Plateforme Java Card MAV31S en configuration ouverte de la carte à puce Optelio Contactless R7S masquée sur le composant P60D144JVA (version du patch: 1.4)
CSV information ?
Status | archived |
---|---|
Valid from | 31.08.2015 |
Valid until | 31.08.2020 |
Scheme | 🇫🇷 FR |
Manufacturer | Gemalto / NXP Semiconductors |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | AVA_VAN.5, ALC_DVS.2, EAL4+ |
Protection profiles | |
Maintenance updates | ANSSI-CC-2015/30-M01 (14.10.2016) Certification report |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Vendor
NXP Semiconductors, NXP, GemaltoSecurity level
EAL 4, EAL4, EAL5, EAL7, EAL 1, EAL 3, EAL 5, EAL 7, EAL 4 augmented, ITSEC E6 HighSecurity Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN, AVA_VLA.5, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSSProtection profiles
BSI-PP- 0035-2007, BSI-PP-0035-2007, ANSSI-CC-PP-2010/03-M01Certificates
BSI-DSZ-CC-0870-2014, ANSSI-CC-2015/30, ANSSI-CC-PP-2010/03-M01, ANSSI-CC-2014/86Evaluation facilities
Serma TechnologiesFile metadata
Title | ANSSI-CC-2015/30 |
---|---|
Subject | Plateforme Java Card MultiApp ID V3.1S en configuration ouverte de la carte à puce Optelio Contactless R7S masquée sur le composant P60D144JVA |
Keywords | ANSSI-CC-CER-F-07EN.008 |
Author | romme |
Creation date | D:20151109154046+01'00' |
Modification date | D:20151109154046+01'00' |
Pages | 19 |
Creator | Microsoft® Word 2010 |
Producer | Microsoft® Word 2010 |
Frontpage
Certificate ID | ANSSI-CC-2015/30 |
---|---|
Certified item | Plateforme Java Card MAV31S en configuration ouverte de la carte à puce Optelio Contactless R7S masquée sur le composant P60D144JVA |
Certification lab | Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France |
Developer | Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France NXP Semiconductors Box 54 02 40, D-22502 Hambourg, Allemagne Sponsor Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France |
References
Outgoing- ANSSI-CC-2014/86 - archived - Plateforme Java Card en configuration ouverte de la carte à puce MultiApp v3.1 masquée sur le composant P60D080PVC(Version du patch : 1.4)
- BSI-DSZ-CC-0870-2014 - archived - NXP Secure Smart Card Controller P60x144/080yVA including IC Dedicated Software MIFARE Plus MF1PLUSx0 or MIFARE Plus MF1PLUSx0 and MIFARE DESFire EV1
- ANSSI-CC-2015/38 - archived - Application IAS V4.2.0.D sur la plateforme Javacard ouverte MultiApp V3.1S masquée sur le composant P60D144JVA (version du patch: 1.4)
Security target ?
Extracted keywords
Symmetric Algorithms
AES, DES, TDEA, Triple-DES, TDES, CMACAsymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-Hellman, DHHash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA224Schemes
MAC, Key agreementProtocols
PACERandomness
PRNG, RNG, RNDJavaCard versions
Java Card 2.2.2, JC2.2.2JavaCard API constants
TYPE_ACCESSVendor
NXP, GemaltoSecurity level
EAL4+, EAL4, EAL 5+, EAL4 augmentedClaims
D.APP_CODE, D.APP_C_DATA, D.APP_I_DATA, D.PIN, D.API_DATA, D.CRYPTO, D.JCS_CODE, D.JCS_DATA, D.SEC_DATA, O.SID, O.FIREWALL, O.GLOBAL_ARRAYS_CONFID, O.GLOBAL_ARRAYS_INTEG, O.NATIVE, O.OPERATE, O.REALLOCATION, O.RESOURCES, O.ALARM, O.CIPHER, O.KEY-MNGT, O.PIN-MNGT, O.TRANSACTION, O.OBJ-DELETION, O.DELETION, O.LOAD, O.INSTALL, O.SCP, O.CARD-MANAGEMENT, O.RND, O.KEY_MNGT, O.CARD_MANAGEMENT, O.KEY-, O.PIN-, O.HW_AES, O.APPLET, O.CODE_PKG, O.JAVAOBJECT, O.CODE_PCKG, O.GLOBAL_ARRAYS_CO, O.GLOBAL_ARRAYS_INT, T.CONFID-APPLI-DATA, T.CONFID-JCS-CODE, T.CONFID-JCS-DATA, T.INTEG-APPLI-CODE, T.INTEG-APPLI-DATA, T.INTEG-JCS-CODE, T.INTEG-JCS-DATA, T.SID, T.EXE-CODE, T.NATIVE, T.RESOURCES, T.DELETION, T.INSTALL, T.OBJ-DELETION, T.PHYSICAL, A.APPLET, A.DELETION, A.VERIFICATION, R.JAVA, OP.ARRAY_ACCESS, OP.CREATE, OP.DELETE_APPLET, OP.DELETE_PCKG, OP.DELETE_PCKG_APPLET, OP.INSTANCE_FIELD, OP.INVK_VIRTUAL, OP.INVK_INTERFACE, OP.JAVA, OP.THROW, OP.TYPE_ACCESS, OP.PUT, OE.VERIFICATION, OE.APPLET, OE.CODE-EVIDENCE, OE.CODE_EVIDENCE, OSP, OSP.VERIFICATION, OSP.RNG, OSP.RNDSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_TDS.1, ADV_TDS.4, ADV_IMP.1, ADV_TDS.3, ADV_INT.2, ADV_FSP.5, ADV_FSP.1, ADV_FSP.2, ADV_FSP.4, ADV_ARC, ADV_FSP, ADV_IMP, ADV_TDS, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_TAT.1, ALC_TAT.2, ALC_CMC.4, ALC_DVS.1, ALC_LCD.1, ALC_DEL.1, ATE_COV.2, ATE_FUN.1, ATE_COV.1, ATE_IND.2, ATE_DPT.1, AVA_VAN.5Security Functional Requirements (SFR)
