Feitian FT-JCOS V5.0
CSV information ?
Status | archived |
---|---|
Valid from | 17.09.2018 |
Valid until | 17.09.2023 |
Scheme | 🇳🇴 NO |
Manufacturer | Feitian Technologies Co., Ltd. |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | AVA_VAN.5, ALC_DVS.2, EAL5+ |
Heuristics summary ?
Certificate ?
Extracted keywords
Libraries
NSSVendor
Feitian TechnologiesSecurity level
EAL 2, EAL 4Security Assurance Requirements (SAR)
ALC_FLR, AVA_VAN.5Certificates
SERTIT-116Evaluation facilities
BrightsightFile metadata
Pages | 1 |
---|
Certification report ?
Extracted keywords
Symmetric Algorithms
AES, DESJavaCard versions
Java Card 2.3, Java Card 3.0.4, GlobalPlatform 3.0.4Vendor
Infineon, Feitian, Feitian Technologies, Feitian Technologies CoSecurity level
EAL5+, EAL 2, EAL 4, EAL1, EAL7, EAL 5Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, ADV_COMP.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR, ALC_DVS.2, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.2, ALC_COMP.1, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, ATE_COMP.1, ATE_IND, AVA_VAN.5, AVA_COMP.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.2, ASE_SPD.1, ASE_OBJ.2, ASE_TSS.1, ASE_COMP.1Security Functional Requirements (SFR)
FCS_RNG.1Certificates
SERTIT-116Evaluation facilities
BrightsightSide-channel analysis
JILStandards
ISO/IEC 15408, ISO/IEC 7816, ISO/IEC 14443, SCP02, CCMB-2017-04-004File metadata
Title | tittel |
---|---|
Keywords | ugradert |
Author | [email protected] |
Creation date | D:20180917114319Z00'00' |
Modification date | D:20180917114319Z00'00' |
Pages | 21 |
Creator | Microsoft® Word 2013 |
Producer | Mac OS X 10.13.6 Quartz PDFContext |
Security target ?
Extracted keywords
Symmetric Algorithms
AES, DES, TDES, 3DES, Triple-DES, TDEA, CMACHash functions
SHA-1, SHA256, SHA-256Schemes
MAC, Key exchangeRandomness
TRNG, RND, RNGBlock cipher modes
CBC, CTR, CCMJavaCard versions
Java Card 3.0.4JavaCard API constants
TYPE_ACCESSVendor
Infineon, Infineon Technologies AG, Feitian Technologies Co, Feitian TechnologiesSecurity level
EAL5+, EAL 5, EAL5, EAL 5 augmented, EAL5 augmentedClaims
D.APP_CODE, D.APP_C_DATA, D.APP_I_DATA, D.API_DATA, D.CRYPTO, D.JCS_CODE, D.JCS_DATA, D.SEC_DATA, D.JCS_KEYS, D.SEC_ATTRIBUTES, D.CM_APDU, O.CARD-, O.IC_SUPPORT, O.RECOVERY, O.OS_SUPPORT, O.COMMUNICATION, O.RND, O.REMOTE, O.DELETION, O.PIN-MNGT, O.SID, O.FIREWALL, O.GLOBAL_ARRAYS_CONFID, O.GLOBAL_ARRAYS_INTEG, O.NATIVE, O.OPERATE, O.REALLOCATION, O.RESOURCES, O.ALARM, O.CIPHER, O.KEY-MNGT, O.TRANSACTION, O.LOAD, O.INSTALL, O.CARD-MANAGEMENT, O.APPLET, O.CODE_PKG, O.JAVAOBJECT, O.PACKAGE, O.GLOBAL, O.KEY-, O.OS, T.DELETION, T.CONFID-APPLI-DATA, T.CONFID-JCS-CODE, T.CONFID-JCS-DATA, T.INTEG-APPLI-CODE, T.INTEG-APPLI-DATA, T.INTEG-JCS-CODE, T.INTEG-JCS-DATA, T.SID, T.EXE-CODE, T.NATIVE, T.RESOURCES, T.INSTALL, T.COMMUNICATION, T.LEAKAGE, T.FAULT, T.RND, T.PHYSICAL, T.CONFID-APPLI-, T.INTEG-APPLI-, T.INTEG-, T.EXE-, T.INTEG-JCS-, T.CONFID-, A.DELETION, A.APPLET, A.VERIFICATION, R.JAVA, OP.ARRAY_ACCESS, OP.CREATE, OP.LOAD_PCKG, OP.GP, OP.INSTANCE_FIELD, OP.INVK_VIRTUAL, OP.INVK_INTERFACE, OP.JAVA, OP.THROW, OP.TYPE_ACCESS, OP.PUT, OE.CARD-MANAGEMENT, OE.SCP, OE.CODE-EVIDENCE, OE.APPLET, OE.VERIFICATION, OE.CODE-, OSP.VERIFICATIONSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_TDS.1, ADV_FSP.4, ADV_TDS.3, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, ADV_FSP.5, ADV_FSP.2, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_TAT.1, ALC_TAT.2, ALC_CMC.4, ALC_CMS.1, ALC_DVS.1, ALC_CMS.4, ALC_CMS.5, ALC_DEL.1, ALC_LCD.1, ATE_COV.2, ATE_FUN.1, ATE_COV.1, ATE_DPT.1, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1, ASE_REQ.2, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_ARP.1, FAU_ARP.1.1, FAU_SAA.1, FCO_NRO, FCO_NRO.2, FCS_COP.1, FCS_RNG, FCS_COP, FCS_CKM.1, FCS_CKM.1.1, FCS_CKM.2, FCS_CKM.2.1, FCS_CKM.3, FCS_CKM.3.1, FCS_CKM.4, FCS_CKM.4.1, FCS_RNG.1, FCS_RNG.1.1, FCS_RNG.1.2, FDP_ACC, FDP_ACF, FDP_RIP, FDP_ACC.2, FDP_ACF.1, FDP_IFC, FDP_IFC.1, FDP_IFF, FDP_IFF.1, FDP_RIP.1, FDP_ROL.1, FDP_ROL, FDP_SDI.2, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ITC, FDP_ITC.2, FDP_IFC.2, FDP_UIT, FDP_UIT.1, FDP_ACC.1, FDP_ITC.1, FDP_SDI.1, FDP_ITT.1, FIA_ATD, FIA_ATD.1, FIA_UID, FIA_UID.2, FIA_USB, FIA_USB.1, FIA_UID.1, FMT_MSA, FMT_SMR, FMT_SMF, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD, FMT_MTD.1, FMT_MTD.3, FPR_UNO.1, FPR_UNO.1.1, FPT_FLS, FPT_FLS.1, FPT_FLS.1.1, FPT_TDC.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_RCV, FPT_RCV.3, FPT_RCV.4, FPT_TST.1, FPT_PHP.3, FPT_ITT.1, FRU_FLT.2, FTP_ITC, FTP_ITC.1, FTP_TRP.1Protection profiles
