Microcontrôleur sécurisé ATMEL AT91SC464384RCU
CSV information ?
Status | archived |
---|---|
Valid from | 17.12.2008 |
Valid until | 01.09.2019 |
Scheme | 🇫🇷 FR |
Manufacturer | ATMEL Secure Products Division |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | ALC_DVS.2, AVA_MSU.3, EAL4+, AVA_VLA.4, ADV_IMP.2 |
Maintenance updates | Rapport de maintenance ANSSI-CC-2008/36-M01 (19.03.2010) Certification report |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Symmetric Algorithms
DES, TDESAsymmetric Algorithms
ECC, DSAHash functions
SHA-1Randomness
RNGDevice models
ATMEL AT91SC464384RCUVendor
Infineon Technologies, Thales, PhilipsSecurity level
EAL 4, EAL4, EAL7, EAL 1, EAL 3, EAL 5, EAL 7, EAL5+, ITSEC E6 etSecurity Assurance Requirements (SAR)
ACM_AUT, ACM_CAP, ACM_SCP, ADO_DEL, ADO_IGS, ADV_IMP.2, ADV_FSP, ADV_HLD, ADV_IMP, ADV_INT, ADV_LLD, ADV_RCR, ADV_SPM, AGD_ADM, AGD_USR, ALC_DVS.2, ALC_FLR, ALC_DVS, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_MSU.3, AVA_VLA.4, AVA_CCA, AVA_MSU, AVA_SOF, AVA_VLAProtection profiles
BSI-PP-002-2001, BSI-PP-0002-2001Certificates
DCSSI-2008/36Evaluation facilities
CESTIStandards
AIS 34, AIS34, ISO/IEC 15408:2005, ISO/IEC 18045:2005, CCMB-2005-08-001, CCMB-2005-08-002, CCMB-2005-08-003, CCMB-2005-08-004File metadata
Creation date | D:20081218150123Z |
---|---|
Modification date | D:20091110144948+01'00' |
Pages | 18 |
Creator | PScript5.dll Version 5.2.2 |
Producer | GPL Ghostscript 8.15 |
Security target ?
Extracted keywords
Symmetric Algorithms
DES, TDESAsymmetric Algorithms
ECC, DSAHash functions
SHA-1Schemes
MACRandomness
RNG, RNDLibraries
Atmel Toolbox 28, Atmel Toolbox 02.03.12.00Vendor
ThalesSecurity level
EAL4, EAL4+, EAL4 augmentedClaims
D.CPU_ROM_DATA, D.CRYPTO_ROM_DATA, D.EEPROM_DATA, D.CPU_RAM_DATA, D.ADVX_RAM_DATA, D.PERIPH_DATA, D.CPU_ROM_SOFT, D.CRYPTO_ROM_SOFT, D.EEPROM_SOFT, D.CPU_ROM_DSOFT, D.CRYPTO_ROM_DSOFT, D.EEPROM_DSOFT, D.RNG_DATA, D.IC_SPEC, D.DESIGN, D.DEV_TOOLS, D.TECHNO, D.MASK, D.CRYPTO_RAM_DATA, O.RND, T.RNDSecurity Assurance Requirements (SAR)
ACM_AUT, ACM_CAP, ACM_SCP, ACM_AUT.1, ACM_CAP.4, ACM_SCP.2, ADO_DEL, ADO_IGS, ADO_DEL.2, ADO_IGS.1, ADV_IMP.2, ADV_SPM.1, ADV_FSP, ADV_HLD, ADV_IMP, ADV_LLD, ADV_RCR, ADV_SPM, ADV_FSP.2, ADV_HLD.2, ADV_LLD.1, ADV_RCR.2, ADV_SPM.2, AGD_ADM, AGD_USR, AGD_ADM.1, AGD_USR.1, ALC_DVS.2, ALC_DVS, ALC_FLR, ALC_LCD, ALC_TAT, ALC_LCD.2, ALC_TAT.2, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, ATE_COV.2, ATE_DPT.2, ATE_FUN.1, ATE_IND.2, AVA_VLA.4, AVA_MSU.3, AVA_MSU, AVA_SOF, AVA_VLA, AVA_CCA.1, AVA_SOF.1Security Functional Requirements (SFR)
