LINQUS USIM 128K Smartcard: ESIGN PKI signature application loaded on GemXplore Generations G152B-EP3B platform embedded on SLE88CFX4002P/m8834b17, version 1.0
CSV information
Status | archived |
---|---|
Valid from | 03.11.2008 |
Valid until | 01.09.2019 |
Scheme | 🇫🇷 FR |
Manufacturer | Gemalto - Infineon Technologies AG |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | EAL4+, AVA_MSU.3, AVA_VLA.4 |
Maintenance updates | Maintenance Report ANSSI-CC-2008/37-M01 (12.03.2010) Certification report |
Heuristics summary
Certificate
Certification report
Extracted keywords
JavaCard versions
Java Card 2.2.1Vendor
Infineon Technologies AG, Infineon, Gemalto, ThalesSecurity level
EAL 4, EAL4, EAL5, EAL7, EAL 1, EAL 3, EAL 5, EAL 7, EAL5+, EAL 4 augmented, ITSEC E6 andClaims
OE.HI_VADSecurity Assurance Requirements (SAR)
ACM_AUT, ACM_CAP, ACM_SCP, ADO_DEL, ADO_IGS, ADV_FSP, ADV_HLD, ADV_IMP, ADV_INT, ADV_LLD, ADV_RCR, ADV_SPM, AGD_ADM, AGD_USR, ALC_DVS.2, ALC_FLR, ALC_DVS, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_MSU.3, AVA_VLA.4, AVA_CCA, AVA_MSU, AVA_SOF, AVA_VLAProtection profiles
BSI-PP-0006-2002T, BSI-PP-0002-2001Certificates
BSI-DSZ-CC-0376-2006, DCSSI-2008/37Standards
AIS 34, AIS34, ISO/IEC 15408:2005, ISO/IEC 18045:2005, CCMB-2005-08-001, CCMB-2005-08-002, CCMB-2005-08-003, CCMB-2005-08-004File metadata
Title | DCSSI-2008/37 |
---|---|
Subject | LINQUS USIM 128K Smartcard: ESIGN PKI signature application loaded on GemXplore Generations G152B-EP3B platform embedded on SLE88CFX4002P/m8834b17 |
Keywords | CER/F/07.5 |
Author | J. Chuzel |
Creation date | D:20081103113048+01'00' |
Modification date | D:20081103113130+01'00' |
Pages | 17 |
Creator | Acrobat PDFMaker 8.0 for Word |
Producer | Acrobat Distiller 8.0.0 (Windows) |
Frontpage
Certificate ID | DCSSI-2008/37 |
---|---|
Certified item | LINQUS USIM 128K Smartcard: ESIGN PKI signature application loaded on GemXplore Generations G152B- EP3B platform embedded on SLE88CFX4002P/m8834b17 |
Certification lab | CEACI (Thales Security Systems – CNES) 18 avenue Edouard Belin, 31401 Toulouse Cedex 9, France Phone: +33 (0)5 61 28 16 51, email : [email protected] |
Developer | GEMALTO 6 rue de la verrerie, 92197 Meudon, France Infineon Technologies AG Automotive, Industrial & Multimarket, Chipcard & Security IC´s, Am Campeon 1- 12, 85579 Neubiberg, Germany Sponsor GEMALTO 6 rue de la verrerie, 92197 Meudon, France |
References
Outgoing- BSI-DSZ-CC-0376-2006 - archived - Infineon Smart Card IC (Security Controller) SLE88CFX4000P/m8830b17, SLE88CFX4002P/m8834b17, SLE88CFX3520P/m8847b17, SLE88CFX2920P/m8849b17, SLE88CF4000P/m8845b17, SLE88CF4002P/m8846b17 SLE88CF3520P/m8848b17, SLE88CF2920P/m8850b17 each with PSL V0.50.23_E107 or PSL V0.50.23_E110 and specific IC Dedicated Software
Security target
Extracted keywords
Symmetric Algorithms
AES, DES, 3-DES, Triple-DESAsymmetric Algorithms
RSA 1024Hash functions
SHA-1JavaCard versions
JavaCard 2.2.1, Java Card 2.2.1, JC2.2.1, Global Platform 2.1.1Vendor
