ID-One Cosmo v9.1 embedding VITALE application version 2.1.4

CSV information ?

Status active
Valid from 06.09.2022
Valid until 06.09.2027
Scheme 🇫🇷 FR
Manufacturer Idemia
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level AVA_VAN.5, EAL4+, ALC_DVS.2
Protection profiles

Heuristics summary ?

Certificate ID: ANSSI-CC-2022/33

Certificate ?

Extracted keywords

Vendor
IDEMIA

Security level
EAL4, EAL2
Security Assurance Requirements (SAR)
ALC_DVS.2, AVA_VAN.5
Protection profiles
BSI-CC-PP-0059-2009-MA-02, BSI-CC-PP-0075-2012-MA-01, BSI-CC-PP- 0072-2012-MA-01, BSI-CC-PP- 0076-2013-MA-01
Certificates
ANSSI-CC-2022/33
Evaluation facilities
CEA - LETI

File metadata

Title: ANSSI-CC-2022/33
Keywords: code SAAAAR : 41 63 06
Author: DUCLOS Charlene
Creation date: D:20220914162244+02'00'
Modification date: D:20220914162244+02'00'
Pages: 2
Creator: Acrobat PDFMaker 21 pour Word
Producer: Adobe PDF Library 21.11.71

Certification report ?

Extracted keywords

Symmetric Algorithms
DES
Asymmetric Algorithms
Diffie-Hellman
Schemes
MAC

Vendor
Infineon, IDEMIA

Security level
EAL 4, EAL2, EAL7, ITSEC E6 Elevé
Security Assurance Requirements (SAR)
AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_FLR, AVA_VAN.5, AVA_VAN
Protection profiles
BSI-CC-PP-0059-2009-MA-02, BSI-CC-PP-0075-2012-MA-01, BSI-CC-PP-0071-2012-MA-01, BSI-CC-PP-0072-2012-MA-01, BSI-CC-PP-0076-2013-MA-01, BSI-PP-0084-2014, PP-SSCD-Part2, PP-SSCD-Part4, PP-SSCD-Part5, PP-SSCD-Part6, PP-SSCD-Part3
Certificates
BSI-DSZ-CC-1110-V4-2021, ANSSI-CC-2022/33, ANSSI-CC-2019/41, ANSSI-CC-2020/07, ANSSI-CC-2022/33-S01, ANSSI-CC-2020/07-M02
Evaluation facilities
CESTI

Standards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003

File metadata

Title: ANSSI-CC-2022/33
Subject: ID-One Cosmo v9.1 embedding VITALE application
Keywords: [ANSSI Crypto]
Author: qualite@intranet.fr
Creation date: D:20220914161713+02'00'
Modification date: D:20220914161717+02'00'
Pages: 16
Creator: Acrobat PDFMaker 21 pour Word
Producer: Adobe PDF Library 21.11.71

References

Outgoing
  • ANSSI-CC-2019/41 - ID-One Cosmo v8.2 embedding VITALE application (Version 2.0.83)
  • ANSSI-CC-2020/07 - Plateforme ID-One Cosmo V9.1 masquĂ©e sur le composant IFX SLC32
  • BSI-DSZ-CC-1110-V4-2021 - Infineon Security Controller IFX_CCI_000003h, 000005h, 000008h, 00000Ch, 000013h, 000014h, 000015h, 00001Ch, 00001Dh, 000021h, 000022h in the design step H13 and including optional software libraries and dedicated firmware in several versions

Security target ?

Extracted keywords

Symmetric Algorithms
AES, TDES, 3DES, CMAC
Hash functions
SHA-1, SHA-256, SHA-2
Schemes
MAC
Protocols
SSL, PGP
Randomness
RNG
Block cipher modes
CBC

IC data groups
EF.CardAccess
Trusted Execution Environments
SE
Vendor
Infineon, Infineon Technologies AG, Oberthur Technologies, IDEMIA, Idemia, Morpho

Security level
EAL 5+, EAL 6+, EAL4, EAL 4, EAL4 augmented, EAL 4 augmented
Claims
D.VAD, D.RAD, D.SECRET, D.SCD, D.SVD, A.SEC_PERSO, A.CGA, A.SCA, A.CSP, OE, OE.HI_VAD, OE.SEC_PERSO, OE.HID_VAD
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_TDS.1, ADV_FSP.4, ADV_TDS.3, ADV_IMP.1, ADV_FSP.2, ADV_TDS.2, AGD_OPE, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_TAT.1, ALC_CMC.4, ALC_CMS.1, ALC_DVS.1, ALC_LCD.1, ALC_CMS.4, ALC_DEL.1, ATE_COV.2, ATE_FUN.1, ATE_COV.1, ATE_DPT.1, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1, ASE_REQ.2, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FCS_COP.1, FCS_CKM.4, FCS_CKM.1, FCS_COP.1.1, FCS_CKM.4.1, FCS_CKM.1.1, FCS_CKM.2, FDP_DAU, FDP_UIT, FDP_SDI, FDP_RIP.1, FDP_ACC, FDP_ACF, FDP_UCT, FDP_ITC, FDP_SDI.2, FDP_RIP.1.1, FDP_ACC.1, FDP_ACF.1, FDP_UCT.1, FDP_ITC.1, FDP_DAU.2, FDP_UIT.1, FDP_IFC.1, FDP_ITC.2, FIA_API, FIA_API.1, FIA_UAU.1, FIA_UID.1, FIA_AFL.1, FIA_API.1.1, FIA_UID.1.1, FIA_UID.1.2, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.1.1, FIA_UAU.1.2, FMT_SMR.1, FMT_SMF.1, FMT_MOF.1, FMT_MSA, FMT_MSA.2, FMT_MSA.3, FMT_MSA.4, FMT_MTD, FMT_EMS.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1.1, FMT_MOF.1.1, FMT_MSA.1, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.4.1, FMT_MTD.1, FPT_EMS, FPT_EMS.1, FPT_FLS.1, FPT_PHP.1, FPT_PHP.3, FPT_TST.1, FPT_EMS.1.1, FPT_EMS.1.2, FPT_FLS.1.1, FPT_TST, FPT_PHP.1.1, FPT_PHP.1.2, FPT_PHP.3.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FTP_ITC, FTP_ITC.1, FTP_TRP.1
Protection profiles
BSI-CC-PP-0059-2009-MA-, BSI-CC-PP-0075-2012-MA-01, BSI-CC-PP-0071-, BSI-CC-PP-0072-2012-MA-01, BSI-CC-PP-0076-2013-MA-01, BSI-CC-PP-0084-2014, PP-SSCD2, PP-SSCD3, PP-SSCD4, PP-SSCD5, PP-SSCD6
Certificates
BSI-DSZ-CC-1110-V4-2021, ANSSI-CC-2020/07, ANSSI-CC-2020/07-S01, ANSSI-CC-2020/07-M02
Evaluation facilities
CEA-LETI

Side-channel analysis
physical probing, side channel, DPA, SPA, timing attacks, physical tampering, malfunction, DFA, fault injection

Standards
FIPS PUB 180-2, NIST SP 800-90, NIST SP 800-90A, PKCS#1, ISO/IEC 7816-4, ISO/IEC 14443, ISO/IEC 9797-1, ISO/IEC 15408:2005, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004

File metadata

Title: Title
Author: MESTIRI Sarra;Nicolas.LOKIEC@idemia.com
Creation date: D:20220620145955+02'00'
Modification date: D:20220620145955+02'00'
Pages: 93
Creator: Microsoft® Word 2016
Producer: Microsoft® Word 2016

References

Outgoing
  • ANSSI-CC-2020/07 - Plateforme ID-One Cosmo V9.1 masquĂ©e sur le composant IFX SLC32
  • BSI-DSZ-CC-1110-V4-2021 - Infineon Security Controller IFX_CCI_000003h, 000005h, 000008h, 00000Ch, 000013h, 000014h, 000015h, 00001Ch, 00001Dh, 000021h, 000022h in the design step H13 and including optional software libraries and dedicated firmware in several versions

Heuristics ?

Certificate ID: ANSSI-CC-2022/33

Extracted SARs

AGD_PRE.1, ASE_REQ.2, ASE_OBJ.2, AGD_OPE.1, ASE_TSS.1, ALC_CMC.4, ASE_CCL.1, ASE_INT.1, AVA_VAN.5, ALC_DEL.1, ASE_ECD.1, ALC_LCD.1, ALC_TAT.1, ATE_FUN.1, ALC_DVS.2, ATE_DPT.1, ADV_FSP.4, ADV_TDS.3, ASE_SPD.1, ALC_CMS.4, ATE_COV.2, ADV_IMP.1, ADV_ARC.1

Scheme data ?

