Sm@rtCafé® Expert 7.0 C3

CSV information ?

Status archived
Valid from 08.09.2017
Valid until 08.09.2022
Scheme 🇩🇪 DE
Manufacturer Veridos GmbH - Identity Solutions by Giesecke & Devrient and Bundesdruckerei
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level AVA_VAN.5, ALC_DVS.2, EAL5+
Protection profiles
Maintenance updates Sm@rtCafé® Expert 7.0 C3 (04.10.2018) Certification report

Heuristics summary ?

Certificate ID: BSI-DSZ-CC-1028-2017

Certificate ?

Certification report ?

Extracted keywords

Symmetric Algorithms
AES, DES, 3DES, 3-DES, CMAC, CBC-MAC
Asymmetric Algorithms
RSA-CRT, ECDH, ECDSA, ECC
Hash functions
SHA-1, SHA-2
Schemes
MAC, Key Agreement
Protocols
PGP
Randomness
RNG
Block cipher modes
ECB, CBC

Vendor
Infineon, Infineon Technologies AG, G&D, Giesecke+Devrient, Giesecke & Devrient

Security level
EAL 5, EAL 4, EAL 1, EAL 2, EAL 5+, EAL 6, EAL 3, EAL 7, EAL 5 augmented, ITSEC Evaluation
Claims
OE.VERIFICATION
Security Assurance Requirements (SAR)
ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, ADV_ARC, ADV_ARC.1, ADV_FSP.1, ADV_FSP.2, ADV_FSP.3, ADV_FSP.4, ADV_FSP.6, ADV_IMP.2, ADV_INT.1, ADV_INT.3, ADV_SPM.1, ADV_TDS.1, ADV_TDS.2, ADV_TDS.3, ADV_TDS.5, ADV_TDS.6, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_FLR, ALC_CMC.4, ALC_CMS.5, ALC_LCD.1, ALC_TAT.2, ALC_CMC.1, ALC_CMC.2, ALC_CMC.3, ALC_CMC.5, ALC_CMS.1, ALC_CMS.2, ALC_CMS.3, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_FLR.1, ALC_FLR.2, ALC_FLR.3, ALC_LCD.2, ALC_TAT.1, ALC_TAT.3, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_COV.2, ATE_DPT.3, ATE_FUN, ATE_COV, ATE_DPT, ATE_IND, ATE_COV.1, ATE_COV.3, ATE_DPT.1, ATE_DPT.2, ATE_DPT.4, ATE_FUN.1, ATE_FUN.2, ATE_IND.1, ATE_IND.2, ATE_IND.3, AVA_VAN.5, AVA_VAN, AVA_VAN.1, AVA_VAN.2, AVA_VAN.3, AVA_VAN.4, APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.1, APE_OBJ.2, APE_ECD.1, APE_REQ.1, APE_REQ.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.1, ASE_REQ.2, ASE_TSS.1, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSS
Security Functional Requirements (SFR)
FCO_NRO.2.1
Protection profiles
ANSSI-CC-PP-2010/03-M01
Certificates
BSI-DSZ-CC-1028-2017, BSI-DSZ-CC-0951-2015, BSI-DSZ-CC-0868-2014, BSI-DSZ-CC-0868-2014-MA-01, BSI-DSZ-CC-0951-, BSI-DSZ-CC-0951-2015-RA-01, ANSSI-CC-PP-2010/03-M01, CC-1028-2017
Evaluation facilities
TÜV Informationstechnik, TÜViT

Side-channel analysis
malfunction, Fault Injection, JIL
Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, 7.0 C3, Version 2.9, Date 16.08.17, BSI-DSZ- CC-1028-2017, Giesecke+Devrient Mobile Security GmbH (confidential document) [7] Security Target Lite Sm@rtCafé® Expert 7.0 C3, Version 2.9, Date 16.08.17, BSI-, Report for Sm@rtCafé® Expert 7.0 C3, Version 2, 2017-08-16, BSI-DSZ-CC-1028-2017, TÜViT GmbH (confidential document) [10] Evaluation Technical Report for Composite Evaluation according to AIS 36 for Sm@rtCafé®, 7.0 C3, Version 3, 2017-08-16, BSI-DSZ-CC-1028-2017, TÜViT GmbH (confidential document) [11] Configuration List SmartCafe Expert 7.0 C3, Version 2.2, 2017-07-18, Giesecke & Devrient GmbH, confidential document) [12] Preparative procedures Sm@rtCafé® Expert 7.0 C3, Version 3.6, 10.08.17, Giesecke & Devrient

Standards
FIPS180-4, FIPS 46-3, FIPS 197, FIPS46-3, FIPS PUB 180-4, FIPS197, SP 800-108, PKCS5, AIS 36, AIS 34, AIS 25, AIS 26, AIS 46, AIS 37, AIS 20, AIS 35, AIS 1, AIS 32, AIS 38, AIS 47, RFC 3447, RFC 5639, RFC2409, RFC5639, RFC3447, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065, ISO/IEC9796-2, SCP02, SCP03
Technical reports
BSI TR-02102, BSI TR-02102-1, BSI 7148

File metadata

Title Certification Report BSI-DSZ-CC-1028-2017
Subject Common Crieria Certification
Keywords "Common Criteria, Certification, Zertifizierung, Java Card, BSI-DSZ-CC-1028-2017"
Author Bundesamt für Sicherheit in der Informationstechnik
Creation date D:20170908135818+02'00'
Modification date D:20170921131202+02'00'
Pages 46
Creator Writer
Producer LibreOffice 5.2

Frontpage

Certificate ID BSI-DSZ-CC-1028-2017
Certified item Sm@rtCafé® Expert 7.0 C3
Certification lab BSI
Developer Veridos GmbH - Identity Solutions by G&D BDR

References

Outgoing
  • BSI-DSZ-CC-0868-2014 - archived - Sm@rtCafé® Expert 7.0 C1
  • BSI-DSZ-CC-0951-2015 - archived - Infineon Security Controller M5073 G11 with optional RSA2048/4096 v2.03.008, EC v2.03.008, SHA-2 v1.01 and Toolbox v2.03.008 libraries and with specific IC dedicated software (firmware)
Incoming
  • BSI-DSZ-CC-1032-2018 - archived - Veridos Suite v3.0 – cryptovision ePasslet Suite – Java Card applet configuration providing Secure Signature Creation Device with Key generation (SSCD)
  • BSI-DSZ-CC-1091-2018 - archived - Veridos Suite v3.0 – cryptovision ePasslet Suite – Java Card applet configuration providing Machine-Readable Electronic Documents based on BSI TR-03110 for Official Use with BAC option
  • BSI-DSZ-CC-1090-2018 - archived - Veridos Suite v3.0 – cryptovision ePasslet Suite – Java Card applet configuration providing Machine Readable Travel Document with „ICAO Application“, Extended Access Control with PACE
  • BSI-DSZ-CC-1084-2019 - archived - Sm@rtCafe ® Expert 7.0 C4
  • BSI-DSZ-CC-1092-2020 - active - Sm@rtCafé® Expert 7.0 EAL 6+ C1

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES, 3DES, 3-DES, Triple-DES, TDES, TDEA, CBC-MAC, CMAC
Asymmetric Algorithms
RSA-CRT, ECDH, ECDSA, ECC, Diffie-Hellman, DSA
Hash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-2
Schemes
MAC, Key Exchange, Key Agreement
Protocols
IKE
Randomness
TRNG, RNG, RND
Block cipher modes
ECB, CBC

JavaCard versions
Java Card 2.2.2
JavaCard API constants
TYPE_ACCESS
Vendor
Infineon, Infineon Technologies AG, Giesecke+Devrient, G&D, Giesecke & Devrient

