Plateforme ID-One Cosmo v8.1-N- Large masquée sur le composant NXP P6022M VB

CSV information ?

Status active
Valid from 05.09.2017
Valid until 24.04.2025
Scheme 🇫🇷 FR
Manufacturer Oberthur Technologies
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level AVA_VAN.5, ALC_DVS.2, EAL5+
Maintenance updates ANSSI-CC-2017/49-M03 (21.01.2020) Certification report
Reassessment report: ANSSI-CC-2017/49-S02 (24.04.2020) Certification report
Plateforme ID -One Cosmo v8.1-N - Large, masquée sur le composant NXP P6022M VB Identification du matériel 084022 (20.11.2017) Certification report
Plateforme ID -One Cosmo v8.1-N - Large, masquée sur le composant NXP P6022M VB Identification du matériel 084022 (24.01.2019) Certification report Security target
Plateforme ID-One Cosmo v8.1-N - Large, masquée sur le composant NXP P6022M VB Identification du matériel 084022 (20.11.2017) Certification report
ANSSI-CC-2017/49-M01 (20.11.2017) Certification report Security target

Heuristics summary ?

Certificate ID: ANSSI-CC-2017/49

Certificate ?

Certification report ?

Extracted keywords

Symmetric Algorithms
DES
Asymmetric Algorithms
ECC

Vendor
NXP, NXP Semiconductors, Oberthur Technologies, OBERTHUR

Security level
EAL 5, EAL2, EAL5, EAL7, EAL 1, EAL 3, EAL 7, ITSEC E6 Elevé
Security Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSS
Protection profiles
BSI-PP-0084-2014, ANSSI-CC-PP-2010/03-
Certificates
BSI-DSZ-CC-0973-V2-2016, ANSSI-CC-2017/49
Evaluation facilities
CESTI, CEA - LETI

Standards
CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004

File metadata

Title ANSSI-CC-2017/49
Subject ID-One Cosmo v8.1-N - Large, masquée sur le composant NXP P6022M VB
Keywords ANSSI-CC-CER-F-07.025
Author Christian Benardeau
Creation date D:20170908111651+02'00'
Modification date D:20170908111651+02'00'
Pages 17
Creator Microsoft® Word 2010
Producer Microsoft® Word 2010

Frontpage

Certificate ID ANSSI-CC-2017/49
Certified item Plateforme ID-One Cosmo v8.1-N - Large, masquée sur le composant NXP P6022M VB
Certification lab CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France
Developer Oberthur Technologies 420 rue d’Estienne d’Orves, 92700 Colombes, France NXP Semiconductors GmbH Stresemannallee 101, 22539 Hamburg, Allemagne Commanditaire Oberthur Technologies 420 rue d’Estienne d’Orves, 92700 Colombes, France

References

Incoming
  • ANSSI-CC-2018/17 - active - IAS ECC V2 en configuration #3 en composition sur la plateforme ouverte ID-One Cosmo v8.1-N – Large R2 masquée sur le composant NXP P6022M VB
  • ANSSI-CC-2018/15 - active - IAS ECC V2 en configuration #1 en composition sur la plateforme ouverte ID-One Cosmo v8.1-N – Large R2 masquée sur le composant NXP P6022M VB
  • ANSSI-CC-2018/16 - active - IAS ECC V2 en configuration #2 en composition sur la plateforme ouverte ID-One Cosmo v8.1-N – Large R2 masquée sur le composant NXP P6022M VB
  • ANSSI-CC-2019/28 - active - Plateforme ID-One Cosmo v8.2 masquée sur le composant NXP P60D145 Identification du matériel 091121
  • ANSSI-CC-2018/18 - active - IAS ECC V2 en configuration #4 en composition sur la plateforme ouverte ID-One Cosmo v8.1-N – Large R2 masquée sur le composant NXP P6022M VB

Security target ?

Heuristics ?

Certificate ID: ANSSI-CC-2017/49

Extracted SARs

ALC_DVS.2, ASE_TSS.2, AVA_VAN.5

Scheme data ?

Product Plateforme ID-One Cosmo v8.1-N - Large, masquée sur le composant NXP P6022M VB
Url https://cyber.gouv.fr/produits-certifies/plateforme-id-one-cosmo-v81-n-large-masquee-sur-le-composant-nxp-p6022m-vb
Description Le produit certfié est la plateforme ouverte Java Card : « plateforme ID-One Cosmo v8.1-N - Large, masquée sur le composant NXP P6022M VB » dont l’identification du matériel est 084021. La version de la plateforme évaluée inclut les patchs identifiés au chapitre 1.2.4 du présent rapport. Elle est développée par OBERTHUR TECHNOLOGIES et embarquée sur le microcontrôleur NXP P6022M VB, développé et f
Sponsor Oberthur Technologies
Developer Oberthur Technologies, NXP Semiconductors GmbH
Cert Id 2017/49
Level EAL5+
Expiration Date 24 Avril 2025
Enhanced
Cert Id 2017/49
Certification Date 05/09/2017
Expiration Date 24/04/2025
Category Cartes à puce
Cc Version Critères Communs version 3.1r4
Developer Oberthur Technologies, NXP Semiconductors GmbH
Sponsor Oberthur Technologies
Evaluation Facility CEA - LETI
Level EAL5+
Protection Profile PP JCS-O
Mutual Recognition SOG-IS CCRA
Augmented ALC_DVS.2, AVA_VAN.5
Target Link https://cyber.gouv.fr/sites/default/files/2017/09/anssi-cible-cc-2017_49-m03en.pdf
Report Link https://cyber.gouv.fr/sites/default/files/2017/09/anssi-cc-2017_49fr.pdf
Cert Link https://cyber.gouv.fr/sites/default/files/2017/09/certificat-anssi-cc-2017_49-s02.pdf

References ?

Updates ?

  • 08.07.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The cert property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The cert_metadata property was set to None.
    • The st_keywords property was set to None.
    • The cert_keywords property was set to None.
    • The st_filename property was set to None.
    • The cert_filename property was set to None.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None} data.
    • The report_references property was updated, with the {'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/71', 'ANSSI-CC-2018/05', 'ANSSI-CC-2017/72', 'ANSSI-CC-2018/04', 'ANSSI-CC-2018/03', 'ANSSI-CC-2018/06', 'ANSSI-CC-2017/70', 'ANSSI-CC-2017/69']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/71', 'ANSSI-CC-2018/05', 'ANSSI-CC-2017/72', 'ANSSI-CC-2018/04', 'ANSSI-CC-2018/03', 'ANSSI-CC-2018/06', 'ANSSI-CC-2017/70', 'ANSSI-CC-2017/69']}}, 'directly_referencing': None, 'indirectly_referencing': None} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}]} values discarded.
  • 12.06.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The cert property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '1b0535e6124b8bd374c190f018820b31b2cdefb4c9bb40b987d83cababb538d6', 'txt_hash': 'df0f39dca29d89cd639270b1d99b58d7dbeb98d84414ca6f1514d0d7abb20e3a'} data.

    The PDF extraction data was updated.

