cv act ePasslet/ePKI v3.6

CSV information ?

Status archived
Valid from 10.09.2012
Valid until 01.09.2019
Scheme 🇩🇪 DE
Manufacturer cv cryptovision GmbH
Category Products for Digital Signatures
Security level EAL4+, AVA_VAN.5

Heuristics summary ?

Certificate ID: BSI-DSZ-CC-0804-2012

Certificate ?

Certification report ?

Extracted keywords

Asymmetric Algorithms
ECDSA
Hash functions
SHA-224, SHA-256
Protocols
PACE
Randomness
RNG

Operating System name
JCOP 2
Vendor
NXP Semiconductors, NXP

Security level
EAL 4, EAL 5, EAL1, EAL4, EAL5, EAL5+, EAL6, EAL3, EAL7, EAL2, EAL 4 augmented, ITSEC Evaluation
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_FSP.2, ADV_FSP.3, ADV_FSP.4, ADV_FSP.5, ADV_FSP.6, ADV_IMP.1, ADV_IMP.2, ADV_INT.1, ADV_INT.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.1, ADV_TDS.2, ADV_TDS.3, ADV_TDS.4, ADV_TDS.5, ADV_TDS.6, ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_CMC.1, ALC_CMC.2, ALC_CMC.3, ALC_CMC.4, ALC_CMC.5, ALC_CMS.1, ALC_CMS.2, ALC_CMS.3, ALC_CMS.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.1, ALC_DVS.2, ALC_FLR.1, ALC_FLR.2, ALC_FLR.3, ALC_LCD.1, ALC_LCD.2, ALC_TAT.1, ALC_TAT.2, ALC_TAT.3, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_FLR, ALC_TAT, ATE_COV.1, ATE_COV.2, ATE_COV.3, ATE_DPT.1, ATE_DPT.2, ATE_DPT.3, ATE_DPT.4, ATE_FUN.1, ATE_FUN.2, ATE_IND.1, ATE_IND.2, ATE_IND.3, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN.1, AVA_VAN.2, AVA_VAN.3, AVA_VAN.4, AVA_VAN, APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.1, APE_OBJ.2, APE_ECD.1, APE_REQ.1, APE_REQ.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.1, ASE_REQ.2, ASE_TSS.1, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_SPD, ASE_TSS
Protection profiles
BSI-CC-PP-0059-2009
Certificates
BSI-DSZ-CC-0804-2012, BSI-DSZ-CC-0675-2011, BSI-DSZ-CC-0674-2011, BSI-DSZ-CC-0730-2011, BSI-DSZ-CC-0798-2012, BSI-DSZ-CC-0797-2012, BSI-DSZ-CC-0799-2012, BSI-DSZ-CC-0633-2010, BSI-DSZ-CC-0555-2009, BSI-DSZ-CC-0709-2010, BSI-DSZ-CC-0410-2010, BSI-DSZ-CC-0710-2010, BSI-DSZ-CC-0404-2007, BSI-DSZ-CC-0804, BSI-DSZ-CC-0410-2007, BSI-DSZ-CC-0404, BSI-DSZ-CC-0410, BSI-DSZ-CC-0555, BSI-DSZ-CC-0710, BSI-DSZ-CC-0709, BSI-DSZ-CC-0633, BSI-DSZ-CC-0730, BSI-DSZ-CC-0674, BSI-DSZ-CC-0675, CC-0555-2009, CC-0633-2010, CC-0675-2011
Evaluation facilities
Brightsight, TÃœV Informationstechnik, TÃœViT

Side-channel analysis
JIL
Certification process
out of scope, D.Sig). While D.Sig provides the TOE’s functionality, the PKCS15 part is out of scope of the certification, the SSCD functionality (D.Sig). While D.Sig provides the TOE’s functionality, the PKCS15 part is out of scope of the certification. Some of the underlying platform variants of this composite TOE provide MIFARE, that are also out of scope of the TOE’s security functionality. In the contact-less configuration the TOE additionally, Report, cv act ePasslet/ePKI V3.6, Version 8, Date 22.08.2012, TÜV Informationstechnik GmbH (confidential document) [9] Certification Report - BSI-DSZ-CC-0404-2007 for NXP Secure Smart Card Controller P5CD040V0B

Standards
FIPS PUB 180-4, PKCS15, PKCS1, AIS 34, AIS 20, AIS 25, AIS 26, AIS 31, AIS 35, AIS 36, AIS 38, AIS 32, AIS36, ISO/IEC 14888-3, ICAO
Technical reports
BSI TR-02102, BSI 7125, BSI 7148, BSI 27

File metadata

Title Certification Report BSI-DSZ-CC-0804-2012
Subject Common Criteria Certification
Keywords "Common Criteria, Certification, Zertifizierung, BSI-DSZ-CC-0804-2012, cv act ePasslet/ePKI v3.6, cv cryptovision GmbH"
Author Bundesamt für Sicherheit in der Informationstechnik
Creation date D:20121009144110+02'00'
Modification date D:20121026093658+02'00'
Pages 42
Creator Writer
Producer LibreOffice 3.5

Frontpage

Certificate ID BSI-DSZ-CC-0804-2012
Certified item cv act ePasslet/ePKI v3.6
Certification lab BSI
Developer cv cryptovision GmbH

References

Outgoing
  • BSI-DSZ-CC-0798-2012 - archived - cv act ePasslet/BAC v1.8
  • BSI-DSZ-CC-0797-2012 - archived - cv act ePasslet/EACv1 v1.8
  • BSI-DSZ-CC-0799-2012 - archived - cv act ePasslet/EACv2-SAC v1.8
  • BSI-DSZ-CC-0674-2011 - archived - NXP J3A080 and J2A080 Secure Smart Card Controller Revision 3
  • BSI-DSZ-CC-0675-2011 - archived - NXP J3A081, J2A081 and J3A041 Secure Smart Card Controller Revision 3
  • BSI-DSZ-CC-0710-2010 - archived - Crypto Library V2.6 on P5CD040V0B / P5CC040V0B / P5CD020V0B / P5CC021V0B / P5CD012V0B
  • BSI-DSZ-CC-0709-2010 - archived - Crypto Library V2.6 on P5CD080V0B / P5CN080V0B / P5CC080V0B / P5CC073V0B
  • BSI-DSZ-CC-0555-2009 - archived - NXP Smart Card Controller P5CD081V1A and its major configurations P5CC081V1A, P5CN081V1A, P5CD041V1A, P5CD021V1A and P5CD016V1A each with IC dedicated Software
  • BSI-DSZ-CC-0730-2011 - archived - NXP J3A040 & J2A040 Secure Smart Card Controller Revision 3
  • BSI-DSZ-CC-0410-2007 - archived - NXP Secure Smart Card Controller P5CD080V0B, P5CN080V0B and P5CC080V0B each with specific IC Dedicated Software
  • BSI-DSZ-CC-0633-2010 - archived - Crypto Library V2.7 on P5CD081V1A / P5CC081V1A / P5CN081V1A / P5CD041V1A / P5CD021V1A / P5CD016V1A
  • BSI-DSZ-CC-0404-2007 - archived - NXP Secure Smart Card Controller P5CD040V0B, P5CC040V0B, P5CD020V0B and P5CC021V0B each with specific IC Dedicated Software
Incoming

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES, Triple-DES, CMAC
Asymmetric Algorithms
ECDSA, ECC, Diffie-Hellman
Hash functions
SHA-224, JH
Schemes
MAC
Protocols
PACE
Randomness
RND

Operating System name
JCOP 2
Vendor
NXP, NXP Semiconductors

Security level
EAL 4+, EAL 5+, EAL4+, EAL4, EAL 4, EAL4 augmented
Claims
O.PROTECT_DATA, O.SIDE_CHANNEL, O.OS_DECEIVE, O.FAULT_PROTECT, O.PHYSICAL, O.IDENTIFICATION, O.RND, O.SID, O.MF_FW, O.OPERATE, O.RESOURCES, O.FIREWALL, O.REALLOCATION, O.SHRD_VAR_CONFID, O.SHRD_VAR_INTEG, O.ALARM, O.TRANSACTION, O.CIPHER, O.PIN-MNGT, O.KEY-MNGT, O.CARD-MANAGEMENT, O.SCP, T.ACCESS_DATA, T.OS_OPERATE, T.OS_DECEIVE, T.LEAKAGE, T.FAULT, T.RND, T.PHYSICAL, T.CONFID-JCSCODE, T.CONFIDAPPLI-DATA, T.CONFID-JCSDATA, T.INTEG-APPLICODE, T.INTEG-JCSCODE, T.INTEG-APPLIDATA, T.INTEG-JCSDATA, T.SID, T.EXE-CODE, T.RESOURCES, A.USE_DIAG, A.CGA, A.SCA, OE.HID_VAD
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_ARP, FAU_SAA.1, FAU_SAS.1, FAU_GEN, FCS_RND, FCS_RND.1, FCS_COP, FCS_COP.1, FCS_CKM.1.1, FCS_CKM, FCS_CKM.1, FCS_CKM.2, FCS_CKM.3, FCS_CKM.4, FCS_RNG.1, FCS_RND.1.1, FCS_CKM.4.1, FDP_ACF.1, FDP_ACC, FDP_ACF, FDP_ETC.1, FDP_IFC, FDP_IFF, FDP_ITC.1, FDP_ITT, FDP_RIP.1, FDP_ROL, FDP_SDI.2, FDP_ITC.2, FDP_ACC.1, FDP_RIP.1.1, FDP_SDI, FDP_SDI.1, FDP_IFC.1, FDP_AFC, FDP_ITC, FIA_UAU.1.1, FIA_AFL, FIA_AFL.1, FIA_ATD, FIA_UAU.1, FIA_UAU, FIA_UID, FIA_USB.1, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1.2, FIA_AFL.1.1, FIA_AFL.1.2, FMT_LIM.1, FMT_LIM.2, FMT_MSA, FMT_MTD, FMT_MTD.3, FMT_SMF.1, FMT_SMR, FMT_MSA.3, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1.1, FMT_MOF.1, FMT_MOF.1.1, FMT_MSA.1, FMT_MSA.2, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.4, FMT_MSA.4.1, FMT_MTD.1, FPR_UNO.1, FPT_PHP.3, FPT_FLS, FPT_FLS.1, FPT_ITT, FPT_PHP.1, FPT_PHP, FPT_RCV, FPT_TDC.1, FPT_TST.1, FPT_FLS.1.1, FPT_TST, FPT_PHP.1.1, FPT_PHP.1.2, FPT_PHP.3.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FRU_FLT, FTP_ITC
Protection profiles
BSI-CC-PP0059, BSI-PP-0002-2001, BSI-PP-0035-2007, BSI-PP-0006-2002T
Certificates
BSI-DSZ-CC-0804, BSI-DSZ-CC-0675-2011, BSI-DSZ-CC-0633-2010, BSI-DSZ-CC-0555-2009, BSI-DSZ-CC-0674-2011, BSI-DSZ-CC-0709-2010, BSI-DSZ-CC-0410-2010, BSI-DSZ-CC-0730-2011, BSI-DSZ-CC-0710-2010, BSI-DSZ-CC-0404-2007, BSI-DSZ-CC-0410-2007
Evaluation facilities
TÃœViT