Security level
EAL6+, EAL5+, EAL5, EAL 4+, EAL 5, EAL 6, EAL5 augmented, EAL 5 augmented, EAL 6 augmented
Claims
D.APP_I_DATA, D.SEC_DATA, D.PIN, D.CRYPTO, O.CARD-, O.SCP, O.REMOTE, O.SID, O.FIREWALL, O.GLOBAL_ARRAYS_CONFID, O.GLOBAL_ARRAYS_INTEG, O.NATIVE, O.OPERATE, O.REALLOCATION, O.RESOURCES, O.ALARM, O.CIPHER, O.KEY-MNGT, O.PIN-MNGT, O.TRANSACTION, O.OBJ-DELETION, O.DELETION, O.LOAD, O.INSTALL, O.CARD-MANAGEMENT, O.APPLET, O.CODE_PKG, O.JAVAOBJECT, O.GLOBAL_ARRAYS, O.PIN-, O.KEY-, O.PINMNGT, O.RND, O.TDES, O.SHA, T.SECURE_DELETION, T.EXE-CODE-REMOTE, T.CONFID-APPLI-DATA, T.CONFID-JCS-CODE, T.CONFID-JCS-DATA, T.INTEG-APPLI-CODE, T.INTEG-APPLI-DATA, T.INTEG-JCS-CODE, T.INTEG-JCS-DATA, T.SID, T.EXE-CODE, T.NATIVE, T.RESOURCES, T.DELETION, T.INSTALL, T.OBJ-DELETION, T.PHYSICAL, T.CONFID-APPLI-, T.INTEG-APPLI-, T.CONFID-, T.INTEGJCS-DATA, T.EXECODE, T.INTEG-, T.OBJDELETION, T.INTEGAPPLI-DATA, T.INTEGAPPLI-CODE, T.INTEG-JCS-, T.INTEG-JCSCODE, A.DELETION, A.APPLET, A.VERIFICATION, R.JAVA, OP.ARRAY_ACCESS, OP.CREATE, OP.DELETE_APPLET, OP.DELETE_PCKG, OP.DELETE_PCKG_APPLET, OP.INSTANCE_FIELD, OP.INVK_VIRTUAL, OP.INVK_INTERFACE, OP.JAVA, OP.THROW, OP.TYPE_ACCESS, OP.PUT, OE.CARD-MANAGEMENT, OE.SCP, OE.APPLET, OE.VERIFICATION, OE.CODE-EVIDENCE, OE.CODE-, OSP.VERIFICATION
Security Assurance Requirements (SAR)
ADV_ARC, ADV_ARC.1, ADV_FSP.1, ADV_TDS.1, ADV_FSP.5, ADV_TDS.4, ADV_TDS.3, ADV_INT.2, ADV_IMP.1, ADV_FSP.2, ADV_FSP.4, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_TAT.1, ALC_TAT.2, ALC_CMC.4, ALC_CMS.1, ALC_DVS.1, ALC_LCD.1, ALC_CMS.5, ALC_DEL.1, ALC_FLR.1, ATE_COV.2, ATE_FUN.1, ATE_COV.1, ATE_DPT.1, ATE_DPT.3, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1, ASE_INT.2, ASE_REQ.2, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_ARP.1, FAU_ARP.1.1, FAU_SAA.1, FAU_SAS.1, FCO_NRO, FCO_NRO.2, FCS_RNG, FCS_RNG.1.1, FCS_RNG.1, FCS_RNG.1.2, FCS_CKM.1, FCS_CKM.2, FCS_CKM.2.1, FCS_CKM.3, FCS_CKM.3.1, FCS_CKM.4, FCS_CKM.4.1, FCS_COP.1, FCS_CKM, FCS_COP, FDP_ACC, FDP_ACC.2, FDP_ACF, FDP_ACF.1, FDP_IFC, FDP_IFC.1, FDP_IFF, FDP_IFF.1, FDP_RIP, FDP_RIP.1, FDP_ROL.1, FDP_ROL, FDP_SDI.2, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ITC, FDP_ITC.2, FDP_IFC.2, FDP_UIT, FDP_UIT.1, FDP_ACC.1, FDP_ITC.1, FDP_SDI.1, FDP_SDC.1, FIA_ATD, FIA_ATD.1, FIA_UID, FIA_UID.2, FIA_USB, FIA_USB.1, FIA_UID.1, FMT_MSA, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD, FMT_MTD.1, FMT_MTD.3, FMT_SMR, FMT_SMF, FMT_LIM.1, FMT_LIM.2, FMT_LIM, FPR_UNO.1, FPR_UNO.1.1, FPT_PHP.3, FPT_TST.1, FPT_FLS.1, FPT_FLS.1.1, FPT_TDC.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_FLS, FPT_RCV, FPT_RCV.3, FPT_PHP.3.1, FPT_TST.2, FPT_ITT.1, FRU_FLT.2, FTP_ITC, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.3, FTP_TRP.1
Protection profiles
BSI-CC-PP-0035-2007, BSI-CC-PP-0084-2014
Certificates
BSI-DSZ-CC-0951-2015, BSI-DSZ-CC-0951-2015-RA-01

Side-channel analysis
Leak-Inherent, physical probing, physical tampering, Malfunction, JIL
Certification process
out of scope, a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are

Standards
FIPS 186-3, FIPS 197, FIPS46-3, FIPS180-4, FIPS 140-2, FIPS 180-3, FIPS PUB 180-3, FIPS PUB 186-3, PKCS#3, PKCS5, PKCS1, PKCS3, AIS20, AIS 31, AIS31, AIS 20, RFC5639, RFC 3447, RFC2437, RFC2409, RFC 2409, RFC4493, RFC 4493, RFC 5639, RFC 4056, ISO/IEC 7816, ISO/IEC 14443, ISO/IEC 9796-2, SCP02, SCP03, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003

File metadata

Title Security Target Lite Sm@rtCafé® Expert 7.0 C3
Subject Certificate BSI-DSZ-CC-1028-2017
Keywords Common Criteria CCv3.1 EAL5 augmented (EAL5+)
Author Giesecke+Devrient Mobile Security GmbH /stut
Creation date D:20170816104040+02'00'
Modification date D:20170816110905+02'00'
Pages 126
Creator Acrobat PDFMaker 11 für Word
Producer Adobe PDF Library 11.0

References

Outgoing
  • BSI-DSZ-CC-0951-2015 - archived - Infineon Security Controller M5073 G11 with optional RSA2048/4096 v2.03.008, EC v2.03.008, SHA-2 v1.01 and Toolbox v2.03.008 libraries and with specific IC dedicated software (firmware)
Incoming
  • BSI-DSZ-CC-1032-2018 - archived - Veridos Suite v3.0 – cryptovision ePasslet Suite – Java Card applet configuration providing Secure Signature Creation Device with Key generation (SSCD)
  • BSI-DSZ-CC-1091-2018 - archived - Veridos Suite v3.0 – cryptovision ePasslet Suite – Java Card applet configuration providing Machine-Readable Electronic Documents based on BSI TR-03110 for Official Use with BAC option
  • BSI-DSZ-CC-1090-2018 - archived - Veridos Suite v3.0 – cryptovision ePasslet Suite – Java Card applet configuration providing Machine Readable Travel Document with „ICAO Application“, Extended Access Control with PACE

Heuristics ?

Certificate ID: BSI-DSZ-CC-1028-2017

Extracted SARs

ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_SPM.1, ADV_TDS.4, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_FLR.1, ALC_LCD.1, ALC_TAT.2, APE_CCL.1, APE_ECD.1, APE_INT.1, APE_OBJ.2, APE_REQ.2, APE_SPD.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.2, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.3, AVA_VAN.5

References ?

Updates ?