Product ID-One Cosmo v9.1 embedding VITALE application (version 2.1.4)
Url https://cyber.gouv.fr/produits-certifies/id-one-cosmo-v91-embedding-vitale-application-version-214
Description Le produit évalué est « ID-One Cosmo v9.1 embedding VITALE application, version 2.1.4 », dont le logiciel embarqué est développé par IDEMIA, sur un microcontrôleur développé par INFINEON TECHNOLOGIES AG. Ce produit offre des services de signature électronique (SSCD1) aux travers des applications ADELE, VITALE1 et VITALE2, conformes aux profils de protections listés dans le paragraphe 1.2.1 ci-des
Sponsor IDEMIA
Developer IDEMIA / INFINEON TECHNOLOGIES AG
Cert Id ANSSI-CC-2022/33
Level EAL4+
Expiration Date 6 Septembre 2027
Enhanced
Cert Id ANSSI-CC-2022/33
Certification Date 06/09/2022
Expiration Date 06/09/2027
Category Cartes Ă  puce
Cc Version Critères Communs version 3.1r5
Developer IDEMIA / INFINEON TECHNOLOGIES AG
Sponsor IDEMIA
Evaluation Facility CEA - LETI
Level EAL4+
Protection Profile Protection profiles for secure signature creation device: Part 2 : Device with key generation, v2.01, BSI-CC-PP-0059-2009-MA-02 ; Part 3 : Device with key import, v1.0.2, BSI-CC-PP-0075-2012-MA-01 ; Part 4 : Extension for device with key generation and trusted communication with certificate generation application, v1.0.1, BSI-CC-PP-0071-2012-MA-01 ; Part 5 : Extension for device with key generation and trusted communication with signature creation application, v1.0.1, BSI-CC-PP-0072-2012-MA-01 ; Part 6 : Extension for device with key import and trusted communication with signature creation application, v1.0.4, BSI-CC-PP-0076-2013-MA-01.
Mutual Recognition CCRA SOG-IS
Augmented ALC_DVS.2, AVA_VAN.5
Cert Link https://cyber.gouv.fr/sites/default/files/document_type/Certificat-ANSSI-CC-2022_33_0.pdf

References ?

Updates ?

  • 15.02.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '94f5251f87fedc1be6c51530a6bf65ac01ff4013fcc11df597f0cb4223e45c1f', 'txt_hash': '38837e86cfc1d1be6c18711893cbd375ed346e1936a8a78d411d0d7b3a828600'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '30e7a38603f62f0c714c54a723f741008159977b00c71080ba26e95d9a57cf3f', 'txt_hash': '2e0d0d341a00cf79a6121ff5dd6dabbd5fb9b31a13d891df61a59c389bcbd8a9'}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '5bc86da1ab574ce88fcc8c58e7f5a14ddc424b7f03df246f711dbbe7edd3ff86', 'txt_hash': '92ba5c2102d8f6101cbfad76ecc0285608728ddb0e0402549fa1a7428e6839fc'}}.
    • The following properties were deleted: ['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash'].

    The PDF extraction data was updated.

    • The following values were inserted: {'cert_metadata': {'pdf_file_size_bytes': 148112, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 2, '/Author': 'DUCLOS Charlene', '/Category': '', '/Comments': 'ANSSI-CC-CER-F-14_v14.7', '/Company': 'SGDSN', '/CreationDate': "D:20220914162244+02'00'", '/Creator': 'Acrobat PDFMaker 21 pour Word', '/Keywords': 'code SAAAAR : 41 63 06', '/ModDate': "D:20220914162244+02'00'", '/Producer': 'Adobe PDF Library 21.11.71', '/SourceModified': 'D:20220914142231', '/Title': 'ANSSI-CC-2022/33', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}, 'cert_frontpage': None, 'cert_keywords': {'cc_cert_id': {'FR': {'ANSSI-CC-2022/33': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0059-2009-MA-02': 1, 'BSI-CC-PP-0075-2012-MA-01': 1, 'BSI-CC-PP- 0072-2012-MA-01': 1, 'BSI-CC-PP- 0076-2013-MA-01': 1}}, 'cc_security_level': {'EAL': {'EAL4': 1, 'EAL2': 1}}, 'cc_sar': {'ALC': {'ALC_DVS.2': 1}, 'AVA': {'AVA_VAN.5': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Idemia': {'IDEMIA': 2}}, 'eval_facility': {'CEA-LETI': {'CEA - LETI': 2}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}, 'cert_filename': 'certificat-anssi-cc-2022_33.pdf'}.
    • The report_frontpage property was set to {'FR': {}}.
    • The st_frontpage property was set to None.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1110-V4-2021': 1}}, 'FR': {'__update__': {'ANSSI-CC-2022/33': 2, 'ANSSI-CC-2019/41': 2, 'ANSSI-CC-2020/07': 1}}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1110-V4-2021': 1}}, 'FR': {'__update__': {'ANSSI-CC-2020/07': 4}}}}} data.
  • 13.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1110-V4-2021': 2}}, 'FR': {'__update__': {'ANSSI-CC-2022/33': 4, 'ANSSI-CC-2019/41': 4, 'ANSSI-CC-2020/07': 2}}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1110-V4-2021': 2}}, 'FR': {'__update__': {'ANSSI-CC-2020/07': 8}}}}} data.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__delete__': ['CA']}} data.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__insert__': {'CA': {'7 5 7': 1, '2 0 2': 15, '1 6 1': 1, '1 6 2': 2, '1 6 3': 2}}, '__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1110-V4-2021': 1}}, 'FR': {'__update__': {'ANSSI-CC-2022/33': 2, 'ANSSI-CC-2019/41': 2, 'ANSSI-CC-2020/07': 1}}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1110-V4-2021': 1}}, 'FR': {'__update__': {'ANSSI-CC-2020/07': 4}}}}} data.
  • 05.02.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'description': 'Le produit Ă©valuĂ© est « ID-One Cosmo v9.1 embedding VITALE application, version 2.1.4 », dont le logiciel embarquĂ© est dĂ©veloppĂ© par IDEMIA, sur un microcontrĂ´leur dĂ©veloppĂ© par INFINEON TECHNOLOGIES AG.\nCe produit offre des services de signature Ă©lectronique (SSCD1) aux travers des applications ADELE, VITALE1 et VITALE2, conformes aux profils de protections listĂ©s dans le paragraphe 1.2.1 ci-des'} data.
  • 04.01.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'annotated_references': None}.
    • The scheme_data property was updated, with the {'product': 'ID-One Cosmo v9.1 embedding VITALE application (version 2.1.4)', 'url': 'https://cyber.gouv.fr/produits-certifies/id-one-cosmo-v91-embedding-vitale-application-version-214', 'enhanced': {'__insert__': {'cert_id': 'ANSSI-CC-2022/33', 'sponsor': 'IDEMIA', 'mutual_recognition': 'CCRA\n SOG-IS', 'augmented': 'ALC_DVS.2, AVA_VAN.5'}, '__update__': {'protection_profile': 'Protection profiles for secure signature creation device:\nPart 2 : Device with key generation, v2.01, BSI-CC-PP-0059-2009-MA-02 ;\nPart 3 : Device with key import, v1.0.2, BSI-CC-PP-0075-2012-MA-01 ;\nPart 4 : Extension for device with key generation and trusted communication with certificate generation application, v1.0.1, BSI-CC-PP-0071-2012-MA-01 ;\nPart 5 : Extension for device with key generation and trusted communication with signature creation application, v1.0.1, BSI-CC-PP-0072-2012-MA-01 ;\nPart 6 : Extension for device with key import and trusted communication with signature creation application, v1.0.4, BSI-CC-PP-0076-2013-MA-01.', 'developer': 'IDEMIA / INFINEON TECHNOLOGIES AG', 'evaluation_facility': 'CEA - LETI', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/document_type/Certificat-ANSSI-CC-2022_33_0.pdf'}, '__delete__': ['id', 'augmentations', 'recognition', 'description', 'report_link', 'target_link']}} data.
  • 21.09.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'product': 'ID-One Cosmo v9.1 embedding VITALE application version 2.1.4', 'vendor': 'IDEMIA / INFINEON TECHNOLOGIES AG / IDEMIAIDEMIA / INFINEON TECHNOLOGIES AG / IDEMIA', 'id': '2022/33', 'certification_date': '06/09/2022', 'url': 'https://www.ssi.gouv.fr/certification_cc/id-one-cosmo-v9-1-embedding-vitale-application-version-2-1-4/', 'enhanced': {'__insert__': {'cert_link': 'https://www.ssi.gouv.fr/uploads/2022/09/certificat-anssi-cc-2022_33.pdf'}, '__update__': {'id': '2022/33', 'certification_date': '06/09/2022', 'expiration_date': '06/09/2027', 'protection_profile': 'Protection profiles for secure signature creation device: Part 2 : Device with key generation, v2.0.1, BSI-CC-PP-0059-2009-MA-02 Part 3 : Device with key import, v1.0.2, BSI-CC-PP-0075-2012-MA-01 Part 4 : Extension for device with key generation and trusted communication with certificate generation application, v1.0.1, BSI-CC-PP-0071-2012-MA-01 Part 5 : Extension for device with key generation and trusted communication with signature creation application, v1.0.1, BSI-CC-PP-0072-2012-MA-01 Part 6 : Extension for device with key import and trusted communication with signature creation application, v1.0.4, BSI-CC-PP-0076-2013-MA-01 DĂ©veloppeur(s) / Commanditaires : IDEMIA / INFINEON TECHNOLOGIES AG / IDEMIA', 'developer': 'IDEMIA / INFINEON TECHNOLOGIES AG / IDEMIA / IDEMIA / INFINEON TECHNOLOGIES AG / IDEMIA', 'evaluation_facility': 'CEA – LETI', 'description': 'Descriptif du produit\n\t\t\t\tLe produit Ă©valuĂ© est « ID-One Cosmo v9.1 embedding VITALE application, version 2.1.4 », dont le logiciel embarquĂ© est dĂ©veloppĂ© par IDEMIA, sur un microcontrĂ´leur dĂ©veloppĂ© par INFINEON TECHNOLOGIES AG.\nCe produit offre des services de signature Ă©lectronique (SSCD1) aux travers des applications ADELE, VITALE1 et VITALE2, conformes aux profils de protections listĂ©s dans le paragraphe 1.2.1 ci-dessous.\nCe produit est destinĂ© Ă  ĂŞtre utilisĂ© dans le cadre de l’application SESAM Vitale ainsi que pour des applications de signature Ă©lectronique ; il est livrĂ© en configuration fermĂ©e et ne permet pas le chargement d’application en post-Ă©mission.\n\t\t\t\t\n Rapport de certification\nSecurity target\nCertificat', 'report_link': 'https://www.ssi.gouv.fr/uploads/2022/09/anssi-cc-2022_33.pdf', 'target_link': 'https://www.ssi.gouv.fr/uploads/2022/09/anssi-cible-cc-2022_33en.pdf'}}} data.
  • 18.05.2023 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The following values were removed: {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 5: Extension for device wi...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0072b_pdf.pdf', 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 6: Extension for device with key...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0076b_pdf.pdf', 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 4: Extension for device wi...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0071b_pdf.pdf', 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Ve...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0059b_pdf.pdf', 'pp_ids': None}]}.
    • The following values were added: {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 6: Extension for device with key impo...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0076b_pdf.pdf', 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 4: Extension for device with key gene...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0071b_pdf.pdf', 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Version...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0059b_pdf.pdf', 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 5: Extension for device with key gene...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0072b_pdf.pdf', 'pp_ids': None}]}.
  • 26.04.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'scheme_data': {'product': 'ID-One Cosmo v8.2 embedding VITALE application Version 2.0.83', 'vendor': 'Idemia, NXP Semiconductors GmbHIdemia', 'level': 'EAL4+', 'id': '2019/41', 'certification_date': '25/10/2019', 'category': 'Smart cards', 'url': 'https://www.ssi.gouv.fr/certification_cc/id-one-cosmo-v8-2-embedding-vitale-application-version-2-0-83/', 'enhanced': {'id': '2019/41', 'certification_date': '25/10/2019', 'expiration_date': '25/10/2024', 'category': 'Cartes Ă  puce', 'cc_version': 'Critères Communs version 3.1r5', 'level': 'EAL4+', 'augmentations': 'ALC_DVS.2, AVA_VAN.5', 'protection_profile': 'PP for secure signature creation device (Part 2, 3, 4, 5, 6)', 'developer': 'Idemia, NXP Semiconductors GmbH / Idemia', 'evaluation_facility': 'CEA-LETI', 'recognition': 'SOG-IS - CCRA', 'description': 'Descriptif du produit\n\t\t\t\tLe produit Ă©valuĂ© est la carte Ă  puce « ID-One Cosmo v8.2 embedding VITALE application, Version 2.0.83 », disposant d’une interface contact, dĂ©veloppĂ©e par Idemia et masquĂ©e sur le composant NXP P60D145 dĂ©veloppĂ© par NXP Semiconductors GmbH.\nCe produit offre des services de signature Ă©lectronique (SSCD) aux travers des applications ADELE, VITALE1 et VITALE2, conformes aux profils de protections listĂ©s dans le paragraphe 1.2.1 ci-dessous.\nCe produit est destinĂ© Ă  ĂŞtre utilisĂ© dans le cadre de l’application SESAM Vitale ainsi que pour des applications de signature Ă©lectronique ; il est livrĂ© en configuration fermĂ©e et ne permet pas le chargement d’application en post-issuance.\n\t\t\t\t\n Rapport de certification\nSecurity target', 'report_link': 'https://www.ssi.gouv.fr/uploads/2019/11/anssi-cc-2019_41fr.pdf', 'target_link': 'https://www.ssi.gouv.fr/uploads/2019/11/anssi-cible-cc-2019_41en.pdf'}}}.
  • 11.02.2023 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.cc.CCCertificate.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.InternalState.
    • The following properties were deleted: ['errors'].

