This page was not yet optimized for use on mobile devices.
Transactional Smartcard reader, Version 2.0
Web information
Status: activeCertification date: 2000-02-01
Scheme: 🇫🇷
Category: ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level: EAL4+
Certification report
Extracted keywords
Symmetric Algorithms
DESSecurity level
EAL4Security Assurance Requirements (SAR)
ADV_IMP.2, AVA_VLA.3Certificates
CC-1, CC-2, CC-3Evaluation facilities
CESTIFile metadata
Creation date | D:19990716142506 |
---|---|
Modification date | D:20000228132316 |
Pages | 12 |
Creator | FrameMaker 5.5.6. |
Producer | Acrobat Distiller Command 3.01 for Solaris 2.3 and later (SPARC) |
Profile
Extracted keywords
Schemes
MACSecurity level
EAL4, EAL4 augmentedSecurity Assurance Requirements (SAR)
ADV_IMP.2, ADV_SPM.1, ADV_IMP.1, ADV_LLD.1, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, AGD_ADM.1, AGD_USR.1, ALC_TAT.1, AVA_VLA.3Security Functional Requirements (SFR)
FCS_CKM, FCS_CKM.1, FCS_CKM.1.1, FCS_CKM.2, FCS_CKM.2.1, FCS_CKM.4, FCS_CKM.4.1, FCS_COP, FCS_COP.1, FCS_COP.1.1, FDP_DAU, FDP_DAU.1, FDP_DAU.1.1, FDP_DAU.1.2, FDP_ITC.1, FIA_AFL, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU, FIA_UAU.2, FIA_UAU.2.1, FIA_UID, FIA_UID.2, FIA_UID.2.1, FIA_UID.1, FMT_MOF.1, FMT_MTD.1, FMT_SMR.1, FMT_MOF, FMT_MOF.1.1, FMT_MTD, FMT_MTD.1.1, FMT_SMR, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MSA.2, FPT_ITT.1, FPT_PHP.3, FPT_RCV.2, FPT_TST.1, FPT_FLS.1, FPT_FLS, FPT_FLS.1.1, FPT_ITT, FPT_ITT.1.1, FPT_PHP, FPT_PHP.3.1, FPT_RCV, FPT_RCV.2.1, FPT_RCV.2.2, FPT_TST, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_AMT.1Side-channel analysis
physical tamperingCertification process
out of scope, specified and checked by a card scheme) that can process a smartcard. This application software is out of scope of the PP, smartcards, by the legitimate owners of those smartcards. The security of the smartcard is out of scope of the TOE. The Device is supposed to be used in a private environment. That is to say that the, specified and checked by a card scheme) that can process a smartcard. This application software is out of scope of the PP. The Device could be considered as a device gathering the capacity to interact with, the requirements related to Management of security attribute, consistency are considered out of scope. FPT_AMT.1 In this PP the abstract machine testing is not appropriate. The transactional smartcardFile metadata
Title | PPEnreg.PDF |
---|---|
Author | certif |
Creation date | D:20000210174501 |
Pages | 40 |
Creator | Microsoft Word - PPEnreg.doc |
Producer | Acrobat PDFWriter 4.0 pour Windows NT |
References
No references are available for this protection profile.
