RC-SA08/01et RC-SA08/02 version 1.00
CSV information ?
Status | archived |
---|---|
Valid from | 21.08.2017 |
Valid until | 21.08.2022 |
Scheme | 🇫🇷 FR |
Manufacturer | Sony Corporation |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | ASE_TSS.2, AVA_VAN.5, ALC_DVS.2, EAL5+ |
Protection profiles |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Symmetric Algorithms
DESCPLC
IC TypeVendor
STMicroelectronicsSecurity level
EAL 5, EAL2, EAL5, EAL7, EAL 1, EAL 3, EAL 7, ITSEC E6 ElevéSecurity Assurance Requirements (SAR)
ADV_IMP.2, ADV_INT.3, ADV_TDS.5, ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_CMC.5, ALC_FLR.1, ALC_TAT.3, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_COV.3, ATE_FUN.2, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSSProtection profiles
BSI-PP-0084-2014Certificates
ANSSI-CC-2017/44, ANSSI-CC-2016/58Evaluation facilities
Serma Safety & Security, SERMAStandards
CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004File metadata
Keywords | ANSSI-CC-CER-F-07.024 |
---|---|
Creation date | D:20170904143302+02'00' |
Modification date | D:20170911160750+02'00' |
Pages | 16 |
Creator | Microsoft® Word 2010 |
Producer | Microsoft® Word 2010 |
Frontpage
Certificate ID | ANSSI-CC-2017/44 |
---|---|
Certified item | RC-SA08/01 et RC-SA08/02 |
Certification lab | Serma Safety & Security 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France |
Developer | Sony Corporation Sony City Osaki 2-10-1 Osaki Shinagawa- ku Tokyo, 141-86-10 Japan STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, 13106 Rousset, France Commanditaire Sony Corporation Sony City Osaki 2-10-1 Osaki Shinagawa-ku Tokyo, 141-86-10 Japan |
References
Outgoing- ANSSI-CC-2016/58 - archived - ST31G480 A02 including optional cryptographic library NESLIB and optional technologies MIFARE DESFire EV1 and MIFARE Plus X
Security target ?
Extracted keywords
Symmetric Algorithms
AES, DESSchemes
MACRandomness
RND, RNGVendor
STMicroelectronics, STMSecurity level
EAL5, EAL5 augmentedClaims
O.AC, O.SC, O.RND, T.RNDSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, ADV_FSP, ADV_TDS.3, ADV_IMP.2, ADV_INT.3, ADV_TDS.5, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.2, ALC_CMS, ALC_DVS.1, ALC_CMC.5, ALC_FLR.1, ALC_TAT.3, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, ATE_DPT.1, ATE_COV.3, ATE_FUN.2, AVA_VAN.5, ASE_TSS.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_SAS.1, FAU_SAS, FAU_SAS.1.1, FCS_RNG.1, FCS_RNG, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM.1, FCS_CKM.4, FDP_SDC.1, FDP_ACC.1, FDP_ACC.1.1, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_SDI, FDP_SDC, FDP_SDI.2, FDP_SDI.2.1, FDP_SDI.2.2, FDP_SDC.1.1, FDP_ITT.1, FDP_ITT.1.1, FDP_IFC.1, FDP_IFC.1.1, FDP_IFF.1, FDP_ACC.2, FDP_ITC.1, FDP_ITC.2, FDP_TDC.1, FDP_RIP.1, FDP_ROL.1, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.4, FIA_UAU.4.1, FIA_UID.2, FIA_UAU.2, FIA_UAU.5, FMT_LIM.1, FMT_LIM.2, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MOF.1, FMT_MOF.1.1, FMT_MSA.1, FMT_MSA.1.1, FMT_SMF.1, FMT_SMF.1.1, FMT_LIM.1.1, FMT_LIM.2.1, FMT_MSA.3, FMT_MTD.1, FPR_UNL.1, FPR_UNL.1.1, FPT_FLS.1, FPT_FLS.1.1, FPT_PHP.3, FPT_PHP.3.1, FPT_ITT.1, FPT_ITT.1.1, FPT_TRP.1, FPT_RPL.1, FPT_TDC.1, FRU_FLT.2, FRU_FLT.2.1, FRU_RSA.2, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3Protection profiles
BSI-PP-0084Side-channel analysis
Leak-Inherent, Physical Probing, physical probing, Side-channel, side-channel, Malfunction, malfunctionCertification process
out of scope, FeliCa OS, and APDU commands, which are processed by the Java Card System. The antenna, which is out of scope of the TOE, provides the RF interface on the smart card. The Java Card System and Java Applets areStandards
ISO/IEC 18092, ISO/IEC 14443, ISO/IEC 7816Heuristics ?
