MultiApp Essential v1.1 Platform with Full, Light, XLight_T1 and XLight_NB configurations

CSV information ?

Status active
Valid from 18.06.2021
Valid until 18.06.2026
Scheme 🇪🇸 ES
Manufacturer THALES DIS FRANCE SA
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level AVA_VAN.5, ALC_DVS.2, EAL5+
Protection profiles

Heuristics summary ?

Certificate ID: 2020-33-INF-3550

Certificate ?

Extracted keywords

Claims
O.E
Security Assurance Requirements (SAR)
ALC_DVS.2, AVA_VAN
Evaluation facilities
Applus Laboratories

File metadata

Pages 2

Certification report ?

Extracted keywords

Symmetric Algorithms
AES, DES, 3DES
Asymmetric Algorithms
RSA 1024, RSA 2048, DH
Hash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
Randomness
PRNG
Block cipher modes
ECB, CBC

JavaCard versions
Java Card 3.0.4, JavaCard 3.0.4
Vendor
Gemalto, Thales, Microsoft

Security level
EAL5, EAL 1, EAL 4, EAL 2, EAL2, ITSEC Evaluation
Claims
R.C
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_IMP.1, ADV_TDS.4, AGD_OPE.1, AGD_PRE, AGD_OPE, ALC_DVS.2, ALC_CMC.4, ALC_DEL.1, ALC_FLR.1, ALC_TAT.2, ALC_FLR, ATE_COV.2, ATE_FUN.1, AVA_VAN.5, ASE_CCL.1, ASE_INT.1, ASE_REQ.2
Security Functional Requirements (SFR)
FAU_ARP.1, FCO_NRO, FCS_CKM.1, FCS_CKM, FCS_CKM.4, FCS_COP, FCS_RND.1, FDP_ACC, FDP_ACF, FDP_IFC, FDP_IFF, FDP_RIP, FDP_ROL, FDP_SDI.2, FDP_ITC, FDP_UIT, FIA_ATD, FIA_UID, FIA_USB, FIA_UAU, FMT_MSA, FMT_SMR, FMT_SMF, FMT_MTD, FPR_UNO.1, FPR_UNO, FPT_TDC.1, FPT_FLS, FPT_RCV, FPT_TST, FPT_PHP, FPT_ITT, FTP_ITC
Certificates
2020-33-INF-3550- v1
Evaluation facilities
Applus Laboratories

Certification process
out of scope, These applications could be removed based on customer needs and they are out of scope of the evaluation, v1.1 & Server v1.1. (These applications could be removed based on customer needs and they are out of scope of the evaluation). Additionally, other applets – not determined at the moment of the present

Standards
SCP03

File metadata

Pages 15

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES, TDEA, 3DES, TDES, CMAC
Asymmetric Algorithms
ECC, DH, Diffie-Hellman
Hash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA224
Schemes
MAC, Key agreement
Randomness
PRNG, RNG, RND
Block cipher modes
ECB, CBC

JavaCard versions
JavaCard 3.0.4, Java Card 3.0.4, GlobalPlatform 2.2.1
JavaCard API constants
TYPE_ACCESS
CPLC
IC Fabricator, IC Type
Vendor
Gemalto, Thales, Microsoft

