Java Card Platform Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0
CSV information ?
Status | archived |
---|---|
Valid from | 17.02.2015 |
Valid until | 17.02.2020 |
Scheme | 🇩🇪 DE |
Manufacturer | Oracle Corporation |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | AVA_VAN.5, EAL5+, ALC_DVS.2 |
Protection profiles |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Symmetric Algorithms
AES, TDES, SEEDAsymmetric Algorithms
ECDH, ECDSA, DSAHash functions
SHA-1, SHA-2, MD5, RIPEMD160, RIPEMDRandomness
TRNG, RNGLibraries
v1.02.013Block cipher modes
CCMVendor
Infineon, Infineon Technologies AGSecurity level
EAL 5, EAL 4, EAL 1, EAL 2, EAL 5+, EAL 6, EAL 3, EAL 7, EAL 5 augmented, ITSEC EvaluationClaims
OE.VERIFICATIONSecurity Assurance Requirements (SAR)
ADV_FSP.5, ADV_INT.2, ADV_TDS.4, ADV_ARC.1, ADV_FSP.1, ADV_FSP.2, ADV_FSP.3, ADV_FSP.4, ADV_FSP.6, ADV_IMP.1, ADV_IMP.2, ADV_INT.1, ADV_INT.3, ADV_SPM.1, ADV_TDS.1, ADV_TDS.2, ADV_TDS.3, ADV_TDS.5, ADV_TDS.6, ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_FLR, ALC_CMS.5, ALC_TAT.2, ALC_CMC.1, ALC_CMC.2, ALC_CMC.3, ALC_CMC.4, ALC_CMC.5, ALC_CMS.1, ALC_CMS.2, ALC_CMS.3, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_FLR.1, ALC_FLR.2, ALC_FLR.3, ALC_LCD.1, ALC_LCD.2, ALC_TAT.1, ALC_TAT.3, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_DPT.3, ATE_COV, ATE_DPT, ATE_FUN, ATE_COV.1, ATE_COV.2, ATE_COV.3, ATE_DPT.1, ATE_DPT.2, ATE_DPT.4, ATE_FUN.1, ATE_FUN.2, ATE_IND.1, ATE_IND.2, ATE_IND.3, ATE_IND, AVA_VAN.5, AVA_VAN, AVA_VAN.1, AVA_VAN.2, AVA_VAN.3, AVA_VAN.4, APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.1, APE_OBJ.2, APE_ECD.1, APE_REQ.1, APE_REQ.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.1, ASE_REQ.2, ASE_TSS.1, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_SPD, ASE_TSSProtection profiles
ANSSI-CC-PP-2010/03-M01Certificates
BSI-DSZ-CC-0869-2015, BSI-DSZ-CC-0782-2012-MA-01, BSI-DSZ-CC-0782-MA-01, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0782Evaluation facilities
TÃœV Informationstechnik, TÃœViTSide-channel analysis
malfunction, JILCertification process
out of scope, the TOE, but pre-issuance loading of applets is possible. Native code post-issuance downloading is out of scope. The TOE fulfills the requirements of the Protection Profile Java Card Protection Profile - Open, and certification procedure is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the product or resulting from the evaluation and certification, SLJ 52GxxyyyzR) V1.0, BSI-DSZ-CC-0869-2015, ST Version 2.0, 20 November 2014, Oracle Corporation (confidential document) 9 specifically • AIS 1, Version 13, Durchführung der Ortsbesichtigung in der Entwicklungsumgebung, Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0, BSI-DSZ-CC-0869-2015, TÜViT GmbH (confidential document) [10] Configuration List BSI-DSZ-CC-0869-2015: Configuration Management Scope for Java Card, for Infineon on SLE78 (SLJ 52GxxyyyzR) V 1.0, Version 1.4, 29 January 2015, Oracle Corporation (confidential document) [11] AGD_OPE for Java Card Platform Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0, for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0, Version 1, 30 January 2015, TÜViT GmbH (confidential document) [19] Certification Report – for Infineon Security Controller M7892 B11 with optional RSA2048/4096, ETR for Composition (ETR-COMP), M7892 B11, BSI-DSZ-CC-0782, Version 5, 20 March 2014, TÜViT GmbH (confidential document) [21] SLx 70 Family Production and Personalization User’s Manual, Revision 2012-06-27, InfineonStandards
AIS 36, AIS20, AIS 34, AIS 26, AIS 20, AIS 35, AIS 1, AIS 25, AIS 32, AIS 46, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065, SCP02, SCP03, SCP01Technical reports
BSI TR-02102, BSI TR-02102-1, BSI 7138, BSI 7125, BSI 7148File metadata
Title | Certification Report BSI-DSZ-CC-0869-2015 |
---|---|
Subject | Common Criteria Certification BSI-DSZ-CC-0869-2015 |
Keywords | Common Criteria, Certification, Zertifizierung, BSI-DSZ-CC-0869-2015, Java Card |
Author | Bundesamt für Sicherheit in der Informationstechnik |
Creation date | D:20150227121448+01'00' |
Modification date | D:20150227130818+01'00' |
Pages | 40 |
Creator | Writer |
Producer | LibreOffice 4.2 |
Frontpage
Certificate ID | BSI-DSZ-CC-0869-2015 |
---|---|
Certified item | Java Card Platform Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0 |
Certification lab | BSI |
Developer | Oracle Corporation |
References
Outgoing- BSI-DSZ-CC-0782-2012 - archived - Infineon Security Controller M7892 B11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01 and Toolbox v1.02.013 libraries and with specific IC dedicated software (firmware)
- BSI-DSZ-CC-0869-V2-2019 - archived - Java Card Platform Implementation for Infineon on M7892 G12 (SLJ 52GxxyyyzC) V2.0
Security target ?
