Sony FeliCa Contactless Smart Card IC Chip RC-S960/1

CSV information ?

Status archived
Valid from 28.06.2007
Valid until 01.09.2019
Scheme 🇫🇷 FR
Manufacturer Sony Corporation / Fujitsu
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level EAL4
Maintenance updates ANSSI-CC-2007/14-M01 (28.11.2014) Certification report

Heuristics summary ?

Certificate ID: ANSSI-CC-2007/14

Certificate ?

Certification report ?

Extracted keywords

Vendor
Thales

Security level
EAL 4, EAL4, EAL7, EAL 1, EAL 3, EAL 5, EAL 7, ITSEC E6 and
Security Assurance Requirements (SAR)
ACM_AUT, ACM_CAP, ACM_SCP, ADO_DEL, ADO_IGS, ADV_IMP.2, ADV_FSP, ADV_HLD, ADV_IMP, ADV_INT, ADV_LLD, ADV_RCR, ADV_SPM, AGD_ADM, AGD_USR, ALC_DVS.2, ALC_FLR, ALC_DVS, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_MSU.3, AVA_VLA.4, AVA_CCA, AVA_MSU, AVA_SOF, AVA_VLA
Protection profiles
BSI-PP-0002-2001
Certificates
DCSSI-2007/14

Standards
ISO/IEC 15408:2005, ISO/IEC 18045:2005, CCMB-2005-08-001, CCMB-2005-08-002, CCMB-2005-08-003, CCMB-2005-08-004

File metadata

Title DCSSI-2007/14
Subject Sony FeliCa Contactless Smart Card IC Chip RC-S960/1
Keywords CER/F/07.5
Author watanabe
Creation date D:20070629093108+02'00'
Modification date D:20070629093143+02'00'
Pages 16
Creator Acrobat PDFMaker 7.0.7 pour Word
Producer Acrobat Distiller 7.0.5 (Windows)

References

Incoming
  • ANSSI-CC-2008/18 - archived - Sony FeliCa Contactless Smart Card IC Chip RC-S962/1

Security target ?

Extracted keywords

Symmetric Algorithms
DES
Block cipher modes
CBC

Vendor
Thales

Security level
EAL4
Security Assurance Requirements (SAR)
ACM_AUT.1, ACM_CAP.4, ACM_SCP.2, ACM_CAP.3, ADO_DEL.2, ADO_IGS.1, ADV_IMP.2, ADV_FSP.2, ADV_HLD.2, ADV_IMP.1, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, ADV_FSP.1, ADV_HLD.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.2, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VLA.4, AVA_MSU.3, AVA_MSU.2, AVA_SOF.1, AVA_VLA.2
Security Functional Requirements (SFR)
FCS_CKM.1, FCS_COP.1, FCS_CKM.1.1, FCS_COP.1.1, FCS_COP, FCS_CKM.2, FCS_CKM.4, FDP_ACC.1, FDP_ACF.1, FDP_SDI.2, FDP_DAU.1, FDP_ACC.1.1, FDP_ACC, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_SDI.2.1, FDP_SDI.2.2, FDP_DAU.1.1, FDP_DAU.1.2, FDP_ITC.1, FDP_ACF, FIA_ATD.1, FIA_UID.1, FIA_UAU.1, FIA_UAU.3, FIA_UAU.4, FIA_USB.1, FIA_ATD.1.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.3.1, FIA_UAU.3.2, FIA_UAU.4.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_CKM.1, FIA_COP.1, FIA_SMR.1, FIA_RPL.1, FIA_RCV.4, FIA_DAU.1, FMT_SMR.1, FMT_MTD.1, FMT_SMF.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD.1.1, FMT_SMF.1.1, FMT_MTD, FMT_MSA.2, FMT_MSA.3, FPT_RPL.1, FPT_RCV.4, FPT_RPL.1.1, FPT_RPL.1.2, FPT_RCV.4.1, FPT_SDI.2, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3
Protection profiles
BSI-PP-0002

