IDeal Citiz v2.3-n embedding ID.me 1.6-n application (ID.me 1.6-n / 2.1.6.0.0)
CSV information ?
Status | archived |
---|---|
Valid from | 21.08.2019 |
Valid until | 21.08.2024 |
Scheme | 🇫🇷 FR |
Manufacturer | Idemia |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | AVA_VAN.5, ALC_DVS.2, EAL5+ |
Maintenance updates | IDeal Citiz v2.3-n embedding ID.me 1.6-n application, version ID.me 1.6-n / 2.1.6.0.0 (24.06.2020) Certification report Security target |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Symmetric Algorithms
DESAsymmetric Algorithms
ECCOperating System name
JCOP 3Vendor
NXP Semiconductors, NXP, Oberthur Technologies, IDEMIASecurity level
EAL 5, EAL2, EAL7, EAL 1, EAL 3, EAL 7, ITSEC E6 ElevéSecurity Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSSProtection profiles
BSI-CC-PP-0059-2009-MA-01, BSI-CC-PP-0075-2012, BSI-CC-PP-0071-2012, BSI-CC-PP-0072-2012, BSI-CC-PP-0076-2013, BSI-CC-PP- 0059-2009-MA-01, BSI-CC-PP- 0075-2012, BSI-CC-PP- 0071-2012, BSI-CC-PP- 0072-2012, BSI-CC-PP-0076-, BSI-CC-PP-0086-, PP-SSCD-Part2, PP-SSCD-, PP-SSCD-Part4, PP-SSCD-Part5, PP-SSCD-Part6Certificates
BSI-DSZ-CC-1059-, ANSSI-CC-2019/32Evaluation facilities
SERMA, CESTI, CEA - LETI, CEA-LETIStandards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004Technical reports
BSI TR-03110File metadata
Title | ANSSI-CC-2019/32 |
---|---|
Subject | IDeal Citiz v2.3-n embedding ID.me 1.6-n application |
Keywords | ANSSI-CC-CER-F-07.29 |
Author | Géraldine Avoué |
Creation date | D:20190913105844+02'00' |
Modification date | D:20190913105844+02'00' |
Pages | 18 |
Creator | Microsoft® Word 2010 |
Producer | Microsoft® Word 2010 |
Frontpage
Certificate ID | ANSSI-CC-2019/32 |
---|---|
Certified item | IDeal Citiz v2.3-n embedding ID.me 1.6-n application |
Certification lab | CEA - LETI 17 avenue des martyrs, 38054 Grenoble Cedex 9, France |
Developer | IDEMIA 2 place Samuel Champlain 92400 Courbevoie, France NXP Semiconductors Troplowitzstrasse 20, 22529 Hamburg, Allemagne Commanditaire IDEMIA 2 place Samuel Champlain 92400 Courbevoie, France |
Security target ?
Extracted keywords
Symmetric Algorithms
AES, DES, TDES, 3DES, KMAC, CMACAsymmetric Algorithms
RSA-PSS, RSA-OAEP, ECDH, ECDSA, ECC, DHHash functions
SHA-1, SHA-224, SHA-384, SHA-512, SHA-256Schemes
MAC, Key agreementProtocols
PACE, PGPRandomness
RNGBlock cipher modes
CBCOperating System name
JCOP 3IC data groups
EF.ChipSecurityVendor
NXP, IDEMIASecurity level
EAL 5+, EAL5, EAL 5, EAL5+, EAL4+, EAL5 augmented, EAL 5 augmentedClaims
D.SCD, D.SVD, A.CSP, A.CGA, A.SCA, OE.HI_VAD, OE.HID_VADSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_TDS.1, ADV_FSP.5, ADV_TDS.4, ADV_IMP.1, ADV_TDS.3, ADV_FSP.2, ADV_FSP.4, AGD_PRE, AGD_OPE, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_TAT.1, ALC_TAT.2, ALC_CMC.4, ALC_CMS.1, ALC_DVS.1, ALC_LCD.1, ALC_CMS.5, ALC_DEL.1, ATE_COV.2, ATE_FUN.1, ATE_COV.1, ATE_DPT.1, ATE_DPT.3, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1, ASE_REQ.2, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN, FCS_RND, FCS_CKM.1, FCS_CKM.4, FCS_COP.1, FCS_RND.1, FCS_RND.1.1, FCS_COP.1.1, FCS_CKM.4.1, FCS_CKM.1.1, FCS_RNG.1, FCS_CKM, FCS_COP, FCS_CKM.2, FDP_UIT, FDP_DAU, FDP_ACC, FDP_ACF, FDP_RIP.1, FDP_SDI, FDP_ITC, FDP_UCT, FDP_SDI.2, FDP_RIP.1.1, FDP_ACC.1, FDP_ACF.1, FDP_UCT.1, FDP_ITC.1, FDP_DAU.2, FDP_UIT.1, FDP_ITC.2, FDP_IFC.1, FIA_API, FIA_API.1, FIA_UAU.1, FIA_UID.1, FIA_AFL.1, FIA_API.1.1, FIA_SOS.2, FIA_UID.1.1, FIA_UID.1.2, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU, FIA_UAU.5, FIA_AFL, FIA_UAU.6, FIA_UID, FIA_UAU.4, FMT_LIM, FMT_SMR.1, FMT_SMF.1, FMT_MOF.1, FMT_MSA, FMT_MSA.2, FMT_MSA.3, FMT_MSA.4, FMT_MTD, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1.1, FMT_MOF.1.1, FMT_MSA.1, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.4.1, FMT_MTD.1, FMT_SMR, FMT_MTD.3, FMT_MTD.3.1, FPT_EMS, FPT_EMS.1, FPT_FLS.1, FPT_PHP.1, FPT_PHP.3, FPT_TST.1, FPT_EMS.1.1, FPT_EMS.1.2, FPT_FLS.1.1, FPT_TST, FPT_PHP.1.1, FPT_PHP.1.2, FPT_PHP.3.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FTP_ITC, FTP_ITC.1, FTP_TRP.1Protection profiles
BSI-CC-PP-0086, BSI-CC-PP-0068-V2-2011, BSI-CC-PP-0084-2014, BSI-CC-PP-0059-2009-MA-01, BSI-CC-PP-0075-2012, BSI-CC-PP-0071-2012, BSI-CC-PP-0072-2012, BSI-CC-PP-0076-2013, ANSSI-CC-PP-, PP-SSCD2, PP-SSCD3, PP-SSCD4, PP-SSCD5, PP-SSCD6Certificates
BSI-DSZ-CC-1059-2018, BSI-DSZ-CC-0973-2016, CC-18-67206, CC-16-67206-CREvaluation facilities
CEA-LETICertification process
out of scope, of the Common Criteria certified IDEMIA IDeal Pass v2.3-n JC with Privacy Protection applet (out of scope of this TOE). IDeal Citiz v2.3-n enforces separation of the data between the applets and associatedSide-channel analysis
physical probing, side channel, DPA, SPA, timing attacks, physical tampering, Physical Tampering, malfunction, Malfunction, DFA, fault injectionCertification process
out of scope, of the Common Criteria certified IDEMIA IDeal Pass v2.3-n JC with Privacy Protection applet (out of scope of this TOE). IDeal Citiz v2.3-n enforces separation of the data between the applets and associatedStandards
FIPS PUB 180-2, FIPS180-4, NIST SP 800-38B, PKCS#1, PKCS1, AIS20, ISO/IEC 7816-4, ISO/IEC 9797-1, ISO/IEC 15408:2005, ICAO, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004, CCMB-2012-09-004Technical reports
BSI TR-03110File metadata
Title | Title |
---|---|
Author | G509704 |
Creation date | D:20190717162824+02'00' |
Modification date | D:20190717162824+02'00' |
Pages | 142 |
Creator | Microsoft® Word 2016 |
Producer | Microsoft® Word 2016 |
References
Outgoing- BSI-DSZ-CC-0973-2016 - archived - NXP Secure Smart Card Controller P6022y VB including IC Dedicated Software --- The certificate comprises four major configurations with two different EAL levels. For details see the ST. P6022P/X VB: EAL6 augmented by ALC_FLR.1, ASE_TSS.2 P6022M/D/J VB: EAL 5 augmented by AVA_VAN.5, ALC_DVS.2, ASE_TSS.2
- BSI-DSZ-CC-1059-2018 - archived - NXP Secure Smart Card Controller P6022y VB* including IC Dedicated Software
Heuristics ?
Extracted SARs
ALC_LCD.1, ASE_SPD.1, ASE_REQ.2, ALC_CMS.5, ALC_TAT.2, ADV_IMP.1, ASE_INT.1, ALC_DVS.2, ASE_CCL.1, ALC_CMC.4, AGD_OPE.1, ADV_FSP.5, ASE_TSS.1, ALC_DEL.1, ATE_FUN.1, ADV_ARC.1, ATE_COV.2, AGD_PRE.1, AVA_VAN.5, ADV_TDS.4, ATE_DPT.3, ASE_OBJ.2, ASE_ECD.1References ?
Updates ?
-
02.09.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
22.08.2024 The certificate data changed.
Certificate changed
The Status was updated.
- The new value is
archived
.
