BelPIC V1.8 on MultiApp V5.0 Platform

CSV information ?

Status active
Valid from 29.11.2022
Valid until 29.11.2027
Scheme 🇫🇷 FR
Manufacturer THALES DIS FRANCE SA
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level AVA_VAN.5, ALC_DVS.2, EAL5+

Heuristics summary ?

Certificate ID: ANSSI-CC-2022/53

Certificate ?

Extracted keywords

Security level
EAL5, EAL2
Certificates
ANSSI-CC-2022/53
Evaluation facilities
SERMA

File metadata

Title ANSSI-CC-2022/53
Keywords version 3.1, révision 5
Author DUCLOS Charlene
Creation date D:20221201134439+01'00'
Modification date D:20221201134439+01'00'
Pages 2
Creator Microsoft® Word 2019
Producer Microsoft® Word 2019

Certification report ?

Extracted keywords

Symmetric Algorithms
AES
Asymmetric Algorithms
RSA 2048, ECDH, ECDSA, ECC
Schemes
Key Agreement
Protocols
PACE
Randomness
RND, RNG

JavaCard versions
Java Card 3.1
Trusted Execution Environments
SE
Vendor
Infineon, Gemalto, Thales

Security level
EAL5+, EAL 5, EAL5, EAL 6+, EAL 5 augmented, EAL5 augmented
Claims
D.SCD, D.SVD, O.CIPHER, O.KEY-MNGT, O.REALLOCATION, O.GLOBAL_ARRA, O.ARRAY_VIEWS_, O.TRANSACTION, O.PIN-MNGT, O.OPERATE, O.DELETION, O.RESOURCES, O.ALARM, O.OBJ-DELETION, O.SCP, O.SID, O.SECURE_LOAD_ACODE, O.SECURE_AC_ACTIVATION, O.TOE_IDENTIFICATION, O.CONFID-OS-UPDATE, A.CGA, A.SCA, A.VERIFICATION, A.CAP_FILE, OE.HID_VAD, OE.VERIFICATION, OE.CAP_FILE, OE.CODE-EVIDENCE, OE.CODE-
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_TDS.1, ADV_FSP.5, ADV_TDS.4, ADV_IMP.1, ADV_TDS.3, ADV_INT.2, ADV_FSP.2, ADV_FSP.4, AGD_OPE, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_TAT.1, ALC_TAT.2, ALC_CMC.4, ALC_CMS.1, ALC_DVS.1, ALC_LCD.1, ALC_CMS.4, ALC_DEL.1, ATE_COV.2, ATE_FUN.1, ATE_COV.1, ATE_DPT.1, ATE_DPT.3, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1, ASE_REQ.2, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_ARP.1, FCO_NRO, FCS_CKM, FCS_CKM.1, FCS_CKM.4, FCS_CKM.4.1, FCS_COP.1, FCS_COP.1.1, FCS_CKM.3, FCS_COP, FCS_RNG.1, FCS_CMK.4, FCS_CKM.2, FDP_ACC, FDP_ACC.1, FDP_ACF, FDP_ACF.1, FDP_RIP.1, FDP_RIP.1.1, FDP_SDI, FDP_SDI.2, FDP_UIT, FDP_UIT.1, FDP_IFC, FDP_IFF, FDP_RIP, FDP_ROL, FDP_ITC, FDP_ITC.1, FDP_ITC.2, FDP_IFC.1, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD, FIA_UID, FIA_USB, FIA_UAU, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1, FMT_SMF.1.1, FMT_MOF.1, FMT_MOF.1.1, FMT_MSA, FMT_MSA.1, FMT_MSA.2, FMT_MSA.2.1, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.4, FMT_MSA.4.1, FMT_MTD, FMT_MTD.1, FMT_SMR, FMT_SMF, FPR_UNO.1, FPR_UNO, FPT_EMS, FPT_EMS.1, FPT_EMS.1.1, FPT_EMS.1.2, FPT_TST.1, FPT_FLS.1, FPT_FLS.1.1, FPT_TST, FPT_PHP.1, FPT_PHP.1.1, FPT_PHP.1.2, FPT_PHP.3, FPT_PHP.3.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_FLS, FPT_TDC.1, FPT_RCV, FPT_PHP, FPT_ITT, FTP_ITC, FTP_ITC.1, FTP_TRP.1
Protection profiles
BSI-PP-0084, BSI-CC-PP-0099-V2-2020, BSI-CC-PP-0059-2009-MA-01
Certificates
BSI-DSZ-CC-1107-2020, ANSSI-CC-2021/42, CC-1, CC-2, CC-3
Evaluation facilities
Serma Safety & Security

Side-channel analysis
Side channel, SPA, DPA, timing attacks, physical tampering, DFA, fault induction, fault injection

Standards
FIPS 186-4, FIPS 180-4, FIPS 202, NIST SP 800-56A, PKCS#1, AIS31, ISO/IEC 10116, SCP01, SCP02, SCP03, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004

File metadata

Title BELPIC V1.8 applet on MultiApp V5.0 platform
Author THALES
Creation date D:20220620100119+02'00'
Modification date D:20220620100119+02'00'
Pages 75
Creator Microsoft® Word 2016
Producer Microsoft® Word 2016

