This page was not yet optimized for use on mobile
devices.
Apollo OS e-Passport Version 1.0
CSV information
| Status | archived |
|---|---|
| Valid from | 27.07.2009 |
| Valid until | 31.07.2014 |
| Scheme | 🇯🇵 JP |
| Manufacturer | SC Square LTD. |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | EAL4+, AVA_VLA.4, AVA_MSU.3 |
Heuristics summary
Certificate ID: JISEC-CC-CRP-C0229
Certificate
certificate could not be downloaded, no link is available.
Certification report
Extracted keywords
Symmetric Algorithms
DESVendor
Infineon, Infineon Technologies AGSecurity level
EAL4, EAL 5, EAL5+, EAL 5 augmented, EAL4 augmentedClaims
A.PERS_AGENT, A.INSP_SYSSecurity Assurance Requirements (SAR)
ADV_IMP.2, ALC_DVS.2, AVA_MSU.3, AVA_VLA.4Protection profiles
BSI-PP-0017Certificates
BSI-DSZ-CC-0399-2007, CRP-C0229-01, Certification No. C0229Evaluation facilities
TÜV Informationstechnik, TÜViTSide-channel analysis
physical probing, DPA, Physical Tampering, physical tampering, Physical tampering, Malfunction, malfunction, fault injection, Fault Injection, reverse engineeringStandards
AIS 1, AIS 14, AIS 19, AIS 23, AIS 31, AIS 32, AIS 34, ISO/IEC 15408:2005, ISO/IEC 18045:2005, ICAO, CCMB-2005-08-001, CCMB-2005-08-002, CCMB-2005-08-003, CCMB-2005-08-004File metadata
| Title | untitled |
|---|---|
| Creation date | D:20090910140719+09'00' |
| Modification date | D:20090910140719+09'00' |
| Pages | 27 |
| Producer | Acrobat Distiller 6.0 (Windows) |
References
Outgoing- BSI-DSZ-CC-0399-2007 - archived - Infineon Smart Card IC (Security Controller) SLE66CLX800PE / m1581-e12, SLE66CLX800PEM / m1580-e12, SLE66CLX800PES / m1582-e12, SLE66CLX360PE / m1587-e12, SLE66CLX360PEM / m1588-e12 and SLE66CLX360PES / m1589-e12 with specific IC Dedicated Software
Security target
Extracted keywords
Symmetric Algorithms
DES, Triple-DES, 3DESHash functions
SHA-1Schemes
MACProtocols
PGPRandomness
RNDBlock cipher modes
ECB, CBCIC data groups
EF.DG1, EF.DG2, EF.DG3, EF.DG4, EF.DG5, EF.DG16Vendor
InfineonSecurity level
EAL 4+, EAL4, EAL5, EAL5+, EAL4+, EAL 5+, EAL4 augmented, EAL5 augmentedClaims
O.RND, T.CHIP_ID, T.SKIMMING, T.EAVESDROPPING, T.FORGERY, T.ABUSE_FUNC, T.INFORMATION_LEAKAGE, T.PHYS_TAMPER, T.MALFUNCTION, A.PERS_AGENT, A.INSP_SYS, OT.AC_PERS, OT.DATA_CONF, OT.PROT_ABUSE_FUNC, OT.PROT_PHYS_TAMPER, OT.PROT_INF_LEAK, OT.PROT_MALFUNCT, OT.PROT_ABUSE_FU, OE.PERSONALIZATION, OE.EXAM_MRTD, OE.PROT_LOGICAL_MRTDSecurity Assurance Requirements (SAR)
ACM_AUT.1, ACM_CAP.4, ADO_IGS, ADO_DEL, ADO_DEL.2, ADO_IGS.1, ADV_IMP.2, ADV_SPM.1, ADV_FSP.2, ADV_HLD.2, ADV_LLD.1, ADV_RCR.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.1, ALC_DVS, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.3, AVA_VLA.4, AVA_MSU.2, AVA_SOF.1, AVA_VLA.2Security Functional Requirements (SFR)