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '142d09f99d82918dd2e6f69bc278b23a3550ab948560e92e8b70bda77defa1de', 'txt_hash': 'a52a18403721acb9aa67a72bd66f9ed48f428d9f8e289032e452b2852ae11d14'}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 2697853, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 142, '/Title': 'Title', '/Author': 'G509704', '/Creator': 'Microsoft® Word 2016', '/CreationDate': "D:20190717162824+02'00'", '/ModDate': "D:20190717162824+02'00'", '/Producer': 'Microsoft® Word 2016', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-1059-2018': 3, 'BSI-DSZ-CC-0973-2016': 1}, 'NL': {'CC-18-67206': 2, 'CC-16-67206-CR': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0086': 1, 'BSI-CC-PP-0068-V2-2011': 1, 'BSI-CC-PP-0084-2014': 1, 'BSI-CC-PP-0059-2009-MA-01': 1, 'BSI-CC-PP-0075-2012': 1, 'BSI-CC-PP-0071-2012': 1, 'BSI-CC-PP-0072-2012': 1, 'BSI-CC-PP-0076-2013': 1}, 'ANSSI': {'ANSSI-CC-PP-': 1}, 'other': {'PP-SSCD2': 22, 'PP-SSCD3': 22, 'PP-SSCD4': 22, 'PP-SSCD5': 23, 'PP-SSCD6': 21}}, 'cc_security_level': {'EAL': {'EAL 5+': 1, 'EAL5': 6, 'EAL 5': 1, 'EAL5+': 1, 'EAL4+': 1, 'EAL5 augmented': 4, 'EAL 5 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 5, 'ADV_FSP.1': 3, 'ADV_TDS.1': 2, 'ADV_FSP.5': 8, 'ADV_TDS.4': 8, 'ADV_IMP.1': 8, 'ADV_TDS.3': 3, 'ADV_FSP.2': 2, 'ADV_FSP.4': 1}, 'AGD': {'AGD_PRE': 7, 'AGD_OPE': 6, 'AGD_OPE.1': 5, 'AGD_PRE.1': 5}, 'ALC': {'ALC_DVS.2': 8, 'ALC_TAT.1': 2, 'ALC_TAT.2': 3, 'ALC_CMC.4': 1, 'ALC_CMS.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 3, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.2': 3, 'ATE_FUN.1': 6, 'ATE_COV.1': 2, 'ATE_DPT.1': 1, 'ATE_DPT.3': 1}, 'AVA': {'AVA_VAN.5': 7}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 4, 'ASE_INT.1': 5, 'ASE_REQ.1': 2, 'ASE_REQ.2': 2, 'ASE_OBJ.2': 3, 'ASE_SPD.1': 2, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN': 1}, 'FCS': {'FCS_RND': 5, 'FCS_CKM.1': 25, 'FCS_CKM.4': 31, 'FCS_COP.1': 17, 'FCS_RND.1': 20, 'FCS_RND.1.1': 2, 'FCS_COP.1.1': 1, 'FCS_CKM.4.1': 1, 'FCS_CKM.1.1': 1, 'FCS_RNG.1': 1, 'FCS_CKM': 24, 'FCS_COP': 41, 'FCS_CKM.2': 2}, 'FDP': {'FDP_UIT': 18, 'FDP_DAU': 9, 'FDP_ACC': 67, 'FDP_ACF': 56, 'FDP_RIP.1': 25, 'FDP_SDI': 20, 'FDP_ITC': 11, 'FDP_UCT': 22, 'FDP_SDI.2': 4, 'FDP_RIP.1.1': 1, 'FDP_ACC.1': 19, 'FDP_ACF.1': 30, 'FDP_UCT.1': 2, 'FDP_ITC.1': 9, 'FDP_DAU.2': 2, 'FDP_UIT.1': 4, 'FDP_ITC.2': 6, 'FDP_IFC.1': 9}, 'FIA': {'FIA_API': 19, 'FIA_API.1': 12, 'FIA_UAU.1': 23, 'FIA_UID.1': 25, 'FIA_AFL.1': 13, 'FIA_API.1.1': 2, 'FIA_SOS.2': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU': 93, 'FIA_UAU.5': 3, 'FIA_AFL': 36, 'FIA_UAU.6': 2, 'FIA_UID': 34, 'FIA_UAU.4': 1}, 'FMT': {'FMT_LIM': 5, 'FMT_SMR.1': 37, 'FMT_SMF.1': 57, 'FMT_MOF.1': 9, 'FMT_MSA': 21, 'FMT_MSA.2': 11, 'FMT_MSA.3': 24, 'FMT_MSA.4': 13, 'FMT_MTD': 174, 'FMT_LIM.1': 14, 'FMT_LIM.2': 13, 'FMT_LIM.1.1': 2, 'FMT_LIM.2.1': 2, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SMF.1.1': 1, 'FMT_MOF.1.1': 1, 'FMT_MSA.1': 5, 'FMT_MSA.2.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MSA.4.1': 1, 'FMT_MTD.1': 15, 'FMT_SMR': 28, 'FMT_MTD.3': 11, 'FMT_MTD.3.1': 1}, 'FPT': {'FPT_EMS': 5, 'FPT_EMS.1': 16, 'FPT_FLS.1': 12, 'FPT_PHP.1': 7, 'FPT_PHP.3': 15, 'FPT_TST.1': 17, 'FPT_EMS.1.1': 4, 'FPT_EMS.1.2': 3, 'FPT_FLS.1.1': 1, 'FPT_TST': 1, 'FPT_PHP.1.1': 1, 'FPT_PHP.1.2': 1, 'FPT_PHP.3.