BelPIC V1.8 on MultiApp V5.0 Platform

CSV information ?

Status active
Valid from 29.11.2022
Valid until 29.11.2027
Scheme 🇫🇷 FR
Manufacturer THALES DIS FRANCE SA
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level AVA_VAN.5, ALC_DVS.2, EAL5+

Heuristics summary ?

Certificate ID: ANSSI-CC-2022/53

Certificate ?

Extracted keywords

Security level
EAL5, EAL2
Certificates
ANSSI-CC-2022/53
Evaluation facilities
SERMA

File metadata

Title ANSSI-CC-2022/53
Keywords version 3.1, révision 5
Author DUCLOS Charlene
Creation date D:20221201134439+01'00'
Modification date D:20221201134439+01'00'
Pages 2
Creator Microsoft® Word 2019
Producer Microsoft® Word 2019

Certification report ?

Extracted keywords

Symmetric Algorithms
AES
Asymmetric Algorithms
RSA 2048, ECDH, ECDSA, ECC
Schemes
Key Agreement
Protocols
PACE
Randomness
RND, RNG

JavaCard versions
Java Card 3.1
Trusted Execution Environments
SE
Vendor
Infineon, Gemalto, Thales

Security level
EAL5+, EAL 5, EAL5, EAL 6+, EAL 5 augmented, EAL5 augmented
Claims
D.SCD, D.SVD, O.CIPHER, O.KEY-MNGT, O.REALLOCATION, O.GLOBAL_ARRA, O.ARRAY_VIEWS_, O.TRANSACTION, O.PIN-MNGT, O.OPERATE, O.DELETION, O.RESOURCES, O.ALARM, O.OBJ-DELETION, O.SCP, O.SID, O.SECURE_LOAD_ACODE, O.SECURE_AC_ACTIVATION, O.TOE_IDENTIFICATION, O.CONFID-OS-UPDATE, A.CGA, A.SCA, A.VERIFICATION, A.CAP_FILE, OE.HID_VAD, OE.VERIFICATION, OE.CAP_FILE, OE.CODE-EVIDENCE, OE.CODE-
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_TDS.1, ADV_FSP.5, ADV_TDS.4, ADV_IMP.1, ADV_TDS.3, ADV_INT.2, ADV_FSP.2, ADV_FSP.4, AGD_OPE, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_TAT.1, ALC_TAT.2, ALC_CMC.4, ALC_CMS.1, ALC_DVS.1, ALC_LCD.1, ALC_CMS.4, ALC_DEL.1, ATE_COV.2, ATE_FUN.1, ATE_COV.1, ATE_DPT.1, ATE_DPT.3, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1, ASE_REQ.2, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_ARP.1, FCO_NRO, FCS_CKM, FCS_CKM.1, FCS_CKM.4, FCS_CKM.4.1, FCS_COP.1, FCS_COP.1.1, FCS_CKM.3, FCS_COP, FCS_RNG.1, FCS_CMK.4, FCS_CKM.2, FDP_ACC, FDP_ACC.1, FDP_ACF, FDP_ACF.1, FDP_RIP.1, FDP_RIP.1.1, FDP_SDI, FDP_SDI.2, FDP_UIT, FDP_UIT.1, FDP_IFC, FDP_IFF, FDP_RIP, FDP_ROL, FDP_ITC, FDP_ITC.1, FDP_ITC.2, FDP_IFC.1, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD, FIA_UID, FIA_USB, FIA_UAU, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1, FMT_SMF.1.1, FMT_MOF.1, FMT_MOF.1.1, FMT_MSA, FMT_MSA.1, FMT_MSA.2, FMT_MSA.2.1, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.4, FMT_MSA.4.1, FMT_MTD, FMT_MTD.1, FMT_SMR, FMT_SMF, FPR_UNO.1, FPR_UNO, FPT_EMS, FPT_EMS.1, FPT_EMS.1.1, FPT_EMS.1.2, FPT_TST.1, FPT_FLS.1, FPT_FLS.1.1, FPT_TST, FPT_PHP.1, FPT_PHP.1.1, FPT_PHP.1.2, FPT_PHP.3, FPT_PHP.3.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_FLS, FPT_TDC.1, FPT_RCV, FPT_PHP, FPT_ITT, FTP_ITC, FTP_ITC.1, FTP_TRP.1
Protection profiles
BSI-PP-0084, BSI-CC-PP-0099-V2-2020, BSI-CC-PP-0059-2009-MA-01
Certificates
BSI-DSZ-CC-1107-2020, ANSSI-CC-2021/42, CC-1, CC-2, CC-3
Evaluation facilities
Serma Safety & Security