Updates
-
22.04.2025 The protection profile data changed.
Protection Profile changed
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 114202, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 12, '/Producer': 'Acrobat Distiller Command 3.01 for Solaris 2.3 and later (SPARC)', '/Creator': 'FrameMaker 5.5.6.', '/ModDate': 'D:20000228132316', '/CreationDate': 'D:19990716142506', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The pp_metadata property was set to
{'pdf_file_size_bytes': 162712, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 40, '/Creator': 'Microsoft Word - PPEnreg.doc', '/CreationDate': 'D:20000210174501', '/Title': 'PPEnreg.PDF', '/Author': 'certif', '/Producer': 'Acrobat PDFWriter 4.0 pour Windows NT', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_keywords property was set to
{'cc_cert_id': {'NL': {'CC-1': 1, 'CC-2': 1, 'CC-3': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 5}}, 'cc_sar': {'ADV': {'ADV_IMP.2': 1}, 'AVA': {'AVA_VLA.3': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'CESTI': {'CESTI': 1}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The pp_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 16, 'EAL4 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_IMP.2': 5, 'ADV_SPM.1': 2, 'ADV_IMP.1': 2, 'ADV_LLD.1': 2, 'ADV_RCR.1': 1, 'ADV_FSP.1': 1, 'ADV_HLD.2': 1}, 'AGD': {'AGD_ADM.1': 2, 'AGD_USR.1': 1}, 'ALC': {'ALC_TAT.1': 1}, 'AVA': {'AVA_VLA.3': 6}}, 'cc_sfr': {'FCS': {'FCS_CKM': 1, 'FCS_CKM.1': 9, 'FCS_CKM.1.1': 1, 'FCS_CKM.2': 8, 'FCS_CKM.2.1': 1, 'FCS_CKM.4': 9, 'FCS_CKM.4.1': 1, 'FCS_COP': 1, 'FCS_COP.1': 8, 'FCS_COP.1.1': 1}, 'FDP': {'FDP_DAU': 1, 'FDP_DAU.1': 5, 'FDP_DAU.1.1': 1, 'FDP_DAU.1.2': 1, 'FDP_ITC.1': 3}, 'FIA': {'FIA_AFL': 1, 'FIA_AFL.1': 5, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_UAU': 1, 'FIA_UAU.2': 7, 'FIA_UAU.2.1': 1, 'FIA_UID': 1, 'FIA_UID.2': 8, 'FIA_UID.2.1': 1, 'FIA_UID.1': 1}, 'FMT': {'FMT_MOF.1': 4, 'FMT_MTD.1': 5, 'FMT_SMR.1': 6, 'FMT_MOF': 2, 'FMT_MOF.1.1': 1, 'FMT_MTD': 2, 'FMT_MTD.1.1': 1, 'FMT_SMR': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MSA.2': 5}, 'FPT': {'FPT_ITT.1': 7, 'FPT_PHP.3': 10, 'FPT_RCV.2': 6, 'FPT_TST.1': 5, 'FPT_FLS.1': 6, 'FPT_FLS': 1, 'FPT_FLS.1.1': 1, 'FPT_ITT': 1, 'FPT_ITT.1.1': 1, 'FPT_PHP': 1, 'FPT_PHP.3.1': 1, 'FPT_RCV': 1, 'FPT_RCV.2.1': 1, 'FPT_RCV.2.2': 1, 'FPT_TST': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_AMT.1': 1}}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 1}}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'physical tampering': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 3, 'specified and checked by a card scheme) that can process a smartcard. This application software is out of scope of the PP': 1, 'smartcards, by the legitimate owners of those smartcards. The security of the smartcard is out of scope of the TOE. The Device is supposed to be used in a private environment. That is to say that the': 1, 'specified and checked by a card scheme) that can process a smartcard. This application software is out of scope of the PP. The Device could be considered as a device gathering the capacity to interact with': 1, 'the requirements related to Management of security attribute, consistency are considered out of scope. FPT_AMT.1 In this PP the abstract machine testing is not appropriate. The transactional smartcard': 1}}}
.
The state of the protection profile object was updated.
- The pp property was updated, with the
{'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '2a52177cc3939aa3e4491f9f1ea8ebd3a1a343d22caedd64d12ca7f2fd045e69', 'txt_hash': 'da515027e91afa00aac0108b2010d9ee01b84483c7604377551ae63a40d498c1'}
data. - The report property was updated, with the
{'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '0f99fef213b389c61e4ea2df1d804114ae1b8386f2b2ffea581915a252d3fe9a', 'txt_hash': 'c28fdb103af2a5a3fd9c59d497ebf0992630eb48f1988979746bca6d434fb93c'}
data.
- The report_metadata property was set to
-
14.04.2025 The protection profile data changed.
Protection Profile changed
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The pp_metadata property was set to
None
. - The report_keywords property was set to
None
. - The pp_keywords property was set to
None
.
The state of the protection profile object was updated.
- The pp property was updated, with the
{'convert_garbage': True, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': '6adef86c67e4bbbcbc8872bedf10c93c33839884a5cb1ca1d36f080444041ca7', 'txt_hash': None}
data. - The report property was updated, with the
{'convert_garbage': True, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': '6adef86c67e4bbbcbc8872bedf10c93c33839884a5cb1ca1d36f080444041ca7', 'txt_hash': None}
data.
- The report_metadata property was set to
-
04.02.2025 The protection profile was first processed.
New Protection Profile
A new Protection Profile with the name Transactional Smartcard reader, Version 2.0 was processed.
