Application IAS Classic v3 sur plateforme Java Card en configuration ouverte de la carte à puce MultiApp ID V2.1 sur composant P5CC081V1A

CSV information

Status archived
Valid from 03.12.2012
Valid until 01.09.2019
Scheme 🇫🇷 FR
Manufacturer Gemalto / NXP Semiconductors
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level ALC_DVS.2, EAL4+, AVA_VAN.5
Protection profiles
Maintenance updates ANSSI-CC-2012/76-M01 (14.10.2015) Certification report

Heuristics summary

Certificate ID: ANSSI-CC-2012/76

Certificate

certificate file processing did not finish successfully.
Download pdf: ERROR
Convert pdf to text: ERROR
Extract keywords: ERROR

Certification report

Extracted keywords

Symmetric Algorithms
DES

Vendor
NXP, Gemalto

Security level
EAL4, EAL5, EAL7, EAL 1, EAL 3, EAL 5, EAL 7, ITSEC E6 Elevé
Security Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSS
Protection profiles
BSI-PP-0005-2002, BSI-PP-0006-2002, BSI-PP-0035-2007, BSI-PP- 0005-2002, BSI-PP- 0006-2002, BSI-PP- 0035-2007
Certificates
BSI-DSZ-CC-0555-2009, ANSSI-CC-2012/76, ANSSI-CC-2012/24
Evaluation facilities
SERMA

Standards
CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004

File metadata

Creation date D:20121203163819+01'00'
Modification date D:20121203163819+01'00'
Pages 17
Producer Acrobat Distiller 9.0.0 (Windows)

Frontpage

Certificate ID ANSSI-CC-2012/76
Certified item Application IAS Classic v3 sur plateforme Java Card en configuration ouverte de la carte à puce MultiApp ID V2.1 sur composant P5CC081V1A
Certification lab SERMA Technologies 30 Avenue Gustave Eiffel, 33608 Pessac, France
Developer GEMALTO La Vigie Avenue du Jujubier, ZI Athélia IV BP 90, 13702 La Ciotat, France NXP 101 Stresemanallee, D-22502 Hambourg Allemagne Commanditaire GEMALTO La Vigie Avenue du Jujubier, ZI Athélia IV BP 90, 13702 La Ciotat, France

References

Outgoing
  • BSI-DSZ-CC-0555-2009 - archived - NXP Smart Card Controller P5CD081V1A and its major configurations P5CC081V1A, P5CN081V1A, P5CD041V1A, P5CD021V1A and P5CD016V1A each with IC dedicated Software
  • ANSSI-CC-2012/24 - archived - Plateforme Java Card de la carte à puce MultiApp ID V2.1 masquée sur composant P5CC081V1A

Security target

Extracted keywords

Symmetric Algorithms
HPC, DES, 3DES, Triple-DES, TDES
Asymmetric Algorithms
RSA 1024, ECC
Hash functions
SHA1, SHA-1, SHA256, SHA-256
Randomness
PRNG, RNG

