Application Mobile MasterCard PayPass V1 - M/Chip 4, version V01.00.04, sur plateforme NFC FlyBuy Platinum V2 sur composant ST33F1ME
CSV information ?
Status | archived |
---|---|
Valid from | 24.12.2013 |
Valid until | 01.09.2019 |
Scheme | 🇫🇷 FR |
Manufacturer | Oberthur Technologies / STMicroelectronics |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | AVA_VAN.5, EAL4+, ALC_DVS.2 |
Maintenance updates | ANSSI-CC-2013/65-M02 (23.05.2014) Certification report |
Rapport de maintenance ANSSI-CC-2013/65-M01 (09.04.2014) Certification report |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Symmetric Algorithms
DESHash functions
SHA1, SHA2Libraries
NesLib v3.0JavaCard versions
Java Card 3.0.1Vendor
STMicroelectronics, Oberthur TechnologiesSecurity level
EAL 4, EAL4, EAL7, EAL 1, EAL 3, EAL 5, EAL 7, EAL4+, ITSEC E6 ElevéSecurity Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSSProtection profiles
BSI-PP-0035-2007, ANSSI-CC-PP-2010/03, ANSSI-CC-PP-2010/04Certificates
ANSSI-CC-2013/65, ANSSI-CC-2012/39, ANSSI-CC-2011/07, ANSSI-CC-2011/07-S01Standards
CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004File metadata
Title: | ANSSI-CC-2013/65 |
---|---|
Subject: | Application Mobile MasterCard PayPass V1 - M/Chip 4, version V01.00.04, sur plateforme NFC FlyBuy Platinum V2 sur composant ST33F1ME |
Keywords: | ANSSI-CC-CER-F-07.010 |
Author: | Duquesnoy |
Creation date: | D:20140129142922+01'00' |
Modification date: | D:20140129142922+01'00' |
Pages: | 21 |
Creator: | Microsoft® Word 2010 |
Producer: | Microsoft® Word 2010 |
Frontpage
Certificate ID: | ANSSI-CC-2013/65 |
---|---|
Certified item: | Carte Mobile MasterCard PayPass – M/Chip 4 sur plateforme NFC FlyBuy Platinum V2 sur composant ST33F1ME |
Certification lab: | THALES (TCS – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France |
Developer: | Oberthur Technologies 420, rue d’Estienne d’Orves, CS 40008, 92705 Colombes Cedex, France STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, B.P.2, 13106 Rousset, France Commanditaire Oberthur Technologies 420, rue d’Estienne d’Orves - CS 40008, 92705 Colombes Cedex, France |
References
Outgoing- ANSSI-CC-2011/07 - Microcontrôleurs sécurisés ST33F1ME, ST33F768E, SC33F768E, ST33F640E, SC33F640E, ST33F512E, SC33F512E et SC33F384E incluant optionnellement la bibliothèque cryptographique NesLib v3.0
- ANSSI-CC-2012/39 - NFC FLYBUY PLATINUM V2 sur composant ST33F1ME
Security target ?
Extracted keywords
Symmetric Algorithms
AES, DES, TDES, 3DESAsymmetric Algorithms
RSA 1024Hash functions
SHA-1Schemes
MACRandomness
RNGLibraries
NESLIB 3.0Block cipher modes
CBCJavaCard versions
GlobalPlatform 2.1.1Vendor
STMicroelectronics, Oberthur Technologies, OberthurSecurity level
EAL4+, EAL4, EAL 4, EAL4 augmentedClaims
O.TRANSACTION_UNIQUENESS, O.TRANSACTION_INTEGRITY, O.TRANSACTION_BYPASS, O.TRANSACTION_REPLAY, O.USER_AUTH, O.ISSUING_BANK_AUTH, O.MNO_AUTH, O.COMM_AUTH, O.AUTHORISATION_CONTROL, O.DATA_DISCLOSURE, O.DATA_INTEGRITY, O.DATA_USERS, O.RISK_MNGT, O.APP_BLOCK, O.SIM_UNLOCK, O.AUDIT, O.CHANNELS, O.AUDIT_ACCESS, O.GUIS_AUTH, O.TRANSACTION_UNIQUENES, O.TRANSACTION_UNIQUENE, O.AUTHORISATION_CONTR, O.COMM_INTEGRITY, O.TRANSACTION_UNIQUE, O.TRANSACTION_INTEGRI, O.TRANSACTION_INTEG, O.APP_BLOC, T.DISCLOSURE_KEYS, T.DISCLOSURE_REF_PC, T.INTEG_LOG_FILE, T.INTEG_KEYS, T.INTEG_ACCOUNT_INFO, T.INTEG_REF_PC, T.INTEG_TRANS_PARAM, T.INTEG_COUNT, T.TEMPORARY_DATA, T.INTEG_SEL_ACT_PARAM, T.STEALING, T.MERCHANT_ACCOMPLICE, T.MAN-IN-THE-MIDDLE, T.TRANSACTION_REPUDIATION, T.TRANSACTION_COUNTERFEITING, T.TRANSACTION_REPLAY, T.CERTIF_CORRUPTION, T.APPLICATIONS_DOS, T.MNO_USURPATION, T.ISSUING-BANK_USURPATION, T.CUSTOMER_USURPATION, T.ISSUING-, A.MERCHANT_AUTH, OE.CUSTOMER_PC_CONFID, OE.GUI_INST_ALERT, OE.TOE_USAGE, OE.GUIS_IDENTIFICATION, OE.POLICY, OE.NFC_PROTOCOL, OE.TRANSACTION_DISPLAY, OE.CHANNELS_SELECTION, OE.GUIS_TIMEOUT, OE.MERCHANT_CONTROL, OE.MERCHANT_AUTH, OE.LATENCY_CONTROL, OE.POS_APPROVAL, OE.POS_APPLICATIONS, OE.POS_DEACTIVATION, OE.CERTIFICATES_MNGT, OE.NO_VAD, OE.BANKS_PRIVILEGES, OE.GUIS_AUTH, OSP.POLICY, OSP.CUSTOMER_PC_CONFID, OSP.GUIS_IDENTIFICATION, OSP.CERTIFICATES_MNGT, OSP.TOE_USAGE, OSP.PISHING, OSP.MERCHANT_CONTROL, OSP.BANKS_PRIVILEGES, OSP.CUSTOMER_PC_CONFISecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ADV_FSP.1, ADV_TDS.1, ADV_FSP.2, ADV_TDS.2, AGD_PRE, AGD_OPE, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_TAT.1, ALC_CMC.4, ALC_CMS.1, ALC_DVS.1, ALC_LCD.1, ALC_CMS.4, ALC_DEL.1, ATE_DPT.1, ATE_COV.2, ATE_FUN.1, ATE_COV.1, ATE_IND.2, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1, ASE_REQ.2, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_ARP.1, FAU_ARP.1.1, FAU_SAA.1, FAU_SAA.1.1, FAU_SAA.1.2, FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_SAR, FAU_SAR.1, FCS_CKM, FCS_CKM.1, FCS_CKM.4, FCS_CKM.4.1, FCS_COP, FCS_COP.1, FCS_COP.1.1, FCS_CKM.2, FDP_ACC, FDP_ACC.2, FDP_ACF, FDP_ACF.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_IFC, FDP_IFC.2, FDP_IFF, FDP_IFF.1, FDP_IFF.1.2, FDP_SDI.2, FDP_SDI.2.1, FDP_SDI.2.2, FDP_RIP.1, FDP_RIP.1.1, FDP_DAU.1, FDP_DAU.1.1, FDP_DAU.1.2, FDP_ITC, FDP_ITC.2, FDP_ETC.1, FDP_ETC.1.1, FDP_ETC.1.2, FDP_ITC.1, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_UIT.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_ACC.1, FDP_IFC.1, FIA_AFL, FIA_AFL.1, FIA_ATD.1, FIA_ATD.1.1, FIA_UAU, FIA_UAU.1, FIA_UAU.3, FIA_UAU.3.1, FIA_UAU.3.2, FIA_UAU.4, FIA_UAU.4.1, FIA_UAU.6, FIA_UID, FIA_UID.1, FIA_USB.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_SOS.2, FIA_SOS.2.1, FIA_SOS.2.2, FIA_SOS, FMT_SMF, FMT_SMF.1, FMT_MOF, FMT_MOF.1, FMT_MTD, FMT_MTD.1, FMT_MSA, FMT_MSA.1, FMT_MSA.2, FMT_MSA.2.1, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FPR_UNO.1, FPR_UNO.1.1, FPT_TST.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_TDC.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_RPL.1, FPT_RPL.1.1, FPT_RPL.1.2, FPT_RPL, FPT_STM.1, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1Protection profiles
BSI-PP-0035, ANSSI-CC-PP 2010/04Certificates
ANSSI-CC-2012/39, ANSSI-CC-2011/07, ANSSI-CC-2011/07-S01Standards
FIPS PUB 46-3, FIPS PUB 81, FIPS PUB 140-2, FIPS PUB 180-3, FIPS PUB 186-3, FIPS PUB 197, PKCS#1, PKCS 1, ISO/IEC 9796-1, ISO/IEC 9797-1, SCP02, SCP80File metadata
Title: | FQR 110 6672 Ed1 - ST JUBA Lite |
---|---|
Author: | chrisduc |
Creation date: | D:20130807110801+02'00 |
Modification date: | D:20130807110801+02'00 |
Pages: | 131 |
Creator: | PDFCreator Version 0.8.1 |
Producer: | AFPL Ghostscript 8.50 |
References
Outgoing- ANSSI-CC-2011/07 - Microcontrôleurs sécurisés ST33F1ME, ST33F768E, SC33F768E, ST33F640E, SC33F640E, ST33F512E, SC33F512E et SC33F384E incluant optionnellement la bibliothèque cryptographique NesLib v3.0
- ANSSI-CC-2012/39 - NFC FLYBUY PLATINUM V2 sur composant ST33F1ME
Heuristics ?
Extracted SARs
ASE_SPD.1, AGD_PRE.1, ALC_DVS.2, ASE_ECD.1, ASE_TSS.1, ALC_TAT.1, ALC_CMC.4, ALC_LCD.1, ADV_ARC.1, ADV_FSP.4, ASE_REQ.2, ALC_DEL.1, ATE_COV.2, ASE_CCL.1, ASE_INT.1, ADV_TDS.3, AGD_OPE.1, ATE_FUN.1, ADV_IMP.1, AVA_VAN.5, ATE_IND.2, ASE_OBJ.2, ALC_CMS.4, ATE_DPT.1Scheme data ?