Side-channel analysis
Leak-Inherent, physical probing, Malfunction, malfunction

Standards
FIPS PUB 46-3, FIPS PUB 81, AIS20, AIS31, ISO/IEC 15408, ISO/IEC 18092, CCMB-2005-08-001, CCMB-2005-08-002, CCMB-2005-08-003

File metadata

Creation date D:20070521184833+09'00'
Modification date D:20070521185344+09'00'
Pages 134
Creator Word 用 Acrobat PDFMaker 7.0.7
Producer Acrobat Distiller 7.0.5 (Windows)

Heuristics ?

Certificate ID: ANSSI-CC-2007/14

Extracted SARs

AVA_MSU.3, ATE_COV.2, ATE_DPT.1, ADV_FSP.2, ADV_HLD.2, ADV_SPM.1, ALC_DVS.2, ALC_TAT.1, ATE_IND.2, AVA_VLA.4, AGD_USR.1, ADV_IMP.2, AGD_ADM.1, ADV_RCR.1, ALC_LCD.1, ADV_LLD.1, AVA_SOF.1, ATE_FUN.1

Similar certificates

Name Certificate ID
Sony FeliCa Contactless Smart Card IC Chip RC-S962/1 ANSSI-CC-2008/18 Compare

Scheme data ?

Product Sony FeliCa Contactless Smart Card IC Chip RC-S960/1
Url https://cyber.gouv.fr/produits-certifies/sony-felica-contactless-smart-card-ic-chip-rc-s9601
Description Le produit évalué « Sony FeliCa Contactless Smart Card IC Chip RC-S960/1 » est une carte à puce sans contact développée par Sony Corporation. Elle est destinée à être utilisée dans de nombreux domaines, notamment la finance. Les principaux services de sécurité fournis par le produit sont : - La protection en confidentialité et en intégrité des données du client ; - Le contrôle de flux sur les
Sponsor Sony Corporation
Developer Sony Corporation, Fujitsu
Cert Id 2007/14
Level EAL4
Enhanced
Cert Id 2007/14
Certification Date 28/06/2007
Category Cartes à puce
Cc Version Critères Communs version 2.3
Developer Sony Corporation, Fujitsu
Sponsor Sony Corporation
Evaluation Facility CEACI (Thales Security Systems - CNES)
Level EAL4
Protection Profile --
Mutual Recognition SOG-IS CCRA
Augmented
Target Link https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi-cible_2007-14en.pdf
Report Link https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi_2007-14en.pdf

References ?

Updates ?