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1}, 'FTP': {'FTP_ITC': 73, 'FTP_ITC.1': 22, 'FTP_TRP.1': 4}}, 'cc_claims': {'D': {'D.SCD': 1, 'D.SVD': 1}, 'A': {'A.CSP': 9, 'A.CGA': 6, 'A.SCA': 5}, 'OE': {'OE.HI_VAD': 2, 'OE.HID_VAD': 7}}, 'vendor': {'NXP': {'NXP': 20}, 'Idemia': {'IDEMIA': 12}}, 'eval_facility': {'CEA-LETI': {'CEA-LETI': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 20}}, 'DES': {'DES': {'DES': 1}, '3DES': {'TDES': 9, '3DES': 10}}, 'constructions': {'MAC': {'KMAC': 2, 'CMAC': 5}}}, 'asymmetric_crypto': {'RSA': {'RSA-PSS': 1, 'RSA-OAEP': 1}, 'ECC': {'ECDH': {'ECDH': 4}, 'ECDSA': {'ECDSA': 4}, 'ECC': {'ECC': 18}}, 'FF': {'DH': {'DH': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 6}, 'SHA2': {'SHA-224': 6, 'SHA-384': 5, 'SHA-512': 6, 'SHA-256': 5}}}, 'crypto_scheme': {'MAC': {'MAC': 8}, 'KA': {'Key agreement': 1}}, 'crypto_protocol': {'PACE': {'PACE': 120}, 'PGP': {'PGP': 1}}, 'randomness': {'RNG': {'RNG': 2}}, 'cipher_mode': {'CBC': {'CBC': 11}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 3, 'side channel': 1, 'DPA': 3, 'SPA': 3, 'timing attacks': 2}, 'FI': {'physical tampering': 7, 'Physical Tampering': 1, 'malfunction': 5, 'Malfunction': 5, 'DFA': 1, 'fault injection': 1}}, 'technical_report_id': {'BSI': {'BSI TR-03110': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {'JCOP': {'JCOP 3': 10}}, 'cplc_data': {}, 'ic_data_group': {'EF': {'EF.ChipSecurity': 1}}, 'standard_id': {'FIPS': {'FIPS PUB 180-2': 2, 'FIPS180-4': 1}, 'NIST': {'NIST SP 800-38B': 1}, 'PKCS': {'PKCS#1': 4, 'PKCS1': 4}, 'BSI': {'AIS20': 2}, 'ISO': {'ISO/IEC 7816-4': 1, 'ISO/IEC 9797-1': 3, 'ISO/IEC 15408:2005': 2}, 'ICAO': {'ICAO': 2}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 2, 'CCMB-2017-04-003': 2, 'CCMB-2017-04-004': 1, 'CCMB-2012-09-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'of the Common Criteria certified IDEMIA IDeal Pass v2.3-n JC with Privacy Protection applet (out of scope of this TOE). IDeal Citiz v2.3-n enforces separation of the data between the applets and associated': 1}}}
. - The st_filename property was set to
anssi-cible-cc-2019_32en.pdf
.
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0973-2016', 'BSI-DSZ-CC-1059-2018']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0973-2016', 'BSI-DSZ-CC-1059-2018']}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}]}
values added. - The scheme_data property was updated, with the
{'enhanced': {'__delete__': ['expiration_date']}}
data.
- The new value is
-
19.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '76a7e1edc091abf39044cfa5a1de721f3d7b715ecc7b959ebd623821a1578a1a', 'txt_hash': 'feb9b75017a689d26e6949dbb60677f45eff7969f909c67010d62337f74ae3c7'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 732853, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 18, '/Title': 'ANSSI-CC-2019/32', '/Author': 'Géraldine Avoué', '/Subject': 'IDeal Citiz v2.3-n embedding ID.me 1.6-n application', '/Keywords': 'ANSSI-CC-CER-F-07.29', '/Creator': 'Microsoft® Word 2010', '/CreationDate': "D:20190913105844+02'00'", '/ModDate': "D:20190913105844+02'00'", '/Producer': 'Microsoft® Word 2010', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['mailto:[email protected]', 'http://www.ssi.gouv.fr/']}}
. - The report_frontpage property was set to
{'FR': {'match_rules': ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables'], 'cert_id': 'ANSSI-CC-2019/32', 'cert_item': 'IDeal Citiz v2.3-n embedding ID.me 1.6-n application', 'cert_item_version': 'ID.me 1.6-n / 2.1.6.0.0', 'ref_protection_profiles': 'Protection profiles for secure signature creation device : Part 2: Device with key generation, v2.0.1, certifié BSI-CC-PP-0059-2009-MA-01 le 21 février 2012; Part 3: Device with key import, v1.0.2, certifié BSI-CC-PP-0075-2012 le 27 septembre 2012 ; Part 4: Extension for device with key generation and trusted communication with certificate generation application, v1.0.1, certifié BSI-CC-PP-0071-2012 le 12 décembre 2012 ; Part 5: Extension for device with key generation and trusted communication with signature creation application, v1.0.1, certifié BSI-CC-PP-0072-2012 le 12 décembre 2012 ; Part 6: Extension for device with key import and trusted communication with signature creation application, v1.0.4, certifié BSI-CC-PP-0076-2013 le 16 avril 2013', 'cc_version': 'Critères Communs version 3.1 révision 5', 'cc_security_level': 'EAL 5 augmenté ALC_DVS.2, AVA_VAN.5', 'developer': 'IDEMIA 2 place Samuel Champlain 92400 Courbevoie, France NXP Semiconductors Troplowitzstrasse 20, 22529 Hamburg, Allemagne Commanditaire IDEMIA 2 place Samuel Champlain 92400 Courbevoie, France', 'cert_lab': 'CEA - LETI 17 avenue des martyrs, 38054 Grenoble Cedex 9, France'}}