Product | Application Mobile MasterCard PayPass V1 - M/Chip 4, version V01.00.04, sur plateforme NFC FlyBuy Platinum V2 sur composant ST33F1ME | |
---|---|---|
Url | https://cyber.gouv.fr/produits-certifies/application-mobile-mastercard-paypass-v1-mchip-4-version-v010004-sur-plateforme | |
Description | Le produit certifé est la « Carte Mobile MasterCard PayPass – M/Chip 4 sur plateforme NFC FlyBuy Platinum V2 sur composant ST33F1ME » développée par Oberthur Technologies et STMicroelectronics. Ce produit est une carte (U)SIM destinée à être insérée dans un téléphone portable disposant de la technologie NFC2. Il embarque l'application Mobile PayPass v1.0 qui met en oeuvre la solution « Paye | |
Sponsor | Oberthur Technologies | |
Developer | Oberthur Technologies / Oberthur Technologies | |
Cert Id | 2013/65 | |
Level | EAL4+ | |
Enhanced | ||
Cert Id | 2013/65 | |
Certification Date | 24/12/2013 | |
Category | Cartes Ă puce | |
Cc Version | Critères Communs version 3.1r3 | |
Developer | Oberthur Technologies / Oberthur Technologies | |
Sponsor | Oberthur Technologies | |
Evaluation Facility | THALES (TCS – CNES) | |
Level | EAL4+ | |
Protection Profile | ||
Mutual Recognition | SOG-IS CCRA | |
Augmented | ALC_DVS.2, AVA_VAN.5 | |
Target Link | https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2013-65en.pdf | |
Report Link | https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2013-65fr.pdf |
References ?
Updates ?
-
15.02.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The following values were inserted:
{'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '2e4127e86969ec105569806f18118fd611c63f4a9d829a478df861e6318532d5', 'txt_hash': '263aaaa523c471afe1ec9b93ab6e8df0cc5691eb3025b7f40a5e155b026f155a'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '734f297c82adaa229149775ac66c2d92919abd255e282c447445e63b13334675', 'txt_hash': 'a12c1c5b1fe4396131085d0e0176fe1d760a42bd8b7cf77af908e01c93df5723'}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}}
. - The following properties were deleted:
['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash']
.
The PDF extraction data was updated.
- The following values were inserted:
{'cert_metadata': None, 'cert_frontpage': None, 'cert_keywords': None, 'cert_filename': None}
. - The report_frontpage property was set to
{'FR': {'match_rules': ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables'], 'cert_id': 'ANSSI-CC-2013/65', 'cert_item': 'Carte Mobile MasterCard PayPass – M/Chip 4 sur plateforme NFC FlyBuy Platinum V2 sur composant ST33F1ME', 'cert_item_version': 'MasterCard Mobile PayPass V1 – Version V01.00.04 Identification hardware 0768910, identification card Manager GOP Ref V1.8.v', 'ref_protection_profiles': 'néant', 'cc_version': 'Critères Communs version 3.1 révision 3', 'cc_security_level': 'EAL 4 augmenté ALC_DVS.2, AVA_VAN.5', 'developer': 'Oberthur Technologies 420, rue d’Estienne d’Orves, CS 40008, 92705 Colombes Cedex, France STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, B.P.2, 13106 Rousset, France Commanditaire Oberthur Technologies 420, rue d’Estienne d’Orves - CS 40008, 92705 Colombes Cedex, France', 'cert_lab': 'THALES (TCS – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France'}}
. - The st_frontpage property was set to
None
. - The report_keywords property was updated, with the
{'cc_cert_id': {'__update__': {'FR': {'__update__': {'ANSSI-CC-2013/65': 22, 'ANSSI-CC-2012/39': 4, 'ANSSI-CC-2011/07': 1}}}}}
data. - The st_keywords property was updated, with the
{'cc_cert_id': {'__update__': {'FR': {'__update__': {'ANSSI-CC-2012/39': 1, 'ANSSI-CC-2011/07': 1}}}}}
data.
The computed heuristics were updated.
- The report_references property was updated, with the
{'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2009/57', 'ANSSI-CC-2009/25']}}}
data.
- The following values were inserted:
-
13.02.2024 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'cc_cert_id': {'__update__': {'FR': {'__update__': {'ANSSI-CC-2013/65': 44, 'ANSSI-CC-2012/39': 8, 'ANSSI-CC-2011/07': 2}}}}}
data. - The st_keywords property was updated, with the
{'cc_cert_id': {'__update__': {'FR': {'__update__': {'ANSSI-CC-2012/39': 2, 'ANSSI-CC-2011/07': 2}}}}}
data.
The computed heuristics were updated.
- The report_references property was updated, with the
{'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2009/57', 'ANSSI-CC-2009/25']}}}
data.
- The report_keywords property was updated, with the
-
07.02.2024 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'cc_cert_id': {'__delete__': ['CA']}}
data. - The st_keywords property was updated, with the
{'cc_cert_id': {'__delete__': ['CA']}}
data.
- The report_keywords property was updated, with the
-
07.02.2024 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'cc_cert_id': {'__insert__': {'CA': {'1 1 1': 21, '1 2 3': 5, '5 5 6': 1, '1 1 2': 1, '2 3 3': 1, '5 6 3': 1, '4 5 5': 2, '5 5 5': 1, '1 2 2': 5, '2 2 2': 2, '3 3 2': 1, '1 1 3': 1, '2 2 1': 1, '2 2 3': 1}}, '__update__': {'FR': {'__update__': {'ANSSI-CC-2013/65': 22, 'ANSSI-CC-2012/39': 4, 'ANSSI-CC-2011/07': 1}}}}}
data. - The st_keywords property was updated, with the
{'cc_cert_id': {'__insert__': {'CA': {'0 0 0': 7, '0 0 1': 2, '0 1 1': 3, '1 1 1': 5, '1 0 0': 1}}, '__update__': {'FR': {'__update__': {'ANSSI-CC-2012/39': 1, 'ANSSI-CC-2011/07': 1}}}}}
data.
The computed heuristics were updated.
- The report_references property was updated, with the
{'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2009/57', 'ANSSI-CC-2009/25']}}}
data.
- The report_keywords property was updated, with the
-
05.02.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'Application Mobile MasterCard PayPass V1 - M/Chip 4, version V01.00.04, sur plateforme NFC FlyBuy Platinum V2 sur composant ST33F1ME', 'url': 'https://cyber.gouv.fr/produits-certifies/application-mobile-mastercard-paypass-v1-mchip-4-version-v010004-sur-plateforme', 'description': 'Le produit certifé est la « Carte Mobile MasterCard PayPass – M/Chip 4 sur plateforme NFC FlyBuy Platinum V2 sur composant ST33F1ME » développée par Oberthur Technologies et STMicroelectronics.\n\nCe produit est une carte (U)SIM destinée à être insérée dans un téléphone portable disposant de la technologie NFC2. Il embarque l'application Mobile PayPass v1.0 qui met en oeuvre la solution « Paye', 'sponsor': 'Oberthur Technologies', 'developer': 'Oberthur Technologies / Oberthur Technologies', 'cert_id': '2013/65', 'level': 'EAL4+', 'enhanced': {'cert_id': '2013/65', 'certification_date': '24/12/2013', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 3.1r3', 'developer': 'Oberthur Technologies / Oberthur Technologies', 'sponsor': 'Oberthur Technologies', 'evaluation_facility': 'THALES (TCS – CNES)', 'level': 'EAL4+', 'protection_profile': '', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ALC_DVS.2, AVA_VAN.5', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2013-65en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2013-65fr.pdf'}}
.
- The scheme_data property was set to
-
04.01.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'annotated_references': None}
.
- The following values were inserted:
-
26.04.2023 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'scheme_data': None}
.
- The following values were inserted:
-
11.02.2023 The certificate data changed.
Certificate changed
The _type was updated.
- The new value is
sec_certs.sample.cc.CCCertificate
.
The Maintenance Updates of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': '2014-05-23', 'maintenance_title': 'ANSSI-CC-2013/65-M02', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC-2013_65_M02.pdf', 'maintenance_st_link': None}, {'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': '2014-04-09', 'maintenance_title': 'Rapport de maintenance ANSSI-CC-2013/65-M01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC-2013_65_M01.pdf', 'maintenance_st_link': None}]}
.
The state of the certificate object was updated.
- The _type property was set to
sec_certs.sample.cc.CCCertificate.InternalState
. - The following properties were deleted:
['errors']
.
The PDF extraction data was updated.
- The _type property was set to
sec_certs.sample.cc.CCCertificate.PdfData
.
The computed heuristics were updated.
- The following values were inserted:
{'direct_transitive_cves': None, 'indirect_transitive_cves': None}
. - The _type property was set to
sec_certs.sample.cc.CCCertificate.Heuristics
. - The following properties were deleted:
['direct_dependency_cves', 'indirect_dependency_cves']
.
- The new value is
-
26.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The errors property was set to
[]
.
