Application CPS2ter, adossée à l’application IAS ECC v1.3, en composition sur la plateforme ID-One Cosmo v8.2Code SAAAAR Applet : 0708312 ; Code SAAAAR Patch : 093072
CSV information ?
Status | active |
---|---|
Valid from | 04.07.2023 |
Valid until | 04.07.2028 |
Scheme | 🇫🇷 FR |
Manufacturer | Idemia |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | AVA_VAN.5, EAL4+, ALC_DVS.2 |
Heuristics summary ?
Certificate ?
Extracted keywords
Asymmetric Algorithms
ECCVendor
NXP, IDEMIASecurity level
EAL4, EAL2Security Assurance Requirements (SAR)
ALC_DVS.2, AVA_VAN.5Certificates
ANSSI-CC-2019/43-R01File metadata
Creation date: | D:20230706152413+02'00' |
---|---|
Modification date: | D:20230706154544+02'00' |
Pages: | 2 |
Creator: | Acrobat PDFMaker 23 pour Word |
Producer: | Adobe PDF Library 23.1.175 |
Certification report ?
Extracted keywords
Symmetric Algorithms
DESAsymmetric Algorithms
ECCVendor
NXP, IDEMIASecurity level
EAL4, EAL2, EAL5, EAL7, ITSEC E6 ElevéSecurity Assurance Requirements (SAR)
AGD_PRE, AGD_OPE, ALC_DVS.2, ALC_FLR, AVA_VAN.5, AVA_VANProtection profiles
ANSSI-CC-PP-2010/03-Certificates
BSI-DSZ-CC-1059-V4-2021, ANSSI-CC-2019/43-R01, ANSSI-CC-2019/33-S01, ANSSI-CC-2019/34-S01, ANSSI-CC-2019/35-S01, ANSSI-CC-2019/36-S01, ANSSI-CC-2019/28, ANSSI-CC-2019/28-S01Evaluation facilities
CESTI, CEA - LETIStandards
SCP03, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003File metadata
Creation date: | D:20230706152454+02'00' |
---|---|
Modification date: | D:20230706154546+02'00' |
Pages: | 14 |
Creator: | Acrobat PDFMaker 23 pour Word |
Producer: | Adobe PDF Library 23.1.175 |
References
Outgoing- BSI-DSZ-CC-1059-V4-2021 - NXP Secure Smart Card Controller P6022y VB* including IC Dedicated Software
- ANSSI-CC-2019/28 - Plateforme ID-One Cosmo v8.2 masquée sur le composant NXP P60D145 Identification du matériel 091121
Security target ?
Extracted keywords
Symmetric Algorithms
DES, 3DESAsymmetric Algorithms
ECCSchemes
MAC, Key ExchangeRandomness
RNGBlock cipher modes
CBCVendor
NXP, IDEMIASecurity level
EAL4, EAL5, EAL4 augmented, EAL5 augmentedClaims
D.BOULY, O.CHV, O.SID, O.FIREWALL, O.GLOBAL_ARRAYS_CONFID, O.GLOBAL_ARRAYS_INTEG, O.NATIVE, O.OPERATE, O.REALLOCATION, O.RESOURCES, O.ALARM, O.CIPHER, O.KEY-MNGT, O.PIN-MNGT, O.BIO-MNGT, O.TRANSACTION, O.OBJ-DELETION, O.DELETION, O.LOAD, O.INSTALL, O.SCP, O.CARD-MANAGEMENT, O.RESIDENT_APPLICATION, O.SECURE_COMPARE, O.PATCH_LOADING, T.CONFID-APPLI-DATA, T.CONFID-JCS-CODE, T.CONFID-JCS-DATA, T.INTEG-APPLI-CODE, T.INTEG-APPLI-DATA, T.INTEG-JCS-CODE, T.INTEG-JCS-DATA, T.SID, T.EXE-CODE, T.NATIVE, T.RESOURCES, T.DELETION, T.INSTALL, T.OBJ-DELETION, T.PHYSICAL, T.CONFIGURATION, T.CONF_DATA_APPLET, T.PATCH_LOADING, A.APPLET, A.VERIFICATION, OE.APPLET, OE.VERIFICATION, OE.CODE-, OSP.VERIFICATIONSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_TDS.1, ADV_FSP.4, ADV_TDS.3, ADV_IMP.1, ADV_FSP.2, ADV_TDS.2, AGD_OPE, