Athena Smartcard ASEPCOS TS/CNS v1.82, build 0003 on ST23YR48/80 with NesLib v3.0

CSV information ?

Status archived
Valid from 08.12.2010
Valid until 01.09.2019
Scheme 🇫🇷 FR
Manufacturer Athena Smartcard Solutions Inc / STMicroelectronics
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level AVA_VAN.5, EAL4+
Protection profiles

Heuristics summary ?

Certificate ID: ANSSI-CC-2010/60

Certification report ?

Extracted keywords

Symmetric Algorithms
DES
Libraries
NesLib v2.0

Vendor
STMicroelectronics, Thales

Security level
EAL 4, EAL4, EAL6, EAL7, EAL 1, EAL 3, EAL 5, EAL 7, ITSEC E6 Elevé
Security Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_TDS, AGD_OPE, AGD_PRE, ALC_FLR.1, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSS
Protection profiles
BSI-PP0005-2002, BSI-PP0006-2002, BSI-PP-0005-2002, BSI-PP-0006-2002, BSI-PP-0035-2007, BSI-PP-0005-, BSI-PP- 0035-2007
Certificates
ANSSI-CC-2010/60, ANSSI-CC-2010_02, ANSSI-CC-2010_05
Evaluation facilities
THALES - CEACI

Standards
ISO/IEC 7816, ISO/IEC 14443, CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004

File metadata

Creation date: D:20110413174743+02'00'
Modification date: D:20110413174743+02'00'
Pages: 18
Producer: Acrobat Distiller 8.0.0 (Windows)

Frontpage

Certificate ID: ANSSI-CC-2010/60
Certified item: Carte ASEPCOS-TS/CNS, version 1.82, build 0003
Certification lab: THALES - CEACI (T3S – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France Tél : +33 (0)5 62 88 28 01 ou 18, mél : nathalie.feyt@thalesgroup.com
Developer: Athena Smartcard Ltd. Westpoint, 4 Redheughs Rigg, South Gyle, Edinburgh EH12 9DQ, Ecosse, Royaume-Uni STMicroelectronics Smartcard IC division, 190 Avenue CĂ©lestin Coq, 13106 Rousset Cedex, France Commanditaire Athena Smartcard Solutions 1-14-16 Motoyokoyama-cho, Hachioji-shi, Tokyo 192-0063, Japon

References

Outgoing
  • ANSSI-CC-2010/05 - Athena Smartcard Solutions, Inc. Carte ASEPCOS-TS/CNS DI, Version 1.81, Build 003
  • ANSSI-CC-2010/02 - STMicroelectronics SA23YR48/80B and SB23YR48/80B Secure Microcontrollers, including the cryptographic library Neslib v2.0 or v3.0, in SA or SB configuration

Security target ?

Extracted keywords

Symmetric Algorithms
DES, 3DES
Asymmetric Algorithms
ECC
Hash functions
SHA1, RIPEMD160
Schemes
MAC
Randomness
RNG
Libraries
NesLib v3.0, NesLib v2.0, NesLib 3.0
Block cipher modes
ECB, CBC

Vendor
STMicroelectronics, STM, Thales

Security level
EAL4, EAL 4+, EAL 6+, EAL4+, EAL 4, EAL4 augmented, EAL 4 augmented
Claims
T.SOFT_MOD, A.CGA, A.SCA, OE.HI_VAD
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_FLR.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.2, ATE_FUN.1, ATE_IND.2, AVA_VAN.5, AVA_MSU.3, AVA_VLA.4, AVA_VAN, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN, FCS_CKM.1, FCS_CKM.1.1, FCS_CKM.4, FCS_CKM.4.1, FCS_COP.1, FDP_ITC.1, FDP_SDI.1, FDP_ACC.1, FDP_ACC, FDP_ACF.1, FDP_ETC.1, FDP_RIP.1, FDP_RIP.1.1, FDP_SDI.2, FDP_UCT.1, FDP_UIT.1, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1, FIA_ATD.1.1, FIA_UAU.1, FIA_UAU.1.1, FIA_UID.1, FIA_UAU.1.2, FIA_UID.1.1, FIA_UID.1.2, FMT_MOF.1, FMT_MOF, FMT_MSA.1, FMT_MSA.2, FMT_MSA.2.1, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1, FMT_MTD.1.1, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_FLS.1, FPT_FLS.1.1, FPT_PHP.1, FPT_PHP.1.1, FPT_PHP.1.2, FPT_PHP.3, FPT_PHP.3.1, FPT_TEE.1, FPT_TEE.1.1, FPT_TEE.1.2, FPT_TST.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FTP_ITC.1, FTP_ITC, FTP_TRP, FTP_TRP.1
Protection profiles
BSI-PP-0035-2007, BSI-PP-0005-2002, BSI-PP-0006-2002
Certificates
ANSSI-CC-2010/02, ANSSI-2010/02
Evaluation facilities
Serma Technologies

Side-channel analysis
SPA, DPA, timing attacks, physical tampering

Standards
PKCS#1, AIS31, ISO/IEC 7816, ISO/IEC 14443, ICAO, CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003

File metadata

Creation date: D:20110415105753+02'00'
Modification date: D:20110415105753+02'00'
Pages: 38
Producer: Microsoft® Office Word 2007

References

Outgoing
  • ANSSI-CC-2010/02 - STMicroelectronics SA23YR48/80B and SB23YR48/80B Secure Microcontrollers, including the cryptographic library Neslib v2.0 or v3.0, in SA or SB configuration

Heuristics ?