Side-channel analysis
physical probing, SPA, DPA, timing attacks, physical tampering, malfunction, DFA, fault injection
Certification process
out of scope, Out of scope, While D.Sig provides the TOE’s functionality claimed by this Security Target, the PKCS#15 part is out of scope of the certification, managed within JCOP) No contradiction to this ST FCS_CKM.3 No correspondence Out of scope (managed within JCOP, JCOP memory manage- ment) No contradiction to this ST FDP_ACC.2/FIREWALL No correspondence Out of scope (JCOP firewall mecha- nism, JCOP access control mechanisms) No contradiction to this ST FDP_ACF.1/CMGR No correspondence Out of scope (JCOP access control mechanisms, JCOP access control mechanisms) No contradiction to this ST FDP_ETC.1 No correspondence Out of scope (JCOP data control mech- anisms, refers to Virtual Ma- chine) No contradiction to this ST FDP_ITC.1 No correspondence Out of scope (JCOP data control mech- anisms, refers to card manager) No contradiction to this ST FIA_ATD.1/AID No correspondence Out of scope (JCOP AID management, JCOP AID management) No contradiction to this ST FIA_USB.1 No correspondence Out of scope (JCOP applet manage- ment, JCOP firewall mecha- nism) No contradiction to this ST FMT_MSA.1/CMGR No correspondence Out of scope (JCOP firewall mecha- nism, JCOP firewall mecha- nism) No contradiction to this ST FMT_MSA.3/CMGR No correspondence Out of scope (JCOP firewall mecha- nism, JCOP firewall mecha- nism) No contradiction to this ST FMT_MTD.1/JCRE No correspondence Out of scope (JCOP specific roles, JCOP specific roles) No contradiction to this ST FMT_SMR.1/CMGR No correspondence Out of scope (JCOP specific roles, While D.Sig provides the TOE’s functionality claimed by this Security Target, the PKCS#15 part is out of scope of the certification. Some of the underlying platform variants of this composite TOE provide MIFARE, please note that this functionality is out of scope of the TOE’s security functionality claimed by this Security Target. 1.3.3 TOE functions This, 3 Internal counter for security violations complement JCOP mechanisms FAU_SAS.1 No correspondence Out of scope (managed within JCOP) FCS: CRYPTOGRAPHIC SUPPORT FCS_CKM.1 FCS_CKM.1 The requirement in this ST is, lent to parts of the platform ST. FCS_CKM.2 No correspondence Out of scope (managed within JCOP) No contradiction to this ST FCS_CKM.3 No correspondence Out of scope (managed, LC state before Applet instan- tiation No contradiction to this ST FDP_ACC.1/SCP No correspondence Out of scope (JCOP memory manage- ment) No contradiction to this ST FDP_ACC.2/FIREWALL No correspondence Out of, JCOP firewall mecha- nism) No contradiction to this ST FDP_ACF.1/FIREWALL No correspondence Out of scope (JCOP access control mechanisms) No contradiction to this ST FDP_ACF.1/CMGR No correspondence Out, scope (JCOP access control mechanisms) No contradiction to this ST FDP_ACF.1/SCP No correspondence Out of scope (JCOP access control mechanisms) No contradiction to this ST FDP_ETC.1 No correspondence Out of, JCOP data control mech- anisms) No contradiction to this ST FDP_IFC.1/JCVM No correspondence Out of scope (refers to Virtual Ma- chine) No contradiction to this ST FDP_IFC.1/SCP No correspondence No, to this ST FDP_IFF.1/JCVM No correspondence Out of scope (refers to Virtual Ma- chine) No contradiction to this ST FDP_ITC.1 No correspondence Out of scope, data control mech- anisms) No contradiction to this ST FDP_ITT.1/SCP No correspondence Out of scope (platform internal data transfer) No contradiction to this ST FDP_RIP.1 FDP_RIP.1 The platform SFR, to fulfillment of the SFR of this ST. No contradiction. FDP_ROL.1/FIREWALL No correspondence Out of scope (refers to Virtual Ma- chine) cv act ePasslet/ePKI Security Target 18 of 72 Relevant Platform SFR, in this ST References/Remarks No contradiction to this ST FDP_SDI.2 No correspondence Out of scope (JCOP internal data integ- rity protection) No contradiction to this ST FIA: Identification and, SFR leads to fulfillment of the SFR of this ST. No contradiction. FIA_AFL.1/CMGR No correspondence Out of scope (refers to card manager) No contradiction to this ST FIA_ATD.1/AID No correspondence Out of scope, LC state before Applet instan- tiation No contradiction to this ST FIA_UID.2/AID No correspondence Out of scope (JCOP AID management) No contradiction to this ST FIA_USB.1 No correspondence Out of scope (JCOP, LC state before Applet instan- tiation No contradiction to this ST FMT_MSA.1/JCRE No correspondence Out of scope (JCOP firewall mecha- nism) No contradiction to this ST FMT_MSA.1/CMGR No correspondence Out of, JCOP firewall mecha- nism) No contradiction to this ST FMT_MSA.2/JCRE No correspondence Out of scope (JCOP object handling) cv act ePasslet/ePKI Security Target 19 of 72 Relevant Platform SFR, in this ST References/Remarks No contradiction to this ST FMT_MSA.3/FIREWALL No correspondence Out of scope (JCOP firewall mecha- nism) No contradiction to this ST FMT_MSA.3/CMGR No correspondence Out of, JCOP firewall mecha- nism) No contradiction to this ST FMT_MSA.3/SCP No correspondence Out of scope (JCOP firewall mecha- nism) No contradiction to this ST FMT_MTD.1/JCRE No correspondence Out of, JCOP specific roles) No contradiction to this ST FMT_MTD.3 No correspondence Out of scope (JCOP LF state handling) No contradiction to this ST FMT_SMF.1 FMT_SMF.1 Fullfillment of the, SFR is used for fulfillment of the SFR of this ST. FMT_SMR.1/JCRE No correspondence Out of scope (JCOP specific roles) No contradiction to this ST FMT_SMR.1/CMGR No correspondence Out of scope, specific roles) No contradiction to this ST FPR: Privacy FPR_UNO.1 No correspondence Out of scope (JCOP package separa- tion) No contradiction to this ST FPT: Protection of the TSF FPT_EMSEC.1, for detecting security violations complement JCOP mechanisms FPT_ITT.1/SCP No correspondence Out of scope (platform internal data transfer) No contradiction to this ST FPT_PHP.1 FPT_PHP.1 The SFRs are, equivalent. No contradic- tion to the ST. FRU: Resource Utilisation FRU_FLT.2/SCP No correspondence Out of scope (JCOP internal) No contradiction to this ST FTP: Trusted Path/Channels FTP_ITC.1/CMGR No, Out of scope (JCOP internal) No contradiction to this ST Table 3: Relevant platform SFRs and their, OT.SCD_Secrecy, OT.DTBS_Integrity_TOE O.SIDE_CHANNEL OT.EMSEC_Design O.OS_DECEIVE No correspondence Out of scope No contradiction to this ST O.FAULT_PROTECT OT.Prot_Malfunction O.PHYSICAL OT.Tamper_ID, OT, O.IDENTIFICATION OT.SCD/SVD_Gen O.RND No correspondence Out of scope No contradiction to this ST O.SID No correspondence Out of scope No contradiction to this ST O, No correspondence Out of scope No contradiction to this ST O.OPERATE No correspondence Out of scope No contradiction to this ST O.RESOURCES No correspondence Out of scope No contradiction to this ST, FIREWALL No correspondence Out of scope No contradiction to this ST cv act ePasslet/ePKI Security Target 21 of 72 Relevant Platform, Correspondence in this ST References/Remarks O.REALLOCATION No correspondence Out of scope No contradiction to this ST O.SHRD_VAR_CONFID No correspondence Out of scope No contradiction to, ST O.SHRD_VAR_INTEG No correspondence Out of scope No contradiction to this ST O.ALARM No correspondence Out of scope No contradiction to this ST O, No correspondence Out of scope No contradiction to this ST O.CIPHER No correspondence Out of scope No contradiction to this ST O.PIN-MNGT No correspondence Out of scope No contradiction to this ST O, No correspondence Out of scope No contradiction to this ST O.CARD-MANAGEMENT No correspondence Out of scope No contradiction to this ST O.SCP.RECOVERY No correspondence Out of scope No contradiction to this, O.SCP.SUPPORT No correspondence Out of scope No contradiction to this ST O.SCP.IC No correspondence Out of scope No contradiction to this ST Table 4: Relevant platform objectives and their correspondence 2.2.4, this ST References/Remarks T.ACCESS_DATA T.SCD_Divulg, T.SCD_Derive T.OS_OPERATE No correspondence Out of scope No contradiction to this ST T.OS_DECEIVE No correspondence Out of scope No contradiction to this ST, LEAKAGE T.SCD_Divulg, T.SCD_Derive T.FAULT T.SigF_Misuse T.RND No correspondence Out of scope cv act ePasslet/ePKI Security Target 22 of 72 Relevant Platform Oberctive Correspondence in this, No contradiction to this ST T.PHYSICAL T.Hack_Phys T.CONFID-JCSCODE No correspondence Out of scope No contradiction to this ST T.CONFIDAPPLI-DATA No correspondence Out of scope No contradiction to, ST T.CONFID-JCSDATA No correspondence Out of scope No contradiction to this ST T.INTEG-APPLICODE No correspondence Out of scope No contradiction to, ST T.INTEG-JCSCODE No correspondence Out of scope No contradiction to this ST T.INTEG-APPLIDATA T.DTBS_Forgery, T.Sig_Forgery T.INTEG-JCSDATA No, Out of scope No contradiction to this ST T.SID.1 No correspondence Out of scope No contradiction to this ST T.SID.2 No correspondence Out of scope No contradiction to this ST T, 1 No correspondence Out of scope No contradiction to this ST T.EXE-CODE.2 No correspondence Out of scope No contradiction to this ST T.RESOURCES No correspondence Out of scope No contradiction to this ST

Standards
FIPS180-2, FIPS180-4, FIPS 180-411, FIPS46-3, FIPS PUB 46-3, FIPS186-2, FIPS197, PKCS#1, PKCS#15, PKCS3, AIS20, AIS 20, AIS31, RFC4493, ISO/IEC 9796-2, ISO/IEC 15946-1, ISO/IEC 15946-2, ISO/IEC 7816-4, ICAO, X.509, CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004

