Application IAS V4 sur la plateforme JavaCard ouverte MultiApp V3 masquée sur le composant M7820 A11 (Version du patch : 1.5)
CSV information ?
Status | archived |
---|---|
Valid from | 11.07.2014 |
Valid until | 01.09.2019 |
Scheme | 🇫🇷 FR |
Manufacturer | Gemalto - Infineon Technologies AG |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | AVA_VAN.5, EAL5+, ALC_DVS.2 |
Maintenance updates | ANSSI-CC-2014/50-M01 (23.05.2016) Certification report |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Symmetric Algorithms
DESHash functions
SHA-1, SHA-2Protocols
PACELibraries
v1.02.013Vendor
Infineon Technologies AG, Infineon Technologies, Infineon, GemaltoSecurity level
EAL 5, EAL4, EAL5, EAL7, EAL 1, EAL 3, EAL 7, ITSEC E6 ElevéSecurity Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSSProtection profiles
BSI-CC-PP-0059-2009-MA-01, BSI-CC-PP-0075-2012, BSI-CC-PP-0071-2012, BSI-CC-PP-0072-2012, BSI-CC-PP-0076-2013, BSI-PP-0035-2007, BSI-CC-PP- 0059-2009-MA-01, BSI-CC-PP- 0075-2012, BSI-CC-PP- 0071-2012, BSI-CC-PP- 0072-2012, BSI-CC-PP-0076-, BSI-PP- 0035-2007, BSI-PP-0035-, PP-SSCD-Part2, PP-SSCD-Part3, PP-SSCD-Part4, PP-SSCD-Part5, PP-SSCD-Part6, PP-SSCD-Certificates
BSI-DSZ-CC-0829-2012, ANSSI-CC-2014/50, ANSSI-CC-2014/14, ANSSI-CC-2014/49, ANSSI-CC-2014/06Evaluation facilities
Serma Technologies, CESTIStandards
CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004File metadata
Title | Microsoft Word - Rapport ANSSI-CC-2014_50fr.doc |
---|---|
Author | Duquesnoy |
Creation date | D:20140711150029+02'00' |
Modification date | D:20140711150029+02'00' |
Pages | 24 |
Creator | PScript5.dll Version 5.2.2 |
Producer | Acrobat Distiller 9.0.0 (Windows) |
Frontpage
Certificate ID | ANSSI-CC-2014/50 |
---|---|
Certified item | Application IAS V4 sur la plateforme JavaCard ouverte MultiApp V3 masquée sur le composant M7820 A11 |
Certification lab | Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France |
Developer | Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France Infineon Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France |
References
Outgoing- ANSSI-CC-2014/06 - archived - Plateforme Java Card en configuration ouverte de la carte à puce MultiApp V3 masquée sur le composant M7820 A11
- ANSSI-CC-2014/14 - archived - Application IAS V4 sur la plateforme JavaCard ouverte MultiApp V3 masquée sur le composant M7820 A11
- BSI-DSZ-CC-0829-2012 - archived - Infineon smart card IC (Security Controller) M7820 A11 and M11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01 and Toolbox v1.02.013 libraries and with specific IC dedicated software
- ANSSI-CC-2014/49 - archived - Application IAS V4 sur la plateforme JavaCard ouverte MultiApp V3 masquée sur le composant M7820 A11 (Version du patch : 1.5)
Security target ?
Extracted keywords
Symmetric Algorithms
AES, DES, TDESAsymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-Hellman, DHHash functions
SHA-224Schemes
MACRandomness
RNG, RNDCPLC
IC Fabricator, IC TypeVendor
Infineon, GemaltoSecurity level
EAL 5+, EAL5, EAL5 augmentedClaims
A.CGA, A.SCA, A.CSP, OE.HI_VADSecurity Assurance Requirements (SAR)
ALC_DVS.2, AVA_VAN.5Security Functional Requirements (SFR)
FCS_CKM, FCS_CKM.4, FCS_COP, FCS_CKM.2, FCS_COP.1, FCS_CKM.1.1, FCS_CKM.1, FCS_CKM.4.1, FCS_COP.1.1, FDP_DAU, FDP_UIT, FDP_ITC.1, FDP_ITC.2, FDP_ACC, FDP_ACF.1, FDP_ACC.1.1, FDP_ACF, FDP_ACC.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_DAU.1, FDP_DAU.2.1, FDP_DAU.2.2, FDP_ITC, FDP_IFC.1, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_RIP.1, FDP_RIP.1.1, FDP_SDI, FDP_SDI.1, FDP_SDI.2.1, FDP_SDI.2.2, FDP_UCT.1, FDP_UCT.1.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_UCT, FDP_RIP, FIA_API, FIA_AFL, FIA_API.1, FIA_API.1.1, FIA_UAU.1, FIA_UID.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UID, FIA_UID.1.1, FIA_UID.1.2, FMT_MSA.3, FMT_MOF.1, FMT_SMR.1, FMT_SMF.1, FMT_MOF.1.1, FMT_MSA, FMT_MSA.1.1, FMT_MSA.2, FMT_MSA.1, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.4.1, FMT_MTD, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_EMS, FPT_EMS.1, FPT_EMS.1.1, FPT_EMS.1.2, FPT_TST.1, FPT_FLS.1, FPT_FLS.1.1, FPT_TST, FPT_PHP.1, FPT_PHP.1.1, FPT_PHP.1.2, FPT_PHP.3, FPT_PHP.3.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FTP_ITC, FTP_ITC.1, FTP_TRP.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3Protection profiles
BSI-PP-0035, BSI-CC-PP-0059-2009-MA-01, BSI-CC-PP-0075-2012, BSI-CC-PP-0071-2012, BSI-CC-PP-0072-2012, BSI-CC-PP-0076-2013, PP-SSCD-KG, PP-SSCD-KI, PP-SSCDCertificates
BSI-DSZ-CC-0695-2011, CC-1, CC-2, CC-3Evaluation facilities
Serma TechnologiesSide-channel analysis
SPA, DPA, timing attacks, physical tamperingStandards
FIPS180-2, FIPS46-3, FIPS PUB 46-3, FIPS197, PKCS#3, PKCS#1, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2009-07-004File metadata
Keywords | Security Target, CC, eTravel |
---|---|
Creation date | D:20140131160737+01'00' |
Modification date | D:20140807095336+02'00' |
Pages | 45 |
Creator | Microsoft® Office Word 2007 |
Producer | Microsoft® Office Word 2007 |
References
Outgoing- BSI-DSZ-CC-0695-2011 - archived - Infineon smart card IC (Security Controller) M7820 M11 with optional RSA2048/4096 v1.02.008, EC v1.02.008, SHA-2 v1.01 and Toolbox v1.02.008 libraries and with specific IC dedicated software
- OCSI/CERT/SYS/06/2017/RC - archived - distributed remote Qualified Signature Creation Device (drQSCD) v1.0
- OCSI/CERT/CCL/02/2020/RC - active - Trident version 2.1.3
Heuristics ?