Extracted keywords
Symmetric Algorithms
AES, DES, TDES, Triple-DES, TDEA, SEED, CMACAsymmetric Algorithms
RSA-CRT, ECDH, ECDSA, ECC, Diffie-Hellman, DSAHash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-2, MD5, RIPEMD160, RIPEMD-160Schemes
MAC, Key exchange, Key Agreement, KARandomness
TRNG, RND, RNGLibraries
v1.02.013Elliptic Curves
P-192Block cipher modes
ECB, CBC, CCMJavaCard versions
Java Card 3.0.1JavaCard API constants
TYPE_ACCESSVendor
NXP Semiconductors, Infineon, Infineon Technologies AG, STMicroelectronicsSecurity level
EAL 5, EAL5, EAL 5 augmented, EAL5 augmentedClaims
D.APP_CODE, D.APP_C_DATA, D.APP_I_DATA, D.PIN, D.API_DATA, D.CRYPTO, D.JCS_CODE, D.JCS_DATA, D.SEC_DATA, D.JCS_KEYS, D.SEC_ATTRIBUTES, D.CM_APDU, O.CARD-MANAGEMENT, O.IC_SUPPORT, O.RECOVERY, O.OS_SUPPORT, O.COMMUNICATION, O.EXT-MEM, O.RND, O.REMOTE, O.DELETION, O.SID, O.FIREWALL, O.GLOBAL_ARRAYS_CONFID, O.GLOBAL_ARRAYS_INTEG, O.NATIVE, O.OPERATE, O.REALLOCATION, O.RESOURCES, O.ALARM, O.CIPHER, O.KEY-MNGT, O.PIN-MNGT, O.TRANSACTION, O.OBJ-DELETION, O.LOAD, O.INSTALL, O.CARD-, O.EXT-, O.APPLET, O.CODE_PKG, O.JAVAOBJECT, O.EXT_MEM_INSTANCE, O.PACKAGE, O.GLOBAL_ARRAYS_C, O.GLOBAL_ARRAYS_IN, O.KEY-, O.PIN-, O.OS, T.CONFID-APPLI-DATA, T.CONFID-JCS-CODE, T.CONFID-JCS-DATA, T.INTEG-APPLI-CODE, T.INTEG-APPLI-DATA, T.INTEG-JCS-CODE, T.INTEG-JCS-DATA, T.SID, T.EXE-CODE, T.NATIVE, T.RESOURCES, T.DELETION, T.INSTALL, T.COMMUNICATION, T.OBJ-DELETION, T.PHYSICAL, T.LEAKAGE, T.FAULT, T.RND, T.CONFID-APPLI-, T.INTEG-APPLI-, T.CONFID-JCS-, T.INTEG-, T.EXE-, T.INTEG-JCS-, A.DELETION, A.APPLET, A.VERIFICATION, R.JAVA, OP.ARRAY_ACCESS, OP.CREATE, OP.LOAD_PCKG, OP.DELETE_APPLET, OP.DELETE_PCKG, OP.DELETE_PCKG_APPLET, OP.GP, OP.INSTANCE_FIELD, OP.INVK_VIRTUAL, OP.INVK_INTERFACE, OP.JAVA, OP.THROW, OP.TYPE_ACCESS, OP.PUT, OP.CREATE_EXT_MEM_INSTANCE, OP.READ_EXT_MEM, OP.WRITE_EXT_MEM, OE.CARD-MANAGEMENT, OE.SCP, OE.CODE-EVIDENCE, OE.APPLET, OE.VERIFICATION, OE.CODE-, OSP.VERIFICATIONSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_TDS.1, ADV_FSP.4, ADV_TDS.3, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, ADV_FSP.5, ADV_FSP.2, ADV_TDS.2, ADV_COMP.1, AGD_OPE, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_TAT.1, ALC_TAT.2, ALC_CMC.4, ALC_CMS.1, ALC_DVS.1, ALC_LCD.1, ALC_CMS.4, ALC_DEL.1, ATE_COV.2, ATE_FUN.1, ATE_COV.1, ATE_DPT.1, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1, ASE_REQ.2, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_ARP.1, FAU_ARP.1.1, FAU_SAA.1, FCO_NRO, FCO_NRO.2, FCS_RNG, FCS_COP, FCS_RNG.1, FCS_CKM.1, FCS_CKM.2, FCS_CKM.2.1, FCS_CKM.3, FCS_CKM.3.1, FCS_CKM.4, FCS_CKM.4.1, FCS_COP.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM, FDP_ACC, FDP_ACC.2, FDP_ACF, FDP_ACF.1, FDP_IFC, FDP_IFC.1, FDP_IFF, FDP_IFF.1, FDP_RIP, FDP_RIP.1, FDP_ROL.1, FDP_ROL, FDP_SDI.2, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ITC, FDP_ITC.2, FDP_IFC.2, FDP_UIT, FDP_UIT.1, FDP_ACC.1, FDP_ITC.1, FDP_SDI.1, FDP_ITT.1, FIA_ATD, FIA_ATD.1, FIA_UID, FIA_UID.2, FIA_USB, FIA_USB.1, FIA_UID.1, FMT_MSA, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD, FMT_MTD.1, FMT_MTD.3, FMT_SMR, FMT_SMF, FPR_UNO.1, FPR_UNO.1.1, FPT_FLS.1, FPT_FLS.1.1, FPT_TDC.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_FLS, FPT_RCV, FPT_RCV.3, FPT_RCV.4, FPT_TST.1, FPT_PHP.3, FPT_ITT.1, FRU_FLT.2, FTP_ITC, FTP_ITC.1, FTP_TRP.1Protection profiles
BSI-PP-0035, BSI-PP-0017-2005, BSI-CC-PP-0035-2007Certificates
BSI-DSZ-CC-0782-MA-01, BSI-DSZ-CC-0869, BSI-DSZ-CC-0782-2012-MA-01Evaluation facilities
TÃœV Informationstechnik, TUV InformationstechnikSide-channel analysis
Leak-Inherent, physical probing, side channel, DPA, SPA, timing attacks, physical tampering, malfunction, MalfunctionCertification process
out of scope, by the TOE. There are no pre-issuance applets installed. Native code post-issuance downloading is out of scope The SCP is a certified hardware platform – the SLE78CLFX4000P(M) with RSA2048/4096 v1.02.013, EC v1, Software development environment. Phase 2 covers the Secure IC Development of Infineon and is out of scope of the TOE evaluation as that is part of the IC platform evaluation. In Phase 3, the Chip, a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.RECOVERY and O.OS_SUPPORT areStandards
FIPS 186-3, FIPS140, FIPS 180-4, FIPS 197, FIPS PUB 180-4, FIPS PUB 186-3, FIPS PUB 197, FIPS 140-2, NIST SP 800-108, NIST SP 800-38B, AIS20, AIS36, RFC 5639, ISO/IEC 18092, ISO/IEC7816, ISO/IEC 14443, ISO/IEC 15946-, ICAO, SCP02, SCP03, SCP01, SCP 03, SCP 02File metadata
Title | Security Target Lite - Java Card Platform on SLE 78 (SLJ 52) |
---|---|
Subject | Common Criteria - ASE |
Keywords | Java Card Platform, Smart Card, |
Author | TÃœV Informationstechnik GmbH, Roland Atoui, Linda Kyrnitszke |
Creation date | D:20141120164433+01'00' |
Modification date | D:20141120164433+01'00' |
Pages | 158 |
Creator | Microsoft® Office Word 2007 |
Producer | Microsoft® Office Word 2007 |
Heuristics ?
Extracted SARs
ALC_LCD.1, ATE_DPT.1, APE_OBJ.2, ADV_TDS.4, APE_ECD.1, ALC_FLR.3, APE_INT.1, ATE_COV.2, APE_CCL.1, ASE_INT.1, ASE_SPD.1, AVA_VAN.5, ASE_TSS.1, ADV_ARC.1, ASE_ECD.1, ATE_IND.3, ALC_CMS.4, ALC_DEL.1, ALC_CMC.4, ATE_FUN.1, APE_REQ.2, ALC_TAT.2, ADV_INT.2, AGD_OPE.1, ADV_FSP.5, ASE_REQ.2, AGD_PRE.1, ADV_SPM.1, ALC_DVS.2, ASE_OBJ.2, ADV_COMP.1, APE_SPD.1, ASE_CCL.1, ADV_IMP.1References ?
Updates ?
-
17.10.2024 The certificate data changed.
Certificate changed
The Protection Profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Java Cardâ„¢ System Protection Profile Open Configuration, Version 3.0', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/ANSSI-CC-profil_PP-2010-03en.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['ANSSI-CC-PP-2010-03', 'JCSPPC', 'ANSSI-CC-PP-2001-03-M01']}}]}
.