BSI-PP-0084Certificates
BSI-DSZ-CC-0964-V3-2017, BSI-DSZ-CC-0964-Side-channel analysis
Leak-Inherent, physical probing, DPA, SPA, timing attacks, physical tampering, malfunction, MalfunctionCertification process
out of scope, com 11 FT-JCOS V5.0 Security Target Phase 2 covers the Secure IC Development of Infineon and is out of scope of the TOE evaluation as that is part of the IC platform evaluation. In Phase 3, the Chip, a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.RECOVERY and O.OS_SUPPORT areStandards
FIPS197, FIPS140, FIPS180-4, FIPS PUB 140-2, FIPS PUB 197, FIPS PUB 180-4, AIS20, AIS36, ISO/IEC 9796-2, ISO/IEC 18013, ICAO, SCP02File metadata
Creation date | D:20180811160413+08'00' |
---|---|
Pages | 89 |
Creator | LaTeX with hyperref package |
Producer | MiKTeX-xdvipdfmx (0.7.8) |
References
Outgoing- BSI-DSZ-CC-0964-V3-2017 - archived - Infineon Technologies Security Controller M7794 A12 / G12 with optional RSA2048/4096 v1.02.013 or v2.00.002, EC v1.02.013 or v2.00.002 and Toolbox v1.02.013 or v2.00.002 libraries and with specific IC-dedicated software
Heuristics ?
Extracted SARs
ADV_ARC.1, ADV_COMP.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.5, ALC_COMP.1, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.2, ASE_CCL.1, ASE_COMP.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COMP.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_COMP.1, AVA_VAN.5Scheme data ?
Product | FT-JCOS V5.0 | |
---|---|---|
Url | https://sertit.no/certified-products/product-archive/ft-jcos-v5-0 | |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems | |
Developer | Feitian Technologies Co., Ltd. | |
Certification Date | 17.09.2018 | |
Enhanced | ||
Description | The TOE is an open Java Card Platforms (JCP), that is, smart cards or similar devices enabled with JavaCard technology that support post-issuance downloading of applications.The purpose of the TOE is to provide a limited Java Card environment for a single applet, specifically for e-passport and similar applications such as eID and driving license.The TOE is composed of a Smart Card Platform (SCP) and an embedded software (JCS + non-TSF parts). The JCP is compliant with Java Card Specification v3.0.4 and GlobalPlatform Specification v.2.3. The TOE allows for the loading of the customer applets, but after loading the single applet the platform must be closed to prevent further loading of applets after issuance of the card to the end user. To support this functionality, the TOE provides a closing mechanism with specific guidance. The applet should have been previously verified by an off-card trusted IT component. The JCP is managed by Card Manager that is a part of the TOE. The Card Manager(ISD) is a pre-issuance applet. The JCP is fully compliant with the Java Card Specification v3.0.4 excluding the optional part JCRMI which is not implemented by the TOE. The SCP is a certified hardware platform – the SLE77CLFX2400PM with specific IC dedicated software (firmware). The hardware platform is certified by the BSI under the certification ID: BSI-DSZ-CC-0964-V3-2017 . Not all functionality of the hardware is used by the composite TOE. Therefore some parts of the IC platform are not part of the composite TOEto ensure that the developed applet has sufficient ability to counter attacks. | |
Cert Id | SERTIT-116 | |
Mutual Recognition | CCRA, SOG-IS | |
Product | V5.0.9 | |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems | |
Sponsor | Feitian Technologies Co., Ltd. | |
Developer | Feitian Technologies Co., Ltd. | |
Evaluation Facility | Brightsight B.V. | |
Certification Date | 17.09.2018 | |
Expiration Date | 17.09.2023 | |
Level | EAL 5, ALC_DVS.2, AVA_VAN.5 | |
Documents | frozendict({'cert': [frozendict({'href': 'https://sertit.no/getfile.php/135382-1607954033/SERTIT/Sertifikater/2018/116/20180917SERTIT-116%20C.pdf'})], 'target': [frozendict({'href': 'https://sertit.no/getfile.php/135385-1607954035/SERTIT/Sertifikater/2018/116/%5B09895%5D%5BSERTIT-116%5D%5BST%5D%5Bv1.0.8%5D%20FTJCOS%20v5.0%20Security%20Target.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/135379-1607954030/SERTIT/Sertifikater/2018/116/20180917%20Sertit-116%20CR%20Feitian%20v10.pdf'})]}) |
References ?
