IDeal PASS, version 2 - Application BAC
CSV information ?
Status | active |
---|---|
Valid from | 22.07.2014 |
Valid until | 08.01.2026 |
Scheme | 🇫🇷 FR |
Manufacturer | MORPHO / Infineon Technologies AG |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | EAL4+, ALC_TAT.2, ATE_DPT.3, ADV_INT.2, ALC_DVS.2, ADV_TDS.4, ADV_FSP.5, ALC_CMS.5 |
Maintenance updates | Reassessment report: ANSSI-CC-2014/53-S02 (01.08.2021) Certification report |
Maintenance report : ANSSI-CC-2014/53-M01 (29.11.2022) Certification report Security target |
Heuristics summary ?
Certificate ?
Extracted keywords
Vendor
IDEMIASecurity level
EAL4Security Assurance Requirements (SAR)
ADV_FSP.5, ADV_INT.2, ADV_TDS.4, ALC_CMS.5, ALC_DVS.2, ALC_TAT.2, ATE_DPT.3Protection profiles
BSI-CC-PP-0055-2009Certificates
ANSSI-CC-2014/53-S02Evaluation facilities
CEA-LETIStandards
ICAOFile metadata
Creation date: | D:20210208172956+01'00' |
---|---|
Modification date: | D:20210208172956+01'00' |
Pages: | 2 |
Creator: | PScript5.dll Version 5.2.2 |
Producer: | Acrobat Distiller 11.0 (Windows) |
Certification report ?
Extracted keywords
Symmetric Algorithms
DES, TDESHash functions
SHA-2Libraries
v1.02.013CPLC
IC Fabricator, IC TypeVendor
Infineon Technologies AG, Infineon Technologies, Infineon, MorphoSecurity level
EAL 4, EAL4, EAL6, EAL7, EAL 7, ITSEC E6 ElevéSecurity Assurance Requirements (SAR)
ADV_FSP.5, ADV_INT.2, ADV_TDS.4, ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE, AGD_PRE, ALC_CMS.5, ALC_DVS.2, ALC_TAT.2, ALC_FLR.1, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_DPT.3, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN, AVA_VAN.3, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSSProtection profiles
BSI-CC-PP-0055-2009, BSI-PP-0035-2007, BSI-PP-0055-2009Certificates
BSI-DSZ-CC-0782-2012, ANSSI-CC-2014/53Evaluation facilities
CESTI, CEA - LETI, CEA-LETIStandards
ICAO, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004File metadata
Title: | RapportARES(BAC).v003 |
---|---|
Pages: | 14 |
Creator: | PDFCreator Version 1.2.1 |
Producer: | GPL Ghostscript 9.02 |
Frontpage
Certificate ID: | ANSSI-CC-2014/53 |
---|---|
Certified item: | IDeal PASS, version 2 - Application BAC |
Certification lab: | CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France |
Developer: | MORPHO 18 Chaussée Jules César, 95520 Osny, France Infineon Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire MORPHO 18 Chaussée Jules César, 95520 Osny, France |
References
Outgoing- BSI-DSZ-CC-0782-2012 - Infineon Security Controller M7892 B11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01 and Toolbox v1.02.013 libraries and with specific IC dedicated software (firmware)
Security target ?
Extracted keywords
Symmetric Algorithms
AES, DES, Triple-DES, TDES, KMACAsymmetric Algorithms
ECDH, ECDSA, Diffie-Hellman, DHHash functions
SHA-1, SHA1, SHA224, SHA-256, SHA384, SHA512, SHA-224Schemes
MACRandomness
RNGLibraries
v1.02.013Block cipher modes
CBCIC data groups
EF.DG1, EF.DG2, EF.DG3, EF.DG4, EF.DG5, EF.DG16, EF.DG13, EF.DG14, EF.DG15, EF.COM, EF.SODVendor
Infineon, MorphoSecurity level
EAL6+, EAL 4, EAL4, EAL 4 augmented, EAL4 augmentedClaims
A.MRTD_, OE.MRTD_, OE.BAC-Security Assurance Requirements (SAR)
ADV_FSP.5, ADV_INT.2, ADV_TDS.4, ADV_COMP.1, ALC_FLR.1, ALC_DVS.2, ALC_CMS.5, ALC_TAT.2, ALC_COMP.1, ATE_DPT.3, ATE_COMP.1, AVA_VAN, AVA_COMP.1, ASE_COMP.1, ASE_COMPSecurity Functional Requirements (SFR)
FAU_SAS, FAU_GEN, FAU_SAS.1, FAU_SAS.1.1, FCS_RND, FCS_CKM.1, FCS_RND.1, FCS_RND.1.1, FCS_CKM.1.1, FCS_CKM.4, FCS_CKM.4.1, FCS_COP, FCS_COP.1, FDP_ACF, FDP_ACC.1, FDP_ACC.1.1, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_UCT.1, FDP_UCT.1.1, FDP_UIT.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_ITT.1, FDP_IFC.1, FDP_SDI.2, FDP_SDI.1, FIA_SOS.2, FIA_UAU.4, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.4.1, FIA_UAU.5, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.6, FIA_UAU.6.1, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_API, FIA_API.1, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD, FMT_MTD.1, FMT_MSA.1, FMT_MSA.3, FPT_EMS, FPT_EMS.1, FPT_EMS.1.1, FPT_EMS.1.2, FPT_FLS.1, FPT_FLS.1.1, FPT_TST.1, FPT_PHP.3, FPT_PHP.3.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_LIM.2, FPT_ITT.1, FPT_TST.2, FRU_FLT.2Protection profiles
BSI-CC-PP-0055, BSI-CC-PP-0056, BSI-PP-0002-2001Certificates
BSI-DSZ-CC-0782-2012Side-channel analysis
physical probing, side channel, DPA, SPA, timing attacks, physical tampering, Physical tampering, Physical Tampering, Malfunction, malfunction, DFA, fault induction, fault injectionStandards
FIPS 180-2, FIPS 46-3, FIPS PUB 46-3, AIS31, RFC3369, ISO/IEC 7816-4, ICAO, CCMB-2006-09-001, CCMB-2007-09-002, CCMB-2007-09-003, CCMB-2007-09-004Technical reports
BSI 2006File metadata
Title: | Title |
---|---|
Author: | Merrien |
Creation date: | D:20140417153007 |
Modification date: | D:20140417153007 |
Pages: | 80 |
Creator: | Microsoft® Office Word 2007 |
Producer: | Microsoft® Office Word 2007 |
References
Outgoing- BSI-DSZ-CC-0782-2012 - Infineon Security Controller M7892 B11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01 and Toolbox v1.02.013 libraries and with specific IC dedicated software (firmware)
Heuristics ?
Extracted SARs
ALC_FLR.1, ALC_CMS.5, ALC_TAT.2, ADV_FSP.5, ASE_COMP.1, ADV_COMP.1, ADV_TDS.4, ATE_COMP.1, ATE_DPT.3, ALC_DVS.2, AVA_COMP.1, ADV_INT.2, AVA_VAN.3, ALC_COMP.1Scheme data ?
Product | IDeal PASS, version 2 - Application BAC | |
---|---|---|
Url | https://cyber.gouv.fr/produits-certifies/ideal-pass-version-2-application-bac | |
Description | Le produit évalué est la carte à puce fermée « IDeal PASS, version 2 - Application BAC ». Le produit est développé par la société Morpho et embarqué sur le microcontrôleur M7892 B11, en configuration SLE78CLFX3000P ou SLE78CLFX4000P, de la société Infineon Technologies. Le produit évalué est de type « carte à puce » avec et sans contact. Il implémente les fonctions de document de voyage électro | |
Sponsor | MORPHO | |
Developer | MORPHO / Infineon Technologies AG | |
Cert Id | 2014/53 | |
Level | EAL4+ | |
Expiration Date | 8 Janvier 2026 | |
Enhanced | ||
Cert Id | 2014/53 | |
Certification Date | 22/07/2014 | |
Expiration Date | 08/01/2026 | |
Category | Cartes à puce | |
Cc Version | Critères Communs version 3.1r4 | |
Developer | MORPHO / Infineon Technologies AG | |
Sponsor | MORPHO | |
Evaluation Facility | CEA - LETI | |
Level | EAL4+ | |
Protection Profile | BSI-CC-PP-0055-2009 | |
Mutual Recognition | SOG-IS CCRA | |
Augmented | ADV_FSP.5, ADV_INT.2, ADV_TDS.4, ALC_CMS.5, ALC_DVS.2, ALC_TAT.2, ATE_DPT.3 | |
Target Link | https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2014-53en.pdf | |
Report Link | https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2014-53fr.pdf | |
Cert Link | https://cyber.gouv.fr/sites/default/files/2014/07/certificat-anssi-cc-2014_53-s02.pdf |
References ?
