IDentity Applet v3.4/eIDAS on NXP JCOP 4 P71
CSV information ?
Status | active |
---|---|
Valid from | 28.10.2020 |
Valid until | 28.10.2025 |
Scheme | 🇮🇹 IT |
Manufacturer | ID&Trust Ltd. |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | AVA_VAN.5, ALC_DVS.2, ATE_DPT.2, EAL4+ |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Symmetric Algorithms
AES, DES, 3DESAsymmetric Algorithms
ECDSA, Diffie-HellmanProtocols
PACEOperating System name
JCOP 4, JCOP 3Vendor
NXP, NXP SemiconductorsSecurity level
EAL4+, EAL2, EAL4, EAL6+, EAL6, EAL4 augmented, EAL6 augmentedClaims
O.JSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ADV_COMP.1, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_FLR, ALC_FLR.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_LCD.1, ALC_TAT.1, ALC_COMP.1, ATE_DPT.2, ATE_COV.2, ATE_FUN.1, ATE_IND.2, ATE_COMP.1, ATE_COMP, AVA_VAN.5, AVA_COMP.1, AVA_COMP, ASE_TSS.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ASE_COMP.1Security Functional Requirements (SFR)
FAU_SAS.1, FCS_RND.1, FIA_API.1, FMT_LIM.1, FMT_LIM.2, FPT_EMS.1Protection profiles
BSI-CC-PP-0056-V2-2012, BSI-CC-PP-0068-V2-2011-MA-01, BSI-CC-PP-0086, BSI-CC-PP-0087, BSI-CC-PP-0059-2009-MA-, BSI-CC-PP- 0087Certificates
BSI-DSZ-CC-1040-2019-MA-01, NSCIB-CC-180212-CR2, OCSI/CERT/SYS/08/2016/RCEvaluation facilities
CCLab Software LaboratorySide-channel analysis
side channel, fault injection, JIL-COMPStandards
ISO/IEC 15408, ICAO, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004Technical reports
BSI TR-03105, BSI TR-03117, BSI TR-03110, BSI TR-03110-1, BSI TR-03110-2, BSI TR-03110-3, BSI TR-03110-4File metadata
Title | Certification Report "IDentity Applet v3.4/eIDAS on NXP JCOP 4 P71" |
---|---|
Author | OCSI |
Creation date | D:20201030125144+00'00' |
Modification date | D:20201030125144+00'00' |
Pages | 35 |
Creator | Microsoft Word |
References
Incoming- OCSI/CERT/CCL/11/2022/RC - active - IDentity Applet v3.4-p2/eIDAS on NXP JCOP 4 P71
Security target ?
Extracted keywords
Symmetric Algorithms
AES, AES128, DES, TripleDES, 3DES, TDES, Triple-DES, KMAC, CMACAsymmetric Algorithms
RSA 2048, RSA-CRT, RSA-PSS, ECDH, ECDSA, ECC, DH, Diffie-HellmanHash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512Schemes
MACProtocols
PACERandomness
RNG, RNDLibraries
Crypto Library 296Block cipher modes
CBC, CCMOperating System name
JCOP 4, JCOP4IC data groups
EF.DG15, EF.DG14, EF.SOD, EF.ChipSecurityVendor
NXP, NXP Semiconductors, Infineon Technologies AGSecurity level
EAL4+, EAL4, EAL6+, EAL 6+, EAL 4, EAL 6, EAL4 augmentedClaims
A.CGA, A.SCA, OT.ALARM, OT.CARD-CONFIGURATION, OT.CARD-MANAGEMENT, OT.CIPHER, OT.COMM_AUTH, OT.COMM_CONFIDENTIALITY, OT.COMM_INTEGRITY, OT.DOMAIN-RIGHTS, OT.GLOBAL_ARRAYS_CONFID, OT.IDENTIFICATION, OT.KEY-MNGT, OT.OPERATE, OT.PIN-MNGT, OT.REALLOCATION, OT.RESOURCES, OT.RND, OT.RNG, OT.SCP, OT.SID_MODULE, OT.TRANSACTION, OT.SID, OT.APPLI-AUTH, OT.ATTACK-COUNTER, OT.EXT-MEM, OT.FIREWALL, OT.NATIVE, OT.OBJ-DELETION, OT.RESTRICTED-MODE, OT.SEC_BOX_FW, OT.SENSITIVE_RESULT_INTEG, OE.APPLET, OE.PROCESS_SEC_IC, OE.VERIFICATION, OE.CODE-EVIDENCE, OE.USE_DIAG, OE.USE_KEYS, OE.HID_VAD, OE.VERIFICATION-, OE.KEY-CHANGE, OE.SECURITY-, OSP.VERIFICATION, OSP.PROCESS-TOE, OSP.KEY-CHANGE, OSP.SECURE-BOX, OSP.SECURITY-DOMAINSSecurity Assurance Requirements (SAR)
ADV_SPM.1, ADV_ARC.1, ADV_TDS.3, ADV_FSP.4, ADV_IMP.1, AGD_PRE.1, AGD_OPE.1, ALC_DVS.2, ALC_FLR.1, ALC_DEL.1, ATE_DPT.2, ATE_FUN.1, ATE_DPT.1, AVA_VAN.5, ASE_TSS.2Security Functional Requirements (SFR)
