This page was not yet optimized for use on mobile
devices.
Plateforme JavaCard MultiApp V4.0 en configuration ouverte basée sur l’Operating System JLEP3 masquée sur le composant SLE78CLFX4000PH (M7892 G12)
CSV information
| Status | active |
|---|---|
| Valid from | 08.03.2017 |
| Valid until | 06.09.2027 |
| Scheme | 🇫🇷 FR |
| Manufacturer | Gemalto |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | EAL5+, AVA_VAN.5, ALC_DVS.2 |
| Protection profiles | |
| Maintenance updates | Reassessment report : ANSSI-CC-2017/07-S01 (06.09.2022) Certification report |
Heuristics summary
Certificate ID: ANSSI-CC-2017/07
Certificate
Extracted keywords
Security level
EAL5, EAL2Security Assurance Requirements (SAR)
ALC_DVS.2, AVA_VAN.5Protection profiles
ANSSI-CC-PP-2010/03-M01Certificates
ANSSI-CC-2017/07-S01, ANSSI-CC-PP-2010/03-M01Evaluation facilities
SERMAFile metadata
| Title | ANSSI-CC-2017/07 |
|---|---|
| Keywords | version x.x, révision x |
| Author | DUCLOS Charlene |
| Creation date | D:20220916174040+02'00' |
| Modification date | D:20220916174040+02'00' |
| Pages | 2 |
| Creator | Acrobat PDFMaker 21 pour Word |
| Producer | Adobe PDF Library 21.11.71 |
Certification report
Extracted keywords
Symmetric Algorithms
DESAsymmetric Algorithms
ECDHHash functions
SHA-2Protocols
PACEVendor
Infineon Technologies AG, Infineon, Gemalto, Gemplus, MicrosoftSecurity level
EAL 5, EAL2, EAL6, EAL7, EAL 1, EAL 3, EAL 7, ITSEC E6 ElevéSecurity Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_FLR.1, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSSProtection profiles
BSI-PP-0084-Certificates
BSI-DSZ-CC-0891-V2-2016, ANSSI-CC-2017/07Evaluation facilities
Serma Safety & SecurityStandards
CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004File metadata
| Title | ANSSI-CC-2017_07fr |
|---|---|
| Pages | 19 |
| Creator | PDFCreator Version 1.2.1 |
| Producer | GPL Ghostscript 9.02 |
Frontpage
| Certificate ID | ANSSI-CC-2017/07 |
|---|---|
| Certified item | Plateforme JavaCard MultiApp V4.0 en configuration ouverte basée sur l’Operating System JLEP3 masquée sur le composant SLE78CLFX4000PH (M7892 G12 |
| Certification lab | Serma Safety & Security 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France |
| Developer | Gemalto 6 rue de la Verrerie CS20001 92197 Meudon Cedex, France Infineon Technologies AG Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie CS20001, 92197 Meudon Cedex, France |
References
Outgoing- BSI-DSZ-CC-0891-V2-2016 - archived - Infineon Security Controller, M7892 Design Steps D11 and G12, with optional RSA2048/4096 v2.03.008, EC v2.03.008, SHA-2 v1.01 and Toolbox v2.03.008 libraries, symmetric crypto library v2.02.010 and with specific IC dedicated software (firmware)
- ANSSI-CC-2017/19 - archived - eTravel 2.2 en configuration EAC sur BAC sur Plate-forme MultiApp v4.0
- ANSSI-CC-2017/22 - active - IAS Classic V4.4 with MOC Server 1.1 on MultiApp V4
- ANSSI-CC-2017/20 - archived - eTravel 2.2 en configuration EAC sur SAC sur Plate-forme MultiApp v4.0
- ANSSI-CC-2017/21 - archived - eTravel 2.2 en configuration BAC sur Plate-forme MultiApp v4.0
- ANSSI-CC-2017/54 - archived - Plateforme JavaCard MultiApp V4.0 - PACE en configuration ouverte basée sur l'Operating System JLEP3 masquée sur le composant SLE78CLFX4000PH (M7892 G12)
Security target
Extracted keywords
Symmetric Algorithms
AES, DES, TDEA, 3DES, TDESAsymmetric Algorithms
ECDH, ECDSA, ECC, DH, Diffie-HellmanHash functions
