MorphoSmart Optic 301 Version 1.0
CSV information ?
Status | archived |
---|---|
Valid from | 31.01.2013 |
Valid until | 01.09.2019 |
Scheme | 🇩🇪 DE |
Manufacturer | Safran Morpho |
Category | Biometric Systems and Devices |
Security level | ASE_ECD.1, ASE_CCL.1, ADV_ARC.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_REQ.2, ASE_TSS.1, ADV_FSP.2, ALC_CMC.2, AGD_PRE.1, ALC_DEL.1, ADV_TDS.1, ASE_SPD.1, ATE_IND.2, ASE_INT.1, ATE_COV.1, ALC_FLR.1, AGD_OPE.1 |
Protection profiles |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Vendor
MorphoSecurity level
EAL 4, EAL1, EAL4, EAL3, EAL5, EAL7, EAL2, EAL6, ITSEC EvaluationSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, ADV_FSP.1, ADV_FSP.3, ADV_FSP.4, ADV_FSP.5, ADV_FSP.6, ADV_IMP.1, ADV_IMP.2, ADV_INT.1, ADV_INT.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.2, ADV_TDS.3, ADV_TDS.4, ADV_TDS.5, ADV_TDS.6, ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ALC_FLR.1, ALC_CMC.1, ALC_CMC.3, ALC_CMC.4, ALC_CMC.5, ALC_CMS.1, ALC_CMS.3, ALC_CMS.4, ALC_CMS.5, ALC_DVS.1, ALC_DVS.2, ALC_FLR.2, ALC_FLR.3, ALC_LCD.1, ALC_LCD.2, ALC_TAT.1, ALC_TAT.2, ALC_TAT.3, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_FLR, ALC_TAT, ATE_COV.1, ATE_FUN.1, ATE_IND.2, ATE_COV.2, ATE_COV.3, ATE_DPT.1, ATE_DPT.2, ATE_DPT.3, ATE_DPT.4, ATE_FUN.2, ATE_IND.1, ATE_IND.3, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.1, AVA_VAN.2, AVA_VAN.3, AVA_VAN.4, AVA_VAN.5, AVA_VAN, APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.1, APE_OBJ.2, APE_ECD.1, APE_REQ.1, APE_REQ.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ASE_OBJ.1, ASE_REQ.1, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_SPD, ASE_TSSSecurity Functional Requirements (SFR)
FPT_SPOD.1Protection profiles
BSI-CC-PP-0062-2010Certificates
BSI-DSZ-CC-0790-2013Evaluation facilities
TĂśV Informationstechnik, TĂśViTCertification process
out of scope, relevant events and protection of residual and security relevant data. Biometric verification is out of scope of the certification. The Security Target [6] is the basis for this certification. It is based on, Target, Version 8, 12 September 2012, MorphoSmart Optic 301 Security Target, Safran Morpho (confidential document) [7] Fingerprint Spoof Detection Protection Profile based on Organisational Security Policies, 8] Evaluation Technical Report, Version 6, 21 January 2013, TÜV Informationstechnik GmbH, (confidential document) [9] Fingerprint Spoof Detection Evaluation Guidance (FSDEG), Version 2.1, 18 December 2009, 19 September 2012, MorphoSmart Optic 301 – Life Cycle Support (ALC) (chapter 2.1), Safran Morpho (confidential document) [13] MSO 301– GUIDES, Version 12, 18 September 2012, Safran Morpho [14] MorphoSmart Programmer’sStandards
AIS 35, AIS 32Technical reports
BSI 7125, BSI 7148File metadata
Title | Certification Report BSI-DSZ-CC-0790-2013 |
---|---|
Subject | Common Criteria Certification |
Keywords | "Common Criteria, Certification, Zertifizierung, Fingerprint Spoof Detection, Fingerprint, Biometrics, Fingerprint Fake Detection" |
Author | Federal Office for Information Security |
Creation date | D:20130306111458+01'00' |
Modification date | D:20130306154334+01'00' |
Pages | 34 |
Creator | Writer |
Producer | OpenOffice.org 3.2 |
Frontpage
Certificate ID | BSI-DSZ-CC-0790-2013 |
---|---|
Certified item | MorphoSmart Optic 301, Version 1.0 |
Certification lab | BSI |
Developer | Safran Morpho |
Security target ?
