This page was not yet optimized for use on mobile
devices.
LEGIC card-in-card, AFS4096-JP12 Version 1.2
CSV information
| Status | archived |
|---|---|
| Valid from | 23.10.2012 |
| Valid until | 01.09.2019 |
| Scheme | 🇩🇪 DE |
| Manufacturer | LEGIC® Identsystems AG |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | ALC_DVS.2, EAL4+, AVA_VAN.5 |
Heuristics summary
Certificate ID: BSI-DSZ-CC-0812-2012
Certificate
certificate file processing did not finish successfully.
Show more...
Download pdf:
ERROR
Convert pdf to text:
ERROR
Extract keywords:
ERROR
Certification report
Extracted keywords
Protocols
SSL 3.0Operating System name
JCOP 2Vendor
NXP, NXP SemiconductorsSecurity level
EAL 4, EAL 5, EAL1, EAL2, EAL3, EAL4, EAL5, EAL6, EAL7, EAL5+, EAL 4 augmented, ITSEC EvaluationSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_FSP.2, ADV_FSP.3, ADV_FSP.4, ADV_FSP.5, ADV_FSP.6, ADV_IMP.1, ADV_IMP.2, ADV_INT.1, ADV_INT.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.1, ADV_TDS.2, ADV_TDS.3, ADV_TDS.4, ADV_TDS.5, ADV_TDS.6, ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_CMC.1, ALC_CMC.2, ALC_CMC.3, ALC_CMC.4, ALC_CMC.5, ALC_CMS.1, ALC_CMS.2, ALC_CMS.3, ALC_CMS.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.1, ALC_FLR.1, ALC_FLR.2, ALC_FLR.3, ALC_LCD.1, ALC_LCD.2, ALC_TAT.1, ALC_TAT.2, ALC_TAT.3, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_FLR, ALC_TAT, ATE_COV.1, ATE_COV.2, ATE_COV.3, ATE_DPT.1, ATE_DPT.2, ATE_DPT.3, ATE_DPT.4, ATE_FUN.1, ATE_FUN.2, ATE_IND.1, ATE_IND.2, ATE_IND.3, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN, AVA_VAN.1, AVA_VAN.2, AVA_VAN.3, AVA_VAN.4, APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.1, APE_OBJ.2, APE_ECD.1, APE_REQ.1, APE_REQ.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.1, ASE_REQ.2, ASE_TSS.1, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_SPD, ASE_TSSCertificates
BSI-DSZ-CC-0812-2012, BSI-DSZ-CC-0675-2011, BSI-DSZ-CC-0633-2010, BSI-DSZ-CC-0555-2009, BSI-DSZ-CC-0555Evaluation facilities
Brightsight, TÜV Informationstechnik, TÜViTSide-channel analysis
Fault Injection, JILCertification process
BSI-DSZ-CC-0812-2012, Version 1.1, April 16, 2012, LEGIC card-in- card AFS4096-JP12 V1.2, LEGIC (confidential document) [7] Security Target Lite BSI-DSZ-CC-0812-2012, Version 1.2, June 27, 2012, LEGIC card-in-card, Technical Report, Version 1, August 31, 2012, EVALUATION TECHNICAL REPORT SUMMARY, TÜViT (confidential document) [9] Configuration list, May 29, 2012, Configuration list Winter AG, Winter AG [10] User ManualStandards
AIS 34, AIS 36, AIS 25, AIS 26, AIS 37, AIS 35, AIS 32, AIS 38Technical reports
BSI 7125, BSI 7148File metadata
| Title | Certification Report BSI-DSZ-CC-0812-2012 |
|---|---|
| Subject | Common Criteria Certification |
| Keywords | "Common Criteria, Certification, Zertifizierung, LEGIC card-in-card, AFS4096-JP12 Version 1.2, LEGIC® Identsystems AG" |
| Author | Bundesamt für Sicherheit in der Informationstechnik |
| Creation date | D:20121105115911+01'00' |
