This page was not yet optimized for use on mobile
devices.
Java Card Virtual Machine of LinqUs USIM 128k platform on SC33F640E
CSV information
| Status | archived |
|---|---|
| Valid from | 30.04.2012 |
| Valid until | 01.09.2019 |
| Scheme | 🇫🇷 FR |
| Manufacturer | Gemalto |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | EAL4+, ADV_FSP.6, ADV_INT.3, AVA_VAN.5, ADV_IMP.2, ADV_TDS.6, ALC_DVS.2, ADV_SPM.1 |
Heuristics summary
Certificate ID: ANSSI-CC-2012/18
Certificate
certificate could not be downloaded, no link is available.
Certification report
Extracted keywords
CPLC
IC Fabricator, ICTypeVendor
STMicroelectronics, GemaltoSecurity level
EAL 4, EAL4, EAL7, EAL 1, EAL 3, EAL 5, EAL 7, EAL 4 augmented, ITSEC E6 HighSecurity Assurance Requirements (SAR)
ADV_FSP.6, ADV_IMP.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.6, ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_PRE, AGD_OPE, ALC_DVS.2, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSSCertificates
ANSSI-CC-2012/18Evaluation facilities
THALES - CEACI, Trusted LabsStandards
CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004File metadata
| Creation date | D:20120430110718+02'00' |
|---|---|
| Modification date | D:20120430110718+02'00' |
| Pages | 15 |
| Creator | PScript5.dll Version 5.2.2 |
| Producer | Acrobat Distiller 9.0.0 (Windows) |
Security target
Extracted keywords
Schemes
MACJavaCard versions
Java Card 2.2.2, Global Platform 2.2.2JavaCard API constants
TYPE_ACCESSVendor
STMicroelectronics, GemaltoSecurity level
EAL4+, EAL4, EAL5, EAL7, EAL5+, EAL4 augmented, EAL5 augmentedClaims
D.APP_CODE, D.APP_C_DATA, D.APP_I_DATA, D.PIN, D.API_DATA, D.CRYPTO, D.JCS_CODE, D.JCS_DATA, D.SEC_DATA, O.FIREWALL, O.GLOBAL_ARRAYS_INTEG, O.NATIVE, O.OPERATE, O.ALARM, O.INSTALL, O.KEY-MNGT, O.SID, O.OPERATE-, O.INSTALL-ENV, O.JAVAOBJECT, O.APPLET, T.CONFID-APPLI-DATA, T.CONFID-JCS-CODE, T.CONFID-JCS-DATA, T.INTEG-APPLI-CODE, T.INTEG-APPLI-DATA, T.INTEG-JCS-CODE, T.INTEG-JCS-DATA, T.SID, T.EXE-CODE, T.EXE-CODE-REMOTE, T.NATIVE, T.RESOURCES, T.DELETION, T.INSTALL, T.OBJ-DELETION, T.PHYSICAL, T.CONFID-, T.CONFID-JCS-, T.INTEG-APPLI-, T.INTEG-JCS-, T.EXE-CODE-, T.OBJ-, T.INTEG-, T.EXE-, A.APPLET, A.DELETION, A.VERIFICATION, A.SID, A.FIREWALL-ENV, A.GLOBAL_ARRAY_CONFID, A.OPERATE-ENV, A.REALLOCATION, A.RESOURCES, A.ALARM-ENV, A.CIPHER, A.KEY-MNGT, A.PIN-MNGT, A.REMOTE, A.TRANSACTION, A.OBJ-DELETION, A.LOAD, A.INSTALL-ENV, A.NATIVE, A.GLOBAL_ARRAYS_CONFID, R.JAVA, OT.GLOBAL_ARRAYS_INTEG, OP.ARRAY_ACCESS, OP.INSTANCE_FIELD, OP.INVK_VIRTUAL, OP.INVK_INTERFACE, OP.INVK_STATIC, OP.THROW, OP.TYPE_ACCESS, OP.JAVA, OP.CREATE, OP.PUT, OE.APPLET, OE.CARD-MANAGEMENT, OE.VERIFICATION, OE.SCP, OE.SID, OE.FIREWALL-ENV, OE.GLOBAL_ARRAYS_CONFID, OE.OPERATE-ENV, OE.REALLOCATION, OE.RESOURCES, OE.ALARM-ENV, OE.CIPHER, OE.KEY-MNGT, OE.PIN-MNGT, OE.REMOTE, OE.TRANSACTION, OE.OBJ-DELETION, OE.DELETION, OE.LOAD, OE.INSTALL-ENV, OE.BASIC-APPS-VALIDATION, OE.CARD-, OE.ALARM-, OE.KEY-, OE.BASIC-APPS-, OE.OPERATE-, OE.OPERATE, OSP.VERIFICATIONSecurity Assurance Requirements (SAR)
