Sm@rtCafé® Expert 7.0 EAL 6+ C1
CSV information ?
Status | active |
---|---|
Valid from | 29.05.2020 |
Valid until | 29.05.2025 |
Scheme | 🇩🇪 DE |
Manufacturer | Veridos GmbH - Identity Solutions by Giesecke & Devrient and Bundesdruckerei |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | EAL6+, ALC_FLR.1 |
Heuristics summary ?
Certificate ?
Extracted keywords
Vendor
Giesecke+DevrientSecurity level
EAL 6+, EAL 6, EAL 5, EAL 2, EAL 6 augmentedSecurity Assurance Requirements (SAR)
ALC_FLR.1, ALC_FLRProtection profiles
BSI-CC-PP-0099-Certificates
BSI-DSZ-CC-1092-2020Standards
ISO/IEC 15408, ISO/IEC 18045File metadata
Title | Certificate BSI-DSZ-CC-1092-2020 |
---|---|
Subject | Sm@rtCafé® Expert 7.0 EAL 6+C1 |
Keywords | Common Criteria, Certification, Zertifizierung, Smart Card, Java Card |
Author | Bundesamt für Sicherheit in der Informationstechnik |
Creation date | D:20200608084917+02'00' |
Modification date | D:20200608085041+02'00' |
Pages | 1 |
Creator | Writer |
Producer | LibreOffice 6.2 |
Certification report ?
Extracted keywords
Symmetric Algorithms
AES, DES, 3-DES, 3DES, TDEA, CBC-MAC, CMACAsymmetric Algorithms
RSA 2048, RSA-CRT, ECDH, ECDSA, ECCHash functions
SHA-1, SHA-2Schemes
MAC, Key AgreementProtocols
PGPRandomness
RNGBlock cipher modes
ECB, CBCVendor
Infineon, Infineon Technologies AG, Giesecke+Devrient, G+D, G&D, Giesecke & DevrientSecurity level
EAL 6+, EAL 6, EAL 5, EAL 2, EAL 1, EAL 4, EAL 2+, EAL6, EAL 5+, EAL 6 augmented, EAL6 augmentedSecurity Assurance Requirements (SAR)
ADV_SPM.1, ADV_ARC, ALC_FLR.1, ALC_FLR, ALC_CMC.5, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.3, ATE_FUN, ATE_COV, ATE_DPT, ATE_IND, AVA_VANSecurity Functional Requirements (SFR)
FCO_NRO.2, FCS_COP.1, FCS_RNG.1, FCS_CKM.1, FCS_COP.1.1, FIA_UID, FPT_TDC.1, FTP_ITCProtection profiles
BSI-CC-PP-0099-, BSI-CC-PP-0099-2017Certificates
BSI-DSZ-CC-1092-2020, BSI-DSZ-CC-1028-2017, BSI-DSZ-CC-1092-, BSI-DSZ-CC-0951-V4-2019, BSI-DSZ-CC-S-0127-2019, BSI-DSZ-CC-S-0127-Evaluation facilities
TÜV Informationstechnik, TÜViTSide-channel analysis
malfunction, JILCertification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, 04.2020, Security Target Sm@rtCafé® Expert 7.0 EAL 6+ C1, Giesecke+Devrient Mobile Security GmbH (confidential document) 7 specifically • AIS 1, Version 13, Durchführung der Ortsbesichtigung in der Entwicklungsumgebung, Sm@rtCafé® Expert 7.0 EAL 6+ C1, Version 6, 25.05.2020, TÜV Informationstechnik GmbH (confidential document) [8] Java Card Protection Profile - Open Configuration, December 2017, Version 3.0.5, 36 for Sm@rtCafé® Expert 7.0 EAL 6+ C1, Version 6, 25.05.2020, BSI-DSZ-CC-1092- 2020, TÜViT GmbH (confidential document) [11] Configuration list for the TOE, Version 1.5, 18.05.2020, Giesecke+Devrient Mobile Security, confidential document) [12] Preparative Procedures Sm@rtCafé® Expert Expert 7.0 EAL 6+ C1 Version 2.1 , 15.04.2020, “Evaluation Technical Report for Composite Evaluation (ETR Comp)”, TÜV Informationstechnik GmbH (confidential document) [16] GlobalPlatform Card Specification Version 2.2.1, January 2011 [17] GlobalPlatform Card CommonStandards
FIPS180-4, FIPS 197, FIPS186-4, FIPS46-3, FIPS PUB 180-4, FIPS PUB 186-4, FIPS197, SP 800-108, PKCS5, PKCS #1, AIS 34, AIS 25, AIS 26, AIS 36, AIS 46, AIS 37, AIS 20, AIS 31, AIS 35, AIS 1, AIS 32, AIS 47, AIS20, AIS31, RFC 5639, RFC5639, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065, ISO/IEC9796-2, ISO/IEC 11770-3, ISO/IEC 18031:2011, SCP03, SCP02Technical reports
BSI TR-02102, BSI 7148, BSI 24File metadata
Title | Certification Report BSI-DSZ-CC-1092-2020 |
---|---|
Subject | Sm@rtCafé® Expert 7.0 EAL 6+C1 |
Keywords | "Common Criteria, Certification, Zertifizierung, Smart Card, Java Card" |
Author | Bundesamt für Sicherheit in der Informationstechnik |
Creation date | D:20200608083506+02'00' |
Modification date | D:20200608084737+02'00' |
Pages | 37 |
Creator | Writer |
Producer | LibreOffice 6.2 |
Frontpage
Certificate ID | BSI-DSZ-CC-1092-2020 |
---|---|
Certified item | Sm@rtCafé® Expert 7.0 EAL 6+ C1 |
Certification lab | BSI |
Developer | Veridos GmbH - Identity Solutions by Giesecke+Devrient and Bundesdruckerei |
References
Outgoing- BSI-DSZ-CC-1028-2017 - archived - Sm@rtCafé® Expert 7.0 C3
- BSI-DSZ-CC-0951-V4-2019 - archived - Infineon Security Controller M5073 G11 with optional RSA2048/4096 v2.03.008 or v2.07.003, EC v2.03.008 or v2.07.003, SHA-2 v1.01 and Toolbox v2.03.008 or v2.07.003 libraries, symmetric crypto library v2.02.010, as well as with specific IC dedicated firmware, including the Flash Loader enhanced by the Mutual Authentication Extension (MAE)
Security target ?
