CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.1 (code SAAAAR : 203523)

CSV information ?

Status active
Valid from 27.07.2020
Valid until 03.07.2028
Scheme 🇫🇷 FR
Manufacturer Idemia
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level AVA_VAN.5, EAL5, ALC_DVS.2
Protection profiles
Maintenance updates reassessment ANSSI-CC-2020/59-S01 (03.07.2023) Certification report
ANSSI-CC-2020/59-M01 (05.02.2021) Certification report

Heuristics summary ?

Certificate ID: ANSSI-CC-2020/59

Certificate ?

Extracted keywords

Vendor
IDEMIA

Security level
EAL5, EAL2
Security Assurance Requirements (SAR)
ALC_DVS.2, AVA_VAN.5
Protection profiles
BSI-CC-PP-0059-2009-MA-01, BSI-CC-PP-0075-2012, BSI-CC-PP- 0071-2012
Certificates
ANSSI-CC-2020/59-S01
Evaluation facilities
CEA - LETI

File metadata

Creation date: D:20230706170456+02'00'
Modification date: D:20230706170732+02'00'
Pages: 2
Creator: Acrobat PDFMaker 23 pour Word
Producer: Adobe PDF Library 23.1.175

Certification report ?

Extracted keywords

Symmetric Algorithms
DES

Vendor
Infineon Technologies AG, Infineon, IDEMIA

Security level
EAL 5, EAL2, EAL5, EAL7, EAL 1, EAL 3, EAL 7, ITSEC E6 Elevé
Security Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSS
Protection profiles
BSI-CC-PP-0059-2009-MA-01, BSI-CC-PP-0075-2012, BSI-CC-PP-0071-2012, BSI-PP-0084-2014, PP-SSCD-Part2, PP-SSCD-Part3, PP-SSCD-, PP-SSCD-Part4
Certificates
BSI-DSZ-CC-1110-V2-2019, ANSSI-CC-2020/59, ANSSI-CC-2020/07
Evaluation facilities
SERMA, CESTI, CEA - LETI, CEA-LETI

Standards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004

File metadata

Title: ANSSI-CC-2020/59
Subject: CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.1
Keywords: ANSSI-CC-CER-F-07, v29.2
Author: Géraldine Avoué
Creation date: D:20200729170505+02'00'
Pages: 17
Creator: Writer
Producer: LibreOffice 4.4

Frontpage

Certificate ID: ANSSI-CC-2020/59
Certified item: CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.1
Certification lab: CEA - LETI 17 avenue des martyrs, 38054 Grenoble Cedex 9, France
Developer: IDEMIA 2 place Samuel de Champlain 92400 Courbevoie, France Infineon Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire IDEMIA 2 place Samuel de Champlain 92400 Courbevoie, France

References

Outgoing
  • BSI-DSZ-CC-1110-V2-2019 - Infineon Security Controller IFX_CCI_000003h, 000005h, 000008h, 00000Ch, 000013h, 000014h, 000015h, 00001Ch, 00001Dh, 000021h, 000022h H13 including the products from the second production line and optional software packages: Flash Loader, Asymmetric Crypto Library, Symmetric Cryptographic Library, Hardware Support Layer, Hash Crypto Library, Mifare Compatible Software, and CIPURSE™ Crypto Library
  • ANSSI-CC-2020/07 - Plateforme ID-One Cosmo V9.1 masquée sur le composant IFX SLC32

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES, TDES, Triple-DES, KMAC, CMAC
Asymmetric Algorithms
RSA-1024, ECDH, ECDSA, ECC, DH, Diffie-Hellman, DSA
Hash functions
SHA-1, SHA-256, SHA-224, SHA-384, SHA-512
Schemes
MAC
Protocols
PACE, PGP
Randomness
RND
Block cipher modes
CBC

Vendor
Infineon, Oberthur Technologies, IDEMIA, Morpho

Security level
EAL5, EAL 5, EAL4, EAL5 augmented, EAL4 augmented
Claims
A.CGA, A.SCA, A.CSP, OE.HID_VAD
Security Assurance Requirements (SAR)
ADV_ARC, ADV_ARC.1, ADV_FSP, ADV_FSP.5, ADV_IMP, ADV_IMP.1, ADV_TDS, ADV_TDS.4, ADV_INT, ADV_INT.2, ADV_FSP.1, ADV_TDS.1, ADV_TDS.3, ADV_FSP.2, ADV_FSP.4, AGD_PRE, AGD_OPE, AGD_PRE_PLT, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_DVS, ALC_CMC, ALC_CMC.4, ALC_CMS, ALC_CMS.5, ALC_DEL, ALC_DEL.1, ALC_LCD, ALC_LCD.1, ALC_TAT, ALC_TAT.2, ALC_TAT.1, ALC_CMS.1, ALC_DVS.1, ATE_COV, ATE_COV.2, ATE_DPT, ATE_DPT.3, ATE_FUN, ATE_FUN.1, ATE_IND, ATE_IND.2, ATE_COV.1, ATE_DPT.1, AVA_VAN.5, AVA_VAN, APE_SRE, ASE_CCL, ASE_CCL.1, ASE_ECD, ASE_ECD.1, ASE_INT, ASE_INT.1, ASE_OBJ, ASE_OBJ.2, ASE_REQ, ASE_REQ.2, ASE_SPD, ASE_SPD.1, ASE_APD.1, ASE_TSS, ASE_TSS.1, ASE_REQ.1
Security Functional Requirements (SFR)
FAU_ARP.1, FCS_RND, FCS_RND.1, FCS_RND.1.1, FCS_CKM, FCS_CKM.1, FCS_CKM.4, FCS_CKM.4.1, FCS_COP, FCS_COP.1, FCS_RNG.1, FCS_CKM.2, FDP_ACC, FDP_ACC.1, FDP_ACF, FDP_ACF.1, FDP_RIP.1, FDP_RIP.1.1, FDP_SDI, FDP_SDI.2, FDP_ITC, FDP_ITC.1, FDP_UCT, FDP_UCT.1, FDP_DAU, FDP_DAU.2, FDP_UIT, FDP_UIT.1, FDP_ITC.2, FDP_IFC.1, FIA_API, FIA_API.1, FIA_API.1.1, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_AFL, FIA_AFL.1, FIA_UID, FIA_UAU, FIA_UAU.4, FIA_UAU.5, FIA_UAU.6, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1, FMT_SMF.1.1, FMT_MSA, FMT_MSA.1, FMT_MSA.2, FMT_MSA.2.1, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.4, FMT_MSA.4.1, FMT_MTD, FMT_MTD.1, FMT_MOF.1, FMT_MOF.1.1, FMT_SMR, FMT_MTD.3, FMT_MTD.3.1, FPT_EMS, FPT_EMS.1, FPT_EMS.1.1, FPT_EMS.1.2, FPT_TST.1, FPT_FLS.1, FPT_FLS.1.1, FPT_TST, FPT_PHP.1, FPT_PHP.1.1, FPT_PHP.1.2, FPT_PHP.3, FPT_PHP.3.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FTP_ITC.1, FTP_ITC, FTP_TRP.1
Protection profiles
BSI-CC-PP-0084-2014, BSI-CC-PP-0059-2009-MA-01, BSI-CC-PP-0075, BSI-CC-PP-0071
Certificates
BSI-DSZ-CC-1110-V2-2019, ANSSI-CC-2020/07

Side-channel analysis
physical probing, side channel, SPA, DPA, timing attacks, physical tampering, Malfunction, malfunction, DFA, fault injection, JIL, JIL-COMP

Standards
PKCS#1, PKCS #1, PKCS#3, PKCS#15, SCP03, SCP02

File metadata

Title: Title
Author: Shubham SAGAR
Creation date: D:20200617125534+05'30'
Modification date: D:20200617125534+05'30'
Pages: 99
Creator: Microsoft® Word 2016
Producer: Microsoft® Word 2016

References

Outgoing
  • BSI-DSZ-CC-1110-V2-2019 - Infineon Security Controller IFX_CCI_000003h, 000005h, 000008h, 00000Ch, 000013h, 000014h, 000015h, 00001Ch, 00001Dh, 000021h, 000022h H13 including the products from the second production line and optional software packages: Flash Loader, Asymmetric Crypto Library, Symmetric Cryptographic Library, Hardware Support Layer, Hash Crypto Library, Mifare Compatible Software, and CIPURSE™ Crypto Library
  • ANSSI-CC-2020/07 - Plateforme ID-One Cosmo V9.1 masquée sur le composant IFX SLC32

Heuristics ?

Certificate ID: ANSSI-CC-2020/59

Extracted SARs

AGD_PRE.1, ASE_REQ.2, ASE_OBJ.2, AGD_OPE.1, ASE_TSS.1, ALC_CMC.4, ADV_FSP.5, ASE_CCL.1, ASE_INT.1, AVA_VAN.5, ADV_TDS.4, ALC_DEL.1, ASE_ECD.1, ALC_LCD.1, ATE_FUN.1, ADV_INT.2, ALC_DVS.2, ALC_CMS.5, ASE_SPD.1, ATE_COV.2, ATE_DPT.3, ATE_IND.2, ADV_IMP.1, ASE_APD.1, ADV_ARC.1, ALC_TAT.2

Scheme data ?

Product CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.2 (code SAAAAR : 203523)
Url https://cyber.gouv.fr/produits-certifies/combicao-applet-v21-sscd-configuration-cosmo-v92-code-saaaar-203523
Description Le produit évalué est « CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.2, code SAAAAR : 203523 » développé par IDEMIA et Infineon Technologies AG. Le produit évalué est de type « carte à puce » pouvant être utilisé en modes avec et sans contact. Il est destiné à être utilisé comme dispositif sécurisé de création de signature (SSCD). Il peut être utilisé dans différents types de documents (
Sponsor Idemia
Developer Idemia, Infineon Technologies AG
Cert Id 2020/64
Level EAL5+
Expiration Date 3 Juillet 2028
Enhanced
Cert Id 2020/64
Certification Date 27/07/2020
Expiration Date 03/07/2028
Category Cartes à puce
Cc Version Critères Communs version 3.1r5
Developer Idemia, Infineon Technologies AG
Sponsor Idemia
Evaluation Facility CEA-Leti
Level EAL5+
Protection Profile Protection profiles for secure signature creation device (Part 2 à part 4 incluses)
Mutual Recognition CCRA SOG-IS
Augmented ALC_DVS.2, AVA_VAN.5
Report Link https://cyber.gouv.fr/sites/default/files/2020/08/anssi-cc-2020_64fr.pdf
Target Link https://cyber.gouv.fr/sites/default/files/2020/08/anssi-cible-cc-2020-64en.pdf
Cert Link https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2020_64-S01fr_0.pdf

References ?