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.PdfData.

    The computed heuristics were updated.

    • The following values were inserted: {'direct_transitive_cves': None, 'indirect_transitive_cves': None}.
    • The _type property was set to sec_certs.sample.cc.CCCertificate.Heuristics.
    • The following properties were deleted: ['direct_dependency_cves', 'indirect_dependency_cves'].
  • 26.12.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The report_references property was updated, with the {'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0945-2017']}}} data.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to 30e7a38603f62f0c714c54a723f741008159977b00c71080ba26e95d9a57cf3f.
    • The st_txt_hash property was set to 2e0d0d341a00cf79a6121ff5dd6dabbd5fb9b31a13d891df61a59c389bcbd8a9.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 3279967, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 93, '/Title': 'Title', '/Author': 'MESTIRI Sarra;Nicolas.LOKIEC@idemia.com', '/Creator': 'Microsoft® Word 2016', '/CreationDate': "D:20220620145955+02'00'", '/ModDate': "D:20220620145955+02'00'", '/Producer': 'Microsoft® Word 2016', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1110-V4-2021': 2}, 'FR': {'ANSSI-CC-2020/07': 8, 'ANSSI-CC-2020/07-S01': 1, 'ANSSI-CC-2020/07-M02': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0059-2009-MA-': 1, 'BSI-CC-PP-0075-2012-MA-01': 1, 'BSI-CC-PP-0071-': 1, 'BSI-CC-PP-0072-2012-MA-01': 1, 'BSI-CC-PP-0076-2013-MA-01': 1, 'BSI-CC-PP-0084-2014': 1}, 'other': {'PP-SSCD2': 14, 'PP-SSCD3': 11, 'PP-SSCD4': 12, 'PP-SSCD5': 16, 'PP-SSCD6': 10}}, 'cc_security_level': {'EAL': {'EAL 5+': 1, 'EAL 6+': 1, 'EAL4': 7, 'EAL 4': 1, 'EAL4 augmented': 5, 'EAL 4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 5, 'ADV_FSP.1': 3, 'ADV_TDS.1': 2, 'ADV_FSP.4': 9, 'ADV_TDS.3': 8, 'ADV_IMP.1': 4, 'ADV_FSP.2': 2, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE': 5, 'AGD_PRE': 7, 'AGD_OPE.1': 5, 'AGD_PRE.1': 5}, 'ALC': {'ALC_DVS.2': 8, 'ALC_TAT.1': 3, 'ALC_CMC.4': 1, 'ALC_CMS.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 3, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.2': 3, 'ATE_FUN.1': 6, 'ATE_COV.1': 2, 'ATE_DPT.1': 2}, 'AVA': {'AVA_VAN.5': 8}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 4, 'ASE_INT.1': 5, 'ASE_REQ.1': 2, 'ASE_REQ.2': 2, 'ASE_OBJ.2': 3, 'ASE_SPD.1': 2, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FCS': {'FCS_COP.1': 11, 'FCS_CKM.4': 12, 'FCS_CKM.1': 16, 'FCS_COP.1.1': 1, 'FCS_CKM.4.1': 1, 'FCS_CKM.1.1': 1, 'FCS_CKM.2': 1}, 'FDP': {'FDP_DAU': 8, 'FDP_UIT': 7, 'FDP_SDI': 18, 'FDP_RIP.1': 8, 'FDP_ACC': 48, 'FDP_ACF': 36, 'FDP_UCT': 11, 'FDP_ITC': 10, 'FDP_SDI.2': 4, 'FDP_RIP.1.1': 1, 'FDP_ACC.1': 15, 'FDP_ACF.1': 20, 'FDP_UCT.1': 1, 'FDP_ITC.1': 5, 'FDP_DAU.2': 2, 'FDP_UIT.1': 2, 'FDP_IFC.1': 7, 'FDP_ITC.2': 2}, 'FIA': {'FIA_API': 3, 'FIA_API.1': 13, 'FIA_UAU.1': 15, 'FIA_UID.1': 17, 'FIA_AFL.1': 6, 'FIA_API.1.1': 2, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1}, 'FMT': {'FMT_SMR.1': 22, 'FMT_SMF.1': 20, 'FMT_MOF.1': 8, 'FMT_MSA': 19, 'FMT_MSA.2': 10, 'FMT_MSA.3': 20, 'FMT_MSA.4': 12, 'FMT_MTD': 16, 'FMT_EMS.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SMF.1.1': 1, 'FMT_MOF.1.1': 1, 'FMT_MSA.1': 4, 'FMT_MSA.2.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MSA.4.1': 1, 'FMT_MTD.1': 2}, 'FPT': {'FPT_EMS': 5, 'FPT_EMS.1': 11, 'FPT_FLS.1': 7, 'FPT_PHP.1': 6, 'FPT_PHP.3': 8, 'FPT_TST.1': 12, 'FPT_EMS.1.1': 4, 'FPT_EMS.1.2': 3, 'FPT_FLS.1.1': 1, 'FPT_TST': 1, 'FPT_PHP.1.1': 1, 'FPT_PHP.1.2': 1, 'FPT_PHP.3.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1}, 'FTP': {'FTP_ITC': 39, 'FTP_ITC.1': 14, 'FTP_TRP.1': 2}}, 'cc_claims': {'D': {'D.VAD': 3, 'D.RAD': 3, 'D.SECRET': 3, 'D.SCD': 2, 'D.SVD': 2}, 'A': {'A.SEC_PERSO': 8, 'A.CGA': 6, 'A.SCA': 5, 'A.CSP': 8}, 'OE': {'OE': 1, 'OE.HI_VAD': 2, 'OE.SEC_PERSO': 10, 'OE.HID_VAD': 7}}, 'vendor': {'Infineon': {'Infineon': 7, 'Infineon Technologies AG': 1}, 'Oberthur': {'Oberthur Technologies': 1}, 'Idemia': {'IDEMIA': 117, 'Idemia': 1}, 'Morpho': {'Morpho': 1}}, 'eval_facility': {'CEA-LETI': {'CEA-LETI': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 23}}, 'DES': {'3DES': {'TDES': 18, '3DES': 4}}, 'constructions': {'MAC': {'CMAC': 5}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 5}, 'SHA2': {'SHA-256': 7, 'SHA-2': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 12}}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 1}}, 'PGP': {'PGP': 1}}, 'randomness': {'RNG': {'RNG': 2}}, 'cipher_mode': {'CBC': {'CBC': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 1, 'side channel': 1, 'DPA': 3, 'SPA': 3, 'timing attacks': 2}, 'FI': {'physical tampering': 5, 'malfunction': 1, 'DFA': 1, 'fault injection': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 3}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {'EF': {'EF.CardAccess': 2}}, 'standard_id': {'FIPS': {'FIPS PUB 180-2': 1}, 'NIST': {'NIST SP 800-90': 4, 'NIST SP 800-90A': 1}, 'PKCS': {'PKCS#1': 6}, 'ISO': {'ISO/IEC 7816-4': 1, 'ISO/IEC 14443': 2, 'ISO/IEC 9797-1': 1, 'ISO/IEC 15408:2005': 2}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {'javacard': {'javacard.framework': 1}}, 'certification_process': {}}.
    • The st_filename property was set to anssi-cible-cc-2022_33en.pdf.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1110-V4-2021', 'ANSSI-CC-2020/07']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1110-V2-2019', 'BSI-DSZ-CC-1110-V4-2021', 'ANSSI-CC-2020/07']}} data.
