Sm@rtCafé® Expert 7.0 EAL 6+ C1

CSV information

Status archived
Valid from 29.05.2020
Valid until 29.05.2025
Scheme 🇩🇪 DE
Manufacturer Veridos GmbH - Identity Solutions by Giesecke & Devrient and Bundesdruckerei
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level EAL6+, ALC_FLR.1
Protection profiles

Heuristics summary

Certificate ID: BSI-DSZ-CC-1092-2020

Certificate

Extracted keywords

Vendor
Giesecke+Devrient

Security level
EAL 6+, EAL 6, EAL 5, EAL 2, EAL 6 augmented
Security Assurance Requirements (SAR)
ALC_FLR.1, ALC_FLR
Protection profiles
BSI-CC-PP-0099-
Certificates
BSI-DSZ-CC-1092-2020

Standards
ISO/IEC 15408, ISO/IEC 18045

File metadata

Title Certificate BSI-DSZ-CC-1092-2020
Subject Sm@rtCafé® Expert 7.0 EAL 6+C1
Keywords Common Criteria, Certification, Zertifizierung, Smart Card, Java Card
Author Bundesamt für Sicherheit in der Informationstechnik
Creation date D:20200608084917+02'00'
Modification date D:20200608085041+02'00'
Pages 1
Creator Writer
Producer LibreOffice 6.2

Certification report

Extracted keywords

Symmetric Algorithms
AES, DES, 3-DES, 3DES, TDEA, CBC-MAC, CMAC
Asymmetric Algorithms
RSA 2048, RSA-CRT, ECDH, ECDSA, ECC
Hash functions
SHA-1, SHA-2
Schemes
MAC, Key Agreement
Protocols
PGP
Randomness
RNG
Block cipher modes
ECB, CBC

Vendor
Infineon, Infineon Technologies AG, Giesecke+Devrient, G+D, G&D, Giesecke & Devrient

Security level
EAL 6+, EAL 6, EAL 5, EAL 2, EAL 1, EAL 4, EAL 2+, EAL6, EAL 5+, EAL 6 augmented, EAL6 augmented
Security Assurance Requirements (SAR)
ADV_SPM.1, ADV_ARC, ALC_FLR.1, ALC_FLR, ALC_CMC.5, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.3, ATE_FUN, ATE_COV, ATE_DPT, ATE_IND, AVA_VAN
Security Functional Requirements (SFR)
FCO_NRO.2, FCS_COP.1, FCS_RNG.1, FCS_CKM.1, FCS_COP.1.1, FIA_UID, FPT_TDC.1, FTP_ITC
Protection profiles
BSI-CC-PP-0099-, BSI-CC-PP-0099-2017
Certificates
BSI-DSZ-CC-1092-2020, BSI-DSZ-CC-1028-2017, BSI-DSZ-CC-1092-, BSI-DSZ-CC-0951-V4-2019, BSI-DSZ-CC-S-0127-2019, BSI-DSZ-CC-S-0127-
Evaluation facilities
TÜV Informationstechnik, TÜViT

Side-channel analysis
malfunction, JIL
Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, 04.2020, Security Target Sm@rtCafé® Expert 7.0 EAL 6+ C1, Giesecke+Devrient Mobile Security GmbH (confidential document) 7 specifically • AIS 1, Version 13, Durchführung der Ortsbesichtigung in der Entwicklungsumgebung, Sm@rtCafé® Expert 7.0 EAL 6+ C1, Version 6, 25.05.2020, TÜV Informationstechnik GmbH (confidential document) [8] Java Card Protection Profile - Open Configuration, December 2017, Version 3.0.5, 36 for Sm@rtCafé® Expert 7.0 EAL 6+ C1, Version 6, 25.05.2020, BSI-DSZ-CC-1092- 2020, TÜViT GmbH (confidential document) [11] Configuration list for the TOE, Version 1.5, 18.05.2020, Giesecke+Devrient Mobile Security, confidential document) [12] Preparative Procedures Sm@rtCafé® Expert Expert 7.0 EAL 6+ C1 Version 2.1 , 15.04.2020, “Evaluation Technical Report for Composite Evaluation (ETR Comp)”, TÜV Informationstechnik GmbH (confidential document) [16] GlobalPlatform Card Specification Version 2.2.1, January 2011 [17] GlobalPlatform Card Common

Standards
FIPS180-4, FIPS 197, FIPS186-4, FIPS46-3, FIPS PUB 180-4, FIPS PUB 186-4, FIPS197, SP 800-108, PKCS5, PKCS #1, AIS 34, AIS 25, AIS 26, AIS 36, AIS 46, AIS 37, AIS 20, AIS 31, AIS 35, AIS 1, AIS 32, AIS 47, AIS20, AIS31, RFC 5639, RFC5639, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065, ISO/IEC9796-2, ISO/IEC 11770-3, ISO/IEC 18031:2011, SCP03, SCP02
Technical reports
BSI TR-02102, BSI 7148, BSI 24

