This page was not yet optimized for use on mobile devices.
Java Card™ System Protection Profile Open Configuration, Version 2.6
Web information ?
Status: activeCertification date: 2010-06-25
Scheme: 🇫🇷
Category: ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level: EAL4+, AVA_VAN.5, ALC_DVS.2
Certification report ?
Extracted keywords
Security level
EAL 4, EAL4, EAL7, EAL 1, EAL 3, EAL 5, EAL 7, ITSEC E6 etClaims
A.S, OE.SCPSecurity Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_TDS, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_LCD, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSSSecurity Functional Requirements (SFR)
FAU_ARP.1, FCO_NRO.2, FCS_CKM.1, FCS_CKM.2, FCS_CKM.3, FCS_CKM.4, FCS_COP.1, FDP_ACC.2, FDP_ACF.1, FDP_IFC.1, FDP_IFC.2, FDP_IFF.1, FDP_ITC.2, FDP_RIP.1, FDP_ROL.1, FDP_SDI.2, FDP_UIT.1, FIA_ATD.1, FIA_UID.1, FIA_UID.2, FIA_USB.1, FMT_MTD.1, FMT_MTD.3, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_REV.1, FMT_SMF.1, FMT_SMR.1, FPR_UNO.1, FPT_FLS.1, FPT_RCV.3, FPT_TDC.1, FTP_ITC.1Protection profiles
ANSSI-CC-PP-2010/03, ANSSI-CC-PP 2010/03Certificates
ANSSI-CC-PP-2010/03, ANSSI-CC-PP 2010/03Evaluation facilities
Trusted LabsStandards
CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004File metadata
Creation date | D:20100830113914+02'00' |
---|---|
Modification date | D:20100830113914+02'00' |
Pages | 15 |
Producer | Acrobat Distiller 8.1.0 (Windows) |
Profile ?
Extracted keywords
JavaCard versions
Java Card 2.1.1JavaCard API constants
TYPE_ACCESSSecurity level
EAL 4, EAL4, EAL 4 augmented, EAL4 augmentedClaims
D.APP_CODE, D.APP_C_DATA, D.APP_I_DATA, D.PIN, D.API_DATA, D.CRYPTO, D.JCS_CODE, D.JCS_DATA, D.SEC_DATA, D.BIO, O.SID, O.FIREWALL, O.GLOBAL_ARRAYS_CONFID, O.GLOBAL_ARRAYS_INTEG, O.NATIVE, O.OPERATE, O.REALLOCATION, O.RESOURCES, O.ALARM, O.CIPHER, O.KEY-MNGT, O.PIN-MNGT, O.REMOTE, O.TRANSACTION, O.OBJ-DELETION, O.DELETION, O.LOAD, O.INSTALL, O.KEY-, O.APPLET, O.CODE_PKG, O.JAVAOBJECT, O.REMOTE_MTHD, O.REMOTE_OBJ, O.RMI_SERVICE, O.ROR, O.PIN-, O.BIO-MNGT, O.EXT-MEM, O.EXT_MEM_INSTANCE, T.CONFID-APPLI-DATA, T.CONFID-JCS-CODE, T.CONFID-JCS-DATA, T.INTEG-APPLI-CODE, T.INTEG-APPLI-DATA, T.INTEG-JCS-CODE, T.INTEG-JCS-DATA, T.SID, T.EXE-CODE, T.EXE-CODE-REMOTE, T.NATIVE, T.RESOURCES, T.DELETION, T.INSTALL, T.OBJ-