Extracted keywords
Symmetric Algorithms
AES, DES, 3DES, 3-DES, Triple-DES, TDES, TDEA, CBC-MAC, CMACAsymmetric Algorithms
RSA-CRT, ECDH, ECDSA, ECC, Diffie-HellmanHash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-2Schemes
MAC, Key AgreementRandomness
TRNG, RNG, RNDBlock cipher modes
ECB, CBCJavaCard versions
Java Card 2.2.2JavaCard API constants
TYPE_ACCESSVendor
Infineon, Infineon Technologies AG, Giesecke+Devrient, G+D, G&D, Giesecke & DevrientSecurity level
EAL 6+, EAL6+, EAL6, EAL 4+, EAL 6, EAL6 augmented, EAL 6 augmentedClaims
D.APP_I_DATA, D.SEC_DATA, D.PIN, D.CRYPTO, O.CARD-, O.SCP, O.SID, O.FIREWALL, O.GLOBAL_ARRAYS_CONFID, O.GLOBAL_ARRAYS_INTEG, O.NATIVE, O.OPERATE, O.REALLOCATION, O.RESOURCES, O.ALARM, O.CIPHER, O.RNG, O.KEY-MNGT, O.PIN-MNGT, O.TRANSACTION, O.OBJ-DELETION, O.DELETION, O.LOAD, O.INSTALL, O.CARD-MANAGEMENT, O.PIN-, O.APPLET, O.CODE_PKG, O.JAVAOBJECT, O.GLOBAL_ARRAYS, O.KEY-, O.PINMNGT, O.RND, O.TDES, O.AES, T.SECURE_DELETION, T.CONFID-APPLI-DATA, T.CONFID-JCS-CODE, T.CONFID-JCS-DATA, T.INTEG-APPLI-CODE, T.INTEG-APPLI-DATA, T.INTEG-JCS-CODE, T.INTEG-JCS-DATA, T.SID, T.EXE-CODE, T.NATIVE, T.RESOURCES, T.DELETION, T.INSTALL, T.OBJ-DELETION, T.PHYSICAL, T.CONFID-APPLI-, T.CONFID-, T.INTEG-APPLI-, T.OBJDELETION, T.INTEGJCS-DATA, T.EXECODE, T.INTEG-, T.INTEGAPPLI-DATA, T.INTEGAPPLI-CODE, T.INTEG-JCS-, T.INTEG-JCSCODE, A.DELETION, A.APPLET, A.VERIFICATION, R.JAVA, OP.ARRAY_ACCESS, OP.ARRAY_LENGTH, OP.ARRAY_AASTORE, OP.CREATE, OP.DELETE_APPLET, OP.DELETE_PCKG, OP.DELETE_PCKG_APPLET, OP.INSTANCE_FIELD, OP.INVK_VIRTUAL, OP.INVK_INTERFACE, OP.JAVA, OP.THROW, OP.TYPE_ACCESS, OP.PUTFIELD, OP.PUTSTATIC, OP.PUT, OE.CARD-MANAGEMENT, OE.SCP, OE.APPLET, OE.VERIFICATION, OE.CODE-EVIDENCE, OE.CODE-, OSP.VERIFICATIONSecurity Assurance Requirements (SAR)
ADV_SPM.1, ADV_FSP.4, ADV_ARC, ADV_ARC.1, ADV_FSP.1, ADV_TDS.1, ADV_FSP.5, ADV_TDS.4, ADV_TDS.3, ADV_TDS.5, ADV_INT.3, ADV_IMP.1, ADV_IMP.2, ADV_FSP.2, AGD_OPE.1, AGD_PRE.1, ALC_FLR.1, ALC_DVS.2, ALC_CMC.5, ALC_TAT.1, ALC_TAT, ALC_TAT.3, ALC_CMS.1, ALC_LCD.1, ALC_CMS.5, ALC_DEL.1, ATE_COV.3, ATE_FUN.1, ATE_FUN.2, ATE_COV.1, ATE_COV.2, ATE_DPT.1, ATE_DPT.3, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1, ASE_INT.2, ASE_REQ.2, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_ARP.1, FAU_ARP.1.1, FAU_SAA.1, FAU_SAS.1, FCO_NRO, FCO_NRO.2, FCS_RNG, FCS_RNG.1.1, FCS_RNG.1, FCS_RNG.1.2, FCS_CKM.1, FCS_CKM.4, FCS_CKM.4.1, FCS_COP.1, FCS_CKM.2, FCS_CKM, FCS_COP, FDP_ACC, FDP_ACC.2, FDP_ACF, FDP_ACF.1, FDP_IFC, FDP_IFC.1, FDP_IFF, FDP_IFF.1, FDP_RIP, FDP_RIP.1, FDP_ROL.1, FDP_ROL, FDP_SDI, FDP_SDI.2, FDP_ITC, FDP_ITC.2, FDP_IFC.2, FDP_UIT, FDP_UIT.1, FDP_ACC.1, FDP_ITC.1, FDP_SDI.1, FDP_ITT.1, FDP_SDC.1, FIA_ATD, FIA_ATD.1, FIA_UID, FIA_UID.2, FIA_USB, FIA_USB.1, FIA_UID.1, FIA_API.1, FMT_MSA, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD, FMT_MTD.1, FMT_MTD.3, FMT_SMR, FMT_SMF, FMT_LIM.1, FMT_LIM.2, FMT_LIM, FPR_UNO.1, FPR_UNO.1.1, FPT_PHP.3, FPT_TST.1, FPT_FLS.1, FPT_FLS.1.1, FPT_TDC.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_FLS, FPT_RCV, FPT_RCV.3, FPT_PHP.3.1, FPT_ITT.1, FPT_TST.2, FRU_FLT.2, FTP_ITC, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.3, FTP_TRP.1Protection profiles
BSI-CC-PP-0084-2014Certificates
BSI-DSZ-CC-0951-V4-2019, BSI-DSZ-CC-0951-V4-Side-channel analysis
Leak-Inherent, physical probing, physical tampering, Malfunction, JILCertification process
out of scope, a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are, with ECDH is part of this SFR. 6 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 8 Security Functional Requirements Security Target Lite Sm@rtCafé® Expert 7.0 EAL 6+, Dependencies: No dependencies. 7 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 8 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 9, shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 10 The implemented ECDH key agreement is reduced to scalar multiplication, checking forStandards
FIPS 186-4, FIPS 197, FIPS180-4, FIPS 140-2, PKCS1, PKCS5, PKCS3, AIS20, AIS 31, AIS31, AIS 20, RFC5639, RFC 5639, ISO/IEC 7816, ISO/IEC 14443, ISO/IEC 9796-2, SCP02, SCP03, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-001File metadata
Title | Security Target Lite Sm@rtCafé® Expert 7.0 EAL 6+ C1 |
---|---|
Subject | Common Criteria Security Target Lite in version 4.7 from 18.05.2020 |
Keywords | dual-interface, contact based or pure contactless smart card, Javacard operating system (OS), multi-purpose Java card, post-issuance installation of applets, open configuration, Java Card System Protection Profile (Open Configuration), government card, ID card, passport, payment card, signature card |
Author | Dr. Ulrich Stutenbäumer (Giesecke+Devrient Mobile Security GmbH) |
Creation date | D:20200518130755+02'00' |
Modification date | D:20200518132406+02'00' |
Pages | 130 |
Creator | Acrobat PDFMaker 19 für Word |
Producer | Adobe PDF Library 19.21.90 |
References
Outgoing- BSI-DSZ-CC-0951-V4-2019 - archived - Infineon Security Controller M5073 G11 with optional RSA2048/4096 v2.03.008 or v2.07.003, EC v2.03.008 or v2.07.003, SHA-2 v1.01 and Toolbox v2.03.008 or v2.07.003 libraries, symmetric crypto library v2.02.010, as well as with specific IC dedicated firmware, including the Flash Loader enhanced by the Mutual Authentication Extension (MAE)
Heuristics ?
Extracted SARs
ADV_ARC.1, ADV_FSP.5, ADV_IMP.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.5, AGD_OPE.1, AGD_PRE.1, ALC_CMC.5, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_FLR.1, ALC_LCD.1, ALC_TAT.3, ASE_CCL.1, ASE_ECD.1, ASE_INT.2, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.3, ATE_DPT.3, ATE_FUN.2, AVA_VAN.5Scheme data ?
Cert Id | BSI-DSZ-CC-1092-2020 | |
---|---|---|
Product | Sm@rtCafé® Expert 7.0 EAL 6+ C1 | |
Vendor | Veridos GmbH - Identity Solutions by Giesecke & Devrient and Bundesdruckerei | |
Certification Date | 29.05.2020 | |
Category | Smart Cards and similar devices | |
Url | https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/SmartCards_Betriebssysteme_Anwendungen/1092.html | |
Enhanced | ||
Product | Sm@rtCafé® Expert 7.0 EAL 6+ C1 | |
Applicant | Veridos GmbH - Identity Solutions by Giesecke & Devrient and Bundesdruckerei Oranienstraße 91 10969 Berlin | |
Evaluation Facility | TÜV Informationstechnik GmbH | |
Assurance Level | EAL6+,ALC_FLR.1 | |
Protection Profile | Java Card Protection Profile - Open Configuration, December 2017, Version 3.0.5, BSI-CC-PP-0099-2017 | |
Certification Date | 29.05.2020 | |
Expiration Date | 28.05.2025 | |
Report Link | https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1092a_pdf.pdf?__blob=publicationFile&v=1 | |
Target Link | https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1092b_pdf.pdf?__blob=publicationFile&v=1 | |
Cert Link | https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1092c_pdf.pdf?__blob=publicationFile&v=1 | |
Description | The Target of Evaluation (TOE), the Sm@rtCafé® Expert 7.0 EAL 6+ C1 is a dual-interface, contact based or a pure contactless smart card with a Java Card operating system (OS). The composite TOE is a multi-purpose Java Card platform where applets of different kind can be installed. Since a post-issuance installation of applets is possible, the TOE corresponds to an open configuration, as defined in the PP. Depending on the installed applets, the entire product (consisting of the TOE plus applets) can be used as a government card (like an ID card or a passport), a payment card, a signature card and for other purposes. The composite TOE is based on the certified Integrated Circuit (IC) M5073 G11 (Certification ID BSI-DSZ-CC-0951-V4-2019). The composite TOE comprises the underlying hardware IC, the operating system including the G+D crypto library and according TOE guidance documents. The Biometric API is not part of the TOE and can be part of the product or not. | |
Subcategory | Operating systems and applications |
References ?
