HED Secure Smart Card Chip CIU9872B_01 C11 with IC Dedicated Software
CSV information ?
Status | archived |
---|---|
Valid from | 25.11.2016 |
Valid until | 25.11.2021 |
Scheme | 🇳🇴 NO |
Manufacturer | CEC Huada Electronic Design Co., Ltd. |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | EAL5+, ALC_DVS.2, AVA_VAN.5 |
Protection profiles |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Symmetric Algorithms
DES, TDESRandomness
RNGSecurity level
EAL 5+, EAL 2, EAL 4, EAL5+, EAL1, EAL7, EAL5Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, AGD_OPE.1, AGD_PRE.1, ALC_FLR, ALC_DVS.2, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.2, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, ATE_IND, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.2, ASE_SPD.1, ASE_OBJ.2, ASE_TSS.1Security Functional Requirements (SFR)
FAU_SAS.1, FCS_RNG.1, FCS_COP.1, FDP_SDC.1, FDP_ITT.1, FDP_IFC.1, FDP_SDI.2, FDP_ACC.1, FDP_ACF.1, FMT_LIM.1, FMT_LIM.2, FPT_FLS.1, FPT_PHP.3, FPT_ITT.1, FRU_FLT.2Protection profiles
BSI-CC-PP-0084-2014Certificates
SERTIT-090Evaluation facilities
BrightsightSide-channel analysis
DPA, SPA, Fault Injection, JILStandards
ISO/IEC 15408, ISO/IEC 7816, ISO/IEC 14443, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004File metadata
Author | Rage, Arne Høye |
---|---|
Creation date | D:20161125101755Z00'00' |
Modification date | D:20161125101755Z00'00' |
Pages | 18 |
Creator | Microsoft® Word 2010 |
Producer | Mac OS X 10.12.1 Quartz PDFContext |
References
Incoming- SERTIT-078 - archived - CIU9872b_01 C12
Security target ?
Extracted keywords
Symmetric Algorithms
DES, TDES, TDEASchemes
PKERandomness
TRNG, RND, RNGBlock cipher modes
ECB, CBCSecurity level
EAL5, EAL4, EAL5+, EAL5 augmented, EAL4 augmentedClaims
O.RND, O.TDES, O.RSA, O.MEM-ACCESS, T.RNDSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, AGD_OPE, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.2, ALC_DVS.1, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_SAS, FAU_SAS.1, FAU_GEN, FAU_SAS.1.1, FCS_RNG, FCS_RNG.1, FCS_COP.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM.1, FCS_CKM.4, FCS_COP.1.1, FCS_COP, FDP_SDC, FDP_SDI.2, FDP_SDC.1, FDP_ITT.1, FDP_IFC.1, FDP_ACC.1, FDP_ACF.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_ITC.1, FDP_ITC.2, FDP_SDI.1, FDP_SDI.2.1, FDP_SDI.2.2, FDP_SDC.1.1, FDP_SDI, FDP_ACC, FDP_ACF, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_MSA.3, FPT_FLS.1, FPT_PHP.3, FPT_ITT.1, FPT_FLS.1.1, FPT_PHP.3.1, FPT_FLS, FPT_PHP, FRU_FLT.2, FRU_FLTProtection profiles
BSI-CC-PP-0084-2014, BSI-PP-0084Side-channel analysis
Leak-Inherent, Physical Probing, physical probing, DPA, SPA, physical tampering, Malfunction, malfunction, DFAStandards
FIPS PUB 46-3, AIS20, ISO/IEC14443, ISO/IEC 14443, ISO/IEC 7816, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004File metadata
Author | 刘剑峰 |
---|---|
Creation date | D:20161125102430+00'00' |
Modification date | D:20161125102430+00'00' |
Pages | 40 |
Creator | Microsoft Word |
Heuristics ?