Extracted keywords
Trusted Execution Environments
SEVendor
MorphoSecurity level
EAL 2Claims
O.SPOOF_DETECTION, O.AUDIT, O.RESIDUAL, O.MANAGEMENT, A.BIO, OE.ADMINISTRATION, OE.PHYSICAL, OE.PLATFORM, OE.BIO, OSP.SPOOF_DETECTION, OSP.MANAGEMENT, OSP.RESIDUAL, OSP.AUDITSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ASE_REQ.1Security Functional Requirements (SFR)
FAU_GEN, FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.1.2, FDP_RIP, FDP_RIP.2, FDP_RIP.2.1, FMT_MTD, FMT_SMF.1, FMT_MTD.3, FMT_MTD.3.1, FMT_SMF.1.1, FMT_MTD.1, FMT_SMF, FPT_SPOD, FPT_SPOD.1, FPT_SPOD.1.1, FPT_SPOD.1.2, FPT_SPOD.1.3, FPT_SPOD.1.4, FPT_STM.1Protection profiles
BSI-CC-PP-0062Certification process
out of scope, of the TOE but do not realize any part of the fake finger detection functionality and are therefore out of scope of the certified security functionality. The storage of the generated log, i.e., the Audit log, is, and the fingerprint if genuine. Please be aware that the mechanism for biometric matching is out of scope of the certification. The MSO Demonstrator Application is a software which enables using the MSOStandards
CCMB-2006-09-001File metadata
Title | MSO FFD Public Security Target |
---|---|
Subject | ST-lite |
Keywords | MSO 301, Common Criteria, CC, Securtiy Target, ST, ST-lite |
Author | Safran Morpho |
Creation date | D:20130121143511 |
Modification date | D:20130121144124+01'00' |
Pages | 30 |
Creator | Microsoft® Office Word 2007 |
Producer | Microsoft® Office Word 2007 |
Heuristics ?
Extracted SARs
ADV_ARC.1, ADV_FSP.2, ADV_IMP.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ALC_DVS.2, ALC_FLR.1, ALC_LCD.2, ALC_TAT.3, APE_CCL.1, APE_ECD.1, APE_INT.1, APE_OBJ.2, APE_REQ.2, APE_SPD.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.1, ATE_DPT.4, ATE_FUN.1, ATE_IND.2, AVA_VAN.2References ?
No references are available for this certificate.
Updates ?
-
05.02.2025 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0790a_pdf.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0790b_pdf.pdf
.
The manufacturer_web was updated.
- The new value is
https://morpho.com
.
The state of the certificate object was updated.
- The report property was updated, with the
{'_type': 'sec_certs.sample.document_state.DocumentState'}
data. - The st property was updated, with the
{'_type': 'sec_certs.sample.document_state.DocumentState'}
data. - The cert property was updated, with the
{'_type': 'sec_certs.sample.document_state.DocumentState'}
data.
The computed heuristics were updated.
- The following values were inserted:
{'protection_profiles': {'_type': 'Set', 'elements': ['b02ed76d2545326a']}, 'eal': 'EAL2+'}
. - The prev_certificates property was set to
None
. - The next_certificates property was set to
None
.
- The new value is
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': [], 'next_certificates': []}
.