- The new value is
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '4919856aca1390ba0a11287b0ddfa3e9f976f6e678b2b2a2dc44f58e4842fcc2', 'txt_hash': '16970b2f509be251e90601cc89d5bda8e4182f8616c7069cefd49701a354a75d'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '3db4cbb37700c9c4a1a564689053f9f989120c0d09b8dc8720e40c7d776bc7fa', 'txt_hash': '67fedaf86fe2fd88b1299bfe9370da6eac9f84609bf8171fc31bd530d17d0443'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 1268716, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 40, '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/CreationDate': "D:20150227121448+01'00'", '/Creator': 'Writer', '/Keywords': 'Common Criteria, Certification, Zertifizierung, BSI-DSZ-CC-0869-2015, Java Card', '/ModDate': "D:20150227130818+01'00'", '/Producer': 'LibreOffice 4.2', '/Subject': 'Common Criteria Certification BSI-DSZ-CC-0869-2015', '/Title': 'Certification Report BSI-DSZ-CC-0869-2015', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.commoncriteriaportal.org/', 'https://www.bsi.bund.de/', 'https://www.bsi.bund.de/zertifizierung']}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 2880995, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 158, '/Title': 'Security Target Lite - Java Card Platform on SLE 78 (SLJ 52)', '/Author': 'TÜV Informationstechnik GmbH, Roland Atoui, Linda Kyrnitszke', '/Subject': 'Common Criteria - ASE', '/Keywords': 'Java Card Platform, Smart Card,', '/Creator': 'Microsoft® Office Word 2007', '/CreationDate': "D:20141120164433+01'00'", '/ModDate': "D:20141120164433+01'00'", '/Producer': 'Microsoft® Office Word 2007', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.iso.org/iso/iso_catalogue/catalogue_tc/catalogue_detail.htm?csnumber=30656']}}
. - The report_frontpage property was set to
{'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-0869-2015', 'cert_item': 'Java Card Platform Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0', 'developer': 'Oracle Corporation', 'cert_lab': 'BSI', 'ref_protection_profiles': 'Java Card Protection Profile - Open Configuration, Version 3.0, May 2012, ANSSI-CC-PP-2010/03-M01', 'cc_version': 'PP conformant including optional package EMG plus product specific extensions Common Criteria Part 2 extended', 'cc_security_level': 'Common Criteria Part 3 conformant EAL 5 augmented by ALC_DVS.2 and AVA_VAN.5 Valid until (*): 17 February 2020 SOGIS Recognition Agreement'}}
. - The report_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0869-2015': 24, 'BSI-DSZ-CC-0782-2012-MA-01': 2, 'BSI-DSZ-CC-0782-MA-01': 2, 'BSI-DSZ-CC-0782-2012': 2, 'BSI-DSZ-CC-0782': 1}}, 'cc_protection_profile_id': {'ANSSI': {'ANSSI-CC-PP-2010/03-M01': 4}}, 'cc_security_level': {'EAL': {'EAL 5': 14, 'EAL 4': 9, 'EAL 1': 7, 'EAL 2': 4, 'EAL 5+': 1, 'EAL 6': 4, 'EAL 3': 4, 'EAL 7': 4, 'EAL 5 augmented': 3}, 'ITSEC': {'ITSEC Evaluation': 1}}, 'cc_sar': {'ADV': {'ADV_FSP.5': 2, 'ADV_INT.2': 2, 'ADV_TDS.4': 2, 'ADV_ARC.1': 1, 'ADV_FSP.1': 1, 'ADV_FSP.2': 1, 'ADV_FSP.3': 1, 'ADV_FSP.4': 1, 'ADV_FSP.6': 1, 'ADV_IMP.1': 1, 'ADV_IMP.2': 1, 'ADV_INT.1': 1, 'ADV_INT.3': 1, 'ADV_SPM.1': 1, 'ADV_TDS.1': 1, 'ADV_TDS.2': 1, 'ADV_TDS.3': 1, 'ADV_TDS.5': 1, 'ADV_TDS.6': 1, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE': 2, 'AGD_PRE': 3, 'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_DVS.2': 7, 'ALC_FLR': 3, 'ALC_CMS.5': 3, 'ALC_TAT.2': 3, 'ALC_CMC.1': 1, 'ALC_CMC.2': 1, 'ALC_CMC.3': 1, 'ALC_CMC.4': 2, 'ALC_CMC.5': 1, 'ALC_CMS.1': 1, 'ALC_CMS.2': 1, 'ALC_CMS.3': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 2, 'ALC_DVS.1': 1, 'ALC_FLR.1': 1, 'ALC_FLR.2': 1, 'ALC_FLR.3': 1, 'ALC_LCD.1': 2, 'ALC_LCD.2': 1, 'ALC_TAT.1': 1, 'ALC_TAT.3': 1, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_DPT.3': 2, 'ATE_COV': 2, 'ATE_DPT': 2, 'ATE_FUN': 2, 'ATE_COV.1': 1, 'ATE_COV.2': 1, 'ATE_COV.3': 1, 'ATE_DPT.1': 1, 'ATE_DPT.2': 1, 'ATE_DPT.4': 1, 'ATE_FUN.1': 1, 'ATE_FUN.2': 1, 'ATE_IND.1': 1, 'ATE_IND.2': 1, 'ATE_IND.3': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.5': 6, 'AVA_VAN': 3, 'AVA_VAN.1': 1, 'AVA_VAN.2': 1, 'AVA_VAN.3': 1, 'AVA_VAN.4': 1}, 'APE': {'APE_INT.1': 1, 'APE_CCL.1': 1, 'APE_SPD.1': 1, 'APE_OBJ.1': 1, 'APE_OBJ.2': 1, 'APE_ECD.1': 1, 'APE_REQ.1': 1, 'APE_REQ.2': 1}, 'ASE': {'ASE_INT.1': 1, 'ASE_CCL.1': 1, 'ASE_SPD.1': 1, 'ASE_OBJ.1': 1, 'ASE_OBJ.2': 1, 'ASE_ECD.1': 1, 'ASE_REQ.1': 1, 'ASE_REQ.2': 1, 'ASE_TSS.1': 1, 'ASE_TSS.2': 1, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {'OE': {'OE.VERIFICATION': 3}}, 'vendor': {'Infineon': {'Infineon': 26, 'Infineon Technologies AG': 3}}, 'eval_facility': {'TUV': {'TÜV Informationstechnik': 2, 'TÜViT': 3}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 2}}, 'DES': {'3DES': {'TDES': 2}}, 'miscellaneous': {'SEED': {'SEED': 2}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 1}, 'ECDSA': {'ECDSA': 1}}, 'FF': {'DSA': {'DSA': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}, 'SHA2': {'SHA-2': 4}}, 'MD': {'MD5': {'MD5': 2}}, 'RIPEMD': {'RIPEMD160': 1, 'RIPEMD': 1}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 2}, 'RNG': {'RNG': 6}}, 'cipher_mode': {'CCM': {'CCM': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Infineon': {'v1.02.013': 