FAU_SAS, FAU_ARP.1, FAU_SAS.1, FCO_NRO.2, FCS_CKM, FCS_COP, FCS_RND, FCS_CKM.1, FCS_COP.1, FCS_COP.1.1, FCS_CKM.1.1, FCS_RNG.1, FCS_CKM.4, FCS_RND.1, FCS_CKM.2, FDP_ACF, FDP_ACC, FDP_RIP, FDP_UCT, FDP_UIT, FDP_SDI, FDP_ACF.1, FDP_ACC.2, FDP_ACC.1, FDP_IFC.1, FDP_IFC.2, FDP_IFF.1, FDP_ITC.2, FDP_RIP.1, FDP_ROL.1, FDP_SDI.2, FDP_UIT.1, FDP_ITC.1, FDP_UCT.1, FDP_SDI.1, FIA_AFL, FIA_API, FIA_UID, FIA_UAU, FIA_API.1, FIA_AFL.1, FIA_ATD.1, FIA_UID.1, FIA_UID.2, FIA_USB.1, FIA_UAU.1, FIA_UAU.4, FIA_UAU.5, FIA_UAU.6, FMT_MTD, FMT_SMF, FMT_SMR.1, FMT_SMR, FMT_MOF, FMT_MSA, FMT_LIM, FMT_MTD.1, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_MTD.3, FMT_SMF.1, FMT_LIM.1, FMT_LIM.2, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MOF.1, FPR_UNO.1, FPT_EMS, FPT_FLS, FPT_TST, FPT_PHP, FPT_FLS.1, FPT_TDC.1, FPT_RCV.3, FPT_PHP.3, FPT_EMS.1, FPT_TST.1, FPT_ITC, FPT_PHP.1, FTP_ITC, FTP_ITC.1, FTP_TRP.1Protection profiles
BSI-CC-PP-0055, BSI-CC-PP-0068-, BSI-CC-PP-0056-, BSI-CC-PP-0087, BSI-CC-PP-0056-V2-2012, BSI-CC-PP-0086, BSI-CC-PP-0059-2009-MA-01, BSI-CC-PP-0068-V2-2011-MA-01, BSI-CC-PP-0086-2015, BSI-CC-PP-0084-2014, BSI-CC-PP-0068-V2-2011Certificates
BSI-DSZ-CC-1040-2019-MA-01, NSCIB-CC-180212-CR2Certification process
out of scope, none common user data EAC2 protected data EAC2 protected data Other terminals than the above are out of scope of this ST. In particular, terminals using Basic 246 Access Control (BAC) may be functionally, 737 • OT.SEC_BOX_FW 738 • OT.SENSITIVE_RESULT_INTEG 739 cannot be mapped because these are out of scope. 740 The objectives for the operational environment can be mapped as follows: 741 Objective fromSide-channel analysis
SPA, DPA, timing attacks, physical tampering, Malfunction, malfunctionCertification process
out of scope, none common user data EAC2 protected data EAC2 protected data Other terminals than the above are out of scope of this ST. In particular, terminals using Basic 246 Access Control (BAC) may be functionally, 737 • OT.SEC_BOX_FW 738 • OT.SENSITIVE_RESULT_INTEG 739 cannot be mapped because these are out of scope. 740 The objectives for the operational environment can be mapped as follows: 741 Objective fromStandards
PKCS#3, ISO/IEC 18013, ISO/IEC 14443, ICAO, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004Technical reports
BSI TR-03117, BSI TR-03110, BSI 582File metadata
Title | IDENTITY APPLET V3.4/EIDAS - SECURITY TARGET |
---|---|
Author | David Lovasz |
Creation date | D:20201019125719+02'00' |
Modification date | D:20201019125719+02'00' |
Pages | 191 |
Creator | Microsoft® Word for Microsoft 365 |
Producer | Microsoft® Word for Microsoft 365 |
Heuristics ?
Extracted SARs
ADV_COMP.1, ALC_LCD.1, ALC_TAT.1, ASE_SPD.1, ATE_COMP.1, ASE_REQ.2, ADV_FSP.4, ALC_COMP.1, ADV_IMP.1, ADV_SPM.1, ASE_INT.1, ALC_DVS.2, ADV_TDS.3, ASE_COMP.1, ASE_CCL.1, ALC_CMC.4, ALC_FLR.1, AGD_OPE.1, ALC_CMS.4, ATE_DPT.2, ASE_TSS.2, ALC_DEL.1, ATE_FUN.1, ADV_ARC.1, ATE_COV.2, AGD_PRE.1, AVA_VAN.5, ATE_IND.2, AVA_COMP.1, ASE_OBJ.2, ASE_ECD.1Scheme data ?
Title | IDentity Applet v3.4/eIDAS on NXP JCOP 4 P71 | |
---|---|---|
Supplier | ID&Trust Ltd. | |
Level | EAL4+ | |
Certification Date | 28 ottobre 2020 | |
Report Link It | https://www.ocsi.gov.it/documenti/certificazioni/idtrust/rc_idapplet34_eidas_v1.1_it.pdf | |
Report Link En | https://www.ocsi.gov.it/documenti/certificazioni/idtrust/cr_idapplet34_eidas_v1.0_en.pdf | |
Target Link | https://www.ocsi.gov.it/documenti/certificazioni/idtrust/st_idapplet34_eidas_v1.02.pdf |
References ?