- The following values were inserted:
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'fb3a3931720aae3521c6502b150c3f493e3f8d0f59955db4d1acb6cc6f455eb2', 'txt_hash': 'a609945e9b75135e216f533297ba03517ecda5e21bab80855ee1d9685dddef49'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'ac0b65e4a858c1262630294f1339d0f627785d988d5fad678f0d77ffe4f3405a', 'txt_hash': '106e28cfee28dc7731bf810293165067bce6d28d2a467200d64649d069a43890'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 880965, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 34, '/Author': 'Federal Office for Information Security', '/CreationDate': "D:20130306111458+01'00'", '/Creator': 'Writer', '/Keywords': '"Common Criteria, Certification, Zertifizierung, Fingerprint Spoof Detection, Fingerprint, Biometrics, Fingerprint Fake Detection"', '/ModDate': "D:20130306154334+01'00'", '/Producer': 'OpenOffice.org 3.2', '/Subject': 'Common Criteria Certification', '/Title': 'Certification Report BSI-DSZ-CC-0790-2013', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.bsi.bund.de/', 'https://www.bsi.bund.de/zertifizierung']}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 476138, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 30, '/Author': 'Safran Morpho', '/CreationDate': 'D:20130121143511', '/Creator': 'Microsoft® Office Word 2007', '/Keywords': 'MSO 301, Common Criteria, CC, Securtiy Target, ST, ST-lite', '/ModDate': "D:20130121144124+01'00'", '/Producer': 'Microsoft® Office Word 2007', '/Subject': 'ST-lite', '/Title': 'MSO FFD Public Security Target', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-0790-2013', 'cert_item': 'MorphoSmart Optic 301, Version 1.0', 'developer': 'Safran Morpho', 'cert_lab': 'BSI'}}
. - The report_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0790-2013': 17}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0062-2010': 4}}, 'cc_security_level': {'EAL': {'EAL 4': 2, 'EAL1': 7, 'EAL4': 6, 'EAL3': 4, 'EAL5': 6, 'EAL7': 4, 'EAL2': 3, 'EAL6': 3}, 'ITSEC': {'ITSEC Evaluation': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 5, 'ADV_FSP.2': 5, 'ADV_TDS.1': 5, 'ADV_FSP.1': 1, 'ADV_FSP.3': 1, 'ADV_FSP.4': 1, 'ADV_FSP.5': 1, 'ADV_FSP.6': 1, 'ADV_IMP.1': 1, 'ADV_IMP.2': 1, 'ADV_INT.1': 1, 'ADV_INT.2': 1, 'ADV_INT.3': 1, 'ADV_SPM.1': 1, 'ADV_TDS.2': 1, 'ADV_TDS.3': 1, 'ADV_TDS.4': 1, 'ADV_TDS.5': 1, 'ADV_TDS.6': 1, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE.1': 5, 'AGD_PRE.1': 5, 'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_CMC.2': 5, 'ALC_CMS.2': 5, 'ALC_DEL.1': 5, 'ALC_FLR.1': 5, 'ALC_CMC.1': 1, 'ALC_CMC.3': 1, 'ALC_CMC.4': 1, 'ALC_CMC.5': 1, 'ALC_CMS.1': 1, 'ALC_CMS.3': 1, 'ALC_CMS.4': 1, 'ALC_CMS.5': 1, 'ALC_DVS.1': 1, 'ALC_DVS.2': 1, 'ALC_FLR.2': 1, 'ALC_FLR.3': 1, 'ALC_LCD.1': 1, 'ALC_LCD.2': 1, 'ALC_TAT.1': 1, 'ALC_TAT.2': 1, 'ALC_TAT.3': 1, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_FLR': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV.1': 5, 'ATE_FUN.1': 5, 'ATE_IND.2': 5, 'ATE_COV.2': 1, 'ATE_COV.3': 1, 'ATE_DPT.1': 1, 'ATE_DPT.2': 1, 'ATE_DPT.3': 1, 'ATE_DPT.4': 1, 'ATE_FUN.2': 1, 'ATE_IND.1': 1, 'ATE_IND.3': 1, 'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.1': 1, 'AVA_VAN.2': 1, 'AVA_VAN.3': 1, 'AVA_VAN.4': 1, 'AVA_VAN.5': 1, 'AVA_VAN': 2}, 'APE': {'APE_INT.1': 1, 'APE_CCL.1': 1, 'APE_SPD.1': 1, 'APE_OBJ.1': 1, 'APE_OBJ.2': 1, 'APE_ECD.1': 1, 'APE_REQ.1': 1, 'APE_REQ.2': 1}, 'ASE': {'ASE_CCL.1': 5, 'ASE_ECD.1': 5, 'ASE_INT.1': 5, 'ASE_OBJ.2': 5, 'ASE_REQ.2': 5, 'ASE_SPD.1': 5, 'ASE_TSS.1': 5, 'ASE_OBJ.1': 1, 'ASE_REQ.1': 1, 'ASE_TSS.2': 1, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {'FPT': {'FPT_SPOD.1': 1}}, 'cc_claims': {}, 'vendor': {'Morpho': {'Morpho': 17}}, 'eval_facility': {'TUV': {'TÜV Informationstechnik': 4, 'TÜViT': 2}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {'BSI': {'BSI 7125': 2, 'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS 35': 1, 'AIS 32': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'relevant events and protection of residual and security relevant data. Biometric verification is out of scope of the certification. The Security Target [6] is the basis for this certification. It is based on': 1}, 'ConfidentialDocument': {'Target, Version 8, 12 September 2012, MorphoSmart Optic 301 Security Target, Safran Morpho (confidential document) [7] Fingerprint Spoof Detection Protection Profile based on Organisational Security Policies': 1, '8] Evaluation Technical Report, Version 6, 21 January 2013, TÜV Informationstechnik GmbH, (confidential document) [9] Fingerprint Spoof Detection Evaluation Guidance (FSDEG), Version 2.1, 18 December 2009': 1, '19 September 2012, MorphoSmart Optic 301 – Life Cycle Support (ALC) (chapter 2.1), Safran Morpho (confidential document) [13] MSO 301– GUIDES, Version 12, 18 September 2012, Safran Morpho [14] MorphoSmart Programmer’s': 1}}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0062': 1}}, 'cc_security_level': {'EAL': {'EAL 2': 4}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 2, 'ADV_FSP.2': 7, 'ADV_TDS.1': 5, 'ADV_FSP.1': 2}, 'AGD': {'AGD_OPE.1': 4, 'AGD_PRE.1': 4}, 'ALC': {'ALC_FLR.1': 6, 'ALC_CMC.2': 2, 'ALC_CMS.2': 2, 'ALC_DEL.1': 2}, 'ATE': {'ATE_COV.1': 5, 'ATE_FUN.1': 5, 'ATE_IND.2': 2}, 'AVA': {'AVA_VAN.2': 2}, 'ASE': {'ASE_CCL.1': 2, 'ASE_ECD.1': 5, 'ASE_INT.1': 3, 'ASE_OBJ.2': 3, 'ASE_REQ.2': 3, 'ASE_SPD.1': 2, 'ASE_TSS.1': 2, 'ASE_REQ.1': 2}}, 'cc_sfr': {'FAU': {'FAU_GEN': 4, 'FAU_GEN.1': 4, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1}, 'FDP': {'FDP_RIP': 3, 'FDP_RIP.2': 4, 'FDP_RIP.2.1': 1}, 'FMT': {'FMT_MTD': 3, 'FMT_SMF.1': 6, 'FMT_MTD.3': 7, 'FMT_MTD.3.1': 1, 'FMT_SMF.1.1': 1, 'FMT_MTD.1': 1, 'FMT_SMF': 1}, 'FPT': {'FPT_SPOD': 6, 'FPT_SPOD.1': 14, 'FPT_SPOD.1.1': 3, 'FPT_SPOD.1.2': 3, 'FPT_SPOD.1.3': 3, 'FPT_SPOD.1.4': 3, 'FPT_STM.1': 2}}, 'cc_claims': {'O': {'O.SPOOF_DETECTION': 5, 'O.AUDIT': 7, 'O.RESIDUAL': 5, 'O.MANAGEMENT': 7}, 'A': {'A.BIO': 3}, 'OE': {'OE.ADMINISTRATION': 9, 'OE.PHYSICAL': 7, 'OE.PLATFORM': 14, 'OE.BIO': 2}, 'OSP': {'OSP.SPOOF_DETECTION': 5, 'OSP.MANAGEMENT': 4, 'OSP.RESIDUAL': 4, 'OSP.AUDIT': 4}}, 'vendor': {'Morpho': {'Morpho': 31}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 1}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2006-09-001': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 2, 'of the TOE but do not realize any part of the fake finger detection functionality and are therefore out of scope of the certified security functionality. The storage of the generated log, i.e., the Audit log, is': 1, 'and the fingerprint if genuine. Please be aware that the mechanism for biometric matching is out of scope of the certification. The MSO Demonstrator Application is a software which enables using the MSO': 1}}}
. - The report_filename property was set to
0790a_pdf.pdf
. - The st_filename property was set to
0790b_pdf.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['BSI']
. - The cert_id property was set to
BSI-DSZ-CC-0790-2013
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_INT', 'level': 1}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_INT', 'level': 1}]}
values discarded.