Side-channel analysis
Side channel, SPA, DPA, timing attacks, physical tampering, DFA, fault induction, fault injection

Standards
FIPS 186-4, FIPS 180-4, FIPS 202, NIST SP 800-56A, PKCS#1, AIS31, ISO/IEC 10116, SCP01, SCP02, SCP03, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004

File metadata

Title BELPIC V1.8 applet on MultiApp V5.0 platform
Author THALES
Creation date D:20220620100119+02'00'
Modification date D:20220620100119+02'00'
Pages 75
Creator Microsoft® Word 2016
Producer Microsoft® Word 2016

References

Outgoing
  • BSI-DSZ-CC-1107-2020 - active - IFX_CCI_00002Dh, IFX_CCI_000039h, IFX_CCI_00003Ah, IFX_CCI_000044h, IFX_CCI_000045h, IFX_CCI_000046h, IFX_CCI_000047h, IFX_CCI_000048h, IFX_CCI_000049h, IFX_CCI_00004Ah, IFX_CCI_00004Bh, IFX_CCI_00004Ch, IFX_CCI_00004Dh, IFX_CCI_00004Eh design step T11 with firmware 80.306.16.0, optional NRG™ SW 05.03.4097, optional HSL v3.52.9708, UMSLC lib v01.30.0564, optional SCL v2.11.003, optional ACL v3.02.000 and user guidance
  • ANSSI-CC-2021/42 - active - Plateforme Java Card MultiApp V5.0 version 5.0

Security target ?

Extracted keywords

Symmetric Algorithms
AES
Asymmetric Algorithms
RSA 2048, ECDH, ECDSA, ECC
Schemes
Key Agreement
Protocols
PACE
Randomness
RND, RNG

JavaCard versions
Java Card 3.1
Trusted Execution Environments
SE
Vendor
Infineon, Gemalto, Thales

Security level
EAL5+, EAL 5, EAL5, EAL 6+, EAL 5 augmented, EAL5 augmented
Claims
D.SCD, D.SVD, O.CIPHER, O.KEY-MNGT, O.REALLOCATION, O.GLOBAL_ARRA, O.ARRAY_VIEWS_, O.TRANSACTION, O.PIN-MNGT, O.OPERATE, O.DELETION, O.RESOURCES, O.ALARM, O.OBJ-DELETION, O.SCP, O.SID, O.SECURE_LOAD_ACODE, O.SECURE_AC_ACTIVATION, O.TOE_IDENTIFICATION, O.CONFID-OS-UPDATE, A.CGA, A.SCA, A.VERIFICATION, A.CAP_FILE, OE.HID_VAD, OE.VERIFICATION, OE.CAP_FILE, OE.CODE-EVIDENCE, OE.CODE-
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_TDS.1, ADV_FSP.5, ADV_TDS.4, ADV_IMP.1, ADV_TDS.3, ADV_INT.2, ADV_FSP.2, ADV_FSP.4, AGD_OPE, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_TAT.1, ALC_TAT.2, ALC_CMC.4, ALC_CMS.1, ALC_DVS.1, ALC_LCD.1, ALC_CMS.4, ALC_DEL.1, ATE_COV.2, ATE_FUN.1, ATE_COV.1, ATE_DPT.1, ATE_DPT.3, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1, ASE_REQ.2, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_ARP.1, FCO_NRO, FCS_CKM, FCS_CKM.1, FCS_CKM.4, FCS_CKM.4.1, FCS_COP.1, FCS_COP.1.1, FCS_CKM.3, FCS_COP, FCS_RNG.1, FCS_CMK.4, FCS_CKM.2, FDP_ACC, FDP_ACC.1, FDP_ACF, FDP_ACF.1, FDP_RIP.1, FDP_RIP.1.1, FDP_SDI, FDP_SDI.2, FDP_UIT, FDP_UIT.1, FDP_IFC, FDP_IFF, FDP_RIP, FDP_ROL, FDP_ITC, FDP_ITC.1, FDP_ITC.2, FDP_IFC.1, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD, FIA_UID, FIA_USB, FIA_UAU, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1, FMT_SMF.1.1, FMT_MOF.1, FMT_MOF.1.1, FMT_MSA, FMT_MSA.1, FMT_MSA.2, FMT_MSA.2.1, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.4, FMT_MSA.4.1, FMT_MTD, FMT_MTD.1, FMT_SMR, FMT_SMF, FPR_UNO.1, FPR_UNO, FPT_EMS, FPT_EMS.1, FPT_EMS.1.1, FPT_EMS.1.2, FPT_TST.1, FPT_FLS.1, FPT_FLS.1.1, FPT_TST, FPT_PHP.1, FPT_PHP.1.1, FPT_PHP.1.2, FPT_PHP.3, FPT_PHP.3.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_FLS, FPT_TDC.1, FPT_RCV, FPT_PHP, FPT_ITT, FTP_ITC, FTP_ITC.1, FTP_TRP.1
Protection profiles
BSI-PP-0084, BSI-CC-PP-0099-V2-2020, BSI-CC-PP-0059-2009-MA-01
Certificates
BSI-DSZ-CC-1107-2020, ANSSI-CC-2021/42, CC-1, CC-2, CC-3
Evaluation facilities
Serma Safety & Security