  • 14.10.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'Sony FeliCa Contactless Smart Card IC Chip RC-S960/1', 'url': 'https://cyber.gouv.fr/produits-certifies/sony-felica-contactless-smart-card-ic-chip-rc-s9601', 'description': 'Le produit évalué « Sony FeliCa Contactless Smart Card IC Chip RC-S960/1 » est une carte à puce sans contact développée par Sony Corporation. Elle est destinée à être utilisée dans de nombreux domaines, notamment la finance.\n\nLes principaux services de sécurité fournis par le produit sont :\n- La protection en confidentialité et en intégrité des données du client ;\n- Le contrôle de flux sur les', 'sponsor': 'Sony Corporation', 'developer': 'Sony Corporation, Fujitsu', 'cert_id': '2007/14', 'level': 'EAL4', 'enhanced': {'cert_id': '2007/14', 'certification_date': '28/06/2007', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 2.3', 'developer': 'Sony Corporation, Fujitsu', 'sponsor': 'Sony Corporation', 'evaluation_facility': 'CEACI (Thales Security Systems - CNES)', 'level': 'EAL4', 'protection_profile': '--', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': '', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi-cible_2007-14en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi_2007-14en.pdf'}}.
  • 02.09.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '4e882f4a5c2bd0dad9493bc3850749b6d79dc96610689797319497bb8fab5ba8', 'txt_hash': '057fab18bde66091d955889b2e360865c2403c6f4e8ceded37f63cc6307b9647'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '3998e5b3fe5c0b4033b7a4cf6008c11e14937e7814450769e29ed946933d0542', 'txt_hash': '516a62e0c94fd15a6a75270b09f26b98846fe44a02ffb886d0a5c61916c213b8'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 177505, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 16, '/CreationDate': "D:20070629093108+02'00'", '/Subject': 'Sony FeliCa Contactless Smart Card IC Chip RC-S960/1', '/Author': 'watanabe', '/Creator': 'Acrobat PDFMaker 7.0.7 pour Word', '/Keywords': 'CER/F/07.5', '/Producer': 'Acrobat Distiller 7.0.5 (Windows)', '/ModDate': "D:20070629093143+02'00'", '/Company': 'SGDN/DCSSI', '/Comments': 'Sony Corporation', '/SourceModified': 'D:20070628164448', '/Title': 'DCSSI-2007/14', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.ssi.gouv.fr/', 'mailto:[email protected]']}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 573705, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 134, '/CreationDate': "D:20070521184833+09'00'", '/Creator': 'Word 用 Acrobat PDFMaker 7.0.7', '/DocNumber': '960-STL-E01-43', '/IssueDate': 'April 17, 2007', '/ModDate': "D:20070521185344+09'00'", '/Producer': 'Acrobat Distiller 7.0.5 (Windows)', '/Title': '', '/version': '1.43', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {'FR': {}}.
    • The report_keywords property was set to {'cc_cert_id': {'FR': {'DCSSI-2007/14': 17}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0002-2001': 1}}, 'cc_security_level': {'EAL': {'EAL 4': 2, 'EAL4': 3, 'EAL7': 1, 'EAL 1': 1, 'EAL 3': 1, 'EAL 5': 1, 'EAL 7': 1}, 'ITSEC': {'ITSEC E6 and': 1}}, 'cc_sar': {'ACM': {'ACM_AUT': 1, 'ACM_CAP': 1, 'ACM_SCP': 1}, 'ADO': {'ADO_DEL': 1, 'ADO_IGS': 1}, 'ADV': {'ADV_IMP.2': 1, 'ADV_FSP': 1, 'ADV_HLD': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_LLD': 1, 'ADV_RCR': 1, 'ADV_SPM': 1}, 'AGD': {'AGD_ADM': 1, 'AGD_USR': 1}, 'ALC': {'ALC_DVS.2': 1, 'ALC_FLR': 2, 'ALC_DVS': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_MSU.3': 1, 'AVA_VLA.4': 1, 'AVA_CCA': 1, 'AVA_MSU': 1, 'AVA_SOF': 1, 'AVA_VLA': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Thales': {'Thales': 1}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408:2005': 1, 'ISO/IEC 18045:2005': 1}, 'CC': {'CCMB-2005-08-001': 1, 'CCMB-2005-08-002': 