This page was not yet optimized for use on mobile devices.
JavaCard System Standard 2.2 Configuration Protection Profile, Version 1.0b
Web information ?
Status: activeCertification date: 2003-09-30
Scheme: 🇫🇷
Category: ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level: EAL4+, ADV_IMP.2, AVA_VLA.3
Certification report ?
Profile ?
Extracted keywords
JavaCard versions
Java Card 2.1.1, Java Card 2.2, Java Card 2.1.2JavaCard API constants
TYPE_ACCESSCPLC
IC. VersionSecurity level
EAL 4, EAL4, EAL 4 augmented, EAL4 augmentedClaims
D.APP_CODE, D.APP_C_DATA, D.APP_I_DATA, D.PIN, D.JCS_CODE, D.JCS_DATA, D.SEC_DATA, D.API_DATA, D.CRYPTO, O.TODO, O.SID, O.OPERATE, O.RESOURCES, O.FIREWALL, O.NATIVE, O.REALLOCATION, O.SHRD_VAR_CONFID, O.SHRD_VAR_INTEG, O.ALARM, O.TRANSACTION, O.CIPHER, O.PIN-MNGT, O.KEY-MNGT, O.INSTALL, O.LOAD, O.DELETION, O.OBJ-DELETION, O.REMOTE, O.VERIFICATION, O.JAVAOBJECT, O.APPLET, O.CODE_PKG, O.CODE_PCKG, O.REMOTE_OBJ, O.REMOTE_MTHD, O.ROR, O.RMI_SERVICE, O.REMOTE_OBJECT, O.PIN-, T.PHYSICAL, T.CONFID-JCS-CODE, T.CONFID-APPLI-DATA, T.CONFID-JCS-DATA, T.INTEG-APPLI-CODE, T.INTEG-JCS-CODE, T.INTEG-APPLI-DATA, T.INTEG-JCS-DATA, T.SID, T.EXE-CODE, T.NATIVE, T.RESOURCES, T.INSTALL, T.EXE-CODE-REMOTE, T.DELETION, T.OBJ-DELETION, T.CONFID-APPLI-, T.CONFID-JCS-, T.INTEG-, A.NATIVE, A.NO-DELETION, A.NO-INSTALL, A.VERIFICATION, A.APPLET, A.DELETION, A.NO-, R.JAVA, OP.ARRAY_ACCESS, OP.INSTANCE_FIELD, OP.INVK_VIRTUAL, OP.INVK_INTERFACE, OP.THROW, OP.TYPE_ACCESS, OP.JAVA, OP.CREATE, OP.PUT, OP.BYTECODE, OP.DELETE_APPLET, OP.DELETE_PCKG, OP.DELETE_PCKG_APPLET, OP.GET_ROR, OP.INVOKE, OP.RET_RORD, OP.SEND, OP.RECEIVE, OE.NATIVE, OE.SCP, OE.CARD-MANAGEMENT, OE.NO-DELETION, OE.NO-INSTALL, OE.VERIFICATION, OE.APPLET, OE.NO-, OSP.VERIFICATIONSecurity Assurance Requirements (SAR)
ACM_AUT.1, ACM_CAP.4, ACM_SCP.2, ADO_DEL.2, ADO_IGS.1, ADV_IMP.2, ADV_FSP, ADV_HLD, ADV_FSP.2, ADV_HLD.2, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, ADV_IMP.1, ADV_FSP.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VLA.3, AVA_MSU.2, AVA_SOF.1, AVA_VLA.2, AVA_VLA.4Security Functional Requirements (SFR)
FAU_ARP.1, FAU_ARP.1.1, FAU_ARP, FAU_SAA.1, FCO_NRO.2, FCO_NRO.2.1, FCO_NRO.2.2, FCO_NRO.2.3, FCO_NRO, FCS_CKM.1, FCS_CKM.1.1, FCS_CKM.2, FCS_CKM.2.1, FCS_CKM.3, FCS_CKM.3.1, FCS_CKM.4, FCS_CKM.4.1, FCS_COP.1, FCS_COP.1.1, FDP_ACF.1, FDP_ACC, FDP_ACC.2.1, FDP_ACC.2, FDP_ACC.2.2, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1, FDP_IFC.1.1, FDP_IFF.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_IFF.1.6, FDP_RIP.1, FDP_RIP.1.1, FDP_ROL.1, FDP_ROL.1.1, FDP_ROL.1.2, FDP_SDI.2, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ITC.2, FDP_ITC.2.1, FDP_ITC.2.5, FDP_IFC.2, FDP_IFC.2.1, FDP_IFC.2.2, FDP_IFF.2, FDP_IFF.2.1, FDP_IFF.2.2, FDP_IFF.2.3, FDP_IFF.2.4, FDP_IFF.2.5, FDP_IFF.2.6, FDP_IFF.2.7, FDP_UIT.