IDeal Citiz v2.3-n embedding ID.me 1.6-n application (ID.me 1.6-n / 2.1.6.0.0)

CSV information ?

Status archived
Valid from 21.08.2019
Valid until 21.08.2024
Scheme 🇫🇷 FR
Manufacturer Idemia
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level ALC_DVS.2, AVA_VAN.5, EAL5+
Maintenance updates IDeal Citiz v2.3-n embedding ID.me 1.6-n application, version ID.me 1.6-n / 2.1.6.0.0 (24.06.2020) Certification report Security target

Heuristics summary ?

Certificate ID: ANSSI-CC-2019/32

Certificate ?

Certification report ?

Extracted keywords

Symmetric Algorithms
DES
Asymmetric Algorithms
ECC

Operating System name
JCOP 3
Vendor
NXP Semiconductors, NXP, Oberthur Technologies, IDEMIA

Security level
EAL 5, EAL2, EAL7, EAL 1, EAL 3, EAL 7, ITSEC E6 Elevé
Security Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSS
Protection profiles
BSI-CC-PP-0059-2009-MA-01, BSI-CC-PP-0075-2012, BSI-CC-PP-0071-2012, BSI-CC-PP-0072-2012, BSI-CC-PP-0076-2013, BSI-CC-PP- 0059-2009-MA-01, BSI-CC-PP- 0075-2012, BSI-CC-PP- 0071-2012, BSI-CC-PP- 0072-2012, BSI-CC-PP-0076-, BSI-CC-PP-0086-, PP-SSCD-Part2, PP-SSCD-, PP-SSCD-Part4, PP-SSCD-Part5, PP-SSCD-Part6
Certificates
BSI-DSZ-CC-1059-, ANSSI-CC-2019/32
Evaluation facilities
SERMA, CESTI, CEA - LETI, CEA-LETI

Standards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004
Technical reports
BSI TR-03110

File metadata

Title ANSSI-CC-2019/32
Subject IDeal Citiz v2.3-n embedding ID.me 1.6-n application
Keywords ANSSI-CC-CER-F-07.29
Author Géraldine Avoué
Creation date D:20190913105844+02'00'
Modification date D:20190913105844+02'00'
Pages 18
Creator Microsoft® Word 2010
Producer Microsoft® Word 2010

Frontpage

Certificate ID ANSSI-CC-2019/32
Certified item IDeal Citiz v2.3-n embedding ID.me 1.6-n application
Certification lab CEA - LETI 17 avenue des martyrs, 38054 Grenoble Cedex 9, France
Developer IDEMIA 2 place Samuel Champlain 92400 Courbevoie, France NXP Semiconductors Troplowitzstrasse 20, 22529 Hamburg, Allemagne Commanditaire IDEMIA 2 place Samuel Champlain 92400 Courbevoie, France

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES, TDES, 3DES, KMAC, CMAC
Asymmetric Algorithms
RSA-PSS, RSA-OAEP, ECDH, ECDSA, ECC, DH
Hash functions
SHA-1, SHA-224, SHA-384, SHA-512, SHA-256
Schemes
MAC, Key agreement
Protocols
PACE, PGP
Randomness
RNG
Block cipher modes
CBC

Operating System name
JCOP 3
IC data groups
EF.ChipSecurity
Vendor
NXP, IDEMIA

Security level
EAL 5+, EAL5, EAL 5, EAL5+, EAL4+, EAL5 augmented, EAL 5 augmented
Claims
D.SCD, D.SVD, A.CSP, A.CGA, A.SCA, OE.HI_VAD, OE.HID_VAD
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_TDS.1, ADV_FSP.5, ADV_TDS.4, ADV_IMP.1, ADV_TDS.3, ADV_FSP.2, ADV_FSP.4, AGD_PRE, AGD_OPE, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_TAT.1, ALC_TAT.2, ALC_CMC.4, ALC_CMS.1, ALC_DVS.1, ALC_LCD.1, ALC_CMS.5, ALC_DEL.1, ATE_COV.2, ATE_FUN.1, ATE_COV.1, ATE_DPT.1, ATE_DPT.3, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1, ASE_REQ.2, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN, FCS_RND, FCS_CKM.1, FCS_CKM.4, FCS_COP.1, FCS_RND.1, FCS_RND.1.1, FCS_COP.1.1, FCS_CKM.4.1, FCS_CKM.1.1, FCS_RNG.1, FCS_CKM, FCS_COP, FCS_CKM.2, FDP_UIT, FDP_DAU, FDP_ACC, FDP_ACF, FDP_RIP.1, FDP_SDI, FDP_ITC, FDP_UCT, FDP_SDI.2, FDP_RIP.1.1, FDP_ACC.1, FDP_ACF.1, FDP_UCT.1, FDP_ITC.1, FDP_DAU.2, FDP_UIT.1, FDP_ITC.2, FDP_IFC.1, FIA_API, FIA_API.1, FIA_UAU.1, FIA_UID.1, FIA_AFL.1, FIA_API.1.1, FIA_SOS.2, FIA_UID.1.1, FIA_UID.1.2, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU, FIA_UAU.5, FIA_AFL, FIA_UAU.6, FIA_UID, FIA_UAU.4, FMT_LIM, FMT_SMR.1, FMT_SMF.1, FMT_MOF.1, FMT_MSA, FMT_MSA.2, FMT_MSA.3, FMT_MSA.4, FMT_MTD, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1.1, FMT_MOF.1.1, FMT_MSA.1, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.4.1, FMT_MTD.1, FMT_SMR, FMT_MTD.3, FMT_MTD.3.1, FPT_EMS, FPT_EMS.1, FPT_FLS.1, FPT_PHP.1, FPT_PHP.3, FPT_TST.1, FPT_EMS.1.1, FPT_EMS.1.2, FPT_FLS.1.1, FPT_TST, FPT_PHP.1.1, FPT_PHP.1.2, FPT_PHP.3.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FTP_ITC, FTP_ITC.1, FTP_TRP.1
Protection profiles
BSI-CC-PP-0086, BSI-CC-PP-0068-V2-2011, BSI-CC-PP-0084-2014, BSI-CC-PP-0059-2009-MA-01, BSI-CC-PP-0075-2012, BSI-CC-PP-0071-2012, BSI-CC-PP-0072-2012, BSI-CC-PP-0076-2013, ANSSI-CC-PP-, PP-SSCD2, PP-SSCD3, PP-SSCD4, PP-SSCD5, PP-SSCD6
Certificates
BSI-DSZ-CC-1059-2018, BSI-DSZ-CC-0973-2016, CC-18-67206, CC-16-67206-CR
Evaluation facilities
CEA-LETI
Certification process
out of scope, of the Common Criteria certified IDEMIA IDeal Pass v2.3-n JC with Privacy Protection applet (out of scope of this TOE). IDeal Citiz v2.3-n enforces separation of the data between the applets and associated

