Plateforme ID-One Cosmo V9.1 masquée sur le composant IFX SLC32
CSV information ?
Status | active |
---|---|
Valid from | 31.03.2020 |
Valid until | 28.03.2027 |
Scheme | 🇫🇷 FR |
Manufacturer | Idemia |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | AVA_VAN.5, EAL5+, ALC_DVS.2 |
Protection profiles | |
Maintenance updates | Reassessment report: ANSSI-CC-2020/07-S01 (28.03.2022) Certification report |
Reassessment report : ANSSI-CC-2020/07-S01 (28.03.2022) Certification report Security target | |
ANSSI-CC-2020/07-M01 (23.07.2020) Certification report | |
Maintenance report : ANSSI-CC-2020/07-M02 (16.05.2022) Certification report |
Heuristics summary ?
Certificate ?
Extracted keywords
Vendor
IDEMIASecurity level
EAL5, EAL2Security Assurance Requirements (SAR)
ALC_DVS.2, AVA_VAN.5Certificates
ANSSI-CC-2020/07-S01Evaluation facilities
CEA-LETIFile metadata
Title: | ANSSI-CC-2020/07 |
---|---|
Author: | Géraldine Avoué |
Creation date: | D:20220404173043+02'00' |
Modification date: | D:20220404173044+02'00' |
Pages: | 2 |
Creator: | Acrobat PDFMaker 11 pour Word |
Producer: | Adobe PDF Library 11.0 |
Certification report ?
Extracted keywords
Symmetric Algorithms
DESVendor
Infineon Technologies AG, Infineon, IDEMIASecurity level
EAL 5, EAL2, EAL6, EAL7, EAL 1, EAL 3, EAL 7, ITSEC E6 ElevéSecurity Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE, AGD_PRE, AGD_ALP, ALC_DVS.2, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSSProtection profiles
BSI-CC-PP-0099-2017, BSI-PP-0084-2014, ANSSI-CC-PP-0099-2017Certificates
BSI-DSZ-CC-1110-V2-2019, ANSSI-CC-2020/07Evaluation facilities
SERMA, CESTI, CEA - LETI, CEA-LETIStandards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004File metadata
Title: | ANSSI-CC-2020/07 |
---|---|
Subject: | Plateforme ID-One Cosmo V9.1 masquée sur le composant IFX SLC32 |
Keywords: | ANSSI-CC-CER-F-07, v29.2 |
Author: | Géraldine Avoué |
Creation date: | D:20200402164050+02'00' |
Pages: | 18 |
Creator: | Writer |
Producer: | LibreOffice 4.4 |
Frontpage
Certificate ID: | ANSSI-CC-2020/07 |
---|---|
Certified item: | Plateforme ID-One Cosmo V9.1 masquée sur le composant IFX SLC32 |
Certification lab: | CEA - LETI 17 avenue des martyrs, 38054 Grenoble Cedex 9, France |
Developer: | IDEMIA 2 place Samuel de Champlain 92400 Courbevoie, France Infineon Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire IDEMIA 2 place Samuel de Champlain 92400 Courbevoie, France |
References
Outgoing- BSI-DSZ-CC-1110-V2-2019 - Infineon Security Controller IFX_CCI_000003h, 000005h, 000008h, 00000Ch, 000013h, 000014h, 000015h, 00001Ch, 00001Dh, 000021h, 000022h H13 including the products from the second production line and optional software packages: Flash Loader, Asymmetric Crypto Library, Symmetric Cryptographic Library, Hardware Support Layer, Hash Crypto Library, Mifare Compatible Software, and CIPURSE™ Crypto Library
- ANSSI-CC-2020/56 - CombICAO Applet v2.1 in EAC configuration on ID-One Cosmo V9.1 (code SAAAAR : 203523)
- NSCIB-CC-0286910-CR - Idemia IDeal Drive DT V3.1 on Cosmo V9.1
- ANSSI-CC-2020/57 - CombICAO Applet v2.1 in EAC with PACE configuration on ID-One Cosmo V9.1 (code SAAAAR : 203523)
- NSCIB-CC-0286907-CR - Idemia ID-One™ CNS V2 on Cosmo V9.1
- ANSSI-CC-2020/59 - CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.1 (code SAAAAR : 203523)
- ANSSI-CC-2020/58 - CombICAO Applet v2.1 in EAC with PACE configuration for French ID on ID-One Cosmo V9.1 (code SAAAAR : 203523)
- ANSSI-CC-2020/55 - CombICAO Applet v2.1 in BAC and CA configuration on ID-One Cosmo V9.1(Code SAAAAR : 203523)
- ANSSI-CC-2022/33 - ID-One Cosmo v9.1 embedding VITALE application version 2.1.4
- NSCIB-CC-22-0286910-CR - Idemia IDeal Drive DT V3.1 on Cosmo V9.1
Security target ?
Extracted keywords
Symmetric Algorithms
AES, DES, TDES, Triple-DES, HMAC, CMACAsymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-HellmanHash functions
SHA-1, SHA-256, SHA-384, SHA-224, SHA-512, SHA256, SHA-2Schemes
MAC, Key Agreement, Key agreementProtocols
PACERandomness
RNGBlock cipher modes
ECB, CBCJavaCard versions
Java Card 3.0.5JavaCard API constants
TYPE_ACCESSVendor
Infineon, Infineon Technologies AG, IDEMIASecurity level
EAL5, EAL5+, EAL4, EAL5 augmented, EAL4 augmentedClaims
D.APP_CODE, D.APP_C_DATA, D.APP_I_DATA, D.PIN, D.API_DATA, D.CRYPTO, D.JCS_CODE, D.JCS_DATA, D.SEC_DATA, D.CONFIG, D.SENSITIVE_DATA, D.ARRAY, D.JCS_KEYS, D.NB_REMAINTRYGLB, O.SCP, O.CARD_MANAGEMENT, O.SID, O.FIREWALL, O.GLOBAL_ARRAYS_CONFID, O.GLOBAL_ARRAYS_INTEG, O.NATIVE, O.OPERATE, O.REALLOCATION, O.RESOURCES, O.ALARM, O.CIPHER, O.RNG, O.KEY-MNGT, O.PIN-MNGT, O.TRANSACTION, O.OBJ-DELETION, O.DELETION, O.LOAD, O.INSTALL, O.RESIDENT_APPLICATION, O.SECURE_COMPARE, O.PATCH_LOADING, O.PIN-, O.APPLET, O.CODE_PKG, O.JAVAOBJECT, O.OBJ-, T.CONFID-APPLI-DATA, T.CONFID-JCS-CODE, T.CONFID-JCS-DATA, T.INTEG-APPLI-CODE, T.INTEG-APPLI-DATA, T.INTEG-JCS-CODE, T.INTEG-JCS-DATA, T.SID, T.EXE-CODE, T.NATIVE, T.RESOURCES, T.DELETION, T.INSTALL, T.OBJ-DELETION, T.PHYSICAL, T.CONFIGURATION, T.CONF_DATA_APPLET, T.PATCH_LOADING, T.INTEG-APPLI-, T.INTEG-, T.EXE-, A.DELETION, A.APPLET, A.VERIFICATION, R.JAVA, OP.ARRAY_ACCESS, OP.ARRAY_LENGTH, OP.ARRAY_AASTORE, OP.CREATE, OP.DELETE_APPLET, OP.DELETE_PCKG, OP.DELETE_PCKG_APPLET, OP.FLOW, OP.IMPORT_KEY, OP.INSTANCE_FIELD, OP.INVK_INTERFACE, OP.INVK_VIRTUAL, OP.JAVA, OP.THROW, OP.TYPE_ACCESS, OP.LOCAL_STACK_ACCESS, OP.OPERAND_STACK_ACCESS, OP.PUT, OP.STATIC_FIELD, OP.NATIVE_ACCESS, OP.NATIVE_INTERFACE_CALL, OP.PUTFIELD, OP.PUTSTATIC, OE.SCP, OE.CARD-, OE.VERIFICATION, OE.CODE-EVIDENCE, OE.CARD_MANAGEMENT, OE.APPLET, OE.CODE-, OSP.VERIFICATIONSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_TDS.1, ADV_FSP.5, ADV_TDS.4, ADV_IMP.1, ADV_TDS.3, ADV_INT.2, ADV_FSP.2, ADV_FSP.4, AGD_PRE, AGD_OPE, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_DVS, ALC_TAT.1, ALC_TAT.2, ALC_CMC.4, ALC_CMS.1, ALC_DVS.1, ALC_LCD.1, ALC_CMS.5, ALC_DEL.1, ATE_COV.2, ATE_FUN.1, ATE_COV.1, ATE_DPT.1, ATE_DPT.3, AVA_VAN.5, AVA_VAN, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1, ASE_REQ.2, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_ARP.1, FAU_ARP.1.1, FAU_STG.2, FAU_STG.2.1, FAU_STG.2.2, FAU_STG.2.3, FAU_SAA.1, FAU_GEN.1, FAU_GEN, FCO_NRO, FCO_NRO.2, FCS_RNG, FCS_RNG.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM.1, FCS_CKM.1.1, FCS_CKM.4, FCS_CKM.4.1, FCS_COP.1, FCS_COP.1.1, FCS_COP, FCS_CKM, FDP_ACC, FDP_ACC.2, FDP_ACF, FDP_ACF.1, FDP_IFC, FDP_IFC.1, FDP_IFF, FDP_IFF.1, FDP_RIP, FDP_RIP.1, FDP_ROL.1, FDP_ROL, FDP_SDI, FDP_SDI.2, FDP_ITC, FDP_ITC.2, FDP_IFC.2, FDP_UIT, FDP_UIT.1, FDP_UCT, FDP_UCT.1, FDP_ITC.1, FDP_ACC.1, FIA_ATD, FIA_ATD.1, FIA_UID, FIA_UID.2, FIA_USB, FIA_USB.1, FIA_UID.1, FIA_AFL, FIA_AFL.1, FIA_UAU, FIA_UAU.1, FIA_UAU.4, FIA_UAU.7, FMT_MSA, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD, FMT_MTD.1, FMT_MTD.3, FMT_SMR, FMT_SMF, FMT_SMR.2, FMT_MOF, FMT_MOF.1, FMT_MTD.2, FPR_UNO.1, FPR_UNO.1.1, FPR_UNO, FPT_FLS.1, FPT_FLS.1.1, FPT_TDC.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_FLS, FPT_RCV, FPT_RCV.3, FPT_TST.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_TDC, FPT_PHP, FPT_PHP.3, FPT_RCV.4, FPT_TST, FRU_FLT, FRU_FLT.1, FTP_ITC, FTP_ITC.1, FTP_TRP.1Protection profiles
BSI-CC-PP-0084-2014Certificates
BSI-DSZ-CC-1110-V2-2019Evaluation facilities
CEA-LETICertification process
out of scope, a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT areSide-channel analysis
physical probing, DPA, SPA, timing attack, physical tampering, malfunction, fault injectionCertification process
out of scope, a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT areStandards
FIPS PUB 46-3, FIPS PUB 81, FIPS PUB 180-3, FIPS PUB 197, FIPS 198, FIPS 140-2, NIST SP 800-90, PKCS#1, AIS31, ISO/IEC 9796-1, ISO/IEC 9797-1, ISO/IEC 7816, ISO/IEC 14443, ISO/IEC 9797, SCP02, SCP03File metadata
Title: | Title |
---|---|
Author: | abderrahman.matoussi@idemia.com |
Creation date: | D:20200228163658+01'00' |
Modification date: | D:20200228163658+01'00' |
Pages: | 150 |
Creator: | Microsoft® Word 2016 |
Producer: | Microsoft® Word 2016 |
References
Outgoing- BSI-DSZ-CC-1110-V2-2019 - Infineon Security Controller IFX_CCI_000003h, 000005h, 000008h, 00000Ch, 000013h, 000014h, 000015h, 00001Ch, 00001Dh, 000021h, 000022h H13 including the products from the second production line and optional software packages: Flash Loader, Asymmetric Crypto Library, Symmetric Cryptographic Library, Hardware Support Layer, Hash Crypto Library, Mifare Compatible Software, and CIPURSE™ Crypto Library
- ANSSI-CC-2020/56 - CombICAO Applet v2.1 in EAC configuration on ID-One Cosmo V9.1 (code SAAAAR : 203523)
- ANSSI-CC-2020/57 - CombICAO Applet v2.1 in EAC with PACE configuration on ID-One Cosmo V9.1 (code SAAAAR : 203523)
- ANSSI-CC-2020/59 - CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.1 (code SAAAAR : 203523)
- ANSSI-CC-2020/58 - CombICAO Applet v2.1 in EAC with PACE configuration for French ID on ID-One Cosmo V9.1 (code SAAAAR : 203523)
- ANSSI-CC-2020/55 - CombICAO Applet v2.1 in BAC and CA configuration on ID-One Cosmo V9.1(Code SAAAAR : 203523)
- ANSSI-CC-2022/33 - ID-One Cosmo v9.1 embedding VITALE application version 2.1.4
Heuristics ?
Extracted SARs
ASE_TSS.1, ADV_TDS.4, AGD_PRE.1, AVA_VAN.5, ALC_TAT.2, ADV_FSP.5, ALC_LCD.1, ASE_REQ.2, AGD_OPE.1, ASE_ECD.1, ADV_IMP.1, ALC_DEL.1, ATE_FUN.1, ATE_DPT.3, ADV_INT.2, ASE_SPD.1, ALC_CMS.5, ATE_COV.2, ASE_CCL.1, ALC_DVS.2, ALC_CMC.4, ASE_OBJ.2, ASE_INT.1, ADV_ARC.1Scheme data ?
