Feitian FT-JCOS V5.0

CSV information ?

Status archived
Valid from 17.09.2018
Valid until 17.09.2023
Scheme 🇳🇴 NO
Manufacturer Feitian Technologies Co., Ltd.
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level ALC_DVS.2, AVA_VAN.5, EAL5+

Heuristics summary ?

Certificate ID: SERTIT-116

Certificate ?

Extracted keywords

Libraries
NSS

Vendor
Feitian Technologies

Security level
EAL 2, EAL 4
Security Assurance Requirements (SAR)
ALC_FLR, AVA_VAN.5
Certificates
SERTIT-116
Evaluation facilities
Brightsight

File metadata

Pages 1

Certification report ?

Extracted keywords

Symmetric Algorithms
AES, DES

JavaCard versions
Java Card 2.3, Java Card 3.0.4, GlobalPlatform 3.0.4
Vendor
Infineon, Feitian, Feitian Technologies, Feitian Technologies Co

Security level
EAL5+, EAL 2, EAL 4, EAL1, EAL7, EAL 5
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, ADV_COMP.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR, ALC_DVS.2, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.2, ALC_COMP.1, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, ATE_COMP.1, ATE_IND, AVA_VAN.5, AVA_COMP.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.2, ASE_SPD.1, ASE_OBJ.2, ASE_TSS.1, ASE_COMP.1
Security Functional Requirements (SFR)
FCS_RNG.1
Certificates
SERTIT-116
Evaluation facilities
Brightsight

Side-channel analysis
JIL

Standards
ISO/IEC 15408, ISO/IEC 7816, ISO/IEC 14443, SCP02, CCMB-2017-04-004

File metadata

Title tittel
Keywords ugradert
Author [email protected]
Creation date D:20180917114319Z00'00'
Modification date D:20180917114319Z00'00'
Pages 21
Creator Microsoft® Word 2013
Producer Mac OS X 10.13.6 Quartz PDFContext

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES, TDES, 3DES, Triple-DES, TDEA, CMAC
Hash functions
SHA-1, SHA256, SHA-256
Schemes
MAC, Key exchange
Randomness
TRNG, RND, RNG
Block cipher modes
CBC, CTR, CCM

JavaCard versions
Java Card 3.0.4
JavaCard API constants
TYPE_ACCESS
Vendor
Infineon, Infineon Technologies AG, Feitian Technologies Co, Feitian Technologies

Security level
EAL5+, EAL 5, EAL5, EAL 5 augmented, EAL5 augmented
Claims
D.APP_CODE, D.APP_C_DATA, D.APP_I_DATA, D.API_DATA, D.CRYPTO, D.JCS_CODE, D.JCS_DATA, D.SEC_DATA, D.JCS_KEYS, D.SEC_ATTRIBUTES, D.CM_APDU, O.CARD-, O.IC_SUPPORT, O.RECOVERY, O.OS_SUPPORT, O.COMMUNICATION, O.RND, O.REMOTE, O.DELETION, O.PIN-MNGT, O.SID, O.FIREWALL, O.GLOBAL_ARRAYS_CONFID, O.GLOBAL_ARRAYS_INTEG, O.NATIVE, O.OPERATE, O.REALLOCATION, O.RESOURCES, O.ALARM, O.CIPHER, O.KEY-MNGT, O.TRANSACTION, O.LOAD, O.INSTALL, O.CARD-MANAGEMENT, O.APPLET, O.CODE_PKG, O.JAVAOBJECT, O.PACKAGE, O.GLOBAL, O.KEY-, O.OS, T.DELETION, T.CONFID-APPLI-DATA, T.CONFID-JCS-CODE, T.CONFID-JCS-DATA, T.INTEG-APPLI-CODE, T.INTEG-APPLI-DATA, T.INTEG-JCS-CODE, T.INTEG-JCS-DATA, T.SID, T.EXE-CODE, T.NATIVE, T.RESOURCES, T.INSTALL, T.COMMUNICATION, T.LEAKAGE, T.FAULT, T.RND, T.PHYSICAL, T.CONFID-APPLI-, T.INTEG-APPLI-, T.INTEG-, T.EXE-, T.INTEG-JCS-, T.CONFID-, A.DELETION, A.APPLET, A.VERIFICATION, R.JAVA, OP.ARRAY_ACCESS, OP.CREATE, OP.LOAD_PCKG, OP.GP, OP.INSTANCE_FIELD, OP.INVK_VIRTUAL, OP.INVK_INTERFACE, OP.JAVA, OP.THROW, OP.TYPE_ACCESS, OP.PUT, OE.CARD-MANAGEMENT, OE.SCP, OE.CODE-EVIDENCE, OE.APPLET, OE.VERIFICATION, OE.CODE-, OSP.VERIFICATION
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_TDS.1, ADV_FSP.4, ADV_TDS.3, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, ADV_FSP.5, ADV_FSP.2, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_TAT.1, ALC_TAT.2, ALC_CMC.4, ALC_CMS.1, ALC_DVS.1, ALC_CMS.4, ALC_CMS.5, ALC_DEL.1, ALC_LCD.1, ATE_COV.2, ATE_FUN.1, ATE_COV.1, ATE_DPT.1, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1, ASE_REQ.2, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_ARP.1, FAU_ARP.1.1, FAU_SAA.1, FCO_NRO, FCO_NRO.2, FCS_COP.1, FCS_RNG, FCS_COP, FCS_CKM.1, FCS_CKM.1.1, FCS_CKM.2, FCS_CKM.2.1, FCS_CKM.3, FCS_CKM.3.1, FCS_CKM.4, FCS_CKM.4.1, FCS_RNG.1, FCS_RNG.1.1, FCS_RNG.1.2, FDP_ACC, FDP_ACF, FDP_RIP, FDP_ACC.2, FDP_ACF.1, FDP_IFC, FDP_IFC.1, FDP_IFF, FDP_IFF.1, FDP_RIP.1, FDP_ROL.1, FDP_ROL, FDP_SDI.2, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ITC, FDP_ITC.2, FDP_IFC.2, FDP_UIT, FDP_UIT.1, FDP_ACC.1, FDP_ITC.1, FDP_SDI.1, FDP_ITT.1, FIA_ATD, FIA_ATD.1, FIA_UID, FIA_UID.2, FIA_USB, FIA_USB.1, FIA_UID.1, FMT_MSA, FMT_SMR, FMT_SMF, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD, FMT_MTD.1, FMT_MTD.3, FPR_UNO.1, FPR_UNO.1.1, FPT_FLS, FPT_FLS.1, FPT_FLS.1.1, FPT_TDC.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_RCV, FPT_RCV.3, FPT_RCV.4, FPT_TST.1, FPT_PHP.3, FPT_ITT.1, FRU_FLT.2, FTP_ITC, FTP_ITC.1, FTP_TRP.1
Protection profiles
BSI-PP-0084
Certificates
BSI-DSZ-CC-0964-V3-2017, BSI-DSZ-CC-0964-
Certification process
out of scope, com 11 FT-JCOS V5.0 Security Target Phase 2 covers the Secure IC Development of Infineon and is out of scope of the TOE evaluation as that is part of the IC platform evaluation. In Phase 3, the Chip, a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.RECOVERY and O.OS_SUPPORT are

