NFC FlyBuy on S3FS91J
CSV information ?
Status | archived |
---|---|
Valid from | 12.07.2011 |
Valid until | 01.09.2019 |
Scheme | 🇫🇷 FR |
Manufacturer | Oberthur Technologies |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | AVA_VAN.5, ALC_DVS.2, EAL4+ |
Maintenance updates | Rapport de maintenance ANSSI-CC-2011/24-M01 (24.10.2012) Certification report |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Symmetric Algorithms
DES, Triple-DESHash functions
SHA-1Block cipher modes
ECB, CBCJavaCard versions
Java Card 3.0.1Vendor
Samsung, Oberthur Technologies, OberthurSecurity level
EAL 4, EAL4, EAL5, EAL7, EAL 1, EAL 3, EAL 5, EAL 7, ITSEC E6 ElevéSecurity Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSSProtection profiles
BSI-PP-0035, BSI-PP- 0035, BSI-PP-0035-2007Certificates
ANSSI-CC-2011/24, ANSSI-CC-2009/57Evaluation facilities
THALES - CEACIStandards
SCP 80, CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004File metadata
Creation date | D:20110713100055+02'00' |
---|---|
Modification date | D:20110713100055+02'00' |
Pages | 21 |
Producer | Acrobat Distiller 8.1.0 (Windows) |
Frontpage
Certificate ID | ANSSI-CC-2011/24 |
---|---|
Certified item | NFC FlyBuy sur S3FS91J |
Certification lab | THALES - CEACI (T3S – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France Tél : +33 (0)5 62 88 28 01 ou 18, mél : [email protected] |
Developer | Oberthur Technologies 71-73 chemin des Hautes Pâtures, 92 726 NANTERRE CEDEX, France Samsung Electronics Co. Ltd San#24 Nongseo-Ri, Giheung-Eup, Yongin-City, Gyeonggi-Do, 449-711, République de Corée Commanditaire Oberthur Technologies 71-73 chemin des Hautes Pâtures, 92 726 NANTERRE CEDEX, France |
References
Outgoing- ANSSI-CC-2009/57 - archived - SAMSUNG Microcontroller RISC 32-bits S3FS91J / S3FS91H / S3FS91V / S3FS93I with SWP, Rev. 7
- ANSSI-CC-2012/39 - archived - NFC FLYBUY PLATINUM V2 sur composant ST33F1ME
- ANSSI-CC-2012/06 - archived - NFC FLYBUY PLATINUM sur ST33F1ME
Security target ?
Extracted keywords
Symmetric Algorithms
AES, DES, TDESAsymmetric Algorithms
RSA 2048, Diffie-HellmanHash functions
SHA-1, SHA256, SHA384, SHA512, SHA-224, SHA-256, SHA-384, SHA-512Schemes
MACRandomness
RNGBlock cipher modes
CBCJavaCard versions
GlobalPlatform 2.1.1JavaCard API constants
TYPE_ACCESSVendor
Samsung, Oberthur Technologies, Oberthur, OBERTHURSecurity level
EAL4, EAL4+, EAL 4, EAL4 augmented, EAL 4 augmentedClaims
D.APSD_KEYS, D.CASD_KEYS, D.ISD_KEYS, D.VASD_KEYS, D.GP_CODE, D.CARD_MNGT_DATA, D.APP_CODE, D.APP_C_DATA, D.APP_I_DATA, D.PIN, D.API_DATA, D.CRYPTO, D.JCS_CODE, D.JCS_DATA, D.SEC_DATA, O.CARD-, O.SCP, O.CARD-MANAGEMENT, O.DOMAIN-RIGHTS, O.APPLI-AUTH, O.COMM_AUTH, O.COMM_INTEGRITY, O.COMM_CONFIDENTIALITY, O.SID, O.FIREWALL, O.GLOBAL_ARRAYS_CONFID, O.GLOBAL_ARRAYS_INTEG, O.NATIVE, O.OPERATE, O.REALLOCATION, O.RESOURCES, O.ALARM, O.CIPHER, O.KEY-MNGT, O.PIN-MNGT, O.TRANSACTION, O.REMOTE, O.OBJ-DELETION, O.DELETION, O.LOAD, O.INSTALL, O.SCPP, O.SCP-IC, O.SCP-SUPPORT, O.DOMAIN-, O.KEY-, O.COMM_CONFIDENTIALI, O.GLOBAL_ARRAYS_CON, O.GLOBAL_ARRAYS_INTE, O.APPLET, O.CODE_PKG, O.JAVAOBJECT, O.REMOTE_MTH, O.REMOTE_OBJ, O.RMI_SERVICE, O.ROR, O.REMOTE_MTHD, O.GLOBAL_ARRAYS_CONFI, O.PIN-, O.OBJ-, T.PHYSICAL, T.INTEG-USER-DATA, T.COM_EXPLOIT, T.UNAUTHORIZED_CARD_MNGT, T.LIFE_CYCLE, T.UNAUTHORIZED_ACCESS, T.CONFID-APPLI-DATA, T.CONFID-JCS-CODE, T.CONFID-JCS-DATA, T.INTEG-APPLI-CODE, T.INTEG-APPLI-DATA, T.INTEG-JCS-CODE, T.INTEG-JCS-DATA, T.SID, T.EXE-CODE, T.NATIVE, T.EXE-CODE-REMOTE, T.RESOURCES, T.OBJ-DELETION, T.INSTALL, T.DELETION, T.UNAUTHORIZED_CARD_MNG, T.CONFID-JCS-, T.INTEG-, T.EXE-, T.INTEG-APPLI-, A.MOBILE-OPERATOR, A.OTA-ADMIN, A.APPS-PROVIDER, A.VERIFICATION-AUTHORITY, A.KEY-ESCROW, A.CONTROLLING-AUTHORITY, A.APPLET, A.VERIFICATION, A.VERIFICATION-, A.CONTROLLING-, R.JAVA, OP.SEND, OP.RECEIVE, OP.ARRAY_ACCESS, OP.CREATE, OP.DELETE_APPLET, OP.DELETE_PCKG, OP.DELETE_PCKG_APPLET, OP.GET_ROR, OP.INSTANCE_FIELD, OP.INVK_VIRTUAL, OP.INVK_INTERFACE, OP.INVOKE, OP.JAVA, OP.THROW, OP.TYPE_ACCESS, OP.PUT, OP.RET_RORD, OE.SCP, OE.PRODUCTION, OE.PERSONALIZER, OE.KEY-CHANGE, OE.MOBILE-OPERATOR, OE.OTA-ADMIN, OE.APPS-PROVIDER, OE.VERIFICATION-AUTHORITY, OE.KEY-ESCROW, OE.CONTROLLING-AUTHORITY, OE.SECURE-APPS-CERTIFICATION, OE.BASIC-APPS-VALIDATION, OE.AID-MANAGEMENT, OE.OTA-LOADING, OE.OTA-SERVERS, OE.AP-KEYS, OE.OPERATOR-KEYS, OE.KEY-GENERATION, OE.CA-KEYS, OE.VA-KEYS, OE.SECURITY-DOMAINS, OE.QUOTAS, OE.SHARE-CONTROL, OE.APPLET, OE.VERIFICATION, OE.VERIFICATION-, OE.CONTROLLING-, OE.SECURE-APPS-, OE.BASIC-APPS-, OSP.SECURE-APPS-CERTIFICATION, OSP.BASIC-APPS-VALIDATION, OSP.SHARE-CONTROL, OSP.AID-MANAGEMENT, OSP.OTA-LOADING, OSP.OTA-SERVERS, OSP.APSD-KEYS, OSP.OPERATOR-KEYS, OSP.KEY-GENERATION, OSP.CASD-KEYS, OSP.VASD-KEYS, OSP.KEY-CHANGE, OSP.SECURITY-DOMAINS, OSP.QUOTAS, OSP.VERIFICATION, OSP.SECURE-APPS-Security Assurance Requirements (SAR)
