This page was not yet optimized for use on mobile
devices.
Java Card™ System Protection Profile Open Configuration, Version 2.6
Web information
| Status | active |
|---|---|
| Valid from | 25.06.2010 |
| Scheme | 🇫🇷 FR |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | AVA_VAN.5, EAL4+, ALC_DVS.2 |
Certification report
Extracted keywords
Security level
EAL 4, EAL4, EAL7, EAL 1, EAL 3, EAL 5, EAL 7, ITSEC E6 etClaims
A.S, OE.SCPSecurity Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_TDS, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_LCD, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSSSecurity Functional Requirements (SFR)
FAU_ARP.1, FCO_NRO.2, FCS_CKM.1, FCS_CKM.2, FCS_CKM.3, FCS_CKM.4, FCS_COP.1, FDP_ACC.2, FDP_ACF.1, FDP_IFC.1, FDP_IFC.2, FDP_IFF.1, FDP_ITC.2, FDP_RIP.1, FDP_ROL.1, FDP_SDI.2, FDP_UIT.1, FIA_ATD.1, FIA_UID.1, FIA_UID.2, FIA_USB.1, FMT_MTD.1, FMT_MTD.3, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_REV.1, FMT_SMF.1, FMT_SMR.1, FPR_UNO.1, FPT_FLS.1, FPT_RCV.3, FPT_TDC.1, FTP_ITC.1Protection profiles
ANSSI-CC-PP-2010/03, ANSSI-CC-PP 2010/03Certificates
ANSSI-CC-PP-2010/03, ANSSI-CC-PP 2010/03Evaluation facilities
Trusted LabsStandards
CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004File metadata
| Creation date | D:20100830113914+02'00' |
|---|---|
| Modification date | D:20100830113914+02'00' |
| Pages | 15 |
| Producer | Acrobat Distiller 8.1.0 (Windows) |
Protection Profile
Extracted keywords
JavaCard versions
Java Card 2.1.1JavaCard API constants
TYPE_ACCESSSecurity level
EAL 4, EAL4, EAL 4 augmented, EAL4 augmentedClaims
D.APP_CODE, D.APP_C_DATA, D.APP_I_DATA, D.PIN, D.API_DATA, D.CRYPTO, D.JCS_CODE, D.JCS_DATA, D.SEC_DATA, D.BIO, O.SID, O.FIREWALL, O.GLOBAL_ARRAYS_CONFID, O.GLOBAL_ARRAYS_INTEG, O.NATIVE, O.OPERATE, O.REALLOCATION, O.RESOURCES, O.ALARM, O.CIPHER, O.KEY-MNGT, O.PIN-MNGT, O.REMOTE, O.TRANSACTION, O.OBJ-DELETION, O.DELETION, O.LOAD, O.INSTALL, O.KEY-, O.APPLET, O.CODE_PKG, O.JAVAOBJECT, O.REMOTE_MTHD, O.REMOTE_OBJ, O.RMI_SERVICE, O.ROR, O.PIN-, O.BIO-MNGT, O.EXT-MEM, O.EXT_MEM_INSTANCE, T.CONFID-APPLI-DATA, T.CONFID-JCS-CODE, T.CONFID-JCS-DATA, T.INTEG-APPLI-CODE, T.INTEG-APPLI-DATA, T.INTEG-JCS-CODE, T.INTEG-JCS-DATA, T.SID, T.EXE-CODE, T.EXE-CODE-REMOTE, T.NATIVE, T.RESOURCES, T.DELETION, T.INSTALL, T.OBJ-DELETION, T.PHYSICAL, T.CONFID-, T.CONFID-JCS-, T.INTEG-APPLI-, T.INTEG-JCS-, T.EXE-CODE-, T.OBJ-, T.INTEG-, T.EXE-, A.S, A.APPLET, A.DELETION, A.VERIFICATION, A.NO-INSTALL, A.NO-DELETION, R.JAVA, OP.ARRAY_ACCESS, OP.CREATE, OP.DELETE_APPLET, OP.DELETE_PCKG, OP.DELETE_PCKG_APPLET, OP.GET_ROR, OP.INSTANCE_FIELD, OP.INVK_VIRTUAL, OP.INVK_INTERFACE, OP.INVOKE, OP.JAVA, OP.THROW, OP.TYPE_ACCESS, OP.PUT, OP.RET_RORD, OP.CREATE_EXT_MEM_INSTANCE, OP.READ_EXT_MEM, OP.WRITE_EXT_MEM, OE.APPLET, OE.CARD-MANAGEMENT, OE.SCP, OE.VERIFICATION, OE.CARD-, OE.NO-DELETION, OE.NO-INSTALL, OSP.VERIFICATIONSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_TDS.1, ADV_FSP.4, ADV_TDS.3, ADV_IMP.1, ADV_FSP.2, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_TAT.1, ALC_CMC.4, ALC_CMS.1, ALC_DVS.1, ALC_LCD.1, ALC_CMS.4, ALC_DEL.1, ATE_COV.2, ATE_FUN.1, ATE_COV.1, ATE_DPT.1, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1, ASE_REQ.2, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_ARP.1, FAU_ARP.1.1, FAU_SAA.1, FCO_NRO, FCO_NRO.2, FCS_CKM.1, FCS_CKM.1.1, FCS_CKM.2, FCS_CKM.2.1, FCS_CKM.3, FCS_CKM.3.1, FCS_CKM.4, FCS_CKM.4.1, FCS_COP.1, FCS_COP.1.1, FDP_ACC, FDP_ACC.2, FDP_ACF, FDP_ACF.1, FDP_IFC, FDP_IFC.1, FDP_IFF, FDP_IFF.1, FDP_RIP, FDP_RIP.1, FDP_ROL.1, FDP_ROL, FDP_SDI.2, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ITC, FDP_ITC.2, FDP_IFC.2, FDP_UIT, FDP_UIT.1, FDP_ACC.1, FDP_ITC.1, FIA_ATD, FIA_ATD.1, FIA_UID, FIA_UID.2, FIA_USB, FIA_USB.1, FIA_UID.1, FMT_MSA, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD, FMT_MTD.1, FMT_MTD.3, FMT_SMR, FMT_SMF, FMT_REV.1, FMT_REV, FPR_UNO.1, FPR_UNO.1.1, FPT_FLS.1, FPT_FLS.1.1, FPT_TDC.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_FLS, FPT_RCV, FPT_RCV.3, FPT_TST.1, FTP_ITC, FTP_ITC.1, FTP_TRP.1Evaluation facilities
Trusted LabsSide-channel analysis
physical probing, side channel, DPA, physical tampering, malfunctionCertification process
out of scope, a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives OE.SCP.RECOVERY and OE.SCP.SUPPORT areStandards
FIPS 140-2, CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003File metadata
| Creation date | D:20100830114115+02'00' |
|---|---|
| Modification date | D:20100830114115+02'00' |
| Pages | 131 |
| Producer | Acrobat Distiller 8.1.0 (Windows) |
References
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.- Carte M-NFC2.0.3_TUR sur composant ST33F1ME (T1019850 / Release A) archived
- Carte VITALE 2 - Application VITALE : Composant AT90SC24036RCV masqué par le logiciel SESAM VITALE v1.0.1 avec correctif version 1 archived
- IDeal Citiz v2.1 Open platform archived
- IDeal Citiz v2.1 STC Open Platform archived
- IDeal Citiz v2.16-i on M7892 B11 - Java Card Open Platform archived
- Infineon SECORA™ ID S v1.1 (SLJ52GxxyyyzS) active
- J3E081_M64, J3E081_M66, J2E081_M64, J3E041_M66, J3E016_M66, J3E016_M64, J3E041_M64 Secure Smart Card Controller Revision 3 archived
- J3E081_M64_DF, J3E081_M66_DF, J3E041_M66_DF, J3E016_M66_DF, J3E041_M64_DF and J3E016_M64_DF Secure Smart Card Controller Revision 3 archived
- J3E145_M64, J3E120_M65, J3E082_M65, J2E145_M64, J2E120_M65, and J2E082_M65 Secure Smart Card Controller Revision 3 archived