References

Outgoing
  • ANSSI-CC-2021/42 - active - Plateforme Java Card MultiApp V5.0 version 5.0
  • BSI-DSZ-CC-1107-2020 - active - IFX_CCI_00002Dh, IFX_CCI_000039h, IFX_CCI_00003Ah, IFX_CCI_000044h, IFX_CCI_000045h, IFX_CCI_000046h, IFX_CCI_000047h, IFX_CCI_000048h, IFX_CCI_000049h, IFX_CCI_00004Ah, IFX_CCI_00004Bh, IFX_CCI_00004Ch, IFX_CCI_00004Dh, IFX_CCI_00004Eh design step T11 with firmware 80.306.16.0, optional NRG™ SW 05.03.4097, optional HSL v3.52.9708, UMSLC lib v01.30.0564, optional SCL v2.11.003, optional ACL v3.02.000 and user guidance

Security target ?

Extracted keywords

Symmetric Algorithms
AES
Asymmetric Algorithms
RSA 2048, ECDH, ECDSA, ECC
Schemes
Key Agreement
Protocols
PACE
Randomness
RND, RNG

JavaCard versions
Java Card 3.1
Trusted Execution Environments
SE
Vendor
Infineon, Gemalto, Thales

Security level
EAL5+, EAL 5, EAL5, EAL 6+, EAL 5 augmented, EAL5 augmented
Claims
D.SCD, D.SVD, O.CIPHER, O.KEY-MNGT, O.REALLOCATION, O.GLOBAL_ARRA, O.ARRAY_VIEWS_, O.TRANSACTION, O.PIN-MNGT, O.OPERATE, O.DELETION, O.RESOURCES, O.ALARM, O.OBJ-DELETION, O.SCP, O.SID, O.SECURE_LOAD_ACODE, O.SECURE_AC_ACTIVATION, O.TOE_IDENTIFICATION, O.CONFID-OS-UPDATE, A.CGA, A.SCA, A.VERIFICATION, A.CAP_FILE, OE.HID_VAD, OE.VERIFICATION, OE.CAP_FILE, OE.CODE-EVIDENCE, OE.CODE-
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_TDS.1, ADV_FSP.5, ADV_TDS.4, ADV_IMP.1, ADV_TDS.3, ADV_INT.2, ADV_FSP.2, ADV_FSP.4, AGD_OPE, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_TAT.1, ALC_TAT.2, ALC_CMC.4, ALC_CMS.1, ALC_DVS.1, ALC_LCD.1, ALC_CMS.4, ALC_DEL.1, ATE_COV.2, ATE_FUN.1, ATE_COV.1, ATE_DPT.1, ATE_DPT.3, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1, ASE_REQ.2, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_ARP.1, FCO_NRO, FCS_CKM, FCS_CKM.1, FCS_CKM.4, FCS_CKM.4.1, FCS_COP.1, FCS_COP.1.1, FCS_CKM.3, FCS_COP, FCS_RNG.1, FCS_CMK.4, FCS_CKM.2, FDP_ACC, FDP_ACC.1, FDP_ACF, FDP_ACF.1, FDP_RIP.1, FDP_RIP.1.1, FDP_SDI, FDP_SDI.2, FDP_UIT, FDP_UIT.1, FDP_IFC, FDP_IFF, FDP_RIP, FDP_ROL, FDP_ITC, FDP_ITC.1, FDP_ITC.2, FDP_IFC.1, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD, FIA_UID, FIA_USB, FIA_UAU, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1, FMT_SMF.1.1, FMT_MOF.1, FMT_MOF.1.1, FMT_MSA, FMT_MSA.1, FMT_MSA.2, FMT_MSA.2.1, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.4, FMT_MSA.4.1, FMT_MTD, FMT_MTD.1, FMT_SMR, FMT_SMF, FPR_UNO.1, FPR_UNO, FPT_EMS, FPT_EMS.1, FPT_EMS.1.1, FPT_EMS.1.2, FPT_TST.1, FPT_FLS.1, FPT_FLS.1.1, FPT_TST, FPT_PHP.1, FPT_PHP.1.1, FPT_PHP.1.2, FPT_PHP.3, FPT_PHP.3.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_FLS, FPT_TDC.1, FPT_RCV, FPT_PHP, FPT_ITT, FTP_ITC, FTP_ITC.1, FTP_TRP.1
Protection profiles
BSI-PP-0084, BSI-CC-PP-0099-V2-2020, BSI-CC-PP-0059-2009-MA-01
Certificates
BSI-DSZ-CC-1107-2020, ANSSI-CC-2021/42, CC-1, CC-2, CC-3
Evaluation facilities
Serma Safety & Security

Side-channel analysis
Side channel, SPA, DPA, timing attacks, physical tampering, DFA, fault induction, fault injection

Standards
FIPS 186-4, FIPS 180-4, FIPS 202, NIST SP 800-56A, PKCS#1, AIS31, ISO/IEC 10116, SCP01, SCP02, SCP03, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004

File metadata

Title BELPIC V1.8 applet on MultiApp V5.0 platform
Author THALES
Creation date D:20220620100119+02'00'
Modification date D:20220620100119+02'00'
Pages 75
Creator Microsoft® Word 2016
Producer Microsoft® Word 2016

