This page was not yet optimized for use on mobile devices.
Plateforme ID Motion V2
CSV information ?
Status | archived |
---|---|
Valid from | 30.08.2018 |
Valid until | 30.08.2023 |
Scheme | 🇫🇷 FR |
Manufacturer | gemalto |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | EAL5+, AVA_VAN.5, ALC_DVS.2 |
Maintenance updates | ANSSI-CC-2018/35-M01 (18.12.2020) Certification report |
Heuristics summary ?
Certificate ID: ANSSI-CC-2018/35
Certificate ?
Certification report ?
Extracted keywords
Symmetric Algorithms
DESVendor
Infineon Technologies AG, GemaltoSecurity level
EAL 5, EAL2, EAL6, EAL7, EAL 1, EAL 3, EAL 7, ITSEC E6 ElevéSecurity Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_FLR.1, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSSProtection profiles
BSI-PP-0084-2014Certificates
BSI-DSZ-CC-0945-2017, ANSSI-CC-2018/35Standards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004File metadata
Keywords | ANSSI-CC-CER-F-07.026 |
---|---|
Creation date | D:20180905165231+02'00' |
Modification date | D:20180926135019+02'00' |
Pages | 16 |
Creator | Acrobat PDFMaker 11 pour Word |
Producer | Adobe PDF Library 11.0 |
Frontpage
Certificate ID | ANSSI-CC-2018/35 |
---|---|
Certified item | Plateforme ID Motion V2 |
Certification lab | THALES (TCS – CNES) 290 allée du Lac, 31670 Labège, France |
Developer | Gemalto La Vigie, Avenue du jujubier, ZI Athélia IV, BP 90- 13702 La Ciotat Infineon Technologies AG Am Campeon 1-12 85579 Neubiberg Commanditaire Gemalto La Vigie, Avenue du jujubier, ZI Athélia IV, BP 90- 13702 La Ciotat |
References
Outgoing- BSI-DSZ-CC-0945-2017 - archived - IFX_CCI_000003h, IFX_CCI_000005h, IFX_CCI_000008h, IFX_CCI_00000Ch, IFX_CCI_000013h, IFX_CCI_000014h, IFX_CCI_000015h, IFX_CCI_00001Ch and IFX_CCI_00001Dh design step H13 including optional software libraries and dedicated firmware
- ANSSI-CC-2018/38v2 - archived - eTravel 2.4 en configuration EAC SAC sur plateforme ID Motion V2.0
- ANSSI-CC-2018/37v2 - archived - eTravel 2.4 en configuration EAC BAC sur plateforme ID Motion V2
- ANSSI-CC-2018/36v2 - archived - eTravel 2.4 en configuration BAC sur plateforme ID Motion V2.0
- ANSSI-CC-2018/50 - archived - IDMotion V2 Multos Virtual Machine OS Multos V4.5.2, AMD version 0151v001
Security target ?
Extracted keywords
Symmetric Algorithms
AES, DES, TDESAsymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-Hellman, DHHash functions
SHA-1, SHA-224, SHA-256, SHA-512, SHA224, SHA-384Schemes
MAC, Key agreementProtocols
PACEBlock cipher modes
CBCIC data groups
EF.CardAccessVendor
Infineon, Infineon Technologies, Gemalto, ThalesSecurity level
EAL5+, EAL5, EAL5 augmentedClaims
O.TAMPER_ES, O.SIDE, O.ROLLBACK, O.RESOURCE, O.LOAD, O.SECURITY, O.EFFECT_L, O.REMOVE, O.EFFECT_R, O.SEGREGATE, O.CIPHER, O.DECIPHER, O.DEV_DIS_ES, O.INIT_ACS, O.SAMPLE_ACS, O.DLV_DATA, O.APPLI_DEV, O.DIS_MECHANIS, O.DIS, O.MOD_MEMORY, O.RESOURCES, O.DLV_, O.SAMPLES_ACS, O.DLV_RESP, O.TEST_OPE, O.USE_DIAG, O.APPLI_DE, O.TAMPER_E, O.DIS_MECH, O.MOD_MEM, T.DIS_TEST_ES, T.T_TOOLS, T.MOD, T.T_ES, T.T_CMD, T.MOD_TSF, T.MOD_LOAD, T.MOD_EXE, T.MOD_SHARE, T.LOAD_MAN, T.LOAD_APP, T.LOAD_OTHER, T.LOAD_MOD, T.APP_DISC, T.APP_CORR, T.APP_REMOVE, T.ERR_REMOVE, T.DEL_REMOVE, T.APP_READ, T.APP_MOD, T.RESOURCES, T.DIS_DATA, T.MOD_DATA, T.DIS, T.CLON, A.APPLI_CONT, OSP.CIPHER, OSP.CONF-ALUSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.3, ADV_IMP.1, ADV_SPM.1, ADV_FSP.4, AGD_OPE.1, AGD_PRE.1, ALC_DVS, ALC_DVS.2, ALC_DVS.1, AVA_VAN, AVA_VAN.5, AVA_VAN.4Security Functional Requirements (SFR)