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_ACC.1, FDP_ACC.1.1, FDP_ACF, FDP_IFC, FDP_IFF, FDP_ITC.1, FDP_ROL, FDP_UIT, FDP_RIP, FIA_ATD.1, FIA_ATD.1.1, FIA_UID.2, FIA_USB.1, FIA_USB.1.1, FIA_UID.1, FIA_ATD, FIA_UID, FMT_MSA.3, FMT_SMR.1, FMT_MSA.1, FMT_MSA.1.1, FMT_MSA.2, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA, FMT_MSA.3.2, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD.1, FMT_MTD.1.1, FMT_MTD.3, FMT_MTD.3.1, FMT_SMR, FMT_REV.1, FMT_REV.1.1, FMT_REV.1.2, FMT_MTD, FMT_REV, FPR_UNO.1, FPR_UNO.1.1, FPT_SEP.1, FPT_SEP.1.1, FPT_SEP.1.2, FPT_RCV.3, FPT_RVM.1, FPT_RVM.1.1, FPT_TDC.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_FLS.1, FPT_FLS.1.1, FPT_TST.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_AMT, FPT_AMT.1.1, FPT_AMT.1, FPT_FLS, FPT_PHP, FPT_PHP.3, FPT_SEP, FPT_RVM, FPT_RCV, FPT_RCV.4, FRU_RSA.1, FRU_RSA.1.1, FRU_FLT, FRU_FLT.1, FRU_RSA, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1, FTP_ITCProtection profiles
BSI-PP-000, BSI-PP-0002Side-channel analysis
physical probing, physical tampering, malfunctionCertification process
out of scope, a timeout policy that prevents them from being blocked should a card fail to answer. That point is out of scope of this PP, though. The objective OE.CARD-MANAGEMENT supports OE.VERIFICATION and contributes to, a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this PP, though. MODIFICATIONS OF THE SET OF APPLICATIONS T.INSTALL The attacker fraudulentlyStandards
ISO/IEC 15408, CCIMB-99-031, CCIMB-99-032, CCIMB-99-033File metadata
Title | Java Card System Protection Profile Collection |
---|---|
Author | C. Loiseaux, S. Lacas, E.Gimenez, G.Betarte |
Creation date | D:20030828102002+02'00' |
Modification date | D:20030828102118+03'00' |
Pages | 189 |
Creator | Acrobat PDFMaker 5.0 pour Word |
Producer | Acrobat Distiller 5.0.5 (Windows) |
References ?
- Carte à puce ID-ONE Cosmo V7.0.1-n, avec correctif 077121, masquée sur composants NXP P5CD145 V0A (Large Dual), P5CC145 V0A (Large), P5CD128 V0A (Large Dual) et P5CC128 V0A (Large) archived
- ID-ONE Cosmo V7.0.1-n Smartcard with patch 077121 on NXP P5CD081 V1A (Standard Dual), P5CC081 V1A (Standard) and P5CD041 V1A (Basic Dual) components archived
- ID-One Cosmo V7.0-n SmartCard in configuration Large, Standard, Basic (dual or contact modes) or Entry (mode dual) on NXP components archived
- ID-One Cosmo v8.2 embedding VITALE application (Version 2.0.83) archived
- KONA26CC v1.1 archived
- Oberthur Carte à puce ID-One Cosmo V7.0-a en configuration Standard et Basic archived
- Oberthur Carte à puce ID-One Cosmo V7.0-a en configuration USB archived
- Oberthur Carte à puce ID-One Cosmo V7.0-n en configuration Basic masquée sur composant NXP P5CC037 V0A archived
- Oberthur Carte à puce ID-One Cosmo V7.0-n en configuration Large, Standard, Basic (modes dual ou contact) ou Entry (mode dual) masquée sur composant NXP archived
- Oberthur ID-ONE Cosmo V7.0.1-a masked on AT90SC 28872RCU Rev G & AT90SC 28848RCU Rev G archived
- Oberthur ID-ONE Cosmo V7.0.1-n Smartcard masked on NXP P5CD081 V1A (Standard Dual), P5CC081 V1A (Standard) and P5CD041 V1A (Basic Dual) components archived
Updates ?
