JCLX80jTOP20ID smart card: Java Trusted Open Platform on SLE66CLX800PE microcontroller
CSV information
Status | archived |
---|---|
Valid from | 19.12.2008 |
Valid until | 01.09.2019 |
Scheme | 🇫🇷 FR |
Manufacturer | Trusted Logic |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | EAL5 |
Maintenance updates | Maintenance Report DCSSI-2008/43-M01 (06.07.2009) Certification report |
Heuristics summary
Certificate
Certification report
Extracted keywords
Asymmetric Algorithms
RSA2048, ECCSchemes
Key AgreementRandomness
TRNGJavaCard versions
Java Card 2.2.1, GlobalPlatform 2.1.1Vendor
InfineonSecurity level
EAL 5, EAL4, EAL7, EAL 1, EAL 3, EAL 7, EAL5+, EAL 5 augmented, ITSEC E6 andSecurity Assurance Requirements (SAR)
ACM_AUT, ACM_CAP, ACM_SCP, ADO_DEL, ADO_IGS, ADV_FSP, ADV_HLD, ADV_IMP, ADV_INT, ADV_LLD, ADV_RCR, ADV_SPM, AGD_ADM, AGD_USR, ALC_DVS.2, ALC_FLR, ALC_DVS, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VLA.4, AVA_MSU.3, AVA_CCA, AVA_MSU, AVA_SOF, AVA_VLAProtection profiles
BSI-PP-0002-2001Certificates
BSI-DSZ-CC-04821, BSI-DSZ-CC-0482, DCSSI-2008/43Evaluation facilities
Serma TechnologiesStandards
AIS 34, AIS 31, AIS34, AIS31, ISO/IEC 15408:2005, ISO/IEC 18045:2005, CCMB-2005-08-001, CCMB-2005-08-002, CCMB-2005-08-003, CCMB-2005-08-004File metadata
Title | Microsoft Word - dcssi-2008_43en.doc |
---|---|
Author | nassor |
Creation date | D:20081223095616+01'00' |
Modification date | D:20081223095616+01'00' |
Pages | 20 |
Creator | PScript5.dll Version 5.2 |
Producer | Acrobat Distiller 8.0.0 (Windows) |
Frontpage
Certificate ID | DCSSI-2008/43 |
---|---|
Certified item | JCLX80jTOP20ID smart card: Java Trusted Open Platform on SLE66CLX800PE microcontroller |
Certification lab | Serma Technologies 30 avenue Gustave Eiffel, 33608 Pessac, France Phone: +33 (0)5 57 26 08 75, email : [email protected] |
Developer | Trusted Logic SA 5, rue du Bailliage 78000 Versailles – France Sponsor Trusted Logic SA 5, rue du Bailliage 78000 Versailles – France |
Security target
Extracted keywords
Symmetric Algorithms
DES, 3DESAsymmetric Algorithms
RSA2048, RSA-CRT, ECC, Diffie-HellmanHash functions
SHA-224, SHA-256Schemes
MAC, Key Agreement, Key agreementRandomness
RND, RNGBlock cipher modes
ECB, CBC, CCMJavaCard versions
Java Card 2.2.1, GlobalPlatform 2.1.1Security level
EAL5, EAL5 augmentedClaims
D.APP-CODE, D.APP-INST, D.COMMAND, D.ISD-SESSION-KEYS, D.JCS_KEYS, D.ISD-, D.ISD-PERSO, D.GP-REGISTRY, D.CVM, D.APP_C_DATA, D.APP_I_DATA, D.PIN, D.SOFTWARE, D.JCS_CODE, D.JCS_DATA, D.SEC_DATA, D.API_DATA, D.CRYPTO, O.REQUEST, O.INFO-ORIGIN, O.LOAD, O.INSTALL, O.INFO-INTEGRITY, O.INFO-CONFIDENTIALITY, O.NO-KEY-REUSE, O.DELETION, O.LIFE-CYCLE, O.IDENTIFICATION, O.GLOBAL-CVM, O.CVM-BLOCK, O.SID, O.ERROR-COUNTERS, O.RECOVERY, O.LOCK, O.OPERATE, O.RESOURCES, O.FIREWALL, O.REALLOCATION, O.SHRD_VAR_CONFID, O.SHRD_VAR_INTEG, O.NATIVE, O.VERIFICATION, O.OS-SUPPORT, O.PIN-MNGT, O.ALARM, O.TRANSACTION, O.CIPHER, O.KEY-MNGT, O.OBJ-DELETION, O.PROT-INF-LEAK, O.PROT-PHYS-TAMPER, O.ABUSE-FUNC, O.IC-SUPPORT, O.PROT-MALFUNCTION, O.PROT-, O.RND, T.INSTALL, T.CRYPTO, T.CONFID-APPLI-DATA, T.CONFID-JCS-DATA, T.INTEG-, T.INTEG-JCS-DATA, T.DELETION, T.IMPERSONATE, T.INVALID-INPUT, T.INVALID-ORDER, T.FORCED-RESET, T.REPLAY, T.BRUTE-FORCE, T.LIFE-CYCLE, T.CONFID-JCS-CODE, T.INTEG-APPLI-CODE, T.INTEG-JCS-CODE, T.INTEG-APPLI-DATA, T.SID, T.EXE-CODE, T.NATIVE, T.RESSOURCES, T.OBJ-DELETION, T.ABUSE-FUNC, T.PHYS-TAMPER, T.MALFUNCTION, T.INF-LEAK, T.RND, A.CARD-MANAGEMENT, A.NATIVE, A.VERIFICATION, A.APPLET, A.MANUFACTURING, R.JAVA, OE.IC, OE.SCP, OE.RECOVERY, OE.SUPPORT, OE.CARD-MANAGEMENT, OE.MANUFACTURING, OE.VERIFICATION, OE.NATIVE, OE.APPLET, OE.SECRETS, OE.KEY-LENGTH, OE.NO-RMI-APPLETS, OSP, OSP.VERIFICATION, OSP.FILE-ORIGIN, OSP.SECRETS, OSP.KEY-LENGTH, OSP.NO-RMI-APPLETS, OSP.PERSONALIZATION, OSP.PROCESS-TOESecurity Assurance Requirements (SAR)
ADV_HLD, ALC_DVS.2, AVA_VLA.4Security Functional Requirements (SFR)