Extracted SARs
ALC_DVS.2, ALC_DEL.1, ASE_ECD.1, ADV_INT.2, ASE_SPD.1, ASE_CCL.1, ALC_TAT.2, ATE_IND.2, ASE_TSS.1, ASE_INT.1, ATE_DPT.3, AGD_OPE.1, AVA_VAN.5, ADV_ARC.1, AGD_PRE.1, ATE_FUN.1, ADV_IMP.1, ASE_OBJ.2, ADV_FSP.5, ATE_COV.2, ALC_CMS.5, ALC_CMC.4, ADV_TDS.4, ASE_REQ.2, ALC_LCD.1Scheme data ?
Product | HED Secure Smart Card Chip CIU9872B_01 | |
---|---|---|
Url | https://sertit.no/certified-products/product-archive/hed-secure-smart-card-chip-ciu9872b-01 | |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems | |
Developer | CEC Huada Electronic Design Co., Ltd. | |
Certification Date | 25.11.2016 | |
Enhanced | ||
Description | The TOE is a high-end secure smart card integrated circuit with dedicated software mainly for financial applications. The scope of the TOE includes the IC hardware and IC dedicated software which is constitutive of Chip Management System (CMS) and cryptographic library. CMS supports two functionalities, which are booting process controlling and chip module function testing. The cryptographic library implements the arithmetic function like RSA, DES, and TDES with cooperating of hardware. The whole IC dedicated software is programed with C language. | |
Id | SERTIT-090 | |
Mutual Recognition | CCRA, SOG-IS | |
Product | C11 | |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems | |
Sponsor | CEC Huada Electronic Design Co., Ltd. | |
Developer | CEC Huada Electronic Design Co., Ltd. | |
Evaluation Facility | Brightsight B.V. | |
Certification Date | 25.11.2016 | |
Level | EAL 5, ALC_DVS.2, AVA_VAN.5 | |
Protection Profile | BSI-CC-PP-0084-2014 v1.0 | |
Documents | frozendict({'cert': [frozendict({'href': 'https://sertit.no/getfile.php/135106-1607952924/SERTIT/Sertifikater/2016/90/20161125%20SERTIT-090%20C.pdf'})], 'target': [frozendict({'href': 'https://sertit.no/getfile.php/135112-1607952929/SERTIT/Sertifikater/2016/90/Security%20Target-lite%20of%20CIU9872B_01%20C11%20Secure%20Smart%20Card%20Chip%20V1.1.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/135109-1607952926/SERTIT/Sertifikater/2016/90/20161125%20S-090%20CR%20%20v1.0%20Huada.pdf'})]}) |
References ?
Updates ?
-
17.10.2024 The certificate data changed.
Certificate changed
The Protection Profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['JAVA_OC', 'BAROC_SC_PP_V1.0', 'SECURITY_IC_AUGP_V1.0']}}]}
.