  • 21.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'prev_certificates': [], 'next_certificates': []}.
  • 09.11.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__insert__': {'FR': {'ANSSI-CC-PP-2010/03-M01': 4}}}} data.
  • 17.10.2024 The certificate data changed.
    Certificate changed

    The Protection Profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Java Card™ System Protection Profile Open Configuration, Version 3.0', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/ANSSI-CC-profil_PP-2010-03en.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['ANSSI-CC-PP-2001-03-M01', 'JCSPPC', 'ANSSI-CC-PP-2010-03']}}]}.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '5f3376fe53264e7948ccc1987bd494b0ac8e22c6196f082d602d7ac5323d19eb', 'txt_hash': '0677c2d411228f159711a00af83a80152ee4196de153b922eaa3bfc26f84bdd5'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'bfcbfed007e7afbb358aec999acef14d83a8aeefbfce5313e818287469c3f8a6', 'txt_hash': '9a0fc7494ad444368a198a5f9530f484328b315b6f03be13001e667bbbb2594a'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 1403909, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 46, '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/CreationDate': "D:20170908135818+02'00'", '/Creator': 'Writer', '/Keywords': '"Common Criteria, Certification, Zertifizierung, Java Card, BSI-DSZ-CC-1028-2017"', '/ModDate': "D:20170921131202+02'00'", '/Producer': 'LibreOffice 5.2', '/Subject': 'Common Crieria Certification', '/Title': 'Certification Report BSI-DSZ-CC-1028-2017', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.bsi.bund.de/', 'http://www.sogisportal.eu/', 'http://tools.ietf.org/html/rfc5639', 'https://www.bsi.bund.de/zertifizierung', 'https://www.bsi.bund.de/TR', 'https://www.bsi.bund.de/zertifizierungsreporte', 'http://www.commoncriteriaportal.org/', 'https://www.bsi.bund.de/AIS']}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 1009080, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 126, '/Author': 'Giesecke+Devrient Mobile Security GmbH /stut', '/Category': 'Public', '/Chip': 'M5073 G11', '/Comments': 'Final', '/Company': 'GuD', '/CreationDate': "D:20170816104040+02'00'", '/Creator': 'Acrobat PDFMaker 11 für Word', '/HWManufacturer': 'Infineon', '/Keywords': 'Common Criteria CCv3.1 EAL5 augmented (EAL5+)', '/ModDate': "D:20170816110905+02'00'", '/Producer': 'Adobe PDF Library 11.0', '/ProductName': 'Sm@rtCafé® Expert 7.0 C3', '/SourceModified': 'D:20170816084029', '/Subject': 'Certificate BSI-DSZ-CC-1028-2017', '/TOE': 'Sm@rtCafé® Expert 7.0 C3', '/Title': 'Security Target Lite Sm@rtCafé® Expert 7.0 C3', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-1028-2017', 'cert_item': 'Sm@rtCafé® Expert 7.0 C3', 'developer': 'Veridos GmbH - Identity Solutions by G&D BDR', 'cert_lab': 'BSI', 'ref_protection_profiles': 'Java Card Protection Profile - Open Configuration, Version 3.0, May 2012, ANSSI-CC-PP-2010/03-M01', 'cc_version': 'PP conformant plus product specific extensions Common Criteria Part 2 extended', 'cc_security_level': 'Common Criteria Part 3 conformant EAL 5 augmented by ALC_DVS.2 and AVA_VAN.5'}}.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1028-2017': 27, 'BSI-DSZ-CC-0951-2015': 3, 'BSI-DSZ-CC-0868-2014': 1, 'BSI-DSZ-CC-0868-2014-MA-01': 1, 'BSI-DSZ-CC-0951-': 1, 'BSI-DSZ-CC-0951-2015-RA-01': 2}, 'NL': {'CC-1028-2017': 1}}, 'cc_protection_profile_id': {'ANSSI': {'ANSSI-CC-PP-2010/03-M01': 4}}, 'cc_security_level': {'EAL': {'EAL 5': 14, 'EAL 4': 7, 'EAL 1': 7, 'EAL 2': 6, 'EAL 5+': 1, 'EAL 6': 4, 'EAL 3': 4, 'EAL 7': 4, 'EAL 5 augmented': 3}, 'ITSEC': {'ITSEC Evaluation': 1}}, 'cc_sar': {'ADV': {'ADV_FSP.5': 2, 'ADV_IMP.1': 2, 'ADV_INT.2': 2, 'ADV_TDS.4': 2, 'ADV_ARC': 3, 'ADV_ARC.1': 1, 'ADV_FSP.1': 1, 'ADV_FSP.2': 1, 'ADV_FSP.3': 1, 'ADV_FSP.4': 1, 'ADV_FSP.6': 1, 'ADV_IMP.2': 1, 'ADV_INT.1': 1, 'ADV_INT.3': 1, 'ADV_SPM.1': 1, 'ADV_TDS.1': 1, 'ADV_TDS.2': 1, 'ADV_TDS.3': 1, 'ADV_TDS.5': 1, 'ADV_TDS.6': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1, 'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_DVS.2': 7, 'ALC_FLR': 3, 'ALC_CMC.4': 3, 'ALC_CMS.5': 3, 'ALC_LCD.1': 3, 'ALC_TAT.2': 3, 'ALC_CMC.1': 1, 'ALC_CMC.2': 1, 'ALC_CMC.3': 1, 'ALC_CMC.5': 1, 'ALC_CMS.1': 1, 'ALC_CMS.2': 1, 'ALC_CMS.3': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 2, 'ALC_DVS.1': 1, 'ALC_FLR.1': 1, 'ALC_FLR.2': 1, 'ALC_FLR.3': 1, 'ALC_LCD.2': 1, 'ALC_TAT.1': 1, 'ALC_TAT.3': 1, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV.2': 2, 'ATE_DPT.3': 2, 'ATE_FUN': 2, 'ATE_COV': 2, 'ATE_DPT': 2, 'ATE_IND': 2, 'ATE_COV.1': 1, 'ATE_COV.3': 1, 'ATE_DPT.1': 1, 'ATE_DPT.2': 1, 'ATE_DPT.4': 1, 'ATE_FUN.1': 1, 'ATE_FUN.2': 1, 'ATE_IND.1': 1, 'ATE_IND.2': 1, 'ATE_IND.3': 1}, 'AVA': {'AVA_VAN.5': 6, 'AVA_VAN': 3, 'AVA_VAN.1': 1, 'AVA_VAN.2': 1, 'AVA_VAN.3': 1, 'AVA_VAN.4': 1}, 'APE': {'APE_INT.1': 1, 'APE_CCL.1': 1, 'APE_SPD.1': 1, 'APE_OBJ.1': 1, 'APE_OBJ.2': 1, 'APE_ECD.1': 1, 'APE_REQ.1': 1, 'APE_REQ.2': 1}, 'ASE': {'ASE_INT.1': 1, 'ASE_CCL.1': 1, 'ASE_SPD.1': 1, 'ASE_OBJ.1': 1, 'ASE_OBJ.2': 1, 'ASE_ECD.1': 1, 'ASE_REQ.1': 1, 'ASE_REQ.2': 1, 'ASE_TSS.1': 1, 'ASE_TSS.2': 1, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {'FCO': {'FCO_NRO.2.1': 2}}, 'cc_claims': {'OE': {'OE.VERIFICATION': 3}}, 'vendor': {'Infineon': {'Infineon': 4, 'Infineon Technologies AG': 4}, 'GD': {'G&D': 11, 'Giesecke+Devrient': 4, 'Giesecke & Devrient': 7}}, 'eval_facility': {'TUV': {'TÜV Informationstechnik': 2, 'TÜViT': 3}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 11}}, 'DES': {'DES': {'DES': 1}, '3DES': {'3DES': 14, '3-DES': 6}}, 'constructions': {'MAC': {'CMAC': 9, 'CBC-MAC': 4}}}, 'asymmetric_crypto': {'RSA': {'RSA-CRT': 5}, 'ECC': {'ECDH': {'ECDH': 1}, 'ECDSA': {'ECDSA': 4}, 'ECC': {'ECC': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 5}, 'SHA2': {'SHA-2': 4}}}, 'crypto_scheme': {'MAC': {'MAC': 7}, 'KA': {'Key Agreement': 2}}, 'crypto_protocol': {'PGP': {'PGP': 1}}, 'randomness': {'RNG': {'RNG': 5}}, 'cipher_mode': {'ECB': {'ECB': 4}, 'CBC': {'CBC': 14}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'malfunction': 1, 'Fault Injection': 1}, 'other': {'JIL': 4}}, 'technical_report_id': {'BSI': {'BSI TR-02102': 1, 'BSI TR-02102-1': 1, 'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS180-4': 14, 'FIPS 46-3': 10, 'FIPS 197': 5, 'FIPS46-3': 1, 'FIPS PUB 180-4': 1, 'FIPS197': 1}, 'NIST': {'SP 800-108': 1}, 'PKCS': {'PKCS5': 5}, 'BSI': {'AIS 36': 7, 'AIS 34': 2, 'AIS 25': 3, 'AIS 26': 2, 'AIS 46': 2, 'AIS 37': 1, 'AIS 20': 2, 'AIS 35': 2, 'AIS 1': 1, 'AIS 32': 1, 'AIS 38': 1, 'AIS 47': 1}, 'RFC': {'RFC 3447': 15, 'RFC 5639': 2, 'RFC2409': 9, 'RFC5639': 3, 'RFC3447': 1}, 'ISO': {'ISO/IEC 15408': 4, 'ISO/IEC 18045': 4, 'ISO/IEC 17065': 2, 