MultiApp V5.1 Java Card Virtual Machine Version 5.1 (ANSSI-CC-2023/45)

CSV information ?

Status active
Valid from 13.11.2023
Valid until 13.11.2028
Scheme 🇫🇷 FR
Manufacturer THALES DIS FRANCE SA
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level EAL7
Maintenance updates ANSSI-CC-2023/45-M01 (04.04.2024) Certification report Security target

Heuristics summary ?

Certificate ID: ANSSI-CC-2023/45

Certificate ?

Extracted keywords

Security level
EAL7, EAL2
Certificates
ANSSI-CC-2023/45
Evaluation facilities
CEA - LETI

File metadata

Creation date D:20231129170130+01'00'
Modification date D:20231129170302+01'00'
Pages 2
Creator Acrobat PDFMaker 23 pour Word
Producer Adobe PDF Library 23.1.175

Certification report ?

Extracted keywords

Symmetric Algorithms
DES

CPLC
IC Fabricator

Security level
EAL 7, EAL2, EAL6, EAL7, ITSEC E6 Elevé
Security Assurance Requirements (SAR)
AGD_OPE, AGD_PRE, ALC_FLR.2, ALC_FLR, AVA_VAN
Protection profiles
BSI-PP-0084-2014
Certificates
ANSSI-CC-2023/45, ANSSI-CC-2023/01, ANSSI-CC-2023/31
Evaluation facilities
CESTI, CEA - LETI

Standards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003

File metadata

Creation date D:20231129165959+01'00'
Modification date D:20231129170305+01'00'
Pages 15
Creator Acrobat PDFMaker 23 pour Word
Producer Adobe PDF Library 23.1.175

References

Outgoing

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES, HMAC
Asymmetric Algorithms
ECC, DH
Hash functions
SHA3
Protocols
PACE
Randomness
RNG

JavaCard versions
Java Card 3.1
JavaCard API constants
TYPE_ACCESS
CPLC
IC Fabricator, IC Type
Trusted Execution Environments
SE
Vendor
Infineon, Thales

Security level
EAL7, EAL6, EAL 6+
Claims
D.APP_CODE, D.APP_C_DATA, D.APP_I_DATA, D.PIN, D.API_DATA, D.CRYPTO, D.JCS_CODE, D.JCS_DATA, D.SEC_DATA, O.FIREWALL, O.ARRAY_VIEWS_CONFID, O.GLOBAL_ARRAYS_INTEG, O.ARRAY_VIEW_CONFID, O.ARRAY_VIEWS_INTEG, O.APPLET, O.CODE_CAP_FILE, O.JAVAOBJECT, T.CONFID-APPLI-DATA, T.CONFID-JCS-CODE, T.CONFID-JCS-DATA, T.INTEG-APPLI-CODE, T.INTEG-APPLI-DATA, T.INTEG-JCS-CODE, T.INTEG-JCS-DATA, T.SID, T.EXE-CODE, T.NATIVE, A.VERIFICATION, A.CAP_FILE, R.JAVA, OP.ARRAY_ACCESS, OP.ARRAY_LENGTH, OP.ARRAY_AASTORE, OP.ARRAY_T_ALOAD, OP.ARRAY_T_ASTORE, OP.CREATE, OP.DELETE_APPLET, OP.DELETE_CAP_FILE, OP.DELETE_CAP_FILE_APPLET, OP.INSTANCE_FIELD, OP.INVK_VIRTUAL, OP.INVK_INTERFACE, OP.JAVA, OP.THROW, OP.TYPE_ACCESS, OP.PUT, OP.PUTFIELD, OP.PUTSTATIC, OE.VERIFICATION, OE.CAP_FILE, OE.CODE-EVIDENCE, OE.SID, OE.NATIVE, OE.OPERATE, OE.REALLOCATION, OE.LOAD, OE.INSTALL, OE.ALARM, OE.CARD-MANAGEMENT, OE.SCP, OE.CARD_MANAGEMENT, OSP.VERIFICATION
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.6, ADV_IMP.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.6, ADV_FSP.4, ADV_ARC, ADV_TDS.1, ADV_IMP.1, ADV_TDS.3, ADV_FSP.1, ADV_FSP.2, ADV_TDS.4, AGD_OPE, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC.5, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_LCD.2, ALC_TAT.3, ALC_TAT.1, ALC_TAT, ALC_LCD.1, ATE_COV.3, ATE_DPT.4, ATE_FUN.2, ATE_IND.3, ATE_FUN.1, ATE_COV.1, ATE_DPT.1, AVA_VAN.5, ASE_TSS.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_ARP.1, FAU_SAS.1, FCO_NRO, FCS_RNG.1, FCS_RNG, FDP_ACC, FDP_ACF, FDP_IFC, FDP_IFF, FDP_ROL, FDP_RIP, FDP_SDI, FDP_ITC, FDP_UIT, FDP_ACC.2, FDP_ACF.1, FDP_IFC.1, FDP_IFF.1, FDP_ACC.1, FDP_SDC.1, FDP_SDI.2, FDP_ITT.1, FDP_UCT.1, FDP_UIT.1, FIA_ATD, FIA_UID, FIA_USB, FIA_UAU, FIA_UID.1, FIA_API.1, FMT_MSA, FMT_SMF, FMT_SMR, FMT_MTD, FMT_SMR.1, FMT_SMF.1, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_MTD.1, FMT_LIM.1, FMT_LIM, FMT_LIM.2, FPR_UNO.1, FPR_UNO, FPT_FLS, FPT_TDC.1, FPT_RCV, FPT_TST, FPT_PHP, FPT_ITT, FPT_FLS.1, FPT_PHP.3, FPT_ITT.1, FRU_FLT.2, FTP_ITC, FTP_TRP, FTP_ITC.1
Protection profiles
BSI-CC-PP-0084-, BSI-CC-PP-0099-V2-2020, BSI-CC-PP-0084-2014
Certificates
ANSSI-CC-2023/01, CC-1, CC-2, CC-3

