RC-SA08/01et RC-SA08/02 version 1.00

CSV information ?

Status archived
Valid from 21.08.2017
Valid until 21.08.2022
Scheme 🇫🇷 FR
Manufacturer Sony Corporation
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level AVA_VAN.5, ALC_DVS.2, ASE_TSS.2, EAL5+
Protection profiles

Heuristics summary ?

Certificate ID: ANSSI-CC-2017/44

Certificate ?

Certification report ?

Extracted keywords

Symmetric Algorithms
DES

CPLC
IC Type
Vendor
STMicroelectronics

Security level
EAL 5, EAL2, EAL5, EAL7, EAL 1, EAL 3, EAL 7, ITSEC E6 Elevé
Security Assurance Requirements (SAR)
ADV_IMP.2, ADV_INT.3, ADV_TDS.5, ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_CMC.5, ALC_FLR.1, ALC_TAT.3, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_COV.3, ATE_FUN.2, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSS
Protection profiles
BSI-PP-0084-2014
Certificates
ANSSI-CC-2017/44, ANSSI-CC-2016/58
Evaluation facilities
Serma Safety & Security, SERMA

Standards
CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004

File metadata

Keywords ANSSI-CC-CER-F-07.024
Creation date D:20170904143302+02'00'
Modification date D:20170911160750+02'00'
Pages 16
Creator Microsoft® Word 2010
Producer Microsoft® Word 2010

Frontpage

Certificate ID ANSSI-CC-2017/44
Certified item RC-SA08/01 et RC-SA08/02
Certification lab Serma Safety & Security 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
Developer Sony Corporation Sony City Osaki 2-10-1 Osaki Shinagawa- ku Tokyo, 141-86-10 Japan STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, 13106 Rousset, France Commanditaire Sony Corporation Sony City Osaki 2-10-1 Osaki Shinagawa-ku Tokyo, 141-86-10 Japan

References

Outgoing
  • ANSSI-CC-2016/58 - archived - ST31G480 A02 including optional cryptographic library NESLIB and optional technologies MIFARE DESFire EV1 and MIFARE Plus X

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES
Schemes
MAC
Randomness
RND, RNG

Vendor
STMicroelectronics, STM

Security level
EAL5, EAL5 augmented
Claims
O.AC, O.SC, O.RND, T.RND
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, ADV_FSP, ADV_TDS.3, ADV_IMP.2, ADV_INT.3, ADV_TDS.5, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.2, ALC_CMS, ALC_DVS.1, ALC_CMC.5, ALC_FLR.1, ALC_TAT.3, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, ATE_DPT.1, ATE_COV.3, ATE_FUN.2, AVA_VAN.5, ASE_TSS.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_SAS.1, FAU_SAS, FAU_SAS.1.1, FCS_RNG.1, FCS_RNG, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM.1, FCS_CKM.4, FDP_SDC.1, FDP_ACC.1, FDP_ACC.1.1, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_SDI, FDP_SDC, FDP_SDI.2, FDP_SDI.2.1, FDP_SDI.2.2, FDP_SDC.1.1, FDP_ITT.1, FDP_ITT.1.1, FDP_IFC.1, FDP_IFC.1.1, FDP_IFF.1, FDP_ACC.2, FDP_ITC.1, FDP_ITC.2, FDP_TDC.1, FDP_RIP.1, FDP_ROL.1, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.4, FIA_UAU.4.1, FIA_UID.2, FIA_UAU.2, FIA_UAU.5, FMT_LIM.1, FMT_LIM.2, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MOF.1, FMT_MOF.1.1, FMT_MSA.1, FMT_MSA.1.1, FMT_SMF.1, FMT_SMF.1.1, FMT_LIM.1.1, FMT_LIM.2.1, FMT_MSA.3, FMT_MTD.1, FPR_UNL.1, FPR_UNL.1.1, FPT_FLS.1, FPT_FLS.1.1, FPT_PHP.3, FPT_PHP.3.1, FPT_ITT.1, FPT_ITT.1.1, FPT_TRP.1, FPT_RPL.1, FPT_TDC.1, FRU_FLT.2, FRU_FLT.2.1, FRU_RSA.2, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3
Protection profiles
BSI-PP-0084

Side-channel analysis
Leak-Inherent, Physical Probing, physical probing, Side-channel, side-channel, Malfunction, malfunction
Certification process
out of scope, FeliCa OS, and APDU commands, which are processed by the Java Card System. The antenna, which is out of scope of the TOE, provides the RF interface on the smart card. The Java Card System and Java Applets are

Standards
ISO/IEC 18092, ISO/IEC 14443, ISO/IEC 7816

Heuristics ?