FAU_SAS.1, FAU_SAS.1.1, FCS_RND.1, FCS_COP.1, FCS_RND.1.1, FCS_COP.1.1, FCS_CKM.1, FCS_CKM.4, FDP_ITT.1, FDP_IFC.1, FDP_ACC.2, FDP_ACF.1, FDP_ITT.1.1, FDP_ACC.1, FDP_IFC.1.1, FDP_IFF.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC.2.1, FDP_ACC.2.2, FDP_AFC.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FIA_UID.1, FMT_LIM.1, FMT_LIM.2, FMT_SMR.1, FMT_MSA.1, FMT_MOF.1, FMT_MSA.3, FMT_LIM.1.1, FMT_LIM.2.1, FMT_MSA.2, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MOF.1.1, FMT_SMF.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FPT_FLS.1, FPT_SEP.1, FPT_ITT.1, FPT_PHP.3, FPT_FLS.1.1, FPT_SEP.1.1, FPT_SEP.1.2, FPT_ITT.1.1, FPT_PHP.3.1, FRU_FLT.2Protection profiles
BSI-PP-002-2001, BSI-PP-002-, BSI-PP002-2001Side-channel analysis
Leak-Inherent, Physical Probing, physical probing, Physical probing, SPA, DPA, Malfunction, malfunction, reverse engineeringStandards
FIPS140-2, FIPS PUB 46-3, FIPS 140-2, ISO/IEC 3309File metadata
Title | Lightbird_ST.book |
---|---|
Author | sc188jb |
Creation date | D:20081030162507Z |
Modification date | D:20081030163012Z |
Pages | 77 |
Creator | FrameMaker 6.0 |
Producer | Acrobat Distiller 8.1.0 (Windows) |
Heuristics ?
Extracted SARs
ADV_FSP.2, ADV_HLD.2, ADV_IMP.2, ADV_LLD.1, ADV_RCR.2, ADV_SPM.2, AGD_ADM.1, AGD_USR.1, ALC_DVS.2, ALC_LCD.2, ALC_TAT.2, ATE_COV.2, ATE_DPT.2, ATE_FUN.1, ATE_IND.2, AVA_CCA.1, AVA_MSU.3, AVA_SOF.1, AVA_VLA.4Scheme data ?
Product | Microcontrôleurs sécurisés ATMEL AT91SC464384RCU (AT58U21) rév. B | |
---|---|---|
Url | https://cyber.gouv.fr/produits-certifies/microcontroleurs-securises-atmel-at91sc464384rcu-at58u21-rev-b | |
Description | Le microcontrôleur sécurisé 32 bits, portant la référence commerciale AT91SC464384RCU, issu de la famille AT91SC des composants pour cartes à puce, correspond à la puce de référence AT58U21, en révision B, basée sur le coeur ARM SC100. Les microcontrôleurs AT91SC464384RCU sont plutôt destinés à des cartes à puce supportant des applications de types bancaire, transactions sécurisées, télévision à p | |
Sponsor | Atmel SMS | |
Developer | Atmel SMS | |
Cert Id | ANSSI-CC-2008/36 | |
Level | EAL4+ | |
Enhanced | ||
Cert Id | ANSSI-CC-2008/36 | |
Certification Date | 17.12.2008 | |
Category | Micro-circuits | |
Cc Version | Critères Communs version 2.3 | |
Developer | Atmel SMS | |
Sponsor | Atmel SMS | |
Evaluation Facility | CEACI | |
Level | EAL4+ | |
Protection Profile | BSI-PP-0002-2001 | |
Mutual Recognition | SOG-IS CCRA | |
Augmented | ADV_IMP.2, ALC_DVS.2, AVA_MSU.3, AVA_VLA.4 | |
Target Link | https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi-cible_2008-36en.pdf | |
Report Link | https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi_2008-36fr.pdf |
References ?
No references are available for this certificate.
Updates ?