Side-channel analysis
physical probing, side channel, DPA, SPA, timing attacks, physical tampering, Physical Tampering, malfunction, Malfunction, DFA, fault injection
Certification process
out of scope, of the Common Criteria certified IDEMIA IDeal Pass v2.3-n JC with Privacy Protection applet (out of scope of this TOE). IDeal Citiz v2.3-n enforces separation of the data between the applets and associated

Standards
FIPS PUB 180-2, FIPS180-4, NIST SP 800-38B, PKCS#1, PKCS1, AIS20, ISO/IEC 7816-4, ISO/IEC 9797-1, ISO/IEC 15408:2005, ICAO, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004, CCMB-2012-09-004
Technical reports
BSI TR-03110

File metadata

Title Title
Author G509704
Creation date D:20190717162824+02'00'
Modification date D:20190717162824+02'00'
Pages 142
Creator Microsoft® Word 2016
Producer Microsoft® Word 2016

References

Outgoing
  • BSI-DSZ-CC-0973-2016 - archived - NXP Secure Smart Card Controller P6022y VB including IC Dedicated Software --- The certificate comprises four major configurations with two different EAL levels. For details see the ST. P6022P/X VB: EAL6 augmented by ALC_FLR.1, ASE_TSS.2 P6022M/D/J VB: EAL 5 augmented by AVA_VAN.5, ALC_DVS.2, ASE_TSS.2
  • BSI-DSZ-CC-1059-2018 - archived - NXP Secure Smart Card Controller P6022y VB* including IC Dedicated Software

Heuristics ?

Certificate ID: ANSSI-CC-2019/32

Extracted SARs

ASE_ECD.1, AVA_VAN.5, ALC_DEL.1, ALC_TAT.2, AGD_PRE.1, ATE_DPT.3, ADV_IMP.1, ADV_TDS.4, ALC_LCD.1, ATE_FUN.1, ASE_REQ.2, ASE_CCL.1, ALC_CMS.5, ASE_OBJ.2, ATE_COV.2, ADV_ARC.1, ALC_DVS.2, ASE_SPD.1, ADV_FSP.5, AGD_OPE.1, ASE_INT.1, ALC_CMC.4, ASE_TSS.1

References ?

Updates ?

  • 02.09.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The Status was updated.

    • The new value is archived.

