ChipDoc v3 on JCOP 4 P71 in SSCD configuration
CSV information ?
Status | active |
---|---|
Valid from | 13.03.2020 |
Valid until | 13.03.2025 |
Scheme | 🇫🇷 FR |
Manufacturer | NXP Semiconductors |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | AVA_VAN.5, ALC_DVS.2, EAL5+ |
Protection profiles | |
Maintenance updates | Maintenance report : ANSSI-CC-2020/73-M01 (28.09.2022) Certification report Security target |
Heuristics summary ?
Certification report ?
Extracted keywords
Symmetric Algorithms
AESAsymmetric Algorithms
DHProtocols
PACEOperating System name
JCOP 4Vendor
NXP Semiconductors N.V, NXPSecurity level
EAL 5, EAL2, EAL6, EAL7, EAL 1, EAL 3, EAL 7, ITSEC E6 ElevéSecurity Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_FLR.1, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSSProtection profiles
BSI-CC-PP-0059-2009-MA-01, BSI-CC-PP-0075-2012, BSI-CC-PP-0071-2012, BSI-CC-PP-0072-2012, BSI-CC-PP-0076-2013, BSI-CC-PP-0084-2014, BSI-CC-PP- 0059-2009-MA-01, BSI-CC-PP- 0075-2012, BSI-CC-PP- 0071-2012, BSI-CC-PP- 0072-2012, BSI-CC-PP-0076-, PP-SSCD-Part2, PP-SSCD-, PP-SSCD-Part4, PP-SSCD-Part5, PP-SSCD-Part6Certificates
BSI-DSZ-CC-1040-2019, ANSSI-CC-2020/11, NSCIB-CC-180212, NSCIB-CC-190212Standards
ICAO, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004File metadata
Title: | ANSSI-CC-2020/11 |
---|---|
Subject: | ChipDoc v3 on JCOP 4 P71 in SSCD configuration |
Keywords: | ANSSI-CC-CER-F-07 v29.2 |
Author: | CHERGUI Yoan |
Creation date: | D:20200327143514+01'00' |
Modification date: | D:20200327143514+01'00' |
Pages: | 15 |
Creator: | Microsoft® Word 2010 |
Producer: | Microsoft® Word 2010 |
Frontpage
Certificate ID: | ANSSI-CC-2020/11 |
---|---|
Certified item: | ChipDoc v3 on JCOP 4 P71 in SSCD configuration |
Certification lab: | THALES / CNES 290 allée du Lac, 31670 Labège, France |
Developer: | NXP Semiconductors N.V. Troplowitzstrasse 20, 22529 Hamburg, Allemagne Commanditaire NXP Semiconductors N.V. Troplowitzstrasse 20, 22529 Hamburg, Allemagne |
References
Outgoing- BSI-DSZ-CC-1040-2019 - NXP Secure Smart Card Controller N7121 with IC Dedicated Software and Crypto Library
Security target ?
Extracted keywords
Symmetric Algorithms
AES, DES, 3DES, TDESAsymmetric Algorithms
ECDSA, ECCHash functions
SHA-1, SHA-2Schemes
MACProtocols
PACERandomness
RNGLibraries
Crypto Library ........5Block cipher modes
CBCOperating System name
JCOP 4Vendor
NXP Semiconductors, NXPSecurity level
EAL5, EAL5 augmentedClaims
T.DTBS_, A.CGA, A.SCA, A.CSP, OE.HID_VADSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, ADV_FSP.4, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.2, ALC_DVS.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, ATE_DPT.1, AVA_VAN.5, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.2, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN, FCS_CKM, FCS_CKM.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_CKM.1.1, FCS_CKM.4.1, FCS_COP, FCS_COP.1.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC, FDP_ACF.1, FDP_ACC.1, FDP_ACF, FDP_DAU, FDP_DAU.1, FDP_DAU.2, FDP_ITC, FDP_IFC.1, FDP_UCT, FDP_UCT.1, FDP_UIT, FDP_UIT.1, FDP_RIP, FDP_RIP.1, FDP_RIP.1.1, FDP_SDI, FDP_SDI.1, FDP_SDI.2, FIA_API.1, FIA_API, FIA_API.1.1, FIA_UID.1, FIA_AFL, FIA_AFL.1, FIA_UAU.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UID, FIA_UID.1.1, FIA_UID.1.2, FMT_MSA.3, FMT_MOF, FMT_SMR.1, FMT_SMF.1, FMT_MOF.1, FMT_MSA, FMT_MSA.1, FMT_MSA.2, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.4, FMT_MSA.4.1, FMT_MTD, FMT_MTD.1, FMT_SMF, FMT_SMF.1.1, FMT_SMR, FMT_SMR.1.1, FMT_SMR.1.2, FMT_EMS, FPT_EMS.1, FPT_EMS, FPT_EMS.1.1, FPT_EMS.1.2, FPT_TST.1, FPT_FLS, FPT_FLS.1, FPT_FLS.1.1, FPT_TST, FPT_PHP, FPT_PHP.1, FPT_PHP.1.1, FPT_PHP.1.2, FPT_PHP.3, FPT_PHP.3.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_ITC.1, FPT_ITC, FTP_ITC.1, FTP_TRP.1, FTP_ITC, FTP_ITC.1.3Protection profiles
BSI-CC-PP-0059-2009-MA-01, BSI-CC-PP-0075, BSI-CC-PP-0071, BSI-CC-PP-0072, BSI-CC-PP-0076Certificates
NSCIB-CC-180212Side-channel analysis
SPA, DPA, timing attacks, physical tampering, malfunction, DFA, fault injectionStandards
FIPS PUB 46-3, PKCS#1, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004File metadata
Title: | Security Target Lite |
---|---|
Subject: | ChipDoc v3 on JCOP 4 P71 in SSCD configuration |
Keywords: | Common Criteria, Security Target Lite, ChipDoc v3, SSCD |
Author: | NXP B.V. |
Creation date: | D:20200224105856+01'00' |
Pages: | 69 |
Creator: | DITA Open Toolkit |
Producer: | Apache FOP Version 1.1 |
References
OutgoingHeuristics ?
Extracted SARs
ASE_TSS.1, ATE_FUN.1, ASE_CCL.1, ASE_INT.1, ALC_LCD.1, ASE_REQ.2, ASE_SPD.1, ALC_TAT.2, ATE_DPT.3, ALC_DEL.1, AVA_VAN.5, ALC_FLR.1, ALC_DVS.2, ADV_TDS.4, ALC_CMS.5, AGD_PRE.1, ASE_OBJ.2, AGD_OPE.1, ATE_IND.2, ALC_CMC.4, ADV_FSP.5, ADV_INT.2, ADV_IMP.1, ASE_ECD.1, ATE_COV.2, ADV_ARC.1Scheme data ?
Product | ChipDoc v3 on JCOP 4 P71 in SSCD configuration | |
---|---|---|
Vendor | NXP Semiconductors N.V.NXP Semiconductors N.V. | |
Level | EAL5+ | |
Id | 2020/11 | |
Certification Date | 13/03/2020 | |
Category | Smart cards | |
Url | https://www.ssi.gouv.fr/certification_cc/chipdoc-v3-on-jcop-4-p71-in-sscd-configuration/ | |
Enhanced | ||
Id | 2020/11 | |
Certification Date | 13/03/2020 | |
Expiration Date | 13/03/2025 | |
Category | Cartes à puce | |
Cc Version | Critères Communs version 3.1r5 | |
Level | EAL5+ | |
Augmentations | ALC_DVS.2, AVA_VAN.5 | |
Protection Profile | - Part 2: Device with key generation, v2.0.1, certifié BSI-CC-PP-0059-2009-MA-01 le 21 février 2012; - Part 3: Device with key import, v1.0.2, certifié BSI-CC-PP-0075-2012 le 27 septembre 2012 ; - Part 4: Extension for device with key generation and trusted communication with certificate generation application, v1.0.1, certifié BSI-CC-PP-0071-2012 le 12 décembre 2012 ; - Part 5: Extension for device with key generation and trusted communication with signature creation application, v1.0.1, certifié BSI-CC-PP-0072-2012 le 12 décembre 2012 ; - Part 6: Extension for device with key import and trusted communication with signature creation application, v1.0.4, certifié BSI-CC-PP-0076-2013 le 16 avril 2013. | |
Developer | NXP Semiconductors N.V. / NXP Semiconductors N.V. | |
Evaluation Facility | Thales / CNES | |
Recognition | SOG-IS - CCRA | |
Description | Descriptif du produit Le produit évalué est « ChipDoc v3 on JCOP 4 P71 in SSCD configuration, version 3.0.0.52 » développé par NXP Semiconductors N.V.. Il offre des services d’authentification et de signature électronique (SSCD1) conformes à la directive [1999/93/EC]. Il est embarqué sur la plateforme Java Card JCOP 4 préalablement certifiée qui est laissée ouverte après personnalisation. Il dispose d’interfaces avec et/ou sans contact. Rapport de certification Security target | |
Report Link | https://www.ssi.gouv.fr/uploads/2020/04/anssi-cc-2020_11.pdf | |
Target Link | https://www.ssi.gouv.fr/uploads/2020/04/anssi-cible-cc-2020_11en.pdf |
References ?
Updates ?
