ID-A v1.0 on ID-One Cosmo J (SAAAAR : 417701, 418402 et 417652)

CSV information ?

Status active
Valid from 23.11.2021
Valid until 23.11.2026
Scheme 🇫🇷 FR
Manufacturer Idemia
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level AVA_VAN.5, EAL5+, ALC_DVS.2
Protection profiles

Heuristics summary ?

Certificate ID: ANSSI-CC-2021/57

Certificate ?

Extracted keywords

Vendor
NXP, IDEMIA

Security level
EAL5, EAL2
Security Assurance Requirements (SAR)
ALC_DVS.2, AVA_VAN.5
Protection profiles
BSI-CC-PP-0059-2009-MA-02, BSI-CC-PP-0075-2012-MA-01, BSI-CC-PP-0071-2012-MA-01, BSI-CC-PP-0072-2012-MA-01, BSI-CC-PP-0076-2013-MA-01
Certificates
ANSSI-CC-2021/57
Evaluation facilities
CEA-LETI

File metadata

Creation date: D:20211124143801+01'00'
Modification date: D:20211124143801+01'00'
Pages: 2
Creator: PScript5.dll Version 5.2.2
Producer: Acrobat Distiller 11.0 (Windows)

Certification report ?

Extracted keywords

Symmetric Algorithms
DES
Asymmetric Algorithms
ECC

Operating System name
JCOP 4
Vendor
NXP, IDEMIA

Security level
EAL 5, EAL2, EAL7, ITSEC E6 Elevé
Security Assurance Requirements (SAR)
AGD_PRE, AGD_OPE, ALC_DVS.2, ALC_FLR, AVA_VAN.5, AVA_VAN
Protection profiles
BSI-CC-PP-0059-2009-MA-02, BSI-CC-PP-0075-2012-MA-01, BSI-CC-PP-0071-2012-MA-01, BSI-CC-PP-0072-2012-MA-01, BSI-CC-PP-0076-2013-MA-01, BSI-CC-PP-0059-, BSI-CC-PP- 0075-2012-MA-01, PP-SSCD-Part2, PP-SSCD-Part3, PP-SSCD-Part5, PP-SSCD-Part6, PP-SSCD-
Certificates
BSI-DSZ-CC-1136-2021, ANSSI-CC-2021/57, NSCIB-CC-180212-CR3
Evaluation facilities
CESTI, CEA - LETI

Standards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003

File metadata

Creation date: D:20211124143551+01'00'
Modification date: D:20211124143551+01'00'
Pages: 13
Creator: PScript5.dll Version 5.2.2
Producer: Acrobat Distiller 11.0 (Windows)

References

Outgoing
  • BSI-DSZ-CC-1136-2021 - NXP Smart Card Controller N7121 with IC Dedicated Software and Crypto Library (R1/R2)

Security target ?

Extracted keywords

Symmetric Algorithms
AES128, AES192, AES256, AES, DES, 3DES, TDES, KMAC, CMAC
Asymmetric Algorithms
RSA-PSS, RSA-OAEP, ECDH, ECDSA, ECC, Diffie-Hellman, DH
Hash functions
SHA-1, SHA-224, SHA-384, SHA-512, SHA-256
Schemes
MAC, Key agreement
Protocols
PACE
Randomness
RNG
Block cipher modes
CBC

Operating System name
JCOP 4
IC data groups
EF.ChipSecurity
Vendor
NXP, NXP Semiconductors, Oberthur Technologies, IDEMIA, Morpho

Security level
EAL 6+, EAL5, EAL 5, EAL5+, EAL4+, EAL5 augmented, EAL 5 augmented
Claims
D.SCD, D.SVD, A.CSP, A.CGA, A.SCA, R.TOE, OE.HI_VAD, OE.HID_VAD
Security Assurance Requirements (SAR)
ADV_ARC, ADV_ARC.1, ADV_FSP, ADV_FSP.5, ADV_IMP, ADV_IMP.1, ADV_TDS, ADV_TDS.4, ADV_INT, ADV_INT.2, ADV_FSP.1, ADV_TDS.1, ADV_TDS.3, ADV_FSP.2, ADV_FSP.4, AGD_OPE, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_CMC, ALC_CMC.4, ALC_CMS, ALC_CMS.5, ALC_DEL, ALC_DEL.1, ALC_DVS, ALC_LCD, ALC_LCD.1, ALC_TAT, ALC_TAT.2, ALC_TAT.1, ALC_CMS.1, ALC_DVS.1, ATE_COV, ATE_COV.2, ATE_DPT, ATE_DPT.3, ATE_FUN, ATE_FUN.1, ATE_IND, ATE_IND.2, ATE_COV.1, ATE_DPT.1, AVA_VAN.5, AVA_VAN, APE_SRE, ASE_CCL, ASE_CCL.1, ASE_ECD, ASE_ECD.1, ASE_INT, ASE_INT.1, ASE_OBJ, ASE_OBJ.2, ASE_REQ, ASE_REQ.2, ASE_SPD, ASE_SPD.1, ASE_APD.1, ASE_TSS, ASE_TSS.1, ASE_REQ.1
Security Functional Requirements (SFR)
FAU_GEN, FCS_RNG, FCS_CKM.1, FCS_CKM.4, FCS_COP.1, FCS_RNG.1, FCS_RNG.1.1, FCS_COP.1.1, FCS_CKM.4.1, FCS_CKM.1.1, FCS_CKM, FCS_CKM.2, FDP_UIT, FDP_DAU, FDP_ACC, FDP_ACF, FDP_RIP.1, FDP_SDI, FDP_ITC, FDP_UCT, FDP_SDI.2, FDP_RIP.1.1, FDP_ACC.1, FDP_ACF.1, FDP_UCT.1, FDP_ITC.1, FDP_DAU.2, FDP_UIT.1, FDP_IFC.1, FDP_ITC.2, FIA_API, FIA_API.1, FIA_UAU.1, FIA_UID.1, FIA_AFL.1, FIA_API.1.1, FIA_UID.1.1, FIA_UID.1.2, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UID, FIA_UAU, FIA_UAU.4, FIA_UAU.5, FIA_UAU.6, FIA_AFL, FMT_LIM, FMT_SMR.1, FMT_SMF.1, FMT_MOF.1, FMT_MSA, FMT_MSA.2, FMT_MSA.3, FMT_MSA.4, FMT_MTD, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1.1, FMT_MOF.1.1, FMT_MSA.1, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.4.1, FMT_MTD.1, FMT_SMR, FMT_MTD.3, FMT_MTD.3.1, FPT_EMS, FPT_EMS.1, FPT_FLS.1, FPT_PHP.1, FPT_PHP.3, FPT_TST.1, FPT_EMS.1.1, FPT_EMS.1.2, FPT_FLS.1.1, FPT_TST, FPT_PHP.1.1, FPT_PHP.1.2, FPT_PHP.3.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FTP_ITC, FTP_ITC.1, FTP_TRP.1
Protection profiles
BSI-CC-PP-0068-V2-, BSI-CC-PP-0084-2014, BSI-CC-PP-0059-2009-MA-02, BSI-CC-PP-0075-2012-MA-01, BSI-CC-PP-0071-2012-, BSI-CC-PP-0072-2012-MA-01, BSI-CC-PP-0076-2013-MA-01, BSI-CC-PP-0086, PP-SSCD2, PP-SSCD3, PP-SSCD6, PP-SSCD5, PP-SSCD4
Certificates
BSI-DSZ-CC-1136-2021, BSI-DSZ-CC-0973-2016, CC-21-180212, CC-16-67206-CR
Evaluation facilities
CEA-LETI

Side-channel analysis
physical probing, side channel, DPA, SPA, timing attacks, physical tampering, Physical Tampering, malfunction, Malfunction, DFA, fault injection

Standards
FIPS 197, FIPS180-4, FIPS PUB 180-2, NIST SP 800-38B, NIST SP 800-38A, PKCS3, PKCS#1, PKCS1, AIS20, ISO/IEC 7816-4, ISO/IEC 14443, ISO/IEC 9797-1, ISO/IEC 9796-2, ISO/IEC 15408:2005, ICAO, SCP02, SCP03, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2012-09-004
Technical reports
BSI TR-03110

File metadata

Title: Title
Author: KUMAR Prem
Creation date: D:20210927144209+05'30'
Modification date: D:20210927145013+05'30'
Pages: 169
Creator: Acrobat PDFMaker 21 for Word
Producer: Adobe PDF Library 21.7.123

References

Outgoing
  • BSI-DSZ-CC-1136-2021 - NXP Smart Card Controller N7121 with IC Dedicated Software and Crypto Library (R1/R2)
  • BSI-DSZ-CC-0973-2016 - NXP Secure Smart Card Controller P6022y VB including IC Dedicated Software --- The certificate comprises four major configurations with two different EAL levels. For details see the ST. P6022P/X VB: EAL6 augmented by ALC_FLR.1, ASE_TSS.2 P6022M/D/J VB: EAL 5 augmented by AVA_VAN.5, ALC_DVS.2, ASE_TSS.2

Heuristics ?