ADV_ARC, ADV_ARC.1, ADV_FSP, ADV_FSP.4, ADV_IMP, ADV_IMP.1, ADV_TDS, ADV_TDS.3, ADV_FSP.1, ADV_TDS.1, ADV_FSP.2, ADV_TDS.2, ADV_IMP.2, AGD_PRE.1, AGD_PRE, AGD_OPE, AGD_ADM, AGD_USR, AGD_OPE.1, ALC_DVS, ALC_DVS.2, ALC_CMC, ALC_CMC.4, ALC_CMS, ALC_CMS.4, ALC_DEL, ALC_DEL.1, ALC_LCD, ALC_LCD.1, ALC_TAT, ALC_TAT.1, ALC_CMS.1, ALC_DVS.1, ATE_COV, ATE_COV.2, ATE_DPT, ATE_DPT.1, ATE_FUN, ATE_FUN.1, ATE_IND, ATE_IND.2, ATE_COV.1, AVA_VAN.5, AVA_VAN, ASE_CCL, ASE_CCL.1, ASE_ECD, ASE_ECD.1, ASE_INT, ASE_INT.1, ASE_OBJ, ASE_OBJ.2, ASE_REQ, ASE_REQ.2, ASE_SPD, ASE_SPD.1, ASE_APD.1, ASE_TSS, ASE_TSS.1, ASE_REQ.1Security Functional Requirements (SFR)
FAU_ARP.1, FAU_ARP.1.1, FAU_SAA.1, FCO_NRO, FCO_NRO.2, FCS_RNG, FCS_RNG.1, FCS_COP, FCS_COP.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM.1, FCS_CKM.1.1, FCS_CKM.2, FCS_CKM.2.1, FCS_CKM.3, FCS_CKM.3.1, FCS_CKM.4, FCS_CKM.4.1, FCS_COP.1.1, FDP_UIT, FDP_UIT.1, FDP_ROL, FDP_ROL.1, FDP_ITC, FDP_ITC.2, FDP_ACF, FDP_ACF.1, FDP_ACC, FDP_ACC.1, FDP_IFC, FDP_IFC.2, FDP_IFF, FDP_IFF.1, FDP_IFF.1.4, FDP_IFF.1.2, FDP_ACC.2, FDP_IFC.1, FDP_RIP, FDP_RIP.1, FDP_SDI.2, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ITC.1, FIA_AFL, FIA_UAU, FIA_UID, FIA_UID.1, FIA_UAU.1, FIA_UAU.4, FIA_AFL.1, FIA_UAU.7, FIA_ATD, FIA_ATD.1, FIA_UID.2, FIA_USB, FIA_USB.1, FMT_MSA, FMT_MSA.1, FMT_SMF.1, FMT_SMR, FMT_SMR.1, FMT_MSA.3, FMT_MSA.3.1, FMT_SMF, FMT_MSA.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD, FMT_MTD.1, FMT_MTD.3, FMT_REV.1, FMT_REV, FPR_UNO, FPR_UNO.1, FPR_UNO.1.1, FPT_TDC, FPT_FLS, FPT_PHP, FPT_RCV, FPT_FLS.1, FPT_TDC.1, FPT_FLS.1.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_RCV.3, FPT_PHP.3, FPT_RCV.4, FPT_TST.1, FRU_FLT, FRU_FLT.1, FTP_ITC, FTP_ITC.1, FTP_TRP.1Protection profiles
BSI-PP-0035, ANSSI-CC-PP 2010/04Certificates
ANSSI-CC-PP 2010/04, ANSSI-CC-2009/57Side-channel analysis
physical probing, DPA, physical tampering, malfunctionCertification process
out of scope, a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT areStandards
FIPS PUB 46-3, FIPS PUB 81, FIPS PUB 180-3, FIPS PUB 186-3, FIPS PUB 197, FIPS 186-3, FIPS 140-2, PKCS#1, SCP02, SCP80, SCP 80File metadata
Creation date | D:20110713095952+02'00' |
---|---|
Modification date | D:20110713095952+02'00' |
Pages | 191 |
Producer | GPL Ghostscript 8.61 |
References
Outgoing- ANSSI-CC-2009/57 - archived - SAMSUNG Microcontroller RISC 32-bits S3FS91J / S3FS91H / S3FS91V / S3FS93I with SWP, Rev. 7
Heuristics ?
Extracted SARs
ADV_ARC.1, ADV_FSP.4, ADV_IMP.2, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.1, ASE_APD.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.5Scheme data ?
Product | NFC FlyBuy sur S3FS91J | |
---|---|---|
Url | https://cyber.gouv.fr/produits-certifies/nfc-flybuy-sur-s3fs91j | |
Description | Le produit certifié est la plateforme (U)SIM Java Card « NFC FlyBuy sur S3FS91J », dont la version du système d'exploitation natif est 075895 et la version du Card Manager1 en Java Card est GOP Ref V1.5.o. Cette plateforme est développée par Oberthur Technologies et Samsung Electronics Co. Ltd. Le produit est une plateforme (U)SIM Java Card ouverte pouvant être insérée dans un téléphone por | |
Sponsor | Oberthur Technologies | |
Developer | Oberthur Technologies et Samsung Electronics Co. Ltd | |
Cert Id | ANSSI-CC-2011/24 | |
Level | EAL4+ | |
Enhanced | ||
Cert Id | ANSSI-CC-2011/24 | |
Certification Date | 12.07.2011 | |
Category | Cartes Ă puce | |
Cc Version | Critères Communs version 3.1r3 | |
Developer | Oberthur Technologies et Samsung Electronics Co. Ltd | |
Sponsor | Oberthur Technologies | |
Evaluation Facility | THALES - CEACI (T3S – CNES) | |
Level | EAL4+ | |
Protection Profile | ANSSI-CC-PP-2010/04 | |
Mutual Recognition | SOG-IS CCRA | |
Augmented | ALC_DVS.2, AVA_VAN.5 | |
Target Link | https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2011-24en.pdf | |
Report Link | https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2011-24fr.pdf |
References ?
Updates ?
-
16.12.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'NFC FlyBuy sur S3FS91J', 'url': 'https://cyber.gouv.fr/produits-certifies/nfc-flybuy-sur-s3fs91j', 'description': 'Le produit certifié est la plateforme (U)SIM Java Card « NFC FlyBuy sur S3FS91J », dont la version du système d'exploitation natif est 075895 et la version du Card Manager1 en Java Card est GOP Ref V1.5.o. Cette plateforme est développée par Oberthur Technologies et Samsung Electronics Co. Ltd. Le produit est une plateforme (U)SIM Java Card ouverte pouvant être insérée dans un téléphone por', 'sponsor': 'Oberthur Technologies', 'developer': 'Oberthur Technologies et Samsung Electronics Co. Ltd', 'cert_id': 'ANSSI-CC-2011/24', 'level': 'EAL4+', 'enhanced': {'cert_id': 'ANSSI-CC-2011/24', 'certification_date': '2011-07-12', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 3.1r3', 'developer': 'Oberthur Technologies et Samsung Electronics Co. Ltd', 'sponsor': 'Oberthur Technologies', 'evaluation_facility': 'THALES - CEACI (T3S – CNES)', 'level': 'EAL4+', 'protection_profile': 'ANSSI-CC-PP-2010/04', 'mutual_recognition': 'SOG-IS CCRA', 'augmented': 'ALC_DVS.2, AVA_VAN.5', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2011-24en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2011-24fr.pdf'}}
.
