Java Card Platform Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0

CSV information ?

Status archived
Valid from 17.02.2015
Valid until 17.02.2020
Scheme 🇩🇪 DE
Manufacturer Oracle Corporation
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level ALC_DVS.2, AVA_VAN.5, EAL5+

Heuristics summary ?

Certificate ID: BSI-DSZ-CC-0869-2015

Certificate ?

Certification report ?

Extracted keywords

Symmetric Algorithms
AES, TDES, SEED
Asymmetric Algorithms
ECDH, ECDSA, DSA
Hash functions
SHA-1, SHA-2, MD5, RIPEMD160, RIPEMD
Randomness
TRNG, RNG
Libraries
v1.02.013
Block cipher modes
CCM

Vendor
Infineon, Infineon Technologies AG

Security level
EAL 5, EAL 4, EAL 1, EAL 2, EAL 5+, EAL 6, EAL 3, EAL 7, EAL 5 augmented, ITSEC Evaluation
Claims
OE.VERIFICATION
Security Assurance Requirements (SAR)
ADV_FSP.5, ADV_INT.2, ADV_TDS.4, ADV_ARC.1, ADV_FSP.1, ADV_FSP.2, ADV_FSP.3, ADV_FSP.4, ADV_FSP.6, ADV_IMP.1, ADV_IMP.2, ADV_INT.1, ADV_INT.3, ADV_SPM.1, ADV_TDS.1, ADV_TDS.2, ADV_TDS.3, ADV_TDS.5, ADV_TDS.6, ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_FLR, ALC_CMS.5, ALC_TAT.2, ALC_CMC.1, ALC_CMC.2, ALC_CMC.3, ALC_CMC.4, ALC_CMC.5, ALC_CMS.1, ALC_CMS.2, ALC_CMS.3, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_FLR.1, ALC_FLR.2, ALC_FLR.3, ALC_LCD.1, ALC_LCD.2, ALC_TAT.1, ALC_TAT.3, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_DPT.3, ATE_COV, ATE_DPT, ATE_FUN, ATE_COV.1, ATE_COV.2, ATE_COV.3, ATE_DPT.1, ATE_DPT.2, ATE_DPT.4, ATE_FUN.1, ATE_FUN.2, ATE_IND.1, ATE_IND.2, ATE_IND.3, ATE_IND, AVA_VAN.5, AVA_VAN, AVA_VAN.1, AVA_VAN.2, AVA_VAN.3, AVA_VAN.4, APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.1, APE_OBJ.2, APE_ECD.1, APE_REQ.1, APE_REQ.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.1, ASE_REQ.2, ASE_TSS.1, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_SPD, ASE_TSS
Protection profiles
ANSSI-CC-PP-2010/03-M01
Certificates
BSI-DSZ-CC-0869-2015, BSI-DSZ-CC-0782-2012-MA-01, BSI-DSZ-CC-0782-MA-01, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0782
Evaluation facilities
TÃœV Informationstechnik, TÃœViT
Certification process
out of scope, the TOE, but pre-issuance loading of applets is possible. Native code post-issuance downloading is out of scope. The TOE fulfills the requirements of the Protection Profile Java Card Protection Profile - Open, and certification procedure is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the product or resulting from the evaluation and certification, SLJ 52GxxyyyzR) V1.0, BSI-DSZ-CC-0869-2015, ST Version 2.0, 20 November 2014, Oracle Corporation (confidential document) 9 specifically • AIS 1, Version 13, Durchführung der Ortsbesichtigung in der Entwicklungsumgebung, Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0, BSI-DSZ-CC-0869-2015, TÜViT GmbH (confidential document) [10] Configuration List BSI-DSZ-CC-0869-2015: Configuration Management Scope for Java Card, for Infineon on SLE78 (SLJ 52GxxyyyzR) V 1.0, Version 1.4, 29 January 2015, Oracle Corporation (confidential document) [11] AGD_OPE for Java Card Platform Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0, for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0, Version 1, 30 January 2015, TÜViT GmbH (confidential document) [19] Certification Report – for Infineon Security Controller M7892 B11 with optional RSA2048/4096, ETR for Composition (ETR-COMP), M7892 B11, BSI-DSZ-CC-0782, Version 5, 20 March 2014, TÜViT GmbH (confidential document) [21] SLx 70 Family Production and Personalization User’s Manual, Revision 2012-06-27, Infineon

Side-channel analysis
malfunction, JIL
Certification process
out of scope, the TOE, but pre-issuance loading of applets is possible. Native code post-issuance downloading is out of scope. The TOE fulfills the requirements of the Protection Profile Java Card Protection Profile - Open, and certification procedure is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the product or resulting from the evaluation and certification, SLJ 52GxxyyyzR) V1.0, BSI-DSZ-CC-0869-2015, ST Version 2.0, 20 November 2014, Oracle Corporation (confidential document) 9 specifically • AIS 1, Version 13, Durchführung der Ortsbesichtigung in der Entwicklungsumgebung, Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0, BSI-DSZ-CC-0869-2015, TÜViT GmbH (confidential document) [10] Configuration List BSI-DSZ-CC-0869-2015: Configuration Management Scope for Java Card, for Infineon on SLE78 (SLJ 52GxxyyyzR) V 1.0, Version 1.4, 29 January 2015, Oracle Corporation (confidential document) [11] AGD_OPE for Java Card Platform Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0, for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0, Version 1, 30 January 2015, TÜViT GmbH (confidential document) [19] Certification Report – for Infineon Security Controller M7892 B11 with optional RSA2048/4096, ETR for Composition (ETR-COMP), M7892 B11, BSI-DSZ-CC-0782, Version 5, 20 March 2014, TÜViT GmbH (confidential document) [21] SLx 70 Family Production and Personalization User’s Manual, Revision 2012-06-27, Infineon