Certificate ID: ANSSI-CC-2021/57

Extracted SARs

ASE_SPD.1, ADV_TDS.4, AGD_PRE.1, ALC_DVS.2, ASE_ECD.1, ASE_TSS.1, ALC_CMC.4, ALC_LCD.1, ADV_FSP.5, ALC_TAT.2, ADV_ARC.1, ASE_REQ.2, ALC_DEL.1, ATE_COV.2, ASE_CCL.1, ASE_INT.1, AGD_OPE.1, ATE_DPT.3, ATE_FUN.1, ADV_IMP.1, AVA_VAN.5, ATE_IND.2, ASE_OBJ.2, ALC_CMS.5, ASE_APD.1, ADV_INT.2

Scheme data ?

Product ID-A v1.0 on ID-One Cosmo J (SAAAAR : 417701, 418402 et 417652)
Url https://cyber.gouv.fr/produits-certifies/id-v10-id-one-cosmo-j-saaaar-417701-418402-et-417652
Description Le produit évalué est « ID-A v1.0 on ID-One Cosmo J (SAAAAR : 417701, 418402 et 417652) » développé par IDEMIA. Ce produit est une carte à puce constituée d’un logiciel implémentant IAS ECC v2, et d’un microcontrôleur sécurisé disposant d’interface avec et sans contact. Il est destiné à être utilisé comme dispositif sécurisé de création de signature (SSCD). Il peut être utilisé dans différents ty
Sponsor IDEMIA
Developer IDEMIA et NXP SEMICONDUCTORS
Cert Id 2021/57
Level EAL5+
Expiration Date 23 Novembre 2026
Enhanced
Cert Id 2021/57
Certification Date 23/11/2021
Expiration Date 23/11/2026
Category Cartes Ă  puce
Cc Version Critères Communs version 3.1r5
Developer IDEMIA et NXP SEMICONDUCTORS
Sponsor IDEMIA
Evaluation Facility CEA - LETI
Level EAL5+
Protection Profile
Mutual Recognition SOG-IS CCRA
Augmented ALC_DVS.2, AVA_VAN.5 Profil de protection : Protection profiles for secure signature creation device: Part 2 : Device with key generation, v2.01, BSI-CC-PP-0059-2009-MA-02 ; Part 3 : Device with key import, v1.0.2, BSI-CC-PP-0075-2012-MA-01 ; Part 4 : Ext
Target Link https://cyber.gouv.fr/sites/default/files/2021/12/anssi-cible-2021_57en.pdf
Cert Link https://cyber.gouv.fr/sites/default/files/2021/12/certificat-2021_57.pdf
Report Link https://cyber.gouv.fr/sites/default/files/2021/12/anssi-cc-2021_57fr.pdf

References ?

Updates ?

  • 15.02.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '37087516bfd9b5c33973bf7d3a184b46e8b1b511ea21f755d51d1f0ac7d2fd7d', 'txt_hash': '7fdbea5c430c1c4ac3fe3bdc652470092a10a8fc4bb6a13c6b1f9e124915e072'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '1a4e6aeab09be54581e4fd060effa669db0ba15d31243560a99806eb5357a752', 'txt_hash': '1c39a80e2b469b67bc47cca8988068dc3b10b9775dbf07554af474c8dca1d15a'}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '2e2dda77ea40c6186618a911ab57d2f2c872272a1f8bb6c533ec0226dd9e3a01', 'txt_hash': '843a3802021ef12ed0764161827a3723506303fb69cca795ce0cadc93cb24927'}}.
    • The following properties were deleted: ['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash'].

    The PDF extraction data was updated.

    • The following values were inserted: {'cert_metadata': {'pdf_file_size_bytes': 294265, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 2, '/Author': '', '/CreationDate': "D:20211124143801+01'00'", '/Creator': 'PScript5.dll Version 5.2.2', '/ModDate': "D:20211124143801+01'00'", '/Producer': 'Acrobat Distiller 11.0 (Windows)', '/Title': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}, 'cert_frontpage': None, 'cert_keywords': {'cc_cert_id': {'FR': {'ANSSI-CC-2021/57': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0059-2009-MA-02': 1, 'BSI-CC-PP-0075-2012-MA-01': 1, 'BSI-CC-PP-0071-2012-MA-01': 1, 'BSI-CC-PP-0072-2012-MA-01': 1, 'BSI-CC-PP-0076-2013-MA-01': 1}}, 'cc_security_level': {'EAL': {'EAL5': 1, 'EAL2': 1}}, 'cc_sar': {'ALC': {'ALC_DVS.2': 1}, 'AVA': {'AVA_VAN.5': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'NXP': {'NXP': 1}, 'Idemia': {'IDEMIA': 2}}, 'eval_facility': {'CEA-LETI': {'CEA-LETI': 2}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}, 'cert_filename': 'certificat-2021_57.pdf'}.
    • The report_frontpage property was set to {'FR': {}}.
    • The st_frontpage property was set to None.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1136-2021': 1}}, 'FR': {'__update__': {'ANSSI-CC-2021/57': 2}}, 'NL': {'__update__': {'NSCIB-CC-180212-CR3': 1}}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'__insert__': {'NL': {'CC-21-180212': 1, 'CC-16-67206-CR': 1}}, '__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1136-2021': 2, 'BSI-DSZ-CC-0973-2016': 1}}}}} data.
  • 13.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1136-2021': 2}}, 'FR': {'__update__': {'ANSSI-CC-2021/57': 4}}, 'NL': {'__update__': {'NSCIB-CC-180212-CR3': 2}}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1136-2021': 4, 'BSI-DSZ-CC-0973-2016': 2}}}, '__delete__': ['NL']}} data.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__delete__': ['CA']}} data.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__insert__': {'CA': {'7 5 7': 1, '2 0 2': 12, '4 1 7': 24, '4 1 8': 12, '1 3 1': 1, '1 3 2': 1, '1 3 3': 1}}, '__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1136-2021': 1}}, 'FR': {'__update__': {'ANSSI-CC-2021/57': 2}}, 'NL': {'__update__': {'NSCIB-CC-180212-CR3': 1}}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'__insert__': {'NL': {'CC-21-180212': 1, 'CC-16-67206-CR': 1}}, '__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1136-2021': 2, 'BSI-DSZ-CC-0973-2016': 1}}}}} data.
  • 05.02.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'description': 'Le produit Ă©valuĂ© est « ID-A v1.0 on ID-One Cosmo J (SAAAAR : 417701, 418402 et 417652) » dĂ©veloppĂ© par IDEMIA.\nCe produit est une carte Ă  puce constituĂ©e d’un logiciel implĂ©mentant IAS ECC v2, et d’un microcontrĂ´leur sĂ©curisĂ© disposant d’interface avec et sans contact. Il est destinĂ© Ă  ĂŞtre utilisĂ© comme dispositif sĂ©curisĂ© de crĂ©ation de signature (SSCD). Il peut ĂŞtre utilisĂ© dans diffĂ©rents ty'} data.
  • 04.01.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'annotated_references': None}.
    • The scheme_data property was updated, with the {'url': 'https://cyber.gouv.fr/produits-certifies/id-v10-id-one-cosmo-j-saaaar-417701-418402-et-417652', 'enhanced': {'__insert__': {'cert_id': '2021/57', 'sponsor': 'IDEMIA', 'protection_profile': '', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ALC_DVS.2, AVA_VAN.5 Profil de protection : Protection profiles for secure signature creation device: Part 2 : Device with key generation, v2.01, BSI-CC-PP-0059-2009-MA-02 ; Part 3 : Device with key import, v1.0.2, BSI-CC-PP-0075-2012-MA-01 ; Part 4 : Ext'}, '__update__': {'developer': 'IDEMIA et NXP SEMICONDUCTORS', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2021/12/anssi-cc-2021_57fr.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2021/12/anssi-cible-2021_57en.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/2021/12/certificat-2021_57.pdf'}, '__delete__': ['id', 'augmentations', 'recognition', 'description']}} data.
  • 18.05.2023 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The following values were removed: {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 4: Extension for device wi...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0071b_pdf.pdf', 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Ve...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0059b_pdf.pdf', 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 5: Extension for device wi...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0072b_pdf.pdf', 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 6: Extension for device with key...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0076b_pdf.pdf', 'pp_ids': None}]}.
    • The following values were added: {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 6: Extension for device with key impo...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0076b_pdf.pdf', 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 4: Extension for device with key gene...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0071b_pdf.pdf', 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Version...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0059b_pdf.pdf', 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 5: Extension for device with key gene...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0072b_pdf.pdf', 'pp_ids': None}]}.
  • 26.04.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'scheme_data': {'product': 'ID-A v1.0 on ID-One Cosmo J (SAAAAR : 417701, 418402 et 417652)', 'vendor': 'IDEMIA et NXP SEMICONDUCTORSIDEMIA', 'level': 'EAL5+', 'id': '2021/57', 'certification_date': '23/11/2021', 'category': 'Smart cards', 'url': 'https://www.ssi.gouv.fr/certification_cc/id-a-v1-0-on-id-one-cosmo-j-saaaar-417701-418402-et-417652/', 'enhanced': {'id': '2021/57', 'certification_date': '23/11/2021', 'expiration_date': '23/11/2026', 'category': 'Cartes Ă  puce', 'cc_version': 'Critères Communs version 3.1r5', 'level': 'EAL5+', 'augmentations': 'ALC_DVS.2, AVA_VAN.5 Profil de protection : Protection profiles for secure signature creation device: Part 2 : Device with key generation, v2.01, BSI-CC-PP-0059-2009-MA-02 ; Part 3 : Device with key import, v1.0.2, BSI-CC-PP-0075-2012-MA-01 ; Part 4 : Extension for device with key generation and trusted communication with certificate generation application, v1.0.1, BSI-CC-PP-0071-2012-MA-01 ; Part 5 : Extension for device with key generation and trusted communication with signature creation application, v1.0.1, BSI-CC-PP-0072-2012-MA-01 ; Part 6 : Extension for device with key import and trusted communication with signature creation application, v1.0.4, BSI-CC-PP-0076-2013-MA-01.', 'developer': 'IDEMIA et NXP SEMICONDUCTORS / IDEMIA', 'evaluation_facility': 'CEA - LETI', 'recognition': 'SOG-IS - CCRA', 'description': 'Descriptif du produit\n\t\t\t\tLe produit Ă©valuĂ© est « ID-A v1.0 on ID-One Cosmo J (SAAAAR : 417701, 418402 et 417652) » dĂ©veloppĂ© par IDEMIA.\nCe produit est une carte Ă  puce constituĂ©e d’un logiciel implĂ©mentant IAS ECC v2, et d’un microcontrĂ´leur sĂ©curisĂ© disposant d’interface avec et sans contact. Il est destinĂ© Ă  ĂŞtre utilisĂ© comme dispositif sĂ©curisĂ© de crĂ©ation de signature (SSCD). Il peut ĂŞtre utilisĂ© dans diffĂ©rents types de documents (carte d’identitĂ©, carte de santĂ©, carte d’entreprise, etc.).\n\t\t\t\t\n Rapport de certification\nSecurity target\nCertificat', 'report_link': 'https://www.ssi.gouv.fr/uploads/2021/12/anssi-cc-2021_57fr.pdf', 'target_link': 'https://www.ssi.gouv.fr/uploads/2021/12/anssi-cible-2021_57en.pdf', 'cert_link': 'https://www.ssi.gouv.fr/uploads/2021/12/certificat-2021_57.pdf'}}}.
  • 11.02.2023 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.cc.CCCertificate.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.InternalState.
    • The following properties were deleted: ['errors'].