-
21.09.2023 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'product': 'ChipDoc v3 on JCOP 4 P71 in SSCD configuration', 'vendor': 'NXP Semiconductors N.V.NXP Semiconductors N.V.', 'id': '2020/11', 'certification_date': '13/03/2020', 'url': 'https://www.ssi.gouv.fr/certification_cc/chipdoc-v3-on-jcop-4-p71-in-sscd-configuration/', 'enhanced': {'__update__': {'id': '2020/11', 'certification_date': '13/03/2020', 'expiration_date': '13/03/2025', 'augmentations': 'ALC_DVS.2, AVA_VAN.5', 'protection_profile': '- Part 2: Device with key generation, v2.0.1, certifié BSI-CC-PP-0059-2009-MA-01 le 21 février 2012; - Part 3: Device with key import, v1.0.2, certifié BSI-CC-PP-0075-2012 le 27 septembre 2012 ; - Part 4: Extension for device with key generation and trusted communication with certificate generation application, v1.0.1, certifié BSI-CC-PP-0071-2012 le 12 décembre 2012 ; - Part 5: Extension for device with key generation and trusted communication with signature creation application, v1.0.1, certifié BSI-CC-PP-0072-2012 le 12 décembre 2012 ; - Part 6: Extension for device with key import and trusted communication with signature creation application, v1.0.4, certifié BSI-CC-PP-0076-2013 le 16 avril 2013.', 'developer': 'NXP Semiconductors N.V. / NXP Semiconductors N.V.', 'evaluation_facility': 'Thales / CNES', 'description': 'Descriptif du produit\n\t\t\t\tLe produit évalué est « ChipDoc v3 on JCOP 4 P71 in SSCD configuration, version 3.0.0.52 » développé par NXP Semiconductors N.V..\nIl offre des services d’authentification et de signature électronique (SSCD1) conformes à la directive [1999/93/EC]. Il est embarqué sur la plateforme Java Card JCOP 4 préalablement certifiée qui est laissée ouverte après personnalisation. Il dispose d’interfaces avec et/ou sans contact.\n\t\t\t\t\n Rapport de certification\nSecurity target', 'report_link': 'https://www.ssi.gouv.fr/uploads/2020/04/anssi-cc-2020_11.pdf', 'target_link': 'https://www.ssi.gouv.fr/uploads/2020/04/anssi-cible-cc-2020_11en.pdf'}, '__delete__': ['cert_link']}}
data.
- The scheme_data property was updated, with the
-
18.05.2023 The certificate data changed.
Certificate changed
The Protection profiles of the certificate were updated.
- The following values were removed:
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 5: Extension for device wi...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0072b_pdf.pdf', 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 4: Extension for device wi...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0071b_pdf.pdf', 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 6: Extension for device with key...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0076b_pdf.pdf', 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Ve...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0059b_pdf.pdf', 'pp_ids': None}]}
. - The following values were added:
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 6: Extension for device with key impo...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0076b_pdf.pdf', 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 5: Extension for device with key gene...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0072b_pdf.pdf', 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 4: Extension for device with key gene...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0071b_pdf.pdf', 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Version...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0059b_pdf.pdf', 'pp_ids': None}]}
.
- The following values were removed:
-
26.04.2023 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'scheme_data': {'product': 'ChipDoc v4 on JCOP 4.5 P71 in ICAO EAC with PACE configuration (Version 4.0.1.52)', 'vendor': 'NXP SEMICONDUCTORS NXP SEMICONDUCTORS', 'level': 'EAL5+', 'id': '2023/11', 'certification_date': '01/03/2023', 'category': 'Smart cards', 'url': 'https://www.ssi.gouv.fr/certification_cc/chipdoc-v4-on-jcop-4-5-p71-in-icao-eac-with-pace-configuration-version-4-0-1-52/', 'enhanced': {'id': '2023/11', 'certification_date': '01/03/2023', 'expiration_date': '01/03/2028', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 3.1r5', 'level': 'EAL5+', 'augmentations': '(ALC_DVS.2, AVA_VAN.5)', 'protection_profile': 'Machine Readable Travel Document with « ICAO Application », Extended Access Control with PACE, version 1.3.2, certifié BSI-CC-PP-0056-V2-2012-MA-02 ; Machine Readable Travel Document using Standard Inspection Procedure with PACE, version 1.0.1, certifié BSI-CC-PP-0068-V2-2011-MA-01.', 'developer': 'NXP SEMICONDUCTORS / NXP SEMICONDUCTORS', 'evaluation_facility': 'THALES / CNES', 'recognition': 'SOG-IS - CCRA', 'description': 'Descriptif du produit\n\t\t\t\tLe produit évalué est « ChipDoc v4 on JCOP 4.5 P71 in ICAO EAC with PACE configuration, Version 4.0.1.52 » développé par NXP SEMICONDUCTORS.\nIl s’agit de documents électroniques, qui permettent différents types d’usage basés sur l’identité électronique.\n\t\t\t\t\n Rapport de certification\nSecurity target\nCertificat', 'report_link': 'https://www.ssi.gouv.fr/uploads/2023/03/anssi-cc-2023_11_eac_pace.pdf', 'target_link': 'https://www.ssi.gouv.fr/uploads/2023/03/anssi-cible-cc-2023_11en.pdf', 'cert_link': 'https://www.ssi.gouv.fr/uploads/2023/03/certificat-2023_11cdv4eacpace.pdf'}}}
.
- The following values were inserted:
-
11.02.2023 The certificate data changed.
Certificate changed
The _type was updated.
- The new value is
sec_certs.sample.cc.CCCertificate
.
The Maintenance Updates of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': '2022-09-28', 'maintenance_title': 'Maintenance report : ANSSI-CC-2020/73-M01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2020_73-m01.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/files/epfiles/anssi-cible-cc-2020_73-m01.pdf'}]}
.
The state of the certificate object was updated.
- The _type property was set to
sec_certs.sample.cc.CCCertificate.InternalState
. - The following properties were deleted:
['errors']
.
The PDF extraction data was updated.
- The _type property was set to
sec_certs.sample.cc.CCCertificate.PdfData
.
The computed heuristics were updated.
- The following values were inserted:
{'direct_transitive_cves': None, 'indirect_transitive_cves': None}
. - The _type property was set to
sec_certs.sample.cc.CCCertificate.Heuristics
. - The following properties were deleted:
['direct_dependency_cves', 'indirect_dependency_cves']
.
- The new value is
-
26.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
True
. - The st_convert_ok property was set to
True
. - The st_extract_ok property was set to
True
. - The errors property was set to
[]
. - The st_pdf_hash property was set to
500bde5439804470815338b0bd566d8812388ce551eb126de63533676c804465
. - The st_txt_hash property was set to
b18eb3964ae683e8260c90f4833995de545963abb136b1e7a64f193174be1815
.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 464530, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 69, '/Title': 'Security Target Lite', '/Author': 'NXP B.V.', '/Subject': 'ChipDoc v3 on JCOP 4 P71 in SSCD configuration', '/Keywords': 'Common Criteria, Security Target Lite, ChipDoc v3, SSCD', '/Creator': 'DITA Open Toolkit', '/Producer': 'Apache FOP Version 1.1', '/CreationDate': "D:20200224105856+01'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_frontpage property was set to
{'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}
. - The st_keywords property was set to
{'cc_cert_id': {'NL': {'NSCIB-CC-180212': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0059-2009-MA-01': 1, 'BSI-CC-PP-0075': 1, 'BSI-CC-PP-0071': 1, 'BSI-CC-PP-0072': 1, 'BSI-CC-PP-0076': 1}}, 'cc_security_level': {'EAL': {'EAL5': 7, 'EAL5 augmented': 3}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 5, 'ADV_FSP.5': 6, 'ADV_IMP.1': 5, 'ADV_INT.2': 2, 'ADV_TDS.4': 8, 'ADV_FSP.4': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE.1': 4, 'AGD_PRE.1': 5}, 'ALC': {'ALC_DVS.2': 6, 'ALC_CMC.4': 2, 'ALC_CMS.5': 1, 'ALC_DEL.1': 2, 'ALC_LCD.1': 3, 'ALC_TAT.2': 3, 'ALC_DVS.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV.2': 4, 'ATE_DPT.3': 1, 'ATE_FUN.1': 3, 'ATE_IND.2': 1, 'ATE_DPT.1': 1}, 'AVA': {'AVA_VAN.5': 4}, 'ASE': {'ASE_INT.1': 4, 'ASE_CCL.1': 2, 'ASE_SPD.1': 1, 'ASE_OBJ.2': 3, 'ASE_ECD.1': 1, 'ASE_REQ.2': 4, 'ASE_TSS.1': 2}}, 'cc_sfr': {'FAU': {'FAU_GEN': 1}, 'FCS': {'FCS_CKM': 1, 'FCS_CKM.1': 16, 'FCS_CKM.2': 1, 'FCS_COP.1': 9, 'FCS_CKM.4': 14, 'FCS_CKM.1.1': 1, 'FCS_CKM.4.1': 1, 'FCS_COP': 10, 'FCS_COP.1.1': 1}, 'FDP': {'FDP_ITC.1': 7, 'FDP_ITC.2': 4, 'FDP_ACC': 44, 'FDP_ACF.1': 20, 'FDP_ACC.1': 15, 'FDP_ACF': 30, 'FDP_DAU': 8, 'FDP_DAU.1': 1, 'FDP_DAU.2': 2, 'FDP_ITC': 8, 'FDP_IFC.1': 7, 'FDP_UCT': 10, 'FDP_UCT.1': 1, 'FDP_UIT': 7, 'FDP_UIT.1': 2, 'FDP_RIP': 2, 'FDP_RIP.1': 7, 'FDP_RIP.1.1': 1, 'FDP_SDI': 15, 'FDP_SDI.1': 2, 'FDP_SDI.2': 4}, 'FIA': {'FIA_API.1': 14, 'FIA_API': 4, 'FIA_API.1.1': 3, 'FIA_UID.1': 13, 'FIA_AFL': 2, 'FIA_AFL.1': 5, 'FIA_UAU.1': 10, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_UAU': 2, 'FIA_UAU.1.1': 2, 'FIA_UAU.1.2': 1, 'FIA_UID': 2, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1}, 'FMT': {'FMT_MSA.3': 17, 'FMT_MOF': 3, 'FMT_SMR.1': 19, 'FMT_SMF.1': 17, 'FMT_MOF.1': 5, 'FMT_MSA': 16, 'FMT_MSA.1': 4, 'FMT_MSA.2': 7, 'FMT_MSA.2.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MSA.4': 8, 'FMT_MSA.4.1': 1, 'FMT_MTD': 14, 'FMT_MTD.1': 2, 'FMT_SMF': 2, 'FMT_SMF.1.1': 1, 'FMT_SMR': 2, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_EMS': 2}, 'FPT': {'FPT_EMS.1': 11, 'FPT_EMS': 3, 'FPT_EMS.1.1': 3, 'FPT_EMS.1.2': 3, 'FPT_TST.1': 9, 'FPT_FLS': 2, 'FPT_FLS.1': 6, 'FPT_FLS.1.1': 1, 'FPT_TST': 3, 'FPT_PHP': 2, 'FPT_PHP.1': 5, 'FPT_PHP.1.1': 1, 'FPT_PHP.1.2': 1, 'FPT_PHP.3': 6, 'FPT_PHP.3.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_ITC.1': 2, 'FPT_ITC': 4}, 'FTP': {'FTP_ITC.1': 16, 'FTP_TRP.1': 2, 'FTP_ITC': 28, 'FTP_ITC.1.3': 6}}, 'cc_claims': {'T': {'T.DTBS_': 1}, 'A': {'A.CGA': 3, 'A.SCA': 3, 'A.CSP': 3}, 'OE': {'OE.HID_VAD': 9}}, 'vendor': {'NXP': {'NXP Semiconductors': 29, 'NXP': 82}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 4}}, 'DES': {'DES': {'DES': 3}, '3DES': {'3DES': 1, 'TDES': 2}}}, 'asymmetric_crypto': {'ECC': {'ECDSA': {'ECDSA': 1}, 'ECC': {'ECC': 6}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}, 'SHA2': {'SHA-2': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 3}}, 'crypto_protocol': {'PACE': {'PACE': 6}}, 'randomness': {'RNG': {'RNG': 1}}, 'cipher_mode': {'CBC': {'CBC': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Generic': {'Crypto Library ........5': 1}}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'SPA': 2, 'DPA': 2, 'timing attacks': 2}, 'FI': {'physical tampering': 5, 'malfunction': 1, 'DFA': 1, 'fault injection': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {'JCOP': {'JCOP 4': 148}}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 46-3': 2}, 'PKCS': {'PKCS#1': 2}, 'CC': {'CCMB-2017-04-001': 2, 'CCMB-2017-04-002': 2, 'CCMB-2017-04-003': 2, 'CCMB-2017-04-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_filename property was set to
anssi-cible-cc-2020_11en.pdf
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]}
values added.