File metadata

Title Certification Report BSI-DSZ-CC-1092-2020
Subject Sm@rtCafé® Expert 7.0 EAL 6+C1
Keywords "Common Criteria, Certification, Zertifizierung, Smart Card, Java Card"
Author Bundesamt für Sicherheit in der Informationstechnik
Creation date D:20200608083506+02'00'
Modification date D:20200608084737+02'00'
Pages 37
Creator Writer
Producer LibreOffice 6.2

Frontpage

Certificate ID BSI-DSZ-CC-1092-2020
Certified item Sm@rtCafé® Expert 7.0 EAL 6+ C1
Certification lab BSI
Developer Veridos GmbH - Identity Solutions by Giesecke+Devrient and Bundesdruckerei

References

Outgoing
  • BSI-DSZ-CC-1028-2017 - archived - Sm@rtCafé® Expert 7.0 C3
  • BSI-DSZ-CC-0951-V4-2019 - archived - Infineon Security Controller M5073 G11 with optional RSA2048/4096 v2.03.008 or v2.07.003, EC v2.03.008 or v2.07.003, SHA-2 v1.01 and Toolbox v2.03.008 or v2.07.003 libraries, symmetric crypto library v2.02.010, as well as with specific IC dedicated firmware, including the Flash Loader enhanced by the Mutual Authentication Extension (MAE)

Security target

Extracted keywords

Symmetric Algorithms
AES, DES, 3DES, 3-DES, Triple-DES, TDES, TDEA, CBC-MAC, CMAC
Asymmetric Algorithms
RSA-CRT, ECDH, ECDSA, ECC, Diffie-Hellman
Hash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-2
Schemes
MAC, Key Agreement
Randomness
TRNG, RNG, RND
Block cipher modes
ECB, CBC

JavaCard versions
Java Card 2.2.2
JavaCard API constants
TYPE_ACCESS
Vendor
Infineon, Infineon Technologies AG, Giesecke+Devrient, G+D, G&D, Giesecke & Devrient

Security level
EAL 6+, EAL6+, EAL6, EAL 4+, EAL 6, EAL6 augmented, EAL 6 augmented
Claims
D.APP_I_DATA, D.SEC_DATA, D.PIN, D.CRYPTO, O.CARD-, O.SCP, O.SID, O.FIREWALL, O.GLOBAL_ARRAYS_CONFID, O.GLOBAL_ARRAYS_INTEG, O.NATIVE, O.OPERATE, O.REALLOCATION, O.RESOURCES, O.ALARM, O.CIPHER, O.RNG, O.KEY-MNGT, O.PIN-MNGT, O.TRANSACTION, O.OBJ-DELETION, O.DELETION, O.LOAD, O.INSTALL, O.CARD-MANAGEMENT, O.PIN-, O.APPLET, O.CODE_PKG, O.JAVAOBJECT, O.GLOBAL_ARRAYS, O.KEY-, O.PINMNGT, O.RND, O.TDES, O.AES, T.SECURE_DELETION, T.CONFID-APPLI-DATA, T.CONFID-JCS-CODE, T.CONFID-JCS-DATA, T.INTEG-APPLI-CODE, T.INTEG-APPLI-DATA, T.INTEG-JCS-CODE, T.INTEG-JCS-DATA, T.SID, T.EXE-CODE, T.NATIVE, T.RESOURCES, T.DELETION, T.INSTALL, T.OBJ-DELETION, T.PHYSICAL, T.CONFID-APPLI-, T.CONFID-, T.INTEG-APPLI-, T.OBJDELETION, T.INTEGJCS-DATA, T.EXECODE, T.INTEG-, T.INTEGAPPLI-DATA, T.INTEGAPPLI-CODE, T.INTEG-JCS-, T.INTEG-JCSCODE, A.DELETION, A.APPLET, A.VERIFICATION, R.JAVA, OP.ARRAY_ACCESS, OP.ARRAY_LENGTH, OP.ARRAY_AASTORE, OP.CREATE, OP.DELETE_APPLET, OP.DELETE_PCKG, OP.DELETE_PCKG_APPLET, OP.INSTANCE_FIELD, OP.INVK_VIRTUAL, OP.INVK_INTERFACE, OP.JAVA, OP.THROW, OP.TYPE_ACCESS, OP.PUTFIELD, OP.PUTSTATIC, OP.PUT, OE.CARD-MANAGEMENT, OE.SCP, OE.APPLET, OE.VERIFICATION, OE.CODE-EVIDENCE, OE.CODE-, OSP.VERIFICATION
Security Assurance Requirements (SAR)
ADV_SPM.1, ADV_FSP.4, ADV_ARC, ADV_ARC.1, ADV_FSP.1, ADV_TDS.1, ADV_FSP.5, ADV_TDS.4, ADV_TDS.3, ADV_TDS.5, ADV_INT.3, ADV_IMP.1, ADV_IMP.2, ADV_FSP.2, AGD_OPE.1, AGD_PRE.1, ALC_FLR.1, ALC_DVS.2, ALC_CMC.5, ALC_TAT.1, ALC_TAT, ALC_TAT.3, ALC_CMS.1, ALC_LCD.1, ALC_CMS.5, ALC_DEL.1, ATE_COV.3, ATE_FUN.1, ATE_FUN.2, ATE_COV.1, ATE_COV.2, ATE_DPT.1, ATE_DPT.3, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1, ASE_INT.2, ASE_REQ.2, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_ARP.1, FAU_ARP.1.1, FAU_SAA.1, FAU_SAS.1, FCO_NRO, FCO_NRO.2, FCS_RNG, FCS_RNG.1.1, FCS_RNG.1, FCS_RNG.1.2, FCS_CKM.1, FCS_CKM.4, FCS_CKM.4.1, FCS_COP.1, FCS_CKM.2, FCS_CKM, FCS_COP, FDP_ACC, FDP_ACC.2, FDP_ACF, FDP_ACF.1, FDP_IFC, FDP_IFC.1, FDP_IFF, FDP_IFF.1, FDP_RIP, FDP_RIP.1, FDP_ROL.1, FDP_ROL, FDP_SDI, FDP_SDI.2, FDP_ITC, FDP_ITC.2, FDP_IFC.2, FDP_UIT, FDP_UIT.1, FDP_ACC.1, FDP_ITC.1, FDP_SDI.1, FDP_ITT.1, FDP_SDC.1, FIA_ATD, FIA_ATD.1, FIA_UID, FIA_UID.2, FIA_USB, FIA_USB.1, FIA_UID.1, FIA_API.1, FMT_MSA, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD, FMT_MTD.1, FMT_MTD.3, FMT_SMR, FMT_SMF, FMT_LIM.1, FMT_LIM.2, FMT_LIM, FPR_UNO.1, FPR_UNO.1.1, FPT_PHP.3, FPT_TST.1, FPT_FLS.1, FPT_FLS.1.1, FPT_TDC.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_FLS, FPT_RCV, FPT_RCV.3, FPT_PHP.3.1, FPT_ITT.1, FPT_TST.2, FRU_FLT.2, FTP_ITC, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.3, FTP_TRP.1
Protection profiles
BSI-CC-PP-0084-2014
Certificates
BSI-DSZ-CC-0951-V4-2019, BSI-DSZ-CC-0951-V4-