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_TAT.1, ALC_CMC.4, ALC_CMS.1, ALC_DVS.1, ALC_LCD.1, ALC_CMS.4, ALC_DEL.1, ATE_COV.2, ATE_FUN.1, ATE_COV.1, ATE_DPT.1, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1, ASE_REQ.2, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_ARP.1, FCS_RNG, FCS_RNG.1.1, FCS_RNG.1.2, FCS_RNG.1, FCS_COP, FCS_COP.1, FCS_CKM, FCS_CKM.4, FCS_CKM.1, FDP_DAU, FDP_DAU.1, FDP_ETC, FDP_ETC.1, FDP_ITC, FDP_ITC.1, FDP_SDI, FDP_SDI.2, FDP_ACC, FDP_ACC.1, FDP_ACF, FDP_ACF.1, FDP_ACF.1.4, FDP_UIT, FDP_UIT.1, FDP_UCT, FDP_UCT.1, FDP_IFC.1, FDP_ITC.2, FIA_ATD, FIA_ATD.1, FIA_UAU, FIA_UAU.1, FIA_UID, FIA_UID.1, FIA_AFL, FIA_AFL.1, FIA_USB, FIA_USB.1, FMT_SMF, FMT_SMF.1, FMT_MSA.3, FPT_PHP.3, FPT_PHP.3.1, FPT_FLS.1, FPT_FLS.1.1, FPT_FLS, FTP_ITC, FTP_ITC.1, FTP_TRP.1Certificates
BSI-DSZ-CC-1059-V4-2021, ANSSI-CC-2019/33, ANSSI-CC-2019/34, ANSSI-CC-2019/35, ANSSI-CC-2019/36, CC-2, CC-3, CC-1Evaluation facilities
CEA-LETICertification process
Out of scope, 12 2.2.5 Out of scope features, 2.2.5 Out of scope features Some features are put out of the evaluation scope and are therefore not part of the TSF, security features overview For more information about CPS2ter security features see [SRS]. 2.2.5 Out of scope features Some features are put out of the evaluation scope and are therefore not part of the TSFSide-channel analysis
physical tamperingCertification process
Out of scope, 12 2.2.5 Out of scope features, 2.2.5 Out of scope features Some features are put out of the evaluation scope and are therefore not part of the TSF, security features overview For more information about CPS2ter security features see [SRS]. 2.2.5 Out of scope features Some features are put out of the evaluation scope and are therefore not part of the TSFStandards
FIPS 46-3, FIPS 81, FIPS PUB 46-3, NIST SP 800-90, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004File metadata
Title: | Title |
---|---|
Author: | clemecap |
Creation date: | D:20230502075738+02'00' |
Modification date: | D:20230502075738+02'00' |
Pages: | 66 |
Creator: | Microsoft® Word 2016 |
Producer: | Microsoft® Word 2016 |
References
Outgoing- BSI-DSZ-CC-1059-V4-2021 - NXP Secure Smart Card Controller P6022y VB* including IC Dedicated Software
- ANSSI-CC-2019/35 - IAS ECC V2, Version 1.3 en configuration #3 sur la plateforme ID-One Cosmo v8.2
- ANSSI-CC-2019/33 - IAS ECC V2, version 1.3 en configuration #1 sur la plateforme ID-One Cosmo v8.2
- ANSSI-CC-2019/36 - IAS ECC V2, Version 1.3 en configuration #4 sur la plateforme ID-One Cosmo v8.2
- ANSSI-CC-2019/34 - IAS ECC V2, version 1.3 en configuration #2 sur la plateforme ID-One Cosmo v8.2
Heuristics ?
Extracted SARs
ASE_SPD.1, AGD_PRE.1, ALC_DVS.2, ASE_ECD.1, ASE_TSS.1, ALC_TAT.1, ALC_CMC.4, ALC_LCD.1, ADV_ARC.1, ADV_FSP.4, ASE_REQ.2, ALC_DEL.1, ATE_COV.2, ASE_CCL.1, ASE_INT.1, ADV_TDS.3, AGD_OPE.1, ATE_FUN.1, ADV_IMP.1, AVA_VAN.5, ASE_OBJ.2, ALC_CMS.4, ATE_DPT.1Scheme data ?