-
16.12.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'Microcontrôleurs sécurisés ATMEL AT91SC464384RCU (AT58U21) rév. B', 'url': 'https://cyber.gouv.fr/produits-certifies/microcontroleurs-securises-atmel-at91sc464384rcu-at58u21-rev-b', 'description': 'Le microcontrôleur sécurisé 32 bits, portant la référence commerciale AT91SC464384RCU, issu de la famille AT91SC des composants pour cartes à puce, correspond à la puce de référence AT58U21, en révision B, basée sur le coeur ARM SC100. Les microcontrôleurs AT91SC464384RCU sont plutôt destinés à des cartes à puce supportant des applications de types bancaire, transactions sécurisées, télévision à p', 'sponsor': 'Atmel SMS', 'developer': 'Atmel SMS', 'cert_id': 'ANSSI-CC-2008/36', 'level': 'EAL4+', 'enhanced': {'cert_id': 'ANSSI-CC-2008/36', 'certification_date': '2008-12-17', 'category': 'Micro-circuits', 'cc_version': 'Critères Communs version 2.3', 'developer': 'Atmel SMS', 'sponsor': 'Atmel SMS', 'evaluation_facility': 'CEACI', 'level': 'EAL4+', 'protection_profile': 'BSI-PP-0002-2001', 'mutual_recognition': 'SOG-IS CCRA', 'augmented': 'ADV_IMP.2, ALC_DVS.2, AVA_MSU.3, AVA_VLA.4', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi-cible_2008-36en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi_2008-36fr.pdf'}}
.
- The scheme_data property was set to
-
09.12.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': [], 'next_certificates': []}
.
- The following values were inserted:
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'Microcontrôleurs sécurisés ATMEL AT91SC464384RCU (AT58U21) rév. B', 'url': 'https://cyber.gouv.fr/produits-certifies/microcontroleurs-securises-atmel-at91sc464384rcu-at58u21-rev-b', 'description': 'Le microcontrôleur sécurisé 32 bits, portant la référence commerciale AT91SC464384RCU, issu de la famille AT91SC des composants pour cartes à puce, correspond à la puce de référence AT58U21, en révision B, basée sur le coeur ARM SC100. Les microcontrôleurs AT91SC464384RCU sont plutôt destinés à des cartes à puce supportant des applications de types bancaire, transactions sécurisées, télévision à p', 'sponsor': 'Atmel SMS', 'developer': 'Atmel SMS', 'cert_id': 'ANSSI-CC-2008/36', 'level': 'EAL4+', 'enhanced': {'cert_id': 'ANSSI-CC-2008/36', 'certification_date': '2008-12-17', 'category': 'Micro-circuits', 'cc_version': 'Critères Communs version 2.3', 'developer': 'Atmel SMS', 'sponsor': 'Atmel SMS', 'evaluation_facility': 'CEACI', 'level': 'EAL4+', 'protection_profile': 'BSI-PP-0002-2001', 'mutual_recognition': 'SOG-IS CCRA', 'augmented': 'ADV_IMP.2, ALC_DVS.2, AVA_MSU.3, AVA_VLA.4', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi-cible_2008-36en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi_2008-36fr.pdf'}}
.