. - The report_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-1059-': 1}, 'FR': {'ANSSI-CC-2019/32': 19}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0059-2009-MA-01': 1, 'BSI-CC-PP-0075-2012': 1, 'BSI-CC-PP-0071-2012': 1, 'BSI-CC-PP-0072-2012': 1, 'BSI-CC-PP-0076-2013': 1, 'BSI-CC-PP- 0059-2009-MA-01': 1, 'BSI-CC-PP- 0075-2012': 1, 'BSI-CC-PP- 0071-2012': 1, 'BSI-CC-PP- 0072-2012': 1, 'BSI-CC-PP-0076-': 1, 'BSI-CC-PP-0086-': 1}, 'other': {'PP-SSCD-Part2': 1, 'PP-SSCD-': 6, 'PP-SSCD-Part4': 1, 'PP-SSCD-Part5': 1, 'PP-SSCD-Part6': 1}}, 'cc_security_level': {'EAL': {'EAL 5': 3, 'EAL2': 2, 'EAL7': 1, 'EAL 1': 1, 'EAL 3': 1, 'EAL 7': 1}, 'ITSEC': {'ITSEC E6 Elevé': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_DVS.2': 2, 'ALC_FLR': 2, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.5': 5, 'AVA_VAN': 2}, 'ASE': {'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'NXP': {'NXP Semiconductors': 1, 'NXP': 9}, 'Oberthur': {'Oberthur Technologies': 1}, 'Idemia': {'IDEMIA': 24}}, 'eval_facility': {'Serma': {'SERMA': 8}, 'CESTI': {'CESTI': 3}, 'CEA-LETI': {'CEA - LETI': 1, 'CEA-LETI': 2}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 2}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {'BSI': {'BSI TR-03110': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {'JCOP': {'JCOP 3': 5}}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
anssi-cc-2019_32fr.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['CEA']
. - The cert_id property was set to
ANSSI-CC-2019/32
.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2019_32fr.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2019_32en.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
. - The st_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}]}
values discarded.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'IDeal Citiz v2.3-n embedding ID.me 1.6-n application, version ID.me 1.6-n / 2.1.6.0.0', 'url': 'https://cyber.gouv.fr/produits-certifies/ideal-citiz-v23-n-embedding-idme-16-n-application-version-idme-16-n-21600', 'description': 'Le produit évalué est l’applet Java Card «IDeal Citiz v2.3-n embedding ID.me 1.6-n application, version ID.me 1.6-n / 2.1.6.0.0 », développé par Idemia et NXP Semiconductors.\n\nCe produit offre des services d’authentification et de signature électronique (SSCD) conformes aux spécifications IAS ECC v1.0.1. Il est embarqué sur la plateforme Java Card ouverte « NXP JCOP 3 P60 » (avec ou sans patch P', 'sponsor': 'Idemia', 'developer': 'Idemia, NXP Semiconductors', 'cert_id': '2019/32', 'level': 'EAL5+', 'expiration_date': '21 Août 2024', 'enhanced': {'cert_id': '2019/32', 'certification_date': '21/08/2019', 'expiration_date': '21/08/2024', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'Idemia, NXP Semiconductors', 'sponsor': 'Idemia', 'evaluation_facility': 'CEA-LETI', 'level': 'EAL5+', 'protection_profile': 'PP for secure signature creation device (Part 2 à 6 incluse) BSI-CC-PP-0059-2009-MA-01, BSI-CC-PP-0075-2012, BSI-CC-PP-0071-2012, BSI-CC-PP-0072-2012, BSI-CC-PP-0076-2013', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ALC_DVS.2, AVA_VAN.5', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2019/09/anssi-cc-2019_32fr.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2019/09/anssi-cible-cc-2019_32-m01en.pdf'}}
.
