MultiApp ID Java Card Platform - MultiApp ID v1.0 and patch v3.1 embedded on the secure Microcontroller SLE66CX680PE-A13
CSV information ?
Status | archived |
---|---|
Valid from | 13.02.2008 |
Valid until | 01.09.2019 |
Scheme | 🇫🇷 FR |
Manufacturer | Gemalto - Infineon Technologies AG |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | ADV_IMP.2, AVA_MSU.3, ALC_DVS.2, EAL4+, AVA_VLA.4 |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Symmetric Algorithms
DESAsymmetric Algorithms
RSA2048JavaCard versions
JavaCard 2.1.1, Java Card 2.2.1Vendor
Infineon Technologies AG, GemaltoSecurity level
EAL 4, EAL4, EAL5, EAL7, EAL 1, EAL 3, EAL 5, EAL 7, EAL5+, ITSEC E6 etClaims
OE.DEVELOPMENT, OE.APPLET, OE.VERIFICATIONSecurity Assurance Requirements (SAR)
ACM_AUT, ACM_CAP, ACM_SCP, ADO_DEL, ADO_IGS, ADV_IMP.2, ADV_FSP, ADV_HLD, ADV_IMP, ADV_INT, ADV_LLD, ADV_RCR, ADV_SPM, AGD_ADM, AGD_USR, ALC_DVS.2, ALC_FLR, ALC_DVS, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_MSU.3, AVA_VLA.4, AVA_CCA, AVA_MSU, AVA_SOF, AVA_VLAProtection profiles
BSI-PP-0002-2001Certificates
BSI-DSZ-CC-0322, DCSSI-2008/01Evaluation facilities
Serma TechnologiesStandards
AIS 34, AIS34, ISO/IEC 15408:2005, ISO/IEC 18045:2005, CCMB-2005-08-001, CCMB-2005-08-002, CCMB-2005-08-003, CCMB-2005-08-004File metadata
Title | DCSSI-2008/01 |
---|---|
Subject | Plateforme Java Card MultiApp ID - Microcontrôleur SLE66CX680PE-A13 masqué par le logiciel MultiApp ID v1.0 et correctif v3.1 |
Keywords | CER/F/07.5 |
Author | watanabe |
Creation date | D:20080218175709+01'00' |
Modification date | D:20080218175713+01'00' |
Pages | 15 |
Creator | Acrobat PDFMaker 7.0.7 pour Word |
Producer | Acrobat Distiller 7.0.5 (Windows) |
Frontpage
Certificate ID | Plateforme Java Card MultiApp ID - Microcontrôleur SLE66CX680PE-A13 masqué par le logiciel MultiApp ID v1.0 et correctif v3.1 Rapport de certification DCSSI-2008/01 Page 3 sur 15 DCSSI-2008/01 |
---|---|
Certified item | Plateforme Java Card MultiApp ID - Microcontrôleur SLE66CX680PE-A13 masqué par le logiciel MultiApp ID v1.0 et correctif v3.1 |
Certification lab | Serma Technologies 30 avenue Gustave Eiffel, 33608 Pessac, France Tél : +33 (0)5 57 26 08 75, mél : [email protected] |
Developer | Gemalto SA 6 rue de la Verrerie, 92197 Meudon, France Infineon Technologies AG Security & Chipcard ICs P.O. Box 80 09 49, 81609 MĂĽnchen, Allemagne Commanditaire Gemalto SA 6 rue de la Verrerie, 92197 Meudon, France |
References
Incoming- ANSSI-CC-2010/59 - archived - MultiApp ID CIE/CNS
- ANSSI-CC-2008/02 - archived - MultiApp ID SSCD - MultiApp ID v1.0 and patch v3.1 embedded on Secure Microcontroller SLE66CX680PE-A13
Security target ?
Extracted keywords
Symmetric Algorithms
AES, DES, TDESAsymmetric Algorithms
RSA2048, RSA 1536, RSA 1024Hash functions
SHA-1Schemes
MACJavaCard versions
Java Card 2.1.1, Global Platform 2.1.1JavaCard API constants
TYPE_ACCESSVendor
Infineon, GemaltoSecurity level
EAL4+, EAL4, EAL4 augmentedClaims
D.APP_CODE, D.APP_C_DATA, D.APP_I_DATA, D.PIN, D.JCS_CODE, D.JCS_DATA, D.SEC_DATA, D.API_DATA, D.CRYPTO, O.DELETION, O.OBJ-DELETION, O.JAVAOBJECT, O.APPLET, O.CODE_PKG, O.CODE_PCKG, T.PHYSICAL, T.DELETION, T.OBJ-DELETION, T.CONFID-JCS-CODE, T.CONFID-APPLI-DATA, T.CONFID-JCS-DATA, T.INTEG-APPLI-CODE, T.INTEG-JCS-CODE, T.INTEG-APPLI-DATA, T.INTEG-JCS-DATA, T.SID, T.EXE-CODE, T.NATIVE, T.RESOURCES, T.INSTALL, A.NATIVE, A.DELETION, A.VERIFICATION, A.APPLET, R.JAVA, OT.DELETION, OT.SID, OT.OPERATE, OT.RESOURCES, OT.FIREWALL, OT.NATIVE, OT.REALLOCATION, OT.SHRD_VAR_CONFID, OT.SHRD_VAR_INTEG, OT.ALARM, OT.TRANSACTION, OT.KEY-MNGT, OT.CIPHER, OT.PIN-MNGT, OT.INSTALL, OT.LOAD, OT.OBJ-DELETION, OT.SCP, OT.CARD-MANAGEMENT, OP.ARRAY_ACCESS, OP.INSTANCE_FIELD, OP.INVK_VIRTUAL, OP.INVK_INTERFACE, OP.THROW, OP.TYPE_ACCESS, OP.JAVA, OP.CREATE, OP.PUT, OP.DELETE_APPLET, OP.DELETE_PCKG, OP.DELETE_PCKG_APPLET, OP.SEND, OP.RECEIVE, OP.BYTECODE, OE.NATIVE, OE.DEVELOPMENT, OE.APPLET, OE.VERIFICATION, OSP.NATIVE, OSP.VERIFICATIONSecurity Assurance Requirements (SAR)