FAU_ARP, FAU_ARP.1, FAU_SAA, FAU_ARP.1.1, FAU_SAA.1.1, FAU_SAA.1.2, FAU_GEN.1, FAU_SAA.1, FCS_CKM, FCS_CKM.1, FCS_CKM.3, FCS_CKM.4, FCS_COP, FCS_COP.1, FCS_CKM.1.1, FCS_CKM.3.1, FCS_CKM.4.1, FDP_ACC, FDP_ACC.2, FDP_ACF, FDP_ACF.1, FDP_DAU, FDP_DAU.1, FDP_ITC, FDP_ITC.1, FDP_RIP, FDP_RIP.1, FDP_ROL, FDP_ROL.1, FDP_SDI, FDP_SDI.2, FDP_ACC.2.1, FDP_ACC.2.2, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_DAU.1.1, FDP_DAU.1.2, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_RIP.1.1, FDP_ROL.1.1, FDP_ROL.1.2, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ACC.1, FIA_AFL, FIA_AFL.1, FIA_ATD, FIA_ATD.1, FIA_UAU, FIA_UAU.1, FIA_UAU.4, FIA_UID, FIA_UID.1, FIA_USB, FIA_USB.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.4.1, FIA_UID.1.1, FIA_UID.1.2, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FMT_MOF, FMT_MOF.1, FMT_MSA, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_MTD, FMT_MTD.1, FMT_MTD.2, FMT_SMR, FMT_SMR.1, FMT_MOF.1.1, FMT_MSA.1.1, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_MTD.2.1, FMT_MTD.2.2, FMT_SMR.1.1, FMT_SMR.1.2, FPR_UNO, FPR_UNO.1, FPR_UNO.1.1, FPT_FLS, FPT_FLS.1, FPT_PHP, FPT_PHP.3, FPT_RCV, FPT_RCV.4, FPT_TDC, FPT_TDC.1, FPT_TST, FPT_TST.1, FPT_FLS.1.1, FPT_PHP.3.1, FPT_RCV.4.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FRU_RSA, FRU_RSA.1, FRU_RSA.1.1Certificates
BSI-DSZ-CC-0945-2017, CC-1, CC-2, CC-3Side-channel analysis
side channel, physical tampering, Physical tamperingCertification process
out of scope, the TOE, the product also contain native applications and native modules used by ICAO application (out of scope of the TOE) Mel applications and native modules: NATIVE/MEL Application: GMF v1.0 The GMF, to the context in which the security functions take place. Note that cryptographic primitives are out of scope. Table 3 shows how these security functions satisfy the TOE security functional requirements. 8.1.1Standards
FIPS197, PKCS#1, PKCS#5, AIS31, ICAO, CCMB-2006-09-001, CCMB-2007-09-002, CCMB-2007-09-003, CCMB-2007-09-004File metadata
Keywords | Security Target, CC, MULTOS, IDMotion, Platform |
---|---|
Creation date | D:20180627105258+02'00' |
Modification date | D:20180926135044+02'00' |
Pages | 82 |
Creator | Microsoft® Word 2013 |
Producer | Microsoft® Word 2013 |
References
Outgoing- BSI-DSZ-CC-0945-2017 - archived - IFX_CCI_000003h, IFX_CCI_000005h, IFX_CCI_000008h, IFX_CCI_00000Ch, IFX_CCI_000013h, IFX_CCI_000014h, IFX_CCI_000015h, IFX_CCI_00001Ch and IFX_CCI_00001Dh design step H13 including optional software libraries and dedicated firmware
Heuristics ?
Certificate ID: ANSSI-CC-2018/35
Extracted SARs
ALC_DVS.2, ALC_FLR.1, AVA_VAN.5, AGD_OPE.1, ADV_FSP.4, ADV_SPM.1, AGD_PRE.1, ADV_IMP.1, ADV_ARC.1, ADV_TDS.3References ?
