NPCT7xx TPM2.0 rev 1.59 (configuration version 1.4.2.2) (ANSSI-CC-2024/11)

CSV information ?

Status active
Valid from 17.04.2024
Valid until 17.04.2029
Scheme 🇫🇷 FR
Manufacturer Nuvoton Technology
Category Trusted Computing
Security level ALC_FLR.1, EAL4+, AVA_VAN.4, ALC_DVS.2

Heuristics summary ?

Certificate ID: ANSSI-CC-2024/11

Certificate ?

Extracted keywords

Security level
EAL4, EAL2
Security Assurance Requirements (SAR)
ALC_FLR.1, ALC_DVS.2, AVA_VAN.4
Protection profiles
ANSSI-CC-PP-2021/02
Certificates
ANSSI-CC-2024/11
Evaluation facilities
SERMA

File metadata

Creation date D:20240424100246+02'00'
Modification date D:20240424100716+02'00'
Pages 2
Creator Acrobat PDFMaker 23 pour Word
Producer Adobe PDF Library 23.1.175

Certification report ?

Extracted keywords

Symmetric Algorithms
DES

Security level
EAL4, EAL2, EAL7, ITSEC E6 Elevé
Claims
O.C, R.O
Security Assurance Requirements (SAR)
ALC_FLR.1, ALC_DVS.2, ALC_FLR, AVA_VAN.4, AVA_VAN
Protection profiles
ANSSI-CC-PP-2021/02
Certificates
ANSSI-CC-2024/11
Evaluation facilities
SERMA, CESTI

Standards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003

File metadata

Creation date D:20240424100335+02'00'
Modification date D:20240424100715+02'00'
Pages 11
Creator Acrobat PDFMaker 23 pour Word
Producer Adobe PDF Library 23.1.175

Security target ?

Extracted keywords

Symmetric Algorithms
AES, AES-, AES-256, HMAC
Asymmetric Algorithms
RSA 4096, RSA 2048, ECDH, ECDSA, ECC
Hash functions
SHA-1, SHA-256, SHA-384
Randomness
DRBG, RNG, RBG
Elliptic Curves
P-256, P-384, NIST P-384
Block cipher modes
CTR, CFB, OFB

Vendor
Microsoft

Security level
EAL 4, EAL4, EAL 4 augmented, EAL4 augmented
Claims
O.C, O.DAC, R.O
Security Assurance Requirements (SAR)
ALC_FLR.1, ALC_DVS.2, ALC_DVS.1, AVA_VAN.4
Security Functional Requirements (SFR)
FCO_NRO, FCO_NRO.1, FCS_RNG.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_CKM.1, FCS_CKM.4.1, FCS_COP, FDP_ACC.1, FDP_IFC.1, FDP_RIP.1, FDP_RIP.1.1, FDP_ITC.1, FDP_ITC.2, FDP_ITT.1, FDP_ITT.1.1, FDP_ACC, FDP_ACF.1, FDP_ACC.2, FDP_ACF, FDP_UIT, FDP_UIT.1, FDP_SDI.1, FDP_SDI.1.1, FDP_ETC, FDP_ETC.2, FDP_ITC, FDP_UCT, FDP_UCT.1, FDP_ETC.1, FIA_UID.1, FIA_SOS.2, FIA_SOS.2.1, FIA_SOS.2.2, FIA_AFL, FIA_UAU.1, FIA_AFL.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.5, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.6, FIA_UAU.6.1, FIA_USB.1, FIA_ATD.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_SOS.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1, FMT_SMF.1.1, FMT_MSA.2, FMT_MSA.1, FMT_MSA.2.1, FMT_MSA, FMT_MSA.4, FMT_MTD, FMT_MTD.1, FMT_MSA.3, FMT_MOF, FMT_MOF.1, FPT_STM.1, FPT_STM.1.1, FPT_TST.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_FLS, FPT_FLS.1, FPT_PHP.3, FPT_PHP.3.1, FPT_ITT.1, FPT_ITT.1.1, FPT_TDC.1, FTP_ITC.1, FTP_TRP.1, FTP_ITC, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3
Protection profiles
ANSSI-CC-PP-2021/02

Side-channel analysis
physical probing, Physical Tampering, physical tampering, malfunction, Malfunction

Standards
FIPS140-2, FIPS 186-3, FIPS 140-2, FIPS 180-4, FIPS 198-1, FIPS186-4, FIPS180-4, FIPS PUB 186-4, FIPS198-1, FIPS 197, FIPS 180-1, PKCS#1, PKCS #1, AIS31, RFC 3447, ISO/IEC 15408, ISO/IEC 14888-3, ISO/IEC 9797-2, ISO/IEC 18033-3, ISO/IEC 15946-1, ISO/IEC 10116:2006, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003

File metadata

Title Developer Document
Subject Security Target
Author Karsten Grans
Creation date D:20240314162754+02'00'
Modification date D:20240314162754+02'00'
Pages 90
Creator Microsoft® Word 2016
Producer Microsoft® Word 2016

Heuristics ?

