Plateforme ID-One Cosmo V9.1 masquée sur le composant IFX SLC32

CSV information ?

Status active
Valid from 31.03.2020
Valid until 28.03.2027
Scheme 🇫🇷 FR
Manufacturer Idemia
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level ALC_DVS.2, AVA_VAN.5, EAL5+
Maintenance updates Reassessment report : ANSSI-CC-2020/07-S01 (28.03.2022) Certification report Security target
Maintenance report : ANSSI-CC-2020/07-M02 (16.05.2022) Certification report
Reassessment report: ANSSI-CC-2020/07-S01 (28.03.2022) Certification report
ANSSI-CC-2020/07-M01 (23.07.2020) Certification report

Heuristics summary ?

Certificate ID: ANSSI-CC-2020/07

Certificate ?

Extracted keywords

Vendor
IDEMIA

Security level
EAL5, EAL2
Security Assurance Requirements (SAR)
ALC_DVS.2, AVA_VAN.5
Certificates
ANSSI-CC-2020/07-S01
Evaluation facilities
CEA-LETI

File metadata

Title ANSSI-CC-2020/07
Author Géraldine Avoué
Creation date D:20220404173043+02'00'
Modification date D:20220404173044+02'00'
Pages 2
Creator Acrobat PDFMaker 11 pour Word
Producer Adobe PDF Library 11.0

Certification report ?

Extracted keywords

Symmetric Algorithms
DES

Vendor
Infineon Technologies AG, Infineon, IDEMIA

Security level
EAL 5, EAL2, EAL6, EAL7, EAL 1, EAL 3, EAL 7, ITSEC E6 Elevé
Security Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE, AGD_PRE, AGD_ALP, ALC_DVS.2, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSS
Protection profiles
BSI-CC-PP-0099-2017, BSI-PP-0084-2014, ANSSI-CC-PP-0099-2017
Certificates
BSI-DSZ-CC-1110-V2-2019, ANSSI-CC-2020/07
Evaluation facilities
SERMA, CESTI, CEA - LETI, CEA-LETI

Standards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004

File metadata

Title ANSSI-CC-2020/07
Subject Plateforme ID-One Cosmo V9.1 masquée sur le composant IFX SLC32
Keywords ANSSI-CC-CER-F-07, v29.2
Author Géraldine Avoué
Creation date D:20200402164050+02'00'
Pages 18
Creator Writer
Producer LibreOffice 4.4

Frontpage

Certificate ID ANSSI-CC-2020/07
Certified item Plateforme ID-One Cosmo V9.1 masquée sur le composant IFX SLC32
Certification lab CEA - LETI 17 avenue des martyrs, 38054 Grenoble Cedex 9, France
Developer IDEMIA 2 place Samuel de Champlain 92400 Courbevoie, France Infineon Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire IDEMIA 2 place Samuel de Champlain 92400 Courbevoie, France

References

Outgoing
  • BSI-DSZ-CC-1110-V2-2019 - archived - Infineon Security Controller IFX_CCI_000003h, 000005h, 000008h, 00000Ch, 000013h, 000014h, 000015h, 00001Ch, 00001Dh, 000021h, 000022h H13 including the products from the second production line and optional software packages: Flash Loader, Asymmetric Crypto Library, Symmetric Cryptographic Library, Hardware Support Layer, Hash Crypto Library, Mifare Compatible Software, and CIPURSE™ Crypto Library
Incoming
  • ANSSI-CC-2020/57 - active - CombICAO Applet v2.1 in EAC with PACE configuration on ID-One Cosmo V9.1 (code SAAAAR : 203523)
  • ANSSI-CC-2020/59 - active - CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.1 (code SAAAAR : 203523)
  • ANSSI-CC-2020/55 - active - CombICAO Applet v2.1 in BAC and CA configuration on ID-One Cosmo V9.1(Code SAAAAR : 203523)
  • ANSSI-CC-2022/33 - active - ID-One Cosmo v9.1 embedding VITALE application version 2.1.4
  • NSCIB-CC-0286907-CR - active - Idemia ID-One™ CNS V2 on Cosmo V9.1
  • ANSSI-CC-2020/58 - active - CombICAO Applet v2.1 in EAC with PACE configuration for French ID on ID-One Cosmo V9.1 (code SAAAAR : 203523)
  • ANSSI-CC-2020/56 - active - CombICAO Applet v2.1 in EAC configuration on ID-One Cosmo V9.1 (code SAAAAR : 203523)
  • NSCIB-CC-22-0286910-CR - active - Idemia IDeal Drive DT V3.1 on Cosmo V9.1

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES, TDES, Triple-DES, HMAC, CMAC
Asymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-Hellman
Hash functions
SHA-1, SHA-256, SHA-384, SHA-224, SHA-512, SHA256, SHA-2
Schemes
MAC, Key Agreement, Key agreement
Protocols
PACE
Randomness
RNG
Block cipher modes
ECB, CBC

JavaCard versions
Java Card 3.0.5
JavaCard API constants
TYPE_ACCESS
Vendor
Infineon, Infineon Technologies AG, IDEMIA