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.PdfData.

    The computed heuristics were updated.

    • The following values were inserted: {'direct_transitive_cves': None, 'indirect_transitive_cves': None}.
    • The _type property was set to sec_certs.sample.cc.CCCertificate.Heuristics.
    • The following properties were deleted: ['direct_dependency_cves', 'indirect_dependency_cves'].
  • 05.02.2023 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to [].
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2021_57fr.pdf, code: nok'].
    • The st_pdf_hash property was set to 1a4e6aeab09be54581e4fd060effa669db0ba15d31243560a99806eb5357a752.
    • The st_txt_hash property was set to 1c39a80e2b469b67bc47cca8988068dc3b10b9775dbf07554af474c8dca1d15a.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 2118308, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 169, '/Author': 'KUMAR Prem', '/Category': 'Document type', '/Classification': 'Classification', '/Comments': '', '/Company': 'Company', '/CreationDate': "D:20210927144209+05'30'", '/Creator': 'Acrobat PDFMaker 21 for Word', '/DocumentTitle': 'Document title', '/IDEMIAClassification': 'PUBLIC', '/IDEMIATechnology': 'Not Controlled', '/IssueDate': 'Issue date', '/Keywords': '', '/MORPHOClassification': 'PUBLIC', '/MORPHOTechnology': 'Not Controlled', '/MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_ActionId': '12023471-0686-4519-81a7-0b27134aabfd', '/MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_Application': 'Microsoft Azure Information Protection', '/MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_Enabled': 'True', '/MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_Extended_MSFT_Method': 'Manual', '/MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_Name': 'Public', '/MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_Owner': 'g509704@mph.morpho.com', '/MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_SetDate': '2021-07-30T05:03:54.9661844Z', '/MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_SiteId': '7694d41c-5504-43d9-9e40-cb254ad755ec', '/Manager': '', '/ModDate': "D:20210927145013+05'30'", '/Producer': 'Adobe PDF Library 21.7.123', '/ProjectName': 'Project name', '/Reference': 'Reference', '/Sensitivity': 'Public', '/SourceModified': 'D:20210927091153', '/Status': 'Status', '/Subject': '', '/Title': 'Title', '/TitusGUID': 'fc098978-a09a-4110-a612-da1ab7eb03a2', '/Version': 'Version', '/aliashClassificationHeaderforWordC': '', '/aliashClassificationHeaderforWordRS': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1136-2021': 4, 'BSI-DSZ-CC-0973-2016': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0068-V2-': 1, 'BSI-CC-PP-0084-2014': 1, 'BSI-CC-PP-0059-2009-MA-02': 1, 'BSI-CC-PP-0075-2012-MA-01': 1, 'BSI-CC-PP-0071-2012-': 1, 'BSI-CC-PP-0072-2012-MA-01': 1, 'BSI-CC-PP-0076-2013-MA-01': 1, 'BSI-CC-PP-0086': 1}, 'other': {'PP-SSCD2': 25, 'PP-SSCD3': 26, 'PP-SSCD6': 22, 'PP-SSCD5': 25, 'PP-SSCD4': 24}}, 'cc_security_level': {'EAL': {'EAL 6+': 2, 'EAL5': 6, 'EAL 5': 1, 'EAL5+': 1, 'EAL4+': 1, 'EAL5 augmented': 4, 'EAL 5 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_ARC.1': 15, 'ADV_FSP': 1, 'ADV_FSP.5': 22, 'ADV_IMP': 1, 'ADV_IMP.1': 15, 'ADV_TDS': 1, 'ADV_TDS.4': 23, 'ADV_INT': 1, 'ADV_INT.2': 7, 'ADV_FSP.1': 3, 'ADV_TDS.1': 2, 'ADV_TDS.3': 3, 'ADV_FSP.2': 2, 'ADV_FSP.4': 1}, 'AGD': {'AGD_OPE': 9, 'AGD_PRE': 8, 'AGD_OPE.1': 15, 'AGD_PRE.1': 11}, 'ALC': {'ALC_DVS.2': 15, 'ALC_CMC': 1, 'ALC_CMC.4': 16, 'ALC_CMS': 1, 'ALC_CMS.5': 7, 'ALC_DEL': 1, 'ALC_DEL.1': 6, 'ALC_DVS': 1, 'ALC_LCD': 1, 'ALC_LCD.1': 9, 'ALC_TAT': 1, 'ALC_TAT.2': 12, 'ALC_TAT.1': 2, 'ALC_CMS.1': 1, 'ALC_DVS.1': 1}, 'ATE': {'ATE_COV': 1, 'ATE_COV.2': 8, 'ATE_DPT': 1, 'ATE_DPT.3': 7, 'ATE_FUN': 1, 'ATE_FUN.1': 14, 'ATE_IND': 1, 'ATE_IND.2': 7, 'ATE_COV.1': 2, 'ATE_DPT.1': 1}, 'AVA': {'AVA_VAN.5': 15, 'AVA_VAN': 1}, 'APE': {'APE_SRE': 1}, 'ASE': {'ASE_CCL': 1, 'ASE_CCL.1': 15, 'ASE_ECD': 1, 'ASE_ECD.1': 14, 'ASE_INT': 1, 'ASE_INT.1': 17, 'ASE_OBJ': 1, 'ASE_OBJ.2': 13, 'ASE_REQ': 1, 'ASE_REQ.2': 15, 'ASE_SPD': 1, 'ASE_SPD.1': 8, 'ASE_APD.1': 1, 'ASE_TSS': 1, 'ASE_TSS.1': 6, 'ASE_REQ.1': 2}}, 'cc_sfr': {'FAU': {'FAU_GEN': 1}, 'FCS': {'FCS_RNG': 3, 'FCS_CKM.1': 23, 'FCS_CKM.4': 27, 'FCS_COP.1': 49, 'FCS_RNG.1': 34, 'FCS_RNG.1.1': 2, 'FCS_COP.1.1': 1, 'FCS_CKM.4.1': 1, 'FCS_CKM.1.1': 1, 'FCS_CKM': 28, 'FCS_CKM.2': 2}, 'FDP': {'FDP_UIT': 24, 'FDP_DAU': 12, 'FDP_ACC': 90, 'FDP_ACF': 79, 'FDP_RIP.1': 29, 'FDP_SDI': 26, 'FDP_ITC': 14, 'FDP_UCT': 32, 'FDP_SDI.2': 4, 'FDP_RIP.1.1': 1, 'FDP_ACC.1': 19, 'FDP_ACF.1': 30, 'FDP_UCT.1': 2, 'FDP_ITC.1': 5, 'FDP_DAU.2': 2, 'FDP_UIT.1': 4, 'FDP_IFC.1': 9, 'FDP_ITC.2': 2}, 'FIA': {'FIA_API': 22, 'FIA_API.1': 16, 'FIA_UAU.1': 29, 'FIA_UID.1': 31, 'FIA_AFL.1': 18, 'FIA_API.1.1': 2, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UID': 27, 'FIA_UAU': 103, 'FIA_UAU.4': 1, 'FIA_UAU.5': 3, 'FIA_UAU.6': 2, 'FIA_AFL': 25}, 'FMT': {'FMT_LIM': 5, 'FMT_SMR.1': 50, 'FMT_SMF.1': 69, 'FMT_MOF.1': 14, 'FMT_MSA': 30, 'FMT_MSA.2': 18, 'FMT_MSA.3': 31, 'FMT_MSA.4': 18, 'FMT_MTD': 230, 'FMT_LIM.1': 18, 'FMT_LIM.2': 17, 'FMT_LIM.1.1': 2, 'FMT_LIM.2.1': 2, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SMF.1.1': 1, 'FMT_MOF.1.1': 1, 'FMT_MSA.1': 5, 'FMT_MSA.2.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MSA.4.1': 1, 'FMT_MTD.1': 16, 'FMT_SMR': 32, 'FMT_MTD.3': 13, 'FMT_MTD.3.1': 1}, 'FPT': {'FPT_EMS': 5, 'FPT_EMS.1': 20, 'FPT_FLS.1': 14, 'FPT_PHP.1': 9, 'FPT_PHP.3': 17, 'FPT_TST.1': 21, 'FPT_EMS.1.1': 4, 'FPT_EMS.1.2': 3, 'FPT_FLS.1.1': 1, 'FPT_TST': 1, 'FPT_PHP.1.1': 1, 'FPT_PHP.1.2': 1, 'FPT_PHP.3.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1}, 'FTP': {'FTP_ITC': 103, 'FTP_ITC.1': 22, 'FTP_TRP.1': 4}}, 'cc_claims': {'D': {'D.SCD': 1, 'D.SVD': 1}, 'A': {'A.CSP': 9, 'A.CGA': 6, 'A.SCA': 5}, 'R': {'R.TOE': 1}, 'OE': {'OE.HI_VAD': 2, 'OE.HID_VAD': 7}}, 'vendor': {'NXP': {'NXP': 14, 'NXP Semiconductors': 1}, 'Oberthur': {'Oberthur Technologies': 1}, 'Idemia': {'IDEMIA': 23}, 'Morpho': {'Morpho': 1}}, 'eval_facility': {'CEA-LETI': {'CEA-LETI': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES128': 1, 'AES192': 1, 'AES256': 1, 'AES': 22}}, 'DES': {'DES': {'DES': 3}, '3DES': {'3DES': 10, 'TDES': 9}}, 'constructions': {'MAC': {'KMAC': 2, 'CMAC': 6}}}, 'asymmetric_crypto': {'RSA': {'RSA-PSS': 2, 'RSA-OAEP': 2}, 'ECC': {'ECDH': {'ECDH': 10}, 'ECDSA': {'ECDSA': 6}, 'ECC': {'ECC': 13}}, 'FF': {'DH': {'Diffie-Hellman': 1, 'DH': 5}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 16}, 'SHA2': {'SHA-224': 8, 'SHA-384': 8, 'SHA-512': 9, 'SHA-256': 9}}}, 'crypto_scheme': {'MAC': {'MAC': 12}, 'KA': {'Key agreement': 2}}, 'crypto_protocol': {'PACE': {'PACE': 124}}, 'randomness': {'RNG': {'RNG': 1}}, 'cipher_mode': {'CBC': {'CBC': 15}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 3, 'side channel': 1, 'DPA': 3, 'SPA': 3, 'timing attacks': 2}, 'FI': {'physical tampering': 7, 'Physical Tampering': 1, 'malfunction': 5, 'Malfunction': 5, 'DFA': 1, 'fault injection': 1}}, 'technical_report_id': {'BSI': {'BSI TR-03110': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {'JCOP': {'JCOP 4': 13}}, 'cplc_data': {}, 'ic_data_group': {'EF': {'EF.ChipSecurity': 1}}, 'standard_id': {'FIPS': {'FIPS 197': 1, 'FIPS180-4': 1, 'FIPS PUB 180-2': 1}, 'NIST': {'NIST SP 800-38B': 1, 'NIST SP 800-38A': 1}, 'PKCS': {'PKCS3': 1, 'PKCS#1': 6, 'PKCS1': 2}, 'BSI': {'AIS20': 1}, 'ISO': {'ISO/IEC 7816-4': 1, 'ISO/IEC 14443': 2, 'ISO/IEC 9797-1': 3, 'ISO/IEC 9796-2': 5, 'ISO/IEC 15408:2005': 2}, 'ICAO': {'ICAO': 11}, 'SCP': {'SCP02': 2, 'SCP03': 3}, 'CC': {'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2012-09-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to anssi-cible-2021_57en.pdf.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1136-2021', 'BSI-DSZ-CC-0973-2016']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1136-2021', 'BSI-DSZ-CC-0973-2016']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_APD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}]} values added.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/anssi-cible-2021_57en.pdf, code: nok'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_APD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}]} values discarded.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The cert_link was updated.