DELETION, T.PHYSICAL, T.CONFID-, T.CONFID-JCS-, T.INTEG-APPLI-, T.INTEG-JCS-, T.EXE-CODE-, T.OBJ-, T.INTEG-, T.EXE-, A.S, A.APPLET, A.DELETION, A.VERIFICATION, A.NO-INSTALL, A.NO-DELETION, R.JAVA, OP.ARRAY_ACCESS, OP.CREATE, OP.DELETE_APPLET, OP.DELETE_PCKG, OP.DELETE_PCKG_APPLET, OP.GET_ROR, OP.INSTANCE_FIELD, OP.INVK_VIRTUAL, OP.INVK_INTERFACE, OP.INVOKE, OP.JAVA, OP.THROW, OP.TYPE_ACCESS, OP.PUT, OP.RET_RORD, OP.CREATE_EXT_MEM_INSTANCE, OP.READ_EXT_MEM, OP.WRITE_EXT_MEM, OE.APPLET, OE.CARD-MANAGEMENT, OE.SCP, OE.VERIFICATION, OE.CARD-, OE.NO-DELETION, OE.NO-INSTALL, OSP.VERIFICATIONSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_TDS.1, ADV_FSP.4, ADV_TDS.3, ADV_IMP.1, ADV_FSP.2, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_TAT.1, ALC_CMC.4, ALC_CMS.1, ALC_DVS.1, ALC_LCD.1, ALC_CMS.4, ALC_DEL.1, ATE_COV.2, ATE_FUN.1, ATE_COV.1, ATE_DPT.1, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1, ASE_REQ.2, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_ARP.1, FAU_ARP.1.1, FAU_SAA.1, FCO_NRO, FCO_NRO.2, FCS_CKM.1, FCS_CKM.1.1, FCS_CKM.2, FCS_CKM.2.1, FCS_CKM.3, FCS_CKM.3.1, FCS_CKM.4, FCS_CKM.4.1, FCS_COP.1, FCS_COP.1.1, FDP_ACC, FDP_ACC.2, FDP_ACF, FDP_ACF.1, FDP_IFC, FDP_IFC.1, FDP_IFF, FDP_IFF.1, FDP_RIP, FDP_RIP.1, FDP_ROL.1, FDP_ROL, FDP_SDI.2, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ITC, FDP_ITC.2, FDP_IFC.2, FDP_UIT, FDP_UIT.1, FDP_ACC.1, FDP_ITC.1, FIA_ATD, FIA_ATD.1, FIA_UID, FIA_UID.2, FIA_USB, FIA_USB.1, FIA_UID.1, FMT_MSA, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD, FMT_MTD.1, FMT_MTD.3, FMT_SMR, FMT_SMF, FMT_REV.1, FMT_REV, FPR_UNO.1, FPR_UNO.1.1, FPT_FLS.1, FPT_FLS.1.1, FPT_TDC.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_FLS, FPT_RCV, FPT_RCV.3, FPT_TST.1, FTP_ITC, FTP_ITC.1, FTP_TRP.1Evaluation facilities
Trusted LabsSide-channel analysis
physical probing, side channel, DPA, physical tampering, malfunctionCertification process
out of scope, a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives OE.SCP.RECOVERY and OE.SCP.SUPPORT areStandards
FIPS 140-2, CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003File metadata
Creation date | D:20100830114115+02'00' |
---|---|
Modification date | D:20100830114115+02'00' |
Pages | 131 |
Producer | Acrobat Distiller 8.1.0 (Windows) |
References ?