- The scheme_data property was set to
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '187e1c96c1cd626c3d1cfcfd4bd3ee2df79006e503cb4afe14553690940aa981', 'txt_hash': 'e17b5f8a29d3e6a98d5b777982d52e1f3f63023f33a186ce1510a76b2409aa92'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '3b0c35ea77d16bc6358e3edd44df02077817d03ed7e68a5d6715dba40b6cd595', 'txt_hash': 'd446e26a55adcaa93a5c21eaf20a6e06515b4e3b8fadca9f8d6ec7d3b7f7a1d3'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 307640, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 18, '/CreationDate': 'D:20081218150123Z', '/Creator': 'PScript5.dll Version 5.2.2', '/Producer': 'GPL Ghostscript 8.15', '/ModDate': "D:20091110144948+01'00'", '/Title': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 623015, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 77, '/Author': 'sc188jb', '/CreationDate': 'D:20081030162507Z', '/Creator': 'FrameMaker 6.0', '/ModDate': 'D:20081030163012Z', '/Producer': 'Acrobat Distiller 8.1.0 (Windows)', '/Title': 'Lightbird_ST.book', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{'FR': {}}
. - The report_keywords property was set to
{'cc_cert_id': {'FR': {'DCSSI-2008/36': 19}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-002-2001': 2, 'BSI-PP-0002-2001': 1}}, 'cc_security_level': {'EAL': {'EAL 4': 2, 'EAL4': 3, 'EAL7': 1, 'EAL 1': 1, 'EAL 3': 1, 'EAL 5': 1, 'EAL 7': 1, 'EAL5+': 1}, 'ITSEC': {'ITSEC E6 et': 1}}, 'cc_sar': {'ACM': {'ACM_AUT': 1, 'ACM_CAP': 1, 'ACM_SCP': 1}, 'ADO': {'ADO_DEL': 1, 'ADO_IGS': 1}, 'ADV': {'ADV_IMP.2': 2, 'ADV_FSP': 1, 'ADV_HLD': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_LLD': 1, 'ADV_RCR': 1, 'ADV_SPM': 1}, 'AGD': {'AGD_ADM': 1, 'AGD_USR': 1}, 'ALC': {'ALC_DVS.2': 2, 'ALC_FLR': 2, 'ALC_DVS': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_MSU.3': 2, 'AVA_VLA.4': 2, 'AVA_CCA': 1, 'AVA_MSU': 1, 'AVA_SOF': 1, 'AVA_VLA': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Infineon': {'Infineon Technologies': 1}, 'Thales': {'Thales': 1}, 'Philips': {'Philips': 1}}, 'eval_facility': {'CESTI': {'CESTI': 2}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 3}, '3DES': {'TDES': 1}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 1}}, 'FF': {'DSA': {'DSA': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 1}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {'ATMEL': {'ATMEL AT91SC464384RCU': 20}}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS 34': 2, 'AIS34': 1}, 'ISO': {'ISO/IEC 15408:2005': 1, 'ISO/IEC 18045:2005': 1}, 'CC': {'CCMB-2005-08-001': 1, 'CCMB-2005-08-002': 1, 'CCMB-2005-08-003': 1, 'CCMB-2005-08-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-002-2001': 14, 'BSI-PP-002-': 1, 'BSI-PP002-2001': 1}}, 'cc_security_level': {'EAL': {'EAL4': 7, 'EAL4+': 1, 'EAL4 augmented': 1}}, 'cc_sar': {'ACM': {'ACM_AUT': 1, 'ACM_CAP': 1, 'ACM_SCP': 1, 'ACM_AUT.1': 1, 'ACM_CAP.4': 1, 'ACM_SCP.2': 1}, 'ADO': {'ADO_DEL': 1, 'ADO_IGS': 1, 'ADO_DEL.2': 1, 'ADO_IGS.1': 1}, 'ADV': {'ADV_IMP.2': 2, 'ADV_SPM.1': 1, 'ADV_FSP': 1, 'ADV_HLD': 1, 'ADV_IMP': 1, 'ADV_LLD': 1, 'ADV_RCR': 1, 'ADV_SPM': 1, 'ADV_FSP.2': 1, 'ADV_HLD.2': 1, 'ADV_LLD.1': 1, 'ADV_RCR.2': 1, 'ADV_SPM.2': 1}, 'AGD': {'AGD_ADM': 1, 