IDnomic ID CA Version 1.3.7

CSV information ?

Status active
Valid from 12.05.2021
Valid until 12.05.2026
Scheme 🇫🇷 FR
Manufacturer IDNOMIC
Category Key Management Systems
Security level EAL4+, ALC_FLR.3

Heuristics summary ?

Certificate ID: ANSSI-CC-2021/17

Certificate ?

Extracted keywords

Security level
EAL 4, EAL2, EAL4
Security Assurance Requirements (SAR)
ALC_FLR.3
Certificates
ANSSI-CC-2021/17
Evaluation facilities
OPPIDA

File metadata

Creation date: D:20210519154758+02'00'
Modification date: D:20210519154758+02'00'
Pages: 2
Creator: PScript5.dll Version 5.2.2
Producer: Acrobat Distiller 11.0 (Windows)

Certification report ?

Extracted keywords

Symmetric Algorithms
DES

Security level
EAL 4, EAL2, EAL4, EAL 1, EAL 3, EAL 5, EAL 7, ITSEC E3 Elémentaire
Security Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE, AGD_PRE, ALC_FLR.3, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_LCD, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.3, AVA_VAN, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSS
Certificates
ANSSI-CC-2021/17
Evaluation facilities
CESTI, OPPIDA

Standards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004

File metadata

Creation date: D:20210519154641+02'00'
Modification date: D:20210519154641+02'00'
Pages: 14
Creator: PScript5.dll Version 5.2.2
Producer: Acrobat Distiller 11.0 (Windows)

References

No references.

Security target ?

Extracted keywords

Asymmetric Algorithms
ECDSA
Protocols
SSH, TLS, IPsec

Security level
EAL4, EAL4 augmented
Claims
T.PRIVILEGED_USER_ERROR, T.UNDETECTED_ACTIONS, T.UNAUTHORIZED_ACCESS, T.TSF_FAILURE, T.UNAUTHORIZED_UPDATE, T.USER_DATA_REUSE, T.UNAUTHENTICATED_TRANSACTIONS, T.WEAK_CRYPTO, A.NO_GENERAL_PURPOSE, A.PHYSICAL, A.TRUSTED_ADMIN, A.BACK_UP, A.COMSEC, A.NTP, A.OPERATING_SYSTEM, A.HSM, A.RPM_SIGNATURE, OT.RECOVERY, OT.INTEGRITY_PROTECTION, OT.TOE_ADMINISTRATION, OT.AUDIT_PROTECTION, OT.AUDIT_LOSS_RESPONSE, OT.SYSTEM_MONITORING, OT.VERIFIABLE_UPDATES, OT.RESIDUAL_INFORMATION_CLEARING, OT.KEY_ESCROW, OT.CERTIFICATES, OT.NON_REPUDIATION, OT.CONFIGURATION_MANAGEMENT, OE.NO_GENERAL_PURPOSE, OE.PHYSICAL, OE.TRUSTED_ADMIN, OE.BACKUP, OE.COMSEC, OE.NTP, OE.OPERATING_SYSTEM, OE.HSM, OE.RPM_SIGNATURE
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_IMP.1, ADV_TDS.1, ADV_TDS.3, ADV_FSP.4, ADV_FSP.1, ADV_FSP.2, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_FLR.3, ALC_CMC.4, ALC_DEL.1, ALC_TAT.1, ALC_DVS.1, ALC_LCD.1, ATE_COV.2, ATE_DPT.1, ATE_IND.2, ATE_FUN.1, ATE_COV.1, AVA_VAN.4, AVA_VAN.3, ASE_CCL.1, ASE_INT.1, ASE_REQ.2, ASE_TSS.1, ASE_ECD.1, ASE_REQ.1, ASE_OBJ.2, ASE_SPD.1
Security Functional Requirements (SFR)
FAU_STG_EXT, FAU_STG.4, FAU_STG.3, FAU_GEN.1, FAU_GEN.2, FAU_SAR.1, FAU_SAR.3, FAU_SEL.1, FAU_STG.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.3.1, FAU_SEL.1.1, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.3.1, FAU_GEN, FCO_NRO_EXT, FCO_NRR_EXT, FCO_NRO_EXT.2, FCO_NRR_EXT.2, FCO_NRO_EXT.2.1, FCO_NRO_EXT.2.3, FCO_NRO_EXT.2.4, FCO_NRO_EXT.2.5, FCO_NRR_EXT.2.1, FCO_NRO_EXT.2.2, FCS_CKM.4, FCS_CKM.1, FCS_COP.1, FCS_CKM.5, FCS_CKM_EXT, FCS_STG_EXT, FCS_CKM_EXT.1, FCS_CKM_EXT.2, FCS_STG_EXT.1, FCS_CKM.1.1, FCS_CKM_EXT.1.1, FCS_CKM_EXT.2.1, FCS_CKM.4.1, FCS_COP.1.1, FCS_STG_EXT.1.1, FCS_CKM.2, FCS_CKM, FDP_CER_EXT, FDP_CSI_EXT, FDP_CRL_EXT, FDP_STG_EXT, FDP_CER_EXT.1, FDP_CER_EXT.2, FDP_CER_EXT.3, FDP_CSI_EXT.1, FDP_CRL_EXT.1, FDP_STG_EXT.1, FDP_RIP.2, FDP_CER_EXT.1.1, FDP_CER_EXT.1.2, FDP_CER_EXT.1.3, FDP_CER_EXT.2.1, FDP_CER_EXT.3.1, FDP_CSI_EXT.1.1, FDP_CSI_EXT.1.2, FDP_CRL_EXT.1.1, FDP_STG_EXT.1.1, FDP_RIP.2.1, FDP_ITC.1, FDP_ITC.2, FIA_UAU.2, FIA_UID.2, FIA_UAU.2.1, FIA_UID.2.1, FIA_CMC_EXT.1, FIA_EST_EXT.1, FIA_UID.1, FMT_MOF.1, FMT_MTD.1, FMT_SMF.1, FMT_SMR.2, FMT_SMF, FMT_SMF.1.1, FMT_SMR, FMT_SMR.2.1, FMT_SMR.2.2, FMT_SMR.2.3, FMT_MOF.1.1, FMT_MTD, FMT_MTD.1.1, FMT_SMR.1, FPT_TST.2, FPT_STM.1, FPT_TUD_EXT.1, FPT_FLS.1, FPT_SKP_EXT, FPT_TUD_EXT, FPT_SKP_EXT.1, FPT_SKP_EXT.1.1, FPT_TUD_EXT.1.1, FPT_TUD_EXT.1.2, FPT_TUD_EXT.1.3, FTA_TAB.1, FTA_SSL.3, FTA_SSL.4, FTA_SSL.4.1, FTP_ITC.1, FTP_TRP.1, FTP_TUD_EXT.1
Evaluation facilities
OPPIDA