JavaCard versions
Java Card 2.2.2
Vendor
NXP, Gemalto

Security level
EAL4+, EAL4, EAL5, EAL4 augmented, EAL5 augmented
Claims
D.SCD, D.SVD, D.DTBS, D.VAD, D.RAD, D.SSCD, D.SIG, A.CGA, A.SCA, OE.SVD_AUTH_CGA, OE.HI_VAD
Security Assurance Requirements (SAR)
ACM_AUT, ACM_CAP, ACM_SCP, ADO_DEL, ADO_IGS, ADV_IMP.2, ADV_IMP.1, ADV_ARC, ADV_LLD, ADV_FSP, ADV_IMP, ADV_HLD, ADV_ARC.1, ADV_FSP.4, ADV_TDS.3, AGD_PRE, AGD_USR, AGD_ADM, AGD_OPE, AGD_PRE.1, AGD_OPE.1, ALC_DVS.2, ALC_DVS, ALC_CMC, ALC_CMS, ALC_DEL, ALC_LCD, ALC_TAT, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_LCD.1, ALC_TAT.1, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.5, AVA_MSU.3, AVA_VLA.4, AVA_VAN, AVA_CCA, AVA_VLA, AVA_SOF, AVA_MSU, ASE_TSS.2
Security Functional Requirements (SFR)
FAU_GEN, FCS_CKM, FCS_COP, FCS_CKM.1, FCS_CKM.4, FCS_COP.1, FDP_ACC, FDP_ACF, FDP_ETC, FDP_ITC, FDP_RIP, FDP_SDI, FDP_UCT, FDP_UIT, FDP_ACC.1, FDP_ACF.1, FDP_ETC.1, FDP_ITC.1, FDP_RIP.1, FDP_SDI.2, FDP_UCT.1, FDP_UIT.1, FDP_RIP.1.1, FIA_AFL, FIA_ATD, FIA_UAU, FIA_UID, FIA_AFL.1, FIA_ATD.1, FIA_UAU.1, FIA_UID.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UID.1.1, FIA_UID.1.2, FMT_MOF, FMT_MSA, FMT_MTD, FMT_SMF, FMT_SMR, FMT_MOF.1, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_MTD.1, FMT_SMF.1, FMT_SMR.1, FMT_MOF.1.1, FMT_MSA.2.1, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_FLS, FPT_PHP, FPT_TST, FPT_AMT.1, FPT_FLS.1, FPT_PHP.1, FPT_PHP.3, FPT_TST.1, FPT_FLS.1.1, FPT_PHP.1.1, FPT_PHP.1.2, FPT_PHP.3.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FTP_ITC, FTP_TRP, FTP_ITC.1, FTP_TRP.1, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3
Protection profiles
BSI-PP-0035, BSI-PP-0004-2002, BSI-PP-0005-2002, BSI-PP-0006-2002, PP-SSCD /T1, PP-SSCD /T2, PP-SSCD /T3
Certificates
BSI-DSZ-CC-0555-2009, BSI-DSZ-CC-0645-2010, ANSSI-PP-2010-03, CC-1, CC-2, CC-3

Side-channel analysis
Side channel, SPA, DPA, timing attacks, physical tampering

Standards
FIPS 46-3, FIPS 180-2, PKCS #1, AIS31, SCP01, SCP02, SCP03, CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004

File metadata

Creation date D:20121019145156Z
Modification date D:20121203163659+01'00'
Pages 51
Creator PDFCreator Version 0.9.3
Producer GPL Ghostscript 8.54

References

Outgoing
  • BSI-DSZ-CC-0555-2009 - archived - NXP Smart Card Controller P5CD081V1A and its major configurations P5CC081V1A, P5CN081V1A, P5CD041V1A, P5CD021V1A and P5CD016V1A each with IC dedicated Software
  • BSI-DSZ-CC-0645-2010 - archived - NXP Secure PKI Smart Card Controllers P5CD145V0A, MSO; P5CC145V0A, MSO; P5CD128V0A, MSO and P5CC128V0A, MSO; each including IC Dedicated Software

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

ANSSI-CC-2012/76

Extracted SARs

ADV_ARC.1, ADV_FSP.4, ADV_IMP.2, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.1, ASE_TSS.2, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.3, AVA_VAN.5, AVA_VLA.4