Security level
EAL5, EAL5+, EAL4, EAL5 augmented, EAL4 augmented
Claims
D.APP_CODE, D.APP_C_DATA, D.APP_I_DATA, D.PIN, D.API_DATA, D.CRYPTO, D.JCS_CODE, D.JCS_DATA, D.SEC_DATA, D.CONFIG, D.SENSITIVE_DATA, D.ARRAY, D.JCS_KEYS, D.NB_REMAINTRYGLB, O.SCP, O.CARD_MANAGEMENT, O.SID, O.FIREWALL, O.GLOBAL_ARRAYS_CONFID, O.GLOBAL_ARRAYS_INTEG, O.NATIVE, O.OPERATE, O.REALLOCATION, O.RESOURCES, O.ALARM, O.CIPHER, O.RNG, O.KEY-MNGT, O.PIN-MNGT, O.TRANSACTION, O.OBJ-DELETION, O.DELETION, O.LOAD, O.INSTALL, O.RESIDENT_APPLICATION, O.SECURE_COMPARE, O.PATCH_LOADING, O.PIN-, O.APPLET, O.CODE_PKG, O.JAVAOBJECT, O.OBJ-, T.CONFID-APPLI-DATA, T.CONFID-JCS-CODE, T.CONFID-JCS-DATA, T.INTEG-APPLI-CODE, T.INTEG-APPLI-DATA, T.INTEG-JCS-CODE, T.INTEG-JCS-DATA, T.SID, T.EXE-CODE, T.NATIVE, T.RESOURCES, T.DELETION, T.INSTALL, T.OBJ-DELETION, T.PHYSICAL, T.CONFIGURATION, T.CONF_DATA_APPLET, T.PATCH_LOADING, T.INTEG-APPLI-, T.INTEG-, T.EXE-, A.DELETION, A.APPLET, A.VERIFICATION, R.JAVA, OP.ARRAY_ACCESS, OP.ARRAY_LENGTH, OP.ARRAY_AASTORE, OP.CREATE, OP.DELETE_APPLET, OP.DELETE_PCKG, OP.DELETE_PCKG_APPLET, OP.FLOW, OP.IMPORT_KEY, OP.INSTANCE_FIELD, OP.INVK_INTERFACE, OP.INVK_VIRTUAL, OP.JAVA, OP.THROW, OP.TYPE_ACCESS, OP.LOCAL_STACK_ACCESS, OP.OPERAND_STACK_ACCESS, OP.PUT, OP.STATIC_FIELD, OP.NATIVE_ACCESS, OP.NATIVE_INTERFACE_CALL, OP.PUTFIELD, OP.PUTSTATIC, OE.SCP, OE.CARD-, OE.VERIFICATION, OE.CODE-EVIDENCE, OE.CARD_MANAGEMENT, OE.APPLET, OE.CODE-, OSP.VERIFICATION
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_TDS.1, ADV_FSP.5, ADV_TDS.4, ADV_IMP.1, ADV_TDS.3, ADV_INT.2, ADV_FSP.2, ADV_FSP.4, AGD_PRE, AGD_OPE, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_DVS, ALC_TAT.1, ALC_TAT.2, ALC_CMC.4, ALC_CMS.1, ALC_DVS.1, ALC_LCD.1, ALC_CMS.5, ALC_DEL.1, ATE_COV.2, ATE_FUN.1, ATE_COV.1, ATE_DPT.1, ATE_DPT.3, AVA_VAN.5, AVA_VAN, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1, ASE_REQ.2, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_ARP.1, FAU_ARP.1.1, FAU_STG.2, FAU_STG.2.1, FAU_STG.2.2, FAU_STG.2.3, FAU_SAA.1, FAU_GEN.1, FAU_GEN, FCO_NRO, FCO_NRO.2, FCS_RNG, FCS_RNG.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM.1, FCS_CKM.1.1, FCS_CKM.4, FCS_CKM.4.1, FCS_COP.1, FCS_COP.1.1, FCS_COP, FCS_CKM, FDP_ACC, FDP_ACC.2, FDP_ACF, FDP_ACF.1, FDP_IFC, FDP_IFC.1, FDP_IFF, FDP_IFF.1, FDP_RIP, FDP_RIP.1, FDP_ROL.1, FDP_ROL, FDP_SDI, FDP_SDI.2, FDP_ITC, FDP_ITC.2, FDP_IFC.2, FDP_UIT, FDP_UIT.1, FDP_UCT, FDP_UCT.1, FDP_ITC.1, FDP_ACC.1, FIA_ATD, FIA_ATD.1, FIA_UID, FIA_UID.2, FIA_USB, FIA_USB.1, FIA_UID.1, FIA_AFL, FIA_AFL.1, FIA_UAU, FIA_UAU.1, FIA_UAU.4, FIA_UAU.7, FMT_MSA, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD, FMT_MTD.1, FMT_MTD.3, FMT_SMR, FMT_SMF, FMT_SMR.2, FMT_MOF, FMT_MOF.1, FMT_MTD.2, FPR_UNO.1, FPR_UNO.1.1, FPR_UNO, FPT_FLS.1, FPT_FLS.1.1, FPT_TDC.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_FLS, FPT_RCV, FPT_RCV.3, FPT_TST.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_TDC, FPT_PHP, FPT_PHP.3, FPT_RCV.4, FPT_TST, FRU_FLT, FRU_FLT.1, FTP_ITC, FTP_ITC.1, FTP_TRP.1
Protection profiles
BSI-CC-PP-0084-2014
Certificates
BSI-DSZ-CC-1110-V2-2019
Evaluation facilities
CEA-LETI
Certification process
out of scope, a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are

Side-channel analysis
physical probing, DPA, SPA, timing attack, physical tampering, malfunction, fault injection
Certification process
out of scope, a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are

Standards
FIPS PUB 46-3, FIPS PUB 81, FIPS PUB 180-3, FIPS PUB 197, FIPS 198, FIPS 140-2, NIST SP 800-90, PKCS#1, AIS31, ISO/IEC 9796-1, ISO/IEC 9797-1, ISO/IEC 7816, ISO/IEC 14443, ISO/IEC 9797, SCP02, SCP03

File metadata

Title Title
Author [email protected]
Creation date D:20200228163658+01'00'
Modification date D:20200228163658+01'00'
Pages 150
Creator Microsoft® Word 2016
Producer Microsoft® Word 2016

References

Outgoing
  • BSI-DSZ-CC-1110-V2-2019 - archived - Infineon Security Controller IFX_CCI_000003h, 000005h, 000008h, 00000Ch, 000013h, 000014h, 000015h, 00001Ch, 00001Dh, 000021h, 000022h H13 including the products from the second production line and optional software packages: Flash Loader, Asymmetric Crypto Library, Symmetric Cryptographic Library, Hardware Support Layer, Hash Crypto Library, Mifare Compatible Software, and CIPURSE™ Crypto Library
Incoming
  • ANSSI-CC-2020/57 - active - CombICAO Applet v2.1 in EAC with PACE configuration on ID-One Cosmo V9.1 (code SAAAAR : 203523)
  • ANSSI-CC-2020/59 - active - CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.1 (code SAAAAR : 203523)
  • ANSSI-CC-2020/55 - active - CombICAO Applet v2.1 in BAC and CA configuration on ID-One Cosmo V9.1(Code SAAAAR : 203523)
  • ANSSI-CC-2022/33 - active - ID-One Cosmo v9.1 embedding VITALE application version 2.1.4
  • ANSSI-CC-2020/58 - active - CombICAO Applet v2.1 in EAC with PACE configuration for French ID on ID-One Cosmo V9.1 (code SAAAAR : 203523)
  • ANSSI-CC-2020/56 - active - CombICAO Applet v2.1 in EAC configuration on ID-One Cosmo V9.1 (code SAAAAR : 203523)

Heuristics ?

Certificate ID: ANSSI-CC-2020/07

Extracted SARs

ASE_ECD.1, AVA_VAN.5, ALC_DEL.1, ALC_TAT.2, AGD_PRE.1, ATE_DPT.3, ADV_IMP.1, ADV_TDS.4, ALC_LCD.1, ATE_FUN.1, ASE_REQ.2, ASE_CCL.1, ALC_CMS.5, ASE_OBJ.2, ATE_COV.2, ADV_ARC.1, ALC_DVS.2, ASE_SPD.1, ADV_FSP.5, AGD_OPE.1, ASE_INT.1, ADV_INT.2, ALC_CMC.4, ASE_TSS.1

References ?

Updates ?