Updates ?
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': [], 'next_certificates': []}
.
- The following values were inserted:
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'certification_date': '2018-09-17', 'enhanced': {'__insert__': {'cert_id': 'SERTIT-116', 'expiration_date': '2023-09-17'}, '__update__': {'description': 'The TOE is an open Java Card Platforms (JCP), that is, smart cards or similar devices enabled with JavaCard technology that support post-issuance downloading of applications.The purpose of the TOE is to provide a limited Java Card environment for a single applet, specifically for e-passport and similar applications such as eID and driving license.The TOE is composed of a Smart Card Platform (SCP) and an embedded software (JCS + non-TSF parts). The JCP is compliant with Java Card Specification v3.0.4 and GlobalPlatform Specification v.2.3. The TOE allows for the loading of the customer applets, but after loading the single applet the platform must be closed to prevent further loading of applets after issuance of the card to the end user. To support this functionality, the TOE provides a closing mechanism with specific guidance. The applet should have been previously verified by an off-card trusted IT component. The JCP is managed by Card Manager that is a part of the TOE. The Card Manager(ISD) is a pre-issuance applet. The JCP is fully compliant with the Java Card Specification v3.0.4 excluding the optional part JCRMI which is not implemented by the TOE. The SCP is a certified hardware platform – the SLE77CLFX2400PM with specific IC dedicated software (firmware). The hardware platform is certified by the BSI under the certification ID: BSI-DSZ-CC-0964-V3-2017 . Not all functionality of the hardware is used by the composite TOE. Therefore some parts of the IC platform are not part of the composite TOEto ensure that the developed applet has sufficient ability to counter attacks.', 'certification_date': '2018-09-17'}, '__delete__': ['id']}}
data.
- The scheme_data property was updated, with the
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'a0cca3dc49d536376c3a8cbc35c14b7dcd56d220cf9daeaf5a0602083c81909a', 'txt_hash': '058213dd3d2acaada34005ad9ab040167a22de3c05063a03c5289d8ee35787fb'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'e714a2c03da88035b23edddce15f888fdd34a72e96ba694237ffc96a4ef6ae49', 'txt_hash': '39e575bcb51bf4e0c72e9226b46320f67645c95199e2eefa6f315fe558d6b70d'}
data. - The cert property was updated, with the
{'download_ok': True, 'convert_garbage': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '4e4772f19252d78714540656a807928a407ed8c495a9a45815261a46f4e8ed86', 'txt_hash': '60b7f498db2f2b295b3c531b80161aa58d3e9cbd226677ee4fef9d699d2045b2'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 1156984, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 21, '/Title': 'tittel', '/Author': '[email protected]', '/Producer': 'Mac OS X 10.13.6 Quartz PDFContext', '/Creator': 'Microsoft® Word 2013', '/CreationDate': "D:20180917114319Z00'00'", '/ModDate': "D:20180917114319Z00'00'", '/Keywords': 'ugradert', '/AAPL:Keywords': "['ugradert']", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 1189588, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 89, '/Creator': 'LaTeX with hyperref package', '/Producer': 'MiKTeX-xdvipdfmx (0.7.8)', '/CreationDate': "D:20180811160413+08'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The cert_metadata property was set to
{'pdf_file_size_bytes': 744305, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{}
. - The report_keywords property was set to