Similar certificates

Name Certificate ID
Application IAS Classic v3 sur plateforme Java Card en configuration ouverte de la carte à puce MultiApp ID V2.1 masq... ANSSI-CC-2013/30 Compare
Application IAS XL sur plateforme Java Card en configuration ouverte de la carte à puce MultiApp ID V2.1 sur composan... ANSSI-CC-2012/80 Compare
Application IAS XL sur plateforme Java Card en configuration ouverte de la carte à puce MultiApp ID V2.1 masquée sur ... ANSSI-CC-2013/31 Compare
Plateforme Java Card en configuration ouverte de la carte à puce MultiApp ID V2.1 masquée sur composant P5CC145V0A ANSSI-CC-2013/29 Compare
Plateforme Java Card en configuration ouverte de la carte à puce MultiApp v3.1 masquée sur le composant P60D080PVC(Ve... ANSSI-CC-2014/86 Compare
Plateforme Java Card en configuration ouverte de la carte à puce MultiApp v3.1 masquée sur le composant P60D144PVA (v... ANSSI-CC-2015/15 Compare
Plateforme Java Card de la carte à puce MultiApp ID V2.1 masquée sur composant P5CC081V1A ANSSI-CC-2012/24 Compare
Plateforme Java Card en configuration ouverte de la carte � puce MultiApp V2 masqu�e sur composants de la famille SLE66 ANSSI-CC-2011/10 Compare
Plateforme Java Card en configuration ouverte de la carte à puce MultiApp V3 masquée sur le composant M7820 A11 ANSSI-CC-2014/06 Compare
Plateforme Java Card en configuration ouverte de la carte à puce MultiApp V3 masquée sur le composant M7820 A11 ANSSI-CC-2013/32 Compare
Plateforme Java Card MAV31S en configuration ouverte de la carte à puce Optelio Contactless R7S masquée sur le compos... ANSSI-CC-2015/30 Compare
Application eTravel EAC v2.1, en configuration BAC, sur la plateforme ouverte ou fermée MultiApp V3.1 masquée sur le ... ANSSI-CC-2015/40 Compare
Application eTravel EAC v2.1, en configuration "EAC on BAC", sur la plateforme ouverte ou fermée MultiApp V3.1 masqué... ANSSI-CC-2015/41 Compare
Application eTravel EAC v2.1, en configuration EAC et SAC, sur la plateforme ouverte ou fermée MultiApp V3.1 masquée ... ANSSI-CC-2015/39 Compare
Applet IAS Classic v3 sur carte à puce MultiApp V2 masquée sur composants de la famille SLE66 ANSSI-CC-2011/16 Compare
Application eTravel EAC v2.0, en configuration BAC, sur la carte à puce fermée MultiApp V3 masquée sur le composant M7820 A11 ANSSI-CC-2013/35 Compare
Application eTravel EAC v2.0, en configuration SAC, sur la carte à puce fermée MultiApp V3 masquée sur le composant M7820 A11 ANSSI-CC-2014/08 Compare
Application eTravel EAC v2.0, en configuration SAC, sur la carte à puce fermée MultiApp V3 masquée sur le composant M7820 A11 ANSSI-CC-2013/34 Compare
Application eTravel EAC v2.0, en configuration BAC, sur la carte à puce fermée MultiApp V3 masquée sur le composant M7820 A11 ANSSI-CC-2014/09 Compare
IAS ECC V2 en configuration #1 en composition sur la plateforme ouverte ID-One Cosmo v8.1-N – Large R2 masquée sur le... ANSSI-CC-2018/15 Compare
Application eTravel EAC v2.0, en configuration "EAC on BAC" sur la plateforme ouverte MultiApp V3 masquée sur le comp... ANSSI-CC-2014/48 Compare
Application eTravel EAC v2.1, en configurationBAC, sur la plateforme ouverte MultiApp V3.1masquée sur le composant P6... ANSSI-CC-2015/02 Compare
IAS ECC V2 en configuration #2 en composition sur la plateforme ouverte ID-One Cosmo v8.1-N – Large R2 masquée sur le... ANSSI-CC-2018/16 Compare
IAS ECC V2 en configuration #3 en composition sur la plateforme ouverte ID-One Cosmo v8.1-N – Large R2 masquée sur le... ANSSI-CC-2018/17 Compare
IAS ECC V2 en configuration #4 en composition sur la plateforme ouverte ID-One Cosmo v8.1-N – Large R2 masquée sur le... ANSSI-CC-2018/18 Compare
Gemalto Carte à puce Multiapp ID IAS ECC : applet de signature v4.2.7.A chargée sur la plate-forme Java Card Multiapp... ANSSI-CC-2009/56 Compare
Carte à puce Multiapp ID IAS ECC wafer process : applet de signature v4.2.7.A chargée sur la plate-forme Java Card Mu... ANSSI-CC-2010/52 Compare
Application eTravel EAC v2.0, en configuration BAC, sur la plateforme ouverte MultiApp V3 masquée sur le composant M7820 A11 ANSSI-CC-2014/13 Compare