ACM_AUT, ACM_AUT.1, ACM_CAP, ACM_CAP.4, ACM_SCP, ACM_SCP.2, ADO_DEL, ADO_DEL.2, ADO_IGS, ADO_IGS.1, ADV_IMP.2, ADV_FSP, ADV_FSP.2, ADV_HLD, ADV_HLD.2, ADV_IMP, ADV_LLD, ADV_LLD.1, ADV_RCR, ADV_RCR.1, ADV_SPM, ADV_SPM.1, AGD_ADM, AGD_ADM.1, AGD_USR, AGD_USR.1, ALC_DVS.2, ALC_DVS, ALC_LCD, ALC_LCD.1, ALC_TAT, ALC_TAT.1, ATE_COV, ATE_COV.2, ATE_DPT, ATE_DPT.1, ATE_FUN, ATE_FUN.1, ATE_IND, ATE_IND.2, AVA_VLA.4, AVA_MSU.3, AVA_MSU, AVA_SOF, AVA_SOF.1, AVA_VLA, AVA_VLA.3Security Functional Requirements (SFR)
FAU_ARP, FAU_ARP.1, FCO_NRO, FCO_NRO.2, FCS_COP.1, FCS_CKM, FCS_CKM.1, FCS_CKM.2, FCS_CKM.3, FCS_CKM.4, FCS_COP, FDP_ACC, FDP_ACC.1, FDP_ACF, FDP_ACF.1, FDP_ACC.2, FDP_IFC, FDP_IFC.1, FDP_IFF, FDP_IFF.1, FDP_RIP, FDP_RIP.1, FDP_ROL, FDP_ROL.1, FDP_SDI.2, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ITC, FDP_ITC.2, FDP_ACF.1.1, FDP_ACF.1.2, FDP_IFC.2, FDP_UIT, FDP_UIT.1, FDP_IFF.2, FDP_IFF.2.2, FDP_IFF.2.7, FIA_UID, FIA_UID.1, FIA_ATD, FIA_ATD.1, FIA_UID.2, FIA_USB.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FMT_SMR, FMT_MSA, FMT_MSA.1, FMT_MSA.3, FMT_SMF, FMT_SMF.1, FMT_SMR.1, FMT_MSA.2, FMT_MTD, FMT_MTD.1, FMT_MTD.3, FMT_MTD.3.1, FMT_SMR.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FPR_UNO.1, FPR_UNO.1.1, FPT_RCV, FPT_RVM, FPT_RVM.1, FPT_AMT, FPT_AMT.1, FPT_FLS, FPT_FLS.1, FPT_PHP, FPT_PHP.3, FPT_SEP, FPT_SEP.1, FPT_RCV.4, FPT_RCV.3, FPT_TDC.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_TST.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FRU_FLT, FRU_FLT.1, FRU_RSA, FRU_RSA.1, FTP_ITC, FTP_ITC.1Certificates
CC-1, CC-2, CC-3Side-channel analysis
side channel, timing attacks, physical tampering, malfunction, DFA, fault injectionStandards
FIPS 46-3, FIPS 197, FIPS 180-2, SP 800-38, PKCS#1, PKCS #1, ISO/IEC 9796-2, CCIMB-2005-08-001, CCIMB-2005-08-002, CCIMB-2005-08-003, CCIMB-2005-08-004File metadata
Title | ST_D1049224_Public |
---|---|
Author | qnguyen |
Creation date | D:20080129094205+01'00' |
Modification date | D:20080129094205 |
Pages | 93 |
Creator | PDFCreator Version 0.9.3 |
Producer | GPL Ghostscript 8.54 |
Heuristics ?
Extracted SARs
ATE_COV.2, ADV_LLD.1, AVA_SOF.1, ADV_HLD.2, AGD_ADM.1, ADV_FSP.2, AVA_VLA.4, ALC_LCD.1, ATE_FUN.1, ALC_DVS.2, ATE_DPT.1, AVA_MSU.3, ADV_RCR.1, ALC_TAT.1, AGD_USR.1, ADV_SPM.1, ATE_IND.2, ADV_IMP.2Similar certificates
Name | Certificate ID | |
---|---|---|
MultiApp ID SSCD - MultiApp ID v1.0 and patch v3.1 embedded on Secure Microcontroller SLE66CX680PE-A13 | ANSSI-CC-2008/02 | Compare |
Scheme data ?
Product | Plateforme Java Card MultiApp ID -Microcontrôleur SLE66CX680PE-A13 masqué par le logiciel MultiApp ID v1.0 et correctif v3.1 | |
---|---|---|
Url | https://cyber.gouv.fr/produits-certifies/plateforme-java-card-multiapp-id-microcontroleur-sle66cx680pe-a13-masque-par-le | |
Description | Le produit évalué est la carte « plateforme Java Card MultiApp ID - Microcontrôleur SLE66CX680PE-A13 masqué par le logiciel MultiApp ID v1.0 et correctif v3.1 » développée par Gemalto SA et Infineon Technologies AG. Les principaux services de sécurité fournis par cette plateforme Java Card sont : - la gestion du cycle de vie de la carte et des applications ; - des services d'administrat | |
Sponsor | Gemalto SA | |
Developer | Gemalto SA, Infineon Technologies AG | |
Cert Id | ANSSI-CC-2008/01 | |
Level | EAL4+ | |
Enhanced | ||
Cert Id | ANSSI-CC-2008/01 | |
Certification Date | 13.02.2008 | |
Category | Cartes Ă puce | |
Cc Version | Critères Communs version 2.3 | |
Developer | Gemalto SA, Infineon Technologies AG | |
Sponsor | Gemalto SA | |
Evaluation Facility | Serma Technologies | |
Level | EAL4+ | |
Protection Profile | PP/0304 | |
Mutual Recognition | SOG-IS CCRA | |
Augmented | ADV_IMP.2, ALC_DVS.2, AVA_MSU.3, AVA_VLA.4 | |
Target Link | https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi-cible_2008-01en.pdf | |
Report Link | https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi_2008-01fr.pdf |
References ?