| Modification date | D:20121105153756+01'00' |
| Pages | 36 |
| Creator | Writer |
| Producer | LibreOffice 3.5 |
Frontpage
| Certificate ID | BSI-DSZ-CC-0812-2012 |
|---|---|
| Certified item | LEGIC card-in-card, AFS4096-JP12 Version 1.2 |
| Certification lab | BSI |
| Developer | LEGIC® Identsystems AG |
References
Outgoing- BSI-DSZ-CC-0555-2009 - archived - NXP Smart Card Controller P5CD081V1A and its major configurations P5CC081V1A, P5CN081V1A, P5CD041V1A, P5CD021V1A and P5CD016V1A each with IC dedicated Software
- BSI-DSZ-CC-0675-2011 - archived - NXP J3A081, J2A081 and J3A041 Secure Smart Card Controller Revision 3
- BSI-DSZ-CC-0633-2010 - archived - Crypto Library V2.7 on P5CD081V1A / P5CC081V1A / P5CN081V1A / P5CD041V1A / P5CD021V1A / P5CD016V1A
Security target
Extracted keywords
Symmetric Algorithms
AES, DES, TDES, Triple-DES, LuciferHash functions
SHA-1, MD5, RIPEMD-160Schemes
MACRandomness
RNGBlock cipher modes
CBCOperating System name
JCOP 2Vendor
NXP, NXP SemiconductorsSecurity level
EAL4+, EAL 5+, EAL4, EAL4 augmentedClaims
OT.MACSecurity Assurance Requirements (SAR)
ALC_DVS.2, AVA_VAN.5, ASE_OBJSecurity Functional Requirements (SFR)
FCS_RNG, FCS_RNG.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_COP, FCS_CKM.1, FCS_CKM.4, FCS_COP.1, FCS_CKM.4.1, FDP_ITC.1, FDP_ITC.2, FDP_ITC, FDP_ACC.1, FDP_IFC.1, FDP_UIT.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_ACF.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FIA_UAU.1, FIA_UID.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.3, FIA_UAU.3.1, FIA_UAU.3.2, FIA_UID.1.1, FIA_UID.1.2, FMT_MSA.3, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_FLS.1, FPT_FLS.1.1, FPT_PHP.3, FPT_PHP.3.1, FTP_ITC.1, FTP_TRP.1Protection profiles
BSI-PP-0002-2001, BSI-PP-0035-2007Certificates
BSI-DSZ-CC-0812, BSI-DSZ-CC-0675-2011, BSI-DSZ-CC-0555-2009Side-channel analysis
physical probing, Side-channel, DPA, SPA, timing attacks, malfunctionStandards
FIPS46-3, FIPS PUB 46-3, FIPS197, AIS20, ISO/IEC 7816-4, CCMB-2006-09-001, CCMB-2007-09-002, CCMB-2007-09-003, CCMB-2007-09-004File metadata
| Title | LEGIC card-in-card AFS4096-JP11 V1.1.1.1 |
|---|---|
| Subject | LA-23-615a-en / BSI-DSZ-CC-0812 |
| Keywords | LEGIC advant Series |
| Author | tzeggel;[email protected] |
| Creation date | D:20121011142205+02'00' |
| Modification date | D:20121011142205+02'00' |
| Pages | 32 |
| Creator | Microsoft® Word 2010 |
| Producer | Microsoft® Word 2010 |
References
Outgoing- BSI-DSZ-CC-0555-2009 - archived - NXP Smart Card Controller P5CD081V1A and its major configurations P5CC081V1A, P5CN081V1A, P5CD041V1A, P5CD021V1A and P5CD016V1A each with IC dedicated Software
- BSI-DSZ-CC-0675-2011 - archived - NXP J3A081, J2A081 and J3A041 Secure Smart Card Controller Revision 3
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
BSI-DSZ-CC-0812-2012Extracted SARs