    • The report_references property was updated, with the {'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-2012', 'BSI-DSZ-CC-0891-2015', 'BSI-DSZ-CC-0891-V2-2016']}}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]} values added.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/anssi-cible-cc-2022_33en.pdf, code: 408'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The report_references property was updated, with the {'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0945-V2-2018']}}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]} values discarded.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to 30e7a38603f62f0c714c54a723f741008159977b00c71080ba26e95d9a57cf3f.
    • The st_txt_hash property was set to 2e0d0d341a00cf79a6121ff5dd6dabbd5fb9b31a13d891df61a59c389bcbd8a9.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 3279967, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 93, '/Title': 'Title', '/Author': 'MESTIRI Sarra;Nicolas.LOKIEC@idemia.com', '/Creator': 'Microsoft® Word 2016', '/CreationDate': "D:20220620145955+02'00'", '/ModDate': "D:20220620145955+02'00'", '/Producer': 'Microsoft® Word 2016', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1110-V4-2021': 2}, 'FR': {'ANSSI-CC-2020/07': 8, 'ANSSI-CC-2020/07-S01': 1, 'ANSSI-CC-2020/07-M02': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0059-2009-MA-': 1, 'BSI-CC-PP-0075-2012-MA-01': 1, 'BSI-CC-PP-0071-': 1, 'BSI-CC-PP-0072-2012-MA-01': 1, 'BSI-CC-PP-0076-2013-MA-01': 1, 'BSI-CC-PP-0084-2014': 1}, 'other': {'PP-SSCD2': 14, 'PP-SSCD3': 11, 'PP-SSCD4': 12, 'PP-SSCD5': 16, 'PP-SSCD6': 10}}, 'cc_security_level': {'EAL': {'EAL 5+': 1, 'EAL 6+': 1, 'EAL4': 7, 'EAL 4': 1, 'EAL4 augmented': 5, 'EAL 4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 5, 'ADV_FSP.1': 3, 'ADV_TDS.1': 2, 'ADV_FSP.4': 9, 'ADV_TDS.3': 8, 'ADV_IMP.1': 4, 'ADV_FSP.2': 2, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE': 5, 'AGD_PRE': 7, 'AGD_OPE.1': 5, 'AGD_PRE.1': 5}, 'ALC': {'ALC_DVS.2': 8, 'ALC_TAT.1': 3, 'ALC_CMC.4': 1, 'ALC_CMS.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 3, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.2': 3, 'ATE_FUN.1': 6, 'ATE_COV.1': 2, 'ATE_DPT.1': 2}, 'AVA': {'AVA_VAN.5': 8}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 4, 'ASE_INT.1': 5, 'ASE_REQ.1': 2, 'ASE_REQ.2': 2, 'ASE_OBJ.2': 3, 'ASE_SPD.1': 2, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FCS': {'FCS_COP.1': 11, 'FCS_CKM.4': 12, 'FCS_CKM.1': 16, 'FCS_COP.1.1': 1, 'FCS_CKM.4.1': 1, 'FCS_CKM.1.1': 1, 'FCS_CKM.2': 1}, 'FDP': {'FDP_DAU': 8, 'FDP_UIT': 7, 'FDP_SDI': 18, 'FDP_RIP.1': 8, 'FDP_ACC': 48, 'FDP_ACF': 36, 'FDP_UCT': 11, 'FDP_ITC': 10, 'FDP_SDI.2': 4, 'FDP_RIP.1.1': 1, 'FDP_ACC.1': 15, 'FDP_ACF.1': 20, 'FDP_UCT.1': 1, 'FDP_ITC.1': 5, 'FDP_DAU.2': 2, 'FDP_UIT.1': 2, 'FDP_IFC.1': 7, 'FDP_ITC.2': 2}, 'FIA': {'FIA_API': 3, 'FIA_API.1': 13, 'FIA_UAU.1': 15, 'FIA_UID.1': 17, 'FIA_AFL.1': 6, 'FIA_API.1.1': 2, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1}, 'FMT': {'FMT_SMR.1': 22, 'FMT_SMF.1': 20, 'FMT_MOF.1': 8, 'FMT_MSA': 19, 'FMT_MSA.2': 10, 'FMT_MSA.3': 20, 'FMT_MSA.4': 12, 'FMT_MTD': 16, 'FMT_EMS.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SMF.1.1': 1, 'FMT_MOF.1.1': 1, 'FMT_MSA.1': 4, 'FMT_MSA.2.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MSA.4.1': 1, 'FMT_MTD.1': 2}, 'FPT': {'FPT_EMS': 5, 'FPT_EMS.1': 11, 'FPT_FLS.1': 7, 'FPT_PHP.1': 6, 'FPT_PHP.3': 8, 'FPT_TST.1': 12, 'FPT_EMS.1.1': 4, 'FPT_EMS.1.2': 3, 'FPT_FLS.1.1': 1, 'FPT_TST': 1, 'FPT_PHP.1.1': 1, 'FPT_PHP.1.2': 1, 'FPT_PHP.3.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1}, 'FTP': {'FTP_ITC': 39, 'FTP_ITC.1': 14, 'FTP_TRP.1': 2}}, 'cc_claims': {'D': {'D.VAD': 3, 'D.RAD': 3, 'D.SECRET': 3, 'D.SCD': 2, 'D.SVD': 2}, 'A': {'A.SEC_PERSO': 8, 'A.CGA': 6, 'A.SCA': 5, 'A.CSP': 8}, 'OE': {'OE': 1, 'OE.HI_VAD': 2, 'OE.SEC_PERSO': 10, 'OE.HID_VAD': 7}}, 'vendor': {'Infineon': {'Infineon': 7, 'Infineon Technologies AG': 1}, 'Oberthur': {'Oberthur Technologies': 1}, 'Idemia': {'IDEMIA': 117, 'Idemia': 1}, 'Morpho': {'Morpho': 1}}, 'eval_facility': {'CEA-LETI': {'CEA-LETI': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 23}}, 'DES': {'3DES': {'TDES': 18, '3DES': 4}}, 'constructions': {'MAC': {'CMAC': 5}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 5}, 'SHA2': {'SHA-256': 7, 'SHA-2': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 12}}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 1}}, 'PGP': {'PGP': 1}}, 'randomness': {'RNG': {'RNG': 2}}, 'cipher_mode': {'CBC': {'CBC': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 1, 'side channel': 1, 'DPA': 3, 'SPA': 3, 'timing attacks': 2}, 'FI': {'physical tampering': 5, 'malfunction': 1, 'DFA': 1, 'fault injection': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 3}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {'EF': {'EF.CardAccess': 2}}, 'standard_id': {'FIPS': {'FIPS PUB 180-2': 1}, 'NIST': {'NIST SP 800-90': 4, 'NIST SP 800-90A': 1}, 'PKCS': {'PKCS#1': 6}, 'ISO': {'ISO/IEC 7816-4': 1, 'ISO/IEC 14443': 2, 'ISO/IEC 9797-1': 1, 'ISO/IEC 15408:2005': 2}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {'javacard': {'javacard.framework': 1}}, 'certification_process': {}}.
    • The st_filename property was set to anssi-cible-cc-2022_33en.pdf.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1110-V4-2021', 'ANSSI-CC-2020/07']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1110-V2-2019', 'BSI-DSZ-CC-1110-V4-2021', 'ANSSI-CC-2020/07']}} data.
    • The report_references property was updated, with the {'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0945-V3-2018']}}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]} values added.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The cert_link was updated.