Certificate ID: ANSSI-CC-2024/11

Extracted SARs

ALC_FLR.1, ALC_DVS.2, AVA_VAN.4

Similar certificates

Name Certificate ID
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.1.2.2) (ANSSI-CC-2024/09) ANSSI-CC-2024/09 Compare
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.3.2.2) (ANSSI-CC-2024/10) ANSSI-CC-2024/10 Compare
ChipDoc v4 on JCOP 4.5 P71 in ICAO EAC(1&2) with PACE configuration (Version 4.0.1.52) (ANSSI-CC-2023/11-R01) ANSSI-CC-2023/11-R01 Compare
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.4.0.1) ANSSI-CC-2022/27 Compare
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.4.0.0) ANSSI-CC-2021/52 Compare
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.4.1.1) ANSSI-CC-2022/31 Compare
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.0.0.1) ANSSI-CC-2022/24 Compare
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.1.0.0) ANSSI-CC-2021/50 Compare
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.0.0.0) ANSSI-CC-2021/49 Compare
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.1.0.1) ANSSI-CC-2022/25 Compare
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.0.1.1) ANSSI-CC-2022/28 Compare
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.3.0.1) ANSSI-CC-2022/26 Compare
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.3.0.0) ANSSI-CC-2021/51 Compare
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.1.1.1) ANSSI-CC-2022/29 Compare
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.3.1.1) ANSSI-CC-2022/30 Compare
IAS Classic V4.4.2 with MOC Server 1.1 on MultiApp V4.1 version IAS : 4.4.2.A, version MOC Server : 1.1.1A (ANSSI-CC-2023/57 ) ANSSI-CC-2023/57 Compare
ChipDoc v4.1 on JCOP 4.5 P71 in ICAO EAC(1&2) with PACE configuration Version 4.1.1.52 ( ANSSI-CC-2023/68) ANSSI-CC-2023/68 Compare
Plateforme ouverte Java Card MultiApp V4.1 en configuration ouverte masquée sur le composant S3FT9MH(Version 4.1.0.2) ( ANSSI-CC-2023/30 ) ANSSI-CC-2023/30 Compare
MIFARE® DESFire® EV3 on ST31N600A02 (version 1.0.2) (ANSSI-CC-2024/25) ANSSI-CC-2024/25 Compare
MIFARE Plus EV2 on ST31N600 A01 (Version 1.0.2) (ANSSI-CC-2024/03) ANSSI-CC-2024/03 Compare
ChipDoc v4.1 on JCOP 4.5 P71 in SSCD configuration Version 4.1.1.52 (ANSSI-CC-2023/69) ANSSI-CC-2023/69 Compare
ChipDoc v4 on JCOP 4.5 P71 in SSCD configuration (Version 4.0.1.52) (ANSSI-CC-2023/12-R01) ANSSI-CC-2023/12-R01 Compare
ChipDoc v4.1 on JCOP 4.5 P71 in ICAO BAC configuration Version 4.1.1.52 ( ANSSI-CC-2023/67) ANSSI-CC-2023/67 Compare
ChipDoc v4 on JCOP 4.5 P71 in ICAO BAC configuration (Version 4.0.1.52) ( ANSSI-CC-2023/10-R01 ) ANSSI-CC-2023/10-R01 Compare
NPCT7xx TPM2.0 rev 1.38 (Hardware LAG019, Firmware 7.2.2.0) ANSSI-CC-2020/21 Compare
NPCT7xx TPM2.0 rev1.38 Hardware version LAG019 Firmware version 7.2.1.0 ANSSI-CC-2018/61 Compare
NPCT7xx TPM1.2 rev 116; Hardware version LAG019; Firmware version 7.4.0.0 ANSSI-CC-2019/30 Compare
NPCT6xx TPM 2.0 Hardware version FB5C85D and FB5C85E, Firmware version 1.3.0.1, 1.3.1.0 and 1.3.2.8 ANSSI-CC-2017/55 Compare
Composite system comprised of ECI LightSoft Software Version 11.2 (build 04113) with fixes NSx1120_4113-100 10, NC1120_4113-100 10 EMS-APT Software Version 4.0 (build 20) with fixes BC0400-01 1, BC0400-02 1, BS0400-01 1, BS0400-02 1; NPT-1010 Software Version 4.0 (build 35); NPT-1020/1021 Software Version 4.0 (build 35); and NPT-1200 Software Version 4.0 (build 35) None Compare
Plateforme Java Card MultiApp V4.2 en configuration ouverte sur le composant IFX_CCI_000010h (Version 4.2.0, Java Card version 3.0.5, GP version 2.3) ANSSI-CC-2020/65v2 Compare
Suite MISTRAL IP : version 7.0.2 pour TRC 7535, version 7.0.1 pour TRC 7539-11-A et leur centre de gestion CGM version 7.0.1 ANSSI-CC-2011/78 Compare
Microcontrôleur sécurisé ST33H768 révision C,Firmware révision 5, incluant optionnellement la bibliothèque cryptographique Neslib versions 4.1 et 4.1.1 et la bibliothèque MIFARE4Mobile version 2.1.0 ANSSI-CC-2017/01 Compare
Microcontrôleur sécurisé ST33G1M2 révision F, Firmware révisions 9 et A, incluant optionnellement la bibliothèque cryptographique Neslib versions 4.1 et 4.1.1 et la bibliothèque MIFARE4Mobile version 2.1.0 ANSSI-CC-2015/61 Compare
TESS v5.0 Platform (revision 1.0) (ANSSI-CC-2024/12) ANSSI-CC-2024/12 Compare
TESS v5.1 Platform (Revision 1.0) (ANSSI-CC-2024/28) ANSSI-CC-2024/28 Compare
Produit IAS Classic v5.2.1 with MOC Server v3.1 on MultiApp V5.1 Version 5.2.1.A.C et 5.2.1.A.O ( ANSSI-CC-2023/42 ) ANSSI-CC-2023/42 Compare
NPCT7xx TPM 2.0 Hardware version LAG019, Firmware version 7.2.0.1 ANSSI-CC-2017/75 Compare
ChipDoc v4 on JCOP 4.5 P71 in ICAO EAC with PACE configuration (Version 4.0.1.52) ANSSI-CC-2023/11 Compare
IAS ECC v2, version 1.3, in configuration #4 on ID-One Cosmo v8.2 open platform on NXP P6022M VBIdentification de l’application : F0 02 02 13 (ANSSI-CC-2020/53-R01) ANSSI-CC-2020/53-R01 Compare
Strong Customer Authentication for Apple Pay on iPhone 14 Pro with A16 Bionic running iOS 16.4.1Version iOS 16.4.1 (build 20E252) ( ANSSI-CC-2023/59) ANSSI-CC-2023/59 Compare
Application J-Sign version 1.8.4 sur la plateforme J-Safe version 2.11.0 ANSSI-CC-2015/17 Compare
eTravel 3.1 BAC on MultiApp V5.1 Version 3.1.0.0 ( ANSSI-CC-2023/34 ) ANSSI-CC-2023/34 Compare
eTravel v2.3 on MultiApp v4.1 platform, BAC and AA activated (version 2.3.0.1) (ANSSI-CC-2023/54) ANSSI-CC-2023/54 Compare
eTravel 3.1 EAC on BAC on MultiApp V5.1 Version 3.1.0.0 ( ANSSI-CC-2023/35 ) ANSSI-CC-2023/35 Compare
eTravel 3.1 EAC on SAC on MultiApp V5.1 Version 3.1.0.0 ( ANSSI-CC-2023/36 ) ANSSI-CC-2023/36 Compare