Side-channel analysis
Leak-Inherent, physical probing, physical tampering, Malfunction, JIL
Certification process
out of scope, a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are, with ECDH is part of this SFR. 6 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 8 Security Functional Requirements Security Target Lite Sm@rtCafé® Expert 7.0 EAL 6+, Dependencies: No dependencies. 7 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 8 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 9, shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 10 The implemented ECDH key agreement is reduced to scalar multiplication, checking for

Standards
FIPS 186-4, FIPS 197, FIPS180-4, FIPS 140-2, PKCS1, PKCS5, PKCS3, AIS20, AIS 31, AIS31, AIS 20, RFC5639, RFC 5639, ISO/IEC 7816, ISO/IEC 14443, ISO/IEC 9796-2, SCP02, SCP03, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-001

File metadata

Title Security Target Lite Sm@rtCafé® Expert 7.0 EAL 6+ C1
Subject Common Criteria Security Target Lite in version 4.7 from 18.05.2020
Keywords dual-interface, contact based or pure contactless smart card, Javacard operating system (OS), multi-purpose Java card, post-issuance installation of applets, open configuration, Java Card System Protection Profile (Open Configuration), government card, ID card, passport, payment card, signature card
Author Dr. Ulrich Stutenbäumer (Giesecke+Devrient Mobile Security GmbH)
Creation date D:20200518130755+02'00'
Modification date D:20200518132406+02'00'
Pages 130
Creator Acrobat PDFMaker 19 für Word
Producer Adobe PDF Library 19.21.90

References

Outgoing
  • BSI-DSZ-CC-0951-V4-2019 - archived - Infineon Security Controller M5073 G11 with optional RSA2048/4096 v2.03.008 or v2.07.003, EC v2.03.008 or v2.07.003, SHA-2 v1.01 and Toolbox v2.03.008 or v2.07.003 libraries, symmetric crypto library v2.02.010, as well as with specific IC dedicated firmware, including the Flash Loader enhanced by the Mutual Authentication Extension (MAE)

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

BSI-DSZ-CC-1092-2020

Extracted SARs

ADV_ARC.1, ADV_FSP.5, ADV_IMP.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.5, AGD_OPE.1, AGD_PRE.1, ALC_CMC.5, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_FLR.1, ALC_LCD.1, ALC_TAT.3, ASE_CCL.1, ASE_ECD.1, ASE_INT.2, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.3, ATE_DPT.3, ATE_FUN.2, AVA_VAN.5

References

Loading...