- The st_download_ok property was set to
-
25.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
False
. - The st_convert_ok property was set to
False
. - The st_extract_ok property was set to
False
. - The errors property was set to
['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/anssi-cible-cc-2020_11en.pdf, code: nok']
. - The st_pdf_hash property was set to
None
. - The st_txt_hash property was set to
None
.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_frontpage property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 2}]}
values added.
- The st_download_ok property was set to
-
24.12.2022 The certificate data changed.
Certificate changed
The cert_link was updated.
- The new value is
https://www.commoncriteriaportal.org/files/epfiles/certificat-ANSSI-CC-2020_11.pdf
.
The manufacturer_web was updated.
- The new value is
https://www.nxp.com/
.
The Protection profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 3: Device with key import', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0075b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['PP_SSCD_PART3_V1.0.2']}}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 5: Extension for device wi...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0072b_pdf.pdf', 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 4: Extension for device wi...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0071b_pdf.pdf', 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 6: Extension for device with key...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0076b_pdf.pdf', 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Ve...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0059b_pdf.pdf', 'pp_ids': None}]}
.
The state of the certificate object was updated.
- The st_download_ok property was set to
True
. - The st_convert_ok property was set to
True
. - The st_extract_ok property was set to
True
. - The errors property was set to
[]
. - The st_pdf_hash property was set to
500bde5439804470815338b0bd566d8812388ce551eb126de63533676c804465
. - The st_txt_hash property was set to
b18eb3964ae683e8260c90f4833995de545963abb136b1e7a64f193174be1815
.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 464530, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 69, '/Title': 'Security Target Lite', '/Author': 'NXP B.V.', '/Subject': 'ChipDoc v3 on JCOP 4 P71 in SSCD configuration', '/Keywords': 'Common Criteria, Security Target Lite, ChipDoc v3, SSCD', '/Creator': 'DITA Open Toolkit', '/Producer': 'Apache FOP Version 1.1', '/CreationDate': "D:20200224105856+01'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_frontpage property was set to
{'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}
. - The st_keywords property was set to
{'cc_cert_id': {'NL': {'NSCIB-CC-180212': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0059-2009-MA-01': 1, 'BSI-CC-PP-0075': 1, 'BSI-CC-PP-0071': 1, 'BSI-CC-PP-0072': 1, 'BSI-CC-PP-0076': 1}}, 'cc_security_level': {'EAL': {'EAL5': 7, 'EAL5 augmented': 3}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 5, 'ADV_FSP.5': 6, 'ADV_IMP.1': 5, 'ADV_INT.2': 2, 'ADV_TDS.4': 8, 'ADV_FSP.4': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE.1': 4, 'AGD_PRE.1': 5}, 'ALC': {'ALC_DVS.2': 6, 'ALC_CMC.4': 2, 'ALC_CMS.5': 1, 'ALC_DEL.1': 2, 'ALC_LCD.1': 3, 'ALC_TAT.2': 3, 'ALC_DVS.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV.2': 4, 'ATE_DPT.3': 1, 'ATE_FUN.1': 3, 'ATE_IND.2': 1, 'ATE_DPT.1': 1}, 'AVA': {'AVA_VAN.5': 4}, 'ASE': {'ASE_INT.1': 4, 'ASE_CCL.1': 2, 'ASE_SPD.1': 1, 'ASE_OBJ.2': 3, 'ASE_ECD.1': 1, 'ASE_REQ.2': 4, 'ASE_TSS.1': 2}}, 'cc_sfr': {'FAU': {'FAU_GEN': 1}, 'FCS': {'FCS_CKM': 1, 'FCS_CKM.1': 16, 'FCS_CKM.2': 1, 'FCS_COP.1': 9, 'FCS_CKM.4': 14, 'FCS_CKM.1.1': 1, 'FCS_CKM.4.1': 1, 'FCS_COP': 10, 'FCS_COP.1.1': 1}, 'FDP': {'FDP_ITC.1': 7, 'FDP_ITC.2': 4, 'FDP_ACC': 44, 'FDP_ACF.1': 20, 'FDP_ACC.1': 15, 'FDP_ACF': 30, 'FDP_DAU': 8, 'FDP_DAU.1': 1, 'FDP_DAU.2': 2, 'FDP_ITC': 8, 'FDP_IFC.1': 7, 'FDP_UCT': 10, 'FDP_UCT.1': 1, 'FDP_UIT': 7, 'FDP_UIT.1': 2, 'FDP_RIP': 2, 'FDP_RIP.1': 7, 'FDP_RIP.1.1': 1, 'FDP_SDI': 15, 'FDP_SDI.1': 2, 'FDP_SDI.2': 4}, 'FIA': {'FIA_API.1': 14, 'FIA_API': 4, 'FIA_API.1.1': 3, 'FIA_UID.1': 13, 'FIA_AFL': 2, 'FIA_AFL.1': 5, 'FIA_UAU.1': 10, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_UAU': 2, 'FIA_UAU.1.1': 2, 'FIA_UAU.1.2': 1, 'FIA_UID': 2, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1}, 'FMT': {'FMT_MSA.3': 17, 'FMT_MOF': 3, 'FMT_SMR.1': 19, 'FMT_SMF.1': 17, 'FMT_MOF.1': 5, 'FMT_MSA': 16, 'FMT_MSA.1': 4, 'FMT_MSA.2': 7, 'FMT_MSA.2.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MSA.4': 8, 'FMT_MSA.4.1': 1, 'FMT_MTD': 14, 'FMT_MTD.1': 2, 'FMT_SMF': 2, 'FMT_SMF.1.1': 1, 'FMT_SMR': 2, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_EMS': 2}, 'FPT': {'FPT_EMS.1': 11, 'FPT_EMS': 3, 'FPT_EMS.1.1': 3, 'FPT_EMS.1.2': 3, 'FPT_TST.1': 9, 'FPT_FLS': 2, 'FPT_FLS.1': 6, 'FPT_FLS.1.1': 1, 'FPT_TST': 3, 'FPT_PHP': 2, 'FPT_PHP.1': 5, 'FPT_PHP.1.1': 1, 'FPT_PHP.1.2': 1, 'FPT_PHP.3': 6, 'FPT_PHP.3.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_ITC.1': 2, 'FPT_ITC': 4}, 'FTP': {'FTP_ITC.1': 16, 'FTP_TRP.1': 2, 'FTP_ITC': 28, 'FTP_ITC.1.3': 6}}, 'cc_claims': {'T': {'T.DTBS_': 1}, 'A': {'A.CGA': 3, 'A.SCA': 3, 'A.CSP': 3}, 'OE': {'OE.HID_VAD': 9}}, 'vendor': {'NXP': {'NXP Semiconductors': 29, 'NXP': 82}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 4}}, 'DES': {'DES': {'DES': 3}, '3DES': {'3DES': 1, 'TDES': 2}}}, 'asymmetric_crypto': {'ECC': {'ECDSA': {'ECDSA': 1}, 'ECC': {'ECC': 6}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}, 'SHA2': {'SHA-2': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 3}}, 'crypto_protocol': {'PACE': {'PACE': 6}}, 'randomness': {'RNG': {'RNG': 1}}, 'cipher_mode': {'CBC': {'CBC': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Generic': {'Crypto Library ........5': 1}}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'SPA': 2, 'DPA': 2, 'timing attacks': 2}, 'FI': {'physical tampering': 5, 'malfunction': 1, 'DFA': 1, 'fault injection': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {'JCOP': {'JCOP 4': 148}}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 46-3': 2}, 'PKCS': {'PKCS#1': 2}, 'CC': {'CCMB-2017-04-001': 2, 'CCMB-2017-04-002': 2, 'CCMB-2017-04-003': 2, 'CCMB-2017-04-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_filename property was set to
anssi-cible-cc-2020_11en.pdf
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]}
values added.
