ST54J A01

CSV information ?

Status active
Valid from 18.04.2019
Valid until 08.02.2026
Scheme 🇫🇷 FR
Manufacturer STMicroelectronics
Category Trusted Computing
Security level EAL5+, AVA_VAN.5, ALC_DVS.2
Maintenance updates ANSSI-CC-2019/20-M01 (15.10.2020) Certification report
Reassessment report: ANSSI-CC-2019/20-S02 (02.08.2021) Certification report

Heuristics summary ?

Certificate ID: ANSSI-CC-2019/20

Certification report ?

Extracted keywords

Symmetric Algorithms
AES, DES
Randomness
TRNG

Trusted Execution Environments
SE
Vendor
STMicroelectronics, STM

Security level
EAL 5, EAL 2, EAL 7, EAL 1, EAL 3, ITSEC E6 Elevé
Security Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSS
Protection profiles
BSI-CC-PP-0084-2014, BSI-PP-0084-2014
Certificates
ANSSI-CC-2019/20
Evaluation facilities
Serma Safety & Security

Standards
AIS31, AIS 31, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004

File metadata

Title: ANSSI-CC-2019/20
Subject: ST54J A01
Keywords: ANSSI-CC-CER-F-07.29
Author: RENNER Soline
Creation date: D:20190418171553+02'00'
Modification date: D:20190418171553+02'00'
Pages: 17
Creator: Microsoft® Word 2010
Producer: Microsoft® Word 2010

Frontpage

Certificate ID: ANSSI-CC-2019/20
Certified item: ST54J A01
Certification lab: Serma Safety & Security 14 rue Galilée, CS 10071, 33608 Pessac Cedex, France
Developer: STMicroelectronics 190 avenue CĂ©lestin Coq, ZI de Rousset, 13106 Rousset Cedex, France Commanditaire STMicroelectronics 190 avenue CĂ©lestin Coq, ZI de Rousset, 13106 Rousset Cedex, France

References

Security target ?

Extracted keywords

Symmetric Algorithms
AES, AES-128, AES-192, AES-256, DES, TDES, TDEA
Randomness
TRNG, RND, RNG
Block cipher modes
ECB, CBC

Trusted Execution Environments
SE
Vendor
Infineon Technologies, STMicroelectronics, Philips

Security level
EAL5, EAL 5, EAL5+, EAL4, EAL5 augmented, EAL 5 augmented
Claims
O.RND, O.TOE-, O.C, T.RND, R.O
Security Assurance Requirements (SAR)
ADV_FSP, ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, ADV_ARC, ADV_IMP, AGD_PRE, AGD_OPE.1, AGD_PRE.1, AGD_OPE, ALC_DEL, ALC_DVS.2, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.2, ALC_DVS, ALC_CMS, ALC_CMC, ATE_COV, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, AVA_VAN.5, AVA_VAN, ASE_INT, ASE_CCL, ASE_ECD, ASE_SPD, ASE_OBJ, ASE_REQ, ASE_TSS, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_SAR.1, FAU_SAS.1, FAU_SAS, FAU_GEN.1, FCS_RNG.1, FCS_COP.1, FCS_RNG, FCS_CKM.4, FCS_CKM.1, FDP_SDC.1, FDP_SDI.2, FDP_ITT.1, FDP_IFC.1, FDP_ACC.2, FDP_ACF.1, FDP_UCT.1, FDP_UIT.1, FDP_ACC.1, FDP_SDC, FDP_ACF, FDP_ITC.1, FDP_ITC.2, FDP_SMF.1, FDP_SMR.1, FIA_API.1, FIA_UID.1, FIA_UAU.1, FIA_API, FMT_LIM.1, FMT_LIM.2, FMT_MSA.3, FMT_MSA.1, FMT_SMF.1, FMT_SMR.1, FMT_LIM, FPT_FLS.1, FPT_PHP.3, FPT_ITT.1, FRU_FLT.2, FTP_ITC.1, FTP_TRP.1
Protection profiles
BSI-CC-PP-0084-2014, BSI-CC-PP- 0084-2014, BSI-CC-PP-0084-
Certification process
out of scope, The ST54J_SE is in the scope of this evaluation, while the ST54J_CLF and the ST54J_IOs are out of scope of this evaluation, ES) is in User NVM. 41 Note: The ES is not part of the TOE and is out of scope of the evaluation, The ST54J_SE is in the scope of this evaluation, while the ST54J_CLF and the ST54J_IOs are out of scope of this evaluation. 18 In the following, the TOE is denoted by “ST54J A01” or “TOE”. 19 Figure 1, Security IC Embedded Software (ES) is in User NVM. 41 Note: The ES is not part of the TOE and is out of scope of the evaluation. 1.6.3 TOE documentation 42 The user guidance documentation, part of the TOE

Side-channel analysis
Leak-Inherent, Physical Probing, physical probing, side channel, physical tampering, Malfunction, malfunction, JIL
Certification process
out of scope, The ST54J_SE is in the scope of this evaluation, while the ST54J_CLF and the ST54J_IOs are out of scope of this evaluation, ES) is in User NVM. 41 Note: The ES is not part of the TOE and is out of scope of the evaluation, The ST54J_SE is in the scope of this evaluation, while the ST54J_CLF and the ST54J_IOs are out of scope of this evaluation. 18 In the following, the TOE is denoted by “ST54J A01” or “TOE”. 19 Figure 1, Security IC Embedded Software (ES) is in User NVM. 41 Note: The ES is not part of the TOE and is out of scope of the evaluation. 1.6.3 TOE documentation 42 The user guidance documentation, part of the TOE

Standards
FIPS PUB 197, NIST SP 800-67, SP 800-38A, NIST SP 800-38A, SP 800-67, PKCS #1, AIS31, ISO/IEC 7816-3, ISO/IEC 9796-2, ISO/IEC 14888, ISO/IEC 9796, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-001

File metadata

Title: SMD_ST54J_VA01_3P.book
Author: Christiane DROULERS
Creation date: D:20190325175557Z
Modification date: D:20190325180544+01'00'
Pages: 80
Creator: FrameMaker 11.0
Producer: Acrobat Elements 10.0.0 (Windows)

References

Heuristics ?

Certificate ID: ANSSI-CC-2019/20

Extracted SARs

ADV_INT.2, ASE_OBJ.2, ASE_INT.1, ASE_TSS.1, ADV_IMP.1, ADV_ARC.1, ADV_TDS.4, ALC_DEL.1, ALC_DVS.2, ADV_FSP.5, AVA_VAN.5, ASE_REQ.2, ATE_FUN.1, ATE_COV.2, ATE_IND.2, ASE_CCL.1, ASE_ECD.1, AGD_OPE.1, ALC_CMC.4, ATE_DPT.3, AGD_PRE.1, ASE_SPD.1, ALC_TAT.2, ALC_CMS.5, ALC_LCD.1

References ?

Updates ?

  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name ST54J A01 was processed.