Extracted SARs
AVA_VAN.5, ALC_DVS.2Similar certificates
Scheme data ?
Product | Application IAS V4 sur la plateforme JavaCard ouverte MultiApp V3 masquée sur le composant M7820 A11 (Version du patch : 1.5) | |
---|---|---|
Url | https://cyber.gouv.fr/produits-certifies/application-ias-v4-sur-la-plateforme-javacard-ouverte-multiapp-v3-masquee-sur-1 | |
Description | Le produit qualifié est l'« application IAS V4 sur la plateforme JavaCard ouverte MultiApp V3masquée sur le composant M7820 A11 », pouvant être en mode contact ou sans-contact. Leproduit est développé par la société Gemalto et embarqué sur le microcontrôleur M7820 A11fabriqué par la société Infineon Technologies. Ce produit est également proposé sous les noms IDPrime MD 840 (mode contact uni | |
Sponsor | Gemalto | |
Developer | Gemalto / Infineon Technologies AG | |
Cert Id | 2014/49 | |
Level | EAL5+ | |
Enhanced | ||
Cert Id | 2014/49 | |
Certification Date | 11/07/2014 | |
Category | Cartes à puce | |
Cc Version | Critères Communs version 3.1r4 | |
Developer | Gemalto / Infineon Technologies AG | |
Sponsor | Gemalto | |
Evaluation Facility | Serma Technologies | |
Level | EAL5+ | |
Protection Profile | BSI-CC-PP-0059-2009-MA-01, BSI-CC-PP-0075-2012 | |
Mutual Recognition | SOG-IS CCRA | |
Augmented | ALC_DVS.2, AVA_VAN.5 | |
Target Link | https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2014-49en.pdf | |
Report Link | https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2014-49fr.pdf |
References ?
Updates ?
-
21.10.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'product': 'Application IAS V4 sur la plateforme JavaCard ouverte MultiApp V3 masquée sur le composant M7820 A11 (Version du patch : 1.5)', 'url': 'https://cyber.gouv.fr/produits-certifies/application-ias-v4-sur-la-plateforme-javacard-ouverte-multiapp-v3-masquee-sur-1', 'cert_id': '2014/49', 'enhanced': {'__update__': {'cert_id': '2014/49', 'protection_profile': 'BSI-CC-PP-0059-2009-MA-01, BSI-CC-PP-0075-2012', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2014-49en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2014-49fr.pdf'}}}
data.
- The scheme_data property was updated, with the
-
14.10.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'Application IAS V4 sur la plateforme JavaCard ouverte MultiApp V3 masquée sur le composant M7820 A11 (Version du patch : 1.5)', 'url': 'https://cyber.gouv.fr/produits-certifies/application-ias-v4-sur-la-plateforme-javacard-ouverte-multiapp-v3-masquee-sur-0', 'description': "Le produit qualifié est l'« application IAS V4 sur la plateforme JavaCard ouverte MultiApp V3masquée sur le composant M7820 A11 », pouvant être en mode contact ou sans-contact. Leproduit est développé par la société Gemalto et embarqué sur le microcontrôleur M7820 A11fabriqué par la société Infineon Technologies.\n\nCe produit est également proposé sous les noms IDPrime MD 840 (mode contact uni", 'sponsor': 'Gemalto', 'developer': 'Gemalto / Infineon Technologies AG', 'cert_id': '2014/50', 'level': 'EAL5+', 'enhanced': {'cert_id': '2014/50', 'certification_date': '11/07/2014', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 3.1r4', 'developer': 'Gemalto / Infineon Technologies AG', 'sponsor': 'Gemalto', 'evaluation_facility': 'Serma Technologies', 'level': 'EAL5+', 'protection_profile': 'BSI-CC-PP-0059-2009-MA-01, BSI-CC-PP-0075-2012, BSI-CC-PP-0071-2012,BSI-CC-PP-0072-2012, BSI-CC-PP-0076-2013', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ALC_DVS.2, AVA_VAN.5', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2014-50en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2014-50fr.pdf'}}
.