Side-channel analysis
Leak-Inherent, physical probing, DPA, SPA, timing attacks, physical tampering, malfunction, Malfunction
Certification process
out of scope, com 11 FT-JCOS V5.0 Security Target Phase 2 covers the Secure IC Development of Infineon and is out of scope of the TOE evaluation as that is part of the IC platform evaluation. In Phase 3, the Chip, a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.RECOVERY and O.OS_SUPPORT are

Standards
FIPS197, FIPS140, FIPS180-4, FIPS PUB 140-2, FIPS PUB 197, FIPS PUB 180-4, AIS20, AIS36, ISO/IEC 9796-2, ISO/IEC 18013, ICAO, SCP02

File metadata

Creation date D:20180811160413+08'00'
Pages 89
Creator LaTeX with hyperref package
Producer MiKTeX-xdvipdfmx (0.7.8)

References

Outgoing
  • BSI-DSZ-CC-0964-V3-2017 - archived - Infineon Technologies Security Controller M7794 A12 / G12 with optional RSA2048/4096 v1.02.013 or v2.00.002, EC v1.02.013 or v2.00.002 and Toolbox v1.02.013 or v2.00.002 libraries and with specific IC-dedicated software

Heuristics ?

Certificate ID: SERTIT-116

Extracted SARs

ATE_COMP.1, ASE_ECD.1, AVA_VAN.5, ALC_DEL.1, ALC_TAT.2, AGD_PRE.1, ADV_IMP.1, ADV_TDS.4, ALC_LCD.1, ATE_FUN.1, ASE_REQ.2, ASE_CCL.1, ALC_CMS.5, ASE_OBJ.2, ATE_COV.2, ADV_ARC.1, ALC_DVS.2, ATE_IND.2, ALC_COMP.1, ATE_DPT.1, ASE_SPD.1, ADV_FSP.5, ADV_COMP.1, AVA_COMP.1, AGD_OPE.1, ADV_INT.2, ALC_CMC.4, ASE_INT.1, ASE_COMP.1, ASE_TSS.1

Scheme data ?

Product FT-JCOS V5.0
Url https://sertit.no/certified-products/product-archive/ft-jcos-v5-0
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Developer Feitian Technologies Co., Ltd.
Certification Date 17.09.2018
Enhanced
Description The TOE is an open Java Card Platforms (JCP), that is, smart cards or similar devices enabled with JavaCard technology that support post-issuance downloading of applications.The purpose of the TOE is to provide a limited Java Card environment for a single applet, specifically for e-passport and similar applications such as eID and driving license.The TOE is composed of a Smart Card Platform (SCP) and an embedded software (JCS + non-TSF parts). The JCP is compliant with Java Card Specification v3.0.4 and GlobalPlatform Specification v.2.3. The TOE allows for the loading of the customer applets, but after loading the single applet the platform must be closed to prevent further loading of applets after issuance of the card to the end user. To support this functionality, the TOE provides a closing mechanism with specific guidance. The applet should have been previously verified by an off-card trusted IT component. The JCP is managed by Card Manager that is a part of the TOE. The Card Manager(ISD) is a pre-issuance applet. The JCP is fully compliant with the Java Card Specification v3.0.4 excluding the optional part JCRMI which is not implemented by the TOE. The SCP is a certified hardware platform – the SLE77CLFX2400PM with specific IC dedicated software (firmware). The hardware platform is certified by the BSI under the certification ID: BSI-DSZ-CC-0964-V3-2017 . Not all functionality of the hardware is used by the composite TOE. Therefore some parts of the IC platform are not part of the composite TOEto ensure that the developed applet has sufficient ability to counter attacks.
Id SERTIT-116
Mutual Recognition CCRA, SOG-IS
Product V5.0.9
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Sponsor Feitian Technologies Co., Ltd.
Developer Feitian Technologies Co., Ltd.
Evaluation Facility Brightsight B.V.
Certification Date 17.09.2018
Level EAL 5, ALC_DVS.2, AVA_VAN.5
Documents frozendict({'cert': [frozendict({'href': 'https://sertit.no/getfile.php/135382-1607954033/SERTIT/Sertifikater/2018/116/20180917SERTIT-116%20C.pdf'})], 'target': [frozendict({'href': 'https://sertit.no/getfile.php/135385-1607954035/SERTIT/Sertifikater/2018/116/%5B09895%5D%5BSERTIT-116%5D%5BST%5D%5Bv1.0.8%5D%20FTJCOS%20v5.0%20Security%20Target.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/135379-1607954030/SERTIT/Sertifikater/2018/116/20180917%20Sertit-116%20CR%20Feitian%20v10.pdf'})]})