Updates ?
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '53a1d241522c39341760dbd3daee655e47178208570b3f75778d933afc5818e6', 'txt_hash': '6b885fc16f20c011e913cf36ef08035ba03558936759e24725b377da3982d5df'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'b8b2c6928ca2fda100a4c96b2b142e3fbf4bc15786e925a94af98e237d3bc6b9', 'txt_hash': 'abcc1910ee661d444d6e4dea5094a743f99b7c9e7b754fec354ae3afcf9e54d0'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 700370, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 16, '/Category': 'Référence, Version', '/Comments': 'Gemalto', '/Company': 'SGDSN/ANSSI', '/CreationDate': "D:20180905165231+02'00'", '/Creator': 'Acrobat PDFMaker 11 pour Word', '/Keywords': 'ANSSI-CC-CER-F-07.026', '/ModDate': "D:20180926135019+02'00'", '/Producer': 'Adobe PDF Library 11.0', '/SourceModified': 'D:20180905145227', '/Subject': '', '/Title': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.ssi.gouv.fr/', 'mailto:[email protected]']}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 2248731, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 82, '/CreationDate': "D:20180627105258+02'00'", '/Creator': 'Microsoft® Word 2013', '/Keywords': 'Security Target, CC, MULTOS, IDMotion, Platform', '/ModDate': "D:20180926135044+02'00'", '/Producer': 'Microsoft® Word 2013', '/Subject': '', '/Title': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{'FR': {'match_rules': ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables'], 'cert_id': 'ANSSI-CC-2018/35', 'cert_item': 'Plateforme ID Motion V2', 'cert_item_version': 'OS version Multos V4.5.2 AMD version 0151v001', 'ref_protection_profiles': 'Néant', 'cc_version': 'Critères Communs version 3.1 révision 5', 'cc_security_level': 'EAL 5 augmenté ALC_DVS.2, AVA_VAN.5', 'developer': ' Gemalto La Vigie, Avenue du jujubier, ZI Athélia IV, BP 90- 13702 La Ciotat Infineon Technologies AG Am Campeon 1-12 85579 Neubiberg Commanditaire Gemalto La Vigie, Avenue du jujubier, ZI Athélia IV, BP 90- 13702 La Ciotat', 'cert_lab': 'THALES (TCS – CNES) 290 allée du Lac, 31670 Labège, France'}}
. - The report_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0945-2017': 2}, 'FR': {'ANSSI-CC-2018/35': 17}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0084-2014': 1}}, 'cc_security_level': {'EAL': {'EAL 5': 3, 'EAL2': 2, 'EAL6': 1, 'EAL7': 1, 'EAL 1': 1, 'EAL 3': 1, 'EAL 7': 1}, 'ITSEC': {'ITSEC E6 Elevé': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_DVS.2': 2, 'ALC_FLR.1': 1, 'ALC_FLR': 2, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.5': 4, 'AVA_VAN': 2}, 'ASE': {'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Infineon': {'Infineon Technologies AG': 2}, 'Gemalto': {'Gemalto': 5}}, 'eval_facility': {}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0945-2017': 1}, 'NL': {'CC-1': 1, 'CC-2': 1, 'CC-3': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL5+': 1, 'EAL5': 14, 'EAL5 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 2, 'ADV_FSP.2': 1, 'ADV_TDS.3': 2, 'ADV_IMP.1': 2, 'ADV_SPM.1': 2, 'ADV_FSP.4': 1}, 'AGD': {'AGD_OPE.1': 2, 'AGD_PRE.1': 2}, 'ALC': {'ALC_DVS': 2, 