IDEAL CITIZ V2.17-I on Infineon M7892 B11embedding ID.me 1.6-i application

CSV information ?

Status active
Valid from 05.10.2018
Valid until 05.10.2023
Scheme 🇫🇷 FR
Manufacturer Idemia
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level AVA_VAN.5, EAL5+, ALC_DVS.2
Maintenance updates IDeal Citiz v2.17-i on Infineon M7892 B11 embedding ID.me 1.6-i application (Version 1.6-i / v 2.0.15.0.0) (07.11.2019) Certification report

Heuristics summary ?

Certificate ID: ANSSI-CC-2018/44

Certificate ?

Certification report ?

Extracted keywords

File metadata

Title: ANSSI-CC-2018/44
Subject: IDeal Citiz v2.17-i on Infineon M7892 B11 embedding ID.me 1.6-i application
Keywords: ANSSI-CC-CER-F-07.026
Author: cdu
Creation date: D:20181012162047+02'00'
Modification date: D:20181012162049+02'00'
Pages: 18
Creator: Acrobat PDFMaker 11 pour Word
Producer: Adobe PDF Library 11.0

Frontpage

Certificate ID: ANSSI-CC-2018/44
Certified item: IDeal Citiz v2.17-i on Infineon M7892 B11 embedding ID.me 1.6-i application
Certification lab: CEA - LETI 17, rue des martyrs, 38054 Grenoble Cedex 9, France
Developer: Idemia 8, chaussée Jules César, 95520 Osny, France Infineon Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Idemia 18, chaussée Jules César, 95520 Osny, France

References

No references.

Security target ?

Extracted keywords

File metadata

Title: Title
Author: G509704
Creation date: D:20180925153329+02'00'
Modification date: D:20180925153329+02'00'
Pages: 143
Creator: Microsoft® Word 2016
Producer: Microsoft® Word 2016

References

No references.

Heuristics ?

Certificate ID: ANSSI-CC-2018/44

References ?

No references are available for this certificate.

Updates ?

  • 05.02.2022 The certificate became unavailable, either the certification report or the security target was unavailable during processing.
    Certificate removed

    A Common Criteria certificate for a product named IDEAL CITIZ V2.17-I on Infineon M7892 B11embedding ID.me 1.6-i application is not available. This means that either its certification report or security target could not be downloaded during processing.

  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name IDEAL CITIZ V2.17-I on Infineon M7892 B11embedding ID.me 1.6-i application was processed.