eTravel v2.3 on MultiApp v4.1 platform, PACE, EAC and AA activated(version 2.3.0.1) ( ANSSI-CC-2023/55 ) ANSSI-CC-2023/55 Compare
eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated (version 2.3.0.1) (ANSSI-CC-2023/56) ANSSI-CC-2023/56 Compare
SAMSUNG S3FV9QM / S3FV9QK référence : S3FV9QM/S3FV9QK rev3_TRCv1.0_PKALibv1.4-GUIv1.38a_DTRNGlibv2.0/3.0-Iv1.2_BLv2.1/2.2-GUI1.2_BLv2.6-GUIv1.2.7_DOC-UMv1.11-SANv1.5-CDSv3.2 ANSSI-CC-2017/16 Compare
IAS ECC v2, version 1.3, in configuration #2 on ID-One Cosmo v8.2 open platform on NXP P6022M VBIdentification de l’application : F0 02 02 13 (ANSSI-CC-2020/51-R01) ANSSI-CC-2020/51-R01 Compare
IAS ECC v2, version 1.3, in configuration #1 on ID-One Cosmo v8.2 open platform on NXP P6022M VB (Identification de l’application : F0 02 02 13) (ANSSI-CC-2020/50-R01) ANSSI-CC-2020/50-R01 Compare
secunet konnektor 2.0.0 und 2.0.1, Version 5.50.1:2.0.0 und 5.50.1:2.0.1 BSI-DSZ-CC-1044-V7-2023 Compare
OPENLiMiT SignCubes base components 2.0, Version 2.0.1.1 with OPENLiMiT SignCubes PDF Plugin, Version 2.0.1.1 for Adobe BSI-DSZ-CC-0299-2005 Compare
secunet konnektor 2.1.0, Version 4.1.3:2.1.0 BSI-DSZ-CC-1174-2021 Compare
secunet konnektor 2.1.0, Version 4.1.3:2.1.0 BSI-DSZ-CC-1128-V3-2021 Compare
Application Mobile PayPass 1.0.13vA.2.4(S1133159, release B) sur plateforme UpTeqNFC2.0.4_OFM configuration MIFARE activéou configuration MIFARE désactivé surcomposant ST33F1ME ANSSI-CC-2014/83 Compare
TPM 2.0 Hardware version FB5C85D, Firmware version 1.3.0.1 ANSSI-CC-2016/15 Compare
ChipDoc v3.1 on JCOP 4 P71 in ICAO EAC (1&2) with PACE configuration, Version 3.1.6.52 ANSSI-CC-2021/19 Compare
eTravel v2.2 BAC on MultiApp platform v4.0.1 with Filter Set 1.0 Version 1.0 ANSSI-CC-2020/43 Compare
eTravel 2.5.A BAC on MultiApp V5.0.A (version 2.5.A.0.0) ANSSI-CC-2022/11 Compare
eTravel v2.2 EAC/SAC on MultiApp v4.0.1 platform with Filter Set 1.0 version 1.0 ANSSI-CC-2020/45 Compare
eTravel v2.2 EAC/BAC on MultiApp v4.0.1 platform with Filter Set 1.0 version 1.0 ANSSI-CC-2020/44 Compare
secunet konnektor 2.0.0, Version 4.1.3:2.0.0 BSI-DSZ-CC-1044-V4-2021 Compare
Ricoh imagio MP 5000SP/4000SP with security card Type 9 Version: - Firmware Configuration System Version V2.16-00 System/Copy 1.11.1, Network Support 7.26, Network DocBox 1.10C, Web Support 1.59, Web Uapl 1.15, animation 1.3, Scanner 01.24, RPDL 7.33, Printer 1.11, MSIS 7.15.02, RPCS Font 1.01, Engine 1.04:05, OpePanel 1.01, LANG0 1.01, LANG1 1.01, ADF 15.000:15, - ASIC Ic Key 1100 - Option Data Erase Opt 1.01m JISEC-CC-CRP-C0246 Compare
IAS ECC v2, version 1.3, in configuration #3 on ID-One Cosmo v8.2 open platform on NXP P6022M VBIdentification de l’application : F0 02 02 13 (ANSSI-CC-2020/52-R01) ANSSI-CC-2020/52-R01 Compare
VOP 2.0.1 / Javacard 2.1.1 JPH33V2 Operating system version 1 installed on Integrated circuit PHILIPS P8WE5033 ANSSI-CC-2001/13 Compare
Applatoo version 1.2.4 ANSSI-CC-2005/11 Compare
secunet konnektor 2.0.0, Version 4.1.3:2.0.0 (PTV4 - EBK) BSI-DSZ-CC-1163-2021 Compare
ChipDoc v4 on JCOP 4.5 P71 in SSCD configuration(Version 4.0.1.52) ANSSI-CC-2023/12 Compare
OPENLiMiT SignCubes Basiskomponenten 2.1, Version 2.1.1.1 with OPENLiMiT PDF Plugin Version 2.0.1.1 for Adobe BSI-DSZ-CC-0420-2007 Compare
ChipDoc v4 on JCOP 4.5 P71 in ICAO BAC configuration(Version 4.0.1.52) ANSSI-CC-2023/10 Compare
Ricoh imagio MP C5001A SP/C4001A SP both with imagio FAX Unit Type24 Version: - Software version: System/Copy 2.02, Network Support 10.54, Scanner 01.11.1, Printer 1.00.4, Fax 02.01.00, RemoteFax 01.00.00, Web Support 1.06, Web Uapl 1.01, NetworkDocBox 1.01, animation 1.00, RPCS 3.10.14, RPCS Font 1.00, Engine 1.03:03, OpePanel 1.06, LANG0 1.06, LANG1 1.06, Data Erase Std 1.01x - Hardware version: Ic Key 01020700, Ic Ctlr 03 - Option version: GWFCU3-21(WW) 03.00.00 JISEC-CC-CRP-C0324 Compare
Ricoh imagio MP C5001 SP / imagio MP C4001 SP, both with imagio FAX Unit Type24, and Ricoh imagio MP C5001 SPF / imagio MP C4001 SPF Version: - Software version: System/Copy 2.02, Network Support 10.54, Scanner 01.11.1, Printer 1.00.4, Fax 02.01.00, RemoteFax 01.00.00, Web Support 1.06, Web Uapl 1.01, NetworkDocBox 1.01, animation 1.00, RPCS 3.10.14, RPCS Font 1.00, Engine 1.03:04, OpePanel 1.06, LANG0 1.06, LANG1 1.06, Data Erase Std 1.01x - Hardware version: Ic Key 01020700, Ic Ctlr 03 - Option version: GWFCU3-21(WW) 03.00.00 JISEC-CC-CRP-C0301 Compare
DiamondTEK Product (DiamondCentral: NSC Application S/W version 2.0.1; NSD-Prime F/W version 2.1.4) and NSD (DiamondLink, DiamondPak, DiamondVPN) F/W version 2.1.4 CCEVS-VR-0021-2002 Compare
Dell C5765dn Color Laser Multifunction Printer Version: Controller ROM Ver. 2.205.1 IOT ROM Ver. 3.0.2 ADF ROM Ver. 11.1.0 Fax ROM Ver. 100.19.0 JISEC-CC-CRP-C0437 Compare
SCE900U (Version A) (ANSSI-CC-2024/19) ANSSI-CC-2024/19 Compare
- Kanguru Defender Elite 200 with Kanguru Defender Manager Elite 200, Firmware Version 02.03.10, KDME200 v2.0.0.0-2/3/6,- Kanguru Defender 2000 with Kanguru Defender Manager 2000, Firmware Version 02.03.10, KDM2000 v1.2.1.8-2/3/6,- Universal Kanguru Local Administrator, Version 3.2.0.3 and- Kanguru Remote Management Console, Version 5.0.2.6 BSI-DSZ-CC-0772-2014 Compare
secunet konnektor 2.1.0, Version 5.1.2:2.1.0 BSI-DSZ-CC-1202-2022 Compare
HaltDos Mitigation Platform version 1.1 comprising of hdInspector version 1.0, hdDeviceUI version 2.0, hdDetectionService version 1.0 and hdCLI version 2.0. IC3S/BG01/HALTDOS/EAL2/0317/0008 Compare
secunet konnektor 2.1.0, Version 5.1.2:2.1.0 BSI-DSZ-CC-1128-V5-2022 Compare