Certificate ID: ANSSI-CC-2017/44

Extracted SARs

ADV_ARC.1, ADV_FSP.5, ADV_IMP.2, ADV_INT.3, ADV_TDS.5, AGD_OPE.1, AGD_PRE.1, ALC_CMC.5, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_FLR.1, ALC_LCD.1, ALC_TAT.3, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.2, ATE_COV.3, ATE_DPT.3, ATE_FUN.2, ATE_IND.2, AVA_VAN.5

Similar certificates

Name Certificate ID
Ricoh imagio MP C2201 SP with imagio FAX Unit Type28, and Ricoh imagio MP C2201 SPF Version: - Software version: System/Copy 1.01, Network Support 10.56, Scanner 01.05, Printer 1.01d, Fax 02.00.00, RemoteFax 02.00.00, Web Support 1.01, Web Uapl 1.02, NetworkDocBox 1.03, animation 0.01, RPCS 3.10.17, RPCS Font 1.00, Engine 1.07:03, OpePanel 1.02, LANG0 1.02, LANG1 1.02, Data Erase Std 1.01x - Hardware version: Ic Key 01020700, Ic Ctlr 03 - Option version: GWFCU3-22(WW) 02.00.00 JISEC-CC-CRP-C0323 Compare
Ricoh Aficio MP C2051/C2551, Savin C9120/C9125, Lanier LD620C/LD625C, Lanier MP C2051/C2551, nashuatec MP C2051/C2551, Rex-Rotary MP C2051/C2551, Gestetner MP C2051/C2551, infotec MP C2051/C2551 all of above with Fax Option Type C2551 Version: - Software version: System/Copy 1.01, Network Support 10.56, Scanner 01.05, Printer 1.01e, Fax 02.00.00, RemoteFax 02.00.00, Web Support 1.01, Web Uapl 1.02, NetworkDocBox 1.03, animation 0.01, PCL 1.01, OptionPCLFont 1.02, Engine 1.07:03, OpePanel 1.02, LANG0 1.02, LANG1 1.02, Data Erase Std 1.01x - Hardware version: Ic Key 01020700, Ic Ctlr 03 - Option version: GWFCU3-22(WW) 02.00.00 JISEC-CC-CRP-C0325 Compare
Ricoh Aficio MP C3001/C3001G/C3501/C3501G, Savin C9130/C9130G/C9135/C9135G, Lanier LD630C/LD630CG/LD635C/LD635CG, Lanier MP C3001/C3501, nashuatec MP C3001/C3501, Rex-Rotary MP C3001/C3501, Gestetner MP C3001/C3501, infotec MP C3001/C3501 all of above with Fax Option Type C5501 Version: - Software version: System/Copy 1.03, Network Support 10.54, Scanner 01.05, Printer 1.02, Fax 02.00.00, RemoteFax 01.00.00, Web Support 1.05, Web Uapl 1.01, NetworkDocBox 1.01, animation 1.00, PCL 1.02, OptionPCLFont 1.02, Engine 1.03:04, OpePanel 1.04, LANG0 1.04, LANG1 1.04, Data Erase Std 1.01x - Hardware version: Ic Key 01020700, Ic Ctlr 03 - Option version: GWFCU3-21(WW) 03.00.00 JISEC-CC-CRP-C0300 Compare
Ricoh Aficio MP C4501/C4501G/C5501/C5501G, Savin C9145/C9145G/C9155/C9155G, Lanier LD645C/LD645CG/LD655C/LD655CG, Lanier MP C4501/C5501, nashuatec MP C4501/C5501, Rex-Rotary MP C4501/C5501, Gestetner MP C4501/C5501, infotec MP C4501/C5501 all of above with Fax Option Type C5501 Version: - Software version: System/Copy 2.02, Network Support 10.54, Scanner 01.11.1, Printer 1.01, Fax 02.01.00, RemoteFax 01.00.00, Web Support 1.06, Web Uapl 1.01, NetworkDocBox 1.01, animation 1.00, PCL 1.02, OptionPCLFont 1.02, Engine 1.03:04, OpePanel 1.06, LANG0 1.06, LANG1 1.06, Data Erase Std 1.01x - Hardware version: Ic Key 01020700, Ic Ctlr 03 - Option version: GWFCU3-21(WW) 03.00.00 JISEC-CC-CRP-C0302 Compare
Ricoh Aficio MP C4501A/C4501AG/C5501A/C5501AG, Savin C9145A/C9145AG/C9155A/C9155AG, Lanier LD645CA/LD645CAG/LD655CA/LD655CAG, Lanier MP C4501A/C5501A, nashuatec MP C4501A/C5501A, Rex-Rotary MP C4501A/C5501A, Gestetner MP C4501A/C5501A, infotec MP C4501A/C5501A all of above with Fax Option Type C5501 Version: - Software version: System/Copy 2.02, Network Support 10.54, Scanner 01.11.1, Printer 1.01, Fax 02.01.00, RemoteFax 01.00.00, Web Support 1.06, Web Uapl 1.01, NetworkDocBox 1.01, animation 1.00, PCL 1.02, OptionPCLFont 1.02, Engine 1.03:03, OpePanel 1.06, LANG0 1.06, LANG1 1.06, Data Erase Std 1.01x - Hardware version: Ic Key 01020700, Ic Ctlr 03 - Option version: GWFCU3-21(WW) 03.00.00 JISEC-CC-CRP-C0326 Compare
Ricoh Aficio MP C6501 SP/C7501 SP, Savin C9065/C9075, Lanier LD365C/LD375C, Lanier MP C6501 SP/C7501 SP, nashuatec MP C6501 SP/C7501 SP, Rex-Rotary MP C6501 SP/C7501 SP, Gestetner MP C6501 SP/C7501 SP, infotec MP C6501 SP/C7501 SP all of above with Fax Option Type C7501, DataOverwriteSecurity Unit Type H, and HDD Encryption Unit Type A Version: - Software version: System/Copy 1.03, Network Support 9.62, Scanner 01.05, Printer 1.03, Fax 02.00.00, RemoteFax 02.00.00, Web Support 1.04, Web Uapl 1.01, NetworkDocBox 1.01, animation 1.00, PCL 1.08, OptionPCLFont 1.02, Engine 1.07:06, OpePanel 1.04, LANG0 1.03, LANG1 1.03 - Hardware version: Ic Key 01020700, Ic Ctlr 03 - Option version: GWFCU3-18(WW) 02.00.00, Data Erase Opt 1.01x JISEC-CC-CRP-C0321 Compare
Ricoh imagio MP C7501 SP/C6001 SP both with imagio FAX Unit Type23, imagio Security Card Type7, and imagio HDD Encryption Card Type7 Version: - Software version: System/Copy 1.03, Network Support 9.62, Scanner 01.05, Printer 1.03, Fax 02.00.00, RemoteFax 02.00.00, Web Support 1.04, Web Uapl 1.01, NetworkDocBox 1.01, animation 1.00, RPCS 3.10.6, RPCS Font 1.00, Engine 1.07:06, OpePanel 1.04, LANG0 1.03, LANG1 1.03 - Hardware version: Ic Key 01020700, Ic Ctlr 03 - Option version: GWFCU3-18(WW) 02.00.00, Data Erase Opt 1.01x JISEC-CC-CRP-C0320 Compare
Showing 5 out of 7.