  • 02.09.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'f2253108b3d5baad833abb27ec6ea00f236000f43a23281fe43ae078f32d8a43', 'txt_hash': 'd0b34b74aa182a8c12e6ba252de1dce3ea72887b1b753cc410246239f5d3d0d7'} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 2862110, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 150, '/Title': 'Title', '/Author': '[email protected]', '/Creator': 'Microsoft® Word 2016', '/CreationDate': "D:20200228163658+01'00'", '/ModDate': "D:20200228163658+01'00'", '/Producer': 'Microsoft® Word 2016', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1110-V2-2019': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 1}}, 'cc_security_level': {'EAL': {'EAL5': 9, 'EAL5+': 2, 'EAL4': 1, 'EAL5 augmented': 5, 'EAL4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 6, 'ADV_FSP.1': 3, 'ADV_TDS.1': 2, 'ADV_FSP.5': 8, 'ADV_TDS.4': 8, 'ADV_IMP.1': 9, 'ADV_TDS.3': 4, 'ADV_INT.2': 1, 'ADV_FSP.2': 2, 'ADV_FSP.4': 2}, 'AGD': {'AGD_PRE': 7, 'AGD_OPE': 2, 'AGD_OPE.1': 8, 'AGD_PRE.1': 6}, 'ALC': {'ALC_DVS.2': 13, 'ALC_DVS': 1, 'ALC_TAT.1': 2, 'ALC_TAT.2': 3, 'ALC_CMC.4': 1, 'ALC_CMS.1': 1, 'ALC_DVS.1': 2, 'ALC_LCD.1': 3, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.2': 3, 'ATE_FUN.1': 6, 'ATE_COV.1': 2, 'ATE_DPT.1': 2, 'ATE_DPT.3': 1}, 'AVA': {'AVA_VAN.5': 15, 'AVA_VAN': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 4, 'ASE_INT.1': 5, 'ASE_REQ.1': 2, 'ASE_REQ.2': 2, 'ASE_OBJ.2': 3, 'ASE_SPD.1': 2, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 20, 'FAU_ARP.1.1': 1, 'FAU_STG.2': 9, 'FAU_STG.2.1': 1, 'FAU_STG.2.2': 1, 'FAU_STG.2.3': 1, 'FAU_SAA.1': 3, 'FAU_GEN.1': 2, 'FAU_GEN': 1}, 'FCO': {'FCO_NRO': 16, 'FCO_NRO.2': 8}, 'FCS': {'FCS_RNG': 3, 'FCS_RNG.1': 10, 'FCS_RNG.1.1': 2, 'FCS_RNG.1.2': 2, 'FCS_CKM.1': 20, 'FCS_CKM.1.1': 1, 'FCS_CKM.4': 19, 'FCS_CKM.4.1': 1, 'FCS_COP.1': 16, 'FCS_COP.1.1': 1, 'FCS_COP': 27, 'FCS_CKM': 22}, 'FDP': {'FDP_ACC': 72, 'FDP_ACC.2': 13, 'FDP_ACF': 59, 'FDP_ACF.1': 34, 'FDP_IFC': 28, 'FDP_IFC.1': 21, 'FDP_IFF': 22, 'FDP_IFF.1': 16, 'FDP_RIP': 131, 'FDP_RIP.1': 11, 'FDP_ROL.1': 6, 'FDP_ROL': 16, 'FDP_SDI': 11, 'FDP_SDI.2': 2, 'FDP_ITC': 26, 'FDP_ITC.2': 14, 'FDP_IFC.2': 2, 'FDP_UIT': 17, 'FDP_UIT.1': 4, 'FDP_UCT': 10, 'FDP_UCT.1': 1, 'FDP_ITC.1': 8, 'FDP_ACC.1': 24}, 'FIA': {'FIA_ATD': 10, 'FIA_ATD.1': 2, 'FIA_UID': 31, 'FIA_UID.2': 1, 'FIA_USB': 9, 'FIA_USB.1': 3, 'FIA_UID.1': 16, 'FIA_AFL': 35, 'FIA_AFL.1': 8, 'FIA_UAU': 56, 'FIA_UAU.1': 12, 'FIA_UAU.4': 2, 'FIA_UAU.7': 2}, 'FMT': {'FMT_MSA': 191, 'FMT_MSA.1': 20, 'FMT_MSA.2': 5, 'FMT_MSA.3': 27, 'FMT_SMF.1': 30, 'FMT_SMF.1.1': 1, 'FMT_SMR.1': 56, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MTD': 39, 'FMT_MTD.1': 4, 'FMT_MTD.3': 1, 'FMT_SMR': 61, 'FMT_SMF': 62, 'FMT_SMR.2': 6, 'FMT_MOF': 7, 'FMT_MOF.1': 1, 'FMT_MTD.2': 2}, 'FPR': {'FPR_UNO.1': 13, 'FPR_UNO.1.1': 1, 'FPR_UNO': 16}, 'FPT': {'FPT_FLS.1': 18, 'FPT_FLS.1.1': 2, 'FPT_TDC.1': 11, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 1, 'FPT_FLS': 45, 'FPT_RCV': 26, 'FPT_RCV.3': 7, 'FPT_TST.1': 11, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_TDC': 9, 'FPT_PHP': 7, 'FPT_PHP.3': 1, 'FPT_RCV.4': 1, 'FPT_TST': 1}, 'FRU': {'FRU_FLT': 7, 'FRU_FLT.1': 1}, 'FTP': {'FTP_ITC': 16, 'FTP_ITC.1': 7, 'FTP_TRP.1': 4}}, 'cc_claims': {'D': {'D.APP_CODE': 6, 'D.APP_C_DATA': 3, 'D.APP_I_DATA': 4, 'D.PIN': 7, 'D.API_DATA': 3, 'D.CRYPTO': 5, 'D.JCS_CODE': 3, 'D.JCS_DATA': 5, 'D.SEC_DATA': 7, 'D.CONFIG': 4, 'D.SENSITIVE_DATA': 5, 'D.ARRAY': 3, 'D.JCS_KEYS': 7, 'D.NB_REMAINTRYGLB': 1}, 'O': {'O.SCP': 60, 'O.CARD_MANAGEMENT': 66, 'O.SID': 34, 'O.FIREWALL': 64, 'O.GLOBAL_ARRAYS_CONFID': 14, 'O.GLOBAL_ARRAYS_INTEG': 10, 'O.NATIVE': 14, 'O.OPERATE': 39, 'O.REALLOCATION': 18, 'O.RESOURCES': 23, 'O.ALARM': 23, 'O.CIPHER': 16, 'O.RNG': 11, 'O.KEY-MNGT': 26, 'O.PIN-MNGT': 26, 'O.TRANSACTION': 19, 'O.OBJ-DELETION': 8, 'O.DELETION': 14, 'O.LOAD': 20, 'O.INSTALL': 17, 'O.RESIDENT_APPLICATION': 24, 'O.SECURE_COMPARE': 8, 'O.PATCH_LOADING': 25, 'O.PIN-': 2, 'O.APPLET': 16, 'O.CODE_PKG': 22, 'O.JAVAOBJECT': 55, 'O.OBJ-': 1}, 'T': {'T.CONFID-APPLI-DATA': 18, 'T.CONFID-JCS-CODE': 6, 'T.CONFID-JCS-DATA': 11, 'T.INTEG-APPLI-CODE': 11, 'T.INTEG-APPLI-DATA': 21, 'T.INTEG-JCS-CODE': 6, 'T.INTEG-JCS-DATA': 12, 'T.SID': 18, 'T.EXE-CODE': 8, 'T.NATIVE': 6, 'T.RESOURCES': 8, 'T.DELETION': 6, 'T.INSTALL': 6, 'T.OBJ-DELETION': 4, 'T.PHYSICAL': 4, 'T.CONFIGURATION': 4, 'T.CONF_DATA_APPLET': 4, 'T.PATCH_LOADING': 4, 'T.INTEG-APPLI-': 5, 'T.INTEG-': 2, 'T.EXE-': 1}, 'A': {'A.DELETION': 3, 'A.APPLET': 5, 'A.VERIFICATION': 5}, 'R': {'R.JAVA': 10}, 'OP': {'OP.ARRAY_ACCESS': 9, 'OP.ARRAY_LENGTH': 3, 'OP.ARRAY_AASTORE': 3, 'OP.CREATE': 7, 'OP.DELETE_APPLET': 4, 'OP.DELETE_PCKG': 3, 'OP.DELETE_PCKG_APPLET': 3, 'OP.FLOW': 3, 'OP.IMPORT_KEY': 2, 'OP.INSTANCE_FIELD': 5, 'OP.INVK_INTERFACE': 7, 'OP.INVK_VIRTUAL': 6, 'OP.JAVA': 5, 'OP.THROW': 5, 'OP.TYPE_ACCESS': 5, 'OP.LOCAL_STACK_ACCESS': 3, 'OP.OPERAND_STACK_ACCESS': 3, 'OP.PUT': 6, 'OP.STATIC_FIELD': 3, 'OP.NATIVE_ACCESS': 1, 'OP.NATIVE_INTERFACE_CALL': 1, 'OP.PUTFIELD': 1, 'OP.PUTSTATIC': 1}, 'OE': {'OE.SCP': 9, 'OE.CARD-': 1, 'OE.VERIFICATION': 38, 'OE.CODE-EVIDENCE': 18, 'OE.CARD_MANAGEMENT': 3, 'OE.APPLET': 8, 'OE.CODE-': 3}, 'OSP': {'OSP.VERIFICATION': 6}}, 'vendor': {'Infineon': {'Infineon': 8, 'Infineon Technologies AG': 1}, 'Idemia': {'IDEMIA': 175}}, 'eval_facility': {'CEA-LETI': {'CEA-LETI': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 22}}, 'DES': {'DES': {'DES': 12}, '3DES': {'TDES': 12, 'Triple-DES': 2}}, 'constructions': {'MAC': {'HMAC': 3, 'CMAC': 4}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 3}, 'ECDSA': {'ECDSA': 4}, 'ECC': {'ECC': 4}}, 'FF': {'DH': {'Diffie-Hellman': 4}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 4}, 'SHA2': {'SHA-256': 5, 'SHA-384': 4, 'SHA-224': 4, 'SHA-512': 3, 'SHA256': 1, 