Raw data

{
  "_type": "CommonCriteriaCert",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": null,
  "dgst": "e08658e73e7214b1",
  "heuristics": {
    "_type": "CCHeuristics",
    "cert_id": "ANSSI-CC-2018/44",
    "cert_lab": [
      "CEA"
    ],
    "cpe_matches": null,
    "extracted_versions": [
      "2.17",
      "1.6"
    ],
    "related_cves": null,
    "report_references": {
      "_type": "References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "st_references": {
      "_type": "References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "MaintenanceReport",
        "maintenance_date": "2019-11-07",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2018_44-m01.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "IDeal Citiz v2.17-i on Infineon M7892 B11 embedding ID.me 1.6-i application (Version 1.6-i / v 2.0.15.0.0)"
      }
    ]
  },
  "manufacturer": "Idemia",
  "manufacturer_web": "https://www.idemia.com",
  "name": "IDEAL CITIZ V2.17-I on Infineon M7892 B11embedding ID.me 1.6-i application",
  "not_valid_after": "2023-10-05",
  "not_valid_before": "2018-10-05",
  "pdf_data": {
    "_type": "PdfData",
    "report_frontpage": {
      "anssi": {
        "cc_security_level": "EAL 5 augment\u00e9 ALC_DVS.2, AVA_VAN.5",
        "cc_version": "Crit\u00e8res Communs version 3.1 r\u00e9vision 5",
        "cert_id": "ANSSI-CC-2018/44",
        "cert_item": "IDeal Citiz v2.17-i on Infineon M7892 B11 embedding ID.me 1.6-i application",
        "cert_item_version": "1.6-i",
        "cert_lab": "CEA - LETI 17, rue des martyrs, 38054 Grenoble Cedex 9, France",
        "developer": "Idemia 8, chauss\u00e9e Jules C\u00e9sar, 95520 Osny, France Infineon Technologies AG AIM CC SM PS \u2013 Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Idemia 18, chauss\u00e9e Jules C\u00e9sar, 95520 Osny, France",
        "match_rules": [
          "R\u00e9f\u00e9rence du rapport de certification(.+)Nom du produit(.+)R\u00e9f\u00e9rence/version du produit(.*)Conformit\u00e9 \u00e0 un profil de protection(.+)Crit\u00e8res d\u2019\u00e9valuation et version(.+)Niveau d\u2019\u00e9valuation(.+)D\u00e9veloppeurs(.+)Centre d\u2019\u00e9valuation(.+)Accords de reconnaissance applicables"
        ],
        "ref_protection_profiles": "Protection profiles for secure signature creation device : Part 2: Device with key generation, v2.0.1 ; Part 3: Device with key import, v1.0.2 ; Part 4: Extension for device with key generation and trusted communication with certificate generation application, v1.0.1 ; Part 5: Extension for device with key generation and trusted communication with signature creation application, v1.0.1 ; Part 6: Extension for device with key import and trusted communication with signature creation application, v1.0.4"
      },
      "bsi": {}
    },
    "report_keywords": {
      "rules_IC_data_groups": {},
      "rules_block_cipher_modes": {},
      "rules_cc_claims": {
        "T": 1
      },
      "rules_cert_id": {
        "ANSSI-CC-2018/44": 19
      },
      "rules_certification_process": {},
      "rules_cplc": {
        "IC Fabricator": 1,
        "IC Type": 1
      },
      "rules_crypto_algs": {
        "AES-128": 1,
        "DES": 4,
        "ECC": 2
      },
      "rules_crypto_engines": {},
      "rules_crypto_libs": {
        "v1.02.013": 4
      },
      "rules_defenses": {},
      "rules_device_id": {},
      "rules_ecc_curves": {},
      "rules_javacard": {},
      "rules_javacard_api_consts": {},
      "rules_javacard_packages": {},
      "rules_os": {},
      "rules_other": {},
      "rules_protection_profiles": {
        "BSI-CC-PP- 0059-2009-MA-01": 1,
        "BSI-CC-PP- 0071-2012": 1,
        "BSI-CC-PP- 0072-2012": 1,
        "BSI-CC-PP- 0076-2013": 1,
        "BSI-CC-PP- 0086-2015": 1,
        "BSI-CC-PP-0086": 1,
        "PP-SSCD-": 6,
        "PP-SSCD-Part2": 1,
        "PP-SSCD-Part3": 1,
        "PP-SSCD-Part5": 1,
        "PP-SSCD-Part6": 1
      },
      "rules_security_assurance_components": {
        "ADV_ARC": 1,
        "ADV_FSP": 1,
        "ADV_IMP": 1,
        "ADV_INT": 1,
        "ADV_SPM": 1,
        "ADV_TDS": 1,
        "AGD_OPE": 1,
        "AGD_PRE": 1,
        "ALC_CMC": 1,
        "ALC_CMS": 1,
        "ALC_DEL": 1,
        "ALC_DVS": 1,
        "ALC_DVS.2": 2,
        "ALC_FLR": 1,
        "ALC_LCD": 1,
        "ALC_TAT": 1,
        "ASE_CCL": 1,
        "ASE_ECD": 1,
        "ASE_INT": 1,