Product | Plateforme ID-One Cosmo V9.1 masquée sur le composant IFX SLC32 | |
---|---|---|
Url | https://cyber.gouv.fr/produits-certifies/plateforme-id-one-cosmo-v91-masquee-sur-le-composant-ifx-slc32 | |
Description | Le produit évalué est la « Plateforme ID-One Cosmo V9.1 masquée sur le composant IFX SLC32, Identification du matériel 092914 ». Elle est développée par IDEMIA et embarquée sur le microcontrôleur développé et fabriqué par INFINEON TECHNOLOGIES AG. Ce produit est une plateforme ouverte Java Card conforme à la spécification émise par Global Platform, contact et/ou sans contact, destinée à accueil | |
Sponsor | IDEMIA, INFINEON TECHNOLOGIES AG | |
Developer | IDEMIA, INFINEON TECHNOLOGIES AG | |
Cert Id | 2020/07 | |
Level | EAL5+ | |
Expiration Date | 28 Mars 2027 | |
Enhanced | ||
Cert Id | 2020/07 | |
Certification Date | 31/03/2020 | |
Expiration Date | 28/03/2027 | |
Category | Cartes à puce | |
Cc Version | Critères Communs version 3.1r5 | |
Developer | IDEMIA, INFINEON TECHNOLOGIES AG | |
Sponsor | IDEMIA, INFINEON TECHNOLOGIES AG | |
Evaluation Facility | CEA - LETI | |
Level | EAL5+ | |
Protection Profile | Java Card Protection Profile Open Configuration, version 3.0.5 (BSI-CC-PP-0099-2017) | |
Mutual Recognition | SOG-IS CCRA | |
Augmented | ALC_DVS.2, AVA_VAN.5 | |
Target Link | https://cyber.gouv.fr/sites/default/files/2020/04/anssi-cible-cc-2020_07-m02en.pdf | |
Report Link | https://cyber.gouv.fr/sites/default/files/2020/04/anssi-cc-2020_07-fr.pdf | |
Cert Link | https://cyber.gouv.fr/sites/default/files/2020/04/certificat-cc-2020_07-s01.pdf |
References ?
Updates ?
-
15.02.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The following values were inserted:
{'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '3996e239c72d181094b76bd38b58cf629382f9603eea456b4382b56461d6e63f', 'txt_hash': '15a1e2ed5352aa2d710ffe8a000b76f1733640fb99253f023c444a900d80693e'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'f2253108b3d5baad833abb27ec6ea00f236000f43a23281fe43ae078f32d8a43', 'txt_hash': 'd0b34b74aa182a8c12e6ba252de1dce3ea72887b1b753cc410246239f5d3d0d7'}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'fe335c8ba5b824602982cd473fdf60cc90f6d5ad4f86878d9bab9b705677db07', 'txt_hash': '1db1bd2d3c13b3f08ad2bc162a6c15f0fd66a74aa777129acde4c4de206cdaba'}}
. - The following properties were deleted:
['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash']
.
The PDF extraction data was updated.
- The following values were inserted:
{'cert_metadata': {'pdf_file_size_bytes': 100060, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 2, '/Author': 'Géraldine Avoué', '/Category': '-S01', '/Comments': 'ANSSI-CC-CER-F-14_v14.6', '/Company': 'SGDSN', '/CreationDate': "D:20220404173043+02'00'", '/Creator': 'Acrobat PDFMaker 11 pour Word', '/ModDate': "D:20220404173044+02'00'", '/Producer': 'Adobe PDF Library 11.0', '/SourceModified': 'D:20220404153033', '/Title': 'ANSSI-CC-2020/07', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}, 'cert_frontpage': None, 'cert_keywords': {'cc_cert_id': {'FR': {'ANSSI-CC-2020/07-S01': 2}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL5': 1, 'EAL2': 1}}, 'cc_sar': {'ALC': {'ALC_DVS.2': 1}, 'AVA': {'AVA_VAN.5': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Idemia': {'IDEMIA': 2}}, 'eval_facility': {'CEA-LETI': {'CEA-LETI': 2}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}, 'cert_filename': 'certificat-cc-2020_07-s01.pdf'}
. - The report_frontpage property was set to
{'FR': {'match_rules': ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables'], 'cert_id': 'ANSSI-CC-2020/07', 'cert_item': 'Plateforme ID-One Cosmo V9.1 masquée sur le composant IFX SLC32', 'cert_item_version': 'Identification du matériel : 092914', 'ref_protection_profiles': 'Java Card Protection Profile Open Configuration, version 3.0.5 certifié BSI-CC-PP-0099-2017 le 21 décembre 2017', 'cc_version': 'Critères Communs version 3.1 révision 5', 'cc_security_level': 'EAL 5 augmenté ALC_DVS.2, AVA_VAN.5', 'developer': 'IDEMIA 2 place Samuel de Champlain 92400 Courbevoie, France Infineon Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire IDEMIA 2 place Samuel de Champlain 92400 Courbevoie, France', 'cert_lab': 'CEA - LETI 17 avenue des martyrs, 38054 Grenoble Cedex 9, France'}}
. - The st_frontpage property was set to
None
. - The report_keywords property was updated, with the
{'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1110-V2-2019': 2}}, 'FR': {'__update__': {'ANSSI-CC-2020/07': 19}}}}}
data. - The st_keywords property was updated, with the
{'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1110-V2-2019': 2}}}}}
data.
The computed heuristics were updated.
- The report_references property was updated, with the
{'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['NSCIB-CC-0286910-CR2-CR']}, '__add__': {'_type': 'Set', 'elements': ['NSCIB-CC-22-0286910-CR']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['NSCIB-CC-0286910-CR2-CR']}, '__add__': {'_type': 'Set', 'elements': ['NSCIB-CC-22-0286910-CR']}}}
data.
- The following values were inserted:
-
13.02.2024 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1110-V2-2019': 4}}, 'FR': {'__update__': {'ANSSI-CC-2020/07': 38}}}}}
data. - The st_keywords property was updated, with the
{'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1110-V2-2019': 4}}}}}
data.
The computed heuristics were updated.
- The report_references property was updated, with the
{'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['NSCIB-CC-0286910-CR2']}, '__add__': {'_type': 'Set', 'elements': ['NSCIB-CC-0286910-CR2-CR']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['NSCIB-CC-0286910-CR2']}, '__add__': {'_type': 'Set', 'elements': ['NSCIB-CC-0286910-CR2-CR']}}}
data.
- The report_keywords property was updated, with the
-
07.02.2024 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'cc_cert_id': {'__delete__': ['CA']}}
data.
- The report_keywords property was updated, with the
-
07.02.2024 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'cc_cert_id': {'__insert__': {'CA': {'1 1 1': 21, '1 2 3': 5, '5 5 6': 1, '1 1 2': 1, '2 3 3': 1, '5 6 4': 1, '4 5 5': 2, '5 5 5': 1, '1 2 2': 5, '2 2 2': 2, '3 3 2': 1, '1 1 3': 1, '2 2 1': 1, '2 2 3': 1}}, '__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1110-V2-2019': 2}}, 'FR': {'__update__': {'ANSSI-CC-2020/07': 19}}}}}
data. - The st_keywords property was updated, with the
{'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1110-V2-2019': 2}}}}}
data.
The computed heuristics were updated.
- The report_references property was updated, with the
{'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['NSCIB-CC-0286910-CR2-CR']}, '__add__': {'_type': 'Set', 'elements': ['NSCIB-CC-0286910-CR2']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['NSCIB-CC-0286910-CR2-CR']}, '__add__': {'_type': 'Set', 'elements': ['NSCIB-CC-0286910-CR2']}}}
data.
- The report_keywords property was updated, with the
-
05.02.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'description': 'Le produit évalué est la « Plateforme ID-One Cosmo V9.1 masquée sur le composant IFX SLC32, Identification du matériel 092914 ». Elle est développée par IDEMIA et embarquée sur le microcontrôleur développé et fabriqué par INFINEON TECHNOLOGIES AG.\n\nCe produit est une plateforme ouverte Java Card conforme à la spécification émise par Global Platform, contact et/ou sans contact, destinée à accueil'}
data.
- The scheme_data property was updated, with the
-
04.01.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'annotated_references': None}
. - The scheme_data property was updated, with the
{'product': 'Plateforme ID-One Cosmo V9.1 masquée sur le composant IFX SLC32', 'url': 'https://cyber.gouv.fr/produits-certifies/plateforme-id-one-cosmo-v91-masquee-sur-le-composant-ifx-slc32', 'enhanced': {'__insert__': {'cert_id': '2020/07', 'sponsor': 'IDEMIA, INFINEON TECHNOLOGIES AG', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ALC_DVS.2, AVA_VAN.5'}, '__update__': {'developer': 'IDEMIA, INFINEON TECHNOLOGIES AG', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2020/04/anssi-cc-2020_07-fr.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2020/04/anssi-cible-cc-2020_07-m02en.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/2020/04/certificat-cc-2020_07-s01.pdf'}, '__delete__': ['id', 'augmentations', 'recognition', 'description']}}
data.
- The following values were inserted:
-
21.09.2023 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The report_references property was updated, with the
{'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['NSCIB-CC-0286910-CR2']}, '__add__': {'_type': 'Set', 'elements': ['NSCIB-CC-0286910-CR2-CR']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['NSCIB-CC-0286910-CR2']}, '__add__': {'_type': 'Set', 'elements': ['NSCIB-CC-0286910-CR2-CR']}}}
data. - The scheme_data property was updated, with the
{'product': 'Plateforme ID-One Cosmo V9.1 masquée sur le composant IFX SLC32\n\t\t\t\n\t\t\tDernier rapport de maintenance :2020/07-M02Dernier rapport de surveillance :2020/07-S01fr', 'vendor': 'IDEMIA, INFINEON TECHNOLOGIES AGIDEMIA, INFINEON TECHNOLOGIES AG', 'id': '2020/07', 'certification_date': '31/03/2020', 'url': 'https://www.ssi.gouv.fr/certification_cc/plateforme-id-one-cosmo-v9-1-masquee-sur-le-composant-ifx-slc32/', 'enhanced': {'__update__': {'id': '2020/07', 'certification_date': '31/03/2020', 'expiration_date': '28/03/2027', 'augmentations': 'ALC_DVS.2, AVA_VAN.5', 'protection_profile': 'Java Card Protection Profile Open Configuration, version 3.0.5 (BSI-CC-PP-0099-2017)', 'developer': 'IDEMIA, INFINEON TECHNOLOGIES AG / IDEMIA, INFINEON TECHNOLOGIES AG', 'evaluation_facility': 'CEA - LETI', 'description': 'Descriptif du produit\n\t\t\t\tLe produit évalué est la « Plateforme ID-One Cosmo V9.1 masquée sur le composant IFX SLC32, Identification du matériel 092914 ». Elle est développée par IDEMIA et embarquée sur le microcontrôleur développé et fabriqué par INFINEON TECHNOLOGIES AG.\nCe produit est une plateforme ouverte Java Card conforme à la spécification émise par Global Platform, contact et/ou sans contact, destinée à accueillir les applets de l’utilisateur pré-émission et/ou post-émission, et à leur fournir les services de sécurité détaillés dans la cible de sécurité.\n\t\t\t\t\n Rapport de certification\nSecurity target\nSecurity target\nCertificat\n \t\t\t\t\t\n \t\t\t\t\t\n \n \n Rapports de maintenance2020/07-M02 - 24/05/2022\n \n Rapports de surveillance2020/07-S01fr - 11/10/2022', 'report_link': 'https://www.ssi.gouv.fr/uploads/2020/04/anssi-cc-2020_07-fr.pdf', 'target_link': 'https://www.ssi.gouv.fr/uploads/2020/04/anssi-cible-cc-2020_07en.pdf', 'cert_link': 'https://www.ssi.gouv.fr/uploads/2020/04/certificat-cc-2020_07-s01.pdf'}}}
data.