Updates ?
-
15.02.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The following values were inserted:
{'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'c04c68a4752a3c954acc8495c3a9f1a1355569a4fbabe19ea2987cdce73ca3db', 'txt_hash': 'b9d760452041fd0449aba5c1e4202b670097e682b3762f2011da0dccefcb2ab4'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '952dc319f0e392769b8163f1e72771d9154b66d136875b382c5d016c29c6d0d3', 'txt_hash': '96e9cbfe0a9c1747f4ed7812b6de1ec01a50719e4e63c850014616b9d929844d'}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'b270a737f1435e236c006a479bbb941646e7cba916f2a59bc8b1a0dcc32f2d56', 'txt_hash': 'e0cd1b7ddb059089610193edea4dc8cc44162a9559c3da7175c46f5209869f94'}}
. - The following properties were deleted:
['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash']
.
The PDF extraction data was updated.
- The following values were inserted:
{'cert_metadata': {'pdf_file_size_bytes': 289407, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 2, '/Author': '', '/CreationDate': "D:20210208172956+01'00'", '/Creator': 'PScript5.dll Version 5.2.2', '/ModDate': "D:20210208172956+01'00'", '/Producer': 'Acrobat Distiller 11.0 (Windows)', '/Title': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}, 'cert_frontpage': None, 'cert_keywords': {'cc_cert_id': {'FR': {'ANSSI-CC-2014/53-S02': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0055-2009': 1}}, 'cc_security_level': {'EAL': {'EAL4': 1}}, 'cc_sar': {'ADV': {'ADV_FSP.5': 1, 'ADV_INT.2': 1, 'ADV_TDS.4': 1}, 'ALC': {'ALC_CMS.5': 1, 'ALC_DVS.2': 1, 'ALC_TAT.2': 1}, 'ATE': {'ATE_DPT.3': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Idemia': {'IDEMIA': 2}}, 'eval_facility': {'CEA-LETI': {'CEA-LETI': 2}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ICAO': {'ICAO': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}, 'cert_filename': 'Certificat ANSSI-CC-2014_53-S02.pdf'}
. - The report_frontpage property was set to
{'FR': {'match_rules': ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables'], 'cert_id': 'ANSSI-CC-2014/53', 'cert_item': 'IDeal PASS, version 2 - Application BAC', 'cert_item_version': 'Version 2', 'ref_protection_profiles': 'Machine Readable Travel Document with „ICAO Application”, Basic Access Control Version 1.10, BSI-CC-PP-0055-2009', 'cc_version': 'Critères Communs version 3.1 révision 4', 'cc_security_level': 'EAL 4 augmenté ADV_FSP.5, ADV_INT.2, ADV_TDS.4, ALC_CMS.5, ALC_DVS.2, ALC_TAT.2, ATE_DPT.3', 'developer': 'MORPHO 18 Chaussée Jules César, 95520 Osny, France Infineon Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire MORPHO 18 Chaussée Jules César, 95520 Osny, France', 'cert_lab': 'CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France'}}
. - The st_frontpage property was set to
None
. - The report_keywords property was updated, with the
{'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0782-2012': 2}}, 'FR': {'__update__': {'ANSSI-CC-2014/53': 15}}}}}
data. - The st_keywords property was updated, with the
{'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0782-2012': 3}}}}}
data.
- The following values were inserted:
-
13.02.2024 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0782-2012': 4}}, 'FR': {'__update__': {'ANSSI-CC-2014/53': 30}}}}}
data. - The st_keywords property was updated, with the
{'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0782-2012': 6}}}}}
data.
- The report_keywords property was updated, with the
-
07.02.2024 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'cc_cert_id': {'__delete__': ['CA']}}
data.
- The report_keywords property was updated, with the
-
07.02.2024 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'cc_cert_id': {'__insert__': {'CA': {'1 1 1': 21, '1 2 3': 5, '5 5 6': 1, '1 1 2': 1, '2 3 3': 1, '5 6 4': 1, '4 5 5': 2, '5 5 5': 1, '1 2 2': 5, '2 2 2': 2, '3 3 2': 1, '1 1 3': 1, '2 2 1': 1, '2 2 3': 1}}, '__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0782-2012': 2}}, 'FR': {'__update__': {'ANSSI-CC-2014/53': 15}}}}}
data. - The st_keywords property was updated, with the
{'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0782-2012': 3}}}}}
data.
- The report_keywords property was updated, with the
-
05.02.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'description': 'Le produit évalué est la carte à puce fermée « IDeal PASS, version 2 - Application BAC ». Le produit est développé par la société Morpho et embarqué sur le microcontrôleur M7892 B11, en configuration SLE78CLFX3000P ou SLE78CLFX4000P, de la société Infineon Technologies.\n\nLe produit évalué est de type « carte à puce » avec et sans contact. Il implémente les fonctions de document de voyage électro'}
data.
- The scheme_data property was updated, with the
-
04.01.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'annotated_references': None}
. - The scheme_data property was updated, with the
{'product': 'IDeal PASS, version 2 - Application BAC', 'url': 'https://cyber.gouv.fr/produits-certifies/ideal-pass-version-2-application-bac', 'enhanced': {'__insert__': {'cert_id': '2014/53', 'sponsor': 'MORPHO', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ADV_FSP.5, ADV_INT.2, ADV_TDS.4, ALC_CMS.5, ALC_DVS.2, ALC_TAT.2, ATE_DPT.3'}, '__update__': {'developer': 'MORPHO / Infineon Technologies AG', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2014-53fr.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2014-53en.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/2014/07/certificat-anssi-cc-2014_53-s02.pdf'}, '__delete__': ['id', 'augmentations', 'recognition', 'description']}}
data.
- The following values were inserted:
-
21.09.2023 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'product': 'IDeal PASS, version 2 – Application BAC\n\t\t\t\n\t\t\tDernier rapport de maintenance :2014/53-M01Dernier rapport de surveillance :2014/53-S02', 'level': 'EAL4+', 'id': '2014/53', 'url': 'https://www.ssi.gouv.fr/certification_cc/ideal-pass-version-2-application-bac/', 'enhanced': {'__update__': {'id': '2014/53', 'level': 'EAL4+', 'augmentations': 'ADV_FSP.5, ADV_INT.2, ADV_TDS.4, ALC_CMS.5, ALC_DVS.2, ALC_TAT.2, ATE_DPT.3', 'protection_profile': 'BSI-CC-PP-0055-2009', 'description': "Descriptif du produit\n\t\t\t\tLe produit évalué est la carte à puce fermée « IDeal PASS, version 2 – Application BAC ». Le produit est développé par la société Morpho et embarqué sur le microcontrôleur M7892 B11, en configuration SLE78CLFX3000P ou SLE78CLFX4000P, de la société Infineon Technologies.\nLe produit évalué est de type « carte à puce » avec et sans contact. Il implémente les fonctions de document de voyage électronique conformément aux spécifications de l'organisation de l'aviation civile internationale (OACI1). Ce produit est destiné à permettre la vérification de l'authenticité du document de voyage et à identifier son porteur lors d'un contrôle frontalier, à l'aide d'un système d'inspection.\nCe microcontrôleur et son logiciel embarqué ont vocation à être insérés dans la couverture des passeports traditionnels. Ils peuvent être intégrés sous forme de module ou d'inlay. Le produit final peut être un passeport, une carte plastique, etc.\n\t\t\t\t\n Rapport de certification\nSecurity target\nCertificat\n \t\t\t\t\t\n \t\t\t\t\t\n \n \n Rapports de maintenance2014/53-M01 - 28/12/2022\n \n Rapports de surveillance2014/53-S02 - 08/01/2021", 'report_link': 'https://www.ssi.gouv.fr/uploads/IMG/certificat/ANSSI-CC_2014-53fr.pdf', 'target_link': 'https://www.ssi.gouv.fr/uploads/IMG/certificat/ANSSI-CC-cible_2014-53en.pdf', 'cert_link': 'https://www.ssi.gouv.fr/uploads/2014/07/certificat-anssi-cc-2014_53-s02.pdf'}}}
data.