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1092c_pdf.pdf",
  "dgst": "e4256d8111c60a46",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "BSI-DSZ-CC-1092-2020",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL6+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "7.0"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": {
      "_type": "Set",
      "elements": [
        "94167fd161e87d71"
      ]
    },
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1028-2017",
          "BSI-DSZ-CC-0951-V4-2019"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0891-2015",
          "BSI-DSZ-CC-0951-V2-2017",
          "BSI-DSZ-CC-0782-2012",
          "BSI-DSZ-CC-1028-2017",
          "BSI-DSZ-CC-0951-V3-2018",
          "BSI-DSZ-CC-0951-2015",
          "BSI-DSZ-CC-0951-V4-2019",
          "BSI-DSZ-CC-0868-2014"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0951-V4-2019"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0951-V4-2019"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Veridos GmbH - Identity Solutions by Giesecke \u0026 Devrient and Bundesdruckerei",
  "manufacturer_web": "https://www.veridos.com",
  "name": "Sm@rtCaf\u00e9\u00ae Expert 7.0 EAL 6+ C1",
  "not_valid_after": "2025-05-29",
  "not_valid_before": "2020-05-29",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "1092c_pdf.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1092-2020": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0099-": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_FLR": 1,
          "ALC_FLR.1": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL 5": 1,
          "EAL 6": 1,
          "EAL 6 augmented": 1,
          "EAL 6+": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 15408": 2,
          "ISO/IEC 18045": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "GD": {
          "Giesecke+Devrient": 1
        }
      },
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20200608084917+02\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "Common Criteria, Certification, Zertifizierung, Smart Card, Java Card",
      "/ModDate": "D:20200608085041+02\u002700\u0027",
      "/Producer": "LibreOffice 6.2",
      "/Subject": "Sm@rtCaf\u00e9\u00ae Expert 7.0 EAL 6+C1  ",
      "/Title": "Certificate BSI-DSZ-CC-1092-2020",
      "pdf_file_size_bytes": 296860,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "1092a_pdf.pdf",
    "report_frontpage": {
      "DE": {
        "cc_security_level": "Common Criteria Part 3 conformant EAL 6 augmented by ALC_FLR.1",
        "cc_version": "PP conformant plus product specific extensions Common Criteria Part 2 extended",
        "cert_id": "BSI-DSZ-CC-1092-2020",
        "cert_item": "Sm@rtCaf\u00e9\u00ae Expert 7.0 EAL 6+ C1",
        "cert_lab": "BSI",
        "developer": "Veridos GmbH - Identity Solutions by Giesecke+Devrient and Bundesdruckerei",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ],
        "ref_protection_profiles": "Java Card Protection Profile - Open Configuration, December 2017, Version 3.0.5, BSI-CC-PP-0099- 2017"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 4
          },
          "ECDH": {
            "ECDH": 4
          },
          "ECDSA": {
            "ECDSA": 1
          }
        },
        "RSA": {
          "RSA 2048": 2,
          "RSA-CRT": 5
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0951-V4-2019": 1,
          "BSI-DSZ-CC-1028-2017": 3,
          "BSI-DSZ-CC-1092-": 1,
          "BSI-DSZ-CC-1092-2020": 23,
          "BSI-DSZ-CC-S-0127-": 1,
          "BSI-DSZ-CC-S-0127-2019": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0099-": 1,
          "BSI-CC-PP-0099-2017": 3
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 2,
          "ADV_SPM.1": 1
        },
        "ALC": {
          "ALC_CMC.5": 1,
          "ALC_CMS.5": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.2": 1,
          "ALC_FLR": 3,
          "ALC_FLR.1": 5,
          "ALC_LCD.1": 1,
          "ALC_TAT.3": 1
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_DPT": 1,
          "ATE_FUN": 1,
          "ATE_IND": 1
        },
        "AVA": {
          "AVA_VAN": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 2": 2,
          "EAL 2+": 1,
          "EAL 4": 1,
          "EAL 5": 4,
          "EAL 5+": 1,
          "EAL 6": 5,
          "EAL 6 augmented": 3,
          "EAL 6+": 18,
          "EAL6": 1,
          "EAL6 augmented": 1
        }
      },