- The new value is
-
23.12.2022 The certificate data changed.
Certificate changed
The cert_link was updated.
- The new value is
None
.
The manufacturer_web was updated.
- The new value is
None
.
The Protection profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'PP_SSCD_PART6_V1.0.4', 'pp_eal': None, 'pp_link': None, 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'P_SSCD_PART4_V1.0.1', 'pp_eal': None, 'pp_link': None, 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'PP_SSCD_PART3_V1.0.2', 'pp_eal': None, 'pp_link': None, 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'PP_SSCD_PART2_V1.03', 'pp_eal': None, 'pp_link': None, 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'PP_SSCD_PART5_V1.0.1', 'pp_eal': None, 'pp_link': None, 'pp_ids': None}]}
.
The state of the certificate object was updated.
- The st_download_ok property was set to
False
. - The report_download_ok property was set to
True
. - The st_convert_ok property was set to
False
. - The report_convert_ok property was set to
True
. - The st_extract_ok property was set to
False
. - The report_extract_ok property was set to
True
. - The errors property was set to
['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/anssi-cible-cc-2020_11en.pdf, code: nok']
. - The st_pdf_hash property was set to
None
. - The report_pdf_hash property was set to
e3010fe0d9f476dfcd80181c637f3dd2ccd804af62e9dbaf6d3ead506b532126
. - The st_txt_hash property was set to
None
. - The report_txt_hash property was set to
56848a78b8aad2ec4fbf19641657b131d38fed897dca66f1c9c10c7bd7c6fd6a
.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 560212, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 15, '/Title': 'ANSSI-CC-2020/11', '/Author': 'CHERGUI Yoan', '/Subject': 'ChipDoc v3 on JCOP 4 P71 in SSCD configuration', '/Keywords': 'ANSSI-CC-CER-F-07 v29.2', '/Creator': 'Microsoft® Word 2010', '/CreationDate': "D:20200327143514+01'00'", '/ModDate': "D:20200327143514+01'00'", '/Producer': 'Microsoft® Word 2010', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['mailto:certification@ssi.gouv.fr', 'http://www.ssi.gouv.fr/']}}
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
{'anssi': {'match_rules': ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur (.+)Centre d’évaluation(.+)Accords de reconnaissance applicables'], 'cert_id': 'ANSSI-CC-2020/11', 'cert_item': 'ChipDoc v3 on JCOP 4 P71 in SSCD configuration', 'cert_item_version': 'Version 3.0.0.52', 'ref_protection_profiles': 'Protection profiles for secure signature creation device : Part 2: Device with key generation, v2.0.1, certifié BSI-CC-PP-0059-2009-MA-01 le 21 février 2012; Part 3: Device with key import, v1.0.2, certifié BSI-CC-PP-0075-2012 le 27 septembre 2012 ; Part 4: Extension for device with key generation and trusted communication with certificate generation application, v1.0.1, certifié BSI-CC-PP-0071-2012 le 12 décembre 2012 ; Part 5: Extension for device with key generation and trusted communication with signature creation application, v1.0.1, certifié BSI-CC-PP-0072-2012 le 12 décembre 2012 ; Part 6: Extension for device with key import and trusted communication with signature creation application, v1.0.4, certifié BSI-CC-PP-0076-2013 le 16 avril 2013', 'cc_version': 'Critères Communs version 3.1 révision 5', 'cc_security_level': 'EAL 5 augmenté ALC_DVS.2, AVA_VAN.5', 'developer': 'NXP Semiconductors N.V. Troplowitzstrasse 20, 22529 Hamburg, Allemagne Commanditaire NXP Semiconductors N.V. Troplowitzstrasse 20, 22529 Hamburg, Allemagne', 'cert_lab': 'THALES / CNES 290 allée du Lac, 31670 Labège, France'}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}
. - The st_frontpage property was set to
None
. - The report_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-1040-2019': 4}, 'FR': {'ANSSI-CC-2020/11': 32}, 'NL': {'NSCIB-CC-180212': 2, 'NSCIB-CC-190212': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0059-2009-MA-01': 1, 'BSI-CC-PP-0075-2012': 1, 'BSI-CC-PP-0071-2012': 1, 'BSI-CC-PP-0072-2012': 1, 'BSI-CC-PP-0076-2013': 1, 'BSI-CC-PP-0084-2014': 1, 'BSI-CC-PP- 0059-2009-MA-01': 1, 'BSI-CC-PP- 0075-2012': 1, 'BSI-CC-PP- 0071-2012': 1, 'BSI-CC-PP- 0072-2012': 1, 'BSI-CC-PP-0076-': 1}, 'other': {'PP-SSCD-Part2': 1, 'PP-SSCD-': 6, 'PP-SSCD-Part4': 1, 'PP-SSCD-Part5': 1, 'PP-SSCD-Part6': 1}}, 'cc_security_level': {'EAL': {'EAL 5': 2, 'EAL2': 2, 'EAL6': 1, 'EAL7': 1, 'EAL 1': 1, 'EAL 3': 1, 'EAL 7': 1}, 'ITSEC': {'ITSEC E6 Elevé': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_DVS.2': 2, 'ALC_FLR.1': 1, 'ALC_FLR': 2, 'ALC_CMC': 1, 'ALC_CMS': 2, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.5': 3, 'AVA_VAN': 2}, 'ASE': {'ASE_TSS.2': 1, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'NXP': {'NXP Semiconductors N.V': 3, 'NXP': 9}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}}}, 'asymmetric_crypto': {'FF': {'DH': {'DH': 1}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'PACE': {'PACE': 1}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {'JCOP': {'JCOP 4': 24}}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ICAO': {'ICAO': 2}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
None
. - The report_filename property was set to
anssi-cc-2020_11.pdf
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
['THALES']
. - The cert_id property was set to
ANSSI-CC-2020/11
. - The report_references property was updated, with the
{'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1040-2019']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1040-2019']}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 2}]}
values added.
- The new value is
-
23.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report_download_ok property was set to
False
. - The report_convert_ok property was set to
False
. - The report_extract_ok property was set to
False
. - The errors property was set to
['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2020_11.pdf, code: nok', 'failed to download report from https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2020_11.pdf, code: nok']
. - The report_pdf_hash property was set to
None
. - The report_txt_hash property was set to
None
.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The report_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
. - The report_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}]}
values discarded.
- The report_download_ok property was set to
-
15.10.2022 The certificate data changed.
Certificate changed
The Maintenance Updates of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.common_criteria.CommonCriteriaCert.MaintenanceReport', 'maintenance_date': '2022-09-28', 'maintenance_title': 'Maintenance report : ANSSI-CC-2020/73-M01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2020_73-m01.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/files/epfiles/anssi-cible-cc-2020_73-m01.pdf'}]}
.
- The new value is
-
05.10.2022 The certificate data changed.
Certificate changed
The Protection profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 3: Device with key import', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0075b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['PP_SSCD_PART3_V1.0.2']}}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 5: Extension for device wi...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0072b_pdf.pdf', 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 4: Extension for device wi...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0071b_pdf.pdf', 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 6: Extension for device with key...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0076b_pdf.pdf', 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Ve...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0059b_pdf.pdf', 'pp_ids': None}]}
.
The state of the certificate object was updated.
- The following values were inserted:
{'st_convert_garbage': False, 'report_convert_garbage': False}
.
- The new value is
-
04.10.2022 The certificate data changed.
Certificate changed
The Protection profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Ve...', 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/pp0059b_pdf.pdf', 'pp_link': None, 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 3: Device with key import', 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/pp0075b_pdf.pdf', 'pp_link': None, 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 6: Extension for device with key...', 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/pp0076b_pdf.pdf', 'pp_link': None, 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 5: Extension for device wi...', 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/pp0072b_pdf.pdf', 'pp_link': None, 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 4: Extension for device wi...', 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/pp0071b_pdf.pdf', 'pp_link': None, 'pp_ids': None}]}
.
- The new value is
-
28.09.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data. - The report_references property was updated, with the
{'directly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['NSCIB-CC-180212', 'NSCIB-CC-190212']}}, 'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['NSCIB-CC-180212', 'NSCIB-CC-190212']}}}
data.