Updates ?

  • 15.02.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '8dec1867d0a4649850f4287d765067f407dc9dcd9293bcc6b9cfb933b35611d2', 'txt_hash': '6dd1e2fec0a449d882dd6b6be5ec4ab1dcf5d21093550c4579bac55f7c581371'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'b3e81c437b32d2cde805c2f405ee6d8a135d09454db78877252bf3aa369fbb40', 'txt_hash': 'eeaea15d231156b2f3c44aa0b34eef52288a67a20f5fa0d5221193ba947bf5e9'}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '07689c589ed31e887d09e1ee09d6e1b5203eef599b7da121860c1290f702619e', 'txt_hash': 'df14e9f077802793836a63e80aa421cbcb61fee35ff575b7cfc7659caf27667a'}}.
    • The following properties were deleted: ['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash'].

    The PDF extraction data was updated.

    • The following values were inserted: {'cert_metadata': {'pdf_file_size_bytes': 157982, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 2, '/CreationDate': "D:20230706170456+02'00'", '/Creator': 'Acrobat PDFMaker 23 pour Word', '/Keywords': '', '/ModDate': "D:20230706170732+02'00'", '/Producer': 'Adobe PDF Library 23.1.175', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}, 'cert_frontpage': None, 'cert_keywords': {'cc_cert_id': {'FR': {'ANSSI-CC-2020/59-S01': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0059-2009-MA-01': 1, 'BSI-CC-PP-0075-2012': 1, 'BSI-CC-PP- 0071-2012': 1}}, 'cc_security_level': {'EAL': {'EAL5': 1, 'EAL2': 1}}, 'cc_sar': {'ALC': {'ALC_DVS.2': 1}, 'AVA': {'AVA_VAN.5': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Idemia': {'IDEMIA': 2}}, 'eval_facility': {'CEA-LETI': {'CEA - LETI': 2}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}, 'cert_filename': 'Certificat-CC-2020_59-S01fr.pdf'}.
    • The report_frontpage property was set to {'FR': {'match_rules': ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables'], 'cert_id': 'ANSSI-CC-2020/59', 'cert_item': 'CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.1', 'cert_item_version': 'Code SAAAAR : 203523', 'ref_protection_profiles': 'Protection profiles for secure signature creation device : Part 2: Device with key generation, v2.0.1, BSI-CC-PP-0059-2009-MA-01 ; Part 3: Device with key import, v1.0.2, BSI-CC-PP-0075-2012 ; Part 4: Extension for device with key generation and trusted communication with certificate generation application, v1.0.1, BSI-CC-PP-0071-2012', 'cc_version': 'Critères Communs version 3.1 révision 5', 'cc_security_level': 'EAL 5 augmenté ALC_DVS.2, AVA_VAN.5', 'developer': 'IDEMIA 2 place Samuel de Champlain 92400 Courbevoie, France Infineon Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire IDEMIA 2 place Samuel de Champlain 92400 Courbevoie, France', 'cert_lab': 'CEA - LETI 17 avenue des martyrs, 38054 Grenoble Cedex 9, France'}}.
    • The st_frontpage property was set to None.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1110-V2-2019': 1}}, 'FR': {'__update__': {'ANSSI-CC-2020/59': 18, 'ANSSI-CC-2020/07': 1}}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1110-V2-2019': 1}}, 'FR': {'__update__': {'ANSSI-CC-2020/07': 1}}}}} data.

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'product': 'CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.2 (code SAAAAR : 203523)', 'url': 'https://cyber.gouv.fr/produits-certifies/combicao-applet-v21-sscd-configuration-cosmo-v92-code-saaaar-203523', 'description': 'Le produit évalué est « CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.2, code SAAAAR : 203523 » développé par IDEMIA et Infineon Technologies AG. Le produit évalué est de type « carte à puce » pouvant être utilisé en modes avec et sans contact. Il est destiné à être utilisé comme dispositif sécurisé de création de signature (SSCD). Il peut être utilisé dans différents types de documents (', 'cert_id': '2020/64', 'enhanced': {'__update__': {'cert_id': '2020/64', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2020/08/anssi-cc-2020_64fr.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2020/08/anssi-cible-cc-2020-64en.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2020_64-S01fr_0.pdf'}}} data.
  • 13.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1110-V2-2019': 2}}, 'FR': {'__update__': {'ANSSI-CC-2020/59': 36, 'ANSSI-CC-2020/07': 2}}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1110-V2-2019': 2}}, 'FR': {'__update__': {'ANSSI-CC-2020/07': 2}}}}} data.

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'product': 'CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.1 (code SAAAAR : 203523)', 'url': 'https://cyber.gouv.fr/produits-certifies/combicao-applet-v21-sscd-configuration-cosmo-v91-code-saaaar-203523', 'description': 'Le produit évalué est « CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.1, code SAAAAR : 203523 » développé par IDEMIA et Infineon Technologies AG. Le produit évalué est de type « carte à puce » pouvant être utilisé en modes avec et sans contact. Il est destiné à être utilisé comme dispositif sécurisé de création de signature (SSCD). Il peut être utilisé dans différents types de documents (', 'cert_id': '2020/59', 'enhanced': {'__update__': {'cert_id': '2020/59', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2020/08/anssi-cc-2020_59fr.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2020/08/anssi-cible-cc-2020-59en.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2020_59-S01fr_0.pdf'}}} data.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__delete__': ['CA']}} data.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__insert__': {'CA': {'1 1 1': 21, '1 2 3': 5, '5 5 6': 1, '1 1 2': 1, '2 3 3': 1, '5 6 4': 1, '4 5 5': 2, '5 5 5': 1, '1 2 2': 5, '2 2 2': 2, '3 3 2': 1, '1 1 3': 1, '2 2 1': 1, '2 2 3': 1}}, '__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1110-V2-2019': 1}}, 'FR': {'__update__': {'ANSSI-CC-2020/59': 18, 'ANSSI-CC-2020/07': 1}}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1110-V2-2019': 1}}, 'FR': {'__update__': {'ANSSI-CC-2020/07': 1}}}}} data.

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'product': 'CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.2 (code SAAAAR : 203523)', 'url': 'https://cyber.gouv.fr/produits-certifies/combicao-applet-v21-sscd-configuration-cosmo-v92-code-saaaar-203523', 'description': 'Le produit évalué est « CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.2, code SAAAAR : 203523 » développé par IDEMIA et Infineon Technologies AG. Le produit évalué est de type « carte à puce » pouvant être utilisé en modes avec et sans contact. Il est destiné à être utilisé comme dispositif sécurisé de création de signature (SSCD). Il peut être utilisé dans différents types de documents (', 'cert_id': '2020/64', 'enhanced': {'__update__': {'cert_id': '2020/64', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2020/08/anssi-cc-2020_64fr.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2020/08/anssi-cible-cc-2020-64en.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2020_64-S01fr_0.pdf'}}} data.
  • 05.02.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'description': 'Le produit évalué est « CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.1, code SAAAAR : 203523 » développé par IDEMIA et Infineon Technologies AG. Le produit évalué est de type « carte à puce » pouvant être utilisé en modes avec et sans contact. Il est destiné à être utilisé comme dispositif sécurisé de création de signature (SSCD). Il peut être utilisé dans différents types de documents ('} data.
  • 04.01.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'annotated_references': None}.
    • The scheme_data property was updated, with the {'product': 'CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.1 (code SAAAAR : 203523)', 'url': 'https://cyber.gouv.fr/produits-certifies/combicao-applet-v21-sscd-configuration-cosmo-v91-code-saaaar-203523', 'enhanced': {'__insert__': {'cert_id': '2020/59', 'sponsor': 'Idemia', 'mutual_recognition': 'CCRA\n SOG-IS', 'augmented': 'ALC_DVS.2, AVA_VAN.5'}, '__update__': {'developer': 'Idemia, Infineon Technologies AG', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2020/08/anssi-cc-2020_59fr.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2020/08/anssi-cible-cc-2020-59en.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2020_59-S01fr_0.pdf'}, '__delete__': ['id', 'augmentations', 'recognition', 'description']}} data.
  • 21.09.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'product': 'CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.1 (code SAAAAR : 203523)\n\t\t\t\n\t\t\tDernier rapport de maintenance :2020/59-M01Dernier rapport de surveillance :2020/59-S01', 'vendor': 'Idemia, Infineon Technologies AGIdemia', 'id': '2020/59', 'certification_date': '27/07/2020', 'url': 'https://www.ssi.gouv.fr/certification_cc/combicao-applet-v2-1-in-sscd-configuration-on-cosmo-v9-1-code-saaaar-203523/', 'enhanced': {'__update__': {'id': '2020/59', 'certification_date': '27/07/2020', 'expiration_date': '03/07/2028', 'protection_profile': 'Protection profiles for secure signature creation device (Part 2 à part 4 incluses)', 'developer': 'Idemia, Infineon Technologies AG / Idemia', 'evaluation_facility': 'CEA-Leti', 'description': 'Descriptif du produit\n\t\t\t\tLe produit évalué est « CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.1, code SAAAAR : 203523 » développé par IDEMIA et Infineon Technologies AG.\nLe produit évalué est de type « carte à puce » pouvant être utilisé en modes avec et sans contact. Il est destiné à être utilisé comme dispositif sécurisé de création de signature (SSCD). Il peut être utilisé dans différents types de documents (carte d’identité, permis de conduire, carte d’entreprise, passeport, etc. ).\n\t\t\t\t\n Rapport de certification\nSecurity target\nSecurity target\nCertificat\n \t\t\t\t\t\n \t\t\t\t\t\n \n \n Rapports de maintenance2020/59-M01 - 05/02/2021\n \n Rapports de surveillance2020/59-S01 - 04/08/2023', 'report_link': 'https://www.ssi.gouv.fr/uploads/2020/08/anssi-cc-2020_59fr.pdf', 'target_link': 'https://www.ssi.gouv.fr/uploads/2020/08/anssi-cible-cc-2020-59en.pdf', 'cert_link': 'https://www.ssi.gouv.fr/uploads/2020/08/certificat-cc-2020_59-s01fr.pdf'}}} data.
  • 27.07.2023 The certificate data changed.
    Certificate changed

    The Valid until date was updated.