Extracted SARs
ASE_CCL.1, ALC_DEL.1, ADV_FSP.5, ALC_CMS.5, ALC_DVS.2, AVA_VAN.5, ALC_CMC.5, ATE_IND.2, ADV_IMP.2, ADV_ARC.1, ATE_FUN.2, ASE_SPD.1, ASE_REQ.2, ASE_TSS.2, AGD_OPE.1, ATE_COV.3, ALC_TAT.3, ASE_ECD.1, ADV_INT.3, ASE_INT.1, AGD_PRE.1, ADV_TDS.5, ALC_LCD.1, ATE_DPT.3, ALC_FLR.1, ASE_OBJ.2Similar certificates
Scheme data ?
Product | RC-SA08/01 et RC-SA08/02 - v.1.0 | |
---|---|---|
Url | https://cyber.gouv.fr/produits-certifies/rc-sa0801-et-rc-sa0802-v10 | |
Description | Le produit certifié est la famille de composants pour carte à puce FeliCa « RC-SA08/01 et RC-SA08/02 version 1.00 » développée par SONY CORPORATION et STMICROELECTRONICS. Le produit est un microcontrôleur intégrant le système d’exploitation embarqué FeliCa OS. Le microcontrôleur seul n’est pas un produit utilisable en tant que tel. Il est destiné à héberger une ou plusieurs applications. Il doi | |
Sponsor | Sony Corporation | |
Developer | Sony Corporation, STMicroelectronics | |
Cert Id | ANSSI-CC-2017/44 | |
Level | EAL5+ | |
Enhanced | ||
Cert Id | ANSSI-CC-2017/44 | |
Certification Date | 21.08.2017 | |
Category | Micro-circuits | |
Cc Version | Critères Communs version 3.1r4 | |
Developer | Sony Corporation, STMicroelectronics | |
Sponsor | Sony Corporation | |
Evaluation Facility | Serma Safety & Security | |
Level | EAL5+ | |
Protection Profile | PP 0084 | |
Mutual Recognition | SOG-IS CCRA | |
Augmented | ASE_TSS.2, ALC_DVS.2, AVA_VAN.5 | |
Target Link | https://cyber.gouv.fr/sites/default/files/2017/09/anssi_cible2017_44en.pdf | |
Report Link | https://cyber.gouv.fr/sites/default/files/2017/09/anssi-cc-2017_44en.pdf |
References ?
Updates ?
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'description': 'Le produit certifié est la famille de composants pour carte à puce FeliCa « RC-SA08/01 et RC-SA08/02 version 1.00 » développée par SONY CORPORATION et STMICROELECTRONICS. Le produit est un microcontrôleur intégrant le système d’exploitation embarqué FeliCa OS. Le microcontrôleur seul n’est pas un produit utilisable en tant que tel. Il est destiné à héberger une ou plusieurs applications. Il doi', 'cert_id': 'ANSSI-CC-2017/44', 'enhanced': {'__update__': {'cert_id': 'ANSSI-CC-2017/44', 'certification_date': '2017-08-21', 'mutual_recognition': 'SOG-IS CCRA'}}}
data.