Application eTravel EAC v2.0, en configuration EAC, sur la plateforme ouverte MultiApp V3 masquée sur le composant M7820 A11 ANSSI-CC-2014/11 Compare
Application eTravel EAC v2.0, en configuration SAC, sur la plateforme ouverte MultiApp V3 masquée sur le composant M7820 A11 ANSSI-CC-2014/12 Compare
Application eTravel EAC v2.1, en configurationBAC, sur la plateforme fermée MultiApp V3.1masquée sur le composant P60... ANSSI-CC-2015/04 Compare
Application IAS V4.2.0.B sur la plateforme JavaCard ouverte MultiApp V3.1 masquée sur le composant P60D144PVA (Versio... ANSSI-CC-2016/03 Compare
Application IAS V4.2.0.B sur la plateforme JavaCard ouverte MultiApp V3.1 masquée sur le composant P60D144PVA (Versio... ANSSI-CC-2016/04 Compare
Plateforme ouverte Java Card MultiApp V4.1 en configuration ouverte masquée sur le composant S3FT9MH(Version 4.1.0.2)... ANSSI-CC-2023/30 Compare
Application IAS V4.2.0.B sur la plateforme Javacard ouverte MultiApp V3.1 masquée sur le composant P60D144PVA (versio... ANSSI-CC-2015/37 Compare
Plateforme ouverte Java Card MultiApp V4.1 en configuration ouverte masquée sur le composant S3FT9MH ANSSI-CC-2018/32 Compare
Application eTravel EAC v2.0 sur la carte à puce fermée MultiApp V3 masquée sur le composant M7820 A11 ANSSI-CC-2014/07 Compare
Application eTravel EAC v2.0 sur la carte à puce fermée MultiApp V3 masquée sur le composant M7820 A11 ANSSI-CC-2013/33 Compare
Plateforme ouverte Java Card MultiApp V4.1 en configuration ouverte masquée sur le composant S3FT9MH (Release Date 28... ANSSI-CC-2018/32v2 Compare
Application IAS V4 sur la plateforme JavaCard ouverte MultiApp V3 masquée sur le composant M7820 A11 (Version du patch : 1.5) ANSSI-CC-2014/50 Compare
Application IAS V4 sur la plateforme JavaCard ouverte MultiApp V3 masquée sur le composant M7820 A11 (Version du patch : 1.5) ANSSI-CC-2014/49 Compare
Applet IAS Classic V3 sur plateforme Java Card ouverte MultiApp Essential V1.0 embarquée sur le composant M7794 A12 et G12 ANSSI-CC-2016/24 Compare
Applet IAS Classic V3 sur plateforme Java Card ouverte MultiApp Essential V1.0 embarquée sur le composant M7793 A12 et G12 ANSSI-CC-2016/23 Compare
eTravel v2.3 on MultiApp v4.1 platform, PACE, EAC and AA activated Version de l’application eTravel : 2.3 Version de ... ANSSI-CC-2018/57v2 Compare
Application IAS V4.2.0.D sur la plateforme Javacard ouverte MultiApp V3.1S masquée sur le composant P60D144JVA (versi... ANSSI-CC-2015/38 Compare
eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated Référence/version du produit Version de l’applicati... ANSSI-CC-2018/58v2 Compare
eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated Référence/version du produit Version de l’applicati... ANSSI-CC-2018/56v2 Compare
Application eTravel EAC v2.0, en configurationSAC, sur la carte à puce fermée MultiApp V3masquée sur le composant M78... ANSSI-CC-2014/62 Compare
Application eTravel EAC v2.0, en configuration "EACon BAC" sur la plateforme fermée MultiApp V3masquée sur le composa... ANSSI-CC-2015/09 Compare
Plateforme Java Card MultiApp V4.2 en configuration ouverte sur le composant IFX_CCI_000010h (Version 4.2.0, Java Car... ANSSI-CC-2020/65v2 Compare
Carte IAS ECC v1.0.1 sur ID-One Cosmo v7.0.1-a : applet (version 3124) masquée sur ID-One Cosmo V7.0.1-a (composant I... ANSSI-CC-2012/10 Compare
Application IAS V4 sur la plateforme JavaCard ouverte MultiApp V3 masquée sur le composant M7820 A11 ANSSI-CC-2014/14 Compare
IAS ECC V2, version 1.3 en configuration #1 sur la plateforme ID-One Cosmo v8.2 ANSSI-CC-2020/50 Compare
IAS ECC V2, version 1.3 en configuration #1 sur la plateforme ID-One Cosmo v8.2 ANSSI-CC-2019/33 Compare
Application IAS V4.2 sur la plateformeJavaCard ouverte MultiApp V3.1 masquée surle composant P60D080PVC(version du pa... ANSSI-CC-2015/08 Compare
Application eTravel EAC v1.3 chargée sur la carte à puce MultiApp V2 SAC (PACE) masquée sur le composant SLE66CLX1440... ANSSI-CC-2011/79 Compare