- JavaCard platform for smart card ID-One Cosmo V7.1-s on component ST23YL80C (Standard) archived
- LinqUs USIM 128k platform on SC33F640E archived
- NFC FLYBUY PLATINUM V2 sur composant ST33F1ME archived
- NXP J3D081_M59, J2D081_M59, J3D081_M61, J2D081_M61 Secure Smart Card Controller of JCOP V2.4.2 R2 archived
- NXP J3D081_M59_DF and J3D081_M61_DF Secure Smart Card Controller Revision 2 of JCOP V2.4.2 R2 archived
- NXP J3D145_M59, J2D145_M59, J3D120_M60, J3D082_M60, J2D120_M60, J2D082_M60 Secure Smart Card Controller of JCOP V2.4.2 R2 archived
- NXP JCOP 3 SECID P60 (OSA) PL2/5 archived
- NXP JCOP 4.0 on P73N2M0 archived
- Plateforme ID-One Cosmo V9.1 masquée sur le composant IFX SLC32 active
- Plateforme ID-One Cosmo V9.2 masquée sur le composant IFX SLC52 active
- Plateforme Java Card MAV31S en configuration ouverte de la carte à puce Optelio Contactless R7S masquée sur le composant P60D144JVA (version du patch: 1.4) archived
- Plateforme Java Card MultiApp Essential v1.0, en configuration ouverte, sur le composant Infineon M7794 A12 ou G12 archived
- Plateforme Java Card de la carte à puce MultiApp ID V2.1 masquée sur composant P5CC081V1A archived
- Plateforme Java Card en configuration ouverte de la carte à puce MultiApp ID V2.1 masquée sur composant P5CC145V0A archived
- Plateforme Java Card en configuration ouverte de la carte à puce MultiApp v3.1 masquée sur le composant P60D144PVA (version du patch: 1.3) archived
- Plateforme Java Card en configuration ouverte de la carte � puce MultiApp V2 masqu�e sur composants de la famille SLE66 archived
- Plateforme JavaCard MultiApp V4.0 en configuration ouverte basée sur l’Operating System JLEP3 masquée sur le composant SLE78CLFX4000PH (M7892 G12) active
- ProxSIM Taurus, version 1.0 archived
- ProxSIM Taurus, version 1.02 archived
- TimeCOS Java Card Platform and EasyCard version 1.1 archived
- Ucard UBJ31-G11 V1.1 archived
- dragonFly version 3.2 sur composantSM33F1ME archived
Updates Feed
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile was first processed.
Raw data
{
"_id": "85bef5b6f16c4d33",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "85bef5b6f16c4d33",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "ANSSI-CC-cible_PP-2010-03en.pdf",
"pp_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.APPLET": 6,
"A.DELETION": 6,
"A.NO-DELETION": 1,
"A.NO-INSTALL": 1,
"A.S": 2,
"A.VERIFICATION": 5
},
"D": {
"D.API_DATA": 5,
"D.APP_CODE": 9,
"D.APP_C_DATA": 5,
"D.APP_I_DATA": 7,
"D.BIO": 3,
"D.CRYPTO": 6,
"D.JCS_CODE": 5,
"D.JCS_DATA": 7,
"D.PIN": 7,
"D.SEC_DATA": 9
},
"O": {
"O.ALARM": 23,
"O.APPLET": 21,
"O.BIO-MNGT": 6,
"O.CIPHER": 18,
"O.CODE_PKG": 14,
"O.DELETION": 16,
"O.EXT-MEM": 9,
"O.EXT_MEM_INSTANCE": 10,
"O.FIREWALL": 58,
"O.GLOBAL_ARRAYS_CONFID": 20,
"O.GLOBAL_ARRAYS_INTEG": 12,
