMed Java": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 3
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {
        "GlobalPlatform": {
          "Global Platform 2.1.1": 1
        },
        "JavaCard": {
          "JC2.2.1": 5,
          "Java Card 2.2.1": 3,
          "JavaCard 2.2.1": 2
        }
      },
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "FI": {
          "Physical tampering": 1,
          "malfunction": 1,
          "physical tampering": 5
        },
        "SCA": {
          "DPA": 2,
          "SPA": 1,
          "timing attacks": 1
        }
      },
      "standard_id": {
        "SCP": {
          "SCP02": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 1
          }
        },
        "DES": {
          "3DES": {
            "3-DES": 1,
            "Triple-DES": 1
          },
          "DES": {
            "DES": 9
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Gemalto": {
          "Gemalto": 53
        },
        "Infineon": {
          "Infineon": 4
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "",
      "/CreationDate": "D:20081020110655",
      "/Creator": "PDFCreator Version 0.9.3",
      "/Keywords": "",
      "/ModDate": "D:20081020110655",
      "/Producer": "GPL Ghostscript 8.54",
      "/Subject": "",
      "/Title": "ASE10448v1.4_Lite",
      "pdf_file_size_bytes": 410066,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 52
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/dcssi-2008_37en.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "AVA_VLA.4",
      "EAL4+",
      "AVA_MSU.3"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible2008_37en.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "74989bfcb830405a4750cd400060c9fcf84025a0f23fa61df041231a1ee4cce4",
      "txt_hash": "a3b2c4e05840847402dcdc15fd6f112d8eea8094ddebfaee5d1c6ed346fbc507"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "a6923322412785b9b77b3e5717d84c360ad723994cbd9e08b981ab64dd29f802",
      "txt_hash": "6d7c33979b7bc8c9edcb9df02e412897ccd7283b87813ef4f4410d43559ec709"
    }
  },
  "status": "archived"
}