'ISO/IEC9796-2': 1}, 'SCP': {'SCP02': 1, 'SCP03': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {'javacard': {'javacard.security': 1, 'javacard.framework': 1}, 'javacardx': {'javacardx.crypto': 1, 'javacardx.apdu': 1}, 'org': {'org.globalplatform': 1}}, 'certification_process': {'ConfidentialDocument': {'being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, '7.0 C3, Version 2.9, Date 16.08.17, BSI-DSZ- CC-1028-2017, Giesecke+Devrient Mobile Security GmbH (confidential document) [7] Security Target Lite Sm@rtCafé® Expert 7.0 C3, Version 2.9, Date 16.08.17, BSI-': 1, 'Report for Sm@rtCafé® Expert 7.0 C3, Version 2, 2017-08-16, BSI-DSZ-CC-1028-2017, TÜViT GmbH (confidential document) [10] Evaluation Technical Report for Composite Evaluation according to AIS 36 for Sm@rtCafé®': 1, '7.0 C3, Version 3, 2017-08-16, BSI-DSZ-CC-1028-2017, TÜViT GmbH (confidential document) [11] Configuration List SmartCafe Expert 7.0 C3, Version 2.2, 2017-07-18, Giesecke & Devrient GmbH': 1, 'confidential document) [12] Preparative procedures Sm@rtCafé® Expert 7.0 C3, Version 3.6, 10.08.17, Giesecke & Devrient': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0951-2015': 4, 'BSI-DSZ-CC-0951-2015-RA-01': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0035-2007': 1, 'BSI-CC-PP-0084-2014': 1}}, 'cc_security_level': {'EAL': {'EAL6+': 1, 'EAL5+': 1, 'EAL5': 4, 'EAL 4+': 1, 'EAL 5': 1, 'EAL 6': 1, 'EAL5 augmented': 2, 'EAL 5 augmented': 1, 'EAL 6 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_ARC.1': 5, 'ADV_FSP.1': 3, 'ADV_TDS.1': 2, 'ADV_FSP.5': 8, 'ADV_TDS.4': 8, 'ADV_TDS.3': 3, 'ADV_INT.2': 1, 'ADV_IMP.1': 6, 'ADV_FSP.2': 2, 'ADV_FSP.4': 1}, 'AGD': {'AGD_OPE.1': 7, 'AGD_PRE.1': 5}, 'ALC': {'ALC_DVS.2': 7, 'ALC_TAT.1': 2, 'ALC_TAT.2': 3, 'ALC_CMC.4': 1, 'ALC_CMS.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 3, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1, 'ALC_FLR.1': 1}, 'ATE': {'ATE_COV.2': 3, 'ATE_FUN.1': 6, 'ATE_COV.1': 2, 'ATE_DPT.1': 1, 'ATE_DPT.3': 1}, 'AVA': {'AVA_VAN.5': 6}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 4, 'ASE_INT.1': 3, 'ASE_REQ.1': 2, 'ASE_INT.2': 2, 'ASE_REQ.2': 2, 'ASE_OBJ.2': 3, 'ASE_SPD.1': 2, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 20, 'FAU_ARP.1.1': 1, 'FAU_SAA.1': 3, 'FAU_SAS.1': 1}, 'FCO': {'FCO_NRO': 6, 'FCO_NRO.2': 3}, 'FCS': {'FCS_RNG': 5, 'FCS_RNG.1.1': 5, 'FCS_RNG.1': 12, 'FCS_RNG.1.2': 2, 'FCS_CKM.1': 53, 'FCS_CKM.2': 9, 'FCS_CKM.2.1': 1, 'FCS_CKM.3': 7, 'FCS_CKM.3.1': 1, 'FCS_CKM.4': 28, 'FCS_CKM.4.1': 1, 'FCS_COP.1': 102, 'FCS_CKM': 7, 'FCS_COP': 7}, 'FDP': {'FDP_ACC': 25, 'FDP_ACC.2': 5, 'FDP_ACF': 24, 'FDP_ACF.1': 14, 'FDP_IFC': 26, 'FDP_IFC.1': 13, 'FDP_IFF': 18, 'FDP_IFF.1': 17, 'FDP_RIP': 110, 'FDP_RIP.1': 11, 'FDP_ROL.1': 5, 'FDP_ROL': 15, 'FDP_SDI.2': 15, 'FDP_SDI.2.1': 2, 'FDP_SDI.2.2': 1, 'FDP_ITC': 12, 'FDP_ITC.2': 19, 'FDP_IFC.2': 2, 'FDP_UIT': 9, 'FDP_UIT.1': 2, 'FDP_ACC.1': 11, 'FDP_ITC.1': 10, 'FDP_SDI.1': 2, 'FDP_SDC.1': 2}, 'FIA': {'FIA_ATD': 9, 'FIA_ATD.1': 2, 'FIA_UID': 15, 'FIA_UID.2': 1, 'FIA_USB': 8, 'FIA_USB.1': 3, 'FIA_UID.1': 9}, 'FMT': {'FMT_MSA': 94, 'FMT_MSA.1': 10, 'FMT_MSA.2': 2, 'FMT_MSA.3': 17, 'FMT_SMF.1': 19, 'FMT_SMF.1.1': 1, 'FMT_SMR.1': 31, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MTD': 20, 'FMT_MTD.1': 2, 'FMT_MTD.3': 1, 'FMT_SMR': 33, 'FMT_SMF': 22, 'FMT_LIM.1': 1, 'FMT_LIM.2': 1, 'FMT_LIM': 4}, 'FPR': {'FPR_UNO.1': 10, 'FPR_UNO.1.1': 1}, 'FPT': {'FPT_PHP.3': 9, 'FPT_TST.1': 8, 'FPT_FLS.1': 20, 'FPT_FLS.1.1': 2, 'FPT_TDC.1': 8, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 2, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_FLS': 34, 'FPT_RCV': 12, 'FPT_RCV.3': 10, 'FPT_PHP.3.1': 3, 'FPT_TST.2': 1, 'FPT_ITT.1': 1}, 'FRU': {'FRU_FLT.2': 1}, 'FTP': {'FTP_ITC': 14, 'FTP_ITC.1': 8, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP.1': 2}}, 'cc_claims': {'D': {'D.APP_I_DATA': 2, 'D.SEC_DATA': 1, 'D.PIN': 1, 'D.CRYPTO': 2}, 'O': {'O.CARD-': 7, 'O.SCP': 73, 'O.REMOTE': 3, 'O.SID': 34, 'O.FIREWALL': 44, 'O.GLOBAL_ARRAYS_CONFID': 19, 'O.GLOBAL_ARRAYS_INTEG': 9, 'O.NATIVE': 14, 'O.OPERATE': 37, 'O.REALLOCATION': 18, 'O.RESOURCES': 23, 'O.ALARM': 23, 'O.CIPHER': 20, 'O.KEY-MNGT': 18, 'O.PIN-MNGT': 22, 'O.TRANSACTION': 19, 'O.OBJ-DELETION': 9, 'O.DELETION': 17, 'O.LOAD': 18, 'O.INSTALL': 16, 'O.CARD-MANAGEMENT': 27, 'O.APPLET': 15, 'O.CODE_PKG': 13, 'O.JAVAOBJECT': 39, 'O.GLOBAL_ARRAYS': 1, 'O.PIN-': 2, 'O.KEY-': 8, 'O.PINMNGT': 1, 'O.RND': 4, 'O.TDES': 1, 'O.SHA': 1}, 'T': {'T.SECURE_DELETION': 8, 'T.EXE-CODE-REMOTE': 3, 'T.CONFID-APPLI-DATA': 16, 'T.CONFID-JCS-CODE': 3, 'T.CONFID-JCS-DATA': 4, 'T.INTEG-APPLI-CODE': 5, 'T.INTEG-APPLI-DATA': 12, 'T.INTEG-JCS-CODE': 5, 'T.INTEG-JCS-DATA': 2, 'T.SID': 16, 'T.EXE-CODE': 6, 'T.NATIVE': 5, 'T.RESOURCES': 7, 'T.DELETION': 4, 'T.INSTALL': 5, 'T.OBJ-DELETION': 2, 'T.PHYSICAL': 5, 'T.CONFID-APPLI-': 1, 'T.INTEG-APPLI-': 4, 'T.CONFID-': 8, 'T.INTEGJCS-DATA': 6, 'T.EXECODE': 1, 'T.INTEG-': 10, 'T.OBJDELETION': 1, 'T.INTEGAPPLI-DATA': 1, 'T.INTEGAPPLI-CODE': 2, 'T.INTEG-JCS-': 2, 'T.INTEG-JCSCODE': 1}, 'A': {'A.DELETION': 5, 'A.APPLET': 4, 'A.VERIFICATION': 4}, 'R': {'R.JAVA': 9}, 'OP': {'OP.ARRAY_ACCESS': 4, 'OP.CREATE': 7, 'OP.DELETE_APPLET': 4, 'OP.DELETE_PCKG': 3, 'OP.DELETE_PCKG_APPLET': 3, 'OP.INSTANCE_FIELD': 4, 'OP.INVK_VIRTUAL': 6, 'OP.INVK_INTERFACE': 7, 'OP.JAVA': 6, 'OP.THROW': 5, 'OP.TYPE_ACCESS': 5, 'OP.PUT': 5}, 'OE': {'OE.CARD-MANAGEMENT': 5, 'OE.SCP': 13, 'OE.APPLET': 9, 'OE.VERIFICATION': 39, 'OE.CODE-EVIDENCE': 13, 'OE.CODE-': 6}, 'OSP': {'OSP.VERIFICATION': 5}}, 'vendor': {'Infineon': {'Infineon': 3, 'Infineon Technologies AG': 2}, 'GD': {'Giesecke+Devrient': 8, 'G&D': 14, 'Giesecke & Devrient': 2}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 26}}, 'DES': {'DES': {'DES': 8}, '3DES': {'3DES': 3, '3-DES': 7, 'Triple-DES': 7, 'TDES': 2, 'TDEA': 1}}, 'constructions': {'MAC': {'CBC-MAC': 5, 'CMAC': 4}}}, 'asymmetric_crypto': {'RSA': {'RSA-CRT': 11}, 'ECC': {'ECDH': {'ECDH': 3}, 'ECDSA': {'ECDSA': 8}, 'ECC': {'ECC': 8}}, 'FF': {'DH': {'Diffie-Hellman': 2}, 'DSA': {'DSA': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 4}, 'SHA2': {'SHA-224': 3, 'SHA-256': 3, 'SHA-384': 3, 'SHA-512': 2, 'SHA-2': 2}}}, 'crypto_scheme': {'MAC': {'MAC': 13}, 'KEX': {'Key Exchange': 3}, 'KA': {'Key Agreement': 1}}, 'crypto_protocol': {'IKE': {'IKE': 3}}, 'randomness': {'TRNG': {'TRNG': 1}, 'RNG': {'RNG': 7, 'RND': 4}}, 'cipher_mode': {'ECB': {'ECB': 8}, 'CBC': {'CBC': 6}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 4, 'physical probing': 1}, 'FI': {'physical tampering': 5, 'Malfunction': 5}, 'other': {'JIL': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 186-3': 4, 'FIPS 197': 6, 'FIPS46-3': 3, 'FIPS180-4': 2, 'FIPS 140-2': 1, 'FIPS 180-3': 2, 'FIPS PUB 180-3': 1, 'FIPS PUB 186-3': 1}, 'PKCS': {'PKCS#3': 1, 'PKCS5': 3, 'PKCS1': 9, 'PKCS3': 1}, 'BSI': {'AIS20': 5, 'AIS 31': 2, 'AIS31': 2, 'AIS 20': 1}, 'RFC': {'RFC5639': 4, 'RFC 3447': 4, 'RFC2437': 4, 'RFC2409': 2, 'RFC 2409': 3, 'RFC4493': 1, 'RFC 4493': 1, 'RFC 5639': 1, 'RFC 4056': 1}, 'ISO': {'ISO/IEC 7816': 2, 'ISO/IEC 14443': 2, 'ISO/IEC 9796-2': 1}, 'SCP': {'SCP02': 3, 'SCP03': 2}, 'CC': {'CCMB-2012-09-001': 2, 'CCMB-2012-09-002': 2, 'CCMB-2012-09-003': 2}}, 'javacard_version': {'JavaCard': {'Java Card 2.2.2': 3}}, 'javacard_api_const': {'misc': {'TYPE_ACCESS': 5}}, 'javacard_packages': {'javacard': {'javacard.security': 10, 'javacard.framework': 5, 'javacard.framework.applet': 1}, 'javacardx': {'javacardx.crypto': 1}}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are': 1}}}.