- The scheme_data property was set to
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '290350ada28b14cbed0874d3c0dd277d39601ab766660d1c98a1e9e04f8dd8b7', 'txt_hash': '194f914a0907c4cf7b7088db84cc32ea5f6e3421abaebefc47caf67a4e3cdeee'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '306aa0d11e0f255a25aa091e27a7533fffc44891cd5339fc4f459959afa5edc0', 'txt_hash': '89ebdc69ca42cd4eea903cbd2361135a9ec72e8aee074f36cecd710485c90e75'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 234712, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 24, '/Author': 'Duquesnoy', '/CreationDate': "D:20140711150029+02'00'", '/Creator': 'PScript5.dll Version 5.2.2', '/ModDate': "D:20140711150029+02'00'", '/Producer': 'Acrobat Distiller 9.0.0 (Windows)', '/Title': 'Microsoft Word - Rapport ANSSI-CC-2014_50fr.doc', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 652503, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 45, '/CreationDate': "D:20140131160737+01'00'", '/Creator': 'Microsoft® Office Word 2007', '/Keywords': 'Security Target, CC, eTravel', '/ModDate': "D:20140807095336+02'00'", '/Producer': 'Microsoft® Office Word 2007', '/Subject': '', '/Title': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{'FR': {'match_rules': ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables'], 'cert_id': 'ANSSI-CC-2014/50', 'cert_item': 'Application IAS V4 sur la plateforme JavaCard ouverte MultiApp V3 masquée sur le composant M7820 A11', 'cert_item_version': 'Version de l’application IAS : 4.0.2.K Version de l’application MOCA Server : 1.0 Version plateforme Java Card MultiApp : 3.0 Version du patch : 1.5', 'ref_protection_profiles': 'Protection profiles for secure signature creation device – Part 2: Device with key generation, Référence : prEN 14169-2:2012, Version 2.0.1, maintenu sous la référence BSI-CC-PP-0059-2009-MA-01 (voir [PP-SSCD-Part2]). Protection profiles for secure signature creation device – Part 3: Device with key import, Référence : prEN 14169-3:2012, Version 1.0.2, certifié sous la référence BSI-CC-PP-0075-2012 (voir [PP-SSCD-Part3]). Protection profiles for secure signature creation device – Part 4: Extension for device with key generation and trusted communication with certificate generation application, Référence : prEN 14169-4:2012, Version 1.0.1, certifié sous la référence BSI-CC-PP-0071-2012 (voir [PP-SSCD-Part4]). Protection profiles for secure signature creation device – Part 5: Extension for device with key generation and trusted communication with signature creation application, Référence : prEN 14169-5:2012, Version 1.0.1, certifié sous la référence BSI-CC-PP-0072-2012 (voir [PP-SSCD-Part5]). Protection profiles for secure signature creation device – Part 6: Extension for device with key import and trusted communication with signature creation application, Référence : prEN 14169-6:2013, Version 1.0.4, certifié sous la référence BSI-CC-PP-0076-2013 (voir [PP-SSCD-Part6]). Rapport de certification ANSSI-CC-2014/50 Application IAS V4 sur la plateforme JavaCard ouverte MultiApp V3 masquée sur le composant M7820 A11 Page 4 sur 24 ANSSI-CC-CER-F-07.011', 'cc_version': 'Critères Communs version 3.1 révision 4', 'cc_security_level': 'EAL 5 augmenté ALC_DVS.2, AVA_VAN.5', 'developer': 'Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France Infineon Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France', 'cert_lab': 'Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France'}}
. - The report_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0829-2012': 3}, 'FR': {'ANSSI-CC-2014/50': 25, 'ANSSI-CC-2014/14': 2, 'ANSSI-CC-2014/49': 3, 'ANSSI-CC-2014/06': 4}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0059-2009-MA-01': 2, 'BSI-CC-PP-0075-2012': 2, 'BSI-CC-PP-0071-2012': 2, 'BSI-CC-PP-0072-2012': 2, 'BSI-CC-PP-0076-2013': 2, 'BSI-PP-0035-2007': 1, 'BSI-CC-PP- 0059-2009-MA-01': 1, 'BSI-CC-PP- 0075-2012': 1, 'BSI-CC-PP- 0071-2012': 1, 'BSI-CC-PP- 0072-2012': 1, 'BSI-CC-PP-0076-': 1, 'BSI-PP- 0035-2007': 1, 'BSI-PP-0035-': 1}, 'other': {'PP-SSCD-Part2': 2, 'PP-SSCD-Part3': 2, 'PP-SSCD-Part4': 2, 'PP-SSCD-Part5': 2, 'PP-SSCD-Part6': 2, 'PP-SSCD-': 5}}, 'cc_security_level': {'EAL': {'EAL 5': 3, 'EAL4': 2, 'EAL5': 1, 'EAL7': 1, 'EAL 1': 1, 'EAL 3': 1, 'EAL 7': 1}, 'ITSEC': {'ITSEC E6 Elevé': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_DVS.2': 3, 'ALC_FLR': 2, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.5': 6, 'AVA_VAN': 2}, 'ASE': {'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Infineon': {'Infineon Technologies AG': 1, 'Infineon Technologies': 5, 'Infineon': 3}, 'Gemalto': {'Gemalto': 33}}, 'eval_facility': {'Serma': {'Serma Technologies': 3}, 'CESTI': {'CESTI': 1}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}, 