- The scheme_data property was updated, with the
-
17.10.2024 The certificate data changed.
Certificate changed
The Protection Profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['BAROC_SC_PP_V1.0', 'JAVA_OC', 'SECURITY_IC_AUGP_V1.0']}}]}
.
- The new value is
-
14.10.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'RC-SA08/01 et RC-SA08/02 - v.1.0', 'url': 'https://cyber.gouv.fr/produits-certifies/rc-sa0801-et-rc-sa0802-v10', 'description': 'Le produit certifié est la famille de composants pour carte à puce FeliCa « RC-SA08/01 et RC-SA08/02 version 1.00 » développée par SONY CORPORATION et STMICROELECTRONICS. Le produit est un microcontrôleur intégrant le système d’exploitation embarqué FeliCa OS.\n\nLe microcontrôleur seul n’est pas un produit utilisable en tant que tel. Il est destiné à héberger une ou plusieurs applications. Il doi', 'sponsor': 'Sony Corporation', 'developer': 'Sony Corporation, STMicroelectronics', 'cert_id': '2017/44', 'level': 'EAL5+', 'enhanced': {'cert_id': '2017/44', 'certification_date': '21/08/2017', 'category': 'Micro-circuits', 'cc_version': 'Critères Communs version 3.1r4', 'developer': 'Sony Corporation, STMicroelectronics', 'sponsor': 'Sony Corporation', 'evaluation_facility': 'Serma Safety & Security', 'level': 'EAL5+', 'protection_profile': 'PP 0084', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ASE_TSS.2, ALC_DVS.2, AVA_VAN.5', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2017/09/anssi_cible2017_44en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2017/09/anssi-cc-2017_44en.pdf'}}
.
- The scheme_data property was set to
-
02.09.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'd4e46139cc98e172139fb364cce68cfec2f3a1c9b6d76f4fa568be480714c329', 'txt_hash': '71bae905ffa44e9c6e44f1a022a4dc47a9441f0656e7c8cf72998a615b78670b'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'pdf_hash': '40c4ae0757e2858b6865fb82295f9887920b544eeb8b415039a0a369ab67f98a', 'txt_hash': 'fb448aa87b58656feb6c79e7cbbce9f884f6162452e8d3678020ed93776d1b4f'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 531170, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 16, '/CreationDate': "D:20170904143302+02'00'", '/Creator': 'Microsoft® Word 2010', '/Keywords': 'ANSSI-CC-CER-F-07.024', '/ModDate': "D:20170911160750+02'00'", '/Producer': 'Microsoft® Word 2010', '/Subject': '', '/Title': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['mailto:[email protected]', 'http://www.ssi.gouv.fr/']}}
. - The report_frontpage property was set to
{'FR': {'match_rules': ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables'], 'cert_id': 'ANSSI-CC-2017/44', 'cert_item': 'RC-SA08/01 et RC-SA08/02', 'cert_item_version': 'Version 1.00', 'ref_protection_profiles': 'PP 0084], version 1.0 Security IC Platform Protection Profile with Augmentation Packages', 'cc_version': 'Critères Communs version 3.1 révision 4', 'cc_security_level': 'EAL 5 augmenté ASE_TSS.2, ALC_DVS.2, AVA_VAN.5', 'developer': 'Sony Corporation Sony City Osaki 2-10-1 Osaki Shinagawa- ku Tokyo, 141-86-10 Japan STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, 13106 Rousset, France Commanditaire Sony Corporation Sony City Osaki 2-10-1 Osaki Shinagawa-ku Tokyo, 141-86-10 Japan', 'cert_lab': 'Serma Safety & Security 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France'}}
