Feitian FT-JCOS v1.0/0.106.13 running on Infineon M7892 B11
CSV information ?
Status | archived |
---|---|
Valid from | 27.06.2016 |
Valid until | 27.06.2021 |
Scheme | 🇳🇴 NO |
Manufacturer | Feitian Technologies Co., Ltd. |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | AVA_VAN.5, EAL4+, ALC_DVS.2 |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Symmetric Algorithms
AES, DESAsymmetric Algorithms
ECCJavaCard versions
Java Card 2.2.2, GlobalPlatform 2.1.1Vendor
Infineon, Feitian, Feitian Technologies CoSecurity level
EAL2, EAL4, EAL 4+, EAL1, EAL7Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ADV_COMP.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR, ALC_DVS.2, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_LCD.1, ALC_TAT.1, ALC_COMP.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, ATE_COMP.1, ATE_IND, AVA_VAN.5, AVA_COMP.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.2, ASE_SPD.1, ASE_OBJ.2, ASE_TSS.1, ASE_COMP.1Security Functional Requirements (SFR)
FAU_ARP.1, FCO_NRO, FCS_RNG.1, FCS_CKM.1, FCS_CKM.2, FCS_CKM.3, FCS_CKM.4, FCS_COP.1, FDP_ACC, FDP_ACF, FDP_IFC, FDP_IFF, FDP_ITC, FDP_RIP, FDP_ROL, FDP_SDI.2, FDP_UIT, FIA_UID, FIA_USB, FMT_MSA, FMT_MTD, FMT_SMF.1, FMT_SMF, FMT_SMR.1, FMT_SMR, FPR_UNO.1, FPT_FLS.1, FPT_FLS, FPT_RCV, FPT_TDC.1, FTP_ITCCertificates
SERTIT-079Evaluation facilities
BrightsightSide-channel analysis
JILStandards
ISO/IEC 15408, ISO/IEC 7816, ISO/IEC 14443, SCP02, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004File metadata
Title | Microsoft Word - SERTIT-079 CR 1.0 |
---|---|
Author | Arne |
Creation date | D:20160821174342+02'00' |
Modification date | D:20160821174443+02'00' |
Pages | 23 |
Creator | PScript5.dll Version 5.2.2 |
Producer | Acrobat Distiller 9.5.5 (Windows) |
Security target ?
Extracted keywords
Symmetric Algorithms
AES, DES, TDES, Triple-DES, TDEA, CMACAsymmetric Algorithms
RSA2048, ECDH, ECDSA, ECC, Diffie-HellmanHash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-2, MD5Schemes
MAC, Key exchange, Key AgreementRandomness
TRNG, RND, RNGLibraries
v1.02.013Block cipher modes
CBC, CCMJavaCard versions
Java Card 2.2.2, GlobalPlatform 2.1.1JavaCard API constants
TYPE_ACCESSVendor
Infineon, Infineon Technologies AG, Feitian Technologies Co, FeitianSecurity level
EAL4+, EAL 4, EAL5, EAL4, EAL6, EAL6+, EAL 4 augmented, EAL5 augmented, EAL6 augmentedClaims
D.APP_CODE, D.APP_C_DATA, D.APP_I_DATA, D.PIN, D.API_DATA, D.CRYPTO, D.JCS_CODE, D.JCS_DATA, D.SEC_DATA, D.JCS_KEYS, D.SEC_ATTRIBUTES, D.CM_APDU, O.CARD-, O.IC_SUPPORT, O.RECOVERY, O.OS_SUPPORT, O.COMMUNICATION, O.RND, O.REMOTE, O.SID, O.FIREWALL, O.GLOBAL_ARRAYS_CONFID, O.GLOBAL_ARRAYS_INTEG, O.NATIVE, O.OPERATE, O.REALLOCATION, O.RESOURCES, O.ALARM, O.CIPHER, O.KEY-MNGT, O.PIN-MNGT, O.TRANSACTION, O.OBJ-DELETION, O.DELETION, O.LOAD, O.INSTALL, O.CARD-MANAGEMENT, O.KEY-, O.APPLET, O.CODE_PKG, O.JAVAOBJECT, O.PACKAGE, O.GLOBAL, O.PIN-, O.OS, T.CONFID-APPLI-DATA, T.CONFID-JCS-CODE, T.CONFID-JCS-DATA, T.INTEG-APPLI-CODE, T.INTEG-APPLI-DATA, T.INTEG-JCS-CODE, T.INTEG-JCS-DATA, T.SID, T.EXE-CODE, T.NATIVE, T.RESOURCES, T.DELETION, T.INSTALL, T.COMMUNICATION, T.OBJ-DELETION, T.PHYSICAL, T.LEAKAGE, T.FAULT, T.RND, T.CONFID-APPLI-, T.INTEG-APPLI-, T.INTEG-, T.EXE-, T.INTEG-JCS-, T.CONFID-, A.APPLET, A.DELETION, A.VERIFICATION, R.JAVA, OP.ARRAY_ACCESS, OP.CREATE, OP.LOAD_PCKG, OP.DELETE_APPLET, OP.DELETE_PCKG, OP.DELETE_PCKG_APPLET, OP.GP, OP.INSTANCE_FIELD, OP.INVK_VIRTUAL, OP.INVK_INTERFACE, OP.JAVA, OP.THROW, OP.TYPE_ACCESS, OP.PUT, OE.CARD-MANAGEMENT, OE.SCP, OE.CODE-EVIDENCE, OE.APPLET, OE.VERIFICATION, OE.CODE-, OSP.VERIFICATIONSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_TDS.1, ADV_FSP.4, ADV_TDS.3, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, ADV_FSP.5, ADV_FSP.2, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_TAT.1, ALC_TAT.2, ALC_CMC.4, ALC_CMS.1, ALC_DVS.1, ALC_CMS.4, ALC_CMS.5, ALC_DEL.1, ALC_LCD.1, ATE_COV.2, ATE_FUN.1, ATE_COV.1, ATE_DPT.1, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1, ASE_REQ.2, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_ARP.1.1, FAU_ARP.1, FAU_SAA.1, FCO_NRO, FCO_NRO.2, FCS_RNG, FCS_COP, FCS_CKM.1, FCS_CKM.2, FCS_CKM.2.1, FCS_CKM.3, FCS_CKM.3.1, FCS_CKM.4, FCS_CKM.4.1, FCS_COP.1, FCS_RNG.