File metadata

Title Security Target - cv act ePasslet/SSCD v3.6
Subject Common Criteria Certification BSI-DSZ-CC-0804
Keywords ePasslet Suite, Secure Signature Creation Device, Digital Signature, Electronic Signature
Author cryptovision GmbH
Creation date D:20120816160005+02'00'
Modification date D:20121019160905+02'00'
Pages 72
Creator Microsoft® Office Word 2007
Producer Microsoft® Office Word 2007

References

Outgoing
  • BSI-DSZ-CC-0674-2011 - archived - NXP J3A080 and J2A080 Secure Smart Card Controller Revision 3
  • BSI-DSZ-CC-0675-2011 - archived - NXP J3A081, J2A081 and J3A041 Secure Smart Card Controller Revision 3
  • BSI-DSZ-CC-0710-2010 - archived - Crypto Library V2.6 on P5CD040V0B / P5CC040V0B / P5CD020V0B / P5CC021V0B / P5CD012V0B
  • BSI-DSZ-CC-0709-2010 - archived - Crypto Library V2.6 on P5CD080V0B / P5CN080V0B / P5CC080V0B / P5CC073V0B
  • BSI-DSZ-CC-0555-2009 - archived - NXP Smart Card Controller P5CD081V1A and its major configurations P5CC081V1A, P5CN081V1A, P5CD041V1A, P5CD021V1A and P5CD016V1A each with IC dedicated Software
  • BSI-DSZ-CC-0730-2011 - archived - NXP J3A040 & J2A040 Secure Smart Card Controller Revision 3
  • BSI-DSZ-CC-0410-2007 - archived - NXP Secure Smart Card Controller P5CD080V0B, P5CN080V0B and P5CC080V0B each with specific IC Dedicated Software
  • BSI-DSZ-CC-0633-2010 - archived - Crypto Library V2.7 on P5CD081V1A / P5CC081V1A / P5CN081V1A / P5CD041V1A / P5CD021V1A / P5CD016V1A
  • BSI-DSZ-CC-0404-2007 - archived - NXP Secure Smart Card Controller P5CD040V0B, P5CC040V0B, P5CD020V0B and P5CC021V0B each with specific IC Dedicated Software

Heuristics ?

Certificate ID: BSI-DSZ-CC-0804-2012

Extracted SARs

ASE_CCL.1, ALC_DEL.1, ALC_CMC.4, ATE_DPT.1, AVA_VAN.5, ATE_FUN.1, ATE_IND.2, ASE_TSS.1, ADV_ARC.1, ADV_TDS.3, ASE_SPD.1, ASE_REQ.2, ALC_CMS.4, ALC_TAT.1, ADV_IMP.1, APE_INT.1, ATE_COV.2, ALC_FLR.3, AGD_OPE.1, ALC_DVS.1, APE_CCL.1, APE_REQ.2, APE_ECD.1, ASE_ECD.1, ADV_INT.3, ADV_SPM.1, ADV_FSP.4, ASE_INT.1, AGD_PRE.1, APE_OBJ.2, APE_SPD.1, ALC_LCD.1, ASE_OBJ.2

References ?

Updates ?