ADV_ARC.1, ADV_FSP.6, ADV_IMP.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.6, AGD_OPE.1, AGD_PRE.1, ALC_CMC.5, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_FLR.3, ALC_LCD.2, ALC_TAT.3, APE_CCL.1, APE_ECD.1, APE_INT.1, APE_OBJ.2, APE_REQ.2, APE_SPD.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.2, ATE_COV.3, ATE_DPT.4, ATE_FUN.2, ATE_IND.3, AVA_VAN.5References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "dd0311c933393d20",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-0812-2012",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL4+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 6
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 6
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"1.2"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0675-2011",
"BSI-DSZ-CC-0555-2009",
"BSI-DSZ-CC-0633-2010"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0555-2009",
"BSI-DSZ-CC-0633-2010",
"BSI-DSZ-CC-0608-2010",
"BSI-DSZ-CC-0410-2007",
"BSI-DSZ-CC-0404-2007",
"BSI-DSZ-CC-0674-2011",
"BSI-DSZ-CC-0675-2011",
"BSI-DSZ-CC-0709-2010",
"BSI-DSZ-CC-0417-2008"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0675-2011",
"BSI-DSZ-CC-0555-2009"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0675-2011",
"BSI-DSZ-CC-0555-2009"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "LEGIC\u00ae Identsystems AG",
"manufacturer_web": "https://www.legic.com",
"name": "LEGIC card-in-card, AFS4096-JP12 Version 1.2",
"not_valid_after": "2019-09-01",
"not_valid_before": "2012-10-23",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "0812a_pdf.pdf",
"report_frontpage": {
"DE": {
"cert_id": "BSI-DSZ-CC-0812-2012",
"cert_item": "LEGIC card-in-card, AFS4096-JP12 Version 1.2",
"cert_lab": "BSI",
"developer": "LEGIC\u00ae Identsystems AG",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
]
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0555": 1,
"BSI-DSZ-CC-0555-2009": 1,
"BSI-DSZ-CC-0633-2010": 1,
"BSI-DSZ-CC-0675-2011": 1,
"BSI-DSZ-CC-0812-2012": 21
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 1,
"ADV_FSP": 1,
"ADV_FSP.1": 1,
"ADV_FSP.2": 1,
"ADV_FSP.3": 1,
"ADV_FSP.4": 1,
"ADV_FSP.5": 1,
"ADV_FSP.6": 1,
"ADV_IMP": 1,
"ADV_IMP.1": 1,
"ADV_IMP.2": 1,
"ADV_INT": 1,
"ADV_INT.1": 1,
"ADV_INT.2": 1,
"ADV_INT.3": 1,
"ADV_SPM": 1,
"ADV_SPM.1": 1,
"ADV_TDS": 1,
"ADV_TDS.1": 1,
"ADV_TDS.2": 1,
"ADV_TDS.3": 1,
"ADV_TDS.4": 1,
"ADV_TDS.5": 1,
"ADV_TDS.6": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 1,
"AGD_PRE": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.1": 1,
"ALC_CMC.2": 1,
"ALC_CMC.3": 1,
"ALC_CMC.4": 2,
"ALC_CMC.5": 1,
"ALC_CMS": 1,
"ALC_CMS.1": 1,
"ALC_CMS.2": 1,
"ALC_CMS.3": 1,
"ALC_CMS.4": 2,
"ALC_CMS.5": 1,
"ALC_DEL": 1,
"ALC_DEL.1": 2,
"ALC_DVS": 1,
"ALC_DVS.1": 1,
"ALC_DVS.2": 7,
"ALC_FLR": 1,
"ALC_FLR.1": 1,
"ALC_FLR.2": 1,
"ALC_FLR.3": 1,
"ALC_LCD.1": 2,
"ALC_LCD.2": 1,
"ALC_TAT": 1,
"ALC_TAT.1": 2,
"ALC_TAT.2": 1,
"ALC_TAT.3": 1
},
"APE": {
"APE_CCL.1": 1,
"APE_ECD.1": 1,
"APE_INT.1": 1,
"APE_OBJ.1": 1,
"APE_OBJ.2": 1,
"APE_REQ.1": 1,
"APE_REQ.2": 1,
"APE_SPD.1": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_CCL.1": 1,
"ASE_ECD": 1,
"ASE_ECD.1": 1,