Updates ?
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': [], 'next_certificates': []}
.
- The following values were inserted:
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'certification_date': '2020-05-29', 'enhanced': {'__update__': {'applicant': 'Veridos GmbH - Identity Solutions by Giesecke & Devrient and Bundesdruckerei Oranienstraße 91 10969 Berlin', 'certification_date': '2020-05-29', 'expiration_date': '2025-05-28', 'description': 'The Target of Evaluation (TOE), the Sm@rtCafé® Expert 7.0 EAL 6+ C1 is a dual-interface, contact based or a pure contactless smart card with a Java Card operating system (OS). The composite TOE is a multi-purpose Java Card platform where applets of different kind can be installed. Since a post-issuance installation of applets is possible, the TOE corresponds to an open configuration, as defined in the PP. Depending on the installed applets, the entire product (consisting of the TOE plus applets) can be used as a government card (like an ID card or a passport), a payment card, a signature card and for other purposes. The composite TOE is based on the certified Integrated Circuit (IC) M5073 G11 (Certification ID BSI-DSZ-CC-0951-V4-2019). The composite TOE comprises the underlying hardware IC, the operating system including the G+D crypto library and according TOE guidance documents. The Biometric API is not part of the TOE and can be part of the product or not.'}}}
data.
- The scheme_data property was updated, with the
-
17.10.2024 The certificate data changed.
Certificate changed
The Protection Profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Java Card Protection Profile - Open Configuration', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0099b_pdf.pdf', 'pp_ids': None}]}
.
- The new value is
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '753b0b266ff06be0af75a92593b2d04c56ce629c5be17dcb3e442ab3ce2d1124', 'txt_hash': 'ece1b80fb4b1a40a26bee2cac92bc794144df8a4d369d04a126bbc734f3c7081'}
data. - The cert property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'ea45147852194f9922c832dda9b6f2327b55e9c762b65f65727324ca9ab84af4', 'txt_hash': 'd8035d205e2c1d6ad3e63cc743c77f0c2fb277114148131c63781c00892eb353'}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 1543454, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 130, '/Author': 'Dr. Ulrich Stutenbäumer (Giesecke+Devrient Mobile Security GmbH)', '/Category': 'Public', '/Chip': 'M5073 G11', '/Comments': 'Final', '/Company': 'GuD', '/CreationDate': "D:20200518130755+02'00'", '/Creator': 'Acrobat PDFMaker 19 für Word', '/HWManufacturer': 'Infineon', '/Keywords': 'dual-interface, contact based or pure contactless smart card, Javacard operating system (OS), multi-purpose Java card, post-issuance installation of applets, open configuration, Java Card System Protection Profile (Open Configuration), government card, ID card, passport, payment card, signature card', '/ModDate': "D:20200518132406+02'00'", '/Producer': 'Adobe PDF Library 19.21.90', '/ProductName': 'Sm@rtCafé® Expert 7.0 EAL 6+ C1', '/SourceModified': 'D:20200518110720', '/Subject': 'Common Criteria Security Target Lite in version 4.7 from 18.05.2020', '/TOE': 'Sm@rtCafé® Expert 7.0 EAL 6+ C1', '/Title': 'Security Target Lite Sm@rtCafé® Expert 7.0 EAL 6+ C1', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The cert_metadata property was set to
{'pdf_file_size_bytes': 296860, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/CreationDate': "D:20200608084917+02'00'", '/Creator': 'Writer', '/Keywords': 'Common Criteria, Certification, Zertifizierung, Smart Card, Java Card', '/ModDate': "D:20200608085041+02'00'", '/Producer': 'LibreOffice 6.2', '/Subject': 'Sm@rtCafé® Expert 7.0 EAL 6+C1 ', '/Title': 'Certificate BSI-DSZ-CC-1092-2020', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0951-V4-2019': 2, 'BSI-DSZ-CC-0951-V4-': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 1}}, 'cc_security_level': {'EAL': {'EAL 6+': 147, 'EAL6+': 1, 'EAL6': 4, 'EAL 4+': 1, 'EAL 6': 3, 'EAL6 augmented': 2, 'EAL 6 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_SPM.1': 3, 'ADV_FSP.4': 3, 'ADV_ARC': 6, 'ADV_ARC.1': 5, 'ADV_FSP.1': 3, 'ADV_TDS.1': 2, 'ADV_FSP.5': 9, 'ADV_TDS.4': 5, 'ADV_TDS.3': 3, 'ADV_TDS.5': 2, 'ADV_INT.3': 1, 'ADV_IMP.1': 5, 'ADV_IMP.2': 1, 'ADV_FSP.2': 2}, 'AGD': {'AGD_OPE.1': 7, 'AGD_PRE.1': 5}, 'ALC': {'ALC_FLR.1': 7, 'ALC_DVS.2': 4, 'ALC_CMC.5': 3, 'ALC_TAT.1': 2, 'ALC_TAT': 1, 'ALC_TAT.3': 2, 'ALC_CMS.1': 1, 'ALC_LCD.1': 3, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.3': 1, 'ATE_FUN.1': 5, 'ATE_FUN.2': 1, 'ATE_COV.1': 2, 'ATE_COV.2': 2, 'ATE_DPT.1': 1, 'ATE_DPT.3': 1}, 'AVA': {'AVA_VAN.5': 2}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 4, 'ASE_INT.1': 3, 'ASE_REQ.1': 2, 'ASE_INT.2': 2, 'ASE_REQ.2': 2, 'ASE_OBJ.2': 3, 'ASE_SPD.1': 3, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 21, 'FAU_ARP.1.1': 1, 'FAU_SAA.1': 3, 'FAU_SAS.1': 1}, 'FCO': {'FCO_NRO': 6, 'FCO_NRO.2': 3}, 'FCS': {'FCS_RNG': 5, 'FCS_RNG.1.1': 5, 'FCS_RNG.1': 13, 'FCS_RNG.1.2': 2, 'FCS_CKM.1': 35, 'FCS_CKM.4': 30, 'FCS_CKM.4.1': 1, 'FCS_COP.1': 117, 'FCS_CKM.2': 4, 'FCS_CKM': 10, 'FCS_COP': 12}, 'FDP': {'FDP_ACC': 28, 'FDP_ACC.2': 5, 'FDP_ACF': 27, 'FDP_ACF.1': 14, 'FDP_IFC': 27, 'FDP_IFC.1': 13, 'FDP_IFF': 19, 'FDP_IFF.1': 17, 'FDP_RIP': 138, 'FDP_RIP.1': 11, 'FDP_ROL.1': 5, 'FDP_ROL': 16, 'FDP_SDI': 16, 'FDP_SDI.2': 3, 'FDP_ITC': 12, 'FDP_ITC.2': 19, 'FDP_IFC.2': 2, 'FDP_UIT': 9, 'FDP_UIT.1': 2, 'FDP_ACC.1': 11, 'FDP_ITC.1': 7, 'FDP_SDI.1': 2, 'FDP_ITT.1': 1, 'FDP_SDC.1': 2}, 'FIA': {'FIA_ATD': 10, 'FIA_ATD.1': 2, 'FIA_UID': 16, 'FIA_UID.2': 1, 'FIA_USB': 9, 'FIA_USB.1': 3, 'FIA_UID.1': 9, 'FIA_API.1': 1}, 'FMT': {'FMT_MSA': 101, 'FMT_MSA.1': 10, 'FMT_MSA.2': 2, 'FMT_MSA.3': 17, 'FMT_SMF.1': 20, 'FMT_SMF.1.1': 1, 'FMT_SMR.1': 32, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MTD': 22, 'FMT_MTD.1': 2, 'FMT_MTD.3': 1, 'FMT_SMR': 35, 'FMT_SMF': 22, 'FMT_LIM.1': 1, 'FMT_LIM.2': 1, 'FMT_LIM': 4}, 'FPR': {'FPR_UNO.1': 10, 'FPR_UNO.1.1': 1}, 'FPT': {'FPT_PHP.3': 9, 'FPT_TST.1': 9, 'FPT_FLS.1': 21, 'FPT_FLS.1.1': 2, 'FPT_TDC.1': 8, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 2, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_FLS': 39, 'FPT_RCV': 13, 'FPT_RCV.3': 10, 'FPT_PHP.3.1': 3, 'FPT_ITT.1': 2, 'FPT_TST.2': 1}, 'FRU': {'FRU_FLT.2': 1}, 'FTP': {'FTP_ITC': 14, 'FTP_ITC.1': 8, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP.1': 2}}, 'cc_claims': {'D': {'D.APP_I_DATA': 2, 'D.SEC_DATA': 1, 'D.PIN': 1, 'D.CRYPTO': 2}, 'O': {'O.CARD-': 7, 'O.SCP': 64, 'O.SID': 33, 'O.FIREWALL': 43, 'O.GLOBAL_ARRAYS_CONFID': 19, 'O.GLOBAL_ARRAYS_INTEG': 9, 'O.NATIVE': 14, 'O.OPERATE': 36, 'O.REALLOCATION': 18, 'O.RESOURCES': 23, 'O.ALARM': 22, 'O.CIPHER': 15, 'O.RNG': 11, 'O.KEY-MNGT': 15, 'O.PIN-MNGT': 18, 'O.TRANSACTION': 19, 'O.OBJ-DELETION': 9, 'O.DELETION': 17, 'O.LOAD': 18, 'O.INSTALL': 16, 'O.CARD-MANAGEMENT': 26, 'O.PIN-': 5, 'O.APPLET': 15, 'O.CODE_PKG': 13, 'O.JAVAOBJECT': 44, 'O.GLOBAL_ARRAYS': 1, 'O.KEY-': 8, 'O.PINMNGT': 1, 'O.RND': 4, 'O.TDES': 2, 'O.AES': 1}, 'T': {'T.SECURE_DELETION': 8, 'T.CONFID-APPLI-DATA': 16, 'T.CONFID-JCS-CODE': 3, 'T.CONFID-JCS-DATA': 4, 'T.INTEG-APPLI-CODE': 4, 'T.INTEG-APPLI-DATA': 12, 'T.INTEG-JCS-CODE': 5, 'T.INTEG-JCS-DATA': 3, 'T.SID': 16, 'T.EXE-CODE': 6, 'T.NATIVE': 5, 'T.RESOURCES': 7, 'T.DELETION': 4, 'T.INSTALL': 5, 'T.OBJ-DELETION': 2, 'T.PHYSICAL': 3, 'T.CONFID-APPLI-': 1, 'T.CONFID-': 8, 'T.INTEG-APPLI-': 4, 'T.OBJDELETION': 1, 'T.INTEGJCS-DATA': 6, 'T.EXECODE': 1, 'T.INTEG-': 10, 'T.INTEGAPPLI-DATA': 1, 'T.INTEGAPPLI-CODE': 2, 'T.INTEG-JCS-': 2, 'T.INTEG-JCSCODE': 1}, 'A': {'A.DELETION': 5, 'A.APPLET': 4, 'A.VERIFICATION': 4}, 'R': {'R.JAVA': 12}, 'OP': {'OP.ARRAY_ACCESS': 4, 'OP.ARRAY_LENGTH': 4, 'OP.ARRAY_AASTORE': 3, 'OP.CREATE': 7, 'OP.DELETE_APPLET': 4, 'OP.DELETE_PCKG': 3, 'OP.DELETE_PCKG_APPLET': 3, 'OP.INSTANCE_FIELD': 3, 'OP.INVK_VIRTUAL': 6, 'OP.INVK_INTERFACE': 7, 'OP.JAVA': 6, 'OP.THROW': 5, 'OP.TYPE_ACCESS': 5, 'OP.PUTFIELD': 1, 'OP.PUTSTATIC': 1, 'OP.PUT': 5}, 'OE': {'OE.CARD-MANAGEMENT': 5, 'OE.SCP': 13, 'OE.APPLET': 9, 'OE.VERIFICATION': 38, 'OE.CODE-EVIDENCE': 14, 'OE.CODE-': 5}, 'OSP': {'OSP.VERIFICATION': 5}}, 'vendor': {'Infineon': {'Infineon': 2, 'Infineon Technologies AG': 1}, 'GD': {'Giesecke+Devrient': 8, 'G+D': 4, 'G&D': 10, 'Giesecke & Devrient': 2}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 28}}, 'DES': {'DES': {'DES': 12}, '3DES': {'3DES': 3, '3-DES': 7, 'Triple-DES': 4, 'TDES': 3, 'TDEA': 1}}, 'constructions': {'MAC': {'CBC-MAC': 10, 'CMAC': 6}}}, 'asymmetric_crypto': {'RSA': {'RSA-CRT': 12}, 'ECC': {'ECDH': {'ECDH': 9}, 'ECDSA': {'ECDSA': 8}, 'ECC': {'ECC': 8}}, 'FF': {'DH': {'Diffie-Hellman': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 4}, 'SHA2': {'SHA-224': 3, 'SHA-256': 4, 'SHA-384': 4, 'SHA-512': 3, 'SHA-2': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 10}, 'KA': {'Key Agreement': 1}}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 1}, 'RNG': {'RNG': 19, 'RND': 4}}, 'cipher_mode': {'ECB': {'ECB': 9}, 'CBC': {'CBC': 6}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 2, 'physical probing': 1}, 'FI': {'physical tampering': 5, 'Malfunction': 3}, 'other': {'JIL': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 186-4': 7, 'FIPS 197': 10, 'FIPS180-4': 3, 'FIPS 140-2': 1}, 'PKCS': {'PKCS1': 12, 'PKCS5': 3, 'PKCS3': 1}, 'BSI': {'AIS20': 4, 'AIS 31': 2, 'AIS31': 2, 'AIS 20': 1}, 'RFC': {'RFC5639': 5, 'RFC 5639': 1}, 'ISO': {'ISO/IEC 7816': 2, 'ISO/IEC 14443': 2, 'ISO/IEC 9796-2': 1}, 'SCP': {'SCP02': 4, 'SCP03': 3}, 'CC': {'CCMB-2017-04-002': 2, 'CCMB-2017-04-003': 2, 'CCMB-2017-04-001': 1}}, 'javacard_version': {'JavaCard': {'Java Card 2.2.2': 3}}, 'javacard_api_const': {'misc': {'TYPE_ACCESS': 5}}, 'javacard_packages': {'javacard': {'javacard.security': 7, 'javacard.framework': 5, 'javacard.framework.applet': 1}, 'javacardx': {'javacardx.crypto': 1}}, 'certification_process': {'OutOfScope': {'out of scope': 5, 'a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are': 1, 'with ECDH is part of this SFR. 6 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 8 Security Functional Requirements Security Target Lite Sm@rtCafé® Expert 7.0 EAL 6+': 1, 'Dependencies: No dependencies. 7 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 8 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 9': 1, 'shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 10 The implemented ECDH key agreement is reduced to scalar multiplication, checking for': 1}}}
. - The cert_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-1092-2020': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0099-': 1}}, 'cc_security_level': {'EAL': {'EAL 6+': 1, 'EAL 6': 1, 'EAL 5': 1, 'EAL 2': 1, 'EAL 6 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.1': 1, 'ALC_FLR': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'GD': {'Giesecke+Devrient': 1}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_filename property was set to
1092b_pdf.pdf
. - The cert_filename property was set to
1092c_pdf.pdf
.
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0951-V4-2019']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0951-V4-2019']}}
data. - The report_references property was updated, with the
{'directly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1028-2017']}}, 'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0951-V2-2017', 'BSI-DSZ-CC-1028-2017', 'BSI-DSZ-CC-0951-V3-2018', 'BSI-DSZ-CC-0782-2012', 'BSI-DSZ-CC-0891-2015', 'BSI-DSZ-CC-0868-2014', 'BSI-DSZ-CC-0951-2015']}}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}]}
values added.