1, 'CCMB-2005-08-003': 1, 'CCMB-2005-08-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0002': 2}}, 'cc_security_level': {'EAL': {'EAL4': 11}}, 'cc_sar': {'ACM': {'ACM_AUT.1': 3, 'ACM_CAP.4': 5, 'ACM_SCP.2': 3, 'ACM_CAP.3': 1}, 'ADO': {'ADO_DEL.2': 3, 'ADO_IGS.1': 4}, 'ADV': {'ADV_IMP.2': 1, 'ADV_FSP.2': 12, 'ADV_HLD.2': 5, 'ADV_IMP.1': 5, 'ADV_LLD.1': 5, 'ADV_RCR.1': 5, 'ADV_SPM.1': 4, 'ADV_FSP.1': 7, 'ADV_HLD.1': 2}, 'AGD': {'AGD_ADM.1': 7, 'AGD_USR.1': 6}, 'ALC': {'ALC_DVS.2': 1, 'ALC_DVS.1': 4, 'ALC_LCD.1': 3, 'ALC_TAT.1': 4}, 'ATE': {'ATE_COV.2': 3, 'ATE_DPT.1': 3, 'ATE_FUN.1': 3, 'ATE_IND.2': 3}, 'AVA': {'AVA_VLA.4': 1, 'AVA_MSU.3': 1, 'AVA_MSU.2': 3, 'AVA_SOF.1': 3, 'AVA_VLA.2': 3}}, 'cc_sfr': {'FCS': {'FCS_CKM.1': 41, 'FCS_COP.1': 40, 'FCS_CKM.1.1': 2, 'FCS_COP.1.1': 2, 'FCS_COP': 1, 'FCS_CKM.2': 2, 'FCS_CKM.4': 6}, 'FDP': {'FDP_ACC.1': 12, 'FDP_ACF.1': 14, 'FDP_SDI.2': 8, 'FDP_DAU.1': 9, 'FDP_ACC.1.1': 1, 'FDP_ACC': 1, 'FDP_ACF.1.1': 2, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 2, 'FDP_ACF.1.4': 1, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_DAU.1.1': 1, 'FDP_DAU.1.2': 1, 'FDP_ITC.1': 3, 'FDP_ACF': 1}, 'FIA': {'FIA_ATD.1': 10, 'FIA_UID.1': 13, 'FIA_UAU.1': 11, 'FIA_UAU.3': 9, 'FIA_UAU.4': 9, 'FIA_USB.1': 10, 'FIA_ATD.1.1': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.3.1': 1, 'FIA_UAU.3.2': 1, 'FIA_UAU.4.1': 1, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_CKM.1': 2, 'FIA_COP.1': 2, 'FIA_SMR.1': 1, 'FIA_RPL.1': 1, 'FIA_RCV.4': 1, 'FIA_DAU.1': 1}, 'FMT': {'FMT_SMR.1': 24, 'FMT_MTD.1': 43, 'FMT_SMF.1': 16, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MTD.1.1': 4, 'FMT_SMF.1.1': 1, 'FMT_MTD': 4, 'FMT_MSA.2': 12, 'FMT_MSA.3': 5}, 'FPT': {'FPT_RPL.1': 9, 'FPT_RCV.4': 10, 'FPT_RPL.1.1': 1, 'FPT_RPL.1.2': 1, 'FPT_RCV.4.1': 1, 'FPT_SDI.2': 2}, 'FTP': {'FTP_ITC.1': 21, 'FTP_ITC.1.1': 2, 'FTP_ITC.1.2': 2, 'FTP_ITC.1.3': 2}}, 'cc_claims': {}, 'vendor': {'Thales': {'Thales': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'DES': {'DES': {'DES': 18}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {'CBC': {'CBC': 3}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 1, 'physical probing': 1}, 'FI': {'Malfunction': 2, 'malfunction': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 46-3': 6, 'FIPS PUB 81': 1}, 'BSI': {'AIS20': 2, 'AIS31': 1}, 'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 18092': 6}, 'CC': {'CCMB-2005-08-001': 1, 'CCMB-2005-08-002': 1, 'CCMB-2005-08-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to 2007_14en.pdf.
    • The st_filename property was set to cible2007_14en.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to ANSSI-CC-2007/14.
    • The report_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2008/18']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2008/18']}} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}]}.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2007_14en.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible2007_14en.pdf.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
    • The report_references property was updated, with the {'directly_referenced_by': None, 'indirectly_referenced_by': None} data.
    • The extracted_sars property was set to None.