- The scheme_data property was set to
-
09.12.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': [], 'next_certificates': []}
.
- The following values were inserted:
-
09.11.2024 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The st_keywords property was updated, with the
{'cc_cert_id': {'__update__': {'FR': {'__insert__': {'ANSSI-CC-PP 2010/04': 1}}}}}
data.
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'description': 'Le produit certifié est la plateforme (U)SIM Java Card « NFC FlyBuy sur S3FS91J », dont la version du système d'exploitation natif est 075895 et la version du Card Manager1 en Java Card est GOP Ref V1.5.o. Cette plateforme est développée par Oberthur Technologies et Samsung Electronics Co. Ltd. Le produit est une plateforme (U)SIM Java Card ouverte pouvant être insérée dans un téléphone por', 'cert_id': 'ANSSI-CC-2011/24', 'enhanced': {'__update__': {'cert_id': 'ANSSI-CC-2011/24', 'certification_date': '2011-07-12', 'mutual_recognition': 'SOG-IS CCRA'}}}
data.
- The st_keywords property was updated, with the
-
14.10.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'NFC FlyBuy sur S3FS91J', 'url': 'https://cyber.gouv.fr/produits-certifies/nfc-flybuy-sur-s3fs91j', 'description': 'Le produit certifié est la plateforme (U)SIM Java Card « NFC FlyBuy sur S3FS91J », dont la version du système d'exploitation natif est 075895 et la version du Card Manager1 en Java Card est GOP Ref V1.5.o. Cette plateforme est développée par Oberthur Technologies et Samsung Electronics Co. Ltd.\n\nLe produit est une plateforme (U)SIM Java Card ouverte pouvant être insérée dans un téléphone por', 'sponsor': 'Oberthur Technologies', 'developer': 'Oberthur Technologies et Samsung Electronics Co. Ltd', 'cert_id': '2011/24', 'level': 'EAL4+', 'enhanced': {'cert_id': '2011/24', 'certification_date': '12/07/2011', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 3.1r3', 'developer': 'Oberthur Technologies et Samsung Electronics Co. Ltd', 'sponsor': 'Oberthur Technologies', 'evaluation_facility': 'THALES - CEACI (T3S – CNES)', 'level': 'EAL4+', 'protection_profile': 'ANSSI-CC-PP-2010/04', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ALC_DVS.2, AVA_VAN.5', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2011-24en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2011-24fr.pdf'}}
.
- The scheme_data property was set to
-
02.09.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'f56348cd6c69307c10472582eb65da6b272390409085ececec8d1c99b27b41dd', 'txt_hash': '329fccce4a1cb1dd67e78e9cd7c630b819693a0689ddd3798a9b3e4144bf6983'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'bcf661a98f7f4f61d5d6cf60effa75e2b465149839a0af9f02d27aa7ad3f4ec9', 'txt_hash': '06acc16a060d7fea219e6d2c0ab8d1e5892368506d624f3d469e68696620c977'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 544621, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 21, '/CreationDate': "D:20110713100055+02'00'", '/Keywords': '', '/ModDate': "D:20110713100055+02'00'", '/Producer': 'Acrobat Distiller 8.1.0 (Windows)', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 1275792, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 191, '/CreationDate': "D:20110713095952+02'00'", '/Keywords': '', '/ModDate': "D:20110713095952+02'00'", '/Producer': 'GPL Ghostscript 8.61', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{'FR': {'match_rules': ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur\\(s\\)(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables'], 'cert_id': 'ANSSI-CC-2011/24', 'cert_item': 'NFC FlyBuy sur S3FS91J', 'cert_item_version': 'version du système d’exploitation en natif : 075895 version du Card Manager en Java Card : GOP Ref V1.5.o', 'ref_protection_profiles': 'PP (U)SIM], version 2.0.2, certifié par l’ANSSI (U)SIM Java Card Platform Protection Profile Basic and SCWS Configurations Evolutive Certification Scheme for (U)SIM cards', 'cc_version': 'Critères Communs version 3.1 révision 3', 'cc_security_level': 'EAL 4 augmenté ALC_DVS.2, AVA_VAN.5', 'developer': 'Oberthur Technologies 71-73 chemin des Hautes Pâtures, 92 726 NANTERRE CEDEX, France Samsung Electronics Co. Ltd San#24 Nongseo-Ri, Giheung-Eup, Yongin-City, Gyeonggi-Do, 449-711, République de Corée Commanditaire Oberthur Technologies 71-73 chemin des Hautes Pâtures, 92 726 NANTERRE CEDEX, France', 'cert_lab': 'THALES - CEACI (T3S – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France Tél : +33 (0)5 62 88 28 01 ou 18, mél : [email protected]'}}
. - The report_keywords property was set to
{'cc_cert_id': {'FR': {'ANSSI-CC-2011/24': 22, 'ANSSI-CC-2009/57': 4}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0035': 1, 'BSI-PP- 0035': 1, 'BSI-PP-0035-2007': 1}}, 'cc_security_level': {'EAL': {'EAL 4': 2, 'EAL4': 2, 'EAL5': 1, 'EAL7': 1, 'EAL 1': 1, 'EAL 3': 1, 'EAL 5': 1, 'EAL 7': 1}, 'ITSEC': {'ITSEC E6 Elevé': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 2}, 'ALC': {'ALC_DVS.2': 2, 'ALC_FLR': 2, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.5': 2, 'AVA_VAN': 2}, 'ASE': {'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Samsung': {'Samsung': 5}, 'Oberthur': {'Oberthur Technologies': 13, 'Oberthur': 6}}, 'eval_facility': {'Thales': {'THALES - CEACI': 1}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}, '3DES': {'Triple-DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {'ECB': {'ECB': 1}, 