MultiApp V5.1 Java Card Virtual Machine Version 5.1 (ANSSI-CC-2023/45)

CSV information

Status active
Valid from 13.11.2023
Valid until 13.11.2028
Scheme 🇫🇷 FR
Manufacturer THALES DIS FRANCE SA
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level EAL7
Maintenance updates ANSSI-CC-2023/45-M01 (04.04.2024) Certification report Security target

Heuristics summary

Certificate ID: ANSSI-CC-2023/45

Certificate

Extracted keywords

Security level
EAL7, EAL2
Certificates
ANSSI-CC-2023/45
Evaluation facilities
CEA - LETI

File metadata

Creation date D:20231129170130+01'00'
Modification date D:20231129170302+01'00'
Pages 2
Creator Acrobat PDFMaker 23 pour Word
Producer Adobe PDF Library 23.1.175

Certification report

Extracted keywords

Symmetric Algorithms
DES

CPLC
IC Fabricator

Security level
EAL 7, EAL2, EAL6, EAL7, ITSEC E6 Elevé
Security Assurance Requirements (SAR)
AGD_OPE, AGD_PRE, ALC_FLR.2, ALC_FLR, AVA_VAN
Protection profiles
BSI-PP-0084-2014
Certificates
ANSSI-CC-2023/45, ANSSI-CC-2023/01, ANSSI-CC-2023/31
Evaluation facilities
CESTI, CEA - LETI

Standards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003

File metadata

Creation date D:20231129165959+01'00'
Modification date D:20231129170305+01'00'
Pages 15
Creator Acrobat PDFMaker 23 pour Word
Producer Adobe PDF Library 23.1.175

References

Outgoing

Security target

Extracted keywords

Symmetric Algorithms
AES, DES, HMAC
Asymmetric Algorithms
ECC, DH
Hash functions
SHA3
Protocols
PACE
Randomness
RNG

JavaCard versions
Java Card 3.1
JavaCard API constants
TYPE_ACCESS
CPLC
IC Fabricator, IC Type
Trusted Execution Environments
SE
Vendor
Infineon, Thales

Security level
EAL7, EAL6, EAL 6+
Claims
D.APP_CODE, D.APP_C_DATA, D.APP_I_DATA, D.PIN, D.API_DATA, D.CRYPTO, D.JCS_CODE, D.JCS_DATA, D.SEC_DATA, O.FIREWALL, O.ARRAY_VIEWS_CONFID, O.GLOBAL_ARRAYS_INTEG, O.ARRAY_VIEW_CONFID, O.ARRAY_VIEWS_INTEG, O.APPLET, O.CODE_CAP_FILE, O.JAVAOBJECT, T.CONFID-APPLI-DATA, T.CONFID-JCS-CODE, T.CONFID-JCS-DATA, T.INTEG-APPLI-CODE, T.INTEG-APPLI-DATA, T.INTEG-JCS-CODE, T.INTEG-JCS-DATA, T.SID, T.EXE-CODE, T.NATIVE, A.VERIFICATION, A.CAP_FILE, R.JAVA, OP.ARRAY_ACCESS, OP.ARRAY_LENGTH, OP.ARRAY_AASTORE, OP.ARRAY_T_ALOAD, OP.ARRAY_T_ASTORE, OP.CREATE, OP.DELETE_APPLET, OP.DELETE_CAP_FILE, OP.DELETE_CAP_FILE_APPLET, OP.INSTANCE_FIELD, OP.INVK_VIRTUAL, OP.INVK_INTERFACE, OP.JAVA, OP.THROW, OP.TYPE_ACCESS, OP.PUT, OP.PUTFIELD, OP.PUTSTATIC, OE.VERIFICATION, OE.CAP_FILE, OE.CODE-EVIDENCE, OE.SID, OE.NATIVE, OE.OPERATE, OE.REALLOCATION, OE.LOAD, OE.INSTALL, OE.ALARM, OE.CARD-MANAGEMENT, OE.SCP, OE.CARD_MANAGEMENT, OSP.VERIFICATION
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.6, ADV_IMP.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.6, ADV_FSP.4, ADV_ARC, ADV_TDS.1, ADV_IMP.1, ADV_TDS.3, ADV_FSP.1, ADV_FSP.2, ADV_TDS.4, AGD_OPE, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC.5, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_LCD.2, ALC_TAT.3, ALC_TAT.1, ALC_TAT, ALC_LCD.1, ATE_COV.3, ATE_DPT.4, ATE_FUN.2, ATE_IND.3, ATE_FUN.1, ATE_COV.1, ATE_DPT.1, AVA_VAN.5, ASE_TSS.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_ARP.1, FAU_SAS.1, FCO_NRO, FCS_RNG.1, FCS_RNG, FDP_ACC, FDP_ACF, FDP_IFC, FDP_IFF, FDP_ROL, FDP_RIP, FDP_SDI, FDP_ITC, FDP_UIT, FDP_ACC.2, FDP_ACF.1, FDP_IFC.1, FDP_IFF.1, FDP_ACC.1, FDP_SDC.1, FDP_SDI.2, FDP_ITT.1, FDP_UCT.1, FDP_UIT.1, FIA_ATD, FIA_UID, FIA_USB, FIA_UAU, FIA_UID.1, FIA_API.1, FMT_MSA, FMT_SMF, FMT_SMR, FMT_MTD, FMT_SMR.1, FMT_SMF.1, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_MTD.1, FMT_LIM.1, FMT_LIM, FMT_LIM.2, FPR_UNO.1, FPR_UNO, FPT_FLS, FPT_TDC.1, FPT_RCV, FPT_TST, FPT_PHP, FPT_ITT, FPT_FLS.1, FPT_PHP.3, FPT_ITT.1, FRU_FLT.2, FTP_ITC, FTP_TRP, FTP_ITC.1
Protection profiles
BSI-CC-PP-0084-, BSI-CC-PP-0099-V2-2020, BSI-CC-PP-0084-2014
Certificates
ANSSI-CC-2023/01, CC-1, CC-2, CC-3