      "cc_sfr": {
        "FCO": {
          "FCO_NRO.2": 2
        },
        "FCS": {
          "FCS_CKM.1": 5,
          "FCS_COP.1": 30,
          "FCS_COP.1.1": 16,
          "FCS_RNG.1": 2
        },
        "FIA": {
          "FIA_UID": 2
        },
        "FPT": {
          "FPT_TDC.1": 1
        },
        "FTP": {
          "FTP_ITC": 2
        }
      },
      "certification_process": {
        "ConfidentialDocument": {
          "04.2020, Security Target Sm@rtCaf\u00e9\u00ae Expert 7.0 EAL 6+ C1, Giesecke+Devrient Mobile Security GmbH (confidential document) 7 specifically \u2022 AIS 1, Version 13, Durchf\u00fchrung der Ortsbesichtigung in der Entwicklungsumgebung": 1,
          "36 for Sm@rtCaf\u00e9\u00ae Expert 7.0 EAL 6+ C1, Version 6, 25.05.2020, BSI-DSZ-CC-1092- 2020, T\u00dcViT GmbH (confidential document) [11] Configuration list for the TOE, Version 1.5, 18.05.2020, Giesecke+Devrient Mobile Security": 1,
          "Sm@rtCaf\u00e9\u00ae Expert 7.0 EAL 6+ C1, Version 6, 25.05.2020, T\u00dcV Informationstechnik GmbH (confidential document) [8] Java Card Protection Profile - Open Configuration, December 2017, Version 3.0.5": 1,
          "being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1,
          "confidential document) [12] Preparative Procedures Sm@rtCaf\u00e9\u00ae Expert Expert 7.0 EAL 6+ C1 Version 2.1 , 15.04.2020": 1,
          "\u201cEvaluation Technical Report for Composite Evaluation (ETR Comp)\u201d, T\u00dcV Informationstechnik GmbH (confidential document) [16] GlobalPlatform Card Specification Version 2.2.1, January 2011 [17] GlobalPlatform Card Common": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 15
        },
        "ECB": {
          "ECB": 4
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PGP": {
          "PGP": 3
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 2
        },
        "MAC": {
          "MAC": 6
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "TUV": {
          "T\u00dcV Informationstechnik": 4,
          "T\u00dcViT": 1
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 5
          },
          "SHA2": {
            "SHA-2": 2
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 2
        }
      },
      "side_channel_analysis": {
        "FI": {
          "malfunction": 1
        },
        "other": {
          "JIL": 4
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 1": 1,
          "AIS 20": 2,
          "AIS 25": 3,
          "AIS 26": 2,
          "AIS 31": 2,
          "AIS 32": 1,
          "AIS 34": 2,
          "AIS 35": 2,
          "AIS 36": 6,
          "AIS 37": 2,
          "AIS 46": 2,
          "AIS 47": 1,
          "AIS20": 1,
          "AIS31": 1
        },
        "FIPS": {
          "FIPS 197": 9,
          "FIPS PUB 180-4": 1,
          "FIPS PUB 186-4": 1,
          "FIPS180-4": 14,
          "FIPS186-4": 4,
          "FIPS197": 1,
          "FIPS46-3": 1
        },
        "ISO": {
          "ISO/IEC 11770-3": 1,
          "ISO/IEC 15408": 4,
          "ISO/IEC 17065": 2,
          "ISO/IEC 18031:2011": 1,
          "ISO/IEC 18045": 4,
          "ISO/IEC9796-2": 1
        },
        "NIST": {
          "SP 800-108": 3
        },
        "PKCS": {
          "PKCS #1": 24,
          "PKCS5": 6
        },
        "RFC": {
          "RFC 5639": 4,
          "RFC5639": 1
        },
        "SCP": {
          "SCP02": 1,
          "SCP03": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 16
          }
        },
        "DES": {
          "3DES": {
            "3-DES": 6,
            "3DES": 17,
            "TDEA": 1
          },
          "DES": {
            "DES": 2
          }
        },
        "constructions": {
          "MAC": {
            "CBC-MAC": 5,
            "CMAC": 9
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI 24": 1,
          "BSI 7148": 1,
          "BSI TR-02102": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "GD": {
          "G\u0026D": 1,
          "G+D": 2,
          "Giesecke \u0026 Devrient": 4,
          "Giesecke+Devrient": 13
        },
        "Infineon": {
          "Infineon": 2,
          "Infineon Technologies AG": 1
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20200608083506+02\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung, Smart Card, Java Card\"",
      "/ModDate": "D:20200608084737+02\u002700\u0027",
      "/Producer": "LibreOffice 6.2",
      "/Subject": "Sm@rtCaf\u00e9\u00ae Expert 7.0 EAL 6+C1  ",