SHA1, SHA-1, SHA-224, SHA-256, SHA-512, SHA224, SHA-384Schemes
MAC, Key agreementProtocols
PACERandomness
PRNG, RNG, RNDBlock cipher modes
ECB, CBCJavaCard versions
Java Card 2.2.2, Java Card 3.0.4JavaCard API constants
TYPE_ACCESSVendor
Infineon, GemaltoSecurity level
EAL6, EAL6+, EAL5+, EAL5, EAL 6+, EAL6 augmented, EAL5 augmentedClaims
D.APP_CODE, D.APP_C_DATA, D.APP_I_DATA, D.PIN, D.API_DATA, D.CRYPTO, D.JCS_CODE, D.JCS_DATA, D.SEC_DATA, O.SID, O.FIREWALL, O.GLOBAL_ARRAYS_CONFID, O.GLOBAL_ARRAYS_INTEG, O.NATIVE, O.OPERATE, O.REALLOCATION, O.RESOURCES, O.ALARM, O.CIPHER, O.KEY-MNGT, O.PIN-MNGT, O.TRANSACTION, O.OBJ-DELETION, O.DELETION, O.LOAD, O.INSTALL, O.SCP, O.CARD-MANAGEMENT, O.RND, O.APPLET, O.CODE_PKG, O.JAVAOBJECT, O.CODE_PCKG, T.CONFID-APPLI-DATA, T.CONFID-JCS-CODE, T.CONFID-JCS-DATA, T.INTEG-APPLI-CODE, T.INTEG-APPLI-DATA, T.INTEG-JCS-CODE, T.INTEG-JCS-DATA, T.SID, T.EXE-CODE, T.NATIVE, T.RESOURCES, T.DELETION, T.INSTALL, T.OBJ-DELETION, T.PHYSICAL, A.APPLET, A.DELETION, A.VERIFICATION, R.JAVA, OP.ARRAY_ACCESS, OP.CREATE, OP.DELETE_APPLET, OP.DELETE_PCKG, OP.DELETE_PCKG_APPLET, OP.INSTANCE_FIELD, OP.INVK_VIRTUAL, OP.INVK_INTERFACE, OP.JAVA, OP.THROW, OP.TYPE_ACCESS, OP.PUT, OE.VERIFICATION, OE.APPLET, OE.CODE-EVIDENCE, OSP.VERIFICATION, OSP.RNDSecurity Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_TDS, ALC_DVS.2, AVA_VAN.5Security Functional Requirements (SFR)
FAU_ARP.1, FAU_ARP.1.1, FCO_NRO, FCO_NRO.2, FCS_RND, FCS_RND.1, FCS_CKM.1, FCS_RND.1.1, FCS_CKM.1.1, FCS_CKM.2, FCS_CKM.2.1, FCS_CKM.3, FCS_CKM.3.1, FCS_CKM.4, FCS_CKM.4.1, FCS_COP.1, FCS_COP.1.1, FDP_ACC, FDP_ACC.2, FDP_ACF, FDP_ACF.1, FDP_IFC, FDP_IFC.1, FDP_IFF, FDP_IFF.1, FDP_RIP, FDP_RIP.1, FDP_ROL, FDP_ROL.1, FDP_SDI.2, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ITC, FDP_ITC.2, FDP_IFC.2, FDP_UIT, FDP_UIT.1, FDP_ACC.1, FIA_SOS.2, FIA_ATD, FIA_ATD.1, FIA_UID, FIA_UID.2, FIA_USB, FIA_USB.1, FIA_UAU, FIA_UAI.1, FIA_UAU.1, FIA_UID.1, FMT_MSA, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_SMR, FMT_SMR.1, FMT_SMF, FMT_SMF.1, FMT_MTD, FMT_MTD.1, FMT_MTD.3, FPR_UNO.1, FPR_UNO.1.1, FPR_UNO, FPT_FLS, FPT_FLS.1, FPT_TDC.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_RCV, FPT_RCV.3, FPT_TST, FPT_TST.1, FPT_PHP, FPT_PHP.3, FPT_RCV.4, FPT_ITT, FPT_ITT.1, FTP_ITC, FTP_ITC.1Protection profiles
BSI-CC-PP-0084-Certificates
BSI-DSZ-CC-0891-V2-2016, CC-1, CC-2, CC-3Evaluation facilities
Serma TechnologiesSide-channel analysis
Leak-Inherent, physical probing, DPA, physical tampering, malfunction, Malfunction, fault inductionStandards
FIPS180-2, FIPS197, PKCS#3, PKCS#1, PKCS#5, AIS31, SCP03, SCP01, SCP02, CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004File metadata
| Title | eTravel v1.0 Security Target MAÏA3 |
|---|---|
| Subject | Security Target |
| Keywords | Security Target, CC |
| Author | Antoine de Lavernette |
| Creation date | D:20170224103913+01'00' |
| Modification date | D:20170224103935+01'00' |
| Pages | 79 |
| Creator | Microsoft® Word 2013 |
| Producer | Microsoft® Word 2013 |
References
Outgoing- BSI-DSZ-CC-0891-V2-2016 - archived - Infineon Security Controller, M7892 Design Steps D11 and G12, with optional RSA2048/4096 v2.03.008, EC v2.03.008, SHA-2 v1.01 and Toolbox v2.03.008 libraries, symmetric crypto library v2.02.010 and with specific IC dedicated software (firmware)
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
ANSSI-CC-2017/07Extracted SARs
ALC_DVS.2, ALC_FLR.1, AVA_VAN.5Similar certificates
Showing 5 out of 42.