- Carte M-NFC2.0.3_TUR sur composant ST33F1ME (T1019850 / Release A) archived
- Carte VITALE 2 - Application VITALE : Composant AT90SC24036RCV masqué par le logiciel SESAM VITALE v1.0.1 avec correctif version 1 archived
- IDeal Citiz v2.1 Open platform archived
- IDeal Citiz v2.1 STC Open Platform archived
- IDeal Citiz v2.16-i on M7892 B11 - Java Card Open Platform active
- Infineon SECORA™ ID S v1.1 (SLJ52GxxyyyzS) active
- J3E081_M64, J3E081_M66, J2E081_M64, J3E041_M66, J3E016_M66, J3E016_M64, J3E041_M64 Secure Smart Card Controller Revision 3 archived
- J3E081_M64_DF, J3E081_M66_DF, J3E041_M66_DF, J3E016_M66_DF, J3E041_M64_DF and J3E016_M64_DF Secure Smart Card Controller Revision 3 archived
- J3E145_M64, J3E120_M65, J3E082_M65, J2E145_M64, J2E120_M65, and J2E082_M65 Secure Smart Card Controller Revision 3 archived
- JavaCard platform for smart card ID-One Cosmo V7.1-s on component ST23YL80C (Standard) archived
- LinqUs USIM 128k platform on SC33F640E archived
- NFC FLYBUY PLATINUM V2 sur composant ST33F1ME archived
- NXP J3D081_M59, J2D081_M59, J3D081_M61, J2D081_M61 Secure Smart Card Controller of JCOP V2.4.2 R2 archived
- NXP J3D081_M59_DF and J3D081_M61_DF Secure Smart Card Controller Revision 2 of JCOP V2.4.2 R2 archived
- NXP J3D145_M59, J2D145_M59, J3D120_M60, J3D082_M60, J2D120_M60, J2D082_M60 Secure Smart Card Controller of JCOP V2.4.2 R2 archived
- NXP JCOP 3 SECID P60 (OSA) PL2/5 archived
- NXP JCOP 4.0 on P73N2M0 archived
- Plateforme ID-One Cosmo V9.1 masquée sur le composant IFX SLC32 active
- Plateforme ID-One Cosmo V9.2 masquée sur le composant IFX SLC52 active
- Plateforme Java Card MAV31S en configuration ouverte de la carte à puce Optelio Contactless R7S masquée sur le composant P60D144JVA (version du patch: 1.4) archived
- Plateforme Java Card MultiApp Essential v1.0, en configuration ouverte, sur le composant Infineon M7794 A12 ou G12 archived
- Plateforme Java Card de la carte à puce MultiApp ID V2.1 masquée sur composant P5CC081V1A archived
- Plateforme Java Card en configuration ouverte de la carte à puce MultiApp ID V2.1 masquée sur composant P5CC145V0A archived
- Plateforme Java Card en configuration ouverte de la carte à puce MultiApp v3.1 masquée sur le composant P60D144PVA (version du patch: 1.3) archived
- Plateforme Java Card en configuration ouverte de la carte � puce MultiApp V2 masqu�e sur composants de la famille SLE66 archived
- Plateforme JavaCard MultiApp V4.0 en configuration ouverte basée sur l’Operating System JLEP3 masquée sur le composant SLE78CLFX4000PH (M7892 G12) active
- ProxSIM Taurus, version 1.0 archived
- ProxSIM Taurus, version 1.02 archived
- TimeCOS Java Card Platform and EasyCard version 1.1 archived
- Ucard UBJ31-G11 V1.1 archived
- dragonFly version 3.2 sur composantSM33F1ME archived
Updates ?
-
04.02.2025 The protection profile was first processed.
New Protection Profile
A new Protection Profile with the name Java Card™ System Protection Profile Open Configuration, Version 2.6 was processed.
Raw data