"O.INSTALL": 17,
"O.JAVAOBJECT": 42,
"O.KEY-": 10,
"O.KEY-MNGT": 16,
"O.LOAD": 18,
"O.NATIVE": 15,
"O.OBJ-DELETION": 10,
"O.OPERATE": 37,
"O.PIN-": 1,
"O.PIN-MNGT": 23,
"O.REALLOCATION": 18,
"O.REMOTE": 17,
"O.REMOTE_MTHD": 6,
"O.REMOTE_OBJ": 10,
"O.RESOURCES": 30,
"O.RMI_SERVICE": 12,
"O.ROR": 5,
"O.SID": 43,
"O.TRANSACTION": 20
},
"OE": {
"OE.APPLET": 9,
"OE.CARD-": 4,
"OE.CARD-MANAGEMENT": 26,
"OE.NO-DELETION": 1,
"OE.NO-INSTALL": 1,
"OE.SCP": 38,
"OE.VERIFICATION": 35
},
"OP": {
"OP.ARRAY_ACCESS": 4,
"OP.CREATE": 7,
"OP.CREATE_EXT_MEM_INSTANCE": 3,
"OP.DELETE_APPLET": 4,
"OP.DELETE_PCKG": 3,
"OP.DELETE_PCKG_APPLET": 3,
"OP.GET_ROR": 3,
"OP.INSTANCE_FIELD": 4,
"OP.INVK_INTERFACE": 8,
"OP.INVK_VIRTUAL": 6,
"OP.INVOKE": 3,
"OP.JAVA": 5,
"OP.PUT": 6,
"OP.READ_EXT_MEM": 3,
"OP.RET_RORD": 3,
"OP.THROW": 5,
"OP.TYPE_ACCESS": 5,
"OP.WRITE_EXT_MEM": 3
},
"OSP": {
"OSP.VERIFICATION": 4
},
"R": {
"R.JAVA": 16
},
"T": {
"T.CONFID-": 1,
"T.CONFID-APPLI-DATA": 20,
"T.CONFID-JCS-": 10,
"T.CONFID-JCS-CODE": 6,
"T.CONFID-JCS-DATA": 7,
"T.DELETION": 7,
"T.EXE-": 1,
"T.EXE-CODE": 13,
"T.EXE-CODE-": 1,
"T.EXE-CODE-REMOTE": 5,
"T.INSTALL": 9,
"T.INTEG-": 10,
"T.INTEG-APPLI-": 11,
"T.INTEG-APPLI-CODE": 11,
"T.INTEG-APPLI-DATA": 20,
"T.INTEG-JCS-": 2,
"T.INTEG-JCS-CODE": 7,
"T.INTEG-JCS-DATA": 7,
"T.NATIVE": 8,
"T.OBJ-": 1,
"T.OBJ-DELETION": 5,
"T.PHYSICAL": 6,
"T.RESOURCES": 10,
"T.SID": 22
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 6,
"ADV_FSP.1": 4,
"ADV_FSP.2": 2,
"ADV_FSP.4": 9,
"ADV_IMP.1": 5,
"ADV_TDS.1": 2,
"ADV_TDS.2": 1,
"ADV_TDS.3": 9
},
"AGD": {
"AGD_OPE.1": 8,
"AGD_PRE.1": 6
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.1": 1,
"ALC_CMS.4": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 2,
"ALC_DVS.2": 8,
"ALC_LCD.1": 3,
"ALC_TAT.1": 3
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 4,
"ASE_INT.1": 5,
"ASE_OBJ.2": 3,
"ASE_REQ.1": 2,
"ASE_REQ.2": 3,
"ASE_SPD.1": 2,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.1": 2,
"ATE_COV.2": 3,
"ATE_DPT.1": 2,
"ATE_FUN.1": 6
},
"AVA": {
"AVA_VAN.5": 8
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 1,
"EAL 4 augmented": 1,
"EAL4": 7,
"EAL4 augmented": 2
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP.1": 19,
"FAU_ARP.1.1": 1,
"FAU_SAA.1": 3
},
"FCO": {
"FCO_NRO": 7,
"FCO_NRO.2": 5
},
"FCS": {
"FCS_CKM.1": 17,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 10,
"FCS_CKM.2.1": 1,
"FCS_CKM.3": 8,
"FCS_CKM.3.1": 1,
"FCS_CKM.4": 16,
"FCS_CKM.4.1": 1,
"FCS_COP.1": 9,
"FCS_COP.1.1": 1
},
"FDP": {
"FDP_ACC": 49,
"FDP_ACC.1": 16,
"FDP_ACC.2": 7,
"FDP_ACF": 45,
"FDP_ACF.1": 24,
"FDP_IFC": 35,
"FDP_IFC.1": 18,
"FDP_IFC.2": 2,
"FDP_IFF": 29,
"FDP_IFF.1": 22,
"FDP_ITC": 15,
"FDP_ITC.1": 4,
"FDP_ITC.2": 13,
"FDP_RIP": 138,
"FDP_RIP.1": 10,
"FDP_ROL": 17,