Standards
PKCS#11, RFC 5280, RFC 5652, RFC 6960, X.509

File metadata

Title: Common Criteria Security Target
Subject: IDnomic ID CA
Author: IDnomic
Creation date: D:20210423093956+02'00'
Modification date: D:20210423094159+02'00'
Pages: 58
Creator: Acrobat PDFMaker 17 pour Word
Producer: Adobe PDF Library 17.11.238

References

No references.

Heuristics ?

Certificate ID: ANSSI-CC-2021/17

Extracted SARs

ALC_DVS.1, AGD_PRE.1, ASE_REQ.2, ASE_OBJ.2, ALC_FLR.3, AGD_OPE.1, AVA_VAN.4, ASE_TSS.1, ALC_CMC.4, ASE_CCL.1, ASE_INT.1, ALC_DEL.1, ASE_ECD.1, ALC_LCD.1, ALC_TAT.1, ATE_FUN.1, ATE_DPT.1, ADV_FSP.4, ADV_TDS.3, ASE_SPD.1, ATE_COV.2, ATE_IND.2, ADV_IMP.1, ADV_ARC.1

Scheme data ?

Product IDnomic ID CA Version 1.3.7
Url https://cyber.gouv.fr/produits-certifies/idnomic-id-ca-version-137
Description Le produit évalué est « IDnomic ID CA, Version 1.3.7 » développé par IDNOMIC, marque commerciale de KEYNECTIS SA. Ce produit est une autorité de certification (AC) et intervient en tant que composant principal dans une infrastructure de gestion de clés (IGC). La TOE consiste en des programmes, formats de données, procédures, protocoles de communications, politiques de sécurité et mécanismes de cr
Sponsor IDNOMIC
Developer IDNOMIC
Cert Id 2021/17
Level EAL4+
Expiration Date 12 Mai 2026
Enhanced
Cert Id 2021/17
Certification Date 12/05/2021
Expiration Date 12/05/2026
Category Produits pour ordinateur personnel et serveur
Cc Version Critères Communs version 3.1r5
Developer IDNOMIC
Sponsor IDNOMIC
Evaluation Facility OPPIDA
Level EAL4+
Protection Profile
Mutual Recognition SOG-IS CCRA
Augmented ALC_FLR.3
Cert Link https://cyber.gouv.fr/sites/default/files/2021/05/certificat_2021_17fr.pdf
Target Link https://cyber.gouv.fr/sites/default/files/2021/05/anssi-cible-2021-17en.pdf
Report Link https://cyber.gouv.fr/sites/default/files/2021/05/anssi-cc-2021_17fr.pdf

References ?

No references are available for this certificate.

Updates ?

  • 15.02.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '080e2277524778c58ebdeeffbf38b7f8082866b4924e6d0a3867d2a33a0e3d3b', 'txt_hash': '83004789d08d8073012f835ba105e965483b6f9326bf4aa3b96789367040acd7'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'c0bf5b4f90559db4c7e2814af6a7605c75c960374a482392d4f869c8e6037731', 'txt_hash': '1d3ffe8d0a26c11cb213f8c2fa3b3076473ea3399d6b2269f8ff527fa90b852d'}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '7cecd3c179e0da323c7ee414394afd9b9dc77305aa752523a10346c42d1d8d13', 'txt_hash': '0d62468afedc2a985a83d3a66a345bf2cb5601a215db1c7fc8dcdaf048545d5c'}}.
    • The following properties were deleted: ['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash'].

    The PDF extraction data was updated.