Security level
EAL 5+, EAL5+, EAL5, EAL5 augmented
Claims
D.APP_CODE, D.APP_C_DATA, D.APP_I_DATA, D.PIN, D.API_DATA, D.CRYPTO, D.JCS_CODE, D.JCS_DATA, D.SEC_DATA, O.SID, O.FIREWALL, O.GLOBAL_ARRAYS_CONFID, O.GLOBAL_ARRAYS_INTEG, O.NATIVE, O.OPERATE, O.REALLOCATION, O.RESOURCES, O.ALARM, O.CIPHER, O.KEY-MNGT, O.PIN-MNGT, O.TRANSACTION, O.OBJ-DELETION, O.DELETION, O.LOAD, O.INSTALL, O.SCP, O.CARD-MANAGEMENT, O.RND, O.KEY_MNGT, O.CARD_MANAGEMENT, O.PIN-, O.APPLET, O.CODE_PKG, O.JAVAOBJECT, O.CODE_PCKG, T.CONFID-APPLI-DATA, T.CONFID-JCS-CODE, T.CONFID-JCS-DATA, T.INTEG-APPLI-CODE, T.INTEG-APPLI-DATA, T.INTEG-JCS-CODE, T.INTEG-JCS-DATA, T.SID, T.EXE-CODE, T.NATIVE, T.RESOURCES, T.DELETION, T.INSTALL, T.OBJ-DELETION, T.PHYSICAL, A.APPLET, A.VERIFICATION, R.JAVA, OP.ARRAY_ACCESS, OP.CREATE, OP.DELETE_APPLET, OP.DELETE_PCKG, OP.DELETE_PCKG_APPLET, OP.INSTANCE_FIELD, OP.INVK_VIRTUAL, OP.INVK_INTERFACE, OP.JAVA, OP.THROW, OP.TYPE_ACCESS, OP.PUT, OE.VERIFICATION, OE.APPLET, OE.CODE-EVIDENCE, OE.CARD-MANAGEMENT, OE.SCP, OSP.VERIFICATION, OSP.RND
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_FSP.5, ADV_TDS.1, ADV_TDS.4, ADV_IMP.1, ADV_TDS.3, ADV_INT.2, ADV_FSP.2, ADV_FSP.4, ADV_ARC, ADV_FSP, ADV_IMP, ADV_TDS, AGD_PRE, AGD_OPE, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_TAT.1, ALC_TAT.2, ALC_CMC.4, ALC_DVS.1, ALC_LCD.1, ALC_DEL.1, ATE_COV.2, ATE_FUN.1, ATE_COV.1, ATE_IND.2, ATE_DPT.1, ATE_DPT.3, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_REQ.1, ASE_REQ.2, ASE_INT.1, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_ARP.1, FAU_ARP.1.1, FAU_SAA.1, FAU_SAS.1, FCO_NRO, FCO_NRO.2, FCS_RND, FCS_COP.1, FCS_CKM.1, FCS_RND.1, FCS_RND.1.1, FCS_CKM.1.1, FCS_CKM.2, FCS_CKM.2.1, FCS_CKM.3, FCS_CKM.3.1, FCS_CKM.4, FCS_CKM.4.1, FCS_COP.1.1, FCS_CKM, FCS_COP, FCS_RNG, FDP_ACC, FDP_ACC.2, FDP_ACF, FDP_ACF.1, FDP_IFC, FDP_IFC.1, FDP_IFF, FDP_IFF.1, FDP_RIP, FDP_RIP.1, FDP_ROL, FDP_ROL.1, FDP_SDI.2, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ITC, FDP_ITC.2, FDP_IFC.2, FDP_UIT, FDP_UIT.1, FDP_ACC.1, FDP_ITC.1, FDP_SDC.1, FDP_SDI, FDP_ITT.1, FIA_SOS.2, FIA_ATD, FIA_ATD.1, FIA_UID, FIA_UID.2, FIA_USB, FIA_USB.1, FIA_UAU.1, FIA_UAU, FIA_UID.1, FIA_API.1, FMT_MSA, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_SMR, FMT_SMR.1, FMT_SMF, FMT_SMF.1, FMT_MTD, FMT_MTD.1, FMT_MTD.3, FMT_LIM.1, FMT_LIM.2, FMT_LIM, FPR_UNO.1, FPR_UNO.1.1, FPR_UNO, FPT_FLS, FPT_FLS.1, FPT_TDC.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_RCV, FPT_RCV.3, FPT_TST, FPT_TST.1, FPT_PHP, FPT_PHP.3, FPT_RCV.4, FPT_ITT, FPT_ITT.1, FRU_FLT.2, FTP_ITC, FTP_ITC.1, FTP_TRP.1
Protection profiles
BSI-CC-PP-0084-
Certificates
ANSSI-CC-2018/51, CC-1, CC-2, CC-3

Side-channel analysis
Leak-Inherent, physical probing, DPA, physical tampering, malfunction, Malfunction, fault induction
Certification process
out of scope, These applications could be removed based on customer needs and they are out of scope of the evaluation, Client v1.1 & Server v1.1 (These applications could be removed based on customer needs and they are out of scope of the evaluation). Additionally, other applets – not determined at the moment of the present, a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are

Standards
FIPS180-4, FIPS PUB 180-4, FIPS197, PKCS#1, PKCS#5, AIS31, ISO/IEC 18033-3, SCP03, SCP01, SCP02, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004

File metadata

Pages 100

References

Outgoing
  • ANSSI-CC-2018/51 - active - CENTAURUS_FB_04 (Référence : CENTAURUS_TOE_v4) (ANSSI-CC-2018/51-R02)

Heuristics ?

Certificate ID: 2020-33-INF-3550

Extracted SARs

ASE_CCL.1, ALC_DEL.1, ADV_FSP.5, ALC_CMC.4, ALC_DVS.2, AVA_VAN.5, ATE_FUN.1, ATE_IND.2, ALC_TAT.2, ASE_TSS.1, ADV_ARC.1, ASE_SPD.1, ASE_REQ.2, ADV_INT.2, ADV_IMP.1, ADV_TDS.4, ATE_COV.2, AGD_OPE.1, ASE_ECD.1, ASE_INT.1, AGD_PRE.1, ALC_LCD.1, ATE_DPT.3, ALC_FLR.1, ASE_OBJ.2

Scheme data ?

Product MultiApp Essential v1.1 Platform with Full, Light, XLight_T1 and XLight_NB configurations
Product Link https://oc.ccn.cni.es/en/certified-products/certified-products/697-multiapp-essential-v1-1-platform-with-full-light-xlight-t1-and-xlight-nb-configurations
Category Smart Cards and similiar devices
Manufacturer THALES
Certification Date 18.06.2021
Enhanced
Description The MultiApp Essential V1.1 Platform is a smart card operating system (IC and OS) that complies with two major industry standards: Sun Java Card 3.0.4, which consists of the Java Card 3.0.4 Virtual Machine [JCVM304], the Java Card 3.0.4 Runtime Environment [JCRE304] and the Java Card 3.0.4 Application Programming Interface [JCAPI304]. The Global Platform Card Specification version 2.2.1 [GP221]. It is intended to host a set of Java Card applications and provides cryptographic services for symmetric (3DES, AES), asymmetric (RSA) and hash (SHA) operations, Moreover, it also provides random number generation and integrity check features. The TOE allows the loading of applets before or after the issuance of the card, but the Issuer can forbid this operation to be carried out. The TOE has four possible configurations: Full Configuration. Light Configuration. XLight_T1 Configuration. XLight_NB Configuration. The details about the features of each configuration are described in [ST LITE], chapter 2.4 (TOE Description).
Category Smart Cards and similiar devices
Manufacturer THALES
Type Product
Evaluation Facility Applus Laboratories
Status Certified
Certification Date 18.06.2021
Cc Version Common Criteria 3.1 release 5
Level EAL5 + ALC_DVS.2 + AVA_VAN.5
Target Link https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1242
Cert Link https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1214
Report Link https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1215

References ?