FAU_ARP.1, FAU_ARP.1.1, FAU_SAA.1, FCO_NRO, FCO_NRO.2, FCS_RND, FCS_RND.1, FCS_CKM.1, FCS_RND.1.1, FCS_CKM.1.1, FCS_CKM.2, FCS_CKM.2.1, FCS_CKM.3, FCS_CKM.3.1, FCS_CKM.4, FCS_CKM.4.1, FCS_COP.1, FCS_COP.1.1, FCS_RNG.1, FDP_ACC, FDP_ACC.2, FDP_ACF, FDP_ACF.1, FDP_IFC, FDP_IFC.1, FDP_IFF, FDP_IFF.1, FDP_RIP, FDP_RIP.1, FDP_ROL, FDP_ROL.1, FDP_SDI.2, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ITC, FDP_ITC.2, FDP_IFC.2, FDP_UIT, FDP_UIT.1, FDP_ACC.1, FDP_ITC.1, FIA_SOS.2, FIA_ATD, FIA_ATD.1, FIA_UID, FIA_UID.2, FIA_USB, FIA_USB.1, FIA_UAU, FIA_UAI.1, FIA_UAU.1, FIA_UID.1, FMT_MSA, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_SMR, FMT_SMR.1, FMT_SMF, FMT_SMF.1, FMT_MTD, FMT_MTD.1, FMT_MTD.3, FPR_UNO.1, FPR_UNO.1.1, FPR_UNO, FPT_FLS, FPT_FLS.1, FPT_TDC.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_RCV, FPT_RCV.3, FPT_TST, FPT_TST.1, FPT_PHP, FPT_PHP.3, FPT_RCV.4, FPT_ITT, FPT_ITT.1, FTP_ITC, FTP_ITC.1, FTP_TRP.1Protection profiles
BSI-PP-0035, BSI-CC-PP-0059-2009-MA-01, BSI-CC-PP-0075-2012, PP-SSCD-KG, PP-SSCD-KICertificates
BSI-DSZ-CC-0870-, CC-1, CC-2, CC-3Evaluation facilities
SERMASide-channel analysis
Leak-Inherent, physical probing, DPA, physical tampering, malfunction, Malfunction, fault inductionCertification process
out of scope, a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT areStandards
FIPS180-2, FIPS197, SP 800-38, PKCS#3, PKCS#1, PKCS#5, AIS31, SCP01, SCP02, SCP03, CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004File metadata
Title | eTravel v1.0 Security Target MAÏA3 |
---|---|
Subject | Security Target |
Keywords | Security Target, CC |
Author | Antoine de Lavernette |
Creation date | D:20150723151408+02'00' |
Modification date | D:20150723151408+02'00' |
Pages | 93 |
Creator | Microsoft® Office Word 2007 |
Producer | Microsoft® Office Word 2007 |
Heuristics ?
Extracted SARs
ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.2, ASE_TSS.2, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.5, AVA_VLA.5Similar certificates
Scheme data ?
Product | Plateforme Java Card MAV31S en configuration ouverte de la carte à puce Optelio Contactless R7S masquée sur le composant P60D144JVA | |
---|---|---|
Url | https://cyber.gouv.fr/produits-certifies/plateforme-java-card-mav31s-en-configuration-ouverte-de-la-carte-puce-optelio | |
Description | La certificationporte sur la plateforme ouverte Java Card du produit « MultiApp v3.1S » qui est une carte à puce pouvant être en mode contact ou sans contact. Le produit est développé par la société GEMALTO et embarqué sur le microcontrôleur P60D144JVA fabriqué par la société NXP SEMICONDUCTORS. La plateforme ouverte Java Card est destinée à fournir des services de sécurité aux applets qui ser | |
Sponsor | Gemalto | |
Developer | Gemalto / NXP Semiconductors | |
Cert Id | ANSSI-CC-2015/30 | |
Level | EAL4+ | |
Enhanced | ||
Cert Id | ANSSI-CC-2015/30 | |
Certification Date | 31.08.2015 | |
Category | Cartes à puce | |
Cc Version | Critères Communs version 3.1r4 | |
Developer | Gemalto / NXP Semiconductors | |
Sponsor | Gemalto | |
Evaluation Facility | Serma Technologies | |
Level | EAL4+ | |
Protection Profile | PP JCS | |
Mutual Recognition | SOG-IS CCRA | |
Augmented | ALC_DVS.2, AVA_VAN.5 | |
Report Link | https://cyber.gouv.fr/sites/default/files/2015/09/ANSSI-CC-2015-30en.pdf | |
Target Link | https://cyber.gouv.fr/sites/default/files/2015/09/anssi_cible_2015_30_LITE.pdf |
References ?
Updates ?
-
16.12.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'Plateforme Java Card MAV31S en configuration ouverte de la carte à puce Optelio Contactless R7S masquée sur le composant P60D144JVA', 'url': 'https://cyber.gouv.fr/produits-certifies/plateforme-java-card-mav31s-en-configuration-ouverte-de-la-carte-puce-optelio', 'description': 'La certificationporte sur la plateforme ouverte Java Card du produit « MultiApp v3.1S » qui est une carte à puce pouvant être en mode contact ou sans contact. Le produit est développé par la société GEMALTO et embarqué sur le microcontrôleur P60D144JVA fabriqué par la société NXP SEMICONDUCTORS. La plateforme ouverte Java Card est destinée à fournir des services de sécurité aux applets qui ser', 'sponsor': 'Gemalto', 'developer': 'Gemalto / NXP Semiconductors', 'cert_id': 'ANSSI-CC-2015/30', 'level': 'EAL4+', 'enhanced': {'cert_id': 'ANSSI-CC-2015/30', 'certification_date': '2015-08-31', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 3.1r4', 'developer': 'Gemalto / NXP Semiconductors', 'sponsor': 'Gemalto', 'evaluation_facility': 'Serma Technologies', 'level': 'EAL4+', 'protection_profile': 'PP JCS', 'mutual_recognition': 'SOG-IS CCRA', 'augmented': 'ALC_DVS.2, AVA_VAN.5', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2015/09/ANSSI-CC-2015-30en.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2015/09/anssi_cible_2015_30_LITE.pdf'}}
.