Certificate ID: ANSSI-CC-2010/60

Extracted SARs

ALC_FLR.1, ADV_FSP.4, ATE_IND.2, ADV_TDS.3, ASE_CCL.1, ATE_COV.2, AVA_VAN.5, ALC_CMS.4, ASE_OBJ.2, ALC_DVS.1, AGD_PRE.1, ALC_CMC.4, AVA_VLA.4, ASE_REQ.2, ASE_INT.1, ASE_TSS.1, ALC_LCD.1, ALC_TAT.1, ALC_DEL.1, ASE_ECD.1, ATE_FUN.1, AVA_MSU.3, ASE_SPD.1, AGD_OPE.1, ATE_DPT.2, ADV_ARC.1, ADV_IMP.1

References ?

Updates ?

  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Athena Smartcard ASEPCOS TS/CNS v1.82, build 0003 on ST23YR48/80 with NesLib v3.0 was processed.

  • 01.02.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'ProtectionProfile', 'pp_name': 'Protection Profile - Secure Signature-Creation Device Type 2, Version 1.04', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0005b.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['SSCD_TYPE2_V1.04']}}, {'_type': 'ProtectionProfile', 'pp_name': 'Protection Profile - Secure Signature-Creation Device Type 3, Version 1.05', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0006b.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['SSCD_TYPE3_V1.05']}}]}.
  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The report_keywords property was updated, with the {'rules_cert_id': {'__insert__': {'ANSSI-CC-2010_02': 1, 'ANSSI-CC-2010_05': 1}}} data.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['3.0', '1.82']}.
    • The directly_affecting property was set to {'_type': 'Set', 'elements': ['ANSSI-CC-2010_02', 'ANSSI-CC-2010_05']}.
    • The indirectly_affecting property was set to {'_type': 'Set', 'elements': ['ANSSI-CC-2010_02', 'ANSSI-CC-2010_05']}.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': {'_type': 'Set', 'elements': ['ANSSI-2010/02', 'ANSSI-CC-2010/02']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['ANSSI-2010/02', 'ANSSI-CC-2010/02']}}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2010_02', 'ANSSI-CC-2010_05']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2010_02', 'ANSSI-CC-2010_05']}}}.
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'AVA_VLA', 'level': 4}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'SAR', 'family': 'AVA_MSU', 'level': 3}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 1}]}}.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': '6315265fac91cf021041843e78ca9dd659825fb5e3d55fe1a8401ffc915170c0', 'st_pdf_hash': '7865c6b30c6b4b8c1f42e20f9b1a63a6ceb5e843dddfc6ec34ba793db50a937a', 'report_txt_hash': '0c10b3bc2de24006b034860ffe3caae8e85ba07a2cf36368c4b7ad1f12de5738', 'st_txt_hash': '318e5cad7e5df5f64e7cd4295bbd538bdad7c34fb9a3311d4b32b4768332cf1e'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {'DES': 9}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {}, 'rules_randomness': {}, 'rules_tee': {'SE': 3}, 'rules_side_channels': {}} values inserted.
    • The st_keywords property was updated, with the {'rules_symmetric_crypto': {'DES': 2, '3DES': 2}, 'rules_asymmetric_crypto': {'ECC': 2}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA1': 1, 'RIPEMD160': 1}, 'rules_crypto_schemes': {'MAC': 1}, 'rules_randomness': {'RNG': 1}, 'rules_tee': {}, 'rules_side_channels': {'physical tampering': 4, 'SPA': 1, 'DPA': 2, 'timing attacks': 1}} values inserted.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': []}} values inserted.
    • The st_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': []}} values inserted.