  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'deecd2a2b6fafe616bf608b1cb2d2abbc5b5bff43c8db938db62a56cd382d23b', 'txt_hash': '8d6d3c45b2a926a2d65bcb667ff85f41ec1597027991b36b8486084c171630ac'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '1197a3ae5935718ff3d92fd5cabb62a066ab52a98a8e2400231fb59b780bc08c', 'txt_hash': 'ce132ee959c2cf5d558751d933e84e1bb92c432abd3d2353d273c1b42286bc05'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 1058613, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 42, '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/CreationDate': "D:20121009144110+02'00'", '/Creator': 'Writer', '/Keywords': '"Common Criteria, Certification, Zertifizierung, BSI-DSZ-CC-0804-2012, cv act ePasslet/ePKI v3.6, cv cryptovision GmbH"', '/ModDate': "D:20121026093658+02'00'", '/Producer': 'LibreOffice 3.5', '/Subject': 'Common Criteria Certification', '/Title': 'Certification Report BSI-DSZ-CC-0804-2012', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 1695320, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 72, '/Author': 'cryptovision GmbH', '/CreationDate': "D:20120816160005+02'00'", '/Creator': 'Microsoft® Office Word 2007', '/Keywords': 'ePasslet Suite, Secure Signature Creation Device, Digital Signature, Electronic Signature', '/ModDate': "D:20121019160905+02'00'", '/Producer': 'Microsoft® Office Word 2007', '/Subject': 'Common Criteria Certification BSI-DSZ-CC-0804', '/Title': 'Security Target - cv act ePasslet/SSCD v3.6', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-0804-2012', 'cert_item': 'cv act ePasslet/ePKI v3.6', 'developer': 'cv cryptovision GmbH', 'cert_lab': 'BSI'}}.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0804-2012': 25, 'BSI-DSZ-CC-0675-2011': 4, 'BSI-DSZ-CC-0674-2011': 5, 'BSI-DSZ-CC-0730-2011': 5, 'BSI-DSZ-CC-0798-2012': 3, 'BSI-DSZ-CC-0797-2012': 3, 'BSI-DSZ-CC-0799-2012': 2, 'BSI-DSZ-CC-0633-2010': 3, 'BSI-DSZ-CC-0555-2009': 3, 'BSI-DSZ-CC-0709-2010': 4, 'BSI-DSZ-CC-0410-2010': 2, 'BSI-DSZ-CC-0710-2010': 4, 'BSI-DSZ-CC-0404-2007': 4, 'BSI-DSZ-CC-0804': 1, 'BSI-DSZ-CC-0410-2007': 2, 'BSI-DSZ-CC-0404': 1, 'BSI-DSZ-CC-0410': 1, 'BSI-DSZ-CC-0555': 1, 'BSI-DSZ-CC-0710': 1, 'BSI-DSZ-CC-0709': 1, 'BSI-DSZ-CC-0633': 1, 'BSI-DSZ-CC-0730': 1, 'BSI-DSZ-CC-0674': 1, 'BSI-DSZ-CC-0675': 1}, 'NL': {'CC-0555-2009': 1, 'CC-0633-2010': 1, 'CC-0675-2011': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0059-2009': 4}}, 'cc_security_level': {'EAL': {'EAL 4': 7, 'EAL 5': 3, 'EAL1': 7, 'EAL4': 7, 'EAL5': 7, 'EAL5+': 1, 'EAL6': 4, 'EAL3': 4, 'EAL7': 4, 'EAL2': 3, 'EAL 4 augmented': 3}, 'ITSEC': {'ITSEC Evaluation': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.1': 1, 'ADV_FSP.2': 1, 'ADV_FSP.3': 1, 'ADV_FSP.4': 1, 'ADV_FSP.5': 1, 'ADV_FSP.6': 1, 'ADV_IMP.1': 1, 'ADV_IMP.2': 1, 'ADV_INT.1': 1, 'ADV_INT.2': 1, 'ADV_INT.3': 1, 'ADV_SPM.1': 1, 'ADV_TDS.1': 1, 'ADV_TDS.2': 1, 'ADV_TDS.3': 1, 'ADV_TDS.4': 1, 'ADV_TDS.5': 1, 'ADV_TDS.6': 1, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1, 'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_CMC.1': 1, 'ALC_CMC.2': 1, 'ALC_CMC.3': 1, 'ALC_CMC.4': 2, 'ALC_CMC.5': 1, 'ALC_CMS.1': 1, 'ALC_CMS.2': 1, 'ALC_CMS.3': 1, 'ALC_CMS.4': 2, 'ALC_CMS.5': 1, 'ALC_DEL.1': 2, 'ALC_DVS.1': 2, 'ALC_DVS.2': 1, 'ALC_FLR.1': 1, 'ALC_FLR.2': 1, 'ALC_FLR.3': 1, 'ALC_LCD.1': 2, 'ALC_LCD.2': 1, 'ALC_TAT.1': 2, 'ALC_TAT.2': 1, 'ALC_TAT.3': 1, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_FLR': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV.1': 1, 'ATE_COV.2': 1, 'ATE_COV.3': 1, 'ATE_DPT.1': 1, 'ATE_DPT.2': 1, 'ATE_DPT.3': 1, 'ATE_DPT.4': 1, 'ATE_FUN.1': 1, 'ATE_FUN.2': 1, 'ATE_IND.1': 1, 'ATE_IND.2': 1, 'ATE_IND.3': 1, 'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.5': 6, 'AVA_VAN.1': 1, 'AVA_VAN.2': 1, 'AVA_VAN.3': 1, 'AVA_VAN.4': 1, 'AVA_VAN': 2}, 'APE': {'APE_INT.1': 1, 'APE_CCL.1': 1, 'APE_SPD.1': 1, 'APE_OBJ.1': 1, 'APE_OBJ.2': 1, 'APE_ECD.1': 1, 'APE_REQ.1': 1, 'APE_REQ.2': 1}, 'ASE': {'ASE_INT.1': 1, 'ASE_CCL.1': 1, 'ASE_SPD.1': 1, 'ASE_OBJ.1': 1, 'ASE_OBJ.2': 1, 'ASE_ECD.1': 1, 'ASE_REQ.1': 1, 'ASE_REQ.2': 1, 'ASE_TSS.1': 1, 'ASE_TSS.2': 1, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'NXP': {'NXP Semiconductors': 14, 'NXP': 27}}, 'eval_facility': {'BrightSight': {'Brightsight': 3}, 'TUV': {'TÃœV Informationstechnik': 3, 'TÃœViT': 3}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {'ECC': {'ECDSA': {'ECDSA': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-224': 1, 'SHA-256': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {'PACE': {'PACE': 10}}, 'randomness': {'RNG': {'RNG': 1}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'other': {'JIL': 4}}, 'technical_report_id': {'BSI': {'BSI TR-02102': 1, 'BSI 7125': 2, 'BSI 7148': 1, 'BSI 27': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {'JCOP': {'JCOP 2': 8}}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 180-4': 2}, 'PKCS': {'PKCS15': 2, 'PKCS1': 2}, 'BSI': {'AIS 34': 3, 'AIS 20': 2, 'AIS 25': 2, 'AIS 26': 2, 'AIS 31': 2, 'AIS 35': 2, 'AIS 36': 2, 'AIS 38': 2, 'AIS 32': 1, 'AIS36': 4}, 'ISO': {'ISO/IEC 14888-3': 1}, 'ICAO': {'ICAO': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 2, 'D.Sig). While D.Sig provides the TOE’s functionality, the PKCS15 part is out of scope of the certification': 1, 'the SSCD functionality (D.Sig). While D.Sig provides the TOE’s functionality, the PKCS15 part is out of scope of the certification. Some of the underlying platform variants of this composite TOE provide MIFARE': 1, 'that are also out of scope of the TOE’s security functionality. In the contact-less configuration the TOE additionally': 1}, 'ConfidentialDocument': {'Report, cv act ePasslet/ePKI V3.6, Version 8, Date 22.08.2012, TÃœV Informationstechnik GmbH (confidential document) [9] Certification Report - BSI-DSZ-CC-0404-2007 for NXP Secure Smart Card Controller P5CD040V0B': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0804': 1, 'BSI-DSZ-CC-0675-2011': 2, 'BSI-DSZ-CC-0633-2010': 2, 'BSI-DSZ-CC-0555-2009': 2, 'BSI-DSZ-CC-0674-2011': 2, 'BSI-DSZ-CC-0709-2010': 2, 'BSI-DSZ-CC-0410-2010': 1, 'BSI-DSZ-CC-0730-2011': 2, 'BSI-DSZ-CC-0710-2010': 2, 'BSI-DSZ-CC-0404-2007': 2, 'BSI-DSZ-CC-0410-2007': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP0059': 2, 'BSI-PP-0002-2001': 1, 'BSI-PP-0035-2007': 1, 'BSI-PP-0006-2002T': 1}}, 'cc_security_level': {'EAL': {'EAL 4+': 1, 'EAL 5+': 2, 'EAL4+': 1, 'EAL4': 6, 'EAL 4': 1, 'EAL4 augmented': 3}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 3, 'ADV_FSP.4': 2, 'ADV_IMP.1': 2, 'ADV_TDS.3': 2}, 'AGD': {'AGD_PRE': 1, 'AGD_OPE.1': 2, 'AGD_PRE.1': 2}, 'ALC': {'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 2, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.5': 5}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_ARP': 1, 'FAU_SAA.1': 1, 'FAU_SAS.1': 1, 'FAU_GEN': 1}, 'FCS': {'FCS_RND': 8, 'FCS_RND.1': 11, 'FCS_COP': 24, 'FCS_COP.1': 9, 'FCS_CKM.1.1': 2, 'FCS_CKM': 4, 'FCS_CKM.1': 18, 'FCS_CKM.2': 3, 'FCS_CKM.3': 1, 'FCS_CKM.4': 14, 'FCS_RNG.1': 1, 'FCS_RND.1.1': 2, 'FCS_CKM.4.1': 3}, 'FDP': {'FDP_ACF.1': 43, 'FDP_ACC': 29, 'FDP_ACF': 13, 'FDP_ETC.1': 1, 'FDP_IFC': 2, 'FDP_IFF': 1, 'FDP_ITC.1': 7, 'FDP_ITT': 1, 'FDP_RIP.1': 6, 'FDP_ROL': 1, 'FDP_SDI.2': 11, 'FDP_ITC.2': 6, 'FDP_ACC.1': 23, 'FDP_RIP.1.1': 2, 'FDP_SDI': 13, 'FDP_SDI.1': 2, 'FDP_IFC.1': 8, 'FDP_AFC': 7, 'FDP_ITC': 1}, 'FIA': {'FIA_UAU.1.1': 5, 'FIA_AFL': 2, 'FIA_AFL.1': 6, 'FIA_ATD': 1, 'FIA_UAU.1': 9, 'FIA_UAU': 2, 'FIA_UID': 2, 'FIA_USB.1': 1, 'FIA_UID.1': 13, 'FIA_UID.1.1': 3, 'FIA_UID.1.2': 3, 'FIA_UAU.1.2': 3, 'FIA_AFL.1.1': 3, 'FIA_AFL.1.2': 3}, 'FMT': {'FMT_LIM.1': 1, 'FMT_LIM.2': 1, 'FMT_MSA': 19, 'FMT_MTD': 14, 'FMT_MTD.3': 1, 'FMT_SMF.1': 22, 'FMT_SMR': 2, 'FMT_MSA.3': 15, 'FMT_SMR.1': 23, 'FMT_SMR.1.1': 4, 'FMT_SMR.1.2': 3, 'FMT_SMF.1.1': 2, 'FMT_MOF.1': 6, 'FMT_MOF.1.1': 2, 'FMT_MSA.1': 7, 'FMT_MSA.2': 6, 'FMT_MSA.2.1': 1, 'FMT_MSA.3.1': 2, 'FMT_MSA.3.2': 2, 'FMT_MSA.4': 7, 'FMT_MSA.4.1': 2, 'FMT_MTD.1': 6}, 'FPR': {'FPR_UNO.1': 1}, 'FPT': {'FPT_PHP.3': 8, 'FPT_FLS': 2, 'FPT_FLS.1': 8, 'FPT_ITT': 1, 'FPT_PHP.1': 7, 'FPT_PHP': 1, 'FPT_RCV': 2, 'FPT_TDC.1': 1, 'FPT_TST.1': 15, 'FPT_FLS.1.1': 2, 'FPT_TST': 2, 'FPT_PHP.1.1': 3, 'FPT_PHP.1.2': 3, 'FPT_PHP.3.1': 3, 'FPT_TST.1.1': 2, 'FPT_TST.1.2': 2, 'FPT_TST.1.3': 2}, 'FRU': {'FRU_FLT': 1}, 'FTP': {'FTP_ITC': 4}}, 'cc_claims': {'O': {'O.PROTECT_DATA': 1, 'O.SIDE_CHANNEL': 1, 'O.OS_DECEIVE': 1, 'O.FAULT_PROTECT': 1, 'O.PHYSICAL': 1, 'O.IDENTIFICATION': 1, 'O.RND': 1, 'O.SID': 1, 'O.MF_FW': 1, 'O.OPERATE': 1, 'O.RESOURCES': 1, 'O.FIREWALL': 1, 'O.REALLOCATION': 1, 'O.SHRD_VAR_CONFID': 1, 'O.SHRD_VAR_INTEG': 1, 'O.ALARM': 1, 'O.TRANSACTION': 1, 'O.CIPHER': 1, 'O.PIN-MNGT': 1, 'O.KEY-MNGT': 1, 'O.CARD-MANAGEMENT': 1, 'O.SCP': 3}, 'T': {'T.ACCESS_DATA': 1, 'T.OS_OPERATE': 1, 'T.OS_DECEIVE': 1, 'T.LEAKAGE': 1, 'T.FAULT': 1, 'T.RND': 1, 'T.PHYSICAL': 1, 'T.CONFID-JCSCODE': 1, 'T.CONFIDAPPLI-DATA': 1, 'T.CONFID-JCSDATA': 1, 'T.INTEG-APPLICODE': 1, 'T.INTEG-JCSCODE': 1, 'T.INTEG-APPLIDATA': 1, 'T.INTEG-JCSDATA': 1, 'T.SID': 2, 'T.EXE-CODE': 2, 'T.RESOURCES': 1}, 'A': {'A.USE_DIAG': 1, 'A.CGA': 2, 'A.SCA': 2}, 'OE': {'OE.HID_VAD': 3}}, 'vendor': {'NXP': {'NXP': 25, 'NXP Semiconductors': 7}}, 'eval_facility': {'TUV': {'TÃœViT': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 2}}, 'DES': {'DES': {'DES': 1}, '3DES': {'Triple-DES': 1}}, 'constructions': {'MAC': {'CMAC': 2}}}, 'asymmetric_crypto': {'ECC': {'ECDSA': {'ECDSA': 11}, 'ECC': {'ECC': 2}}, 'FF': {'DH': {'Diffie-Hellman': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-224': 1}}, 'JH': {'JH': 1}}, 'crypto_scheme': {'MAC': {'MAC': 1}}, 'crypto_protocol': {'PACE': {'PACE': 18}}, 'randomness': {'RNG': {'RND': 2}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 1, 'SPA': 2, 'DPA': 2, 'timing attacks': 2}, 'FI': {'physical tampering': 10, 'malfunction': 1, 'DFA': 1, 'fault injection': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {'JCOP': {'JCOP 2': 3}}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS180-2': 1, 'FIPS180-4': 2, 'FIPS 180-411': 1, 'FIPS46-3': 1, 'FIPS PUB 46-3': 1, 'FIPS186-2': 1, 'FIPS197': 1}, 'PKCS': {'PKCS#1': 2, 'PKCS#15': 5, 'PKCS3': 1}, 'BSI': {'AIS20': 2, 'AIS 20': 1, 'AIS31': 1}, 'RFC': {'RFC4493': 1}, 'ISO': {'ISO/IEC 9796-2': 1, 'ISO/IEC 15946-1': 1, 'ISO/IEC 15946-2': 1, 'ISO/IEC 7816-4': 1}, 'ICAO': {'ICAO': 1}, 'X509': {'X.509': 