    • The new value is https://www.commoncriteriaportal.org/files/epfiles/certificat-2021_57.pdf.

    The manufacturer_web was updated.

    • The new value is https://www.idemia.com.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 3: Device with key import', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0075b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['PP_SSCD_PART3_V1.0.2']}}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Ve...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0059b_pdf.pdf', 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 4: Extension for device wi...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0071b_pdf.pdf', 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 5: Extension for device wi...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0072b_pdf.pdf', 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 6: Extension for device with key...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0076b_pdf.pdf', 'pp_ids': None}]}.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The cert_link was updated.

    • The new value is None.

    The manufacturer_web was updated.

    • The new value is None.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'PP_SSCD_PART6_V1.0.4', 'pp_eal': None, 'pp_link': None, 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'PP_SSCD_PART2_V1.03', 'pp_eal': None, 'pp_link': None, 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'PP_SSCD_PART5_V1.0.1', 'pp_eal': None, 'pp_link': None, 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'P_SSCD_PART4_V1.0.1', 'pp_eal': None, 'pp_link': None, 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'PP_SSCD_PART3_V1.0.2', 'pp_eal': None, 'pp_link': None, 'pp_ids': None}]}.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 3: Device with key import', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0075b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['PP_SSCD_PART3_V1.0.2']}}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Ve...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0059b_pdf.pdf', 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 4: Extension for device wi...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0071b_pdf.pdf', 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 5: Extension for device wi...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0072b_pdf.pdf', 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 6: Extension for device with key...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0076b_pdf.pdf', 'pp_ids': None}]}.