Product | Application CPS2ter, adossée à l’application IAS ECC v1.3, en composition sur la plateforme ID-One Cosmo v8.2 Code SAAAAR Applet : 0708312 ; Code SAAAAR Patch : 093072 | |
---|---|---|
Url | https://cyber.gouv.fr/produits-certifies/application-cps2ter-adossee-lapplication-ias-ecc-v13-en-composition-sur-la | |
Description | Le produit évalué est l’« Application CPS2ter, adossée à l’application IAS ECC v1.3, en composition sur la plateforme ID-One Cosmo v8.2, Code SAAAAR Applet : 0708312; Code SAAAAR Patch : 093072 » développé par IDEMIA et masqué sur le composant NXP P60D145 développé par NXP SEMICONDUCTORS GMBH. Ce produit est une carte à puce disposant d’une interface contact et d’une interface sans contact qui pr | |
Sponsor | IDEMIA | |
Developer | IDEMIA et NXP SEMICONDUCTORS GMBH | |
Cert Id | ANSSI-CC-2019/43-R01 | |
Level | EAL4+ | |
Expiration Date | 4 Juillet 2028 | |
Enhanced | ||
Cert Id | ANSSI-CC-2019/43-R01 | |
Certification Date | 04/07/2023 | |
Expiration Date | 04/07/2028 | |
Category | Cartes à puce | |
Cc Version | Critères Communs version 2.1 | |
Developer | IDEMIA et NXP SEMICONDUCTORS GMBH | |
Sponsor | IDEMIA | |
Evaluation Facility | CEA - LETI | |
Level | EAL4+ | |
Protection Profile | ||
Mutual Recognition | CCRA SOG-IS | |
Augmented | ALC_DVS.2, AVA_VAN.5 | |
Cert Link | https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2019_43-R01.pdf |
References ?
Updates ?
-
15.02.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The following values were inserted:
{'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'f3426fdae3fee4d856b1df6d023be79cfaed491a269c0482fdfdfd933f791ad6', 'txt_hash': '044dfcf646a5adec650684c4814c11e01970bcd86fc945133f97ac8087bf1d05'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '721b861d8ff39f2f30b78cec09ad185b4cb403af541125a4bc31a3708225959b', 'txt_hash': 'c1ddb72e4a5f436cebaf0e62e535d056292463c87a63e95408363e3406dfbcfd'}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '931bee77a407d7cac9903477894810bce47403734cab01759f47610e3893207a', 'txt_hash': '1536726b489b3c3e034a7dac065b2b256070bd34215cb676957f2a4ed2665ad9'}}
. - The following properties were deleted:
['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash']
.
The PDF extraction data was updated.
- The following values were inserted:
{'cert_metadata': {'pdf_file_size_bytes': 133173, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 2, '/CreationDate': "D:20230706152413+02'00'", '/Creator': 'Acrobat PDFMaker 23 pour Word', '/Keywords': '', '/ModDate': "D:20230706154544+02'00'", '/Producer': 'Adobe PDF Library 23.1.175', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}, 'cert_frontpage': None, 'cert_keywords': {'cc_cert_id': {'FR': {'ANSSI-CC-2019/43-R01': 2}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 1, 'EAL2': 1}}, 'cc_sar': {'ALC': {'ALC_DVS.2': 1}, 'AVA': {'AVA_VAN.5': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'NXP': {'NXP': 1}, 'Idemia': {'IDEMIA': 2}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 1}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}, 'cert_filename': 'Certificat-CC-2019_43-R01.pdf'}
. - The report_frontpage property was set to
{'FR': {}}
. - The st_frontpage property was set to
None
. - The report_keywords property was updated, with the
{'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1059-V4-2021': 1}}, 'FR': {'__update__': {'ANSSI-CC-2019/28': 2}}}}}
data. - The st_keywords property was updated, with the
{'cc_cert_id': {'__insert__': {'NL': {'CC-2': 2, 'CC-3': 4, 'CC-1': 2}}, '__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1059-V4-2021': 1}}, 'FR': {'__update__': {'ANSSI-CC-2019/33': 1, 'ANSSI-CC-2019/34': 1, 'ANSSI-CC-2019/35': 1, 'ANSSI-CC-2019/36': 1}}}}}
data.
- The following values were inserted:
-
13.02.2024 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1059-V4-2021': 2}}, 'FR': {'__update__': {'ANSSI-CC-2019/28': 4}}}}}
data. - The st_keywords property was updated, with the
{'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1059-V4-2021': 2}}, 'FR': {'__update__': {'ANSSI-CC-2019/33': 2, 'ANSSI-CC-2019/34': 2, 'ANSSI-CC-2019/35': 2, 'ANSSI-CC-2019/36': 2}}}, '__delete__': ['NL']}}
data.