References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2017-07_s01.pdf",
"dgst": "5b7b6a9b33f1dab4",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2017/07",
"cert_lab": [
"SERMA"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL5+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"4.0"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": {
"_type": "Set",
"elements": [
"85bef5b6f16c4d33"
]
},
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2017/19",
"ANSSI-CC-2017/20",
"ANSSI-CC-2017/21",
"ANSSI-CC-2017/54",
"ANSSI-CC-2017/22"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0891-V2-2016"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2020/49",
"ANSSI-CC-2017/81",
"ANSSI-CC-2020/43",
"ANSSI-CC-2017/21",
"ANSSI-CC-2019/07",
"ANSSI-CC-2018/57",
"ANSSI-CC-2017/22",
"ANSSI-CC-2019/31",
"ANSSI-CC-2020/45",
"ANSSI-CC-2018/53",
"ANSSI-CC-2017/20",
"ANSSI-CC-2017/82",
"ANSSI-CC-2018/32v2",
"ANSSI-CC-2017/54",
"ANSSI-CC-2018/32",
"ANSSI-CC-2020/44",
"BSI-DSZ-CC-1003-2018",
"ANSSI-CC-2017/19",
"ANSSI-CC-2018/57v2",
"ANSSI-CC-2018/58",
"ANSSI-CC-2017/83",
"ANSSI-CC-2018/56",
"ANSSI-CC-2018/58v2",
"ANSSI-CC-2020/42",
"ANSSI-CC-2018/21",
"ANSSI-CC-2018/24",
"ANSSI-CC-2020/33",
"ANSSI-CC-2018/11",
"ANSSI-CC-2018/56v2",
"ANSSI-CC-2017/76"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0891-2015",
"BSI-DSZ-CC-0891-V2-2016",
"BSI-DSZ-CC-0782-2012"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0891-V2-2016"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0891-V2-2016"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2022-09-06",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2017-07_s01.pdf",
"maintenance_st_link": null,
"maintenance_title": "Reassessment report : ANSSI-CC-2017/07-S01"
}
]
},
"manufacturer": "Gemalto",
"manufacturer_web": "https://www.gemalto.com/",
"name": "Plateforme JavaCard MultiApp V4.0 en configuration ouverte bas\u00e9e sur l\u2019Operating System JLEP3 masqu\u00e9e sur le composant SLE78CLFX4000PH (M7892 G12)",
"not_valid_after": "2027-09-06",
"not_valid_before": "2017-03-08",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "certificat-anssi-cc-2017-07_s01.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2017/07-S01": 2,
"ANSSI-CC-PP-2010/03-M01": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"ANSSI": {
"ANSSI-CC-PP-2010/03-M01": 1
}
},
"cc_sar": {
"ALC": {
"ALC_DVS.2": 1
},
"AVA": {
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 1,
"EAL5": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Serma": {
"SERMA": 2
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": {
"/Author": "DUCLOS Charlene",
"/Category": "-S01",
"/Comments": "ANSSI-CC-CER-F-14_v14.7",
"/Company": "SGDSN",
"/CreationDate": "D:20220916174040+02\u002700\u0027",
"/Creator": "Acrobat PDFMaker 21 pour Word",
"/Keywords": "version x.x, r\u00e9vision x",
"/ModDate": "D:20220916174040+02\u002700\u0027",
"/Producer": "Adobe PDF Library 21.11.71",
"/SourceModified": "D:20220916154029",
"/Title": "ANSSI-CC-2017/07",
"pdf_file_size_bytes": 147308,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 2
},
"report_filename": "ANSSI-CC-2017_07.pdf",
"report_frontpage": {
"FR": {