References ?

Updates ?

  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'a0cca3dc49d536376c3a8cbc35c14b7dcd56d220cf9daeaf5a0602083c81909a', 'txt_hash': '058213dd3d2acaada34005ad9ab040167a22de3c05063a03c5289d8ee35787fb'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'e714a2c03da88035b23edddce15f888fdd34a72e96ba694237ffc96a4ef6ae49', 'txt_hash': '39e575bcb51bf4e0c72e9226b46320f67645c95199e2eefa6f315fe558d6b70d'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_garbage': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '4e4772f19252d78714540656a807928a407ed8c495a9a45815261a46f4e8ed86', 'txt_hash': '60b7f498db2f2b295b3c531b80161aa58d3e9cbd226677ee4fef9d699d2045b2'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 1156984, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 21, '/Title': 'tittel', '/Author': '[email protected]', '/Producer': 'Mac OS X 10.13.6 Quartz PDFContext', '/Creator': 'Microsoft® Word 2013', '/CreationDate': "D:20180917114319Z00'00'", '/ModDate': "D:20180917114319Z00'00'", '/Keywords': 'ugradert', '/AAPL:Keywords': "['ugradert']", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 1189588, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 89, '/Creator': 'LaTeX with hyperref package', '/Producer': 'MiKTeX-xdvipdfmx (0.7.8)', '/CreationDate': "D:20180811160413+08'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 744305, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {}.
    • The report_keywords property was set to {'cc_cert_id': {'NO': {'SERTIT-116': 20}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL5+': 22, 'EAL 2': 1, 'EAL 4': 1, 'EAL1': 1, 'EAL7': 1, 'EAL 5': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.5': 1, 'ADV_IMP.1': 1, 'ADV_INT.2': 1, 'ADV_TDS.4': 1, 'ADV_COMP.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR': 1, 'ALC_DVS.2': 5, 'ALC_CMC.4': 1, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.2': 1, 'ALC_COMP.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.3': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1, 'ATE_COMP.1': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.5': 4, 'AVA_COMP.1': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_OBJ.2': 1, 'ASE_TSS.1': 1, 'ASE_COMP.1': 1}}, 'cc_sfr': {'FCS': {'FCS_RNG.1': 4}}, 'cc_claims': {}, 'vendor': {'Infineon': {'Infineon': 1}, 'Feitian': {'Feitian': 1, 'Feitian Technologies': 2, 'Feitian Technologies Co': 1}}, 'eval_facility': {'BrightSight': {'Brightsight': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}}, 'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'other': {'JIL': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408': 8, 'ISO/IEC 7816': 2, 'ISO/IEC 14443': 2}, 'SCP': {'SCP02': 2}, 'CC': {'CCMB-2017-04-004': 1}}, 'javacard_version': {'JavaCard': {'Java Card 2.3': 1, 'Java Card 3.0.4': 4}, 'GlobalPlatform': {'GlobalPlatform 3.0.4': 1}}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0964-V3-2017': 3, 'BSI-DSZ-CC-0964-': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0084': 1}}, 'cc_security_level': {'EAL': {'EAL5+': 1, 'EAL 5': 1, 'EAL5': 6, 'EAL 5 augmented': 1, 'EAL5 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 6, 'ADV_FSP.1': 4, 'ADV_TDS.1': 2, 'ADV_FSP.4': 2, 'ADV_TDS.3': 10, 'ADV_IMP.1': 9, 'ADV_INT.2': 1, 