- The scheme_data property was updated, with the
-
26.04.2023 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'scheme_data': {'product': 'IDeal PASS, version 2 – Application EAC avec PACE\n\t\t\t\n\t\t\tDernier rapport de maintenance :2014/54-M01Dernier rapport de surveillance :2014/54-S02', 'vendor': 'MORPHO / Infineon Technologies AGMORPHO', 'level': 'EAL5+', 'id': '2014/54', 'certification_date': '22/07/2014', 'category': 'Smart cards', 'url': 'https://www.ssi.gouv.fr/certification_cc/ideal-pass-version-2-application-eac-avec-pace/', 'enhanced': {'id': '2014/54', 'certification_date': '22/07/2014', 'expiration_date': '08/01/2026', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 3.1r4', 'level': 'EAL5+', 'augmentations': 'ALC_DVS.2, AVA_VAN.5', 'protection_profile': 'BSI-CC-PP-0056-V2-2012-MA-02, BSI-CC-PP-0068-V2-2011', 'developer': 'MORPHO / Infineon Technologies AG / MORPHO', 'evaluation_facility': 'CEA - LETI', 'recognition': 'SOG-IS - CCRA', 'description': "Descriptif du produit\n\t\t\t\tLe produit évalué est la carte à puce fermée « IDeal PASS, version 2 – Application EAC avec PACE ». Le produit est développé par la société Morpho et embarqué sur le microcontrôleur M7892 B11, en configuration SLE78CLFX3000P ou SLE78CLFX4000P, de la société Infineon Technologies.\nLe produit évalué est de type « carte à puce » avec et sans contact. Il implémente les fonctions de document de voyage électronique conformément aux spécifications de l'organisation de l'aviation civile internationale (OACI1). Ce produit est destiné à permettre la vérification de l'authenticité du document de voyage et à identifier son porteur lors d'un contrôle frontalier, à l'aide d'un système d'inspection.\nCe microcontrôleur et son logiciel embarqué ont vocation à être insérés dans la couverture des passeports traditionnels. Ils peuvent être intégrés sous forme de module ou d'inlay. Le produit final peut être un passeport, une carte plastique, etc.\n\t\t\t\t\n Rapport de certification\nSecurity target\nCertificat\n \t\t\t\t\t\n \t\t\t\t\t\n \n \n Rapports de maintenance2014/54-M01 - 02/12/2022\n \n Rapports de surveillance2014/54-S02 - 08/01/2021", 'report_link': 'https://www.ssi.gouv.fr/uploads/IMG/certificat/ANSSI-CC_2014-54fr.pdf', 'target_link': 'https://www.ssi.gouv.fr/uploads/IMG/certificat/ANSSI-CC-cible_2014-54en.pdf', 'cert_link': 'https://www.ssi.gouv.fr/uploads/2014/07/certificat-anssi-cc-2014_54-s02.pdf'}}}
.
- The following values were inserted:
-
11.02.2023 The certificate data changed.
Certificate changed
The _type was updated.
- The new value is
sec_certs.sample.cc.CCCertificate
.
The Maintenance Updates of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': '2021-08-01', 'maintenance_title': 'Reassessment report: ANSSI-CC-2014/53-S02', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC-2014_53-S02.pdf', 'maintenance_st_link': None}, {'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': '2022-11-29', 'maintenance_title': 'Maintenance report : ANSSI-CC-2014/53-M01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2014_53-m01.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC-cible_2014-53en.pdf'}]}
.
The state of the certificate object was updated.
- The _type property was set to
sec_certs.sample.cc.CCCertificate.InternalState
. - The following properties were deleted:
['errors']
.
The PDF extraction data was updated.
- The _type property was set to
sec_certs.sample.cc.CCCertificate.PdfData
.
The computed heuristics were updated.
- The following values were inserted:
{'direct_transitive_cves': None, 'indirect_transitive_cves': None}
. - The _type property was set to
sec_certs.sample.cc.CCCertificate.Heuristics
. - The following properties were deleted:
['direct_dependency_cves', 'indirect_dependency_cves']
.
- The new value is
-
26.12.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The st_references property was updated, with the
{'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0758-2012']}}}
data.
- The st_references property was updated, with the
-
25.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
True
. - The st_convert_ok property was set to
True
. - The st_extract_ok property was set to
True
. - The errors property was set to
[]
. - The st_pdf_hash property was set to
952dc319f0e392769b8163f1e72771d9154b66d136875b382c5d016c29c6d0d3
. - The st_txt_hash property was set to
96e9cbfe0a9c1747f4ed7812b6de1ec01a50719e4e63c850014616b9d929844d
.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 901664, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 80, '/Title': 'Title', '/Author': 'Merrien', '/Creator': 'Microsoft® Office Word 2007', '/CreationDate': 'D:20140417153007', '/ModDate': 'D:20140417153007', '/Producer': 'Microsoft® Office Word 2007', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_frontpage property was set to
{'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}
. - The st_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0782-2012': 6}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0055': 2, 'BSI-CC-PP-0056': 1, 'BSI-PP-0002-2001': 1}}, 'cc_security_level': {'EAL': {'EAL6+': 1, 'EAL 4': 1, 'EAL4': 2, 'EAL 4 augmented': 1, 'EAL4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_FSP.5': 3, 'ADV_INT.2': 3, 'ADV_TDS.4': 3, 'ADV_COMP.1': 1}, 'ALC': {'ALC_FLR.1': 1, 'ALC_DVS.2': 4, 'ALC_CMS.5': 3, 'ALC_TAT.2': 3, 'ALC_COMP.1': 1}, 'ATE': {'ATE_DPT.3': 3, 'ATE_COMP.1': 1}, 'AVA': {'AVA_VAN': 1, 'AVA_COMP.1': 1}, 'ASE': {'ASE_COMP.1': 1, 'ASE_COMP': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS': 6, 'FAU_GEN': 1, 'FAU_SAS.1': 9, 'FAU_SAS.1.1': 2}, 'FCS': {'FCS_RND': 7, 'FCS_CKM.1': 5, 'FCS_RND.1': 6, 'FCS_RND.1.1': 2, 'FCS_CKM.1.1': 1, 'FCS_CKM.4': 2, 'FCS_CKM.4.1': 1, 'FCS_COP': 11, 'FCS_COP.1': 5}, 'FDP': {'FDP_ACF': 1, 'FDP_ACC.1': 5, 'FDP_ACC.1.1': 1, 'FDP_ACF.1': 6, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_UCT.1': 2, 'FDP_UCT.1.1': 1, 'FDP_UIT.1': 2, 'FDP_UIT.1.1': 1, 'FDP_UIT.1.2': 1, 'FDP_ITT.1': 8, 'FDP_IFC.1': 6, 'FDP_SDI.2': 2, 'FDP_SDI.1': 4}, 'FIA': {'FIA_SOS.2': 1, 'FIA_UAU.4': 9, 'FIA_UID.1': 2, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_UAU.1': 2, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.4.1': 1, 'FIA_UAU.5': 4, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UAU.6': 4, 'FIA_UAU.6.1': 1, 'FIA_AFL.1': 3, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_API': 1, 'FIA_API.1': 1}, 'FMT': {'FMT_LIM': 7, 'FMT_LIM.1': 16, 'FMT_LIM.2': 14, 'FMT_LIM.1.1': 2, 'FMT_LIM.2.1': 3, 'FMT_SMF.1': 4, 'FMT_SMF.1.1': 1, 'FMT_SMR.1': 2, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MTD': 9, 'FMT_MTD.1': 4, 'FMT_MSA.1': 3, 'FMT_MSA.3': 3}, 'FPT': {'FPT_EMS': 6, 'FPT_EMS.1': 6, 'FPT_EMS.1.1': 3, 'FPT_EMS.1.2': 3, 'FPT_FLS.1': 11, 'FPT_FLS.1.1': 1, 'FPT_TST.1': 4, 'FPT_PHP.3': 17, 'FPT_PHP.3.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_LIM.2': 1, 'FPT_ITT.1': 7, 'FPT_TST.2': 2}, 'FRU': {'FRU_FLT.2': 1}}, 'cc_claims': {'A': {'A.MRTD_': 1}, 'OE': {'OE.MRTD_': 6, 'OE.BAC-': 1}}, 'vendor': {'Infineon': {'Infineon': 5}, 'Morpho': {'Morpho': 86}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 3}}, 'DES': {'DES': {'DES': 5}, '3DES': {'Triple-DES': 8, 'TDES': 5}}, 'constructions': {'MAC': {'KMAC': 1}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 1}, 'ECDSA': {'ECDSA': 4}}, 'FF': {'DH': {'Diffie-Hellman': 2, 'DH': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 4, 'SHA1': 2}, 'SHA2': {'SHA224': 3, 'SHA-256': 2, 'SHA384': 2, 'SHA512': 2, 'SHA-224': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 6}}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 6}}, 'cipher_mode': {'CBC': {'CBC': 4}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Infineon': {'v1.02.013': 1}}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 4, 'side channel': 2, 'DPA': 2, 'SPA': 1, 'timing attacks': 1}, 'FI': {'physical tampering': 1, 'Physical tampering': 1, 'Physical Tampering': 3, 'Malfunction': 7, 'malfunction': 4, 'DFA': 1, 'fault induction': 1, 'fault injection': 2}}, 'technical_report_id': {'BSI': {'BSI 2006': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {'EF': {'EF.DG1': 22, 'EF.DG2': 9, 'EF.DG3': 7, 'EF.DG4': 7, 'EF.DG5': 7, 'EF.DG16': 20, 'EF.DG13': 4, 'EF.DG14': 3, 'EF.DG15': 1, 'EF.COM': 9, 'EF.SOD': 10}}, 'standard_id': {'FIPS': {'FIPS 180-2': 1, 'FIPS 46-3': 2, 'FIPS PUB 46-3': 2}, 'BSI': {'AIS31': 2}, 'RFC': {'RFC3369': 1}, 'ISO': {'ISO/IEC 7816-4': 1}, 'ICAO': {'ICAO': 14}, 'CC': {'CCMB-2006-09-001': 1, 'CCMB-2007-09-002': 1, 'CCMB-2007-09-003': 1, 'CCMB-2007-09-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_filename property was set to
2014_0000001657 - ASE - ARES - Security Target Lite for BAC.pdf
.