{
"_id": "85bef5b6f16c4d33",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "85bef5b6f16c4d33",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "ANSSI-CC-cible_PP-2010-03en.pdf",
"pp_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.APPLET": 6,
"A.DELETION": 6,
"A.NO-DELETION": 1,
"A.NO-INSTALL": 1,
"A.S": 2,
"A.VERIFICATION": 5
},
"D": {
"D.API_DATA": 5,
"D.APP_CODE": 9,
"D.APP_C_DATA": 5,
"D.APP_I_DATA": 7,
"D.BIO": 3,
"D.CRYPTO": 6,
"D.JCS_CODE": 5,
"D.JCS_DATA": 7,
"D.PIN": 7,
"D.SEC_DATA": 9
},
"O": {
"O.ALARM": 23,
"O.APPLET": 21,
"O.BIO-MNGT": 6,
"O.CIPHER": 18,
"O.CODE_PKG": 14,
"O.DELETION": 16,
"O.EXT-MEM": 9,
"O.EXT_MEM_INSTANCE": 10,
"O.FIREWALL": 58,
"O.GLOBAL_ARRAYS_CONFID": 20,
"O.GLOBAL_ARRAYS_INTEG": 12,
"O.INSTALL": 17,
"O.JAVAOBJECT": 42,
"O.KEY-": 10,
"O.KEY-MNGT": 16,
"O.LOAD": 18,
"O.NATIVE": 15,
"O.OBJ-DELETION": 10,
"O.OPERATE": 37,
"O.PIN-": 1,
"O.PIN-MNGT": 23,
"O.REALLOCATION": 18,
"O.REMOTE": 17,
"O.REMOTE_MTHD": 6,
"O.REMOTE_OBJ": 10,
"O.RESOURCES": 30,
"O.RMI_SERVICE": 12,
"O.ROR": 5,
"O.SID": 43,
"O.TRANSACTION": 20
},
"OE": {
"OE.APPLET": 9,
"OE.CARD-": 4,
"OE.CARD-MANAGEMENT": 26,
"OE.NO-DELETION": 1,
"OE.NO-INSTALL": 1,
"OE.SCP": 38,
"OE.VERIFICATION": 35
},
"OP": {
"OP.ARRAY_ACCESS": 4,
"OP.CREATE": 7,
"OP.CREATE_EXT_MEM_INSTANCE": 3,
"OP.DELETE_APPLET": 4,
"OP.DELETE_PCKG": 3,
"OP.DELETE_PCKG_APPLET": 3,
"OP.GET_ROR": 3,
"OP.INSTANCE_FIELD": 4,
"OP.INVK_INTERFACE": 8,
"OP.INVK_VIRTUAL": 6,
"OP.INVOKE": 3,
"OP.JAVA": 5,
"OP.PUT": 6,
"OP.READ_EXT_MEM": 3,
"OP.RET_RORD": 3,
"OP.THROW": 5,
"OP.TYPE_ACCESS": 5,
"OP.WRITE_EXT_MEM": 3
},
"OSP": {
"OSP.VERIFICATION": 4
},
"R": {
"R.JAVA": 16
},
"T": {
"T.CONFID-": 1,
"T.CONFID-APPLI-DATA": 20,
"T.CONFID-JCS-": 10,
"T.CONFID-JCS-CODE": 6,
"T.CONFID-JCS-DATA": 7,
"T.DELETION": 7,
"T.EXE-": 1,
"T.EXE-CODE": 13,
"T.EXE-CODE-": 1,
"T.EXE-CODE-REMOTE": 5,
"T.INSTALL": 9,
"T.INTEG-": 10,
"T.INTEG-APPLI-": 11,
"T.INTEG-APPLI-CODE": 11,
"T.INTEG-APPLI-DATA": 20,
"T.INTEG-JCS-": 2,
"T.INTEG-JCS-CODE": 7,
"T.INTEG-JCS-DATA": 7,
"T.NATIVE": 8,
"T.OBJ-": 1,
"T.OBJ-DELETION": 5,
"T.PHYSICAL": 6,
"T.RESOURCES": 10,
"T.SID": 22
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 6,
"ADV_FSP.1": 4,
"ADV_FSP.2": 2,
"ADV_FSP.4": 9,
"ADV_IMP.1": 5,
"ADV_TDS.1": 2,
"ADV_TDS.2": 1,
"ADV_TDS.3": 9
},
"AGD": {
"AGD_OPE.1": 8,
"AGD_PRE.1": 6
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.1": 1,
"ALC_CMS.4": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 2,
"ALC_DVS.2": 8,
"ALC_LCD.1": 3,
"ALC_TAT.1": 3
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 4,
"ASE_INT.1": 5,
"ASE_OBJ.2": 3,
"ASE_REQ.1": 2,
"ASE_REQ.2": 3,
"ASE_SPD.1": 2,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.1": 2,
"ATE_COV.2": 3,
"ATE_DPT.1": 2,
"ATE_FUN.1": 6
},
"AVA": {
"AVA_VAN.5": 8
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 1,
"EAL 4 augmented": 1,
"EAL4": 7,
"EAL4 augmented": 2
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP.1": 19,
"FAU_ARP.1.1": 1,
"FAU_SAA.1": 3
},
"FCO": {