References

Outgoing
  • ANSSI-CC-2021/42 - active - Plateforme Java Card MultiApp V5.0 version 5.0
  • BSI-DSZ-CC-1107-2020 - active - IFX_CCI_00002Dh, IFX_CCI_000039h, IFX_CCI_00003Ah, IFX_CCI_000044h, IFX_CCI_000045h, IFX_CCI_000046h, IFX_CCI_000047h, IFX_CCI_000048h, IFX_CCI_000049h, IFX_CCI_00004Ah, IFX_CCI_00004Bh, IFX_CCI_00004Ch, IFX_CCI_00004Dh, IFX_CCI_00004Eh design step T11 with firmware 80.306.16.0, optional NRG™ SW 05.03.4097, optional HSL v3.52.9708, UMSLC lib v01.30.0564, optional SCL v2.11.003, optional ACL v3.02.000 and user guidance

Heuristics ?

Certificate ID: ANSSI-CC-2022/53

Extracted SARs

ASE_CCL.1, ALC_DEL.1, ADV_FSP.5, ALC_CMC.4, ALC_DVS.2, AVA_VAN.5, ATE_FUN.1, ALC_TAT.2, ASE_TSS.1, ADV_ARC.1, ASE_SPD.1, ASE_REQ.2, ALC_CMS.4, ADV_INT.2, ADV_IMP.1, ADV_TDS.4, ATE_COV.2, AGD_OPE.1, ASE_ECD.1, ASE_INT.1, AGD_PRE.1, ALC_LCD.1, ATE_DPT.3, ASE_OBJ.2

Scheme data ?

Product BelPIC V1.8 on MultiApp V5.0 Platform (v1.8 revision 1.2)
Url https://cyber.gouv.fr/produits-certifies/belpic-v18-multiapp-v50-platform-v18-revision-12
Description  Le produit Ă©valuĂ© est la carte Ă  puce « BelPIC V1.8 on MultiApp V5.0 Platform, V1.8 revision 1.2 » dĂ©veloppĂ© par THALES DIS et INFINEON TECHNOLOGIES AG. Cette carte Ă  puce dispose d’une interface contact. Elle est destinĂ©e Ă  ĂŞtre utilisĂ© comme dispositif sĂ©curisĂ© de crĂ©ation de signature Ă©lectronique (SSCD) pour le marchĂ© de carte d’identitĂ© belge.
Sponsor THALES DIS
Developer THALES DIS, INFINEON TECHNOLOGIES AG
Cert Id ANSSI-CC-2022/53
Level EAL5+
Expiration Date 28.11.2027
Enhanced
Cert Id ANSSI-CC-2022/53
Certification Date 29.11.2022
Expiration Date 28.11.2027
Category Cartes Ă  puce
Cc Version Critères Communs version 3.1r5
Developer THALES DIS, INFINEON TECHNOLOGIES AG
Sponsor THALES DIS
Evaluation Facility SERMA SAFETY & SECURITY
Level EAL5+
Protection Profile Protection profiles for secure signature creation device: Part 2 : Device with key generation, v2.0.1, BSI-CC-PP-0059-2009-MA-01 ; Part 5 : Extension for device with key generation and trusted communication with signature creation application, v1.0.1, BSI-CC-PP-0072-2012.
Mutual Recognition CCRA SOG-IS
Augmented ALC_DVS.2, AVA_VAN.5

References ?

Updates ?

  • 09.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'description': ' Le produit Ă©valuĂ© est la carte Ă  puce « BelPIC V1.8 on MultiApp V5.0 Platform, V1.8 revision 1.2 » dĂ©veloppĂ© par THALES DIS et INFINEON TECHNOLOGIES AG. Cette carte Ă  puce dispose d’une interface contact. Elle est destinĂ©e Ă  ĂŞtre utilisĂ© comme dispositif sĂ©curisĂ© de crĂ©ation de signature Ă©lectronique (SSCD) pour le marchĂ© de carte d’identitĂ© belge.', 'expiration_date': '2027-11-28', 'enhanced': {'__update__': {'certification_date': '2022-11-29', 'expiration_date': '2027-11-28', 'protection_profile': 'Protection profiles for secure signature creation device: Part 2 : Device with key generation, v2.0.1, BSI-CC-PP-0059-2009-MA-01 ; Part 5 : Extension for device with key generation and trusted communication with signature creation application, v1.0.1, BSI-CC-PP-0072-2012.', 'mutual_recognition': 'CCRA SOG-IS'}}} data.
  • 14.10.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'BelPIC V1.8 on MultiApp V5.0 Platform (v1.8 revision 1.2)', 'url': 'https://cyber.gouv.fr/produits-certifies/belpic-v18-multiapp-v50-platform-v18-revision-12', 'description': ' Le produit Ă©valuĂ© est la carte Ă  puce « BelPIC V1.8 on MultiApp V5.0 Platform, V1.8 revision 1.2 » dĂ©veloppĂ© par THALES DIS et INFINEON TECHNOLOGIES AG.\nCette carte Ă  puce dispose d’une interface contact. Elle est destinĂ©e Ă  ĂŞtre utilisĂ© comme dispositif sĂ©curisĂ© de crĂ©ation de signature Ă©lectronique (SSCD) pour le marchĂ© de carte d’identitĂ© belge.', 'sponsor': 'THALES DIS', 'developer': 'THALES DIS, INFINEON TECHNOLOGIES AG', 'cert_id': 'ANSSI-CC-2022/53', 'level': 'EAL5+', 'expiration_date': '28 Novembre 2027', 'enhanced': {'cert_id': 'ANSSI-CC-2022/53', 'certification_date': '29/11/2022', 'expiration_date': '28/11/2027', 'category': 'Cartes Ă  puce', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'THALES DIS, INFINEON TECHNOLOGIES AG', 'sponsor': 'THALES DIS', 'evaluation_facility': 'SERMA SAFETY & SECURITY', 'level': 'EAL5+', 'protection_profile': 'Protection profiles for secure signature creation device:\nPart 2 : Device with key generation, v2.0.1, BSI-CC-PP-0059-2009-MA-01 ;\nPart 5 : Extension for device with key generation and trusted communication with signature creation application, v1.0.1, BSI-CC-PP-0072-2012.', 'mutual_recognition': 'CCRA\n SOG-IS', 'augmented': 'ALC_DVS.2, AVA_VAN.5'}}.
  • 02.09.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The cert property was updated, with the {'download_ok': True, 'convert_garbage': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'c0362ddf2f1a3d0c41c7a0a2d8f81cf00090a15c80518329309f3613b14603ce', 'txt_hash': '32dc2ddf26f94db898269dae471caa5514495cea89549c141e52df476ba67bb7'} data.