Carte IAS ECC v1.0.1 sur ID-One Cosmo v7.0.1-a : applet (version 3124) masquée sur ID-One Cosmo V7.0.1-a (composant Inside Secure) en configuration Standard et Basic avec correctif 075243 ANSSI-CC-2012/10 Compare
Application Mobile PayPass 1.0.13vA.2.4 (S1133159, release B) sur plateforme Orange NFC V2 G1 configuration MIFARE activé ou configuration MIFARE désactivé sur composant ST33F1ME ANSSI-CC-2014/96 Compare
NXP JCOP 7.x with eUICC extension on SN300 B1.1 Secure Element, version JCOP 7.0 R1.64.0.2, JCOP 7.0 R2.04.0.2, JCOP 7.1 R1.04.0.2, JCOP 7.2 R1.09.0.2 NSCIB-CC-2200029-03-CR Compare
eTravel Essential 1.3-2.0 - BAC and AA activated (Version 1.0) ANSSI-CC-2021/60 Compare
eTravel Essential 1.3-2.0 – PACE, EAC and AA activated (Version 1.0) ANSSI-CC-2021/63 Compare
eTravel Essential 1.3-2.0 – BAC, EAC and AA activated (Version 1.0) ANSSI-CC-2021/64 Compare
Microcontrôleur sécurisé ST33H768 révision C, Firmware révision 4, incluant optionnellement la bibliothèque cryptographique Neslib version 4.1 et version 4.1.1 ANSSI-CC-2015/36 Compare
Ricoh imagio MP C5002A SP/C4002A SP all of above with Facsimile Function Version: - Software: System/Copy 1.05.4, Network Support 11.77, Fax 02.00.00, RemoteFax 02.00.00, NetworkDocBox 1.04, Web Support 1.07, Web Uapl 1.03, animation 1.00, Scanner 01.09, Printer 1.05.1, RPCS 3.12.23, RPCS Font 1.03, Data Erase Onb 1.01x, GWFCU3.5-4(WW) 01.00.04, Engine 0.16:02, OpePanel 1.04, LANG0 1.03, LANG1 1.03 - Hardware: Ic Key 01020700, Ic Ctlr 03 JISEC-CC-CRP-C0354 Compare
eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated Référence/version du produit Version de l’application eTravel : 2.3 Version de la plateforme Java Card MultiApp : 4.1 ANSSI-CC-2018/58v2 Compare
eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated Référence/version du produit Version de l’application eTravel : 2.3 Version de la plateforme Java Card MultiApp : 4.1 ANSSI-CC-2018/56v2 Compare
Application M/Chip 4 version 1.0.1.1 for MULTOS ANSSI-CC-2003/10 Compare
Ricoh imagio MP C3302 SP/C3302 SPF/C2802 SP/C2802 SPF all of above with Facsimile Function Version: - Software: System/Copy 1.05.4, Network Support 11.77, Fax 02.00.00, RemoteFax 02.00.00, NetworkDocBox 1.04, Web Support 1.07, Web Uapl 1.03, animation 1.00, Scanner 01.09, Printer 1.05.1, RPCS 3.12.23, RPCS Font 1.03, Data Erase Onb 1.01x, GWFCU3.5-4(WW) 01.00.04, Engine 0.16:04, OpePanel 1.04, LANG0 1.03, LANG1 1.03 - Hardware: Ic Key 01020700, Ic Ctlr 03 JISEC-CC-CRP-C0352 Compare
Ricoh imagio MP C5002 SP/C5002 SPF/C4002 SP/C4002 SPF all of above with Facsimile Function Version: - Software: System/Copy 1.05.4, Network Support 11.77, Fax 02.00.00, RemoteFax 02.00.00, NetworkDocBox 1.04, Web Support 1.07, Web Uapl 1.03, animation 1.00, Scanner 01.09, Printer 1.05.1, RPCS 3.12.23, RPCS Font 1.03, Data Erase Onb 1.01x, GWFCU3.5-4(WW) 01.00.04, Engine 0.16:04, OpePanel 1.04, LANG0 1.03, LANG1 1.03 - Hardware: Ic Key 01020700, Ic Ctlr 03 JISEC-CC-CRP-C0356 Compare
Carte IAS ECC v1.0.1 : applet version 6179 sur ID-One Cosmo v7.0.1-n R2.0, masquée sur composants NXP P5CC081 et P5CD081, en configuration Standard ou Standard Dual ANSSI-CC-2013/70 Compare
NCR E10 New Generation FCR 2.0 (FCR Application Version 2.0, OpenSSL Version 1.0.2d Secure-IC firmware and hardware crypto library Version 0.0.6) 21.0.03/TSE-CCCS-48 Compare
secunet konnektor 2.0.0, Version 5.1.2:2.0.0 BSI-DSZ-CC-1201-2022 Compare
Ricoh Aficio MP C4502A/C5502A, Savin MP C4502A/C5502A, Lanier MP C4502A/C5502A, nashuatec MP C4502A/C5502A, Rex-Rotary MP C4502A/C5502A, Gestetner MP C4502A/C5502A, infotec MP C4502A/C5502A all of above with Facsimile Function Version: - Software: System/Copy 1.05.4, Network Support 11.77, Fax 02.00.00, RemoteFax 02.00.00, NetworkDocBox 1.04, Web Support 1.07, Web Uapl 1.03, animation 1.00, Scanner 01.09, Printer 1.05.1, PCL 1.07, PCL Font 1.06, Data Erase Onb 1.01x, GWFCU3.5-4(WW) 01.00.04, Engine 0.16:02, OpePanel 1.04, LANG0 1.03, LANG1 1.03 - Hardware: Ic Key 01020700, Ic Ctlr 03 JISEC-CC-CRP-C0355 Compare
Xerox WorkCentre 7346 Version: Controller+PS ROM Ver. 1.223.4, IOT ROM Ver 3.2.0, IIT ROM Ver 20.4.3, ADF ROM Ver 11.6.5 JISEC-CC-CRP-C0169 Compare
Ricoh Aficio MP C3002/C3002G/C3502/C3502G, Savin MP C3002/C3002G/C3502/C3502G, Lanier MP C3002/C3002G/C3502/C3502G, nashuatec MP C3002/C3502, Rex-Rotary MP C3002/C3502, Gestetner MP C3002/C3502, infotec MP C3002/C3502 all of above with Facsimile Function Version: - Software: System/Copy 1.05.4, Network Support 11.77, Fax 02.00.00, RemoteFax 02.00.00, NetworkDocBox 1.04, Web Support 1.07, Web Uapl 1.03, animation 1.00, Scanner 01.09, Printer 1.05.1, PCL 1.07, PCL Font 1.06, Data Erase Onb 1.01x, GWFCU3.5-4(WW) 01.00.04, Engine 0.16:04, OpePanel 1.04, LANG0 1.03, LANG1 1.03 - Hardware: Ic Key 01020700, Ic Ctlr 03 JISEC-CC-CRP-C0353 Compare
Ricoh Aficio MP C4502/C4502G/C5502/C5502G, Savin MP C4502/C4502G/C5502/C5502G, Lanier MP C4502/C4502G/C5502/C5502G, nashuatec MP C4502/C5502, Rex-Rotary MP C4502/C5502, Gestetner MP C4502/C5502, infotec MP C4502/C5502 all of above with Facsimile Function Version: - Software: System/Copy 1.05.4, Network Support 11.77, Fax 02.00.00, RemoteFax 02.00.00, NetworkDocBox 1.04, Web Support 1.07, Web Uapl 1.03, animation 1.00, Scanner 01.09, Printer 1.05.1, PCL 1.07, PCL Font 1.06, Data Erase Onb 1.01x, GWFCU3.5-4(WW) 01.00.04, Engine 0.16:04, OpePanel 1.04, LANG0 1.03, LANG1 1.03 - Hardware: Ic Key 01020700, Ic Ctlr 03 JISEC-CC-CRP-C0357 Compare
secunet konnektor 2.0.0, Version 5.1.2:2.0.0 BSI-DSZ-CC-1044-V6-2022 Compare
Showing 5 out of 100.