"FCO_NRO": 7,
"FCO_NRO.2": 5
},
"FCS": {
"FCS_CKM.1": 17,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 10,
"FCS_CKM.2.1": 1,
"FCS_CKM.3": 8,
"FCS_CKM.3.1": 1,
"FCS_CKM.4": 16,
"FCS_CKM.4.1": 1,
"FCS_COP.1": 9,
"FCS_COP.1.1": 1
},
"FDP": {
"FDP_ACC": 49,
"FDP_ACC.1": 16,
"FDP_ACC.2": 7,
"FDP_ACF": 45,
"FDP_ACF.1": 24,
"FDP_IFC": 35,
"FDP_IFC.1": 18,
"FDP_IFC.2": 2,
"FDP_IFF": 29,
"FDP_IFF.1": 22,
"FDP_ITC": 15,
"FDP_ITC.1": 4,
"FDP_ITC.2": 13,
"FDP_RIP": 138,
"FDP_RIP.1": 10,
"FDP_ROL": 17,
"FDP_ROL.1": 6,
"FDP_SDI.2": 11,
"FDP_SDI.2.1": 1,
"FDP_SDI.2.2": 1,
"FDP_UIT": 7,
"FDP_UIT.1": 2
},
"FIA": {
"FIA_ATD": 11,
"FIA_ATD.1": 2,
"FIA_UID": 19,
"FIA_UID.1": 10,
"FIA_UID.2": 1,
"FIA_USB": 10,
"FIA_USB.1": 3
},
"FMT": {
"FMT_MSA": 173,
"FMT_MSA.1": 14,
"FMT_MSA.2": 2,
"FMT_MSA.3": 23,
"FMT_MTD": 28,
"FMT_MTD.1": 2,
"FMT_MTD.3": 1,
"FMT_REV": 10,
"FMT_REV.1": 4,
"FMT_SMF": 62,
"FMT_SMF.1": 26,
"FMT_SMF.1.1": 1,
"FMT_SMR": 57,
"FMT_SMR.1": 42,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPR": {
"FPR_UNO.1": 13,
"FPR_UNO.1.1": 1
},
"FPT": {
"FPT_FLS": 42,
"FPT_FLS.1": 15,
"FPT_FLS.1.1": 2,
"FPT_RCV": 14,
"FPT_RCV.3": 7,
"FPT_TDC.1": 9,
"FPT_TDC.1.1": 1,
"FPT_TDC.1.2": 1,
"FPT_TST.1": 1
},
"FTP": {
"FTP_ITC": 9,
"FTP_ITC.1": 5,
"FTP_TRP.1": 2
}
},
"certification_process": {
"OutOfScope": {
"a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives OE.SCP.RECOVERY and OE.SCP.SUPPORT are": 1,
"out of scope": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"TrustedLabs": {
"Trusted Labs": 3
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {
"misc": {
"TYPE_ACCESS": 5
}
},
"javacard_packages": {
"java": {
"java.lang": 1,
"java.rmi": 2
},
"javacard": {
"javacard.framework": 4,
"javacard.framework.applet": 1,
"javacard.framework.service": 1,
"javacard.security": 2
},
"javacardx": {
"javacardx.biometry": 2,
"javacardx.crypto": 2,
"javacardx.external": 1,
"javacardx.rmi": 1,
"javacardx.security": 1
}
},
"javacard_version": {
"JavaCard": {
"Java Card 2.1.1": 1
}
},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"malfunction": 2,
"physical tampering": 1
},
"SCA": {
"DPA": 2,
"physical probing": 2,
"side channel": 1
}
},
"standard_id": {
"CC": {
"CCMB-2009-07-001": 1,
"CCMB-2009-07-002": 1,
"CCMB-2009-07-003": 1
},
"FIPS": {
"FIPS 140-2": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"pp_metadata": {
"/CreationDate": "D:20100830114115+02\u002700\u0027",
"/Keywords": "",
"/ModDate": "D:20100830114115+02\u002700\u0027",
"/Producer": "Acrobat Distiller 8.1.0 (Windows)",
"pdf_file_size_bytes": 812613,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 131
},
"report_filename": "ANSSI-CC_PP-2010-03fr.pdf",
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"ANSSI-CC-PP 2010/03": 1,
"ANSSI-CC-PP-2010/03": 15
}
},
"cc_claims": {
"A": {
"A.S": 1
},
"OE": {
"OE.SCP": 3
}
},
"cc_protection_profile_id": {
"ANSSI": {
"ANSSI-CC-PP 2010/03": 1,
"ANSSI-CC-PP-2010/03": 15
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_FSP": 1,
"ADV_IMP": 1,