Side-channel analysis
physical probing, malfunction
Certification process
out of scope, • The DELETE and INSTALL APDU commands are out of scope of this SPM, 1, are out of the scope of the SPM as they are linked to the applet loading or deletion that is out of scope of the SPM boundaries limited to VM opcodes The SFR FMT_MTD.3/JCRE is out of scope of the SPM, because AID registry is created during loading phase, which is also out of scope of the SPM (Hypothesis 2 of the SPM document [MAV51_SPM]). MultiApp V5.1: Security Target Java, the active context is not the same as the Selected Applet Context. Application note: This rule is out of scope of the SPM modelisation because CLEAR_ON_DESELECT objects can be created exclusively in the API, is also out of scope (Hypothesis 4 of the SPM document [MAV51_SPM]).. 3) S.CAP_FILE performing OP.ARRAY_AASTORE of the, as a null reference. Such a mechanism is implementation-dependent. The deletion of applets is out of scope of this SPM scope. In the case of an array type, fields are components of the array ([JVM], §2.14, management functions: • Modify the Currently Active Context Note: the Selected Applet context is out of scope of the VM functionalities. It is a process that occurs prior to VM start The initial setting of, and deletion; see #.DELETION and #.INSTALL). • The DELETE and INSTALL APDU commands are out of scope of this SPM. The list of registred applets’ AIDs is proven to be not modified during the execution

Standards
BSI-AIS31, AIS31, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003

File metadata

Title MultiApp V5.1: JCVM Security Target
Author OHAYON Franck
Creation date D:20230606163814+02'00'
Modification date D:20230606163814+02'00'
Pages 60
Creator Microsoft® Word for Microsoft 365
Producer Microsoft® Word for Microsoft 365

References

Outgoing

Heuristics ?

Certificate ID: ANSSI-CC-2023/45

Extracted SARs

ATE_COV.3, ASE_SPD.1, ATE_IND.3, AGD_OPE.1, ADV_FSP.6, ADV_TDS.6, ALC_LCD.2, ADV_IMP.2, ALC_CMC.5, ALC_FLR.2, ALC_TAT.3, AGD_PRE.1, ASE_CCL.1, ALC_DVS.2, ATE_FUN.2, ASE_ECD.1, ASE_OBJ.2, ALC_CMS.5, ADV_ARC.1, ALC_DEL.1, ASE_TSS.2, AVA_VAN.5, ADV_INT.3, ATE_DPT.4, ADV_SPM.1, ASE_REQ.2, ASE_INT.1