    • The report_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2010/60': 38, 'ANSSI-CC-2010_02': 1, 'ANSSI-CC-2010_05': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP0005-2002': 1, 'BSI-PP0006-2002': 1, 'BSI-PP-0005-2002': 1, 'BSI-PP-0006-2002': 1, 'BSI-PP-0035-2007': 2, 'BSI-PP-0005-': 1, 'BSI-PP- 0035-2007': 1}}, 'cc_security_level': {'EAL': {'EAL 4': 3, 'EAL6': 1, 'EAL4': 1, 'EAL 1': 1, 'EAL 2': 1, 'EAL 3': 1, 'EAL 5': 1, 'EAL 6': 1, 'EAL 7': 1, 'EAL 4+': 1}, 'ITSEC': {'ITSEC E6 ElevĂ©': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_USR': 2, 'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_FLR.1': 1, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_FLR': 1, 'ALC_LCD': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.5': 3, 'AVA_VAN': 1}, 'ASE': {'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {'T': {'T': 1}}, 'vendor': {'STMicroelectronics': {'STMicroelectronics': 10}, 'Thales': {'Thales': 1}}, 'eval_facility': {'Thales': {'THALES - CEACI': 1}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 9}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Neslib': {'NesLib v2.0': 2}}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 3}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 7816': 4, 'ISO/IEC 14443': 4}, 'CC': {'CCMB-2009-07-001': 1, 'CCMB-2009-07-002': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2010/02': 6, 'ANSSI-2010/02': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0035-2007': 2, 'BSI-PP-0005-2002': 1, 'BSI-PP-0006-2002': 1}}, 'cc_security_level': {'EAL': {'EAL4': 3, 'EAL 4+': 4, 'EAL 6+': 3, 'EAL4+': 2, 'EAL 4': 1, 'EAL4 augmented': 2, 'EAL 4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.4': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.1': 1, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.2': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.5': 3, 'AVA_MSU.3': 1, 'AVA_VLA.4': 1, 'AVA_VAN': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN': 1}, 'FCS': {'FCS_CKM.1': 1, 'FCS_CKM.1.1': 1, 'FCS_CKM.4': 1, 'FCS_CKM.4.1': 1, 'FCS_COP.1': 1}, 'FDP': {'FDP_ITC.1': 2, 'FDP_SDI.1': 1, 'FDP_ACC.1': 1, 'FDP_ACF.1': 1, 'FDP_ETC.1': 1, 'FDP_RIP.1': 1, 'FDP_RIP.1.1': 1, 'FDP_SDI.2': 1, 'FDP_UCT.1': 1, 'FDP_UIT.1': 1}, 'FIA': {'FIA_AFL.1': 1, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_ATD.1': 1, 'FIA_ATD.1.1': 1, 'FIA_UAU.1': 1, 'FIA_UAU.1.1': 2, 'FIA_UAU.1.2': 1, 'FIA_UID.1': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1}, 'FMT': {'FMT_MOF.1': 1, 'FMT_MSA.1': 1, 'FMT_MSA.2': 1, 'FMT_MSA.2.1': 1, 'FMT_MSA.3': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD.1': 1, 'FMT_MTD.1.1': 1, 'FMT_SMF.1': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_FLS.1': 1, 'FPT_FLS.1.1': 1, 'FPT_PHP.1': 1, 'FPT_PHP.1.1': 1, 'FPT_PHP.1.2': 1, 'FPT_PHP.3': 1, 'FPT_PHP.3.1': 1, 'FPT_TEE.1': 1, 'FPT_TEE.1.1': 1, 'FPT_TEE.1.2': 1, 'FPT_TST.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1}, 'FTP': {'FTP_ITC.1': 1, 'FTP_TRP.1': 1}}, 'cc_claims': {'T': {'T.SOFT_MOD': 1}, 'A': {'A.CGA': 1, 'A.SCA': 1}, 'OE': {'OE.HI_VAD': 1}}, 'vendor': {'STMicroelectronics': {'STMicroelectronics': 59, 'STM': 47}, 'Thales': {'Thales': 1}}, 'eval_facility': {'Serma': {'Serma Technologies': 1}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 4}, '3DES': {'3DES': 2}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA1': 1}}, 'RIPEMD': {'RIPEMD160': 1}}, 'crypto_scheme': {'MAC': {'MAC': 1}}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 1}}, 'cipher_mode': {'ECB': {'ECB': 1}, 'CBC': {'CBC': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Neslib': {'NesLib v3.0': 2, 'NesLib v2.0': 1, 'NesLib 3.0': 1}}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'SPA': 2, 'DPA': 2, 'timing attacks': 1}, 'FI': {'physical tampering': 4}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'PKCS': {'PKCS#1': 1}, 'BSI': {'AIS31': 1}, 'ISO': {'ISO/IEC 7816': 2, 'ISO/IEC 14443': 2}, 'ICAO': {'ICAO': 3}, 'CC': {'CCMB-2009-07-001': 1, 'CCMB-2009-07-002': 1, 'CCMB-2009-07-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile - Secure Signature-Creation Device Type 3, Version 1.05', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0006b.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['SSCD_TYPE3_V1.05']}}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile - Secure Signature-Creation Device Type 2, Version 1.04', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0005b.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['SSCD_TYPE2_V1.04']}}]}.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]}.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': 'ANSSI-CC_2010-60fr.pdf', 'st_filename': 'ANSSI-CC-cible_2010-60en.pdf'}.