- The report_references property was updated, with the
-
26.04.2023 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'scheme_data': {'product': 'Plateforme ID-One Cosmo v8.2, masquée sur le composant NXP P60D145\n\t\t\t\n\t\t\tDernier rapport de maintenance :2019/28-M01Dernier rapport de surveillance :2019/28-S01', 'vendor': 'Idemia et NXP Semiconductors GmbHIdemia', 'level': 'EAL5+', 'id': '2019/28', 'certification_date': '19/07/2019', 'category': 'Smart cards', 'url': 'https://www.ssi.gouv.fr/certification_cc/plateforme-id-one-cosmo-v8-2-masquee-sur-le-composant-nxp-p60d145/', 'enhanced': {'id': '2019/28', 'certification_date': '19/07/2019', 'expiration_date': '17/11/2027', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 3.1r5', 'level': 'EAL5+', 'augmentations': 'ALC_DVS.2 et AVA_VAN.5', 'protection_profile': 'Java Card Protection Profile Open Configuration, version 3.0', 'developer': 'Idemia et NXP Semiconductors GmbH / Idemia', 'evaluation_facility': 'CEA-Leti', 'recognition': 'SOG-IS - CCRA', 'description': 'Descriptif du produit\n\t\t\t\tLe produit évalué est la « Plateforme ID-One Cosmo v8.2, masquée sur le composant NXP P60D145, identification du matériel 091121». Elle est développée par Idemia et embarquée sur le microcontrôleur NXP P60D145 développé et fabriqué par NXP Semiconductors GmbH.\nLe produit dispose d’interfaces avec et sans contact. Il est destiné à héberger et exécuter une ou plusieurs applications, dites applets dans la terminologie Java Card.\n\t\t\t\t\n Rapport de certification\nSecurity target\nSecurity target\nSecurity target\nCertificat\n \t\t\t\t\t\n \t\t\t\t\t\n \n \n Rapports de maintenance2019/28-M01 - 28/07/2020\n2019/28-M02 - 30/07/2020\n \n Rapports de surveillance2019/28-S01 - 23/11/2022', 'report_link': 'https://www.ssi.gouv.fr/uploads/2019/08/anssi-cc-2019_28fr.pdf', 'target_link': 'https://www.ssi.gouv.fr/uploads/2019/08/anssi-cible-cc-2019_28en.pdf', 'cert_link': 'https://www.ssi.gouv.fr/uploads/2019/08/certificat-cc-2019_28-s01.pdf'}}}
.
- The following values were inserted:
-
11.02.2023 The certificate data changed.
Certificate changed
The _type was updated.
- The new value is
sec_certs.sample.cc.CCCertificate
.
The Maintenance Updates of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': '2022-03-28', 'maintenance_title': 'Reassessment report : ANSSI-CC-2020/07-S01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2020_07-s01fr1.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/files/epfiles/certificat-cc-2020_07-s01.pdf'}, {'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': '2022-03-28', 'maintenance_title': 'Reassessment report: ANSSI-CC-2020/07-S01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2020_07-s01fr.pdf', 'maintenance_st_link': None}, {'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': '2020-07-23', 'maintenance_title': 'ANSSI-CC-2020/07-M01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2020_07-m01.pdf', 'maintenance_st_link': None}, {'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': '2022-05-16', 'maintenance_title': 'Maintenance report : ANSSI-CC-2020/07-M02', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2020_07-m02.pdf', 'maintenance_st_link': None}]}
.
The state of the certificate object was updated.
- The _type property was set to
sec_certs.sample.cc.CCCertificate.InternalState
. - The following properties were deleted:
['errors']
.
The PDF extraction data was updated.
- The _type property was set to
sec_certs.sample.cc.CCCertificate.PdfData
.
The computed heuristics were updated.
- The following values were inserted:
{'direct_transitive_cves': None, 'indirect_transitive_cves': None}
. - The _type property was set to
sec_certs.sample.cc.CCCertificate.Heuristics
. - The following properties were deleted:
['direct_dependency_cves', 'indirect_dependency_cves']
.
- The new value is
-
05.02.2023 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The errors property was set to
[]
.
- The errors property was set to
-
26.12.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/59', 'ANSSI-CC-2020/58', 'ANSSI-CC-2020/55']}}, 'indirectly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/59', 'ANSSI-CC-2020/58', 'ANSSI-CC-2020/55']}}}
data. - The report_references property was updated, with the
{'directly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['NSCIB-CC-0286910-CR2']}}, 'indirectly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['NSCIB-CC-0286910-CR2']}}, 'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0945-2017']}}}
data.
- The st_references property was updated, with the
-
25.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The errors property was set to
['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2020_07-fr.pdf, code: nok']
.
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/59', 'ANSSI-CC-2020/58']}, '__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2022/33', 'ANSSI-CC-2020/57']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/59', 'ANSSI-CC-2020/58']}, '__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2022/33', 'ANSSI-CC-2020/57']}}}
data. - The report_references property was updated, with the
{'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['NSCIB-CC-0286910-CR2']}, '__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/55']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['NSCIB-CC-0286910-CR2']}, '__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/55']}}, 'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0891-V2-2016', 'BSI-DSZ-CC-0782-2012', 'BSI-DSZ-CC-0891-2015']}}}
data.
- The errors property was set to
-
25.12.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2022/33', 'ANSSI-CC-2020/55', 'ANSSI-CC-2020/57']}, '__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/58', 'ANSSI-CC-2020/56']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2022/33', 'ANSSI-CC-2020/55', 'ANSSI-CC-2020/57']}, '__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/58', 'ANSSI-CC-2020/56']}}}
data. - The report_references property was updated, with the
{'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/55']}, '__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/58', 'ANSSI-CC-2020/56']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/55']}, '__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/58', 'ANSSI-CC-2020/56']}}, 'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0945-V2-2018']}}}
data.
- The st_references property was updated, with the
-
24.12.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/56']}, '__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/59', 'ANSSI-CC-2022/33']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/56']}, '__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/59', 'ANSSI-CC-2022/33']}}}
data. - The report_references property was updated, with the
{'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/58', 'ANSSI-CC-2020/56']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/58', 'ANSSI-CC-2020/56']}}, 'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0945-V3-2018']}}}
data.
- The st_references property was updated, with the
-
24.12.2022 The certificate data changed.
Certificate changed
The cert_link was updated.
- The new value is
https://www.commoncriteriaportal.org/files/epfiles/certificat-cc-2020_07-s01.pdf
.
The manufacturer_web was updated.
- The new value is
https://www.idemia.com
.
The Protection profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Java Card™ System Protection Profile Open Configuration, Version 2.6', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/ANSSI-CC-cible_PP-2010-03en.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['PDCP_V1.3']}}]}
.
The state of the certificate object was updated.
- The st_download_ok property was set to
True
. - The st_convert_ok property was set to
True
. - The st_extract_ok property was set to
True
. - The errors property was set to
[]
. - The st_pdf_hash property was set to
f2253108b3d5baad833abb27ec6ea00f236000f43a23281fe43ae078f32d8a43
. - The st_txt_hash property was set to
d0b34b74aa182a8c12e6ba252de1dce3ea72887b1b753cc410246239f5d3d0d7
.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 2862110, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 150, '/Title': 'Title', '/Author': 'abderrahman.matoussi@idemia.com', '/Creator': 'Microsoft® Word 2016', '/CreationDate': "D:20200228163658+01'00'", '/ModDate': "D:20200228163658+01'00'", '/Producer': 'Microsoft® Word 2016', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_frontpage property was set to
{'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}
. - The st_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-1110-V2-2019': 4}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 1}}, 'cc_security_level': {'EAL': {'EAL5': 9, 'EAL5+': 2, 'EAL4': 1, 'EAL5 augmented': 5, 'EAL4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 6, 'ADV_FSP.1': 3, 'ADV_TDS.1': 2, 'ADV_FSP.5': 8, 'ADV_TDS.4': 8, 'ADV_IMP.1': 9, 'ADV_TDS.3': 4, 'ADV_INT.2': 1, 'ADV_FSP.2': 2, 'ADV_FSP.4': 2}, 'AGD': {'AGD_PRE': 7, 'AGD_OPE': 2, 'AGD_OPE.1': 8, 'AGD_PRE.1': 6}, 'ALC': {'ALC_DVS.2': 13, 'ALC_DVS': 1, 'ALC_TAT.1': 2, 'ALC_TAT.2': 3, 'ALC_CMC.4': 1, 'ALC_CMS.1': 1, 'ALC_DVS.1': 2, 'ALC_LCD.1': 3, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.2': 3, 'ATE_FUN.1': 6, 'ATE_COV.1': 2, 'ATE_DPT.1': 2, 'ATE_DPT.3': 1}, 'AVA': {'AVA_VAN.5': 15, 'AVA_VAN': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 4, 'ASE_INT.1': 5, 'ASE_REQ.1': 2, 'ASE_REQ.2': 2, 'ASE_OBJ.2': 3, 'ASE_SPD.1': 2, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 20, 'FAU_ARP.1.1': 1, 'FAU_STG.2': 9, 'FAU_STG.2.1': 1, 'FAU_STG.2.2': 1, 'FAU_STG.2.3': 1, 'FAU_SAA.1': 3, 'FAU_GEN.1': 2, 'FAU_GEN': 1}, 'FCO': {'FCO_NRO': 16, 'FCO_NRO.2': 8}, 'FCS': {'FCS_RNG': 3, 'FCS_RNG.1': 10, 'FCS_RNG.1.1': 2, 'FCS_RNG.1.2': 2, 'FCS_CKM.1': 20, 'FCS_CKM.1.1': 1, 'FCS_CKM.4': 19, 'FCS_CKM.4.1': 1, 'FCS_COP.1': 16, 'FCS_COP.1.1': 1, 'FCS_COP': 27, 'FCS_CKM': 22}, 'FDP': {'FDP_ACC': 72, 'FDP_ACC.2': 13, 'FDP_ACF': 59, 'FDP_ACF.1': 34, 'FDP_IFC': 28, 'FDP_IFC.1': 21, 'FDP_IFF': 22, 'FDP_IFF.1': 16, 'FDP_RIP': 131, 'FDP_RIP.1': 11, 'FDP_ROL.1': 6, 'FDP_ROL': 16, 'FDP_SDI': 11, 'FDP_SDI.2': 2, 'FDP_ITC': 26, 'FDP_ITC.2': 14, 'FDP_IFC.2': 2, 'FDP_UIT': 17, 'FDP_UIT.1': 4, 'FDP_UCT': 10, 'FDP_UCT.1': 1, 'FDP_ITC.1': 8, 'FDP_ACC.1': 24}, 'FIA': {'FIA_ATD': 10, 'FIA_ATD.1': 2, 'FIA_UID': 31, 'FIA_UID.2': 1, 'FIA_USB': 9, 'FIA_USB.1': 3, 'FIA_UID.1': 16, 'FIA_AFL': 35, 'FIA_AFL.1': 8, 'FIA_UAU': 56, 'FIA_UAU.1': 12, 'FIA_UAU.4': 2, 'FIA_UAU.7': 2}, 'FMT': {'FMT_MSA': 191, 'FMT_MSA.1': 20, 'FMT_MSA.2': 5, 'FMT_MSA.3': 27, 'FMT_SMF.1': 30, 'FMT_SMF.1.1': 1, 'FMT_SMR.1': 56, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MTD': 39, 'FMT_MTD.1': 4, 'FMT_MTD.3': 1, 'FMT_SMR': 61, 'FMT_SMF': 62, 'FMT_SMR.2': 6, 'FMT_MOF': 7, 'FMT_MOF.1': 1, 'FMT_MTD.2': 2}, 'FPR': {'FPR_UNO.1': 13, 'FPR_UNO.1.1': 1, 'FPR_UNO': 16}, 'FPT': {'FPT_FLS.1': 18, 'FPT_FLS.1.1': 2, 'FPT_TDC.1': 11, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 1, 'FPT_FLS': 45, 'FPT_RCV': 26, 'FPT_RCV.3': 7, 'FPT_TST.1': 11, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_TDC': 9, 'FPT_PHP': 7, 'FPT_PHP.3': 1, 'FPT_RCV.4': 1, 'FPT_TST': 1}, 'FRU': {'FRU_FLT': 7, 'FRU_FLT.1': 1}, 'FTP': {'FTP_ITC': 16, 'FTP_ITC.1': 7, 'FTP_TRP.1': 4}}, 'cc_claims': {'D': {'D.APP_CODE': 6, 'D.APP_C_DATA': 3, 'D.APP_I_DATA': 4, 'D.PIN': 7, 'D.API_DATA': 3, 'D.CRYPTO': 5, 'D.JCS_CODE': 3, 'D.JCS_DATA': 5, 'D.SEC_DATA': 7, 'D.CONFIG': 4, 'D.SENSITIVE_DATA': 5, 'D.ARRAY': 3, 'D.JCS_KEYS': 7, 'D.NB_REMAINTRYGLB': 1}, 'O': {'O.SCP': 60, 'O.CARD_MANAGEMENT': 66, 'O.SID': 34, 'O.FIREWALL': 64, 'O.GLOBAL_ARRAYS_CONFID': 14, 'O.GLOBAL_ARRAYS_INTEG': 10, 'O.NATIVE': 14, 'O.OPERATE': 39, 'O.REALLOCATION': 18, 'O.RESOURCES': 23, 'O.ALARM': 23, 'O.CIPHER': 16, 'O.RNG': 11, 'O.KEY-MNGT': 26, 'O.PIN-MNGT': 26, 'O.TRANSACTION': 19, 'O.OBJ-DELETION': 8, 'O.DELETION': 14, 'O.LOAD': 20, 'O.INSTALL': 17, 'O.RESIDENT_APPLICATION': 24, 'O.SECURE_COMPARE': 8, 'O.PATCH_LOADING': 25, 'O.PIN-': 2, 'O.APPLET': 16, 'O.CODE_PKG': 22, 'O.JAVAOBJECT': 55, 'O.OBJ-': 1}, 'T': {'T.CONFID-APPLI-DATA': 18, 'T.CONFID-JCS-CODE': 6, 'T.CONFID-JCS-DATA': 11, 'T.INTEG-APPLI-CODE': 11, 'T.INTEG-APPLI-DATA': 21, 'T.INTEG-JCS-CODE': 6, 'T.INTEG-JCS-DATA': 12, 'T.SID': 18, 'T.EXE-CODE': 8, 'T.NATIVE': 6, 'T.RESOURCES': 8, 'T.DELETION': 6, 'T.INSTALL': 6, 'T.OBJ-DELETION': 4, 'T.PHYSICAL': 4, 'T.CONFIGURATION': 4, 'T.CONF_DATA_APPLET': 4, 'T.PATCH_LOADING': 4, 'T.INTEG-APPLI-': 5, 'T.INTEG-': 2, 'T.EXE-': 1}, 'A': {'A.DELETION': 3, 'A.APPLET': 5, 'A.VERIFICATION': 5}, 'R': {'R.JAVA': 10}, 'OP': {'OP.ARRAY_ACCESS': 9, 'OP.ARRAY_LENGTH': 3, 'OP.ARRAY_AASTORE': 3, 'OP.CREATE': 7, 'OP.DELETE_APPLET': 4, 'OP.DELETE_PCKG': 3, 'OP.DELETE_PCKG_APPLET': 3, 