    • The report_filename property was set to 1028a_pdf.pdf.
    • The st_filename property was set to 1028b_pdf.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to ['BSI'].
    • The cert_id property was set to BSI-DSZ-CC-1028-2017.
    • The st_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1032-2018', 'BSI-DSZ-CC-1090-2018', 'BSI-DSZ-CC-1091-2018']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1032-2018', 'BSI-DSZ-CC-1091-2018', 'BSI-DSZ-CC-1090-2018']}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0951-2015']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0951-2015']}} data.
    • The report_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1032-2018', 'BSI-DSZ-CC-1090-2018', 'BSI-DSZ-CC-1084-2019', 'BSI-DSZ-CC-1091-2018', 'BSI-DSZ-CC-1092-2020']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1032-2018', 'BSI-DSZ-CC-1090-2018', 'BSI-DSZ-CC-1084-2019', 'BSI-DSZ-CC-1091-2018', 'BSI-DSZ-CC-1092-2020']}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0868-2014', 'BSI-DSZ-CC-0951-2015']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0891-2015', 'BSI-DSZ-CC-0868-2014', 'BSI-DSZ-CC-0782-2012', 'BSI-DSZ-CC-0951-2015']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1028a_pdf.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1028b_pdf.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The report_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to None.
    • The st_references property was updated, with the {'directly_referenced_by': None, 'indirectly_referenced_by': None} data.
    • The report_references property was updated, with the {'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 6}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 6}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}]} values discarded.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The report_references property was updated, with the {'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1032-2018', 'BSI-DSZ-CC-1091-2018']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1032-2018', 'BSI-DSZ-CC-1091-2018']}}, 'directly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0868-2014']}}, 'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0868-2014', 'BSI-DSZ-CC-0782-2012']}}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 6}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 6}]} values added.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Sm@rtCafé® Expert 7.0 C3 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": null,
  "dgst": "953eb4fe5ff4c446",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "BSI-DSZ-CC-1028-2017",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_ECD",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "7.0"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": [],
    "prev_certificates": [],
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1032-2018",
          "BSI-DSZ-CC-1084-2019",
          "BSI-DSZ-CC-1090-2018",
          "BSI-DSZ-CC-1092-2020",
          "BSI-DSZ-CC-1091-2018"
        ]
      },
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0951-2015",
          "BSI-DSZ-CC-0868-2014"
        ]
      },
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1032-2018",
          "BSI-DSZ-CC-1084-2019",
          "BSI-DSZ-CC-1090-2018",
          "BSI-DSZ-CC-1092-2020",
          "BSI-DSZ-CC-1091-2018"
        ]
      },
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0951-2015",
          "BSI-DSZ-CC-0891-2015",
          "BSI-DSZ-CC-0868-2014",
          "BSI-DSZ-CC-0782-2012"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1032-2018",
          "BSI-DSZ-CC-1090-2018",
          "BSI-DSZ-CC-1091-2018"
        ]
      },
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0951-2015"
        ]
      },
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1032-2018",
          "BSI-DSZ-CC-1091-2018",
          "BSI-DSZ-CC-1090-2018"
        ]
      },
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0951-2015"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2018-10-04",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1028ma1a_pdf.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "Sm@rtCaf\u00e9\u00ae Expert 7.0 C3"
      }
    ]
  },
  "manufacturer": "Veridos GmbH - Identity Solutions by Giesecke \u0026 Devrient and Bundesdruckerei",
  "manufacturer_web": "https://www.veridos.com",
  "name": "Sm@rtCaf\u00e9\u00ae Expert 7.0 C3",
  "not_valid_after": "2022-09-08",
  "not_valid_before": "2017-09-08",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "1028a_pdf.pdf",
    "report_frontpage": {
      "DE": {
        "cc_security_level": "Common Criteria Part 3 conformant EAL 5 augmented by ALC_DVS.2 and AVA_VAN.5",
        "cc_version": "PP conformant plus product specific extensions Common Criteria Part 2 extended",
        "cert_id": "BSI-DSZ-CC-1028-2017",
        "cert_item": "Sm@rtCaf\u00e9\u00ae Expert 7.0 C3",
        "cert_lab": "BSI",
        "developer": "Veridos GmbH - Identity Solutions by G\u0026D BDR",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ],
        "ref_protection_profiles": "Java Card Protection Profile - Open Configuration, Version 3.0, May 2012, ANSSI-CC-PP-2010/03-M01"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 1
          },
          "ECDH": {
            "ECDH": 1
          },
          "ECDSA": {
            "ECDSA": 4
          }
        },
        "RSA": {
          "RSA-CRT": 5
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0868-2014": 1,
          "BSI-DSZ-CC-0868-2014-MA-01": 1,
          "BSI-DSZ-CC-0951-": 1,
          "BSI-DSZ-CC-0951-2015": 3,
          "BSI-DSZ-CC-0951-2015-RA-01": 2,
          "BSI-DSZ-CC-1028-2017": 27
        },
        "FR": {
          "ANSSI-CC-PP-2010/03-M01": 4
        },
        "NL": {
          "CC-1028-2017": 1
        }
      },
      "cc_claims": {
        "OE": {
          "OE.VERIFICATION": 3
        }
      },