'SHA2': {'SHA-2': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {'PACE': {'PACE': 1}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Infineon': {'v1.02.013': 3}}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2012-09-001': 1, 'CCMB-2012-09-002': 1, 'CCMB-2012-09-003': 1, 'CCMB-2012-09-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {'javacardx': {'javacardx.pace': 1}, 'com': {'com.gemalto.javacardx.pace': 1}}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0695-2011': 1}, 'NL': {'CC-1': 2, 'CC-2': 3, 'CC-3': 3}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0035': 1, 'BSI-CC-PP-0059-2009-MA-01': 1, 'BSI-CC-PP-0075-2012': 1, 'BSI-CC-PP-0071-2012': 1, 'BSI-CC-PP-0072-2012': 1, 'BSI-CC-PP-0076-2013': 1}, 'other': {'PP-SSCD-KG': 33, 'PP-SSCD-KI': 25, 'PP-SSCD': 4}}, 'cc_security_level': {'EAL': {'EAL 5+': 1, 'EAL5': 2, 'EAL5 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_DVS.2': 2}, 'AVA': {'AVA_VAN.5': 2}}, 'cc_sfr': {'FCS': {'FCS_CKM': 14, 'FCS_CKM.4': 8, 'FCS_COP': 8, 'FCS_CKM.2': 2, 'FCS_COP.1': 2, 'FCS_CKM.1.1': 2, 'FCS_CKM.1': 5, 'FCS_CKM.4.1': 2, 'FCS_COP.1.1': 2}, 'FDP': {'FDP_DAU': 4, 'FDP_UIT': 3, 'FDP_ITC.1': 4, 'FDP_ITC.2': 4, 'FDP_ACC': 4, 'FDP_ACF.1': 6, 'FDP_ACC.1.1': 4, 'FDP_ACF': 4, 'FDP_ACC.1': 14, 'FDP_ACF.1.1': 4, 'FDP_ACF.1.2': 4, 'FDP_ACF.1.3': 4, 'FDP_ACF.1.4': 4, 'FDP_DAU.1': 1, 'FDP_DAU.2.1': 1, 'FDP_DAU.2.2': 1, 'FDP_ITC': 2, 'FDP_IFC.1': 9, 'FDP_ITC.1.1': 1, 'FDP_ITC.1.2': 1, 'FDP_ITC.1.3': 1, 'FDP_RIP.1': 1, 'FDP_RIP.1.1': 1, 'FDP_SDI': 4, 'FDP_SDI.1': 2, 'FDP_SDI.2.1': 2, 'FDP_SDI.2.2': 2, 'FDP_UCT.1': 1, 'FDP_UCT.1.1': 1, 'FDP_UIT.1.1': 1, 'FDP_UIT.1.2': 1, 'FDP_UCT': 2, 'FDP_RIP': 1}, 'FIA': {'FIA_API': 5, 'FIA_AFL': 6, 'FIA_API.1': 8, 'FIA_API.1.1': 2, 'FIA_UAU.1': 4, 'FIA_UID.1': 6, 'FIA_AFL.1.1': 2, 'FIA_AFL.1.2': 2, 'FIA_UAU': 5, 'FIA_UAU.1.1': 2, 'FIA_UAU.1.2': 2, 'FIA_UID': 4, 'FIA_UID.1.1': 2, 'FIA_UID.1.2': 2}, 'FMT': {'FMT_MSA.3': 5, 'FMT_MOF.1': 2, 'FMT_SMR.1': 11, 'FMT_SMF.1': 8, 'FMT_MOF.1.1': 1, 'FMT_MSA': 14, 'FMT_MSA.1.1': 3, 'FMT_MSA.2': 2, 'FMT_MSA.1': 3, 'FMT_MSA.2.1': 1, 'FMT_MSA.3.1': 2, 'FMT_MSA.3.2': 2, 'FMT_MSA.4.1': 2, 'FMT_MTD': 4, 'FMT_MTD.1.1': 2, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_EMS': 5, 'FPT_EMS.1': 7, 'FPT_EMS.1.1': 3, 'FPT_EMS.1.2': 3, 'FPT_TST.1': 3, 'FPT_FLS.1': 2, 'FPT_FLS.1.1': 1, 'FPT_TST': 2, 'FPT_PHP.1': 2, 'FPT_PHP.1.1': 1, 'FPT_PHP.1.2': 1, 'FPT_PHP.3': 2, 'FPT_PHP.3.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1}, 'FTP': {'FTP_ITC': 13, 'FTP_ITC.1': 2, 'FTP_TRP.1': 2, 'FTP_ITC.1.1': 4, 'FTP_ITC.1.2': 4, 'FTP_ITC.1.3': 4}}, 'cc_claims': {'A': {'A.CGA': 2, 'A.SCA': 2, 'A.CSP': 3}, 'OE': {'OE.HI_VAD': 1}}, 'vendor': {'Infineon': {'Infineon': 3}, 'Gemalto': {'Gemalto': 300}}, 'eval_facility': {'Serma': {'Serma Technologies': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 6}}, 'DES': {'DES': {'DES': 2}, '3DES': {'TDES': 4}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 1}, 'ECDSA': {'ECDSA': 1}, 'ECC': {'ECC': 2}}, 'FF': {'DH': {'Diffie-Hellman': 2, 'DH': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-224': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 3}}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 2, 'RND': 1}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'SPA': 1, 'DPA': 1, 'timing attacks': 1}, 'FI': {'physical tampering': 4}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {'ICFab': {'IC Fabricator': 1}, 'ICType': {'IC Type': 1}}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS180-2': 1, 'FIPS46-3': 1, 'FIPS PUB 46-3': 1, 'FIPS197': 2}, 'PKCS': {'PKCS#3': 3, 'PKCS#1': 2}, 'CC': {'CCMB-2012-09-001': 1, 'CCMB-2012-09-002': 1, 'CCMB-2012-09-003': 1, 'CCMB-2009-07-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
ANSSI-CC_2014-50fr.pdf
. - The st_filename property was set to
ANSSI-CC-cible_2014-50en.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['SERMA']
. - The cert_id property was set to
ANSSI-CC-2014/50
. - The st_references property was updated, with the
{'directly_referenced_by': {'_type': 'Set', 'elements': ['OCSI/CERT/SYS/06/2017/RC', 'OCSI/CERT/CCL/02/2020/RC']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['OCSI/CERT/SYS/06/2017/RC', 'OCSI/CERT/CCL/02/2020/RC']}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0695-2011']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0695-2011']}}
data. - The report_references property was updated, with the
{'directly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2014/06', 'ANSSI-CC-2014/14', 'BSI-DSZ-CC-0829-2012', 'ANSSI-CC-2014/49']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2014/06', 'BSI-DSZ-CC-0640-2010', 'BSI-DSZ-CC-0728-2011', 'BSI-DSZ-CC-0829-2012', 'ANSSI-CC-2014/14', 'ANSSI-CC-2014/49']}}
data. - The scheme_data property was set to
None
.