"cc_security_level": "EAL 5 augment\u00e9 ALC_DVS.2, AVA_VAN.5",
"cc_version": "Crit\u00e8res Communs version 3.1 r\u00e9vision 4",
"cert_id": "ANSSI-CC-2017/07",
"cert_item": "Plateforme JavaCard MultiApp V4.0 en configuration ouverte bas\u00e9e sur l\u2019Operating System JLEP3 masqu\u00e9e sur le composant SLE78CLFX4000PH (M7892 G12",
"cert_item_version": "JavaCard version 3.0.4, GP version 2.2.1",
"cert_lab": "Serma Safety \u0026 Security 14 rue Galil\u00e9e, CS 10055, 33615 Pessac Cedex, France",
"developer": "Gemalto 6 rue de la Verrerie CS20001 92197 Meudon Cedex, France Infineon Technologies AG Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie CS20001, 92197 Meudon Cedex, France",
"match_rules": [
"R\u00e9f\u00e9rence du rapport de certification(.+)Nom du produit(.+)R\u00e9f\u00e9rence/version du produit(.*)Conformit\u00e9 \u00e0 un profil de protection(.+)Crit\u00e8res d\u2019\u00e9valuation et version(.+)Niveau d\u2019\u00e9valuation(.+)D\u00e9veloppeurs(.+)Centre d\u2019\u00e9valuation(.+)Accords de reconnaissance applicables"
],
"ref_protection_profiles": "PP JCS-O] SUN Java Card System Protection Profile Open Configuration, version 3.0"
}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDH": {
"ECDH": 1
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0891-V2-2016": 2
},
"FR": {
"ANSSI-CC-2017/07": 20
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0084-": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_FSP": 1,
"ADV_IMP": 1,
"ADV_INT": 1,
"ADV_SPM": 1,
"ADV_TDS": 1
},
"AGD": {
"AGD_OPE": 3,
"AGD_PRE": 3
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMS": 1,
"ALC_DEL": 1,
"ALC_DVS": 1,
"ALC_DVS.2": 2,
"ALC_FLR": 2,
"ALC_FLR.1": 1,
"ALC_TAT": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_ECD": 1,
"ASE_INT": 1,
"ASE_OBJ": 1,
"ASE_REQ": 1,
"ASE_SPD": 1,
"ASE_TSS": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_DPT": 1,
"ATE_FUN": 1,
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.5": 4
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 3": 1,
"EAL 5": 3,
"EAL 7": 1,
"EAL2": 2,
"EAL6": 1,
"EAL7": 1
},
"ITSEC": {
"ITSEC E6 Elev\u00e9": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PACE": {
"PACE": 1
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Serma": {
"Serma Safety \u0026 Security": 1
}
},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-2": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {
"com": {
"com.gemalto.javacardx.pace": 1
},
"javacardx": {
"javacardx.pace": 1
}
},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2012-09-001": 1,
"CCMB-2012-09-002": 1,
"CCMB-2012-09-003": 1,
"CCMB-2012-09-004": 1
}
},
"symmetric_crypto": {
"DES": {
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Gemalto": {
"Gemalto": 17
},
"Gemplus": {
"Gemplus": 1
},
"Infineon": {
"Infineon": 2,
"Infineon Technologies AG": 2
},
"Microsoft": {
"Microsoft": 1
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "",
"/CreationDate": "",
"/Creator": "PDFCreator Version 1.2.1",
"/Keywords": "",
"/ModDate": "",
"/Producer": "GPL Ghostscript 9.02",
"/Subject": "",
"/Title": "ANSSI-CC-2017_07fr",
"pdf_file_size_bytes": 1690566,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 19