5}}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'malfunction': 1}, 'other': {'JIL': 4}}, 'technical_report_id': {'BSI': {'BSI TR-02102': 1, 'BSI TR-02102-1': 1, 'BSI 7138': 2, 'BSI 7125': 2, 'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS 36': 6, 'AIS20': 1, 'AIS 34': 2, 'AIS 26': 2, 'AIS 20': 2, 'AIS 35': 2, 'AIS 1': 1, 'AIS 25': 1, 'AIS 32': 1, 'AIS 46': 1}, 'ISO': {'ISO/IEC 15408': 4, 'ISO/IEC 18045': 4, 'ISO/IEC 17065': 2}, 'SCP': {'SCP02': 2, 'SCP03': 3, 'SCP01': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'the TOE, but pre-issuance loading of applets is possible. Native code post-issuance downloading is out of scope. The TOE fulfills the requirements of the Protection Profile Java Card Protection Profile - Open': 1}, 'ConfidentialDocument': {'and certification procedure is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the product or resulting from the evaluation and certification': 1, 'SLJ 52GxxyyyzR) V1.0, BSI-DSZ-CC-0869-2015, ST Version 2.0, 20 November 2014, Oracle Corporation (confidential document) 9 specifically • AIS 1, Version 13, Durchführung der Ortsbesichtigung in der Entwicklungsumgebung': 1, 'Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0, BSI-DSZ-CC-0869-2015, TÜViT GmbH (confidential document) [10] Configuration List BSI-DSZ-CC-0869-2015: Configuration Management Scope for Java Card': 1, 'for Infineon on SLE78 (SLJ 52GxxyyyzR) V 1.0, Version 1.4, 29 January 2015, Oracle Corporation (confidential document) [11] AGD_OPE for Java Card Platform Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0': 1, 'for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0, Version 1, 30 January 2015, TÜViT GmbH (confidential document) [19] Certification Report – for Infineon Security Controller M7892 B11 with optional RSA2048/4096': 1, 'ETR for Composition (ETR-COMP), M7892 B11, BSI-DSZ-CC-0782, Version 5, 20 March 2014, TÜViT GmbH (confidential document) [21] SLx 70 Family Production and Personalization User’s Manual, Revision 2012-06-27, Infineon': 1}}}
. - The st_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0782-MA-01': 2, 'BSI-DSZ-CC-0869': 1, 'BSI-DSZ-CC-0782-2012-MA-01': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0035': 1, 'BSI-PP-0017-2005': 1, 'BSI-CC-PP-0035-2007': 1}}, 'cc_security_level': {'EAL': {'EAL 5': 1, 'EAL5': 6, 'EAL 5 augmented': 1, 'EAL5 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 6, 'ADV_FSP.1': 4, 'ADV_TDS.1': 2, 'ADV_FSP.4': 2, 'ADV_TDS.3': 10, 'ADV_IMP.1': 9, 'ADV_INT.2': 1, 'ADV_TDS.4': 1, 'ADV_FSP.5': 7, 'ADV_FSP.2': 2, 'ADV_TDS.2': 1, 'ADV_COMP.1': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1, 'AGD_OPE.1': 10, 'AGD_PRE.1': 6}, 'ALC': {'ALC_DVS.2': 6, 'ALC_TAT.1': 2, 'ALC_TAT.2': 3, 'ALC_CMC.4': 1, 'ALC_CMS.1': 1, 'ALC_DVS.1': 2, 'ALC_LCD.1': 3, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.2': 3, 'ATE_FUN.1': 6, 'ATE_COV.1': 2, 'ATE_DPT.1': 2}, 'AVA': {'AVA_VAN.5': 6}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 4, 'ASE_INT.1': 5, 'ASE_REQ.1': 2, 'ASE_REQ.2': 2, 'ASE_OBJ.2': 3, 'ASE_SPD.1': 2, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 24, 'FAU_ARP.1.1': 1, 'FAU_SAA.1': 3}, 'FCO': {'FCO_NRO': 6, 'FCO_NRO.2': 6}, 'FCS': {'FCS_RNG': 4, 'FCS_COP': 32, 'FCS_RNG.1': 14, 'FCS_CKM.1': 19, 'FCS_CKM.2': 11, 'FCS_CKM.2.1': 1, 'FCS_CKM.3': 7, 'FCS_CKM.3.1': 1, 'FCS_CKM.4': 17, 'FCS_CKM.4.1': 1, 'FCS_COP.1': 26, 'FCS_RNG.1.1': 2, 'FCS_RNG.1.2': 2, 'FCS_CKM': 6}, 'FDP': {'FDP_ACC': 40, 'FDP_ACC.2': 5, 'FDP_ACF': 38, 'FDP_ACF.1': 24, 'FDP_IFC': 25, 'FDP_IFC.1': 15, 'FDP_IFF': 18, 'FDP_IFF.1': 17, 'FDP_RIP': 135, 'FDP_RIP.1': 11, 'FDP_ROL.1': 5, 'FDP_ROL': 16, 'FDP_SDI.2': 13, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_ITC': 12, 'FDP_ITC.2': 13, 'FDP_IFC.2': 2, 'FDP_UIT': 6, 'FDP_UIT.1': 2, 'FDP_ACC.1': 17, 'FDP_ITC.1': 4, 'FDP_SDI.1': 1, 'FDP_ITT.1': 1}, 'FIA': {'FIA_ATD': 9, 'FIA_ATD.1': 2, 'FIA_UID': 22, 'FIA_UID.2': 1, 'FIA_USB': 6, 'FIA_USB.1': 3, 'FIA_UID.1': 12}, 'FMT': {'FMT_MSA': 135, 'FMT_MSA.1': 14, 'FMT_MSA.2': 2, 'FMT_MSA.3': 22, 'FMT_SMF.1': 22, 'FMT_SMF.1.1': 1, 'FMT_SMR.1': 37, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MTD': 20, 'FMT_MTD.1': 2, 'FMT_MTD.3': 1, 'FMT_SMR': 43, 'FMT_SMF': 41}, 'FPR': {'FPR_UNO.1': 13, 'FPR_UNO.1.1': 1}, 'FPT': {'FPT_FLS.1': 16, 'FPT_FLS.1.1': 2, 'FPT_TDC.1': 8, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 1, 'FPT_FLS': 36, 'FPT_RCV': 27, 'FPT_RCV.3': 13, 'FPT_RCV.4': 2, 'FPT_TST.1': 1, 'FPT_PHP.3': 1, 'FPT_ITT.1': 1}, 'FRU': {'FRU_FLT.2': 1}, 'FTP': {'FTP_ITC': 10, 'FTP_ITC.1': 5, 'FTP_TRP.1': 2}}, 'cc_claims': {'D': {'D.APP_CODE': 7, 'D.APP_C_DATA': 3, 'D.APP_I_DATA': 5, 'D.PIN': 6, 'D.API_DATA': 3, 'D.CRYPTO': 6, 'D.JCS_CODE': 3, 'D.JCS_DATA': 4, 'D.SEC_DATA': 8, 'D.JCS_KEYS': 3, 'D.SEC_ATTRIBUTES': 2, 'D.CM_APDU': 1}, 'O': {'O.CARD-MANAGEMENT': 33, 'O.IC_SUPPORT': 17, 'O.RECOVERY': 24, 'O.OS_SUPPORT': 23, 'O.COMMUNICATION': 11, 'O.EXT-MEM': 20, 'O.RND': 14, 'O.REMOTE': 1, 'O.DELETION': 15, 'O.SID': 35, 'O.FIREWALL': 46, 'O.GLOBAL_ARRAYS_CONFID': 17, 'O.GLOBAL_ARRAYS_INTEG': 9, 'O.NATIVE': 13, 'O.OPERATE': 35, 'O.REALLOCATION': 17, 'O.RESOURCES': 24, 'O.ALARM': 