This page was not yet optimized for use on mobile devices.
JICSAP ver2.0 Protection Profile part2, Protection Profile for Smart Cards with the Application Program Loading Function (version 1.7e), Version 1.7e
Web information ?
Status: activeCertification date: 2003-11-14
Scheme: 🇫🇷
Category: ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level: EAL4+
Certification report ?
Extracted keywords
Security level
EAL 4, EAL4, EAL 4 augmentedSecurity Assurance Requirements (SAR)
AVA_VLA.4, APE_INT.1, APE_DES.1, APE_ENV.1, APE_OBJ.1, APE_REQ.1, APE_SRE.1Security Functional Requirements (SFR)
FAU_CFG.1, FCS_CKM.1, FCS_CKM.4, FCS_COP.1, FDP_ACC.1, FDP_ACF.1, FDP_RIP.1, FDP_IOA.1, FIA_AFL.1, FIA_ATD.1, FIA_UAU.1, FIA_UAU.4, FIA_UAU.5, FIA_UAU.6, FIA_UID.1, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_SMR.1, FPT_AMT.1, FPT_FLS.1, FPT_RCV.3, FPT_RCV.4, FPT_SEP.1, FPT_TST.1Standards
CCIMB-99-031, CCIMB-99-032, CCIMB-99-033File metadata
Title | RapportCertification.book |
---|---|
Author | redon |
Creation date | D:20031112171129Z00'00' |
Modification date | D:20031112171302Z00'00' |
Pages | 15 |
Creator | FrameMaker 6.0 |
Producer | Acrobat Distiller 5.0 (Windows) |
Profile ?
Extracted keywords
Security level
EAL4, EAL4 augmentedSecurity Assurance Requirements (SAR)
ADV_SPM.1, ADV_ADM.1, AGD_ADM.1, AVA_VLA, AVA_VLA.4Security Functional Requirements (SFR)
FAU_CFG.1, FAU_CFG.1.1, FAU_CFG.1.2, FAU_LST, FAU_SAS, FAU_CFG, FAU_ARP, FAU_SAA, FAU_SEL, FAU_STG, FAU_LST.1, FAU_SAS.1, FAU_ARP.1, FAU_SAA.1, FAU_SEL.1, FAU_STG.1, FAU_STG.3, FCS_CKM.1, FCS_CKM.1.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_CKM.4.1, FCS_COP.1.1, FCS_CKM, FCS_COP, FCS_RND, FCS_CKM.3, FCS_RND.1, FDP_ITC.1, FDP_ACC.1, FDP_ACC.1.1, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_RIP.1, FDP_RIP.1.1, FDP_IFC.1, FDP_IOA.1, FDP_IOA.1.1, FDP_ACF, FDP_ITC, FDP_ACC, FDP_RIP, FDP_IFC, FDP_IFF, FDP_ETC, FDP_ACC.2, FDP_IFF.1, FDP_ETC.1, FDP_ITT.1, FDP_RIP.2, FDP_ROL.1, FDP_DAU.1, FDP_SDI.1, FDP_SDI.2, FDP_UCT, FDP_UIT.1, FDP_ITT, FDP_ROL, FDP_SDI, FDP_UIT, FDP_IOA, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.1, FIA_ATD.1, FIA_ATD.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UID.1, FIA_UAU.4, FIA_UAU.4.1, FIA_UAU.5, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.6, FIA_UAU.6.1, FIA_UID.1.1, FIA_UID.1.2, FIA_AFL, FIA_IOA.1, FIA_ATD, FIA_UID, FIA_UAU, FIA_UAU.3, FIA_UAU.2, FIA_UAU.7, FIA_UID.2, FMT_MSA.2, FMT_MSA.3, FMT_MOF.1, FMT_MOF.1.1, FMT_SMR.1, FMT_MSA.1, FMT_MSA.1.1, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1, FMT_MTD.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_LIM, FMT_MOF, FMT_MSA, FMT_MTD, FMT_SMR, FMT_REV, FMT_LIM.1, FMT_LIM.2, FMT_MTD.2, FMT_MTD.3, FMT_REV.1, FPR_UNO, FPR_UNO.1, FPT_AMT.1, FPT_AMT.1.1, FPT_FLS.1, FPT_FLS.1.1, FPT_RCV.3, FPT_RCV.3.1, FPT_RCV.3.2, FPT_RCV.3.3, FPT_RCV.3.4, FPT_TST.1, FPT_RCV.4, FPT_RCV.4.1, FPT_SEP.1, FPT_SEP.1.1, FPT_SEP.1.2, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_PHP.3, FPT_PHP.3.1, FPT_PHP, FPT_RCV, FPT_FLS, FPT_SEP, FPT_ITI, FPT_TDC, FPT_ITT, FPT_RPL, FPT_RVM, FPT_TST, FPT_ISI, FPT_PHP.1, FPT_PHP.2, FPT_ITI.1, FPT_TDC.1, FPT_ITT.1, FPT_RPL.1, FPT_RVM.1, FRU_FLT, FRU_RSA, FRU_FLT.2, FRU_RSA.1, FTP_ITC, FTP_ITC.1Protection profiles
BSI-PP-0002Side-channel analysis
side channel, physical tamperingStandards
ISO/IEC 15408, ISO/IEC 7810, ISO/IEC 7816File metadata
Title | JICSAPpart2_PP_v1.7e.doc |
---|---|
Author | bousson |
Creation date | D:20031126162201 |
Pages | 61 |
Creator | JICSAPpart2_PP_v1.7e.doc (Lecture seule) - Microsoft Word |
Producer | Acrobat PDFWriter 4.05 pour Windows NT |
References ?