FAU_SAS.1, FAU_SAS.1.1, FCS_CKM.1, FCS_CKM, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_RND, FCS_COP, FCS_RND.1, FCS_UIT, FCS_CKM.1.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1, FDP_ACF.1, FDP_ACF, FDP_UCT, FDP_UIT, FDP_UCT.1, FDP_IFC.1, FDP_UIT.1, FDP_ACC, FDP_DAU.1, FDP_DAU, FDP_IFC, FDP_IFF, FDP_ACF.1.2, FDP_ACF.1.4, FDP_ACC.1.1, FDP_SDI.1, FDP_SDI.2, FIA_UAU, FIA_API, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.4, FIA_UAU.5, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.6, FIA_API.1, FIA_UCT, FMT_MTD, FMT_MSA.2, FMT_MOF.1, FMT_MSA.3, FMT_SMF.1, FMT_MOF.1.1, FMT_SMF.1.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FMT_MTD.1, FMT_MSA.1, FMT_MSA.3.1, FMT_MSA.3.2, FPT_FLS.1, FPT_TST.1, FPT_PHP.3, FPT_RVM.1, FPT_SEP.1, FPT_FLS.1.1, FPT_TST, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_AMT.1, FPT_PHP.3.1, FPT_RVM.1.1, FPT_SEP.1.1, FPT_SEP.1.2, FPT_TST.2.1, FRU_FLT.2.1, FTP_ITC.1, FTP_TRP.1Protection profiles
BSI-PP-0017, BSI-PP-0002-2001Certificates
BSI-DSZ-CC-0399-2007, CC-1, CC-2, CC-3, CC-4Side-channel analysis
Leak-Inherent, physical probing, DPA, Physical Tampering, physical tampering, Physical tampering, Malfunction, malfunction, fault injection, reverse engineeringStandards
FIPS 180-212, FIPS 46-3, FIPS 180-2, FIPS PUB 46-3, AIS31, ISO/IEC 7816, ICAO, CCMB-2005-08-001, CCMB-2005-08-002, CCMB-2005-08-003, CCMB-2005-08-004File metadata
| Creation date | D:20090812100814Z |
|---|---|
| Modification date | D:20090812131114+03'00' |
| Pages | 116 |
| Creator | Microsoft® Office Word 2007 |
| Producer | Microsoft® Office Word 2007 |
References
Outgoing- BSI-DSZ-CC-0399-2007 - archived - Infineon Smart Card IC (Security Controller) SLE66CLX800PE / m1581-e12, SLE66CLX800PEM / m1580-e12, SLE66CLX800PES / m1582-e12, SLE66CLX360PE / m1587-e12, SLE66CLX360PEM / m1588-e12 and SLE66CLX360PES / m1589-e12 with specific IC Dedicated Software
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
JISEC-CC-CRP-C0229Extracted SARs
ADV_FSP.2, ADV_HLD.2, ADV_IMP.2, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.3, AVA_SOF.1, AVA_VLA.4Scheme data
| Cert Id | JISEC-CC-CRP-C0229 | |
|---|---|---|
| Supplier | SC Square LTD. | |
| Toe Overseas Name | Apollo OS e-Passport 1.0 | |
| Expiration Date | 01.07.2014 | |
| Claim | EAL4+ ADV_IMP.2, ALC_DVS.2 PP | |
| Certification Date | 01.07.2009 | |
| Toe Overseas Link | https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0229_it8194.html | |
| Toe Japan Name | Apollo OS e-Passport 1.0 | |
| Enhanced | ||
| Product | Apollo OS e-Passport | |
| Toe Version | 1.0 | |
| Product Type | IT Product (IC chip firmware) | |
| Cc Version | 2.3 | |
| Assurance Level | EAL4 Augmented with ADV_IMP.2, ALC_DVS.2 | |
| Protection Profile | BSI-PP-0017 | |
| Vendor | SC Square LTD. | |
| Evaluation Facility | TÜV Informationstechnik GmbH, Evaluation Body for IT-Security | |
| Report Link | https://www.ipa.go.jp/en/security/c0229_erpt.pdf | |
| Cert Link | https://www.ipa.go.jp/en/security/c0229_eimg.pdf | |
| Target Link | https://www.ipa.go.jp/en/security/c0229_est.pdf | |
| Description | PRODUCT DESCRIPTION Description of TOE The Target of Evaluation (TOE) is the contactless integrated circuit chip of machine readable travel documents (MRTD's chip) programmed according to the Logical Data Structure (LDS) [LDS] and providing the Basic Access Control according to the ICAO technical report [PKI]. The MRTD is viewed as unit of - The physical MRTD as travel document in form of paper, plastic and chip. It presents visual readable data including (but not limited to) personal data of the MRTD holder - the biographical data on the biographical data page of the passport