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.
  • 04.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 4: Extension for device wi...', 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/pp0071b_pdf.pdf', 'pp_link': None, 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 3: Device with key import', 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/pp0075b_pdf.pdf', 'pp_link': None, 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Ve...', 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/pp0059b_pdf.pdf', 'pp_link': None, 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 6: Extension for device with key...', 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/pp0076b_pdf.pdf', 'pp_link': None, 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 5: Extension for device wi...', 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/pp0072b_pdf.pdf', 'pp_link': None, 'pp_ids': None}]}.
  • 28.09.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The report_references property was updated, with the {'directly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['NSCIB-CC-180212-CR3']}}, 'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['NSCIB-CC-180212-CR3']}}} data.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': 'anssi-cc-2021_57fr.pdf', 'st_filename': 'anssi-cible-2021_57en.pdf'}.
    • The report_keywords property was updated, with the {'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL2': 2}}}}, 'cc_sar': {'__update__': {'ALC': {'__insert__': {'ALC_FLR': 1}}}}, 'vendor': {'__update__': {'Idemia': {'__update__': {'IDEMIA': 20}}}}, 'eval_facility': {'__insert__': {'CESTI': {'CESTI': 2}}}, 'symmetric_crypto': {'__update__': {'DES': {'__update__': {'DES': {'__update__': {'DES': 1}}}}}}, 'standard_id': {'__update__': {'CC': {'__insert__': {'CCMB-2017-04-003': 1}}}}} data.
    • The st_keywords property was updated, with the {'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL 6+': 2, 'EAL5 augmented': 4}}}}, 'cc_sar': {'__update__': {'ADV': {'__update__': {'ADV_ARC.1': 15, 'ADV_FSP.5': 22, 'ADV_IMP.1': 15, 'ADV_TDS.4': 23, 'ADV_INT.2': 7}}, 'AGD': {'__update__': {'AGD_PRE': 8, 'AGD_OPE.1': 15, 'AGD_PRE.1': 11}}, 'ALC': {'__update__': {'ALC_DVS.2': 15, 'ALC_CMC.4': 16, 'ALC_CMS.5': 7, 'ALC_DEL.1': 6, 'ALC_LCD.1': 9, 'ALC_TAT.2': 12}}, 'ATE': {'__update__': {'ATE_COV.2': 8, 'ATE_DPT.3': 7, 'ATE_FUN.1': 14, 'ATE_IND.2': 7}}, 'AVA': {'__update__': {'AVA_VAN.5': 15}}, 'ASE': {'__insert__': {'ASE_APD.1': 1}, '__update__': {'ASE_CCL.1': 15, 'ASE_ECD.1': 14, 'ASE_INT.1': 17, 'ASE_OBJ.2': 13, 'ASE_REQ.2': 15, 'ASE_SPD.1': 8, 'ASE_TSS.1': 6}}}}, 'cc_sfr': {'__update__': {'FCS': {'__insert__': {'FCS_CKM': 28}, '__update__': {'FCS_CKM.1': 23, 'FCS_COP.1': 49}}, 'FDP': {'__insert__': {'FDP_UIT': 24, 'FDP_DAU': 12, 'FDP_ACC': 90, 'FDP_SDI': 26, 'FDP_ITC': 14, 'FDP_UCT': 32, 'FDP_SDI.2': 4, 'FDP_UCT.1': 2, 'FDP_DAU.2': 2, 'FDP_UIT.1': 4}, '__update__': {'FDP_ACF': 79, 'FDP_ACF.1': 30, 'FDP_ACC.1': 19, 'FDP_ITC.1': 5}}, 'FIA': {'__insert__': {'FIA_UID': 27, 'FIA_UAU': 103, 'FIA_UAU.4': 1, 'FIA_UAU.6': 2, 'FIA_AFL': 25}, '__update__': {'FIA_API': 22, 'FIA_UAU.1': 29, 'FIA_UID.1': 31, 'FIA_AFL.1': 18, 'FIA_UAU.5': 3}}, 'FMT': {'__insert__': {'FMT_MSA': 30, 'FMT_MTD': 230, 'FMT_SMR': 32}, '__update__': {'FMT_SMR.1': 50, 'FMT_SMF.1': 69, 'FMT_MSA.4': 18, 'FMT_MTD.3': 13, 'FMT_MTD.1': 16, 'FMT_MSA.1': 5}}, 'FPT': {'__update__': {'FPT_EMS.1': 20, 'FPT_PHP.3': 17, 'FPT_EMS.1.1': 4}}, 'FTP': {'__insert__': {'FTP_ITC': 103}, '__update__': {'FTP_ITC.1': 22}}}}, 'cc_claims': {'__delete__': ['T']}, 'vendor': {'__update__': {'Idemia': {'__update__': {'IDEMIA': 23}, '__delete__': ['Idemia']}, 'Morpho': {'__update__': {'Morpho': 1}}}}, 'symmetric_crypto': {'__update__': {'DES': {'__update__': {'DES': {'__update__': {'DES': 3}}, '3DES': {'__update__': {'3DES': 10}}}}, 'constructions': {'__update__': {'MAC': {'__update__': {'KMAC': 2}}}}}}, 'asymmetric_crypto': {'__update__': {'ECC': {'__update__': {'ECC': {'__update__': {'ECC': 13}}}}, 'FF': {'__update__': {'DH': {'__update__': {'Diffie-Hellman': 1, 'DH': 5}}}, '__delete__': ['DSA']}}}, 'hash_function': {'__update__': {'SHA': {'__update__': {'SHA2': {'__update__': {'SHA-256': 9, 'SHA-384': 8}}}}}}, 'crypto_scheme': {'__update__': {'MAC': {'__update__': {'MAC': 12}}, 'KA': {'__delete__': ['KA']}}}, 'crypto_protocol': {'__update__': {'PACE': {'__update__': {'PACE': 124}}}}, 'randomness': {'__update__': {'RNG': {'__update__': {'RNG': 1}}}}, 'cipher_mode': {'__update__': {'CBC': {'__update__': {'CBC': 15}}}}, 'side_channel_analysis': {'__update__': {'FI': {'__update__': {'Malfunction': 5, 'malfunction': 5}}}}, 'tee_name': {}, 'standard_id': {'__update__': {'ISO': {'__insert__': {'ISO/IEC 7816-4': 1}}, 'SCP': {'__update__': {'SCP03': 3}}, 'CC': {'__insert__': {'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1}}}}} data.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1136-2021', 'BSI-DSZ-CC-0973-2016']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1136-2021', 'BSI-DSZ-CC-0973-2016']}} data.
    • The report_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1136-2021', 'NSCIB-CC-180212-CR3']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1136-2021', 'NSCIB-CC-180212-CR3']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_APD', 'level': 1}]} values added.
  • 28.07.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_extract_ok property was set to True.
    • The errors property was set to [].

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 2118308, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 169, '/Author': 'KUMAR Prem', '/Category': 'Document type', '/Classification': 'Classification', '/Comments': '', '/Company': 'Company', '/CreationDate': "D:20210927144209+05'30'", '/Creator': 'Acrobat PDFMaker 21 for Word', '/DocumentTitle': 'Document title', '/IDEMIAClassification': 'PUBLIC', '/IDEMIATechnology': 'Not Controlled', '/IssueDate': 'Issue date', '/Keywords': '', '/MORPHOClassification': 'PUBLIC', '/MORPHOTechnology': 'Not Controlled', '/MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_ActionId': '12023471-0686-4519-81a7-0b27134aabfd', '/MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_Application': 'Microsoft Azure Information Protection', '/MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_Enabled': 'True', '/MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_Extended_MSFT_Method': 'Manual', '/MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_Name': 'Public', '/MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_Owner': 'g509704@mph.morpho.com', '/MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_SetDate': '2021-07-30T05:03:54.9661844Z', '/MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_SiteId': '7694d41c-5504-43d9-9e40-cb254ad755ec', '/Manager': '', '/ModDate': "D:20210927145013+05'30'", '/Producer': 'Adobe PDF Library 21.7.123', '/ProjectName': 'Project name', '/Reference': 'Reference', '/Sensitivity': 'Public', '/SourceModified': 'D:20210927091153', '/Status': 'Status', '/Subject': '', '/Title': 'Title', '/TitusGUID': 'fc098978-a09a-4110-a612-da1ab7eb03a2', '/Version': 'Version', '/aliashClassificationHeaderforWordC': '', '/aliashClassificationHeaderforWordRS': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 6: Extension for device with key...', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0076b_pdf.pdf', 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 4: Extension for device wi...', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0071b_pdf.pdf', 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 5: Extension for device wi...', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0072b_pdf.pdf', 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Ve...', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0059b_pdf.pdf', 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 3: Device with key import', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0075b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['PP_SSCD_PART3_V1.0.2']}}]}.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}]}.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_extract_ok property was set to False.
    • The errors property was set to ['Failed to read metadata of certs/targets/pdf/7f29aa0291e79ae3.pdf, error: can only concatenate list (not "IndirectObject") to list', 'Failed to read metadata of certs/targets/pdf/7f29aa0291e79ae3.pdf, error: can only concatenate list (not "IndirectObject") to list'].