Scheme data ?

Product NPCT7xx TPM2.0 rev 1.59 (configuration version 1.4.2.2)
Url https://cyber.gouv.fr/produits-certifies/npct7xx-tpm20-rev-159-configuration-version-1422
Description Le produit évalué est « NPCT7xx TPM2.0 rev 1.59, configuration version 1.4.2.2 » développé par NUVOTON TECHNOLOGY CORPORATION. Ce produit est un TPM (Trusted Platform Module). Il est destiné à garantir l’intégrité matérielle et logicielle des plateformes de confiance (serveurs, ordinateurs, etc.) conformément aux spécifications fonctionnelles TPM2.0.
Sponsor NUVOTON TECHNOLOGY CORPORATION
Developer NUVOTON TECHNOLOGY CORPORATION
Cert Id ANSSI-CC-2024/11
Level EAL4+
Expiration Date 17 Avril 2029
Enhanced
Cert Id ANSSI-CC-2024/11
Certification Date 17/04/2024
Expiration Date 17/04/2029
Category Micro-circuits
Cc Version Critères Communs version 3.1r5
Developer NUVOTON TECHNOLOGY CORPORATION
Sponsor NUVOTON TECHNOLOGY CORPORATION
Evaluation Facility SERMA SAFETY & SECURITY
Level EAL4+
Protection Profile Protection Profile PC Client Specific TPM PP PCCS TPM F2.0 L0 r1.59 V1.3, certifié ANSSI-CC-PP-2021/02 le 30 novembre 2021 certifié ANSSI-CC-PP-2021/02 le 30 novembre 2021.
Mutual Recognition CCRA SOG-IS
Augmented ALC_FLR.1, AVA_VAN.4, ALC_DVS.2
Report Link https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2024_11fr.pdf
Target Link https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2024_11en%201.4.2.2.pdf
Cert Link https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2024_11fr.pdf

References ?

No references are available for this certificate.

Updates ?