      "cc_protection_profile_id": {
        "ANSSI": {
          "ANSSI-CC-PP-2010/03-M01": 4
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 3,
          "ADV_ARC.1": 1,
          "ADV_FSP": 1,
          "ADV_FSP.1": 1,
          "ADV_FSP.2": 1,
          "ADV_FSP.3": 1,
          "ADV_FSP.4": 1,
          "ADV_FSP.5": 2,
          "ADV_FSP.6": 1,
          "ADV_IMP": 1,
          "ADV_IMP.1": 2,
          "ADV_IMP.2": 1,
          "ADV_INT": 1,
          "ADV_INT.1": 1,
          "ADV_INT.2": 2,
          "ADV_INT.3": 1,
          "ADV_SPM": 1,
          "ADV_SPM.1": 1,
          "ADV_TDS": 1,
          "ADV_TDS.1": 1,
          "ADV_TDS.2": 1,
          "ADV_TDS.3": 1,
          "ADV_TDS.4": 2,
          "ADV_TDS.5": 1,
          "ADV_TDS.6": 1
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 1,
          "AGD_PRE": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.1": 1,
          "ALC_CMC.2": 1,
          "ALC_CMC.3": 1,
          "ALC_CMC.4": 3,
          "ALC_CMC.5": 1,
          "ALC_CMS": 1,
          "ALC_CMS.1": 1,
          "ALC_CMS.2": 1,
          "ALC_CMS.3": 1,
          "ALC_CMS.4": 1,
          "ALC_CMS.5": 3,
          "ALC_DEL": 1,
          "ALC_DEL.1": 2,
          "ALC_DVS": 1,
          "ALC_DVS.1": 1,
          "ALC_DVS.2": 7,
          "ALC_FLR": 3,
          "ALC_FLR.1": 1,
          "ALC_FLR.2": 1,
          "ALC_FLR.3": 1,
          "ALC_LCD.1": 3,
          "ALC_LCD.2": 1,
          "ALC_TAT": 1,
          "ALC_TAT.1": 1,
          "ALC_TAT.2": 3,
          "ALC_TAT.3": 1
        },
        "APE": {
          "APE_CCL.1": 1,
          "APE_ECD.1": 1,
          "APE_INT.1": 1,
          "APE_OBJ.1": 1,
          "APE_OBJ.2": 1,
          "APE_REQ.1": 1,
          "APE_REQ.2": 1,
          "APE_SPD.1": 1
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_CCL.1": 1,
          "ASE_ECD": 1,
          "ASE_ECD.1": 1,
          "ASE_INT": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ": 1,
          "ASE_OBJ.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ": 1,
          "ASE_REQ.1": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS": 1,
          "ASE_TSS.1": 1,
          "ASE_TSS.2": 1
        },
        "ATE": {
          "ATE_COV": 2,
          "ATE_COV.1": 1,
          "ATE_COV.2": 2,
          "ATE_COV.3": 1,
          "ATE_DPT": 2,
          "ATE_DPT.1": 1,
          "ATE_DPT.2": 1,
          "ATE_DPT.3": 2,
          "ATE_DPT.4": 1,
          "ATE_FUN": 2,
          "ATE_FUN.1": 1,
          "ATE_FUN.2": 1,
          "ATE_IND": 2,
          "ATE_IND.1": 1,
          "ATE_IND.2": 1,
          "ATE_IND.3": 1
        },
        "AVA": {
          "AVA_VAN": 3,
          "AVA_VAN.1": 1,
          "AVA_VAN.2": 1,
          "AVA_VAN.3": 1,
          "AVA_VAN.4": 1,
          "AVA_VAN.5": 6
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 7,
          "EAL 2": 6,
          "EAL 3": 4,
          "EAL 4": 7,
          "EAL 5": 14,
          "EAL 5 augmented": 3,
          "EAL 5+": 1,
          "EAL 6": 4,
          "EAL 7": 4
        },
        "ITSEC": {
          "ITSEC Evaluation": 1
        }
      },
      "cc_sfr": {
        "FCO": {
          "FCO_NRO.2.1": 2
        }
      },
      "certification_process": {
        "ConfidentialDocument": {
          "7.0 C3, Version 2.9, Date 16.08.17, BSI-DSZ- CC-1028-2017, Giesecke+Devrient Mobile Security GmbH (confidential document) [7] Security Target Lite Sm@rtCaf\u00e9\u00ae Expert 7.0 C3, Version 2.9, Date 16.08.17, BSI-": 1,
          "7.0 C3, Version 3, 2017-08-16, BSI-DSZ-CC-1028-2017, T\u00dcViT GmbH (confidential document) [11] Configuration List SmartCafe Expert 7.0 C3, Version 2.2, 2017-07-18, Giesecke \u0026 Devrient GmbH": 1,
          "Report for Sm@rtCaf\u00e9\u00ae Expert 7.0 C3, Version 2, 2017-08-16, BSI-DSZ-CC-1028-2017, T\u00dcViT GmbH (confidential document) [10] Evaluation Technical Report for Composite Evaluation according to AIS 36 for Sm@rtCaf\u00e9\u00ae": 1,
          "being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1,
          "confidential document) [12] Preparative procedures Sm@rtCaf\u00e9\u00ae Expert 7.0 C3, Version 3.6, 10.08.17, Giesecke \u0026 Devrient": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 14
        },
        "ECB": {
          "ECB": 4
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PGP": {
          "PGP": 1
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 2
        },
        "MAC": {
          "MAC": 7
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "TUV": {
          "T\u00dcV Informationstechnik": 2,
          "T\u00dcViT": 3
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 5
          },
          "SHA2": {
            "SHA-2": 4
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {
        "javacard": {
          "javacard.framework": 1,
          "javacard.security": 1
        },
        "javacardx": {
          "javacardx.apdu": 1,
          "javacardx.crypto": 1
        },
        "org": {
          "org.globalplatform": 1
        }
      },
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 5
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Fault Injection": 1,
          "malfunction": 1
        },
        "other": {
          "JIL": 4
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 1": 1,
          "AIS 20": 2,
          "AIS 25": 3,
          "AIS 26": 2,
          "AIS 32": 1,
          "AIS 34": 2,
          "AIS 35": 2,
          "AIS 36": 7,
          "AIS 37": 1,
          "AIS 38": 1,
          "AIS 46": 2,
          "AIS 47": 1
        },
        "FIPS": {
          "FIPS 197": 5,
          "FIPS 46-3": 10,
          "FIPS PUB 180-4": 1,
          "FIPS180-4": 14,
          "FIPS197": 1,
          "FIPS46-3": 1
        },
        "ISO": {
          "ISO/IEC 15408": 4,
          "ISO/IEC 17065": 2,
          "ISO/IEC 18045": 4,
          "ISO/IEC9796-2": 1
        },
        "NIST": {
          "SP 800-108": 1
        },
        "PKCS": {
          "PKCS5": 5
        },
        "RFC": {
          "RFC 3447": 15,
          "RFC 5639": 2,
          "RFC2409": 9,
          "RFC3447": 1,
          "RFC5639": 3
        },
        "SCP": {
          "SCP02": 1,
          "SCP03": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 11
          }
        },
        "DES": {
          "3DES": {
            "3-DES": 6,
            "3DES": 14
          },
          "DES": {
            "DES": 1
          }
        },
        "constructions": {
          "MAC": {
            "CBC-MAC": 4,
            "CMAC": 9
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI 7148": 1,
          "BSI TR-02102": 1,
          "BSI TR-02102-1": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "GD": {
          "G\u0026D": 11,