    • The new value is 2028-07-03.

    The cert_link was updated.

    • The new value is https://www.commoncriteriaportal.org/files/epfiles/Certificat-CC-2020_59-S01fr.pdf.

    The Maintenance Updates of the certificate were updated.

    • The following values were added: {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': '2023-07-03', 'maintenance_title': 'reassessment ANSSI-CC-2020/59-S01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC-2020_59-S01fr.pdf', 'maintenance_st_link': None}]}.
  • 20.06.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'enhanced': {'__update__': {'cert_link': 'https://www.ssi.gouv.fr/uploads/2023/05/certificat-anssi-cc-2022_18v2fr.pdf'}}} data.
  • 18.05.2023 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The following values were removed: {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 4: Extension for device wi...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0071b_pdf.pdf', 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Ve...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0059b_pdf.pdf', 'pp_ids': None}]}.
    • The following values were added: {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 4: Extension for device with key gene...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0071b_pdf.pdf', 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Version...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0059b_pdf.pdf', 'pp_ids': None}]}.

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'vendor': 'IDEMIA INFINEON TECHNOLOGIES AGIDEMIA INFINEON TECHNOLOGIES AG', 'id': '2022/18v2', 'certification_date': '05/05/2023', 'url': 'https://www.ssi.gouv.fr/certification_cc/combicao-applet-v3-on-id-one-cosmo-x-sscd-configuration-saaaar-203742-2/', 'enhanced': {'__insert__': {'recognition': 'SOG-IS - CCRA'}, '__update__': {'id': '2022/18v2', 'certification_date': '05/05/2023', 'developer': 'IDEMIA INFINEON TECHNOLOGIES AG / IDEMIA INFINEON TECHNOLOGIES AG', 'report_link': 'https://www.ssi.gouv.fr/uploads/2023/05/anssi-cc-2022_18v2fr.pdf', 'target_link': 'https://www.ssi.gouv.fr/uploads/2023/05/anssi-cible-cc-2022_18v2en.pdf', 'cert_link': 'https://www.ssi.gouv.fr/uploads/2023/05/certificat-anssi-cc-2022_18v2.pdf'}}} data.
  • 26.04.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'scheme_data': {'product': 'CombICAO Applet v3 on ID-One Cosmo X (SSCD Configuration) SAAAAR : 203742', 'vendor': 'IDEMIA INFINEON TECHNOLOGIES AG', 'level': 'EAL5+', 'id': '2022/18', 'certification_date': '08/03/2022', 'category': 'Smart cards', 'url': 'https://www.ssi.gouv.fr/certification_cc/combicao-applet-v3-on-id-one-cosmo-x-sscd-configuration-saaaar-203742/', 'enhanced': {'id': '2022/18', 'certification_date': '08/03/2022', 'expiration_date': '08/03/2027', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 3.1r5', 'level': 'EAL5+', 'augmentations': 'ALC_DVS.2, AVA_VAN.5', 'protection_profile': 'Protection profiles for secure signature creation device: Part 2 : Device with key generation, v2.01, BSI-CC-PP-0059-2009-MA-02 ; Part 3 : Device with key import, v1.0.2, BSI-CC-PP-0075-2012-MA-01 ; Part 4 : Extension for device with key generation and trusted communication with certificate generation application, v1.0.1, BSI-CC-PP-0071-2012-MA-01 ; Part 5 : Extension for device with key generation and trusted communication with signature creation application, v1.0.1, BSI-CC-PP-0072-2012-MA-01 ; Part 6 : Extension for device with key import and trusted communication with signature creation application, v1.0.4, BSI-CC-PP-0076-2013-MA-01.', 'developer': '/ IDEMIA INFINEON TECHNOLOGIES AG', 'evaluation_facility': 'CEA - LETI', 'description': 'Descriptif du produit\n\t\t\t\tLe produit évalué est « CombICAO Applet v3 on ID-One Cosmo X (SSCD Configuration), SAAAAR : 203742 », dont le logiciel embarqué est développé par IDEMIA, sur un microcontrôleur développé par INFINEON.\nLe produit évalué est de type « carte à puce » pouvant être utilisé en modes avec et sans contact. Il est destiné à être utilisé comme dispositif sécurisé de création de signature (SSCD).\n\t\t\t\t\n Rapport de certification\nSecurity target\nCertificat', 'report_link': 'https://www.ssi.gouv.fr/uploads/2022/03/anssi-cc-2022_18.pdf', 'target_link': 'https://www.ssi.gouv.fr/uploads/2022/03/anssi-cible-cc-2022_18en.pdf', 'cert_link': 'https://www.ssi.gouv.fr/uploads/2022/03/certificat-cc-2022_18.pdf'}}}.
  • 11.02.2023 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.cc.CCCertificate.

    The Maintenance Updates of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': '2021-02-05', 'maintenance_title': 'ANSSI-CC-2020/59-M01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2020_59-m01.pdf', 'maintenance_st_link': None}]}.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.InternalState.
    • The following properties were deleted: ['errors'].

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.PdfData.

    The computed heuristics were updated.