'SHA-2': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 4}, 'KA': {'Key Agreement': 2, 'Key agreement': 1}}, 'crypto_protocol': {'PACE': {'PACE': 1}}, 'randomness': {'RNG': {'RNG': 24}}, 'cipher_mode': {'ECB': {'ECB': 5}, 'CBC': {'CBC': 3}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 4, 'DPA': 2, 'SPA': 1, 'timing attack': 1}, 'FI': {'physical tampering': 2, 'malfunction': 2, 'fault injection': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 46-3': 3, 'FIPS PUB 81': 8, 'FIPS PUB 180-3': 2, 'FIPS PUB 197': 6, 'FIPS 198': 1, 'FIPS 140-2': 1}, 'NIST': {'NIST SP 800-90': 1}, 'PKCS': {'PKCS#1': 2}, 'BSI': {'AIS31': 1}, 'ISO': {'ISO/IEC 9796-1': 2, 'ISO/IEC 9797-1': 1, 'ISO/IEC 7816': 2, 'ISO/IEC 14443': 2, 'ISO/IEC 9797': 12}, 'SCP': {'SCP02': 4, 'SCP03': 4}}, 'javacard_version': {'JavaCard': {'Java Card 3.0.5': 7}}, 'javacard_api_const': {'misc': {'TYPE_ACCESS': 5}}, 'javacard_packages': {'javacard': {'javacard.sac.sac': 1, 'javacard.security': 3, 'javacard.framework': 4}, 'javacardx': {'javacardx.crypto': 2, 'javacardx.security': 1, 'javacardx.framework.util': 1}, 'com': {'com.oberthurcs.javacard': 2, 'com.oberthurcs.javacard.sac.sac': 1}}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are': 1}}}.
    • The st_filename property was set to anssi-cible-cc-2020_07en.pdf.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/56', 'ANSSI-CC-2020/59', 'ANSSI-CC-2020/57', 'ANSSI-CC-2022/33', 'ANSSI-CC-2020/55', 'ANSSI-CC-2020/58']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/56', 'ANSSI-CC-2020/59', 'ANSSI-CC-2020/57', 'ANSSI-CC-2022/33', 'ANSSI-CC-2020/55', 'ANSSI-CC-2020/58']}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1110-V2-2019']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1110-V2-2019']}} data.
    • The report_references property was updated, with the {'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['NSCIB-CC-0286910-CR2']}, '__add__': {'_type': 'Set', 'elements': ['NSCIB-CC-22-0286910-CR']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['NSCIB-CC-0286910-CR2']}, '__add__': {'_type': 'Set', 'elements': ['NSCIB-CC-22-0286910-CR']}}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1110-V2-2019']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0891-2015', 'BSI-DSZ-CC-0782-2012', 'BSI-DSZ-CC-1110-V2-2019', 'BSI-DSZ-CC-0891-V2-2016', 'BSI-DSZ-CC-0945-V3-2018', 'BSI-DSZ-CC-0945-2017', 'BSI-DSZ-CC-0945-V2-2018', 'BSI-DSZ-CC-1110-2019']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}]} values added.
  • 19.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '3996e239c72d181094b76bd38b58cf629382f9603eea456b4382b56461d6e63f', 'txt_hash': '15a1e2ed5352aa2d710ffe8a000b76f1733640fb99253f023c444a900d80693e'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'fe335c8ba5b824602982cd473fdf60cc90f6d5ad4f86878d9bab9b705677db07', 'txt_hash': '1db1bd2d3c13b3f08ad2bc162a6c15f0fd66a74aa777129acde4c4de206cdaba'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 281614, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 18, '/Title': 'ANSSI-CC-2020/07', '/Author': 'Géraldine Avoué', '/Subject': 'Plateforme ID-One Cosmo V9.1 masquée sur le composant IFX SLC32', '/Keywords': 'ANSSI-CC-CER-F-07, v29.2', '/Creator': 'Writer', '/Producer': 'LibreOffice 4.4', '/CreationDate': "D:20200402164050+02'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.ssi.gouv.fr/', 'mailto:[email protected]']}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 100060, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 2, '/Author': 'Géraldine Avoué', '/Category': '-S01', '/Comments': 'ANSSI-CC-CER-F-14_v14.6', '/Company': 'SGDSN', '/CreationDate': "D:20220404173043+02'00'", '/Creator': 'Acrobat PDFMaker 11 pour Word', '/ModDate': "D:20220404173044+02'00'", '/Producer': 'Adobe PDF Library 11.0', '/SourceModified': 'D:20220404153033', '/Title': 'ANSSI-CC-2020/07', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {'FR': {'match_rules': ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables'], 'cert_id': 'ANSSI-CC-2020/07', 'cert_item': 'Plateforme ID-One Cosmo V9.1 masquée sur le composant IFX SLC32', 'cert_item_version': 'Identification du matériel : 092914', 'ref_protection_profiles': 'Java Card Protection Profile Open Configuration, version 3.0.5 certifié BSI-CC-PP-0099-2017 le 21 décembre 2017', 'cc_version': 'Critères Communs version 3.1 révision 5', 'cc_security_level': 'EAL 5 augmenté ALC_DVS.2, AVA_VAN.5', 'developer': 'IDEMIA 2 place Samuel de Champlain 92400 Courbevoie, France Infineon Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire IDEMIA 2 place Samuel de Champlain 92400 Courbevoie, France', 'cert_lab': 'CEA - LETI 17 avenue des martyrs, 38054 Grenoble Cedex 9, France'}}.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1110-V2-2019': 2}, 'FR': {'ANSSI-CC-2020/07': 19}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0099-2017': 1, 'BSI-PP-0084-2014': 1}, 'ANSSI': {'ANSSI-CC-PP-0099-2017': 1}}, 'cc_security_level': {'EAL': {'EAL 5': 3, 'EAL2': 2, 'EAL6': 1, 'EAL7': 1, 'EAL 1': 1, 'EAL 3': 1, 'EAL 7': 1}, 'ITSEC': {'ITSEC E6 Elevé': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE': 4, 'AGD_PRE': 5, 'AGD_ALP': 3}, 'ALC': {'ALC_DVS.2': 2, 'ALC_FLR': 2, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.5': 4, 'AVA_VAN': 2}, 'ASE': {'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Infineon': {'Infineon Technologies AG': 1, 'Infineon': 2}, 'Idemia': {'IDEMIA': 37}}, 'eval_facility': {'Serma': {'SERMA': 11}, 'CESTI': {'CESTI': 1}, 'CEA-LETI': {'CEA - LETI': 1, 'CEA-LETI': 1}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The cert_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2020/07-S01': 2}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL5': 1, 'EAL2': 1}}, 'cc_sar': {'ALC': {'ALC_DVS.2': 1}, 'AVA': {'AVA_VAN.5': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Idemia': {'IDEMIA': 2}}, 'eval_facility': {'CEA-LETI': {'CEA-LETI': 2}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to anssi-cc-2020_07-fr.pdf.