21, 'O.CIPHER': 16, 'O.KEY-MNGT': 24, 'O.PIN-MNGT': 22, 'O.TRANSACTION': 18, 'O.OBJ-DELETION': 8, 'O.LOAD': 18, 'O.INSTALL': 15, 'O.CARD-': 6, 'O.EXT-': 1, 'O.APPLET': 19, 'O.CODE_PKG': 16, 'O.JAVAOBJECT': 41, 'O.EXT_MEM_INSTANCE': 10, 'O.PACKAGE': 2, 'O.GLOBAL_ARRAYS_C': 1, 'O.GLOBAL_ARRAYS_IN': 1, 'O.KEY-': 1, 'O.PIN-': 1, 'O.OS': 1}, 'T': {'T.CONFID-APPLI-DATA': 17, 'T.CONFID-JCS-CODE': 6, 'T.CONFID-JCS-DATA': 6, 'T.INTEG-APPLI-CODE': 9, 'T.INTEG-APPLI-DATA': 18, 'T.INTEG-JCS-CODE': 8, 'T.INTEG-JCS-DATA': 7, 'T.SID': 19, 'T.EXE-CODE': 8, 'T.NATIVE': 6, 'T.RESOURCES': 9, 'T.DELETION': 5, 'T.INSTALL': 6, 'T.COMMUNICATION': 5, 'T.OBJ-DELETION': 4, 'T.PHYSICAL': 8, 'T.LEAKAGE': 5, 'T.FAULT': 5, 'T.RND': 5, 'T.CONFID-APPLI-': 3, 'T.INTEG-APPLI-': 10, 'T.CONFID-JCS-': 8, 'T.INTEG-': 10, 'T.EXE-': 1, 'T.INTEG-JCS-': 1}, 'A': {'A.DELETION': 1, 'A.APPLET': 6, 'A.VERIFICATION': 6}, 'R': {'R.JAVA': 12}, 'OP': {'OP.ARRAY_ACCESS': 4, 'OP.CREATE': 7, 'OP.LOAD_PCKG': 1, 'OP.DELETE_APPLET': 4, 'OP.DELETE_PCKG': 3, 'OP.DELETE_PCKG_APPLET': 3, 'OP.GP': 3, 'OP.INSTANCE_FIELD': 4, 'OP.INVK_VIRTUAL': 6, 'OP.INVK_INTERFACE': 7, 'OP.JAVA': 5, 'OP.THROW': 5, 'OP.TYPE_ACCESS': 5, 'OP.PUT': 6, 'OP.CREATE_EXT_MEM_INSTANCE': 3, 'OP.READ_EXT_MEM': 3, 'OP.WRITE_EXT_MEM': 3}, 'OE': {'OE.CARD-MANAGEMENT': 2, 'OE.SCP': 6, 'OE.CODE-EVIDENCE': 17, 'OE.APPLET': 8, 'OE.VERIFICATION': 38, 'OE.CODE-': 4}, 'OSP': {'OSP.VERIFICATION': 6}}, 'vendor': {'NXP': {'NXP Semiconductors': 1}, 'Infineon': {'Infineon': 182, 'Infineon Technologies AG': 2}, 'STMicroelectronics': {'STMicroelectronics': 1}}, 'eval_facility': {'TUV': {'TÜV Informationstechnik': 1, 'TUV Informationstechnik': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 19}}, 'DES': {'DES': {'DES': 9}, '3DES': {'TDES': 22, 'Triple-DES': 1, 'TDEA': 1}}, 'miscellaneous': {'SEED': {'SEED': 2}}, 'constructions': {'MAC': {'CMAC': 1}}}, 'asymmetric_crypto': {'RSA': {'RSA-CRT': 3}, 'ECC': {'ECDH': {'ECDH': 5}, 'ECDSA': {'ECDSA': 10}, 'ECC': {'ECC': 11}}, 'FF': {'DH': {'Diffie-Hellman': 1}, 'DSA': {'DSA': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}, 'SHA2': {'SHA-224': 1, 'SHA-256': 1, 'SHA-384': 1, 'SHA-512': 1, 'SHA-2': 5}}, 'MD': {'MD5': {'MD5': 3}}, 'RIPEMD': {'RIPEMD160': 1, 'RIPEMD-160': 2}}, 'crypto_scheme': {'MAC': {'MAC': 4}, 'KEX': {'Key exchange': 1}, 'KA': {'Key Agreement': 2, 'KA': 2}}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 3}, 'RNG': {'RND': 20, 'RNG': 11}}, 'cipher_mode': {'ECB': {'ECB': 6}, 'CBC': {'CBC': 21}, 'CCM': {'CCM': 1}}, 'ecc_curve': {'NIST': {'P-192': 2}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Infineon': {'v1.02.013': 3}}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 2, 'physical probing': 3, 'side channel': 1, 'DPA': 4, 'SPA': 1, 'timing attacks': 1}, 'FI': {'physical tampering': 1, 'malfunction': 4, 'Malfunction': 3}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 186-3': 7, 'FIPS140': 2, 'FIPS 180-4': 6, 'FIPS 197': 9, 'FIPS PUB 180-4': 1, 'FIPS PUB 186-3': 1, 'FIPS PUB 197': 1, 'FIPS 140-2': 1}, 'NIST': {'NIST SP 800-108': 1, 'NIST SP 800-38B': 1}, 'BSI': {'AIS20': 4, 'AIS36': 2}, 'RFC': {'RFC 5639': 5}, 'ISO': {'ISO/IEC 18092': 2, 'ISO/IEC7816': 2, 'ISO/IEC 14443': 2, 'ISO/IEC 15946-': 5}, 'ICAO': {'ICAO': 6}, 'SCP': {'SCP02': 9, 'SCP03': 9, 'SCP01': 2, 'SCP 03': 3, 'SCP 02': 2}}, 'javacard_version': {'JavaCard': {'Java Card 3.0.1': 3}}, 'javacard_api_const': {'misc': {'TYPE_ACCESS': 5}}, 'javacard_packages': {'javacard': {'javacard.security': 3, 'javacard.framework': 4}, 'javacardx': {'javacardx.crypto': 3, 'javacardx.security': 1, 'javacardx.external': 1}}, 'certification_process': {'OutOfScope': {'out of scope': 3, 'by the TOE. There are no pre-issuance applets installed. Native code post-issuance downloading is out of scope The SCP is a certified hardware platform – the SLE78CLFX4000P(M) with RSA2048/4096 v1.02.013, EC v1': 1, 'Software development environment. Phase 2 covers the Secure IC Development of Infineon and is out of scope of the TOE evaluation as that is part of the IC platform evaluation. In Phase 3, the Chip': 1, 'a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.RECOVERY and O.OS_SUPPORT are': 1}}}
. - The report_filename property was set to
0869a_pdf.pdf
. - The st_filename property was set to
0869b_pdf.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['BSI']
. - The cert_id property was set to
BSI-DSZ-CC-0869-2015
. - The report_references property was updated, with the
{'directly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0869-V2-2019']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['JISEC-CC-CRP-C0649-01-2019', 'BSI-DSZ-CC-0869-V2-2019', 'JISEC-CC-CRP-C0648-01-2019']}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-2012']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-2012']}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0869a_pdf.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0869b_pdf.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}]}
values discarded.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The report_references property was updated, with the
{'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}
data.
