This page was not yet optimized for use on mobile
devices.
Feitian FT-JCOS v1.0/0.106.13 running on Infineon M7892 B11
CSV information
| Status | archived |
|---|---|
| Valid from | 27.06.2016 |
| Valid until | 27.06.2021 |
| Scheme | 🇳🇴 NO |
| Manufacturer | Feitian Technologies Co., Ltd. |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | AVA_VAN.5, EAL4+, ALC_DVS.2 |
Heuristics summary
Certificate ID: SERTIT-079
Certificate
certificate could not be downloaded, no link is available.
Certification report
Extracted keywords
Symmetric Algorithms
AES, DESAsymmetric Algorithms
ECCJavaCard versions
Java Card 2.2.2, GlobalPlatform 2.1.1Vendor
Infineon, Feitian, Feitian Technologies CoSecurity level
EAL2, EAL4, EAL 4+, EAL1, EAL7Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ADV_COMP.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR, ALC_DVS.2, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_LCD.1, ALC_TAT.1, ALC_COMP.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, ATE_COMP.1, ATE_IND, AVA_VAN.5, AVA_COMP.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.2, ASE_SPD.1, ASE_OBJ.2, ASE_TSS.1, ASE_COMP.1Security Functional Requirements (SFR)
FAU_ARP.1, FCO_NRO, FCS_RNG.1, FCS_CKM.1, FCS_CKM.2, FCS_CKM.3, FCS_CKM.4, FCS_COP.1, FDP_ACC, FDP_ACF, FDP_IFC, FDP_IFF, FDP_ITC, FDP_RIP, FDP_ROL, FDP_SDI.2, FDP_UIT, FIA_UID, FIA_USB, FMT_MSA, FMT_MTD, FMT_SMF.1, FMT_SMF, FMT_SMR.1, FMT_SMR, FPR_UNO.1, FPT_FLS.1, FPT_FLS, FPT_RCV, FPT_TDC.1, FTP_ITCCertificates
SERTIT-079Evaluation facilities
BrightsightSide-channel analysis
JILStandards
ISO/IEC 15408, ISO/IEC 7816, ISO/IEC 14443, SCP02, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004File metadata
| Title | Microsoft Word - SERTIT-079 CR 1.0 |
|---|---|
| Author | Arne |
| Creation date | D:20160821174342+02'00' |
| Modification date | D:20160821174443+02'00' |
| Pages | 23 |
| Creator | PScript5.dll Version 5.2.2 |
| Producer | Acrobat Distiller 9.5.5 (Windows) |
Security target
Extracted keywords
Symmetric Algorithms
AES, DES, TDES, Triple-DES, TDEA, CMACAsymmetric Algorithms
RSA2048, ECDH, ECDSA, ECC, Diffie-HellmanHash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-2, MD5Schemes
MAC, Key exchange, Key AgreementRandomness
TRNG, RND, RNGLibraries
v1.02.013Block cipher modes
CBC, CCMJavaCard versions
Java Card 2.2.2, GlobalPlatform 2.1.1JavaCard API constants
TYPE_ACCESSVendor
Infineon, Infineon Technologies AG, Feitian Technologies Co, FeitianSecurity level
EAL4+, EAL 4, EAL5, EAL4, EAL6, EAL6+, EAL 4 augmented, EAL5 augmented, EAL6 augmentedClaims
D.APP_CODE, D.APP_C_DATA, D.APP_I_DATA, D.PIN, D.API_DATA, D.CRYPTO, D.JCS_CODE, D.JCS_DATA, D.SEC_DATA, D.JCS_KEYS, D.SEC_ATTRIBUTES, D.CM_APDU, O.CARD-, O.IC_SUPPORT, O.RECOVERY, O.OS_SUPPORT, O.COMMUNICATION, O.RND, O.REMOTE, O.SID, O.FIREWALL, O.GLOBAL_ARRAYS_CONFID, O.GLOBAL_ARRAYS_INTEG, O.NATIVE, O.OPERATE, O.REALLOCATION, O.RESOURCES, O.ALARM, O.CIPHER, O.KEY-MNGT, O.PIN-MNGT, O.TRANSACTION, O.OBJ-DELETION, O.DELETION, O.LOAD, O.INSTALL, O.CARD-MANAGEMENT, O.KEY-, O.APPLET, O.CODE_PKG, O.JAVAOBJECT, O.PACKAGE, O.GLOBAL, O.PIN-, O.OS, T.CONFID-APPLI-DATA, T.CONFID-JCS-CODE, T.CONFID-JCS-DATA, T.INTEG-APPLI-CODE, T.INTEG-APPLI-DATA, T.INTEG-JCS-CODE, T.INTEG-JCS-DATA, T.SID, T.EXE-CODE, T.NATIVE, T.RESOURCES, T.DELETION, T.INSTALL, T.COMMUNICATION, T.OBJ-DELETION, T.PHYSICAL, T.LEAKAGE, T.FAULT, T.RND, T.CONFID-APPLI-, T.INTEG-APPLI-, T.INTEG-, T.EXE-, T.INTEG-JCS-, T.CONFID-, A.APPLET, A.DELETION, A.VERIFICATION, R.JAVA, OP.ARRAY_ACCESS, OP.CREATE, OP.LOAD_PCKG, OP.DELETE_APPLET, OP.DELETE_PCKG, OP.DELETE_PCKG_APPLET, OP.GP, OP.INSTANCE_FIELD, OP.INVK_VIRTUAL, OP.INVK_INTERFACE, OP.JAVA, OP.THROW, OP.TYPE_ACCESS, OP.PUT, OE.CARD-MANAGEMENT, OE.SCP, OE.CODE-EVIDENCE, OE.APPLET, OE.VERIFICATION, OE.CODE-, OSP.VERIFICATIONSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_TDS.1, ADV_FSP.4, ADV_TDS.3, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, ADV_FSP.5, ADV_FSP.2, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_TAT.1, ALC_TAT.2, ALC_CMC.4, ALC_CMS.1, ALC_DVS.1, ALC_CMS.4, ALC_CMS.5, ALC_DEL.1, ALC_LCD.1, ATE_COV.2, ATE_FUN.1, ATE_COV.1, ATE_DPT.1, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1, ASE_REQ.2, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_ARP.1.1, FAU_ARP.1, FAU_SAA.1, FCO_NRO, FCO_NRO.2, FCS_RNG, FCS_COP, FCS_CKM.1, FCS_CKM.2, FCS_CKM.2.1, FCS_CKM.3, FCS_CKM.3.1, FCS_CKM.4, FCS_CKM.4.1, FCS_COP.1, FCS_RNG.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM, FDP_ACC, FDP_ACC.2, FDP_ACF, FDP_ACF.1, FDP_IFC, FDP_IFC.1, FDP_IFF, FDP_IFF.1, FDP_RIP, FDP_RIP.1, FDP_ROL.1, FDP_ROL, FDP_SDI.2, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ITC, FDP_ITC.2, FDP_IFC.2, FDP_UIT, FDP_UIT.1, FDP_ACC.1, FDP_SDI.1, FDP_ITT.1, FIA_ATD, FIA_ATD.1, FIA_UID, FIA_UID.2, FIA_USB, FIA_USB.1, FIA_UID.1, FMT_MSA, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD, FMT_MTD.1, FMT_MTD.3, FMT_SMR, FMT_SMF, FPR_UNO.1.1, FPR_UNO.1, FPT_TDC.1.2, FPT_FLS.1, FPT_FLS.1.1, FPT_TDC.1, FPT_TDC.1.1, FPT_FLS, FPT_RCV, FPT_RCV.3, FPT_RCV.4, FPT_TST.1, FPT_PHP.3, FPT_ITT.1, FRU_FLT.2, FTP_ITC, FTP_ITC.1, FTP_TRP.1Protection profiles
BSI-PP-0084Certificates
BSI-DSZ-CC-0782-, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0782-2012-MA-01Side-channel analysis
Leak-Inherent, physical probing, DPA, SPA, timing attacks, physical tampering, malfunction, MalfunctionCertification process
out of scope, Software development environment. Phase 2 covers the Secure IC Development of Infineon and is out of scope of the TOE evaluation as that is part of the IC platform evaluation. In Phase 3, the Chip, a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.RECOVERY and O.OS_SUPPORT areStandards
FIPS 186-3, FIPS140, FIPS180-4, FIPS197, FIPS PUB 140-2, FIPS PUB 197, FIPS PUB 180-4, AIS20, AIS36, RFC 5639, ICAO, SCP02, SCP03File metadata
| Creation date | D:20160304175418+08'00' |
|---|---|
| Pages | 100 |
| Creator | LaTeX with hyperref package |
| Producer | MiKTeX-xdvipdfmx (0.7.8) |
References