    • The cert_filename property was set to certificat-cc-2020_07-s01.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to ['CEA'].
    • The cert_id property was set to ANSSI-CC-2020/07.
    • The report_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/56', 'NSCIB-CC-0286907-CR', 'ANSSI-CC-2020/59', 'ANSSI-CC-2020/57', 'ANSSI-CC-2022/33', 'ANSSI-CC-2020/55', 'NSCIB-CC-0286910-CR2', 'ANSSI-CC-2020/58']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/56', 'NSCIB-CC-0286907-CR', 'ANSSI-CC-2020/59', 'ANSSI-CC-2020/57', 'ANSSI-CC-2022/33', 'ANSSI-CC-2020/55', 'NSCIB-CC-0286910-CR2', 'ANSSI-CC-2020/58']}} data.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_07-fr.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2020_07en.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to None.
    • The st_references property was updated, with the {'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None} data.
    • The report_references property was updated, with the {'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}]} values discarded.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The cert property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The cert_metadata property was set to None.
    • The cert_keywords property was set to None.
    • The cert_filename property was set to None.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2022/33', 'ANSSI-CC-2020/55']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2022/33', 'ANSSI-CC-2020/55']}}} data.
    • The report_references property was updated, with the {'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/55']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/55']}}, 'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-2012']}}} data.
    • The scheme_data property was set to {'product': 'Plateforme ID-One Cosmo V9.1 masquée sur le composant IFX SLC32', 'url': 'https://cyber.gouv.fr/produits-certifies/plateforme-id-one-cosmo-v91-masquee-sur-le-composant-ifx-slc32', 'description': 'Le produit évalué est la « Plateforme ID-One Cosmo V9.1 masquée sur le composant IFX SLC32, Identification du matériel 092914 ». Elle est développée par IDEMIA et embarquée sur le microcontrôleur développé et fabriqué par INFINEON TECHNOLOGIES AG.\n\nCe produit est une plateforme ouverte Java Card conforme à la spécification émise par Global Platform, contact et/ou sans contact, destinée à accueil', 'sponsor': 'IDEMIA, INFINEON TECHNOLOGIES AG', 'developer': 'IDEMIA, INFINEON TECHNOLOGIES AG', 'cert_id': '2020/07', 'level': 'EAL5+', 'expiration_date': '28 Mars 2027', 'enhanced': {'cert_id': '2020/07', 'certification_date': '31/03/2020', 'expiration_date': '28/03/2027', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'IDEMIA, INFINEON TECHNOLOGIES AG', 'sponsor': 'IDEMIA, INFINEON TECHNOLOGIES AG', 'evaluation_facility': 'CEA - LETI', 'level': 'EAL5+', 'protection_profile': 'Java Card Protection Profile Open Configuration, version 3.0.5 (BSI-CC-PP-0099-2017)', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ALC_DVS.2, AVA_VAN.5', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2020/04/anssi-cible-cc-2020_07-m02en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2020/04/anssi-cc-2020_07-fr.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/2020/04/certificat-cc-2020_07-s01.pdf'}}.
  • 31.07.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Plateforme ID-One Cosmo V9.1 masquée sur le composant IFX SLC32 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-cc-2020_07-s01.pdf",
  "dgst": "61985466e51db7a4",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2020/07",
    "cert_lab": [
      "CEA"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "9.1"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2020/59",
          "NSCIB-CC-22-0286910-CR",
          "ANSSI-CC-2020/56",
          "ANSSI-CC-2022/33",
          "ANSSI-CC-2020/57",
          "NSCIB-CC-0286907-CR",
          "ANSSI-CC-2020/55",
          "ANSSI-CC-2020/58"
        ]
      },
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1110-V2-2019"
        ]
      },
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2020/59",
          "NSCIB-CC-22-0286910-CR",
          "ANSSI-CC-2020/56",
          "ANSSI-CC-2022/33",
          "ANSSI-CC-2020/57",
          "NSCIB-CC-0286907-CR",
          "ANSSI-CC-2020/55",
          "ANSSI-CC-2020/58"
        ]
      },
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1110-2019",
          "BSI-DSZ-CC-0945-2017",
          "BSI-DSZ-CC-0945-V3-2018",
          "BSI-DSZ-CC-0891-V2-2016",
          "BSI-DSZ-CC-0891-2015",
          "BSI-DSZ-CC-0945-V2-2018",
          "BSI-DSZ-CC-0782-2012",
          "BSI-DSZ-CC-1110-V2-2019"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2020/59",
          "ANSSI-CC-2020/56",
          "ANSSI-CC-2022/33",
          "ANSSI-CC-2020/57",
          "ANSSI-CC-2020/55",
          "ANSSI-CC-2020/58"
        ]
      },
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1110-V2-2019"
        ]
      },
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2020/59",
          "ANSSI-CC-2020/56",
          "ANSSI-CC-2022/33",
          "ANSSI-CC-2020/57",
          "ANSSI-CC-2020/55",
          "ANSSI-CC-2020/58"
        ]
      },
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1110-V2-2019"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2022-05-16",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_07-m02.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "Maintenance report : ANSSI-CC-2020/07-M02"
      },
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2022-03-28",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_07-s01fr.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "Reassessment report: ANSSI-CC-2020/07-S01"