- The st property was updated, with the
-
19.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'ac6942be2e36f7024acbcb055671f17291076f4c37399fa86016f6aa87a333ca', 'txt_hash': 'fa45fb4406fc99148c06c47e909e94cab4fbc6ba80a9c959fc8962e737070d29'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 1019539, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 37, '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/CreationDate': "D:20200608083506+02'00'", '/Creator': 'Writer', '/Keywords': '"Common Criteria, Certification, Zertifizierung, Smart Card, Java Card"', '/ModDate': "D:20200608084737+02'00'", '/Producer': 'LibreOffice 6.2', '/Subject': 'Sm@rtCafé® Expert 7.0 EAL 6+C1 ', '/Title': 'Certification Report BSI-DSZ-CC-1092-2020', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.bsi.bund.de/', 'https://www.sogis.eu/', 'https://www.bsi.bund.de/zertifizierung', 'http://www.commoncriteriaportal.org/cc/', 'https://www.bsi.bund.de/zertifizierungsreporte', 'http://www.commoncriteriaportal.org/', 'https://www.bsi.bund.de/AIS']}}
. - The report_frontpage property was set to
{'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-1092-2020', 'cert_item': 'Sm@rtCafé® Expert 7.0 EAL 6+ C1', 'developer': 'Veridos GmbH - Identity Solutions by Giesecke+Devrient and Bundesdruckerei', 'cert_lab': 'BSI', 'ref_protection_profiles': 'Java Card Protection Profile - Open Configuration, December 2017, Version 3.0.5, BSI-CC-PP-0099- 2017', 'cc_version': 'PP conformant plus product specific extensions Common Criteria Part 2 extended', 'cc_security_level': 'Common Criteria Part 3 conformant EAL 6 augmented by ALC_FLR.1'}}
. - The report_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-1092-2020': 23, 'BSI-DSZ-CC-1028-2017': 3, 'BSI-DSZ-CC-1092-': 1, 'BSI-DSZ-CC-0951-V4-2019': 1, 'BSI-DSZ-CC-S-0127-2019': 2, 'BSI-DSZ-CC-S-0127-': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0099-': 1, 'BSI-CC-PP-0099-2017': 3}}, 'cc_security_level': {'EAL': {'EAL 6+': 18, 'EAL 6': 5, 'EAL 5': 4, 'EAL 2': 2, 'EAL 1': 1, 'EAL 4': 1, 'EAL 2+': 1, 'EAL6': 1, 'EAL 5+': 1, 'EAL 6 augmented': 3, 'EAL6 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_SPM.1': 1, 'ADV_ARC': 2}, 'ALC': {'ALC_FLR.1': 5, 'ALC_FLR': 3, 'ALC_CMC.5': 1, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1, 'ALC_DVS.2': 1, 'ALC_LCD.1': 1, 'ALC_TAT.3': 1}, 'ATE': {'ATE_FUN': 1, 'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN': 1}}, 'cc_sfr': {'FCO': {'FCO_NRO.2': 2}, 'FCS': {'FCS_COP.1': 30, 'FCS_RNG.1': 2, 'FCS_CKM.1': 5, 'FCS_COP.1.1': 16}, 'FIA': {'FIA_UID': 2}, 'FPT': {'FPT_TDC.1': 1}, 'FTP': {'FTP_ITC': 2}}, 'cc_claims': {}, 'vendor': {'Infineon': {'Infineon': 2, 'Infineon Technologies AG': 1}, 'GD': {'Giesecke+Devrient': 13, 'G+D': 2, 'G&D': 1, 'Giesecke & Devrient': 4}}, 'eval_facility': {'TUV': {'TÜV Informationstechnik': 4, 'TÜViT': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 16}}, 'DES': {'DES': {'DES': 2}, '3DES': {'3-DES': 6, '3DES': 17, 'TDEA': 1}}, 'constructions': {'MAC': {'CBC-MAC': 5, 'CMAC': 9}}}, 'asymmetric_crypto': {'RSA': {'RSA 2048': 2, 'RSA-CRT': 5}, 'ECC': {'ECDH': {'ECDH': 4}, 'ECDSA': {'ECDSA': 1}, 'ECC': {'ECC': 4}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 5}, 'SHA2': {'SHA-2': 2}}}, 'crypto_scheme': {'MAC': {'MAC': 6}, 'KA': {'Key Agreement': 2}}, 'crypto_protocol': {'PGP': {'PGP': 3}}, 'randomness': {'RNG': {'RNG': 2}}, 'cipher_mode': {'ECB': {'ECB': 4}, 'CBC': {'CBC': 15}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'malfunction': 1}, 'other': {'JIL': 4}}, 'technical_report_id': {'BSI': {'BSI TR-02102': 1, 'BSI 7148': 1, 'BSI 24': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS180-4': 14, 'FIPS 197': 9, 'FIPS186-4': 4, 'FIPS46-3': 1, 'FIPS PUB 180-4': 1, 'FIPS PUB 186-4': 1, 'FIPS197': 1}, 'NIST': {'SP 800-108': 3}, 'PKCS': {'PKCS5': 6, 'PKCS #1': 24}, 'BSI': {'AIS 34': 2, 'AIS 25': 3, 'AIS 26': 2, 'AIS 36': 6, 'AIS 46': 2, 'AIS 37': 2, 'AIS 20': 2, 'AIS 31': 2, 'AIS 35': 2, 'AIS 1': 1, 'AIS 32': 1, 'AIS 47': 1, 'AIS20': 1, 'AIS31': 1}, 'RFC': {'RFC 5639': 4, 'RFC5639': 1}, 'ISO': {'ISO/IEC 15408': 4, 'ISO/IEC 18045': 4, 'ISO/IEC 17065': 2, 'ISO/IEC9796-2': 1, 'ISO/IEC 11770-3': 1, 'ISO/IEC 18031:2011': 1}, 'SCP': {'SCP03': 2, 'SCP02': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, '04.2020, Security Target Sm@rtCafé® Expert 7.0 EAL 6+ C1, Giesecke+Devrient Mobile Security GmbH (confidential document) 7 specifically • AIS 1, Version 13, Durchführung der Ortsbesichtigung in der Entwicklungsumgebung': 1, 'Sm@rtCafé® Expert 7.0 EAL 6+ C1, Version 6, 25.05.2020, TÜV Informationstechnik GmbH (confidential document) [8] Java Card Protection Profile - Open Configuration, December 2017, Version 3.0.5': 1, '36 for Sm@rtCafé® Expert 7.0 EAL 6+ C1, Version 6, 25.05.2020, BSI-DSZ-CC-1092- 2020, TÜViT GmbH (confidential document) [11] Configuration list for the TOE, Version 1.5, 18.05.2020, Giesecke+Devrient Mobile Security': 1, 'confidential document) [12] Preparative Procedures Sm@rtCafé® Expert Expert 7.0 EAL 6+ C1 Version 2.1 , 15.04.2020': 1, '“Evaluation Technical Report for Composite Evaluation (ETR Comp)”, TÜV Informationstechnik GmbH (confidential document) [16] GlobalPlatform Card Specification Version 2.2.1, January 2011 [17] GlobalPlatform Card Common': 1}}}
. - The report_filename property was set to
1092a_pdf.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['BSI']
. - The cert_id property was set to
BSI-DSZ-CC-1092-2020
. - The report_references property was updated, with the
{'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0951-V4-2019']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0951-V4-2019']}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1092a_pdf.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1092b_pdf.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
. - The st_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data. - The report_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}]}
values discarded.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The cert property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The cert_metadata property was set to
None
. - The cert_keywords property was set to
None
. - The cert_filename property was set to
None
.
The computed heuristics were updated.
- The report_references property was updated, with the
{'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0951-V2-2017', 'BSI-DSZ-CC-0951-V3-2018', 'BSI-DSZ-CC-0868-2014', 'BSI-DSZ-CC-0782-2012']}}}
data.