FAU_ARP, FAU_ARP.1, FCO_NRO, FCO_NRO.2, FCS_RND, FCS_RND.1, FCS_COP, FCS_COP.1, FCS_CKM, FCS_CKM.3, FCS_CKM.1, FCS_CKM.2, FCS_CKM.4, FCS_RND.1.1, FDP_ACC, FDP_ACC.1, FDP_ACF, FDP_ACF.1, FDP_ACF.1.2, FDP_IFC, FDP_IFC.2, FDP_IFF, FDP_IFF.1, FDP_IFF.1.5, FDP_IFF.1.2, FDP_ITC, FDP_ITC.1, FDP_UIT, FDP_UIT.1, FDP_ROL, FDP_ROL.1, FDP_ITC.2, FDP_ACC.2, FDP_IFC.1, FDP_RIP, FDP_RIP.1, FDP_SDI.2, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ACF.1.1, FDP_ITT, FDP_ITT.1, FDP_IFF.2, FIA_UID, FIA_UID.1, FIA_UAU, FIA_UAU.1, FIA_UAU.4, FIA_AFL, FIA_AFL.1, FIA_ATD, FIA_ATD.1, FIA_UID.2, FIA_USB.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FMT_MSA, FMT_MSA.1, FMT_MSA.3, FMT_SMF, FMT_SMF.1, FMT_SMR, FMT_SMR.1, FMT_MSA.2, FMT_MTD, FMT_MTD.1, FMT_MTD.3, FPR_UNO, FPR_UNO.1, FPT_TST.2, FPT_TDC, FPT_TDC.1, FPT_FLS, FPT_FLS.1, FPT_RCV, FPT_RCV.3, FPT_SEP, FPT_SEP.1, FPT_RVM.1, FPT_RVM.1.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_TST.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_AMT, FPT_AMT.1, FPT_RCV.4, FPT_TST, FPT_PHP, FPT_PHP.3, FPT_ITT, FPT_ITT.1, FPT_TST.2.1, FRU_RSA, FRU_RSA.1, FRU_FLT, FRU_FLT.2, FTP_ITC, FTP_ITC.1Protection profiles
BSI-PP-0002Evaluation facilities
SERMASide-channel analysis
Leak-Inherent, physical probing, DPA, SPA, physical tampering, Physical tampering, malfunction, DFA, reverse engineeringStandards
FIPS PUB 46-3, FIPS 46-2, FIPS PUB 81, FIPS 180-2, PKCS#1, PKCS#3, ISO/IEC 15946-1, ISO/IEC 15946-3, ISO/IEC 15408:2005, ICAO, SCP01, SCP02, CCMB-2005-08-001, CCMB-2005-08-002, CCMB-2005-08-003, CCMB-2005-08-004File metadata
Title | Microsoft Word - CP-2007-RT-075-1.4 JCLX80jTOP20ID - Security Target Lite.doc |
---|---|
Author | gimenez |
Creation date | D:20081217221029-02'00' |
Modification date | D:20081217221029-02'00' |
Pages | 122 |
Creator | PrimoPDF http://www.primopdf.com/ |
Producer | PrimoPDF |
Heuristics
Extracted SARs
ALC_DVS.2, AVA_MSU.3, AVA_VLA.4References
No references are available for this certificate.
Updates
-
10.02.2025 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
05.02.2025 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'_type': 'sec_certs.sample.document_state.DocumentState'}
data. - The st property was updated, with the
{'_type': 'sec_certs.sample.document_state.DocumentState'}
data. - The cert property was updated, with the
{'_type': 'sec_certs.sample.document_state.DocumentState'}
data.
The computed heuristics were updated.
- The following values were inserted:
{'protection_profiles': None, 'eal': 'EAL5'}
. - The prev_certificates property was set to
None
. - The next_certificates property was set to
None
. - The scheme_data property was set to
{'product': 'Carte à puce JCLX80jTOP20ID : Java Trusted Open Platform sur composant SLE66CLX800PE', 'url': 'https://cyber.gouv.fr/produits-certifies/carte-puce-jclx80jtop20id-java-trusted-open-platform-sur-composant-sle66clx800pe', 'description': 'Le produit évalué est la « carte à puce JCLX80jTOP20ID : Java Trusted Open Platform sur composant SLE66CLX800PE, version IFXv#27_0.1, révision de code v1.4 » développée par Trusted Logic SA. C'est une carte à puce bi-mode (contact/sans contact) comportant une plate-forme d'exécution d'applets Java Card conforme aux spécifications Java Card 2.2.1 et VISA GlobalPlatform 2.1.1 - confi', 'sponsor': 'Trusted Logic SA', 'developer': 'Trusted Logic SA', 'cert_id': 'ANSSI-CC-2008/43', 'level': 'EAL5+', 'enhanced': {'cert_id': 'ANSSI-CC-2008/43', 'certification_date': '2008-12-19', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 2.3', 'developer': 'Trusted Logic SA', 'sponsor': 'Trusted Logic SA', 'evaluation_facility': 'Serma Technologies', 'level': 'EAL5+', 'protection_profile': '', 'mutual_recognition': 'SOG-IS CCRA', 'augmented': 'ALC_DVS.2, AVA_VLA.4', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi-cible_2008-43en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi_2008-43en.pdf'}}
.
