ID-One Cosmo V7.0-a SmartCard in configuration Large Dual, Large and Standard Dual
CSV information
Status | archived |
---|---|
Valid from | 29.09.2009 |
Valid until | 01.09.2019 |
Scheme | 🇫🇷 FR |
Manufacturer | Oberthur Card System / Philips (NXP) |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | EAL5+ |
Heuristics summary
Certificate
Certification report
Extracted keywords
JavaCard versions
Java Card 2.2.2, GlobalPlatform 2.1.1Vendor
Oberthur, Oberthur TechnologiesSecurity level
EAL 5, EAL4, EAL7, EAL 4, EAL 1, EAL 3, EAL 7, EAL 5 augmented, ITSEC E6 andSecurity Assurance Requirements (SAR)
ADO_DEL, ADV_IMP.2, ADV_ARC, ADV_FSP, ADV_IMP, ADV_TDS, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DVS, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_MSU.3, AVA_VLA.4, AVA_VAN, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSSProtection profiles
BSI-PP-0002-2001Certificates
DCSSI-2009/11, ANSSI-CC-2009/36Evaluation facilities
THALES - CEACIStandards
SCP01, SCP02, SCP03, CCMB-2006-09-001, CCMB-2007-09-002, CCMB-2007-09-003, CCMB-2007-09-004File metadata
Creation date | D:20100108161512+01'00' |
---|---|
Modification date | D:20100108161512+01'00' |
Pages | 17 |
Producer | Acrobat Distiller 8.0.0 (Windows) |
Frontpage
Certificate ID | ANSSI-CC-2009/36 |
---|---|
Certified item | ID-One Cosmo V7.0-a SmartCard in configuration Large Dual, Large and Standard Dual JavaCard platform embedded on Atmel Secure Microcontroller Solutions components AT90SC 256144RCFT revision F, 256144RCFT revision F (without antenna), 25672RCFT revision F, and embedded with cryptographic library version 00.03.11.05 ToolBox from Atmel Secure Microcontroller Solutions |
Certification lab | THALES - CEACI (T3S – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France Phone: +33 (0)5 62 88 28 01 or 18, email : [email protected] |
Developer | Oberthur Technologies1 50 quai Michelet 92300 Levallois-Perret, France ATMEL Secure Microcontroller Solutions1 Maxwell Building - Scottish Enterprise technology Park East Kilbride, G75 0QR - Ecosse, Royaume-Uni Sponsor Oberthur Technologies 50 quai Michelet, 92300 Levallois-Perret, France |
References
Outgoing- ANSSI-CC-2009/11 - archived - Cryptographic Library ATMEL Toolbox 00.03.11.05
- ANSSI-CC-2010/27 - archived - Oberthur Technologies Applet ID One Classic v1.01.1 en configuration CNS, Classic ou CIE chargée sur Cosmo v7.0-n Large, Standard et Basic (modes dual ou contact) sur composants NXP
- ANSSI-CC-2010/25 - archived - Oberthur Technologies Applet ID One Classic v1.01.1 en configuration CNS, Classic ou CIE masquée sur Cosmo v7.0-a Large Dual, Large et Standard Dual sur composants Atmel
- ANSSI-CC-2010/26 - archived - Oberthur Technologies Applet ID One Classic v1.01.1 en configuration CNS, Classic ou CIE masquée sur Cosmo v7.0-a Standard et Basic sur composants Atmel
Security target
Extracted keywords
Symmetric Algorithms
AES, DES, 3DES, TDESAsymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-HellmanHash functions
SHA-1, SHA-256, SHA-384, SHA-512, SHA-224Schemes
MAC, Key AgreementRandomness
RNGLibraries
ATMEL Toolbox 00.03.11.05JavaCard versions
Java Card 2.2.2, GlobalPlatform 2.1.1JavaCard API constants
TYPE_ACCESSVendor
Oberthur Technologies, Oberthur, OBERTHURSecurity level
EAL5, EAL5+, EAL5 augmentedClaims
D.APP_CODE, D.APP_C_DATA, D.APP_I_DATA, D.PIN, D.JCS_CODE, D.JCS_DATA, D.SEC_DATA, D.API_DATA, D.CRYPTO, D.CONFIG, D.SENSITIVE_DATA, D.ARRAY, D.KEY, D.AUDITLOG, D.LOADFILE, D.GLPIN, D.APPLILIFECYC, D.NB_REMAINTRYGLB, O.LOAD, O.CARD-MANAGEMENT, O.SID, O.OPERATE, O.RESOURCES, O.FIREWALL, O.NATIVE, O.REALLOCATION, O.SHRD_VAR_CONFID, O.SHRD_VAR_INTEG, O.INSTALL, O.DELETION, O.OBJ-DELETION, O.ALARM, O.TRANSACTION, O.CIPHER, O.PIN-MNGT, O.KEY-MNGT, O.SECURE_COMPARE, O.SCP, O.JAVAOBJECT, O.APPLET, O.CODE_PKG, O.CODE_PCKG, T.CONFIGURATION, T.CONF_DATA_APPLET, T.PHYSICAL, T.CONFID-JCS-CODE, T.CONFID-APPLI-DATA, T.CONFID-JCS-DATA, T.INTEG-APPLI-CODE, T.INTEG-JCS-CODE, T.INTEG-APPLI-DATA, T.INTEG-JCS-DATA, T.INTEG-APPLICODE, T.INTEG-APPLIDATA, T.SID, T.EXE-CODE, T.NATIVE, T.RESSOURCES, T.INSTALL, T.DELETION, T.OBJ-DELETION, A.NATIVE, A.VERIFICATION, A.APPLET, R.JAVA, OP.PUT, OP.JAVA, OP.CREATE, OP.DELETE_APPLET, OP.DELETE_PCKG, OP.DELETE_PCKG_APPLET, OP.ARRAY_ACCESS, OP.INSTANCE_FIELD, OP.INVK_VIRTUAL, OP.INVK_INTERFACE, OP.THROW, OP.TYPE_ACCESS, OP.SEND, OP.RECEIVE, OE.NATIVE, OE.VERIFICATION, OE.APPLET, OSP.VERIFICATIONSecurity Assurance Requirements (SAR)