Standards
AIS 36, AIS20, AIS 34, AIS 26, AIS 20, AIS 35, AIS 1, AIS 25, AIS 32, AIS 46, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065, SCP02, SCP03, SCP01
Technical reports
BSI TR-02102, BSI TR-02102-1, BSI 7138, BSI 7125, BSI 7148

File metadata

Title Certification Report BSI-DSZ-CC-0869-2015
Subject Common Criteria Certification BSI-DSZ-CC-0869-2015
Keywords Common Criteria, Certification, Zertifizierung, BSI-DSZ-CC-0869-2015, Java Card
Author Bundesamt für Sicherheit in der Informationstechnik
Creation date D:20150227121448+01'00'
Modification date D:20150227130818+01'00'
Pages 40
Creator Writer
Producer LibreOffice 4.2

Frontpage

Certificate ID BSI-DSZ-CC-0869-2015
Certified item Java Card Platform Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0
Certification lab BSI
Developer Oracle Corporation

References

Outgoing
  • BSI-DSZ-CC-0782-2012 - archived - Infineon Security Controller M7892 B11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01 and Toolbox v1.02.013 libraries and with specific IC dedicated software (firmware)
Incoming
  • BSI-DSZ-CC-0869-V2-2019 - archived - Java Card Platform Implementation for Infineon on M7892 G12 (SLJ 52GxxyyyzC) V2.0

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES, TDES, Triple-DES, TDEA, SEED, CMAC
Asymmetric Algorithms
RSA-CRT, ECDH, ECDSA, ECC, Diffie-Hellman, DSA
Hash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-2, MD5, RIPEMD160, RIPEMD-160
Schemes
MAC, Key exchange, Key Agreement, KA
Randomness
TRNG, RND, RNG
Libraries
v1.02.013
Elliptic Curves
P-192
Block cipher modes
ECB, CBC, CCM

JavaCard versions
Java Card 3.0.1
JavaCard API constants
TYPE_ACCESS
Vendor
NXP Semiconductors, Infineon, Infineon Technologies AG, STMicroelectronics