Scheme data ?

Product RC-SA08/01 et RC-SA08/02 - v.1.0
Url https://cyber.gouv.fr/produits-certifies/rc-sa0801-et-rc-sa0802-v10
Description Le produit certifié est la famille de composants pour carte à puce FeliCa « RC-SA08/01 et RC-SA08/02 version 1.00 » développée par SONY CORPORATION et STMICROELECTRONICS. Le produit est un microcontrôleur intégrant le système d’exploitation embarqué FeliCa OS. Le microcontrôleur seul n’est pas un produit utilisable en tant que tel. Il est destiné à héberger une ou plusieurs applications. Il doi
Sponsor Sony Corporation
Developer Sony Corporation, STMicroelectronics
Cert Id ANSSI-CC-2017/44
Level EAL5+
Enhanced
Cert Id ANSSI-CC-2017/44
Certification Date 21.08.2017
Category Micro-circuits
Cc Version Critères Communs version 3.1r4
Developer Sony Corporation, STMicroelectronics
Sponsor Sony Corporation
Evaluation Facility Serma Safety & Security
Level EAL5+
Protection Profile PP 0084
Mutual Recognition SOG-IS CCRA
Augmented ASE_TSS.2, ALC_DVS.2, AVA_VAN.5
Target Link https://cyber.gouv.fr/sites/default/files/2017/09/anssi_cible2017_44en.pdf
Report Link https://cyber.gouv.fr/sites/default/files/2017/09/anssi-cc-2017_44en.pdf

References ?

Updates ?

  • 16.12.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'RC-SA08/01 et RC-SA08/02 - v.1.0', 'url': 'https://cyber.gouv.fr/produits-certifies/rc-sa0801-et-rc-sa0802-v10', 'description': 'Le produit certifiĂ© est la famille de composants pour carte Ă  puce FeliCa « RC-SA08/01 et RC-SA08/02 version 1.00 » dĂ©veloppĂ©e par SONY CORPORATION et STMICROELECTRONICS. Le produit est un microcontrĂ´leur intĂ©grant le système d’exploitation embarquĂ© FeliCa OS. Le microcontrĂ´leur seul n’est pas un produit utilisable en tant que tel. Il est destinĂ© Ă  hĂ©berger une ou plusieurs applications. Il doi', 'sponsor': 'Sony Corporation', 'developer': 'Sony Corporation, STMicroelectronics', 'cert_id': 'ANSSI-CC-2017/44', 'level': 'EAL5+', 'enhanced': {'cert_id': 'ANSSI-CC-2017/44', 'certification_date': '2017-08-21', 'category': 'Micro-circuits', 'cc_version': 'Critères Communs version 3.1r4', 'developer': 'Sony Corporation, STMicroelectronics', 'sponsor': 'Sony Corporation', 'evaluation_facility': 'Serma Safety & Security', 'level': 'EAL5+', 'protection_profile': 'PP 0084', 'mutual_recognition': 'SOG-IS CCRA', 'augmented': 'ASE_TSS.2, ALC_DVS.2, AVA_VAN.5', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2017/09/anssi_cible2017_44en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2017/09/anssi-cc-2017_44en.pdf'}}.
  • 09.12.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 21.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'prev_certificates': [], 'next_certificates': []}.
  • 09.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'description': 'Le produit certifiĂ© est la famille de composants pour carte Ă  puce FeliCa « RC-SA08/01 et RC-SA08/02 version 1.00 » dĂ©veloppĂ©e par SONY CORPORATION et STMICROELECTRONICS. Le produit est un microcontrĂ´leur intĂ©grant le système d’exploitation embarquĂ© FeliCa OS. Le microcontrĂ´leur seul n’est pas un produit utilisable en tant que tel. Il est destinĂ© Ă  hĂ©berger une ou plusieurs applications. Il doi', 'cert_id': 'ANSSI-CC-2017/44', 'enhanced': {'__update__': {'cert_id': 'ANSSI-CC-2017/44', 'certification_date': '2017-08-21', 'mutual_recognition': 'SOG-IS CCRA'}}} data.
  • 17.10.2024 The certificate data changed.
    Certificate changed