'OP.FLOW': 3, 'OP.IMPORT_KEY': 2, 'OP.INSTANCE_FIELD': 5, 'OP.INVK_INTERFACE': 7, 'OP.INVK_VIRTUAL': 6, 'OP.JAVA': 5, 'OP.THROW': 5, 'OP.TYPE_ACCESS': 5, 'OP.LOCAL_STACK_ACCESS': 3, 'OP.OPERAND_STACK_ACCESS': 3, 'OP.PUT': 6, 'OP.STATIC_FIELD': 3, 'OP.NATIVE_ACCESS': 1, 'OP.NATIVE_INTERFACE_CALL': 1, 'OP.PUTFIELD': 1, 'OP.PUTSTATIC': 1}, 'OE': {'OE.SCP': 9, 'OE.CARD-': 1, 'OE.VERIFICATION': 38, 'OE.CODE-EVIDENCE': 18, 'OE.CARD_MANAGEMENT': 3, 'OE.APPLET': 8, 'OE.CODE-': 3}, 'OSP': {'OSP.VERIFICATION': 6}}, 'vendor': {'Infineon': {'Infineon': 8, 'Infineon Technologies AG': 1}, 'Idemia': {'IDEMIA': 175}}, 'eval_facility': {'CEA-LETI': {'CEA-LETI': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 22}}, 'DES': {'DES': {'DES': 12}, '3DES': {'TDES': 12, 'Triple-DES': 2}}, 'constructions': {'MAC': {'HMAC': 3, 'CMAC': 4}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 3}, 'ECDSA': {'ECDSA': 4}, 'ECC': {'ECC': 4}}, 'FF': {'DH': {'Diffie-Hellman': 4}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 4}, 'SHA2': {'SHA-256': 5, 'SHA-384': 4, 'SHA-224': 4, 'SHA-512': 3, 'SHA256': 1, 'SHA-2': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 4}, 'KA': {'Key Agreement': 2, 'Key agreement': 1}}, 'crypto_protocol': {'PACE': {'PACE': 1}}, 'randomness': {'RNG': {'RNG': 24}}, 'cipher_mode': {'ECB': {'ECB': 5}, 'CBC': {'CBC': 3}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 4, 'DPA': 2, 'SPA': 1, 'timing attack': 1}, 'FI': {'physical tampering': 2, 'malfunction': 2, 'fault injection': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 46-3': 3, 'FIPS PUB 81': 8, 'FIPS PUB 180-3': 2, 'FIPS PUB 197': 6, 'FIPS 198': 1, 'FIPS 140-2': 1}, 'NIST': {'NIST SP 800-90': 1}, 'PKCS': {'PKCS#1': 2}, 'BSI': {'AIS31': 1}, 'ISO': {'ISO/IEC 9796-1': 2, 'ISO/IEC 9797-1': 1, 'ISO/IEC 7816': 2, 'ISO/IEC 14443': 2, 'ISO/IEC 9797': 12}, 'SCP': {'SCP02': 4, 'SCP03': 4}}, 'javacard_version': {'JavaCard': {'Java Card 3.0.5': 7}}, 'javacard_api_const': {'misc': {'TYPE_ACCESS': 5}}, 'javacard_packages': {'javacard': {'javacard.sac.sac': 1, 'javacard.security': 3, 'javacard.framework': 4}, 'javacardx': {'javacardx.crypto': 2, 'javacardx.security': 1, 'javacardx.framework.util': 1}, 'com': {'com.oberthurcs.javacard': 2, 'com.oberthurcs.javacard.sac.sac': 1}}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are': 1}}}
. - The st_filename property was set to
anssi-cible-cc-2020_07en.pdf
.
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/59', 'ANSSI-CC-2020/58']}, '__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/55']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/59', 'ANSSI-CC-2020/58']}, '__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/55']}}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1110-V2-2019']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1110-V2-2019']}}
data. - The report_references property was updated, with the
{'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0891-V2-2016', 'BSI-DSZ-CC-0782-2012', 'BSI-DSZ-CC-0891-2015', 'BSI-DSZ-CC-0945-V3-2018', 'BSI-DSZ-CC-0945-V2-2018', 'BSI-DSZ-CC-0945-2017']}}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]}
values added.
- The new value is
-
23.12.2022 The certificate data changed.
Certificate changed
The cert_link was updated.
- The new value is
None
.
The manufacturer_web was updated.
- The new value is
None
.
The Protection profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'ANSSI-CC-PP-2010-03', 'pp_eal': None, 'pp_link': None, 'pp_ids': None}]}
.
The state of the certificate object was updated.
- The st_download_ok property was set to
False
. - The st_convert_ok property was set to
False
. - The st_extract_ok property was set to
False
. - The errors property was set to
['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/anssi-cible-cc-2020_07en.pdf, code: nok']
. - The st_pdf_hash property was set to
None
. - The st_txt_hash property was set to
None
.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_frontpage property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/55', 'ANSSI-CC-2022/33']}, '__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/57']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/55', 'ANSSI-CC-2022/33']}, '__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/57']}}, 'directly_referencing': None, 'indirectly_referencing': None}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]}
values discarded.
- The new value is
-
23.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The errors property was set to
['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2020_07-fr.pdf, code: nok']
.
- The errors property was set to
-
22.12.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/57']}, '__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/58', 'ANSSI-CC-2022/33']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/57']}, '__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/58', 'ANSSI-CC-2022/33']}}}
data. - The report_references property was updated, with the
{'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-2012', 'BSI-DSZ-CC-0891-2015']}}}
data.
- The st_references property was updated, with the
-
21.12.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/58', 'ANSSI-CC-2022/33']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/58', 'ANSSI-CC-2022/33']}}}
data. - The report_references property was updated, with the
{'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-2012', 'BSI-DSZ-CC-0891-2015']}}}
data.
- The st_references property was updated, with the
-
25.11.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The report_references property was updated, with the
{'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['NSCIB-CC-0286910-CR']}, '__add__': {'_type': 'Set', 'elements': ['NSCIB-CC-0286910-CR2']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['NSCIB-CC-0286910-CR']}, '__add__': {'_type': 'Set', 'elements': ['NSCIB-CC-0286910-CR2']}}}
data.
- The report_references property was updated, with the
-
20.10.2022 The certificate data changed.
Certificate changed
The Maintenance Updates of the certificate were updated.
- The following values were added:
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.common_criteria.CommonCriteriaCert.MaintenanceReport', 'maintenance_date': '2022-03-28', 'maintenance_title': 'Reassessment report : ANSSI-CC-2020/07-S01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2020_07-s01fr1.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/files/epfiles/certificat-cc-2020_07-s01.pdf'}]}
.
- The following values were added:
-
05.10.2022 The certificate data changed.
Certificate changed
The Protection profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Java Card™ System Protection Profile Open Configuration, Version 2.6', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/ANSSI-CC-cible_PP-2010-03en.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['PDCP_V1.3']}}]}
.
The state of the certificate object was updated.
- The following values were inserted:
{'st_convert_garbage': False, 'report_convert_garbage': False}
.
- The new value is
-
04.10.2022 The certificate data changed.
Certificate changed
The Protection profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Java Card™ System Protection Profile Open Configuration, Version 2.6', 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/ANSSI-CC-cible_PP-2010-03en.pdf', 'pp_link': None, 'pp_ids': None}]}
.
- The new value is
-
24.09.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The following values were inserted:
{'report_filename': 'anssi-cc-2020_07-fr.pdf', 'st_filename': 'anssi-cible-cc-2020_07en.pdf'}
. - The report_keywords property was updated, with the
{'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL2': 2}, '__delete__': ['EAL 2', 'EAL 4', 'EAL 6', 'EAL 5+']}}}, 'cc_sar': {'__update__': {'ALC': {'__update__': {'ALC_FLR': 2}, '__delete__': ['ALC_LCD']}, 'AVA': {'__update__': {'AVA_VAN.5': 4}}}}, 'vendor': {'__update__': {'Idemia': {'__update__': {'IDEMIA': 37}}}}, 'eval_facility': {'__insert__': {'CESTI': {'CESTI': 1}}, '__update__': {'CEA-LETI': {'__insert__': {'CEA-LETI': 1}}}}, 'symmetric_crypto': {'__update__': {'DES': {'__update__': {'DES': {'__update__': {'DES': 1}}}}}}, 'tee_name': {}, 'standard_id': {'__update__': {'CC': {'__insert__': {'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}}}}
data. - The st_keywords property was updated, with the
{'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL5': 9}}}}, 'cc_sar': {'__update__': {'ADV': {'__update__': {'ADV_FSP.5': 8, 'ADV_IMP.1': 9}}, 'ALC': {'__insert__': {'ALC_DVS': 1}, '__update__': {'ALC_DVS.2': 13, 'ALC_CMS.5': 1}}, 'ATE': {'__update__': {'ATE_FUN.1': 6, 'ATE_DPT.3': 1, 'ATE_DPT.1': 2}, '__delete__': ['ATE_IND.2']}, 'AVA': {'__insert__': {'AVA_VAN': 1}, '__update__': {'AVA_VAN.5': 15}}, 'ASE': {'__update__': {'ASE_ECD.1': 4, 'ASE_REQ.2': 2, 'ASE_SPD.1': 2}}}, '__delete__': ['ACE']}, 'cc_sfr': {'__insert__': {'FCO': {'FCO_NRO': 16, 'FCO_NRO.2': 8}, 'FRU': {'FRU_FLT': 7, 'FRU_FLT.1': 1}}, '__update__': {'FAU': {'__update__': {'FAU_ARP.1': 20, 'FAU_STG.2': 9}}, 'FCS': {'__insert__': {'FCS_CKM': 22}, '__update__': {'FCS_RNG': 3, 'FCS_CKM.1': 20, 'FCS_COP.1': 16, 'FCS_COP': 27}}, 'FDP': {'__insert__': {'FDP_ACC.2': 13, 'FDP_IFC': 28, 'FDP_IFF': 22, 'FDP_RIP': 131, 'FDP_ROL': 16, 'FDP_SDI': 11, 'FDP_SDI.2': 2, 'FDP_ITC': 26, 'FDP_IFC.2': 2, 'FDP_UIT': 17, 'FDP_UIT.1': 4, 'FDP_UCT': 10, 'FDP_UCT.1': 1}, '__update__': {'FDP_ROL.1': 6, 'FDP_ACC': 72, 'FDP_ACF': 59, 'FDP_RIP.1': 11, 'FDP_IFC.1': 21, 'FDP_ACF.1': 34, 'FDP_IFF.1': 16, 'FDP_ITC.1': 8, 'FDP_ITC.2': 14}}, 'FIA': {'__insert__': {'FIA_ATD': 10, 'FIA_UID': 31, 'FIA_UID.2': 1, 'FIA_USB': 9, 'FIA_USB.1': 3, 'FIA_AFL': 35, 'FIA_AFL.1': 8, 'FIA_UAU': 56, 'FIA_UAU.4': 2, 'FIA_UAU.7': 2}, '__update__': {'FIA_UID.1': 16, 'FIA_ATD.1': 2, 'FIA_UAU.1': 12}}, 'FMT': {'__insert__': {'FMT_MSA.2': 5, 'FMT_MTD': 39, 'FMT_MTD.3': 1, 'FMT_SMR': 61, 'FMT_SMR.2': 6, 'FMT_MOF': 7, 'FMT_MOF.1': 1, 'FMT_MTD.2': 2}, '__update__': {'FMT_SMF.1': 30, 'FMT_SMR.1': 56, 'FMT_MSA': 191, 'FMT_SMF': 62, 'FMT_MSA.3': 27, 'FMT_MSA.1': 20, 'FMT_MTD.1': 4}}, 'FPR': {'__insert__': {'FPR_UNO': 16}, '__update__': {'FPR_UNO.1': 13}}, 'FPT': {'__insert__': {'FPT_FLS': 45, 'FPT_RCV': 26, 'FPT_RCV.3': 7, 'FPT_TDC': 9, 'FPT_PHP': 7, 'FPT_PHP.3': 1, 'FPT_RCV.4': 1, 'FPT_TST': 1}, '__update__': {'FPT_FLS.1': 18, 'FPT_TDC.1': 11, 'FPT_TST.1': 11}}, 'FTP': {'__insert__': {'FTP_ITC': 16}, '__update__': {'FTP_ITC.1': 7}}}}, 'cc_claims': {'__insert__': {'R': {'R.JAVA': 10}}, '__update__': {'D': {'__update__': {'D.ARRAY': 3}}, 'O': {'__insert__': {'O.SCP': 60}, '__update__': {'O.CARD_MANAGEMENT': 66, 'O.OPERATE': 39, 'O.FIREWALL': 64, 'O.GLOBAL_ARRAYS_INTEG': 10, 'O.RESOURCES': 23, 'O.CIPHER': 16, 'O.KEY-MNGT': 26, 'O.TRANSACTION': 19, 'O.DELETION': 14, 'O.PATCH_LOADING': 25, 'O.JAVAOBJECT': 55}, '__delete__': ['O.SCP.RECOVERY', 'O.SCP.SUPPORT', 'O.SCP.IC']}, 'T': {'__insert__': {'T.SID': 18, 'T.EXE-CODE': 8}, '__update__': {'T.INTEG-APPLI-CODE': 11, 'T.INTEG-APPLI-DATA': 21}, '__delete__': ['T.OPERATE', 'T.INTEG-APPLI-CODE.LOAD', 'T.INTEG-APPLI-DATA.LOAD']}, 'A': {'__delete__': ['A.OPERATE', 'A.LOAD']}, 'OE': {'__insert__': {'OE.SCP': 9}, '__update__': {'OE.VERIFICATION': 38, 'OE.APPLET': 8}, '__delete__': ['OE.SCP.RECOVERY', 'OE.SCP.SUPPORT', 'OE.SCP.IC']}}}, 'vendor': {'__update__': {'Idemia': {'__update__': {'IDEMIA': 175}}}}, 'symmetric_crypto': {'__update__': {'AES_competition': {'__update__': {'AES': {'__update__': {'AES': 22}}}}, 'DES': {'__update__': {'DES': {'__update__': {'DES': 12}}}}}}, 'asymmetric_crypto': {'__update__': {'FF': {'__update__': {'DH': {'__delete__': ['DH']}}, '__delete__': ['DSA']}}}, 'hash_function': {'__update__': {'SHA': {'__update__': {'SHA2': {'__update__': {'SHA-512': 3}}}}}}, 'crypto_scheme': {'__update__': {'MAC': {'__update__': {'MAC': 4}}, 'KA': {'__delete__': ['KA']}}}, 'randomness': {'__update__': {'RNG': {'__update__': {'RNG': 24}, '__delete__': ['RBG']}}, '__delete__': ['PRNG']}, 'ecc_curve': {}, 'side_channel_analysis': {'__update__': {'SCA': {'__update__': {'SPA': 1, 'DPA': 2}}}}, 'standard_id': {'__insert__': {'BSI': {'AIS31': 1}}, '__update__': {'FIPS': {'__update__': {'FIPS PUB 81': 8}, '__delete__': ['FIPS PUB 140-2']}, 'PKCS': {'__update__': {'PKCS#1': 2}}}}, 'javacard_api_const': {'__update__': {'misc': {'__update__': {'TYPE_ACCESS': 5}}}}, 'javacard_packages': {'__update__': {'javacard': {'__insert__': {'javacard.framework': 4}, '__update__': {'javacard.security': 3}}, 'javacardx': {'__insert__': {'javacardx.framework.util': 1}, '__update__': {'javacardx.crypto': 2}}, 'com': {'__insert__': {'com.oberthurcs.javacard': 2}}}}, 'certification_process': {'__update__': {'OutOfScope': {'__delete__': ['. That point is out of scope of this Security Target, though']}}}}
data.