- The report property was updated, with the
-
19.08.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'product': 'Application IAS V4 sur la plateforme JavaCard ouverte MultiApp V3 masquée sur le composant M7820 A11 (Version du patch : 1.5)', 'url': 'https://cyber.gouv.fr/produits-certifies/application-ias-v4-sur-la-plateforme-javacard-ouverte-multiapp-v3-masquee-sur-1', 'cert_id': '2014/49', 'enhanced': {'__update__': {'cert_id': '2014/49', 'protection_profile': 'BSI-CC-PP-0059-2009-MA-01, BSI-CC-PP-0075-2012', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2014-49en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2014-49fr.pdf'}}}
data.
- The scheme_data property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2014-50fr.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2014-50en.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The report_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
. - The st_references property was updated, with the
{'directly_referenced_by': None, 'indirectly_referenced_by': None}
data. - The report_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data. - The scheme_data property was updated, with the
{'product': 'Application IAS V4 sur la plateforme JavaCard ouverte MultiApp V3 masquée sur le composant M7820 A11 (Version du patch : 1.5)', 'url': 'https://cyber.gouv.fr/produits-certifies/application-ias-v4-sur-la-plateforme-javacard-ouverte-multiapp-v3-masquee-sur-0', 'cert_id': '2014/50', 'enhanced': {'__update__': {'cert_id': '2014/50', 'certification_date': '11/07/2014', 'protection_profile': 'BSI-CC-PP-0059-2009-MA-01, BSI-CC-PP-0075-2012, BSI-CC-PP-0071-2012,BSI-CC-PP-0072-2012, BSI-CC-PP-0076-2013', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2014-50en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2014-50fr.pdf'}}}
data.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['OCSI/CERT/CCL/02/2020/RC']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['OCSI/CERT/CCL/02/2020/RC']}}, 'directly_referencing': None, 'indirectly_referencing': None}
data. - The scheme_data property was set to
{'product': 'Application IAS V4 sur la plateforme JavaCard ouverte MultiApp V3 masquée sur le composant M7820 A11', 'url': 'https://cyber.gouv.fr/produits-certifies/application-ias-v4-sur-la-plateforme-javacard-ouverte-multiapp-v3-masquee-sur-le', 'description': "Le produit qualifié est l'« application IAS V4 sur la plateforme JavaCard ouverte MultiApp V3masquée sur le composant M7820 A11 », pouvant être en mode contact ou sans-contact. Leproduit est développé par la société Gemalto et embarqué sur le microcontrôleur M7820 A11fabriqué par la société Infineon Technologies.\n\nCe produit est également proposé sous les noms IDPrime MD 840 (mode contact uni", 'sponsor': 'Gemalto', 'developer': 'Gemalto / Infineon Technologies AG', 'cert_id': '2014/14', 'level': 'EAL5+', 'enhanced': {'cert_id': '2014/14', 'certification_date': '07/02/2014', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 3.1r4', 'developer': 'Gemalto / Infineon Technologies AG', 'sponsor': 'Gemalto', 'evaluation_facility': 'Serma Technologies', 'level': 'EAL5+', 'protection_profile': 'BSI-PP-0005-2002, BSI-PP-0006-2002', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ALC_DVS.2, AVA_VAN.5', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2014-14en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2014-14fr.pdf'}}
.