},
"st_filename": "ANSSI_cible2017_07en.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 11
},
"ECDH": {
"ECDH": 4
},
"ECDSA": {
"ECDSA": 4
}
},
"FF": {
"DH": {
"DH": 10,
"Diffie-Hellman": 4
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0891-V2-2016": 1
},
"NL": {
"CC-1": 2,
"CC-2": 3,
"CC-3": 3
}
},
"cc_claims": {
"A": {
"A.APPLET": 2,
"A.DELETION": 2,
"A.VERIFICATION": 2
},
"D": {
"D.API_DATA": 3,
"D.APP_CODE": 6,
"D.APP_C_DATA": 3,
"D.APP_I_DATA": 4,
"D.CRYPTO": 5,
"D.JCS_CODE": 3,
"D.JCS_DATA": 5,
"D.PIN": 4,
"D.SEC_DATA": 7
},
"O": {
"O.ALARM": 1,
"O.APPLET": 28,
"O.CARD-MANAGEMENT": 1,
"O.CIPHER": 2,
"O.CODE_PCKG": 16,
"O.CODE_PKG": 7,
"O.DELETION": 1,
"O.FIREWALL": 1,
"O.GLOBAL_ARRAYS_CONFID": 1,
"O.GLOBAL_ARRAYS_INTEG": 1,
"O.INSTALL": 1,
"O.JAVAOBJECT": 56,
"O.KEY-MNGT": 2,
"O.LOAD": 1,
"O.NATIVE": 1,
"O.OBJ-DELETION": 1,
"O.OPERATE": 1,
"O.PIN-MNGT": 2,
"O.REALLOCATION": 1,
"O.RESOURCES": 1,
"O.RND": 1,
"O.SCP": 3,
"O.SID": 1,
"O.TRANSACTION": 2
},
"OE": {
"OE.APPLET": 1,
"OE.CODE-EVIDENCE": 1,
"OE.VERIFICATION": 4
},
"OP": {
"OP.ARRAY_ACCESS": 6,
"OP.CREATE": 10,
"OP.DELETE_APPLET": 6,
"OP.DELETE_PCKG": 4,
"OP.DELETE_PCKG_APPLET": 4,
"OP.INSTANCE_FIELD": 6,
"OP.INVK_INTERFACE": 10,
"OP.INVK_VIRTUAL": 8,
"OP.JAVA": 8,
"OP.PUT": 7,
"OP.THROW": 7,
"OP.TYPE_ACCESS": 7
},
"OSP": {
"OSP.RND": 2,
"OSP.VERIFICATION": 2
},
"R": {
"R.JAVA": 9
},
"T": {
"T.CONFID-APPLI-DATA": 2,
"T.CONFID-JCS-CODE": 2,
"T.CONFID-JCS-DATA": 2,
"T.DELETION": 1,
"T.EXE-CODE": 4,
"T.INSTALL": 2,
"T.INTEG-APPLI-CODE": 3,
"T.INTEG-APPLI-DATA": 4,
"T.INTEG-JCS-CODE": 1,
"T.INTEG-JCS-DATA": 2,
"T.NATIVE": 2,
"T.OBJ-DELETION": 2,
"T.PHYSICAL": 2,
"T.RESOURCES": 1,
"T.SID": 4
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0084-": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_FSP": 1,
"ADV_IMP": 1,
"ADV_TDS": 1
},
"ALC": {
"ALC_DVS.2": 2
},
"AVA": {
"AVA_VAN.5": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 6+": 1,
"EAL5": 2,
"EAL5 augmented": 2,
"EAL5+": 1,
"EAL6": 1,
"EAL6 augmented": 1,
"EAL6+": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP.1": 5,
"FAU_ARP.1.1": 1
},
"FCO": {
"FCO_NRO": 2,
"FCO_NRO.2": 3
},
"FCS": {
"FCS_CKM.1": 9,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 2,
"FCS_CKM.2.1": 1,
"FCS_CKM.3": 2,
"FCS_CKM.3.1": 1,
"FCS_CKM.4": 2,
"FCS_CKM.4.1": 1,
"FCS_COP.1": 14,
"FCS_COP.1.1": 1,
"FCS_RND": 7,
"FCS_RND.1": 7,
"FCS_RND.1.1": 2
},
"FDP": {
"FDP_ACC": 14,
"FDP_ACC.1": 1,
"FDP_ACC.2": 6,
"FDP_ACF": 16,
"FDP_ACF.1": 13,
"FDP_IFC": 4,
"FDP_IFC.1": 1,
"FDP_IFC.2": 2,
"FDP_IFF": 4,
"FDP_IFF.1": 10,
"FDP_ITC": 4,
"FDP_ITC.2": 5,
"FDP_RIP": 17,
"FDP_RIP.1": 8,
"FDP_ROL": 6,
"FDP_ROL.1": 2,
"FDP_SDI.2": 2,
"FDP_SDI.2.1": 1,
"FDP_SDI.2.2": 1,
"FDP_UIT": 2,
"FDP_UIT.1": 2
},
"FIA": {
"FIA_ATD": 3,
"FIA_ATD.1": 1,
"FIA_SOS.2": 1,
"FIA_UAI.1": 1,
"FIA_UAU": 2,
"FIA_UAU.1": 1,
"FIA_UID": 4,
"FIA_UID.1": 2,
"FIA_UID.2": 1,
"FIA_USB": 2,
"FIA_USB.1": 3
},
"FMT": {
"FMT_MSA": 21,
"FMT_MSA.1": 5,
"FMT_MSA.2": 1,
"FMT_MSA.3": 10,
"FMT_MTD": 4,
"FMT_MTD.1": 2,
"FMT_MTD.3": 1,
"FMT_SMF": 6,
"FMT_SMF.1": 3,
"FMT_SMR": 9,
"FMT_SMR.1": 8
},
"FPR": {
"FPR_UNO": 2,
"FPR_UNO.1": 3,
"FPR_UNO.1.1": 1
},
"FPT": {