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2022/33']}}, 'indirectly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2022/33']}}}
data. - The report_references property was updated, with the
{'directly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2022/33']}}, 'indirectly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2022/33']}}, 'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0891-V2-2016', 'BSI-DSZ-CC-1110-2019', 'BSI-DSZ-CC-0782-2012', 'BSI-DSZ-CC-0891-2015', 'BSI-DSZ-CC-0945-V3-2018', 'BSI-DSZ-CC-0945-V2-2018', 'BSI-DSZ-CC-0945-2017']}}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}]}
values discarded.
- The following values were inserted:
-
02.09.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
True
. - The errors property was set to
[]
. - The st_pdf_hash property was set to
f2253108b3d5baad833abb27ec6ea00f236000f43a23281fe43ae078f32d8a43
. - The st_txt_hash property was set to
d0b34b74aa182a8c12e6ba252de1dce3ea72887b1b753cc410246239f5d3d0d7
.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 2862110, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 150, '/Title': 'Title', '/Author': 'abderrahman.matoussi@idemia.com', '/Creator': 'Microsoft® Word 2016', '/CreationDate': "D:20200228163658+01'00'", '/ModDate': "D:20200228163658+01'00'", '/Producer': 'Microsoft® Word 2016', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_frontpage property was set to
{'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}
. - The st_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-1110-V2-2019': 4}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 1}}, 'cc_security_level': {'EAL': {'EAL5': 8, 'EAL5+': 2, 'EAL4': 1, 'EAL5 augmented': 5, 'EAL4 augmented': 1}}, 'cc_sar': {'ACE': {'ACE_CALL': 1}, 'ADV': {'ADV_ARC.1': 6, 'ADV_FSP.1': 3, 'ADV_TDS.1': 2, 'ADV_FSP.5': 9, 'ADV_TDS.4': 8, 'ADV_IMP.1': 10, 'ADV_TDS.3': 4, 'ADV_INT.2': 1, 'ADV_FSP.2': 2, 'ADV_FSP.4': 2}, 'AGD': {'AGD_PRE': 7, 'AGD_OPE': 2, 'AGD_OPE.1': 8, 'AGD_PRE.1': 6}, 'ALC': {'ALC_DVS.2': 11, 'ALC_TAT.1': 2, 'ALC_TAT.2': 3, 'ALC_CMC.4': 1, 'ALC_CMS.1': 1, 'ALC_DVS.1': 2, 'ALC_LCD.1': 3, 'ALC_CMS.5': 2, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.2': 3, 'ATE_FUN.1': 7, 'ATE_DPT.3': 2, 'ATE_COV.1': 2, 'ATE_IND.2': 1, 'ATE_DPT.1': 1}, 'AVA': {'AVA_VAN.5': 13}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 5, 'ASE_INT.1': 5, 'ASE_REQ.1': 2, 'ASE_REQ.2': 3, 'ASE_OBJ.2': 3, 'ASE_SPD.1': 3, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 19, 'FAU_ARP.1.1': 1, 'FAU_STG.2': 8, 'FAU_STG.2.1': 1, 'FAU_STG.2.2': 1, 'FAU_STG.2.3': 1, 'FAU_SAA.1': 3, 'FAU_GEN.1': 2, 'FAU_GEN': 1}, 'FCS': {'FCS_RNG': 2, 'FCS_RNG.1': 10, 'FCS_RNG.1.1': 2, 'FCS_RNG.1.2': 2, 'FCS_CKM.1': 19, 'FCS_CKM.1.1': 1, 'FCS_CKM.4': 19, 'FCS_CKM.4.1': 1, 'FCS_COP.1': 14, 'FCS_COP.1.1': 1, 'FCS_COP': 1}, 'FDP': {'FDP_ROL.1': 3, 'FDP_ACC': 1, 'FDP_ACF': 1, 'FDP_RIP.1': 1, 'FDP_ACC.1': 24, 'FDP_IFC.1': 20, 'FDP_ACF.1': 6, 'FDP_IFF.1': 2, 'FDP_ITC.1': 5, 'FDP_ITC.2': 5}, 'FIA': {'FIA_UID.1': 12, 'FIA_ATD.1': 1, 'FIA_UAU.1': 8}, 'FMT': {'FMT_SMF.1': 25, 'FMT_SMF.1.1': 1, 'FMT_SMR.1': 50, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MSA': 1, 'FMT_SMF': 1, 'FMT_MSA.3': 9, 'FMT_MSA.1': 12, 'FMT_MTD.1': 2}, 'FPR': {'FPR_UNO.1': 11, 'FPR_UNO.1.1': 1}, 'FPT': {'FPT_FLS.1': 15, 'FPT_FLS.1.1': 2, 'FPT_TDC.1': 9, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 1, 'FPT_TST.1': 9, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1}, 'FTP': {'FTP_ITC.1': 4, 'FTP_TRP.1': 4}}, 'cc_claims': {'D': {'D.APP_CODE': 6, 'D.APP_C_DATA': 3, 'D.APP_I_DATA': 4, 'D.PIN': 7, 'D.API_DATA': 3, 'D.CRYPTO': 5, 'D.JCS_CODE': 3, 'D.JCS_DATA': 5, 'D.SEC_DATA': 7, 'D.CONFIG': 4, 'D.SENSITIVE_DATA': 5, 'D.ARRAY': 2, 'D.JCS_KEYS': 7, 'D.NB_REMAINTRYGLB': 1}, 'O': {'O.SCP.RECOVERY': 23, 'O.SCP.SUPPORT': 28, 'O.SCP.IC': 10, 'O.CARD_MANAGEMENT': 67, 'O.OPERATE': 41, 'O.SID': 34, 'O.FIREWALL': 65, 'O.GLOBAL_ARRAYS_CONFID': 14, 'O.GLOBAL_ARRAYS_INTEG': 11, 'O.NATIVE': 14, 'O.REALLOCATION': 18, 'O.RESOURCES': 24, 'O.ALARM': 23, 'O.CIPHER': 17, 'O.RNG': 11, 'O.KEY-MNGT': 27, 'O.PIN-MNGT': 26, 'O.TRANSACTION': 20, 'O.OBJ-DELETION': 8, 'O.DELETION': 15, 'O.LOAD': 20, 'O.INSTALL': 17, 'O.RESIDENT_APPLICATION': 24, 'O.SECURE_COMPARE': 8, 'O.PATCH_LOADING': 26, 'O.PIN-': 2, 'O.APPLET': 16, 'O.CODE_PKG': 22, 'O.JAVAOBJECT': 53, 'O.OBJ-': 1}, 'T': {'T.OPERATE': 1, 'T.CONFID-APPLI-DATA': 18, 'T.CONFID-JCS-CODE': 6, 'T.CONFID-JCS-DATA': 11, 'T.INTEG-APPLI-CODE': 7, 'T.INTEG-APPLI-CODE.LOAD': 4, 'T.INTEG-APPLI-DATA': 18, 'T.INTEG-APPLI-DATA.LOAD': 3, 'T.INTEG-JCS-CODE': 6, 'T.INTEG-JCS-DATA': 12, 'T.NATIVE': 6, 'T.RESOURCES': 8, 'T.DELETION': 6, 'T.INSTALL': 6, 'T.OBJ-DELETION': 4, 'T.PHYSICAL': 4, 'T.CONFIGURATION': 4, 'T.CONF_DATA_APPLET': 4, 'T.PATCH_LOADING': 4, 'T.INTEG-APPLI-': 5, 'T.INTEG-': 2, 'T.EXE-': 1}, 'A': {'A.DELETION': 3, 'A.OPERATE': 1, 'A.LOAD': 6, 'A.APPLET': 5, 'A.VERIFICATION': 5}, 'OP': {'OP.ARRAY_ACCESS': 9, 'OP.ARRAY_LENGTH': 3, 'OP.ARRAY_AASTORE': 3, 'OP.CREATE': 7, 'OP.DELETE_APPLET': 4, 'OP.DELETE_PCKG': 3, 'OP.DELETE_PCKG_APPLET': 3, 'OP.FLOW': 3, 'OP.IMPORT_KEY': 2, 'OP.INSTANCE_FIELD': 5, 'OP.INVK_INTERFACE': 7, 'OP.INVK_VIRTUAL': 6, 'OP.JAVA': 5, 'OP.THROW': 5, 'OP.TYPE_ACCESS': 5, 'OP.LOCAL_STACK_ACCESS': 3, 'OP.OPERAND_STACK_ACCESS': 3, 'OP.PUT': 6, 'OP.STATIC_FIELD': 3, 'OP.NATIVE_ACCESS': 1, 'OP.NATIVE_INTERFACE_CALL': 1, 'OP.PUTFIELD': 1, 'OP.PUTSTATIC': 1}, 'OE': {'OE.SCP.RECOVERY': 3, 'OE.SCP.SUPPORT': 3, 'OE.SCP.IC': 3, 'OE.CARD-': 1, 'OE.VERIFICATION': 39, 'OE.CODE-EVIDENCE': 18, 'OE.CARD_MANAGEMENT': 3, 'OE.APPLET': 9, 'OE.CODE-': 3}, 'OSP': {'OSP.VERIFICATION': 6}}, 'vendor': {'Infineon': {'Infineon': 8, 'Infineon Technologies AG': 1}, 'Idemia': {'IDEMIA': 174}}, 'eval_facility': {'CEA-LETI': {'CEA-LETI': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 20}}, 'DES': {'DES': {'DES': 26}, '3DES': {'TDES': 12, 'Triple-DES': 2}}, 'constructions': {'MAC': {'HMAC': 3, 'CMAC': 4}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 3}, 'ECDSA': {'ECDSA': 4}, 'ECC': {'ECC': 4}}, 'FF': {'DH': {'DH': 3, 'Diffie-Hellman': 4}, 'DSA': {'DSA': 5}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 4}, 'SHA2': {'SHA-256': 5, 'SHA-384': 4, 'SHA-224': 4, 'SHA-512': 2, 'SHA256': 1, 'SHA-2': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 12}, 'KA': {'Key Agreement': 2, 'KA': 21, 'Key agreement': 1}}, 'crypto_protocol': {'PACE': {'PACE': 1}}, 'randomness': {'PRNG': {'DRBG': 2}, 'RNG': {'RNG': 25, 'RBG': 2}}, 'cipher_mode': {'ECB': {'ECB': 5}, 'CBC': {'CBC': 3}}, 'ecc_curve': {'NIST': {'P-800': 1}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 4, 'SPA': 22, 'DPA': 1, 'timing attack': 1}, 'FI': {'physical tampering': 2, 'malfunction': 2, 'fault injection': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 46-3': 3, 'FIPS PUB 81': 7, 'FIPS PUB 180-3': 2, 'FIPS PUB 140-2': 1, 'FIPS PUB 197': 6, 'FIPS 198': 1, 'FIPS 140-2': 1}, 'NIST': {'NIST SP 800-90': 1}, 'PKCS': {'PKCS#1': 1}, 'ISO': {'ISO/IEC 9796-1': 2, 'ISO/IEC 9797-1': 1, 'ISO/IEC 7816': 2, 'ISO/IEC 14443': 2, 'ISO/IEC 9797': 12}, 'SCP': {'SCP02': 4, 'SCP03': 4}}, 'javacard_version': {'JavaCard': {'Java Card 3.0.5': 7}}, 'javacard_api_const': {'misc': {'TYPE_ACCESS': 4}}, 'javacard_packages': {'javacard': {'javacard.sac.sac': 1, 'javacard.security': 2}, 'javacardx': {'javacardx.security': 1, 'javacardx.crypto': 1}, 'com': {'com.oberthurcs.javacard.sac.sac': 1}}, 'certification_process': {'OutOfScope': {'out of scope': 1, '. That point is out of scope of this Security Target, though': 1, 'a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are': 1}}}
.