    • The following values were inserted: {'cert_metadata': {'pdf_file_size_bytes': 279186, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 2, '/Author': '', '/CreationDate': "D:20210519154758+02'00'", '/Creator': 'PScript5.dll Version 5.2.2', '/ModDate': "D:20210519154758+02'00'", '/Producer': 'Acrobat Distiller 11.0 (Windows)', '/Title': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}, 'cert_frontpage': None, 'cert_keywords': {'cc_cert_id': {'FR': {'ANSSI-CC-2021/17': 2}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 1, 'EAL2': 1, 'EAL4': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.3': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'OPPIDA': {'OPPIDA': 2}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}, 'cert_filename': 'certificat_2021_17fr.pdf'}.
    • The report_frontpage property was set to {'FR': {}}.
    • The st_frontpage property was set to None.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'FR': {'__update__': {'ANSSI-CC-2021/17': 2}}}}} data.
  • 13.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'FR': {'__update__': {'ANSSI-CC-2021/17': 4}}}}} data.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__delete__': ['CA']}} data.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__insert__': {'CA': {'7 5 7': 1, '2 0 2': 13, '1 4 1': 1, '1 4 2': 1, '1 4 3': 1, '1 1 1': 21, '1 2 3': 5, '5 5 6': 1, '1 1 2': 1, '2 3 3': 1, '5 6 3': 1, '4 5 5': 2, '5 5 5': 1, '1 2 2': 5, '2 2 2': 2, '3 3 2': 1, '1 1 3': 1, '2 2 1': 1, '2 2 3': 1}}, '__update__': {'FR': {'__update__': {'ANSSI-CC-2021/17': 2}}}}} data.
  • 05.02.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'description': 'Le produit évalué est « IDnomic ID CA, Version 1.3.7 » développé par IDNOMIC, marque commerciale de KEYNECTIS SA.\nCe produit est une autorité de certification (AC) et intervient en tant que composant principal dans une infrastructure de gestion de clés (IGC). La TOE consiste en des programmes, formats de données, procédures, protocoles de communications, politiques de sécurité et mécanismes de cr'} data.
  • 04.01.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'annotated_references': None}.
    • The scheme_data property was updated, with the {'url': 'https://cyber.gouv.fr/produits-certifies/idnomic-id-ca-version-137', 'enhanced': {'__insert__': {'cert_id': '2021/17', 'sponsor': 'IDNOMIC', 'protection_profile': '', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ALC_FLR.3'}, '__update__': {'developer': 'IDNOMIC', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2021/05/anssi-cc-2021_17fr.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2021/05/anssi-cible-2021-17en.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/2021/05/certificat_2021_17fr.pdf'}, '__delete__': ['id', 'augmentations', 'recognition', 'description']}} data.
  • 26.04.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'scheme_data': {'product': 'IDnomic ID CA Version 1.3.7', 'vendor': 'IDNOMICIDNOMIC', 'level': 'EAL4+', 'id': '2021/17', 'certification_date': '12/05/2021', 'category': 'Products for PC and servers', 'url': 'https://www.ssi.gouv.fr/certification_cc/idnomic-id-ca-version-1-3-7/', 'enhanced': {'id': '2021/17', 'certification_date': '12/05/2021', 'expiration_date': '12/05/2026', 'category': 'Produits pour ordinateur personnel et serveur', 'cc_version': 'Critères Communs version 3.1r5', 'level': 'EAL4+', 'augmentations': 'ALC_FLR.3', 'developer': 'IDNOMIC / IDNOMIC', 'evaluation_facility': 'OPPIDA', 'recognition': 'SOG-IS - CCRA', 'description': 'Descriptif du produit\n\t\t\t\tLe produit évalué est « IDnomic ID CA, Version 1.3.7 » développé par IDNOMIC, marque commerciale de KEYNECTIS SA.\nCe produit est une autorité de certification (AC) et intervient en tant que composant principal dans une infrastructure de gestion de clés (IGC). La TOE consiste en des programmes, formats de données, procédures, protocoles de communications, politiques de sécurité et mécanismes de cryptographie à clé publique fonctionnant ensemble pour permettre à des personnes d’établir des relations de confiance à travers l’usage de certificats électroniques.\n\t\t\t\t\n Rapport de certification\nSecurity target\nCertificat', 'report_link': 'https://www.ssi.gouv.fr/uploads/2021/05/anssi-cc-2021_17fr.pdf', 'target_link': 'https://www.ssi.gouv.fr/uploads/2021/05/anssi-cible-2021-17en.pdf', 'cert_link': 'https://www.ssi.gouv.fr/uploads/2021/05/certificat_2021_17fr.pdf'}}}.
  • 11.02.2023 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.cc.CCCertificate.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.InternalState.
    • The following properties were deleted: ['errors'].

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.PdfData.

    The computed heuristics were updated.

    • The following values were inserted: {'direct_transitive_cves': None, 'indirect_transitive_cves': None}.
    • The _type property was set to sec_certs.sample.cc.CCCertificate.Heuristics.
    • The following properties were deleted: ['direct_dependency_cves', 'indirect_dependency_cves'].
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report_download_ok property was set to True.
    • The report_convert_ok property was set to True.
    • The report_extract_ok property was set to True.
    • The errors property was set to [].
    • The report_pdf_hash property was set to 080e2277524778c58ebdeeffbf38b7f8082866b4924e6d0a3867d2a33a0e3d3b.
    • The report_txt_hash property was set to 83004789d08d8073012f835ba105e965483b6f9326bf4aa3b96789367040acd7.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 223359, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 14, '/Author': '', '/CreationDate': "D:20210519154641+02'00'", '/Creator': 'PScript5.dll Version 5.2.2', '/ModDate': "D:20210519154641+02'00'", '/Producer': 'Acrobat Distiller 11.0 (Windows)', '/Title': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The report_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2021/17': 4}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 2, 'EAL2': 2, 'EAL4': 2, 'EAL 1': 1, 'EAL 3': 1, 'EAL 5': 1, 'EAL 7': 1}, 'ITSEC': {'ITSEC E3 Elémentaire': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_FLR.3': 2, 'ALC_FLR': 2, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_LCD': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.3': 1, 'AVA_VAN': 1}, 'ASE': {'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'CESTI': {'CESTI': 1}, 'OPPIDA': {'OPPIDA': 3}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to anssi-cc-2021_17fr.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to ANSSI-CC-2021/17.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The cert_link was updated.

    • The new value is https://www.commoncriteriaportal.org/files/epfiles/certificat_2021_17fr.pdf.

    The manufacturer_web was updated.

    • The new value is https://atos.net/en/solutions/cyber-security-products/idnomic-pki-solutions-for-digital-identities-security.

    The state of the certificate object was updated.

    • The report_download_ok property was set to False.
    • The report_convert_ok property was set to False.
    • The report_extract_ok property was set to False.
    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2021_17fr.pdf, code: 408', 'failed to download report from https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2021_17fr.pdf, code: 408'].
    • The report_pdf_hash property was set to None.
    • The report_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The report_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The cert_link was updated.

    • The new value is None.

    The manufacturer_web was updated.