- The new value is
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '2a6fd088cb06ad8ccd552f9b109bd9350caefbc141dde0f296a042908237bf64', 'txt_hash': 'c4025deaa012030b1d6529ba98c7771f6b0f2d83065677db504c130ac439c538'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '627f1c3373e88dc7c4005340054c92747b772cd65ce7a8908b8e43a931d70519', 'txt_hash': '02866e990310bd6ea8f44fe8fe5bed8df67a4a9b765e6110b5399a5ccb99e52c'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 652645, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 18, '/Author': 'Rage, Arne Høye', '/Producer': 'Mac OS X 10.12.1 Quartz PDFContext', '/Creator': 'Microsoft® Word 2010', '/CreationDate': "D:20161125101755Z00'00'", '/ModDate': "D:20161125101755Z00'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 1079746, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 40, '/Author': '刘剑峰', '/Creator': 'Microsoft Word', '/CreationDate': "D:20161125102430+00'00'", '/ModDate': "D:20161125102430+00'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{}
. - The report_keywords property was set to
{'cc_cert_id': {'NO': {'SERTIT-090': 17}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 18}}, 'cc_security_level': {'EAL': {'EAL 5+': 18, 'EAL 2': 1, 'EAL 4': 1, 'EAL5+': 1, 'EAL1': 1, 'EAL7': 1, 'EAL5': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.5': 1, 'ADV_IMP.1': 1, 'ADV_INT.2': 1, 'ADV_TDS.4': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR': 1, 'ALC_DVS.2': 4, 'ALC_CMC.4': 1, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.2': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.3': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.5': 4}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_OBJ.2': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 3}, 'FCS': {'FCS_RNG.1': 4, 'FCS_COP.1': 3}, 'FDP': {'FDP_SDC.1': 3, 'FDP_ITT.1': 1, 'FDP_IFC.1': 1, 'FDP_SDI.2': 2, 'FDP_ACC.1': 1, 'FDP_ACF.1': 1}, 'FMT': {'FMT_LIM.1': 2, 'FMT_LIM.2': 2}, 'FPT': {'FPT_FLS.1': 1, 'FPT_PHP.3': 1, 'FPT_ITT.1': 1}, 'FRU': {'FRU_FLT.2': 1}}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'BrightSight': {'Brightsight': 2}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 3}, '3DES': {'TDES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 1}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'DPA': 1, 'SPA': 1}, 'FI': {'Fault Injection': 1}, 'other': {'JIL': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 7816': 2, 'ISO/IEC 14443': 2}, 'CC': {'CCMB-2012-09-001': 1, 'CCMB-2012-09-002': 1, 'CCMB-2012-09-003': 1, 'CCMB-2012-09-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 1, 'BSI-PP-0084': 24}}, 'cc_security_level': {'EAL': {'EAL5': 9, 'EAL4': 1, 'EAL5+': 1, 'EAL5 augmented': 3, 'EAL4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 2, 'ADV_FSP.5': 2, 'ADV_IMP.1': 2, 'ADV_INT.2': 1, 'ADV_TDS.4': 2}, 'AGD': {'AGD_OPE': 2, 'AGD_PRE': 2, 'AGD_OPE.1': 2, 'AGD_PRE.1': 2}, 'ALC': {'ALC_DVS.2': 8, 'ALC_CMC.4': 1, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.2': 1, 'ALC_DVS.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.3': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.5': 10}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS': 5, 'FAU_SAS.1': 6, 'FAU_GEN': 1, 'FAU_SAS.1.1': 1}, 'FCS': {'FCS_RNG': 3, 'FCS_RNG.1': 11, 'FCS_COP.1': 21, 'FCS_RNG.1.1': 2, 'FCS_RNG.1.2': 2, 'FCS_CKM.1': 13, 'FCS_CKM.4': 10, 'FCS_COP.1.1': 2, 'FCS_COP': 1}, 'FDP': {'FDP_SDC': 3, 'FDP_SDI.2': 6, 'FDP_SDC.1': 5, 'FDP_ITT.1': 4, 'FDP_IFC.1': 4, 'FDP_ACC.1': 12, 'FDP_ACF.1': 12, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_ITC.1': 9, 'FDP_ITC.2': 9, 'FDP_SDI.1': 3, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_SDC.1.1': 1, 'FDP_SDI': 1, 'FDP_ACC': 1, 'FDP_ACF': 1}, 