No references are available for this protection profile.
Updates ?
-
04.02.2025 The protection profile was first processed.
New Protection Profile
A new Protection Profile with the name JICSAP ver2.0 Protection Profile part2, Protection Profile for Smart Cards with the Application Program Loading Function (version 1.7e), Version 1.7e was processed.
Raw data
{
"_id": "d5309a5435adfd69",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "d5309a5435adfd69",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "pp0307.pdf",
"pp_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0002": 3
}
},
"cc_sar": {
"ADV": {
"ADV_ADM.1": 1,
"ADV_SPM.1": 16
},
"AGD": {
"AGD_ADM.1": 3
},
"AVA": {
"AVA_VLA": 1,
"AVA_VLA.4": 3
}
},
"cc_security_level": {
"EAL": {
"EAL4": 7,
"EAL4 augmented": 2
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP": 1,
"FAU_ARP.1": 1,
"FAU_CFG": 1,
"FAU_CFG.1": 10,
"FAU_CFG.1.1": 2,
"FAU_CFG.1.2": 3,
"FAU_LST": 1,
"FAU_LST.1": 1,
"FAU_SAA": 1,
"FAU_SAA.1": 1,
"FAU_SAS": 1,
"FAU_SAS.1": 1,
"FAU_SEL": 1,
"FAU_SEL.1": 1,
"FAU_STG": 1,
"FAU_STG.1": 1,
"FAU_STG.3": 1
},
"FCS": {
"FCS_CKM": 1,
"FCS_CKM.1": 21,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 2,
"FCS_CKM.3": 1,
"FCS_CKM.4": 19,
"FCS_CKM.4.1": 1,
"FCS_COP": 1,
"FCS_COP.1": 17,
"FCS_COP.1.1": 1,
"FCS_RND": 1,
"FCS_RND.1": 1
},
"FDP": {
"FDP_ACC": 3,
"FDP_ACC.1": 24,
"FDP_ACC.1.1": 1,
"FDP_ACC.2": 1,
"FDP_ACF": 3,
"FDP_ACF.1": 16,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_DAU.1": 2,
"FDP_ETC": 1,
"FDP_ETC.1": 1,
"FDP_IFC": 1,
"FDP_IFC.1": 5,
"FDP_IFF": 1,
"FDP_IFF.1": 1,
"FDP_IOA": 1,
"FDP_IOA.1": 18,
"FDP_IOA.1.1": 3,
"FDP_ITC": 3,
"FDP_ITC.1": 3,
"FDP_ITT": 1,
"FDP_ITT.1": 1,
"FDP_RIP": 1,
"FDP_RIP.1": 13,
"FDP_RIP.1.1": 2,
"FDP_RIP.2": 1,
"FDP_ROL": 1,
"FDP_ROL.1": 1,
"FDP_SDI": 1,
"FDP_SDI.1": 1,
"FDP_SDI.2": 1,
"FDP_UCT": 2,
"FDP_UIT": 1,
"FDP_UIT.1": 1
},
"FIA": {
"FIA_AFL": 1,
"FIA_AFL.1": 7,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD": 1,
"FIA_ATD.1": 19,
"FIA_ATD.1.1": 1,
"FIA_IOA.1": 1,
"FIA_UAU": 1,
"FIA_UAU.1": 21,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UAU.2": 1,
"FIA_UAU.3": 2,
"FIA_UAU.4": 16,
"FIA_UAU.4.1": 1,
"FIA_UAU.5": 20,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 1,
"FIA_UAU.6": 16,
"FIA_UAU.6.1": 1,
"FIA_UAU.7": 1,
"FIA_UID": 1,
"FIA_UID.1": 18,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1,
"FIA_UID.2": 1
},
"FMT": {
"FMT_LIM": 1,
"FMT_LIM.1": 1,
"FMT_LIM.2": 1,
"FMT_MOF": 1,
"FMT_MOF.1": 6,
"FMT_MOF.1.1": 1,
"FMT_MSA": 1,
"FMT_MSA.1": 10,
"FMT_MSA.1.1": 1,
"FMT_MSA.2": 16,
"FMT_MSA.2.1": 1,
"FMT_MSA.3": 12,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD": 2,
"FMT_MTD.1": 7,
"FMT_MTD.1.1": 1,
"FMT_MTD.2": 1,
"FMT_MTD.3": 1,
"FMT_REV": 1,
"FMT_REV.1": 1,
"FMT_SMR": 1,
"FMT_SMR.1": 15,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPR": {
"FPR_UNO": 2,
"FPR_UNO.1": 1
},
"FPT": {
"FPT_AMT.1": 6,
"FPT_AMT.1.1": 1,
"FPT_FLS": 1,
"FPT_FLS.1": 7,
"FPT_FLS.1.1": 1,
"FPT_ISI": 1,
"FPT_ITI": 1,
"FPT_ITI.1": 1,
"FPT_ITT": 1,
"FPT_ITT.1": 1,
"FPT_PHP": 1,
"FPT_PHP.1": 1,
"FPT_PHP.2": 1,
"FPT_PHP.3": 6,
"FPT_PHP.3.1": 1,
"FPT_RCV": 1,
"FPT_RCV.3": 9,
"FPT_RCV.3.1": 1,
"FPT_RCV.3.2": 1,
"FPT_RCV.3.3": 1,