    • The new value is None.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': 'anssi-cc-2021_17fr.pdf', 'st_filename': 'anssi-cible-2021-17en.pdf'}.
    • The report_keywords property was updated, with the {'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL 4': 2}, '__delete__': ['EAL 2', 'EAL 6']}}}, 'cc_sar': {'__update__': {'ALC': {'__update__': {'ALC_FLR.3': 2, 'ALC_FLR': 2}}}}, 'eval_facility': {'__update__': {'OPPIDA': {'__update__': {'OPPIDA': 3}}}}, 'symmetric_crypto': {'__update__': {'DES': {'__update__': {'DES': {'__update__': {'DES': 1}}}}}}, 'tee_name': {}, 'standard_id': {'__update__': {'CC': {'__insert__': {'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}}}} data.
    • The st_keywords property was updated, with the {'cc_sar': {'__update__': {'ADV': {'__update__': {'ADV_FSP.4': 6, 'ADV_IMP.1': 5, 'ADV_TDS.3': 6, 'ADV_FSP.1': 2}}, 'AGD': {'__update__': {'AGD_PRE.1': 5}}, 'ALC': {'__update__': {'ALC_DVS.1': 3, 'ALC_FLR.3': 4, 'ALC_LCD.1': 3}, '__delete__': ['ALC_CMS.4']}, 'ATE': {'__update__': {'ATE_COV.2': 3, 'ATE_DPT.1': 3, 'ATE_FUN.1': 6}}, 'ASE': {'__update__': {'ASE_ECD.1': 4, 'ASE_INT.1': 3, 'ASE_OBJ.2': 2, 'ASE_REQ.2': 3, 'ASE_SPD.1': 1}}}}, 'cc_sfr': {'__update__': {'FAU': {'__update__': {'FAU_STG.3': 6, 'FAU_GEN.1': 12, 'FAU_SAR.1': 7, 'FAU_SAR.3': 5, 'FAU_STG.1': 7}}, 'FCS': {'__insert__': {'FCS_CKM': 1}, '__update__': {'FCS_CKM.4': 16, 'FCS_CKM.1': 15, 'FCS_COP.1': 44, 'FCS_STG_EXT.1': 13}}, 'FDP': {'__update__': {'FDP_CER_EXT.1': 14, 'FDP_CSI_EXT.1': 16, 'FDP_RIP.2': 14, 'FDP_CER_EXT.3.1': 1}}, 'FIA': {'__update__': {'FIA_UID.2': 6, 'FIA_UID.1': 2}}, 'FMT': {'__insert__': {'FMT_SMF': 1, 'FMT_SMR': 1, 'FMT_MTD': 1}, '__update__': {'FMT_MOF.1': 24, 'FMT_MTD.1': 7, 'FMT_SMR.2': 5}}, 'FPT': {'__update__': {'FPT_SKP_EXT.1': 12}}}}, 'cc_claims': {'__update__': {'T': {'__update__': {'T.UNDETECTED_ACTIONS': 1, 'T.TSF_FAILURE': 1, 'T.USER_DATA_REUSE': 1, 'T.WEAK_CRYPTO': 1}, '__delete__': ['T.RECOVERY', 'T.INTEGRITY_PROTECTION', 'T.TOE_ADMINISTRATION', 'T.AUDIT_PROTECTION', 'T.AUDIT_LOSS_RESPONSE', 'T.SYSTEM_MONITORING', 'T.VERIFIABLE_UPDATES', 'T.RESIDUAL_INFORMATION_CLEARING', 'T.KEY_ESCROW', 'T.CERTIFICATES', 'T.NON_REPUDIATION', 'T.CONFIGURATION_MANAGEMENT']}, 'A': {'__update__': {'A.PHYSICAL': 1, 'A.COMSEC': 1, 'A.HSM': 1}, '__delete__': ['A.BACKUP']}, 'OT': {'__update__': {'OT.AUDIT_LOSS_RESPONSE': 5, 'OT.SYSTEM_MONITORING': 3, 'OT.RESIDUAL_INFORMATION_CLEARING': 3, 'OT.KEY_ESCROW': 3, 'OT.NON_REPUDIATION': 3}}}}, 'vendor': {}, 'asymmetric_crypto': {'__delete__': ['FF']}, 'crypto_protocol': {'__update__': {'TLS': {'__update__': {'TLS': {'__update__': {'TLS': 9}}}}}}, 'cipher_mode': {}, 'tee_name': {}, 'standard_id': {'__update__': {'X509': {'__update__': {'X.509': 5}}}}} data.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}]} values discarded.
  • 28.07.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_extract_ok property was set to True.
    • The errors property was set to [].

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 1023987, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 58, '/Author': 'IDnomic', '/Category': '[Mettre à jour la propriété "Catégorie" du document pour insérer ici le numéro de chrono/ref du document]', '/Company': 'Microsoft', '/CreationDate': "D:20210423093956+02'00'", '/Creator': 'Acrobat PDFMaker 17 pour Word', '/MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_ActionId': '09aba970-b117-4f0a-bebd-4540198027e9', '/MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_ContentBits': '0', '/MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_Enabled': 'true', '/MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_Method': 'Standard', '/MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_Name': 'All Employees_2', '/MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_SetDate': '2021-01-08T16:57:10Z', '/MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_SiteId': '33440fc6-b7c7-412c-bb73-0e70b0198d5a', '/ModDate': "D:20210423094159+02'00'", '/Producer': 'Adobe PDF Library 17.11.238', '/SourceModified': '', '/Subject': 'IDnomic ID CA', '/Title': 'Common Criteria Security Target', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]}.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_extract_ok property was set to False.
    • The errors property was set to ['Failed to read metadata of certs/targets/pdf/abc5ebc2d7461bae.pdf, error: can only concatenate list (not "IndirectObject") to list', 'Failed to read metadata of certs/targets/pdf/abc5ebc2d7461bae.pdf, error: can only concatenate list (not "IndirectObject") to list'].

