This page was not yet optimized for use on mobile devices.
Java Card System - Open Configuration Protection Profile
CSV information ?
Status: activeCertification date: 2020-05-06 00:00:00
Archived date: 2030-05-06 00:00:00
Scheme: 🇩🇪
Category: ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level: EAL4+
Frontpage information ?
Title: Java Card System - Open Configuration Protection ProfileVersion: 3.1
Security level: EAL 4 augmented with AVA_VAN.5 “Advanced methodical vulnerability analysis” and ALC_DVS.2 “Sufficiency of security measures”. 1.2
Protection profile ?
Extracted keywords
Algorithms
AES, DES, Diffie-Hellman, ECDSA, MD5, RBG, RNG, SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, TRNGElliptic Curves
P-224, P-256, P-384, P-521, brainpoolP192r1, brainpoolP256t1, brainpoolP320r1, brainpoolP320t1, brainpoolP384r1, brainpoolP384t1, brainpoolP512r1, brainpoolP512t1, secp192r1, secp224r1, secp256r1, secp384r1, secp521r1JavaCard
Java Card 2.1.1, Java Card 3.1Protection profiles
BSI-CC-PP-0084-2014, BSI-CC-PP-0099-2017Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_FSP.2, ADV_FSP.4, ADV_IMP.1, ADV_TDS.1, ADV_TDS.2, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.1, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.1, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.5Security Functional Requirements (SFR)
FAU_GEN, FAU_ARP.1, FAU_SAA.1, FCS_CKM, FCS_RNG, FCS_CKM.1, FCS_CKM.2, FCS_CKM.4, FCS_CKM.5, FCS_COP.1, FCS_RNG.1, FDP_ACC.1, FDP_ACF.1, FDP_IFC.1, FDP_IFF.1, FDP_ITC.1, FDP_ITC.2, FDP_RIP.1, FDP_ROL.1, FIA_ATD.1, FIA_UID.1, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_MTD.3, FMT_SMF.1, FMT_SMR.1, FPR_UNO.1, FPT_FLS.1, FPT_TDC.1, FTP_ITC.1, FTP_TRP.1Standards
AIS20, AIS31, FIPS 140-2, FIPS PUB 186-2, ISO/IEC 3309, ISO/IEC 3309, NIST SP 800-38D, PKCS#1, PKCS#5, PKCS1, PKCS5, RFC 7748, RFC 8032, RFC 7748, RFC 8032, RFC2409, X.509References ?
No references are available for this protection profile.
Raw data
{
"_id": "11f07721e8b80d09233c",
"csv_scan": {
"cc_archived_date": "2030-05-06 00:00:00",
"cc_category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cc_certification_date": "2020-05-06 00:00:00",
"cc_pp_name": "Java Card System - Open Configuration Protection Profile",
"cc_pp_version": "3.1",
"cc_security_level": "EAL4+",
"cert_status": "active",
"link_pp_document": "https://www.commoncriteriaportal.org/files/ppfiles/pp0099V2b_pdf.pdf",
"link_pp_report": "https://www.commoncriteriaportal.org/files/ppfiles/pp0099V2a_pdf.pdf",
"maintainance_updates": [],
"scheme": "DE"
},
"frontpage_scan": [
{
"cc_security_level": "EAL 4 augmented with AVA_VAN.5 \u201cAdvanced methodical vulnerability analysis\u201d and ALC_DVS.2 \u201cSufficiency of security measures\u201d. 1.2",
"cc_version": "3.1 revision 5",
"match_rules": [
"IDENTIFICATION.+?Title: (?P\u003cpp_title\u003e.+)?Version: (?P\u003cpp_version_number\u003e.+)?Publication date: (?P\u003cpp_date\u003e.+)?Certified by: (?P\u003cpp_registrator\u003e.+)?Sponsor: (?P\u003cpp_sponsor\u003e.+)?Review Committee: (?P\u003cpp_reviewer\u003e.+)?This Protection Profile is conformant to the Common Criteria version (?P\u003ccc_version\u003e.+)?The minimum assurance level for this Protection Profile is (?P\u003ccc_security_level\u003e.+)?PROTECTION PROFILE PRESENTATION"