'CBC': {'CBC': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'SCP': {'SCP 80': 2}, 'CC': {'CCMB-2009-07-001': 1, 'CCMB-2009-07-002': 1, 'CCMB-2009-07-003': 1, 'CCMB-2009-07-004': 1}}, 'javacard_version': {'JavaCard': {'Java Card 3.0.1': 1}}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {'FR': {'ANSSI-CC-2009/57': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0035': 1}, 'ANSSI': {'ANSSI-CC-PP 2010/04': 1}}, 'cc_security_level': {'EAL': {'EAL4': 7, 'EAL4+': 3, 'EAL 4': 3, 'EAL4 augmented': 4, 'EAL 4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_ARC.1': 15, 'ADV_FSP': 1, 'ADV_FSP.4': 20, 'ADV_IMP': 1, 'ADV_IMP.1': 11, 'ADV_TDS': 1, 'ADV_TDS.3': 23, 'ADV_FSP.1': 3, 'ADV_TDS.1': 2, 'ADV_FSP.2': 2, 'ADV_TDS.2': 1, 'ADV_IMP.2': 1}, 'AGD': {'AGD_PRE.1': 12, 'AGD_PRE': 2, 'AGD_OPE': 3, 'AGD_ADM': 1, 'AGD_USR': 1, 'AGD_OPE.1': 19}, 'ALC': {'ALC_DVS': 8, 'ALC_DVS.2': 14, 'ALC_CMC': 1, 'ALC_CMC.4': 16, 'ALC_CMS': 1, 'ALC_CMS.4': 7, 'ALC_DEL': 1, 'ALC_DEL.1': 6, 'ALC_LCD': 1, 'ALC_LCD.1': 9, 'ALC_TAT': 1, 'ALC_TAT.1': 10, 'ALC_CMS.1': 1, 'ALC_DVS.1': 1}, 'ATE': {'ATE_COV': 1, 'ATE_COV.2': 8, 'ATE_DPT': 1, 'ATE_DPT.1': 7, 'ATE_FUN': 1, 'ATE_FUN.1': 14, 'ATE_IND': 1, 'ATE_IND.2': 7, 'ATE_COV.1': 2}, 'AVA': {'AVA_VAN.5': 17, 'AVA_VAN': 1}, 'ASE': {'ASE_CCL': 1, 'ASE_CCL.1': 15, 'ASE_ECD': 1, 'ASE_ECD.1': 14, 'ASE_INT': 1, 'ASE_INT.1': 17, 'ASE_OBJ': 1, 'ASE_OBJ.2': 13, 'ASE_REQ': 1, 'ASE_REQ.2': 15, 'ASE_SPD': 1, 'ASE_SPD.1': 8, 'ASE_APD.1': 1, 'ASE_TSS': 1, 'ASE_TSS.1': 6, 'ASE_REQ.1': 2}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 16, 'FAU_ARP.1.1': 1, 'FAU_SAA.1': 3}, 'FCO': {'FCO_NRO': 14, 'FCO_NRO.2': 6}, 'FCS': {'FCS_RNG': 9, 'FCS_RNG.1': 4, 'FCS_COP': 44, 'FCS_COP.1': 13, 'FCS_RNG.1.1': 1, 'FCS_RNG.1.2': 1, 'FCS_CKM.1': 19, 'FCS_CKM.1.1': 1, 'FCS_CKM.2': 8, 'FCS_CKM.2.1': 1, 'FCS_CKM.3': 6, 'FCS_CKM.3.1': 1, 'FCS_CKM.4': 26, 'FCS_CKM.4.1': 1, 'FCS_COP.1.1': 1}, 'FDP': {'FDP_UIT': 10, 'FDP_UIT.1': 4, 'FDP_ROL': 18, 'FDP_ROL.1': 7, 'FDP_ITC': 20, 'FDP_ITC.2': 22, 'FDP_ACF': 36, 'FDP_ACF.1': 24, 'FDP_ACC': 47, 'FDP_ACC.1': 20, 'FDP_IFC': 44, 'FDP_IFC.2': 4, 'FDP_IFF': 38, 'FDP_IFF.1': 26, 'FDP_IFF.1.4': 1, 'FDP_IFF.1.2': 1, 'FDP_ACC.2': 7, 'FDP_IFC.1': 23, 'FDP_RIP': 110, 'FDP_RIP.1': 10, 'FDP_SDI.2': 7, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_ITC.1': 8}, 'FIA': {'FIA_AFL': 6, 'FIA_UAU': 24, 'FIA_UID': 28, 'FIA_UID.1': 15, 'FIA_UAU.1': 4, 'FIA_UAU.4': 1, 'FIA_AFL.1': 2, 'FIA_UAU.7': 1, 'FIA_ATD': 8, 'FIA_ATD.1': 2, 'FIA_UID.2': 1, 'FIA_USB': 7, 'FIA_USB.1': 3}, 'FMT': {'FMT_MSA': 160, 'FMT_MSA.1': 17, 'FMT_SMF.1': 27, 'FMT_SMR': 63, 'FMT_SMR.1': 44, 'FMT_MSA.3': 26, 'FMT_MSA.3.1': 2, 'FMT_SMF': 58, 'FMT_MSA.2': 2, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MTD': 18, 'FMT_MTD.1': 2, 'FMT_MTD.3': 1, 'FMT_REV.1': 4, 'FMT_REV': 7}, 'FPR': {'FPR_UNO': 6, 'FPR_UNO.1': 10, 'FPR_UNO.1.1': 1}, 'FPT': {'FPT_TDC': 7, 'FPT_FLS': 49, 'FPT_PHP': 8, 'FPT_RCV': 28, 'FPT_FLS.1': 17, 'FPT_TDC.1': 10, 'FPT_FLS.1.1': 1, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 1, 'FPT_RCV.3': 8, 'FPT_PHP.3': 1, 'FPT_RCV.4': 1, 'FPT_TST.1': 1}, 'FRU': {'FRU_FLT': 8, 'FRU_FLT.1': 1}, 'FTP': {'FTP_ITC': 24, 'FTP_ITC.1': 10, 'FTP_TRP.1': 4}}, 'cc_claims': {'D': {'D.APSD_KEYS': 3, 'D.CASD_KEYS': 3, 'D.ISD_KEYS': 3, 'D.VASD_KEYS': 3, 'D.GP_CODE': 1, 'D.CARD_MNGT_DATA': 3, 'D.APP_CODE': 9, 'D.APP_C_DATA': 5, 'D.APP_I_DATA': 7, 'D.PIN': 5, 'D.API_DATA': 3, 'D.CRYPTO': 4, 'D.JCS_CODE': 3, 'D.JCS_DATA': 5, 'D.SEC_DATA': 8}, 'O': {'O.CARD-': 3, 'O.SCP': 63, 'O.CARD-MANAGEMENT': 76, 'O.DOMAIN-RIGHTS': 10, 'O.APPLI-AUTH': 13, 'O.COMM_AUTH': 20, 'O.COMM_INTEGRITY': 20, 'O.COMM_CONFIDENTIALITY': 13, 'O.SID': 40, 'O.FIREWALL': 51, 'O.GLOBAL_ARRAYS_CONFID': 17, 'O.GLOBAL_ARRAYS_INTEG': 9, 'O.NATIVE': 14, 'O.OPERATE': 35, 'O.REALLOCATION': 17, 'O.RESOURCES': 25, 'O.ALARM': 22, 'O.CIPHER': 16, 'O.KEY-MNGT': 23, 'O.PIN-MNGT': 13, 'O.TRANSACTION': 19, 'O.REMOTE': 15, 'O.OBJ-DELETION': 8, 'O.DELETION': 14, 'O.LOAD': 17, 'O.INSTALL': 16, 'O.SCPP': 1, 'O.SCP-IC': 1, 'O.SCP-SUPPORT': 2, 'O.DOMAIN-': 17, 'O.KEY-': 2, 'O.COMM_CONFIDENTIALI': 1, 'O.GLOBAL_ARRAYS_CON': 1, 'O.GLOBAL_ARRAYS_INTE': 1, 'O.APPLET': 21, 'O.CODE_PKG': 14, 'O.JAVAOBJECT': 41, 'O.REMOTE_MTH': 1, 'O.REMOTE_OBJ': 10, 'O.RMI_SERVICE': 12, 'O.ROR': 5, 'O.REMOTE_MTHD': 5, 'O.GLOBAL_ARRAYS_CONFI': 1, 'O.PIN-': 9, 'O.OBJ-': 1}, 'T': {'T.PHYSICAL': 5, 'T.INTEG-USER-DATA': 6, 'T.COM_EXPLOIT': 6, 'T.UNAUTHORIZED_CARD_MNGT': 7, 'T.LIFE_CYCLE': 5, 'T.UNAUTHORIZED_ACCESS': 4, 'T.CONFID-APPLI-DATA': 17, 'T.CONFID-JCS-CODE': 5, 'T.CONFID-JCS-DATA': 5, 'T.INTEG-APPLI-CODE': 8, 'T.INTEG-APPLI-DATA': 17, 'T.INTEG-JCS-CODE': 5, 'T.INTEG-JCS-DATA': 6, 'T.SID': 18, 'T.EXE-CODE': 8, 'T.NATIVE': 6, 'T.EXE-CODE-REMOTE': 4, 'T.RESOURCES': 8, 'T.OBJ-DELETION': 4, 'T.INSTALL': 6, 'T.DELETION': 5, 'T.UNAUTHORIZED_CARD_MNG': 1, 'T.CONFID-JCS-': 7, 'T.INTEG-': 9, 'T.EXE-': 1, 'T.INTEG-APPLI-': 7}, 'A': {'A.MOBILE-OPERATOR': 4, 'A.OTA-ADMIN': 4, 'A.APPS-PROVIDER': 4, 'A.VERIFICATION-AUTHORITY': 2, 'A.KEY-ESCROW': 4, 'A.CONTROLLING-AUTHORITY': 2, 'A.APPLET': 5, 'A.VERIFICATION': 4, 'A.VERIFICATION-': 2, 'A.CONTROLLING-': 2}, 'R': {'R.JAVA': 11}, 'OP': {'OP.SEND': 1, 'OP.RECEIVE': 1, 'OP.ARRAY_ACCESS': 4, 'OP.CREATE': 7, 'OP.DELETE_APPLET': 4, 'OP.DELETE_PCKG': 3, 'OP.DELETE_PCKG_APPLET': 3, 'OP.GET_ROR': 3, 'OP.INSTANCE_FIELD': 4, 'OP.INVK_VIRTUAL': 6, 'OP.INVK_INTERFACE': 