      },
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2020-07-23",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_07-m01.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "ANSSI-CC-2020/07-M01"
      },
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2022-03-28",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_07-s01fr1.pdf",
        "maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-cc-2020_07-s01.pdf",
        "maintenance_title": "Reassessment report : ANSSI-CC-2020/07-S01"
      }
    ]
  },
  "manufacturer": "Idemia",
  "manufacturer_web": "https://www.idemia.com",
  "name": "Plateforme ID-One Cosmo V9.1 masqu\u00e9e sur le composant IFX SLC32",
  "not_valid_after": "2027-03-28",
  "not_valid_before": "2020-03-31",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "certificat-cc-2020_07-s01.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2020/07-S01": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_DVS.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 1,
          "EAL5": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "CEA-LETI": {
          "CEA-LETI": 2
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Idemia": {
          "IDEMIA": 2
        }
      },
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "G\u00e9raldine Avou\u00e9",
      "/Category": "-S01",
      "/Comments": "ANSSI-CC-CER-F-14_v14.6",
      "/Company": "SGDSN",
      "/CreationDate": "D:20220404173043+02\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 11 pour Word",
      "/ModDate": "D:20220404173044+02\u002700\u0027",
      "/Producer": "Adobe PDF Library 11.0",
      "/SourceModified": "D:20220404153033",
      "/Title": "ANSSI-CC-2020/07",
      "pdf_file_size_bytes": 100060,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 2
    },
    "report_filename": "anssi-cc-2020_07-fr.pdf",
    "report_frontpage": {
      "FR": {
        "cc_security_level": "EAL 5 augment\u00e9 ALC_DVS.2, AVA_VAN.5",
        "cc_version": "Crit\u00e8res Communs version 3.1 r\u00e9vision 5",
        "cert_id": "ANSSI-CC-2020/07",
        "cert_item": "Plateforme ID-One Cosmo V9.1 masqu\u00e9e sur le composant IFX SLC32",
        "cert_item_version": "Identification du mat\u00e9riel : 092914",
        "cert_lab": "CEA - LETI 17 avenue des martyrs, 38054 Grenoble Cedex 9, France",
        "developer": "IDEMIA 2 place Samuel de Champlain 92400 Courbevoie, France Infineon Technologies AG AIM CC SM PS \u2013 Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire IDEMIA 2 place Samuel de Champlain 92400 Courbevoie, France",
        "match_rules": [
          "R\u00e9f\u00e9rence du rapport de certification(.+)Nom du produit(.+)R\u00e9f\u00e9rence/version du produit(.*)Conformit\u00e9 \u00e0 un profil de protection(.+)Crit\u00e8res d\u2019\u00e9valuation et version(.+)Niveau d\u2019\u00e9valuation(.+)D\u00e9veloppeurs(.+)Centre d\u2019\u00e9valuation(.+)Accords de reconnaissance applicables"
        ],
        "ref_protection_profiles": "Java Card Protection Profile Open Configuration, version 3.0.5 certifi\u00e9 BSI-CC-PP-0099-2017 le 21 d\u00e9cembre 2017"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1110-V2-2019": 2
        },
        "FR": {
          "ANSSI-CC-2020/07": 19
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "ANSSI": {
          "ANSSI-CC-PP-0099-2017": 1
        },
        "BSI": {
          "BSI-CC-PP-0099-2017": 1,
          "BSI-PP-0084-2014": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_FSP": 1,
          "ADV_IMP": 1,
          "ADV_INT": 1,
          "ADV_SPM": 1,
          "ADV_TDS": 1
        },
        "AGD": {
          "AGD_ALP": 3,
          "AGD_OPE": 4,
          "AGD_PRE": 5
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMS": 1,
          "ALC_DEL": 1,
          "ALC_DVS": 1,
          "ALC_DVS.2": 2,
          "ALC_FLR": 2,
          "ALC_TAT": 1
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_ECD": 1,
          "ASE_INT": 1,
          "ASE_OBJ": 1,
          "ASE_REQ": 1,
          "ASE_SPD": 1,
          "ASE_TSS": 1
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_DPT": 1,
          "ATE_FUN": 1,
          "ATE_IND": 1
        },
        "AVA": {
          "AVA_VAN": 2,
          "AVA_VAN.5": 4
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 3": 1,
          "EAL 5": 3,
          "EAL 7": 1,
          "EAL2": 2,
          "EAL6": 1,
          "EAL7": 1
        },
        "ITSEC": {
          "ITSEC E6 Elev\u00e9": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "CEA-LETI": {
          "CEA - LETI": 1,
          "CEA-LETI": 1
        },
        "CESTI": {
          "CESTI": 1
        },
        "Serma": {
          "SERMA": 11
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1,
          "CCMB-2017-04-004": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Idemia": {
          "IDEMIA": 37
        },
        "Infineon": {
          "Infineon": 2,
          "Infineon Technologies AG": 1
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "G\u00e9raldine Avou\u00e9",
      "/CreationDate": "D:20200402164050+02\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "ANSSI-CC-CER-F-07, v29.2",
      "/Producer": "LibreOffice 4.4",
      "/Subject": "Plateforme ID-One Cosmo V9.1 masqu\u00e9e sur le composant IFX SLC32",
      "/Title": "ANSSI-CC-2020/07",
      "pdf_file_size_bytes": 281614,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "mailto:[email protected]",
          "http://www.ssi.gouv.fr/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 18
    },
    "st_filename": "anssi-cible-cc-2020_07en.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 4
          },
          "ECDH": {
            "ECDH": 3
          },
          "ECDSA": {
            "ECDSA": 4