Infineon, GemaltoSecurity level
EAL4+, EAL5, EAL4, EAL5+, EAL5 augmented, EAL4 augmentedClaims
D.SCD, D.SVD, D.DTBS, D.VAD, D.RAD, D.SIGN_APPLI, D.SIGNATURE, D.USER_PIN, A.CGA, A.SCA, OE.HI_VADSecurity Assurance Requirements (SAR)
ACM_AUT.1, ACM_CAP.4, ACM_SCP.2, ACM_XXX, ADO_DEL.2, ADO_IGS.1, ADV_FSP.2, ADV_HLD.2, ADV_IMP.1, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.2, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.3, AVA_VLA.4, AVA_SOF.1Security Functional Requirements (SFR)
FCS_CKM.1, FCS_CKM.4, FCS_COP.1, FCS_CKM.2, FCS_CKM.3, FCS_CKM.1.1, FCS_CKM, FCS_COP, FDP_ACC.1, FDP_ACF.1, FDP_ETC.1, FDP_ITC.1, FDP_RIP.1, FDP_SDI.2, FDP_UIT.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_UIT.1.2, FIA_AFL.1, FIA_ATD.1, FIA_UAU.1, FIA_UID.1, FIA_AFL.1.2, FIA_UAU.1.2, FIA_UAU.1.1, FIA_UID.1.2, FMT_MOF.1, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_MTD.1, FMT_SMR.1, FMT_SMF.1, FMT_MOF, FMT_MSA.1.1, FMT_MSA.3.2, FMT_SMR.1.2, FMT_SMF, FPT_AMT.1, FPT_FLS.1, FPT_PHP.1, FPT_PHP.3, FPT_TST.1, FPT_SEP.1, FPT_TST.1.3, FPT_PHP.1.2, FPT_TST.1.2, FPT_SEP.1.1, FPT_SEP.1.2, FPT_SEP, FTP_ITC.1, FTP_TRP.1, FTP_ITC, FTP_ITC.1.2, FTP_ITC.1.3, FTP_ITC.1.1, FTP_TRP.1.2, FTP_TRP.1.3Protection profiles
BSI-PP, BSI-PP-0006-2002T-, BSI-PP-0004-2002T-, BSI-PP-0005-2002T-03-04-2002, BSI-PP-0006-2002T-03-04-2002, BSI-PP-0002Certificates
BSI-DSZ-CC-0269-2006Side-channel analysis
SPA, DPA, timing attacks, physical tampering, Physical tampering, malfunctionCertification process
out of scope, verification of correct passcode stored in SIM at perso time. NB: The passcode functionality is out of scope of this Security target. 2.3 TOE LIFE CYCLE The TOE is composed of a JavaCard and a EEPROMed JavaStandards
SCP02File metadata
Title | ASE10448v1.4_Lite |
---|---|
Creation date | D:20081020110655 |
Modification date | D:20081020110655 |
Pages | 52 |
Creator | PDFCreator Version 0.9.3 |
Producer | GPL Ghostscript 8.54 |
References
Outgoing- BSI-DSZ-CC-0269-2006 - archived - Infineon Smart Card IC (Security Controller) SLE88CFX4000P/m8830b17, SLE88CFX4002P/m8834b17, SLE88CFX3520P/m8847b17 and SLE88CFX2920P/m8849b17 each with PSL V0.50.23 and specific IC Dedicated Software
Heuristics
Extracted SARs
ADV_FSP.2, ADV_HLD.2, ADV_IMP.1, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.3, AVA_SOF.1, AVA_VLA.4Similar certificates
Name | Certificate ID | |
---|---|---|
NCR E10 New Generation FCR 2.0 (FCR Application Version 2.0, OpenSSL Version 1.0.2d Secure-IC firmware and hardware crypto library Version 0.0.6) | 21.0.03/TSE-CCCS-48 | Compare |
References
Updates
-
10.02.2025 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
05.02.2025 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'_type': 'sec_certs.sample.document_state.DocumentState'}
data. - The st property was updated, with the
{'_type': 'sec_certs.sample.document_state.DocumentState'}
data. - The cert property was updated, with the
{'_type': 'sec_certs.sample.document_state.DocumentState'}
data.
The computed heuristics were updated.