Mécanisme SAC de l'application eTravel EAC v1.3 chargée sur la carte à puce MultiApp V2 SAC (PACE) masquée sur le com... ANSSI-CC-2011/80 Compare
Application eTravel EAC v2.1, en configurationEAC et SAC, sur la plateforme ouverteMultiApp V3.1 masquée sur le compo... ANSSI-CC-2015/01 Compare
Application eTravel EAC v2.1, en configurationEAC et SAC, sur la plateforme ferméeMultiApp V3.1 masquée sur le compos... ANSSI-CC-2015/03 Compare
Plateforme Java Card MultiApp V4.2 en configuration ouverte sur le composant IFX_CCI_000010h ANSSI-CC-2020/65 Compare
IAS ECC V2, Version 1.3 en configuration #3 sur la plateforme ID-One Cosmo v8.2 ANSSI-CC-2019/35 Compare
IAS ECC V2, version 1.3 en configuration #2 sur la plateforme ID-One Cosmo v8.2 ANSSI-CC-2019/34 Compare
IAS ECC V2, version 1.3 en configuration #4 sur la plateforme ID-One Cosmo v8.2 ANSSI-CC-2020/53 Compare
IAS ECC V2, version 1.3 en configuration #2 sur la plateforme ID-One Cosmo v8.2 ANSSI-CC-2020/51 Compare
IAS ECC V2, version 1.3 en configuration #3 sur la plateforme ID-One Cosmo v8.2 ANSSI-CC-2020/52 Compare
IAS ECC V2, Version 1.3 en configuration #4 sur la plateforme ID-One Cosmo v8.2 ANSSI-CC-2019/36 Compare
Plateforme Java Card MultiApp Essential v1.0, en configuration ouverte, sur le composant Infineon M7794 A12 ou G12 ANSSI-CC-2016/06 Compare
Plateforme Java Card MultiApp Essential v1.0, en configuration ouverte, sur le composant Infineon M7793 A12 ou G12 ANSSI-CC-2015/73 Compare
Carte IAS ECC v1.0.1 : applet version 6179 sur ID-One Cosmo v7.0.1-n R2.0, masquée sur composants NXP P5CC081 et P5CD... ANSSI-CC-2013/70 Compare
Application eTravel EAC v2.0 sur la carte à pucefermée MultiApp V3 masquée sur le composantM7820 A11(Version du patch : 5.0) ANSSI-CC-2014/61 Compare
Application CPS2ter v1.12, adossée à l’application IAS ECC v1.3, en composition sur la plateforme ID-One Cosmo v8.2 (... ANSSI-CC-2019/43 Compare
Application CPS2ter, adossée à l’application IAS ECC v1.3, en composition sur la plateforme ID-One Cosmo v8.2Code SAA... ANSSI-CC-2019/43-R01 Compare
Plateforme JavaCard MultiApp V4.0.1 - PACE en configuration ouverte masquée sur le composant M7892 G12 ANSSI-CC-2017/76 Compare
Oberthur Technologies Applet ID One Classic v1.01.1 en configuration CNS, Classic ou CIE masquée sur Cosmo v7.0-a Sta... ANSSI-CC-2010/26 Compare
Oberthur Carte à puce ID-One Cosmo V7.0-n en configuration Basic masquée sur composant NXP P5CC037 V0A ANSSI-CC-2009/49 Compare
Application Mobile PayPass 1.0.13vA.2.4 (S1133159, release B) sur plateforme Orange NFC V2 G1 configuration MIFARE ac... ANSSI-CC-2014/96 Compare
Oberthur Technologies Applet ID One Classic v1.01.1 en configuration CNS, Classic ou CIE masquée sur Cosmo v7.0-a Lar... ANSSI-CC-2010/25 Compare
eTravel 2.4 en configuration BAC sur plateforme ID Motion V2 (Version de l’application eTravel : 2.4) (ANSSI-CC-2018/... ANSSI-CC-2018/36v2 Compare
Oberthur Technologies Applet ID One Classic v1.01.1 en configuration CNS, Classic ou CIE chargée sur Cosmo v7.0-n Lar... ANSSI-CC-2010/27 Compare
eTravel 2.4 en configuration EAC BAC sur plateforme ID Motion V2(Version de l’application eTravel : 2.4) ( ANSSI-CC-2... ANSSI-CC-2018/37v2 Compare
eTravel 2.4 en configuration EAC SAC sur plateforme ID Motion V2 (Version de l’application eTravel : 2.4) (ANSSI-CC-2... ANSSI-CC-2018/38v2 Compare
Carte ID-One IAS-ECC v1.0.1 R1 : applet (version 1121) chargée sur Cosmo v7.0-a (composant Atmel) en configuration La... ANSSI-CC-2010/36 Compare
Oberthur Carte à puce ID-One Cosmo V7.0-n en configuration Large, Standard, Basic (modes dual ou contact) ou Entry (m... ANSSI-CC-2009/48 Compare
Carte ID-One IAS-ECC v1.0.1 R1 : applet (version 1121) chargée sur Cosmo v7.0-n (composant NXP) en configuration Larg... ANSSI-CC-2010/39 Compare
Applet MICAO v1.1.3 sur la plateforme IdealCitiz v2.1, en configuration BAC ANSSI-CC-2016/81 Compare
Applet MICAO v1.1.3 sur la plateforme IdealCitiz v2.1, en configuration SAC/EAC ANSSI-CC-2016/80 Compare
Showing 5 out of 86.