Side-channel analysis
Side channel, SPA, DPA, timing attacks, physical tampering, DFA, fault induction, fault injection

Standards
FIPS 186-4, FIPS 180-4, FIPS 202, NIST SP 800-56A, PKCS#1, AIS31, ISO/IEC 10116, SCP01, SCP02, SCP03, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004

File metadata

Title BELPIC V1.8 applet on MultiApp V5.0 platform
Author THALES
Creation date D:20220620100119+02'00'
Modification date D:20220620100119+02'00'
Pages 75
Creator Microsoft® Word 2016
Producer Microsoft® Word 2016

References

Outgoing
  • BSI-DSZ-CC-1107-2020 - active - IFX_CCI_00002Dh, IFX_CCI_000039h, IFX_CCI_00003Ah, IFX_CCI_000044h, IFX_CCI_000045h, IFX_CCI_000046h, IFX_CCI_000047h, IFX_CCI_000048h, IFX_CCI_000049h, IFX_CCI_00004Ah, IFX_CCI_00004Bh, IFX_CCI_00004Ch, IFX_CCI_00004Dh, IFX_CCI_00004Eh design step T11 with firmware 80.306.16.0, optional NRG™ SW 05.03.4097, optional HSL v3.52.9708, UMSLC lib v01.30.0564, optional SCL v2.11.003, optional ACL v3.02.000 and user guidance
  • ANSSI-CC-2021/42 - active - Plateforme Java Card MultiApp V5.0 version 5.0

Heuristics ?

Certificate ID: ANSSI-CC-2022/53

Extracted SARs

ALC_LCD.1, ASE_SPD.1, ASE_REQ.2, ALC_TAT.2, ADV_IMP.1, ASE_INT.1, ALC_DVS.2, ADV_INT.2, ASE_CCL.1, ALC_CMC.4, AGD_OPE.1, ADV_FSP.5, ALC_CMS.4, ASE_TSS.1, ALC_DEL.1, ATE_FUN.1, ADV_ARC.1, ATE_COV.2, AGD_PRE.1, AVA_VAN.5, ADV_TDS.4, ATE_DPT.3, ASE_OBJ.2, ASE_ECD.1

References ?

Updates ?

  • 02.09.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The cert property was updated, with the {'download_ok': True, 'convert_garbage': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'c0362ddf2f1a3d0c41c7a0a2d8f81cf00090a15c80518329309f3613b14603ce', 'txt_hash': '32dc2ddf26f94db898269dae471caa5514495cea89549c141e52df476ba67bb7'} data.

    The PDF extraction data was updated.