- The following values were inserted:
{'protection_profiles': None, 'eal': 'EAL4+'}
. - The prev_certificates property was set to
None
. - The next_certificates property was set to
None
. - The scheme_data property was set to
{'product': 'Carte Linqus USIM 128K : Composant SLE88CFX4002P/m8834b17 masqué par la plateforme GemXplore Generations G152B-EP3B et embarquant l'application de signature ESIGN, réf. T1004530 A3, v.1.0', 'url': 'https://cyber.gouv.fr/produits-certifies/carte-linqus-usim-128k-composant-sle88cfx4002pm8834b17-masque-par-la-plateforme', 'description': 'Le produit évalué est la ''Carte Linqus USIM 128K : Composant SLE88CFX4002P/m8834b17 masqué par la plateforme GemXplore Generations G152B-EP3B et embarquant l'application de signature ESIGN, version 1.0'' développée par GEMALTO et Infineon Technologies AG. Ce produit correspond à une carte à puce insérée dans un téléphone portable (i.e. carte SIM). Il est destiné à être util', 'sponsor': 'Gemalto', 'developer': 'Gemalto, Infineon Technologies AG', 'cert_id': 'ANSSI-CC-2008/37', 'level': 'EAL4+', 'enhanced': {'cert_id': 'ANSSI-CC-2008/37', 'certification_date': '2008-11-03', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 2.3', 'developer': 'Gemalto, Infineon Technologies AG', 'sponsor': 'Gemalto', 'evaluation_facility': 'CEACI', 'level': 'EAL4+', 'protection_profile': '', 'mutual_recognition': 'SOG-IS CCRA', 'augmented': 'AVA_MSU.3, AVA_VLA.4', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi-cible_2008-37en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi_2008-37en.pdf'}}
.
- The report property was updated, with the
-
03.02.2025 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
27.01.2025 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'Carte Linqus USIM 128K : Composant SLE88CFX4002P/m8834b17 masqué par la plateforme GemXplore Generations G152B-EP3B et embarquant l'application de signature ESIGN, réf. T1004530 A3, v.1.0', 'url': 'https://cyber.gouv.fr/produits-certifies/carte-linqus-usim-128k-composant-sle88cfx4002pm8834b17-masque-par-la-plateforme', 'description': 'Le produit évalué est la ''Carte Linqus USIM 128K : Composant SLE88CFX4002P/m8834b17 masqué par la plateforme GemXplore Generations G152B-EP3B et embarquant l'application de signature ESIGN, version 1.0'' développée par GEMALTO et Infineon Technologies AG. Ce produit correspond à une carte à puce insérée dans un téléphone portable (i.e. carte SIM). Il est destiné à être util', 'sponsor': 'Gemalto', 'developer': 'Gemalto, Infineon Technologies AG', 'cert_id': 'ANSSI-CC-2008/37', 'level': 'EAL4+', 'enhanced': {'cert_id': 'ANSSI-CC-2008/37', 'certification_date': '2008-11-03', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 2.3', 'developer': 'Gemalto, Infineon Technologies AG', 'sponsor': 'Gemalto', 'evaluation_facility': 'CEACI', 'level': 'EAL4+', 'protection_profile': '', 'mutual_recognition': 'SOG-IS CCRA', 'augmented': 'AVA_MSU.3, AVA_VLA.4', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi-cible_2008-37en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi_2008-37en.pdf'}}
.
- The scheme_data property was set to
-
06.01.2025 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
16.12.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'Carte Linqus USIM 128K : Composant SLE88CFX4002P/m8834b17 masqué par la plateforme GemXplore Generations G152B-EP3B et embarquant l'application de signature ESIGN, réf. T1004530 A3, v.1.0', 'url': 'https://cyber.gouv.fr/produits-certifies/carte-linqus-usim-128k-composant-sle88cfx4002pm8834b17-masque-par-la-plateforme', 'description': 'Le produit évalué est la ''Carte Linqus USIM 128K : Composant SLE88CFX4002P/m8834b17 masqué par la plateforme GemXplore Generations G152B-EP3B et embarquant l'application de signature ESIGN, version 1.0'' développée par GEMALTO et Infineon Technologies AG. Ce produit correspond à une carte à puce insérée dans un téléphone portable (i.e. carte SIM). Il est destiné à être util', 'sponsor': 'Gemalto', 'developer': 'Gemalto, Infineon Technologies AG', 'cert_id': 'ANSSI-CC-2008/37', 'level': 'EAL4+', 'enhanced': {'cert_id': 'ANSSI-CC-2008/37', 'certification_date': '2008-11-03', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 2.3', 'developer': 'Gemalto, Infineon Technologies AG', 'sponsor': 'Gemalto', 'evaluation_facility': 'CEACI', 'level': 'EAL4+', 'protection_profile': '', 'mutual_recognition': 'SOG-IS CCRA', 'augmented': 'AVA_MSU.3, AVA_VLA.4', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi-cible_2008-37en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi_2008-37en.pdf'}}
.
- The scheme_data property was set to
-
09.12.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': [], 'next_certificates': []}
.