'ADV_TDS.4': 1, 'ADV_FSP.5': 7, 'ADV_FSP.2': 2, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE.1': 10, 'AGD_PRE.1': 6}, 'ALC': {'ALC_DVS.2': 7, 'ALC_TAT.1': 1, 'ALC_TAT.2': 2, 'ALC_CMC.4': 1, 'ALC_CMS.1': 1, 'ALC_DVS.1': 2, 'ALC_CMS.4': 1, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1}, 'ATE': {'ATE_COV.2': 3, 'ATE_FUN.1': 6, 'ATE_COV.1': 2, 'ATE_DPT.1': 2}, 'AVA': {'AVA_VAN.5': 7}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 4, 'ASE_INT.1': 5, 'ASE_REQ.1': 2, 'ASE_REQ.2': 2, 'ASE_OBJ.2': 3, 'ASE_SPD.1': 2, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 21, 'FAU_ARP.1.1': 1, 'FAU_SAA.1': 3}, 'FCO': {'FCO_NRO': 6, 'FCO_NRO.2': 5}, 'FCS': {'FCS_COP.1': 21, 'FCS_RNG': 5, 'FCS_COP': 7, 'FCS_CKM.1': 10, 'FCS_CKM.1.1': 1, 'FCS_CKM.2': 9, 'FCS_CKM.2.1': 1, 'FCS_CKM.3': 8, 'FCS_CKM.3.1': 1, 'FCS_CKM.4': 13, 'FCS_CKM.4.1': 1, 'FCS_RNG.1': 13, 'FCS_RNG.1.1': 2, 'FCS_RNG.1.2': 2}, 'FDP': {'FDP_ACC': 21, 'FDP_ACF': 21, 'FDP_RIP': 75, 'FDP_ACC.2': 2, 'FDP_ACF.1': 13, 'FDP_IFC': 23, 'FDP_IFC.1': 13, 'FDP_IFF': 18, 'FDP_IFF.1': 17, 'FDP_RIP.1': 8, 'FDP_ROL.1': 3, 'FDP_ROL': 12, 'FDP_SDI.2': 9, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_ITC': 12, 'FDP_ITC.2': 10, 'FDP_IFC.2': 2, 'FDP_UIT': 5, 'FDP_UIT.1': 2, 'FDP_ACC.1': 12, 'FDP_ITC.1': 4, 'FDP_SDI.1': 1, 'FDP_ITT.1': 1}, 'FIA': {'FIA_ATD': 8, 'FIA_ATD.1': 2, 'FIA_UID': 24, 'FIA_UID.2': 1, 'FIA_USB': 7, 'FIA_USB.1': 3, 'FIA_UID.1': 10}, 'FMT': {'FMT_MSA': 87, 'FMT_SMR': 31, 'FMT_SMF': 18, 'FMT_MSA.1': 10, 'FMT_MSA.2': 2, 'FMT_MSA.3': 16, 'FMT_SMF.1': 18, 'FMT_SMF.1.1': 1, 'FMT_SMR.1': 30, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MTD': 20, 'FMT_MTD.1': 2, 'FMT_MTD.3': 1}, 'FPR': {'FPR_UNO.1': 8, 'FPR_UNO.1.1': 1}, 'FPT': {'FPT_FLS': 13, 'FPT_FLS.1': 13, 'FPT_FLS.1.1': 2, 'FPT_TDC.1': 8, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 1, 'FPT_RCV': 22, 'FPT_RCV.3': 13, 'FPT_RCV.4': 2, 'FPT_TST.1': 1, 'FPT_PHP.3': 1, 'FPT_ITT.1': 1}, 'FRU': {'FRU_FLT.2': 1}, 'FTP': {'FTP_ITC': 6, 'FTP_ITC.1': 4, 'FTP_TRP.1': 2}}, 'cc_claims': {'D': {'D.APP_CODE': 6, 'D.APP_C_DATA': 2, 'D.APP_I_DATA': 4, 'D.API_DATA': 3, 'D.CRYPTO': 7, 'D.JCS_CODE': 4, 'D.JCS_DATA': 5, 'D.SEC_DATA': 8, 'D.JCS_KEYS': 4, 'D.SEC_ATTRIBUTES': 2, 'D.CM_APDU': 1}, 'O': {'O.CARD-': 7, 'O.IC_SUPPORT': 17, 'O.RECOVERY': 23, 'O.OS_SUPPORT': 23, 'O.COMMUNICATION': 11, 'O.RND': 14, 'O.REMOTE': 1, 'O.DELETION': 1, 'O.PIN-MNGT': 1, 'O.SID': 30, 'O.FIREWALL': 37, 'O.GLOBAL_ARRAYS_CONFID': 16, 'O.GLOBAL_ARRAYS_INTEG': 9, 'O.NATIVE': 14, 'O.OPERATE': 33, 'O.REALLOCATION': 15, 'O.RESOURCES': 19, 'O.ALARM': 20, 'O.CIPHER': 14, 'O.KEY-MNGT': 20, 'O.TRANSACTION': 14, 'O.LOAD': 18, 'O.INSTALL': 16, 'O.CARD-MANAGEMENT': 30, 'O.APPLET': 4, 'O.CODE_PKG': 3, 'O.JAVAOBJECT': 22, 'O.PACKAGE': 2, 'O.GLOBAL': 2, 'O.KEY-': 1, 'O.OS': 1}, 'T': {'T.DELETION': 1, 'T.CONFID-APPLI-DATA': 16, 'T.CONFID-JCS-CODE': 7, 'T.CONFID-JCS-DATA': 9, 'T.INTEG-APPLI-CODE': 12, 'T.INTEG-APPLI-DATA': 17, 'T.INTEG-JCS-CODE': 7, 'T.INTEG-JCS-DATA': 12, 'T.SID': 19, 'T.EXE-CODE': 8, 'T.NATIVE': 6, 'T.RESOURCES': 9, 'T.INSTALL': 6, 'T.COMMUNICATION': 5, 'T.LEAKAGE': 6, 'T.FAULT': 6, 'T.RND': 6, 'T.PHYSICAL': 8, 'T.CONFID-APPLI-': 2, 'T.INTEG-APPLI-': 4, 'T.INTEG-': 6, 'T.EXE-': 1, 'T.INTEG-JCS-': 1, 'T.CONFID-': 