        "ASE_OBJ": 1,
        "ASE_REQ": 1,
        "ASE_SPD": 1,
        "ASE_TSS": 1,
        "ATE_COV": 1,
        "ATE_DPT": 1,
        "ATE_FUN": 1,
        "ATE_IND": 1,
        "AVA_VAN": 2,
        "AVA_VAN.5": 3
      },
      "rules_security_functional_components": {},
      "rules_security_level": {
        "EAL 1": 1,
        "EAL 2": 1,
        "EAL 3": 1,
        "EAL 4": 1,
        "EAL 5": 3,
        "EAL 5+": 1,
        "EAL 6": 1,
        "EAL 7": 1,
        "EAL2": 1,
        "EAL7": 1,
        "ITSEC E6 Elev\u00e9": 1
      },
      "rules_standard_id": {
        "CCMB-2017-04-001": 1,
        "CCMB-2017-04-002": 1,
        "SCP03": 1
      },
      "rules_technical_reports": {
        "BSI TR-03110": 1
      },
      "rules_vendor": {
        "IDEMIA": 13,
        "Idemia": 2,
        "Infineon": 24
      },
      "rules_vulnerabilities": {}
    },
    "report_metadata": {
      "/Author": "cdu",
      "/Category": "R\u00e9f\u00e9rence, Version",
      "/Comments": "Idemia",
      "/Company": "SGDSN/ANSSI",
      "/CreationDate": "D:20181012162047+02\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 11 pour Word",
      "/Keywords": "ANSSI-CC-CER-F-07.026",
      "/ModDate": "D:20181012162049+02\u002700\u0027",
      "/Producer": "Adobe PDF Library 11.0",
      "/SourceModified": "D:20181012142042",
      "/Subject": "IDeal Citiz v2.17-i on Infineon M7892 B11 embedding ID.me 1.6-i application",
      "/Title": "ANSSI-CC-2018/44",
      "pdf_file_size_bytes": 276216,
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 18
    },
    "st_frontpage": {
      "anssi": {},
      "bsi": {}
    },
    "st_keywords": {
      "rules_IC_data_groups": {
        "EF.CardAccess": 2,
        "EF.ChipSecurity": 1
      },
      "rules_block_cipher_modes": {
        "CBC": 11
      },
      "rules_cc_claims": {
        "A.CGA": 6,
        "A.CSP": 9,
        "A.SCA": 5,
        "D.SCD": 1,
        "D.SVD": 1,
        "OE.HID_VAD": 7,
        "OE.HI_VAD": 2
      },
      "rules_cert_id": {
        "ANSSI-CC-2018/27": 1,
        "BSI-DSZ-CC-0782-V4-2018": 2
      },
      "rules_certification_process": {
        "(ii) the TOE and the CGA. Beside the TOE, the product can include other Java Card applications (out of scope of the TOE": 1,
        "CA; (ii) the TOE and the CGA. Beside the TOE, the product can include other Java Card applications (out of scope of the TOE). IDeal Citiz v2.17-i Java Card Open Platform enforces separation of the data between": 1,
        "out of scope": 1
      },
      "rules_cplc": {},
      "rules_crypto_algs": {
        "3DES": 10,
        "AES": 20,
        "DES": 1,
        "DH": 7,
        "ECC": 23,
        "ECDH": 4,
        "ECDSA": 4,
        "PACE": 287,
        "RND": 5,
        "RNG": 2,
        "SHA-1": 7,
        "SHA-224": 5,
        "SHA-256": 6,
        "SHA-384": 5,
        "SHA-512": 4,
        "TDES": 9
      },
      "rules_crypto_engines": {},
      "rules_crypto_libs": {
        "v1.02.013": 8
      },
      "rules_defenses": {
        "DFA": 1,
        "DPA": 3,
        "Malfunction": 14,
        "Physical Tampering": 1,
        "SPA": 3,
        "fault injection": 1,
        "malfunction": 3,
        "physical probing": 3,
        "physical tampering": 7,
        "side channel": 1,
        "timing attacks": 2
      },
      "rules_device_id": {},
      "rules_ecc_curves": {},
      "rules_javacard": {},
      "rules_javacard_api_consts": {},
      "rules_javacard_packages": {},
      "rules_os": {},
      "rules_other": {
        "library": 1
      },
      "rules_protection_profiles": {
        "ANSSI-CC-PP-": 1,
        "BSI-CC-PP-0059-2009-MA-01": 1,
        "BSI-CC-PP-0068-V2-": 1,
        "BSI-CC-PP-0071-2012": 1,
        "BSI-CC-PP-0072-2012": 1,
        "BSI-CC-PP-0075-2012": 1,
        "BSI-CC-PP-0076-2013": 1,
        "BSI-CC-PP-0086": 1,
        "BSI-PP-0035": 1,
        "PP-SSCD2": 21,
        "PP-SSCD3": 21,
        "PP-SSCD4": 24,
        "PP-SSCD5": 18,
        "PP-SSCD6": 23
      },
      "rules_security_assurance_components": {
        "ACE_ENC": 7,
        "ACE_MAC": 8,
        "ADV_ARC.1": 5,
        "ADV_FSP.1": 3,
        "ADV_FSP.2": 2,
        "ADV_FSP.4": 1,
        "ADV_FSP.5": 9,
        "ADV_IMP.1": 9,
        "ADV_INT.2": 1,
        "ADV_TDS.1": 2,
        "ADV_TDS.3": 3,
        "ADV_TDS.4": 8,
        "AGD_OPE": 2,
        "AGD_OPE.1": 5,
        "AGD_PRE": 2,