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM, FDP_ACC, FDP_ACC.2, FDP_ACF, FDP_ACF.1, FDP_IFC, FDP_IFC.1, FDP_IFF, FDP_IFF.1, FDP_RIP, FDP_RIP.1, FDP_ROL.1, FDP_ROL, FDP_SDI.2, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ITC, FDP_ITC.2, FDP_IFC.2, FDP_UIT, FDP_UIT.1, FDP_ACC.1, FDP_SDI.1, FDP_ITT.1, FIA_ATD, FIA_ATD.1, FIA_UID, FIA_UID.2, FIA_USB, FIA_USB.1, FIA_UID.1, FMT_MSA, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD, FMT_MTD.1, FMT_MTD.3, FMT_SMR, FMT_SMF, FPR_UNO.1.1, FPR_UNO.1, FPT_TDC.1.2, FPT_FLS.1, FPT_FLS.1.1, FPT_TDC.1, FPT_TDC.1.1, FPT_FLS, FPT_RCV, FPT_RCV.3, FPT_RCV.4, FPT_TST.1, FPT_PHP.3, FPT_ITT.1, FRU_FLT.2, FTP_ITC, FTP_ITC.1, FTP_TRP.1Protection profiles
BSI-PP-0084Certificates
BSI-DSZ-CC-0782-, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0782-2012-MA-01Side-channel analysis
Leak-Inherent, physical probing, DPA, SPA, timing attacks, physical tampering, malfunction, MalfunctionCertification process
out of scope, Software development environment. Phase 2 covers the Secure IC Development of Infineon and is out of scope of the TOE evaluation as that is part of the IC platform evaluation. In Phase 3, the Chip, a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.RECOVERY and O.OS_SUPPORT areStandards
FIPS 186-3, FIPS140, FIPS180-4, FIPS197, FIPS PUB 140-2, FIPS PUB 197, FIPS PUB 180-4, AIS20, AIS36, RFC 5639, ICAO, SCP02, SCP03File metadata
Creation date | D:20160304175418+08'00' |
---|---|
Pages | 100 |
Creator | LaTeX with hyperref package |
Producer | MiKTeX-xdvipdfmx (0.7.8) |
References
Outgoing- BSI-DSZ-CC-0782-2012 - archived - Infineon Security Controller M7892 B11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01 and Toolbox v1.02.013 libraries and with specific IC dedicated software (firmware)
Heuristics ?
Extracted SARs
ALC_LCD.1, ATE_DPT.1, ADV_TDS.4, ATE_COV.2, ATE_IND.2, ATE_COMP.1, ASE_SPD.1, AVA_VAN.5, ALC_COMP.1, ASE_COMP.1, ASE_TSS.1, ADV_ARC.1, ASE_ECD.1, AVA_COMP.1, ALC_DEL.1, ALC_CMC.4, ATE_FUN.1, AGD_OPE.1, ADV_INT.2, ALC_TAT.2, ADV_FSP.5, ASE_REQ.2, AGD_PRE.1, ALC_CMS.5, ALC_DVS.2, ASE_OBJ.2, ADV_COMP.1, ASE_INT.1, ASE_CCL.1, ADV_IMP.1Similar certificates
Name | Certificate ID | |
---|---|---|
Feitian FT-JCOS v1.0/0.106.13 running on Infineon M7892 B11 | SERTIT-091 | Compare |
Scheme data ?
Product | FT-JCOS | |
---|---|---|
Url | https://sertit.no/certified-products/product-archive/ft-jcos | |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems | |
Developer | Feitian Technologies Co., Ltd. | |
Certification Date | 27.06.2016 | |
Enhanced | ||
Description | The TOE is a Java Card Platform compliant with Java Card Specification v.2.2.2 and GlobalPlatformSpecification v.2.1.1. The TOE allows post-issuance downloading of applications that have been previously verified by an off-card trusted IT component. It constitutes a secure generic platform that supports multi-application runtime environment and provides facilities for secure loading and interoperability between different applications. The TOE does not implement JCRMI and does not include any software on the application layer. | |
Id | SERTIT-079 | |
Mutual Recognition | CCRA, SOG-IS | |
Product | Feitian FT-JCOS v1.0/0.106.13 running on Infineon M7892 B11 | |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems | |
Developer | Feitian Technologies Co., Ltd. | |
Evaluation Facility | Brightsight B.V. | |
Certification Date | 27.06.2016 | |
Level | EAL 4, ALC_DVS.2, AVA_VAN.5 | |
Documents | frozendict({'cert': [frozendict({'href': 'https://sertit.no/getfile.php/135064-1607952717/SERTIT/Sertifikater/2016/79/20160627_SERTIT-079_Certificate.pdf'})], 'target': [frozendict({'href': 'https://sertit.no/getfile.php/135061-1607952711/SERTIT/Sertifikater/2016/79/%5B08250%5D%5BFTJCOS%5D%5BST%5D%5BV1.0.11%5DFTJCOS_Security_Target.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/135058-1607952708/SERTIT/Sertifikater/2016/79/20160627_SERTIT-079_CR_1.pdf'})]}) |
References ?