Updates ?

  • 09.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'certification_date': '2021-06-18'} data.
  • 17.10.2024 The certificate data changed.
    Certificate changed

    The Protection Profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Java Cardâ„¢ System Protection Profile Open Configuration, Version 3.0', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/ANSSI-CC-profil_PP-2010-03en.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['JCSPPC', 'ANSSI-CC-PP-2001-03-M01', 'ANSSI-CC-PP-2010-03']}}]}.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'da7c85c73a6aad60295a9d8744610a72f01fe2ae28cd4ed8afde648e276eb173', 'txt_hash': 'e2e92bbf93d5adad4dd48834d5b3e80ce7921c0ef25dfa78a8c30650338d9647'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_garbage': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '1652e149d265cef4a4ccde319b8298cb757c5bdddaf97b9c98b5fa3c6a0a05e8', 'txt_hash': 'a8cb3f776841355a87f158d9da943df3752d03016522414771c9b53f71c4a31b'} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 1421244, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 100, '/Title': '', '/CreationDate': '', '/Producer': '', '/ModDate': '', '/Creator': '', '/Trapped': '', '/Keywords': '', '/Author': '', '/Subject': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 746775, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 2, '/Title': '', '/CreationDate': '', '/Producer': '', '/ModDate': '', '/Trapped': '', '/Creator': '', '/Keywords': '', '/Author': '', '/Subject': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2018/51': 1}, 'NL': {'CC-1': 2, 'CC-2': 7, 'CC-3': 4}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-': 1}}, 'cc_security_level': {'EAL': {'EAL 5+': 2, 'EAL5+': 1, 'EAL5': 6, 'EAL5 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 7, 'ADV_FSP.1': 3, 'ADV_FSP.5': 5, 'ADV_TDS.1': 2, 'ADV_TDS.4': 7, 'ADV_IMP.1': 7, 'ADV_TDS.3': 4, 'ADV_INT.2': 1, 'ADV_FSP.2': 2, 'ADV_FSP.4': 2, 'ADV_ARC': 2, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_PRE': 2, 'AGD_OPE': 2, 'AGD_OPE.1': 7, 'AGD_PRE.1': 6}, 'ALC': {'ALC_DVS.2': 7, 'ALC_TAT.1': 2, 'ALC_TAT.2': 3, 'ALC_CMC.4': 1, 'ALC_DVS.1': 2, 'ALC_LCD.1': 3, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.2': 2, 'ATE_FUN.1': 6, 'ATE_COV.1': 2, 'ATE_IND.2': 1, 'ATE_DPT.1': 2, 'ATE_DPT.3': 1}, 'AVA': {'AVA_VAN.5': 7}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 4, 'ASE_REQ.1': 2, 'ASE_REQ.2': 2, 'ASE_INT.1': 2, 'ASE_OBJ.2': 2, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 13, 'FAU_ARP.1.1': 1, 'FAU_SAA.1': 2, 'FAU_SAS.1': 1}, 'FCO': {'FCO_NRO': 5, 'FCO_NRO.2': 3}, 'FCS': {'FCS_RND': 8, 'FCS_COP.1': 7, 'FCS_CKM.1': 20, 'FCS_RND.1': 10, 'FCS_RND.1.1': 2, 'FCS_CKM.1.1': 1, 'FCS_CKM.2': 5, 'FCS_CKM.2.1': 1, 'FCS_CKM.3': 1, 'FCS_CKM.3.1': 1, 'FCS_CKM.4': 46, 'FCS_CKM.4.1': 1, 'FCS_COP.1.1': 1, 'FCS_CKM': 68, 'FCS_COP': 32, 'FCS_RNG': 1}, 'FDP': {'FDP_ACC': 36, 'FDP_ACC.2': 6, 'FDP_ACF': 30, 'FDP_ACF.1': 17, 'FDP_IFC': 22, 'FDP_IFC.1': 13, 'FDP_IFF': 12, 'FDP_IFF.1': 12, 'FDP_RIP': 69, 'FDP_RIP.1': 10, 'FDP_ROL': 12, 'FDP_ROL.1': 2, 'FDP_SDI.2': 7, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_ITC': 11, 'FDP_ITC.2': 23, 'FDP_IFC.2': 2, 'FDP_UIT': 6, 'FDP_UIT.1': 3, 'FDP_ACC.1': 14, 'FDP_ITC.1': 18, 'FDP_SDC.1': 1, 'FDP_SDI': 3, 'FDP_ITT.1': 1}, 'FIA': {'FIA_SOS.2': 1, 'FIA_ATD': 6, 'FIA_ATD.1': 2, 'FIA_UID': 12, 'FIA_UID.2': 1, 'FIA_USB': 6, 'FIA_USB.1': 3, 'FIA_UAU.1': 3, 'FIA_UAU': 6, 'FIA_UID.1': 10, 'FIA_API.1': 1}, 'FMT': {'FMT_MSA': 83, 'FMT_MSA.1': 12, 'FMT_MSA.2': 1, 'FMT_MSA.3': 16, 'FMT_SMR': 39, 'FMT_SMR.1': 25, 'FMT_SMF': 30, 'FMT_SMF.1': 13, 'FMT_MTD': 16, 'FMT_MTD.1': 3, 'FMT_MTD.3': 1, 'FMT_LIM.1': 1, 'FMT_LIM.2': 1, 'FMT_LIM': 2}, 'FPR': {'FPR_UNO.1': 8, 'FPR_UNO.1.1': 1, 'FPR_UNO': 5}, 'FPT': {'FPT_FLS': 42, 'FPT_FLS.1': 8, 'FPT_TDC.1': 7, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 1, 'FPT_RCV': 13, 'FPT_RCV.3': 4, 'FPT_TST': 5, 'FPT_TST.1': 3, 'FPT_PHP': 6, 'FPT_PHP.3': 2, 'FPT_RCV.4': 1, 'FPT_ITT': 5, 'FPT_ITT.1': 2}, 'FRU': {'FRU_FLT.2': 1}, 'FTP': {'FTP_ITC': 8, 'FTP_ITC.1': 