        "AGD_PRE.1": 5,
        "ALC_CMC.4": 1,
        "ALC_CMS.1": 1,
        "ALC_CMS.5": 2,
        "ALC_DEL.1": 1,
        "ALC_DVS.1": 1,
        "ALC_DVS.2": 7,
        "ALC_LCD.1": 3,
        "ALC_TAT.1": 2,
        "ALC_TAT.2": 3,
        "ASE_CCL.1": 1,
        "ASE_ECD.1": 5,
        "ASE_INT.1": 5,
        "ASE_OBJ.2": 3,
        "ASE_REQ.1": 2,
        "ASE_REQ.2": 3,
        "ASE_SPD.1": 3,
        "ASE_TSS.1": 1,
        "ATE_COV.1": 2,
        "ATE_COV.2": 3,
        "ATE_DPT.1": 1,
        "ATE_DPT.3": 2,
        "ATE_FUN.1": 7,
        "ATE_IND.2": 1,
        "AVA_VAN.5": 8
      },
      "rules_security_functional_components": {
        "FAU_GEN": 1,
        "FCS_CKM.1": 22,
        "FCS_CKM.1.1": 1,
        "FCS_CKM.2": 2,
        "FCS_CKM.4": 31,
        "FCS_CKM.4.1": 1,
        "FCS_COP.1": 13,
        "FCS_COP.1.1": 1,
        "FCS_RND": 5,
        "FCS_RND.1": 20,
        "FCS_RND.1.1": 2,
        "FDP_ACC.1": 14,
        "FDP_ACF": 1,
        "FDP_ACF.1": 5,
        "FDP_IFC.1": 9,
        "FDP_ITC.1": 6,
        "FDP_ITC.2": 6,
        "FDP_RIP.1": 25,
        "FDP_RIP.1.1": 1,
        "FIA_AFL.1": 7,
        "FIA_AFL.1.1": 1,
        "FIA_AFL.1.2": 1,
        "FIA_API": 5,
        "FIA_API.1": 12,
        "FIA_API.1.1": 2,
        "FIA_SOS.2": 1,
        "FIA_UAU.1": 20,
        "FIA_UAU.1.1": 1,
        "FIA_UAU.1.2": 1,
        "FIA_UAU.5": 1,
        "FIA_UID.1": 21,
        "FIA_UID.1.1": 1,
        "FIA_UID.1.2": 1,
        "FMT_LIM": 5,
        "FMT_LIM.1": 14,
        "FMT_LIM.1.1": 2,
        "FMT_LIM.2": 13,
        "FMT_LIM.2.1": 2,
        "FMT_MOF.1": 9,
        "FMT_MOF.1.1": 1,
        "FMT_MSA.1": 3,
        "FMT_MSA.2": 11,
        "FMT_MSA.2.1": 1,
        "FMT_MSA.3": 24,
        "FMT_MSA.3.1": 1,
        "FMT_MSA.3.2": 1,
        "FMT_MSA.4": 12,
        "FMT_MSA.4.1": 1,
        "FMT_MTD.1": 1,
        "FMT_MTD.3": 12,
        "FMT_MTD.3.1": 1,
        "FMT_SMF.1": 57,
        "FMT_SMF.1.1": 1,
        "FMT_SMR.1": 34,
        "FMT_SMR.1.1": 1,
        "FMT_SMR.1.2": 1,
        "FPT_EMS": 5,
        "FPT_EMS.1": 15,
        "FPT_EMS.1.1": 3,
        "FPT_EMS.1.2": 3,
        "FPT_FLS.1": 12,
        "FPT_FLS.1.1": 1,
        "FPT_PHP.1": 7,
        "FPT_PHP.1.1": 1,
        "FPT_PHP.1.2": 1,
        "FPT_PHP.3": 14,
        "FPT_PHP.3.1": 1,
        "FPT_TST": 1,
        "FPT_TST.1": 17,
        "FPT_TST.1.1": 1,
        "FPT_TST.1.2": 1,
        "FPT_TST.1.3": 1,
        "FTP_ITC.1": 4,
        "FTP_TRP.1": 4
      },
      "rules_security_level": {
        "EAL 5": 1,
        "EAL 5 augmented": 1,
        "EAL 5+": 1,
        "EAL 6+": 1,
        "EAL4": 3,
        "EAL4+": 1,
        "EAL5": 3,
        "EAL5 augmented": 3,
        "EAL5+": 1,
        "EAL6": 1,
        "EAL6 augmented": 1,
        "EAL6+": 1
      },
      "rules_standard_id": {
        "AIS31": 5,
        "CCMB-2012-09-004": 1,
        "FIPS PUB 180-2": 2,
        "FIPS180-4": 1,
        "ICAO": 2,
        "ISO/IEC 15408:2005": 2,
        "ISO/IEC 9797-": 1,
        "ISO/IEC 9797-1": 2,
        "NIST SP 800-38B": 1,
        "PKCS#1": 4,
        "PKCS1": 4
      },
      "rules_technical_reports": {
        "BSI TR-03110": 1
      },
      "rules_vendor": {
        "IDEMIA": 13,
        "Infineon": 15
      },
      "rules_vulnerabilities": {}
    },
    "st_metadata": {
      "/Author": "G509704",
      "/CreationDate": "D:20180925153329+02\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2016",
      "/ModDate": "D:20180925153329+02\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2016",
      "/Title": "Title",
      "pdf_file_size_bytes": 2635084,
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 143
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "ProtectionProfile",
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/authpp[1].pdf",
        "pp_name": "Privilege Directed Content Protection, Version 1.3"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2018_44fr.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "AVA_VAN.5",
      "EAL5+",
      "ALC_DVS.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/anssi-cible-cc-2018_44en.pdf",
  "state": {
    "_type": "InternalState",
    "errors": [],
    "report_convert_ok": true,
    "report_download_ok": true,
    "report_extract_ok": true,
    "st_convert_ok": true,
    "st_download_ok": true,
    "st_extract_ok": true
  },
  "status": "active"
}