ADV_IMP.2, ALC_DVS.2, AVA_VAN.5Security Functional Requirements (SFR)
FAU_ARP, FAU_ARP.1, FAU_SAR, FAU_SAR.1, FAU_GEN, FAU_GEN.1, FAU_SAA, FAU_SAA.1, FCO_NRO, FCO_NRO.2, FCS_RNG, FCS_RNG.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM, FCS_CKM.1, FCS_CKM.3, FCS_CKM.3.1, FCS_CKM.4, FCS_CKM.4.1, FCS_COP, FCS_COP.1, FCS_CKM.2, FCS_CKM.2.1, FCS_COP.1.1, FCS_RND, FDP_IFC, FDP_IFC.1, FDP_IFF, FDP_IFF.1, FDP_RIP, FDP_RIP.1, FDP_ROL, FDP_ROL.1, FDP_SDI.2, FDP_SDI.2.1, FDP_SDI.2.2, FDP_SDI.1, FDP_SDI.1.1, FDP_ACC, FDP_ACC.2, FDP_ACF, FDP_ACF.1, FDP_UCT, FDP_UCT.1, FDP_ITC, FDP_ITC.1, FDP_IFC.2, FDP_UIT, FDP_UIT.1, FDP_ITC.2, FIA_ATD, FIA_ATD.1, FIA_UID, FIA_UID.2, FIA_USB.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_AFL, FIA_AFL.1, FIA_UAU, FIA_UAU.1, FIA_UAU.4, FIA_UAU.7, FIA_UID.1, FMT_MSA, FMT_MSA.2, FMT_MSA.3, FMT_SMR, FMT_SMR.1, FMT_MSA.1, FMT_MTD, FMT_MTD.1, FMT_MTD.3, FMT_MTD.3.1, FMT_SMF, FMT_SMF.1, FMT_MOF, FMT_MOF.1, FMT_SMR.2, FMT_MTD.2, FPR_UNO.1, FPR_UNO.1.1, FPR_UNO, FPT_TDC.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_FLS, FPT_FLS.1, FPT_TST, FPT_TST.1, FPT_PHP, FPT_PHP.3, FPT_RCV, FPT_RCV.3, FPT_RCV.4, FPT_TDC, FPT_PHP.2, FRU_FLT, FRU_FLT.1, FRU_RSA, FRU_RSA.1, FTP_ITC, FTP_ITC.1Protection profiles
BSI-PP-0035Certificates
DCSSI-2009/10, DCSSI-2009/11Side-channel analysis
physical probing, SPA, DPA, physical tampering, malfunction, fault injection, JILStandards
FIPS PUB 46-3, FIPS PUB 81, FIPS PUB 180-2, FIPS PUB 186-2, FIPS PUB 197, FIPS 186-2, PKCS#1File metadata
Creation date | D:20091125161122+01'00' |
---|---|
Modification date | D:20091125161122+01'00' |
Pages | 96 |
Producer | AFPL Ghostscript 8.50 |
References
Outgoing- ANSSI-CC-2009/11 - archived - Cryptographic Library ATMEL Toolbox 00.03.11.05
- ANSSI-CC-2009/10 - archived - Secured Microcontrollers ATMEL AT90SC256144RCFT and AT90SC25672RCFT (AT58879) rev. E
- ANSSI-CC-2010/37 - archived - Oberthur ID-One IAS-ECC v1.0.1 R1 : applet (v1121) loaded on Cosmo v7.0-a in standard configuration
- ANSSI-CC-2010/25 - archived - Oberthur Technologies Applet ID One Classic v1.01.1 en configuration CNS, Classic ou CIE masquée sur Cosmo v7.0-a Large Dual, Large et Standard Dual sur composants Atmel
- ANSSI-CC-2010/38 - archived - Oberthur ID-One IAS-ECC v1.0.1 R1 : applet (v1121) loaded on Cosmo v7.0-a in USB configuration
Heuristics
Extracted SARs
ADV_IMP.2, ALC_DVS.2, AVA_MSU.3, AVA_VAN.5, AVA_VLA.4Similar certificates
References
Updates
-
10.02.2025 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
05.02.2025 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'_type': 'sec_certs.sample.document_state.DocumentState'}
data. - The st property was updated, with the
{'_type': 'sec_certs.sample.document_state.DocumentState'}
data. - The cert property was updated, with the
{'_type': 'sec_certs.sample.document_state.DocumentState'}
data.
The computed heuristics were updated.
- The following values were inserted:
{'protection_profiles': None, 'eal': 'EAL5+'}
. - The prev_certificates property was set to
None
. - The next_certificates property was set to
None
. - The scheme_data property was set to
{'product': 'Carte à puce ID-One Cosmo V7.0-a en configuration Large Dual, Large et Standard Dual', 'url': 'https://cyber.gouv.fr/produits-certifies/carte-puce-id-one-cosmo-v70-en-configuration-large-dual-large-et-standard-dual', 'description': 'Le produit évalué est la carte à puce ID-One Cosmo V7.0-a, plate-forme Java Card ouverte, développée par Oberthur Technologies : - compatible avec les spécifications de Java Card 2.2.2 et de VISA GlobalPlatform 2.1.1 ; - masquée sur des variantes (par la taille mémoire et les interfaces offertes) d'une même famille de composants développées par Atmel Secure Microcontroller Solutions ; -', 'sponsor': 'Oberthur Technologies', 'developer': 'Oberthur Technologies /ATMEL Secure Microcontroller Solutions', 'cert_id': 'ANSSI-CC-2009/36', 'level': 'EAL5+', 'enhanced': {'cert_id': 'ANSSI-CC-2009/36', 'certification_date': '2009-09-29', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 3.1', 'developer': 'Oberthur Technologies /ATMEL Secure Microcontroller Solutions', 'sponsor': 'Oberthur Technologies', 'evaluation_facility': 'THALES - CEACI', 'level': 'EAL5+', 'protection_profile': 'PP/0304', 'mutual_recognition': 'SOG-IS CCRA', 'augmented': 'ADV_IMP.2, ALC_DVS.2, AVA_VAN.5', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/anssi-cc-cible_2009-36en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/anssi-cc_2009-36en.pdf'}}
.