    The Protection Profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['JAVA_OC', 'SECURITY_IC_AUGP_V1.0', 'BAROC_SC_PP_V1.0']}}]}.
  • 14.10.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'RC-SA08/01 et RC-SA08/02 - v.1.0', 'url': 'https://cyber.gouv.fr/produits-certifies/rc-sa0801-et-rc-sa0802-v10', 'description': 'Le produit certifiĂ© est la famille de composants pour carte Ă  puce FeliCa « RC-SA08/01 et RC-SA08/02 version 1.00 » dĂ©veloppĂ©e par SONY CORPORATION et STMICROELECTRONICS. Le produit est un microcontrĂ´leur intĂ©grant le système d’exploitation embarquĂ© FeliCa OS.\n\nLe microcontrĂ´leur seul n’est pas un produit utilisable en tant que tel. Il est destinĂ© Ă  hĂ©berger une ou plusieurs applications. Il doi', 'sponsor': 'Sony Corporation', 'developer': 'Sony Corporation, STMicroelectronics', 'cert_id': '2017/44', 'level': 'EAL5+', 'enhanced': {'cert_id': '2017/44', 'certification_date': '21/08/2017', 'category': 'Micro-circuits', 'cc_version': 'Critères Communs version 3.1r4', 'developer': 'Sony Corporation, STMicroelectronics', 'sponsor': 'Sony Corporation', 'evaluation_facility': 'Serma Safety & Security', 'level': 'EAL5+', 'protection_profile': 'PP 0084', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ASE_TSS.2, ALC_DVS.2, AVA_VAN.5', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2017/09/anssi_cible2017_44en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2017/09/anssi-cc-2017_44en.pdf'}}.
  • 02.09.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'd4e46139cc98e172139fb364cce68cfec2f3a1c9b6d76f4fa568be480714c329', 'txt_hash': '71bae905ffa44e9c6e44f1a022a4dc47a9441f0656e7c8cf72998a615b78670b'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'pdf_hash': '40c4ae0757e2858b6865fb82295f9887920b544eeb8b415039a0a369ab67f98a', 'txt_hash': 'fb448aa87b58656feb6c79e7cbbce9f884f6162452e8d3678020ed93776d1b4f'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 531170, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 16, '/CreationDate': "D:20170904143302+02'00'", '/Creator': 'Microsoft® Word 2010', '/Keywords': 'ANSSI-CC-CER-F-07.024', '/ModDate': "D:20170911160750+02'00'", '/Producer': 'Microsoft® Word 2010', '/Subject': '', '/Title': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['mailto:[email protected]', 'http://www.ssi.gouv.fr/']}}.
    • The report_frontpage property was set to {'FR': {'match_rules': ['RĂ©fĂ©rence du rapport de certification(.+)Nom du produit(.+)RĂ©fĂ©rence/version du produit(.*)ConformitĂ© Ă  un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)DĂ©veloppeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables'], 'cert_id': 'ANSSI-CC-2017/44', 'cert_item': 'RC-SA08/01 et RC-SA08/02', 'cert_item_version': 'Version 1.00', 'ref_protection_profiles': 'PP 0084], version 1.0 Security IC Platform Protection Profile with Augmentation Packages', 'cc_version': 'Critères Communs version 3.1 rĂ©vision 4', 'cc_security_level': 'EAL 5 augmentĂ© ASE_TSS.2, ALC_DVS.2, AVA_VAN.5', 'developer': 'Sony Corporation Sony City Osaki 2-10-1 Osaki Shinagawa- ku Tokyo, 141-86-10 Japan STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, 13106 Rousset, France Commanditaire Sony Corporation Sony City Osaki 2-10-1 Osaki Shinagawa-ku Tokyo, 141-86-10 Japan', 'cert_lab': 'Serma Safety & Security 14 rue GalilĂ©e, CS 10055, 33615 Pessac Cedex, France'}}.
    • The report_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2017/44': 17, 'ANSSI-CC-2016/58': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0084-2014': 1}}, 'cc_security_level': {'EAL': {'EAL 5': 3, 'EAL2': 2, 'EAL5': 1, 'EAL7': 1, 'EAL 1': 1, 'EAL 3': 1, 'EAL 7': 1}, 'ITSEC': {'ITSEC E6 ElevĂ©': 1}}, 'cc_sar': {'ADV': {'ADV_IMP.2': 1, 'ADV_INT.3': 1, 'ADV_TDS.5': 1, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_DVS.2': 2, 'ALC_CMC.5': 1, 'ALC_FLR.1': 1, 'ALC_TAT.3': 1, 'ALC_FLR': 2, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV.3': 1, 'ATE_FUN.2': 1, 'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.5': 5, 'AVA_VAN': 2}, 'ASE': {'ASE_TSS.2': 3, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'STMicroelectronics': {'STMicroelectronics': 1}}, 'eval_facility': {'Serma': {'Serma Safety & Security': 1, 'SERMA': 1}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {'ICType': {'IC Type': 1}}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2012-09-001': 