Updates ?
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'Plateforme Java Card MultiApp ID -Microcontrôleur SLE66CX680PE-A13 masqué par le logiciel MultiApp ID v1.0 et correctif v3.1', 'url': 'https://cyber.gouv.fr/produits-certifies/plateforme-java-card-multiapp-id-microcontroleur-sle66cx680pe-a13-masque-par-le', 'description': 'Le produit évalué est la carte « plateforme Java Card MultiApp ID - Microcontrôleur SLE66CX680PE-A13 masqué par le logiciel MultiApp ID v1.0 et correctif v3.1 » développée par Gemalto SA et Infineon Technologies AG. Les principaux services de sécurité fournis par cette plateforme Java Card sont : - la gestion du cycle de vie de la carte et des applications ; - des services d'administrat', 'sponsor': 'Gemalto SA', 'developer': 'Gemalto SA, Infineon Technologies AG', 'cert_id': 'ANSSI-CC-2008/01', 'level': 'EAL4+', 'enhanced': {'cert_id': 'ANSSI-CC-2008/01', 'certification_date': '2008-02-13', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 2.3', 'developer': 'Gemalto SA, Infineon Technologies AG', 'sponsor': 'Gemalto SA', 'evaluation_facility': 'Serma Technologies', 'level': 'EAL4+', 'protection_profile': 'PP/0304', 'mutual_recognition': 'SOG-IS CCRA', 'augmented': 'ADV_IMP.2, ALC_DVS.2, AVA_MSU.3, AVA_VLA.4', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi-cible_2008-01en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi_2008-01fr.pdf'}}
.
- The scheme_data property was set to
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '38f127e51ad939e80f518b62eae1488bd39d52fdf82636dc56d913328def1337', 'txt_hash': 'fd2916e931a0d63e5d0c41cf545a42295e1280c4917a97b7200bf0ab10fdc7e5'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'f178050ca1cb3088ae933520109cd9613d9e37f9e464d1ba52086787b98fc54b', 'txt_hash': '501a8c7eb338b9608806b99b3a5ffa8e18c0713403373e52577bf02bc3fa5f03'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 208518, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 15, '/CreationDate': "D:20080218175709+01'00'", '/Subject': 'Plateforme Java Card MultiApp ID - Microcontrôleur SLE66CX680PE-A13 masqué par le logiciel MultiApp ID v1.0 et correctif v3.1', '/Author': 'watanabe', '/Creator': 'Acrobat PDFMaker 7.0.7 pour Word', '/Keywords': 'CER/F/07.5', '/Producer': 'Acrobat Distiller 7.0.5 (Windows)', '/ModDate': "D:20080218175713+01'00'", '/Company': 'SGDN/DCSSI', '/Comments': 'Gemalto', '/Title': 'DCSSI-2008/01', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 622088, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 93, '/Producer': 'GPL Ghostscript 8.54', '/CreationDate': "D:20080129094205+01'00'", '/ModDate': 'D:20080129094205', '/Title': 'ST_D1049224_Public', '/Creator': 'PDFCreator Version 0.9.3', '/Author': 'qnguyen', '/Keywords': '', '/Subject': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{'FR': {'match_rules': ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur\\(s\\)(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables'], 'cert_id': 'Plateforme Java Card MultiApp ID - Microcontrôleur SLE66CX680PE-A13 masqué par le logiciel MultiApp ID v1.0 et correctif v3.1 Rapport de certification DCSSI-2008/01 Page 3 sur 15 DCSSI-2008/01', 'cert_item': 'Plateforme Java Card MultiApp ID - Microcontrôleur SLE66CX680PE-A13 masqué par le logiciel MultiApp ID v1.0 et correctif v3.1', 'cert_item_version': 'Version 1.0', 'ref_protection_profiles': 'PP/0304 JavaCard System Standard – JavaCard 2.1.1 configuration v1.0b', 'cc_version': 'Critères Communs version 2.3 conforme à la norme ISO 15408:2005', 'cc_security_level': 'EAL 4 augmenté ADV_IMP.2, ALC_DVS.2, AVA_MSU.3, AVA_VLA.4', 'developer': 'Gemalto SA 6 rue de la Verrerie, 92197 Meudon, France Infineon Technologies AG Security & Chipcard ICs P.O. Box 80 09 49, 81609 München, Allemagne Commanditaire Gemalto SA 6 rue de la Verrerie, 92197 Meudon, France', 'cert_lab': 'Serma Technologies 30 avenue Gustave Eiffel, 33608 Pessac, France Tél : +33 (0)5 57 26 08 75, mél : [email protected]'}}