- The following values were inserted:
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'Carte Linqus USIM 128K : Composant SLE88CFX4002P/m8834b17 masqué par la plateforme GemXplore Generations G152B-EP3B et embarquant l'application de signature ESIGN, réf. T1004530 A3, v.1.0', 'url': 'https://cyber.gouv.fr/produits-certifies/carte-linqus-usim-128k-composant-sle88cfx4002pm8834b17-masque-par-la-plateforme', 'description': 'Le produit évalué est la ''Carte Linqus USIM 128K : Composant SLE88CFX4002P/m8834b17 masqué par la plateforme GemXplore Generations G152B-EP3B et embarquant l'application de signature ESIGN, version 1.0'' développée par GEMALTO et Infineon Technologies AG. Ce produit correspond à une carte à puce insérée dans un téléphone portable (i.e. carte SIM). Il est destiné à être util', 'sponsor': 'Gemalto', 'developer': 'Gemalto, Infineon Technologies AG', 'cert_id': 'ANSSI-CC-2008/37', 'level': 'EAL4+', 'enhanced': {'cert_id': 'ANSSI-CC-2008/37', 'certification_date': '2008-11-03', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 2.3', 'developer': 'Gemalto, Infineon Technologies AG', 'sponsor': 'Gemalto', 'evaluation_facility': 'CEACI', 'level': 'EAL4+', 'protection_profile': '', 'mutual_recognition': 'SOG-IS CCRA', 'augmented': 'AVA_MSU.3, AVA_VLA.4', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi-cible_2008-37en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi_2008-37en.pdf'}}
.
- The scheme_data property was set to
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '74989bfcb830405a4750cd400060c9fcf84025a0f23fa61df041231a1ee4cce4', 'txt_hash': 'a3b2c4e05840847402dcdc15fd6f112d8eea8094ddebfaee5d1c6ed346fbc507'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'a6923322412785b9b77b3e5717d84c360ad723994cbd9e08b981ab64dd29f802', 'txt_hash': '6d7c33979b7bc8c9edcb9df02e412897ccd7283b87813ef4f4410d43559ec709'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 237599, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 17, '/CreationDate': "D:20081103113048+01'00'", '/Subject': 'LINQUS USIM 128K Smartcard: ESIGN PKI signature application loaded on GemXplore Generations G152B-EP3B platform embedded on SLE88CFX4002P/m8834b17', '/Author': 'J. Chuzel', '/Creator': 'Acrobat PDFMaker 8.0 for Word', '/Keywords': 'CER/F/07.5', '/Producer': 'Acrobat Distiller 8.0.0 (Windows)', '/ModDate': "D:20081103113130+01'00'", '/Company': 'SGDN/DCSSI', '/Comments': 'Developpeur', '/SourceModified': 'D:20081103103036', '/Title': 'DCSSI-2008/37', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.ssi.gouv.fr/', 'mailto:[email protected]']}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 410066, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 52, '/Producer': 'GPL Ghostscript 8.54', '/CreationDate': 'D:20081020110655', '/ModDate': 'D:20081020110655', '/Title': 'ASE10448v1.4_Lite', '/Creator': 'PDFCreator Version 0.9.3', '/Author': '', '/Keywords': '', '/Subject': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{'FR': {'match_rules': ['Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developers(.+)Evaluation facility(.+)Recognition arrangements'], 'cert_id': 'DCSSI-2008/37', 'cert_item': 'LINQUS USIM 128K Smartcard: ESIGN PKI signature application loaded on GemXplore Generations G152B- EP3B platform embedded on SLE88CFX4002P/m8834b17', 'cert_item_version': 'T1004530 A3 / Version 1.0', 'ref_protection_profiles': 'none', 'cc_version': 'Common Criteria version 2.3 compliant with ISO 15408:2005', 'cc_security_level': 'EAL 4 augmented AVA_MSU.3, AVA_VLA.4', 'developer': 'GEMALTO 6 rue de la verrerie, 92197 Meudon, France Infineon Technologies AG Automotive, Industrial & Multimarket, Chipcard & Security IC´s, Am Campeon 1- 12, 85579 Neubiberg, Germany Sponsor GEMALTO 6 rue de la verrerie, 92197 Meudon, France', 'cert_lab': 'CEACI (Thales Security Systems – CNES) 18 avenue Edouard Belin, 31401 Toulouse Cedex 9, France Phone: +33 (0)5 61 28 16 51, email : [email protected]'}}