Updates ?
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '5065ea623ab6f37471a13f9e55656c5183c1ef9809b233313a16163a784c01f5', 'txt_hash': '2c98dcec4d90948f459abebbffbfbbc2d3c1370dfcb94c2a57336a531d42324f'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '75e12bfa079b72ee7e9e0e67404cd9f582ca8992f8bb82bca20d86e35a8bc98b', 'txt_hash': 'ae3e1fccb1433517827f00eea7f0683c1edd6e851df4acf0c3ca17fe44bb4f7a'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 1626992, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 23, '/Author': 'Arne', '/CreationDate': "D:20160821174342+02'00'", '/Creator': 'PScript5.dll Version 5.2.2', '/ModDate': "D:20160821174443+02'00'", '/Producer': 'Acrobat Distiller 9.5.5 (Windows)', '/Title': 'Microsoft Word - SERTIT-079 CR 1.0', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 1236795, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 100, '/Creator': 'LaTeX with hyperref package', '/Producer': 'MiKTeX-xdvipdfmx (0.7.8)', '/CreationDate': "D:20160304175418+08'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{}
. - The report_keywords property was set to
{'cc_cert_id': {'NO': {'SERTIT-079': 22}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 1, 'EAL4': 2, 'EAL 4+': 12, 'EAL1': 1, 'EAL7': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.4': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1, 'ADV_COMP.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR': 1, 'ALC_DVS.2': 4, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1, 'ALC_COMP.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1, 'ATE_COMP.1': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.5': 3, 'AVA_COMP.1': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_OBJ.2': 1, 'ASE_TSS.1': 1, 'ASE_COMP.1': 1}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 1}, 'FCO': {'FCO_NRO': 1}, 'FCS': {'FCS_RNG.1': 3, 'FCS_CKM.1': 1, 'FCS_CKM.2': 1, 'FCS_CKM.3': 1, 'FCS_CKM.4': 1, 'FCS_COP.1': 1}, 'FDP': {'FDP_ACC': 3, 'FDP_ACF': 3, 'FDP_IFC': 2, 'FDP_IFF': 2, 'FDP_ITC': 1, 'FDP_RIP': 8, 'FDP_ROL': 1, 'FDP_SDI.2': 1, 'FDP_UIT': 1}, 'FIA': {'FIA_UID': 3, 'FIA_USB': 1}, 'FMT': {'FMT_MSA': 11, 'FMT_MTD': 2, 'FMT_SMF.1': 1, 'FMT_SMF': 3, 'FMT_SMR.1': 1, 'FMT_SMR': 4}, 'FPR': {'FPR_UNO.1': 1}, 'FPT': {'FPT_FLS.1': 1, 'FPT_FLS': 3, 'FPT_RCV': 3, 'FPT_TDC.1': 1}, 'FTP': {'FTP_ITC': 1}}, 'cc_claims': {}, 'vendor': {'Infineon': {'Infineon': 2}, 'Feitian': {'Feitian': 2, 'Feitian Technologies Co': 2}}, 'eval_facility': {'BrightSight': {'Brightsight': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}}, 'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 1}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'other': {'JIL': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408': 4, 'ISO/IEC 7816': 2, 'ISO/IEC 14443': 2}, 'SCP': {'SCP02': 1}, 'CC': {'CCMB-2012-09-001': 1, 'CCMB-2012-09-002': 1, 'CCMB-2012-09-003': 1, 'CCMB-2012-09-004': 1}}, 'javacard_version': {'JavaCard': {'Java Card 2.2.2': 5}, 'GlobalPlatform': {'GlobalPlatform 2.1.1': 2}}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0782-': 1, 'BSI-DSZ-CC-0782-2012': 1, 'BSI-DSZ-CC-0782-2012-MA-01': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0084': 1}}, 'cc_security_level': {'EAL': {'EAL4+': 1, 'EAL 4': 1, 'EAL5': 1, 'EAL4': 5, 'EAL6': 1, 'EAL6+': 1, 'EAL 4 augmented': 1, 'EAL5 augmented': 1, 'EAL6 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 6, 'ADV_FSP.1': 4, 'ADV_TDS.1': 2, 'ADV_FSP.4': 