1, 'CCMB-2012-09-002': 1, 'CCMB-2012-09-003': 1, 'CCMB-2012-09-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0084': 36}}, 'cc_security_level': {'EAL': {'EAL5': 9, 'EAL5 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 6, 'ADV_FSP.5': 6, 'ADV_IMP.1': 3, 'ADV_INT.2': 1, 'ADV_TDS.4': 2, 'ADV_FSP': 1, 'ADV_TDS.3': 1, 'ADV_IMP.2': 1, 'ADV_INT.3': 1, 'ADV_TDS.5': 1}, 'AGD': {'AGD_OPE.1': 4, 'AGD_PRE.1': 3}, 'ALC': {'ALC_DVS.2': 10, 'ALC_CMC.4': 2, 'ALC_CMS.5': 5, 'ALC_DEL.1': 2, 'ALC_LCD.1': 1, 'ALC_TAT.2': 1, 'ALC_CMS': 1, 'ALC_DVS.1': 1, 'ALC_CMC.5': 1, 'ALC_FLR.1': 1, 'ALC_TAT.3': 1}, 'ATE': {'ATE_COV.2': 2, 'ATE_DPT.3': 2, 'ATE_FUN.1': 1, 'ATE_IND.2': 1, 'ATE_DPT.1': 1, 'ATE_COV.3': 1, 'ATE_FUN.2': 1}, 'AVA': {'AVA_VAN.5': 10}, 'ASE': {'ASE_TSS.2': 9, 'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 3, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 2, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 6, 'FAU_SAS': 1, 'FAU_SAS.1.1': 1}, 'FCS': {'FCS_RNG.1': 7, 'FCS_RNG': 1, 'FCS_RNG.1.1': 1, 'FCS_RNG.1.2': 1, 'FCS_CKM.1': 1, 'FCS_CKM.4': 2}, 'FDP': {'FDP_SDC.1': 5, 'FDP_ACC.1': 16, 'FDP_ACC.1.1': 1, 'FDP_ACF.1': 11, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_SDI': 1, 'FDP_SDC': 1, 'FDP_SDI.2': 5, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_SDC.1.1': 1, 'FDP_ITT.1': 8, 'FDP_ITT.1.1': 1, 'FDP_IFC.1': 10, 'FDP_IFC.1.1': 1, 'FDP_IFF.1': 1, 'FDP_ACC.2': 1, 'FDP_ITC.1': 1, 'FDP_ITC.2': 2, 'FDP_TDC.1': 1, 'FDP_RIP.1': 2, 'FDP_ROL.1': 1}, 'FIA': {'FIA_UID.1': 7, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_UAU.1': 4, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.4': 4, 'FIA_UAU.4.1': 1, 'FIA_UID.2': 2, 'FIA_UAU.2': 2, 'FIA_UAU.5': 2}, 'FMT': {'FMT_LIM.1': 9, 'FMT_LIM.2': 9, 'FMT_SMR.1': 13, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MOF.1': 5, 'FMT_MOF.1.1': 1, 'FMT_MSA.1': 9, 'FMT_MSA.1.1': 1, 'FMT_SMF.1': 12, 'FMT_SMF.1.1': 1, 'FMT_LIM.1.1': 1, 'FMT_LIM.2.1': 1, 'FMT_MSA.3': 8, 'FMT_MTD.1': 2}, 'FPR': {'FPR_UNL.1': 7, 'FPR_UNL.1.1': 1}, 'FPT': {'FPT_FLS.1': 10, 'FPT_FLS.1.1': 1, 'FPT_PHP.3': 9, 'FPT_PHP.3.1': 1, 'FPT_ITT.1': 8, 'FPT_ITT.1.1': 1, 'FPT_TRP.1': 2, 'FPT_RPL.1': 2, 'FPT_TDC.1': 1}, 'FRU': {'FRU_FLT.2': 9, 'FRU_FLT.2.1': 1, 'FRU_RSA.2': 2}, 'FTP': {'FTP_ITC.1': 4, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1}}, 'cc_claims': {'O': {'O.AC': 18, 'O.SC': 12, 'O.RND': 5}, 'T': {'T.RND': 4}}, 'vendor': {'STMicroelectronics': {'STMicroelectronics': 1, 'STM': 7}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 10}}, 'DES': {'DES': {'DES': 5}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 1}}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RND': 10, 'RNG': 3}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 13, 'Physical Probing': 2, 'physical probing': 4, 'Side-channel': 1, 'side-channel': 1}, 'FI': {'Malfunction': 13, 'malfunction': 3}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 18092': 2, 'ISO/IEC 14443': 2, 'ISO/IEC 7816': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 2, 'FeliCa OS, and APDU commands, which are processed by the Java Card System. The antenna, which is out of scope of the TOE, provides the RF interface on the smart card. The Java Card System and Java Applets are': 1}}}.
    • The report_filename property was set to anssi-cc-2017_44fr.pdf.
    • The st_filename property was set to anssi_cible2017_44en.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to ['SERMA'].
    • The cert_id property was set to ANSSI-CC-2017/44.
    • The report_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2016/58']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2016/58']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2017_44fr.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi_cible2017_44en.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to None.