- The st_references property was updated, with the
-
24.09.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The following values were inserted:
{'report_filename': 'anssi-cc-2020_11.pdf', 'st_filename': 'anssi-cible-cc-2020_11en.pdf'}
. - The report_keywords property was updated, with the
{'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1040-2019': 4}}}}, 'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL2': 2}, '__delete__': ['EAL 2', 'EAL 4', 'EAL 6', 'EAL 5+']}}}, 'cc_sar': {'__update__': {'ALC': {'__update__': {'ALC_FLR': 2}, '__delete__': ['ALC_LCD']}, 'AVA': {'__update__': {'AVA_VAN.5': 3}}}}, 'vendor': {'__update__': {'NXP': {'__update__': {'NXP Semiconductors N.V': 3}, '__delete__': ['NXP Semiconductors']}}}, 'symmetric_crypto': {'__delete__': ['DES']}, 'tee_name': {}, 'standard_id': {'__update__': {'ICAO': {'__update__': {'ICAO': 2}}, 'CC': {'__insert__': {'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}}}}
data. - The st_keywords property was updated, with the
{'cc_sar': {'__update__': {'ADV': {'__update__': {'ADV_FSP.5': 6, 'ADV_IMP.1': 5}}, 'ALC': {'__update__': {'ALC_CMS.5': 1, 'ALC_DVS.2': 6}}, 'ATE': {'__update__': {'ATE_DPT.3': 1, 'ATE_FUN.1': 3, 'ATE_IND.2': 1}}, 'ASE': {'__update__': {'ASE_SPD.1': 1, 'ASE_ECD.1': 1}}}}, 'cc_sfr': {'__update__': {'FCS': {'__update__': {'FCS_CKM.1': 16, 'FCS_COP.1': 9, 'FCS_CKM.4': 14, 'FCS_COP': 10}}, 'FDP': {'__insert__': {'FDP_DAU.2': 2, 'FDP_UCT.1': 1, 'FDP_UIT.1': 2, 'FDP_SDI.2': 4}, '__update__': {'FDP_ITC.1': 7, 'FDP_ACC': 44, 'FDP_ACF.1': 20, 'FDP_ACF': 30, 'FDP_ACC.1': 15, 'FDP_DAU': 8, 'FDP_ITC': 8, 'FDP_UCT': 10, 'FDP_UIT': 7, 'FDP_SDI': 15}}, 'FIA': {'__update__': {'FIA_API.1.1': 3, 'FIA_UID.1': 13}}, 'FMT': {'__insert__': {'FMT_MTD.1': 2}, '__update__': {'FMT_MOF': 3, 'FMT_SMR.1': 19, 'FMT_SMF.1': 17, 'FMT_MSA': 16, 'FMT_MSA.1': 4, 'FMT_MSA.4': 8, 'FMT_MTD': 14, 'FMT_MOF.1': 5}}, 'FPT': {'__insert__': {'FPT_ITC': 4}, '__update__': {'FPT_EMS.1': 11, 'FPT_ITC.1': 2}}, 'FTP': {'__update__': {'FTP_ITC.1': 16, 'FTP_ITC': 28, 'FTP_ITC.1.3': 6}}}}, 'vendor': {'__update__': {'NXP': {'__update__': {'NXP Semiconductors': 29, 'NXP': 82}}}}, 'symmetric_crypto': {'__update__': {'DES': {'__update__': {'DES': {'__update__': {'DES': 3}}}}}, '__delete__': ['miscellaneous']}, 'asymmetric_crypto': {'__delete__': ['FF']}, 'crypto_scheme': {'__update__': {'MAC': {'__update__': {'MAC': 3}}}}}
data.
- The following values were inserted:
-
02.09.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
True
. - The errors property was set to
[]
. - The st_pdf_hash property was set to
500bde5439804470815338b0bd566d8812388ce551eb126de63533676c804465
. - The st_txt_hash property was set to
b18eb3964ae683e8260c90f4833995de545963abb136b1e7a64f193174be1815
.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 464530, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 69, '/Title': 'Security Target Lite', '/Author': 'NXP B.V.', '/Subject': 'ChipDoc v3 on JCOP 4 P71 in SSCD configuration', '/Keywords': 'Common Criteria, Security Target Lite, ChipDoc v3, SSCD', '/Creator': 'DITA Open Toolkit', '/Producer': 'Apache FOP Version 1.1', '/CreationDate': "D:20200224105856+01'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_frontpage property was set to
{'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}
. - The st_keywords property was set to
{'cc_cert_id': {'NL': {'NSCIB-CC-180212': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0059-2009-MA-01': 1, 'BSI-CC-PP-0075': 1, 'BSI-CC-PP-0071': 1, 'BSI-CC-PP-0072': 1, 'BSI-CC-PP-0076': 1}}, 'cc_security_level': {'EAL': {'EAL5': 7, 'EAL5 augmented': 3}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 5, 'ADV_FSP.5': 9, 'ADV_IMP.1': 7, 'ADV_INT.2': 2, 'ADV_TDS.4': 8, 'ADV_FSP.4': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE.1': 4, 'AGD_PRE.1': 5}, 'ALC': {'ALC_CMC.4': 2, 'ALC_CMS.5': 3, 'ALC_DEL.1': 2, 'ALC_DVS.2': 5, 'ALC_LCD.1': 3, 'ALC_TAT.2': 3, 'ALC_DVS.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV.2': 4, 'ATE_DPT.3': 2, 'ATE_FUN.1': 4, 'ATE_IND.2': 2, 'ATE_DPT.1': 1}, 'AVA': {'AVA_VAN.5': 4}, 'ASE': {'ASE_INT.1': 4, 'ASE_CCL.1': 2, 'ASE_SPD.1': 3, 'ASE_OBJ.2': 3, 'ASE_ECD.1': 4, 'ASE_REQ.2': 4, 'ASE_TSS.1': 2}}, 'cc_sfr': {'FAU': {'FAU_GEN': 1}, 'FCS': {'FCS_CKM': 1, 'FCS_CKM.1': 15, 'FCS_CKM.2': 1, 'FCS_COP.1': 8, 'FCS_CKM.4': 15, 'FCS_CKM.1.1': 1, 'FCS_CKM.4.1': 1, 'FCS_COP': 2, 'FCS_COP.1.1': 1}, 'FDP': {'FDP_ITC.1': 4, 'FDP_ITC.2': 4, 'FDP_ACC': 2, 'FDP_ACF.1': 4, 'FDP_ACF': 2, 'FDP_ACC.1': 11, 'FDP_DAU': 2, 'FDP_DAU.1': 1, 'FDP_ITC': 2, 'FDP_IFC.1': 7, 'FDP_UCT': 2, 'FDP_UIT': 2, 'FDP_RIP': 2, 'FDP_RIP.1': 7, 'FDP_RIP.1.1': 1, 'FDP_SDI': 2, 'FDP_SDI.1': 2}, 'FIA': {'FIA_API.1': 14, 'FIA_API': 4, 'FIA_API.1.1': 2, 'FIA_UID.1': 14, 'FIA_AFL': 2, 'FIA_AFL.1': 5, 'FIA_UAU.1': 10, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_UAU': 2, 'FIA_UAU.1.1': 2, 'FIA_UAU.1.2': 1, 'FIA_UID': 2, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1}, 'FMT': {'FMT_MSA.3': 17, 'FMT_MOF': 1, 'FMT_SMR.1': 20, 'FMT_SMF.1': 18, 'FMT_MSA': 1, 'FMT_MSA.2': 7, 'FMT_MSA.1': 2, 'FMT_MSA.2.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MSA.4': 7, 'FMT_MSA.4.1': 1, 'FMT_MTD': 2, 'FMT_SMF': 2, 'FMT_SMF.1.1': 1, 'FMT_SMR': 2, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_EMS': 2, 'FMT_MOF.1': 4}, 'FPT': {'FPT_EMS.1': 12, 'FPT_EMS': 3, 'FPT_EMS.1.1': 3, 'FPT_EMS.1.2': 3, 'FPT_TST.1': 9, 'FPT_FLS': 2, 'FPT_FLS.1': 6, 'FPT_FLS.1.1': 1, 'FPT_TST': 3, 'FPT_PHP': 2, 'FPT_PHP.1': 5, 'FPT_PHP.1.1': 1, 'FPT_PHP.1.2': 1, 'FPT_PHP.3': 6, 'FPT_PHP.3.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_ITC.1': 1}, 'FTP': {'FTP_ITC.1': 2, 'FTP_TRP.1': 2, 'FTP_ITC': 2, 'FTP_ITC.1.3': 3}}, 'cc_claims': {'T': {'T.DTBS_': 1}, 'A': {'A.CGA': 3, 'A.SCA': 3, 'A.CSP': 3}, 'OE': {'OE.HID_VAD': 9}}, 'vendor': {'NXP': {'NXP Semiconductors': 94, 'NXP': 86}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 4}}, 'DES': {'DES': {'DES': 6}, '3DES': {'3DES': 1, 'TDES': 2}}, 'miscellaneous': {'SEED': {'SEED': 1}}}, 'asymmetric_crypto': {'ECC': {'ECDSA': {'ECDSA': 1}, 'ECC': {'ECC': 6}}, 'FF': {'DSA': {'DSA': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}, 'SHA2': {'SHA-2': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 9}}, 'crypto_protocol': {'PACE': {'PACE': 6}}, 'randomness': {'RNG': {'RNG': 1}}, 'cipher_mode': {'CBC': {'CBC': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Generic': {'Crypto Library ........5': 1}}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'SPA': 2, 'DPA': 2, 'timing attacks': 2}, 'FI': {'physical tampering': 5, 'malfunction': 1, 'DFA': 1, 'fault injection': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {'JCOP': {'JCOP 4': 148}}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 46-3': 2}, 'PKCS': {'PKCS#1': 2}, 'CC': {'CCMB-2017-04-001': 2, 'CCMB-2017-04-002': 2, 'CCMB-2017-04-003': 2, 'CCMB-2017-04-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
.
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referencing': {'_type': 'Set', 'elements': ['NSCIB-CC-180212']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['NSCIB-CC-180212']}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]}
values added.
- The st_download_ok property was set to
-
01.09.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
False
. - The errors property was set to
['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2020_11.pdf, code: 408']
. - The st_pdf_hash property was set to
None
. - The st_txt_hash property was set to
None
.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_frontpage property was set to
None
. - The st_keywords property was set to
None
.
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 2}]}
values added.
- The st_download_ok property was set to
-
28.07.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_extract_ok property was set to
True
. - The errors property was set to
[]
.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 464530, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 69, '/Title': 'Security Target Lite', '/Author': 'NXP B.V.', '/Subject': 'ChipDoc v3 on JCOP 4 P71 in SSCD configuration', '/Keywords': 'Common Criteria, Security Target Lite, ChipDoc v3, SSCD', '/Creator': 'DITA Open Toolkit', '/Producer': 'Apache FOP Version 1.1', '/CreationDate': "D:20200224105856+01'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
.