Updates ?
-
30.09.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'title': 'IDentity Applet v3.4/eIDAS on NXP JCOP 4 P71', 'supplier': ' ID&Trust Ltd.', 'level': ' EAL4+', 'certification_date': ' 28 ottobre\n\t\t\t\t\t\t\t\t\t\t\t2020', 'report_link_it': 'https://www.ocsi.gov.it/documenti/certificazioni/idtrust/rc_idapplet34_eidas_v1.1_it.pdf', 'report_link_en': 'https://www.ocsi.gov.it/documenti/certificazioni/idtrust/cr_idapplet34_eidas_v1.0_en.pdf', 'target_link': 'https://www.ocsi.gov.it/documenti/certificazioni/idtrust/st_idapplet34_eidas_v1.02.pdf'}
.
- The scheme_data property was set to
-
16.09.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'ae34bdcdb84daa6a1d2ce002e5eab4da46a9564f691f4989f88537f230dc3129', 'txt_hash': '6c5b2f3bdb0758a9f26f05327744e6da0a8f6c73d4f7408c53189815366fbbd2'}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 1688422, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 191, '/Title': 'IDENTITY APPLET V3.4/EIDAS - SECURITY TARGET', '/Author': 'David Lovasz', '/Creator': 'Microsoft® Word for Microsoft 365', '/CreationDate': "D:20201019125719+02'00'", '/ModDate': "D:20201019125719+02'00'", '/Producer': 'Microsoft® Word for Microsoft 365', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-1040-2019-MA-01': 1}, 'NL': {'NSCIB-CC-180212-CR2': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0055': 1, 'BSI-CC-PP-0068-': 1, 'BSI-CC-PP-0056-': 2, 'BSI-CC-PP-0087': 3, 'BSI-CC-PP-0056-V2-2012': 1, 'BSI-CC-PP-0086': 1, 'BSI-CC-PP-0059-2009-MA-01': 1, 'BSI-CC-PP-0068-V2-2011-MA-01': 1, 'BSI-CC-PP-0086-2015': 1, 'BSI-CC-PP-0084-2014': 1, 'BSI-CC-PP-0068-V2-2011': 1}}, 'cc_security_level': {'EAL': {'EAL4+': 1, 'EAL4': 18, 'EAL6+': 1, 'EAL 6+': 1, 'EAL 4': 2, 'EAL 6': 2, 'EAL4 augmented': 8}}, 'cc_sar': {'ADV': {'ADV_SPM.1': 1, 'ADV_ARC.1': 5, 'ADV_TDS.3': 4, 'ADV_FSP.4': 2, 'ADV_IMP.1': 2}, 'AGD': {'AGD_PRE.1': 4, 'AGD_OPE.1': 2}, 'ALC': {'ALC_DVS.2': 11, 'ALC_FLR.1': 3, 'ALC_DEL.1': 2}, 'ATE': {'ATE_DPT.2': 12, 'ATE_FUN.1': 2, 'ATE_DPT.1': 1}, 'AVA': {'AVA_VAN.5': 12}, 'ASE': {'ASE_TSS.2': 3}}, 'cc_sfr': {'FAU': {'FAU_SAS': 18, 'FAU_ARP.1': 2, 'FAU_SAS.1': 4}, 'FCO': {'FCO_NRO.2': 1}, 'FCS': {'FCS_CKM': 148, 'FCS_COP': 124, 'FCS_RND': 21, 'FCS_CKM.1': 25, 'FCS_COP.1': 42, 'FCS_COP.1.1': 25, 'FCS_CKM.1.1': 5, 'FCS_RNG.1': 5, 'FCS_CKM.4': 24, 'FCS_RND.1': 3, 'FCS_CKM.2': 10}, 'FDP': {'FDP_ACF': 66, 'FDP_ACC': 56, 'FDP_RIP': 32, 'FDP_UCT': 20, 'FDP_UIT': 20, 'FDP_SDI': 16, 'FDP_ACF.1': 50, 'FDP_ACC.2': 4, 'FDP_ACC.1': 16, 'FDP_IFC.1': 4, 'FDP_IFC.2': 3, 'FDP_IFF.1': 5, 'FDP_ITC.2': 15, 'FDP_RIP.1': 13, 'FDP_ROL.1': 2, 'FDP_SDI.2': 9, 'FDP_UIT.1': 3, 'FDP_ITC.1': 13, 'FDP_UCT.1': 1, 'FDP_SDI.1': 2}, 'FIA': {'FIA_AFL': 54, 'FIA_API': 63, 'FIA_UID': 54, 'FIA_UAU': 158, 'FIA_API.1': 8, 'FIA_AFL.1': 12, 'FIA_ATD.1': 2, 'FIA_UID.1': 19, 'FIA_UID.2': 1, 'FIA_USB.1': 2, 'FIA_UAU.1': 15, 'FIA_UAU.4': 4, 'FIA_UAU.5': 11, 'FIA_UAU.6': 3}, 'FMT': {'FMT_MTD': 256, 'FMT_SMF': 51, 'FMT_SMR.1': 50, 'FMT_SMR': 39, 'FMT_MOF': 9, 'FMT_MSA': 50, 'FMT_LIM': 63, 'FMT_MTD.1': 24, 'FMT_MSA.1': 15, 'FMT_MSA.2': 2, 'FMT_MSA.3': 17, 'FMT_MTD.3': 3, 'FMT_SMF.1': 36, 'FMT_LIM.1': 7, 'FMT_LIM.2': 7, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MOF.1': 1}, 'FPR': {'FPR_UNO.1': 1}, 'FPT': {'FPT_EMS': 39, 'FPT_FLS': 25, 'FPT_TST': 33, 'FPT_PHP': 36, 