Raw data
{
"_id": "7116b4c52ff3eafb",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "7116b4c52ff3eafb",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "PP0002.pdf",
"pp_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP.1": 1,
"ADV_HLD.2": 1,
"ADV_IMP.1": 2,
"ADV_IMP.2": 5,
"ADV_LLD.1": 2,
"ADV_RCR.1": 1,
"ADV_SPM.1": 2
},
"AGD": {
"AGD_ADM.1": 2,
"AGD_USR.1": 1
},
"ALC": {
"ALC_TAT.1": 1
},
"AVA": {
"AVA_VLA.3": 6
}
},
"cc_security_level": {
"EAL": {
"EAL4": 16,
"EAL4 augmented": 2
}
},
"cc_sfr": {
"FCS": {
"FCS_CKM": 1,
"FCS_CKM.1": 9,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 8,
"FCS_CKM.2.1": 1,
"FCS_CKM.4": 9,
"FCS_CKM.4.1": 1,
"FCS_COP": 1,
"FCS_COP.1": 8,
"FCS_COP.1.1": 1
},
"FDP": {
"FDP_DAU": 1,
"FDP_DAU.1": 5,
"FDP_DAU.1.1": 1,
"FDP_DAU.1.2": 1,
"FDP_ITC.1": 3
},
"FIA": {
"FIA_AFL": 1,
"FIA_AFL.1": 5,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_UAU": 1,
"FIA_UAU.2": 7,
"FIA_UAU.2.1": 1,
"FIA_UID": 1,
"FIA_UID.1": 1,
"FIA_UID.2": 8,
"FIA_UID.2.1": 1
},
"FMT": {
"FMT_MOF": 2,
"FMT_MOF.1": 4,
"FMT_MOF.1.1": 1,
"FMT_MSA.2": 5,
"FMT_MTD": 2,
"FMT_MTD.1": 5,
"FMT_MTD.1.1": 1,
"FMT_SMR": 1,
"FMT_SMR.1": 6,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_AMT.1": 1,
"FPT_FLS": 1,
"FPT_FLS.1": 6,
"FPT_FLS.1.1": 1,
"FPT_ITT": 1,
"FPT_ITT.1": 7,
"FPT_ITT.1.1": 1,
"FPT_PHP": 1,
"FPT_PHP.3": 10,
"FPT_PHP.3.1": 1,
"FPT_RCV": 1,
"FPT_RCV.2": 6,
"FPT_RCV.2.1": 1,
"FPT_RCV.2.2": 1,
"FPT_TST": 1,
"FPT_TST.1": 5,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
}
},
"certification_process": {
"OutOfScope": {
"out of scope": 3,
"smartcards, by the legitimate owners of those smartcards. The security of the smartcard is out of scope of the TOE. The Device is supposed to be used in a private environment. That is to say that the": 1,
"specified and checked by a card scheme) that can process a smartcard. This application software is out of scope of the PP": 1,
"specified and checked by a card scheme) that can process a smartcard. This application software is out of scope of the PP. The Device could be considered as a device gathering the capacity to interact with": 1,
"the requirements related to Management of security attribute, consistency are considered out of scope. FPT_AMT.1 In this PP the abstract machine testing is not appropriate. The transactional smartcard": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"physical tampering": 1
}
},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"pp_metadata": {
"/Author": "certif",
"/CreationDate": "D:20000210174501",
"/Creator": "Microsoft Word - PPEnreg.doc",
"/Producer": "Acrobat PDFWriter 4.0 pour Windows NT",
"/Title": "PPEnreg.PDF",
"pdf_file_size_bytes": 162712,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 40
},
"report_filename": "PPCR0002.pdf",
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"NL": {
"CC-1": 1,
"CC-2": 1,
"CC-3": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_IMP.2": 1
},
"AVA": {
"AVA_VLA.3": 1
}
},
"cc_security_level": {
"EAL": {
"EAL4": 5
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"CESTI": {
"CESTI": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {
"DES": {
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:19990716142506",
"/Creator": "FrameMaker 5.5.6.",
"/ModDate": "D:20000228132316",
"/Producer": "Acrobat Distiller Command 3.01 for Solaris 2.3 and later (SPARC)",
"pdf_file_size_bytes": 114202,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 12
}
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "2a52177cc3939aa3e4491f9f1ea8ebd3a1a343d22caedd64d12ca7f2fd045e69",
"txt_hash": "da515027e91afa00aac0108b2010d9ee01b84483c7604377551ae63a40d498c1"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "0f99fef213b389c61e4ea2df1d804114ae1b8386f2b2ffea581915a252d3fe9a",
"txt_hash": "c28fdb103af2a5a3fd9c59d497ebf0992630eb48f1988979746bca6d434fb93c"
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"is_collaborative": false,
"maintenances": [],
"name": "Transactional Smartcard reader, Version 2.0",
"not_valid_after": null,
"not_valid_before": "2000-02-01",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP0002.pdf",
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PPCR0002.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"EAL4+"
]
},
"status": "active",
"version": "2.0"
}
}