- The report_keywords property was updated, with the
-
07.02.2024 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'cc_cert_id': {'__delete__': ['CA']}}
data.
- The report_keywords property was updated, with the
-
07.02.2024 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'cc_cert_id': {'__insert__': {'CA': {'7 5 7': 1, '2 0 1': 13, '1 4 1': 2, '1 4 2': 2, '1 4 3': 2}}, '__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1059-V4-2021': 1}}, 'FR': {'__update__': {'ANSSI-CC-2019/28': 2}}}}}
data. - The st_keywords property was updated, with the
{'cc_cert_id': {'__insert__': {'NL': {'CC-2': 2, 'CC-3': 4, 'CC-1': 2}}, '__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1059-V4-2021': 1}}, 'FR': {'__update__': {'ANSSI-CC-2019/33': 1, 'ANSSI-CC-2019/34': 1, 'ANSSI-CC-2019/35': 1, 'ANSSI-CC-2019/36': 1}}}}}
data.
- The report_keywords property was updated, with the
-
05.02.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'description': 'Le produit évalué est l’« Application CPS2ter, adossée à l’application IAS ECC v1.3, en composition sur la plateforme ID-One Cosmo v8.2, Code SAAAAR Applet : 0708312; Code SAAAAR Patch : 093072 » développé par IDEMIA et masqué sur le composant NXP P60D145 développé par NXP SEMICONDUCTORS GMBH.\nCe produit est une carte à puce disposant d’une interface contact et d’une interface sans contact qui pr'}
data.
- The scheme_data property was updated, with the
-
04.01.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'annotated_references': None}
. - The scheme_data property was updated, with the
{'product': 'Application CPS2ter, adossée à l’application IAS ECC v1.3, en composition sur la plateforme ID-One Cosmo v8.2 Code SAAAAR Applet : 0708312 ; Code SAAAAR Patch : 093072', 'url': 'https://cyber.gouv.fr/produits-certifies/application-cps2ter-adossee-lapplication-ias-ecc-v13-en-composition-sur-la', 'enhanced': {'__insert__': {'cert_id': 'ANSSI-CC-2019/43-R01', 'sponsor': 'IDEMIA', 'mutual_recognition': 'CCRA\n SOG-IS', 'augmented': 'ALC_DVS.2, AVA_VAN.5'}, '__update__': {'cc_version': 'Critères Communs version 2.1', 'protection_profile': '', 'developer': 'IDEMIA et NXP SEMICONDUCTORS GMBH', 'evaluation_facility': 'CEA - LETI', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2019_43-R01.pdf'}, '__delete__': ['id', 'augmentations', 'recognition', 'description', 'report_link', 'target_link']}}
data.
- The following values were inserted:
-
21.09.2023 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'product': 'Application CPS2ter, adossée à l’application IAS ECC v1.3, en composition sur la plateforme ID-One Cosmo v8.2', 'vendor': 'IDEMIA et NXP SEMICONDUCTORS GMBHIDEMIA', 'id': '2019/43-R01', 'certification_date': '04/07/2023', 'url': 'https://www.ssi.gouv.fr/certification_cc/application-cps2ter-adossee-a-lapplication-ias-ecc-v1-3-en-composition-sur-la-plateforme-id-one-cosmo-v8-2-2/', 'enhanced': {'__insert__': {'cert_link': 'https://www.ssi.gouv.fr/uploads/2023/07/certificat-cc-2019_43-r011.pdf'}, '__update__': {'id': '2019/43-R01', 'certification_date': '04/07/2023', 'expiration_date': '04/07/2028', 'protection_profile': 'NA', 'developer': 'IDEMIA et NXP SEMICONDUCTORS GMBH / IDEMIA', 'description': 'Descriptif du produit\n\t\t\t\tLe produit évalué est l’« Application CPS2ter, adossée à l’application IAS ECC v1.3, en composition sur la plateforme ID-One Cosmo v8.2, Code SAAAAR Applet : 0708312; Code SAAAAR Patch : 093072 » développé par IDEMIA et masqué sur le composant NXP P60D145 développé par NXP SEMICONDUCTORS GMBH.\nCe produit est une carte à puce disposant d’une interface contact et d’une interface sans contact qui propose les services IAS et CPS2ter sur le même microcontrôleur. Le but est de permettre une transition de la technologie CPS2ter actuellement utilisée par l’Agence des Systèmes d’Information Partagés de Santé (ASIP Santé) vers la technologie CPS3 basée sur le standard IAS.\n\t\t\t\t\n Rapport de certification\nSecurity target\nCertificat', 'report_link': 'https://www.ssi.gouv.fr/uploads/2023/07/anssi-cc-2019_43-r01fr1.pdf', 'target_link': 'https://www.ssi.gouv.fr/uploads/2023/07/anssi-cible-cc-2019_43-r01en1.pdf'}}}
data.
