JavaCard System Standard 2.2 Configuration Protection Profile, Version 1.0b

Web information ?

Status: active
Certification date: 2003-09-30
Scheme: 🇫🇷
Category: ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level: EAL4+, ADV_IMP.2, AVA_VLA.3

Certification report ?

Profile ?

Extracted keywords

JavaCard versions
Java Card 2.1.1, Java Card 2.2, Java Card 2.1.2
JavaCard API constants
TYPE_ACCESS
CPLC
IC. Version

Security level
EAL 4, EAL4, EAL 4 augmented, EAL4 augmented
Claims
D.APP_CODE, D.APP_C_DATA, D.APP_I_DATA, D.PIN, D.JCS_CODE, D.JCS_DATA, D.SEC_DATA, D.API_DATA, D.CRYPTO, O.TODO, O.SID, O.OPERATE, O.RESOURCES, O.FIREWALL, O.NATIVE, O.REALLOCATION, O.SHRD_VAR_CONFID, O.SHRD_VAR_INTEG, O.ALARM, O.TRANSACTION, O.CIPHER, O.PIN-MNGT, O.KEY-MNGT, O.INSTALL, O.LOAD, O.DELETION, O.OBJ-DELETION, O.REMOTE, O.VERIFICATION, O.JAVAOBJECT, O.APPLET, O.CODE_PKG, O.CODE_PCKG, O.REMOTE_OBJ, O.REMOTE_MTHD, O.ROR, O.RMI_SERVICE, O.REMOTE_OBJECT, O.PIN-, T.PHYSICAL, T.CONFID-JCS-CODE, T.CONFID-APPLI-DATA, T.CONFID-JCS-DATA, T.INTEG-APPLI-CODE, T.INTEG-JCS-CODE, T.INTEG-APPLI-DATA, T.INTEG-JCS-DATA, T.SID, T.EXE-CODE, T.NATIVE, T.RESOURCES, T.INSTALL, T.EXE-CODE-REMOTE, T.DELETION, T.OBJ-DELETION, T.CONFID-APPLI-, T.CONFID-JCS-, T.INTEG-, A.NATIVE, A.NO-DELETION, A.NO-INSTALL, A.VERIFICATION, A.APPLET, A.DELETION, A.NO-, R.JAVA, OP.ARRAY_ACCESS, OP.INSTANCE_FIELD, OP.INVK_VIRTUAL, OP.INVK_INTERFACE, OP.THROW, OP.TYPE_ACCESS, OP.JAVA, OP.CREATE, OP.PUT, OP.BYTECODE, OP.DELETE_APPLET, OP.DELETE_PCKG, OP.DELETE_PCKG_APPLET, OP.GET_ROR, OP.INVOKE, OP.RET_RORD, OP.SEND, OP.RECEIVE, OE.NATIVE, OE.SCP, OE.CARD-MANAGEMENT, OE.NO-DELETION, OE.NO-INSTALL, OE.VERIFICATION, OE.APPLET, OE.NO-, OSP.VERIFICATION
Security Assurance Requirements (SAR)
ACM_AUT.1, ACM_CAP.4, ACM_SCP.2, ADO_DEL.2, ADO_IGS.1, ADV_IMP.2, ADV_FSP, ADV_HLD, ADV_FSP.2, ADV_HLD.2, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, ADV_IMP.1, ADV_FSP.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VLA.3, AVA_MSU.2, AVA_SOF.1, AVA_VLA.2, AVA_VLA.4
Security Functional Requirements (SFR)
FAU_ARP.1, FAU_ARP.1.1, FAU_ARP, FAU_SAA.1, FCO_NRO.2, FCO_NRO.2.1, FCO_NRO.2.2, FCO_NRO.2.3, FCO_NRO, FCS_CKM.1, FCS_CKM.1.1, FCS_CKM.2, FCS_CKM.2.1, FCS_CKM.3, FCS_CKM.3.1, FCS_CKM.4, FCS_CKM.4.1, FCS_COP.1, FCS_COP.1.1, FDP_ACF.1, FDP_ACC, FDP_ACC.2.1, FDP_ACC.2, FDP_ACC.2.2, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1, FDP_IFC.1.1, FDP_IFF.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_IFF.1.6, FDP_RIP.1, FDP_RIP.1.1, FDP_ROL.1, FDP_ROL.1.1, FDP_ROL.1.2, FDP_SDI.2, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ITC.2, FDP_ITC.2.1, FDP_ITC.2.5, FDP_IFC.2, FDP_IFC.2.1, FDP_IFC.2.2, FDP_IFF.2, FDP_IFF.2.1, FDP_IFF.2.2, FDP_IFF.2.3, FDP_IFF.2.4, FDP_IFF.2.5, FDP_IFF.2.6, FDP_IFF.2.7, FDP_UIT.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_ACC.1, FDP_ACC.1.1, FDP_ACF, FDP_IFC, FDP_IFF, FDP_ITC.1, FDP_ROL, FDP_UIT, FDP_RIP, FIA_ATD.1, FIA_ATD.1.1, FIA_UID.2, FIA_USB.1, FIA_USB.1.1, FIA_UID.1, FIA_ATD, FIA_UID, FMT_MSA.3, FMT_SMR.1, FMT_MSA.1, FMT_MSA.1.1, FMT_MSA.2, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA, FMT_MSA.3.2, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD.1, FMT_MTD.1.1, FMT_MTD.3, FMT_MTD.3.1, FMT_SMR, FMT_REV.1, FMT_REV.1.1, FMT_REV.1.2, FMT_MTD, FMT_REV, FPR_UNO.1, FPR_UNO.1.1, FPT_SEP.1, FPT_SEP.1.1, FPT_SEP.1.2, FPT_RCV.3, FPT_RVM.1, FPT_RVM.1.1, FPT_TDC.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_FLS.1, FPT_FLS.1.1, FPT_TST.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_AMT, FPT_AMT.1.1, FPT_AMT.1, FPT_FLS, FPT_PHP, FPT_PHP.3, FPT_SEP, FPT_RVM, FPT_RCV, FPT_RCV.4, FRU_RSA.1, FRU_RSA.1.1, FRU_FLT, FRU_FLT.1, FRU_RSA, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1, FTP_ITC
Protection profiles
BSI-PP-000, BSI-PP-0002