- The report property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name MorphoSmart Optic 301 Version 1.0 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Biometric Systems and Devices",
"cert_link": null,
"dgst": "a9925b1140bde436",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-0790-2013",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL2+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"1.0"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": {
"_type": "Set",
"elements": [
"b02ed76d2545326a"
]
},
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Safran Morpho",
"manufacturer_web": "https://morpho.com",
"name": "MorphoSmart Optic 301 Version 1.0",
"not_valid_after": "2019-09-01",
"not_valid_before": "2013-01-31",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "0790a_pdf.pdf",
"report_frontpage": {
"DE": {
"cert_id": "BSI-DSZ-CC-0790-2013",
"cert_item": "MorphoSmart Optic 301, Version 1.0",
"cert_lab": "BSI",
"developer": "Safran Morpho",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
]
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0790-2013": 17
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0062-2010": 4
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 5,
"ADV_FSP": 1,
"ADV_FSP.1": 1,
"ADV_FSP.2": 5,
"ADV_FSP.3": 1,
"ADV_FSP.4": 1,
"ADV_FSP.5": 1,
"ADV_FSP.6": 1,
"ADV_IMP": 1,
"ADV_IMP.1": 1,
"ADV_IMP.2": 1,
"ADV_INT": 1,
"ADV_INT.1": 1,
"ADV_INT.2": 1,
"ADV_INT.3": 1,
"ADV_SPM": 1,
"ADV_SPM.1": 1,
"ADV_TDS": 1,
"ADV_TDS.1": 5,
"ADV_TDS.2": 1,
"ADV_TDS.3": 1,
"ADV_TDS.4": 1,
"ADV_TDS.5": 1,
"ADV_TDS.6": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 5,
"AGD_PRE": 1,
"AGD_PRE.1": 5
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.1": 1,
"ALC_CMC.2": 5,
"ALC_CMC.3": 1,
"ALC_CMC.4": 1,
"ALC_CMC.5": 1,
"ALC_CMS": 1,
"ALC_CMS.1": 1,
"ALC_CMS.2": 5,
"ALC_CMS.3": 1,
"ALC_CMS.4": 1,
"ALC_CMS.5": 1,
"ALC_DEL": 1,
"ALC_DEL.1": 5,
"ALC_DVS": 1,
"ALC_DVS.1": 1,
"ALC_DVS.2": 1,
"ALC_FLR": 1,
"ALC_FLR.1": 5,
"ALC_FLR.2": 1,
"ALC_FLR.3": 1,
"ALC_LCD.1": 1,
"ALC_LCD.2": 1,
"ALC_TAT": 1,
"ALC_TAT.1": 1,
"ALC_TAT.2": 1,
"ALC_TAT.3": 1
},
"APE": {
"APE_CCL.1": 1,
"APE_ECD.1": 1,
"APE_INT.1": 1,
"APE_OBJ.1": 1,
"APE_OBJ.2": 1,
"APE_REQ.1": 1,
"APE_REQ.2": 1,
"APE_SPD.1": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_CCL.1": 5,
"ASE_ECD": 1,
"ASE_ECD.1": 5,
"ASE_INT": 1,
"ASE_INT.1": 5,
"ASE_OBJ": 1,
"ASE_OBJ.1": 1,
"ASE_OBJ.2": 5,
"ASE_REQ.1": 1,
"ASE_REQ.2": 5,
"ASE_SPD": 1,
"ASE_SPD.1": 5,
"ASE_TSS": 1,
"ASE_TSS.1": 5,
"ASE_TSS.2": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.1": 5,
"ATE_COV.2": 1,
"ATE_COV.3": 1,
"ATE_DPT": 1,
"ATE_DPT.1": 1,
"ATE_DPT.2": 1,
"ATE_DPT.3": 1,
"ATE_DPT.4": 1,
"ATE_FUN": 1,
"ATE_FUN.1": 5,
"ATE_FUN.2": 1,
"ATE_IND": 1,
"ATE_IND.1": 1,
"ATE_IND.2": 5,
"ATE_IND.3": 1
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.1": 1,