    The PDF extraction data was updated.

    • The cert_metadata property was set to {'pdf_file_size_bytes': 311402, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 2, '/Title': 'ANSSI-CC-2022/53', '/Author': 'DUCLOS Charlene', '/Keywords': 'version 3.1, rĂ©vision 5', '/Creator': 'Microsoft® Word 2019', '/CreationDate': "D:20221201134439+01'00'", '/ModDate': "D:20221201134439+01'00'", '/Producer': 'Microsoft® Word 2019', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The cert_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2022/53': 2}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL5': 1, 'EAL2': 1}}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'Serma': {'SERMA': 2}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The cert_filename property was set to certificat-anssi-cc-2022_53.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to ANSSI-CC-2022/53.
    • The st_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2021/42', 'BSI-DSZ-CC-1107-2020']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2021/42', 'BSI-DSZ-CC-1107-2020']}} data.
    • The report_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2021/42', 'BSI-DSZ-CC-1107-2020']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2021/42', 'BSI-DSZ-CC-1107-2020']}} data.
    • The scheme_data property was set to {'product': 'BelPIC V1.8 on MultiApp V5.0 Platform (v1.8 revision 1.2)', 'url': 'https://cyber.gouv.fr/produits-certifies/belpic-v18-multiapp-v50-platform-v18-revision-12', 'description': ' Le produit Ă©valuĂ© est la carte Ă  puce « BelPIC V1.8 on MultiApp V5.0 Platform, V1.8 revision 1.2 » dĂ©veloppĂ© par THALES DIS et INFINEON TECHNOLOGIES AG.\nCette carte Ă  puce dispose d’une interface contact. Elle est destinĂ©e Ă  ĂŞtre utilisĂ© comme dispositif sĂ©curisĂ© de crĂ©ation de signature Ă©lectronique (SSCD) pour le marchĂ© de carte d’identitĂ© belge.', 'sponsor': 'THALES DIS', 'developer': 'THALES DIS, INFINEON TECHNOLOGIES AG', 'cert_id': 'ANSSI-CC-2022/53', 'level': 'EAL5+', 'expiration_date': '28 Novembre 2027', 'enhanced': {'cert_id': 'ANSSI-CC-2022/53', 'certification_date': '29/11/2022', 'expiration_date': '28/11/2027', 'category': 'Cartes Ă  puce', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'THALES DIS, INFINEON TECHNOLOGIES AG', 'sponsor': 'THALES DIS', 'evaluation_facility': 'SERMA SAFETY & SECURITY', 'level': 'EAL5+', 'protection_profile': 'Protection profiles for secure signature creation device:\nPart 2 : Device with key generation, v2.0.1, BSI-CC-PP-0059-2009-MA-01 ;\nPart 5 : Extension for device with key generation and trusted communication with signature creation application, v1.0.1, BSI-CC-PP-0072-2012.', 'mutual_recognition': 'CCRA\n SOG-IS', 'augmented': 'ALC_DVS.2, AVA_VAN.5'}}.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2022_53en.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2022_53en.pdf.

    The state of the certificate object was updated.