    • The new value is https://www.commoncriteriaportal.org/files/epfiles/certificat-anssi-cc-2022_33.pdf.

    The manufacturer_web was updated.

    • The new value is https://www.idemia.com.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 5: Extension for device wi...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0072b_pdf.pdf', 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 3: Device with key import', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0075b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['PP_SSCD_PART3_V1.0.2']}}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 4: Extension for device wi...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0071b_pdf.pdf', 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Ve...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0059b_pdf.pdf', 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 6: Extension for device with key...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0076b_pdf.pdf', 'pp_ids': None}]}.

    The computed heuristics were updated.

    • The report_references property was updated, with the {'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0945-2017', 'BSI-DSZ-CC-0782-2012', 'BSI-DSZ-CC-0891-2015', 'BSI-DSZ-CC-0945-V2-2018', 'BSI-DSZ-CC-0891-V2-2016', 'BSI-DSZ-CC-0945-V3-2018']}}} data.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The cert_link was updated.

    • The new value is None.

    The manufacturer_web was updated.

    • The new value is None.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'PP_SSCD_PART2_V1.03', 'pp_eal': None, 'pp_link': None, 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'P_SSCD_PART4_V1.0.1', 'pp_eal': None, 'pp_link': None, 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'PP_SSCD_PART3_V1.0.2', 'pp_eal': None, 'pp_link': None, 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'PP_SSCD_PART6_V1.0.4', 'pp_eal': None, 'pp_link': None, 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'PP_SSCD_PART5_V1.0.1', 'pp_eal': None, 'pp_link': None, 'pp_ids': None}]}.

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/anssi-cible-cc-2022_33en.pdf, code: nok'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The report_references property was updated, with the {'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/49', 'BSI-DSZ-CC-1110-V3-2020']}}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]} values discarded.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The report_references property was updated, with the {'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/49', 'BSI-DSZ-CC-1110-V3-2020']}, '__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0973-V2-2016', 'BSI-DSZ-CC-0973-2016']}}} data.
  • 22.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to 30e7a38603f62f0c714c54a723f741008159977b00c71080ba26e95d9a57cf3f.
    • The st_txt_hash property was set to 2e0d0d341a00cf79a6121ff5dd6dabbd5fb9b31a13d891df61a59c389bcbd8a9.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 3279967, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 93, '/Title': 'Title', '/Author': 'MESTIRI Sarra;Nicolas.LOKIEC@idemia.com', '/Creator': 'Microsoft® Word 2016', '/CreationDate': "D:20220620145955+02'00'", '/ModDate': "D:20220620145955+02'00'", '/Producer': 'Microsoft® Word 2016', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1110-V4-2021': 2}, 'FR': {'ANSSI-CC-2020/07': 8, 'ANSSI-CC-2020/07-S01': 1, 'ANSSI-CC-2020/07-M02': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0059-2009-MA-': 1, 'BSI-CC-PP-0075-2012-MA-01': 1, 'BSI-CC-PP-0071-': 1, 'BSI-CC-PP-0072-2012-MA-01': 1, 'BSI-CC-PP-0076-2013-MA-01': 1, 'BSI-CC-PP-0084-2014': 1}, 'other': {'PP-SSCD2': 14, 'PP-SSCD3': 11, 'PP-SSCD4': 12, 'PP-SSCD5': 16, 'PP-SSCD6': 10}}, 'cc_security_level': {'EAL': {'EAL 5+': 1, 'EAL 6+': 1, 'EAL4': 7, 'EAL 4': 1, 'EAL4 augmented': 5, 'EAL 4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 5, 'ADV_FSP.1': 3, 'ADV_TDS.1': 2, 'ADV_FSP.4': 9, 'ADV_TDS.3': 8, 'ADV_IMP.1': 4, 'ADV_FSP.2': 2, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE': 5, 'AGD_PRE': 7, 'AGD_OPE.1': 5, 'AGD_PRE.1': 5}, 'ALC': {'ALC_DVS.2': 8, 'ALC_TAT.1': 3, 'ALC_CMC.4': 1, 'ALC_CMS.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 3, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.2': 3, 'ATE_FUN.1': 6, 'ATE_COV.1': 2, 'ATE_DPT.1': 2}, 'AVA': {'AVA_VAN.5': 8}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 4, 'ASE_INT.1': 5, 'ASE_REQ.1': 2, 'ASE_REQ.2': 2, 'ASE_OBJ.2': 3, 'ASE_SPD.1': 2, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FCS': {'FCS_COP.1': 11, 'FCS_CKM.4': 12, 'FCS_CKM.1': 16, 'FCS_COP.1.1': 1, 'FCS_CKM.4.1': 1, 'FCS_CKM.1.1': 1, 'FCS_CKM.2': 1}, 'FDP': {'FDP_DAU': 8, 'FDP_UIT': 7, 'FDP_SDI': 18, 'FDP_RIP.1': 8, 'FDP_ACC': 48, 'FDP_ACF': 36, 'FDP_UCT': 11, 'FDP_ITC': 10, 'FDP_SDI.2': 4, 'FDP_RIP.1.1': 1, 'FDP_ACC.1': 15, 'FDP_ACF.1': 20, 'FDP_UCT.1': 1, 'FDP_ITC.1': 5, 'FDP_DAU.2': 2, 'FDP_UIT.1': 2, 'FDP_IFC.1': 7, 'FDP_ITC.2': 2}, 'FIA': {'FIA_API': 3, 'FIA_API.1': 13, 'FIA_UAU.1': 15, 'FIA_UID.1': 17, 'FIA_AFL.1': 6, 'FIA_API.1.1': 2, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1}, 'FMT': {'FMT_SMR.1': 22, 'FMT_SMF.1': 20, 'FMT_MOF.1': 8, 'FMT_MSA': 19, 'FMT_MSA.2': 10, 'FMT_MSA.3': 20, 'FMT_MSA.4': 12, 'FMT_MTD': 16, 'FMT_EMS.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SMF.1.1': 1, 'FMT_MOF.1.1': 1, 'FMT_MSA.1': 4, 'FMT_MSA.2.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MSA.4.1': 1, 'FMT_MTD.1': 2}, 'FPT': {'FPT_EMS': 5, 'FPT_EMS.1': 11, 'FPT_FLS.1': 7, 'FPT_PHP.1': 6, 'FPT_PHP.3': 8, 'FPT_TST.1': 12, 'FPT_EMS.1.1': 4, 'FPT_EMS.1.2': 3, 'FPT_FLS.1.1': 1, 'FPT_TST': 1, 'FPT_PHP.1.1': 1, 'FPT_PHP.1.2': 1, 'FPT_PHP.3.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1}, 'FTP': {'FTP_ITC': 39, 'FTP_ITC.1': 14, 'FTP_TRP.1': 2}}, 'cc_claims': {'D': {'D.VAD': 3, 'D.RAD': 3, 'D.SECRET': 3, 'D.SCD': 2, 'D.SVD': 2}, 'A': {'A.SEC_PERSO': 8, 'A.CGA': 6, 'A.SCA': 5, 'A.CSP': 8}, 'OE': {'OE': 1, 'OE.HI_VAD': 2, 'OE.SEC_PERSO': 10, 'OE.HID_VAD': 7}}, 'vendor': {'Infineon': {'Infineon': 7, 'Infineon Technologies AG': 1}, 'Oberthur': {'Oberthur Technologies': 1}, 'Idemia': {'IDEMIA': 117, 'Idemia': 1}, 'Morpho': {'Morpho': 1}}, 'eval_facility': {'CEA-LETI': {'CEA-LETI': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 23}}, 'DES': {'3DES': {'TDES': 18, '3DES': 4}}, 'constructions': {'MAC': {'CMAC': 5}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 5}, 'SHA2': {'SHA-256': 7, 'SHA-2': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 12}}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 1}}, 'PGP': {'PGP': 1}}, 'randomness': {'RNG': {'RNG': 2}}, 'cipher_mode': {'CBC': {'CBC': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 1, 'side channel': 1, 'DPA': 3, 'SPA': 3, 'timing attacks': 2}, 'FI': {'physical tampering': 5, 'malfunction': 1, 'DFA': 1, 'fault injection': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 3}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {'EF': {'EF.CardAccess': 2}}, 'standard_id': {'FIPS': {'FIPS PUB 180-2': 1}, 'NIST': {'NIST SP 800-90': 4, 'NIST SP 800-90A': 1}, 'PKCS': {'PKCS#1': 6}, 'ISO': {'ISO/IEC 7816-4': 1, 'ISO/IEC 14443': 2, 'ISO/IEC 9797-1': 1, 'ISO/IEC 15408:2005': 2}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {'javacard': {'javacard.framework': 1}}, 'certification_process': {}}.
    • The st_filename property was set to anssi-cible-cc-2022_33en.pdf.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1110-V4-2021', 'ANSSI-CC-2020/07']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1110-V2-2019', 'BSI-DSZ-CC-1110-V4-2021', 'ANSSI-CC-2020/07']}} data.
    • The report_references property was updated, with the {'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-2012', 'BSI-DSZ-CC-0891-2015']}}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]} values added.
  • 21.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/anssi-cible-cc-2022_33en.pdf, code: nok'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The report_references property was updated, with the {'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-2012', 'BSI-DSZ-CC-0973-V2-2016', 'BSI-DSZ-CC-0973-2016', 'BSI-DSZ-CC-0891-2015']}}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]} values discarded.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 5: Extension for device wi...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0072b_pdf.pdf', 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 3: Device with key import', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0075b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['PP_SSCD_PART3_V1.0.2']}}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 4: Extension for device wi...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0071b_pdf.pdf', 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Ve...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0059b_pdf.pdf', 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 6: Extension for device with key...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0076b_pdf.pdf', 'pp_ids': None}]}.