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '142d09f99d82918dd2e6f69bc278b23a3550ab948560e92e8b70bda77defa1de', 'txt_hash': 'a52a18403721acb9aa67a72bd66f9ed48f428d9f8e289032e452b2852ae11d14'} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 2697853, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 142, '/Title': 'Title', '/Author': 'G509704', '/Creator': 'Microsoft® Word 2016', '/CreationDate': "D:20190717162824+02'00'", '/ModDate': "D:20190717162824+02'00'", '/Producer': 'Microsoft® Word 2016', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1059-2018': 3, 'BSI-DSZ-CC-0973-2016': 1}, 'NL': {'CC-18-67206': 2, 'CC-16-67206-CR': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0086': 1, 'BSI-CC-PP-0068-V2-2011': 1, 'BSI-CC-PP-0084-2014': 1, 'BSI-CC-PP-0059-2009-MA-01': 1, 'BSI-CC-PP-0075-2012': 1, 'BSI-CC-PP-0071-2012': 1, 'BSI-CC-PP-0072-2012': 1, 'BSI-CC-PP-0076-2013': 1}, 'ANSSI': {'ANSSI-CC-PP-': 1}, 'other': {'PP-SSCD2': 22, 'PP-SSCD3': 22, 'PP-SSCD4': 22, 'PP-SSCD5': 23, 'PP-SSCD6': 21}}, 'cc_security_level': {'EAL': {'EAL 5+': 1, 'EAL5': 6, 'EAL 5': 1, 'EAL5+': 1, 'EAL4+': 1, 'EAL5 augmented': 4, 'EAL 5 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 5, 'ADV_FSP.1': 3, 'ADV_TDS.1': 2, 'ADV_FSP.5': 8, 'ADV_TDS.4': 8, 'ADV_IMP.1': 8, 'ADV_TDS.3': 3, 'ADV_FSP.2': 2, 'ADV_FSP.4': 1}, 'AGD': {'AGD_PRE': 7, 'AGD_OPE': 6, 'AGD_OPE.1': 5, 'AGD_PRE.1': 5}, 'ALC': {'ALC_DVS.2': 8, 'ALC_TAT.1': 2, 'ALC_TAT.2': 3, 'ALC_CMC.4': 1, 'ALC_CMS.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 3, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.2': 3, 'ATE_FUN.1': 6, 'ATE_COV.1': 2, 'ATE_DPT.1': 1, 'ATE_DPT.3': 1}, 'AVA': {'AVA_VAN.5': 7}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 4, 'ASE_INT.1': 5, 'ASE_REQ.1': 2, 'ASE_REQ.2': 2, 'ASE_OBJ.2': 3, 'ASE_SPD.1': 2, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN': 1}, 'FCS': {'FCS_RND': 5, 'FCS_CKM.1': 25, 'FCS_CKM.4': 31, 'FCS_COP.1': 17, 'FCS_RND.1': 20, 'FCS_RND.1.1': 2, 'FCS_COP.1.1': 1, 'FCS_CKM.4.1': 1, 'FCS_CKM.1.1': 1, 'FCS_RNG.1': 1, 'FCS_CKM': 24, 'FCS_COP': 41, 'FCS_CKM.2': 2}, 'FDP': {'FDP_UIT': 18, 'FDP_DAU': 9, 'FDP_ACC': 67, 'FDP_ACF': 56, 'FDP_RIP.1': 25, 'FDP_SDI': 20, 'FDP_ITC': 11, 'FDP_UCT': 22, 'FDP_SDI.2': 4, 'FDP_RIP.1.1': 1, 'FDP_ACC.1': 19, 'FDP_ACF.1': 30, 'FDP_UCT.1': 2, 'FDP_ITC.1': 9, 'FDP_DAU.2': 2, 'FDP_UIT.1': 4, 'FDP_ITC.2': 6, 'FDP_IFC.1': 9}, 'FIA': {'FIA_API': 19, 'FIA_API.1': 12, 'FIA_UAU.1': 23, 'FIA_UID.1': 25, 'FIA_AFL.1': 13, 'FIA_API.1.1': 2, 'FIA_SOS.2': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU': 93, 'FIA_UAU.5': 3, 'FIA_AFL': 36, 'FIA_UAU.6': 2, 'FIA_UID': 34, 'FIA_UAU.4': 1}, 'FMT': {'FMT_LIM': 5, 'FMT_SMR.1': 37, 'FMT_SMF.1': 57, 'FMT_MOF.1': 9, 'FMT_MSA': 21, 'FMT_MSA.2': 11, 'FMT_MSA.3': 24, 'FMT_MSA.4': 13, 'FMT_MTD': 174, 'FMT_LIM.1': 14, 'FMT_LIM.2': 13, 'FMT_LIM.1.1': 2, 'FMT_LIM.2.1': 2, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SMF.1.1': 1, 'FMT_MOF.1.1': 1, 'FMT_MSA.1': 5, 'FMT_MSA.2.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MSA.4.1': 1, 'FMT_MTD.1': 15, 'FMT_SMR': 28, 'FMT_MTD.3': 11, 'FMT_MTD.3.1': 1}, 'FPT': {'FPT_EMS': 5, 'FPT_EMS.1': 16, 'FPT_FLS.1': 12, 'FPT_PHP.1': 7, 'FPT_PHP.3': 15, 'FPT_TST.1': 17, 'FPT_EMS.1.1': 4, 'FPT_EMS.1.2': 3, 'FPT_FLS.1.1': 1, 'FPT_TST': 1, 'FPT_PHP.1.1': 1, 'FPT_PHP.1.2': 1, 'FPT_PHP.3.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1}, 'FTP': {'FTP_ITC': 73, 'FTP_ITC.1': 22, 'FTP_TRP.1': 4}}, 'cc_claims': {'D': {'D.SCD': 1, 'D.SVD': 1}, 'A': {'A.CSP': 9, 'A.CGA': 6, 'A.SCA': 5}, 'OE': {'OE.HI_VAD': 2, 'OE.HID_VAD': 7}}, 'vendor': {'NXP': {'NXP': 20}, 'Idemia': {'IDEMIA': 12}}, 'eval_facility': {'CEA-LETI': {'CEA-LETI': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 20}}, 'DES': {'DES': {'DES': 1}, '3DES': {'TDES': 9, '3DES': 10}}, 'constructions': {'MAC': {'KMAC': 2, 'CMAC': 5}}}, 'asymmetric_crypto': {'RSA': {'RSA-PSS': 1, 'RSA-OAEP': 1}, 'ECC': {'ECDH': {'ECDH': 4}, 'ECDSA': {'ECDSA': 4}, 'ECC': {'ECC': 18}}, 'FF': {'DH': {'DH': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 6}, 'SHA2': {'SHA-224': 6, 'SHA-384': 5, 'SHA-512': 6, 'SHA-256': 5}}}, 'crypto_scheme': {'MAC': {'MAC': 8}, 'KA': {'Key agreement': 1}}, 'crypto_protocol': {'PACE': {'PACE': 120}, 'PGP': {'PGP': 1}}, 'randomness': {'RNG': {'RNG': 2}}, 'cipher_mode': {'CBC': {'CBC': 11}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 3, 'side channel': 1, 'DPA': 3, 'SPA': 3, 'timing attacks': 2}, 'FI': {'physical tampering': 7, 'Physical Tampering': 1, 'malfunction': 5, 'Malfunction': 5, 'DFA': 1, 'fault injection': 1}}, 'technical_report_id': {'BSI': {'BSI