  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['-']}.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}}.
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}]}}.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': '4cc94ac9efb882f9fb446352dff34cf97b4505f437bd7ed12b5103a28fcdb04a', 'st_pdf_hash': '0f731da6d699d9fb1102e38b6061c3c70c1182cedf6690488468d0a2c31ab694', 'report_txt_hash': '7726deaa8b54c9d58c590c3e664a620d4a89f3ddedd89c6571671d2f4ef37e9a', 'st_txt_hash': '77b91d582758c8443c9408bcc4cf0a9245e84ce52063ea238d71b39ca5cff16d'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {'AES': 2, 'DES': 7}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {}, 'rules_randomness': {'TRNG': 1, 'RNG': 1}, 'rules_tee': {'SE': 11}, 'rules_side_channels': {}} values inserted.
    • The st_keywords property was updated, with the {'rules_symmetric_crypto': {'AES': 18, 'AES-128': 1, 'AES-192': 1, 'AES-256': 1, 'DES': 20, 'TDES': 7, 'TDEA': 1}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {'scrypt': 7}, 'rules_crypto_schemes': {'PACE': 2}, 'rules_randomness': {'TRNG': 2, 'RNG': 9, 'RND': 7}, 'rules_tee': {'SE': 18}, 'rules_side_channels': {'Malfunction': 15, 'malfunction': 1, 'Leak-Inherent': 14, 'Physical Probing': 4, 'physical probing': 1, 'physical tampering': 1, 'side channel': 2}} values inserted.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': ['mailto:certification@ssi.gouv.fr', 'http://www.ssi.gouv.fr/']}} values inserted.
    • The st_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.st.com']}} values inserted.
    • The report_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2019/20': 36}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 1, 'BSI-PP-0084-2014': 1}}, 'cc_security_level': {'EAL': {'EAL 5': 3, 'EAL 7': 2, 'EAL 2': 2, 'EAL 1': 1, 'EAL 3': 1, 'EAL 4': 1, 'EAL 6': 1, 'EAL 5+': 1}, 'ITSEC': {'ITSEC E6 ElevĂ©': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_DVS.2': 2, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_FLR': 1, 'ALC_LCD': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.5': 2, 'AVA_VAN': 2}, 'ASE': {'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {'T': {'T': 1}}, 'vendor': {'STMicroelectronics': {'STMicroelectronics': 2, 'STM': 23}}, 'eval_facility': {'Serma': {'Serma Safety & Security': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 2}}, 'DES': {'DES': {'DES': 7}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 1}, 'RNG': {'RNG': 1}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 11}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS31': 4, 'AIS1': 1, 'AIS 31': 1}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 84, 'BSI-CC-PP- 0084-2014': 10, 'BSI-CC-PP-0084-': 1}}, 'cc_security_level': {'EAL': {'EAL5': 15, 'EAL 5': 1, 'EAL5+': 1, 'EAL4': 1, 'EAL5 augmented': 1, 'EAL 5 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_FSP': 4, 'ADV_ARC.1': 2, 'ADV_FSP.5': 1, 'ADV_IMP.1': 1, 'ADV_INT.2': 1, 'ADV_TDS.4': 1, 'ADV_ARC': 2, 'ADV_IMP': 1}, 'AGD': {'AGD_PRE': 3, 'AGD_OPE.1': 1, 'AGD_PRE.1': 1, 'AGD_OPE': 1}, 'ALC': {'ALC_DEL': 3, 'ALC_DVS.2': 4, 'ALC_CMC.4': 1, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.2': 1, 'ALC_DVS': 1, 'ALC_CMS': 1, 'ALC_CMC': 1}, 'ATE': {'ATE_COV': 3, 'ATE_COV.2': 1, 'ATE_DPT.3': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.5': 1, 'AVA_VAN': 1}, 'ASE': {'ASE_INT': 2, 'ASE_CCL': 4, 'ASE_ECD': 4, 'ASE_SPD': 8, 'ASE_OBJ': 11, 'ASE_REQ': 30, 'ASE_TSS': 7, 'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_SAR.1': 25, 'FAU_SAS.1': 28, 'FAU_SAS': 2, 'FAU_GEN.1': 8}, 'FCS': {'FCS_RNG.1': 6, 'FCS_COP.1': 17, 'FCS_RNG': 2, 'FCS_CKM.4': 4, 'FCS_CKM.1': 2}, 'FDP': {'FDP_SDC.1': 8, 'FDP_SDI.2': 14, 'FDP_ITT.1': 10, 'FDP_IFC.1': 17, 'FDP_ACC.2': 12, 'FDP_ACF.1': 28, 'FDP_UCT.1': 16, 'FDP_UIT.1': 16, 'FDP_ACC.1': 24, 'FDP_SDC': 2, 'FDP_IFF.1': 1, 'FDP_ITC.1': 2, 'FDP_ITC.2': 2, 'FDP_SMF.1': 2, 'FDP_SMR.1': 1}, 'FIA': {'FIA_API.1': 6, 'FIA_UID.1': 16, 'FIA_UAU.1': 14, 'FIA_API': 2}, 'FMT': {'FMT_LIM.1': 29, 'FMT_LIM.2': 30, 'FMT_MSA.3': 26, 'FMT_MSA.1': 26, 'FMT_SMF.1': 21, 'FMT_SMR.1': 17, 'FMT_LIM': 2}, 'FPT': {'FPT_FLS.1': 22, 'FPT_PHP.3': 11, 'FPT_ITT.1': 9}, 'FRU': {'FRU_FLT.2': 11}, 'FTP': {'FTP_ITC.1': 27, 'FTP_TRP.1': 2}}, 'cc_claims': {'O': {'O.RND': 4, 'O.TOE-': 1, 'O.C': 2}, 'T': {'T.RND': 3}, 'R': {'R.O.C': 2}}, 'vendor': {'Infineon': {'Infineon Technologies': 1}, 'STMicroelectronics': {'STMicroelectronics': 23}, 'Philips': {'Philips': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 18, 'AES-128': 1, 'AES-192': 1, 'AES-256': 1}}, 'DES': {'DES': {'DES': 27, 'DEA': 1}, '3DES': {'TDES': 7, 'TDEA': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'scrypt': {'scrypt': 7}}, 'crypto_scheme': {'KA': {'KA': 2}}, 'crypto_protocol': {'PACE': {'PACE': 2}}, 'randomness': {'TRNG': {'TRNG': 2}, 'RNG': {'RNG': 9, 'RND': 7}}, 'cipher_mode': {'ECB': {'ECB': 7}, 'CBC': {'CBC': 8}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 14, 'Physical Probing': 4, 'physical probing': 1, 'side channel': 2, 'SPA': 2}, 'FI': {'physical tampering': 1, 'Malfunction': 15, 'malfunction': 1}, 'other': {'JIL': 3}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 18}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 197': 4}, 'NIST': {'NIST SP 800-67': 4, 'NIST SP 800-38A': 3}, 'PKCS': {'PKCS #1': 2}, 'BSI': {'AIS31': 7, 'AIS1': 1}, 'ISO': {'ISO/IEC 7816-3': 1, 'ISO/IEC 9796-2': 1, 'ISO/IEC 9796': 2, 'ISO/IEC 14888': 4}, 'CC': {'CCMB-2017-04-002': 23, 'CCMB-2017-04-003': 2, 'CCMB-2017-04-001': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 2, '. The ST54J_SE is in the scope of this evaluation, while the ST54J_CLF and the ST54J_IOs are out of scope of this evaluation': 1, '(ES) is in User NVM. 41 Note: The ES is not part of the TOE and is out of scope of the evaluation': 1, '54J_IO). The ST54J_SE is in the scope of this evaluation, while the ST54J_CLF and the ST54J_IOs are out of scope of this evaluation. 18 In the following, the TOE is denoted by “ST54J A01” or “TOE”. 19 Figure 1': 1, 'he Security IC Embedded Software (ES) is in User NVM. 41 Note: The ES is not part of the TOE and is out of scope of the evaluation. 1.6.3 TOE documentation 42 The user guidance documentation, part of the TOE': 1}}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'BAROC CC 3.1 Smart Card Protection Profile, Version 1.0', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0038b.pdf', 'pp_ids': None}]}.