- The scheme_data property was updated, with the
-
27.07.2023 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Application CPS2ter, adossée à l’application IAS ECC v1.3, en composition sur la plateforme ID-One Cosmo v8.2Code SAAAAR Applet : 0708312 ; Code SAAAAR Patch : 093072 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/files/epfiles/Certificat-CC-2019_43-R01.pdf",
"dgst": "9be1f5ccc3ce2422",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2019/43-R01",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"8.2",
"1.3"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2019/28",
"BSI-DSZ-CC-1059-V4-2021"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2017/49",
"ANSSI-CC-2019/28",
"BSI-DSZ-CC-0973-2016",
"BSI-DSZ-CC-0973-V2-2016",
"BSI-DSZ-CC-1059-V4-2021",
"BSI-DSZ-CC-1059-V2-2019",
"BSI-DSZ-CC-1059-2018",
"BSI-DSZ-CC-1059-V3-2019"
]
}
},
"scheme_data": {
"cert_id": "ANSSI-CC-2019/43-R01",
"description": "Le produit \u00e9valu\u00e9 est l\u2019\u00ab Application CPS2ter, adoss\u00e9e \u00e0 l\u2019application IAS ECC v1.3, en composition sur la plateforme ID-One Cosmo v8.2, Code SAAAAR Applet : 0708312; Code SAAAAR Patch : 093072 \u00bb d\u00e9velopp\u00e9 par IDEMIA et masqu\u00e9 sur le composant NXP P60D145 d\u00e9velopp\u00e9 par NXP SEMICONDUCTORS GMBH.\nCe produit est une carte \u00e0 puce disposant d\u2019une interface contact et d\u2019une interface sans contact qui pr",
"developer": "IDEMIA et NXP SEMICONDUCTORS GMBH",
"enhanced": {
"augmented": "ALC_DVS.2, AVA_VAN.5",
"category": "Cartes \u00e0 puce",
"cc_version": "Crit\u00e8res Communs version 2.1",
"cert_id": "ANSSI-CC-2019/43-R01",
"cert_link": "https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2019_43-R01.pdf",
"certification_date": "04/07/2023",
"developer": "IDEMIA et NXP SEMICONDUCTORS GMBH",
"evaluation_facility": "CEA - LETI",
"expiration_date": "04/07/2028",
"level": "EAL4+",
"mutual_recognition": "CCRA\n SOG-IS",
"protection_profile": "",
"sponsor": "IDEMIA"
},
"expiration_date": "4 Juillet 2028",
"level": "EAL4+",
"product": "Application CPS2ter, adoss\u00e9e \u00e0 l\u2019application IAS ECC v1.3, en composition sur la plateforme ID-One Cosmo v8.2 Code SAAAAR Applet : 0708312 ; Code SAAAAR Patch : 093072",
"sponsor": "IDEMIA",
"url": "https://cyber.gouv.fr/produits-certifies/application-cps2ter-adossee-lapplication-ias-ecc-v13-en-composition-sur-la"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2019/34",
"ANSSI-CC-2019/33",
"ANSSI-CC-2019/36",
"BSI-DSZ-CC-1059-V4-2021",
"ANSSI-CC-2019/35"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2019/34",
"ANSSI-CC-2019/33",
"ANSSI-CC-2019/36",
"ANSSI-CC-2019/28",
"BSI-DSZ-CC-1059-V4-2021",
"ANSSI-CC-2019/35"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Idemia",
"manufacturer_web": "https://www.idemia.com",
"name": "Application CPS2ter, adoss\u00e9e \u00e0 l\u2019application IAS ECC v1.3, en composition sur la plateforme ID-One Cosmo v8.2Code SAAAAR Applet : 0708312 ; Code SAAAAR Patch : 093072",
"not_valid_after": "2028-07-04",
"not_valid_before": "2023-07-04",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "Certificat-CC-2019_43-R01.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
}
}