TR-03110': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {'JCOP': {'JCOP 3': 10}}, 'cplc_data': {}, 'ic_data_group': {'EF': {'EF.ChipSecurity': 1}}, 'standard_id': {'FIPS': {'FIPS PUB 180-2': 2, 'FIPS180-4': 1}, 'NIST': {'NIST SP 800-38B': 1}, 'PKCS': {'PKCS#1': 4, 'PKCS1': 4}, 'BSI': {'AIS20': 2}, 'ISO': {'ISO/IEC 7816-4': 1, 'ISO/IEC 9797-1': 3, 'ISO/IEC 15408:2005': 2}, 'ICAO': {'ICAO': 2}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 2, 'CCMB-2017-04-003': 2, 'CCMB-2017-04-004': 1, 'CCMB-2012-09-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'of the Common Criteria certified IDEMIA IDeal Pass v2.3-n JC with Privacy Protection applet (out of scope of this TOE). IDeal Citiz v2.3-n enforces separation of the data between the applets and associated': 1}}}.
    • The st_filename property was set to anssi-cible-cc-2019_32en.pdf.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0973-2016', 'BSI-DSZ-CC-1059-2018']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0973-2016', 'BSI-DSZ-CC-1059-2018']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}]} values added.
    • The scheme_data property was updated, with the {'enhanced': {'__delete__': ['expiration_date']}} data.
  • 19.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '76a7e1edc091abf39044cfa5a1de721f3d7b715ecc7b959ebd623821a1578a1a', 'txt_hash': 'feb9b75017a689d26e6949dbb60677f45eff7969f909c67010d62337f74ae3c7'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 732853, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 18, '/Title': 'ANSSI-CC-2019/32', '/Author': 'GĂ©raldine AvouĂ©', '/Subject': 'IDeal Citiz v2.3-n embedding ID.me 1.6-n application', '/Keywords': 'ANSSI-CC-CER-F-07.29', '/Creator': 'Microsoft® Word 2010', '/CreationDate': "D:20190913105844+02'00'", '/ModDate': "D:20190913105844+02'00'", '/Producer': 'Microsoft® Word 2010', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.ssi.gouv.fr/', 'mailto:[email protected]']}}.
    • The report_frontpage property was set to {'FR': {'match_rules': ['RĂ©fĂ©rence du rapport de certification(.+)Nom du produit(.+)RĂ©fĂ©rence/version du produit(.*)ConformitĂ© Ă  un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)DĂ©veloppeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables'], 'cert_id': 'ANSSI-CC-2019/32', 'cert_item': 'IDeal Citiz v2.3-n embedding ID.me 1.6-n application', 'cert_item_version': 'ID.me 1.6-n / 2.1.6.0.0', 'ref_protection_profiles': 'Protection profiles for secure signature creation device : Part 2: Device with key generation, v2.0.1, certifiĂ© BSI-CC-PP-0059-2009-MA-01 le 21 fĂ©vrier 2012; Part 3: Device with key import, v1.0.2, certifiĂ© BSI-CC-PP-0075-2012 le 27 septembre 2012 ; Part 4: Extension for device with key generation and trusted communication with certificate generation application, v1.0.1, certifiĂ© BSI-CC-PP-0071-2012 le 12 dĂ©cembre 2012 ; Part 5: Extension for device with key generation and trusted communication with signature creation application, v1.0.1, certifiĂ© BSI-CC-PP-0072-2012 le 12 dĂ©cembre 2012 ; Part 6: Extension for device with key import and trusted communication with signature creation application, v1.0.4, certifiĂ© BSI-CC-PP-0076-2013 le 16 avril 2013', 'cc_version': 'Critères Communs version 3.1 rĂ©vision 5', 'cc_security_level': 'EAL 5 augmentĂ© ALC_DVS.2, AVA_VAN.5', 'developer': 'IDEMIA 2 place Samuel Champlain 92400 Courbevoie, France NXP Semiconductors Troplowitzstrasse 20, 22529 Hamburg, Allemagne Commanditaire IDEMIA 2 place Samuel Champlain 92400 Courbevoie, France', 'cert_lab': 'CEA - LETI 17 avenue des martyrs, 38054 Grenoble Cedex 9, France'}}.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1059-': 1}, 'FR': {'ANSSI-CC-2019/32': 19}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0059-2009-MA-01': 1, 'BSI-CC-PP-0075-2012': 1, 'BSI-CC-PP-0071-2012': 1, 'BSI-CC-PP-0072-2012': 1, 'BSI-CC-PP-0076-2013': 1, 'BSI-CC-PP- 0059-2009-MA-01': 1, 'BSI-CC-PP- 0075-2012': 1, 'BSI-CC-PP- 0071-2012': 1, 'BSI-CC-PP- 0072-2012': 1, 'BSI-CC-PP-0076-': 1, 'BSI-CC-PP-0086-': 1}, 'other': {'PP-SSCD-Part2': 1, 'PP-SSCD-': 6, 'PP-SSCD-Part4': 1, 'PP-SSCD-Part5': 1, 'PP-SSCD-Part6': 1}}, 'cc_security_level': {'EAL': {'EAL 5': 3, 'EAL2': 2, 'EAL7': 1, 'EAL 1': 1, 'EAL 3': 1, 'EAL 7': 1}, 'ITSEC': {'ITSEC E6 ElevĂ©': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_DVS.2': 2, 'ALC_FLR': 2, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.5': 5, 'AVA_VAN': 2}, 'ASE': {'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'NXP': {'NXP Semiconductors': 1, 'NXP': 9}, 'Oberthur': {'Oberthur Technologies': 1}, 'Idemia': {'IDEMIA': 24}}, 'eval_facility': {'Serma': {'SERMA': 8}, 'CESTI': {'CESTI': 3}, 'CEA-LETI': {'CEA - LETI': 1, 'CEA-LETI': 2}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 2}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {'BSI': {'BSI TR-03110': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {'JCOP': {'JCOP 3': 5}}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to anssi-cc-2019_32fr.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to ['CEA'].