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-2012']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-2012']}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_COMP', 'level': 1}]}
values added.
- The st_download_ok property was set to
-
25.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
False
. - The st_convert_ok property was set to
False
. - The st_extract_ok property was set to
False
. - The errors property was set to
['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/2014_0000001657%20-%20ASE%20-%20ARES%20-%20Security%20Target%20Lite%20for%20BAC.pdf, code: nok']
. - The st_pdf_hash property was set to
None
. - The st_txt_hash property was set to
None
.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_frontpage property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_COMP', 'level': 1}]}
values discarded.
- The st_download_ok property was set to
-
24.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
True
. - The st_convert_ok property was set to
True
. - The st_extract_ok property was set to
True
. - The errors property was set to
[]
. - The st_pdf_hash property was set to
952dc319f0e392769b8163f1e72771d9154b66d136875b382c5d016c29c6d0d3
. - The st_txt_hash property was set to
96e9cbfe0a9c1747f4ed7812b6de1ec01a50719e4e63c850014616b9d929844d
.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 901664, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 80, '/Title': 'Title', '/Author': 'Merrien', '/Creator': 'Microsoft® Office Word 2007', '/CreationDate': 'D:20140417153007', '/ModDate': 'D:20140417153007', '/Producer': 'Microsoft® Office Word 2007', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_frontpage property was set to
{'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}
. - The st_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0782-2012': 6}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0055': 2, 'BSI-CC-PP-0056': 1, 'BSI-PP-0002-2001': 1}}, 'cc_security_level': {'EAL': {'EAL6+': 1, 'EAL 4': 1, 'EAL4': 2, 'EAL 4 augmented': 1, 'EAL4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_FSP.5': 3, 'ADV_INT.2': 3, 'ADV_TDS.4': 3, 'ADV_COMP.1': 1}, 'ALC': {'ALC_FLR.1': 1, 'ALC_DVS.2': 4, 'ALC_CMS.5': 3, 'ALC_TAT.2': 3, 'ALC_COMP.1': 1}, 'ATE': {'ATE_DPT.3': 3, 'ATE_COMP.1': 1}, 'AVA': {'AVA_VAN': 1, 'AVA_COMP.1': 1}, 'ASE': {'ASE_COMP.1': 1, 'ASE_COMP': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS': 6, 'FAU_GEN': 1, 'FAU_SAS.1': 9, 'FAU_SAS.1.1': 2}, 'FCS': {'FCS_RND': 7, 'FCS_CKM.1': 5, 'FCS_RND.1': 6, 'FCS_RND.1.1': 2, 'FCS_CKM.1.1': 1, 'FCS_CKM.4': 2, 'FCS_CKM.4.1': 1, 'FCS_COP': 11, 'FCS_COP.1': 5}, 'FDP': {'FDP_ACF': 1, 'FDP_ACC.1': 5, 'FDP_ACC.1.1': 1, 'FDP_ACF.1': 6, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_UCT.1': 2, 'FDP_UCT.1.1': 1, 'FDP_UIT.1': 2, 'FDP_UIT.1.1': 1, 'FDP_UIT.1.2': 1, 'FDP_ITT.1': 8, 'FDP_IFC.1': 6, 'FDP_SDI.2': 2, 'FDP_SDI.1': 4}, 'FIA': {'FIA_SOS.2': 1, 'FIA_UAU.4': 9, 'FIA_UID.1': 2, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_UAU.1': 2, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.4.1': 1, 'FIA_UAU.5': 4, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UAU.6': 4, 'FIA_UAU.6.1': 1, 'FIA_AFL.1': 3, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_API': 1, 'FIA_API.1': 1}, 'FMT': {'FMT_LIM': 7, 'FMT_LIM.1': 16, 'FMT_LIM.2': 14, 'FMT_LIM.1.1': 2, 'FMT_LIM.2.1': 3, 'FMT_SMF.1': 4, 'FMT_SMF.1.1': 1, 'FMT_SMR.1': 2, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MTD': 9, 'FMT_MTD.1': 4, 'FMT_MSA.1': 3, 'FMT_MSA.3': 3}, 'FPT': {'FPT_EMS': 6, 'FPT_EMS.1': 6, 'FPT_EMS.1.1': 3, 'FPT_EMS.1.2': 3, 'FPT_FLS.1': 11, 'FPT_FLS.1.1': 1, 'FPT_TST.1': 4, 'FPT_PHP.3': 17, 'FPT_PHP.3.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_LIM.2': 1, 'FPT_ITT.1': 7, 'FPT_TST.2': 2}, 'FRU': {'FRU_FLT.2': 1}}, 'cc_claims': {'A': {'A.MRTD_': 1}, 'OE': {'OE.MRTD_': 6, 'OE.BAC-': 1}}, 'vendor': {'Infineon': {'Infineon': 5}, 'Morpho': {'Morpho': 86}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 3}}, 'DES': {'DES': {'DES': 5}, '3DES': {'Triple-DES': 8, 'TDES': 5}}, 'constructions': {'MAC': {'KMAC': 1}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 1}, 'ECDSA': {'ECDSA': 4}}, 'FF': {'DH': {'Diffie-Hellman': 2, 'DH': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 4, 'SHA1': 2}, 'SHA2': {'SHA224': 3, 'SHA-256': 2, 'SHA384': 2, 'SHA512': 2, 'SHA-224': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 6}}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 6}}, 'cipher_mode': {'CBC': {'CBC': 4}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Infineon': {'v1.02.013': 1}}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 4, 'side channel': 2, 'DPA': 2, 'SPA': 1, 'timing attacks': 1}, 'FI': {'physical tampering': 1, 'Physical tampering': 1, 'Physical Tampering': 3, 'Malfunction': 7, 'malfunction': 4, 'DFA': 1, 'fault induction': 1, 'fault injection': 2}}, 'technical_report_id': {'BSI': {'BSI 2006': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {'EF': {'EF.DG1': 22, 'EF.DG2': 9, 'EF.DG3': 7, 'EF.DG4': 7, 'EF.DG5': 7, 'EF.DG16': 20, 'EF.DG13': 4, 'EF.DG14': 3, 'EF.DG15': 1, 'EF.COM': 9, 'EF.SOD': 10}}, 'standard_id': {'FIPS': {'FIPS 180-2': 1, 'FIPS 46-3': 2, 'FIPS PUB 46-3': 2}, 'BSI': {'AIS31': 2}, 'RFC': {'RFC3369': 1}, 'ISO': {'ISO/IEC 7816-4': 1}, 'ICAO': {'ICAO': 14}, 'CC': {'CCMB-2006-09-001': 1, 'CCMB-2007-09-002': 1, 'CCMB-2007-09-003': 1, 'CCMB-2007-09-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_filename property was set to
2014_0000001657 - ASE - ARES - Security Target Lite for BAC.pdf
.