    • The cert_metadata property was set to {'pdf_file_size_bytes': 311402, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 2, '/Title': 'ANSSI-CC-2022/53', '/Author': 'DUCLOS Charlene', '/Keywords': 'version 3.1, rĂ©vision 5', '/Creator': 'Microsoft® Word 2019', '/CreationDate': "D:20221201134439+01'00'", '/ModDate': "D:20221201134439+01'00'", '/Producer': 'Microsoft® Word 2019', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The cert_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2022/53': 2}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL5': 1, 'EAL2': 1}}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'Serma': {'SERMA': 2}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The cert_filename property was set to certificat-anssi-cc-2022_53.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to ANSSI-CC-2022/53.
    • The st_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1107-2020', 'ANSSI-CC-2021/42']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1107-2020', 'ANSSI-CC-2021/42']}} data.
    • The report_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1107-2020', 'ANSSI-CC-2021/42']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1107-2020', 'ANSSI-CC-2021/42']}} data.
    • The scheme_data property was set to {'product': 'BelPIC V1.8 on MultiApp V5.0 Platform (v1.8 revision 1.2)', 'url': 'https://cyber.gouv.fr/produits-certifies/belpic-v18-multiapp-v50-platform-v18-revision-12', 'description': ' Le produit Ă©valuĂ© est la carte Ă  puce « BelPIC V1.8 on MultiApp V5.0 Platform, V1.8 revision 1.2 » dĂ©veloppĂ© par THALES DIS et INFINEON TECHNOLOGIES AG.\nCette carte Ă  puce dispose d’une interface contact. Elle est destinĂ©e Ă  ĂŞtre utilisĂ© comme dispositif sĂ©curisĂ© de crĂ©ation de signature Ă©lectronique (SSCD) pour le marchĂ© de carte d’identitĂ© belge.', 'sponsor': 'THALES DIS', 'developer': 'THALES DIS, INFINEON TECHNOLOGIES AG', 'cert_id': 'ANSSI-CC-2022/53', 'level': 'EAL5+', 'expiration_date': '28 Novembre 2027', 'enhanced': {'cert_id': 'ANSSI-CC-2022/53', 'certification_date': '29/11/2022', 'expiration_date': '28/11/2027', 'category': 'Cartes Ă  puce', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'THALES DIS, INFINEON TECHNOLOGIES AG', 'sponsor': 'THALES DIS', 'evaluation_facility': 'SERMA SAFETY & SECURITY', 'level': 'EAL5+', 'protection_profile': 'Protection profiles for secure signature creation device:\nPart 2 : Device with key generation, v2.0.1, BSI-CC-PP-0059-2009-MA-01 ;\nPart 5 : Extension for device with key generation and trusted communication with signature creation application, v1.0.1, BSI-CC-PP-0072-2012.', 'mutual_recognition': 'CCRA\n SOG-IS', 'augmented': 'ALC_DVS.2, AVA_VAN.5'}}.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2022_53en.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2022_53en.pdf.

    The state of the certificate object was updated.