    • The report_frontpage property was updated, with the {'anssi': {'__update__': {'ref_protection_profiles': 'BSI-PP0005-2002]: SSCD Type 2 Version 1.04 [BSI-PP0006-2002]: SSCD Type 3 Version 1.05'}}} data.
    • The report_keywords property was updated, with the {'cc_security_level': {'__update__': {'EAL': {'__insert__': {'EAL7': 1}, '__update__': {'EAL 4': 2, 'EAL4': 2}, '__delete__': ['EAL 2', 'EAL 6', 'EAL 4+']}}}, 'cc_sar': {'__update__': {'AGD': {'__delete__': ['AGD_USR']}, 'ALC': {'__update__': {'ALC_FLR': 2}, '__delete__': ['ALC_LCD']}}}, 'cc_claims': {}, 'symmetric_crypto': {'__update__': {'DES': {'__update__': {'DES': {'__update__': {'DES': 1}}}}}}, 'tee_name': {}, 'standard_id': {'__update__': {'CC': {'__insert__': {'CCMB-2009-07-003': 1, 'CCMB-2009-07-004': 1}}}}} data.
    • The st_keywords property was updated, with the {'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL4': 4, 'EAL 6+': 4}}}}, 'cc_sar': {'__update__': {'AVA': {'__update__': {'AVA_VAN.5': 6}}}}, 'cc_sfr': {'__update__': {'FCS': {'__update__': {'FCS_COP.1': 3}}, 'FDP': {'__insert__': {'FDP_ACC': 1}, '__update__': {'FDP_ITC.1': 8, 'FDP_ACC.1': 6, 'FDP_ACF.1': 21, 'FDP_ETC.1': 3, 'FDP_SDI.2': 5, 'FDP_UCT.1': 2, 'FDP_UIT.1': 5}}, 'FIA': {'__update__': {'FIA_UID.1': 2}}, 'FMT': {'__insert__': {'FMT_MOF': 2}, '__update__': {'FMT_MSA.1': 3}}, 'FTP': {'__insert__': {'FTP_ITC': 4, 'FTP_TRP': 4}, '__update__': {'FTP_ITC.1': 12, 'FTP_TRP.1': 4}}}}, 'vendor': {'__update__': {'STMicroelectronics': {'__update__': {'STM': 10}}}}, 'symmetric_crypto': {'__update__': {'DES': {'__update__': {'DES': {'__update__': {'DES': 1}}}}}}, 'randomness': {'__update__': {'RNG': {'__update__': {'RNG': 2}}}}, 'side_channel_analysis': {'__update__': {'SCA': {'__update__': {'SPA': 1, 'DPA': 1}}}}} data.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-2010/02']}}, 'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-2010/02']}}} data.
    • The report_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2010/05', 'ANSSI-CC-2010/02']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2008/22', 'ANSSI-CC-2009/06', 'ANSSI-CC-2009/04', 'ANSSI-CC-2007/04', 'ANSSI-CC-2008/05', 'ANSSI-CC-2009/41', 'ANSSI-CC-2009/59', 'ANSSI-CC-2009/26', 'ANSSI-CC-2007/22', 'Certification Report 2007/04', 'ANSSI-CC-2009/51', 'ANSSI-CC-2009/28', 'ANSSI-CC-2010/05', 'ANSSI-CC-2008/03', 'ANSSI-CC-2009/62', 'ANSSI-CC-2010/01', 'ANSSI-CC-2009/05', 'ANSSI-CC-2009/50', 'ANSSI-CC-2010/02', 'ANSSI-CC-2009/11']}} data.
  • 28.09.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The report_references property was updated, with the {'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['Certification Report 2007/04']}}} data.
  • 04.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile - Secure Signature-Creation Device Type 2, Version 1.04', 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/pp0005b.pdf', 'pp_link': None, 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile - Secure Signature-Creation Device Type 3, Version 1.05', 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/pp0006b.pdf', 'pp_link': None, 'pp_ids': None}]}.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile - Secure Signature-Creation Device Type 3, Version 1.05', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0006b.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['SSCD_TYPE3_V1.05']}}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile - Secure Signature-Creation Device Type 2, Version 1.04', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0005b.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['SSCD_TYPE2_V1.04']}}]}.