- The scheme_data property was set to
-
09.12.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': [], 'next_certificates': []}
.
- The following values were inserted:
-
09.11.2024 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'cc_cert_id': {'__update__': {'FR': {'__insert__': {'ANSSI-CC-PP-2010/03-M01': 2}}}}}
data.
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'description': 'La certificationporte sur la plateforme ouverte Java Card du produit « MultiApp v3.1S » qui est une carte à puce pouvant être en mode contact ou sans contact. Le produit est développé par la société GEMALTO et embarqué sur le microcontrôleur P60D144JVA fabriqué par la société NXP SEMICONDUCTORS. La plateforme ouverte Java Card est destinée à fournir des services de sécurité aux applets qui ser', 'cert_id': 'ANSSI-CC-2015/30', 'enhanced': {'__update__': {'cert_id': 'ANSSI-CC-2015/30', 'certification_date': '2015-08-31', 'mutual_recognition': 'SOG-IS CCRA'}}}
data.
- The report_keywords property was updated, with the
-
17.10.2024 The certificate data changed.
Certificate changed
The Protection Profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Java Card™ System Protection Profile Open Configuration, Version 2.6', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/ANSSI-CC-cible_PP-2010-03en.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['PDCP_V1.3']}}]}
.
- The new value is
-
14.10.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'Plateforme Java Card MAV31S en configuration ouverte de la carte à puce Optelio Contactless R7S masquée sur le composant P60D144JVA', 'url': 'https://cyber.gouv.fr/produits-certifies/plateforme-java-card-mav31s-en-configuration-ouverte-de-la-carte-puce-optelio', 'description': 'La certificationporte sur la plateforme ouverte Java Card du produit « MultiApp v3.1S » qui est une carte à puce pouvant être en mode contact ou sans contact. Le produit est développé par la société GEMALTO et embarqué sur le microcontrôleur P60D144JVA fabriqué par la société NXP SEMICONDUCTORS.\n\nLa plateforme ouverte Java Card est destinée à fournir des services de sécurité aux applets qui ser', 'sponsor': 'Gemalto', 'developer': 'Gemalto / NXP Semiconductors', 'cert_id': '2015/30', 'level': 'EAL4+', 'enhanced': {'cert_id': '2015/30', 'certification_date': '31/08/2015', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 3.1r4', 'developer': 'Gemalto / NXP Semiconductors', 'sponsor': 'Gemalto', 'evaluation_facility': 'Serma Technologies', 'level': 'EAL4+', 'protection_profile': 'PP JCS', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ALC_DVS.2, AVA_VAN.5', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2015/09/ANSSI-CC-2015-30en.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2015/09/anssi_cible_2015_30_LITE.pdf'}}
.
- The scheme_data property was set to
-
02.09.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '4228766e7780c51b569f7ffdab617b2dce801e9d3d0ec06f695b80c0c6749b10', 'txt_hash': 'b1186ab3bdd8da3a9b26b65997ea3db69acf9ee13e777b5a5f995ca6fd73865f'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'f34ae63c2033cbd2033e0266d4883ae1d29a0ccd629285f4d51b69cf43f77533', 'txt_hash': '0f9316c2b9ab76b231d9abdd2b205804cd3d1e6c35080c15b9ed1b19b3a24646'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 529824, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 19, '/Title': 'ANSSI-CC-2015/30', '/Author': 'romme', '/Subject': 'Plateforme Java Card MultiApp ID V3.1S en configuration ouverte de la carte à puce Optelio Contactless R7S masquée sur le composant P60D144JVA', '/Keywords': 'ANSSI-CC-CER-F-07EN.008', '/Creator': 'Microsoft® Word 2010', '/CreationDate': "D:20151109154046+01'00'", '/ModDate': "D:20151109154046+01'00'", '/Producer': 'Microsoft® Word 2010', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['mailto:[email protected]', 'http://www.ssi.gouv.fr/']}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 1419745, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 93, '/Title': 'eTravel v1.0 Security Target MAÏA3', '/Author': 'Antoine de Lavernette', '/Subject': 'Security Target', '/Keywords': 'Security Target, CC', '/Creator': 'Microsoft® Office Word 2007', '/CreationDate': "D:20150723151408+02'00'", '/ModDate': "D:20150723151408+02'00'", '/Producer': 'Microsoft® Office Word 2007', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{'FR': {'match_rules': ['Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developer\\(s\\)(.+)Evaluation facility(.+)Recognition arrangements'], 'cert_id': 'ANSSI-CC-2015/30', 'cert_item': 'Plateforme Java Card MAV31S en configuration ouverte de la carte à puce Optelio Contactless R7S masquée sur le composant P60D144JVA', 'cert_item_version': 'Version de la plateforme Java Card MultiApp : 3.1S Version du patch : 1.4', 'ref_protection_profiles': 'ANSSI-CC-PP-2010/03-M01 [PP JCS] Java Card System – Open Configuration, version 3.0', 'cc_version': 'Common Criteria version 3.1 revision 4', 'cc_security_level': 'EAL 4 augmented ALC_DVS.2, AVA_VAN.5', 'developer': 'Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France NXP Semiconductors Box 54 02 40, D-22502 Hambourg, Allemagne Sponsor Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France', 'cert_lab': 'Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France'}}