2}, 'A': {'A.DELETION': 1, 'A.APPLET': 6, 'A.VERIFICATION': 6}, 'R': {'R.JAVA': 5}, 'OP': {'OP.ARRAY_ACCESS': 4, 'OP.CREATE': 7, 'OP.LOAD_PCKG': 1, 'OP.GP': 3, 'OP.INSTANCE_FIELD': 4, 'OP.INVK_VIRTUAL': 6, 'OP.INVK_INTERFACE': 7, 'OP.JAVA': 5, 'OP.THROW': 5, 'OP.TYPE_ACCESS': 5, 'OP.PUT': 6}, 'OE': {'OE.CARD-MANAGEMENT': 2, 'OE.SCP': 6, 'OE.CODE-EVIDENCE': 16, 'OE.APPLET': 9, 'OE.VERIFICATION': 37, 'OE.CODE-': 5}, 'OSP': {'OSP.VERIFICATION': 6}}, 'vendor': {'Infineon': {'Infineon': 10, 'Infineon Technologies AG': 1}, 'Feitian': {'Feitian Technologies Co': 92, 'Feitian Technologies': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 13}}, 'DES': {'DES': {'DES': 3}, '3DES': {'TDES': 7, '3DES': 1, 'Triple-DES': 1, 'TDEA': 1}}, 'constructions': {'MAC': {'CMAC': 2}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 3}, 'SHA2': {'SHA256': 1, 'SHA-256': 2}}}, 'crypto_scheme': {'MAC': {'MAC': 2}, 'KEX': {'Key exchange': 1}}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 3}, 'RNG': {'RND': 21, 'RNG': 10}}, 'cipher_mode': {'CBC': {'CBC': 2}, 'CTR': {'CTR': 1}, 'CCM': {'CCM': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 2, 'physical probing': 3, 'DPA': 3, 'SPA': 1, 'timing attacks': 1}, 'FI': {'physical tampering': 1, 'malfunction': 4, 'Malfunction': 3}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS197': 3, 'FIPS140': 2, 'FIPS180-4': 2, 'FIPS PUB 140-2': 1, 'FIPS PUB 197': 1, 'FIPS PUB 180-4': 1}, 'BSI': {'AIS20': 2, 'AIS36': 2}, 'ISO': {'ISO/IEC 9796-2': 1, 'ISO/IEC 18013': 2}, 'ICAO': {'ICAO': 3}, 'SCP': {'SCP02': 6}}, 'javacard_version': {'JavaCard': {'Java Card 3.0.4': 3}}, 'javacard_api_const': {'misc': {'TYPE_ACCESS': 5}}, 'javacard_packages': {'javacard': {'javacard.security': 2}, 'javacardx': {'javacardx.crypto': 2}}, 'certification_process': {'OutOfScope': {'out of scope': 2, 'com 11 FT-JCOS V5.0 Security Target Phase 2 covers the Secure IC Development of Infineon and is out of scope of the TOE evaluation as that is part of the IC platform evaluation. In Phase 3, the Chip': 1, 'a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.RECOVERY and O.OS_SUPPORT are': 1}}}.
    • The cert_keywords property was set to {'cc_cert_id': {'NO': {'SERTIT-116': 2}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2': 1, 'EAL 4': 1}}, 'cc_sar': {'ALC': {'ALC_FLR': 1}, 'AVA': {'AVA_VAN.5': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Feitian': {'Feitian Technologies': 1}}, 'eval_facility': {'BrightSight': {'Brightsight': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'NSS': {'NSS': 1}}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to 20180917 Sertit-116 CR Feitian v10.pdf.
    • The st_filename property was set to [09895][SERTIT-116][ST][v1.0.8] FTJCOS v5.0 Security Target.pdf.
    • The cert_filename property was set to 20180917SERTIT-116 C.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to SERTIT-116.
    • The st_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0964-V3-2017']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0964-V3-2017']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20180917%20Sertit-116%20CR%20Feitian%20v10.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[09895][SERTIT-116][ST][v1.0.8]%20FTJCOS%20v5.0%20Security%20Target.pdf.