    • The following values were inserted: {'direct_transitive_cves': None, 'indirect_transitive_cves': None}.
    • The _type property was set to sec_certs.sample.cc.CCCertificate.Heuristics.
    • The following properties were deleted: ['direct_dependency_cves', 'indirect_dependency_cves'].
  • 26.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to b3e81c437b32d2cde805c2f405ee6d8a135d09454db78877252bf3aa369fbb40.
    • The st_txt_hash property was set to eeaea15d231156b2f3c44aa0b34eef52288a67a20f5fa0d5221193ba947bf5e9.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 2209512, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 99, '/Title': 'Title', '/Author': 'Shubham SAGAR', '/Creator': 'Microsoft® Word 2016', '/CreationDate': "D:20200617125534+05'30'", '/ModDate': "D:20200617125534+05'30'", '/Producer': 'Microsoft® Word 2016', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1110-V2-2019': 2}, 'FR': {'ANSSI-CC-2020/07': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 1, 'BSI-CC-PP-0059-2009-MA-01': 1, 'BSI-CC-PP-0075': 1, 'BSI-CC-PP-0071': 1}}, 'cc_security_level': {'EAL': {'EAL5': 3, 'EAL 5': 1, 'EAL4': 1, 'EAL5 augmented': 3, 'EAL4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_ARC.1': 15, 'ADV_FSP': 1, 'ADV_FSP.5': 22, 'ADV_IMP': 1, 'ADV_IMP.1': 15, 'ADV_TDS': 1, 'ADV_TDS.4': 23, 'ADV_INT': 1, 'ADV_INT.2': 7, 'ADV_FSP.1': 3, 'ADV_TDS.1': 2, 'ADV_TDS.3': 3, 'ADV_FSP.2': 2, 'ADV_FSP.4': 1}, 'AGD': {'AGD_PRE': 8, 'AGD_OPE': 10, 'AGD_PRE_PLT': 1, 'AGD_OPE.1': 15, 'AGD_PRE.1': 11}, 'ALC': {'ALC_DVS.2': 14, 'ALC_DVS': 2, 'ALC_CMC': 1, 'ALC_CMC.4': 16, 'ALC_CMS': 1, 'ALC_CMS.5': 7, 'ALC_DEL': 1, 'ALC_DEL.1': 6, 'ALC_LCD': 1, 'ALC_LCD.1': 9, 'ALC_TAT': 1, 'ALC_TAT.2': 12, 'ALC_TAT.1': 2, 'ALC_CMS.1': 1, 'ALC_DVS.1': 1}, 'ATE': {'ATE_COV': 1, 'ATE_COV.2': 8, 'ATE_DPT': 1, 'ATE_DPT.3': 7, 'ATE_FUN': 1, 'ATE_FUN.1': 14, 'ATE_IND': 1, 'ATE_IND.2': 7, 'ATE_COV.1': 2, 'ATE_DPT.1': 1}, 'AVA': {'AVA_VAN.5': 15, 'AVA_VAN': 2}, 'APE': {'APE_SRE': 1}, 'ASE': {'ASE_CCL': 1, 'ASE_CCL.1': 15, 'ASE_ECD': 1, 'ASE_ECD.1': 14, 'ASE_INT': 1, 'ASE_INT.1': 17, 'ASE_OBJ': 1, 'ASE_OBJ.2': 13, 'ASE_REQ': 1, 'ASE_REQ.2': 15, 'ASE_SPD': 1, 'ASE_SPD.1': 8, 'ASE_APD.1': 1, 'ASE_TSS': 1, 'ASE_TSS.1': 6, 'ASE_REQ.1': 2}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 1}, 'FCS': {'FCS_RND': 2, 'FCS_RND.1': 15, 'FCS_RND.1.1': 2, 'FCS_CKM': 53, 'FCS_CKM.1': 13, 'FCS_CKM.4': 40, 'FCS_CKM.4.1': 1, 'FCS_COP': 82, 'FCS_COP.1': 12, 'FCS_RNG.1': 1, 'FCS_CKM.2': 3}, 'FDP': {'FDP_ACC': 83, 'FDP_ACC.1': 18, 'FDP_ACF': 70, 'FDP_ACF.1': 29, 'FDP_RIP.1': 25, 'FDP_RIP.1.1': 1, 'FDP_SDI': 28, 'FDP_SDI.2': 4, 'FDP_ITC': 10, 'FDP_ITC.1': 11, 'FDP_UCT': 25, 'FDP_UCT.1': 2, 'FDP_DAU': 9, 'FDP_DAU.2': 2, 'FDP_UIT': 12, 'FDP_UIT.1': 2, 'FDP_ITC.2': 8, 'FDP_IFC.1': 8}, 'FIA': {'FIA_API': 19, 'FIA_API.1': 15, 'FIA_API.1.1': 2, 'FIA_UID.1': 34, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_UAU.1': 31, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_AFL': 31, 'FIA_AFL.1': 4, 'FIA_UID': 27, 'FIA_UAU': 94, 'FIA_UAU.4': 1, 'FIA_UAU.5': 3, 'FIA_UAU.6': 2}, 'FMT': {'FMT_LIM': 3, 'FMT_LIM.1': 17, 'FMT_LIM.2': 15, 'FMT_LIM.1.1': 2, 'FMT_LIM.2.1': 2, 'FMT_SMR.1': 53, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SMF.1': 74, 'FMT_SMF.1.1': 1, 'FMT_MSA': 25, 'FMT_MSA.1': 4, 'FMT_MSA.2': 22, 'FMT_MSA.2.1': 1, 'FMT_MSA.3': 34, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MSA.4': 18, 'FMT_MSA.4.1': 1, 'FMT_MTD': 193, 'FMT_MTD.1': 28, 'FMT_MOF.1': 12, 'FMT_MOF.1.1': 1, 'FMT_SMR': 28, 'FMT_MTD.3': 13, 'FMT_MTD.3.1': 1}, 'FPT': {'FPT_EMS': 17, 'FPT_EMS.1': 16, 'FPT_EMS.1.1': 4, 'FPT_EMS.1.2': 3, 'FPT_TST.1': 22, 'FPT_FLS.1': 15, 'FPT_FLS.1.1': 1, 'FPT_TST': 1, 'FPT_PHP.1': 8, 'FPT_PHP.1.1': 1, 'FPT_PHP.1.2': 1, 'FPT_PHP.3': 16, 'FPT_PHP.3.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1}, 'FTP': {'FTP_ITC.1': 13, 'FTP_ITC': 45, 'FTP_TRP.1': 3}}, 'cc_claims': {'A': {'A.CGA': 5, 'A.SCA': 4, 'A.CSP': 7}, 'OE': {'OE.HID_VAD': 6}}, 'vendor': {'Infineon': {'Infineon': 1}, 'Oberthur': {'Oberthur Technologies': 1}, 'Idemia': {'IDEMIA': 20}, 'Morpho': {'Morpho': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 8}}, 'DES': {'DES': {'DES': 4}, '3DES': {'TDES': 1, 'Triple-DES': 3}}, 'constructions': {'MAC': {'KMAC': 2, 'CMAC': 2}}}, 'asymmetric_crypto': {'RSA': {'RSA-1024': 3}, 'ECC': {'ECDH': {'ECDH': 2}, 'ECDSA': {'ECDSA': 5}, 'ECC': {'ECC': 1}}, 'FF': {'DH': {'DH': 1, 'Diffie-Hellman': 1}, 'DSA': {'DSA': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 7}, 'SHA2': {'SHA-256': 3, 'SHA-224': 1, 'SHA-384': 1, 'SHA-512': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 7}}, 'crypto_protocol': {'PACE': {'PACE': 62}, 'PGP': {'PGP': 1}}, 'randomness': {'RNG': {'RND': 1}}, 'cipher_mode': {'CBC': {'CBC': 3}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 3, 'side channel': 2, 'SPA': 1, 'DPA': 1, 'timing attacks': 1}, 'FI': {'physical tampering': 6, 'Malfunction': 4, 'malfunction': 4, 'DFA': 2, 'fault injection': 2}, 'other': {'JIL': 1, 'JIL-COMP': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'PKCS': {'PKCS#1': 8, 'PKCS #1': 1, 'PKCS#3': 2, 'PKCS#15': 2}, 'SCP': {'SCP03': 5, 'SCP02': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to anssi-cible-cc-2020-59en.pdf.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1110-V2-2019', 'ANSSI-CC-2020/07']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1110-V2-2019', 'ANSSI-CC-2020/07']}} data.
    • The report_references property was updated, with the {'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0945-2017']}}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_APD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}]} values added.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/anssi-cible-cc-2020-59en.pdf, code: nok'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The report_references property was updated, with the {'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-2012', 'BSI-DSZ-CC-0891-2015', 'BSI-DSZ-CC-0891-V2-2016']}}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_APD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}]} values discarded.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2020_59fr.pdf, code: nok'].

    The computed heuristics were updated.

    • The report_references property was updated, with the {'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0945-V2-2018']}}} data.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to b3e81c437b32d2cde805c2f405ee6d8a135d09454db78877252bf3aa369fbb40.
    • The st_txt_hash property was set to eeaea15d231156b2f3c44aa0b34eef52288a67a20f5fa0d5221193ba947bf5e9.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 2209512, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 99, '/Title': 'Title', '/Author': 'Shubham SAGAR', '/Creator': 'Microsoft® Word 2016', '/CreationDate': "D:20200617125534+05'30'", '/ModDate': "D:20200617125534+05'30'", '/Producer': 'Microsoft® Word 2016', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1110-V2-2019': 2}, 'FR': {'ANSSI-CC-2020/07': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 1, 'BSI-CC-PP-0059-2009-MA-01': 1, 'BSI-CC-PP-0075': 1, 'BSI-CC-PP-0071': 1}}, 'cc_security_level': {'EAL': {'EAL5': 3, 'EAL 5': 1, 'EAL4': 1, 'EAL5 augmented': 3, 'EAL4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_ARC.1': 15, 'ADV_FSP': 1, 'ADV_FSP.5': 22, 'ADV_IMP': 1, 'ADV_IMP.1': 15, 'ADV_TDS': 1, 'ADV_TDS.4': 23, 'ADV_INT': 1, 'ADV_INT.2': 7, 'ADV_FSP.1': 3, 'ADV_TDS.1': 2, 'ADV_TDS.3': 3, 'ADV_FSP.2': 2, 'ADV_FSP.4': 1}, 'AGD': {'AGD_PRE': 8, 'AGD_OPE': 10, 'AGD_PRE_PLT': 1, 'AGD_OPE.1': 15, 'AGD_PRE.1': 11}, 'ALC': {'ALC_DVS.2': 14, 'ALC_DVS': 2, 'ALC_CMC': 1, 'ALC_CMC.4': 16, 'ALC_CMS': 1, 'ALC_CMS.5': 7, 'ALC_DEL': 1, 'ALC_DEL.1': 6, 'ALC_LCD': 1, 'ALC_LCD.1': 9, 'ALC_TAT': 1, 'ALC_TAT.2': 12, 'ALC_TAT.1': 2, 'ALC_CMS.1': 1, 'ALC_DVS.1': 1}, 'ATE': {'ATE_COV': 1, 'ATE_COV.2': 8, 'ATE_DPT': 1, 'ATE_DPT.3': 7, 'ATE_FUN': 1, 'ATE_FUN.1': 14, 'ATE_IND': 1, 'ATE_IND.2': 7, 'ATE_COV.1': 2, 'ATE_DPT.1': 1}, 'AVA': {'AVA_VAN.5': 15, 'AVA_VAN': 2}, 'APE': {'APE_SRE': 1}, 'ASE': {'ASE_CCL': 1, 'ASE_CCL.1': 15, 'ASE_ECD': 1, 'ASE_ECD.1': 14, 'ASE_INT': 1, 'ASE_INT.1': 17, 'ASE_OBJ': 1, 'ASE_OBJ.2': 13, 'ASE_REQ': 1, 'ASE_REQ.2': 15, 'ASE_SPD': 1, 'ASE_SPD.1': 8, 'ASE_APD.1': 1, 'ASE_TSS': 1, 'ASE_TSS.1': 6, 'ASE_REQ.1': 2}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 1}, 'FCS': {'FCS_RND': 2, 'FCS_RND.1': 15, 'FCS_RND.1.1': 2, 'FCS_CKM': 53, 'FCS_CKM.1': 13, 'FCS_CKM.4': 40, 'FCS_CKM.4.1': 1, 'FCS_COP': 82, 'FCS_COP.1': 12, 'FCS_RNG.1': 1, 'FCS_CKM.2': 3}, 'FDP': {'FDP_ACC': 83, 'FDP_ACC.1': 18, 'FDP_ACF': 70, 'FDP_ACF.1': 29, 'FDP_RIP.1': 25, 'FDP_RIP.1.1': 1, 'FDP_SDI': 28, 'FDP_SDI.2': 4, 'FDP_ITC': 10, 'FDP_ITC.1': 11, 'FDP_UCT': 25, 'FDP_UCT.1': 2, 'FDP_DAU': 9, 'FDP_DAU.2': 2, 'FDP_UIT': 12, 'FDP_UIT.1': 2, 'FDP_ITC.2': 8, 'FDP_IFC.1': 8}, 'FIA': {'FIA_API': 19, 'FIA_API.1': 15, 'FIA_API.1.1': 2, 'FIA_UID.1': 34, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_UAU.1': 31, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_AFL': 31, 'FIA_AFL.1': 4, 'FIA_UID': 27, 'FIA_UAU': 94, 'FIA_UAU.4': 1, 'FIA_UAU.5': 3, 'FIA_UAU.6': 2}, 'FMT': {'FMT_LIM': 3, 'FMT_LIM.1': 17, 'FMT_LIM.2': 15, 'FMT_LIM.1.1': 2, 'FMT_LIM.2.1': 2, 'FMT_SMR.1': 53, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SMF.1': 74, 'FMT_SMF.1.1': 1, 'FMT_MSA': 25, 'FMT_MSA.1': 4, 'FMT_MSA.2': 22, 'FMT_MSA.2.1': 1, 'FMT_MSA.3': 34, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MSA.4': 18, 'FMT_MSA.4.1': 1, 'FMT_MTD': 193, 'FMT_MTD.1': 28, 'FMT_MOF.1': 12, 'FMT_MOF.1.1': 1, 'FMT_SMR': 28, 'FMT_MTD.3': 13, 'FMT_MTD.3.1': 1}, 'FPT': {'FPT_EMS': 17, 'FPT_EMS.1': 16, 'FPT_EMS.1.1': 4, 'FPT_EMS.1.2': 3, 'FPT_TST.1': 22, 'FPT_FLS.1': 15, 'FPT_FLS.1.1': 1, 'FPT_TST': 1, 'FPT_PHP.1': 8, 'FPT_PHP.1.1': 1, 'FPT_PHP.1.2': 1, 'FPT_PHP.3': 16, 'FPT_PHP.3.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1}, 'FTP': {'FTP_ITC.1': 13, 'FTP_ITC': 45, 'FTP_TRP.1': 3}}, 'cc_claims': {'A': {'A.CGA': 5, 'A.SCA': 4, 'A.CSP': 7}, 'OE': {'OE.HID_VAD': 6}}, 'vendor': {'Infineon': {'Infineon': 1}, 'Oberthur': {'Oberthur Technologies': 1}, 'Idemia': {'IDEMIA': 20}, 'Morpho': {'Morpho': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 8}}, 'DES': {'DES': {'DES': 4}, '3DES': {'TDES': 1, 'Triple-DES': 3}}, 'constructions': {'MAC': {'KMAC': 2, 'CMAC': 2}}}, 'asymmetric_crypto': {'RSA': {'RSA-1024': 3}, 'ECC': {'ECDH': {'ECDH': 2}, 'ECDSA': {'ECDSA': 5}, 'ECC': {'ECC': 1}}, 'FF': {'DH': {'DH': 1, 'Diffie-Hellman': 1}, 'DSA': {'DSA': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 7}, 'SHA2': {'SHA-256': 3, 'SHA-224': 1, 'SHA-384': 1, 'SHA-512': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 7}}, 'crypto_protocol': {'PACE': {'PACE': 62}, 'PGP': {'PGP': 1}}, 'randomness': {'RNG': {'RND': 1}}, 'cipher_mode': {'CBC': {'CBC': 3}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 3, 'side channel': 2, 'SPA': 1, 'DPA': 1, 'timing attacks': 1}, 'FI': {'physical tampering': 6, 'Malfunction': 4, 'malfunction': 4, 'DFA': 2, 'fault injection': 2}, 'other': {'JIL': 1, 'JIL-COMP': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'PKCS': {'PKCS#1': 8, 'PKCS #1': 1, 'PKCS#3': 2, 'PKCS#15': 2}, 'SCP': {'SCP03': 5, 'SCP02': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to anssi-cible-cc-2020-59en.pdf.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1110-V2-2019', 'ANSSI-CC-2020/07']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1110-V2-2019', 'ANSSI-CC-2020/07']}} data.
    • The report_references property was updated, with the {'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0945-V3-2018']}}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_APD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}]} values added.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The manufacturer_web was updated.