Side-channel analysis
physical probing, malfunction
Certification process
out of scope, • The DELETE and INSTALL APDU commands are out of scope of this SPM, 1, are out of the scope of the SPM as they are linked to the applet loading or deletion that is out of scope of the SPM boundaries limited to VM opcodes The SFR FMT_MTD.3/JCRE is out of scope of the SPM, because AID registry is created during loading phase, which is also out of scope of the SPM (Hypothesis 2 of the SPM document [MAV51_SPM]). MultiApp V5.1: Security Target Java, the active context is not the same as the Selected Applet Context. Application note: This rule is out of scope of the SPM modelisation because CLEAR_ON_DESELECT objects can be created exclusively in the API, is also out of scope (Hypothesis 4 of the SPM document [MAV51_SPM]).. 3) S.CAP_FILE performing OP.ARRAY_AASTORE of the, as a null reference. Such a mechanism is implementation-dependent. The deletion of applets is out of scope of this SPM scope. In the case of an array type, fields are components of the array ([JVM], §2.14, management functions: • Modify the Currently Active Context Note: the Selected Applet context is out of scope of the VM functionalities. It is a process that occurs prior to VM start The initial setting of, and deletion; see #.DELETION and #.INSTALL). • The DELETE and INSTALL APDU commands are out of scope of this SPM. The list of registred applets’ AIDs is proven to be not modified during the execution

Standards
BSI-AIS31, AIS31, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003

File metadata

Title MultiApp V5.1: JCVM Security Target
Author OHAYON Franck
Creation date D:20230606163814+02'00'
Modification date D:20230606163814+02'00'
Pages 60
Creator Microsoft® Word for Microsoft 365
Producer Microsoft® Word for Microsoft 365

References

Outgoing

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

ANSSI-CC-2023/45

Extracted SARs

ADV_ARC.1, ADV_FSP.6, ADV_IMP.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.6, AGD_OPE.1, AGD_PRE.1, ALC_CMC.5, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_FLR.2, ALC_LCD.2, ALC_TAT.3, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.2, ATE_COV.3, ATE_DPT.4, ATE_FUN.2, ATE_IND.3, AVA_VAN.5