- The st property was updated, with the
-
31.07.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Application IAS V4 sur la plateforme JavaCard ouverte MultiApp V3 masquée sur le composant M7820 A11 (Version du patch : 1.5) was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "623e0ce934d1f19c",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2014/50",
"cert_lab": [
"SERMA"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"1.5"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2014/14",
"BSI-DSZ-CC-0829-2012",
"ANSSI-CC-2014/49",
"ANSSI-CC-2014/06"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2014/14",
"BSI-DSZ-CC-0829-2012",
"BSI-DSZ-CC-0640-2010",
"ANSSI-CC-2014/49",
"BSI-DSZ-CC-0728-2011",
"ANSSI-CC-2014/06"
]
}
},
"scheme_data": {
"cert_id": "2014/49",
"description": "Le produit qualifi\u00e9 est l\u0027\u00ab application IAS V4 sur la plateforme JavaCard ouverte MultiApp V3masqu\u00e9e sur le composant M7820 A11 \u00bb, pouvant \u00eatre en mode contact ou sans-contact. Leproduit est d\u00e9velopp\u00e9 par la soci\u00e9t\u00e9 Gemalto et embarqu\u00e9 sur le microcontr\u00f4leur M7820 A11fabriqu\u00e9 par la soci\u00e9t\u00e9 Infineon Technologies.\n\nCe produit est \u00e9galement propos\u00e9 sous les noms IDPrime MD 840 (mode contact uni",
"developer": "Gemalto / Infineon Technologies AG",
"enhanced": {
"augmented": "ALC_DVS.2, AVA_VAN.5",
"category": "Cartes \u00e0 puce",
"cc_version": "Crit\u00e8res Communs version 3.1r4",
"cert_id": "2014/49",
"certification_date": "11/07/2014",
"developer": "Gemalto / Infineon Technologies AG",
"evaluation_facility": "Serma Technologies",
"level": "EAL5+",
"mutual_recognition": "SOG-IS\n CCRA",
"protection_profile": "BSI-CC-PP-0059-2009-MA-01, BSI-CC-PP-0075-2012",
"report_link": "https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2014-49fr.pdf",
"sponsor": "Gemalto",
"target_link": "https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2014-49en.pdf"
},
"level": "EAL5+",
"product": "Application IAS V4 sur la plateforme JavaCard ouverte MultiApp V3 masqu\u00e9e sur le composant M7820 A11 (Version du patch : 1.5)",
"sponsor": "Gemalto",
"url": "https://cyber.gouv.fr/produits-certifies/application-ias-v4-sur-la-plateforme-javacard-ouverte-multiapp-v3-masquee-sur-1"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"OCSI/CERT/CCL/02/2020/RC",
"OCSI/CERT/SYS/06/2017/RC"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0695-2011"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"OCSI/CERT/CCL/02/2020/RC",
"OCSI/CERT/SYS/06/2017/RC"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0695-2011"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2016-05-23",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2014_50-M01.pdf",
"maintenance_st_link": null,
"maintenance_title": "ANSSI-CC-2014/50-M01"
}
]
},
"manufacturer": "Gemalto - Infineon Technologies AG",
"manufacturer_web": "https://www.gemalto.com/",
"name": "Application IAS V4 sur la plateforme JavaCard ouverte MultiApp V3 masqu\u00e9e sur le composant M7820 A11 (Version du patch : 1.5)",
"not_valid_after": "2019-09-01",
"not_valid_before": "2014-07-11",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "ANSSI-CC_2014-50fr.pdf",
"report_frontpage": {
"FR": {
"cc_security_level": "EAL 5 augment\u00e9 ALC_DVS.2, AVA_VAN.5",
"cc_version": "Crit\u00e8res Communs version 3.1 r\u00e9vision 4",
"cert_id": "ANSSI-CC-2014/50",
"cert_item": "Application IAS V4 sur la plateforme JavaCard ouverte MultiApp V3 masqu\u00e9e sur le composant M7820 A11",
"cert_item_version": "Version de l\u2019application IAS : 4.0.2.K Version de l\u2019application MOCA Server : 1.0 Version plateforme Java Card MultiApp : 3.0 Version du patch : 1.5",
"cert_lab": "Serma Technologies 14 rue Galil\u00e9e, CS 10055, 33615 Pessac Cedex, France",
"developer": "Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France Infineon Technologies AG AIM CC SM PS \u2013 Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France",
"match_rules": [
"R\u00e9f\u00e9rence du rapport de certification(.+)Nom du produit(.+)R\u00e9f\u00e9rence/version du produit(.*)Conformit\u00e9 \u00e0 un profil de protection(.+)Crit\u00e8res d\u2019\u00e9valuation et version(.+)Niveau d\u2019\u00e9valuation(.+)D\u00e9veloppeurs(.+)Centre d\u2019\u00e9valuation(.+)Accords de reconnaissance applicables"
],