. - The report_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0870-2014': 3}, 'FR': {'ANSSI-CC-2015/30': 20, 'ANSSI-CC-2014/86': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP- 0035-2007': 2, 'BSI-PP-0035-2007': 1}, 'ANSSI': {'ANSSI-CC-PP-2010/03-M01': 2}}, 'cc_security_level': {'EAL': {'EAL 4': 2, 'EAL4': 2, 'EAL5': 1, 'EAL7': 1, 'EAL 1': 1, 'EAL 3': 1, 'EAL 5': 1, 'EAL 7': 1, 'EAL 4 augmented': 2}, 'ITSEC': {'ITSEC E6 High': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE': 3, 'AGD_PRE': 3}, 'ALC': {'ALC_DVS.2': 3, 'ALC_FLR': 2, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.5': 3, 'AVA_VAN': 2, 'AVA_VLA.5': 1}, 'ASE': {'ASE_TSS.2': 1, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'NXP': {'NXP Semiconductors': 1, 'NXP': 2}, 'Gemalto': {'Gemalto': 18}}, 'eval_facility': {'Serma': {'Serma Technologies': 2}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {'javacardx': {'javacardx.pace': 1}, 'com': {'com.gemalto.javacardx.pace': 1}}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0870-': 2}, 'NL': {'CC-1': 2, 'CC-2': 3, 'CC-3': 3}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0035': 1, 'BSI-CC-PP-0059-2009-MA-01': 1, 'BSI-CC-PP-0075-2012': 1}, 'other': {'PP-SSCD-KG': 2, 'PP-SSCD-KI': 2}}, 'cc_security_level': {'EAL': {'EAL4+': 1, 'EAL4': 5, 'EAL 5+': 1, 'EAL4 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 8, 'ADV_TDS.1': 2, 'ADV_TDS.4': 4, 'ADV_IMP.1': 7, 'ADV_TDS.3': 6, 'ADV_INT.2': 1, 'ADV_FSP.5': 1, 'ADV_FSP.1': 1, 'ADV_FSP.2': 2, 'ADV_FSP.4': 5, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE.1': 7, 'AGD_PRE.1': 6}, 'ALC': {'ALC_DVS.2': 7, 'ALC_TAT.1': 3, 'ALC_TAT.2': 2, 'ALC_CMC.4': 1, 'ALC_DVS.1': 2, 'ALC_LCD.1': 3, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.2': 2, 'ATE_FUN.1': 6, 'ATE_COV.1': 2, 'ATE_IND.2': 1, 'ATE_DPT.1': 3}, 'AVA': {'AVA_VAN.5': 7}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 14, 'FAU_ARP.1.1': 1, 'FAU_SAA.1': 2}, 'FCO': {'FCO_NRO': 6, 'FCO_NRO.2': 3}, 'FCS': {'FCS_RND': 7, 'FCS_RND.1': 11, 'FCS_CKM.1': 20, 'FCS_RND.1.1': 2, 'FCS_CKM.1.1': 1, 'FCS_CKM.2': 7, 'FCS_CKM.2.1': 1, 'FCS_CKM.3': 6, 'FCS_CKM.3.1': 1, 'FCS_CKM.4': 14, 'FCS_CKM.4.1': 1, 'FCS_COP.1': 18, 'FCS_COP.1.1': 1, 'FCS_RNG.1': 1}, 'FDP': {'FDP_ACC': 37, 'FDP_ACC.2': 6, 'FDP_ACF': 30, 'FDP_ACF.1': 16, 'FDP_IFC': 22, 'FDP_IFC.1': 12, 'FDP_IFF': 15, 'FDP_IFF.1': 12, 'FDP_RIP': 77, 'FDP_RIP.1': 10, 'FDP_ROL': 13, 'FDP_ROL.1': 2, 'FDP_SDI.2': 8, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_ITC': 11, 'FDP_ITC.2': 9, 'FDP_IFC.2': 2, 'FDP_UIT': 6, 'FDP_UIT.1': 2, 'FDP_ACC.1': 13, 'FDP_ITC.1': 4}, 'FIA': {'FIA_SOS.2': 1, 'FIA_ATD': 8, 'FIA_ATD.1': 2, 'FIA_UID': 12, 'FIA_UID.2': 1, 'FIA_USB': 7, 'FIA_USB.1': 3, 'FIA_UAU': 6, 'FIA_UAI.1': 1, 'FIA_UAU.1': 1, 'FIA_UID.1': 10}, 'FMT': {'FMT_MSA': 80, 'FMT_MSA.1': 11, 'FMT_MSA.2': 1, 'FMT_MSA.3': 15, 'FMT_SMR': 43, 'FMT_SMR.1': 22, 'FMT_SMF': 30, 'FMT_SMF.1': 9, 'FMT_MTD': 16, 'FMT_MTD.1': 3, 'FMT_MTD.3': 1}, 'FPR': {'FPR_UNO.1': 9, 'FPR_UNO.1.1': 1, 'FPR_UNO': 6}, 'FPT': {'FPT_FLS': 41, 'FPT_FLS.1': 5, 'FPT_TDC.1': 8, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 1, 'FPT_RCV': 14, 'FPT_RCV.3': 4, 'FPT_TST': 6, 'FPT_TST.1': 3, 'FPT_PHP': 6, 'FPT_PHP.3': 2, 'FPT_RCV.4': 2, 'FPT_ITT': 6, 'FPT_ITT.1': 1}, 'FTP': {'FTP_ITC': 8, 'FTP_ITC.1': 5, 'FTP_TRP.1': 2}}, 'cc_claims': {'D': {'D.APP_CODE': 6, 'D.APP_C_DATA': 3, 'D.APP_I_DATA': 4, 'D.PIN': 4, 'D.API_DATA': 3, 'D.CRYPTO': 5, 'D.JCS_CODE': 3, 'D.JCS_DATA': 5, 'D.SEC_DATA': 7}, 'O': {'O.SID': 13, 'O.FIREWALL': 12, 'O.GLOBAL_ARRAYS_CONFID': 6, 'O.GLOBAL_ARRAYS_INTEG': 5, 'O.NATIVE': 11, 'O.OPERATE': 15, 'O.REALLOCATION': 5, 'O.RESOURCES': 9, 'O.ALARM': 15, 'O.CIPHER': 10, 'O.KEY-MNGT': 5, 'O.PIN-MNGT': 5, 'O.TRANSACTION': 6, 'O.OBJ-DELETION': 4, 'O.DELETION': 8, 'O.LOAD': 6, 'O.INSTALL': 11, 'O.SCP': 30, 'O.CARD-MANAGEMENT': 2, 'O.RND': 12, 'O.KEY_MNGT': 4, 'O.CARD_MANAGEMENT': 18, 'O.KEY-': 1, 'O.PIN-': 1, 'O.HW_AES': 2, 'O.APPLET': 28, 'O.CODE_PKG': 7, 'O.JAVAOBJECT': 56, 'O.CODE_PCKG': 16, 'O.GLOBAL_ARRAYS_CO': 3, 'O.GLOBAL_ARRAYS_INT': 3}, 'T': {'T.CONFID-APPLI-DATA': 4, 