References

Loading...

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": null,
  "dgst": "3ccbc80437c97a32",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2012/76",
    "cert_lab": [
      "SERMA"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL4+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_MSU",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VLA",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "2.1"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": {
      "_type": "Set",
      "elements": [
        "40002c3611fc465f",
        "9863a376f3bb4175"
      ]
    },
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2012/24",
          "BSI-DSZ-CC-0555-2009"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2012/24",
          "BSI-DSZ-CC-0555-2009"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0645-2010",
          "BSI-DSZ-CC-0555-2009"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0645-2010",
          "BSI-DSZ-CC-0555-2009"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2015-10-14",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2012_76_M01.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "ANSSI-CC-2012/76-M01"
      }
    ]
  },
  "manufacturer": "Gemalto / NXP Semiconductors",
  "manufacturer_web": "https://www.gemalto.com/",
  "name": "Application IAS Classic v3 sur plateforme Java Card en configuration ouverte de la carte \u00e0 puce MultiApp ID V2.1 sur composant P5CC081V1A",
  "not_valid_after": "2019-09-01",
  "not_valid_before": "2012-12-03",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "ANSSI-CC_2012-76fr.pdf",
    "report_frontpage": {
      "FR": {
        "cc_security_level": "EAL4 Augment\u00e9 ALC_DVS.2 et AVA_VAN.5",
        "cc_version": "CC version 3.1 r\u00e9vision 3",
        "cert_id": "ANSSI-CC-2012/76",
        "cert_item": "Application IAS Classic v3 sur plateforme Java Card en configuration ouverte de la carte \u00e0 puce MultiApp ID V2.1 sur composant P5CC081V1A",
        "cert_item_version": "R\u00e9f\u00e9rence IAS Classic V3 on MultiApp ID V2.1, Version MPH117 avec filtre V2.2",
        "cert_lab": "SERMA Technologies 30 Avenue Gustave Eiffel, 33608 Pessac, France",
        "developer": "GEMALTO La Vigie Avenue du Jujubier, ZI Ath\u00e9lia IV BP 90, 13702 La Ciotat, France NXP 101 Stresemanallee, D-22502 Hambourg Allemagne Commanditaire GEMALTO La Vigie Avenue du Jujubier, ZI Ath\u00e9lia IV BP 90, 13702 La Ciotat, France",
        "match_rules": [
          "R\u00e9f\u00e9rence du rapport de certification(.+)Nom du produit(.+)R\u00e9f\u00e9rence/version du produit(.*)Conformit\u00e9 \u00e0 un profil de protection(.+)Crit\u00e8res d\u2019\u00e9valuation et version(.+)Niveau d\u2019\u00e9valuation(.+)D\u00e9veloppeurs(.+)Centre d\u2019\u00e9valuation(.+)Accords de reconnaissance applicables"
        ],
        "ref_protection_profiles": "BSI-PP-0005-2002], version v1.04 Protection Profile \u2014 Secure Signature-Creation Device Type 2, [BSI-PP-0006-2002], version v1.05 Protection Profile \u2014 Secure Signature Creation Device Type 3"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0555-2009": 3
        },
        "FR": {
          "ANSSI-CC-2012/24": 3,
          "ANSSI-CC-2012/76": 18
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP- 0005-2002": 1,
          "BSI-PP- 0006-2002": 1,
          "BSI-PP- 0035-2007": 1,
          "BSI-PP-0005-2002": 3,
          "BSI-PP-0006-2002": 2,
          "BSI-PP-0035-2007": 2
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_FSP": 1,
          "ADV_IMP": 1,
          "ADV_INT": 1,
          "ADV_SPM": 1,
          "ADV_TDS": 1
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_PRE": 1
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMS": 1,
          "ALC_DEL": 1,
          "ALC_DVS": 1,
          "ALC_DVS.2": 3,
          "ALC_FLR": 2,
          "ALC_TAT": 1
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_ECD": 1,
          "ASE_INT": 1,
          "ASE_OBJ": 1,
          "ASE_REQ": 1,
          "ASE_SPD": 1,
          "ASE_TSS": 1,
          "ASE_TSS.2": 1
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_DPT": 1,
          "ATE_FUN": 1,
          "ATE_IND": 1
        },
        "AVA": {
          "AVA_VAN": 3,