Similar certificates

Name Certificate ID
Produit IAS Classic v5.2.1 with MOC Server v3.1 on MultiApp V5.1 Version 5.2.1.A.C et 5.2.1.A.O ( ANSSI-CC-2023/42 ) ANSSI-CC-2023/42 Compare
Plateforme ouverte Java Card MultiApp V4.1 en configuration ouverte masquée sur le composant S3FT9MH(Version 4.1.0.2)... ANSSI-CC-2023/30 Compare
eTravel 3.1 BAC on MultiApp V5.1 Version 3.1.0.0 ( ANSSI-CC-2023/34 ) ANSSI-CC-2023/34 Compare
eTravel 3.1 EAC on SAC on MultiApp V5.1 Version 3.1.0.0 ( ANSSI-CC-2023/36 ) ANSSI-CC-2023/36 Compare
eTravel 3.1 EAC on BAC on MultiApp V5.1 Version 3.1.0.0 ( ANSSI-CC-2023/35 ) ANSSI-CC-2023/35 Compare
IAS Classic V4.4.2 with MOC Server 1.1 on MultiApp V4.1 version IAS : 4.4.2.A, version MOC Server : 1.1.1A (ANSSI-CC-... ANSSI-CC-2023/57 Compare
MultiApp V5.1 (version 5.1) ( 2023/31) ANSSI-CC-2023/31 Compare
ChipDoc v4.1 on JCOP 4.5 P71 in ICAO EAC(1&2) with PACE configuration Version 4.1.1.52 ( ANSSI-CC-2023/68) ANSSI-CC-2023/68 Compare
ChipDoc v4.1 on JCOP 4.5 P71 in SSCD configuration Version 4.1.1.52 (ANSSI-CC-2023/69) ANSSI-CC-2023/69 Compare
ChipDoc v4.1 on JCOP 4.5 P71 in ICAO BAC configuration Version 4.1.1.52 ( ANSSI-CC-2023/67) ANSSI-CC-2023/67 Compare
Platforme MultiApp V5.1 GP-SE (version 5.1) (2023/33) ANSSI-CC-2023/33 Compare
eTravel v2.2 EAC/SAC on MultiApp v4.0.1 platform with Filter Set 1.0 (version 1.0) (ANSSI-CC-2020/45-R01) ANSSI-CC-2020/45-R01 Compare
eTravel v2.3 on MultiApp v4.1 platform, BAC and AA activated (version 2.3.0.1) (ANSSI-CC-2023/54) ANSSI-CC-2023/54 Compare
eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated (version 2.3.0.1) (ANSSI-CC-2023/56) ANSSI-CC-2023/56 Compare
eTravel v2.3 on MultiApp v4.1 platform, PACE, EAC and AA activated(version 2.3.0.1) ( ANSSI-CC-2023/55 ) ANSSI-CC-2023/55 Compare
ChipDoc v4 on JCOP 4.5 P71 in ICAO EAC(1&2) with PACE configuration (Version 4.0.1.52) (ANSSI-CC-2023/11-R01) ANSSI-CC-2023/11-R01 Compare
MultiApp v4.0.1 with Filter Set 1.0 Java Card Open Platform on M7892 G12 chip(MultiApp v4.0.1 with Filter Set 1.0) (A... ANSSI-CC-2020/42-R01 Compare
PPCA application on MultiApp V5.1 Platform (version 1.0.1.A) (ANSSI-CC-2025/05) ANSSI-CC-2025/05 Compare
ChipDoc v4 on JCOP 4.5 P71 in SSCD configuration (Version 4.0.1.52) (ANSSI-CC-2023/12-R01) ANSSI-CC-2023/12-R01 Compare
ChipDoc v4 on JCOP 4.5 P71 in ICAO BAC configuration (Version 4.0.1.52) ( ANSSI-CC-2023/10-R01 ) ANSSI-CC-2023/10-R01 Compare
Plateforme Java Card MultiApp V4.2 en configuration ouverte sur le composant IFX_CCI_000010h (Version 4.2.0, Java Car... ANSSI-CC-2020/65v2 Compare
eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated Référence/version du produit Version de l’applicati... ANSSI-CC-2018/56v2 Compare
eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated Référence/version du produit Version de l’applicati... ANSSI-CC-2018/58v2 Compare
eTravel v2.3 on MultiApp v4.1 platform, PACE, EAC and AA activated Version de l’application eTravel : 2.3 Version de ... ANSSI-CC-2018/57v2 Compare
MultiApp V5.0 Java Card Virtual Machine ANSSI-CC-2022/37 Compare
Plateforme Java Card MultiApp V5.0 version 5.0 ANSSI-CC-2021/42 Compare
Plateforme Java Card MultiApp V5.0.A - version 5.0.A ANSSI-CC-2022/52 Compare
Plateforme Java Card MultiApp V5.0.A version 5.0.A ANSSI-CC-2022/10 Compare
Samsung TEEgris on Exynos 2200 (Version 5.0.0.0) (ANSSI-CC-2023/71) ANSSI-CC-2023/71 Compare
IDmove v5 on SCR404U in EAC configuration with AA in optionOS Commercial Version : 0x098912 ; OS Unique Identifier : ... ANSSI-CC-2023/64 Compare
IDmove v5 on SCR404U in PACE configuration with AA and/or CA in optionOS Commercial Version : 0x098912 ; OS Unique Id... ANSSI-CC-2023/66 Compare
IDmove v5 on SCR404U in EAC with PACE configuration and LDSv2, AA in optionOS Commercial Version : 0x098912 ; OS Uniq... ANSSI-CC-2023/65 Compare
IDmove v5 on SCR404U in BAC configuration with AA and/or CA in option(OS Commercial Version : 0x098912;OS Unique Iden... ANSSI-CC-2023/63 Compare
eTravel v2.2 BAC on MultiApp v4.0.1 platform with Filter Set 1.0 (version 1.0) (ANSSI-CC-2020/43-R01) ANSSI-CC-2020/43-R01 Compare
Digital Identity on MultiApp v4.0.1 platform with Filter Set 1.0 - PACE, EAC(version 1.0) (ANSSI-CC-2020/49-R01) ANSSI-CC-2020/49-R01 Compare
MultiApp 5.2 Premium PQC (version 5.2)(ANSSI-CC-2025/32) ANSSI-CC-2025/32 Compare
eTravel v2.2 EAC/BAC on MultiApp v4.0.1 platform with Filter Set 1.0 (version 1.0) (ANSSI-CC-2020/44-R01) ANSSI-CC-2020/44-R01 Compare
MultiApp 5.2 Premium PQC GP-SE(version 5.2) (ANSSI-CC-2025/30) ANSSI-CC-2025/30 Compare
Strong Customer Authentication for Apple Pay on Mac mini with M2 and Magic keyboard with Touch ID, running macOS Vent... ANSSI-CC-2023/61 Compare
NPCT7xx TPM2.0 rev 1.59 configuration version 1.5.3.3 (ANSSI-CC-2025/14) ANSSI-CC-2025/14 Compare
Plateforme Java Card en configuration ouverte de la carte à puce MultiApp v3.1 masquée sur le composant P60D144PVA (v... ANSSI-CC-2015/15 Compare
Plateforme Java Card en configuration ouverte de la carte à puce MultiApp v3.1 masquée sur le composant P60D080PVC(Ve... ANSSI-CC-2014/86 Compare
SCR404U (version B) (ANSSI-CC-2023/37-R01) ANSSI-CC-2023/37-R01 Compare
Strong Customer Authentication pour Apple Pay sur Apple Watch avec S7 exécutant watchOS 8.5.1 (Version 8.5.1 (build 19T252)) ANSSI-CC-2023/17 Compare
Plateforme Java Card MultiApp GP-SE (version 5.0) ANSSI-CC-2022/23 Compare
Showing 5 out of 45.