- The report property was updated, with the
-
03.02.2025 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
27.01.2025 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'Carte à puce ID-One Cosmo V7.0-a en configuration Large Dual, Large et Standard Dual', 'url': 'https://cyber.gouv.fr/produits-certifies/carte-puce-id-one-cosmo-v70-en-configuration-large-dual-large-et-standard-dual', 'description': 'Le produit évalué est la carte à puce ID-One Cosmo V7.0-a, plate-forme Java Card ouverte, développée par Oberthur Technologies : - compatible avec les spécifications de Java Card 2.2.2 et de VISA GlobalPlatform 2.1.1 ; - masquée sur des variantes (par la taille mémoire et les interfaces offertes) d'une même famille de composants développées par Atmel Secure Microcontroller Solutions ; -', 'sponsor': 'Oberthur Technologies', 'developer': 'Oberthur Technologies /ATMEL Secure Microcontroller Solutions', 'cert_id': 'ANSSI-CC-2009/36', 'level': 'EAL5+', 'enhanced': {'cert_id': 'ANSSI-CC-2009/36', 'certification_date': '2009-09-29', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 3.1', 'developer': 'Oberthur Technologies /ATMEL Secure Microcontroller Solutions', 'sponsor': 'Oberthur Technologies', 'evaluation_facility': 'THALES - CEACI', 'level': 'EAL5+', 'protection_profile': 'PP/0304', 'mutual_recognition': 'SOG-IS CCRA', 'augmented': 'ADV_IMP.2, ALC_DVS.2, AVA_VAN.5', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/anssi-cc-cible_2009-36en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/anssi-cc_2009-36en.pdf'}}
.
- The scheme_data property was set to
-
06.01.2025 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
16.12.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'Carte à puce ID-One Cosmo V7.0-a en configuration Large Dual, Large et Standard Dual', 'url': 'https://cyber.gouv.fr/produits-certifies/carte-puce-id-one-cosmo-v70-en-configuration-large-dual-large-et-standard-dual', 'description': 'Le produit évalué est la carte à puce ID-One Cosmo V7.0-a, plate-forme Java Card ouverte, développée par Oberthur Technologies : - compatible avec les spécifications de Java Card 2.2.2 et de VISA GlobalPlatform 2.1.1 ; - masquée sur des variantes (par la taille mémoire et les interfaces offertes) d'une même famille de composants développées par Atmel Secure Microcontroller Solutions ; -', 'sponsor': 'Oberthur Technologies', 'developer': 'Oberthur Technologies /ATMEL Secure Microcontroller Solutions', 'cert_id': 'ANSSI-CC-2009/36', 'level': 'EAL5+', 'enhanced': {'cert_id': 'ANSSI-CC-2009/36', 'certification_date': '2009-09-29', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 3.1', 'developer': 'Oberthur Technologies /ATMEL Secure Microcontroller Solutions', 'sponsor': 'Oberthur Technologies', 'evaluation_facility': 'THALES - CEACI', 'level': 'EAL5+', 'protection_profile': 'PP/0304', 'mutual_recognition': 'SOG-IS CCRA', 'augmented': 'ADV_IMP.2, ALC_DVS.2, AVA_VAN.5', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/anssi-cc-cible_2009-36en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/anssi-cc_2009-36en.pdf'}}
.
- The scheme_data property was set to
-
09.12.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': [], 'next_certificates': []}
.
- The following values were inserted:
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'Carte à puce ID-One Cosmo V7.0-a en configuration Large Dual, Large et Standard Dual', 'url': 'https://cyber.gouv.fr/produits-certifies/carte-puce-id-one-cosmo-v70-en-configuration-large-dual-large-et-standard-dual', 'description': 'Le produit évalué est la carte à puce ID-One Cosmo V7.0-a, plate-forme Java Card ouverte, développée par Oberthur Technologies : - compatible avec les spécifications de Java Card 2.2.2 et de VISA GlobalPlatform 2.1.1 ; - masquée sur des variantes (par la taille mémoire et les interfaces offertes) d'une même famille de composants développées par Atmel Secure Microcontroller Solutions ; -', 'sponsor': 'Oberthur Technologies', 'developer': 'Oberthur Technologies /ATMEL Secure Microcontroller Solutions', 'cert_id': 'ANSSI-CC-2009/36', 'level': 'EAL5+', 'enhanced': {'cert_id': 'ANSSI-CC-2009/36', 'certification_date': '2009-09-29', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 3.1', 'developer': 'Oberthur Technologies /ATMEL Secure Microcontroller Solutions', 'sponsor': 'Oberthur Technologies', 'evaluation_facility': 'THALES - CEACI', 'level': 'EAL5+', 'protection_profile': 'PP/0304', 'mutual_recognition': 'SOG-IS CCRA', 'augmented': 'ADV_IMP.2, ALC_DVS.2, AVA_VAN.5', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/anssi-cc-cible_2009-36en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/anssi-cc_2009-36en.pdf'}}
.