Security level
EAL 5, EAL5, EAL 5 augmented, EAL5 augmented
Claims
D.APP_CODE, D.APP_C_DATA, D.APP_I_DATA, D.PIN, D.API_DATA, D.CRYPTO, D.JCS_CODE, D.JCS_DATA, D.SEC_DATA, D.JCS_KEYS, D.SEC_ATTRIBUTES, D.CM_APDU, O.CARD-MANAGEMENT, O.IC_SUPPORT, O.RECOVERY, O.OS_SUPPORT, O.COMMUNICATION, O.EXT-MEM, O.RND, O.REMOTE, O.DELETION, O.SID, O.FIREWALL, O.GLOBAL_ARRAYS_CONFID, O.GLOBAL_ARRAYS_INTEG, O.NATIVE, O.OPERATE, O.REALLOCATION, O.RESOURCES, O.ALARM, O.CIPHER, O.KEY-MNGT, O.PIN-MNGT, O.TRANSACTION, O.OBJ-DELETION, O.LOAD, O.INSTALL, O.CARD-, O.EXT-, O.APPLET, O.CODE_PKG, O.JAVAOBJECT, O.EXT_MEM_INSTANCE, O.PACKAGE, O.GLOBAL_ARRAYS_C, O.GLOBAL_ARRAYS_IN, O.KEY-, O.PIN-, O.OS, T.CONFID-APPLI-DATA, T.CONFID-JCS-CODE, T.CONFID-JCS-DATA, T.INTEG-APPLI-CODE, T.INTEG-APPLI-DATA, T.INTEG-JCS-CODE, T.INTEG-JCS-DATA, T.SID, T.EXE-CODE, T.NATIVE, T.RESOURCES, T.DELETION, T.INSTALL, T.COMMUNICATION, T.OBJ-DELETION, T.PHYSICAL, T.LEAKAGE, T.FAULT, T.RND, T.CONFID-APPLI-, T.INTEG-APPLI-, T.CONFID-JCS-, T.INTEG-, T.EXE-, T.INTEG-JCS-, A.DELETION, A.APPLET, A.VERIFICATION, R.JAVA, OP.ARRAY_ACCESS, OP.CREATE, OP.LOAD_PCKG, OP.DELETE_APPLET, OP.DELETE_PCKG, OP.DELETE_PCKG_APPLET, OP.GP, OP.INSTANCE_FIELD, OP.INVK_VIRTUAL, OP.INVK_INTERFACE, OP.JAVA, OP.THROW, OP.TYPE_ACCESS, OP.PUT, OP.CREATE_EXT_MEM_INSTANCE, OP.READ_EXT_MEM, OP.WRITE_EXT_MEM, OE.CARD-MANAGEMENT, OE.SCP, OE.CODE-EVIDENCE, OE.APPLET, OE.VERIFICATION, OE.CODE-, OSP.VERIFICATION
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_TDS.1, ADV_FSP.4, ADV_TDS.3, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, ADV_FSP.5, ADV_FSP.2, ADV_TDS.2, ADV_COMP.1, AGD_OPE, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_TAT.1, ALC_TAT.2, ALC_CMC.4, ALC_CMS.1, ALC_DVS.1, ALC_LCD.1, ALC_CMS.4, ALC_DEL.1, ATE_COV.2, ATE_FUN.1, ATE_COV.1, ATE_DPT.1, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1, ASE_REQ.2, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_ARP.1, FAU_ARP.1.1, FAU_SAA.1, FCO_NRO, FCO_NRO.2, FCS_RNG, FCS_COP, FCS_RNG.1, FCS_CKM.1, FCS_CKM.2, FCS_CKM.2.1, FCS_CKM.3, FCS_CKM.3.1, FCS_CKM.4, FCS_CKM.4.1, FCS_COP.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM, FDP_ACC, FDP_ACC.2, FDP_ACF, FDP_ACF.1, FDP_IFC, FDP_IFC.1, FDP_IFF, FDP_IFF.1, FDP_RIP, FDP_RIP.1, FDP_ROL.1, FDP_ROL, FDP_SDI.2, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ITC, FDP_ITC.2, FDP_IFC.2, FDP_UIT, FDP_UIT.1, FDP_ACC.1, FDP_ITC.1, FDP_SDI.1, FDP_ITT.1, FIA_ATD, FIA_ATD.1, FIA_UID, FIA_UID.2, FIA_USB, FIA_USB.1, FIA_UID.1, FMT_MSA, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD, FMT_MTD.1, FMT_MTD.3, FMT_SMR, FMT_SMF, FPR_UNO.1, FPR_UNO.1.1, FPT_FLS.1, FPT_FLS.1.1, FPT_TDC.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_FLS, FPT_RCV, FPT_RCV.3, FPT_RCV.4, FPT_TST.1, FPT_PHP.3, FPT_ITT.1, FRU_FLT.2, FTP_ITC, FTP_ITC.1, FTP_TRP.1
Protection profiles
BSI-PP-0035, BSI-PP-0017-2005, BSI-CC-PP-0035-2007
Certificates
BSI-DSZ-CC-0782-MA-01, BSI-DSZ-CC-0869, BSI-DSZ-CC-0782-2012-MA-01
Evaluation facilities
TÃœV Informationstechnik, TUV Informationstechnik
Certification process
out of scope, by the TOE. There are no pre-issuance applets installed. Native code post-issuance downloading is out of scope The SCP is a certified hardware platform – the SLE78CLFX4000P(M) with RSA2048/4096 v1.02.013, EC v1, Software development environment. Phase 2 covers the Secure IC Development of Infineon and is out of scope of the TOE evaluation as that is part of the IC platform evaluation. In Phase 3, the Chip, a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.RECOVERY and O.OS_SUPPORT are

Side-channel analysis
Leak-Inherent, physical probing, side channel, DPA, SPA, timing attacks, physical tampering, malfunction, Malfunction
Certification process
out of scope, by the TOE. There are no pre-issuance applets installed. Native code post-issuance downloading is out of scope The SCP is a certified hardware platform – the SLE78CLFX4000P(M) with RSA2048/4096 v1.02.013, EC v1, Software development environment. Phase 2 covers the Secure IC Development of Infineon and is out of scope of the TOE evaluation as that is part of the IC platform evaluation. In Phase 3, the Chip, a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.RECOVERY and O.OS_SUPPORT are

Standards
FIPS 186-3, FIPS140, FIPS 180-4, FIPS 197, FIPS PUB 180-4, FIPS PUB 186-3, FIPS PUB 197, FIPS 140-2, NIST SP 800-108, NIST SP 800-38B, AIS20, AIS36, RFC 5639, ISO/IEC 18092, ISO/IEC7816, ISO/IEC 14443, ISO/IEC 15946-, ICAO, SCP02, SCP03, SCP01, SCP 03, SCP 02

File metadata

Title Security Target Lite - Java Card Platform on SLE 78 (SLJ 52)
Subject Common Criteria - ASE
Keywords Java Card Platform, Smart Card,
Author TÃœV Informationstechnik GmbH, Roland Atoui, Linda Kyrnitszke
Creation date D:20141120164433+01'00'
Modification date D:20141120164433+01'00'
Pages 158
Creator Microsoft® Office Word 2007
Producer Microsoft® Office Word 2007

Heuristics ?