Similar certificates

Name Certificate ID
Produit IAS Classic v5.2.1 with MOC Server v3.1 on MultiApp V5.1 Version 5.2.1.A.C et 5.2.1.A.O ( ANSSI-CC-2023/42 ) ANSSI-CC-2023/42 Compare
Plateforme ouverte Java Card MultiApp V4.1 en configuration ouverte masquée sur le composant S3FT9MH(Version 4.1.0.2) ( ANSSI-CC-2023/30 ) ANSSI-CC-2023/30 Compare
eTravel 3.1 BAC on MultiApp V5.1 Version 3.1.0.0 ( ANSSI-CC-2023/34 ) ANSSI-CC-2023/34 Compare
eTravel 3.1 EAC on BAC on MultiApp V5.1 Version 3.1.0.0 ( ANSSI-CC-2023/35 ) ANSSI-CC-2023/35 Compare
eTravel 3.1 EAC on SAC on MultiApp V5.1 Version 3.1.0.0 ( ANSSI-CC-2023/36 ) ANSSI-CC-2023/36 Compare
IAS Classic V4.4.2 with MOC Server 1.1 on MultiApp V4.1 version IAS : 4.4.2.A, version MOC Server : 1.1.1A (ANSSI-CC-2023/57 ) ANSSI-CC-2023/57 Compare
MultiApp V5.1 (version 5.1) ( 2023/31) ANSSI-CC-2023/31 Compare
ChipDoc v4.1 on JCOP 4.5 P71 in ICAO EAC(1&2) with PACE configuration Version 4.1.1.52 ( ANSSI-CC-2023/68) ANSSI-CC-2023/68 Compare
ChipDoc v4.1 on JCOP 4.5 P71 in SSCD configuration Version 4.1.1.52 (ANSSI-CC-2023/69) ANSSI-CC-2023/69 Compare
ChipDoc v4.1 on JCOP 4.5 P71 in ICAO BAC configuration Version 4.1.1.52 ( ANSSI-CC-2023/67) ANSSI-CC-2023/67 Compare
Platforme MultiApp V5.1 GP-SE (version 5.1) (2023/33) ANSSI-CC-2023/33 Compare
eTravel v2.3 on MultiApp v4.1 platform, BAC and AA activated (version 2.3.0.1) (ANSSI-CC-2023/54) ANSSI-CC-2023/54 Compare
eTravel v2.3 on MultiApp v4.1 platform, PACE, EAC and AA activated(version 2.3.0.1) ( ANSSI-CC-2023/55 ) ANSSI-CC-2023/55 Compare
eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated (version 2.3.0.1) (ANSSI-CC-2023/56) ANSSI-CC-2023/56 Compare
ChipDoc v4 on JCOP 4.5 P71 in ICAO EAC(1&2) with PACE configuration (Version 4.0.1.52) (ANSSI-CC-2023/11-R01) ANSSI-CC-2023/11-R01 Compare
ChipDoc v4 on JCOP 4.5 P71 in SSCD configuration (Version 4.0.1.52) (ANSSI-CC-2023/12-R01) ANSSI-CC-2023/12-R01 Compare
ChipDoc v4 on JCOP 4.5 P71 in ICAO BAC configuration (Version 4.0.1.52) ( ANSSI-CC-2023/10-R01 ) ANSSI-CC-2023/10-R01 Compare
Plateforme Java Card MultiApp V4.2 en configuration ouverte sur le composant IFX_CCI_000010h (Version 4.2.0, Java Card version 3.0.5, GP version 2.3) ANSSI-CC-2020/65v2 Compare
eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated Référence/version du produit Version de l’application eTravel : 2.3 Version de la plateforme Java Card MultiApp : 4.1 ANSSI-CC-2018/58v2 Compare
eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated Référence/version du produit Version de l’application eTravel : 2.3 Version de la plateforme Java Card MultiApp : 4.1 ANSSI-CC-2018/56v2 Compare
eTravel v2.3 on MultiApp v4.1 platform, PACE, EAC and AA activated Version de l’application eTravel : 2.3 Version de la plateforme Java Card MultiApp : 4.1 ANSSI-CC-2018/57v2 Compare
MultiApp V5.0 Java Card Virtual Machine ANSSI-CC-2022/37 Compare
Plateforme Java Card MultiApp V5.0.A - version 5.0.A ANSSI-CC-2022/52 Compare
Plateforme Java Card MultiApp V5.0.A version 5.0.A ANSSI-CC-2022/10 Compare
Plateforme Java Card MultiApp V5.0 version 5.0 ANSSI-CC-2021/42 Compare
Samsung TEEgris on Exynos 2200 (Version 5.0.0.0) (ANSSI-CC-2023/71) ANSSI-CC-2023/71 Compare
IDmove v5 on SCR404U in EAC configuration with AA in optionOS Commercial Version : 0x098912 ; OS Unique Identifier : 0xB7BC0108 et E48C0108 (ANSSI-CC-2023/64) ANSSI-CC-2023/64 Compare
IDmove v5 on SCR404U in PACE configuration with AA and/or CA in optionOS Commercial Version : 0x098912 ; OS Unique Identifier : 0xB7BC0108 et E48C0108 (ANSSI-CC-2023/66) ANSSI-CC-2023/66 Compare
IDmove v5 on SCR404U in EAC with PACE configuration and LDSv2, AA in optionOS Commercial Version : 0x098912 ; OS Unique Identifier : 0xB7BC0108 et E48C0108 ( ANSSI-CC-2023/65) ANSSI-CC-2023/65 Compare
IDmove v5 on SCR404U in BAC configuration with AA and/or CA in option(OS Commercial Version : 0x098912;OS Unique Identifier : 0xB7BC0108 et E48C0108),(ANSSI-CC-2023/63) ANSSI-CC-2023/63 Compare
Strong Customer Authentication for Apple Pay on Mac mini with M2 and Magic keyboard with Touch ID, running macOS Ventura 13.3.1 , macOS Ventura 13.3.1 (build 22E261) ( ANSSI-CC-2023/61) ANSSI-CC-2023/61 Compare
Plateforme Java Card en configuration ouverte de la carte à puce MultiApp v3.1 masquée sur le composant P60D144PVA (version du patch: 1.3) ANSSI-CC-2015/15 Compare
Plateforme Java Card en configuration ouverte de la carte à puce MultiApp v3.1 masquée sur le composant P60D080PVC(Version du patch : 1.4) ANSSI-CC-2014/86 Compare
Strong Customer Authentication pour Apple Pay sur Apple Watch avec S7 exécutant watchOS 8.5.1 (Version 8.5.1 (build 19T252)) ANSSI-CC-2023/17 Compare
Plateforme Java Card MultiApp GP-SE (version 5.0) ANSSI-CC-2022/23 Compare
Showing 5 out of 35.

Scheme data ?

Product MultiApp V5.1 Java Card Virtual Machine (version 5.1)
Url https://cyber.gouv.fr/produits-certifies/multiapp-v51-java-card-virtual-machine-version-51
Description Le produit évalué est la carte « MultiApp V5.1 Java Card Virtual Machine, version 5.1 » développé par THALES DIS FRANCE SAS et THALES DIS DESIGN SERVICES. La « plateforme MultiApp V5.1 » de la carte a déjà fait l’objet d’une certification au niveau EAL6 augmenté du composant ALC_FLR.2.
Sponsor THALES DIS FRANCE SAS
Developer THALES DIS FRANCE SAS
Cert Id ANSSI-CC-2023/45
Level EAL7
Expiration Date 13 Novembre 2028
Enhanced
Cert Id ANSSI-CC-2023/45
Certification Date 13/11/2023
Expiration Date 13/11/2028
Category Cartes Ă  puce
Cc Version Critères Communs version 3.1r5
Developer THALES DIS FRANCE SAS
Sponsor THALES DIS FRANCE SAS
Evaluation Facility THALES DIS FRANCE SAS
Level EAL7
Protection Profile
Mutual Recognition CCRA SOG-IS
Augmented NA
Report Link https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_45fr_0.pdf
Target Link https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_45en_0.pdf
Cert Link https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2023_45fr_0.pdf

References ?

Updates ?