References

Loading...

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2023_45fr.pdf",
  "dgst": "357e465d8baf8302",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2023/45",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL7",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 6
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 6
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "5.1"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2023/01",
          "ANSSI-CC-2023/31"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2023/01",
          "ANSSI-CC-2023/31"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2023/01"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2023/01"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2024-04-04",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_45-M01fr.pdf",
        "maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_45-M01en.pdf",
        "maintenance_title": "ANSSI-CC-2023/45-M01"
      }
    ]
  },
  "manufacturer": "THALES DIS FRANCE SA",
  "manufacturer_web": "https://www.thalesgroup.com/en/europe/france",
  "name": "MultiApp V5.1 Java Card Virtual Machine Version 5.1 (ANSSI-CC-2023/45)",
  "not_valid_after": "2028-11-13",
  "not_valid_before": "2023-11-13",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "Certificat-CC-2023_45fr.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2023/45": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {
        "EAL": {
          "EAL2": 1,
          "EAL7": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "CEA-LETI": {
          "CEA - LETI": 2
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/CreationDate": "D:20231129170130+01\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 23 pour Word",
      "/Keywords": "",
      "/ModDate": "D:20231129170302+01\u002700\u0027",
      "/Producer": "Adobe PDF Library 23.1.175",
      "pdf_file_size_bytes": 130676,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 2
    },
    "report_filename": "ANSSI-CC-2023_45fr.pdf",
    "report_frontpage": {
      "FR": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2023/01": 1,
          "ANSSI-CC-2023/31": 1,
          "ANSSI-CC-2023/45": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP-0084-2014": 1
        }
      },
      "cc_sar": {
        "AGD": {
          "AGD_OPE": 5,
          "AGD_PRE": 2
        },
        "ALC": {
          "ALC_FLR": 1,
          "ALC_FLR.2": 1
        },
        "AVA": {
          "AVA_VAN": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 7": 3,
          "EAL2": 2,
          "EAL6": 1,
          "EAL7": 2
        },
        "ITSEC": {
          "ITSEC E6 Elev\u00e9": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {
        "ICFab": {
          "IC Fabricator": 1
        }
      },
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "CEA-LETI": {
          "CEA - LETI": 1
        },
        "CESTI": {
          "CESTI": 3
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20231129165959+01\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 23 pour Word",
      "/Keywords": "",
      "/ModDate": "D:20231129170305+01\u002700\u0027",
      "/Producer": "Adobe PDF Library 23.1.175",
      "pdf_file_size_bytes": 556910,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.ssi.gouv.fr/",
          "mailto:[email protected]",
          "http://www.sogis.eu/",
          "http://www.commoncriteriaportal.org/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 15
    },
    "st_filename": "ANSSI-cible-CC-2023_45en.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 3
          }
        },
        "FF": {
          "DH": {
            "DH": 1
          }
        }
      },
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2023/01": 1
        },
        "NL": {
          "CC-1": 2,
          "CC-2": 3,
          "CC-3": 3
        }
      },
      "cc_claims": {
        "A": {
          "A.CAP_FILE": 3,
          "A.VERIFICATION": 3
        },
        "D": {
          "D.API_DATA": 3,
          "D.APP_CODE": 5,
          "D.APP_C_DATA": 2,
          "D.APP_I_DATA": 3,
          "D.CRYPTO": 3,
          "D.JCS_CODE": 3,
          "D.JCS_DATA": 4,
          "D.PIN": 4,
          "D.SEC_DATA": 5
        },
        "O": {
          "O.APPLET": 2,
          "O.ARRAY_VIEWS_CONFID": 4,
          "O.ARRAY_VIEWS_INTEG": 2,
          "O.ARRAY_VIEW_CONFID": 1,
          "O.CODE_CAP_FILE": 3,
          "O.FIREWALL": 15,
          "O.GLOBAL_ARRAYS_INTEG": 4,
          "O.JAVAOBJECT": 38
        },
        "OE": {
          "OE.ALARM": 11,