    • The new value is https://www.idemia.com.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Ve...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0059b_pdf.pdf', 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 4: Extension for device wi...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0071b_pdf.pdf', 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 3: Device with key import', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0075b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['PP_SSCD_PART3_V1.0.2']}}]}.

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/anssi-cible-cc-2020-59en.pdf, code: nok'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The report_references property was updated, with the {'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0945-2017', 'BSI-DSZ-CC-0782-2012', 'BSI-DSZ-CC-0891-2015', 'BSI-DSZ-CC-0945-V2-2018', 'BSI-DSZ-CC-0891-V2-2016', 'BSI-DSZ-CC-0945-V3-2018']}}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_APD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}]} values discarded.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The manufacturer_web was updated.

    • The new value is None.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'PP_SSCD_PART2_V1.03', 'pp_eal': None, 'pp_link': None, 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'P_SSCD_PART4_V1.0.1', 'pp_eal': None, 'pp_link': None, 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'PP_SSCD_PART3_V1.0.2', 'pp_eal': None, 'pp_link': None, 'pp_ids': None}]}.
  • 22.12.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The report_references property was updated, with the {'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-2012', 'BSI-DSZ-CC-0891-2015']}}} data.
  • 21.12.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The report_references property was updated, with the {'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-2012', 'BSI-DSZ-CC-0891-2015']}}} data.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Ve...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0059b_pdf.pdf', 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 4: Extension for device wi...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0071b_pdf.pdf', 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 3: Device with key import', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0075b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['PP_SSCD_PART3_V1.0.2']}}]}.

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.
  • 04.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Ve...', 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/pp0059b_pdf.pdf', 'pp_link': None, 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 3: Device with key import', 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/pp0075b_pdf.pdf', 'pp_link': None, 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 4: Extension for device wi...', 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/pp0071b_pdf.pdf', 'pp_link': None, 'pp_ids': None}]}.
  • 26.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The st_keywords property was updated, with the {'crypto_protocol': {'__insert__': {'PGP': {'PGP': 1}}}} data.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': 'anssi-cc-2020_59fr.pdf', 'st_filename': 'anssi-cible-cc-2020-59en.pdf'}.
    • The report_keywords property was updated, with the {'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL2': 2}, '__delete__': ['EAL 2', 'EAL 4', 'EAL 6', 'EAL 5+']}}}, 'cc_sar': {'__update__': {'ALC': {'__update__': {'ALC_FLR': 2}, '__delete__': ['ALC_LCD']}, 'AVA': {'__update__': {'AVA_VAN.5': 5}}}}, 'vendor': {'__update__': {'Idemia': {'__update__': {'IDEMIA': 34}}}}, 'eval_facility': {'__update__': {'CESTI': {'__update__': {'CESTI': 3}}, 'CEA-LETI': {'__insert__': {'CEA-LETI': 2}}}}, 'symmetric_crypto': {'__update__': {'DES': {'__update__': {'DES': {'__update__': {'DES': 1}}}}}}, 'tee_name': {}, 'standard_id': {'__update__': {'CC': {'__insert__': {'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}}, '__delete__': ['ICAO']}} data.
    • The st_keywords property was updated, with the {'cc_sar': {'__update__': {'ADV': {'__update__': {'ADV_ARC.1': 15, 'ADV_FSP.5': 22, 'ADV_IMP.1': 15, 'ADV_TDS.4': 23, 'ADV_INT.2': 7}}, 'AGD': {'__update__': {'AGD_PRE': 8, 'AGD_OPE': 10, 'AGD_OPE.1': 15, 'AGD_PRE.1': 11}}, 'ALC': {'__update__': {'ALC_DVS.2': 14, 'ALC_CMC.4': 16, 'ALC_CMS.5': 7, 'ALC_DEL.1': 6, 'ALC_DVS': 2, 'ALC_LCD.1': 9, 'ALC_TAT.2': 12}}, 'ATE': {'__update__': {'ATE_COV.2': 8, 'ATE_DPT.3': 7, 'ATE_FUN.1': 14, 'ATE_IND.2': 7}, '__delete__': ['ATE_MGT']}, 'AVA': {'__update__': {'AVA_VAN.5': 15, 'AVA_VAN': 2}}, 'ASE': {'__insert__': {'ASE_APD.1': 1}, '__update__': {'ASE_CCL.1': 15, 'ASE_ECD.1': 14, 'ASE_INT.1': 17, 'ASE_OBJ.2': 13, 'ASE_REQ.2': 15, 'ASE_SPD.1': 8, 'ASE_TSS.1': 6}}}}, 'cc_sfr': {'__insert__': {'FAU': {'FAU_ARP.1': 1}}, '__update__': {'FCS': {'__insert__': {'FCS_CKM': 53, 'FCS_COP': 82}, '__update__': {'FCS_RND.1': 15, 'FCS_COP.1': 12, 'FCS_CKM.1': 13}}, 'FDP': {'__insert__': {'FDP_ACC': 83, 'FDP_ACF': 70, 'FDP_SDI': 28, 'FDP_SDI.2': 4, 'FDP_ITC': 10, 'FDP_UCT': 25, 'FDP_UCT.1': 2, 'FDP_DAU': 9, 'FDP_DAU.2': 2, 'FDP_UIT': 12, 'FDP_UIT.1': 2}, '__update__': {'FDP_ITC.1': 11, 'FDP_ACF.1': 29, 'FDP_ACC.1': 18}}, 'FIA': {'__insert__': {'FIA_AFL': 31, 'FIA_AFL.1': 4, 'FIA_UID': 27, 'FIA_UAU': 94, 'FIA_UAU.4': 1, 'FIA_UAU.6': 2}, '__update__': {'FIA_API': 19, 'FIA_API.1': 15, 'FIA_UID.1': 34, 'FIA_UAU.1': 31, 'FIA_UAU.5': 3}}, 'FMT': {'__insert__': {'FMT_MSA': 25, 'FMT_MTD': 193, 'FMT_SMR': 28}, '__update__': {'FMT_SMR.1': 53, 'FMT_SMF.1': 74, 'FMT_MSA.4': 18, 'FMT_MTD.1': 28, 'FMT_MSA.1': 4}}, 'FPT': {'__update__': {'FPT_EMS': 17, 'FPT_EMS.1': 16, 'FPT_PHP.3': 16}}, 'FTP': {'__insert__': {'FTP_ITC': 45}, '__update__': {'FTP_ITC.1': 13}}}}, 'vendor': {'__update__': {'Infineon': {'__update__': {'Infineon': 1}}, 'Idemia': {'__update__': {'IDEMIA': 20}, '__delete__': ['Idemia']}, 'Morpho': {'__update__': {'Morpho': 1}}}}, 'symmetric_crypto': {'__update__': {'DES': {'__update__': {'DES': {'__update__': {'DES': 4}}}}, 'constructions': {'__update__': {'MAC': {'__update__': {'KMAC': 2}}}}}}, 'asymmetric_crypto': {'__update__': {'FF': {'__update__': {'DH': {'__update__': {'DH': 1, 'Diffie-Hellman': 1}}, 'DSA': {'__update__': {'DSA': 1}}}}}}, 'hash_function': {'__update__': {'SHA': {'__update__': {'SHA2': {'__update__': {'SHA-512': 1}}}}}}, 'crypto_scheme': {'__update__': {'MAC': {'__update__': {'MAC': 7}}}, '__delete__': ['KA']}, 'crypto_protocol': {'__update__': {'PACE': {'__update__': {'PACE': 62}}}}, 'randomness': {'__update__': {'RNG': {'__update__': {'RND': 1}}}}, 'side_channel_analysis': {'__update__': {'FI': {'__update__': {'malfunction': 4}}}}, 'tee_name': {}, 'standard_id': {'__update__': {'SCP': {'__update__': {'SCP03': 5}}}, '__delete__': ['ICAO']}} data.