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The cert property was updated, with the {'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The cert_metadata property was set to None.
    • The st_keywords property was set to None.
    • The cert_keywords property was set to None.
    • The st_filename property was set to None.
    • The cert_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}]} values discarded.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The report_filename property was set to None.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_COMP', 'level': 1}]} values discarded.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Feitian FT-JCOS V5.0 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20180917SERTIT-116%20C.pdf",
  "dgst": "8d5f8b6024447c59",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "SERTIT-116",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_COMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_COMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_COMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_COMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "5.0"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
      "certification_date": "17.09.2018",
      "developer": "Feitian Technologies Co., Ltd.",
      "enhanced": {
        "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
        "certification_date": "17.09.2018",
        "description": "The TOE is an open Java Card Platforms (JCP), that is, smart cards or similar devices enabled with JavaCard technology that support post-issuance downloading of applications.The purpose of the TOE is to provide a limited Java Card environment for a single applet, specifically for e-passport and similar applications such as eID and driving license.The TOE is composed of a Smart Card Platform (SCP) and an embedded software (JCS + non-TSF parts). The JCP is compliant with Java Card Specification v3.0.4 and GlobalPlatform Specification v.2.3.\nThe TOE allows for the loading of the customer applets, but after loading the single applet the platform must be closed to prevent further loading of applets after issuance of the card to the end user. To support this functionality, the TOE provides a closing mechanism with specific guidance. The applet should have been previously verified by an off-card trusted IT component. The JCP is managed by Card Manager that is a part of the TOE. The Card Manager(ISD) is a pre-issuance applet. The JCP is fully compliant with the Java Card Specification v3.0.4 excluding the optional part JCRMI which is not implemented by the TOE.\nThe SCP is a certified hardware platform \u00e2\u20ac\u201c the SLE77CLFX2400PM with specific IC dedicated software (firmware). The hardware platform is certified by the BSI under the certification ID: BSI-DSZ-CC-0964-V3-2017 . Not all functionality of the hardware is used by the composite TOE. Therefore some parts of the IC platform are not part of the composite TOEto ensure that the developed applet has sufficient ability to counter attacks.",
        "developer": "Feitian Technologies Co., Ltd.",
        "documents": {
          "cert": [
            {
              "href": "https://sertit.no/getfile.php/135382-1607954033/SERTIT/Sertifikater/2018/116/20180917SERTIT-116%20C.pdf"
            }
          ],
          "report": [
            {
              "href": "https://sertit.no/getfile.php/135379-1607954030/SERTIT/Sertifikater/2018/116/20180917%20Sertit-116%20CR%20Feitian%20v10.pdf"
            }
          ],
          "target": [
            {
              "href": "https://sertit.no/getfile.php/135385-1607954035/SERTIT/Sertifikater/2018/116/%5B09895%5D%5BSERTIT-116%5D%5BST%5D%5Bv1.0.8%5D%20FTJCOS%20v5.0%20Security%20Target.pdf"
            }
          ]
        },
        "evaluation_facility": "Brightsight B.V.",
        "id": "SERTIT-116",
        "level": "EAL 5, ALC_DVS.2, AVA_VAN.5",
        "mutual_recognition": "CCRA, SOG-IS",
        "product": "V5.0.9",
        "sponsor": "Feitian Technologies Co., Ltd."
      },
      "product": "FT-JCOS V5.0",
      "url": "https://sertit.no/certified-products/product-archive/ft-jcos-v5-0"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0964-V3-2017"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0964-V3-2017"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Feitian Technologies Co., Ltd.",
  "manufacturer_web": "https://www.ftsafe.com",
  "name": "Feitian FT-JCOS V5.0",
  "not_valid_after": "2023-09-17",
  "not_valid_before": "2018-09-17",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "20180917SERTIT-116 C.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "NO": {
          "SERTIT-116": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR": 1
        },
        "AVA": {
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL 4": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "NSS": {
          "NSS": 1
        }
      },
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "BrightSight": {
          "Brightsight": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Feitian": {
          "Feitian Technologies": 1
        }
      },
      "vulnerability": {}
    },
    "cert_metadata": {
      "pdf_file_size_bytes": 744305,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "20180917 Sertit-116 CR Feitian v10.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "NO": {
          "SERTIT-116": 20
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_COMP.1": 1,
          "ADV_FSP.5": 1,
          "ADV_IMP.1": 1,
          "ADV_INT.2": 1,
          "ADV_TDS.4": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.5": 1,
          "ALC_COMP.1": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.2": 5,
          "ALC_FLR": 1,
          "ALC_LCD.1": 1,
          "ALC_TAT.2": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_COMP.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COMP.1": 1,
          "ATE_COV.2": 1,
          "ATE_DPT.3": 1,
          "ATE_FUN.1": 1,
          "ATE_IND": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_COMP.1": 1,
          "AVA_VAN.5": 4