  • 14.10.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'NPCT7xx TPM2.0 rev 1.59 (configuration version 1.4.2.2)', 'url': 'https://cyber.gouv.fr/produits-certifies/npct7xx-tpm20-rev-159-configuration-version-1422', 'description': 'Le produit Ă©valuĂ© est « NPCT7xx TPM2.0 rev 1.59, configuration version 1.4.2.2 » dĂ©veloppĂ© par NUVOTON TECHNOLOGY CORPORATION.\nCe produit est un TPM (Trusted Platform Module). Il est destinĂ© Ă  garantir l’intĂ©gritĂ© matĂ©rielle et logicielle des plateformes de confiance (serveurs, ordinateurs, etc.) conformĂ©ment aux spĂ©cifications fonctionnelles TPM2.0.', 'sponsor': 'NUVOTON TECHNOLOGY CORPORATION', 'developer': 'NUVOTON TECHNOLOGY CORPORATION', 'cert_id': 'ANSSI-CC-2024/11', 'level': 'EAL4+', 'expiration_date': '17 Avril 2029', 'enhanced': {'cert_id': 'ANSSI-CC-2024/11', 'certification_date': '17/04/2024', 'expiration_date': '17/04/2029', 'category': 'Micro-circuits', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'NUVOTON TECHNOLOGY CORPORATION', 'sponsor': 'NUVOTON TECHNOLOGY CORPORATION', 'evaluation_facility': 'SERMA SAFETY & SECURITY', 'level': 'EAL4+', 'protection_profile': 'Protection Profile PC Client Specific TPM\nPP PCCS TPM F2.0 L0 r1.59 V1.3, certifiĂ© ANSSI-CC-PP-2021/02 le 30 novembre 2021\ncertifiĂ© ANSSI-CC-PP-2021/02 le 30 novembre 2021.', 'mutual_recognition': 'CCRA\n SOG-IS', 'augmented': 'ALC_FLR.1, AVA_VAN.4, ALC_DVS.2', 'report_link': 'https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2024_11fr.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2024_11en%201.4.2.2.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2024_11fr.pdf'}}.
  • 02.09.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '940c6a00ea01d9ecb7ad80569b8c406054e035e78b6c5a1e9a7cb4e80e53a2ac', 'txt_hash': 'caf118fd959f9baa9875ecbe2e16f3bff3883d9ddd2f9c98c7dceb808f6709e3'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '5430b2f86679586b37ed0794f7f7ae2b908a294efc3b8b6ecfd9748cf3ecad3e', 'txt_hash': 'bc034291da17c7fbd1cafd1223e1f9c9106e96a768eb8d88c7a4ff0e9e89ab17'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '6da74cbe0fad8225af6034b8ddf24a76e3790ff192965be6c893285718e6647b', 'txt_hash': 'b040dbeaff64bb3f5d13035d3569862d66a5664cd51ee1ed459aadf009186daa'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 336748, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 11, '/CreationDate': "D:20240424100335+02'00'", '/Creator': 'Acrobat PDFMaker 23 pour Word', '/Keywords': '', '/ModDate': "D:20240424100715+02'00'", '/Producer': 'Adobe PDF Library 23.1.175', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['mailto:[email protected]', 'http://www.sogis.eu/', 'http://www.commoncriteriaportal.org/', 'http://www.ssi.gouv.fr/']}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 2855895, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 90, '/Author': 'Karsten Grans', '/CreationDate': "D:20240314162754+02'00'", '/Creator': 'Microsoft® Word 2016', '/ModDate': "D:20240314162754+02'00'", '/Producer': 'Microsoft® Word 2016', '/Subject': 'Security Target', '/Title': 'Developer Document', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23sfr_FDP_ACF_1_States', 'file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23FDP_UCT_1_FW', 'file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23sfr_FPT_FLS_1_States', 'https://www.trustedcomputinggroup.org/home', 'file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23sfr_FMT_MSA_2_States', 'http://www.rsa.com/']}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 149374, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 2, '/CreationDate': "D:20240424100246+02'00'", '/Creator': 'Acrobat PDFMaker 23 pour Word', '/Keywords': '', '/ModDate': "D:20240424100716+02'00'", '/Producer': 'Adobe PDF Library 23.1.175', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {'FR': {}}.
    • The report_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2024/11': 2}}, 'cc_protection_profile_id': {'ANSSI': {'ANSSI-CC-PP-2021/02': 3}}, 'cc_security_level': {'EAL': {'EAL4': 1, 'EAL2': 2, 'EAL7': 1}, 'ITSEC': {'ITSEC E6 ElevĂ©': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.1': 2, 'ALC_DVS.2': 1, 'ALC_FLR': 1}, 'AVA': {'AVA_VAN.4': 1, 'AVA_VAN': 1}}, 'cc_sfr': {}, 'cc_claims': {'O': {'O.C': 2}, 'R': {'R.O': 2}}, 'vendor': {}, 'eval_facility': {'Serma': {'SERMA': 1}, 'CESTI': {'CESTI': 1}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {'ANSSI': {'ANSSI-CC-PP-2021/02': 1}}, 'cc_security_level': {'EAL': {'EAL 4': 1, 'EAL4': 2, 'EAL 4 augmented': 1, 'EAL4 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.1': 3, 'ALC_DVS.2': 4, 'ALC_DVS.1': 1}, 'AVA': {'AVA_VAN.4': 3}}, 'cc_sfr': {'FCO': {'FCO_NRO': 6, 'FCO_NRO.1': 6}, 'FCS': {'FCS_RNG.1': 4, 'FCS_RNG.1.1': 1, 'FCS_RNG.1.2': 1, 'FCS_CKM': 12, 'FCS_CKM.2': 4, 'FCS_COP.1': 11, 'FCS_CKM.4': 14, 'FCS_CKM.1': 12, 'FCS_CKM.4.1': 1, 'FCS_COP': 21}, 'FDP': {'FDP_ACC.1': 35, 'FDP_IFC.1': 20, 'FDP_RIP.1': 3, 'FDP_RIP.1.1': 1, 'FDP_ITC.1': 11, 'FDP_ITC.2': 13, 'FDP_ITT.1': 3, 'FDP_ITT.1.1': 1, 'FDP_ACC': 21, 'FDP_ACF.1': 35, 'FDP_ACC.2': 2, 'FDP_ACF': 23, 'FDP_UIT': 9, 'FDP_UIT.1': 4, 'FDP_SDI.1': 3, 'FDP_SDI.1.1': 1, 'FDP_ETC': 6, 'FDP_ETC.2': 4, 'FDP_ITC': 6, 'FDP_UCT': 7, 'FDP_UCT.1': 2, 'FDP_ETC.1': 2}, 'FIA': {'FIA_UID.1': 7, 'FIA_SOS.2': 3, 'FIA_SOS.2.1': 1, 'FIA_SOS.2.2': 1, 'FIA_AFL': 12, 'FIA_UAU.1': 7, 'FIA_AFL.1': 8, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.5': 3, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UAU.6': 3, 'FIA_UAU.6.1': 1, 'FIA_USB.1': 3, 'FIA_ATD.1': 1, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_SOS.1': 1}, 'FMT': {'FMT_SMR.1': 21, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SMF.1': 13, 'FMT_SMF.1.1': 1, 'FMT_MSA.2': 4, 'FMT_MSA.1': 15, 'FMT_MSA.2.1': 1, 'FMT_MSA': 51, 'FMT_MSA.4': 3, 'FMT_MTD': 6, 'FMT_MTD.1': 2, 'FMT_MSA.3': 22, 'FMT_MOF': 3, 'FMT_MOF.1': 1}, 'FPT': {'FPT_STM.1': 2, 'FPT_STM.1.1': 1, 'FPT_TST.1': 5, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_FLS': 7, 'FPT_FLS.1': 2, 'FPT_PHP.3': 3, 'FPT_PHP.3.1': 1, 'FPT_ITT.1': 3, 'FPT_ITT.1.1': 1, 'FPT_TDC.1': 1}, 'FTP': {'FTP_ITC.1': 5, 'FTP_TRP.1': 5, 'FTP_ITC': 3, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1}}, 'cc_claims': {'O': {'O.C': 9, 'O.DAC': 5}, 'R': {'R.O': 9}}, 'vendor': {'Microsoft': {'Microsoft': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 9, 'AES-': 1, 'AES-256': 2}}, 'constructions': {'MAC': {'HMAC': 31}}}, 'asymmetric_crypto': {'RSA': {'RSA 4096': 1, 'RSA 2048': 2}, 'ECC': {'ECDH': {'ECDH': 1}, 'ECDSA': {'ECDSA': 2}, 'ECC': {'ECC': 24}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 8}, 'SHA2': {'SHA-256': 7, 'SHA-384': 8}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'PRNG': {'DRBG': 5}, 'RNG': {'RNG': 17, 'RBG': 1}}, 'cipher_mode': {'CTR': {'CTR': 2}, 'CFB': {'CFB': 2}, 'OFB': {'OFB': 2}}, 'ecc_curve': {'NIST': {'P-256': 2, 'P-384': 3, 'NIST P-384': 1}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 1}, 'FI': {'Physical Tampering': 2, 'physical tampering': 2, 'malfunction': 2, 'Malfunction': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS140-2': 2, 'FIPS 186-3': 4, 'FIPS 140-2': 3, 'FIPS 180-4': 1, 'FIPS 198-1': 2, 'FIPS186-4': 2, 'FIPS180-4': 1, 'FIPS PUB 186-4': 1, 'FIPS198-1': 1, 'FIPS 197': 2, 'FIPS 180-1': 1}, 'PKCS': {'PKCS#1': 1, 'PKCS #1': 1}, 'BSI': {'AIS31': 1}, 'RFC': {'RFC 3447': 1}, 'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 14888-3': 1, 'ISO/IEC 9797-2': 1, 'ISO/IEC 18033-3': 1, 'ISO/IEC 15946-1': 1, 'ISO/IEC 10116:2006': 1}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The cert_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2024/11': 2}}, 'cc_protection_profile_id': {'ANSSI': {'ANSSI-CC-PP-2021/02': 1}}, 'cc_security_level': {'EAL': {'EAL4': 1, 'EAL2': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.1': 2, 'ALC_DVS.2': 1}, 'AVA': {'AVA_VAN.4': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'Serma': {'SERMA': 2}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to ANSSI-CC-2024_11fr.pdf.
    • The st_filename property was set to ANSSI-cible-CC-2024_11en 1.4.2.2.pdf.
    • The cert_filename property was set to Certificat-CC-2024_11fr.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to ANSSI-CC-2024/11.
    • The scheme_data property was updated, with the {'product': 'NPCT7xx TPM2.0 rev 1.59 (configuration version 1.4.2.2)', 'url': 'https://cyber.gouv.fr/produits-certifies/npct7xx-tpm20-rev-159-configuration-version-1422', 'description': 'Le produit Ă©valuĂ© est « NPCT7xx TPM2.0 rev 1.59, configuration version 1.4.2.2 » dĂ©veloppĂ© par NUVOTON TECHNOLOGY CORPORATION.\nCe produit est un TPM (Trusted Platform Module). Il est destinĂ© Ă  garantir l’intĂ©gritĂ© matĂ©rielle et logicielle des plateformes de confiance (serveurs, ordinateurs, etc.) conformĂ©ment aux spĂ©cifications fonctionnelles TPM2.0.', 'cert_id': 'ANSSI-CC-2024/11', 'expiration_date': '17 Avril 2029', 'enhanced': {'__update__': {'cert_id': 'ANSSI-CC-2024/11', 'certification_date': '17/04/2024', 'expiration_date': '17/04/2029', 'protection_profile': 'Protection Profile PC Client Specific TPM\nPP PCCS TPM F2.0 L0 r1.59 V1.3, certifiĂ© ANSSI-CC-PP-2021/02 le 30 novembre 2021\ncertifiĂ© ANSSI-CC-PP-2021/02 le 30 novembre 2021.', 'mutual_recognition': 'CCRA\n SOG-IS', 'augmented': 'ALC_FLR.1, AVA_VAN.4, ALC_DVS.2', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2024_11fr.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2024_11en%201.4.2.2.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2024_11fr.pdf'}}} data.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2024_11fr.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2024_11en%201.4.2.2.pdf.

    The state of the certificate object was updated.