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.
  • 04.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Ve...', 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/pp0059b_pdf.pdf', 'pp_link': None, 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 3: Device with key import', 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/pp0075b_pdf.pdf', 'pp_link': None, 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 4: Extension for device wi...', 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/pp0071b_pdf.pdf', 'pp_link': None, 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 6: Extension for device with key...', 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/pp0076b_pdf.pdf', 'pp_link': None, 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 5: Extension for device wi...', 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/pp0072b_pdf.pdf', 'pp_link': None, 'pp_ids': None}]}.
  • 28.09.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/07-S01', 'ANSSI-CC-2020/07-M02']}}, 'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/07-S01', 'ANSSI-CC-2020/07-M02']}}} data.
    • The report_references property was updated, with the {'directly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2022/33-S01', 'ANSSI-CC-2020/07-M02']}}, 'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2022/33-S01', 'ANSSI-CC-2020/07-M02']}}} data.
  • 26.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The st_keywords property was updated, with the {'crypto_protocol': {'__insert__': {'PGP': {'PGP': 1}}}} data.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': 'anssi-cc-2022_33.pdf', 'st_filename': 'anssi-cible-cc-2022_33en.pdf'}.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'FR': {'__insert__': {'ANSSI-CC-2020/07': 2}}}}, 'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL2': 2}}}}, 'cc_sar': {'__update__': {'ALC': {'__insert__': {'ALC_FLR': 1}}}}, 'eval_facility': {'__update__': {'CESTI': {'__update__': {'CESTI': 3}}}}, 'symmetric_crypto': {'__update__': {'DES': {'__update__': {'DES': {'__update__': {'DES': 1}}}}}, '__delete__': ['AES_competition']}, 'standard_id': {'__update__': {'CC': {'__insert__': {'CCMB-2017-04-003': 1}}}}} data.
    • The st_keywords property was updated, with the {'cc_security_level': {'__update__': {'EAL': {'__insert__': {'EAL 5+': 1}, '__update__': {'EAL4 augmented': 5}}}}, 'cc_sar': {'__update__': {'ADV': {'__update__': {'ADV_FSP.4': 9, 'ADV_IMP.1': 4}}, 'ALC': {'__update__': {'ALC_DVS.2': 8, 'ALC_CMS.4': 1}}, 'ATE': {'__update__': {'ATE_FUN.1': 6, 'ATE_DPT.1': 2}, '__delete__': ['ATE_IND.2']}, 'AVA': {'__update__': {'AVA_VAN.5': 8}}, 'ASE': {'__update__': {'ASE_ECD.1': 4, 'ASE_REQ.2': 2, 'ASE_SPD.1': 2}}}}, 'cc_sfr': {'__update__': {'FCS': {'__update__': {'FCS_CKM.1': 16}}, 'FDP': {'__insert__': {'FDP_DAU': 8, 'FDP_UIT': 7, 'FDP_SDI': 18, 'FDP_ACC': 48, 'FDP_ACF': 36, 'FDP_UCT': 11, 'FDP_ITC': 10, 'FDP_SDI.2': 4, 'FDP_UCT.1': 1, 'FDP_DAU.2': 2, 'FDP_UIT.1': 2}, '__update__': {'FDP_ACC.1': 15, 'FDP_ACF.1': 20, 'FDP_ITC.1': 5}}, 'FIA': {'__update__': {'FIA_API.1': 13, 'FIA_UAU.1': 15}}, 'FMT': {'__insert__': {'FMT_MSA': 19, 'FMT_MTD': 16, 'FMT_MTD.1': 2}, '__update__': {'FMT_SMR.1': 22, 'FMT_MSA.4': 12, 'FMT_MSA.1': 4}}, 'FPT': {'__update__': {'FPT_EMS': 5, 'FPT_EMS.1.1': 4}}, 'FTP': {'__insert__': {'FTP_ITC': 39}, '__update__': {'FTP_ITC.1': 14}}}}, 'cc_claims': {'__update__': {'OE': {'__insert__': {'OE': 1}}}}, 'vendor': {'__update__': {'Infineon': {'__insert__': {'Infineon Technologies AG': 1}, '__update__': {'Infineon': 7}, '__delete__': ['Infineon Technologies']}, 'Idemia': {'__update__': {'IDEMIA': 117, 'Idemia': 1}}, 'Morpho': {'__update__': {'Morpho': 1}}}}, 'symmetric_crypto': {'__update__': {'AES_competition': {'__update__': {'AES': {'__update__': {'AES': 23}}}, '__delete__': ['E2']}, 'DES': {'__delete__': ['DES']}}}, 'crypto_scheme': {'__update__': {'MAC': {'__update__': {'MAC': 12}}}}, 'cipher_mode': {'__update__': {'CBC': {'__update__': {'CBC': 1}}}}, 'side_channel_analysis': {'__update__': {'FI': {'__insert__': {'malfunction': 1}}}}, 'tee_name': {'__update__': {'IBM': {'__update__': {'SE': 3}}}}, 'standard_id': {'__update__': {'ISO': {'__insert__': {'ISO/IEC 7816-4': 1}}}}, 'javacard_packages': {'javacard': {'javacard.framework': 1}}} data.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/07-S01', 'BSI-DSZ-CC-1110-V4-2021', 'ANSSI-CC-2020/07', 'ANSSI-CC-2020/07-M02']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1110-V2-2019', 'BSI-DSZ-CC-1110-V4-2021', 'ANSSI-CC-2020/07-M02', 'ANSSI-CC-2020/07-S01', 'ANSSI-CC-2020/07']}} data.
    • The report_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2019/41', 'BSI-DSZ-CC-1110-V4-2021', 'ANSSI-CC-2022/33-S01', 'ANSSI-CC-2020/07-M02', 'ANSSI-CC-2020/07']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1110-V2-2019', 'BSI-DSZ-CC-0973-V2-2016', 'BSI-DSZ-CC-0945-V3-2018', 'BSI-DSZ-CC-1110-2019', 'BSI-DSZ-CC-0782-2012', 'BSI-DSZ-CC-0891-2015', 'ANSSI-CC-2017/49', 'BSI-DSZ-CC-1059-2018', 'BSI-DSZ-CC-0891-V2-2016', 'BSI-DSZ-CC-0945-2017', 'ANSSI-CC-2019/41', 'ANSSI-CC-2022/33-S01', 'ANSSI-CC-2020/07', 'BSI-DSZ-CC-1110-V4-2021', 'BSI-DSZ-CC-1110-V3-2020', 'BSI-DSZ-CC-0973-2016', 'ANSSI-CC-2019/28', 'ANSSI-CC-2020/07-M02', 'BSI-DSZ-CC-0945-V2-2018']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}]} values discarded.
  • 22.09.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name ID-One Cosmo v9.1 embedding VITALE application version 2.1.4 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/files/epfiles/certificat-anssi-cc-2022_33.pdf",
  "dgst": "f96bfb09bb1bd640",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2022/33",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "2.1.4",
        "9.1"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2019/41",
          "ANSSI-CC-2020/07",
          "BSI-DSZ-CC-1110-V4-2021"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0945-2017",
          "BSI-DSZ-CC-1110-2019",
          "ANSSI-CC-2017/49",
          "BSI-DSZ-CC-1110-V3-2020",
          "ANSSI-CC-2019/41",
          "BSI-DSZ-CC-0973-2016",
          "BSI-DSZ-CC-0973-V2-2016",
          "BSI-DSZ-CC-1110-V4-2021",
          "BSI-DSZ-CC-1110-V2-2019",
          "ANSSI-CC-2019/28",
          "BSI-DSZ-CC-0945-V3-2018",
          "BSI-DSZ-CC-0945-V2-2018",
          "BSI-DSZ-CC-0891-2015",
          "BSI-DSZ-CC-0782-2012",
          "ANSSI-CC-2020/07",
          "BSI-DSZ-CC-0891-V2-2016",
          "BSI-DSZ-CC-1059-2018"
        ]
      }
    },
    "scheme_data": {
      "cert_id": "ANSSI-CC-2022/33",
      "description": "Le produit \u00e9valu\u00e9 est \u00ab ID-One Cosmo v9.1 embedding VITALE application, version 2.1.4 \u00bb, dont le logiciel embarqu\u00e9 est d\u00e9velopp\u00e9 par IDEMIA, sur un microcontr\u00f4leur d\u00e9velopp\u00e9 par INFINEON TECHNOLOGIES AG.\nCe produit offre des services de signature \u00e9lectronique (SSCD1) aux travers des applications ADELE, VITALE1 et VITALE2, conformes aux profils de protections list\u00e9s dans le paragraphe 1.2.1 ci-des",
      "developer": "IDEMIA / INFINEON TECHNOLOGIES AG",
      "enhanced": {
        "augmented": "ALC_DVS.2, AVA_VAN.5",
        "category": "Cartes \u00e0 puce",