- The report_references property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Java Card Platform Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "a43ba4af9421da93",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-0869-2015",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_COMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"1.0"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0869-V2-2019"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0782-2012"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0869-V2-2019",
"JISEC-CC-CRP-C0648-01-2019",
"JISEC-CC-CRP-C0649-01-2019"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0782-2012"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Oracle Corporation",
"manufacturer_web": "https://www.oracle.com",
"name": "Java Card Platform Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0",
"not_valid_after": "2020-02-17",
"not_valid_before": "2015-02-17",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "0869a_pdf.pdf",
"report_frontpage": {
"DE": {
"cc_security_level": "Common Criteria Part 3 conformant EAL 5 augmented by ALC_DVS.2 and AVA_VAN.5 Valid until (*): 17 February 2020 SOGIS Recognition Agreement",
"cc_version": "PP conformant including optional package EMG plus product specific extensions Common Criteria Part 2 extended",
"cert_id": "BSI-DSZ-CC-0869-2015",
"cert_item": "Java Card Platform Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0",
"cert_lab": "BSI",
"developer": "Oracle Corporation",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
],
"ref_protection_profiles": "Java Card Protection Profile - Open Configuration, Version 3.0, May 2012, ANSSI-CC-PP-2010/03-M01"
}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDH": {
"ECDH": 1
},
"ECDSA": {
"ECDSA": 1
}
},
"FF": {
"DSA": {
"DSA": 2
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0782": 1,
"BSI-DSZ-CC-0782-2012": 2,
"BSI-DSZ-CC-0782-2012-MA-01": 2,
"BSI-DSZ-CC-0782-MA-01": 2,
"BSI-DSZ-CC-0869-2015": 24
}
},
"cc_claims": {
"OE": {
"OE.VERIFICATION": 3
}
},
"cc_protection_profile_id": {
"ANSSI": {
"ANSSI-CC-PP-2010/03-M01": 4
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 1,
"ADV_FSP": 1,
"ADV_FSP.1": 1,
"ADV_FSP.2": 1,
"ADV_FSP.3": 1,
"ADV_FSP.4": 1,
"ADV_FSP.5": 2,
"ADV_FSP.6": 1,
"ADV_IMP": 1,
"ADV_IMP.1": 1,
"ADV_IMP.2": 1,
"ADV_INT": 1,
"ADV_INT.1": 1,
"ADV_INT.2": 2,
"ADV_INT.3": 1,
"ADV_SPM": 1,
"ADV_SPM.1": 1,
"ADV_TDS": 1,
"ADV_TDS.1": 1,
"ADV_TDS.2": 1,
"ADV_TDS.3": 1,
"ADV_TDS.4": 2,
"ADV_TDS.5": 1,
"ADV_TDS.6": 1
},
"AGD": {
"AGD_OPE": 2,
"AGD_OPE.1": 1,
"AGD_PRE": 3,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.1": 1,
"ALC_CMC.2": 1,
"ALC_CMC.3": 1,
"ALC_CMC.4": 2,
"ALC_CMC.5": 1,
"ALC_CMS": 1,
"ALC_CMS.1": 1,
"ALC_CMS.2": 1,
"ALC_CMS.3": 1,
"ALC_CMS.4": 1,
"ALC_CMS.5": 3,
"ALC_DEL": 1,
"ALC_DEL.1": 2,
"ALC_DVS": 1,
"ALC_DVS.1": 1,
"ALC_DVS.2": 7,
"ALC_FLR": 3,
"ALC_FLR.1": 1,
"ALC_FLR.2": 1,
"ALC_FLR.3": 1,
"ALC_LCD.1": 2,
"ALC_LCD.2": 1,
"ALC_TAT": 1,
"ALC_TAT.1": 1,
"ALC_TAT.2": 3,
"ALC_TAT.3": 1
},
"APE": {
"APE_CCL.1": 1,
"APE_ECD.1": 1,
"APE_INT.1": 1,
"APE_OBJ.1": 1,
"APE_OBJ.2": 1,
"APE_REQ.1": 1,
"APE_REQ.2": 1,
"APE_SPD.1": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_CCL.1": 1,
"ASE_ECD": 1,
"ASE_ECD.1": 1,
"ASE_INT": 1,
"ASE_INT.1": 1,
"ASE_OBJ": 1,
"ASE_OBJ.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.1": 1,
"ASE_REQ.2": 1,
"ASE_SPD": 1,
"ASE_SPD.1": 1,
"ASE_TSS": 1,
"ASE_TSS.1": 1,
"ASE_TSS.2": 1
},
"ATE": {
"ATE_COV": 2,
"ATE_COV.1": 1,
"ATE_COV.2": 1,
"ATE_COV.3": 1,
"ATE_DPT": 2,
"ATE_DPT.1": 1,
"ATE_DPT.2": 1,
"ATE_DPT.3": 2,
"ATE_DPT.4": 1,
"ATE_FUN": 2,
"ATE_FUN.1": 1,
"ATE_FUN.2": 1,
"ATE_IND": 1,
"ATE_IND.1": 1,
"ATE_IND.2": 1,
"ATE_IND.3": 1
},
"AVA": {
"AVA_VAN": 3,
"AVA_VAN.1": 1,
"AVA_VAN.2": 1,
"AVA_VAN.3": 1,
"AVA_VAN.4": 1,
"AVA_VAN.5": 6
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 7,
"EAL 2": 4,
"EAL 3": 4,
"EAL 4": 9,
"EAL 5": 14,
"EAL 5 augmented": 3,
"EAL 5+": 1,
"EAL 6": 4,
"EAL 7": 4
},
"ITSEC": {
"ITSEC Evaluation": 1
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"ETR for Composition (ETR-COMP), M7892 B11, BSI-DSZ-CC-0782, Version 5, 20 March 2014, T\u00dcViT GmbH (confidential document) [21] SLx 70 Family Production and Personalization User\u2019s Manual, Revision 2012-06-27, Infineon": 1,
"Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0, BSI-DSZ-CC-0869-2015, T\u00dcViT GmbH (confidential document) [10] Configuration List BSI-DSZ-CC-0869-2015: Configuration Management Scope for Java Card": 1,
"SLJ 52GxxyyyzR) V1.0, BSI-DSZ-CC-0869-2015, ST Version 2.0, 20 November 2014, Oracle Corporation (confidential document) 9 specifically \u2022 AIS 1, Version 13, Durchf\u00fchrung der Ortsbesichtigung in der Entwicklungsumgebung": 1,
"and certification procedure is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the product or resulting from the evaluation and certification": 1,
"for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0, Version 1, 30 January 2015, T\u00dcViT GmbH (confidential document) [19] Certification Report \u2013 for Infineon Security Controller M7892 B11 with optional RSA2048/4096": 1,
"for Infineon on SLE78 (SLJ 52GxxyyyzR) V 1.0, Version 1.4, 29 January 2015, Oracle Corporation (confidential document) [11] AGD_OPE for Java Card Platform Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0": 1
},
"OutOfScope": {
"out of scope": 1,
"the TOE, but pre-issuance loading of applets is possible. Native code post-issuance downloading is out of scope. The TOE fulfills the requirements of the Protection Profile Java Card Protection Profile - Open": 1