book, - the printed data in the Machine Readable Zone (MRZ) and - The printed portrait. - The logical MRTD as data of the MRTD holder stored according to the Logical Data Structure [LDS] as specified by ICAO on the contactless integrated circuit. It presents contactless readable data including (but not limited to) personal data of the MRTD holder - the digital Machine Readable Zone Data (digital MRZ data, EF.DG1), - the digitized portraits (EF.DG2), - the biometric reference data of finger(s) (EF.DG3) or iris image(s) (EF.DG4) or both - the other data according to LDS (EF.DG5 to EF.DG16) and - the Document security object The physical MRTD is protected by physical security measures (e.g. watermark on paper, security printing), logical (e.g. authentication keys of the MRTD痴 chip) and organisational security measures (e.g. control of materials, personalization procedures) [SSMR]. These security measures include the binding of the MRTD痴 chip to the passport book. The logical MRTD is protected in authenticity and integrity by a digital signature created by the document signer acting for the issuing State or Organization and the security features of the MRTD痴 chip. TOE security functions TOE security function is as follows - SF.Cryptographic Support The cryptographic support for the other Security Functions. - SF.Identification and Authentication The identification and authentication for the TOE user - SF. User Data Protection The user data protection - SF.Security Management The security management of the TOE - SF.Protection (Protection of TSC) This Security Function protects the TSF functionality, TSF data and user data. | |
References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "2b75001bea02144e",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "JISEC-CC-CRP-C0229",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL4+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_MSU",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_RCR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VLA",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_ADM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_HLD",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_SOF",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_LLD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_USR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"1.0"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0399-2007"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0169-2002",
"BSI-DSZ-CC-0399-2007",
"BSI-DSZ-CC-0322-2005",
"BSI-DSZ-CC-0266-2005",
"BSI-DSZ-CC-0223-2003"
]
}
},
"scheme_data": {
"cert_id": "JISEC-CC-CRP-C0229",
"certification_date": "2009-07-01",
"claim": "EAL4+ ADV_IMP.2, ALC_DVS.2 PP",
"enhanced": {
"assurance_level": "EAL4 Augmented with ADV_IMP.2, ALC_DVS.2",
"cc_version": "2.3",
"cert_link": "https://www.ipa.go.jp/en/security/c0229_eimg.pdf",