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': []}} values inserted.
    • The st_metadata property was set to None.
    • The report_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2021/17': 4}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 4, 'EAL2': 2, 'EAL4': 2, 'EAL 1': 1, 'EAL 2': 1, 'EAL 3': 1, 'EAL 5': 1, 'EAL 6': 1, 'EAL 7': 1}, 'ITSEC': {'ITSEC E3 Elémentaire': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_FLR.3': 1, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_FLR': 1, 'ALC_LCD': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.3': 1, 'AVA_VAN': 1}, 'ASE': {'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'CESTI': {'CESTI': 1}, 'OPPIDA': {'OPPIDA': 1}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 3}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 1}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 2, 'EAL4 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 6, 'ADV_FSP.4': 11, 'ADV_IMP.1': 6, 'ADV_TDS.3': 9, 'ADV_FSP.1': 3, 'ADV_TDS.1': 2, 'ADV_FSP.2': 2, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE.1': 6, 'AGD_PRE.1': 6}, 'ALC': {'ALC_CMC.4': 2, 'ALC_CMS.4': 4, 'ALC_DEL.1': 2, 'ALC_DVS.1': 4, 'ALC_FLR.3': 2, 'ALC_LCD.1': 4, 'ALC_TAT.1': 4}, 'ATE': {'ATE_COV.2': 4, 'ATE_DPT.1': 4, 'ATE_FUN.1': 8, 'ATE_IND.2': 2, 'ATE_COV.1': 2}, 'AVA': {'AVA_VAN.4': 2, 'AVA_VAN.3': 2}, 'ASE': {'ASE_CCL.1': 2, 'ASE_ECD.1': 6, 'ASE_INT.1': 6, 'ASE_OBJ.2': 4, 'ASE_REQ.2': 4, 'ASE_SPD.1': 4, 'ASE_TSS.1': 2, 'ASE_REQ.1': 2}}, 'cc_sfr': {'FAU': {'FAU_STG_EXT': 1, 'FAU_STG.4': 1, 'FAU_STG.3': 7, 'FAU_GEN.1': 16, 'FAU_GEN.2': 6, 'FAU_SAR.1': 8, 'FAU_SAR.3': 6, 'FAU_SEL.1': 6, 'FAU_STG.1': 8, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.3.1': 1, 'FAU_SEL.1.1': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_STG.3.1': 1, 'FAU_GEN': 6}, 'FCO': {'FCO_NRO_EXT': 3, 'FCO_NRR_EXT': 3, 'FCO_NRO_EXT.2': 13, 'FCO_NRR_EXT.2': 12, 'FCO_NRO_EXT.2.1': 2, 'FCO_NRO_EXT.2.3': 2, 'FCO_NRO_EXT.2.4': 2, 'FCO_NRO_EXT.2.5': 2, 'FCO_NRR_EXT.2.1': 2, 'FCO_NRO_EXT.2.2': 1}, 'FCS': {'FCS_CKM.4': 17, 'FCS_CKM.1': 19, 'FCS_COP.1': 49, 'FCS_CKM.5': 1, 'FCS_CKM_EXT': 4, 'FCS_STG_EXT': 3, 'FCS_STG_EXT.1': 14, 'FCS_CKM_EXT.1': 12, 'FCS_CKM_EXT.2': 12, 'FCS_CKM.1.1': 1, 'FCS_CKM_EXT.1.1': 2, 'FCS_CKM_EXT.2.1': 2, 'FCS_CKM.4.1': 1, 'FCS_COP.1.1': 4, 'FCS_STG_EXT.1.1': 2, 'FCS_CKM.2': 1}, 'FDP': {'FDP_CER_EXT': 5, 'FDP_CSI_EXT': 3, 'FDP_CRL_EXT': 3, 'FDP_STG_EXT': 3, 'FDP_CER_EXT.1': 15, 'FDP_CER_EXT.2': 12, 'FDP_CER_EXT.3': 12, 'FDP_CSI_EXT.1': 17, 'FDP_CRL_EXT.1': 12, 'FDP_STG_EXT.1': 12, 'FDP_RIP.2': 12, 'FDP_CER_EXT.1.1': 2, 'FDP_CER_EXT.1.2': 2, 'FDP_CER_EXT.1.3': 2, 'FDP_CER_EXT.2.1': 2, 'FDP_CER_EXT.3.1': 2, 'FDP_CSI_EXT.1.1': 2, 'FDP_CSI_EXT.1.2': 2, 'FDP_CRL_EXT.1.1': 2, 'FDP_STG_EXT.1.1': 2, 'FDP_RIP.2.1': 1, 'FDP_ITC.1': 5, 'FDP_ITC.2': 5}, 'FIA': {'FIA_UAU.2': 5, 'FIA_UID.2': 8, 'FIA_UAU.2.1': 1, 'FIA_UID.2.1': 1, 'FIA_CMC_EXT.1': 3, 'FIA_EST_EXT.1': 3, 'FIA_UID.1': 3}, 'FMT': {'FMT_MOF.1': 27, 'FMT_MTD.1': 8, 'FMT_SMF.1': 15, 'FMT_SMR.2': 10, 'FMT_SMF.1.1': 1, 'FMT_SMR.2.1': 3, 'FMT_SMR.2.2': 1, 'FMT_SMR.2.3': 1, 'FMT_MOF.1.1': 4, 'FMT_MTD.1.1': 1, 'FMT_SMR.1': 5}, 'FPT': {'FPT_TST.2': 1, 'FPT_STM.1': 2, 'FPT_TUD_EXT.1': 12, 'FPT_FLS.1': 1, 'FPT_SKP_EXT': 3, 'FPT_TUD_EXT': 3, 'FPT_SKP_EXT.1': 11, 'FPT_SKP_EXT.1.1': 2, 'FPT_TUD_EXT.1.1': 2, 'FPT_TUD_EXT.1.2': 2, 'FPT_TUD_EXT.1.3': 2}, 'FTA': {'FTA_TAB.1': 1, 'FTA_SSL.3': 1, 'FTA_SSL.4': 7, 'FTA_SSL.4.1': 1}, 'FTP': {'FTP_ITC.1': 1, 'FTP_TRP.1': 1, 'FTP_TUD_EXT.1': 1}}, 'cc_claims': {'T': {'T.RECOVERY': 1, 'T.INTEGRITY_PROTECTION': 1, 'T.PRIVILEGED_USER_ERROR': 2, 'T.TOE_ADMINISTRATION': 6, 'T.AUDIT_PROTECTION': 6, 'T.AUDIT_LOSS_RESPONSE': 7, 'T.UNDETECTED_ACTIONS': 2, 'T.SYSTEM_MONITORING': 5, 'T.UNAUTHORIZED_ACCESS': 2, 'T.TSF_FAILURE': 2, 'T.UNAUTHORIZED_UPDATE': 2, 'T.VERIFIABLE_UPDATES': 6, 'T.USER_DATA_REUSE': 2, 'T.RESIDUAL_INFORMATION_CLEARING': 5, 'T.KEY_ESCROW': 5, 'T.UNAUTHENTICATED_TRANSACTIONS': 2, 'T.CERTIFICATES': 5, 'T.NON_REPUDIATION': 5, 'T.CONFIGURATION_MANAGEMENT': 5, 'T.WEAK_CRYPTO': 2}, 'A': {'A.NO_GENERAL_PURPOSE': 2, 'A.PHYSICAL': 2, 'A.TRUSTED_ADMIN': 2, 'A.BACK_UP': 1, 'A.COMSEC': 2, 'A.NTP': 3, 'A.OPERATING_SYSTEM': 2, 'A.HSM': 2, 'A.RPM_SIGNATURE': 2, 'A.BACKUP': 1}, 'OT': {'OT.RECOVERY': 1, 'OT.INTEGRITY_PROTECTION': 1, 'OT.TOE_ADMINISTRATION': 6, 'OT.AUDIT_PROTECTION': 6, 'OT.AUDIT_LOSS_RESPONSE': 7, 'OT.SYSTEM_MONITORING': 5, 'OT.VERIFIABLE_UPDATES': 6, 'OT.RESIDUAL_INFORMATION_CLEARING': 5, 'OT.KEY_ESCROW': 5, 'OT.CERTIFICATES': 5, 'OT.NON_REPUDIATION': 5, 'OT.CONFIGURATION_MANAGEMENT': 5}, 'OE': {'OE.NO_GENERAL_PURPOSE': 3, 'OE.PHYSICAL': 3, 'OE.TRUSTED_ADMIN': 3, 'OE.BACKUP': 3, 'OE.COMSEC': 5, 'OE.NTP': 3, 'OE.OPERATING_SYSTEM': 3, 'OE.HSM': 3, 'OE.RPM_SIGNATURE': 3}}, 'vendor': {'STMicroelectronics': {'STM': 2}}, 'eval_facility': {'OPPIDA': {'OPPIDA': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {'ECC': {'ECDSA': {'ECDSA': 5}}, 'FF': {'DSA': {'DSA': 8}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 