'AGD_USR': 1, 'AGD_ADM.1': 1, 'AGD_USR.1': 1}, 'ALC': {'ALC_DVS.2': 2, 'ALC_DVS': 1, 'ALC_FLR': 1, 'ALC_LCD': 1, 'ALC_TAT': 1, 'ALC_LCD.2': 1, 'ALC_TAT.2': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1, 'ATE_COV.2': 1, 'ATE_DPT.2': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VLA.4': 2, 'AVA_MSU.3': 2, 'AVA_MSU': 1, 'AVA_SOF': 1, 'AVA_VLA': 1, 'AVA_CCA.1': 1, 'AVA_SOF.1': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 3, 'FAU_SAS.1.1': 1}, 'FCS': {'FCS_RND.1': 3, 'FCS_COP.1': 4, 'FCS_RND.1.1': 1, 'FCS_COP.1.1': 1, 'FCS_CKM.1': 1, 'FCS_CKM.4': 1}, 'FDP': {'FDP_ITT.1': 4, 'FDP_IFC.1': 6, 'FDP_ACC.2': 4, 'FDP_ACF.1': 4, 'FDP_ITT.1.1': 1, 'FDP_ACC.1': 4, 'FDP_IFC.1.1': 1, 'FDP_IFF.1': 1, 'FDP_ITC.1': 1, 'FDP_ITC.2': 1, 'FDP_ACC.2.1': 1, 'FDP_ACC.2.2': 1, 'FDP_AFC.1': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1}, 'FIA': {'FIA_UID.1': 1}, 'FMT': {'FMT_LIM.1': 4, 'FMT_LIM.2': 5, 'FMT_SMR.1': 7, 'FMT_MSA.1': 5, 'FMT_MOF.1': 4, 'FMT_MSA.3': 4, 'FMT_LIM.1.1': 1, 'FMT_LIM.2.1': 1, 'FMT_MSA.2': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MOF.1.1': 1, 'FMT_SMF.1': 2, 'FMT_MSA.1.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1}, 'FPT': {'FPT_FLS.1': 6, 'FPT_SEP.1': 3, 'FPT_ITT.1': 3, 'FPT_PHP.3': 3, 'FPT_FLS.1.1': 1, 'FPT_SEP.1.1': 1, 'FPT_SEP.1.2': 1, 'FPT_ITT.1.1': 1, 'FPT_PHP.3.1': 1}, 'FRU': {'FRU_FLT.2': 6}}, 'cc_claims': {'D': {'D.CPU_ROM_DATA': 2, 'D.CRYPTO_ROM_DATA': 2, 'D.EEPROM_DATA': 2, 'D.CPU_RAM_DATA': 2, 'D.ADVX_RAM_DATA': 1, 'D.PERIPH_DATA': 2, 'D.CPU_ROM_SOFT': 2, 'D.CRYPTO_ROM_SOFT': 2, 'D.EEPROM_SOFT': 2, 'D.CPU_ROM_DSOFT': 2, 'D.CRYPTO_ROM_DSOFT': 2, 'D.EEPROM_DSOFT': 2, 'D.RNG_DATA': 2, 'D.IC_SPEC': 1, 'D.DESIGN': 1, 'D.DEV_TOOLS': 1, 'D.TECHNO': 1, 'D.MASK': 1, 'D.CRYPTO_RAM_DATA': 1}, 'O': {'O.RND': 2}, 'T': {'T.RND': 2}}, 'vendor': {'Thales': {'Thales': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'DES': {'DES': {'DES': 3}, '3DES': {'TDES': 6}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 1}}, 'FF': {'DSA': {'DSA': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 1}}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 8, 'RND': 4}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'AtmelToolbox': {'Atmel Toolbox 28': 1, 'Atmel Toolbox 02.03.12.00': 1}}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 5, 'Physical Probing': 3, 'physical probing': 5, 'Physical probing': 1, 'SPA': 2, 'DPA': 4}, 'FI': {'Malfunction': 9, 'malfunction': 4}, 'other': {'reverse engineering': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS140-2': 1, 'FIPS PUB 46-3': 1, 'FIPS 140-2': 1}, 'ISO': {'ISO/IEC 3309': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
dcssi_2008-36fr.pdf
. - The st_filename property was set to
dcssi-cible_2008-36en.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
ANSSI-CC-2008/36
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_CCA', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/dcssi_2008-36fr.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/dcssi-cible_2008-36en.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
None
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_CCA', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}]}
values discarded.