'FPT_FLS.1': 8, 'FPT_TDC.1': 1, 'FPT_RCV.3': 1, 'FPT_PHP.3': 3, 'FPT_EMS.1': 13, 'FPT_TST.1': 5, 'FPT_ITC': 2, 'FPT_PHP.1': 2}, 'FTP': {'FTP_ITC': 34, 'FTP_ITC.1': 13, 'FTP_TRP.1': 2}}, 'cc_claims': {'A': {'A.CGA': 1, 'A.SCA': 1}, 'OT': {'OT.ALARM': 1, 'OT.CARD-CONFIGURATION': 1, 'OT.CARD-MANAGEMENT': 1, 'OT.CIPHER': 1, 'OT.COMM_AUTH': 2, 'OT.COMM_CONFIDENTIALITY': 1, 'OT.COMM_INTEGRITY': 1, 'OT.DOMAIN-RIGHTS': 1, 'OT.GLOBAL_ARRAYS_CONFID': 1, 'OT.IDENTIFICATION': 1, 'OT.KEY-MNGT': 1, 'OT.OPERATE': 1, 'OT.PIN-MNGT': 1, 'OT.REALLOCATION': 1, 'OT.RESOURCES': 1, 'OT.RND': 1, 'OT.RNG': 1, 'OT.SCP': 3, 'OT.SID_MODULE': 1, 'OT.TRANSACTION': 1, 'OT.SID': 1, 'OT.APPLI-AUTH': 1, 'OT.ATTACK-COUNTER': 1, 'OT.EXT-MEM': 1, 'OT.FIREWALL': 1, 'OT.NATIVE': 1, 'OT.OBJ-DELETION': 1, 'OT.RESTRICTED-MODE': 1, 'OT.SEC_BOX_FW': 1, 'OT.SENSITIVE_RESULT_INTEG': 1}, 'OE': {'OE.APPLET': 1, 'OE.PROCESS_SEC_IC': 1, 'OE.VERIFICATION': 1, 'OE.CODE-EVIDENCE': 1, 'OE.USE_DIAG': 1, 'OE.USE_KEYS': 1, 'OE.HID_VAD': 2, 'OE.VERIFICATION-': 1, 'OE.KEY-CHANGE': 1, 'OE.SECURITY-': 1}, 'OSP': {'OSP.VERIFICATION': 1, 'OSP.PROCESS-TOE': 1, 'OSP.KEY-CHANGE': 1, 'OSP.SECURE-BOX': 1, 'OSP.SECURITY-DOMAINS': 1}}, 'vendor': {'NXP': {'NXP': 6, 'NXP Semiconductors': 2}, 'Infineon': {'Infineon Technologies AG': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 35, 'AES128': 1}}, 'DES': {'DES': {'DES': 1}, '3DES': {'TripleDES': 5, '3DES': 8, 'TDES': 3, 'Triple-DES': 8}}, 'constructions': {'MAC': {'KMAC': 1, 'CMAC': 4}}}, 'asymmetric_crypto': {'RSA': {'RSA 2048': 1, 'RSA-CRT': 3, 'RSA-PSS': 1}, 'ECC': {'ECDH': {'ECDH': 9}, 'ECDSA': {'ECDSA': 7}, 'ECC': {'ECC': 2}}, 'FF': {'DH': {'DH': 7, 'Diffie-Hellman': 13}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 6}, 'SHA2': {'SHA-224': 3, 'SHA-256': 7, 'SHA-384': 2, 'SHA-512': 2}}}, 'crypto_scheme': {'MAC': {'MAC': 8}}, 'crypto_protocol': {'PACE': {'PACE': 185}}, 'randomness': {'RNG': {'RNG': 2, 'RND': 1}}, 'cipher_mode': {'CBC': {'CBC': 3}, 'CCM': {'CCM': 4}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Generic': {'Crypto Library 296': 1}}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'SPA': 1, 'DPA': 1, 'timing attacks': 1}, 'FI': {'physical tampering': 3, 'Malfunction': 1, 'malfunction': 1}}, 'technical_report_id': {'BSI': {'BSI TR-03117': 1, 'BSI TR-03110': 5, 'BSI 582': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {'JCOP': {'JCOP 4': 9, 'JCOP4': 1}}, 'cplc_data': {}, 'ic_data_group': {'EF': {'EF.DG15': 1, 'EF.DG14': 1, 'EF.SOD': 1, 'EF.ChipSecurity': 1}}, 'standard_id': {'PKCS': {'PKCS#3': 2}, 'ISO': {'ISO/IEC 18013': 2, 'ISO/IEC 14443': 2}, 'ICAO': {'ICAO': 15}, 'CC': {'CCMB-2017-04-001': 2, 'CCMB-2017-04-002': 2, 'CCMB-2017-04-003': 2, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 2, 'none common user data EAC2 protected data EAC2 protected data Other terminals than the above are out of scope of this ST. In particular, terminals using Basic 246 Access Control (BAC) may be functionally': 1, '737 • OT.SEC_BOX_FW 738 • OT.SENSITIVE_RESULT_INTEG 739 cannot be mapped because these are out of scope. 740 The objectives for the operational environment can be mapped as follows: 741 Objective from': 1}}}
. - The st_filename property was set to
st_idapplet34_eidas_v1.02.pdf
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}]}
values added.
