This page was not yet optimized for use on mobile devices.
Java Card Protection Profile - Closed Configuration
CSV information ?
Status: activeCertification date: 2018-07-31 00:00:00
Archived date: 2028-07-31 00:00:00
Scheme: 🇩🇪
Category: ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level: EAL4+
Frontpage information ?
Title: Java Card System - Closed Configuration Protection ProfileVersion: 3.0.5
Security level: EAL 4 augmented with AVA_VAN.5 “Advanced methodical vulnerability analysis” and ALC_DVS.2 “Sufficiency of security measures”. 1.2
Protection profile ?
Extracted keywords
Algorithms
AES, DES, Diffie-Hellman, ECDSA, MD5, RBG, RNG, SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, TRNGElliptic Curves
P-224, P-256, P-384, P-521JavaCard
Java Card 2.1.1Protection profiles
BSI-CC-PP-0084-2014, BSI-CC-PP-0099-2017Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_FSP.2, ADV_FSP.4, ADV_IMP.1, ADV_TDS.1, ADV_TDS.2, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.1, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.1, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.5Security Functional Requirements (SFR)
FAU_ARP.1, FAU_SAA.1, FCS_RNG, FCS_CKM.1, FCS_CKM.2, FCS_CKM.4, FCS_COP.1, FCS_RNG.1, FDP_ACC.1, FDP_ACF.1, FDP_IFC.1, FDP_IFF.1, FDP_ITC.1, FDP_ITC.2, FDP_RIP.1, FDP_ROL.1, FDP_SDI.2, FIA_ATD.1, FIA_UID.1, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_SMF.1, FMT_SMR.1, FPR_UNO.1, FPT_FLS.1, FPT_TDC.1Standards
FIPS 140-2, FIPS PUB 186-2, ISO/IEC 3309, ISO/IEC 3309, NIST SP 800-38D, PKCS#1, PKCS#5, PKCS1, PKCS5, RFC2409References ?
No references are available for this protection profile.
Raw data
{
"_id": "f1b99d3f578fd6b7cadf",
"csv_scan": {
"cc_archived_date": "2028-07-31 00:00:00",
"cc_category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cc_certification_date": "2018-07-31 00:00:00",
"cc_pp_name": "Java Card Protection Profile - Closed Configuration",
"cc_pp_version": "Version 3.0.5 July 2018",
"cc_security_level": "EAL4+",
"cert_status": "active",
"link_pp_document": "https://www.commoncriteriaportal.org/files/ppfiles/pp0101b_pdf.pdf",
"link_pp_report": "https://www.commoncriteriaportal.org/files/ppfiles/pp0101a_pdf.pdf",
"maintainance_updates": [],
"scheme": "DE"
},
"frontpage_scan": [
{
"cc_security_level": "EAL 4 augmented with AVA_VAN.5 \u201cAdvanced methodical vulnerability analysis\u201d and ALC_DVS.2 \u201cSufficiency of security measures\u201d. 1.2",
"cc_version": "3.1, revision 5",
"match_rules": [
"IDENTIFICATION.+?Title: (?P\u003cpp_title\u003e.+)?Version: (?P\u003cpp_version_number\u003e.+)?Publication date: (?P\u003cpp_date\u003e.+)?Certified by: (?P\u003cpp_registrator\u003e.+)?Sponsor: (?P\u003cpp_sponsor\u003e.+)?Review Committee: (?P\u003cpp_reviewer\u003e.+)?This Protection Profile is conformant to the Common Criteria version (?P\u003ccc_version\u003e.+)?The minimum assurance level for this Protection Profile is (?P\u003ccc_security_level\u003e.+)?PROTECTION PROFILE PRESENTATION"
],
"pp_date": "July 2018",
"pp_registrator": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"pp_registrator_simplified": "ANSSI_OR_BSI",