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.
  • 22.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC-cible_2010-60en.pdf, code: nok'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}]} values discarded.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to 7865c6b30c6b4b8c1f42e20f9b1a63a6ceb5e843dddfc6ec34ba793db50a937a.
    • The st_txt_hash property was set to 318e5cad7e5df5f64e7cd4295bbd538bdad7c34fb9a3311d4b32b4768332cf1e.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 841016, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 38, '/CreationDate': "D:20110415105753+02'00'", '/Keywords': '', '/ModDate': "D:20110415105753+02'00'", '/Producer': 'Microsoft® Office Word 2007', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2010/02': 6, 'ANSSI-2010/02': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0035-2007': 2, 'BSI-PP-0005-2002': 1, 'BSI-PP-0006-2002': 1}}, 'cc_security_level': {'EAL': {'EAL4': 4, 'EAL 4+': 4, 'EAL 6+': 4, 'EAL4+': 2, 'EAL 4': 1, 'EAL4 augmented': 2, 'EAL 4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.4': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.1': 1, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.2': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.5': 6, 'AVA_MSU.3': 1, 'AVA_VLA.4': 1, 'AVA_VAN': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN': 1}, 'FCS': {'FCS_CKM.1': 1, 'FCS_CKM.1.1': 1, 'FCS_CKM.4': 1, 'FCS_CKM.4.1': 1, 'FCS_COP.1': 3}, 'FDP': {'FDP_ITC.1': 8, 'FDP_SDI.1': 1, 'FDP_ACC.1': 6, 'FDP_ACC': 1, 'FDP_ACF.1': 21, 'FDP_ETC.1': 3, 'FDP_RIP.1': 1, 'FDP_RIP.1.1': 1, 'FDP_SDI.2': 5, 'FDP_UCT.1': 2, 'FDP_UIT.1': 5}, 'FIA': {'FIA_AFL.1': 1, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_ATD.1': 1, 'FIA_ATD.1.1': 1, 'FIA_UAU.1': 1, 'FIA_UAU.1.1': 2, 'FIA_UID.1': 2, 'FIA_UAU.1.2': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1}, 'FMT': {'FMT_MOF.1': 1, 'FMT_MOF': 2, 'FMT_MSA.1': 3, 'FMT_MSA.2': 1, 'FMT_MSA.2.1': 1, 'FMT_MSA.3': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD.1': 1, 'FMT_MTD.1.1': 1, 'FMT_SMF.1': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_FLS.1': 1, 'FPT_FLS.1.1': 1, 'FPT_PHP.1': 1, 'FPT_PHP.1.1': 1, 'FPT_PHP.1.2': 1, 'FPT_PHP.3': 1, 'FPT_PHP.3.1': 1, 'FPT_TEE.1': 1, 'FPT_TEE.1.1': 1, 'FPT_TEE.1.2': 1, 'FPT_TST.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1}, 'FTP': {'FTP_ITC.1': 12, 'FTP_ITC': 4, 'FTP_TRP': 4, 'FTP_TRP.1': 4}}, 'cc_claims': {'T': {'T.SOFT_MOD': 1}, 'A': {'A.CGA': 1, 'A.SCA': 1}, 'OE': {'OE.HI_VAD': 1}}, 'vendor': {'STMicroelectronics': {'STMicroelectronics': 59, 'STM': 10}, 'Thales': {'Thales': 1}}, 'eval_facility': {'Serma': {'Serma Technologies': 1}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}, '3DES': {'3DES': 2}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA1': 1}}, 'RIPEMD': {'RIPEMD160': 1}}, 'crypto_scheme': {'MAC': {'MAC': 1}}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 2}}, 'cipher_mode': {'ECB': {'ECB': 1}, 'CBC': {'CBC': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Neslib': {'NesLib v3.0': 2, 'NesLib v2.0': 1, 'NesLib 3.0': 1}}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'SPA': 1, 'DPA': 1, 'timing attacks': 1}, 'FI': {'physical tampering': 4}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'PKCS': {'PKCS#1': 1}, 'BSI': {'AIS31': 1}, 'ISO': {'ISO/IEC 7816': 2, 'ISO/IEC 14443': 2}, 'ICAO': {'ICAO': 3}, 'CC': {'CCMB-2009-07-001': 1, 'CCMB-2009-07-002': 1, 'CCMB-2009-07-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to ANSSI-CC-cible_2010-60en.pdf.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2010/02']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2010/02']}} data.
    • The report_references property was updated, with the {'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2008/03']}}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}]} values added.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The report_references property was updated, with the {'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2008/03']}}} data.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The report_references property was updated, with the {'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2009/51', 'ANSSI-CC-2009/28']}}} data.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The report_references property was updated, with the {'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2007/22']}, '__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2009/51', 'ANSSI-CC-2009/28']}}} data.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The report_references property was updated, with the {'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2007/22']}}} data.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC-cible_2010-60en.pdf, code: nok'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The report_references property was updated, with the {'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2010/01', 'ANSSI-CC-2009/28']}}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}]} values discarded.