"description": "PRODUCT DESCRIPTION Description of TOE The Target of Evaluation (TOE) is the contactless integrated circuit chip of machine readable travel documents (MRTD\u0027s chip) programmed according to the Logical Data Structure (LDS) [LDS] and providing the Basic Access Control according to the ICAO technical report [PKI]. The MRTD is viewed as unit of - The physical MRTD as travel document in form of paper, plastic and chip. It presents visual readable data including (but not limited to) personal data of the MRTD holder - the biographical data on the biographical data page of the passport book, - the printed data in the Machine Readable Zone (MRZ) and - The printed portrait. - The logical MRTD as data of the MRTD holder stored according to the Logical Data Structure [LDS] as specified by ICAO on the contactless integrated circuit. It presents contactless readable data including (but not limited to) personal data of the MRTD holder - the digital Machine Readable Zone Data (digital MRZ data, EF.DG1), - the digitized portraits (EF.DG2), - the biometric reference data of finger(s) (EF.DG3) or iris image(s) (EF.DG4) or both - the other data according to LDS (EF.DG5 to EF.DG16) and - the Document security object The physical MRTD is protected by physical security measures (e.g. watermark on paper, security printing), logical (e.g. authentication keys of the MRTD\u75f4 chip) and organisational security measures (e.g. control of materials, personalization procedures) [SSMR]. These security measures include the binding of the MRTD\u75f4 chip to the passport book. The logical MRTD is protected in authenticity and integrity by a digital signature created by the document signer acting for the issuing State or Organization and the security features of the MRTD\u75f4 chip. TOE security functions TOE security function is as follows - SF.Cryptographic Support The cryptographic support for the other Security Functions. - SF.Identification and Authentication The identification and authentication for the TOE user - SF. User Data Protection The user data protection - SF.Security Management The security management of the TOE - SF.Protection (Protection of TSC) This Security Function protects the TSF functionality, TSF data and user data.",
"evaluation_facility": "T\u00dcV Informationstechnik GmbH, Evaluation Body for IT-Security",
"product": "Apollo OS e-Passport",
"product_type": "IT Product (IC chip firmware)",
"protection_profile": "BSI-PP-0017",
"report_link": "https://www.ipa.go.jp/en/security/c0229_erpt.pdf",
"target_link": "https://www.ipa.go.jp/en/security/c0229_est.pdf",
"toe_version": "1.0",
"vendor": "SC Square LTD."
},
"expiration_date": "2014-07-01",
"supplier": "SC Square LTD.",
"toe_japan_name": "Apollo OS e-Passport 1.0",
"toe_overseas_link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0229_it8194.html",
"toe_overseas_name": "Apollo OS e-Passport 1.0"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0399-2007"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0399-2007",
"BSI-DSZ-CC-0322-2005",
"BSI-DSZ-CC-0266-2005"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "SC Square LTD.",
"manufacturer_web": "https://www.scsquare.com/",
"name": "Apollo OS e-Passport Version 1.0",
"not_valid_after": "2014-07-31",
"not_valid_before": "2009-07-27",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "c0229_erpt.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0399-2007": 1
},
"JP": {
"CRP-C0229-01": 1,
"Certification No. C0229": 1
}
},
"cc_claims": {
"A": {
"A.INSP_SYS": 1,
"A.PERS_AGENT": 1