Certificate ID: BSI-DSZ-CC-0869-2015

Extracted SARs

ASE_CCL.1, AGD_PRE.1, ATE_COV.2, ALC_CMS.4, APE_INT.1, ASE_REQ.2, ASE_TSS.1, ALC_FLR.3, ASE_ECD.1, ALC_TAT.2, ASE_SPD.1, AVA_VAN.5, ALC_CMC.4, APE_ECD.1, ALC_DEL.1, APE_CCL.1, ALC_DVS.2, ADV_INT.2, ADV_SPM.1, ATE_DPT.1, ALC_LCD.1, ASE_INT.1, ATE_FUN.1, APE_SPD.1, ASE_OBJ.2, ADV_IMP.1, APE_OBJ.2, ADV_FSP.5, ADV_COMP.1, ATE_IND.3, APE_REQ.2, ADV_TDS.4, ADV_ARC.1, AGD_OPE.1

References ?

Updates ?

  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Java Card Platform Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": null,
  "dgst": "a43ba4af9421da93",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "BSI-DSZ-CC-0869-2015",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_COMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.0"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0869-V2-2019"
        ]
      },
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0782-2012"
        ]
      },
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "JISEC-CC-CRP-C0649-01-2019",
          "JISEC-CC-CRP-C0648-01-2019",
          "BSI-DSZ-CC-0869-V2-2019"
        ]
      },
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0782-2012"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Oracle Corporation",
  "manufacturer_web": "https://www.oracle.com",
  "name": "Java Card Platform Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0",
  "not_valid_after": "2020-02-17",
  "not_valid_before": "2015-02-17",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "0869a_pdf.pdf",
    "report_frontpage": {
      "DE": {
        "cc_security_level": "Common Criteria Part 3 conformant EAL 5 augmented by ALC_DVS.2 and AVA_VAN.5 Valid until (*): 17 February 2020 SOGIS Recognition Agreement",
        "cc_version": "PP conformant including optional package EMG plus product specific extensions Common Criteria Part 2 extended",
        "cert_id": "BSI-DSZ-CC-0869-2015",
        "cert_item": "Java Card Platform Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0",
        "cert_lab": "BSI",
        "developer": "Oracle Corporation",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ],
        "ref_protection_profiles": "Java Card Protection Profile - Open Configuration, Version 3.0, May 2012, ANSSI-CC-PP-2010/03-M01"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECDH": {
            "ECDH": 1
          },
          "ECDSA": {
            "ECDSA": 1
          }
        },
        "FF": {
          "DSA": {
            "DSA": 2
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0782": 1,
          "BSI-DSZ-CC-0782-2012": 2,
          "BSI-DSZ-CC-0782-2012-MA-01": 2,
          "BSI-DSZ-CC-0782-MA-01": 2,
          "BSI-DSZ-CC-0869-2015": 24
        }
      },
      "cc_claims": {
        "OE": {
          "OE.VERIFICATION": 3
        }
      },
      "cc_protection_profile_id": {
        "ANSSI": {
          "ANSSI-CC-PP-2010/03-M01": 4
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 1,
          "ADV_FSP": 1,
          "ADV_FSP.1": 1,
          "ADV_FSP.2": 1,
          "ADV_FSP.3": 1,
          "ADV_FSP.4": 1,
          "ADV_FSP.5": 2,
          "ADV_FSP.6": 1,
          "ADV_IMP": 1,
          "ADV_IMP.1": 1,
          "ADV_IMP.2": 1,
          "ADV_INT": 1,
          "ADV_INT.1": 1,
          "ADV_INT.2": 2,
          "ADV_INT.3": 1,
          "ADV_SPM": 1,
          "ADV_SPM.1": 1,
          "ADV_TDS": 1,
          "ADV_TDS.1": 1,
          "ADV_TDS.2": 1,
          "ADV_TDS.3": 1,
          "ADV_TDS.4": 2,
          "ADV_TDS.5": 1,
          "ADV_TDS.6": 1
        },
        "AGD": {
          "AGD_OPE": 2,
          "AGD_OPE.1": 1,
          "AGD_PRE": 3,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.1": 1,
          "ALC_CMC.2": 1,
          "ALC_CMC.3": 1,
          "ALC_CMC.4": 2,
          "ALC_CMC.5": 1,
          "ALC_CMS": 1,
          "ALC_CMS.1": 1,
          "ALC_CMS.2": 1,
          "ALC_CMS.3": 1,
          "ALC_CMS.4": 1,
          "ALC_CMS.5": 3,
          "ALC_DEL": 1,
          "ALC_DEL.1": 2,
          "ALC_DVS": 1,
          "ALC_DVS.1": 1,
          "ALC_DVS.2": 7,
          "ALC_FLR": 3,
          "ALC_FLR.1": 1,
          "ALC_FLR.2": 1,
          "ALC_FLR.3": 1,
          "ALC_LCD.1": 2,
          "ALC_LCD.2": 1,
          "ALC_TAT": 1,
          "ALC_TAT.1": 1,
          "ALC_TAT.2": 3,
          "ALC_TAT.3": 1
        },
        "APE": {
          "APE_CCL.1": 1,
          "APE_ECD.1": 1,
          "APE_INT.1": 1,
          "APE_OBJ.1": 1,
          "APE_OBJ.2": 1,
          "APE_REQ.1": 1,
          "APE_REQ.2": 1,
          "APE_SPD.1": 1