"ASE_INT": 1,
"ASE_INT.1": 1,
"ASE_OBJ": 1,
"ASE_OBJ.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.1": 1,
"ASE_REQ.2": 1,
"ASE_SPD": 1,
"ASE_SPD.1": 1,
"ASE_TSS": 1,
"ASE_TSS.1": 1,
"ASE_TSS.2": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.1": 1,
"ATE_COV.2": 1,
"ATE_COV.3": 1,
"ATE_DPT": 1,
"ATE_DPT.1": 1,
"ATE_DPT.2": 1,
"ATE_DPT.3": 1,
"ATE_DPT.4": 1,
"ATE_FUN": 1,
"ATE_FUN.1": 1,
"ATE_FUN.2": 1,
"ATE_IND": 1,
"ATE_IND.1": 1,
"ATE_IND.2": 1,
"ATE_IND.3": 1
},
"AVA": {
"AVA_VAN": 3,
"AVA_VAN.1": 1,
"AVA_VAN.2": 1,
"AVA_VAN.3": 1,
"AVA_VAN.4": 1,
"AVA_VAN.5": 6
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 7,
"EAL 4 augmented": 3,
"EAL 5": 3,
"EAL1": 8,
"EAL2": 4,
"EAL3": 5,
"EAL4": 8,
"EAL5": 8,
"EAL5+": 1,
"EAL6": 5,
"EAL7": 5
},
"ITSEC": {
"ITSEC Evaluation": 1
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"BSI-DSZ-CC-0812-2012, Version 1.1, April 16, 2012, LEGIC card-in- card AFS4096-JP12 V1.2, LEGIC (confidential document) [7] Security Target Lite BSI-DSZ-CC-0812-2012, Version 1.2, June 27, 2012, LEGIC card-in-card": 1,
"Technical Report, Version 1, August 31, 2012, EVALUATION TECHNICAL REPORT SUMMARY, T\u00dcViT (confidential document) [9] Configuration list, May 29, 2012, Configuration list Winter AG, Winter AG [10] User Manual": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL 3.0": 1
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"BrightSight": {
"Brightsight": 1
},
"TUV": {
"T\u00dcV Informationstechnik": 2,
"T\u00dcViT": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {
"JCOP": {
"JCOP 2": 1
}
},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"Fault Injection": 1
},
"other": {
"JIL": 4
}
},
"standard_id": {
"BSI": {
"AIS 25": 2,
"AIS 26": 2,
"AIS 32": 1,
"AIS 34": 2,
"AIS 35": 2,
"AIS 36": 3,
"AIS 37": 1,
"AIS 38": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {
"BSI": {
"BSI 7125": 2,
"BSI 7148": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"NXP": {
"NXP": 8,
"NXP Semiconductors": 3
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20121105115911+01\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, LEGIC card-in-card, AFS4096-JP12 Version 1.2, LEGIC\u00ae Identsystems AG\"",
"/ModDate": "D:20121105153756+01\u002700\u0027",
"/Producer": "LibreOffice 3.5",
"/Subject": "Common Criteria Certification",
"/Title": "Certification Report BSI-DSZ-CC-0812-2012",
"pdf_file_size_bytes": 1019711,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 36
},
"st_filename": "0812b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0555-2009": 1,
"BSI-DSZ-CC-0675-2011": 1,
"BSI-DSZ-CC-0812": 1
}
},
"cc_claims": {
"OT": {
"OT.MAC": 1
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0002-2001": 1,
"BSI-PP-0035-2007": 1
}
},
"cc_sar": {
"ALC": {
"ALC_DVS.2": 3
},
"ASE": {
"ASE_OBJ": 4
},
"AVA": {
"AVA_VAN.5": 3
}
},
"cc_security_level": {
"EAL": {
"EAL 5+": 2,
"EAL4": 3,
"EAL4 augmented": 1,
"EAL4+": 1
}
},
"cc_sfr": {
"FCS": {
"FCS_CKM.1": 3,
"FCS_CKM.4": 4,
"FCS_CKM.4.1": 2,
"FCS_COP": 4,
"FCS_COP.1": 2,