Side-channel analysis
physical probing, physical tampering, malfunction
Certification process
out of scope, a timeout policy that prevents them from being blocked should a card fail to answer. That point is out of scope of this PP, though. The objective OE.CARD-MANAGEMENT supports OE.VERIFICATION and contributes to, a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this PP, though. MODIFICATIONS OF THE SET OF APPLICATIONS T.INSTALL The attacker fraudulently

Standards
ISO/IEC 15408, CCIMB-99-031, CCIMB-99-032, CCIMB-99-033

File metadata

Title Java Card System Protection Profile Collection
Author C. Loiseaux, S. Lacas, E.Gimenez, G.Betarte
Creation date D:20030828102002+02'00'
Modification date D:20030828102118+03'00'
Pages 189
Creator Acrobat PDFMaker 5.0 pour Word
Producer Acrobat Distiller 5.0.5 (Windows)

Updates ?

  • 04.02.2025 The protection profile was first processed.
    New Protection Profile

    A new Protection Profile with the name JavaCard System Standard 2.2 Configuration Protection Profile, Version 1.0b was processed.

Raw data

{
  "_id": "8ab4bd8434014a92",
  "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
  "dgst": "8ab4bd8434014a92",
  "heuristics": {
    "_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
  },
  "pdf_data": {
    "_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
    "pp_filename": "jcsppc.pdf",
    "pp_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.APPLET": 9,
          "A.DELETION": 4,
          "A.NATIVE": 21,
          "A.NO-": 1,
          "A.NO-DELETION": 5,
          "A.NO-INSTALL": 5,
          "A.VERIFICATION": 11
        },
        "D": {
          "D.API_DATA": 4,
          "D.APP_CODE": 9,
          "D.APP_C_DATA": 4,
          "D.APP_I_DATA": 6,
          "D.CRYPTO": 5,
          "D.JCS_CODE": 4,
          "D.JCS_DATA": 6,
          "D.PIN": 5,
          "D.SEC_DATA": 8
        },
        "O": {
          "O.ALARM": 18,
          "O.APPLET": 23,
          "O.CIPHER": 23,
          "O.CODE_PCKG": 8,
          "O.CODE_PKG": 6,
          "O.DELETION": 11,
          "O.FIREWALL": 40,
          "O.INSTALL": 25,
          "O.JAVAOBJECT": 40,
          "O.KEY-MNGT": 15,
          "O.LOAD": 14,
          "O.NATIVE": 23,
          "O.OBJ-DELETION": 11,
          "O.OPERATE": 33,
          "O.PIN-": 4,
          "O.PIN-MNGT": 15,
          "O.REALLOCATION": 19,
          "O.REMOTE": 9,
          "O.REMOTE_MTHD": 6,
          "O.REMOTE_OBJ": 8,
          "O.REMOTE_OBJECT": 1,
          "O.RESOURCES": 21,
          "O.RMI_SERVICE": 11,
          "O.ROR": 5,
          "O.SHRD_VAR_CONFID": 17,
          "O.SHRD_VAR_INTEG": 21,
          "O.SID": 30,
          "O.TODO": 1,
          "O.TRANSACTION": 15,
          "O.VERIFICATION": 9
        },
        "OE": {
          "OE.APPLET": 14,
          "OE.CARD-MANAGEMENT": 16,
          "OE.NATIVE": 12,
          "OE.NO-": 1,
          "OE.NO-DELETION": 4,
          "OE.NO-INSTALL": 4,
          "OE.SCP": 62,
          "OE.VERIFICATION": 31
        },
        "OP": {
          "OP.ARRAY_ACCESS": 3,
          "OP.BYTECODE": 1,
          "OP.CREATE": 6,
          "OP.DELETE_APPLET": 3,
          "OP.DELETE_PCKG": 2,
          "OP.DELETE_PCKG_APPLET": 2,