. - The report_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0322': 1}, 'FR': {'DCSSI-2008/01': 16}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0002-2001': 1}}, 'cc_security_level': {'EAL': {'EAL 4': 2, 'EAL4': 3, 'EAL5': 1, 'EAL7': 1, 'EAL 1': 1, 'EAL 3': 1, 'EAL 5': 1, 'EAL 7': 1, 'EAL5+': 1}, 'ITSEC': {'ITSEC E6 et': 1}}, 'cc_sar': {'ACM': {'ACM_AUT': 1, 'ACM_CAP': 1, 'ACM_SCP': 1}, 'ADO': {'ADO_DEL': 1, 'ADO_IGS': 1}, 'ADV': {'ADV_IMP.2': 1, 'ADV_FSP': 1, 'ADV_HLD': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_LLD': 1, 'ADV_RCR': 1, 'ADV_SPM': 1}, 'AGD': {'AGD_ADM': 1, 'AGD_USR': 1}, 'ALC': {'ALC_DVS.2': 2, 'ALC_FLR': 2, 'ALC_DVS': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_MSU.3': 2, 'AVA_VLA.4': 2, 'AVA_CCA': 1, 'AVA_MSU': 1, 'AVA_SOF': 1, 'AVA_VLA': 1}}, 'cc_sfr': {}, 'cc_claims': {'OE': {'OE.DEVELOPMENT': 1, 'OE.APPLET': 1, 'OE.VERIFICATION': 1}}, 'vendor': {'Infineon': {'Infineon Technologies AG': 2}, 'Gemalto': {'Gemalto': 6}}, 'eval_facility': {'Serma': {'Serma Technologies': 1}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {'RSA': {'RSA2048': 2}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS 34': 2, 'AIS34': 1}, 'ISO': {'ISO/IEC 15408:2005': 1, 'ISO/IEC 18045:2005': 1}, 'CC': {'CCMB-2005-08-001': 1, 'CCMB-2005-08-002': 1, 'CCMB-2005-08-003': 1, 'CCMB-2005-08-004': 1}}, 'javacard_version': {'JavaCard': {'JavaCard 2.1.1': 3, 'Java Card 2.2.1': 1}}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {'NL': {'CC-1': 2, 'CC-2': 3, 'CC-3': 2}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4+': 7, 'EAL4': 4, 'EAL4 augmented': 3}}, 'cc_sar': {'ACM': {'ACM_AUT': 1, 'ACM_AUT.1': 9, 'ACM_CAP': 1, 'ACM_CAP.4': 19, 'ACM_SCP': 1, 'ACM_SCP.2': 5}, 'ADO': {'ADO_DEL': 1, 'ADO_DEL.2': 8, 'ADO_IGS': 1, 'ADO_IGS.1': 6}, 'ADV': {'ADV_IMP.2': 11, 'ADV_FSP': 1, 'ADV_FSP.2': 10, 'ADV_HLD': 1, 'ADV_HLD.2': 14, 'ADV_IMP': 1, 'ADV_LLD': 1, 'ADV_LLD.1': 15, 'ADV_RCR': 1, 'ADV_RCR.1': 5, 'ADV_SPM': 1, 'ADV_SPM.1': 9}, 'AGD': {'AGD_ADM': 1, 'AGD_ADM.1': 12, 'AGD_USR': 1, 'AGD_USR.1': 10}, 'ALC': {'ALC_DVS.2': 11, 'ALC_DVS': 1, 'ALC_LCD': 1, 'ALC_LCD.1': 7, 'ALC_TAT': 1, 'ALC_TAT.1': 8}, 'ATE': {'ATE_COV': 1, 'ATE_COV.2': 6, 'ATE_DPT': 1, 'ATE_DPT.1': 5, 'ATE_FUN': 1, 'ATE_FUN.1': 10, 'ATE_IND': 1, 'ATE_IND.2': 8}, 'AVA': {'AVA_VLA.4': 18, 'AVA_MSU.3': 17, 'AVA_MSU': 1, 'AVA_SOF': 7, 'AVA_SOF.1': 7, 'AVA_VLA': 1, 'AVA_VLA.3': 1}}, 'cc_sfr': {'FAU': {'FAU_ARP': 3, 'FAU_ARP.1': 1}, 'FCO': {'FCO_NRO': 3, 'FCO_NRO.2': 3}, 'FCS': {'FCS_COP.1': 6, 'FCS_CKM': 16, 'FCS_CKM.1': 3, 'FCS_CKM.2': 3, 'FCS_CKM.3': 3, 'FCS_CKM.4': 3, 'FCS_COP': 9}, 'FDP': {'FDP_ACC': 6, 'FDP_ACC.1': 1, 'FDP_ACF': 7, 'FDP_ACF.1': 14, 'FDP_ACC.2': 5, 'FDP_IFC': 6, 'FDP_IFC.1': 1, 'FDP_IFF': 8, 'FDP_IFF.1': 14, 'FDP_RIP': 16, 'FDP_RIP.1': 8, 'FDP_ROL': 2, 'FDP_ROL.1': 2, 'FDP_SDI.2': 3, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_ITC': 2, 'FDP_ITC.2': 5, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_IFC.2': 4, 'FDP_UIT': 2, 'FDP_UIT.1': 2, 'FDP_IFF.2': 7, 'FDP_IFF.2.2': 1, 'FDP_IFF.2.7': 2}, 'FIA': {'FIA_UID': 10, 'FIA_UID.1': 2, 'FIA_ATD': 2, 'FIA_ATD.1': 1, 'FIA_UID.2': 1, 'FIA_USB.1': 2, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1}, 'FMT': {'FMT_SMR': 23, 'FMT_MSA': 30, 'FMT_MSA.1': 10, 'FMT_MSA.3': 10, 'FMT_SMF': 3, 'FMT_SMF.1': 1, 'FMT_SMR.1': 5, 'FMT_MSA.2': 2, 'FMT_MTD': 2, 'FMT_MTD.1': 1, 'FMT_MTD.3': 2, 'FMT_MTD.3.1': 1, 'FMT_SMR.1.