  • 14.10.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'MultiApp V5.1 Java Card Virtual Machine (version 5.1)', 'url': 'https://cyber.gouv.fr/produits-certifies/multiapp-v51-java-card-virtual-machine-version-51', 'description': 'Le produit Ă©valuĂ© est la carte « MultiApp V5.1 Java Card Virtual Machine, version 5.1 » dĂ©veloppĂ© par THALES DIS FRANCE SAS et THALES DIS DESIGN SERVICES. La « plateforme MultiApp V5.1 » de la carte a dĂ©jĂ  fait l’objet d’une certification au niveau EAL6 augmentĂ© du composant ALC_FLR.2.', 'sponsor': 'THALES DIS FRANCE SAS', 'developer': 'THALES DIS FRANCE SAS', 'cert_id': 'ANSSI-CC-2023/45', 'level': 'EAL7', 'expiration_date': '13 Novembre 2028', 'enhanced': {'cert_id': 'ANSSI-CC-2023/45', 'certification_date': '13/11/2023', 'expiration_date': '13/11/2028', 'category': 'Cartes Ă  puce', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'THALES DIS FRANCE SAS', 'sponsor': 'THALES DIS FRANCE SAS', 'evaluation_facility': 'THALES DIS FRANCE SAS', 'level': 'EAL7', 'protection_profile': '', 'mutual_recognition': 'CCRA\n SOG-IS', 'augmented': 'NA', 'report_link': 'https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_45fr_0.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_45en_0.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2023_45fr_0.pdf'}}.
  • 02.09.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '3773a1dc0b9f29b3735ebf7fbe627770d344e8eb9bd712fd2074241f388b8292', 'txt_hash': '8f7a45b5a11368ef2aea048f2475bd6d0a5a36f23a2bc0f56732d220dcefefe3'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'e8e346322a5c5c7cf8a4e888366382882aa9a71387e712598a352314be1431da', 'txt_hash': 'bac458caf43a57a50dbd5a4cbc60f4578caeeb45b23f024afdec4ad2e01d4273'} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 1232740, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 60, '/Title': 'MultiApp V5.1: JCVM Security Target', '/Author': 'OHAYON Franck', '/Creator': 'Microsoft® Word for Microsoft 365', '/CreationDate': "D:20230606163814+02'00'", '/ModDate': "D:20230606163814+02'00'", '/Producer': 'Microsoft® Word for Microsoft 365', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 130676, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 2, '/CreationDate': "D:20231129170130+01'00'", '/Creator': 'Acrobat PDFMaker 23 pour Word', '/Keywords': '', '/ModDate': "D:20231129170302+01'00'", '/Producer': 'Adobe PDF Library 23.1.175', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2023/01': 1}, 'NL': {'CC-1': 2, 'CC-2': 3, 'CC-3': 3}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-': 1, 'BSI-CC-PP-0099-V2-2020': 1, 'BSI-CC-PP-0084-2014': 1}}, 'cc_security_level': {'EAL': {'EAL7': 36, 'EAL6': 1, 'EAL 6+': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 6, 'ADV_FSP.6': 5, 'ADV_IMP.2': 5, 'ADV_INT.3': 2, 'ADV_SPM.1': 8, 'ADV_TDS.6': 7, 'ADV_FSP.4': 4, 'ADV_ARC': 1, 'ADV_TDS.1': 2, 'ADV_IMP.1': 4, 'ADV_TDS.3': 3, 'ADV_FSP.1': 1, 'ADV_FSP.2': 1, 'ADV_TDS.4': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1, 'AGD_OPE.1': 6, 'AGD_PRE.1': 6}, 'ALC': {'ALC_FLR.2': 1, 'ALC_CMC.5': 4, 'ALC_CMS.5': 1, 'ALC_DEL.1': 2, 'ALC_DVS.2': 4, 'ALC_LCD.2': 3, 'ALC_TAT.3': 3, 'ALC_TAT.1': 2, 'ALC_TAT': 1, 'ALC_LCD.1': 1}, 'ATE': {'ATE_COV.3': 3, 'ATE_DPT.4': 2, 'ATE_FUN.2': 4, 'ATE_IND.3': 2, 'ATE_FUN.1': 3, 'ATE_COV.1': 2, 'ATE_DPT.1': 1}, 'AVA': {'AVA_VAN.5': 2}, 'ASE': {'ASE_TSS.2': 1, 'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 1, 'FAU_SAS.1': 1}, 'FCO': {'FCO_NRO': 1}, 'FCS': {'FCS_RNG.1': 2, 'FCS_RNG': 1}, 'FDP': {'FDP_ACC': 21, 'FDP_ACF': 17, 'FDP_IFC': 16, 'FDP_IFF': 11, 'FDP_ROL': 2, 'FDP_RIP': 9, 'FDP_SDI': 3, 'FDP_ITC': 2, 'FDP_UIT': 2, 'FDP_ACC.2': 2, 'FDP_ACF.1': 9, 'FDP_IFC.1': 6, 'FDP_IFF.1': 8, 'FDP_ACC.1': 7, 'FDP_SDC.1': 1, 'FDP_SDI.2': 1, 'FDP_ITT.1': 1, 'FDP_UCT.1': 1, 'FDP_UIT.1': 1}, 'FIA': {'FIA_ATD': 2, 'FIA_UID': 5, 'FIA_USB': 1, 'FIA_UAU': 2, 'FIA_UID.1': 1, 'FIA_API.1': 1}, 'FMT': {'FMT_MSA': 61, 'FMT_SMF': 18, 'FMT_SMR': 19, 'FMT_MTD': 9, 'FMT_SMR.1': 9, 'FMT_SMF.1': 6, 'FMT_MSA.1': 6, 'FMT_MSA.2': 2, 'FMT_MSA.3': 9, 'FMT_MTD.1': 1, 'FMT_LIM.1': 1, 'FMT_LIM': 10, 'FMT_LIM.2': 1}, 'FPR': {'FPR_UNO.1': 1, 'FPR_UNO': 1}, 'FPT': {'FPT_FLS': 10, 'FPT_TDC.1': 1, 'FPT_RCV': 2, 'FPT_TST': 1, 'FPT_PHP': 3, 'FPT_ITT': 2, 'FPT_FLS.1': 1, 'FPT_PHP.3': 1, 'FPT_ITT.1': 1}, 'FRU': {'FRU_FLT.2': 1}, 'FTP': {'FTP_ITC': 3, 'FTP_TRP': 1, 'FTP_ITC.1': 1}}, 'cc_claims': {'D': {'D.APP_CODE': 5, 'D.APP_C_DATA': 2, 'D.APP_I_DATA': 3, 'D.PIN': 4, 'D.API_DATA': 3, 'D.CRYPTO': 3, 'D.JCS_CODE': 3, 'D.JCS_DATA': 4, 'D.SEC_DATA': 5}, 'O': {'O.FIREWALL': 15, 'O.ARRAY_VIEWS_CONFID': 4, 'O.GLOBAL_ARRAYS_INTEG': 4, 'O.ARRAY_VIEW_CONFID': 1, 'O.ARRAY_VIEWS_INTEG': 