    The computed heuristics were updated.

    • The report_references property was updated, with the {'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0945-2017', 'BSI-DSZ-CC-1110-2019', 'BSI-DSZ-CC-0782-2012', 'BSI-DSZ-CC-0891-2015', 'BSI-DSZ-CC-0945-V2-2018', 'BSI-DSZ-CC-0891-V2-2016', 'BSI-DSZ-CC-0945-V3-2018']}}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_APD', 'level': 1}]} values added.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Ve...', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0059b_pdf.pdf', 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 4: Extension for device wi...', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0071b_pdf.pdf', 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 3: Device with key import', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0075b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['PP_SSCD_PART3_V1.0.2']}}]}.

    The Maintenance Updates of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.common_criteria.CommonCriteriaCert.MaintenanceReport', 'maintenance_date': '2021-02-05', 'maintenance_title': 'ANSSI-CC-2020/59-M01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2020_59-m01.pdf', 'maintenance_st_link': None}]}.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}]}.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.commoncriteriaportal.org/', 'http://www.sogis.org/', 'mailto:certification@ssi.gouv.fr', 'http://www.ssi.gouv.fr/']}} values inserted.
    • The st_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': []}} values inserted.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1110-V2-2019': 2}, 'FR': {'ANSSI-CC-2020/59': 36, 'ANSSI-CC-2020/07': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0059-2009-MA-01': 1, 'BSI-CC-PP-0075-2012': 1, 'BSI-CC-PP-0071-2012': 1, 'BSI-PP-0084-2014': 1}, 'other': {'PP-SSCD-Part2': 2, 'PP-SSCD-Part3': 2, 'PP-SSCD-': 1, 'PP-SSCD-Part4': 1}}, 'cc_security_level': {'EAL': {'EAL 5': 3, 'EAL5': 1, 'EAL7': 1, 'EAL2': 1, 'EAL 1': 1, 'EAL 2': 1, 'EAL 3': 1, 'EAL 4': 1, 'EAL 6': 1, 'EAL 7': 1, 'EAL 5+': 1}, 'ITSEC': {'ITSEC E6 Elevé': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE': 3, 'AGD_PRE': 3}, 'ALC': {'ALC_DVS.2': 3, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_FLR': 1, 'ALC_LCD': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.5': 3, 'AVA_VAN': 2}, 'ASE': {'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Infineon': {'Infineon Technologies AG': 1, 'Infineon': 1}, 'Idemia': {'IDEMIA': 28}}, 'eval_facility': {'Serma': {'SERMA': 14}, 'CESTI': {'CESTI': 1}, 'CEA-LETI': {'CEA - LETI': 1}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 4}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 2}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ICAO': {'ICAO': 27}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1110-V2-2019': 2}, 'FR': {'ANSSI-CC-2020/07': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 1, 'BSI-CC-PP-0059-2009-MA-01': 1, 'BSI-CC-PP-0075': 1, 'BSI-CC-PP-0071': 1}}, 'cc_security_level': {'EAL': {'EAL5': 3, 'EAL 5': 1, 'EAL4': 1, 'EAL5 augmented': 3, 'EAL4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_ARC.1': 6, 'ADV_FSP': 1, 'ADV_FSP.5': 10, 'ADV_IMP': 1, 'ADV_IMP.1': 10, 'ADV_TDS': 1, 'ADV_TDS.4': 9, 'ADV_INT': 1, 'ADV_INT.2': 2, 'ADV_FSP.1': 3, 'ADV_TDS.1': 2, 'ADV_TDS.3': 3, 'ADV_FSP.2': 2, 'ADV_FSP.4': 1}, 'AGD': {'AGD_PRE': 11, 'AGD_OPE': 13, 'AGD_PRE_PLT': 1, 'AGD_OPE.1': 6, 'AGD_PRE.1': 6}, 'ALC': {'ALC_DVS.2': 8, 'ALC_CMC': 1, 'ALC_CMC.4': 2, 'ALC_CMS': 1, 'ALC_CMS.5': 3, 'ALC_DEL': 1, 'ALC_DEL.1': 2, 'ALC_DVS': 1, 'ALC_LCD': 1, 'ALC_LCD.1': 4, 'ALC_TAT': 1, 'ALC_TAT.2': 4, 'ALC_TAT.1': 2, 'ALC_CMS.1': 1, 'ALC_DVS.1': 1}, 'ATE': {'ATE_COV': 1, 'ATE_COV.2': 4, 'ATE_DPT': 1, 'ATE_DPT.3': 3, 'ATE_FUN': 1, 'ATE_FUN.1': 8, 'ATE_IND': 1, 'ATE_IND.2': 2, 'ATE_COV.1': 2, 'ATE_DPT.1': 1, 'ATE_MGT': 8}, 'AVA': {'AVA_VAN.5': 8, 'AVA_VAN': 1}, 'APE': {'APE_SRE': 1}, 'ASE': {'ASE_CCL': 1, 'ASE_CCL.1': 2, 'ASE_ECD': 1, 'ASE_ECD.1': 6, 'ASE_INT': 1, 'ASE_INT.1': 6, 'ASE_OBJ': 1, 'ASE_OBJ.2': 4, 'ASE_REQ': 1, 'ASE_REQ.2': 4, 'ASE_SPD': 1, 'ASE_SPD.1': 4, 'ASE_TSS': 1, 'ASE_TSS.1': 2, 'ASE_REQ.1': 2}}, 'cc_sfr': {'FCS': {'FCS_RND': 2, 'FCS_RND.1': 16, 'FCS_RND.1.1': 2, 'FCS_CKM.4': 40, 'FCS_CKM.4.1': 1, 'FCS_RNG.1': 1, 'FCS_CKM.2': 3, 'FCS_COP.1': 3, 'FCS_CKM.1': 8}, 'FDP': {'FDP_RIP.1': 25, 'FDP_RIP.1.1': 1, 'FDP_ITC.1': 8, 'FDP_ITC.2': 8, 'FDP_ACF.1': 5, 'FDP_ACC.1': 13, 'FDP_IFC.1': 8}, 'FIA': {'FIA_API': 3, 'FIA_API.1': 14, 'FIA_API.1.1': 2, 'FIA_UID.1': 33, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_UAU.1': 26, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.5': 1}, 'FMT': {'FMT_LIM': 3, 'FMT_LIM.1': 17, 'FMT_LIM.2': 15, 'FMT_LIM.1.1': 2, 'FMT_LIM.2.1': 2, 'FMT_SMR.1': 45, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SMF.1': 69, 'FMT_SMF.1.1': 1, 'FMT_MSA.2': 22, 'FMT_MSA.2.1': 1, 'FMT_MSA.3': 34, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MSA.4': 17, 'FMT_MSA.4.1': 1, 'FMT_MOF.1': 12, 'FMT_MOF.1.1': 1, 'FMT_MTD.3': 13, 'FMT_MTD.3.1': 1, 'FMT_MTD.1': 1, 'FMT_MSA.1': 2}, 'FPT': {'FPT_EMS': 4, 'FPT_EMS.1': 14, 'FPT_EMS.1.1': 4, 'FPT_EMS.1.2': 3, 'FPT_TST.1': 22, 'FPT_FLS.1': 15, 'FPT_FLS.1.1': 1, 'FPT_TST': 1, 'FPT_PHP.1': 8, 'FPT_PHP.1.1': 1, 'FPT_PHP.1.2': 1, 'FPT_PHP.3': 15, 'FPT_PHP.3.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1}, 'FTP': {'FTP_ITC.1': 3, 'FTP_TRP.1': 3}}, 'cc_claims': {'A': {'A.CGA': 5, 'A.SCA': 4, 'A.CSP': 7}, 'OE': {'OE.HID_VAD': 6}}, 'vendor': {'Infineon': {'Infineon': 2}, 'Oberthur': {'Oberthur Technologies': 1}, 'Idemia': {'IDEMIA': 21, 'Idemia': 1}, 'Morpho': {'Morpho': 2}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 8}}, 'DES': {'DES': {'DES': 8}, '3DES': {'TDES': 1, 'Triple-DES': 3}}, 'constructions': {'MAC': {'KMAC': 1, 'CMAC': 2}}}, 'asymmetric_crypto': {'RSA': {'RSA-1024': 3}, 'ECC': {'ECDH': {'ECDH': 2}, 'ECDSA': {'ECDSA': 5}, 'ECC': {'ECC': 1}}, 'FF': {'DH': {'DH': 5, 'Diffie-Hellman': 3}, 'DSA': {'DSA': 12}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 7}, 'SHA2': {'SHA-256': 3, 'SHA-224': 1, 'SHA-384': 1, 'SHA-512': 2}}}, 'crypto_scheme': {'MAC': {'MAC': 9}, 'KA': {'KA': 1}}, 'crypto_protocol': {'PACE': {'PACE': 239}}, 'randomness': {'RNG': {'RND': 2}}, 'cipher_mode': {'CBC': {'CBC': 3}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 3, 'side channel': 2, 'SPA': 1, 'DPA': 1, 'timing attacks': 1}, 'FI': {'physical tampering': 6, 'Malfunction': 4, 'malfunction': 3, 'DFA': 2, 'fault injection': 2}, 'other': {'JIL': 1, 'JIL-COMP': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 2}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'PKCS': {'PKCS#1': 8, 'PKCS #1': 1, 'PKCS#3': 2, 'PKCS#15': 2}, 'ICAO': {'ICAO': 118}, 'SCP': {'SCP03': 6, 'SCP02': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': '8dec1867d0a4649850f4287d765067f407dc9dcd9293bcc6b9cfb933b35611d2', 'st_pdf_hash': 'b3e81c437b32d2cde805c2f405ee6d8a135d09454db78877252bf3aa369fbb40', 'report_txt_hash': '6dd1e2fec0a449d882dd6b6be5ec4ab1dcf5d21093550c4579bac55f7c581371', 'st_txt_hash': 'eeaea15d231156b2f3c44aa0b34eef52288a67a20f5fa0d5221193ba947bf5e9'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {'DES': 4}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {}, 'rules_randomness': {}, 'rules_tee': {'SE': 2}, 'rules_side_channels': {}} values inserted.
    • The st_keywords property was updated, with the {'rules_symmetric_crypto': {'AES': 8, 'DES': 7, 'TDES': 1, 'KMAC': 1}, 'rules_asymmetric_crypto': {'RSA-1024': 3, 'ECDH': 2, 'ECDSA': 5, 'ECC': 1, 'DH': 5, 'Diffie-Hellman': 1, 'DSA': 12}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA-1': 7, 'SHA-256': 3, 'SHA-224': 1, 'SHA-384': 1, 'SHA-512': 2}, 'rules_crypto_schemes': {'PACE': 239, 'MAC': 9}, 'rules_randomness': {'RND': 2}, 'rules_tee': {'SE': 2}, 'rules_side_channels': {'Malfunction': 4, 'malfunction': 3, 'physical probing': 3, 'physical tampering': 6, 'side channel': 2, 'SPA': 1, 'DPA': 1, 'DFA': 2, 'fault injection': 2, 'timing attacks': 1}} values inserted.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 4}]}}.
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1110-V2-2019', 'ANSSI-CC-2020/07']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1110-V2-2019', 'ANSSI-CC-2020/07']}}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1110-V2-2019', 'ANSSI-CC-2020/07']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1110-V2-2019', 'ANSSI-CC-2020/07']}}}.
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['2.1', '9.1']}.
  • 01.02.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The following values were removed: {'_type': 'Set', 'elements': [{'_type': 'ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 3: Device with key import', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0075b_pdf.pdf', 'pp_ids': None}]}.
    • The following values were added: {'_type': 'Set', 'elements': [{'_type': 'ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 3: Device with key import', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0075b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['PP_SSCD_PART3_V1.0.2']}}]}.