          "OE.CAP_FILE": 4,
          "OE.CARD-MANAGEMENT": 2,
          "OE.CARD_MANAGEMENT": 10,
          "OE.CODE-EVIDENCE": 11,
          "OE.INSTALL": 4,
          "OE.LOAD": 5,
          "OE.NATIVE": 7,
          "OE.OPERATE": 13,
          "OE.REALLOCATION": 5,
          "OE.SCP": 16,
          "OE.SID": 8,
          "OE.VERIFICATION": 25
        },
        "OP": {
          "OP.ARRAY_AASTORE": 3,
          "OP.ARRAY_ACCESS": 7,
          "OP.ARRAY_LENGTH": 3,
          "OP.ARRAY_T_ALOAD": 3,
          "OP.ARRAY_T_ASTORE": 3,
          "OP.CREATE": 9,
          "OP.DELETE_APPLET": 1,
          "OP.DELETE_CAP_FILE": 1,
          "OP.DELETE_CAP_FILE_APPLET": 1,
          "OP.INSTANCE_FIELD": 6,
          "OP.INVK_INTERFACE": 10,
          "OP.INVK_VIRTUAL": 8,
          "OP.JAVA": 6,
          "OP.PUT": 8,
          "OP.PUTFIELD": 1,
          "OP.PUTSTATIC": 1,
          "OP.THROW": 7,
          "OP.TYPE_ACCESS": 7
        },
        "OSP": {
          "OSP.VERIFICATION": 3
        },
        "R": {
          "R.JAVA": 9
        },
        "T": {
          "T.CONFID-APPLI-DATA": 3,
          "T.CONFID-JCS-CODE": 3,
          "T.CONFID-JCS-DATA": 3,
          "T.EXE-CODE": 6,
          "T.INTEG-APPLI-CODE": 6,
          "T.INTEG-APPLI-DATA": 6,
          "T.INTEG-JCS-CODE": 3,
          "T.INTEG-JCS-DATA": 3,
          "T.NATIVE": 3,
          "T.SID": 6
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0084-": 1,
          "BSI-CC-PP-0084-2014": 1,
          "BSI-CC-PP-0099-V2-2020": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 6,
          "ADV_FSP.1": 1,
          "ADV_FSP.2": 1,
          "ADV_FSP.4": 4,
          "ADV_FSP.6": 5,
          "ADV_IMP.1": 4,
          "ADV_IMP.2": 5,
          "ADV_INT.3": 2,
          "ADV_SPM.1": 8,
          "ADV_TDS.1": 2,
          "ADV_TDS.3": 3,
          "ADV_TDS.4": 1,
          "ADV_TDS.6": 7
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 6,
          "AGD_PRE": 1,
          "AGD_PRE.1": 6
        },
        "ALC": {
          "ALC_CMC.5": 4,
          "ALC_CMS.5": 1,
          "ALC_DEL.1": 2,
          "ALC_DVS.2": 4,
          "ALC_FLR.2": 1,
          "ALC_LCD.1": 1,
          "ALC_LCD.2": 3,
          "ALC_TAT": 1,
          "ALC_TAT.1": 2,
          "ALC_TAT.3": 3
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1,
          "ASE_TSS.2": 1
        },
        "ATE": {
          "ATE_COV.1": 2,
          "ATE_COV.3": 3,
          "ATE_DPT.1": 1,
          "ATE_DPT.4": 2,
          "ATE_FUN.1": 3,
          "ATE_FUN.2": 4,
          "ATE_IND.3": 2
        },
        "AVA": {
          "AVA_VAN.5": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 6+": 1,
          "EAL6": 1,
          "EAL7": 36
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 1,
          "FAU_SAS.1": 1
        },
        "FCO": {
          "FCO_NRO": 1
        },
        "FCS": {
          "FCS_RNG": 1,
          "FCS_RNG.1": 2
        },
        "FDP": {
          "FDP_ACC": 21,
          "FDP_ACC.1": 7,
          "FDP_ACC.2": 2,
          "FDP_ACF": 17,
          "FDP_ACF.1": 9,
          "FDP_IFC": 16,
          "FDP_IFC.1": 6,
          "FDP_IFF": 11,
          "FDP_IFF.1": 8,
          "FDP_ITC": 2,
          "FDP_ITT.1": 1,
          "FDP_RIP": 9,
          "FDP_ROL": 2,
          "FDP_SDC.1": 1,
          "FDP_SDI": 3,
          "FDP_SDI.2": 1,
          "FDP_UCT.1": 1,
          "FDP_UIT": 2,
          "FDP_UIT.1": 1
        },
        "FIA": {
          "FIA_API.1": 1,
          "FIA_ATD": 2,
          "FIA_UAU": 2,
          "FIA_UID": 5,
          "FIA_UID.1": 1,
          "FIA_USB": 1
        },
        "FMT": {
          "FMT_LIM": 10,
          "FMT_LIM.1": 1,
          "FMT_LIM.2": 1,
          "FMT_MSA": 61,
          "FMT_MSA.1": 6,
          "FMT_MSA.2": 2,
          "FMT_MSA.3": 9,
          "FMT_MTD": 9,
          "FMT_MTD.1": 1,
          "FMT_SMF": 18,
          "FMT_SMF.1": 6,
          "FMT_SMR": 19,
          "FMT_SMR.1": 9
        },
        "FPR": {
          "FPR_UNO": 1,
          "FPR_UNO.1": 1
        },
        "FPT": {
          "FPT_FLS": 10,
          "FPT_FLS.1": 1,
          "FPT_ITT": 2,
          "FPT_ITT.1": 1,
          "FPT_PHP": 3,
          "FPT_PHP.3": 1,
          "FPT_RCV": 2,
          "FPT_TDC.1": 1,
          "FPT_TST": 1
        },
        "FRU": {
          "FRU_FLT.2": 1
        },
        "FTP": {
          "FTP_ITC": 3,
          "FTP_ITC.1": 1,
          "FTP_TRP": 1
        }
      },
      "certification_process": {
        "OutOfScope": {
          " \u2022 The DELETE and INSTALL APDU commands are out of scope of this SPM": 1,