- The cert property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Sm@rtCafé® Expert 7.0 EAL 6+ C1 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1092c_pdf.pdf",
"dgst": "e4256d8111c60a46",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-1092-2020",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 5
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"7.0"
]
},
"indirect_transitive_cves": null,
"next_certificates": [],
"prev_certificates": [],
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1028-2017",
"BSI-DSZ-CC-0951-V4-2019"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1028-2017",
"BSI-DSZ-CC-0951-V4-2019",
"BSI-DSZ-CC-0891-2015",
"BSI-DSZ-CC-0951-V3-2018",
"BSI-DSZ-CC-0951-V2-2017",
"BSI-DSZ-CC-0868-2014",
"BSI-DSZ-CC-0782-2012",
"BSI-DSZ-CC-0951-2015"
]
}
},
"scheme_data": {
"category": "Smart Cards and similar devices",
"cert_id": "BSI-DSZ-CC-1092-2020",
"certification_date": "2020-05-29",
"enhanced": {
"applicant": "Veridos GmbH - Identity Solutions by Giesecke \u0026 Devrient and Bundesdruckerei Oranienstra\u00dfe 91 10969 Berlin",
"assurance_level": "EAL6+,ALC_FLR.1",
"cert_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1092c_pdf.pdf?__blob=publicationFile\u0026v=1",
"certification_date": "2020-05-29",
"description": "The Target of Evaluation (TOE), the Sm@rtCaf\u00e9\u00ae Expert 7.0 EAL 6+ C1 is a dual-interface, contact based or a pure contactless smart card with a Java Card operating system (OS). The composite TOE is a multi-purpose Java Card platform where applets of different kind can be installed. Since a post-issuance installation of applets is possible, the TOE corresponds to an open configuration, as defined in the PP. Depending on the installed applets, the entire product (consisting of the TOE plus applets) can be used as a government card (like an ID card or a passport), a payment card, a signature card and for other purposes. The composite TOE is based on the certified Integrated Circuit (IC) M5073 G11 (Certification ID BSI-DSZ-CC-0951-V4-2019). The composite TOE comprises the underlying hardware IC, the operating system including the G+D crypto library and according TOE guidance documents. The Biometric API is not part of the TOE and can be part of the product or not.",
"evaluation_facility": "T\u00dcV Informationstechnik GmbH",
"expiration_date": "2025-05-28",
"product": "Sm@rtCaf\u00e9\u00ae Expert 7.0 EAL 6+ C1",
"protection_profile": "Java Card Protection Profile - Open Configuration, December 2017, Version 3.0.5, BSI-CC-PP-0099-2017",
"report_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1092a_pdf.pdf?__blob=publicationFile\u0026v=1",
"target_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1092b_pdf.pdf?__blob=publicationFile\u0026v=1"
},
"product": "Sm@rtCaf\u00e9\u00ae Expert 7.0 EAL 6+ C1",
"subcategory": "Operating systems and applications",
"url": "https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/SmartCards_Betriebssysteme_Anwendungen/1092.html",
"vendor": "Veridos GmbH - Identity Solutions by Giesecke \u0026 Devrient and Bundesdruckerei"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0951-V4-2019"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0951-V4-2019"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Veridos GmbH - Identity Solutions by Giesecke \u0026 Devrient and Bundesdruckerei",
"manufacturer_web": "https://www.veridos.com",
"name": "Sm@rtCaf\u00e9\u00ae Expert 7.0 EAL 6+ C1",
"not_valid_after": "2025-05-29",
"not_valid_before": "2020-05-29",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "1092c_pdf.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1092-2020": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0099-": 1
}
},
"cc_sar": {
"ALC": {
"ALC_FLR": 1,
"ALC_FLR.1": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 5": 1,
"EAL 6": 1,
"EAL 6 augmented": 1,
"EAL 6+": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 15408": 2,
"ISO/IEC 18045": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"GD": {
"Giesecke+Devrient": 1
}
},
"vulnerability": {}
},
"cert_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20200608084917+02\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "Common Criteria, Certification, Zertifizierung, Smart Card, Java Card",
"/ModDate": "D:20200608085041+02\u002700\u0027",
"/Producer": "LibreOffice 6.2",
"/Subject": "Sm@rtCaf\u00e9\u00ae Expert 7.0 EAL 6+C1 ",
"/Title": "Certificate BSI-DSZ-CC-1092-2020",
"pdf_file_size_bytes": 296860,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 1
},
"report_filename": "1092a_pdf.pdf",
"report_frontpage": {
"DE": {
"cc_security_level": "Common Criteria Part 3 conformant EAL 6 augmented by ALC_FLR.1",
"cc_version": "PP conformant plus product specific extensions Common Criteria Part 2 extended",
"cert_id": "BSI-DSZ-CC-1092-2020",
"cert_item": "Sm@rtCaf\u00e9\u00ae Expert 7.0 EAL 6+ C1",
"cert_lab": "BSI",
"developer": "Veridos GmbH - Identity Solutions by Giesecke+Devrient and Bundesdruckerei",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
],
"ref_protection_profiles": "Java Card Protection Profile - Open Configuration, December 2017, Version 3.0.5, BSI-CC-PP-0099- 2017"
}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 4
},
"ECDH": {
"ECDH": 4
},
"ECDSA": {
"ECDSA": 1
}
},
"RSA": {
"RSA 2048": 2,
"RSA-CRT": 5
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0951-V4-2019": 1,
"BSI-DSZ-CC-1028-2017": 3,
"BSI-DSZ-CC-1092-": 1,
"BSI-DSZ-CC-1092-2020": 23,
"BSI-DSZ-CC-S-0127-": 1,
"BSI-DSZ-CC-S-0127-2019": 2
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0099-": 1,
"BSI-CC-PP-0099-2017": 3
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 2,
"ADV_SPM.1": 1
},
"ALC": {
"ALC_CMC.5": 1,
"ALC_CMS.5": 1,
"ALC_DEL.1": 1,
"ALC_DVS.2": 1,
"ALC_FLR": 3,
"ALC_FLR.1": 5,
"ALC_LCD.1": 1,
"ALC_TAT.3": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_DPT": 1,
"ATE_FUN": 1,
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 2": 2,
"EAL 2+": 1,
"EAL 4": 1,
"EAL 5": 4,
"EAL 5+": 1,
"EAL 6": 5,
"EAL 6 augmented": 3,
"EAL 6+": 18,
"EAL6": 1,
"EAL6 augmented": 1
}
},
"cc_sfr": {
"FCO": {
"FCO_NRO.2": 2
},
"FCS": {
"FCS_CKM.1": 5,
"FCS_COP.1": 30,
"FCS_COP.1.1": 16,
"FCS_RNG.1": 2
},
"FIA": {
"FIA_UID": 2
},
"FPT": {
"FPT_TDC.1": 1
},
"FTP": {
"FTP_ITC": 2
}
},
"certification_process": {
"ConfidentialDocument": {