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 4
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1110-V2-2019": 2
        }
      },
      "cc_claims": {
        "A": {
          "A.APPLET": 5,
          "A.DELETION": 3,
          "A.VERIFICATION": 5
        },
        "D": {
          "D.API_DATA": 3,
          "D.APP_CODE": 6,
          "D.APP_C_DATA": 3,
          "D.APP_I_DATA": 4,
          "D.ARRAY": 3,
          "D.CONFIG": 4,
          "D.CRYPTO": 5,
          "D.JCS_CODE": 3,
          "D.JCS_DATA": 5,
          "D.JCS_KEYS": 7,
          "D.NB_REMAINTRYGLB": 1,
          "D.PIN": 7,
          "D.SEC_DATA": 7,
          "D.SENSITIVE_DATA": 5
        },
        "O": {
          "O.ALARM": 23,
          "O.APPLET": 16,
          "O.CARD_MANAGEMENT": 66,
          "O.CIPHER": 16,
          "O.CODE_PKG": 22,
          "O.DELETION": 14,
          "O.FIREWALL": 64,
          "O.GLOBAL_ARRAYS_CONFID": 14,
          "O.GLOBAL_ARRAYS_INTEG": 10,
          "O.INSTALL": 17,
          "O.JAVAOBJECT": 55,
          "O.KEY-MNGT": 26,
          "O.LOAD": 20,
          "O.NATIVE": 14,
          "O.OBJ-": 1,
          "O.OBJ-DELETION": 8,
          "O.OPERATE": 39,
          "O.PATCH_LOADING": 25,
          "O.PIN-": 2,
          "O.PIN-MNGT": 26,
          "O.REALLOCATION": 18,
          "O.RESIDENT_APPLICATION": 24,
          "O.RESOURCES": 23,
          "O.RNG": 11,
          "O.SCP": 60,
          "O.SECURE_COMPARE": 8,
          "O.SID": 34,
          "O.TRANSACTION": 19
        },
        "OE": {
          "OE.APPLET": 8,
          "OE.CARD-": 1,
          "OE.CARD_MANAGEMENT": 3,
          "OE.CODE-": 3,
          "OE.CODE-EVIDENCE": 18,
          "OE.SCP": 9,
          "OE.VERIFICATION": 38
        },
        "OP": {
          "OP.ARRAY_AASTORE": 3,
          "OP.ARRAY_ACCESS": 9,
          "OP.ARRAY_LENGTH": 3,
          "OP.CREATE": 7,
          "OP.DELETE_APPLET": 4,
          "OP.DELETE_PCKG": 3,
          "OP.DELETE_PCKG_APPLET": 3,
          "OP.FLOW": 3,
          "OP.IMPORT_KEY": 2,
          "OP.INSTANCE_FIELD": 5,
          "OP.INVK_INTERFACE": 7,
          "OP.INVK_VIRTUAL": 6,
          "OP.JAVA": 5,
          "OP.LOCAL_STACK_ACCESS": 3,
          "OP.NATIVE_ACCESS": 1,
          "OP.NATIVE_INTERFACE_CALL": 1,
          "OP.OPERAND_STACK_ACCESS": 3,
          "OP.PUT": 6,
          "OP.PUTFIELD": 1,
          "OP.PUTSTATIC": 1,
          "OP.STATIC_FIELD": 3,
          "OP.THROW": 5,
          "OP.TYPE_ACCESS": 5
        },
        "OSP": {
          "OSP.VERIFICATION": 6
        },
        "R": {
          "R.JAVA": 10
        },
        "T": {
          "T.CONFID-APPLI-DATA": 18,
          "T.CONFID-JCS-CODE": 6,
          "T.CONFID-JCS-DATA": 11,
          "T.CONFIGURATION": 4,
          "T.CONF_DATA_APPLET": 4,
          "T.DELETION": 6,
          "T.EXE-": 1,
          "T.EXE-CODE": 8,
          "T.INSTALL": 6,
          "T.INTEG-": 2,
          "T.INTEG-APPLI-": 5,
          "T.INTEG-APPLI-CODE": 11,
          "T.INTEG-APPLI-DATA": 21,
          "T.INTEG-JCS-CODE": 6,
          "T.INTEG-JCS-DATA": 12,
          "T.NATIVE": 6,
          "T.OBJ-DELETION": 4,
          "T.PATCH_LOADING": 4,
          "T.PHYSICAL": 4,
          "T.RESOURCES": 8,
          "T.SID": 18
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0084-2014": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 6,
          "ADV_FSP.1": 3,
          "ADV_FSP.2": 2,
          "ADV_FSP.4": 2,
          "ADV_FSP.5": 8,
          "ADV_IMP.1": 9,
          "ADV_INT.2": 1,
          "ADV_TDS.1": 2,
          "ADV_TDS.3": 4,
          "ADV_TDS.4": 8
        },
        "AGD": {
          "AGD_OPE": 2,
          "AGD_OPE.1": 8,
          "AGD_PRE": 7,
          "AGD_PRE.1": 6
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.1": 1,
          "ALC_CMS.5": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS": 1,
          "ALC_DVS.1": 2,
          "ALC_DVS.2": 13,
          "ALC_LCD.1": 3,
          "ALC_TAT.1": 2,
          "ALC_TAT.2": 3
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 4,
          "ASE_INT.1": 5,
          "ASE_OBJ.2": 3,
          "ASE_REQ.1": 2,
          "ASE_REQ.2": 2,
          "ASE_SPD.1": 2,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.1": 2,
          "ATE_COV.2": 3,
          "ATE_DPT.1": 2,
          "ATE_DPT.3": 1,
          "ATE_FUN.1": 6
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.5": 15
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 1,
          "EAL4 augmented": 1,
          "EAL5": 9,
          "EAL5 augmented": 5,
          "EAL5+": 2
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 20,
          "FAU_ARP.1.1": 1,
          "FAU_GEN": 1,
          "FAU_GEN.1": 2,
          "FAU_SAA.1": 3,
          "FAU_STG.2": 9,
          "FAU_STG.2.1": 1,
          "FAU_STG.2.2": 1,
          "FAU_STG.2.3": 1
        },
        "FCO": {
          "FCO_NRO": 16,
          "FCO_NRO.2": 8
        },
        "FCS": {
          "FCS_CKM": 22,
          "FCS_CKM.1": 20,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.4": 19,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 27,
          "FCS_COP.1": 16,
          "FCS_COP.1.1": 1,
          "FCS_RNG": 3,
          "FCS_RNG.1": 10,
          "FCS_RNG.1.1": 2,
          "FCS_RNG.1.2": 2
        },
        "FDP": {
          "FDP_ACC": 72,
          "FDP_ACC.1": 24,
          "FDP_ACC.2": 13,
          "FDP_ACF": 59,
          "FDP_ACF.1": 34,
          "FDP_IFC": 28,
          "FDP_IFC.1": 21,
          "FDP_IFC.2": 2,
          "FDP_IFF": 22,
          "FDP_IFF.1": 16,
          "FDP_ITC": 26,
          "FDP_ITC.1": 8,
          "FDP_ITC.2": 14,
          "FDP_RIP": 131,
          "FDP_RIP.1": 11,
          "FDP_ROL": 16,
          "FDP_ROL.1": 6,
          "FDP_SDI": 11,
          "FDP_SDI.2": 2,
          "FDP_UCT": 10,
          "FDP_UCT.1": 1,
          "FDP_UIT": 17,