    • The cert property was updated, with the {'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The cert_metadata property was set to None.
    • The cert_keywords property was set to None.
    • The cert_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to ANSSI-CC-2021/42.
    • The st_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The report_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The scheme_data property was set to None.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'BelPIC V1.8 on MultiApp V5.0 Platform (v1.8 revision 1.2)', 'url': 'https://cyber.gouv.fr/produits-certifies/belpic-v18-multiapp-v50-platform-v18-revision-12', 'description': ' Le produit Ă©valuĂ© est la carte Ă  puce « BelPIC V1.8 on MultiApp V5.0 Platform, V1.8 revision 1.2 » dĂ©veloppĂ© par THALES DIS et INFINEON TECHNOLOGIES AG.\nCette carte Ă  puce dispose d’une interface contact. Elle est destinĂ©e Ă  ĂŞtre utilisĂ© comme dispositif sĂ©curisĂ© de crĂ©ation de signature Ă©lectronique (SSCD) pour le marchĂ© de carte d’identitĂ© belge.', 'sponsor': 'THALES DIS', 'developer': 'THALES DIS, INFINEON TECHNOLOGIES AG', 'cert_id': 'ANSSI-CC-2022/53', 'level': 'EAL5+', 'expiration_date': '28 Novembre 2027', 'enhanced': {'cert_id': 'ANSSI-CC-2022/53', 'certification_date': '29/11/2022', 'expiration_date': '28/11/2027', 'category': 'Cartes Ă  puce', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'THALES DIS, INFINEON TECHNOLOGIES AG', 'sponsor': 'THALES DIS', 'evaluation_facility': 'SERMA SAFETY & SECURITY', 'level': 'EAL5+', 'protection_profile': 'Protection profiles for secure signature creation device:\nPart 2 : Device with key generation, v2.0.1, BSI-CC-PP-0059-2009-MA-01 ;\nPart 5 : Extension for device with key generation and trusted communication with signature creation application, v1.0.1, BSI-CC-PP-0072-2012.', 'mutual_recognition': 'CCRA\n SOG-IS', 'augmented': 'ALC_DVS.2, AVA_VAN.5'}}.
  • 31.07.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name BelPIC V1.8 on MultiApp V5.0 Platform was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2022_53.pdf",
  "dgst": "a9803e693eaf95e9",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2022/53",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.8",
        "5.0"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1107-2020",
          "ANSSI-CC-2021/42"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1107-2020",
          "ANSSI-CC-2021/42"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1107-2020",
          "ANSSI-CC-2021/42"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1107-2020",
          "ANSSI-CC-2021/42"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "THALES DIS FRANCE SA",
  "manufacturer_web": "https://www.thalesgroup.com/en/europe/france",
  "name": "BelPIC V1.8 on MultiApp V5.0 Platform",
  "not_valid_after": "2027-11-29",
  "not_valid_before": "2022-11-29",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "certificat-anssi-cc-2022_53.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2022/53": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {
        "EAL": {
          "EAL2": 1,
          "EAL5": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Serma": {
          "SERMA": 2
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "DUCLOS Charlene",
      "/CreationDate": "D:20221201134439+01\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2019",
      "/Keywords": "version 3.1, r\u00e9vision 5",
      "/ModDate": "D:20221201134439+01\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2019",
      "/Title": "ANSSI-CC-2022/53",
      "pdf_file_size_bytes": 311402,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 2
    },
    "report_filename": "anssi-cible-cc-2022_53en.pdf",
    "report_frontpage": {
      "FR": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 14
          },
          "ECDH": {
            "ECDH": 7
          },
          "ECDSA": {
            "ECDSA": 6
          }
        },
        "RSA": {
          "RSA 2048": 1
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1107-2020": 1
        },
        "FR": {
          "ANSSI-CC-2021/42": 1
        },
        "NL": {
          "CC-1": 2,
          "CC-2": 2,
          "CC-3": 2
        }
      },
      "cc_claims": {
        "A": {
          "A.CAP_FILE": 1,
          "A.CGA": 3,
          "A.SCA": 3,
          "A.VERIFICATION": 2
        },
        "D": {
          "D.SCD": 2,
          "D.SVD": 2
        },
        "O": {
          "O.ALARM": 1,
          "O.ARRAY_VIEWS_": 1,
          "O.CIPHER": 1,
          "O.CONFID-OS-UPDATE": 1,
          "O.DELETION": 1,
          "O.GLOBAL_ARRA": 2,
          "O.KEY-MNGT": 1,
          "O.OBJ-DELETION": 1,
          "O.OPERATE": 1,
          "O.PIN-MNGT": 1,
          "O.REALLOCATION": 1,
          "O.RESOURCES": 1,