Outgoing- BSI-DSZ-CC-0782-2012 - archived - Infineon Security Controller M7892 B11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01 and Toolbox v1.02.013 libraries and with specific IC dedicated software (firmware)
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
SERTIT-079Extracted SARs
ADV_ARC.1, ADV_COMP.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.5, ALC_COMP.1, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.2, ASE_CCL.1, ASE_COMP.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COMP.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_COMP.1, AVA_VAN.5Similar certificates
| Name | Certificate ID | |
|---|---|---|
| Feitian FT-JCOS v1.0/0.106.13 running on Infineon M7892 B11 | SERTIT-091 | Compare |
Scheme data
| Product | FT-JCOS | |
|---|---|---|
| Url | https://sertit.no/certified-products/product-archive/ft-jcos | |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems | |
| Developer | Feitian Technologies Co., Ltd. | |
| Certification Date | 27.06.2016 | |
| Enhanced | ||
| Description | The TOE is a Java Card Platform compliant with Java Card Specification v.2.2.2 and GlobalPlatformSpecification v.2.1.1. The TOE allows post-issuance downloading of applications that have been previously verified by an off-card trusted IT component. It constitutes a secure generic platform that supports multi-application runtime environment and provides facilities for secure loading and interoperability between different applications. The TOE does not implement JCRMI and does not include any software on the application layer. | |
| Cert Id | SERTIT-079 | |
| Mutual Recognition | CCRA, SOG-IS | |
| Product | Feitian FT-JCOS v1.0/0.106.13 running on Infineon M7892 B11 | |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems | |
| Developer | Feitian Technologies Co., Ltd. | |
| Evaluation Facility | Brightsight B.V. | |
| Certification Date | 27.06.2016 | |
| Level | EAL 4, ALC_DVS.2, AVA_VAN.5 | |
| Documents | frozendict({'cert': [frozendict({'href': 'https://sertit.no/getfile.php/135064-1607952717/SERTIT/Sertifikater/2016/79/20160627_SERTIT-079_Certificate.pdf'})], 'target': [frozendict({'href': 'https://sertit.no/getfile.php/135061-1607952711/SERTIT/Sertifikater/2016/79/%5B08250%5D%5BFTJCOS%5D%5BST%5D%5BV1.0.11%5DFTJCOS_Security_Target.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/135058-1607952708/SERTIT/Sertifikater/2016/79/20160627_SERTIT-079_CR_1.pdf'})]}) | |
References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "4fdb0afc0bbabfb8",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "SERTIT-079",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL4+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_COMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_COMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_COMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_COMP",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"1.0",
"0.106.13"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"certification_date": "2016-06-27",