- The errors property was set to
-
25.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
True
. - The st_convert_ok property was set to
True
. - The st_extract_ok property was set to
True
. - The errors property was set to
['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC-2013_65.pdf, code: nok']
. - The st_pdf_hash property was set to
734f297c82adaa229149775ac66c2d92919abd255e282c447445e63b13334675
. - The st_txt_hash property was set to
a12c1c5b1fe4396131085d0e0176fe1d760a42bd8b7cf77af908e01c93df5723
.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 1527189, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 131, '/Producer': 'AFPL Ghostscript 8.50', '/CreationDate': "D:20130807110801+02'00", '/ModDate': "D:20130807110801+02'00", '/Title': 'FQR 110 6672 Ed1 - ST JUBA Lite', '/Creator': 'PDFCreator Version 0.8.1', '/Author': 'chrisduc', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_frontpage property was set to
{'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}
. - The st_keywords property was set to
{'cc_cert_id': {'FR': {'ANSSI-CC-2012/39': 2, 'ANSSI-CC-2011/07': 2, 'ANSSI-CC-2011/07-S01': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0035': 1}, 'ANSSI': {'ANSSI-CC-PP 2010/04': 1}}, 'cc_security_level': {'EAL': {'EAL4+': 10, 'EAL4': 3, 'EAL 4': 1, 'EAL4 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 5, 'ADV_FSP.4': 9, 'ADV_IMP.1': 4, 'ADV_TDS.3': 8, 'ADV_FSP.1': 3, 'ADV_TDS.1': 2, 'ADV_FSP.2': 2, 'ADV_TDS.2': 1}, 'AGD': {'AGD_PRE': 1, 'AGD_OPE': 2, 'AGD_OPE.1': 5, 'AGD_PRE.1': 5}, 'ALC': {'ALC_DVS.2': 6, 'ALC_TAT.1': 3, 'ALC_CMC.4': 1, 'ALC_CMS.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 3, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_DPT.1': 2, 'ATE_COV.2': 3, 'ATE_FUN.1': 6, 'ATE_COV.1': 2, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.5': 5}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 4, 'ASE_INT.1': 5, 'ASE_REQ.1': 2, 'ASE_REQ.2': 2, 'ASE_OBJ.2': 3, 'ASE_SPD.1': 2, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 7, 'FAU_ARP.1.1': 1, 'FAU_SAA.1': 8, 'FAU_SAA.1.1': 1, 'FAU_SAA.1.2': 2, 'FAU_GEN.1': 11, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_SAR': 12, 'FAU_SAR.1': 4}, 'FCS': {'FCS_CKM': 9, 'FCS_CKM.1': 8, 'FCS_CKM.4': 20, 'FCS_CKM.4.1': 1, 'FCS_COP': 40, 'FCS_COP.1': 9, 'FCS_COP.1.1': 1, 'FCS_CKM.2': 1}, 'FDP': {'FDP_ACC': 149, 'FDP_ACC.2': 14, 'FDP_ACF': 133, 'FDP_ACF.1': 35, 'FDP_ACF.1.2': 7, 'FDP_ACF.1.3': 1, 'FDP_IFC': 77, 'FDP_IFC.2': 8, 'FDP_IFF': 62, 'FDP_IFF.1': 24, 'FDP_IFF.1.2': 4, 'FDP_SDI.2': 5, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_RIP.1': 7, 'FDP_RIP.1.1': 1, 'FDP_DAU.1': 5, 'FDP_DAU.1.1': 1, 'FDP_DAU.1.2': 1, 'FDP_ITC': 28, 'FDP_ITC.2': 17, 'FDP_ETC.1': 15, 'FDP_ETC.1.1': 1, 'FDP_ETC.1.2': 1, 'FDP_ITC.1': 27, 'FDP_ITC.1.1': 1, 'FDP_ITC.1.2': 1, 'FDP_ITC.1.3': 1, 'FDP_UIT.1': 13, 'FDP_UIT.1.1': 1, 'FDP_UIT.1.2': 1, 'FDP_ACC.1': 14, 'FDP_IFC.1': 11}, 'FIA': {'FIA_AFL': 16, 'FIA_AFL.1': 4, 'FIA_ATD.1': 9, 'FIA_ATD.1.1': 1, 'FIA_UAU': 35, 'FIA_UAU.1': 8, 'FIA_UAU.3': 7, 'FIA_UAU.3.1': 1, 'FIA_UAU.3.2': 1, 'FIA_UAU.4': 9, 'FIA_UAU.4.1': 1, 'FIA_UAU.6': 1, 'FIA_UID': 24, 'FIA_UID.1': 10, 'FIA_USB.1': 7, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_SOS.2': 8, 'FIA_SOS.2.1': 1, 'FIA_SOS.2.2': 1, 'FIA_SOS': 1}, 'FMT': {'FMT_SMF': 17, 'FMT_SMF.1': 5, 'FMT_MOF': 7, 'FMT_MOF.1': 1, 'FMT_MTD': 4, 'FMT_MTD.1': 1, 'FMT_MSA': 9, 'FMT_MSA.1': 3, 'FMT_MSA.2': 4, 'FMT_MSA.2.1': 1, 'FMT_MSA.3': 29, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_SMR.1': 18, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPR': {'FPR_UNO.1': 4, 'FPR_UNO.1.1': 1}, 'FPT': {'FPT_TST.1': 7, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_TDC.1': 16, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 1, 'FPT_RPL.1': 4, 'FPT_RPL.1.1': 1, 'FPT_RPL.1.2': 1, 'FPT_RPL': 1, 'FPT_STM.1': 3}, 'FTP': {'FTP_ITC.1': 10, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP.1': 3}}, 'cc_claims': {'O': {'O.TRANSACTION_UNIQUENESS': 33, 'O.TRANSACTION_INTEGRITY': 38, 'O.TRANSACTION_BYPASS': 53, 'O.TRANSACTION_REPLAY': 13, 'O.USER_AUTH': 55, 'O.ISSUING_BANK_AUTH': 54, 'O.MNO_AUTH': 8, 'O.COMM_AUTH': 5, 'O.AUTHORISATION_CONTROL': 19, 'O.DATA_DISCLOSURE': 44, 'O.DATA_INTEGRITY': 62, 'O.DATA_USERS': 10, 'O.RISK_MNGT': 10, 'O.APP_BLOCK': 13, 'O.SIM_UNLOCK': 10, 'O.AUDIT': 14, 'O.CHANNELS': 9, 'O.AUDIT_ACCESS': 10, 'O.GUIS_AUTH': 13, 'O.TRANSACTION_UNIQUENES': 2, 'O.TRANSACTION_UNIQUENE': 1, 'O.AUTHORISATION_CONTR': 1, 'O.COMM_INTEGRITY': 1, 'O.TRANSACTION_UNIQUE': 1, 'O.TRANSACTION_INTEGRI': 1, 'O.TRANSACTION_INTEG': 1, 'O.APP_BLOC': 1}, 'T': {'T.DISCLOSURE_KEYS': 6, 'T.DISCLOSURE_REF_PC': 6, 'T.INTEG_LOG_FILE': 5, 'T.INTEG_KEYS': 8, 'T.INTEG_ACCOUNT_INFO': 6, 'T.INTEG_REF_PC': 6, 'T.INTEG_TRANS_PARAM': 7, 'T.INTEG_COUNT': 7, 'T.TEMPORARY_DATA': 7, 'T.INTEG_SEL_ACT_PARAM': 6, 'T.STEALING': 9, 'T.MERCHANT_ACCOMPLICE': 9, 'T.MAN-IN-THE-MIDDLE': 12, 'T.TRANSACTION_REPUDIATION': 7, 'T.TRANSACTION_COUNTERFEITING': 13, 'T.TRANSACTION_REPLAY': 8, 'T.CERTIF_CORRUPTION': 5, 'T.APPLICATIONS_DOS': 7, 'T.MNO_USURPATION': 5, 'T.ISSUING-BANK_USURPATION': 3, 'T.CUSTOMER_USURPATION': 7, 'T.ISSUING-': 2}, 'A': {'A.MERCHANT_AUTH': 5}, 'OE': {'OE.CUSTOMER_PC_CONFID': 8, 'OE.GUI_INST_ALERT': 7, 'OE.TOE_USAGE': 9, 'OE.GUIS_IDENTIFICATION': 5, 'OE.POLICY': 5, 'OE.NFC_PROTOCOL': 5, 'OE.TRANSACTION_DISPLAY': 5, 'OE.CHANNELS_SELECTION': 4, 'OE.GUIS_TIMEOUT': 7, 'OE.MERCHANT_CONTROL': 7, 'OE.MERCHANT_AUTH': 8, 'OE.LATENCY_CONTROL': 5, 'OE.POS_APPROVAL': 7, 'OE.POS_APPLICATIONS': 10, 'OE.POS_DEACTIVATION': 6, 'OE.CERTIFICATES_MNGT': 11, 'OE.NO_VAD': 6, 'OE.BANKS_PRIVILEGES': 4, 'OE.GUIS_AUTH': 1}, 'OSP': {'OSP.POLICY': 4, 'OSP.CUSTOMER_PC_CONFID': 3, 'OSP.GUIS_IDENTIFICATION': 4, 'OSP.CERTIFICATES_MNGT': 4, 'OSP.TOE_USAGE': 4, 'OSP.PISHING': 4, 'OSP.MERCHANT_CONTROL': 6, 'OSP.BANKS_PRIVILEGES': 4, 'OSP.CUSTOMER_PC_CONFI': 1}}, 'vendor': {'STMicroelectronics': {'STMicroelectronics': 4}, 'Oberthur': {'Oberthur Technologies': 137, 'Oberthur': 8}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 2}}, 'DES': {'DES': {'DES': 1}, '3DES': {'TDES': 1, '3DES': 4}}}, 'asymmetric_crypto': {'RSA': {'RSA 1024': 1}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 4}}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 1}}, 'cipher_mode': {'CBC': {'CBC': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Neslib': {'NESLIB 3.0': 2}}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 46-3': 1, 'FIPS PUB 81': 1, 'FIPS PUB 140-2': 1, 'FIPS PUB 180-3': 1, 'FIPS PUB 186-3': 1, 'FIPS PUB 197': 1}, 'PKCS': {'PKCS#1': 2, 'PKCS 1': 1}, 'ISO': {'ISO/IEC 9796-1': 1, 'ISO/IEC 9797-1': 1}, 'SCP': {'SCP02': 1, 'SCP80': 1}}, 'javacard_version': {'GlobalPlatform': {'GlobalPlatform 2.1.1': 1}}, 'javacard_api_const': {}, 'javacard_packages': {'javacard': {'javacard.security': 1}}, 'certification_process': {}}
. - The st_filename property was set to
FQR 110 6672 Ed1 - ST JUBA Lite.pdf
.
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2012/39', 'ANSSI-CC-2011/07']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2012/39', 'ANSSI-CC-2011/07']}}
data. - The report_references property was updated, with the
{'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2012/06']}}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}]}
values added.
- The st_download_ok property was set to
-
25.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
False
. - The st_convert_ok property was set to
False
. - The st_extract_ok property was set to
False
. - The errors property was set to
['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/FQR%20110%206672%20Ed1%20-%20ST%20JUBA%20%20Lite.pdf, code: 408']
. - The st_pdf_hash property was set to
None
. - The st_txt_hash property was set to
None
.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_frontpage property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data. - The report_references property was updated, with the
{'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2012/06']}}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}]}
values discarded.