          "O.SCP": 3,
          "O.SECURE_AC_ACTIVATION": 1,
          "O.SECURE_LOAD_ACODE": 1,
          "O.SID": 1,
          "O.TOE_IDENTIFICATION": 1,
          "O.TRANSACTION": 1
        },
        "OE": {
          "OE.CAP_FILE": 2,
          "OE.CODE-": 1,
          "OE.CODE-EVIDENCE": 1,
          "OE.HID_VAD": 11,
          "OE.VERIFICATION": 4
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0059-2009-MA-01": 1,
          "BSI-CC-PP-0099-V2-2020": 1,
          "BSI-PP-0084": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 7,
          "ADV_FSP.1": 4,
          "ADV_FSP.2": 2,
          "ADV_FSP.4": 1,
          "ADV_FSP.5": 8,
          "ADV_IMP.1": 9,
          "ADV_INT.2": 1,
          "ADV_TDS.1": 2,
          "ADV_TDS.3": 4,
          "ADV_TDS.4": 8
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 6,
          "AGD_PRE.1": 6
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.1": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 2,
          "ALC_DVS.2": 10,
          "ALC_LCD.1": 3,
          "ALC_TAT.1": 2,
          "ALC_TAT.2": 3
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 4,
          "ASE_INT.1": 5,
          "ASE_OBJ.2": 3,
          "ASE_REQ.1": 2,
          "ASE_REQ.2": 2,
          "ASE_SPD.1": 2,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.1": 2,
          "ATE_COV.2": 3,
          "ATE_DPT.1": 1,
          "ATE_DPT.3": 1,
          "ATE_FUN.1": 6
        },
        "AVA": {
          "AVA_VAN.5": 10
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 5": 1,
          "EAL 5 augmented": 1,
          "EAL 6+": 1,
          "EAL5": 9,
          "EAL5 augmented": 3,
          "EAL5+": 4
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 1
        },
        "FCO": {
          "FCO_NRO": 1
        },
        "FCS": {
          "FCS_CKM": 36,
          "FCS_CKM.1": 4,
          "FCS_CKM.2": 2,
          "FCS_CKM.3": 1,
          "FCS_CKM.4": 14,
          "FCS_CKM.4.1": 1,
          "FCS_CMK.4": 1,
          "FCS_COP": 24,
          "FCS_COP.1": 12,
          "FCS_COP.1.1": 1,
          "FCS_RNG.1": 1
        },
        "FDP": {
          "FDP_ACC": 34,
          "FDP_ACC.1": 11,
          "FDP_ACF": 27,
          "FDP_ACF.1": 15,
          "FDP_IFC": 2,
          "FDP_IFC.1": 5,
          "FDP_IFF": 2,
          "FDP_ITC": 1,
          "FDP_ITC.1": 2,
          "FDP_ITC.2": 2,
          "FDP_RIP": 15,
          "FDP_RIP.1": 9,
          "FDP_RIP.1.1": 1,
          "FDP_ROL": 1,
          "FDP_SDI": 17,
          "FDP_SDI.2": 6,
          "FDP_UIT": 6,
          "FDP_UIT.1": 2
        },
        "FIA": {
          "FIA_AFL.1": 5,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_ATD": 1,
          "FIA_UAU": 1,
          "FIA_UAU.1": 10,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UID": 2,
          "FIA_UID.1": 12,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1,
          "FIA_USB": 1
        },
        "FMT": {
          "FMT_MOF.1": 7,
          "FMT_MOF.1.1": 1,
          "FMT_MSA": 28,
          "FMT_MSA.1": 4,
          "FMT_MSA.2": 7,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 14,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MSA.4": 9,
          "FMT_MSA.4.1": 1,
          "FMT_MTD": 16,
          "FMT_MTD.1": 2,
          "FMT_SMF": 3,
          "FMT_SMF.1": 18,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 4,
          "FMT_SMR.1": 21,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPR": {
          "FPR_UNO": 1,
          "FPR_UNO.1": 1
        },
        "FPT": {
          "FPT_EMS": 4,
          "FPT_EMS.1": 8,
          "FPT_EMS.1.1": 4,
          "FPT_EMS.1.2": 3,
          "FPT_FLS": 8,
          "FPT_FLS.1": 8,
          "FPT_FLS.1.1": 1,
          "FPT_ITT": 1,
          "FPT_PHP": 2,
          "FPT_PHP.1": 7,
          "FPT_PHP.1.1": 1,
          "FPT_PHP.1.2": 1,
          "FPT_PHP.3": 8,
          "FPT_PHP.3.1": 2,
          "FPT_RCV": 2,
          "FPT_TDC.1": 1,
          "FPT_TST": 3,
          "FPT_TST.1": 11,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FTP": {
          "FTP_ITC": 15,
          "FTP_ITC.1": 7,
          "FTP_TRP.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 4
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Serma": {
          "Serma Safety \u0026 Security": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {
        "JavaCard": {
          "Java Card 3.1": 7
        }
      },
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 2,
          "RNG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "DFA": 1,
          "fault induction": 1,
          "fault injection": 1,
          "physical tampering": 9
        },
        "SCA": {
          "DPA": 1,
          "SPA": 1,
          "Side channel": 1,
          "timing attacks": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS31": 2