"FPT_FLS": 10,
"FPT_FLS.1": 5,
"FPT_ITT": 2,
"FPT_ITT.1": 1,
"FPT_PHP": 2,
"FPT_PHP.3": 1,
"FPT_RCV": 4,
"FPT_RCV.3": 4,
"FPT_RCV.4": 1,
"FPT_TDC.1": 2,
"FPT_TDC.1.1": 1,
"FPT_TDC.1.2": 1,
"FPT_TST": 2,
"FPT_TST.1": 3
},
"FTP": {
"FTP_ITC": 2,
"FTP_ITC.1": 3
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 1
},
"ECB": {
"ECB": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PACE": {
"PACE": 10
}
},
"crypto_scheme": {
"KA": {
"Key agreement": 2
},
"MAC": {
"MAC": 10
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Serma": {
"Serma Technologies": 1
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 3,
"SHA1": 1
},
"SHA2": {
"SHA-224": 3,
"SHA-256": 3,
"SHA-384": 2,
"SHA-512": 3,
"SHA224": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {
"misc": {
"TYPE_ACCESS": 7
}
},
"javacard_packages": {
"javacard": {
"javacard.framework": 2
}
},
"javacard_version": {
"JavaCard": {
"Java Card 2.2.2": 3,
"Java Card 3.0.4": 8
}
},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"PRNG": 1
},
"RNG": {
"RND": 3,
"RNG": 4
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 2,
"fault induction": 2,
"malfunction": 2,
"physical tampering": 1
},
"SCA": {
"DPA": 1,
"Leak-Inherent": 2,
"physical probing": 2
}
},
"standard_id": {
"BSI": {
"AIS31": 2
},
"CC": {
"CCMB-2009-07-001": 1,
"CCMB-2009-07-002": 1,
"CCMB-2009-07-003": 1,
"CCMB-2009-07-004": 1
},
"FIPS": {
"FIPS180-2": 1,
"FIPS197": 5
},
"PKCS": {
"PKCS#1": 7,
"PKCS#3": 1,
"PKCS#5": 5
},
"SCP": {
"SCP01": 3,
"SCP02": 3,
"SCP03": 3
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 19
}
},
"DES": {
"3DES": {
"3DES": 1,
"TDEA": 1,
"TDES": 9
},
"DES": {
"DES": 20
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Gemalto": {
"Gemalto": 489
},
"Infineon": {
"Infineon": 8
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Antoine de Lavernette",
"/CreationDate": "D:20170224103913+01\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2013",
"/Keywords": "Security Target, CC",
"/ModDate": "D:20170224103935+01\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2013",
"/Subject": "Security Target",
"/Title": "eTravel v1.0 Security Target MA\u00cfA3",
"pdf_file_size_bytes": 1989234,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 79
}
},
"protection_profile_links": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-cible_PP-2010-03en.pdf"
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2017_07.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"ALC_DVS.2",
"EAL5+",
"AVA_VAN.5"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI_cible2017_07en.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "d0d1f65fff8123089904e38f5c802b96b487794fb4d4e2ee61a21b38cef972dd",
"txt_hash": "b6a2fc8686088f10baa69c336e8b98426cb19e1ddf303eb66f10d7e401f3bd17"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "f58a58932e6add5b5793f5a1c63ad80d3fdec8ed23181195dfae0ae67bef69fb",
"txt_hash": "cbba95096e8927d92cbfe376e03853c4e27bf94435b7d3e98b19884890eaa44f"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "e9b8ce4d3b8a8f30a7a28dd663bd183b4cdec5212721f223472b0e6e4f2092ed",
"txt_hash": "78bd6f838b207b90bc705403cae3ad4578c426042ea63c54c169467b5aeff062"
}
},
"status": "active"
}