-
04.02.2025 The protection profile was first processed.
New Protection Profile
A new Protection Profile with the name JavaCard System Standard 2.2 Configuration Protection Profile, Version 1.0b was processed.
Raw data
{
"_id": "8ab4bd8434014a92",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "8ab4bd8434014a92",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "jcsppc.pdf",
"pp_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.APPLET": 9,
"A.DELETION": 4,
"A.NATIVE": 21,
"A.NO-": 1,
"A.NO-DELETION": 5,
"A.NO-INSTALL": 5,
"A.VERIFICATION": 11
},
"D": {
"D.API_DATA": 4,
"D.APP_CODE": 9,
"D.APP_C_DATA": 4,
"D.APP_I_DATA": 6,
"D.CRYPTO": 5,
"D.JCS_CODE": 4,
"D.JCS_DATA": 6,
"D.PIN": 5,
"D.SEC_DATA": 8
},
"O": {
"O.ALARM": 18,
"O.APPLET": 23,
"O.CIPHER": 23,
"O.CODE_PCKG": 8,
"O.CODE_PKG": 6,
"O.DELETION": 11,
"O.FIREWALL": 40,
"O.INSTALL": 25,
"O.JAVAOBJECT": 40,
"O.KEY-MNGT": 15,
"O.LOAD": 14,
"O.NATIVE": 23,
"O.OBJ-DELETION": 11,
"O.OPERATE": 33,
"O.PIN-": 4,
"O.PIN-MNGT": 15,
"O.REALLOCATION": 19,
"O.REMOTE": 9,
"O.REMOTE_MTHD": 6,
"O.REMOTE_OBJ": 8,
"O.REMOTE_OBJECT": 1,
"O.RESOURCES": 21,
"O.RMI_SERVICE": 11,
"O.ROR": 5,
"O.SHRD_VAR_CONFID": 17,
"O.SHRD_VAR_INTEG": 21,
"O.SID": 30,
"O.TODO": 1,
"O.TRANSACTION": 15,
"O.VERIFICATION": 9
},
"OE": {
"OE.APPLET": 14,
"OE.CARD-MANAGEMENT": 16,
"OE.NATIVE": 12,
"OE.NO-": 1,
"OE.NO-DELETION": 4,
"OE.NO-INSTALL": 4,
"OE.SCP": 62,
"OE.VERIFICATION": 31
},
"OP": {
"OP.ARRAY_ACCESS": 3,
"OP.BYTECODE": 1,
"OP.CREATE": 6,
"OP.DELETE_APPLET": 3,
"OP.DELETE_PCKG": 2,
"OP.DELETE_PCKG_APPLET": 2,
"OP.GET_ROR": 2,
"OP.INSTANCE_FIELD": 1,
"OP.INVK_INTERFACE": 5,
"OP.INVK_VIRTUAL": 3,
"OP.INVOKE": 2,
"OP.JAVA": 4,
"OP.PUT": 5,
"OP.RECEIVE": 1,
"OP.RET_RORD": 2,
"OP.SEND": 1,
"OP.THROW": 3,
"OP.TYPE_ACCESS": 3
},
"OSP": {
"OSP.VERIFICATION": 5
},
"R": {
"R.JAVA": 21
},
"T": {
"T.CONFID-APPLI-": 1,
"T.CONFID-APPLI-DATA": 9,
"T.CONFID-JCS-": 1,
"T.CONFID-JCS-CODE": 9,
"T.CONFID-JCS-DATA": 10,
"T.DELETION": 9,
"T.EXE-CODE": 21,
"T.EXE-CODE-REMOTE": 7,
"T.INSTALL": 14,
"T.INTEG-": 1,
"T.INTEG-APPLI-CODE": 15,
"T.INTEG-APPLI-DATA": 20,
"T.INTEG-JCS-CODE": 10,
"T.INTEG-JCS-DATA": 6,
"T.NATIVE": 10,
"T.OBJ-DELETION": 7,
"T.PHYSICAL": 10,
"T.RESOURCES": 10,
"T.SID": 24
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-000": 1,
"BSI-PP-0002": 1
}
},
"cc_sar": {
"ACM": {
"ACM_AUT.1": 1,
"ACM_CAP.4": 1,
"ACM_SCP.2": 1
},
"ADO": {
"ADO_DEL.2": 1,
"ADO_IGS.1": 1
},
"ADV": {
"ADV_FSP": 1,
"ADV_FSP.1": 4,
"ADV_FSP.2": 1,
"ADV_HLD": 1,
"ADV_HLD.2": 5,
"ADV_IMP.1": 5,
"ADV_IMP.2": 19,
"ADV_LLD.1": 9,
"ADV_RCR.1": 5,
"ADV_SPM.1": 37
},
"AGD": {
"AGD_ADM.1": 12,
"AGD_USR.1": 5
},
"ALC": {
"ALC_DVS.1": 1,
"ALC_LCD.1": 1,
"ALC_TAT.1": 5
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_MSU.2": 1,