    The Maintenance Updates of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.common_criteria.CommonCriteriaCert.MaintenanceReport', 'maintenance_date': '2021-08-02', 'maintenance_title': 'Reassessment report: ANSSI-CC-2019/20-S02', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC-2019_20-S02.pdf', 'maintenance_st_link': None}, {'_type': 'sec_certs.sample.common_criteria.CommonCriteriaCert.MaintenanceReport', 'maintenance_date': '2020-10-15', 'maintenance_title': 'ANSSI-CC-2019/20-M01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2019_20-m01.pdf', 'maintenance_st_link': None}]}.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}]}.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': 'anssi-cc-2019_20.pdf', 'st_filename': 'anssi-cible-cc-2019_20en.pdf.pdf'}.
    • The report_keywords property was updated, with the {'cc_security_level': {'__update__': {'EAL': {'__delete__': ['EAL 4', 'EAL 6', 'EAL 5+']}}}, 'cc_sar': {'__update__': {'ALC': {'__update__': {'ALC_FLR': 2}, '__delete__': ['ALC_LCD']}, 'AVA': {'__update__': {'AVA_VAN.5': 3}}}}, 'cc_claims': {}, 'vendor': {'__update__': {'STMicroelectronics': {'__update__': {'STM': 10}}}}, 'symmetric_crypto': {'__update__': {'DES': {'__update__': {'DES': {'__update__': {'DES': 2}}}}}}, 'randomness': {'__delete__': ['RNG']}, 'tee_name': {'__update__': {'IBM': {'__update__': {'SE': 2}}}}, 'standard_id': {'__update__': {'BSI': {'__update__': {'AIS31': 2}, '__delete__': ['AIS1']}, 'CC': {'__insert__': {'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}}}} data.
    • The st_keywords property was updated, with the {'cc_protection_profile_id': {'__update__': {'BSI': {'__update__': {'BSI-CC-PP-0084-2014': 65}}}}, 'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL5': 16}}}}, 'cc_sar': {'__update__': {'ADV': {'__update__': {'ADV_FSP.5': 3}}, 'AVA': {'__update__': {'AVA_VAN.5': 4}}}}, 'cc_sfr': {'__update__': {'FDP': {'__insert__': {'FDP_ACF': 1}, '__update__': {'FDP_ACC.1': 23}, '__delete__': ['FDP_IFF.1']}}}, 'cc_claims': {'__update__': {'R': {'R.O': 2}}}, 'symmetric_crypto': {'__update__': {'AES_competition': {'__update__': {'AES': {'__update__': {'AES': 17}}}}, 'DES': {'__update__': {'DES': {'__update__': {'DES': 15}, '__delete__': ['DEA']}}}}}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'__update__': {'RNG': {'__update__': {'RNG': 6}}}}, 'side_channel_analysis': {'__update__': {'SCA': {'__update__': {'physical probing': 3}, '__delete__': ['SPA']}, 'FI': {'__update__': {'Malfunction': 13, 'malfunction': 2}}, 'other': {'__update__': {'JIL': 53}}}}, 'tee_name': {'__update__': {'IBM': {'__update__': {'SE': 4}}}}, 'standard_id': {'__update__': {'FIPS': {'__update__': {'FIPS PUB 197': 3}}, 'NIST': {'__insert__': {'SP 800-38A': 2, 'SP 800-67': 1}, '__update__': {'NIST SP 800-67': 3, 'NIST SP 800-38A': 2}}, 'BSI': {'__update__': {'AIS31': 2}, '__delete__': ['AIS1']}, 'ISO': {'__update__': {'ISO/IEC 9796': 1, 'ISO/IEC 14888': 2}}}}, 'certification_process': {'__update__': {'OutOfScope': {'__insert__': {' The ST54J_SE is in the scope of this evaluation, while the ST54J_CLF and the ST54J_IOs are out of scope of this evaluation': 1, 'ES) is in User NVM. 41 Note: The ES is not part of the TOE and is out of scope of the evaluation': 1, ' The ST54J_SE is in the scope of this evaluation, while the ST54J_CLF and the ST54J_IOs are out of scope of this evaluation. 18 In the following, the TOE is denoted by “ST54J A01” or “TOE”. 19 Figure 1': 1, 'Security IC Embedded Software (ES) is in User NVM. 41 Note: The ES is not part of the TOE and is out of scope of the evaluation. 1.6.3 TOE documentation 42 The user guidance documentation, part of the TOE': 1}, '__delete__': ['. The ST54J_SE is in the scope of this evaluation, while the ST54J_CLF and the ST54J_IOs are out of scope of this evaluation', '(ES) is in User NVM. 41 Note: The ES is not part of the TOE and is out of scope of the evaluation', '54J_IO). The ST54J_SE is in the scope of this evaluation, while the ST54J_CLF and the ST54J_IOs are out of scope of this evaluation. 18 In the following, the TOE is denoted by “ST54J A01” or “TOE”. 19 Figure 1', 'he Security IC Embedded Software (ES) is in User NVM. 41 Note: The ES is not part of the TOE and is out of scope of the evaluation. 1.6.3 TOE documentation 42 The user guidance documentation, part of the TOE']}}}} data.
  • 04.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'BAROC CC 3.1 Smart Card Protection Profile, Version 1.0', 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/pp0038b.pdf', 'pp_link': None, 'pp_ids': None}]}.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'BAROC CC 3.1 Smart Card Protection Profile, Version 1.0', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0038b.pdf', 'pp_ids': None}]}.

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.
  • 21.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2019_20.pdf, code: nok'].
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/anssi-cible-cc-2019_20en.pdf.pdf, code: nok'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}]} values discarded.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The cert_link was updated.

    • The new value is None.

    The manufacturer_web was updated.

    • The new value is None.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'BAROC_SC_PP_V1.0', 'pp_eal': None, 'pp_link': None, 'pp_ids': None}]}.