    • The cert property was updated, with the {'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The cert_metadata property was set to None.
    • The cert_keywords property was set to None.
    • The cert_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to ANSSI-CC-2021/42.
    • The st_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The report_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The scheme_data property was set to None.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'BelPIC V1.8 on MultiApp V5.0 Platform (v1.8 revision 1.2)', 'url': 'https://cyber.gouv.fr/produits-certifies/belpic-v18-multiapp-v50-platform-v18-revision-12', 'description': ' Le produit Ă©valuĂ© est la carte Ă  puce « BelPIC V1.8 on MultiApp V5.0 Platform, V1.8 revision 1.2 » dĂ©veloppĂ© par THALES DIS et INFINEON TECHNOLOGIES AG.\nCette carte Ă  puce dispose d’une interface contact. Elle est destinĂ©e Ă  ĂŞtre utilisĂ© comme dispositif sĂ©curisĂ© de crĂ©ation de signature Ă©lectronique (SSCD) pour le marchĂ© de carte d’identitĂ© belge.', 'sponsor': 'THALES DIS', 'developer': 'THALES DIS, INFINEON TECHNOLOGIES AG', 'cert_id': 'ANSSI-CC-2022/53', 'level': 'EAL5+', 'expiration_date': '28 Novembre 2027', 'enhanced': {'cert_id': 'ANSSI-CC-2022/53', 'certification_date': '29/11/2022', 'expiration_date': '28/11/2027', 'category': 'Cartes Ă  puce', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'THALES DIS, INFINEON TECHNOLOGIES AG', 'sponsor': 'THALES DIS', 'evaluation_facility': 'SERMA SAFETY & SECURITY', 'level': 'EAL5+', 'protection_profile': 'Protection profiles for secure signature creation device:\nPart 2 : Device with key generation, v2.0.1, BSI-CC-PP-0059-2009-MA-01 ;\nPart 5 : Extension for device with key generation and trusted communication with signature creation application, v1.0.1, BSI-CC-PP-0072-2012.', 'mutual_recognition': 'CCRA\n SOG-IS', 'augmented': 'ALC_DVS.2, AVA_VAN.5'}}.
  • 31.07.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name BelPIC V1.8 on MultiApp V5.0 Platform was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2022_53.pdf",
  "dgst": "a9803e693eaf95e9",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2022/53",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.8",
        "5.0"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1107-2020",
          "ANSSI-CC-2021/42"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1107-2020",
          "ANSSI-CC-2021/42"
        ]
      }
    },
    "scheme_data": {
      "cert_id": "ANSSI-CC-2022/53",
      "description": "\u0026nbsp;Le produit \u00e9valu\u00e9 est la carte \u00e0 puce \u00ab BelPIC V1.8 on MultiApp V5.0 Platform, V1.8 revision 1.2 \u00bb d\u00e9velopp\u00e9 par THALES DIS et INFINEON TECHNOLOGIES AG. Cette carte \u00e0 puce dispose d\u2019une interface contact. Elle est destin\u00e9e \u00e0 \u00eatre utilis\u00e9 comme dispositif s\u00e9curis\u00e9 de cr\u00e9ation de signature \u00e9lectronique (SSCD) pour le march\u00e9 de carte d\u2019identit\u00e9 belge.",
      "developer": "THALES DIS, INFINEON TECHNOLOGIES AG",
      "enhanced": {
        "augmented": "ALC_DVS.2, AVA_VAN.5",
        "category": "Cartes \u00e0 puce",
        "cc_version": "Crit\u00e8res Communs version 3.1r5",
        "cert_id": "ANSSI-CC-2022/53",
        "certification_date": "2022-11-29",
        "developer": "THALES DIS, INFINEON TECHNOLOGIES AG",
        "evaluation_facility": "SERMA SAFETY \u0026 SECURITY",
        "expiration_date": "2027-11-28",
        "level": "EAL5+",
        "mutual_recognition": "CCRA SOG-IS",
        "protection_profile": "Protection profiles for secure signature creation device: Part 2 : Device with key generation, v2.0.1, BSI-CC-PP-0059-2009-MA-01 ; Part 5 : Extension for device with key generation and trusted communication with signature creation application, v1.0.1, BSI-CC-PP-0072-2012.",
        "sponsor": "THALES DIS"
      },
      "expiration_date": "2027-11-28",
      "level": "EAL5+",
      "product": "BelPIC V1.8 on MultiApp V5.0 Platform (v1.8 revision 1.2)",
      "sponsor": "THALES DIS",
      "url": "https://cyber.gouv.fr/produits-certifies/belpic-v18-multiapp-v50-platform-v18-revision-12"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1107-2020",
          "ANSSI-CC-2021/42"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1107-2020",
          "ANSSI-CC-2021/42"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "THALES DIS FRANCE SA",
  "manufacturer_web": "https://www.thalesgroup.com/en/europe/france",
  "name": "BelPIC V1.8 on MultiApp V5.0 Platform",
  "not_valid_after": "2027-11-29",
  "not_valid_before": "2022-11-29",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "certificat-anssi-cc-2022_53.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2022/53": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {
        "EAL": {
          "EAL2": 1,
          "EAL5": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Serma": {
          "SERMA": 2
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "DUCLOS Charlene",
      "/CreationDate": "D:20221201134439+01\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2019",
      "/Keywords": "version 3.1, r\u00e9vision 5",
      "/ModDate": "D:20221201134439+01\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2019",