],
"pp_date": "April 2020",
"pp_registrator": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"pp_registrator_simplified": "ANSSI_OR_BSI",
"pp_reviewer": "Java Card Forum \u2013 Common Criteria Subgroup",
"pp_sponsor": "Oracle Corporation, 500 Oracle Parkway, Redwood City, CA 94065 USA",
"pp_title": "Java Card System - Open Configuration Protection Profile",
"pp_version_number": "3.1"
}
],
"keywords_scan": {
"block_cipher_modes": {
"CBC": {
"CBC": {
"count": 44
}
},
"ECB": {
"ECB": {
"count": 11
}
}
},
"rules_IC_data_groups": {},
"rules_cert_id": {},
"rules_certification_process": {
".{0,100}[oO]ut of [sS]cope.{0,100}": {
"a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives OE.SCP.RECOVERY and OE.SCP.SUPPORT are": {
"count": 1
}
},
"[\\.\\(].{0,100}?.[oO]ut of [sS]cope..{0,100}?[\\.\\)]": {
". That point is out of scope of this Protection Profile, though": {
"count": 1
}
},
"[oO]ut of [sS]cope": {
"out of scope": {
"count": 1
}
}
},
"rules_cplc": {},
"rules_crypto_algs": {
"AES[-]*(?:128|192|256|)": {
"AES": {
"count": 25
}
},
"DES": {
"DES": {
"count": 42
}
},
"Diffie-Hellman": {
"Diffie-Hellman": {
"count": 9
}
},
"ECDSA": {
"ECDSA": {
"count": 21
}
},
"MD5": {
"MD5": {
"count": 7
}
},
"RBG": {
"RBG": {
"count": 2
}
},
"RN[GD]": {
"RNG": {
"count": 22
}
},
"SHA-1": {
"SHA-1": {
"count": 2
}
},
"SHA[-]*(?:160|224|256|384|512)": {
"SHA-224": {
"count": 2
},
"SHA-256": {
"count": 3
},
"SHA-384": {
"count": 3
},
"SHA-512": {
"count": 3
}
},
"TRNG": {
"TRNG": {
"count": 2
}
}
},
"rules_crypto_engines": {},
"rules_crypto_libs": {},
"rules_defenses": {
"DPA": {
"DPA": {
"count": 1
}
},
"[Mm]alfunction": {
"malfunction": {
"count": 2
}
},
"[Pp]hysical [Pp]robing": {
"physical probing": {
"count": 2
}
},
"[Ss]ide.channels?": {
"side channel": {
"count": 1
}
},
"[pP]hysical [tT]ampering": {
"physical tampering": {
"count": 3
}
}
},
"rules_device_id": {},
"rules_ecc_curves": {
"P-(?:192|224|256|384|521)": {
"P-224": {
"count": 1
},
"P-256": {
"count": 1
},
"P-384": {
"count": 1
},
"P-521": {
"count": 1
}
},
"brainpool.+?[rkt]+1": {
"brainpoolP192r1": {
"count": 1
},
"brainpoolP256t1": {
"count": 1
},
"brainpoolP320r1": {
"count": 1
},
"brainpoolP320t1": {
"count": 1
},
"brainpoolP384r1": {
"count": 1
},
"brainpoolP384t1": {
"count": 1
},
"brainpoolP512r1": {
"count": 1
},
"brainpoolP512t1": {
"count": 1
}
},
"secp.+?1": {
"secp192r1": {
"count": 1
},
"secp224r1": {
"count": 1
},
"secp256r1": {
"count": 1
},
"secp384r1": {
"count": 1
},
"secp521r1": {
"count": 1
}
}
},
"rules_javacard": {
"(?:Java Card|JavaCard) [2-3]\\.[0-9](?:\\.[0-9]|)": {
"Java Card 2.1.1": {
"count": 1
},
"Java Card 3.1": {
"count": 1
}
}
},
"rules_os": {},
"rules_other": {
"library": {
"library": {
"count": 15
}
}
},
"rules_protection_profiles": {
"BSI-(?:CC[-_]|)PP[-_]*.+?": {
"BSI-CC-PP-0084-2014": {
"count": 1
},
"BSI-CC-PP-0099-2017": {
"count": 2
}
}
},
"rules_security_assurance_components": {
"ADV_[A-Z][A-Z][A-Z](?:\\.[0-9]|)": {
"ADV_ARC.1": {
"count": 6
},
"ADV_FSP.1": {
"count": 4
},
"ADV_FSP.2": {
"count": 2
},
"ADV_FSP.4": {
"count": 10
},
"ADV_IMP.1": {
"count": 6
},
"ADV_TDS.1": {
"count": 2
},
"ADV_TDS.2": {
"count": 1
},
"ADV_TDS.3": {
"count": 9
}
},
"AGD_[A-Z][A-Z][A-Z](?:\\.[0-9]|)": {