- The new value is
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Microcontrôleur sécurisé ATMEL AT91SC464384RCU was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "a22678c29bb90ec4",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2008/36",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_MSU",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_LLD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_HLD",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_SOF",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VLA",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_CCA",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_RCR",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_ADM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_USR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"next_certificates": [],
"prev_certificates": [],
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_id": "ANSSI-CC-2008/36",
"description": "Le microcontr\u00f4leur s\u00e9curis\u00e9 32 bits, portant la r\u00e9f\u00e9rence commerciale AT91SC464384RCU, issu de la famille AT91SC des composants pour cartes \u00e0 puce, correspond \u00e0 la puce de r\u00e9f\u00e9rence AT58U21, en r\u00e9vision B, bas\u00e9e sur le coeur ARM SC100. Les microcontr\u00f4leurs AT91SC464384RCU sont plut\u00f4t destin\u00e9s \u00e0 des cartes \u00e0 puce supportant des applications de types bancaire, transactions s\u00e9curis\u00e9es, t\u00e9l\u00e9vision \u00e0 p",
"developer": "Atmel SMS",
"enhanced": {
"augmented": "ADV_IMP.2, ALC_DVS.2, AVA_MSU.3, AVA_VLA.4",
"category": "Micro-circuits",
"cc_version": "Crit\u00e8res Communs version 2.3",
"cert_id": "ANSSI-CC-2008/36",
"certification_date": "2008-12-17",
"developer": "Atmel SMS",
"evaluation_facility": "CEACI",
"level": "EAL4+",
"mutual_recognition": "SOG-IS CCRA",
"protection_profile": "BSI-PP-0002-2001",
"report_link": "https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi_2008-36fr.pdf",
"sponsor": "Atmel SMS",
"target_link": "https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi-cible_2008-36en.pdf"
},
"level": "EAL4+",
"product": "Microcontr\u00f4leurs s\u00e9curis\u00e9s ATMEL AT91SC464384RCU (AT58U21) r\u00e9v. B",
"sponsor": "Atmel SMS",
"url": "https://cyber.gouv.fr/produits-certifies/microcontroleurs-securises-atmel-at91sc464384rcu-at58u21-rev-b"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2010-03-19",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2008_36-M01fr.pdf",
"maintenance_st_link": null,
"maintenance_title": "Rapport de maintenance ANSSI-CC-2008/36-M01"
}
]
},
"manufacturer": "ATMEL Secure Products Division",
"manufacturer_web": "https://www.atmel.com",
"name": "Microcontr\u00f4leur s\u00e9curis\u00e9 ATMEL AT91SC464384RCU",
"not_valid_after": "2019-09-01",
"not_valid_before": "2008-12-17",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "dcssi_2008-36fr.pdf",
"report_frontpage": {
"FR": {}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
}
},
"FF": {
"DSA": {
"DSA": 1
}
}
},
"cc_cert_id": {
"FR": {