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1110-V2-2019']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1110-V2-2019']}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}]}
values added.
- The st_download_ok property was set to
-
01.09.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
False
. - The errors property was set to
['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2020_07-fr.pdf, code: 408']
. - The st_pdf_hash property was set to
None
. - The st_txt_hash property was set to
None
.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_frontpage property was set to
None
. - The st_keywords property was set to
None
.
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}]}
values discarded.
- The st_download_ok property was set to
-
18.07.2022 The certificate data changed.
Certificate changed
The _type was updated.
- The new value is
sec_certs.sample.common_criteria.CommonCriteriaCert
.
The Protection profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Java Card™ System Protection Profile Open Configuration, Version 2.6', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/ANSSI-CC-cible_PP-2010-03en.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['PDCP_V1.3']}}]}
.
The Maintenance Updates of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.common_criteria.CommonCriteriaCert.MaintenanceReport', 'maintenance_date': '2020-07-23', 'maintenance_title': 'ANSSI-CC-2020/07-M01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2020_07-m01.pdf', 'maintenance_st_link': None}, {'_type': 'sec_certs.sample.common_criteria.CommonCriteriaCert.MaintenanceReport', 'maintenance_date': '2022-05-16', 'maintenance_title': 'Maintenance report : ANSSI-CC-2020/07-M02', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2020_07-m02.pdf', 'maintenance_st_link': None}, {'_type': 'sec_certs.sample.common_criteria.CommonCriteriaCert.MaintenanceReport', 'maintenance_date': '2022-03-28', 'maintenance_title': 'Reassessment report: ANSSI-CC-2020/07-S01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2020_07-s01fr.pdf', 'maintenance_st_link': None}]}
.
The state of the certificate object was updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState
.
The PDF extraction data was updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData
.
The computed heuristics were updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics
. - The st_references property was updated, with the
{'_type': 'sec_certs.sample.certificate.References'}
data. - The report_references property was updated, with the
{'_type': 'sec_certs.sample.certificate.References'}
data. - The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]}
.
- The new value is
-
17.07.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_metadata property was updated, with the
{'pdf_hyperlinks': {'_type': 'Set', 'elements': ['mailto:certification@ssi.gouv.fr', 'http://www.ssi.gouv.fr/']}}
values inserted. - The st_metadata property was updated, with the
{'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
values inserted. - The report_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-1110-V2-2019': 4}, 'FR': {'ANSSI-CC-2020/07': 38}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0099-2017': 1, 'BSI-PP-0084-2014': 1}, 'ANSSI': {'ANSSI-CC-PP-0099-2017': 1}}, 'cc_security_level': {'EAL': {'EAL 5': 3, 'EAL6': 1, 'EAL7': 1, 'EAL2': 1, 'EAL 1': 1, 'EAL 2': 1, 'EAL 3': 1, 'EAL 4': 1, 'EAL 6': 1, 'EAL 7': 1, 'EAL 5+': 1}, 'ITSEC': {'ITSEC E6 Elevé': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE': 4, 'AGD_PRE': 5, 'AGD_ALP': 3}, 'ALC': {'ALC_DVS.2': 2, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_FLR': 1, 'ALC_LCD': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.5': 3, 'AVA_VAN': 2}, 'ASE': {'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Infineon': {'Infineon Technologies AG': 1, 'Infineon': 2}, 'Idemia': {'IDEMIA': 31}}, 'eval_facility': {'Serma': {'SERMA': 11}, 'CEA-LETI': {'CEA - LETI': 1}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 3}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 3}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-1110-V2-2019': 4}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 1}}, 'cc_security_level': {'EAL': {'EAL5': 8, 'EAL5+': 2, 'EAL4': 1, 'EAL5 augmented': 5, 'EAL4 augmented': 1}}, 'cc_sar': {'ACE': {'ACE_CALL': 1}, 'ADV': {'ADV_ARC.1': 6, 'ADV_FSP.1': 3, 'ADV_TDS.1': 2, 'ADV_FSP.5': 9, 'ADV_TDS.4': 8, 'ADV_IMP.1': 10, 'ADV_TDS.3': 4, 'ADV_INT.2': 1, 'ADV_FSP.2': 2, 'ADV_FSP.4': 2}, 'AGD': {'AGD_PRE': 7, 'AGD_OPE': 2, 'AGD_OPE.1': 8, 'AGD_PRE.1': 6}, 'ALC': {'ALC_DVS.2': 11, 'ALC_TAT.1': 2, 'ALC_TAT.2': 3, 'ALC_CMC.4': 1, 'ALC_CMS.1': 1, 'ALC_DVS.1': 2, 'ALC_LCD.1': 3, 'ALC_CMS.5': 2, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.2': 3, 'ATE_FUN.1': 7, 'ATE_DPT.3': 2, 'ATE_COV.1': 2, 'ATE_IND.2': 1, 'ATE_DPT.1': 1}, 'AVA': {'AVA_VAN.5': 13}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 5, 'ASE_INT.1': 5, 'ASE_REQ.1': 2, 'ASE_REQ.2': 3, 'ASE_OBJ.2': 3, 'ASE_SPD.1': 3, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 19, 'FAU_ARP.1.1': 1, 'FAU_STG.2': 8, 'FAU_STG.2.1': 1, 'FAU_STG.2.2': 1, 'FAU_STG.2.3': 1, 'FAU_SAA.1': 3, 'FAU_GEN.1': 2, 'FAU_GEN': 1}, 'FCS': {'FCS_RNG': 2, 'FCS_RNG.1': 10, 'FCS_RNG.1.1': 2, 'FCS_RNG.1.2': 2, 'FCS_CKM.1': 19, 'FCS_CKM.1.1': 1, 'FCS_CKM.4': 19, 'FCS_CKM.4.1': 1, 'FCS_COP.1': 14, 'FCS_COP.1.1': 1, 'FCS_COP': 1}, 'FDP': {'FDP_ROL.1': 3, 'FDP_ACC': 1, 'FDP_ACF': 1, 'FDP_RIP.1': 1, 'FDP_ACC.1': 24, 'FDP_IFC.1': 20, 'FDP_ACF.1': 6, 'FDP_IFF.1': 2, 'FDP_ITC.1': 5, 'FDP_ITC.2': 5}, 'FIA': {'FIA_UID.1': 12, 'FIA_ATD.1': 1, 'FIA_UAU.1': 8}, 'FMT': {'FMT_SMF.1': 25, 'FMT_SMF.1.1': 1, 'FMT_SMR.1': 50, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MSA': 1, 'FMT_SMF': 1, 'FMT_MSA.3': 9, 'FMT_MSA.1': 12, 'FMT_MTD.1': 2}, 'FPR': {'FPR_UNO.1': 11, 'FPR_UNO.1.1': 1}, 'FPT': {'FPT_FLS.1': 15, 'FPT_FLS.1.1': 2, 'FPT_TDC.1': 9, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 1, 'FPT_TST.1': 9, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1}, 'FTP': {'FTP_ITC.1': 4, 'FTP_TRP.1': 4}}, 'cc_claims': {'D': {'D.APP_CODE': 6, 'D.APP_C_DATA': 3, 'D.APP_I_DATA': 4, 'D.PIN': 7, 'D.API_DATA': 3, 'D.CRYPTO': 5, 'D.JCS_CODE': 3, 'D.JCS_DATA': 5, 'D.SEC_DATA': 7, 'D.CONFIG': 4, 'D.SENSITIVE_DATA': 5, 'D.ARRAY': 2, 'D.JCS_KEYS': 7, 'D.NB_REMAINTRYGLB': 1}, 'O': {'O.SCP.RECOVERY': 23, 'O.SCP.SUPPORT': 28, 'O.SCP.IC': 10, 'O.CARD_MANAGEMENT': 67, 'O.OPERATE': 41, 'O.SID': 34, 'O.FIREWALL': 65, 'O.GLOBAL_ARRAYS_CONFID': 14, 'O.GLOBAL_ARRAYS_INTEG': 11, 'O.NATIVE': 14, 'O.REALLOCATION': 18, 'O.RESOURCES': 24, 'O.ALARM': 23, 'O.CIPHER': 17, 'O.RNG': 11, 'O.KEY-MNGT': 27, 'O.PIN-MNGT': 26, 'O.TRANSACTION': 20, 'O.OBJ-DELETION': 8, 'O.DELETION': 15, 'O.LOAD': 20, 'O.INSTALL': 17, 'O.RESIDENT_APPLICATION': 24, 'O.SECURE_COMPARE': 8, 'O.PATCH_LOADING': 26, 'O.PIN-': 2, 'O.APPLET': 16, 'O.CODE_PKG': 22, 'O.JAVAOBJECT': 53, 'O.OBJ-': 1}, 'T': {'T.OPERATE': 1, 'T.CONFID-APPLI-DATA': 18, 'T.CONFID-JCS-CODE': 6, 'T.CONFID-JCS-DATA': 11, 'T.INTEG-APPLI-CODE': 7, 'T.INTEG-APPLI-CODE.LOAD': 4, 'T.INTEG-APPLI-DATA': 18, 'T.INTEG-APPLI-DATA.LOAD': 3, 'T.INTEG-JCS-CODE': 6, 'T.INTEG-JCS-DATA': 12, 'T.NATIVE': 6, 'T.RESOURCES': 8, 'T.DELETION': 6, 'T.INSTALL': 6, 'T.OBJ-DELETION': 4, 'T.PHYSICAL': 4, 'T.CONFIGURATION': 4, 'T.CONF_DATA_APPLET': 4, 'T.PATCH_LOADING': 4, 'T.INTEG-APPLI-': 5, 'T.INTEG-': 2, 'T.EXE-': 1}, 'A': {'A.DELETION': 3, 'A.OPERATE': 1, 'A.LOAD': 6, 'A.APPLET': 5, 'A.VERIFICATION': 5}, 'OP': {'OP.ARRAY_ACCESS': 9, 'OP.ARRAY_LENGTH': 3, 'OP.ARRAY_AASTORE': 3, 'OP.CREATE': 7, 'OP.DELETE_APPLET': 4, 'OP.DELETE_PCKG': 3, 'OP.DELETE_PCKG_APPLET': 3, 'OP.FLOW': 3, 'OP.IMPORT_KEY': 2, 'OP.INSTANCE_FIELD': 5, 'OP.INVK_INTERFACE': 7, 'OP.INVK_VIRTUAL': 6, 'OP.JAVA': 5, 'OP.THROW': 5, 'OP.TYPE_ACCESS': 5, 'OP.LOCAL_STACK_ACCESS': 3, 'OP.OPERAND_STACK_ACCESS': 3, 'OP.PUT': 6, 'OP.STATIC_FIELD': 3, 'OP.NATIVE_ACCESS': 1, 'OP.NATIVE_INTERFACE_CALL': 1, 'OP.PUTFIELD': 1, 'OP.PUTSTATIC': 1}, 'OE': {'OE.SCP.RECOVERY': 3, 'OE.SCP.SUPPORT': 3, 'OE.SCP.IC': 3, 'OE.CARD-': 1, 'OE.VERIFICATION': 39, 'OE.CODE-EVIDENCE': 18, 'OE.CARD_MANAGEMENT': 3, 'OE.APPLET': 9, 'OE.CODE-': 3}, 'OSP': {'OSP.VERIFICATION': 6}}, 'vendor': {'Infineon': {'Infineon': 8, 'Infineon Technologies AG': 1}, 'Idemia': {'IDEMIA': 174}}, 'eval_facility': {'CEA-LETI': {'CEA-LETI': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 20}}, 'DES': {'DES': {'DES': 26}, '3DES': {'TDES': 12, 'Triple-DES': 2}}, 'constructions': {'MAC': {'HMAC': 3, 'CMAC': 4}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 3}, 'ECDSA': {'ECDSA': 4}, 'ECC': {'ECC': 4}}, 'FF': {'DH': {'DH': 3, 'Diffie-Hellman': 4}, 'DSA': {'DSA': 5}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 4}, 'SHA2': {'SHA-256': 5, 'SHA-384': 4, 'SHA-224': 4, 'SHA-512': 2, 'SHA256': 1, 'SHA-2': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 12}, 'KA': {'Key Agreement': 2, 'KA': 21, 'Key agreement': 1}}, 'crypto_protocol': {'PACE': {'PACE': 1}}, 'randomness': {'PRNG': {'DRBG': 2}, 'RNG': {'RNG': 25, 'RBG': 2}}, 'cipher_mode': {'ECB': {'ECB': 5}, 'CBC': {'CBC': 3}}, 'ecc_curve': {'NIST': {'P-800': 1}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 4, 'SPA': 22, 'DPA': 1, 'timing attack': 1}, 'FI': {'physical tampering': 2, 'malfunction': 2, 'fault injection': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 46-3': 3, 'FIPS PUB 81': 7, 'FIPS PUB 180-3': 2, 'FIPS PUB 140-2': 1, 'FIPS PUB 197': 6, 'FIPS 198': 1, 'FIPS 140-2': 1}, 'NIST': {'NIST SP 800-90': 1}, 'PKCS': {'PKCS#1': 1}, 'ISO': {'ISO/IEC 9796-1': 2, 'ISO/IEC 9797-1': 1, 'ISO/IEC 7816': 2, 'ISO/IEC 14443': 2, 'ISO/IEC 9797': 12}, 'SCP': {'SCP02': 4, 'SCP03': 4}}, 'javacard_version': {'JavaCard': {'Java Card 3.0.5': 7}}, 'javacard_api_const': {'misc': {'TYPE_ACCESS': 4}}, 'javacard_packages': {'javacard': {'javacard.sac.sac': 1, 'javacard.security': 2}, 'javacardx': {'javacardx.security': 1, 'javacardx.crypto': 1}, 'com': {'com.oberthurcs.javacard.sac.sac': 1}}, 'certification_process': {'OutOfScope': {'out of scope': 1, '. That point is out of scope of this Security Target, though': 1, 'a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are': 1}}}
.