    • The scheme_data property was set to {'product': 'Sony FeliCa Contactless Smart Card IC Chip RC-S960/1', 'url': 'https://cyber.gouv.fr/produits-certifies/sony-felica-contactless-smart-card-ic-chip-rc-s9601', 'description': 'Le produit évalué « Sony FeliCa Contactless Smart Card IC Chip RC-S960/1 » est une carte à puce sans contact développée par Sony Corporation. Elle est destinée à être utilisée dans de nombreux domaines, notamment la finance.\n\nLes principaux services de sécurité fournis par le produit sont :\n- La protection en confidentialité et en intégrité des données du client ;\n- Le contrôle de flux sur les', 'sponsor': 'Sony Corporation', 'developer': 'Sony Corporation, Fujitsu', 'cert_id': '2007/14', 'level': 'EAL4', 'enhanced': {'cert_id': '2007/14', 'certification_date': '28/06/2007', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 2.3', 'developer': 'Sony Corporation, Fujitsu', 'sponsor': 'Sony Corporation', 'evaluation_facility': 'CEACI (Thales Security Systems - CNES)', 'level': 'EAL4', 'protection_profile': '--', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': '', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi-cible_2007-14en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi_2007-14en.pdf'}}.
  • 31.07.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Sony FeliCa Contactless Smart Card IC Chip RC-S960/1 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": null,
  "dgst": "dd54ac352525c637",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2007/14",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_SOF",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_LLD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_HLD",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_ADM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_MSU",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_USR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VLA",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_RCR",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2008/18"
        ]
      },
      "directly_referencing": null,
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2008/18"
        ]
      },
      "indirectly_referencing": null
    },
    "scheme_data": {
      "cert_id": "2007/14",
      "description": "Le produit \u00e9valu\u00e9 \u00ab Sony FeliCa Contactless Smart Card IC Chip RC-S960/1 \u00bb est une carte \u00e0 puce sans contact d\u00e9velopp\u00e9e par Sony Corporation. Elle est destin\u00e9e \u00e0 \u00eatre utilis\u00e9e dans de nombreux domaines, notamment la finance.\n\nLes principaux services de s\u00e9curit\u00e9 fournis par le produit sont :\n- La protection en confidentialit\u00e9 et en int\u00e9grit\u00e9 des donn\u00e9es du client ;\n- Le contr\u00f4le de flux sur les",
      "developer": "Sony Corporation, Fujitsu",
      "enhanced": {
        "augmented": "",
        "category": "Cartes \u00e0 puce",
        "cc_version": "Crit\u00e8res Communs version 2.3",
        "cert_id": "2007/14",
        "certification_date": "28/06/2007",
        "developer": "Sony Corporation, Fujitsu",
        "evaluation_facility": "CEACI (Thales Security Systems - CNES)",
        "level": "EAL4",
        "mutual_recognition": "SOG-IS\n                          CCRA",
        "protection_profile": "--",
        "report_link": "https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi_2007-14en.pdf",
        "sponsor": "Sony Corporation",
        "target_link": "https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi-cible_2007-14en.pdf"
      },
      "level": "EAL4",
      "product": "Sony FeliCa Contactless Smart Card IC Chip RC-S960/1",
      "sponsor": "Sony Corporation",
      "url": "https://cyber.gouv.fr/produits-certifies/sony-felica-contactless-smart-card-ic-chip-rc-s9601"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2014-11-28",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2007_14-M01.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "ANSSI-CC-2007/14-M01"
      }
    ]
  },
  "manufacturer": "Sony Corporation / Fujitsu",
  "manufacturer_web": "https://www.sony.com/",
  "name": "Sony FeliCa Contactless Smart Card IC Chip RC-S960/1",
  "not_valid_after": "2019-09-01",