    The state of the certificate object was updated.

    • The report_download_ok property was set to False.
    • The report_convert_ok property was set to False.
    • The report_extract_ok property was set to False.
    • The errors property was updated, with the [[0, 'failed to download report from https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2019_20.pdf, code: nok'], [1, 'failed to download report from https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2019_20.pdf, code: nok']] values inserted.
    • The st_pdf_hash property was set to 0f731da6d699d9fb1102e38b6061c3c70c1182cedf6690488468d0a2c31ab694.
    • The report_pdf_hash property was set to None.
    • The report_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to anssi-cible-cc-2019_20en.pdf.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to None.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The cert_link was updated.

    • The new value is https://www.commoncriteriaportal.org/files/epfiles/Certificat%20ANSSI-CC-2019_20-S02.pdf.

    The manufacturer_web was updated.

    • The new value is https://www.st.com/.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'BAROC CC 3.1 Smart Card Protection Profile, Version 1.0', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0038b.pdf', 'pp_ids': None}]}.

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The report_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The report_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The report_extract_ok property was set to True.
    • The errors property was set to [].
    • The report_pdf_hash property was set to 4cc94ac9efb882f9fb446352dff34cf97b4505f437bd7ed12b5103a28fcdb04a.
    • The st_txt_hash property was set to 77b91d582758c8443c9408bcc4cf0a9245e84ce52063ea238d71b39ca5cff16d.
    • The report_txt_hash property was set to 7726deaa8b54c9d58c590c3e664a620d4a89f3ddedd89c6571671d2f4ef37e9a.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 892903, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 17, '/Title': 'ANSSI-CC-2019/20', '/Author': 'RENNER Soline', '/Subject': 'ST54J A01', '/Keywords': 'ANSSI-CC-CER-F-07.29', '/Creator': 'Microsoft® Word 2010', '/CreationDate': "D:20190418171553+02'00'", '/ModDate': "D:20190418171553+02'00'", '/Producer': 'Microsoft® Word 2010', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['mailto:certification@ssi.gouv.fr', 'http://www.ssi.gouv.fr/']}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 768214, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 80, '/Author': 'Christiane DROULERS', '/CreationDate': 'D:20190325175557Z', '/Creator': 'FrameMaker 11.0', '/ModDate': "D:20190325180544+01'00'", '/Producer': 'Acrobat Elements 10.0.0 (Windows)', '/Title': 'SMD_ST54J_VA01_3P.book', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.st.com']}}.
    • The report_frontpage property was set to {'anssi': {'match_rules': ['RĂ©fĂ©rence du rapport de certification(.+)Nom du produit(.+)RĂ©fĂ©rence/version du produit(.+)ConformitĂ© Ă  un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)DĂ©veloppeur (.+)Centre d’évaluation(.+)Accords de reconnaissance applicables'], 'cert_id': 'ANSSI-CC-2019/20', 'cert_item': 'ST54J A01', 'cert_item_version': 'A01', 'ref_protection_profiles': 'Security IC Platform Protection Profile with Augmentation Packages, version 1.0 certifiĂ© BSI-CC-PP-0084-2014 le 19 fĂ©vrier 2014 avec conformitĂ© aux packages “Authentication of the security IC” “Loader dedicated for usage in Secured Environment only” “Loader dedicated for usage by authorized users only', 'cc_version': 'Critères Communs version 3.1 rĂ©vision 5', 'cc_security_level': 'EAL 5 augmentĂ© ALC_DVS.2, AVA_VAN.5', 'developer': 'STMicroelectronics 190 avenue CĂ©lestin Coq, ZI de Rousset, 13106 Rousset Cedex, France Commanditaire STMicroelectronics 190 avenue CĂ©lestin Coq, ZI de Rousset, 13106 Rousset Cedex, France', 'cert_lab': 'Serma Safety & Security 14 rue GalilĂ©e, CS 10071, 33608 Pessac Cedex, France'}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The report_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2019/20': 36}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 1, 'BSI-PP-0084-2014': 1}}, 'cc_security_level': {'EAL': {'EAL 5': 3, 'EAL 2': 2, 'EAL 7': 2, 'EAL 1': 1, 'EAL 3': 1}, 'ITSEC': {'ITSEC E6 ElevĂ©': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_DVS.2': 2, 'ALC_FLR': 2, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.5': 3, 'AVA_VAN': 2}, 'ASE': {'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'STMicroelectronics': {'STMicroelectronics': 2, 'STM': 10}}, 'eval_facility': {'Serma': {'Serma Safety & Security': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 2}}, 'DES': {'DES': {'DES': 2}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 1}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 2}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS31': 2, 'AIS 31': 1}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 65, 'BSI-CC-PP- 0084-2014': 10, 'BSI-CC-PP-0084-': 1}}, 'cc_security_level': {'EAL': {'EAL5': 16, 'EAL 5': 1, 'EAL5+': 1, 'EAL4': 1, 'EAL5 augmented': 1, 'EAL 5 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_FSP': 4, 'ADV_ARC.1': 2, 'ADV_FSP.5': 3, 'ADV_IMP.1': 1, 'ADV_INT.2': 1, 'ADV_TDS.4': 1, 'ADV_ARC': 2, 'ADV_IMP': 1}, 'AGD': {'AGD_PRE': 3, 'AGD_OPE.1': 1, 'AGD_PRE.1': 1, 'AGD_OPE': 1}, 'ALC': {'ALC_DEL': 3, 'ALC_DVS.2': 4, 'ALC_CMC.4': 1, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.2': 1, 'ALC_DVS': 1, 'ALC_CMS': 1, 'ALC_CMC': 1}, 'ATE': {'ATE_COV': 3, 'ATE_COV.2': 1, 'ATE_DPT.3': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.5': 4, 'AVA_VAN': 1}, 'ASE': {'ASE_INT': 2, 'ASE_CCL': 4, 'ASE_ECD': 4, 'ASE_SPD': 8, 'ASE_OBJ': 11, 'ASE_REQ': 30, 'ASE_TSS': 7, 'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_SAR.1': 25, 