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-2012']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-2012', 'BSI-DSZ-CC-0758-2012']}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_COMP', 'level': 1}]}
values added.
- The st_download_ok property was set to
-
24.12.2022 The certificate data changed.
Certificate changed
The cert_link was updated.
- The new value is
https://www.commoncriteriaportal.org/files/epfiles/Certificat%20ANSSI-CC-2014_53-S02.pdf
.
The manufacturer_web was updated.
- The new value is
https://www.morpho.com
.
The Protection profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': "Protection Profile for Machine Readable Travel Document with 'ICAO Application', Basic Acce...", 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0055b.pdf', 'pp_ids': None}]}
.
- The new value is
-
23.12.2022 The certificate data changed.
Certificate changed
The cert_link was updated.
- The new value is
None
.
The manufacturer_web was updated.
- The new value is
None
.
The Protection profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'MRTD_ICAO_BA_V1.10', 'pp_eal': None, 'pp_link': None, 'pp_ids': None}]}
.
- The new value is
-
23.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
False
. - The st_convert_ok property was set to
False
. - The st_extract_ok property was set to
False
. - The errors property was set to
['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/2014_0000001657%20-%20ASE%20-%20ARES%20-%20Security%20Target%20Lite%20for%20BAC.pdf, code: nok']
. - The st_pdf_hash property was set to
None
. - The st_txt_hash property was set to
None
.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_frontpage property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_COMP', 'level': 1}]}
values discarded.
- The st_download_ok property was set to
-
21.12.2022 The certificate data changed.
Certificate changed
The Maintenance Updates of the certificate were updated.
- The following values were added:
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.common_criteria.CommonCriteriaCert.MaintenanceReport', 'maintenance_date': '2022-11-29', 'maintenance_title': 'Maintenance report : ANSSI-CC-2014/53-M01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2014_53-m01.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC-cible_2014-53en.pdf'}]}
.
- The following values were added:
-
05.10.2022 The certificate data changed.
Certificate changed
The Protection profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': "Protection Profile for Machine Readable Travel Document with 'ICAO Application', Basic Acce...", 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0055b.pdf', 'pp_ids': None}]}
.
The state of the certificate object was updated.
- The following values were inserted:
{'st_convert_garbage': False, 'report_convert_garbage': False}
.
- The new value is
-
04.10.2022 The certificate data changed.
Certificate changed
The Protection profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': "Protection Profile for Machine Readable Travel Document with 'ICAO Application', Basic Acce...", 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/pp0055b.pdf', 'pp_link': None, 'pp_ids': None}]}
.
- The new value is
-
24.09.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The following values were inserted:
{'report_filename': 'ANSSI-CC-2014_53.pdf', 'st_filename': '2014_0000001657 - ASE - ARES - Security Target Lite for BAC.pdf'}
. - The report_keywords property was updated, with the
{'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0782-2012': 4}}}}, 'cc_security_level': {'__update__': {'EAL': {'__insert__': {'EAL7': 1}, '__update__': {'EAL4': 2}, '__delete__': ['EAL 4+']}}}, 'cc_sar': {'__update__': {'ALC': {'__update__': {'ALC_FLR': 2}, '__delete__': ['ALC_LCD']}, 'ATE': {'__update__': {'ATE_DPT.3': 2}}}}, 'cc_claims': {}, 'vendor': {'__update__': {'Infineon': {'__insert__': {'Infineon Technologies': 1}, '__update__': {'Infineon': 2}}, 'Morpho': {'__update__': {'Morpho': 7}}}}, 'eval_facility': {'__update__': {'CESTI': {'__update__': {'CESTI': 3}}, 'CEA-LETI': {'__insert__': {'CEA-LETI': 2}}}}, 'symmetric_crypto': {'__update__': {'DES': {'__update__': {'DES': {'__update__': {'DES': 1}}}}}}, 'tee_name': {}, 'standard_id': {'__update__': {'ICAO': {'__update__': {'ICAO': 2}}, 'CC': {'__insert__': {'CCMB-2012-09-003': 1, 'CCMB-2012-09-004': 1}}}}}
data. - The st_keywords property was updated, with the
{'cc_sar': {'__update__': {'ATE': {'__update__': {'ATE_DPT.3': 3}}}}, 'cc_sfr': {'__update__': {'FAU': {'__update__': {'FAU_SAS.1': 9}}, 'FCS': {'__insert__': {'FCS_COP': 11, 'FCS_COP.1': 5}, '__update__': {'FCS_RND': 7, 'FCS_RND.1': 6, 'FCS_CKM.1': 5}}, 'FDP': {'__update__': {'FDP_ACC.1': 5, 'FDP_UIT.1': 2, 'FDP_ITT.1': 8, 'FDP_SDI.2': 2, 'FDP_SDI.1': 4}}, 'FIA': {'__insert__': {'FIA_API': 1, 'FIA_API.1': 1}, '__update__': {'FIA_UAU.4': 9, 'FIA_UID.1': 2, 'FIA_AFL.1': 3}}, 'FMT': {'__insert__': {'FMT_MTD': 9, 'FMT_MTD.1': 4}, '__update__': {'FMT_LIM.1': 16, 'FMT_LIM.2': 14, 'FMT_SMF.1': 4, 'FMT_SMR.1': 2, 'FMT_MSA.1': 3, 'FMT_MSA.3': 3}}, 'FPT': {'__insert__': {'FPT_TST.2': 2}, '__update__': {'FPT_EMS': 6, 'FPT_FLS.1': 11, 'FPT_PHP.3': 17, 'FPT_TST.1': 4, 'FPT_ITT.1': 7}}}}, 'cc_claims': {'__update__': {'A': {'__delete__': ['A']}}, '__delete__': ['D', 'T']}, 'vendor': {'__update__': {'Morpho': {'__update__': {'Morpho': 86}}}}, 'symmetric_crypto': {'__update__': {'AES_competition': {'__update__': {'AES': {'__update__': {'AES': 3}}}, '__delete__': ['DEAL']}, 'DES': {'__update__': {'DES': {'__update__': {'DES': 5}}, '3DES': {'__update__': {'Triple-DES': 8}}}}}}, 'asymmetric_crypto': {'__update__': {'ECC': {'__delete__': ['ECC']}, 'FF': {'__update__': {'DH': {'__update__': {'DH': 1}}}, '__delete__': ['DSA']}}}, 'crypto_scheme': {'__update__': {'MAC': {'__update__': {'MAC': 6}}}, '__delete__': ['KA']}, 'randomness': {'__update__': {'RNG': {'__delete__': ['RND']}}}, 'side_channel_analysis': {'__update__': {'SCA': {'__update__': {'physical probing': 4, 'SPA': 1}}, 'FI': {'__insert__': {'Physical Tampering': 3}, '__update__': {'Malfunction': 7}}}}, 'tee_name': {}, 'ic_data_group': {'__update__': {'EF': {'__update__': {'EF.DG4': 7, 'EF.DG16': 20, 'EF.COM': 9, 'EF.SOD': 10}}}}, 'standard_id': {'__insert__': {'ISO': {'ISO/IEC 7816-4': 1}}, '__update__': {'FIPS': {'__insert__': {'FIPS 180-2': 1}}, 'ICAO': {'__update__': {'ICAO': 14}}}}}
data.
- The following values were inserted:
-
18.07.2022 The certificate data changed.
Certificate changed
The _type was updated.
- The new value is
sec_certs.sample.common_criteria.CommonCriteriaCert
.
The Protection profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': "Protection Profile for Machine Readable Travel Document with 'ICAO Application', Basic Acce...", 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0055b.pdf', 'pp_ids': None}]}
.
The Maintenance Updates of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.common_criteria.CommonCriteriaCert.MaintenanceReport', 'maintenance_date': '2021-08-01', 'maintenance_title': 'Reassessment report: ANSSI-CC-2014/53-S02', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC-2014_53-S02.pdf', 'maintenance_st_link': None}]}
.
The state of the certificate object was updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState
.
The PDF extraction data was updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData
.
The computed heuristics were updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics
. - The st_references property was updated, with the
{'_type': 'sec_certs.sample.certificate.References'}
data. - The report_references property was updated, with the
{'_type': 'sec_certs.sample.certificate.References'}
data. - The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_COMP', 'level': 1}]}
.