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_CCL.1": 1,
          "ASE_ECD": 1,
          "ASE_ECD.1": 1,
          "ASE_INT": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ": 1,
          "ASE_OBJ.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.1": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS": 1,
          "ASE_TSS.1": 1,
          "ASE_TSS.2": 1
        },
        "ATE": {
          "ATE_COV": 2,
          "ATE_COV.1": 1,
          "ATE_COV.2": 1,
          "ATE_COV.3": 1,
          "ATE_DPT": 2,
          "ATE_DPT.1": 1,
          "ATE_DPT.2": 1,
          "ATE_DPT.3": 2,
          "ATE_DPT.4": 1,
          "ATE_FUN": 2,
          "ATE_FUN.1": 1,
          "ATE_FUN.2": 1,
          "ATE_IND": 1,
          "ATE_IND.1": 1,
          "ATE_IND.2": 1,
          "ATE_IND.3": 1
        },
        "AVA": {
          "AVA_VAN": 3,
          "AVA_VAN.1": 1,
          "AVA_VAN.2": 1,
          "AVA_VAN.3": 1,
          "AVA_VAN.4": 1,
          "AVA_VAN.5": 6
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 7,
          "EAL 2": 4,
          "EAL 3": 4,
          "EAL 4": 9,
          "EAL 5": 14,
          "EAL 5 augmented": 3,
          "EAL 5+": 1,
          "EAL 6": 4,
          "EAL 7": 4
        },
        "ITSEC": {
          "ITSEC Evaluation": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "ConfidentialDocument": {
          "ETR for Composition (ETR-COMP), M7892 B11, BSI-DSZ-CC-0782, Version 5, 20 March 2014, T\u00dcViT GmbH (confidential document) [21] SLx 70 Family Production and Personalization User\u2019s Manual, Revision 2012-06-27, Infineon": 1,
          "Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0, BSI-DSZ-CC-0869-2015, T\u00dcViT GmbH (confidential document) [10] Configuration List BSI-DSZ-CC-0869-2015: Configuration Management Scope for Java Card": 1,
          "SLJ 52GxxyyyzR) V1.0, BSI-DSZ-CC-0869-2015, ST Version 2.0, 20 November 2014, Oracle Corporation (confidential document) 9 specifically \u2022 AIS 1, Version 13, Durchf\u00fchrung der Ortsbesichtigung in der Entwicklungsumgebung": 1,
          "and certification procedure is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the product or resulting from the evaluation and certification": 1,
          "for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0, Version 1, 30 January 2015, T\u00dcViT GmbH (confidential document) [19] Certification Report \u2013 for Infineon Security Controller M7892 B11 with optional RSA2048/4096": 1,
          "for Infineon on SLE78 (SLJ 52GxxyyyzR) V 1.0, Version 1.4, 29 January 2015, Oracle Corporation (confidential document) [11] AGD_OPE for Java Card Platform Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0": 1
        },
        "OutOfScope": {
          "out of scope": 1,
          "the TOE, but pre-issuance loading of applets is possible. Native code post-issuance downloading is out of scope. The TOE fulfills the requirements of the Protection Profile Java Card Protection Profile - Open": 1
        }
      },
      "cipher_mode": {
        "CCM": {
          "CCM": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "Infineon": {
          "v1.02.013": 5
        }
      },
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "TUV": {
          "T\u00dcV Informationstechnik": 2,
          "T\u00dcViT": 3
        }
      },
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 2
          }
        },
        "RIPEMD": {
          "RIPEMD": 1,
          "RIPEMD160": 1
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 1
          },
          "SHA2": {
            "SHA-2": 4
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 6
        },
        "TRNG": {
          "TRNG": 2
        }
      },
      "side_channel_analysis": {
        "FI": {
          "malfunction": 1
        },
        "other": {
          "JIL": 4
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 1": 1,
          "AIS 20": 2,
          "AIS 25": 1,
          "AIS 26": 2,
          "AIS 32": 1,
          "AIS 34": 2,
          "AIS 35": 2,
          "AIS 36": 6,
          "AIS 46": 1,
          "AIS20": 1
        },
        "ISO": {
          "ISO/IEC 15408": 4,
          "ISO/IEC 17065": 2,
          "ISO/IEC 18045": 4
        },
        "SCP": {
          "SCP01": 2,
          "SCP02": 2,
          "SCP03": 3
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 2
          }
        },
        "DES": {
          "3DES": {
            "TDES": 2
          }
        },
        "miscellaneous": {
          "SEED": {
            "SEED": 2
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI 7125": 2,
          "BSI 7138": 2,
          "BSI 7148": 1,