2}, 'TLS': {'TLS': {'TLS': 8}}, 'IPsec': {'IPsec': 1}}, 'randomness': {}, 'cipher_mode': {'CBC': {'CBC': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 14}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'PKCS': {'PKCS#11': 1}, 'RFC': {'RFC 5280': 11, 'RFC 5652': 1, 'RFC 6960': 2}, 'X509': {'X.509': 3}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': '080e2277524778c58ebdeeffbf38b7f8082866b4924e6d0a3867d2a33a0e3d3b', 'st_pdf_hash': 'c0bf5b4f90559db4c7e2814af6a7605c75c960374a482392d4f869c8e6037731', 'report_txt_hash': '83004789d08d8073012f835ba105e965483b6f9326bf4aa3b96789367040acd7', 'st_txt_hash': '1d3ffe8d0a26c11cb213f8c2fa3b3076473ea3399d6b2269f8ff527fa90b852d'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {'DES': 3}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {}, 'rules_randomness': {}, 'rules_tee': {'SE': 1}, 'rules_side_channels': {}} values inserted.
    • The st_keywords property was updated, with the {'rules_symmetric_crypto': {}, 'rules_asymmetric_crypto': {'ECDSA': 5, 'DSA': 8}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {'TLS': 8}, 'rules_randomness': {}, 'rules_tee': {'SE': 14}, 'rules_side_channels': {}} values inserted.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'AVA_VAN', 'level': 4}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_FLR', 'level': 3}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 4}]}}.
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}}.
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['1.3.7']}.
  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name IDnomic ID CA Version 1.3.7 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Key Management Systems",
  "cert_link": "https://www.commoncriteriaportal.org/files/epfiles/certificat_2021_17fr.pdf",
  "dgst": "abc5ebc2d7461bae",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2021/17",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.3.7"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "cert_id": "2021/17",
      "description": "Le produit \u00e9valu\u00e9 est \u00ab IDnomic ID CA, Version 1.3.7 \u00bb d\u00e9velopp\u00e9 par IDNOMIC, marque commerciale de KEYNECTIS SA.\nCe produit est une autorit\u00e9 de certification (AC) et intervient en tant que composant principal dans une infrastructure de gestion de cl\u00e9s (IGC). La TOE consiste en des programmes, formats de donn\u00e9es, proc\u00e9dures, protocoles de communications, politiques de s\u00e9curit\u00e9 et m\u00e9canismes de cr",
      "developer": "IDNOMIC",
      "enhanced": {
        "augmented": "ALC_FLR.3",
        "category": "Produits pour ordinateur personnel et serveur",
        "cc_version": "Crit\u00e8res Communs version 3.1r5",
        "cert_id": "2021/17",
        "cert_link": "https://cyber.gouv.fr/sites/default/files/2021/05/certificat_2021_17fr.pdf",
        "certification_date": "12/05/2021",
        "developer": "IDNOMIC",
        "evaluation_facility": "OPPIDA",
        "expiration_date": "12/05/2026",
        "level": "EAL4+",
        "mutual_recognition": "SOG-IS\n                          CCRA",
        "protection_profile": "",
        "report_link": "https://cyber.gouv.fr/sites/default/files/2021/05/anssi-cc-2021_17fr.pdf",
        "sponsor": "IDNOMIC",
        "target_link": "https://cyber.gouv.fr/sites/default/files/2021/05/anssi-cible-2021-17en.pdf"
      },
      "expiration_date": "12 Mai 2026",
      "level": "EAL4+",
      "product": "IDnomic ID CA Version 1.3.7",
      "sponsor": "IDNOMIC",
      "url": "https://cyber.gouv.fr/produits-certifies/idnomic-id-ca-version-137"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "IDNOMIC",
  "manufacturer_web": "https://atos.net/en/solutions/cyber-security-products/idnomic-pki-solutions-for-digital-identities-security",
  "name": "IDnomic ID CA Version 1.3.7",
  "not_valid_after": "2026-05-12",
  "not_valid_before": "2021-05-12",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "certificat_2021_17fr.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2021/17": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR.3": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 1,
          "EAL2": 1,
          "EAL4": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "OPPIDA": {
          "OPPIDA": 2
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "",
      "/CreationDate": "D:20210519154758+02\u002700\u0027",
      "/Creator": "PScript5.dll Version 5.2.2",
      "/ModDate": "D:20210519154758+02\u002700\u0027",
      "/Producer": "Acrobat Distiller 11.0 (Windows)",
      "/Title": "",
      "pdf_file_size_bytes": 279186,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 2
    },
    "report_filename": "anssi-cc-2021_17fr.pdf",
    "report_frontpage": {
      "FR": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2021/17": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_FSP": 1,
          "ADV_IMP": 1,
          "ADV_INT": 1,
          "ADV_SPM": 1,
          "ADV_TDS": 1
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_PRE": 1