  "not_valid_before": "2007-06-28",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "2007_14en.pdf",
    "report_frontpage": {
      "FR": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "DCSSI-2007/14": 17
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP-0002-2001": 1
        }
      },
      "cc_sar": {
        "ACM": {
          "ACM_AUT": 1,
          "ACM_CAP": 1,
          "ACM_SCP": 1
        },
        "ADO": {
          "ADO_DEL": 1,
          "ADO_IGS": 1
        },
        "ADV": {
          "ADV_FSP": 1,
          "ADV_HLD": 1,
          "ADV_IMP": 1,
          "ADV_IMP.2": 1,
          "ADV_INT": 1,
          "ADV_LLD": 1,
          "ADV_RCR": 1,
          "ADV_SPM": 1
        },
        "AGD": {
          "AGD_ADM": 1,
          "AGD_USR": 1
        },
        "ALC": {
          "ALC_DVS": 1,
          "ALC_DVS.2": 1,
          "ALC_FLR": 2,
          "ALC_TAT": 1
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_DPT": 1,
          "ATE_FUN": 1,
          "ATE_IND": 1
        },
        "AVA": {
          "AVA_CCA": 1,
          "AVA_MSU": 1,
          "AVA_MSU.3": 1,
          "AVA_SOF": 1,
          "AVA_VLA": 1,
          "AVA_VLA.4": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 3": 1,
          "EAL 4": 2,
          "EAL 5": 1,
          "EAL 7": 1,
          "EAL4": 3,
          "EAL7": 1
        },
        "ITSEC": {
          "ITSEC E6 and": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2005-08-001": 1,
          "CCMB-2005-08-002": 1,
          "CCMB-2005-08-003": 1,
          "CCMB-2005-08-004": 1
        },
        "ISO": {
          "ISO/IEC 15408:2005": 1,
          "ISO/IEC 18045:2005": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Thales": {
          "Thales": 1
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "watanabe",
      "/Comments": "Sony Corporation",
      "/Company": "SGDN/DCSSI",
      "/CreationDate": "D:20070629093108+02\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 7.0.7 pour Word",
      "/Keywords": "CER/F/07.5",
      "/ModDate": "D:20070629093143+02\u002700\u0027",
      "/Producer": "Acrobat Distiller 7.0.5 (Windows)",
      "/SourceModified": "D:20070628164448",
      "/Subject": "Sony FeliCa Contactless Smart Card IC Chip RC-S960/1",
      "/Title": "DCSSI-2007/14",
      "pdf_file_size_bytes": 177505,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "mailto:[email protected]",
          "http://www.ssi.gouv.fr/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 16
    },
    "st_filename": "cible2007_14en.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP-0002": 2
        }
      },
      "cc_sar": {
        "ACM": {
          "ACM_AUT.1": 3,
          "ACM_CAP.3": 1,
          "ACM_CAP.4": 5,
          "ACM_SCP.2": 3
        },
        "ADO": {
          "ADO_DEL.2": 3,
          "ADO_IGS.1": 4
        },
        "ADV": {
          "ADV_FSP.1": 7,
          "ADV_FSP.2": 12,
          "ADV_HLD.1": 2,
          "ADV_HLD.2": 5,
          "ADV_IMP.1": 5,
          "ADV_IMP.2": 1,
          "ADV_LLD.1": 5,
          "ADV_RCR.1": 5,
          "ADV_SPM.1": 4
        },
        "AGD": {
          "AGD_ADM.1": 7,
          "AGD_USR.1": 6
        },
        "ALC": {
          "ALC_DVS.1": 4,
          "ALC_DVS.2": 1,
          "ALC_LCD.1": 3,
          "ALC_TAT.1": 4
        },
        "ATE": {
          "ATE_COV.2": 3,
          "ATE_DPT.1": 3,
          "ATE_FUN.1": 3,
          "ATE_IND.2": 3
        },
        "AVA": {
          "AVA_MSU.2": 3,
          "AVA_MSU.3": 1,
          "AVA_SOF.1": 3,
          "AVA_VLA.2": 3,
          "AVA_VLA.4": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 11
        }
      },
      "cc_sfr": {
        "FCS": {
          "FCS_CKM.1": 41,