      "/Title": "Certification Report BSI-DSZ-CC-1092-2020",
      "pdf_file_size_bytes": 1019539,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.commoncriteriaportal.org/",
          "https://www.bsi.bund.de/",
          "https://www.bsi.bund.de/zertifizierungsreporte",
          "https://www.sogis.eu/",
          "https://www.bsi.bund.de/AIS",
          "http://www.commoncriteriaportal.org/cc/",
          "https://www.bsi.bund.de/zertifizierung"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 37
    },
    "st_filename": "1092b_pdf.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 8
          },
          "ECDH": {
            "ECDH": 9
          },
          "ECDSA": {
            "ECDSA": 8
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 2
          }
        },
        "RSA": {
          "RSA-CRT": 12
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0951-V4-": 1,
          "BSI-DSZ-CC-0951-V4-2019": 2
        }
      },
      "cc_claims": {
        "A": {
          "A.APPLET": 4,
          "A.DELETION": 5,
          "A.VERIFICATION": 4
        },
        "D": {
          "D.APP_I_DATA": 2,
          "D.CRYPTO": 2,
          "D.PIN": 1,
          "D.SEC_DATA": 1
        },
        "O": {
          "O.AES": 1,
          "O.ALARM": 22,
          "O.APPLET": 15,
          "O.CARD-": 7,
          "O.CARD-MANAGEMENT": 26,
          "O.CIPHER": 15,
          "O.CODE_PKG": 13,
          "O.DELETION": 17,
          "O.FIREWALL": 43,
          "O.GLOBAL_ARRAYS": 1,
          "O.GLOBAL_ARRAYS_CONFID": 19,
          "O.GLOBAL_ARRAYS_INTEG": 9,
          "O.INSTALL": 16,
          "O.JAVAOBJECT": 44,
          "O.KEY-": 8,
          "O.KEY-MNGT": 15,
          "O.LOAD": 18,
          "O.NATIVE": 14,
          "O.OBJ-DELETION": 9,
          "O.OPERATE": 36,
          "O.PIN-": 5,
          "O.PIN-MNGT": 18,
          "O.PINMNGT": 1,
          "O.REALLOCATION": 18,
          "O.RESOURCES": 23,
          "O.RND": 4,
          "O.RNG": 11,
          "O.SCP": 64,
          "O.SID": 33,
          "O.TDES": 2,
          "O.TRANSACTION": 19
        },
        "OE": {
          "OE.APPLET": 9,
          "OE.CARD-MANAGEMENT": 5,
          "OE.CODE-": 5,
          "OE.CODE-EVIDENCE": 14,
          "OE.SCP": 13,
          "OE.VERIFICATION": 38
        },
        "OP": {
          "OP.ARRAY_AASTORE": 3,
          "OP.ARRAY_ACCESS": 4,
          "OP.ARRAY_LENGTH": 4,
          "OP.CREATE": 7,
          "OP.DELETE_APPLET": 4,
          "OP.DELETE_PCKG": 3,
          "OP.DELETE_PCKG_APPLET": 3,
          "OP.INSTANCE_FIELD": 3,
          "OP.INVK_INTERFACE": 7,
          "OP.INVK_VIRTUAL": 6,
          "OP.JAVA": 6,
          "OP.PUT": 5,
          "OP.PUTFIELD": 1,
          "OP.PUTSTATIC": 1,
          "OP.THROW": 5,
          "OP.TYPE_ACCESS": 5
        },
        "OSP": {
          "OSP.VERIFICATION": 5
        },
        "R": {
          "R.JAVA": 12
        },
        "T": {
          "T.CONFID-": 8,
          "T.CONFID-APPLI-": 1,
          "T.CONFID-APPLI-DATA": 16,
          "T.CONFID-JCS-CODE": 3,
          "T.CONFID-JCS-DATA": 4,
          "T.DELETION": 4,
          "T.EXE-CODE": 6,
          "T.EXECODE": 1,
          "T.INSTALL": 5,
          "T.INTEG-": 10,
          "T.INTEG-APPLI-": 4,
          "T.INTEG-APPLI-CODE": 4,
          "T.INTEG-APPLI-DATA": 12,
          "T.INTEG-JCS-": 2,
          "T.INTEG-JCS-CODE": 5,
          "T.INTEG-JCS-DATA": 3,
          "T.INTEG-JCSCODE": 1,
          "T.INTEGAPPLI-CODE": 2,
          "T.INTEGAPPLI-DATA": 1,
          "T.INTEGJCS-DATA": 6,
          "T.NATIVE": 5,
          "T.OBJ-DELETION": 2,
          "T.OBJDELETION": 1,
          "T.PHYSICAL": 3,
          "T.RESOURCES": 7,
          "T.SECURE_DELETION": 8,
          "T.SID": 16
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0084-2014": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 6,
          "ADV_ARC.1": 5,
          "ADV_FSP.1": 3,
          "ADV_FSP.2": 2,
          "ADV_FSP.4": 3,
          "ADV_FSP.5": 9,
          "ADV_IMP.1": 5,
          "ADV_IMP.2": 1,
          "ADV_INT.3": 1,
          "ADV_SPM.1": 3,
          "ADV_TDS.1": 2,
          "ADV_TDS.3": 3,
          "ADV_TDS.4": 5,
          "ADV_TDS.5": 2
        },
        "AGD": {
          "AGD_OPE.1": 7,
          "AGD_PRE.1": 5
        },
        "ALC": {
          "ALC_CMC.5": 3,
          "ALC_CMS.1": 1,
          "ALC_CMS.5": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.2": 4,