    • The cert property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The cert_metadata property was set to None.
    • The cert_keywords property was set to None.
    • The cert_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
    • The scheme_data property was updated, with the {'product': 'NPCT7xx TPM2.0 rev 1.59 (configuration version 1.1.0.0)', 'url': 'https://cyber.gouv.fr/produits-certifies/npct7xx-tpm20-rev-159-configuration-version-1100', 'description': 'Le produit Ă©valuĂ© est « NPCT7xx TPM2.0 rev 1.59, configuration version 1.1.0.0 » dĂ©veloppĂ© par\nNUVOTON TECHNOLOGY CORPORATION.\nCe produit est destinĂ© Ă  garantir l’intĂ©gritĂ© matĂ©rielle et logicielle des plateformes de confiance\n(serveurs, ordinateurs, etc.) conformĂ©ment aux spĂ©cifications fonctionnelles TPM2.0.', 'cert_id': '2021/50', 'expiration_date': '22 Octobre 2026', 'enhanced': {'__update__': {'cert_id': '2021/50', 'certification_date': '22/10/2021', 'expiration_date': '22/10/2026', 'protection_profile': 'NA', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ALC_FLR.1, ALC_DVS.2, AVA_VAN.4', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2021/11/anssi-cc-2021_50fr.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2021/11/anssi-cible-cc-2021_50en.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/2021/11/certificat-2021_50.pdf'}}} data.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'NPCT7xx TPM2.0 rev 1.59 (configuration version 1.4.2.2)', 'url': 'https://cyber.gouv.fr/produits-certifies/npct7xx-tpm20-rev-159-configuration-version-1422', 'description': 'Le produit Ă©valuĂ© est « NPCT7xx TPM2.0 rev 1.59, configuration version 1.4.2.2 » dĂ©veloppĂ© par NUVOTON TECHNOLOGY CORPORATION.\nCe produit est un TPM (Trusted Platform Module). Il est destinĂ© Ă  garantir l’intĂ©gritĂ© matĂ©rielle et logicielle des plateformes de confiance (serveurs, ordinateurs, etc.) conformĂ©ment aux spĂ©cifications fonctionnelles TPM2.0.', 'sponsor': 'NUVOTON TECHNOLOGY CORPORATION', 'developer': 'NUVOTON TECHNOLOGY CORPORATION', 'cert_id': 'ANSSI-CC-2024/11', 'level': 'EAL4+', 'expiration_date': '17 Avril 2029', 'enhanced': {'cert_id': 'ANSSI-CC-2024/11', 'certification_date': '17/04/2024', 'expiration_date': '17/04/2029', 'category': 'Micro-circuits', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'NUVOTON TECHNOLOGY CORPORATION', 'sponsor': 'NUVOTON TECHNOLOGY CORPORATION', 'evaluation_facility': 'SERMA SAFETY & SECURITY', 'level': 'EAL4+', 'protection_profile': 'Protection Profile PC Client Specific TPM\nPP PCCS TPM F2.0 L0 r1.59 V1.3, certifiĂ© ANSSI-CC-PP-2021/02 le 30 novembre 2021\ncertifiĂ© ANSSI-CC-PP-2021/02 le 30 novembre 2021.', 'mutual_recognition': 'CCRA\n SOG-IS', 'augmented': 'ALC_FLR.1, AVA_VAN.4, ALC_DVS.2', 'report_link': 'https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2024_11fr.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2024_11en%201.4.2.2.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2024_11fr.pdf'}}.
  • 31.07.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name NPCT7xx TPM2.0 rev 1.59 (configuration version 1.4.2.2) (ANSSI-CC-2024/11) was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Trusted Computing",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2024_11fr.pdf",
  "dgst": "5d96ca8577702d78",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2024/11",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "2.0",
        "1.4.2.2",
        "1.59"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "cert_id": "ANSSI-CC-2024/11",
      "description": "Le produit \u00e9valu\u00e9 est \u00ab NPCT7xx TPM2.0 rev 1.59, configuration version 1.4.2.2 \u00bb d\u00e9velopp\u00e9 par NUVOTON TECHNOLOGY CORPORATION.\nCe produit est un TPM (Trusted Platform Module). Il est destin\u00e9 \u00e0 garantir l\u2019int\u00e9grit\u00e9 mat\u00e9rielle et logicielle des plateformes de confiance (serveurs, ordinateurs, etc.) conform\u00e9ment aux sp\u00e9cifications fonctionnelles TPM2.0.",
      "developer": "NUVOTON TECHNOLOGY CORPORATION",
      "enhanced": {
        "augmented": "ALC_FLR.1, AVA_VAN.4, ALC_DVS.2",
        "category": "Micro-circuits",
        "cc_version": "Crit\u00e8res Communs version 3.1r5",
        "cert_id": "ANSSI-CC-2024/11",
        "cert_link": "https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2024_11fr.pdf",
        "certification_date": "17/04/2024",
        "developer": "NUVOTON TECHNOLOGY CORPORATION",
        "evaluation_facility": "SERMA SAFETY \u0026 SECURITY",
        "expiration_date": "17/04/2029",
        "level": "EAL4+",
        "mutual_recognition": "CCRA\n                          SOG-IS",
        "protection_profile": "Protection Profile PC Client Specific TPM\nPP PCCS TPM F2.0 L0 r1.59 V1.3, certifi\u00e9 ANSSI-CC-PP-2021/02 le 30 novembre 2021\ncertifi\u00e9 ANSSI-CC-PP-2021/02 le 30 novembre 2021.",
        "report_link": "https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2024_11fr.pdf",
        "sponsor": "NUVOTON TECHNOLOGY CORPORATION",
        "target_link": "https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2024_11en%201.4.2.2.pdf"
      },
      "expiration_date": "17 Avril 2029",
      "level": "EAL4+",
      "product": "NPCT7xx TPM2.0 rev 1.59 (configuration version 1.4.2.2)",
      "sponsor": "NUVOTON TECHNOLOGY CORPORATION",
      "url": "https://cyber.gouv.fr/produits-certifies/npct7xx-tpm20-rev-159-configuration-version-1422"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Nuvoton Technology",
  "manufacturer_web": null,
  "name": "NPCT7xx TPM2.0 rev 1.59 (configuration version 1.4.2.2) (ANSSI-CC-2024/11)",
  "not_valid_after": "2029-04-17",
  "not_valid_before": "2024-04-17",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "Certificat-CC-2024_11fr.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2024/11": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "ANSSI": {
          "ANSSI-CC-PP-2021/02": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_DVS.2": 1,
          "ALC_FLR.1": 2
        },
        "AVA": {
          "AVA_VAN.4": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 1,
          "EAL4": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Serma": {
          "SERMA": 2
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/CreationDate": "D:20240424100246+02\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 23 pour Word",
      "/Keywords": "",
      "/ModDate": "D:20240424100716+02\u002700\u0027",
      "/Producer": "Adobe PDF Library 23.1.175",
      "pdf_file_size_bytes": 149374,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 2
    },
    "report_filename": "ANSSI-CC-2024_11fr.pdf",
    "report_frontpage": {
      "FR": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2024/11": 2
        }
      },
      "cc_claims": {
        "O": {
          "O.C": 2
        },
        "R": {
          "R.O": 2
        }
      },
      "cc_protection_profile_id": {
        "ANSSI": {
          "ANSSI-CC-PP-2021/02": 3
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_DVS.2": 1,
          "ALC_FLR": 1,
          "ALC_FLR.1": 2
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.4": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 2,
          "EAL4": 1,
          "EAL7": 1
        },
        "ITSEC": {
          "ITSEC E6 Elev\u00e9": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "CESTI": {
          "CESTI": 1
        },
        "Serma": {
          "SERMA": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20240424100335+02\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 23 pour Word",