"developer": "Feitian Technologies Co., Ltd.",
"enhanced": {
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_id": "SERTIT-079",
"certification_date": "2016-06-27",
"description": "The TOE is a Java Card Platform compliant with Java Card Specification v.2.2.2 and GlobalPlatformSpecification v.2.1.1. The TOE allows post-issuance downloading of applications that have been previously verified by an off-card trusted IT component. It constitutes a secure generic platform that supports multi-application runtime environment and provides facilities for secure loading and interoperability between different applications. The TOE does not implement JCRMI and does not include any software on the application layer.",
"developer": "Feitian Technologies Co., Ltd.",
"documents": {
"cert": [
{
"href": "https://sertit.no/getfile.php/135064-1607952717/SERTIT/Sertifikater/2016/79/20160627_SERTIT-079_Certificate.pdf"
}
],
"report": [
{
"href": "https://sertit.no/getfile.php/135058-1607952708/SERTIT/Sertifikater/2016/79/20160627_SERTIT-079_CR_1.pdf"
}
],
"target": [
{
"href": "https://sertit.no/getfile.php/135061-1607952711/SERTIT/Sertifikater/2016/79/%5B08250%5D%5BFTJCOS%5D%5BST%5D%5BV1.0.11%5DFTJCOS_Security_Target.pdf"
}
]
},
"evaluation_facility": "Brightsight B.V.",
"level": "EAL 4, ALC_DVS.2, AVA_VAN.5",
"mutual_recognition": "CCRA, SOG-IS",
"product": "Feitian FT-JCOS v1.0/0.106.13 running on Infineon M7892 B11"
},
"product": "FT-JCOS",
"url": "https://sertit.no/certified-products/product-archive/ft-jcos"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0782-2012"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0782-2012",
"BSI-DSZ-CC-0758-2012"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Feitian Technologies Co., Ltd.",
"manufacturer_web": "https://www.ftsafe.com",
"name": "Feitian FT-JCOS v1.0/0.106.13 running on Infineon M7892 B11",
"not_valid_after": "2021-06-27",
"not_valid_before": "2016-06-27",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "20160627_SERTIT-079_CR_1.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
}
}
},
"cc_cert_id": {
"NO": {
"SERTIT-079": 22
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_COMP.1": 1,
"ADV_FSP.4": 1,
"ADV_IMP.1": 1,
"ADV_TDS.3": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.4": 1,
"ALC_COMP.1": 1,
"ALC_DEL.1": 1,
"ALC_DVS.2": 4,
"ALC_FLR": 1,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_COMP.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COMP.1": 1,
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_FUN.1": 1,
"ATE_IND": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_COMP.1": 1,
"AVA_VAN.5": 3
}
},
"cc_security_level": {
"EAL": {
"EAL 4+": 12,
"EAL1": 1,
"EAL2": 1,
"EAL4": 2,
"EAL7": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP.1": 1
},
"FCO": {
"FCO_NRO": 1
},
"FCS": {
"FCS_CKM.1": 1,
"FCS_CKM.2": 1,
"FCS_CKM.3": 1,
"FCS_CKM.4": 1,
"FCS_COP.1": 1,
"FCS_RNG.1": 3
},
"FDP": {
"FDP_ACC": 3,
"FDP_ACF": 3,
"FDP_IFC": 2,
"FDP_IFF": 2,
"FDP_ITC": 1,
"FDP_RIP": 8,
"FDP_ROL": 1,
"FDP_SDI.2": 1,