ADV_SPM.1, ADV_FSP.6, ADV_TDS.6, ADV_INT.3, ADV_IMP.2, ADV_ARC.1, ADV_FSP.1, ADV_TDS.1, ADV_FSP.4, ADV_TDS.3, ADV_IMP.1, ADV_FSP.2, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_TAT.1, ALC_CMC.5, ALC_CMS.1, ALC_DVS.1, ALC_LCD.1, ALC_CMS.4, ALC_DEL.1, ATE_COV.2, ATE_FUN.1, ATE_COV.1, ATE_DPT.1, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1, ASE_REQ.2, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_ARP.1, FAU_SAA.1, FCO_NRO, FCS_CKM.1, FCS_CKM.2, FCS_CKM.3, FCS_CKM.4, FCS_COP.1, FDP_ACC, FDP_ACF, FDP_IFC, FDP_IFF, FDP_RIP, FDP_ROL, FDP_SDI.2, FDP_ITC, FDP_UIT, FDP_ACC.2, FDP_ACF.1, FDP_IFC.1, FDP_IFF.1, FDP_ROL.1, FDP_ACC.1, FIA_ATD, FIA_UID, FIA_USB, FIA_ATD.1, FIA_UID.1, FMT_LIM, FMT_MSA, FMT_SMF.1, FMT_SMR.1, FMT_MTD, FMT_SMR, FMT_SMF, FMT_REV, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD.1, FMT_MTD.3, FPR_UNO.1, FPT_FLS.1, FPT_TDC.1, FPT_FLS, FPT_RCV, FPT_FLS.1.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_RCV.3, FPT_TST.1, FTP_ITCProtection profiles
BSI-PP-2007-0035Certificates
CC-2, CC-3, CC-1Evaluation facilities
Trusted LabsSide-channel analysis
physical probing, DPA, physical tampering, malfunction, JILCertification process
out of scope, a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives OE.SCP.RECOVERY and OE.SCP.SUPPORT areStandards
FIPS 140-2, AIS34, AIS 34, ISO/IEC 9796-2, CCIMB-2009-07-001, CCIMB-2009-07-002, CCIMB-2009-07-003, CCIMB-2009-07-004File metadata
| Creation date | D:20120402115518+02'00' |
|---|---|
| Modification date | D:20120502183617+02'00' |
| Pages | 77 |
| Creator | Microsoft® Office Word 2007 |
| Producer | Microsoft® Office Word 2007 |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
ANSSI-CC-2012/18Extracted SARs
ADV_ARC.1, ADV_FSP.6, ADV_IMP.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.6, AGD_OPE.1, AGD_PRE.1, ALC_CMC.5, ALC_CMS.4, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, AVA_VAN.5References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "ccb7b77ad02831a8",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2012/18",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL4+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 6
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 6
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Gemalto",
"manufacturer_web": "https://www.gemalto.com/",
"name": "Java Card Virtual Machine of LinqUs USIM 128k platform on SC33F640E",
"not_valid_after": "2019-09-01",