    • The cert_id property was set to ANSSI-CC-2019/32.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2019_32fr.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2019_32en.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to None.
    • The st_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}]} values discarded.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'IDeal Citiz v2.3-n embedding ID.me 1.6-n application, version ID.me 1.6-n / 2.1.6.0.0', 'url': 'https://cyber.gouv.fr/produits-certifies/ideal-citiz-v23-n-embedding-idme-16-n-application-version-idme-16-n-21600', 'description': 'Le produit Ă©valuĂ© est l’applet Java Card «IDeal Citiz v2.3-n embedding ID.me 1.6-n application, version ID.me 1.6-n / 2.1.6.0.0 », dĂ©veloppĂ© par Idemia et NXP Semiconductors.\n\nCe produit offre des services d’authentification et de signature Ă©lectronique (SSCD) conformes aux spĂ©cifications IAS ECC v1.0.1. Il est embarquĂ© sur la plateforme Java Card ouverte « NXP JCOP 3 P60 » (avec ou sans patch P', 'sponsor': 'Idemia', 'developer': 'Idemia, NXP Semiconductors', 'cert_id': '2019/32', 'level': 'EAL5+', 'expiration_date': '21 AoĂ»t 2024', 'enhanced': {'cert_id': '2019/32', 'certification_date': '21/08/2019', 'expiration_date': '21/08/2024', 'category': 'Cartes Ă  puce', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'Idemia, NXP Semiconductors', 'sponsor': 'Idemia', 'evaluation_facility': 'CEA-LETI', 'level': 'EAL5+', 'protection_profile': 'PP for secure signature creation device (Part 2 Ă  6 incluse) BSI-CC-PP-0059-2009-MA-01, BSI-CC-PP-0075-2012, BSI-CC-PP-0071-2012, BSI-CC-PP-0072-2012, BSI-CC-PP-0076-2013', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ALC_DVS.2, AVA_VAN.5', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2019/09/anssi-cc-2019_32fr.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2019/09/anssi-cible-cc-2019_32-m01en.pdf'}}.
  • 31.07.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name IDeal Citiz v2.3-n embedding ID.me 1.6-n application (ID.me 1.6-n / 2.1.6.0.0) was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": null,
  "dgst": "33e4966c9899cb42",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2019/32",
    "cert_lab": [
      "CEA"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.6",
        "2.3",
        "2.1.6.0.0"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1059-2018",
          "BSI-DSZ-CC-0973-2016"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1059-2018",
          "BSI-DSZ-CC-0973-2016"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2020-06-24",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2019_32-m01.pdf",
        "maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2019_32-m01en.pdf",
        "maintenance_title": "IDeal Citiz v2.3-n embedding ID.me 1.6-n application, version ID.me 1.6-n / 2.1.6.0.0"
      }
    ]
  },
  "manufacturer": "Idemia",
  "manufacturer_web": "https://www.idemia.com",
  "name": "IDeal Citiz v2.3-n embedding ID.me 1.6-n application (ID.me 1.6-n / 2.1.6.0.0)",
  "not_valid_after": "2024-08-21",
  "not_valid_before": "2019-08-21",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "anssi-cc-2019_32fr.pdf",
    "report_frontpage": {
      "FR": {
        "cc_security_level": "EAL 5 augment\u00e9 ALC_DVS.2, AVA_VAN.5",
        "cc_version": "Crit\u00e8res Communs version 3.1 r\u00e9vision 5",
        "cert_id": "ANSSI-CC-2019/32",
        "cert_item": "IDeal Citiz v2.3-n embedding ID.me 1.6-n application",
        "cert_item_version": "ID.me 1.6-n / 2.1.6.0.0",
        "cert_lab": "CEA - LETI 17 avenue des martyrs, 38054 Grenoble Cedex 9, France",
        "developer": "IDEMIA 2 place Samuel Champlain 92400 Courbevoie, France NXP Semiconductors Troplowitzstrasse 20, 22529 Hamburg, Allemagne Commanditaire IDEMIA 2 place Samuel Champlain 92400 Courbevoie, France",
        "match_rules": [
          "R\u00e9f\u00e9rence du rapport de certification(.+)Nom du produit(.+)R\u00e9f\u00e9rence/version du produit(.*)Conformit\u00e9 \u00e0 un profil de protection(.+)Crit\u00e8res d\u2019\u00e9valuation et version(.+)Niveau d\u2019\u00e9valuation(.+)D\u00e9veloppeurs(.+)Centre d\u2019\u00e9valuation(.+)Accords de reconnaissance applicables"
        ],