- The scheme_data property was set to
-
31.07.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name IDeal Citiz v2.3-n embedding ID.me 1.6-n application (ID.me 1.6-n / 2.1.6.0.0) was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "33e4966c9899cb42",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2019/32",
"cert_lab": [
"CEA"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"1.6",
"2.3",
"2.1.6.0.0"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1059-2018",
"BSI-DSZ-CC-0973-2016"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1059-2018",
"BSI-DSZ-CC-0973-2016"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2020-06-24",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2019_32-m01.pdf",
"maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2019_32-m01en.pdf",
"maintenance_title": "IDeal Citiz v2.3-n embedding ID.me 1.6-n application, version ID.me 1.6-n / 2.1.6.0.0"
}
]
},
"manufacturer": "Idemia",
"manufacturer_web": "https://www.idemia.com",
"name": "IDeal Citiz v2.3-n embedding ID.me 1.6-n application (ID.me 1.6-n / 2.1.6.0.0)",
"not_valid_after": "2024-08-21",
"not_valid_before": "2019-08-21",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "anssi-cc-2019_32fr.pdf",
"report_frontpage": {
"FR": {
"cc_security_level": "EAL 5 augment\u00e9 ALC_DVS.2, AVA_VAN.5",
"cc_version": "Crit\u00e8res Communs version 3.1 r\u00e9vision 5",
"cert_id": "ANSSI-CC-2019/32",
"cert_item": "IDeal Citiz v2.3-n embedding ID.me 1.6-n application",
"cert_item_version": "ID.me 1.6-n / 2.1.6.0.0",
"cert_lab": "CEA - LETI 17 avenue des martyrs, 38054 Grenoble Cedex 9, France",
"developer": "IDEMIA 2 place Samuel Champlain 92400 Courbevoie, France NXP Semiconductors Troplowitzstrasse 20, 22529 Hamburg, Allemagne Commanditaire IDEMIA 2 place Samuel Champlain 92400 Courbevoie, France",
"match_rules": [
"R\u00e9f\u00e9rence du rapport de certification(.+)Nom du produit(.+)R\u00e9f\u00e9rence/version du produit(.*)Conformit\u00e9 \u00e0 un profil de protection(.+)Crit\u00e8res d\u2019\u00e9valuation et version(.+)Niveau d\u2019\u00e9valuation(.+)D\u00e9veloppeurs(.+)Centre d\u2019\u00e9valuation(.+)Accords de reconnaissance applicables"
],
"ref_protection_profiles": "Protection profiles for secure signature creation device : Part 2: Device with key generation, v2.0.1, certifi\u00e9 BSI-CC-PP-0059-2009-MA-01 le 21 f\u00e9vrier 2012; Part 3: Device with key import, v1.0.2, certifi\u00e9 BSI-CC-PP-0075-2012 le 27 septembre 2012 ; Part 4: Extension for device with key generation and trusted communication with certificate generation application, v1.0.1, certifi\u00e9 BSI-CC-PP-0071-2012 le 12 d\u00e9cembre 2012 ; Part 5: Extension for device with key generation and trusted communication with signature creation application, v1.0.1, certifi\u00e9 BSI-CC-PP-0072-2012 le 12 d\u00e9cembre 2012 ; Part 6: Extension for device with key import and trusted communication with signature creation application, v1.0.4, certifi\u00e9 BSI-CC-PP-0076-2013 le 16 avril 2013"
}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 2
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1059-": 1
},
"FR": {
"ANSSI-CC-2019/32": 19
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP- 0059-2009-MA-01": 1,
"BSI-CC-PP- 0071-2012": 1,
"BSI-CC-PP- 0072-2012": 1,
"BSI-CC-PP- 0075-2012": 1,
"BSI-CC-PP-0059-2009-MA-01": 1,
"BSI-CC-PP-0071-2012": 1,
"BSI-CC-PP-0072-2012": 1,
"BSI-CC-PP-0075-2012": 1,
"BSI-CC-PP-0076-": 1,
"BSI-CC-PP-0076-2013": 1,
"BSI-CC-PP-0086-": 1
},
"other": {
"PP-SSCD-": 6,
"PP-SSCD-Part2": 1,
"PP-SSCD-Part4": 1,
"PP-SSCD-Part5": 1,
"PP-SSCD-Part6": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_FSP": 1,
"ADV_IMP": 1,
"ADV_INT": 1,
"ADV_SPM": 1,
"ADV_TDS": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_PRE": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMS": 1,
"ALC_DEL": 1,
"ALC_DVS": 1,
"ALC_DVS.2": 2,
"ALC_FLR": 2,
"ALC_TAT": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_ECD": 1,
"ASE_INT": 1,
"ASE_OBJ": 1,
"ASE_REQ": 1,
"ASE_SPD": 1,
"ASE_TSS": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_DPT": 1,
"ATE_FUN": 1,
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.5": 5
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 3": 1,
"EAL 5": 3,
"EAL 7": 1,
"EAL2": 2,
"EAL7": 1
},
"ITSEC": {
"ITSEC E6 Elev\u00e9": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"CEA-LETI": {
"CEA - LETI": 1,