1}, 'CC': {'CCMB-2009-07-001': 1, 'CCMB-2009-07-002': 1, 'CCMB-2009-07-003': 1, 'CCMB-2009-07-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {'com': {'com.cryptovision': 5, 'com.cryptovision.applet': 2, 'com.cryptovision.eid': 1}}, 'certification_process': {'OutOfScope': {'out of scope': 2, 'Out of scope': 66, ' While D.Sig provides the TOE’s functionality claimed by this Security Target, the PKCS#15 part is out of scope of the certification': 1, 'managed within JCOP) No contradiction to this ST FCS_CKM.3 No correspondence Out of scope (managed within JCOP': 1, 'JCOP memory manage- ment) No contradiction to this ST FDP_ACC.2/FIREWALL No correspondence Out of scope (JCOP firewall mecha- nism': 1, 'JCOP access control mechanisms) No contradiction to this ST FDP_ACF.1/CMGR No correspondence Out of scope (JCOP access control mechanisms': 1, 'JCOP access control mechanisms) No contradiction to this ST FDP_ETC.1 No correspondence Out of scope (JCOP data control mech- anisms': 1, 'refers to Virtual Ma- chine) No contradiction to this ST FDP_ITC.1 No correspondence Out of scope (JCOP data control mech- anisms': 1, 'refers to card manager) No contradiction to this ST FIA_ATD.1/AID No correspondence Out of scope (JCOP AID management': 1, 'JCOP AID management) No contradiction to this ST FIA_USB.1 No correspondence Out of scope (JCOP applet manage- ment': 1, 'JCOP firewall mecha- nism) No contradiction to this ST FMT_MSA.1/CMGR No correspondence Out of scope (JCOP firewall mecha- nism': 1, 'JCOP firewall mecha- nism) No contradiction to this ST FMT_MSA.3/CMGR No correspondence Out of scope (JCOP firewall mecha- nism': 1, 'JCOP firewall mecha- nism) No contradiction to this ST FMT_MTD.1/JCRE No correspondence Out of scope (JCOP specific roles': 1, 'JCOP specific roles) No contradiction to this ST FMT_SMR.1/CMGR No correspondence Out of scope (JCOP specific roles': 1, ' While D.Sig provides the TOE’s functionality claimed by this Security Target, the PKCS#15 part is out of scope of the certification. Some of the underlying platform variants of this composite TOE provide MIFARE': 1, 'please note that this functionality is out of scope of the TOE’s security functionality claimed by this Security Target. 1.3.3 TOE functions This': 1, '3 Internal counter for security violations complement JCOP mechanisms FAU_SAS.1 No correspondence Out of scope (managed within JCOP) FCS: CRYPTOGRAPHIC SUPPORT FCS_CKM.1 FCS_CKM.1 The requirement in this ST is': 1, 'lent to parts of the platform ST. FCS_CKM.2 No correspondence Out of scope (managed within JCOP) No contradiction to this ST FCS_CKM.3 No correspondence Out of scope (managed': 1, 'LC state before Applet instan- tiation No contradiction to this ST FDP_ACC.1/SCP No correspondence Out of scope (JCOP memory manage- ment) No contradiction to this ST FDP_ACC.2/FIREWALL No correspondence Out of': 1, 'JCOP firewall mecha- nism) No contradiction to this ST FDP_ACF.1/FIREWALL No correspondence Out of scope (JCOP access control mechanisms) No contradiction to this ST FDP_ACF.1/CMGR No correspondence Out': 1, 'scope (JCOP access control mechanisms) No contradiction to this ST FDP_ACF.1/SCP No correspondence Out of scope (JCOP access control mechanisms) No contradiction to this ST FDP_ETC.1 No correspondence Out of': 1, 'JCOP data control mech- anisms) No contradiction to this ST FDP_IFC.1/JCVM No correspondence Out of scope (refers to Virtual Ma- chine) No contradiction to this ST FDP_IFC.1/SCP No correspondence No': 1, 'to this ST FDP_IFF.1/JCVM No correspondence Out of scope (refers to Virtual Ma- chine) No contradiction to this ST FDP_ITC.1 No correspondence Out of scope': 1, 'data control mech- anisms) No contradiction to this ST FDP_ITT.1/SCP No correspondence Out of scope (platform internal data transfer) No contradiction to this ST FDP_RIP.1 FDP_RIP.1 The platform SFR': 1, 'to fulfillment of the SFR of this ST. No contradiction. FDP_ROL.1/FIREWALL No correspondence Out of scope (refers to Virtual Ma- chine) cv act ePasslet/ePKI Security Target 18 of 72 Relevant Platform SFR': 1, 'in this ST References/Remarks No contradiction to this ST FDP_SDI.2 No correspondence Out of scope (JCOP internal data integ- rity protection) No contradiction to this ST FIA: Identification and': 1, 'SFR leads to fulfillment of the SFR of this ST. No contradiction. FIA_AFL.1/CMGR No correspondence Out of scope (refers to card manager) No contradiction to this ST FIA_ATD.1/AID No correspondence Out of scope': 1, 'LC state before Applet instan- tiation No contradiction to this ST FIA_UID.2/AID No correspondence Out of scope (JCOP AID management) No contradiction to this ST FIA_USB.1 No correspondence Out of scope (JCOP': 1, 'LC state before Applet instan- tiation No contradiction to this ST FMT_MSA.1/JCRE No correspondence Out of scope (JCOP firewall mecha- nism) No contradiction to this ST FMT_MSA.1/CMGR No correspondence Out of': 1, 'JCOP firewall mecha- nism) No contradiction to this ST FMT_MSA.2/JCRE No correspondence Out of scope (JCOP object handling) cv act ePasslet/ePKI Security Target 19 of 72 Relevant Platform SFR': 1, 'in this ST References/Remarks No contradiction to this ST FMT_MSA.3/FIREWALL No correspondence Out of scope (JCOP firewall mecha- nism) No contradiction to this ST FMT_MSA.3/CMGR No correspondence Out of': 1, 'JCOP firewall mecha- nism) No contradiction to this ST FMT_MSA.3/SCP No correspondence Out of scope (JCOP firewall mecha- nism) No contradiction to this ST FMT_MTD.1/JCRE No correspondence Out of': 1, 'JCOP specific roles) No contradiction to this ST FMT_MTD.3 No correspondence Out of scope (JCOP LF state handling) No contradiction to this ST FMT_SMF.1 FMT_SMF.1 Fullfillment of the': 1, 'SFR is used for fulfillment of the SFR of this ST. FMT_SMR.1/JCRE No correspondence Out of scope (JCOP specific roles) No contradiction to this ST FMT_SMR.1/CMGR No correspondence Out of scope': 1, 'specific roles) No contradiction to this ST FPR: Privacy FPR_UNO.1 No correspondence Out of scope (JCOP package separa- tion) No contradiction to this ST FPT: Protection of the TSF FPT_EMSEC.1': 1, 'for detecting security violations complement JCOP mechanisms FPT_ITT.1/SCP No correspondence Out of scope (platform internal data transfer) No contradiction to this ST FPT_PHP.1 FPT_PHP.1 The SFRs are': 1, 'equivalent. No contradic- tion to the ST. FRU: Resource Utilisation FRU_FLT.2/SCP No correspondence Out of scope (JCOP internal) No contradiction to this ST FTP: Trusted Path/Channels FTP_ITC.1/CMGR No': 1, 'Out of scope (JCOP internal) No contradiction to this ST Table 3: Relevant platform SFRs and their': 1, 'OT.SCD_Secrecy, OT.DTBS_Integrity_TOE O.SIDE_CHANNEL OT.EMSEC_Design O.OS_DECEIVE No correspondence Out of scope No contradiction to this ST O.FAULT_PROTECT OT.Prot_Malfunction O.PHYSICAL OT.Tamper_ID, OT': 1, 'O.IDENTIFICATION OT.SCD/SVD_Gen O.RND No correspondence Out of scope No contradiction to this ST O.SID No correspondence Out of scope No contradiction to this ST O': 1, 'No correspondence Out of scope No contradiction to this ST O.OPERATE No correspondence Out of scope No contradiction to this ST O.RESOURCES No correspondence Out of scope No contradiction to this ST': 1, 'FIREWALL No correspondence Out of scope No contradiction to this ST cv act ePasslet/ePKI Security Target 21 of 72 Relevant Platform': 1, 'Correspondence in this ST References/Remarks O.REALLOCATION No correspondence Out of scope No contradiction to this ST O.SHRD_VAR_CONFID No correspondence Out of scope No contradiction to': 1, 'ST O.SHRD_VAR_INTEG No correspondence Out of scope No contradiction to this ST O.ALARM No correspondence Out of scope No contradiction to this ST O': 1, 'No correspondence Out of scope No contradiction to this ST O.CIPHER No correspondence Out of scope No contradiction to this ST O.PIN-MNGT No correspondence Out of scope No contradiction to this ST O': 1, 'No correspondence Out of scope No contradiction to this ST O.CARD-MANAGEMENT No correspondence Out of scope No contradiction to this ST O.SCP.RECOVERY No correspondence Out of scope No contradiction to this': 1, 'O.SCP.SUPPORT No correspondence Out of scope No contradiction to this ST O.SCP.IC No correspondence Out of scope No contradiction to this ST Table 4: Relevant platform objectives and their correspondence 2.2.4': 1, 'this ST References/Remarks T.ACCESS_DATA T.SCD_Divulg, T.SCD_Derive T.OS_OPERATE No correspondence Out of scope No contradiction to this ST T.OS_DECEIVE No correspondence Out of scope No contradiction to this ST': 1, 'LEAKAGE T.SCD_Divulg, T.SCD_Derive T.FAULT T.SigF_Misuse T.RND No correspondence Out of scope cv act ePasslet/ePKI Security Target 22 of 72 Relevant Platform Oberctive Correspondence in this': 1, 'No contradiction to this ST T.PHYSICAL T.Hack_Phys T.CONFID-JCSCODE No correspondence Out of scope No contradiction to this ST T.CONFIDAPPLI-DATA No correspondence Out of scope No contradiction to': 1, 'ST T.CONFID-JCSDATA No correspondence Out of scope No contradiction to this ST T.INTEG-APPLICODE No correspondence Out of scope No contradiction to': 1, 'ST T.INTEG-JCSCODE No correspondence Out of scope No contradiction to this ST T.INTEG-APPLIDATA T.DTBS_Forgery, T.Sig_Forgery T.INTEG-JCSDATA No': 1, 'Out of scope No contradiction to this ST T.SID.1 No correspondence Out of scope No contradiction to this ST T.SID.2 No correspondence Out of scope No contradiction to this ST T': 1, '1 No correspondence Out of scope No contradiction to this ST T.EXE-CODE.2 No correspondence Out of scope No contradiction to this ST T.RESOURCES No correspondence Out of scope No contradiction to this ST': 1}}}.
    • The report_filename property was set to 0804a_pdf.pdf.
    • The st_filename property was set to 0804b_pdf.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to ['BSI'].
    • The cert_id property was set to BSI-DSZ-CC-0804-2012.
    • The st_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0674-2011', 'BSI-DSZ-CC-0710-2010', 'BSI-DSZ-CC-0675-2011', 'BSI-DSZ-CC-0555-2009', 'BSI-DSZ-CC-0730-2011', 'BSI-DSZ-CC-0709-2010', 'BSI-DSZ-CC-0410-2007', 'BSI-DSZ-CC-0633-2010', 'BSI-DSZ-CC-0404-2007']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0674-2011', 'BSI-DSZ-CC-0675-2011', 'BSI-DSZ-CC-0709-2010', 'BSI-DSZ-CC-0710-2010', 'BSI-DSZ-CC-0555-2009', 'BSI-DSZ-CC-0730-2011', 'BSI-DSZ-CC-0410-2007', 'BSI-DSZ-CC-0633-2010', 'BSI-DSZ-CC-0404-2007']}} data.