"FDP_ROL.1": 6,
"FDP_SDI.2": 11,
"FDP_SDI.2.1": 1,
"FDP_SDI.2.2": 1,
"FDP_UIT": 7,
"FDP_UIT.1": 2
},
"FIA": {
"FIA_ATD": 11,
"FIA_ATD.1": 2,
"FIA_UID": 19,
"FIA_UID.1": 10,
"FIA_UID.2": 1,
"FIA_USB": 10,
"FIA_USB.1": 3
},
"FMT": {
"FMT_MSA": 173,
"FMT_MSA.1": 14,
"FMT_MSA.2": 2,
"FMT_MSA.3": 23,
"FMT_MTD": 28,
"FMT_MTD.1": 2,
"FMT_MTD.3": 1,
"FMT_REV": 10,
"FMT_REV.1": 4,
"FMT_SMF": 62,
"FMT_SMF.1": 26,
"FMT_SMF.1.1": 1,
"FMT_SMR": 57,
"FMT_SMR.1": 42,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPR": {
"FPR_UNO.1": 13,
"FPR_UNO.1.1": 1
},
"FPT": {
"FPT_FLS": 42,
"FPT_FLS.1": 15,
"FPT_FLS.1.1": 2,
"FPT_RCV": 14,
"FPT_RCV.3": 7,
"FPT_TDC.1": 9,
"FPT_TDC.1.1": 1,
"FPT_TDC.1.2": 1,
"FPT_TST.1": 1
},
"FTP": {
"FTP_ITC": 9,
"FTP_ITC.1": 5,
"FTP_TRP.1": 2
}
},
"certification_process": {
"OutOfScope": {
"a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives OE.SCP.RECOVERY and OE.SCP.SUPPORT are": 1,
"out of scope": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"TrustedLabs": {
"Trusted Labs": 3
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {
"misc": {
"TYPE_ACCESS": 5
}
},
"javacard_packages": {
"java": {
"java.lang": 1,
"java.rmi": 2
},
"javacard": {
"javacard.framework": 4,
"javacard.framework.applet": 1,
"javacard.framework.service": 1,
"javacard.security": 2
},
"javacardx": {
"javacardx.biometry": 2,
"javacardx.crypto": 2,
"javacardx.external": 1,
"javacardx.rmi": 1,
"javacardx.security": 1
}
},
"javacard_version": {
"JavaCard": {
"Java Card 2.1.1": 1
}
},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"malfunction": 2,
"physical tampering": 1
},
"SCA": {
"DPA": 2,
"physical probing": 2,
"side channel": 1
}
},
"standard_id": {
"CC": {
"CCMB-2009-07-001": 1,
"CCMB-2009-07-002": 1,
"CCMB-2009-07-003": 1
},
"FIPS": {
"FIPS 140-2": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"pp_metadata": {
"/CreationDate": "D:20100830114115+02\u002700\u0027",
"/Keywords": "",
"/ModDate": "D:20100830114115+02\u002700\u0027",
"/Producer": "Acrobat Distiller 8.1.0 (Windows)",
"pdf_file_size_bytes": 812613,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 131
},
"report_filename": "ANSSI-CC_PP-2010-03fr.pdf",
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"ANSSI-CC-PP 2010/03": 1,
"ANSSI-CC-PP-2010/03": 15
}
},
"cc_claims": {
"A": {
"A.S": 1
},
"OE": {
"OE.SCP": 3
}
},
"cc_protection_profile_id": {
"ANSSI": {
"ANSSI-CC-PP 2010/03": 1,
"ANSSI-CC-PP-2010/03": 15
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_FSP": 1,
"ADV_IMP": 1,
"ADV_TDS": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_PRE": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMS": 1,
"ALC_DEL": 1,
"ALC_DVS": 1,
"ALC_DVS.2": 2,
"ALC_FLR": 1,
"ALC_LCD": 1,
"ALC_TAT": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_ECD": 1,