2, 'ADV_TDS.3': 10, 'ADV_IMP.1': 9, 'ADV_INT.2': 1, 'ADV_TDS.4': 1, 'ADV_FSP.5': 7, 'ADV_FSP.2': 2, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE.1': 10, 'AGD_PRE.1': 6}, 'ALC': {'ALC_DVS.2': 7, 'ALC_TAT.1': 1, 'ALC_TAT.2': 2, 'ALC_CMC.4': 1, 'ALC_CMS.1': 1, 'ALC_DVS.1': 2, 'ALC_CMS.4': 1, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1}, 'ATE': {'ATE_COV.2': 3, 'ATE_FUN.1': 6, 'ATE_COV.1': 2, 'ATE_DPT.1': 2}, 'AVA': {'AVA_VAN.5': 7}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 4, 'ASE_INT.1': 5, 'ASE_REQ.1': 2, 'ASE_REQ.2': 2, 'ASE_OBJ.2': 3, 'ASE_SPD.1': 2, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_ARP.1.1': 2, 'FAU_ARP.1': 24, 'FAU_SAA.1': 3}, 'FCO': {'FCO_NRO': 6, 'FCO_NRO.2': 5}, 'FCS': {'FCS_RNG': 6, 'FCS_COP': 13, 'FCS_CKM.1': 10, 'FCS_CKM.2': 8, 'FCS_CKM.2.1': 1, 'FCS_CKM.3': 6, 'FCS_CKM.3.1': 1, 'FCS_CKM.4': 8, 'FCS_CKM.4.1': 1, 'FCS_COP.1': 25, 'FCS_RNG.1': 12, 'FCS_RNG.1.1': 2, 'FCS_RNG.1.2': 2, 'FCS_CKM': 3}, 'FDP': {'FDP_ACC': 29, 'FDP_ACC.2': 5, 'FDP_ACF': 31, 'FDP_ACF.1': 18, 'FDP_IFC': 22, 'FDP_IFC.1': 13, 'FDP_IFF': 18, 'FDP_IFF.1': 17, 'FDP_RIP': 117, 'FDP_RIP.1': 10, 'FDP_ROL.1': 4, 'FDP_ROL': 15, 'FDP_SDI.2': 13, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_ITC': 10, 'FDP_ITC.2': 9, 'FDP_IFC.2': 2, 'FDP_UIT': 5, 'FDP_UIT.1': 2, 'FDP_ACC.1': 13, 'FDP_SDI.1': 1, 'FDP_ITT.1': 1}, 'FIA': {'FIA_ATD': 8, 'FIA_ATD.1': 2, 'FIA_UID': 19, 'FIA_UID.2': 1, 'FIA_USB': 6, 'FIA_USB.1': 3, 'FIA_UID.1': 11}, 'FMT': {'FMT_MSA': 105, 'FMT_MSA.1': 9, 'FMT_MSA.2': 2, 'FMT_MSA.3': 19, 'FMT_SMF.1': 20, 'FMT_SMF.1.1': 1, 'FMT_SMR.1': 28, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MTD': 20, 'FMT_MTD.1': 2, 'FMT_MTD.3': 1, 'FMT_SMR': 43, 'FMT_SMF': 29}, 'FPR': {'FPR_UNO.1.1': 2, 'FPR_UNO.1': 13}, 'FPT': {'FPT_TDC.1.2': 2, 'FPT_FLS.1': 16, 'FPT_FLS.1.1': 2, 'FPT_TDC.1': 8, 'FPT_TDC.1.1': 1, 'FPT_FLS': 31, 'FPT_RCV': 23, 'FPT_RCV.3': 13, 'FPT_RCV.4': 2, 'FPT_TST.1': 1, 'FPT_PHP.3': 1, 'FPT_ITT.1': 1}, 'FRU': {'FRU_FLT.2': 1}, 'FTP': {'FTP_ITC': 6, 'FTP_ITC.1': 4, 'FTP_TRP.1': 2}}, 'cc_claims': {'D': {'D.APP_CODE': 7, 'D.APP_C_DATA': 3, 'D.APP_I_DATA': 5, 'D.PIN': 6, 'D.API_DATA': 3, 'D.CRYPTO': 6, 'D.JCS_CODE': 3, 'D.JCS_DATA': 5, 'D.SEC_DATA': 8, 'D.JCS_KEYS': 3, 'D.SEC_ATTRIBUTES': 2, 'D.CM_APDU': 1}, 'O': {'O.CARD-': 7, 'O.IC_SUPPORT': 17, 'O.RECOVERY': 23, 'O.OS_SUPPORT': 23, 'O.COMMUNICATION': 11, 'O.RND': 14, 'O.REMOTE': 1, 'O.SID': 32, 'O.FIREWALL': 43, 'O.GLOBAL_ARRAYS_CONFID': 18, 'O.GLOBAL_ARRAYS_INTEG': 9, 'O.NATIVE': 14, 'O.OPERATE': 35, 'O.REALLOCATION': 17, 'O.RESOURCES': 23, 'O.ALARM': 22, 'O.CIPHER': 16, 'O.KEY-MNGT': 23, 'O.PIN-MNGT': 22, 'O.TRANSACTION': 19, 'O.OBJ-DELETION': 8, 'O.DELETION': 15, 'O.LOAD': 17, 'O.INSTALL': 16, 'O.CARD-MANAGEMENT': 32, 'O.KEY-': 3, 'O.APPLET': 19, 'O.CODE_PKG': 16, 'O.JAVAOBJECT': 38, 'O.PACKAGE': 2, 'O.GLOBAL': 2, 'O.PIN-': 1, 'O.OS': 1}, 'T': {'T.CONFID-APPLI-DATA': 17, 'T.CONFID-JCS-CODE': 7, 'T.CONFID-JCS-DATA': 9, 'T.INTEG-APPLI-CODE': 12, 'T.INTEG-APPLI-DATA': 18, 'T.INTEG-JCS-CODE': 7, 'T.INTEG-JCS-DATA': 12, 'T.SID': 19, 'T.EXE-CODE': 8, 'T.NATIVE': 6, 'T.RESOURCES': 9, 'T.DELETION': 5, 'T.INSTALL': 6, 'T.COMMUNICATION': 5, 'T.OBJ-DELETION': 4, 'T.PHYSICAL': 8, 'T.LEAKAGE': 5, 'T.FAULT': 5, 'T.RND': 5, 'T.CONFID-APPLI-': 2, 'T.INTEG-APPLI-': 4, 'T.INTEG-': 6, 'T.EXE-': 1, 'T.INTEG-JCS-': 1, 'T.CONFID-': 2}, 'A': {'A.APPLET': 6, 'A.DELETION': 1, 'A.VERIFICATION': 6}, 