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0017": 2
}
},
"cc_sar": {
"ADV": {
"ADV_IMP.2": 3
},
"ALC": {
"ALC_DVS.2": 4
},
"AVA": {
"AVA_MSU.3": 1,
"AVA_VLA.4": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 5": 1,
"EAL 5 augmented": 1,
"EAL4": 3,
"EAL4 augmented": 2,
"EAL5+": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"TUV": {
"T\u00dcV Informationstechnik": 2,
"T\u00dcViT": 2
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"Fault Injection": 1,
"Malfunction": 1,
"Physical Tampering": 1,
"Physical tampering": 1,
"fault injection": 3,
"malfunction": 3,
"physical tampering": 1
},
"SCA": {
"DPA": 3,
"physical probing": 1
},
"other": {
"reverse engineering": 1
}
},
"standard_id": {
"BSI": {
"AIS 1": 1,
"AIS 14": 1,
"AIS 19": 1,
"AIS 23": 1,
"AIS 31": 1,
"AIS 32": 1,
"AIS 34": 1
},
"CC": {
"CCMB-2005-08-001": 2,
"CCMB-2005-08-002": 2,
"CCMB-2005-08-003": 2,
"CCMB-2005-08-004": 2
},
"ICAO": {
"ICAO": 7
},
"ISO": {
"ISO/IEC 15408:2005": 1,
"ISO/IEC 18045:2005": 2
}
},
"symmetric_crypto": {
"DES": {
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon": 2,
"Infineon Technologies AG": 1
}
},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20090910140719+09\u002700\u0027",
"/ModDate": "D:20090910140719+09\u002700\u0027",
"/Producer": "Acrobat Distiller 6.0 (Windows)",
"/Title": "untitled",
"pdf_file_size_bytes": 170365,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 27
},
"st_filename": "c0229_est.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0399-2007": 1
},
"NL": {
"CC-1": 3,
"CC-2": 3,
"CC-3": 2,
"CC-4": 1
}
},
"cc_claims": {
"A": {
"A.INSP_SYS": 2,
"A.PERS_AGENT": 2
},
"O": {
"O.RND": 1
},
"OE": {
"OE.EXAM_MRTD": 1,
"OE.PERSONALIZATION": 2,
"OE.PROT_LOGICAL_MRTD": 2
},
"OT": {
"OT.AC_PERS": 4,
"OT.DATA_CONF": 3,
"OT.PROT_ABUSE_FU": 2,
"OT.PROT_ABUSE_FUNC": 1,
"OT.PROT_INF_LEAK": 2,
"OT.PROT_MALFUNCT": 2,
"OT.PROT_PHYS_TAMPER": 1
},
"T": {
"T.ABUSE_FUNC": 1,
"T.CHIP_ID": 1,
"T.EAVESDROPPING": 1,
"T.FORGERY": 1,
"T.INFORMATION_LEAKAGE": 1,
"T.MALFUNCTION": 1,
"T.PHYS_TAMPER": 1,
"T.SKIMMING": 1
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0002-2001": 1,
"BSI-PP-0017": 3
}
},
"cc_sar": {
"ACM": {
"ACM_AUT.1": 1,
"ACM_CAP.4": 1
},
"ADO": {
"ADO_DEL": 1,
"ADO_DEL.2": 1,
"ADO_IGS": 1,
"ADO_IGS.1": 1
},
"ADV": {
"ADV_FSP.2": 1,
"ADV_HLD.2": 1,
"ADV_IMP.2": 8,
"ADV_LLD.1": 1,
"ADV_RCR.1": 1,
"ADV_SPM.1": 3
},
"AGD": {
"AGD_ADM.1": 1,
"AGD_USR.1": 1
},
"ALC": {
"ALC_DVS": 1,
"ALC_DVS.2": 8,
"ALC_LCD.1": 1,
"ALC_TAT.1": 2
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_MSU.2": 1,
"AVA_MSU.3": 1,
"AVA_SOF.1": 1,
"AVA_VLA.2": 1,
"AVA_VLA.4": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 4+": 1,
"EAL 5+": 1,
"EAL4": 9,
"EAL4 augmented": 2,
"EAL4+": 1,
"EAL5": 1,
"EAL5 augmented": 1,
"EAL5+": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_SAS.1": 7,
"FAU_SAS.1.1": 4
},
"FCS": {
"FCS_CKM": 22,
"FCS_CKM.1": 30,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 4,
"FCS_CKM.4": 33,
"FCS_COP": 46,
"FCS_COP.1": 24,
"FCS_RND": 8,
"FCS_RND.1": 13,
"FCS_UIT": 1
},
"FDP": {
"FDP_ACC": 19,
"FDP_ACC.1": 25,
"FDP_ACC.1.1": 1,
"FDP_ACF": 15,
"FDP_ACF.1": 34,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.4": 1,
"FDP_DAU": 2,
"FDP_DAU.1": 5,
"FDP_IFC": 1,