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1}, 'FPR': {'FPR_UNO.1': 3, 'FPR_UNO.1.1': 1}, 'FPT': {'FPT_RCV': 10, 'FPT_RVM': 3, 'FPT_RVM.1': 3, 'FPT_AMT': 2, 'FPT_AMT.1': 1, 'FPT_FLS': 12, 'FPT_FLS.1': 5, 'FPT_PHP': 3, 'FPT_PHP.3': 1, 'FPT_SEP': 3, 'FPT_SEP.1': 3, 'FPT_RCV.4': 1, 'FPT_RCV.3': 4, 'FPT_TDC.1': 2, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 1, 'FPT_TST.1': 2, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1}, 'FRU': {'FRU_FLT': 3, 'FRU_FLT.1': 1, 'FRU_RSA': 4, 'FRU_RSA.1': 2}, 'FTP': {'FTP_ITC': 2, 'FTP_ITC.1': 3}}, 'cc_claims': {'D': {'D.APP_CODE': 2, 'D.APP_C_DATA': 2, 'D.APP_I_DATA': 2, 'D.PIN': 2, 'D.JCS_CODE': 2, 'D.JCS_DATA': 2, 'D.SEC_DATA': 2, 'D.API_DATA': 2, 'D.CRYPTO': 3}, 'O': {'O.DELETION': 1, 'O.OBJ-DELETION': 1, 'O.JAVAOBJECT': 38, 'O.APPLET': 16, 'O.CODE_PKG': 6, 'O.CODE_PCKG': 8}, 'T': {'T.PHYSICAL': 2, 'T.DELETION': 3, 'T.OBJ-DELETION': 3, 'T.CONFID-JCS-CODE': 2, 'T.CONFID-APPLI-DATA': 2, 'T.CONFID-JCS-DATA': 2, 'T.INTEG-APPLI-CODE': 4, 'T.INTEG-JCS-CODE': 2, 'T.INTEG-APPLI-DATA': 4, 'T.INTEG-JCS-DATA': 2, 'T.SID': 4, 'T.EXE-CODE': 4, 'T.NATIVE': 2, 'T.RESOURCES': 2, 'T.INSTALL': 2}, 'A': {'A.NATIVE': 2, 'A.DELETION': 1, 'A.VERIFICATION': 2, 'A.APPLET': 2}, 'R': {'R.JAVA': 17}, 'OT': {'OT.DELETION': 3, 'OT.SID': 2, 'OT.OPERATE': 2, 'OT.RESOURCES': 2, 'OT.FIREWALL': 2, 'OT.NATIVE': 5, 'OT.REALLOCATION': 2, 'OT.SHRD_VAR_CONFID': 2, 'OT.SHRD_VAR_INTEG': 2, 'OT.ALARM': 2, 'OT.TRANSACTION': 3, 'OT.KEY-MNGT': 6, 'OT.CIPHER': 3, 'OT.PIN-MNGT': 3, 'OT.INSTALL': 2, 'OT.LOAD': 2, 'OT.OBJ-DELETION': 2, 'OT.SCP': 7, 'OT.CARD-MANAGEMENT': 2}, 'OP': {'OP.ARRAY_ACCESS': 3, 'OP.INSTANCE_FIELD': 3, 'OP.INVK_VIRTUAL': 3, 'OP.INVK_INTERFACE': 4, 'OP.THROW': 3, 'OP.TYPE_ACCESS': 3, 'OP.JAVA': 4, 'OP.CREATE': 5, 'OP.PUT': 5, 'OP.DELETE_APPLET': 3, 'OP.DELETE_PCKG': 2, 'OP.DELETE_PCKG_APPLET': 2, 'OP.SEND': 1, 'OP.RECEIVE': 1, 'OP.BYTECODE': 1}, 'OE': {'OE.NATIVE': 1, 'OE.DEVELOPMENT': 2, 'OE.APPLET': 2, 'OE.VERIFICATION': 2}, 'OSP': {'OSP.NATIVE': 3, 'OSP.VERIFICATION': 2}}, 'vendor': {'Infineon': {'Infineon': 6}, 'Gemalto': {'Gemalto': 100}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}}, 'DES': {'DES': {'DES': 7}, '3DES': {'TDES': 10}}}, 'asymmetric_crypto': {'RSA': {'RSA2048': 1, 'RSA 1536': 1, 'RSA 1024': 1}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 2}}}, 'crypto_scheme': {'MAC': {'MAC': 1}}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'side channel': 1, 'timing attacks': 1}, 'FI': {'physical tampering': 2, 'malfunction': 1, 'DFA': 1, 'fault injection': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 46-3': 2, 'FIPS 197': 1, 'FIPS 180-2': 2}, 'NIST': {'SP 800-38': 1}, 'PKCS': {'PKCS#1': 3, 'PKCS #1': 1}, 'ISO': {'ISO/IEC 9796-2': 1}, 'CC': {'CCIMB-2005-08-001': 1, 'CCIMB-2005-08-002': 1, 'CCIMB-2005-08-003': 1, 'CCIMB-2005-08-004': 1}}, 'javacard_version': {'JavaCard': {'Java Card 2.1.1': 4}, 'GlobalPlatform': {'Global Platform 2.1.1': 1}}, 'javacard_api_const': {'misc': {'TYPE_ACCESS': 3}}, 'javacard_packages': {'javacard': {'javacard.security': 1, 'javacard.framework': 2}, 'javacardx': {'javacardx.crypto': 1}}, 'certification_process': {}}
. - The report_filename property was set to
dcssi-2008_01fr.pdf
. - The st_filename property was set to
dcssi-cible2008_01en.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['SERMA']
. - The cert_id property was set to
ANSSI-CC-2008/01
. - The report_references property was updated, with the
{'directly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2008/02', 'ANSSI-CC-2010/59']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2008/02', 'ANSSI-CC-2010/59']}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/dcssi-2008_01fr.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/dcssi-cible2008_01en.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
. - The report_references property was updated, with the
{'directly_referenced_by': None, 'indirectly_referenced_by': None}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}]}
values discarded.