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL 4": 1,
          "EAL 5": 1,
          "EAL1": 1,
          "EAL5+": 22,
          "EAL7": 1
        }
      },
      "cc_sfr": {
        "FCS": {
          "FCS_RNG.1": 4
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "BrightSight": {
          "Brightsight": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {
        "GlobalPlatform": {
          "GlobalPlatform 3.0.4": 1
        },
        "JavaCard": {
          "Java Card 2.3": 1,
          "Java Card 3.0.4": 4
        }
      },
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "other": {
          "JIL": 2
        }
      },
      "standard_id": {
        "CC": {
          "CCMB-2017-04-004": 1
        },
        "ISO": {
          "ISO/IEC 14443": 2,
          "ISO/IEC 15408": 8,
          "ISO/IEC 7816": 2
        },
        "SCP": {
          "SCP02": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 1
          }
        },
        "DES": {
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Feitian": {
          "Feitian": 1,
          "Feitian Technologies": 2,
          "Feitian Technologies Co": 1
        },
        "Infineon": {
          "Infineon": 1
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/AAPL:Keywords": "[\u0027ugradert\u0027]",
      "/Author": "[email protected]",
      "/CreationDate": "D:20180917114319Z00\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2013",
      "/Keywords": "ugradert",
      "/ModDate": "D:20180917114319Z00\u002700\u0027",
      "/Producer": "Mac OS X 10.13.6 Quartz PDFContext",
      "/Title": "tittel",
      "pdf_file_size_bytes": 1156984,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 21
    },
    "st_filename": "[09895][SERTIT-116][ST][v1.0.8] FTJCOS v5.0 Security Target.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0964-": 1,
          "BSI-DSZ-CC-0964-V3-2017": 3
        }
      },
      "cc_claims": {
        "A": {
          "A.APPLET": 6,
          "A.DELETION": 1,
          "A.VERIFICATION": 6
        },
        "D": {
          "D.API_DATA": 3,
          "D.APP_CODE": 6,
          "D.APP_C_DATA": 2,
          "D.APP_I_DATA": 4,
          "D.CM_APDU": 1,
          "D.CRYPTO": 7,
          "D.JCS_CODE": 4,
          "D.JCS_DATA": 5,
          "D.JCS_KEYS": 4,
          "D.SEC_ATTRIBUTES": 2,
          "D.SEC_DATA": 8
        },
        "O": {
          "O.ALARM": 20,
          "O.APPLET": 4,
          "O.CARD-": 7,
          "O.CARD-MANAGEMENT": 30,
          "O.CIPHER": 14,
          "O.CODE_PKG": 3,
          "O.COMMUNICATION": 11,
          "O.DELETION": 1,
          "O.FIREWALL": 37,
          "O.GLOBAL": 2,
          "O.GLOBAL_ARRAYS_CONFID": 16,
          "O.GLOBAL_ARRAYS_INTEG": 9,
          "O.IC_SUPPORT": 17,
          "O.INSTALL": 16,
          "O.JAVAOBJECT": 22,
          "O.KEY-": 1,
          "O.KEY-MNGT": 20,
          "O.LOAD": 18,
          "O.NATIVE": 14,
          "O.OPERATE": 33,
          "O.OS": 1,
          "O.OS_SUPPORT": 23,
          "O.PACKAGE": 2,
          "O.PIN-MNGT": 1,
          "O.REALLOCATION": 15,
          "O.RECOVERY": 23,
          "O.REMOTE": 1,
          "O.RESOURCES": 19,
          "O.RND": 14,
          "O.SID": 30,
          "O.TRANSACTION": 14
        },
        "OE": {
          "OE.APPLET": 9,
          "OE.CARD-MANAGEMENT": 2,
          "OE.CODE-": 5,
          "OE.CODE-EVIDENCE": 16,
          "OE.SCP": 6,
          "OE.VERIFICATION": 37
        },
        "OP": {
          "OP.ARRAY_ACCESS": 4,
          "OP.CREATE": 7,
          "OP.GP": 3,
          "OP.INSTANCE_FIELD": 4,
          "OP.INVK_INTERFACE": 7,
          "OP.INVK_VIRTUAL": 6,
          "OP.JAVA": 5,
          "OP.LOAD_PCKG": 1,
          "OP.PUT": 6,
          "OP.THROW": 5,
          "OP.TYPE_ACCESS": 5
        },
        "OSP": {
          "OSP.VERIFICATION": 6
        },
        "R": {
          "R.JAVA": 5
        },
        "T": {
          "T.COMMUNICATION": 5,
          "T.CONFID-": 2,
          "T.CONFID-APPLI-": 2,
          "T.CONFID-APPLI-DATA": 16,
          "T.CONFID-JCS-CODE": 7,
          "T.CONFID-JCS-DATA": 9,
          "T.DELETION": 1,
          "T.EXE-": 1,
          "T.EXE-CODE": 8,
          "T.FAULT": 6,
          "T.INSTALL": 6,
          "T.INTEG-": 6,
          "T.INTEG-APPLI-": 4,
          "T.INTEG-APPLI-CODE": 12,
          "T.INTEG-APPLI-DATA": 17,
          "T.INTEG-JCS-": 1,
          "T.INTEG-JCS-CODE": 7,
          "T.INTEG-JCS-DATA": 12,
          "T.LEAKAGE": 6,
          "T.NATIVE": 6,
          "T.PHYSICAL": 8,
          "T.RESOURCES": 9,
          "T.RND": 6,
          "T.SID": 19
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP-0084": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 6,
          "ADV_FSP.1": 4,
          "ADV_FSP.2": 2,
          "ADV_FSP.4": 2,
          "ADV_FSP.5": 7,
          "ADV_IMP.1": 9,
          "ADV_INT.2": 1,
          "ADV_TDS.1": 2,
          "ADV_TDS.2": 1,
          "ADV_TDS.3": 10,
          "ADV_TDS.4": 1
        },
        "AGD": {
          "AGD_OPE.1": 10,
          "AGD_PRE.1": 6
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.1": 1,
          "ALC_CMS.4": 1,
          "ALC_CMS.5": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 2,
          "ALC_DVS.2": 7,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 1,
          "ALC_TAT.2": 2
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 4,
          "ASE_INT.1": 5,
          "ASE_OBJ.2": 3,
          "ASE_REQ.1": 2,
          "ASE_REQ.2": 2,
          "ASE_SPD.1": 2,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.1": 2,
          "ATE_COV.2": 3,
          "ATE_DPT.1": 2,
          "ATE_FUN.1": 6
        },
        "AVA": {
          "AVA_VAN.5": 7
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 5": 1,
          "EAL 5 augmented": 1,
          "EAL5": 6,
          "EAL5 augmented": 1,
          "EAL5+": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 21,
          "FAU_ARP.1.1": 1,
          "FAU_SAA.1": 3
        },
        "FCO": {
          "FCO_NRO": 6,
          "FCO_NRO.2": 5
        },
        "FCS": {
          "FCS_CKM.1": 10,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 9,