7, 'OP.INVOKE': 3, 'OP.JAVA': 5, 'OP.THROW': 5, 'OP.TYPE_ACCESS': 5, 'OP.PUT': 6, 'OP.RET_RORD': 3}, 'OE': {'OE.SCP': 3, 'OE.PRODUCTION': 1, 'OE.PERSONALIZER': 1, 'OE.KEY-CHANGE': 6, 'OE.MOBILE-OPERATOR': 6, 'OE.OTA-ADMIN': 4, 'OE.APPS-PROVIDER': 6, 'OE.VERIFICATION-AUTHORITY': 3, 'OE.KEY-ESCROW': 6, 'OE.CONTROLLING-AUTHORITY': 4, 'OE.SECURE-APPS-CERTIFICATION': 3, 'OE.BASIC-APPS-VALIDATION': 4, 'OE.AID-MANAGEMENT': 6, 'OE.OTA-LOADING': 5, 'OE.OTA-SERVERS': 5, 'OE.AP-KEYS': 7, 'OE.OPERATOR-KEYS': 6, 'OE.KEY-GENERATION': 4, 'OE.CA-KEYS': 8, 'OE.VA-KEYS': 5, 'OE.SECURITY-DOMAINS': 5, 'OE.QUOTAS': 5, 'OE.SHARE-CONTROL': 7, 'OE.APPLET': 9, 'OE.VERIFICATION': 34, 'OE.VERIFICATION-': 1, 'OE.CONTROLLING-': 1, 'OE.SECURE-APPS-': 2, 'OE.BASIC-APPS-': 1}, 'OSP': {'OSP.SECURE-APPS-CERTIFICATION': 2, 'OSP.BASIC-APPS-VALIDATION': 4, 'OSP.SHARE-CONTROL': 4, 'OSP.AID-MANAGEMENT': 4, 'OSP.OTA-LOADING': 4, 'OSP.OTA-SERVERS': 5, 'OSP.APSD-KEYS': 4, 'OSP.OPERATOR-KEYS': 4, 'OSP.KEY-GENERATION': 4, 'OSP.CASD-KEYS': 4, 'OSP.VASD-KEYS': 4, 'OSP.KEY-CHANGE': 4, 'OSP.SECURITY-DOMAINS': 4, 'OSP.QUOTAS': 4, 'OSP.VERIFICATION': 4, 'OSP.SECURE-APPS-': 2}}, 'vendor': {'Samsung': {'Samsung': 11}, 'Oberthur': {'Oberthur Technologies': 384, 'Oberthur': 16, 'OBERTHUR': 2}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 7}}, 'DES': {'DES': {'DES': 27}, '3DES': {'TDES': 4}}}, 'asymmetric_crypto': {'RSA': {'RSA 2048': 1}, 'FF': {'DH': {'Diffie-Hellman': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 7}, 'SHA2': {'SHA256': 1, 'SHA384': 1, 'SHA512': 1, 'SHA-224': 1, 'SHA-256': 1, 'SHA-384': 1, 'SHA-512': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 4}}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 5}}, 'cipher_mode': {'CBC': {'CBC': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 1, 'DPA': 1}, 'FI': {'physical tampering': 2, 'malfunction': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 46-3': 4, 'FIPS PUB 81': 3, 'FIPS PUB 180-3': 1, 'FIPS PUB 186-3': 1, 'FIPS PUB 197': 3, 'FIPS 186-3': 1, 'FIPS 140-2': 1}, 'PKCS': {'PKCS#1': 9}, 'SCP': {'SCP02': 3, 'SCP80': 2, 'SCP 80': 1}}, 'javacard_version': {'GlobalPlatform': {'GlobalPlatform 2.1.1': 1}}, 'javacard_api_const': {'misc': {'TYPE_ACCESS': 5}}, 'javacard_packages': {'java': {'java.rmi': 3}, 'javacard': {'javacard.security': 3, 'javacard.framework': 4, 'javacard.framework.service': 1}, 'javacardx': {'javacardx.rmi': 2, 'javacardx.crypto': 2, 'javacardx.security': 1, 'javacardx.framework.util': 1}}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are': 1}}}
. - The report_filename property was set to
ANSSI-CC_2011-24fr.pdf
. - The st_filename property was set to
ANSSI-CC-cible_2011-24en.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['THALES']
. - The cert_id property was set to
ANSSI-CC-2011/24
. - The st_references property was updated, with the
{'directly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2009/57']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2009/57']}}
data. - The report_references property was updated, with the
{'directly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2012/06', 'ANSSI-CC-2012/39']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2012/39', 'ANSSI-CC-2013/60', 'ANSSI-CC-2016/60', 'ANSSI-CC-2019/38', 'ANSSI-CC-2014/81', 'ANSSI-CC-2012/06', 'ANSSI-CC-2013/65']}, 'directly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2009/57']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2009/25', 'ANSSI-CC-2009/57']}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_APD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2011-24fr.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2011-24en.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
. - The st_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data. - The report_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_APD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}]}
values discarded.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The report_references property was updated, with the
{'directly_referenced_by': None, 'indirectly_referenced_by': None}
data. - The scheme_data property was set to
{'product': 'NFC FlyBuy sur S3FS91J', 'url': 'https://cyber.gouv.fr/produits-certifies/nfc-flybuy-sur-s3fs91j', 'description': 'Le produit certifié est la plateforme (U)SIM Java Card « NFC FlyBuy sur S3FS91J », dont la version du système d'exploitation natif est 075895 et la version du Card Manager1 en Java Card est GOP Ref V1.5.o. Cette plateforme est développée par Oberthur Technologies et Samsung Electronics Co. Ltd.\n\nLe produit est une plateforme (U)SIM Java Card ouverte pouvant être insérée dans un téléphone por', 'sponsor': 'Oberthur Technologies', 'developer': 'Oberthur Technologies et Samsung Electronics Co. Ltd', 'cert_id': '2011/24', 'level': 'EAL4+', 'enhanced': {'cert_id': '2011/24', 'certification_date': '12/07/2011', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 3.1r3', 'developer': 'Oberthur Technologies et Samsung Electronics Co. Ltd', 'sponsor': 'Oberthur Technologies', 'evaluation_facility': 'THALES - CEACI (T3S – CNES)', 'level': 'EAL4+', 'protection_profile': 'ANSSI-CC-PP-2010/04', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ALC_DVS.2, AVA_VAN.5', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2011-24en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2011-24fr.pdf'}}
.