- The new value is
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name MultiApp ID Java Card Platform - MultiApp ID v1.0 and patch v3.1 embedded on the secure Microcontroller SLE66CX680PE-A13 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "76e4088454d57adb",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2008/01",
"cert_lab": [
"SERMA"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_HLD",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_USR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_SOF",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VLA",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_LLD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_ADM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_MSU",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_RCR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"3.1",
"1.0"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2010/59",
"ANSSI-CC-2008/02"
]
},
"directly_referencing": null,
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2010/59",
"ANSSI-CC-2008/02"
]
},
"indirectly_referencing": null
},
"scheme_data": {
"cert_id": "ANSSI-CC-2008/01",
"description": "Le produit \u00e9valu\u00e9 est la carte \u00ab plateforme Java Card MultiApp ID - Microcontr\u00f4leur SLE66CX680PE-A13 masqu\u00e9 par le logiciel MultiApp ID v1.0 et correctif v3.1 \u00bb d\u00e9velopp\u00e9e par Gemalto SA et Infineon Technologies AG. Les principaux services de s\u00e9curit\u00e9 fournis par cette plateforme Java Card sont : - la gestion du cycle de vie de la carte et des applications ; - des services d\u0026#39;administrat",
"developer": "Gemalto SA, Infineon Technologies AG",
"enhanced": {
"augmented": "ADV_IMP.2, ALC_DVS.2, AVA_MSU.3, AVA_VLA.4",
"category": "Cartes \u00e0 puce",
"cc_version": "Crit\u00e8res Communs version 2.3",
"cert_id": "ANSSI-CC-2008/01",
"certification_date": "2008-02-13",
"developer": "Gemalto SA, Infineon Technologies AG",
"evaluation_facility": "Serma Technologies",
"level": "EAL4+",
"mutual_recognition": "SOG-IS CCRA",
"protection_profile": "PP/0304",
"report_link": "https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi_2008-01fr.pdf",
"sponsor": "Gemalto SA",
"target_link": "https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi-cible_2008-01en.pdf"
},
"level": "EAL4+",
"product": "Plateforme Java Card MultiApp ID -Microcontr\u00f4leur SLE66CX680PE-A13 masqu\u00e9 par le logiciel MultiApp ID v1.0 et correctif v3.1",
"sponsor": "Gemalto SA",
"url": "https://cyber.gouv.fr/produits-certifies/plateforme-java-card-multiapp-id-microcontroleur-sle66cx680pe-a13-masque-par-le"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Gemalto - Infineon Technologies AG",
"manufacturer_web": "https://www.gemalto.com/",
"name": "MultiApp ID Java Card Platform - MultiApp ID v1.0 and patch v3.1 embedded on the secure Microcontroller SLE66CX680PE-A13",
"not_valid_after": "2019-09-01",
"not_valid_before": "2008-02-13",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "dcssi-2008_01fr.pdf",
"report_frontpage": {
"FR": {
"cc_security_level": "EAL 4 augment\u00e9 ADV_IMP.2, ALC_DVS.2, AVA_MSU.3, AVA_VLA.4",
"cc_version": "Crit\u00e8res Communs version 2.3 conforme \u00e0 la norme ISO 15408:2005",
"cert_id": "Plateforme Java Card MultiApp ID - Microcontr\u00f4leur SLE66CX680PE-A13 masqu\u00e9 par le logiciel MultiApp ID v1.0 et correctif v3.1 Rapport de certification DCSSI-2008/01 Page 3 sur 15 DCSSI-2008/01",
"cert_item": "Plateforme Java Card MultiApp ID - Microcontr\u00f4leur SLE66CX680PE-A13 masqu\u00e9 par le logiciel MultiApp ID v1.0 et correctif v3.1",
"cert_item_version": "Version 1.0",
"cert_lab": "Serma Technologies 30 avenue Gustave Eiffel, 33608 Pessac, France T\u00e9l : +33 (0)5 57 26 08 75, m\u00e9l : [email protected]",
"developer": "Gemalto SA 6 rue de la Verrerie, 92197 Meudon, France Infineon Technologies AG Security \u0026 Chipcard ICs P.O. Box 80 09 49, 81609 M\u00fcnchen, Allemagne Commanditaire Gemalto SA 6 rue de la Verrerie, 92197 Meudon, France",
"match_rules": [
"R\u00e9f\u00e9rence du rapport de certification(.+)Nom du produit(.+)R\u00e9f\u00e9rence/version du produit(.+)Conformit\u00e9 \u00e0 un profil de protection(.+)Crit\u00e8res d\u2019\u00e9valuation et version(.+)Niveau d\u2019\u00e9valuation(.+)D\u00e9veloppeur\\(s\\)(.+)Centre d\u2019\u00e9valuation(.+)Accords de reconnaissance applicables"