    • The cert_metadata property was set to {'pdf_file_size_bytes': 264781, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 2, '/Author': '', '/CreationDate': "D:20201223101616+01'00'", '/Creator': 'PScript5.dll Version 5.2.2', '/ModDate': "D:20201223101616+01'00'", '/Producer': 'Acrobat Distiller 11.0 (Windows)', '/Title': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The cert_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2017/49-S02': 2}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL5': 1}}, 'cc_sar': {'ALC': {'ALC_DVS.2': 1}, 'AVA': {'AVA_VAN.5': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'NXP': {'NXP': 1, 'NXP Semiconductors': 1}, 'Oberthur': {'OBERTHUR': 2}}, 'eval_facility': {'CEA-LETI': {'CEA - LETI': 2}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The cert_filename property was set to certificat ANSSI-CC-2017_49-S02.pdf.
  • 11.06.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'e7b7e38b2f83d93902feb5120ed29aafe5c3a401495485aa5be0426a9e41445f', 'txt_hash': 'f21d59943a64c72866d0b4491029120b12c0b921e58002156de396dffc9ef7e9'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '5091a06e7662832af51a423f5941d1f1600a8c3d4c4f7cbabe897d34ad399cda', 'txt_hash': '24413aba53a23aeac8194bbd3dc9f08ff18e82b1c594b13e9f252a4c5df88785'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 1020447, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 17, '/Title': 'ANSSI-CC-2017/49', '/Author': 'Christian Benardeau', '/Subject': 'ID-One Cosmo v8.1-N - Large, masquée sur le composant NXP\xa0P6022M\xa0VB', '/Keywords': 'ANSSI-CC-CER-F-07.025', '/Creator': 'Microsoft® Word 2010', '/CreationDate': "D:20170908111651+02'00'", '/ModDate': "D:20170908111651+02'00'", '/Producer': 'Microsoft® Word 2010', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.ssi.gouv.fr/', 'mailto:certification@ssi.gouv.fr']}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 3563890, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 228, '/CreationDate': "D:20170816182749+02'00'", '/Creator': 'Microsoft® Office Word 2007', '/ModDate': "D:20170911162201+02'00'", '/Producer': 'Microsoft® Office Word 2007', '/Subject': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {'FR': {'match_rules': ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables'], 'cert_id': 'ANSSI-CC-2017/49', 'cert_item': 'Plateforme ID-One Cosmo v8.1-N - Large, masquée sur le composant NXP P6022M VB', 'cert_item_version': 'Identification du matériel 084021 Identification du patch générique 089041 Identification du patch additionnel 086684', 'ref_protection_profiles': 'PP JCS-O] Java Card Protection Profile Open Configuration, version 3.0', 'cc_version': 'Critères Communs version 3.1 révision 4', 'cc_security_level': 'EAL 5 augmenté ALC_DVS.2, AVA_VAN.5', 'developer': 'Oberthur Technologies 420 rue d’Estienne d’Orves, 92700 Colombes, France NXP Semiconductors GmbH Stresemannallee 101, 22539 Hamburg, Allemagne Commanditaire Oberthur Technologies 420 rue d’Estienne d’Orves, 92700 Colombes, France', 'cert_lab': 'CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France'}}.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0973-V2-2016': 3}, 'FR': {'ANSSI-CC-2017/49': 18}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0084-2014': 1}, 'ANSSI': {'ANSSI-CC-PP-2010/03-': 1}}, 'cc_security_level': {'EAL': {'EAL 5': 3, 'EAL2': 2, 'EAL5': 1, 'EAL7': 1, 'EAL 1': 1, 'EAL 3': 1, 'EAL 7': 1}, 'ITSEC': {'ITSEC E6 Elevé': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE': 4, 'AGD_PRE': 3}, 'ALC': {'ALC_DVS.2': 3, 'ALC_FLR': 2, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.5': 5, 'AVA_VAN': 2}, 'ASE': {'ASE_TSS.2': 1, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'NXP': {'NXP': 30, 'NXP Semiconductors': 2}, 'Oberthur': {'Oberthur Technologies': 2, 'OBERTHUR': 7}}, 'eval_facility': {'CESTI': {'CESTI': 1}, 'CEA-LETI': {'CEA - LETI': 1}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 3}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2012-09-001': 1, 'CCMB-2012-09-002': 1, 'CCMB-2012-09-003': 1, 'CCMB-2012-09-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0955-V2-2016': 2, 'BSI-DSZ-CC-0973-V2-': 1, 'BSI-DSZ-CC-0955-V2-': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 1}, 'ANSSI': {'ANSSI-CC-PP-2010/03_M01': 1}}, 'cc_security_level': {'EAL': {'EAL5+': 4, 'EAL5': 11, 'EAL 5+': 3, 'EAL5 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 6, 'ADV_FSP.1': 4, 'ADV_TDS.1': 2, 'ADV_FSP.5': 8, 'ADV_TDS.4': 8, 'ADV_IMP.1': 9, 'ADV_TDS.3': 4, 'ADV_FSP.2': 2, 'ADV_FSP.4': 1, 'ADV_IMP': 1, 'ADV_ARC': 1, 'ADV_COMP': 1}, 'AGD': {'AGD_PRE': 12, 'AGD_OPE': 2, 'AGD_OPE.1': 10, 'AGD_PRE.1': 6}, 'ALC': {'ALC_DVS.2': 20, 'ALC_DVS': 1, 'ALC_TAT.1': 2, 'ALC_TAT.2': 3, 'ALC_CMC.4': 1, 'ALC_CMS.1': 1, 'ALC_DVS.1': 2, 'ALC_LCD.1': 3, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.2': 3, 'ATE_FUN.1': 6, 'ATE_COV.1': 2, 'ATE_DPT.1': 1, 'ATE_DPT.3': 1}, 'AVA': {'AVA_VAN.5': 21, 'AVA_VAN': 9}, 'ASE': {'ASE_TSS.2': 6, 'ASE_CCL.1': 1, 'ASE_ECD.1': 4, 'ASE_INT.1': 5, 'ASE_REQ.1': 2, 'ASE_REQ.2': 2, 'ASE_OBJ.2': 3, 'ASE_SPD.1': 2, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_STG.2': 10, 'FAU_ARP.1': 24, 'FAU_ARP.1.1': 1, 'FAU_STG.2.1': 1, 'FAU_STG.2.2': 1, 'FAU_STG.2.3': 1, 'FAU_SAA.1': 3, 'FAU_GEN.1': 2, 'FAU_SAS.1': 1}, 'FCO': {'FCO_NRO': 19, 'FCO_NRO.2': 8}, 'FCS': {'FCS_RNG': 14, 'FCS_RNG.1': 7, 'FCS_COP': 29, 'FCS_CKM': 23, 'FCS_RNG.1.1': 1, 'FCS_RNG.1.2': 1, 'FCS_CKM.1': 24, 'FCS_CKM.1.1': 1, 'FCS_CKM.2': 12, 'FCS_CKM.2.1': 1, 'FCS_CKM.3': 9, 'FCS_CKM.3.1': 1, 'FCS_CKM.4': 23, 'FCS_CKM.4.1': 1, 'FCS_COP.1': 32, 'FCS_COP.1.1': 1}, 'FDP': {'FDP_ACC': 88, 'FDP_ACF': 73, 'FDP_UCT': 16, 'FDP_ITC': 31, 'FDP_UIT': 19, 'FDP_ACC.2': 13, 'FDP_ACF.1': 34, 'FDP_IFC': 31, 'FDP_IFC.1': 22, 'FDP_IFF': 24, 'FDP_IFF.1': 16, 'FDP_RIP': 151, 'FDP_RIP.1': 10, 'FDP_ROL.1': 5, 'FDP_ROL': 17, 'FDP_SDI.2': 13, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_ITC.2': 16, 'FDP_IFC.2': 2, 'FDP_UIT.1': 4, 'FDP_UCT.1': 1, 'FDP_ITC.1': 10, 'FDP_ACC.1': 24, 'FDP_SDC.1': 1, 'FDP_ITT.1': 1}, 'FIA': {'FIA_AFL': 49, 'FIA_UAU': 67, 'FIA_UID': 38, 'FIA_ATD': 20, 'FIA_ATD.1': 3, 'FIA_UID.2': 1, 'FIA_USB': 10, 'FIA_USB.1': 3, 'FIA_UID.1': 16, 'FIA_AFL.1': 10, 'FIA_UAU.1': 11, 'FIA_UAU.4': 2, 'FIA_UAU.7': 2}, 'FMT': {'FMT_SMR': 69, 'FMT_MSA': 224, 'FMT_SMF': 73, 'FMT_MOF': 12, 'FMT_MTD': 51, 'FMT_MSA.1': 20, 'FMT_MSA.2': 5, 'FMT_MSA.3': 27, 'FMT_SMF.1': 31, 'FMT_SMF.1.1': 1, 'FMT_SMR.1': 57, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MTD.1': 5, 'FMT_MTD.3': 1, 'FMT_SMR.2': 6, 'FMT_MOF.1': 1, 'FMT_MTD.2': 2, 'FMT_LIM.1': 1, 'FMT_LIM.2': 1}, 'FPR': {'FPR_UNO': 29, 'FPR_UNO.1': 17, 'FPR_UNO.1.1': 1}, 'FPT': {'FPT_TST.1': 13, 'FPT_TDC': 9, 'FPT_PHP': 9, 'FPT_FLS': 57, 'FPT_RCV': 39, 'FPT_FLS.1': 23, 'FPT_FLS.1.1': 2, 'FPT_TDC.1': 12, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 1, 'FPT_RCV.3': 11, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_PHP.3': 3, 'FPT_RCV.4': 1, 'FPT_ITT.1': 1}, 'FRU': {'FRU_FLT': 10, 'FRU_FLT.1': 1, 'FRU_FLT.2': 1}, 'FTP': {'FTP_ITC': 28, 'FTP_ITC.1': 10, 'FTP_TRP.1': 4}}, 'cc_claims': {'D': {'D.BIO': 12, 'D.CONFIG': 4, 'D.SENSITIVE_DATA': 2, 'D.ARRAY': 6, 'D.JCS_KEYS': 7, 'D.APP_CODE': 6, 'D.APP_C_DATA': 3, 'D.APP_I_DATA': 4, 'D.PIN': 9, 'D.API_DATA': 3, 'D.CRYPTO': 4, 'D.JCS_CODE': 3, 'D.JCS_DATA': 5, 'D.SEC_DATA': 7, 'D.NB_REMAINTRYGLB': 1}, 'O': {'O.IC': 2, 'O.TOE': 2, 'O.CARD_MANAGEMENT': 51, 'O.SCP': 57, 'O.RESIDENT_APPLICATION': 