"CEA-LETI": 2
},
"CESTI": {
"CESTI": 3
},
"Serma": {
"SERMA": 8
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {
"JCOP": {
"JCOP 3": 5
}
},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1,
"CCMB-2017-04-004": 1
}
},
"symmetric_crypto": {
"DES": {
"DES": {
"DES": 1
}
}
},
"technical_report_id": {
"BSI": {
"BSI TR-03110": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Idemia": {
"IDEMIA": 24
},
"NXP": {
"NXP": 9,
"NXP Semiconductors": 1
},
"Oberthur": {
"Oberthur Technologies": 1
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "G\u00e9raldine Avou\u00e9",
"/CreationDate": "D:20190913105844+02\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2010",
"/Keywords": "ANSSI-CC-CER-F-07.29",
"/ModDate": "D:20190913105844+02\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2010",
"/Subject": "IDeal Citiz v2.3-n embedding ID.me 1.6-n application",
"/Title": "ANSSI-CC-2019/32",
"pdf_file_size_bytes": 732853,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"mailto:[email protected]",
"http://www.ssi.gouv.fr/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 18
},
"st_filename": "anssi-cible-cc-2019_32en.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 18
},
"ECDH": {
"ECDH": 4
},
"ECDSA": {
"ECDSA": 4
}
},
"FF": {
"DH": {
"DH": 2
}
},
"RSA": {
"RSA-OAEP": 1,
"RSA-PSS": 1
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0973-2016": 1,
"BSI-DSZ-CC-1059-2018": 3
},
"NL": {
"CC-16-67206-CR": 1,
"CC-18-67206": 2
}
},
"cc_claims": {
"A": {
"A.CGA": 6,
"A.CSP": 9,
"A.SCA": 5
},
"D": {
"D.SCD": 1,
"D.SVD": 1
},
"OE": {
"OE.HID_VAD": 7,
"OE.HI_VAD": 2
}
},
"cc_protection_profile_id": {
"ANSSI": {
"ANSSI-CC-PP-": 1
},
"BSI": {
"BSI-CC-PP-0059-2009-MA-01": 1,
"BSI-CC-PP-0068-V2-2011": 1,
"BSI-CC-PP-0071-2012": 1,
"BSI-CC-PP-0072-2012": 1,
"BSI-CC-PP-0075-2012": 1,
"BSI-CC-PP-0076-2013": 1,
"BSI-CC-PP-0084-2014": 1,
"BSI-CC-PP-0086": 1
},
"other": {
"PP-SSCD2": 22,
"PP-SSCD3": 22,
"PP-SSCD4": 22,
"PP-SSCD5": 23,
"PP-SSCD6": 21
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 5,
"ADV_FSP.1": 3,
"ADV_FSP.2": 2,
"ADV_FSP.4": 1,
"ADV_FSP.5": 8,
"ADV_IMP.1": 8,
"ADV_TDS.1": 2,
"ADV_TDS.3": 3,
"ADV_TDS.4": 8
},
"AGD": {
"AGD_OPE": 6,
"AGD_OPE.1": 5,
"AGD_PRE": 7,
"AGD_PRE.1": 5
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.1": 1,
"ALC_CMS.5": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_DVS.2": 8,
"ALC_LCD.1": 3,
"ALC_TAT.1": 2,
"ALC_TAT.2": 3
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 4,
"ASE_INT.1": 5,
"ASE_OBJ.2": 3,
"ASE_REQ.1": 2,
"ASE_REQ.2": 2,
"ASE_SPD.1": 2,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.1": 2,
"ATE_COV.2": 3,
"ATE_DPT.1": 1,
"ATE_DPT.3": 1,
"ATE_FUN.1": 6
},
"AVA": {
"AVA_VAN.5": 7
}
},
"cc_security_level": {
"EAL": {
"EAL 5": 1,
"EAL 5 augmented": 1,
"EAL 5+": 1,
"EAL4+": 1,
"EAL5": 6,
"EAL5 augmented": 4,
"EAL5+": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1
},
"FCS": {
"FCS_CKM": 24,
"FCS_CKM.1": 25,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 2,
"FCS_CKM.4": 31,
"FCS_CKM.4.1": 1,
"FCS_COP": 41,
"FCS_COP.1": 17,
"FCS_COP.1.1": 1,
"FCS_RND": 5,
"FCS_RND.1": 20,
"FCS_RND.1.1": 2,
"FCS_RNG.1": 1
},
"FDP": {
"FDP_ACC": 67,
"FDP_ACC.1": 19,
"FDP_ACF": 56,
"FDP_ACF.1": 30,
"FDP_DAU": 9,
"FDP_DAU.2": 2,
"FDP_IFC.1": 9,
"FDP_ITC": 11,
"FDP_ITC.1": 9,
"FDP_ITC.2": 6,
"FDP_RIP.1": 25,
"FDP_RIP.1.1": 1,
"FDP_SDI": 20,
"FDP_SDI.2": 4,
"FDP_UCT": 22,
"FDP_UCT.1": 2,
"FDP_UIT": 18,
"FDP_UIT.1": 4
},
"FIA": {
"FIA_AFL": 36,
"FIA_AFL.1": 13,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_API": 19,
"FIA_API.1": 12,
"FIA_API.1.1": 2,
"FIA_SOS.2": 1,
"FIA_UAU": 93,
"FIA_UAU.1": 23,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UAU.4": 1,
"FIA_UAU.5": 3,
"FIA_UAU.6": 2,
"FIA_UID": 34,
"FIA_UID.1": 25,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1
},
"FMT": {
"FMT_LIM": 5,
"FMT_LIM.1": 14,
"FMT_LIM.1.1": 2,
"FMT_LIM.2": 13,
"FMT_LIM.2.1": 2,
"FMT_MOF.1": 9,
"FMT_MOF.1.1": 1,
"FMT_MSA": 21,
"FMT_MSA.1": 5,
"FMT_MSA.2": 11,
"FMT_MSA.2.1": 1,
"FMT_MSA.3": 24,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MSA.4": 13,
"FMT_MSA.4.1": 1,
"FMT_MTD": 174,
"FMT_MTD.1": 15,
"FMT_MTD.3": 11,
"FMT_MTD.3.1": 1,
"FMT_SMF.1": 57,
"FMT_SMF.1.1": 1,
"FMT_SMR": 28,
"FMT_SMR.1": 37,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_EMS": 5,
"FPT_EMS.1": 16,
"FPT_EMS.1.1": 4,
"FPT_EMS.1.2": 3,
"FPT_FLS.1": 12,
"FPT_FLS.1.1": 1,