},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2019/43-R01": 2
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_DVS.2": 1
},
"AVA": {
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 1,
"EAL4": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Idemia": {
"IDEMIA": 2
},
"NXP": {
"NXP": 1
}
},
"vulnerability": {}
},
"cert_metadata": {
"/CreationDate": "D:20230706152413+02\u002700\u0027",
"/Creator": "Acrobat PDFMaker 23 pour Word",
"/Keywords": "",
"/ModDate": "D:20230706154544+02\u002700\u0027",
"/Producer": "Adobe PDF Library 23.1.175",
"pdf_file_size_bytes": 133173,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 2
},
"report_filename": "ANSSI-CC-2019_43-R01fr.pdf",
"report_frontpage": {
"FR": {}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 8
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1059-V4-2021": 1
},
"FR": {
"ANSSI-CC-2019/28": 2,
"ANSSI-CC-2019/28-S01": 1,
"ANSSI-CC-2019/33-S01": 2,
"ANSSI-CC-2019/34-S01": 2,
"ANSSI-CC-2019/35-S01": 2,
"ANSSI-CC-2019/36-S01": 2,
"ANSSI-CC-2019/43-R01": 2
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"ANSSI": {
"ANSSI-CC-PP-2010/03-": 1
}
},
"cc_sar": {
"AGD": {
"AGD_OPE": 1,
"AGD_PRE": 3
},
"ALC": {
"ALC_DVS.2": 2,
"ALC_FLR": 1
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.5": 3
}
},
"cc_security_level": {
"EAL": {
"EAL2": 2,
"EAL4": 1,
"EAL5": 1,
"EAL7": 1
},
"ITSEC": {
"ITSEC E6 Elev\u00e9": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"CEA-LETI": {
"CEA - LETI": 1
},
"CESTI": {
"CESTI": 2
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1
},
"SCP": {
"SCP03": 2
}
},
"symmetric_crypto": {
"DES": {
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Idemia": {
"IDEMIA": 2
},
"NXP": {
"NXP": 8
}
},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20230706152454+02\u002700\u0027",
"/Creator": "Acrobat PDFMaker 23 pour Word",
"/Keywords": "",
"/ModDate": "D:20230706154546+02\u002700\u0027",
"/Producer": "Adobe PDF Library 23.1.175",
"pdf_file_size_bytes": 395092,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.sogis.eu/",
"http://www.ssi.gouv.fr/",
"http://www.commoncriteriaportal.org/",
"mailto:certification@ssi.gouv.fr"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 14
},
"st_filename": "ANSSI-cible-CC-2019_43-R01en.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 25
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1059-V4-2021": 1
},
"FR": {
"ANSSI-CC-2019/33": 1,
"ANSSI-CC-2019/34": 1,
"ANSSI-CC-2019/35": 1,
"ANSSI-CC-2019/36": 1
},
"NL": {
"CC-1": 2,
"CC-2": 2,
"CC-3": 4
}
},
"cc_claims": {
"A": {
"A.APPLET": 1,
"A.VERIFICATION": 1
},
"D": {
"D.BOULY": 1
},
"O": {
"O.ALARM": 1,
"O.BIO-MNGT": 1,
"O.CARD-MANAGEMENT": 1,
"O.CHV": 13,
"O.CIPHER": 1,
"O.DELETION": 1,
"O.FIREWALL": 1,
"O.GLOBAL_ARRAYS_CONFID": 1,
"O.GLOBAL_ARRAYS_INTEG": 1,
"O.INSTALL": 1,
"O.KEY-MNGT": 1,
"O.LOAD": 1,
"O.NATIVE": 1,
"O.OBJ-DELETION": 1,
"O.OPERATE": 1,
"O.PATCH_LOADING": 1,
"O.PIN-MNGT": 1,
"O.REALLOCATION": 1,
"O.RESIDENT_APPLICATION": 1,
"O.RESOURCES": 1,
"O.SCP": 3,
"O.SECURE_COMPARE": 1,
"O.SID": 1,
"O.TRANSACTION": 1
},
"OE": {
"OE.APPLET": 1,
"OE.CODE-": 1,
"OE.VERIFICATION": 2
},
"OSP": {
"OSP.VERIFICATION": 1
},
"T": {
"T.CONFID-APPLI-DATA": 1,