{'cc_cert_id': {'NO': {'SERTIT-116': 20}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL5+': 22, 'EAL 2': 1, 'EAL 4': 1, 'EAL1': 1, 'EAL7': 1, 'EAL 5': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.5': 1, 'ADV_IMP.1': 1, 'ADV_INT.2': 1, 'ADV_TDS.4': 1, 'ADV_COMP.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR': 1, 'ALC_DVS.2': 5, 'ALC_CMC.4': 1, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.2': 1, 'ALC_COMP.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.3': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1, 'ATE_COMP.1': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.5': 4, 'AVA_COMP.1': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_OBJ.2': 1, 'ASE_TSS.1': 1, 'ASE_COMP.1': 1}}, 'cc_sfr': {'FCS': {'FCS_RNG.1': 4}}, 'cc_claims': {}, 'vendor': {'Infineon': {'Infineon': 1}, 'Feitian': {'Feitian': 1, 'Feitian Technologies': 2, 'Feitian Technologies Co': 1}}, 'eval_facility': {'BrightSight': {'Brightsight': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}}, 'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'other': {'JIL': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408': 8, 'ISO/IEC 7816': 2, 'ISO/IEC 14443': 2}, 'SCP': {'SCP02': 2}, 'CC': {'CCMB-2017-04-004': 1}}, 'javacard_version': {'JavaCard': {'Java Card 2.3': 1, 'Java Card 3.0.4': 4}, 'GlobalPlatform': {'GlobalPlatform 3.0.4': 1}}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0964-V3-2017': 3, 'BSI-DSZ-CC-0964-': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0084': 1}}, 'cc_security_level': {'EAL': {'EAL5+': 1, 'EAL 5': 1, 'EAL5': 6, 'EAL 5 augmented': 1, 'EAL5 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 6, 'ADV_FSP.1': 4, 'ADV_TDS.1': 2, 'ADV_FSP.4': 2, 'ADV_TDS.3': 10, 'ADV_IMP.1': 9, 'ADV_INT.2': 1, 'ADV_TDS.4': 1, 'ADV_FSP.5': 7, 'ADV_FSP.2': 2, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE.1': 10, 'AGD_PRE.1': 6}, 'ALC': {'ALC_DVS.2': 7, 'ALC_TAT.1': 1, 'ALC_TAT.2': 2, 'ALC_CMC.4': 1, 'ALC_CMS.1': 1, 'ALC_DVS.1': 2, 'ALC_CMS.4': 1, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1}, 'ATE': {'ATE_COV.2': 3, 'ATE_FUN.1': 6, 'ATE_COV.1': 2, 'ATE_DPT.1': 2}, 'AVA': {'AVA_VAN.5': 7}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 4, 'ASE_INT.1': 5, 'ASE_REQ.1': 2, 'ASE_REQ.2': 2, 'ASE_OBJ.2': 3, 'ASE_SPD.1': 2, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 21, 'FAU_ARP.1.1': 1, 'FAU_SAA.1': 3}, 'FCO': {'FCO_NRO': 6, 'FCO_NRO.2': 5}, 'FCS': {'FCS_COP.1': 21, 'FCS_RNG': 5, 'FCS_COP': 7, 'FCS_CKM.1': 10, 'FCS_CKM.1.1': 1, 'FCS_CKM.2': 9, 'FCS_CKM.2.1': 1, 'FCS_CKM.3': 8, 'FCS_CKM.3.1': 1, 'FCS_CKM.4': 13, 'FCS_CKM.4.1': 1, 'FCS_RNG.1': 13, 'FCS_RNG.1.1': 2, 'FCS_RNG.1.2': 2}, 'FDP': {'FDP_ACC': 21, 'FDP_ACF': 21, 'FDP_RIP': 75, 'FDP_ACC.2': 2, 'FDP_ACF.1': 13, 'FDP_IFC': 23, 'FDP_IFC.1': 13, 'FDP_IFF': 18, 'FDP_IFF.1': 17, 'FDP_RIP.1': 8, 'FDP_ROL.1': 3, 'FDP_ROL': 12, 'FDP_SDI.2': 9, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_ITC': 12, 'FDP_ITC.2': 10, 'FDP_IFC.2': 2, 'FDP_UIT': 5, 'FDP_UIT.1': 2, 'FDP_ACC.1': 12, 'FDP_ITC.1': 4, 'FDP_SDI.1': 1, 'FDP_ITT.1': 1}, 'FIA': {'FIA_ATD': 8, 'FIA_ATD.1': 2, 'FIA_UID': 24, 'FIA_UID.2': 1, 'FIA_USB': 7, 'FIA_USB.1': 3, 'FIA_UID.1': 10}, 'FMT': {'FMT_MSA': 87, 'FMT_SMR': 31, 'FMT_SMF': 18, 'FMT_MSA.1': 10, 'FMT_MSA.2': 2, 'FMT_MSA.3': 16, 'FMT_SMF.1': 18, 'FMT_SMF.1.1': 1, 'FMT_SMR.1': 30, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MTD': 20, 'FMT_MTD.1': 2, 'FMT_MTD.3': 1}, 'FPR': {'FPR_UNO.1': 8, 'FPR_UNO.1.1': 1}, 'FPT': {'FPT_FLS': 13, 'FPT_FLS.1': 13, 'FPT_FLS.1.1': 2, 'FPT_TDC.1': 8, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 1, 'FPT_RCV': 22, 'FPT_RCV.3': 13, 'FPT_RCV.4': 2, 'FPT_TST.1': 1, 'FPT_PHP.3': 1, 'FPT_ITT.1': 1}, 'FRU': {'FRU_FLT.2': 1}, 'FTP': {'FTP_ITC': 6, 'FTP_ITC.1': 4, 'FTP_TRP.1': 2}}, 'cc_claims': {'D': {'D.APP_CODE': 6, 'D.APP_C_DATA': 2, 'D.APP_I_DATA': 4, 'D.API_DATA': 3, 'D.CRYPTO': 7, 'D.JCS_CODE': 4, 'D.JCS_DATA': 5, 'D.SEC_DATA': 8, 'D.JCS_KEYS': 4, 'D.SEC_ATTRIBUTES': 2, 'D.CM_APDU': 1}, 'O': {'O.CARD-': 7, 'O.IC_SUPPORT': 17, 'O.RECOVERY': 23, 'O.OS_SUPPORT': 23, 'O.COMMUNICATION': 11, 'O.RND': 14, 'O.REMOTE': 1, 'O.DELETION': 1, 'O.PIN-MNGT': 1, 'O.SID': 30, 'O.FIREWALL': 37, 'O.GLOBAL_ARRAYS_CONFID': 16, 'O.GLOBAL_ARRAYS_INTEG': 9, 'O.NATIVE': 14, 'O.OPERATE': 33, 'O.REALLOCATION': 15, 'O.RESOURCES': 19, 'O.ALARM': 20, 'O.CIPHER': 14, 'O.KEY-MNGT': 20, 'O.TRANSACTION': 14, 'O.LOAD': 18, 'O.INSTALL': 16, 'O.CARD-MANAGEMENT': 30, 'O.APPLET': 4, 'O.CODE_PKG': 3, 'O.JAVAOBJECT': 22, 'O.PACKAGE': 2, 'O.GLOBAL': 2, 'O.KEY-': 1, 'O.OS': 1}, 'T': {'T.DELETION': 1, 'T.CONFID-APPLI-DATA': 16, 'T.CONFID-JCS-CODE': 7, 'T.CONFID-JCS-DATA': 9, 'T.INTEG-APPLI-CODE': 12, 'T.INTEG-APPLI-DATA': 17, 'T.INTEG-JCS-CODE': 7, 'T.INTEG-JCS-DATA': 12, 'T.SID': 19, 