- The report_references property was updated, with the
-
31.07.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name NFC FlyBuy on S3FS91J was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "091d302472777e95",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2011/24",
"cert_lab": [
"THALES"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_APD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"next_certificates": [],
"prev_certificates": [],
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2012/06",
"ANSSI-CC-2012/39"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2009/57"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2013/60",
"ANSSI-CC-2019/38",
"ANSSI-CC-2012/39",
"ANSSI-CC-2014/81",
"ANSSI-CC-2016/60",
"ANSSI-CC-2012/06",
"ANSSI-CC-2013/65"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2009/25",
"ANSSI-CC-2009/57"
]
}
},
"scheme_data": {
"cert_id": "ANSSI-CC-2011/24",
"description": "Le produit certifi\u00e9 est la plateforme (U)SIM Java Card \u00ab NFC FlyBuy sur S3FS91J \u00bb, dont la version du syst\u00e8me d\u0026#39;exploitation natif est 075895 et la version du Card Manager1 en Java Card est GOP Ref V1.5.o. Cette plateforme est d\u00e9velopp\u00e9e par Oberthur Technologies et Samsung Electronics Co. Ltd. Le produit est une plateforme (U)SIM Java Card ouverte pouvant \u00eatre ins\u00e9r\u00e9e dans un t\u00e9l\u00e9phone por",
"developer": "Oberthur Technologies et Samsung Electronics Co. Ltd",
"enhanced": {
"augmented": "ALC_DVS.2, AVA_VAN.5",
"category": "Cartes \u00e0 puce",
"cc_version": "Crit\u00e8res Communs version 3.1r3",
"cert_id": "ANSSI-CC-2011/24",
"certification_date": "2011-07-12",
"developer": "Oberthur Technologies et Samsung Electronics Co. Ltd",
"evaluation_facility": "THALES - CEACI (T3S \u2013 CNES)",
"level": "EAL4+",
"mutual_recognition": "SOG-IS CCRA",
"protection_profile": "ANSSI-CC-PP-2010/04",
"report_link": "https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2011-24fr.pdf",
"sponsor": "Oberthur Technologies",
"target_link": "https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2011-24en.pdf"
},
"level": "EAL4+",
"product": "NFC FlyBuy sur S3FS91J",
"sponsor": "Oberthur Technologies",
"url": "https://cyber.gouv.fr/produits-certifies/nfc-flybuy-sur-s3fs91j"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2009/57"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2009/57"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2012-10-24",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Rapport%20de%20maintenance%20FLY%202011_24_M01.pdf",
"maintenance_st_link": null,
"maintenance_title": "Rapport de maintenance ANSSI-CC-2011/24-M01"
}
]
},
"manufacturer": "Oberthur Technologies",
"manufacturer_web": "https://www.oberthur.com/",
"name": "NFC FlyBuy on S3FS91J",
"not_valid_after": "2019-09-01",
"not_valid_before": "2011-07-12",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "ANSSI-CC_2011-24fr.pdf",
"report_frontpage": {
"FR": {
"cc_security_level": "EAL 4 augment\u00e9 ALC_DVS.2, AVA_VAN.5",
"cc_version": "Crit\u00e8res Communs version 3.1 r\u00e9vision 3",
"cert_id": "ANSSI-CC-2011/24",
"cert_item": "NFC FlyBuy sur S3FS91J",
"cert_item_version": "version du syst\u00e8me d\u2019exploitation en natif : 075895 version du Card Manager en Java Card : GOP Ref V1.5.o",
"cert_lab": "THALES - CEACI (T3S \u2013 CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France T\u00e9l : +33 (0)5 62 88 28 01 ou 18, m\u00e9l : [email protected]",
"developer": "Oberthur Technologies 71-73 chemin des Hautes P\u00e2tures, 92 726 NANTERRE CEDEX, France Samsung Electronics Co. Ltd San#24 Nongseo-Ri, Giheung-Eup, Yongin-City, Gyeonggi-Do, 449-711, R\u00e9publique de Cor\u00e9e Commanditaire Oberthur Technologies 71-73 chemin des Hautes P\u00e2tures, 92 726 NANTERRE CEDEX, France",
"match_rules": [
"R\u00e9f\u00e9rence du rapport de certification(.+)Nom du produit(.+)R\u00e9f\u00e9rence/version du produit(.+)Conformit\u00e9 \u00e0 un profil de protection(.+)Crit\u00e8res d\u2019\u00e9valuation et version(.+)Niveau d\u2019\u00e9valuation(.+)D\u00e9veloppeur\\(s\\)(.+)Centre d\u2019\u00e9valuation(.+)Accords de reconnaissance applicables"
],
"ref_protection_profiles": "PP (U)SIM], version 2.0.2, certifi\u00e9 par l\u2019ANSSI (U)SIM Java Card Platform Protection Profile Basic and SCWS Configurations Evolutive Certification Scheme for (U)SIM cards"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2009/57": 4,
"ANSSI-CC-2011/24": 22
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP- 0035": 1,
"BSI-PP-0035": 1,
"BSI-PP-0035-2007": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_FSP": 1,
"ADV_IMP": 1,
"ADV_INT": 1,
"ADV_SPM": 1,
"ADV_TDS": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_PRE": 2
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMS": 1,
"ALC_DEL": 1,
"ALC_DVS": 1,
"ALC_DVS.2": 2,
"ALC_FLR": 2,
"ALC_TAT": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_ECD": 1,
"ASE_INT": 1,
"ASE_OBJ": 1,
"ASE_REQ": 1,
"ASE_SPD": 1,
"ASE_TSS": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_DPT": 1,
"ATE_FUN": 1,
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.5": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 3": 1,