}
},
"cipher_mode": {
"CCM": {
"CCM": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"Infineon": {
"v1.02.013": 5
}
},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"TUV": {
"T\u00dcV Informationstechnik": 2,
"T\u00dcViT": 3
}
},
"hash_function": {
"MD": {
"MD5": {
"MD5": 2
}
},
"RIPEMD": {
"RIPEMD": 1,
"RIPEMD160": 1
},
"SHA": {
"SHA1": {
"SHA-1": 1
},
"SHA2": {
"SHA-2": 4
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 6
},
"TRNG": {
"TRNG": 2
}
},
"side_channel_analysis": {
"FI": {
"malfunction": 1
},
"other": {
"JIL": 4
}
},
"standard_id": {
"BSI": {
"AIS 1": 1,
"AIS 20": 2,
"AIS 25": 1,
"AIS 26": 2,
"AIS 32": 1,
"AIS 34": 2,
"AIS 35": 2,
"AIS 36": 6,
"AIS 46": 1,
"AIS20": 1
},
"ISO": {
"ISO/IEC 15408": 4,
"ISO/IEC 17065": 2,
"ISO/IEC 18045": 4
},
"SCP": {
"SCP01": 2,
"SCP02": 2,
"SCP03": 3
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 2
}
},
"DES": {
"3DES": {
"TDES": 2
}
},
"miscellaneous": {
"SEED": {
"SEED": 2
}
}
},
"technical_report_id": {
"BSI": {
"BSI 7125": 2,
"BSI 7138": 2,
"BSI 7148": 1,
"BSI TR-02102": 1,
"BSI TR-02102-1": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon": 26,
"Infineon Technologies AG": 3
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20150227121448+01\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "Common Criteria, Certification, Zertifizierung, BSI-DSZ-CC-0869-2015, Java Card",
"/ModDate": "D:20150227130818+01\u002700\u0027",
"/Producer": "LibreOffice 4.2",
"/Subject": "Common Criteria Certification BSI-DSZ-CC-0869-2015",
"/Title": "Certification Report BSI-DSZ-CC-0869-2015",
"pdf_file_size_bytes": 1268716,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.commoncriteriaportal.org/",
"https://www.bsi.bund.de/zertifizierung",
"https://www.bsi.bund.de/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 40
},
"st_filename": "0869b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 11
},
"ECDH": {
"ECDH": 5
},
"ECDSA": {
"ECDSA": 10
}
},
"FF": {
"DH": {
"Diffie-Hellman": 1
},
"DSA": {
"DSA": 2
}
},
"RSA": {
"RSA-CRT": 3
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0782-2012-MA-01": 1,
"BSI-DSZ-CC-0782-MA-01": 2,
"BSI-DSZ-CC-0869": 1
}
},
"cc_claims": {
"A": {
"A.APPLET": 6,
"A.DELETION": 1,
"A.VERIFICATION": 6
},
"D": {
"D.API_DATA": 3,
"D.APP_CODE": 7,
"D.APP_C_DATA": 3,
"D.APP_I_DATA": 5,
"D.CM_APDU": 1,
"D.CRYPTO": 6,
"D.JCS_CODE": 3,
"D.JCS_DATA": 4,
"D.JCS_KEYS": 3,
"D.PIN": 6,
"D.SEC_ATTRIBUTES": 2,
"D.SEC_DATA": 8
},
"O": {
"O.ALARM": 21,
"O.APPLET": 19,
"O.CARD-": 6,
"O.CARD-MANAGEMENT": 33,
"O.CIPHER": 16,
"O.CODE_PKG": 16,
"O.COMMUNICATION": 11,
"O.DELETION": 15,
"O.EXT-": 1,
"O.EXT-MEM": 20,
"O.EXT_MEM_INSTANCE": 10,
"O.FIREWALL": 46,
"O.GLOBAL_ARRAYS_C": 1,
"O.GLOBAL_ARRAYS_CONFID": 17,
"O.GLOBAL_ARRAYS_IN": 1,
"O.GLOBAL_ARRAYS_INTEG": 9,
"O.IC_SUPPORT": 17,
"O.INSTALL": 15,
"O.JAVAOBJECT": 41,
"O.KEY-": 1,
"O.KEY-MNGT": 24,
"O.LOAD": 18,
"O.NATIVE": 13,
"O.OBJ-DELETION": 8,
"O.OPERATE": 35,
"O.OS": 1,
"O.OS_SUPPORT": 23,
"O.PACKAGE": 2,
"O.PIN-": 1,
"O.PIN-MNGT": 22,
"O.REALLOCATION": 17,
"O.RECOVERY": 24,
"O.REMOTE": 1,
"O.RESOURCES": 24,
"O.RND": 14,
"O.SID": 35,
"O.TRANSACTION": 18
},
"OE": {
"OE.APPLET": 8,
"OE.CARD-MANAGEMENT": 2,
"OE.CODE-": 4,
"OE.CODE-EVIDENCE": 17,
"OE.SCP": 6,
"OE.VERIFICATION": 38
},
"OP": {
"OP.ARRAY_ACCESS": 4,
"OP.CREATE": 7,
"OP.CREATE_EXT_MEM_INSTANCE": 3,
"OP.DELETE_APPLET": 4,
"OP.DELETE_PCKG": 3,
"OP.DELETE_PCKG_APPLET": 3,
"OP.GP": 3,
"OP.INSTANCE_FIELD": 4,
"OP.INVK_INTERFACE": 7,
"OP.INVK_VIRTUAL": 6,
"OP.JAVA": 5,
"OP.LOAD_PCKG": 1,
"OP.PUT": 6,
"OP.READ_EXT_MEM": 3,
"OP.THROW": 5,
"OP.TYPE_ACCESS": 5,
"OP.WRITE_EXT_MEM": 3
},
"OSP": {
"OSP.VERIFICATION": 6
},
"R": {
"R.JAVA": 12
},
"T": {
"T.COMMUNICATION": 5,
"T.CONFID-APPLI-": 3,
"T.CONFID-APPLI-DATA": 17,
"T.CONFID-JCS-": 8,
"T.CONFID-JCS-CODE": 6,
"T.CONFID-JCS-DATA": 6,
"T.DELETION": 5,
"T.EXE-": 1,
"T.EXE-CODE": 8,
"T.FAULT": 5,
"T.INSTALL": 6,
"T.INTEG-": 10,
"T.INTEG-APPLI-": 10,
"T.INTEG-APPLI-CODE": 9,
"T.INTEG-APPLI-DATA": 18,
"T.INTEG-JCS-": 1,
"T.INTEG-JCS-CODE": 8,
"T.INTEG-JCS-DATA": 7,
"T.LEAKAGE": 5,
"T.NATIVE": 6,
"T.OBJ-DELETION": 4,
"T.PHYSICAL": 8,
"T.RESOURCES": 9,
"T.RND": 5,
"T.SID": 19
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0035-2007": 1,
"BSI-PP-0017-2005": 1,
"BSI-PP-0035": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 6,
"ADV_COMP.1": 1,
"ADV_FSP.1": 4,
"ADV_FSP.2": 2,
"ADV_FSP.4": 2,
"ADV_FSP.5": 7,
"ADV_IMP.1": 9,
"ADV_INT.2": 1,
"ADV_TDS.1": 2,
"ADV_TDS.2": 1,
"ADV_TDS.3": 10,
"ADV_TDS.4": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 10,
"AGD_PRE": 1,
"AGD_PRE.1": 6
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.1": 1,
"ALC_CMS.4": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 2,
"ALC_DVS.2": 6,
"ALC_LCD.1": 3,
"ALC_TAT.1": 2,
"ALC_TAT.2": 3
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 4,
"ASE_INT.1": 5,
"ASE_OBJ.2": 3,
"ASE_REQ.1": 2,
"ASE_REQ.2": 2,
"ASE_SPD.1": 2,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.1": 2,
"ATE_COV.2": 3,
"ATE_DPT.1": 2,
"ATE_FUN.1": 6
},
"AVA": {
"AVA_VAN.5": 6
}
},
"cc_security_level": {
"EAL": {
"EAL 5": 1,
"EAL 5 augmented": 1,
"EAL5": 6,
"EAL5 augmented": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP.1": 24,
"FAU_ARP.1.1": 1,
"FAU_SAA.1": 3
},
"FCO": {
"FCO_NRO": 6,
"FCO_NRO.2": 6
},
"FCS": {
"FCS_CKM": 6,
"FCS_CKM.1": 19,
"FCS_CKM.2": 11,
"FCS_CKM.2.1": 1,
"FCS_CKM.3": 7,
"FCS_CKM.3.1": 1,
"FCS_CKM.4": 17,
"FCS_CKM.4.1": 1,
"FCS_COP": 32,
"FCS_COP.1": 26,
"FCS_RNG": 4,
"FCS_RNG.1": 14,
"FCS_RNG.1.1": 2,