"FCS_RNG": 6,
"FCS_RNG.1": 7,
"FCS_RNG.1.1": 2,
"FCS_RNG.1.2": 2
},
"FDP": {
"FDP_ACC.1": 6,
"FDP_ACC.1.1": 1,
"FDP_ACF.1": 3,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_IFC.1": 3,
"FDP_ITC": 4,
"FDP_ITC.1": 9,
"FDP_ITC.2": 3,
"FDP_UIT.1": 2,
"FDP_UIT.1.1": 1,
"FDP_UIT.1.2": 1
},
"FIA": {
"FIA_UAU.1": 2,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UAU.3": 2,
"FIA_UAU.3.1": 1,
"FIA_UAU.3.2": 1,
"FIA_UID.1": 4,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1
},
"FMT": {
"FMT_MSA.3": 3,
"FMT_SMF.1": 2,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 2,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_FLS.1": 2,
"FPT_FLS.1.1": 1,
"FPT_PHP.3": 3,
"FPT_PHP.3.1": 1
},
"FTP": {
"FTP_ITC.1": 1,
"FTP_TRP.1": 1
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 13
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"MD": {
"MD5": {
"MD5": 1
}
},
"RIPEMD": {
"RIPEMD-160": 1
},
"SHA": {
"SHA1": {
"SHA-1": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {
"JCOP": {
"JCOP 2": 3
}
},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 2
}
},
"side_channel_analysis": {
"FI": {
"malfunction": 2
},
"SCA": {
"DPA": 2,
"SPA": 1,
"Side-channel": 1,
"physical probing": 2,
"timing attacks": 1
}
},
"standard_id": {
"BSI": {
"AIS20": 3
},
"CC": {
"CCMB-2006-09-001": 1,
"CCMB-2007-09-002": 1,
"CCMB-2007-09-003": 1,
"CCMB-2007-09-004": 1
},
"FIPS": {
"FIPS PUB 46-3": 1,
"FIPS197": 1,
"FIPS46-3": 2
},
"ISO": {
"ISO/IEC 7816-4": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 4
}
},
"DES": {
"3DES": {
"TDES": 1,
"Triple-DES": 4
},
"DES": {
"DES": 3
},
"Lucifer": {
"Lucifer": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"NXP": {
"NXP": 6,
"NXP Semiconductors": 2
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "tzeggel;[email protected]",
"/CreationDate": "D:20121011142205+02\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2010",
"/Keywords": "LEGIC advant Series",
"/ModDate": "D:20121011142205+02\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2010",
"/Subject": "LA-23-615a-en / BSI-DSZ-CC-0812",
"/Title": "LEGIC card-in-card AFS4096-JP11 V1.1.1.1",
"pdf_file_size_bytes": 588609,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"file:///C:/Dokumente%20und%20Einstellungen/NXP/ProjectID_ePasslet-Offering-JCOP_2009-11/tzeggel/Desktop/glossar.htm%23aes"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 32
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0812a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"ALC_DVS.2",
"AVA_VAN.5",
"EAL4+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0812b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "f736378bc2a35a69afdded3c78e7937886b8b8f3283c5fa2c98e347195e0300c",
"txt_hash": "5d657f2a64ef9e79bf620755dff278782fa5a795a926221c50bbcb520281740e"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "9b66bcf3cc78f775acc399a66df4980dae6d621900e952bdfa3ddeb47028e1bd",
"txt_hash": "8346a6c6df28b60028a650ad8fa57f35275d2f2b132ea5db32f2eb27e6756428"
}
},
"status": "archived"
}