"AVA_SOF.1": 1,
"AVA_VLA.2": 6,
"AVA_VLA.3": 23,
"AVA_VLA.4": 8
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 3,
"EAL 4 augmented": 2,
"EAL4": 27,
"EAL4 augmented": 8
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP": 13,
"FAU_ARP.1": 22,
"FAU_ARP.1.1": 1,
"FAU_SAA.1": 16
},
"FCO": {
"FCO_NRO": 2,
"FCO_NRO.2": 9,
"FCO_NRO.2.1": 1,
"FCO_NRO.2.2": 1,
"FCO_NRO.2.3": 1
},
"FCS": {
"FCS_CKM.1": 46,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 18,
"FCS_CKM.2.1": 1,
"FCS_CKM.3": 14,
"FCS_CKM.3.1": 1,
"FCS_CKM.4": 43,
"FCS_CKM.4.1": 1,
"FCS_COP.1": 18,
"FCS_COP.1.1": 1
},
"FDP": {
"FDP_ACC": 60,
"FDP_ACC.1": 47,
"FDP_ACC.1.1": 1,
"FDP_ACC.2": 26,
"FDP_ACC.2.1": 1,
"FDP_ACC.2.2": 1,
"FDP_ACF": 36,
"FDP_ACF.1": 50,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_IFC": 62,
"FDP_IFC.1": 68,
"FDP_IFC.1.1": 1,
"FDP_IFC.2": 9,
"FDP_IFC.2.1": 1,
"FDP_IFC.2.2": 1,
"FDP_IFF": 35,
"FDP_IFF.1": 47,
"FDP_IFF.1.1": 1,
"FDP_IFF.1.2": 1,
"FDP_IFF.1.3": 1,
"FDP_IFF.1.4": 1,
"FDP_IFF.1.5": 1,
"FDP_IFF.1.6": 1,
"FDP_IFF.2": 8,
"FDP_IFF.2.1": 1,
"FDP_IFF.2.2": 1,
"FDP_IFF.2.3": 1,
"FDP_IFF.2.4": 1,
"FDP_IFF.2.5": 1,
"FDP_IFF.2.6": 1,
"FDP_IFF.2.7": 1,
"FDP_ITC.1": 16,
"FDP_ITC.2": 26,
"FDP_ITC.2.1": 1,
"FDP_ITC.2.5": 1,
"FDP_RIP": 13,
"FDP_RIP.1": 62,
"FDP_RIP.1.1": 1,
"FDP_ROL": 5,
"FDP_ROL.1": 24,
"FDP_ROL.1.1": 1,
"FDP_ROL.1.2": 1,
"FDP_SDI.2": 18,
"FDP_SDI.2.1": 1,
"FDP_SDI.2.2": 1,
"FDP_UIT": 3,
"FDP_UIT.1": 5,
"FDP_UIT.1.1": 1,
"FDP_UIT.1.2": 1
},
"FIA": {
"FIA_ATD": 9,
"FIA_ATD.1": 19,
"FIA_ATD.1.1": 1,
"FIA_UID": 29,
"FIA_UID.1": 44,
"FIA_UID.2": 6,
"FIA_USB.1": 19,
"FIA_USB.1.1": 1
},
"FMT": {
"FMT_MSA": 132,
"FMT_MSA.1": 58,
"FMT_MSA.1.1": 1,
"FMT_MSA.2": 28,
"FMT_MSA.2.1": 1,
"FMT_MSA.3": 52,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD": 9,
"FMT_MTD.1": 16,
"FMT_MTD.1.1": 1,
"FMT_MTD.3": 18,
"FMT_MTD.3.1": 1,
"FMT_REV": 3,
"FMT_REV.1": 7,
"FMT_REV.1.1": 1,
"FMT_REV.1.2": 1,
"FMT_SMR": 79,
"FMT_SMR.1": 87,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPR": {
"FPR_UNO.1": 18,
"FPR_UNO.1.1": 1
},
"FPT": {
"FPT_AMT": 10,
"FPT_AMT.1": 17,
"FPT_AMT.1.1": 1,
"FPT_FLS": 32,
"FPT_FLS.1": 39,
"FPT_FLS.1.1": 1,
"FPT_PHP": 2,
"FPT_PHP.3": 9,
"FPT_RCV": 11,
"FPT_RCV.3": 33,
"FPT_RCV.4": 13,
"FPT_RVM": 6,
"FPT_RVM.1": 31,
"FPT_RVM.1.1": 1,
"FPT_SEP": 6,
"FPT_SEP.1": 32,
"FPT_SEP.1.1": 2,
"FPT_SEP.1.2": 2,
"FPT_TDC.1": 16,
"FPT_TDC.1.1": 2,
"FPT_TDC.1.2": 2,
"FPT_TST.1": 25,
"FPT_TST.1.1": 2,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FRU": {
"FRU_FLT": 6,
"FRU_FLT.1": 9,
"FRU_RSA": 9,
"FRU_RSA.1": 11,
"FRU_RSA.1.1": 1
},
"FTP": {
"FTP_ITC": 7,
"FTP_ITC.1": 15,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1,
"FTP_TRP.1": 7
}
},
"certification_process": {