- The new value is
-
17.07.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_metadata property was updated, with the
{'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
values inserted. - The st_metadata property was updated, with the
{'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
values inserted. - The report_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0782-2012': 2}, 'FR': {'ANSSI-CC-2014/53': 30}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0055-2009': 1, 'BSI-PP-0035-2007': 1, 'BSI-PP-0055-2009': 1}}, 'cc_security_level': {'EAL': {'EAL 4': 2, 'EAL6': 1, 'EAL4': 1, 'EAL 7': 1, 'EAL 4+': 1}, 'ITSEC': {'ITSEC E6 Elevé': 1}}, 'cc_sar': {'ADV': {'ADV_FSP.5': 2, 'ADV_INT.2': 2, 'ADV_TDS.4': 2, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_CMS.5': 2, 'ALC_DVS.2': 2, 'ALC_TAT.2': 2, 'ALC_FLR.1': 1, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_FLR': 1, 'ALC_LCD': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_DPT.3': 1, 'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN': 2, 'AVA_VAN.3': 2}, 'ASE': {'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {'T': {'T': 1}}, 'vendor': {'Infineon': {'Infineon Technologies AG': 1, 'Infineon': 3}, 'Morpho': {'Morpho': 4}}, 'eval_facility': {'CESTI': {'CESTI': 1}, 'CEA-LETI': {'CEA - LETI': 1}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 6}, '3DES': {'TDES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-2': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Infineon': {'v1.02.013': 4}}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 2}}, 'os_name': {}, 'cplc_data': {'ICFab': {'IC Fabricator': 1}, 'ICType': {'IC Type': 1}}, 'ic_data_group': {}, 'standard_id': {'ICAO': {'ICAO': 4}, 'CC': {'CCMB-2012-09-001': 1, 'CCMB-2012-09-002': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0782-2012': 6}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0055': 2, 'BSI-CC-PP-0056': 1, 'BSI-PP-0002-2001': 1}}, 'cc_security_level': {'EAL': {'EAL6+': 1, 'EAL 4': 1, 'EAL4': 2, 'EAL 4 augmented': 1, 'EAL4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_FSP.5': 3, 'ADV_INT.2': 3, 'ADV_TDS.4': 3, 'ADV_COMP.1': 1}, 'ALC': {'ALC_FLR.1': 1, 'ALC_DVS.2': 4, 'ALC_CMS.5': 3, 'ALC_TAT.2': 3, 'ALC_COMP.1': 1}, 'ATE': {'ATE_DPT.3': 2, 'ATE_COMP.1': 1}, 'AVA': {'AVA_VAN': 1, 'AVA_COMP.1': 1}, 'ASE': {'ASE_COMP.1': 1, 'ASE_COMP': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS': 6, 'FAU_GEN': 1, 'FAU_SAS.1': 7, 'FAU_SAS.1.1': 2}, 'FCS': {'FCS_RND': 6, 'FCS_RND.1': 5, 'FCS_RND.1.1': 2, 'FCS_CKM.1': 4, 'FCS_CKM.1.1': 1, 'FCS_CKM.4': 2, 'FCS_CKM.4.1': 1}, 'FDP': {'FDP_ACF': 1, 'FDP_ACC.1': 4, 'FDP_ACC.1.1': 1, 'FDP_ACF.1': 6, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_UCT.1': 2, 'FDP_UCT.1.1': 1, 'FDP_UIT.1': 1, 'FDP_UIT.1.1': 1, 'FDP_UIT.1.2': 1, 'FDP_ITT.1': 4, 'FDP_IFC.1': 6, 'FDP_SDI.2': 1, 'FDP_SDI.1': 3}, 'FIA': {'FIA_SOS.2': 1, 'FIA_UAU.4': 6, 'FIA_UID.1': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_UAU.1': 2, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.4.1': 1, 'FIA_UAU.5': 4, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UAU.6': 4, 'FIA_UAU.6.1': 1, 'FIA_AFL.1': 2, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1}, 'FMT': {'FMT_LIM': 7, 'FMT_LIM.1': 15, 'FMT_LIM.2': 12, 'FMT_LIM.1.1': 2, 'FMT_LIM.2.1': 3, 'FMT_SMF.1': 3, 'FMT_SMF.1.1': 1, 'FMT_SMR.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MSA.1': 2, 'FMT_MSA.3': 2}, 'FPT': {'FPT_EMS': 5, 'FPT_EMS.1': 6, 'FPT_EMS.1.1': 3, 'FPT_EMS.1.2': 3, 'FPT_FLS.1': 6, 'FPT_FLS.1.1': 1, 'FPT_PHP.3': 13, 'FPT_PHP.3.1': 1, 'FPT_TST.1': 2, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_LIM.2': 1, 'FPT_ITT.1': 6}, 'FRU': {'FRU_FLT.2': 1}}, 'cc_claims': {'D': {'D': 2}, 'T': {'T': 4}, 'A': {'A.MRTD_': 1, 'A': 5}, 'OE': {'OE.MRTD_': 6, 'OE.BAC-': 1}}, 'vendor': {'Infineon': {'Infineon': 5}, 'Morpho': {'Morpho': 5}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 2}, 'DEAL': {'DEAL': 1}}, 'DES': {'DES': {'DES': 16}, '3DES': {'Triple-DES': 6, 'TDES': 5}}, 'constructions': {'MAC': {'KMAC': 1}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 1}, 'ECDSA': {'ECDSA': 4}, 'ECC': {'ECC': 1}}, 'FF': {'DH': {'Diffie-Hellman': 2, 'DH': 3}, 'DSA': {'DSA': 5}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 4, 'SHA1': 2}, 'SHA2': {'SHA224': 3, 'SHA-256': 2, 'SHA384': 2, 'SHA512': 2, 'SHA-224': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 15}, 'KA': {'KA': 1}}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RND': 6, 'RNG': 6}}, 'cipher_mode': {'CBC': {'CBC': 4}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Infineon': {'v1.02.013': 1}}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 3, 'side channel': 2, 'DPA': 2, 'SPA': 2, 'timing attacks': 1}, 'FI': {'physical tampering': 1, 'Physical tampering': 1, 'Malfunction': 12, 'malfunction': 4, 'DFA': 1, 'fault induction': 1, 'fault injection': 2}}, 'technical_report_id': {'BSI': {'BSI 2006': 1}}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 4}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {'EF': {'EF.DG1': 22, 'EF.DG2': 9, 'EF.DG3': 7, 'EF.DG4': 6, 'EF.DG5': 7, 'EF.DG16': 19, 'EF.DG13': 4, 'EF.DG14': 3, 'EF.DG15': 1, 'EF.COM': 8, 'EF.SOD': 9}}, 'standard_id': {'FIPS': {'FIPS 46-3': 2, 'FIPS PUB 46-3': 2}, 'BSI': {'AIS31': 2}, 'RFC': {'RFC3369': 1}, 'ICAO': {'ICAO': 18}, 'CC': {'CCMB-2006-09-001': 1, 'CCMB-2007-09-002': 1, 'CCMB-2007-09-003': 1, 'CCMB-2007-09-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
.
The computed heuristics were updated.
- The _type property was set to
Heuristics
.
- The report_metadata property was updated, with the
-
14.06.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The following values were inserted:
{'report_pdf_hash': 'c04c68a4752a3c954acc8495c3a9f1a1355569a4fbabe19ea2987cdce73ca3db', 'st_pdf_hash': '952dc319f0e392769b8163f1e72771d9154b66d136875b382c5d016c29c6d0d3', 'report_txt_hash': 'b9d760452041fd0449aba5c1e4202b670097e682b3762f2011da0dccefcb2ab4', 'st_txt_hash': '96e9cbfe0a9c1747f4ed7812b6de1ec01a50719e4e63c850014616b9d929844d'}
.
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'rules_symmetric_crypto': {'DES': 5, 'TDES': 1}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {}, 'rules_randomness': {}, 'rules_tee': {'SE': 2}, 'rules_side_channels': {}}
values inserted. - The st_keywords property was updated, with the
{'rules_symmetric_crypto': {'AES': 2, 'DEAL': 1, 'DES': 11, 'TDES': 5, 'KMAC': 1}, 'rules_asymmetric_crypto': {'ECDH': 1, 'ECDSA': 4, 'ECC': 1, 'Diffie-Hellman': 2, 'DH': 3, 'DSA': 5}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA-1': 4, 'SHA1': 2, 'SHA224': 3, 'SHA-256': 2, 'SHA384': 2, 'SHA512': 2, 'SHA-224': 1}, 'rules_crypto_schemes': {'MAC': 15}, 'rules_randomness': {'RND': 6, 'RNG': 6}, 'rules_tee': {'SE': 4}, 'rules_side_channels': {'Malfunction': 12, 'malfunction': 4, 'physical probing': 3, 'physical tampering': 1, 'Physical tampering': 1, 'side channel': 2, 'SPA': 2, 'DPA': 2, 'DFA': 1, 'fault induction': 1, 'fault injection': 2, 'timing attacks': 1}}
values inserted.