    • The report_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0798-2012', 'BSI-DSZ-CC-0799-2012', 'BSI-DSZ-CC-0797-2012']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0798-2012', 'BSI-DSZ-CC-0799-2012', 'BSI-DSZ-CC-0797-2012', 'BSI-DSZ-CC-0804-2012']}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0798-2012', 'BSI-DSZ-CC-0797-2012', 'BSI-DSZ-CC-0799-2012', 'BSI-DSZ-CC-0674-2011', 'BSI-DSZ-CC-0675-2011', 'BSI-DSZ-CC-0710-2010', 'BSI-DSZ-CC-0709-2010', 'BSI-DSZ-CC-0555-2009', 'BSI-DSZ-CC-0730-2011', 'BSI-DSZ-CC-0410-2007', 'BSI-DSZ-CC-0633-2010', 'BSI-DSZ-CC-0404-2007']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0609-2010', 'BSI-DSZ-CC-0798-2012', 'BSI-DSZ-CC-0797-2012', 'BSI-DSZ-CC-0417-2008', 'BSI-DSZ-CC-0799-2012', 'BSI-DSZ-CC-0608-2010', 'BSI-DSZ-CC-0804-2012', 'BSI-DSZ-CC-0674-2011', 'BSI-DSZ-CC-0439-2008', 'BSI-DSZ-CC-0675-2011', 'BSI-DSZ-CC-0710-2010', 'BSI-DSZ-CC-0709-2010', 'BSI-DSZ-CC-0555-2009', 'BSI-DSZ-CC-0730-2011', 'BSI-DSZ-CC-0410-2007', 'BSI-DSZ-CC-0633-2010', 'BSI-DSZ-CC-0404-2007']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0804a_pdf.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0804b_pdf.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to None.
    • The st_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The report_references property was updated, with the {'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}]} values discarded.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0410-2007', 'BSI-DSZ-CC-0674-2011', 'BSI-DSZ-CC-0555-2009']}}, 'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0410-2007', 'BSI-DSZ-CC-0674-2011', 'BSI-DSZ-CC-0555-2009']}}} data.
    • The report_references property was updated, with the {'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0798-2012', 'BSI-DSZ-CC-0799-2012']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0798-2012', 'BSI-DSZ-CC-0799-2012']}}, 'directly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0798-2012', 'BSI-DSZ-CC-0799-2012', 'BSI-DSZ-CC-0674-2011', 'BSI-DSZ-CC-0555-2009', 'BSI-DSZ-CC-0410-2007']}}, 'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0798-2012', 'BSI-DSZ-CC-0799-2012', 'BSI-DSZ-CC-0674-2011', 'BSI-DSZ-CC-0555-2009', 'BSI-DSZ-CC-0410-2007']}}} data.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name cv act ePasslet/ePKI v3.6 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Products for Digital Signatures",
  "cert_link": null,
  "dgst": "3171e02555f07b79",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "BSI-DSZ-CC-0804-2012",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "3.6"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0798-2012",
          "BSI-DSZ-CC-0797-2012",
          "BSI-DSZ-CC-0799-2012"
        ]
      },
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0797-2012",
          "BSI-DSZ-CC-0730-2011",
          "BSI-DSZ-CC-0633-2010",
          "BSI-DSZ-CC-0674-2011",
          "BSI-DSZ-CC-0710-2010",
          "BSI-DSZ-CC-0799-2012",
          "BSI-DSZ-CC-0709-2010",
          "BSI-DSZ-CC-0675-2011",
          "BSI-DSZ-CC-0798-2012",
          "BSI-DSZ-CC-0404-2007",
          "BSI-DSZ-CC-0555-2009",
          "BSI-DSZ-CC-0410-2007"
        ]
      },
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0804-2012",
          "BSI-DSZ-CC-0798-2012",
          "BSI-DSZ-CC-0797-2012",
          "BSI-DSZ-CC-0799-2012"
        ]
      },
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0797-2012",
          "BSI-DSZ-CC-0417-2008",
          "BSI-DSZ-CC-0730-2011",
          "BSI-DSZ-CC-0633-2010",
          "BSI-DSZ-CC-0674-2011",
          "BSI-DSZ-CC-0799-2012",
          "BSI-DSZ-CC-0710-2010",
          "BSI-DSZ-CC-0709-2010",
          "BSI-DSZ-CC-0675-2011",
          "BSI-DSZ-CC-0609-2010",
          "BSI-DSZ-CC-0798-2012",
          "BSI-DSZ-CC-0555-2009",
          "BSI-DSZ-CC-0404-2007",
          "BSI-DSZ-CC-0608-2010",
          "BSI-DSZ-CC-0804-2012",
          "BSI-DSZ-CC-0410-2007",
          "BSI-DSZ-CC-0439-2008"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0730-2011",
          "BSI-DSZ-CC-0633-2010",
          "BSI-DSZ-CC-0674-2011",
          "BSI-DSZ-CC-0410-2007",
          "BSI-DSZ-CC-0710-2010",
          "BSI-DSZ-CC-0675-2011",
          "BSI-DSZ-CC-0404-2007",
          "BSI-DSZ-CC-0555-2009",
          "BSI-DSZ-CC-0709-2010"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0730-2011",
          "BSI-DSZ-CC-0633-2010",
          "BSI-DSZ-CC-0674-2011",
          "BSI-DSZ-CC-0710-2010",
          "BSI-DSZ-CC-0709-2010",
          "BSI-DSZ-CC-0675-2011",
          "BSI-DSZ-CC-0404-2007",
          "BSI-DSZ-CC-0555-2009",
          "BSI-DSZ-CC-0410-2007"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "cv cryptovision GmbH",
  "manufacturer_web": "https://www.cryptovision.com",
  "name": "cv act ePasslet/ePKI v3.6",
  "not_valid_after": "2019-09-01",
  "not_valid_before": "2012-09-10",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "0804a_pdf.pdf",
    "report_frontpage": {
      "DE": {
        "cert_id": "BSI-DSZ-CC-0804-2012",
        "cert_item": "cv act ePasslet/ePKI v3.6",
        "cert_lab": "BSI",
        "developer": "cv cryptovision GmbH",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ]
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECDSA": {
            "ECDSA": 2
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0404": 1,
          "BSI-DSZ-CC-0404-2007": 4,
          "BSI-DSZ-CC-0410": 1,
          "BSI-DSZ-CC-0410-2007": 2,
          "BSI-DSZ-CC-0410-2010": 2,
          "BSI-DSZ-CC-0555": 1,
          "BSI-DSZ-CC-0555-2009": 3,
          "BSI-DSZ-CC-0633": 1,
          "BSI-DSZ-CC-0633-2010": 3,
          "BSI-DSZ-CC-0674": 1,
          "BSI-DSZ-CC-0674-2011": 5,
          "BSI-DSZ-CC-0675": 1,
          "BSI-DSZ-CC-0675-2011": 4,
          "BSI-DSZ-CC-0709": 1,
          "BSI-DSZ-CC-0709-2010": 4,
          "BSI-DSZ-CC-0710": 1,
          "BSI-DSZ-CC-0710-2010": 4,
          "BSI-DSZ-CC-0730": 1,
          "BSI-DSZ-CC-0730-2011": 5,
          "BSI-DSZ-CC-0797-2012": 3,
          "BSI-DSZ-CC-0798-2012": 3,
          "BSI-DSZ-CC-0799-2012": 2,
          "BSI-DSZ-CC-0804": 1,
          "BSI-DSZ-CC-0804-2012": 25
        },
        "NL": {
          "CC-0555-2009": 1,
          "CC-0633-2010": 1,
          "CC-0675-2011": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0059-2009": 4
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 1,
          "ADV_FSP": 1,
          "ADV_FSP.1": 1,
          "ADV_FSP.2": 1,
          "ADV_FSP.3": 1,
          "ADV_FSP.4": 1,
          "ADV_FSP.5": 1,
          "ADV_FSP.6": 1,
          "ADV_IMP": 1,
          "ADV_IMP.1": 1,
          "ADV_IMP.2": 1,
          "ADV_INT": 1,
          "ADV_INT.1": 1,
          "ADV_INT.2": 1,
          "ADV_INT.3": 1,
          "ADV_SPM": 1,
          "ADV_SPM.1": 1,
          "ADV_TDS": 1,
          "ADV_TDS.1": 1,
          "ADV_TDS.2": 1,
          "ADV_TDS.3": 1,
          "ADV_TDS.4": 1,
          "ADV_TDS.5": 1,
          "ADV_TDS.6": 1
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 1,
          "AGD_PRE": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.1": 1,
          "ALC_CMC.2": 1,
          "ALC_CMC.3": 1,
          "ALC_CMC.4": 2,
          "ALC_CMC.5": 1,
          "ALC_CMS": 1,
          "ALC_CMS.1": 1,
          "ALC_CMS.2": 1,
          "ALC_CMS.3": 1,
          "ALC_CMS.4": 2,
          "ALC_CMS.5": 1,
          "ALC_DEL": 1,
          "ALC_DEL.1": 2,
          "ALC_DVS": 1,
          "ALC_DVS.1": 2,
          "ALC_DVS.2": 1,
          "ALC_FLR": 1,
          "ALC_FLR.1": 1,
          "ALC_FLR.2": 1,
          "ALC_FLR.3": 1,
          "ALC_LCD.1": 2,
          "ALC_LCD.2": 1,
          "ALC_TAT": 1,
          "ALC_TAT.1": 2,
          "ALC_TAT.2": 1,
          "ALC_TAT.3": 1
        },
        "APE": {
          "APE_CCL.1": 1,
          "APE_ECD.1": 1,
          "APE_INT.1": 1,
          "APE_OBJ.1": 1,
          "APE_OBJ.2": 1,
          "APE_REQ.1": 1,
          "APE_REQ.2": 1,
          "APE_SPD.1": 1
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_CCL.1": 1,
          "ASE_ECD": 1,
          "ASE_ECD.1": 1,
          "ASE_INT": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ": 1,
          "ASE_OBJ.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.1": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS": 1,
          "ASE_TSS.1": 1,
          "ASE_TSS.2": 1
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.1": 1,
          "ATE_COV.2": 1,
          "ATE_COV.3": 1,
          "ATE_DPT": 1,
          "ATE_DPT.1": 1,
          "ATE_DPT.2": 1,
          "ATE_DPT.3": 1,
          "ATE_DPT.4": 1,
          "ATE_FUN": 1,
          "ATE_FUN.1": 1,
          "ATE_FUN.2": 1,
          "ATE_IND": 1,
          "ATE_IND.1": 1,
          "ATE_IND.2": 1,
          "ATE_IND.3": 1
        },
        "AVA": {
          "AVA_VAN": 2,
          "AVA_VAN.1": 1,
          "AVA_VAN.2": 1,
          "AVA_VAN.3": 1,
          "AVA_VAN.4": 1,
          "AVA_VAN.5": 6
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 7,
          "EAL 4 augmented": 3,
          "EAL 5": 3,
          "EAL1": 7,
          "EAL2": 3,
          "EAL3": 4,
          "EAL4": 7,
          "EAL5": 7,
          "EAL5+": 1,
          "EAL6": 4,
          "EAL7": 4
        },
        "ITSEC": {
          "ITSEC Evaluation": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "ConfidentialDocument": {
          "Report, cv act ePasslet/ePKI V3.6, Version 8, Date 22.08.2012, T\u00dcV Informationstechnik GmbH (confidential document) [9] Certification Report - BSI-DSZ-CC-0404-2007 for NXP Secure Smart Card Controller P5CD040V0B": 1
        },
        "OutOfScope": {
          "D.Sig). While D.Sig provides the TOE\u2019s functionality, the PKCS15 part is out of scope of the certification": 1,
          "out of scope": 2,
          "that are also out of scope of the TOE\u2019s security functionality. In the contact-less configuration the TOE additionally": 1,
          "the SSCD functionality (D.Sig). While D.Sig provides the TOE\u2019s functionality, the PKCS15 part is out of scope of the certification. Some of the underlying platform variants of this composite TOE provide MIFARE": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 10
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "BrightSight": {