],
"ref_protection_profiles": "PP/0304 JavaCard System Standard \u2013 JavaCard 2.1.1 configuration v1.0b"
}
},
"report_keywords": {
"asymmetric_crypto": {
"RSA": {
"RSA2048": 2
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0322": 1
},
"FR": {
"DCSSI-2008/01": 16
}
},
"cc_claims": {
"OE": {
"OE.APPLET": 1,
"OE.DEVELOPMENT": 1,
"OE.VERIFICATION": 1
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0002-2001": 1
}
},
"cc_sar": {
"ACM": {
"ACM_AUT": 1,
"ACM_CAP": 1,
"ACM_SCP": 1
},
"ADO": {
"ADO_DEL": 1,
"ADO_IGS": 1
},
"ADV": {
"ADV_FSP": 1,
"ADV_HLD": 1,
"ADV_IMP": 1,
"ADV_IMP.2": 1,
"ADV_INT": 1,
"ADV_LLD": 1,
"ADV_RCR": 1,
"ADV_SPM": 1
},
"AGD": {
"AGD_ADM": 1,
"AGD_USR": 1
},
"ALC": {
"ALC_DVS": 1,
"ALC_DVS.2": 2,
"ALC_FLR": 2,
"ALC_TAT": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_DPT": 1,
"ATE_FUN": 1,
"ATE_IND": 1
},
"AVA": {
"AVA_CCA": 1,
"AVA_MSU": 1,
"AVA_MSU.3": 2,
"AVA_SOF": 1,
"AVA_VLA": 1,
"AVA_VLA.4": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 3": 1,
"EAL 4": 2,
"EAL 5": 1,
"EAL 7": 1,
"EAL4": 3,
"EAL5": 1,
"EAL5+": 1,
"EAL7": 1
},
"ITSEC": {
"ITSEC E6 et": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Serma": {
"Serma Technologies": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {
"JavaCard": {
"Java Card 2.2.1": 1,
"JavaCard 2.1.1": 3
}
},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"BSI": {
"AIS 34": 2,
"AIS34": 1
},
"CC": {
"CCMB-2005-08-001": 1,
"CCMB-2005-08-002": 1,
"CCMB-2005-08-003": 1,
"CCMB-2005-08-004": 1
},
"ISO": {
"ISO/IEC 15408:2005": 1,
"ISO/IEC 18045:2005": 1
}
},
"symmetric_crypto": {
"DES": {
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Gemalto": {
"Gemalto": 6
},
"Infineon": {
"Infineon Technologies AG": 2
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "watanabe",
"/Comments": "Gemalto",
"/Company": "SGDN/DCSSI",
"/CreationDate": "D:20080218175709+01\u002700\u0027",
"/Creator": "Acrobat PDFMaker 7.0.7 pour Word",
"/Keywords": "CER/F/07.5",
"/ModDate": "D:20080218175713+01\u002700\u0027",
"/Producer": "Acrobat Distiller 7.0.5 (Windows)",
"/Subject": "Plateforme Java Card MultiApp ID - Microcontr\u00f4leur SLE66CX680PE-A13 masqu\u00e9 par le logiciel MultiApp ID v1.0 et correctif v3.1",
"/Title": "DCSSI-2008/01",
"pdf_file_size_bytes": 208518,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 15
},
"st_filename": "dcssi-cible2008_01en.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"RSA": {
"RSA 1024": 1,
"RSA 1536": 1,
"RSA2048": 1
}
},
"cc_cert_id": {
"NL": {
"CC-1": 2,
"CC-2": 3,
"CC-3": 2
}
},
"cc_claims": {
"A": {
"A.APPLET": 2,
"A.DELETION": 1,
"A.NATIVE": 2,
"A.VERIFICATION": 2
},
"D": {
"D.API_DATA": 2,
"D.APP_CODE": 2,
"D.APP_C_DATA": 2,
"D.APP_I_DATA": 2,
"D.CRYPTO": 3,
"D.JCS_CODE": 2,
"D.JCS_DATA": 2,
"D.PIN": 2,
"D.SEC_DATA": 2
},
"O": {
"O.APPLET": 16,
"O.CODE_PCKG": 8,
"O.CODE_PKG": 6,
"O.DELETION": 1,
"O.JAVAOBJECT": 38,
"O.OBJ-DELETION": 1
},
"OE": {
"OE.APPLET": 2,
"OE.DEVELOPMENT": 2,
"OE.NATIVE": 1,
"OE.VERIFICATION": 2
},
"OP": {
"OP.ARRAY_ACCESS": 3,
"OP.BYTECODE": 1,
"OP.CREATE": 5,
"OP.DELETE_APPLET": 3,
"OP.DELETE_PCKG": 2,
"OP.DELETE_PCKG_APPLET": 2,
"OP.INSTANCE_FIELD": 3,
"OP.INVK_INTERFACE": 4,
"OP.INVK_VIRTUAL": 3,
"OP.JAVA": 4,
"OP.PUT": 5,
"OP.RECEIVE": 1,
"OP.SEND": 1,
"OP.THROW": 3,
"OP.TYPE_ACCESS": 3
},
"OSP": {
"OSP.NATIVE": 3,
"OSP.VERIFICATION": 2
},
"OT": {
"OT.ALARM": 2,
"OT.CARD-MANAGEMENT": 2,
"OT.CIPHER": 3,
"OT.DELETION": 3,
"OT.FIREWALL": 2,
"OT.INSTALL": 2,
"OT.KEY-MNGT": 6,
"OT.LOAD": 2,
"OT.NATIVE": 5,
"OT.OBJ-DELETION": 2,
"OT.OPERATE": 2,
"OT.PIN-MNGT": 3,
"OT.REALLOCATION": 2,
"OT.RESOURCES": 2,
"OT.SCP": 7,
"OT.SHRD_VAR_CONFID": 2,
"OT.SHRD_VAR_INTEG": 2,
"OT.SID": 2,
"OT.TRANSACTION": 3
},
"R": {
"R.JAVA": 17
},
"T": {
"T.CONFID-APPLI-DATA": 2,
"T.CONFID-JCS-CODE": 2,
"T.CONFID-JCS-DATA": 2,
"T.DELETION": 3,
"T.EXE-CODE": 4,
"T.INSTALL": 2,
"T.INTEG-APPLI-CODE": 4,
"T.INTEG-APPLI-DATA": 4,
"T.INTEG-JCS-CODE": 2,
"T.INTEG-JCS-DATA": 2,
"T.NATIVE": 2,
"T.OBJ-DELETION": 3,
"T.PHYSICAL": 2,
"T.RESOURCES": 2,
"T.SID": 4
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ACM": {
"ACM_AUT": 1,
"ACM_AUT.1": 9,
"ACM_CAP": 1,
"ACM_CAP.4": 19,
"ACM_SCP": 1,
"ACM_SCP.2": 5
},
"ADO": {
"ADO_DEL": 1,
"ADO_DEL.2": 8,
"ADO_IGS": 1,
"ADO_IGS.1": 6
},
"ADV": {
"ADV_FSP": 1,