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': []}} values inserted.
    • The st_metadata property was set to None.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1136-2021': 2}, 'FR': {'ANSSI-CC-2021/57': 4}, 'NL': {'NSCIB-CC-180212-CR3': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0059-2009-MA-02': 1, 'BSI-CC-PP-0075-2012-MA-01': 1, 'BSI-CC-PP-0071-2012-MA-01': 2, 'BSI-CC-PP-0072-2012-MA-01': 2, 'BSI-CC-PP-0076-2013-MA-01': 2, 'BSI-CC-PP-0059-': 1, 'BSI-CC-PP- 0075-2012-MA-01': 1}, 'other': {'PP-SSCD-Part2': 1, 'PP-SSCD-Part3': 1, 'PP-SSCD-Part5': 1, 'PP-SSCD-Part6': 1, 'PP-SSCD-': 5}}, 'cc_security_level': {'EAL': {'EAL 5': 1, 'EAL7': 1, 'EAL2': 1}, 'ITSEC': {'ITSEC E6 ElevĂ©': 1}}, 'cc_sar': {'AGD': {'AGD_PRE': 3, 'AGD_OPE': 3}, 'ALC': {'ALC_DVS.2': 1}, 'AVA': {'AVA_VAN.5': 1, 'AVA_VAN': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'NXP': {'NXP': 2}, 'Idemia': {'IDEMIA': 19}}, 'eval_facility': {'CEA-LETI': {'CEA - LETI': 1}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 5}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 1}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {'JCOP': {'JCOP 4': 3}}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1136-2021': 4, 'BSI-DSZ-CC-0973-2016': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0068-V2-': 1, 'BSI-CC-PP-0084-2014': 1, 'BSI-CC-PP-0059-2009-MA-02': 1, 'BSI-CC-PP-0075-2012-MA-01': 1, 'BSI-CC-PP-0071-2012-': 1, 'BSI-CC-PP-0072-2012-MA-01': 1, 'BSI-CC-PP-0076-2013-MA-01': 1, 'BSI-CC-PP-0086': 1}, 'other': {'PP-SSCD2': 25, 'PP-SSCD3': 26, 'PP-SSCD6': 22, 'PP-SSCD5': 25, 'PP-SSCD4': 24}}, 'cc_security_level': {'EAL': {'EAL 6+': 1, 'EAL5': 6, 'EAL 5': 1, 'EAL5+': 1, 'EAL4+': 1, 'EAL5 augmented': 3, 'EAL 5 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_ARC.1': 6, 'ADV_FSP': 1, 'ADV_FSP.5': 10, 'ADV_IMP': 1, 'ADV_IMP.1': 10, 'ADV_TDS': 1, 'ADV_TDS.4': 9, 'ADV_INT': 1, 'ADV_INT.2': 2, 'ADV_FSP.1': 3, 'ADV_TDS.1': 2, 'ADV_TDS.3': 3, 'ADV_FSP.2': 2, 'ADV_FSP.4': 1}, 'AGD': {'AGD_OPE': 9, 'AGD_PRE': 7, 'AGD_OPE.1': 6, 'AGD_PRE.1': 6}, 'ALC': {'ALC_DVS.2': 9, 'ALC_CMC': 1, 'ALC_CMC.4': 2, 'ALC_CMS': 1, 'ALC_CMS.5': 3, 'ALC_DEL': 1, 'ALC_DEL.1': 2, 'ALC_DVS': 1, 'ALC_LCD': 1, 'ALC_LCD.1': 4, 'ALC_TAT': 1, 'ALC_TAT.2': 4, 'ALC_TAT.1': 2, 'ALC_CMS.1': 1, 'ALC_DVS.1': 1}, 'ATE': {'ATE_COV': 1, 'ATE_COV.2': 4, 'ATE_DPT': 1, 'ATE_DPT.3': 3, 'ATE_FUN': 1, 'ATE_FUN.1': 8, 'ATE_IND': 1, 'ATE_IND.2': 2, 'ATE_COV.1': 2, 'ATE_DPT.1': 1}, 'AVA': {'AVA_VAN.5': 9, 'AVA_VAN': 1}, 'APE': {'APE_SRE': 1}, 'ASE': {'ASE_CCL': 1, 'ASE_CCL.1': 2, 'ASE_ECD': 1, 'ASE_ECD.1': 6, 'ASE_INT': 1, 'ASE_INT.1': 6, 'ASE_OBJ': 1, 'ASE_OBJ.2': 4, 'ASE_REQ': 1, 'ASE_REQ.2': 4, 'ASE_SPD': 1, 'ASE_SPD.1': 4, 'ASE_TSS': 1, 'ASE_TSS.1': 2, 'ASE_REQ.1': 2}}, 'cc_sfr': {'FAU': {'FAU_GEN': 1}, 'FCS': {'FCS_RNG': 3, 'FCS_CKM.1': 21, 'FCS_CKM.4': 27, 'FCS_COP.1': 39, 'FCS_RNG.1': 34, 'FCS_RNG.1.1': 2, 'FCS_COP.1.1': 1, 'FCS_CKM.4.1': 1, 'FCS_CKM.1.1': 1, 'FCS_CKM.2': 2}, 'FDP': {'FDP_RIP.1': 29, 'FDP_ACF': 1, 'FDP_RIP.1.1': 1, 'FDP_ACF.1': 5, 'FDP_ACC.1': 14, 'FDP_IFC.1': 9, 'FDP_ITC.1': 2, 'FDP_ITC.2': 2}, 'FIA': {'FIA_API': 5, 'FIA_API.1': 16, 'FIA_UAU.1': 26, 'FIA_UID.1': 29, 'FIA_AFL.1': 13, 'FIA_API.1.1': 2, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.5': 1}, 'FMT': {'FMT_LIM': 5, 'FMT_SMR.1': 45, 'FMT_SMF.1': 66, 'FMT_MOF.1': 14, 'FMT_MSA.2': 18, 'FMT_MSA.3': 31, 'FMT_MSA.4': 17, 'FMT_LIM.1': 18, 'FMT_LIM.2': 17, 'FMT_LIM.1.1': 2, 'FMT_LIM.2.1': 2, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SMF.1.1': 1, 'FMT_MOF.1.1': 1, 'FMT_MSA.2.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MSA.4.1': 1, 'FMT_MTD.3': 14, 'FMT_MTD.3.1': 1, 'FMT_MTD.1': 1, 'FMT_MSA.1': 3}, 'FPT': {'FPT_EMS': 5, 'FPT_EMS.1': 19, 'FPT_FLS.1': 14, 'FPT_PHP.1': 9, 'FPT_PHP.3': 16, 'FPT_TST.1': 21, 'FPT_EMS.1.1': 3, 'FPT_EMS.1.2': 3, 'FPT_FLS.1.1': 1, 'FPT_TST': 1, 'FPT_PHP.1.1': 1, 'FPT_PHP.1.2': 1, 'FPT_PHP.3.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1}, 'FTP': {'FTP_ITC.1': 4, 'FTP_TRP.1': 4}}, 'cc_claims': {'D': {'D.SCD': 1, 'D.SVD': 1}, 'T': {'T': 2}, 'A': {'A.CSP': 9, 'A.CGA': 6, 'A.SCA': 5}, 'R': {'R.TOE': 1}, 'OE': {'OE.HI_VAD': 2, 'OE.HID_VAD': 7}}, 'vendor': {'NXP': {'NXP': 14, 'NXP Semiconductors': 1}, 'Oberthur': {'Oberthur Technologies': 1}, 'Idemia': {'IDEMIA': 24, 'Idemia': 1}, 'Morpho': {'Morpho': 2}}, 'eval_facility': {'CEA-LETI': {'CEA-LETI': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES128': 1, 'AES192': 1, 'AES256': 1, 'AES': 22}}, 'DES': {'DES': {'DES': 21}, '3DES': {'TDES': 9, '3DES': 9}}, 'constructions': {'MAC': {'KMAC': 1, 'CMAC': 6}}}, 'asymmetric_crypto': {'RSA': {'RSA-PSS': 2, 'RSA-OAEP': 2}, 'ECC': {'ECDH': {'ECDH': 10}, 'ECDSA': {'ECDSA': 6}, 'ECC': {'ECC': 23}}, 'FF': {'DH': {'Diffie-Hellman': 3, 'DH': 16}, 'DSA': {'DSA': 6}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 16}, 'SHA2': {'SHA-224': 8, 'SHA-256': 12, 'SHA-384': 9, 'SHA-512': 9}}}, 'crypto_scheme': {'MAC': {'MAC': 18}, 'KA': {'KA': 1, 'Key agreement': 2}}, 'crypto_protocol': {'PACE': {'PACE': 350}}, 'randomness': {'RNG': {'RNG': 4}}, 'cipher_mode': {'CBC': {'CBC': 17}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 3, 'side channel': 1, 'DPA': 3, 'SPA': 3, 'timing attacks': 2}, 'FI': {'physical tampering': 7, 'Physical Tampering': 1, 'Malfunction': 14, 'malfunction': 3, 'DFA': 1, 'fault injection': 1}}, 'technical_report_id': {'BSI': {'BSI TR-03110': 1}}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 2}}, 'os_name': {'JCOP': {'JCOP 4': 13}}, 'cplc_data': {}, 'ic_data_group': {'EF': {'EF.ChipSecurity': 1}}, 'standard_id': {'FIPS': {'FIPS 197': 1, 'FIPS180-4': 1, 'FIPS PUB 180-2': 1}, 'NIST': {'NIST SP 800-38B': 1, 'NIST SP 800-38A': 1}, 'PKCS': {'PKCS3': 1, 'PKCS#1': 6, 'PKCS1': 2}, 'BSI': {'AIS20': 1}, 'ISO': {'ISO/IEC 14443': 2, 'ISO/IEC 9797-1': 3, 'ISO/IEC 9796-2': 5, 'ISO/IEC 15408:2005': 2}, 'ICAO': {'ICAO': 11}, 'SCP': {'SCP02': 2, 'SCP03': 2}, 'CC': {'CCMB-2012-09-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': '37087516bfd9b5c33973bf7d3a184b46e8b1b511ea21f755d51d1f0ac7d2fd7d', 'st_pdf_hash': '1a4e6aeab09be54581e4fd060effa669db0ba15d31243560a99806eb5357a752', 'report_txt_hash': '7fdbea5c430c1c4ac3fe3bdc652470092a10a8fc4bb6a13c6b1f9e124915e072', 'st_txt_hash': '1c39a80e2b469b67bc47cca8988068dc3b10b9775dbf07554af474c8dca1d15a'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {'DES': 5}, 'rules_asymmetric_crypto': {'ECC': 1}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {}, 'rules_randomness': {}, 'rules_tee': {}, 'rules_side_channels': {}} values inserted.
    • The st_keywords property was updated, with the {'rules_symmetric_crypto': {'AES128': 1, 'AES192': 1, 'AES256': 1, 'AES': 22, 'TDES': 9, 'DES': 3, '3DES': 9, 'KMAC': 1}, 'rules_asymmetric_crypto': {'ECDH': 10, 'ECDSA': 6, 'ECC': 23, 'Diffie-Hellman': 1, 'DH': 16, 'DSA': 6}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA-1': 16, 'SHA-224': 8, 'SHA-256': 12, 'SHA-384': 9, 'SHA-512': 9}, 'rules_crypto_schemes': {'PACE': 350, 'MAC': 18}, 'rules_randomness': {'RNG': 4}, 'rules_tee': {'SE': 2}, 'rules_side_channels': {'Malfunction': 14, 'malfunction': 3, 'physical probing': 3, 'physical tampering': 7, 'Physical Tampering': 1, 'side channel': 1, 'SPA': 3, 'DPA': 3, 'DFA': 1, 'fault injection': 1, 'timing attacks': 2}} values inserted.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 2}]}}.
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}}.
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['1.0']}.
  • 01.02.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The following values were removed: {'_type': 'Set', 'elements': [{'_type': 'ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 3: Device with key import', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0075b_pdf.pdf', 'pp_ids': None}]}.
    • The following values were added: {'_type': 'Set', 'elements': [{'_type': 'ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 3: Device with key import', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0075b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['PP_SSCD_PART3_V1.0.2']}}]}.
  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name ID-A v1.0 on ID-One Cosmo J (SAAAAR : 417701, 418402 et 417652) was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/files/epfiles/certificat-2021_57.pdf",
  "dgst": "7f29aa0291e79ae3",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2021/57",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_APD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.0"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1136-2021"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1136-2021"
        ]
      }
    },
    "scheme_data": {
      "cert_id": "2021/57",