          "ALC_FLR.1": 7,
          "ALC_LCD.1": 3,
          "ALC_TAT": 1,
          "ALC_TAT.1": 2,
          "ALC_TAT.3": 2
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 4,
          "ASE_INT.1": 3,
          "ASE_INT.2": 2,
          "ASE_OBJ.2": 3,
          "ASE_REQ.1": 2,
          "ASE_REQ.2": 2,
          "ASE_SPD.1": 3,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.1": 2,
          "ATE_COV.2": 2,
          "ATE_COV.3": 1,
          "ATE_DPT.1": 1,
          "ATE_DPT.3": 1,
          "ATE_FUN.1": 5,
          "ATE_FUN.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4+": 1,
          "EAL 6": 3,
          "EAL 6 augmented": 2,
          "EAL 6+": 147,
          "EAL6": 4,
          "EAL6 augmented": 2,
          "EAL6+": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 21,
          "FAU_ARP.1.1": 1,
          "FAU_SAA.1": 3,
          "FAU_SAS.1": 1
        },
        "FCO": {
          "FCO_NRO": 6,
          "FCO_NRO.2": 3
        },
        "FCS": {
          "FCS_CKM": 10,
          "FCS_CKM.1": 35,
          "FCS_CKM.2": 4,
          "FCS_CKM.4": 30,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 12,
          "FCS_COP.1": 117,
          "FCS_RNG": 5,
          "FCS_RNG.1": 13,
          "FCS_RNG.1.1": 5,
          "FCS_RNG.1.2": 2
        },
        "FDP": {
          "FDP_ACC": 28,
          "FDP_ACC.1": 11,
          "FDP_ACC.2": 5,
          "FDP_ACF": 27,
          "FDP_ACF.1": 14,
          "FDP_IFC": 27,
          "FDP_IFC.1": 13,
          "FDP_IFC.2": 2,
          "FDP_IFF": 19,
          "FDP_IFF.1": 17,
          "FDP_ITC": 12,
          "FDP_ITC.1": 7,
          "FDP_ITC.2": 19,
          "FDP_ITT.1": 1,
          "FDP_RIP": 138,
          "FDP_RIP.1": 11,
          "FDP_ROL": 16,
          "FDP_ROL.1": 5,
          "FDP_SDC.1": 2,
          "FDP_SDI": 16,
          "FDP_SDI.1": 2,
          "FDP_SDI.2": 3,
          "FDP_UIT": 9,
          "FDP_UIT.1": 2
        },
        "FIA": {
          "FIA_API.1": 1,
          "FIA_ATD": 10,
          "FIA_ATD.1": 2,
          "FIA_UID": 16,
          "FIA_UID.1": 9,
          "FIA_UID.2": 1,
          "FIA_USB": 9,
          "FIA_USB.1": 3
        },
        "FMT": {
          "FMT_LIM": 4,
          "FMT_LIM.1": 1,
          "FMT_LIM.2": 1,
          "FMT_MSA": 101,
          "FMT_MSA.1": 10,
          "FMT_MSA.2": 2,
          "FMT_MSA.3": 17,
          "FMT_MTD": 22,
          "FMT_MTD.1": 2,
          "FMT_MTD.3": 1,
          "FMT_SMF": 22,
          "FMT_SMF.1": 20,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 35,
          "FMT_SMR.1": 32,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPR": {
          "FPR_UNO.1": 10,
          "FPR_UNO.1.1": 1
        },
        "FPT": {
          "FPT_FLS": 39,
          "FPT_FLS.1": 21,
          "FPT_FLS.1.1": 2,
          "FPT_ITT.1": 2,
          "FPT_PHP.3": 9,
          "FPT_PHP.3.1": 3,
          "FPT_RCV": 13,
          "FPT_RCV.3": 10,
          "FPT_TDC.1": 8,
          "FPT_TDC.1.1": 1,
          "FPT_TDC.1.2": 2,
          "FPT_TST.1": 9,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1,
          "FPT_TST.2": 1
        },
        "FRU": {
          "FRU_FLT.2": 1
        },
        "FTP": {
          "FTP_ITC": 14,
          "FTP_ITC.1": 8,
          "FTP_ITC.1.1": 1,
          "FTP_ITC.1.3": 1,
          "FTP_TRP.1": 2
        }
      },
      "certification_process": {
        "OutOfScope": {
          "Dependencies: No dependencies. 7 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 8 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 9": 1,
          "a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are": 1,
          "out of scope": 5,
          "shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 10 The implemented ECDH key agreement is reduced to scalar multiplication, checking for": 1,
          "with ECDH is part of this SFR. 6 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 8 Security Functional Requirements Security Target Lite Sm@rtCaf\u00e9\u00ae Expert 7.0 EAL 6+": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 6
        },
        "ECB": {
          "ECB": 9
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 1
        },
        "MAC": {
          "MAC": 10
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 4
          },
          "SHA2": {
            "SHA-2": 1,
            "SHA-224": 3,
            "SHA-256": 4,
            "SHA-384": 4,
            "SHA-512": 3