- The st property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cr_idapplet34_eidas_v1.0_en.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_idapplet34_eidas_v1.02.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '8e251ec432e92214174eae74da0c22abb10119b58b20b0a87230d8b6345334b3', 'txt_hash': 'e67b7a771aa26e0f0ebd1a061732a354ba62d6ae62eda53d54f5ff3980f5fcb6'}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 583739, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 35, '/Title': 'Certification Report "IDentity Applet v3.4/eIDAS on NXP JCOP 4 P71"', '/Author': 'OCSI', '/Creator': 'Microsoft Word', '/CreationDate': "D:20201030125144+00'00'", '/ModDate': "D:20201030125144+00'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
{}
. - The report_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-1040-2019-MA-01': 1}, 'NL': {'NSCIB-CC-180212-CR2': 1}, 'IT': {'OCSI/CERT/SYS/08/2016/RC': 35}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0056-V2-2012': 3, 'BSI-CC-PP-0068-V2-2011-MA-01': 3, 'BSI-CC-PP-0086': 3, 'BSI-CC-PP-0087': 6, 'BSI-CC-PP-0059-2009-MA-': 1, 'BSI-CC-PP- 0087': 1}}, 'cc_security_level': {'EAL': {'EAL4+': 1, 'EAL2': 4, 'EAL4': 11, 'EAL6+': 1, 'EAL6': 2, 'EAL4 augmented': 1, 'EAL6 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.4': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1, 'ADV_COMP.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_DVS.2': 7, 'ALC_FLR': 1, 'ALC_FLR.1': 2, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1, 'ALC_COMP.1': 1}, 'ATE': {'ATE_DPT.2': 7, 'ATE_COV.2': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1, 'ATE_COMP.1': 1, 'ATE_COMP': 1}, 'AVA': {'AVA_VAN.5': 8, 'AVA_COMP.1': 1, 'AVA_COMP': 1}, 'ASE': {'ASE_TSS.2': 2, 'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1, 'ASE_COMP.1': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 1}, 'FCS': {'FCS_RND.1': 1}, 'FIA': {'FIA_API.1': 1}, 'FMT': {'FMT_LIM.1': 1, 'FMT_LIM.2': 1}, 'FPT': {'FPT_EMS.1': 1}}, 'cc_claims': {'O': {'O.J': 1}}, 'vendor': {'NXP': {'NXP': 18, 'NXP Semiconductors': 4}}, 'eval_facility': {'CCLab': {'CCLab Software Laboratory': 5}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 2}}, 'DES': {'DES': {'DES': 1}, '3DES': {'3DES': 2}}}, 'asymmetric_crypto': {'ECC': {'ECDSA': {'ECDSA': 2}}, 'FF': {'DH': {'Diffie-Hellman': 6}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'PACE': {'PACE': 21}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'side channel': 1}, 'FI': {'fault injection': 1}, 'other': {'JIL-COMP': 7}}, 'technical_report_id': {'BSI': {'BSI TR-03105': 2, 'BSI TR-03117': 2, 'BSI TR-03110': 4, 'BSI TR-03110-1': 1, 'BSI TR-03110-2': 1, 'BSI TR-03110-3': 1, 'BSI TR-03110-4': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {'JCOP': {'JCOP 4': 14, 'JCOP 3': 2}}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408': 6}, 'ICAO': {'ICAO': 9}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
None
. - The report_filename property was set to
cr_idapplet34_eidas_v1.0_en.pdf
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
OCSI/CERT/SYS/08/2016/RC
. - The report_references property was updated, with the
{'directly_referenced_by': {'_type': 'Set', 'elements': ['OCSI/CERT/CCL/11/2022/RC']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['OCSI/CERT/CCL/11/2022/RC']}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}]}
values added.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The report_filename property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
None
. - The report_references property was updated, with the
{'directly_referenced_by': None, 'indirectly_referenced_by': None}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}]}
values discarded.