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMS": 1,
          "ALC_DEL": 1,
          "ALC_DVS": 1,
          "ALC_FLR": 2,
          "ALC_FLR.3": 2,
          "ALC_LCD": 1,
          "ALC_TAT": 1
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_ECD": 1,
          "ASE_INT": 1,
          "ASE_OBJ": 1,
          "ASE_REQ": 1,
          "ASE_SPD": 1,
          "ASE_TSS": 1
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_DPT": 1,
          "ATE_FUN": 1,
          "ATE_IND": 1
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.3": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 3": 1,
          "EAL 4": 2,
          "EAL 5": 1,
          "EAL 7": 1,
          "EAL2": 2,
          "EAL4": 2
        },
        "ITSEC": {
          "ITSEC E3 El\u00e9mentaire": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "CESTI": {
          "CESTI": 1
        },
        "OPPIDA": {
          "OPPIDA": 3
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1,
          "CCMB-2017-04-004": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "",
      "/CreationDate": "D:20210519154641+02\u002700\u0027",
      "/Creator": "PScript5.dll Version 5.2.2",
      "/ModDate": "D:20210519154641+02\u002700\u0027",
      "/Producer": "Acrobat Distiller 11.0 (Windows)",
      "/Title": "",
      "pdf_file_size_bytes": 223359,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 14
    },
    "st_filename": "anssi-cible-2021-17en.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECDSA": {
            "ECDSA": 5
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.BACK_UP": 1,
          "A.COMSEC": 1,
          "A.HSM": 1,
          "A.NO_GENERAL_PURPOSE": 2,
          "A.NTP": 3,
          "A.OPERATING_SYSTEM": 2,
          "A.PHYSICAL": 1,
          "A.RPM_SIGNATURE": 2,
          "A.TRUSTED_ADMIN": 2
        },
        "OE": {
          "OE.BACKUP": 3,
          "OE.COMSEC": 5,
          "OE.HSM": 3,
          "OE.NO_GENERAL_PURPOSE": 3,
          "OE.NTP": 3,
          "OE.OPERATING_SYSTEM": 3,
          "OE.PHYSICAL": 3,
          "OE.RPM_SIGNATURE": 3,
          "OE.TRUSTED_ADMIN": 3
        },
        "OT": {
          "OT.AUDIT_LOSS_RESPONSE": 5,
          "OT.AUDIT_PROTECTION": 6,
          "OT.CERTIFICATES": 5,
          "OT.CONFIGURATION_MANAGEMENT": 5,
          "OT.INTEGRITY_PROTECTION": 1,
          "OT.KEY_ESCROW": 3,
          "OT.NON_REPUDIATION": 3,
          "OT.RECOVERY": 1,
          "OT.RESIDUAL_INFORMATION_CLEARING": 3,
          "OT.SYSTEM_MONITORING": 3,
          "OT.TOE_ADMINISTRATION": 6,
          "OT.VERIFIABLE_UPDATES": 6
        },
        "T": {
          "T.PRIVILEGED_USER_ERROR": 2,
          "T.TSF_FAILURE": 1,
          "T.UNAUTHENTICATED_TRANSACTIONS": 2,
          "T.UNAUTHORIZED_ACCESS": 2,
          "T.UNAUTHORIZED_UPDATE": 2,
          "T.UNDETECTED_ACTIONS": 1,
          "T.USER_DATA_REUSE": 1,
          "T.WEAK_CRYPTO": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 6,
          "ADV_FSP.1": 2,
          "ADV_FSP.2": 2,
          "ADV_FSP.4": 6,
          "ADV_IMP.1": 5,
          "ADV_TDS.1": 2,
          "ADV_TDS.2": 1,
          "ADV_TDS.3": 6
        },
        "AGD": {
          "AGD_OPE.1": 6,
          "AGD_PRE.1": 5
        },
        "ALC": {
          "ALC_CMC.4": 2,
          "ALC_DEL.1": 2,
          "ALC_DVS.1": 3,
          "ALC_FLR.3": 4,
          "ALC_LCD.1": 3,
          "ALC_TAT.1": 4
        },
        "ASE": {
          "ASE_CCL.1": 2,
          "ASE_ECD.1": 4,
          "ASE_INT.1": 3,
          "ASE_OBJ.2": 2,
          "ASE_REQ.1": 2,
          "ASE_REQ.2": 3,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 2
        },
        "ATE": {
          "ATE_COV.1": 2,
          "ATE_COV.2": 3,
          "ATE_DPT.1": 3,
          "ATE_FUN.1": 6,
          "ATE_IND.2": 2
        },
        "AVA": {
          "AVA_VAN.3": 2,
          "AVA_VAN.4": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 2,
          "EAL4 augmented": 2
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 6,
          "FAU_GEN.1": 12,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_GEN.2": 6,
          "FAU_GEN.2.1": 1,
          "FAU_SAR.1": 7,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_SAR.3": 5,
          "FAU_SAR.3.1": 1,
          "FAU_SEL.1": 6,
          "FAU_SEL.1.1": 1,
          "FAU_STG.1": 7,
          "FAU_STG.1.1": 1,
          "FAU_STG.1.2": 1,
          "FAU_STG.3": 6,
          "FAU_STG.3.1": 1,
          "FAU_STG.4": 1,
          "FAU_STG_EXT": 1
        },
        "FCO": {
          "FCO_NRO_EXT": 3,
          "FCO_NRO_EXT.2": 13,
          "FCO_NRO_EXT.2.1": 2,
          "FCO_NRO_EXT.2.2": 1,
          "FCO_NRO_EXT.2.3": 2,
          "FCO_NRO_EXT.2.4": 2,
          "FCO_NRO_EXT.2.5": 2,
          "FCO_NRR_EXT": 3,
          "FCO_NRR_EXT.2": 12,
          "FCO_NRR_EXT.2.1": 2
        },
        "FCS": {
          "FCS_CKM": 1,
          "FCS_CKM.1": 15,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 1,
          "FCS_CKM.4": 16,