. - The report_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0376-2006': 1}, 'FR': {'DCSSI-2008/37': 18}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0006-2002T': 1, 'BSI-PP-0002-2001': 1}}, 'cc_security_level': {'EAL': {'EAL 4': 2, 'EAL4': 3, 'EAL5': 1, 'EAL7': 1, 'EAL 1': 1, 'EAL 3': 1, 'EAL 5': 1, 'EAL 7': 1, 'EAL5+': 1, 'EAL 4 augmented': 2}, 'ITSEC': {'ITSEC E6 and': 1}}, 'cc_sar': {'ACM': {'ACM_AUT': 1, 'ACM_CAP': 1, 'ACM_SCP': 1}, 'ADO': {'ADO_DEL': 1, 'ADO_IGS': 1}, 'ADV': {'ADV_FSP': 1, 'ADV_HLD': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_LLD': 1, 'ADV_RCR': 1, 'ADV_SPM': 1}, 'AGD': {'AGD_ADM': 1, 'AGD_USR': 1}, 'ALC': {'ALC_DVS.2': 1, 'ALC_FLR': 2, 'ALC_DVS': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_MSU.3': 2, 'AVA_VLA.4': 2, 'AVA_CCA': 1, 'AVA_MSU': 1, 'AVA_SOF': 1, 'AVA_VLA': 1}}, 'cc_sfr': {}, 'cc_claims': {'OE': {'OE.HI_VAD': 1}}, 'vendor': {'Infineon': {'Infineon Technologies AG': 4, 'Infineon': 4}, 'Gemalto': {'Gemalto': 1}, 'Thales': {'Thales': 1}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS 34': 2, 'AIS34': 1}, 'ISO': {'ISO/IEC 15408:2005': 1, 'ISO/IEC 18045:2005': 1}, 'CC': {'CCMB-2005-08-001': 1, 'CCMB-2005-08-002': 1, 'CCMB-2005-08-003': 1, 'CCMB-2005-08-004': 1}}, 'javacard_version': {'JavaCard': {'Java Card 2.2.1': 2}}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0269-2006': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP': 1, 'BSI-PP-0006-2002T-': 1, 'BSI-PP-0004-2002T-': 1, 'BSI-PP-0005-2002T-03-04-2002': 1, 'BSI-PP-0006-2002T-03-04-2002': 1, 'BSI-PP-0002': 1}}, 'cc_security_level': {'EAL': {'EAL4+': 1, 'EAL5': 1, 'EAL4': 2, 'EAL5+': 1, 'EAL5 augmented': 1, 'EAL4 augmented': 2}}, 'cc_sar': {'ACM': {'ACM_AUT.1': 1, 'ACM_CAP.4': 1, 'ACM_SCP.2': 1, 'ACM_XXX': 1}, 'ADO': {'ADO_DEL.2': 1, 'ADO_IGS.1': 1}, 'ADV': {'ADV_FSP.2': 1, 'ADV_HLD.2': 1, 'ADV_IMP.1': 1, 'ADV_LLD.1': 1, 'ADV_RCR.1': 1, 'ADV_SPM.1': 1}, 'AGD': {'AGD_ADM.1': 1, 'AGD_USR.1': 1}, 'ALC': {'ALC_DVS.2': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_MSU.3': 4, 'AVA_VLA.4': 4, 'AVA_SOF.1': 1}}, 'cc_sfr': {'FCS': {'FCS_CKM.1': 5, 'FCS_CKM.4': 4, 'FCS_COP.1': 9, 'FCS_CKM.2': 3, 'FCS_CKM.3': 3, 'FCS_CKM.1.1': 1, 'FCS_CKM': 1, 'FCS_COP': 1}, 'FDP': {'FDP_ACC.1': 7, 'FDP_ACF.1': 12, 'FDP_ETC.1': 5, 'FDP_ITC.1': 8, 'FDP_RIP.1': 4, 'FDP_SDI.2': 8, 'FDP_UIT.1': 13, 'FDP_ACF.1.1': 4, 'FDP_ACF.1.2': 4, 'FDP_UIT.1.2': 2}, 'FIA': {'FIA_AFL.1': 4, 'FIA_ATD.1': 4, 'FIA_UAU.1': 4, 'FIA_UID.1': 5, 'FIA_AFL.1.2': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.1.1': 1, 'FIA_UID.1.2': 1}, 'FMT': {'FMT_MOF.1': 5, 'FMT_MSA.1': 5, 'FMT_MSA.2': 4, 'FMT_MSA.3': 4, 'FMT_MTD.1': 5, 'FMT_SMR.1': 4, 'FMT_SMF.1': 4, 'FMT_MOF': 1, 'FMT_MSA.1.1': 3, 'FMT_MSA.3.2': 1, 'FMT_SMR.1.2': 1, 'FMT_SMF': 2}, 'FPT': {'FPT_AMT.1': 4, 'FPT_FLS.1': 4, 'FPT_PHP.1': 4, 'FPT_PHP.3': 4, 'FPT_TST.1': 5, 'FPT_SEP.1': 2, 'FPT_TST.1.3': 3, 'FPT_PHP.1.2': 1, 'FPT_TST.1.2': 1, 'FPT_SEP.1.1': 1, 'FPT_SEP.1.2': 1, 'FPT_SEP': 1}, 'FTP': {'FTP_ITC.1': 11, 'FTP_TRP.1': 3, 'FTP_ITC': 2, 'FTP_ITC.1.2': 4, 'FTP_ITC.1.3': 4, 'FTP_ITC.1.1': 1, 'FTP_TRP.1.2': 1, 'FTP_TRP.1.3': 1}}, 'cc_claims': {'D': {'D.SCD': 11, 'D.SVD': 6, 'D.DTBS': 8, 'D.VAD': 5, 'D.RAD': 13, 'D.SIGN_APPLI': 3, 'D.SIGNATURE': 4, 'D.USER_PIN': 1}, 'A': {'A.CGA': 1, 'A.SCA': 1}, 'OE': {'OE.HI_VAD': 1}}, 'vendor': {'Infineon': {'Infineon': 4}, 'Gemalto': {'Gemalto': 53}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}}, 'DES': {'DES': {'DES': 9}, '3DES': {'3-DES': 1, 