"T.CONFID-JCS-CODE": 1,
"T.CONFID-JCS-DATA": 1,
"T.CONFIGURATION": 1,
"T.CONF_DATA_APPLET": 1,
"T.DELETION": 1,
"T.EXE-CODE": 2,
"T.INSTALL": 1,
"T.INTEG-APPLI-CODE": 2,
"T.INTEG-APPLI-DATA": 2,
"T.INTEG-JCS-CODE": 1,
"T.INTEG-JCS-DATA": 1,
"T.NATIVE": 1,
"T.OBJ-DELETION": 1,
"T.PATCH_LOADING": 1,
"T.PHYSICAL": 1,
"T.RESOURCES": 1,
"T.SID": 2
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 6,
"ADV_FSP.1": 3,
"ADV_FSP.2": 3,
"ADV_FSP.4": 9,
"ADV_IMP.1": 5,
"ADV_TDS.1": 2,
"ADV_TDS.2": 1,
"ADV_TDS.3": 9
},
"AGD": {
"AGD_OPE": 6,
"AGD_OPE.1": 6,
"AGD_PRE": 8,
"AGD_PRE.1": 6
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.1": 1,
"ALC_CMS.4": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 2,
"ALC_DVS.2": 10,
"ALC_LCD.1": 3,
"ALC_TAT.1": 3
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 4,
"ASE_INT.1": 5,
"ASE_OBJ.2": 3,
"ASE_REQ.1": 2,
"ASE_REQ.2": 2,
"ASE_SPD.1": 2,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.1": 2,
"ATE_COV.2": 3,
"ATE_DPT.1": 2,
"ATE_FUN.1": 6
},
"AVA": {
"AVA_VAN.5": 10
}
},
"cc_security_level": {
"EAL": {
"EAL4": 9,
"EAL4 augmented": 3,
"EAL5": 1,
"EAL5 augmented": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP.1": 1
},
"FCS": {
"FCS_CKM": 11,
"FCS_CKM.1": 2,
"FCS_CKM.4": 3,
"FCS_COP": 22,
"FCS_COP.1": 2,
"FCS_RNG": 16,
"FCS_RNG.1": 3,
"FCS_RNG.1.1": 2,
"FCS_RNG.1.2": 2
},
"FDP": {
"FDP_ACC": 15,
"FDP_ACC.1": 6,
"FDP_ACF": 25,
"FDP_ACF.1": 5,
"FDP_ACF.1.4": 1,
"FDP_DAU": 8,
"FDP_DAU.1": 2,
"FDP_ETC": 8,
"FDP_ETC.1": 2,
"FDP_IFC.1": 4,
"FDP_ITC": 11,
"FDP_ITC.1": 5,
"FDP_ITC.2": 2,
"FDP_SDI": 8,
"FDP_SDI.2": 3,
"FDP_UCT": 9,
"FDP_UCT.1": 1,
"FDP_UIT": 17,
"FDP_UIT.1": 2
},
"FIA": {
"FIA_AFL": 16,
"FIA_AFL.1": 4,
"FIA_ATD": 14,
"FIA_ATD.1": 3,
"FIA_UAU": 25,
"FIA_UAU.1": 6,
"FIA_UID": 20,
"FIA_UID.1": 6,
"FIA_USB": 16,
"FIA_USB.1": 8
},
"FMT": {
"FMT_MSA.3": 4,
"FMT_SMF": 14,
"FMT_SMF.1": 1
},
"FPT": {
"FPT_FLS": 4,
"FPT_FLS.1": 14,
"FPT_FLS.1.1": 1,
"FPT_PHP.3": 21,
"FPT_PHP.3.1": 1
},
"FTP": {
"FTP_ITC": 17,
"FTP_ITC.1": 7,
"FTP_TRP.1": 4
}
},
"certification_process": {
"OutOfScope": {
" 2.2.5 Out of scope features Some features are put out of the evaluation scope and are therefore not part of the TSF": 1,
"12 2.2.5 Out of scope features": 2,
"Out of scope": 2,
"security features overview For more information about CPS2ter security features see [SRS]. 2.2.5 Out of scope features Some features are put out of the evaluation scope and are therefore not part of the TSF": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 5
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"KEX": {
"Key Exchange": 1
},
"MAC": {
"MAC": 6
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"CEA-LETI": {
"CEA-LETI": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 5
}
},
"side_channel_analysis": {
"FI": {
"physical tampering": 3
}
},
"standard_id": {
"CC": {
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1,
"CCMB-2017-04-004": 1
},
"FIPS": {
"FIPS 46-3": 3,
"FIPS 81": 3,
"FIPS PUB 46-3": 1
},
"NIST": {
"NIST SP 800-90": 2
}
},
"symmetric_crypto": {
"DES": {
"3DES": {
"3DES": 18
},
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Idemia": {
"IDEMIA": 93
},
"NXP": {
"NXP": 5
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "clemecap",