"ADV_FSP.2": 10,
"ADV_HLD": 1,
"ADV_HLD.2": 14,
"ADV_IMP": 1,
"ADV_IMP.2": 11,
"ADV_LLD": 1,
"ADV_LLD.1": 15,
"ADV_RCR": 1,
"ADV_RCR.1": 5,
"ADV_SPM": 1,
"ADV_SPM.1": 9
},
"AGD": {
"AGD_ADM": 1,
"AGD_ADM.1": 12,
"AGD_USR": 1,
"AGD_USR.1": 10
},
"ALC": {
"ALC_DVS": 1,
"ALC_DVS.2": 11,
"ALC_LCD": 1,
"ALC_LCD.1": 7,
"ALC_TAT": 1,
"ALC_TAT.1": 8
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.2": 6,
"ATE_DPT": 1,
"ATE_DPT.1": 5,
"ATE_FUN": 1,
"ATE_FUN.1": 10,
"ATE_IND": 1,
"ATE_IND.2": 8
},
"AVA": {
"AVA_MSU": 1,
"AVA_MSU.3": 17,
"AVA_SOF": 7,
"AVA_SOF.1": 7,
"AVA_VLA": 1,
"AVA_VLA.3": 1,
"AVA_VLA.4": 18
}
},
"cc_security_level": {
"EAL": {
"EAL4": 4,
"EAL4 augmented": 3,
"EAL4+": 7
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP": 3,
"FAU_ARP.1": 1
},
"FCO": {
"FCO_NRO": 3,
"FCO_NRO.2": 3
},
"FCS": {
"FCS_CKM": 16,
"FCS_CKM.1": 3,
"FCS_CKM.2": 3,
"FCS_CKM.3": 3,
"FCS_CKM.4": 3,
"FCS_COP": 9,
"FCS_COP.1": 6
},
"FDP": {
"FDP_ACC": 6,
"FDP_ACC.1": 1,
"FDP_ACC.2": 5,
"FDP_ACF": 7,
"FDP_ACF.1": 14,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_IFC": 6,
"FDP_IFC.1": 1,
"FDP_IFC.2": 4,
"FDP_IFF": 8,
"FDP_IFF.1": 14,
"FDP_IFF.2": 7,
"FDP_IFF.2.2": 1,
"FDP_IFF.2.7": 2,
"FDP_ITC": 2,
"FDP_ITC.2": 5,
"FDP_RIP": 16,
"FDP_RIP.1": 8,
"FDP_ROL": 2,
"FDP_ROL.1": 2,
"FDP_SDI.2": 3,
"FDP_SDI.2.1": 1,
"FDP_SDI.2.2": 1,
"FDP_UIT": 2,
"FDP_UIT.1": 2
},
"FIA": {
"FIA_ATD": 2,
"FIA_ATD.1": 1,
"FIA_UID": 10,
"FIA_UID.1": 2,
"FIA_UID.2": 1,
"FIA_USB.1": 2,
"FIA_USB.1.1": 1,
"FIA_USB.1.2": 1,
"FIA_USB.1.3": 1
},
"FMT": {
"FMT_MSA": 30,
"FMT_MSA.1": 10,
"FMT_MSA.2": 2,
"FMT_MSA.3": 10,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD": 2,
"FMT_MTD.1": 1,
"FMT_MTD.3": 2,
"FMT_MTD.3.1": 1,
"FMT_SMF": 3,
"FMT_SMF.1": 1,
"FMT_SMR": 23,
"FMT_SMR.1": 5,
"FMT_SMR.1.1": 1
},
"FPR": {
"FPR_UNO.1": 3,
"FPR_UNO.1.1": 1
},
"FPT": {
"FPT_AMT": 2,
"FPT_AMT.1": 1,
"FPT_FLS": 12,
"FPT_FLS.1": 5,
"FPT_PHP": 3,
"FPT_PHP.3": 1,
"FPT_RCV": 10,
"FPT_RCV.3": 4,
"FPT_RCV.4": 1,
"FPT_RVM": 3,
"FPT_RVM.1": 3,
"FPT_SEP": 3,
"FPT_SEP.1": 3,
"FPT_TDC.1": 2,
"FPT_TDC.1.1": 1,
"FPT_TDC.1.2": 1,
"FPT_TST.1": 2,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FRU": {
"FRU_FLT": 3,
"FRU_FLT.1": 1,
"FRU_RSA": 4,
"FRU_RSA.1": 2
},
"FTP": {
"FTP_ITC": 2,
"FTP_ITC.1": 3
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {
"misc": {
"TYPE_ACCESS": 3
}
},
"javacard_packages": {
"javacard": {
"javacard.framework": 2,
"javacard.security": 1
},
"javacardx": {
"javacardx.crypto": 1
}
},
"javacard_version": {
"GlobalPlatform": {
"Global Platform 2.1.1": 1
},
"JavaCard": {
"Java Card 2.1.1": 4
}
},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"DFA": 1,
"fault injection": 1,
"malfunction": 1,
"physical tampering": 2
},
"SCA": {
"side channel": 1,
"timing attacks": 1
}
},
"standard_id": {
"CC": {
"CCIMB-2005-08-001": 1,
"CCIMB-2005-08-002": 1,
"CCIMB-2005-08-003": 1,
"CCIMB-2005-08-004": 1
},
"FIPS": {
"FIPS 180-2": 2,
"FIPS 197": 1,
"FIPS 46-3": 2
},
"ISO": {
"ISO/IEC 9796-2": 1
},
"NIST": {
"SP 800-38": 1
},
"PKCS": {
"PKCS #1": 1,
"PKCS#1": 3
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 1
}
},
"DES": {
"3DES": {
"TDES": 10
},
"DES": {
"DES": 7
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Gemalto": {
"Gemalto": 100
},
"Infineon": {
"Infineon": 6
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "qnguyen",
"/CreationDate": "D:20080129094205+01\u002700\u0027",
"/Creator": "PDFCreator Version 0.9.3",
"/Keywords": "",
"/ModDate": "D:20080129094205",
"/Producer": "GPL Ghostscript 8.54",
"/Subject": "",
"/Title": "ST_D1049224_Public",
"pdf_file_size_bytes": 622088,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 93
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/dcssi-2008_01fr.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"AVA_VLA.4",
"ADV_IMP.2",
"ALC_DVS.2",
"AVA_MSU.3",
"EAL4+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/dcssi-cible2008_01en.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "38f127e51ad939e80f518b62eae1488bd39d52fdf82636dc56d913328def1337",
"txt_hash": "fd2916e931a0d63e5d0c41cf545a42295e1280c4917a97b7200bf0ab10fdc7e5"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "f178050ca1cb3088ae933520109cd9613d9e37f9e464d1ba52086787b98fc54b",
"txt_hash": "501a8c7eb338b9608806b99b3a5ffa8e18c0713403373e52577bf02bc3fa5f03"
}
},
"status": "archived"
}