"DCSSI-2008/36": 19
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0002-2001": 1,
"BSI-PP-002-2001": 2
}
},
"cc_sar": {
"ACM": {
"ACM_AUT": 1,
"ACM_CAP": 1,
"ACM_SCP": 1
},
"ADO": {
"ADO_DEL": 1,
"ADO_IGS": 1
},
"ADV": {
"ADV_FSP": 1,
"ADV_HLD": 1,
"ADV_IMP": 1,
"ADV_IMP.2": 2,
"ADV_INT": 1,
"ADV_LLD": 1,
"ADV_RCR": 1,
"ADV_SPM": 1
},
"AGD": {
"AGD_ADM": 1,
"AGD_USR": 1
},
"ALC": {
"ALC_DVS": 1,
"ALC_DVS.2": 2,
"ALC_FLR": 2,
"ALC_TAT": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_DPT": 1,
"ATE_FUN": 1,
"ATE_IND": 1
},
"AVA": {
"AVA_CCA": 1,
"AVA_MSU": 1,
"AVA_MSU.3": 2,
"AVA_SOF": 1,
"AVA_VLA": 1,
"AVA_VLA.4": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 3": 1,
"EAL 4": 2,
"EAL 5": 1,
"EAL 7": 1,
"EAL4": 3,
"EAL5+": 1,
"EAL7": 1
},
"ITSEC": {
"ITSEC E6 et": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {
"ATMEL": {
"ATMEL AT91SC464384RCU": 20
}
},
"ecc_curve": {},
"eval_facility": {
"CESTI": {
"CESTI": 2
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 1
}
},
"side_channel_analysis": {},
"standard_id": {
"BSI": {
"AIS 34": 2,
"AIS34": 1
},
"CC": {
"CCMB-2005-08-001": 1,
"CCMB-2005-08-002": 1,
"CCMB-2005-08-003": 1,
"CCMB-2005-08-004": 1
},
"ISO": {
"ISO/IEC 15408:2005": 1,
"ISO/IEC 18045:2005": 1
}
},
"symmetric_crypto": {
"DES": {
"3DES": {
"TDES": 1
},
"DES": {
"DES": 3
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon Technologies": 1
},
"Philips": {
"Philips": 1
},
"Thales": {
"Thales": 1
}
},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20081218150123Z",
"/Creator": "PScript5.dll Version 5.2.2",
"/ModDate": "D:20091110144948+01\u002700\u0027",
"/Producer": "GPL Ghostscript 8.15",
"/Title": "",
"pdf_file_size_bytes": 307640,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 18
},
"st_filename": "dcssi-cible_2008-36en.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
}
},
"FF": {
"DSA": {
"DSA": 1
}
}
},
"cc_cert_id": {},
"cc_claims": {
"D": {
"D.ADVX_RAM_DATA": 1,
"D.CPU_RAM_DATA": 2,
"D.CPU_ROM_DATA": 2,
"D.CPU_ROM_DSOFT": 2,
"D.CPU_ROM_SOFT": 2,
"D.CRYPTO_RAM_DATA": 1,
"D.CRYPTO_ROM_DATA": 2,
"D.CRYPTO_ROM_DSOFT": 2,
"D.CRYPTO_ROM_SOFT": 2,
"D.DESIGN": 1,
"D.DEV_TOOLS": 1,
"D.EEPROM_DATA": 2,
"D.EEPROM_DSOFT": 2,
"D.EEPROM_SOFT": 2,
"D.IC_SPEC": 1,
"D.MASK": 1,
"D.PERIPH_DATA": 2,
"D.RNG_DATA": 2,
"D.TECHNO": 1
},
"O": {
"O.RND": 2
},
"T": {
"T.RND": 2
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-002-": 1,
"BSI-PP-002-2001": 14,
"BSI-PP002-2001": 1
}
},
"cc_sar": {
"ACM": {
"ACM_AUT": 1,
"ACM_AUT.1": 1,
"ACM_CAP": 1,
"ACM_CAP.4": 1,
"ACM_SCP": 1,
"ACM_SCP.2": 1
},
"ADO": {
"ADO_DEL": 1,
"ADO_DEL.2": 1,
"ADO_IGS": 1,
"ADO_IGS.1": 1
},
"ADV": {
"ADV_FSP": 1,
"ADV_FSP.2": 1,
"ADV_HLD": 1,
"ADV_HLD.2": 1,
"ADV_IMP": 1,
"ADV_IMP.2": 2,
"ADV_LLD": 1,
"ADV_LLD.1": 1,
"ADV_RCR": 1,
"ADV_RCR.2": 1,
"ADV_SPM": 1,
"ADV_SPM.1": 1,
"ADV_SPM.2": 1
},
"AGD": {
"AGD_ADM": 1,
"AGD_ADM.1": 1,
"AGD_USR": 1,
"AGD_USR.1": 1
},
"ALC": {
"ALC_DVS": 1,
"ALC_DVS.2": 2,
"ALC_FLR": 1,
"ALC_LCD": 1,
"ALC_LCD.2": 1,
"ALC_TAT": 1,
"ALC_TAT.2": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.2": 1,