'FAU_SAS.1': 28, 'FAU_SAS': 2, 'FAU_GEN.1': 8}, 'FCS': {'FCS_RNG.1': 6, 'FCS_COP.1': 17, 'FCS_RNG': 2, 'FCS_CKM.4': 4, 'FCS_CKM.1': 2}, 'FDP': {'FDP_SDC.1': 8, 'FDP_SDI.2': 14, 'FDP_ITT.1': 10, 'FDP_IFC.1': 17, 'FDP_ACC.2': 12, 'FDP_ACF.1': 28, 'FDP_UCT.1': 16, 'FDP_UIT.1': 16, 'FDP_ACC.1': 23, 'FDP_SDC': 2, 'FDP_ACF': 1, 'FDP_ITC.1': 2, 'FDP_ITC.2': 2, 'FDP_SMF.1': 2, 'FDP_SMR.1': 1}, 'FIA': {'FIA_API.1': 6, 'FIA_UID.1': 16, 'FIA_UAU.1': 14, 'FIA_API': 2}, 'FMT': {'FMT_LIM.1': 29, 'FMT_LIM.2': 30, 'FMT_MSA.3': 26, 'FMT_MSA.1': 26, 'FMT_SMF.1': 21, 'FMT_SMR.1': 17, 'FMT_LIM': 2}, 'FPT': {'FPT_FLS.1': 22, 'FPT_PHP.3': 11, 'FPT_ITT.1': 9}, 'FRU': {'FRU_FLT.2': 11}, 'FTP': {'FTP_ITC.1': 27, 'FTP_TRP.1': 2}}, 'cc_claims': {'O': {'O.RND': 4, 'O.TOE-': 1, 'O.C': 2}, 'T': {'T.RND': 3}, 'R': {'R.O': 2}}, 'vendor': {'Infineon': {'Infineon Technologies': 1}, 'STMicroelectronics': {'STMicroelectronics': 23}, 'Philips': {'Philips': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 17, 'AES-128': 1, 'AES-192': 1, 'AES-256': 1}}, 'DES': {'DES': {'DES': 15}, '3DES': {'TDES': 7, 'TDEA': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 2}, 'RNG': {'RND': 7, 'RNG': 6}}, 'cipher_mode': {'ECB': {'ECB': 7}, 'CBC': {'CBC': 8}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 14, 'Physical Probing': 4, 'physical probing': 3, 'side channel': 2}, 'FI': {'physical tampering': 1, 'Malfunction': 13, 'malfunction': 2}, 'other': {'JIL': 53}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 4}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 197': 3}, 'NIST': {'NIST SP 800-67': 3, 'SP 800-38A': 2, 'NIST SP 800-38A': 2, 'SP 800-67': 1}, 'PKCS': {'PKCS #1': 2}, 'BSI': {'AIS31': 2}, 'ISO': {'ISO/IEC 7816-3': 1, 'ISO/IEC 9796-2': 1, 'ISO/IEC 14888': 2, 'ISO/IEC 9796': 1}, 'CC': {'CCMB-2017-04-002': 23, 'CCMB-2017-04-003': 2, 'CCMB-2017-04-001': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 2, ' The ST54J_SE is in the scope of this evaluation, while the ST54J_CLF and the ST54J_IOs are out of scope of this evaluation': 1, 'ES) is in User NVM. 41 Note: The ES is not part of the TOE and is out of scope of the evaluation': 1, ' The ST54J_SE is in the scope of this evaluation, while the ST54J_CLF and the ST54J_IOs are out of scope of this evaluation. 18 In the following, the TOE is denoted by “ST54J A01” or “TOE”. 19 Figure 1': 1, 'Security IC Embedded Software (ES) is in User NVM. 41 Note: The ES is not part of the TOE and is out of scope of the evaluation. 1.6.3 TOE documentation 42 The user guidance documentation, part of the TOE': 1}}}.
    • The report_filename property was set to anssi-cc-2019_20.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to ['SERMA'].
    • The cert_id property was set to ANSSI-CC-2019/20.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}]} values added.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/anssi-cible-cc-2019_20en.pdf.pdf, code: nok'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}]} values discarded.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to 0f731da6d699d9fb1102e38b6061c3c70c1182cedf6690488468d0a2c31ab694.
    • The st_txt_hash property was set to 77b91d582758c8443c9408bcc4cf0a9245e84ce52063ea238d71b39ca5cff16d.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 768214, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 80, '/Author': 'Christiane DROULERS', '/CreationDate': 'D:20190325175557Z', '/Creator': 'FrameMaker 11.0', '/ModDate': "D:20190325180544+01'00'", '/Producer': 'Acrobat Elements 10.0.0 (Windows)', '/Title': 'SMD_ST54J_VA01_3P.book', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.st.com']}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 65, 'BSI-CC-PP- 0084-2014': 10, 'BSI-CC-PP-0084-': 1}}, 'cc_security_level': {'EAL': {'EAL5': 16, 'EAL 5': 1, 'EAL5+': 1, 'EAL4': 1, 'EAL5 augmented': 1, 'EAL 5 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_FSP': 4, 'ADV_ARC.1': 2, 'ADV_FSP.5': 3, 'ADV_IMP.1': 1, 'ADV_INT.2': 1, 'ADV_TDS.4': 1, 'ADV_ARC': 2, 'ADV_IMP': 1}, 'AGD': {'AGD_PRE': 3, 'AGD_OPE.1': 1, 'AGD_PRE.1': 1, 'AGD_OPE': 1}, 'ALC': {'ALC_DEL': 3, 'ALC_DVS.2': 4, 'ALC_CMC.4': 1, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.2': 1, 'ALC_DVS': 1, 'ALC_CMS': 1, 'ALC_CMC': 1}, 'ATE': {'ATE_COV': 3, 'ATE_COV.2': 1, 'ATE_DPT.3': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.5': 4, 'AVA_VAN': 1}, 'ASE': {'ASE_INT': 2, 'ASE_CCL': 4, 'ASE_ECD': 4, 'ASE_SPD': 8, 'ASE_OBJ': 11, 'ASE_REQ': 30, 'ASE_TSS': 7, 'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_SAR.1': 25, 'FAU_SAS.1': 28, 'FAU_SAS': 2, 'FAU_GEN.1': 8}, 'FCS': {'FCS_RNG.1': 6, 'FCS_COP.1': 17, 'FCS_RNG': 2, 'FCS_CKM.4': 4, 'FCS_CKM.1': 2}, 'FDP': {'FDP_SDC.1': 8, 'FDP_SDI.2': 14, 'FDP_ITT.1': 10, 'FDP_IFC.1': 17, 'FDP_ACC.2': 12, 'FDP_ACF.1': 28, 'FDP_UCT.1': 16, 'FDP_UIT.1': 16, 'FDP_ACC.1': 23, 'FDP_SDC': 2, 'FDP_ACF': 1, 'FDP_ITC.1': 2, 'FDP_ITC.2': 2, 'FDP_SMF.1': 2, 'FDP_SMR.1': 1}, 'FIA': {'FIA_API.1': 6, 'FIA_UID.1': 16, 'FIA_UAU.1': 14, 'FIA_API': 2}, 'FMT': {'FMT_LIM.1': 29, 'FMT_LIM.2': 30, 'FMT_MSA.3': 26, 'FMT_MSA.1': 26, 'FMT_SMF.1': 21, 'FMT_SMR.1': 17, 'FMT_LIM': 2}, 'FPT': {'FPT_FLS.1': 22, 'FPT_PHP.3': 11, 'FPT_ITT.1': 9}, 'FRU': {'FRU_FLT.2': 11}, 'FTP': {'FTP_ITC.1': 27, 'FTP_TRP.1': 2}}, 'cc_claims': {'O': {'O.RND': 4, 'O.TOE-': 1, 'O.C': 2}, 'T': {'T.RND': 3}, 'R': {'R.O': 2}}, 'vendor': {'Infineon': {'Infineon Technologies': 1}, 'STMicroelectronics': {'STMicroelectronics': 23}, 'Philips': {'Philips': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 17, 'AES-128': 1, 'AES-192': 1, 'AES-256': 1}}, 'DES': {'DES': {'DES': 15}, '3DES': {'TDES': 7, 'TDEA': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 2}, 'RNG': {'RND': 7, 'RNG': 6}}, 'cipher_mode': {'ECB': {'ECB': 7}, 'CBC': {'CBC': 8}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 14, 'Physical Probing': 