"EAL 4": 2,
"EAL 5": 1,
"EAL 7": 1,
"EAL4": 2,
"EAL5": 1,
"EAL7": 1
},
"ITSEC": {
"ITSEC E6 Elev\u00e9": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 1
},
"ECB": {
"ECB": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Thales": {
"THALES - CEACI": 1
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {
"JavaCard": {
"Java Card 3.0.1": 1
}
},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2009-07-001": 1,
"CCMB-2009-07-002": 1,
"CCMB-2009-07-003": 1,
"CCMB-2009-07-004": 1
},
"SCP": {
"SCP 80": 2
}
},
"symmetric_crypto": {
"DES": {
"3DES": {
"Triple-DES": 1
},
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Oberthur": {
"Oberthur": 6,
"Oberthur Technologies": 13
},
"Samsung": {
"Samsung": 5
}
},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20110713100055+02\u002700\u0027",
"/Keywords": "",
"/ModDate": "D:20110713100055+02\u002700\u0027",
"/Producer": "Acrobat Distiller 8.1.0 (Windows)",
"pdf_file_size_bytes": 544621,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 21
},
"st_filename": "ANSSI-CC-cible_2011-24en.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"FF": {
"DH": {
"Diffie-Hellman": 2
}
},
"RSA": {
"RSA 2048": 1
}
},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2009/57": 1,
"ANSSI-CC-PP 2010/04": 1
}
},
"cc_claims": {
"A": {
"A.APPLET": 5,
"A.APPS-PROVIDER": 4,
"A.CONTROLLING-": 2,
"A.CONTROLLING-AUTHORITY": 2,
"A.KEY-ESCROW": 4,
"A.MOBILE-OPERATOR": 4,
"A.OTA-ADMIN": 4,
"A.VERIFICATION": 4,
"A.VERIFICATION-": 2,
"A.VERIFICATION-AUTHORITY": 2
},
"D": {
"D.API_DATA": 3,
"D.APP_CODE": 9,
"D.APP_C_DATA": 5,
"D.APP_I_DATA": 7,
"D.APSD_KEYS": 3,
"D.CARD_MNGT_DATA": 3,
"D.CASD_KEYS": 3,
"D.CRYPTO": 4,
"D.GP_CODE": 1,
"D.ISD_KEYS": 3,
"D.JCS_CODE": 3,
"D.JCS_DATA": 5,
"D.PIN": 5,
"D.SEC_DATA": 8,
"D.VASD_KEYS": 3
},
"O": {
"O.ALARM": 22,
"O.APPLET": 21,
"O.APPLI-AUTH": 13,
"O.CARD-": 3,
"O.CARD-MANAGEMENT": 76,
"O.CIPHER": 16,
"O.CODE_PKG": 14,
"O.COMM_AUTH": 20,
"O.COMM_CONFIDENTIALI": 1,
"O.COMM_CONFIDENTIALITY": 13,
"O.COMM_INTEGRITY": 20,
"O.DELETION": 14,
"O.DOMAIN-": 17,
"O.DOMAIN-RIGHTS": 10,
"O.FIREWALL": 51,
"O.GLOBAL_ARRAYS_CON": 1,
"O.GLOBAL_ARRAYS_CONFI": 1,
"O.GLOBAL_ARRAYS_CONFID": 17,
"O.GLOBAL_ARRAYS_INTE": 1,
"O.GLOBAL_ARRAYS_INTEG": 9,
"O.INSTALL": 16,
"O.JAVAOBJECT": 41,
"O.KEY-": 2,
"O.KEY-MNGT": 23,
"O.LOAD": 17,
"O.NATIVE": 14,
"O.OBJ-": 1,
"O.OBJ-DELETION": 8,
"O.OPERATE": 35,
"O.PIN-": 9,
"O.PIN-MNGT": 13,
"O.REALLOCATION": 17,
"O.REMOTE": 15,
"O.REMOTE_MTH": 1,
"O.REMOTE_MTHD": 5,
"O.REMOTE_OBJ": 10,
"O.RESOURCES": 25,
"O.RMI_SERVICE": 12,
"O.ROR": 5,
"O.SCP": 63,
"O.SCP-IC": 1,
"O.SCP-SUPPORT": 2,
"O.SCPP": 1,
"O.SID": 40,
"O.TRANSACTION": 19
},
"OE": {
"OE.AID-MANAGEMENT": 6,
"OE.AP-KEYS": 7,
"OE.APPLET": 9,
"OE.APPS-PROVIDER": 6,
"OE.BASIC-APPS-": 1,
"OE.BASIC-APPS-VALIDATION": 4,
"OE.CA-KEYS": 8,
"OE.CONTROLLING-": 1,
"OE.CONTROLLING-AUTHORITY": 4,
"OE.KEY-CHANGE": 6,
"OE.KEY-ESCROW": 6,
"OE.KEY-GENERATION": 4,
"OE.MOBILE-OPERATOR": 6,
"OE.OPERATOR-KEYS": 6,
"OE.OTA-ADMIN": 4,
"OE.OTA-LOADING": 5,
"OE.OTA-SERVERS": 5,
"OE.PERSONALIZER": 1,
"OE.PRODUCTION": 1,
"OE.QUOTAS": 5,
"OE.SCP": 3,
"OE.SECURE-APPS-": 2,
"OE.SECURE-APPS-CERTIFICATION": 3,
"OE.SECURITY-DOMAINS": 5,
"OE.SHARE-CONTROL": 7,
"OE.VA-KEYS": 5,
"OE.VERIFICATION": 34,
"OE.VERIFICATION-": 1,
"OE.VERIFICATION-AUTHORITY": 3
},
"OP": {
"OP.ARRAY_ACCESS": 4,
"OP.CREATE": 7,
"OP.DELETE_APPLET": 4,
"OP.DELETE_PCKG": 3,
"OP.DELETE_PCKG_APPLET": 3,
"OP.GET_ROR": 3,
"OP.INSTANCE_FIELD": 4,
"OP.INVK_INTERFACE": 7,
"OP.INVK_VIRTUAL": 6,
"OP.INVOKE": 3,
"OP.JAVA": 5,
"OP.PUT": 6,
"OP.RECEIVE": 1,
"OP.RET_RORD": 3,
"OP.SEND": 1,
"OP.THROW": 5,
"OP.TYPE_ACCESS": 5
},
"OSP": {
"OSP.AID-MANAGEMENT": 4,
"OSP.APSD-KEYS": 4,
"OSP.BASIC-APPS-VALIDATION": 4,
"OSP.CASD-KEYS": 4,
"OSP.KEY-CHANGE": 4,
"OSP.KEY-GENERATION": 4,
"OSP.OPERATOR-KEYS": 4,
"OSP.OTA-LOADING": 4,
"OSP.OTA-SERVERS": 5,
"OSP.QUOTAS": 4,
"OSP.SECURE-APPS-": 2,
"OSP.SECURE-APPS-CERTIFICATION": 2,
"OSP.SECURITY-DOMAINS": 4,
"OSP.SHARE-CONTROL": 4,
"OSP.VASD-KEYS": 4,
"OSP.VERIFICATION": 4
},
"R": {
"R.JAVA": 11
},
"T": {
"T.COM_EXPLOIT": 6,
"T.CONFID-APPLI-DATA": 17,
"T.CONFID-JCS-": 7,
"T.CONFID-JCS-CODE": 5,
"T.CONFID-JCS-DATA": 5,
"T.DELETION": 5,
"T.EXE-": 1,
"T.EXE-CODE": 8,
"T.EXE-CODE-REMOTE": 4,
"T.INSTALL": 6,
"T.INTEG-": 9,
"T.INTEG-APPLI-": 7,
"T.INTEG-APPLI-CODE": 8,
"T.INTEG-APPLI-DATA": 17,
"T.INTEG-JCS-CODE": 5,
"T.INTEG-JCS-DATA": 6,
"T.INTEG-USER-DATA": 6,
"T.LIFE_CYCLE": 5,
"T.NATIVE": 6,
"T.OBJ-DELETION": 4,
"T.PHYSICAL": 5,
"T.RESOURCES": 8,
"T.SID": 18,
"T.UNAUTHORIZED_ACCESS": 4,
"T.UNAUTHORIZED_CARD_MNG": 1,
"T.UNAUTHORIZED_CARD_MNGT": 7
}
},
"cc_protection_profile_id": {
"ANSSI": {
"ANSSI-CC-PP 2010/04": 1
},
"BSI": {
"BSI-PP-0035": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 15,
"ADV_FSP": 1,
"ADV_FSP.1": 3,
"ADV_FSP.2": 2,
"ADV_FSP.4": 20,
"ADV_IMP": 1,
"ADV_IMP.1": 11,
"ADV_IMP.2": 1,
"ADV_TDS": 1,
"ADV_TDS.1": 2,
"ADV_TDS.2": 1,
"ADV_TDS.3": 23
},
"AGD": {
"AGD_ADM": 1,
"AGD_OPE": 3,
"AGD_OPE.1": 19,
"AGD_PRE": 2,
"AGD_PRE.1": 12,
"AGD_USR": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.4": 16,