"ref_protection_profiles": "Protection profiles for secure signature creation device \u2013 Part 2: Device with key generation, R\u00e9f\u00e9rence : prEN 14169-2:2012, Version 2.0.1, maintenu sous la r\u00e9f\u00e9rence BSI-CC-PP-0059-2009-MA-01 (voir [PP-SSCD-Part2]). Protection profiles for secure signature creation device \u2013 Part 3: Device with key import, R\u00e9f\u00e9rence : prEN 14169-3:2012, Version 1.0.2, certifi\u00e9 sous la r\u00e9f\u00e9rence BSI-CC-PP-0075-2012 (voir [PP-SSCD-Part3]). Protection profiles for secure signature creation device \u2013 Part 4: Extension for device with key generation and trusted communication with certificate generation application, R\u00e9f\u00e9rence : prEN 14169-4:2012, Version 1.0.1, certifi\u00e9 sous la r\u00e9f\u00e9rence BSI-CC-PP-0071-2012 (voir [PP-SSCD-Part4]). Protection profiles for secure signature creation device \u2013 Part 5: Extension for device with key generation and trusted communication with signature creation application, R\u00e9f\u00e9rence : prEN 14169-5:2012, Version 1.0.1, certifi\u00e9 sous la r\u00e9f\u00e9rence BSI-CC-PP-0072-2012 (voir [PP-SSCD-Part5]). Protection profiles for secure signature creation device \u2013 Part 6: Extension for device with key import and trusted communication with signature creation application, R\u00e9f\u00e9rence : prEN 14169-6:2013, Version 1.0.4, certifi\u00e9 sous la r\u00e9f\u00e9rence BSI-CC-PP-0076-2013 (voir [PP-SSCD-Part6]). Rapport de certification ANSSI-CC-2014/50 Application IAS V4 sur la plateforme JavaCard ouverte MultiApp V3 masqu\u00e9e sur le composant M7820 A11 Page 4 sur 24 ANSSI-CC-CER-F-07.011"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0829-2012": 3
},
"FR": {
"ANSSI-CC-2014/06": 4,
"ANSSI-CC-2014/14": 2,
"ANSSI-CC-2014/49": 3,
"ANSSI-CC-2014/50": 25
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP- 0059-2009-MA-01": 1,
"BSI-CC-PP- 0071-2012": 1,
"BSI-CC-PP- 0072-2012": 1,
"BSI-CC-PP- 0075-2012": 1,
"BSI-CC-PP-0059-2009-MA-01": 2,
"BSI-CC-PP-0071-2012": 2,
"BSI-CC-PP-0072-2012": 2,
"BSI-CC-PP-0075-2012": 2,
"BSI-CC-PP-0076-": 1,
"BSI-CC-PP-0076-2013": 2,
"BSI-PP- 0035-2007": 1,
"BSI-PP-0035-": 1,
"BSI-PP-0035-2007": 1
},
"other": {
"PP-SSCD-": 5,
"PP-SSCD-Part2": 2,
"PP-SSCD-Part3": 2,
"PP-SSCD-Part4": 2,
"PP-SSCD-Part5": 2,
"PP-SSCD-Part6": 2
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_FSP": 1,
"ADV_IMP": 1,
"ADV_INT": 1,
"ADV_SPM": 1,
"ADV_TDS": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_PRE": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMS": 1,
"ALC_DEL": 1,
"ALC_DVS": 1,
"ALC_DVS.2": 3,
"ALC_FLR": 2,
"ALC_TAT": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_ECD": 1,
"ASE_INT": 1,
"ASE_OBJ": 1,
"ASE_REQ": 1,
"ASE_SPD": 1,
"ASE_TSS": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_DPT": 1,
"ATE_FUN": 1,
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.5": 6
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 3": 1,
"EAL 5": 3,
"EAL 7": 1,
"EAL4": 2,
"EAL5": 1,
"EAL7": 1
},
"ITSEC": {
"ITSEC E6 Elev\u00e9": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"Infineon": {
"v1.02.013": 3
}
},
"crypto_protocol": {
"PACE": {
"PACE": 1
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"CESTI": {
"CESTI": 1
},
"Serma": {
"Serma Technologies": 3
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 1
},
"SHA2": {
"SHA-2": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {
"com": {
"com.gemalto.javacardx.pace": 1
},
"javacardx": {
"javacardx.pace": 1
}
},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2012-09-001": 1,
"CCMB-2012-09-002": 1,
"CCMB-2012-09-003": 1,
"CCMB-2012-09-004": 1
}
},
"symmetric_crypto": {
"DES": {
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Gemalto": {
"Gemalto": 33
},
"Infineon": {
"Infineon": 3,
"Infineon Technologies": 5,
"Infineon Technologies AG": 1
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Duquesnoy",
"/CreationDate": "D:20140711150029+02\u002700\u0027",
"/Creator": "PScript5.dll Version 5.2.2",
"/ModDate": "D:20140711150029+02\u002700\u0027",
"/Producer": "Acrobat Distiller 9.0.0 (Windows)",
"/Title": "Microsoft Word - Rapport ANSSI-CC-2014_50fr.doc",
"pdf_file_size_bytes": 234712,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 24
},
"st_filename": "ANSSI-CC-cible_2014-50en.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 2
},
"ECDH": {
"ECDH": 1
},
"ECDSA": {