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {
        "misc": {
          "TYPE_ACCESS": 5
        }
      },
      "javacard_packages": {
        "javacard": {
          "javacard.framework": 5,
          "javacard.framework.applet": 1,
          "javacard.security": 7
        },
        "javacardx": {
          "javacardx.crypto": 1
        }
      },
      "javacard_version": {
        "JavaCard": {
          "Java Card 2.2.2": 3
        }
      },
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 4,
          "RNG": 19
        },
        "TRNG": {
          "TRNG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 3,
          "physical tampering": 5
        },
        "SCA": {
          "Leak-Inherent": 2,
          "physical probing": 1
        },
        "other": {
          "JIL": 2
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 20": 1,
          "AIS 31": 2,
          "AIS20": 4,
          "AIS31": 2
        },
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 2,
          "CCMB-2017-04-003": 2
        },
        "FIPS": {
          "FIPS 140-2": 1,
          "FIPS 186-4": 7,
          "FIPS 197": 10,
          "FIPS180-4": 3
        },
        "ISO": {
          "ISO/IEC 14443": 2,
          "ISO/IEC 7816": 2,
          "ISO/IEC 9796-2": 1
        },
        "PKCS": {
          "PKCS1": 12,
          "PKCS3": 1,
          "PKCS5": 3
        },
        "RFC": {
          "RFC 5639": 1,
          "RFC5639": 5
        },
        "SCP": {
          "SCP02": 4,
          "SCP03": 3
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 28
          }
        },
        "DES": {
          "3DES": {
            "3-DES": 7,
            "3DES": 3,
            "TDEA": 1,
            "TDES": 3,
            "Triple-DES": 4
          },
          "DES": {
            "DES": 12
          }
        },
        "constructions": {
          "MAC": {
            "CBC-MAC": 10,
            "CMAC": 6
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "GD": {
          "G\u0026D": 10,
          "G+D": 4,
          "Giesecke \u0026 Devrient": 2,
          "Giesecke+Devrient": 8
        },
        "Infineon": {
          "Infineon": 2,
          "Infineon Technologies AG": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Dr. Ulrich Stutenb\u00e4umer (Giesecke+Devrient Mobile Security GmbH)",
      "/Category": "Public",
      "/Chip": "M5073 G11",
      "/Comments": "Final",
      "/Company": "GuD",
      "/CreationDate": "D:20200518130755+02\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 19 f\u00fcr Word",
      "/HWManufacturer": "Infineon",
      "/Keywords": "dual-interface, contact based or pure contactless smart card, Javacard operating system (OS), multi-purpose Java card, post-issuance installation of applets, open configuration, Java Card System Protection Profile (Open Configuration),  government card, ID card, passport, payment card, signature card",
      "/ModDate": "D:20200518132406+02\u002700\u0027",
      "/Producer": "Adobe PDF Library 19.21.90",
      "/ProductName": "Sm@rtCaf\u00e9\u00ae Expert 7.0 EAL 6+ C1",
      "/SourceModified": "D:20200518110720",
      "/Subject": "Common Criteria Security Target Lite in version 4.7 from 18.05.2020",
      "/TOE": "Sm@rtCaf\u00e9\u00ae Expert 7.0 EAL 6+ C1",
      "/Title": "Security Target Lite Sm@rtCaf\u00e9\u00ae Expert 7.0 EAL 6+ C1",
      "pdf_file_size_bytes": 1543454,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 130
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": [
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0099b_pdf.pdf"
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1092a_pdf.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_FLR.1",
      "EAL6+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1092b_pdf.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "ea45147852194f9922c832dda9b6f2327b55e9c762b65f65727324ca9ab84af4",
      "txt_hash": "d8035d205e2c1d6ad3e63cc743c77f0c2fb277114148131c63781c00892eb353"
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "ac6942be2e36f7024acbcb055671f17291076f4c37399fa86016f6aa87a333ca",
      "txt_hash": "fa45fb4406fc99148c06c47e909e94cab4fbc6ba80a9c959fc8962e737070d29"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "753b0b266ff06be0af75a92593b2d04c56ce629c5be17dcb3e442ab3ce2d1124",
      "txt_hash": "ece1b80fb4b1a40a26bee2cac92bc794144df8a4d369d04a126bbc734f3c7081"
    }
  },
  "status": "archived"
}