      "/Title": "ANSSI-CC-2022/53",
      "pdf_file_size_bytes": 311402,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 2
    },
    "report_filename": "anssi-cible-cc-2022_53en.pdf",
    "report_frontpage": {
      "FR": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 14
          },
          "ECDH": {
            "ECDH": 7
          },
          "ECDSA": {
            "ECDSA": 6
          }
        },
        "RSA": {
          "RSA 2048": 1
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1107-2020": 1
        },
        "FR": {
          "ANSSI-CC-2021/42": 1
        },
        "NL": {
          "CC-1": 2,
          "CC-2": 2,
          "CC-3": 2
        }
      },
      "cc_claims": {
        "A": {
          "A.CAP_FILE": 1,
          "A.CGA": 3,
          "A.SCA": 3,
          "A.VERIFICATION": 2
        },
        "D": {
          "D.SCD": 2,
          "D.SVD": 2
        },
        "O": {
          "O.ALARM": 1,
          "O.ARRAY_VIEWS_": 1,
          "O.CIPHER": 1,
          "O.CONFID-OS-UPDATE": 1,
          "O.DELETION": 1,
          "O.GLOBAL_ARRA": 2,
          "O.KEY-MNGT": 1,
          "O.OBJ-DELETION": 1,
          "O.OPERATE": 1,
          "O.PIN-MNGT": 1,
          "O.REALLOCATION": 1,
          "O.RESOURCES": 1,
          "O.SCP": 3,
          "O.SECURE_AC_ACTIVATION": 1,
          "O.SECURE_LOAD_ACODE": 1,
          "O.SID": 1,
          "O.TOE_IDENTIFICATION": 1,
          "O.TRANSACTION": 1
        },
        "OE": {
          "OE.CAP_FILE": 2,
          "OE.CODE-": 1,
          "OE.CODE-EVIDENCE": 1,
          "OE.HID_VAD": 11,
          "OE.VERIFICATION": 4
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0059-2009-MA-01": 1,
          "BSI-CC-PP-0099-V2-2020": 1,
          "BSI-PP-0084": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 7,
          "ADV_FSP.1": 4,
          "ADV_FSP.2": 2,
          "ADV_FSP.4": 1,
          "ADV_FSP.5": 8,
          "ADV_IMP.1": 9,
          "ADV_INT.2": 1,
          "ADV_TDS.1": 2,
          "ADV_TDS.3": 4,
          "ADV_TDS.4": 8
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 6,
          "AGD_PRE.1": 6
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.1": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 2,
          "ALC_DVS.2": 10,
          "ALC_LCD.1": 3,
          "ALC_TAT.1": 2,
          "ALC_TAT.2": 3
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 4,
          "ASE_INT.1": 5,
          "ASE_OBJ.2": 3,
          "ASE_REQ.1": 2,
          "ASE_REQ.2": 2,
          "ASE_SPD.1": 2,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.1": 2,
          "ATE_COV.2": 3,
          "ATE_DPT.1": 1,
          "ATE_DPT.3": 1,
          "ATE_FUN.1": 6
        },
        "AVA": {
          "AVA_VAN.5": 10
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 5": 1,
          "EAL 5 augmented": 1,
          "EAL 6+": 1,
          "EAL5": 9,
          "EAL5 augmented": 3,
          "EAL5+": 4
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 1
        },
        "FCO": {
          "FCO_NRO": 1
        },
        "FCS": {
          "FCS_CKM": 36,
          "FCS_CKM.1": 4,
          "FCS_CKM.2": 2,
          "FCS_CKM.3": 1,
          "FCS_CKM.4": 14,
          "FCS_CKM.4.1": 1,
          "FCS_CMK.4": 1,
          "FCS_COP": 24,
          "FCS_COP.1": 12,
          "FCS_COP.1.1": 1,
          "FCS_RNG.1": 1
        },
        "FDP": {
          "FDP_ACC": 34,
          "FDP_ACC.1": 11,
          "FDP_ACF": 27,
          "FDP_ACF.1": 15,
          "FDP_IFC": 2,
          "FDP_IFC.1": 5,
          "FDP_IFF": 2,
          "FDP_ITC": 1,
          "FDP_ITC.1": 2,
          "FDP_ITC.2": 2,
          "FDP_RIP": 15,
          "FDP_RIP.1": 9,
          "FDP_RIP.1.1": 1,
          "FDP_ROL": 1,
          "FDP_SDI": 17,
          "FDP_SDI.2": 6,
          "FDP_UIT": 6,
          "FDP_UIT.1": 2
        },
        "FIA": {
          "FIA_AFL.1": 5,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_ATD": 1,
          "FIA_UAU": 1,
          "FIA_UAU.1": 10,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UID": 2,
          "FIA_UID.1": 12,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1,
          "FIA_USB": 1
        },
        "FMT": {
          "FMT_MOF.1": 7,
          "FMT_MOF.1.1": 1,
          "FMT_MSA": 28,
          "FMT_MSA.1": 4,
          "FMT_MSA.2": 7,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 14,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MSA.4": 9,
          "FMT_MSA.4.1": 1,
          "FMT_MTD": 16,
          "FMT_MTD.1": 2,
          "FMT_SMF": 3,
          "FMT_SMF.1": 18,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 4,
          "FMT_SMR.1": 21,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPR": {
          "FPR_UNO": 1,
          "FPR_UNO.1": 1
        },
        "FPT": {
          "FPT_EMS": 4,
          "FPT_EMS.1": 8,
          "FPT_EMS.1.1": 4,
          "FPT_EMS.1.2": 3,
          "FPT_FLS": 8,
          "FPT_FLS.1": 8,
          "FPT_FLS.1.1": 1,
          "FPT_ITT": 1,
          "FPT_PHP": 2,
          "FPT_PHP.1": 7,
          "FPT_PHP.1.1": 1,
          "FPT_PHP.1.2": 1,
          "FPT_PHP.3": 8,
          "FPT_PHP.3.1": 2,
          "FPT_RCV": 2,
          "FPT_TDC.1": 1,
          "FPT_TST": 3,