"pp_reviewer": "Java Card Forum \u2013 Common Criteria Subgroup",
"pp_sponsor": "Oracle Corporation, 500 Oracle Parkway, Redwood City, CA 94065 USA",
"pp_title": "Java Card System - Closed Configuration Protection Profile",
"pp_version_number": "3.0.5"
}
],
"keywords_scan": {
"block_cipher_modes": {
"CBC": {
"CBC": {
"count": 39
}
},
"ECB": {
"ECB": {
"count": 9
}
}
},
"rules_IC_data_groups": {},
"rules_cert_id": {},
"rules_certification_process": {
".{0,100}[oO]ut of [sS]cope.{0,100}": {
". This policy is better thought as a frame to be filled by ST implementers. Deletion of packages is out of scope for this PP. FDP_ACC.2/ADEL Complete access control FDP_ACC.2.1/ADEL The TSF shall enforce the ADEL": {
"count": 1
},
"a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives OE.SCP.RECOVERY and OE.SCP.SUPPORT are": {
"count": 1
},
"specific treatment. This PP is limited to installation of applet instances. Loading of packages is out of scope for this PP. \f74 Java Card System \u2013 Closed Configuration Protection Profile Version 3.0.5": {
"count": 1
}
},
"[\\.\\(].{0,100}?.[oO]ut of [sS]cope..{0,100}?[\\.\\)]": {
". That point is out of scope of this Protection Profile, though": {
"count": 1
},
". This PP is limited to installation of applet instances. Loading of packages is out of scope for this PP": {
"count": 1
},
". This policy is better thought as a frame to be filled by ST implementers. Deletion of packages is out of scope for this PP": {
"count": 1
}
},
"[oO]ut of [sS]cope": {
"out of scope": {
"count": 3
}
}
},
"rules_cplc": {},
"rules_crypto_algs": {
"AES[-]*(?:128|192|256|)": {
"AES": {
"count": 18
}
},
"DES": {
"DES": {
"count": 40
}
},
"Diffie-Hellman": {
"Diffie-Hellman": {
"count": 8
}
},
"ECDSA": {
"ECDSA": {
"count": 8
}
},
"MD5": {
"MD5": {
"count": 7
}
},
"RBG": {
"RBG": {
"count": 2
}
},
"RN[GD]": {
"RNG": {
"count": 21
}
},
"SHA-1": {
"SHA-1": {
"count": 2
}
},
"SHA[-]*(?:160|224|256|384|512)": {
"SHA-224": {
"count": 2
},
"SHA-256": {
"count": 3
},
"SHA-384": {
"count": 3
},
"SHA-512": {
"count": 3
}
},
"TRNG": {
"TRNG": {
"count": 2
}
}
},
"rules_crypto_engines": {},
"rules_crypto_libs": {},
"rules_defenses": {
"DPA": {
"DPA": {
"count": 1
}
},
"[Mm]alfunction": {
"malfunction": {
"count": 1
}
},
"[Pp]hysical [Pp]robing": {
"physical probing": {
"count": 2
}
},
"[Ss]ide.channels?": {
"side channel": {
"count": 1
}
},
"[pP]hysical [tT]ampering": {
"physical tampering": {
"count": 3
}
}
},
"rules_device_id": {},
"rules_ecc_curves": {
"P-(?:192|224|256|384|521)": {
"P-224": {
"count": 1
},
"P-256": {
"count": 1
},
"P-384": {
"count": 1
},
"P-521": {
"count": 1
}
}
},
"rules_javacard": {
"(?:Java Card|JavaCard) [2-3]\\.[0-9](?:\\.[0-9]|)": {
"Java Card 2.1.1": {
"count": 1
}
}
},
"rules_os": {},
"rules_other": {
"library": {
"library": {
"count": 10
}
}
},
"rules_protection_profiles": {
"BSI-(?:CC[-_]|)PP[-_]*.+?": {
"BSI-CC-PP-0084-2014": {
"count": 1
},
"BSI-CC-PP-0099-2017": {
"count": 1
}
}
},
"rules_security_assurance_components": {
"ADV_[A-Z][A-Z][A-Z](?:\\.[0-9]|)": {
"ADV_ARC.1": {
"count": 6