"FDP_UIT": 1
},
"FIA": {
"FIA_UID": 3,
"FIA_USB": 1
},
"FMT": {
"FMT_MSA": 11,
"FMT_MTD": 2,
"FMT_SMF": 3,
"FMT_SMF.1": 1,
"FMT_SMR": 4,
"FMT_SMR.1": 1
},
"FPR": {
"FPR_UNO.1": 1
},
"FPT": {
"FPT_FLS": 3,
"FPT_FLS.1": 1,
"FPT_RCV": 3,
"FPT_TDC.1": 1
},
"FTP": {
"FTP_ITC": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"BrightSight": {
"Brightsight": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {
"GlobalPlatform": {
"GlobalPlatform 2.1.1": 2
},
"JavaCard": {
"Java Card 2.2.2": 5
}
},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"other": {
"JIL": 2
}
},
"standard_id": {
"CC": {
"CCMB-2012-09-001": 1,
"CCMB-2012-09-002": 1,
"CCMB-2012-09-003": 1,
"CCMB-2012-09-004": 1
},
"ISO": {
"ISO/IEC 14443": 2,
"ISO/IEC 15408": 4,
"ISO/IEC 7816": 2
},
"SCP": {
"SCP02": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 1
}
},
"DES": {
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Feitian": {
"Feitian": 2,
"Feitian Technologies Co": 2
},
"Infineon": {
"Infineon": 2
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Arne",
"/CreationDate": "D:20160821174342+02\u002700\u0027",
"/Creator": "PScript5.dll Version 5.2.2",
"/ModDate": "D:20160821174443+02\u002700\u0027",
"/Producer": "Acrobat Distiller 9.5.5 (Windows)",
"/Title": "Microsoft Word - SERTIT-079 CR 1.0",
"pdf_file_size_bytes": 1626992,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 23
},
"st_filename": "[08250][FTJCOS][ST][V1.0.11]FTJCOS_Security_Target.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 8
},
"ECDH": {
"ECDH": 2
},
"ECDSA": {
"ECDSA": 3
}
},
"FF": {
"DH": {
"Diffie-Hellman": 1
}
},
"RSA": {
"RSA2048": 1
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0782-": 1,
"BSI-DSZ-CC-0782-2012": 1,
"BSI-DSZ-CC-0782-2012-MA-01": 1
}
},
"cc_claims": {
"A": {
"A.APPLET": 6,
"A.DELETION": 1,
"A.VERIFICATION": 6
},
"D": {
"D.API_DATA": 3,
"D.APP_CODE": 7,
"D.APP_C_DATA": 3,
"D.APP_I_DATA": 5,
"D.CM_APDU": 1,
"D.CRYPTO": 6,
"D.JCS_CODE": 3,
"D.JCS_DATA": 5,
"D.JCS_KEYS": 3,
"D.PIN": 6,
"D.SEC_ATTRIBUTES": 2,
"D.SEC_DATA": 8
},
"O": {
"O.ALARM": 22,
"O.APPLET": 19,
"O.CARD-": 7,
"O.CARD-MANAGEMENT": 32,
"O.CIPHER": 16,
"O.CODE_PKG": 16,
"O.COMMUNICATION": 11,
"O.DELETION": 15,
"O.FIREWALL": 43,
"O.GLOBAL": 2,
"O.GLOBAL_ARRAYS_CONFID": 18,
"O.GLOBAL_ARRAYS_INTEG": 9,
"O.IC_SUPPORT": 17,
"O.INSTALL": 16,
"O.JAVAOBJECT": 38,
"O.KEY-": 3,
"O.KEY-MNGT": 23,
"O.LOAD": 17,
"O.NATIVE": 14,
"O.OBJ-DELETION": 8,
"O.OPERATE": 35,
"O.OS": 1,
"O.OS_SUPPORT": 23,
"O.PACKAGE": 2,
"O.PIN-": 1,
"O.PIN-MNGT": 22,
"O.REALLOCATION": 17,
"O.RECOVERY": 23,
"O.REMOTE": 1,
"O.RESOURCES": 23,
"O.RND": 14,
"O.SID": 32,
"O.TRANSACTION": 19
},
"OE": {
"OE.APPLET": 9,
"OE.CARD-MANAGEMENT": 2,
"OE.CODE-": 5,
"OE.CODE-EVIDENCE": 16,
"OE.SCP": 6,
"OE.VERIFICATION": 37
},
"OP": {
"OP.ARRAY_ACCESS": 4,
"OP.CREATE": 7,
"OP.DELETE_APPLET": 4,
"OP.DELETE_PCKG": 3,
"OP.DELETE_PCKG_APPLET": 3,
"OP.GP": 3,
"OP.INSTANCE_FIELD": 4,
"OP.INVK_INTERFACE": 7,
"OP.INVK_VIRTUAL": 6,
"OP.JAVA": 5,
"OP.LOAD_PCKG": 1,
"OP.PUT": 6,
"OP.THROW": 5,