5, 'FTP_TRP.1': 3}}, 'cc_claims': {'D': {'D.APP_CODE': 6, 'D.APP_C_DATA': 3, 'D.APP_I_DATA': 4, 'D.PIN': 4, 'D.API_DATA': 3, 'D.CRYPTO': 5, 'D.JCS_CODE': 3, 'D.JCS_DATA': 5, 'D.SEC_DATA': 7}, 'O': {'O.SID': 14, 'O.FIREWALL': 12, 'O.GLOBAL_ARRAYS_CONFID': 10, 'O.GLOBAL_ARRAYS_INTEG': 5, 'O.NATIVE': 12, 'O.OPERATE': 15, 'O.REALLOCATION': 5, 'O.RESOURCES': 10, 'O.ALARM': 16, 'O.CIPHER': 11, 'O.KEY-MNGT': 6, 'O.PIN-MNGT': 5, 'O.TRANSACTION': 6, 'O.OBJ-DELETION': 4, 'O.DELETION': 9, 'O.LOAD': 7, 'O.INSTALL': 12, 'O.SCP': 35, 'O.CARD-MANAGEMENT': 3, 'O.RND': 14, 'O.KEY_MNGT': 5, 'O.CARD_MANAGEMENT': 18, 'O.PIN-': 1, 'O.APPLET': 28, 'O.CODE_PKG': 7, 'O.JAVAOBJECT': 57, 'O.CODE_PCKG': 16}, 'T': {'T.CONFID-APPLI-DATA': 4, 'T.CONFID-JCS-CODE': 4, 'T.CONFID-JCS-DATA': 4, 'T.INTEG-APPLI-CODE': 7, 'T.INTEG-APPLI-DATA': 8, 'T.INTEG-JCS-CODE': 3, 'T.INTEG-JCS-DATA': 4, 'T.SID': 8, 'T.EXE-CODE': 8, 'T.NATIVE': 4, 'T.RESOURCES': 3, 'T.DELETION': 3, 'T.INSTALL': 4, 'T.OBJ-DELETION': 4, 'T.PHYSICAL': 4}, 'A': {'A.APPLET': 5, 'A.VERIFICATION': 4}, 'R': {'R.JAVA': 9}, 'OP': {'OP.ARRAY_ACCESS': 6, 'OP.CREATE': 10, 'OP.DELETE_APPLET': 6, 'OP.DELETE_PCKG': 4, 'OP.DELETE_PCKG_APPLET': 4, 'OP.INSTANCE_FIELD': 6, 'OP.INVK_VIRTUAL': 8, 'OP.INVK_INTERFACE': 10, 'OP.JAVA': 8, 'OP.THROW': 7, 'OP.TYPE_ACCESS': 7, 'OP.PUT': 7}, 'OE': {'OE.VERIFICATION': 26, 'OE.APPLET': 4, 'OE.CODE-EVIDENCE': 10, 'OE.CARD-MANAGEMENT': 1, 'OE.SCP': 3}, 'OSP': {'OSP.VERIFICATION': 4, 'OSP.RND': 4}}, 'vendor': {'Gemalto': {'Gemalto': 11}, 'Thales': {'Thales': 133}, 'Microsoft': {'Microsoft': 4}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 15}}, 'DES': {'DES': {'DES': 17}, '3DES': {'TDEA': 1, '3DES': 2, 'TDES': 8}}, 'constructions': {'MAC': {'CMAC': 1}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 1}}, 'FF': {'DH': {'DH': 10, 'Diffie-Hellman': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 5}, 'SHA2': {'SHA-224': 2, 'SHA-256': 4, 'SHA-384': 4, 'SHA-512': 3, 'SHA224': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 7}, 'KA': {'Key agreement': 1}}, 'crypto_protocol': {}, 'randomness': {'PRNG': {'PRNG': 1}, 'RNG': {'RNG': 4, 'RND': 18}}, 'cipher_mode': {'ECB': {'ECB': 1}, 'CBC': {'CBC': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 3, 'physical probing': 2, 'DPA': 1}, 'FI': {'physical tampering': 1, 'malfunction': 2, 'Malfunction': 3, 'fault induction': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {'ICFab': {'IC Fabricator': 1}, 'ICType': {'IC Type': 1}}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS180-4': 1, 'FIPS PUB 180-4': 1, 'FIPS197': 3}, 'PKCS': {'PKCS#1': 8, 'PKCS#5': 3}, 'BSI': {'AIS31': 1}, 'ISO': {'ISO/IEC 18033-3': 1}, 'SCP': {'SCP03': 3, 'SCP01': 4, 'SCP02': 3}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {'JavaCard': {'JavaCard 3.0.4': 1, 'Java Card 3.0.4': 4}, 'GlobalPlatform': {'GlobalPlatform 2.2.1': 1}}, 'javacard_api_const': {'misc': {'TYPE_ACCESS': 7}}, 'javacard_packages': {'javacard': {'javacard.framework': 2}}, 'certification_process': {'OutOfScope': {'out of scope': 2, 'These applications could be removed based on customer needs and they are out of scope of the evaluation': 1, 'Client v1.1 & Server v1.1 (These applications could be removed based on customer needs and they are out of scope of the evaluation). Additionally, other applets – not determined at the moment of the present': 1, 'a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are': 1}}}.
    • The cert_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {}, 'cc_sar': {'ALC': {'ALC_DVS.2': 1}, 'AVA': {'AVA_VAN': 1}}, 'cc_sfr': {}, 'cc_claims': {'O': {'O.E': 1}}, 'vendor': {}, 'eval_facility': {'Applus': {'Applus Laboratories': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to 2020-33 ST_lite.pdf.
    • The cert_filename property was set to 2020-33 CCRA.pdf.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2018/51']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2018/51']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2020-33%20INF-3550.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2020-33%20ST_lite.pdf.