"not_valid_before": "2012-04-30",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "ANSSI-CC_2012-18en.pdf",
"report_frontpage": {
"FR": {}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2012/18": 16
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_FSP": 1,
"ADV_FSP.6": 1,
"ADV_IMP": 1,
"ADV_IMP.2": 1,
"ADV_INT": 1,
"ADV_INT.3": 1,
"ADV_SPM": 1,
"ADV_SPM.1": 1,
"ADV_TDS": 1,
"ADV_TDS.6": 1
},
"AGD": {
"AGD_OPE": 5,
"AGD_PRE": 3
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMS": 1,
"ALC_DEL": 1,
"ALC_DVS": 1,
"ALC_DVS.2": 1,
"ALC_FLR": 2,
"ALC_TAT": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_ECD": 1,
"ASE_INT": 1,
"ASE_OBJ": 1,
"ASE_REQ": 1,
"ASE_SPD": 1,
"ASE_TSS": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_DPT": 1,
"ATE_FUN": 1,
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 3,
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 3": 1,
"EAL 4": 2,
"EAL 4 augmented": 2,
"EAL 5": 1,
"EAL 7": 1,
"EAL4": 2,
"EAL7": 2
},
"ITSEC": {
"ITSEC E6 High": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {
"ICFab": {
"IC Fabricator": 1
},
"ICType": {
"ICType": 1
}
},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Thales": {
"THALES - CEACI": 1
},
"TrustedLabs": {
"Trusted Labs": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2009-07-001": 1,
"CCMB-2009-07-002": 1,
"CCMB-2009-07-003": 1,
"CCMB-2009-07-004": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Gemalto": {
"Gemalto": 4
},
"STMicroelectronics": {
"STMicroelectronics": 1
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "",
"/CreationDate": "D:20120430110718+02\u002700\u0027",
"/Creator": "PScript5.dll Version 5.2.2",
"/ModDate": "D:20120430110718+02\u002700\u0027",
"/Producer": "Acrobat Distiller 9.0.0 (Windows)",
"/Title": "",
"pdf_file_size_bytes": 168588,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 15
},
"st_filename": "ANSSI-CC-cible_2012-18en.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"NL": {
"CC-1": 1,
"CC-2": 3,
"CC-3": 2
}
},
"cc_claims": {
"A": {
"A.ALARM-ENV": 2,
"A.APPLET": 3,
"A.CIPHER": 2,
"A.DELETION": 5,
"A.FIREWALL-ENV": 2,
"A.GLOBAL_ARRAYS_CONFID": 1,
"A.GLOBAL_ARRAY_CONFID": 1,
"A.INSTALL-ENV": 2,
"A.KEY-MNGT": 2,
"A.LOAD": 2,
"A.NATIVE": 4,
"A.OBJ-DELETION": 2,
"A.OPERATE-ENV": 2,
"A.PIN-MNGT": 2,
"A.REALLOCATION": 2,
"A.REMOTE": 2,
"A.RESOURCES": 2,
"A.SID": 2,
"A.TRANSACTION": 2,
"A.VERIFICATION": 3
},
"D": {
"D.API_DATA": 3,
"D.APP_CODE": 7,
"D.APP_C_DATA": 3,
"D.APP_I_DATA": 4,
"D.CRYPTO": 3,
"D.JCS_CODE": 3,
"D.JCS_DATA": 5,
"D.PIN": 4,
"D.SEC_DATA": 7
},
"O": {
"O.ALARM": 18,
"O.APPLET": 1,
"O.FIREWALL": 33,
"O.GLOBAL_ARRAYS_INTEG": 10,
"O.INSTALL": 15,
"O.INSTALL-ENV": 1,
"O.JAVAOBJECT": 24,
"O.KEY-MNGT": 1,
"O.NATIVE": 13,
"O.OPERATE": 30,