'R': {'R.JAVA': 9}, 'OP': {'OP.ARRAY_ACCESS': 4, 'OP.CREATE': 7, 'OP.LOAD_PCKG': 1, 'OP.DELETE_APPLET': 4, 'OP.DELETE_PCKG': 3, 'OP.DELETE_PCKG_APPLET': 3, 'OP.GP': 3, 'OP.INSTANCE_FIELD': 4, 'OP.INVK_VIRTUAL': 6, 'OP.INVK_INTERFACE': 7, 'OP.JAVA': 5, 'OP.THROW': 5, 'OP.TYPE_ACCESS': 5, 'OP.PUT': 6}, 'OE': {'OE.CARD-MANAGEMENT': 2, 'OE.SCP': 6, 'OE.CODE-EVIDENCE': 16, 'OE.APPLET': 9, 'OE.VERIFICATION': 37, 'OE.CODE-': 5}, 'OSP': {'OSP.VERIFICATION': 6}}, 'vendor': {'Infineon': {'Infineon': 10, 'Infineon Technologies AG': 1}, 'Feitian': {'Feitian Technologies Co': 105, 'Feitian': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 9}}, 'DES': {'DES': {'DES': 6}, '3DES': {'TDES': 7, 'Triple-DES': 1, 'TDEA': 1}}, 'constructions': {'MAC': {'CMAC': 1}}}, 'asymmetric_crypto': {'RSA': {'RSA2048': 1}, 'ECC': {'ECDH': {'ECDH': 2}, 'ECDSA': {'ECDSA': 3}, 'ECC': {'ECC': 8}}, 'FF': {'DH': {'Diffie-Hellman': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}, 'SHA2': {'SHA-224': 1, 'SHA-256': 1, 'SHA-384': 1, 'SHA-512': 1, 'SHA-2': 2}}, 'MD': {'MD5': {'MD5': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 2}, 'KEX': {'Key exchange': 1}, 'KA': {'Key Agreement': 1}}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 3}, 'RNG': {'RND': 20, 'RNG': 10}}, 'cipher_mode': {'CBC': {'CBC': 4}, 'CCM': {'CCM': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Infineon': {'v1.02.013': 3}}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 2, 'physical probing': 3, 'DPA': 3, 'SPA': 1, 'timing attacks': 1}, 'FI': {'physical tampering': 1, 'malfunction': 4, 'Malfunction': 3}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 186-3': 3, 'FIPS140': 2, 'FIPS180-4': 2, 'FIPS197': 5, 'FIPS PUB 140-2': 1, 'FIPS PUB 197': 1, 'FIPS PUB 180-4': 1}, 'BSI': {'AIS20': 2, 'AIS36': 2}, 'RFC': {'RFC 5639': 3}, 'ICAO': {'ICAO': 3}, 'SCP': {'SCP02': 5, 'SCP03': 4}}, 'javacard_version': {'JavaCard': {'Java Card 2.2.2': 3}, 'GlobalPlatform': {'GlobalPlatform 2.1.1': 1}}, 'javacard_api_const': {'misc': {'TYPE_ACCESS': 5}}, 'javacard_packages': {'javacard': {'javacard.security': 3}, 'javacardx': {'javacardx.crypto': 2, 'javacardx.security': 1}}, 'certification_process': {'OutOfScope': {'out of scope': 2, 'Software development environment. Phase 2 covers the Secure IC Development of Infineon and is out of scope of the TOE evaluation as that is part of the IC platform evaluation. In Phase 3, the Chip': 1, 'a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.RECOVERY and O.OS_SUPPORT are': 1}}}
. - The report_filename property was set to
20160627_SERTIT-079_CR_1.pdf
. - The st_filename property was set to
[08250][FTJCOS][ST][V1.0.11]FTJCOS_Security_Target.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
SERTIT-079
. - The st_references property was updated, with the
{'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-2012']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-2012', 'BSI-DSZ-CC-0758-2012']}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20160627_SERTIT-079_CR_1.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[08250][FTJCOS][ST][V1.0.11]FTJCOS_Security_Target.pdf
.
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}]}
values discarded.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The report_filename property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
None
. - The st_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_COMP', 'level': 1}]}
values discarded.