- The following values were inserted:
-
13.05.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'SAR', 'family': 'ADV_COMP', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'SAR', 'family': 'ATE_COMP', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_COMP', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_COMP', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_COMP', 'level': 1}]}}
.
- The following values were inserted:
-
24.04.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'direct_dependency_cves': None, 'indirect_dependency_cves': None}
.
- The following values were inserted:
-
08.03.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-2012']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-2012', 'BSI-DSZ-CC-0758-2012']}}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-2012']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-2012']}}}
. - The following properties were deleted:
['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting']
.
- The following values were inserted:
-
18.02.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_frontpage property was updated, with the
{'nscib': {}, 'niap': {}, 'canada': {}}
values inserted. - The st_frontpage property was updated, with the
{'nscib': {}, 'niap': {}, 'canada': {}}
values inserted.
The computed heuristics were updated.
- The extracted_versions property was set to
{'_type': 'Set', 'elements': ['2']}
.
- The report_frontpage property was updated, with the
-
28.01.2022 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name IDeal PASS, version 2 - Application BAC was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/files/epfiles/Certificat%20ANSSI-CC-2014_53-S02.pdf",
"dgst": "21951e191e55b66e",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2014/53",
"cert_lab": [
"CEA"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_COMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_COMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_COMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_COMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"2"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0782-2012"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0782-2012"
]
}
},
"scheme_data": {
"cert_id": "2014/53",
"description": "Le produit \u00e9valu\u00e9 est la carte \u00e0 puce ferm\u00e9e \u00ab IDeal PASS, version 2 - Application BAC \u00bb. Le produit est d\u00e9velopp\u00e9 par la soci\u00e9t\u00e9 Morpho et embarqu\u00e9 sur le microcontr\u00f4leur M7892 B11, en configuration SLE78CLFX3000P ou SLE78CLFX4000P, de la soci\u00e9t\u00e9 Infineon Technologies.\n\nLe produit \u00e9valu\u00e9 est de type \u00ab carte \u00e0 puce \u00bb avec et sans contact. Il impl\u00e9mente les fonctions de document de voyage \u00e9lectro",
"developer": "MORPHO / Infineon Technologies AG",
"enhanced": {
"augmented": "ADV_FSP.5, ADV_INT.2, ADV_TDS.4, ALC_CMS.5, ALC_DVS.2, ALC_TAT.2, ATE_DPT.3",
"category": "Cartes \u00e0 puce",
"cc_version": "Crit\u00e8res Communs version 3.1r4",
"cert_id": "2014/53",
"cert_link": "https://cyber.gouv.fr/sites/default/files/2014/07/certificat-anssi-cc-2014_53-s02.pdf",
"certification_date": "22/07/2014",
"developer": "MORPHO / Infineon Technologies AG",
"evaluation_facility": "CEA - LETI",
"expiration_date": "08/01/2026",
"level": "EAL4+",
"mutual_recognition": "SOG-IS\n CCRA",
"protection_profile": "BSI-CC-PP-0055-2009",
"report_link": "https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2014-53fr.pdf",
"sponsor": "MORPHO",
"target_link": "https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2014-53en.pdf"
},
"expiration_date": "8 Janvier 2026",
"level": "EAL4+",
"product": "IDeal PASS, version 2 - Application BAC",
"sponsor": "MORPHO",
"url": "https://cyber.gouv.fr/produits-certifies/ideal-pass-version-2-application-bac"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0782-2012"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0758-2012",
"BSI-DSZ-CC-0782-2012"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2022-11-29",
"maintenance_report_link": "https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2014_53-m01.pdf",
"maintenance_st_link": "https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC-cible_2014-53en.pdf",
"maintenance_title": "Maintenance report : ANSSI-CC-2014/53-M01"
},
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2021-08-01",
"maintenance_report_link": "https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC-2014_53-S02.pdf",
"maintenance_st_link": null,
"maintenance_title": "Reassessment report: ANSSI-CC-2014/53-S02"
}
]
},
"manufacturer": "MORPHO / Infineon Technologies AG",
"manufacturer_web": "https://www.morpho.com",
"name": "IDeal PASS, version 2 - Application BAC",
"not_valid_after": "2026-01-08",
"not_valid_before": "2014-07-22",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "Certificat ANSSI-CC-2014_53-S02.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2014/53-S02": 2
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0055-2009": 1
}
},
"cc_sar": {
"ADV": {
"ADV_FSP.5": 1,
"ADV_INT.2": 1,
"ADV_TDS.4": 1
},
"ALC": {
"ALC_CMS.5": 1,
"ALC_DVS.2": 1,
"ALC_TAT.2": 1
},
"ATE": {
"ATE_DPT.3": 1
}
},
"cc_security_level": {
"EAL": {
"EAL4": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"CEA-LETI": {
"CEA-LETI": 2
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ICAO": {
"ICAO": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Idemia": {
"IDEMIA": 2
}
},
"vulnerability": {}
},
"cert_metadata": {
"/Author": "",
"/CreationDate": "D:20210208172956+01\u002700\u0027",
"/Creator": "PScript5.dll Version 5.2.2",
"/ModDate": "D:20210208172956+01\u002700\u0027",
"/Producer": "Acrobat Distiller 11.0 (Windows)",
"/Title": "",
"pdf_file_size_bytes": 289407,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 2
},
"report_filename": "ANSSI-CC-2014_53.pdf",
"report_frontpage": {
"FR": {
"cc_security_level": "EAL 4 augment\u00e9 ADV_FSP.5, ADV_INT.2, ADV_TDS.4, ALC_CMS.5, ALC_DVS.2, ALC_TAT.2, ATE_DPT.3",
"cc_version": "Crit\u00e8res Communs version 3.1 r\u00e9vision 4",
"cert_id": "ANSSI-CC-2014/53",
"cert_item": "IDeal PASS, version 2 - Application BAC",
"cert_item_version": "Version 2",
"cert_lab": "CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France",
"developer": "MORPHO 18 Chauss\u00e9e Jules C\u00e9sar, 95520 Osny, France Infineon Technologies AG AIM CC SM PS \u2013 Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire MORPHO 18 Chauss\u00e9e Jules C\u00e9sar, 95520 Osny, France",
"match_rules": [
"R\u00e9f\u00e9rence du rapport de certification(.+)Nom du produit(.+)R\u00e9f\u00e9rence/version du produit(.*)Conformit\u00e9 \u00e0 un profil de protection(.+)Crit\u00e8res d\u2019\u00e9valuation et version(.+)Niveau d\u2019\u00e9valuation(.+)D\u00e9veloppeurs(.+)Centre d\u2019\u00e9valuation(.+)Accords de reconnaissance applicables"
],
"ref_protection_profiles": "Machine Readable Travel Document with \u201eICAO Application\u201d, Basic Access Control Version 1.10, BSI-CC-PP-0055-2009"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0782-2012": 2
},
"FR": {
"ANSSI-CC-2014/53": 15
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0055-2009": 1,
"BSI-PP-0035-2007": 1,
"BSI-PP-0055-2009": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_FSP": 1,