      "description": "Le produit \u00e9valu\u00e9 est \u00ab ID-A v1.0 on ID-One Cosmo J (SAAAAR : 417701, 418402 et 417652) \u00bb d\u00e9velopp\u00e9 par IDEMIA.\nCe produit est une carte \u00e0 puce constitu\u00e9e d\u2019un logiciel impl\u00e9mentant IAS ECC v2, et d\u2019un microcontr\u00f4leur s\u00e9curis\u00e9 disposant d\u2019interface avec et sans contact. Il est destin\u00e9 \u00e0 \u00eatre utilis\u00e9 comme dispositif s\u00e9curis\u00e9 de cr\u00e9ation de signature (SSCD). Il peut \u00eatre utilis\u00e9 dans diff\u00e9rents ty",
      "developer": "IDEMIA et NXP SEMICONDUCTORS",
      "enhanced": {
        "augmented": "ALC_DVS.2, AVA_VAN.5 Profil de protection : Protection profiles for secure signature creation device: Part 2 : Device with key generation, v2.01, BSI-CC-PP-0059-2009-MA-02 ; Part 3 : Device with key import, v1.0.2, BSI-CC-PP-0075-2012-MA-01 ; Part 4 : Ext",
        "category": "Cartes \u00e0 puce",
        "cc_version": "Crit\u00e8res Communs version 3.1r5",
        "cert_id": "2021/57",
        "cert_link": "https://cyber.gouv.fr/sites/default/files/2021/12/certificat-2021_57.pdf",
        "certification_date": "23/11/2021",
        "developer": "IDEMIA et NXP SEMICONDUCTORS",
        "evaluation_facility": "CEA - LETI",
        "expiration_date": "23/11/2026",
        "level": "EAL5+",
        "mutual_recognition": "SOG-IS\n                          CCRA",
        "protection_profile": "",
        "report_link": "https://cyber.gouv.fr/sites/default/files/2021/12/anssi-cc-2021_57fr.pdf",
        "sponsor": "IDEMIA",
        "target_link": "https://cyber.gouv.fr/sites/default/files/2021/12/anssi-cible-2021_57en.pdf"
      },
      "expiration_date": "23 Novembre 2026",
      "level": "EAL5+",
      "product": "ID-A v1.0 on ID-One Cosmo J (SAAAAR : 417701, 418402 et 417652)",
      "sponsor": "IDEMIA",
      "url": "https://cyber.gouv.fr/produits-certifies/id-v10-id-one-cosmo-j-saaaar-417701-418402-et-417652"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1136-2021",
          "BSI-DSZ-CC-0973-2016"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1136-2021",
          "BSI-DSZ-CC-0973-2016"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Idemia",
  "manufacturer_web": "https://www.idemia.com",
  "name": "ID-A v1.0 on ID-One Cosmo J (SAAAAR : 417701, 418402 et 417652)",
  "not_valid_after": "2026-11-23",
  "not_valid_before": "2021-11-23",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "certificat-2021_57.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2021/57": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0059-2009-MA-02": 1,
          "BSI-CC-PP-0071-2012-MA-01": 1,
          "BSI-CC-PP-0072-2012-MA-01": 1,
          "BSI-CC-PP-0075-2012-MA-01": 1,
          "BSI-CC-PP-0076-2013-MA-01": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_DVS.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 1,
          "EAL5": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "CEA-LETI": {
          "CEA-LETI": 2
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Idemia": {
          "IDEMIA": 2
        },
        "NXP": {
          "NXP": 1
        }
      },
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "",
      "/CreationDate": "D:20211124143801+01\u002700\u0027",
      "/Creator": "PScript5.dll Version 5.2.2",
      "/ModDate": "D:20211124143801+01\u002700\u0027",
      "/Producer": "Acrobat Distiller 11.0 (Windows)",
      "/Title": "",
      "pdf_file_size_bytes": 294265,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 2
    },
    "report_filename": "anssi-cc-2021_57fr.pdf",
    "report_frontpage": {
      "FR": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 1
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1136-2021": 1
        },
        "FR": {
          "ANSSI-CC-2021/57": 2
        },
        "NL": {
          "NSCIB-CC-180212-CR3": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP- 0075-2012-MA-01": 1,
          "BSI-CC-PP-0059-": 1,
          "BSI-CC-PP-0059-2009-MA-02": 1,
          "BSI-CC-PP-0071-2012-MA-01": 2,
          "BSI-CC-PP-0072-2012-MA-01": 2,
          "BSI-CC-PP-0075-2012-MA-01": 1,
          "BSI-CC-PP-0076-2013-MA-01": 2
        },
        "other": {
          "PP-SSCD-": 5,
          "PP-SSCD-Part2": 1,
          "PP-SSCD-Part3": 1,
          "PP-SSCD-Part5": 1,
          "PP-SSCD-Part6": 1
        }
      },
      "cc_sar": {
        "AGD": {
          "AGD_OPE": 3,
          "AGD_PRE": 3
        },
        "ALC": {
          "ALC_DVS.2": 1,
          "ALC_FLR": 1
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 5": 1,
          "EAL2": 2,
          "EAL7": 1
        },
        "ITSEC": {
          "ITSEC E6 Elev\u00e9": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "CEA-LETI": {
          "CEA - LETI": 1
        },
        "CESTI": {
          "CESTI": 2
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {
        "JCOP": {
          "JCOP 4": 3
        }
      },
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Idemia": {
          "IDEMIA": 20
        },
        "NXP": {
          "NXP": 2
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "",
      "/CreationDate": "D:20211124143551+01\u002700\u0027",
      "/Creator": "PScript5.dll Version 5.2.2",
      "/ModDate": "D:20211124143551+01\u002700\u0027",
      "/Producer": "Acrobat Distiller 11.0 (Windows)",
      "/Title": "",
      "pdf_file_size_bytes": 142402,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 13
    },
    "st_filename": "anssi-cible-2021_57en.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 13
          },
          "ECDH": {
            "ECDH": 10
          },
          "ECDSA": {
            "ECDSA": 6
          }
        },
        "FF": {
          "DH": {
            "DH": 5,
            "Diffie-Hellman": 1
          }
        },
        "RSA": {
          "RSA-OAEP": 2,
          "RSA-PSS": 2
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0973-2016": 1,
          "BSI-DSZ-CC-1136-2021": 2
        },
        "NL": {
          "CC-16-67206-CR": 1,
          "CC-21-180212": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.CGA": 6,
          "A.CSP": 9,
          "A.SCA": 5
        },
        "D": {
          "D.SCD": 1,
          "D.SVD": 1
        },
        "OE": {
          "OE.HID_VAD": 7,
          "OE.HI_VAD": 2
        },
        "R": {
          "R.TOE": 1
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0059-2009-MA-02": 1,
          "BSI-CC-PP-0068-V2-": 1,
          "BSI-CC-PP-0071-2012-": 1,
          "BSI-CC-PP-0072-2012-MA-01": 1,
          "BSI-CC-PP-0075-2012-MA-01": 1,
          "BSI-CC-PP-0076-2013-MA-01": 1,
          "BSI-CC-PP-0084-2014": 1,
          "BSI-CC-PP-0086": 1
        },
        "other": {
          "PP-SSCD2": 25,
          "PP-SSCD3": 26,
          "PP-SSCD4": 24,
          "PP-SSCD5": 25,
          "PP-SSCD6": 22
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 15,
          "ADV_FSP": 1,
          "ADV_FSP.1": 3,
          "ADV_FSP.2": 2,
          "ADV_FSP.4": 1,
          "ADV_FSP.5": 22,
          "ADV_IMP": 1,
          "ADV_IMP.1": 15,
          "ADV_INT": 1,
          "ADV_INT.2": 7,
          "ADV_TDS": 1,
          "ADV_TDS.1": 2,
          "ADV_TDS.3": 3,
          "ADV_TDS.4": 23
        },
        "AGD": {
          "AGD_OPE": 9,
          "AGD_OPE.1": 15,
          "AGD_PRE": 8,
          "AGD_PRE.1": 11
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.4": 16,
          "ALC_CMS": 1,
          "ALC_CMS.1": 1,
          "ALC_CMS.5": 7,
          "ALC_DEL": 1,
          "ALC_DEL.1": 6,
          "ALC_DVS": 1,
          "ALC_DVS.1": 1,
          "ALC_DVS.2": 15,
          "ALC_LCD": 1,
          "ALC_LCD.1": 9,
          "ALC_TAT": 1,
          "ALC_TAT.1": 2,
          "ALC_TAT.2": 12
        },
        "APE": {
          "APE_SRE": 1
        },
        "ASE": {
          "ASE_APD.1": 1,
          "ASE_CCL": 1,
          "ASE_CCL.1": 15,
          "ASE_ECD": 1,
          "ASE_ECD.1": 14,
          "ASE_INT": 1,
          "ASE_INT.1": 17,
          "ASE_OBJ": 1,
          "ASE_OBJ.2": 13,
          "ASE_REQ": 1,
          "ASE_REQ.1": 2,
          "ASE_REQ.2": 15,
          "ASE_SPD": 1,
          "ASE_SPD.1": 8,
          "ASE_TSS": 1,
          "ASE_TSS.1": 6
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.1": 2,
          "ATE_COV.2": 8,
          "ATE_DPT": 1,
          "ATE_DPT.1": 1,
          "ATE_DPT.3": 7,
          "ATE_FUN": 1,
          "ATE_FUN.1": 14,
          "ATE_IND": 1,
          "ATE_IND.2": 7
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.5": 15
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 5": 1,
          "EAL 5 augmented": 1,
          "EAL 6+": 2,
          "EAL4+": 1,
          "EAL5": 6,
          "EAL5 augmented": 4,
          "EAL5+": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 1
        },
        "FCS": {
          "FCS_CKM": 28,
          "FCS_CKM.1": 23,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 2,
          "FCS_CKM.4": 27,
          "FCS_CKM.4.1": 1,
          "FCS_COP.1": 49,
          "FCS_COP.1.1": 1,