    • The report_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}]} values discarded.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'RC-SA08/01 et RC-SA08/02 - v.1.0', 'url': 'https://cyber.gouv.fr/produits-certifies/rc-sa0801-et-rc-sa0802-v10', 'description': 'Le produit certifiĂ© est la famille de composants pour carte Ă  puce FeliCa « RC-SA08/01 et RC-SA08/02 version 1.00 » dĂ©veloppĂ©e par SONY CORPORATION et STMICROELECTRONICS. Le produit est un microcontrĂ´leur intĂ©grant le système d’exploitation embarquĂ© FeliCa OS.\n\nLe microcontrĂ´leur seul n’est pas un produit utilisable en tant que tel. Il est destinĂ© Ă  hĂ©berger une ou plusieurs applications. Il doi', 'sponsor': 'Sony Corporation', 'developer': 'Sony Corporation, STMicroelectronics', 'cert_id': '2017/44', 'level': 'EAL5+', 'enhanced': {'cert_id': '2017/44', 'certification_date': '21/08/2017', 'category': 'Micro-circuits', 'cc_version': 'Critères Communs version 3.1r4', 'developer': 'Sony Corporation, STMicroelectronics', 'sponsor': 'Sony Corporation', 'evaluation_facility': 'Serma Safety & Security', 'level': 'EAL5+', 'protection_profile': 'PP 0084', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ASE_TSS.2, ALC_DVS.2, AVA_VAN.5', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2017/09/anssi_cible2017_44en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2017/09/anssi-cc-2017_44en.pdf'}}.
  • 31.07.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name RC-SA08/01et RC-SA08/02 version 1.00 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": null,
  "dgst": "549050cd6694b982",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2017/44",
    "cert_lab": [
      "SERMA"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.00"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": [],
    "prev_certificates": [],
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2016/58"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2016/58"
        ]
      }
    },
    "scheme_data": {
      "cert_id": "ANSSI-CC-2017/44",
      "description": "Le produit certifi\u00e9 est la famille de composants pour carte \u00e0 puce FeliCa \u00ab RC-SA08/01 et RC-SA08/02 version 1.00 \u00bb d\u00e9velopp\u00e9e par SONY CORPORATION et STMICROELECTRONICS. Le produit est un microcontr\u00f4leur int\u00e9grant le syst\u00e8me d\u2019exploitation embarqu\u00e9 FeliCa OS. Le microcontr\u00f4leur seul n\u2019est pas un produit utilisable en tant que tel. Il est destin\u00e9 \u00e0 h\u00e9berger une ou plusieurs applications. Il doi",
      "developer": "Sony Corporation, STMicroelectronics",
      "enhanced": {
        "augmented": "ASE_TSS.2, ALC_DVS.2, AVA_VAN.5",
        "category": "Micro-circuits",
        "cc_version": "Crit\u00e8res Communs version 3.1r4",
        "cert_id": "ANSSI-CC-2017/44",
        "certification_date": "2017-08-21",
        "developer": "Sony Corporation, STMicroelectronics",
        "evaluation_facility": "Serma Safety \u0026 Security",
        "level": "EAL5+",
        "mutual_recognition": "SOG-IS CCRA",
        "protection_profile": "PP 0084",
        "report_link": "https://cyber.gouv.fr/sites/default/files/2017/09/anssi-cc-2017_44en.pdf",
        "sponsor": "Sony Corporation",
        "target_link": "https://cyber.gouv.fr/sites/default/files/2017/09/anssi_cible2017_44en.pdf"
      },
      "level": "EAL5+",
      "product": "RC-SA08/01 et RC-SA08/02 - v.1.0",
      "sponsor": "Sony Corporation",
      "url": "https://cyber.gouv.fr/produits-certifies/rc-sa0801-et-rc-sa0802-v10"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Sony Corporation",
  "manufacturer_web": "https://www.sony.com/",
  "name": "RC-SA08/01et RC-SA08/02 version 1.00",
  "not_valid_after": "2022-08-21",
  "not_valid_before": "2017-08-21",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "anssi-cc-2017_44fr.pdf",
    "report_frontpage": {
      "FR": {
        "cc_security_level": "EAL 5 augment\u00e9 ASE_TSS.2, ALC_DVS.2, AVA_VAN.5",
        "cc_version": "Crit\u00e8res Communs version 3.1 r\u00e9vision 4",
        "cert_id": "ANSSI-CC-2017/44",
        "cert_item": "RC-SA08/01 et RC-SA08/02",
        "cert_item_version": "Version 1.00",
        "cert_lab": "Serma Safety \u0026 Security 14 rue Galil\u00e9e, CS 10055, 33615 Pessac Cedex, France",
        "developer": "Sony Corporation Sony City Osaki 2-10-1 Osaki Shinagawa- ku Tokyo, 141-86-10 Japan STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, 13106 Rousset, France Commanditaire Sony Corporation Sony City Osaki 2-10-1 Osaki Shinagawa-ku Tokyo, 141-86-10 Japan",
        "match_rules": [
          "R\u00e9f\u00e9rence du rapport de certification(.+)Nom du produit(.+)R\u00e9f\u00e9rence/version du produit(.*)Conformit\u00e9 \u00e0 un profil de protection(.+)Crit\u00e8res d\u2019\u00e9valuation et version(.+)Niveau d\u2019\u00e9valuation(.+)D\u00e9veloppeurs(.+)Centre d\u2019\u00e9valuation(.+)Accords de reconnaissance applicables"