          "Brightsight": 3
        },
        "TUV": {
          "T\u00dcV Informationstechnik": 3,
          "T\u00dcViT": 3
        }
      },
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-224": 1,
            "SHA-256": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {
        "JCOP": {
          "JCOP 2": 8
        }
      },
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 1
        }
      },
      "side_channel_analysis": {
        "other": {
          "JIL": 4
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 20": 2,
          "AIS 25": 2,
          "AIS 26": 2,
          "AIS 31": 2,
          "AIS 32": 1,
          "AIS 34": 3,
          "AIS 35": 2,
          "AIS 36": 2,
          "AIS 38": 2,
          "AIS36": 4
        },
        "FIPS": {
          "FIPS PUB 180-4": 2
        },
        "ICAO": {
          "ICAO": 2
        },
        "ISO": {
          "ISO/IEC 14888-3": 1
        },
        "PKCS": {
          "PKCS1": 2,
          "PKCS15": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {
        "BSI": {
          "BSI 27": 1,
          "BSI 7125": 2,
          "BSI 7148": 1,
          "BSI TR-02102": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 27,
          "NXP Semiconductors": 14
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20121009144110+02\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung, BSI-DSZ-CC-0804-2012, cv act ePasslet/ePKI v3.6, cv cryptovision GmbH\"",
      "/ModDate": "D:20121026093658+02\u002700\u0027",
      "/Producer": "LibreOffice 3.5",
      "/Subject": "Common Criteria Certification",
      "/Title": "Certification Report BSI-DSZ-CC-0804-2012",
      "pdf_file_size_bytes": 1058613,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 42
    },
    "st_filename": "0804b_pdf.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 2
          },
          "ECDSA": {
            "ECDSA": 11
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 1
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0404-2007": 2,
          "BSI-DSZ-CC-0410-2007": 1,
          "BSI-DSZ-CC-0410-2010": 1,
          "BSI-DSZ-CC-0555-2009": 2,
          "BSI-DSZ-CC-0633-2010": 2,
          "BSI-DSZ-CC-0674-2011": 2,
          "BSI-DSZ-CC-0675-2011": 2,
          "BSI-DSZ-CC-0709-2010": 2,
          "BSI-DSZ-CC-0710-2010": 2,
          "BSI-DSZ-CC-0730-2011": 2,
          "BSI-DSZ-CC-0804": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.CGA": 2,
          "A.SCA": 2,
          "A.USE_DIAG": 1
        },
        "O": {
          "O.ALARM": 1,
          "O.CARD-MANAGEMENT": 1,
          "O.CIPHER": 1,
          "O.FAULT_PROTECT": 1,
          "O.FIREWALL": 1,
          "O.IDENTIFICATION": 1,
          "O.KEY-MNGT": 1,
          "O.MF_FW": 1,
          "O.OPERATE": 1,
          "O.OS_DECEIVE": 1,
          "O.PHYSICAL": 1,
          "O.PIN-MNGT": 1,
          "O.PROTECT_DATA": 1,
          "O.REALLOCATION": 1,
          "O.RESOURCES": 1,
          "O.RND": 1,
          "O.SCP": 3,
          "O.SHRD_VAR_CONFID": 1,
          "O.SHRD_VAR_INTEG": 1,
          "O.SID": 1,
          "O.SIDE_CHANNEL": 1,
          "O.TRANSACTION": 1
        },
        "OE": {
          "OE.HID_VAD": 3
        },
        "T": {
          "T.ACCESS_DATA": 1,
          "T.CONFID-JCSCODE": 1,
          "T.CONFID-JCSDATA": 1,
          "T.CONFIDAPPLI-DATA": 1,
          "T.EXE-CODE": 2,
          "T.FAULT": 1,
          "T.INTEG-APPLICODE": 1,
          "T.INTEG-APPLIDATA": 1,
          "T.INTEG-JCSCODE": 1,
          "T.INTEG-JCSDATA": 1,
          "T.LEAKAGE": 1,
          "T.OS_DECEIVE": 1,
          "T.OS_OPERATE": 1,
          "T.PHYSICAL": 1,
          "T.RESOURCES": 1,
          "T.RND": 1,
          "T.SID": 2
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP0059": 2,
          "BSI-PP-0002-2001": 1,
          "BSI-PP-0006-2002T": 1,
          "BSI-PP-0035-2007": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 3,
          "ADV_FSP.4": 2,
          "ADV_IMP.1": 2,
          "ADV_TDS.3": 2
        },
        "AGD": {
          "AGD_OPE.1": 2,
          "AGD_PRE": 1,
          "AGD_PRE.1": 2
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 1,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.1": 2,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 5
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 1,
          "EAL 4+": 1,
          "EAL 5+": 2,
          "EAL4": 6,
          "EAL4 augmented": 3,
          "EAL4+": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP": 1,
          "FAU_GEN": 1,
          "FAU_SAA.1": 1,
          "FAU_SAS.1": 1
        },
        "FCS": {
          "FCS_CKM": 4,
          "FCS_CKM.1": 18,
          "FCS_CKM.1.1": 2,
          "FCS_CKM.2": 3,
          "FCS_CKM.3": 1,
          "FCS_CKM.4": 14,
          "FCS_CKM.4.1": 3,
          "FCS_COP": 24,
          "FCS_COP.1": 9,
          "FCS_RND": 8,
          "FCS_RND.1": 11,
          "FCS_RND.1.1": 2,
          "FCS_RNG.1": 1
        },
        "FDP": {
          "FDP_ACC": 29,
          "FDP_ACC.1": 23,
          "FDP_ACF": 13,
          "FDP_ACF.1": 43,
          "FDP_AFC": 7,
          "FDP_ETC.1": 1,
          "FDP_IFC": 2,
          "FDP_IFC.1": 8,
          "FDP_IFF": 1,
          "FDP_ITC": 1,
          "FDP_ITC.1": 7,
          "FDP_ITC.2": 6,
          "FDP_ITT": 1,
          "FDP_RIP.1": 6,
          "FDP_RIP.1.1": 2,
          "FDP_ROL": 1,
          "FDP_SDI": 13,
          "FDP_SDI.1": 2,
          "FDP_SDI.2": 11
        },
        "FIA": {
          "FIA_AFL": 2,
          "FIA_AFL.1": 6,
          "FIA_AFL.1.1": 3,
          "FIA_AFL.1.2": 3,
          "FIA_ATD": 1,
          "FIA_UAU": 2,
          "FIA_UAU.1": 9,
          "FIA_UAU.1.1": 5,
          "FIA_UAU.1.2": 3,
          "FIA_UID": 2,
          "FIA_UID.1": 13,
          "FIA_UID.1.1": 3,
          "FIA_UID.1.2": 3,
          "FIA_USB.1": 1
        },
        "FMT": {
          "FMT_LIM.1": 1,
          "FMT_LIM.2": 1,
          "FMT_MOF.1": 6,
          "FMT_MOF.1.1": 2,
          "FMT_MSA": 19,
          "FMT_MSA.1": 7,
          "FMT_MSA.2": 6,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 15,
          "FMT_MSA.3.1": 2,
          "FMT_MSA.3.2": 2,
          "FMT_MSA.4": 7,
          "FMT_MSA.4.1": 2,
          "FMT_MTD": 14,
          "FMT_MTD.1": 6,
          "FMT_MTD.3": 1,
          "FMT_SMF.1": 22,
          "FMT_SMF.1.1": 2,
          "FMT_SMR": 2,
          "FMT_SMR.1": 23,
          "FMT_SMR.1.1": 4,
          "FMT_SMR.1.2": 3
        },
        "FPR": {
          "FPR_UNO.1": 1
        },
        "FPT": {
          "FPT_FLS": 2,
          "FPT_FLS.1": 8,
          "FPT_FLS.1.1": 2,
          "FPT_ITT": 1,
          "FPT_PHP": 1,
          "FPT_PHP.1": 7,
          "FPT_PHP.1.1": 3,
          "FPT_PHP.1.2": 3,
          "FPT_PHP.3": 8,
          "FPT_PHP.3.1": 3,
          "FPT_RCV": 2,
          "FPT_TDC.1": 1,
          "FPT_TST": 2,
          "FPT_TST.1": 15,
          "FPT_TST.1.1": 2,
          "FPT_TST.1.2": 2,
          "FPT_TST.1.3": 2
        },
        "FRU": {
          "FRU_FLT": 1
        },
        "FTP": {
          "FTP_ITC": 4
        }
      },
      "certification_process": {
        "OutOfScope": {
          " While D.Sig provides the TOE\u2019s functionality claimed by this Security Target, the PKCS#15 part is out of scope of the certification": 1,
          " While D.Sig provides the TOE\u2019s functionality claimed by this Security Target, the PKCS#15 part is out of scope of the certification. Some of the underlying platform variants of this composite TOE provide MIFARE": 1,
          "1 No correspondence Out of scope No contradiction to this ST T.EXE-CODE.2 No correspondence Out of scope No contradiction to this ST T.RESOURCES No correspondence Out of scope No contradiction to this ST": 1,
          "3 Internal counter for security violations complement JCOP mechanisms FAU_SAS.1 No correspondence Out of scope (managed within JCOP) FCS: CRYPTOGRAPHIC SUPPORT FCS_CKM.1 FCS_CKM.1 The requirement in this ST is": 1,
          "Correspondence in this ST References/Remarks O.REALLOCATION No correspondence Out of scope No contradiction to this ST O.SHRD_VAR_CONFID No correspondence Out of scope No contradiction to": 1,
          "FIREWALL No correspondence Out of scope No contradiction to this ST cv act ePasslet/ePKI Security Target 21 of 72 Relevant Platform": 1,
          "JCOP AID management) No contradiction to this ST FIA_USB.1 No correspondence Out of scope (JCOP applet manage- ment": 1,
          "JCOP access control mechanisms) No contradiction to this ST FDP_ACF.1/CMGR No correspondence Out of scope (JCOP access control mechanisms": 1,
          "JCOP access control mechanisms) No contradiction to this ST FDP_ETC.1 No correspondence Out of scope (JCOP data control mech- anisms": 1,
          "JCOP data control mech- anisms) No contradiction to this ST FDP_IFC.1/JCVM No correspondence Out of scope (refers to Virtual Ma- chine) No contradiction to this ST FDP_IFC.1/SCP No correspondence No": 1,
          "JCOP firewall mecha- nism) No contradiction to this ST FDP_ACF.1/FIREWALL No correspondence Out of scope (JCOP access control mechanisms) No contradiction to this ST FDP_ACF.1/CMGR No correspondence Out": 1,
          "JCOP firewall mecha- nism) No contradiction to this ST FMT_MSA.1/CMGR No correspondence Out of scope (JCOP firewall mecha- nism": 1,
          "JCOP firewall mecha- nism) No contradiction to this ST FMT_MSA.2/JCRE No correspondence Out of scope (JCOP object handling) cv act ePasslet/ePKI Security Target 19 of 72 Relevant Platform SFR": 1,
          "JCOP firewall mecha- nism) No contradiction to this ST FMT_MSA.3/CMGR No correspondence Out of scope (JCOP firewall mecha- nism": 1,
          "JCOP firewall mecha- nism) No contradiction to this ST FMT_MSA.3/SCP No correspondence Out of scope (JCOP firewall mecha- nism) No contradiction to this ST FMT_MTD.1/JCRE No correspondence Out of": 1,
          "JCOP firewall mecha- nism) No contradiction to this ST FMT_MTD.1/JCRE No correspondence Out of scope (JCOP specific roles": 1,
          "JCOP memory manage- ment) No contradiction to this ST FDP_ACC.2/FIREWALL No correspondence Out of scope (JCOP firewall mecha- nism": 1,
          "JCOP specific roles) No contradiction to this ST FMT_MTD.3 No correspondence Out of scope (JCOP LF state handling) No contradiction to this ST FMT_SMF.1 FMT_SMF.1 Fullfillment of the": 1,