          "BSI TR-02102": 1,
          "BSI TR-02102-1": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon": 26,
          "Infineon Technologies AG": 3
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20150227121448+01\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "Common Criteria, Certification, Zertifizierung, BSI-DSZ-CC-0869-2015, Java Card",
      "/ModDate": "D:20150227130818+01\u002700\u0027",
      "/Producer": "LibreOffice 4.2",
      "/Subject": "Common Criteria Certification BSI-DSZ-CC-0869-2015",
      "/Title": "Certification Report BSI-DSZ-CC-0869-2015",
      "pdf_file_size_bytes": 1268716,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.commoncriteriaportal.org/",
          "https://www.bsi.bund.de/",
          "https://www.bsi.bund.de/zertifizierung"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 40
    },
    "st_filename": "0869b_pdf.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 11
          },
          "ECDH": {
            "ECDH": 5
          },
          "ECDSA": {
            "ECDSA": 10
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 1
          },
          "DSA": {
            "DSA": 2
          }
        },
        "RSA": {
          "RSA-CRT": 3
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0782-2012-MA-01": 1,
          "BSI-DSZ-CC-0782-MA-01": 2,
          "BSI-DSZ-CC-0869": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.APPLET": 6,
          "A.DELETION": 1,
          "A.VERIFICATION": 6
        },
        "D": {
          "D.API_DATA": 3,
          "D.APP_CODE": 7,
          "D.APP_C_DATA": 3,
          "D.APP_I_DATA": 5,
          "D.CM_APDU": 1,
          "D.CRYPTO": 6,
          "D.JCS_CODE": 3,
          "D.JCS_DATA": 4,
          "D.JCS_KEYS": 3,
          "D.PIN": 6,
          "D.SEC_ATTRIBUTES": 2,
          "D.SEC_DATA": 8
        },
        "O": {
          "O.ALARM": 21,
          "O.APPLET": 19,
          "O.CARD-": 6,
          "O.CARD-MANAGEMENT": 33,
          "O.CIPHER": 16,
          "O.CODE_PKG": 16,
          "O.COMMUNICATION": 11,
          "O.DELETION": 15,
          "O.EXT-": 1,
          "O.EXT-MEM": 20,
          "O.EXT_MEM_INSTANCE": 10,
          "O.FIREWALL": 46,
          "O.GLOBAL_ARRAYS_C": 1,
          "O.GLOBAL_ARRAYS_CONFID": 17,
          "O.GLOBAL_ARRAYS_IN": 1,
          "O.GLOBAL_ARRAYS_INTEG": 9,
          "O.IC_SUPPORT": 17,
          "O.INSTALL": 15,
          "O.JAVAOBJECT": 41,
          "O.KEY-": 1,
          "O.KEY-MNGT": 24,
          "O.LOAD": 18,
          "O.NATIVE": 13,
          "O.OBJ-DELETION": 8,
          "O.OPERATE": 35,
          "O.OS": 1,
          "O.OS_SUPPORT": 23,
          "O.PACKAGE": 2,
          "O.PIN-": 1,
          "O.PIN-MNGT": 22,
          "O.REALLOCATION": 17,
          "O.RECOVERY": 24,
          "O.REMOTE": 1,
          "O.RESOURCES": 24,
          "O.RND": 14,
          "O.SID": 35,
          "O.TRANSACTION": 18
        },
        "OE": {
          "OE.APPLET": 8,
          "OE.CARD-MANAGEMENT": 2,
          "OE.CODE-": 4,
          "OE.CODE-EVIDENCE": 17,
          "OE.SCP": 6,
          "OE.VERIFICATION": 38
        },
        "OP": {
          "OP.ARRAY_ACCESS": 4,
          "OP.CREATE": 7,
          "OP.CREATE_EXT_MEM_INSTANCE": 3,
          "OP.DELETE_APPLET": 4,
          "OP.DELETE_PCKG": 3,
          "OP.DELETE_PCKG_APPLET": 3,
          "OP.GP": 3,
          "OP.INSTANCE_FIELD": 4,
          "OP.INVK_INTERFACE": 7,
          "OP.INVK_VIRTUAL": 6,
          "OP.JAVA": 5,
          "OP.LOAD_PCKG": 1,
          "OP.PUT": 6,
          "OP.READ_EXT_MEM": 3,
          "OP.THROW": 5,
          "OP.TYPE_ACCESS": 5,
          "OP.WRITE_EXT_MEM": 3
        },
        "OSP": {
          "OSP.VERIFICATION": 6
        },
        "R": {
          "R.JAVA": 12
        },
        "T": {
          "T.COMMUNICATION": 5,
          "T.CONFID-APPLI-": 3,
          "T.CONFID-APPLI-DATA": 17,
          "T.CONFID-JCS-": 8,
          "T.CONFID-JCS-CODE": 6,
          "T.CONFID-JCS-DATA": 6,
          "T.DELETION": 5,
          "T.EXE-": 1,
          "T.EXE-CODE": 8,
          "T.FAULT": 5,
          "T.INSTALL": 6,
          "T.INTEG-": 10,
          "T.INTEG-APPLI-": 10,
          "T.INTEG-APPLI-CODE": 9,
          "T.INTEG-APPLI-DATA": 18,
          "T.INTEG-JCS-": 1,
          "T.INTEG-JCS-CODE": 8,
          "T.INTEG-JCS-DATA": 7,
          "T.LEAKAGE": 5,
          "T.NATIVE": 6,
          "T.OBJ-DELETION": 4,
          "T.PHYSICAL": 8,
          "T.RESOURCES": 9,
          "T.RND": 5,
          "T.SID": 19
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0035-2007": 1,
          "BSI-PP-0017-2005": 1,