        ],
        "ref_protection_profiles": "PP 0084], version 1.0 Security IC Platform Protection Profile with Augmentation Packages"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2016/58": 2,
          "ANSSI-CC-2017/44": 17
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP-0084-2014": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_FSP": 1,
          "ADV_IMP": 1,
          "ADV_IMP.2": 1,
          "ADV_INT": 1,
          "ADV_INT.3": 1,
          "ADV_SPM": 1,
          "ADV_TDS": 1,
          "ADV_TDS.5": 1
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_PRE": 1
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.5": 1,
          "ALC_CMS": 1,
          "ALC_DEL": 1,
          "ALC_DVS": 1,
          "ALC_DVS.2": 2,
          "ALC_FLR": 2,
          "ALC_FLR.1": 1,
          "ALC_TAT": 1,
          "ALC_TAT.3": 1
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_ECD": 1,
          "ASE_INT": 1,
          "ASE_OBJ": 1,
          "ASE_REQ": 1,
          "ASE_SPD": 1,
          "ASE_TSS": 1,
          "ASE_TSS.2": 3
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.3": 1,
          "ATE_DPT": 1,
          "ATE_FUN": 1,
          "ATE_FUN.2": 1,
          "ATE_IND": 1
        },
        "AVA": {
          "AVA_VAN": 2,
          "AVA_VAN.5": 5
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 3": 1,
          "EAL 5": 3,
          "EAL 7": 1,
          "EAL2": 2,
          "EAL5": 1,
          "EAL7": 1
        },
        "ITSEC": {
          "ITSEC E6 Elev\u00e9": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {
        "ICType": {
          "IC Type": 1
        }
      },
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Serma": {
          "SERMA": 1,
          "Serma Safety \u0026 Security": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2012-09-001": 1,
          "CCMB-2012-09-002": 1,
          "CCMB-2012-09-003": 1,
          "CCMB-2012-09-004": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "STMicroelectronics": {
          "STMicroelectronics": 1
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20170904143302+02\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2010",
      "/Keywords": "ANSSI-CC-CER-F-07.024",
      "/ModDate": "D:20170911160750+02\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2010",
      "/Subject": "",
      "/Title": "",
      "pdf_file_size_bytes": 531170,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "mailto:[email protected]",
          "http://www.ssi.gouv.fr/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 16
    },
    "st_filename": "anssi_cible2017_44en.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "O": {
          "O.AC": 18,
          "O.RND": 5,
          "O.SC": 12
        },
        "T": {
          "T.RND": 4
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP-0084": 36
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 6,
          "ADV_FSP": 1,
          "ADV_FSP.5": 6,
          "ADV_IMP.1": 3,
          "ADV_IMP.2": 1,
          "ADV_INT.2": 1,
          "ADV_INT.3": 1,
          "ADV_TDS.3": 1,
          "ADV_TDS.4": 2,
          "ADV_TDS.5": 1
        },
        "AGD": {
          "AGD_OPE.1": 4,
          "AGD_PRE.1": 3
        },
        "ALC": {
          "ALC_CMC.4": 2,
          "ALC_CMC.5": 1,
          "ALC_CMS": 1,
          "ALC_CMS.5": 5,
          "ALC_DEL.1": 2,
          "ALC_DVS.1": 1,
          "ALC_DVS.2": 10,
          "ALC_FLR.1": 1,
          "ALC_LCD.1": 1,
          "ALC_TAT.2": 1,
          "ALC_TAT.3": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 3,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 2,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1,
          "ASE_TSS.2": 9
        },
        "ATE": {
          "ATE_COV.2": 2,
          "ATE_COV.3": 1,
          "ATE_DPT.1": 1,
          "ATE_DPT.3": 2,
          "ATE_FUN.1": 1,
          "ATE_FUN.2": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 10
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL5": 9,
          "EAL5 augmented": 2
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_SAS": 1,
          "FAU_SAS.1": 6,
          "FAU_SAS.1.1": 1
        },
        "FCS": {
          "FCS_CKM.1": 1,