23, 'O.SECURE_COMPARE': 10, 'O.PATCH_LOADING': 26, 'O.BIO-': 2, 'O.SID': 33, 'O.FIREWALL': 64, 'O.GLOBAL_ARRAYS_CONFID': 20, 'O.GLOBAL_ARRAYS_INTEG': 12, 'O.NATIVE': 14, 'O.OPERATE': 38, 'O.REALLOCATION': 18, 'O.RESOURCES': 26, 'O.ALARM': 26, 'O.CIPHER': 19, 'O.KEY-MNGT': 26, 'O.PIN-MNGT': 27, 'O.BIO-MNGT': 23, 'O.TRANSACTION': 18, 'O.OBJ-DELETION': 9, 'O.DELETION': 14, 'O.LOAD': 17, 'O.INSTALL': 17, 'O.PIN-': 3, 'O.REMOTE': 4, 'O.APPLET': 16, 'O.CODE_PKG': 22, 'O.JAVAOBJECT': 49, 'O.REMOTE_MTHD': 1, 'O.REMOTE_OBJ': 1, 'O.ROR': 1, 'O.GLOBAL_ARRRAYS_INTEG': 1, 'O.GLOBAL_ARRRAYS_CONFID': 2, 'O.RND': 1, 'O.TDES': 1, 'O.AES': 1, 'O.CUST_RECONF_PLAIN': 1, 'O.FM_FW': 1, 'O.MEM_ACCESS': 1, 'O.SFR_ACCESS': 1, 'O.PUF': 1}, 'T': {'T.CONFIGURATION': 5, 'T.CONF_DATA_APPLET': 5, 'T.PATCH_LOADING': 5, 'T.CONFID-APPLI-DATA': 18, 'T.CONFID-JCS-CODE': 6, 'T.CONFID-JCS-DATA': 11, 'T.INTEG-APPLI-CODE': 11, 'T.INTEG-APPLI-DATA': 21, 'T.INTEG-JCS-CODE': 6, 'T.INTEG-JCS-DATA': 12, 'T.SID': 18, 'T.EXE-CODE': 8, 'T.NATIVE': 6, 'T.RESOURCES': 8, 'T.DELETION': 6, 'T.INSTALL': 6, 'T.OBJ-DELETION': 4, 'T.PHYSICAL': 4, 'T.EXE-CODE-REMOTE': 3, 'T.INTEG-APPLI-': 5, 'T.INTEG-': 2, 'T.EXE-': 1, 'T.IC': 2, 'T.RND': 1}, 'A': {'A.IC': 2, 'A.DELETION': 3, 'A.APPLET': 5, 'A.VERIFICATION': 5}, 'R': {'R.JAVA': 9}, 'OP': {'OP.ARRAY_ACCESS': 9, 'OP.CREATE': 7, 'OP.DELETE_APPLET': 4, 'OP.DELETE_PCKG': 3, 'OP.DELETE_PCKG_APPLET': 3, 'OP.FLOW': 3, 'OP.IMPORT_KEY': 2, 'OP.INSTANCE_FIELD': 6, 'OP.INVK_INTERFACE': 7, 'OP.INVK_VIRTUAL': 6, 'OP.JAVA': 5, 'OP.THROW': 5, 'OP.TYPE_ACCESS': 5, 'OP.LOCAL_STACK_ACCESS': 3, 'OP.OPERAND_STACK_ACCE': 1, 'OP.PUT': 6, 'OP.RET_RORD': 1, 'OP.STATIC_FIELD': 3, 'OP.OPERAND_STACK_ACCESS': 2}, 'OE': {'OE.VERIFICATION': 38, 'OE.CODE-EVIDENCE': 19, 'OE.CARD_MANAGEMENT': 3, 'OE.SCP': 6, 'OE.APPLET': 8, 'OE.CODE-': 2, 'OE.CHECK-INIT': 1}, 'OSP': {'OSP.VERIFICATION': 5}}, 'vendor': {'NXP': {'NXP': 20}, 'Oberthur': {'Oberthur Technologies': 35, 'Oberthur': 13}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 26}}, 'DES': {'DES': {'DES': 18}, '3DES': {'TDES': 15, 'Triple-DES': 1}}, 'constructions': {'MAC': {'HMAC': 2, 'CMAC': 1}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 2}, 'ECDSA': {'ECDSA': 4}, 'ECC': {'ECC': 9}}, 'FF': {'DH': {'Diffie-Hellman': 5}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 5, 'SHA1': 1}, 'SHA2': {'SHA-224': 4, 'SHA-384': 4, 'SHA-256': 4, 'SHA-512': 3}, 'SHA3': {'SHA3-224': 2, 'SHA3-256': 2, 'SHA3-384': 2, 'SHA3-512': 2, 'SHA-3': 3, 'SHA3': 4}}}, 'crypto_scheme': {'MAC': {'MAC': 2}, 'KA': {'Key Agreement': 3, 'Key agreement': 1}}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 16, 'RND': 2}}, 'cipher_mode': {'ECB': {'ECB': 3}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 2, 'physical probing': 4, 'DPA': 2, 'SPA': 1}, 'FI': {'physical tampering': 2, 'malfunction': 2, 'Malfunction': 2, 'fault injection': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 46-3': 4, 'FIPS PUB 81': 6, 'FIPS PUB 197': 5, 'FIPS PUB 180-3': 2, 'FIPS PUB 202': 3, 'FIPS 140-2': 1, 'FIPS PUB 186-3': 1}, 'NIST': {'NIST SP 800-90': 2}, 'PKCS': {'PKCS#1': 3}, 'BSI': {'AIS31': 1}, 'ISO': {'ISO/IEC 7816': 2, 'ISO/IEC 14443': 2, 'ISO/IEC 9797': 8, 'ISO/IEC 9796-': 1, 'ISO/IEC 7816-6': 1, 'ISO/IEC 9796-1': 1, 'ISO/IEC 9797-1': 1}, 'SCP': {'SCP02': 4, 'SCP03': 5}}, 'javacard_version': {'JavaCard': {'Java Card 3.0.4': 4}, 'GlobalPlatform': {'Global Platform 2.2.1': 2}}, 'javacard_api_const': {'misc': {'TYPE_ACCESS': 5}}, 'javacard_packages': {'java': {'java.rmi': 2}, 'javacard': {'javacard.security': 4, 'javacard.crypto': 1, 'javacard.framework': 4}, 'javacardx': {'javacardx.biometry': 1, 'javacardx.crypto': 2, 'javacardx.security': 1, 'javacardx.framework.util': 1}, 'com': {'com.oberthurcs.javacard': 3}}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are': 1}}}.
    • The report_filename property was set to ANSSI-CC-2017_49fr.pdf.
    • The st_filename property was set to anssi-cible-cc-2017_49en.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to ['CEA'].
    • The cert_id property was set to ANSSI-CC-2017/49.
    • The st_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/68', 'ANSSI-CC-2018/16', 'ANSSI-CC-2018/15', 'ANSSI-CC-2018/18', 'ANSSI-CC-2018/17']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/68', 'ANSSI-CC-2018/16', 'ANSSI-CC-2018/15', 'ANSSI-CC-2018/18', 'ANSSI-CC-2018/17']}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0955-V2-2016']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0955-V2-2016']}} data.
    • The report_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/71', 'ANSSI-CC-2018/16', 'ANSSI-CC-2017/72', 'ANSSI-CC-2018/05', 'ANSSI-CC-2018/03', 'ANSSI-CC-2018/04', 'ANSSI-CC-2018/15', 'ANSSI-CC-2018/06', 'ANSSI-CC-2017/70', 'ANSSI-CC-2018/18', 'ANSSI-CC-2018/17', 'ANSSI-CC-2017/69', 'ANSSI-CC-2019/28']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2019/48', 'ANSSI-CC-2018/16', 'ANSSI-CC-2017/72', 'ANSSI-CC-2020/51', 'ANSSI-CC-2019/34', 'ANSSI-CC-2018/06', 'ANSSI-CC-2020/38', 'ANSSI-CC-2019/33', 'ANSSI-CC-2020/36', 'ANSSI-CC-2020/53', 'ANSSI-CC-2017/70', 'ANSSI-CC-2018/17', 'ANSSI-CC-2017/69', 'ANSSI-CC-2017/71', 'ANSSI-CC-2018/05', 'ANSSI-CC-2020/35', 'ANSSI-CC-2018/03', 'ANSSI-CC-2019/36', 'ANSSI-CC-2020/50', 'ANSSI-CC-2022/33', 'ANSSI-CC-2019/50', 'ANSSI-CC-2019/47', 'ANSSI-CC-2019/41', 'ANSSI-CC-2018/15', 'ANSSI-CC-2018/04', 'ANSSI-CC-2019/43', 'ANSSI-CC-2019/49', 'ANSSI-CC-2018/18', 'ANSSI-CC-2020/37', 'ANSSI-CC-2020/52', 'ANSSI-CC-2019/35', 'ANSSI-CC-2019/43-R01', 'ANSSI-CC-2020/26', 'ANSSI-CC-2019/28']}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0973-V2-2016']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0973-2016', 'BSI-DSZ-CC-0973-V2-2016']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}]} values added.
  • 09.06.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'Plateforme ID-One Cosmo v8.1-N - Large, masquée sur le composant NXP P6022M VB', 'url': 'https://cyber.gouv.fr/produits-certifies/plateforme-id-one-cosmo-v81-n-large-masquee-sur-le-composant-nxp-p6022m-vb', 'description': 'Le produit certfié est la plateforme ouverte Java Card : « plateforme ID-One Cosmo v8.1-N - Large, masquée sur le composant NXP P6022M VB » dont l’identification du matériel est 084021. La version de la plateforme évaluée inclut les patchs identifiés au chapitre 1.2.4 du présent rapport. Elle est développée par OBERTHUR TECHNOLOGIES et embarquée sur le microcontrôleur NXP P6022M VB, développé et f', 'sponsor': 'Oberthur Technologies', 'developer': 'Oberthur Technologies, NXP Semiconductors GmbH', 'cert_id': '2017/49', 'level': 'EAL5+', 'expiration_date': '24 Avril 2025', 'enhanced': {'cert_id': '2017/49', 'certification_date': '05/09/2017', 'expiration_date': '24/04/2025', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 3.1r4', 'developer': 'Oberthur Technologies, NXP Semiconductors GmbH', 'sponsor': 'Oberthur Technologies', 'evaluation_facility': 'CEA - LETI', 'level': 'EAL5+', 'protection_profile': 'PP JCS-O', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ALC_DVS.2, AVA_VAN.5', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2017/09/anssi-cible-cc-2017_49-m03en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2017/09/anssi-cc-2017_49fr.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/2017/09/certificat-anssi-cc-2017_49-s02.pdf'}}.
  • 09.06.2024 The certificate data changed.
    Certificate changed

    The cert_link was updated.