'ALC_DVS.2': 9, 'ALC_DVS.1': 1}, 'AVA': {'AVA_VAN': 2, 'AVA_VAN.5': 9, 'AVA_VAN.4': 2}}, 'cc_sfr': {'FAU': {'FAU_ARP': 3, 'FAU_ARP.1': 10, 'FAU_SAA': 3, 'FAU_ARP.1.1': 2, 'FAU_SAA.1.1': 2, 'FAU_SAA.1.2': 2, 'FAU_GEN.1': 4, 'FAU_SAA.1': 11}, 'FCS': {'FCS_CKM': 5, 'FCS_CKM.1': 19, 'FCS_CKM.3': 13, 'FCS_CKM.4': 16, 'FCS_COP': 5, 'FCS_COP.1': 25, 'FCS_CKM.1.1': 1, 'FCS_CKM.3.1': 1, 'FCS_CKM.4.1': 1}, 'FDP': {'FDP_ACC': 3, 'FDP_ACC.2': 12, 'FDP_ACF': 3, 'FDP_ACF.1': 14, 'FDP_DAU': 3, 'FDP_DAU.1': 8, 'FDP_ITC': 3, 'FDP_ITC.1': 13, 'FDP_RIP': 3, 'FDP_RIP.1': 7, 'FDP_ROL': 3, 'FDP_ROL.1': 3, 'FDP_SDI': 3, 'FDP_SDI.2': 5, 'FDP_ACC.2.1': 2, 'FDP_ACC.2.2': 1, 'FDP_ACF.1.1': 2, 'FDP_ACF.1.2': 2, 'FDP_ACF.1.3': 2, 'FDP_ACF.1.4': 2, 'FDP_DAU.1.1': 1, 'FDP_DAU.1.2': 1, 'FDP_ITC.1.1': 1, 'FDP_ITC.1.2': 1, 'FDP_ITC.1.3': 1, 'FDP_RIP.1.1': 1, 'FDP_ROL.1.1': 1, 'FDP_ROL.1.2': 1, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_ACC.1': 4}, 'FIA': {'FIA_AFL': 3, 'FIA_AFL.1': 7, 'FIA_ATD': 3, 'FIA_ATD.1': 7, 'FIA_UAU': 4, 'FIA_UAU.1': 11, 'FIA_UAU.4': 8, 'FIA_UID': 3, 'FIA_UID.1': 11, 'FIA_USB': 3, 'FIA_USB.1': 7, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_ATD.1.1': 2, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.4.1': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1}, 'FMT': {'FMT_MOF': 3, 'FMT_MOF.1': 9, 'FMT_MSA': 5, 'FMT_MSA.1': 14, 'FMT_MSA.2': 13, 'FMT_MSA.3': 12, 'FMT_MTD': 4, 'FMT_MTD.1': 8, 'FMT_MTD.2': 4, 'FMT_SMR': 3, 'FMT_SMR.1': 14, 'FMT_MOF.1.1': 2, 'FMT_MSA.1.1': 1, 'FMT_MSA.2.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD.1.1': 1, 'FMT_MTD.2.1': 1, 'FMT_MTD.2.2': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPR': {'FPR_UNO': 4, 'FPR_UNO.1': 6, 'FPR_UNO.1.1': 1}, 'FPT': {'FPT_FLS': 3, 'FPT_FLS.1': 9, 'FPT_PHP': 3, 'FPT_PHP.3': 9, 'FPT_RCV': 2, 'FPT_RCV.4': 5, 'FPT_TDC': 3, 'FPT_TDC.1': 7, 'FPT_TST': 4, 'FPT_TST.1': 5, 'FPT_FLS.1.1': 1, 'FPT_PHP.3.1': 1, 'FPT_RCV.4.1': 1, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1}, 'FRU': {'FRU_RSA': 3, 'FRU_RSA.1': 4, 'FRU_RSA.1.1': 1}}, 'cc_claims': {'O': {'O.TAMPER_ES': 11, 'O.SIDE': 5, 'O.ROLLBACK': 3, 'O.RESOURCE': 2, 'O.LOAD': 4, 'O.SECURITY': 4, 'O.EFFECT_L': 4, 'O.REMOVE': 4, 'O.EFFECT_R': 3, 'O.SEGREGATE': 4, 'O.CIPHER': 3, 'O.DECIPHER': 3, 'O.DEV_DIS_ES': 7, 'O.INIT_ACS': 5, 'O.SAMPLE_ACS': 3, 'O.DLV_DATA': 4, 'O.APPLI_DEV': 9, 'O.DIS_MECHANIS': 1, 'O.DIS': 2, 'O.MOD_MEMORY': 1, 'O.RESOURCES': 1, 'O.DLV_': 6, 'O.SAMPLES_ACS': 1, 'O.DLV_RESP': 1, 'O.TEST_OPE': 1, 'O.USE_DIAG': 1, 'O.APPLI_DE': 1, 'O.TAMPER_E': 1, 'O.DIS_MECH': 1, 'O.MOD_MEM': 1}, 'T': {'T.DIS_TEST_ES': 5, 'T.T_TOOLS': 5, 'T.MOD': 5, 'T.T_ES': 5, 'T.T_CMD': 5, 'T.MOD_TSF': 5, 'T.MOD_LOAD': 5, 'T.MOD_EXE': 5, 'T.MOD_SHARE': 5, 'T.LOAD_MAN': 5, 'T.LOAD_APP': 6, 'T.LOAD_OTHER': 5, 'T.LOAD_MOD': 7, 'T.APP_DISC': 9, 'T.APP_CORR': 5, 'T.APP_REMOVE': 5, 'T.ERR_REMOVE': 5, 'T.DEL_REMOVE': 5, 'T.APP_READ': 5, 'T.APP_MOD': 5, 'T.RESOURCES': 5, 'T.DIS_DATA': 7, 'T.MOD_DATA': 4, 'T.DIS': 1, 'T.CLON': 2}, 'A': {'A.APPLI_CONT': 9}, 'OSP': {'OSP.CIPHER': 3, 'OSP.CONF-ALU': 3}}, 'vendor': {'Infineon': {'Infineon': 6, 'Infineon Technologies': 