  • 26.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC_2010-60fr.pdf, code: nok'].
    • The st_pdf_hash property was set to 7865c6b30c6b4b8c1f42e20f9b1a63a6ceb5e843dddfc6ec34ba793db50a937a.
    • The st_txt_hash property was set to 318e5cad7e5df5f64e7cd4295bbd538bdad7c34fb9a3311d4b32b4768332cf1e.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 841016, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 38, '/CreationDate': "D:20110415105753+02'00'", '/Keywords': '', '/ModDate': "D:20110415105753+02'00'", '/Producer': 'Microsoft® Office Word 2007', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2010/02': 6, 'ANSSI-2010/02': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0035-2007': 2, 'BSI-PP-0005-2002': 1, 'BSI-PP-0006-2002': 1}}, 'cc_security_level': {'EAL': {'EAL4': 4, 'EAL 4+': 4, 'EAL 6+': 4, 'EAL4+': 2, 'EAL 4': 1, 'EAL4 augmented': 2, 'EAL 4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.4': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.1': 1, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.2': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.5': 6, 'AVA_MSU.3': 1, 'AVA_VLA.4': 1, 'AVA_VAN': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN': 1}, 'FCS': {'FCS_CKM.1': 1, 'FCS_CKM.1.1': 1, 'FCS_CKM.4': 1, 'FCS_CKM.4.1': 1, 'FCS_COP.1': 3}, 'FDP': {'FDP_ITC.1': 8, 'FDP_SDI.1': 1, 'FDP_ACC.1': 6, 'FDP_ACC': 1, 'FDP_ACF.1': 21, 'FDP_ETC.1': 3, 'FDP_RIP.1': 1, 'FDP_RIP.1.1': 1, 'FDP_SDI.2': 5, 'FDP_UCT.1': 2, 'FDP_UIT.1': 5}, 'FIA': {'FIA_AFL.1': 1, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_ATD.1': 1, 'FIA_ATD.1.1': 1, 'FIA_UAU.1': 1, 'FIA_UAU.1.1': 2, 'FIA_UID.1': 2, 'FIA_UAU.1.2': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1}, 'FMT': {'FMT_MOF.1': 1, 'FMT_MOF': 2, 'FMT_MSA.1': 3, 'FMT_MSA.2': 1, 'FMT_MSA.2.1': 1, 'FMT_MSA.3': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD.1': 1, 'FMT_MTD.1.1': 1, 'FMT_SMF.1': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_FLS.1': 1, 'FPT_FLS.1.1': 1, 'FPT_PHP.1': 1, 'FPT_PHP.1.1': 1, 'FPT_PHP.1.2': 1, 'FPT_PHP.3': 1, 'FPT_PHP.3.1': 1, 'FPT_TEE.1': 1, 'FPT_TEE.1.1': 1, 'FPT_TEE.1.2': 1, 'FPT_TST.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1}, 'FTP': {'FTP_ITC.1': 12, 'FTP_ITC': 4, 'FTP_TRP': 4, 'FTP_TRP.1': 4}}, 'cc_claims': {'T': {'T.SOFT_MOD': 1}, 'A': {'A.CGA': 1, 'A.SCA': 1}, 'OE': {'OE.HI_VAD': 1}}, 'vendor': {'STMicroelectronics': {'STMicroelectronics': 59, 'STM': 10}, 'Thales': {'Thales': 1}}, 'eval_facility': {'Serma': {'Serma Technologies': 1}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}, '3DES': {'3DES': 2}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA1': 1}}, 'RIPEMD': {'RIPEMD160': 1}}, 'crypto_scheme': {'MAC': {'MAC': 1}}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 2}}, 'cipher_mode': {'ECB': {'ECB': 1}, 'CBC': {'CBC': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Neslib': {'NesLib v3.0': 2, 'NesLib v2.0': 1, 'NesLib 3.0': 1}}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'SPA': 1, 'DPA': 1, 'timing attacks': 1}, 'FI': {'physical tampering': 4}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'PKCS': {'PKCS#1': 1}, 'BSI': {'AIS31': 1}, 'ISO': {'ISO/IEC 7816': 2, 'ISO/IEC 14443': 2}, 'ICAO': {'ICAO': 3}, 'CC': {'CCMB-2009-07-001': 1, 'CCMB-2009-07-002': 1, 'CCMB-2009-07-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to ANSSI-CC-cible_2010-60en.pdf.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2010/02']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2010/02']}} data.
    • The report_references property was updated, with the {'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2010/01', 'ANSSI-CC-2009/28']}}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}]} values added.
  • 05.02.2023 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to [].
  • 11.02.2023 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.cc.CCCertificate.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.InternalState.
    • The following properties were deleted: ['errors'].