- The report property was updated, with the
-
03.02.2025 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
27.01.2025 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'Carte à puce JCLX80jTOP20ID : Java Trusted Open Platform sur composant SLE66CLX800PE', 'url': 'https://cyber.gouv.fr/produits-certifies/carte-puce-jclx80jtop20id-java-trusted-open-platform-sur-composant-sle66clx800pe', 'description': 'Le produit évalué est la « carte à puce JCLX80jTOP20ID : Java Trusted Open Platform sur composant SLE66CLX800PE, version IFXv#27_0.1, révision de code v1.4 » développée par Trusted Logic SA. C'est une carte à puce bi-mode (contact/sans contact) comportant une plate-forme d'exécution d'applets Java Card conforme aux spécifications Java Card 2.2.1 et VISA GlobalPlatform 2.1.1 - confi', 'sponsor': 'Trusted Logic SA', 'developer': 'Trusted Logic SA', 'cert_id': 'ANSSI-CC-2008/43', 'level': 'EAL5+', 'enhanced': {'cert_id': 'ANSSI-CC-2008/43', 'certification_date': '2008-12-19', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 2.3', 'developer': 'Trusted Logic SA', 'sponsor': 'Trusted Logic SA', 'evaluation_facility': 'Serma Technologies', 'level': 'EAL5+', 'protection_profile': '', 'mutual_recognition': 'SOG-IS CCRA', 'augmented': 'ALC_DVS.2, AVA_VLA.4', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi-cible_2008-43en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi_2008-43en.pdf'}}
.
- The scheme_data property was set to
-
06.01.2025 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
16.12.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'Carte à puce JCLX80jTOP20ID : Java Trusted Open Platform sur composant SLE66CLX800PE', 'url': 'https://cyber.gouv.fr/produits-certifies/carte-puce-jclx80jtop20id-java-trusted-open-platform-sur-composant-sle66clx800pe', 'description': 'Le produit évalué est la « carte à puce JCLX80jTOP20ID : Java Trusted Open Platform sur composant SLE66CLX800PE, version IFXv#27_0.1, révision de code v1.4 » développée par Trusted Logic SA. C'est une carte à puce bi-mode (contact/sans contact) comportant une plate-forme d'exécution d'applets Java Card conforme aux spécifications Java Card 2.2.1 et VISA GlobalPlatform 2.1.1 - confi', 'sponsor': 'Trusted Logic SA', 'developer': 'Trusted Logic SA', 'cert_id': 'ANSSI-CC-2008/43', 'level': 'EAL5+', 'enhanced': {'cert_id': 'ANSSI-CC-2008/43', 'certification_date': '2008-12-19', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 2.3', 'developer': 'Trusted Logic SA', 'sponsor': 'Trusted Logic SA', 'evaluation_facility': 'Serma Technologies', 'level': 'EAL5+', 'protection_profile': '', 'mutual_recognition': 'SOG-IS CCRA', 'augmented': 'ALC_DVS.2, AVA_VLA.4', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi-cible_2008-43en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi_2008-43en.pdf'}}
.
- The scheme_data property was set to
-
09.12.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': [], 'next_certificates': []}
.
- The following values were inserted:
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'Carte à puce JCLX80jTOP20ID : Java Trusted Open Platform sur composant SLE66CLX800PE', 'url': 'https://cyber.gouv.fr/produits-certifies/carte-puce-jclx80jtop20id-java-trusted-open-platform-sur-composant-sle66clx800pe', 'description': 'Le produit évalué est la « carte à puce JCLX80jTOP20ID : Java Trusted Open Platform sur composant SLE66CLX800PE, version IFXv#27_0.1, révision de code v1.4 » développée par Trusted Logic SA. C'est une carte à puce bi-mode (contact/sans contact) comportant une plate-forme d'exécution d'applets Java Card conforme aux spécifications Java Card 2.2.1 et VISA GlobalPlatform 2.1.1 - confi', 'sponsor': 'Trusted Logic SA', 'developer': 'Trusted Logic SA', 'cert_id': 'ANSSI-CC-2008/43', 'level': 'EAL5+', 'enhanced': {'cert_id': 'ANSSI-CC-2008/43', 'certification_date': '2008-12-19', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 2.3', 'developer': 'Trusted Logic SA', 'sponsor': 'Trusted Logic SA', 'evaluation_facility': 'Serma Technologies', 'level': 'EAL5+', 'protection_profile': '', 'mutual_recognition': 'SOG-IS CCRA', 'augmented': 'ALC_DVS.2, AVA_VLA.4', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi-cible_2008-43en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi_2008-43en.pdf'}}
.