'FMT': {'FMT_LIM': 5, 'FMT_LIM.1': 5, 'FMT_LIM.2': 5, 'FMT_MSA.3': 4}, 'FPT': {'FPT_FLS.1': 6, 'FPT_PHP.3': 5, 'FPT_ITT.1': 4, 'FPT_FLS.1.1': 1, 'FPT_PHP.3.1': 1, 'FPT_FLS': 1, 'FPT_PHP': 1}, 'FRU': {'FRU_FLT.2': 6, 'FRU_FLT': 1}}, 'cc_claims': {'O': {'O.RND': 2, 'O.TDES': 5, 'O.RSA': 4, 'O.MEM-ACCESS': 1}, 'T': {'T.RND': 2}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'DES': {'DES': {'DES': 3}, '3DES': {'TDES': 28, 'TDEA': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'PKE': {'PKE': 3}}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 3}, 'RNG': {'RND': 4, 'RNG': 11}}, 'cipher_mode': {'ECB': {'ECB': 2}, 'CBC': {'CBC': 2}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 5, 'Physical Probing': 2, 'physical probing': 3, 'DPA': 3, 'SPA': 3}, 'FI': {'physical tampering': 1, 'Malfunction': 6, 'malfunction': 2, 'DFA': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 46-3': 1}, 'BSI': {'AIS20': 5}, 'ISO': {'ISO/IEC14443': 2, 'ISO/IEC 14443': 2, 'ISO/IEC 7816': 2}, 'CC': {'CCMB-2012-09-001': 2, 'CCMB-2012-09-002': 2, 'CCMB-2012-09-003': 2, 'CCMB-2012-09-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
20161125 S-090 CR v1.0 Huada.pdf
. - The st_filename property was set to
Security Target-lite of CIU9872B_01 C11 Secure Smart Card Chip V1.1.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
SERTIT-090
. - The report_references property was updated, with the
{'directly_referenced_by': {'_type': 'Set', 'elements': ['SERTIT-078']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['SERTIT-078']}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}]}
values added. - The scheme_data property was updated, with the
{'product': 'HED Secure Smart Card Chip CIU9872B_01', 'url': 'https://sertit.no/certified-products/product-archive/hed-secure-smart-card-chip-ciu9872b-01', 'certification_date': '25.11.2016', 'enhanced': {'__insert__': {'sponsor': 'CEC Huada Electronic Design Co., Ltd.', 'protection_profile': 'BSI-CC-PP-0084-2014 v1.0'}, '__update__': {'description': 'The TOE is a high-end secure smart card integrated circuit with dedicated software mainly for financial applications. The scope of the TOE includes the IC hardware and IC dedicated software which is constitutive of Chip Management System (CMS) and cryptographic library. CMS supports two functionalities, which are booting process controlling and chip module function testing. The cryptographic library implements the arithmetic function like RSA, DES, and TDES with cooperating of hardware. The whole IC dedicated software is programed with C language.', 'id': 'SERTIT-090', 'product': 'C11', 'certification_date': '25.11.2016', 'documents': {'__update__': {'cert': {'0': {'__update__': {'href': 'https://sertit.no/getfile.php/135106-1607952924/SERTIT/Sertifikater/2016/90/20161125%20SERTIT-090%20C.pdf'}}}, 'target': {'0': {'__update__': {'href': 'https://sertit.no/getfile.php/135112-1607952929/SERTIT/Sertifikater/2016/90/Security%20Target-lite%20of%20CIU9872B_01%20C11%20Secure%20Smart%20Card%20Chip%20V1.1.pdf'}}}, 'report': {'0': {'__update__': {'href': 'https://sertit.no/getfile.php/135109-1607952926/SERTIT/Sertifikater/2016/90/20161125%20S-090%20CR%20%20v1.0%20Huada.pdf'}}}}}}}}
data.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20161125%20S-090%20CR%20%20v1.0%20Huada.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Security%20Target-lite%20of%20CIU9872B_01%20C11%20Secure%20Smart%20Card%20Chip%20V1.1.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The report_filename property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
None
. - The report_references property was updated, with the
{'directly_referenced_by': None, 'indirectly_referenced_by': None}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}]}