- The st_download_ok property was set to
-
24.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
True
. - The st_convert_ok property was set to
True
. - The st_extract_ok property was set to
True
. - The errors property was set to
['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC-2013_65.pdf, code: 408']
. - The st_pdf_hash property was set to
734f297c82adaa229149775ac66c2d92919abd255e282c447445e63b13334675
. - The st_txt_hash property was set to
a12c1c5b1fe4396131085d0e0176fe1d760a42bd8b7cf77af908e01c93df5723
.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 1527189, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 131, '/Producer': 'AFPL Ghostscript 8.50', '/CreationDate': "D:20130807110801+02'00", '/ModDate': "D:20130807110801+02'00", '/Title': 'FQR 110 6672 Ed1 - ST JUBA Lite', '/Creator': 'PDFCreator Version 0.8.1', '/Author': 'chrisduc', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_frontpage property was set to
{'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}
. - The st_keywords property was set to
{'cc_cert_id': {'FR': {'ANSSI-CC-2012/39': 2, 'ANSSI-CC-2011/07': 2, 'ANSSI-CC-2011/07-S01': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0035': 1}, 'ANSSI': {'ANSSI-CC-PP 2010/04': 1}}, 'cc_security_level': {'EAL': {'EAL4+': 10, 'EAL4': 3, 'EAL 4': 1, 'EAL4 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 5, 'ADV_FSP.4': 9, 'ADV_IMP.1': 4, 'ADV_TDS.3': 8, 'ADV_FSP.1': 3, 'ADV_TDS.1': 2, 'ADV_FSP.2': 2, 'ADV_TDS.2': 1}, 'AGD': {'AGD_PRE': 1, 'AGD_OPE': 2, 'AGD_OPE.1': 5, 'AGD_PRE.1': 5}, 'ALC': {'ALC_DVS.2': 6, 'ALC_TAT.1': 3, 'ALC_CMC.4': 1, 'ALC_CMS.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 3, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_DPT.1': 2, 'ATE_COV.2': 3, 'ATE_FUN.1': 6, 'ATE_COV.1': 2, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.5': 5}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 4, 'ASE_INT.1': 5, 'ASE_REQ.1': 2, 'ASE_REQ.2': 2, 'ASE_OBJ.2': 3, 'ASE_SPD.1': 2, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 7, 'FAU_ARP.1.1': 1, 'FAU_SAA.1': 8, 'FAU_SAA.1.1': 1, 'FAU_SAA.1.2': 2, 'FAU_GEN.1': 11, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_SAR': 12, 'FAU_SAR.1': 4}, 'FCS': {'FCS_CKM': 9, 'FCS_CKM.1': 8, 'FCS_CKM.4': 20, 'FCS_CKM.4.1': 1, 'FCS_COP': 40, 'FCS_COP.1': 9, 'FCS_COP.1.1': 1, 'FCS_CKM.2': 1}, 'FDP': {'FDP_ACC': 149, 'FDP_ACC.2': 14, 'FDP_ACF': 133, 'FDP_ACF.1': 35, 'FDP_ACF.1.2': 7, 'FDP_ACF.1.3': 1, 'FDP_IFC': 77, 'FDP_IFC.2': 8, 'FDP_IFF': 62, 'FDP_IFF.1': 24, 'FDP_IFF.1.2': 4, 'FDP_SDI.2': 5, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_RIP.1': 7, 'FDP_RIP.1.1': 1, 'FDP_DAU.1': 5, 'FDP_DAU.1.1': 1, 'FDP_DAU.1.2': 1, 'FDP_ITC': 28, 'FDP_ITC.2': 17, 'FDP_ETC.1': 15, 'FDP_ETC.1.1': 1, 'FDP_ETC.1.2': 1, 'FDP_ITC.1': 27, 'FDP_ITC.1.1': 1, 'FDP_ITC.1.2': 1, 'FDP_ITC.1.3': 1, 'FDP_UIT.1': 13, 'FDP_UIT.1.1': 1, 'FDP_UIT.1.2': 1, 'FDP_ACC.1': 14, 'FDP_IFC.1': 11}, 'FIA': {'FIA_AFL': 16, 'FIA_AFL.1': 4, 'FIA_ATD.1': 9, 'FIA_ATD.1.1': 1, 'FIA_UAU': 35, 'FIA_UAU.1': 8, 'FIA_UAU.3': 7, 'FIA_UAU.3.1': 1, 'FIA_UAU.3.2': 1, 'FIA_UAU.4': 9, 'FIA_UAU.4.1': 1, 'FIA_UAU.6': 1, 'FIA_UID': 24, 'FIA_UID.1': 10, 'FIA_USB.1': 7, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_SOS.2': 8, 'FIA_SOS.2.1': 1, 'FIA_SOS.2.2': 1, 'FIA_SOS': 1}, 'FMT': {'FMT_SMF': 17, 'FMT_SMF.1': 5, 'FMT_MOF': 7, 'FMT_MOF.1': 1, 'FMT_MTD': 4, 'FMT_MTD.1': 1, 'FMT_MSA': 9, 'FMT_MSA.1': 3, 'FMT_MSA.2': 4, 'FMT_MSA.2.1': 1, 'FMT_MSA.3': 29, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_SMR.1': 18, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPR': {'FPR_UNO.1': 4, 'FPR_UNO.1.1': 1}, 'FPT': {'FPT_TST.1': 7, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_TDC.1': 16, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 1, 'FPT_RPL.1': 4, 'FPT_RPL.1.1': 1, 'FPT_RPL.1.2': 1, 'FPT_RPL': 1, 'FPT_STM.1': 3}, 'FTP': {'FTP_ITC.1': 10, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP.1': 3}}, 'cc_claims': {'O': {'O.TRANSACTION_UNIQUENESS': 33, 'O.TRANSACTION_INTEGRITY': 38, 'O.TRANSACTION_BYPASS': 53, 'O.TRANSACTION_REPLAY': 13, 'O.USER_AUTH': 55, 'O.ISSUING_BANK_AUTH': 54, 'O.MNO_AUTH': 8, 'O.COMM_AUTH': 5, 'O.AUTHORISATION_CONTROL': 19, 'O.DATA_DISCLOSURE': 44, 'O.DATA_INTEGRITY': 62, 'O.DATA_USERS': 10, 'O.RISK_MNGT': 10, 'O.APP_BLOCK': 13, 'O.SIM_UNLOCK': 10, 'O.AUDIT': 14, 'O.CHANNELS': 9, 'O.AUDIT_ACCESS': 10, 'O.GUIS_AUTH': 13, 'O.TRANSACTION_UNIQUENES': 2, 'O.TRANSACTION_UNIQUENE': 1, 'O.AUTHORISATION_CONTR': 1, 'O.COMM_INTEGRITY': 1, 'O.TRANSACTION_UNIQUE': 1, 'O.TRANSACTION_INTEGRI': 1, 'O.TRANSACTION_INTEG': 1, 'O.APP_BLOC': 1}, 'T': {'T.DISCLOSURE_KEYS': 6, 'T.DISCLOSURE_REF_PC': 6, 'T.INTEG_LOG_FILE': 5, 'T.INTEG_KEYS': 8, 'T.INTEG_ACCOUNT_INFO': 6, 'T.INTEG_REF_PC': 6, 'T.INTEG_TRANS_PARAM': 7, 'T.INTEG_COUNT': 7, 'T.TEMPORARY_DATA': 7, 'T.INTEG_SEL_ACT_PARAM': 6, 'T.STEALING': 9, 'T.MERCHANT_ACCOMPLICE': 9, 'T.MAN-IN-THE-MIDDLE': 12, 'T.TRANSACTION_REPUDIATION': 7, 'T.TRANSACTION_COUNTERFEITING': 13, 'T.TRANSACTION_REPLAY': 8, 'T.CERTIF_CORRUPTION': 5, 'T.APPLICATIONS_DOS': 7, 'T.MNO_USURPATION': 5, 'T.ISSUING-BANK_USURPATION': 3, 'T.CUSTOMER_USURPATION': 7, 'T.ISSUING-': 2}, 'A': {'A.MERCHANT_AUTH': 5}, 'OE': {'OE.CUSTOMER_PC_CONFID': 8, 'OE.GUI_INST_ALERT': 7, 'OE.TOE_USAGE': 9, 'OE.GUIS_IDENTIFICATION': 5, 'OE.POLICY': 5, 'OE.NFC_PROTOCOL': 5, 'OE.TRANSACTION_DISPLAY': 5, 'OE.CHANNELS_SELECTION': 4, 'OE.GUIS_TIMEOUT': 7, 'OE.MERCHANT_CONTROL': 7, 'OE.MERCHANT_AUTH': 8, 'OE.LATENCY_CONTROL': 5, 'OE.POS_APPROVAL': 7, 'OE.POS_APPLICATIONS': 10, 'OE.POS_DEACTIVATION': 6, 'OE.CERTIFICATES_MNGT': 11, 'OE.NO_VAD': 6, 'OE.BANKS_PRIVILEGES': 4, 'OE.GUIS_AUTH': 1}, 'OSP': {'OSP.POLICY': 4, 'OSP.CUSTOMER_PC_CONFID': 3, 'OSP.GUIS_IDENTIFICATION': 4, 'OSP.CERTIFICATES_MNGT': 4, 'OSP.TOE_USAGE': 4, 'OSP.PISHING': 4, 'OSP.MERCHANT_CONTROL': 6, 'OSP.BANKS_PRIVILEGES': 4, 'OSP.CUSTOMER_PC_CONFI': 1}}, 'vendor': {'STMicroelectronics': {'STMicroelectronics': 4}, 'Oberthur': {'Oberthur Technologies': 137, 'Oberthur': 8}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 2}}, 'DES': {'DES': {'DES': 1}, '3DES': {'TDES': 1, '3DES': 4}}}, 'asymmetric_crypto': {'RSA': {'RSA 1024': 1}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 4}}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 1}}, 'cipher_mode': {'CBC': {'CBC': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Neslib': {'NESLIB 3.0': 2}}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 46-3': 1, 'FIPS PUB 81': 1, 'FIPS PUB 140-2': 1, 'FIPS PUB 180-3': 1, 'FIPS PUB 186-3': 1, 'FIPS PUB 197': 1}, 'PKCS': {'PKCS#1': 2, 'PKCS 1': 1}, 'ISO': {'ISO/IEC 9796-1': 1, 'ISO/IEC 9797-1': 1}, 'SCP': {'SCP02': 1, 'SCP80': 1}}, 'javacard_version': {'GlobalPlatform': {'GlobalPlatform 2.1.1': 1}}, 'javacard_api_const': {}, 'javacard_packages': {'javacard': {'javacard.security': 1}}, 'certification_process': {}}
. - The st_filename property was set to
FQR 110 6672 Ed1 - ST JUBA Lite.pdf
.
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2012/39', 'ANSSI-CC-2011/07']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2012/39', 'ANSSI-CC-2011/07']}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}]}
values added.
- The st_download_ok property was set to
-
24.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The errors property was set to
['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/FQR%20110%206672%20Ed1%20-%20ST%20JUBA%20%20Lite.pdf, code: 408']
.
The computed heuristics were updated.
- The report_references property was updated, with the
{'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2012/06']}}}
data.
- The errors property was set to
-
23.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
False
. - The st_convert_ok property was set to
False
. - The st_extract_ok property was set to
False
. - The errors property was updated, with the
[[1, 'failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/FQR%20110%206672%20Ed1%20-%20ST%20JUBA%20%20Lite.pdf, code: nok']]
values inserted. - The st_pdf_hash property was set to
None
. - The st_txt_hash property was set to
None
.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_frontpage property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data. - The report_references property was updated, with the
{'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2012/06']}}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}]}
values discarded.
- The st_download_ok property was set to
-
23.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report_download_ok property was set to
True
. - The report_convert_ok property was set to
True
. - The report_extract_ok property was set to
True
. - The errors property was updated.