          "AVA_VAN.5": 3
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 3": 1,
          "EAL 5": 1,
          "EAL 7": 1,
          "EAL4": 4,
          "EAL5": 1,
          "EAL7": 1
        },
        "ITSEC": {
          "ITSEC E6 Elev\u00e9": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Serma": {
          "SERMA": 2
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2009-07-001": 1,
          "CCMB-2009-07-002": 1,
          "CCMB-2009-07-003": 1,
          "CCMB-2009-07-004": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Gemalto": {
          "Gemalto": 14
        },
        "NXP": {
          "NXP": 6
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20121203163819+01\u002700\u0027",
      "/Keywords": "",
      "/ModDate": "D:20121203163819+01\u002700\u0027",
      "/Producer": "Acrobat Distiller 9.0.0 (Windows)",
      "pdf_file_size_bytes": 309844,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.ssi.gouv.fr/",
          "mailto:[email protected]"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 17
    },
    "st_filename": "ANSSI-CC-cible_2012-76en.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 1
          }
        },
        "RSA": {
          "RSA 1024": 1
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0555-2009": 1,
          "BSI-DSZ-CC-0645-2010": 1
        },
        "FR": {
          "ANSSI-PP-2010-03": 1
        },
        "NL": {
          "CC-1": 2,
          "CC-2": 2,
          "CC-3": 3
        }
      },
      "cc_claims": {
        "A": {
          "A.CGA": 1,
          "A.SCA": 1
        },
        "D": {
          "D.DTBS": 6,
          "D.RAD": 5,
          "D.SCD": 11,
          "D.SIG": 3,
          "D.SSCD": 1,
          "D.SVD": 7,
          "D.VAD": 1
        },
        "OE": {
          "OE.HI_VAD": 1,
          "OE.SVD_AUTH_CGA": 1
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP-0004-2002": 1,
          "BSI-PP-0005-2002": 1,
          "BSI-PP-0006-2002": 1,
          "BSI-PP-0035": 1
        },
        "other": {
          "PP-SSCD /T1": 1,
          "PP-SSCD /T2": 9,
          "PP-SSCD /T3": 7
        }
      },
      "cc_sar": {
        "ACM": {
          "ACM_AUT": 1,
          "ACM_CAP": 2,
          "ACM_SCP": 2
        },
        "ADO": {
          "ADO_DEL": 2,
          "ADO_IGS": 1
        },
        "ADV": {
          "ADV_ARC": 2,
          "ADV_ARC.1": 1,
          "ADV_FSP": 1,
          "ADV_FSP.4": 1,
          "ADV_HLD": 1,
          "ADV_IMP": 1,
          "ADV_IMP.1": 2,
          "ADV_IMP.2": 1,
          "ADV_LLD": 1,
          "ADV_TDS.3": 1
        },
        "AGD": {
          "AGD_ADM": 1,
          "AGD_OPE": 1,
          "AGD_OPE.1": 1,
          "AGD_PRE": 3,
          "AGD_PRE.1": 3,
          "AGD_USR": 1
        },
        "ALC": {
          "ALC_CMC": 2,
          "ALC_CMC.4": 1,
          "ALC_CMS": 2,
          "ALC_CMS.4": 1,
          "ALC_DEL": 2,
          "ALC_DEL.1": 1,
          "ALC_DVS": 2,
          "ALC_DVS.2": 4,
          "ALC_LCD": 1,
          "ALC_LCD.1": 1,
          "ALC_TAT": 1,
          "ALC_TAT.1": 1
        },
        "ASE": {
          "ASE_TSS.2": 1
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.2": 1,
          "ATE_DPT": 1,
          "ATE_DPT.1": 1,
          "ATE_FUN": 1,
          "ATE_FUN.1": 1,
          "ATE_IND": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_CCA": 1,
          "AVA_MSU": 1,
          "AVA_MSU.3": 1,
          "AVA_SOF": 1,
          "AVA_VAN": 1,
          "AVA_VAN.5": 4,
          "AVA_VLA": 1,
          "AVA_VLA.4": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 7,
          "EAL4 augmented": 3,
          "EAL4+": 9,
          "EAL5": 1,
          "EAL5 augmented": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 1
        },
        "FCS": {
          "FCS_CKM": 8,
          "FCS_CKM.1": 2,
          "FCS_CKM.4": 4,
          "FCS_COP": 6,
          "FCS_COP.1": 8
        },
        "FDP": {
          "FDP_ACC": 4,
          "FDP_ACC.1": 9,
          "FDP_ACF": 3,
          "FDP_ACF.1": 24,
          "FDP_ETC": 4,
          "FDP_ETC.1": 4,
          "FDP_ITC": 3,
          "FDP_ITC.1": 8,
          "FDP_RIP": 3,
          "FDP_RIP.1": 2,
          "FDP_RIP.1.1": 1,
          "FDP_SDI": 6,
          "FDP_SDI.2": 6,