2, 'O.APPLET': 2, 'O.CODE_CAP_FILE': 3, 'O.JAVAOBJECT': 38}, 'T': {'T.CONFID-APPLI-DATA': 3, 'T.CONFID-JCS-CODE': 3, 'T.CONFID-JCS-DATA': 3, 'T.INTEG-APPLI-CODE': 6, 'T.INTEG-APPLI-DATA': 6, 'T.INTEG-JCS-CODE': 3, 'T.INTEG-JCS-DATA': 3, 'T.SID': 6, 'T.EXE-CODE': 6, 'T.NATIVE': 3}, 'A': {'A.VERIFICATION': 3, 'A.CAP_FILE': 3}, 'R': {'R.JAVA': 9}, 'OP': {'OP.ARRAY_ACCESS': 7, 'OP.ARRAY_LENGTH': 3, 'OP.ARRAY_AASTORE': 3, 'OP.ARRAY_T_ALOAD': 3, 'OP.ARRAY_T_ASTORE': 3, 'OP.CREATE': 9, 'OP.DELETE_APPLET': 1, 'OP.DELETE_CAP_FILE': 1, 'OP.DELETE_CAP_FILE_APPLET': 1, 'OP.INSTANCE_FIELD': 6, 'OP.INVK_VIRTUAL': 8, 'OP.INVK_INTERFACE': 10, 'OP.JAVA': 6, 'OP.THROW': 7, 'OP.TYPE_ACCESS': 7, 'OP.PUT': 8, 'OP.PUTFIELD': 1, 'OP.PUTSTATIC': 1}, 'OE': {'OE.VERIFICATION': 25, 'OE.CAP_FILE': 4, 'OE.CODE-EVIDENCE': 11, 'OE.SID': 8, 'OE.NATIVE': 7, 'OE.OPERATE': 13, 'OE.REALLOCATION': 5, 'OE.LOAD': 5, 'OE.INSTALL': 4, 'OE.ALARM': 11, 'OE.CARD-MANAGEMENT': 2, 'OE.SCP': 16, 'OE.CARD_MANAGEMENT': 10}, 'OSP': {'OSP.VERIFICATION': 3}}, 'vendor': {'Infineon': {'Infineon': 1}, 'Thales': {'Thales': 32}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}}, 'DES': {'DES': {'DES': 1}}, 'constructions': {'MAC': {'HMAC': 1}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 3}}, 'FF': {'DH': {'DH': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA3': {'SHA3': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {'PACE': {'PACE': 2}}, 'randomness': {'RNG': {'RNG': 1}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 1}, 'FI': {'malfunction': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 2}}, 'os_name': {}, 'cplc_data': {'ICFab': {'IC Fabricator': 1}, 'ICType': {'IC Type': 1}}, 'ic_data_group': {}, 'standard_id': {'BSI': {'BSI-AIS31': 1, 'AIS31': 1}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1}}, 'javacard_version': {'JavaCard': {'Java Card 3.1': 4}}, 'javacard_api_const': {'misc': {'TYPE_ACCESS': 7}}, 'javacard_packages': {'javacard': {'javacard.iasclassic': 1, 'javacard.mspnp': 1, 'javacard.eid': 1, 'javacard.fido.ctap': 1}, 'javacardx': {'javacardx.gdp': 1}, 'com': {'com.gemalto.javacardx.gdp': 1, 'com.gemalto.javacard.iasclassic': 1, 'com.gemalto.moc.client': 1, 'com.gemalto.moc.server': 1, 'com.gemalto.javacard.mspnp': 1, 'com.gemalto.puredi': 1, 'com.gemalto.tacho': 1, 'com.gemalto.belpic': 1, 'com.gemalto.javacard.eid': 1, 'com.gemalto.mpcos': 1, 'com.gemalto.javacard.fido.ctap': 1}}, 'certification_process': {'OutOfScope': {'out of scope': 8, ' • The DELETE and INSTALL APDU commands are out of scope of this SPM': 1, '1, are out of the scope of the SPM as they are linked to the applet loading or deletion that is out of scope of the SPM boundaries limited to VM opcodes The SFR FMT_MTD.3/JCRE is out of scope of the SPM': 1, 'because AID registry is created during loading phase, which is also out of scope of the SPM (Hypothesis 2 of the SPM document [MAV51_SPM]). MultiApp V5.1: Security Target Java': 1, 'the active context is not the same as the Selected Applet Context. Application note: This rule is out of scope of the SPM modelisation because CLEAR_ON_DESELECT objects can be created exclusively in the API': 1, 'is also out of scope (Hypothesis 4 of the SPM document [MAV51_SPM]).. 3) S.CAP_FILE performing OP.ARRAY_AASTORE of the': 1, 'as a null reference. Such a mechanism is implementation-dependent. The deletion of applets is out of scope of this SPM scope. In the case of an array type, fields are components of the array ([JVM], §2.14': 1, 'management functions: • Modify the Currently Active Context Note: the Selected Applet context is out of scope of the VM functionalities. It is a process that occurs prior to VM start The initial setting of': 1, 'and deletion; see #.DELETION and #.INSTALL). • The DELETE and INSTALL APDU commands are out of scope of this SPM. The list of registred applets’ AIDs is proven to be not modified during the execution': 1}}}.
    • The cert_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2023/45': 2}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL7': 1, 'EAL2': 1}}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'CEA-LETI': {'CEA - LETI': 2}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to ANSSI-cible-CC-2023_45en.pdf.
    • The cert_filename property was set to Certificat-CC-2023_45fr.pdf.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2023/01']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2023/01']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 6}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 6}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_45fr.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_45en.pdf.