          "FCS_CKM.4": 2,
          "FCS_RNG": 1,
          "FCS_RNG.1": 7,
          "FCS_RNG.1.1": 1,
          "FCS_RNG.1.2": 1
        },
        "FDP": {
          "FDP_ACC.1": 16,
          "FDP_ACC.1.1": 1,
          "FDP_ACC.2": 1,
          "FDP_ACF.1": 11,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 1,
          "FDP_IFC.1": 10,
          "FDP_IFC.1.1": 1,
          "FDP_IFF.1": 1,
          "FDP_ITC.1": 1,
          "FDP_ITC.2": 2,
          "FDP_ITT.1": 8,
          "FDP_ITT.1.1": 1,
          "FDP_RIP.1": 2,
          "FDP_ROL.1": 1,
          "FDP_SDC": 1,
          "FDP_SDC.1": 5,
          "FDP_SDC.1.1": 1,
          "FDP_SDI": 1,
          "FDP_SDI.2": 5,
          "FDP_SDI.2.1": 1,
          "FDP_SDI.2.2": 1,
          "FDP_TDC.1": 1
        },
        "FIA": {
          "FIA_UAU.1": 4,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.2": 2,
          "FIA_UAU.4": 4,
          "FIA_UAU.4.1": 1,
          "FIA_UAU.5": 2,
          "FIA_UID.1": 7,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1,
          "FIA_UID.2": 2
        },
        "FMT": {
          "FMT_LIM.1": 9,
          "FMT_LIM.1.1": 1,
          "FMT_LIM.2": 9,
          "FMT_LIM.2.1": 1,
          "FMT_MOF.1": 5,
          "FMT_MOF.1.1": 1,
          "FMT_MSA.1": 9,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.3": 8,
          "FMT_MTD.1": 2,
          "FMT_SMF.1": 12,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 13,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPR": {
          "FPR_UNL.1": 7,
          "FPR_UNL.1.1": 1
        },
        "FPT": {
          "FPT_FLS.1": 10,
          "FPT_FLS.1.1": 1,
          "FPT_ITT.1": 8,
          "FPT_ITT.1.1": 1,
          "FPT_PHP.3": 9,
          "FPT_PHP.3.1": 1,
          "FPT_RPL.1": 2,
          "FPT_TDC.1": 1,
          "FPT_TRP.1": 2
        },
        "FRU": {
          "FRU_FLT.2": 9,
          "FRU_FLT.2.1": 1,
          "FRU_RSA.2": 2
        },
        "FTP": {
          "FTP_ITC.1": 4,
          "FTP_ITC.1.1": 1,
          "FTP_ITC.1.2": 1,
          "FTP_ITC.1.3": 1
        }
      },
      "certification_process": {
        "OutOfScope": {
          "FeliCa OS, and APDU commands, which are processed by the Java Card System. The antenna, which is out of scope of the TOE, provides the RF interface on the smart card. The Java Card System and Java Applets are": 1,
          "out of scope": 2
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 10,
          "RNG": 3
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 13,
          "malfunction": 3
        },
        "SCA": {
          "Leak-Inherent": 13,
          "Physical Probing": 2,
          "Side-channel": 1,
          "physical probing": 4,
          "side-channel": 1
        }
      },
      "standard_id": {
        "ISO": {
          "ISO/IEC 14443": 2,
          "ISO/IEC 18092": 2,
          "ISO/IEC 7816": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 10
          }
        },
        "DES": {
          "DES": {
            "DES": 5
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "STMicroelectronics": {
          "STM": 7,
          "STMicroelectronics": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": null
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": "EAL4+",
        "pp_ids": {
          "_type": "Set",
          "elements": [
            "JAVA_OC",
            "BAROC_SC_PP_V1.0",
            "SECURITY_IC_AUGP_V1.0"
          ]
        },
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf",
        "pp_name": "Security IC Platform Protection Profile with Augmentation Packages"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2017_44fr.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_DVS.2",
      "AVA_VAN.5",
      "EAL5+",
      "ASE_TSS.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi_cible2017_44en.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "d4e46139cc98e172139fb364cce68cfec2f3a1c9b6d76f4fa568be480714c329",
      "txt_hash": "71bae905ffa44e9c6e44f1a022a4dc47a9441f0656e7c8cf72998a615b78670b"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": false,
      "pdf_hash": "40c4ae0757e2858b6865fb82295f9887920b544eeb8b415039a0a369ab67f98a",
      "txt_hash": "fb448aa87b58656feb6c79e7cbbce9f884f6162452e8d3678020ed93776d1b4f"
    }
  },
  "status": "archived"
}