          "FDP_UCT": 2,
          "FDP_UCT.1": 4,
          "FDP_UIT": 3,
          "FDP_UIT.1": 6
        },
        "FIA": {
          "FIA_AFL": 2,
          "FIA_AFL.1": 3,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_ATD": 2,
          "FIA_ATD.1": 3,
          "FIA_ATD.1.1": 1,
          "FIA_UAU": 2,
          "FIA_UAU.1": 3,
          "FIA_UAU.1.1": 2,
          "FIA_UAU.1.2": 1,
          "FIA_UID": 3,
          "FIA_UID.1": 4,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1
        },
        "FMT": {
          "FMT_MOF": 3,
          "FMT_MOF.1": 2,
          "FMT_MOF.1.1": 1,
          "FMT_MSA": 4,
          "FMT_MSA.1": 4,
          "FMT_MSA.2": 3,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 7,
          "FMT_MTD": 2,
          "FMT_MTD.1": 3,
          "FMT_MTD.1.1": 1,
          "FMT_SMF": 2,
          "FMT_SMF.1": 3,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 2,
          "FMT_SMR.1": 3,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_AMT.1": 1,
          "FPT_FLS": 2,
          "FPT_FLS.1": 3,
          "FPT_FLS.1.1": 1,
          "FPT_PHP": 2,
          "FPT_PHP.1": 3,
          "FPT_PHP.1.1": 1,
          "FPT_PHP.1.2": 1,
          "FPT_PHP.3": 3,
          "FPT_PHP.3.1": 1,
          "FPT_TST": 3,
          "FPT_TST.1": 3,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FTP": {
          "FTP_ITC": 6,
          "FTP_ITC.1": 14,
          "FTP_TRP": 6,
          "FTP_TRP.1": 3,
          "FTP_TRP.1.1": 1,
          "FTP_TRP.1.2": 1,
          "FTP_TRP.1.3": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 3,
            "SHA1": 1
          },
          "SHA2": {
            "SHA-256": 3,
            "SHA256": 2
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {
        "JavaCard": {
          "Java Card 2.2.2": 7
        }
      },
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "PRNG": 1
        },
        "RNG": {
          "RNG": 3
        }
      },
      "side_channel_analysis": {
        "FI": {
          "physical tampering": 4
        },
        "SCA": {
          "DPA": 1,
          "SPA": 1,
          "Side channel": 1,
          "timing attacks": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS31": 1
        },
        "CC": {
          "CCMB-2009-07-001": 1,
          "CCMB-2009-07-002": 1,
          "CCMB-2009-07-003": 1,
          "CCMB-2009-07-004": 1
        },
        "FIPS": {
          "FIPS 180-2": 1,
          "FIPS 46-3": 1
        },
        "PKCS": {
          "PKCS #1": 1
        },
        "SCP": {
          "SCP01": 1,
          "SCP02": 1,
          "SCP03": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "HPC": {
            "HPC": 1
          }
        },
        "DES": {
          "3DES": {
            "3DES": 1,
            "TDES": 8,
            "Triple-DES": 2
          },
          "DES": {
            "DES": 3
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Gemalto": {
          "Gemalto": 74
        },
        "NXP": {
          "NXP": 20
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/CreationDate": "D:20121019145156Z",
      "/Creator": "PDFCreator Version 0.9.3",
      "/Keywords": "",
      "/ModDate": "D:20121203163659+01\u002700\u0027",
      "/Producer": "GPL Ghostscript 8.54",
      "/Subject": "",
      "/Title": "",
      "pdf_file_size_bytes": 480443,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 51
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": [
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0006b.pdf",
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0005b.pdf"
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2012-76fr.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_DVS.2",
      "EAL4+",
      "AVA_VAN.5"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2012-76en.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "1bb9605207ef196a21b051eb456beed14054321a1f8da6feddde95d30338ed40",
      "txt_hash": "5dbe12eec8beb4bac80665e4eeed49a7b20652bde13b844823e376fbd0860a0a"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "e73840b50b8d666f3cfa2b4b901c7c509e78801f83f148b9eb85e9af3a2f8df0",
      "txt_hash": "35a9b99717eb4b24b063aac0b55e75d4e21177871c5a31c44da75f774b0bd261"
    }
  },
  "status": "archived"
}