- The report property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Feitian FT-JCOS v1.0/0.106.13 running on Infineon M7892 B11 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "4fdb0afc0bbabfb8",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "SERTIT-079",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_COMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_COMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_COMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_COMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"1.0",
"0.106.13"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"certification_date": "27.06.2016",
"developer": "Feitian Technologies Co., Ltd.",
"enhanced": {
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"certification_date": "27.06.2016",
"description": "The TOE is a Java Card Platform compliant with Java Card Specification v.2.2.2 and GlobalPlatformSpecification v.2.1.1. The TOE allows post-issuance downloading of applications that have been previously verified by an off-card trusted IT component. It constitutes a secure generic platform that supports multi-application runtime environment and provides facilities for secure loading and interoperability between different applications. The TOE does not implement JCRMI and does not include any software on the application layer.",
"developer": "Feitian Technologies Co., Ltd.",
"documents": {
"cert": [
{
"href": "https://sertit.no/getfile.php/135064-1607952717/SERTIT/Sertifikater/2016/79/20160627_SERTIT-079_Certificate.pdf"
}
],
"report": [
{
"href": "https://sertit.no/getfile.php/135058-1607952708/SERTIT/Sertifikater/2016/79/20160627_SERTIT-079_CR_1.pdf"
}
],
"target": [
{
"href": "https://sertit.no/getfile.php/135061-1607952711/SERTIT/Sertifikater/2016/79/%5B08250%5D%5BFTJCOS%5D%5BST%5D%5BV1.0.11%5DFTJCOS_Security_Target.pdf"
}
]
},
"evaluation_facility": "Brightsight B.V.",
"id": "SERTIT-079",
"level": "EAL 4, ALC_DVS.2, AVA_VAN.5",
"mutual_recognition": "CCRA, SOG-IS",
"product": "Feitian FT-JCOS v1.0/0.106.13 running on Infineon M7892 B11"
},
"product": "FT-JCOS",
"url": "https://sertit.no/certified-products/product-archive/ft-jcos"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0782-2012"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0782-2012",
"BSI-DSZ-CC-0758-2012"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Feitian Technologies Co., Ltd.",
"manufacturer_web": "https://www.ftsafe.com",
"name": "Feitian FT-JCOS v1.0/0.106.13 running on Infineon M7892 B11",
"not_valid_after": "2021-06-27",
"not_valid_before": "2016-06-27",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "20160627_SERTIT-079_CR_1.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
}
}
},
"cc_cert_id": {
"NO": {
"SERTIT-079": 22
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_COMP.1": 1,
"ADV_FSP.4": 1,
"ADV_IMP.1": 1,
"ADV_TDS.3": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.4": 1,
"ALC_COMP.1": 1,
"ALC_DEL.1": 1,
"ALC_DVS.2": 4,
"ALC_FLR": 1,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_COMP.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COMP.1": 1,
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_FUN.1": 1,
"ATE_IND": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_COMP.1": 1,
"AVA_VAN.5": 3
}
},
"cc_security_level": {
"EAL": {
"EAL 4+": 12,
"EAL1": 1,
"EAL2": 1,
"EAL4": 2,
"EAL7": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP.1": 1
},
"FCO": {
"FCO_NRO": 1
},
"FCS": {
"FCS_CKM.1": 1,
"FCS_CKM.2": 1,
"FCS_CKM.3": 1,
"FCS_CKM.4": 1,
"FCS_COP.1": 1,
"FCS_RNG.1": 3
},
"FDP": {
"FDP_ACC": 3,
"FDP_ACF": 3,
"FDP_IFC": 2,
"FDP_IFF": 2,
"FDP_ITC": 1,
"FDP_RIP": 8,
"FDP_ROL": 1,
"FDP_SDI.2": 1,
"FDP_UIT": 1
},
"FIA": {
"FIA_UID": 3,
"FIA_USB": 1
},
"FMT": {
"FMT_MSA": 11,
"FMT_MTD": 2,
"FMT_SMF": 3,
"FMT_SMF.1": 1,
"FMT_SMR": 4,
"FMT_SMR.1": 1
},
"FPR": {
"FPR_UNO.1": 1
},
"FPT": {
"FPT_FLS": 3,
"FPT_FLS.1": 1,
"FPT_RCV": 3,
"FPT_TDC.1": 1
},
"FTP": {
"FTP_ITC": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"BrightSight": {
"Brightsight": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {
"GlobalPlatform": {
"GlobalPlatform 2.1.1": 2
},
"JavaCard": {
"Java Card 2.2.2": 5
}
},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"other": {