values discarded. - The scheme_data property was updated, with the
{'product': 'HED Secure Chip CIU9872B_01', 'url': 'https://sertit.no/certified-products/product-archive/hed-secure-chip-ciu9872b-01', 'certification_date': '06.11.2017', 'enhanced': {'__update__': {'description': 'The TOE is a high-end secure integrated circuit suitable for financial or governmental applications. The TOE consists of the IC hardware, IC dedicated test software and IC dedicated support software providing cryptographic functions. The hardware is based on a 32-bit CPU with volatile, non-volatile and read-only memory. The microcontroller incorporates cryptographic coprocessors for acceleration of symmetric and asymmetric encryption algorithms. The IC dedicated support software, also known as Crypto Library, provides DES, AES, RSA and random number generation functions.', 'id': 'SERTIT-078', 'product': 'C12', 'certification_date': '06.11.2017', 'documents': {'__update__': {'cert': {'0': {'__update__': {'href': 'https://sertit.no/getfile.php/135154-1607953116/SERTIT/Sertifikater/2017/78/Sertit-078%20C.pdf'}}}, 'target': {'0': {'__update__': {'href': 'https://sertit.no/getfile.php/135151-1607953112/SERTIT/Sertifikater/2017/78/Security%20Target%20Lite%20of%20CIU9872B_01%20C12%20Secure%20Chip%20v1.2.pdf'}}}, 'report': {'0': {'__update__': {'href': 'https://sertit.no/getfile.php/135157-1607953118/SERTIT/Sertifikater/2017/78/20171106_SERTIT-078_CR_v1.pdf'}}}}}}, '__delete__': ['sponsor', 'protection_profile']}}
data.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
- The st property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name HED Secure Smart Card Chip CIU9872B_01 C11 with IC Dedicated Software was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "d48cc6c1c371a5a4",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "SERTIT-090",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"SERTIT-078"
]
},
"directly_referencing": null,
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"SERTIT-078"
]
},
"indirectly_referencing": null
},
"scheme_data": {
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"certification_date": "25.11.2016",
"developer": "CEC Huada Electronic Design Co., Ltd.",
"enhanced": {
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"certification_date": "25.11.2016",
"description": "The TOE is a high-end secure smart card integrated circuit with dedicated software mainly for financial applications. The scope of the TOE includes the IC hardware and IC dedicated software which is constitutive of Chip Management System (CMS) and cryptographic library. CMS supports two functionalities, which are booting process controlling and chip module function testing. The cryptographic library implements the arithmetic function like RSA, DES, and TDES with cooperating of hardware. The whole IC dedicated software is programed with C language.",
"developer": "CEC Huada Electronic Design Co., Ltd.",
"documents": {
"cert": [
{
"href": "https://sertit.no/getfile.php/135106-1607952924/SERTIT/Sertifikater/2016/90/20161125%20SERTIT-090%20C.pdf"
}
],
"report": [
{
"href": "https://sertit.no/getfile.php/135109-1607952926/SERTIT/Sertifikater/2016/90/20161125%20S-090%20CR%20%20v1.0%20Huada.pdf"
}
],
"target": [
{
"href": "https://sertit.no/getfile.php/135112-1607952929/SERTIT/Sertifikater/2016/90/Security%20Target-lite%20of%20CIU9872B_01%20C11%20Secure%20Smart%20Card%20Chip%20V1.1.pdf"
}
]
},
"evaluation_facility": "Brightsight B.V.",
"id": "SERTIT-090",
"level": "EAL 5, ALC_DVS.2, AVA_VAN.5",
"mutual_recognition": "CCRA, SOG-IS",
"product": "C11",
"protection_profile": "BSI-CC-PP-0084-2014 v1.0",
"sponsor": "CEC Huada Electronic Design Co., Ltd."