          "FCS_CKM.2.1": 1,
          "FCS_CKM.3": 8,
          "FCS_CKM.3.1": 1,
          "FCS_CKM.4": 13,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 7,
          "FCS_COP.1": 21,
          "FCS_RNG": 5,
          "FCS_RNG.1": 13,
          "FCS_RNG.1.1": 2,
          "FCS_RNG.1.2": 2
        },
        "FDP": {
          "FDP_ACC": 21,
          "FDP_ACC.1": 12,
          "FDP_ACC.2": 2,
          "FDP_ACF": 21,
          "FDP_ACF.1": 13,
          "FDP_IFC": 23,
          "FDP_IFC.1": 13,
          "FDP_IFC.2": 2,
          "FDP_IFF": 18,
          "FDP_IFF.1": 17,
          "FDP_ITC": 12,
          "FDP_ITC.1": 4,
          "FDP_ITC.2": 10,
          "FDP_ITT.1": 1,
          "FDP_RIP": 75,
          "FDP_RIP.1": 8,
          "FDP_ROL": 12,
          "FDP_ROL.1": 3,
          "FDP_SDI.1": 1,
          "FDP_SDI.2": 9,
          "FDP_SDI.2.1": 1,
          "FDP_SDI.2.2": 1,
          "FDP_UIT": 5,
          "FDP_UIT.1": 2
        },
        "FIA": {
          "FIA_ATD": 8,
          "FIA_ATD.1": 2,
          "FIA_UID": 24,
          "FIA_UID.1": 10,
          "FIA_UID.2": 1,
          "FIA_USB": 7,
          "FIA_USB.1": 3
        },
        "FMT": {
          "FMT_MSA": 87,
          "FMT_MSA.1": 10,
          "FMT_MSA.2": 2,
          "FMT_MSA.3": 16,
          "FMT_MTD": 20,
          "FMT_MTD.1": 2,
          "FMT_MTD.3": 1,
          "FMT_SMF": 18,
          "FMT_SMF.1": 18,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 31,
          "FMT_SMR.1": 30,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPR": {
          "FPR_UNO.1": 8,
          "FPR_UNO.1.1": 1
        },
        "FPT": {
          "FPT_FLS": 13,
          "FPT_FLS.1": 13,
          "FPT_FLS.1.1": 2,
          "FPT_ITT.1": 1,
          "FPT_PHP.3": 1,
          "FPT_RCV": 22,
          "FPT_RCV.3": 13,
          "FPT_RCV.4": 2,
          "FPT_TDC.1": 8,
          "FPT_TDC.1.1": 1,
          "FPT_TDC.1.2": 1,
          "FPT_TST.1": 1
        },
        "FRU": {
          "FRU_FLT.2": 1
        },
        "FTP": {
          "FTP_ITC": 6,
          "FTP_ITC.1": 4,
          "FTP_TRP.1": 2
        }
      },
      "certification_process": {
        "OutOfScope": {
          "a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.RECOVERY and O.OS_SUPPORT are": 1,
          "com 11 FT-JCOS V5.0 Security Target Phase 2 covers the Secure IC Development of Infineon and is out of scope of the TOE evaluation as that is part of the IC platform evaluation. In Phase 3, the Chip": 1,
          "out of scope": 2
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 2
        },
        "CCM": {
          "CCM": 1
        },
        "CTR": {
          "CTR": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "KEX": {
          "Key exchange": 1
        },
        "MAC": {
          "MAC": 2
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 3
          },
          "SHA2": {
            "SHA-256": 2,
            "SHA256": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {
        "misc": {
          "TYPE_ACCESS": 5
        }
      },
      "javacard_packages": {
        "javacard": {
          "javacard.security": 2
        },
        "javacardx": {
          "javacardx.crypto": 2
        }
      },
      "javacard_version": {
        "JavaCard": {
          "Java Card 3.0.4": 3
        }
      },
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 21,
          "RNG": 10
        },
        "TRNG": {
          "TRNG": 3
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 3,
          "malfunction": 4,
          "physical tampering": 1
        },
        "SCA": {
          "DPA": 3,
          "Leak-Inherent": 2,
          "SPA": 1,
          "physical probing": 3,
          "timing attacks": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS20": 2,
          "AIS36": 2
        },
        "FIPS": {
          "FIPS PUB 140-2": 1,
          "FIPS PUB 180-4": 1,
          "FIPS PUB 197": 1,
          "FIPS140": 2,
          "FIPS180-4": 2,
          "FIPS197": 3
        },
        "ICAO": {
          "ICAO": 3
        },
        "ISO": {
          "ISO/IEC 18013": 2,
          "ISO/IEC 9796-2": 1
        },
        "SCP": {
          "SCP02": 6
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 13
          }
        },
        "DES": {
          "3DES": {
            "3DES": 1,
            "TDEA": 1,
            "TDES": 7,
            "Triple-DES": 1
          },
          "DES": {
            "DES": 3
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 2
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Feitian": {
          "Feitian Technologies": 1,
          "Feitian Technologies Co": 92
        },
        "Infineon": {
          "Infineon": 10,
          "Infineon Technologies AG": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/CreationDate": "D:20180811160413+08\u002700\u0027",
      "/Creator": "LaTeX with hyperref package",
      "/Producer": "MiKTeX-xdvipdfmx (0.7.8)",
      "pdf_file_size_bytes": 1189588,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 89
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20180917%20Sertit-116%20CR%20Feitian%20v10.pdf",
  "scheme": "NO",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL5+",
      "AVA_VAN.5",
      "ALC_DVS.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[09895][SERTIT-116][ST][v1.0.8]%20FTJCOS%20v5.0%20Security%20Target.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": true,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "4e4772f19252d78714540656a807928a407ed8c495a9a45815261a46f4e8ed86",
      "txt_hash": "60b7f498db2f2b295b3c531b80161aa58d3e9cbd226677ee4fef9d699d2045b2"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "a0cca3dc49d536376c3a8cbc35c14b7dcd56d220cf9daeaf5a0602083c81909a",
      "txt_hash": "058213dd3d2acaada34005ad9ab040167a22de3c05063a03c5289d8ee35787fb"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "e714a2c03da88035b23edddce15f888fdd34a72e96ba694237ffc96a4ef6ae49",
      "txt_hash": "39e575bcb51bf4e0c72e9226b46320f67645c95199e2eefa6f315fe558d6b70d"
    }
  },
  "status": "archived"
}