    The state of the certificate object was updated.

    • The cert property was updated, with the {'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The cert_metadata property was set to None.
    • The cert_keywords property was set to None.
    • The cert_filename property was set to None.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}]} values discarded.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name MultiApp Essential v1.1 Platform with Full, Light, XLight_T1 and XLight_NB configurations was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2020-33%20CCRA.pdf",
  "dgst": "8ba234174b5f18cb",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "2020-33-INF-3550",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.1"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "category": "Smart Cards and similiar devices",
      "certification_date": "2021-06-18",
      "enhanced": {
        "category": "Smart Cards and similiar devices",
        "cc_version": "Common Criteria 3.1 release 5",
        "cert_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=1214",
        "certification_date": "2021-06-18",
        "description": "The MultiApp Essential V1.1 Platform is a smart card operating system (IC and OS) that complies with two major industry standards: Sun Java Card 3.0.4, which consists of the Java Card 3.0.4 Virtual Machine [JCVM304], the Java Card 3.0.4 Runtime Environment [JCRE304] and the Java Card 3.0.4 Application Programming Interface [JCAPI304]. The Global Platform Card Specification version 2.2.1 [GP221]. It is intended to host a set of Java Card applications and provides cryptographic services for symmetric (3DES, AES), asymmetric (RSA) and hash (SHA) operations, Moreover, it also provides random number generation and integrity check features. The TOE allows the loading of applets before or after the issuance of the card, but the Issuer can forbid this operation to be carried out. The TOE has four possible configurations: Full Configuration. Light Configuration. XLight_T1 Configuration. XLight_NB Configuration. The details about the features of each configuration are described in [ST LITE], chapter 2.4 (TOE Description).",
        "evaluation_facility": "Applus Laboratories",
        "level": "EAL5 + ALC_DVS.2 + AVA_VAN.5",
        "manufacturer": "THALES",
        "report_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=1215",
        "status": "Certified",
        "target_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=1242",
        "type": "Product"
      },
      "manufacturer": "THALES",
      "product": "MultiApp Essential v1.1 Platform with Full, Light, XLight_T1 and XLight_NB configurations",
      "product_link": "https://oc.ccn.cni.es/en/certified-products/certified-products/697-multiapp-essential-v1-1-platform-with-full-light-xlight-t1-and-xlight-nb-configurations"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2018/51"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2018/51"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "THALES DIS FRANCE SA",
  "manufacturer_web": "https://www.thalesgroup.com/en/europe/france",
  "name": "MultiApp Essential v1.1 Platform with Full, Light, XLight_T1 and XLight_NB configurations",
  "not_valid_after": "2026-06-18",
  "not_valid_before": "2021-06-18",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "2020-33 CCRA.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "O": {
          "O.E": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_DVS.2": 1
        },
        "AVA": {
          "AVA_VAN": 1
        }
      },
      "cc_security_level": {},
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Applus": {
          "Applus Laboratories": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "",
      "/CreationDate": "",
      "/Creator": "",
      "/Keywords": "",
      "/ModDate": "",
      "/Producer": "",
      "/Subject": "",
      "/Title": "",
      "/Trapped": "",
      "pdf_file_size_bytes": 746775,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 2
    },
    "report_filename": "2020-33 INF-3550.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {
        "FF": {
          "DH": {
            "DH": 1
          }
        },
        "RSA": {
          "RSA 1024": 1,
          "RSA 2048": 1
        }
      },
      "cc_cert_id": {
        "ES": {
          "2020-33-INF-3550- v1": 1
        }
      },
      "cc_claims": {
        "R": {
          "R.C": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_IMP.1": 1,
          "ADV_TDS.4": 1
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 1,
          "AGD_PRE": 1
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.2": 3,
          "ALC_FLR": 3,
          "ALC_FLR.1": 1,
          "ALC_TAT.2": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_INT.1": 1,
          "ASE_REQ.2": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_FUN.1": 1