'Triple-DES': 1}}}, 'asymmetric_crypto': {'RSA': {'RSA 1024': 1}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 3}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'SPA': 1, 'DPA': 2, 'timing attacks': 1}, 'FI': {'physical tampering': 5, 'Physical tampering': 1, 'malfunction': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'SCP': {'SCP02': 2}}, 'javacard_version': {'JavaCard': {'JavaCard 2.2.1': 2, 'Java Card 2.2.1': 3, 'JC2.2.1': 5}, 'GlobalPlatform': {'Global Platform 2.1.1': 1}}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'verification of correct passcode stored in SIM at perso time. NB: The passcode functionality is out of scope of this Security target. 2.3 TOE LIFE CYCLE The TOE is composed of a JavaCard and a EEPROMed Java': 1}}}
. - The report_filename property was set to
dcssi-2008_37en.pdf
. - The st_filename property was set to
cible2008_37en.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['CEACI']
. - The cert_id property was set to
ANSSI-CC-2008/37
. - The st_references property was updated, with the
{'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0269-2006']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0269-2006']}}
data. - The report_references property was updated, with the
{'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0376-2006']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0376-2006', 'BSI-DSZ-CC-0269-2006']}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/dcssi-2008_37en.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible2008_37en.pdf
.
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}]}
values discarded.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The report_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
. - The st_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data. - The report_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data.
- The report property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name LINQUS USIM 128K Smartcard: ESIGN PKI signature application loaded on GemXplore Generations G152B-EP3B platform embedded on SLE88CFX4002P/m8834b17, version 1.0 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "18b005fb398b1c2b",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2008/37",
"cert_lab": [
"CEACI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL4+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_LLD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_MSU",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_HLD",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_RCR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_USR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VLA",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_SOF",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_ADM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"1.0"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0376-2006"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0376-2006",
"BSI-DSZ-CC-0269-2006"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0269-2006"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0269-2006"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2010-03-12",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2008-37-M01en.pdf",
"maintenance_st_link": null,
"maintenance_title": "Maintenance Report ANSSI-CC-2008/37-M01"
}
]
},
"manufacturer": "Gemalto - Infineon Technologies AG",
"manufacturer_web": "https://www.gemalto.com/",
"name": "LINQUS USIM 128K Smartcard: ESIGN PKI signature application loaded on GemXplore Generations G152B-EP3B platform embedded on SLE88CFX4002P/m8834b17, version 1.0",
"not_valid_after": "2019-09-01",
"not_valid_before": "2008-11-03",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "dcssi-2008_37en.pdf",