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The report_references property was updated, with the {'directly_referencing': {'__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2023/01']}}, 'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2023/01']}}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 6}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 6}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]} values discarded.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The cert property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The cert_metadata property was set to None.
    • The cert_keywords property was set to None.
    • The cert_filename property was set to None.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The report_references property was updated, with the {'directly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2023/01']}}, 'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2023/01']}}} data.
    • The scheme_data property was set to {'product': 'MultiApp V5.1 Java Card Virtual Machine (version 5.1)', 'url': 'https://cyber.gouv.fr/produits-certifies/multiapp-v51-java-card-virtual-machine-version-51', 'description': 'Le produit Ă©valuĂ© est la carte « MultiApp V5.1 Java Card Virtual Machine, version 5.1 » dĂ©veloppĂ© par THALES DIS FRANCE SAS et THALES DIS DESIGN SERVICES. La « plateforme MultiApp V5.1 » de la carte a dĂ©jĂ  fait l’objet d’une certification au niveau EAL6 augmentĂ© du composant ALC_FLR.2.', 'sponsor': 'THALES DIS FRANCE SAS', 'developer': 'THALES DIS FRANCE SAS', 'cert_id': 'ANSSI-CC-2023/45', 'level': 'EAL7', 'expiration_date': '13 Novembre 2028', 'enhanced': {'cert_id': 'ANSSI-CC-2023/45', 'certification_date': '13/11/2023', 'expiration_date': '13/11/2028', 'category': 'Cartes Ă  puce', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'THALES DIS FRANCE SAS', 'sponsor': 'THALES DIS FRANCE SAS', 'evaluation_facility': 'THALES DIS FRANCE SAS', 'level': 'EAL7', 'protection_profile': '', 'mutual_recognition': 'CCRA\n SOG-IS', 'augmented': 'NA', 'report_link': 'https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_45fr_0.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_45en_0.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2023_45fr_0.pdf'}}.
  • 31.07.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name MultiApp V5.1 Java Card Virtual Machine Version 5.1 (ANSSI-CC-2023/45) was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2023_45fr.pdf",
  "dgst": "357e465d8baf8302",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2023/45",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 6
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 6
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "5.1"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2023/01",
          "ANSSI-CC-2023/31"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2023/01",
          "ANSSI-CC-2023/31"
        ]
      }
    },
    "scheme_data": {
      "cert_id": "ANSSI-CC-2023/45",
      "description": "Le produit \u00e9valu\u00e9 est la carte \u00ab MultiApp V5.1 Java Card Virtual Machine, version 5.1 \u00bb d\u00e9velopp\u00e9 par THALES DIS FRANCE SAS et THALES DIS DESIGN SERVICES. La \u00ab plateforme MultiApp V5.1 \u00bb de la carte a d\u00e9j\u00e0 fait l\u2019objet d\u2019une certification au niveau EAL6 augment\u00e9 du composant ALC_FLR.2.",
      "developer": "THALES DIS FRANCE SAS",
      "enhanced": {
        "augmented": "NA",
        "category": "Cartes \u00e0 puce",
        "cc_version": "Crit\u00e8res Communs version 3.1r5",
        "cert_id": "ANSSI-CC-2023/45",
        "cert_link": "https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2023_45fr_0.pdf",
        "certification_date": "13/11/2023",
        "developer": "THALES DIS FRANCE SAS",
        "evaluation_facility": "THALES DIS FRANCE SAS",
        "expiration_date": "13/11/2028",
        "level": "EAL7",
        "mutual_recognition": "CCRA\n                          SOG-IS",
        "protection_profile": "",
        "report_link": "https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_45fr_0.pdf",
        "sponsor": "THALES DIS FRANCE SAS",
        "target_link": "https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_45en_0.pdf"
      },
      "expiration_date": "13 Novembre 2028",
      "level": "EAL7",
      "product": "MultiApp V5.1 Java Card Virtual Machine (version 5.1)",
      "sponsor": "THALES DIS FRANCE SAS",
      "url": "https://cyber.gouv.fr/produits-certifies/multiapp-v51-java-card-virtual-machine-version-51"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2023/01"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2023/01"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2024-04-04",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_45-M01fr.pdf",
        "maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_45-M01en.pdf",
        "maintenance_title": "ANSSI-CC-2023/45-M01"
      }
    ]
  },
  "manufacturer": "THALES DIS FRANCE SA",
  "manufacturer_web": "https://www.thalesgroup.com/en/europe/france",
  "name": "MultiApp V5.1 Java Card Virtual Machine Version 5.1 (ANSSI-CC-2023/45)",
  "not_valid_after": "2028-11-13",
  "not_valid_before": "2023-11-13",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "Certificat-CC-2023_45fr.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2023/45": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {
        "EAL": {
          "EAL2": 1,
          "EAL7": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "CEA-LETI": {
          "CEA - LETI": 2
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/CreationDate": "D:20231129170130+01\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 23 pour Word",
      "/Keywords": "",
      "/ModDate": "D:20231129170302+01\u002700\u0027",
      "/Producer": "Adobe PDF Library 23.1.175",