The computed heuristics were updated.
- The _type property was set to
Heuristics
.
- The report_metadata property was updated, with the
-
07.07.2022 The certificate data changed.
Certificate changed
The Maintenance Updates of the certificate were updated.
- The following values were added:
{'_type': 'Set', 'elements': [{'_type': 'MaintenanceReport', 'maintenance_date': '2022-05-16', 'maintenance_title': 'Maintenance report : ANSSI-CC-2020/07-M02', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2020_07-m02.pdf', 'maintenance_st_link': None}]}
.
- The following values were added:
-
14.06.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The following values were inserted:
{'report_pdf_hash': '3996e239c72d181094b76bd38b58cf629382f9603eea456b4382b56461d6e63f', 'st_pdf_hash': 'f2253108b3d5baad833abb27ec6ea00f236000f43a23281fe43ae078f32d8a43', 'report_txt_hash': '15a1e2ed5352aa2d710ffe8a000b76f1733640fb99253f023c444a900d80693e', 'st_txt_hash': 'd0b34b74aa182a8c12e6ba252de1dce3ea72887b1b753cc410246239f5d3d0d7'}
.
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'rules_symmetric_crypto': {'DES': 3}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {}, 'rules_randomness': {}, 'rules_tee': {'SE': 3}, 'rules_side_channels': {}}
values inserted. - The st_keywords property was updated, with the
{'rules_ecc_curves': {'P-800': 1}}
data.
- The following values were inserted:
-
17.05.2022 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Plateforme ID-One Cosmo V9.1 masquée sur le composant IFX SLC32 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/files/epfiles/certificat-cc-2020_07-s01.pdf",
"dgst": "8820852f4a1163b3",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2020/07",
"cert_lab": [
"CEA"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"9.1"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2020/59",
"ANSSI-CC-2022/33",
"NSCIB-CC-22-0286910-CR",
"NSCIB-CC-0286907-CR",
"ANSSI-CC-2020/58",
"ANSSI-CC-2020/56",
"ANSSI-CC-2020/55",
"ANSSI-CC-2020/57"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1110-V2-2019"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2020/59",
"NSCIB-CC-22-0286910-CR",
"ANSSI-CC-2022/33",
"NSCIB-CC-0286907-CR",
"ANSSI-CC-2020/58",
"ANSSI-CC-2020/56",
"ANSSI-CC-2020/55",
"ANSSI-CC-2020/57"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0945-2017",
"BSI-DSZ-CC-1110-2019",
"BSI-DSZ-CC-1110-V2-2019",
"BSI-DSZ-CC-0945-V3-2018",
"BSI-DSZ-CC-0945-V2-2018",
"BSI-DSZ-CC-0891-2015",
"BSI-DSZ-CC-0891-V2-2016",
"BSI-DSZ-CC-0782-2012"
]
}
},
"scheme_data": {
"cert_id": "2020/07",
"description": "Le produit \u00e9valu\u00e9 est la \u00ab Plateforme ID-One Cosmo V9.1 masqu\u00e9e sur le composant IFX SLC32, Identification du mat\u00e9riel 092914 \u00bb. Elle est d\u00e9velopp\u00e9e par IDEMIA et embarqu\u00e9e sur le microcontr\u00f4leur d\u00e9velopp\u00e9 et fabriqu\u00e9 par INFINEON TECHNOLOGIES AG.\n\nCe produit est une plateforme ouverte Java Card conforme \u00e0 la sp\u00e9cification \u00e9mise par Global Platform, contact et/ou sans contact, destin\u00e9e \u00e0 accueil",
"developer": "IDEMIA, INFINEON TECHNOLOGIES AG",
"enhanced": {
"augmented": "ALC_DVS.2, AVA_VAN.5",
"category": "Cartes \u00e0 puce",
"cc_version": "Crit\u00e8res Communs version 3.1r5",
"cert_id": "2020/07",
"cert_link": "https://cyber.gouv.fr/sites/default/files/2020/04/certificat-cc-2020_07-s01.pdf",
"certification_date": "31/03/2020",
"developer": "IDEMIA, INFINEON TECHNOLOGIES AG",
"evaluation_facility": "CEA - LETI",
"expiration_date": "28/03/2027",
"level": "EAL5+",
"mutual_recognition": "SOG-IS\n CCRA",
"protection_profile": "Java Card Protection Profile Open Configuration, version 3.0.5 (BSI-CC-PP-0099-2017)",
"report_link": "https://cyber.gouv.fr/sites/default/files/2020/04/anssi-cc-2020_07-fr.pdf",
"sponsor": "IDEMIA, INFINEON TECHNOLOGIES AG",
"target_link": "https://cyber.gouv.fr/sites/default/files/2020/04/anssi-cible-cc-2020_07-m02en.pdf"
},
"expiration_date": "28 Mars 2027",
"level": "EAL5+",
"product": "Plateforme ID-One Cosmo V9.1 masqu\u00e9e sur le composant IFX SLC32",
"sponsor": "IDEMIA, INFINEON TECHNOLOGIES AG",
"url": "https://cyber.gouv.fr/produits-certifies/plateforme-id-one-cosmo-v91-masquee-sur-le-composant-ifx-slc32"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2020/59",
"ANSSI-CC-2022/33",
"ANSSI-CC-2020/58",
"ANSSI-CC-2020/56",
"ANSSI-CC-2020/55",
"ANSSI-CC-2020/57"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1110-V2-2019"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2020/59",
"ANSSI-CC-2022/33",
"ANSSI-CC-2020/58",
"ANSSI-CC-2020/56",
"ANSSI-CC-2020/55",
"ANSSI-CC-2020/57"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1110-V2-2019"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2022-03-28",
"maintenance_report_link": "https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2020_07-s01fr1.pdf",
"maintenance_st_link": "https://www.commoncriteriaportal.org/files/epfiles/certificat-cc-2020_07-s01.pdf",
"maintenance_title": "Reassessment report : ANSSI-CC-2020/07-S01"
},
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2020-07-23",
"maintenance_report_link": "https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2020_07-m01.pdf",
"maintenance_st_link": null,
"maintenance_title": "ANSSI-CC-2020/07-M01"
},
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2022-05-16",
"maintenance_report_link": "https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2020_07-m02.pdf",
"maintenance_st_link": null,
"maintenance_title": "Maintenance report : ANSSI-CC-2020/07-M02"
},
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2022-03-28",
"maintenance_report_link": "https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2020_07-s01fr.pdf",
"maintenance_st_link": null,
"maintenance_title": "Reassessment report: ANSSI-CC-2020/07-S01"
}
]
},
"manufacturer": "Idemia",
"manufacturer_web": "https://www.idemia.com",
"name": "Plateforme ID-One Cosmo V9.1 masqu\u00e9e sur le composant IFX SLC32",
"not_valid_after": "2027-03-28",
"not_valid_before": "2020-03-31",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "certificat-cc-2020_07-s01.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2020/07-S01": 2
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_DVS.2": 1
},
"AVA": {
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 1,
"EAL5": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"CEA-LETI": {
"CEA-LETI": 2
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Idemia": {
"IDEMIA": 2
}
},
"vulnerability": {}
},
"cert_metadata": {
"/Author": "G\u00e9raldine Avou\u00e9",
"/Category": "-S01",
"/Comments": "ANSSI-CC-CER-F-14_v14.6",
"/Company": "SGDSN",
"/CreationDate": "D:20220404173043+02\u002700\u0027",
"/Creator": "Acrobat PDFMaker 11 pour Word",
"/ModDate": "D:20220404173044+02\u002700\u0027",
"/Producer": "Adobe PDF Library 11.0",
"/SourceModified": "D:20220404153033",
"/Title": "ANSSI-CC-2020/07",
"pdf_file_size_bytes": 100060,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 2
},
"report_filename": "anssi-cc-2020_07-fr.pdf",
"report_frontpage": {
"FR": {
"cc_security_level": "EAL 5 augment\u00e9 ALC_DVS.2, AVA_VAN.5",
"cc_version": "Crit\u00e8res Communs version 3.1 r\u00e9vision 5",
"cert_id": "ANSSI-CC-2020/07",
"cert_item": "Plateforme ID-One Cosmo V9.1 masqu\u00e9e sur le composant IFX SLC32",
"cert_item_version": "Identification du mat\u00e9riel : 092914",
"cert_lab": "CEA - LETI 17 avenue des martyrs, 38054 Grenoble Cedex 9, France",
"developer": "IDEMIA 2 place Samuel de Champlain 92400 Courbevoie, France Infineon Technologies AG AIM CC SM PS \u2013 Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire IDEMIA 2 place Samuel de Champlain 92400 Courbevoie, France",
"match_rules": [
"R\u00e9f\u00e9rence du rapport de certification(.+)Nom du produit(.+)R\u00e9f\u00e9rence/version du produit(.*)Conformit\u00e9 \u00e0 un profil de protection(.+)Crit\u00e8res d\u2019\u00e9valuation et version(.+)Niveau d\u2019\u00e9valuation(.+)D\u00e9veloppeurs(.+)Centre d\u2019\u00e9valuation(.+)Accords de reconnaissance applicables"
],
"ref_protection_profiles": "Java Card Protection Profile Open Configuration, version 3.0.5 certifi\u00e9 BSI-CC-PP-0099-2017 le 21 d\u00e9cembre 2017"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1110-V2-2019": 2
},
"FR": {
"ANSSI-CC-2020/07": 19
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"ANSSI": {
"ANSSI-CC-PP-0099-2017": 1
},
"BSI": {
"BSI-CC-PP-0099-2017": 1,
"BSI-PP-0084-2014": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_FSP": 1,
"ADV_IMP": 1,
"ADV_INT": 1,
"ADV_SPM": 1,
"ADV_TDS": 1
},
"AGD": {
"AGD_ALP": 3,
"AGD_OPE": 4,
"AGD_PRE": 5
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMS": 1,
"ALC_DEL": 1,
"ALC_DVS": 1,
"ALC_DVS.2": 2,
"ALC_FLR": 2,
"ALC_TAT": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_ECD": 1,
"ASE_INT": 1,
"ASE_OBJ": 1,
"ASE_REQ": 1,
"ASE_SPD": 1,
"ASE_TSS": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_DPT": 1,
"ATE_FUN": 1,
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.5": 4
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 3": 1,
"EAL 5": 3,
"EAL 7": 1,
"EAL2": 2,
"EAL6": 1,
"EAL7": 1
},
"ITSEC": {
"ITSEC E6 Elev\u00e9": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"CEA-LETI": {
"CEA - LETI": 1,
"CEA-LETI": 1
},
"CESTI": {
"CESTI": 1
},
"Serma": {
"SERMA": 11