- The report property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name IDentity Applet v3.4/eIDAS on NXP JCOP 4 P71 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "85a46d5f66760cd3",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "OCSI/CERT/SYS/08/2016/RC",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_COMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_COMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_COMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_COMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"3.4"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"OCSI/CERT/CCL/11/2022/RC"
]
},
"directly_referencing": null,
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"OCSI/CERT/CCL/11/2022/RC"
]
},
"indirectly_referencing": null
},
"scheme_data": {
"certification_date": " 28 ottobre\n\t\t\t\t\t\t\t\t\t\t\t2020",
"level": " EAL4+",
"report_link_en": "https://www.ocsi.gov.it/documenti/certificazioni/idtrust/cr_idapplet34_eidas_v1.0_en.pdf",
"report_link_it": "https://www.ocsi.gov.it/documenti/certificazioni/idtrust/rc_idapplet34_eidas_v1.1_it.pdf",
"supplier": " ID\u0026Trust Ltd.",
"target_link": "https://www.ocsi.gov.it/documenti/certificazioni/idtrust/st_idapplet34_eidas_v1.02.pdf",
"title": "IDentity Applet v3.4/eIDAS on NXP JCOP 4 P71"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "ID\u0026Trust Ltd.",
"manufacturer_web": "https://www.idandtrust.com/",
"name": "IDentity Applet v3.4/eIDAS on NXP JCOP 4 P71",
"not_valid_after": "2025-10-28",
"not_valid_before": "2020-10-28",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "cr_idapplet34_eidas_v1.0_en.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDSA": {
"ECDSA": 2
}
},
"FF": {
"DH": {
"Diffie-Hellman": 6
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1040-2019-MA-01": 1
},
"IT": {
"OCSI/CERT/SYS/08/2016/RC": 35
},
"NL": {
"NSCIB-CC-180212-CR2": 1
}
},
"cc_claims": {
"O": {
"O.J": 1
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP- 0087": 1,
"BSI-CC-PP-0056-V2-2012": 3,
"BSI-CC-PP-0059-2009-MA-": 1,
"BSI-CC-PP-0068-V2-2011-MA-01": 3,
"BSI-CC-PP-0086": 3,
"BSI-CC-PP-0087": 6
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_COMP.1": 1,
"ADV_FSP.4": 1,
"ADV_IMP.1": 1,
"ADV_TDS.3": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.4": 1,
"ALC_COMP.1": 1,
"ALC_DEL.1": 1,
"ALC_DVS.2": 7,
"ALC_FLR": 1,
"ALC_FLR.1": 2,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_COMP.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1,
"ASE_TSS.2": 2
},
"ATE": {
"ATE_COMP": 1,
"ATE_COMP.1": 1,
"ATE_COV.2": 1,
"ATE_DPT.2": 7,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_COMP": 1,
"AVA_COMP.1": 1,
"AVA_VAN.5": 8
}
},
"cc_security_level": {
"EAL": {
"EAL2": 4,
"EAL4": 11,
"EAL4 augmented": 1,
"EAL4+": 1,
"EAL6": 2,
"EAL6 augmented": 2,
"EAL6+": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_SAS.1": 1
},
"FCS": {
"FCS_RND.1": 1
},
"FIA": {
"FIA_API.1": 1
},
"FMT": {
"FMT_LIM.1": 1,
"FMT_LIM.2": 1
},
"FPT": {
"FPT_EMS.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PACE": {
"PACE": 21
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"CCLab": {
"CCLab Software Laboratory": 5
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {
"JCOP": {
"JCOP 3": 2,
"JCOP 4": 14
}
},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"fault injection": 1
},
"SCA": {
"side channel": 1
},
"other": {
"JIL-COMP": 7
}
},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1,
"CCMB-2017-04-004": 1
},
"ICAO": {
"ICAO": 9
},
"ISO": {
"ISO/IEC 15408": 6
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 2
}
},
"DES": {
"3DES": {
"3DES": 2
},
"DES": {
"DES": 1
}
}
},
"technical_report_id": {
"BSI": {
"BSI TR-03105": 2,
"BSI TR-03110": 4,
"BSI TR-03110-1": 1,
"BSI TR-03110-2": 1,
"BSI TR-03110-3": 1,
"BSI TR-03110-4": 1,
"BSI TR-03117": 2
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"NXP": {
"NXP": 18,
"NXP Semiconductors": 4
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "OCSI",
"/CreationDate": "D:20201030125144+00\u002700\u0027",
"/Creator": "Microsoft Word",