"OP.TYPE_ACCESS": 5
},
"OSP": {
"OSP.VERIFICATION": 6
},
"R": {
"R.JAVA": 9
},
"T": {
"T.COMMUNICATION": 5,
"T.CONFID-": 2,
"T.CONFID-APPLI-": 2,
"T.CONFID-APPLI-DATA": 17,
"T.CONFID-JCS-CODE": 7,
"T.CONFID-JCS-DATA": 9,
"T.DELETION": 5,
"T.EXE-": 1,
"T.EXE-CODE": 8,
"T.FAULT": 5,
"T.INSTALL": 6,
"T.INTEG-": 6,
"T.INTEG-APPLI-": 4,
"T.INTEG-APPLI-CODE": 12,
"T.INTEG-APPLI-DATA": 18,
"T.INTEG-JCS-": 1,
"T.INTEG-JCS-CODE": 7,
"T.INTEG-JCS-DATA": 12,
"T.LEAKAGE": 5,
"T.NATIVE": 6,
"T.OBJ-DELETION": 4,
"T.PHYSICAL": 8,
"T.RESOURCES": 9,
"T.RND": 5,
"T.SID": 19
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0084": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 6,
"ADV_FSP.1": 4,
"ADV_FSP.2": 2,
"ADV_FSP.4": 2,
"ADV_FSP.5": 7,
"ADV_IMP.1": 9,
"ADV_INT.2": 1,
"ADV_TDS.1": 2,
"ADV_TDS.2": 1,
"ADV_TDS.3": 10,
"ADV_TDS.4": 1
},
"AGD": {
"AGD_OPE.1": 10,
"AGD_PRE.1": 6
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.1": 1,
"ALC_CMS.4": 1,
"ALC_CMS.5": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 2,
"ALC_DVS.2": 7,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1,
"ALC_TAT.2": 2
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 4,
"ASE_INT.1": 5,
"ASE_OBJ.2": 3,
"ASE_REQ.1": 2,
"ASE_REQ.2": 2,
"ASE_SPD.1": 2,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.1": 2,
"ATE_COV.2": 3,
"ATE_DPT.1": 2,
"ATE_FUN.1": 6
},
"AVA": {
"AVA_VAN.5": 7
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 1,
"EAL 4 augmented": 1,
"EAL4": 5,
"EAL4+": 1,
"EAL5": 1,
"EAL5 augmented": 1,
"EAL6": 1,
"EAL6 augmented": 1,
"EAL6+": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP.1": 24,
"FAU_ARP.1.1": 2,
"FAU_SAA.1": 3
},
"FCO": {
"FCO_NRO": 6,
"FCO_NRO.2": 5
},
"FCS": {
"FCS_CKM": 3,
"FCS_CKM.1": 10,
"FCS_CKM.2": 8,
"FCS_CKM.2.1": 1,
"FCS_CKM.3": 6,
"FCS_CKM.3.1": 1,
"FCS_CKM.4": 8,
"FCS_CKM.4.1": 1,
"FCS_COP": 13,
"FCS_COP.1": 25,
"FCS_RNG": 6,
"FCS_RNG.1": 12,
"FCS_RNG.1.1": 2,
"FCS_RNG.1.2": 2
},
"FDP": {
"FDP_ACC": 29,
"FDP_ACC.1": 13,
"FDP_ACC.2": 5,
"FDP_ACF": 31,
"FDP_ACF.1": 18,
"FDP_IFC": 22,
"FDP_IFC.1": 13,
"FDP_IFC.2": 2,
"FDP_IFF": 18,
"FDP_IFF.1": 17,
"FDP_ITC": 10,
"FDP_ITC.2": 9,
"FDP_ITT.1": 1,
"FDP_RIP": 117,
"FDP_RIP.1": 10,
"FDP_ROL": 15,
"FDP_ROL.1": 4,
"FDP_SDI.1": 1,
"FDP_SDI.2": 13,
"FDP_SDI.2.1": 1,
"FDP_SDI.2.2": 1,
"FDP_UIT": 5,
"FDP_UIT.1": 2
},
"FIA": {
"FIA_ATD": 8,
"FIA_ATD.1": 2,
"FIA_UID": 19,
"FIA_UID.1": 11,
"FIA_UID.2": 1,
"FIA_USB": 6,
"FIA_USB.1": 3
},
"FMT": {
"FMT_MSA": 105,
"FMT_MSA.1": 9,
"FMT_MSA.2": 2,
"FMT_MSA.3": 19,
"FMT_MTD": 20,
"FMT_MTD.1": 2,
"FMT_MTD.3": 1,
"FMT_SMF": 29,
"FMT_SMF.1": 20,
"FMT_SMF.1.1": 1,
"FMT_SMR": 43,
"FMT_SMR.1": 28,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPR": {
"FPR_UNO.1": 13,
"FPR_UNO.1.1": 2
},
"FPT": {
"FPT_FLS": 31,
"FPT_FLS.1": 16,
"FPT_FLS.1.1": 2,
"FPT_ITT.1": 1,
"FPT_PHP.3": 1,
"FPT_RCV": 23,
"FPT_RCV.3": 13,
"FPT_RCV.4": 2,
"FPT_TDC.1": 8,
"FPT_TDC.1.1": 1,
"FPT_TDC.1.2": 2,
"FPT_TST.1": 1
},
"FRU": {
"FRU_FLT.2": 1
},
"FTP": {
"FTP_ITC": 6,
"FTP_ITC.1": 4,
"FTP_TRP.1": 2
}
},