'T.CONFID-JCS-CODE': 4, 'T.CONFID-JCS-DATA': 4, 'T.INTEG-APPLI-CODE': 7, 'T.INTEG-APPLI-DATA': 8, 'T.INTEG-JCS-CODE': 3, 'T.INTEG-JCS-DATA': 4, 'T.SID': 8, 'T.EXE-CODE': 8, 'T.NATIVE': 4, 'T.RESOURCES': 3, 'T.DELETION': 3, 'T.INSTALL': 4, 'T.OBJ-DELETION': 4, 'T.PHYSICAL': 4}, 'A': {'A.APPLET': 5, 'A.DELETION': 5, 'A.VERIFICATION': 4}, 'R': {'R.JAVA': 9}, 'OP': {'OP.ARRAY_ACCESS': 6, 'OP.CREATE': 10, 'OP.DELETE_APPLET': 6, 'OP.DELETE_PCKG': 4, 'OP.DELETE_PCKG_APPLET': 4, 'OP.INSTANCE_FIELD': 6, 'OP.INVK_VIRTUAL': 8, 'OP.INVK_INTERFACE': 10, 'OP.JAVA': 8, 'OP.THROW': 7, 'OP.TYPE_ACCESS': 7, 'OP.PUT': 7}, 'OE': {'OE.VERIFICATION': 25, 'OE.APPLET': 4, 'OE.CODE-EVIDENCE': 10, 'OE.CODE_EVIDENCE': 1}, 'OSP': {'OSP': 1, 'OSP.VERIFICATION': 4, 'OSP.RNG': 1, 'OSP.RND': 3}}, 'vendor': {'NXP': {'NXP': 10}, 'Gemalto': {'Gemalto': 105}}, 'eval_facility': {'Serma': {'SERMA': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 18}}, 'DES': {'DES': {'DES': 20}, '3DES': {'TDEA': 1, 'Triple-DES': 2, 'TDES': 9}}, 'constructions': {'MAC': {'CMAC': 1}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 1}, 'ECDSA': {'ECDSA': 3}, 'ECC': {'ECC': 8}}, 'FF': {'DH': {'Diffie-Hellman': 4, 'DH': 5}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 4}, 'SHA2': {'SHA-224': 3, 'SHA-256': 4, 'SHA-384': 4, 'SHA-512': 3, 'SHA224': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 10}, 'KA': {'Key agreement': 2}}, 'crypto_protocol': {'PACE': {'PACE': 4}}, 'randomness': {'PRNG': {'PRNG': 1}, 'RNG': {'RNG': 7, 'RND': 15}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 3, 'physical probing': 2, 'DPA': 1}, 'FI': {'physical tampering': 1, 'malfunction': 2, 'Malfunction': 3, 'fault induction': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS180-2': 1, 'FIPS197': 4}, 'NIST': {'SP 800-38': 2}, 'PKCS': {'PKCS#3': 1, 'PKCS#1': 8, 'PKCS#5': 5}, 'BSI': {'AIS31': 1}, 'SCP': {'SCP01': 3, 'SCP02': 3, 'SCP03': 3}, 'CC': {'CCMB-2009-07-001': 1, 'CCMB-2009-07-002': 1, 'CCMB-2009-07-003': 1, 'CCMB-2009-07-004': 1}}, 'javacard_version': {'JavaCard': {'Java Card 2.2.2': 7, 'JC2.2.2': 1}}, 'javacard_api_const': {'misc': {'TYPE_ACCESS': 7}}, 'javacard_packages': {'javacard': {'javacard.framework': 2}}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are': 1}}}
. - The report_filename property was set to
ANSSI-CC-2015-30en.pdf
. - The st_filename property was set to
anssi_cible_2015_30_LITE.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['SERMA']
. - The cert_id property was set to
ANSSI-CC-2015/30
. - The report_references property was updated, with the
{'directly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2015/38']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2015/38']}, 'directly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2014/86', 'BSI-DSZ-CC-0870-2014']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2014/86', 'BSI-DSZ-CC-0837-2013', 'BSI-DSZ-CC-0829-2012', 'ANSSI-CC-2014/06', 'BSI-DSZ-CC-0870-2014', 'BSI-DSZ-CC-0728-2011', 'BSI-DSZ-CC-0640-2010']}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015-30en.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi_cible_2015_30_LITE.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
. - The report_references property was updated, with the
{'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}]}
values discarded.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'Plateforme Java Card MAV31S en configuration ouverte de la carte à puce Optelio Contactless R7S masquée sur le composant P60D144JVA', 'url': 'https://cyber.gouv.fr/produits-certifies/plateforme-java-card-mav31s-en-configuration-ouverte-de-la-carte-puce-optelio', 'description': 'La certificationporte sur la plateforme ouverte Java Card du produit « MultiApp v3.1S » qui est une carte à puce pouvant être en mode contact ou sans contact. Le produit est développé par la société GEMALTO et embarqué sur le microcontrôleur P60D144JVA fabriqué par la société NXP SEMICONDUCTORS.\n\nLa plateforme ouverte Java Card est destinée à fournir des services de sécurité aux applets qui ser', 'sponsor': 'Gemalto', 'developer': 'Gemalto / NXP Semiconductors', 'cert_id': '2015/30', 'level': 'EAL4+', 'enhanced': {'cert_id': '2015/30', 'certification_date': '31/08/2015', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 3.1r4', 'developer': 'Gemalto / NXP Semiconductors', 'sponsor': 'Gemalto', 'evaluation_facility': 'Serma Technologies', 'level': 'EAL4+', 'protection_profile': 'PP JCS', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ALC_DVS.2, AVA_VAN.5', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2015/09/ANSSI-CC-2015-30en.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2015/09/anssi_cible_2015_30_LITE.pdf'}}
.