        },
        "AVA": {
          "AVA_VAN.5": 4
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 2": 1,
          "EAL 4": 2,
          "EAL2": 1,
          "EAL5": 3
        },
        "ITSEC": {
          "ITSEC Evaluation": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 1
        },
        "FCO": {
          "FCO_NRO": 1
        },
        "FCS": {
          "FCS_CKM": 10,
          "FCS_CKM.1": 4,
          "FCS_CKM.4": 1,
          "FCS_COP": 6,
          "FCS_RND.1": 1
        },
        "FDP": {
          "FDP_ACC": 3,
          "FDP_ACF": 3,
          "FDP_IFC": 2,
          "FDP_IFF": 2,
          "FDP_ITC": 1,
          "FDP_RIP": 8,
          "FDP_ROL": 1,
          "FDP_SDI.2": 1,
          "FDP_UIT": 1
        },
        "FIA": {
          "FIA_ATD": 1,
          "FIA_UAU": 1,
          "FIA_UID": 2,
          "FIA_USB": 1
        },
        "FMT": {
          "FMT_MSA": 11,
          "FMT_MTD": 2,
          "FMT_SMF": 3,
          "FMT_SMR": 4
        },
        "FPR": {
          "FPR_UNO": 1,
          "FPR_UNO.1": 1
        },
        "FPT": {
          "FPT_FLS": 4,
          "FPT_ITT": 1,
          "FPT_PHP": 1,
          "FPT_RCV": 2,
          "FPT_TDC.1": 1,
          "FPT_TST": 1
        },
        "FTP": {
          "FTP_ITC": 1
        }
      },
      "certification_process": {
        "OutOfScope": {
          "These applications could be removed based on customer needs and they are out of scope of the evaluation": 1,
          "out of scope": 1,
          "v1.1 \u0026 Server v1.1. (These applications could be removed based on customer needs and they are out of scope of the evaluation).  Additionally, other applets \u2013 not determined at the moment of the present": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 1
        },
        "ECB": {
          "ECB": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Applus": {
          "Applus Laboratories": 5
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 3
          },
          "SHA2": {
            "SHA-224": 2,
            "SHA-256": 1,
            "SHA-384": 1,
            "SHA-512": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {
        "JavaCard": {
          "Java Card 3.0.4": 4,
          "JavaCard 3.0.4": 1
        }
      },
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "PRNG": 1
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "SCP": {
          "SCP03": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 2
          }
        },
        "DES": {
          "3DES": {
            "3DES": 2
          },
          "DES": {
            "DES": 5
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Gemalto": {
          "Gemalto": 2
        },
        "Microsoft": {
          "Microsoft": 1
        },
        "Thales": {
          "Thales": 1
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "",
      "/CreationDate": "",
      "/Creator": "",
      "/Keywords": "",
      "/ModDate": "",
      "/Producer": "",
      "/Subject": "",
      "/Title": "",
      "/Trapped": "",
      "pdf_file_size_bytes": 894199,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.sogis.eu/",
          "http://www.commoncriteriaportal.org/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 15
    },
    "st_filename": "2020-33 ST_lite.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 1
          }
        },
        "FF": {
          "DH": {
            "DH": 10,
            "Diffie-Hellman": 1
          }
        }
      },
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2018/51": 1
        },
        "NL": {
          "CC-1": 2,
          "CC-2": 7,
          "CC-3": 4
        }
      },
      "cc_claims": {
        "A": {
          "A.APPLET": 5,
          "A.VERIFICATION": 4
        },
        "D": {
          "D.API_DATA": 3,
          "D.APP_CODE": 6,
          "D.APP_C_DATA": 3,
          "D.APP_I_DATA": 4,
          "D.CRYPTO": 5,
          "D.JCS_CODE": 3,
          "D.JCS_DATA": 5,
          "D.PIN": 4,
          "D.SEC_DATA": 7
        },
        "O": {
          "O.ALARM": 16,
          "O.APPLET": 28,
          "O.CARD-MANAGEMENT": 3,
          "O.CARD_MANAGEMENT": 18,
          "O.CIPHER": 11,
          "O.CODE_PCKG": 16,
          "O.CODE_PKG": 7,
          "O.DELETION": 9,
          "O.FIREWALL": 12,
          "O.GLOBAL_ARRAYS_CONFID": 10,
          "O.GLOBAL_ARRAYS_INTEG": 5,
          "O.INSTALL": 12,
          "O.JAVAOBJECT": 57,
          "O.KEY-MNGT": 6,
          "O.KEY_MNGT": 5,
          "O.LOAD": 7,
          "O.NATIVE": 12,
          "O.OBJ-DELETION": 4,
          "O.OPERATE": 15,
          "O.PIN-": 1,
          "O.PIN-MNGT": 5,
          "O.REALLOCATION": 5,
          "O.RESOURCES": 10,
          "O.RND": 14,
          "O.SCP": 35,
          "O.SID": 14,
          "O.TRANSACTION": 6
        },
        "OE": {