    • The new value is https://www.commoncriteriaportal.org/files/epfiles/certificat%20ANSSI-CC-2017_49-S02.pdf.

    The manufacturer_web was updated.

    • The new value is https://www.oberthur.com/.

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 03.06.2024 The certificate data changed.
    Certificate changed

    The cert_link was updated.

    • The new value is None.

    The manufacturer_web was updated.

    • The new value is None.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The cert property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The cert_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The cert_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.
    • The cert_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to None.
    • The st_references property was updated, with the {'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None} data.
    • The report_references property was updated, with the {'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}]} values discarded.
  • 15.02.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'e7b7e38b2f83d93902feb5120ed29aafe5c3a401495485aa5be0426a9e41445f', 'txt_hash': 'f21d59943a64c72866d0b4491029120b12c0b921e58002156de396dffc9ef7e9'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '5091a06e7662832af51a423f5941d1f1600a8c3d4c4f7cbabe897d34ad399cda', 'txt_hash': '24413aba53a23aeac8194bbd3dc9f08ff18e82b1c594b13e9f252a4c5df88785'}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '1b0535e6124b8bd374c190f018820b31b2cdefb4c9bb40b987d83cababb538d6', 'txt_hash': 'df0f39dca29d89cd639270b1d99b58d7dbeb98d84414ca6f1514d0d7abb20e3a'}}.
    • The following properties were deleted: ['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash'].

    The PDF extraction data was updated.

    • The following values were inserted: {'cert_metadata': {'pdf_file_size_bytes': 264781, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 2, '/Author': '', '/CreationDate': "D:20201223101616+01'00'", '/Creator': 'PScript5.dll Version 5.2.2', '/ModDate': "D:20201223101616+01'00'", '/Producer': 'Acrobat Distiller 11.0 (Windows)', '/Title': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}, 'cert_frontpage': None, 'cert_keywords': {'cc_cert_id': {'FR': {'ANSSI-CC-2017/49-S02': 2}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL5': 1}}, 'cc_sar': {'ALC': {'ALC_DVS.2': 1}, 'AVA': {'AVA_VAN.5': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'NXP': {'NXP': 1, 'NXP Semiconductors': 1}, 'Oberthur': {'OBERTHUR': 2}}, 'eval_facility': {'CEA-LETI': {'CEA - LETI': 2}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}, 'cert_filename': 'certificat ANSSI-CC-2017_49-S02.pdf'}.
    • The report_frontpage property was set to {'FR': {'match_rules': ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables'], 'cert_id': 'ANSSI-CC-2017/49', 'cert_item': 'Plateforme ID-One Cosmo v8.1-N - Large, masquée sur le composant NXP P6022M VB', 'cert_item_version': 'Identification du matériel 084021 Identification du patch générique 089041 Identification du patch additionnel 086684', 'ref_protection_profiles': 'PP JCS-O] Java Card Protection Profile Open Configuration, version 3.0', 'cc_version': 'Critères Communs version 3.1 révision 4', 'cc_security_level': 'EAL 5 augmenté ALC_DVS.2, AVA_VAN.5', 'developer': 'Oberthur Technologies 420 rue d’Estienne d’Orves, 92700 Colombes, France NXP Semiconductors GmbH Stresemannallee 101, 22539 Hamburg, Allemagne Commanditaire Oberthur Technologies 420 rue d’Estienne d’Orves, 92700 Colombes, France', 'cert_lab': 'CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France'}}.
    • The st_frontpage property was set to None.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0973-V2-2016': 3}}, 'FR': {'__update__': {'ANSSI-CC-2017/49': 18}}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__insert__': {'BSI-DSZ-CC-0973-V2-': 1, 'BSI-DSZ-CC-0955-V2-': 2}, '__update__': {'BSI-DSZ-CC-0955-V2-2016': 2}, '__delete__': ['BSI-DSZ-CC-0973-V2', 'BSI-DSZ-CC-0955-V2']}}}} data.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/71', 'ANSSI-CC-2018/05', 'ANSSI-CC-2017/72', 'ANSSI-CC-2018/04', 'ANSSI-CC-2018/03', 'ANSSI-CC-2018/06', 'ANSSI-CC-2017/70', 'ANSSI-CC-2017/69']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/71', 'ANSSI-CC-2018/05', 'ANSSI-CC-2017/72', 'ANSSI-CC-2018/04', 'ANSSI-CC-2018/03', 'ANSSI-CC-2018/06', 'ANSSI-CC-2017/70', 'ANSSI-CC-2017/69']}}} data.
  • 13.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0973-V2-2016': 6}}, 'FR': {'__update__': {'ANSSI-CC-2017/49': 36}}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__insert__': {'BSI-DSZ-CC-0973-V2': 3, 'BSI-DSZ-CC-0955-V2': 3}, '__update__': {'BSI-DSZ-CC-0955-V2-2016': 4}, '__delete__': ['BSI-DSZ-CC-0973-V2-', 'BSI-DSZ-CC-0955-V2-']}}}} data.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/71', 'ANSSI-CC-2018/05', 'ANSSI-CC-2017/72', 'ANSSI-CC-2018/04', 'ANSSI-CC-2018/03', 'ANSSI-CC-2018/06', 'ANSSI-CC-2017/70', 'ANSSI-CC-2017/69']}}, 'indirectly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/71', 'ANSSI-CC-2018/05', 'ANSSI-CC-2017/72', 'ANSSI-CC-2018/04', 'ANSSI-CC-2018/03', 'ANSSI-CC-2018/06', 'ANSSI-CC-2017/70', 'ANSSI-CC-2017/69']}}} data.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__delete__': ['CA']}} data.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__insert__': {'CA': {'1 1 1': 21, '1 2 3': 5, '5 5 6': 1, '1 1 2': 1, '2 3 3': 1, '5 6 4': 1, '4 5 5': 2, '5 5 5': 1, '1 2 2': 5, '2 2 2': 2, '3 3 2': 1, '1 1 3': 1, '2 2 1': 1, '2 2 3': 1}}, '__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0973-V2-2016': 3}}, 'FR': {'__update__': {'ANSSI-CC-2017/49': 18}}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__insert__': {'BSI-DSZ-CC-0973-V2-': 1, 'BSI-DSZ-CC-0955-V2-': 2}, '__update__': {'BSI-DSZ-CC-0955-V2-2016': 2}, '__delete__': ['BSI-DSZ-CC-0973-V2', 'BSI-DSZ-CC-0955-V2']}}}} data.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/71', 'ANSSI-CC-2018/05', 'ANSSI-CC-2017/72', 'ANSSI-CC-2018/03', 'ANSSI-CC-2018/04', 'ANSSI-CC-2018/06', 'ANSSI-CC-2017/70', 'ANSSI-CC-2017/69']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/71', 'ANSSI-CC-2018/05', 'ANSSI-CC-2017/72', 'ANSSI-CC-2018/03', 'ANSSI-CC-2018/04', 'ANSSI-CC-2018/06', 'ANSSI-CC-2017/70', 'ANSSI-CC-2017/69']}}} data.
  • 05.02.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'description': 'Le produit certfié est la plateforme ouverte Java Card : « plateforme ID-One Cosmo v8.1-N - Large, masquée sur le composant NXP P6022M VB » dont l’identification du matériel est 084021. La version de la plateforme évaluée inclut les patchs identifiés au chapitre 1.2.4 du présent rapport. Elle est développée par OBERTHUR TECHNOLOGIES et embarquée sur le microcontrôleur NXP P6022M VB, développé et f'} data.
  • 04.01.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'annotated_references': None}.
    • The scheme_data property was updated, with the {'product': 'Plateforme ID-One Cosmo v8.1-N - Large, masquée sur le composant NXP P6022M VB', 'url': 'https://cyber.gouv.fr/produits-certifies/plateforme-id-one-cosmo-v81-n-large-masquee-sur-le-composant-nxp-p6022m-vb', 'enhanced': {'__insert__': {'cert_id': '2017/49', 'sponsor': 'Oberthur Technologies', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ALC_DVS.2, AVA_VAN.5'}, '__update__': {'developer': 'Oberthur Technologies, NXP Semiconductors GmbH', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2017/09/anssi-cc-2017_49fr.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2017/09/anssi-cible-cc-2017_49-m03en.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/2017/09/certificat-anssi-cc-2017_49-s02.pdf'}, '__delete__': ['id', 'augmentations', 'recognition', 'description']}} data.
  • 27.07.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The report_references property was updated, with the {'indirectly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2019/43-R01']}}} data.
  • 26.04.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'scheme_data': {'product': 'Plateforme ID-One Cosmo v8.1-N – Large, masquée sur le composant NXP P6022M VB\n\t\t\t\n\t\t\tDernier rapport de maintenance :2017/49-M03Dernier rapport de surveillance :2017/49-S02', 'vendor': 'Oberthur Technologies, NXP Semiconductors GmbHOberthur Technologies', 'level': 'EAL5+', 'id': '2017/49', 'certification_date': '05/09/2017', 'category': 'Smart cards', 'url': 'https://www.ssi.gouv.fr/certification_cc/plateforme-id-one-cosmo-v8-1-n-large-masquee-sur-le-composant-nxp-p6022m-vb/', 'enhanced': {'id': '2017/49', 'certification_date': '05/09/2017', 'expiration_date': '24/04/2025', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 3.1r4', 'level': 'EAL5+', 'augmentations': 'ALC_DVS.2, AVA_VAN.5', 'protection_profile': 'PP JCS-O', 'developer': 'Oberthur Technologies, NXP Semiconductors GmbH / Oberthur Technologies', 'evaluation_facility': 'CEA - LETI', 'recognition': 'SOG-IS - CCRA', 'description': 'Descriptif du produit\n\t\t\t\tLe produit certfié est la plateforme ouverte Java Card : « plateforme ID-One Cosmo v8.1-N – Large, masquée sur le composant NXP P6022M VB » dont l’identification du matériel est 084021. La version de la plateforme évaluée inclut les patchs identifiés au chapitre 1.2.4 du présent rapport. Elle est développée par OBERTHUR TECHNOLOGIES et embarquée sur le microcontrôleur NXP P6022M VB, développé et fabriqué par NXP SEMICONDUCTORS GMBH.\nLe produit est destiné à héberger et exécuter une ou plusieurs applications, dites applets dans la terminologie Java Card. Ces applets peuvent revêtir un caractère sécuritaire différent (selon qu’elles soient « sensibles » ou « basiques ») et peuvent être chargées et instanciées avant ou après émission du produit. Les logiciels applicatifs ne sont pas inclus dans le périmètre de l’évaluation, mais ont été pris en compte au titre de [OPEN].\n\n\t\t\t\t\n Rapport de certification\nSecurity target\nSecurity target\nSecurity target\nCertificat\n \t\t\t\t\t\n \t\t\t\t\t\n \n \n Rapports de maintenance2017/49-M03 - 21/01/2020\n2017/49-M02 - 24/01/2019\n2017/49-M01 - 20/11/2017\n \n Rapports de surveillance2017/49-S02 - 24/04/2020', 'report_link': 'https://www.ssi.gouv.fr/uploads/2017/09/anssi-cc-2017_49fr.pdf', 'target_link': 'https://www.ssi.gouv.fr/uploads/2017/09/anssi-cible-cc-2017_49en.pdf', 'cert_link': 'https://www.ssi.gouv.fr/uploads/2017/09/certificat-anssi-cc-2017_49-s02.pdf'}}}.
  • 11.02.2023 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.cc.CCCertificate.