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1,
"CCMB-2017-04-004": 1
}
},
"symmetric_crypto": {
"DES": {
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Idemia": {
"IDEMIA": 37
},
"Infineon": {
"Infineon": 2,
"Infineon Technologies AG": 1
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "G\u00e9raldine Avou\u00e9",
"/CreationDate": "D:20200402164050+02\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "ANSSI-CC-CER-F-07, v29.2",
"/Producer": "LibreOffice 4.4",
"/Subject": "Plateforme ID-One Cosmo V9.1 masqu\u00e9e sur le composant IFX SLC32",
"/Title": "ANSSI-CC-2020/07",
"pdf_file_size_bytes": 281614,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.ssi.gouv.fr/",
"mailto:certification@ssi.gouv.fr"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 18
},
"st_filename": "anssi-cible-cc-2020_07en.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 4
},
"ECDH": {
"ECDH": 3
},
"ECDSA": {
"ECDSA": 4
}
},
"FF": {
"DH": {
"Diffie-Hellman": 4
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1110-V2-2019": 2
}
},
"cc_claims": {
"A": {
"A.APPLET": 5,
"A.DELETION": 3,
"A.VERIFICATION": 5
},
"D": {
"D.API_DATA": 3,
"D.APP_CODE": 6,
"D.APP_C_DATA": 3,
"D.APP_I_DATA": 4,
"D.ARRAY": 3,
"D.CONFIG": 4,
"D.CRYPTO": 5,
"D.JCS_CODE": 3,
"D.JCS_DATA": 5,
"D.JCS_KEYS": 7,
"D.NB_REMAINTRYGLB": 1,
"D.PIN": 7,
"D.SEC_DATA": 7,
"D.SENSITIVE_DATA": 5
},
"O": {
"O.ALARM": 23,
"O.APPLET": 16,
"O.CARD_MANAGEMENT": 66,
"O.CIPHER": 16,
"O.CODE_PKG": 22,
"O.DELETION": 14,
"O.FIREWALL": 64,
"O.GLOBAL_ARRAYS_CONFID": 14,
"O.GLOBAL_ARRAYS_INTEG": 10,
"O.INSTALL": 17,
"O.JAVAOBJECT": 55,
"O.KEY-MNGT": 26,
"O.LOAD": 20,
"O.NATIVE": 14,
"O.OBJ-": 1,
"O.OBJ-DELETION": 8,
"O.OPERATE": 39,
"O.PATCH_LOADING": 25,
"O.PIN-": 2,
"O.PIN-MNGT": 26,
"O.REALLOCATION": 18,
"O.RESIDENT_APPLICATION": 24,
"O.RESOURCES": 23,
"O.RNG": 11,
"O.SCP": 60,
"O.SECURE_COMPARE": 8,
"O.SID": 34,
"O.TRANSACTION": 19
},
"OE": {
"OE.APPLET": 8,
"OE.CARD-": 1,
"OE.CARD_MANAGEMENT": 3,
"OE.CODE-": 3,
"OE.CODE-EVIDENCE": 18,
"OE.SCP": 9,
"OE.VERIFICATION": 38
},
"OP": {
"OP.ARRAY_AASTORE": 3,
"OP.ARRAY_ACCESS": 9,
"OP.ARRAY_LENGTH": 3,
"OP.CREATE": 7,
"OP.DELETE_APPLET": 4,
"OP.DELETE_PCKG": 3,
"OP.DELETE_PCKG_APPLET": 3,
"OP.FLOW": 3,
"OP.IMPORT_KEY": 2,
"OP.INSTANCE_FIELD": 5,
"OP.INVK_INTERFACE": 7,
"OP.INVK_VIRTUAL": 6,
"OP.JAVA": 5,
"OP.LOCAL_STACK_ACCESS": 3,
"OP.NATIVE_ACCESS": 1,
"OP.NATIVE_INTERFACE_CALL": 1,
"OP.OPERAND_STACK_ACCESS": 3,
"OP.PUT": 6,
"OP.PUTFIELD": 1,
"OP.PUTSTATIC": 1,
"OP.STATIC_FIELD": 3,
"OP.THROW": 5,
"OP.TYPE_ACCESS": 5
},
"OSP": {
"OSP.VERIFICATION": 6
},
"R": {
"R.JAVA": 10
},
"T": {
"T.CONFID-APPLI-DATA": 18,
"T.CONFID-JCS-CODE": 6,
"T.CONFID-JCS-DATA": 11,
"T.CONFIGURATION": 4,
"T.CONF_DATA_APPLET": 4,
"T.DELETION": 6,
"T.EXE-": 1,
"T.EXE-CODE": 8,
"T.INSTALL": 6,
"T.INTEG-": 2,
"T.INTEG-APPLI-": 5,
"T.INTEG-APPLI-CODE": 11,
"T.INTEG-APPLI-DATA": 21,
"T.INTEG-JCS-CODE": 6,
"T.INTEG-JCS-DATA": 12,
"T.NATIVE": 6,
"T.OBJ-DELETION": 4,
"T.PATCH_LOADING": 4,
"T.PHYSICAL": 4,
"T.RESOURCES": 8,
"T.SID": 18
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0084-2014": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 6,
"ADV_FSP.1": 3,
"ADV_FSP.2": 2,
"ADV_FSP.4": 2,
"ADV_FSP.5": 8,
"ADV_IMP.1": 9,
"ADV_INT.2": 1,
"ADV_TDS.1": 2,
"ADV_TDS.3": 4,
"ADV_TDS.4": 8
},
"AGD": {
"AGD_OPE": 2,
"AGD_OPE.1": 8,
"AGD_PRE": 7,
"AGD_PRE.1": 6
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.1": 1,
"ALC_CMS.5": 1,
"ALC_DEL.1": 1,
"ALC_DVS": 1,
"ALC_DVS.1": 2,
"ALC_DVS.2": 13,
"ALC_LCD.1": 3,
"ALC_TAT.1": 2,
"ALC_TAT.2": 3
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 4,
"ASE_INT.1": 5,
"ASE_OBJ.2": 3,
"ASE_REQ.1": 2,
"ASE_REQ.2": 2,
"ASE_SPD.1": 2,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.1": 2,
"ATE_COV.2": 3,
"ATE_DPT.1": 2,
"ATE_DPT.3": 1,
"ATE_FUN.1": 6
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.5": 15
}
},
"cc_security_level": {
"EAL": {
"EAL4": 1,
"EAL4 augmented": 1,
"EAL5": 9,
"EAL5 augmented": 5,
"EAL5+": 2
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP.1": 20,
"FAU_ARP.1.1": 1,
"FAU_GEN": 1,
"FAU_GEN.1": 2,
"FAU_SAA.1": 3,
"FAU_STG.2": 9,
"FAU_STG.2.1": 1,
"FAU_STG.2.2": 1,
"FAU_STG.2.3": 1
},
"FCO": {
"FCO_NRO": 16,
"FCO_NRO.2": 8
},
"FCS": {
"FCS_CKM": 22,
"FCS_CKM.1": 20,
"FCS_CKM.1.1": 1,
"FCS_CKM.4": 19,
"FCS_CKM.4.1": 1,
"FCS_COP": 27,
"FCS_COP.1": 16,
"FCS_COP.1.1": 1,
"FCS_RNG": 3,
"FCS_RNG.1": 10,
"FCS_RNG.1.1": 2,
"FCS_RNG.1.2": 2
},
"FDP": {
"FDP_ACC": 72,
"FDP_ACC.1": 24,
"FDP_ACC.2": 13,
"FDP_ACF": 59,
"FDP_ACF.1": 34,
"FDP_IFC": 28,
"FDP_IFC.1": 21,
"FDP_IFC.2": 2,
"FDP_IFF": 22,
"FDP_IFF.1": 16,
"FDP_ITC": 26,
"FDP_ITC.1": 8,
"FDP_ITC.2": 14,
"FDP_RIP": 131,
"FDP_RIP.1": 11,
"FDP_ROL": 16,
"FDP_ROL.1": 6,
"FDP_SDI": 11,
"FDP_SDI.2": 2,
"FDP_UCT": 10,
"FDP_UCT.1": 1,
"FDP_UIT": 17,
"FDP_UIT.1": 4
},
"FIA": {
"FIA_AFL": 35,
"FIA_AFL.1": 8,
"FIA_ATD": 10,
"FIA_ATD.1": 2,
"FIA_UAU": 56,
"FIA_UAU.1": 12,
"FIA_UAU.4": 2,
"FIA_UAU.7": 2,
"FIA_UID": 31,
"FIA_UID.1": 16,
"FIA_UID.2": 1,
"FIA_USB": 9,
"FIA_USB.1": 3
},
"FMT": {
"FMT_MOF": 7,
"FMT_MOF.1": 1,
"FMT_MSA": 191,
"FMT_MSA.1": 20,
"FMT_MSA.2": 5,
"FMT_MSA.3": 27,
"FMT_MTD": 39,
"FMT_MTD.1": 4,
"FMT_MTD.2": 2,
"FMT_MTD.3": 1,
"FMT_SMF": 62,
"FMT_SMF.1": 30,
"FMT_SMF.1.1": 1,
"FMT_SMR": 61,
"FMT_SMR.1": 56,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1,
"FMT_SMR.2": 6
},
"FPR": {
"FPR_UNO": 16,
"FPR_UNO.1": 13,
"FPR_UNO.1.1": 1
},
"FPT": {
"FPT_FLS": 45,
"FPT_FLS.1": 18,
"FPT_FLS.1.1": 2,
"FPT_PHP": 7,
"FPT_PHP.3": 1,
"FPT_RCV": 26,
"FPT_RCV.3": 7,
"FPT_RCV.4": 1,
"FPT_TDC": 9,
"FPT_TDC.1": 11,
"FPT_TDC.1.1": 1,
"FPT_TDC.1.2": 1,
"FPT_TST": 1,
"FPT_TST.1": 11,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FRU": {
"FRU_FLT": 7,
"FRU_FLT.1": 1
},
"FTP": {
"FTP_ITC": 16,
"FTP_ITC.1": 7,
"FTP_TRP.1": 4
}
},
"certification_process": {
"OutOfScope": {
"a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are": 1,
"out of scope": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 3
},
"ECB": {
"ECB": 5
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PACE": {
"PACE": 1
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 2,
"Key agreement": 1
},
"MAC": {
"MAC": 4
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"CEA-LETI": {
"CEA-LETI": 1
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 4
},
"SHA2": {
"SHA-2": 1,
"SHA-224": 4,
"SHA-256": 5,
"SHA-384": 4,
"SHA-512": 3,
"SHA256": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {
"misc": {
"TYPE_ACCESS": 5
}
},
"javacard_packages": {
"com": {
"com.oberthurcs.javacard": 2,
"com.oberthurcs.javacard.sac.sac": 1
},
"javacard": {
"javacard.framework": 4,
"javacard.sac.sac": 1,
"javacard.security": 3
},
"javacardx": {
"javacardx.crypto": 2,
"javacardx.framework.util": 1,
"javacardx.security": 1
}
},
"javacard_version": {
"JavaCard": {
"Java Card 3.0.5": 7
}
},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 24
}
},
"side_channel_analysis": {
"FI": {
"fault injection": 1,
"malfunction": 2,
"physical tampering": 2
},
"SCA": {
"DPA": 2,
"SPA": 1,
"physical probing": 4,
"timing attack": 1
}
},
"standard_id": {
"BSI": {
"AIS31": 1
},
"FIPS": {
"FIPS 140-2": 1,
"FIPS 198": 1,
"FIPS PUB 180-3": 2,
"FIPS PUB 197": 6,
"FIPS PUB 46-3": 3,
"FIPS PUB 81": 8
},
"ISO": {
"ISO/IEC 14443": 2,
"ISO/IEC 7816": 2,
"ISO/IEC 9796-1": 2,
"ISO/IEC 9797": 12,
"ISO/IEC 9797-1": 1
},
"NIST": {
"NIST SP 800-90": 1
},
"PKCS": {
"PKCS#1": 2
},
"SCP": {
"SCP02": 4,
"SCP03": 4
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 22
}
},
"DES": {
"3DES": {
"TDES": 12,
"Triple-DES": 2
},
"DES": {
"DES": 12
}
},
"constructions": {
"MAC": {
"CMAC": 4,
"HMAC": 3
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Idemia": {
"IDEMIA": 175
},
"Infineon": {
"Infineon": 8,
"Infineon Technologies AG": 1
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "abderrahman.matoussi@idemia.com",
"/CreationDate": "D:20200228163658+01\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2016",
"/ModDate": "D:20200228163658+01\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2016",
"/Title": "Title",
"pdf_file_size_bytes": 2862110,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 150
}
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": "EAL4+",
"pp_ids": {
"_type": "Set",
"elements": [
"PDCP_V1.3"
]
},
"pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/ANSSI-CC-cible_PP-2010-03en.pdf",
"pp_name": "Java Card\u2122 System Protection Profile Open Configuration, Version 2.6"
}
]
},
"report_link": "https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2020_07-fr.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"AVA_VAN.5",
"ALC_DVS.2",
"EAL5+"
]
},
"st_link": "https://www.commoncriteriaportal.org/files/epfiles/anssi-cible-cc-2020_07en.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "fe335c8ba5b824602982cd473fdf60cc90f6d5ad4f86878d9bab9b705677db07",
"txt_hash": "1db1bd2d3c13b3f08ad2bc162a6c15f0fd66a74aa777129acde4c4de206cdaba"
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "3996e239c72d181094b76bd38b58cf629382f9603eea456b4382b56461d6e63f",
"txt_hash": "15a1e2ed5352aa2d710ffe8a000b76f1733640fb99253f023c444a900d80693e"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "f2253108b3d5baad833abb27ec6ea00f236000f43a23281fe43ae078f32d8a43",
"txt_hash": "d0b34b74aa182a8c12e6ba252de1dce3ea72887b1b753cc410246239f5d3d0d7"
}
},
"status": "active"
}