"certification_process": {
"OutOfScope": {
"Software development environment. Phase 2 covers the Secure IC Development of Infineon and is out of scope of the TOE evaluation as that is part of the IC platform evaluation. In Phase 3, the Chip": 1,
"a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.RECOVERY and O.OS_SUPPORT are": 1,
"out of scope": 2
}
},
"cipher_mode": {
"CBC": {
"CBC": 4
},
"CCM": {
"CCM": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"Infineon": {
"v1.02.013": 3
}
},
"crypto_protocol": {},
"crypto_scheme": {
"KA": {
"Key Agreement": 1
},
"KEX": {
"Key exchange": 1
},
"MAC": {
"MAC": 2
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"MD": {
"MD5": {
"MD5": 1
}
},
"SHA": {
"SHA1": {
"SHA-1": 1
},
"SHA2": {
"SHA-2": 2,
"SHA-224": 1,
"SHA-256": 1,
"SHA-384": 1,
"SHA-512": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {
"misc": {
"TYPE_ACCESS": 5
}
},
"javacard_packages": {
"javacard": {
"javacard.security": 3
},
"javacardx": {
"javacardx.crypto": 2,
"javacardx.security": 1
}
},
"javacard_version": {
"GlobalPlatform": {
"GlobalPlatform 2.1.1": 1
},
"JavaCard": {
"Java Card 2.2.2": 3
}
},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 20,
"RNG": 10
},
"TRNG": {
"TRNG": 3
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 3,
"malfunction": 4,
"physical tampering": 1
},
"SCA": {
"DPA": 3,
"Leak-Inherent": 2,
"SPA": 1,
"physical probing": 3,
"timing attacks": 1
}
},
"standard_id": {
"BSI": {
"AIS20": 2,
"AIS36": 2
},
"FIPS": {
"FIPS 186-3": 3,
"FIPS PUB 140-2": 1,
"FIPS PUB 180-4": 1,
"FIPS PUB 197": 1,
"FIPS140": 2,
"FIPS180-4": 2,
"FIPS197": 5
},
"ICAO": {
"ICAO": 3
},
"RFC": {
"RFC 5639": 3
},
"SCP": {
"SCP02": 5,
"SCP03": 4
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 9
}
},
"DES": {
"3DES": {
"TDEA": 1,
"TDES": 7,
"Triple-DES": 1
},
"DES": {
"DES": 6
}
},
"constructions": {
"MAC": {
"CMAC": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Feitian": {
"Feitian": 1,
"Feitian Technologies Co": 105
},
"Infineon": {
"Infineon": 10,
"Infineon Technologies AG": 1
}
},
"vulnerability": {}
},
"st_metadata": {
"/CreationDate": "D:20160304175418+08\u002700\u0027",
"/Creator": "LaTeX with hyperref package",
"/Producer": "MiKTeX-xdvipdfmx (0.7.8)",
"pdf_file_size_bytes": 1236795,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 100
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20160627_SERTIT-079_CR_1.pdf",
"scheme": "NO",
"security_level": {
"_type": "Set",
"elements": [
"EAL4+",
"ALC_DVS.2",
"AVA_VAN.5"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[08250][FTJCOS][ST][V1.0.11]FTJCOS_Security_Target.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "5065ea623ab6f37471a13f9e55656c5183c1ef9809b233313a16163a784c01f5",
"txt_hash": "2c98dcec4d90948f459abebbffbfbbc2d3c1370dfcb94c2a57336a531d42324f"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "75e12bfa079b72ee7e9e0e67404cd9f582ca8992f8bb82bca20d86e35a8bc98b",
"txt_hash": "ae3e1fccb1433517827f00eea7f0683c1edd6e851df4acf0c3ca17fe44bb4f7a"
}
},
"status": "archived"
}