"JIL": 2
}
},
"standard_id": {
"CC": {
"CCMB-2012-09-001": 1,
"CCMB-2012-09-002": 1,
"CCMB-2012-09-003": 1,
"CCMB-2012-09-004": 1
},
"ISO": {
"ISO/IEC 14443": 2,
"ISO/IEC 15408": 4,
"ISO/IEC 7816": 2
},
"SCP": {
"SCP02": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 1
}
},
"DES": {
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Feitian": {
"Feitian": 2,
"Feitian Technologies Co": 2
},
"Infineon": {
"Infineon": 2
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Arne",
"/CreationDate": "D:20160821174342+02\u002700\u0027",
"/Creator": "PScript5.dll Version 5.2.2",
"/ModDate": "D:20160821174443+02\u002700\u0027",
"/Producer": "Acrobat Distiller 9.5.5 (Windows)",
"/Title": "Microsoft Word - SERTIT-079 CR 1.0",
"pdf_file_size_bytes": 1626992,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 23
},
"st_filename": "[08250][FTJCOS][ST][V1.0.11]FTJCOS_Security_Target.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 8
},
"ECDH": {
"ECDH": 2
},
"ECDSA": {
"ECDSA": 3
}
},
"FF": {
"DH": {
"Diffie-Hellman": 1
}
},
"RSA": {
"RSA2048": 1
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0782-": 1,
"BSI-DSZ-CC-0782-2012": 1,
"BSI-DSZ-CC-0782-2012-MA-01": 1
}
},
"cc_claims": {
"A": {
"A.APPLET": 6,
"A.DELETION": 1,
"A.VERIFICATION": 6
},
"D": {
"D.API_DATA": 3,
"D.APP_CODE": 7,
"D.APP_C_DATA": 3,
"D.APP_I_DATA": 5,
"D.CM_APDU": 1,
"D.CRYPTO": 6,
"D.JCS_CODE": 3,
"D.JCS_DATA": 5,
"D.JCS_KEYS": 3,
"D.PIN": 6,
"D.SEC_ATTRIBUTES": 2,
"D.SEC_DATA": 8
},
"O": {
"O.ALARM": 22,
"O.APPLET": 19,
"O.CARD-": 7,
"O.CARD-MANAGEMENT": 32,
"O.CIPHER": 16,
"O.CODE_PKG": 16,
"O.COMMUNICATION": 11,
"O.DELETION": 15,
"O.FIREWALL": 43,
"O.GLOBAL": 2,
"O.GLOBAL_ARRAYS_CONFID": 18,
"O.GLOBAL_ARRAYS_INTEG": 9,
"O.IC_SUPPORT": 17,
"O.INSTALL": 16,
"O.JAVAOBJECT": 38,
"O.KEY-": 3,
"O.KEY-MNGT": 23,
"O.LOAD": 17,
"O.NATIVE": 14,
"O.OBJ-DELETION": 8,
"O.OPERATE": 35,
"O.OS": 1,
"O.OS_SUPPORT": 23,
"O.PACKAGE": 2,
"O.PIN-": 1,
"O.PIN-MNGT": 22,
"O.REALLOCATION": 17,
"O.RECOVERY": 23,
"O.REMOTE": 1,
"O.RESOURCES": 23,
"O.RND": 14,
"O.SID": 32,
"O.TRANSACTION": 19
},
"OE": {
"OE.APPLET": 9,
"OE.CARD-MANAGEMENT": 2,
"OE.CODE-": 5,
"OE.CODE-EVIDENCE": 16,
"OE.SCP": 6,
"OE.VERIFICATION": 37
},
"OP": {
"OP.ARRAY_ACCESS": 4,
"OP.CREATE": 7,
"OP.DELETE_APPLET": 4,
"OP.DELETE_PCKG": 3,
"OP.DELETE_PCKG_APPLET": 3,
"OP.GP": 3,
"OP.INSTANCE_FIELD": 4,
"OP.INVK_INTERFACE": 7,
"OP.INVK_VIRTUAL": 6,
"OP.JAVA": 5,
"OP.LOAD_PCKG": 1,
"OP.PUT": 6,
"OP.THROW": 5,
"OP.TYPE_ACCESS": 5
},
"OSP": {
"OSP.VERIFICATION": 6
},
"R": {
"R.JAVA": 9
},
"T": {
"T.COMMUNICATION": 5,
"T.CONFID-": 2,
"T.CONFID-APPLI-": 2,
"T.CONFID-APPLI-DATA": 17,
"T.CONFID-JCS-CODE": 7,
"T.CONFID-JCS-DATA": 9,
"T.DELETION": 5,
"T.EXE-": 1,
"T.EXE-CODE": 8,
"T.FAULT": 5,
"T.INSTALL": 6,
"T.INTEG-": 6,
"T.INTEG-APPLI-": 4,
"T.INTEG-APPLI-CODE": 12,
"T.INTEG-APPLI-DATA": 18,
"T.INTEG-JCS-": 1,
"T.INTEG-JCS-CODE": 7,
"T.INTEG-JCS-DATA": 12,
"T.LEAKAGE": 5,
"T.NATIVE": 6,
"T.OBJ-DELETION": 4,
"T.PHYSICAL": 8,
"T.RESOURCES": 9,
"T.RND": 5,
"T.SID": 19
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0084": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 6,
"ADV_FSP.1": 4,
"ADV_FSP.2": 2,
"ADV_FSP.4": 2,
"ADV_FSP.5": 7,
"ADV_IMP.1": 9,
"ADV_INT.2": 1,
"ADV_TDS.1": 2,
"ADV_TDS.2": 1,
"ADV_TDS.3": 10,
"ADV_TDS.4": 1
},
"AGD": {
"AGD_OPE.1": 10,
"AGD_PRE.1": 6
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.1": 1,
"ALC_CMS.4": 1,
"ALC_CMS.5": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 2,
"ALC_DVS.2": 7,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1,
"ALC_TAT.2": 2
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 4,
"ASE_INT.1": 5,
"ASE_OBJ.2": 3,
"ASE_REQ.1": 2,
"ASE_REQ.2": 2,
"ASE_SPD.1": 2,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.1": 2,
"ATE_COV.2": 3,
"ATE_DPT.1": 2,
"ATE_FUN.1": 6
},
"AVA": {
"AVA_VAN.5": 7
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 1,
"EAL 4 augmented": 1,
"EAL4": 5,
"EAL4+": 1,
"EAL5": 1,
"EAL5 augmented": 1,
"EAL6": 1,
"EAL6 augmented": 1,
"EAL6+": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP.1": 24,
"FAU_ARP.1.1": 2,
"FAU_SAA.1": 3
},
"FCO": {
"FCO_NRO": 6,
"FCO_NRO.2": 5
},
"FCS": {
"FCS_CKM": 3,
"FCS_CKM.1": 10,
"FCS_CKM.2": 8,
"FCS_CKM.2.1": 1,
"FCS_CKM.3": 6,
"FCS_CKM.3.1": 1,