- The scheme_data property was set to
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'e537ddac7ca849b3ffecafde9d603efd0c5446e365ac230b7cffe40d01763946', 'txt_hash': '4330d08410ae0b29055f3d049292b9bee447bf1837ac6e0f1cfcdfc630dcd8e2'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '5e4a6d5d7ef053ce3a2cd2d836980ed383834817d449efd7ed2c5ff41395e162', 'txt_hash': '174d73f5c2bced5edc451f2c8984f7357b1688cbba4c4aaf8733bfe3d5697983'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 245118, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 17, '/CreationDate': "D:20100108161512+01'00'", '/Keywords': '', '/Producer': 'Acrobat Distiller 8.0.0 (Windows)', '/ModDate': "D:20100108161512+01'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.ssi.gouv.fr/', 'mailto:[email protected]']}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 1265954, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 96, '/CreationDate': "D:20091125161122+01'00'", '/Keywords': '', '/Producer': 'AFPL Ghostscript 8.50', '/ModDate': "D:20091125161122+01'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{'FR': {'match_rules': ['Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developer\\(s\\)(.+)Evaluation facility(.+)Recognition arrangements'], 'cert_id': 'ANSSI-CC-2009/36', 'cert_item': 'ID-One Cosmo V7.0-a SmartCard in configuration Large Dual, Large and Standard Dual JavaCard platform embedded on Atmel Secure Microcontroller Solutions components AT90SC 256144RCFT revision F, 256144RCFT revision F (without antenna), 25672RCFT revision F, and embedded with cryptographic library version 00.03.11.05 ToolBox from Atmel Secure Microcontroller Solutions', 'cert_item_version': 'JavaCard Platform version for any configuration: 7.0-a Optional Code r1.0 High Secure version for each configuration: 071761, 071761, 071771 Optional Code CodopAuth r1.0 version for each configuration: 071621, 071621, 071631 ToolBox version for any configuration: 00.03.11.05', 'ref_protection_profiles': 'PP/0304] Java Card System - Standard 2.1.1 Configuration Protection Profile – version 1.0b, August 2003', 'cc_version': 'Common Criteria version 3.1', 'cc_security_level': 'EAL 5 augmented ADV_IMP.2, ALC_DVS.2, AVA_VAN.5', 'developer': 'Oberthur Technologies1 50 quai Michelet 92300 Levallois-Perret, France ATMEL Secure Microcontroller Solutions1 Maxwell Building - Scottish Enterprise technology Park East Kilbride, G75 0QR - Ecosse, Royaume-Uni Sponsor Oberthur Technologies 50 quai Michelet, 92300 Levallois-Perret, France', 'cert_lab': 'THALES - CEACI (T3S – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France Phone: +33 (0)5 62 88 28 01 or 18, email : [email protected]'}}
. - The report_keywords property was set to
{'cc_cert_id': {'FR': {'DCSSI-2009/11': 1, 'ANSSI-CC-2009/36': 18}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0002-2001': 1}}, 'cc_security_level': {'EAL': {'EAL 5': 5, 'EAL4': 1, 'EAL7': 1, 'EAL 4': 1, 'EAL 1': 1, 'EAL 3': 1, 'EAL 7': 1, 'EAL 5 augmented': 2}, 'ITSEC': {'ITSEC E6 and': 1}}, 'cc_sar': {'ADO': {'ADO_DEL': 1}, 'ADV': {'ADV_IMP.2': 1, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_DVS.2': 3, 'ALC_FLR': 2, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DVS': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.5': 1, 'AVA_MSU.3': 2, 'AVA_VLA.4': 2, 'AVA_VAN': 1}, 'ASE': {'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Oberthur': {'Oberthur': 2, 'Oberthur Technologies': 19}}, 'eval_facility': {'Thales': {'THALES - CEACI': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'SCP': {'SCP01': 1, 'SCP02': 1, 'SCP03': 1}, 'CC': {'CCMB-2006-09-001': 1, 'CCMB-2007-09-002': 1, 'CCMB-2007-09-003': 1, 'CCMB-2007-09-004': 1}}, 'javacard_version': {'JavaCard': {'Java Card 2.2.2': 1}, 'GlobalPlatform': {'GlobalPlatform 2.1.1': 1}}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {'FR': {'DCSSI-2009/10': 1, 'DCSSI-2009/11': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0035': 1}}, 'cc_security_level': {'EAL': {'EAL5': 3, 'EAL5+': 1, 'EAL5 augmented': 3}}, 'cc_sar': {'ADV': {'ADV_IMP.2': 4}, 'ALC': {'ALC_DVS.2': 3}, 'AVA': {'AVA_VAN.5': 3}}, 'cc_sfr': {'FAU': {'FAU_ARP': 2, 'FAU_ARP.1': 4, 'FAU_SAR': 1, 'FAU_SAR.1': 2, 'FAU_GEN': 1, 'FAU_GEN.1': 2, 'FAU_SAA': 1, 'FAU_SAA.1': 2}, 'FCO': {'FCO_NRO': 3, 'FCO_NRO.2': 9}, 'FCS': {'FCS_RNG': 4, 'FCS_RNG.1': 7, 'FCS_RNG.1.1': 1, 'FCS_RNG.1.2': 1, 'FCS_CKM': 5, 'FCS_CKM.1': 3, 'FCS_CKM.3': 1, 'FCS_CKM.3.1': 1, 'FCS_CKM.4': 2, 'FCS_CKM.4.1': 1, 'FCS_COP': 7, 'FCS_COP.1': 7, 'FCS_CKM.2': 1, 'FCS_CKM.2.1': 1, 'FCS_COP.1.1': 1, 'FCS_RND': 1}, 