- The st_extract_ok property was set to
-
18.07.2022 The certificate data changed.
Certificate changed
The _type was updated.
- The new value is
sec_certs.sample.common_criteria.CommonCriteriaCert
.
The Protection profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Ve...', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0059b_pdf.pdf', 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 6: Extension for device with key...', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0076b_pdf.pdf', 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 5: Extension for device wi...', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0072b_pdf.pdf', 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 3: Device with key import', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0075b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['PP_SSCD_PART3_V1.0.2']}}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 4: Extension for device wi...', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0071b_pdf.pdf', 'pp_ids': None}]}
.
The state of the certificate object was updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState
.
The PDF extraction data was updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData
.
The computed heuristics were updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics
. - The st_references property was updated, with the
{'_type': 'sec_certs.sample.certificate.References'}
data. - The report_references property was updated, with the
{'_type': 'sec_certs.sample.certificate.References'}
data. - The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]}
.
- The new value is
-
17.07.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_extract_ok property was set to
False
. - The errors property was set to
['Failed to read metadata of certs/targets/pdf/ce14eb1b2318f054.pdf, error: can only concatenate list (not "IndirectObject") to list', 'Failed to read metadata of certs/targets/pdf/ce14eb1b2318f054.pdf, error: can only concatenate list (not "IndirectObject") to list']
.
The PDF extraction data was updated.
- The report_metadata property was updated, with the
{'pdf_hyperlinks': {'_type': 'Set', 'elements': ['mailto:certification@ssi.gouv.fr', 'http://www.ssi.gouv.fr/']}}
values inserted. - The st_metadata property was set to
None
. - The report_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-1040-2019': 2}, 'FR': {'ANSSI-CC-2020/11': 32}, 'NL': {'NSCIB-CC-180212': 2, 'NSCIB-CC-190212': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0059-2009-MA-01': 1, 'BSI-CC-PP-0075-2012': 1, 'BSI-CC-PP-0071-2012': 1, 'BSI-CC-PP-0072-2012': 1, 'BSI-CC-PP-0076-2013': 1, 'BSI-CC-PP-0084-2014': 1, 'BSI-CC-PP- 0059-2009-MA-01': 1, 'BSI-CC-PP- 0075-2012': 1, 'BSI-CC-PP- 0071-2012': 1, 'BSI-CC-PP- 0072-2012': 1, 'BSI-CC-PP-0076-': 1}, 'other': {'PP-SSCD-Part2': 1, 'PP-SSCD-': 6, 'PP-SSCD-Part4': 1, 'PP-SSCD-Part5': 1, 'PP-SSCD-Part6': 1}}, 'cc_security_level': {'EAL': {'EAL 5': 2, 'EAL6': 1, 'EAL7': 1, 'EAL2': 1, 'EAL 1': 1, 'EAL 2': 1, 'EAL 3': 1, 'EAL 4': 1, 'EAL 6': 1, 'EAL 7': 1, 'EAL 5+': 1}, 'ITSEC': {'ITSEC E6 Elevé': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_DVS.2': 2, 'ALC_FLR.1': 1, 'ALC_CMC': 1, 'ALC_CMS': 2, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_FLR': 1, 'ALC_LCD': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.5': 2, 'AVA_VAN': 2}, 'ASE': {'ASE_TSS.2': 1, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'NXP': {'NXP Semiconductors N.V': 2, 'NXP Semiconductors': 1, 'NXP': 9}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}}, 'DES': {'DES': {'DES': 2}}}, 'asymmetric_crypto': {'FF': {'DH': {'DH': 1}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'PACE': {'PACE': 1}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 1}}, 'os_name': {'JCOP': {'JCOP 4': 24}}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ICAO': {'ICAO': 3}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {'NL': {'NSCIB-CC-180212': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0059-2009-MA-01': 1, 'BSI-CC-PP-0075': 1, 'BSI-CC-PP-0071': 1, 'BSI-CC-PP-0072': 1, 'BSI-CC-PP-0076': 1}}, 'cc_security_level': {'EAL': {'EAL5': 7, 'EAL5 augmented': 3}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 5, 'ADV_FSP.5': 9, 'ADV_IMP.1': 7, 'ADV_INT.2': 2, 'ADV_TDS.4': 8, 'ADV_FSP.4': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE.1': 4, 'AGD_PRE.1': 5}, 'ALC': {'ALC_CMC.4': 2, 'ALC_CMS.5': 3, 'ALC_DEL.1': 2, 'ALC_DVS.2': 5, 'ALC_LCD.1': 3, 'ALC_TAT.2': 3, 'ALC_DVS.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV.2': 4, 'ATE_DPT.3': 2, 'ATE_FUN.1': 4, 'ATE_IND.2': 2, 'ATE_DPT.1': 1}, 'AVA': {'AVA_VAN.5': 4}, 'ASE': {'ASE_INT.1': 4, 'ASE_CCL.1': 2, 'ASE_SPD.1': 3, 'ASE_OBJ.2': 3, 'ASE_ECD.1': 4, 'ASE_REQ.2': 4, 'ASE_TSS.1': 2}}, 'cc_sfr': {'FAU': {'FAU_GEN': 1}, 'FCS': {'FCS_CKM': 1, 'FCS_CKM.1': 15, 'FCS_CKM.2': 1, 'FCS_COP.1': 8, 'FCS_CKM.4': 15, 'FCS_CKM.1.1': 1, 'FCS_CKM.4.1': 1, 'FCS_COP': 2, 'FCS_COP.1.1': 1}, 'FDP': {'FDP_ITC.1': 4, 'FDP_ITC.2': 4, 'FDP_ACC': 2, 'FDP_ACF.1': 4, 'FDP_ACF': 2, 'FDP_ACC.1': 11, 'FDP_DAU': 2, 'FDP_DAU.1': 1, 'FDP_ITC': 2, 'FDP_IFC.1': 7, 'FDP_UCT': 2, 'FDP_UIT': 2, 'FDP_RIP': 2, 'FDP_RIP.1': 7, 'FDP_RIP.1.1': 1, 'FDP_SDI': 2, 'FDP_SDI.1': 2}, 'FIA': {'FIA_API.1': 14, 'FIA_API': 4, 'FIA_API.1.1': 2, 'FIA_UID.1': 14, 'FIA_AFL': 2, 'FIA_AFL.1': 5, 'FIA_UAU.1': 10, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_UAU': 2, 'FIA_UAU.1.1': 2, 'FIA_UAU.1.2': 1, 'FIA_UID': 2, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1}, 'FMT': {'FMT_MSA.3': 17, 'FMT_MOF': 1, 'FMT_SMR.1': 20, 'FMT_SMF.1': 18, 'FMT_MSA': 1, 'FMT_MSA.2': 7, 'FMT_MSA.1': 2, 'FMT_MSA.2.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MSA.4': 7, 'FMT_MSA.4.1': 1, 'FMT_MTD': 2, 'FMT_SMF': 2, 'FMT_SMF.1.1': 1, 'FMT_SMR': 2, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_EMS': 2, 'FMT_MOF.1': 4}, 'FPT': {'FPT_EMS.1': 12, 'FPT_EMS': 3, 'FPT_EMS.1.1': 3, 'FPT_EMS.1.2': 3, 'FPT_TST.1': 9, 'FPT_FLS': 2, 'FPT_FLS.1': 6, 'FPT_FLS.1.1': 1, 'FPT_TST': 3, 'FPT_PHP': 2, 'FPT_PHP.1': 5, 'FPT_PHP.1.1': 1, 'FPT_PHP.1.2': 1, 'FPT_PHP.3': 6, 'FPT_PHP.3.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_ITC.1': 1}, 'FTP': {'FTP_ITC.1': 2, 'FTP_TRP.1': 2, 'FTP_ITC': 2, 'FTP_ITC.1.3': 3}}, 'cc_claims': {'T': {'T.DTBS_': 1}, 'A': {'A.CGA': 3, 'A.SCA': 3, 'A.CSP': 3}, 'OE': {'OE.HID_VAD': 9}}, 'vendor': {'NXP': {'NXP Semiconductors': 94, 'NXP': 86}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 4}}, 'DES': {'DES': {'DES': 6}, '3DES': {'3DES': 1, 'TDES': 2}}, 'miscellaneous': {'SEED': {'SEED': 1}}}, 'asymmetric_crypto': {'ECC': {'ECDSA': {'ECDSA': 1}, 'ECC': {'ECC': 6}}, 'FF': {'DSA': {'DSA': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}, 'SHA2': {'SHA-2': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 9}}, 'crypto_protocol': {'PACE': {'PACE': 6}}, 'randomness': {'RNG': {'RNG': 1}}, 'cipher_mode': {'CBC': {'CBC': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Generic': {'Crypto Library ........5': 1}}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'SPA': 2, 'DPA': 2, 'timing attacks': 2}, 'FI': {'physical tampering': 5, 'malfunction': 1, 'DFA': 1, 'fault injection': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {'JCOP': {'JCOP 4': 148}}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 46-3': 2}, 'PKCS': {'PKCS#1': 2}, 'CC': {'CCMB-2017-04-001': 2, 'CCMB-2017-04-002': 2, 'CCMB-2017-04-003': 2, 'CCMB-2017-04-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
.
The computed heuristics were updated.
- The _type property was set to
Heuristics
.
- The st_extract_ok property was set to
-
14.06.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The following values were inserted:
{'report_pdf_hash': 'e3010fe0d9f476dfcd80181c637f3dd2ccd804af62e9dbaf6d3ead506b532126', 'st_pdf_hash': '500bde5439804470815338b0bd566d8812388ce551eb126de63533676c804465', 'report_txt_hash': '56848a78b8aad2ec4fbf19641657b131d38fed897dca66f1c9c10c7bd7c6fd6a', 'st_txt_hash': 'b18eb3964ae683e8260c90f4833995de545963abb136b1e7a64f193174be1815'}
.