          "BSI-PP-0035": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 6,
          "ADV_COMP.1": 1,
          "ADV_FSP.1": 4,
          "ADV_FSP.2": 2,
          "ADV_FSP.4": 2,
          "ADV_FSP.5": 7,
          "ADV_IMP.1": 9,
          "ADV_INT.2": 1,
          "ADV_TDS.1": 2,
          "ADV_TDS.2": 1,
          "ADV_TDS.3": 10,
          "ADV_TDS.4": 1
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 10,
          "AGD_PRE": 1,
          "AGD_PRE.1": 6
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.1": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 2,
          "ALC_DVS.2": 6,
          "ALC_LCD.1": 3,
          "ALC_TAT.1": 2,
          "ALC_TAT.2": 3
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 4,
          "ASE_INT.1": 5,
          "ASE_OBJ.2": 3,
          "ASE_REQ.1": 2,
          "ASE_REQ.2": 2,
          "ASE_SPD.1": 2,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.1": 2,
          "ATE_COV.2": 3,
          "ATE_DPT.1": 2,
          "ATE_FUN.1": 6
        },
        "AVA": {
          "AVA_VAN.5": 6
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 5": 1,
          "EAL 5 augmented": 1,
          "EAL5": 6,
          "EAL5 augmented": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 24,
          "FAU_ARP.1.1": 1,
          "FAU_SAA.1": 3
        },
        "FCO": {
          "FCO_NRO": 6,
          "FCO_NRO.2": 6
        },
        "FCS": {
          "FCS_CKM": 6,
          "FCS_CKM.1": 19,
          "FCS_CKM.2": 11,
          "FCS_CKM.2.1": 1,
          "FCS_CKM.3": 7,
          "FCS_CKM.3.1": 1,
          "FCS_CKM.4": 17,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 32,
          "FCS_COP.1": 26,
          "FCS_RNG": 4,
          "FCS_RNG.1": 14,
          "FCS_RNG.1.1": 2,
          "FCS_RNG.1.2": 2
        },
        "FDP": {
          "FDP_ACC": 40,
          "FDP_ACC.1": 17,
          "FDP_ACC.2": 5,
          "FDP_ACF": 38,
          "FDP_ACF.1": 24,
          "FDP_IFC": 25,
          "FDP_IFC.1": 15,
          "FDP_IFC.2": 2,
          "FDP_IFF": 18,
          "FDP_IFF.1": 17,
          "FDP_ITC": 12,
          "FDP_ITC.1": 4,
          "FDP_ITC.2": 13,
          "FDP_ITT.1": 1,
          "FDP_RIP": 135,
          "FDP_RIP.1": 11,
          "FDP_ROL": 16,
          "FDP_ROL.1": 5,
          "FDP_SDI.1": 1,
          "FDP_SDI.2": 13,
          "FDP_SDI.2.1": 1,
          "FDP_SDI.2.2": 1,
          "FDP_UIT": 6,
          "FDP_UIT.1": 2
        },
        "FIA": {
          "FIA_ATD": 9,
          "FIA_ATD.1": 2,
          "FIA_UID": 22,
          "FIA_UID.1": 12,
          "FIA_UID.2": 1,
          "FIA_USB": 6,
          "FIA_USB.1": 3
        },
        "FMT": {
          "FMT_MSA": 135,
          "FMT_MSA.1": 14,
          "FMT_MSA.2": 2,
          "FMT_MSA.3": 22,
          "FMT_MTD": 20,
          "FMT_MTD.1": 2,
          "FMT_MTD.3": 1,
          "FMT_SMF": 41,
          "FMT_SMF.1": 22,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 43,
          "FMT_SMR.1": 37,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPR": {
          "FPR_UNO.1": 13,
          "FPR_UNO.1.1": 1
        },
        "FPT": {
          "FPT_FLS": 36,
          "FPT_FLS.1": 16,
          "FPT_FLS.1.1": 2,
          "FPT_ITT.1": 1,
          "FPT_PHP.3": 1,
          "FPT_RCV": 27,
          "FPT_RCV.3": 13,
          "FPT_RCV.4": 2,
          "FPT_TDC.1": 8,
          "FPT_TDC.1.1": 1,
          "FPT_TDC.1.2": 1,
          "FPT_TST.1": 1
        },
        "FRU": {
          "FRU_FLT.2": 1
        },
        "FTP": {
          "FTP_ITC": 10,
          "FTP_ITC.1": 5,
          "FTP_TRP.1": 2
        }
      },
      "certification_process": {
        "OutOfScope": {
          "Software development environment. Phase 2 covers the Secure IC Development of Infineon and is out of scope of the TOE evaluation as that is part of the IC platform evaluation. In Phase 3, the Chip": 1,
          "a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.RECOVERY and O.OS_SUPPORT are": 1,
          "by the TOE. There are no pre-issuance applets installed. Native code post-issuance downloading is out of scope The SCP is a certified hardware platform \u2013 the SLE78CLFX4000P(M) with RSA2048/4096 v1.02.013, EC v1": 1,
          "out of scope": 3
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 21
        },
        "CCM": {
          "CCM": 1
        },
        "ECB": {
          "ECB": 6
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "Infineon": {
          "v1.02.013": 3
        }
      },
      "crypto_protocol": {},
      "crypto_scheme": {
        "KA": {
          "KA": 2,
          "Key Agreement": 2