'FDP': {'FDP_IFC': 2, 'FDP_IFC.1': 1, 'FDP_IFF': 2, 'FDP_IFF.1': 10, 'FDP_RIP': 9, 'FDP_RIP.1': 10, 'FDP_ROL': 1, 'FDP_ROL.1': 2, 'FDP_SDI.2': 1, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_SDI.1': 1, 'FDP_SDI.1.1': 1, 'FDP_ACC': 5, 'FDP_ACC.2': 9, 'FDP_ACF': 4, 'FDP_ACF.1': 18, 'FDP_UCT': 1, 'FDP_UCT.1': 1, 'FDP_ITC': 2, 'FDP_ITC.1': 3, 'FDP_IFC.2': 2, 'FDP_UIT': 1, 'FDP_UIT.1': 2, 'FDP_ITC.2': 5}, 'FIA': {'FIA_ATD': 2, 'FIA_ATD.1': 3, 'FIA_UID': 4, 'FIA_UID.2': 1, 'FIA_USB.1': 2, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_AFL': 4, 'FIA_AFL.1': 8, 'FIA_UAU': 6, 'FIA_UAU.1': 4, 'FIA_UAU.4': 2, 'FIA_UAU.7': 2, 'FIA_UID.1': 6}, 'FMT': {'FMT_MSA': 11, 'FMT_MSA.2': 1, 'FMT_MSA.3': 8, 'FMT_SMR': 6, 'FMT_SMR.1': 9, 'FMT_MSA.1': 6, 'FMT_MTD': 3, 'FMT_MTD.1': 3, 'FMT_MTD.3': 1, 'FMT_MTD.3.1': 1, 'FMT_SMF': 4, 'FMT_SMF.1': 4, 'FMT_MOF': 2, 'FMT_MOF.1': 2, 'FMT_SMR.2': 6, 'FMT_MTD.2': 2}, 'FPR': {'FPR_UNO.1': 5, 'FPR_UNO.1.1': 1, 'FPR_UNO': 4}, 'FPT': {'FPT_TDC.1': 3, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 1, 'FPT_FLS': 5, 'FPT_FLS.1': 5, 'FPT_TST': 2, 'FPT_TST.1': 6, 'FPT_PHP': 3, 'FPT_PHP.3': 2, 'FPT_RCV': 3, 'FPT_RCV.3': 8, 'FPT_RCV.4': 1, 'FPT_TDC': 1, 'FPT_PHP.2': 3}, 'FRU': {'FRU_FLT': 1, 'FRU_FLT.1': 1, 'FRU_RSA': 1, 'FRU_RSA.1': 1}, 'FTP': {'FTP_ITC': 1, 'FTP_ITC.1': 3}}, 'cc_claims': {'D': {'D.APP_CODE': 5, 'D.APP_C_DATA': 3, 'D.APP_I_DATA': 3, 'D.PIN': 6, 'D.JCS_CODE': 3, 'D.JCS_DATA': 5, 'D.SEC_DATA': 7, 'D.API_DATA': 3, 'D.CRYPTO': 4, 'D.CONFIG': 2, 'D.SENSITIVE_DATA': 1, 'D.ARRAY': 3, 'D.KEY': 2, 'D.AUDITLOG': 1, 'D.LOADFILE': 1, 'D.GLPIN': 1, 'D.APPLILIFECYC': 1, 'D.NB_REMAINTRYGLB': 1}, 'O': {'O.LOAD': 3, 'O.CARD-MANAGEMENT': 3, 'O.SID': 1, 'O.OPERATE': 1, 'O.RESOURCES': 1, 'O.FIREWALL': 1, 'O.NATIVE': 1, 'O.REALLOCATION': 1, 'O.SHRD_VAR_CONFID': 1, 'O.SHRD_VAR_INTEG': 1, 'O.INSTALL': 1, 'O.DELETION': 1, 'O.OBJ-DELETION': 1, 'O.ALARM': 1, 'O.TRANSACTION': 1, 'O.CIPHER': 1, 'O.PIN-MNGT': 1, 'O.KEY-MNGT': 1, 'O.SECURE_COMPARE': 1, 'O.SCP': 3, 'O.JAVAOBJECT': 35, 'O.APPLET': 16, 'O.CODE_PKG': 6, 'O.CODE_PCKG': 8}, 'T': {'T.CONFIGURATION': 2, 'T.CONF_DATA_APPLET': 2, 'T.PHYSICAL': 1, 'T.CONFID-JCS-CODE': 1, 'T.CONFID-APPLI-DATA': 1, 'T.CONFID-JCS-DATA': 1, 'T.INTEG-APPLI-CODE': 4, 'T.INTEG-JCS-CODE': 1, 'T.INTEG-APPLI-DATA': 4, 'T.INTEG-JCS-DATA': 1, 'T.INTEG-APPLICODE': 1, 'T.INTEG-APPLIDATA': 1, 'T.SID': 2, 'T.EXE-CODE': 2, 'T.NATIVE': 1, 'T.RESSOURCES': 1, 'T.INSTALL': 1, 'T.DELETION': 1, 'T.OBJ-DELETION': 1}, 'A': {'A.NATIVE': 1, 'A.VERIFICATION': 1, 'A.APPLET': 1}, 'R': {'R.JAVA': 9}, 'OP': {'OP.PUT': 4, 'OP.JAVA': 4, 'OP.CREATE': 5, 'OP.DELETE_APPLET': 3, 'OP.DELETE_PCKG': 2, 'OP.DELETE_PCKG_APPLET': 2, 'OP.ARRAY_ACCESS': 3, 'OP.INSTANCE_FIELD': 2, 'OP.INVK_VIRTUAL': 3, 'OP.INVK_INTERFACE': 4, 'OP.THROW': 3, 'OP.TYPE_ACCESS': 3, 'OP.SEND': 1, 'OP.RECEIVE': 1}, 'OE': {'OE.NATIVE': 1, 'OE.VERIFICATION': 1, 'OE.APPLET': 1}, 'OSP': {'OSP.VERIFICATION': 1}}, 'vendor': {'Oberthur': {'Oberthur Technologies': 196, 'Oberthur': 1, 'OBERTHUR': 2}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 8}}, 'DES': {'DES': {'DES': 19}, '3DES': {'3DES': 1, 'TDES': 4}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 4}, 'ECDSA': {'ECDSA': 1}, 'ECC': {'ECC': 3}}, 'FF': {'DH': {'Diffie-Hellman': 3}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 4}, 'SHA2': {'SHA-256': 3, 'SHA-384': 2, 'SHA-512': 2, 'SHA-224': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 1}, 'KA': {'Key Agreement': 2}}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 8}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'AtmelToolbox': {'ATMEL Toolbox 00.03.11.05': 2}}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 2, 'SPA': 1, 'DPA': 1}, 'FI': {'physical tampering': 4, 'malfunction': 2, 'fault injection': 1}, 'other': {'JIL': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 46-3': 5, 'FIPS PUB 81': 4, 'FIPS PUB 180-2': 2, 'FIPS PUB 186-2': 1, 'FIPS PUB 197': 1, 'FIPS 186-2': 1}, 'PKCS': {'PKCS#1': 4}}, 'javacard_version': {'JavaCard': {'Java Card 2.2.2': 5}, 'GlobalPlatform': {'GlobalPlatform 2.1.1': 5}}, 'javacard_api_const': {'misc': {'TYPE_ACCESS': 3}}, 'javacard_packages': {'java': {'java.rmi': 1}, 'javacard': {'javacard.framework': 3, 'javacard.security': 1}, 'javacardx': {'javacardx.framework.util': 1}}, 'certification_process': {}}
. - The report_filename property was set to
anssi-cc_2009-36en.pdf
. - The st_filename property was set to
anssi-cc-cible_2009-36en.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['THALES']
. - The cert_id property was set to
ANSSI-CC-2009/36