  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.1 (code SAAAAR : 203523) was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/files/epfiles/Certificat-CC-2020_59-S01fr.pdf",
  "dgst": "ec8a2a25cdbda634",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2020/59",
    "cert_lab": [
      "CEA"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_APD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "2.1",
        "9.1"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2020/07",
          "BSI-DSZ-CC-1110-V2-2019"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0945-2017",
          "BSI-DSZ-CC-1110-2019",
          "BSI-DSZ-CC-1110-V2-2019",
          "BSI-DSZ-CC-0945-V3-2018",
          "BSI-DSZ-CC-0945-V2-2018",
          "BSI-DSZ-CC-0891-2015",
          "ANSSI-CC-2020/07",
          "BSI-DSZ-CC-0891-V2-2016",
          "BSI-DSZ-CC-0782-2012"
        ]
      }
    },
    "scheme_data": {
      "cert_id": "2020/64",
      "description": "Le produit \u00e9valu\u00e9 est \u00ab CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.2, code SAAAAR : 203523 \u00bb d\u00e9velopp\u00e9 par IDEMIA et Infineon Technologies AG. Le produit \u00e9valu\u00e9 est de type \u00ab carte \u00e0 puce \u00bb pouvant \u00eatre utilis\u00e9 en modes avec et sans contact. Il est destin\u00e9 \u00e0 \u00eatre utilis\u00e9 comme dispositif s\u00e9curis\u00e9 de cr\u00e9ation de signature (SSCD). Il peut \u00eatre utilis\u00e9 dans diff\u00e9rents types de documents (",
      "developer": "Idemia, Infineon Technologies AG",
      "enhanced": {
        "augmented": "ALC_DVS.2, AVA_VAN.5",
        "category": "Cartes \u00e0 puce",
        "cc_version": "Crit\u00e8res Communs version 3.1r5",
        "cert_id": "2020/64",
        "cert_link": "https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2020_64-S01fr_0.pdf",
        "certification_date": "27/07/2020",
        "developer": "Idemia, Infineon Technologies AG",
        "evaluation_facility": "CEA-Leti",
        "expiration_date": "03/07/2028",
        "level": "EAL5+",
        "mutual_recognition": "CCRA\n                          SOG-IS",
        "protection_profile": "Protection profiles for secure signature creation device (Part 2 \u00e0 part 4 incluses)",
        "report_link": "https://cyber.gouv.fr/sites/default/files/2020/08/anssi-cc-2020_64fr.pdf",
        "sponsor": "Idemia",
        "target_link": "https://cyber.gouv.fr/sites/default/files/2020/08/anssi-cible-cc-2020-64en.pdf"
      },
      "expiration_date": "3 Juillet 2028",
      "level": "EAL5+",
      "product": "CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.2 (code SAAAAR : 203523)",
      "sponsor": "Idemia",
      "url": "https://cyber.gouv.fr/produits-certifies/combicao-applet-v21-sscd-configuration-cosmo-v92-code-saaaar-203523"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2020/07",
          "BSI-DSZ-CC-1110-V2-2019"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2020/07",
          "BSI-DSZ-CC-1110-V2-2019"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2023-07-03",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC-2020_59-S01fr.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "reassessment ANSSI-CC-2020/59-S01"
      },
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2021-02-05",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2020_59-m01.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "ANSSI-CC-2020/59-M01"
      }
    ]
  },
  "manufacturer": "Idemia",
  "manufacturer_web": "https://www.idemia.com",
  "name": "CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.1 (code SAAAAR : 203523)",
  "not_valid_after": "2028-07-03",
  "not_valid_before": "2020-07-27",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "Certificat-CC-2020_59-S01fr.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2020/59-S01": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP- 0071-2012": 1,
          "BSI-CC-PP-0059-2009-MA-01": 1,
          "BSI-CC-PP-0075-2012": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_DVS.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 1,
          "EAL5": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "CEA-LETI": {
          "CEA - LETI": 2
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Idemia": {
          "IDEMIA": 2
        }
      },
      "vulnerability": {}
    },
    "cert_metadata": {
      "/CreationDate": "D:20230706170456+02\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 23 pour Word",
      "/Keywords": "",
      "/ModDate": "D:20230706170732+02\u002700\u0027",
      "/Producer": "Adobe PDF Library 23.1.175",
      "pdf_file_size_bytes": 157982,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 2
    },
    "report_filename": "anssi-cc-2020_59fr.pdf",
    "report_frontpage": {
      "FR": {
        "cc_security_level": "EAL 5 augment\u00e9 ALC_DVS.2, AVA_VAN.5",
        "cc_version": "Crit\u00e8res Communs version 3.1 r\u00e9vision 5",
        "cert_id": "ANSSI-CC-2020/59",
        "cert_item": "CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.1",
        "cert_item_version": "Code SAAAAR : 203523",
        "cert_lab": "CEA - LETI 17 avenue des martyrs, 38054 Grenoble Cedex 9, France",
        "developer": "IDEMIA 2 place Samuel de Champlain 92400 Courbevoie, France Infineon Technologies AG AIM CC SM PS \u2013 Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire IDEMIA 2 place Samuel de Champlain 92400 Courbevoie, France",
        "match_rules": [
          "R\u00e9f\u00e9rence du rapport de certification(.+)Nom du produit(.+)R\u00e9f\u00e9rence/version du produit(.*)Conformit\u00e9 \u00e0 un profil de protection(.+)Crit\u00e8res d\u2019\u00e9valuation et version(.+)Niveau d\u2019\u00e9valuation(.+)D\u00e9veloppeurs(.+)Centre d\u2019\u00e9valuation(.+)Accords de reconnaissance applicables"
        ],
        "ref_protection_profiles": "Protection profiles for secure signature creation device : Part 2: Device with key generation, v2.0.1, BSI-CC-PP-0059-2009-MA-01 ; Part 3: Device with key import, v1.0.2, BSI-CC-PP-0075-2012 ; Part 4: Extension for device with key generation and trusted communication with certificate generation application, v1.0.1, BSI-CC-PP-0071-2012"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1110-V2-2019": 1
        },
        "FR": {
          "ANSSI-CC-2020/07": 1,
          "ANSSI-CC-2020/59": 18
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0059-2009-MA-01": 1,
          "BSI-CC-PP-0071-2012": 1,
          "BSI-CC-PP-0075-2012": 1,
          "BSI-PP-0084-2014": 1
        },
        "other": {
          "PP-SSCD-": 1,
          "PP-SSCD-Part2": 2,
          "PP-SSCD-Part3": 2,
          "PP-SSCD-Part4": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_FSP": 1,
          "ADV_IMP": 1,
          "ADV_INT": 1,
          "ADV_SPM": 1,
          "ADV_TDS": 1
        },
        "AGD": {
          "AGD_OPE": 3,
          "AGD_PRE": 3
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMS": 1,
          "ALC_DEL": 1,
          "ALC_DVS": 1,
          "ALC_DVS.2": 3,
          "ALC_FLR": 2,
          "ALC_TAT": 1
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_ECD": 1,
          "ASE_INT": 1,
          "ASE_OBJ": 1,
          "ASE_REQ": 1,
          "ASE_SPD": 1,
          "ASE_TSS": 1
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_DPT": 1,
          "ATE_FUN": 1,
          "ATE_IND": 1
        },
        "AVA": {
          "AVA_VAN": 2,
          "AVA_VAN.5": 5
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 3": 1,
          "EAL 5": 3,
          "EAL 7": 1,
          "EAL2": 2,
          "EAL5": 1,
          "EAL7": 1
        },
        "ITSEC": {
          "ITSEC E6 Elev\u00e9": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "CEA-LETI": {
          "CEA - LETI": 1,
          "CEA-LETI": 2
        },
        "CESTI": {
          "CESTI": 3
        },
        "Serma": {
          "SERMA": 14
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1,
          "CCMB-2017-04-004": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Idemia": {
          "IDEMIA": 34
        },
        "Infineon": {
          "Infineon": 1,
          "Infineon Technologies AG": 1
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "G\u00e9raldine Avou\u00e9",
      "/CreationDate": "D:20200729170505+02\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "ANSSI-CC-CER-F-07, v29.2",
      "/Producer": "LibreOffice 4.4",
      "/Subject": "CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.1",
      "/Title": "ANSSI-CC-2020/59",
      "pdf_file_size_bytes": 268853,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.sogis.org/",
          "http://www.ssi.gouv.fr/",
          "http://www.commoncriteriaportal.org/",
          "mailto:certification@ssi.gouv.fr"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 17