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'rules_symmetric_crypto': {'AES': 1, 'DES': 2}, 'rules_asymmetric_crypto': {'DH': 1}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {'PACE': 1}, 'rules_randomness': {}, 'rules_tee': {'SE': 1}, 'rules_side_channels': {}}
values inserted. - The st_keywords property was updated, with the
{'rules_symmetric_crypto': {'AES': 4, 'DES': 3, '3DES': 1, 'TDES': 2}, 'rules_asymmetric_crypto': {'ECDSA': 1, 'ECC': 6, 'DSA': 1}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA-1': 1}, 'rules_crypto_schemes': {'PACE': 6, 'MAC': 9}, 'rules_randomness': {'RNG': 1}, 'rules_tee': {}, 'rules_side_channels': {'malfunction': 1, 'physical tampering': 5, 'SPA': 2, 'DPA': 2, 'DFA': 1, 'fault injection': 1, 'timing attacks': 2}}
values inserted.
- The following values were inserted:
-
13.05.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}]}}
.
- The following values were inserted:
-
24.04.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'direct_dependency_cves': None, 'indirect_dependency_cves': None}
.
- The following values were inserted:
-
08.03.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': {'_type': 'Set', 'elements': ['NSCIB-CC-180212']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['NSCIB-CC-180212']}}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1040-2019', 'NSCIB-CC-180212', 'NSCIB-CC-190212']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1040-2019', 'NSCIB-CC-180212', 'NSCIB-CC-190212']}}}
. - The following properties were deleted:
['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting']
.
- The following values were inserted:
-
18.02.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_frontpage property was updated, with the
{'nscib': {}, 'niap': {}, 'canada': {}}
values inserted. - The st_frontpage property was updated, with the
{'nscib': {}, 'niap': {}, 'canada': {}}
values inserted.
The computed heuristics were updated.
- The extracted_versions property was set to
{'_type': 'Set', 'elements': ['4']}
.
- The report_frontpage property was updated, with the
-
01.02.2022 The certificate data changed.
Certificate changed
The Protection profiles of the certificate were updated.
- The following values were removed:
{'_type': 'Set', 'elements': [{'_type': 'ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 3: Device with key import', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0075b_pdf.pdf', 'pp_ids': None}]}
. - The following values were added:
{'_type': 'Set', 'elements': [{'_type': 'ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 3: Device with key import', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0075b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['PP_SSCD_PART3_V1.0.2']}}]}
.
- The following values were removed:
-
28.01.2022 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name ChipDoc v3 on JCOP 4 P71 in SSCD configuration was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/files/epfiles/certificat-ANSSI-CC-2020_11.pdf",
"dgst": "ce14eb1b2318f054",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"cert_id": "ANSSI-CC-2020/11",
"cert_lab": [
"THALES"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 5
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"4"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1040-2019"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1040-2019"
]
}
},
"scheme_data": {
"category": "Smart cards",
"certification_date": "13/03/2020",
"enhanced": {
"augmentations": "ALC_DVS.2, AVA_VAN.5",
"category": "Cartes \u00e0 puce",
"cc_version": "Crit\u00e8res Communs version 3.1r5",
"certification_date": "13/03/2020",
"description": "Descriptif du produit\n\t\t\t\tLe produit \u00e9valu\u00e9 est \u00ab ChipDoc v3 on JCOP 4 P71 in SSCD configuration, version 3.0.0.52 \u00bb d\u00e9velopp\u00e9 par NXP Semiconductors N.V..\nIl offre des services d\u2019authentification et de signature \u00e9lectronique (SSCD1) conformes \u00e0 la directive [1999/93/EC]. Il est embarqu\u00e9 sur la plateforme Java Card JCOP 4 pr\u00e9alablement certifi\u00e9e qui est laiss\u00e9e ouverte apr\u00e8s personnalisation. Il dispose d\u2019interfaces avec et/ou sans contact.\n\t\t\t\t\n Rapport de certification\nSecurity target",
"developer": "NXP Semiconductors N.V. / NXP Semiconductors N.V.",
"evaluation_facility": "Thales / CNES",
"expiration_date": "13/03/2025",
"id": "2020/11",
"level": "EAL5+",
"protection_profile": "- Part 2: Device with key generation, v2.0.1, certifi\u00e9 BSI-CC-PP-0059-2009-MA-01 le 21 f\u00e9vrier 2012; - Part 3: Device with key import, v1.0.2, certifi\u00e9 BSI-CC-PP-0075-2012 le 27 septembre 2012 ; - Part 4: Extension for device with key generation and trusted communication with certificate generation application, v1.0.1, certifi\u00e9 BSI-CC-PP-0071-2012 le 12 d\u00e9cembre 2012 ; - Part 5: Extension for device with key generation and trusted communication with signature creation application, v1.0.1, certifi\u00e9 BSI-CC-PP-0072-2012 le 12 d\u00e9cembre 2012 ; - Part 6: Extension for device with key import and trusted communication with signature creation application, v1.0.4, certifi\u00e9 BSI-CC-PP-0076-2013 le 16 avril 2013.",
"recognition": "SOG-IS - CCRA",
"report_link": "https://www.ssi.gouv.fr/uploads/2020/04/anssi-cc-2020_11.pdf",
"target_link": "https://www.ssi.gouv.fr/uploads/2020/04/anssi-cible-cc-2020_11en.pdf"
},
"id": "2020/11",
"level": "EAL5+",
"product": "ChipDoc v3 on JCOP 4 P71 in SSCD configuration",
"url": "https://www.ssi.gouv.fr/certification_cc/chipdoc-v3-on-jcop-4-p71-in-sscd-configuration/",
"vendor": "NXP Semiconductors N.V.NXP Semiconductors N.V."
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2022-09-28",
"maintenance_report_link": "https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2020_73-m01.pdf",
"maintenance_st_link": "https://www.commoncriteriaportal.org/files/epfiles/anssi-cible-cc-2020_73-m01.pdf",
"maintenance_title": "Maintenance report : ANSSI-CC-2020/73-M01"
}
]
},
"manufacturer": "NXP Semiconductors",
"manufacturer_web": "https://www.nxp.com/",
"name": "ChipDoc v3 on JCOP 4 P71 in SSCD configuration",
"not_valid_after": "2025-03-13",
"not_valid_before": "2020-03-13",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"report_filename": "anssi-cc-2020_11.pdf",
"report_frontpage": {
"anssi": {
"cc_security_level": "EAL 5 augment\u00e9 ALC_DVS.2, AVA_VAN.5",
"cc_version": "Crit\u00e8res Communs version 3.1 r\u00e9vision 5",
"cert_id": "ANSSI-CC-2020/11",
"cert_item": "ChipDoc v3 on JCOP 4 P71 in SSCD configuration",
"cert_item_version": "Version 3.0.0.52",
"cert_lab": "THALES / CNES 290 all\u00e9e du Lac, 31670 Lab\u00e8ge, France",
"developer": "NXP Semiconductors N.V. Troplowitzstrasse 20, 22529 Hamburg, Allemagne Commanditaire NXP Semiconductors N.V. Troplowitzstrasse 20, 22529 Hamburg, Allemagne",
"match_rules": [
"R\u00e9f\u00e9rence du rapport de certification(.+)Nom du produit(.+)R\u00e9f\u00e9rence/version du produit(.+)Conformit\u00e9 \u00e0 un profil de protection(.+)Crit\u00e8res d\u2019\u00e9valuation et version(.+)Niveau d\u2019\u00e9valuation(.+)D\u00e9veloppeur (.+)Centre d\u2019\u00e9valuation(.+)Accords de reconnaissance applicables"
],
"ref_protection_profiles": "Protection profiles for secure signature creation device : Part 2: Device with key generation, v2.0.1, certifi\u00e9 BSI-CC-PP-0059-2009-MA-01 le 21 f\u00e9vrier 2012; Part 3: Device with key import, v1.0.2, certifi\u00e9 BSI-CC-PP-0075-2012 le 27 septembre 2012 ; Part 4: Extension for device with key generation and trusted communication with certificate generation application, v1.0.1, certifi\u00e9 BSI-CC-PP-0071-2012 le 12 d\u00e9cembre 2012 ; Part 5: Extension for device with key generation and trusted communication with signature creation application, v1.0.1, certifi\u00e9 BSI-CC-PP-0072-2012 le 12 d\u00e9cembre 2012 ; Part 6: Extension for device with key import and trusted communication with signature creation application, v1.0.4, certifi\u00e9 BSI-CC-PP-0076-2013 le 16 avril 2013"
},
"bsi": {},
"canada": {},
"niap": {},
"nscib": {}
},
"report_keywords": {
"asymmetric_crypto": {
"FF": {
"DH": {
"DH": 1
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1040-2019": 4
},
"FR": {
"ANSSI-CC-2020/11": 32
},
"NL": {
"NSCIB-CC-180212": 2,
"NSCIB-CC-190212": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP- 0059-2009-MA-01": 1,
"BSI-CC-PP- 0071-2012": 1,
"BSI-CC-PP- 0072-2012": 1,
"BSI-CC-PP- 0075-2012": 1,