4, 'physical probing': 3, 'side channel': 2}, 'FI': {'physical tampering': 1, 'Malfunction': 13, 'malfunction': 2}, 'other': {'JIL': 53}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 4}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 197': 3}, 'NIST': {'NIST SP 800-67': 3, 'SP 800-38A': 2, 'NIST SP 800-38A': 2, 'SP 800-67': 1}, 'PKCS': {'PKCS #1': 2}, 'BSI': {'AIS31': 2}, 'ISO': {'ISO/IEC 7816-3': 1, 'ISO/IEC 9796-2': 1, 'ISO/IEC 14888': 2, 'ISO/IEC 9796': 1}, 'CC': {'CCMB-2017-04-002': 23, 'CCMB-2017-04-003': 2, 'CCMB-2017-04-001': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 2, ' The ST54J_SE is in the scope of this evaluation, while the ST54J_CLF and the ST54J_IOs are out of scope of this evaluation': 1, 'ES) is in User NVM. 41 Note: The ES is not part of the TOE and is out of scope of the evaluation': 1, ' The ST54J_SE is in the scope of this evaluation, while the ST54J_CLF and the ST54J_IOs are out of scope of this evaluation. 18 In the following, the TOE is denoted by “ST54J A01” or “TOE”. 19 Figure 1': 1, 'Security IC Embedded Software (ES) is in User NVM. 41 Note: The ES is not part of the TOE and is out of scope of the evaluation. 1.6.3 TOE documentation 42 The user guidance documentation, part of the TOE': 1}}}.
    • The st_filename property was set to anssi-cible-cc-2019_20en.pdf.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}]} values added.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/anssi-cible-cc-2019_20en.pdf.pdf, code: nok'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}]} values discarded.
  • 26.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to 0f731da6d699d9fb1102e38b6061c3c70c1182cedf6690488468d0a2c31ab694.
    • The st_txt_hash property was set to 77b91d582758c8443c9408bcc4cf0a9245e84ce52063ea238d71b39ca5cff16d.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 768214, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 80, '/Author': 'Christiane DROULERS', '/CreationDate': 'D:20190325175557Z', '/Creator': 'FrameMaker 11.0', '/ModDate': "D:20190325180544+01'00'", '/Producer': 'Acrobat Elements 10.0.0 (Windows)', '/Title': 'SMD_ST54J_VA01_3P.book', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.st.com']}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 65, 'BSI-CC-PP- 0084-2014': 10, 'BSI-CC-PP-0084-': 1}}, 'cc_security_level': {'EAL': {'EAL5': 16, 'EAL 5': 1, 'EAL5+': 1, 'EAL4': 1, 'EAL5 augmented': 1, 'EAL 5 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_FSP': 4, 'ADV_ARC.1': 2, 'ADV_FSP.5': 3, 'ADV_IMP.1': 1, 'ADV_INT.2': 1, 'ADV_TDS.4': 1, 'ADV_ARC': 2, 'ADV_IMP': 1}, 'AGD': {'AGD_PRE': 3, 'AGD_OPE.1': 1, 'AGD_PRE.1': 1, 'AGD_OPE': 1}, 'ALC': {'ALC_DEL': 3, 'ALC_DVS.2': 4, 'ALC_CMC.4': 1, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.2': 1, 'ALC_DVS': 1, 'ALC_CMS': 1, 'ALC_CMC': 1}, 'ATE': {'ATE_COV': 3, 'ATE_COV.2': 1, 'ATE_DPT.3': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.5': 4, 'AVA_VAN': 1}, 'ASE': {'ASE_INT': 2, 'ASE_CCL': 4, 'ASE_ECD': 4, 'ASE_SPD': 8, 'ASE_OBJ': 11, 'ASE_REQ': 30, 'ASE_TSS': 7, 'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_SAR.1': 25, 'FAU_SAS.1': 28, 'FAU_SAS': 2, 'FAU_GEN.1': 8}, 'FCS': {'FCS_RNG.1': 6, 'FCS_COP.1': 17, 'FCS_RNG': 2, 'FCS_CKM.4': 4, 'FCS_CKM.1': 2}, 'FDP': {'FDP_SDC.1': 8, 'FDP_SDI.2': 14, 'FDP_ITT.1': 10, 'FDP_IFC.1': 17, 'FDP_ACC.2': 12, 'FDP_ACF.1': 28, 'FDP_UCT.1': 16, 'FDP_UIT.1': 16, 'FDP_ACC.1': 23, 'FDP_SDC': 2, 'FDP_ACF': 1, 'FDP_ITC.1': 2, 'FDP_ITC.2': 2, 'FDP_SMF.1': 2, 'FDP_SMR.1': 1}, 'FIA': {'FIA_API.1': 6, 'FIA_UID.1': 16, 'FIA_UAU.1': 14, 'FIA_API': 2}, 'FMT': {'FMT_LIM.1': 29, 'FMT_LIM.2': 30, 'FMT_MSA.3': 26, 'FMT_MSA.1': 26, 'FMT_SMF.1': 21, 'FMT_SMR.1': 17, 'FMT_LIM': 2}, 'FPT': {'FPT_FLS.1': 22, 'FPT_PHP.3': 11, 'FPT_ITT.1': 9}, 'FRU': {'FRU_FLT.2': 11}, 'FTP': {'FTP_ITC.1': 27, 'FTP_TRP.1': 2}}, 'cc_claims': {'O': {'O.RND': 4, 'O.TOE-': 1, 'O.C': 2}, 'T': {'T.RND': 3}, 'R': {'R.O': 2}}, 'vendor': {'Infineon': {'Infineon Technologies': 1}, 'STMicroelectronics': {'STMicroelectronics': 23}, 'Philips': {'Philips': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 17, 'AES-128': 1, 'AES-192': 1, 'AES-256': 1}}, 'DES': {'DES': {'DES': 15}, '3DES': {'TDES': 7, 'TDEA': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 2}, 'RNG': {'RND': 7, 'RNG': 6}}, 'cipher_mode': {'ECB': {'ECB': 7}, 'CBC': {'CBC': 8}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 14, 'Physical Probing': 4, 'physical probing': 3, 'side channel': 2}, 'FI': {'physical tampering': 1, 'Malfunction': 13, 'malfunction': 2}, 'other': {'JIL': 53}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 4}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 197': 3}, 'NIST': {'NIST SP 800-67': 3, 'SP 800-38A': 2, 'NIST SP 800-38A': 2, 'SP 800-67': 1}, 'PKCS': {'PKCS #1': 2}, 'BSI': {'AIS31': 2}, 'ISO': {'ISO/IEC 7816-3': 1, 'ISO/IEC 9796-2': 1, 'ISO/IEC 14888': 2, 'ISO/IEC 9796': 1}, 'CC': {'CCMB-2017-04-002': 23, 'CCMB-2017-04-003': 2, 'CCMB-2017-04-001': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 2, ' The ST54J_SE is in the scope of this evaluation, while the ST54J_CLF and the ST54J_IOs are out of scope of this evaluation': 1, 'ES) is in User NVM. 41 Note: The ES is not part of the TOE and is out of scope of the evaluation': 1, ' The ST54J_SE is in the scope of this evaluation, while the ST54J_CLF and the ST54J_IOs are out of scope of this evaluation. 18 In the following, the TOE is denoted by “ST54J A01” or “TOE”. 19 Figure 1': 1, 'Security IC Embedded Software (ES) is in User NVM. 41 Note: The ES is not part of the TOE and is out of scope of the evaluation. 1.6.3 TOE documentation 42 The user guidance documentation, part of the TOE': 1}}}.
    • The st_filename property was set to anssi-cible-cc-2019_20en.pdf.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}]} values added.