      "/Keywords": "",
      "/ModDate": "D:20240424100715+02\u002700\u0027",
      "/Producer": "Adobe PDF Library 23.1.175",
      "pdf_file_size_bytes": 336748,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.commoncriteriaportal.org/",
          "http://www.ssi.gouv.fr/",
          "http://www.sogis.eu/",
          "mailto:[email protected]"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 11
    },
    "st_filename": "ANSSI-cible-CC-2024_11en 1.4.2.2.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 24
          },
          "ECDH": {
            "ECDH": 1
          },
          "ECDSA": {
            "ECDSA": 2
          }
        },
        "RSA": {
          "RSA 2048": 2,
          "RSA 4096": 1
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "O": {
          "O.C": 9,
          "O.DAC": 5
        },
        "R": {
          "R.O": 9
        }
      },
      "cc_protection_profile_id": {
        "ANSSI": {
          "ANSSI-CC-PP-2021/02": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_DVS.1": 1,
          "ALC_DVS.2": 4,
          "ALC_FLR.1": 3
        },
        "AVA": {
          "AVA_VAN.4": 3
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 1,
          "EAL 4 augmented": 1,
          "EAL4": 2,
          "EAL4 augmented": 1
        }
      },
      "cc_sfr": {
        "FCO": {
          "FCO_NRO": 6,
          "FCO_NRO.1": 6
        },
        "FCS": {
          "FCS_CKM": 12,
          "FCS_CKM.1": 12,
          "FCS_CKM.2": 4,
          "FCS_CKM.4": 14,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 21,
          "FCS_COP.1": 11,
          "FCS_RNG.1": 4,
          "FCS_RNG.1.1": 1,
          "FCS_RNG.1.2": 1
        },
        "FDP": {
          "FDP_ACC": 21,
          "FDP_ACC.1": 35,
          "FDP_ACC.2": 2,
          "FDP_ACF": 23,
          "FDP_ACF.1": 35,
          "FDP_ETC": 6,
          "FDP_ETC.1": 2,
          "FDP_ETC.2": 4,
          "FDP_IFC.1": 20,
          "FDP_ITC": 6,
          "FDP_ITC.1": 11,
          "FDP_ITC.2": 13,
          "FDP_ITT.1": 3,
          "FDP_ITT.1.1": 1,
          "FDP_RIP.1": 3,
          "FDP_RIP.1.1": 1,
          "FDP_SDI.1": 3,
          "FDP_SDI.1.1": 1,
          "FDP_UCT": 7,
          "FDP_UCT.1": 2,
          "FDP_UIT": 9,
          "FDP_UIT.1": 4
        },
        "FIA": {
          "FIA_AFL": 12,
          "FIA_AFL.1": 8,
          "FIA_ATD.1": 1,
          "FIA_SOS.1": 1,
          "FIA_SOS.2": 3,
          "FIA_SOS.2.1": 1,
          "FIA_SOS.2.2": 1,
          "FIA_UAU.1": 7,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.5": 3,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 1,
          "FIA_UAU.6": 3,
          "FIA_UAU.6.1": 1,
          "FIA_UID.1": 7,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1,
          "FIA_USB.1": 3,
          "FIA_USB.1.1": 1,
          "FIA_USB.1.2": 1,
          "FIA_USB.1.3": 1
        },
        "FMT": {
          "FMT_MOF": 3,
          "FMT_MOF.1": 1,
          "FMT_MSA": 51,
          "FMT_MSA.1": 15,
          "FMT_MSA.2": 4,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 22,
          "FMT_MSA.4": 3,
          "FMT_MTD": 6,
          "FMT_MTD.1": 2,
          "FMT_SMF.1": 13,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 21,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_FLS": 7,
          "FPT_FLS.1": 2,
          "FPT_ITT.1": 3,
          "FPT_ITT.1.1": 1,
          "FPT_PHP.3": 3,
          "FPT_PHP.3.1": 1,
          "FPT_STM.1": 2,
          "FPT_STM.1.1": 1,
          "FPT_TDC.1": 1,
          "FPT_TST.1": 5,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FTP": {
          "FTP_ITC": 3,
          "FTP_ITC.1": 5,
          "FTP_ITC.1.1": 1,
          "FTP_ITC.1.2": 1,
          "FTP_ITC.1.3": 1,
          "FTP_TRP.1": 5
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CFB": {
          "CFB": 2
        },
        "CTR": {
          "CTR": 2
        },
        "OFB": {
          "OFB": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "NIST P-384": 1,
          "P-256": 2,
          "P-384": 3
        }
      },
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 8
          },
          "SHA2": {
            "SHA-256": 7,
            "SHA-384": 8
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 5
        },
        "RNG": {
          "RBG": 1,
          "RNG": 17
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 2,
          "Physical Tampering": 2,
          "malfunction": 2,
          "physical tampering": 2
        },
        "SCA": {
          "physical probing": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS31": 1
        },
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1
        },
        "FIPS": {
          "FIPS 140-2": 3,
          "FIPS 180-1": 1,
          "FIPS 180-4": 1,
          "FIPS 186-3": 4,
          "FIPS 197": 2,
          "FIPS 198-1": 2,
          "FIPS PUB 186-4": 1,
          "FIPS140-2": 2,
          "FIPS180-4": 1,
          "FIPS186-4": 2,
          "FIPS198-1": 1
        },
        "ISO": {
          "ISO/IEC 10116:2006": 1,
          "ISO/IEC 14888-3": 1,
          "ISO/IEC 15408": 2,
          "ISO/IEC 15946-1": 1,
          "ISO/IEC 18033-3": 1,
          "ISO/IEC 9797-2": 1
        },
        "PKCS": {
          "PKCS #1": 1,
          "PKCS#1": 1
        },
        "RFC": {
          "RFC 3447": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 9,
            "AES-": 1,
            "AES-256": 2
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 31
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Karsten Grans",
      "/CreationDate": "D:20240314162754+02\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2016",
      "/ModDate": "D:20240314162754+02\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2016",
      "/Subject": "Security Target",
      "/Title": "Developer Document",
      "pdf_file_size_bytes": 2855895,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.rsa.com/",
          "file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23sfr_FPT_FLS_1_States",
          "file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23sfr_FMT_MSA_2_States",
          "file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23FDP_UCT_1_FW",
          "file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23sfr_FDP_ACF_1_States",
          "https://www.trustedcomputinggroup.org/home"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 90
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/anssi-profil-pp-2021_02en.pdf",
        "pp_name": "Protection Profile PC Client Specific Trusted Platform Module Specification Family 2.0; Level 0; Revi..."
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2024_11fr.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "AVA_VAN.4",
      "ALC_FLR.1",
      "EAL4+",
      "ALC_DVS.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2024_11en%201.4.2.2.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "6da74cbe0fad8225af6034b8ddf24a76e3790ff192965be6c893285718e6647b",
      "txt_hash": "b040dbeaff64bb3f5d13035d3569862d66a5664cd51ee1ed459aadf009186daa"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "940c6a00ea01d9ecb7ad80569b8c406054e035e78b6c5a1e9a7cb4e80e53a2ac",
      "txt_hash": "caf118fd959f9baa9875ecbe2e16f3bff3883d9ddd2f9c98c7dceb808f6709e3"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "5430b2f86679586b37ed0794f7f7ae2b908a294efc3b8b6ecfd9748cf3ecad3e",
      "txt_hash": "bc034291da17c7fbd1cafd1223e1f9c9106e96a768eb8d88c7a4ff0e9e89ab17"
    }
  },
  "status": "active"
}