    The Maintenance Updates of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': '2020-01-21', 'maintenance_title': 'ANSSI-CC-2017/49-M03', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2017_49-m03fr.pdf', 'maintenance_st_link': None}, {'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': '2020-04-24', 'maintenance_title': 'Reassessment report: ANSSI-CC-2017/49-S02', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC-2017_49-S02.pdf', 'maintenance_st_link': None}, {'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': '2017-11-20', 'maintenance_title': 'Plateforme ID -One Cosmo v8.1-N - Large, masquée sur le composant NXP P6022M VB Identification du matériel 084022', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2017_49_m01.pdf', 'maintenance_st_link': None}, {'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': '2019-01-24', 'maintenance_title': 'Plateforme ID -One Cosmo v8.1-N - Large, masquée sur le composant NXP P6022M VB Identification du matériel 084022', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2017_49_m02.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/files/epfiles/anssi-cible-cc-2017_49en(1).pdf'}, {'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': '2017-11-20', 'maintenance_title': 'Plateforme ID-One Cosmo v8.1-N - Large, masquée sur le composant NXP P6022M VB Identification du matériel 084022', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2017_49_m01.pdf', 'maintenance_st_link': None}, {'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': '2017-11-20', 'maintenance_title': 'ANSSI-CC-2017/49-M01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2017_49_m01.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/files/epfiles/anssi-cible-cc-2017_49en(1).pdf'}]}.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.InternalState.
    • The following properties were deleted: ['errors'].

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.PdfData.

    The computed heuristics were updated.

    • The following values were inserted: {'direct_transitive_cves': None, 'indirect_transitive_cves': None}.
    • The _type property was set to sec_certs.sample.cc.CCCertificate.Heuristics.
    • The report_references property was updated, with the {'indirectly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2019/47', 'ANSSI-CC-2019/48', 'ANSSI-CC-2019/35', 'ANSSI-CC-2019/34', 'ANSSI-CC-2019/36', 'ANSSI-CC-2019/33', 'ANSSI-CC-2019/49', 'ANSSI-CC-2019/50']}}} data.
    • The following properties were deleted: ['direct_dependency_cves', 'indirect_dependency_cves'].
  • 05.02.2023 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to [].
  • 26.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC-2017_49fr.pdf, code: nok'].

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2018/06', 'ANSSI-CC-2018/15', 'ANSSI-CC-2017/71', 'ANSSI-CC-2017/72']}}, 'indirectly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2018/06', 'ANSSI-CC-2018/15', 'ANSSI-CC-2017/71', 'ANSSI-CC-2017/72']}}} data.
    • The report_references property was updated, with the {'directly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/71']}}, 'indirectly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/71']}}} data.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2018/06', 'ANSSI-CC-2018/15', 'ANSSI-CC-2017/71', 'ANSSI-CC-2017/72']}, '__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/68', 'ANSSI-CC-2018/16', 'ANSSI-CC-2017/70']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2018/06', 'ANSSI-CC-2018/15', 'ANSSI-CC-2017/71', 'ANSSI-CC-2017/72']}, '__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/68', 'ANSSI-CC-2018/16', 'ANSSI-CC-2017/70']}}} data.
    • The report_references property was updated, with the {'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/71']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/71']}, '__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/52']}}} data.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to 5091a06e7662832af51a423f5941d1f1600a8c3d4c4f7cbabe897d34ad399cda.
    • The st_txt_hash property was set to 24413aba53a23aeac8194bbd3dc9f08ff18e82b1c594b13e9f252a4c5df88785.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 3563890, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 228, '/CreationDate': "D:20170816182749+02'00'", '/Creator': 'Microsoft® Office Word 2007', '/ModDate': "D:20170911162201+02'00'", '/Producer': 'Microsoft® Office Word 2007', '/Subject': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0955-V2-2016': 4, 'BSI-DSZ-CC-0973-V2': 3, 'BSI-DSZ-CC-0955-V2': 3}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 1}, 'ANSSI': {'ANSSI-CC-PP-2010/03_M01': 1}}, 'cc_security_level': {'EAL': {'EAL5+': 4, 'EAL5': 11, 'EAL 5+': 3, 'EAL5 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 6, 'ADV_FSP.1': 4, 'ADV_TDS.1': 2, 'ADV_FSP.5': 8, 'ADV_TDS.4': 8, 'ADV_IMP.1': 9, 'ADV_TDS.3': 4, 'ADV_FSP.2': 2, 'ADV_FSP.4': 1, 'ADV_IMP': 1, 'ADV_ARC': 1, 'ADV_COMP': 1}, 'AGD': {'AGD_PRE': 12, 'AGD_OPE': 2, 'AGD_OPE.1': 10, 'AGD_PRE.1': 6}, 'ALC': {'ALC_DVS.2': 20, 'ALC_DVS': 1, 'ALC_TAT.1': 2, 'ALC_TAT.2': 3, 'ALC_CMC.4': 1, 'ALC_CMS.1': 1, 'ALC_DVS.1': 2, 'ALC_LCD.1': 3, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.2': 3, 'ATE_FUN.1': 6, 'ATE_COV.1': 2, 'ATE_DPT.1': 1, 'ATE_DPT.3': 1}, 'AVA': {'AVA_VAN.5': 21, 'AVA_VAN': 9}, 'ASE': {'ASE_TSS.2': 6, 'ASE_CCL.1': 1, 'ASE_ECD.1': 4, 'ASE_INT.1': 5, 'ASE_REQ.1': 2, 'ASE_REQ.2': 2, 'ASE_OBJ.2': 3, 'ASE_SPD.1': 2, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_STG.2': 10, 'FAU_ARP.1': 24, 'FAU_ARP.1.1': 1, 'FAU_STG.2.1': 1, 'FAU_STG.2.2': 1, 'FAU_STG.2.3': 1, 'FAU_SAA.1': 3, 'FAU_GEN.1': 2, 'FAU_SAS.1': 1}, 'FCO': {'FCO_NRO': 19, 'FCO_NRO.2': 8}, 'FCS': {'FCS_RNG': 14, 'FCS_RNG.1': 7, 'FCS_COP': 29, 'FCS_CKM': 23, 'FCS_RNG.1.1': 1, 'FCS_RNG.1.2': 1, 'FCS_CKM.1': 24, 'FCS_CKM.1.1': 1, 'FCS_CKM.2': 12, 'FCS_CKM.2.1': 1, 'FCS_CKM.3': 9, 'FCS_CKM.3.1': 1, 'FCS_CKM.4': 23, 'FCS_CKM.4.1': 1, 'FCS_COP.1': 32, 'FCS_COP.1.1': 1}, 'FDP': {'FDP_ACC': 88, 'FDP_ACF': 73, 'FDP_UCT': 16, 'FDP_ITC': 31, 'FDP_UIT': 19, 'FDP_ACC.2': 13, 'FDP_ACF.1': 34, 'FDP_IFC': 31, 'FDP_IFC.1': 22, 'FDP_IFF': 24, 'FDP_IFF.1': 16, 'FDP_RIP': 151, 'FDP_RIP.1': 10, 'FDP_ROL.1': 5, 'FDP_ROL': 17, 'FDP_SDI.2': 13, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_ITC.2': 16, 'FDP_IFC.2': 2, 'FDP_UIT.1': 4, 'FDP_UCT.1': 1, 'FDP_ITC.1': 10, 'FDP_ACC.1': 24, 'FDP_SDC.1': 1, 'FDP_ITT.1': 1}, 'FIA': {'FIA_AFL': 49, 'FIA_UAU': 67, 'FIA_UID': 38, 'FIA_ATD': 20, 'FIA_ATD.1': 3, 'FIA_UID.2': 1, 'FIA_USB': 10, 'FIA_USB.1': 3, 'FIA_UID.1': 16, 'FIA_AFL.1': 10, 'FIA_UAU.1': 11, 'FIA_UAU.4': 2, 'FIA_UAU.7': 2}, 'FMT': {'FMT_SMR': 69, 'FMT_MSA': 224, 'FMT_SMF': 73, 'FMT_MOF': 12, 'FMT_MTD': 51, 'FMT_MSA.1': 20, 'FMT_MSA.2': 5, 'FMT_MSA.3': 27, 'FMT_SMF.1': 31, 'FMT_SMF.1.1': 1, 'FMT_SMR.1': 57, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MTD.1': 5, 'FMT_MTD.3': 1, 'FMT_SMR.2': 6, 'FMT_MOF.1': 1, 'FMT_MTD.2': 2, 'FMT_LIM.1': 1, 'FMT_LIM.2': 1}, 'FPR': {'FPR_UNO': 29, 'FPR_UNO.1': 17, 'FPR_UNO.1.1': 1}, 'FPT': {'FPT_TST.1': 13, 'FPT_TDC': 9, 'FPT_PHP': 9, 'FPT_FLS': 57, 'FPT_RCV': 39, 'FPT_FLS.1': 23, 'FPT_FLS.1.1': 2, 'FPT_TDC.1': 12, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 1, 'FPT_RCV.3': 11, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_PHP.3': 3, 'FPT_RCV.4': 1, 'FPT_ITT.1': 1}, 'FRU': {'FRU_FLT': 10, 'FRU_FLT.1': 1, 'FRU_FLT.2': 1}, 'FTP': {'FTP_ITC': 28, 'FTP_ITC.1': 10, 'FTP_TRP.1': 4}}, 'cc_claims': {'D': {'D.BIO': 12, 'D.CONFIG': 4, 'D.SENSITIVE_DATA': 2, 'D.ARRAY': 6, 'D.JCS_KEYS': 7, 'D.APP_CODE': 6, 'D.APP_C_DATA': 3, 'D.APP_I_DATA': 4, 'D.PIN': 9, 'D.API_DATA': 3, 'D.CRYPTO': 4, 'D.JCS_CODE': 3, 'D.JCS_DATA': 5, 'D.SEC_DATA': 7, 'D.NB_REMAINTRYGLB': 1}, 'O': {'O.IC': 2, 'O.TOE': 2, 'O.CARD_MANAGEMENT': 51, 'O.SCP': 57, 'O.RESIDENT_APPLICATION': 23, 'O.SECURE_COMPARE': 10, 'O.PATCH_LOADING': 26, 'O.BIO-': 2, 'O.SID': 33, 'O.FIREWALL': 64, 'O.GLOBAL_ARRAYS_CONFID': 20, 'O.GLOBAL_ARRAYS_INTEG': 12, 'O.NATIVE': 14, 'O.OPERATE': 38, 'O.REALLOCATION': 18, 'O.RESOURCES': 26, 'O.ALARM': 26, 'O.CIPHER': 19, 'O.KEY-MNGT': 26, 'O.PIN-MNGT': 27, 'O.BIO-MNGT': 23, 'O.TRANSACTION': 18, 'O.OBJ-DELETION': 9, 'O.DELETION': 14, 'O.LOAD': 17, 'O.INSTALL': 17, 'O.PIN-': 3, 'O.REMOTE': 4, 'O.APPLET': 16, 'O.CODE_PKG': 22, 'O.JAVAOBJECT': 49, 'O.REMOTE_MTHD': 1, 'O.REMOTE_OBJ': 1, 'O.ROR': 1, 'O.GLOBAL_ARRRAYS_INTEG': 1, 'O.GLOBAL_ARRRAYS_CONFID': 2, 'O.RND': 1, 'O.TDES': 1, 'O.AES': 1, 'O.CUST_RECONF_PLAIN': 1, 'O.FM_FW': 1, 'O.MEM_ACCESS': 1, 'O.SFR_ACCESS': 1, 'O.PUF': 1}, 'T': {'T.CONFIGURATION': 5, 'T.CONF_DATA_APPLET': 5, 'T.PATCH_LOADING': 5, 'T.CONFID-APPLI-DATA': 18, 'T.CONFID-JCS-CODE': 6, 'T.CONFID-JCS-DATA': 11, 'T.INTEG-APPLI-CODE': 11, 'T.INTEG-APPLI-DATA': 21, 'T.INTEG-JCS-CODE': 6, 'T.INTEG-JCS-DATA': 12, 'T.SID': 18, 'T.EXE-CODE': 8, 'T.NATIVE': 6, 'T.RESOURCES': 8, 'T.DELETION': 6, 'T.INSTALL': 6, 'T.OBJ-DELETION': 4, 'T.PHYSICAL': 4, 'T.EXE-CODE-REMOTE': 3, 'T.INTEG-APPLI-': 5, 'T.INTEG-': 2, 'T.EXE-': 1, 'T.IC': 2, 'T.RND': 1}, 'A': {'A.IC': 2, 'A.DELETION': 3, 'A.APPLET': 5, 'A.VERIFICATION': 5}, 'R': {'R.JAVA': 9}, 'OP': {'OP.ARRAY_ACCESS': 9, 'OP.CREATE': 7, 'OP.DELETE_APPLET': 4, 'OP.DELETE_PCKG': 3, 'OP.DELETE_PCKG_APPLET': 3, 'OP.FLOW': 3, 'OP.IMPORT_KEY': 2, 'OP.INSTANCE_FIELD': 6, 'OP.INVK_INTERFACE': 7, 'OP.INVK_VIRTUAL': 6, 'OP.JAVA': 5, 'OP.THROW': 5, 'OP.TYPE_ACCESS': 5, 'OP.LOCAL_STACK_ACCESS': 3, 'OP.OPERAND_STACK_ACCE': 1, 'OP.PUT': 6, 'OP.RET_RORD': 1, 'OP.STATIC_FIELD': 3, 'OP.OPERAND_STACK_ACCESS': 2}, 'OE': {'OE.VERIFICATION': 38, 'OE.CODE-EVIDENCE': 19, 'OE.CARD_MANAGEMENT': 3, 'OE.SCP': 6, 'OE.APPLET': 8, 'OE.CODE-': 2, 'OE.CHECK-INIT': 1}, 'OSP': {'OSP.VERIFICATION': 5}}, 'vendor': {'NXP': {'NXP': 20}, 'Oberthur': {'Oberthur Technologies': 35, 'Oberthur': 13}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 26}}, 'DES': {'DES': {'DES': 18}, '3DES': {'TDES': 15, 'Triple-DES': 1}}, 'constructions': {'MAC': {'HMAC': 2, 'CMAC': 1}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 2}, 'ECDSA': {'ECDSA': 4}, 'ECC': {'ECC': 9}}, 'FF': {'DH': {'Diffie-Hellman': 5}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 5, 'SHA1': 1}, 'SHA2': {'SHA-224': 4, 'SHA-384': 4, 'SHA-256': 4, 'SHA-512': 3}, 'SHA3': {'SHA3-224': 2, 'SHA3-256': 2, 'SHA3-384': 2, 'SHA3-512': 2, 'SHA-3': 3, 'SHA3': 4}}}, 'crypto_scheme': {'MAC': {'MAC': 2}, 'KA': {'Key Agreement': 3, 'Key agreement': 1}}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 16, 'RND': 2}}, 'cipher_mode': {'ECB': {'ECB': 3}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 2, 'physical probing': 4, 'DPA': 2, 'SPA': 1}, 'FI': {'physical tampering': 2, 'malfunction': 2, 'Malfunction': 2, 'fault injection': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 46-3': 4, 'FIPS PUB 81': 6, 'FIPS PUB 197': 5, 'FIPS PUB 180-3': 2, 'FIPS PUB 202': 3, 'FIPS 140-2': 1, 'FIPS PUB 186-3': 1}, 'NIST': {'NIST SP 800-90': 2}, 'PKCS': {'PKCS#1': 3}, 'BSI': {'AIS31': 1}, 'ISO': {'ISO/IEC 7816': 2, 'ISO/IEC 14443': 2, 'ISO/IEC 9797': 8, 'ISO/IEC 9796-': 1, 'ISO/IEC 7816-6': 1, 'ISO/IEC 9796-1': 1, 'ISO/IEC 9797-1': 1}, 'SCP': {'SCP02': 4, 'SCP03': 5}}, 'javacard_version': {'JavaCard': {'Java Card 3.0.4': 4}, 'GlobalPlatform': {'Global Platform 2.2.1': 2}}, 'javacard_api_const': {'misc': {'TYPE_ACCESS': 5}}, 'javacard_packages': {'java': {'java.rmi': 2}, 'javacard': {'javacard.security': 4, 'javacard.crypto': 1, 'javacard.framework': 4}, 'javacardx': {'javacardx.biometry': 1, 'javacardx.crypto': 2, 'javacardx.security': 1, 'javacardx.framework.util': 1}, 'com': {'com.oberthurcs.javacard': 3}}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are': 1}}}.
    • The st_filename property was set to anssi-cible-cc-2017_49en.pdf.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/70']}, '__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2018/18', 'ANSSI-CC-2018/17', 'ANSSI-CC-2018/03', 'ANSSI-CC-2018/05']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/70']}, '__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2018/18', 'ANSSI-CC-2018/17', 'ANSSI-CC-2018/03', 'ANSSI-CC-2018/05']}}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0955-V2-2016']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0955-V2-2016']}} data.
    • The report_references property was updated, with the {'directly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2018/17', 'ANSSI-CC-2018/16']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/52']}, '__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/53', 'ANSSI-CC-2018/17', 'ANSSI-CC-2018/16']}}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}]} values added.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/68', 'ANSSI-CC-2018/03', 'ANSSI-CC-2018/17', 'ANSSI-CC-2018/05']}, '__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2018/06', 'ANSSI-CC-2018/15']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/68', 'ANSSI-CC-2018/03', 'ANSSI-CC-2018/17', 'ANSSI-CC-2018/05']}, '__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2018/06', 'ANSSI-CC-2018/15']}}} data.
    • The report_references property was updated, with the {'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2018/17', 'ANSSI-CC-2018/16']}, '__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2018/06', 'ANSSI-CC-2018/15']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2018/17', 'ANSSI-CC-2018/16']}, '__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/51', 'ANSSI-CC-2018/15', 'ANSSI-CC-2020/35', 'ANSSI-CC-2020/26', 'ANSSI-CC-2020/36', 'ANSSI-CC-2020/38', 'ANSSI-CC-2018/06', 'ANSSI-CC-2020/50', 'ANSSI-CC-2020/37', 'ANSSI-CC-2020/52']}}} data.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The cert_link was updated.