. - The report_keywords property was set to
{'cc_cert_id': {'FR': {'ANSSI-CC-2017/44': 17, 'ANSSI-CC-2016/58': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0084-2014': 1}}, 'cc_security_level': {'EAL': {'EAL 5': 3, 'EAL2': 2, 'EAL5': 1, 'EAL7': 1, 'EAL 1': 1, 'EAL 3': 1, 'EAL 7': 1}, 'ITSEC': {'ITSEC E6 Elevé': 1}}, 'cc_sar': {'ADV': {'ADV_IMP.2': 1, 'ADV_INT.3': 1, 'ADV_TDS.5': 1, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_DVS.2': 2, 'ALC_CMC.5': 1, 'ALC_FLR.1': 1, 'ALC_TAT.3': 1, 'ALC_FLR': 2, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV.3': 1, 'ATE_FUN.2': 1, 'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.5': 5, 'AVA_VAN': 2}, 'ASE': {'ASE_TSS.2': 3, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'STMicroelectronics': {'STMicroelectronics': 1}}, 'eval_facility': {'Serma': {'Serma Safety & Security': 1, 'SERMA': 1}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {'ICType': {'IC Type': 1}}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2012-09-001': 1, 'CCMB-2012-09-002': 1, 'CCMB-2012-09-003': 1, 'CCMB-2012-09-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0084': 36}}, 'cc_security_level': {'EAL': {'EAL5': 9, 'EAL5 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 6, 'ADV_FSP.5': 6, 'ADV_IMP.1': 3, 'ADV_INT.2': 1, 'ADV_TDS.4': 2, 'ADV_FSP': 1, 'ADV_TDS.3': 1, 'ADV_IMP.2': 1, 'ADV_INT.3': 1, 'ADV_TDS.5': 1}, 'AGD': {'AGD_OPE.1': 4, 'AGD_PRE.1': 3}, 'ALC': {'ALC_DVS.2': 10, 'ALC_CMC.4': 2, 'ALC_CMS.5': 5, 'ALC_DEL.1': 2, 'ALC_LCD.1': 1, 'ALC_TAT.2': 1, 'ALC_CMS': 1, 'ALC_DVS.1': 1, 'ALC_CMC.5': 1, 'ALC_FLR.1': 1, 'ALC_TAT.3': 1}, 'ATE': {'ATE_COV.2': 2, 'ATE_DPT.3': 2, 'ATE_FUN.1': 1, 'ATE_IND.2': 1, 'ATE_DPT.1': 1, 'ATE_COV.3': 1, 'ATE_FUN.2': 1}, 'AVA': {'AVA_VAN.5': 10}, 'ASE': {'ASE_TSS.2': 9, 'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 3, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 2, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 6, 'FAU_SAS': 1, 'FAU_SAS.1.1': 1}, 'FCS': {'FCS_RNG.1': 7, 'FCS_RNG': 1, 'FCS_RNG.1.1': 1, 'FCS_RNG.1.2': 1, 'FCS_CKM.1': 1, 'FCS_CKM.4': 2}, 'FDP': {'FDP_SDC.1': 5, 'FDP_ACC.1': 16, 'FDP_ACC.1.1': 1, 'FDP_ACF.1': 11, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_SDI': 1, 'FDP_SDC': 1, 'FDP_SDI.2': 5, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_SDC.1.1': 1, 'FDP_ITT.1': 8, 'FDP_ITT.1.1': 1, 'FDP_IFC.1': 10, 'FDP_IFC.1.1': 1, 'FDP_IFF.1': 1, 'FDP_ACC.2': 1, 'FDP_ITC.1': 1, 'FDP_ITC.2': 2, 'FDP_TDC.1': 1, 'FDP_RIP.1': 2, 'FDP_ROL.1': 1}, 'FIA': {'FIA_UID.1': 7, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_UAU.1': 4, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.4': 4, 'FIA_UAU.4.1': 1, 'FIA_UID.2': 2, 'FIA_UAU.2': 2, 'FIA_UAU.5': 2}, 'FMT': {'FMT_LIM.1': 9, 'FMT_LIM.2': 9, 'FMT_SMR.1': 13, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MOF.1': 5, 'FMT_MOF.1.1': 1, 'FMT_MSA.1': 9, 'FMT_MSA.1.1': 1, 'FMT_SMF.1': 12, 'FMT_SMF.1.1': 1, 'FMT_LIM.1.1': 1, 'FMT_LIM.2.1': 1, 'FMT_MSA.3': 8, 'FMT_MTD.1': 2}, 'FPR': {'FPR_UNL.1': 7, 'FPR_UNL.1.1': 1}, 'FPT': {'FPT_FLS.1': 10, 