'T.EXE-CODE': 8, 'T.NATIVE': 6, 'T.RESOURCES': 9, 'T.INSTALL': 6, 'T.COMMUNICATION': 5, 'T.LEAKAGE': 6, 'T.FAULT': 6, 'T.RND': 6, 'T.PHYSICAL': 8, 'T.CONFID-APPLI-': 2, 'T.INTEG-APPLI-': 4, 'T.INTEG-': 6, 'T.EXE-': 1, 'T.INTEG-JCS-': 1, 'T.CONFID-': 2}, 'A': {'A.DELETION': 1, 'A.APPLET': 6, 'A.VERIFICATION': 6}, 'R': {'R.JAVA': 5}, 'OP': {'OP.ARRAY_ACCESS': 4, 'OP.CREATE': 7, 'OP.LOAD_PCKG': 1, 'OP.GP': 3, 'OP.INSTANCE_FIELD': 4, 'OP.INVK_VIRTUAL': 6, 'OP.INVK_INTERFACE': 7, 'OP.JAVA': 5, 'OP.THROW': 5, 'OP.TYPE_ACCESS': 5, 'OP.PUT': 6}, 'OE': {'OE.CARD-MANAGEMENT': 2, 'OE.SCP': 6, 'OE.CODE-EVIDENCE': 16, 'OE.APPLET': 9, 'OE.VERIFICATION': 37, 'OE.CODE-': 5}, 'OSP': {'OSP.VERIFICATION': 6}}, 'vendor': {'Infineon': {'Infineon': 10, 'Infineon Technologies AG': 1}, 'Feitian': {'Feitian Technologies Co': 92, 'Feitian Technologies': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 13}}, 'DES': {'DES': {'DES': 3}, '3DES': {'TDES': 7, '3DES': 1, 'Triple-DES': 1, 'TDEA': 1}}, 'constructions': {'MAC': {'CMAC': 2}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 3}, 'SHA2': {'SHA256': 1, 'SHA-256': 2}}}, 'crypto_scheme': {'MAC': {'MAC': 2}, 'KEX': {'Key exchange': 1}}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 3}, 'RNG': {'RND': 21, 'RNG': 10}}, 'cipher_mode': {'CBC': {'CBC': 2}, 'CTR': {'CTR': 1}, 'CCM': {'CCM': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 2, 'physical probing': 3, 'DPA': 3, 'SPA': 1, 'timing attacks': 1}, 'FI': {'physical tampering': 1, 'malfunction': 4, 'Malfunction': 3}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS197': 3, 'FIPS140': 2, 'FIPS180-4': 2, 'FIPS PUB 140-2': 1, 'FIPS PUB 197': 1, 'FIPS PUB 180-4': 1}, 'BSI': {'AIS20': 2, 'AIS36': 2}, 'ISO': {'ISO/IEC 9796-2': 1, 'ISO/IEC 18013': 2}, 'ICAO': {'ICAO': 3}, 'SCP': {'SCP02': 6}}, 'javacard_version': {'JavaCard': {'Java Card 3.0.4': 3}}, 'javacard_api_const': {'misc': {'TYPE_ACCESS': 5}}, 'javacard_packages': {'javacard': {'javacard.security': 2}, 'javacardx': {'javacardx.crypto': 2}}, 'certification_process': {'OutOfScope': {'out of scope': 2, 'com 11 FT-JCOS V5.0 Security Target Phase 2 covers the Secure IC Development of Infineon and is out of scope of the TOE evaluation as that is part of the IC platform evaluation. In Phase 3, the Chip': 1, 'a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.RECOVERY and O.OS_SUPPORT are': 1}}}
. - The cert_keywords property was set to
{'cc_cert_id': {'NO': {'SERTIT-116': 2}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2': 1, 'EAL 4': 1}}, 'cc_sar': {'ALC': {'ALC_FLR': 1}, 'AVA': {'AVA_VAN.5': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Feitian': {'Feitian Technologies': 1}}, 'eval_facility': {'BrightSight': {'Brightsight': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'NSS': {'NSS': 1}}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
20180917 Sertit-116 CR Feitian v10.pdf
. - The st_filename property was set to
[09895][SERTIT-116][ST][v1.0.8] FTJCOS v5.0 Security Target.pdf
. - The cert_filename property was set to
20180917SERTIT-116 C.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
SERTIT-116
. - The st_references property was updated, with the
{'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0964-V3-2017']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0964-V3-2017']}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20180917%20Sertit-116%20CR%20Feitian%20v10.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[09895][SERTIT-116][ST][v1.0.8]%20FTJCOS%20v5.0%20Security%20Target.pdf
.
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The cert property was updated, with the
{'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The cert_metadata property was set to
None
. - The st_keywords property was set to
None
. - The cert_keywords property was set to
None
. - The st_filename property was set to
None
. - The cert_filename property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
None
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}]}
values discarded.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The report_filename property was set to
None
.
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}]}
values discarded.