. - The st_references property was updated, with the
{'directly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2010/39', 'ANSSI-CC-2010/36', 'ANSSI-CC-2010/25', 'ANSSI-CC-2010/38', 'ANSSI-CC-2010/37']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2010/39', 'ANSSI-CC-2010/36', 'ANSSI-CC-2010/25', 'ANSSI-CC-2010/38', 'ANSSI-CC-2010/37']}, 'directly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2009/11', 'ANSSI-CC-2009/10']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2009/11', 'ANSSI-CC-2009/10']}}
data. - The report_references property was updated, with the
{'directly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2010/26', 'ANSSI-CC-2010/36', 'ANSSI-CC-2010/25', 'ANSSI-CC-2009/48', 'ANSSI-CC-2010/27']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2010/26', 'ANSSI-CC-2010/39', 'ANSSI-CC-2010/36', 'ANSSI-CC-2010/25', 'ANSSI-CC-2009/48', 'ANSSI-CC-2010/27', 'ANSSI-CC-2010/58', 'ANSSI-CC-2013/70', 'ANSSI-CC-2012/10']}, 'directly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2009/11']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2009/11']}}
data. - The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}]}
.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc_2009-36en.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-cible_2009-36en.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
. - The st_references property was updated, with the
{'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}
data. - The report_references property was updated, with the
{'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}
data. - The extracted_sars property was set to
None
.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2010/37', 'ANSSI-CC-2010/39', 'ANSSI-CC-2010/36', 'ANSSI-CC-2010/25']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2010/37', 'ANSSI-CC-2010/39', 'ANSSI-CC-2010/36', 'ANSSI-CC-2010/25']}}, 'directly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2009/10']}}, 'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2009/10']}}}
data. - The report_references property was updated, with the
{'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2010/36', 'ANSSI-CC-2010/25']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2010/39', 'ANSSI-CC-2010/36', 'ANSSI-CC-2010/25']}}}
data.
- The st_references property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name ID-One Cosmo V7.0-a SmartCard in configuration Large Dual, Large and Standard Dual was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "ab87ddd65fd35ffa",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2009/36",
"cert_lab": [
"THALES"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL5+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_MSU",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VLA",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"7.0"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2010/26",
"ANSSI-CC-2009/48",
"ANSSI-CC-2010/25",
"ANSSI-CC-2010/27",
"ANSSI-CC-2010/36"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2009/11"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2010/26",
"ANSSI-CC-2010/39",
"ANSSI-CC-2010/58",
"ANSSI-CC-2009/48",
"ANSSI-CC-2013/70",
"ANSSI-CC-2010/25",
"ANSSI-CC-2012/10",
"ANSSI-CC-2010/27",
"ANSSI-CC-2010/36"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2009/11"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2010/39",
"ANSSI-CC-2010/25",
"ANSSI-CC-2010/38",
"ANSSI-CC-2010/37",
"ANSSI-CC-2010/36"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2009/11",
"ANSSI-CC-2009/10"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2010/39",
"ANSSI-CC-2010/25",
"ANSSI-CC-2010/38",
"ANSSI-CC-2010/37",
"ANSSI-CC-2010/36"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2009/11",
"ANSSI-CC-2009/10"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Oberthur Card System / Philips (NXP)",
"manufacturer_web": "https://www.oberthur.com/",
"name": "ID-One Cosmo V7.0-a SmartCard in configuration Large Dual, Large and Standard Dual",
"not_valid_after": "2019-09-01",
"not_valid_before": "2009-09-29",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "anssi-cc_2009-36en.pdf",
"report_frontpage": {
"FR": {
"cc_security_level": "EAL 5 augmented ADV_IMP.2, ALC_DVS.2, AVA_VAN.5",
"cc_version": "Common Criteria version 3.1",
"cert_id": "ANSSI-CC-2009/36",
"cert_item": "ID-One Cosmo V7.0-a SmartCard in configuration Large Dual, Large and Standard Dual JavaCard platform embedded on Atmel Secure Microcontroller Solutions components AT90SC 256144RCFT revision F, 256144RCFT revision F (without antenna), 25672RCFT revision F, and embedded with cryptographic library version 00.03.11.05 ToolBox from Atmel Secure Microcontroller Solutions",