3}, 'Gemalto': {'Gemalto': 35}, 'Thales': {'Thales': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 11}}, 'DES': {'DES': {'DES': 26}, '3DES': {'TDES': 7}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 2}, 'ECDSA': {'ECDSA': 3}, 'ECC': {'ECC': 5}}, 'FF': {'DH': {'Diffie-Hellman': 2, 'DH': 4}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 3}, 'SHA2': {'SHA-224': 2, 'SHA-256': 3, 'SHA-512': 3, 'SHA224': 1, 'SHA-384': 2}}}, 'crypto_scheme': {'MAC': {'MAC': 7}, 'KA': {'Key agreement': 2}}, 'crypto_protocol': {'PACE': {'PACE': 9}}, 'randomness': {}, 'cipher_mode': {'CBC': {'CBC': 2}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'side channel': 2}, 'FI': {'physical tampering': 1, 'Physical tampering': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {'EF': {'EF.CardAccess': 2}}, 'standard_id': {'FIPS': {'FIPS197': 1}, 'PKCS': {'PKCS#1': 7, 'PKCS#5': 3}, 'BSI': {'AIS31': 1}, 'ICAO': {'ICAO': 2}, 'CC': {'CCMB-2006-09-001': 1, 'CCMB-2007-09-002': 1, 'CCMB-2007-09-003': 1, 'CCMB-2007-09-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 2, 'the TOE, the product also contain native applications and native modules used by ICAO application (out of scope of the TOE) Mel applications and native modules: NATIVE/MEL Application: GMF v1.0 The GMF': 1, 'to the context in which the security functions take place. Note that cryptographic primitives are out of scope. Table 3 shows how these security functions satisfy the TOE security functional requirements. 8.1.1': 1}}}
. - The report_filename property was set to
anssi-cc-2018_35.pdf
. - The st_filename property was set to
anssi-cible-cc-2018_35en.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['THALES']
. - The cert_id property was set to
ANSSI-CC-2018/35
. - The st_references property was updated, with the
{'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0945-2017']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0945-2017']}}
data. - The report_references property was updated, with the
{'directly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2018/37v2', 'ANSSI-CC-2018/38v2', 'ANSSI-CC-2018/36v2', 'ANSSI-CC-2018/50']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2018/37v2', 'ANSSI-CC-2018/38v2', 'ANSSI-CC-2018/36v2', 'ANSSI-CC-2018/50']}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0945-2017']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-2012', 'BSI-DSZ-CC-0945-2017', 'BSI-DSZ-CC-0891-2015']}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018_35.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2018_35en.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
. - The st_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data. - The report_references property was updated, with the
{'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}]}
values discarded.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The report_references property was updated, with the
{'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2018/38v2']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2018/38v2']}}, 'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-2012']}}}
data.