'FPT_FLS.1.1': 1, 'FPT_PHP.3': 9, 'FPT_PHP.3.1': 1, 'FPT_ITT.1': 8, 'FPT_ITT.1.1': 1, 'FPT_TRP.1': 2, 'FPT_RPL.1': 2, 'FPT_TDC.1': 1}, 'FRU': {'FRU_FLT.2': 9, 'FRU_FLT.2.1': 1, 'FRU_RSA.2': 2}, 'FTP': {'FTP_ITC.1': 4, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1}}, 'cc_claims': {'O': {'O.AC': 18, 'O.SC': 12, 'O.RND': 5}, 'T': {'T.RND': 4}}, 'vendor': {'STMicroelectronics': {'STMicroelectronics': 1, 'STM': 7}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 10}}, 'DES': {'DES': {'DES': 5}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 1}}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RND': 10, 'RNG': 3}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 13, 'Physical Probing': 2, 'physical probing': 4, 'Side-channel': 1, 'side-channel': 1}, 'FI': {'Malfunction': 13, 'malfunction': 3}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 18092': 2, 'ISO/IEC 14443': 2, 'ISO/IEC 7816': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 2, 'FeliCa OS, and APDU commands, which are processed by the Java Card System. The antenna, which is out of scope of the TOE, provides the RF interface on the smart card. The Java Card System and Java Applets are': 1}}}
. - The report_filename property was set to
anssi-cc-2017_44fr.pdf
. - The st_filename property was set to
anssi_cible2017_44en.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['SERMA']
. - The cert_id property was set to
ANSSI-CC-2017/44
. - The report_references property was updated, with the
{'directly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2016/58']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2016/58']}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2017_44fr.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi_cible2017_44en.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
. - The report_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}]}
values discarded.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'RC-SA08/01 et RC-SA08/02 - v.1.0', 'url': 'https://cyber.gouv.fr/produits-certifies/rc-sa0801-et-rc-sa0802-v10', 'description': 'Le produit certifié est la famille de composants pour carte à puce FeliCa « RC-SA08/01 et RC-SA08/02 version 1.00 » développée par SONY CORPORATION et STMICROELECTRONICS. Le produit est un microcontrôleur intégrant le système d’exploitation embarqué FeliCa OS.\n\nLe microcontrôleur seul n’est pas un produit utilisable en tant que tel. Il est destiné à héberger une ou plusieurs applications. Il doi', 'sponsor': 'Sony Corporation', 'developer': 'Sony Corporation, STMicroelectronics', 'cert_id': '2017/44', 'level': 'EAL5+', 'enhanced': {'cert_id': '2017/44', 'certification_date': '21/08/2017', 'category': 'Micro-circuits', 'cc_version': 'Critères Communs version 3.1r4', 'developer': 'Sony Corporation, STMicroelectronics', 'sponsor': 'Sony Corporation', 'evaluation_facility': 'Serma Safety & Security', 'level': 'EAL5+', 'protection_profile': 'PP 0084', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ASE_TSS.2, ALC_DVS.2, AVA_VAN.5', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2017/09/anssi_cible2017_44en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2017/09/anssi-cc-2017_44en.pdf'}}
.