          "FPT_TST.1": 11,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FTP": {
          "FTP_ITC": 15,
          "FTP_ITC.1": 7,
          "FTP_TRP.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 4
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Serma": {
          "Serma Safety \u0026 Security": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {
        "JavaCard": {
          "Java Card 3.1": 7
        }
      },
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 2,
          "RNG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "DFA": 1,
          "fault induction": 1,
          "fault injection": 1,
          "physical tampering": 9
        },
        "SCA": {
          "DPA": 1,
          "SPA": 1,
          "Side channel": 1,
          "timing attacks": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS31": 2
        },
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1,
          "CCMB-2017-04-004": 1
        },
        "FIPS": {
          "FIPS 180-4": 1,
          "FIPS 186-4": 3,
          "FIPS 202": 1
        },
        "ISO": {
          "ISO/IEC 10116": 4
        },
        "NIST": {
          "NIST SP 800-56A": 1
        },
        "PKCS": {
          "PKCS#1": 1
        },
        "SCP": {
          "SCP01": 1,
          "SCP02": 1,
          "SCP03": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 5
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {
        "IBM": {
          "SE": 1
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "Gemalto": {
          "Gemalto": 1
        },
        "Infineon": {
          "Infineon": 11
        },
        "Thales": {
          "Thales": 95
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "THALES",
      "/CreationDate": "D:20220620100119+02\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2016",
      "/ModDate": "D:20220620100119+02\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2016",
      "/Title": "BELPIC V1.8 applet on MultiApp V5.0 platform",
      "pdf_file_size_bytes": 2637994,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 75
    },
    "st_filename": "anssi-cible-cc-2022_53en.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 14
          },
          "ECDH": {
            "ECDH": 7
          },
          "ECDSA": {
            "ECDSA": 6
          }
        },
        "RSA": {
          "RSA 2048": 1
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1107-2020": 1
        },
        "FR": {
          "ANSSI-CC-2021/42": 1
        },
        "NL": {
          "CC-1": 2,
          "CC-2": 2,
          "CC-3": 2
        }
      },
      "cc_claims": {
        "A": {
          "A.CAP_FILE": 1,
          "A.CGA": 3,
          "A.SCA": 3,
          "A.VERIFICATION": 2
        },
        "D": {
          "D.SCD": 2,
          "D.SVD": 2
        },
        "O": {
          "O.ALARM": 1,
          "O.ARRAY_VIEWS_": 1,
          "O.CIPHER": 1,
          "O.CONFID-OS-UPDATE": 1,
          "O.DELETION": 1,
          "O.GLOBAL_ARRA": 2,
          "O.KEY-MNGT": 1,
          "O.OBJ-DELETION": 1,
          "O.OPERATE": 1,
          "O.PIN-MNGT": 1,
          "O.REALLOCATION": 1,
          "O.RESOURCES": 1,
          "O.SCP": 3,
          "O.SECURE_AC_ACTIVATION": 1,
          "O.SECURE_LOAD_ACODE": 1,
          "O.SID": 1,
          "O.TOE_IDENTIFICATION": 1,
          "O.TRANSACTION": 1
        },
        "OE": {
          "OE.CAP_FILE": 2,
          "OE.CODE-": 1,
          "OE.CODE-EVIDENCE": 1,
          "OE.HID_VAD": 11,
          "OE.VERIFICATION": 4
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0059-2009-MA-01": 1,
          "BSI-CC-PP-0099-V2-2020": 1,
          "BSI-PP-0084": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 7,
          "ADV_FSP.1": 4,
          "ADV_FSP.2": 2,
          "ADV_FSP.4": 1,
          "ADV_FSP.5": 8,
          "ADV_IMP.1": 9,
          "ADV_INT.2": 1,
          "ADV_TDS.1": 2,
          "ADV_TDS.3": 4,
          "ADV_TDS.4": 8
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 6,
          "AGD_PRE.1": 6
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.1": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 2,
          "ALC_DVS.2": 10,
          "ALC_LCD.1": 3,
          "ALC_TAT.1": 2,
          "ALC_TAT.2": 3
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 4,
          "ASE_INT.1": 5,
          "ASE_OBJ.2": 3,
          "ASE_REQ.1": 2,
          "ASE_REQ.2": 2,
          "ASE_SPD.1": 2,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.1": 2,
          "ATE_COV.2": 3,
          "ATE_DPT.1": 1,
          "ATE_DPT.3": 1,
          "ATE_FUN.1": 6
        },
        "AVA": {
          "AVA_VAN.5": 10
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 5": 1,
          "EAL 5 augmented": 1,
          "EAL 6+": 1,
          "EAL5": 9,
          "EAL5 augmented": 3,
          "EAL5+": 4
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 1
        },
        "FCO": {
          "FCO_NRO": 1
        },
        "FCS": {
          "FCS_CKM": 36,
          "FCS_CKM.1": 4,
          "FCS_CKM.2": 2,
          "FCS_CKM.3": 1,
          "FCS_CKM.4": 14,
          "FCS_CKM.4.1": 1,
          "FCS_CMK.4": 1,
          "FCS_COP": 24,
          "FCS_COP.1": 12,
          "FCS_COP.1.1": 1,