          "FCS_CKM.4.1": 1,
          "FCS_CKM.5": 1,
          "FCS_CKM_EXT": 4,
          "FCS_CKM_EXT.1": 12,
          "FCS_CKM_EXT.1.1": 2,
          "FCS_CKM_EXT.2": 12,
          "FCS_CKM_EXT.2.1": 2,
          "FCS_COP.1": 44,
          "FCS_COP.1.1": 4,
          "FCS_STG_EXT": 3,
          "FCS_STG_EXT.1": 13,
          "FCS_STG_EXT.1.1": 2
        },
        "FDP": {
          "FDP_CER_EXT": 5,
          "FDP_CER_EXT.1": 14,
          "FDP_CER_EXT.1.1": 2,
          "FDP_CER_EXT.1.2": 2,
          "FDP_CER_EXT.1.3": 2,
          "FDP_CER_EXT.2": 12,
          "FDP_CER_EXT.2.1": 2,
          "FDP_CER_EXT.3": 12,
          "FDP_CER_EXT.3.1": 1,
          "FDP_CRL_EXT": 3,
          "FDP_CRL_EXT.1": 12,
          "FDP_CRL_EXT.1.1": 2,
          "FDP_CSI_EXT": 3,
          "FDP_CSI_EXT.1": 16,
          "FDP_CSI_EXT.1.1": 2,
          "FDP_CSI_EXT.1.2": 2,
          "FDP_ITC.1": 5,
          "FDP_ITC.2": 5,
          "FDP_RIP.2": 14,
          "FDP_RIP.2.1": 1,
          "FDP_STG_EXT": 3,
          "FDP_STG_EXT.1": 12,
          "FDP_STG_EXT.1.1": 2
        },
        "FIA": {
          "FIA_CMC_EXT.1": 3,
          "FIA_EST_EXT.1": 3,
          "FIA_UAU.2": 5,
          "FIA_UAU.2.1": 1,
          "FIA_UID.1": 2,
          "FIA_UID.2": 6,
          "FIA_UID.2.1": 1
        },
        "FMT": {
          "FMT_MOF.1": 24,
          "FMT_MOF.1.1": 4,
          "FMT_MTD": 1,
          "FMT_MTD.1": 7,
          "FMT_MTD.1.1": 1,
          "FMT_SMF": 1,
          "FMT_SMF.1": 15,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 1,
          "FMT_SMR.1": 5,
          "FMT_SMR.2": 5,
          "FMT_SMR.2.1": 3,
          "FMT_SMR.2.2": 1,
          "FMT_SMR.2.3": 1
        },
        "FPT": {
          "FPT_FLS.1": 1,
          "FPT_SKP_EXT": 3,
          "FPT_SKP_EXT.1": 12,
          "FPT_SKP_EXT.1.1": 2,
          "FPT_STM.1": 2,
          "FPT_TST.2": 1,
          "FPT_TUD_EXT": 3,
          "FPT_TUD_EXT.1": 12,
          "FPT_TUD_EXT.1.1": 2,
          "FPT_TUD_EXT.1.2": 2,
          "FPT_TUD_EXT.1.3": 2
        },
        "FTA": {
          "FTA_SSL.3": 1,
          "FTA_SSL.4": 7,
          "FTA_SSL.4.1": 1,
          "FTA_TAB.1": 1
        },
        "FTP": {
          "FTP_ITC.1": 1,
          "FTP_TRP.1": 1,
          "FTP_TUD_EXT.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IPsec": {
          "IPsec": 1
        },
        "SSH": {
          "SSH": 2
        },
        "TLS": {
          "TLS": {
            "TLS": 9
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "OPPIDA": {
          "OPPIDA": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "PKCS": {
          "PKCS#11": 1
        },
        "RFC": {
          "RFC 5280": 11,
          "RFC 5652": 1,
          "RFC 6960": 2
        },
        "X509": {
          "X.509": 5
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "IDnomic",
      "/Category": "[Mettre \u00e0 jour la propri\u00e9t\u00e9 \"Cat\u00e9gorie\" du document pour ins\u00e9rer ici le num\u00e9ro de chrono/ref du document]",
      "/Company": "Microsoft",
      "/CreationDate": "D:20210423093956+02\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 17 pour Word",
      "/MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_ActionId": "09aba970-b117-4f0a-bebd-4540198027e9",
      "/MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_ContentBits": "0",
      "/MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_Enabled": "true",
      "/MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_Method": "Standard",
      "/MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_Name": "All Employees_2",
      "/MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_SetDate": "2021-01-08T16:57:10Z",
      "/MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_SiteId": "33440fc6-b7c7-412c-bb73-0e70b0198d5a",
      "/ModDate": "D:20210423094159+02\u002700\u0027",
      "/Producer": "Adobe PDF Library 17.11.238",
      "/SourceModified": "",
      "/Subject": "IDnomic ID CA",
      "/Title": "Common Criteria Security Target",
      "pdf_file_size_bytes": 1023987,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 58
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2021_17fr.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4+",
      "ALC_FLR.3"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/anssi-cible-2021-17en.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "7cecd3c179e0da323c7ee414394afd9b9dc77305aa752523a10346c42d1d8d13",
      "txt_hash": "0d62468afedc2a985a83d3a66a345bf2cb5601a215db1c7fc8dcdaf048545d5c"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "080e2277524778c58ebdeeffbf38b7f8082866b4924e6d0a3867d2a33a0e3d3b",
      "txt_hash": "83004789d08d8073012f835ba105e965483b6f9326bf4aa3b96789367040acd7"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "c0bf5b4f90559db4c7e2814af6a7605c75c960374a482392d4f869c8e6037731",
      "txt_hash": "1d3ffe8d0a26c11cb213f8c2fa3b3076473ea3399d6b2269f8ff527fa90b852d"
    }
  },
  "status": "active"
}