"04.2020, Security Target Sm@rtCaf\u00e9\u00ae Expert 7.0 EAL 6+ C1, Giesecke+Devrient Mobile Security GmbH (confidential document) 7 specifically \u2022 AIS 1, Version 13, Durchf\u00fchrung der Ortsbesichtigung in der Entwicklungsumgebung": 1,
"36 for Sm@rtCaf\u00e9\u00ae Expert 7.0 EAL 6+ C1, Version 6, 25.05.2020, BSI-DSZ-CC-1092- 2020, T\u00dcViT GmbH (confidential document) [11] Configuration list for the TOE, Version 1.5, 18.05.2020, Giesecke+Devrient Mobile Security": 1,
"Sm@rtCaf\u00e9\u00ae Expert 7.0 EAL 6+ C1, Version 6, 25.05.2020, T\u00dcV Informationstechnik GmbH (confidential document) [8] Java Card Protection Profile - Open Configuration, December 2017, Version 3.0.5": 1,
"being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1,
"confidential document) [12] Preparative Procedures Sm@rtCaf\u00e9\u00ae Expert Expert 7.0 EAL 6+ C1 Version 2.1 , 15.04.2020": 1,
"\u201cEvaluation Technical Report for Composite Evaluation (ETR Comp)\u201d, T\u00dcV Informationstechnik GmbH (confidential document) [16] GlobalPlatform Card Specification Version 2.2.1, January 2011 [17] GlobalPlatform Card Common": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 15
},
"ECB": {
"ECB": 4
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PGP": {
"PGP": 3
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 2
},
"MAC": {
"MAC": 6
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"TUV": {
"T\u00dcV Informationstechnik": 4,
"T\u00dcViT": 1
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 5
},
"SHA2": {
"SHA-2": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 2
}
},
"side_channel_analysis": {
"FI": {
"malfunction": 1
},
"other": {
"JIL": 4
}
},
"standard_id": {
"BSI": {
"AIS 1": 1,
"AIS 20": 2,
"AIS 25": 3,
"AIS 26": 2,
"AIS 31": 2,
"AIS 32": 1,
"AIS 34": 2,
"AIS 35": 2,
"AIS 36": 6,
"AIS 37": 2,
"AIS 46": 2,
"AIS 47": 1,
"AIS20": 1,
"AIS31": 1
},
"FIPS": {
"FIPS 197": 9,
"FIPS PUB 180-4": 1,
"FIPS PUB 186-4": 1,
"FIPS180-4": 14,
"FIPS186-4": 4,
"FIPS197": 1,
"FIPS46-3": 1
},
"ISO": {
"ISO/IEC 11770-3": 1,
"ISO/IEC 15408": 4,
"ISO/IEC 17065": 2,
"ISO/IEC 18031:2011": 1,
"ISO/IEC 18045": 4,
"ISO/IEC9796-2": 1
},
"NIST": {
"SP 800-108": 3
},
"PKCS": {
"PKCS #1": 24,
"PKCS5": 6
},
"RFC": {
"RFC 5639": 4,
"RFC5639": 1
},
"SCP": {
"SCP02": 1,
"SCP03": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 16
}
},
"DES": {
"3DES": {
"3-DES": 6,
"3DES": 17,
"TDEA": 1
},
"DES": {
"DES": 2
}
},
"constructions": {
"MAC": {
"CBC-MAC": 5,
"CMAC": 9
}
}
},
"technical_report_id": {
"BSI": {
"BSI 24": 1,
"BSI 7148": 1,
"BSI TR-02102": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"GD": {
"G\u0026D": 1,
"G+D": 2,
"Giesecke \u0026 Devrient": 4,
"Giesecke+Devrient": 13
},
"Infineon": {
"Infineon": 2,
"Infineon Technologies AG": 1
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20200608083506+02\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, Smart Card, Java Card\"",
"/ModDate": "D:20200608084737+02\u002700\u0027",
"/Producer": "LibreOffice 6.2",
"/Subject": "Sm@rtCaf\u00e9\u00ae Expert 7.0 EAL 6+C1 ",
"/Title": "Certification Report BSI-DSZ-CC-1092-2020",
"pdf_file_size_bytes": 1019539,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.sogis.eu/",
"https://www.bsi.bund.de/",
"https://www.bsi.bund.de/zertifizierung",
"http://www.commoncriteriaportal.org/",
"https://www.bsi.bund.de/zertifizierungsreporte",
"https://www.bsi.bund.de/AIS",
"http://www.commoncriteriaportal.org/cc/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 37
},
"st_filename": "1092b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 8
},
"ECDH": {
"ECDH": 9
},
"ECDSA": {
"ECDSA": 8
}
},
"FF": {
"DH": {
"Diffie-Hellman": 2
}
},
"RSA": {
"RSA-CRT": 12
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0951-V4-": 1,
"BSI-DSZ-CC-0951-V4-2019": 2
}
},
"cc_claims": {
"A": {
"A.APPLET": 4,
"A.DELETION": 5,
"A.VERIFICATION": 4
},
"D": {
"D.APP_I_DATA": 2,
"D.CRYPTO": 2,
"D.PIN": 1,
"D.SEC_DATA": 1
},
"O": {
"O.AES": 1,
"O.ALARM": 22,
"O.APPLET": 15,
"O.CARD-": 7,
"O.CARD-MANAGEMENT": 26,
"O.CIPHER": 15,
"O.CODE_PKG": 13,
"O.DELETION": 17,
"O.FIREWALL": 43,
"O.GLOBAL_ARRAYS": 1,
"O.GLOBAL_ARRAYS_CONFID": 19,
"O.GLOBAL_ARRAYS_INTEG": 9,
"O.INSTALL": 16,
"O.JAVAOBJECT": 44,
"O.KEY-": 8,
"O.KEY-MNGT": 15,
"O.LOAD": 18,
"O.NATIVE": 14,
"O.OBJ-DELETION": 9,
"O.OPERATE": 36,
"O.PIN-": 5,
"O.PIN-MNGT": 18,
"O.PINMNGT": 1,
"O.REALLOCATION": 18,
"O.RESOURCES": 23,
"O.RND": 4,
"O.RNG": 11,
"O.SCP": 64,
"O.SID": 33,
"O.TDES": 2,
"O.TRANSACTION": 19
},
"OE": {
"OE.APPLET": 9,
"OE.CARD-MANAGEMENT": 5,
"OE.CODE-": 5,
"OE.CODE-EVIDENCE": 14,
"OE.SCP": 13,
"OE.VERIFICATION": 38
},
"OP": {
"OP.ARRAY_AASTORE": 3,
"OP.ARRAY_ACCESS": 4,
"OP.ARRAY_LENGTH": 4,
"OP.CREATE": 7,
"OP.DELETE_APPLET": 4,
"OP.DELETE_PCKG": 3,
"OP.DELETE_PCKG_APPLET": 3,
"OP.INSTANCE_FIELD": 3,
"OP.INVK_INTERFACE": 7,
"OP.INVK_VIRTUAL": 6,
"OP.JAVA": 6,
"OP.PUT": 5,
"OP.PUTFIELD": 1,
"OP.PUTSTATIC": 1,
"OP.THROW": 5,
"OP.TYPE_ACCESS": 5
},
"OSP": {
"OSP.VERIFICATION": 5
},
"R": {
"R.JAVA": 12
},
"T": {
"T.CONFID-": 8,
"T.CONFID-APPLI-": 1,
"T.CONFID-APPLI-DATA": 16,
"T.CONFID-JCS-CODE": 3,
"T.CONFID-JCS-DATA": 4,
"T.DELETION": 4,
"T.EXE-CODE": 6,
"T.EXECODE": 1,
"T.INSTALL": 5,
"T.INTEG-": 10,
"T.INTEG-APPLI-": 4,
"T.INTEG-APPLI-CODE": 4,
"T.INTEG-APPLI-DATA": 12,
"T.INTEG-JCS-": 2,
"T.INTEG-JCS-CODE": 5,
"T.INTEG-JCS-DATA": 3,
"T.INTEG-JCSCODE": 1,
"T.INTEGAPPLI-CODE": 2,
"T.INTEGAPPLI-DATA": 1,
"T.INTEGJCS-DATA": 6,
"T.NATIVE": 5,
"T.OBJ-DELETION": 2,
"T.OBJDELETION": 1,
"T.PHYSICAL": 3,
"T.RESOURCES": 7,
"T.SECURE_DELETION": 8,
"T.SID": 16
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0084-2014": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 6,
"ADV_ARC.1": 5,
"ADV_FSP.1": 3,
"ADV_FSP.2": 2,
"ADV_FSP.4": 3,
"ADV_FSP.5": 9,
"ADV_IMP.1": 5,
"ADV_IMP.2": 1,
"ADV_INT.3": 1,
"ADV_SPM.1": 3,
"ADV_TDS.1": 2,
"ADV_TDS.3": 3,
"ADV_TDS.4": 5,
"ADV_TDS.5": 2
},
"AGD": {
"AGD_OPE.1": 7,
"AGD_PRE.1": 5
},
"ALC": {
"ALC_CMC.5": 3,
"ALC_CMS.1": 1,
"ALC_CMS.5": 1,
"ALC_DEL.1": 1,
"ALC_DVS.2": 4,
"ALC_FLR.1": 7,
"ALC_LCD.1": 3,
"ALC_TAT": 1,
"ALC_TAT.1": 2,
"ALC_TAT.3": 2
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 4,
"ASE_INT.1": 3,
"ASE_INT.2": 2,
"ASE_OBJ.2": 3,
"ASE_REQ.1": 2,
"ASE_REQ.2": 2,
"ASE_SPD.1": 3,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.1": 2,
"ATE_COV.2": 2,
"ATE_COV.3": 1,
"ATE_DPT.1": 1,
"ATE_DPT.3": 1,
"ATE_FUN.1": 5,