- The scheme_data property was set to
-
31.07.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name RC-SA08/01et RC-SA08/02 version 1.00 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "549050cd6694b982",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2017/44",
"cert_lab": [
"SERMA"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"1.00"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2016/58"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2016/58"
]
}
},
"scheme_data": {
"cert_id": "ANSSI-CC-2017/44",
"description": "Le produit certifi\u00e9 est la famille de composants pour carte \u00e0 puce FeliCa \u00ab RC-SA08/01 et RC-SA08/02 version 1.00 \u00bb d\u00e9velopp\u00e9e par SONY CORPORATION et STMICROELECTRONICS. Le produit est un microcontr\u00f4leur int\u00e9grant le syst\u00e8me d\u2019exploitation embarqu\u00e9 FeliCa OS. Le microcontr\u00f4leur seul n\u2019est pas un produit utilisable en tant que tel. Il est destin\u00e9 \u00e0 h\u00e9berger une ou plusieurs applications. Il doi",
"developer": "Sony Corporation, STMicroelectronics",
"enhanced": {
"augmented": "ASE_TSS.2, ALC_DVS.2, AVA_VAN.5",
"category": "Micro-circuits",
"cc_version": "Crit\u00e8res Communs version 3.1r4",
"cert_id": "ANSSI-CC-2017/44",
"certification_date": "2017-08-21",
"developer": "Sony Corporation, STMicroelectronics",
"evaluation_facility": "Serma Safety \u0026 Security",
"level": "EAL5+",
"mutual_recognition": "SOG-IS CCRA",
"protection_profile": "PP 0084",
"report_link": "https://cyber.gouv.fr/sites/default/files/2017/09/anssi-cc-2017_44en.pdf",
"sponsor": "Sony Corporation",
"target_link": "https://cyber.gouv.fr/sites/default/files/2017/09/anssi_cible2017_44en.pdf"
},
"level": "EAL5+",
"product": "RC-SA08/01 et RC-SA08/02 - v.1.0",
"sponsor": "Sony Corporation",
"url": "https://cyber.gouv.fr/produits-certifies/rc-sa0801-et-rc-sa0802-v10"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Sony Corporation",
"manufacturer_web": "https://www.sony.com/",
"name": "RC-SA08/01et RC-SA08/02 version 1.00",
"not_valid_after": "2022-08-21",
"not_valid_before": "2017-08-21",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "anssi-cc-2017_44fr.pdf",
"report_frontpage": {
"FR": {
"cc_security_level": "EAL 5 augment\u00e9 ASE_TSS.2, ALC_DVS.2, AVA_VAN.5",
"cc_version": "Crit\u00e8res Communs version 3.1 r\u00e9vision 4",
"cert_id": "ANSSI-CC-2017/44",
"cert_item": "RC-SA08/01 et RC-SA08/02",
"cert_item_version": "Version 1.00",
"cert_lab": "Serma Safety \u0026 Security 14 rue Galil\u00e9e, CS 10055, 33615 Pessac Cedex, France",
"developer": "Sony Corporation Sony City Osaki 2-10-1 Osaki Shinagawa- ku Tokyo, 141-86-10 Japan STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, 13106 Rousset, France Commanditaire Sony Corporation Sony City Osaki 2-10-1 Osaki Shinagawa-ku Tokyo, 141-86-10 Japan",
"match_rules": [
"R\u00e9f\u00e9rence du rapport de certification(.+)Nom du produit(.+)R\u00e9f\u00e9rence/version du produit(.*)Conformit\u00e9 \u00e0 un profil de protection(.+)Crit\u00e8res d\u2019\u00e9valuation et version(.+)Niveau d\u2019\u00e9valuation(.+)D\u00e9veloppeurs(.+)Centre d\u2019\u00e9valuation(.+)Accords de reconnaissance applicables"
],