          "JCOP specific roles) No contradiction to this ST FMT_SMR.1/CMGR No correspondence Out of scope (JCOP specific roles": 1,
          "LC state before Applet instan- tiation No contradiction to this ST FDP_ACC.1/SCP No correspondence Out of scope (JCOP memory manage- ment) No contradiction to this ST FDP_ACC.2/FIREWALL No correspondence Out of": 1,
          "LC state before Applet instan- tiation No contradiction to this ST FIA_UID.2/AID No correspondence Out of scope (JCOP AID management) No contradiction to this ST FIA_USB.1 No correspondence Out of scope (JCOP": 1,
          "LC state before Applet instan- tiation No contradiction to this ST FMT_MSA.1/JCRE No correspondence Out of scope (JCOP firewall mecha- nism) No contradiction to this ST FMT_MSA.1/CMGR No correspondence Out of": 1,
          "LEAKAGE T.SCD_Divulg, T.SCD_Derive T.FAULT T.SigF_Misuse T.RND No correspondence Out of scope cv act ePasslet/ePKI Security Target 22 of 72 Relevant Platform Oberctive Correspondence in this": 1,
          "No contradiction to this ST T.PHYSICAL T.Hack_Phys T.CONFID-JCSCODE No correspondence Out of scope No contradiction to this ST T.CONFIDAPPLI-DATA No correspondence Out of scope No contradiction to": 1,
          "No correspondence Out of scope No contradiction to this ST O.CARD-MANAGEMENT No correspondence Out of scope No contradiction to this ST O.SCP.RECOVERY No correspondence Out of scope No contradiction to this": 1,
          "No correspondence Out of scope No contradiction to this ST O.CIPHER No correspondence Out of scope No contradiction to this ST O.PIN-MNGT No correspondence Out of scope No contradiction to this ST O": 1,
          "No correspondence Out of scope No contradiction to this ST O.OPERATE No correspondence Out of scope No contradiction to this ST O.RESOURCES No correspondence Out of scope No contradiction to this ST": 1,
          "O.IDENTIFICATION OT.SCD/SVD_Gen O.RND No correspondence Out of scope No contradiction to this ST O.SID No correspondence Out of scope No contradiction to this ST O": 1,
          "O.SCP.SUPPORT No correspondence Out of scope No contradiction to this ST O.SCP.IC No correspondence Out of scope No contradiction to this ST Table 4: Relevant platform objectives and their correspondence 2.2.4": 1,
          "OT.SCD_Secrecy, OT.DTBS_Integrity_TOE O.SIDE_CHANNEL OT.EMSEC_Design O.OS_DECEIVE No correspondence Out of scope No contradiction to this ST O.FAULT_PROTECT OT.Prot_Malfunction O.PHYSICAL OT.Tamper_ID, OT": 1,
          "Out of scope": 66,
          "Out of scope (JCOP internal) No contradiction to this ST Table 3: Relevant platform SFRs and their": 1,
          "Out of scope No contradiction to this ST T.SID.1 No correspondence Out of scope No contradiction to this ST T.SID.2 No correspondence Out of scope No contradiction to this ST T": 1,
          "SFR is used for fulfillment of the SFR of this ST. FMT_SMR.1/JCRE No correspondence Out of scope (JCOP specific roles) No contradiction to this ST FMT_SMR.1/CMGR No correspondence Out of scope": 1,
          "SFR leads to fulfillment of the SFR of this ST. No contradiction. FIA_AFL.1/CMGR No correspondence Out of scope (refers to card manager) No contradiction to this ST FIA_ATD.1/AID No correspondence Out of scope": 1,
          "ST O.SHRD_VAR_INTEG No correspondence Out of scope No contradiction to this ST O.ALARM No correspondence Out of scope No contradiction to this ST O": 1,
          "ST T.CONFID-JCSDATA No correspondence Out of scope No contradiction to this ST T.INTEG-APPLICODE No correspondence Out of scope No contradiction to": 1,
          "ST T.INTEG-JCSCODE No correspondence Out of scope No contradiction to this ST T.INTEG-APPLIDATA T.DTBS_Forgery, T.Sig_Forgery T.INTEG-JCSDATA No": 1,
          "data control mech- anisms) No contradiction to this ST FDP_ITT.1/SCP No correspondence Out of scope (platform internal data transfer) No contradiction to this ST FDP_RIP.1 FDP_RIP.1 The platform SFR": 1,
          "equivalent. No contradic- tion to the ST. FRU: Resource Utilisation FRU_FLT.2/SCP No correspondence Out of scope (JCOP internal) No contradiction to this ST FTP: Trusted Path/Channels FTP_ITC.1/CMGR No": 1,
          "for detecting security violations complement JCOP mechanisms FPT_ITT.1/SCP No correspondence Out of scope (platform internal data transfer) No contradiction to this ST FPT_PHP.1 FPT_PHP.1 The SFRs are": 1,
          "in this ST References/Remarks No contradiction to this ST FDP_SDI.2 No correspondence Out of scope (JCOP internal data integ- rity protection) No contradiction to this ST FIA: Identification and": 1,
          "in this ST References/Remarks No contradiction to this ST FMT_MSA.3/FIREWALL No correspondence Out of scope (JCOP firewall mecha- nism) No contradiction to this ST FMT_MSA.3/CMGR No correspondence Out of": 1,
          "lent to parts of the platform ST. FCS_CKM.2 No correspondence Out of scope (managed within JCOP) No contradiction to this ST FCS_CKM.3 No correspondence Out of scope (managed": 1,
          "managed within JCOP) No contradiction to this ST FCS_CKM.3 No correspondence Out of scope (managed within JCOP": 1,
          "out of scope": 2,
          "please note that this functionality is out of scope of the TOE\u2019s security functionality claimed by this Security Target. 1.3.3 TOE functions This": 1,
          "refers to Virtual Ma- chine) No contradiction to this ST FDP_ITC.1 No correspondence Out of scope (JCOP data control mech- anisms": 1,
          "refers to card manager) No contradiction to this ST FIA_ATD.1/AID No correspondence Out of scope (JCOP AID management": 1,
          "scope (JCOP access control mechanisms) No contradiction to this ST FDP_ACF.1/SCP No correspondence Out of scope (JCOP access control mechanisms) No contradiction to this ST FDP_ETC.1 No correspondence Out of": 1,
          "specific roles) No contradiction to this ST FPR: Privacy FPR_UNO.1 No correspondence Out of scope (JCOP package separa- tion) No contradiction to this ST FPT: Protection of the TSF FPT_EMSEC.1": 1,
          "this ST References/Remarks T.ACCESS_DATA T.SCD_Divulg, T.SCD_Derive T.OS_OPERATE No correspondence Out of scope No contradiction to this ST T.OS_DECEIVE No correspondence Out of scope No contradiction to this ST": 1,
          "to fulfillment of the SFR of this ST. No contradiction. FDP_ROL.1/FIREWALL No correspondence Out of scope (refers to Virtual Ma- chine) cv act ePasslet/ePKI Security Target 18 of 72 Relevant Platform SFR": 1,
          "to this ST FDP_IFF.1/JCVM No correspondence Out of scope (refers to Virtual Ma- chine) No contradiction to this ST FDP_ITC.1 No correspondence Out of scope": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 18
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "TUV": {
          "T\u00dcViT": 1
        }
      },
      "hash_function": {
        "JH": {
          "JH": 1
        },
        "SHA": {
          "SHA2": {
            "SHA-224": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {
        "com": {
          "com.cryptovision": 5,
          "com.cryptovision.applet": 2,
          "com.cryptovision.eid": 1
        }
      },
      "javacard_version": {},
      "os_name": {
        "JCOP": {
          "JCOP 2": 3
        }
      },
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 2
        }
      },
      "side_channel_analysis": {
        "FI": {
          "DFA": 1,
          "fault injection": 1,
          "malfunction": 1,
          "physical tampering": 10
        },
        "SCA": {
          "DPA": 2,
          "SPA": 2,
          "physical probing": 1,
          "timing attacks": 2
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 20": 1,
          "AIS20": 2,
          "AIS31": 1
        },
        "CC": {
          "CCMB-2009-07-001": 1,
          "CCMB-2009-07-002": 1,
          "CCMB-2009-07-003": 1,
          "CCMB-2009-07-004": 1
        },
        "FIPS": {
          "FIPS 180-411": 1,
          "FIPS PUB 46-3": 1,
          "FIPS180-2": 1,
          "FIPS180-4": 2,
          "FIPS186-2": 1,
          "FIPS197": 1,
          "FIPS46-3": 1
        },
        "ICAO": {
          "ICAO": 1
        },
        "ISO": {
          "ISO/IEC 15946-1": 1,
          "ISO/IEC 15946-2": 1,
          "ISO/IEC 7816-4": 1,
          "ISO/IEC 9796-2": 1
        },
        "PKCS": {
          "PKCS#1": 2,
          "PKCS#15": 5,
          "PKCS3": 1
        },
        "RFC": {
          "RFC4493": 1
        },
        "X509": {
          "X.509": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 2
          }
        },
        "DES": {
          "3DES": {
            "Triple-DES": 1
          },
          "DES": {
            "DES": 1
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 2
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 25,
          "NXP Semiconductors": 7
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "cryptovision GmbH",
      "/CreationDate": "D:20120816160005+02\u002700\u0027",
      "/Creator": "Microsoft\u00ae Office Word 2007",
      "/Keywords": "ePasslet Suite, Secure Signature Creation Device, Digital Signature, Electronic Signature",
      "/ModDate": "D:20121019160905+02\u002700\u0027",
      "/Producer": "Microsoft\u00ae Office Word 2007",
      "/Subject": "Common Criteria Certification BSI-DSZ-CC-0804",
      "/Title": "Security Target - cv act ePasslet/SSCD v3.6",
      "pdf_file_size_bytes": 1695320,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 72
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf",
        "pp_name": "Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Version..."
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0804a_pdf.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4+",
      "AVA_VAN.5"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0804b_pdf.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "deecd2a2b6fafe616bf608b1cb2d2abbc5b5bff43c8db938db62a56cd382d23b",
      "txt_hash": "8d6d3c45b2a926a2d65bcb667ff85f41ec1597027991b36b8486084c171630ac"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "1197a3ae5935718ff3d92fd5cabb62a066ab52a98a8e2400231fb59b780bc08c",
      "txt_hash": "ce132ee959c2cf5d558751d933e84e1bb92c432abd3d2353d273c1b42286bc05"
    }
  },
  "status": "archived"
}