          "Giesecke \u0026 Devrient": 7,
          "Giesecke+Devrient": 4
        },
        "Infineon": {
          "Infineon": 4,
          "Infineon Technologies AG": 4
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20170908135818+02\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung, Java Card, BSI-DSZ-CC-1028-2017\"",
      "/ModDate": "D:20170921131202+02\u002700\u0027",
      "/Producer": "LibreOffice 5.2",
      "/Subject": "Common Crieria Certification",
      "/Title": "Certification Report BSI-DSZ-CC-1028-2017",
      "pdf_file_size_bytes": 1403909,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.bsi.bund.de/",
          "https://www.bsi.bund.de/zertifizierung",
          "http://www.sogisportal.eu/",
          "http://www.commoncriteriaportal.org/",
          "https://www.bsi.bund.de/TR",
          "https://www.bsi.bund.de/zertifizierungsreporte",
          "https://www.bsi.bund.de/AIS",
          "http://tools.ietf.org/html/rfc5639"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 46
    },
    "st_filename": "1028b_pdf.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 8
          },
          "ECDH": {
            "ECDH": 3
          },
          "ECDSA": {
            "ECDSA": 8
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 2
          },
          "DSA": {
            "DSA": 1
          }
        },
        "RSA": {
          "RSA-CRT": 11
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0951-2015": 4,
          "BSI-DSZ-CC-0951-2015-RA-01": 2
        }
      },
      "cc_claims": {
        "A": {
          "A.APPLET": 4,
          "A.DELETION": 5,
          "A.VERIFICATION": 4
        },
        "D": {
          "D.APP_I_DATA": 2,
          "D.CRYPTO": 2,
          "D.PIN": 1,
          "D.SEC_DATA": 1
        },
        "O": {
          "O.ALARM": 23,
          "O.APPLET": 15,
          "O.CARD-": 7,
          "O.CARD-MANAGEMENT": 27,
          "O.CIPHER": 20,
          "O.CODE_PKG": 13,
          "O.DELETION": 17,
          "O.FIREWALL": 44,
          "O.GLOBAL_ARRAYS": 1,
          "O.GLOBAL_ARRAYS_CONFID": 19,
          "O.GLOBAL_ARRAYS_INTEG": 9,
          "O.INSTALL": 16,
          "O.JAVAOBJECT": 39,
          "O.KEY-": 8,
          "O.KEY-MNGT": 18,
          "O.LOAD": 18,
          "O.NATIVE": 14,
          "O.OBJ-DELETION": 9,
          "O.OPERATE": 37,
          "O.PIN-": 2,
          "O.PIN-MNGT": 22,
          "O.PINMNGT": 1,
          "O.REALLOCATION": 18,
          "O.REMOTE": 3,
          "O.RESOURCES": 23,
          "O.RND": 4,
          "O.SCP": 73,
          "O.SHA": 1,
          "O.SID": 34,
          "O.TDES": 1,
          "O.TRANSACTION": 19
        },
        "OE": {
          "OE.APPLET": 9,
          "OE.CARD-MANAGEMENT": 5,
          "OE.CODE-": 6,
          "OE.CODE-EVIDENCE": 13,
          "OE.SCP": 13,
          "OE.VERIFICATION": 39
        },
        "OP": {
          "OP.ARRAY_ACCESS": 4,
          "OP.CREATE": 7,
          "OP.DELETE_APPLET": 4,
          "OP.DELETE_PCKG": 3,
          "OP.DELETE_PCKG_APPLET": 3,
          "OP.INSTANCE_FIELD": 4,
          "OP.INVK_INTERFACE": 7,
          "OP.INVK_VIRTUAL": 6,
          "OP.JAVA": 6,
          "OP.PUT": 5,
          "OP.THROW": 5,
          "OP.TYPE_ACCESS": 5
        },
        "OSP": {
          "OSP.VERIFICATION": 5
        },
        "R": {
          "R.JAVA": 9
        },
        "T": {
          "T.CONFID-": 8,
          "T.CONFID-APPLI-": 1,
          "T.CONFID-APPLI-DATA": 16,
          "T.CONFID-JCS-CODE": 3,
          "T.CONFID-JCS-DATA": 4,
          "T.DELETION": 4,
          "T.EXE-CODE": 6,
          "T.EXE-CODE-REMOTE": 3,
          "T.EXECODE": 1,
          "T.INSTALL": 5,
          "T.INTEG-": 10,
          "T.INTEG-APPLI-": 4,
          "T.INTEG-APPLI-CODE": 5,
          "T.INTEG-APPLI-DATA": 12,
          "T.INTEG-JCS-": 2,
          "T.INTEG-JCS-CODE": 5,
          "T.INTEG-JCS-DATA": 2,
          "T.INTEG-JCSCODE": 1,
          "T.INTEGAPPLI-CODE": 2,
          "T.INTEGAPPLI-DATA": 1,
          "T.INTEGJCS-DATA": 6,
          "T.NATIVE": 5,
          "T.OBJ-DELETION": 2,
          "T.OBJDELETION": 1,
          "T.PHYSICAL": 5,
          "T.RESOURCES": 7,
          "T.SECURE_DELETION": 8,
          "T.SID": 16
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0035-2007": 1,
          "BSI-CC-PP-0084-2014": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 5,
          "ADV_FSP.1": 3,
          "ADV_FSP.2": 2,
          "ADV_FSP.4": 1,
          "ADV_FSP.5": 8,
          "ADV_IMP.1": 6,
          "ADV_INT.2": 1,
          "ADV_TDS.1": 2,
          "ADV_TDS.3": 3,
          "ADV_TDS.4": 8
        },
        "AGD": {
          "AGD_OPE.1": 7,
          "AGD_PRE.1": 5
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.1": 1,
          "ALC_CMS.5": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 1,
          "ALC_DVS.2": 7,
          "ALC_FLR.1": 1,
          "ALC_LCD.1": 3,
          "ALC_TAT.1": 2,
          "ALC_TAT.2": 3
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 4,
          "ASE_INT.1": 3,
          "ASE_INT.2": 2,
          "ASE_OBJ.2": 3,
          "ASE_REQ.1": 2,
          "ASE_REQ.2": 2,
          "ASE_SPD.1": 2,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.1": 2,
          "ATE_COV.2": 3,
          "ATE_DPT.1": 1,
          "ATE_DPT.3": 1,
          "ATE_FUN.1": 6
        },
        "AVA": {
          "AVA_VAN.5": 6
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4+": 1,
          "EAL 5": 1,
          "EAL 5 augmented": 1,
          "EAL 6": 1,
          "EAL 6 augmented": 1,
          "EAL5": 4,
          "EAL5 augmented": 2,
          "EAL5+": 1,
          "EAL6+": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 20,
          "FAU_ARP.1.1": 1,
          "FAU_SAA.1": 3,
          "FAU_SAS.1": 1
        },
        "FCO": {
          "FCO_NRO": 6,
          "FCO_NRO.2": 3
        },
        "FCS": {
          "FCS_CKM": 7,
          "FCS_CKM.1": 53,
          "FCS_CKM.2": 9,
          "FCS_CKM.2.1": 1,
          "FCS_CKM.3": 7,
          "FCS_CKM.3.1": 1,
          "FCS_CKM.4": 28,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 7,
          "FCS_COP.1": 102,
          "FCS_RNG": 5,
          "FCS_RNG.1": 12,
          "FCS_RNG.1.1": 5,
          "FCS_RNG.1.2": 2
        },
        "FDP": {
          "FDP_ACC": 25,
          "FDP_ACC.1": 11,
          "FDP_ACC.2": 5,
          "FDP_ACF": 24,
          "FDP_ACF.1": 14,
          "FDP_IFC": 26,
          "FDP_IFC.1": 13,
          "FDP_IFC.2": 2,
          "FDP_IFF": 18,
          "FDP_IFF.1": 17,
          "FDP_ITC": 12,
          "FDP_ITC.1": 10,
          "FDP_ITC.2": 19,
          "FDP_RIP": 110,
          "FDP_RIP.1": 11,
          "FDP_ROL": 15,
          "FDP_ROL.1": 5,