"ECDSA": 1
}
},
"FF": {
"DH": {
"DH": 2,
"Diffie-Hellman": 2
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0695-2011": 1
},
"NL": {
"CC-1": 2,
"CC-2": 3,
"CC-3": 3
}
},
"cc_claims": {
"A": {
"A.CGA": 2,
"A.CSP": 3,
"A.SCA": 2
},
"OE": {
"OE.HI_VAD": 1
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0059-2009-MA-01": 1,
"BSI-CC-PP-0071-2012": 1,
"BSI-CC-PP-0072-2012": 1,
"BSI-CC-PP-0075-2012": 1,
"BSI-CC-PP-0076-2013": 1,
"BSI-PP-0035": 1
},
"other": {
"PP-SSCD": 4,
"PP-SSCD-KG": 33,
"PP-SSCD-KI": 25
}
},
"cc_sar": {
"ALC": {
"ALC_DVS.2": 2
},
"AVA": {
"AVA_VAN.5": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 5+": 1,
"EAL5": 2,
"EAL5 augmented": 1
}
},
"cc_sfr": {
"FCS": {
"FCS_CKM": 14,
"FCS_CKM.1": 5,
"FCS_CKM.1.1": 2,
"FCS_CKM.2": 2,
"FCS_CKM.4": 8,
"FCS_CKM.4.1": 2,
"FCS_COP": 8,
"FCS_COP.1": 2,
"FCS_COP.1.1": 2
},
"FDP": {
"FDP_ACC": 4,
"FDP_ACC.1": 14,
"FDP_ACC.1.1": 4,
"FDP_ACF": 4,
"FDP_ACF.1": 6,
"FDP_ACF.1.1": 4,
"FDP_ACF.1.2": 4,
"FDP_ACF.1.3": 4,
"FDP_ACF.1.4": 4,
"FDP_DAU": 4,
"FDP_DAU.1": 1,
"FDP_DAU.2.1": 1,
"FDP_DAU.2.2": 1,
"FDP_IFC.1": 9,
"FDP_ITC": 2,
"FDP_ITC.1": 4,
"FDP_ITC.1.1": 1,
"FDP_ITC.1.2": 1,
"FDP_ITC.1.3": 1,
"FDP_ITC.2": 4,
"FDP_RIP": 1,
"FDP_RIP.1": 1,
"FDP_RIP.1.1": 1,
"FDP_SDI": 4,
"FDP_SDI.1": 2,
"FDP_SDI.2.1": 2,
"FDP_SDI.2.2": 2,
"FDP_UCT": 2,
"FDP_UCT.1": 1,
"FDP_UCT.1.1": 1,
"FDP_UIT": 3,
"FDP_UIT.1.1": 1,
"FDP_UIT.1.2": 1
},
"FIA": {
"FIA_AFL": 6,
"FIA_AFL.1.1": 2,
"FIA_AFL.1.2": 2,
"FIA_API": 5,
"FIA_API.1": 8,
"FIA_API.1.1": 2,
"FIA_UAU": 5,
"FIA_UAU.1": 4,
"FIA_UAU.1.1": 2,
"FIA_UAU.1.2": 2,
"FIA_UID": 4,
"FIA_UID.1": 6,
"FIA_UID.1.1": 2,
"FIA_UID.1.2": 2
},
"FMT": {
"FMT_MOF.1": 2,
"FMT_MOF.1.1": 1,
"FMT_MSA": 14,
"FMT_MSA.1": 3,
"FMT_MSA.1.1": 3,
"FMT_MSA.2": 2,
"FMT_MSA.2.1": 1,
"FMT_MSA.3": 5,
"FMT_MSA.3.1": 2,
"FMT_MSA.3.2": 2,
"FMT_MSA.4.1": 2,
"FMT_MTD": 4,
"FMT_MTD.1.1": 2,
"FMT_SMF.1": 8,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 11,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_EMS": 5,
"FPT_EMS.1": 7,
"FPT_EMS.1.1": 3,
"FPT_EMS.1.2": 3,
"FPT_FLS.1": 2,
"FPT_FLS.1.1": 1,
"FPT_PHP.1": 2,
"FPT_PHP.1.1": 1,
"FPT_PHP.1.2": 1,
"FPT_PHP.3": 2,
"FPT_PHP.3.1": 1,
"FPT_TST": 2,
"FPT_TST.1": 3,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FTP": {
"FTP_ITC": 13,
"FTP_ITC.1": 2,
"FTP_ITC.1.1": 4,
"FTP_ITC.1.2": 4,
"FTP_ITC.1.3": 4,
"FTP_TRP.1": 2
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {
"ICFab": {
"IC Fabricator": 1
},
"ICType": {
"IC Type": 1
}
},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 3
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Serma": {
"Serma Technologies": 1
}
},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-224": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 1,
"RNG": 2
}
},
"side_channel_analysis": {
"FI": {
"physical tampering": 4
},
"SCA": {
"DPA": 1,
"SPA": 1,
"timing attacks": 1
}
},
"standard_id": {
"CC": {
"CCMB-2009-07-004": 1,
"CCMB-2012-09-001": 1,
"CCMB-2012-09-002": 1,
"CCMB-2012-09-003": 1
},
"FIPS": {
"FIPS PUB 46-3": 1,
"FIPS180-2": 1,
"FIPS197": 2,
"FIPS46-3": 1
},
"PKCS": {
"PKCS#1": 2,
"PKCS#3": 3
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 6
}
},
"DES": {
"3DES": {
"TDES": 4
},
"DES": {
"DES": 2
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Gemalto": {
"Gemalto": 300
},
"Infineon": {
"Infineon": 3
}
},
"vulnerability": {}
},
"st_metadata": {
"/CreationDate": "D:20140131160737+01\u002700\u0027",
"/Creator": "Microsoft\u00ae Office Word 2007",
"/Keywords": "Security Target, CC, eTravel",
"/ModDate": "D:20140807095336+02\u002700\u0027",
"/Producer": "Microsoft\u00ae Office Word 2007",
"/Subject": "",
"/Title": "",
"pdf_file_size_bytes": 652503,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 45
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2014-50fr.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"AVA_VAN.5",
"EAL5+",
"ALC_DVS.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2014-50en.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "290350ada28b14cbed0874d3c0dd277d39601ab766660d1c98a1e9e04f8dd8b7",
"txt_hash": "194f914a0907c4cf7b7088db84cc32ea5f6e3421abaebefc47caf67a4e3cdeee"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "306aa0d11e0f255a25aa091e27a7533fffc44891cd5339fc4f459959afa5edc0",
"txt_hash": "89ebdc69ca42cd4eea903cbd2361135a9ec72e8aee074f36cecd710485c90e75"
}
},
"status": "archived"
}