"O.OPERATE-": 1,
"O.SID": 1
},
"OE": {
"OE.ALARM-": 3,
"OE.ALARM-ENV": 4,
"OE.APPLET": 6,
"OE.BASIC-APPS-": 1,
"OE.BASIC-APPS-VALIDATION": 7,
"OE.CARD-": 2,
"OE.CARD-MANAGEMENT": 25,
"OE.CIPHER": 7,
"OE.DELETION": 5,
"OE.FIREWALL-ENV": 9,
"OE.GLOBAL_ARRAYS_CONFID": 7,
"OE.INSTALL-ENV": 6,
"OE.KEY-": 1,
"OE.KEY-MNGT": 6,
"OE.LOAD": 9,
"OE.OBJ-DELETION": 5,
"OE.OPERATE": 1,
"OE.OPERATE-": 2,
"OE.OPERATE-ENV": 5,
"OE.PIN-MNGT": 7,
"OE.REALLOCATION": 7,
"OE.REMOTE": 5,
"OE.RESOURCES": 5,
"OE.SCP": 34,
"OE.SID": 14,
"OE.TRANSACTION": 7,
"OE.VERIFICATION": 32
},
"OP": {
"OP.ARRAY_ACCESS": 3,
"OP.CREATE": 8,
"OP.INSTANCE_FIELD": 3,
"OP.INVK_INTERFACE": 6,
"OP.INVK_STATIC": 2,
"OP.INVK_VIRTUAL": 5,
"OP.JAVA": 5,
"OP.PUT": 6,
"OP.THROW": 4,
"OP.TYPE_ACCESS": 4
},
"OSP": {
"OSP.VERIFICATION": 3
},
"OT": {
"OT.GLOBAL_ARRAYS_INTEG": 1
},
"R": {
"R.JAVA": 5
},
"T": {
"T.CONFID-": 1,
"T.CONFID-APPLI-DATA": 19,
"T.CONFID-JCS-": 2,
"T.CONFID-JCS-CODE": 5,
"T.CONFID-JCS-DATA": 13,
"T.DELETION": 5,
"T.EXE-": 1,
"T.EXE-CODE": 10,
"T.EXE-CODE-": 1,
"T.EXE-CODE-REMOTE": 3,
"T.INSTALL": 7,
"T.INTEG-": 1,
"T.INTEG-APPLI-": 6,
"T.INTEG-APPLI-CODE": 9,
"T.INTEG-APPLI-DATA": 21,
"T.INTEG-JCS-": 2,
"T.INTEG-JCS-CODE": 4,
"T.INTEG-JCS-DATA": 13,
"T.NATIVE": 6,
"T.OBJ-": 1,
"T.OBJ-DELETION": 3,
"T.PHYSICAL": 5,
"T.RESOURCES": 10,
"T.SID": 23
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-2007-0035": 2
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 6,
"ADV_FSP.1": 4,
"ADV_FSP.2": 2,
"ADV_FSP.4": 9,
"ADV_FSP.6": 8,
"ADV_IMP.1": 7,
"ADV_IMP.2": 4,
"ADV_INT.3": 4,
"ADV_SPM.1": 8,
"ADV_TDS.1": 3,
"ADV_TDS.2": 1,
"ADV_TDS.3": 10,
"ADV_TDS.6": 10
},
"AGD": {
"AGD_OPE.1": 8,
"AGD_PRE.1": 6
},
"ALC": {
"ALC_CMC.5": 5,
"ALC_CMS.1": 2,
"ALC_CMS.4": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 2,
"ALC_DVS.2": 8,
"ALC_LCD.1": 4,
"ALC_TAT.1": 7
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 4,
"ASE_INT.1": 5,
"ASE_OBJ.2": 3,
"ASE_REQ.1": 2,
"ASE_REQ.2": 2,
"ASE_SPD.1": 2,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.1": 2,
"ATE_COV.2": 3,
"ATE_DPT.1": 2,
"ATE_FUN.1": 6
},
"AVA": {
"AVA_VAN.5": 7
}
},
"cc_security_level": {
"EAL": {
"EAL4": 7,
"EAL4 augmented": 2,
"EAL4+": 3,
"EAL5": 1,
"EAL5 augmented": 1,
"EAL5+": 1,
"EAL7": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP.1": 14,
"FAU_SAA.1": 3
},
"FCO": {
"FCO_NRO": 1
},
"FCS": {
"FCS_CKM.1": 1,
"FCS_CKM.2": 1,
"FCS_CKM.3": 1,
"FCS_CKM.4": 1,
"FCS_COP.1": 1
},
"FDP": {
"FDP_ACC": 14,
"FDP_ACC.1": 4,
"FDP_ACC.2": 2,
"FDP_ACF": 13,
"FDP_ACF.1": 7,
"FDP_IFC": 14,
"FDP_IFC.1": 5,
"FDP_IFF": 11,
"FDP_IFF.1": 8,
"FDP_ITC": 1,
"FDP_RIP": 8,
"FDP_ROL": 6,
"FDP_ROL.1": 3,
"FDP_SDI.2": 1,
"FDP_UIT": 1
},
"FIA": {
"FIA_ATD": 6,
"FIA_ATD.1": 1,
"FIA_UID": 2,
"FIA_UID.1": 2,