        "ref_protection_profiles": "Protection profiles for secure signature creation device : Part 2: Device with key generation, v2.0.1, certifi\u00e9 BSI-CC-PP-0059-2009-MA-01 le 21 f\u00e9vrier 2012; Part 3: Device with key import, v1.0.2, certifi\u00e9 BSI-CC-PP-0075-2012 le 27 septembre 2012 ; Part 4: Extension for device with key generation and trusted communication with certificate generation application, v1.0.1, certifi\u00e9 BSI-CC-PP-0071-2012 le 12 d\u00e9cembre 2012 ; Part 5: Extension for device with key generation and trusted communication with signature creation application, v1.0.1, certifi\u00e9 BSI-CC-PP-0072-2012 le 12 d\u00e9cembre 2012 ; Part 6: Extension for device with key import and trusted communication with signature creation application, v1.0.4, certifi\u00e9 BSI-CC-PP-0076-2013 le 16 avril 2013"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 2
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1059-": 1
        },
        "FR": {
          "ANSSI-CC-2019/32": 19
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP- 0059-2009-MA-01": 1,
          "BSI-CC-PP- 0071-2012": 1,
          "BSI-CC-PP- 0072-2012": 1,
          "BSI-CC-PP- 0075-2012": 1,
          "BSI-CC-PP-0059-2009-MA-01": 1,
          "BSI-CC-PP-0071-2012": 1,
          "BSI-CC-PP-0072-2012": 1,
          "BSI-CC-PP-0075-2012": 1,
          "BSI-CC-PP-0076-": 1,
          "BSI-CC-PP-0076-2013": 1,
          "BSI-CC-PP-0086-": 1
        },
        "other": {
          "PP-SSCD-": 6,
          "PP-SSCD-Part2": 1,
          "PP-SSCD-Part4": 1,
          "PP-SSCD-Part5": 1,
          "PP-SSCD-Part6": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_FSP": 1,
          "ADV_IMP": 1,
          "ADV_INT": 1,
          "ADV_SPM": 1,
          "ADV_TDS": 1
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_PRE": 1
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMS": 1,
          "ALC_DEL": 1,
          "ALC_DVS": 1,
          "ALC_DVS.2": 2,
          "ALC_FLR": 2,
          "ALC_TAT": 1
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_ECD": 1,
          "ASE_INT": 1,
          "ASE_OBJ": 1,
          "ASE_REQ": 1,
          "ASE_SPD": 1,
          "ASE_TSS": 1
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_DPT": 1,
          "ATE_FUN": 1,
          "ATE_IND": 1
        },
        "AVA": {
          "AVA_VAN": 2,
          "AVA_VAN.5": 5
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 3": 1,
          "EAL 5": 3,
          "EAL 7": 1,
          "EAL2": 2,
          "EAL7": 1
        },
        "ITSEC": {
          "ITSEC E6 Elev\u00e9": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "CEA-LETI": {
          "CEA - LETI": 1,
          "CEA-LETI": 2
        },
        "CESTI": {
          "CESTI": 3
        },
        "Serma": {
          "SERMA": 8
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {
        "JCOP": {
          "JCOP 3": 5
        }
      },
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1,
          "CCMB-2017-04-004": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI TR-03110": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Idemia": {
          "IDEMIA": 24
        },
        "NXP": {
          "NXP": 9,
          "NXP Semiconductors": 1
        },
        "Oberthur": {
          "Oberthur Technologies": 1
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "G\u00e9raldine Avou\u00e9",
      "/CreationDate": "D:20190913105844+02\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2010",
      "/Keywords": "ANSSI-CC-CER-F-07.29",
      "/ModDate": "D:20190913105844+02\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2010",
      "/Subject": "IDeal Citiz v2.3-n embedding ID.me 1.6-n application",
      "/Title": "ANSSI-CC-2019/32",
      "pdf_file_size_bytes": 732853,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "mailto:[email protected]",
          "http://www.ssi.gouv.fr/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 18
    },
    "st_filename": "anssi-cible-cc-2019_32en.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 18
          },
          "ECDH": {
            "ECDH": 4
          },
          "ECDSA": {
            "ECDSA": 4
          }
        },
        "FF": {
          "DH": {
            "DH": 2
          }
        },
        "RSA": {
          "RSA-OAEP": 1,
          "RSA-PSS": 1
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0973-2016": 1,
          "BSI-DSZ-CC-1059-2018": 3
        },
        "NL": {
          "CC-16-67206-CR": 1,
          "CC-18-67206": 2
        }
      },
      "cc_claims": {
        "A": {
          "A.CGA": 6,
          "A.CSP": 9,