"OutOfScope": {
"a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this PP, though. MODIFICATIONS OF THE SET OF APPLICATIONS T.INSTALL The attacker fraudulently": 3,
"a timeout policy that prevents them from being blocked should a card fail to answer. That point is out of scope of this PP, though. The objective OE.CARD-MANAGEMENT supports OE.VERIFICATION and contributes to": 1,
"out of scope": 4
}
},
"cipher_mode": {},
"cplc_data": {
"ICVersion": {
"IC. Version": 1
}
},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {
"misc": {
"TYPE_ACCESS": 3
}
},
"javacard_packages": {
"java": {
"java.lang": 1,
"java.rmi": 2
},
"javacard": {
"javacard.framework": 4,
"javacard.framework.applet": 1,
"javacard.framework.service": 1,
"javacard.security": 4
},
"javacardx": {
"javacardx.crypto": 6,
"javacardx.rmi": 1,
"javacardx.security": 2,
"javacardx.securitypackages": 1
}
},
"javacard_version": {
"JavaCard": {
"Java Card 2.1.1": 3,
"Java Card 2.1.2": 1,
"Java Card 2.2": 4
}
},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"malfunction": 2,
"physical tampering": 2
},
"SCA": {
"physical probing": 1
}
},
"standard_id": {
"CC": {
"CCIMB-99-031": 1,
"CCIMB-99-032": 1,
"CCIMB-99-033": 1
},
"ISO": {
"ISO/IEC 15408": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"pp_metadata": {
"/Author": "C. Loiseaux, S. Lacas, E.Gimenez, G.Betarte",
"/CreationDate": "D:20030828102002+02\u002700\u0027",
"/Creator": "Acrobat PDFMaker 5.0 pour Word",
"/ModDate": "D:20030828102118+03\u002700\u0027",
"/Producer": "Acrobat Distiller 5.0.5 (Windows)",
"/Title": "Java Card System Protection Profile Collection",
"pdf_file_size_bytes": 2581417,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": true,
"pdf_number_of_pages": 189
},
"report_filename": "",
"report_keywords": null,
"report_metadata": null
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "6a911f2f0ec871cfaa834089b2ba6e8e12b88eaeed17cafa94171e064c0e578a",
"txt_hash": "8f867606a4e4eeb627f11f9baba4b97d7c87ebf9cf4b06cb941aec8df77d651f"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": true,
"convert_ok": false,
"download_ok": true,
"extract_ok": false,
"pdf_hash": "6adef86c67e4bbbcbc8872bedf10c93c33839884a5cb1ca1d36f080444041ca7",
"txt_hash": null
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"is_collaborative": false,
"maintenances": [],
"name": "JavaCard System Standard 2.2 Configuration Protection Profile, Version 1.0b",
"not_valid_after": null,
"not_valid_before": "2003-09-30",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/jcsppc.pdf",
"report_link": "https://www.commoncriteriaportal.org#no_cert",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"AVA_VLA.3",
"ADV_IMP.2",
"EAL4+"
]
},
"status": "active",
"version": "1.0b"
}
}