"ATE_DPT": 1,
"ATE_DPT.2": 1,
"ATE_FUN": 1,
"ATE_FUN.1": 1,
"ATE_IND": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_CCA.1": 1,
"AVA_MSU": 1,
"AVA_MSU.3": 2,
"AVA_SOF": 1,
"AVA_SOF.1": 1,
"AVA_VLA": 1,
"AVA_VLA.4": 2
}
},
"cc_security_level": {
"EAL": {
"EAL4": 7,
"EAL4 augmented": 1,
"EAL4+": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_SAS.1": 3,
"FAU_SAS.1.1": 1
},
"FCS": {
"FCS_CKM.1": 1,
"FCS_CKM.4": 1,
"FCS_COP.1": 4,
"FCS_COP.1.1": 1,
"FCS_RND.1": 3,
"FCS_RND.1.1": 1
},
"FDP": {
"FDP_ACC.1": 4,
"FDP_ACC.2": 4,
"FDP_ACC.2.1": 1,
"FDP_ACC.2.2": 1,
"FDP_ACF.1": 4,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_AFC.1": 1,
"FDP_IFC.1": 6,
"FDP_IFC.1.1": 1,
"FDP_IFF.1": 1,
"FDP_ITC.1": 1,
"FDP_ITC.2": 1,
"FDP_ITT.1": 4,
"FDP_ITT.1.1": 1
},
"FIA": {
"FIA_UID.1": 1
},
"FMT": {
"FMT_LIM.1": 4,
"FMT_LIM.1.1": 1,
"FMT_LIM.2": 5,
"FMT_LIM.2.1": 1,
"FMT_MOF.1": 4,
"FMT_MOF.1.1": 1,
"FMT_MSA.1": 5,
"FMT_MSA.1.1": 1,
"FMT_MSA.2": 1,
"FMT_MSA.3": 4,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_SMF.1": 2,
"FMT_SMR.1": 7,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_FLS.1": 6,
"FPT_FLS.1.1": 1,
"FPT_ITT.1": 3,
"FPT_ITT.1.1": 1,
"FPT_PHP.3": 3,
"FPT_PHP.3.1": 1,
"FPT_SEP.1": 3,
"FPT_SEP.1.1": 1,
"FPT_SEP.1.2": 1
},
"FRU": {
"FRU_FLT.2": 6
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"AtmelToolbox": {
"Atmel Toolbox 02.03.12.00": 1,
"Atmel Toolbox 28": 1
}
},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 4,
"RNG": 8
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 9,
"malfunction": 4
},
"SCA": {
"DPA": 4,
"Leak-Inherent": 5,
"Physical Probing": 3,
"Physical probing": 1,
"SPA": 2,
"physical probing": 5
},
"other": {
"reverse engineering": 2
}
},
"standard_id": {
"FIPS": {
"FIPS 140-2": 1,
"FIPS PUB 46-3": 1,
"FIPS140-2": 1
},
"ISO": {
"ISO/IEC 3309": 2
}
},
"symmetric_crypto": {
"DES": {
"3DES": {
"TDES": 6
},
"DES": {
"DES": 3
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Thales": {
"Thales": 1
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "sc188jb",
"/CreationDate": "D:20081030162507Z",
"/Creator": "FrameMaker 6.0",
"/ModDate": "D:20081030163012Z",
"/Producer": "Acrobat Distiller 8.1.0 (Windows)",
"/Title": "Lightbird_ST.book",
"pdf_file_size_bytes": 623015,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": true,
"pdf_number_of_pages": 77
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/dcssi_2008-36fr.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"ALC_DVS.2",
"AVA_MSU.3",
"ADV_IMP.2",
"AVA_VLA.4",
"EAL4+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/dcssi-cible_2008-36en.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "187e1c96c1cd626c3d1cfcfd4bd3ee2df79006e503cb4afe14553690940aa981",
"txt_hash": "e17b5f8a29d3e6a98d5b777982d52e1f3f63023f33a186ce1510a76b2409aa92"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "3b0c35ea77d16bc6358e3edd44df02077817d03ed7e68a5d6715dba40b6cd595",
"txt_hash": "d446e26a55adcaa93a5c21eaf20a6e06515b4e3b8fadca9f8d6ec7d3b7f7a1d3"
}
},
"status": "archived"
}