"report_frontpage": {
"FR": {
"cc_security_level": "EAL 4 augmented AVA_MSU.3, AVA_VLA.4",
"cc_version": "Common Criteria version 2.3 compliant with ISO 15408:2005",
"cert_id": "DCSSI-2008/37",
"cert_item": "LINQUS USIM 128K Smartcard: ESIGN PKI signature application loaded on GemXplore Generations G152B- EP3B platform embedded on SLE88CFX4002P/m8834b17",
"cert_item_version": "T1004530 A3 / Version 1.0",
"cert_lab": "CEACI (Thales Security Systems \u2013 CNES) 18 avenue Edouard Belin, 31401 Toulouse Cedex 9, France Phone: +33 (0)5 61 28 16 51, email : [email protected]",
"developer": "GEMALTO 6 rue de la verrerie, 92197 Meudon, France Infineon Technologies AG Automotive, Industrial \u0026 Multimarket, Chipcard \u0026 Security IC\u00b4s, Am Campeon 1- 12, 85579 Neubiberg, Germany Sponsor GEMALTO 6 rue de la verrerie, 92197 Meudon, France",
"match_rules": [
"Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developers(.+)Evaluation facility(.+)Recognition arrangements"
],
"ref_protection_profiles": "none"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0376-2006": 1
},
"FR": {
"DCSSI-2008/37": 18
}
},
"cc_claims": {
"OE": {
"OE.HI_VAD": 1
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0002-2001": 1,
"BSI-PP-0006-2002T": 1
}
},
"cc_sar": {
"ACM": {
"ACM_AUT": 1,
"ACM_CAP": 1,
"ACM_SCP": 1
},
"ADO": {
"ADO_DEL": 1,
"ADO_IGS": 1
},
"ADV": {
"ADV_FSP": 1,
"ADV_HLD": 1,
"ADV_IMP": 1,
"ADV_INT": 1,
"ADV_LLD": 1,
"ADV_RCR": 1,
"ADV_SPM": 1
},
"AGD": {
"AGD_ADM": 1,
"AGD_USR": 1
},
"ALC": {
"ALC_DVS": 1,
"ALC_DVS.2": 1,
"ALC_FLR": 2,
"ALC_TAT": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_DPT": 1,
"ATE_FUN": 1,
"ATE_IND": 1
},
"AVA": {
"AVA_CCA": 1,
"AVA_MSU": 1,
"AVA_MSU.3": 2,
"AVA_SOF": 1,
"AVA_VLA": 1,
"AVA_VLA.4": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 3": 1,
"EAL 4": 2,
"EAL 4 augmented": 2,
"EAL 5": 1,
"EAL 7": 1,
"EAL4": 3,
"EAL5": 1,
"EAL5+": 1,
"EAL7": 1
},
"ITSEC": {
"ITSEC E6 and": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {
"JavaCard": {
"Java Card 2.2.1": 2
}
},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"BSI": {
"AIS 34": 2,
"AIS34": 1
},
"CC": {
"CCMB-2005-08-001": 1,
"CCMB-2005-08-002": 1,
"CCMB-2005-08-003": 1,
"CCMB-2005-08-004": 1
},
"ISO": {
"ISO/IEC 15408:2005": 1,
"ISO/IEC 18045:2005": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Gemalto": {
"Gemalto": 1
},
"Infineon": {
"Infineon": 4,
"Infineon Technologies AG": 4
},
"Thales": {
"Thales": 1
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "J. Chuzel",
"/Comments": "Developpeur",
"/Company": "SGDN/DCSSI",
"/CreationDate": "D:20081103113048+01\u002700\u0027",
"/Creator": "Acrobat PDFMaker 8.0 for Word",
"/Keywords": "CER/F/07.5",
"/ModDate": "D:20081103113130+01\u002700\u0027",
"/Producer": "Acrobat Distiller 8.0.0 (Windows)",
"/SourceModified": "D:20081103103036",
"/Subject": "LINQUS USIM 128K Smartcard: ESIGN PKI signature application loaded on GemXplore Generations G152B-EP3B platform embedded on SLE88CFX4002P/m8834b17",
"/Title": "DCSSI-2008/37",
"pdf_file_size_bytes": 237599,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.ssi.gouv.fr/",
"mailto:[email protected]"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 17
},
"st_filename": "cible2008_37en.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"RSA": {
"RSA 1024": 1
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0269-2006": 2
}
},
"cc_claims": {
"A": {
"A.CGA": 1,
"A.SCA": 1
},
"D": {
"D.DTBS": 8,
"D.RAD": 13,
"D.SCD": 11,
"D.SIGNATURE": 4,
"D.SIGN_APPLI": 3,
"D.SVD": 6,
"D.USER_PIN": 1,
"D.VAD": 5
},
"OE": {
"OE.HI_VAD": 1
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP": 1,
"BSI-PP-0002": 1,
"BSI-PP-0004-2002T-": 1,