          "FDP_SDC.1": 2,
          "FDP_SDI.1": 2,
          "FDP_SDI.2": 15,
          "FDP_SDI.2.1": 2,
          "FDP_SDI.2.2": 1,
          "FDP_UIT": 9,
          "FDP_UIT.1": 2
        },
        "FIA": {
          "FIA_ATD": 9,
          "FIA_ATD.1": 2,
          "FIA_UID": 15,
          "FIA_UID.1": 9,
          "FIA_UID.2": 1,
          "FIA_USB": 8,
          "FIA_USB.1": 3
        },
        "FMT": {
          "FMT_LIM": 4,
          "FMT_LIM.1": 1,
          "FMT_LIM.2": 1,
          "FMT_MSA": 94,
          "FMT_MSA.1": 10,
          "FMT_MSA.2": 2,
          "FMT_MSA.3": 17,
          "FMT_MTD": 20,
          "FMT_MTD.1": 2,
          "FMT_MTD.3": 1,
          "FMT_SMF": 22,
          "FMT_SMF.1": 19,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 33,
          "FMT_SMR.1": 31,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPR": {
          "FPR_UNO.1": 10,
          "FPR_UNO.1.1": 1
        },
        "FPT": {
          "FPT_FLS": 34,
          "FPT_FLS.1": 20,
          "FPT_FLS.1.1": 2,
          "FPT_ITT.1": 1,
          "FPT_PHP.3": 9,
          "FPT_PHP.3.1": 3,
          "FPT_RCV": 12,
          "FPT_RCV.3": 10,
          "FPT_TDC.1": 8,
          "FPT_TDC.1.1": 1,
          "FPT_TDC.1.2": 2,
          "FPT_TST.1": 8,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1,
          "FPT_TST.2": 1
        },
        "FRU": {
          "FRU_FLT.2": 1
        },
        "FTP": {
          "FTP_ITC": 14,
          "FTP_ITC.1": 8,
          "FTP_ITC.1.1": 1,
          "FTP_ITC.1.3": 1,
          "FTP_TRP.1": 2
        }
      },
      "certification_process": {
        "OutOfScope": {
          "a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 6
        },
        "ECB": {
          "ECB": 8
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IKE": {
          "IKE": 3
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 1
        },
        "KEX": {
          "Key Exchange": 3
        },
        "MAC": {
          "MAC": 13
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 4
          },
          "SHA2": {
            "SHA-2": 2,
            "SHA-224": 3,
            "SHA-256": 3,
            "SHA-384": 3,
            "SHA-512": 2
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {
        "misc": {
          "TYPE_ACCESS": 5
        }
      },
      "javacard_packages": {
        "javacard": {
          "javacard.framework": 5,
          "javacard.framework.applet": 1,
          "javacard.security": 10
        },
        "javacardx": {
          "javacardx.crypto": 1
        }
      },
      "javacard_version": {
        "JavaCard": {
          "Java Card 2.2.2": 3
        }
      },
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 4,
          "RNG": 7
        },
        "TRNG": {
          "TRNG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 5,
          "physical tampering": 5
        },
        "SCA": {
          "Leak-Inherent": 4,
          "physical probing": 1
        },
        "other": {
          "JIL": 2
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 20": 1,
          "AIS 31": 2,
          "AIS20": 5,
          "AIS31": 2
        },
        "CC": {
          "CCMB-2012-09-001": 2,
          "CCMB-2012-09-002": 2,
          "CCMB-2012-09-003": 2
        },
        "FIPS": {
          "FIPS 140-2": 1,
          "FIPS 180-3": 2,
          "FIPS 186-3": 4,
          "FIPS 197": 6,
          "FIPS PUB 180-3": 1,
          "FIPS PUB 186-3": 1,
          "FIPS180-4": 2,
          "FIPS46-3": 3
        },
        "ISO": {
          "ISO/IEC 14443": 2,
          "ISO/IEC 7816": 2,
          "ISO/IEC 9796-2": 1
        },
        "PKCS": {
          "PKCS#3": 1,
          "PKCS1": 9,
          "PKCS3": 1,
          "PKCS5": 3
        },
        "RFC": {
          "RFC 2409": 3,
          "RFC 3447": 4,
          "RFC 4056": 1,
          "RFC 4493": 1,
          "RFC 5639": 1,
          "RFC2409": 2,
          "RFC2437": 4,
          "RFC4493": 1,
          "RFC5639": 4
        },
        "SCP": {
          "SCP02": 3,
          "SCP03": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 26
          }
        },
        "DES": {
          "3DES": {
            "3-DES": 7,
            "3DES": 3,
            "TDEA": 1,
            "TDES": 2,
            "Triple-DES": 7
          },
          "DES": {
            "DES": 8
          }
        },
        "constructions": {
          "MAC": {
            "CBC-MAC": 5,
            "CMAC": 4
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "GD": {
          "G\u0026D": 14,
          "Giesecke \u0026 Devrient": 2,
          "Giesecke+Devrient": 8
        },
        "Infineon": {
          "Infineon": 3,
          "Infineon Technologies AG": 2
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Giesecke+Devrient Mobile Security GmbH /stut",
      "/Category": "Public",
      "/Chip": "M5073 G11",
      "/Comments": "Final",
      "/Company": "GuD",
      "/CreationDate": "D:20170816104040+02\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 11 f\u00fcr Word",
      "/HWManufacturer": "Infineon",
      "/Keywords": "Common Criteria CCv3.1 EAL5 augmented (EAL5+)",
      "/ModDate": "D:20170816110905+02\u002700\u0027",
      "/Producer": "Adobe PDF Library 11.0",
      "/ProductName": "Sm@rtCaf\u00e9\u00ae Expert 7.0 C3",
      "/SourceModified": "D:20170816084029",
      "/Subject": "Certificate BSI-DSZ-CC-1028-2017",
      "/TOE": "Sm@rtCaf\u00e9\u00ae Expert 7.0 C3",
      "/Title": "Security Target Lite Sm@rtCaf\u00e9\u00ae Expert 7.0 C3",
      "pdf_file_size_bytes": 1009080,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 126
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": "EAL4+",
        "pp_ids": {
          "_type": "Set",
          "elements": [
            "ANSSI-CC-PP-2010-03",
            "JCSPPC",
            "ANSSI-CC-PP-2001-03-M01"
          ]
        },
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/ANSSI-CC-profil_PP-2010-03en.pdf",
        "pp_name": "Java Card\u2122 System Protection Profile Open Configuration, Version 3.0"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1028a_pdf.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL5+",
      "AVA_VAN.5",
      "ALC_DVS.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1028b_pdf.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "5f3376fe53264e7948ccc1987bd494b0ac8e22c6196f082d602d7ac5323d19eb",
      "txt_hash": "0677c2d411228f159711a00af83a80152ee4196de153b922eaa3bfc26f84bdd5"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "bfcbfed007e7afbb358aec999acef14d83a8aeefbfce5313e818287469c3f8a6",
      "txt_hash": "9a0fc7494ad444368a198a5f9530f484328b315b6f03be13001e667bbbb2594a"
    }
  },
  "status": "archived"
}