- The report property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Feitian FT-JCOS V5.0 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20180917SERTIT-116%20C.pdf",
"dgst": "8d5f8b6024447c59",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "SERTIT-116",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_COMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_COMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_COMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_COMP",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"5.0"
]
},
"indirect_transitive_cves": null,
"next_certificates": [],
"prev_certificates": [],
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"certification_date": "2018-09-17",
"developer": "Feitian Technologies Co., Ltd.",
"enhanced": {
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_id": "SERTIT-116",
"certification_date": "2018-09-17",
"description": "The TOE is an open Java Card Platforms (JCP), that is, smart cards or similar devices enabled with JavaCard technology that support post-issuance downloading of applications.The purpose of the TOE is to provide a limited Java Card environment for a single applet, specifically for e-passport and similar applications such as eID and driving license.The TOE is composed of a Smart Card Platform (SCP) and an embedded software (JCS + non-TSF parts). The JCP is compliant with Java Card Specification v3.0.4 and GlobalPlatform Specification v.2.3. The TOE allows for the loading of the customer applets, but after loading the single applet the platform must be closed to prevent further loading of applets after issuance of the card to the end user. To support this functionality, the TOE provides a closing mechanism with specific guidance. The applet should have been previously verified by an off-card trusted IT component. The JCP is managed by Card Manager that is a part of the TOE. The Card Manager(ISD) is a pre-issuance applet. The JCP is fully compliant with the Java Card Specification v3.0.4 excluding the optional part JCRMI which is not implemented by the TOE. The SCP is a certified hardware platform \u00e2\u20ac\u201c the SLE77CLFX2400PM with specific IC dedicated software (firmware). The hardware platform is certified by the BSI under the certification ID: BSI-DSZ-CC-0964-V3-2017 . Not all functionality of the hardware is used by the composite TOE. Therefore some parts of the IC platform are not part of the composite TOEto ensure that the developed applet has sufficient ability to counter attacks.",
"developer": "Feitian Technologies Co., Ltd.",
"documents": {
"cert": [
{
"href": "https://sertit.no/getfile.php/135382-1607954033/SERTIT/Sertifikater/2018/116/20180917SERTIT-116%20C.pdf"
}
],
"report": [
{
"href": "https://sertit.no/getfile.php/135379-1607954030/SERTIT/Sertifikater/2018/116/20180917%20Sertit-116%20CR%20Feitian%20v10.pdf"
}
],
"target": [
{
"href": "https://sertit.no/getfile.php/135385-1607954035/SERTIT/Sertifikater/2018/116/%5B09895%5D%5BSERTIT-116%5D%5BST%5D%5Bv1.0.8%5D%20FTJCOS%20v5.0%20Security%20Target.pdf"
}
]
},
"evaluation_facility": "Brightsight B.V.",
"expiration_date": "2023-09-17",
"level": "EAL 5, ALC_DVS.2, AVA_VAN.5",
"mutual_recognition": "CCRA, SOG-IS",
"product": "V5.0.9",
"sponsor": "Feitian Technologies Co., Ltd."
},
"product": "FT-JCOS V5.0",
"url": "https://sertit.no/certified-products/product-archive/ft-jcos-v5-0"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0964-V3-2017"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0964-V3-2017"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Feitian Technologies Co., Ltd.",
"manufacturer_web": "https://www.ftsafe.com",
"name": "Feitian FT-JCOS V5.0",
"not_valid_after": "2023-09-17",
"not_valid_before": "2018-09-17",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "20180917SERTIT-116 C.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"NO": {
"SERTIT-116": 2
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR": 1
},
"AVA": {
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 4": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"NSS": {
"NSS": 1
}
},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"BrightSight": {
"Brightsight": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Feitian": {
"Feitian Technologies": 1
}
},
"vulnerability": {}
},
"cert_metadata": {
"pdf_file_size_bytes": 744305,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 1
},
"report_filename": "20180917 Sertit-116 CR Feitian v10.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"NO": {
"SERTIT-116": 20
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_COMP.1": 1,