"/ModDate": "D:20201030125144+00\u002700\u0027",
"/Title": "Certification Report \"IDentity Applet v3.4/eIDAS on NXP JCOP 4 P71\"",
"pdf_file_size_bytes": 583739,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 35
},
"st_filename": "st_idapplet34_eidas_v1.02.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 2
},
"ECDH": {
"ECDH": 9
},
"ECDSA": {
"ECDSA": 7
}
},
"FF": {
"DH": {
"DH": 7,
"Diffie-Hellman": 13
}
},
"RSA": {
"RSA 2048": 1,
"RSA-CRT": 3,
"RSA-PSS": 1
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1040-2019-MA-01": 1
},
"NL": {
"NSCIB-CC-180212-CR2": 1
}
},
"cc_claims": {
"A": {
"A.CGA": 1,
"A.SCA": 1
},
"OE": {
"OE.APPLET": 1,
"OE.CODE-EVIDENCE": 1,
"OE.HID_VAD": 2,
"OE.KEY-CHANGE": 1,
"OE.PROCESS_SEC_IC": 1,
"OE.SECURITY-": 1,
"OE.USE_DIAG": 1,
"OE.USE_KEYS": 1,
"OE.VERIFICATION": 1,
"OE.VERIFICATION-": 1
},
"OSP": {
"OSP.KEY-CHANGE": 1,
"OSP.PROCESS-TOE": 1,
"OSP.SECURE-BOX": 1,
"OSP.SECURITY-DOMAINS": 1,
"OSP.VERIFICATION": 1
},
"OT": {
"OT.ALARM": 1,
"OT.APPLI-AUTH": 1,
"OT.ATTACK-COUNTER": 1,
"OT.CARD-CONFIGURATION": 1,
"OT.CARD-MANAGEMENT": 1,
"OT.CIPHER": 1,
"OT.COMM_AUTH": 2,
"OT.COMM_CONFIDENTIALITY": 1,
"OT.COMM_INTEGRITY": 1,
"OT.DOMAIN-RIGHTS": 1,
"OT.EXT-MEM": 1,
"OT.FIREWALL": 1,
"OT.GLOBAL_ARRAYS_CONFID": 1,
"OT.IDENTIFICATION": 1,
"OT.KEY-MNGT": 1,
"OT.NATIVE": 1,
"OT.OBJ-DELETION": 1,
"OT.OPERATE": 1,
"OT.PIN-MNGT": 1,
"OT.REALLOCATION": 1,
"OT.RESOURCES": 1,
"OT.RESTRICTED-MODE": 1,
"OT.RND": 1,
"OT.RNG": 1,
"OT.SCP": 3,
"OT.SEC_BOX_FW": 1,
"OT.SENSITIVE_RESULT_INTEG": 1,
"OT.SID": 1,
"OT.SID_MODULE": 1,
"OT.TRANSACTION": 1
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0055": 1,
"BSI-CC-PP-0056-": 2,
"BSI-CC-PP-0056-V2-2012": 1,
"BSI-CC-PP-0059-2009-MA-01": 1,
"BSI-CC-PP-0068-": 1,
"BSI-CC-PP-0068-V2-2011": 1,
"BSI-CC-PP-0068-V2-2011-MA-01": 1,
"BSI-CC-PP-0084-2014": 1,
"BSI-CC-PP-0086": 1,
"BSI-CC-PP-0086-2015": 1,
"BSI-CC-PP-0087": 3
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 5,
"ADV_FSP.4": 2,
"ADV_IMP.1": 2,
"ADV_SPM.1": 1,
"ADV_TDS.3": 4
},
"AGD": {
"AGD_OPE.1": 2,
"AGD_PRE.1": 4
},
"ALC": {
"ALC_DEL.1": 2,
"ALC_DVS.2": 11,
"ALC_FLR.1": 3
},
"ASE": {
"ASE_TSS.2": 3
},
"ATE": {
"ATE_DPT.1": 1,
"ATE_DPT.2": 12,
"ATE_FUN.1": 2
},
"AVA": {
"AVA_VAN.5": 12
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 2,
"EAL 6": 2,
"EAL 6+": 1,
"EAL4": 18,
"EAL4 augmented": 8,
"EAL4+": 1,
"EAL6+": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP.1": 2,
"FAU_SAS": 18,
"FAU_SAS.1": 4
},
"FCO": {
"FCO_NRO.2": 1
},
"FCS": {
"FCS_CKM": 148,
"FCS_CKM.1": 25,
"FCS_CKM.1.1": 5,
"FCS_CKM.2": 10,
"FCS_CKM.4": 24,
"FCS_COP": 124,
"FCS_COP.1": 42,
"FCS_COP.1.1": 25,
"FCS_RND": 21,
"FCS_RND.1": 3,
"FCS_RNG.1": 5
},
"FDP": {
"FDP_ACC": 56,
"FDP_ACC.1": 16,
"FDP_ACC.2": 4,
"FDP_ACF": 66,
"FDP_ACF.1": 50,
"FDP_IFC.1": 4,
"FDP_IFC.2": 3,
"FDP_IFF.1": 5,
"FDP_ITC.1": 13,
"FDP_ITC.2": 15,
"FDP_RIP": 32,
"FDP_RIP.1": 13,
"FDP_ROL.1": 2,
"FDP_SDI": 16,
"FDP_SDI.1": 2,
"FDP_SDI.2": 9,
"FDP_UCT": 20,
"FDP_UCT.1": 1,
"FDP_UIT": 20,
"FDP_UIT.1": 3
},
"FIA": {
"FIA_AFL": 54,
"FIA_AFL.1": 12,
"FIA_API": 63,
"FIA_API.1": 8,
"FIA_ATD.1": 2,
"FIA_UAU": 158,
"FIA_UAU.1": 15,
"FIA_UAU.4": 4,
"FIA_UAU.5": 11,
"FIA_UAU.6": 3,
"FIA_UID": 54,
"FIA_UID.1": 19,
"FIA_UID.2": 1,
"FIA_USB.1": 2
},
"FMT": {
"FMT_LIM": 63,
"FMT_LIM.1": 7,
"FMT_LIM.2": 7,
"FMT_MOF": 9,
"FMT_MOF.1": 1,
"FMT_MSA": 50,
"FMT_MSA.1": 15,
"FMT_MSA.2": 2,
"FMT_MSA.3": 17,
"FMT_MTD": 256,
"FMT_MTD.1": 24,
"FMT_MTD.3": 3,
"FMT_SMF": 51,
"FMT_SMF.1": 36,
"FMT_SMR": 39,
"FMT_SMR.1": 50,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPR": {
"FPR_UNO.1": 1
},
"FPT": {
"FPT_EMS": 39,
"FPT_EMS.1": 13,
"FPT_FLS": 25,
"FPT_FLS.1": 8,
"FPT_ITC": 2,
"FPT_PHP": 36,
"FPT_PHP.1": 2,
"FPT_PHP.3": 3,
"FPT_RCV.3": 1,
"FPT_TDC.1": 1,
"FPT_TST": 33,
"FPT_TST.1": 5
},
"FTP": {
"FTP_ITC": 34,
"FTP_ITC.1": 13,
"FTP_TRP.1": 2
}
},
"certification_process": {
"OutOfScope": {
"737 \u2022 OT.SEC_BOX_FW 738 \u2022 OT.SENSITIVE_RESULT_INTEG 739 cannot be mapped because these are out of scope. 740 The objectives for the operational environment can be mapped as follows: 741 Objective from": 1,