- The report_pdf_hash property was set to
2e4127e86969ec105569806f18118fd611c63f4a9d829a478df861e6318532d5
. - The report_txt_hash property was set to
263aaaa523c471afe1ec9b93ab6e8df0cc5691eb3025b7f40a5e155b026f155a
.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 774691, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 21, '/Title': 'ANSSI-CC-2013/65', '/Author': 'Duquesnoy', '/Subject': 'Application Mobile MasterCard PayPass V1 - M/Chip 4, version V01.00.04, sur plateforme NFC FlyBuy Platinum V2 sur composant ST33F1ME', '/Keywords': 'ANSSI-CC-CER-F-07.010', '/Creator': 'Microsoft® Word 2010', '/CreationDate': "D:20140129142922+01'00'", '/ModDate': "D:20140129142922+01'00'", '/Producer': 'Microsoft® Word 2010', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['mailto:certification.anssi@ssi.gouv.fr', 'http://www.ssi.gouv.fr/']}}
. - The report_frontpage property was set to
{'anssi': {'match_rules': ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables'], 'cert_id': 'ANSSI-CC-2013/65', 'cert_item': 'Carte Mobile MasterCard PayPass – M/Chip 4 sur plateforme NFC FlyBuy Platinum V2 sur composant ST33F1ME', 'cert_item_version': 'MasterCard Mobile PayPass V1 – Version V01.00.04 Identification hardware 0768910, identification card Manager GOP Ref V1.8.v', 'ref_protection_profiles': 'néant', 'cc_version': 'Critères Communs version 3.1 révision 3', 'cc_security_level': 'EAL 4 augmenté ALC_DVS.2, AVA_VAN.5', 'developer': 'Oberthur Technologies 420, rue d’Estienne d’Orves, CS 40008, 92705 Colombes Cedex, France STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, B.P.2, 13106 Rousset, France Commanditaire Oberthur Technologies 420, rue d’Estienne d’Orves - CS 40008, 92705 Colombes Cedex, France', 'cert_lab': 'THALES (TCS – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France'}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}
. - The report_keywords property was set to
{'cc_cert_id': {'FR': {'ANSSI-CC-2013/65': 44, 'ANSSI-CC-2012/39': 8, 'ANSSI-CC-2011/07': 2, 'ANSSI-CC-2011/07-S01': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0035-2007': 1}, 'ANSSI': {'ANSSI-CC-PP-2010/03': 1, 'ANSSI-CC-PP-2010/04': 1}}, 'cc_security_level': {'EAL': {'EAL 4': 1, 'EAL4': 4, 'EAL7': 1, 'EAL 1': 1, 'EAL 3': 1, 'EAL 5': 1, 'EAL 7': 1, 'EAL4+': 3}, 'ITSEC': {'ITSEC E6 Elevé': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE': 3, 'AGD_PRE': 2}, 'ALC': {'ALC_DVS.2': 3, 'ALC_FLR': 2, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.5': 3, 'AVA_VAN': 3}, 'ASE': {'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'STMicroelectronics': {'STMicroelectronics': 3}, 'Oberthur': {'Oberthur Technologies': 11}}, 'eval_facility': {}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA1': 2}, 'SHA2': {'SHA2': 2}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Neslib': {'NesLib v3.0': 1}}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2009-07-001': 1, 'CCMB-2009-07-002': 1, 'CCMB-2009-07-003': 1, 'CCMB-2009-07-004': 1}}, 'javacard_version': {'JavaCard': {'Java Card 3.0.1': 1}}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
ANSSI-CC-2013_65.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['THALES']
. - The cert_id property was set to
ANSSI-CC-2013/65
. - The st_references property was updated, with the
{'directly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2012/39', 'ANSSI-CC-2011/07']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2012/39', 'ANSSI-CC-2011/07']}}
data. - The report_references property was updated, with the
{'directly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2012/39', 'ANSSI-CC-2011/07']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2011/07', 'ANSSI-CC-2012/06', 'ANSSI-CC-2010/49', 'ANSSI-CC-2010/50', 'ANSSI-CC-2011/24', 'ANSSI-CC-2012/39']}}
data.
- The report_download_ok property was set to
-
22.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report_download_ok property was set to
False
. - The report_convert_ok property was set to
False
. - The report_extract_ok property was set to
False
. - The errors property was set to
['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC-2013_65.pdf, code: nok', 'failed to download report from https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC-2013_65.pdf, code: 408']
. - The report_pdf_hash property was set to
None
. - The report_txt_hash property was set to
None
.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The report_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
. - The st_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data. - The report_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data.
- The report_download_ok property was set to
-
05.10.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The following values were inserted:
{'st_convert_garbage': False, 'report_convert_garbage': False}
.
- The following values were inserted:
-
28.09.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2011/07-S01']}}, 'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2011/07-S01']}}}
data. - The report_references property was updated, with the
{'directly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2011/07-S01']}}, 'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2009/57', 'ANSSI-CC-2011/07-S01']}}}
data.
- The st_references property was updated, with the
-
24.09.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The following values were inserted:
{'report_filename': 'ANSSI-CC-2013_65.pdf', 'st_filename': 'FQR 110 6672 Ed1 - ST JUBA Lite.pdf'}
. - The report_keywords property was updated, with the
{'cc_cert_id': {'__update__': {'FR': {'__insert__': {'ANSSI-CC-2011/07-S01': 1}, '__update__': {'ANSSI-CC-2012/39': 8}}}}, 'cc_security_level': {'__update__': {'EAL': {'__insert__': {'EAL7': 1}, '__update__': {'EAL 4': 1, 'EAL4': 4}, '__delete__': ['EAL 2', 'EAL 6', 'EAL 4+']}}}, 'cc_sar': {'__update__': {'ALC': {'__update__': {'ALC_FLR': 2}, '__delete__': ['ALC_LCD']}, 'AVA': {'__update__': {'AVA_VAN.5': 3}}}}, 'cc_claims': {}, 'vendor': {'__update__': {'Oberthur': {'__update__': {'Oberthur Technologies': 11}, '__delete__': ['Oberthur']}}}, 'symmetric_crypto': {'__update__': {'DES': {'__update__': {'DES': {'__update__': {'DES': 1}}}}}, '__delete__': ['AES_competition']}, 'asymmetric_crypto': {}, 'tee_name': {}, 'standard_id': {'__update__': {'CC': {'__insert__': {'CCMB-2009-07-003': 1, 'CCMB-2009-07-004': 1}}}}}
data. - The st_keywords property was updated, with the
{'cc_sar': {'__update__': {'ADV': {'__update__': {'ADV_FSP.4': 9, 'ADV_IMP.1': 4}}, 'AGD': {'__update__': {'AGD_OPE': 2}}, 'ALC': {'__update__': {'ALC_CMS.4': 1}}, 'ATE': {'__update__': {'ATE_DPT.1': 2, 'ATE_FUN.1': 6}}, 'AVA': {'__update__': {'AVA_VAN.5': 5}}, 'ASE': {'__update__': {'ASE_ECD.1': 4, 'ASE_REQ.2': 2, 'ASE_SPD.1': 2}}}}, 'cc_sfr': {'__update__': {'FAU': {'__insert__': {'FAU_SAR': 12, 'FAU_SAR.1': 4}, '__update__': {'FAU_SAA.1': 8, 'FAU_GEN.1': 11}}, 'FCS': {'__insert__': {'FCS_CKM': 9, 'FCS_COP': 40}, '__update__': {'FCS_CKM.4': 20, 'FCS_COP.1': 9, 'FCS_CKM.1': 8}}, 'FDP': {'__insert__': {'FDP_ACC': 149, 'FDP_ACC.2': 14, 'FDP_ACF': 133, 'FDP_IFC': 77, 'FDP_IFC.2': 8, 'FDP_IFF': 62, 'FDP_ITC': 28}, '__update__': {'FDP_ACF.1': 35, 'FDP_IFF.1': 24, 'FDP_ITC.2': 17}}, 'FIA': {'__insert__': {'FIA_AFL': 16, 'FIA_AFL.1': 4, 'FIA_UAU': 35, 'FIA_UAU.6': 1, 'FIA_UID': 24, 'FIA_SOS': 1}, '__update__': {'FIA_UID.1': 10, 'FIA_UAU.1': 8}}, 'FMT': {'__insert__': {'FMT_SMF': 17, 'FMT_MOF': 7, 'FMT_MOF.1': 1, 'FMT_MTD': 4, 'FMT_MTD.1': 1, 'FMT_MSA': 9}, '__update__': {'FMT_MSA.2': 4, 'FMT_MSA.3': 29, 'FMT_SMR.1': 18, 'FMT_SMF.1': 5, 'FMT_MSA.1': 3}}, 'FPR': {'__update__': {'FPR_UNO.1': 4}}, 'FPT': {'__insert__': {'FPT_RPL': 1}}, 'FTP': {'__update__': {'FTP_ITC.1': 10}}}}, 'cc_claims': {'__update__': {'O': {'__update__': {'O.TRANSACTION_UNIQUENESS': 33, 'O.TRANSACTION_BYPASS': 53, 'O.USER_AUTH': 55, 'O.ISSUING_BANK_AUTH': 54, 'O.MNO_AUTH': 8, 'O.DATA_INTEGRITY': 62, 'O.RISK_MNGT': 10, 'O.APP_BLOCK': 13, 'O.SIM_UNLOCK': 10, 'O.CHANNELS': 9, 'O.GUIS_AUTH': 13}, '__delete__': ['O.AUTHORISATION_CONT']}, 'T': {'__update__': {'T.INTEG_LOG_FILE': 5, 'T.TRANSACTION_COUNTERFEITING': 13, 'T.APPLICATIONS_DOS': 7}, '__delete__': ['T']}, 'OE': {'__update__': {'OE.GUI_INST_ALERT': 7, 'OE.TOE_USAGE': 9, 'OE.GUIS_IDENTIFICATION': 5, 'OE.POLICY': 5, 'OE.NFC_PROTOCOL': 5, 'OE.TRANSACTION_DISPLAY': 5, 'OE.CHANNELS_SELECTION': 4, 'OE.GUIS_TIMEOUT': 7, 'OE.MERCHANT_CONTROL': 7, 'OE.LATENCY_CONTROL': 5, 'OE.POS_APPROVAL': 7, 'OE.CERTIFICATES_MNGT': 11, 'OE.BANKS_PRIVILEGES': 4}}}}, 'vendor': {'__update__': {'STMicroelectronics': {'__delete__': ['STM']}}}, 'symmetric_crypto': {'__update__': {'DES': {'__update__': {'DES': {'__update__': {'DES': 1}}}}}}, 'asymmetric_crypto': {'__delete__': ['FF']}, 'tee_name': {}, 'javacard_packages': {'javacard': {'javacard.security': 1}}}
data.
The computed heuristics were updated.
- The report_references property was updated, with the
{'directly_referencing': {'__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2011/07-S01']}}, 'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2011/07-S01']}}}
data.
- The following values were inserted:
-
18.07.2022 The certificate data changed.
Certificate changed
The _type was updated.
- The new value is
sec_certs.sample.common_criteria.CommonCriteriaCert
.
The Maintenance Updates of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.common_criteria.CommonCriteriaCert.MaintenanceReport', 'maintenance_date': '2014-04-09', 'maintenance_title': 'Rapport de maintenance ANSSI-CC-2013/65-M01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC-2013_65_M01.pdf', 'maintenance_st_link': None}, {'_type': 'sec_certs.sample.common_criteria.CommonCriteriaCert.MaintenanceReport', 'maintenance_date': '2014-05-23', 'maintenance_title': 'ANSSI-CC-2013/65-M02', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC-2013_65_M02.pdf', 'maintenance_st_link': None}]}
.