"cert_item_version": "JavaCard Platform version for any configuration: 7.0-a Optional Code r1.0 High Secure version for each configuration: 071761, 071761, 071771 Optional Code CodopAuth r1.0 version for each configuration: 071621, 071621, 071631 ToolBox version for any configuration: 00.03.11.05",
"cert_lab": "THALES - CEACI (T3S \u2013 CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France Phone: +33 (0)5 62 88 28 01 or 18, email : [email protected]",
"developer": "Oberthur Technologies1 50 quai Michelet 92300 Levallois-Perret, France ATMEL Secure Microcontroller Solutions1 Maxwell Building - Scottish Enterprise technology Park East Kilbride, G75 0QR - Ecosse, Royaume-Uni Sponsor Oberthur Technologies 50 quai Michelet, 92300 Levallois-Perret, France",
"match_rules": [
"Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developer\\(s\\)(.+)Evaluation facility(.+)Recognition arrangements"
],
"ref_protection_profiles": "PP/0304] Java Card System - Standard 2.1.1 Configuration Protection Profile \u2013 version 1.0b, August 2003"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2009/36": 18,
"DCSSI-2009/11": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0002-2001": 1
}
},
"cc_sar": {
"ADO": {
"ADO_DEL": 1
},
"ADV": {
"ADV_ARC": 1,
"ADV_FSP": 1,
"ADV_IMP": 1,
"ADV_IMP.2": 1,
"ADV_TDS": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_PRE": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMS": 1,
"ALC_DVS": 1,
"ALC_DVS.2": 3,
"ALC_FLR": 2,
"ALC_TAT": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_ECD": 1,
"ASE_INT": 1,
"ASE_OBJ": 1,
"ASE_REQ": 1,
"ASE_SPD": 1,
"ASE_TSS": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_DPT": 1,
"ATE_FUN": 1,
"ATE_IND": 1
},
"AVA": {
"AVA_MSU.3": 2,
"AVA_VAN": 1,
"AVA_VAN.5": 1,
"AVA_VLA.4": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 3": 1,
"EAL 4": 1,
"EAL 5": 5,
"EAL 5 augmented": 2,
"EAL 7": 1,
"EAL4": 1,
"EAL7": 1
},
"ITSEC": {
"ITSEC E6 and": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Thales": {
"THALES - CEACI": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {
"GlobalPlatform": {
"GlobalPlatform 2.1.1": 1
},
"JavaCard": {
"Java Card 2.2.2": 1
}
},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2006-09-001": 1,
"CCMB-2007-09-002": 1,
"CCMB-2007-09-003": 1,
"CCMB-2007-09-004": 1
},
"SCP": {
"SCP01": 1,
"SCP02": 1,
"SCP03": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Oberthur": {
"Oberthur": 2,
"Oberthur Technologies": 19
}
},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20100108161512+01\u002700\u0027",
"/Keywords": "",
"/ModDate": "D:20100108161512+01\u002700\u0027",
"/Producer": "Acrobat Distiller 8.0.0 (Windows)",
"pdf_file_size_bytes": 245118,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.ssi.gouv.fr/",
"mailto:[email protected]"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 17
},
"st_filename": "anssi-cc-cible_2009-36en.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 3
},
"ECDH": {
"ECDH": 4
},
"ECDSA": {
"ECDSA": 1
}
},
"FF": {
"DH": {
"Diffie-Hellman": 3
}
}
},
"cc_cert_id": {
"FR": {
"DCSSI-2009/10": 1,
"DCSSI-2009/11": 1
}
},
"cc_claims": {
"A": {
"A.APPLET": 1,
"A.NATIVE": 1,
"A.VERIFICATION": 1
},
"D": {
"D.API_DATA": 3,
"D.APPLILIFECYC": 1,
"D.APP_CODE": 5,
"D.APP_C_DATA": 3,
"D.APP_I_DATA": 3,
"D.ARRAY": 3,
"D.AUDITLOG": 1,
"D.CONFIG": 2,
"D.CRYPTO": 4,
"D.GLPIN": 1,
"D.JCS_CODE": 3,
"D.JCS_DATA": 5,
"D.KEY": 2,
"D.LOADFILE": 1,
"D.NB_REMAINTRYGLB": 1,
"D.PIN": 6,
"D.SEC_DATA": 7,
"D.SENSITIVE_DATA": 1
},
"O": {
"O.ALARM": 1,
"O.APPLET": 16,
"O.CARD-MANAGEMENT": 3,
"O.CIPHER": 1,
"O.CODE_PCKG": 8,
"O.CODE_PKG": 6,
"O.DELETION": 1,
"O.FIREWALL": 1,
"O.INSTALL": 1,
"O.JAVAOBJECT": 35,
"O.KEY-MNGT": 1,
"O.LOAD": 3,
"O.NATIVE": 1,
"O.OBJ-DELETION": 1,
"O.OPERATE": 1,
"O.PIN-MNGT": 1,
"O.REALLOCATION": 1,
"O.RESOURCES": 1,
"O.SCP": 3,
"O.SECURE_COMPARE": 1,
"O.SHRD_VAR_CONFID": 1,
"O.SHRD_VAR_INTEG": 1,
"O.SID": 1,
"O.TRANSACTION": 1
},
"OE": {
"OE.APPLET": 1,
"OE.NATIVE": 1,
"OE.VERIFICATION": 1
},
"OP": {
"OP.ARRAY_ACCESS": 3,
"OP.CREATE": 5,
"OP.DELETE_APPLET": 3,
"OP.DELETE_PCKG": 2,
"OP.DELETE_PCKG_APPLET": 2,
"OP.INSTANCE_FIELD": 2,
"OP.INVK_INTERFACE": 4,
"OP.INVK_VIRTUAL": 3,
"OP.JAVA": 4,
"OP.PUT": 4,
"OP.RECEIVE": 1,
"OP.SEND": 1,
"OP.THROW": 3,
"OP.TYPE_ACCESS": 3
},
"OSP": {
"OSP.VERIFICATION": 1
},
"R": {
"R.JAVA": 9
},
"T": {
"T.CONFID-APPLI-DATA": 1,
"T.CONFID-JCS-CODE": 1,
"T.CONFID-JCS-DATA": 1,