          "A.SCA": 5
        },
        "D": {
          "D.SCD": 1,
          "D.SVD": 1
        },
        "OE": {
          "OE.HID_VAD": 7,
          "OE.HI_VAD": 2
        }
      },
      "cc_protection_profile_id": {
        "ANSSI": {
          "ANSSI-CC-PP-": 1
        },
        "BSI": {
          "BSI-CC-PP-0059-2009-MA-01": 1,
          "BSI-CC-PP-0068-V2-2011": 1,
          "BSI-CC-PP-0071-2012": 1,
          "BSI-CC-PP-0072-2012": 1,
          "BSI-CC-PP-0075-2012": 1,
          "BSI-CC-PP-0076-2013": 1,
          "BSI-CC-PP-0084-2014": 1,
          "BSI-CC-PP-0086": 1
        },
        "other": {
          "PP-SSCD2": 22,
          "PP-SSCD3": 22,
          "PP-SSCD4": 22,
          "PP-SSCD5": 23,
          "PP-SSCD6": 21
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 5,
          "ADV_FSP.1": 3,
          "ADV_FSP.2": 2,
          "ADV_FSP.4": 1,
          "ADV_FSP.5": 8,
          "ADV_IMP.1": 8,
          "ADV_TDS.1": 2,
          "ADV_TDS.3": 3,
          "ADV_TDS.4": 8
        },
        "AGD": {
          "AGD_OPE": 6,
          "AGD_OPE.1": 5,
          "AGD_PRE": 7,
          "AGD_PRE.1": 5
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.1": 1,
          "ALC_CMS.5": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 1,
          "ALC_DVS.2": 8,
          "ALC_LCD.1": 3,
          "ALC_TAT.1": 2,
          "ALC_TAT.2": 3
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 4,
          "ASE_INT.1": 5,
          "ASE_OBJ.2": 3,
          "ASE_REQ.1": 2,
          "ASE_REQ.2": 2,
          "ASE_SPD.1": 2,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.1": 2,
          "ATE_COV.2": 3,
          "ATE_DPT.1": 1,
          "ATE_DPT.3": 1,
          "ATE_FUN.1": 6
        },
        "AVA": {
          "AVA_VAN.5": 7
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 5": 1,
          "EAL 5 augmented": 1,
          "EAL 5+": 1,
          "EAL4+": 1,
          "EAL5": 6,
          "EAL5 augmented": 4,
          "EAL5+": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 1
        },
        "FCS": {
          "FCS_CKM": 24,
          "FCS_CKM.1": 25,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 2,
          "FCS_CKM.4": 31,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 41,
          "FCS_COP.1": 17,
          "FCS_COP.1.1": 1,
          "FCS_RND": 5,
          "FCS_RND.1": 20,
          "FCS_RND.1.1": 2,
          "FCS_RNG.1": 1
        },
        "FDP": {
          "FDP_ACC": 67,
          "FDP_ACC.1": 19,
          "FDP_ACF": 56,
          "FDP_ACF.1": 30,
          "FDP_DAU": 9,
          "FDP_DAU.2": 2,
          "FDP_IFC.1": 9,
          "FDP_ITC": 11,
          "FDP_ITC.1": 9,
          "FDP_ITC.2": 6,
          "FDP_RIP.1": 25,
          "FDP_RIP.1.1": 1,
          "FDP_SDI": 20,
          "FDP_SDI.2": 4,
          "FDP_UCT": 22,
          "FDP_UCT.1": 2,
          "FDP_UIT": 18,
          "FDP_UIT.1": 4
        },
        "FIA": {
          "FIA_AFL": 36,
          "FIA_AFL.1": 13,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_API": 19,
          "FIA_API.1": 12,
          "FIA_API.1.1": 2,
          "FIA_SOS.2": 1,
          "FIA_UAU": 93,
          "FIA_UAU.1": 23,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.4": 1,
          "FIA_UAU.5": 3,
          "FIA_UAU.6": 2,
          "FIA_UID": 34,
          "FIA_UID.1": 25,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1
        },
        "FMT": {
          "FMT_LIM": 5,
          "FMT_LIM.1": 14,
          "FMT_LIM.1.1": 2,
          "FMT_LIM.2": 13,
          "FMT_LIM.2.1": 2,
          "FMT_MOF.1": 9,
          "FMT_MOF.1.1": 1,
          "FMT_MSA": 21,
          "FMT_MSA.1": 5,
          "FMT_MSA.2": 11,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 24,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MSA.4": 13,
          "FMT_MSA.4.1": 1,
          "FMT_MTD": 174,
          "FMT_MTD.1": 15,
          "FMT_MTD.3": 11,
          "FMT_MTD.3.1": 1,
          "FMT_SMF.1": 57,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 28,
          "FMT_SMR.1": 37,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_EMS": 5,
          "FPT_EMS.1": 16,
          "FPT_EMS.1.1": 4,
          "FPT_EMS.1.2": 3,
          "FPT_FLS.1": 12,
          "FPT_FLS.1.1": 1,
          "FPT_PHP.1": 7,
          "FPT_PHP.1.1": 1,
          "FPT_PHP.1.2": 1,
          "FPT_PHP.3": 15,
          "FPT_PHP.3.1": 1,
          "FPT_TST": 1,
          "FPT_TST.1": 17,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FTP": {
          "FTP_ITC": 73,
          "FTP_ITC.1": 22,
          "FTP_TRP.1": 4
        }
      },
      "certification_process": {