- The scheme_data property was set to
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '47e0d7056ef248e74fc4a1e9eeb66400624b1f8cc330f74b38a505fc5df6b73b', 'txt_hash': 'd238ae352d20be0e9f6a1640b13ce74c60dc7d6ca6a4b1753c4db6038be78a33'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'b187a8a308a53ce7562618407ca4eec78aaad99988dfc2a7b98f6a2fb913ad0f', 'txt_hash': '063b5b26831a11d2aae3d4ea1db99fe0764facc3cdb6fccc492265a4e2475182'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 188011, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 20, '/CreationDate': "D:20081223095616+01'00'", '/Author': 'nassor', '/Creator': 'PScript5.dll Version 5.2', '/Producer': 'Acrobat Distiller 8.0.0 (Windows)', '/ModDate': "D:20081223095616+01'00'", '/Title': 'Microsoft Word - dcssi-2008_43en.doc', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 1019152, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 122, '/Producer': 'PrimoPDF', '/CreationDate': "D:20081217221029-02'00'", '/ModDate': "D:20081217221029-02'00'", '/Title': 'Microsoft Word - CP-2007-RT-075-1.4 JCLX80jTOP20ID - Security Target Lite.doc', '/Creator': 'PrimoPDF http://www.primopdf.com/', '/Author': 'gimenez', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{'FR': {'match_rules': ['Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developer\\(s\\)(.+)Evaluation facility(.+)Recognition arrangements'], 'cert_id': 'DCSSI-2008/43', 'cert_item': 'JCLX80jTOP20ID smart card: Java Trusted Open Platform on SLE66CLX800PE microcontroller', 'cert_item_version': 'IFXv#27_0.1, software revision v1.4', 'ref_protection_profiles': 'None', 'cc_version': 'Common Criteria version 2.3 compliant with ISO 15408:2005', 'cc_security_level': 'EAL 5 augmented ALC_DVS.2, AVA_VLA.4', 'developer': 'Trusted Logic SA 5, rue du Bailliage 78000 Versailles – France Sponsor Trusted Logic SA 5, rue du Bailliage 78000 Versailles – France', 'cert_lab': 'Serma Technologies 30 avenue Gustave Eiffel, 33608 Pessac, France Phone: +33 (0)5 57 26 08 75, email : [email protected]'}}
. - The report_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-04821': 1, 'BSI-DSZ-CC-0482': 1}, 'FR': {'DCSSI-2008/43': 21}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0002-2001': 1}}, 'cc_security_level': {'EAL': {'EAL 5': 3, 'EAL4': 4, 'EAL7': 1, 'EAL 1': 1, 'EAL 3': 1, 'EAL 7': 1, 'EAL5+': 1, 'EAL 5 augmented': 2}, 'ITSEC': {'ITSEC E6 and': 1}}, 'cc_sar': {'ACM': {'ACM_AUT': 1, 'ACM_CAP': 1, 'ACM_SCP': 1}, 'ADO': {'ADO_DEL': 1, 'ADO_IGS': 1}, 'ADV': {'ADV_FSP': 1, 'ADV_HLD': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_LLD': 1, 'ADV_RCR': 1, 'ADV_SPM': 1}, 'AGD': {'AGD_ADM': 1, 'AGD_USR': 1}, 'ALC': {'ALC_DVS.2': 2, 'ALC_FLR': 2, 'ALC_DVS': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VLA.4': 2, 'AVA_MSU.3': 1, 'AVA_CCA': 1, 'AVA_MSU': 1, 'AVA_SOF': 1, 'AVA_VLA': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Infineon': {'Infineon': 3}}, 'eval_facility': {'Serma': {'Serma Technologies': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {'RSA': {'RSA2048': 1}, 'ECC': {'ECC': {'ECC': 1}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'KA': {'Key Agreement': 1}}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 3}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS 34': 2, 'AIS 31': 1, 'AIS34': 1, 'AIS31': 2}, 'ISO': {'ISO/IEC 15408:2005': 1, 'ISO/IEC 18045:2005': 1}, 'CC': {'CCMB-2005-08-001': 1, 'CCMB-2005-08-002': 1, 'CCMB-2005-08-003': 1, 'CCMB-2005-08-004': 1}}, 'javacard_version': {'JavaCard': {'Java Card 2.2.1': 2}, 'GlobalPlatform': {'GlobalPlatform 2.1.1': 3}}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0002': 1}}, 'cc_security_level': {'EAL': {'EAL5': 2, 'EAL5 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_HLD': 1}, 'ALC': {'ALC_DVS.2': 2}, 'AVA': {'AVA_VLA.4': 2}}, 'cc_sfr': {'FAU': {'FAU_ARP': 3, 'FAU_ARP.1': 1}, 'FCO': {'FCO_NRO': 2, 'FCO_NRO.2': 3}, 'FCS': {'FCS_RND': 6, 'FCS_RND.1': 6, 'FCS_COP': 24, 'FCS_COP.1': 12, 'FCS_CKM': 18, 'FCS_CKM.3': 1, 'FCS_CKM.1': 4, 'FCS_CKM.2': 3, 'FCS_CKM.4': 1, 'FCS_RND.1.1': 1}, 'FDP': {'FDP_ACC': 11, 'FDP_ACC.1': 3, 'FDP_ACF': 10, 'FDP_ACF.1': 20, 'FDP_ACF.1.2': 1, 'FDP_IFC': 10, 'FDP_IFC.2': 4, 'FDP_IFF': 6, 'FDP_IFF.1': 13, 'FDP_IFF.1.5': 1, 'FDP_IFF.1.2': 1, 'FDP_ITC': 6, 'FDP_ITC.1': 3, 'FDP_UIT': 3, 'FDP_UIT.1': 2, 'FDP_ROL': 4, 'FDP_ROL.1': 4, 'FDP_ITC.2': 5, 'FDP_ACC.2': 5, 'FDP_IFC.1': 2, 'FDP_RIP': 16, 'FDP_RIP.1': 8, 'FDP_SDI.2': 2, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_ACF.1.1': 1, 'FDP_ITT': 3, 'FDP_ITT.1': 1, 'FDP_IFF.2': 7}, 'FIA': {'FIA_UID': 6, 'FIA_UID.1': 2, 'FIA_UAU': 4, 'FIA_UAU.1': 2, 'FIA_UAU.4': 1, 'FIA_AFL': 4, 'FIA_AFL.1': 4, 'FIA_ATD': 2, 'FIA_ATD.1': 1, 'FIA_UID.2': 1, 'FIA_USB.1': 2, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1}, 'FMT': {'FMT_MSA': 42, 'FMT_MSA.1': 11, 