          "OP.GET_ROR": 2,
          "OP.INSTANCE_FIELD": 1,
          "OP.INVK_INTERFACE": 5,
          "OP.INVK_VIRTUAL": 3,
          "OP.INVOKE": 2,
          "OP.JAVA": 4,
          "OP.PUT": 5,
          "OP.RECEIVE": 1,
          "OP.RET_RORD": 2,
          "OP.SEND": 1,
          "OP.THROW": 3,
          "OP.TYPE_ACCESS": 3
        },
        "OSP": {
          "OSP.VERIFICATION": 5
        },
        "R": {
          "R.JAVA": 21
        },
        "T": {
          "T.CONFID-APPLI-": 1,
          "T.CONFID-APPLI-DATA": 9,
          "T.CONFID-JCS-": 1,
          "T.CONFID-JCS-CODE": 9,
          "T.CONFID-JCS-DATA": 10,
          "T.DELETION": 9,
          "T.EXE-CODE": 21,
          "T.EXE-CODE-REMOTE": 7,
          "T.INSTALL": 14,
          "T.INTEG-": 1,
          "T.INTEG-APPLI-CODE": 15,
          "T.INTEG-APPLI-DATA": 20,
          "T.INTEG-JCS-CODE": 10,
          "T.INTEG-JCS-DATA": 6,
          "T.NATIVE": 10,
          "T.OBJ-DELETION": 7,
          "T.PHYSICAL": 10,
          "T.RESOURCES": 10,
          "T.SID": 24
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP-000": 1,
          "BSI-PP-0002": 1
        }
      },
      "cc_sar": {
        "ACM": {
          "ACM_AUT.1": 1,
          "ACM_CAP.4": 1,
          "ACM_SCP.2": 1
        },
        "ADO": {
          "ADO_DEL.2": 1,
          "ADO_IGS.1": 1
        },
        "ADV": {
          "ADV_FSP": 1,
          "ADV_FSP.1": 4,
          "ADV_FSP.2": 1,
          "ADV_HLD": 1,
          "ADV_HLD.2": 5,
          "ADV_IMP.1": 5,
          "ADV_IMP.2": 19,
          "ADV_LLD.1": 9,
          "ADV_RCR.1": 5,
          "ADV_SPM.1": 37
        },
        "AGD": {
          "AGD_ADM.1": 12,
          "AGD_USR.1": 5
        },
        "ALC": {
          "ALC_DVS.1": 1,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 5
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_MSU.2": 1,
          "AVA_SOF.1": 1,
          "AVA_VLA.2": 6,
          "AVA_VLA.3": 23,
          "AVA_VLA.4": 8
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 3,
          "EAL 4 augmented": 2,
          "EAL4": 27,
          "EAL4 augmented": 8
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP": 13,
          "FAU_ARP.1": 22,
          "FAU_ARP.1.1": 1,
          "FAU_SAA.1": 16
        },
        "FCO": {
          "FCO_NRO": 2,
          "FCO_NRO.2": 9,
          "FCO_NRO.2.1": 1,
          "FCO_NRO.2.2": 1,
          "FCO_NRO.2.3": 1
        },
        "FCS": {
          "FCS_CKM.1": 46,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 18,
          "FCS_CKM.2.1": 1,
          "FCS_CKM.3": 14,
          "FCS_CKM.3.1": 1,
          "FCS_CKM.4": 43,
          "FCS_CKM.4.1": 1,
          "FCS_COP.1": 18,
          "FCS_COP.1.1": 1
        },
        "FDP": {
          "FDP_ACC": 60,
          "FDP_ACC.1": 47,
          "FDP_ACC.1.1": 1,
          "FDP_ACC.2": 26,
          "FDP_ACC.2.1": 1,
          "FDP_ACC.2.2": 1,
          "FDP_ACF": 36,
          "FDP_ACF.1": 50,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 1,
          "FDP_IFC": 62,
          "FDP_IFC.1": 68,
          "FDP_IFC.1.1": 1,
          "FDP_IFC.2": 9,
          "FDP_IFC.2.1": 1,
          "FDP_IFC.2.2": 1,
          "FDP_IFF": 35,