"ref_protection_profiles": "PP 0084], version 1.0 Security IC Platform Protection Profile with Augmentation Packages"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2016/58": 2,
"ANSSI-CC-2017/44": 17
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0084-2014": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_FSP": 1,
"ADV_IMP": 1,
"ADV_IMP.2": 1,
"ADV_INT": 1,
"ADV_INT.3": 1,
"ADV_SPM": 1,
"ADV_TDS": 1,
"ADV_TDS.5": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_PRE": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.5": 1,
"ALC_CMS": 1,
"ALC_DEL": 1,
"ALC_DVS": 1,
"ALC_DVS.2": 2,
"ALC_FLR": 2,
"ALC_FLR.1": 1,
"ALC_TAT": 1,
"ALC_TAT.3": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_ECD": 1,
"ASE_INT": 1,
"ASE_OBJ": 1,
"ASE_REQ": 1,
"ASE_SPD": 1,
"ASE_TSS": 1,
"ASE_TSS.2": 3
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.3": 1,
"ATE_DPT": 1,
"ATE_FUN": 1,
"ATE_FUN.2": 1,
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.5": 5
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 3": 1,
"EAL 5": 3,
"EAL 7": 1,
"EAL2": 2,
"EAL5": 1,
"EAL7": 1
},
"ITSEC": {
"ITSEC E6 Elev\u00e9": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {
"ICType": {
"IC Type": 1
}
},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Serma": {
"SERMA": 1,
"Serma Safety \u0026 Security": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2012-09-001": 1,
"CCMB-2012-09-002": 1,
"CCMB-2012-09-003": 1,
"CCMB-2012-09-004": 1
}
},
"symmetric_crypto": {
"DES": {
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"STMicroelectronics": {
"STMicroelectronics": 1
}
},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20170904143302+02\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2010",
"/Keywords": "ANSSI-CC-CER-F-07.024",
"/ModDate": "D:20170911160750+02\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2010",
"/Subject": "",
"/Title": "",
"pdf_file_size_bytes": 531170,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"mailto:[email protected]",
"http://www.ssi.gouv.fr/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 16
},
"st_filename": "anssi_cible2017_44en.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"O": {
"O.AC": 18,
"O.RND": 5,
"O.SC": 12
},
"T": {
"T.RND": 4
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0084": 36
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 6,
"ADV_FSP": 1,
"ADV_FSP.5": 6,
"ADV_IMP.1": 3,
"ADV_IMP.2": 1,
"ADV_INT.2": 1,
"ADV_INT.3": 1,
"ADV_TDS.3": 1,
"ADV_TDS.4": 2,
"ADV_TDS.5": 1
},
"AGD": {
"AGD_OPE.1": 4,
"AGD_PRE.1": 3
},
"ALC": {
"ALC_CMC.4": 2,
"ALC_CMC.5": 1,
"ALC_CMS": 1,
"ALC_CMS.5": 5,
"ALC_DEL.1": 2,
"ALC_DVS.1": 1,
"ALC_DVS.2": 10,
"ALC_FLR.1": 1,
"ALC_LCD.1": 1,
"ALC_TAT.2": 1,
"ALC_TAT.3": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 3,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 2,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1,
"ASE_TSS.2": 9
},
"ATE": {
"ATE_COV.2": 2,
"ATE_COV.3": 1,
"ATE_DPT.1": 1,
"ATE_DPT.3": 2,
"ATE_FUN.1": 1,
"ATE_FUN.2": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.5": 10
}
},
"cc_security_level": {
"EAL": {
"EAL5": 9,
"EAL5 augmented": 2
}
},
"cc_sfr": {
"FAU": {
"FAU_SAS": 1,
"FAU_SAS.1": 6,
"FAU_SAS.1.1": 1
},
"FCS": {
"FCS_CKM.1": 1,