"/CreationDate": "D:20230502075738+02\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2016",
"/ModDate": "D:20230502075738+02\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2016",
"/Title": "Title",
"pdf_file_size_bytes": 1701785,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"file:///F:/Projets/Melpom\u00c3\u00a8ne/ST/Output/finalDoc.doc%23tok86%23tok86",
"file:///F:/Projets/Melpom\u00c3\u00a8ne/ST/Output/finalDoc.doc%23tok90%23tok90",
"file:///F:/Projets/Melpom\u00c3\u00a8ne/ST/Output/finalDoc.doc%23tok95%23tok95",
"file:///F:/Projets/Melpom\u00c3\u00a8ne/ST/Output/finalDoc.doc%23tok84%23tok84",
"file:///F:/Projets/Melpom\u00c3\u00a8ne/ST/Output/finalDoc.doc%23tok80%23tok80",
"file:///F:/Projets/Melpom\u00c3\u00a8ne/ST/Output/finalDoc.doc%23tok64%23tok64",
"file:///F:/Projets/Melpom\u00c3\u00a8ne/ST/Output/finalDoc.doc%23tok68%23tok68",
"file:///F:/Projets/Melpom\u00c3\u00a8ne/ST/Output/finalDoc.doc%23tok92%23tok92",
"file:///F:/Projets/Melpom\u00c3\u00a8ne/ST/Output/finalDoc.doc%23tok76%23tok76",
"file:///F:/Projets/Melpom\u00c3\u00a8ne/ST/Output/finalDoc.doc%23tok78%23tok78",
"file:///F:/Projets/Melpom\u00c3\u00a8ne/ST/Output/finalDoc.doc%23tok79%23tok79",
"file:///F:/Projets/Melpom\u00c3\u00a8ne/ST/Output/finalDoc.doc%23tok74%23tok74",
"file:///F:/Projets/Melpom\u00c3\u00a8ne/ST/Output/finalDoc.doc%23tok67%23tok67",
"file:///F:/Projets/Melpom\u00c3\u00a8ne/ST/Output/finalDoc.doc%23tok83%23tok83",
"file:///F:/Projets/Melpom\u00c3\u00a8ne/ST/Output/finalDoc.doc%23tok71%23tok71",
"file:///F:/Projets/Melpom\u00c3\u00a8ne/ST/Output/finalDoc.doc%23tok66%23tok66",
"file:///F:/Projets/Melpom\u00c3\u00a8ne/ST/Output/finalDoc.doc%23tok91%23tok91",
"file:///F:/Projets/Melpom\u00c3\u00a8ne/ST/Output/finalDoc.doc%23tok94%23tok94",
"file:///F:/Projets/Melpom\u00c3\u00a8ne/ST/Output/finalDoc.doc%23tok72%23tok72",
"file:///F:/Projets/Melpom\u00c3\u00a8ne/ST/Output/finalDoc.doc%23tok69%23tok69",
"file:///F:/Projets/Melpom\u00c3\u00a8ne/ST/Output/finalDoc.doc%23tok82%23tok82",
"file:///F:/Projets/Melpom\u00c3\u00a8ne/ST/Output/finalDoc.doc%23tok88%23tok88",
"file:///F:/Projets/Melpom\u00c3\u00a8ne/ST/Output/finalDoc.doc%23tok73%23tok73",
"file:///F:/Projets/Melpom\u00c3\u00a8ne/ST/Output/finalDoc.doc%23tok87%23tok87"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 66
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC-2019_43-R01fr.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"EAL4+",
"ALC_DVS.2",
"AVA_VAN.5"
]
},
"st_link": "https://www.commoncriteriaportal.org/files/epfiles/ANSSI-cible-CC-2019_43-R01en.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "931bee77a407d7cac9903477894810bce47403734cab01759f47610e3893207a",
"txt_hash": "1536726b489b3c3e034a7dac065b2b256070bd34215cb676957f2a4ed2665ad9"
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "f3426fdae3fee4d856b1df6d023be79cfaed491a269c0482fdfdfd933f791ad6",
"txt_hash": "044dfcf646a5adec650684c4814c11e01970bcd86fc945133f97ac8087bf1d05"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "721b861d8ff39f2f30b78cec09ad185b4cb403af541125a4bc31a3708225959b",
"txt_hash": "c1ddb72e4a5f436cebaf0e62e535d056292463c87a63e95408363e3406dfbcfd"
}
},
"status": "active"
}