"T.CONFIGURATION": 2,
"T.CONF_DATA_APPLET": 2,
"T.DELETION": 1,
"T.EXE-CODE": 2,
"T.INSTALL": 1,
"T.INTEG-APPLI-CODE": 4,
"T.INTEG-APPLI-DATA": 4,
"T.INTEG-APPLICODE": 1,
"T.INTEG-APPLIDATA": 1,
"T.INTEG-JCS-CODE": 1,
"T.INTEG-JCS-DATA": 1,
"T.NATIVE": 1,
"T.OBJ-DELETION": 1,
"T.PHYSICAL": 1,
"T.RESSOURCES": 1,
"T.SID": 2
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0035": 1
}
},
"cc_sar": {
"ADV": {
"ADV_IMP.2": 4
},
"ALC": {
"ALC_DVS.2": 3
},
"AVA": {
"AVA_VAN.5": 3
}
},
"cc_security_level": {
"EAL": {
"EAL5": 3,
"EAL5 augmented": 3,
"EAL5+": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP": 2,
"FAU_ARP.1": 4,
"FAU_GEN": 1,
"FAU_GEN.1": 2,
"FAU_SAA": 1,
"FAU_SAA.1": 2,
"FAU_SAR": 1,
"FAU_SAR.1": 2
},
"FCO": {
"FCO_NRO": 3,
"FCO_NRO.2": 9
},
"FCS": {
"FCS_CKM": 5,
"FCS_CKM.1": 3,
"FCS_CKM.2": 1,
"FCS_CKM.2.1": 1,
"FCS_CKM.3": 1,
"FCS_CKM.3.1": 1,
"FCS_CKM.4": 2,
"FCS_CKM.4.1": 1,
"FCS_COP": 7,
"FCS_COP.1": 7,
"FCS_COP.1.1": 1,
"FCS_RND": 1,
"FCS_RNG": 4,
"FCS_RNG.1": 7,
"FCS_RNG.1.1": 1,
"FCS_RNG.1.2": 1
},
"FDP": {
"FDP_ACC": 5,
"FDP_ACC.2": 9,
"FDP_ACF": 4,
"FDP_ACF.1": 18,
"FDP_IFC": 2,
"FDP_IFC.1": 1,
"FDP_IFC.2": 2,
"FDP_IFF": 2,
"FDP_IFF.1": 10,
"FDP_ITC": 2,
"FDP_ITC.1": 3,
"FDP_ITC.2": 5,
"FDP_RIP": 9,
"FDP_RIP.1": 10,
"FDP_ROL": 1,
"FDP_ROL.1": 2,
"FDP_SDI.1": 1,
"FDP_SDI.1.1": 1,
"FDP_SDI.2": 1,
"FDP_SDI.2.1": 1,
"FDP_SDI.2.2": 1,
"FDP_UCT": 1,
"FDP_UCT.1": 1,
"FDP_UIT": 1,
"FDP_UIT.1": 2
},
"FIA": {
"FIA_AFL": 4,
"FIA_AFL.1": 8,
"FIA_ATD": 2,
"FIA_ATD.1": 3,
"FIA_UAU": 6,
"FIA_UAU.1": 4,
"FIA_UAU.4": 2,
"FIA_UAU.7": 2,
"FIA_UID": 4,
"FIA_UID.1": 6,
"FIA_UID.2": 1,
"FIA_USB.1": 2,
"FIA_USB.1.1": 1,
"FIA_USB.1.2": 1,
"FIA_USB.1.3": 1
},
"FMT": {
"FMT_MOF": 2,
"FMT_MOF.1": 2,
"FMT_MSA": 11,
"FMT_MSA.1": 6,
"FMT_MSA.2": 1,
"FMT_MSA.3": 8,
"FMT_MTD": 3,
"FMT_MTD.1": 3,
"FMT_MTD.2": 2,
"FMT_MTD.3": 1,
"FMT_MTD.3.1": 1,
"FMT_SMF": 4,
"FMT_SMF.1": 4,
"FMT_SMR": 6,
"FMT_SMR.1": 9,
"FMT_SMR.2": 6
},
"FPR": {
"FPR_UNO": 4,
"FPR_UNO.1": 5,
"FPR_UNO.1.1": 1
},
"FPT": {
"FPT_FLS": 5,
"FPT_FLS.1": 5,
"FPT_PHP": 3,
"FPT_PHP.2": 3,
"FPT_PHP.3": 2,
"FPT_RCV": 3,
"FPT_RCV.3": 8,
"FPT_RCV.4": 1,
"FPT_TDC": 1,
"FPT_TDC.1": 3,
"FPT_TDC.1.1": 1,
"FPT_TDC.1.2": 1,
"FPT_TST": 2,
"FPT_TST.1": 6
},
"FRU": {
"FRU_FLT": 1,
"FRU_FLT.1": 1,
"FRU_RSA": 1,
"FRU_RSA.1": 1
},
"FTP": {
"FTP_ITC": 1,
"FTP_ITC.1": 3
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"AtmelToolbox": {
"ATMEL Toolbox 00.03.11.05": 2
}
},
"crypto_protocol": {},
"crypto_scheme": {
"KA": {
"Key Agreement": 2
},
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 4
},
"SHA2": {
"SHA-224": 1,
"SHA-256": 3,
"SHA-384": 2,
"SHA-512": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {
"misc": {
"TYPE_ACCESS": 3
}
},
"javacard_packages": {
"java": {
"java.rmi": 1
},
"javacard": {
"javacard.framework": 3,
"javacard.security": 1
},
"javacardx": {
"javacardx.framework.util": 1
}
},
"javacard_version": {
"GlobalPlatform": {
"GlobalPlatform 2.1.1": 5
},
"JavaCard": {
"Java Card 2.2.2": 5
}
},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 8
}
},
"side_channel_analysis": {
"FI": {
"fault injection": 1,
"malfunction": 2,
"physical tampering": 4
},
"SCA": {
"DPA": 1,
"SPA": 1,
"physical probing": 2
},
"other": {
"JIL": 1
}
},
"standard_id": {
"FIPS": {
"FIPS 186-2": 1,
"FIPS PUB 180-2": 2,
"FIPS PUB 186-2": 1,
"FIPS PUB 197": 1,
"FIPS PUB 46-3": 5,
"FIPS PUB 81": 4
},
"PKCS": {
"PKCS#1": 4
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 8
}
},
"DES": {
"3DES": {
"3DES": 1,
"TDES": 4
},
"DES": {
"DES": 19
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Oberthur": {
"OBERTHUR": 2,
"Oberthur": 1,
"Oberthur Technologies": 196
}
},
"vulnerability": {}
},
"st_metadata": {
"/CreationDate": "D:20091125161122+01\u002700\u0027",
"/Keywords": "",
"/ModDate": "D:20091125161122+01\u002700\u0027",
"/Producer": "AFPL Ghostscript 8.50",
"pdf_file_size_bytes": 1265954,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 96
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc_2009-36en.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"EAL5+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-cible_2009-36en.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "e537ddac7ca849b3ffecafde9d603efd0c5446e365ac230b7cffe40d01763946",
"txt_hash": "4330d08410ae0b29055f3d049292b9bee447bf1837ac6e0f1cfcdfc630dcd8e2"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "5e4a6d5d7ef053ce3a2cd2d836980ed383834817d449efd7ed2c5ff41395e162",
"txt_hash": "174d73f5c2bced5edc451f2c8984f7357b1688cbba4c4aaf8733bfe3d5697983"
}
},
"status": "archived"
}