"FCS_CKM.4": 2,
"FCS_RNG": 1,
"FCS_RNG.1": 7,
"FCS_RNG.1.1": 1,
"FCS_RNG.1.2": 1
},
"FDP": {
"FDP_ACC.1": 16,
"FDP_ACC.1.1": 1,
"FDP_ACC.2": 1,
"FDP_ACF.1": 11,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_IFC.1": 10,
"FDP_IFC.1.1": 1,
"FDP_IFF.1": 1,
"FDP_ITC.1": 1,
"FDP_ITC.2": 2,
"FDP_ITT.1": 8,
"FDP_ITT.1.1": 1,
"FDP_RIP.1": 2,
"FDP_ROL.1": 1,
"FDP_SDC": 1,
"FDP_SDC.1": 5,
"FDP_SDC.1.1": 1,
"FDP_SDI": 1,
"FDP_SDI.2": 5,
"FDP_SDI.2.1": 1,
"FDP_SDI.2.2": 1,
"FDP_TDC.1": 1
},
"FIA": {
"FIA_UAU.1": 4,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UAU.2": 2,
"FIA_UAU.4": 4,
"FIA_UAU.4.1": 1,
"FIA_UAU.5": 2,
"FIA_UID.1": 7,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1,
"FIA_UID.2": 2
},
"FMT": {
"FMT_LIM.1": 9,
"FMT_LIM.1.1": 1,
"FMT_LIM.2": 9,
"FMT_LIM.2.1": 1,
"FMT_MOF.1": 5,
"FMT_MOF.1.1": 1,
"FMT_MSA.1": 9,
"FMT_MSA.1.1": 1,
"FMT_MSA.3": 8,
"FMT_MTD.1": 2,
"FMT_SMF.1": 12,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 13,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPR": {
"FPR_UNL.1": 7,
"FPR_UNL.1.1": 1
},
"FPT": {
"FPT_FLS.1": 10,
"FPT_FLS.1.1": 1,
"FPT_ITT.1": 8,
"FPT_ITT.1.1": 1,
"FPT_PHP.3": 9,
"FPT_PHP.3.1": 1,
"FPT_RPL.1": 2,
"FPT_TDC.1": 1,
"FPT_TRP.1": 2
},
"FRU": {
"FRU_FLT.2": 9,
"FRU_FLT.2.1": 1,
"FRU_RSA.2": 2
},
"FTP": {
"FTP_ITC.1": 4,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1
}
},
"certification_process": {
"OutOfScope": {
"FeliCa OS, and APDU commands, which are processed by the Java Card System. The antenna, which is out of scope of the TOE, provides the RF interface on the smart card. The Java Card System and Java Applets are": 1,
"out of scope": 2
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 10,
"RNG": 3
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 13,
"malfunction": 3
},
"SCA": {
"Leak-Inherent": 13,
"Physical Probing": 2,
"Side-channel": 1,
"physical probing": 4,
"side-channel": 1
}
},
"standard_id": {
"ISO": {
"ISO/IEC 14443": 2,
"ISO/IEC 18092": 2,
"ISO/IEC 7816": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 10
}
},
"DES": {
"DES": {
"DES": 5
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"STMicroelectronics": {
"STM": 7,
"STMicroelectronics": 1
}
},
"vulnerability": {}
},
"st_metadata": null
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": "EAL4+",
"pp_ids": {
"_type": "Set",
"elements": [
"SECURITY_IC_AUGP_V1.0",
"JAVA_OC",
"BAROC_SC_PP_V1.0"
]
},
"pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf",
"pp_name": "Security IC Platform Protection Profile with Augmentation Packages"
}
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2017_44fr.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"EAL5+",
"ALC_DVS.2",
"ASE_TSS.2",
"AVA_VAN.5"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi_cible2017_44en.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "d4e46139cc98e172139fb364cce68cfec2f3a1c9b6d76f4fa568be480714c329",
"txt_hash": "71bae905ffa44e9c6e44f1a022a4dc47a9441f0656e7c8cf72998a615b78670b"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": false,
"pdf_hash": "40c4ae0757e2858b6865fb82295f9887920b544eeb8b415039a0a369ab67f98a",
"txt_hash": "fb448aa87b58656feb6c79e7cbbce9f884f6162452e8d3678020ed93776d1b4f"
}
},
"status": "archived"
}