- The report_references property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Plateforme ID Motion V2 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "957e5033a2f0d265",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2018/35",
"cert_lab": [
"THALES"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2018/37v2",
"ANSSI-CC-2018/36v2",
"ANSSI-CC-2018/38v2",
"ANSSI-CC-2018/50"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0945-2017"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2018/37v2",
"ANSSI-CC-2018/36v2",
"ANSSI-CC-2018/50",
"ANSSI-CC-2018/38v2"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0782-2012",
"BSI-DSZ-CC-0945-2017",
"BSI-DSZ-CC-0891-2015"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0945-2017"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0945-2017"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2020-12-18",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018_35-m01_bolero-a.pdf",
"maintenance_st_link": null,
"maintenance_title": "ANSSI-CC-2018/35-M01"
}
]
},
"manufacturer": "gemalto",
"manufacturer_web": null,
"name": "Plateforme ID Motion V2",
"not_valid_after": "2023-08-30",
"not_valid_before": "2018-08-30",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "anssi-cc-2018_35.pdf",
"report_frontpage": {
"FR": {
"cc_security_level": "EAL 5 augment\u00e9 ALC_DVS.2, AVA_VAN.5",
"cc_version": "Crit\u00e8res Communs version 3.1 r\u00e9vision 5",
"cert_id": "ANSSI-CC-2018/35",
"cert_item": "Plateforme ID Motion V2",
"cert_item_version": "OS version Multos V4.5.2 AMD version 0151v001",
"cert_lab": "THALES (TCS \u2013 CNES) 290 all\u00e9e du Lac, 31670 Lab\u00e8ge, France",
"developer": " Gemalto La Vigie, Avenue du jujubier, ZI Ath\u00e9lia IV, BP 90- 13702 La Ciotat Infineon Technologies AG Am Campeon 1-12 85579 Neubiberg Commanditaire Gemalto La Vigie, Avenue du jujubier, ZI Ath\u00e9lia IV, BP 90- 13702 La Ciotat",
"match_rules": [
"R\u00e9f\u00e9rence du rapport de certification(.+)Nom du produit(.+)R\u00e9f\u00e9rence/version du produit(.*)Conformit\u00e9 \u00e0 un profil de protection(.+)Crit\u00e8res d\u2019\u00e9valuation et version(.+)Niveau d\u2019\u00e9valuation(.+)D\u00e9veloppeurs(.+)Centre d\u2019\u00e9valuation(.+)Accords de reconnaissance applicables"
],
"ref_protection_profiles": "N\u00e9ant"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0945-2017": 2
},
"FR": {
"ANSSI-CC-2018/35": 17
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0084-2014": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_FSP": 1,
"ADV_IMP": 1,
"ADV_INT": 1,
"ADV_SPM": 1,
"ADV_TDS": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_PRE": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMS": 1,
"ALC_DEL": 1,
"ALC_DVS": 1,
"ALC_DVS.2": 2,
"ALC_FLR": 2,
"ALC_FLR.1": 1,
"ALC_TAT": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_ECD": 1,
"ASE_INT": 1,
"ASE_OBJ": 1,
"ASE_REQ": 1,
"ASE_SPD": 1,
"ASE_TSS": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_DPT": 1,
"ATE_FUN": 1,
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.5": 4
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 3": 1,
"EAL 5": 3,
"EAL 7": 1,
"EAL2": 2,
"EAL6": 1,
"EAL7": 1
},
"ITSEC": {
"ITSEC E6 Elev\u00e9": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1,
"CCMB-2017-04-004": 1
}
},
"symmetric_crypto": {
"DES": {
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Gemalto": {
"Gemalto": 5
},
"Infineon": {
"Infineon Technologies AG": 2
}
},
"vulnerability": {}
},