"FPT_PHP.1": 7,
"FPT_PHP.1.1": 1,
"FPT_PHP.1.2": 1,
"FPT_PHP.3": 15,
"FPT_PHP.3.1": 1,
"FPT_TST": 1,
"FPT_TST.1": 17,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FTP": {
"FTP_ITC": 73,
"FTP_ITC.1": 22,
"FTP_TRP.1": 4
}
},
"certification_process": {
"OutOfScope": {
"of the Common Criteria certified IDEMIA IDeal Pass v2.3-n JC with Privacy Protection applet (out of scope of this TOE). IDeal Citiz v2.3-n enforces separation of the data between the applets and associated": 1,
"out of scope": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 11
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PACE": {
"PACE": 120
},
"PGP": {
"PGP": 1
}
},
"crypto_scheme": {
"KA": {
"Key agreement": 1
},
"MAC": {
"MAC": 8
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"CEA-LETI": {
"CEA-LETI": 1
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 6
},
"SHA2": {
"SHA-224": 6,
"SHA-256": 5,
"SHA-384": 5,
"SHA-512": 6
}
}
},
"ic_data_group": {
"EF": {
"EF.ChipSecurity": 1
}
},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {
"JCOP": {
"JCOP 3": 10
}
},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 2
}
},
"side_channel_analysis": {
"FI": {
"DFA": 1,
"Malfunction": 5,
"Physical Tampering": 1,
"fault injection": 1,
"malfunction": 5,
"physical tampering": 7
},
"SCA": {
"DPA": 3,
"SPA": 3,
"physical probing": 3,
"side channel": 1,
"timing attacks": 2
}
},
"standard_id": {
"BSI": {
"AIS20": 2
},
"CC": {
"CCMB-2012-09-004": 1,
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 2,
"CCMB-2017-04-003": 2,
"CCMB-2017-04-004": 1
},
"FIPS": {
"FIPS PUB 180-2": 2,
"FIPS180-4": 1
},
"ICAO": {
"ICAO": 2
},
"ISO": {
"ISO/IEC 15408:2005": 2,
"ISO/IEC 7816-4": 1,
"ISO/IEC 9797-1": 3
},
"NIST": {
"NIST SP 800-38B": 1
},
"PKCS": {
"PKCS#1": 4,
"PKCS1": 4
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 20
}
},
"DES": {
"3DES": {
"3DES": 10,
"TDES": 9
},
"DES": {
"DES": 1
}
},
"constructions": {
"MAC": {
"CMAC": 5,
"KMAC": 2
}
}
},
"technical_report_id": {
"BSI": {
"BSI TR-03110": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Idemia": {
"IDEMIA": 12
},
"NXP": {
"NXP": 20
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "G509704",
"/CreationDate": "D:20190717162824+02\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2016",
"/ModDate": "D:20190717162824+02\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2016",
"/Title": "Title",
"pdf_file_size_bytes": 2697853,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 142
}
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": null,
"pp_ids": null,
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0071b_pdf.pdf",
"pp_name": "Protection profiles for secure signature creation device \u2014 Part 4: Extension for device with key gene..."
},
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": null,
"pp_ids": null,
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0076b_pdf.pdf",
"pp_name": "Protection profiles for secure signature creation device - Part 6: Extension for device with key impo..."
},
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": null,
"pp_ids": null,
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0072b_pdf.pdf",
"pp_name": "Protection profiles for secure signature creation device \u2014 Part 5: Extension for device with key gene..."
},
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": null,
"pp_ids": null,
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf",
"pp_name": "Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Version..."
},
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": null,
"pp_ids": null,
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0075b_pdf.pdf",
"pp_name": "Protection profiles for secure signature creation device - Part 3: Device with key import"
}
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2019_32fr.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"AVA_VAN.5",
"EAL5+",
"ALC_DVS.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2019_32en.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "76a7e1edc091abf39044cfa5a1de721f3d7b715ecc7b959ebd623821a1578a1a",
"txt_hash": "feb9b75017a689d26e6949dbb60677f45eff7969f909c67010d62337f74ae3c7"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "142d09f99d82918dd2e6f69bc278b23a3550ab948560e92e8b70bda77defa1de",
"txt_hash": "a52a18403721acb9aa67a72bd66f9ed48f428d9f8e289032e452b2852ae11d14"
}
},
"status": "archived"
}