"FCS_RNG.1.2": 2
},
"FDP": {
"FDP_ACC": 40,
"FDP_ACC.1": 17,
"FDP_ACC.2": 5,
"FDP_ACF": 38,
"FDP_ACF.1": 24,
"FDP_IFC": 25,
"FDP_IFC.1": 15,
"FDP_IFC.2": 2,
"FDP_IFF": 18,
"FDP_IFF.1": 17,
"FDP_ITC": 12,
"FDP_ITC.1": 4,
"FDP_ITC.2": 13,
"FDP_ITT.1": 1,
"FDP_RIP": 135,
"FDP_RIP.1": 11,
"FDP_ROL": 16,
"FDP_ROL.1": 5,
"FDP_SDI.1": 1,
"FDP_SDI.2": 13,
"FDP_SDI.2.1": 1,
"FDP_SDI.2.2": 1,
"FDP_UIT": 6,
"FDP_UIT.1": 2
},
"FIA": {
"FIA_ATD": 9,
"FIA_ATD.1": 2,
"FIA_UID": 22,
"FIA_UID.1": 12,
"FIA_UID.2": 1,
"FIA_USB": 6,
"FIA_USB.1": 3
},
"FMT": {
"FMT_MSA": 135,
"FMT_MSA.1": 14,
"FMT_MSA.2": 2,
"FMT_MSA.3": 22,
"FMT_MTD": 20,
"FMT_MTD.1": 2,
"FMT_MTD.3": 1,
"FMT_SMF": 41,
"FMT_SMF.1": 22,
"FMT_SMF.1.1": 1,
"FMT_SMR": 43,
"FMT_SMR.1": 37,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPR": {
"FPR_UNO.1": 13,
"FPR_UNO.1.1": 1
},
"FPT": {
"FPT_FLS": 36,
"FPT_FLS.1": 16,
"FPT_FLS.1.1": 2,
"FPT_ITT.1": 1,
"FPT_PHP.3": 1,
"FPT_RCV": 27,
"FPT_RCV.3": 13,
"FPT_RCV.4": 2,
"FPT_TDC.1": 8,
"FPT_TDC.1.1": 1,
"FPT_TDC.1.2": 1,
"FPT_TST.1": 1
},
"FRU": {
"FRU_FLT.2": 1
},
"FTP": {
"FTP_ITC": 10,
"FTP_ITC.1": 5,
"FTP_TRP.1": 2
}
},
"certification_process": {
"OutOfScope": {
"Software development environment. Phase 2 covers the Secure IC Development of Infineon and is out of scope of the TOE evaluation as that is part of the IC platform evaluation. In Phase 3, the Chip": 1,
"a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.RECOVERY and O.OS_SUPPORT are": 1,
"by the TOE. There are no pre-issuance applets installed. Native code post-issuance downloading is out of scope The SCP is a certified hardware platform \u2013 the SLE78CLFX4000P(M) with RSA2048/4096 v1.02.013, EC v1": 1,
"out of scope": 3
}
},
"cipher_mode": {
"CBC": {
"CBC": 21
},
"CCM": {
"CCM": 1
},
"ECB": {
"ECB": 6
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"Infineon": {
"v1.02.013": 3
}
},
"crypto_protocol": {},
"crypto_scheme": {
"KA": {
"KA": 2,
"Key Agreement": 2
},
"KEX": {
"Key exchange": 1
},
"MAC": {
"MAC": 4
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"P-192": 2
}
},
"eval_facility": {
"TUV": {
"TUV Informationstechnik": 1,
"T\u00dcV Informationstechnik": 1
}
},
"hash_function": {
"MD": {
"MD5": {
"MD5": 3
}
},
"RIPEMD": {
"RIPEMD-160": 2,
"RIPEMD160": 1
},
"SHA": {
"SHA1": {
"SHA-1": 1
},
"SHA2": {
"SHA-2": 5,
"SHA-224": 1,
"SHA-256": 1,
"SHA-384": 1,
"SHA-512": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {
"misc": {
"TYPE_ACCESS": 5
}
},
"javacard_packages": {
"javacard": {
"javacard.framework": 4,
"javacard.security": 3
},
"javacardx": {
"javacardx.crypto": 3,
"javacardx.external": 1,
"javacardx.security": 1
}
},
"javacard_version": {
"JavaCard": {
"Java Card 3.0.1": 3
}
},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 20,
"RNG": 11
},
"TRNG": {
"TRNG": 3
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 3,
"malfunction": 4,
"physical tampering": 1
},
"SCA": {
"DPA": 4,
"Leak-Inherent": 2,
"SPA": 1,
"physical probing": 3,
"side channel": 1,
"timing attacks": 1
}
},
"standard_id": {
"BSI": {
"AIS20": 4,
"AIS36": 2
},
"FIPS": {
"FIPS 140-2": 1,
"FIPS 180-4": 6,
"FIPS 186-3": 7,
"FIPS 197": 9,
"FIPS PUB 180-4": 1,
"FIPS PUB 186-3": 1,
"FIPS PUB 197": 1,
"FIPS140": 2
},
"ICAO": {
"ICAO": 6
},
"ISO": {
"ISO/IEC 14443": 2,
"ISO/IEC 15946-": 5,
"ISO/IEC 18092": 2,
"ISO/IEC7816": 2
},
"NIST": {
"NIST SP 800-108": 1,
"NIST SP 800-38B": 1
},
"RFC": {
"RFC 5639": 5
},
"SCP": {
"SCP 02": 2,
"SCP 03": 3,
"SCP01": 2,
"SCP02": 9,
"SCP03": 9
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 19
}
},
"DES": {
"3DES": {
"TDEA": 1,
"TDES": 22,
"Triple-DES": 1
},
"DES": {
"DES": 9
}
},
"constructions": {
"MAC": {
"CMAC": 1
}
},
"miscellaneous": {
"SEED": {
"SEED": 2
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon": 182,
"Infineon Technologies AG": 2
},
"NXP": {
"NXP Semiconductors": 1
},
"STMicroelectronics": {
"STMicroelectronics": 1
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "T\u00dcV Informationstechnik GmbH, Roland Atoui, Linda Kyrnitszke",
"/CreationDate": "D:20141120164433+01\u002700\u0027",
"/Creator": "Microsoft\u00ae Office Word 2007",
"/Keywords": "Java Card Platform, Smart Card,",
"/ModDate": "D:20141120164433+01\u002700\u0027",
"/Producer": "Microsoft\u00ae Office Word 2007",
"/Subject": "Common Criteria - ASE",
"/Title": "Security Target Lite - Java Card Platform on SLE 78 (SLJ 52)",
"pdf_file_size_bytes": 2880995,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.iso.org/iso/iso_catalogue/catalogue_tc/catalogue_detail.htm?csnumber=30656"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 158
}
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": "EAL4+",
"pp_ids": {
"_type": "Set",
"elements": [
"ANSSI-CC-PP-2010-03",
"ANSSI-CC-PP-2001-03-M01",
"JCSPPC"
]
},
"pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/ANSSI-CC-profil_PP-2010-03en.pdf",
"pp_name": "Java Card\u2122 System Protection Profile Open Configuration, Version 3.0"
}
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0869a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"AVA_VAN.5",
"EAL5+",
"ALC_DVS.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0869b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "4919856aca1390ba0a11287b0ddfa3e9f976f6e678b2b2a2dc44f58e4842fcc2",
"txt_hash": "16970b2f509be251e90601cc89d5bda8e4182f8616c7069cefd49701a354a75d"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "3db4cbb37700c9c4a1a564689053f9f989120c0d09b8dc8720e40c7d776bc7fa",
"txt_hash": "67fedaf86fe2fd88b1299bfe9370da6eac9f84609bf8171fc31bd530d17d0443"
}
},
"status": "archived"
}