          "1, are out of the scope of the SPM as they are linked to the applet loading or deletion that is out of scope of the SPM boundaries limited to VM opcodes The SFR FMT_MTD.3/JCRE is out of scope of the SPM": 1,
          "and deletion; see #.DELETION and #.INSTALL). \u2022 The DELETE and INSTALL APDU commands are out of scope of this SPM. The list of registred applets\u2019 AIDs is proven to be not modified during the execution": 1,
          "as a null reference. Such a mechanism is implementation-dependent. The deletion of applets is out of scope of this SPM scope. In the case of an array type, fields are components of the array ([JVM], \u00a72.14": 1,
          "because AID registry is created during loading phase, which is also out of scope of the SPM (Hypothesis 2 of the SPM document [MAV51_SPM]). MultiApp V5.1: Security Target Java": 1,
          "is also out of scope (Hypothesis 4 of the SPM document [MAV51_SPM]).. 3) S.CAP_FILE performing OP.ARRAY_AASTORE of the": 1,
          "management functions: \u2022 Modify the Currently Active Context Note: the Selected Applet context is out of scope of the VM functionalities. It is a process that occurs prior to VM start The initial setting of": 1,
          "out of scope": 8,
          "the active context is not the same as the Selected Applet Context. Application note: This rule is out of scope of the SPM modelisation because CLEAR_ON_DESELECT objects can be created exclusively in the API": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {
        "ICFab": {
          "IC Fabricator": 1
        },
        "ICType": {
          "IC Type": 1
        }
      },
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 2
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA3": {
            "SHA3": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {
        "misc": {
          "TYPE_ACCESS": 7
        }
      },
      "javacard_packages": {
        "com": {
          "com.gemalto.belpic": 1,
          "com.gemalto.javacard.eid": 1,
          "com.gemalto.javacard.fido.ctap": 1,
          "com.gemalto.javacard.iasclassic": 1,
          "com.gemalto.javacard.mspnp": 1,
          "com.gemalto.javacardx.gdp": 1,
          "com.gemalto.moc.client": 1,
          "com.gemalto.moc.server": 1,
          "com.gemalto.mpcos": 1,
          "com.gemalto.puredi": 1,
          "com.gemalto.tacho": 1
        },
        "javacard": {
          "javacard.eid": 1,
          "javacard.fido.ctap": 1,
          "javacard.iasclassic": 1,
          "javacard.mspnp": 1
        },
        "javacardx": {
          "javacardx.gdp": 1
        }
      },
      "javacard_version": {
        "JavaCard": {
          "Java Card 3.1": 4
        }
      },
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "malfunction": 1
        },
        "SCA": {
          "physical probing": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS31": 1,
          "BSI-AIS31": 1
        },
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 1
          }
        },
        "DES": {
          "DES": {
            "DES": 1
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {
        "IBM": {
          "SE": 2
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon": 1
        },
        "Thales": {
          "Thales": 32
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "OHAYON Franck",
      "/CreationDate": "D:20230606163814+02\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word for Microsoft 365",
      "/ModDate": "D:20230606163814+02\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word for Microsoft 365",
      "/Title": "MultiApp V5.1: JCVM Security Target",
      "pdf_file_size_bytes": 1232740,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 60
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_45fr.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL7"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_45en.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "e8e346322a5c5c7cf8a4e888366382882aa9a71387e712598a352314be1431da",
      "txt_hash": "bac458caf43a57a50dbd5a4cbc60f4578caeeb45b23f024afdec4ad2e01d4273"
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "786da3eb99c210405ca5ff85d9f950317250326f7dcf561a2bb07498ff9666f2",
      "txt_hash": "74cf28400f6c3e2a64deffed860a8a62b85d2937be459996ee79b03aab5cf296"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "3773a1dc0b9f29b3735ebf7fbe627770d344e8eb9bd712fd2074241f388b8292",
      "txt_hash": "8f7a45b5a11368ef2aea048f2475bd6d0a5a36f23a2bc0f56732d220dcefefe3"
    }
  },
  "status": "active"
}