"ADV_FSP.5": 1,
"ADV_IMP.1": 1,
"ADV_INT.2": 1,
"ADV_TDS.4": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.5": 1,
"ALC_COMP.1": 1,
"ALC_DEL.1": 1,
"ALC_DVS.2": 5,
"ALC_FLR": 1,
"ALC_LCD.1": 1,
"ALC_TAT.2": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_COMP.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COMP.1": 1,
"ATE_COV.2": 1,
"ATE_DPT.3": 1,
"ATE_FUN.1": 1,
"ATE_IND": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_COMP.1": 1,
"AVA_VAN.5": 4
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 4": 1,
"EAL 5": 1,
"EAL1": 1,
"EAL5+": 22,
"EAL7": 1
}
},
"cc_sfr": {
"FCS": {
"FCS_RNG.1": 4
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"BrightSight": {
"Brightsight": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {
"GlobalPlatform": {
"GlobalPlatform 3.0.4": 1
},
"JavaCard": {
"Java Card 2.3": 1,
"Java Card 3.0.4": 4
}
},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"other": {
"JIL": 2
}
},
"standard_id": {
"CC": {
"CCMB-2017-04-004": 1
},
"ISO": {
"ISO/IEC 14443": 2,
"ISO/IEC 15408": 8,
"ISO/IEC 7816": 2
},
"SCP": {
"SCP02": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 1
}
},
"DES": {
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Feitian": {
"Feitian": 1,
"Feitian Technologies": 2,
"Feitian Technologies Co": 1
},
"Infineon": {
"Infineon": 1
}
},
"vulnerability": {}
},
"report_metadata": {
"/AAPL:Keywords": "[\u0027ugradert\u0027]",
"/Author": "[email protected]",
"/CreationDate": "D:20180917114319Z00\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2013",
"/Keywords": "ugradert",
"/ModDate": "D:20180917114319Z00\u002700\u0027",
"/Producer": "Mac OS X 10.13.6 Quartz PDFContext",
"/Title": "tittel",
"pdf_file_size_bytes": 1156984,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 21
},
"st_filename": "[09895][SERTIT-116][ST][v1.0.8] FTJCOS v5.0 Security Target.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0964-": 1,
"BSI-DSZ-CC-0964-V3-2017": 3
}
},
"cc_claims": {
"A": {
"A.APPLET": 6,
"A.DELETION": 1,
"A.VERIFICATION": 6
},
"D": {
"D.API_DATA": 3,
"D.APP_CODE": 6,
"D.APP_C_DATA": 2,
"D.APP_I_DATA": 4,
"D.CM_APDU": 1,
"D.CRYPTO": 7,
"D.JCS_CODE": 4,
"D.JCS_DATA": 5,
"D.JCS_KEYS": 4,
"D.SEC_ATTRIBUTES": 2,
"D.SEC_DATA": 8
},
"O": {
"O.ALARM": 20,
"O.APPLET": 4,
"O.CARD-": 7,
"O.CARD-MANAGEMENT": 30,
"O.CIPHER": 14,
"O.CODE_PKG": 3,
"O.COMMUNICATION": 11,
"O.DELETION": 1,
"O.FIREWALL": 37,
"O.GLOBAL": 2,
"O.GLOBAL_ARRAYS_CONFID": 16,
"O.GLOBAL_ARRAYS_INTEG": 9,
"O.IC_SUPPORT": 17,
"O.INSTALL": 16,
"O.JAVAOBJECT": 22,
"O.KEY-": 1,
"O.KEY-MNGT": 20,
"O.LOAD": 18,
"O.NATIVE": 14,
"O.OPERATE": 33,
"O.OS": 1,
"O.OS_SUPPORT": 23,
"O.PACKAGE": 2,
"O.PIN-MNGT": 1,
"O.REALLOCATION": 15,
"O.RECOVERY": 23,
"O.REMOTE": 1,
"O.RESOURCES": 19,
"O.RND": 14,
"O.SID": 30,
"O.TRANSACTION": 14
},
"OE": {
"OE.APPLET": 9,
"OE.CARD-MANAGEMENT": 2,
"OE.CODE-": 5,
"OE.CODE-EVIDENCE": 16,
"OE.SCP": 6,
"OE.VERIFICATION": 37
},
"OP": {
"OP.ARRAY_ACCESS": 4,
"OP.CREATE": 7,
"OP.GP": 3,
"OP.INSTANCE_FIELD": 4,
"OP.INVK_INTERFACE": 7,
"OP.INVK_VIRTUAL": 6,
"OP.JAVA": 5,
"OP.LOAD_PCKG": 1,
"OP.PUT": 6,
"OP.THROW": 5,
"OP.TYPE_ACCESS": 5
},
"OSP": {
"OSP.VERIFICATION": 6
},
"R": {
"R.JAVA": 5
},
"T": {
"T.COMMUNICATION": 5,
"T.CONFID-": 2,
"T.CONFID-APPLI-": 2,
"T.CONFID-APPLI-DATA": 16,
"T.CONFID-JCS-CODE": 7,
"T.CONFID-JCS-DATA": 9,
"T.DELETION": 1,
"T.EXE-": 1,
"T.EXE-CODE": 8,
"T.FAULT": 6,
"T.INSTALL": 6,
"T.INTEG-": 6,
"T.INTEG-APPLI-": 4,
"T.INTEG-APPLI-CODE": 12,
"T.INTEG-APPLI-DATA": 17,
"T.INTEG-JCS-": 1,
"T.INTEG-JCS-CODE": 7,
"T.INTEG-JCS-DATA": 12,
"T.LEAKAGE": 6,
"T.NATIVE": 6,
"T.PHYSICAL": 8,
"T.RESOURCES": 9,
"T.RND": 6,
"T.SID": 19
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0084": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 6,
"ADV_FSP.1": 4,
"ADV_FSP.2": 2,
"ADV_FSP.4": 2,
"ADV_FSP.5": 7,
"ADV_IMP.1": 9,
"ADV_INT.2": 1,
"ADV_TDS.1": 2,
"ADV_TDS.2": 1,
"ADV_TDS.3": 10,
"ADV_TDS.4": 1
},
"AGD": {
"AGD_OPE.1": 10,
"AGD_PRE.1": 6
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.1": 1,
"ALC_CMS.4": 1,
"ALC_CMS.5": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 2,
"ALC_DVS.2": 7,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1,
"ALC_TAT.2": 2
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 4,
"ASE_INT.1": 5,
"ASE_OBJ.2": 3,
"ASE_REQ.1": 2,
"ASE_REQ.2": 2,
"ASE_SPD.1": 2,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.1": 2,
"ATE_COV.2": 3,
"ATE_DPT.1": 2,
"ATE_FUN.1": 6
},
"AVA": {
"AVA_VAN.5": 7
}
},
"cc_security_level": {
"EAL": {
"EAL 5": 1,
"EAL 5 augmented": 1,
"EAL5": 6,
"EAL5 augmented": 1,