"ADV_FSP.5": 2,
"ADV_IMP": 1,
"ADV_INT": 1,
"ADV_INT.2": 2,
"ADV_SPM": 1,
"ADV_TDS": 1,
"ADV_TDS.4": 2
},
"AGD": {
"AGD_OPE": 1,
"AGD_PRE": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMS": 1,
"ALC_CMS.5": 2,
"ALC_DEL": 1,
"ALC_DVS": 1,
"ALC_DVS.2": 2,
"ALC_FLR": 2,
"ALC_FLR.1": 1,
"ALC_TAT": 1,
"ALC_TAT.2": 2
},
"ASE": {
"ASE_CCL": 1,
"ASE_ECD": 1,
"ASE_INT": 1,
"ASE_OBJ": 1,
"ASE_REQ": 1,
"ASE_SPD": 1,
"ASE_TSS": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_DPT": 1,
"ATE_DPT.3": 2,
"ATE_FUN": 1,
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.3": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 2,
"EAL 7": 1,
"EAL4": 2,
"EAL6": 1,
"EAL7": 1
},
"ITSEC": {
"ITSEC E6 Elev\u00e9": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {
"ICFab": {
"IC Fabricator": 1
},
"ICType": {
"IC Type": 1
}
},
"crypto_engine": {},
"crypto_library": {
"Infineon": {
"v1.02.013": 4
}
},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"CEA-LETI": {
"CEA - LETI": 1,
"CEA-LETI": 2
},
"CESTI": {
"CESTI": 3
}
},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-2": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2012-09-001": 1,
"CCMB-2012-09-002": 1,
"CCMB-2012-09-003": 1,
"CCMB-2012-09-004": 1
},
"ICAO": {
"ICAO": 2
}
},
"symmetric_crypto": {
"DES": {
"3DES": {
"TDES": 1
},
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon": 2,
"Infineon Technologies": 1,
"Infineon Technologies AG": 1
},
"Morpho": {
"Morpho": 7
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "",
"/CreationDate": "",
"/Creator": "PDFCreator Version 1.2.1",
"/Keywords": "",
"/ModDate": "",
"/Producer": "GPL Ghostscript 9.02",
"/Subject": "",
"/Title": "RapportARES(BAC).v003",
"pdf_file_size_bytes": 127881,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 14
},
"st_filename": "2014_0000001657 - ASE - ARES - Security Target Lite for BAC.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDH": {
"ECDH": 1
},
"ECDSA": {
"ECDSA": 4
}
},
"FF": {
"DH": {
"DH": 1,
"Diffie-Hellman": 2
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0782-2012": 3
}
},
"cc_claims": {
"A": {
"A.MRTD_": 1
},
"OE": {
"OE.BAC-": 1,
"OE.MRTD_": 6
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0055": 2,
"BSI-CC-PP-0056": 1,
"BSI-PP-0002-2001": 1
}
},
"cc_sar": {
"ADV": {
"ADV_COMP.1": 1,
"ADV_FSP.5": 3,
"ADV_INT.2": 3,
"ADV_TDS.4": 3
},
"ALC": {
"ALC_CMS.5": 3,
"ALC_COMP.1": 1,
"ALC_DVS.2": 4,
"ALC_FLR.1": 1,
"ALC_TAT.2": 3
},
"ASE": {
"ASE_COMP": 1,
"ASE_COMP.1": 1
},
"ATE": {
"ATE_COMP.1": 1,
"ATE_DPT.3": 3
},
"AVA": {
"AVA_COMP.1": 1,
"AVA_VAN": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 1,
"EAL 4 augmented": 1,
"EAL4": 2,
"EAL4 augmented": 1,
"EAL6+": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1,
"FAU_SAS": 6,
"FAU_SAS.1": 9,
"FAU_SAS.1.1": 2
},
"FCS": {
"FCS_CKM.1": 5,
"FCS_CKM.1.1": 1,
"FCS_CKM.4": 2,
"FCS_CKM.4.1": 1,
"FCS_COP": 11,
"FCS_COP.1": 5,
"FCS_RND": 7,
"FCS_RND.1": 6,
"FCS_RND.1.1": 2
},
"FDP": {
"FDP_ACC.1": 5,
"FDP_ACC.1.1": 1,
"FDP_ACF": 1,
"FDP_ACF.1": 6,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_IFC.1": 6,
"FDP_ITT.1": 8,
"FDP_SDI.1": 4,
"FDP_SDI.2": 2,
"FDP_UCT.1": 2,
"FDP_UCT.1.1": 1,
"FDP_UIT.1": 2,
"FDP_UIT.1.1": 1,
"FDP_UIT.1.2": 1
},
"FIA": {
"FIA_AFL.1": 3,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_API": 1,
"FIA_API.1": 1,
"FIA_SOS.2": 1,
"FIA_UAU.1": 2,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UAU.4": 9,
"FIA_UAU.4.1": 1,
"FIA_UAU.5": 4,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 1,
"FIA_UAU.6": 4,
"FIA_UAU.6.1": 1,
"FIA_UID.1": 2,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1
},
"FMT": {
"FMT_LIM": 7,
"FMT_LIM.1": 16,
"FMT_LIM.1.1": 2,
"FMT_LIM.2": 14,
"FMT_LIM.2.1": 3,
"FMT_MSA.1": 3,
"FMT_MSA.3": 3,
"FMT_MTD": 9,
"FMT_MTD.1": 4,
"FMT_SMF.1": 4,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 2,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_EMS": 6,
"FPT_EMS.1": 6,
"FPT_EMS.1.1": 3,
"FPT_EMS.1.2": 3,
"FPT_FLS.1": 11,
"FPT_FLS.1.1": 1,
"FPT_ITT.1": 7,
"FPT_LIM.2": 1,
"FPT_PHP.3": 17,
"FPT_PHP.3.1": 1,
"FPT_TST.1": 4,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1,
"FPT_TST.2": 2
},
"FRU": {
"FRU_FLT.2": 1
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 4
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"Infineon": {
"v1.02.013": 1
}
},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 6
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 4,
"SHA1": 2
},
"SHA2": {
"SHA-224": 1,
"SHA-256": 2,
"SHA224": 3,
"SHA384": 2,
"SHA512": 2
}
}
},
"ic_data_group": {
"EF": {
"EF.COM": 9,
"EF.DG1": 22,
"EF.DG13": 4,
"EF.DG14": 3,
"EF.DG15": 1,
"EF.DG16": 20,
"EF.DG2": 9,
"EF.DG3": 7,
"EF.DG4": 7,
"EF.DG5": 7,
"EF.SOD": 10
}
},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 6
}
},
"side_channel_analysis": {
"FI": {
"DFA": 1,
"Malfunction": 7,
"Physical Tampering": 3,
"Physical tampering": 1,
"fault induction": 1,
"fault injection": 2,
"malfunction": 4,
"physical tampering": 1
},
"SCA": {
"DPA": 2,
"SPA": 1,
"physical probing": 4,
"side channel": 2,
"timing attacks": 1
}
},
"standard_id": {
"BSI": {
"AIS31": 2
},
"CC": {
"CCMB-2006-09-001": 1,
"CCMB-2007-09-002": 1,
"CCMB-2007-09-003": 1,
"CCMB-2007-09-004": 1
},
"FIPS": {
"FIPS 180-2": 1,
"FIPS 46-3": 2,
"FIPS PUB 46-3": 2
},
"ICAO": {
"ICAO": 14
},
"ISO": {
"ISO/IEC 7816-4": 1
},
"RFC": {
"RFC3369": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 3
}
},
"DES": {
"3DES": {
"TDES": 5,
"Triple-DES": 8
},
"DES": {
"DES": 5
}
},
"constructions": {
"MAC": {
"KMAC": 1
}
}
},
"technical_report_id": {
"BSI": {
"BSI 2006": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon": 5
},
"Morpho": {
"Morpho": 86
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Merrien",
"/CreationDate": "D:20140417153007",
"/Creator": "Microsoft\u00ae Office Word 2007",
"/ModDate": "D:20140417153007",
"/Producer": "Microsoft\u00ae Office Word 2007",
"/Title": "Title",
"pdf_file_size_bytes": 901664,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 80
}
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": null,
"pp_ids": null,
"pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0055b.pdf",
"pp_name": "Protection Profile for Machine Readable Travel Document with \u0027ICAO Application\u0027, Basic Acce..."
}
]
},
"report_link": "https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC-2014_53.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"EAL4+",
"ALC_DVS.2",
"ALC_TAT.2",
"ADV_TDS.4",
"ATE_DPT.3",
"ADV_INT.2",
"ALC_CMS.5",
"ADV_FSP.5"
]
},
"st_link": "https://www.commoncriteriaportal.org/files/epfiles/2014_0000001657%20-%20ASE%20-%20ARES%20-%20Security%20Target%20Lite%20for%20BAC.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "b270a737f1435e236c006a479bbb941646e7cba916f2a59bc8b1a0dcc32f2d56",
"txt_hash": "e0cd1b7ddb059089610193edea4dc8cc44162a9559c3da7175c46f5209869f94"
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "c04c68a4752a3c954acc8495c3a9f1a1355569a4fbabe19ea2987cdce73ca3db",
"txt_hash": "b9d760452041fd0449aba5c1e4202b670097e682b3762f2011da0dccefcb2ab4"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "952dc319f0e392769b8163f1e72771d9154b66d136875b382c5d016c29c6d0d3",
"txt_hash": "96e9cbfe0a9c1747f4ed7812b6de1ec01a50719e4e63c850014616b9d929844d"
}
},
"status": "active"
}