- The scheme_data property was set to
-
31.07.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Plateforme Java Card MAV31S en configuration ouverte de la carte à puce Optelio Contactless R7S masquée sur le composant P60D144JVA (version du patch: 1.4) was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "585fe7142c257928",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2015/30",
"cert_lab": [
"SERMA"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VLA",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"1.4"
]
},
"indirect_transitive_cves": null,
"next_certificates": [],
"prev_certificates": [],
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2015/38"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2014/86",
"BSI-DSZ-CC-0870-2014"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2015/38"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2014/06",
"ANSSI-CC-2014/86",
"BSI-DSZ-CC-0728-2011",
"BSI-DSZ-CC-0870-2014",
"BSI-DSZ-CC-0829-2012",
"BSI-DSZ-CC-0837-2013",
"BSI-DSZ-CC-0640-2010"
]
}
},
"scheme_data": {
"cert_id": "ANSSI-CC-2015/30",
"description": "La certificationporte sur la plateforme ouverte Java Card du produit \u00ab MultiApp v3.1S \u00bb qui est une carte \u00e0 puce pouvant \u00eatre en mode contact ou sans contact. Le produit est d\u00e9velopp\u00e9 par la soci\u00e9t\u00e9 GEMALTO et embarqu\u00e9 sur le microcontr\u00f4leur P60D144JVA fabriqu\u00e9 par la soci\u00e9t\u00e9 NXP SEMICONDUCTORS. La plateforme ouverte Java Card est destin\u00e9e \u00e0 fournir des services de s\u00e9curit\u00e9 aux applets qui ser",
"developer": "Gemalto / NXP Semiconductors",
"enhanced": {
"augmented": "ALC_DVS.2, AVA_VAN.5",
"category": "Cartes \u00e0 puce",
"cc_version": "Crit\u00e8res Communs version 3.1r4",
"cert_id": "ANSSI-CC-2015/30",
"certification_date": "2015-08-31",
"developer": "Gemalto / NXP Semiconductors",
"evaluation_facility": "Serma Technologies",
"level": "EAL4+",
"mutual_recognition": "SOG-IS CCRA",
"protection_profile": "PP JCS",
"report_link": "https://cyber.gouv.fr/sites/default/files/2015/09/ANSSI-CC-2015-30en.pdf",
"sponsor": "Gemalto",
"target_link": "https://cyber.gouv.fr/sites/default/files/2015/09/anssi_cible_2015_30_LITE.pdf"
},
"level": "EAL4+",
"product": "Plateforme Java Card MAV31S en configuration ouverte de la carte \u00e0 puce Optelio Contactless R7S masqu\u00e9e sur le composant P60D144JVA",
"sponsor": "Gemalto",
"url": "https://cyber.gouv.fr/produits-certifies/plateforme-java-card-mav31s-en-configuration-ouverte-de-la-carte-puce-optelio"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2016-10-14",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_30-M01.pdf",
"maintenance_st_link": null,
"maintenance_title": "ANSSI-CC-2015/30-M01"
}
]
},
"manufacturer": "Gemalto / NXP Semiconductors",
"manufacturer_web": "https://www.gemalto.com/",
"name": "Plateforme Java Card MAV31S en configuration ouverte de la carte \u00e0 puce Optelio Contactless R7S masqu\u00e9e sur le composant P60D144JVA (version du patch: 1.4)",
"not_valid_after": "2020-08-31",
"not_valid_before": "2015-08-31",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "ANSSI-CC-2015-30en.pdf",
"report_frontpage": {
"FR": {
"cc_security_level": "EAL 4 augmented ALC_DVS.2, AVA_VAN.5",
"cc_version": "Common Criteria version 3.1 revision 4",
"cert_id": "ANSSI-CC-2015/30",
"cert_item": "Plateforme Java Card MAV31S en configuration ouverte de la carte \u00e0 puce Optelio Contactless R7S masqu\u00e9e sur le composant P60D144JVA",
"cert_item_version": "Version de la plateforme Java Card MultiApp : 3.1S Version du patch : 1.4",
"cert_lab": "Serma Technologies 14 rue Galil\u00e9e, CS 10055, 33615 Pessac Cedex, France",
"developer": "Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France NXP Semiconductors Box 54 02 40, D-22502 Hambourg, Allemagne Sponsor Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France",
"match_rules": [
"Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developer\\(s\\)(.+)Evaluation facility(.+)Recognition arrangements"
],
"ref_protection_profiles": "ANSSI-CC-PP-2010/03-M01 [PP JCS] Java Card System \u2013 Open Configuration, version 3.0"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0870-2014": 3
},
"FR": {
"ANSSI-CC-2014/86": 2,
"ANSSI-CC-2015/30": 20,
"ANSSI-CC-PP-2010/03-M01": 2
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"ANSSI": {
"ANSSI-CC-PP-2010/03-M01": 2
},
"BSI": {
"BSI-PP- 0035-2007": 2,