"ADV_TDS": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_PRE": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMS": 1,
"ALC_DEL": 1,
"ALC_DVS": 1,
"ALC_DVS.2": 2,
"ALC_FLR": 1,
"ALC_LCD": 1,
"ALC_TAT": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_ECD": 1,
"ASE_INT": 1,
"ASE_OBJ": 1,
"ASE_REQ": 1,
"ASE_SPD": 1,
"ASE_TSS": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_DPT": 1,
"ATE_FUN": 1,
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.5": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 3": 1,
"EAL 4": 1,
"EAL 5": 1,
"EAL 7": 1,
"EAL4": 2,
"EAL7": 1
},
"ITSEC": {
"ITSEC E6 et": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP.1": 1
},
"FCO": {
"FCO_NRO.2": 1
},
"FCS": {
"FCS_CKM.1": 1,
"FCS_CKM.2": 1,
"FCS_CKM.3": 1,
"FCS_CKM.4": 1,
"FCS_COP.1": 1
},
"FDP": {
"FDP_ACC.2": 1,
"FDP_ACF.1": 1,
"FDP_IFC.1": 1,
"FDP_IFC.2": 1,
"FDP_IFF.1": 1,
"FDP_ITC.2": 1,
"FDP_RIP.1": 1,
"FDP_ROL.1": 1,
"FDP_SDI.2": 1,
"FDP_UIT.1": 1
},
"FIA": {
"FIA_ATD.1": 1,
"FIA_UID.1": 1,
"FIA_UID.2": 1,
"FIA_USB.1": 1
},
"FMT": {
"FMT_MSA.1": 1,
"FMT_MSA.2": 1,
"FMT_MSA.3": 1,
"FMT_MTD.1": 1,
"FMT_MTD.3": 1,
"FMT_REV.1": 1,
"FMT_SMF.1": 1,
"FMT_SMR.1": 1
},
"FPR": {
"FPR_UNO.1": 1
},
"FPT": {
"FPT_FLS.1": 1,
"FPT_RCV.3": 1,
"FPT_TDC.1": 1
},
"FTP": {
"FTP_ITC.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"TrustedLabs": {
"Trusted Labs": 3
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2009-07-001": 1,
"CCMB-2009-07-002": 1,
"CCMB-2009-07-003": 1,
"CCMB-2009-07-004": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20100830113914+02\u002700\u0027",
"/Keywords": "",
"/ModDate": "D:20100830113914+02\u002700\u0027",
"/Producer": "Acrobat Distiller 8.1.0 (Windows)",
"pdf_file_size_bytes": 348344,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.ssi.gouv.fr/",
"mailto:[email protected]",
"mailto:[email protected]"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 15
}
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "222636cc2afc7c31890659aea33bde973b1a69041e6335cb366779bb84c38c3d",
"txt_hash": "2f61f446f73a7bfafedde5a0678517acda44f5590c9e81f2691f861fbac4ece7"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "e4cf3ae1ba1bb6973cca3192021d6116fe5c58e23e9bdff6f52e98c6cf3e94dc",
"txt_hash": "40523eeaea842f21bff039dec8ed3aaca3a82cab68be6afb3f800c623da927a1"
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"is_collaborative": false,
"maintenances": [
[
"2012-05-29",
"Java Card System Protection profile - Open Configuration, version 3.0",
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/anssi-cc-pp-2010_03-M01en.pdf"
]
],
"name": "Java Card\u2122 System Protection Profile Open Configuration, Version 2.6",
"not_valid_after": null,
"not_valid_before": "2010-06-25",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-cible_PP-2010-03en.pdf",
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC_PP-2010-03fr.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"ALC_DVS.2",
"AVA_VAN.5",
"EAL4+"
]
},
"status": "active",
"version": "2.6"
}
}