    • The new value is https://www.commoncriteriaportal.org/files/epfiles/certificat%20ANSSI-CC-2017_49-S02.pdf.

    The manufacturer_web was updated.

    • The new value is https://www.oberthur.com/.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2018/06']}, '__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2018/04', 'ANSSI-CC-2017/69', 'ANSSI-CC-2017/71', 'ANSSI-CC-2017/70']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2018/06']}, '__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2018/04', 'ANSSI-CC-2017/69', 'ANSSI-CC-2017/71', 'ANSSI-CC-2017/70']}}} data.
    • The report_references property was updated, with the {'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2018/06', 'ANSSI-CC-2018/15']}, '__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2018/04']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/51', 'ANSSI-CC-2018/15', 'ANSSI-CC-2020/35', 'ANSSI-CC-2020/26', 'ANSSI-CC-2020/36', 'ANSSI-CC-2020/38', 'ANSSI-CC-2018/06', 'ANSSI-CC-2020/53', 'ANSSI-CC-2020/50', 'ANSSI-CC-2020/37', 'ANSSI-CC-2020/52']}, '__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2018/04']}}} data.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The cert_link was updated.

    • The new value is None.

    The manufacturer_web was updated.

    • The new value is None.

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The report_download_ok property was set to True.
    • The st_convert_ok property was set to False.
    • The report_convert_ok property was set to True.
    • The st_extract_ok property was set to False.
    • The report_extract_ok property was set to True.
    • The errors property was updated.
    • The st_pdf_hash property was set to None.
    • The report_pdf_hash property was set to e7b7e38b2f83d93902feb5120ed29aafe5c3a401495485aa5be0426a9e41445f.
    • The st_txt_hash property was set to None.
    • The report_txt_hash property was set to f21d59943a64c72866d0b4491029120b12c0b921e58002156de396dffc9ef7e9.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 1020447, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 17, '/Title': 'ANSSI-CC-2017/49', '/Author': 'Christian Benardeau', '/Subject': 'ID-One Cosmo v8.1-N - Large, masquée sur le composant NXP\xa0P6022M\xa0VB', '/Keywords': 'ANSSI-CC-CER-F-07.025', '/Creator': 'Microsoft® Word 2010', '/CreationDate': "D:20170908111651+02'00'", '/ModDate': "D:20170908111651+02'00'", '/Producer': 'Microsoft® Word 2010', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.ssi.gouv.fr/', 'mailto:certification@ssi.gouv.fr']}}.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to {'anssi': {'match_rules': ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables'], 'cert_id': 'ANSSI-CC-2017/49', 'cert_item': 'Plateforme ID-One Cosmo v8.1-N - Large, masquée sur le composant NXP P6022M VB', 'cert_item_version': 'Identification du matériel 084021 Identification du patch générique 089041 Identification du patch additionnel 086684', 'ref_protection_profiles': 'PP JCS-O] Java Card Protection Profile Open Configuration, version 3.0', 'cc_version': 'Critères Communs version 3.1 révision 4', 'cc_security_level': 'EAL 5 augmenté ALC_DVS.2, AVA_VAN.5', 'developer': 'Oberthur Technologies 420 rue d’Estienne d’Orves, 92700 Colombes, France NXP Semiconductors GmbH Stresemannallee 101, 22539 Hamburg, Allemagne Commanditaire Oberthur Technologies 420 rue d’Estienne d’Orves, 92700 Colombes, France', 'cert_lab': 'CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France'}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_frontpage property was set to None.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0973-V2-2016': 6}, 'FR': {'ANSSI-CC-2017/49': 36}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0084-2014': 1}, 'ANSSI': {'ANSSI-CC-PP-2010/03-': 1}}, 'cc_security_level': {'EAL': {'EAL 5': 3, 'EAL2': 2, 'EAL5': 1, 'EAL7': 1, 'EAL 1': 1, 'EAL 3': 1, 'EAL 7': 1}, 'ITSEC': {'ITSEC E6 Elevé': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE': 4, 'AGD_PRE': 3}, 'ALC': {'ALC_DVS.2': 3, 'ALC_FLR': 2, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.5': 5, 'AVA_VAN': 2}, 'ASE': {'ASE_TSS.2': 1, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'NXP': {'NXP': 30, 'NXP Semiconductors': 2}, 'Oberthur': {'Oberthur Technologies': 2, 'OBERTHUR': 7}}, 'eval_facility': {'CESTI': {'CESTI': 1}, 'CEA-LETI': {'CEA - LETI': 1}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 3}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2012-09-001': 1, 'CCMB-2012-09-002': 1, 'CCMB-2012-09-003': 1, 'CCMB-2012-09-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to None.
    • The report_filename property was set to ANSSI-CC-2017_49fr.pdf.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to ['CEA'].
    • The cert_id property was set to ANSSI-CC-2017/49.
    • The st_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/68', 'ANSSI-CC-2018/05', 'ANSSI-CC-2017/72', 'ANSSI-CC-2018/03', 'ANSSI-CC-2018/06', 'ANSSI-CC-2018/17']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/68', 'ANSSI-CC-2018/05', 'ANSSI-CC-2017/72', 'ANSSI-CC-2018/03', 'ANSSI-CC-2018/06', 'ANSSI-CC-2018/17']}} data.
    • The report_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/71', 'ANSSI-CC-2018/16', 'ANSSI-CC-2018/05', 'ANSSI-CC-2017/72', 'ANSSI-CC-2018/03', 'ANSSI-CC-2018/15', 'ANSSI-CC-2018/06', 'ANSSI-CC-2017/70', 'ANSSI-CC-2018/18', 'ANSSI-CC-2018/17', 'ANSSI-CC-2017/69', 'ANSSI-CC-2019/28']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2018/16', 'ANSSI-CC-2017/72', 'ANSSI-CC-2020/51', 'ANSSI-CC-2018/06', 'ANSSI-CC-2020/38', 'ANSSI-CC-2020/53', 'ANSSI-CC-2020/36', 'ANSSI-CC-2017/70', 'ANSSI-CC-2018/17', 'ANSSI-CC-2017/69', 'ANSSI-CC-2017/71', 'ANSSI-CC-2018/05', 'ANSSI-CC-2018/03', 'ANSSI-CC-2020/35', 'ANSSI-CC-2020/50', 'ANSSI-CC-2022/33', 'ANSSI-CC-2019/41', 'ANSSI-CC-2018/15', 'ANSSI-CC-2019/43', 'ANSSI-CC-2020/37', 'ANSSI-CC-2018/18', 'ANSSI-CC-2020/52', 'ANSSI-CC-2020/26', 'ANSSI-CC-2019/28']}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0973-V2-2016']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0973-2016', 'BSI-DSZ-CC-0973-V2-2016']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}]} values discarded.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report_download_ok property was set to False.
    • The report_convert_ok property was set to False.
    • The report_extract_ok property was set to False.
    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC-2017_49fr.pdf, code: nok', 'failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/anssi-cible-cc-2017_49en.pdf, code: nok', 'failed to download report from https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC-2017_49fr.pdf, code: nok'].
    • The report_pdf_hash property was set to None.
    • The report_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The report_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to None.
    • The st_references property was updated, with the {'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None} data.
    • The report_references property was updated, with the {'directly_referenced_by': None, 'indirectly_referenced_by': None} data.
  • 22.12.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2018/03', 'ANSSI-CC-2018/05']}, '__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2018/18', 'ANSSI-CC-2017/68']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2018/03', 'ANSSI-CC-2018/05']}, '__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2018/18', 'ANSSI-CC-2017/68']}}} data.
  • 21.12.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2018/18', 'ANSSI-CC-2018/15', 'ANSSI-CC-2017/68']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2018/18', 'ANSSI-CC-2018/15', 'ANSSI-CC-2017/68']}}} data.
    • The report_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
  • 11.11.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The report_references property was updated, with the {'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2019/47', 'ANSSI-CC-2019/48', 'ANSSI-CC-2019/35', 'ANSSI-CC-2019/34', 'ANSSI-CC-2019/36', 'ANSSI-CC-2019/33', 'ANSSI-CC-2019/49', 'ANSSI-CC-2019/50']}}} data.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.
  • 28.09.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0955-V2', 'BSI-DSZ-CC-0973-V2']}}, 'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0955-V2', 'BSI-DSZ-CC-0973-V2']}}} data.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': 'ANSSI-CC-2017_49fr.pdf', 'st_filename': 'anssi-cible-cc-2017_49en.pdf'}.
    • The report_frontpage property was updated, with the {'anssi': {'__update__': {'ref_protection_profiles': 'PP JCS-O] Java Card Protection Profile Open Configuration, version 3.0'}}} data.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0973-V2-2016': 6}}}}, 'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL2': 2}, '__delete__': ['EAL 2', 'EAL 4', 'EAL 6', 'EAL 5+']}}}, 'cc_sar': {'__update__': {'ALC': {'__update__': {'ALC_FLR': 2}, '__delete__': ['ALC_LCD']}, 'AVA': {'__update__': {'AVA_VAN.5': 5}}}}, 'cc_claims': {}, 'eval_facility': {'__insert__': {'CESTI': {'CESTI': 1}}}, 'symmetric_crypto': {'__update__': {'DES': {'__update__': {'DES': {'__update__': {'DES': 1}}}}}}, 'tee_name': {}, 'standard_id': {'__update__': {'CC': {'__insert__': {'CCMB-2012-09-003': 1, 'CCMB-2012-09-004': 1}}}}} data.
    • The st_keywords property was updated, with the {'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL5': 11}}}}, 'cc_sar': {'__update__': {'ADV': {'__update__': {'ADV_FSP.5': 8, 'ADV_IMP.1': 9}, '__delete__': ['ADV_INT.2']}, 'AGD': {'__update__': {'AGD_OPE.1': 10}}, 'ALC': {'__insert__': {'ALC_DVS': 1}, '__update__': {'ALC_DVS.2': 20, 'ALC_CMS.5': 1}}, 'ATE': {'__update__': {'ATE_FUN.1': 6, 'ATE_DPT.3': 1}, '__delete__': ['ATE_IND.2']}, 'AVA': {'__update__': {'AVA_VAN.5': 21, 'AVA_VAN': 9}}, 'ASE': {'__update__': {'ASE_ECD.1': 4, 'ASE_REQ.2': 2, 'ASE_SPD.1': 2}}}}, 'cc_sfr': {'__insert__': {'FCO': {'FCO_NRO': 19, 'FCO_NRO.2': 8}}, '__update__': {'FAU': {'__update__': {'FAU_STG.2': 10, 'FAU_ARP.1': 24}}, 'FCS': {'__insert__': {'FCS_CKM': 23}, '__update__': {'FCS_RNG': 14, 'FCS_RNG.1': 7, 'FCS_CKM.1': 24, 'FCS_CKM.2': 12, 'FCS_CKM.3': 9, 'FCS_COP.1': 32, 'FCS_COP': 29}}, 'FDP': {'__insert__': {'FDP_UCT': 16, 'FDP_ITC': 31, 'FDP_UIT': 19, 'FDP_ACC.2': 13, 'FDP_IFC': 31, 'FDP_IFF': 24, 'FDP_RIP': 151, 'FDP_ROL': 17, 'FDP_IFC.2': 2, 'FDP_UIT.1': 4, 'FDP_UCT.1': 1}, '__update__': {'FDP_ROL.1': 5, 'FDP_SDI.2': 13, 'FDP_ACC': 88, 'FDP_ACF': 73, 'FDP_RIP.1': 10, 'FDP_IFC.1': 22, 'FDP_ACF.1': 34, 'FDP_IFF.1': 16, 'FDP_ITC.1': 10, 'FDP_ITC.2': 16}}, 'FIA': {'__insert__': {'FIA_AFL': 49, 'FIA_UAU': 67, 'FIA_UID': 38, 'FIA_ATD': 20, 'FIA_UID.2': 1, 'FIA_USB': 10, 'FIA_USB.1': 3, 'FIA_AFL.1': 10, 'FIA_UAU.4': 2, 'FIA_UAU.7': 2}, '__update__': {'FIA_UID.1': 16, 'FIA_ATD.1': 3, 'FIA_UAU.1': 11}}, 'FMT': {'__insert__': {'FMT_SMR': 69, 'FMT_MOF': 12, 'FMT_MTD': 51, 'FMT_MSA.2': 5, 'FMT_MTD.3': 1, 'FMT_SMR.2': 6, 'FMT_MOF.1': 1, 'FMT_MTD.2': 2}, '__update__': {'FMT_SMF.1': 31, 'FMT_SMR.1': 57, 'FMT_MSA': 224, 'FMT_SMF': 73, 'FMT_MSA.3': 27, 'FMT_MSA.1': 20, 'FMT_MTD.1': 5}}, 'FPR': {'__insert__': {'FPR_UNO': 29}, '__update__': {'FPR_UNO.1': 17}}, 'FPT': {'__insert__': {'FPT_TDC': 9, 'FPT_PHP': 9, 'FPT_FLS': 57, 'FPT_RCV': 39, 'FPT_RCV.3': 11, 'FPT_RCV.4': 1}, '__update__': {'FPT_TST.1': 13, 'FPT_FLS.1': 23, 'FPT_TDC.1': 12, 'FPT_PHP.3': 3}}, 'FRU': {'__insert__': {'FRU_FLT': 10, 'FRU_FLT.1': 1}}, 'FTP': {'__insert__': {'FTP_ITC': 28}, '__update__': {'FTP_ITC.1': 10}}}}, 'cc_claims': {'__update__': {'D': {'__update__': {'D.ARRAY': 6}}, 'O': {'__insert__': {'O.SCP': 57}, '__update__': {'O.CARD_MANAGEMENT': 51, 'O.OPERATE': 38, 'O.FIREWALL': 64, 'O.GLOBAL_ARRAYS_INTEG': 12, 'O.REALLOCATION': 18, 'O.ALARM': 26, 'O.KEY-MNGT': 26, 'O.BIO-MNGT': 23, 'O.TRANSACTION': 18, 'O.DELETION': 14, 'O.INSTALL': 17, 'O.JAVAOBJECT': 49}, '__delete__': ['O', 'O.SCP.SUPPORT', 'O.SCP.IC', 'O.SCP.RECOVERY']}, 'T': {'__insert__': {'T.SID': 18, 'T.EXE-CODE': 8}, '__update__': {'T.INTEG-APPLI-CODE': 11, 'T.INTEG-APPLI-DATA': 21}, '__delete__': ['T', 'T.OPERATE', 'T.INTEG-APPLI-CODE.LOAD', 'T.INTEG-APPLI-DATA.LOAD']}, 'A': {'__delete__': ['A.OPERATE', 'A.LOAD']}, 'R': {'R.JAVA': 9}, 'OE': {'__insert__': {'OE.SCP': 6}, '__update__': {'OE.VERIFICATION': 38, 'OE.APPLET': 8}, '__delete__': ['OE', 'OE.SCP.IC', 'OE.SCP.SUPPORT', 'OE.SCP.RECOVERY']}}}, 'vendor': {'__update__': {'NXP': {'__update__': {'NXP': 20}}}}, 'symmetric_crypto': {'__update__': {'AES_competition': {'__update__': {'AES': {'__update__': {'AES': 26}}}}, 'DES': {'__update__': {'DES': {'__update__': {'DES': 18}}, '3DES': {'__update__': {'TDES': 15}}}}}}, 'asymmetric_crypto': {'__update__': {'FF': {'__update__': {'DH': {'__delete__': ['DH']}}, '__delete__': ['DSA']}}}, 'hash_function': {'__update__': {'SHA': {'__update__': {'SHA2': {'__update__': {'SHA-512': 3}}}}}}, 'crypto_scheme': {'__update__': {'MAC': {'__update__': {'MAC': 2}}, 'KA': {'__delete__': ['KA']}}}, 'randomness': {'__update__': {'RNG': {'__update__': {'RNG': 16}}}}, 'side_channel_analysis': {'__update__': {'SCA': {'__update__': {'SPA': 1, 'DPA': 2}}}}, 'standard_id': {'__insert__': {'BSI': {'AIS31': 1}}, '__update__': {'FIPS': {'__insert__': {'FIPS PUB 186-3': 1}, '__update__': {'FIPS PUB 197': 5}, '__delete__': ['FIPS PUB 140-2']}, 'PKCS': {'__update__': {'PKCS#1': 3}}}}, 'javacard_api_const': {'__update__': {'misc': {'__update__': {'TYPE_ACCESS': 5}}}}, 'javacard_packages': {'__insert__': {'java': {'java.rmi': 2}, 'com': {'com.oberthurcs.javacard': 3}}, '__update__': {'javacard': {'__insert__': {'javacard.crypto': 1, 'javacard.framework': 4}, '__update__': {'javacard.security': 4}}, 'javacardx': {'__insert__': {'javacardx.framework.util': 1}, '__update__': {'javacardx.crypto': 2}}}}, 'certification_process': {'__update__': {'OutOfScope': {'__delete__': ['. That point is out of scope of this Security Target, though']}}}} data.

    The computed heuristics were updated.