        },
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1,
          "CCMB-2017-04-004": 1
        },
        "FIPS": {
          "FIPS 180-4": 1,
          "FIPS 186-4": 3,
          "FIPS 202": 1
        },
        "ISO": {
          "ISO/IEC 10116": 4
        },
        "NIST": {
          "NIST SP 800-56A": 1
        },
        "PKCS": {
          "PKCS#1": 1
        },
        "SCP": {
          "SCP01": 1,
          "SCP02": 1,
          "SCP03": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 5
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {
        "IBM": {
          "SE": 1
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "Gemalto": {
          "Gemalto": 1
        },
        "Infineon": {
          "Infineon": 11
        },
        "Thales": {
          "Thales": 95
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "THALES",
      "/CreationDate": "D:20220620100119+02\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2016",
      "/ModDate": "D:20220620100119+02\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2016",
      "/Title": "BELPIC V1.8 applet on MultiApp V5.0 platform",
      "pdf_file_size_bytes": 2637994,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 75
    },
    "st_filename": "anssi-cible-cc-2022_53en.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 14
          },
          "ECDH": {
            "ECDH": 7
          },
          "ECDSA": {
            "ECDSA": 6
          }
        },
        "RSA": {
          "RSA 2048": 1
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1107-2020": 1
        },
        "FR": {
          "ANSSI-CC-2021/42": 1
        },
        "NL": {
          "CC-1": 2,
          "CC-2": 2,
          "CC-3": 2
        }
      },
      "cc_claims": {
        "A": {
          "A.CAP_FILE": 1,
          "A.CGA": 3,
          "A.SCA": 3,
          "A.VERIFICATION": 2
        },
        "D": {
          "D.SCD": 2,
          "D.SVD": 2
        },
        "O": {
          "O.ALARM": 1,
          "O.ARRAY_VIEWS_": 1,
          "O.CIPHER": 1,
          "O.CONFID-OS-UPDATE": 1,
          "O.DELETION": 1,
          "O.GLOBAL_ARRA": 2,
          "O.KEY-MNGT": 1,
          "O.OBJ-DELETION": 1,
          "O.OPERATE": 1,
          "O.PIN-MNGT": 1,
          "O.REALLOCATION": 1,
          "O.RESOURCES": 1,
          "O.SCP": 3,
          "O.SECURE_AC_ACTIVATION": 1,
          "O.SECURE_LOAD_ACODE": 1,
          "O.SID": 1,
          "O.TOE_IDENTIFICATION": 1,
          "O.TRANSACTION": 1
        },
        "OE": {
          "OE.CAP_FILE": 2,
          "OE.CODE-": 1,
          "OE.CODE-EVIDENCE": 1,
          "OE.HID_VAD": 11,
          "OE.VERIFICATION": 4
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0059-2009-MA-01": 1,
          "BSI-CC-PP-0099-V2-2020": 1,
          "BSI-PP-0084": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 7,
          "ADV_FSP.1": 4,
          "ADV_FSP.2": 2,
          "ADV_FSP.4": 1,
          "ADV_FSP.5": 8,
          "ADV_IMP.1": 9,
          "ADV_INT.2": 1,
          "ADV_TDS.1": 2,
          "ADV_TDS.3": 4,
          "ADV_TDS.4": 8
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 6,
          "AGD_PRE.1": 6
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.1": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 2,
          "ALC_DVS.2": 10,
          "ALC_LCD.1": 3,
          "ALC_TAT.1": 2,
          "ALC_TAT.2": 3
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 4,
          "ASE_INT.1": 5,
          "ASE_OBJ.2": 3,
          "ASE_REQ.1": 2,
          "ASE_REQ.2": 2,
          "ASE_SPD.1": 2,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.1": 2,
          "ATE_COV.2": 3,
          "ATE_DPT.1": 1,
          "ATE_DPT.3": 1,
          "ATE_FUN.1": 6
        },
        "AVA": {
          "AVA_VAN.5": 10
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 5": 1,
          "EAL 5 augmented": 1,
          "EAL 6+": 1,
          "EAL5": 9,
          "EAL5 augmented": 3,
          "EAL5+": 4
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 1
        },
        "FCO": {
          "FCO_NRO": 1
        },
        "FCS": {
          "FCS_CKM": 36,
          "FCS_CKM.1": 4,
          "FCS_CKM.2": 2,
          "FCS_CKM.3": 1,
          "FCS_CKM.4": 14,
          "FCS_CKM.4.1": 1,
          "FCS_CMK.4": 1,
          "FCS_COP": 24,
          "FCS_COP.1": 12,
          "FCS_COP.1.1": 1,
          "FCS_RNG.1": 1
        },
        "FDP": {
          "FDP_ACC": 34,
          "FDP_ACC.1": 11,
          "FDP_ACF": 27,
          "FDP_ACF.1": 15,
          "FDP_IFC": 2,
          "FDP_IFC.1": 5,
          "FDP_IFF": 2,
          "FDP_ITC": 1,
          "FDP_ITC.1": 2,
          "FDP_ITC.2": 2,
          "FDP_RIP": 15,
          "FDP_RIP.1": 9,
          "FDP_RIP.1.1": 1,
          "FDP_ROL": 1,
          "FDP_SDI": 17,