},
"ADV_FSP.1": {
"count": 4
},
"ADV_FSP.2": {
"count": 2
},
"ADV_FSP.4": {
"count": 10
},
"ADV_IMP.1": {
"count": 6
},
"ADV_TDS.1": {
"count": 2
},
"ADV_TDS.2": {
"count": 1
},
"ADV_TDS.3": {
"count": 9
}
},
"AGD_[A-Z][A-Z][A-Z](?:\\.[0-9]|)": {
"AGD_OPE.1": {
"count": 7
},
"AGD_PRE.1": {
"count": 6
}
},
"ALC_[A-Z][A-Z][A-Z](?:\\.[0-9]|)": {
"ALC_CMC.4": {
"count": 1
},
"ALC_CMS.1": {
"count": 1
},
"ALC_CMS.4": {
"count": 2
},
"ALC_DEL.1": {
"count": 1
},
"ALC_DVS.1": {
"count": 2
},
"ALC_DVS.2": {
"count": 8
},
"ALC_LCD.1": {
"count": 3
},
"ALC_TAT.1": {
"count": 3
}
},
"ASE_[A-Z][A-Z][A-Z](?:\\.[0-9]|)": {
"ASE_CCL.1": {
"count": 1
},
"ASE_ECD.1": {
"count": 5
},
"ASE_INT.1": {
"count": 5
},
"ASE_OBJ.2": {
"count": 3
},
"ASE_REQ.1": {
"count": 2
},
"ASE_REQ.2": {
"count": 3
},
"ASE_SPD.1": {
"count": 3
},
"ASE_TSS.1": {
"count": 1
}
},
"ATE_[A-Z][A-Z][A-Z](?:\\.[0-9]|)": {
"ATE_COV.1": {
"count": 2
},
"ATE_COV.2": {
"count": 3
},
"ATE_DPT.1": {
"count": 3
},
"ATE_FUN.1": {
"count": 7
},
"ATE_IND.2": {
"count": 1
}
},
"AVA_[A-Z][A-Z][A-Z](?:\\.[0-9]|)": {
"AVA_VAN.5": {
"count": 7
}
}
},
"rules_security_functional_components": {
"FAU_[A-Z][A-Z][A-Z](?:\\.[0-9]|)": {
"FAU_ARP.1": {
"count": 19
},
"FAU_SAA.1": {
"count": 3
}
},
"FCS_[A-Z][A-Z][A-Z](?:\\.[0-9]|)": {
"FCS_CKM.1": {
"count": 12
},
"FCS_CKM.2": {
"count": 1
},
"FCS_CKM.4": {
"count": 13
},
"FCS_COP.1": {
"count": 10
},
"FCS_RNG": {
"count": 6
},
"FCS_RNG.1": {
"count": 10
}
},
"FDP_[A-Z][A-Z][A-Z](?:\\.[0-9]|)": {
"FDP_ACC.1": {
"count": 12
},
"FDP_ACF.1": {
"count": 4
},
"FDP_IFC.1": {
"count": 10
},
"FDP_IFF.1": {
"count": 2
},
"FDP_ITC.1": {
"count": 2
},
"FDP_ITC.2": {
"count": 2
},
"FDP_RIP.1": {
"count": 1
},
"FDP_ROL.1": {
"count": 2
},
"FDP_SDI.2": {
"count": 3
}
},
"FIA_[A-Z][A-Z][A-Z](?:\\.[0-9]|)": {
"FIA_ATD.1": {
"count": 1
},
"FIA_UID.1": {
"count": 9
}
},
"FMT_[A-Z][A-Z][A-Z](?:\\.[0-9]|)": {
"FMT_MSA.1": {
"count": 6
},
"FMT_MSA.3": {
"count": 6
},
"FMT_MTD.1": {
"count": 1
},
"FMT_SMF.1": {
"count": 24
},
"FMT_SMR.1": {
"count": 34
}
},
"FPR_[A-Z][A-Z][A-Z](?:\\.[0-9]|)": {
"FPR_UNO.1": {
"count": 13
}
},
"FPT_[A-Z][A-Z][A-Z](?:\\.[0-9]|)": {
"FPT_FLS.1": {
"count": 13
},
"FPT_TDC.1": {
"count": 7
}
}
},
"rules_security_level": {
"EAL[ ]*[0-9+]+?": {
"EAL 4": {
"count": 1
},
"EAL4": {
"count": 5
}
},
"EAL[ ]*[0-9] augmented+?": {
"EAL 4 augmented": {
"count": 1
},
"EAL4 augmented": {
"count": 2
}
}
},
"rules_standard_id": {
"FIPS ?(?:PUB )?[0-9]+-[0-9]+?": {
"FIPS 140-2": {
"count": 1
},
"FIPS PUB 186-2": {
"count": 4
}
},
"ISO/IEC[ ]*[0-9]+": {
"ISO/IEC 3309": {
"count": 2
}
},
"ISO/IEC[ ]*[0-9]+[-]*[0-9]*": {
"ISO/IEC 3309": {
"count": 2
}
},
"NIST SP [0-9]+-[0-9]+?[a-zA-Z]?": {
"NIST SP 800-38D": {
"count": 1
}
},
"PKCS[ #]*[1-9]+": {
"PKCS#1": {
"count": 8
},
"PKCS#5": {
"count": 4
},
"PKCS1": {
"count": 16
},
"PKCS5": {
"count": 12
}
},
"RFC[ ]*[0-9]+?": {
"RFC2409": {
"count": 6
}
}
},
"rules_technical_reports": {},
"rules_vendor": {},
"rules_vulnerabilities": {}
},
"pp_analysis": {
"separate_profiles": []
},
"processed": {
"cc_pp_csvid": [],
"cert_id": ""
}
}