"BSI-PP-0035-2007": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_FSP": 1,
"ADV_IMP": 1,
"ADV_INT": 1,
"ADV_SPM": 1,
"ADV_TDS": 1
},
"AGD": {
"AGD_OPE": 3,
"AGD_PRE": 3
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMS": 1,
"ALC_DEL": 1,
"ALC_DVS": 1,
"ALC_DVS.2": 3,
"ALC_FLR": 2,
"ALC_TAT": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_ECD": 1,
"ASE_INT": 1,
"ASE_OBJ": 1,
"ASE_REQ": 1,
"ASE_SPD": 1,
"ASE_TSS": 1,
"ASE_TSS.2": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_DPT": 1,
"ATE_FUN": 1,
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.5": 3,
"AVA_VLA.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 3": 1,
"EAL 4": 2,
"EAL 4 augmented": 2,
"EAL 5": 1,
"EAL 7": 1,
"EAL4": 2,
"EAL5": 1,
"EAL7": 1
},
"ITSEC": {
"ITSEC E6 High": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Serma": {
"Serma Technologies": 2
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {
"com": {
"com.gemalto.javacardx.pace": 1
},
"javacardx": {
"javacardx.pace": 1
}
},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Gemalto": {
"Gemalto": 18
},
"NXP": {
"NXP": 2,
"NXP Semiconductors": 1
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "romme",
"/CreationDate": "D:20151109154046+01\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2010",
"/Keywords": "ANSSI-CC-CER-F-07EN.008",
"/ModDate": "D:20151109154046+01\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2010",
"/Subject": "Plateforme Java Card MultiApp ID V3.1S en configuration ouverte de la carte \u00e0 puce Optelio Contactless R7S masqu\u00e9e sur le composant P60D144JVA",
"/Title": "ANSSI-CC-2015/30",
"pdf_file_size_bytes": 529824,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"mailto:[email protected]",
"http://www.ssi.gouv.fr/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 19
},
"st_filename": "anssi_cible_2015_30_LITE.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 8
},
"ECDH": {
"ECDH": 1
},
"ECDSA": {
"ECDSA": 3
}
},
"FF": {
"DH": {
"DH": 5,
"Diffie-Hellman": 4
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0870-": 2
},
"NL": {
"CC-1": 2,
"CC-2": 3,
"CC-3": 3
}
},
"cc_claims": {
"A": {
"A.APPLET": 5,
"A.DELETION": 5,
"A.VERIFICATION": 4
},
"D": {
"D.API_DATA": 3,
"D.APP_CODE": 6,
"D.APP_C_DATA": 3,
"D.APP_I_DATA": 4,
"D.CRYPTO": 5,
"D.JCS_CODE": 3,
"D.JCS_DATA": 5,
"D.PIN": 4,
"D.SEC_DATA": 7
},
"O": {
"O.ALARM": 15,
"O.APPLET": 28,
"O.CARD-MANAGEMENT": 2,
"O.CARD_MANAGEMENT": 18,
"O.CIPHER": 10,
"O.CODE_PCKG": 16,
"O.CODE_PKG": 7,
"O.DELETION": 8,
"O.FIREWALL": 12,
"O.GLOBAL_ARRAYS_CO": 3,
"O.GLOBAL_ARRAYS_CONFID": 6,
"O.GLOBAL_ARRAYS_INT": 3,
"O.GLOBAL_ARRAYS_INTEG": 5,
"O.HW_AES": 2,
"O.INSTALL": 11,
"O.JAVAOBJECT": 56,
"O.KEY-": 1,
"O.KEY-MNGT": 5,
"O.KEY_MNGT": 4,
"O.LOAD": 6,
"O.NATIVE": 11,
"O.OBJ-DELETION": 4,
"O.OPERATE": 15,
"O.PIN-": 1,
"O.PIN-MNGT": 5,
"O.REALLOCATION": 5,
"O.RESOURCES": 9,
"O.RND": 12,
"O.SCP": 30,
"O.SID": 13,
"O.TRANSACTION": 6
},
"OE": {
"OE.APPLET": 4,
"OE.CODE-EVIDENCE": 10,
"OE.CODE_EVIDENCE": 1,
"OE.VERIFICATION": 25
},
"OP": {
"OP.ARRAY_ACCESS": 6,
"OP.CREATE": 10,
"OP.DELETE_APPLET": 6,
"OP.DELETE_PCKG": 4,
"OP.DELETE_PCKG_APPLET": 4,
"OP.INSTANCE_FIELD": 6,
"OP.INVK_INTERFACE": 10,
"OP.INVK_VIRTUAL": 8,
"OP.JAVA": 8,
"OP.PUT": 7,
"OP.THROW": 7,
"OP.TYPE_ACCESS": 7
},
"OSP": {
"OSP": 1,
"OSP.RND": 3,
"OSP.RNG": 1,
"OSP.VERIFICATION": 4
},
"R": {
"R.JAVA": 9
},
"T": {
"T.CONFID-APPLI-DATA": 4,
"T.CONFID-JCS-CODE": 4,
"T.CONFID-JCS-DATA": 4,
"T.DELETION": 3,
"T.EXE-CODE": 8,
"T.INSTALL": 4,
"T.INTEG-APPLI-CODE": 7,
"T.INTEG-APPLI-DATA": 8,
"T.INTEG-JCS-CODE": 3,
"T.INTEG-JCS-DATA": 4,
"T.NATIVE": 4,
"T.OBJ-DELETION": 4,
"T.PHYSICAL": 4,
"T.RESOURCES": 3,
"T.SID": 8
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0059-2009-MA-01": 1,
"BSI-CC-PP-0075-2012": 1,
"BSI-PP-0035": 1
},
"other": {
"PP-SSCD-KG": 2,
"PP-SSCD-KI": 2
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 8,
"ADV_FSP": 1,
"ADV_FSP.1": 1,
"ADV_FSP.2": 2,
"ADV_FSP.4": 5,
"ADV_FSP.5": 1,
"ADV_IMP": 1,
"ADV_IMP.1": 7,
"ADV_INT.2": 1,
"ADV_TDS": 1,
"ADV_TDS.1": 2,
"ADV_TDS.3": 6,
"ADV_TDS.4": 4
},
"AGD": {
"AGD_OPE.1": 7,
"AGD_PRE.1": 6
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 2,
"ALC_DVS.2": 7,
"ALC_LCD.1": 3,
"ALC_TAT.1": 3,
"ALC_TAT.2": 2
},
"ATE": {
"ATE_COV.1": 2,
"ATE_COV.2": 2,
"ATE_DPT.1": 3,
"ATE_FUN.1": 6,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.5": 7
}
},
"cc_security_level": {
"EAL": {
"EAL 5+": 1,
"EAL4": 5,
"EAL4 augmented": 2,