          "FDP_IFF.1": 47,
          "FDP_IFF.1.1": 1,
          "FDP_IFF.1.2": 1,
          "FDP_IFF.1.3": 1,
          "FDP_IFF.1.4": 1,
          "FDP_IFF.1.5": 1,
          "FDP_IFF.1.6": 1,
          "FDP_IFF.2": 8,
          "FDP_IFF.2.1": 1,
          "FDP_IFF.2.2": 1,
          "FDP_IFF.2.3": 1,
          "FDP_IFF.2.4": 1,
          "FDP_IFF.2.5": 1,
          "FDP_IFF.2.6": 1,
          "FDP_IFF.2.7": 1,
          "FDP_ITC.1": 16,
          "FDP_ITC.2": 26,
          "FDP_ITC.2.1": 1,
          "FDP_ITC.2.5": 1,
          "FDP_RIP": 13,
          "FDP_RIP.1": 62,
          "FDP_RIP.1.1": 1,
          "FDP_ROL": 5,
          "FDP_ROL.1": 24,
          "FDP_ROL.1.1": 1,
          "FDP_ROL.1.2": 1,
          "FDP_SDI.2": 18,
          "FDP_SDI.2.1": 1,
          "FDP_SDI.2.2": 1,
          "FDP_UIT": 3,
          "FDP_UIT.1": 5,
          "FDP_UIT.1.1": 1,
          "FDP_UIT.1.2": 1
        },
        "FIA": {
          "FIA_ATD": 9,
          "FIA_ATD.1": 19,
          "FIA_ATD.1.1": 1,
          "FIA_UID": 29,
          "FIA_UID.1": 44,
          "FIA_UID.2": 6,
          "FIA_USB.1": 19,
          "FIA_USB.1.1": 1
        },
        "FMT": {
          "FMT_MSA": 132,
          "FMT_MSA.1": 58,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.2": 28,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 52,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MTD": 9,
          "FMT_MTD.1": 16,
          "FMT_MTD.1.1": 1,
          "FMT_MTD.3": 18,
          "FMT_MTD.3.1": 1,
          "FMT_REV": 3,
          "FMT_REV.1": 7,
          "FMT_REV.1.1": 1,
          "FMT_REV.1.2": 1,
          "FMT_SMR": 79,
          "FMT_SMR.1": 87,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPR": {
          "FPR_UNO.1": 18,
          "FPR_UNO.1.1": 1
        },
        "FPT": {
          "FPT_AMT": 10,
          "FPT_AMT.1": 17,
          "FPT_AMT.1.1": 1,
          "FPT_FLS": 32,
          "FPT_FLS.1": 39,
          "FPT_FLS.1.1": 1,
          "FPT_PHP": 2,
          "FPT_PHP.3": 9,
          "FPT_RCV": 11,
          "FPT_RCV.3": 33,
          "FPT_RCV.4": 13,
          "FPT_RVM": 6,
          "FPT_RVM.1": 31,
          "FPT_RVM.1.1": 1,
          "FPT_SEP": 6,
          "FPT_SEP.1": 32,
          "FPT_SEP.1.1": 2,
          "FPT_SEP.1.2": 2,
          "FPT_TDC.1": 16,
          "FPT_TDC.1.1": 2,
          "FPT_TDC.1.2": 2,
          "FPT_TST.1": 25,
          "FPT_TST.1.1": 2,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FRU": {
          "FRU_FLT": 6,
          "FRU_FLT.1": 9,
          "FRU_RSA": 9,
          "FRU_RSA.1": 11,
          "FRU_RSA.1.1": 1
        },
        "FTP": {
          "FTP_ITC": 7,
          "FTP_ITC.1": 15,
          "FTP_ITC.1.1": 1,
          "FTP_ITC.1.2": 1,
          "FTP_ITC.1.3": 1,
          "FTP_TRP.1": 7
        }
      },
      "certification_process": {
        "OutOfScope": {
          "a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this PP, though. MODIFICATIONS OF THE SET OF APPLICATIONS T.INSTALL The attacker fraudulently": 3,
          "a timeout policy that prevents them from being blocked should a card fail to answer. That point is out of scope of this PP, though. The objective OE.CARD-MANAGEMENT supports OE.VERIFICATION and contributes to": 1,