'FMT_MSA.3': 14, 'FMT_SMF': 10, 'FMT_SMF.1': 5, 'FMT_SMR': 12, 'FMT_SMR.1': 12, 'FMT_MSA.2': 3, 'FMT_MTD': 4, 'FMT_MTD.1': 1, 'FMT_MTD.3': 1}, 'FPR': {'FPR_UNO': 4, 'FPR_UNO.1': 2}, 'FPT': {'FPT_TST.2': 6, 'FPT_TDC': 2, 'FPT_TDC.1': 4, 'FPT_FLS': 12, 'FPT_FLS.1': 5, 'FPT_RCV': 7, 'FPT_RCV.3': 12, 'FPT_SEP': 4, 'FPT_SEP.1': 4, 'FPT_RVM.1': 2, 'FPT_RVM.1.1': 1, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 1, 'FPT_TST.1': 6, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_AMT': 2, 'FPT_AMT.1': 2, 'FPT_RCV.4': 1, 'FPT_TST': 4, 'FPT_PHP': 2, 'FPT_PHP.3': 1, 'FPT_ITT': 2, 'FPT_ITT.1': 1, 'FPT_TST.2.1': 1}, 'FRU': {'FRU_RSA': 4, 'FRU_RSA.1': 2, 'FRU_FLT': 2, 'FRU_FLT.2': 1}, 'FTP': {'FTP_ITC': 2, 'FTP_ITC.1': 3}}, 'cc_claims': {'D': {'D.APP-CODE': 3, 'D.APP-INST': 2, 'D.COMMAND': 2, 'D.ISD-SESSION-KEYS': 2, 'D.JCS_KEYS': 1, 'D.ISD-': 1, 'D.ISD-PERSO': 2, 'D.GP-REGISTRY': 2, 'D.CVM': 2, 'D.APP_C_DATA': 2, 'D.APP_I_DATA': 2, 'D.PIN': 2, 'D.SOFTWARE': 2, 'D.JCS_CODE': 1, 'D.JCS_DATA': 2, 'D.SEC_DATA': 2, 'D.API_DATA': 2, 'D.CRYPTO': 3}, 'O': {'O.REQUEST': 2, 'O.INFO-ORIGIN': 3, 'O.LOAD': 4, 'O.INSTALL': 4, 'O.INFO-INTEGRITY': 4, 'O.INFO-CONFIDENTIALITY': 3, 'O.NO-KEY-REUSE': 2, 'O.DELETION': 2, 'O.LIFE-CYCLE': 3, 'O.IDENTIFICATION': 3, 'O.GLOBAL-CVM': 2, 'O.CVM-BLOCK': 2, 'O.SID': 2, 'O.ERROR-COUNTERS': 2, 'O.RECOVERY': 3, 'O.LOCK': 2, 'O.OPERATE': 2, 'O.RESOURCES': 2, 'O.FIREWALL': 2, 'O.REALLOCATION': 2, 'O.SHRD_VAR_CONFID': 2, 'O.SHRD_VAR_INTEG': 2, 'O.NATIVE': 2, 'O.VERIFICATION': 3, 'O.OS-SUPPORT': 3, 'O.PIN-MNGT': 2, 'O.ALARM': 2, 'O.TRANSACTION': 2, 'O.CIPHER': 2, 'O.KEY-MNGT': 3, 'O.OBJ-DELETION': 2, 'O.PROT-INF-LEAK': 4, 'O.PROT-PHYS-TAMPER': 4, 'O.ABUSE-FUNC': 2, 'O.IC-SUPPORT': 3, 'O.PROT-MALFUNCTION': 3, 'O.PROT-': 1, 'O.RND': 3}, 'T': {'T.INSTALL': 4, 'T.CRYPTO': 4, 'T.CONFID-APPLI-DATA': 3, 'T.CONFID-JCS-DATA': 3, 'T.INTEG-': 1, 'T.INTEG-JCS-DATA': 3, 'T.DELETION': 3, 'T.IMPERSONATE': 2, 'T.INVALID-INPUT': 2, 'T.INVALID-ORDER': 2, 'T.FORCED-RESET': 2, 'T.REPLAY': 2, 'T.BRUTE-FORCE': 2, 'T.LIFE-CYCLE': 3, 'T.CONFID-JCS-CODE': 2, 'T.INTEG-APPLI-CODE': 4, 'T.INTEG-JCS-CODE': 2, 'T.INTEG-APPLI-DATA': 4, 'T.SID': 4, 'T.EXE-CODE': 4, 'T.NATIVE': 2, 'T.RESSOURCES': 2, 'T.OBJ-DELETION': 2, 'T.ABUSE-FUNC': 1, 'T.PHYS-TAMPER': 2, 'T.MALFUNCTION': 2, 'T.INF-LEAK': 2, 'T.RND': 2}, 'A': {'A.CARD-MANAGEMENT': 1, 'A.NATIVE': 3, 'A.VERIFICATION': 2, 'A.APPLET': 2, 'A.MANUFACTURING': 3}, 'R': {'R.JAVA': 1}, 'OE': {'OE.IC': 1, 'OE.SCP': 2, 'OE.RECOVERY': 1, 'OE.SUPPORT': 1, 'OE.CARD-MANAGEMENT': 1, 'OE.MANUFACTURING': 3, 'OE.VERIFICATION': 2, 'OE.NATIVE': 2, 'OE.APPLET': 2, 'OE.SECRETS': 2, 'OE.KEY-LENGTH': 2, 'OE.NO-RMI-APPLETS': 2}, 'OSP': {'OSP': 1, 'OSP.VERIFICATION': 2, 'OSP.FILE-ORIGIN': 2, 'OSP.SECRETS': 3, 'OSP.KEY-LENGTH': 2, 'OSP.NO-RMI-APPLETS': 2, 'OSP.PERSONALIZATION': 2, 'OSP.PROCESS-TOE': 3}}, 'vendor': {}, 'eval_facility': {'Serma': {'SERMA': 1}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 34}, '3DES': {'3DES': 1}}}, 'asymmetric_crypto': {'RSA': {'RSA2048': 1, 'RSA-CRT': 1}, 'ECC': {'ECC': {'ECC': 1}}, 'FF': {'DH': {'Diffie-Hellman': 5}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-224': 1, 'SHA-256': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 14}, 'KA': {'Key Agreement': 2, 'Key agreement': 1}}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RND': 5, 'RNG': 1}}, 'cipher_mode': {'ECB': {'ECB': 3}, 'CBC': {'CBC': 3}, 'CCM': {'CCM': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 1, 'physical probing': 5, 'DPA': 3, 'SPA': 2}, 'FI': {'physical tampering': 3, 'Physical tampering': 1, 'malfunction': 8, 'DFA': 2}, 'other': {'reverse engineering': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 46-3': 6, 'FIPS 46-2': 1, 'FIPS PUB 81': 1, 'FIPS 180-2': 1}, 'PKCS': {'PKCS#1': 2, 'PKCS#3': 1}, 'ISO': {'ISO/IEC 15946-1': 1, 'ISO/IEC 15946-3': 3, 'ISO/IEC 15408:2005': 3}, 'ICAO': {'ICAO': 1}, 'SCP': {'SCP01': 1, 'SCP02': 9}, 'CC': {'CCMB-2005-08-001': 2, 'CCMB-2005-08-002': 2, 'CCMB-2005-08-003': 2, 'CCMB-2005-08-004': 1}}, 'javacard_version': {'JavaCard': {'Java Card 2.2.1': 4}, 'GlobalPlatform': {'GlobalPlatform 2.1.1': 9}}, 'javacard_api_const': {}, 'javacard_packages': {'javacard': {'javacard.security': 2}}, 'certification_process': {}}
. - The report_filename property was set to
dcssi-2008_43en.pdf
. - The st_filename property was set to
dcssi-cible2008_43en.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['SERMA']
. - The cert_id property was set to
ANSSI-CC-2008/43
. - The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 3}]}
.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/dcssi-2008_43en.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/dcssi-cible2008_43en.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
. - The extracted_sars property was set to
None
.