          "FDP_UIT.1": 4
        },
        "FIA": {
          "FIA_AFL": 35,
          "FIA_AFL.1": 8,
          "FIA_ATD": 10,
          "FIA_ATD.1": 2,
          "FIA_UAU": 56,
          "FIA_UAU.1": 12,
          "FIA_UAU.4": 2,
          "FIA_UAU.7": 2,
          "FIA_UID": 31,
          "FIA_UID.1": 16,
          "FIA_UID.2": 1,
          "FIA_USB": 9,
          "FIA_USB.1": 3
        },
        "FMT": {
          "FMT_MOF": 7,
          "FMT_MOF.1": 1,
          "FMT_MSA": 191,
          "FMT_MSA.1": 20,
          "FMT_MSA.2": 5,
          "FMT_MSA.3": 27,
          "FMT_MTD": 39,
          "FMT_MTD.1": 4,
          "FMT_MTD.2": 2,
          "FMT_MTD.3": 1,
          "FMT_SMF": 62,
          "FMT_SMF.1": 30,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 61,
          "FMT_SMR.1": 56,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1,
          "FMT_SMR.2": 6
        },
        "FPR": {
          "FPR_UNO": 16,
          "FPR_UNO.1": 13,
          "FPR_UNO.1.1": 1
        },
        "FPT": {
          "FPT_FLS": 45,
          "FPT_FLS.1": 18,
          "FPT_FLS.1.1": 2,
          "FPT_PHP": 7,
          "FPT_PHP.3": 1,
          "FPT_RCV": 26,
          "FPT_RCV.3": 7,
          "FPT_RCV.4": 1,
          "FPT_TDC": 9,
          "FPT_TDC.1": 11,
          "FPT_TDC.1.1": 1,
          "FPT_TDC.1.2": 1,
          "FPT_TST": 1,
          "FPT_TST.1": 11,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FRU": {
          "FRU_FLT": 7,
          "FRU_FLT.1": 1
        },
        "FTP": {
          "FTP_ITC": 16,
          "FTP_ITC.1": 7,
          "FTP_TRP.1": 4
        }
      },
      "certification_process": {
        "OutOfScope": {
          "a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 3
        },
        "ECB": {
          "ECB": 5
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 1
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 2,
          "Key agreement": 1
        },
        "MAC": {
          "MAC": 4
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "CEA-LETI": {
          "CEA-LETI": 1
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 4
          },
          "SHA2": {
            "SHA-2": 1,
            "SHA-224": 4,
            "SHA-256": 5,
            "SHA-384": 4,
            "SHA-512": 3,
            "SHA256": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {
        "misc": {
          "TYPE_ACCESS": 5
        }
      },
      "javacard_packages": {
        "com": {
          "com.oberthurcs.javacard": 2,
          "com.oberthurcs.javacard.sac.sac": 1
        },
        "javacard": {
          "javacard.framework": 4,
          "javacard.sac.sac": 1,
          "javacard.security": 3
        },
        "javacardx": {
          "javacardx.crypto": 2,
          "javacardx.framework.util": 1,
          "javacardx.security": 1
        }
      },
      "javacard_version": {
        "JavaCard": {
          "Java Card 3.0.5": 7
        }
      },
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 24
        }
      },
      "side_channel_analysis": {
        "FI": {
          "fault injection": 1,
          "malfunction": 2,
          "physical tampering": 2
        },
        "SCA": {
          "DPA": 2,
          "SPA": 1,
          "physical probing": 4,
          "timing attack": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS31": 1
        },
        "FIPS": {
          "FIPS 140-2": 1,
          "FIPS 198": 1,
          "FIPS PUB 180-3": 2,
          "FIPS PUB 197": 6,
          "FIPS PUB 46-3": 3,
          "FIPS PUB 81": 8
        },
        "ISO": {
          "ISO/IEC 14443": 2,
          "ISO/IEC 7816": 2,
          "ISO/IEC 9796-1": 2,
          "ISO/IEC 9797": 12,
          "ISO/IEC 9797-1": 1
        },
        "NIST": {
          "NIST SP 800-90": 1
        },
        "PKCS": {
          "PKCS#1": 2
        },
        "SCP": {
          "SCP02": 4,
          "SCP03": 4
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 22
          }
        },
        "DES": {
          "3DES": {
            "TDES": 12,
            "Triple-DES": 2
          },
          "DES": {
            "DES": 12
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 4,
            "HMAC": 3
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Idemia": {
          "IDEMIA": 175
        },
        "Infineon": {
          "Infineon": 8,
          "Infineon Technologies AG": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "[email protected]",
      "/CreationDate": "D:20200228163658+01\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2016",
      "/ModDate": "D:20200228163658+01\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2016",
      "/Title": "Title",
      "pdf_file_size_bytes": 2862110,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 150
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-cible_PP-2010-03en.pdf",
        "pp_name": "Java Card\u2122 System Protection Profile Open Configuration, Version 2.6"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_07-fr.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "AVA_VAN.5",
      "EAL5+",
      "ALC_DVS.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2020_07en.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "fe335c8ba5b824602982cd473fdf60cc90f6d5ad4f86878d9bab9b705677db07",
      "txt_hash": "1db1bd2d3c13b3f08ad2bc162a6c15f0fd66a74aa777129acde4c4de206cdaba"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "3996e239c72d181094b76bd38b58cf629382f9603eea456b4382b56461d6e63f",
      "txt_hash": "15a1e2ed5352aa2d710ffe8a000b76f1733640fb99253f023c444a900d80693e"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "f2253108b3d5baad833abb27ec6ea00f236000f43a23281fe43ae078f32d8a43",
      "txt_hash": "d0b34b74aa182a8c12e6ba252de1dce3ea72887b1b753cc410246239f5d3d0d7"
    }
  },
  "status": "active"
}