The state of the certificate object was updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState
.
The PDF extraction data was updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData
.
The computed heuristics were updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics
. - The st_references property was updated, with the
{'_type': 'sec_certs.sample.certificate.References'}
data. - The report_references property was updated, with the
{'_type': 'sec_certs.sample.certificate.References'}
data. - The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}]}
.
- The new value is
-
17.07.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_metadata property was updated, with the
{'pdf_hyperlinks': {'_type': 'Set', 'elements': ['mailto:certification.anssi@ssi.gouv.fr', 'http://www.ssi.gouv.fr/']}}
values inserted. - The st_metadata property was updated, with the
{'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
values inserted. - The report_keywords property was set to
{'cc_cert_id': {'FR': {'ANSSI-CC-2013/65': 44, 'ANSSI-CC-2012/39': 6, 'ANSSI-CC-2011/07': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0035-2007': 1}, 'ANSSI': {'ANSSI-CC-PP-2010/03': 1, 'ANSSI-CC-PP-2010/04': 1}}, 'cc_security_level': {'EAL': {'EAL 4': 2, 'EAL4': 3, 'EAL 1': 1, 'EAL 2': 1, 'EAL 3': 1, 'EAL 5': 1, 'EAL 6': 1, 'EAL 7': 1, 'EAL 4+': 1, 'EAL4+': 3}, 'ITSEC': {'ITSEC E6 Elevé': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE': 3, 'AGD_PRE': 2}, 'ALC': {'ALC_DVS.2': 3, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_FLR': 1, 'ALC_LCD': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.5': 2, 'AVA_VAN': 3}, 'ASE': {'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {'T': {'T': 1}}, 'vendor': {'STMicroelectronics': {'STMicroelectronics': 3}, 'Oberthur': {'Oberthur Technologies': 10, 'Oberthur': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'E2': {'E2': 1}}, 'DES': {'DES': {'DES': 7}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA1': 2}, 'SHA2': {'SHA2': 2}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Neslib': {'NesLib v3.0': 1}}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 2}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2009-07-001': 1, 'CCMB-2009-07-002': 1}}, 'javacard_version': {'JavaCard': {'Java Card 3.0.1': 1}}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {'FR': {'ANSSI-CC-2012/39': 2, 'ANSSI-CC-2011/07': 2, 'ANSSI-CC-2011/07-S01': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0035': 1}, 'ANSSI': {'ANSSI-CC-PP 2010/04': 1}}, 'cc_security_level': {'EAL': {'EAL4+': 10, 'EAL4': 3, 'EAL 4': 1, 'EAL4 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 5, 'ADV_FSP.4': 10, 'ADV_IMP.1': 5, 'ADV_TDS.3': 8, 'ADV_FSP.1': 3, 'ADV_TDS.1': 2, 'ADV_FSP.2': 2, 'ADV_TDS.2': 1}, 'AGD': {'AGD_PRE': 1, 'AGD_OPE': 1, 'AGD_OPE.1': 5, 'AGD_PRE.1': 5}, 'ALC': {'ALC_DVS.2': 6, 'ALC_TAT.1': 3, 'ALC_CMC.4': 1, 'ALC_CMS.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 3, 'ALC_CMS.4': 2, 'ALC_DEL.1': 1}, 'ATE': {'ATE_DPT.1': 3, 'ATE_COV.2': 3, 'ATE_FUN.1': 7, 'ATE_COV.1': 2, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.5': 3}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 5, 'ASE_INT.1': 5, 'ASE_REQ.1': 2, 'ASE_REQ.2': 3, 'ASE_OBJ.2': 3, 'ASE_SPD.1': 3, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 7, 'FAU_ARP.1.1': 1, 'FAU_SAA.1': 9, 'FAU_SAA.1.1': 1, 'FAU_SAA.1.2': 2, 'FAU_GEN.1': 12, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1}, 'FCS': {'FCS_CKM.4': 21, 'FCS_CKM.4.1': 1, 'FCS_COP.1': 5, 'FCS_COP.1.1': 1, 'FCS_CKM.2': 1, 'FCS_CKM.1': 7}, 'FDP': {'FDP_ACF.1.2': 7, 'FDP_ACF.1.3': 1, 'FDP_IFF.1.2': 4, 'FDP_SDI.2': 5, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_RIP.1': 7, 'FDP_RIP.1.1': 1, 'FDP_DAU.1': 5, 'FDP_DAU.1.1': 1, 'FDP_DAU.1.2': 1, 'FDP_ETC.1': 15, 'FDP_ETC.1.1': 1, 'FDP_ETC.1.2': 1, 'FDP_ITC.1': 27, 'FDP_ITC.1.1': 1, 'FDP_ITC.1.2': 1, 'FDP_ITC.1.3': 1, 'FDP_UIT.1': 13, 'FDP_UIT.1.1': 1, 'FDP_UIT.1.2': 1, 'FDP_ACF.1': 7, 'FDP_ACC.1': 14, 'FDP_IFF.1': 4, 'FDP_IFC.1': 11, 'FDP_ITC.2': 7}, 'FIA': {'FIA_ATD.1': 9, 'FIA_ATD.1.1': 1, 'FIA_UAU.3': 7, 'FIA_UAU.3.1': 1, 'FIA_UAU.3.2': 1, 'FIA_UAU.4': 9, 'FIA_UAU.4.1': 1, 'FIA_USB.1': 7, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_SOS.2': 8, 'FIA_SOS.2.1': 1, 'FIA_SOS.2.2': 1, 'FIA_UID.1': 4, 'FIA_UAU.1': 2}, 'FMT': {'FMT_MSA.2': 5, 'FMT_MSA.2.1': 1, 'FMT_MSA.3': 30, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_SMR.1': 19, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SMF.1': 4, 'FMT_MSA.1': 2}, 'FPR': {'FPR_UNO.1': 5, 'FPR_UNO.1.1': 1}, 'FPT': {'FPT_TST.1': 7, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_TDC.1': 16, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 1, 'FPT_RPL.1': 4, 'FPT_RPL.1.1': 1, 'FPT_RPL.1.2': 1, 'FPT_STM.1': 3}, 'FTP': {'FTP_ITC.1': 11, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP.1': 3}}, 'cc_claims': {'O': {'O.TRANSACTION_UNIQUENESS': 34, 'O.TRANSACTION_INTEGRITY': 38, 'O.TRANSACTION_BYPASS': 54, 'O.TRANSACTION_REPLAY': 13, 'O.USER_AUTH': 56, 'O.ISSUING_BANK_AUTH': 55, 'O.MNO_AUTH': 9, 'O.COMM_AUTH': 5, 'O.AUTHORISATION_CONTROL': 19, 'O.DATA_DISCLOSURE': 44, 'O.DATA_INTEGRITY': 63, 'O.DATA_USERS': 10, 'O.RISK_MNGT': 16, 'O.APP_BLOCK': 18, 'O.SIM_UNLOCK': 11, 'O.AUDIT': 14, 'O.CHANNELS': 10, 'O.AUDIT_ACCESS': 10, 'O.GUIS_AUTH': 21, 'O.TRANSACTION_UNIQUENES': 2, 'O.TRANSACTION_UNIQUENE': 1, 'O.AUTHORISATION_CONTR': 1, 'O.COMM_INTEGRITY': 1, 'O.TRANSACTION_UNIQUE': 1, 'O.TRANSACTION_INTEGRI': 1, 'O.AUTHORISATION_CONT': 1, 'O.TRANSACTION_INTEG': 1, 'O.APP_BLOC': 1}, 'T': {'T': 1, 'T.DISCLOSURE_KEYS': 6, 'T.DISCLOSURE_REF_PC': 6, 'T.INTEG_LOG_FILE': 6, 'T.INTEG_KEYS': 8, 'T.INTEG_ACCOUNT_INFO': 6, 'T.INTEG_REF_PC': 6, 'T.INTEG_TRANS_PARAM': 7, 'T.INTEG_COUNT': 7, 'T.TEMPORARY_DATA': 7, 'T.INTEG_SEL_ACT_PARAM': 6, 'T.STEALING': 9, 'T.MERCHANT_ACCOMPLICE': 9, 'T.MAN-IN-THE-MIDDLE': 12, 'T.TRANSACTION_REPUDIATION': 7, 'T.TRANSACTION_COUNTERFEITING': 14, 'T.TRANSACTION_REPLAY': 8, 'T.CERTIF_CORRUPTION': 5, 'T.APPLICATIONS_DOS': 8, 'T.MNO_USURPATION': 5, 'T.ISSUING-BANK_USURPATION': 3, 'T.CUSTOMER_USURPATION': 7, 'T.ISSUING-': 2}, 'A': {'A.MERCHANT_AUTH': 5}, 'OE': {'OE.CUSTOMER_PC_CONFID': 8, 'OE.GUI_INST_ALERT': 8, 'OE.TOE_USAGE': 10, 'OE.GUIS_IDENTIFICATION': 6, 'OE.POLICY': 6, 'OE.NFC_PROTOCOL': 6, 'OE.TRANSACTION_DISPLAY': 6, 'OE.CHANNELS_SELECTION': 5, 'OE.GUIS_TIMEOUT': 8, 'OE.MERCHANT_CONTROL': 8, 'OE.MERCHANT_AUTH': 8, 'OE.LATENCY_CONTROL': 6, 'OE.POS_APPROVAL': 8, 'OE.POS_APPLICATIONS': 10, 'OE.POS_DEACTIVATION': 6, 'OE.CERTIFICATES_MNGT': 12, 'OE.NO_VAD': 6, 'OE.BANKS_PRIVILEGES': 6, 'OE.GUIS_AUTH': 1}, 'OSP': {'OSP.POLICY': 4, 'OSP.CUSTOMER_PC_CONFID': 3, 'OSP.GUIS_IDENTIFICATION': 4, 'OSP.CERTIFICATES_MNGT': 4, 'OSP.TOE_USAGE': 4, 'OSP.PISHING': 4, 'OSP.MERCHANT_CONTROL': 6, 'OSP.BANKS_PRIVILEGES': 4, 'OSP.CUSTOMER_PC_CONFI': 1}}, 'vendor': {'STMicroelectronics': {'STMicroelectronics': 4, 'STM': 3}, 'Oberthur': {'Oberthur Technologies': 137, 'Oberthur': 8}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 2}}, 'DES': {'DES': {'DES': 7}, '3DES': {'TDES': 1, '3DES': 4}}}, 'asymmetric_crypto': {'RSA': {'RSA 1024': 1}, 'FF': {'DSA': {'DSA': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 4}}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 1}}, 'cipher_mode': {'CBC': {'CBC': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Neslib': {'NESLIB 3.0': 2}}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 9}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 46-3': 1, 'FIPS PUB 81': 1, 'FIPS PUB 140-2': 1, 'FIPS PUB 180-3': 1, 'FIPS PUB 186-3': 1, 'FIPS PUB 197': 1}, 'PKCS': {'PKCS#1': 2, 'PKCS 1': 1}, 'ISO': {'ISO/IEC 9796-1': 1, 'ISO/IEC 9797-1': 1}, 'SCP': {'SCP02': 1, 'SCP80': 1}}, 'javacard_version': {'GlobalPlatform': {'GlobalPlatform 2.1.1': 1}}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
.