"BSI-CC-PP-0059-2009-MA-01": 1,
"BSI-CC-PP-0071-2012": 1,
"BSI-CC-PP-0072-2012": 1,
"BSI-CC-PP-0075-2012": 1,
"BSI-CC-PP-0076-": 1,
"BSI-CC-PP-0076-2013": 1,
"BSI-CC-PP-0084-2014": 1
},
"other": {
"PP-SSCD-": 6,
"PP-SSCD-Part2": 1,
"PP-SSCD-Part4": 1,
"PP-SSCD-Part5": 1,
"PP-SSCD-Part6": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_FSP": 1,
"ADV_IMP": 1,
"ADV_INT": 1,
"ADV_SPM": 1,
"ADV_TDS": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_PRE": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMS": 2,
"ALC_DEL": 1,
"ALC_DVS": 1,
"ALC_DVS.2": 2,
"ALC_FLR": 2,
"ALC_FLR.1": 1,
"ALC_TAT": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_ECD": 1,
"ASE_INT": 1,
"ASE_OBJ": 1,
"ASE_REQ": 1,
"ASE_SPD": 1,
"ASE_TSS": 1,
"ASE_TSS.2": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_DPT": 1,
"ATE_FUN": 1,
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.5": 3
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 3": 1,
"EAL 5": 2,
"EAL 7": 1,
"EAL2": 2,
"EAL6": 1,
"EAL7": 1
},
"ITSEC": {
"ITSEC E6 Elev\u00e9": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PACE": {
"PACE": 1
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {
"JCOP": {
"JCOP 4": 24
}
},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1,
"CCMB-2017-04-004": 1
},
"ICAO": {
"ICAO": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"NXP": {
"NXP": 9,
"NXP Semiconductors N.V": 3
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "CHERGUI Yoan",
"/CreationDate": "D:20200327143514+01\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2010",
"/Keywords": "ANSSI-CC-CER-F-07 v29.2",
"/ModDate": "D:20200327143514+01\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2010",
"/Subject": "ChipDoc v3 on JCOP 4 P71 in SSCD configuration",
"/Title": "ANSSI-CC-2020/11",
"pdf_file_size_bytes": 560212,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"mailto:certification@ssi.gouv.fr",
"http://www.ssi.gouv.fr/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 15
},
"st_filename": "anssi-cible-cc-2020_11en.pdf",
"st_frontpage": {
"anssi": {},
"bsi": {},
"canada": {},
"niap": {},
"nscib": {}
},
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 6
},
"ECDSA": {
"ECDSA": 1
}
}
},
"cc_cert_id": {
"NL": {
"NSCIB-CC-180212": 2
}
},
"cc_claims": {
"A": {
"A.CGA": 3,
"A.CSP": 3,
"A.SCA": 3
},
"OE": {
"OE.HID_VAD": 9
},
"T": {
"T.DTBS_": 1
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0059-2009-MA-01": 1,
"BSI-CC-PP-0071": 1,
"BSI-CC-PP-0072": 1,
"BSI-CC-PP-0075": 1,
"BSI-CC-PP-0076": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 5,
"ADV_FSP.4": 1,
"ADV_FSP.5": 6,
"ADV_IMP.1": 5,
"ADV_INT.2": 2,
"ADV_TDS.3": 1,
"ADV_TDS.4": 8
},
"AGD": {
"AGD_OPE.1": 4,
"AGD_PRE.1": 5
},
"ALC": {
"ALC_CMC.4": 2,
"ALC_CMS.5": 1,
"ALC_DEL.1": 2,
"ALC_DVS.1": 1,
"ALC_DVS.2": 6,
"ALC_LCD.1": 3,
"ALC_TAT.1": 1,
"ALC_TAT.2": 3
},
"ASE": {
"ASE_CCL.1": 2,
"ASE_ECD.1": 1,
"ASE_INT.1": 4,
"ASE_OBJ.2": 3,
"ASE_REQ.2": 4,
"ASE_SPD.1": 1,
"ASE_TSS.1": 2
},
"ATE": {
"ATE_COV.2": 4,
"ATE_DPT.1": 1,
"ATE_DPT.3": 1,
"ATE_FUN.1": 3,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.5": 4
}
},
"cc_security_level": {
"EAL": {
"EAL5": 7,
"EAL5 augmented": 3
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1
},
"FCS": {
"FCS_CKM": 1,
"FCS_CKM.1": 16,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 1,
"FCS_CKM.4": 14,
"FCS_CKM.4.1": 1,
"FCS_COP": 10,
"FCS_COP.1": 9,
"FCS_COP.1.1": 1
},
"FDP": {
"FDP_ACC": 44,
"FDP_ACC.1": 15,
"FDP_ACF": 30,
"FDP_ACF.1": 20,
"FDP_DAU": 8,
"FDP_DAU.1": 1,
"FDP_DAU.2": 2,
"FDP_IFC.1": 7,
"FDP_ITC": 8,
"FDP_ITC.1": 7,
"FDP_ITC.2": 4,
"FDP_RIP": 2,
"FDP_RIP.1": 7,
"FDP_RIP.1.1": 1,
"FDP_SDI": 15,
"FDP_SDI.1": 2,
"FDP_SDI.2": 4,
"FDP_UCT": 10,
"FDP_UCT.1": 1,
"FDP_UIT": 7,
"FDP_UIT.1": 2
},
"FIA": {
"FIA_AFL": 2,
"FIA_AFL.1": 5,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_API": 4,
"FIA_API.1": 14,
"FIA_API.1.1": 3,
"FIA_UAU": 2,
"FIA_UAU.1": 10,
"FIA_UAU.1.1": 2,
"FIA_UAU.1.2": 1,
"FIA_UID": 2,
"FIA_UID.1": 13,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1
},
"FMT": {
"FMT_EMS": 2,
"FMT_MOF": 3,
"FMT_MOF.1": 5,
"FMT_MSA": 16,
"FMT_MSA.1": 4,
"FMT_MSA.2": 7,
"FMT_MSA.2.1": 1,
"FMT_MSA.3": 17,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MSA.4": 8,
"FMT_MSA.4.1": 1,
"FMT_MTD": 14,
"FMT_MTD.1": 2,
"FMT_SMF": 2,
"FMT_SMF.1": 17,
"FMT_SMF.1.1": 1,
"FMT_SMR": 2,
"FMT_SMR.1": 19,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_EMS": 3,
"FPT_EMS.1": 11,
"FPT_EMS.1.1": 3,
"FPT_EMS.1.2": 3,
"FPT_FLS": 2,
"FPT_FLS.1": 6,
"FPT_FLS.1.1": 1,
"FPT_ITC": 4,
"FPT_ITC.1": 2,
"FPT_PHP": 2,
"FPT_PHP.1": 5,
"FPT_PHP.1.1": 1,
"FPT_PHP.1.2": 1,
"FPT_PHP.3": 6,
"FPT_PHP.3.1": 1,
"FPT_TST": 3,
"FPT_TST.1": 9,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FTP": {
"FTP_ITC": 28,
"FTP_ITC.1": 16,
"FTP_ITC.1.3": 6,
"FTP_TRP.1": 2
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"Generic": {
"Crypto Library ........5": 1
}
},
"crypto_protocol": {
"PACE": {
"PACE": 6
}
},
"crypto_scheme": {
"MAC": {
"MAC": 3
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 1
},
"SHA2": {
"SHA-2": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {
"JCOP": {
"JCOP 4": 148
}
},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 1
}
},
"side_channel_analysis": {
"FI": {
"DFA": 1,
"fault injection": 1,
"malfunction": 1,
"physical tampering": 5
},
"SCA": {
"DPA": 2,
"SPA": 2,
"timing attacks": 2
}
},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 2,
"CCMB-2017-04-002": 2,
"CCMB-2017-04-003": 2,
"CCMB-2017-04-004": 2
},
"FIPS": {
"FIPS PUB 46-3": 2
},
"PKCS": {
"PKCS#1": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 4
}
},
"DES": {
"3DES": {
"3DES": 1,
"TDES": 2
},
"DES": {
"DES": 3
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"NXP": {
"NXP": 82,
"NXP Semiconductors": 29
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "NXP B.V.",
"/CreationDate": "D:20200224105856+01\u002700\u0027",
"/Creator": "DITA Open Toolkit",
"/Keywords": "Common Criteria, Security Target Lite, ChipDoc v3, SSCD",
"/Producer": "Apache FOP Version 1.1",
"/Subject": "ChipDoc v3 on JCOP 4 P71 in SSCD configuration",
"/Title": "Security Target Lite",
"pdf_file_size_bytes": 464530,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 69
}
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": null,
"pp_ids": null,
"pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0059b_pdf.pdf",
"pp_name": "Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Version..."
},
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": "EAL4+",
"pp_ids": {
"_type": "Set",
"elements": [
"PP_SSCD_PART3_V1.0.2"
]
},
"pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0075b_pdf.pdf",
"pp_name": "Protection profiles for secure signature creation device - Part 3: Device with key import"
},
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": null,
"pp_ids": null,
"pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0076b_pdf.pdf",
"pp_name": "Protection profiles for secure signature creation device - Part 6: Extension for device with key impo..."
},
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": null,
"pp_ids": null,
"pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0071b_pdf.pdf",
"pp_name": "Protection profiles for secure signature creation device \u2014 Part 4: Extension for device with key gene..."
},
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": null,
"pp_ids": null,
"pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0072b_pdf.pdf",
"pp_name": "Protection profiles for secure signature creation device \u2014 Part 5: Extension for device with key gene..."
}
]
},
"report_link": "https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2020_11.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"EAL5+",
"ALC_DVS.2",
"AVA_VAN.5"
]
},
"st_link": "https://www.commoncriteriaportal.org/files/epfiles/anssi-cible-cc-2020_11en.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"report_convert_garbage": false,
"report_convert_ok": true,
"report_download_ok": true,
"report_extract_ok": true,
"report_pdf_hash": "e3010fe0d9f476dfcd80181c637f3dd2ccd804af62e9dbaf6d3ead506b532126",
"report_txt_hash": "56848a78b8aad2ec4fbf19641657b131d38fed897dca66f1c9c10c7bd7c6fd6a",
"st_convert_garbage": false,
"st_convert_ok": true,
"st_download_ok": true,
"st_extract_ok": true,
"st_pdf_hash": "500bde5439804470815338b0bd566d8812388ce551eb126de63533676c804465",
"st_txt_hash": "b18eb3964ae683e8260c90f4833995de545963abb136b1e7a64f193174be1815"
},
"status": "active"
}