"ATE_FUN.2": 1
},
"AVA": {
"AVA_VAN.5": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 4+": 1,
"EAL 6": 3,
"EAL 6 augmented": 2,
"EAL 6+": 147,
"EAL6": 4,
"EAL6 augmented": 2,
"EAL6+": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP.1": 21,
"FAU_ARP.1.1": 1,
"FAU_SAA.1": 3,
"FAU_SAS.1": 1
},
"FCO": {
"FCO_NRO": 6,
"FCO_NRO.2": 3
},
"FCS": {
"FCS_CKM": 10,
"FCS_CKM.1": 35,
"FCS_CKM.2": 4,
"FCS_CKM.4": 30,
"FCS_CKM.4.1": 1,
"FCS_COP": 12,
"FCS_COP.1": 117,
"FCS_RNG": 5,
"FCS_RNG.1": 13,
"FCS_RNG.1.1": 5,
"FCS_RNG.1.2": 2
},
"FDP": {
"FDP_ACC": 28,
"FDP_ACC.1": 11,
"FDP_ACC.2": 5,
"FDP_ACF": 27,
"FDP_ACF.1": 14,
"FDP_IFC": 27,
"FDP_IFC.1": 13,
"FDP_IFC.2": 2,
"FDP_IFF": 19,
"FDP_IFF.1": 17,
"FDP_ITC": 12,
"FDP_ITC.1": 7,
"FDP_ITC.2": 19,
"FDP_ITT.1": 1,
"FDP_RIP": 138,
"FDP_RIP.1": 11,
"FDP_ROL": 16,
"FDP_ROL.1": 5,
"FDP_SDC.1": 2,
"FDP_SDI": 16,
"FDP_SDI.1": 2,
"FDP_SDI.2": 3,
"FDP_UIT": 9,
"FDP_UIT.1": 2
},
"FIA": {
"FIA_API.1": 1,
"FIA_ATD": 10,
"FIA_ATD.1": 2,
"FIA_UID": 16,
"FIA_UID.1": 9,
"FIA_UID.2": 1,
"FIA_USB": 9,
"FIA_USB.1": 3
},
"FMT": {
"FMT_LIM": 4,
"FMT_LIM.1": 1,
"FMT_LIM.2": 1,
"FMT_MSA": 101,
"FMT_MSA.1": 10,
"FMT_MSA.2": 2,
"FMT_MSA.3": 17,
"FMT_MTD": 22,
"FMT_MTD.1": 2,
"FMT_MTD.3": 1,
"FMT_SMF": 22,
"FMT_SMF.1": 20,
"FMT_SMF.1.1": 1,
"FMT_SMR": 35,
"FMT_SMR.1": 32,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPR": {
"FPR_UNO.1": 10,
"FPR_UNO.1.1": 1
},
"FPT": {
"FPT_FLS": 39,
"FPT_FLS.1": 21,
"FPT_FLS.1.1": 2,
"FPT_ITT.1": 2,
"FPT_PHP.3": 9,
"FPT_PHP.3.1": 3,
"FPT_RCV": 13,
"FPT_RCV.3": 10,
"FPT_TDC.1": 8,
"FPT_TDC.1.1": 1,
"FPT_TDC.1.2": 2,
"FPT_TST.1": 9,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1,
"FPT_TST.2": 1
},
"FRU": {
"FRU_FLT.2": 1
},
"FTP": {
"FTP_ITC": 14,
"FTP_ITC.1": 8,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.3": 1,
"FTP_TRP.1": 2
}
},
"certification_process": {
"OutOfScope": {
"Dependencies: No dependencies. 7 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 8 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 9": 1,
"a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are": 1,
"out of scope": 5,
"shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 10 The implemented ECDH key agreement is reduced to scalar multiplication, checking for": 1,
"with ECDH is part of this SFR. 6 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 8 Security Functional Requirements Security Target Lite Sm@rtCaf\u00e9\u00ae Expert 7.0 EAL 6+": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 6
},
"ECB": {
"ECB": 9
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"KA": {
"Key Agreement": 1
},
"MAC": {
"MAC": 10
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 4
},
"SHA2": {
"SHA-2": 1,
"SHA-224": 3,
"SHA-256": 4,
"SHA-384": 4,
"SHA-512": 3
}
}
},
"ic_data_group": {},
"javacard_api_const": {
"misc": {
"TYPE_ACCESS": 5
}
},
"javacard_packages": {
"javacard": {
"javacard.framework": 5,
"javacard.framework.applet": 1,
"javacard.security": 7
},
"javacardx": {
"javacardx.crypto": 1
}
},
"javacard_version": {
"JavaCard": {
"Java Card 2.2.2": 3
}
},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 4,
"RNG": 19
},
"TRNG": {
"TRNG": 1
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 3,
"physical tampering": 5
},
"SCA": {
"Leak-Inherent": 2,
"physical probing": 1
},
"other": {
"JIL": 2
}
},
"standard_id": {
"BSI": {
"AIS 20": 1,
"AIS 31": 2,
"AIS20": 4,
"AIS31": 2
},
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 2,
"CCMB-2017-04-003": 2
},
"FIPS": {
"FIPS 140-2": 1,
"FIPS 186-4": 7,
"FIPS 197": 10,
"FIPS180-4": 3
},
"ISO": {
"ISO/IEC 14443": 2,
"ISO/IEC 7816": 2,
"ISO/IEC 9796-2": 1
},
"PKCS": {
"PKCS1": 12,
"PKCS3": 1,
"PKCS5": 3
},
"RFC": {
"RFC 5639": 1,
"RFC5639": 5
},
"SCP": {
"SCP02": 4,
"SCP03": 3
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 28
}
},
"DES": {
"3DES": {
"3-DES": 7,
"3DES": 3,
"TDEA": 1,
"TDES": 3,
"Triple-DES": 4
},
"DES": {
"DES": 12
}
},
"constructions": {
"MAC": {
"CBC-MAC": 10,
"CMAC": 6
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"GD": {
"G\u0026D": 10,
"G+D": 4,
"Giesecke \u0026 Devrient": 2,
"Giesecke+Devrient": 8
},
"Infineon": {
"Infineon": 2,
"Infineon Technologies AG": 1
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Dr. Ulrich Stutenb\u00e4umer (Giesecke+Devrient Mobile Security GmbH)",
"/Category": "Public",
"/Chip": "M5073 G11",
"/Comments": "Final",
"/Company": "GuD",
"/CreationDate": "D:20200518130755+02\u002700\u0027",
"/Creator": "Acrobat PDFMaker 19 f\u00fcr Word",
"/HWManufacturer": "Infineon",
"/Keywords": "dual-interface, contact based or pure contactless smart card, Javacard operating system (OS), multi-purpose Java card, post-issuance installation of applets, open configuration, Java Card System Protection Profile (Open Configuration), government card, ID card, passport, payment card, signature card",
"/ModDate": "D:20200518132406+02\u002700\u0027",
"/Producer": "Adobe PDF Library 19.21.90",
"/ProductName": "Sm@rtCaf\u00e9\u00ae Expert 7.0 EAL 6+ C1",
"/SourceModified": "D:20200518110720",
"/Subject": "Common Criteria Security Target Lite in version 4.7 from 18.05.2020",
"/TOE": "Sm@rtCaf\u00e9\u00ae Expert 7.0 EAL 6+ C1",
"/Title": "Security Target Lite Sm@rtCaf\u00e9\u00ae Expert 7.0 EAL 6+ C1",
"pdf_file_size_bytes": 1543454,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 130
}
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": "EAL4+",
"pp_ids": null,
"pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0099b_pdf.pdf",
"pp_name": "Java Card Protection Profile - Open Configuration"
}
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1092a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"EAL6+",
"ALC_FLR.1"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1092b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "ea45147852194f9922c832dda9b6f2327b55e9c762b65f65727324ca9ab84af4",
"txt_hash": "d8035d205e2c1d6ad3e63cc743c77f0c2fb277114148131c63781c00892eb353"
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "ac6942be2e36f7024acbcb055671f17291076f4c37399fa86016f6aa87a333ca",
"txt_hash": "fa45fb4406fc99148c06c47e909e94cab4fbc6ba80a9c959fc8962e737070d29"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "753b0b266ff06be0af75a92593b2d04c56ce629c5be17dcb3e442ab3ce2d1124",
"txt_hash": "ece1b80fb4b1a40a26bee2cac92bc794144df8a4d369d04a126bbc734f3c7081"
}
},
"status": "active"
}