    },
    "st_filename": "anssi-cible-cc-2020-59en.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 1
          },
          "ECDH": {
            "ECDH": 2
          },
          "ECDSA": {
            "ECDSA": 5
          }
        },
        "FF": {
          "DH": {
            "DH": 1,
            "Diffie-Hellman": 1
          },
          "DSA": {
            "DSA": 1
          }
        },
        "RSA": {
          "RSA-1024": 3
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1110-V2-2019": 1
        },
        "FR": {
          "ANSSI-CC-2020/07": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.CGA": 5,
          "A.CSP": 7,
          "A.SCA": 4
        },
        "OE": {
          "OE.HID_VAD": 6
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0059-2009-MA-01": 1,
          "BSI-CC-PP-0071": 1,
          "BSI-CC-PP-0075": 1,
          "BSI-CC-PP-0084-2014": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 15,
          "ADV_FSP": 1,
          "ADV_FSP.1": 3,
          "ADV_FSP.2": 2,
          "ADV_FSP.4": 1,
          "ADV_FSP.5": 22,
          "ADV_IMP": 1,
          "ADV_IMP.1": 15,
          "ADV_INT": 1,
          "ADV_INT.2": 7,
          "ADV_TDS": 1,
          "ADV_TDS.1": 2,
          "ADV_TDS.3": 3,
          "ADV_TDS.4": 23
        },
        "AGD": {
          "AGD_OPE": 10,
          "AGD_OPE.1": 15,
          "AGD_PRE": 8,
          "AGD_PRE.1": 11,
          "AGD_PRE_PLT": 1
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.4": 16,
          "ALC_CMS": 1,
          "ALC_CMS.1": 1,
          "ALC_CMS.5": 7,
          "ALC_DEL": 1,
          "ALC_DEL.1": 6,
          "ALC_DVS": 2,
          "ALC_DVS.1": 1,
          "ALC_DVS.2": 14,
          "ALC_LCD": 1,
          "ALC_LCD.1": 9,
          "ALC_TAT": 1,
          "ALC_TAT.1": 2,
          "ALC_TAT.2": 12
        },
        "APE": {
          "APE_SRE": 1
        },
        "ASE": {
          "ASE_APD.1": 1,
          "ASE_CCL": 1,
          "ASE_CCL.1": 15,
          "ASE_ECD": 1,
          "ASE_ECD.1": 14,
          "ASE_INT": 1,
          "ASE_INT.1": 17,
          "ASE_OBJ": 1,
          "ASE_OBJ.2": 13,
          "ASE_REQ": 1,
          "ASE_REQ.1": 2,
          "ASE_REQ.2": 15,
          "ASE_SPD": 1,
          "ASE_SPD.1": 8,
          "ASE_TSS": 1,
          "ASE_TSS.1": 6
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.1": 2,
          "ATE_COV.2": 8,
          "ATE_DPT": 1,
          "ATE_DPT.1": 1,
          "ATE_DPT.3": 7,
          "ATE_FUN": 1,
          "ATE_FUN.1": 14,
          "ATE_IND": 1,
          "ATE_IND.2": 7
        },
        "AVA": {
          "AVA_VAN": 2,
          "AVA_VAN.5": 15
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 5": 1,
          "EAL4": 1,
          "EAL4 augmented": 1,
          "EAL5": 3,
          "EAL5 augmented": 3
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 1
        },
        "FCS": {
          "FCS_CKM": 53,
          "FCS_CKM.1": 13,
          "FCS_CKM.2": 3,
          "FCS_CKM.4": 40,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 82,
          "FCS_COP.1": 12,
          "FCS_RND": 2,
          "FCS_RND.1": 15,
          "FCS_RND.1.1": 2,
          "FCS_RNG.1": 1
        },
        "FDP": {
          "FDP_ACC": 83,
          "FDP_ACC.1": 18,
          "FDP_ACF": 70,
          "FDP_ACF.1": 29,
          "FDP_DAU": 9,
          "FDP_DAU.2": 2,
          "FDP_IFC.1": 8,
          "FDP_ITC": 10,
          "FDP_ITC.1": 11,
          "FDP_ITC.2": 8,
          "FDP_RIP.1": 25,
          "FDP_RIP.1.1": 1,
          "FDP_SDI": 28,
          "FDP_SDI.2": 4,
          "FDP_UCT": 25,
          "FDP_UCT.1": 2,
          "FDP_UIT": 12,
          "FDP_UIT.1": 2
        },
        "FIA": {
          "FIA_AFL": 31,
          "FIA_AFL.1": 4,
          "FIA_API": 19,
          "FIA_API.1": 15,
          "FIA_API.1.1": 2,
          "FIA_UAU": 94,
          "FIA_UAU.1": 31,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.4": 1,
          "FIA_UAU.5": 3,
          "FIA_UAU.6": 2,
          "FIA_UID": 27,
          "FIA_UID.1": 34,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1
        },
        "FMT": {
          "FMT_LIM": 3,
          "FMT_LIM.1": 17,
          "FMT_LIM.1.1": 2,
          "FMT_LIM.2": 15,
          "FMT_LIM.2.1": 2,
          "FMT_MOF.1": 12,
          "FMT_MOF.1.1": 1,
          "FMT_MSA": 25,
          "FMT_MSA.1": 4,
          "FMT_MSA.2": 22,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 34,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MSA.4": 18,
          "FMT_MSA.4.1": 1,
          "FMT_MTD": 193,
          "FMT_MTD.1": 28,
          "FMT_MTD.3": 13,
          "FMT_MTD.3.1": 1,
          "FMT_SMF.1": 74,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 28,
          "FMT_SMR.1": 53,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_EMS": 17,
          "FPT_EMS.1": 16,
          "FPT_EMS.1.1": 4,
          "FPT_EMS.1.2": 3,
          "FPT_FLS.1": 15,
          "FPT_FLS.1.1": 1,
          "FPT_PHP.1": 8,
          "FPT_PHP.1.1": 1,
          "FPT_PHP.1.2": 1,
          "FPT_PHP.3": 16,
          "FPT_PHP.3.1": 1,
          "FPT_TST": 1,
          "FPT_TST.1": 22,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FTP": {
          "FTP_ITC": 45,
          "FTP_ITC.1": 13,
          "FTP_TRP.1": 3
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 3
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 62
        },
        "PGP": {
          "PGP": 1
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 7
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 7
          },
          "SHA2": {
            "SHA-224": 1,
            "SHA-256": 3,
            "SHA-384": 1,
            "SHA-512": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "DFA": 2,
          "Malfunction": 4,
          "fault injection": 2,
          "malfunction": 4,
          "physical tampering": 6
        },
        "SCA": {
          "DPA": 1,
          "SPA": 1,
          "physical probing": 3,
          "side channel": 2,
          "timing attacks": 1
        },
        "other": {
          "JIL": 1,
          "JIL-COMP": 1
        }
      },
      "standard_id": {
        "PKCS": {
          "PKCS #1": 1,
          "PKCS#1": 8,
          "PKCS#15": 2,
          "PKCS#3": 2
        },
        "SCP": {
          "SCP02": 1,
          "SCP03": 5
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 8
          }
        },
        "DES": {
          "3DES": {
            "TDES": 1,
            "Triple-DES": 3
          },
          "DES": {
            "DES": 4
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 2,
            "KMAC": 2
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Idemia": {
          "IDEMIA": 20
        },
        "Infineon": {
          "Infineon": 1
        },
        "Morpho": {
          "Morpho": 1
        },
        "Oberthur": {
          "Oberthur Technologies": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Shubham SAGAR",
      "/CreationDate": "D:20200617125534+05\u002730\u0027",
      "/Creator": "Microsoft\u00ae Word 2016",
      "/ModDate": "D:20200617125534+05\u002730\u0027",
      "/Producer": "Microsoft\u00ae Word 2016",
      "/Title": "Title",
      "pdf_file_size_bytes": 2209512,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 99
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0059b_pdf.pdf",
        "pp_name": "Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Version..."
      },
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0071b_pdf.pdf",
        "pp_name": "Protection profiles for secure signature creation device \u2014 Part 4: Extension for device with key gene..."
      },
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": "EAL4+",
        "pp_ids": {
          "_type": "Set",
          "elements": [
            "PP_SSCD_PART3_V1.0.2"
          ]
        },
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0075b_pdf.pdf",
        "pp_name": "Protection profiles for secure signature creation device - Part 3: Device with key import"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2020_59fr.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "AVA_VAN.5",
      "ALC_DVS.2",
      "EAL5"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/anssi-cible-cc-2020-59en.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "07689c589ed31e887d09e1ee09d6e1b5203eef599b7da121860c1290f702619e",
      "txt_hash": "df14e9f077802793836a63e80aa421cbcb61fee35ff575b7cfc7659caf27667a"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "8dec1867d0a4649850f4287d765067f407dc9dcd9293bcc6b9cfb933b35611d2",
      "txt_hash": "6dd1e2fec0a449d882dd6b6be5ec4ab1dcf5d21093550c4579bac55f7c581371"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "b3e81c437b32d2cde805c2f405ee6d8a135d09454db78877252bf3aa369fbb40",
      "txt_hash": "eeaea15d231156b2f3c44aa0b34eef52288a67a20f5fa0d5221193ba947bf5e9"
    }
  },
  "status": "active"
}