"BSI-PP-0005-2002T-03-04-2002": 1,
"BSI-PP-0006-2002T-": 1,
"BSI-PP-0006-2002T-03-04-2002": 1
}
},
"cc_sar": {
"ACM": {
"ACM_AUT.1": 1,
"ACM_CAP.4": 1,
"ACM_SCP.2": 1,
"ACM_XXX": 1
},
"ADO": {
"ADO_DEL.2": 1,
"ADO_IGS.1": 1
},
"ADV": {
"ADV_FSP.2": 1,
"ADV_HLD.2": 1,
"ADV_IMP.1": 1,
"ADV_LLD.1": 1,
"ADV_RCR.1": 1,
"ADV_SPM.1": 1
},
"AGD": {
"AGD_ADM.1": 1,
"AGD_USR.1": 1
},
"ALC": {
"ALC_DVS.1": 1,
"ALC_DVS.2": 1,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_MSU.3": 4,
"AVA_SOF.1": 1,
"AVA_VLA.4": 4
}
},
"cc_security_level": {
"EAL": {
"EAL4": 2,
"EAL4 augmented": 2,
"EAL4+": 1,
"EAL5": 1,
"EAL5 augmented": 1,
"EAL5+": 1
}
},
"cc_sfr": {
"FCS": {
"FCS_CKM": 1,
"FCS_CKM.1": 5,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 3,
"FCS_CKM.3": 3,
"FCS_CKM.4": 4,
"FCS_COP": 1,
"FCS_COP.1": 9
},
"FDP": {
"FDP_ACC.1": 7,
"FDP_ACF.1": 12,
"FDP_ACF.1.1": 4,
"FDP_ACF.1.2": 4,
"FDP_ETC.1": 5,
"FDP_ITC.1": 8,
"FDP_RIP.1": 4,
"FDP_SDI.2": 8,
"FDP_UIT.1": 13,
"FDP_UIT.1.2": 2
},
"FIA": {
"FIA_AFL.1": 4,
"FIA_AFL.1.2": 1,
"FIA_ATD.1": 4,
"FIA_UAU.1": 4,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UID.1": 5,
"FIA_UID.1.2": 1
},
"FMT": {
"FMT_MOF": 1,
"FMT_MOF.1": 5,
"FMT_MSA.1": 5,
"FMT_MSA.1.1": 3,
"FMT_MSA.2": 4,
"FMT_MSA.3": 4,
"FMT_MSA.3.2": 1,
"FMT_MTD.1": 5,
"FMT_SMF": 2,
"FMT_SMF.1": 4,
"FMT_SMR.1": 4,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_AMT.1": 4,
"FPT_FLS.1": 4,
"FPT_PHP.1": 4,
"FPT_PHP.1.2": 1,
"FPT_PHP.3": 4,
"FPT_SEP": 1,
"FPT_SEP.1": 2,
"FPT_SEP.1.1": 1,
"FPT_SEP.1.2": 1,
"FPT_TST.1": 5,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 3
},
"FTP": {
"FTP_ITC": 2,
"FTP_ITC.1": 11,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 4,
"FTP_ITC.1.3": 4,
"FTP_TRP.1": 3,
"FTP_TRP.1.2": 1,
"FTP_TRP.1.3": 1
}
},
"certification_process": {
"OutOfScope": {
"out of scope": 1,
"verification of correct passcode stored in SIM at perso time. NB: The passcode functionality is out of scope of this Security target. 2.3 TOE LIFE CYCLE The TOE is composed of a JavaCard and a EEPROMed Java": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 3
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {
"GlobalPlatform": {
"Global Platform 2.1.1": 1
},
"JavaCard": {
"JC2.2.1": 5,
"Java Card 2.2.1": 3,
"JavaCard 2.2.1": 2
}
},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"Physical tampering": 1,
"malfunction": 1,
"physical tampering": 5
},
"SCA": {
"DPA": 2,
"SPA": 1,
"timing attacks": 1
}
},
"standard_id": {
"SCP": {
"SCP02": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 1
}
},
"DES": {
"3DES": {
"3-DES": 1,
"Triple-DES": 1
},
"DES": {
"DES": 9
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Gemalto": {
"Gemalto": 53
},
"Infineon": {
"Infineon": 4
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "",
"/CreationDate": "D:20081020110655",
"/Creator": "PDFCreator Version 0.9.3",
"/Keywords": "",
"/ModDate": "D:20081020110655",
"/Producer": "GPL Ghostscript 8.54",
"/Subject": "",
"/Title": "ASE10448v1.4_Lite",
"pdf_file_size_bytes": 410066,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 52
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/dcssi-2008_37en.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"AVA_VLA.4",
"EAL4+",
"AVA_MSU.3"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible2008_37en.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "74989bfcb830405a4750cd400060c9fcf84025a0f23fa61df041231a1ee4cce4",
"txt_hash": "a3b2c4e05840847402dcdc15fd6f112d8eea8094ddebfaee5d1c6ed346fbc507"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "a6923322412785b9b77b3e5717d84c360ad723994cbd9e08b981ab64dd29f802",
"txt_hash": "6d7c33979b7bc8c9edcb9df02e412897ccd7283b87813ef4f4410d43559ec709"
}
},
"status": "archived"
}