"ALC_CMS": 1,
"ALC_CMS.1": 1,
"ALC_CMS.4": 7,
"ALC_DEL": 1,
"ALC_DEL.1": 6,
"ALC_DVS": 8,
"ALC_DVS.1": 1,
"ALC_DVS.2": 14,
"ALC_LCD": 1,
"ALC_LCD.1": 9,
"ALC_TAT": 1,
"ALC_TAT.1": 10
},
"ASE": {
"ASE_APD.1": 1,
"ASE_CCL": 1,
"ASE_CCL.1": 15,
"ASE_ECD": 1,
"ASE_ECD.1": 14,
"ASE_INT": 1,
"ASE_INT.1": 17,
"ASE_OBJ": 1,
"ASE_OBJ.2": 13,
"ASE_REQ": 1,
"ASE_REQ.1": 2,
"ASE_REQ.2": 15,
"ASE_SPD": 1,
"ASE_SPD.1": 8,
"ASE_TSS": 1,
"ASE_TSS.1": 6
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.1": 2,
"ATE_COV.2": 8,
"ATE_DPT": 1,
"ATE_DPT.1": 7,
"ATE_FUN": 1,
"ATE_FUN.1": 14,
"ATE_IND": 1,
"ATE_IND.2": 7
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.5": 17
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 3,
"EAL 4 augmented": 1,
"EAL4": 7,
"EAL4 augmented": 4,
"EAL4+": 3
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP.1": 16,
"FAU_ARP.1.1": 1,
"FAU_SAA.1": 3
},
"FCO": {
"FCO_NRO": 14,
"FCO_NRO.2": 6
},
"FCS": {
"FCS_CKM.1": 19,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 8,
"FCS_CKM.2.1": 1,
"FCS_CKM.3": 6,
"FCS_CKM.3.1": 1,
"FCS_CKM.4": 26,
"FCS_CKM.4.1": 1,
"FCS_COP": 44,
"FCS_COP.1": 13,
"FCS_COP.1.1": 1,
"FCS_RNG": 9,
"FCS_RNG.1": 4,
"FCS_RNG.1.1": 1,
"FCS_RNG.1.2": 1
},
"FDP": {
"FDP_ACC": 47,
"FDP_ACC.1": 20,
"FDP_ACC.2": 7,
"FDP_ACF": 36,
"FDP_ACF.1": 24,
"FDP_IFC": 44,
"FDP_IFC.1": 23,
"FDP_IFC.2": 4,
"FDP_IFF": 38,
"FDP_IFF.1": 26,
"FDP_IFF.1.2": 1,
"FDP_IFF.1.4": 1,
"FDP_ITC": 20,
"FDP_ITC.1": 8,
"FDP_ITC.2": 22,
"FDP_RIP": 110,
"FDP_RIP.1": 10,
"FDP_ROL": 18,
"FDP_ROL.1": 7,
"FDP_SDI.2": 7,
"FDP_SDI.2.1": 1,
"FDP_SDI.2.2": 1,
"FDP_UIT": 10,
"FDP_UIT.1": 4
},
"FIA": {
"FIA_AFL": 6,
"FIA_AFL.1": 2,
"FIA_ATD": 8,
"FIA_ATD.1": 2,
"FIA_UAU": 24,
"FIA_UAU.1": 4,
"FIA_UAU.4": 1,
"FIA_UAU.7": 1,
"FIA_UID": 28,
"FIA_UID.1": 15,
"FIA_UID.2": 1,
"FIA_USB": 7,
"FIA_USB.1": 3
},
"FMT": {
"FMT_MSA": 160,
"FMT_MSA.1": 17,
"FMT_MSA.2": 2,
"FMT_MSA.3": 26,
"FMT_MSA.3.1": 2,
"FMT_MTD": 18,
"FMT_MTD.1": 2,
"FMT_MTD.3": 1,
"FMT_REV": 7,
"FMT_REV.1": 4,
"FMT_SMF": 58,
"FMT_SMF.1": 27,
"FMT_SMF.1.1": 1,
"FMT_SMR": 63,
"FMT_SMR.1": 44,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPR": {
"FPR_UNO": 6,
"FPR_UNO.1": 10,
"FPR_UNO.1.1": 1
},
"FPT": {
"FPT_FLS": 49,
"FPT_FLS.1": 17,
"FPT_FLS.1.1": 1,
"FPT_PHP": 8,
"FPT_PHP.3": 1,
"FPT_RCV": 28,
"FPT_RCV.3": 8,
"FPT_RCV.4": 1,
"FPT_TDC": 7,
"FPT_TDC.1": 10,
"FPT_TDC.1.1": 1,
"FPT_TDC.1.2": 1,
"FPT_TST.1": 1
},
"FRU": {
"FRU_FLT": 8,
"FRU_FLT.1": 1
},
"FTP": {
"FTP_ITC": 24,
"FTP_ITC.1": 10,
"FTP_TRP.1": 4
}
},
"certification_process": {
"OutOfScope": {
"a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are": 1,
"out of scope": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 4
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 7
},
"SHA2": {
"SHA-224": 1,
"SHA-256": 1,
"SHA-384": 1,
"SHA-512": 1,
"SHA256": 1,
"SHA384": 1,
"SHA512": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {
"misc": {
"TYPE_ACCESS": 5
}
},
"javacard_packages": {
"java": {
"java.rmi": 3
},
"javacard": {
"javacard.framework": 4,
"javacard.framework.service": 1,
"javacard.security": 3
},
"javacardx": {
"javacardx.crypto": 2,
"javacardx.framework.util": 1,
"javacardx.rmi": 2,
"javacardx.security": 1
}
},
"javacard_version": {
"GlobalPlatform": {
"GlobalPlatform 2.1.1": 1
}
},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 5
}
},
"side_channel_analysis": {
"FI": {
"malfunction": 1,
"physical tampering": 2
},
"SCA": {
"DPA": 1,
"physical probing": 1
}
},
"standard_id": {
"FIPS": {
"FIPS 140-2": 1,
"FIPS 186-3": 1,
"FIPS PUB 180-3": 1,
"FIPS PUB 186-3": 1,
"FIPS PUB 197": 3,
"FIPS PUB 46-3": 4,
"FIPS PUB 81": 3
},
"PKCS": {
"PKCS#1": 9
},
"SCP": {
"SCP 80": 1,
"SCP02": 3,
"SCP80": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 7
}
},
"DES": {
"3DES": {
"TDES": 4
},
"DES": {
"DES": 27
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Oberthur": {
"OBERTHUR": 2,
"Oberthur": 16,
"Oberthur Technologies": 384
},
"Samsung": {
"Samsung": 11
}
},
"vulnerability": {}
},
"st_metadata": {
"/CreationDate": "D:20110713095952+02\u002700\u0027",
"/Keywords": "",
"/ModDate": "D:20110713095952+02\u002700\u0027",
"/Producer": "GPL Ghostscript 8.61",
"pdf_file_size_bytes": 1275792,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 191
}
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": null,
"pp_ids": null,
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-cible_PP-2010-04en.pdf",
"pp_name": "(U)SIM Java Card Platform Protection Profile / Basic Configuration (ref. PU-2009-..."
}
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2011-24fr.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"ALC_DVS.2",
"AVA_VAN.5",
"EAL4+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2011-24en.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "f56348cd6c69307c10472582eb65da6b272390409085ececec8d1c99b27b41dd",
"txt_hash": "329fccce4a1cb1dd67e78e9cd7c630b819693a0689ddd3798a9b3e4144bf6983"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "bcf661a98f7f4f61d5d6cf60effa75e2b465149839a0af9f02d27aa7ad3f4ec9",
"txt_hash": "06acc16a060d7fea219e6d2c0ab8d1e5892368506d624f3d469e68696620c977"
}
},
"status": "archived"
}