- The new value is
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name JCLX80jTOP20ID smart card: Java Trusted Open Platform on SLE66CLX800PE microcontroller was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "e89d5ad10223e35a",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2008/43",
"cert_lab": [
"SERMA"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL5",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_MSU",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VLA",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2009-07-06",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/dcssi-2008_43-M01en.pdf",
"maintenance_st_link": null,
"maintenance_title": "Maintenance Report DCSSI-2008/43-M01"
}
]
},
"manufacturer": "Trusted Logic",
"manufacturer_web": "https://www.trusted-logic.com/",
"name": "JCLX80jTOP20ID smart card: Java Trusted Open Platform on SLE66CLX800PE microcontroller",
"not_valid_after": "2019-09-01",
"not_valid_before": "2008-12-19",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "dcssi-2008_43en.pdf",
"report_frontpage": {
"FR": {
"cc_security_level": "EAL 5 augmented ALC_DVS.2, AVA_VLA.4",
"cc_version": "Common Criteria version 2.3 compliant with ISO 15408:2005",
"cert_id": "DCSSI-2008/43",
"cert_item": "JCLX80jTOP20ID smart card: Java Trusted Open Platform on SLE66CLX800PE microcontroller",
"cert_item_version": "IFXv#27_0.1, software revision v1.4",
"cert_lab": "Serma Technologies 30 avenue Gustave Eiffel, 33608 Pessac, France Phone: +33 (0)5 57 26 08 75, email : [email protected]",
"developer": "Trusted Logic SA 5, rue du Bailliage 78000 Versailles \u2013 France Sponsor Trusted Logic SA 5, rue du Bailliage 78000 Versailles \u2013 France",
"match_rules": [
"Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developer\\(s\\)(.+)Evaluation facility(.+)Recognition arrangements"
],
"ref_protection_profiles": "None"
}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
}
},
"RSA": {
"RSA2048": 1
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0482": 1,
"BSI-DSZ-CC-04821": 1
},
"FR": {
"DCSSI-2008/43": 21
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0002-2001": 1
}
},
"cc_sar": {
"ACM": {
"ACM_AUT": 1,
"ACM_CAP": 1,
"ACM_SCP": 1
},
"ADO": {
"ADO_DEL": 1,
"ADO_IGS": 1
},
"ADV": {
"ADV_FSP": 1,
"ADV_HLD": 1,
"ADV_IMP": 1,
"ADV_INT": 1,
"ADV_LLD": 1,
"ADV_RCR": 1,
"ADV_SPM": 1
},
"AGD": {
"AGD_ADM": 1,
"AGD_USR": 1
},
"ALC": {
"ALC_DVS": 1,
"ALC_DVS.2": 2,
"ALC_FLR": 2,
"ALC_TAT": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_DPT": 1,
"ATE_FUN": 1,
"ATE_IND": 1
},
"AVA": {
"AVA_CCA": 1,
"AVA_MSU": 1,
"AVA_MSU.3": 1,
"AVA_SOF": 1,
"AVA_VLA": 1,
"AVA_VLA.4": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 3": 1,
"EAL 5": 3,
"EAL 5 augmented": 2,
"EAL 7": 1,
"EAL4": 4,
"EAL5+": 1,
"EAL7": 1
},
"ITSEC": {
"ITSEC E6 and": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"KA": {
"Key Agreement": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Serma": {
"Serma Technologies": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {
"GlobalPlatform": {
"GlobalPlatform 2.1.1": 3
},
"JavaCard": {
"Java Card 2.2.1": 2
}
},
"os_name": {},
"pq_crypto": {},
"randomness": {
"TRNG": {
"TRNG": 3
}
},
"side_channel_analysis": {},
"standard_id": {
"BSI": {
"AIS 31": 1,
"AIS 34": 2,
"AIS31": 2,
"AIS34": 1
},
"CC": {
"CCMB-2005-08-001": 1,
"CCMB-2005-08-002": 1,
"CCMB-2005-08-003": 1,
"CCMB-2005-08-004": 1
},
"ISO": {
"ISO/IEC 15408:2005": 1,
"ISO/IEC 18045:2005": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon": 3