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.PdfData.

    The computed heuristics were updated.

    • The following values were inserted: {'direct_transitive_cves': None, 'indirect_transitive_cves': None}.
    • The _type property was set to sec_certs.sample.cc.CCCertificate.Heuristics.
    • The following properties were deleted: ['direct_dependency_cves', 'indirect_dependency_cves'].

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": null,
  "dgst": "080aa6966d757f05",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "cert_id": "ANSSI-CC-2010/60",
    "cert_lab": [
      "THALES"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VLA",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_MSU",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "3.0",
        "1.82"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2010/05",
          "ANSSI-CC-2010/02"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2009/06",
          "ANSSI-CC-2009/50",
          "ANSSI-CC-2009/11",
          "ANSSI-CC-2010/02",
          "ANSSI-CC-2008/03",
          "ANSSI-CC-2009/26",
          "ANSSI-CC-2009/05",
          "ANSSI-CC-2010/01",
          "ANSSI-CC-2010/05",
          "ANSSI-CC-2008/22",
          "ANSSI-CC-2009/51",
          "ANSSI-CC-2007/22",
          "ANSSI-CC-2009/28",
          "ANSSI-CC-2008/05",
          "ANSSI-CC-2007/04",
          "ANSSI-CC-2009/59",
          "ANSSI-CC-2009/62",
          "ANSSI-CC-2009/04",
          "ANSSI-CC-2009/41"
        ]
      }
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2010/02"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2010/02"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Athena Smartcard Solutions Inc / STMicroelectronics",
  "manufacturer_web": "https://www.athena-scs.com/",
  "name": "Athena Smartcard ASEPCOS TS/CNS v1.82, build 0003 on ST23YR48/80 with NesLib v3.0",
  "not_valid_after": "2019-09-01",
  "not_valid_before": "2010-12-08",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "report_filename": "ANSSI-CC_2010-60fr.pdf",
    "report_frontpage": {
      "anssi": {
        "cc_security_level": "EAL 4 augment\u00e9 AVA_VAN.5",
        "cc_version": "Crit\u00e8res Communs version 3.1",
        "cert_id": "ANSSI-CC-2010/60",
        "cert_item": "Carte ASEPCOS-TS/CNS, version 1.82, build 0003",
        "cert_item_version": "- Syst\u00e8me d\u2019exploitation ASEPCOS, avec application de signature \u00e9lectronique TS/CNS : v1.82, build 0003 - Microcontr\u00f4leur ST23YR48/ST23YR80 : r\u00e9vision B, configuration SB - Librairie cryptographique NesLib : v3.0",
        "cert_lab": "THALES - CEACI (T3S \u2013 CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France T\u00e9l : +33 (0)5 62 88 28 01 ou 18, m\u00e9l : nathalie.feyt@thalesgroup.com",
        "developer": "Athena Smartcard Ltd. Westpoint, 4 Redheughs Rigg, South Gyle, Edinburgh EH12 9DQ, Ecosse, Royaume-Uni STMicroelectronics Smartcard IC division, 190 Avenue C\u00e9lestin Coq, 13106 Rousset Cedex, France Commanditaire Athena Smartcard Solutions 1-14-16 Motoyokoyama-cho, Hachioji-shi, Tokyo 192-0063, Japon",
        "match_rules": [
          "R\u00e9f\u00e9rence du rapport de certification(.+)Nom du produit(.+)R\u00e9f\u00e9rence/version du produit(.+)Conformit\u00e9 \u00e0 un profil de protection(.+)Crit\u00e8res d\u2019\u00e9valuation et version(.+)Niveau d\u2019\u00e9valuation(.+)D\u00e9veloppeur\\(s\\)(.+)Centre d\u2019\u00e9valuation(.+)Accords de reconnaissance applicables"
        ],
        "ref_protection_profiles": "BSI-PP0005-2002]: SSCD Type 2 Version 1.04 [BSI-PP0006-2002]: SSCD Type 3 Version 1.05"
      },
      "bsi": {},
      "canada": {},
      "niap": {},
      "nscib": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2010/60": 38,
          "ANSSI-CC-2010_02": 1,
          "ANSSI-CC-2010_05": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP- 0035-2007": 1,
          "BSI-PP-0005-": 1,
          "BSI-PP-0005-2002": 1,
          "BSI-PP-0006-2002": 1,
          "BSI-PP-0035-2007": 2,
          "BSI-PP0005-2002": 1,
          "BSI-PP0006-2002": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_FSP": 1,
          "ADV_IMP": 1,
          "ADV_TDS": 1
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_PRE": 1
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMS": 1,
          "ALC_DEL": 1,
          "ALC_DVS": 1,
          "ALC_FLR": 2,
          "ALC_FLR.1": 1,
          "ALC_TAT": 1
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_ECD": 1,
          "ASE_INT": 1,
          "ASE_OBJ": 1,
          "ASE_REQ": 1,
          "ASE_SPD": 1,
          "ASE_TSS": 1
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_DPT": 1,
          "ATE_FUN": 1,
          "ATE_IND": 1
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.5": 3
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 3": 1,
          "EAL 4": 2,
          "EAL 5": 1,
          "EAL 7": 1,
          "EAL4": 2,
          "EAL6": 1,
          "EAL7": 1
        },
        "ITSEC": {
          "ITSEC E6 Elev\u00e9": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "Neslib": {
          "NesLib v2.0": 2
        }
      },
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Thales": {
          "THALES - CEACI": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2009-07-001": 1,
          "CCMB-2009-07-002": 1,
          "CCMB-2009-07-003": 1,
          "CCMB-2009-07-004": 1
        },
        "ISO": {
          "ISO/IEC 14443": 4,
          "ISO/IEC 7816": 4
        }
      },
      "symmetric_crypto": {
        "DES": {
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "STMicroelectronics": {
          "STMicroelectronics": 10
        },
        "Thales": {
          "Thales": 1
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20110413174743+02\u002700\u0027",
      "/Keywords": "",
      "/ModDate": "D:20110413174743+02\u002700\u0027",
      "/Producer": "Acrobat Distiller 8.0.0 (Windows)",
      "pdf_file_size_bytes": 169874,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 18
    },
    "st_filename": "ANSSI-CC-cible_2010-60en.pdf",
    "st_frontpage": {
      "anssi": {},
      "bsi": {},
      "canada": {},
      "niap": {},
      "nscib": {}