          "FCS_RNG.1": 1
        },
        "FDP": {
          "FDP_ACC": 34,
          "FDP_ACC.1": 11,
          "FDP_ACF": 27,
          "FDP_ACF.1": 15,
          "FDP_IFC": 2,
          "FDP_IFC.1": 5,
          "FDP_IFF": 2,
          "FDP_ITC": 1,
          "FDP_ITC.1": 2,
          "FDP_ITC.2": 2,
          "FDP_RIP": 15,
          "FDP_RIP.1": 9,
          "FDP_RIP.1.1": 1,
          "FDP_ROL": 1,
          "FDP_SDI": 17,
          "FDP_SDI.2": 6,
          "FDP_UIT": 6,
          "FDP_UIT.1": 2
        },
        "FIA": {
          "FIA_AFL.1": 5,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_ATD": 1,
          "FIA_UAU": 1,
          "FIA_UAU.1": 10,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UID": 2,
          "FIA_UID.1": 12,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1,
          "FIA_USB": 1
        },
        "FMT": {
          "FMT_MOF.1": 7,
          "FMT_MOF.1.1": 1,
          "FMT_MSA": 28,
          "FMT_MSA.1": 4,
          "FMT_MSA.2": 7,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 14,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MSA.4": 9,
          "FMT_MSA.4.1": 1,
          "FMT_MTD": 16,
          "FMT_MTD.1": 2,
          "FMT_SMF": 3,
          "FMT_SMF.1": 18,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 4,
          "FMT_SMR.1": 21,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPR": {
          "FPR_UNO": 1,
          "FPR_UNO.1": 1
        },
        "FPT": {
          "FPT_EMS": 4,
          "FPT_EMS.1": 8,
          "FPT_EMS.1.1": 4,
          "FPT_EMS.1.2": 3,
          "FPT_FLS": 8,
          "FPT_FLS.1": 8,
          "FPT_FLS.1.1": 1,
          "FPT_ITT": 1,
          "FPT_PHP": 2,
          "FPT_PHP.1": 7,
          "FPT_PHP.1.1": 1,
          "FPT_PHP.1.2": 1,
          "FPT_PHP.3": 8,
          "FPT_PHP.3.1": 2,
          "FPT_RCV": 2,
          "FPT_TDC.1": 1,
          "FPT_TST": 3,
          "FPT_TST.1": 11,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FTP": {
          "FTP_ITC": 15,
          "FTP_ITC.1": 7,
          "FTP_TRP.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 4
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Serma": {
          "Serma Safety \u0026 Security": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {
        "JavaCard": {
          "Java Card 3.1": 7
        }
      },
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 2,
          "RNG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "DFA": 1,
          "fault induction": 1,
          "fault injection": 1,
          "physical tampering": 9
        },
        "SCA": {
          "DPA": 1,
          "SPA": 1,
          "Side channel": 1,
          "timing attacks": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS31": 2
        },
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1,
          "CCMB-2017-04-004": 1
        },
        "FIPS": {
          "FIPS 180-4": 1,
          "FIPS 186-4": 3,
          "FIPS 202": 1
        },
        "ISO": {
          "ISO/IEC 10116": 4
        },
        "NIST": {
          "NIST SP 800-56A": 1
        },
        "PKCS": {
          "PKCS#1": 1
        },
        "SCP": {
          "SCP01": 1,
          "SCP02": 1,
          "SCP03": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 5
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {
        "IBM": {
          "SE": 1
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "Gemalto": {
          "Gemalto": 1
        },
        "Infineon": {
          "Infineon": 11
        },
        "Thales": {
          "Thales": 95
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "THALES",
      "/CreationDate": "D:20220620100119+02\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2016",
      "/ModDate": "D:20220620100119+02\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2016",
      "/Title": "BELPIC V1.8 applet on MultiApp V5.0 platform",
      "pdf_file_size_bytes": 2637994,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 75
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0072b_pdf.pdf",
        "pp_name": "Protection profiles for secure signature creation device \u2014 Part 5: Extension for device with key gene..."
      },
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf",
        "pp_name": "Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Version..."
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2022_53en.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL5+",
      "ALC_DVS.2",
      "AVA_VAN.5"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2022_53en.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": true,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "c0362ddf2f1a3d0c41c7a0a2d8f81cf00090a15c80518329309f3613b14603ce",
      "txt_hash": "32dc2ddf26f94db898269dae471caa5514495cea89549c141e52df476ba67bb7"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "68e6188ca228f64b35a1be4546a2fc5931b3793056f9e3bad8cb7c17cdbbdd50",
      "txt_hash": "a4cdb81b9630dba243eb10bde9dbb88d25a8b23073a23190d1390e19a0e176e9"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "68e6188ca228f64b35a1be4546a2fc5931b3793056f9e3bad8cb7c17cdbbdd50",
      "txt_hash": "a4cdb81b9630dba243eb10bde9dbb88d25a8b23073a23190d1390e19a0e176e9"
    }
  },
  "status": "active"
}