The computed heuristics were updated.
- The _type property was set to
Heuristics
.
- The report_metadata property was updated, with the
-
14.06.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The following values were inserted:
{'report_pdf_hash': '2e4127e86969ec105569806f18118fd611c63f4a9d829a478df861e6318532d5', 'st_pdf_hash': '734f297c82adaa229149775ac66c2d92919abd255e282c447445e63b13334675', 'report_txt_hash': '263aaaa523c471afe1ec9b93ab6e8df0cc5691eb3025b7f40a5e155b026f155a', 'st_txt_hash': 'a12c1c5b1fe4396131085d0e0176fe1d760a42bd8b7cf77af908e01c93df5723'}
.
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'rules_symmetric_crypto': {'E2': 1, 'DES': 7}, 'rules_asymmetric_crypto': {'ECC': 1}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA1': 2}, 'rules_crypto_schemes': {}, 'rules_randomness': {}, 'rules_tee': {'SE': 2}, 'rules_side_channels': {}}
values inserted. - The st_keywords property was updated, with the
{'rules_symmetric_crypto': {'AES': 2, 'DES': 2, 'TDES': 1, '3DES': 4}, 'rules_asymmetric_crypto': {'RSA 1024': 1, 'DSA': 1}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA-1': 1}, 'rules_crypto_schemes': {'MAC': 4}, 'rules_randomness': {'RNG': 1}, 'rules_tee': {'SE': 9}, 'rules_side_channels': {}}
values inserted.
- The following values were inserted:
-
13.05.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_DPT', 'level': 1}]}}
.
- The following values were inserted:
-
24.04.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'direct_dependency_cves': None, 'indirect_dependency_cves': None}
.
- The following values were inserted:
-
08.03.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2011/07-S01', 'ANSSI-CC-2012/39', 'ANSSI-CC-2011/07']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2011/07-S01', 'ANSSI-CC-2012/39', 'ANSSI-CC-2011/07']}}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2011/07', 'ANSSI-CC-2012/39']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2011/07', 'ANSSI-CC-2012/06', 'ANSSI-CC-2010/49', 'ANSSI-CC-2010/50', 'ANSSI-CC-2009/57', 'ANSSI-CC-2011/24', 'ANSSI-CC-2012/39']}}}
. - The following properties were deleted:
['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting']
.
- The following values were inserted:
-
18.02.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_frontpage property was updated, with the
{'nscib': {}, 'niap': {}, 'canada': {}}
values inserted. - The st_frontpage property was updated, with the
{'nscib': {}, 'niap': {}, 'canada': {}}
values inserted. - The st_keywords property was updated, with the
{'rules_cert_id': {'__insert__': {'ANSSI-CC-2011/07-S01': 1}}}
data.
The computed heuristics were updated.
- The extracted_versions property was set to
{'_type': 'Set', 'elements': ['01.00.04']}
.
- The report_frontpage property was updated, with the
-
28.01.2022 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Application Mobile MasterCard PayPass V1 - M/Chip 4, version V01.00.04, sur plateforme NFC FlyBuy Platinum V2 sur composant ST33F1ME was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "6e4de0c194952a21",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2013/65",
"cert_lab": [
"THALES"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"01.00.04"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2012/39",
"ANSSI-CC-2011/07"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2011/24",
"ANSSI-CC-2012/39",
"ANSSI-CC-2012/06",
"ANSSI-CC-2009/25",
"ANSSI-CC-2010/50",
"ANSSI-CC-2010/49",
"ANSSI-CC-2011/07",
"ANSSI-CC-2009/57"
]
}
},
"scheme_data": {
"cert_id": "2013/65",
"description": "Le produit certif\u00e9 est la \u00ab Carte Mobile MasterCard PayPass \u2013 M/Chip 4 sur plateforme NFC FlyBuy Platinum V2 sur composant ST33F1ME \u00bb d\u00e9velopp\u00e9e par Oberthur Technologies et STMicroelectronics.\n\nCe produit est une carte (U)SIM destin\u00e9e \u00e0 \u00eatre ins\u00e9r\u00e9e dans un t\u00e9l\u00e9phone portable disposant de la technologie NFC2. Il embarque l\u0026#39;application Mobile PayPass v1.0 qui met en oeuvre la solution \u00ab Paye",
"developer": "Oberthur Technologies / Oberthur Technologies",
"enhanced": {
"augmented": "ALC_DVS.2, AVA_VAN.5",
"category": "Cartes \u00e0 puce",
"cc_version": "Crit\u00e8res Communs version 3.1r3",
"cert_id": "2013/65",
"certification_date": "24/12/2013",
"developer": "Oberthur Technologies / Oberthur Technologies",
"evaluation_facility": "THALES (TCS \u2013 CNES)",
"level": "EAL4+",
"mutual_recognition": "SOG-IS\n CCRA",
"protection_profile": "",
"report_link": "https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2013-65fr.pdf",
"sponsor": "Oberthur Technologies",
"target_link": "https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2013-65en.pdf"
},
"level": "EAL4+",
"product": "Application Mobile MasterCard PayPass V1 - M/Chip 4, version V01.00.04, sur plateforme NFC FlyBuy Platinum V2 sur composant ST33F1ME",
"sponsor": "Oberthur Technologies",
"url": "https://cyber.gouv.fr/produits-certifies/application-mobile-mastercard-paypass-v1-mchip-4-version-v010004-sur-plateforme"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2012/39",
"ANSSI-CC-2011/07"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2012/39",
"ANSSI-CC-2011/07"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2014-05-23",
"maintenance_report_link": "https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC-2013_65_M02.pdf",
"maintenance_st_link": null,
"maintenance_title": "ANSSI-CC-2013/65-M02"
},
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2014-04-09",
"maintenance_report_link": "https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC-2013_65_M01.pdf",
"maintenance_st_link": null,
"maintenance_title": "Rapport de maintenance ANSSI-CC-2013/65-M01"
}
]
},
"manufacturer": "Oberthur Technologies / STMicroelectronics",
"manufacturer_web": "https://www.oberthur.com/",
"name": "Application Mobile MasterCard PayPass V1 - M/Chip 4, version V01.00.04, sur plateforme NFC FlyBuy Platinum V2 sur composant ST33F1ME",
"not_valid_after": "2019-09-01",
"not_valid_before": "2013-12-24",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "ANSSI-CC-2013_65.pdf",
"report_frontpage": {
"FR": {
"cc_security_level": "EAL 4 augment\u00e9 ALC_DVS.2, AVA_VAN.5",
"cc_version": "Crit\u00e8res Communs version 3.1 r\u00e9vision 3",
"cert_id": "ANSSI-CC-2013/65",
"cert_item": "Carte Mobile MasterCard PayPass \u2013 M/Chip 4 sur plateforme NFC FlyBuy Platinum V2 sur composant ST33F1ME",
"cert_item_version": "MasterCard Mobile PayPass V1 \u2013 Version V01.00.04 Identification hardware 0768910, identification card Manager GOP Ref V1.8.v",
"cert_lab": "THALES (TCS \u2013 CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France",
"developer": "Oberthur Technologies 420, rue d\u2019Estienne d\u2019Orves, CS 40008, 92705 Colombes Cedex, France STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, B.P.2, 13106 Rousset, France Commanditaire Oberthur Technologies 420, rue d\u2019Estienne d\u2019Orves - CS 40008, 92705 Colombes Cedex, France",
"match_rules": [
"R\u00e9f\u00e9rence du rapport de certification(.+)Nom du produit(.+)R\u00e9f\u00e9rence/version du produit(.*)Conformit\u00e9 \u00e0 un profil de protection(.+)Crit\u00e8res d\u2019\u00e9valuation et version(.+)Niveau d\u2019\u00e9valuation(.+)D\u00e9veloppeurs(.+)Centre d\u2019\u00e9valuation(.+)Accords de reconnaissance applicables"
],
"ref_protection_profiles": "n\u00e9ant"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2011/07": 1,
"ANSSI-CC-2011/07-S01": 1,
"ANSSI-CC-2012/39": 4,
"ANSSI-CC-2013/65": 22
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"ANSSI": {
"ANSSI-CC-PP-2010/03": 1,
"ANSSI-CC-PP-2010/04": 1
},
"BSI": {
"BSI-PP-0035-2007": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_FSP": 1,
"ADV_IMP": 1,
"ADV_INT": 1,
"ADV_SPM": 1,
"ADV_TDS": 1
},
"AGD": {
"AGD_OPE": 3,
"AGD_PRE": 2
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMS": 1,
"ALC_DEL": 1,
"ALC_DVS": 1,
"ALC_DVS.2": 3,
"ALC_FLR": 2,
"ALC_TAT": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_ECD": 1,
"ASE_INT": 1,
"ASE_OBJ": 1,
"ASE_REQ": 1,
"ASE_SPD": 1,
"ASE_TSS": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_DPT": 1,
"ATE_FUN": 1,
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 3,
"AVA_VAN.5": 3
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 3": 1,
"EAL 4": 1,
"EAL 5": 1,
"EAL 7": 1,
"EAL4": 4,