Raw data

{
  "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert",
  "category": "Trusted Computing",
  "cert_link": "https://www.commoncriteriaportal.org/files/epfiles/Certificat%20ANSSI-CC-2019_20-S02.pdf",
  "dgst": "c36783a79de002c5",
  "heuristics": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics",
    "cert_id": "ANSSI-CC-2019/20",
    "cert_lab": [
      "SERMA"
    ],
    "cpe_matches": null,
    "direct_dependency_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_dependency_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.MaintenanceReport",
        "maintenance_date": "2021-08-02",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC-2019_20-S02.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "Reassessment report: ANSSI-CC-2019/20-S02"
      },
      {
        "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.MaintenanceReport",
        "maintenance_date": "2020-10-15",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2019_20-m01.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "ANSSI-CC-2019/20-M01"
      }
    ]
  },
  "manufacturer": "STMicroelectronics",
  "manufacturer_web": "https://www.st.com/",
  "name": "ST54J A01",
  "not_valid_after": "2026-02-08",
  "not_valid_before": "2019-04-18",
  "pdf_data": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData",
    "report_filename": "anssi-cc-2019_20.pdf",
    "report_frontpage": {
      "anssi": {
        "cc_security_level": "EAL 5 augment\u00e9 ALC_DVS.2, AVA_VAN.5",
        "cc_version": "Crit\u00e8res Communs version 3.1 r\u00e9vision 5",
        "cert_id": "ANSSI-CC-2019/20",
        "cert_item": "ST54J A01",
        "cert_item_version": "A01",
        "cert_lab": "Serma Safety \u0026 Security 14 rue Galil\u00e9e, CS 10071, 33608 Pessac Cedex, France",
        "developer": "STMicroelectronics 190 avenue C\u00e9lestin Coq, ZI de Rousset, 13106 Rousset Cedex, France Commanditaire STMicroelectronics 190 avenue C\u00e9lestin Coq, ZI de Rousset, 13106 Rousset Cedex, France",
        "match_rules": [
          "R\u00e9f\u00e9rence du rapport de certification(.+)Nom du produit(.+)R\u00e9f\u00e9rence/version du produit(.+)Conformit\u00e9 \u00e0 un profil de protection(.+)Crit\u00e8res d\u2019\u00e9valuation et version(.+)Niveau d\u2019\u00e9valuation(.+)D\u00e9veloppeur (.+)Centre d\u2019\u00e9valuation(.+)Accords de reconnaissance applicables"
        ],
        "ref_protection_profiles": "Security IC Platform Protection Profile with Augmentation Packages, version 1.0 certifi\u00e9 BSI-CC-PP-0084-2014 le 19 f\u00e9vrier 2014 avec conformit\u00e9 aux packages \u201cAuthentication of the security IC\u201d \u201cLoader dedicated for usage in Secured Environment only\u201d \u201cLoader dedicated for usage by authorized users only"
      },
      "bsi": {},
      "canada": {},
      "niap": {},
      "nscib": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2019/20": 36
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0084-2014": 1,
          "BSI-PP-0084-2014": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_FSP": 1,
          "ADV_IMP": 1,
          "ADV_INT": 1,
          "ADV_SPM": 1,
          "ADV_TDS": 1
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_PRE": 1
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMS": 1,
          "ALC_DEL": 1,
          "ALC_DVS": 1,
          "ALC_DVS.2": 2,
          "ALC_FLR": 2,
          "ALC_TAT": 1
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_ECD": 1,
          "ASE_INT": 1,
          "ASE_OBJ": 1,
          "ASE_REQ": 1,
          "ASE_SPD": 1,
          "ASE_TSS": 1
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_DPT": 1,
          "ATE_FUN": 1,
          "ATE_IND": 1
        },
        "AVA": {
          "AVA_VAN": 2,
          "AVA_VAN.5": 3
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 2": 2,
          "EAL 3": 1,
          "EAL 5": 3,
          "EAL 7": 2
        },
        "ITSEC": {
          "ITSEC E6 Elev\u00e9": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Serma": {
          "Serma Safety \u0026 Security": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "TRNG": {
          "TRNG": 1
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "BSI": {
          "AIS 31": 1,
          "AIS31": 2
        },
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1,
          "CCMB-2017-04-004": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 2
          }
        },
        "DES": {
          "DES": {
            "DES": 2
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {
        "IBM": {
          "SE": 2
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "STMicroelectronics": {
          "STM": 10,
          "STMicroelectronics": 2
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "RENNER Soline",
      "/CreationDate": "D:20190418171553+02\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2010",
      "/Keywords": "ANSSI-CC-CER-F-07.29",
      "/ModDate": "D:20190418171553+02\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2010",
      "/Subject": "ST54J A01",
      "/Title": "ANSSI-CC-2019/20",
      "pdf_file_size_bytes": 892903,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.ssi.gouv.fr/",
          "mailto:certification@ssi.gouv.fr"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 17
    },
    "st_filename": "anssi-cible-cc-2019_20en.pdf.pdf",
    "st_frontpage": {
      "anssi": {},
      "bsi": {},
      "canada": {},
      "niap": {},
      "nscib": {}
    },
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "O": {
          "O.C": 2,
          "O.RND": 4,
          "O.TOE-": 1
        },
        "R": {
          "R.O": 2
        },
        "T": {
          "T.RND": 3
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP- 0084-2014": 10,
          "BSI-CC-PP-0084-": 1,
          "BSI-CC-PP-0084-2014": 65
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 2,
          "ADV_ARC.1": 2,
          "ADV_FSP": 4,
          "ADV_FSP.5": 3,
          "ADV_IMP": 1,
          "ADV_IMP.1": 1,
          "ADV_INT.2": 1,
          "ADV_TDS.4": 1
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 1,
          "AGD_PRE": 3,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.4": 1,
          "ALC_CMS": 1,
          "ALC_CMS.5": 1,
          "ALC_DEL": 3,