        "cc_version": "Crit\u00e8res Communs version 3.1r5",
        "cert_id": "ANSSI-CC-2022/33",
        "cert_link": "https://cyber.gouv.fr/sites/default/files/document_type/Certificat-ANSSI-CC-2022_33_0.pdf",
        "certification_date": "06/09/2022",
        "developer": "IDEMIA / INFINEON TECHNOLOGIES AG",
        "evaluation_facility": "CEA - LETI",
        "expiration_date": "06/09/2027",
        "level": "EAL4+",
        "mutual_recognition": "CCRA\n                          SOG-IS",
        "protection_profile": "Protection profiles for secure signature creation device:\nPart 2 : Device with key generation, v2.01, BSI-CC-PP-0059-2009-MA-02 ;\nPart 3 : Device with key import, v1.0.2, BSI-CC-PP-0075-2012-MA-01 ;\nPart 4 : Extension for device with key generation and trusted communication with certificate generation application, v1.0.1, BSI-CC-PP-0071-2012-MA-01 ;\nPart 5 : Extension for device with key generation and trusted communication with signature creation application, v1.0.1, BSI-CC-PP-0072-2012-MA-01 ;\nPart 6 : Extension for device with key import and trusted communication with signature creation application, v1.0.4, BSI-CC-PP-0076-2013-MA-01.",
        "sponsor": "IDEMIA"
      },
      "expiration_date": "6 Septembre 2027",
      "level": "EAL4+",
      "product": "ID-One Cosmo v9.1 embedding VITALE application (version 2.1.4)",
      "sponsor": "IDEMIA",
      "url": "https://cyber.gouv.fr/produits-certifies/id-one-cosmo-v91-embedding-vitale-application-version-214"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2020/07",
          "BSI-DSZ-CC-1110-V4-2021"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2020/07",
          "BSI-DSZ-CC-1110-V4-2021",
          "BSI-DSZ-CC-1110-V2-2019"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Idemia",
  "manufacturer_web": "https://www.idemia.com",
  "name": "ID-One Cosmo v9.1 embedding VITALE application version 2.1.4",
  "not_valid_after": "2027-09-06",
  "not_valid_before": "2022-09-06",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "certificat-anssi-cc-2022_33.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2022/33": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP- 0072-2012-MA-01": 1,
          "BSI-CC-PP- 0076-2013-MA-01": 1,
          "BSI-CC-PP-0059-2009-MA-02": 1,
          "BSI-CC-PP-0075-2012-MA-01": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_DVS.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 1,
          "EAL4": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "CEA-LETI": {
          "CEA - LETI": 2
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Idemia": {
          "IDEMIA": 2
        }
      },
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "DUCLOS Charlene",
      "/Category": "",
      "/Comments": "ANSSI-CC-CER-F-14_v14.7",
      "/Company": "SGDSN",
      "/CreationDate": "D:20220914162244+02\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 21 pour Word",
      "/Keywords": "code SAAAAR : 41 63 06",
      "/ModDate": "D:20220914162244+02\u002700\u0027",
      "/Producer": "Adobe PDF Library 21.11.71",
      "/SourceModified": "D:20220914142231",
      "/Title": "ANSSI-CC-2022/33",
      "pdf_file_size_bytes": 148112,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 2
    },
    "report_filename": "anssi-cc-2022_33.pdf",
    "report_frontpage": {
      "FR": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "FF": {
          "DH": {
            "Diffie-Hellman": 1
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1110-V4-2021": 1
        },
        "FR": {
          "ANSSI-CC-2019/41": 2,
          "ANSSI-CC-2020/07": 1,
          "ANSSI-CC-2020/07-M02": 1,
          "ANSSI-CC-2022/33": 2,
          "ANSSI-CC-2022/33-S01": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0059-2009-MA-02": 2,
          "BSI-CC-PP-0071-2012-MA-01": 2,
          "BSI-CC-PP-0072-2012-MA-01": 2,
          "BSI-CC-PP-0075-2012-MA-01": 2,
          "BSI-CC-PP-0076-2013-MA-01": 2,
          "BSI-PP-0084-2014": 1
        },
        "other": {
          "PP-SSCD-Part2": 2,
          "PP-SSCD-Part3": 1,
          "PP-SSCD-Part4": 2,
          "PP-SSCD-Part5": 2,
          "PP-SSCD-Part6": 2
        }
      },
      "cc_sar": {
        "AGD": {
          "AGD_OPE": 4,
          "AGD_PRE": 4
        },
        "ALC": {
          "ALC_DVS.2": 1,
          "ALC_FLR": 1
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 1,
          "EAL2": 2,
          "EAL7": 1
        },
        "ITSEC": {
          "ITSEC E6 Elev\u00e9": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "CESTI": {
          "CESTI": 3
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Idemia": {
          "IDEMIA": 11
        },
        "Infineon": {
          "Infineon": 1
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "qualite@intranet.fr",
      "/Category": "version 2.1.4",
      "/Comments": "ANSSI-CC-CER-F-07_v31.2",
      "/Company": "IDEMIA",
      "/CreationDate": "D:20220914161713+02\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 21 pour Word",
      "/Keywords": "[ANSSI Crypto]",
      "/ModDate": "D:20220914161717+02\u002700\u0027",
      "/Producer": "Adobe PDF Library 21.11.71",
      "/SourceModified": "D:20220914141654",
      "/Subject": "ID-One Cosmo v9.1 embedding VITALE application",
      "/Title": "ANSSI-CC-2022/33",
      "pdf_file_size_bytes": 412202,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.sogis.eu/",
          "http://www.ssi.gouv.fr/",
          "http://www.commoncriteriaportal.org/",
          "mailto:certification@ssi.gouv.fr"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 16
    },
    "st_filename": "anssi-cible-cc-2022_33en.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1110-V4-2021": 1
        },
        "FR": {
          "ANSSI-CC-2020/07": 4,
          "ANSSI-CC-2020/07-M02": 1,
          "ANSSI-CC-2020/07-S01": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.CGA": 6,
          "A.CSP": 8,
          "A.SCA": 5,
          "A.SEC_PERSO": 8
        },
        "D": {
          "D.RAD": 3,
          "D.SCD": 2,
          "D.SECRET": 3,
          "D.SVD": 2,
          "D.VAD": 3
        },
        "OE": {
          "OE": 1,
          "OE.HID_VAD": 7,
          "OE.HI_VAD": 2,
          "OE.SEC_PERSO": 10
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0059-2009-MA-": 1,
          "BSI-CC-PP-0071-": 1,
          "BSI-CC-PP-0072-2012-MA-01": 1,
          "BSI-CC-PP-0075-2012-MA-01": 1,
          "BSI-CC-PP-0076-2013-MA-01": 1,
          "BSI-CC-PP-0084-2014": 1
        },
        "other": {
          "PP-SSCD2": 14,
          "PP-SSCD3": 11,
          "PP-SSCD4": 12,
          "PP-SSCD5": 16,
          "PP-SSCD6": 10
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 5,
          "ADV_FSP.1": 3,
          "ADV_FSP.2": 2,
          "ADV_FSP.4": 9,
          "ADV_IMP.1": 4,
          "ADV_TDS.1": 2,
          "ADV_TDS.2": 1,
          "ADV_TDS.3": 8
        },
        "AGD": {
          "AGD_OPE": 5,
          "AGD_OPE.1": 5,
          "AGD_PRE": 7,
          "AGD_PRE.1": 5
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.1": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 1,
          "ALC_DVS.2": 8,
          "ALC_LCD.1": 3,
          "ALC_TAT.1": 3