    • The report_references property was updated, with the {'indirectly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2019/36', 'ANSSI-CC-2019/34', 'ANSSI-CC-2022/33', 'ANSSI-CC-2019/35']}}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}]} values discarded.
  • 07.08.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The report_references property was updated, with the {'indirectly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2019/47', 'ANSSI-CC-2019/48', 'ANSSI-CC-2019/33', 'ANSSI-CC-2019/49', 'ANSSI-CC-2019/50']}}} data.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The Maintenance Updates of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.common_criteria.CommonCriteriaCert.MaintenanceReport', 'maintenance_date': '2017-11-20', 'maintenance_title': 'Plateforme ID -One Cosmo v8.1-N - Large, masquée sur le composant NXP P6022M VB Identification du matériel 084022', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2017_49_m01.pdf', 'maintenance_st_link': None}, {'_type': 'sec_certs.sample.common_criteria.CommonCriteriaCert.MaintenanceReport', 'maintenance_date': '2019-01-24', 'maintenance_title': 'Plateforme ID -One Cosmo v8.1-N - Large, masquée sur le composant NXP P6022M VB Identification du matériel 084022', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2017_49_m02.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/files/epfiles/anssi-cible-cc-2017_49en(1).pdf'}, {'_type': 'sec_certs.sample.common_criteria.CommonCriteriaCert.MaintenanceReport', 'maintenance_date': '2017-11-20', 'maintenance_title': 'Plateforme ID-One Cosmo v8.1-N - Large, masquée sur le composant NXP P6022M VB Identification du matériel 084022', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2017_49_m01.pdf', 'maintenance_st_link': None}, {'_type': 'sec_certs.sample.common_criteria.CommonCriteriaCert.MaintenanceReport', 'maintenance_date': '2017-11-20', 'maintenance_title': 'ANSSI-CC-2017/49-M01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2017_49_m01.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/files/epfiles/anssi-cible-cc-2017_49en(1).pdf'}, {'_type': 'sec_certs.sample.common_criteria.CommonCriteriaCert.MaintenanceReport', 'maintenance_date': '2020-01-21', 'maintenance_title': 'ANSSI-CC-2017/49-M03', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2017_49-m03fr.pdf', 'maintenance_st_link': None}, {'_type': 'sec_certs.sample.common_criteria.CommonCriteriaCert.MaintenanceReport', 'maintenance_date': '2020-04-24', 'maintenance_title': 'Reassessment report: ANSSI-CC-2017/49-S02', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC-2017_49-S02.pdf', 'maintenance_st_link': None}]}.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}]}.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.ssi.gouv.fr/', 'mailto:certification@ssi.gouv.fr']}} values inserted.
    • The st_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': []}} values inserted.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0973-V2-2016': 4}, 'FR': {'ANSSI-CC-2017/49': 36}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0084-2014': 1}, 'ANSSI': {'ANSSI-CC-PP-2010/03-': 1}}, 'cc_security_level': {'EAL': {'EAL 5': 3, 'EAL5': 1, 'EAL7': 1, 'EAL2': 1, 'EAL 1': 1, 'EAL 2': 1, 'EAL 3': 1, 'EAL 4': 1, 'EAL 6': 1, 'EAL 7': 1, 'EAL 5+': 1}, 'ITSEC': {'ITSEC E6 Elevé': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE': 4, 'AGD_PRE': 3}, 'ALC': {'ALC_DVS.2': 3, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_FLR': 1, 'ALC_LCD': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.5': 4, 'AVA_VAN': 2}, 'ASE': {'ASE_TSS.2': 1, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {'T': {'T': 1}}, 'vendor': {'NXP': {'NXP': 30, 'NXP Semiconductors': 2}, 'Oberthur': {'Oberthur Technologies': 2, 'OBERTHUR': 7}}, 'eval_facility': {'CEA-LETI': {'CEA - LETI': 1}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 3}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 3}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 2}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2012-09-001': 1, 'CCMB-2012-09-002': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0955-V2-2016': 4, 'BSI-DSZ-CC-0973-V2': 3, 'BSI-DSZ-CC-0955-V2': 3}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 1}, 'ANSSI': {'ANSSI-CC-PP-2010/03_M01': 1}}, 'cc_security_level': {'EAL': {'EAL5+': 4, 'EAL5': 10, 'EAL 5+': 3, 'EAL5 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 6, 'ADV_FSP.1': 4, 'ADV_TDS.1': 2, 'ADV_FSP.5': 9, 'ADV_TDS.4': 8, 'ADV_IMP.1': 10, 'ADV_TDS.3': 4, 'ADV_INT.2': 1, 'ADV_FSP.2': 2, 'ADV_FSP.4': 1, 'ADV_IMP': 1, 'ADV_ARC': 1, 'ADV_COMP': 1}, 'AGD': {'AGD_PRE': 12, 'AGD_OPE': 2, 'AGD_OPE.1': 9, 'AGD_PRE.1': 6}, 'ALC': {'ALC_DVS.2': 19, 'ALC_TAT.1': 2, 'ALC_TAT.2': 3, 'ALC_CMC.4': 1, 'ALC_CMS.1': 1, 'ALC_DVS.1': 2, 'ALC_LCD.1': 3, 'ALC_CMS.5': 2, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.2': 3, 'ATE_FUN.1': 7, 'ATE_DPT.3': 2, 'ATE_COV.1': 2, 'ATE_IND.2': 1, 'ATE_DPT.1': 1}, 'AVA': {'AVA_VAN.5': 20, 'AVA_VAN': 8}, 'ASE': {'ASE_TSS.2': 6, 'ASE_CCL.1': 1, 'ASE_ECD.1': 5, 'ASE_INT.1': 5, 'ASE_REQ.1': 2, 'ASE_REQ.2': 3, 'ASE_OBJ.2': 3, 'ASE_SPD.1': 3, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_STG.2': 9, 'FAU_ARP.1': 22, 'FAU_ARP.1.1': 1, 'FAU_STG.2.1': 1, 'FAU_STG.2.2': 1, 'FAU_STG.2.3': 1, 'FAU_SAA.1': 3, 'FAU_GEN.1': 2, 'FAU_SAS.1': 1}, 'FCS': {'FCS_RNG': 2, 'FCS_RNG.1': 4, 'FCS_RNG.1.1': 1, 'FCS_RNG.1.2': 1, 'FCS_CKM.1': 23, 'FCS_CKM.1.1': 1, 'FCS_CKM.2': 13, 'FCS_CKM.2.1': 1, 'FCS_CKM.3': 10, 'FCS_CKM.3.1': 1, 'FCS_CKM.4': 23, 'FCS_CKM.4.1': 1, 'FCS_COP.1': 30, 'FCS_COP.1.1': 1, 'FCS_COP': 1}, 'FDP': {'FDP_ROL.1': 2, 'FDP_SDI.2': 12, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_ACC': 1, 'FDP_ACF': 1, 'FDP_RIP.1': 1, 'FDP_ACC.1': 24, 'FDP_IFC.1': 21, 'FDP_ACF.1': 6, 'FDP_IFF.1': 2, 'FDP_ITC.1': 7, 'FDP_ITC.2': 7, 'FDP_SDC.1': 1, 'FDP_ITT.1': 1}, 'FIA': {'FIA_UID.1': 12, 'FIA_ATD.1': 1, 'FIA_UAU.1': 7}, 'FMT': {'FMT_SMF.1': 26, 'FMT_SMF.1.1': 1, 'FMT_SMR.1': 51, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MSA': 1, 'FMT_SMF': 1, 'FMT_MSA.3': 9, 'FMT_MSA.1': 12, 'FMT_MTD.1': 2, 'FMT_LIM.1': 1, 'FMT_LIM.2': 1}, 'FPR': {'FPR_UNO.1': 14, 'FPR_UNO.1.1': 1}, 'FPT': {'FPT_TST.1': 11, 'FPT_FLS.1': 19, 'FPT_FLS.1.1': 2, 'FPT_TDC.1': 10, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_PHP.3': 2, 'FPT_ITT.1': 1}, 'FRU': {'FRU_FLT.2': 1}, 'FTP': {'FTP_ITC.1': 4, 'FTP_TRP.1': 4}}, 'cc_claims': {'D': {'D.BIO': 12, 'D.CONFIG': 4, 'D.SENSITIVE_DATA': 2, 'D.ARRAY': 5, 'D.JCS_KEYS': 7, 'D.APP_CODE': 6, 'D.APP_C_DATA': 3, 'D.APP_I_DATA': 4, 'D.PIN': 9, 'D.API_DATA': 3, 'D.CRYPTO': 4, 'D.JCS_CODE': 3, 'D.JCS_DATA': 5, 'D.SEC_DATA': 7, 'D.NB_REMAINTRYGLB': 1}, 'O': {'O': 1, 'O.IC': 2, 'O.TOE': 2, 'O.CARD_MANAGEMENT': 52, 'O.SCP.SUPPORT': 22, 'O.SCP.IC': 12, 'O.SCP.RECOVERY': 24, 'O.RESIDENT_APPLICATION': 23, 'O.SECURE_COMPARE': 10, 'O.PATCH_LOADING': 26, 'O.OPERATE': 39, 'O.BIO-': 2, 'O.SID': 33, 'O.FIREWALL': 65, 'O.GLOBAL_ARRAYS_CONFID': 20, 'O.GLOBAL_ARRAYS_INTEG': 13, 'O.NATIVE': 14, 'O.REALLOCATION': 19, 'O.RESOURCES': 26, 'O.ALARM': 27, 'O.CIPHER': 19, 'O.KEY-MNGT': 27, 'O.PIN-MNGT': 27, 'O.BIO-MNGT': 25, 'O.TRANSACTION': 19, 'O.OBJ-DELETION': 9, 'O.DELETION': 15, 'O.LOAD': 17, 'O.INSTALL': 18, 'O.PIN-': 3, 'O.REMOTE': 4, 'O.APPLET': 16, 'O.CODE_PKG': 22, 'O.JAVAOBJECT': 47, 'O.REMOTE_MTHD': 1, 'O.REMOTE_OBJ': 1, 'O.ROR': 1, 'O.GLOBAL_ARRRAYS_INTEG': 1, 'O.GLOBAL_ARRRAYS_CONFID': 2, 'O.RND': 1, 'O.TDES': 1, 'O.AES': 1, 'O.CUST_RECONF_PLAIN': 1, 'O.FM_FW': 1, 'O.MEM_ACCESS': 1, 'O.SFR_ACCESS': 1, 'O.PUF': 1}, 'T': {'T': 3, 'T.CONFIGURATION': 5, 'T.CONF_DATA_APPLET': 5, 'T.PATCH_LOADING': 5, 'T.OPERATE': 1, 'T.CONFID-APPLI-DATA': 18, 'T.CONFID-JCS-CODE': 6, 'T.CONFID-JCS-DATA': 11, 'T.INTEG-APPLI-CODE': 7, 'T.INTEG-APPLI-CODE.LOAD': 4, 'T.INTEG-APPLI-DATA': 18, 'T.INTEG-APPLI-DATA.LOAD': 3, 'T.INTEG-JCS-CODE': 6, 'T.INTEG-JCS-DATA': 12, 'T.NATIVE': 6, 'T.RESOURCES': 8, 'T.DELETION': 6, 'T.INSTALL': 6, 'T.OBJ-DELETION': 4, 'T.PHYSICAL': 4, 'T.EXE-CODE-REMOTE': 3, 'T.INTEG-APPLI-': 5, 'T.INTEG-': 2, 'T.EXE-': 1, 'T.IC': 2, 'T.RND': 1}, 'A': {'A.IC': 2, 'A.DELETION': 3, 'A.OPERATE': 1, 'A.LOAD': 6, 'A.APPLET': 5, 'A.VERIFICATION': 5}, 'R': {'R.IC': 2, 'R.TOE': 2}, 'OP': {'OP.ARRAY_ACCESS': 9, 'OP.CREATE': 7, 'OP.DELETE_APPLET': 4, 'OP.DELETE_PCKG': 3, 'OP.DELETE_PCKG_APPLET': 3, 'OP.FLOW': 3, 'OP.IMPORT_KEY': 2, 'OP.INSTANCE_FIELD': 6, 'OP.INVK_INTERFACE': 7, 'OP.INVK_VIRTUAL': 6, 'OP.JAVA': 5, 'OP.THROW': 5, 'OP.TYPE_ACCESS': 5, 'OP.LOCAL_STACK_ACCESS': 3, 'OP.OPERAND_STACK_ACCE': 1, 'OP.PUT': 6, 'OP.RET_RORD': 1, 'OP.STATIC_FIELD': 3, 'OP.OPERAND_STACK_ACCESS': 2}, 'OE': {'OE': 3, 'OE.VERIFICATION': 39, 'OE.CODE-EVIDENCE': 19, 'OE.CARD_MANAGEMENT': 3, 'OE.SCP.IC': 2, 'OE.SCP.SUPPORT': 2, 'OE.SCP.RECOVERY': 2, 'OE.APPLET': 9, 'OE.CODE-': 2, 'OE.CHECK-INIT': 1}, 'OSP': {'OSP.VERIFICATION': 5}}, 'vendor': {'NXP': {'NXP': 24}, 'Oberthur': {'Oberthur Technologies': 35, 'Oberthur': 13}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 24}}, 'DES': {'DES': {'DES': 35}, '3DES': {'TDES': 18, 'Triple-DES': 1}}, 'constructions': {'MAC': {'HMAC': 2, 'CMAC': 1}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 2}, 'ECDSA': {'ECDSA': 4}, 'ECC': {'ECC': 9}}, 'FF': {'DH': {'DH': 2, 'Diffie-Hellman': 5}, 'DSA': {'DSA': 5}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 5, 'SHA1': 1}, 'SHA2': {'SHA-224': 4, 'SHA-384': 4, 'SHA-256': 4, 'SHA-512': 2}, 'SHA3': {'SHA3-224': 2, 'SHA3-256': 2, 'SHA3-384': 2, 'SHA3-512': 2, 'SHA-3': 3, 'SHA3': 4}}}, 'crypto_scheme': {'MAC': {'MAC': 6}, 'KA': {'Key Agreement': 3, 'KA': 18, 'Key agreement': 1}}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 17, 'RND': 2}}, 'cipher_mode': {'ECB': {'ECB': 3}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 2, 'physical probing': 4, 'SPA': 16, 'DPA': 1}, 'FI': {'physical tampering': 2, 'malfunction': 2, 'Malfunction': 2, 'fault injection': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 46-3': 4, 'FIPS PUB 81': 6, 'FIPS PUB 197': 6, 'FIPS PUB 180-3': 2, 'FIPS PUB 202': 3, 'FIPS 140-2': 1, 'FIPS PUB 140-2': 1}, 'NIST': {'NIST SP 800-90': 2}, 'PKCS': {'PKCS#1': 4}, 'ISO': {'ISO/IEC 7816': 2, 'ISO/IEC 14443': 2, 'ISO/IEC 9797': 8, 'ISO/IEC 9796-': 1, 'ISO/IEC 7816-6': 1, 'ISO/IEC 9796-1': 1, 'ISO/IEC 9797-1': 1}, 'SCP': {'SCP02': 4, 'SCP03': 5}}, 'javacard_version': {'JavaCard': {'Java Card 3.0.4': 4}, 'GlobalPlatform': {'Global Platform 2.2.1': 2}}, 'javacard_api_const': {'misc': {'TYPE_ACCESS': 3}}, 'javacard_packages': {'javacard': {'javacard.security': 2}, 'javacardx': {'javacardx.biometry': 1, 'javacardx.security': 1, 'javacardx.crypto': 1}}, 'certification_process': {'OutOfScope': {'out of scope': 1, '. That point is out of scope of this Security Target, though': 1, 'a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are': 1}}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': 'e7b7e38b2f83d93902feb5120ed29aafe5c3a401495485aa5be0426a9e41445f', 'st_pdf_hash': '5091a06e7662832af51a423f5941d1f1600a8c3d4c4f7cbabe897d34ad399cda', 'report_txt_hash': 'f21d59943a64c72866d0b4491029120b12c0b921e58002156de396dffc9ef7e9', 'st_txt_hash': '24413aba53a23aeac8194bbd3dc9f08ff18e82b1c594b13e9f252a4c5df88785'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {'DES': 3}, 'rules_asymmetric_crypto': {'ECC': 3}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {}, 'rules_randomness': {}, 'rules_tee': {'SE': 2}, 'rules_side_channels': {}} values inserted.
    • The st_keywords property was updated, with the {'rules_symmetric_crypto': {'AES': 24, 'DES': 17, 'TDES': 18, 'HMAC': 2}, 'rules_asymmetric_crypto': {'ECDH': 2, 'ECDSA': 4, 'ECC': 9, 'DH': 2, 'Diffie-Hellman': 4, 'DSA': 5}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA-1': 5, 'SHA1': 1, 'SHA-224': 4, 'SHA-384': 4, 'SHA-256': 4, 'SHA-512': 2, 'SHA3-224': 2, 'SHA3-256': 2, 'SHA3-384': 2, 'SHA3-512': 2, 'SHA-3': 3, 'SHA3': 4}, 'rules_crypto_schemes': {'MAC': 6}, 'rules_randomness': {'RNG': 17, 'RND': 2}, 'rules_tee': {}, 'rules_side_channels': {'malfunction': 2, 'Malfunction': 2, 'Leak-Inherent': 2, 'physical probing': 4, 'physical tampering': 2, 'SPA': 1, 'DPA': 1, 'fault injection': 1}} values inserted.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}]}}.