          "ALC_DEL.1": 1,
          "ALC_DVS": 1,
          "ALC_DVS.2": 4,
          "ALC_LCD.1": 1,
          "ALC_TAT.2": 1
        },
        "ASE": {
          "ASE_CCL": 4,
          "ASE_CCL.1": 1,
          "ASE_ECD": 4,
          "ASE_ECD.1": 1,
          "ASE_INT": 2,
          "ASE_INT.1": 1,
          "ASE_OBJ": 11,
          "ASE_OBJ.2": 1,
          "ASE_REQ": 30,
          "ASE_REQ.2": 1,
          "ASE_SPD": 8,
          "ASE_SPD.1": 1,
          "ASE_TSS": 7,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV": 3,
          "ATE_COV.2": 1,
          "ATE_DPT.3": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.5": 4
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 5": 1,
          "EAL 5 augmented": 1,
          "EAL4": 1,
          "EAL5": 16,
          "EAL5 augmented": 1,
          "EAL5+": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 8,
          "FAU_SAR.1": 25,
          "FAU_SAS": 2,
          "FAU_SAS.1": 28
        },
        "FCS": {
          "FCS_CKM.1": 2,
          "FCS_CKM.4": 4,
          "FCS_COP.1": 17,
          "FCS_RNG": 2,
          "FCS_RNG.1": 6
        },
        "FDP": {
          "FDP_ACC.1": 23,
          "FDP_ACC.2": 12,
          "FDP_ACF": 1,
          "FDP_ACF.1": 28,
          "FDP_IFC.1": 17,
          "FDP_ITC.1": 2,
          "FDP_ITC.2": 2,
          "FDP_ITT.1": 10,
          "FDP_SDC": 2,
          "FDP_SDC.1": 8,
          "FDP_SDI.2": 14,
          "FDP_SMF.1": 2,
          "FDP_SMR.1": 1,
          "FDP_UCT.1": 16,
          "FDP_UIT.1": 16
        },
        "FIA": {
          "FIA_API": 2,
          "FIA_API.1": 6,
          "FIA_UAU.1": 14,
          "FIA_UID.1": 16
        },
        "FMT": {
          "FMT_LIM": 2,
          "FMT_LIM.1": 29,
          "FMT_LIM.2": 30,
          "FMT_MSA.1": 26,
          "FMT_MSA.3": 26,
          "FMT_SMF.1": 21,
          "FMT_SMR.1": 17
        },
        "FPT": {
          "FPT_FLS.1": 22,
          "FPT_ITT.1": 9,
          "FPT_PHP.3": 11
        },
        "FRU": {
          "FRU_FLT.2": 11
        },
        "FTP": {
          "FTP_ITC.1": 27,
          "FTP_TRP.1": 2
        }
      },
      "certification_process": {
        "OutOfScope": {
          " The ST54J_SE is in the scope of this evaluation, while the ST54J_CLF and the ST54J_IOs are out of scope of this evaluation": 1,
          " The ST54J_SE is in the scope of this evaluation, while the ST54J_CLF and the ST54J_IOs are out of scope of this evaluation. 18 In the following, the TOE is denoted by \u201cST54J A01\u201d or \u201cTOE\u201d. 19 Figure 1": 1,
          "ES) is in User NVM. 41 Note: The ES is not part of the TOE and is out of scope of the evaluation": 1,
          "Security IC Embedded Software (ES) is in User NVM. 41 Note: The ES is not part of the TOE and is out of scope of the evaluation. 1.6.3 TOE documentation 42 The user guidance documentation, part of the TOE": 1,
          "out of scope": 2
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 8
        },
        "ECB": {
          "ECB": 7
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 7,
          "RNG": 6
        },
        "TRNG": {
          "TRNG": 2
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 13,
          "malfunction": 2,
          "physical tampering": 1
        },
        "SCA": {
          "Leak-Inherent": 14,
          "Physical Probing": 4,
          "physical probing": 3,
          "side channel": 2
        },
        "other": {
          "JIL": 53
        }
      },
      "standard_id": {
        "BSI": {
          "AIS31": 2
        },
        "CC": {
          "CCMB-2017-04-001": 2,
          "CCMB-2017-04-002": 23,
          "CCMB-2017-04-003": 2
        },
        "FIPS": {
          "FIPS PUB 197": 3
        },
        "ISO": {
          "ISO/IEC 14888": 2,
          "ISO/IEC 7816-3": 1,
          "ISO/IEC 9796": 1,
          "ISO/IEC 9796-2": 1
        },
        "NIST": {
          "NIST SP 800-38A": 2,
          "NIST SP 800-67": 3,
          "SP 800-38A": 2,
          "SP 800-67": 1
        },
        "PKCS": {
          "PKCS #1": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 17,
            "AES-128": 1,
            "AES-192": 1,
            "AES-256": 1
          }
        },
        "DES": {
          "3DES": {
            "TDEA": 1,
            "TDES": 7
          },
          "DES": {
            "DES": 15
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {
        "IBM": {
          "SE": 4
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon Technologies": 1
        },
        "Philips": {
          "Philips": 1
        },
        "STMicroelectronics": {
          "STMicroelectronics": 23
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Christiane DROULERS",
      "/CreationDate": "D:20190325175557Z",
      "/Creator": "FrameMaker 11.0",
      "/ModDate": "D:20190325180544+01\u002700\u0027",
      "/Producer": "Acrobat Elements 10.0.0 (Windows)",
      "/Title": "SMD_ST54J_VA01_3P.book",
      "pdf_file_size_bytes": 768214,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.st.com"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 80
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": "EAL4+",
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0038b.pdf",
        "pp_name": "BAROC CC 3.1 Smart Card Protection Profile, Version 1.0"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2019_20.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL5+",
      "ALC_DVS.2",
      "AVA_VAN.5"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/anssi-cible-cc-2019_20en.pdf.pdf",
  "state": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState",
    "errors": [],
    "report_convert_garbage": false,
    "report_convert_ok": true,
    "report_download_ok": true,
    "report_extract_ok": true,
    "report_pdf_hash": "4cc94ac9efb882f9fb446352dff34cf97b4505f437bd7ed12b5103a28fcdb04a",
    "report_txt_hash": "7726deaa8b54c9d58c590c3e664a620d4a89f3ddedd89c6571671d2f4ef37e9a",
    "st_convert_garbage": false,
    "st_convert_ok": true,
    "st_download_ok": true,
    "st_extract_ok": true,
    "st_pdf_hash": "0f731da6d699d9fb1102e38b6061c3c70c1182cedf6690488468d0a2c31ab694",
    "st_txt_hash": "77b91d582758c8443c9408bcc4cf0a9245e84ce52063ea238d71b39ca5cff16d"
  },
  "status": "active"
}