          "OE.APPLET": 4,
          "OE.CARD-MANAGEMENT": 1,
          "OE.CODE-EVIDENCE": 10,
          "OE.SCP": 3,
          "OE.VERIFICATION": 26
        },
        "OP": {
          "OP.ARRAY_ACCESS": 6,
          "OP.CREATE": 10,
          "OP.DELETE_APPLET": 6,
          "OP.DELETE_PCKG": 4,
          "OP.DELETE_PCKG_APPLET": 4,
          "OP.INSTANCE_FIELD": 6,
          "OP.INVK_INTERFACE": 10,
          "OP.INVK_VIRTUAL": 8,
          "OP.JAVA": 8,
          "OP.PUT": 7,
          "OP.THROW": 7,
          "OP.TYPE_ACCESS": 7
        },
        "OSP": {
          "OSP.RND": 4,
          "OSP.VERIFICATION": 4
        },
        "R": {
          "R.JAVA": 9
        },
        "T": {
          "T.CONFID-APPLI-DATA": 4,
          "T.CONFID-JCS-CODE": 4,
          "T.CONFID-JCS-DATA": 4,
          "T.DELETION": 3,
          "T.EXE-CODE": 8,
          "T.INSTALL": 4,
          "T.INTEG-APPLI-CODE": 7,
          "T.INTEG-APPLI-DATA": 8,
          "T.INTEG-JCS-CODE": 3,
          "T.INTEG-JCS-DATA": 4,
          "T.NATIVE": 4,
          "T.OBJ-DELETION": 4,
          "T.PHYSICAL": 4,
          "T.RESOURCES": 3,
          "T.SID": 8
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0084-": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 2,
          "ADV_ARC.1": 7,
          "ADV_FSP": 1,
          "ADV_FSP.1": 3,
          "ADV_FSP.2": 2,
          "ADV_FSP.4": 2,
          "ADV_FSP.5": 5,
          "ADV_IMP": 1,
          "ADV_IMP.1": 7,
          "ADV_INT.2": 1,
          "ADV_TDS": 1,
          "ADV_TDS.1": 2,
          "ADV_TDS.3": 4,
          "ADV_TDS.4": 7
        },
        "AGD": {
          "AGD_OPE": 2,
          "AGD_OPE.1": 7,
          "AGD_PRE": 2,
          "AGD_PRE.1": 6
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 2,
          "ALC_DVS.2": 7,
          "ALC_LCD.1": 3,
          "ALC_TAT.1": 2,
          "ALC_TAT.2": 3
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 4,
          "ASE_INT.1": 2,
          "ASE_OBJ.2": 2,
          "ASE_REQ.1": 2,
          "ASE_REQ.2": 2,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.1": 2,
          "ATE_COV.2": 2,
          "ATE_DPT.1": 2,
          "ATE_DPT.3": 1,
          "ATE_FUN.1": 6,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 7
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 5+": 2,
          "EAL5": 6,
          "EAL5 augmented": 2,
          "EAL5+": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 13,
          "FAU_ARP.1.1": 1,
          "FAU_SAA.1": 2,
          "FAU_SAS.1": 1
        },
        "FCO": {
          "FCO_NRO": 5,
          "FCO_NRO.2": 3
        },
        "FCS": {
          "FCS_CKM": 68,
          "FCS_CKM.1": 20,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 5,
          "FCS_CKM.2.1": 1,
          "FCS_CKM.3": 1,
          "FCS_CKM.3.1": 1,
          "FCS_CKM.4": 46,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 32,
          "FCS_COP.1": 7,
          "FCS_COP.1.1": 1,
          "FCS_RND": 8,
          "FCS_RND.1": 10,
          "FCS_RND.1.1": 2,
          "FCS_RNG": 1
        },
        "FDP": {
          "FDP_ACC": 36,
          "FDP_ACC.1": 14,
          "FDP_ACC.2": 6,
          "FDP_ACF": 30,
          "FDP_ACF.1": 17,
          "FDP_IFC": 22,
          "FDP_IFC.1": 13,
          "FDP_IFC.2": 2,
          "FDP_IFF": 12,
          "FDP_IFF.1": 12,
          "FDP_ITC": 11,
          "FDP_ITC.1": 18,
          "FDP_ITC.2": 23,
          "FDP_ITT.1": 1,
          "FDP_RIP": 69,
          "FDP_RIP.1": 10,
          "FDP_ROL": 12,
          "FDP_ROL.1": 2,
          "FDP_SDC.1": 1,
          "FDP_SDI": 3,
          "FDP_SDI.2": 7,
          "FDP_SDI.2.1": 1,
          "FDP_SDI.2.2": 1,
          "FDP_UIT": 6,
          "FDP_UIT.1": 3
        },
        "FIA": {
          "FIA_API.1": 1,
          "FIA_ATD": 6,
          "FIA_ATD.1": 2,
          "FIA_SOS.2": 1,
          "FIA_UAU": 6,
          "FIA_UAU.1": 3,
          "FIA_UID": 12,
          "FIA_UID.1": 10,
          "FIA_UID.2": 1,
          "FIA_USB": 6,
          "FIA_USB.1": 3
        },
        "FMT": {
          "FMT_LIM": 2,
          "FMT_LIM.1": 1,
          "FMT_LIM.2": 1,
          "FMT_MSA": 83,
          "FMT_MSA.1": 12,
          "FMT_MSA.2": 1,
          "FMT_MSA.3": 16,
          "FMT_MTD": 16,
          "FMT_MTD.1": 3,
          "FMT_MTD.3": 1,
          "FMT_SMF": 30,
          "FMT_SMF.1": 13,
          "FMT_SMR": 39,
          "FMT_SMR.1": 25
        },
        "FPR": {
          "FPR_UNO": 5,
          "FPR_UNO.1": 8,
          "FPR_UNO.1.1": 1
        },
        "FPT": {
          "FPT_FLS": 42,
          "FPT_FLS.1": 8,
          "FPT_ITT": 5,
          "FPT_ITT.1": 2,
          "FPT_PHP": 6,
          "FPT_PHP.3": 2,
          "FPT_RCV": 13,
          "FPT_RCV.3": 4,
          "FPT_RCV.4": 1,
          "FPT_TDC.1": 7,
          "FPT_TDC.1.1": 1,
          "FPT_TDC.1.2": 1,