"none common user data EAC2 protected data EAC2 protected data Other terminals than the above are out of scope of this ST. In particular, terminals using Basic 246 Access Control (BAC) may be functionally": 1,
"out of scope": 2
}
},
"cipher_mode": {
"CBC": {
"CBC": 3
},
"CCM": {
"CCM": 4
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"Generic": {
"Crypto Library 296": 1
}
},
"crypto_protocol": {
"PACE": {
"PACE": 185
}
},
"crypto_scheme": {
"MAC": {
"MAC": 8
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 6
},
"SHA2": {
"SHA-224": 3,
"SHA-256": 7,
"SHA-384": 2,
"SHA-512": 2
}
}
},
"ic_data_group": {
"EF": {
"EF.ChipSecurity": 1,
"EF.DG14": 1,
"EF.DG15": 1,
"EF.SOD": 1
}
},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {
"JCOP": {
"JCOP 4": 9,
"JCOP4": 1
}
},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 1,
"RNG": 2
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 1,
"malfunction": 1,
"physical tampering": 3
},
"SCA": {
"DPA": 1,
"SPA": 1,
"timing attacks": 1
}
},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 2,
"CCMB-2017-04-002": 2,
"CCMB-2017-04-003": 2,
"CCMB-2017-04-004": 1
},
"ICAO": {
"ICAO": 15
},
"ISO": {
"ISO/IEC 14443": 2,
"ISO/IEC 18013": 2
},
"PKCS": {
"PKCS#3": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 35,
"AES128": 1
}
},
"DES": {
"3DES": {
"3DES": 8,
"TDES": 3,
"Triple-DES": 8,
"TripleDES": 5
},
"DES": {
"DES": 1
}
},
"constructions": {
"MAC": {
"CMAC": 4,
"KMAC": 1
}
}
},
"technical_report_id": {
"BSI": {
"BSI 582": 1,
"BSI TR-03110": 5,
"BSI TR-03117": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon Technologies AG": 1
},
"NXP": {
"NXP": 6,
"NXP Semiconductors": 2
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "David Lovasz",
"/CreationDate": "D:20201019125719+02\u002700\u0027",
"/Creator": "Microsoft\u00ae Word for Microsoft 365",
"/ModDate": "D:20201019125719+02\u002700\u0027",
"/Producer": "Microsoft\u00ae Word for Microsoft 365",
"/Title": "IDENTITY APPLET V3.4/EIDAS - SECURITY TARGET",
"pdf_file_size_bytes": 1688422,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 191
}
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": null,
"pp_ids": null,
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0087b_pdf.pdf",
"pp_name": "Machine-Readable Electronic Documents based on BSI TR-03110 for Official Use"
},
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": null,
"pp_ids": null,
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0086b_pdf.pdf",
"pp_name": "Electronic Document implementing Extended Access Control Version 2 defined in BSI TR-03110"
},
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": null,
"pp_ids": null,
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056_V2b_pdf.pdf",
"pp_name": "Machine Readable Travel Document with ICAO Application Extended Access Control with PACE, Version 1.3"
},
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": null,
"pp_ids": null,
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf",
"pp_name": "Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Version..."
},
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": null,
"pp_ids": null,
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0068_V2b_pdf.pdf",
"pp_name": "Machine Readable Travel Document using Standard Inspection Procedure with PACE (PACE_PP)"
}
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cr_idapplet34_eidas_v1.0_en.pdf",
"scheme": "IT",
"security_level": {
"_type": "Set",
"elements": [
"ALC_DVS.2",
"EAL4+",
"AVA_VAN.5",
"ATE_DPT.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_idapplet34_eidas_v1.02.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "8e251ec432e92214174eae74da0c22abb10119b58b20b0a87230d8b6345334b3",
"txt_hash": "e67b7a771aa26e0f0ebd1a061732a354ba62d6ae62eda53d54f5ff3980f5fcb6"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "ae34bdcdb84daa6a1d2ce002e5eab4da46a9564f691f4989f88537f230dc3129",
"txt_hash": "6c5b2f3bdb0758a9f26f05327744e6da0a8f6c73d4f7408c53189815366fbbd2"
}
},
"status": "active"
}