          "FCS_CKM.1.1": 2,
          "FCS_CKM.2": 2,
          "FCS_CKM.4": 6,
          "FCS_COP": 1,
          "FCS_COP.1": 40,
          "FCS_COP.1.1": 2
        },
        "FDP": {
          "FDP_ACC": 1,
          "FDP_ACC.1": 12,
          "FDP_ACC.1.1": 1,
          "FDP_ACF": 1,
          "FDP_ACF.1": 14,
          "FDP_ACF.1.1": 2,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.3": 2,
          "FDP_ACF.1.4": 1,
          "FDP_DAU.1": 9,
          "FDP_DAU.1.1": 1,
          "FDP_DAU.1.2": 1,
          "FDP_ITC.1": 3,
          "FDP_SDI.2": 8,
          "FDP_SDI.2.1": 1,
          "FDP_SDI.2.2": 1
        },
        "FIA": {
          "FIA_ATD.1": 10,
          "FIA_ATD.1.1": 1,
          "FIA_CKM.1": 2,
          "FIA_COP.1": 2,
          "FIA_DAU.1": 1,
          "FIA_RCV.4": 1,
          "FIA_RPL.1": 1,
          "FIA_SMR.1": 1,
          "FIA_UAU.1": 11,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.3": 9,
          "FIA_UAU.3.1": 1,
          "FIA_UAU.3.2": 1,
          "FIA_UAU.4": 9,
          "FIA_UAU.4.1": 1,
          "FIA_UID.1": 13,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1,
          "FIA_USB.1": 10,
          "FIA_USB.1.1": 1,
          "FIA_USB.1.2": 1,
          "FIA_USB.1.3": 1
        },
        "FMT": {
          "FMT_MSA.2": 12,
          "FMT_MSA.3": 5,
          "FMT_MTD": 4,
          "FMT_MTD.1": 43,
          "FMT_MTD.1.1": 4,
          "FMT_SMF.1": 16,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 24,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_RCV.4": 10,
          "FPT_RCV.4.1": 1,
          "FPT_RPL.1": 9,
          "FPT_RPL.1.1": 1,
          "FPT_RPL.1.2": 1,
          "FPT_SDI.2": 2
        },
        "FTP": {
          "FTP_ITC.1": 21,
          "FTP_ITC.1.1": 2,
          "FTP_ITC.1.2": 2,
          "FTP_ITC.1.3": 2
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 3
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 2,
          "malfunction": 1
        },
        "SCA": {
          "Leak-Inherent": 1,
          "physical probing": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS20": 2,
          "AIS31": 1
        },
        "CC": {
          "CCMB-2005-08-001": 1,
          "CCMB-2005-08-002": 1,
          "CCMB-2005-08-003": 1
        },
        "FIPS": {
          "FIPS PUB 46-3": 6,
          "FIPS PUB 81": 1
        },
        "ISO": {
          "ISO/IEC 15408": 2,
          "ISO/IEC 18092": 6
        }
      },
      "symmetric_crypto": {
        "DES": {
          "DES": {
            "DES": 18
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Thales": {
          "Thales": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/CreationDate": "D:20070521184833+09\u002700\u0027",
      "/Creator": "Word \u7528 Acrobat PDFMaker 7.0.7",
      "/DocNumber": "960-STL-E01-43",
      "/IssueDate": "April 17, 2007",
      "/ModDate": "D:20070521185344+09\u002700\u0027",
      "/Producer": "Acrobat Distiller 7.0.5 (Windows)",
      "/Title": "",
      "/version": "1.43",
      "pdf_file_size_bytes": 573705,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": true,
      "pdf_number_of_pages": 134
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2007_14en.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible2007_14en.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "4e882f4a5c2bd0dad9493bc3850749b6d79dc96610689797319497bb8fab5ba8",
      "txt_hash": "057fab18bde66091d955889b2e360865c2403c6f4e8ceded37f63cc6307b9647"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "3998e5b3fe5c0b4033b7a4cf6008c11e14937e7814450769e29ed946933d0542",
      "txt_hash": "516a62e0c94fd15a6a75270b09f26b98846fe44a02ffb886d0a5c61916c213b8"
    }
  },
  "status": "archived"
}