"AGD_OPE.1": {
"count": 7
},
"AGD_PRE.1": {
"count": 6
}
},
"ALC_[A-Z][A-Z][A-Z](?:\\.[0-9]|)": {
"ALC_CMC.4": {
"count": 1
},
"ALC_CMS.1": {
"count": 1
},
"ALC_CMS.4": {
"count": 2
},
"ALC_DEL.1": {
"count": 1
},
"ALC_DVS.1": {
"count": 2
},
"ALC_DVS.2": {
"count": 8
},
"ALC_LCD.1": {
"count": 3
},
"ALC_TAT.1": {
"count": 3
}
},
"ASE_[A-Z][A-Z][A-Z](?:\\.[0-9]|)": {
"ASE_CCL.1": {
"count": 1
},
"ASE_ECD.1": {
"count": 5
},
"ASE_INT.1": {
"count": 5
},
"ASE_OBJ.2": {
"count": 3
},
"ASE_REQ.1": {
"count": 2
},
"ASE_REQ.2": {
"count": 3
},
"ASE_SPD.1": {
"count": 3
},
"ASE_TSS.1": {
"count": 1
}
},
"ATE_[A-Z][A-Z][A-Z](?:\\.[0-9]|)": {
"ATE_COV.1": {
"count": 2
},
"ATE_COV.2": {
"count": 3
},
"ATE_DPT.1": {
"count": 3
},
"ATE_FUN.1": {
"count": 7
},
"ATE_IND.2": {
"count": 1
}
},
"AVA_[A-Z][A-Z][A-Z](?:\\.[0-9]|)": {
"AVA_VAN.5": {
"count": 7
}
}
},
"rules_security_functional_components": {
"FAU_[A-Z][A-Z][A-Z](?:\\.[0-9]|)": {
"FAU_ARP.1": {
"count": 19
},
"FAU_GEN": {
"count": 1
},
"FAU_SAA.1": {
"count": 3
}
},
"FCS_[A-Z][A-Z][A-Z](?:\\.[0-9]|)": {
"FCS_CKM": {
"count": 1
},
"FCS_CKM.1": {
"count": 16
},
"FCS_CKM.2": {
"count": 4
},
"FCS_CKM.4": {
"count": 18
},
"FCS_CKM.5": {
"count": 7
},
"FCS_COP.1": {
"count": 13
},
"FCS_RNG": {
"count": 6
},
"FCS_RNG.1": {
"count": 10
}
},
"FDP_[A-Z][A-Z][A-Z](?:\\.[0-9]|)": {
"FDP_ACC.1": {
"count": 15
},
"FDP_ACF.1": {
"count": 4
},
"FDP_IFC.1": {
"count": 14
},
"FDP_IFF.1": {
"count": 3
},
"FDP_ITC.1": {
"count": 3
},
"FDP_ITC.2": {
"count": 3
},
"FDP_RIP.1": {
"count": 1
},
"FDP_ROL.1": {
"count": 2
}
},
"FIA_[A-Z][A-Z][A-Z](?:\\.[0-9]|)": {
"FIA_ATD.1": {
"count": 1
},
"FIA_UID.1": {
"count": 11
}
},
"FMT_[A-Z][A-Z][A-Z](?:\\.[0-9]|)": {
"FMT_MSA.1": {
"count": 7
},
"FMT_MSA.3": {
"count": 7
},
"FMT_MTD.1": {
"count": 2
},
"FMT_MTD.3": {
"count": 1
},
"FMT_SMF.1": {
"count": 25
},
"FMT_SMR.1": {
"count": 36
}
},
"FPR_[A-Z][A-Z][A-Z](?:\\.[0-9]|)": {
"FPR_UNO.1": {
"count": 13
}
},
"FPT_[A-Z][A-Z][A-Z](?:\\.[0-9]|)": {
"FPT_FLS.1": {
"count": 13
},
"FPT_TDC.1": {
"count": 9
}
},
"FTP_[A-Z][A-Z][A-Z](?:\\.[0-9]|)": {
"FTP_ITC.1": {
"count": 2
},
"FTP_TRP.1": {
"count": 2
}
}
},
"rules_security_level": {
"EAL[ ]*[0-9+]+?": {
"EAL 4": {
"count": 1
},
"EAL4": {
"count": 5
}
},
"EAL[ ]*[0-9] augmented+?": {
"EAL 4 augmented": {
"count": 1
},
"EAL4 augmented": {
"count": 2
}
}
},
"rules_standard_id": {
"AIS[ ]*[0-9]+?": {
"AIS20": {
"count": 2
},
"AIS31": {
"count": 2
}
},
"FIPS ?(?:PUB )?[0-9]+-[0-9]+?": {
"FIPS 140-2": {
"count": 1
},
"FIPS PUB 186-2": {
"count": 4
}
},
"ISO/IEC[ ]*[0-9]+": {
"ISO/IEC 3309": {
"count": 2
}
},
"ISO/IEC[ ]*[0-9]+[-]*[0-9]*": {
"ISO/IEC 3309": {
"count": 2
}
},
"NIST SP [0-9]+-[0-9]+?[a-zA-Z]?": {
"NIST SP 800-38D": {
"count": 2
}
},
"PKCS[ #]*[1-9]+": {
"PKCS#1": {
"count": 8
},
"PKCS#5": {
"count": 4
},
"PKCS1": {
"count": 16
},
"PKCS5": {
"count": 12
}
},
"RFC [0-9]+": {
"RFC 7748": {
"count": 1
},
"RFC 8032": {
"count": 3
}
},
"RFC[ ]*[0-9]+?": {
"RFC 7748": {
"count": 1
},
"RFC 8032": {
"count": 3
},
"RFC2409": {
"count": 6
}
},
"[Xx]\\.509": {
"X.509": {
"count": 1
}
}
},
"rules_technical_reports": {},
"rules_vendor": {},
"rules_vulnerabilities": {}
},
"pp_analysis": {
"separate_profiles": []
},
"processed": {
"cc_pp_csvid": [],
"cert_id": ""
}
}