"EAL4+": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP.1": 14,
"FAU_ARP.1.1": 1,
"FAU_SAA.1": 2
},
"FCO": {
"FCO_NRO": 6,
"FCO_NRO.2": 3
},
"FCS": {
"FCS_CKM.1": 20,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 7,
"FCS_CKM.2.1": 1,
"FCS_CKM.3": 6,
"FCS_CKM.3.1": 1,
"FCS_CKM.4": 14,
"FCS_CKM.4.1": 1,
"FCS_COP.1": 18,
"FCS_COP.1.1": 1,
"FCS_RND": 7,
"FCS_RND.1": 11,
"FCS_RND.1.1": 2,
"FCS_RNG.1": 1
},
"FDP": {
"FDP_ACC": 37,
"FDP_ACC.1": 13,
"FDP_ACC.2": 6,
"FDP_ACF": 30,
"FDP_ACF.1": 16,
"FDP_IFC": 22,
"FDP_IFC.1": 12,
"FDP_IFC.2": 2,
"FDP_IFF": 15,
"FDP_IFF.1": 12,
"FDP_ITC": 11,
"FDP_ITC.1": 4,
"FDP_ITC.2": 9,
"FDP_RIP": 77,
"FDP_RIP.1": 10,
"FDP_ROL": 13,
"FDP_ROL.1": 2,
"FDP_SDI.2": 8,
"FDP_SDI.2.1": 1,
"FDP_SDI.2.2": 1,
"FDP_UIT": 6,
"FDP_UIT.1": 2
},
"FIA": {
"FIA_ATD": 8,
"FIA_ATD.1": 2,
"FIA_SOS.2": 1,
"FIA_UAI.1": 1,
"FIA_UAU": 6,
"FIA_UAU.1": 1,
"FIA_UID": 12,
"FIA_UID.1": 10,
"FIA_UID.2": 1,
"FIA_USB": 7,
"FIA_USB.1": 3
},
"FMT": {
"FMT_MSA": 80,
"FMT_MSA.1": 11,
"FMT_MSA.2": 1,
"FMT_MSA.3": 15,
"FMT_MTD": 16,
"FMT_MTD.1": 3,
"FMT_MTD.3": 1,
"FMT_SMF": 30,
"FMT_SMF.1": 9,
"FMT_SMR": 43,
"FMT_SMR.1": 22
},
"FPR": {
"FPR_UNO": 6,
"FPR_UNO.1": 9,
"FPR_UNO.1.1": 1
},
"FPT": {
"FPT_FLS": 41,
"FPT_FLS.1": 5,
"FPT_ITT": 6,
"FPT_ITT.1": 1,
"FPT_PHP": 6,
"FPT_PHP.3": 2,
"FPT_RCV": 14,
"FPT_RCV.3": 4,
"FPT_RCV.4": 2,
"FPT_TDC.1": 8,
"FPT_TDC.1.1": 1,
"FPT_TDC.1.2": 1,
"FPT_TST": 6,
"FPT_TST.1": 3
},
"FTP": {
"FTP_ITC": 8,
"FTP_ITC.1": 5,
"FTP_TRP.1": 2
}
},
"certification_process": {
"OutOfScope": {
"a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are": 1,
"out of scope": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PACE": {
"PACE": 4
}
},
"crypto_scheme": {
"KA": {
"Key agreement": 2
},
"MAC": {
"MAC": 10
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Serma": {
"SERMA": 1
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 4
},
"SHA2": {
"SHA-224": 3,
"SHA-256": 4,
"SHA-384": 4,
"SHA-512": 3,
"SHA224": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {
"misc": {
"TYPE_ACCESS": 7
}
},
"javacard_packages": {
"javacard": {
"javacard.framework": 2
}
},
"javacard_version": {
"JavaCard": {
"JC2.2.2": 1,
"Java Card 2.2.2": 7
}
},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"PRNG": 1
},
"RNG": {
"RND": 15,
"RNG": 7
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 3,
"fault induction": 2,
"malfunction": 2,
"physical tampering": 1
},
"SCA": {
"DPA": 1,
"Leak-Inherent": 3,
"physical probing": 2
}
},
"standard_id": {
"BSI": {
"AIS31": 1
},
"CC": {
"CCMB-2009-07-001": 1,
"CCMB-2009-07-002": 1,
"CCMB-2009-07-003": 1,
"CCMB-2009-07-004": 1
},
"FIPS": {
"FIPS180-2": 1,
"FIPS197": 4
},
"NIST": {
"SP 800-38": 2
},
"PKCS": {
"PKCS#1": 8,
"PKCS#3": 1,
"PKCS#5": 5
},
"SCP": {
"SCP01": 3,
"SCP02": 3,
"SCP03": 3
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 18
}
},
"DES": {
"3DES": {
"TDEA": 1,
"TDES": 9,
"Triple-DES": 2
},
"DES": {
"DES": 20
}
},
"constructions": {
"MAC": {
"CMAC": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Gemalto": {
"Gemalto": 105
},
"NXP": {
"NXP": 10
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Antoine de Lavernette",
"/CreationDate": "D:20150723151408+02\u002700\u0027",
"/Creator": "Microsoft\u00ae Office Word 2007",
"/Keywords": "Security Target, CC",
"/ModDate": "D:20150723151408+02\u002700\u0027",
"/Producer": "Microsoft\u00ae Office Word 2007",
"/Subject": "Security Target",
"/Title": "eTravel v1.0 Security Target MA\u00cfA3",
"pdf_file_size_bytes": 1419745,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 93
}
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": "EAL4+",
"pp_ids": {
"_type": "Set",
"elements": [
"PDCP_V1.3"
]
},
"pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/ANSSI-CC-cible_PP-2010-03en.pdf",
"pp_name": "Java Card\u2122 System Protection Profile Open Configuration, Version 2.6"
}
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015-30en.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"ALC_DVS.2",
"AVA_VAN.5",
"EAL4+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi_cible_2015_30_LITE.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "4228766e7780c51b569f7ffdab617b2dce801e9d3d0ec06f695b80c0c6749b10",
"txt_hash": "b1186ab3bdd8da3a9b26b65997ea3db69acf9ee13e777b5a5f995ca6fd73865f"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "f34ae63c2033cbd2033e0266d4883ae1d29a0ccd629285f4d51b69cf43f77533",
"txt_hash": "0f9316c2b9ab76b231d9abdd2b205804cd3d1e6c35080c15b9ed1b19b3a24646"
}
},
"status": "archived"
}