"AVA_VAN.2": 1,
"AVA_VAN.3": 1,
"AVA_VAN.4": 1,
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 2,
"EAL1": 7,
"EAL2": 3,
"EAL3": 4,
"EAL4": 6,
"EAL5": 6,
"EAL6": 3,
"EAL7": 4
},
"ITSEC": {
"ITSEC Evaluation": 1
}
},
"cc_sfr": {
"FPT": {
"FPT_SPOD.1": 1
}
},
"certification_process": {
"ConfidentialDocument": {
"19 September 2012, MorphoSmart Optic 301 \u2013 Life Cycle Support (ALC) (chapter 2.1), Safran Morpho (confidential document) [13] MSO 301\u2013 GUIDES, Version 12, 18 September 2012, Safran Morpho [14] MorphoSmart Programmer\u2019s": 1,
"8] Evaluation Technical Report, Version 6, 21 January 2013, T\u00dcV Informationstechnik GmbH, (confidential document) [9] Fingerprint Spoof Detection Evaluation Guidance (FSDEG), Version 2.1, 18 December 2009": 1,
"Target, Version 8, 12 September 2012, MorphoSmart Optic 301 Security Target, Safran Morpho (confidential document) [7] Fingerprint Spoof Detection Protection Profile based on Organisational Security Policies": 1
},
"OutOfScope": {
"out of scope": 1,
"relevant events and protection of residual and security relevant data. Biometric verification is out of scope of the certification. The Security Target [6] is the basis for this certification. It is based on": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"TUV": {
"T\u00dcV Informationstechnik": 4,
"T\u00dcViT": 2
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"BSI": {
"AIS 32": 1,
"AIS 35": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {
"BSI": {
"BSI 7125": 2,
"BSI 7148": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Morpho": {
"Morpho": 17
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Federal Office for Information Security",
"/CreationDate": "D:20130306111458+01\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, Fingerprint Spoof Detection, Fingerprint, Biometrics, Fingerprint Fake Detection\"",
"/ModDate": "D:20130306154334+01\u002700\u0027",
"/Producer": "OpenOffice.org 3.2",
"/Subject": "Common Criteria Certification",
"/Title": "Certification Report BSI-DSZ-CC-0790-2013",
"pdf_file_size_bytes": 880965,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.bsi.bund.de/zertifizierung",
"https://www.bsi.bund.de/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 34
},
"st_filename": "0790b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.BIO": 3
},
"O": {
"O.AUDIT": 7,
"O.MANAGEMENT": 7,
"O.RESIDUAL": 5,
"O.SPOOF_DETECTION": 5
},
"OE": {
"OE.ADMINISTRATION": 9,
"OE.BIO": 2,
"OE.PHYSICAL": 7,
"OE.PLATFORM": 14
},
"OSP": {
"OSP.AUDIT": 4,
"OSP.MANAGEMENT": 4,
"OSP.RESIDUAL": 4,
"OSP.SPOOF_DETECTION": 5
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0062": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 2,
"ADV_FSP.1": 2,
"ADV_FSP.2": 7,
"ADV_TDS.1": 5
},
"AGD": {
"AGD_OPE.1": 4,
"AGD_PRE.1": 4
},
"ALC": {
"ALC_CMC.2": 2,
"ALC_CMS.2": 2,