"FDP_IFC.1": 9,
"FDP_IFF": 1,
"FDP_ITC.1": 17,
"FDP_ITC.2": 13,
"FDP_SDI.1": 1,
"FDP_SDI.2": 1,
"FDP_UCT": 12,
"FDP_UCT.1": 12,
"FDP_UIT": 12,
"FDP_UIT.1": 13
},
"FIA": {
"FIA_API": 6,
"FIA_API.1": 1,
"FIA_UAU": 36,
"FIA_UAU.1": 6,
"FIA_UAU.1.1": 3,
"FIA_UAU.1.2": 3,
"FIA_UAU.4": 7,
"FIA_UAU.5": 4,
"FIA_UAU.5.1": 3,
"FIA_UAU.5.2": 4,
"FIA_UAU.6": 7,
"FIA_UCT": 1,
"FIA_UID.1": 9,
"FIA_UID.1.1": 3,
"FIA_UID.1.2": 3
},
"FMT": {
"FMT_LIM.1": 12,
"FMT_LIM.1.1": 3,
"FMT_LIM.2": 12,
"FMT_LIM.2.1": 3,
"FMT_MOF.1": 12,
"FMT_MOF.1.1": 4,
"FMT_MSA.1": 2,
"FMT_MSA.2": 22,
"FMT_MSA.3": 4,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD": 22,
"FMT_MTD.1": 14,
"FMT_SMF.1": 17,
"FMT_SMF.1.1": 3,
"FMT_SMR.1": 16,
"FMT_SMR.1.1": 3,
"FMT_SMR.1.2": 3
},
"FPT": {
"FPT_AMT.1": 1,
"FPT_FLS.1": 11,
"FPT_FLS.1.1": 3,
"FPT_PHP.3": 11,
"FPT_PHP.3.1": 4,
"FPT_RVM.1": 6,
"FPT_RVM.1.1": 3,
"FPT_SEP.1": 8,
"FPT_SEP.1.1": 4,
"FPT_SEP.1.2": 4,
"FPT_TST": 1,
"FPT_TST.1": 11,
"FPT_TST.1.1": 3,
"FPT_TST.1.2": 3,
"FPT_TST.1.3": 4,
"FPT_TST.2.1": 1
},
"FRU": {
"FRU_FLT.2.1": 1
},
"FTP": {
"FTP_ITC.1": 9,
"FTP_TRP.1": 8
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 6
},
"ECB": {
"ECB": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PGP": {
"PGP": 2
}
},
"crypto_scheme": {
"MAC": {
"MAC": 10
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 7
}
}
},
"ic_data_group": {
"EF": {
"EF.DG1": 1,
"EF.DG16": 1,
"EF.DG2": 1,
"EF.DG3": 1,
"EF.DG4": 1,
"EF.DG5": 1
}
},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 4
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 5,
"Physical Tampering": 5,
"Physical tampering": 1,
"fault injection": 1,
"malfunction": 6,
"physical tampering": 8
},
"SCA": {
"DPA": 1,
"Leak-Inherent": 2,
"physical probing": 4
},
"other": {
"reverse engineering": 1
}
},
"standard_id": {
"BSI": {
"AIS31": 5
},
"CC": {
"CCMB-2005-08-001": 1,
"CCMB-2005-08-002": 1,
"CCMB-2005-08-003": 1,
"CCMB-2005-08-004": 1
},
"FIPS": {
"FIPS 180-2": 3,
"FIPS 180-212": 1,
"FIPS 46-3": 3,
"FIPS PUB 46-3": 1
},
"ICAO": {
"ICAO": 12
},
"ISO": {
"ISO/IEC 7816": 2
}
},
"symmetric_crypto": {
"DES": {
"3DES": {
"3DES": 1,
"Triple-DES": 22
},
"DES": {
"DES": 11
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon": 2
}
},
"vulnerability": {}
},
"st_metadata": {
"/CreationDate": "D:20090812100814Z",
"/Creator": "Microsoft\u00ae Office Word 2007",
"/ModDate": "D:20090812131114+03\u002700\u0027",
"/Producer": "Microsoft\u00ae Office Word 2007",
"pdf_file_size_bytes": 1066290,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": true,
"pdf_number_of_pages": 116
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0229_erpt.pdf",
"scheme": "JP",
"security_level": {
"_type": "Set",
"elements": [
"EAL4+",
"AVA_MSU.3",
"AVA_VLA.4"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0229_est.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "f26ccca1470cbfbb6ce3effb35195ed8f5e922cb312c87f87989873662d9d91b",
"txt_hash": "b60ded4ae888ec20879ce4bc753b2573abb13639acfde84339720ee86a541120"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "1bbf86d94d9fb2279b839d4ab92d80a59e5012ec43c7b36b549caa18746a1222",
"txt_hash": "405e8f2f6e6e4efd52ee0478b151cb757d953adff74d39bd842d0a5768af01cf"
}
},
"status": "archived"
}