          "FCS_RNG": 3,
          "FCS_RNG.1": 34,
          "FCS_RNG.1.1": 2
        },
        "FDP": {
          "FDP_ACC": 90,
          "FDP_ACC.1": 19,
          "FDP_ACF": 79,
          "FDP_ACF.1": 30,
          "FDP_DAU": 12,
          "FDP_DAU.2": 2,
          "FDP_IFC.1": 9,
          "FDP_ITC": 14,
          "FDP_ITC.1": 5,
          "FDP_ITC.2": 2,
          "FDP_RIP.1": 29,
          "FDP_RIP.1.1": 1,
          "FDP_SDI": 26,
          "FDP_SDI.2": 4,
          "FDP_UCT": 32,
          "FDP_UCT.1": 2,
          "FDP_UIT": 24,
          "FDP_UIT.1": 4
        },
        "FIA": {
          "FIA_AFL": 25,
          "FIA_AFL.1": 18,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_API": 22,
          "FIA_API.1": 16,
          "FIA_API.1.1": 2,
          "FIA_UAU": 103,
          "FIA_UAU.1": 29,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.4": 1,
          "FIA_UAU.5": 3,
          "FIA_UAU.6": 2,
          "FIA_UID": 27,
          "FIA_UID.1": 31,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1
        },
        "FMT": {
          "FMT_LIM": 5,
          "FMT_LIM.1": 18,
          "FMT_LIM.1.1": 2,
          "FMT_LIM.2": 17,
          "FMT_LIM.2.1": 2,
          "FMT_MOF.1": 14,
          "FMT_MOF.1.1": 1,
          "FMT_MSA": 30,
          "FMT_MSA.1": 5,
          "FMT_MSA.2": 18,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 31,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MSA.4": 18,
          "FMT_MSA.4.1": 1,
          "FMT_MTD": 230,
          "FMT_MTD.1": 16,
          "FMT_MTD.3": 13,
          "FMT_MTD.3.1": 1,
          "FMT_SMF.1": 69,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 32,
          "FMT_SMR.1": 50,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_EMS": 5,
          "FPT_EMS.1": 20,
          "FPT_EMS.1.1": 4,
          "FPT_EMS.1.2": 3,
          "FPT_FLS.1": 14,
          "FPT_FLS.1.1": 1,
          "FPT_PHP.1": 9,
          "FPT_PHP.1.1": 1,
          "FPT_PHP.1.2": 1,
          "FPT_PHP.3": 17,
          "FPT_PHP.3.1": 1,
          "FPT_TST": 1,
          "FPT_TST.1": 21,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FTP": {
          "FTP_ITC": 103,
          "FTP_ITC.1": 22,
          "FTP_TRP.1": 4
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 15
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 124
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key agreement": 2
        },
        "MAC": {
          "MAC": 12
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "CEA-LETI": {
          "CEA-LETI": 1
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 16
          },
          "SHA2": {
            "SHA-224": 8,
            "SHA-256": 9,
            "SHA-384": 8,
            "SHA-512": 9
          }
        }
      },
      "ic_data_group": {
        "EF": {
          "EF.ChipSecurity": 1
        }
      },
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {
        "JCOP": {
          "JCOP 4": 13
        }
      },
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "DFA": 1,
          "Malfunction": 5,
          "Physical Tampering": 1,
          "fault injection": 1,
          "malfunction": 5,
          "physical tampering": 7
        },
        "SCA": {
          "DPA": 3,
          "SPA": 3,
          "physical probing": 3,
          "side channel": 1,
          "timing attacks": 2
        }
      },
      "standard_id": {
        "BSI": {
          "AIS20": 1
        },
        "CC": {
          "CCMB-2012-09-004": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1
        },
        "FIPS": {
          "FIPS 197": 1,
          "FIPS PUB 180-2": 1,
          "FIPS180-4": 1
        },
        "ICAO": {
          "ICAO": 11
        },
        "ISO": {
          "ISO/IEC 14443": 2,
          "ISO/IEC 15408:2005": 2,
          "ISO/IEC 7816-4": 1,
          "ISO/IEC 9796-2": 5,
          "ISO/IEC 9797-1": 3
        },
        "NIST": {
          "NIST SP 800-38A": 1,
          "NIST SP 800-38B": 1
        },
        "PKCS": {
          "PKCS#1": 6,
          "PKCS1": 2,
          "PKCS3": 1
        },
        "SCP": {
          "SCP02": 2,
          "SCP03": 3
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 22,
            "AES128": 1,
            "AES192": 1,
            "AES256": 1
          }
        },
        "DES": {
          "3DES": {
            "3DES": 10,
            "TDES": 9
          },
          "DES": {
            "DES": 3
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 6,
            "KMAC": 2
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI TR-03110": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Idemia": {
          "IDEMIA": 23
        },
        "Morpho": {
          "Morpho": 1
        },
        "NXP": {
          "NXP": 14,
          "NXP Semiconductors": 1
        },
        "Oberthur": {
          "Oberthur Technologies": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "KUMAR Prem",
      "/Category": "Document type",
      "/Classification": "Classification",
      "/Comments": "",
      "/Company": "Company",
      "/CreationDate": "D:20210927144209+05\u002730\u0027",
      "/Creator": "Acrobat PDFMaker 21 for Word",
      "/DocumentTitle": "Document title",
      "/IDEMIAClassification": "PUBLIC",
      "/IDEMIATechnology": "Not Controlled",
      "/IssueDate": "Issue date",
      "/Keywords": "",
      "/MORPHOClassification": "PUBLIC",
      "/MORPHOTechnology": "Not Controlled",
      "/MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_ActionId": "12023471-0686-4519-81a7-0b27134aabfd",
      "/MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_Application": "Microsoft Azure Information Protection",
      "/MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_Enabled": "True",
      "/MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_Extended_MSFT_Method": "Manual",
      "/MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_Name": "Public",
      "/MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_Owner": "g509704@mph.morpho.com",
      "/MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_SetDate": "2021-07-30T05:03:54.9661844Z",
      "/MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_SiteId": "7694d41c-5504-43d9-9e40-cb254ad755ec",
      "/Manager": "",
      "/ModDate": "D:20210927145013+05\u002730\u0027",
      "/Producer": "Adobe PDF Library 21.7.123",
      "/ProjectName": "Project name",
      "/Reference": "Reference",
      "/Sensitivity": "Public",
      "/SourceModified": "D:20210927091153",
      "/Status": "Status",
      "/Subject": "",
      "/Title": "Title",
      "/TitusGUID": "fc098978-a09a-4110-a612-da1ab7eb03a2",
      "/Version": "Version",
      "/aliashClassificationHeaderforWordC": "",
      "/aliashClassificationHeaderforWordRS": "",
      "pdf_file_size_bytes": 2118308,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 169
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0076b_pdf.pdf",
        "pp_name": "Protection profiles for secure signature creation device - Part 6: Extension for device with key impo..."
      },
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0071b_pdf.pdf",
        "pp_name": "Protection profiles for secure signature creation device \u2014 Part 4: Extension for device with key gene..."
      },
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0059b_pdf.pdf",
        "pp_name": "Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Version..."
      },
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0072b_pdf.pdf",
        "pp_name": "Protection profiles for secure signature creation device \u2014 Part 5: Extension for device with key gene..."
      },
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": "EAL4+",
        "pp_ids": {
          "_type": "Set",
          "elements": [
            "PP_SSCD_PART3_V1.0.2"
          ]
        },
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0075b_pdf.pdf",
        "pp_name": "Protection profiles for secure signature creation device - Part 3: Device with key import"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2021_57fr.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "AVA_VAN.5",
      "ALC_DVS.2",
      "EAL5+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/anssi-cible-2021_57en.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "2e2dda77ea40c6186618a911ab57d2f2c872272a1f8bb6c533ec0226dd9e3a01",
      "txt_hash": "843a3802021ef12ed0764161827a3723506303fb69cca795ce0cadc93cb24927"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "37087516bfd9b5c33973bf7d3a184b46e8b1b511ea21f755d51d1f0ac7d2fd7d",
      "txt_hash": "7fdbea5c430c1c4ac3fe3bdc652470092a10a8fc4bb6a13c6b1f9e124915e072"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "1a4e6aeab09be54581e4fd060effa669db0ba15d31243560a99806eb5357a752",
      "txt_hash": "1c39a80e2b469b67bc47cca8988068dc3b10b9775dbf07554af474c8dca1d15a"
    }
  },
  "status": "active"
}