        },
        "KEX": {
          "Key exchange": 1
        },
        "MAC": {
          "MAC": 4
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "P-192": 2
        }
      },
      "eval_facility": {
        "TUV": {
          "TUV Informationstechnik": 1,
          "T\u00dcV Informationstechnik": 1
        }
      },
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 3
          }
        },
        "RIPEMD": {
          "RIPEMD-160": 2,
          "RIPEMD160": 1
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 1
          },
          "SHA2": {
            "SHA-2": 5,
            "SHA-224": 1,
            "SHA-256": 1,
            "SHA-384": 1,
            "SHA-512": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {
        "misc": {
          "TYPE_ACCESS": 5
        }
      },
      "javacard_packages": {
        "javacard": {
          "javacard.framework": 4,
          "javacard.security": 3
        },
        "javacardx": {
          "javacardx.crypto": 3,
          "javacardx.external": 1,
          "javacardx.security": 1
        }
      },
      "javacard_version": {
        "JavaCard": {
          "Java Card 3.0.1": 3
        }
      },
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 20,
          "RNG": 11
        },
        "TRNG": {
          "TRNG": 3
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 3,
          "malfunction": 4,
          "physical tampering": 1
        },
        "SCA": {
          "DPA": 4,
          "Leak-Inherent": 2,
          "SPA": 1,
          "physical probing": 3,
          "side channel": 1,
          "timing attacks": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS20": 4,
          "AIS36": 2
        },
        "FIPS": {
          "FIPS 140-2": 1,
          "FIPS 180-4": 6,
          "FIPS 186-3": 7,
          "FIPS 197": 9,
          "FIPS PUB 180-4": 1,
          "FIPS PUB 186-3": 1,
          "FIPS PUB 197": 1,
          "FIPS140": 2
        },
        "ICAO": {
          "ICAO": 6
        },
        "ISO": {
          "ISO/IEC 14443": 2,
          "ISO/IEC 15946-": 5,
          "ISO/IEC 18092": 2,
          "ISO/IEC7816": 2
        },
        "NIST": {
          "NIST SP 800-108": 1,
          "NIST SP 800-38B": 1
        },
        "RFC": {
          "RFC 5639": 5
        },
        "SCP": {
          "SCP 02": 2,
          "SCP 03": 3,
          "SCP01": 2,
          "SCP02": 9,
          "SCP03": 9
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 19
          }
        },
        "DES": {
          "3DES": {
            "TDEA": 1,
            "TDES": 22,
            "Triple-DES": 1
          },
          "DES": {
            "DES": 9
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 1
          }
        },
        "miscellaneous": {
          "SEED": {
            "SEED": 2
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon": 182,
          "Infineon Technologies AG": 2
        },
        "NXP": {
          "NXP Semiconductors": 1
        },
        "STMicroelectronics": {
          "STMicroelectronics": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "T\u00dcV Informationstechnik GmbH, Roland Atoui, Linda Kyrnitszke",
      "/CreationDate": "D:20141120164433+01\u002700\u0027",
      "/Creator": "Microsoft\u00ae Office Word 2007",
      "/Keywords": "Java Card Platform, Smart Card,",
      "/ModDate": "D:20141120164433+01\u002700\u0027",
      "/Producer": "Microsoft\u00ae Office Word 2007",
      "/Subject": "Common Criteria - ASE",
      "/Title": "Security Target Lite - Java Card Platform on SLE 78 (SLJ 52)",
      "pdf_file_size_bytes": 2880995,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.iso.org/iso/iso_catalogue/catalogue_tc/catalogue_detail.htm?csnumber=30656"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 158
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-profil_PP-2010-03en.pdf",
        "pp_name": "Java Card\u2122 System Protection Profile Open Configuration, Version 3.0"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/0869a_pdf.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "AVA_VAN.5",
      "ALC_DVS.2",
      "EAL5+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/0869b_pdf.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "4919856aca1390ba0a11287b0ddfa3e9f976f6e678b2b2a2dc44f58e4842fcc2",
      "txt_hash": "16970b2f509be251e90601cc89d5bda8e4182f8616c7069cefd49701a354a75d"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "3db4cbb37700c9c4a1a564689053f9f989120c0d09b8dc8720e40c7d776bc7fa",
      "txt_hash": "67fedaf86fe2fd88b1299bfe9370da6eac9f84609bf8171fc31bd530d17d0443"
    }
  },
  "status": "archived"
}