"report_metadata": {
"/Category": "R\u00e9f\u00e9rence, Version",
"/Comments": "Gemalto",
"/Company": "SGDSN/ANSSI",
"/CreationDate": "D:20180905165231+02\u002700\u0027",
"/Creator": "Acrobat PDFMaker 11 pour Word",
"/Keywords": "ANSSI-CC-CER-F-07.026",
"/ModDate": "D:20180926135019+02\u002700\u0027",
"/Producer": "Adobe PDF Library 11.0",
"/SourceModified": "D:20180905145227",
"/Subject": "",
"/Title": "",
"pdf_file_size_bytes": 700370,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.ssi.gouv.fr/",
"mailto:[email protected]"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 16
},
"st_filename": "anssi-cible-cc-2018_35en.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 5
},
"ECDH": {
"ECDH": 2
},
"ECDSA": {
"ECDSA": 3
}
},
"FF": {
"DH": {
"DH": 4,
"Diffie-Hellman": 2
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0945-2017": 1
},
"NL": {
"CC-1": 1,
"CC-2": 1,
"CC-3": 1
}
},
"cc_claims": {
"A": {
"A.APPLI_CONT": 9
},
"O": {
"O.APPLI_DE": 1,
"O.APPLI_DEV": 9,
"O.CIPHER": 3,
"O.DECIPHER": 3,
"O.DEV_DIS_ES": 7,
"O.DIS": 2,
"O.DIS_MECH": 1,
"O.DIS_MECHANIS": 1,
"O.DLV_": 6,
"O.DLV_DATA": 4,
"O.DLV_RESP": 1,
"O.EFFECT_L": 4,
"O.EFFECT_R": 3,
"O.INIT_ACS": 5,
"O.LOAD": 4,
"O.MOD_MEM": 1,
"O.MOD_MEMORY": 1,
"O.REMOVE": 4,
"O.RESOURCE": 2,
"O.RESOURCES": 1,
"O.ROLLBACK": 3,
"O.SAMPLES_ACS": 1,
"O.SAMPLE_ACS": 3,
"O.SECURITY": 4,
"O.SEGREGATE": 4,
"O.SIDE": 5,
"O.TAMPER_E": 1,
"O.TAMPER_ES": 11,
"O.TEST_OPE": 1,
"O.USE_DIAG": 1
},
"OSP": {
"OSP.CIPHER": 3,
"OSP.CONF-ALU": 3
},
"T": {
"T.APP_CORR": 5,
"T.APP_DISC": 9,
"T.APP_MOD": 5,
"T.APP_READ": 5,
"T.APP_REMOVE": 5,
"T.CLON": 2,
"T.DEL_REMOVE": 5,
"T.DIS": 1,
"T.DIS_DATA": 7,
"T.DIS_TEST_ES": 5,
"T.ERR_REMOVE": 5,
"T.LOAD_APP": 6,
"T.LOAD_MAN": 5,
"T.LOAD_MOD": 7,
"T.LOAD_OTHER": 5,
"T.MOD": 5,
"T.MOD_DATA": 4,
"T.MOD_EXE": 5,
"T.MOD_LOAD": 5,
"T.MOD_SHARE": 5,
"T.MOD_TSF": 5,
"T.RESOURCES": 5,
"T.T_CMD": 5,
"T.T_ES": 5,
"T.T_TOOLS": 5
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 2,
"ADV_FSP.2": 1,
"ADV_FSP.4": 1,
"ADV_IMP.1": 2,
"ADV_SPM.1": 2,
"ADV_TDS.3": 2
},
"AGD": {
"AGD_OPE.1": 2,
"AGD_PRE.1": 2
},
"ALC": {
"ALC_DVS": 2,
"ALC_DVS.1": 1,
"ALC_DVS.2": 9
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.4": 2,
"AVA_VAN.5": 9
}
},
"cc_security_level": {
"EAL": {
"EAL5": 14,
"EAL5 augmented": 2,
"EAL5+": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP": 3,
"FAU_ARP.1": 10,
"FAU_ARP.1.1": 2,
"FAU_GEN.1": 4,
"FAU_SAA": 3,
"FAU_SAA.1": 11,
"FAU_SAA.1.1": 2,
"FAU_SAA.1.2": 2
},
"FCS": {
"FCS_CKM": 5,
"FCS_CKM.1": 19,
"FCS_CKM.1.1": 1,
"FCS_CKM.3": 13,
"FCS_CKM.3.1": 1,
"FCS_CKM.4": 16,
"FCS_CKM.4.1": 1,
"FCS_COP": 5,
"FCS_COP.1": 25
},
"FDP": {
"FDP_ACC": 3,
"FDP_ACC.1": 4,
"FDP_ACC.2": 12,
"FDP_ACC.2.1": 2,
"FDP_ACC.2.2": 1,
"FDP_ACF": 3,
"FDP_ACF.1": 14,
"FDP_ACF.1.1": 2,
"FDP_ACF.1.2": 2,
"FDP_ACF.1.3": 2,
"FDP_ACF.1.4": 2,
"FDP_DAU": 3,
"FDP_DAU.1": 8,
"FDP_DAU.1.1": 1,
"FDP_DAU.1.2": 1,
"FDP_ITC": 3,
"FDP_ITC.1": 13,
"FDP_ITC.1.1": 1,
"FDP_ITC.1.2": 1,
"FDP_ITC.1.3": 1,
"FDP_RIP": 3,
"FDP_RIP.1": 7,
"FDP_RIP.1.1": 1,
"FDP_ROL": 3,
"FDP_ROL.1": 3,
"FDP_ROL.1.1": 1,
"FDP_ROL.1.2": 1,
"FDP_SDI": 3,
"FDP_SDI.2": 5,
"FDP_SDI.2.1": 1,
"FDP_SDI.2.2": 1
},
"FIA": {
"FIA_AFL": 3,
"FIA_AFL.1": 7,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD": 3,
"FIA_ATD.1": 7,
"FIA_ATD.1.1": 2,
"FIA_UAU": 4,
"FIA_UAU.1": 11,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UAU.4": 8,
"FIA_UAU.4.1": 1,
"FIA_UID": 3,
"FIA_UID.1": 11,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1,