"FIA_USB": 1
},
"FMT": {
"FMT_LIM": 1,
"FMT_MSA": 36,
"FMT_MSA.1": 4,
"FMT_MSA.2": 3,
"FMT_MSA.3": 10,
"FMT_MTD": 12,
"FMT_MTD.1": 2,
"FMT_MTD.3": 1,
"FMT_REV": 1,
"FMT_SMF": 3,
"FMT_SMF.1": 11,
"FMT_SMF.1.1": 1,
"FMT_SMR": 5,
"FMT_SMR.1": 17,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPR": {
"FPR_UNO.1": 1
},
"FPT": {
"FPT_FLS": 12,
"FPT_FLS.1": 9,
"FPT_FLS.1.1": 1,
"FPT_RCV": 8,
"FPT_RCV.3": 7,
"FPT_TDC.1": 7,
"FPT_TDC.1.1": 1,
"FPT_TDC.1.2": 1,
"FPT_TST.1": 1
},
"FTP": {
"FTP_ITC": 1
}
},
"certification_process": {
"OutOfScope": {
"a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives OE.SCP.RECOVERY and OE.SCP.SUPPORT are": 1,
"out of scope": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 2
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"TrustedLabs": {
"Trusted Labs": 2
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {
"misc": {
"TYPE_ACCESS": 4
}
},
"javacard_packages": {
"java": {
"java.lang": 1
},
"javacard": {
"javacard.framework": 1,
"javacard.framework.service": 1,
"javacard.security": 1
},
"javacardx": {
"javacardx.crypto": 1
}
},
"javacard_version": {
"GlobalPlatform": {
"Global Platform 2.2.2": 1
},
"JavaCard": {
"Java Card 2.2.2": 2
}
},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"malfunction": 1,
"physical tampering": 1
},
"SCA": {
"DPA": 1,
"physical probing": 1
},
"other": {
"JIL": 2
}
},
"standard_id": {
"BSI": {
"AIS 34": 1,
"AIS34": 2
},
"CC": {
"CCIMB-2009-07-001": 1,
"CCIMB-2009-07-002": 1,
"CCIMB-2009-07-003": 1,
"CCIMB-2009-07-004": 1
},
"FIPS": {
"FIPS 140-2": 1
},
"ISO": {
"ISO/IEC 9796-2": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Gemalto": {
"Gemalto": 162
},
"STMicroelectronics": {
"STMicroelectronics": 2
}
},
"vulnerability": {}
},
"st_metadata": {
"/CreationDate": "D:20120402115518+02\u002700\u0027",
"/Creator": "Microsoft\u00ae Office Word 2007",
"/ModDate": "D:20120502183617+02\u002700\u0027",
"/Producer": "Microsoft\u00ae Office Word 2007",
"/Title": "",
"pdf_file_size_bytes": 1027162,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 77
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2012-18en.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"ADV_INT.3",
"ALC_DVS.2",
"ADV_TDS.6",
"EAL4+",
"ADV_SPM.1",
"ADV_IMP.2",
"AVA_VAN.5",
"ADV_FSP.6"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2012-18en.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "b7dad6322a29ed9c60b053b945ce593a84c24acebe9b274d71d37826a437abcb",
"txt_hash": "ddbcb46442995a47455f3c50b01552c1af0a718dbe5675b5bfce20a37d1d9a32"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "5c540f056af0c0ef5594013079d6dfd59f402efeacf94aa653ffd01628d1b61e",
"txt_hash": "71899d0aacb0898bc9526217e2e6615ddef7f212141a95e040640c8f59a43884"
}
},
"status": "archived"
}