"ASE_INT": 1,
"ASE_OBJ": 1,
"ASE_REQ": 1,
"ASE_SPD": 1,
"ASE_TSS": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_DPT": 1,
"ATE_FUN": 1,
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.5": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 3": 1,
"EAL 4": 1,
"EAL 5": 1,
"EAL 7": 1,
"EAL4": 2,
"EAL7": 1
},
"ITSEC": {
"ITSEC E6 et": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP.1": 1
},
"FCO": {
"FCO_NRO.2": 1
},
"FCS": {
"FCS_CKM.1": 1,
"FCS_CKM.2": 1,
"FCS_CKM.3": 1,
"FCS_CKM.4": 1,
"FCS_COP.1": 1
},
"FDP": {
"FDP_ACC.2": 1,
"FDP_ACF.1": 1,
"FDP_IFC.1": 1,
"FDP_IFC.2": 1,
"FDP_IFF.1": 1,
"FDP_ITC.2": 1,
"FDP_RIP.1": 1,
"FDP_ROL.1": 1,
"FDP_SDI.2": 1,
"FDP_UIT.1": 1
},
"FIA": {
"FIA_ATD.1": 1,
"FIA_UID.1": 1,
"FIA_UID.2": 1,
"FIA_USB.1": 1
},
"FMT": {
"FMT_MSA.1": 1,
"FMT_MSA.2": 1,
"FMT_MSA.3": 1,
"FMT_MTD.1": 1,
"FMT_MTD.3": 1,
"FMT_REV.1": 1,
"FMT_SMF.1": 1,
"FMT_SMR.1": 1
},
"FPR": {
"FPR_UNO.1": 1
},
"FPT": {
"FPT_FLS.1": 1,
"FPT_RCV.3": 1,
"FPT_TDC.1": 1
},
"FTP": {
"FTP_ITC.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"TrustedLabs": {
"Trusted Labs": 3
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2009-07-001": 1,
"CCMB-2009-07-002": 1,
"CCMB-2009-07-003": 1,
"CCMB-2009-07-004": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20100830113914+02\u002700\u0027",
"/Keywords": "",
"/ModDate": "D:20100830113914+02\u002700\u0027",
"/Producer": "Acrobat Distiller 8.1.0 (Windows)",
"pdf_file_size_bytes": 348344,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"mailto:[email protected]",
"http://www.ssi.gouv.fr/",
"mailto:[email protected]"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 15
}
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "222636cc2afc7c31890659aea33bde973b1a69041e6335cb366779bb84c38c3d",
"txt_hash": "2f61f446f73a7bfafedde5a0678517acda44f5590c9e81f2691f861fbac4ece7"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "e4cf3ae1ba1bb6973cca3192021d6116fe5c58e23e9bdff6f52e98c6cf3e94dc",
"txt_hash": "40523eeaea842f21bff039dec8ed3aaca3a82cab68be6afb3f800c623da927a1"
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"is_collaborative": false,
"maintenances": [
[
"2012-05-29",
"Java Card System Protection profile - Open Configuration, version 3.0",
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/anssi-cc-pp-2010_03-M01en.pdf"
]
],
"name": "Java Card\u2122 System Protection Profile Open Configuration, Version 2.6",
"not_valid_after": null,
"not_valid_before": "2010-06-25",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-cible_PP-2010-03en.pdf",
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC_PP-2010-03fr.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"AVA_VAN.5",
"EAL4+",
"ALC_DVS.2"
]
},
"status": "active",
"version": "2.6"
}
}