    },
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 2
          }
        }
      },
      "cc_cert_id": {
        "FR": {
          "ANSSI-2010/02": 1,
          "ANSSI-CC-2010/02": 6
        }
      },
      "cc_claims": {
        "A": {
          "A.CGA": 1,
          "A.SCA": 1
        },
        "OE": {
          "OE.HI_VAD": 1
        },
        "T": {
          "T.SOFT_MOD": 1
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP-0005-2002": 1,
          "BSI-PP-0006-2002": 1,
          "BSI-PP-0035-2007": 2
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.4": 1,
          "ADV_IMP.1": 1,
          "ADV_TDS.3": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 1,
          "ALC_FLR.1": 1,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.2": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_MSU.3": 1,
          "AVA_VAN": 1,
          "AVA_VAN.5": 6,
          "AVA_VLA.4": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 1,
          "EAL 4 augmented": 1,
          "EAL 4+": 4,
          "EAL 6+": 4,
          "EAL4": 4,
          "EAL4 augmented": 2,
          "EAL4+": 2
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 1
        },
        "FCS": {
          "FCS_CKM.1": 1,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.4": 1,
          "FCS_CKM.4.1": 1,
          "FCS_COP.1": 3
        },
        "FDP": {
          "FDP_ACC": 1,
          "FDP_ACC.1": 6,
          "FDP_ACF.1": 21,
          "FDP_ETC.1": 3,
          "FDP_ITC.1": 8,
          "FDP_RIP.1": 1,
          "FDP_RIP.1.1": 1,
          "FDP_SDI.1": 1,
          "FDP_SDI.2": 5,
          "FDP_UCT.1": 2,
          "FDP_UIT.1": 5
        },
        "FIA": {
          "FIA_AFL.1": 1,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_ATD.1": 1,
          "FIA_ATD.1.1": 1,
          "FIA_UAU.1": 1,
          "FIA_UAU.1.1": 2,
          "FIA_UAU.1.2": 1,
          "FIA_UID.1": 2,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1
        },
        "FMT": {
          "FMT_MOF": 2,
          "FMT_MOF.1": 1,
          "FMT_MSA.1": 3,
          "FMT_MSA.2": 1,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 1,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MTD.1": 1,
          "FMT_MTD.1.1": 1,
          "FMT_SMF.1": 1,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 1,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_FLS.1": 1,
          "FPT_FLS.1.1": 1,
          "FPT_PHP.1": 1,
          "FPT_PHP.1.1": 1,
          "FPT_PHP.1.2": 1,
          "FPT_PHP.3": 1,
          "FPT_PHP.3.1": 1,
          "FPT_TEE.1": 1,
          "FPT_TEE.1.1": 1,
          "FPT_TEE.1.2": 1,
          "FPT_TST.1": 1,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FTP": {
          "FTP_ITC": 4,
          "FTP_ITC.1": 12,
          "FTP_TRP": 4,
          "FTP_TRP.1": 4
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 1
        },
        "ECB": {
          "ECB": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "Neslib": {
          "NesLib 3.0": 1,
          "NesLib v2.0": 1,
          "NesLib v3.0": 2
        }
      },
      "crypto_protocol": {},
      "crypto_scheme": {
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Serma": {
          "Serma Technologies": 1
        }
      },
      "hash_function": {
        "RIPEMD": {
          "RIPEMD160": 1
        },
        "SHA": {
          "SHA1": {
            "SHA1": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 2
        }
      },
      "side_channel_analysis": {
        "FI": {
          "physical tampering": 4
        },
        "SCA": {
          "DPA": 1,
          "SPA": 1,
          "timing attacks": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS31": 1
        },
        "CC": {
          "CCMB-2009-07-001": 1,
          "CCMB-2009-07-002": 1,
          "CCMB-2009-07-003": 1
        },
        "ICAO": {
          "ICAO": 3
        },
        "ISO": {
          "ISO/IEC 14443": 2,
          "ISO/IEC 7816": 2
        },
        "PKCS": {
          "PKCS#1": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "3DES": {
            "3DES": 2
          },
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "STMicroelectronics": {
          "STM": 10,
          "STMicroelectronics": 59
        },
        "Thales": {
          "Thales": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/CreationDate": "D:20110415105753+02\u002700\u0027",
      "/Keywords": "",
      "/ModDate": "D:20110415105753+02\u002700\u0027",
      "/Producer": "Microsoft\u00ae Office Word 2007",
      "pdf_file_size_bytes": 841016,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 38
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": "EAL4+",
        "pp_ids": {
          "_type": "Set",
          "elements": [
            "SSCD_TYPE3_V1.05"
          ]
        },
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0006b.pdf",
        "pp_name": "Protection Profile - Secure Signature-Creation Device Type 3, Version 1.05"
      },
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": "EAL4+",
        "pp_ids": {
          "_type": "Set",
          "elements": [
            "SSCD_TYPE2_V1.04"
          ]
        },
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0005b.pdf",
        "pp_name": "Protection Profile - Secure Signature-Creation Device Type 2, Version 1.04"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC_2010-60fr.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "AVA_VAN.5",
      "EAL4+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC-cible_2010-60en.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "report_convert_garbage": false,
    "report_convert_ok": true,
    "report_download_ok": true,
    "report_extract_ok": true,
    "report_pdf_hash": "6315265fac91cf021041843e78ca9dd659825fb5e3d55fe1a8401ffc915170c0",
    "report_txt_hash": "0c10b3bc2de24006b034860ffe3caae8e85ba07a2cf36368c4b7ad1f12de5738",
    "st_convert_garbage": false,
    "st_convert_ok": true,
    "st_download_ok": true,
    "st_extract_ok": true,
    "st_pdf_hash": "7865c6b30c6b4b8c1f42e20f9b1a63a6ceb5e843dddfc6ec34ba793db50a937a",
    "st_txt_hash": "318e5cad7e5df5f64e7cd4295bbd538bdad7c34fb9a3311d4b32b4768332cf1e"
  },
  "status": "archived"
}