"EAL5+": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP.1": 21,
"FAU_ARP.1.1": 1,
"FAU_SAA.1": 3
},
"FCO": {
"FCO_NRO": 6,
"FCO_NRO.2": 5
},
"FCS": {
"FCS_CKM.1": 10,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 9,
"FCS_CKM.2.1": 1,
"FCS_CKM.3": 8,
"FCS_CKM.3.1": 1,
"FCS_CKM.4": 13,
"FCS_CKM.4.1": 1,
"FCS_COP": 7,
"FCS_COP.1": 21,
"FCS_RNG": 5,
"FCS_RNG.1": 13,
"FCS_RNG.1.1": 2,
"FCS_RNG.1.2": 2
},
"FDP": {
"FDP_ACC": 21,
"FDP_ACC.1": 12,
"FDP_ACC.2": 2,
"FDP_ACF": 21,
"FDP_ACF.1": 13,
"FDP_IFC": 23,
"FDP_IFC.1": 13,
"FDP_IFC.2": 2,
"FDP_IFF": 18,
"FDP_IFF.1": 17,
"FDP_ITC": 12,
"FDP_ITC.1": 4,
"FDP_ITC.2": 10,
"FDP_ITT.1": 1,
"FDP_RIP": 75,
"FDP_RIP.1": 8,
"FDP_ROL": 12,
"FDP_ROL.1": 3,
"FDP_SDI.1": 1,
"FDP_SDI.2": 9,
"FDP_SDI.2.1": 1,
"FDP_SDI.2.2": 1,
"FDP_UIT": 5,
"FDP_UIT.1": 2
},
"FIA": {
"FIA_ATD": 8,
"FIA_ATD.1": 2,
"FIA_UID": 24,
"FIA_UID.1": 10,
"FIA_UID.2": 1,
"FIA_USB": 7,
"FIA_USB.1": 3
},
"FMT": {
"FMT_MSA": 87,
"FMT_MSA.1": 10,
"FMT_MSA.2": 2,
"FMT_MSA.3": 16,
"FMT_MTD": 20,
"FMT_MTD.1": 2,
"FMT_MTD.3": 1,
"FMT_SMF": 18,
"FMT_SMF.1": 18,
"FMT_SMF.1.1": 1,
"FMT_SMR": 31,
"FMT_SMR.1": 30,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPR": {
"FPR_UNO.1": 8,
"FPR_UNO.1.1": 1
},
"FPT": {
"FPT_FLS": 13,
"FPT_FLS.1": 13,
"FPT_FLS.1.1": 2,
"FPT_ITT.1": 1,
"FPT_PHP.3": 1,
"FPT_RCV": 22,
"FPT_RCV.3": 13,
"FPT_RCV.4": 2,
"FPT_TDC.1": 8,
"FPT_TDC.1.1": 1,
"FPT_TDC.1.2": 1,
"FPT_TST.1": 1
},
"FRU": {
"FRU_FLT.2": 1
},
"FTP": {
"FTP_ITC": 6,
"FTP_ITC.1": 4,
"FTP_TRP.1": 2
}
},
"certification_process": {
"OutOfScope": {
"a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.RECOVERY and O.OS_SUPPORT are": 1,
"com 11 FT-JCOS V5.0 Security Target Phase 2 covers the Secure IC Development of Infineon and is out of scope of the TOE evaluation as that is part of the IC platform evaluation. In Phase 3, the Chip": 1,
"out of scope": 2
}
},
"cipher_mode": {
"CBC": {
"CBC": 2
},
"CCM": {
"CCM": 1
},
"CTR": {
"CTR": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"KEX": {
"Key exchange": 1
},
"MAC": {
"MAC": 2
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 3
},
"SHA2": {
"SHA-256": 2,
"SHA256": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {
"misc": {
"TYPE_ACCESS": 5
}
},
"javacard_packages": {
"javacard": {
"javacard.security": 2
},
"javacardx": {
"javacardx.crypto": 2
}
},
"javacard_version": {
"JavaCard": {
"Java Card 3.0.4": 3
}
},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 21,
"RNG": 10
},
"TRNG": {
"TRNG": 3
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 3,
"malfunction": 4,
"physical tampering": 1
},
"SCA": {
"DPA": 3,
"Leak-Inherent": 2,
"SPA": 1,
"physical probing": 3,
"timing attacks": 1
}
},
"standard_id": {
"BSI": {
"AIS20": 2,
"AIS36": 2
},
"FIPS": {
"FIPS PUB 140-2": 1,
"FIPS PUB 180-4": 1,
"FIPS PUB 197": 1,
"FIPS140": 2,
"FIPS180-4": 2,
"FIPS197": 3
},
"ICAO": {
"ICAO": 3
},
"ISO": {
"ISO/IEC 18013": 2,
"ISO/IEC 9796-2": 1
},
"SCP": {
"SCP02": 6
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 13
}
},
"DES": {
"3DES": {
"3DES": 1,
"TDEA": 1,
"TDES": 7,
"Triple-DES": 1
},
"DES": {
"DES": 3
}
},
"constructions": {
"MAC": {
"CMAC": 2
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Feitian": {
"Feitian Technologies": 1,
"Feitian Technologies Co": 92
},
"Infineon": {
"Infineon": 10,
"Infineon Technologies AG": 1
}
},
"vulnerability": {}
},
"st_metadata": {
"/CreationDate": "D:20180811160413+08\u002700\u0027",
"/Creator": "LaTeX with hyperref package",
"/Producer": "MiKTeX-xdvipdfmx (0.7.8)",
"pdf_file_size_bytes": 1189588,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 89
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20180917%20Sertit-116%20CR%20Feitian%20v10.pdf",
"scheme": "NO",
"security_level": {
"_type": "Set",
"elements": [
"EAL5+",
"AVA_VAN.5",
"ALC_DVS.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[09895][SERTIT-116][ST][v1.0.8]%20FTJCOS%20v5.0%20Security%20Target.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": true,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "4e4772f19252d78714540656a807928a407ed8c495a9a45815261a46f4e8ed86",
"txt_hash": "60b7f498db2f2b295b3c531b80161aa58d3e9cbd226677ee4fef9d699d2045b2"
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "a0cca3dc49d536376c3a8cbc35c14b7dcd56d220cf9daeaf5a0602083c81909a",
"txt_hash": "058213dd3d2acaada34005ad9ab040167a22de3c05063a03c5289d8ee35787fb"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "e714a2c03da88035b23edddce15f888fdd34a72e96ba694237ffc96a4ef6ae49",
"txt_hash": "39e575bcb51bf4e0c72e9226b46320f67645c95199e2eefa6f315fe558d6b70d"
}
},
"status": "archived"
}