},
"product": "HED Secure Smart Card Chip CIU9872B_01",
"url": "https://sertit.no/certified-products/product-archive/hed-secure-smart-card-chip-ciu9872b-01"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "CEC Huada Electronic Design Co., Ltd.",
"manufacturer_web": "https://www.hed.com.cn/en/",
"name": "HED Secure Smart Card Chip CIU9872B_01 C11 with IC Dedicated Software",
"not_valid_after": "2021-11-25",
"not_valid_before": "2016-11-25",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "20161125 S-090 CR v1.0 Huada.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"NO": {
"SERTIT-090": 17
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0084-2014": 18
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.5": 1,
"ADV_IMP.1": 1,
"ADV_INT.2": 1,
"ADV_TDS.4": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.5": 1,
"ALC_DEL.1": 1,
"ALC_DVS.2": 4,
"ALC_FLR": 1,
"ALC_LCD.1": 1,
"ALC_TAT.2": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.3": 1,
"ATE_FUN.1": 1,
"ATE_IND": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.5": 4
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 4": 1,
"EAL 5+": 18,
"EAL1": 1,
"EAL5": 1,
"EAL5+": 1,
"EAL7": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_SAS.1": 3
},
"FCS": {
"FCS_COP.1": 3,
"FCS_RNG.1": 4
},
"FDP": {
"FDP_ACC.1": 1,
"FDP_ACF.1": 1,
"FDP_IFC.1": 1,
"FDP_ITT.1": 1,
"FDP_SDC.1": 3,
"FDP_SDI.2": 2
},
"FMT": {
"FMT_LIM.1": 2,
"FMT_LIM.2": 2
},
"FPT": {
"FPT_FLS.1": 1,
"FPT_ITT.1": 1,
"FPT_PHP.3": 1
},
"FRU": {
"FRU_FLT.2": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"BrightSight": {
"Brightsight": 2
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 1
}
},
"side_channel_analysis": {
"FI": {
"Fault Injection": 1
},
"SCA": {
"DPA": 1,
"SPA": 1
},
"other": {
"JIL": 2
}
},
"standard_id": {
"CC": {
"CCMB-2012-09-001": 1,
"CCMB-2012-09-002": 1,
"CCMB-2012-09-003": 1,
"CCMB-2012-09-004": 1
},
"ISO": {
"ISO/IEC 14443": 2,
"ISO/IEC 15408": 2,
"ISO/IEC 7816": 2
}
},
"symmetric_crypto": {
"DES": {
"3DES": {
"TDES": 1
},
"DES": {
"DES": 3
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Rage, Arne H\u00f8ye",
"/CreationDate": "D:20161125101755Z00\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2010",
"/ModDate": "D:20161125101755Z00\u002700\u0027",
"/Producer": "Mac OS X 10.12.1 Quartz PDFContext",
"pdf_file_size_bytes": 652645,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 18
},
"st_filename": "Security Target-lite of CIU9872B_01 C11 Secure Smart Card Chip V1.1.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"O": {
"O.MEM-ACCESS": 1,
"O.RND": 2,
"O.RSA": 4,
"O.TDES": 5
},
"T": {
"T.RND": 2
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0084-2014": 1,
"BSI-PP-0084": 24
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 2,
"ADV_FSP.5": 2,
"ADV_IMP.1": 2,
"ADV_INT.2": 1,
"ADV_TDS.4": 2
},
"AGD": {
"AGD_OPE": 2,
"AGD_OPE.1": 2,
"AGD_PRE": 2,
"AGD_PRE.1": 2
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.5": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_DVS.2": 8,
"ALC_LCD.1": 1,
"ALC_TAT.2": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.3": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.5": 10