      "pdf_file_size_bytes": 130676,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 2
    },
    "report_filename": "ANSSI-CC-2023_45fr.pdf",
    "report_frontpage": {
      "FR": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2023/01": 1,
          "ANSSI-CC-2023/31": 1,
          "ANSSI-CC-2023/45": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP-0084-2014": 1
        }
      },
      "cc_sar": {
        "AGD": {
          "AGD_OPE": 5,
          "AGD_PRE": 2
        },
        "ALC": {
          "ALC_FLR": 1,
          "ALC_FLR.2": 1
        },
        "AVA": {
          "AVA_VAN": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 7": 3,
          "EAL2": 2,
          "EAL6": 1,
          "EAL7": 2
        },
        "ITSEC": {
          "ITSEC E6 Elev\u00e9": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {
        "ICFab": {
          "IC Fabricator": 1
        }
      },
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "CEA-LETI": {
          "CEA - LETI": 1
        },
        "CESTI": {
          "CESTI": 3
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20231129165959+01\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 23 pour Word",
      "/Keywords": "",
      "/ModDate": "D:20231129170305+01\u002700\u0027",
      "/Producer": "Adobe PDF Library 23.1.175",
      "pdf_file_size_bytes": 556910,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.commoncriteriaportal.org/",
          "http://www.ssi.gouv.fr/",
          "http://www.sogis.eu/",
          "mailto:[email protected]"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 15
    },
    "st_filename": "ANSSI-cible-CC-2023_45en.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 3
          }
        },
        "FF": {
          "DH": {
            "DH": 1
          }
        }
      },
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2023/01": 1
        },
        "NL": {
          "CC-1": 2,
          "CC-2": 3,
          "CC-3": 3
        }
      },
      "cc_claims": {
        "A": {
          "A.CAP_FILE": 3,
          "A.VERIFICATION": 3
        },
        "D": {
          "D.API_DATA": 3,
          "D.APP_CODE": 5,
          "D.APP_C_DATA": 2,
          "D.APP_I_DATA": 3,
          "D.CRYPTO": 3,
          "D.JCS_CODE": 3,
          "D.JCS_DATA": 4,
          "D.PIN": 4,
          "D.SEC_DATA": 5
        },
        "O": {
          "O.APPLET": 2,
          "O.ARRAY_VIEWS_CONFID": 4,
          "O.ARRAY_VIEWS_INTEG": 2,
          "O.ARRAY_VIEW_CONFID": 1,
          "O.CODE_CAP_FILE": 3,
          "O.FIREWALL": 15,
          "O.GLOBAL_ARRAYS_INTEG": 4,
          "O.JAVAOBJECT": 38
        },
        "OE": {
          "OE.ALARM": 11,
          "OE.CAP_FILE": 4,
          "OE.CARD-MANAGEMENT": 2,
          "OE.CARD_MANAGEMENT": 10,
          "OE.CODE-EVIDENCE": 11,
          "OE.INSTALL": 4,
          "OE.LOAD": 5,
          "OE.NATIVE": 7,
          "OE.OPERATE": 13,
          "OE.REALLOCATION": 5,
          "OE.SCP": 16,
          "OE.SID": 8,
          "OE.VERIFICATION": 25
        },
        "OP": {
          "OP.ARRAY_AASTORE": 3,
          "OP.ARRAY_ACCESS": 7,
          "OP.ARRAY_LENGTH": 3,
          "OP.ARRAY_T_ALOAD": 3,
          "OP.ARRAY_T_ASTORE": 3,
          "OP.CREATE": 9,
          "OP.DELETE_APPLET": 1,
          "OP.DELETE_CAP_FILE": 1,
          "OP.DELETE_CAP_FILE_APPLET": 1,
          "OP.INSTANCE_FIELD": 6,
          "OP.INVK_INTERFACE": 10,
          "OP.INVK_VIRTUAL": 8,
          "OP.JAVA": 6,
          "OP.PUT": 8,
          "OP.PUTFIELD": 1,
          "OP.PUTSTATIC": 1,
          "OP.THROW": 7,
          "OP.TYPE_ACCESS": 7
        },
        "OSP": {
          "OSP.VERIFICATION": 3
        },
        "R": {
          "R.JAVA": 9
        },
        "T": {
          "T.CONFID-APPLI-DATA": 3,
          "T.CONFID-JCS-CODE": 3,
          "T.CONFID-JCS-DATA": 3,
          "T.EXE-CODE": 6,
          "T.INTEG-APPLI-CODE": 6,
          "T.INTEG-APPLI-DATA": 6,
          "T.INTEG-JCS-CODE": 3,
          "T.INTEG-JCS-DATA": 3,
          "T.NATIVE": 3,
          "T.SID": 6
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0084-": 1,
          "BSI-CC-PP-0084-2014": 1,
          "BSI-CC-PP-0099-V2-2020": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 6,
          "ADV_FSP.1": 1,
          "ADV_FSP.2": 1,
          "ADV_FSP.4": 4,
          "ADV_FSP.6": 5,
          "ADV_IMP.1": 4,
          "ADV_IMP.2": 5,
          "ADV_INT.3": 2,
          "ADV_SPM.1": 8,
          "ADV_TDS.1": 2,
          "ADV_TDS.3": 3,
          "ADV_TDS.4": 1,
          "ADV_TDS.6": 7
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 6,
          "AGD_PRE": 1,
          "AGD_PRE.1": 6
        },
        "ALC": {
          "ALC_CMC.5": 4,
          "ALC_CMS.5": 1,
          "ALC_DEL.1": 2,
          "ALC_DVS.2": 4,
          "ALC_FLR.2": 1,
          "ALC_LCD.1": 1,
          "ALC_LCD.2": 3,
          "ALC_TAT": 1,
          "ALC_TAT.1": 2,
          "ALC_TAT.3": 3
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1,
          "ASE_TSS.2": 1
        },
        "ATE": {
          "ATE_COV.1": 2,
          "ATE_COV.3": 3,
          "ATE_DPT.1": 1,
          "ATE_DPT.4": 2,
          "ATE_FUN.1": 3,
          "ATE_FUN.2": 4,
          "ATE_IND.3": 2
        },
        "AVA": {
          "AVA_VAN.5": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 6+": 1,
          "EAL6": 1,
          "EAL7": 36
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 1,
          "FAU_SAS.1": 1
        },
        "FCO": {
          "FCO_NRO": 1
        },
        "FCS": {
          "FCS_RNG": 1,
          "FCS_RNG.1": 2
        },
        "FDP": {
          "FDP_ACC": 21,
          "FDP_ACC.1": 7,
          "FDP_ACC.2": 2,
          "FDP_ACF": 17,
          "FDP_ACF.1": 9,
          "FDP_IFC": 16,
          "FDP_IFC.1": 6,
          "FDP_IFF": 11,
          "FDP_IFF.1": 8,
          "FDP_ITC": 2,
          "FDP_ITT.1": 1,
          "FDP_RIP": 9,