"EAL4+": 3,
"EAL7": 1
},
"ITSEC": {
"ITSEC E6 Elev\u00e9": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"Neslib": {
"NesLib v3.0": 1
}
},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA1": 2
},
"SHA2": {
"SHA2": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {
"JavaCard": {
"Java Card 3.0.1": 1
}
},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2009-07-001": 1,
"CCMB-2009-07-002": 1,
"CCMB-2009-07-003": 1,
"CCMB-2009-07-004": 1
}
},
"symmetric_crypto": {
"DES": {
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Oberthur": {
"Oberthur Technologies": 11
},
"STMicroelectronics": {
"STMicroelectronics": 3
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Duquesnoy",
"/CreationDate": "D:20140129142922+01\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2010",
"/Keywords": "ANSSI-CC-CER-F-07.010",
"/ModDate": "D:20140129142922+01\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2010",
"/Subject": "Application Mobile MasterCard PayPass V1 - M/Chip 4, version V01.00.04, sur plateforme NFC FlyBuy Platinum V2 sur composant ST33F1ME",
"/Title": "ANSSI-CC-2013/65",
"pdf_file_size_bytes": 774691,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.ssi.gouv.fr/",
"mailto:certification.anssi@ssi.gouv.fr"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 21
},
"st_filename": "FQR 110 6672 Ed1 - ST JUBA Lite.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"RSA": {
"RSA 1024": 1
}
},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2011/07": 1,
"ANSSI-CC-2011/07-S01": 1,
"ANSSI-CC-2012/39": 1
}
},
"cc_claims": {
"A": {
"A.MERCHANT_AUTH": 5
},
"O": {
"O.APP_BLOC": 1,
"O.APP_BLOCK": 13,
"O.AUDIT": 14,
"O.AUDIT_ACCESS": 10,
"O.AUTHORISATION_CONTR": 1,
"O.AUTHORISATION_CONTROL": 19,
"O.CHANNELS": 9,
"O.COMM_AUTH": 5,
"O.COMM_INTEGRITY": 1,
"O.DATA_DISCLOSURE": 44,
"O.DATA_INTEGRITY": 62,
"O.DATA_USERS": 10,
"O.GUIS_AUTH": 13,
"O.ISSUING_BANK_AUTH": 54,
"O.MNO_AUTH": 8,
"O.RISK_MNGT": 10,
"O.SIM_UNLOCK": 10,
"O.TRANSACTION_BYPASS": 53,
"O.TRANSACTION_INTEG": 1,
"O.TRANSACTION_INTEGRI": 1,
"O.TRANSACTION_INTEGRITY": 38,
"O.TRANSACTION_REPLAY": 13,
"O.TRANSACTION_UNIQUE": 1,
"O.TRANSACTION_UNIQUENE": 1,
"O.TRANSACTION_UNIQUENES": 2,
"O.TRANSACTION_UNIQUENESS": 33,
"O.USER_AUTH": 55
},
"OE": {
"OE.BANKS_PRIVILEGES": 4,
"OE.CERTIFICATES_MNGT": 11,
"OE.CHANNELS_SELECTION": 4,
"OE.CUSTOMER_PC_CONFID": 8,
"OE.GUIS_AUTH": 1,
"OE.GUIS_IDENTIFICATION": 5,
"OE.GUIS_TIMEOUT": 7,
"OE.GUI_INST_ALERT": 7,
"OE.LATENCY_CONTROL": 5,
"OE.MERCHANT_AUTH": 8,
"OE.MERCHANT_CONTROL": 7,
"OE.NFC_PROTOCOL": 5,
"OE.NO_VAD": 6,
"OE.POLICY": 5,
"OE.POS_APPLICATIONS": 10,
"OE.POS_APPROVAL": 7,
"OE.POS_DEACTIVATION": 6,
"OE.TOE_USAGE": 9,
"OE.TRANSACTION_DISPLAY": 5
},
"OSP": {
"OSP.BANKS_PRIVILEGES": 4,
"OSP.CERTIFICATES_MNGT": 4,
"OSP.CUSTOMER_PC_CONFI": 1,
"OSP.CUSTOMER_PC_CONFID": 3,
"OSP.GUIS_IDENTIFICATION": 4,
"OSP.MERCHANT_CONTROL": 6,
"OSP.PISHING": 4,
"OSP.POLICY": 4,
"OSP.TOE_USAGE": 4
},
"T": {
"T.APPLICATIONS_DOS": 7,
"T.CERTIF_CORRUPTION": 5,
"T.CUSTOMER_USURPATION": 7,
"T.DISCLOSURE_KEYS": 6,
"T.DISCLOSURE_REF_PC": 6,
"T.INTEG_ACCOUNT_INFO": 6,
"T.INTEG_COUNT": 7,
"T.INTEG_KEYS": 8,
"T.INTEG_LOG_FILE": 5,
"T.INTEG_REF_PC": 6,
"T.INTEG_SEL_ACT_PARAM": 6,
"T.INTEG_TRANS_PARAM": 7,
"T.ISSUING-": 2,
"T.ISSUING-BANK_USURPATION": 3,
"T.MAN-IN-THE-MIDDLE": 12,
"T.MERCHANT_ACCOMPLICE": 9,
"T.MNO_USURPATION": 5,
"T.STEALING": 9,
"T.TEMPORARY_DATA": 7,
"T.TRANSACTION_COUNTERFEITING": 13,
"T.TRANSACTION_REPLAY": 8,
"T.TRANSACTION_REPUDIATION": 7
}
},
"cc_protection_profile_id": {
"ANSSI": {
"ANSSI-CC-PP 2010/04": 1
},
"BSI": {
"BSI-PP-0035": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 5,
"ADV_FSP.1": 3,
"ADV_FSP.2": 2,
"ADV_FSP.4": 9,
"ADV_IMP.1": 4,
"ADV_TDS.1": 2,
"ADV_TDS.2": 1,
"ADV_TDS.3": 8
},
"AGD": {
"AGD_OPE": 2,
"AGD_OPE.1": 5,
"AGD_PRE": 1,
"AGD_PRE.1": 5
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.1": 1,
"ALC_CMS.4": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_DVS.2": 6,
"ALC_LCD.1": 3,
"ALC_TAT.1": 3
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 4,
"ASE_INT.1": 5,
"ASE_OBJ.2": 3,
"ASE_REQ.1": 2,
"ASE_REQ.2": 2,
"ASE_SPD.1": 2,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.1": 2,
"ATE_COV.2": 3,
"ATE_DPT.1": 2,
"ATE_FUN.1": 6,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.5": 5
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 1,
"EAL4": 3,
"EAL4 augmented": 2,
"EAL4+": 10
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP.1": 7,
"FAU_ARP.1.1": 1,
"FAU_GEN.1": 11,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_SAA.1": 8,
"FAU_SAA.1.1": 1,
"FAU_SAA.1.2": 2,
"FAU_SAR": 12,
"FAU_SAR.1": 4
},
"FCS": {
"FCS_CKM": 9,
"FCS_CKM.1": 8,
"FCS_CKM.2": 1,
"FCS_CKM.4": 20,
"FCS_CKM.4.1": 1,
"FCS_COP": 40,
"FCS_COP.1": 9,
"FCS_COP.1.1": 1
},
"FDP": {
"FDP_ACC": 149,
"FDP_ACC.1": 14,
"FDP_ACC.2": 14,
"FDP_ACF": 133,
"FDP_ACF.1": 35,
"FDP_ACF.1.2": 7,
"FDP_ACF.1.3": 1,
"FDP_DAU.1": 5,
"FDP_DAU.1.1": 1,
"FDP_DAU.1.2": 1,
"FDP_ETC.1": 15,
"FDP_ETC.1.1": 1,
"FDP_ETC.1.2": 1,
"FDP_IFC": 77,
"FDP_IFC.1": 11,
"FDP_IFC.2": 8,
"FDP_IFF": 62,
"FDP_IFF.1": 24,
"FDP_IFF.1.2": 4,
"FDP_ITC": 28,
"FDP_ITC.1": 27,
"FDP_ITC.1.1": 1,
"FDP_ITC.1.2": 1,
"FDP_ITC.1.3": 1,
"FDP_ITC.2": 17,
"FDP_RIP.1": 7,
"FDP_RIP.1.1": 1,
"FDP_SDI.2": 5,
"FDP_SDI.2.1": 1,
"FDP_SDI.2.2": 1,
"FDP_UIT.1": 13,
"FDP_UIT.1.1": 1,
"FDP_UIT.1.2": 1
},
"FIA": {
"FIA_AFL": 16,
"FIA_AFL.1": 4,
"FIA_ATD.1": 9,
"FIA_ATD.1.1": 1,
"FIA_SOS": 1,
"FIA_SOS.2": 8,
"FIA_SOS.2.1": 1,
"FIA_SOS.2.2": 1,
"FIA_UAU": 35,
"FIA_UAU.1": 8,
"FIA_UAU.3": 7,
"FIA_UAU.3.1": 1,
"FIA_UAU.3.2": 1,
"FIA_UAU.4": 9,
"FIA_UAU.4.1": 1,
"FIA_UAU.6": 1,
"FIA_UID": 24,
"FIA_UID.1": 10,
"FIA_USB.1": 7,
"FIA_USB.1.1": 1,
"FIA_USB.1.2": 1,
"FIA_USB.1.3": 1
},
"FMT": {
"FMT_MOF": 7,
"FMT_MOF.1": 1,
"FMT_MSA": 9,
"FMT_MSA.1": 3,
"FMT_MSA.2": 4,
"FMT_MSA.2.1": 1,
"FMT_MSA.3": 29,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD": 4,
"FMT_MTD.1": 1,
"FMT_SMF": 17,
"FMT_SMF.1": 5,
"FMT_SMR.1": 18,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPR": {
"FPR_UNO.1": 4,
"FPR_UNO.1.1": 1
},
"FPT": {
"FPT_RPL": 1,
"FPT_RPL.1": 4,
"FPT_RPL.1.1": 1,
"FPT_RPL.1.2": 1,
"FPT_STM.1": 3,
"FPT_TDC.1": 16,
"FPT_TDC.1.1": 1,
"FPT_TDC.1.2": 1,
"FPT_TST.1": 7,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FTP": {
"FTP_ITC.1": 10,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1,
"FTP_TRP.1": 3
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"Neslib": {
"NESLIB 3.0": 2
}
},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 4
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {
"javacard": {
"javacard.security": 1
}
},
"javacard_version": {
"GlobalPlatform": {
"GlobalPlatform 2.1.1": 1
}
},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 1
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS PUB 140-2": 1,
"FIPS PUB 180-3": 1,
"FIPS PUB 186-3": 1,
"FIPS PUB 197": 1,
"FIPS PUB 46-3": 1,
"FIPS PUB 81": 1
},
"ISO": {
"ISO/IEC 9796-1": 1,
"ISO/IEC 9797-1": 1
},
"PKCS": {
"PKCS 1": 1,
"PKCS#1": 2
},
"SCP": {
"SCP02": 1,
"SCP80": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 2
}
},
"DES": {
"3DES": {
"3DES": 4,
"TDES": 1
},
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Oberthur": {
"Oberthur": 8,
"Oberthur Technologies": 137
},
"STMicroelectronics": {
"STMicroelectronics": 4
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "chrisduc",
"/CreationDate": "D:20130807110801+02\u002700",
"/Creator": "PDFCreator Version 0.8.1",
"/ModDate": "D:20130807110801+02\u002700",
"/Producer": "AFPL Ghostscript 8.50",
"/Title": "FQR 110 6672 Ed1 - ST JUBA Lite",
"pdf_file_size_bytes": 1527189,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 131
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC-2013_65.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"EAL4+",
"ALC_DVS.2",
"AVA_VAN.5"
]
},
"st_link": "https://www.commoncriteriaportal.org/files/epfiles/FQR%20110%206672%20Ed1%20-%20ST%20JUBA%20%20Lite.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "2e4127e86969ec105569806f18118fd611c63f4a9d829a478df861e6318532d5",
"txt_hash": "263aaaa523c471afe1ec9b93ab6e8df0cc5691eb3025b7f40a5e155b026f155a"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "734f297c82adaa229149775ac66c2d92919abd255e282c447445e63b13334675",
"txt_hash": "a12c1c5b1fe4396131085d0e0176fe1d760a42bd8b7cf77af908e01c93df5723"
}
},
"status": "archived"
}