        "OutOfScope": {
          "of the Common Criteria certified IDEMIA IDeal Pass v2.3-n JC with Privacy Protection applet (out of scope of this TOE). IDeal Citiz v2.3-n enforces separation of the data between the applets and associated": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 11
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 120
        },
        "PGP": {
          "PGP": 1
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key agreement": 1
        },
        "MAC": {
          "MAC": 8
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "CEA-LETI": {
          "CEA-LETI": 1
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 6
          },
          "SHA2": {
            "SHA-224": 6,
            "SHA-256": 5,
            "SHA-384": 5,
            "SHA-512": 6
          }
        }
      },
      "ic_data_group": {
        "EF": {
          "EF.ChipSecurity": 1
        }
      },
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {
        "JCOP": {
          "JCOP 3": 10
        }
      },
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 2
        }
      },
      "side_channel_analysis": {
        "FI": {
          "DFA": 1,
          "Malfunction": 5,
          "Physical Tampering": 1,
          "fault injection": 1,
          "malfunction": 5,
          "physical tampering": 7
        },
        "SCA": {
          "DPA": 3,
          "SPA": 3,
          "physical probing": 3,
          "side channel": 1,
          "timing attacks": 2
        }
      },
      "standard_id": {
        "BSI": {
          "AIS20": 2
        },
        "CC": {
          "CCMB-2012-09-004": 1,
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 2,
          "CCMB-2017-04-003": 2,
          "CCMB-2017-04-004": 1
        },
        "FIPS": {
          "FIPS PUB 180-2": 2,
          "FIPS180-4": 1
        },
        "ICAO": {
          "ICAO": 2
        },
        "ISO": {
          "ISO/IEC 15408:2005": 2,
          "ISO/IEC 7816-4": 1,
          "ISO/IEC 9797-1": 3
        },
        "NIST": {
          "NIST SP 800-38B": 1
        },
        "PKCS": {
          "PKCS#1": 4,
          "PKCS1": 4
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 20
          }
        },
        "DES": {
          "3DES": {
            "3DES": 10,
            "TDES": 9
          },
          "DES": {
            "DES": 1
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 5,
            "KMAC": 2
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI TR-03110": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Idemia": {
          "IDEMIA": 12
        },
        "NXP": {
          "NXP": 20
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "G509704",
      "/CreationDate": "D:20190717162824+02\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2016",
      "/ModDate": "D:20190717162824+02\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2016",
      "/Title": "Title",
      "pdf_file_size_bytes": 2697853,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 142
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0071b_pdf.pdf",
        "pp_name": "Protection profiles for secure signature creation device \u2014 Part 4: Extension for device with key gene..."
      },
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0076b_pdf.pdf",
        "pp_name": "Protection profiles for secure signature creation device - Part 6: Extension for device with key impo..."
      },
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0072b_pdf.pdf",
        "pp_name": "Protection profiles for secure signature creation device \u2014 Part 5: Extension for device with key gene..."
      },
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf",
        "pp_name": "Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Version..."
      },
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0075b_pdf.pdf",
        "pp_name": "Protection profiles for secure signature creation device - Part 3: Device with key import"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2019_32fr.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "AVA_VAN.5",
      "EAL5+",
      "ALC_DVS.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2019_32en.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "76a7e1edc091abf39044cfa5a1de721f3d7b715ecc7b959ebd623821a1578a1a",
      "txt_hash": "feb9b75017a689d26e6949dbb60677f45eff7969f909c67010d62337f74ae3c7"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "142d09f99d82918dd2e6f69bc278b23a3550ab948560e92e8b70bda77defa1de",
      "txt_hash": "a52a18403721acb9aa67a72bd66f9ed48f428d9f8e289032e452b2852ae11d14"
    }
  },
  "status": "archived"
}