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "nassor",
"/CreationDate": "D:20081223095616+01\u002700\u0027",
"/Creator": "PScript5.dll Version 5.2",
"/ModDate": "D:20081223095616+01\u002700\u0027",
"/Producer": "Acrobat Distiller 8.0.0 (Windows)",
"/Title": "Microsoft Word - dcssi-2008_43en.doc",
"pdf_file_size_bytes": 188011,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 20
},
"st_filename": "dcssi-cible2008_43en.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
}
},
"FF": {
"DH": {
"Diffie-Hellman": 5
}
},
"RSA": {
"RSA-CRT": 1,
"RSA2048": 1
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.APPLET": 2,
"A.CARD-MANAGEMENT": 1,
"A.MANUFACTURING": 3,
"A.NATIVE": 3,
"A.VERIFICATION": 2
},
"D": {
"D.API_DATA": 2,
"D.APP-CODE": 3,
"D.APP-INST": 2,
"D.APP_C_DATA": 2,
"D.APP_I_DATA": 2,
"D.COMMAND": 2,
"D.CRYPTO": 3,
"D.CVM": 2,
"D.GP-REGISTRY": 2,
"D.ISD-": 1,
"D.ISD-PERSO": 2,
"D.ISD-SESSION-KEYS": 2,
"D.JCS_CODE": 1,
"D.JCS_DATA": 2,
"D.JCS_KEYS": 1,
"D.PIN": 2,
"D.SEC_DATA": 2,
"D.SOFTWARE": 2
},
"O": {
"O.ABUSE-FUNC": 2,
"O.ALARM": 2,
"O.CIPHER": 2,
"O.CVM-BLOCK": 2,
"O.DELETION": 2,
"O.ERROR-COUNTERS": 2,
"O.FIREWALL": 2,
"O.GLOBAL-CVM": 2,
"O.IC-SUPPORT": 3,
"O.IDENTIFICATION": 3,
"O.INFO-CONFIDENTIALITY": 3,
"O.INFO-INTEGRITY": 4,
"O.INFO-ORIGIN": 3,
"O.INSTALL": 4,
"O.KEY-MNGT": 3,
"O.LIFE-CYCLE": 3,
"O.LOAD": 4,
"O.LOCK": 2,
"O.NATIVE": 2,
"O.NO-KEY-REUSE": 2,
"O.OBJ-DELETION": 2,
"O.OPERATE": 2,
"O.OS-SUPPORT": 3,
"O.PIN-MNGT": 2,
"O.PROT-": 1,
"O.PROT-INF-LEAK": 4,
"O.PROT-MALFUNCTION": 3,
"O.PROT-PHYS-TAMPER": 4,
"O.REALLOCATION": 2,
"O.RECOVERY": 3,
"O.REQUEST": 2,
"O.RESOURCES": 2,
"O.RND": 3,
"O.SHRD_VAR_CONFID": 2,
"O.SHRD_VAR_INTEG": 2,
"O.SID": 2,
"O.TRANSACTION": 2,
"O.VERIFICATION": 3
},
"OE": {
"OE.APPLET": 2,
"OE.CARD-MANAGEMENT": 1,
"OE.IC": 1,
"OE.KEY-LENGTH": 2,
"OE.MANUFACTURING": 3,
"OE.NATIVE": 2,
"OE.NO-RMI-APPLETS": 2,
"OE.RECOVERY": 1,
"OE.SCP": 2,
"OE.SECRETS": 2,
"OE.SUPPORT": 1,
"OE.VERIFICATION": 2
},
"OSP": {
"OSP": 1,
"OSP.FILE-ORIGIN": 2,
"OSP.KEY-LENGTH": 2,
"OSP.NO-RMI-APPLETS": 2,
"OSP.PERSONALIZATION": 2,
"OSP.PROCESS-TOE": 3,
"OSP.SECRETS": 3,
"OSP.VERIFICATION": 2
},
"R": {
"R.JAVA": 1
},
"T": {
"T.ABUSE-FUNC": 1,
"T.BRUTE-FORCE": 2,
"T.CONFID-APPLI-DATA": 3,
"T.CONFID-JCS-CODE": 2,
"T.CONFID-JCS-DATA": 3,
"T.CRYPTO": 4,
"T.DELETION": 3,
"T.EXE-CODE": 4,
"T.FORCED-RESET": 2,
"T.IMPERSONATE": 2,
"T.INF-LEAK": 2,
"T.INSTALL": 4,
"T.INTEG-": 1,
"T.INTEG-APPLI-CODE": 4,
"T.INTEG-APPLI-DATA": 4,
"T.INTEG-JCS-CODE": 2,
"T.INTEG-JCS-DATA": 3,
"T.INVALID-INPUT": 2,
"T.INVALID-ORDER": 2,
"T.LIFE-CYCLE": 3,
"T.MALFUNCTION": 2,
"T.NATIVE": 2,
"T.OBJ-DELETION": 2,
"T.PHYS-TAMPER": 2,
"T.REPLAY": 2,
"T.RESSOURCES": 2,
"T.RND": 2,
"T.SID": 4
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0002": 1
}
},
"cc_sar": {
"ADV": {
"ADV_HLD": 1
},
"ALC": {
"ALC_DVS.2": 2
},
"AVA": {
"AVA_VLA.4": 2
}
},
"cc_security_level": {
"EAL": {
"EAL5": 2,
"EAL5 augmented": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP": 3,
"FAU_ARP.1": 1
},
"FCO": {
"FCO_NRO": 2,
"FCO_NRO.2": 3
},
"FCS": {
"FCS_CKM": 18,
"FCS_CKM.1": 4,
"FCS_CKM.2": 3,
"FCS_CKM.3": 1,
"FCS_CKM.4": 1,
"FCS_COP": 24,
"FCS_COP.1": 12,
"FCS_RND": 6,
"FCS_RND.1": 6,
"FCS_RND.1.1": 1
},
"FDP": {
"FDP_ACC": 11,
"FDP_ACC.1": 3,
"FDP_ACC.2": 5,
"FDP_ACF": 10,
"FDP_ACF.1": 20,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_IFC": 10,
"FDP_IFC.1": 2,
"FDP_IFC.2": 4,
"FDP_IFF": 6,
"FDP_IFF.1": 13,
"FDP_IFF.1.2": 1,
"FDP_IFF.1.5": 1,
"FDP_IFF.2": 7,
"FDP_ITC": 6,
"FDP_ITC.1": 3,
"FDP_ITC.2": 5,