"FIA_USB": 3,
"FIA_USB.1": 7,
"FIA_USB.1.1": 1,
"FIA_USB.1.2": 1,
"FIA_USB.1.3": 1
},
"FMT": {
"FMT_MOF": 3,
"FMT_MOF.1": 9,
"FMT_MOF.1.1": 2,
"FMT_MSA": 5,
"FMT_MSA.1": 14,
"FMT_MSA.1.1": 1,
"FMT_MSA.2": 13,
"FMT_MSA.2.1": 1,
"FMT_MSA.3": 12,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD": 4,
"FMT_MTD.1": 8,
"FMT_MTD.1.1": 1,
"FMT_MTD.2": 4,
"FMT_MTD.2.1": 1,
"FMT_MTD.2.2": 1,
"FMT_SMR": 3,
"FMT_SMR.1": 14,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPR": {
"FPR_UNO": 4,
"FPR_UNO.1": 6,
"FPR_UNO.1.1": 1
},
"FPT": {
"FPT_FLS": 3,
"FPT_FLS.1": 9,
"FPT_FLS.1.1": 1,
"FPT_PHP": 3,
"FPT_PHP.3": 9,
"FPT_PHP.3.1": 1,
"FPT_RCV": 2,
"FPT_RCV.4": 5,
"FPT_RCV.4.1": 1,
"FPT_TDC": 3,
"FPT_TDC.1": 7,
"FPT_TDC.1.1": 1,
"FPT_TDC.1.2": 1,
"FPT_TST": 4,
"FPT_TST.1": 5,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FRU": {
"FRU_RSA": 3,
"FRU_RSA.1": 4,
"FRU_RSA.1.1": 1
}
},
"certification_process": {
"OutOfScope": {
"out of scope": 2,
"the TOE, the product also contain native applications and native modules used by ICAO application (out of scope of the TOE) Mel applications and native modules: NATIVE/MEL Application: GMF v1.0 The GMF": 1,
"to the context in which the security functions take place. Note that cryptographic primitives are out of scope. Table 3 shows how these security functions satisfy the TOE security functional requirements. 8.1.1": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 2
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PACE": {
"PACE": 9
}
},
"crypto_scheme": {
"KA": {
"Key agreement": 2
},
"MAC": {
"MAC": 7
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 3
},
"SHA2": {
"SHA-224": 2,
"SHA-256": 3,
"SHA-384": 2,
"SHA-512": 3,
"SHA224": 1
}
}
},
"ic_data_group": {
"EF": {
"EF.CardAccess": 2
}
},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"Physical tampering": 1,
"physical tampering": 1
},
"SCA": {
"side channel": 2
}
},
"standard_id": {
"BSI": {
"AIS31": 1
},
"CC": {
"CCMB-2006-09-001": 1,
"CCMB-2007-09-002": 1,
"CCMB-2007-09-003": 1,
"CCMB-2007-09-004": 1
},
"FIPS": {
"FIPS197": 1
},
"ICAO": {
"ICAO": 2
},
"PKCS": {
"PKCS#1": 7,
"PKCS#5": 3
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 11
}
},
"DES": {
"3DES": {
"TDES": 7
},
"DES": {
"DES": 26
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Gemalto": {
"Gemalto": 35
},
"Infineon": {
"Infineon": 6,
"Infineon Technologies": 3
},
"Thales": {
"Thales": 1
}
},
"vulnerability": {}
},
"st_metadata": {
"/CreationDate": "D:20180627105258+02\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2013",
"/Keywords": "Security Target, CC, MULTOS, IDMotion, Platform",
"/ModDate": "D:20180926135044+02\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2013",
"/Subject": "",
"/Title": "",
"pdf_file_size_bytes": 2248731,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 82
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018_35.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"EAL5+",
"AVA_VAN.5",
"ALC_DVS.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2018_35en.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "53a1d241522c39341760dbd3daee655e47178208570b3f75778d933afc5818e6",
"txt_hash": "6b885fc16f20c011e913cf36ef08035ba03558936759e24725b377da3982d5df"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "b8b2c6928ca2fda100a4c96b2b142e3fbf4bc15786e925a94af98e237d3bc6b9",
"txt_hash": "abcc1910ee661d444d6e4dea5094a743f99b7c9e7b754fec354ae3afcf9e54d0"
}
},
"status": "archived"
}