          "out of scope": 4
        }
      },
      "cipher_mode": {},
      "cplc_data": {
        "ICVersion": {
          "IC. Version": 1
        }
      },
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {
        "misc": {
          "TYPE_ACCESS": 3
        }
      },
      "javacard_packages": {
        "java": {
          "java.lang": 1,
          "java.rmi": 2
        },
        "javacard": {
          "javacard.framework": 4,
          "javacard.framework.applet": 1,
          "javacard.framework.service": 1,
          "javacard.security": 4
        },
        "javacardx": {
          "javacardx.crypto": 6,
          "javacardx.rmi": 1,
          "javacardx.security": 2,
          "javacardx.securitypackages": 1
        }
      },
      "javacard_version": {
        "JavaCard": {
          "Java Card 2.1.1": 3,
          "Java Card 2.1.2": 1,
          "Java Card 2.2": 4
        }
      },
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "FI": {
          "malfunction": 2,
          "physical tampering": 2
        },
        "SCA": {
          "physical probing": 1
        }
      },
      "standard_id": {
        "CC": {
          "CCIMB-99-031": 1,
          "CCIMB-99-032": 1,
          "CCIMB-99-033": 1
        },
        "ISO": {
          "ISO/IEC 15408": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "pp_metadata": {
      "/Author": "C. Loiseaux, S. Lacas, E.Gimenez, G.Betarte",
      "/CreationDate": "D:20030828102002+02\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 5.0 pour Word",
      "/ModDate": "D:20030828102118+03\u002700\u0027",
      "/Producer": "Acrobat Distiller 5.0.5 (Windows)",
      "/Title": "Java Card System Protection Profile Collection",
      "pdf_file_size_bytes": 2581417,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": true,
      "pdf_number_of_pages": 189
    },
    "report_filename": "",
    "report_keywords": null,
    "report_metadata": null
  },
  "state": {
    "_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
    "pp": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "6a911f2f0ec871cfaa834089b2ba6e8e12b88eaeed17cafa94171e064c0e578a",
      "txt_hash": "8f867606a4e4eeb627f11f9baba4b97d7c87ebf9cf4b06cb941aec8df77d651f"
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": true,
      "convert_ok": false,
      "download_ok": true,
      "extract_ok": false,
      "pdf_hash": "6adef86c67e4bbbcbc8872bedf10c93c33839884a5cb1ca1d36f080444041ca7",
      "txt_hash": null
    }
  },
  "web_data": {
    "_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
    "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
    "is_collaborative": false,
    "maintenances": [],
    "name": "JavaCard System Standard 2.2 Configuration Protection Profile, Version 1.0b",
    "not_valid_after": null,
    "not_valid_before": "2003-09-30",
    "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/jcsppc.pdf",
    "report_link": "https://www.commoncriteriaportal.org#no_cert",
    "scheme": "FR",
    "security_level": {
      "_type": "Set",
      "elements": [
        "AVA_VLA.3",
        "ADV_IMP.2",
        "EAL4+"
      ]
    },
    "status": "active",
    "version": "1.0b"
  }
}