          "FDP_SDI.2": 6,
          "FDP_UIT": 6,
          "FDP_UIT.1": 2
        },
        "FIA": {
          "FIA_AFL.1": 5,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_ATD": 1,
          "FIA_UAU": 1,
          "FIA_UAU.1": 10,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UID": 2,
          "FIA_UID.1": 12,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1,
          "FIA_USB": 1
        },
        "FMT": {
          "FMT_MOF.1": 7,
          "FMT_MOF.1.1": 1,
          "FMT_MSA": 28,
          "FMT_MSA.1": 4,
          "FMT_MSA.2": 7,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 14,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MSA.4": 9,
          "FMT_MSA.4.1": 1,
          "FMT_MTD": 16,
          "FMT_MTD.1": 2,
          "FMT_SMF": 3,
          "FMT_SMF.1": 18,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 4,
          "FMT_SMR.1": 21,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPR": {
          "FPR_UNO": 1,
          "FPR_UNO.1": 1
        },
        "FPT": {
          "FPT_EMS": 4,
          "FPT_EMS.1": 8,
          "FPT_EMS.1.1": 4,
          "FPT_EMS.1.2": 3,
          "FPT_FLS": 8,
          "FPT_FLS.1": 8,
          "FPT_FLS.1.1": 1,
          "FPT_ITT": 1,
          "FPT_PHP": 2,
          "FPT_PHP.1": 7,
          "FPT_PHP.1.1": 1,
          "FPT_PHP.1.2": 1,
          "FPT_PHP.3": 8,
          "FPT_PHP.3.1": 2,
          "FPT_RCV": 2,
          "FPT_TDC.1": 1,
          "FPT_TST": 3,
          "FPT_TST.1": 11,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FTP": {
          "FTP_ITC": 15,
          "FTP_ITC.1": 7,
          "FTP_TRP.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 4
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Serma": {
          "Serma Safety \u0026 Security": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {
        "JavaCard": {
          "Java Card 3.1": 7
        }
      },
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 2,
          "RNG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "DFA": 1,
          "fault induction": 1,
          "fault injection": 1,
          "physical tampering": 9
        },
        "SCA": {
          "DPA": 1,
          "SPA": 1,
          "Side channel": 1,
          "timing attacks": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS31": 2
        },
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1,
          "CCMB-2017-04-004": 1
        },
        "FIPS": {
          "FIPS 180-4": 1,
          "FIPS 186-4": 3,
          "FIPS 202": 1
        },
        "ISO": {
          "ISO/IEC 10116": 4
        },
        "NIST": {
          "NIST SP 800-56A": 1
        },
        "PKCS": {
          "PKCS#1": 1
        },
        "SCP": {
          "SCP01": 1,
          "SCP02": 1,
          "SCP03": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 5
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {
        "IBM": {
          "SE": 1
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "Gemalto": {
          "Gemalto": 1
        },
        "Infineon": {
          "Infineon": 11
        },
        "Thales": {
          "Thales": 95
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "THALES",
      "/CreationDate": "D:20220620100119+02\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2016",
      "/ModDate": "D:20220620100119+02\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2016",
      "/Title": "BELPIC V1.8 applet on MultiApp V5.0 platform",
      "pdf_file_size_bytes": 2637994,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 75
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf",
        "pp_name": "Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Version..."
      },
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0072b_pdf.pdf",
        "pp_name": "Protection profiles for secure signature creation device \u2014 Part 5: Extension for device with key gene..."
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2022_53en.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "AVA_VAN.5",
      "EAL5+",
      "ALC_DVS.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2022_53en.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": true,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "c0362ddf2f1a3d0c41c7a0a2d8f81cf00090a15c80518329309f3613b14603ce",
      "txt_hash": "32dc2ddf26f94db898269dae471caa5514495cea89549c141e52df476ba67bb7"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "68e6188ca228f64b35a1be4546a2fc5931b3793056f9e3bad8cb7c17cdbbdd50",
      "txt_hash": "a4cdb81b9630dba243eb10bde9dbb88d25a8b23073a23190d1390e19a0e176e9"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "68e6188ca228f64b35a1be4546a2fc5931b3793056f9e3bad8cb7c17cdbbdd50",
      "txt_hash": "a4cdb81b9630dba243eb10bde9dbb88d25a8b23073a23190d1390e19a0e176e9"
    }
  },
  "status": "active"
}