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/71', 'ANSSI-CC-2018/05', 'ANSSI-CC-2017/72', 'ANSSI-CC-2018/16', 'ANSSI-CC-2017/68', 'ANSSI-CC-2018/03', 'ANSSI-CC-2018/15', 'ANSSI-CC-2018/04', 'ANSSI-CC-2018/06', 'ANSSI-CC-2017/70', 'ANSSI-CC-2018/18', 'ANSSI-CC-2018/17', 'ANSSI-CC-2017/69']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/71', 'ANSSI-CC-2018/05', 'ANSSI-CC-2017/72', 'ANSSI-CC-2018/16', 'ANSSI-CC-2017/68', 'ANSSI-CC-2018/03', 'ANSSI-CC-2018/15', 'ANSSI-CC-2018/04', 'ANSSI-CC-2018/06', 'ANSSI-CC-2017/70', 'ANSSI-CC-2018/18', 'ANSSI-CC-2018/17', 'ANSSI-CC-2017/69']}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0955-V2', 'BSI-DSZ-CC-0973-V2', 'BSI-DSZ-CC-0955-V2-2016']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0955-V2', 'BSI-DSZ-CC-0973-V2', 'BSI-DSZ-CC-0955-V2-2016']}}, 'report_references': {'_type': 'References', 'directly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/71', 'ANSSI-CC-2018/05', 'ANSSI-CC-2017/72', 'ANSSI-CC-2018/16', 'ANSSI-CC-2018/03', 'ANSSI-CC-2018/15', 'ANSSI-CC-2018/04', 'ANSSI-CC-2018/06', 'ANSSI-CC-2017/70', 'ANSSI-CC-2018/18', 'ANSSI-CC-2018/17', 'ANSSI-CC-2017/69', 'ANSSI-CC-2019/28']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2018/16', 'ANSSI-CC-2017/72', 'ANSSI-CC-2020/51', 'ANSSI-CC-2020/36', 'ANSSI-CC-2020/38', 'ANSSI-CC-2018/06', 'ANSSI-CC-2020/53', 'ANSSI-CC-2017/70', 'ANSSI-CC-2018/17', 'ANSSI-CC-2017/69', 'ANSSI-CC-2017/71', 'ANSSI-CC-2018/05', 'ANSSI-CC-2020/35', 'ANSSI-CC-2018/03', 'ANSSI-CC-2020/50', 'ANSSI-CC-2019/41', 'ANSSI-CC-2018/04', 'ANSSI-CC-2018/15', 'ANSSI-CC-2019/43', 'ANSSI-CC-2020/37', 'ANSSI-CC-2018/18', 'ANSSI-CC-2020/52', 'ANSSI-CC-2020/26', 'ANSSI-CC-2019/28']}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0973-V2-2016']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0973-2016', 'BSI-DSZ-CC-0973-V2-2016']}}}.
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['8.1']}.
    • The directly_affected_by property was set to {'_type': 'Set', 'elements': ['ANSSI-CC-2017/71', 'ANSSI-CC-2018/05', 'ANSSI-CC-2017/72', 'ANSSI-CC-2018/16', 'ANSSI-CC-2018/03', 'ANSSI-CC-2018/15', 'ANSSI-CC-2018/04', 'ANSSI-CC-2018/06', 'ANSSI-CC-2017/70', 'ANSSI-CC-2018/18', 'ANSSI-CC-2018/17', 'ANSSI-CC-2017/69', 'ANSSI-CC-2019/28']}.
  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Plateforme ID-One Cosmo v8.1-N- Large masquée sur le composant NXP P6022M VB was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/files/epfiles/certificat%20ANSSI-CC-2017_49-S02.pdf",
  "dgst": "9a22a2bb323cfd0f",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2017/49",
    "cert_lab": [
      "CEA"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "8.1"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2019/28",
          "ANSSI-CC-2018/15",
          "ANSSI-CC-2018/17",
          "ANSSI-CC-2018/18",
          "ANSSI-CC-2018/16"
        ]
      },
      "directly_referencing": null,
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2019/48",
          "ANSSI-CC-2019/34",
          "ANSSI-CC-2018/16",
          "ANSSI-CC-2022/33",
          "ANSSI-CC-2020/50",
          "ANSSI-CC-2019/43",
          "ANSSI-CC-2020/38",
          "ANSSI-CC-2020/52",
          "ANSSI-CC-2020/26",
          "ANSSI-CC-2020/51",
          "ANSSI-CC-2019/49",
          "ANSSI-CC-2020/35",
          "ANSSI-CC-2020/36",
          "ANSSI-CC-2019/41",
          "ANSSI-CC-2020/37",
          "ANSSI-CC-2019/28",
          "ANSSI-CC-2018/15",
          "ANSSI-CC-2019/35",
          "ANSSI-CC-2018/17",
          "ANSSI-CC-2019/43-R01",
          "ANSSI-CC-2019/36",
          "ANSSI-CC-2019/47",
          "ANSSI-CC-2018/18",
          "ANSSI-CC-2019/33",
          "ANSSI-CC-2019/50",
          "ANSSI-CC-2020/53"
        ]
      },
      "indirectly_referencing": null
    },
    "scheme_data": {
      "cert_id": "2017/49",
      "description": "Le produit certfi\u00e9 est la plateforme ouverte Java Card : \u00ab plateforme ID-One Cosmo v8.1-N - Large, masqu\u00e9e sur le composant NXP P6022M VB \u00bb dont l\u2019identification du mat\u00e9riel est 084021. La version de la plateforme \u00e9valu\u00e9e inclut les patchs identifi\u00e9s au chapitre 1.2.4 du pr\u00e9sent rapport. Elle est d\u00e9velopp\u00e9e par OBERTHUR TECHNOLOGIES et embarqu\u00e9e sur le microcontr\u00f4leur NXP P6022M VB, d\u00e9velopp\u00e9 et f",
      "developer": "Oberthur Technologies, NXP Semiconductors GmbH",
      "enhanced": {
        "augmented": "ALC_DVS.2, AVA_VAN.5",
        "category": "Cartes \u00e0 puce",
        "cc_version": "Crit\u00e8res Communs version 3.1r4",
        "cert_id": "2017/49",
        "cert_link": "https://cyber.gouv.fr/sites/default/files/2017/09/certificat-anssi-cc-2017_49-s02.pdf",
        "certification_date": "05/09/2017",
        "developer": "Oberthur Technologies, NXP Semiconductors GmbH",
        "evaluation_facility": "CEA - LETI",
        "expiration_date": "24/04/2025",
        "level": "EAL5+",
        "mutual_recognition": "SOG-IS\n                          CCRA",
        "protection_profile": "PP JCS-O",
        "report_link": "https://cyber.gouv.fr/sites/default/files/2017/09/anssi-cc-2017_49fr.pdf",
        "sponsor": "Oberthur Technologies",
        "target_link": "https://cyber.gouv.fr/sites/default/files/2017/09/anssi-cible-cc-2017_49-m03en.pdf"
      },
      "expiration_date": "24 Avril 2025",
      "level": "EAL5+",
      "product": "Plateforme ID-One Cosmo v8.1-N - Large, masqu\u00e9e sur le composant NXP P6022M VB",
      "sponsor": "Oberthur Technologies",
      "url": "https://cyber.gouv.fr/produits-certifies/plateforme-id-one-cosmo-v81-n-large-masquee-sur-le-composant-nxp-p6022m-vb"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2020-01-21",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2017_49-m03fr.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "ANSSI-CC-2017/49-M03"
      },
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2017-11-20",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2017_49_m01.pdf",
        "maintenance_st_link": "https://www.commoncriteriaportal.org/files/epfiles/anssi-cible-cc-2017_49en(1).pdf",
        "maintenance_title": "ANSSI-CC-2017/49-M01"
      },
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2017-11-20",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2017_49_m01.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "Plateforme ID-One Cosmo v8.1-N - Large, masqu\u00e9e sur le composant NXP P6022M VB Identification du mat\u00e9riel 084022"
      },
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2019-01-24",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2017_49_m02.pdf",
        "maintenance_st_link": "https://www.commoncriteriaportal.org/files/epfiles/anssi-cible-cc-2017_49en(1).pdf",
        "maintenance_title": "Plateforme ID -One Cosmo v8.1-N - Large, masqu\u00e9e sur le composant NXP P6022M VB Identification du mat\u00e9riel 084022"
      },
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2020-04-24",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC-2017_49-S02.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "Reassessment report: ANSSI-CC-2017/49-S02"
      },
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2017-11-20",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2017_49_m01.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "Plateforme ID -One Cosmo v8.1-N - Large, masqu\u00e9e sur le composant NXP P6022M VB Identification du mat\u00e9riel 084022"
      }
    ]
  },
  "manufacturer": "Oberthur Technologies",
  "manufacturer_web": "https://www.oberthur.com/",
  "name": "Plateforme ID-One Cosmo v8.1-N- Large masqu\u00e9e sur le composant NXP P6022M VB",
  "not_valid_after": "2025-04-24",
  "not_valid_before": "2017-09-05",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "ANSSI-CC-2017_49fr.pdf",
    "report_frontpage": {
      "FR": {
        "cc_security_level": "EAL 5 augment\u00e9 ALC_DVS.2, AVA_VAN.5",
        "cc_version": "Crit\u00e8res Communs version 3.1 r\u00e9vision 4",
        "cert_id": "ANSSI-CC-2017/49",
        "cert_item": "Plateforme ID-One Cosmo v8.1-N - Large, masqu\u00e9e sur le composant NXP P6022M VB",
        "cert_item_version": "Identification du mat\u00e9riel 084021 Identification du patch g\u00e9n\u00e9rique 089041 Identification du patch additionnel 086684",
        "cert_lab": "CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France",
        "developer": "Oberthur Technologies 420 rue d\u2019Estienne d\u2019Orves, 92700 Colombes, France NXP Semiconductors GmbH Stresemannallee 101, 22539 Hamburg, Allemagne Commanditaire Oberthur Technologies 420 rue d\u2019Estienne d\u2019Orves, 92700 Colombes, France",
        "match_rules": [
          "R\u00e9f\u00e9rence du rapport de certification(.+)Nom du produit(.+)R\u00e9f\u00e9rence/version du produit(.*)Conformit\u00e9 \u00e0 un profil de protection(.+)Crit\u00e8res d\u2019\u00e9valuation et version(.+)Niveau d\u2019\u00e9valuation(.+)D\u00e9veloppeurs(.+)Centre d\u2019\u00e9valuation(.+)Accords de reconnaissance applicables"
        ],
        "ref_protection_profiles": "PP JCS-O] Java Card Protection Profile Open Configuration, version 3.0"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 3
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0973-V2-2016": 3
        },
        "FR": {
          "ANSSI-CC-2017/49": 18
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "ANSSI": {
          "ANSSI-CC-PP-2010/03-": 1
        },
        "BSI": {
          "BSI-PP-0084-2014": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_FSP": 1,
          "ADV_IMP": 1,
          "ADV_INT": 1,
          "ADV_SPM": 1,
          "ADV_TDS": 1
        },
        "AGD": {
          "AGD_OPE": 4,
          "AGD_PRE": 3
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMS": 1,
          "ALC_DEL": 1,
          "ALC_DVS": 1,
          "ALC_DVS.2": 3,
          "ALC_FLR": 2,
          "ALC_TAT": 1
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_ECD": 1,
          "ASE_INT": 1,
          "ASE_OBJ": 1,
          "ASE_REQ": 1,
          "ASE_SPD": 1,
          "ASE_TSS": 1,
          "ASE_TSS.2": 1
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_DPT": 1,
          "ATE_FUN": 1,
          "ATE_IND": 1
        },
        "AVA": {
          "AVA_VAN": 2,
          "AVA_VAN.5": 5
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 3": 1,
          "EAL 5": 3,
          "EAL 7": 1,
          "EAL2": 2,
          "EAL5": 1,
          "EAL7": 1
        },
        "ITSEC": {
          "ITSEC E6 Elev\u00e9": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "CEA-LETI": {
          "CEA - LETI": 1
        },
        "CESTI": {
          "CESTI": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2012-09-001": 1,
          "CCMB-2012-09-002": 1,
          "CCMB-2012-09-003": 1,
          "CCMB-2012-09-004": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 30,
          "NXP Semiconductors": 2
        },
        "Oberthur": {
          "OBERTHUR": 7,
          "Oberthur Technologies": 2
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Christian Benardeau",
      "/CreationDate": "D:20170908111651+02\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2010",
      "/Keywords": "ANSSI-CC-CER-F-07.025",
      "/ModDate": "D:20170908111651+02\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2010",
      "/Subject": "ID-One Cosmo v8.1-N - Large, masqu\u00e9e sur le composant NXP\u00a0P6022M\u00a0VB",
      "/Title": "ANSSI-CC-2017/49",
      "pdf_file_size_bytes": 1020447,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "mailto:certification@ssi.gouv.fr",
          "http://www.ssi.gouv.fr/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 17
    },
    "st_filename": null,
    "st_frontpage": null,
    "st_keywords": null,
    "st_metadata": null
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC-2017_49fr.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL5+",
      "AVA_VAN.5",
      "ALC_DVS.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/anssi-cible-cc-2017_49en.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "e7b7e38b2f83d93902feb5120ed29aafe5c3a401495485aa5be0426a9e41445f",
      "txt_hash": "f21d59943a64c72866d0b4491029120b12c0b921e58002156de396dffc9ef7e9"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    }
  },
  "status": "active"
}