"FPT_RCV.3.4": 1,
"FPT_RCV.4": 6,
"FPT_RCV.4.1": 1,
"FPT_RPL": 2,
"FPT_RPL.1": 1,
"FPT_RVM": 2,
"FPT_RVM.1": 1,
"FPT_SEP": 2,
"FPT_SEP.1": 7,
"FPT_SEP.1.1": 1,
"FPT_SEP.1.2": 1,
"FPT_TDC": 2,
"FPT_TDC.1": 1,
"FPT_TST": 1,
"FPT_TST.1": 8,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FRU": {
"FRU_FLT": 2,
"FRU_FLT.2": 1,
"FRU_RSA": 1,
"FRU_RSA.1": 1
},
"FTP": {
"FTP_ITC": 2,
"FTP_ITC.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"physical tampering": 1
},
"SCA": {
"side channel": 1
}
},
"standard_id": {
"ISO": {
"ISO/IEC 15408": 2,
"ISO/IEC 7810": 2,
"ISO/IEC 7816": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"pp_metadata": {
"/Author": "bousson",
"/CreationDate": "D:20031126162201",
"/Creator": "JICSAPpart2_PP_v1.7e.doc (Lecture seule) - Microsoft Word",
"/Producer": "Acrobat PDFWriter 4.05 pour Windows NT",
"/Title": "JICSAPpart2_PP_v1.7e.doc",
"pdf_file_size_bytes": 564810,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 61
},
"report_filename": "ppcr0307.pdf",
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"APE": {
"APE_DES.1": 1,
"APE_ENV.1": 1,
"APE_INT.1": 1,
"APE_OBJ.1": 1,
"APE_REQ.1": 1,
"APE_SRE.1": 1
},
"AVA": {
"AVA_VLA.4": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 3,
"EAL 4 augmented": 1,
"EAL4": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_CFG.1": 1
},
"FCS": {
"FCS_CKM.1": 4,
"FCS_CKM.4": 2,
"FCS_COP.1": 2
},
"FDP": {
"FDP_ACC.1": 2,
"FDP_ACF.1": 2,
"FDP_IOA.1": 1,
"FDP_RIP.1": 2
},
"FIA": {
"FIA_AFL.1": 2,
"FIA_ATD.1": 2,
"FIA_UAU.1": 2,
"FIA_UAU.4": 2,
"FIA_UAU.5": 2,
"FIA_UAU.6": 2,
"FIA_UID.1": 2
},
"FMT": {
"FMT_MSA.1": 2,
"FMT_MSA.2": 2,
"FMT_MSA.3": 2,
"FMT_SMR.1": 2
},
"FPT": {
"FPT_AMT.1": 2,
"FPT_FLS.1": 2,
"FPT_RCV.3": 2,
"FPT_RCV.4": 2,
"FPT_SEP.1": 2,
"FPT_TST.1": 2
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCIMB-99-031": 1,
"CCIMB-99-032": 1,
"CCIMB-99-033": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "redon",
"/CreationDate": "D:20031112171129Z00\u002700\u0027",
"/Creator": "FrameMaker 6.0",
"/ModDate": "D:20031112171302Z00\u002700\u0027",
"/Producer": "Acrobat Distiller 5.0 (Windows)",
"/Title": "RapportCertification.book",
"pdf_file_size_bytes": 236674,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 15
}
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "f8f71fbaf148b8c89280f7ee87d488f645b683781003945490a99350a7137ef3",
"txt_hash": "f85a6e71253cfba5319e6ee69510365dfec34d5640510c5f42f8a4dbf7e1d011"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "636f47f9b12c292a81104878c2fd9f319ff2e5df9fe003dec57768a6817c492e",
"txt_hash": "23b8fe71135c9bc5c7772de0bc73a88d28afcea43fb2213681473b38368233b6"
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"is_collaborative": false,
"maintenances": [],
"name": "JICSAP ver2.0 Protection Profile part2, Protection Profile for Smart Cards with the Application Program Loading Function (version 1.7e), Version 1.7e",
"not_valid_after": null,
"not_valid_before": "2003-11-14",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0307.pdf",
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ppcr0307.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"EAL4+"
]
},
"status": "active",
"version": "1.7e"
}
}