"ALC_DEL.1": 2,
"ALC_FLR.1": 6
},
"ASE": {
"ASE_CCL.1": 2,
"ASE_ECD.1": 5,
"ASE_INT.1": 3,
"ASE_OBJ.2": 3,
"ASE_REQ.1": 2,
"ASE_REQ.2": 3,
"ASE_SPD.1": 2,
"ASE_TSS.1": 2
},
"ATE": {
"ATE_COV.1": 5,
"ATE_FUN.1": 5,
"ATE_IND.2": 2
},
"AVA": {
"AVA_VAN.2": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 4
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 4,
"FAU_GEN.1": 4,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1
},
"FDP": {
"FDP_RIP": 3,
"FDP_RIP.2": 4,
"FDP_RIP.2.1": 1
},
"FMT": {
"FMT_MTD": 3,
"FMT_MTD.1": 1,
"FMT_MTD.3": 7,
"FMT_MTD.3.1": 1,
"FMT_SMF": 1,
"FMT_SMF.1": 6,
"FMT_SMF.1.1": 1
},
"FPT": {
"FPT_SPOD": 6,
"FPT_SPOD.1": 14,
"FPT_SPOD.1.1": 3,
"FPT_SPOD.1.2": 3,
"FPT_SPOD.1.3": 3,
"FPT_SPOD.1.4": 3,
"FPT_STM.1": 2
}
},
"certification_process": {
"OutOfScope": {
"and the fingerprint if genuine. Please be aware that the mechanism for biometric matching is out of scope of the certification. The MSO Demonstrator Application is a software which enables using the MSO": 1,
"of the TOE but do not realize any part of the fake finger detection functionality and are therefore out of scope of the certified security functionality. The storage of the generated log, i.e., the Audit log, is": 1,
"out of scope": 2
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2006-09-001": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {
"IBM": {
"SE": 1
}
},
"tls_cipher_suite": {},
"vendor": {
"Morpho": {
"Morpho": 31
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Safran Morpho",
"/CreationDate": "D:20130121143511",
"/Creator": "Microsoft\u00ae Office Word 2007",
"/Keywords": "MSO 301, Common Criteria, CC, Securtiy Target, ST, ST-lite",
"/ModDate": "D:20130121144124+01\u002700\u0027",
"/Producer": "Microsoft\u00ae Office Word 2007",
"/Subject": "ST-lite",
"/Title": "MSO FFD Public Security Target",
"pdf_file_size_bytes": 476138,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 30
}
},
"protection_profile_links": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0062b_pdf.pdf"
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0790a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"ADV_FSP.2",
"ASE_SPD.1",
"ASE_INT.1",
"ATE_IND.2",
"ALC_FLR.1",
"AGD_OPE.1",
"ASE_TSS.1",
"AGD_PRE.1",
"ALC_DEL.1",
"ALC_CMC.2",
"ASE_OBJ.2",
"ASE_ECD.1",
"ATE_FUN.1",
"ASE_CCL.1",
"ALC_CMS.2",
"ASE_REQ.2",
"ADV_TDS.1",
"ATE_COV.1",
"ADV_ARC.1"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0790b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "fb3a3931720aae3521c6502b150c3f493e3f8d0f59955db4d1acb6cc6f455eb2",
"txt_hash": "a609945e9b75135e216f533297ba03517ecda5e21bab80855ee1d9685dddef49"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "ac0b65e4a858c1262630294f1339d0f627785d988d5fad678f0d77ffe4f3405a",
"txt_hash": "106e28cfee28dc7731bf810293165067bce6d28d2a467200d64649d069a43890"
}
},
"status": "archived"
}