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 4,
          "ASE_INT.1": 5,
          "ASE_OBJ.2": 3,
          "ASE_REQ.1": 2,
          "ASE_REQ.2": 2,
          "ASE_SPD.1": 2,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.1": 2,
          "ATE_COV.2": 3,
          "ATE_DPT.1": 2,
          "ATE_FUN.1": 6
        },
        "AVA": {
          "AVA_VAN.5": 8
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 1,
          "EAL 4 augmented": 1,
          "EAL 5+": 1,
          "EAL 6+": 1,
          "EAL4": 7,
          "EAL4 augmented": 5
        }
      },
      "cc_sfr": {
        "FCS": {
          "FCS_CKM.1": 16,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 1,
          "FCS_CKM.4": 12,
          "FCS_CKM.4.1": 1,
          "FCS_COP.1": 11,
          "FCS_COP.1.1": 1
        },
        "FDP": {
          "FDP_ACC": 48,
          "FDP_ACC.1": 15,
          "FDP_ACF": 36,
          "FDP_ACF.1": 20,
          "FDP_DAU": 8,
          "FDP_DAU.2": 2,
          "FDP_IFC.1": 7,
          "FDP_ITC": 10,
          "FDP_ITC.1": 5,
          "FDP_ITC.2": 2,
          "FDP_RIP.1": 8,
          "FDP_RIP.1.1": 1,
          "FDP_SDI": 18,
          "FDP_SDI.2": 4,
          "FDP_UCT": 11,
          "FDP_UCT.1": 1,
          "FDP_UIT": 7,
          "FDP_UIT.1": 2
        },
        "FIA": {
          "FIA_AFL.1": 6,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_API": 3,
          "FIA_API.1": 13,
          "FIA_API.1.1": 2,
          "FIA_UAU.1": 15,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UID.1": 17,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1
        },
        "FMT": {
          "FMT_EMS.1": 1,
          "FMT_MOF.1": 8,
          "FMT_MOF.1.1": 1,
          "FMT_MSA": 19,
          "FMT_MSA.1": 4,
          "FMT_MSA.2": 10,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 20,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MSA.4": 12,
          "FMT_MSA.4.1": 1,
          "FMT_MTD": 16,
          "FMT_MTD.1": 2,
          "FMT_SMF.1": 20,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 22,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_EMS": 5,
          "FPT_EMS.1": 11,
          "FPT_EMS.1.1": 4,
          "FPT_EMS.1.2": 3,
          "FPT_FLS.1": 7,
          "FPT_FLS.1.1": 1,
          "FPT_PHP.1": 6,
          "FPT_PHP.1.1": 1,
          "FPT_PHP.1.2": 1,
          "FPT_PHP.3": 8,
          "FPT_PHP.3.1": 1,
          "FPT_TST": 1,
          "FPT_TST.1": 12,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FTP": {
          "FTP_ITC": 39,
          "FTP_ITC.1": 14,
          "FTP_TRP.1": 2
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PGP": {
          "PGP": 1
        },
        "TLS": {
          "SSL": {
            "SSL": 1
          }
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 12
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "CEA-LETI": {
          "CEA-LETI": 1
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 5
          },
          "SHA2": {
            "SHA-2": 1,
            "SHA-256": 7
          }
        }
      },
      "ic_data_group": {
        "EF": {
          "EF.CardAccess": 2
        }
      },
      "javacard_api_const": {},
      "javacard_packages": {
        "javacard": {
          "javacard.framework": 1
        }
      },
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 2
        }
      },
      "side_channel_analysis": {
        "FI": {
          "DFA": 1,
          "fault injection": 1,
          "malfunction": 1,
          "physical tampering": 5
        },
        "SCA": {
          "DPA": 3,
          "SPA": 3,
          "physical probing": 1,
          "side channel": 1,
          "timing attacks": 2
        }
      },
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1,
          "CCMB-2017-04-004": 1
        },
        "FIPS": {
          "FIPS PUB 180-2": 1
        },
        "ISO": {
          "ISO/IEC 14443": 2,
          "ISO/IEC 15408:2005": 2,
          "ISO/IEC 7816-4": 1,
          "ISO/IEC 9797-1": 1
        },
        "NIST": {
          "NIST SP 800-90": 4,
          "NIST SP 800-90A": 1
        },
        "PKCS": {
          "PKCS#1": 6
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 23
          }
        },
        "DES": {
          "3DES": {
            "3DES": 4,
            "TDES": 18
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 5
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {
        "IBM": {
          "SE": 3
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "Idemia": {
          "IDEMIA": 117,
          "Idemia": 1
        },
        "Infineon": {
          "Infineon": 7,
          "Infineon Technologies AG": 1
        },
        "Morpho": {
          "Morpho": 1
        },
        "Oberthur": {
          "Oberthur Technologies": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "MESTIRI Sarra;Nicolas.LOKIEC@idemia.com",
      "/CreationDate": "D:20220620145955+02\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2016",
      "/ModDate": "D:20220620145955+02\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2016",
      "/Title": "Title",
      "pdf_file_size_bytes": 3279967,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 93
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0076b_pdf.pdf",
        "pp_name": "Protection profiles for secure signature creation device - Part 6: Extension for device with key impo..."
      },
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0071b_pdf.pdf",
        "pp_name": "Protection profiles for secure signature creation device \u2014 Part 4: Extension for device with key gene..."
      },
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0059b_pdf.pdf",
        "pp_name": "Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Version..."
      },
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0072b_pdf.pdf",
        "pp_name": "Protection profiles for secure signature creation device \u2014 Part 5: Extension for device with key gene..."
      },
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": "EAL4+",
        "pp_ids": {
          "_type": "Set",
          "elements": [
            "PP_SSCD_PART3_V1.0.2"
          ]
        },
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0075b_pdf.pdf",
        "pp_name": "Protection profiles for secure signature creation device - Part 3: Device with key import"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2022_33.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4+",
      "ALC_DVS.2",
      "AVA_VAN.5"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/anssi-cible-cc-2022_33en.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "5bc86da1ab574ce88fcc8c58e7f5a14ddc424b7f03df246f711dbbe7edd3ff86",
      "txt_hash": "92ba5c2102d8f6101cbfad76ecc0285608728ddb0e0402549fa1a7428e6839fc"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "94f5251f87fedc1be6c51530a6bf65ac01ff4013fcc11df597f0cb4223e45c1f",
      "txt_hash": "38837e86cfc1d1be6c18711893cbd375ed346e1936a8a78d411d0d7b3a828600"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "30e7a38603f62f0c714c54a723f741008159977b00c71080ba26e95d9a57cf3f",
      "txt_hash": "2e0d0d341a00cf79a6121ff5dd6dabbd5fb9b31a13d891df61a59c389bcbd8a9"
    }
  },
  "status": "active"
}