"FCS_CKM.4": 8,
"FCS_CKM.4.1": 1,
"FCS_COP": 13,
"FCS_COP.1": 25,
"FCS_RNG": 6,
"FCS_RNG.1": 12,
"FCS_RNG.1.1": 2,
"FCS_RNG.1.2": 2
},
"FDP": {
"FDP_ACC": 29,
"FDP_ACC.1": 13,
"FDP_ACC.2": 5,
"FDP_ACF": 31,
"FDP_ACF.1": 18,
"FDP_IFC": 22,
"FDP_IFC.1": 13,
"FDP_IFC.2": 2,
"FDP_IFF": 18,
"FDP_IFF.1": 17,
"FDP_ITC": 10,
"FDP_ITC.2": 9,
"FDP_ITT.1": 1,
"FDP_RIP": 117,
"FDP_RIP.1": 10,
"FDP_ROL": 15,
"FDP_ROL.1": 4,
"FDP_SDI.1": 1,
"FDP_SDI.2": 13,
"FDP_SDI.2.1": 1,
"FDP_SDI.2.2": 1,
"FDP_UIT": 5,
"FDP_UIT.1": 2
},
"FIA": {
"FIA_ATD": 8,
"FIA_ATD.1": 2,
"FIA_UID": 19,
"FIA_UID.1": 11,
"FIA_UID.2": 1,
"FIA_USB": 6,
"FIA_USB.1": 3
},
"FMT": {
"FMT_MSA": 105,
"FMT_MSA.1": 9,
"FMT_MSA.2": 2,
"FMT_MSA.3": 19,
"FMT_MTD": 20,
"FMT_MTD.1": 2,
"FMT_MTD.3": 1,
"FMT_SMF": 29,
"FMT_SMF.1": 20,
"FMT_SMF.1.1": 1,
"FMT_SMR": 43,
"FMT_SMR.1": 28,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPR": {
"FPR_UNO.1": 13,
"FPR_UNO.1.1": 2
},
"FPT": {
"FPT_FLS": 31,
"FPT_FLS.1": 16,
"FPT_FLS.1.1": 2,
"FPT_ITT.1": 1,
"FPT_PHP.3": 1,
"FPT_RCV": 23,
"FPT_RCV.3": 13,
"FPT_RCV.4": 2,
"FPT_TDC.1": 8,
"FPT_TDC.1.1": 1,
"FPT_TDC.1.2": 2,
"FPT_TST.1": 1
},
"FRU": {
"FRU_FLT.2": 1
},
"FTP": {
"FTP_ITC": 6,
"FTP_ITC.1": 4,
"FTP_TRP.1": 2
}
},
"certification_process": {
"OutOfScope": {
"Software development environment. Phase 2 covers the Secure IC Development of Infineon and is out of scope of the TOE evaluation as that is part of the IC platform evaluation. In Phase 3, the Chip": 1,
"a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.RECOVERY and O.OS_SUPPORT are": 1,
"out of scope": 2
}
},
"cipher_mode": {
"CBC": {
"CBC": 4
},
"CCM": {
"CCM": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"Infineon": {
"v1.02.013": 3
}
},
"crypto_protocol": {},
"crypto_scheme": {
"KA": {
"Key Agreement": 1
},
"KEX": {
"Key exchange": 1
},
"MAC": {
"MAC": 2
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"MD": {
"MD5": {
"MD5": 1
}
},
"SHA": {
"SHA1": {
"SHA-1": 1
},
"SHA2": {
"SHA-2": 2,
"SHA-224": 1,
"SHA-256": 1,
"SHA-384": 1,
"SHA-512": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {
"misc": {
"TYPE_ACCESS": 5
}
},
"javacard_packages": {
"javacard": {
"javacard.security": 3
},
"javacardx": {
"javacardx.crypto": 2,
"javacardx.security": 1
}
},
"javacard_version": {
"GlobalPlatform": {
"GlobalPlatform 2.1.1": 1
},
"JavaCard": {
"Java Card 2.2.2": 3
}
},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 20,
"RNG": 10
},
"TRNG": {
"TRNG": 3
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 3,
"malfunction": 4,
"physical tampering": 1
},
"SCA": {
"DPA": 3,
"Leak-Inherent": 2,
"SPA": 1,
"physical probing": 3,
"timing attacks": 1
}
},
"standard_id": {
"BSI": {
"AIS20": 2,
"AIS36": 2
},
"FIPS": {
"FIPS 186-3": 3,
"FIPS PUB 140-2": 1,
"FIPS PUB 180-4": 1,
"FIPS PUB 197": 1,
"FIPS140": 2,
"FIPS180-4": 2,
"FIPS197": 5
},
"ICAO": {
"ICAO": 3
},
"RFC": {
"RFC 5639": 3
},
"SCP": {
"SCP02": 5,
"SCP03": 4
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 9
}
},
"DES": {
"3DES": {
"TDEA": 1,
"TDES": 7,
"Triple-DES": 1
},
"DES": {
"DES": 6
}
},
"constructions": {
"MAC": {
"CMAC": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Feitian": {
"Feitian": 1,
"Feitian Technologies Co": 105
},
"Infineon": {
"Infineon": 10,
"Infineon Technologies AG": 1
}
},
"vulnerability": {}
},
"st_metadata": {
"/CreationDate": "D:20160304175418+08\u002700\u0027",
"/Creator": "LaTeX with hyperref package",
"/Producer": "MiKTeX-xdvipdfmx (0.7.8)",
"pdf_file_size_bytes": 1236795,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 100
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20160627_SERTIT-079_CR_1.pdf",
"scheme": "NO",
"security_level": {
"_type": "Set",
"elements": [
"EAL4+",
"AVA_VAN.5",
"ALC_DVS.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[08250][FTJCOS][ST][V1.0.11]FTJCOS_Security_Target.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "5065ea623ab6f37471a13f9e55656c5183c1ef9809b233313a16163a784c01f5",
"txt_hash": "2c98dcec4d90948f459abebbffbfbbc2d3c1370dfcb94c2a57336a531d42324f"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "75e12bfa079b72ee7e9e0e67404cd9f582ca8992f8bb82bca20d86e35a8bc98b",
"txt_hash": "ae3e1fccb1433517827f00eea7f0683c1edd6e851df4acf0c3ca17fe44bb4f7a"
}
},
"status": "archived"
}