          "FPT_TST": 5,
          "FPT_TST.1": 3
        },
        "FRU": {
          "FRU_FLT.2": 1
        },
        "FTP": {
          "FTP_ITC": 8,
          "FTP_ITC.1": 5,
          "FTP_TRP.1": 3
        }
      },
      "certification_process": {
        "OutOfScope": {
          "Client v1.1 \u0026 Server v1.1 (These applications could be removed based on customer needs and they are out of scope of the evaluation).  Additionally, other applets \u2013 not determined at the moment of the present": 1,
          "These applications could be removed based on customer needs and they are out of scope of the evaluation": 1,
          "a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are": 1,
          "out of scope": 2
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 1
        },
        "ECB": {
          "ECB": 1
        }
      },
      "cplc_data": {
        "ICFab": {
          "IC Fabricator": 1
        },
        "ICType": {
          "IC Type": 1
        }
      },
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "KA": {
          "Key agreement": 1
        },
        "MAC": {
          "MAC": 7
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 5
          },
          "SHA2": {
            "SHA-224": 2,
            "SHA-256": 4,
            "SHA-384": 4,
            "SHA-512": 3,
            "SHA224": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {
        "misc": {
          "TYPE_ACCESS": 7
        }
      },
      "javacard_packages": {
        "javacard": {
          "javacard.framework": 2
        }
      },
      "javacard_version": {
        "GlobalPlatform": {
          "GlobalPlatform 2.2.1": 1
        },
        "JavaCard": {
          "Java Card 3.0.4": 4,
          "JavaCard 3.0.4": 1
        }
      },
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "PRNG": 1
        },
        "RNG": {
          "RND": 18,
          "RNG": 4
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 3,
          "fault induction": 2,
          "malfunction": 2,
          "physical tampering": 1
        },
        "SCA": {
          "DPA": 1,
          "Leak-Inherent": 3,
          "physical probing": 2
        }
      },
      "standard_id": {
        "BSI": {
          "AIS31": 1
        },
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1,
          "CCMB-2017-04-004": 1
        },
        "FIPS": {
          "FIPS PUB 180-4": 1,
          "FIPS180-4": 1,
          "FIPS197": 3
        },
        "ISO": {
          "ISO/IEC 18033-3": 1
        },
        "PKCS": {
          "PKCS#1": 8,
          "PKCS#5": 3
        },
        "SCP": {
          "SCP01": 4,
          "SCP02": 3,
          "SCP03": 3
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 15
          }
        },
        "DES": {
          "3DES": {
            "3DES": 2,
            "TDEA": 1,
            "TDES": 8
          },
          "DES": {
            "DES": 17
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Gemalto": {
          "Gemalto": 11
        },
        "Microsoft": {
          "Microsoft": 4
        },
        "Thales": {
          "Thales": 133
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "",
      "/CreationDate": "",
      "/Creator": "",
      "/Keywords": "",
      "/ModDate": "",
      "/Producer": "",
      "/Subject": "",
      "/Title": "",
      "/Trapped": "",
      "pdf_file_size_bytes": 1421244,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 100
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": "EAL4+",
        "pp_ids": {
          "_type": "Set",
          "elements": [
            "ANSSI-CC-PP-2001-03-M01",
            "ANSSI-CC-PP-2010-03",
            "JCSPPC"
          ]
        },
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/ANSSI-CC-profil_PP-2010-03en.pdf",
        "pp_name": "Java Card\u2122 System Protection Profile Open Configuration, Version 3.0"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2020-33%20INF-3550.pdf",
  "scheme": "ES",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL5+",
      "ALC_DVS.2",
      "AVA_VAN.5"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2020-33%20ST_lite.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": true,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "1652e149d265cef4a4ccde319b8298cb757c5bdddaf97b9c98b5fa3c6a0a05e8",
      "txt_hash": "a8cb3f776841355a87f158d9da943df3752d03016522414771c9b53f71c4a31b"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "6413feffa6230d89252c8c5a1ddf03fbc0faa9cf29abca8ab1b2a8fce1cd85a7",
      "txt_hash": "5d5536a8c4db06ab13153a06dfff86ea439d2759914c891e39e14bc9d5f593d5"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "da7c85c73a6aad60295a9d8744610a72f01fe2ae28cd4ed8afde648e276eb173",
      "txt_hash": "e2e92bbf93d5adad4dd48834d5b3e80ce7921c0ef25dfa78a8c30650338d9647"
    }
  },
  "status": "active"
}