}
},
"cc_security_level": {
"EAL": {
"EAL4": 1,
"EAL4 augmented": 1,
"EAL5": 9,
"EAL5 augmented": 3,
"EAL5+": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1,
"FAU_SAS": 5,
"FAU_SAS.1": 6,
"FAU_SAS.1.1": 1
},
"FCS": {
"FCS_CKM.1": 13,
"FCS_CKM.4": 10,
"FCS_COP": 1,
"FCS_COP.1": 21,
"FCS_COP.1.1": 2,
"FCS_RNG": 3,
"FCS_RNG.1": 11,
"FCS_RNG.1.1": 2,
"FCS_RNG.1.2": 2
},
"FDP": {
"FDP_ACC": 1,
"FDP_ACC.1": 12,
"FDP_ACC.1.1": 1,
"FDP_ACF": 1,
"FDP_ACF.1": 12,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_IFC.1": 4,
"FDP_ITC.1": 9,
"FDP_ITC.2": 9,
"FDP_ITT.1": 4,
"FDP_SDC": 3,
"FDP_SDC.1": 5,
"FDP_SDC.1.1": 1,
"FDP_SDI": 1,
"FDP_SDI.1": 3,
"FDP_SDI.2": 6,
"FDP_SDI.2.1": 1,
"FDP_SDI.2.2": 1
},
"FMT": {
"FMT_LIM": 5,
"FMT_LIM.1": 5,
"FMT_LIM.2": 5,
"FMT_MSA.3": 4
},
"FPT": {
"FPT_FLS": 1,
"FPT_FLS.1": 6,
"FPT_FLS.1.1": 1,
"FPT_ITT.1": 4,
"FPT_PHP": 1,
"FPT_PHP.3": 5,
"FPT_PHP.3.1": 1
},
"FRU": {
"FRU_FLT": 1,
"FRU_FLT.2": 6
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 2
},
"ECB": {
"ECB": 2
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"PKE": {
"PKE": 3
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 4,
"RNG": 11
},
"TRNG": {
"TRNG": 3
}
},
"side_channel_analysis": {
"FI": {
"DFA": 2,
"Malfunction": 6,
"malfunction": 2,
"physical tampering": 1
},
"SCA": {
"DPA": 3,
"Leak-Inherent": 5,
"Physical Probing": 2,
"SPA": 3,
"physical probing": 3
}
},
"standard_id": {
"BSI": {
"AIS20": 5
},
"CC": {
"CCMB-2012-09-001": 2,
"CCMB-2012-09-002": 2,
"CCMB-2012-09-003": 2,
"CCMB-2012-09-004": 2
},
"FIPS": {
"FIPS PUB 46-3": 1
},
"ISO": {
"ISO/IEC 14443": 2,
"ISO/IEC 7816": 2,
"ISO/IEC14443": 2
}
},
"symmetric_crypto": {
"DES": {
"3DES": {
"TDEA": 1,
"TDES": 28
},
"DES": {
"DES": 3
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "\u5218\u5251\u5cf0",
"/CreationDate": "D:20161125102430+00\u002700\u0027",
"/Creator": "Microsoft Word",
"/ModDate": "D:20161125102430+00\u002700\u0027",
"pdf_file_size_bytes": 1079746,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 40
}
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": "EAL4+",
"pp_ids": {
"_type": "Set",
"elements": [
"BAROC_SC_PP_V1.0",
"JAVA_OC",
"SECURITY_IC_AUGP_V1.0"
]
},
"pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf",
"pp_name": "Security IC Platform Protection Profile with Augmentation Packages"
}
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20161125%20S-090%20CR%20%20v1.0%20Huada.pdf",
"scheme": "NO",
"security_level": {
"_type": "Set",
"elements": [
"AVA_VAN.5",
"EAL5+",
"ALC_DVS.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Security%20Target-lite%20of%20CIU9872B_01%20C11%20Secure%20Smart%20Card%20Chip%20V1.1.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "2a6fd088cb06ad8ccd552f9b109bd9350caefbc141dde0f296a042908237bf64",
"txt_hash": "c4025deaa012030b1d6529ba98c7771f6b0f2d83065677db504c130ac439c538"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "627f1c3373e88dc7c4005340054c92747b772cd65ce7a8908b8e43a931d70519",
"txt_hash": "02866e990310bd6ea8f44fe8fe5bed8df67a4a9b765e6110b5399a5ccb99e52c"
}
},
"status": "archived"
}