          "FDP_ROL": 2,
          "FDP_SDC.1": 1,
          "FDP_SDI": 3,
          "FDP_SDI.2": 1,
          "FDP_UCT.1": 1,
          "FDP_UIT": 2,
          "FDP_UIT.1": 1
        },
        "FIA": {
          "FIA_API.1": 1,
          "FIA_ATD": 2,
          "FIA_UAU": 2,
          "FIA_UID": 5,
          "FIA_UID.1": 1,
          "FIA_USB": 1
        },
        "FMT": {
          "FMT_LIM": 10,
          "FMT_LIM.1": 1,
          "FMT_LIM.2": 1,
          "FMT_MSA": 61,
          "FMT_MSA.1": 6,
          "FMT_MSA.2": 2,
          "FMT_MSA.3": 9,
          "FMT_MTD": 9,
          "FMT_MTD.1": 1,
          "FMT_SMF": 18,
          "FMT_SMF.1": 6,
          "FMT_SMR": 19,
          "FMT_SMR.1": 9
        },
        "FPR": {
          "FPR_UNO": 1,
          "FPR_UNO.1": 1
        },
        "FPT": {
          "FPT_FLS": 10,
          "FPT_FLS.1": 1,
          "FPT_ITT": 2,
          "FPT_ITT.1": 1,
          "FPT_PHP": 3,
          "FPT_PHP.3": 1,
          "FPT_RCV": 2,
          "FPT_TDC.1": 1,
          "FPT_TST": 1
        },
        "FRU": {
          "FRU_FLT.2": 1
        },
        "FTP": {
          "FTP_ITC": 3,
          "FTP_ITC.1": 1,
          "FTP_TRP": 1
        }
      },
      "certification_process": {
        "OutOfScope": {
          " \u2022 The DELETE and INSTALL APDU commands are out of scope of this SPM": 1,
          "1, are out of the scope of the SPM as they are linked to the applet loading or deletion that is out of scope of the SPM boundaries limited to VM opcodes The SFR FMT_MTD.3/JCRE is out of scope of the SPM": 1,
          "and deletion; see #.DELETION and #.INSTALL). \u2022 The DELETE and INSTALL APDU commands are out of scope of this SPM. The list of registred applets\u2019 AIDs is proven to be not modified during the execution": 1,
          "as a null reference. Such a mechanism is implementation-dependent. The deletion of applets is out of scope of this SPM scope. In the case of an array type, fields are components of the array ([JVM], \u00a72.14": 1,
          "because AID registry is created during loading phase, which is also out of scope of the SPM (Hypothesis 2 of the SPM document [MAV51_SPM]). MultiApp V5.1: Security Target Java": 1,
          "is also out of scope (Hypothesis 4 of the SPM document [MAV51_SPM]).. 3) S.CAP_FILE performing OP.ARRAY_AASTORE of the": 1,
          "management functions: \u2022 Modify the Currently Active Context Note: the Selected Applet context is out of scope of the VM functionalities. It is a process that occurs prior to VM start The initial setting of": 1,
          "out of scope": 8,
          "the active context is not the same as the Selected Applet Context. Application note: This rule is out of scope of the SPM modelisation because CLEAR_ON_DESELECT objects can be created exclusively in the API": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {
        "ICFab": {
          "IC Fabricator": 1
        },
        "ICType": {
          "IC Type": 1
        }
      },
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 2
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA3": {
            "SHA3": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {
        "misc": {
          "TYPE_ACCESS": 7
        }
      },
      "javacard_packages": {
        "com": {
          "com.gemalto.belpic": 1,
          "com.gemalto.javacard.eid": 1,
          "com.gemalto.javacard.fido.ctap": 1,
          "com.gemalto.javacard.iasclassic": 1,
          "com.gemalto.javacard.mspnp": 1,
          "com.gemalto.javacardx.gdp": 1,
          "com.gemalto.moc.client": 1,
          "com.gemalto.moc.server": 1,
          "com.gemalto.mpcos": 1,
          "com.gemalto.puredi": 1,
          "com.gemalto.tacho": 1
        },
        "javacard": {
          "javacard.eid": 1,
          "javacard.fido.ctap": 1,
          "javacard.iasclassic": 1,
          "javacard.mspnp": 1
        },
        "javacardx": {
          "javacardx.gdp": 1
        }
      },
      "javacard_version": {
        "JavaCard": {
          "Java Card 3.1": 4
        }
      },
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "malfunction": 1
        },
        "SCA": {
          "physical probing": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS31": 1,
          "BSI-AIS31": 1
        },
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 1
          }
        },
        "DES": {
          "DES": {
            "DES": 1
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {
        "IBM": {
          "SE": 2
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon": 1
        },
        "Thales": {
          "Thales": 32
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "OHAYON Franck",
      "/CreationDate": "D:20230606163814+02\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word for Microsoft 365",
      "/ModDate": "D:20230606163814+02\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word for Microsoft 365",
      "/Title": "MultiApp V5.1: JCVM Security Target",
      "pdf_file_size_bytes": 1232740,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 60
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_45fr.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL7"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_45en.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "e8e346322a5c5c7cf8a4e888366382882aa9a71387e712598a352314be1431da",
      "txt_hash": "bac458caf43a57a50dbd5a4cbc60f4578caeeb45b23f024afdec4ad2e01d4273"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "786da3eb99c210405ca5ff85d9f950317250326f7dcf561a2bb07498ff9666f2",
      "txt_hash": "74cf28400f6c3e2a64deffed860a8a62b85d2937be459996ee79b03aab5cf296"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "3773a1dc0b9f29b3735ebf7fbe627770d344e8eb9bd712fd2074241f388b8292",
      "txt_hash": "8f7a45b5a11368ef2aea048f2475bd6d0a5a36f23a2bc0f56732d220dcefefe3"
    }
  },
  "status": "active"
}