"FDP_ITT": 3,
"FDP_ITT.1": 1,
"FDP_RIP": 16,
"FDP_RIP.1": 8,
"FDP_ROL": 4,
"FDP_ROL.1": 4,
"FDP_SDI.2": 2,
"FDP_SDI.2.1": 1,
"FDP_SDI.2.2": 1,
"FDP_UIT": 3,
"FDP_UIT.1": 2
},
"FIA": {
"FIA_AFL": 4,
"FIA_AFL.1": 4,
"FIA_ATD": 2,
"FIA_ATD.1": 1,
"FIA_UAU": 4,
"FIA_UAU.1": 2,
"FIA_UAU.4": 1,
"FIA_UID": 6,
"FIA_UID.1": 2,
"FIA_UID.2": 1,
"FIA_USB.1": 2,
"FIA_USB.1.1": 1,
"FIA_USB.1.2": 1,
"FIA_USB.1.3": 1
},
"FMT": {
"FMT_MSA": 42,
"FMT_MSA.1": 11,
"FMT_MSA.2": 3,
"FMT_MSA.3": 14,
"FMT_MTD": 4,
"FMT_MTD.1": 1,
"FMT_MTD.3": 1,
"FMT_SMF": 10,
"FMT_SMF.1": 5,
"FMT_SMR": 12,
"FMT_SMR.1": 12
},
"FPR": {
"FPR_UNO": 4,
"FPR_UNO.1": 2
},
"FPT": {
"FPT_AMT": 2,
"FPT_AMT.1": 2,
"FPT_FLS": 12,
"FPT_FLS.1": 5,
"FPT_ITT": 2,
"FPT_ITT.1": 1,
"FPT_PHP": 2,
"FPT_PHP.3": 1,
"FPT_RCV": 7,
"FPT_RCV.3": 12,
"FPT_RCV.4": 1,
"FPT_RVM.1": 2,
"FPT_RVM.1.1": 1,
"FPT_SEP": 4,
"FPT_SEP.1": 4,
"FPT_TDC": 2,
"FPT_TDC.1": 4,
"FPT_TDC.1.1": 1,
"FPT_TDC.1.2": 1,
"FPT_TST": 4,
"FPT_TST.1": 6,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1,
"FPT_TST.2": 6,
"FPT_TST.2.1": 1
},
"FRU": {
"FRU_FLT": 2,
"FRU_FLT.2": 1,
"FRU_RSA": 4,
"FRU_RSA.1": 2
},
"FTP": {
"FTP_ITC": 2,
"FTP_ITC.1": 3
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 3
},
"CCM": {
"CCM": 1
},
"ECB": {
"ECB": 3
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"KA": {
"Key Agreement": 2,
"Key agreement": 1
},
"MAC": {
"MAC": 14
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Serma": {
"SERMA": 1
}
},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-224": 1,
"SHA-256": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {
"javacard": {
"javacard.security": 2
}
},
"javacard_version": {
"GlobalPlatform": {
"GlobalPlatform 2.1.1": 9
},
"JavaCard": {
"Java Card 2.2.1": 4
}
},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 5,
"RNG": 1
}
},
"side_channel_analysis": {
"FI": {
"DFA": 2,
"Physical tampering": 1,
"malfunction": 8,
"physical tampering": 3
},
"SCA": {
"DPA": 3,
"Leak-Inherent": 1,
"SPA": 2,
"physical probing": 5
},
"other": {
"reverse engineering": 2
}
},
"standard_id": {
"CC": {
"CCMB-2005-08-001": 2,
"CCMB-2005-08-002": 2,
"CCMB-2005-08-003": 2,
"CCMB-2005-08-004": 1
},
"FIPS": {
"FIPS 180-2": 1,
"FIPS 46-2": 1,
"FIPS PUB 46-3": 6,
"FIPS PUB 81": 1
},
"ICAO": {
"ICAO": 1
},
"ISO": {
"ISO/IEC 15408:2005": 3,
"ISO/IEC 15946-1": 1,
"ISO/IEC 15946-3": 3
},
"PKCS": {
"PKCS#1": 2,
"PKCS#3": 1
},
"SCP": {
"SCP01": 1,
"SCP02": 9
}
},
"symmetric_crypto": {
"DES": {
"3DES": {
"3DES": 1
},
"DES": {
"DES": 34
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "gimenez",
"/CreationDate": "D:20081217221029-02\u002700\u0027",
"/Creator": "PrimoPDF http://www.primopdf.com/",
"/ModDate": "D:20081217221029-02\u002700\u0027",
"/Producer": "PrimoPDF",
"/Title": "Microsoft Word - CP-2007-RT-075-1.4 JCLX80jTOP20ID - Security Target Lite.doc",
"pdf_file_size_bytes": 1019152,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 122
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/dcssi-2008_43en.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"EAL5"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/dcssi-cible2008_43en.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "47e0d7056ef248e74fc4a1e9eeb66400624b1f8cc330f74b38a505fc5df6b73b",
"txt_hash": "d238ae352d20be0e9f6a1640b13ce74c60dc7d6ca6a4b1753c4db6038be78a33"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "b187a8a308a53ce7562618407ca4eec78aaad99988dfc2a7b98f6a2fb913ad0f",
"txt_hash": "063b5b26831a11d2aae3d4ea1db99fe0764facc3cdb6fccc492265a4e2475182"
}
},
"status": "archived"
}